lvfengfree b92e1119ae fix: 修复菜单为空问题 - 移除后端过滤home路由的错误逻辑
- 修复RouteService中错误过滤home路由的问题
- 后端现在正确返回所有用户有权限的路由
- 添加设备管理相关功能(列表、在线监控、电源管理、远程监控)
- 添加详细的修复文档和重启脚本
- 更新权限配置脚本

问题根源:后端代码中有逻辑会过滤掉home路由,导致前端收到空数组,无法生成菜单
解决方案:移除过滤home路由的逻辑,让后端返回所有有权限的路由
2026-03-01 09:50:19 +08:00

942 lines
42 KiB
PowerShell
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Copyright (C) 2007 Intel Corporation
Function Set-AMT3PDS {
<#
.Synopsis
Stores data in the Intel Active Management Technology Third Party Data Storage
.Description
This CmdLet stores data into the Intel Active Management Technology (AMT) Third Party Data Storage (3PDS) of clients that have Intel AMT firmware version 3.0 or higher.
.Notes
Supported AMT Firmware Versions: 3.0 and higher
Understanding 3PDS structure:
Data stored within the 3PDS is stored within blocks of nonvolatile memory in a hierarchical structure. Each block must be associated to a tiered structure of Enterprise -> Vendor -> Application -> Block Name.
3PDS Machine UUID:
When a block is created the application that created the block will specify a GUID to identify itself as the entity that created the block. When modifying blocks that were created by a different entity it may be necessary to specify the Machine UUID as part of the CMDLet parameter.
AMT Provisioning:
The vPro client AMT firmware must be provisioned prior to accessing AMT functionality. This CMDLet will fail if it is run against a vPro client that has not been provisioned.
AMT Client Authentication:
To invoke commands against AMT enabled clients credentials to authenticate must be specified.
When no credential is provided as a parameter, the script will use the local logged on Kerberos credential.
When only the username (Kerberos or Digest) parameter is included the user will be prompted to provide the associated password.
Credentials should be stored as a PowerShell variable then passed into the Cmdlet with the credential parameter.
$AMTCredential = get-credential
AMT Client Encryption:
If the Intel vPro client has been configured to use TLS (a web server certificate has been issued to the Intel Management Engine) the Cmdlet must be called with a -TLS switch.
When managing an Intel vPro client over TLS (Port 16993) it is important that the computername parameter matchs the primary subject name of the issued TLS certificate. Typically this is the fully qualified domain name (FQDN).
If Mutual TLS is desired, the Cmdlet must be called with -TLS switch and with a valid certificate name from the certificate store in the -CertificateName parameter.
Status:
Status output designates if the Cmdlet was run successfully. For failed attempts additional status may be provided.
.Link
http:\\vproexpert.com
http:\\www.intel.com\vpro
http:\\www.intel.com
.Example
Set-AMT3PDS -computer:vproclient.vprodemo.com -TLS -CertificateName "myCertificate" -Operation:Create -Enterprise:Intel -Vendor:Intel -Application:PowerShell -Block:TestName
Creates Block using Kerberos credentials.
ComputerName Port Operation Status
------------ ---- --------- ------
vproclient.vprodemo.com 16993 Create Successful
.Example
Set-AMT3PDS 192.168.1.100 Write -credential $AMTCredential -Enterprise:Intel -Vendor:Intel -Application:PowerShell -Block:TestName -BlockData:"This is test"
Creates Block and write data to block
ComputerName Port Operation Status
------------ ---- --------- ------
192.168.1.100 16992 Create Successful
.Example
Set-AMT3PDS -ComputerName:vproclient.vprodemo.com -TLS -Operation:Write -Enterprise:Intel -Vendor:Intel -Application:PowerShell -Block:TestName -BlockData:"Append this to existing data in block" -AppendWrite $true
Appends the data to data in existing block.
ComputerName Port Operation Status
------------ ---- --------- ------
vproclient.vprodemo.com 16993 Write Successful
.Example
Get-Content computers.txt | Set-AMT3PDS -TLS -Operation:Write -Enterprise:Intel -Vendor:Intel -Application:PowerShell -Block:TestName -BlockData:"This is test"
Will pull the list of amt clients from a text file and pipe them in the Set-AMT3PDS CMDLet.
