AzStackHci.EnvironmentChecker.Utilities.psm1


Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1

class HealthModel
{
    # Attributes for Azure Monitor schema
    [string]$Name #Name of the individual test/rule/alert that was executed. Unique, not exposed to the customer.
    [string]$Title #User-facing name; one or more sentences indicating the direct issue.
    [string]$Severity #Severity of the result (Critical, Warning, Informational, Hidden) – this answers how important the result is. Critical is the only update-blocking severity.
    [string]$Description #Detailed overview of the issue and what impact the issue has on the stamp.
    [psobject]$Tags #Key-value pairs that allow grouping/filtering individual tests. For example, "Group": "ReadinessChecks", "UpdateType": "ClusterAware"
    [string]$Status #The status of the check running (i.e. Failed, Succeeded, In Progress) – this answers whether the check ran, and passed or failed.
    [string]$Remediation #Set of steps that can be taken to resolve the issue found.
    [string]$TargetResourceID #The unique identifier for the affected resource (such as a node or drive).
    [string]$TargetResourceName #The name of the affected resource.
    [string]$TargetResourceType #The type of resource being referred to (well-known set of nouns in infrastructure, aligning with Monitoring).
    [datetime]$Timestamp #The Time in which the HealthCheck was called.
    [psobject]$AdditionalData #Property bag of key value pairs for additional information.
    [string]$HealthCheckSource #The name of the services called for the HealthCheck (I.E. Test-AzureStack, Test-Cluster).
}

function Test-ModuleUpdate
{
    <#
    .SYNOPSIS
        Checks PSGallery for updated module.
    .DESCRIPTION
        Checks PSGallery for updated module and gives user 10 seconds
        to cancel cmdlet and prints update instructions to screen
    #>

    param([switch]$PassThru)
    try
    {
        if (-not $PassThru)
        {
            $thisVersion = (Get-PSCallStack | Where-Object Command -like 'Invoke-AzstackHci*Validation').InvocationInfo.MyCommand.Version
            Log-Info ("Looking for module updates for AzStackHci.EnvironmentChecker greater than {0}" -f [system.string]$thisVersion)
            $ModuleOnline = Find-Module -Name AzStackHci.EnvironmentChecker -Repository PSGallery -AllowPrerelease -ErrorAction SilentlyContinue
            if ([system.version]$($ModuleOnline.Version -replace ('-preview', '')) -gt $thisVersion)
            {
                Log-Info ($lTxt.CurrentVersion -f 'AzStackHci.EnvironmentChecker', [system.string]$thisVersion) -ConsoleOut
                Log-Info ($lTxt.UpdateToVersion -f $ModuleOnline.Version, $ModuleOnline.Name) -ConsoleOut
                Start-Sleep -Seconds 10
            }
            else
            {
                Log-Info ($lTxt.CurrentVersion -f 'AzStackHci.EnvironmentChecker', [system.string]$thisVersion)
            }
        }
    }
    catch
    {
        Log-Info ($lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message) -Type Error
    }
}

function Test-Elevation
{
    ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')
}

function Test-Count
{
    [CmdletBinding()]
    param (
        [CimInstance[]]
        $CimData,

        [int]
        $minimum,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        $passed = $false
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $instanceId = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique

        if ($CimData.Count -lt $minimum)
        {
            $passed = $false
            $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum
            Log-Info $detail -Type Warning
        }
        else
        {
            $passed = $true
        }

        $result = New-Object HealthModel
        $Result.Name = 'AzStackHci_{0}_Test_{1}_Count' -f $ValidatorName, $className
        $Result.Title = 'Test {0} Count' -f $className
        $Result.Severity = $Severity
        $Result.Description = 'Checking {0} count' -f $className
        $Result.Remediation = 'https://aka.ms/hci-connect-chk'
        $Result.TargetResourceID = $InstanceId
        $Result.TargetResourceName = $InstanceId
        $Result.TargetResourceType = $className
        $Result.Timestamp = [datetime]::UtcNow
        $Result.HealthCheckSource = 'Environment Checker'
        $Result.AdditionalData = New-Object -TypeName PSObject -Property @{
            Source    = "$ClassName Count"
            Resource  = $CimData.count
            Detail    = $detail
            Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
            TimeStamp = [datetime]::UtcNow
        }
        $result.Status = if ($passed) { 'Succeeded' } else { 'Failed' }
        $result
    }
    catch
    {
        throw $_
    }
}

function Test-InstanceCountByGroup
{
    <#
    .SYNOPSIS
        Test if count matches across groups
    #>

