commands/Add-VITrustedCertificate.ps1

using module VMware.PowerCLI.Sdk.Types
using module VMware.PowerCLI.VCenter.Types.CertificateManagement
using namespace VMware.VimAutomation.ViCore.Types.V1
using namespace VMware.VimAutomation.ViCore.Types.V1.Inventory
using namespace System.Security.Cryptography.X509Certificates
using namespace VMware.VimAutomation.Sdk.Util10Ps.BaseCmdlet

. (Join-Path $PSScriptRoot "../utils/Connection.ps1")
. (Join-Path $PSScriptRoot "../types/builders/New-TrustedCertificateInfo.ps1")

<#
.SYNOPSIS
 
This cmdlet adds a certificate or certificate chain to the vCenter Server or ESXi trusted stores.
 
.DESCRIPTION
 
This cmdlet adds a certificate or certificate chain to the vCenter Server or ESXi trusted stores.
 
To use this cmdlet, you must connect to vCenter Server through the Connect-VIServer cmdlet.
 
Note: The certificate or certificate chain will be added to both the vCenter Server instance and the connected ESXi hosts unless you use the VCenterOnly or EsxOnly parameters.
 
.PARAMETER PemCertificateOrChain
 
Specifies a certificate or certificate chain in PEM format to be added to the vCenter Server and/or ESXi trusted stores.
 
.PARAMETER X509Certificate
 
Specifies a certificate as an X509Certificate object to be added to the vCenter Server and/or ESXi trusted stores.
 
.PARAMETER X509Chain
 
Specifies a certificate chain as an X509Chain object to be added to the vCenter Server and/or ESXi trusted stores.
 
.PARAMETER VMHost
 
Specifies one or more ESXi hosts to whose trusted stores you want to add the certificate or certificate chain.
 
.PARAMETER VCenterOnly
 
Specifies that the certificate or certificate chain must be added only to the trusted store of the vCenter Server instance.
 
.PARAMETER EsxOnly
 
Specifies that the certificate or certificate chain must be added only to the trusted store of the ESXi hosts.
 
 
.EXAMPLE
PS C:\> $caPem = Get-Content ca.pem -Raw
PS C:\> Add-VITrustedCertificate -PemCertificateOrChain $caPem
 
Adds the certificate from ca.pem to the trusted certificate stores of the vCenter Server and all the ESXi hosts connected to the vCenter system.
 
 
.EXAMPLE
PS C:\> $caPem = Get-Content ca.pem -Raw
PS C:\> Add-VITrustedCertificate -PemCertificateOrChain $caPem -VCenterOnly
 
Adds the certificate from ca.pem to the trusted certificate store of the vCenter Server system.
 
 
.EXAMPLE
PS C:\> $caPem = Get-Content ca.pem -Raw
PS C:\> Add-VITrustedCertificate -PemCertificateOrChain $caPem -EsxOnly
 
Adds the certificate from ca.pem to the trusted certificate stores of the ESXi hosts of the vCenter Server system, but not to the vCenter itself.
 
 
.EXAMPLE
PS C:\> $caPem = Get-Content ca.pem -Raw
PS C:\> Add-VITrustedCertificate -VMHost 'MyHost' -PemCertificateOrChain $caPem
 
Adds the certificate from ca.pem to the trusted certificate store of the 'MyHost' ESXi host.
 
 
.OUTPUTS
 
[ViMachineCertificateInfo]
 
 
.LINK
 
https://developer.vmware.com/docs/powercli/latest/vmware.powercli.vcenter/commands/add-vitrustedcertificate
 
#>

function Add-VITrustedCertificate {
   [CmdletBinding(
      ConfirmImpact = "High",
      DefaultParameterSetName = "Default",
      SupportsShouldProcess = $True)]
   [OutputType([ViMachineCertificateInfo])]
   Param (
      [Parameter(ValueFromPipeline = $true)]
      [String[]]
      $PemCertificateOrChain,

