AzStackHci.EnvironmentChecker.Utilities.psm1


Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1

class HealthModel
{
    # Attributes for Azure Monitor schema
    [string]$Name #Name of the individual test/rule/alert that was executed. Unique, not exposed to the customer.
    [string]$Title #User-facing name; one or more sentences indicating the direct issue.
    [string]$Severity #Severity of the result (Critical, Warning, Informational, Hidden) – this answers how important the result is. Critical is the only update-blocking severity.
    [string]$Description #Detailed overview of the issue and what impact the issue has on the stamp.
    [psobject]$Tags #Key-value pairs that allow grouping/filtering individual tests. For example, "Group": "ReadinessChecks", "UpdateType": "ClusterAware"
    [string]$Status #The status of the check running (i.e. Failed, Succeeded, In Progress) – this answers whether the check ran, and passed or failed.
    [string]$Remediation #Set of steps that can be taken to resolve the issue found.
    [string]$TargetResourceID #The unique identifier for the affected resource (such as a node or drive).
    [string]$TargetResourceName #The name of the affected resource.
    [string]$TargetResourceType #The type of resource being referred to (well-known set of nouns in infrastructure, aligning with Monitoring).
    [datetime]$Timestamp #The Time in which the HealthCheck was called.
    [psobject]$AdditionalData #Property bag of key value pairs for additional information.
    [string]$HealthCheckSource #The name of the services called for the HealthCheck (I.E. Test-AzureStack, Test-Cluster).
}

function Test-ModuleUpdate
{
    <#
    .SYNOPSIS
        Checks PSGallery for updated module.
    .DESCRIPTION
        Checks PSGallery for updated module and gives user 10 seconds
        to cancel cmdlet and prints update instructions to screen
    #>

    param([switch]$PassThru)
    try
    {
        if (-not $PassThru)
        {
            $thisVersion = (Get-PSCallStack | Where-Object Command -like 'Invoke-AzstackHci*Validation').InvocationInfo.MyCommand.Version
            Log-Info ("Looking for module updates for AzStackHci.EnvironmentChecker greater than {0}" -f [system.string]$thisVersion)
            $ModuleOnline = Find-Module -Name AzStackHci.EnvironmentChecker -Repository PSGallery -AllowPrerelease -ErrorAction SilentlyContinue
            if ([system.version]$($ModuleOnline.Version -replace ('-preview', '')) -gt $thisVersion)
            {
                Log-Info ($lTxt.UpdateToVersion -f $ModuleOnline.Version, $ModuleOnline.Name) -ConsoleOut
                Start-Sleep -Seconds 10
            }
            else
            {
                Log-Info ($lTxt.CurrentVersion -f 'AzStackHci.EnvironmentChecker', [system.string]$thisVersion)
            }
        }
    }
    catch
    {
        Log-Info ($lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message) -Type Error
    }
}

function Test-Elevation
{
    ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')
}

function Test-Count
{
    [CmdletBinding()]
    param (
        [CimInstance[]]
        $CimData,

        [int]
        $minimum,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        $passed = $false
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $instanceId = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique

        if ($CimData.Count -lt $minimum)
        {
            $passed = $false
            $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum
            Log-Info $detail -Type Warning
        }
        else
        {
            $passed = $true
        }

        $result = New-Object HealthModel
        $Result.Name = 'AzStackHci_{0}_Test_{1}_Count' -f $ValidatorName, $className
        $Result.Title = 'Test {0} Count' -f $className
        $Result.Severity = $Severity
        $Result.Description = 'Checking {0} count' -f $className
        $Result.Remediation = 'https://aka.ms/hci-connect-chk'
        $Result.TargetResourceID = $InstanceId
        $Result.TargetResourceName = $InstanceId
        $Result.TargetResourceType = $className
        $Result.Timestamp = [datetime]::UtcNow
        $Result.HealthCheckSource = 'Environment Checker'
        $Result.AdditionalData = New-Object -TypeName PSObject -Property @{
            Source    = "$ClassName Count"
            Resource  = $CimData.count
            Detail    = $detail
            Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
            TimeStamp = [datetime]::UtcNow
        }
        $result.Status = if ($passed) { 'Succeeded' } else { 'Failed' }
        $result
    }
    catch
    {
        throw $_
    }
}

function Test-InstanceCountByGroup
{
    <#
    .SYNOPSIS
        Test if count matches across groups
    #>

