Testing/Unit/PowerShell/Support/Get-ScubaGearAppPermission.Tests.ps1

Import-Module (Join-Path -Path $PSScriptRoot -ChildPath "../../../../Modules/Support/ServicePrincipal.psm1") -Force

InModuleScope ServicePrincipal {
    Describe "Get-ScubaGearAppPermission" {
        BeforeAll {
            # Load mock resource service principals - one for each API
            $MockResourceSP_Graph = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockResourceSP_Graph.json") | ConvertFrom-Json
            $MockResourceSP_Exchange = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockResourceSP_Exchange.json") | ConvertFrom-Json
            $MockResourceSP_SharePoint = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockResourceSP_SharePoint.json") | ConvertFrom-Json

            # Mock all external dependencies
            Mock -CommandName Connect-GraphHelper -MockWith { return $null }

            Mock -CommandName Get-ServicePrincipalPermissions -MockWith {
                return @(
                    [PSCustomObject]@{
                        leastPermissions    = @('PrivilegedAccess.Read.AzureADGroup')
                        resourceAPIAppId    = '00000003-0000-0000-c000-000000000000'
                        scubaGearProduct    = 'aad'
                    },
                    [PSCustomObject]@{
                        leastPermissions    = @('Policy.Read.All')
                        resourceAPIAppId    = '00000003-0000-0000-c000-000000000000'
                        scubaGearProduct    = 'aad'
                    },
                    [PSCustomObject]@{
                        leastPermissions    = @('Exchange.ManageAsApp')
                        resourceAPIAppId    = '00000002-0000-0ff1-ce00-000000000000'
                        scubaGearProduct    = 'exo'
                    },
                    [PSCustomObject]@{
                        leastPermissions    = @('Sites.FullControl.All')
                        resourceAPIAppId    = '00000003-0000-0ff1-ce00-000000000000'
                        scubaGearProduct    = 'sharepoint'
                    },
                    [PSCustomObject]@{
                        leastPermissions    = @('PrivilegedEligibilitySchedule.Read.AzureADGroup')
                        resourceAPIAppId    = '00000003-0000-0000-c000-000000000000'
                        scubaGearProduct    = 'aad'
                    },
                    [PSCustomObject]@{
                        leastPermissions    = @('RoleManagementPolicy.Read.AzureADGroup')
                        resourceAPIAppId    = '00000003-0000-0000-c000-000000000000'
                        scubaGearProduct    = 'aad'
                    },
                    [PSCustomObject]@{
                        leastPermissions    = @('Directory.Read.All')
                        resourceAPIAppId    = '00000003-0000-0000-c000-000000000000'
                        scubaGearProduct    = 'aad'
                    },
                    [PSCustomObject]@{
                        leastPermissions    = @('RoleManagement.Read.Directory')
                        resourceAPIAppId    = '00000003-0000-0000-c000-000000000000'
                        scubaGearProduct    = 'aad'
                    },
                    [PSCustomObject]@{
                        leastPermissions    = @('User.Read.All')
                        resourceAPIAppId    = '00000003-0000-0000-c000-000000000000'
                        scubaGearProduct    = 'aad'
                    }
                )
            }

            Mock -CommandName Get-ScubaGearPermissions -MockWith {
                param($OutAs)
                if ($OutAs -eq 'role') {
                    return @('Global Reader')
                }
                return @()
            }

            Mock -CommandName Get-ScubaGearAppRoleID -MockWith {
                return @(
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000003-0000-0000-c000-000000000000'
                        APIName = 'PrivilegedAccess.Read.AzureADGroup'
                        AppRoleID = '01e37dc9-c035-40bd-b438-b2879c4870a6'
                        Product = 'aad'
                    },
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000003-0000-0000-c000-000000000000'
                        APIName = 'Policy.Read.All'
                        AppRoleID = '246dd0d5-5bd0-4def-940b-0421030a5b68'
                        Product = 'aad'
                    },
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000003-0000-0000-c000-000000000000'
                        APIName = 'PrivilegedEligibilitySchedule.Read.AzureADGroup'
                        AppRoleID = 'edb419d6-7edc-42a3-9345-509bfdf5d87c'
                        Product = 'aad'
                    },
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000003-0000-0000-c000-000000000000'
                        APIName = 'RoleManagementPolicy.Read.AzureADGroup'
                        AppRoleID = '69e67828-780e-47fd-b28c-7b27d14864e6'
                        Product = 'aad'
                    },
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000003-0000-0000-c000-000000000000'
                        APIName = 'Directory.Read.All'
                        AppRoleID = '7ab1d382-f21e-4acd-a863-ba3e13f7da61'
                        Product = 'aad'
                    },
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000003-0000-0000-c000-000000000000'
                        APIName = 'RoleManagement.Read.Directory'
                        AppRoleID = '483bed4a-2ad3-4361-a73b-c83ccdbdc53c'
                        Product = 'aad'
                    },
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000003-0000-0000-c000-000000000000'
                        APIName = 'User.Read.All'
                        AppRoleID = 'df021288-bdef-4463-88db-98f22de89214'
                        Product = 'aad'
                    },
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000002-0000-0ff1-ce00-000000000000'
                        APIName = 'Exchange.ManageAsApp'
                        AppRoleID = 'dc50a0fb-09a3-484d-be87-e023b12c6440'
                        Product = 'exo'
                    },
                    [PSCustomObject]@{
                        resourceAPIAppId = '00000003-0000-0ff1-ce00-000000000000'
                        APIName = 'Sites.FullControl.All'
                        AppRoleID = '678536fe-1083-478a-9c59-b99265e6b0d3'
                        Product = 'sharepoint'
                    }
                )
            }

            # Mock service principal and application lookups
            Mock -CommandName Invoke-GraphDirectly -MockWith {
                param($Commandlet)

                if ($Commandlet -eq 'Get-MgServicePrincipal') {
                    return @{
                        Value = $script:MockScenario.servicePrincipal
                    }
                }
                elseif ($Commandlet -eq 'Get-MgBetaApplication') {
                    return @{
                        Value = $script:MockScenario.application
                    }
                }
                elseif ($Commandlet -eq 'Get-MgServicePrincipalAppRoleAssignment') {
                    return @{
                        Value = $script:MockScenario.appRoleAssignments
                    }
                }
                elseif ($Commandlet -eq 'Get-MgServicePrincipalOauth2PermissionGrant') {
                    return @{
                        Value = $script:MockScenario.oauth2Grants
                    }
                }
                return @{ Value = @() }
            }