      [Parameter()]
      [X509Certificate[]]
      $X509Certificate,

      [Parameter()]
      [X509Chain[]]
      $X509Chain,

      [Parameter(Mandatory = $true, ParameterSetName = "PerEsx")]
      [ObnArgumentTransformation([VMHost])]
      [VMHost[]]
      $VMHost,

      [Parameter(Mandatory = $true, ParameterSetName = 'VCenterOnly')]
      [switch]
      $VCenterOnly,

      [Parameter(Mandatory = $true, ParameterSetName = 'EsxOnly')]
      [switch]
      $EsxOnly,

      [Parameter()]
      [ObnArgumentTransformation([VIServer], Critical = $true)]
      [VIServer]
      $Server
   )

   Begin {
      # Handle Server obn first
      if($Server) {
         $resolvedServer = Resolve-ObjectByName `
            -Object $Server `
            -Type ([VIServer]) `
            -OneObjectExpected

         $Server = [VIServer] $resolvedServer
      }

      $activeServer = GetActiveServer($Server)
      ValidateApiVersionSupported -server $activeServer -major 7 -minor 0
      $apiServer = GetApiServer($activeServer)

      # Collect OBN for parameter 'VMHost'
      if($VMHost) {
         $resolvedVMHost = Resolve-ObjectByName -Object $VMHost `
            -Type ([VMHost]) `
            -CollectorCmdlet 'Get-VMHost' `
            -OneOrMoreObjectsExpected `
            -Server $activeServer

         $VMHost = [VMHost[]] $resolvedVMHost
      }

      # Validate that only one of:
      # PemCertificateOrChain
      # X509Certificate
      # X509Chain
      # is present

      $counter = 0
      if ($PemCertificateOrChain) {
         $PemCertificateOrChain | Confirm-PemContainsCertificates
         $counter += 1
      }

      if ($X509Certificate) {
         $counter += 1
      }

      if ($X509Chain) {
         $counter += 1
      }

      if ($counter -eq 0) {
         Write-PowerCLIError `
            -ErrorObject 'One of the parameters PemCertificateOrChain, X509Certificate or X509Chain must be supplied.' `
            -Terminating
      } elseif ($counter -gt 1) {
         Write-PowerCLIError `
            -ErrorObject 'Only one of the parameters PemCertificateOrChain, X509Certificate or X509Chain must be supplied.' `
            -Terminating
      }
   }

   Process {
      # Validate all objects are from the same server
      if($VMHost) {
         $VMHost | ValidateSameServer -ExpectedServer $activeServer
      }

      $updateVc = $PsCmdlet.ParameterSetName -eq 'Default' -or `
         ($PsCmdlet.ParameterSetName -eq 'VCenterOnly' -and $VCenterOnly.ToBool())

      $updateEsx = $PsCmdlet.ParameterSetName -eq 'Default' -or `
         ($PsCmdlet.ParameterSetName -eq 'EsxOnly' -and $EsxOnly.ToBool())

      if ($updateEsx) {
         $tempVMHost = Get-VMHost -Server $activeServer
         if ($tempVMHost) {
            $VMHost = $tempVMHost
         }
      }

      $pemCertArray = [System.Collections.ArrayList]::new()

      if ($PemCertificateOrChain) {
         $PemCertificateOrChain | Read-PemCertificate | % {
            $pemCertArray.Add($_) | Out-Null
         }
         if ($pemCertArray.Count -eq 0) {
            Write-PowerCLIError `
               -ErrorObject 'No certificate found in the PemCertificateOrChain.' `
               -ErrorId "PowerCLI_VITrustedCertificate_NoCertificateFoundInPemCertificateOrChain"
         }
      } elseif ($X509Certificate) {
         $X509Certificate | ConvertTo-PemCertificate | % {
            $pemCertArray.Add($_) | Out-Null
         }
      } elseif ($X509Chain) {
         $X509Chain | % { $_.ChainElements } | % {
            ConvertTo-PemCertificate -X509Certificate $_.Certificate
         } | % {
            $pemCertArray.Add($_) | Out-Null
         }
         if ($pemCertArray.Count -eq 0) {
            Write-PowerCLIError `
               -ErrorObject 'No certificates found in the X509Chain' `
               -ErrorId "PowerCLI_VITrustedCertificate_NoCertificateFoundInx509Chain"
         }
      }

      if ($pemCertArray.Count -gt 0) {
         $vcName = ''
         if ($updateVc) {
            $vcName = $activeServer.Name
         }

