Obs/bin/ObsDep/content/Powershell/Common/StorageHelpers.psm1

<###################################################
 # #
 # Copyright (c) Microsoft. All rights reserved. #
 # #
 ##################################################>


Import-Module $PSScriptRoot\Tracer.psm1 -DisableNameChecking
Import-Module $PSScriptRoot\ClusterHelpers.psm1 -DisableNameChecking

<#
 .Synopsis
  A helper funtion to convert a unprocessed share path (e.g. '{Infrastructure_2}\CloudMedia\Images\en-us') to its absolute file path.
 
  By default, it will convert to the local path for a cluster node to access locally.
    e.g. C:\ClusterStorage\Infrastructure_2\Shares\SU1_Infrastructure_2\CloudMedia\Images\en-us.
 
    e.g. \\v-host1\C$\ClusterStorage\Infrastructure_2\Shares\SU1_Infrastructure_2\CloudMedia\Images\en-us.
    If the $FromNoneClusterNode switch parameter is on, it will convert to the administrative share to the a cluster node for a none cluster machine to access remotely.
#>

function Get-SharePath {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [AllowEmptyString()]
        [string]
        $UnprocessedPath,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName,
        [Parameter(Mandatory = $False)]
        [switch]
        $UseCurrentVersion,
        [Parameter(Mandatory = $False)]
        [switch]
        $FromNoneClusterNode
    )

    # Add support for optionally writing {LatestVersion} string in to the library share paths
    $escapedLatestVersionPattern = [regex]::escape("{LatestVersion}")
    if ($UnprocessedPath -Match $escapedLatestVersionPattern)
    {
        Import-Module $PSScriptRoot\..\Roles\Common\RoleHelpers.psm1 -DisableNameChecking -Verbose:$false | Out-Null

        # Calculate the latest version from input parameters
        $version = Get-InProgressUpdateVersion -Parameters $Parameters
        if ($UseCurrentVersion -or ($version -eq $null))
        {
            $version = ([string]($Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.Version)).Trim()
        }

        $UnprocessedPath = $UnprocessedPath -replace $escapedLatestVersionPattern, $version
    }

    if ($UnprocessedPath -NotMatch "{.*}")
    {
        throw [System.ArgumentException] "Invalid path input: replace token not found. Path: $UnprocessedPath"
    }

    $replaceToken = [regex]::match($UnprocessedPath,'{([^}]*)}').Groups[1].Value

    # If path contains {DefaultLocalShare} or {DefaultClusterShare}, we need to look up cloud role for getting the defaults
    if ($replaceToken -eq "DefaultLocalShare")
    {
        $sharePath = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare
    }
    elseif ($replaceToken -eq "DefaultClusterShare")
    {
        $replaceToken = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultClusterShare
        $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
    }
    else
    {
        $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
    }

    if ($FromNoneClusterNode)
    {
        $activeNode = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $ClusterName | select -First 1
        $sharePath = $sharePath -replace 'C:', "\\$activeNode\c$"
    }

    $result = $UnprocessedPath -replace "{[^}]*}", $sharePath
    Trace-Execution "Get-SharePath: $UnprocessedPath -> $result"

    return $result
}

function Get-SharePathVersions {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [AllowEmptyString()]
        [string]
        $UnprocessedPath,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName
    )
    $result = [System.Collections.ArrayList]::new()
    $escapedLatestVersionPattern = [regex]::escape("{LatestVersion}")
    if ($UnprocessedPath -Match $escapedLatestVersionPattern)
    {
        if ($UnprocessedPath -NotMatch "{.*}")
        {
            throw [System.ArgumentException] "Invalid path input: replace token not found. Path: $UnprocessedPath"
        }
        $replaceToken = [regex]::match($UnprocessedPath,'{([^}]*)}').Groups[1].Value

        # If path contains {DefaultLocalShare} or {DefaultClusterShare}, we need to look up cloud role for getting the defaults
        if ($replaceToken -eq "DefaultLocalShare")
        {
            $sharePath = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare
        }
        elseif ($replaceToken -eq "DefaultClusterShare")
        {
            $replaceToken = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultClusterShare
            $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
        }
        else
        {
            $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
        }

        $basePath = $UnprocessedPath.Substring(0,$UnprocessedPath.IndexOf($escapedLatestVersionPattern))
        $basePath = $basePath -replace "{[^}]*}", $sharePath
        $versionFolders = Get-ChildItem -Path $basePath | where {$_.Name -match '\d+(?:\.\d+)+'} | where {$_.Name -notmatch '\s+'}
        foreach($versionFolder in $versionFolders){
            $UnprocessedPath = $UnprocessedPath
            $path = $UnprocessedPath -replace $escapedLatestVersionPattern, $versionFolder.Name -replace "{[^}]*}", $sharePath
            $result.Add($path) | Out-Null
        }
    }
    return $result
}

<#
 .Synopsis
  Return the local path for an cluster shared infrastructure volume
#>

Function Get-ClusterShare {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName,
        [Parameter(Mandatory = $True)]
        [ValidateSet("Infrastructure", "Infrastructure_2", "Infrastructure_3")]
        [string]
        $ShareType
    )
    # Temporary transition for Bug 15836892: Change CloudMedia content location from Infrastructure_2 to Infrastructure_1
    if ($ShareType -eq "Infrastructure_2")
    {
        $ShareType = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultClusterShare
        Trace-Warning "Resolving {Infrastructure_2} as {DefaultClusterShare} as temporary workaround.Bug 15836892"
    }

    $storageServerPrefix = $Parameters.Roles["Cluster"].PublicConfiguration.Clusters.Node | Where-Object Name -eq $ClusterName | Select-Object -ExpandProperty StorageServerPrefix
    $shareObject = $Parameters.Roles["Storage"].PublicConfiguration.PublicInfo.Shares.Share | Where-Object Type -eq $ShareType

    if (-not $shareObject)
    {
        throw [System.ArgumentException] "Invalid input: the cluster $ClusterName storage role contains no configuration for a share of type $ShareType."
    }

    $volumeName = $shareObject.Name
    $shareName = "${storageServerPrefix}_$($shareObject.Name)"

    $fullLocalPath = "C:\ClusterStorage\$volumeName\Shares\$shareName"

    return $fullLocalPath
}

function Test-LocalHostHasClusterStoragePath
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    Trace-Execution "Testing for presence of local CSV path on this node."
    Test-Path "C:\ClusterStorage"
}

function Get-LocalCsvPathFromSharePath
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $UNCSharePath,

        [Parameter(Mandatory = $false)]
        [string]
        $ClusterName
    )

    $ErrorActionPreference = "Stop"
    Trace-Execution "Getting local CSV path for share path $UNCSharePath on cluster $ClusterName."
    $pathParts = $UNCSharePath.Split("\")

    # Share path will look like \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\WindowsUpdates\1.0.170925.1
    $smbShareName = $pathParts[3]

    if (-not $ClusterName)
    {
        $ClusterName = Get-ManagementClusterName $Parameters
    }
    $smbShare = Invoke-Command -ComputerName $ClusterName -ScriptBlock { Get-SmbShare | where Name -eq $using:smbShareName }

    if (-not $smbShare)
    {
        throw "An SMB share with the name '$smbShareName' could not be found on $ClusterName."
    }

    Trace-Execution "Found SMB share $smbShareName with local CSV path $($smbShare.Path)."
    return (Join-Path $smbShare.Path ($pathParts[4..$pathParts.Count] -join "\"))
}

<#
 .Synopsis
  Returns the name of the management cluster
#>

function Get-ManagementClusterName
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    $publicInfo = $Parameters.Roles["Cluster"].PublicConfiguration
    $clusterName = $publicInfo.Clusters.Node | ? IsManagementCluster -eq "true" | Select-Object -ExpandProperty "Name"

    return $clusterName
}

<#
 .Synopsis
  Returns the host names of the management cluster
#>

function Get-ManagementClusterNodes
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    $managementClusterName = Get-ManagementClusterName $Parameters

    $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration
    $hostNames = @($physicalMachinesRole.Nodes.Node | ? RefClusterId -eq $managementClusterName | % Name)

    return $hostNames
}

<#
 .Synopsis
  Returns the RefClusterId of the Node
#>

function Get-NodeRefClusterId
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $RoleName,

        [Parameter(Mandatory = $true)]
        [string]
        $NodeName
    )

    $ErrorActionPreference = "Stop"

