AzStackHciStandaloneObservability/package/bin/ObsDep/content/Powershell/Common/StorageHelpers.psm1

<###################################################
 # #
 # Copyright (c) Microsoft. All rights reserved. #
 # #
 ##################################################>


Import-Module $PSScriptRoot\Tracer.psm1 -DisableNameChecking
Import-Module $PSScriptRoot\ClusterHelpers.psm1 -DisableNameChecking

<#
 .Synopsis
  A helper funtion to convert a unprocessed share path (e.g. '{Infrastructure_2}\CloudMedia\Images\en-us') to its absolute file path.
 
  By default, it will convert to the local path for a cluster node to access locally.
    e.g. C:\ClusterStorage\Infrastructure_2\Shares\SU1_Infrastructure_2\CloudMedia\Images\en-us.
 
    e.g. \\v-host1\C$\ClusterStorage\Infrastructure_2\Shares\SU1_Infrastructure_2\CloudMedia\Images\en-us.
    If the $FromNoneClusterNode switch parameter is on, it will convert to the administrative share to the a cluster node for a none cluster machine to access remotely.
#>

function Get-SharePath {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [AllowEmptyString()]
        [string]
        $UnprocessedPath,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName,
        [Parameter(Mandatory = $False)]
        [switch]
        $UseCurrentVersion,
        [Parameter(Mandatory = $False)]
        [switch]
        $FromNoneClusterNode
    )

    # Add support for optionally writing {LatestVersion} string in to the library share paths
    $escapedLatestVersionPattern = [regex]::escape("{LatestVersion}")
    if ($UnprocessedPath -Match $escapedLatestVersionPattern)
    {
        Import-Module $PSScriptRoot\..\Roles\Common\RoleHelpers.psm1 -DisableNameChecking -Verbose:$false | Out-Null

        # Calculate the latest version from input parameters
        $version = Get-InProgressUpdateVersion -Parameters $Parameters
        if ($UseCurrentVersion -or ($version -eq $null))
        {
            $version = ([string]($Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.Version)).Trim()
        }

        $UnprocessedPath = $UnprocessedPath -replace $escapedLatestVersionPattern, $version
    }

    if ($UnprocessedPath -NotMatch "{.*}")
    {
        throw [System.ArgumentException] "Invalid path input: replace token not found. Path: $UnprocessedPath"
    }

    $replaceToken = [regex]::match($UnprocessedPath,'{([^}]*)}').Groups[1].Value

    # If path contains {DefaultLocalShare} or {DefaultClusterShare}, we need to look up cloud role for getting the defaults
    if ($replaceToken -eq "DefaultLocalShare")
    {
        $sharePath = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare
    }
    elseif ($replaceToken -eq "DefaultClusterShare")
    {
        $replaceToken = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultClusterShare
        $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
    }
    else
    {
        $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
    }

    if ($FromNoneClusterNode)
    {
        $activeNode = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $ClusterName | select -First 1
        $sharePath = $sharePath -replace 'C:', "\\$activeNode\c$"
    }

    $result = $UnprocessedPath -replace "{[^}]*}", $sharePath
    Trace-Execution "Get-SharePath: $UnprocessedPath -> $result"

    return $result
}

function Get-SharePathVersions {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [AllowEmptyString()]
        [string]
        $UnprocessedPath,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName
    )
    $result = [System.Collections.ArrayList]::new()
    $escapedLatestVersionPattern = [regex]::escape("{LatestVersion}")
    if ($UnprocessedPath -Match $escapedLatestVersionPattern)
    {
        if ($UnprocessedPath -NotMatch "{.*}")
        {
            throw [System.ArgumentException] "Invalid path input: replace token not found. Path: $UnprocessedPath"
        }
        $replaceToken = [regex]::match($UnprocessedPath,'{([^}]*)}').Groups[1].Value

        # If path contains {DefaultLocalShare} or {DefaultClusterShare}, we need to look up cloud role for getting the defaults
        if ($replaceToken -eq "DefaultLocalShare")
        {
            $sharePath = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare
        }
        elseif ($replaceToken -eq "DefaultClusterShare")
        {
            $replaceToken = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultClusterShare
            $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
        }
        else
        {
            $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
        }