         $shouldProcessDescription = Get-ShouldProcessMessage $pemCertArray $vcName ($VMHost | Select-Object -ExpandProperty Name)
         $shouldProcessWarning = Get-ShouldProcessMessage $pemCertArray $vcName ($VMHost | Select-Object -ExpandProperty Name) -warning

         if($PSCmdlet.ShouldProcess(
            $shouldProcessDescription,
            $shouldProcessWarning,
            "Add certificate")) {

            if ($updateVc) {
               try {
                  $trustedChainIds =
                     $pemCertArray | % {
                        Initialize-CertificateManagementX509CertChain -CertChain ([string[]]@($_))
                     } | `
                     Initialize-CertificateManagementVcenterTrustedRootChainsCreateSpec | `
                     Invoke-CreateCertificateManagementTrustedRootChains `
                        -Server $apiServer `
                        -ErrorAction:Stop

                  Get-VITrustedCertificate `
                     -Id ($trustedChainIds | % {
                        $UidUtil.Append($activeServer.Uid, "ViTrustedCertificate", $_)
                     }) | `
                     Write-Output
               } catch {
                  Write-PowerCLIError `
                     -ErrorObject $_ `
                     -ErrorId "PowerCLI_VITrustedCertificate_FailedToAddVcTrustChains"
               }
            }

            if ($VMHost) {
               foreach ($currentVMHost in $VMHost) {
                  try {
                     $certificateManager = Get-View $currentVMHost.ExtensionData.ConfigManager.CertificateManager -Server $activeServer
                     $addingCertificatesThumbprints = [System.Collections.ArrayList]::new()
                     $trustedCertificates = [System.Collections.ArrayList]::new()

                     $pemCertArray | % {
                        $trustedCertificates.Add($_) | Out-Null
                        $_ | ConvertTo-X509Certificate | %{
                           $addingCertificatesThumbprints.Add($_.Thumbprint) | Out-Null
                        }
                     }

                     $currentTrustedCertificates = $certificateManager.ListCACertificates()
                     if ($currentTrustedCertificates) {
                        $trustedCertificates.AddRange($currentTrustedCertificates)
                     }

                     $certificateManager.ReplaceCACertificatesAndCRLs(
                        $trustedCertificates.ToArray(), $null) | Out-Null

                     Get-ViTrustedCertificate -Id ($addingCertificatesThumbprints | % {
                        $UidUtil.Append($currentVMHost.Uid, "ViTrustedCertificate", $_)
                     })
                  } catch {
                     Write-PowerCLIError `
                        -ErrorObject $_ `
                        -ErrorId "PowerCLI_VITrustedCertificate_FailedToAddEsxTrustChains"
                  }
               }
            }
         }
      }
   }
}

function Read-PemCertificate {
   param(
      [Parameter(ValueFromPipeline = $true)]
      [string]
      $pem
   )

   $beginStr = '-----BEGIN CERTIFICATE-----'
   $endStr = '-----END CERTIFICATE-----'
   $beginIndex = $pem.IndexOf($beginStr)
   while ($beginIndex -ge 0) {
      $endIndex = $pem.IndexOf($endStr, $beginIndex)
      if ($endIndex -gt $beginIndex) {
         $pem.Substring($beginIndex, $endIndex + $endStr.Length - $beginIndex) | Write-Output
         $beginIndex = $pem.IndexOf($beginStr, $endIndex)
      } else {
         Write-PowerCLIError `
            -ErrorObject @"
The PEM:
---------------------------
$pem
---------------------------
Contains '$beginStr' with missing '$endStr'.
"@
 `
            -ErrorId 'PowerCLI_VITrustedCertificate_MissingEndCertificate'
         # END CERTIFICATE not found no need to continue
         break
      }
   }
}

function Get-ShouldProcessMessage {
   param(
      [string[]]
      $pem,

      [string]
      $vcName,

      [string[]]
      $hostName,

      [switch]
      $warning
   )