            # Mock batch request for resource service principals - accurately simulate the real behavior
            Mock -CommandName Invoke-GraphBatchRequest -MockWith {
                param($Requests)
                $results = @{}

                foreach ($req in $Requests) {
                    $requestId = $req.id

                    # Determine which resource SP to return based on the request type
                    if ($requestId -like "spById_*") {
                        # Direct lookup by ID (returns object directly in body)
                        $resourceId = $requestId -replace '^spById_', ''

                        $body = switch ($resourceId) {
                            "resource-sp-graph" { $MockResourceSP_Graph }
                            "resource-sp-exo" { $MockResourceSP_Exchange }
                            "resource-sp-sharepoint" { $MockResourceSP_SharePoint }
                            default { $null }
                        }

                        if ($body) {
                            $results[$requestId] = @{
                                id = $requestId
                                status = 200
                                body = $body
                            }
                        } else {
                            $results[$requestId] = @{
                                id = $requestId
                                status = 404
                                body = @{ error = @{ message = "Service principal not found" } }
                            }
                        }
                    }
                    elseif ($requestId -like "spByAppId_*") {
                        # Lookup by AppId (returns array in 'value' property for filter queries)
                        $appId = $requestId -replace '^spByAppId_', ''

                        $body = switch ($appId) {
                            "00000003-0000-0000-c000-000000000000" { $MockResourceSP_Graph }
                            "00000002-0000-0ff1-ce00-000000000000" { $MockResourceSP_Exchange }
                            "00000003-0000-0ff1-ce00-000000000000" { $MockResourceSP_SharePoint }
                            default { $null }
                        }

                        if ($body) {
                            # spByAppId returns results in a 'value' array (Graph filter queries)
                            $results[$requestId] = @{
                                id = $requestId
                                status = 200
                                body = @{
                                    value = @($body)
                                }
                            }
                        } else {
                            $results[$requestId] = @{
                                id = $requestId
                                status = 200
                                body = @{
                                    value = @()
                                }
                            }
                        }
                    }
                }

                return $results
            }

            # Mock permission comparison
            Mock -CommandName Compare-ScubaGearPermission -MockWith {
                return $script:MockScenario.permissionComparison
            }

            # Mock role comparison
            Mock -CommandName Compare-ScubaGearRole -MockWith {
                return $script:MockScenario.roleComparison
            }

            # Mock Power Platform check
            Mock -CommandName Test-PowerPlatformAppRegistration -MockWith {
                return $script:MockScenario.powerPlatformRegistered
            }
        }

        Context "When testing with scenario: OptimalPermissions" {
            BeforeEach {
                $script:MockScenario = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockOptimalPermissions.json") | ConvertFrom-Json
            }

            It "Should not have FixPermissionIssues property when permissions are optimal" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PSObject.Properties.Name | Should -Not -Contain 'FixPermissionIssues'
            }

            It "Should report 'No action needed' status" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.Status | Should -Match $script:MockScenario.expectedResult.statusPattern
            }

            It "Should have MissingPermissions as false" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.MissingPermissions | Should -Be $false
            }

            It "Should have ExtraPermissions as false" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.ExtraPermissions | Should -Be $false
            }

            It "Should have MissingRoles as false" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.MissingRoles | Should -Be $false
            }

            It "Should have Power Platform as registered equal true" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PowerPlatformRegistered | Should -Be $true
            }
        }

        Context "When testing with scenario: MissingPermissions" {
            BeforeEach {
                $script:MockScenario = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockMissingPermissions.json") | ConvertFrom-Json
            }

            It "Should have FixPermissionIssues property when permissions are missing" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PSObject.Properties.Name | Should -Contain 'FixPermissionIssues'
                $result.FixPermissionIssues | Should -Not -BeNullOrEmpty
            }

            It "Should report 'Action needed' with missing permissions in status" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.Status | Should -Match $script:MockScenario.expectedResult.statusPattern
            }

            It "Should detect missing permissions" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.MissingPermissions | Should -Not -Be $false
                @($result.MissingPermissions).Count | Should -BeGreaterThan 0
            }
        }

        Context "When testing with scenario: ExtraPermissions" {
            BeforeEach {
                $script:MockScenario = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockExtraPermissions.json") | ConvertFrom-Json
            }

            It "Should have FixPermissionIssues property when extra permissions exist" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PSObject.Properties.Name | Should -Contain 'FixPermissionIssues'
                $result.FixPermissionIssues | Should -Not -BeNullOrEmpty
            }

            It "Should report 'Action needed' with extra permissions in status" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.Status | Should -Match $script:MockScenario.expectedResult.statusPattern
            }

            It "Should detect extra permissions" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.ExtraPermissions | Should -Not -Be $false
                @($result.ExtraPermissions).Count | Should -BeGreaterThan 0
            }
        }

        Context "When testing with scenario: MissingRole" {
            BeforeEach {
                $script:MockScenario = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockMissingRole.json") | ConvertFrom-Json
            }

            It "Should have FixPermissionIssues property when role is missing" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PSObject.Properties.Name | Should -Contain 'FixPermissionIssues'
                $result.FixPermissionIssues | Should -Not -BeNullOrEmpty
            }

            It "Should report 'Action needed' with missing role in status" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.Status | Should -Match $script:MockScenario.expectedResult.statusPattern
            }

            It "Should detect missing role" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.MissingRoles | Should -Not -Be $false
            }
        }

        Context "When testing with scenario: PowerPlatformUnneeded" {
            BeforeEach {
                $script:MockScenario = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockPowerPlatformUnneeded.json") | ConvertFrom-Json
            }

            It "Should have FixPermissionIssues property when Power Platform is registered but not needed" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PSObject.Properties.Name | Should -Contain 'FixPermissionIssues'
                $result.FixPermissionIssues | Should -Not -BeNullOrEmpty
            }

            It "Should report 'Action needed' with Power Platform status in message" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.Status | Should -Match $script:MockScenario.expectedResult.statusPattern
            }

            It "Should report Power Platform as registered" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PowerPlatformRegistered | Should -Be $true
            }
        }

        Context "When testing with scenario: PowerPlatformNeeded" {
            BeforeEach {
                $script:MockScenario = Get-Content (Join-Path -Path $PSScriptRoot -ChildPath "ServicePrincipalSnippets/MockPowerPlatformNeeded.json") | ConvertFrom-Json
            }

            It "Should have FixPermissionIssues property when Power Platform is needed but not registered" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PSObject.Properties.Name | Should -Contain 'FixPermissionIssues'
                $result.FixPermissionIssues | Should -Not -BeNullOrEmpty
            }

            It "Should report 'Action needed' with Power Platform not registered status" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.Status | Should -Match $script:MockScenario.expectedResult.statusPattern
            }

            It "Should report Power Platform as not registered" {
                $result = Get-ScubaGearAppPermission -AppID $script:MockScenario.servicePrincipal.appId -M365Environment 'commercial' -ProductNames $script:MockScenario.productNames

                $result.PowerPlatformRegistered | Should -Be $false
            }
        }
    }
}

# SIG # Begin signature block
# MIIu9wYJKoZIhvcNAQcCoIIu6DCCLuQCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBvR5Uv7F5mp9Gh
# f1twp1uHTPcjj5OuQzrzJ9LyZPxC8aCCE6MwggWQMIIDeKADAgECAhAFmxtXno4h
# MuI5B72nd3VcMA0GCSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQK
# EwxEaWdpQ2VydCBJbmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNV
# BAMTGERpZ2lDZXJ0IFRydXN0ZWQgUm9vdCBHNDAeFw0xMzA4MDExMjAwMDBaFw0z
# ODAxMTUxMjAwMDBaMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIB
# AL/mkHNo3rvkXUo8MCIwaTPswqclLskhPfKK2FnC4SmnPVirdprNrnsbhA3EMB/z
# G6Q4FutWxpdtHauyefLKEdLkX9YFPFIPUh/GnhWlfr6fqVcWWVVyr2iTcMKyunWZ
# anMylNEQRBAu34LzB4TmdDttceItDBvuINXJIB1jKS3O7F5OyJP4IWGbNOsFxl7s
# Wxq868nPzaw0QF+xembud8hIqGZXV59UWI4MK7dPpzDZVu7Ke13jrclPXuU15zHL
# 2pNe3I6PgNq2kZhAkHnDeMe2scS1ahg4AxCN2NQ3pC4FfYj1gj4QkXCrVYJBMtfb
# BHMqbpEBfCFM1LyuGwN1XXhm2ToxRJozQL8I11pJpMLmqaBn3aQnvKFPObURWBf3
# JFxGj2T3wWmIdph2PVldQnaHiZdpekjw4KISG2aadMreSx7nDmOu5tTvkpI6nj3c
# AORFJYm2mkQZK37AlLTSYW3rM9nF30sEAMx9HJXDj/chsrIRt7t/8tWMcCxBYKqx
# YxhElRp2Yn72gLD76GSmM9GJB+G9t+ZDpBi4pncB4Q+UDCEdslQpJYls5Q5SUUd0
# viastkF13nqsX40/ybzTQRESW+UQUOsxxcpyFiIJ33xMdT9j7CFfxCBRa2+xq4aL
# T8LWRV+dIPyhHsXAj6KxfgommfXkaS+YHS312amyHeUbAgMBAAGjQjBAMA8GA1Ud
# EwEB/wQFMAMBAf8wDgYDVR0PAQH/BAQDAgGGMB0GA1UdDgQWBBTs1+OC0nFdZEzf
# Lmc/57qYrhwPTzANBgkqhkiG9w0BAQwFAAOCAgEAu2HZfalsvhfEkRvDoaIAjeNk
# aA9Wz3eucPn9mkqZucl4XAwMX+TmFClWCzZJXURj4K2clhhmGyMNPXnpbWvWVPjS
# PMFDQK4dUPVS/JA7u5iZaWvHwaeoaKQn3J35J64whbn2Z006Po9ZOSJTROvIXQPK
# 7VB6fWIhCoDIc2bRoAVgX+iltKevqPdtNZx8WorWojiZ83iL9E3SIAveBO6Mm0eB
# cg3AFDLvMFkuruBx8lbkapdvklBtlo1oepqyNhR6BvIkuQkRUNcIsbiJeoQjYUIp
# 5aPNoiBB19GcZNnqJqGLFNdMGbJQQXE9P01wI4YMStyB0swylIQNCAmXHE/A7msg
# dDDS4Dk0EIUhFQEI6FUy3nFJ2SgXUE3mvk3RdazQyvtBuEOlqtPDBURPLDab4vri
# RbgjU2wGb2dVf0a1TD9uKFp5JtKkqGKX0h7i7UqLvBv9R0oN32dmfrJbQdA75PQ7