        $basePath = $UnprocessedPath.Substring(0,$UnprocessedPath.IndexOf($escapedLatestVersionPattern))
        $basePath = $basePath -replace "{[^}]*}", $sharePath
        $versionFolders = Get-ChildItem -Path $basePath | where {$_.Name -match '\d+(?:\.\d+)+'} | where {$_.Name -notmatch '\s+'}
        foreach($versionFolder in $versionFolders){
            $UnprocessedPath = $UnprocessedPath
            $path = $UnprocessedPath -replace $escapedLatestVersionPattern, $versionFolder.Name -replace "{[^}]*}", $sharePath
            $result.Add($path) | Out-Null
        }
    }
    return $result
}

<#
 .Synopsis
  Return the local path for an cluster shared infrastructure volume
#>

Function Get-ClusterShare {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName,
        [Parameter(Mandatory = $True)]
        [ValidateSet("Infrastructure", "Infrastructure_2", "Infrastructure_3")]
        [string]
        $ShareType
    )

    $storageServerPrefix = $Parameters.Roles["Cluster"].PublicConfiguration.Clusters.Node | Where-Object Name -eq $ClusterName | Select-Object -ExpandProperty StorageServerPrefix
    $shareObject = $Parameters.Roles["Storage"].PublicConfiguration.PublicInfo.Shares.Share | Where-Object Type -eq $ShareType

    if (-not $shareObject)
    {
        throw [System.ArgumentException] "Invalid input: the cluster $ClusterName storage role contains no configuration for a share of type $ShareType."
    }

    $volumeName = $shareObject.Name
    $shareName = "${storageServerPrefix}_$($shareObject.Name)"

    $fullLocalPath = "C:\ClusterStorage\$volumeName\Shares\$shareName"

    return $fullLocalPath
}

function Test-LocalHostHasClusterStoragePath
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    Trace-Execution "Testing for presence of local CSV path on this node."
    Test-Path "C:\ClusterStorage"
}

function Get-LocalCsvPathFromSharePath
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $UNCSharePath,

        [Parameter(Mandatory = $false)]
        [string]
        $ClusterName
    )

    $ErrorActionPreference = "Stop"
    Trace-Execution "Getting local CSV path for share path $UNCSharePath on cluster $ClusterName."
    $pathParts = $UNCSharePath.Split("\")

    # Share path will look like \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\WindowsUpdates\1.0.170925.1
    $smbShareName = $pathParts[3]

    if (-not $ClusterName)
    {
        $ClusterName = Get-ManagementClusterName $Parameters
    }
    $smbShare = Invoke-Command -ComputerName $ClusterName -ScriptBlock { Get-SmbShare | where Name -eq $using:smbShareName }

    if (-not $smbShare)
    {
        throw "An SMB share with the name '$smbShareName' could not be found on $ClusterName."
    }

    Trace-Execution "Found SMB share $smbShareName with local CSV path $($smbShare.Path)."
    return (Join-Path $smbShare.Path ($pathParts[4..$pathParts.Count] -join "\"))
}

<#
 .Synopsis
  Returns the name of the management cluster
#>

function Get-ManagementClusterName
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    $publicInfo = $Parameters.Roles["Cluster"].PublicConfiguration
    $clusterName = $publicInfo.Clusters.Node | ? IsManagementCluster -eq "true" | Select-Object -ExpandProperty "Name"

    return $clusterName
}

<#
 .Synopsis
  Returns the host names of the management cluster
#>

function Get-ManagementClusterNodes
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    $managementClusterName = Get-ManagementClusterName $Parameters

    $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration
    $hostNames = @($physicalMachinesRole.Nodes.Node | ? RefClusterId -eq $managementClusterName | % Name)

    return $hostNames
}

<#
 .Synopsis
  Returns the RefClusterId of the Node
#>

function Get-NodeRefClusterId
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $RoleName,

        [Parameter(Mandatory = $true)]
        [string]
        $NodeName
    )

    $ErrorActionPreference = "Stop"

    $node = $Parameters.Roles[$RoleName].PublicConfiguration.Nodes.Node | ? Name -ieq $NodeName
    $clusterName = $node.RefClusterId

    return $clusterName
}

<#
 .Synopsis
  Returns the RefNodeId of the Node
#>

function Get-NodeRefNodeId
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $RoleName,