   $sb = [System.Text.StringBuilder]::new()

   if ($warning.ToBool()) {
      $sb.Append("Are you sure you want to add ") | Out-Null
   } else {
      $sb.Append("Adding ") | Out-Null
   }

   $pem | ConvertTo-X509Certificate | % {
      $sb.Append("'") | Out-Null
      $sb.Append($_.GetNameInfo([X509NameType]::SimpleName, $false)) | Out-Null
      $sb.Append("'") | Out-Null
      $sb.Append(", ") | Out-Null
   }
   $sb.Remove($sb.Length - 2, 2) | Out-Null

   $sb.Append(" certificate") | Out-Null
   if ($pem.Length -gt 1) {
      $sb.Append("s") | Out-Null
   }
   $sb.Append(" to") | Out-Null

   if(-not [string]::IsNullOrEmpty($vcName)) {
      $sb.Append(" vCenter Server '$vcName'") | Out-Null
      if ($hostName) {
         $sb.Append(" and") | Out-Null
      }
   }

   if ($hostName) {
      $sb.Append(" host") | Out-Null
      if ($hostName.Length -gt 1) {
         $sb.Append("s") | Out-Null
      }
      $sb.Append(" ") | Out-Null

      $hostName | % {
         $sb.Append("'$_', ") | Out-Null
      }

      $sb.Remove($sb.Length - 2, 2) | Out-Null
   }

   if ($warning.ToBool()) {
      $sb.Append("?") | Out-Null
   } else {
      $sb.Append(".") | Out-Null
   }

   $sb.ToString() | Write-Output
}

function Confirm-PemContainsCertificates {
   param(
      [Parameter(Mandatory = $true, ValueFromPipeline = $true, Position = 0)]
      [string[]]
      $Pem
   )

   return

   $Pem | %{
      if (!$_.Contains('-----BEGIN CERTIFICATE-----') -or `
         !$_.Contains('-----END CERTIFICATE-----')) {
         Write-PowerCLIError `
            -ErrorObject "PemCertificateOrChain must contain a PEM certificate." `
            -Terminating
      }
   }
}