# 9ARj6e/CVABRoIoqyc54zNXqhwQYs86vSYiv85KZtrPmYQ/ShQDnUBrkG5WdGaG5
# nLGbsQAe79APT0JsyQq87kP6OnGlyE0mpTX9iV28hWIdMtKgK1TtmlfB2/oQzxm3
# i0objwG2J5VT6LaJbVu8aNQj6ItRolb58KaAoNYes7wPD1N1KarqE3fk3oyBIa0H
# EEcRrYc9B9F1vM/zZn4wggawMIIEmKADAgECAhAIrUCyYNKcTJ9ezam9k67ZMA0G
# CSqGSIb3DQEBDAUAMGIxCzAJBgNVBAYTAlVTMRUwEwYDVQQKEwxEaWdpQ2VydCBJ
# bmMxGTAXBgNVBAsTEHd3dy5kaWdpY2VydC5jb20xITAfBgNVBAMTGERpZ2lDZXJ0
# IFRydXN0ZWQgUm9vdCBHNDAeFw0yMTA0MjkwMDAwMDBaFw0zNjA0MjgyMzU5NTla
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQDVtC9C
# 0CiteLdd1TlZG7GIQvUzjOs9gZdwxbvEhSYwn6SOaNhc9es0JAfhS0/TeEP0F9ce
# 2vnS1WcaUk8OoVf8iJnBkcyBAz5NcCRks43iCH00fUyAVxJrQ5qZ8sU7H/Lvy0da
# E6ZMswEgJfMQ04uy+wjwiuCdCcBlp/qYgEk1hz1RGeiQIXhFLqGfLOEYwhrMxe6T
# SXBCMo/7xuoc82VokaJNTIIRSFJo3hC9FFdd6BgTZcV/sk+FLEikVoQ11vkunKoA
# FdE3/hoGlMJ8yOobMubKwvSnowMOdKWvObarYBLj6Na59zHh3K3kGKDYwSNHR7Oh
# D26jq22YBoMbt2pnLdK9RBqSEIGPsDsJ18ebMlrC/2pgVItJwZPt4bRc4G/rJvmM
# 1bL5OBDm6s6R9b7T+2+TYTRcvJNFKIM2KmYoX7BzzosmJQayg9Rc9hUZTO1i4F4z
# 8ujo7AqnsAMrkbI2eb73rQgedaZlzLvjSFDzd5Ea/ttQokbIYViY9XwCFjyDKK05
# huzUtw1T0PhH5nUwjewwk3YUpltLXXRhTT8SkXbev1jLchApQfDVxW0mdmgRQRNY
# mtwmKwH0iU1Z23jPgUo+QEdfyYFQc4UQIyFZYIpkVMHMIRroOBl8ZhzNeDhFMJlP
# /2NPTLuqDQhTQXxYPUez+rbsjDIJAsxsPAxWEQIDAQABo4IBWTCCAVUwEgYDVR0T
# AQH/BAgwBgEB/wIBADAdBgNVHQ4EFgQUaDfg67Y7+F8Rhvv+YXsIiGX0TkIwHwYD
# VR0jBBgwFoAU7NfjgtJxXWRM3y5nP+e6mK4cD08wDgYDVR0PAQH/BAQDAgGGMBMG
# A1UdJQQMMAoGCCsGAQUFBwMDMHcGCCsGAQUFBwEBBGswaTAkBggrBgEFBQcwAYYY
# aHR0cDovL29jc3AuZGlnaWNlcnQuY29tMEEGCCsGAQUFBzAChjVodHRwOi8vY2Fj
# ZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNlcnRUcnVzdGVkUm9vdEc0LmNydDBDBgNV
# HR8EPDA6MDigNqA0hjJodHRwOi8vY3JsMy5kaWdpY2VydC5jb20vRGlnaUNlcnRU
# cnVzdGVkUm9vdEc0LmNybDAcBgNVHSAEFTATMAcGBWeBDAEDMAgGBmeBDAEEATAN
# BgkqhkiG9w0BAQwFAAOCAgEAOiNEPY0Idu6PvDqZ01bgAhql+Eg08yy25nRm95Ry
# sQDKr2wwJxMSnpBEn0v9nqN8JtU3vDpdSG2V1T9J9Ce7FoFFUP2cvbaF4HZ+N3HL
# IvdaqpDP9ZNq4+sg0dVQeYiaiorBtr2hSBh+3NiAGhEZGM1hmYFW9snjdufE5Btf
# Q/g+lP92OT2e1JnPSt0o618moZVYSNUa/tcnP/2Q0XaG3RywYFzzDaju4ImhvTnh
# OE7abrs2nfvlIVNaw8rpavGiPttDuDPITzgUkpn13c5UbdldAhQfQDN8A+KVssIh
# dXNSy0bYxDQcoqVLjc1vdjcshT8azibpGL6QB7BDf5WIIIJw8MzK7/0pNVwfiThV
# 9zeKiwmhywvpMRr/LhlcOXHhvpynCgbWJme3kuZOX956rEnPLqR0kq3bPKSchh/j
# wVYbKyP/j7XqiHtwa+aguv06P0WmxOgWkVKLQcBIhEuWTatEQOON8BUozu3xGFYH
# Ki8QxAwIZDwzj64ojDzLj4gLDb879M4ee47vtevLt/B3E+bnKD+sEq6lLyJsQfmC
# XBVmzGwOysWGw/YmMwwHS6DTBwJqakAwSEs0qFEgu60bhQjiWQ1tygVQK+pKHJ6l
# /aCnHwZ05/LWUpD9r4VIIflXO7ScA+2GRfS0YW6/aOImYIbqyK+p/pQd52MbOoZW
# eE4wggdXMIIFP6ADAgECAhAMM6tnPejLgA9WVhXroQvSMA0GCSqGSIb3DQEBCwUA
# MGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2VydCwgSW5jLjFBMD8GA1UE
# AxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBDb2RlIFNpZ25pbmcgUlNBNDA5NiBTSEEz
# ODQgMjAyMSBDQTEwHhcNMjYwMTE0MDAwMDAwWhcNMjcwMTEzMjM1OTU5WjBfMQsw
# CQYDVQQGEwJVUzEdMBsGA1UECBMURGlzdHJpY3Qgb2YgQ29sdW1iaWExEzARBgNV
# BAcTCldhc2hpbmd0b24xDTALBgNVBAoTBENJU0ExDTALBgNVBAMTBENJU0EwggIi
# MA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCuXYolNHqlh6smLTE592waXheZ