    [CmdletBinding()]
    param (
        [CimInstance[]]
        $CimData,

        [string[]]
        $GroupProperty,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        $GroupValues = $cimData | Group-Object -Property $groupProperty | Select-Object -ExpandProperty Name
        $nodeCount = ($cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique).count
        foreach ($GroupValue in $GroupValues)
        {
            foreach ($group in $GroupProperty)
            {
                $gData = $CimData | Where-Object $Group -eq $GroupValue
                if ($gData.CimSystemProperties.SystemName.Count -eq 1)
                {
                    $serverName = $gData.CimSystemProperties.SystemName
                }
                else
                {
                    $serverName = 'AllServers'
                }

                $className = $gData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1

                $result = New-Object HealthModel
                $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Count_ByGroup' -f $ValidatorName, $className
                $result.Title = 'Test {0} Properties' -f $className
                $result.Severity = $Severity
                $result.Description = 'Checking all servers have same {0} instance count by group' -f $className
                $result.Remediation = 'https://aka.ms/hci-connect-chk'
                $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className
                $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className
                $result.TargetResourceType = $className
                $result.Timestamp = [datetime]::UtcNow
                $result.HealthCheckSource = 'Environment Checker'

                $groupData = $gData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } }
                $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique
                # The count of InstanceCounts must equal the number of servers to ensure each server has at least 1 instance
                # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, but SVR3 could have 5 disks of type A.
                # There should be only 1 unique InstanceCount from all values to ensure each server has the same instance count
                # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, SVR3 has 6 disks of type A.
                $Status = if ($groupData.InstanceCount.Count -ne $nodeCount -or $groupDataCount.Count -gt 1 ) { 'Failed' } else { 'Succeeded' }
                $result.AdditionalData = New-Object -TypeName PSObject -Property @{
                    Source    = $serverName
                    Resource  = $ClassName
                    Detail    = if ($status -eq 'Succeeded') {
                        $lTxt.CountByGroup -f $Group
                    }
                    else {
                        $dtl = $lTxt.CountByGroupFail -f $className, $group, `
                        (($groupData | ForEach-Object { "{0}: {1} instances of {2}" -f $_.Name, $_.InstanceCount, $GroupValue }) -join ', ')
                        Log-Info $dtl -Type Warning
                        $dtl
                    }
                    Status    = $Status
                    TimeStamp = [datetime]::UtcNow
                }
                $result.Status = if ($result.AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
                $result
            }
        }
    }
    catch
    {
        throw $_
    }
}

function Test-GroupProperty
{
    <#
    .SYNOPSIS
        Test if properties match across groups
    #>

    [CmdletBinding()]
    param (
        [CimInstance[]]
        $CimData,

        [string[]]
        $GroupProperty,

        [string[]]
        $MatchProperty,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        # Group by name and compare properties within each group
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $ServerName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
        $groupedData = @($CimData | Group-Object -Property $groupProperty)
        $returnResult = @()
        if ($serverName.Count -gt 1)
        {
            $serverName = 'AllServers'
        }
        $returnResult += foreach ($group in $groupedData)
        {
            $instanceId = "Machine: {0}, Class: {1} Group: {2}" -f $ServerName, $className, $group.Name

