functions/New-DbaConnectionString.ps1
function New-DbaConnectionString { <# .SYNOPSIS Builds or extracts a SQL Server Connection String .DESCRIPTION Builds or extracts a SQL Server Connection String. Note that dbatools-style syntax is used. So you do not need to specify "Data Source", you can just specify -SqlInstance and -SqlCredential and we'll handle it for you. This is the simplified PowerShell approach to connection string building. See examples for more info. See https://msdn.microsoft.com/en-us/library/system.data.sqlclient.sqlconnection.connectionstring.aspx and https://msdn.microsoft.com/en-us/library/system.data.sqlclient.sqlconnectionstringbuilder.aspx and https://msdn.microsoft.com/en-us/library/system.data.sqlclient.sqlconnection.aspx .PARAMETER SqlInstance The target SQL Server instance or instances. .PARAMETER Credential Login to the target instance using alternative credentials. Accepts PowerShell credentials (Get-Credential). Windows Authentication, SQL Server Authentication, Active Directory - Password, and Active Directory - Integrated are all supported. For MFA support, please use Connect-DbaInstance. be it Windows or SQL Server. Windows users are determined by the existence of a backslash, so if you are intending to use an alternative Windows connection instead of a SQL login, ensure it contains a backslash. .PARAMETER AccessToken Basically tells the connection string to ignore authentication. Does not include the AccessToken in the resulting connecstring. .PARAMETER AppendConnectionString Appends to the current connection string. Note that you cannot pass authentication information using this method. Use -SqlInstance and, optionally, -SqlCredential to set authentication information. .PARAMETER ApplicationIntent Declares the application workload type when connecting to a server. Possible values are ReadOnly and ReadWrite. .PARAMETER BatchSeparator By default, this is "GO" .PARAMETER ClientName By default, this command sets the client's ApplicationName property to "dbatools PowerShell module - dbatools.io". If you're doing anything that requires profiling, you can look for this client name. Using -ClientName allows you to set your own custom client application name. .PARAMETER Database Database name .PARAMETER ConnectTimeout The length of time (in seconds) to wait for a connection to the server before terminating the attempt and generating an error. Valid values are greater than or equal to 0 and less than or equal to 2147483647. When opening a connection to a Azure SQL Database, set the connection timeout to 30 seconds. .PARAMETER EncryptConnection When true, SQL Server uses SSL encryption for all data sent between the client and server if the server has a certificate installed. Recognized values are true, false, yes, and no. For more information, see Connection String Syntax. Beginning in .NET Framework 4.5, when TrustServerCertificate is false and Encrypt is true, the server name (or IP address) in a SQL Server SSL certificate must exactly match the server name (or IP address) specified in the connection string. Otherwise, the connection attempt will fail. For information about support for certificates whose subject starts with a wildcard character (*), see Accepted wildcards used by server certificates for server authentication. .PARAMETER FailoverPartner The name of the failover partner server where database mirroring is configured. If the value of this key is "", then Initial Catalog must be present, and its value must not be "". The server name can be 128 characters or less. If you specify a failover partner but the failover partner server is not configured for database mirroring and the primary server (specified with the Server keyword) is not available, then the connection will fail. If you specify a failover partner and the primary server is not configured for database mirroring, the connection to the primary server (specified with the Server keyword) will succeed if the primary server is available. .PARAMETER IsActiveDirectoryUniversalAuth Azure related .PARAMETER LockTimeout Sets the time in seconds required for the connection to time out when the current transaction is locked. .PARAMETER MaxPoolSize Sets the maximum number of connections allowed