Framework/Abstracts/ADOSVTBase.ps1
class ADOSVTBase: SVTBase { hidden [ControlStateExtension] $ControlStateExt; hidden [AzSKSettings] $AzSKSettings; # below variable will be used by SVT's and overriden for each individual resource. hidden [bool] $isResourceActive = $true; # below variable will contains the inactivity period for resources in days. hidden [int] $InactiveFromDays = -1; ADOSVTBase() { } ADOSVTBase([string] $organizationName): Base($organizationName) { $this.CreateInstance(); } ADOSVTBase([string] $organizationName, [SVTResource] $svtResource): Base($organizationName) { $this.CreateInstance($svtResource); } #Create instance for organization scan hidden [void] CreateInstance() { [Helpers]::AbstractClass($this, [SVTBase]); Write-Host -ForegroundColor Yellow "No mapping!? Do we use this .ctor?" #$this.LoadSvtConfig([SVTMapping]::OrganizationMapping.JsonFileName); $this.ResourceId = $this.OrganizationContext.Scope; } #Add PreviewBaselineControls hidden [bool] CheckBaselineControl($controlId) { if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "BaselineControls.ResourceTypeControlIdMappingList")) { $baselineControl = $this.ControlSettings.BaselineControls.ResourceTypeControlIdMappingList | Where-Object { $_.ControlIds -contains $controlId } if (($baselineControl | Measure-Object).Count -gt 0 ) { return $true } } return $false } hidden [bool] CheckPreviewBaselineControl($controlId) { if (($null -ne $this.ControlSettings) -and [Helpers]::CheckMember($this.ControlSettings, "PreviewBaselineControls.ResourceTypeControlIdMappingList")) { $PreviewBaselineControls = $this.ControlSettings.PreviewBaselineControls.ResourceTypeControlIdMappingList | Where-Object { $_.ControlIds -contains $controlId } if (($PreviewBaselineControls | Measure-Object).Count -gt 0 ) { return $true } } return $false } hidden [void] UpdateControlStates([SVTEventContext[]] $ControlResults) { if ($null -ne $this.ControlStateExt -and $this.ControlStateExt.HasControlStateWriteAccessPermissions() -and ($ControlResults | Measure-Object).Count -gt 0 -and ($this.ResourceState | Measure-Object).Count -gt 0) { $effectiveResourceStates = @(); if (($this.DirtyResourceStates | Measure-Object).Count -gt 0) { $this.ResourceState | ForEach-Object { $controlState = $_; if (($this.DirtyResourceStates | Where-Object { $_.InternalId -eq $controlState.InternalId -and $_.ChildResourceName -eq $controlState.ChildResourceName } | Measure-Object).Count -eq 0) { $effectiveResourceStates += $controlState; } } } else { #If no dirty states found then no action needed. return; } #get the uniqueid from the first control result. Here we can take first as it would come here for each resource. $id = $ControlResults[0].GetUniqueId(); $resourceType = $ControlResults[0].FeatureName $resourceName = $ControlResults[0].ResourceContext.ResourceName $this.ControlStateExt.SetControlState($id, $effectiveResourceStates, $true, $resourceType, $resourceName, $ControlResults[0].ResourceContext.ResourceGroupName) } } #isRescan parameter is added to check if method is called from rescan. state data is fetching for rescan hidden [ControlState[]] GetResourceState([bool] $isRescan = $false) { if ($null -eq $this.ResourceState) { $this.ResourceState = @(); if ($this.ControlStateExt -and $this.ControlStateExt.HasControlStateReadAccessPermissions()) { $resourceType = ""; if ($this.ResourceContext) { $resourceType = $this.ResourceContext.ResourceTypeName } #Fetch control state for organization only if project is configured for org spesific control attestation (Check for Organization only, for other resource go inside without project check). if($resourceType -ne "Organization" -or $this.ControlStateExt.GetProject()) { $resourceStates = $this.ControlStateExt.GetControlState($this.ResourceId, $resourceType, $this.ResourceContext.ResourceName, $this.ResourceContext.ResourceGroupName, $isRescan) if ($null -ne $resourceStates) { $this.ResourceState += $resourceStates } } } } return $this.ResourceState; } hidden [void] PostProcessData([SVTEventContext] $eventContext) { $tempHasRequiredAccess = $true; $controlState = @(); $controlStateValue = @(); try { $resourceStates = $this.GetResourceState($false) if (!