    [CmdletBinding()]
    param (
        [CimInstance[]]
        $CimData,

        [string[]]
        $GroupProperty,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        $GroupValues = $cimData | Group-Object -Property $groupProperty | Select-Object -ExpandProperty Name
        $nodeCount = ($cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique).count
        foreach ($GroupValue in $GroupValues)
        {
            foreach ($group in $GroupProperty)
            {
                $gData = $CimData | Where-Object $Group -eq $GroupValue
                if ($gData.CimSystemProperties.SystemName.Count -eq 1)
                {
                    $serverName = $gData.CimSystemProperties.SystemName
                }
                else
                {
                    $serverName = 'AllServers'
                }

                $className = $gData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1

                $result = New-Object HealthModel
                $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Count_ByGroup' -f $ValidatorName, $className
                $result.Title = 'Test {0} Properties' -f $className
                $result.Severity = $Severity
                $result.Description = 'Checking all servers have same {0} instance count by group' -f $className
                $result.Remediation = 'https://aka.ms/hci-connect-chk'
                $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className
                $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className
                $result.TargetResourceType = $className
                $result.Timestamp = [datetime]::UtcNow
                $result.HealthCheckSource = 'Environment Checker'

                $groupData = $gData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } }
                $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique
                # The count of InstanceCounts must equal the number of servers to ensure each server has at least 1 instance
                # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, but SVR3 could have 5 disks of type A.
                # There should be only 1 unique InstanceCount from all values to ensure each server has the same instance count
                # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, SVR3 has 6 disks of type A.
                $Status = if ($groupData.InstanceCount.Count -ne $nodeCount -or $groupDataCount.Count -gt 1 ) { 'Failed' } else { 'Succeeded' }
                $result.AdditionalData = New-Object -TypeName PSObject -Property @{
                    Source    = $serverName
                    Resource  = $ClassName
                    Detail    = if ($status -eq 'Succeeded') {
                        $lTxt.CountByGroup -f $Group
                    }
                    else {
                        $dtl = $lTxt.CountByGroupFail -f $className, $group, `
                        (($groupData | ForEach-Object { "{0}: {1} instances of {2}" -f $_.Name, $_.InstanceCount, $GroupValue }) -join ', ')
                        Log-Info $dtl -Type Warning
                        $dtl
                    }
                    Status    = $Status
                    TimeStamp = [datetime]::UtcNow
                }
                $result.Status = if ($result.AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
                $result
            }
        }
    }
    catch
    {
        throw $_
    }
}

function Test-GroupProperty
{
    <#
    .SYNOPSIS
        Test if properties match across groups
    #>

    [CmdletBinding()]
    param (
        [CimInstance[]]
        $CimData,

        [string[]]
        $GroupProperty,

        [string[]]
        $MatchProperty,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        # Group by name and compare properties within each group
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $ServerName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
        $groupedData = @($CimData | Group-Object -Property $groupProperty)
        $returnResult = @()
        if ($serverName.Count -gt 1)
        {
            $serverName = 'AllServers'
        }
        $returnResult += foreach ($group in $groupedData)
        {
            $instanceId = "Machine: {0}, Class: {1} Group: {2}" -f $ServerName, $className, $group.Name

