AzStackHci.EnvironmentChecker.Utilities.psm1
Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1 class HealthModel { # Attributes for Azure Monitor schema [string]$Name #Name of the individual test/rule/alert that was executed. Unique, not exposed to the customer. [string]$Title #User-facing name; one or more sentences indicating the direct issue. [string]$Severity #Severity of the result (Critical, Warning, Informational, Hidden) – this answers how important the result is. Critical is the only update-blocking severity. [string]$Description #Detailed overview of the issue and what impact the issue has on the stamp. [psobject]$Tags #Key-value pairs that allow grouping/filtering individual tests. For example, "Group": "ReadinessChecks", "UpdateType": "ClusterAware" [string]$Status #The status of the check running (i.e. Failed, Succeeded, In Progress) – this answers whether the check ran, and passed or failed. [string]$Remediation #Set of steps that can be taken to resolve the issue found. [string]$TargetResourceID #The unique identifier for the affected resource (such as a node or drive). [string]$TargetResourceName #The name of the affected resource. [string]$TargetResourceType #The type of resource being referred to (well-known set of nouns in infrastructure, aligning with Monitoring). [datetime]$Timestamp #The Time in which the HealthCheck was called. [psobject]$AdditionalData #Property bag of key value pairs for additional information. [string]$HealthCheckSource #The name of the services called for the HealthCheck (I.E. Test-AzureStack, Test-Cluster). } function Test-ModuleUpdate { <# .SYNOPSIS Checks PSGallery for updated module. .DESCRIPTION Checks PSGallery for updated module and gives user 10 seconds to cancel cmdlet and prints update instructions to screen #> param() try { Log-Info "Looking for module updates for $($MyInvocation.MyCommand.Module.Name) greater than $($MyInvocation.MyCommand.Module.Version)" $ModuleOnline = Find-Module -Name $MyInvocation.MyCommand.Module.Name -Repository PSGallery -AllowPrerelease -ErrorAction SilentlyContinue if (([system.version]$ModuleOnline.Version -replace ('-preview', '')) -gt [system.version]$MyInvocation.MyCommand.Module.Version) { Log-Info ($lTxt.CurrentVersion -f $MyInvocation.MyCommand.Module.Name, $MyInvocation.MyCommand.Module.Version) -ConsoleOut Log-Info ($lTxt.UpdateToVersion -f $ModuleOnline.Version, $MyInvocation.MyCommand.Module.Name) -ConsoleOut Start-Sleep -Seconds 10 } else { Log-Info ($lTxt.CurrentVersion -f $MyInvocation.MyCommand.Module.Name, $MyInvocation.MyCommand.Module.Version) } } catch { Log-Info ($lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message) -Type Error } } function Test-IsClusterNode { <# .SYNOPSIS This is a function to test is the local machine is a cluster node. #> [CmdletBinding()] param( [Parameter()] [System.Management.Automation.Runspaces.PSSession] $PsSession ) $clusSvc = Get-Service -Name ClusSvc -ErrorAction SilentlyContinue if ($clusSvc.Status -eq 'Running') { Log-Info -Message "Cluster service is running on $ENV:ComputerName" return $true } else { Log-Info -Message "Cluster service is not running on $ENV:ComputerName" return $false } } function Get-ClusterNodeName { <# .SYNOPSIS Get all Cluster Node names. #> [CmdletBinding()] param ( [Parameter()] [string] $Cluster, [Parameter()] [System.Management.Automation.Runspaces.PSSession] $PsSession ) $sb = { if ([string]::IsNullOrEmpty($Cluster)) { Get-ClusterNode } else { Get-ClusterNode -Cluster $Cluster } } if ([string]::IsNullOrEmpty($PsSession)) { Log-Info -Message "Get cluster node locally on $ENV:ComputerName" $nodes = Invoke-Command -ScriptBlock $sb } else { Log-Info -Message "Get cluster node from PsSession on $($PsSession.ComputerName)" $nodes = Invoke-Command -ScriptBlock $sb -Session $PsSession } foreach ($node in $nodes) { if ($node.State -ne 'Up') { Log-Info -Message "$node state is $($node.state)" } } Log-Info -Message ("Return node names: {0}" -f ($nodes.name -join ',')) return $nodes.Name } function Open-PsSession { <# .SYNOPSIS Create PsSession to intended targets .DESCRIPTION Creates PsSession to single computer, cluster and related nodes. #> [CmdletBinding()] param ( [Parameter(Mandatory = $false, HelpMessage = "Specify the Computer Name(s) to run validation from. If null the local machine will be used.")] [string[]] $ComputerName, [Parameter(Mandatory = $false, HelpMessage = "Specify the Cluster Name to run validation from. If null the local machine will be used.")] [string] $Cluster, [Parameter(Mandatory = $false, HelpMessage = "Specify the credential used to connect to remote computer.")] [pscredential] $Credential, [Parameter(Mandatory = $false, HelpMessage = "Specify the authentication used to connect to remote computer.")] $Authentication ) try { # Build PsSession Params $sessionAuthParams = @{} if (-not [string]::IsNullOrEmpty($Authentication)) { if ($Authentication -eq 'CredSSP' -and [string]::IsNullOrEmpty($Credential)) { throw "A credential object must be provided with $Authentication Authentication" } $sessionAuthParams += @{ Authentication = $Authentication } } if (-not [string]::IsNullOrEmpty($Credential)) { $sessionAuthParams += @{ Credential = $Credential } } # Check if local machine is a cluster node and get its cluster nodes if (Test-IsClusterNode) { if ([string]::IsNullOrEmpty($Credential)) { Log-Info -Message "Credential not provided. Other Cluster nodes will not have connectivity validated. Only $ENV:ComputerName" } else { Log-Info -Message "Get computer names from local cluster/nodes" $ComputerName += @(Get-ClusterNodeName) } } # Create PsSession to cluster and get node names if (-not [string]::IsNullOrEmpty($Cluster)) { Log-Info -Message "Create session to cluster $cluster" $ClusterPsSession = New-PSSession -ComputerName $Cluster @sessionAuthParams Log-Info -Message "Get computer names from remote session to cluster $Cluster" $ComputerName = Get-ClusterNodeName -PsSession $ClusterPsSession -Cluster $Cluster Log-Info -Message ("ComputerNames found {0} from remote session to cluster $cluster. Removing session." -f ($ComputerName -join ',')) $ClusterPsSession | Remove-PSSession } if ([string]::IsNullOrEmpty($ComputerName)) { Log-Info -Message ("Running all tests locally.") } else { $ComputerName = $ComputerName | Sort-Object | Get-Unique Log-Info -Message ("Create a pssession to each ComputerName {0}." -f ($ComputerName -join ',')) $PsSession = @() $PsSession += foreach ($Computer in $ComputerName) { $Session = New-PSSession -ComputerName $Computer @sessionAuthParams -ErrorAction Stop Log-Info -Message ("Create a pssession created to {0}." -f $Session.ComputerName) } if ($null -eq $Session) { throw "User specified ComputerName but no remote sessions could be established to $($Computer -join ',')" } $Session } return $PsSession } catch { $exceptionMsg = $lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message Log-Info $exceptionMsg -Type Error throw $exceptionMsg } } function Open-CimSession { <# .SYNOPSIS Create PsSession to intended targets .DESCRIPTION Creates PsSession to single computer, cluster and related nodes. #> [CmdletBinding()] param ( [Parameter(Mandatory = $false, HelpMessage = "Specify the Computer Name(s) to run validation from. If null the local machine will be used.")] [string[]] $ComputerName, [Parameter(Mandatory = $false, HelpMessage = "Specify the Cluster Name to run validation from. If null the local machine will be used.")] [string] $Cluster, [Parameter(Mandatory = $false, HelpMessage = "Specify the credential used to connect to remote computer.")] [pscredential] $Credential, [Parameter(Mandatory = $false, HelpMessage = "Specify the authentication used to connect to remote computer.")] $Authentication ) try { # Build PsSession Params $sessionAuthParams = @{} if (-not [string]::IsNullOrEmpty($Authentication)) { if ($Authentication -eq 'CredSSP' -and [string]::IsNullOrEmpty($Credential)) { throw "A credential object must be provided with $Authentication Authentication" } $sessionAuthParams += @{ Authentication = $Authentication } } if (-not [string]::IsNullOrEmpty($Credential)) { $sessionAuthParams += @{ Credential = $Credential } } # Check if local machine is a cluster node and get its cluster nodes if (Test-IsClusterNode) { if ([string]::IsNullOrEmpty($Credential)) { Log-Info -Message "Credential not provided. Other Cluster nodes will not have connectivity validated. Only $ENV:ComputerName" } else { Log-Info -Message "Get computer names from local cluster/nodes" $ComputerName += @(Get-ClusterNodeName) } } # Create PsSession to cluster and get node names if (-not [string]::IsNullOrEmpty($Cluster)) { Log-Info -Message "Create session to cluster $cluster" $ClusterPsSession = New-PSSession -ComputerName $Cluster @sessionAuthParams Log-Info -Message "Get computer names from remote session to cluster $Cluster" $ComputerName = Get-ClusterNodeName -PsSession $ClusterPsSession -Cluster $Cluster Log-Info -Message ("ComputerNames found {0} from remote session to cluster $cluster. Removing session." -f ($ComputerName -join ',')) $ClusterPsSession | Remove-PSSession } if ([string]::IsNullOrEmpty($ComputerName)) { Log-Info -Message ("Running all tests locally.") $CimSession = New-CimSession -ComputerName $ENV:COMPUTERNAME } else { $ComputerName = $ComputerName | Sort-Object | Get-Unique Log-Info -Message ("Create a CimSession to each ComputerName {0}." -f ($ComputerName -join ',')) $CimSession = @() $CimSession += foreach ($Computer in $ComputerName) { $Session = New-CimSession -ComputerName $Computer @sessionAuthParams -ErrorAction Stop Log-Info -Message ("Create a CimSession created to {0}." -f $Session.ComputerName) } if ($null -eq $Session) { throw "User specified ComputerName but no remote sessions could be established to $($Computer -join ',')" } $Session } return $CimSession } catch { $exceptionMsg = $lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message Log-Info $exceptionMsg -Type Error throw $exceptionMsg } } function Test-Elevation { ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator') } function Test-Count { [CmdletBinding()] param ( [CimInstance[]] $CimData, [int] $minimum, [string] $ValidatorName, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { $passed = $false $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $instanceId = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique if ($CimData.Count -lt $minimum) { $passed = $false $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum } else { $passed = $true } $result = New-Object HealthModel $Result.Name = 'AzStackHci_{0}_Test_{1}_Count' -f $ValidatorName, $className $Result.Title = 'Test {0} Count' -f $className $Result.Severity = $Severity $Result.Description = 'Checking {0} count' -f $className $Result.Remediation = 'https://aka.ms/fixthis' $Result.TargetResourceID = $InstanceId $Result.TargetResourceName = $InstanceId $Result.TargetResourceType = $className $Result.Timestamp = [datetime]::UtcNow $Result.HealthCheckSource = 'Environment Checker' $Result.AdditionalData = New-Object -TypeName PSObject -Property @{ Source = "$ClassName Count" Resource = $CimData.count Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } $result.Status = if ($passed) { 'Succeeded' } else { 'Failed' } $result } catch { throw $_ } } function Test-GroupProperty { <# .SYNOPSIS Test if properties match across groups #> [CmdletBinding()] param ( [CimInstance[]] $CimData, [string[]] $GroupProperty, [string[]] $MatchProperty, [string] $ValidatorName, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { # Group by name and compare properties within each group $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $ServerName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique $groupedData = @($CimData | Group-Object -Property $groupProperty) $returnResult = @() if ($serverName.Count -gt 1) { $serverName = 'AllServers' } $returnResult += foreach ($group in $groupedData) { $instanceId = "Machine: {0}, Class: {1} Group: {2}" -f $ServerName, $className, $group.Name $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Group_Consistency' -f $ValidatorName, $className $result.Title = 'Test {0} Groups' -f $className $result.Severity = $Severity $result.Description = 'Checking {0} Groups for consistent properties' -f $className $result.Remediation = 'https://aka.ms/fixthis' $result.TargetResourceID = $instanceId $result.TargetResourceName = $instanceId $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $AdditionalData = @() $detail = $null $passed = $false if ($group.Count -gt 1) { foreach ($propertyName in $matchProperty) { if (($group.Group.$propertyName | Sort-Object | Get-Unique).Count -gt 1) { $passed = $false $detail = $lTxt.MismatchProp -f $className, $propertyName, ($group.Group.$propertyName -join ', ') Log-Info -Message $detail -Type Warning } else { $passed = $true } $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = "$($Group.Name) $propertyName" Resource = $instance.$propertyName Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } } } $result.AdditionalData = $AdditionalData $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } $returnResult } catch { throw $_ } } function Test-InstanceCount { <# .SYNOPSIS Test if instance count matches across instances #> [CmdletBinding()] param ( [Parameter()] [CimInstance[]] $CimData, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) $serverName = 'AllServers' $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Count' -f $ValidatorName, $className $result.Title = 'Test {0} Properties' -f $className $result.Severity = $Severity $result.Description = 'Checking all servers have same {0} instance count' -f $className $result.Remediation = 'https://aka.ms/fixthis' $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $AdditionalData = @() $groupData = $cimData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } } $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique $result.AdditionalData = New-Object -TypeName PSObject -Property @{ Source = 'AllServers' Resource = $ClassName Detail = ($groupData | ForEach-Object { "{0}: {1}" -f $_.Name, $_.Count }) -join ',' Status = if ($groupDataCount.Count -gt 1) { 'Failed' } else { 'Succeeded' } TimeStamp = [datetime]::UtcNow } $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } function Test-PropertySync { <# .SYNOPSIS Test if properties match across instances #> [CmdletBinding()] param ( [Parameter()] [CimInstance[]] $CimData, [Parameter()] [string[]] $MatchProperty, [string] $ValidatorName, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { $returnResult = @() $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique if ($serverName.Count -gt 1) { $serverName = 'AllServers' $returnResult += Test-InstanceCount -CimData $CimData } $returnResult += if ($CimData.Count -gt 1) { $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Consistency' -f $ValidatorName, $className $result.Title = 'Test {0} Properties' -f $className $result.Severity = $Severity $result.Description = 'Checking all {0} for consistent properties' -f $className $result.Remediation = 'https://aka.ms/fixthis' $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $AdditionalData = @() foreach ($propertyName in $matchProperty) { $detail = $null $passed = $false if (($CimData.$propertyName | Get-Unique).Count -gt 1) { $passed = $false $detail = $lTxt.MismatchProp -f $className, $propertyName, ($CimData.$propertyName -join ',') Log-Info -Message $detail -Type Warning } else { $passed = $true } $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = "$className`: $propertyName" Resource = $instance.