        [Parameter(Mandatory = $true)]
        [string]
        $NodeName
    )

    $ErrorActionPreference = "Stop"

    $node = $Parameters.Roles[$RoleName].PublicConfiguration.Nodes.Node | ? Name -ieq $NodeName
    return $node.RefNodeId
}

<#
 .Synopsis
  A replacement for Test-Path:
 
  1. differentiate file non-existence vs unexpected situlation such as location not accessible / share unavailability
     this cmdlet will return False on file non-existence; and throw the insider exception on other unexpected situlation
  2. optional retry feature, so that less random error will occure with logic like `if (-not test-path $Path) { throw "not found"}`
#>

function Test-PathStrict
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [string[]]
        $Path,

        [Parameter(Mandatory=$false)]
        [ValidateSet("Any", "Container", "Leaf")]
        [string] $PathType = 'Any',

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryCount = 0,

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryIntervalInSeconds = 60,
        
        [Parameter(Mandatory=$false)]
        [switch] $NoRetryOnItemNotFound = $false
        
    )

    $ErrorActionPreference = "Stop"
    $unexpectedException = $null
    for ($i = 0; $i -le $RetryCount; $i += 1) {
        if ($i -gt 0) {
            Start-Sleep -Seconds $RetryIntervalInSeconds
        }
        try {
            $r = dir -Path $Path
            if ($PathType -ieq 'Leaf') {
                if ($r.GetType().Name -ne 'FileInfo') {
                    throw "Path exists for $Path, however PathType not match (expected: Leaf, actual: Container)"
                }
            } elseif ($PathType -ieq 'Container') {
                if ($r.GetType().Name -eq 'FileInfo') {
                    throw "Path exists for $Path, however PathType not match (expected: Container, actual: Leaf)"
                }
            }
            return $true
        }
        catch {
            # `dir` will throw a single ItemNotFoundException when the folder/file doesn't exists but filesystem/smb-share is accessible & well connected
            # otherwise, UnauthorizedAccessException or other exception will be thrown together with ItemNotFoundException
            if ($_.length -eq 1 -and $_[0].Exception.GetType().Name -eq 'ItemNotFoundException') {
                if ($NoRetryOnItemNotFound) {
                    return $false
                }
                $unexpectedException = $null
            } else {
                $unexpectedException = $_
            }
        }
    }
    if ($unexpectedException -ne $null) {
        throw $unexpectedException;
    }
    return $false
}
<#
 .Synopsis
  A safe replacement for Test-Path, compare to Test-PathStrict:
 
  1. it doesn't retry on ItemNotFound
  2. during unexpected situlation (transient SMB connection issue), it by-default retry once after 60 seconds; then if the exception doesn't recover, it do the actual throwing
#>

function Test-PathSafe
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [string[]]
        $Path,

        [Parameter(Mandatory=$false)]
        [ValidateSet("Any", "Container", "Leaf")]
        [string] $PathType = 'Any',

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryCount = 1,

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryIntervalInSeconds = 60
    )
    $ErrorActionPreference = "Stop"
    return (Test-PathStrict -Path $Path -PathType $PathType -RetryCount $RetryCount -RetryIntervalInSeconds $RetryIntervalInSeconds -NoRetryOnItemNotFound)
}

Export-ModuleMember -Function Get-ClusterShare
Export-ModuleMember -Function Get-LocalCsvPathFromSharePath
Export-ModuleMember -Function Test-LocalHostHasClusterStoragePath
Export-ModuleMember -Function Get-ManagementClusterName
Export-ModuleMember -Function Get-ManagementClusterNodes
Export-ModuleMember -Function Get-NodeRefClusterId
Export-ModuleMember -Function Get-NodeRefNodeId
Export-ModuleMember -Function Get-SharePath
Export-ModuleMember -Function Get-SharePathVersions 
Export-ModuleMember -Function Test-PathSafe

# SIG # Begin signature block
# MIInzgYJKoZIhvcNAQcCoIInvzCCJ7sCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCA6UJ0IzLislrMs
# wDKO6a78/5eVxPIOspLXPjceH+qJmKCCDYUwggYDMIID66ADAgECAhMzAAADTU6R
# phoosHiPAAAAAANNMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI4WhcNMjQwMzE0MTg0MzI4WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDUKPcKGVa6cboGQU03ONbUKyl4WpH6Q2Xo9cP3RhXTOa6C6THltd2RfnjlUQG+
# Mwoy93iGmGKEMF/jyO2XdiwMP427j90C/PMY/d5vY31sx+udtbif7GCJ7jJ1vLzd
# j28zV4r0FGG6yEv+tUNelTIsFmmSb0FUiJtU4r5sfCThvg8dI/F9Hh6xMZoVti+k
# bVla+hlG8bf4s00VTw4uAZhjGTFCYFRytKJ3/mteg2qnwvHDOgV7QSdV5dWdd0+x
# zcuG0qgd3oCCAjH8ZmjmowkHUe4dUmbcZfXsgWlOfc6DG7JS+DeJak1DvabamYqH
# g1AUeZ0+skpkwrKwXTFwBRltAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUId2Img2Sp05U6XI04jli2KohL+8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMDUxNzAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# ACMET8WuzLrDwexuTUZe9v2xrW8WGUPRQVmyJ1b/BzKYBZ5aU4Qvh5LzZe9jOExD
# YUlKb/Y73lqIIfUcEO/6W3b+7t1P9m9M1xPrZv5cfnSCguooPDq4rQe/iCdNDwHT
# 6XYW6yetxTJMOo4tUDbSS0YiZr7Mab2wkjgNFa0jRFheS9daTS1oJ/z5bNlGinxq
# 2v8azSP/GcH/t8eTrHQfcax3WbPELoGHIbryrSUaOCphsnCNUqUN5FbEMlat5MuY
# 94rGMJnq1IEd6S8ngK6C8E9SWpGEO3NDa0NlAViorpGfI0NYIbdynyOB846aWAjN
# fgThIcdzdWFvAl/6ktWXLETn8u/lYQyWGmul3yz+w06puIPD9p4KPiWBkCesKDHv
# XLrT3BbLZ8dKqSOV8DtzLFAfc9qAsNiG8EoathluJBsbyFbpebadKlErFidAX8KE
# usk8htHqiSkNxydamL/tKfx3V/vDAoQE59ysv4r3pE+zdyfMairvkFNNw7cPn1kH
# Gcww9dFSY2QwAxhMzmoM0G+M+YvBnBu5wjfxNrMRilRbxM6Cj9hKFh0YTwba6M7z
# ntHHpX3d+nabjFm/TnMRROOgIXJzYbzKKaO2g1kWeyG2QtvIR147zlrbQD4X10Ab
# rRg9CpwW7xYxywezj+iNAc+QmFzR94dzJkEPUSCJPsTFMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGZ8wghmbAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAANNTpGmGiiweI8AAAAA
# A00wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIFvH
# bW0G+zJ2dwOIKf0433TCGsKLekZf2Lq8CiJd2CqCMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEA0uN+6y7hjmzEIE7u3YDQk3Vz9FHfoQGYxmWs
# Yqcb7ojWlrUSRJG7wPZwtD5nC6uuunSog1ddjxvF0u9/TLXfrb6AxLqgZ3YQJ8je
# DOFtO4nP8BYJlzR7kOwyQe8kEu4wxrNFNpulHsQxmrIM9Efvr9XarJplKD/iA0/C
# N78ThImuIwcKBBQDcQTFJcMGnBymDz6+t//400vMEcB7Q1E+nA77RWPH1CrZeMcf
# zobLOhfSnOKR67smpVUGwBmY2qRjlqZrpz2PG4EutlzaPGGMkgVpDAj3OMraczN0
# KtsuWape2/6u57Ix7aeC7gNjIK2HC9S82qx20XFUurSPTSPlqKGCFykwghclBgor
# BgEEAYI3AwMBMYIXFTCCFxEGCSqGSIb3DQEHAqCCFwIwghb+AgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCASduFGUZJGqwqePxpu9kCLLow1OFJ+yEnb