$this.AzSKSettings) { $this.AzSKSettings = [ConfigurationManager]::GetAzSKSettings(); } $enableOrgControlAttestation = $this.AzSKSettings.EnableOrgControlAttestation if (($resourceStates | Measure-Object).Count -ne 0) { $controlStateValue += $resourceStates | Where-Object { $_.InternalId -eq $eventContext.ControlItem.Id }; $controlStateValue | ForEach-Object { $currentControlStateValue = $_; if ($null -ne $currentControlStateValue) { if ($this.IsStateActive($eventContext, $currentControlStateValue)) { $controlState += $currentControlStateValue; } else { #add to the dirty state list so that it can be removed later $this.DirtyResourceStates += $currentControlStateValue; } } } } # If Project name is not configured in ext storage & policy project parameter is not used or attestation repo is not present in policy project, # then 'IsOrgAttestationProjectFound' will be false so that HasRequiredAccess for org controls can be set as false elseif (($eventContext.FeatureName -eq "Organization" -and [ControlStateExtension]::IsOrgAttestationProjectFound -eq $false) -and ($enableOrgControlAttestation -eq $true)){ $tempHasRequiredAccess = $false; } elseif ($null -eq $resourceStates) { $tempHasRequiredAccess = $false; } } catch { $this.EvaluationError($_); } $eventContext.ControlResults | ForEach-Object { try { $currentItem = $_; # Copy the current result to Actual Result field $currentItem.ActualVerificationResult = $currentItem.VerificationResult; # override the default value with current status $currentItem.IsResourceActive = $this.IsResourceActive; $currentItem.InactiveFromDays = $this.InactiveFromDays; #Logic to append the control result with the permissions metadata [SessionContext] $sc = $currentItem.CurrentSessionContext; $sc.Permissions.HasAttestationWritePermissions = $this.ControlStateExt.HasControlStateWriteAccessPermissions(); $sc.Permissions.HasAttestationReadPermissions = $this.ControlStateExt.HasControlStateReadAccessPermissions(); # marking the required access as false if there was any error reading the attestation data $sc.Permissions.HasRequiredAccess = $sc.Permissions.HasRequiredAccess -and $tempHasRequiredAccess; # Disable the fix control feature if (-not $this.GenerateFixScript) { $currentItem.EnableFixControl = $false; } if ($currentItem.StateManagement.CurrentStateData -and $currentItem.StateManagement.CurrentStateData.DataObject -and $eventContext.ControlItem.DataObjectProperties) { $currentItem.StateManagement.CurrentStateData.DataObject = [Helpers]::SelectMembers($currentItem.StateManagement.CurrentStateData.DataObject, $eventContext.ControlItem.DataObjectProperties); } if ($controlState.Count -ne 0) { # Process the state if its available $childResourceState = $controlState | Where-Object { $_.ChildResourceName -eq $currentItem.ChildResourceName } | Select-Object -First 1; if ($childResourceState) { $validatePreviousAttestation = $true # if EnforceApprovedException is true and controls is not attested with exception id, based on configuration, invalidate the previous attestation if ([Helpers]::CheckMember($this.ControlSettings, "EnforceApprovedException") -and $this.ControlSettings.EnforceApprovedException -eq $true -and (-not [Helpers]::CheckMember($childResourceState.state, "ApprovedExceptionID") -or [string]::IsNullOrWhiteSpace($childResourceState.state.ApprovedExceptionID))) { $attestationExpiryDays = "" # check if InvalidatePreviousAttestations is set to true to invalidate previous attestation if ([Helpers]::CheckMember($this.ControlSettings, "ApprovedExceptionSettings") -and $this.ControlSettings.ApprovedExceptionSettings.InvalidatePreviousAttestations -eq $true) { $approvedExceptionsControlList = $this.ControlSettings.ApprovedExceptionSettings.ControlsList # verify if the control attested is in the list of approved exception enabled controls if ($approvedExceptionsControlList -contains $controlState.ControlId) { $validatePreviousAttestation = $false Write-Host "Per your org policy, this control now requires an associated approved exception id. Previous attestation has been invalidated." -ForegroundColor Yellow #add to the dirty state list so that it can be removed later $this.DirtyResourceStates += $childResourceState } } } # Skip passed ones from State Management # Skip the validation if invalidatePreviousAttestations is enabled to true in control settings if ($currentItem.ActualVerificationResult -ne [VerificationResult]::Passed) { #compare the states if (($childResourceState.ActualVerificationResult -eq $currentItem.ActualVerificationResult) -and $childResourceState.State) { $currentItem.StateManagement.AttestedStateData = $childResourceState.State; # Compare dataobject property of State if ($null -ne $childResourceState.State.DataObject) { if ($currentItem.StateManagement.CurrentStateData -and $null -ne $currentItem.StateManagement.CurrentStateData.DataObject) { $currentStateDataObject = [JsonHelper]::ConvertToJsonCustom($currentItem.StateManagement.CurrentStateData.DataObject) | ConvertFrom-Json try { # Objects match, change result based on attestation status if ($eventContext.ControlItem.AttestComparisionType -and $eventContext.ControlItem.AttestComparisionType -eq [ComparisionType]::NumLesserOrEqual) { $dataObjMatched = $false if ([Helpers]::CompareObject($childResourceState.State.DataObject, $currentStateDataObject, $true, $eventContext.ControlItem.AttestComparisionType)) { $dataObjMatched = $true } if (-not $dataObjMatched) { #In Linux env base24 encoding is different from that in Windows. Therefore doing a comparison of decoded data object as fallback $decodedAttestedDataObj = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($childResourceState.State.DataObject)) | ConvertFrom-Json $decodedCurrentDataObj = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($currentStateDataObject)) | ConvertFrom-Json if ([Helpers]::CompareObject($decodedAttestedDataObj, $decodedCurrentDataObj, $true)) { $dataObjMatched = $true } # Don't fail attestation if current state data object is a subset of attested state data object if (($decodedCurrentDataObj | Measure-Object).Count -lt ($decodedAttestedDataObj | Measure-Object).Count) { if ([Helpers]::CompareObject($decodedAttestedDataObj, $decodedCurrentDataObj, $false, $eventContext.ControlItem.AttestComparisionType)) { $dataObjMatched = $true } } } if ($dataObjMatched) { $this.ModifyControlResult($currentItem, $childResourceState); } } else { $dataObjMatched = $false if ([Helpers]::CompareObject($childResourceState.State.DataObject, $currentStateDataObject, $true)) { #$this.ModifyControlResult($currentItem, $childResourceState); $dataObjMatched = $true } if (-not $dataObjMatched) { #In Linux env base24 encoding is different from that in Windows. Therefore doing a comparison of decoded data object as fallback $decodedAttestedDataObj = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($childResourceState.State.DataObject)) | ConvertFrom-Json $decodedCurrentDataObj = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String($currentStateDataObject)) | ConvertFrom-Json if ([Helpers]::CompareObject($decodedAttestedDataObj, $decodedCurrentDataObj, $true) -and [Helpers]::CompareObject($decodedCurrentDataObj, $decodedAttestedDataObj, $true)) { $dataObjMatched = $true } # Don't fail attestation if current state data object is a subset of attested state data object if (($decodedCurrentDataObj | Measure-Object).Count -lt ($decodedAttestedDataObj | Measure-Object).Count) { if ([Helpers]::CompareObject($decodedCurrentDataObj, $decodedAttestedDataObj, $false)) { $dataObjMatched = $true } } elseif ($decodedCurrentDataObj.GetType() -eq [Int] -and $decodedAttestedDataObj.GetType() -eq [Int]) { if ($decodedCurrentDataObj -lt $decodedAttestedDataObj) { $dataObjMatched = $true } } } if ($dataObjMatched) { $this.ModifyControlResult($currentItem, $childResourceState); } } } catch { $this.EvaluationError($_); } } } else { if ($currentItem.StateManagement.CurrentStateData) { if ($null -eq $currentItem.StateManagement.CurrentStateData.DataObject) { # No object is persisted, change result based on attestation status $this.ModifyControlResult($currentItem, $childResourceState); } } else { # No object is persisted, change result based on attestation status $this.ModifyControlResult($currentItem, $childResourceState); } } } } else { #add to the dirty state list so that it can be removed later $this.DirtyResourceStates += $childResourceState } } } } catch { $this.EvaluationError($_); } }; } # State Machine implementation of modifying verification result hidden [void] ModifyControlResult([ControlResult] $controlResult, [ControlState] $controlState) { # No action required if Attestation status is None OR verification result is Passed if ($controlState.AttestationStatus -ne [AttestationStatus]::None -or $controlResult.VerificationResult -ne [VerificationResult]::Passed) { $controlResult.AttestationStatus = $controlState.AttestationStatus; $controlResult.VerificationResult = [Helpers]::EvaluateVerificationResult($controlResult.VerificationResult, $controlState.AttestationStatus); } } #Function to validate attestation data expiry validation hidden [bool] IsStateActive([SVTEventContext] $eventcontext, [ControlState] $controlState) { try { $expiryIndays = $this.CalculateExpirationInDays([SVTEventContext] $eventcontext, [ControlState] $controlState); #Validate if expiry period is passed #Added a condition so as to expire attested controls that were in 'Error' state. if (($expiryIndays -ne -1 -and $controlState.State.AttestedDate.AddDays($expiryIndays) -lt [DateTime]::UtcNow) -or ($controlState.ActualVerificationResult -eq [VerificationResult]::Error)) { return $false } else { $controlState.State.ExpiryDate = ($controlState.State.AttestedDate.AddDays($expiryIndays)).ToString("MM/dd/yyyy"); return $true } } catch { #if any exception occurs while getting/validating expiry period, return true. $this.EvaluationError($_); return $true } } hidden [int] CalculateExpirationInDays([SVTEventContext] $eventcontext, [ControlState] $controlState) { try { #For exempt controls, either the no. of days for expiry were provided at the time of attestation or a default of 6 motnhs was already considered, #therefore skipping this flow and calculating days directly using the expiry date already saved. $isApprovedExceptionEnforced = $false $approvedExceptionControlsList = @(); if ([Helpers]::CheckMember($this.ControlSettings, "EnforceApprovedException") -and ($this.ControlSettings.EnforceApprovedException -eq $true)) { if ([Helpers]::CheckMember($this.ControlSettings, "ApprovedExceptionSettings") -and (($this.ControlSettings.ApprovedExceptionSettings.ControlsList | Measure-Object).Count -gt 0)) { $isApprovedExceptionEnforced = $true $approvedExceptionControlsList = $this.ControlSettings.ApprovedExceptionSettings.ControlsList } } if ($controlState.AttestationStatus -ne [AttestationStatus]::ApprovedException) { #Get controls expiry period. Default value is zero $controlAttestationExpiry = $eventcontext.controlItem.AttestationExpiryPeriodInDays $controlSeverity = $eventcontext.controlItem.ControlSeverity $controlSeverityExpiryPeriod = 0 $defaultAttestationExpiryInDays = [Constants]::DefaultControlExpiryInDays; $expiryInDays = -1; if (($eventcontext.ControlResults | Measure-Object).Count -gt 0) { $isControlInGrace = $eventcontext.ControlResults.IsControlInGrace; } else { $isControlInGrace = $true; } if ([Helpers]::CheckMember($this.ControlSettings, "AttestationExpiryPeriodInDays") ` -and [Helpers]::CheckMember($this.ControlSettings.AttestationExpiryPeriodInDays, "Default") ` -and $this.ControlSettings.AttestationExpiryPeriodInDays.Default -gt 0) { $defaultAttestationExpiryInDays = $this.ControlSettings.AttestationExpiryPeriodInDays.Default } #Expiry in the case of WillFixLater or StateConfirmed/Recurring Attestation state will be based on Control Severity. # Checking if the resource id is present in extended expiry list of control settings if ($controlState.AttestationStatus -eq [AttestationStatus]::NotAnIssue -or $controlState.AttestationStatus -eq [AttestationStatus]::NotApplicable) { $expiryInDays = $defaultAttestationExpiryInDays; } else { # Expire WillFixLater if GracePeriod has expired if (-not($isControlInGrace) -and $controlState.AttestationStatus -eq [AttestationStatus]::WillFixLater) { $expiryInDays = 0; } else { if ($controlAttestationExpiry -ne 0) { $expiryInDays = $controlAttestationExpiry } elseif ([Helpers]::CheckMember($this.ControlSettings, "AttestationExpiryPeriodInDays")) { $controlsev = $this.ControlSettings.ControlSeverity.PSobject.Properties | Where-Object Value -eq $controlSeverity | Select-Object -First 1 $controlSeverity = $controlsev.name #Check if control severity has expiry period if ([Helpers]::CheckMember($this.ControlSettings.AttestationExpiryPeriodInDays.ControlSeverity, $controlSeverity) ) { $expiryInDays = $this.ControlSettings.AttestationExpiryPeriodInDays.ControlSeverity.$controlSeverity } #If control item and severity does not contain expiry period, assign default value else { $expiryInDays = $defaultAttestationExpiryInDays } } #Return -1 when expiry is not defined else { $expiryInDays = -1 } } } } else { #Calculating the expiry in days for exempt controls if ([String]::IsNullOrEmpty($controlState.State.ExpiryDate)) { $expiryPeriod = $this.ControlSettings.DefaultAttestationPeriodForExemptControl $expiryDate = ($controlState.State.AttestedDate).AddDays($expiryPeriod) } else { $expiryDate = [DateTime]$controlState.State.ExpiryDate } # #Adding 1 explicitly to the days since the differnce below excludes the expiryDate and that also needs to be taken into account. # $expiryInDays = ($expiryDate - $controlState.State.AttestedDate).Days + 1 # #Calculating the expiry in days for exempt controls # $expiryDate = [DateTime]$controlState.State.ExpiryDate # #Adding 1 explicitly to the days since the differnce below excludes the expiryDate and that also needs to be taken into account. $expiryInDays = ($expiryDate - $controlState.State.AttestedDate).Days + 1 } if (($controlState.AttestationStatus -eq [AttestationStatus]::ApprovedException) -or ( $isApprovedExceptionEnforced -and $approvedExceptionControlsList -contains $controlState.ControlId)) { $expiryInDays = $this.ControlSettings.DefaultAttestationPeriodForExemptControl } elseif([Helpers]::CheckMember($this.ControlSettings, "ExtendedAttestationExpiryResources") -and [Helpers]::CheckMember($this.ControlSettings, "ExtendedAttestationExpiryDuration")){ # Checking if the resource id is present in extended expiry list of control settings if(($this.ControlSettings.ExtendedAttestationExpiryResources | Get-Member "ResourceType") -and ($this.ControlSettings.ExtendedAttestationExpiryResources | Get-Member "ResourceIds")) { $extendedResources = $this.ControlSettings.ExtendedAttestationExpiryResources | Where { $_.ResourceType -match $eventcontext.FeatureName } # type null check if(($extendedResources | Measure-Object).Count -gt 0 -and [Helpers]::CheckMember($extendedResources, "ResourceIds") -and $controlState.ResourceId -in $extendedResources.ResourceIds){ $expiryInDays = $this.ControlSettings.ExtendedAttestationExpiryDuration; } } } } catch { #if any exception occurs while getting/validating expiry period, return -1. $this.EvaluationError($_); $expiryInDays = -1 } return $expiryInDays } [SVTEventContext[]] FetchStateOfAllControls() { [SVTEventContext[]] $resourceSecurityResult = @(); if (-not $this.ValidateMaintenanceState()) { if ($this.GetApplicableControls().Count -eq 0) { $this.PublishCustomMessage("No security controls match the input criteria specified", [MessageType]::Warning); } else { $this.EvaluationStarted(); $resourceSecurityResult += $this.GetControlsStateResult(); if (($resourceSecurityResult | Measure-Object).Count -gt 0) { $this.EvaluationCompleted($resourceSecurityResult); } } } return $resourceSecurityResult; } hidden [SVTEventContext[]] GetControlsStateResult() { [SVTEventContext[]] $automatedControlsResult = @(); $this.DirtyResourceStates = @(); try { $this.GetApplicableControls() | ForEach-Object { $eventContext = $this.FetchControlState($_); #filter controls if there is no state found if ($eventContext) { $eventContext.ControlResults = $eventContext.ControlResults | Where-Object { $_.AttestationStatus -ne [AttestationStatus]::None } if ($eventContext.ControlResults) { $automatedControlsResult += $eventContext; } } }; } catch { $this.EvaluationError($_); } return $automatedControlsResult; } #isRescan parameter is added to check if method is called from rescan. hidden [SVTEventContext] FetchControlState([ControlItem] $controlItem, $isRescan = $false) { [SVTEventContext] $singleControlResult = $this.CreateSVTEventContextObject(); $singleControlResult.ControlItem = $controlItem; $controlState = @(); $controlStateValue = @(); try { $resourceStates = $this.GetResourceState($isRescan); if (($resourceStates | Measure-Object).Count -ne 0) { $controlStateValue += $resourceStates | Where-Object { $_.InternalId -eq $singleControlResult.ControlItem.Id }; $controlStateValue | ForEach-Object { $currentControlStateValue = $_; if ($null -ne $currentControlStateValue) { #assign expiry date $expiryIndays = $this.CalculateExpirationInDays($singleControlResult, $currentControlStateValue); if ($expiryIndays -ne -1) { $currentControlStateValue.State.ExpiryDate = ($currentControlStateValue.State.AttestedDate.AddDays($expiryIndays)).ToString("MM/dd/yyyy"); } $controlState += $currentControlStateValue; } } } } catch { $this.EvaluationError($_); } if (($controlState | Measure-Object).Count -gt 0) { #Added check to resolve duplicate log issue in rescan if (!$isRescan) { $this.ControlStarted($singleControlResult); } if ($controlItem.Enabled -eq $false) { $this.ControlDisabled($singleControlResult); } else { $controlResult = $this.CreateControlResult($controlItem.FixControl); $singleControlResult.ControlResults += $controlResult; $singleControlResult.ControlResults | ForEach-Object { try { $currentItem = $_; if ($controlState.Count -ne 0) { # Process the state if it's available $childResourceState = $controlState | Where-Object { $_.ChildResourceName -eq $currentItem.ChildResourceName } | Select-Object -First 1; if ($childResourceState) { $currentItem.StateManagement.AttestedStateData = $childResourceState.State; $currentItem.AttestationStatus = $childResourceState.AttestationStatus; $currentItem.ActualVerificationResult = $childResourceState.ActualVerificationResult; $currentItem.VerificationResult = [VerificationResult]::NotScanned } } } catch { $this.EvaluationError($_); } }; } #Added check to resolve duplicate log issue in rescan if (!$isRescan) { $this.ControlCompleted($singleControlResult); } } return $singleControlResult; } hidden [void] GetManualSecurityStatusExt($arg) { $this.PostProcessData($arg); } hidden [void] RunControlExt($singleControlResult) { $this.PostProcessData($singleControlResult); } hidden [void] EvaluateAllControlsExt($resourceSecurityResult) { $this.PostEvaluationCompleted($resourceSecurityResult); } hidden [void] PostEvaluationCompleted([SVTEventContext[]] $ControlResults) { $this.UpdateControlStates($ControlResults); $BugLogParameterValue =$this.InvocationContext.BoundParameters["AutoBugLog"] #perform bug logging after control scans for the current resource if ($BugLogParameterValue) { # using checkmember without null check, if field is present in control settings but no value has been set then allow bug logging for inactive resources. if([Helpers]::CheckMember($this.ControlSettings.BugLogging, "LogBugsForInactiveResources", $false)) { # if bug logging is enabled for inactive resources, then only bug will be logged for inactive resources. if ($this.ControlSettings.BugLogging.LogBugsForInactiveResources -eq $false) { $logBugsForInactiveResources = $this.isResourceActive; } # if bug logging is not enabled or its value has not been set in control setting, then treat bug logging is active for all resources. else { $logBugsForInactiveResources = $true; } } # if required field is not present in the controlSettings,json then follow the older approach else { $logBugsForInactiveResources = $true; } #added check azuretable check here, if ((azuretable is used for storing bug info and scan mode is CA) OR azuretable bug info is disabed) then only allow bug logging $scanSource = [AzSKSettings]::GetInstance().GetScanSource(); $isAzureTableEnabled = [Helpers]::CheckMember($this.ControlSettings.BugLogging, "UseAzureStorageAccount"); if (!$isAzureTableEnabled -or ($isAzureTableEnabled -and ($scanSource -eq "CA")) ) { if ($logBugsForInactiveResources) { if (($ControlResults.ControlResults.VerificationResult -contains "Failed") -or ($ControlResults.ControlResults.VerificationResult -contains "Verify")) { $this.BugLoggingPostEvaluation($ControlResults, $BugLogParameterValue) } } else { $this.PublishCustomMessage("The current resource is inactive. Bug logging is disabled for inactive resources.", [MessageType]::Warning); } } } } #function to call AutoBugLog class for performing bug logging hidden [void] BugLoggingPostEvaluation([SVTEventContext []] $ControlResults,[string] $BugLogParameterValue) { $AutoBugLog = [AutoBugLog]::AutoBugInstance if (!$AutoBugLog) { #Settting initial value true so will evaluate in all different cmds.(Powershell keeping static variables in memory in next command also.) [BugLogPathManager]::checkValidPathFlag = $true; $AutoBugLog = [AutoBugLog]::GetInstance($this.OrganizationContext.OrganizationName, $this.InvocationContext, $this.ControlStateExt, $BugLogParameterValue); } $AutoBugLog.LogBugInADO($ControlResults) } } # SIG # Begin signature block # MIInuwYJKoZIhvcNAQcCoIInrDCCJ6gCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCCKfbEWpofgHXl # hSqTbOa6HvBrLRPpjstYXukQxnty66CCDYEwggX/MIID56ADAgECAhMzAAACUosz # qviV8znbAAAAAAJSMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMjU5WhcNMjIwOTAxMTgzMjU5WjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDQ5M+Ps/X7BNuv5B/0I6uoDwj0NJOo1KrVQqO7ggRXccklyTrWL4xMShjIou2I # sbYnF67wXzVAq5Om4oe+LfzSDOzjcb6ms00gBo0OQaqwQ1BijyJ7NvDf80I1fW9O # L76Kt0Wpc2zrGhzcHdb7upPrvxvSNNUvxK3sgw7YTt31410vpEp8yfBEl/hd8ZzA # v47DCgJ5j1zm295s1RVZHNp6MoiQFVOECm4AwK2l28i+YER1JO4IplTH44uvzX9o # RnJHaMvWzZEpozPy4jNO2DDqbcNs4zh7AWMhE1PWFVA+CHI/En5nASvCvLmuR/t8 # q4bc8XR8QIZJQSp+2U6m2ldNAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUNZJaEUGL2Guwt7ZOAu4efEYXedEw # UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1 # ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDY3NTk3MB8GA1UdIwQYMBaAFEhu # ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w # Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx # MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAFkk3 # uSxkTEBh1NtAl7BivIEsAWdgX1qZ+EdZMYbQKasY6IhSLXRMxF1B3OKdR9K/kccp # kvNcGl8D7YyYS4mhCUMBR+VLrg3f8PUj38A9V5aiY2/Jok7WZFOAmjPRNNGnyeg7 # l0lTiThFqE+2aOs6+heegqAdelGgNJKRHLWRuhGKuLIw5lkgx9Ky+QvZrn/Ddi8u # TIgWKp+MGG8xY6PBvvjgt9jQShlnPrZ3UY8Bvwy6rynhXBaV0V0TTL0gEx7eh/K1 # o8Miaru6s/7FyqOLeUS4vTHh9TgBL5DtxCYurXbSBVtL1Fj44+Od/6cmC9mmvrti # yG709Y3Rd3YdJj2f3GJq7Y7KdWq0QYhatKhBeg4fxjhg0yut2g6aM1mxjNPrE48z # 6HWCNGu9gMK5ZudldRw4a45Z06Aoktof0CqOyTErvq0YjoE4Xpa0+87T/PVUXNqf # 7Y+qSU7+9LtLQuMYR4w3cSPjuNusvLf9gBnch5RqM7kaDtYWDgLyB42EfsxeMqwK # WwA+TVi0HrWRqfSx2olbE56hJcEkMjOSKz3sRuupFCX3UroyYf52L+2iVTrda8XW # esPG62Mnn3T8AuLfzeJFuAbfOSERx7IFZO92UPoXE1uEjL5skl1yTZB3MubgOA4F # 8KoRNhviFAEST+nG8c8uIsbZeb08SeYQMqjVEmkwggd6MIIFYqADAgECAgphDpDS # AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla # MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT # H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG # OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S # 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz # y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7 # 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u # M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33 # X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl # XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP # 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB # l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF # RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM # CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ # BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO # 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y # Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y # Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw # cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA # XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY # 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj # 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd # d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ # Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf # wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ # aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j # NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B # xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96 # eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7 # r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I # RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIZkDCCGYwCAQEwgZUwfjELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z # b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAlKLM6r4lfM52wAAAAACUjAN # BglghkgBZQMEAgEFAKCBsDAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor # BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQg5yfEoPx4 # JhTfWhOeHplKDNPknbblR3C6Rb1Lg17Opn8wRAYKKwYBBAGCNwIBDDE2MDSgFIAS # AE0AaQBjAHIAbwBzAG8AZgB0oRyAGmh0dHBzOi8vd3d3Lm1pY3Jvc29mdC5jb20g # MA0GCSqGSIb3DQEBAQUABIIBACRFatrP7SJavJMtxUHpK6WpW9APtV6BV7rZ/cQH # dBkshS/H+rqEMAB9+DPFsVX6Hi3lxWQxE3kECWPwqnJxhsDxCjj/O1X80ONGeOXm # 4QeTwZgD5EzHO0AEutFJWVb+lUUGI1+radUwpuBRd/F/NqaEQpxu/o8BFZLxPMf/ # jJm+ssu3lpoI22S2ZUBhR08mNITYxMQg6dBcRFgC6eHzB48c5j8BdAhmR6h3/uLc # TDzDpXZ8t34pT8uj+mantmYeMoTxzbP03ORSAmimmBgoDJunJ8G6qDXUqMkwGGin # hiANmUkSfC8GEfPr64kaCEVrSclrrE5k8ynn+wPsPr22oKWhghcYMIIXFAYKKwYB # BAGCNwMDATGCFwQwghcABgkqhkiG9w0BBwKgghbxMIIW7QIBAzEPMA0GCWCGSAFl # AwQCAQUAMIIBWAYLKoZIhvcNAQkQAQSgggFHBIIBQzCCAT8CAQEGCisGAQQBhFkK # AwEwMTANBglghkgBZQMEAgEFAAQgGdCYBK3PQJb5oD2G7fBtAcRrH5P1uDxD1MiA # +g93P9gCBmGVXeYVQhgSMjAyMTEyMDIyMTQxMTcuMzVaMASAAgH0oIHYpIHVMIHS # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRN # aWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRo # YWxlcyBUU1MgRVNOOjNCRDQtNEI4MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQg # VGltZS1TdGFtcCBTZXJ2aWNloIIRaDCCBxQwggT8oAMCAQICEzMAAAGJtL+GMIQc # S48AAQAAAYkwDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTAwHhcNMjExMDI4MTkyNzQxWhcNMjMwMTI2MTkyNzQxWjCB0jELMAkGA1UE # BhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAc # BgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9zb2Z0 # IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMgVFNT # IEVTTjozQkQ0LTRCODAtNjlDMzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3Rh # bXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAL0GV8WR # ZmuqZZrjsrzaVfMTjTsHGKJWRvwY8mVhkpOSThmi8qyiHeVcVR1h5bJiROEr587H # abCplcfKLTjb3iFBb0nHhGafFV5ruZtX7vC+3Pt5cF3Im43HKrRL7ULJaJEFcdK/ # i+eGm6zQ2q8BRu9yGkYnSEtYvXPrpyfKGMoQ0S6wsrBQFcckITzWZFiu2fP1RrpG # iiwFh1wof/ked4eNoBS/vf5gAC8cwl17qH4vH/1ygpu8TcFXNYTjQgs+qKveALn8 # 1TZJCFuG61EIGKQnCZvVNFzZkL7a6KWA5/VLWPGENDSnp1z7XYCx3UPDZ794oBKy # i61iNGuZ+Y43Sn8JPvJr2pKnWZpTrHnjktV7KUDSQCtbmZZQCE3J0GTnDuaH4zkN # 97o1nJAF3c/v8d6O5eAFP00jjMxmTMIVHbVcAt3UmyLaUlRYJ4zNgjhCfc4Amnbz # oqxgyzeO9Y2SNowpZI7CU3YD5N+N00AOCRb3bP7p2atLi6/p4md1+ODgcdsfoFZZ # Z9nOFG2VzbngOMktUyRm2yRSCCwJk1APQLo+XiEhk2zYslse/R5wjk2q9/UBCqM5 # uC505g18tPyiPx/52GRirkx33JD9vMEEtOqw/nw0ucS8HETAlvdg5B15rW4RskYp # QTi+S8WXpUH8beeMJeFlAtAHQBKJT3pDg8DvAgMBAAGjggE2MIIBMjAdBgNVHQ4E # FgQUl28fs0daeCCAHoLgOqxypK35e1AwHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXS # ZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIw # MTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0 # YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAK # BggrBgEFBQcDCDANBgkqhkiG9w0BAQsFAAOCAgEAjrS3aVlCOCsHyy632iqywfdg # 6mwLKRljONU2juCZfrB8T6OdtrrtxikAo5pEVq3h7ZX8svZDpOy1msd5N5HvBrX3 # rX24e6h9C3ldlzloN/QTpx3+pk3GauxWEmWXIdSQ0I3PfPjnZaMPqFoodA27eAlf # 3tfWXBPtZ9c81pLJFBHdH+YzyFIrN96fr5GPLM3bgLQnCHDxVISPB2+WpT1ADzIx # s8Cm+zSCm53/I/HD9fALOSL3nJBdKIdXMOt0WP7zyutiw2HaYu1pxtjm754H1lSr # cIsEyOIx49nDvat+xw3vzz5dteoEqVGYdGqduJipjA33CqdTeJhHbMc+KLHjqz2H # hbBx1iRSegIr76p+9Ck3iaaea/g8Uqm3kstJsSFDqv5QGlMYDUkFVF9urfK/n3Ip # KHyr9t1h67UVd7e61U7AfWM60WoopJs+vCuR1nbfTKlC8T0D6PqaWdC0apDmnuOu # vlCkWNCcVrXazHObx5R2X56o2sI/0bDNkukOn2vU/Qp2NTc+w2ARt8mScgjxbK4F # NObPZY6n7EqbaRXVIfUeHHvi+9UlgyzNsf9TBSyxwDG17BKfCpaBBrWg1C58bX0t # rWIX7ihqkV6BHwzwDJyHU70D4dxh0OEo5JAQERy9DGO+WpYRkyh1owtmi1TqPKGy # iAZPIX5xQ1H/xMlcOLkwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAV # MA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGlu # Z3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBv # cmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRo # b3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8A # MIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK # 4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLem # jkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+ # NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+y # OSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTes # y+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9z # fUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUD # o9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDq # hFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8w # dJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N # +VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOC # Ad0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5k # xJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBc # BgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYD # VR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYD # VR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxi # aNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3Nv # ZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMu # Y3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNy # b3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQw # DQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+Tkdk # eLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYe # eNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3Uk # V7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wX # sFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mj # dAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY # 3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmR # aw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyh # YWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+ # 57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7t # fqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOh # cGbyoYIC1zCCAkACAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVy # YXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOjNCRDQtNEI4 # MC02OUMzMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQAhpQmt5Hrcnrnsu2yTaVpDLognEKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA5VOiVzAi # GA8yMDIxMTIwMzAzNTE1MVoYDzIwMjExMjA0MDM1MTUxWjB3MD0GCisGAQQBhFkK # BAExLzAtMAoCBQDlU6JXAgEAMAoCAQACAhx4AgH/MAcCAQACAhFgMAoCBQDlVPPX # AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh # CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAVN0RjQ0cws1HOvsdd+fhNp50 # kdkaSuEnVWZs5B4Pk+709YKd/Tpqwuf39MF+plJKQbySRGYnCYcRXhis7LwlNil1 # S5Cs6epDHG8X9CwUuzurEYHZAns6hp9/3i2jnsWRwY2n5cUN0zSV2lbOkyQ6H4tM # jAx4SLiKs8eiKDZPe9wxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMAITMwAAAYm0v4YwhBxLjwABAAABiTANBglghkgBZQMEAgEFAKCC # AUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCDJ # kArp43xkSjU4dlkUDMa9/FWPM661qm9F5KjiYcZSzjCB+gYLKoZIhvcNAQkQAi8x # geowgecwgeQwgb0EIGZ3RzHcUFdVbG6Vhzkx6lhMnL3ESZu3GOvZf1Jk/I9FMIGY # MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV # BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG # A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGJtL+GMIQc # S48AAQAAAYkwIgQgo7k65aRn2XtATYUfJ8GbVZubv7Pg0Yfzix3PULarljowDQYJ # KoZIhvcNAQELBQAEggIAWqRSBYUgB0AdWE30y9z5nxw+e1NHW2zhaICVotNn8pNT # ZTvTpRoHwEBLgtzDJUpIweQ4I2vtUq5T/1CWG1U6Ze1PMnPsj5FxNhh3G2wYq4Xi # lwcWqN6V95AcTkWsEBSWdUkO7MacSsESSl2KfpecJDhQbhirwDM6j2gG7GnLvV2d # ntDY3Ud9wX+aCdSH9arWBFexULv2ay3VDIijNN2KTCqrEQzakvnCpM8pdYmG8lJ0 # z6Cag0HWKqk/SDhfEFYRSS3g56StcVjAcWNwhUETn1yVVUxr1QaG5pJ4yI7F/tzy # pGH4hfaQ0adcsZMK2jw3x0j31b/yntUOb6eQkSygoCpB7tgahImGLGM4QP75GFw/ # AzljX3Z3P95C+o5mzFAcPbNlPMt4QVYUImZj4k5dD+Ny2qu37+aCV9IkPWzhZk0E # yi+7/iwp5coU+QsB7QoHT2SGi8nfNIRRow/Z0jYVmDeAX6bAZVO/BoXYtLUx2goX # WBw+OTGwaZpAIx4VwnJnCnsDW0MPNCSu9Jp/qBrNOVJErc84izr5aHWdy5TVolJ4 # ClNJr9iY9QBKK5RLbtizhmdmi7PbIdGDN8BzHs7sEBqvOcZPx3Cn5X+NlHZCzlWS # SAPalyvAxFfR7Qf9s7getQDYy8mSrzZZ46SvDDTHHwPpck4hbDZW4jR0bzPiP50= # SIG # End signature block |