Obs/bin/ObsDep/content/Powershell/Common/StorageHelpers.psm1

<###################################################
 # #
 # Copyright (c) Microsoft. All rights reserved. #
 # #
 ##################################################>


Import-Module $PSScriptRoot\Tracer.psm1 -DisableNameChecking
Import-Module $PSScriptRoot\ClusterHelpers.psm1 -DisableNameChecking

<#
 .Synopsis
  A helper funtion to convert a unprocessed share path (e.g. '{Infrastructure_2}\CloudMedia\Images\en-us') to its absolute file path.
 
  By default, it will convert to the local path for a cluster node to access locally.
    e.g. C:\ClusterStorage\Infrastructure_2\Shares\SU1_Infrastructure_2\CloudMedia\Images\en-us.
 
    e.g. \\v-host1\C$\ClusterStorage\Infrastructure_2\Shares\SU1_Infrastructure_2\CloudMedia\Images\en-us.
    If the $FromNoneClusterNode switch parameter is on, it will convert to the administrative share to the a cluster node for a none cluster machine to access remotely.
#>

function Get-SharePath {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [AllowEmptyString()]
        [string]
        $UnprocessedPath,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName,
        [Parameter(Mandatory = $False)]
        [switch]
        $UseCurrentVersion,
        [Parameter(Mandatory = $False)]
        [switch]
        $FromNoneClusterNode
    )

    # Add support for optionally writing {LatestVersion} string in to the library share paths
    $escapedLatestVersionPattern = [regex]::escape("{LatestVersion}")
    if ($UnprocessedPath -Match $escapedLatestVersionPattern)
    {
        Import-Module $PSScriptRoot\..\Roles\Common\RoleHelpers.psm1 -DisableNameChecking -Verbose:$false | Out-Null

        # Calculate the latest version from input parameters
        $version = Get-InProgressUpdateVersion -Parameters $Parameters
        if ($UseCurrentVersion -or ($version -eq $null))
        {
            $version = ([string]($Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.Version)).Trim()
        }

        $UnprocessedPath = $UnprocessedPath -replace $escapedLatestVersionPattern, $version
    }

    if ($UnprocessedPath -NotMatch "{.*}")
    {
        throw [System.ArgumentException] "Invalid path input: replace token not found. Path: $UnprocessedPath"
    }

    $replaceToken = [regex]::match($UnprocessedPath,'{([^}]*)}').Groups[1].Value

    # If path contains {DefaultLocalShare} or {DefaultClusterShare}, we need to look up cloud role for getting the defaults
    if ($replaceToken -eq "DefaultLocalShare")
    {
        $sharePath = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare
    }
    elseif ($replaceToken -eq "DefaultClusterShare")
    {
        $replaceToken = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultClusterShare
        $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
    }
    else
    {
        $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
    }

    if ($FromNoneClusterNode)
    {
        $activeNode = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $ClusterName | select -First 1
        $sharePath = $sharePath -replace 'C:', "\\$activeNode\c$"
    }

    $result = $UnprocessedPath -replace "{[^}]*}", $sharePath
    Trace-Execution "Get-SharePath: $UnprocessedPath -> $result"

    return $result
}

function Get-SharePathVersions {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [AllowEmptyString()]
        [string]
        $UnprocessedPath,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName
    )
    $result = [System.Collections.ArrayList]::new()
    $escapedLatestVersionPattern = [regex]::escape("{LatestVersion}")
    if ($UnprocessedPath -Match $escapedLatestVersionPattern)
    {
        if ($UnprocessedPath -NotMatch "{.*}")
        {
            throw [System.ArgumentException] "Invalid path input: replace token not found. Path: $UnprocessedPath"
        }
        $replaceToken = [regex]::match($UnprocessedPath,'{([^}]*)}').Groups[1].Value

        # If path contains {DefaultLocalShare} or {DefaultClusterShare}, we need to look up cloud role for getting the defaults
        if ($replaceToken -eq "DefaultLocalShare")
        {
            $sharePath = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultLocalShare
        }
        elseif ($replaceToken -eq "DefaultClusterShare")
        {
            $replaceToken = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultClusterShare
            $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
        }
        else
        {
            $sharePath = Get-ClusterShare -Parameters $Parameters -ClusterName $ClusterName -ShareType $replaceToken
        }