# 8VHzxeds4pMaepGuwmjf8d1jG9wUNuJX9/qb0a1dgGz5D/EAz5NRTIin4SZYQEE8
# qvdl2yQJ5uWxXIjsFbrOyc1fWscUXw0Kt7OPLOafcEkdDoe8K0tO4h2GL3RWRzjp
# uLfQhhnAmD6NT1l+ughnfmarV/ODgIn/RFR4YORlu4YP2xQX6KRxeTDslg7F+z6X
# +t87/U8m8gQ9XTm5kBmteP4GcE/ytnyI+ScIxNRybzGomWIBm848XDE5yYhlYQ2R
# SnCoo6M4CRqp9WFGVyoLkoPP0OlxzryKWaE1/nuPbYG/kf/rUB1OhqxvSSGwmNhs
# vkkjsC0Z9H5Jy6heFdoxOu/+ZQksKoP/fMvHxuCCtkIJbV8tk0oT6MQ8EJbgsWDZ
# TKhui1wxW6JIZyBOMPWoZUOouOzo2h5Cz7LBPKME5FkcUzcs47lpRlDkJco4PLcj
# wJSo4XPnx3G/2DIjNEFNyfKCWfH8uW6nJjmDBiveFZ2j0YvgdQ+7MOjQnw7R/MAD
# DTagrKl3rLV60+X2TY6/onKhCUuU3pMAjVbOwZ3PkzDLZnsEGRfm6hgp6014aXml
# t8h4nu+uC41U8vUSGHl0vqKuzvmShLmnI+Iv0l95pmnqomuCZzRDrjEoaLPx7OxL
# Dy/Id9E7yQDip4jBdQIDAQABo4ICAzCCAf8wHwYDVR0jBBgwFoAUaDfg67Y7+F8R
# hvv+YXsIiGX0TkIwHQYDVR0OBBYEFN30sVU+fpfQQfPQWMhkO1qd+MxoMD4GA1Ud
# IAQ3MDUwMwYGZ4EMAQQBMCkwJwYIKwYBBQUHAgEWG2h0dHA6Ly93d3cuZGlnaWNl
# cnQuY29tL0NQUzAOBgNVHQ8BAf8EBAMCB4AwEwYDVR0lBAwwCgYIKwYBBQUHAwMw
# gbUGA1UdHwSBrTCBqjBToFGgT4ZNaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0Rp
# Z2lDZXJ0VHJ1c3RlZEc0Q29kZVNpZ25pbmdSU0E0MDk2U0hBMzg0MjAyMUNBMS5j
# cmwwU6BRoE+GTWh0dHA6Ly9jcmw0LmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0
# ZWRHNENvZGVTaWduaW5nUlNBNDA5NlNIQTM4NDIwMjFDQTEuY3JsMIGUBggrBgEF
# BQcBAQSBhzCBhDAkBggrBgEFBQcwAYYYaHR0cDovL29jc3AuZGlnaWNlcnQuY29t
# MFwGCCsGAQUFBzAChlBodHRwOi8vY2FjZXJ0cy5kaWdpY2VydC5jb20vRGlnaUNl
# cnRUcnVzdGVkRzRDb2RlU2lnbmluZ1JTQTQwOTZTSEEzODQyMDIxQ0ExLmNydDAJ
# BgNVHRMEAjAAMA0GCSqGSIb3DQEBCwUAA4ICAQA77T42YiOx5wWPItgo+kvB+Gzb
# ZFCRHRFfTAZZNQt9o/0CqNmyA2xFklX4t5Z9VNdiIOx14AnmJdQkcRdk3vsU5gby
# jKEup7LTWtvcWrl6hQwGNt3l892BgUbPKsPBE+AriktVqn5yMSXVVzeboqsqAG8e
# Syei0B54/QdgR4whfHvQ/qpCACsJTlJgAykXVgDPJNKnQ7wc17loLQutqF1JUcbO
# XKWt1AA9Zas5q30LDZzZeK4B56yojK68CTQXN7toSRFIuZDMKKDfIZpCX8cmbaaO
# DFOOu44/QWMv+Xc6+ISYGkrTTzqWhOqiXgLVBeXGn/WrOJJ8R29mZMneCpBesCLs
# YII1gCFOo7Vt6mvOKxAPQ3KhJYBFEHkp+GI65koaQkO2xv50iLS0+/j2YC66uviU
# MFe0JEOdXuE7Rn/OmWNSzQ+6kPNYDJQASQ974C3wUejJoMtGZEzoTbly/HufQTrd
# rhcL2aC69CxSN+idTXPLC9UT3xo4sFdOw+hXkmbXtoB1GDsd5p1TWFgRbnTXDkbM
# YMBWYVB6/Tk1bzwj4iTp4g0YrtB628FXPX/ko+JWZlv0Ea865S23w1uGlnDNVxIi
# +8oi74G5DM66Q6ENt6+3WoRGRrdoyE6uCh1haY+oPYSgumb0ozzrp8tw89TRKVrK
# KSXGBxlExEvjQ6dYwjGCGqowghqmAgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNV
# BAoTDkRpZ2lDZXJ0LCBJbmMuMUEwPwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0
# IENvZGUgU2lnbmluZyBSU0E0MDk2IFNIQTM4NCAyMDIxIENBMQIQDDOrZz3oy4AP
# VlYV66EL0jANBglghkgBZQMEAgEFAKCBhDAYBgorBgEEAYI3AgEMMQowCKACgACh
# AoAAMBkGCSqGSIb3DQEJAzEMBgorBgEEAYI3AgEEMBwGCisGAQQBgjcCAQsxDjAM
# BgorBgEEAYI3AgEVMC8GCSqGSIb3DQEJBDEiBCBCQHzraYK2M26U1ZOJZFnCmelN
# Myz5RtwrijpPVj2vDDANBgkqhkiG9w0BAQEFAASCAgB317fhe+AsIxUbUX0qAh6G
# vt8HNavuIK+v5k2JU7NSlzvtp04LdK2M9uutWVWe8y4OFKR9pj4YFzNrynPVTjwb
# tDccLmCWLHWk4BxzD+C8j1CRhjdL9ldzJfc8j2HNfOpDWV1SQoSVozlOOPwPIPLi
# 2vNCC8yh9Qlsm9SWyh7s9nLFSf0CM8hp+bk2y/F63IY1LY12RXHl4dIaohNKG1k6
# OtUzLoux1oVxo74cBm/plQAlRCmEXpFE1JEbXOcZRiTdRz2m6Vv2U6ia88rjKnry
# 0OtJL8PePAsy9CymXQd6an7Nv11OA6NAdCf2xHOeiMaCrQ8cbCWHYEEGaegmWslZ
# v3jIcou4y5pnD1ou69eevkabdAw1q3Pg2KewzfB6gYOL6d5x8nkZqzXFMZ+Vumfu
# dMVLuP12mVqjlf9+VxL3CLQwkfIdn6YWckZAW/NuXsgEK326pRLFuIA/+f4rsJrh
# a50FdYRPtlBWpwY/XKvBZMWhhOE7nxGAJVPb/oUaKj6Ce6utvMjgv8wgTNbjd94J
# XVk4zZz0qQyGo8eoGhuwkKxTU+L35qMQytTUrYGu6Nn5Z6FJtLEk7JOFYSu8zOaY
# SKGUGfmlfsXAH6gXB9jOphCOx6Cc4NOFL+NRPh7XW8oMQ6cfYN2owSsbpAXK1UEU
# NvdMM2vvuH09G8N0CmRTaKGCF3cwghdzBgorBgEEAYI3AwMBMYIXYzCCF18GCSqG
# SIb3DQEHAqCCF1AwghdMAgEDMQ8wDQYJYIZIAWUDBAIBBQAweAYLKoZIhvcNAQkQ
# AQSgaQRnMGUCAQEGCWCGSAGG/WwHATAxMA0GCWCGSAFlAwQCAQUABCCfrdhK60C/
# dEFWRP4IlcnP8Xrhx/L8fkhY61DGa9Xc2AIRALldeWFkH1yyps7AKIKCESQYDzIw
# MjYwMjExMTYzOTU1WqCCEzowggbtMIIE1aADAgECAhAKgO8YS43xBYLRxHanlXRo
# MA0GCSqGSIb3DQEBCwUAMGkxCzAJBgNVBAYTAlVTMRcwFQYDVQQKEw5EaWdpQ2Vy
# dCwgSW5jLjFBMD8GA1UEAxM4RGlnaUNlcnQgVHJ1c3RlZCBHNCBUaW1lU3RhbXBp
# bmcgUlNBNDA5NiBTSEEyNTYgMjAyNSBDQTEwHhcNMjUwNjA0MDAwMDAwWhcNMzYw
# OTAzMjM1OTU5WjBjMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIElu
# Yy4xOzA5BgNVBAMTMkRpZ2lDZXJ0IFNIQTI1NiBSU0E0MDk2IFRpbWVzdGFtcCBS
# ZXNwb25kZXIgMjAyNSAxMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# 0EasLRLGntDqrmBWsytXum9R/4ZwCgHfyjfMGUIwYzKomd8U1nH7C8Dr0cVMF3Bs
# fAFI54um8+dnxk36+jx0Tb+k+87H9WPxNyFPJIDZHhAqlUPt281mHrBbZHqRK71E
# m3/hCGC5KyyneqiZ7syvFXJ9A72wzHpkBaMUNg7MOLxI6E9RaUueHTQKWXymOtRw
# JXcrcTTPPT2V1D/+cFllESviH8YjoPFvZSjKs3SKO1QNUdFd2adw44wDcKgH+JRJ
# E5Qg0NP3yiSyi5MxgU6cehGHr7zou1znOM8odbkqoK+lJ25LCHBSai25CFyD23DZ
# gPfDrJJJK77epTwMP6eKA0kWa3osAe8fcpK40uhktzUd/Yk0xUvhDU6lvJukx7jp
# hx40DQt82yepyekl4i0r8OEps/FNO4ahfvAk12hE5FVs9HVVWcO5J4dVmVzix4A7
# 7p3awLbr89A90/nWGjXMGn7FQhmSlIUDy9Z2hSgctaepZTd0ILIUbWuhKuAeNIeW
# rzHKYueMJtItnj2Q+aTyLLKLM0MheP/9w6CtjuuVHJOVoIJ/DtpJRE7Ce7vMRHoR
# on4CWIvuiNN1Lk9Y+xZ66lazs2kKFSTnnkrT3pXWETTJkhd76CIDBbTRofOsNyEh
# zZtCGmnQigpFHti58CSmvEyJcAlDVcKacJ+A9/z7eacCAwEAAaOCAZUwggGRMAwG
# A1UdEwEB/wQCMAAwHQYDVR0OBBYEFOQ7/PIx7f391/ORcWMZUEPPYYzoMB8GA1Ud
# IwQYMBaAFO9vU0rp5AZ8esrikFb2L9RJ7MtOMA4GA1UdDwEB/wQEAwIHgDAWBgNV
# HSUBAf8EDDAKBggrBgEFBQcDCDCBlQYIKwYBBQUHAQEEgYgwgYUwJAYIKwYBBQUH
# MAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBdBggrBgEFBQcwAoZRaHR0cDov
# L2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZEc0VGltZVN0YW1w
# aW5nUlNBNDA5NlNIQTI1NjIwMjVDQTEuY3J0MF8GA1UdHwRYMFYwVKBSoFCGTmh0
# dHA6Ly9jcmwzLmRpZ2ljZXJ0LmNvbS9EaWdpQ2VydFRydXN0ZWRHNFRpbWVTdGFt
# cGluZ1JTQTQwOTZTSEEyNTYyMDI1Q0ExLmNybDAgBgNVHSAEGTAXMAgGBmeBDAEE
# AjALBglghkgBhv1sBwEwDQYJKoZIhvcNAQELBQADggIBAGUqrfEcJwS5rmBB7NEI
# RJ5jQHIh+OT2Ik/bNYulCrVvhREafBYF0RkP2AGr181o2YWPoSHz9iZEN/FPsLST
# wVQWo2H62yGBvg7ouCODwrx6ULj6hYKqdT8wv2UV+Kbz/3ImZlJ7YXwBD9R0oU62
# PtgxOao872bOySCILdBghQ/ZLcdC8cbUUO75ZSpbh1oipOhcUT8lD8QAGB9lctZT
# TOJM3pHfKBAEcxQFoHlt2s9sXoxFizTeHihsQyfFg5fxUFEp7W42fNBVN4ueLace
# Rf9Cq9ec1v5iQMWTFQa0xNqItH3CPFTG7aEQJmmrJTV3Qhtfparz+BW60OiMEgV5
# GWoBy4RVPRwqxv7Mk0Sy4QHs7v9y69NBqycz0BZwhB9WOfOu/CIJnzkQTwtSSpGG
# hLdjnQ4eBpjtP+XB3pQCtv4E5UCSDag6+iX8MmB10nfldPF9SVD7weCC3yXZi/uu