            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Group_Consistency' -f $ValidatorName, $className
            $result.Title = 'Test {0} Groups' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking {0} Groups for consistent properties' -f $className
            $result.Remediation = 'https://aka.ms/hci-connect-chk'
            $result.TargetResourceID = $instanceId
            $result.TargetResourceName = $instanceId
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            $detail = $null
            $passed = $false
            if ($group.Count -gt 1)
            {
                foreach ($propertyName in $matchProperty)
                {
                    if (($group.Group.$propertyName | Sort-Object | Get-Unique).Count -gt 1)
                    {
                        $passed = $false
                        $detail = $lTxt.MismatchProp -f $className, $propertyName, ($group.Group.$propertyName -join ', ')
                        Log-Info -Message $detail -Type Warning
                    }
                    else
                    {
                        $passed = $true
                    }
                    $AdditionalData += New-Object -TypeName PSObject -Property @{
                        Source    = "$($Group.Name) $propertyName"
                        Resource  = $instance.$propertyName
                        Detail    = $detail
                        Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                        TimeStamp = [datetime]::UtcNow
                    }
                }
            }
            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        $returnResult
    }
    catch
    {
        throw $_
    }
}

function Test-InstanceCount
{
    <#
    .SYNOPSIS
        Test if instance count matches across instances
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [CimInstance[]]
        $CimData,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    if ($CimData.CimSystemProperties.SystemName.Count -eq 1)
    {
        $serverName = $CimData.CimSystemProperties.SystemName
    }
    else
    {
        $serverName = 'AllServers'
    }

    $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1

    $result = New-Object HealthModel
    $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Count' -f $ValidatorName, $className
    $result.Title = 'Test {0} Properties' -f $className
    $result.Severity = $Severity
    $result.Description = 'Checking all servers have same {0} instance count' -f $className
    $result.Remediation = 'https://aka.ms/hci-connect-chk'
    $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className
    $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className
    $result.TargetResourceType = $className
    $result.Timestamp = [datetime]::UtcNow
    $result.HealthCheckSource = 'Environment Checker'

    $groupData = $cimData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } }
    $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique
    $status = if ($groupDataCount.Count -gt 1) { 'Failed' } else { 'Succeeded' }
    $result.AdditionalData = New-Object -TypeName PSObject -Property @{
        Source    = $serverName
        Resource  = $ClassName
        Detail    = if ($status -eq 'Succeeded') {
            $lTxt.InstanceCount
        }
        else {
            $lTxt.InstanceCountFail -f `
            $ClassName, (($groupData | ForEach-Object { "{0}: {1}" -f $_.Name, $_.InstanceCount }) -join ',')
        }
        Status    = $status
        TimeStamp = [datetime]::UtcNow
    }
    $result.Status = if ($result.AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
    $result
}

function Test-PropertySync
{
    <#
    .SYNOPSIS
        Test if properties match across instances
    #>


    [CmdletBinding()]
    param (
        [Parameter()]
        [CimInstance[]]
        $CimData,

        [Parameter()]
        [string[]]
        $MatchProperty,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        $returnResult = @()
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
        if ($serverName.Count -gt 1)
        {
            $serverName = 'AllServers'
            $returnResult += Test-InstanceCount -CimData $CimData
        }
        $returnResult += if ($CimData.Count -gt 1)
        {
            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Consistency' -f $ValidatorName, $className
            $result.Title = 'Test {0} Properties' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking all {0} for consistent properties' -f $className
            $result.Remediation = 'https://aka.ms/hci-connect-chk'
            $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className
            $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            foreach ($propertyName in $matchProperty)
            {
                $detail = $null
                $passed = $false
                if (($CimData.$propertyName | Get-Unique).Count -gt 1)
                {
                    $passed = $false
                    $detail = $lTxt.MismatchProp -f $className, $propertyName, ($CimData.$propertyName -join ',')
                    Log-Info -Message $detail -Type Warning
                }
                else
                {
                    $passed = $true
                }
                $AdditionalData += New-Object -TypeName PSObject -Property @{
                    Source    = "$className`: $propertyName"
                    Resource  = $instance.$propertyName
                    Detail    = $detail
                    Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                    TimeStamp = [datetime]::UtcNow
                }
            }
            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        return $returnResult
    }
    catch
    {
        throw $_
    }
}

function Test-DesiredProperty
{
    <#
    .SYNOPSIS
        Test if properties have required value
    #>

