AzStackHciSBEHealth/AzStackHciSBEHealth.psm1
<#############################################################
# # # Copyright (C) Microsoft Corporation. All rights reserved. # # # #############################################################> $MetaData = @{ "OperationType" = @("Deployment", "Update", "PreUpdate", "PostUpdate") "UIName" = 'Azure Stack HCI SBE Health' "UIDescription" = 'Check SBE Health requirements' } Import-Module $PSScriptRoot\..\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global Import-Module $PSScriptRoot\AzStackHci.SBEHealth.Helpers.psm1 -Force -DisableNameChecking -Global function Test-AzStackHciSBEHealth { param ( [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $Parameters, [parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] $OperationType, [parameter(Mandatory = $false)] [ValidateSet('Small','Medium','Large')] [String] $HardwareClass = "Medium", [parameter(Mandatory = $false)] [ValidateSet('Standard','Stretch','RackAware')] [String] $ClusterPattern = "Standard", [parameter(Mandatory = $false)] [switch] $FailFast ) try { # Import Module via Helper in case this is update [EnvironmentValidator]::EnvironmentValidatorImport($Parameters) $ENV:EnvChkrOp = $OperationType Trace-Execution "Starting SBE Health validation for $OperationType" $allResult = @() $exitEarly = $false # Start with default of running SBE from local SBE Cache paths (needed for Deployment and AddNode since CSV doesn't exist or isn't accessible yet) $runFrom = "LOCAL" if ($OperationType -eq 'Deployment') { Trace-Execution "Checking SBE Configuration" $sbeConfigNuget = Get-ASArtifactPath -NugetName "Microsoft.AzureStack.SBEConfiguration" # Only run tests if the SBE Package is 4.1.x.x or later $sbeVerMatch = "[4-9]\.[1-9]\." if ($sbeConfigNuget -notmatch $sbeVerMatch) { $detailedMessage = "SBE Configuration nuget '$($sbeConfigNuget)' does not support this test. Must be version 4.1.x.x or later." Trace-Execution $detailedMessage $allResult += (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = $detailedMessage}) $exitEarly = $true } $sbeMetadataPath = Join-Path -Path $sbeConfigNuget -ChildPath "content" $oemMetadataXmlPath = Join-Path -Path $sbeMetadataPath -ChildPath "oemMetadata.xml" if ($false -eq (Test-Path -Path $oemMetadataXmlPath)) { throw "Unable to locate oemMetadata.xml file at $oemMetadataXmlPath" } [xml]$oemMetadata = Get-Content -Path $oemMetadataXmlPath $sbeVersion = $oemMetadata.UpdatePackageManifest.UpdateInfo.Version Trace-Execution "Getting SBE Package source local path" $sbeSourcePath = $Parameters.Roles["SBE"].PublicConfiguration.PublicInfo.SBEContentPaths.SBESeedNodePath if ($null -eq $sbeSourcePath) { $detailedMessage = "SBE Seed Node Path property did not get populated. Please retry the deployment." Trace-Execution $detailedMessage throw $detailedMessage } } elseif ($OperationType -eq 'PreUpdate') { # First, make sure firewall rules are not blocking access to the manifest endpoint try { $diagnosticInfo = Get-SolutionDiscoveryDiagnosticInfo 3>$null 4>$null $sbeEndpoint = $diagnosticInfo.Configuration.ComponentUris["SBE"] Trace-Execution "SBE manifest endpoint: $sbeEndpoint" } catch { Trace-Execution "Failed to get SBE manifest endpoint from Get-SolutionDiscoveryDiagnosticInfo. Error: $($PSItem.Exception.Message)" } $endpointAccessResult = New-SBEHealthResultObject -TestName 'Test-Endpoint-Connectivity' -TargetName $env:ComputerName -Severity 'CRITICAL' -Status 'SUCCESS' -Description "Validate SBE manifest reachable: $sbeEndpoint" $endpointAccessResult.TargetResourceID = $sbeEndpoint $endpointAccessResult.TargetResourceName = 'Hardware vendor Solution Builder Extension manifest' if ([System.String]::IsNullOrWhiteSpace($sbeEndpoint)) { Trace-Execution "SBE manifest endpoint not reported by Get-SolutionDiscoveryDiagnosticInfo." $endpointAccessResult.Status = 'FAILURE' # don't want to block updates if there is a bug with Get-SolutionDiscoveryDiagnosticInfo reporting the endpoint $endpointAccessResult.Severity = 'WARNING' $endpointAccessResult.Description = "SBE manifest endpoint not reported by Get-SolutionDiscoveryDiagnosticInfo." $endpointAccessResult.Remediation = "Check the Get-SolutionDiscoveryDiagnosticInfo output for the SBE manifest endpoint. If it is missing, check the Solution Discovery service configuration." } else { try { Trace-Execution = "Checking connectivity to SBE manifest endpoint: $sbeEndpoint" # Need to use try/catch. Apparently Invoke-WebRequest doesn't really support SilentlyContinue $manifestResponse = Invoke-WebRequest -Uri $sbeEndpoint -UseBasicParsing -ErrorAction SilentlyContinue Trace-Execution "SBE manifest response: $($manifestResponse.StatusCode)" } catch { $msg = "Failed to reach SBE manifest endpoint: $sbeEndpoint. Error: $($PSItem.Exception.Message)" Trace-Execution $msg $endpointAccessResult.Status = 'FAILURE' $endpointAccessResult.Description = $msg } if ($null -eq $manifestResponse) { $msg = "Failed to reach SBE manifest endpoint: $sbeEndpoint. No response received." Trace-Execution $msg $endpointAccessResult.Status = 'FAILURE' $endpointAccessResult.Description = $msg } elseif ($manifestResponse.StatusCode -ne 200) { $msg = "Failed to reach SBE manifest endpoint: $sbeEndpoint. Response code: $($manifestResponse.StatusCode)" Trace-Execution $msg $endpointAccessResult.Status = 'FAILURE' $endpointAccessResult.Description = $msg } if ($endpointAccessResult.Status -eq 'FAILURE') { $endpointAccessResult.Remediation = "Check firewall rules to ensure the SBE manifest endpoint $sbeEndpoint is reachable." if ($sbeEndpoint -like "*aka.ms*") { $endpointAccessResult.Remediation += " NOTE: Because aka.ms redirects, you will need to allow HTTPS(443) to aka.ms, redirectiontool.trafficmanager.net, and to the target of $sbeEndpoint. To determine the redirection target, browse to $sbeEndpoint and note the URL that it redirects to in your browser address bar." } } } # continue with other tests - having bad firewall rules doesn't mean we can skip the rest of the tests $allResult += $endpointAccessResult # Next, get the installed SBE info - we might need to fall back to this SBE $sbeVersion = '1.0' $sbeSourcePath = [System.Environment]::GetEnvironmentVariable("SBEInstalledContent", "Machine") $sbeMetadataPath = [System.Environment]::GetEnvironmentVariable("SBEInstalledMetadata", "Machine") if ($null -ne $sbeMetadataPath) { $oemMetadataXmlPath = Join-Path -Path $sbeMetadataPath -ChildPath "oemMetadata.xml" if ($true -eq (Test-Path -Path $oemMetadataXmlPath)) { [xml]$oemMetadata = Get-Content -Path $oemMetadataXmlPath $sbeVersion = $oemMetadata.UpdatePackageManifest.UpdateInfo.Version } } $sbeInstalled = $false $installSBEResult = New-SBEHealthResultObject -TestName 'Test-Installed-SBE-Env-Vars' -TargetName $env:ComputerName -Status 'SUCCESS' -Description "Validate Installed SBE Env Vars" if (($null -ne $sbeSourcePath) -and ($null -ne $sbeMetadataPath) -and ($null -ne $sbeVersion)) { $detailedMessage = "Detected SBE $sbeVersion is installed. TBD if we will use this or a newer version for checks." $sbeInstalled = $true } elseif ((($null -eq $sbeSourcePath) -and ($null -eq $sbeMetadataPath) -and ($null -eq $sbeVersion)) -or ($sbeVersion -eq '1.0')) { Trace-Execution "SBE ENV vars - content: [$sbeSourcePath], metadata: [$sbeMetadataPath], sbeVersion [$sbeVersion]" $detailedMessage = "No SBE installed. May be skipping