in the connection pool for this specific connection string. .PARAMETER MinPoolSize Sets the minimum number of connections allowed in the connection pool for this specific connection string. .PARAMETER MultipleActiveResultSets When used, an application can maintain multiple active result sets (MARS). When false, an application must process or cancel all result sets from one batch before it can execute any other batch on that connection. .PARAMETER MultiSubnetFailover If your application is connecting to an AlwaysOn availability group (AG) on different subnets, setting MultiSubnetFailover provides faster detection of and connection to the (currently) active server. For more information about SqlClient support for Always On Availability Groups .PARAMETER NetworkProtocol Connect explicitly using 'TcpIp','NamedPipes','Multiprotocol','AppleTalk','BanyanVines','Via','SharedMemory' and 'NWLinkIpxSpx' .PARAMETER NonPooledConnection Request a non-pooled connection .PARAMETER PacketSize Sets the size in bytes of the network packets used to communicate with an instance of SQL Server. Must match at server. .PARAMETER PooledConnectionLifetime When a connection is returned to the pool, its creation time is compared with the current time, and the connection is destroyed if that time span (in seconds) exceeds the value specified by Connection Lifetime. This is useful in clustered configurations to force load balancing between a running server and a server just brought online. A value of zero (0) causes pooled connections to have the maximum connection timeout. .PARAMETER SqlExecutionModes The SqlExecutionModes enumeration contains values that are used to specify whether the commands sent to the referenced connection to the server are executed immediately or saved in a buffer. Valid values include CaptureSql, ExecuteAndCaptureSql and ExecuteSql. .PARAMETER StatementTimeout Sets the number of seconds a statement is given to run before failing with a time-out error. .PARAMETER TrustServerCertificate Sets a value that indicates whether the channel will be encrypted while bypassing walking the certificate chain to validate trust. .PARAMETER WorkstationId Sets the name of the workstation connecting to SQL Server. .PARAMETER Legacy Use this switch to create a connection string using System.Data.SqlClient instead of Microsoft.Data.SqlClient. .PARAMETER WhatIf If this switch is enabled, no actions are performed but informational messages will be displayed that explain what would happen if the command were to run. .PARAMETER Confirm If this switch is enabled, you will be prompted for confirmation before executing any operations that change state. .NOTES Tags: Connection, Connect, ConnectionString Author: Chrissy LeMaire (@cl), netnerds.net Website: https://dbatools.io Copyright: (c) 2018 by dbatools, licensed under MIT License: MIT https://opensource.org/licenses/MIT .LINK https://dbatools.io/New-DbaConnectionString .EXAMPLE PS C:\> New-DbaConnectionString -SqlInstance sql2014 Creates a connection string that connects using Windows Authentication .EXAMPLE PS C:\> Connect-DbaInstance -SqlInstance sql2016 | New-DbaConnectionString Builds a connected SMO object using Connect-DbaInstance then extracts and displays the connection string .EXAMPLE PS C:\> $wincred = Get-Credential ad\sqladmin PS C:\> New-DbaConnectionString -SqlInstance sql2014 -Credential $wincred Creates a connection string that connects using alternative Windows credentials .EXAMPLE PS C:\> $sqlcred = Get-Credential sqladmin PS C:\> $server = New-DbaConnectionString -SqlInstance sql2014 -Credential $sqlcred Login to sql2014 as SQL login sqladmin. .EXAMPLE PS C:\> $connstring = New-DbaConnectionString -SqlInstance mydb.database.windows.net -SqlCredential me@myad.onmicrosoft.com -Database db Creates a connection string for an Azure Active Directory login to Azure SQL db. Output looks like this: Data Source=TCP:mydb.database.windows.net,1433;Initial Catalog=db;User ID=me@myad.onmicrosoft.com;Password=fakepass;MultipleActiveResultSets=False;Connect Timeout=30;Encrypt=True;TrustServerCertificate=False;Application Name="dbatools PowerShell module - dbatools.io";Authentication="Active Directory Password" .EXAMPLE PS C:\> $server = New-DbaConnectionString -SqlInstance sql2014 -ClientName "mah connection" Creates a connection string that connects using Windows Authentication and uses the client name "mah connection". So when you open up profiler or use extended events, you can search for "mah connection". .EXAMPLE PS C:\> $server = New-DbaConnectionString -SqlInstance sql2014 -AppendConnectionString "Packet Size=4096;AttachDbFilename=C:\MyFolder\MyDataFile.mdf;User Instance=true;" Creates a connection string that connects to sql2014 using Windows Authentication, then it sets the packet size (this can also be done via -PacketSize) and other connection attributes. .EXAMPLE PS C:\> $server = New-DbaConnectionString -SqlInstance sql2014 -NetworkProtocol TcpIp -MultiSubnetFailover Creates a connection string with Windows Authentication that uses TCPIP and has MultiSubnetFailover enabled. .EXAMPLE PS C:\> $connstring = New-DbaConnectionString sql2016 -ApplicationIntent ReadOnly Creates a connection string with ReadOnly ApplicationIntent. #> [CmdletBinding(SupportsShouldProcess)] param ( [Parameter(Mandatory, ValueFromPipeline)] [Alias("ServerInstance", "SqlServer", "Server", "DataSource")] [DbaInstanceParameter[]]$SqlInstance, [Alias("SqlCredential")] [PSCredential]$Credential, [string]$AccessToken, [ValidateSet('ReadOnly', 'ReadWrite')] [string]$ApplicationIntent, [string]$BatchSeparator, [string]$ClientName = "custom connection", [int]$ConnectTimeout, [string]$Database, [switch]$EncryptConnection, [string]$FailoverPartner, [switch]$IsActiveDirectoryUniversalAuth, [int]$LockTimeout, [int]$MaxPoolSize, [int]$MinPoolSize, [switch]$MultipleActiveResultSets, [switch]$MultiSubnetFailover, [ValidateSet('TcpIp', 'NamedPipes', 'Multiprotocol', 'AppleTalk', 'BanyanVines', 'Via', 'SharedMemory', 'NWLinkIpxSpx')] [string]$NetworkProtocol, [switch]$NonPooledConnection, [int]$PacketSize, [int]$PooledConnectionLifetime, [ValidateSet('CaptureSql', 'ExecuteAndCaptureSql', 'ExecuteSql')] [string]$SqlExecutionModes, [int]$StatementTimeout, [switch]$TrustServerCertificate, [string]$WorkstationId, [switch]$Legacy, [string]$AppendConnectionString ) begin { function Test-Azure { Param ( [DbaInstanceParameter[]]$SqlInstance ) if ($SqlInstance.ComputerName -match $AzureDomain) { Write-Message -Level Debug -Message "Test for Azure is positive" return $true } else { Write-Message -Level Debug -Message "Test for Azure is negative" return $false } } } process { foreach ($instance in $SqlInstance) { <# The new code path (formerly known as experimental) is now the default. To have a quick way to switch back in case any problems occur, the switch "legacy" is introduced: Set-DbatoolsConfig -FullName sql.connection.legacy -Value $true All the sub paths inside the following if clause will end with a continue, so the normal code path is not used. #> if (-not (Get-DbatoolsConfigValue -FullName sql.connection.legacy)) { <# Maybe more docs... #> Write-Message -Level Debug -Message "We have to build a connect string, using these parameters: $($PSBoundParameters.Keys)" # Test for unsupported parameters if (Test-Bound -ParameterName 'LockTimeout') { Write-Message -Level Warning -Message "Parameter LockTimeout not supported, because it is not part of a connection string." } # TODO: That can be added to the Data Source - but why? #if (Test-Bound -ParameterName 'NetworkProtocol') { # Write-Message -Level Warning -Message "Parameter NetworkProtocol not supported, because it is not part of a connection string." #} if (Test-Bound -ParameterName 'StatementTimeout') { Write-Message -Level Warning -Message "Parameter StatementTimeout not supported, because it is not part of a connection string." } if (Test-Bound -ParameterName 'SqlExecutionModes') { Write-Message -Level Warning -Message "Parameter SqlExecutionModes not supported, because it is not part of a connection string." } # Set defaults like in Connect-DbaInstance if (Test-Bound -Not -ParameterName 'Database') { $Database = (Get-DbatoolsConfigValue -FullName 'sql.connection.database') } if (Test-Bound -Not -ParameterName 'ClientName') { $ClientName = (Get-DbatoolsConfigValue -FullName 'sql.connection.clientname') } if (Test-Bound -Not -ParameterName 'ConnectTimeout') { $ConnectTimeout = ([Sqlcollaborative.Dbatools.Connection.ConnectionHost]::SqlConnectionTimeout) } if (Test-Bound -Not -ParameterName 'EncryptConnection') { $EncryptConnection = (Get-DbatoolsConfigValue -FullName 'sql.connection.encrypt') } if (Test-Bound -Not -ParameterName 'NetworkProtocol') { $np = (Get-DbatoolsConfigValue -FullName 'sql.connection.protocol') if ($np) { $NetworkProtocol = $np } } if (Test-Bound -Not -ParameterName 'PacketSize') { $PacketSize = (Get-DbatoolsConfigValue -FullName 'sql.connection.packetsize') } if (Test-Bound -Not -ParameterName 'TrustServerCertificate') { $TrustServerCertificate = (Get-DbatoolsConfigValue -FullName 'sql.connection.trustcert') } # TODO: Maybe put this in a config item: $AzureDomain = "database.windows.net" # Rename credential parameter to align with other commands, later rename parameter $SqlCredential = $Credential if ($Pscmdlet.ShouldProcess($instance, "Making a new Connection String")) { if ($instance.Type -like "Server") { Write-Message -Level Debug -Message "server object passed in, connection string is: $($instance.InputObject.ConnectionContext.ConnectionString)" if ($Legacy) { $converted = $instance.InputObject.ConnectionContext.ConnectionString | Convert-ConnectionString $connStringBuilder = New-Object -TypeName System.Data.SqlClient.SqlConnectionStringBuilder -ArgumentList $converted } else { $connStringBuilder = New-Object -TypeName Microsoft.Data.SqlClient.SqlConnectionStringBuilder -ArgumentList $instance.InputObject.ConnectionContext.ConnectionString } # In Azure, check for a database change if ((Test-Azure -SqlInstance $instance) -and $Database) { $connStringBuilder['Initial Catalog'] = $Database } $connstring = $connStringBuilder.ConnectionString # TODO: Should we check the other parameters and change the connection string accordingly? } else { if ($Legacy) { $connStringBuilder = New-Object -TypeName System.Data.SqlClient.SqlConnectionStringBuilder } else { $connStringBuilder = New-Object -TypeName Microsoft.Data.SqlClient.SqlConnectionStringBuilder } $connStringBuilder['Data Source'] = $instance.FullSmoName if ($ApplicationIntent) { $connStringBuilder['ApplicationIntent'] = $ApplicationIntent } if ($ClientName) { $connStringBuilder['Application Name'] = $ClientName } if ($ConnectTimeout) { $connStringBuilder['Connect Timeout'] = $ConnectTimeout } if ($Database) { $connStringBuilder['Initial Catalog'] = $Database } if ($EncryptConnection) { $connStringBuilder['Encrypt'] = $true } else { $connStringBuilder['Encrypt'] = $false } if ($FailoverPartner) { $connStringBuilder['Failover Partner'] = $FailoverPartner } if ($MaxPoolSize) { $connStringBuilder['Max Pool Size'] = $MaxPoolSize } if ($MinPoolSize) { $connStringBuilder['Min Pool Size'] = $MinPoolSize } if ($MultipleActiveResultSets) { $connStringBuilder['MultipleActiveResultSets'] = $true } else { $connStringBuilder['MultipleActiveResultSets'] = $false } if ($MultiSubnetFailover) { $connStringBuilder['MultiSubnetFailover'] = $true } if ($NonPooledConnection) { $connStringBuilder['Pooling'] = $false } if ($PacketSize) { $connStringBuilder['Packet Size'] = $PacketSize } if ($PooledConnectionLifetime) { $connStringBuilder['Load Balance Timeout'] = $PooledConnectionLifetime } if ($TrustServerCertificate) { $connStringBuilder['TrustServerCertificate'] = $true } else { $connStringBuilder['TrustServerCertificate'] = $false } if ($WorkstationId) { $connStringBuilder['Workstation Id'] = $WorkstationId } if ($SqlCredential) { Write-Message -Level Debug -Message "We have a SqlCredential" $username = ($SqlCredential.UserName).TrimStart("\") # support both ad\username and username@ad if ($username -like "*\*") { $domain, $login = $username.Split("\") $username = "$login@$domain" } $connStringBuilder['User ID'] = $username $connStringBuilder['Password'] = $SqlCredential.GetNetworkCredential().Password if ((Test-Azure -SqlInstance $instance) -and ($username -like "*@*")) { Write-Message -Level Debug -Message "We connect to Azure with Azure AD account, so adding Authentication=Active Directory Password" $connStringBuilder['Authentication'] = 'Active Directory Password' } } else { Write-Message -Level Debug -Message "We don't have a SqlCredential" if (Test-Azure -SqlInstance $instance) { Write-Message -Level Debug -Message "We connect to Azure, so adding Authentication=Active Directory Integrated" $connStringBuilder['Authentication'] = 'Active Directory Integrated' } else { Write-Message -Level Debug -Message "We don't connect to Azure, so setting Integrated Security=True" $connStringBuilder['Integrated Security'] = $true } } # special config for Azure if (Test-Azure -SqlInstance $instance) { if (Test-Bound -Not -ParameterName ConnectTimeout) { $connStringBuilder['Connect Timeout'] = 30 } $connStringBuilder['Encrypt'] = $true # Why adding tcp:? #$connStringBuilder['Data Source'] = "tcp:$($instance.ComputerName),$($instance.Port)" } if ($Legacy) { $connstring = $connStringBuilder.ConnectionString } else { $connstring = $connStringBuilder.ToString() } if ($AppendConnectionString) { # TODO: Check if new connection string is still valid $connstring = "$connstring;$AppendConnectionString" } } $connstring continue } } <# This is the end of the new default code path. All session with the configuration "sql.connection.legacy" set to $true will run through the following code. To use the legacy code path: Set-DbatoolsConfig -FullName sql.connection.legacy -Value $true #> Write-Message -Level Debug -Message "sql.connection.legacy is used" if ($Pscmdlet.ShouldProcess($instance, "Making a new Connection String")) { if ($instance.ComputerName -match "database\.windows\.net" -or $instance.InputObject.ComputerName -match "database\.windows\.net") { if ($instance.InputObject.GetType() -eq [Microsoft.SqlServer.Management.Smo.Server]) { $connstring = $instance.InputObject.ConnectionContext.ConnectionString if ($Database) { $olddb = $connstring -split ';' | Where-Object { $_.StartsWith("Initial Catalog") } $newdb = "Initial Catalog=$Database" if ($olddb) { $connstring = $connstring.Replace("$olddb", "$newdb") } else { $connstring = "$connstring;$newdb;" } } $connstring continue } else { $isAzure = $true if (-not (Test-Bound -ParameterName ConnectTimeout)) { $ConnectTimeout = 30 } if (-not (Test-Bound -ParameterName ClientName)) { $ClientName = "dbatools PowerShell module - dbatools.io" } $EncryptConnection = $true $instance = [DbaInstanceParameter]"tcp:$($instance.ComputerName),$($instance.Port)" } } if ($instance.GetType() -eq [Microsoft.SqlServer.Management.Smo.Server]) { return $instance.ConnectionContext.ConnectionString } else { $guid = [System.Guid]::NewGuid() $server = New-Object Microsoft.SqlServer.Management.Smo.Server $guid if ($AppendConnectionString) { $connstring = $server.ConnectionContext.ConnectionString $server.ConnectionContext.ConnectionString = "$connstring;$appendconnectionstring" $server.ConnectionContext.ConnectionString } else { $server.ConnectionContext.ApplicationName = $ClientName if ($BatchSeparator) { $server.ConnectionContext.BatchSeparator = $BatchSeparator } if ($ConnectTimeout) { $server.ConnectionContext.ConnectTimeout = $ConnectTimeout } if ($Database) { $server.ConnectionContext.DatabaseName = $Database } if ($EncryptConnection) { $server.ConnectionContext.EncryptConnection = $true } if ($IsActiveDirectoryUniversalAuth) { $server.ConnectionContext.IsActiveDirectoryUniversalAuth = $true } if ($LockTimeout) { $server.ConnectionContext.LockTimeout = $LockTimeout } if ($MaxPoolSize) { $server.ConnectionContext.MaxPoolSize = $MaxPoolSize } if ($MinPoolSize) { $server.ConnectionContext.MinPoolSize = $MinPoolSize } if ($MultipleActiveResultSets) { $server.ConnectionContext.MultipleActiveResultSets = $true } if ($NetworkProtocol) { $server.ConnectionContext.NetworkProtocol = $NetworkProtocol } if ($NonPooledConnection) { $server.ConnectionContext.NonPooledConnection = $true } if ($PacketSize) { $server.ConnectionContext.PacketSize = $PacketSize } if ($PooledConnectionLifetime) { $server.ConnectionContext.PooledConnectionLifetime = $PooledConnectionLifetime } if ($StatementTimeout) { $server.ConnectionContext.StatementTimeout = $StatementTimeout } if ($SqlExecutionModes) { $server.ConnectionContext.SqlExecutionModes = $SqlExecutionModes } if ($TrustServerCertificate) { $server.ConnectionContext.TrustServerCertificate = $true } if ($WorkstationId) { $server.ConnectionContext.WorkstationId = $WorkstationId } if ($null -ne $Credential.username) { $username = ($Credential.username).TrimStart("\") if ($username -like "*\*") { $username = $username.Split("\")[1] $server.ConnectionContext.LoginSecure = $true $server.ConnectionContext.ConnectAsUser = $true $server.ConnectionContext.ConnectAsUserName = $username $server.ConnectionContext.ConnectAsUserPassword = ($Credential).GetNetworkCredential().Password } else { $server.ConnectionContext.LoginSecure = $false $server.ConnectionContext.set_Login($username) $server.ConnectionContext.set_SecurePassword($Credential.Password) } } $connstring = $server.ConnectionContext.ConnectionString if ($MultiSubnetFailover) { $connstring = "$connstring;MultiSubnetFailover=True" } if ($FailoverPartner) { $connstring = "$connstring;Failover Partner=$FailoverPartner" } if ($ApplicationIntent) { $connstring = "$connstring;ApplicationIntent=$ApplicationIntent;" } if ($isAzure) { if ($Credential) { if ($Credential.UserName -like "*\*" -or $Credential.UserName -like "*@*") { $connstring = "$connstring;Authentication=`"Active Directory Password`"" } else { $username = ($Credential.username).TrimStart("\") $server.ConnectionContext.LoginSecure = $false $server.ConnectionContext.set_Login($username) $server.ConnectionContext.set_SecurePassword($Credential.Password) } } else { $connstring = $connstring.Replace("Integrated Security=True;", "Persist Security Info=True;") if (-not $AccessToken) { $connstring = "$connstring;Authentication=`"Active Directory Integrated`"" } } } if ($connstring -ne $server.ConnectionContext.ConnectionString) { $server.ConnectionContext.ConnectionString = $connstring } ($server.ConnectionContext.ConnectionString).Replace($guid, $instance) } } } } } } # SIG # Begin signature block # MIIdsAYJKoZIhvcNAQcCoIIdoTCCHZ0CAQExCzAJBgUrDgMCGgUAMGkGCisGAQQB # gjcCAQSgWzBZMDQGCisGAQQBgjcCAR4wJgIDAQAABBAfzDtgWUsITrck0sYpfvNR # AgEAAgEAAgEAAgEAAgEAMCEwCQYFKw4DAhoFAAQU7JBJl+hAfpQMaZ0PQx1n2Xpp # hlygghfOMIIFGjCCBAKgAwIBAgIQAwW7hiGwoWNfv96uEgTnbTANBgkqhkiG9w0B # AQsFADByMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNlcnQgSW5jMRkwFwYD # VQQLExB3d3cuZGlnaWNlcnQuY29tMTEwLwYDVQQDEyhEaWdpQ2VydCBTSEEyIEFz # c3VyZWQgSUQgQ29kZSBTaWduaW5nIENBMB4XDTIwMDUxMjAwMDAwMFoXDTIzMDYw # ODEyMDAwMFowVzELMAkGA1UEBhMCVVMxETAPBgNVBAgTCFZpcmdpbmlhMQ8wDQYD # VQQHEwZWaWVubmExETAPBgNVBAoTCGRiYXRvb2xzMREwDwYDVQQDEwhkYmF0b29s # czCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALy/Y3ur47++CAG2mOa1 # 6h8WjXjSTvcldDmw4PpAvOOCKNr6xyhg/FOYVIiaeq2N9kVaa5wBawOIxVWuj/rI # aOxeYklQDugPkGUx0Ap+6KrjnnxgE6ONzQGnc1tjlka6N0KazD2WodEBWKXo/Vmk # C/cP9PJVWroCMOwlj7GtEv2IxzxikPm2ICP5KxFK5PmrA+5bzcHJEeqRonlgMn9H # zZkqHr0AU1egnfEIlH4/v6lry1t1KBF/bnDhl9g/L0icS+ychFVkx4OOO4a+qvT8 # xqvvdQjv3PQ1hbzTI3/tXOWu9XxGeeIdZjaJv16FmWKCnloSp1Xb9cVU9XhIpomz # xH0CAwEAAaOCAcUwggHBMB8GA1UdIwQYMBaAFFrEuXsqCqOl6nEDwGD5LfZldQ5Y # MB0GA1UdDgQWBBTwwKD7tgOAQ077Cdfd33qxy+OeIjAOBgNVHQ8BAf8EBAMCB4Aw # EwYDVR0lBAwwCgYIKwYBBQUHAwMwdwYDVR0fBHAwbjA1oDOgMYYvaHR0cDovL2Ny # bDMuZGlnaWNlcnQuY29tL3NoYTItYXNzdXJlZC1jcy1nMS5jcmwwNaAzoDGGL2h0 # dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9zaGEyLWFzc3VyZWQtY3MtZzEuY3JsMEwG # A1UdIARFMEMwNwYJYIZIAYb9bAMBMCowKAYIKwYBBQUHAgEWHGh0dHBzOi8vd3d3 # LmRpZ2ljZXJ0LmNvbS9DUFMwCAYGZ4EMAQQBMIGEBggrBgEFBQcBAQR4MHYwJAYI # KwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBOBggrBgEFBQcwAoZC # aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0U0hBMkFzc3VyZWRJ # RENvZGVTaWduaW5nQ0EuY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQAD # ggEBAI/N+XCVDB/WNqQSrKY85zScHGJjsXgXByYvsitMuG5vo+ODhlh+ILv0CTPl # o2Wo75MnSSqCWR+c6xyN8pDPMPBxm2EtVmXzeKDMIudYyjxmT8PZ3hktj16wXCo8 # 2+65UOse+CHsfoMn/M9WbkQ4rSyWNPRRDodATC2i4flLyeuoIZnyMoz/4N4mWb6s # IAYZ/tNXzm6qwCfkmoMSf9tcTUCXIbVDliJcUZLlJ/SpLg2KzDu9GtnpBzg3AG3L # hwBiPMM8OLGitYjz4VU5RYox0vu1XyLf3f9fKTCxxwKy0EKntWdJk37i+DOMQlCq # Xm5B/KyNxb2utv+qLGlyw9MphEcwggUwMIIEGKADAgECAhAECRgbX9W7ZnVTQ7Vv # lVAIMA0GCSqGSIb3DQEBCwUAMGUxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp # Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xJDAiBgNVBAMTG0Rp # Z2lDZXJ0IEFzc3VyZWQgSUQgUm9vdCBDQTAeFw0xMzEwMjIxMjAwMDBaFw0yODEw # MjIxMjAwMDBaMHIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMx # GTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xMTAvBgNVBAMTKERpZ2lDZXJ0IFNI # QTIgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0EwggEiMA0GCSqGSIb3DQEBAQUA # A4IBDwAwggEKAoIBAQD407Mcfw4Rr2d3B9MLMUkZz9D7RZmxOttE9X/lqJ3bMtdx # 6nadBS63j/qSQ8Cl+YnUNxnXtqrwnIal2CWsDnkoOn7p0WfTxvspJ8fTeyOU5JEj # lpB3gvmhhCNmElQzUHSxKCa7JGnCwlLyFGeKiUXULaGj6YgsIJWuHEqHCN8M9eJN # YBi+qsSyrnAxZjNxPqxwoqvOf+l8y5Kh5TsxHM/q8grkV7tKtel05iv+bMt+dDk2 # DZDv5LVOpKnqagqrhPOsZ061xPeM0SAlI+sIZD5SlsHyDxL0xY4PwaLoLFH3c7y9 # hbFig3NBggfkOItqcyDQD2RzPJ6fpjOp/RnfJZPRAgMBAAGjggHNMIIByTASBgNV # HRMBAf8ECDAGAQH/AgEAMA4GA1UdDwEB/wQEAwIBhjATBgNVHSUEDDAKBggrBgEF # BQcDAzB5BggrBgEFBQcBAQRtMGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRp # Z2ljZXJ0LmNvbTBDBggrBgEFBQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQu # Y29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9vdENBLmNydDCBgQYDVR0fBHoweDA6oDig # NoY0aHR0cDovL2NybDQuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJlZElEUm9v # dENBLmNybDA6oDigNoY0aHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0 # QXNzdXJlZElEUm9vdENBLmNybDBPBgNVHSAESDBGMDgGCmCGSAGG/WwAAgQwKjAo # BggrBgEFBQcCARYcaHR0cHM6Ly93d3cuZGlnaWNlcnQuY29tL0NQUzAKBghghkgB # hv1sAzAdBgNVHQ4EFgQUWsS5eyoKo6XqcQPAYPkt9mV1DlgwHwYDVR0jBBgwFoAU # Reuir/SSy4IxLVGLp6chnfNtyA8wDQYJKoZIhvcNAQELBQADggEBAD7sDVoks/Mi # 0RXILHwlKXaoHV0cLToaxO8wYdd+C2D9wz0PxK+L/e8q3yBVN7Dh9tGSdQ9RtG6l # jlriXiSBThCk7j9xjmMOE0ut119EefM2FAaK95xGTlz/kLEbBw6RFfu6r7VRwo0k # riTGxycqoSkoGjpxKAI8LpGjwCUR4pwUR6F6aGivm6dcIFzZcbEMj7uo+MUSaJ/P # QMtARKUT8OZkDCUIQjKyNookAv4vcn4c10lFluhZHen6dGRrsutmQ9qzsIzV6Q3d # 9gEgzpkxYz0IGhizgZtPxpMQBvwHgfqL2vmCSfdibqFT+hKUGIUukpHqaGxEMrJm # oecYpJpkUe8wggauMIIElqADAgECAhAHNje3JFR82Ees/ShmKl5bMA0GCSqGSIb3 # DQEBCwUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJbmMxGTAX # BgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0IFRydXN0 # ZWQgUm9vdCBHNDAeFw0yMjAzMjMwMDAwMDBaFw0zNzAzMjIyMzU5NTlaMGMxCzAJ # BgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjE7MDkGA1UEAxMyRGln # aUNlcnQgVHJ1c3RlZCBHNCBSU0E0MDk2IFNIQTI1NiBUaW1lU3RhbXBpbmcgQ0Ew # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDGhjUGSbPBPXJJUVXHJQPE # 8pE3qZdRodbSg9GeTKJtoLDMg/la9hGhRBVCX6SI82j6ffOciQt/nR+eDzMfUBML # JnOWbfhXqAJ9/UO0hNoR8XOxs+4rgISKIhjf69o9xBd/qxkrPkLcZ47qUT3w1lbU # 5ygt69OxtXXnHwZljZQp09nsad/ZkIdGAHvbREGJ3HxqV3rwN3mfXazL6IRktFLy # dkf3YYMZ3V+0VAshaG43IbtArF+y3kp9zvU5EmfvDqVjbOSmxR3NNg1c1eYbqMFk # dECnwHLFuk4fsbVYTXn+149zk6wsOeKlSNbwsDETqVcplicu9Yemj052FVUmcJgm # f6AaRyBD40NjgHt1biclkJg6OBGz9vae5jtb7IHeIhTZgirHkr+g3uM+onP65x9a # bJTyUpURK1h0QCirc0PO30qhHGs4xSnzyqqWc0Jon7ZGs506o9UD4L/wojzKQtwY # SH8UNM/STKvvmz3+DrhkKvp1KCRB7UK/BZxmSVJQ9FHzNklNiyDSLFc1eSuo80Vg # vCONWPfcYd6T/jnA+bIwpUzX6ZhKWD7TA4j+s4/TXkt2ElGTyYwMO1uKIqjBJgj5 # FBASA31fI7tk42PgpuE+9sJ0sj8eCXbsq11GdeJgo1gJASgADoRU7s7pXcheMBK9 # Rp6103a50g5rmQzSM7TNsQIDAQABo4IBXTCCAVkwEgYDVR0TAQH/BAgwBgEB/wIB # ADAdBgNVHQ4EFgQUuhbZbU2FL3MpdpovdYxqII+eyG8wHwYDVR0jBBgwFoAU7Nfj # gtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMGA1UdJQQMMAoGCCsG # AQUFBwMIMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYYaHR0cDovL29jc3Au # ZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2FjZXJ0cy5kaWdpY2Vy # dC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNVHR8EPDA6MDigNqA0 # hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0 # LmNybDAgBgNVHSAEGTAXMAgGBmeBDAEEAjALBglghkgBhv1sBwEwDQYJKoZIhvcN # AQELBQADggIBAH1ZjsCTtm+YqUQiAX5m1tghQuGwGC4QTRPPMFPOvxj7x1Bd4ksp # +3CKDaopafxpwc8dB+k+YMjYC+VcW9dth/qEICU0MWfNthKWb8RQTGIdDAiCqBa9 # qVbPFXONASIlzpVpP0d3+3J0FNf/q0+KLHqrhc1DX+1gtqpPkWaeLJ7giqzl/Yy8 # ZCaHbJK9nXzQcAp876i8dU+6WvepELJd6f8oVInw1YpxdmXazPByoyP6wCeCRK6Z # JxurJB4mwbfeKuv2nrF5mYGjVoarCkXJ38SNoOeY+/umnXKvxMfBwWpx2cYTgAnE # tp/Nh4cku0+jSbl3ZpHxcpzpSwJSpzd+k1OsOx0ISQ+UzTl63f8lY5knLD0/a6fx # ZsNBzU+2QJshIUDQtxMkzdwdeDrknq3lNHGS1yZr5Dhzq6YBT70/O3itTK37xJV7 # 7QpfMzmHQXh6OOmc4d0j/R0o08f56PGYX/sr2H7yRp11LB4nLCbbbxV7HhmLNriT # 1ObyF5lZynDwN7+YAN8gFk8n+2BnFqFmut1VwDophrCYoCvtlUG3OtUVmDG0YgkP # Cr2B2RP+v6TR81fZvAT6gt4y3wSJ8ADNXcL50CN/AAvkdgIm2fBldkKmKYcJRyvm # fxqkhQ/8mJb2VVQrH4D6wPIOK+XW+6kvRBVK5xMOHds3OBqhK/bt1nz8MIIGxjCC # BK6gAwIBAgIQCnpKiJ7JmUKQBmM4TYaXnTANBgkqhkiG9w0BAQsFADBjMQswCQYD # VQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lD # ZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBTSEEyNTYgVGltZVN0YW1waW5nIENBMB4X # DTIyMDMyOTAwMDAwMFoXDTMzMDMxNDIzNTk1OVowTDELMAkGA1UEBhMCVVMxFzAV # BgNVBAoTDkRpZ2lDZXJ0LCBJbmMuMSQwIgYDVQQDExtEaWdpQ2VydCBUaW1lc3Rh # bXAgMjAyMiAtIDIwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQC5KpYj # ply8X9ZJ8BWCGPQz7sxcbOPgJS7SMeQ8QK77q8TjeF1+XDbq9SWNQ6OB6zhj+TyI # ad480jBRDTEHukZu6aNLSOiJQX8Nstb5hPGYPgu/CoQScWyhYiYB087DbP2sO37c # KhypvTDGFtjavOuy8YPRn80JxblBakVCI0Fa+GDTZSw+fl69lqfw/LH09CjPQnkf # O8eTB2ho5UQ0Ul8PUN7UWSxEdMAyRxlb4pguj9DKP//GZ888k5VOhOl2GJiZERTF # KwygM9tNJIXogpThLwPuf4UCyYbh1RgUtwRF8+A4vaK9enGY7BXn/S7s0psAiqwd # jTuAaP7QWZgmzuDtrn8oLsKe4AtLyAjRMruD+iM82f/SjLv3QyPf58NaBWJ+cCzl # K7I9Y+rIroEga0OJyH5fsBrdGb2fdEEKr7mOCdN0oS+wVHbBkE+U7IZh/9sRL5ID # MM4wt4sPXUSzQx0jUM2R1y+d+/zNscGnxA7E70A+GToC1DGpaaBJ+XXhm+ho5GoM # j+vksSF7hmdYfn8f6CvkFLIW1oGhytowkGvub3XAsDYmsgg7/72+f2wTGN/GbaR5 # Sa2Lf2GHBWj31HDjQpXonrubS7LitkE956+nGijJrWGwoEEYGU7tR5thle0+C2Fa # 6j56mJJRzT/JROeAiylCcvd5st2E6ifu/n16awIDAQABo4IBizCCAYcwDgYDVR0P # AQH/BAQDAgeAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgw # IAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZIAYb9bAcBMB8GA1UdIwQYMBaAFLoW # 2W1NhS9zKXaaL3WMaiCPnshvMB0GA1UdDgQWBBSNZLeJIf5WWESEYafqbxw2j92v # DTBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGln # aUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3JsMIGQ # BggrBgEFBQcBAQSBgzCBgDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNl # cnQuY29tMFgGCCsGAQUFBzAChkxodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20v # RGlnaUNlcnRUcnVzdGVkRzRSU0E0MDk2U0hBMjU2VGltZVN0YW1waW5nQ0EuY3J0 # MA0GCSqGSIb3DQEBCwUAA4ICAQANLSN0ptH1+OpLmT8B5PYM5K8WndmzjJeCKZxD # bwEtqzi1cBG/hBmLP13lhk++kzreKjlaOU7YhFmlvBuYquhs79FIaRk4W8+JOR1w # cNlO3yMibNXf9lnLocLqTHbKodyhK5a4m1WpGmt90fUCCU+C1qVziMSYgN/uSZW3 # s8zFp+4O4e8eOIqf7xHJMUpYtt84fMv6XPfkU79uCnx+196Y1SlliQ+inMBl9AEi # ZcfqXnSmWzWSUHz0F6aHZE8+RokWYyBry/J70DXjSnBIqbbnHWC9BCIVJXAGcqlE # O2lHEdPu6cegPk8QuTA25POqaQmoi35komWUEftuMvH1uzitzcCTEdUyeEpLNypM # 81zctoXAu3AwVXjWmP5UbX9xqUgaeN1Gdy4besAzivhKKIwSqHPPLfnTI/KeGeAN # lCig69saUaCVgo4oa6TOnXbeqXOqSGpZQ65f6vgPBkKd3wZolv4qoHRbY2beayy4 # eKpNcG3wLPEHFX41tOa1DKKZpdcVazUOhdbgLMzgDCS4fFILHpl878jIxYxYaa+r # PeHPzH0VrhS/inHfypex2EfqHIXgRU4SHBQpWMxv03/LvsEOSm8gnK7ZczJZCOct # kqEaEf4ymKZdK5fgi9OczG21Da5HYzhHF1tvE9pqEG4fSbdEW7QICodaWQR2EaGn # dwITHDGCBUwwggVIAgEBMIGGMHIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdp # Q2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xMTAvBgNVBAMTKERp # Z2lDZXJ0IFNIQTIgQXNzdXJlZCBJRCBDb2RlIFNpZ25pbmcgQ0ECEAMFu4YhsKFj # X7/erhIE520wCQYFKw4DAhoFAKB4MBgGCisGAQQBgjcCAQwxCjAIoAKAAKECgAAw # GQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEOMAwGCisG # AQQBgjcCARUwIwYJKoZIhvcNAQkEMRYEFCu38xS8/kXGqB2Zsz+Su81NGrQOMA0G # CSqGSIb3DQEBAQUABIIBALaTxY/Q/feBQs5j9fOWytpdK1Hvptdf9vPsWzrMpgOL # 28mHGRMjMaPiB2dApI8Y+ZnorXH33Sz4W+rWpFEHLFU4/fHPDWzgZ0FK23BLCpgE # pKa85Kkthk5faUdpB+kGyxL5QzAx6q6zmBzp+h1TrtTSFfDqSnkIMG4tgAroI30x # j5mC8knSQt7PkFzsj288hAEbN5Q98AvnjF0kuJFbRCmOtVTTR4iRdyTk5GoG6zKZ # G37ToZ39w3VwViuQvckkowJruYKlfUSuTm1SakijZd2Wq8ISrsYZKSpjAJLPZqdn # 9OuYPrhXPlAMLRe/bEJWhuqctCT+kW5EdnmhEKgw4A6hggMgMIIDHAYJKoZIhvcN # AQkGMYIDDTCCAwkCAQEwdzBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNl # cnQsIEluYy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFRydXN0ZWQgRzQgUlNBNDA5NiBT # SEEyNTYgVGltZVN0YW1waW5nIENBAhAKekqInsmZQpAGYzhNhpedMA0GCWCGSAFl # AwQCAQUAoGkwGAYJKoZIhvcNAQkDMQsGCSqGSIb3DQEHATAcBgkqhkiG9w0BCQUx # DxcNMjIwNjAyMTEzNDE3WjAvBgkqhkiG9w0BCQQxIgQgHurnsu5v7sS1aXa90rpB # 3sTE0MHaLIqldIUqIvwf+IQwDQYJKoZIhvcNAQEBBQAEggIAoC34Ho4yWzSFjSNR # X73lzCp8BPYZVJ4GkjzNIoC1nmz++eCpALCwzhPQkYtVS0JI3KVJIXpJqR4uPfpe # k3FdatLPrKf1binxxFbJYikRicpogxCPnxNpPN8uf/MSjYStxo3w6/R6+dzmW3vn # Zei6ezqoBazNQiFF9O6eaqKwCAj3WfPyOneQS0VVAV54L4HgsswZfN8b48pV4elm # gQ7iz9fanX1QraL2pDXIsd5JngL9cfoJe+fbBP4+YvWaYq61vv701e2eq3Xocl5I # VzZfe9cg7p2UbgxMlAtqQdHn9bKaTpdX0mkGi41aPhYDowVGE1tUJcV0JYvB7A5T # F/Lan7mPZUjJ6oeJ3kNQsIRMOp7Clglxe4uAmkk4GuMGf+EWZc9aLciPaGWZN/w6 # Jrba8xLoARGsEMIX0dFECIs0/YN5YSdxrvEJHd39vjirJGcm3kCvahmFvWAtoiu5 # aK60Im0epdUXIPvv1Mu1TsFL0Rsi4Jz+oMFxPaMpFOPXHzVGzIjPsfYQd6qT2wXB # 3M3loDzyd4AQxIq6YaLvErSAZtLO/Zpo2chDN5qIlbsscOMWKfv+p2AN3ppGHK0G # jHZnzlQz2Jx3k7i/rTVfCSkFD8+LX4FtTK0iq8mj4mbglSs2XWjLu1oqsN+U3Oup # wRdp4eFWWvmPXpDymxLRvmV4NWo= # SIG # End signature block |