    [cmdletbinding()]
    param (
        [CimInstance[]]
        $cimData,

        [hashtable]
        $desiredPropertyValue,

        [string]
        $InstanceIdStr,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )

    try
    {
        # Test properties
        $returnResult = @()
        $returnResult += foreach ($instance in $cimData)
        {
            $serverName = $instance.CimSystemProperties.ServerName | Sort-Object | Get-Unique
            $sb = ([scriptblock]::Create($InstanceIdStr))
            $instanceId = Invoke-Command -ScriptBlock $sb
            $className = $instance.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
            Log-Info -Message ($lTxt.Test -f $className, $instanceId)

            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Properties' -f $ValidatorName, $className
            $result.Title = 'Test {0} Properties' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking {0} for desired properties' -f $className
            $result.Remediation = 'https://aka.ms/hci-connect-chk'
            $result.TargetResourceID = $instanceId
            $result.TargetResourceName = $instanceId
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            foreach ($propertyName in $desiredPropertyValue.Keys)
            {
                $detail = $null
                $passed = $false
                $hint = $null
                $desiredPropertyValueCheck = $null
                $desiredPropertyValueCheck = if ($desiredPropertyValue.$propertyName -is [hashtable])
                {
                    $desiredPropertyValue.$propertyName.Value
                }
                else
                {
                    $desiredPropertyValue.$propertyName
                }

                if (($instance.$propertyName | Select-Object -First 1) -notin $desiredPropertyValueCheck)
                {
                    $passed = $false
                    $hint = if ($desiredPropertyValue.$propertyName.hint) { ' ({0})' -f $desiredPropertyValue.$propertyName.hint }
                    $detail = $lTxt.UnexProp -f $className, $propertyName, $instance.$propertyName, ($desiredPropertyValueCheck -join ','), $hint
                    Log-Info -Message $detail -Type Warning
                }
                else
                {
                    $passed = $true
                }
                $AdditionalData += New-Object -TypeName PSObject -Property @{
                    Source    = "$className`: $propertyName"
                    Resource  = if ($hint) { "$($instance.$propertyName)$hint" } else { $instance.$propertyName }
                    Detail    = $detail
                    Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                    TimeStamp = [datetime]::UtcNow
                }
            }

            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        return $returnResult
    }
    catch
    {
        throw $_
    }
}

function Get-TestCount
{
    param (
        [Parameter()]
        [string]
        $ModuleName,

        [Parameter()]
        [string]
        $CommandPrefix
    )
    try
    {
        $command = Get-Command -Name $CommandPrefix* -Module $ModuleName
        if ($command)
        {
            return $command.Count
        }
        else
        {
            return 1
        }
    }
    catch
    {
        return 1
    }
}

function Get-DeploymentData
{
    [cmdletbinding()]
    param ($Path)

    try
    {
        $Json = Get-Content -Path $Path | ConvertFrom-Json
        $DeploymentData = $json.ScaleUnits[0].DeploymentData
        if ([string]::IsNullOrEmpty($DeploymentData))
        {
            Log-Info $lTxt.InvalidDeploymentData -Type Warning
            return $null
        }
        return $DeploymentData
    }
    catch
    {
        throw $_
    }
}

function Get-TestListByFunction
{
    <#
    .SYNOPSIS
        Retrieve list of tests for a given validator
    .DESCRIPTION
        Tests should be prefixed with Test- and reside in a "helpers" module
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [string]
        $prefix = 'Test-*',