# BHGHhj4qKwIGZJL88cqfGBMyMDIzMDcxMzE5MjQyNC45OTVaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOjhENDEtNEJGNy1CM0I3MSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIReDCCBycwggUPoAMCAQICEzMAAAGz/iXO
# KRsbihwAAQAAAbMwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjIwOTIwMjAyMjAzWhcNMjMxMjE0MjAyMjAzWjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALR8
# D7rmGICuLLBggrK9je3hJSpc9CTwbra/4Kb2eu5DZR6oCgFtCbigMuMcY31QlHr/
# 3kuWhHJ05n4+t377PHondDDbz/dU+q/NfXSKr1pwU2OLylY0sw531VZ1sWAdyD2E
# QCEzTdLD4KJbC6wmAConiJBAqvhDyXxJ0Nuvlk74rdVEvribsDZxzClWEa4v62EN
# j/HyiCUX3MZGnY/AhDyazfpchDWoP6cJgNCSXmHV9XsJgXJ4l+AYAgaqAvN8N+Ep
# N+0TErCgFOfwZV21cg7vgenOV48gmG/EMf0LvRAeirxPUu+jNB3JSFbW1WU8Z5xs
# LEoNle35icdET+G3wDNmcSXlQYs4t94IWR541+PsUTkq0kmdP4/1O4GD54ZsJ5eU
# nLaawXOxxT1fgbWb9VRg1Z4aspWpuL5gFwHa8UNMRxsKffor6qrXVVQ1OdJOS1Jl
# evhpZlssSCVDodMc30I3fWezny6tNOofpfaPrtwJ0ukXcLD1yT+89u4uQB/rqUK6
# J7HpkNu0fR5M5xGtOch9nyncO9alorxDfiEdb6zeqtCfcbo46u+/rfsslcGSuJFz
# lwENnU+vQ+JJ6jJRUrB+mr51zWUMiWTLDVmhLd66//Da/YBjA0Bi0hcYuO/WctfW
# k/3x87ALbtqHAbk6i1cJ8a2coieuj+9BASSjuXkBAgMBAAGjggFJMIIBRTAdBgNV
# HQ4EFgQU0BpdwlFnUgwYizhIIf9eBdyfw40wHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADAWBgNVHSUB
# Af8EDDAKBggrBgEFBQcDCDAOBgNVHQ8BAf8EBAMCB4AwDQYJKoZIhvcNAQELBQAD
# ggIBAFqGuzfOsAm4wAJfERmJgWW0tNLLPk6VYj53+hBmUICsqGgj9oXNNatgCq+j
# Ht03EiTzVhxteKWOLoTMx39cCcUJgDOQIH+GjuyjYVVdOCa9Fx6lI690/OBZFlz2
# DDuLpUBuo//v3e4Kns412mO3A6mDQkndxeJSsdBSbkKqccB7TC/muFOhzg39mfij
# GICc1kZziJE/6HdKCF8p9+vs1yGUR5uzkIo+68q/n5kNt33hdaQ234VEh0wPSE+d
# CgpKRqfxgYsBT/5tXa3e8TXyJlVoG9jwXBrKnSQb4+k19jHVB3wVUflnuANJRI9a
# zWwqYFKDbZWkfQ8tpNoFfKKFRHbWomcodP1bVn7kKWUCTA8YG2RlTBtvrs3CqY3m
# ADTJUig4ckN/MG6AIr8Q+ACmKBEm4OFpOcZMX0cxasopdgxM9aSdBusaJfZ3Itl3
# vC5C3RE97uURsVB2pvC+CnjFtt/PkY71l9UTHzUCO++M4hSGSzkfu+yBhXMGeBZq
# LXl9cffgYPcnRFjQT97Gb/bg4ssLIFuNJNNAJub+IvxhomRrtWuB4SN935oMfvG5
# cEeZ7eyYpBZ4DbkvN44ZvER0EHRakL2xb1rrsj7c8I+auEqYztUpDnuq6BxpBIUA
# lF3UDJ0SMG5xqW/9hLMWnaJCvIerEWTFm64jthAi0BDMwnCwMIIHcTCCBVmgAwIB
# AgITMwAAABXF52ueAptJmQAAAAAAFTANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UE
# BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc
# BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0
# IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5IDIwMTAwHhcNMjEwOTMwMTgyMjI1
