AzStackHci.EnvironmentChecker.Utilities.psm1
Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.PortableUtilities.psm1 -Force -DisableNameChecking -Global Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1 function Test-ModuleUpdate { <# .SYNOPSIS Checks PSGallery for updated module. .DESCRIPTION Checks PSGallery for updated module and gives user 10 seconds to cancel cmdlet and prints update instructions to screen #> param([switch]$PassThru) try { if (-not $PassThru) { $thisVersion = (Get-PSCallStack | Where-Object Command -like 'Invoke-AzstackHci*Validation').InvocationInfo.MyCommand.Version Log-Info ("Looking for module updates for AzStackHci.EnvironmentChecker greater than {0}" -f [system.string]$thisVersion) $ModuleOnline = Find-Module -Name AzStackHci.EnvironmentChecker -Repository PSGallery -ErrorAction SilentlyContinue if ([system.version]$($ModuleOnline.Version -replace ('-preview', '')) -gt $thisVersion) { Log-Info ($lTxt.UpdateToVersion -f $ModuleOnline.Version, $ModuleOnline.Name) -ConsoleOut Start-Sleep -Seconds 10 } else { Log-Info ($lTxt.CurrentVersion -f 'AzStackHci.EnvironmentChecker', [system.string]$thisVersion) } } } catch { Log-Info ($lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message) -Type Error } } function Test-Count { [CmdletBinding()] param ( [CimInstance[]] $CimData, [int] $minimum, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique $instanceId = "Machine: $serverName, Class: $ClassName" if ($CimData.Count -lt $minimum) { $status = 'FAILURE' $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum Log-Info $detail -Type $Severity } else { $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum $status = 'SUCCESS' } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Count' -f $ValidatorName, $className Title = 'Test {0} Count' -f $className DisplayName = 'Test {0} Count {1}' -f $className, $serverName Severity = $Severity Description = 'Checking {0} count' -f $className Tags = @{} Remediation = 'https://aka.ms/hci-envch' TargetResourceID = $instanceId TargetResourceName = $instanceId TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$ClassName Count" Resource = $CimData.count Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } catch { throw $_ } } function Test-InstanceCountByGroup { <# .SYNOPSIS Test if count matches across groups #> [CmdletBinding()] param ( [CimInstance[]] $CimData, [string[]] $GroupProperty, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { $GroupValues = $cimData | Group-Object -Property $groupProperty | Select-Object -ExpandProperty Name $nodeCount = @($cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique).count foreach ($GroupValue in $GroupValues) { foreach ($group in $GroupProperty) { $gData = $CimData | Where-Object $Group -eq $GroupValue if ($gData.CimSystemProperties.SystemName.Count -eq 1) { $serverName = $gData.CimSystemProperties.SystemName } else { $serverName = 'AllServers' } $className = $gData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $groupData = $gData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } } $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique # The count of InstanceCounts must equal the number of servers to ensure each server has at least 1 instance # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, but SVR3 could have 5 disks of type A. # There should be only 1 unique InstanceCount from all values to ensure each server has the same instance count # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, SVR3 has 6 disks of type A. $Status = if ($groupData.InstanceCount.Count -ne $nodeCount -or $groupDataCount.Count -gt 1 ) { 'FAILURE' } else { 'SUCCESS' } $groupDataString = ($groupData | ForEach-Object { "{0}: {1} x {2}" -f $_.Name, $GroupValue, $_.InstanceCount }) -join ', ' $dtl = $lTxt.CountByGroup -f $className, $group, $groupDataString if ($status -eq 'SUCCESS') { Log-Info $dtl } else { Log-Info $dtl -Type Warning } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Instance_Count_ByGroup' -f $ValidatorName, $className Title = 'Test {0} Properties' -f $className DisplayName = 'Test {0} Properties {1}' -f $className, $ServerName Severity = $Severity Description = 'Checking all servers have same {0} instance count by group' -f $className Tags = @{} Remediation = 'https://aka.ms/hci-envch' TargetResourceID = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue" TargetResourceName = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue" TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = $serverName Resource = $ClassName Detail = $dtl Status = $Status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } } catch { throw $_ } } function Test-GroupProperty { <# .SYNOPSIS Test if properties match across groups #> [CmdletBinding()] param ( [CimInstance[]] $CimData, [string[]] $GroupProperty, [string[]] $MatchProperty, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { # Group by name and compare properties within each group $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $ServerName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique $groupedData = @($CimData | Group-Object -Property $groupProperty) $returnResult = @() if ($serverName.Count -gt 1) { $serverName = 'AllServers' } $returnResult += foreach ($group in $groupedData) { $instanceId = "Machine: {0}, Class: {1} Group: {2}" -f $ServerName, $className, $group.Name $groupName = $group.Name $detail = $null if ($group.Count -gt 1) { foreach ($propertyName in $matchProperty) { # Using Select-Object -Unique to get unique values because Get-Unique doesn't work with null and empty values if (($group.Group.$propertyName | Select-Object -Unique).Count -gt 1) { $status = 'FAILURE' $detail = $lTxt.MismatchProp -f $className, $propertyName, ("'{0}'" -f ($group.Group.$propertyName -join "', '")) Log-Info -Message $detail -Type Warning } else { $detail = $lTxt.MatchProp -f $className, $propertyName, ($group.Group.$propertyName -join ', ') $status = 'SUCCESS' } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Group_Consistency' -f $ValidatorName, $className Title = 'Test {0} Grouped by {1} has consistent {2} property values' -f $className, $groupName, $propertyName DisplayName = 'Test {0} Grouped by {1} has consistent {2} property values {3}' -f $className, $groupName, $propertyName, $ServerName Severity = $Severity Description = 'Checking {0} Grouped by {1} for consistent {2} property' -f $className, $groupName, $propertyName Tags = @{} Remediation = 'https://aka.ms/hci-envch' TargetResourceID = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue, Property: $propertyName" TargetResourceName = "Machine: $ServerName, Class: $ClassName, Group: $GroupValue, Property: $propertyName" TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$serverName, $ClassName, $groupName, $propertName" Resource = ($group.Group.$propertyName -join "', '") Detail = $detail Status = $Status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } } $returnResult } catch { throw $_ } } function Test-InstanceCount { <# .SYNOPSIS Test if instance count matches across instances #> [CmdletBinding()] param ( [Parameter()] [CimInstance[]] $CimData, [Parameter()] [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity, [Parameter()] [string] $NamePostFix ) if ($CimData.CimSystemProperties.SystemName.Count -eq 1) { $serverName = $CimData.CimSystemProperties.SystemName } else { $serverName = 'AllServers' } $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $InstanceId = "Machine: $ServerName, Class: $ClassName" $groupData = $cimData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } } $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique $status = if ($groupDataCount.Count -gt 1) { 'FAILURE' } else { 'SUCCESS' } $groupDataString = ($groupData | ForEach-Object { "{0}: {1}" -f $_.Name, $_.InstanceCount }) -join ',' if ($NamePostFix) { $Name = 'AzStackHci_{0}_Test_{1}_{2}_Instance_Count' -f $ValidatorName, $className, $NamePostFix $Description = 'Checking all servers have same {0} {1} instance