        [Parameter()]
        [string]
        $ModuleName
    )

    try
    {
        $script:envchktestList = Get-Command -Name $prefix -Module $ModuleName | Select-Object -ExpandProperty Name
        Write-Debug -Message "Retrieving list of tests for $($validator.Command): $($script:envchktestList -join ',')" -verbose
        return $script:envchktestList
    }
    catch
    {
        Write-Debug -Message "Failed to retrieve test list. Error $($_.exception)" -Verbose
    }
}

function Select-TestList
{
    <#
    .SYNOPSIS
        Filter Testlist by Include, Exclude and File based exclusions
    .DESCRIPTION
        Include replaces complete list, exclude is applied and file based exclusions are removed by regex.
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [string[]]
        $TestList,

        [Parameter()]
        [string[]]
        $Include,

        [Parameter()]
        [string[]]
        $Exclude,

        [Parameter()]
        [string]
        $FilePath  = "$PsScriptRoot\ExcludeTests.txt"
    )
    try
    {
        $returnList = @($TestList)
        if ($include)
        {
            $returnList = $Include
            Log-Info "Setting tests to $($include -join ',')"
        }
        if ($exclude)
        {
            Log-Info "Removing tests $($exclude -join ',')"
            $returnList = $returnList | Select-String -Pattern $exclude -NotMatch
        }
        if ($returnList.count -eq 0)
        {
            throw "No tests to perform after filtering"
        }
        if (Test-Path -Path $FilePath)
        {
            $fileExclusion = Get-Content -Path $FilePath
            Log-Info "Reading exclusion file $FilePath" -ConsoleOut
            Log-Info "Applying file exclusions: $($fileExclusion -join ',')" -ConsoleOut
            $returnList = $returnList | Select-String -Pattern $fileExclusion -NotMatch
        }