            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Group_Consistency' -f $ValidatorName, $className
            $result.Title = 'Test {0} Groups' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking {0} Groups for consistent properties' -f $className
            $result.Remediation = 'https://aka.ms/hci-connect-chk'
            $result.TargetResourceID = $instanceId
            $result.TargetResourceName = $instanceId
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            $detail = $null
            $passed = $false
            if ($group.Count -gt 1)
            {
                foreach ($propertyName in $matchProperty)
                {
                    if (($group.Group.$propertyName | Sort-Object | Get-Unique).Count -gt 1)
                    {
                        $passed = $false
                        $detail = $lTxt.MismatchProp -f $className, $propertyName, ($group.Group.$propertyName -join ', ')
                        Log-Info -Message $detail -Type Warning
                    }
                    else
                    {
                        $passed = $true
                    }
                    $AdditionalData += New-Object -TypeName PSObject -Property @{
                        Source    = "$($Group.Name) $propertyName"
                        Resource  = $instance.$propertyName
                        Detail    = $detail
                        Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                        TimeStamp = [datetime]::UtcNow
                    }
                }
            }
            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        $returnResult
    }
    catch
    {
        throw $_
    }
}

function Test-InstanceCount
{
    <#
    .SYNOPSIS
        Test if instance count matches across instances
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [CimInstance[]]
        $CimData,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    if ($CimData.CimSystemProperties.SystemName.Count -eq 1)
    {
        $serverName = $CimData.CimSystemProperties.SystemName
    }
    else
    {
        $serverName = 'AllServers'
    }

    $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1

    $result = New-Object HealthModel
    $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Count' -f $ValidatorName, $className
    $result.Title = 'Test {0} Properties' -f $className
    $result.Severity = $Severity
    $result.Description = 'Checking all servers have same {0} instance count' -f $className
    $result.Remediation = 'https://aka.ms/hci-connect-chk'
    $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className
    $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className
    $result.TargetResourceType = $className
    $result.Timestamp = [datetime]::UtcNow
    $result.HealthCheckSource = 'Environment Checker'

    $groupData = $cimData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } }
    $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique
    $status = if ($groupDataCount.Count -gt 1) { 'Failed' } else { 'Succeeded' }
    $result.AdditionalData = New-Object -TypeName PSObject -Property @{
        Source    = $serverName
        Resource  = $ClassName
        Detail    = if ($status -eq 'Succeeded') {
            $lTxt.InstanceCount
        }
        else {
            $lTxt.InstanceCountFail -f `
            (($groupData | ForEach-Object { "{0}: {1}" -f $_.Name, $_.InstanceCount }) -join ',')
        }
        Status    = $status
        TimeStamp = [datetime]::UtcNow
    }
    $result.Status = if ($result.AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
    $result
}

function Test-PropertySync
{
    <#
    .SYNOPSIS
        Test if properties match across instances
    #>


    [CmdletBinding()]
    param (
        [Parameter()]
        [CimInstance[]]
        $CimData,

        [Parameter()]
        [string[]]
        $MatchProperty,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        $returnResult = @()
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
        if ($serverName.Count -gt 1)
        {
            $serverName = 'AllServers'
            $returnResult += Test-InstanceCount -CimData $CimData
        }
        $returnResult += if ($CimData.Count -gt 1)
        {
            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Consistency' -f $ValidatorName, $className
            $result.Title = 'Test {0} Properties' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking all {0} for consistent properties' -f $className
            $result.Remediation = 'https://aka.ms/hci-connect-chk'
            $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className
            $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            foreach ($propertyName in $matchProperty)
            {
                $detail = $null
                $passed = $false
                if (($CimData.$propertyName | Get-Unique).Count -gt 1)
                {
                    $passed = $false
                    $detail = $lTxt.MismatchProp -f $className, $propertyName, ($CimData.$propertyName -join ',')
                    Log-Info -Message $detail -Type Warning
                }
                else
                {
                    $passed = $true
                }
                $AdditionalData += New-Object -TypeName PSObject -Property @{
                    Source    = "$className`: $propertyName"
                    Resource  = $instance.$propertyName
                    Detail    = $detail
                    Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                    TimeStamp = [datetime]::UtcNow
                }
            }
            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        return $returnResult
    }
    catch
    {
        throw $_
    }
}

function Test-DesiredProperty
{
    <#
    .SYNOPSIS
        Test if properties have required value
    #>