count' -f $className, $NamePostFix $dtl = $lTxt.InstanceCount -f $ClassName, "($NamePostFix) ", $groupDataString } else { $Name = 'AzStackHci_{0}_Test_{1}_Instance_Count' -f $ValidatorName, $className $Description = 'Checking all servers have same {0} instance count' -f $className $dtl = $lTxt.InstanceCount -f $ClassName, $NamePostFix, $groupDataString } if ($Status -eq 'SUCCESS') { Log-Info $dtl } else { Log-Info $dtl -Type Warning } $params = @{ Name = $Name Title = 'Test {0} Properties' -f $className DisplayName = 'Test {0} Properties {1}' -f $className, $serverName Severity = $Severity Description = $Description Tags = @{} Remediation = 'https://aka.ms/hci-envch' TargetResourceID = $InstanceId TargetResourceName = $InstanceId TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = $serverName Resource = $ClassName Detail = $dtl Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } function Test-PropertySync { <# .SYNOPSIS Test if properties match across instances #> [CmdletBinding()] param ( [Parameter()] [CimInstance[]] $CimData, [Parameter()] [string[]] $MatchProperty, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { $returnResult = @() $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique if ($serverName.Count -gt 1) { $serverName = 'AllServers' $returnResult += Test-InstanceCount -CimData $CimData -Severity $Severity -ValidatorName $ValidatorName } $instanceId = "Machine: $ServerName, Class: $ClassName, Instance: All" $returnResult += if ($CimData.Count -gt 1) { foreach ($propertyName in $matchProperty) { # Using Select-Object -Unique to get unique values because Get-Unique doesn't work with null and empty values if (($CimData.$propertyName | Select-Object -Unique).Count -gt 1) { $status = 'FAILURE' $detail = $lTxt.MismatchProp -f $className, $propertyName, ("'{0}'" -f ($CimData.$propertyName -join "', '")) Log-Info -Message $detail -Type Warning } else { $detail = $lTxt.MatchProp -f $className, $propertyName, ($CimData.$propertyName -join ',') $status = 'SUCCESS' } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Property_{2}_Consistency' -f $ValidatorName, $className, $propertyName Title = 'Test {0} Property {1}' -f $className, $propertyName DisplayName = 'Test {0} Property {1} {2}' -f $className, $propertyName, $ServerName Severity = $Severity Description = 'Checking all {0} for consistent {1} property' -f $className, $propertyName Tags = @{} Remediation = 'https://aka.ms/hci-envch' TargetResourceID = $InstanceId TargetResourceName = $InstanceId TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$className`: $propertyName" Resource = $CimData.$propertyName -join ',' Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } return $returnResult } catch { throw $_ } } function Test-DesiredProperty { <# .SYNOPSIS Test if properties have required value #> [cmdletbinding()] param ( [CimInstance[]] $cimData, [hashtable] $desiredPropertyValue, [string] $InstanceIdStr, [string] $ValidatorName, [validateset('CRITICAL','WARNING','INFORMATIONAL','Hidden')] [string] $Severity ) try { # Test properties $returnResult = @() $returnResult += foreach ($instance in $cimData) { $serverName = $instance.CimSystemProperties.ServerName | Sort-Object | Get-Unique $className = $instance.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $sb = ([scriptblock]::Create($InstanceIdStr)) $instanceId = Invoke-Command -ScriptBlock $sb Log-Info -Message ($lTxt.Test -f $className, $instanceId) foreach ($propertyName in $desiredPropertyValue.Keys) { $detail = $null $passed = $false $hint = $null $diagProp = $null $desiredPropertyValueCheck = $null $desiredPropertyValueCheck = if ($desiredPropertyValue.$propertyName -is [hashtable]) { $desiredPropertyValue.$propertyName.Value } else { $desiredPropertyValue.$propertyName } $instancePropertyValue = $instance.$propertyName | Select-Object -First 1 if ($instancePropertyValue -notin $desiredPropertyValueCheck) { # Try to add additional diagnostic property if ($desiredPropertyValue.$propertyName.DiagnosticProperty) { $diagProp = ' ({0}: {1})' -f $desiredPropertyValue.$propertyName.DiagnosticProperty, ($instance.$($desiredPropertyValue.$propertyName.DiagnosticProperty) | Select-Object -First 1) } $status = 'FAILURE' $hint = if ($desiredPropertyValue.$propertyName.hint) { ' ({0})' -f $desiredPropertyValue.$propertyName.hint } $detail = $lTxt.UnexProp -f $className, $propertyName, $instancePropertyValue, ($desiredPropertyValueCheck -join ','), $hint, $diagProp Log-Info -Message $detail -Type Warning } else { $status = 'SUCCESS' $detail = $lTxt.Prop -f $className, $propertyName, $instancePropertyValue, ($desiredPropertyValueCheck -join ','), $hint } $params = @{ Name = 'AzStackHci_{0}_Test_{1}_Instance_Property_{2}' -f $ValidatorName, $className, $propertyName Title = 'Test {0} Property {1}' -f $className, $propertyName DisplayName = 'Test {0} Property {1} {2}' -f $className, $propertyName, $ServerName Severity = $Severity Description = 'Checking {0} for property {1} has desired value' -f $className, $propertyName Tags = @{} Remediation = 'https://aka.ms/hci-envch' TargetResourceID = $InstanceId TargetResourceName = $InstanceId TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = $status AdditionalData = @{ Source = "$className`: $propertyName" Resource = if ($hint) { "$($instancePropertyValue)$hint" } else { $instancePropertyValue } Detail = $detail Status = $status TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } return $returnResult } catch { throw $_ } } function Get-TestCount { param ( [Parameter()] [string] $ModuleName, [Parameter()] [string] $CommandPrefix ) try { $command = Get-Command -Name $CommandPrefix* -Module $ModuleName if ($command) { return $command.Count } else { return 1 } } catch { return 1 } } function Test-CimData { param ( $Data, $ClassName ) $systemNames = $Data.ComputerName | Sort-Object | Get-Unique $testResult = foreach ($systemName in $systemNames) { $sData = $Data.CimData | Where-Object { $_.CimSystemProperties.ServerName -eq $systemName } if ($sData.count -eq 0) { $params = @{ Name = 'AzStackHci_Hardware_Test_{0}' -f $className Title = "Test $ClassName API" DisplayName = "Test $ClassName API $systemName" Severity = 'CRITICAL' Description = "Checking $ClassName has CIM data" Tags = @{} Remediation = 'https://aka.ms/hci-envch' TargetResourceID = "Machine: $systemName, Class: $ClassName" TargetResourceName = "Machine: $systemName, Class: $ClassName" TargetResourceType = $className Timestamp = [datetime]::UtcNow Status = 'FAILURE' AdditionalData = @{ Source = $systemName Resource = 'Null' Detail = "Unable to retrieve data for $ClassName on $systemName" Status = 'FAILURE' TimeStamp = [datetime]::UtcNow } HealthCheckSource = $ENV:EnvChkrId } New-AzStackHciResultObject @params } } return $testResult } function Get-DeploymentData { [cmdletbinding()] param ($Path) try { $Json = Get-Content -Path $Path | ConvertFrom-Json $DeploymentData = $json.ScaleUnits[0].DeploymentData if ([string]::IsNullOrEmpty($DeploymentData)) { Log-Info $lTxt.InvalidDeploymentData -Type Warning return $null } return $DeploymentData } catch { throw $_ } } function Get-TestListByFunction { <# .SYNOPSIS Retrieve list of tests for a given validator .DESCRIPTION Tests should be prefixed with Test- and reside in a "helpers" module #> [CmdletBinding()] param ( [Parameter()] [string] $prefix = 'Test-*', [Parameter()] [string] $ModuleName ) try { $script:envchktestList = Get-Command -Name $prefix -Module $ModuleName | Select-Object -ExpandProperty Name Write-Debug -Message "Retrieving list of tests for $($validator.Command): $($script:envchktestList -join ',')" -verbose return $script:envchktestList } catch { Write-Debug -Message "Failed to retrieve test list. Error $($_.exception)" -Verbose } } function Select-TestList { <# .SYNOPSIS Filter Testlist by Include, Exclude and File based exclusions .DESCRIPTION Include replaces complete list, exclude is applied and file based exclusions are removed by regex. #> [CmdletBinding()] param ( [Parameter()] [string[]] $TestList, [Parameter()] [string[]] $Include, [Parameter()] [string[]] $Exclude, [Parameter()] [string] $FilePath = "$PsScriptRoot\ExcludeTests.txt" ) try { $returnList = @($TestList) if ($include) { $returnList = $Include Log-Info "Setting tests to $($include -join ',')" } if ($exclude) { Log-Info "Removing tests $($exclude -join ',')" $returnList = $returnList | Select-String -Pattern $exclude -NotMatch } if ($returnList.count -eq 0) { throw "No tests to perform after filtering" } if (Test-Path -Path $FilePath) { $fileExclusion = Get-Content -Path $FilePath Log-Info "Reading exclusion file $FilePath" -ConsoleOut Log-Info "Applying file exclusions: $($fileExclusion -join ',')" -ConsoleOut $returnList = $returnList | Select-String -Pattern $fileExclusion -NotMatch } Log-Info "Test list: $($returnList -join ',')" if ($returnList.Count -eq 0) { Log-Info -Message "No tests to run." -ConsoleOut -Type Warning break noTestsBreak } return $returnList } catch { Log-Info "Failed to filter test list. Error: $($_.exception)" -Type Warning } } function Set-TrustedHosts { [CmdletBinding()] param ( [Parameter()] [string[]] $Nodes ) $trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value foreach ($node in $nodes) { if ('*' -notin $TrustedHosts -and ($node -notin $TrustedHosts.Split(','))) { Log-Info "Adding $node to TrustedHosts" Set-Item WSMan:\localhost\Client\TrustedHosts -Value $node -Concatenate -Force } else { Log-Info "TrustedHosts already matches $node. Continuing." } } } function Get-IsProxyEnabled { $line1, $line2, $line3, $JsonLines = netsh winhttp show advproxy $proxy = $JsonLines | ConvertFrom-Json -ErrorAction SilentlyContinue Log-Info "Proxy Enabled: $([bool]$proxy.Proxy)" Log-Info "Proxy Output:" Log-Info "$($proxy | Format-Table | Out-String)" [bool]$proxy.Proxy } Export-ModuleMember -Function Get-DeploymentData Export-ModuleMember -Function Get-IsProxyEnabled Export-ModuleMember -Function Get-TestCount Export-ModuleMember -Function Get-TestListByFunction Export-ModuleMember -Function Select-TestList Export-ModuleMember -Function Set-TrustedHosts Export-ModuleMember -Function Test-Count Export-ModuleMember -Function Test-DesiredProperty Export-ModuleMember -Function Test-GroupProperty Export-ModuleMember -Function Test-InstanceCount Export-ModuleMember -Function Test-InstanceCountByGroup Export-ModuleMember -Function Test-ModuleUpdate Export-ModuleMember -Function Test-PropertySync Export-ModuleMember -Function Test-CimData # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAFQK6QJsWhOfsA # K0kwTfTNcu1I7rnSnLf51aDlP74hXKCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0 # Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz # NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo # DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3 # a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF # HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy # 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC # Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj # L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp # h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3 # cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X # dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL # E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi # u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1 # sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq # 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb # DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/ # V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICeF+36p2pliwaESW0trzRqw # bfxvzO7nfGBmOXPl/rLBMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAGVm9T8q3D+Nt7lPgMMTb+FzDRP1Guih8jq/3qtZTo3QcEcTK0CT7RMS1 # d4BjlvdSaFRQLw9rq9ZGmWXsLf20MZHAZJnjsdKRoaY1YEJf7VOjzbD06iEIP9i9 # NxvAilit8BijOjUqO54y3djeRRbdCLi3nT/z9xvcYlsHpxnJYRacALzhoPzQEbLr # u29x0d8+Q3FV9d53toBiFUnO5iGNaUMZJy/fN0LmaGqeeY2l1Rshhn7e7q5C/T2B # poGd31/IQg7nydyM7BLmUgleFzVIbynD+a4vdWevU+M/na7Knf45UvDWBQCq8Ow1 # AJAMNU2y6B11n8SZpNL9qDpw+EtKdKGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBOM20iHru9mFWv3Gqrpby15MXF+FDWsKYp3+c7c7200QIGZ0pOXz4i # GBMyMDI0MTIwNDE1MDM1NC4yNDNaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAACAdFFWZgQzEJPAAEAAAIBMA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEyMloXDTI1MTAyMjE4MzEyMlowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU1MUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtWrf+HzDu7sk50y5YHhe # CIJG0uxRSFFcHNek+Td9ZmyJj20EEjaU8JDJu5pWc4pPAsBI38NEAJ1b+KBnlStq # U8uvXF4qnEShDdi8nPsZZQsTZDKWAgUM2iZTOiWIuZcFs5ZC8/+GlrVLM5h1Y9nf # Mh5B4DnUQOXMremAT9MkvUhg3uaYgmqLlmYyODmba4lXZBu104SLAFsXOfl/TLhp # ToT46y7lI9sbI9uq3/Aerh3aPi2knHvEEazilXeooXNLCwdu+Is6o8kQLouUn3Kw # UQm0b7aUtsv1X/OgPmsOJi6yN3LYWyHISvrNuIrJ4iYNgHdBBumQYK8LjZmQaTKF # acxhmXJ0q2gzaIfxF2yIwM+V9sQqkHkg/Q+iSDNpMr6mr/OwknOEIjI0g6ZMOymi # vpChzDNoPz9hkK3gVHZKW7NV8+UBXN4G0aBX69fKUbxBBLyk2cC+PhOoUjkl6UC8 # /c0huqj5xX8m+YVIk81e7t6I+V/E4yXReeZgr0FhYqNpvTjGcaO2WrkP5XmsYS7I # vMPIf4DCyIJUZaqoBMToAJJHGRe+DPqCHg6bmGPm97MrOWv16/Co6S9cQDkXp9vM # SSRQWXy4KtJhZfmuDz2vr1jw4NeixwuIDGw1mtV/TdSI+vpLJfUiLl/b9w/tJB92 # BALQT8e1YH8NphdOo1xCwkcCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSwcq9blqLo # PPiVrym9mFmFWbyyUjAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAOjQAyz0cVztT # FGqXX5JLRxFK/O/oMe55uDqEC8Vd1gbcM28KBUPgvUIPXm/vdDN2IVBkWHmwCp4A # Icy4dZtkuUmd0fnu6aT9Mvo1ndsLp2YJcMoFLEt3TtriLaO+i4Grv0ZULtWXUPAW # /Mn5Scjgn0xZduGPBD/Xs3J7+get9+8ZvBipsg/N7poimYOVsHxLcem7V5XdMNsy # tTm/uComhM/wgR5KlDYTVNAXBxcSKMeJaiD3V1+HhNkVliMl5VOP+nw5xWF55u9h # 6eF2G7eBPqT+qSFQ+rQCQdIrN0yG1QN9PJroguK+FJQJdQzdfD3RWVsciBygbYaZ # lT1cGJI1IyQ74DQ0UBdTpfeGsyrEQ9PI8QyqVLqb2q7LtI6DJMNphYu+jr//0spr # 1UVvyDPtuRnbGQRNi1COwJcj9OYmlkFgKNeCfbDT7U3uEOvWomekX60Y/m5utRcU # PVeAPdhkB+DxDaev3J1ywDNdyu911nAVPgRkyKgMK3USLG37EdlatDk8FyuCrx4t # iHyqHO3wE6xPw32Q8e/vmuQPoBZuX3qUeoFIsyZEenHq2ScMunhcqW32SUVAi5oZ # 4Z3nf7dAgNau21NEPwgW+2wkrNqDg7Hp8yHyoOKbgEBu6REQbvSfZ5Kh4PV+S2gx # f2uq6GoYDnlqABOMYwz309ISi0bPMh8wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # Tjo1NTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUA1+26cR/yH100DiNFGWhuAv2rYBqggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOr6u24wIhgPMjAyNDEyMDQxMTI4NDZaGA8yMDI0MTIwNTExMjg0NlowdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6vq7bgIBADAKAgEAAgIImAIB/zAHAgEAAgIS # wTAKAgUA6vwM7gIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAjre22eLiR # Mk05fotenMM3FWsRMcZmFUI9MVH63b/2d+99t7PYa9F5AYgtPgzyWMsHCoCBOlPG # s5qW+S/dpC/3Oi9LRD9xlq40qi+RfiAouvkSqtoxTexg7G9ZxfPEO1sL76wYSj68 # XLpx9rPMbrobVazqsLurKs4lAwvXVD0h9Z/BoMp4NYCGO1qWWaCoBe2CGwWsP0VF # T/S3kYYN3dd6w+m7qp66F1jsun/+8fScFDecTos08y+8fXO/j7ZCp2/cuVs03/yo # drPxM9oxMnBHihD0c4/GYV7GMlHhJNT2l5ngaTQjsHaxtM6GO0ejunSJfMSoeCq0 # 0h4P3dPx2OjLMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAIB0UVZmBDMQk8AAQAAAgEwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg6PaXRs/g # 1NVNbxUkVoWaa8FhqPCfwMTK0JrC08RY/RYwgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCBYa7I6TJQRcmx0HaSTWZdJgowdrl9+Zrr0pIdqHtc4IzCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAACAdFFWZgQzEJPAAEA # AAIBMCIEIE3Za3MF9Mitjv1qgnB6yFwUY+ESLx0pz7rWCXxURWMWMA0GCSqGSIb3 # DQEBCwUABIICAJBnVialD28Olv9bvC/HG7MJ9lcJ2YNewjwDIRqvP6MZgd4UkPkU # 81HNB4NF5tmoZbsrjB/SEAF3Gu05HUfkPy5hKkVAWE/pKtMrlKtHZcbgjIAs56tF # aRcEYpUT1b6xga8qjf623eg39yqgJyaNFbzn9w98d57jPnxWxqba9niJXoiHe/jO # 0eTDzcffaADpz4BY/feiVjECRP3jP44/nUINmp+paYT/vbOMy63Q4Ub9Nrbbmvo+ # HQzy+/lyxsCVbCEV57iESIsUbCNFNgKONYl0+05Bb+YMKrHIpYS7i1R8ngVK/QQD # rde4XK0FSSPKdVqEnPi21/aWBRt0GX8FUGbnqWQvmUXIRJnhTr9Gck0/21jj+y+A # +v2/hNqgale8RYM5lUKl4TrGsMXP6DASsMz2NuGrxMaOob8KyP2OIjRgXiDnxhKb # GW6ARwdVLy3tq4YGn1L3t5XIn/hFypEUYUXrfeSXke5G8DCLraKXAiXzehamFZkV # yx3SyFHFSW+zgI8/MMaXpcLt/AqTE2bbztSmcrMP/s+ZFMZTJ6TacJMD85aLpcaW # nqWJ7LUPeGZUpwO1X+RkEUR9fOA6+c18jsbEOyDUeNwjzN1qseo97n0FxnGnSKGC # iobjEQZGwTxVoewQ8QKXRgldIkaCSngPkuRUMm6WbD1nrVgzZbsko3Tb # SIG # End signature block |