# WhcNMzAwOTMwMTgzMjI1WjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDCC
# AiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAOThpkzntHIhC3miy9ckeb0O
# 1YLT/e6cBwfSqWxOdcjKNVf2AX9sSuDivbk+F2Az/1xPx2b3lVNxWuJ+Slr+uDZn
# hUYjDLWNE893MsAQGOhgfWpSg0S3po5GawcU88V29YZQ3MFEyHFcUTE3oAo4bo3t
# 1w/YJlN8OWECesSq/XJprx2rrPY2vjUmZNqYO7oaezOtgFt+jBAcnVL+tuhiJdxq
# D89d9P6OU8/W7IVWTe/dvI2k45GPsjksUZzpcGkNyjYtcI4xyDUoveO0hyTD4MmP
# frVUj9z6BVWYbWg7mka97aSueik3rMvrg0XnRm7KMtXAhjBcTyziYrLNueKNiOSW
# rAFKu75xqRdbZ2De+JKRHh09/SDPc31BmkZ1zcRfNN0Sidb9pSB9fvzZnkXftnIv
# 231fgLrbqn427DZM9ituqBJR6L8FA6PRc6ZNN3SUHDSCD/AQ8rdHGO2n6Jl8P0zb
# r17C89XYcz1DTsEzOUyOArxCaC4Q6oRRRuLRvWoYWmEBc8pnol7XKHYC4jMYcten
# IPDC+hIK12NvDMk2ZItboKaDIV1fMHSRlJTYuVD5C4lh8zYGNRiER9vcG9H9stQc
# xWv2XFJRXRLbJbqvUAV6bMURHXLvjflSxIUXk8A8FdsaN8cIFRg/eKtFtvUeh17a
# j54WcmnGrnu3tz5q4i6tAgMBAAGjggHdMIIB2TASBgkrBgEEAYI3FQEEBQIDAQAB
# MCMGCSsGAQQBgjcVAgQWBBQqp1L+ZMSavoKRPEY1Kc8Q/y8E7jAdBgNVHQ4EFgQU
# n6cVXQBeYl2D9OXSZacbUzUZ6XIwXAYDVR0gBFUwUzBRBgwrBgEEAYI3TIN9AQEw
# QTA/BggrBgEFBQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9E
# b2NzL1JlcG9zaXRvcnkuaHRtMBMGA1UdJQQMMAoGCCsGAQUFBwMIMBkGCSsGAQQB
# gjcUAgQMHgoAUwB1AGIAQwBBMAsGA1UdDwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/
# MB8GA1UdIwQYMBaAFNX2VsuP6KJcYmjRPZSQW9fOmhjEMFYGA1UdHwRPME0wS6BJ
# oEeGRWh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01p
# Y1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNybDBaBggrBgEFBQcBAQROMEwwSgYIKwYB
# BQUHMAKGPmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2kvY2VydHMvTWljUm9v
# Q2VyQXV0XzIwMTAtMDYtMjMuY3J0MA0GCSqGSIb3DQEBCwUAA4ICAQCdVX38Kq3h
# LB9nATEkW+Geckv8qW/qXBS2Pk5HZHixBpOXPTEztTnXwnE2P9pkbHzQdTltuw8x
# 5MKP+2zRoZQYIu7pZmc6U03dmLq2HnjYNi6cqYJWAAOwBb6J6Gngugnue99qb74p
# y27YP0h1AdkY3m2CDPVtI1TkeFN1JFe53Z/zjj3G82jfZfakVqr3lbYoVSfQJL1A
# oL8ZthISEV09J+BAljis9/kpicO8F7BUhUKz/AyeixmJ5/ALaoHCgRlCGVJ1ijbC
# HcNhcy4sa3tuPywJeBTpkbKpW99Jo3QMvOyRgNI95ko+ZjtPu4b6MhrZlvSP9pEB
# 9s7GdP32THJvEKt1MMU0sHrYUP4KWN1APMdUbZ1jdEgssU5HLcEUBHG/ZPkkvnNt
# yo4JvbMBV0lUZNlz138eW0QBjloZkWsNn6Qo3GcZKCS6OEuabvshVGtqRRFHqfG3
# rsjoiV5PndLQTHa1V1QJsWkBRH58oWFsc/4Ku+xBZj1p/cvBQUl+fpO+y/g75LcV
# v7TOPqUxUYS8vwLBgqJ7Fx0ViY1w/ue10CgaiQuPNtq6TPmb/wrpNPgkNWcr4A24
# 5oyZ1uEi6vAnQj0llOZ0dFtq0Z4+7X6gMTN9vMvpe784cETRkPHIqzqKOghif9lw