# SIG # Begin signature block
# MIIexwYJKoZIhvcNAQcCoIIeuDCCHrQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAfdPSrNYYYSHW3
# 3BZYdJhBmMvLJmsttrpOQGNpowbphqCCDdowggawMIIEmKADAgECAhAIrUCyYNKc
# TJ9ezam9k67ZMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0z
# NjA0MjgyMzU5NTlaMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAw
# ggIKAoICAQDVtC9C0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0
# JAfhS0/TeEP0F9ce2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJr
# Q5qZ8sU7H/Lvy0daE6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhF
# LqGfLOEYwhrMxe6TSXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+F
# LEikVoQ11vkunKoAFdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh
# 3K3kGKDYwSNHR7OhD26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJ
# wZPt4bRc4G/rJvmM1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQay
# g9Rc9hUZTO1i4F4z8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbI
# YViY9XwCFjyDKK05huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchAp
# QfDVxW0mdmgRQRNYmtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRro
# OBl8ZhzNeDhFMJlP/2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IB
# WTCCAVUwEgYDVR0TAQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+
# YXsIiGX0TkIwHwYDVR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0P
# AQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAk
# BggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAC
# hjVodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9v
# dEc0LmNydDBDBgNVHR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5j
# b20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAED
# MAgGBmeBDAEEATANBgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql
# +Eg08yy25nRm95RysQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFF
# UP2cvbaF4HZ+N3HLIvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1h
# mYFW9snjdufE5BtfQ/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3Ryw
# YFzzDaju4ImhvTnhOE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5Ubdld
# AhQfQDN8A+KVssIhdXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw
# 8MzK7/0pNVwfiThV9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnP
# LqR0kq3bPKSchh/jwVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatE
# QOON8BUozu3xGFYHKi8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bn
# KD+sEq6lLyJsQfmCXBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQji
# WQ1tygVQK+pKHJ6l/aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbq
# yK+p/pQd52MbOoZWeE4wggciMIIFCqADAgECAhAOxvKydqFGoH0ObZNXteEIMA0G
# CSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcg
# UlNBNDA5NiBTSEEzODQgMjAyMSBDQTEwHhcNMjEwODEwMDAwMDAwWhcNMjMwODEw
# MjM1OTU5WjCBhzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQ
# BgNVBAcTCVBhbG8gQWx0bzEVMBMGA1UEChMMVk13YXJlLCBJbmMuMRUwEwYDVQQD