checks if this isn't an update including an SBE." } else { $detailedMessage = "Inconsistent SBE ENV vars!! content: [$sbeSourcePath], metadata: [$sbeMetadataPath], sbeVersion [$sbeVersion]" $installSBEResult.Severity = 'WARNING' $installSBEResult.Remediation = "Update to latest available Solution Builder Extension to restore consistent SBE state." } Trace-Execution $detailedMessage $installSBEResult.AdditionalData.Detail = $detailedMessage $allResult += $installSBEResult # Figure out if this is a period "system" healthcheck or "preUpdate" HealthCheck $runtimeParameters = $Parameters.RunInformation['RuntimeParameter'] $packagePath = $runtimeParameters["UpdatePackagePath"] $updateVersion = $runtimeParameters["UpdateVersion"] if ($null -eq $packagePath) { Trace-Execution "System HealthCheck detected." if ($sbeInstalled) { Trace-Execution -Message "System check scenario - Using installed SBE - content: [$sbeSourcePath], metadata: [$sbeMetadataPath], sbeVersion [$sbeVersion]" # For the "installed" system check scenario we want to just run from the installed CSV dir as it is already properly organzied (with split content and metadata) # Note: We can't run from the update CSV as it is messy - has combined content and metadata as well as the zip files $runFrom = "CSV" } else { # Early exit, there is no SBE to test with $exitEarly = $true } } else { Trace-Execution "Update package @: [$packagePath]" Trace-Execution "Update version @: [$updateVersion]" $updateEnvVarsForSBE = $false # The package path is expected to be a full path to an update package file (e.g. a self- # extracting .exe, metadata.xml, or oemMetadata.xml file). The content is in the same dir. # Also paths from runtime params often have extra \\ in them like: C:\\ClusterStorage\\Infrastructure_1\\Shares\\SU1_Infrastructure_1\\Updates\\Packages\Solution99.9999.9.11\metadata.xml $updatePackageBaseDir = (Split-Path $packagePath -Parent).Replace( '\\', '\') if ($updateVersion -match '^\d{2}\.\d{4}\..*') { # Version is something like 10.2405.1.13 and indicates this is a solution update $potentialSBEPath = "$updatePackageBaseDir\SBE" if (Test-Path -Path $potentialSBEPath) { $sbeSourcePath = $potentialSBEPath $sbeMetadataPath = $potentialSBEPath $oemMetadataXmlPath = Join-Path -Path $sbeMetadataPath -ChildPath "oemMetadata.xml" if ($false -eq (Test-Path -Path $oemMetadataXmlPath)) { throw "Unable to locate oemMetadata.xml file at $oemMetadataXmlPath" } [xml]$oemMetadata = Get-Content -Path $oemMetadataXmlPath $sbeVersion = $oemMetadata.UpdatePackageManifest.UpdateInfo.Version Trace-Execution "Using SBE from Solution Update - content: [$sbeSourcePath], metadata: [$sbeMetadataPath], sbeVersion [$sbeVersion]" $updateEnvVarsForSBE = $true } elseif ($sbeInstalled) { Trace-Execution -Message "Non-SBE Solution update scenario - Using installed SBE - content: [$sbeSourcePath], metadata: [$sbeMetadataPath], sbeVersion [$sbeVersion]" # run from the installed CSV dir as it is already properly organzied (with split content and metadata) $runFrom = "CSV" } else { # Early exit, this is a Solution update w/o an SBE and there is no SBE installed Trace-Execution "Skipping tests as no SBE is installed and there is no SBE from this Solution Update" $exitEarly = $true } } elseif ($updateVersion -match '\d\.\d\.\d{4}\..*') { $sbeSourcePath = $updatePackageBaseDir $sbeMetadataPath = $updatePackageBaseDir $sbeVersion = $updateVersion $updateEnvVarsForSBE = $true Trace-Execution "Using SBE from SBE-only Update - content: [$sbeSourcePath], metadata: [$sbeMetadataPath], sbeVersion [$sbeVersion]" } } $sbeVersionFormatted = "1.0" if ([System.Version]::TryParse($sbeVersion,[ref]$sbeVersionFormatted)) { if($sbeVersionFormatted -lt [System.Version]"4.1") { $versionResult = New-SBEHealthResultObject -TestName 'Test-Version-Supports-$OperationType-Tests' -TargetName $env:ComputerName -Status 'SUCCESS' -Description "Validate SBE Version supports $OperationType type tests." $detailedMessage = "Skipping tests. SBE '$OperationType' type Health Checks are only supported with version 4.1.x.x or later (SBE version was $sbeVersion)." Trace-Execution $detailedMessage $versionResult.AdditionalData.Detail = $detailedMessage $allResult += $versionResult $exitEarly = $true } } } elseif ($OperationType -eq 'PreAddNode') { # TODO : Future placeholder for when AddNode tests are implemented Trace-Execution "SBE Health validation for $OperationType has not been implemented yet" $allResult += (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = 'SBE Health validation has been skipped as this OperationType is not yet supported.'}) $exitEarly = $true } else { Trace-Execution "OperationType $OperationType is not implemented" $allResult += (New-Object -TypeName PsObject -Property @{Result = 'INFORMATIONAL'; FailedResult = $null; ExecutionDetail = 'SBE Health validation has been skipped as this OperationType is not yet supported.'}) $exitEarly = $true } # Done with built-in checks - send result to telemetry channel foreach ($res in $allResult) { Write-ETWResult -Result $res } if ($exitEarly) { Trace-Execution "SBE Health built-in tests failed. Exit early before partner tests." return [EnvironmentValidator]::ParseResult($allResult, 'SBEHealth', $FailFast) } $priorStageVersion = $null $priorStageRootPath = $null $priorSBEMeatadataPath = $null if ($true -eq $updateEnvVarsForSBE) { # While we haven't technically staged the SBE yet, set the env vars so some of the helper functions know where to find the metadata files or SBE content # IMPORTANT: We MUST put these values back to their prior values when we are done (success or fail). If we don't we will get new + old mismatches: # - scenario 1: system checks will fail (old install dir + new metadata path) # - scenario 2: after scenario 1 fails we have pre-update checks will fail due to both new and old files being at the cache path (since we do pssession copy-item copy first instead of a robocopy /MIR type copy) $priorStageVersion = [System.Environment]::GetEnvironmentVariable("SBEStageVersion", "Machine") Trace-Execution "Temporarily changing SBEStageVersion from '$priorStageVersion' to '$sbeVersion'" [System.Environment]::SetEnvironmentVariable("SBEStageVersion", $sbeVersion, "Machine") $priorStageRootPath = [System.Environment]::GetEnvironmentVariable("SBEStageRootPath", "Machine") Trace-Execution "Temporarily changing SBEStageRootPath from '$priorStageRootPath' to '$sbeSourcePath'" [System.Environment]::SetEnvironmentVariable("SBEStageRootPath", $sbeSourcePath, "Machine") $priorSBEMeatadataPath = [System.Environment]::GetEnvironmentVariable("SBEStagedMetadata", "Machine") Trace-Execution "Temporarily changing SBEStagedMetadata from '$priorSBEMeatadataPath' to '$sbeMetadataPath'" [System.Environment]::SetEnvironmentVariable("SBEStagedMetadata", $sbeMetadataPath, "Machine") } Trace-Execution "Getting PSSessions for all hosts" # No prep for the partner validators $psSession = [EnvironmentValidator]::NewPsSessionAllHosts($Parameters) # Update mapping as needed each time envChecker adds a new OperationType that we want to translate to an SBE healthCheck "tag" $envCheckerToSBEPrecheckTagMap = @{ PreUpdate = "Update" PostUpdate = "Update" PreAddNode = "AddNode" } $tag = $OperationType if ($null -ne $envCheckerToSBEPrecheckTagMap.