Src/Public/Get-LabStatus.ps1
function Get-LabStatus { <# .SYNOPSIS Queries computers' LCM state to determine whether an existing DSC configuration has applied. .EXAMPLE Get-LabStatus -ComputerName CONTROLLER, XENAPP Queries the CONTROLLER and XENAPP computers' LCM state using the current user credential. .EXAMPLE Get-LabStatus -ComputerName CONTROLLER, EXCHANGE -Credential (Get-Credential) Prompts for credentials to connect to the CONTROLLER and EXCHANGE computers to query the LCM state. .EXAMPLE Get-LabStatus -ConfigurationData .\TestLabGuide.psd1 -Credential (Get-Credential) Prompts for credentials to connect to the computers defined in the DSC configuration document (.psd1) and query the LCM state. .EXAMPLE Get-LabStatus -ConfigurationData .\TestLabGuide.psd1 -PreferNodeProperty IPAddress -Credential (Get-Credential) Prompts for credentials to connect to the computers by their IPAddress node property as defined in the DSC configuration document (.psd1) and query the LCM state. #> [CmdletBinding()] param ( ## Connect to the computer name(s) specified. [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName, ParameterSetName = 'ComputerName')] [System.String[]] $ComputerName, ## Connect to all nodes defined in the a Desired State Configuration (DSC) configuration (.psd1) document. [Parameter(Mandatory, ValueFromPipeline, ParameterSetName = 'ConfigurationData')] [System.Collections.Hashtable] [Microsoft.PowerShell.DesiredStateConfiguration.ArgumentToConfigurationDataTransformationAttribute()] $ConfigurationData, ## Use an alternative property for the computer name to connect to. Use this option when a configuration document's ## node name does not match the computer name, e.g. use the IPAddress property instead of the NodeName property. [Parameter(ValueFromPipelineByPropertyName, ParameterSetName = 'ConfigurationData')] [System.String] $PreferNodeProperty, ## Specifies the application name in the connection. The default value of the ApplicationName parameter is WSMAN. ## The complete identifier for the remote endpoint is in the following format: ## ## <transport>://<server>:<port>/<ApplicationName> ## ## For example: `http://server01:8080/WSMAN` ## ## Internet Information Services (IIS), which hosts the session, forwards requests with this endpoint to the ## specified application. This default setting of WSMAN is appropriate for most uses. This parameter is designed ## to be used if many computers establish remote connections to one computer that is running Windows PowerShell. ## In this case, IIS hosts Web Services for Management (WS-Management) for efficiency. [Parameter(ValueFromPipelineByPropertyName)] [System.String] $ApplicationName, ## Specifies the authentication mechanism to be used at the server. The acceptable values for this parameter are: ## ## - Basic. Basic is a scheme in which the user name and password are sent in clear text to the server or proxy. ## - Default. Use the authentication method implemented by the WS-Management protocol. This is the default. - ## Digest. Digest is a challenge-response scheme that uses a server-specified data string for the challenge. - ## Kerberos. The client computer and the server mutually authenticate by using Kerberos certificates. - ## Negotiate. Negotiate is a challenge-response scheme that negotiates with the server or proxy to determine the ## scheme to use for authentication. For example, this parameter value allows for negotiation to determine ## whether the Kerberos protocol or NTLM is used. - CredSSP. Use Credential Security Support Provider (CredSSP) ## authentication, which lets the user delegate credentials. This option is designed for commands that run on one ## remote computer but collect data from or run additional commands on other remote computers. ## ## Caution: CredSSP delegates the user credentials from the local computer to a remote computer. This practice ## increases the security risk of the remote operation. If the remote computer is compromised, when credentials ## are passed to it, the credentials can be used to control the network session. ## ## Important: If you do not specify the Authentication parameter,, the Test-WSMan request is sent to the remote ## computer anonymously, without using authentication. If the request is made anonymously, it returns no ## information that is specific to the operating-system version. Instead, this cmdlet displays null values for ## the operating system version and service pack level (OS: 0.0.0 SP: 0.0). [Parameter(ValueFromPipelineByPropertyName)] [ValidateSet('None','Default','Digest','Negotiate','Basic','Kerberos','ClientCertificate','Credssp')] [System.String] $Authentication = 'Default', ## Specifies the digital public key certificate (X509) of a user account that has permission to perform this ## action. Enter the certificate thumbprint of the certificate. ## ## Certificates are used in client certificate-based authentication. They can be mapped only to local user ## accounts; they do not work with domain accounts. ## ## To get a certificate thumbprint, use the Get-Item or Get-ChildItem command in the Windows PowerShell Cert: ## drive. [Parameter(ValueFromPipelineByPropertyName)] [System.String] $CertificateThumbprint, ## Specifies the port to use when the client connects to the WinRM service. When the transport is HTTP, the ## default port is 80. When the transport is HTTPS, the default port is 443. ## ## When you use HTTPS as the transport, the value of the ComputerName parameter must match the server's ## certificate common name (CN). [Parameter(ValueFromPipelineByPropertyName)] [System.Int32] $Port, ## Specifies that the Secure Sockets Layer (SSL) protocol is used to establish a connection to the remote ## computer. By default, SSL is not used. ## ## WS-Management encrypts all the Windows PowerShell content that is transmitted over the network. The UseSSL ## parameter