    [cmdletbinding()]
    param (
        [CimInstance[]]
        $cimData,

        [hashtable]
        $desiredPropertyValue,

        [string]
        $InstanceIdStr,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )

    try
    {
        # Test properties
        $returnResult = @()
        $returnResult += foreach ($instance in $cimData)
        {
            $serverName = $instance.CimSystemProperties.ServerName | Sort-Object | Get-Unique
            $sb = ([scriptblock]::Create($InstanceIdStr))
            $instanceId = Invoke-Command -ScriptBlock $sb
            $className = $instance.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
            Log-Info -Message ($lTxt.Test -f $className, $instanceId)

            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Properties' -f $ValidatorName, $className
            $result.Title = 'Test {0} Properties' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking {0} for desired properties' -f $className
            $result.Remediation = 'https://aka.ms/hci-connect-chk'
            $result.TargetResourceID = $instanceId
            $result.TargetResourceName = $instanceId
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            foreach ($propertyName in $desiredPropertyValue.Keys)
            {
                $detail = $null
                $passed = $false
                $hint = $null
                $desiredPropertyValueCheck = $null
                $desiredPropertyValueCheck = if ($desiredPropertyValue.$propertyName -is [hashtable])
                {
                    $desiredPropertyValue.$propertyName.Value
                }
                else
                {
                    $desiredPropertyValue.$propertyName
                }

                if (($instance.$propertyName | Select-Object -First 1) -notin $desiredPropertyValueCheck)
                {
                    $passed = $false
                    $hint = if ($desiredPropertyValue.$propertyName.hint) { ' ({0})' -f $desiredPropertyValue.$propertyName.hint }
                    $detail = $lTxt.UnexProp -f $className, $propertyName, $instance.$propertyName, ($desiredPropertyValueCheck -join ','), $hint
                    Log-Info -Message $detail -Type Warning
                }
                else
                {
                    $passed = $true
                }
                $AdditionalData += New-Object -TypeName PSObject -Property @{
                    Source    = "$className`: $propertyName"
                    Resource  = if ($hint) { "$($instance.$propertyName)$hint" } else { $instance.$propertyName }
                    Detail    = $detail
                    Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                    TimeStamp = [datetime]::UtcNow
                }
            }

            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        return $returnResult
    }
    catch
    {
        throw $_
    }
}

function Confirm-RemoteConnectionMatch
{
    <#
    .SYNOPSIS
        Ensure multiple remote connection methods match all remote systems
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [System.Management.Automation.Runspaces.PSSession[]]
        $PsSession,

        [CimSession[]]
        $CimSession
    )

    if ($PsSession -or $CimSession)
    {
        Log-Info ($lTxt.RemoteSyncStart -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ','))
        if (Compare-Object -ReferenceObject $PsSession -DifferenceObject $CimSession -Property ComputerName)
        {
            $errorMsg = $lTxt.RemoteSyncFail -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ',')
            Log-Info $errorMsg -Type Error
            throw $errorMsg
        }
        else
        {
            Log-Info ($lTxt.RemoteSyncPass -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ','))
        }
    }
    else
    {
        Log-Info $lTxt.RemoteSyncSkip
    }
}

function Get-TestCount
{
    param (
        [Parameter()]
        [string]
        $ModuleName,

        [Parameter()]
        [string]
        $CommandPrefix
    )
    try
    {
        $command = Get-Command -Name $CommandPrefix* -Module $ModuleName
        if ($command)
        {
            return $command.Count
        }
        else
        {
            return 1
        }
    }
    catch
    {
        return 1
    }
}

function Get-DeploymentData
{
    [cmdletbinding()]
    param ($Path)

    try
    {
        $Json = Get-Content -Path $Path | ConvertFrom-Json
        $DeploymentData = $json.ScaleUnits[0].DeploymentData
        if ([string]::IsNullOrEmpty($DeploymentData))
        {
            Log-Info $lTxt.InvalidDeploymentData
            return $null
        }
        return $DeploymentData
    }
    catch
    {
        throw $_
    }
}

function Get-TestListByFunction
{
    <#
    .SYNOPSIS
        Retrieve list of tests for a given validator
    .DESCRIPTION
        Tests should be prefixed with Test- and reside in a "helpers" module
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [string]
        $prefix = 'Test-*',

