DSCResources/VE_XD7Common/VE_XD7Common.psm1
Import-LocalizedData -BindingVariable localized -FileName VE_XD7Common.Resources.psd1; #region Private Functions function AddInvokeScriptBlockCredentials { <# .SYNOPSIS Adds the required Invoke-Command parameters for loopback processing with CredSSP. #> [CmdletBinding()] [OutputType([System.Collections.Hashtable])] param ( [Parameter(Mandatory)] [System.Collections.Hashtable] $Hashtable, [Parameter(Mandatory)] [System.Management.Automation.PSCredential] [System.Management.Automation.CredentialAttribute()] $Credential ) process { $Hashtable['ComputerName'] = $env:COMPUTERNAME; $Hashtable['Credential'] = $Credential; $Hashtable['Authentication'] = 'Credssp'; } } #end function AddInvokeScriptBlockCredentials function GetHostname { [CmdletBinding()] [OutputType([System.String])] param ( ) process { $globalIpProperties = [System.Net.NetworkInformation.IPGlobalProperties]::GetIPGlobalProperties(); if ($globalIpProperties.DomainName) { return '{0}.{1}' -f $globalIpProperties.HostName, $globalIpProperties.DomainName; } else { return $globalIpProperties.HostName; } } #end process } #end function GetHostname function GetRegistryValue { <# .SYNOPSIS Returns a registry string value. .NOTES This is an internal function and shouldn't be called from outside. This function enables registry calls to be unit tested. #> [CmdletBinding(SupportsShouldProcess)] [Diagnostics.CodeAnalysis.SuppressMessageAttribute('PSShouldProcess', '')] [OutputType([System.String])] param ( # Registry key name/path to query. [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [Alias('Path')] [System.String] $Key, # Registry value to return. [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [System.String] $Name ) process { $itemProperty = Get-ItemProperty -Path $Key -Name $Name -ErrorAction SilentlyContinue; if ($itemProperty.$Name) { return $itemProperty.$Name; } return ''; } } #end function GetRegistryValue function StartWaitProcess { <# .SYNOPSIS Starts and waits for a process to exit. .NOTES This is an internal function and shouldn't be called from outside. #> [CmdletBinding(SupportsShouldProcess)] [OutputType([System.Int32])] param ( # Path to process to start. [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [System.String] $FilePath, # Arguments (if any) to apply to the process. [Parameter()] [AllowNull()] [System.String[]] $ArgumentList, # Credential to start the process as. [Parameter()] [AllowNull()] [System.Management.Automation.PSCredential] [System.Management.Automation.CredentialAttribute()] $Credential, # Working directory [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $WorkingDirectory = (Split-Path -Path $FilePath -Parent) ) process { $startProcessParams = @{ FilePath = $FilePath; WorkingDirectory = $WorkingDirectory; NoNewWindow = $true; PassThru = $true; }; $displayParams = '<None>'; if ($ArgumentList) { $displayParams = [System.String]::Join(' ', $ArgumentList); $startProcessParams['ArgumentList'] = $ArgumentList; } Write-Verbose ($localized.StartingProcess -f $FilePath, $displayParams); if ($Credential) { Write-Verbose ($localized.StartingProcessAs -f $Credential.UserName); $startProcessParams['Credential'] = $Credential; } if ($PSCmdlet.ShouldProcess($FilePath, 'Start Process')) { $process = Start-Process @startProcessParams -ErrorAction Stop; } if ($PSCmdlet.ShouldProcess($FilePath, 'Wait Process')) { Write-Verbose ($localized.ProcessLaunched -f $process.Id); Write-Verbose ($localized.WaitingForProcessToExit -f $process.Id); $process.WaitForExit(); $exitCode = [System.Convert]::ToInt32($process.ExitCode); Write-Verbose ($localized.ProcessExited -f $process.Id, $exitCode); } return $exitCode; } #end process } #end function StartWaitProcess function FindXDModule { <# .SYNOPSIS Locates a module's manifest (.psd1) file. #> [CmdletBinding()] [OutputType([System.String])] param ( [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Name = 'Citrix.XenDesktop.Admin', [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Path = 'C:\Program Files\Citrix\XenDesktopPoshSdk\Module\Citrix.XenDesktop.Admin.V1' ) process { $module = Get-ChildItem -Path $Path -Include "$Name.psd1" -File -Recurse; if (-not $module) { # If we have no .psd1 file, search for a .psm1 (for StoreFront) $module = Get-ChildItem -Path $Path -Include "$Name.psm1" -File -Recurse; } return $module.FullName; } #end process } #end function FindModule function TestXDModule { <# .SYNOPSIS Tests whether Powershell modules or Snapin are available/registered. #> [CmdletBinding()] [OutputType([System.Boolean])] param ( [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Name = 'Citrix.XenDesktop.Admin', [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Path = 'C:\Program Files\Citrix\XenDesktopPoshSdk\Module\Citrix.XenDesktop.Admin.V1', [Parameter()] [System.Management.Automation.SwitchParameter] $IsSnapin ) process { if ($IsSnapin) { if (Get-PSSnapin -Name $Name -Registered -ErrorAction SilentlyContinue) { return $true; } } ## If testing a snap-in and it fails, try resolving it as a module (#18) if (FindXDModule -Name $Name -Path $Path) { return $true; } return $false; } #end process } #end TestModule function AssertXDModule { <# .SYNOPSIS Asserts whether all the specified modules are present, throwing if not. #> [CmdletBinding()] param ( [Parameter()] [ValidateNotNullOrEmpty()] [System.String[]] $Name, [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $Path = 'C:\Program Files\Citrix\XenDesktopPoshSdk\Module\Citrix.XenDesktop.Admin.V1', [Parameter()] [System.Management.Automation.SwitchParameter] $IsSnapin ) process { foreach ($moduleName in $Name) { if (-not (TestXDModule -Name $moduleName -Path $Path -IsSnapin:$IsSnapin)) { ThrowInvalidProgramException -ErrorId $moduleName -ErrorMessage $localized.XenDesktopSDKNotFoundError; } } #end foreach module } #end process } #end function AssertXDModule function Add-PSSnapin { <# .SYNOPSIS Proxy function to load Citrix PowerShell snapins within a module at the global scope. #> [CmdletBinding()] param ( [Parameter(Mandatory, ValueFromPipeline, ValueFromPipelineByPropertyName)] [System.String[]] $Name ) process { foreach ($snapinName in $Name) { $modulePath = Join-Path -Path $PSScriptRoot -ChildPath "$snapinName.psm1"; Import-Module -Name $modulePath -Global -Verbose:$false; } #end foreach snapin } #end process } #end function