# EwxWTXdhcmUsIEluYy4xITAfBgkqhkiG9w0BCQEWEm5vcmVwbHlAdm13YXJlLmNv
# bTCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAMD6lJG8OWkM12huIQpO
# /q9JnhhhW5UyW9if3/UnoFY3oqmp0JYX/ZrXogUHYXmbt2gk01zz2P5Z89mM4gqR
# bGYC2tx+Lez4GxVkyslVPI3PXYcYSaRp39JsF3yYifnp9R+ON8O3Gf5/4EaFmbeT
# ElDCFBfExPMqtSvPZDqekodzX+4SK1PIZxCyR3gml8R3/wzhb6Li0mG7l0evQUD0
# FQAbKJMlBk863apeX4ALFZtrnCpnMlOjRb85LsjV5Ku4OhxQi1jlf8wR+za9C3DU
# ki60/yiWPu+XXwEUqGInIihECBbp7hfFWrnCCaOgahsVpgz8kKg/XN4OFq7rbh4q
# 5IkTauqFhHaE7HKM5bbIBkZ+YJs2SYvu7aHjw4Z8aRjaIbXhI1G+NtaNY7kSRrE4
# fAyC2X2zV5i4a0AuAMM40C1Wm3gTaNtRTHnka/pbynUlFjP+KqAZhOniJg4AUfjX
# sG+PG1LH2+w/sfDl1A8liXSZU1qJtUs3wBQFoSGEaGBeDQIDAQABo4ICJTCCAiEw
# HwYDVR0jBBgwFoAUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHQYDVR0OBBYEFIhC+HL9
# QlvsWsztP/I5wYwdfCFNMB0GA1UdEQQWMBSBEm5vcmVwbHlAdm13YXJlLmNvbTAO
# BgNVHQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMwgbUGA1UdHwSBrTCB
# qjBToFGgT4ZNaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3Rl
# ZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5jcmwwU6BRoE+GTWh0
# dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNENvZGVTaWdu
# aW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3JsMD4GA1UdIAQ3MDUwMwYGZ4EMAQQB
# MCkwJwYIKwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzCBlAYI
# KwYBBQUHAQEEgYcwgYQwJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0
# LmNvbTBcBggrBgEFBQcwAoZQaHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0Rp
# Z2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5j
# cnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEACQAYaQI6Nt2KgxdN
# 6qqfcHB33EZRSXkvs8O9iPZkdDjEx+2fgbBPLUvk9A7T8mRw7brbcJv4PLTYJDFo
# c5mlcmG7/5zwTOuIs2nBGXc/uxCnyW8p7kD4Y0JxPKEVQoIQ8lJS9Uy/hBjyakeV
# ef982JyzvDbOlLBy6AS3ZpXVkRY5y3Va+3v0R/0xJ+JRxUicQhiZRidq2TCiWEas
# d+tLL6jrKaBO+rmP52IM4eS9d4Yids7ogKEBAlJi0NbvuKO0CkgOlFjp1tOvD4sQ
# taHIMmqi40p4Tjyf/sY6yGjROXbMeeF1vlwbBAASPWpQuEIxrNHoVN30YfJyuOWj
# zdiJUTpeLn9XdjM3UlhfaHP+oIAKcmkd33c40SFRlQG9+P9Wlm7TcPxGU4wzXI8n
# Cw/h235jFlAAiWq9L2r7Un7YduqsheJVpGoXmRXJH0T2G2eNFS5/+2sLn98kN2Cn
# J7j6C242onjkZuGL2/+gqx8m5Jbpu9P4IAeTC1He/mX9j6XpIu+7uBoRVwuWD1i0
# N5SiUz7Lfnbr6Q1tHMXKDLFdwVKZos2AKEZhv4SU0WvenMJKDgkkhVeHPHbTahQf
# P1MetR8tdRs7uyTWAjPK5xf5DLEkXbMrUkpJ089fPvAGVHBcHRMqFA5egexOb6sj
# tKncUjJ1xAAtAExGdCh6VD2U5iYxghBDMIIQPwIBATB9MGkxCzAJBgNVBAYTAlVT
# MRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1
# c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEzODQgMjAyMSBDQTECEA7G
# 8rJ2oUagfQ5tk1e14QgwDQYJYIZIAWUDBAIBBQCggZYwGQYJKoZIhvcNAQkDMQwG
# CisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwKgYKKwYB
# BAGCNwIBDDEcMBqhGIAWaHR0cDovL3d3dy52bXdhcmUuY29tLzAvBgkqhkiG9w0B
# CQQxIgQgSZ7Gk6QDrDSBOk37cqIxV0wdGLu2X0TTtkPWgLdSWpMwDQYJKoZIhvcN