$propertyName Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } } $result.AdditionalData = $AdditionalData $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } return $returnResult } catch { throw $_ } } function Test-DesiredProperty { <# .SYNOPSIS Test if properties have required value #> [cmdletbinding()] param ( [CimInstance[]] $cimData, [hashtable] $desiredPropertyValue, [string] $InstanceIdStr, [string] $ValidatorName, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { # Test properties $returnResult = @() $returnResult += foreach ($instance in $cimData) { $serverName = $instance.CimSystemProperties.ServerName | Sort-Object | Get-Unique $sb = ([scriptblock]::Create($InstanceIdStr)) $instanceId = Invoke-Command -ScriptBlock $sb $className = $instance.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 Log-Info -Message ($lTxt.Test -f $className, $instanceId) $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Properties' -f $ValidatorName, $className $result.Title = 'Test {0} Properties' -f $className $result.Severity = $Severity $result.Description = 'Checking {0} for desired properties' -f $className $result.Remediation = 'https://aka.ms/fixthis' $result.TargetResourceID = $instanceId $result.TargetResourceName = $instanceId $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $AdditionalData = @() foreach ($propertyName in $desiredPropertyValue.Keys) { $detail = $null $passed = $false $hint = $null $desiredPropertyValueCheck = $null $desiredPropertyValueCheck = if ($desiredPropertyValue.$propertyName -is [hashtable]) { $desiredPropertyValue.$propertyName.Value } else { $desiredPropertyValue.$propertyName } if (($instance.$propertyName | Select-Object -First 1) -notin $desiredPropertyValueCheck) { $passed = $false $hint = if ($desiredPropertyValue.$propertyName.hint) { ' ({0})' -f $desiredPropertyValue.$propertyName.hint } $detail = $lTxt.UnexProp -f $className, $propertyName, $instance.$propertyName, ($desiredPropertyValueCheck -join ','), $hint Log-Info -Message $detail -Type Warning } else { $passed = $true } $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = "$className`: $propertyName" Resource = if ($hint) { "$($instance.$propertyName)$hint" } else { $instance.$propertyName } Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } } $result.AdditionalData = $AdditionalData $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } return $returnResult } catch { throw $_ } } function Confirm-RemoteConnectionMatch { <# .SYNOPSIS Ensure multiple remote connection methods match all remote systems #> [CmdletBinding()] param ( [Parameter()] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [CimSession[]] $CimSession ) if ($PsSession -or $CimSession) { Log-Info ($lTxt.RemoteSyncStart -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ',')) if (Compare-Object -ReferenceObject $PsSession -DifferenceObject $CimSession -Property ComputerName) { $errorMsg = $lTxt.RemoteSyncFail -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ',') Log-Info $errorMsg -Type Error throw $errorMsg } else { Log-Info ($lTxt.RemoteSyncPass -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ',')) } } else { Log-Info $lTxt.RemoteSyncSkip } } function Get-TestCount { param ( [Parameter()] [string] $ModuleName, [Parameter()] [string] $CommandPrefix ) try { $command = Get-Command -Name $CommandPrefix* -Module $ModuleName if ($command) { return $command.Count } else { return 1 } } catch { return 1 } } # SIG # Begin signature block # MIInuwYJKoZIhvcNAQcCoIInrDCCJ6gCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDvOb8lffuXUnKq # 4q+hNN8LA1CUC65TCcjjv1/7qRxR/aCCDYUwggYDMIID66ADAgECAhMzAAACU+OD # 3pbexW7MAAAAAAJTMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMzAwWhcNMjIwOTAxMTgzMzAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDLhxHwq3OhH+4J+SX4qS/VQG8HybccH7tnG+BUqrXubfGuDFYPZ29uCuHfQlO1 # lygLgMpJ4Geh6/6poQ5VkDKfVssn6aA1PCzIh8iOPMQ9Mju3sLF9Sn+Pzuaie4BN # rp0MuZLDEXgVYx2WNjmzqcxC7dY9SC3znOh5qUy2vnmWygC7b9kj0d3JrGtjc5q5 # 0WfV3WLXAQHkeRROsJFBZfXFGoSvRljFFUAjU/zdhP92P+1JiRRRikVy/sqIhMDY # +7tVdzlE2fwnKOv9LShgKeyEevgMl0B1Fq7E2YeBZKF6KlhmYi9CE1350cnTUoU4 # YpQSnZo0YAnaenREDLfFGKTdAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUlZpLWIccXoxessA/DRbe26glhEMw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzQ2NzU5ODAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AKVY+yKcJVVxf9W2vNkL5ufjOpqcvVOOOdVyjy1dmsO4O8khWhqrecdVZp09adOZ # 8kcMtQ0U+oKx484Jg11cc4Ck0FyOBnp+YIFbOxYCqzaqMcaRAgy48n1tbz/EFYiF # zJmMiGnlgWFCStONPvQOBD2y/Ej3qBRnGy9EZS1EDlRN/8l5Rs3HX2lZhd9WuukR # bUk83U99TPJyo12cU0Mb3n1HJv/JZpwSyqb3O0o4HExVJSkwN1m42fSVIVtXVVSa # YZiVpv32GoD/dyAS/gyplfR6FI3RnCOomzlycSqoz0zBCPFiCMhVhQ6qn+J0GhgR # BJvGKizw+5lTfnBFoqKZJDROz+uGDl9tw6JvnVqAZKGrWv/CsYaegaPePFrAVSxA # yUwOFTkAqtNC8uAee+rv2V5xLw8FfpKJ5yKiMKnCKrIaFQDr5AZ7f2ejGGDf+8Tz # OiK1AgBvOW3iTEEa/at8Z4+s1CmnEAkAi0cLjB72CJedU1LAswdOCWM2MDIZVo9j # 0T74OkJLTjPd3WNEyw0rBXTyhlbYQsYt7ElT2l2TTlF5EmpVixGtj4ChNjWoKr9y # TAqtadd2Ym5FNB792GzwNwa631BPCgBJmcRpFKXt0VEQq7UXVNYBiBRd+x4yvjqq # 5aF7XC5nXCgjbCk7IXwmOphNuNDNiRq83Ejjnc7mxrJGMIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGYwwghmIAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAJT44Pelt7FbswAAAAA # AlMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICVP # 3VyGXLLwo8n9wpvw6pZuTXJ1mF03XMyF1NSUZqdJMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAQb6L6dTbD5uhT56+GPq6OXh9cz6Faz8zhbUq # OlAEYYforg3DlFXFgYPxGxzt7H22BuneBYntyjuYXmWB37VBt+dkKhOYnmot0llW # f5KuY59no0QV0dBvfFT3eG31wGqxqHHd7dpNIUkTV3tTRLAZdCRbDvU1NPna5eq5 # 2qXSOZf+ciM7RrkHL3z2yJq6ZrjBwpg3cwz+HBL6wAcOeArCaXUk4kMKOB+w1eZ1 # 2mFM6rPKHGQ1E4mbLmY80/wqfklQR35BHfrhxikK9RmirzhhfKBKr5gx/CF3AO8q # SU8GZFWl1mgpVo+dOffXN5ppLjl2lKq8m20ZA8GCCobbnWG+sqGCFxYwghcSBgor # BgEEAYI3AwMBMYIXAjCCFv4GCSqGSIb3DQEHAqCCFu8wghbrAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCB8kXeBST8PNAmiY8+bEQEl2BfkNVbPtKPk # rpq2pmN6SAIGYrtRCf+iGBMyMDIyMDcwNDEyMzA1My4wNThaMASAAgH0oIHYpIHV # MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL # EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT # HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRZTCCBxQwggT8oAMCAQICEzMAAAGOWdtG # AKgQlMwAAQAAAY4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjExMDI4MTkyNzQ1WhcNMjMwMTI2MTkyNzQ1WjCB0jELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKoj # AqujjMy2ucK7XH+wX/X9Vl1vZKamzgc4Dyb2hi62Ru7cIMKk0Vn9RZI6SSgThuUD # yEcu2uiBVQMtFvrQWhV+CJ+A2wX9rRrm8mPfoUVPoUXsDyR+QmDr6T4e+xXxjOt/ # jpcEV6eWBEerQtFkSp95q8lqbeAsAA7hr9Cw9kI54YYLUVYnbIg55/fmi4zLjWqV # IbLRqgq+yXEGbdGaz1B1v06kycpnlNXqoDaKxG03nelEMi2k1QJoVzUFwwoX2udu # p1u0UOy+LV1/S3NKILogkpD5buXazQOjTPM/lF0DgB8VXyEF5ovmN0ldoa9nXMW8 # vZ5U82L3+GQ6+VqXMLe7U3USCYm1x7F1jCq5js4pYhg06C8d+Gv3LWRODTi55ayk # FjfWRvjsec0WqytRIUoWoTNLkDYW+gSY6d/nNHjczBSdqi2ag6dv92JeUPuJPjAx # y04qT+lQXcXHVX3eJoK1U8d2nzuSjX4DJ4Bhn4UmsBq2kVtvBIayzrKZiMYovdhO # 7453CdrXI4SwowQK1aT4d3GRuYN2VcuYogGqA2rMKTYJzBQCuVJ9a3ivjBYT4vYj # J71D8LUwwybeWBA+QwE95gVMaeUB97e0YWcACTS1i7aU3hhe7m/NbEimL9mq3Wsw # HvVy0tdLVdqDj63J4hic5V1u1T78akDcXvJQgwNtAgMBAAGjggE2MIIBMjAdBgNV # HQ4EFgQU7EH5M/YE+ODf+RvLzR2snqfmleQwHwYDVR0jBBgwFoAUn6cVXQBeYl2D # 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l # LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADATBgNVHSUE # DDAKBggrBgEFBQcDCDANBgkqhkiG9w0BAQsFAAOCAgEANVCvccyHk5SoUmy59G3p # EeYGIemwdV0KZbgqggNebJGd+1IpWhScPPhpJQy85TYUj9pjojs1cgqvJJKap31H # NNWWgXs0MYO+6nr49ojMoN/WCX3ogiIcWDhboMHqWKzzvDJQf6Lnv1YSIg29XjWE # 5T0pr96WpbILZK29KKNBdLlpl+BEFRikaNFBDbWXrVSMWtCfQ6VHY0Fj3hIfXBDP # kYBNuucOVgFW/ljcdIloheIk2wpq1mlRDl/dnTagZvW09VO5xsDeQsoKTQIBGmJ6 # 0zMdTeAI8TmwAgzeQ3bxpbvztA3zFlXOqpOoigxQulqV0EpDJa5VyCPzYaftPp6F # OrXxKRyi7e32JvaH+Yv0KJnAsKP3pIjgo2JLad/d6L6AtTtri7Wy5zFZROa2gSwT # UmyDWekC8YgONZV51VSyMw4oVC/DFPQjLxuLHW4ZNhV/M767D+T3gSMNX2npzGbs # 9Fd1FwrVOTpMeX5oqFooi2UgotZY2sV/gRMEIopwovrxOfW02CORW7kfLQ7hi4lb # vyUqVRV681jD9ip9dbAiwBhI6iWFJjtbUWNvSnex3CI9p4kgdD0Dgo2JZwp8sJw4 # p6ktQl70bIrI1ZUtUaeE5rpLPqRsYjBsxefM3G/oaBSsjjbi92/rYMUwM97BdwVV # /bpPTORfjhKHsi8hny3pDQIwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAA # AAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBB # dXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOC # Ag8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YB # f2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKD # RLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus # 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTj # kY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56 # KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39 # IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHo # vwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJo # LhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMh # XV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREd # cu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEA # AaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqn # Uv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnp # cjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw # Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0w # EwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEw # CwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/o # olxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNy # b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt # MjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5t # aWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5j # cnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+ # TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2Y # urYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4 # U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ # w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb # 30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ # /gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGO # WhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFE # fnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJ # jXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rR # nj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUz # WLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBP # cGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkZDNDEt # NEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # oiMKAQEwBwYFKw4DAhoDFQA9YivqT04R6oKWucbD5omK7llbjKCBgzCBgKR+MHwx # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p # Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA5m0P # nzAiGA8yMDIyMDcwNDE1MDUwM1oYDzIwMjIwNzA1MTUwNTAzWjB0MDoGCisGAQQB # hFkKBAExLDAqMAoCBQDmbQ+fAgEAMAcCAQACAiSPMAcCAQACAhILMAoCBQDmbmEf # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAZ/y2+njM+4uqvjL5q9srUfGz # jVofL9yaCTHeysuexdqTMPxv3WgOBkJ9Hgrc2MPbmbuy/ImzQ8T4O/nm5EJgZWm/ # IU8w5NhprcaDeYdrq4h5/MTP0O5d9gZbjNLR1XSLIHLuJBHKDMXMszxv5Zq7LnAO # UGSb7ebSh0YZIEQeAhsxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMAITMwAAAY5Z20YAqBCUzAABAAABjjANBglghkgBZQMEAgEFAKCC # AUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCY # DY+YuZR9DvxG4pKCCH6FzmRC4CDVZ31Mpx5Pv3te3DCB+gYLKoZIhvcNAQkQAi8x # geowgecwgeQwgb0EIL0FjyE74oGlLlefn/5VrNwV2cCf5dZn/snpbuZ15sQlMIGY # MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGOWdtGAKgQ # lMwAAQAAAY4wIgQg7kNyeotUj+kf7/s6vFEsQ3eKPITr/uAdkmxls0s5eP8wDQYJ # KoZIhvcNAQELBQAEggIAUydKDPUgOG86+q9ul6JLQ++3Y4kX+06eD3kFkLYQjbPK # z2TupaQjtzRD9hypzuz54adnD+F45E/ff9cYd9EgkzmwhmmvOSju3C5J1ZOsFAVa # uAujO8/vJhq4zJSMGTIedIm8Pac3yc0oEDQsM4VOzyfVm8HrxXke2AQwP+u14Zvt # vQsNexlu1JhAKvkK94lwgP9VRVFysduGf+biL1VH82O1DeeGvFEuPE29jY/fTIcf # +E6O00+cu2FPaRVcF1C3jvK/HZqzsmwnvjABDfuZ0GOJ5lb047uunUGvvI4dovLX # S//Sa5JvCFuW/4FgL4bDChIn14yDAKfxN6F0CReodlqPSCMddFED9TSMVha+3bmA # n8OKpXgkTwgxLedxFCCCsdajCNXvM3JClGULEJHuWbqH4cHOKeGe+foPUfk0gTVc # xW54TLZgqIWMK7+JTq9j/ucEnqk4qiFGcktoibPpJJ5fJirljHV0xBpVF8yUwPhD # pHEA+/SvHpdE6lJl6n2du84epcHjhFzHUsiIx7l+oj+dc+RA60dUDx/tH694xQX1 # iF1kneH60HWQkKZcKTMwXInLV/EjWCXJa6T7R6nCV6i+vG+wo7zBryH0X+YlYNLU # 1uYvgVxswJxO6udkszNdJ4CNlPMCIMdjkqO2GZDN865NbquUX0j03m0Ta+IcNxA= # SIG # End signature block |