        $basePath = $UnprocessedPath.Substring(0,$UnprocessedPath.IndexOf($escapedLatestVersionPattern))
        $basePath = $basePath -replace "{[^}]*}", $sharePath
        $versionFolders = Get-ChildItem -Path $basePath | where {$_.Name -match '\d+(?:\.\d+)+'} | where {$_.Name -notmatch '\s+'}
        foreach($versionFolder in $versionFolders){
            $UnprocessedPath = $UnprocessedPath
            $path = $UnprocessedPath -replace $escapedLatestVersionPattern, $versionFolder.Name -replace "{[^}]*}", $sharePath
            $result.Add($path) | Out-Null
        }
    }
    return $result
}

<#
 .Synopsis
  Return the local path for an cluster shared infrastructure volume
#>

Function Get-ClusterShare {

    Param(
        [Parameter(Mandatory = $True)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,
        [Parameter(Mandatory = $True)]
        [string]
        $ClusterName,
        [Parameter(Mandatory = $True)]
        [ValidateSet("Infrastructure", "Infrastructure_2", "Infrastructure_3")]
        [string]
        $ShareType
    )
    # Temporary transition for Bug 15836892: Change CloudMedia content location from Infrastructure_2 to Infrastructure_1
    if ($ShareType -eq "Infrastructure_2")
    {
        $ShareType = $Parameters.Roles["Cloud"].PublicConfiguration.PublicInfo.DefaultInfraStorageLocations.DefaultClusterShare
        Trace-Warning "Resolving {Infrastructure_2} as {DefaultClusterShare} as temporary workaround.Bug 15836892"
    }

    $storageServerPrefix = $Parameters.Roles["Cluster"].PublicConfiguration.Clusters.Node | Where-Object Name -eq $ClusterName | Select-Object -ExpandProperty StorageServerPrefix
    $shareObject = $Parameters.Roles["Storage"].PublicConfiguration.PublicInfo.Shares.Share | Where-Object Type -eq $ShareType

    if (-not $shareObject)
    {
        throw [System.ArgumentException] "Invalid input: the cluster $ClusterName storage role contains no configuration for a share of type $ShareType."
    }

    $volumeName = $shareObject.Name
    $shareName = "${storageServerPrefix}_$($shareObject.Name)"

    $fullLocalPath = "C:\ClusterStorage\$volumeName\Shares\$shareName"

    return $fullLocalPath
}

function Test-LocalHostHasClusterStoragePath
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    Trace-Execution "Testing for presence of local CSV path on this node."
    Test-Path "C:\ClusterStorage"
}

function Get-LocalCsvPathFromSharePath
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $UNCSharePath,

        [Parameter(Mandatory = $false)]
        [string]
        $ClusterName
    )

    $ErrorActionPreference = "Stop"
    Trace-Execution "Getting local CSV path for share path $UNCSharePath on cluster $ClusterName."
    $pathParts = $UNCSharePath.Split("\")

    # Share path will look like \\SU1FileServer\SU1_Infrastructure_2\CloudMedia\WindowsUpdates\1.0.170925.1
    $smbShareName = $pathParts[3]

    if (-not $ClusterName)
    {
        $ClusterName = Get-ManagementClusterName $Parameters
    }
    $smbShare = Invoke-Command -ComputerName $ClusterName -ScriptBlock { Get-SmbShare | where Name -eq $using:smbShareName }

    if (-not $smbShare)
    {
        throw "An SMB share with the name '$smbShareName' could not be found on $ClusterName."
    }

    Trace-Execution "Found SMB share $smbShareName with local CSV path $($smbShare.Path)."
    return (Join-Path $smbShare.Path ($pathParts[4..$pathParts.Count] -join "\"))
}

<#
 .Synopsis
  Returns the name of the management cluster
#>

function Get-ManagementClusterName
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    $publicInfo = $Parameters.Roles["Cluster"].PublicConfiguration
    $clusterName = $publicInfo.Clusters.Node | ? IsManagementCluster -eq "true" | Select-Object -ExpandProperty "Name"

    return $clusterName
}

<#
 .Synopsis
  Returns the host names of the management cluster
#>

function Get-ManagementClusterNodes
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = "Stop"
    $managementClusterName = Get-ManagementClusterName $Parameters