        Log-Info "Test list: $($returnList -join ',')"
        if ($returnList.Count -eq 0)
        {
            Log-Info -Message "No tests to run." -ConsoleOut -Type Warning
            break noTestsBreak
        }
        return $returnList
    }
    catch
    {
        Log-Info "Failed to filter test list. Error: $($_.exception)" -Type Warning
    }
}
# SIG # Begin signature block
# MIInrQYJKoZIhvcNAQcCoIInnjCCJ5oCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDAu+lIzL7hGcXa
# wKAfmtWILF1d06SYvTi7jzc6vLpDr6CCDYEwggX/MIID56ADAgECAhMzAAACzI61
# lqa90clOAAAAAALMMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NjAxWhcNMjMwNTExMjA0NjAxWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQCiTbHs68bADvNud97NzcdP0zh0mRr4VpDv68KobjQFybVAuVgiINf9aG2zQtWK
# No6+2X2Ix65KGcBXuZyEi0oBUAAGnIe5O5q/Y0Ij0WwDyMWaVad2Te4r1Eic3HWH
# UfiiNjF0ETHKg3qa7DCyUqwsR9q5SaXuHlYCwM+m59Nl3jKnYnKLLfzhl13wImV9
# DF8N76ANkRyK6BYoc9I6hHF2MCTQYWbQ4fXgzKhgzj4zeabWgfu+ZJCiFLkogvc0
# RVb0x3DtyxMbl/3e45Eu+sn/x6EVwbJZVvtQYcmdGF1yAYht+JnNmWwAxL8MgHMz
# xEcoY1Q1JtstiY3+u3ulGMvhAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUiLhHjTKWzIqVIp+sM2rOHH11rfQw
# UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1
# ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDcwNTI5MB8GA1UdIwQYMBaAFEhu
# ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu
# bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w
# Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3
# Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx
# MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAeA8D
# sOAHS53MTIHYu8bbXrO6yQtRD6JfyMWeXaLu3Nc8PDnFc1efYq/F3MGx/aiwNbcs
# J2MU7BKNWTP5JQVBA2GNIeR3mScXqnOsv1XqXPvZeISDVWLaBQzceItdIwgo6B13
# vxlkkSYMvB0Dr3Yw7/W9U4Wk5K/RDOnIGvmKqKi3AwyxlV1mpefy729FKaWT7edB
# d3I4+hldMY8sdfDPjWRtJzjMjXZs41OUOwtHccPazjjC7KndzvZHx/0VWL8n0NT/
# 404vftnXKifMZkS4p2sB3oK+6kCcsyWsgS/3eYGw1Fe4MOnin1RhgrW1rHPODJTG
# AUOmW4wc3Q6KKr2zve7sMDZe9tfylonPwhk971rX8qGw6LkrGFv31IJeJSe/aUbG
# dUDPkbrABbVvPElgoj5eP3REqx5jdfkQw7tOdWkhn0jDUh2uQen9Atj3RkJyHuR0
# GUsJVMWFJdkIO/gFwzoOGlHNsmxvpANV86/1qgb1oZXdrURpzJp53MsDaBY/pxOc
# J0Cvg6uWs3kQWgKk5aBzvsX95BzdItHTpVMtVPW4q41XEvbFmUP1n6oL5rdNdrTM
# j/HXMRk1KCksax1Vxo3qv+13cCsZAaQNaIAvt5LvkshZkDZIP//0Hnq7NnWeYR3z
# 4oFiw9N2n3bb9baQWuWPswG0Dq9YT9kb+Cs4qIIwggd6MIIFYqADAgECAgphDpDS
# AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK
# V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0
# IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0
# ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla
# MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT
# H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG
# OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S
# 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz
# y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7
# 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u
# M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33
# X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl
# XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP
# 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB
# l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF
# RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM
# CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ
# BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud
# DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO
# 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0
# LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p
# Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y
# Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw
# cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA
# XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY
# 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj
# 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd
# d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ
# Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf
# wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ
# aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j
# NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B
# xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96
# eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7
# r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I
# RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIZgjCCGX4CAQEwgZUwfjELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z
# b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAsyOtZamvdHJTgAAAAACzDAN
# BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor
# BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQge56gymN/
# vUBnMLy/+lNwZ0Ov2QbWEWq17JXssPY6V10wQgYKKwYBBAGCNwIBDDE0MDKgFIAS
# AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN
# BgkqhkiG9w0BAQEFAASCAQBjkdm68bW5rjJCXWxPxdJP8WWmKEJ8P0Damgu8UbEd
# ry/lrV5zzTEoTS7LQ2Gf6j+t4kkc1QdbWo9Ge2Q1bOkxjkRwUEw0D65PSKmkOzMc
# 5nL6zVaFdAa7DY+YA2Cr5dmkzr7zbAtWR2sRuRn2o8g5EbQS/RzfXtLr3KVLpueH
# p/pAc8/NSTJmW1C4Qu/CeERAkaek4ZouKNzkd8lFEYcDLYf68Lir06mLbgHnzJkT
# 2mtQdjpi4jXn8pnYbfF9u3EFsZ59ZKj00r5ffkg3QNuIKFPNACq18iBq1v+EY54Y
# ZJmCiQr4IN6faAMxEkalYvh1BqTQzlfGDPsshMAOgllZoYIXDDCCFwgGCisGAQQB
# gjcDAwExghb4MIIW9AYJKoZIhvcNAQcCoIIW5TCCFuECAQMxDzANBglghkgBZQME
# AgEFADCCAVUGCyqGSIb3DQEJEAEEoIIBRASCAUAwggE8AgEBBgorBgEEAYRZCgMB
# MDEwDQYJYIZIAWUDBAIBBQAEIICTF6lTMV4GBKc6ENRA8io7yvwgY4ttDgeRQSen
# XQ8CAgZjc8ez0D8YEzIwMjIxMTI5MDgzMDEzLjg1MlowBIACAfSggdSkgdEwgc4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1p
# Y3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo0RDJGLUUzREQtQkVFRjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZaCCEV8wggcQMIIE+KADAgECAhMzAAABsKHjgzLojTvAAAEA
# AAGwMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo
# aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y
# cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw
# MB4XDTIyMDMwMjE4NTE0MloXDTIzMDUxMTE4NTE0Mlowgc4xCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVy
# YXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo0RDJG
# LUUzREQtQkVFRjElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vydmlj
# ZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJzGbTsM19KCnQc5RC7V
# oglySXMKLut/yWWPQWD6VAlJgBexVKx2n1zgX3o/xA2ZgZ/NFGcgNDRCJ7mJiOeW
# 7xeHnoNXPlg7EjYWulfk3oOAj6a7O15GvckpYsvLcx+o8Se8CrfIb40EJ8W0Qx4T
# IXf0yDwAJ4/qO94dJ/hGabeJYg4Gp0G0uQmhwFovAWTHlD1ci+sp36AxT9wIhHqw
# /70tzMvrnDF7jmQjaVUPnjOgPOyFWZiVr7e6rkSl4anT1tLv23SWhXqMs14wolv4
# ZeQcWP84rV2Frr1KbwkIa0vlHjlv4xG9a6nlTRfo0CYUQDfrZOMXCI5KcAN2BZ6f
# Vb09qtCdsWdNNxB0y4lwMjnuNmx85FNfzPcMZjmwAF9aRUUMLHv626I67t1+dZoV
# PpKqfSNmGtVt9DETWkmDipnGg4+BdTplvgGVq9F3KZPDFHabxbLpSWfXW90MZXOu
# FH8yCMzDJNUzeyAqytFFyLZir3j4T1Gx7lReCOUPw1puVzbWKspV7ModZjtN/IUW
# dVIdk3HPp4QN1wwdVvdXOsYdhG8kgjGyAZID5or7C/75hyKQb5F0Z+Ee04uY9K+s
# DZ3l3z8TQZWAfYurbZCMWWnmJVsu5V4PR5PO+U6D7tAtMvMULNYibT9+sxVZK/WQ
# er2JJ9q3Z7ljFs4lgpmfc6AVAgMBAAGjggE2MIIBMjAdBgNVHQ4EFgQUOt8BJDcB
# Jm4dy6ASZHrXIEfWNj8wHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIw
# XwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w
# cy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3Js
# MGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB
# JTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcD
# CDANBgkqhkiG9w0BAQsFAAOCAgEA3XPih5sNtUfAyLnlXq6MZSpCh0TF+uG+nhIJ
# 44//cMcQGEViZ2N263NwvrQjCFOni/+oxf76jcmUhcKWLXk9hhd7vfFBhZZzcF5a
# Ns07Uligs24pveasFuhmJ4y82OYm1G1ORYsFndZdvF//NrYGxaXqUNlRHQlskV/p
# mccqO3Oi6wLHcPB1/WRTLJtYbIiiwE/uTFEFEL45wWD/1mTCPEkFX3hliXEypxXz
# dZ1k6XqGTysGAtLXUB7IC6CH26YygKQuXG8QjcJBAUG/9F3yNZOdbFvn7FinZyNc
# IVLxld7h0bELfQzhIjelj+5sBKhLcaFU0vbjbmf0WENgFmnyJNiMrL7/2FYOLsgi
# QDbJx6Dpy1EfvuRGsdL5f+jVVds5oMaKrhxgV7oEobrA6Z56nnWYN47swwouucHf
# 0ym1DQWHy2DHOFRRN7yv++zes0GSCOjRRYPK7rr1Qc+O3nsd604Ogm5nR9QqhOOc
# 2OQTrvtSgXBStu5vF6W8DPcsns53cQ4gdcR1Y9Ng5IYEwxCZzzYsq9oalxlH+ZH/
# A6J7ZMeSNKNkrXPx6ppFXUxHuC3k4mzVyZNGWP/ZgcUOi2qV03m6Imytvi1kfGe6
# YdCh32POgWeNH9lfKt+d1M+q4IhJLmX0E2ZZICYEb9Q0romeMX8GZ+cbhuNsFimJ
# ga/fjjswggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3
# DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G
# A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIw
# MAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAx
# MDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK
# ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/
# XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1
# hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7
# M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3K
# Ni1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy
# 1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF80
# 3RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQc
# NIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahha
# YQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkL
# iWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV
# 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG
# CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUp
# zxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBT
# MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jv
# c29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYI
# KwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGG
# MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186a
# GMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3Br
# aS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsG
# AQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN
# AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1
# OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYA
# A7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbz
# aN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6L
# GYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3m
# Sj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0
# SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxko
# JLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFm
# PWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC482
# 2rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7
# vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC0jCC
# AjsCAQEwgfyhgdSkgdEwgc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n
# dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y
# YXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNv
# MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjo0RDJGLUUzREQtQkVFRjElMCMGA1UE
# AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA
# Ap4vkN3fD5FNBVYZklZeS/JFPBiggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt
# cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOcwEeIwIhgPMjAyMjExMjkwOTA2
# NDJaGA8yMDIyMTEzMDA5MDY0MlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA5zAR
# 4gIBADAKAgEAAgIJrgIB/zAHAgEAAgIR2jAKAgUA5zFjYgIBADA2BgorBgEEAYRZ
# CgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0G
# CSqGSIb3DQEBBQUAA4GBAE0glTPmOxBmcQpAH0UKgAqNWzE+dJQ/bnE04sipLEgJ
# Zvoq4ZfG5rpJod6zey+ah5qVoSGMWn5BMYOWKxjxU50Y220SDb7lSXkd8CU8dQqU
# OtFH4QCLXR7saf3YeQYHBKTWOHOgS2bHtPI6G8RJWHLQNfvuJjGhXMXN6gPeksIq
# MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0
# b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh
# dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA
# AAGwoeODMuiNO8AAAQAAAbAwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ
# AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgTBRxX+YKpv5SoxThDrUq
# oMcM9ipubMu4HSpE93sm3SEwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCDN
# BgtDd8uf9KTjGf1G67IfKmcNFJmeWTd6ilAy5xWEoDCBmDCBgKR+MHwxCzAJBgNV
# BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w
# HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m
# dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABsKHjgzLojTvAAAEAAAGwMCIEIOku
# qm1j9uPzpBcUQ6fYYEn+JufGhgK0tjDTBGeSAb/iMA0GCSqGSIb3DQEBCwUABIIC
# AG7RvbSFGjzyBnpJf9xYyDfAWcnxhOY+hNeyDBlD1NcRlLJYnxRG7RaJN3y46rio
# BbMCXAlREM6g5fUkqxxYHIg+MW5IBy/tPfZbuKngKaemnXSZDnVAn+oJAkcBwfZW
# FJ1T4H2zjv3iy3N9MBmU7hA12hayJ5NIaFSrfSUbrPAzst3cWtjeuFBunNdUHIlt
# Tv7SkOrMLK/Mzt8RRFiuQ0Ie5XhWIvvN1bVBQkXK0M67h7JXghxlpNeuVW6cSMpn
# O+FmPRV5bFoCN3RG5hu6co6bS7wAwGs5sKjFSkRA+382IhL3ZHt4EzLW6YaH7Vcd
# ZY6yu/MEiyPMXEJR6MfoRPD3Qc5BemlmCMMhnP8eEbgLJYTFr5bA5MzKz8tBYFgS
# RecGDmyGO9TTejLkwgbbcsuGgGz4qtH3iaIbaB1hWrpiPceHQ/I0QsGhYT3PxUlX
# 1LJUMgwjnHUiXS+I41fBtes0BmUTA42mV9RJEwAYb/5tJ4x/fa5JkMzsbD88K0aE
# hqnf3vLYqFq5C2rl7grIbttHq1jXio/GQ0zadFcPELa3V4lnB5wAtATTFrtEhLbD
# lVndfWKhobNj8QwgPAbC8pBUTNWcOCOSAtLWpWzDZ0CMBv4tnyl2kVrURpvz15Hm
# oNceVNwWiyHYyfwdCU+pFOmp3lGivs3xReqXukdMMyNO
# SIG # End signature block