#>
[CmdletBinding()]
Param (
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$true, position=0, HelpMessage="Hostname, FQDN, or IP Address")] [String[]] $ComputerName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Valid Ports are 16992 (non-TLS) or 16993 (TLS)")][ValidateSet("16992", "16993")] [String] $Port,
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=1, HelpMessage="Valid Operations are Create and Write")][ValidateSet("Create","Write","CreateWrite")] [String] $Operation,
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=2, HelpMessage="Name of the Enterprise")] [string] $Enterprise,
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=3, HelpMessage="Name of the Vendor")] [string] $Vendor,
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=4, HelpMessage="Name of the Application")] [string] $Application,
[Parameter(Mandatory=$true,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=5, HelpMessage="Name of the Block")] [string] $Block,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=6, HelpMessage="Data to Write")] [string] $BlockData,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Hidden Block")] [bool] $BlockHidden,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Append Writes")] [bool] $AppendWrite,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Use TLS (Port 16993)")] [switch] $TLS,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Accept self-signed certificate for TLS connection (skip any certificate checks.)")] [switch] $AcceptSelfSignedCert,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Name of certificate. (Use for mutual TLS)")] [string] $CertificateName,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos User")] [string] $Username,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, HelpMessage="Digest of Kerberos Password")] [string] $Password,
[Parameter(Mandatory=$false,ValueFromPipelineByPropertyName=$true,ValueFromPipeline=$false, position=7, HelpMessage="PS Credential")] [System.Management.Automation.PSCredential] $Credential
)
PROCESS {
function CreateApplication($Connection, $VendorName, $AppName)
{
$AdminService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService")
$InputObj = $AdminService_EPR.CreateMethodInput("AddStorageFpaclEntry")
$InputObj.SetProperty("AttrType","1")
$InputObj.SetProperty("ApplicationName",$AppName)
$InputObj.SetProperty("VendorName",$VendorName)
$InputObj.SetProperty("IsPartner", "true")
$InputObj.SetProperty("TotalAllocationSize","49152")
$Output = $AdminService_EPR.InvokeMethod($InputObj)
if((-not $Output) -or $Output.GetProperty("ReturnValue").ToString() -ne "0")
{
return $false
}
else
{
return $true
}
}
function CreateEnterprise($Connection, $enterpriseName, [ref]$Handle)
{
$AdminService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService")
$InputObj = $AdminService_EPR.CreateMethodInput("AddStorageEaclEntry")
$InputObj.SetProperty("EnterpriseName",$enterpriseName)
$Output = $AdminService_EPR.InvokeMethod($InputObj)
if((-not $Output) -or $Output.GetProperty("ReturnValue").ToString() -ne "0")
{
# Error
return $false
}
$Handle.Value = $Output.GetProperty("Handle").ToString()
return $true
}
function EnumerateEnterprise($Connection)
{
$RetVal = @()
$AdminService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService")
$InputObj = $AdminService_EPR.CreateMethodInput("EnumerateStorageEaclEntries")
$Output = $AdminService_EPR.InvokeMethod($InputObj)
$Handles = $Output.GetProperty("Handles")
foreach($Handle in $Handles)
{
$InputObj = $AdminService_EPR.CreateMethodInput("GetStorageEaclEntry")
$InputObj.SetProperty("Handle",$Handle.ToString())
$OutObj = $AdminService_EPR.InvokeMethod($InputObj)
$RetVal += @($OutObj.GetProperty("EnterpriseName").ToString())
}
return ,$RetVal
}
function DeallocateBlock($Connection, $sessionHandle, $blockHandle)
{
$DataStorageService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObject = $DataStorageService_EPR.CreateMethodInput("DeallocateBlock")
$InputObject.SetProperty("SessionHandle",$sessionHandle)
$InputObject.SetProperty("BlockHandle",$blockHandle)