Add-PSSnapin function GetXDBrokerMachine { <# .SYNOPSIS Searches for a registered Citrix XenDesktop machine by name. #> [CmdletBinding()] param ( [Parameter(Mandatory)] [System.String] $MachineName ) process { if ($MachineName.Contains('.')) { ## Attempt to locate the machine by FQDN $brokerMachine = Get-BrokerMachine -DNSName $MachineName -ErrorAction SilentlyContinue; } elseif ($MachineName.Contains('\')) { ## Otherwise attempt to locate the machine by DomainName\NetBIOSName $brokerMachine = Get-BrokerMachine -MachineName $MachineName -ErrorAction SilentlyContinue; } else { ## Failing all else, perform a wildcard search $brokerMachine = Get-BrokerMachine -MachineName "*\$MachineName" -ErrorAction SilentlyContinue; } if ($null -eq $brokerMachine) { Write-Error -ErrorId 'MachineNotFound' -Message ($localized.MachineNotFoundError -f $Machine); return; } elseif (($brokerMachine).Count -gt 1) { Write-Error -ErrorId 'AmbiguousMachineReference' -Message ($localized.AmbiguousMachineReferenceError -f $MachineName); return; } else { return $brokerMachine; } } #end process } #end function GetXDBrokerMachine function TestXDMachineIsExistingMember { <# .SYNOPSIS Tests whether a machine is an existing member of a list of FQDN machine members. #> [CmdletBinding()] [OutputType([System.Boolean])] param ( [Parameter(Mandatory)] [System.String] $MachineName, [Parameter()] [System.String[]] $ExistingMembers ) process { if ((-not $MachineName.Contains('\')) -and (-not $MachineName.Contains('.'))) { Write-Warning -Message ($localized.MachineNameNotFullyQualifiedWarning -f $MachineName); $netBIOSName = $MachineName; } elseif ($MachineName.Contains('\')) { $netBIOSName = $MachineName.Split('\')[1]; } if ($ExistingMembers -contains $MachineName) { return $true; } elseif ($ExistingMembers -like '{0}.*' -f $netBIOSName) { return $true; } else { return $false; } } #end process } #end function TestXDMachine function TestXDMachineMembership { <# .SYNOPSIS Provides a centralised function to test whether machine membership of a Machine Catalog or Delivery Group are correct - evaluating FQDNs, DOMAINNAME\NETBIOS and NETBIOS name formats. #> [CmdletBinding()] [OutputType([System.Boolean])] param ( [Parameter(Mandatory)] [System.String[]] $RequiredMembers, [Parameter(Mandatory)] [ValidateSet('Present','Absent')] [System.String] $Ensure, [Parameter()] [System.String[]] $ExistingMembers ) process { $isInCompliance = $true; foreach ($member in $RequiredMembers) { if (TestXDMachineIsExistingMember -MachineName $member -ExistingMembers $ExistingMembers) { if ($Ensure -eq 'Absent') { Write-Verbose ($localized.SurplusMachineReference -f $member); $isInCompliance = $false; } } else { if ($Ensure -eq 'Present') { Write-Verbose ($localized.MissingMachineReference -f $member); $isInCompliance = $false; } } } #end foreach member return $isInCompliance; } #end process } #end function TestXDMachineMembers function ResolveXDBrokerMachine { <# .SYNOPSIS Returns a machine machine from an existing collection of Citrix XenDesktop machines assigned to a Machine Catalog or Delivery Group #> [CmdletBinding()] [OutputType([System.String])] param ( [Parameter(Mandatory)] [System.String] $MachineName, [Parameter(Mandatory)] [AllowNull()] [System.Object[]] $BrokerMachines ) process { foreach ($machine in $brokerMachines) { ## Try matching on DNS name if (($machine.DNSName -eq $MachineName) -or ($machine.MachineName -eq $MachineName)) { return $machine; } elseif ((-not $MachineName.Contains('\')) -and ($machine.MachineName -match '^\S+\\{0}$' -f $MachineName)) { ## Try matching based on DOMAIN\NETBIOS name return $machine } } #end foreach machine return $null; } #end process } #end function ResolveXDBrokerMachine function ThrowInvalidOperationException { <# .SYNOPSIS Throws terminating error of category NotInstalled with specified errorId and errorMessage. #> [CmdletBinding()] param( [Parameter(Mandatory)] [System.String] $ErrorId, [Parameter(Mandatory)] [System.String] $ErrorMessage ) process { $errorCategory = [System.Management.Automation.ErrorCategory]::InvalidArgument; $exception = New-Object -TypeName 'System.InvalidOperationException' -ArgumentList $ErrorMessage; $errorRecord = New-Object -TypeName 'System.Management.Automation.ErrorRecord' -ArgumentList $exception, $ErrorId, $errorCategory, $null; throw $errorRecord; } #end process } #end function ThrowInvalidOperationException function ThrowInvalidProgramException { <# .SYNOPSIS Throws terminating error of category NotInstalled with specified errorId and errorMessage. #> [CmdletBinding()] param( [Parameter(Mandatory)] [System.String] $ErrorId, [Parameter(Mandatory)] [System.String] $ErrorMessage ) process { $errorCategory = [System.Management.Automation.ErrorCategory]::NotInstalled; $exception = New-Object -TypeName 'System.InvalidProgramException' -ArgumentList $ErrorMessage; $errorRecord = New-Object -TypeName 'System.Management.Automation.ErrorRecord' -ArgumentList $exception, $ErrorId, $errorCategory, $null; throw $errorRecord; } #end process } #end function ThrowInvalidProgramException function ThrowOperationCanceledException { <# .SYNOPSIS Throws terminating error of category InvalidOperation with specified errorId and errorMessage. #> param( [Parameter(Mandatory)] [System.String] $ErrorId, [Parameter(Mandatory)] [System.String] $ErrorMessage ) process { $errorCategory = [System.Management.Automation.ErrorCategory]::InvalidOperation; $exception = New-Object -TypeName 'System.OperationCanceledException' -ArgumentList $ErrorMessage; $errorRecord = New-Object -TypeName 'System.Management.Automation.ErrorRecord' -ArgumentList $exception, $ErrorId, $errorCategory, $null; throw $errorRecord; } #end process } #end function ThrowOperationCanceledException function TestXDInstalledRole { <# .SYNOPSIS Tests whether a Citrix XenDesktop 7.x role is installed. #> [CmdletBinding()] [OutputType([System.Boolean])] param ( ## Citrix XenDesktop 7.x role to query. [Parameter(Mandatory)] [ValidateSet('Controller','Studio','Storefront','Licensing','Director','DesktopVDA','SessionVDA')] [System.String[]] $Role ) process { $installedRoles = GetXDInstalledRole -Role $Role; foreach ($r in $Role) { if ($installedRoles -notcontains $r) { return $false; } } return $true; } #end process } #end function TestXDRole function GetXDInstalledRole { <# .SYNOPSIS Returns installed Citrix XenDesktop 7.x