    $node = $Parameters.Roles[$RoleName].PublicConfiguration.Nodes.Node | ? Name -ieq $NodeName
    $clusterName = $node.RefClusterId

    return $clusterName
}

<#
 .Synopsis
  Returns the RefNodeId of the Node
#>

function Get-NodeRefNodeId
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $RoleName,

        [Parameter(Mandatory = $true)]
        [string]
        $NodeName
    )

    $ErrorActionPreference = "Stop"

    $node = $Parameters.Roles[$RoleName].PublicConfiguration.Nodes.Node | ? Name -ieq $NodeName
    return $node.RefNodeId
}

<#
 .Synopsis
  A replacement for Test-Path:
 
  1. differentiate file non-existence vs unexpected situlation such as location not accessible / share unavailability
     this cmdlet will return False on file non-existence; and throw the insider exception on other unexpected situlation
  2. optional retry feature, so that less random error will occure with logic like `if (-not test-path $Path) { throw "not found"}`
#>

function Test-PathStrict
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [string[]]
        $Path,

        [Parameter(Mandatory=$false)]
        [ValidateSet("Any", "Container", "Leaf")]
        [string] $PathType = 'Any',

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryCount = 0,

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryIntervalInSeconds = 60,

        [Parameter(Mandatory=$false)]
        [switch] $NoRetryOnItemNotFound = $false

    )

    $ErrorActionPreference = "Stop"
    $unexpectedException = $null
    for ($i = 0; $i -le $RetryCount; $i += 1) {
        if ($i -gt 0) {
            Start-Sleep -Seconds $RetryIntervalInSeconds
        }
        try {
            $r = dir -Path $Path
            if ($PathType -ieq 'Leaf') {
                if ($r.GetType().Name -ne 'FileInfo') {
                    throw "Path exists for $Path, however PathType not match (expected: Leaf, actual: Container)"
                }
            } elseif ($PathType -ieq 'Container') {
                if ($r.GetType().Name -eq 'FileInfo') {
                    throw "Path exists for $Path, however PathType not match (expected: Container, actual: Leaf)"
                }
            }
            return $true
        }
        catch {
            # `dir` will throw a single ItemNotFoundException when the folder/file doesn't exists but filesystem/smb-share is accessible & well connected
            # otherwise, UnauthorizedAccessException or other exception will be thrown together with ItemNotFoundException
            if ($_.length -eq 1 -and $_[0].Exception.GetType().Name -eq 'ItemNotFoundException') {
                if ($NoRetryOnItemNotFound) {
                    return $false
                }
                $unexpectedException = $null
            } else {
                $unexpectedException = $_
            }
        }
    }
    if ($unexpectedException -ne $null) {
        throw $unexpectedException;
    }
    return $false
}
<#
 .Synopsis
  A safe replacement for Test-Path, compare to Test-PathStrict:
 
  1. it doesn't retry on ItemNotFound
  2. during unexpected situlation (transient SMB connection issue), it by-default retry once after 60 seconds; then if the exception doesn't recover, it do the actual throwing
#>

function Test-PathSafe
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [string[]]
        $Path,

        [Parameter(Mandatory=$false)]
        [ValidateSet("Any", "Container", "Leaf")]
        [string] $PathType = 'Any',

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryCount = 1,

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryIntervalInSeconds = 60
    )
    $ErrorActionPreference = "Stop"
    return (Test-PathStrict -Path $Path -PathType $PathType -RetryCount $RetryCount -RetryIntervalInSeconds $RetryIntervalInSeconds -NoRetryOnItemNotFound)
}

Export-ModuleMember -Function Get-ClusterShare
Export-ModuleMember -Function Get-LocalCsvPathFromSharePath
Export-ModuleMember -Function Test-LocalHostHasClusterStoragePath
Export-ModuleMember -Function Get-ManagementClusterName
Export-ModuleMember -Function Get-ManagementClusterNodes
Export-ModuleMember -Function Get-NodeRefClusterId
Export-ModuleMember -Function Get-NodeRefNodeId
Export-ModuleMember -Function Get-SharePath
Export-ModuleMember -Function Get-SharePathVersions
Export-ModuleMember -Function Test-PathSafe

# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAWn7c0ZzmLURGf
# yTwwYAsS+F/3Et3x2D6YP8Zd3GHSpqCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID8bZRwnDE4PWPGY+g4V1+2J
# ovqkinr9botFrwL/oh+2MEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAOXuOJMAsjg86CeHzyy9X6a4EBFJ/WSvU3YZOaR75gzSQfQlxu/s3YXVL
# YCcXSSS7GEQr5M7G4NrLrT2rNTKsqTzk2rG34ViKrIPYlPrs4DF8tSlGTiBGZTe/
# mWiFMxS3SziBkjoMghoWO8Ria447PhhhYRi1N1o5qKuVzAPZqpn6vrn7QigXxqeF
# mHZSYyyEr2Wipx/OvyLcCyMjnSjqMcPCL9e1hQLZfMyDjpiy3cuuzkUBH115HRt4
# BX/Sc0YBLbcCzEzOveiUQZy/IwEhxP6vC9KYOklQFszXMJODdrQYY5+ieRbb/Kmf
# SfE7qwSy5ICDKbta9gYtjHjPYMxMs6GCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAuXI4dH+35uFXINYhwFwoH6Yx/3+B/sRV9d0gdH6uhIwIGZr4kzeMK
# GBMyMDI0MDgyMjE5MDY0MC4yNzFaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6nHdIjAiGA8yMDI0MDgyMjE1NTIw
# MloYDzIwMjQwODIzMTU1MjAyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqcd0i
# AgEAMAcCAQACAhKRMAcCAQACAhPjMAoCBQDqcy6iAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBABMbt+NmEk4C9A9SFKVyW0vqNkWNYO81Q4BFWmMCNo4pNIvw
# llWz2bCvoQtL1nN6GW2x/gXatgsoHI3O+WYam6P5zaEdmaHBNWyJnZmjonLIGuhN
# pmZ2zXGacjftecfd0H4zCWn+vBbzYxADqYdQn/5i1ZuiUDYDZEuzqcmOwFWavoG2
# +rKpsDnI2cL92C8rVVGF9iYwJn0j+rVWfJUyQCQ+hofqBMNp808gBrmpQMcNzWBf
# cLOfm9lML77iZTO83UFXpMWyv0Cu+rTlY41Uf6HM67msQb2I93ozUDxktwFctMdq
# vJm2492Y8kk1QS/rDIFOZPO9cscLYqtUwDaHbdoxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCAu/VigGEg4zxkX9G36em1wblUYAoPDYmPKWLaEUpt3bDCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u
# KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgU0p/NmZBn7C4uqVgJSY4U8hmjtme
# NtMIdxJgDOPNKGgwDQYJKoZIhvcNAQELBQAEggIATfYu+zyaiZHFwTHILC13JoEW
# sjWuMkxO8S7p+lAmYnedRvJoO9zV15TlnWetQjpr0FgtFYtZFL6VE5lXZbaC7SAb
# XyRkS6vpQpQVLVHLWXrtzPf+9BtrJNjV7y3s1odHtGxhkg9Cc+pd0pZc7KaW5l1o
# Bsf3bGB5pucSYsr64kzRGwX6eVdEEtu/QSBuPwZgoX/KvAn+HIhj9oiwalfA3toh
# oy+HHC4wdXi8HMhHh7eFYw69fCwg3BxmLZ+esaodWsKSEjxw3wxIGbNg8O9I4Dy9
# BSCf4o8FgPHHBOC525bo/+x3glHbqaIpcT+y2hef9oMlmxjWwwGi+pkM6TlG6TCp
# Wi63Jz5cPiyZzAl4L6nghyt2FQMKQVjTnfEIxUBnXsLxMY335YdtoBUTS9sC1pct
# VhMGM3owKNLWEPZroit6QBNTr6J3ezx+oUbtfHewFwRYjDQcXa3zLqfmf3XDmBow
# UMdc6G1xx8N4VT16TpAmtGmLYctJal+aOVjb2rOZK+4CAvyFME499G0/xPDwpL+N
# iHT8t28kU9BjsZQW7hWPTjjTFu5GFGvqdgPPhled1OBeOrLN1dRNdmD44AcQZWiG
# IUXFLQtqz/bR6Tkt2BSjq+1tMUhlRMHon7nojstf9lq9vAXQX5yDLMhdBx5uioYQ
# py3G3GxpKKQLoeBzfqk=
# SIG # End signature block