    $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration
    $hostNames = @($physicalMachinesRole.Nodes.Node | ? RefClusterId -eq $managementClusterName | % Name)

    return $hostNames
}

<#
 .Synopsis
  Returns the RefClusterId of the Node
#>

function Get-NodeRefClusterId
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $RoleName,

        [Parameter(Mandatory = $true)]
        [string]
        $NodeName
    )

    $ErrorActionPreference = "Stop"

    $node = $Parameters.Roles[$RoleName].PublicConfiguration.Nodes.Node | ? Name -ieq $NodeName
    $clusterName = $node.RefClusterId

    return $clusterName
}

<#
 .Synopsis
  Returns the RefNodeId of the Node
#>

function Get-NodeRefNodeId
{
    [CmdletBinding()]
    param
    (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [string]
        $RoleName,

        [Parameter(Mandatory = $true)]
        [string]
        $NodeName
    )

    $ErrorActionPreference = "Stop"

    $node = $Parameters.Roles[$RoleName].PublicConfiguration.Nodes.Node | ? Name -ieq $NodeName
    return $node.RefNodeId
}

<#
 .Synopsis
  A replacement for Test-Path:
 
  1. differentiate file non-existence vs unexpected situlation such as location not accessible / share unavailability
     this cmdlet will return False on file non-existence; and throw the insider exception on other unexpected situlation
  2. optional retry feature, so that less random error will occure with logic like `if (-not test-path $Path) { throw "not found"}`
#>

function Test-PathStrict
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [string[]]
        $Path,

        [Parameter(Mandatory=$false)]
        [ValidateSet("Any", "Container", "Leaf")]
        [string] $PathType = 'Any',

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryCount = 0,

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryIntervalInSeconds = 60,

        [Parameter(Mandatory=$false)]
        [switch] $NoRetryOnItemNotFound = $false

    )

    $ErrorActionPreference = "Stop"
    $unexpectedException = $null
    for ($i = 0; $i -le $RetryCount; $i += 1) {
        if ($i -gt 0) {
            Start-Sleep -Seconds $RetryIntervalInSeconds
        }
        try {
            $r = dir -Path $Path
            if ($PathType -ieq 'Leaf') {
                if ($r.GetType().Name -ne 'FileInfo') {
                    throw "Path exists for $Path, however PathType not match (expected: Leaf, actual: Container)"
                }
            } elseif ($PathType -ieq 'Container') {
                if ($r.GetType().Name -eq 'FileInfo') {
                    throw "Path exists for $Path, however PathType not match (expected: Container, actual: Leaf)"
                }
            }
            return $true
        }
        catch {
            # `dir` will throw a single ItemNotFoundException when the folder/file doesn't exists but filesystem/smb-share is accessible & well connected
            # otherwise, UnauthorizedAccessException or other exception will be thrown together with ItemNotFoundException
            if ($_.length -eq 1 -and $_[0].Exception.GetType().Name -eq 'ItemNotFoundException') {
                if ($NoRetryOnItemNotFound) {
                    return $false
                }
                $unexpectedException = $null
            } else {
                $unexpectedException = $_
            }
        }
    }
    if ($unexpectedException -ne $null) {
        throw $unexpectedException;
    }
    return $false
}
<#
 .Synopsis
  A safe replacement for Test-Path, compare to Test-PathStrict:
 
  1. it doesn't retry on ItemNotFound
  2. during unexpected situlation (transient SMB connection issue), it by-default retry once after 60 seconds; then if the exception doesn't recover, it do the actual throwing
#>

function Test-PathSafe
{
    [CmdletBinding()]
    param(
        [Parameter(Mandatory = $true)]
        [string[]]
        $Path,

        [Parameter(Mandatory=$false)]
        [ValidateSet("Any", "Container", "Leaf")]
        [string] $PathType = 'Any',

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryCount = 1,

        [Parameter(Mandatory=$false)]
        [UInt32] $RetryIntervalInSeconds = 60
    )
    $ErrorActionPreference = "Stop"
    return (Test-PathStrict -Path $Path -PathType $PathType -RetryCount $RetryCount -RetryIntervalInSeconds $RetryIntervalInSeconds -NoRetryOnItemNotFound)
}