        [Parameter()]
        [string]
        $ModuleName
    )

    try
    {
        $script:envchktestList = Get-Command -Name $prefix -Module $ModuleName | Select-Object -ExpandProperty Name
        Write-Debug -Message "Retrieving list of tests for $($validator.Command): $($script:envchktestList -join ',')" -verbose
        return $script:envchktestList
    }
    catch
    {
        Write-Debug -Message "Failed to retrieve test list. Error $($_.exception)" -Verbose
    }
}

function Select-TestList
{
    <#
    .SYNOPSIS
        Filter Testlist by Include, Exclude and File based exclusions
    .DESCRIPTION
        Include replaces complete list, exclude is applied and file based exclusions are removed by regex.
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [string[]]
        $TestList,

        [Parameter()]
        [string[]]
        $Include,

        [Parameter()]
        [string[]]
        $Exclude,

        [Parameter()]
        [string]
        $FilePath  = "$PsScriptRoot\ExcludeTests.txt"
    )
    try
    {
        $returnList = @($TestList)
        if ($include)
        {
            $returnList = $Include
            Log-Info "Setting tests to $($include -join ',')"
        }
        if ($exclude)
        {
            Log-Info "Removing tests $($exclude -join ',')"
            $returnList = $returnList | Select-String -Pattern $exclude -NotMatch
        }
        if ($returnList.count -eq 0)
        {
            throw "No tests to perform after filtering"
        }
        if (Test-Path -Path $FilePath)
        {
            $fileExclusion = Get-Content -Path $FilePath
            Log-Info "Reading exclusion file $FilePath" -ConsoleOut
            Log-Info "Applying file exclusions: $($fileExclusion -join ',')" -ConsoleOut
            $returnList = $returnList | Select-String -Pattern $fileExclusion -NotMatch
        }