$OperationType) { # EnvChecker has invented some new test types that SBE doesn't support - use mapping table to translate to SBE equivalent $tag = $envCheckerToSBEPrecheckTagMap.$OperationType } $params = @{ PsSession = $psSession PassThru = $true OutputPath = "$($env:LocalRootFolderPath)\MASLogs\" HardwareClass = $HardwareClass ClusterPattern = $ClusterPattern Tag = $tag SBESourcePath = $sbeSourcePath SBEMetadataPath = $sbeMetadataPath SBEVersion = $sbeVersion ECEParameters = $Parameters RunFrom = $runFrom } # Run Partner SBE Health Checks [array]$partnerResults = AzStackHci.EnvironmentChecker\Invoke-AzStackHciSBEHealthValidation @params if ($null -ne $partnerResults -and $partnerResults.Count -gt 0) { $allResult += $partnerResults } return [EnvironmentValidator]::ParseResult($allResult, 'SBEHealth', $FailFast) } catch { Trace-Execution "Validator failed. $PSItem" Trace-Execution "$($PSItem.ScriptStackTrace)" throw $PSItem } finally { #return the EnvVars to default values if ($OperationType -eq 'PreUpdate') { try { Trace-Execution "Reverting SBE env vars to default values" $templatedSBEPath = $Parameters.Roles["SBE"].PublicConfiguration.PublicInfo.SBEContentPaths.SBESharePath $sbeCSVDir = $templatedSBEPath.Replace('{DefaultClusterShare}', $env:InfraCSVRootFolderPath) if ($false -eq (Test-Path -Path $sbeCSVDir)) { Trace-Execution "Unable to locate SBE CSV path at $sbeCSVDir" } else { Trace-Execution "Resolved SBE CSV path to '$sbeCSVDir'" $defaultStagedMetadata = Join-Path -Path $sbeCSVDir -ChildPath $Parameters.Roles["SBE"].PublicConfiguration.PublicInfo.SBEContentPaths.RelativePaths.CSVStagedMetadataPath $defaultStagedRoot = Join-Path -Path $sbeCSVDir -ChildPath $Parameters.Roles["SBE"].PublicConfiguration.PublicInfo.SBEContentPaths.RelativePaths.CSVStagedContentPath if ($false -eq [System.String]::IsNullOrWhiteSpace($defaultStagedMetadata) -and (Test-Path -Path $defaultStagedMetadata)) { $newSBEMeatadataPath = [System.Environment]::GetEnvironmentVariable("SBEStagedMetadata", "Machine") Trace-Execution "Reverting changing SBEStagedMetadata from '$newSBEMeatadataPath' to default '$defaultStagedMetadata'" [System.Environment]::SetEnvironmentVariable("SBEStagedMetadata", $defaultStagedMetadata, "Machine") } if ($false -eq [System.String]::IsNullOrWhiteSpace($defaultStagedRoot) -and (Test-Path -Path $defaultStagedRoot)) { $newStageRootPath = [System.Environment]::GetEnvironmentVariable("SBEStageRootPath", "Machine") Trace-Execution "Reverting changing SBEStageRootPath from '$newStageRootPath' to default '$defaultStagedRoot'" [System.Environment]::SetEnvironmentVariable("SBEStageRootPath", $defaultStagedRoot, "Machine") } $installedSBEVersion = [System.Environment]::GetEnvironmentVariable("SBEInstallVersion", "Machine") if ([System.String]::IsNullOrWhiteSpace($installedSBEVersion) -or $false -eq $installedSBEVersion.StartsWith("4")) { $installedSBEVersion = "2.1.0.0" Trace-Execution "No SBEis installed, will revert staged SBE back to '$installedSBEVersion'" } $sbeVersion = [System.Environment]::GetEnvironmentVariable("SBEStageVersion", "Machine") Trace-Execution "Reverting changing SBEStageVersion from '$sbeVersion' to the actual installed value '$installedSBEVersion'" [System.Environment]::SetEnvironmentVariable("SBEStageVersion", $installedSBEVersion, "Machine") } } catch { Trace-Execution "Failed to revert SBE env vars. $($PSItem.Exception.Message)" Trace-Execution "$($PSItem.ScriptStackTrace)" } } if ($psSession) { $psSession | Microsoft.PowerShell.Core\Remove-PSSession } } } Export-ModuleMember -Function Test-AzStackHciSBEHealth -Variable MetaData # SIG # Begin signature block # MIIoUQYJKoZIhvcNAQcCoIIoQjCCKD4CAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBF73EDae78V4+d # peZ7Mabfa/QEjPmrQ8AG3NIFaomc/aCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGiIwghoeAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILor # 2MTmh89twzmUmy8hhJDOgpXkX1vIqEbjpXIoBKeGMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAJ6wIMk8G9hpp6lupGhB2bzUbyG3mDNujvJ4N # bp+u0+7WE69ZrjRIcFI5pgXNjk97lSM4BzOr4SZfzHSPmZNeQEm0SYf0ACIVIRIv # TXoN0LN3oSnqfdV7NpMxnmdJI0YBMx2UJDmk+UM3yOVK/QeVzxWBTMyLZ3Pj8dZ8 # NIcWyS8+5oAjXphbm7PUlkQhj18ptWCsFQ9OISjO14NKkgP7v3h1DErkI6urumwp # 469ZZCPhrjMej8mYRYCrRBhgIP5+NLJpXQ8gHNDS+GJlvOCWeZlFF6MXrCiGXvH1 # nIXCNzKMFWfmBKAdhLAtZ8LaH2vQxEcwleDoLO8QAMjktCDPlqGCF6wwgheoBgor # BgEEAYI3AwMBMYIXmDCCF5QGCSqGSIb3DQEHAqCCF4UwgheBAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCBYz3EpWPJB7A34XhRuzHYu8JwpqzlPFZAN # MIPkcEndhwIGaC4KsIG6GBIyMDI1MDYxMDE1NDgzMS45OVowBIACAfSggdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIR+zCCBygwggUQoAMCAQICEzMAAAH/Ejh8 # 98Fl1qEAAQAAAf8wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg # UENBIDIwMTAwHhcNMjQwNzI1MTgzMTE5WhcNMjUxMDIyMTgzMTE5WjCB0zELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z # b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046NEMxQS0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDJ # 6JXSkHtuDz+pz+aSIN0lefMlY9iCT2ZMZ4jenNCmzKtElERZwpgd3/11v6DfPh1T # hUKQBkReq+TE/lA1O0Ebkil7GmmHg+FuIkrC9f5RLgqRIWF/XB+UMBjW270JCqGH # F8cVXu+G2aocsIKYPGFk+YIGH39d8UlAhTBVlHxG1SSDOY31uZaJiB9fRH5sMCed # xR22nXGMaYKl0EzKCT8rSHdtRNTNAdviQ9/bKWQo+hYVifYY1iBbDw8YFQ7S9Mwq # NgPqkt4E/SFkOHk/d/jGEYubrH3zG4hCn9EWfMFuC2HJJcaX41PVxkCobISFPsvR # J1HupCW/mnAM16tsrdhIQMqTewOH1LrSEsk2o/vWIcqQbXvkcDKDrOYTmnd842v3 # 98gSk8CULxiKzFdoZfhGkMFhUqkaPQUJnCKyJmzGbRf3DplKTw45d/wnFNhYip9G # 5bN1SKvRneOI461oOrtd3KkHiBmuGv3Qpw9MNHC/LrTOtBxr/UPUns9AkAk5tuJp # uiLXa6xXxrG2VP90J48Lid1wVxqvW/5+cKWGz27cWfouQcNFl83OFeAsMTBvp0Dj # Lezob6BDfmj3SPaLpqZprwmxX9wIX6INIbMDFljWxDWat0ybPF9bNc3qw8kzLj21 # 2xZMiBlZU5JL25QeFJiRuAzGct6Ipd4HkwH1Axw5JwIDAQABo4IBSTCCAUUwHQYD # VR0OBBYEFMP6leT+tP93sT/RATuEfTDP7pRhMB8GA1UdIwQYMBaAFJ+nFV0AXmJd # g/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9z # b2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6 # Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGlt # ZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0l # AQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUA # A4ICAQA5I03kykuLK6ebzrp+tYiLSF1rMo0uBGndZk9+FiA8Lcr8M0zMuWJhBQCn # pa2CiUitq2K9eM4bWUiNrIb2vp7DgfWfldl0N8nXYMuOilqnl7WJT9iTR660/J86 # J699uwjNOT8bnX66JQmTvvadXNq7qEjYobIYEk68BsBUVHSDymlnAuCFPjPeaQZm # Or87hn89yZUa2MamzZMK0jitmM81bw7hz/holGZhD811b3UlGs5dGnJetMpQ97eQ # 3w3nqOmX2Si0uF293z1Fs6wk1/ZfOpsBXteNXhxoKCUDZu3MPFzJ9/BeEu70cxTd # 0thMAj3WBM1QXsED2rUS9KUIoqU3w3XRjiJTSfIiR+lHFjIBtHKrlA9g8kcYDRPL # Q8PzdoK3v1FrQh0MgxK7BeWlSfIjLHCsPKWB84bLKxYHBD+Ozbj1upA5g92nI52B # F7y1d0auAOgF65U4r5xEKVemKY1jCvrWhnb+Q8zNWvNFRgyQFd71ap1J7OHy3K26 # 6VhhxEr3mqKEXSKtCzr9Y5AmW1Bfv2XMVcT0UWWf0yLHRqz4Lgc/N35LRsE3cDdd # FE7AC/TXogK5PyFjUifJbuPBWY346RDXN6LroutTlG0DPSdPHHk54/KOdNoi1NJj # g4a4ZTVJdofj0lI/e3zIZgD++ittbhWd54PvbUWDBolOgcWQ4jCCB3EwggVZoAMC # AQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29m # dCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIy # NVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9 # DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2 # Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N # 7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXc # ag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJ # j361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjk # lqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37Zy # L9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M # 269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLX # pyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLU # HMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode # 2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEA # ATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYE # FJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEB # MEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # RG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEE # AYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB # /zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEug # SaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9N # aWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsG # AQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jv # b0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt # 4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsP # MeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++ # Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9 # QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2 # wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aR # AfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5z # bcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nx # t67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3 # Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+AN # uOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/Z # cGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNWMIICPgIBATCCAQGhgdmkgdYw # gdMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsT # JE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMe # blNoaWVsZCBUU1MgRVNOOjRDMUEtMDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3Nv # ZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCpE4xsxLwlxSVy # c+TBEsVE9cWymaCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MA0GCSqGSIb3DQEBCwUAAgUA6/I8kjAiGA8yMDI1MDYxMDA1MDkzOFoYDzIwMjUw # NjExMDUwOTM4WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDr8jySAgEAMAcCAQAC # Agi3MAcCAQACAhNBMAoCBQDr844SAgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisG # AQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZIhvcNAQELBQAD # ggEBAI3IPjO5X7RFSj3jdX4vFhZVS5JCfozPhaPv6WK7Ct8/J2/67IIhND8I7Ouq # 142JNot7ysnl9I15NcNcChUgzaw00Q8ScdFQIkC4sn+CCt7CE3Buo2WVEHP0pK3D # v7XkmnR6LoBZRJrHW+v83dTD+0z6CP3wzgN9JD3monVoOl2pM226kczx61zI8AUV # nmn7ar8s5CJqTgCjmvdfearft2/Cj2g0pOdeSzD8kp9swk2amek+4zHkyKzZywcw # OuT+zjG0VhP6tOhKsdfCeyM2HHL8eepLg5bdajoFuGml5wiH2l7XOICUEUwiGnbX # KltGnjccwyUuZnZbfmnOFEUK/5YxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGlt # ZS1TdGFtcCBQQ0EgMjAxMAITMwAAAf8SOHz3wWXWoQABAAAB/zANBglghkgBZQME # AgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJ # BDEiBCAUaIup4qIyySsWJZ1fQtSGWzEFODmnUwftl7kpXi+fPzCB+gYLKoZIhvcN # AQkQAi8xgeowgecwgeQwgb0EIOQy777JAndprJwi4xPq8Dsk24xpU4jeoONIRXy6 # nKf9MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAH/ # Ejh898Fl1qEAAQAAAf8wIgQgboVxZUKU+LyOJzlvs3Ly5/3BFe9dvgxc19Q1VZyL # MfwwDQYJKoZIhvcNAQELBQAEggIAQgcTq29la60Dba5AEZ82ELgda4PqMKmPKsi/ # kpU+wBSAkNf+Ku83orxrCvh4Dj+d3SkN0FUTibC1TVBHZnJaIDPjy4TkIBQ9U5SW # EBIfysizi4p9KD/GFe01ZeJI1YLIx0LpgZ+7mvkvfFinFZAvKQvO8uaou+TGn45r # 9EXrBvoRW/a9avdOv3NWv8NjjS8N+iFxu3u4DlwYRG4G5X4MGya2RGSR3R0PXukC # L1sMWgkbswm0MyY443D1YW6/yR0g9cJGe4T8izxph63SEiZ5NnZIGpgh5tjdAhTL # TRv8SLszxvxmk8aGpOFILqfchn/dmIcvooy70q3FQ7L8hbjMonxRIhjLW769IXL6 # zkbCPni3J5Tir9H2c/sphhxrMApDyp91qWQ6EzVF+U1xgDea4jJRGyyXrjM1XM9S # kLNUnhcZXsX5h/cKI/Yzj5wWYLzoDLNnwSMoEd9nU/f3pO5GQydaqDrQgGeLu0vU # c3bGRPwBlbq+pZeqpQsHvtHCu/AZz5+sflMPlFed2QkHMbLmsUHqDQqHXt2GEN1i # 9cuYR6XlxB+f89JW0QGB9bq2XqA451C88X5vqoMbCd4aLnP8RV8BJXbIaeCM67IG # gV6rDp6WkcXqQr8nCMl+WSx4XnTD4HQuyB+Gxz0y2An/mfZC+1RsUtgln61Mssja # xP+I7z0= # SIG # End signature block |