installed products. #> [CmdletBinding()] [OutputType([System.String[]])] param ( ## Citrix XenDesktop 7.x role to query. [Parameter(Mandatory)] [ValidateSet('Controller','Studio','Storefront','Licensing','Director','DesktopVDA','SessionVDA')] [System.String[]] $Role ) process { $installedProducts = Get-ItemProperty 'HKLM:\SOFTWARE\Classes\Installer\Products\*' -ErrorAction SilentlyContinue | Where-Object { $_.ProductName -like '*Citrix*' -and $_.ProductName -notlike '*snap-in' } | Select-Object -ExpandProperty ProductName; $installedRoles = @(); foreach ($r in $Role) { switch ($r) { 'Controller' { $filter = 'Citrix Broker Service'; } 'Studio' { $filter = 'Citrix Studio'; } 'Storefront' { $filter = 'Citrix Storefront$'; } 'Licensing' { $filter = 'Citrix Licensing'; } 'Director' { $filter = 'Citrix Director(?!.VDA Plugin)'; } 'DesktopVDA' { $filter = 'Citrix Virtual Desktop Agent'; } 'SessionVDA' { $filter = 'Citrix Virtual Desktop Agent'; } } $result = $installedProducts -match $filter; if ([System.String]::IsNullOrEmpty($result)) { } elseif ($result) { $installedRoles += $r; } } return $installedRoles; } #end process } #end function GetXDInstalledProduct function ResolveXDSetupMedia { <# .SYNOPSIS Resolve the correct installation media source for the local architecture depending on the role. #> [CmdletBinding()] [OutputType([System.String])] param ( ## Citrix XenDesktop 7.x role to install/uninstall. [Parameter(Mandatory)] [ValidateSet('Controller','Studio','Storefront','Licensing','Director','DesktopVDA','SessionVDA')] [System.String[]] $Role, ## Citrix XenDesktop 7.x installation media path. [Parameter(Mandatory)] [ValidateNotNullOrEmpty()] [System.String] $SourcePath ) process { $architecture = 'x86'; if ([System.Environment]::Is64BitOperatingSystem) { $architecture = 'x64'; } if ($Role -contains 'DesktopVDA') { $installMedia = 'XenDesktopVdaSetup.exe'; } elseif ($Role -contains 'SessionVDA') { $installMedia = 'XenDesktopVdaSetup.exe'; } else { $installMedia = 'XenDesktopServerSetup.exe'; } $sourceArchitecturePath = Join-Path -Path $SourcePath -ChildPath $architecture; $installMediaPath = Get-ChildItem -Path $sourceArchitecturePath -Filter $installMedia -Recurse -File; if (-not $installMediaPath) { throw ($localized.NoValidSetupMediaError -f $installMedia, $sourceArchitecturePath); } return $installMediaPath.FullName; } #end process } #end function ResolveXDSetupMedia function ResolveXDServerSetupArguments { <# .SYNOPSIS Resolve the installation arguments for the associated XenDesktop role. #> [CmdletBinding()] [OutputType([System.String])] param ( ## Citrix XenDesktop 7.x role to install/uninstall. [Parameter(Mandatory)] [ValidateSet('Controller','Studio','Storefront','Licensing','Director')] [System.String[]] $Role, ## Citrix XenDesktop 7.x installation media path. [Parameter()] [ValidateNotNullOrEmpty()] [System.String] $LogPath = (Join-Path -Path $env:TMP -ChildPath '\Citrix\XenDesktop Installer'), ## Uninstall Citrix XenDesktop 7.x product. [Parameter()] [System.Management.Automation.SwitchParameter] $Uninstall ) process { $arguments = New-Object -TypeName System.Collections.ArrayList -ArgumentList @(); $arguments.AddRange(@('/QUIET', '/LOGPATH', "`"$LogPath`"", '/NOREBOOT', '/COMPONENTS')); $components = @(); foreach ($r in $Role) { switch ($r) { ## Install/uninstall component names by role 'Controller' { $components += 'CONTROLLER'; } 'Studio' { $components += 'DESKTOPSTUDIO'; } 'Storefront' { $components += 'STOREFRONT'; } 'Licensing' { $components += 'LICENSESERVER'; } 'Director' { $components += 'DESKTOPDIRECTOR'; } } #end switch Role } $componentString = [System.String]::Join(',', $components); [ref] $null = $arguments.Add($componentString); if ($Uninstall) { [ref] $null = $arguments.Add('/REMOVE'); } else { ## Additional install parameters per role if ($Role -contains 'Controller') { [ref] $null = $arguments.Add('/NOSQL'); } [ref] $null = $arguments.Add('/CONFIGURE_FIREWALL'); } return [System.String]::Join(' ', $arguments.ToArray()); } #end process } #end function ResolveXDSetupArguments #endregion Private Functions # SIG # Begin signature block # MIIX1gYJKoZIhvcNAQcCoIIXxzCCF8MCAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQUwdNvsHgXOTzpAjqJU1SJ4b1+ # B7egghMJMIID7jCCA1egAwIBAgIQfpPr+3zGTlnqS5p31Ab8OzANBgkqhkiG9w0B # AQUFADCBizELMAkGA1UEBhMCWkExFTATBgNVBAgTDFdlc3Rlcm4gQ2FwZTEUMBIG # A1UEBxMLRHVyYmFudmlsbGUxDzANBgNVBAoTBlRoYXd0ZTEdMBsGA1UECxMUVGhh # d3RlIENlcnRpZmljYXRpb24xHzAdBgNVBAMTFlRoYXd0ZSBUaW1lc3RhbXBpbmcg # Q0EwHhcNMTIxMjIxMDAwMDAwWhcNMjAxMjMwMjM1OTU5WjBeMQswCQYDVQQGEwJV # UzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xMDAuBgNVBAMTJ1N5bWFu # dGVjIFRpbWUgU3RhbXBpbmcgU2VydmljZXMgQ0EgLSBHMjCCASIwDQYJKoZIhvcN # AQEBBQADggEPADCCAQoCggEBALGss0lUS5ccEgrYJXmRIlcqb9y4JsRDc2vCvy5Q # WvsUwnaOQwElQ7Sh4kX06Ld7w3TMIte0lAAC903tv7S3RCRrzV9FO9FEzkMScxeC # i2m0K8uZHqxyGyZNcR+xMd37UWECU6aq9UksBXhFpS+JzueZ5/6M4lc/PcaS3Er4 # ezPkeQr78HWIQZz/xQNRmarXbJ+TaYdlKYOFwmAUxMjJOxTawIHwHw103pIiq8r3 # +3R8J+b3Sht/p8OeLa6K6qbmqicWfWH3mHERvOJQoUvlXfrlDqcsn6plINPYlujI # fKVOSET/GeJEB5IL12iEgF1qeGRFzWBGflTBE3zFefHJwXECAwEAAaOB+jCB9zAd # BgNVHQ4EFgQUX5r1blzMzHSa1N197z/b7EyALt0wMgYIKwYBBQUHAQEEJjAkMCIG # CCsGAQUFBzABhhZodHRwOi8vb2NzcC50aGF3dGUuY29tMBIGA1UdEwEB/wQIMAYB # Af8CAQAwPwYDVR0fBDgwNjA0oDKgMIYuaHR0cDovL2NybC50aGF3dGUuY29tL1Ro # YXd0ZVRpbWVzdGFtcGluZ0NBLmNybDATBgNVHSUEDDAKBggrBgEFBQcDCDAOBgNV # HQ8BAf8EBAMCAQYwKAYDVR0RBCEwH6QdMBsxGTAXBgNVBAMTEFRpbWVTdGFtcC0y # MDQ4LTEwDQYJKoZIhvcNAQEFBQADgYEAAwmbj3nvf1kwqu9otfrjCR27T4IGXTdf # plKfFo3qHJIJRG71betYfDDo+WmNI3MLEm9Hqa45EfgqsZuwGsOO61mWAK3ODE2y # 0DGmCFwqevzieh1XTKhlGOl5QGIllm7HxzdqgyEIjkHq3dlXPx13SYcqFgZepjhq # IhKjURmDfrYwggSjMIIDi6ADAgECAhAOz/Q4yP6/NW4E2GqYGxpQMA0GCSqGSIb3 # DQEBBQUAMF4xCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3Jh # dGlvbjEwMC4GA1UEAxMnU3ltYW50ZWMgVGltZSBTdGFtcGluZyBTZXJ2aWNlcyBD # QSAtIEcyMB4XDTEyMTAxODAwMDAwMFoXDTIwMTIyOTIzNTk1OVowYjELMAkGA1UE # BhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMTQwMgYDVQQDEytT # eW1hbnRlYyBUaW1lIFN0YW1waW5nIFNlcnZpY2VzIFNpZ25lciAtIEc0MIIBIjAN # BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAomMLOUS4uyOnREm7Dv+h8GEKU5Ow # mNutLA9KxW7/hjxTVQ8VzgQ/K/2plpbZvmF5C1vJTIZ25eBDSyKV7sIrQ8Gf2Gi0 # jkBP7oU4uRHFI/JkWPAVMm9OV6GuiKQC1yoezUvh3WPVF4kyW7BemVqonShQDhfu # ltthO0VRHc8SVguSR/yrrvZmPUescHLnkudfzRC5xINklBm9JYDh6NIipdC6Anqh # d5NbZcPuF3S8QYYq3AhMjJKMkS2ed0QfaNaodHfbDlsyi1aLM73ZY8hJnTrFxeoz # C9Lxoxv0i77Zs1eLO94Ep3oisiSuLsdwxb5OgyYI+wu9qU+ZCOEQKHKqzQIDAQAB # o4IBVzCCAVMwDAYDVR0TAQH/BAIwADAWBgNVHSUBAf8EDDAKBggrBgEFBQcDCDAO # BgNVHQ8BAf8EBAMCB4AwcwYIKwYBBQUHAQEEZzBlMCoGCCsGAQUFBzABhh5odHRw # Oi8vdHMtb2NzcC53cy5zeW1hbnRlYy5jb20wNwYIKwYBBQUHMAKGK2h0dHA6Ly90 # cy1haWEud3Muc3ltYW50ZWMuY29tL3Rzcy1jYS1nMi5jZXIwPAYDVR0fBDUwMzAx # oC+gLYYraHR0cDovL3RzLWNybC53cy5zeW1hbnRlYy5jb20vdHNzLWNhLWcyLmNy # bDAoBgNVHREEITAfpB0wGzEZMBcGA1UEAxMQVGltZVN0YW1wLTIwNDgtMjAdBgNV # HQ4EFgQURsZpow5KFB7VTNpSYxc/Xja8DeYwHwYDVR0jBBgwFoAUX5r1blzMzHSa # 1N197z/b7EyALt0wDQYJKoZIhvcNAQEFBQADggEBAHg7tJEqAEzwj2IwN3ijhCcH # bxiy3iXcoNSUA6qGTiWfmkADHN3O43nLIWgG2rYytG2/9CwmYzPkSWRtDebDZw73 # BaQ1bHyJFsbpst+y6d0gxnEPzZV03LZc3r03H0N45ni1zSgEIKOq8UvEiCmRDoDR # EfzdXHZuT14ORUZBbg2w6jiasTraCXEQ/Bx5tIB7rGn0/Zy2DBYr8X9bCT2bW+IW # yhOBbQAuOA2oKY8s4bL0WqkBrxWcLC9JG9siu8P+eJRRw4axgohd8D20UaF5Mysu # e7ncIAkTcetqGVvP6KUwVyyJST+5z3/Jvz4iaGNTmr1pdKzFHTx/kuDDvBzYBHUw # ggUwMIIEGKADAgECAhAECRgbX9W7ZnVTQ7VvlVAIMA0GCSqGSIb3DQEBCwUAMGUx # CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 # dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0RpZ2lDZXJ0IEFzc3VyZWQgSUQgUm9v # dCBDQTAeFw0xMzEwMjIxMjAwMDBaFw0yODEwMjIxMjAwMDBaMHIxCzAJBgNVBAYT # AlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2Vy # dC5jb20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBDb2RlIFNp # Z25pbmcgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQD407Mcfw4R # r2d3B9MLMUkZz9D7RZmxOttE9X/lqJ3bMtdx6nadBS63j/qSQ8Cl+YnUNxnXtqrw # nIal2CWsDnkoOn7p0WfTxvspJ8fTeyOU5JEjlpB3gvmhhCNmElQzUHSxKCa7JGnC # wlLyFGeKiUXULaGj6YgsIJWuHEqHCN8M9eJNYBi+qsSyrnAxZjNxPqxwoqvOf+l8 # y5Kh5TsxHM/q8grkV7tKtel05iv+bMt+dDk2DZDv5LVOpKnqagqrhPOsZ061xPeM # 0SAlI+sIZD5SlsHyDxL0xY4PwaLoLFH3c7y9hbFig3NBggfkOItqcyDQD2RzPJ6f # pjOp/RnfJZPRAgMBAAGjggHNMIIByTASBgNVHRMBAf8ECDAGAQH/AgEAMA4GA1Ud # DwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEFBQcDAzB5BggrBgEFBQcBAQRtMGsw # JAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEFBQcw # AoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElE # Um9vdENBLmNydDCBgQYDVR0fBHoweDA6oDigNoY0aHR0cDovL2NybDQuZGlnaWNl # cnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNybDA6oDigNoY0aHR0cDov # L2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNybDBP # BgNVHSAESDBGMDgGCmCGSAGG/WwAAgQwKjAoBggrBgEFBQcCARYcaHR0cHM6Ly93 # d3cuZGlnaWNlcnQuY29tL0NQUzAKBghghkgBhv1sAzAdBgNVHQ4EFgQUWsS5eyoK # o6XqcQPAYPkt9mV1DlgwHwYDVR0jBBgwFoAUReuir/SSy4IxLVGLp6chnfNtyA8w # DQYJKoZIhvcNAQELBQADggEBAD7sDVoks/Mi0RXILHwlKXaoHV0cLToaxO8wYdd+ # C2D9wz0PxK+L/e8q3yBVN7Dh9tGSdQ9RtG6ljlriXiSBThCk7j9xjmMOE0ut119E # efM2FAaK95xGTlz/kLEbBw6RFfu6r7VRwo0kriTGxycqoSkoGjpxKAI8LpGjwCUR # 4pwUR6F6aGivm6dcIFzZcbEMj7uo+MUSaJ/PQMtARKUT8OZkDCUIQjKyNookAv4v # cn4c10lFluhZHen6dGRrsutmQ9qzsIzV6Q3d9gEgzpkxYz0IGhizgZtPxpMQBvwH # gfqL2vmCSfdibqFT+hKUGIUukpHqaGxEMrJmoecYpJpkUe8wggU4MIIEIKADAgEC # AhAPxQCJrE9ObGzkCRS7EwyyMA0GCSqGSIb3DQEBCwUAMHIxCzAJBgNVBAYTAlVT # MRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5j # b20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBDb2RlIFNpZ25p # bmcgQ0EwHhcNMTcwNTI2MDAwMDAwWhcNMTkwOTI3MTIwMDAwWjB1MQswCQYDVQQG # EwJHQjETMBEGA1UECBMKR2Fyc2luZ3RvbjEPMA0GA1UEBxMGT3hmb3JkMR8wHQYD # VQQKExZWaXJ0dWFsIEVuZ2luZSBMaW1pdGVkMR8wHQYDVQQDExZWaXJ0dWFsIEVu # Z2luZSBMaW1pdGVkMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAnB1O # DV2jw/aMIUWnD9f9RCbAoiJ8LQcznYo42P22YEi6g7QY+kKmAzGgEhbsE4UVuGWS # el4y6FxGWq51SK5P/gqgZgzyP8FkIUzLxsCrtx9OBnsPPeL+/An5CpcsKsl2lCSz # NMwcz16hjcE0vCLio1NOcwvfO65qdNT2gRIEnIYhRX88dG3V30BH2aKWG5X9t1IW # RmozjZ8I7iLEoWFJWQSuICSGyvyiPqnXF3nxdroE8O4fc1U90x5qefX0RlwKeq47 # UFuI0Y/59pB3/jss5BYvAXp3g+6EKlDwgW1a/MLVsLQbdzlALFUv5YxEqkXA8IEM # xpwgBjm117SmyZ98QQIDAQABo4IBxTCCAcEwHwYDVR0jBBgwFoAUWsS5eyoKo6Xq # cQPAYPkt9mV1DlgwHQYDVR0OBBYEFL5NkOqMm0S8AyuXI1EZIdoK9DD/MA4GA1Ud # DwEB/wQEAwIHgDATBgNVHSUEDDAKBggrBgEFBQcDAzB3BgNVHR8EcDBuMDWgM6Ax # hi9odHRwOi8vY3JsMy5kaWdpY2VydC5jb20vc2hhMi1hc3N1cmVkLWNzLWcxLmNy # bDA1oDOgMYYvaHR0cDovL2NybDQuZGlnaWNlcnQuY29tL3NoYTItYXNzdXJlZC1j # cy1nMS5jcmwwTAYDVR0gBEUwQzA3BglghkgBhv1sAwEwKjAoBggrBgEFBQcCARYc # aHR0cHM6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAIBgZngQwBBAEwgYQGCCsGAQUF # BwEBBHgwdjAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29tME4G # CCsGAQUFBzAChkJodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRT # SEEyQXNzdXJlZElEQ29kZVNpZ25pbmdDQS5jcnQwDAYDVR0TAQH/BAIwADANBgkq # hkiG9w0BAQsFAAOCAQEAQC8qzSz1bIoEqbjDx3VtYDjtUjuFEVDFYi9+vREl6jM+ # iqOiNiwCXUkbxGTuDrWW9I1YOn8a7SCCYapZ+T0G3RMa+rQHXFYKbYTmXC3C41Cd # MQzZn4wTuGRNQLTgNSuclwMnNmFVe7K5S/0Dv+GaLSKuRLAxpcPxeTtmRZIIBXF7 # wwRS0+V28jB9VyeSOdqsPIFYf5GSfu7KcIhmNQ/DUroulaS5JIrPUhwkf1LZMm0B # /0adpaPbFy95M1emij96rrgy2hX8N/FrWBh13/81V6NO3b8mhCfjqb632dG4EUTi # FXDvqP2hpWw0nO/pFZsMsEK88eiV93XDDEG/MjAApzGCBDcwggQzAgEBMIGGMHIx # CzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3 # dy5kaWdpY2VydC5jb20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNIQTIgQXNzdXJlZCBJ # RCBDb2RlIFNpZ25pbmcgQ0ECEA/FAImsT05sbOQJFLsTDLIwCQYFKw4DAhoFAKB4 # MBgGCisGAQQBgjcCAQwxCjAIoAKAAKECgAAwGQYJKoZIhvcNAQkDMQwGCisGAQQB # gjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwIwYJKoZIhvcNAQkE # MRYEFN8ouwrKQWxRlDLt2bfnYQKTrHFQMA0GCSqGSIb3DQEBAQUABIIBAGF/+uzx # N3+rqTL0iMdXx3B8GaWTPARY2HsHPPjvMdJaa/mWSQa+sfUtScoGPdFpWPCLEsk9 # FIV5Za9hq6UuFXezO+SJeAlc0w49ra9d9G0lukMfiWQA80Rx40/yvWgxfoKf34wA # qh3fCdGi/8iQlrIzE9DE9rHhpnmnQ189A0raMrJm6NKXo7B9Ix/od9OtN0+KY4L4 # cP8Tdxf/E1Wr7qxliK+VvQkqXhBffB1mU6PIk4xFEWLFK8CjGbY/R8ZNia22RMbh # ReDYKlLd7UoZyA/3vxOYtDna9cepjD4v2268i+FyU8C4ApeZsJziHj6B2yolODFY # 8IJLmAF9I8jamOqhggILMIICBwYJKoZIhvcNAQkGMYIB+DCCAfQCAQEwcjBeMQsw # CQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMgQ29ycG9yYXRpb24xMDAuBgNV # BAMTJ1N5bWFudGVjIFRpbWUgU3RhbXBpbmcgU2VydmljZXMgQ0EgLSBHMgIQDs/0 # OMj+vzVuBNhqmBsaUDAJBgUrDgMCGgUAoF0wGAYJKoZIhvcNAQkDMQsGCSqGSIb3 # DQEHATAcBgkqhkiG9w0BCQUxDxcNMTkwNDEzMTgzMTE3WjAjBgkqhkiG9w0BCQQx # FgQUGXplEzxcW1JTU/WfTWFeQ3wlaVIwDQYJKoZIhvcNAQEBBQAEggEAINLxQ2j1 # xAtsEQN7a0TdWjh2XuhRwouZaIWTr4+lcOccQ3NP341qM0GTfQoFfWH4bB9PK3Uu # iM44+6vPwPhFBUr/rF6qL238aqKdPa7E3HzBYxxj3bOt8qR2XnPHhOOaqpLpePam # 33QA/vyP3GKzqUPcp5dvQg5AQmrju42J7/2aIkdzQYi10PDfANmorZYzi4LgTdb+ # XEMD3VOLbrJf7hg55jr2BfDgpqOZfpisoI3JUSY5gZH9G8D00T5yh/s7y7j0UA7+ # x3VwcJdK0AclzK7pynJIF+vXjQR0oIdO1azjX5IMyQ1TST+2pmkPXUAEWHtsGUWL # TexxYWsw8+ysQg== # SIG # End signature block |