# Y1NNje6CbaUFEMFxBmoQtB1VM1izoXBm8qGCAtQwggI9AgEBMIIBAKGB2KSB1TCB
# 0jELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMk
# TWljcm9zb2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1U
# aGFsZXMgVFNTIEVTTjo4RDQxLTRCRjctQjNCNzElMCMGA1UEAxMcTWljcm9zb2Z0
# IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUAcYtE6JbdHhKlwkJe
# KoCV1JIkDmGggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu
# Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv
# cmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAN
# BgkqhkiG9w0BAQUFAAIFAOhaexYwIhgPMjAyMzA3MTMyMTMxMDJaGA8yMDIzMDcx
# NDIxMzEwMlowdDA6BgorBgEEAYRZCgQBMSwwKjAKAgUA6Fp7FgIBADAHAgEAAgIF
# IzAHAgEAAgIT1TAKAgUA6FvMlgIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEE
# AYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBBQUAA4GB
# AA6WnuPAJmXUSj5Yp21/2le/lG+jm2M7tD5lqqAznYlbV4GEu0HQZ26AiC06jZnB
# kdYxOBsLeQu7vNfTt0Q7M8m/74Q5yiJ6KN20D2NFM/Hgygl6MMxqXcQz9Tj96ScY
# EEhwpw1xlrQMteRMjoNDwGKabA3C2M7WRyYimX8sVpyqMYIEDTCCBAkCAQEwgZMw
# fDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1Jl
# ZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMd
# TWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGz/iXOKRsbihwAAQAA
# AbMwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJAzENBgsqhkiG9w0BCRAB
# BDAvBgkqhkiG9w0BCQQxIgQgXSXSrxSsQ7z0EvIogTbkIO612hq5ijSfNVRAy27J
# DLYwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCCGoTPVKhDSB7ZG0zJQZUM2
# jk/ll1zJGh6KOhn76k+/QjCBmDCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBD
# QSAyMDEwAhMzAAABs/4lzikbG4ocAAEAAAGzMCIEIELDJ4uTAIvOOC4GCl91uiSl
# XIFlmiKLgYrkmWHKBejVMA0GCSqGSIb3DQEBCwUABIICAGEgIdnwM9U048RlG6f6
# ZCgX7/Kr92J9B4QhABoa1Jg85AcMHBC1Z2J8Ms5oQfLL3yAEAuSDBpXgge6pygBH
# mluO3yzKtNuAt6PLaQ5jlD39esFxjn7KTtvs0/8uLthr0G/Q6FcsAUv5e4kbYaSy
# 8Luox+9zsY9bAZcDbdqL0R67QjNPeRow6gcgH61b4m+nyJxXW/GLg4boYNadGrXb
# zLs5096lG24PTudtZ+DUPItKRP5iPBP+gepgS09NkEkgJ0kxYNKhNNmq7+9t5ZHP
# MA0tGTtW0aq/Kv2iawbg6AcDefeN56q7C1jlJnd0GfZewW+fbLJDsiRqGFbOb9Qc
# Jo6CXZ3Yw3wc881pATBzxP9Le0otZz21okM5wmlrO223ZPY9aZervYXUFoxmQ4SB
# 0oWKcT27pymHJYcTsIq18VviTsJQwktlV44hIka04eHCyMPqKAiaGYmsVdyFRyjK
# nrzatkx2oqbTK0qz9JhrYI8ilo0C84KOudNbjbQMCwJKqHmEcpzTT1TyCzZjOsnY
# UA2rRnL1STNLFRGdb5VRWcK6RegyAFoxv6FfqVt9RmUCVQsAYm7yUH8W47qxcVvA
# /Dum9rO6qBZttC78NmKLgTkE8QTd2/DlGws12sKSWFyTvKr5jSIJwlJ6P7CZOYqk
# n1uAawCg+6Bp2vG1YNAbnM3T
# SIG # End signature block