# AQEBBQAEggGAdHNXec/8trRZamsfYTTFC7UrTpdbWsucKPob8kQSdOSmDKbcResZ
# wDM6fVAjRfYwOf9tZci+zjfulLUlzMxwq6VDuqMXJWMa30B1D58c4GCftuczONMn
# 0XZUMmTO4UfOkv2V5MDEXqNaREJkCytAFNG5Nr3O6Vg0G8RBuaVxdPpQDr2q8F56
# E3BgjPYnG4vjxUOtI7zXgaKMuGd2HG4fZmz6H4eE8dZnlJ67RIcrpSTNU83MFGeg
# WmuywKqV/K3R/dByIvW61fiFa+GoowUrkY8h/V8rSK+eoIgkS9bfa2UdYDlXrGHc
# RXgM8uUy6f7YV6jDDw0Gi5ggP11ciCTequx2jYZiQZSkfKMIfnN+HtejD88ocqWq
# swskf1vb12CALxyQlnqt6rVEPoK42oib/Nc1hudT2TQryBRRTcD6dgnoxFqG6G1R
# SyVi5m/A4qRGd9dUBBR6cgDpeQxJFpabstRt+qrvzZRj7axBbqyD/WBRUQK0shMh
# cSyhHQiycRKVoYINfjCCDXoGCisGAQQBgjcDAwExgg1qMIINZgYJKoZIhvcNAQcC
# oIINVzCCDVMCAQMxDzANBglghkgBZQMEAgEFADB4BgsqhkiG9w0BCRABBKBpBGcw
# ZQIBAQYJYIZIAYb9bAcBMDEwDQYJYIZIAWUDBAIBBQAEIJj+rSeMNl+AZxgUzBQa
# xOc/sHv4YwngsDoMhjejCINDAhEAp/Jcs7lLQBfh/us2myJa/BgPMjAyMTA5MTQy
# MzA0NTVaoIIKNzCCBP4wggPmoAMCAQICEA1CSuC+Ooj/YEAhzhQA8N0wDQYJKoZI
# hvcNAQELBQAwcjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ
# MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTExMC8GA1UEAxMoRGlnaUNlcnQgU0hB
# MiBBc3N1cmVkIElEIFRpbWVzdGFtcGluZyBDQTAeFw0yMTAxMDEwMDAwMDBaFw0z
# MTAxMDYwMDAwMDBaMEgxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwg
# SW5jLjEgMB4GA1UEAxMXRGlnaUNlcnQgVGltZXN0YW1wIDIwMjEwggEiMA0GCSqG
# SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDC5mGEZ8WK9Q0IpEXKY2tR1zoRQr0KdXVN
# lLQMULUmEP4dyG+RawyW5xpcSO9E5b+bYc0VkWJauP9nC5xj/TZqgfop+N0rcIXe
# AhjzeG28ffnHbQk9vmp2h+mKvfiEXR52yeTGdnY6U9HR01o2j8aj4S8bOrdh1nPs
# Tm0zinxdRS1LsVDmQTo3VobckyON91Al6GTm3dOPL1e1hyDrDo4s1SPa9E14RuMD
# gzEpSlwMMYpKjIjF9zBa+RSvFV9sQ0kJ/SYjU/aNY+gaq1uxHTDCm2mCtNv8VlS8
# H6GHq756WwogL0sJyZWnjbL61mOLTqVyHO6fegFz+BnW/g1JhL0BAgMBAAGjggG4
# MIIBtDAOBgNVHQ8BAf8EBAMCB4AwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAK
# BggrBgEFBQcDCDBBBgNVHSAEOjA4MDYGCWCGSAGG/WwHATApMCcGCCsGAQUFBwIB
# FhtodHRwOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwHwYDVR0jBBgwFoAU9LbhIB3+
# Ka7S5GGlsqIlssgXNW4wHQYDVR0OBBYEFDZEho6kurBmvrwoLR1ENt3janq8MHEG
# A1UdHwRqMGgwMqAwoC6GLGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9zaGEyLWFz
# c3VyZWQtdHMuY3JsMDKgMKAuhixodHRwOi8vY3JsNC5kaWdpY2VydC5jb20vc2hh
# Mi1hc3N1cmVkLXRzLmNybDCBhQYIKwYBBQUHAQEEeTB3MCQGCCsGAQUFBzABhhho
# dHRwOi8vb2NzcC5kaWdpY2VydC5jb20wTwYIKwYBBQUHMAKGQ2h0dHA6Ly9jYWNl
# cnRzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFNIQTJBc3N1cmVkSURUaW1lc3RhbXBp
# bmdDQS5jcnQwDQYJKoZIhvcNAQELBQADggEBAEgc3LXpmiO85xrnIA6OZ0b9QnJR
# dAojR6OrktIlxHBZvhSg5SeBpU0UFRkHefDRBMOG2Tu9/kQCZk3taaQP9rhwz2Lo
# 9VFKeHk2eie38+dSn5On7UOee+e03UEiifuHokYDTvz0/rdkd2NfI1Jpg4L6GlPt
# kMyNoRdzDfTzZTlwS/Oc1np72gy8PTLQG8v1Yfx1CAB2vIEO+MDhXM/EEXLnG2RJ
# 2CKadRVC9S0yOIHa9GCiurRS+1zgYSQlT7LfySmoc0NR2r1j1h9bm/cuG08THfdK
# DXF+l7f0P4TrweOjSaH6zqe/Vs+6WXZhiV9+p7SOZ3j5NpjhyyjaW4emii8wggUx
# MIIEGaADAgECAhAKoSXW1jIbfkHkBdo2l8IVMA0GCSqGSIb3DQEBCwUAMGUxCzAJ
# BgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5k
# aWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBD
# QTAeFw0xNjAxMDcxMjAwMDBaFw0zMTAxMDcxMjAwMDBaMHIxCzAJBgNVBAYTAlVT
# MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j
# b20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBUaW1lc3RhbXBp
# bmcgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC90DLuS82Pf92p
# uoKZxTlUKFe2I0rEDgdFM1EQfdD5fU1ofue2oPSNs4jkl79jIZCYvxO8V9PD4X4I
# 1moUADj3Lh477sym9jJZ/l9lP+Cb6+NGRwYaVX4LJ37AovWg4N4iPw7/fpX786O6
# Ij4YrBHk8JkDbTuFfAnT7l3ImgtU46gJcWvgzyIQD3XPcXJOCq3fQDpct1HhoXkU
# xk0kIzBdvOw8YGqsLwfM/fDqR9mIUF79Zm5WYScpiYRR5oLnRlD9lCosp+R1PrqY
# D4R/nzEU1q3V8mTLex4F0IQZchfxFwbvPc3WTe8GQv2iUypPhR3EHTyvz9qsEPXd
# rKzpVv+TAgMBAAGjggHOMIIByjAdBgNVHQ4EFgQU9LbhIB3+Ka7S5GGlsqIlssgX
# NW4wHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNtyA8wEgYDVR0TAQH/BAgw
# BgEB/wIBADAOBgNVHQ8BAf8EBAMCAYYwEwYDVR0lBAwwCgYIKwYBBQUHAwgweQYI
# KwYBBQUHAQEEbTBrMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5kaWdpY2VydC5j
# b20wQwYIKwYBBQUHMAKGN2h0dHA6Ly9jYWNlcnRzLmRpZ2ljZXJ0LmNvbS9EaWdp
# Q2VydEFzc3VyZWRJRFJvb3RDQS5jcnQwgYEGA1UdHwR6MHgwOqA4oDaGNGh0dHA6
# Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJRFJvb3RDQS5jcmww
# OqA4oDaGNGh0dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydEFzc3VyZWRJ
# RFJvb3RDQS5jcmwwUAYDVR0gBEkwRzA4BgpghkgBhv1sAAIEMCowKAYIKwYBBQUH
# AgEWHGh0dHBzOi8vd3d3LmRpZ2ljZXJ0LmNvbS9DUFMwCwYJYIZIAYb9bAcBMA0G
# CSqGSIb3DQEBCwUAA4IBAQBxlRLpUYdWac3v3dp8qmN6s3jPBjdAhO9LhL/KzwMC
# /cWnww4gQiyvd/MrHwwhWiq3BTQdaq6Z+CeiZr8JqmDfdqQ6kw/4stHYfBli6F6C
# JR7Euhx7LCHi1lssFDVDBGiy23UC4HLHmNY8ZOUfSBAYX4k4YU1iRiSHY4yRUiyv
# KYnleB/WCxSlgNcSR3CzddWThZN+tpJn+1Nhiaj1a5bA9FhpDXzIAbG5KHW3mWOF
# IoxhynmUfln8jA/jb7UBJrZspe6HUSHkWGCbugwtK22ixH67xCUrRwIIfEmuE7bh
# fEJCKMYYVs9BNLZmXbZ0e/VWMyIvIjayS6JKldj1po5SMYIChjCCAoICAQEwgYYw
# cjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ
# d3d3LmRpZ2ljZXJ0LmNvbTExMC8GA1UEAxMoRGlnaUNlcnQgU0hBMiBBc3N1cmVk
# IElEIFRpbWVzdGFtcGluZyBDQQIQDUJK4L46iP9gQCHOFADw3TANBglghkgBZQME
# AgEFAKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF
# MQ8XDTIxMDkxNDIzMDQ1NVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQU4deCqOGR
# vu9ryhaRtaq0lKYkm/MwLwYJKoZIhvcNAQkEMSIEICh2q0FQBfn9cdglDTCpgM3a
# 5wMI8/emQ9x7yeSArUQ0MDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEILMQkAa8CtmD
# B5FXKeBEA0Fcg+MpK2FPJpZMjTVx7PWpMA0GCSqGSIb3DQEBAQUABIIBAF3U8wNe
# 89gapi9z/snWY2vVXHzcoqSLKd2zOhaUP5ziu64igXBXYRrt/LdzP9PyjEffy5qi
# 5jcZq5TfV5SoLNkwZLTU9CXAOOJj6H26x4c9/Z8BuVIRk+XuYtJLg3WXHKcVzoVa
# 6vtuz48/ngU87HqYKA+sD2hI7iWqpUTnEFFBCbPN0Cc27vzuVsREy935jnYmFJC+
# 5HSFVUzuAfrKAm77L+vkZCr5Bbi0G1Jh8pCxNKuMHP5BmJ9qm53dWT8JbA7/CU9c
# pnRmYRhqFZ7o9OuTV6SiiRI7va+3yxi8mUdJNBL0Tk7KZL1W9NpudonEBBa0G1zK
# SpgslseiEVFPR5w=
# SIG # End signature block