        Log-Info "Test list: $($returnList -join ',')"
        if ($returnList.Count -eq 0)
        {
            Log-Info -Message "No tests to run." -ConsoleOut -Type Warning
            break noTestsBreak
        }
        return $returnList
    }
    catch
    {
        Log-Info "Failed to filter test list. Error: $($_.exception)" -Type Warning
    }
}
# SIG # Begin signature block
# MIInngYJKoZIhvcNAQcCoIInjzCCJ4sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCQOSJ0lIovfGrp
# XlrMU6aaAFzN0n4e6Vv+JB77uTdXj6CCDYEwggX/MIID56ADAgECAhMzAAACzI61
# lqa90clOAAAAAALMMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NjAxWhcNMjMwNTExMjA0NjAxWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCiTbHs68bADvNud97NzcdP0zh0mRr4VpDv68KobjQFybVAuVgiINf9aG2zQtWK
# No6+2X2Ix65KGcBXuZyEi0oBUAAGnIe5O5q/Y0Ij0WwDyMWaVad2Te4r1Eic3HWH
# UfiiNjF0ETHKg3qa7DCyUqwsR9q5SaXuHlYCwM+m59Nl3jKnYnKLLfzhl13wImV9
# DF8N76ANkRyK6BYoc9I6hHF2MCTQYWbQ4fXgzKhgzj4zeabWgfu+ZJCiFLkogvc0
# RVb0x3DtyxMbl/3e45Eu+sn/x6EVwbJZVvtQYcmdGF1yAYht+JnNmWwAxL8MgHMz
# xEcoY1Q1JtstiY3+u3ulGMvhAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUiLhHjTKWzIqVIp+sM2rOHH11rfQw
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDcwNTI5MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAeA8D
# sOAHS53MTIHYu8bbXrO6yQtRD6JfyMWeXaLu3Nc8PDnFc1efYq/F3MGx/aiwNbcs
# J2MU7BKNWTP5JQVBA2GNIeR3mScXqnOsv1XqXPvZeISDVWLaBQzceItdIwgo6B13
# vxlkkSYMvB0Dr3Yw7/W9U4Wk5K/RDOnIGvmKqKi3AwyxlV1mpefy729FKaWT7edB
# d3I4+hldMY8sdfDPjWRtJzjMjXZs41OUOwtHccPazjjC7KndzvZHx/0VWL8n0NT/
# 404vftnXKifMZkS4p2sB3oK+6kCcsyWsgS/3eYGw1Fe4MOnin1RhgrW1rHPODJTG
# AUOmW4wc3Q6KKr2zve7sMDZe9tfylonPwhk971rX8qGw6LkrGFv31IJeJSe/aUbG
# dUDPkbrABbVvPElgoj5eP3REqx5jdfkQw7tOdWkhn0jDUh2uQen9Atj3RkJyHuR0
# GUsJVMWFJdkIO/gFwzoOGlHNsmxvpANV86/1qgb1oZXdrURpzJp53MsDaBY/pxOc
# J0Cvg6uWs3kQWgKk5aBzvsX95BzdItHTpVMtVPW4q41XEvbFmUP1n6oL5rdNdrTM
# j/HXMRk1KCksax1Vxo3qv+13cCsZAaQNaIAvt5LvkshZkDZIP//0Hnq7NnWeYR3z
# 4oFiw9N2n3bb9baQWuWPswG0Dq9YT9kb+Cs4qIIwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIZczCCGW8CAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAsyOtZamvdHJTgAAAAACzDAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgiI0tw0MD
# Q1LcgvKW/9FOTwFua+9baNrp4IXzGEcLOskwQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQB+itkOYu/5qE9ZcOY3bCRLz2+3V3uHs58TdZBKKvYC
# GVLl9FdTKlKrJejALSWvTV9GIuXaugPsNESsrb4orkxnlfjoFch7/oy1tacKUW4l
# sO6c6p/gcnEqyHyx6aoS9rZPT/A0VyDdqNecfoJKLeL6XBkG6AqKy/tUKnYnMi8C
# AJKLpamvIgsCDMcLAUTxzgltfUovEmKtKlSJ1/TU7mV5zx7Jp7zaF6MYriY5uAIL
# Aw9UQyCtOhog1VT/beiO535NRUK4haf5uz5PMbwcX/rlthpWVgIyOEKucB0XEBPE
# U1wE2yGmcLddQq80rZIyf8tEMpFMFLYD5XNgicgUxyKSoYIW/TCCFvkGCisGAQQB
# gjcDAwExghbpMIIW5QYJKoZIhvcNAQcCoIIW1jCCFtICAQMxDzANBglghkgBZQME
# AgEFADCCAVEGCyqGSIb3DQEJEAEEoIIBQASCATwwggE4AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIO0u7ewmON5xpJT++vM/i5pSBBlAiuFFXgX4jsqi
# zE9AAgZjIzcIoPkYEzIwMjIxMDEzMTAyODI2LjI5NVowBIACAfSggdCkgc0wgcox
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJTAjBgNVBAsTHE1p
# Y3Jvc29mdCBBbWVyaWNhIE9wZXJhdGlvbnMxJjAkBgNVBAsTHVRoYWxlcyBUU1Mg
# RVNOOjEyQkMtRTNBRS03NEVCMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFt
# cCBTZXJ2aWNloIIRVDCCBwwwggT0oAMCAQICEzMAAAGhAYVVmblUXYoAAQAAAaEw
# DQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwHhcN
# MjExMjAyMTkwNTI0WhcNMjMwMjI4MTkwNTI0WjCByjELMAkGA1UEBhMCVVMxEzAR
# BgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1p
# Y3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2Eg
# T3BlcmF0aW9uczEmMCQGA1UECxMdVGhhbGVzIFRTUyBFU046MTJCQy1FM0FFLTc0
# RUIxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0G
# CSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDayTxe5WukkrYxxVuHLYW9BEWCD9kk
# jnnHsOKwGddIPbZlLY+l5ovLDNf+BEMQKAZQI3DX91l1yCDuP9X7tOPC48ZRGXA/
# bf9ql0FK5438gIl7cV528XeEOFwc/A+UbIUfW296Omg8Z62xaQv3jrG4U/priArF
# /er1UA1HNuIGUyqjlygiSPwK2NnFApi1JD+Uef5c47kh7pW1Kj7RnchpFeY9MekP
# QRia7cEaUYU4sqCiJVdDJpefLvPT9EdthlQx75ldx+AwZf2a9T7uQRSBh8tpxPdI
# DDkKiWMwjKTrAY09A3I/jidqPuc8PvX+sqxqyZEN2h4GA0Edjmk64nkIukAK18K5
# nALDLO9SMTxpAwQIHRDtZeTClvAPCEoy1vtPD7f+eqHqStuu+XCkfRjXEpX9+h9f
# rsB0/BgD5CBf3ELLAa8TefMfHZWEJRTPNrbXMKizSrUSkVv/3HP/ZsJpwaz5My2R
# byc3Ah9bT76eBJkyfT5FN9v/KQ0HnxhRMs6HHhTmNx+LztYci+vHf0D3QH1eCjZW
# ZRjp1mOyxpPU2mDMG6gelvJse1JzRADo7YIok/J3Ccbm8MbBbm85iogFltFHecHF
# EFwrsDGBFnNYHMhcbarQNA+gY2e2l9fAkX3MjI7Uklkoz74/P6KIqe5jcd9FPCbb
# SbYH9OLsteeYOQIDAQABo4IBNjCCATIwHQYDVR0OBBYEFBa/IDLbY475VQyKiZSw
# 47l0/cypMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRY
# MFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01p
# Y3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEF
# BQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9w
# a2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAo
# MSkuY3J0MAwGA1UdEwEB/wQCMAAwEwYDVR0lBAwwCgYIKwYBBQUHAwgwDQYJKoZI
# hvcNAQELBQADggIBACDDIxElfXlG5YKcKrLPSS+f3JWZprwKEiASvivaHTBRlXtA
# s+TkadcsEei+9w5vmF5tCUzTH4c0nCI7bZxnsL+S6XsiOs3Z1V4WX+IwoXUJ4zLv
# s0+mT4vjGDtYfKQ/bsmJKar2c99m/fHv1Wm2CTcyaePvi86Jh3UyLjdRILWbtzs4
# oImFMwwKbzHdPopxrBhgi+C1YZshosWLlgzyuxjUl+qNg1m52MJmf11loI7D9HJo
# aQzd+rf928Y8rvULmg2h/G50o+D0UJ1Fa/cJJaHfB3sfKw9X6GrtXYGjmM3+g+Ah
# aVsfupKXNtOFu5tnLKvAH5OIjEDYV1YKmlXuBuhbYassygPFMmNgG2Ank3drEcDc
# ZhCXXqpRszNo1F6Gu5JCpQZXbOJM9Ue5PlJKtmImAYIGsw+pnHy/r5ggSYOp4g5Z
# 1oU9GhVCM3V0T9adee6OUXBk1rE4dZc/UsPlj0qoiljL+lN1A5gkmmz7k5tIObVG
# B7dJdz8J0FwXRE5qYu1AdvauVbZwGQkL1x8aK/svjEQW0NUyJ29znDHiXl5vLoRT
# jjFpshUBi2+IY+mNqbLmj24j5eT+bjDlE3HmNtLPpLcMDYqZ1H+6U6YmaiNmac2j
# RXDAaeEE/uoDMt2dArfJP7M+MDv3zzNNTINeuNEtDVgm9zwfgIUCXnDZuVtiMIIH
# cTCCBVmgAwIBAgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCB
# iDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMp
# TWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEw
# OTMwMTgyMjI1WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQ
# Q0EgMjAxMDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIh
# C3miy9ckeb0O1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNx
# WuJ+Slr+uDZnhUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFc
# UTE3oAo4bo3t1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAc
# nVL+tuhiJdxqD89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUo
# veO0hyTD4MmPfrVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyzi
# YrLNueKNiOSWrAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9
# fvzZnkXftnIv231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdH
# GO2n6Jl8P0zbr17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7X
# KHYC4jMYctenIPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiE
# R9vcG9H9stQcxWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/
# eKtFtvUeh17aj54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3
# FQEEBQIDAQABMCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAd
# BgNVHQ4EFgQUn6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEE
# AYI3TIN9AQEwQTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraW9wcy9Eb2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMI
# MBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMB
# Af8EBTADAQH/MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1Ud
# HwRPME0wS6BJoEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3By
# b2R1Y3RzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQRO
# MEwwSgYIKwYBBQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2Vy
# dHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4IC
# AQCdVX38Kq3hLB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pk
# bHzQdTltuw8x5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gng
# ugnue99qb74py27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3
# lbYoVSfQJL1AoL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHC
# gRlCGVJ1ijbCHcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6
# MhrZlvSP9pEB9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEU
# BHG/ZPkkvnNtyo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvsh
# VGtqRRFHqfG3rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+
# fpO+y/g75LcVv7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrp
# NPgkNWcr4A245oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHI
# qzqKOghif9lwY1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAsswggI0AgEBMIH4
# oYHQpIHNMIHKMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUw
# IwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjoxMkJDLUUzQUUtNzRFQjElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAG3F2jO4LEMVLwgKG
# XdYMN4FBgOCggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAObx9YowIhgPMjAyMjEwMTMxMDI1MTRaGA8yMDIyMTAx
# NDEwMjUxNFowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA5vH1igIBADAHAgEAAgIp
# DTAHAgEAAgIRyDAKAgUA5vNHCgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# ADTs7IMZkoqMwzXQtNJO9rsSWDXjB4nr4R3Z/747YF4nlf7rH3OH5amn9ZtXZqC1
# GeLTGjXLj745bW70j6/+GnGCeTCROx3HXalIycGiW03lv7J4YbjBhS1c1BaEnUSJ
# hDOO41k81BVdESagEE5YO6vx/eC/DPzy/SuAMpprYYHWMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGhAYVVmblUXYoAAQAA
# AaEwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgkmmqFhivEUYcIQsKGVknnqRsH18WJeCmNEfoUqYD
# FuswgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDrCFTxOoGCaCCCjoRyBe1J
# SQrMJeCCTyErziiJ347QhDCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAABoQGFVZm5VF2KAAEAAAGhMCIEIN7sZPIDrue/6nUcfuKcRwLQ
# n3vPjYZbteMKDulbkIX7MA0GCSqGSIb3DQEBCwUABIICACH/6KIOMcR1JsOZGVKU
# xIohZ1oW8Mw6ySG7/cHtYwemVo/Yoz0euoT2VLPkQsxUnqfE9wqar8WGZ7LQxS28
# gABOWYA3+/639kolCSDmf2jTmpEzDDv9CyH5ADfCTFTiCDwHyKPM0vXEVks2VZEO
# aSVcPAI8+eHsuNq4rdghOFvTu2GAYh3EF4nSh4OA67Rq4glg+GlK368oCrWNJc20
# XqpJd6052DJXWEz/SRVzkIES7MhLJTsPnDd/kNOXZaGqrVFfTUWJj9yTDaHuliLb
# VDdPiDC9kwejCqosmdHNnUJPivPxzHxUhHmQja3vrT5ecTof5Y7MNB4m4e861K8j
# sqDdDpBLVOf10iKamseMUO3sBSNiRlkly265dNLfcX0snBRf9Xji0xnUCZg1R73E
# jyIJWCV5NiWyY7c2E1faOhOQJDcCkcB+Gu0ufNc4OXKkYVAA7HpFiMuDj88zMTjW
# i6whQv26JCV9BeFlykq5Tk4P86V5DJNT1SmSXMpV2orNOHflvbFYFwDa5lp5TA6T
# Z8cwZs+7qNYiu+Hy6FMg21qk24SrTQndOPQWODZBrxdn4jE4+A5elpotkijBCyce
# NNL5P2EG4lq8jccXH4Ax8of+WXOsbm4OU3FIorydsvWDWYSrp2EX9tt9UWbSkAsL
# cfI82S2zLGDSJV15bwkLrBiJ
# SIG # End signature block