# hqdwkgVxuiMFzGVFwYbQsiGnoa9F5AaAyBjFBtXVLcKtapnMG3VH3EmAp/jsJ3FV
# F3+d1SVDTmjFjLbNFZUWMXuZyvgLfgyPehwJVxwC+UpX2MSey2ueIu9THFVkT+um
# 1vshETaWyQo8gmBto/m3acaP9QsuLj3FNwFlTxq25+T4QwX9xa6ILs84ZPvmpovq
# 90K8eWyG2N01c4IhSOxqt81nMIIGtDCCBJygAwIBAgIQDcesVwX/IZkuQEMiDDpJ
# hjANBgkqhkiG9w0BAQsFADBiMQswCQYDVQQGEwJVUzEVMBMGA1UEChMMRGlnaUNl
# cnQgSW5jMRkwFwYDVQQLExB3d3cuZGlnaWNlcnQuY29tMSEwHwYDVQQDExhEaWdp
# Q2VydCBUcnVzdGVkIFJvb3QgRzQwHhcNMjUwNTA3MDAwMDAwWhcNMzgwMTE0MjM1
# OTU5WjBpMQswCQYDVQQGEwJVUzEXMBUGA1UEChMORGlnaUNlcnQsIEluYy4xQTA/
# BgNVBAMTOERpZ2lDZXJ0IFRydXN0ZWQgRzQgVGltZVN0YW1waW5nIFJTQTQwOTYg
# U0hBMjU2IDIwMjUgQ0ExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA
# tHgx0wqYQXK+PEbAHKx126NGaHS0URedTa2NDZS1mZaDLFTtQ2oRjzUXMmxCqvkb
# sDpz4aH+qbxeLho8I6jY3xL1IusLopuW2qftJYJaDNs1+JH7Z+QdSKWM06qchUP+
# AbdJgMQB3h2DZ0Mal5kYp77jYMVQXSZH++0trj6Ao+xh/AS7sQRuQL37QXbDhAkt
# VJMQbzIBHYJBYgzWIjk8eDrYhXDEpKk7RdoX0M980EpLtlrNyHw0Xm+nt5pnYJU3
# Gmq6bNMI1I7Gb5IBZK4ivbVCiZv7PNBYqHEpNVWC2ZQ8BbfnFRQVESYOszFI2Wv8
# 2wnJRfN20VRS3hpLgIR4hjzL0hpoYGk81coWJ+KdPvMvaB0WkE/2qHxJ0ucS638Z
# xqU14lDnki7CcoKCz6eum5A19WZQHkqUJfdkDjHkccpL6uoG8pbF0LJAQQZxst7V
# vwDDjAmSFTUms+wV/FbWBqi7fTJnjq3hj0XbQcd8hjj/q8d6ylgxCZSKi17yVp2N
# L+cnT6Toy+rN+nM8M7LnLqCrO2JP3oW//1sfuZDKiDEb1AQ8es9Xr/u6bDTnYCTK
# IsDq1BtmXUqEG1NqzJKS4kOmxkYp2WyODi7vQTCBZtVFJfVZ3j7OgWmnhFr4yUoz
# ZtqgPrHRVHhGNKlYzyjlroPxul+bgIspzOwbtmsgY1MCAwEAAaOCAV0wggFZMBIG
# A1UdEwEB/wQIMAYBAf8CAQAwHQYDVR0OBBYEFO9vU0rp5AZ8esrikFb2L9RJ7MtO
# MB8GA1UdIwQYMBaAFOzX44LScV1kTN8uZz/nupiuHA9PMA4GA1UdDwEB/wQEAwIB
# hjATBgNVHSUEDDAKBggrBgEFBQcDCDB3BggrBgEFBQcBAQRrMGkwJAYIKwYBBQUH
# MAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBBBggrBgEFBQcwAoY1aHR0cDov
# L2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0VHJ1c3RlZFJvb3RHNC5jcnQw
# QwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybDMuZGlnaWNlcnQuY29tL0RpZ2lD
# ZXJ0VHJ1c3RlZFJvb3RHNC5jcmwwIAYDVR0gBBkwFzAIBgZngQwBBAIwCwYJYIZI
# AYb9bAcBMA0GCSqGSIb3DQEBCwUAA4ICAQAXzvsWgBz+Bz0RdnEwvb4LyLU0pn/N
# 0IfFiBowf0/Dm1wGc/Do7oVMY2mhXZXjDNJQa8j00DNqhCT3t+s8G0iP5kvN2n7J
# d2E4/iEIUBO41P5F448rSYJ59Ib61eoalhnd6ywFLerycvZTAz40y8S4F3/a+Z1j
# EMK/DMm/axFSgoR8n6c3nuZB9BfBwAQYK9FHaoq2e26MHvVY9gCDA/JYsq7pGdog
# P8HRtrYfctSLANEBfHU16r3J05qX3kId+ZOczgj5kjatVB+NdADVZKON/gnZruMv
# NYY2o1f4MXRJDMdTSlOLh0HCn2cQLwQCqjFbqrXuvTPSegOOzr4EWj7PtspIHBld
# NE2K9i697cvaiIo2p61Ed2p8xMJb82Yosn0z4y25xUbI7GIN/TpVfHIqQ6Ku/qjT
# Y6hc3hsXMrS+U0yy+GWqAXam4ToWd2UQ1KYT70kZjE4YtL8Pbzg0c1ugMZyZZd/B
# dHLiRu7hAWE6bTEm4XYRkA6Tl4KSFLFk43esaUeqGkH/wyW4N7OigizwJWeukcyI
# PbAvjSabnf7+Pu0VrFgoiovRDiyx3zEdmcif/sYQsfch28bZeUz2rtY/9TCA6TD8
# dC3JE3rYkrhLULy7Dc90G6e8BlqmyIjlgp2+VqsS9/wQD7yFylIz0scmbKvFoW2j
# NrbM1pD2T7m3XDCCBY0wggR1oAMCAQICEA6bGI750C3n79tQ4ghAGFowDQYJKoZI
# hvcNAQEMBQAwZTELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZ
# MBcGA1UECxMQd3d3LmRpZ2ljZXJ0LmNvbTEkMCIGA1UEAxMbRGlnaUNlcnQgQXNz
# dXJlZCBJRCBSb290IENBMB4XDTIyMDgwMTAwMDAwMFoXDTMxMTEwOTIzNTk1OVow
# YjELMAkGA1UEBhMCVVMxFTATBgNVBAoTDERpZ2lDZXJ0IEluYzEZMBcGA1UECxMQ
# d3d3LmRpZ2ljZXJ0LmNvbTEhMB8GA1UEAxMYRGlnaUNlcnQgVHJ1c3RlZCBSb290
# IEc0MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAv+aQc2jeu+RdSjww
# IjBpM+zCpyUuySE98orYWcLhKac9WKt2ms2uexuEDcQwH/MbpDgW61bGl20dq7J5
# 8soR0uRf1gU8Ug9SH8aeFaV+vp+pVxZZVXKvaJNwwrK6dZlqczKU0RBEEC7fgvMH
# hOZ0O21x4i0MG+4g1ckgHWMpLc7sXk7Ik/ghYZs06wXGXuxbGrzryc/NrDRAX7F6
# Zu53yEioZldXn1RYjgwrt0+nMNlW7sp7XeOtyU9e5TXnMcvak17cjo+A2raRmECQ
# ecN4x7axxLVqGDgDEI3Y1DekLgV9iPWCPhCRcKtVgkEy19sEcypukQF8IUzUvK4b
# A3VdeGbZOjFEmjNAvwjXWkmkwuapoGfdpCe8oU85tRFYF/ckXEaPZPfBaYh2mHY9
# WV1CdoeJl2l6SPDgohIbZpp0yt5LHucOY67m1O+SkjqePdwA5EUlibaaRBkrfsCU
# tNJhbesz2cXfSwQAzH0clcOP9yGyshG3u3/y1YxwLEFgqrFjGESVGnZifvaAsPvo
# ZKYz0YkH4b235kOkGLimdwHhD5QMIR2yVCkliWzlDlJRR3S+Jqy2QXXeeqxfjT/J
# vNNBERJb5RBQ6zHFynIWIgnffEx1P2PsIV/EIFFrb7GrhotPwtZFX50g/KEexcCP
# orF+CiaZ9eRpL5gdLfXZqbId5RsCAwEAAaOCATowggE2MA8GA1UdEwEB/wQFMAMB
# Af8wHQYDVR0OBBYEFOzX44LScV1kTN8uZz/nupiuHA9PMB8GA1UdIwQYMBaAFEXr
# oq/0ksuCMS1Ri6enIZ3zbcgPMA4GA1UdDwEB/wQEAwIBhjB5BggrBgEFBQcBAQRt
# MGswJAYIKwYBBQUHMAGGGGh0dHA6Ly9vY3NwLmRpZ2ljZXJ0LmNvbTBDBggrBgEF
# BQcwAoY3aHR0cDovL2NhY2VydHMuZGlnaWNlcnQuY29tL0RpZ2lDZXJ0QXNzdXJl
# ZElEUm9vdENBLmNydDBFBgNVHR8EPjA8MDqgOKA2hjRodHRwOi8vY3JsMy5kaWdp
# Y2VydC5jb20vRGlnaUNlcnRBc3N1cmVkSURSb290Q0EuY3JsMBEGA1UdIAQKMAgw
# BgYEVR0gADANBgkqhkiG9w0BAQwFAAOCAQEAcKC/Q1xV5zhfoKN0Gz22Ftf3v1cH
# vZqsoYcs7IVeqRq7IviHGmlUIu2kiHdtvRoU9BNKei8ttzjv9P+Aufih9/Jy3iS8
# UgPITtAq3votVs/59PesMHqai7Je1M/RQ0SbQyHrlnKhSLSZy51PpwYDE3cnRNTn
# f+hZqPC/Lwum6fI0POz3A8eHqNJMQBk1RmppVLC4oVaO7KTVPeix3P0c2PR3WlxU
# jG/voVA9/HYJaISfb8rbII01YBwCA8sgsKxYoA5AY8WYIsGyWfVVa88nq2x2zm8j
# LfR+cWojayL/ErhULSd+2DrZ8LaHlv1b0VysGMNNn3O3AamfV6peKOK5lDGCA3ww
# ggN4AgEBMH0waTELMAkGA1UEBhMCVVMxFzAVBgNVBAoTDkRpZ2lDZXJ0LCBJbmMu
# MUEwPwYDVQQDEzhEaWdpQ2VydCBUcnVzdGVkIEc0IFRpbWVTdGFtcGluZyBSU0E0
# MDk2IFNIQTI1NiAyMDI1IENBMQIQCoDvGEuN8QWC0cR2p5V0aDANBglghkgBZQME
# AgEFAKCB0TAaBgkqhkiG9w0BCQMxDQYLKoZIhvcNAQkQAQQwHAYJKoZIhvcNAQkF
# MQ8XDTI2MDIxMTE2Mzk1NVowKwYLKoZIhvcNAQkQAgwxHDAaMBgwFgQU3WIwrIYK
# LTBr2jixaHlSMAf7QX4wLwYJKoZIhvcNAQkEMSIEIM+MR2Z2Y2eqwdjgSOZH+ixx
# VAFoIjbB2ktg2aJLv63WMDcGCyqGSIb3DQEJEAIvMSgwJjAkMCIEIEqgP6Is11yE
# xVyTj4KOZ2ucrsqzP+NtJpqjNPFGEQozMA0GCSqGSIb3DQEBAQUABIICAFjcuZjr
# OGrR0xShn8PthoW0Z+Qnyykq4KlGwOW5hK44G60bIWLG2OS+w2S39OjmkzrIEsGL
# 5fyzGNFjms/pAgdzvh09t0s3qNAuZGDkjPboIrkPIGj3BSe3igMWZ59W0gzVwxfr
# 9xEHCPm/KMuLGuh1+o9+XIYOCFCTXpnC110k1mM6Z65EB2EH3o75OV93BpTTdIPX
# Fd97ZYMiI1+FEZH9FurEfTy7invhJHQMTmUYM/sDhDZsfXBNlm403Ln0UySUHbIe
# eU7pEB4eBS0eBVT8pzVfjfzNG1acJVQtkACbxtNOylnqeg2ZImdr4FxfsGqfzMvP
# 5K5MwNtbSAB2IPx9Uir3NnKxWTtIsxWCz0oZd8WdlYKCx+ppa7ez8X+yhfHHKbc5
# 8WKJnywZfilVr92PNn2m+KUtnGV4JQ1R1zRRdY5/KSWy5HH5Cb7nOGGLEz0sk8ZJ
# 7yKcehvKFQozLQTWQaafjkkI13SDjntNchNSNJaQCfAHA21BuVYT3OPptgbm+HV6
# RdV9HdLOjlU8LGjeCEKRNVMFmVa3qxVcQxcaUGBmxL0rFTuWRTPmFQAvpWh4fCw4
# S1GLyPdvdGDl2pnqWoCK1cZ1rMohji8AcisbZR/kkaU+ml/42O1cboMwv1Ix0Nvy
# gUQp5WJZwfnMy0fzUnzdL2fNJqbvrx0jLtSV
# SIG # End signature block