$OutputObject = $DataStorageService_EPR.InvokeMethod($InputObject)
if($OutputObject.GetProperty("ReturnValue").ToString() -ne "0")
{
return $false
}
else
{
return $true
}
}
function AllocateBlock($Connection, $sessionHandle, $blockName, $blockHidden, [ref]$BlockHandle)
{
$DataStorageService_EPR = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObject = $DataStorageService_EPR.CreateMethodInput("AllocateBlock")
$InputObject.SetProperty("SessionHandle",$sessionHandle)
$InputObject.SetProperty("BytesRequested","4096")
if($blockHidden)
{
$InputObject.SetProperty("BlockHidden","1")
}
else
{
$InputObject.SetProperty("BlockHidden","0")
}
$InputObject.SetProperty("BlockName",$blockName)
$OutputObject = $DataStorageService_EPR.InvokeMethod($InputObject)
if($OutputObject.GetProperty("ReturnValue").ToString() -ne "0")
{
return($false)
}
else
{
$BlockHandle.Value = $OutputObject.GetProperty("BlockHandle").ToString()
return($true)
}
}
function GetUUID()
{
$compname = hostname
$uuid = (Get-WmiObject Win32_ComputerSystemProduct -ComputerName $compname).UUID
$uuid = $uuid.Replace("-","")
return $uuid
}
function RegisterApplication($Connection, $uuid, $vendorName, $appName, $entName, [ref]$SessionHandle)
{
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObj = $objref.CreateMethodInput("RegisterApplication")
$InputObj.SetProperty("CallerUUID", $uuid)
$InputObj.SetProperty("VendorName", $vendorName)
$InputObj.SetProperty("ApplicationName", $appName)
$InputObj.SetProperty("EnterpriseName", $entName)
$OutObj = $objRef.InvokeMethod($InputObj)
if((-not $OutObj) -or $OutObj.GetProperty("ReturnValue").ToString() -ne "0")
{
return($false)
}
else
{
$SessionHandle.Value = $OutObj.GetProperty('SessionHandle').ToString()
return($true)
}
}
function GetApplicationHandle($Connection, $SessionHandle, [ref]$ApplicationHandle)
{
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObj = $objref.CreateMethodInput("GetCurrentApplicationHandle")
$InputObj.SetProperty("SessionHandle", "$SessionHandle")
$OutObj = $objRef.InvokeMethod($InputObj)
if($OutObj.GetProperty("ReturnValue").ToString() -ne "0")
{
return $false
}
else
{
$ApplicationHandle.Value = $OutObj.GetProperty('ApplicationHandle').ToString()
return $true
}
}
function GetAllocatedBlocks($Connection, $SessionHandle, $ApplicationHandle)
{
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObj = $objref.CreateMethodInput("GetAllocatedBlocks")
$InputObj.SetProperty("SessionHandle", "$SessionHandle")
$InputObj.SetProperty("BlockOwnerApplication", "$ApplicationHandle")
$OutObj = $objRef.InvokeMethod($InputObj)
$BlockHandles = $OutObj.GetProperty('BlockHandles')
$blocks = @()
if($BlockHandles.IsArray)
{
for($i=0;$i -lt $BlockHandles.Count;++$i)
{
$blocks = $blocks + @($BlockHandles.Item($i).ToString())
}
}
else
{
if(-not $BlockHandles.IsNull)
{
$blocks = @($BlockHandles.ToString())
}
$blocks = ,$blocks
}
Return $blocks
}
function GetBlockName($Connection, $SessionHandle, $BlockHandle)
{
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObj = $objref.CreateMethodInput("GetBlockAttributes")
$InputObj.SetProperty("SessionHandle", "$SessionHandle")
$InputObj.SetProperty("BlockHandle", "$BlockHandle")
$OutObj = $objRef.InvokeMethod($InputObj)
$BlockName = $OutObj.GetProperty('BlockName').ToString()
$BlockName
}
function ReadBlockRaw($Connection, $SessionHandle, $BlockHandle, $ReadOffset, $ReadLength, [ref]$Bytes)
{
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObj = $objref.CreateMethodInput("ReadBlock")
$InputObj.SetProperty("SessionHandle", "$SessionHandle")
$InputObj.SetProperty("BlockHandle", "$BlockHandle")
$InputObj.SetProperty("ByteOffset", $ReadOffset)
$InputObj.SetProperty("ByteCount", $ReadLength)
$OutObj = $objRef.InvokeMethod($InputObj)
if($OutObj.GetProperty("ReturnValue").ToString() -ne "0")
{
return $false
}
else
{
$Bytes.Value = $OutObj.GetProperty('Data').ToString()
return $true
}
}
function CalculateBase64Length($InputBufferSize)
{
$input_size = $InputBufferSize
$code_size = (($input_size * 4) / 3)
if($input_size % 3 -ne 0)
