You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Feb 2, 2021. It is now read-only.
It's easier to just dump the files themselves with a dedicated tool. Giant hex strings aren't especially useful for debugging I've found - better to remove them.
I assume stuff like the following:
01:13:57 25 LighthouseBackend.lambda$null$4: onPledgeHandler: transactions: "\001\000\000\000\002o\217\362\206\344zVs3\350h\205\272-\276{\373\021\323\211\006\262\2157\222\217\262\227\355\3028\031\000\000\000\000kH0E\002!\000\204\320L\257 \033Wb\255u\275W/\026\024\222\361\v9\022\005\365\363\257[&K
Wt<\300\002 t\211\254\2603n\211\242\221Q\360\210\205\214\000Gq\3470\205\316o\343\374\2779H\235]\023\265\327\001!\0034\006^\361o\023\2547\215\217]\377.@'Q\302\371\330U{_E\356u\002\313\357\317-\236\255\377\377\377\377<C\232]7\320\3567\312N\313M\276;*\305\024AuY\233\002@\201\317\274\310\374\021\303~\000\000\000\000jG0D\002 i\222U\302\357m=r9\237Eg\242U\340+\214\270R\206\350\274\350\367\017w\315\225^\343\307Y\002 XT\353\006\235G5\226\225\0028\364;\034C\204z\345\237J\253[\260\227\247MH\242\336\021\313\373\001!\003\026*\001\231\230< \340N \360\006\035\212S\301~\n\215\310\313\253\255o~\352+>\321\373V\337\377\377\377\377\002Y\366\005\000\000\000\000\000\031v\251\024\232a"\226h\230U\n\001\366\247\303`\340\r\377\260\316\257\006\210\254\026\024N\000\000\000\000\000\031v\251\024E\321x\253U\315\206\273\315\352LY\221\375\037\325\b\266\301\354\210\254\000\000\000\000"transactions: "\001\000\000\000\001\002.\235"\341\375\026\235\316\203\363\260<\260�\2553\304\023\227\224n3\347c\363\341\333\271\2327\001\000\000\000jG0D\002 5\001\223>\371\2474\212\202\226\031\260\222\343\231\031\364\300\207'\251\364Nc\243\363\265\343\213~\375+\002 \035\252\020\004' \273\035w\277<\266:\022Y\000\351\334f\327\342\306\3544\342\245\304P\211x\3048\201!\003X\265J\221D\337\236 \334\373\342\332\205I6\022\242s\362\212\317vf\257\226\300\370\210\322\326\v<\377\377\377\377\001\200\223\334\024\000\000\000\000\031v\251\024\363\356\367~\021\0225\327Ga\255R\357\253S\220>+xC\210\254\000\000\000\000"
represents actual txs; be useful if they were in hex so you could decoderawtransaction them and see what's going on under the hood.
The text was updated successfully, but these errors were encountered: