AzStackHciConnectivity/AzStackHci.Connectivity.psm1

<#############################################################
 # #
 # Copyright (C) Microsoft Corporation. All rights reserved. #
 # #
 #############################################################>


Import-Module $PSScriptRoot\AzStackHci.Connectivity.Helpers.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Utilities.psm1 -Force -DisableNameChecking -Global
Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lcTxt -FileName AzStackHci.Connectivity.Strings.psd1
function Invoke-AzStackHciConnectivityValidation
{
    <#
    .SYNOPSIS
        Perform AzStackHci Network Validation
    .DESCRIPTION
        Perform AzStackHci Network Validation against a mandatory set of endpoints.
    .EXAMPLE
        PS C:\> Invoke-AzStackHciConnectivityValidation
        Perform network validation against all built in service targets from localhost.
    .EXAMPLE
        PS C:\> $Credential = Get-Credential -Message "Credential for local cluster"
        PS C:\> Invoke-AzStackHciConnectivityValidation -Credential $Credential
        Perform network validation against all built in service targets from all cluster nodes of local system.
    .EXAMPLE
        PS C:\> Invoke-AzStackHciConnectivityValidation -Service 'Azure Kubernetes Service'
        Perform network validation against all mandatory targets and Azure Kubernetes targets from localhost.
    .EXAMPLE
        PS C:\> Invoke-AzStackHciConnectivityValidation -Include 'Windows Admin Center','Windows Admin Center in Azure Portal'
        Perform network validation against all mandatory targets, Windows Admin Center targets and Windows Admin Center in Azure Portal targets from localhost.
    .EXAMPLE
        PS C:\> Invoke-AzStackHciConnectivityValidation -Exclude 'Qualys','Arc For Servers'
        Perform network validation against all targets excluding Qualys & Arc for Servers from localhost.
    .EXAMPLE
        PS C:\> $Credential = Get-Credential -Message "Credential for $RemoteSystem"
        PS C:\> $RemoteSystemSession = New-PSSession -Computer 10.0.0.4 -Credential $Credential
        PS C:\> Invoke-AzStackHciConnectivityValidation -PsSession $RemoteSystemSession
        Perform network validation against all built in service target from pre-existing remote PS session.
    .EXAMPLE
        PS C:\> $RemoteSystem = 'node01.contoso.com'
        PS C:\> $Credential = Get-Credential -Message "Credential for $RemoteSystem"
        PS C:\> Invoke-AzStackHciConnectivityValidation -ComputerName $RemoteSystem -Credential $Credential
        Perform network validation against all built in service target from a remote system.
    .EXAMPLE
        PS C:\> Invoke-AzStackHciConnectivityValidation -RegionName EastUS -ARCGateway
        Perform network validation for ARCGateway support in EastUS region.
    .PARAMETER PsSession
        Specify the PsSession(s) used to validation from. If null the local machine will be used.
    .PARAMETER Service
        Specify the services to target for connectivity validation. (Aliases: Include)
    .PARAMETER OperationType
        Specify the Operation Type to target for connectivity validation. e.g. Deployment, Update, etc.
    .PARAMETER Exclude
        Specify the services to exclude for connectivity validation.
    .PARAMETER Proxy
        Specify proxy server.
    .PARAMETER ProxyCredential
        Specify proxy server credential.
    .PARAMETER CustomDefinitionUri
        Specify a Uri to retrieve a custom definition of endpoints to check.
    .PARAMETER RuntimeConnectivityTarget
        Specify runtime targets. Must contain DisplayName, Description, Service, Endpoint, Protocol, Severity, Remediation. e.g. @{'DisplayName'='Bing Home';'Description'='Bing Homepage';'Service'='Bing';'Endpoint'='bing.com';'Protocol'='HTTPS'; 'Severity'='CRITICAL'; 'Remediation' = 'https://aka.ms/myserviceconnnectionrequirements}
    .PARAMETER UseLocalDefinitionsOnly
        Retrieve endpoint definitions locally.
    .PARAMETER RegionName
        Specify the region name to target for connectivity validation.
    .PARAMETER ARCGatewayName
        Specify the ARC Gateway Name support to target for connectivity validation. It will be similar to contoso.gw.arc.azure.net, where contoso is unique for each gateway.
    .PARAMETER PassThru
        Return PSObject result.
    .PARAMETER OutputPath
        Directory path for log and report output.
    .PARAMETER CleanReport
        Remove all previous progress and create a clean report.
    .INPUTS
        Inputs (if any)
    .OUTPUTS
        Output (if any)
    .LINK
        https://docs.microsoft.com/en-us/azure-stack/hci/manage/use-environment-checker?tabs=connectivity
    .NOTES
        Mandatory Targets are always invoked, unless explicitly excluded. Use Get-AzStackHciConnectivityTarget | Select Service, Title, Mandatory, Endpoint for more information.
        File-based exclusions can be made by creating a file exlcudetests.txt in the root modules root folder (e.g. PSModulePath\AzStackHci.EnvironmentChecker\<version>).
        This file can support multiple exclusions for all validators e.g.
        --Start sample--
        Test-Processor
        Observability
        microsoftonline
        --End sample--
        This file would have the following affect. After any include/exclude filtering from the parameter inputs:
        Invoke-AzStackHciHardwareValidation would exclude Test-Processor in its tests
        Invoke-AzStackHciConnectivityValidation would exclude the Observability service AND any service target who's endpoints contains a match for microsoftonline.
    #>

    [CmdletBinding()]
    param (

        [Parameter(Mandatory = $false, HelpMessage = "Specify the PsSession(s) used to validation from. If null the local machine will be used.")]
        [System.Management.Automation.Runspaces.PSSession[]]
        $PsSession,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the services to target for connectivity validation.")]
        #[ArgumentCompleter({ Get-AzStackHciConnectivityServiceName })]
        [ValidateScript({ $_ -in (Get-AzStackHciConnectivityServiceName) })]
        [Alias("Include")]
        [string[]]
        $Service,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the Operation Type to target for connectivity validation. e.g. Deployment, Update, etc...")]
        #[ArgumentCompleter({ Get-AzStackHciConnectivityOperationName })]
        [ValidateScript({ $_ -in (Get-AzStackHciConnectivityOperationName) })]
        [string[]]
        $OperationType,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the services to exclude for connectivity validation.")]
        #[ArgumentCompleter({ Get-AzStackHciConnectivityServiceName })]
        [ValidateScript({ $_ -in (Get-AzStackHciConnectivityServiceName) })]
        [string[]]
        $Exclude,

        [Parameter(Mandatory = $false, HelpMessage = "Specify proxy server.")]
        [string]
        $Proxy,

        [Parameter(Mandatory = $false, HelpMessage = "Specify proxy server credential.")]
        [pscredential]
        $ProxyCredential,

        [Parameter(Mandatory = $false, HelpMessage = "Specify a Uri to retrieve a custom definition of endpoints to check.")]
        [system.uri]
        $CustomDefinitionUri,

        [Parameter(Mandatory = $false, HelpMessage = "Specify runtime targets. Must contain DisplayName, Description, Service, Endpoint, Protocol, Severity, Remediation. e.g. @{'DisplayName'='Bing Home';'Description'='Bing Homepage';'Service'='Bing';'Endpoint'='bing.com';'Protocol'='HTTPS'; 'Severity'='CRITICAL'; 'Remediation' = 'https://aka.ms/myserviceconnnectionrequirements}")]
        [psobject[]]
        $RuntimeConnectivityTarget,

        [Parameter(Mandatory = $false, HelpMessage = "Retrieve endpoint definitions locally.")]
        [switch]
        $UseLocalDefinitionsOnly,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the region name to target for connectivity validation.")]
        [string]
        $RegionName,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the ARC Gateway scenario")]
        [switch]
        $ARCGateway,

        [Parameter(Mandatory = $false, HelpMessage = "Return PSObject result.")]
        [switch]
        $PassThru,

        [Parameter(Mandatory = $false, HelpMessage = "Directory path for log and report output")]
        [string]$OutputPath,

        [Parameter(Mandatory = $false, HelpMessage = "Remove all previous progress and create a clean report")]
        [switch]$CleanReport = $false

    )

    try
    {
        $script:ErrorActionPreference = 'Stop'
        Set-AzStackHciOutputPath -Path $OutputPath

        Write-AzStackHciHeader -invocation $MyInvocation -params $PSBoundParameters -PassThru:$PassThru
        Test-ModuleUpdate -PassThru:$PassThru

        # Call/Initialise reporting
        $envcheckerReport = Get-AzStackHciEnvProgress -clean:$CleanReport
        $envcheckerReport = Add-AzStackHciEnvJob -report $envcheckerReport

        # Validate customdefinition
        if ($CustomDefinitionUri)
        {
            Validate-CustomDefinitionUri -Uri $CustomDefinitionUri
        }
        # Validate any runtime targets
        if ($RuntimeConnectivityTarget)
        {
            Validate-RuntimeConnectivityTarget -RuntimeConnectivityTarget $RuntimeConnectivityTarget
        }

        # Add ARCGateway to the list of targets
        if ( -not $ARCGateway)
        {
            # attempt to detect if the user is using the ARCGateway scenario
            $azcmagent =  "$env:ProgramW6432\AzureConnectedMachineAgent\azcmagent.exe"
            if (Test-Path $azcmagent)
            {
                Log-Info "Detected Azure Connected Machine Agent" -Type INFO
                $arcConnectionType =  & $azcmagent config get connection.type
                if ( $arcConnectionType -eq "gateway")
                {
                    $ARCGateway = $true
                }
            }
            else
            {
                Log-Info "Azure Connected Machine Agent not detected" -Type INFO
            }
        }

        # TO DO: Omit system?
        $gtParams = @{}
        if ($PSBoundParameters.ContainsKey('Service')) { $gtParams.Service = $Service }
        if ($PSBoundParameters.ContainsKey('OperationType')) { $gtParams.OperationType = $OperationType }
        if ($PSBoundParameters.ContainsKey('Uri')) { $gtParams.Uri = $CustomDefinitionUri }
        if ($PSBoundParameters.ContainsKey('RuntimeConnectivityTarget')) { $gtParams.RuntimeConnectivityTarget = $RuntimeConnectivityTarget }
        if ($PSBoundParameters.ContainsKey('LocalOnly')) { $gtParams.LocalOnly = $UseLocalDefinitionsOnly }
        if ($PSBoundParameters.ContainsKey('RegionName')) { $gtParams.RegionName = $RegionName }
        $ConnectivityTargets = Get-AzStackHciConnectivityTarget @gtParams -ARCGateway:$ARCGateway
        $ConnectivityTargets = Select-AzStackHciConnectivityTarget -Targets $ConnectivityTargets -Exclude $Exclude

        Write-Progress -Id 1 -Activity "Checking AzStackHci Dependancies" -Status "Environment configuration" -PercentComplete 0 -ErrorAction SilentlyContinue

        # Run validation
        $i = 0
        $webResult = @()
        $diagnosticResults = @()
        $skipTests = $false
        if ($PsSession)
        {
            # Collect proxy info before TLS inspection probe.
            # ARCGateway flag omits consistency checks because they are not applicable.
            $diagnosticResults += Get-ProxyDiagnostics -PsSession $PsSession -ARCGateway:$ARCGateway
            foreach ($Session in $PsSession)
            {
                if ($Session.State -ne 'Opened')
                {
                    try
                    {
                        Connect-PSSession -Session $Session
                    }
                    catch
                    {
                        $PsSessionFail = $lcTxt.PsSessionFail -f $Session.ComputerName, $_.Exception.Message
                        Log-Info ($PsSessionFail) -type Error
                        throw $PsSessionFail
                    }
                }
                $diagnosticResults += Test-Dns -PsSession $Session
                # DNS must succeed when user doesn't specify a proxy.
                # If user specifies proxy, we will continue with other diagnostic tests and
                # lower the severity of the dns test, because external resolution could be done by proxy.
                if ($diagnosticResults[-1].Status -ne 'SUCCESS')
                {
                    if ([string]::IsNullOrEmpty($PSBoundParameters['Proxy']))
                    {
                        throw ($lcTxt.DnsFail -f $Session.ComputerName, ($diagnosticResults[-1].AdditionalData.Detail -join "`r`n"))
                    }
                    else
                    {
                        Log-Info ($lcTxt.DnsDowngrade -f $Session.ComputerName) -Type Warning
                        $diagnosticResults[-1].Severity = 'WARNING'
                    }
                }
                if (($diagnosticResults | Where-Object Severity -eq Critical).Status -contains 'FAILURE')
                {
                    $failedDiagnosticResult = $diagnosticResults | Where-Object {$_.Status -EQ 'FAILURE' -and $_.Severity -eq 'CRITICAL'} | Format-List | Out-String
                    $failedDiagnosticDetailMsg = ($diagnosticResults | Where-Object {$_.Status -EQ 'FAILURE' -and $_.Severity -eq 'CRITICAL'} | Select-Object -ExpandProperty AdditionalData).Detail -join "`r`n"
                    Log-Info ($lcTxt.DiagnosticSystemFailure -f $failedDiagnosticDetailMsg, $failedDiagnosticResult) -Type Critical -ConsoleOut
                    $skipTests = $true
                }

                # Tolerance on SSL inspection: any success is good enough.
                $sslInspectionResults = @()
                $sslInspectionResults += Test-RootCA -PsSession $Session -Proxy $Proxy -ProxyCredential $ProxyCredential
                $diagnosticResults += $sslInspectionResults
                if ($sslInspectionResults.Status -notcontains 'SUCCESS')
                {
                    $failedDiagnosticResult = $sslInspectionResults | Where-Object {$_.Status -EQ 'FAILURE'} | Format-List | Out-String
                    $failedDiagnosticDetailMsg = ($sslInspectionResults | Where-Object {$_.Status -EQ 'FAILURE'} | Select-Object -ExpandProperty AdditionalData).Detail -join "`r`n"
                    Log-Info ($lcTxt.DiagnosticSystemFailure -f $failedDiagnosticDetailMsg, $failedDiagnosticResult) -Type Critical -ConsoleOut
                    $skipTests = $true
                }
            }
            if (-not $skipTests)
            {
                # Run connectivity tests
                $webResult += Invoke-WebRequestEx -Target $ConnectivityTargets -PsSession $PsSession -Proxy $Proxy -ProxyCredential $ProxyCredential
            }
        }
        else
        {
            $diagnosticResults += Test-Dns
            # DNS must succeed when user doesn't specify proxy.
            # If user specifies proxy, we will continue with other diagnostic tests and
            # lower the severity of the dns test, because external resolution could be done by proxy.
            if ($diagnosticResults[-1].Status -ne 'SUCCESS')
            {
                if ([string]::IsNullOrEmpty($PSBoundParameters['Proxy']))
                {
                    throw ($lcTxt.DnsFail -f $ENV:COMPUTERNAME, ($diagnosticResults[-1].AdditionalData.Detail -join "`r`n"))
                }
                else
                {
                    Log-Info ($lcTxt.DnsDowngrade -f $ENV:COMPUTERNAME) -Type Warning
                    $diagnosticResults[-1].Severity = 'WARNING'
                }
            }
            # ARCGateway flag omits consistency checks because they are not applicable.
            $diagnosticResults += Get-ProxyDiagnostics -ARCGateway:$ARCGateway
            if (($diagnosticResults | Where-Object Severity -eq Critical).Status -contains 'FAILURE')
            {
                $failedDiagnosticResult = $diagnosticResults | Where-Object {$_.Status -EQ 'FAILURE' -and $_.Severity -eq 'CRITICAL'} | Format-List | Out-String
                $failedDiagnosticDetailMsg = ($diagnosticResults | Where-Object {$_.Status -EQ 'FAILURE' -and $_.Severity -eq 'CRITICAL'} | Select-Object -ExpandProperty AdditionalData).Detail -join "`r`n"
                Log-Info ($lcTxt.DiagnosticSystemFailure -f $failedDiagnosticDetailMsg, $failedDiagnosticResult) -Type Critical -ConsoleOut
                $skipTests = $true
            }

            # Tolerance on SSL inspection: any success is good enough.
            $sslInspectionResults = @()
            $sslInspectionResults += Test-RootCA -Proxy $Proxy -ProxyCredential $ProxyCredential
            $diagnosticResults += $sslInspectionResults
            if ($sslInspectionResults.Status -notcontains 'SUCCESS')
            {
                $failedDiagnosticResult = $sslInspectionResults | Where-Object {$_.Status -EQ 'FAILURE'} | Format-List | Out-String
                $failedDiagnosticDetailMsg = ($sslInspectionResults | Where-Object {$_.Status -EQ 'FAILURE'} | Select-Object -ExpandProperty AdditionalData).Detail -join "`r`n"
                Log-Info ($lcTxt.DiagnosticSystemFailure -f $failedDiagnosticDetailMsg, $failedDiagnosticResult) -Type Critical -ConsoleOut
                $skipTests = $true
            }
            if (-not $skipTests)
            {
                # Run connectivity tests
                $webResult += Invoke-WebRequestEx -Target $ConnectivityTargets -Proxy $Proxy -ProxyCredential $ProxyCredential
            }
        }

        # Feedback results - user scenario
        if (-not $PassThru)
        {
            Write-Host 'Connectivity Results'
            $printed = @()
            $targetServices = $webresult.Tags.Service | Sort-Object | Get-Unique | Where-Object { $PSITEM -ne 'System' }
            Foreach ($targetService in $targetServices) {
                $thisResult = $webResult | Where-Object { $PSITEM -notin $printed -and $_.Tags.Service -EQ $targetService }
                Write-AzStackHciResult -Title $targetService -Result $thisResult
                $printed += $webResult | Where-Object Service -EQ $targetService
            }
            Write-AzStackHciResult -Title 'Diagnostics' -Result $diagnosticResults -Expand
            Write-Summary -Result $webResult -Property1 Source -Property2 Resource
            Write-FailedUrls -Result $webResult
        }
    }
    catch
    {
        Log-Info -Message "" -ConsoleOut
        Log-Info -Message "$($_.Exception.Message)" -ConsoleOut -Type Error
        Log-Info -Message "$($_.ScriptStackTrace)" -ConsoleOut -Type Error
        $cmdletException = $_
        throw $_.exception
    }
    finally
    {
        $Script:ErrorActionPreference = 'SilentlyContinue'
        # Write result to telemetry channel
        foreach ($r in ($webResult + $diagnosticResults))
        {
            Write-ETWResult -Result $r
        }
        # Write validation result to report object and close out report
        $envcheckerReport | Add-Member -MemberType NoteProperty -Name 'Connectivity' -Value $webResult -Force
        $envcheckerReport | Add-Member -MemberType NoteProperty -Name 'Diagnostics' -Value $diagnosticResults -Force
        $envcheckerReport = Close-AzStackHciEnvJob -report $envcheckerReport
        Write-AzStackHciEnvReport -report $envcheckerReport
        Write-AzStackHciFooter -invocation $MyInvocation -Exception $cmdletException -PassThru:$PassThru
        Remove-Variable -Name AzStackHciConnectivityTargets -Scope GLOBAL -ErrorAction SilentlyContinue
        if ($PassThru)
        {
            Write-Output ($webResult + $diagnosticResults)
        }
    }
}
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBGGTIaXiKRrRwS
# GYaMFegJj93n82ZxHkOrX5VSU//a/qCCDXYwggX0MIID3KADAgECAhMzAAADrzBA
# DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA
# hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG
# 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN
# xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL
# go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB
# tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd
# mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ
# 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY
# 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp
# XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn
# TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT
# e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG
# OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O
# PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk
# ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx
# HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt
# CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIAecd+EsA1I3fbj8JBUDCebZ
# cxtqXcvB+3Zl/OapWXxrMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAqwG4vPFSpreUBtqJFXq7wIlpqzYLb9maGN40S0GW+FSAVPl6B7otbENa
# HDJwE0ZnvPvK04MttrEHXY6tmK2rBc70h43eOqF55MoPGX2Mx8hOIVm0+PYggB5a
# 1xydS1PE1lwVRDZDsvkMtdmfK91TVrvUO39H9eRFHPwfzo4Xm/rdCZM5rHxb0lNd
# I0rZgKv8tTj+cxxWKwx0MuhiwCHm9YOTKB19tUHsQilwSvEFgspso9PRtW6vQG+u
# 0Q5AXw/XxnW7JHNoxqvU3dSZXoKIqkv6b1CVsvQXNn7ji4arwggdTs5bw+RjHRYS
# KPVwWbOdylappQJfRhVRDtW5OijO8KGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBGwqLaru7s0uIbekAm/YuBBShMV2gLhjAglO4jd+cH8QIGZr4keQMw
# GBMyMDI0MDgxOTE3MjczNy4yNTJaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAeqaJHLVWT9hYwABAAAB6jANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1
# MzBaFw0yNTAzMDUxODQ1MzBaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC1C1/xSD8gB9X7Ludoo2rWb2ksqaF65QtJkbQpmsc6
# G4bg5MOv6WP/uJ4XOJvKX/c1t0ej4oWBqdGD6VbjXX4T0KfylTulrzKtgxnxZh7q
# 1uD0Dy/w5G0DJDPb6oxQrz6vMV2Z3y9ZxjfZqBnDfqGon/4VDHnZhdas22svSC5G
# HywsQ2J90MM7L4ecY8TnLI85kXXTVESb09txL2tHMYrB+KHCy08ds36an7IcOGfR
# mhHbFoPa5om9YGpVKS8xeT7EAwW7WbXL/lo5p9KRRIjAlsBBHD1TdGBucrGC3TQX
# STp9s7DjkvvNFuUa0BKsz6UiCLxJGQSZhd2iOJTEfJ1fxYk2nY6SCKsV+VmtV5ai
# PzY/sWoFY542+zzrAPr4elrvr9uB6ci/Kci//EOERZEUTBPXME/ia+t8jrT2y3ug
# 15MSCVuhOsNrmuZFwaRCrRED0yz4V9wlMTGHIJW55iNM3HPVJJ19vOSvrCP9lsEc
# EwWZIQ1FCyPOnkM1fs7880dahAa5UmPqMk5WEKxzDPVp081X5RQ6HGVUz6ZdgQ0j
# cT59EG+CKDPRD6mx8ovzIpS/r/wEHPKt5kOhYrjyQHXc9KHKTWfXpAVj1Syqt5X4
# nr+Mpeubv+N/PjQEPr0iYJDjSzJrqILhBs5pytb6vyR8HUVMp+mAA4rXjOw42vkH
# fQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFCuBRSWiUebpF0BU1MTIcosFblleMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAog61WXj9+/nxVbX3G37KgvyoNAnuu2w3H
# oWZj3H0YCeQ3b9KSZThVThW4iFcHrKnhFMBbXJX4uQI53kOWSaWCaV3xCznpRt3c
# 4/gSn3dvO/1GP3MJkpJfgo56CgS9zLOiP31kfmpUdPqekZb4ivMR6LoPb5HNlq0W
# bBpzFbtsTjNrTyfqqcqAwc6r99Df2UQTqDa0vzwpA8CxiAg2KlbPyMwBOPcr9hJT
# 8sGpX/ZhLDh11dZcbUAzXHo1RJorSSftVa9hLWnzxGzEGafPUwLmoETihOGLqIQl
# Cpvr94Hiak0Gq0wY6lduUQjk/lxZ4EzAw/cGMek8J3QdiNS8u9ujYh1B7NLr6t3I
# glfScDV3bdVWet1itTUoKVRLIivRDwAT7dRH13Cq32j2JG5BYu/XitRE8cdzaJmD
# VBzYhlPl9QXvC+6qR8I6NIN/9914bTq/S4g6FF4f1dixUxE4qlfUPMixGr0Ft4/S
# 0P4fwmhs+WHRn62PB4j3zCHixKJCsRn9IR3ExBQKQdMi5auiqB6xQBADUf+F7hSK
# ZfbA8sFSFreLSqhvj+qUQF84NcxuaxpbJWVpsO18IL4Qbt45Cz/QMa7EmMGNn7a8
# MM3uTQOlQy0u6c/jq111i1JqMjayTceQZNMBMM5EMc5Dr5m3T4bDj9WTNLgP8SFe
# 3EqTaWVMOTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCJ
# 2x7cQfjpRskJ8UGIctOCkmEkj6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6m3oojAiGA8yMDI0MDgxOTE1NTIw
# MloYDzIwMjQwODIwMTU1MjAyWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDqbeii
# AgEAMAcCAQACAiEzMAcCAQACAhOmMAoCBQDqbzoiAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAAuqaF0Gd/uvZJe61Gg34TZlVT6h6WlqRLF8NShLyp7BsEV8
# dpAT36iVAHsGP4l/HgkZyyKGS/IwfP6sd7chM4mc2vtinRxRt6cOXxuXG+7344TB
# vNbiUNjprAmL5GNIJNA6PuxN178NtIkjI0KmdgBlz16gfbVxHJ4WufkolEdckinD
# mh5lZTxu/70DFSxwvyzSS4pepIe8QfU40FnvpLDGJ46l2rKA0ORJ4HUkRJsckHOG
# IZvg1azMMxZSbwYvIRKqdJJRUr6wDkFrpChEhEDnSw8VjR2TIdQgDQ1EkkzDQj2Q
# 7qG4B1EUHdEGexzzVf1k+bLkRm4nhD2aXJUGltcxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAeqaJHLVWT9hYwABAAAB6jAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCC6vZVf2iNCdoiMVZGyGH8e2wdVNM29NZX8eiu3pB/xlzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EICmPodXjZDR4iwg0ltLANXBh5G1u
# KqKIvq8sjKekuGZ4MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHqmiRy1Vk/YWMAAQAAAeowIgQgXvdiIM9vT01PVCsc13iBnh1QpSxl
# gvwZiNS3+CfOp7EwDQYJKoZIhvcNAQELBQAEggIANYXPYcbU+kU/7xw8fVtmxbG8
# fgzyTgN/H77bbE3scwp2NzTZiLOQim2WOwMnjhsnnofst9+uV7XpHp6Cw5YALkdH
# SxeIYFVH37mtrjRVPsPTA+ewWFA/DqV/WLXQlrl7EyP86zISL9uN8+ut4jPfzLQb
# bFKDyg1e7uKe8ryV0pfeCeMqcIIUV4mPv/XWDXCBsqgZ2GzP4O6cI4t8/ljLbVAi
# YMeeO1JdzroF0sBLvGG+VAaStlG6GWQobtKpkybOrIIPLIpSarkO0dxAkbA3Pea8
# 5xwty+p6YGNP4zR06UgOSj3cNaHksgw+nKWNXaTNGKMkE8wuvBA3l3JvF2n7S16l
# 62C3ucLcc4SKstIMU5rF2LkSoMwemyZ5EAnv8seaN+IEW2xBmZ8DOvfgLx7DNnus
# q7neFV4hOmk+N2R+c0skqVXmuUwoEJ+E5VsXc7C+L6mxhwJtSsQkIyD2h5SgEIhZ
# oMf9p5rFJwQhFgOahj+ijvN0OypcncT5jtfUn1xTUYEx5yS8CWIJMwiyArcehkDG
# GDf5xsJ1BGTUG/ynXd5UC3zsV2y+jElyVOMC/SDwQSjlE9whOVy++cjEc08drtEI
# t/fFSDuO4QcUyoYCDlmZMIuNbBmt5C9nzaZ68XA6nBnNLaN/ytdIEiNnbLQ9E38R
# 4p/ETA8Fuf6mpuHOd/8=
# SIG # End signature block