lets you specify the additional protection of HTTPS instead of HTTP. If SSL is not available on the ## port that is used for the connection, and you specify this parameter, the command fails. [Parameter(ValueFromPipelineByPropertyName)] [System.Management.Automation.SwitchParameter] $UseSSL, ## Credential used to connect to the remote computer. [Parameter(ValueFromPipeline, ValueFromPipelineByPropertyName)] [System.Management.Automation.PSCredential] [System.Management.Automation.CredentialAttribute()] $Credential ) begin { ## Authentication might not be explicitly passed, add it so it gets splatted $PSBoundParameters['Authentication'] = $Authentication; } process { if ($PSCmdlet.ParameterSetName -eq 'ConfigurationData') { $nodes = $ConfigurationData.AllNodes | Where-Object { $_.NodeName -ne '*' }; foreach ($node in $nodes) { $nodeName = $node.NodeName; if (($PSBoundParameters.ContainsKey('PreferNodeProperty')) -and (-not [System.String]::IsNullOrEmpty($node[$PreferNodeProperty]))) { $nodeName = $node[$PreferNodeProperty]; } $ComputerName += $nodeName; } } $sessions = Get-PSSession; $activeSessions = @(); $inactiveSessions = @(); ## Remove parameters that aren't supported by Get-PSSession, Test-WSMan and New-PSSession [ref] $null = $PSBoundParameters.Remove('ComputerName'); [ref] $null = $PSBoundParameters.Remove('ConfigurationData'); [ref] $null = $PSBoundParameters.Remove('PreferNodeProperty'); [ref] $null = $PSBoundParameters.Remove('ErrorAction'); foreach ($computer in $ComputerName) { $session = $sessions | Where-Object { $_.ComputerName -eq $computer -and $_.State -eq 'Opened' } | Select-Object -First 1; if (-not $session) { Write-Verbose -Message ($localized.TestingWinRMConnection -f $computer); try { if (Test-WSMan -ComputerName $computer -ErrorAction Stop @PSBoundParameters) { ## WSMan is up so we should be able to connect, if not throw.. Write-Verbose -Message ($localized.ConnectingRemoteSession -f $computer); $activeSessions += New-PSSession -ComputerName $computer -ErrorAction Stop @PSBoundParameters; } } catch { $inactiveSessions += $computer; Write-Error $_; } } else { Write-Verbose -Message ($localized.ReusingExistingRemoteSession -f $computer); $activeSessions += $session } } #end foreach computer if ($activeSessions.Count -gt 0) { Write-Verbose -Message ($localized.QueryingActiveSessions -f ($activeSessions.ComputerName -join "','")); $results = Invoke-Command -Session $activeSessions -ScriptBlock { Get-DscLocalConfigurationManager | Select-Object -Property LCMVersion, LCMState; }; } foreach ($computer in $ComputerName) { if ($computer -in $inactiveSessions) { $labState = [PSCustomObject] @{ ComputerName = $computer; LCMVersion = ''; LCMState = 'Unknown'; Completed = $false; } Write-Output -InputObject $labState; } else { $result = $results | Where-Object { $_.PSComputerName -eq $computer }; $labState = [PSCustomObject] @{ ComputerName = $result.PSComputerName; LCMVersion = $result.LCMVersion; LCMState = $result.LCMState; Completed = $result.LCMState -eq 'Idle'; } Write-Output -InputObject $labState; } } #end foreach computer } #end process } #end function # SIG # Begin signature block # MIIX1gYJKoZIhvcNAQcCoIIXxzCCF8MCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUVC1eYj34J5CbKUyWZfY6BwmX # I3CgghMJMIID7jCCA1egAwIBAgIQfpPr+3zGTlnqS5p31Ab8OzANBgkqhkiG9w0B # AQUFADCBizELMAkGA1UEBhMCWkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTEUMBIG # A1UEBxMLRHVyYmFudmlsbGUxDzANBgNVBAoTBlRoYXd0ZTEdMBsGA1UECxMUVGhh # d3RlIENlcnRpZmljYXRpb24xHzAdBgNVBAMTFlRoYXd0ZSBUaW1lc3RhbXBpbmcg # Q0EwHhcNMTIxMjIxMDAwMDAwWhcNMjAxMjMwMjM1OTU5WjBeMQswCQYDVQQGEwJV # UzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xMDAuBgNVBAMTJ1N5bWFu # dGVjIFRpbWUgU3RhbXBpbmcgU2VydmljZXMgQ0EgLSBHMjCCASIwDQYJKoZIhvcN # AQEBBQADggEPADCCAQoCggEBALGss0lUS5ccEgrYJXmRIlcqb9y4JsRDc2vCvy5Q # WvsUwnaOQwElQ7Sh4kX06Ld7w3TMIte0lAAC903tv7S3RCRrzV9FO9FEzkMScxeC # i2m0K8uZHqxyGyZNcR+xMd37UWECU6aq9UksBXhFpS+JzueZ5/6M4lc/PcaS3Er4 # ezPkeQr78HWIQZz/xQNRmarXbJ+TaYdlKYOFwmAUxMjJOxTawIHwHw103pIiq8r3 # +3R8J+b3Sht/p8OeLa6K6qbmqicWfWH3mHERvOJQoUvlXfrlDqcsn6plINPYlujI # fKVOSET/GeJEB5IL12iEgF1qeGRFzWBGflTBE3zFefHJwXECAwEAAaOB+jCB9zAd # BgNVHQ4EFgQUX5r1blzMzHSa1N197z/b7EyALt0wMgYIKwYBBQUHAQEEJjAkMCIG # CCsGAQUFBzABhhZodHRwOi8vb2NzcC50aGF3dGUuY29tMBIGA1UdEwEB/wQIMAYB # Af8CAQAwPwYDVR0fBDgwNjA0oDKgMIYuaHR0cDovL2NybC50aGF3dGUuY29tL1Ro # YXd0ZVRpbWVzdGFtcGluZ0NBLmNybDATBgNVHSUEDDAKBggrBgEFBQcDCDAOBgNV # HQ8BAf8EBAMCAQYwKAYDVR0RBCEwH6QdMBsxGTAXBgNVBAMTEFRpbWVTdGFtcC0y # MDQ4LTEwDQYJKoZIhvcNAQEFBQADgYEAAwmbj3nvf1kwqu9otfrjCR27T4IGXTdf # plKfFo3qHJIJRG71betYfDDo+WmNI3MLEm9Hqa45EfgqsZuwGsOO61mWAK3ODE2y # 0DGmCFwqevzieh1XTKhlGOl5QGIllm7HxzdqgyEIjkHq3dlXPx13SYcqFgZepjhq # IhKjURmDfrYwggSjMIIDi6ADAgECAhAOz/Q4yP6/NW4E2GqYGxpQMA0GCSqGSIb3 # DQEBBQUAMF4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3Jh # dGlvbjEwMC4GA1UEAxMnU3ltYW50ZWMgVGltZSBTdGFtcGluZyBTZXJ2aWNlcyBD # QSAtIEcyMB4XDTEyMTAxODAwMDAwMFoXDTIwMTIyOTIzNTk1OVowYjELMAkGA1UE # BhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMTQwMgYDVQQDEytT # eW1hbnRlYyBUaW1lIFN0YW1waW5nIFNlcnZpY2VzIFNpZ25lciAtIEc0MIIBIjAN # BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAomMLOUS4uyOnREm7Dv+h8GEKU5Ow # mNutLA9KxW7/hjxTVQ8VzgQ/K/2plpbZvmF5C1vJTIZ25eBDSyKV7sIrQ8Gf2Gi0 # jkBP7oU4uRHFI/JkWPAVMm9OV6GuiKQC1yoezUvh3WPVF4kyW7BemVqonShQDhfu # ltthO0VRHc8SVguSR/yrrvZmPUescHLnkudfzRC5xINklBm9JYDh6NIipdC6Anqh # d5NbZcPuF3S8QYYq3AhMjJKMkS2ed0QfaNaodHfbDlsyi1aLM73ZY8hJnTrFxeoz # C9Lxoxv0i77Zs1eLO94Ep3oisiSuLsdwxb5OgyYI+wu9qU+ZCOEQKHKqzQIDAQAB # o4IBVzCCAVMwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAO # BgNVHQ8BAf8EBAMCB4AwcwYIKwYBBQUHAQEEZzBlMCoGCCsGAQUFBzABhh5odHRw # Oi8vdHMtb2NzcC53cy5zeW1hbnRlYy5jb20wNwYIKwYBBQUHMAKGK2h0dHA6Ly90 # cy1haWEud3Muc3ltYW50ZWMuY29tL3Rzcy1jYS1nMi5jZXIwPAYDVR0fBDUwMzAx # oC+gLYYraHR0cDovL3RzLWNybC53cy5zeW1hbnRlYy5jb20vdHNzLWNhLWcyLmNy # bDAoBgNVHREEITAfpB0wGzEZMBcGA1UEAxMQVGltZVN0YW1wLTIwNDgtMjAdBgNV # HQ4EFgQURsZpow5KFB7VTNpSYxc/Xja8DeYwHwYDVR0jBBgwFoAUX5r1blzMzHSa # 1N197z/b7EyALt0wDQYJKoZIhvcNAQEFBQADggEBAHg7tJEqAEzwj2IwN3ijhCcH # bxiy3iXcoNSUA6qGTiWfmkADHN3O43nLIWgG2rYytG2/9CwmYzPkSWRtDebDZw73 # BaQ1bHyJFsbpst+y6d0gxnEPzZV03LZc3r03H0N45ni1zSgEIKOq8UvEiCmRDoDR # EfzdXHZuT14ORUZBbg2w6jiasTraCXEQ/Bx5tIB7rGn0/Zy2DBYr8X9bCT2bW+IW # yhOBbQAuOA2oKY8s4bL0WqkBrxWcLC9JG9siu8P+eJRRw4axgohd8D20UaF5Mysu # e7ncIAkTcetqGVvP6KUwVyyJST+5z3/Jvz4iaGNTmr1pdKzFHTx/kuDDvBzYBHUw # ggUwMIIEGKADAgECAhAECRgbX9W7ZnVTQ7VvlVAIMA0GCSqGSIb3DQEBCwUAMGUx # CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 # dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9v # dCBDQTAeFw0xMzEwMjIxMjAwMDBaFw0yODEwMjIxMjAwMDBaMHIxCzAJBgNVBAYT # AlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2Vy # dC5jb20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBDb2RlIFNp # Z25pbmcgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD407Mcfw4R # r2d3B9MLMUkZz9D7RZmxOttE9X/lqJ3bMtdx6nadBS63j/qSQ8Cl+YnUNxnXtqrw # nIal2CWsDnkoOn7p0WfTxvspJ8fTeyOU5JEjlpB3gvmhhCNmElQzUHSxKCa7JGnC # wlLyFGeKiUXULaGj6YgsIJWuHEqHCN8M9eJNYBi+qsSyrnAxZjNxPqxwoqvOf+l8 # y5Kh5TsxHM/q8grkV7tKtel05iv+bMt+dDk2DZDv5LVOpKnqagqrhPOsZ061xPeM # 0SAlI+sIZD5SlsHyDxL0xY4PwaLoLFH3c7y9hbFig3NBggfkOItqcyDQD2RzPJ6f # pjOp/RnfJZPRAgMBAAGjggHNMIIByTASBgNVHRMBAf8ECDAGAQH/AgEAMA4GA1Ud # DwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzB5BggrBgEFBQcBAQRtMGsw # JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw # AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE # Um9vdENBLmNydDCBgQYDVR0fBHoweDA6oDigNoY0aHR0cDovL2NybDQuZGlnaWNl # cnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNybDA6oDigNoY0aHR0cDov # L2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNybDBP # BgNVHSAESDBGMDgGCmCGSAGG/WwAAgQwKjAoBggrBgEFBQcCARYcaHR0cHM6Ly93 # d3cuZGlnaWNlcnQuY29tL0NQUzAKBghghkgBhv1sAzAdBgNVHQ4EFgQUWsS5eyoK # o6XqcQPAYPkt9mV1DlgwHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNtyA8w # DQYJKoZIhvcNAQELBQADggEBAD7sDVoks/Mi0RXILHwlKXaoHV0cLToaxO8wYdd+ # C2D9wz0PxK+L/e8q3yBVN7Dh9tGSdQ9RtG6ljlriXiSBThCk7j9xjmMOE0ut119E # efM2FAaK95xGTlz/kLEbBw6RFfu6r7VRwo0kriTGxycqoSkoGjpxKAI8LpGjwCUR # 4pwUR6F6aGivm6dcIFzZcbEMj7uo+MUSaJ/PQMtARKUT8OZkDCUIQjKyNookAv4v # cn4c10lFluhZHen6dGRrsutmQ9qzsIzV6Q3d9gEgzpkxYz0IGhizgZtPxpMQBvwH # gfqL2vmCSfdibqFT+hKUGIUukpHqaGxEMrJmoecYpJpkUe8wggU4MIIEIKADAgEC # AhAPxQCJrE9ObGzkCRS7EwyyMA0GCSqGSIb3DQEBCwUAMHIxCzAJBgNVBAYTAlVT # MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j # b20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBDb2RlIFNpZ25p # bmcgQ0EwHhcNMTcwNTI2MDAwMDAwWhcNMTkwOTI3MTIwMDAwWjB1MQswCQYDVQQG # EwJHQjETMBEGA1UECBMKR2Fyc2luZ3RvbjEPMA0GA1UEBxMGT3hmb3JkMR8wHQYD # VQQKExZWaXJ0dWFsIEVuZ2luZSBMaW1pdGVkMR8wHQYDVQQDExZWaXJ0dWFsIEVu # Z2luZSBMaW1pdGVkMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnB1O # DV2jw/aMIUWnD9f9RCbAoiJ8LQcznYo42P22YEi6g7QY+kKmAzGgEhbsE4UVuGWS # el4y6FxGWq51SK5P/gqgZgzyP8FkIUzLxsCrtx9OBnsPPeL+/An5CpcsKsl2lCSz # NMwcz16hjcE0vCLio1NOcwvfO65qdNT2gRIEnIYhRX88dG3V30BH2aKWG5X9t1IW # RmozjZ8I7iLEoWFJWQSuICSGyvyiPqnXF3nxdroE8O4fc1U90x5qefX0RlwKeq47 # UFuI0Y/59pB3/jss5BYvAXp3g+6EKlDwgW1a/MLVsLQbdzlALFUv5YxEqkXA8IEM # xpwgBjm117SmyZ98QQIDAQABo4IBxTCCAcEwHwYDVR0jBBgwFoAUWsS5eyoKo6Xq # cQPAYPkt9mV1DlgwHQYDVR0OBBYEFL5NkOqMm0S8AyuXI1EZIdoK9DD/MA4GA1Ud # DwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzB3BgNVHR8EcDBuMDWgM6Ax # hi9odHRwOi8vY3JsMy5kaWdpY2VydC5jb20vc2hhMi1hc3N1cmVkLWNzLWcxLmNy # bDA1oDOgMYYvaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL3NoYTItYXNzdXJlZC1j # cy1nMS5jcmwwTAYDVR0gBEUwQzA3BglghkgBhv1sAwEwKjAoBggrBgEFBQcCARYc # aHR0cHM6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAIBgZngQwBBAEwgYQGCCsGAQUF # BwEBBHgwdjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tME4G # CCsGAQUFBzAChkJodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRT # SEEyQXNzdXJlZElEQ29kZVNpZ25pbmdDQS5jcnQwDAYDVR0TAQH/BAIwADANBgkq # hkiG9w0BAQsFAAOCAQEAQC8qzSz1bIoEqbjDx3VtYDjtUjuFEVDFYi9+vREl6jM+ # iqOiNiwCXUkbxGTuDrWW9I1YOn8a7SCCYapZ+T0G3RMa+rQHXFYKbYTmXC3C41Cd # MQzZn4wTuGRNQLTgNSuclwMnNmFVe7K5S/0Dv+GaLSKuRLAxpcPxeTtmRZIIBXF7 # wwRS0+V28jB9VyeSOdqsPIFYf5GSfu7KcIhmNQ/DUroulaS5JIrPUhwkf1LZMm0B # /0adpaPbFy95M1emij96rrgy2hX8N/FrWBh13/81V6NO3b8mhCfjqb632dG4EUTi # FXDvqP2hpWw0nO/pFZsMsEK88eiV93XDDEG/MjAApzGCBDcwggQzAgEBMIGGMHIx # CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 # dy5kaWdpY2VydC5jb20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJ # RCBDb2RlIFNpZ25pbmcgQ0ECEA/FAImsT05sbOQJFLsTDLIwCQYFKw4DAhoFAKB4 # MBgGCisGAQQBgjcCAQwxCjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQB # gjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkE # MRYEFIkOIuRriAm4lhOPdN7jo7xgpOBHMA0GCSqGSIb3DQEBAQUABIIBADsAbLeX # P7AjTjYOvuQBil8cZezTIaCtwSCQkEyPq3Jpt2mqNinBecTlTihp5GClLP+lEtni # vkNniOhXCcbozuSq8sCRZC67Yyquu2wsUHH/vtMzXW2K21+TSeT4Yhw3nf6U+6Tc # SFCH7HcxoCTdz9vjKl4M+UnzkLW/g91crKROrzBmCK9wE7rNMPAjZ+p+g0aLJAgG # AuvIloxaOXxF198CwDi5tS30Z/xCHvg/cNaLQFdyKFI9eP0S1M3KUpjrW09SPsAi # ojxw7t44EWv5g+c8+vEH5++h0Q/yZ62ugp6qGSHpgRPOYM37PiuPyzdeLSZV78lS # CSI5x3yV8LE2V3ChggILMIICBwYJKoZIhvcNAQkGMYIB+DCCAfQCAQEwcjBeMQsw # CQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xMDAuBgNV # BAMTJ1N5bWFudGVjIFRpbWUgU3RhbXBpbmcgU2VydmljZXMgQ0EgLSBHMgIQDs/0 # OMj+vzVuBNhqmBsaUDAJBgUrDgMCGgUAoF0wGAYJKoZIhvcNAQkDMQsGCSqGSIb3 # DQEHATAcBgkqhkiG9w0BCQUxDxcNMTgwNzEwMTY0NzU1WjAjBgkqhkiG9w0BCQQx # FgQUlUzHnLJb8vsygZcVACVW7VaRxOQwDQYJKoZIhvcNAQEBBQAEggEAMUKEKzVS # dSSP2rb07vDDTlL6DcEQEFC5qwyJvIo4Jx+puF6V+7iLpH235ZHsuNGyEerC6fpR # 4+UaWTbv3ZPpu9MGvT0ppOiJb2ZM7rgonXCL82au2XeTR2qqsAJSYrmpmzd+NHM0 # Cu+0N78yz3rtsmdIqd1112EjUEgVHOpen3GmapX7gOgzmxuUg3vQtGaq0qVS/tQm # 6Aubirczxu4UGMIu3fMZOf6kR2fXsM7DfX+JOYKa8AkD9yUMlEPbH5lqJCKqKdt1 # EcaDZTRklsrdf6dACECHJqSUJsOPpbscUp6pNgn+qhvns5qJMPfLIKbWjDfppx2c # 3a2M9xg2hSvKLQ== # SIG # End signature block |