Export-ModuleMember -Function Get-ClusterShare
Export-ModuleMember -Function Get-LocalCsvPathFromSharePath
Export-ModuleMember -Function Test-LocalHostHasClusterStoragePath
Export-ModuleMember -Function Get-ManagementClusterName
Export-ModuleMember -Function Get-ManagementClusterNodes
Export-ModuleMember -Function Get-NodeRefClusterId
Export-ModuleMember -Function Get-NodeRefNodeId
Export-ModuleMember -Function Get-SharePath
Export-ModuleMember -Function Get-SharePathVersions
Export-ModuleMember -Function Test-PathSafe

# SIG # Begin signature block
# MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAWn7c0ZzmLURGf
# yTwwYAsS+F/3Et3x2D6YP8Zd3GHSpqCCDYUwggYDMIID66ADAgECAhMzAAADri01
# UchTj1UdAAAAAAOuMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwODU5WhcNMjQxMTE0MTkwODU5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQD0IPymNjfDEKg+YyE6SjDvJwKW1+pieqTjAY0CnOHZ1Nj5irGjNZPMlQ4HfxXG
# yAVCZcEWE4x2sZgam872R1s0+TAelOtbqFmoW4suJHAYoTHhkznNVKpscm5fZ899
# QnReZv5WtWwbD8HAFXbPPStW2JKCqPcZ54Y6wbuWV9bKtKPImqbkMcTejTgEAj82
# 6GQc6/Th66Koka8cUIvz59e/IP04DGrh9wkq2jIFvQ8EDegw1B4KyJTIs76+hmpV
# M5SwBZjRs3liOQrierkNVo11WuujB3kBf2CbPoP9MlOyyezqkMIbTRj4OHeKlamd
# WaSFhwHLJRIQpfc8sLwOSIBBAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUhx/vdKmXhwc4WiWXbsf0I53h8T8w
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMTgzNjAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AGrJYDUS7s8o0yNprGXRXuAnRcHKxSjFmW4wclcUTYsQZkhnbMwthWM6cAYb/h2W
# 5GNKtlmj/y/CThe3y/o0EH2h+jwfU/9eJ0fK1ZO/2WD0xi777qU+a7l8KjMPdwjY
# 0tk9bYEGEZfYPRHy1AGPQVuZlG4i5ymJDsMrcIcqV8pxzsw/yk/O4y/nlOjHz4oV
# APU0br5t9tgD8E08GSDi3I6H57Ftod9w26h0MlQiOr10Xqhr5iPLS7SlQwj8HW37
# ybqsmjQpKhmWul6xiXSNGGm36GarHy4Q1egYlxhlUnk3ZKSr3QtWIo1GGL03hT57
# xzjL25fKiZQX/q+II8nuG5M0Qmjvl6Egltr4hZ3e3FQRzRHfLoNPq3ELpxbWdH8t
# Nuj0j/x9Crnfwbki8n57mJKI5JVWRWTSLmbTcDDLkTZlJLg9V1BIJwXGY3i2kR9i
# 5HsADL8YlW0gMWVSlKB1eiSlK6LmFi0rVH16dde+j5T/EaQtFz6qngN7d1lvO7uk
# 6rtX+MLKG4LDRsQgBTi6sIYiKntMjoYFHMPvI/OMUip5ljtLitVbkFGfagSqmbxK
# 7rJMhC8wiTzHanBg1Rrbff1niBbnFbbV4UDmYumjs1FIpFCazk6AADXxoKCo5TsO
# zSHqr9gHgGYQC2hMyX9MGLIpowYCURx3L7kUiGbOiMwaMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAOuLTVRyFOPVR0AAAAA
# A64wDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEID8b
# ZRwnDE4PWPGY+g4V1+2Jovqkinr9botFrwL/oh+2MEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAjmE+qxnFuNqvDH4RJADNX6uNXHW0Mm5yBO+I
# jORkZTWZJnH7hF4klovVDgMs9l7Z+u9hiVmZ0KKlTu7EPcUZjUY2NoFFapRUuZar
# hEyeEb4Ycq63k2/YGk+u1K6D49WvPx7hrNuPyhJQ2iWOPIvDv3ZbSLuZo4cfcHoT
# tOpgfbxVxYiJCyYAWSsjT58iC7otSZrbpGtdVgpM4aPjwm0jlYb8VwZnSLsn8dXu
# FpRMVcmAE+rCQshtW9+2UPMildICTm3eIMHxj3h0lVAbHfKG5OfBrnrcF3PYlu1m
# yGaDZZ5f59T+O0ZEUGVz1PK1VCL5o66p+z0GD4JfX86qsDjQBaGCF5QwgheQBgor
# BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCB7SH9knK94WCeLvl9LQ+NRp7nrKxf7FE5/
# a8NgUnuY/AIGZeen66xXGBMyMDI0MDMxMTE4MTgxOS40MzRaMASAAgH0oIHRpIHO
# MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL
# ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk
# IFRTUyBFU046ODYwMy0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l
# LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAfGzRfUn6MAW1gAB
# AAAB8TANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx
# MDAeFw0yMzEyMDYxODQ1NTVaFw0yNTAzMDUxODQ1NTVaMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046ODYwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw
# ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCxulCZttIf8X97rW9/J+Q4
# Vg9PiugB1ya1/DRxxLW2hwy4QgtU3j5fV75ZKa6XTTQhW5ClkGl6gp1nd5VBsx4J
# b+oU4PsMA2foe8gP9bQNPVxIHMJu6TYcrrn39Hddet2xkdqUhzzySXaPFqFMk2Vi
# fEfj+HR6JheNs2LLzm8FDJm+pBddPDLag/R+APIWHyftq9itwM0WP5Z0dfQyI4Wl
# VeUS+votsPbWm+RKsH4FQNhzb0t/D4iutcfCK3/LK+xLmS6dmAh7AMKuEUl8i2kd
# WBDRcc+JWa21SCefx5SPhJEFgYhdGPAop3G1l8T33cqrbLtcFJqww4TQiYiCkdys
# CcnIF0ZqSNAHcfI9SAv3gfkyxqQNJJ3sTsg5GPRF95mqgbfQbkFnU17iYbRIPJqw
# gSLhyB833ZDgmzxbKmJmdDabbzS0yGhngHa6+gwVaOUqcHf9w6kwxMo+OqG3QZIc
# wd5wHECs5rAJZ6PIyFM7Ad2hRUFHRTi353I7V4xEgYGuZb6qFx6Pf44i7AjXbptU
# olDcVzYEdgLQSWiuFajS6Xg3k7Cy8TiM5HPUK9LZInloTxuULSxJmJ7nTjUjOj5x
# wRmC7x2S/mxql8nvHSCN1OED2/wECOot6MEe9bL3nzoKwO8TNlEStq5scd25GA0g
# MQO+qNXV/xTDOBTJ8zBcGQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFLy2xe59sCE0
# SjycqE5Erb4YrS1gMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G
# A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv
# Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs
# BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0
# LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH
# AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQDhSEjSBFSCbJyl
# 3U/QmFMW2eLPBknnlsfID/7gTMvANEnhq08I9HHbbqiwqDEHSvARvKtL7j0znICY
# BbMrVSmvgDxU8jAGqMyiLoM80788So3+T6IZV//UZRJqBl4oM3bCIQgFGo0VTeQ6
# RzYL+t1zCUXmmpPmM4xcScVFATXj5Tx7By4ShWUC7Vhm7picDiU5igGjuivRhxPv
# bpflbh/bsiE5tx5cuOJEJSG+uWcqByR7TC4cGvuavHSjk1iRXT/QjaOEeJoOnfes
# bOdvJrJdbm+leYLRI67N3cd8B/suU21tRdgwOnTk2hOuZKs/kLwaX6NsAbUy9pKs
# DmTyoWnGmyTWBPiTb2rp5ogo8Y8hMU1YQs7rHR5hqilEq88jF+9H8Kccb/1ismJT
# GnBnRMv68Ud2l5LFhOZ4nRtl4lHri+N1L8EBg7aE8EvPe8Ca9gz8sh2F4COTYd1P
# Hce1ugLvvWW1+aOSpd8NnwEid4zgD79ZQxisJqyO4lMWMzAgEeFhUm40FshtzXud
# AsX5LoCil4rLbHfwYtGOpw9DVX3jXAV90tG9iRbcqjtt3vhW9T+L3fAZlMeraWfh
# 7eUmPltMU8lEQOMelo/1ehkIGO7YZOHxUqeKpmF9QaW8LXTT090AHZ4k6g+tdpZF
# fCMotyG+E4XqN6ZWtKEBQiE3xL27BDCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb
# SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI
# EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv
# ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj
# YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy
# NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT
# B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE
# AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI
# yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo
# YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y
# aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v
# 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG
# ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS
# kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr
# bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM
# jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL
# W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF
# emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu
# rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE
# FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn
# G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW
# M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5
# Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi
# AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV
# 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js
# Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx
# MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2
# LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv
# 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn
# OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1
# bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4
# rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU
# 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF
# NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/
# HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU
# CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi
# excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm
# dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq
# ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx
# EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT
# FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp
# Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjg2MDMtMDVF
# MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK
# AQEwBwYFKw4DAhoDFQD7n7Bk4gsM2tbU/i+M3BtRnLj096CBgzCBgKR+MHwxCzAJ
# BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k
# MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv
# c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6ZlmUjAi
# GA8yMDI0MDMxMTExMTUzMFoYDzIwMjQwMzEyMTExNTMwWjB0MDoGCisGAQQBhFkK
# BAExLDAqMAoCBQDpmWZSAgEAMAcCAQACAgHNMAcCAQACAhOTMAoCBQDpmrfSAgEA
# MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI
# AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBABsS2alikAWAyTN2vu75E6samoC/
# Fu3+vsMG6Kex2246kK8LsOL3b7D6tqqCnOzx6LmFIrPx4iX/hi78l5XrE+VS62mN
# hsqVcOKiRJszh5/+kY+Q7GIf+IJowRM5e78lwZyeFsW2rpBxZFYMzRLaa7aQ0GwI
# yGPsGvk3WG/8H28im/1+Trqst/pDJuW3kTA8wBg92ZQC+PE1WfLzV/9ogMUgTkWt
# Cxmo87VcGdUfSZJV4MnFefTyHu8OJbExwkBRtGiCUOThO9aeswFLySOm3xtriFvZ
# o1llEehjJQOH5wiGqdqZibWoTuKpCGyeuUCWlMFHjw+SD1375f69MK580uExggQN
# MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ
# MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u
# MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAfGz
# RfUn6MAW1gABAAAB8TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G
# CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDD8LB6CBBtb548fMSFADZSGjOk
# D5muocWvGGLrNQFAIjCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EINV3/T5h
# S7ijwao466RosB7wwEibt0a1P5EqIwEj9hF4MIGYMIGApH4wfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTACEzMAAAHxs0X1J+jAFtYAAQAAAfEwIgQgz/F7cnn6
# p3gly+XdU0y0xYq2qzE816Vs+V4lq50whJkwDQYJKoZIhvcNAQELBQAEggIATPT1
# 6qVdIzAiHhjMSrkXjr1KLToU22QxaeZod5fcNsro1BVJK00lYuPbbWyWdT0OUmJs
# TqSeO1CiUIKNRp5Ya7e+/VcRdE2RCvIjhXTy9uGZHQf4saOQDMCaiX9qJz/DSDIU
# OWWw7gH3aancKLW1DDpXtsGmFSXxfUfCV0RMbbEz6pw4oU37F9eoAImwgzuqVAWC
# EAIfWKZR0xFft0KS3J8CldGs7+t2LxlUcERMbUqvIicnGL8hETdYs0U3lJkEy4ig
# Sh6ww0kl0QAo9eLWPyuM1Odjl2oJ/OZXpDc2t4RaCDJVrcxijm4sL0KF4T0vZPqr
# r4vx1Ol3IXaokNluVWovAYHyw7PxTwgvWX6Awq9fMYtjwa/9JMIKJ40uOk1h5zKK
# ZiE6pQvx2ymWIq34FsbatFWWG/EMuUN3Vyc0TZHKgBzCpPoCDN8nN5jbRvWtubd/
# BXxt+CuioMJ4BF91G1cAsSYODVIZ+D+wvzxsilJNB/vhHWA3LutArY5iNjNocBb6
# UIlBMO7+ML4o4vv+nDRrfA29bXF2sG4ZWDhZksFkhR0kpjdxyJpUozXx6EbfFk1B
# 3iOl0Fga+4/StMi2F33n9FKJ2nzvtQk5OidI96WNDfEVdh5hRge4Aa1/Zih9mOuU
# QNx0m2jaWDbuBwlyoWBKokmMnre65sb/RjlwT1A=
# SIG # End signature block