{
$padding_size = 3 - ($input_size % 3)
}
else
{
$padding_size = 0
}
$total_size = $code_size + $padding_size
return $total_size
}
function CalculateMaxProcessingSize($InputBufferSize, $OutputBufferSizeContraint)
{
do
{
$OutSize = CalculateBase64Length $InputBufferSize
--$InputBufferSize
}while($OutSize -gt $OutputBufferSizeContraint)
return $InputBufferSize + 1
}
function WriteBlockRaw($Connection, $sessionHandle, $blockHandle, $RawBytes, $RawBytesOffset, $RawBytesLength, $start)
{
$encodedData = [System.Convert]::ToBase64String($RawBytes, $RawBytesOffset, $RawBytesLength)
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObj = $objref.CreateMethodInput("WriteBlock")
$InputObj.SetProperty("SessionHandle",$sessionHandle)
$InputObj.SetProperty("BlockHandle",$blockHandle)
$InputObj.SetProperty("ByteOffset",$start.ToString())
$InputObj.SetProperty("Data",$encodedData)
$OutputObj = $objRef.InvokeMethod($InputObj)
if($OutputObj.GetProperty("ReturnValue").ToString() -ne "0")
{
return $false
}
else
{
return $true
}
}
function WriteBlock($Connection, $sessionHandle, $blockHandle, $data, $start)
{
$bytes = [System.Text.Encoding]::UTF8.GetBytes($data)
$Success = WriteBlockRaw $Connection $sessionHandle $blockHandle $bytes 0 $bytes.Length $start
return $Success
}
function WriteBlock_Smart($Connection, $SessionHandle, $BlockName, $CurrentBlockHandle, $BlockHidden, $data)
{
# Read data that is already written in this block
$ReadData = ""
$Success = ReadBlock $Connection $SessionHandle $CurrentBlockHandle ([ref]$ReadData)
if(-not $Success)
{
return $false
}
$WriteString = $ReadData + $data
$rawBytes = [System.Text.Encoding]::UTF8.GetBytes($WriteString)
$Position = 0
$Success = $true
do
{
$WriteLength = CalculateMaxProcessingSize ($rawBytes.Length - $Position) (4095)
$encodedData = [System.Convert]::ToBase64String($rawBytes, $Position, $WriteLength)
$Success = WriteBlockRaw $Connection $SessionHandle $CurrentBlockHandle $rawBytes $Position $WriteLength 0
if(-not $Success)
{
break
}
$Position += $WriteLength
if($Position -lt $rawBytes.Length)
{
# Still have more data to write, so we need to allocate more blocks
$Success = AllocateBlock $Connection $SessionHandle $BlockName $BlockHidden ([ref]$CurrentBlockHandle)
if(-not $Success)
{
break
}
}
} while($Position -lt $rawBytes.Length)
return $Success
}
function ReadBlock($Connection, $SessionHandle, $BlockHandle, [ref]$OutputData)
{
$Bytes = ""
$Success = ReadBlockRaw $Connection $SessionHandle $BlockHandle "0" "4095" ([ref]$Bytes)
if(-not $Success)
{
return $false
}
$DecodedData = [System.Convert]::FromBase64String($Bytes)
foreach ($byte in $DecodedData)
{
if ($byte -ne 255)
{
$tempArray = $tempArray + @($byte)
}
}
if ($tempArray.length -gt 0)
{
$data = [System.Text.Encoding]::UTF8.GetString($tempArray)
}
else
{
$data = ""
}
$OutputData.Value = $data
return $true
}
function UnregisterApplication($Connection, $sessionHandle)
{
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageService")
$InputObj = $objref.CreateMethodInput("UnregisterApplication")
$InputObj.SetProperty("SessionHandle", "$SessionHandle")
$OutObj = $objRef.InvokeMethod($InputObj)
}
function AdminGetRegisteredApplications([ref]$ApplicationHandles)
{
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService")
$InputObj = $objref.CreateMethodInput("AdminGetRegisteredApplications")
$OutObj = $objRef.InvokeMethod($InputObj)
if($OutObj.GetProperty("ReturnValue").ToString() -ne "0")
{
return $false
}
$en = $OutObj.GetProperty('ApplicationHandles')
$ApplicationHandles.Value = @()
if($en.IsArray)
{
For($i=0;$i -lt $en.Count;++$i)
{
$ApplicationHandles.Value += @($en.Item($i).ToString())
}
}
return $true
}
function AdminGetApplicationAttributes($appHandle, [ref]$uuid, [ref]$VendorName, [ref]$ApplicationName, [ref]$EnterpriseName)
{
$objRef = $Connection.NewReference("AMT_ThirdPartyDataStorageAdministrationService")
$InputObj = $objref.CreateMethodInput("AdminGetApplicationAttributes")
$InputObj.SetProperty("Handle", "$appHandle")
$OutObj = $objRef.InvokeMethod($InputObj)
if($OutObj.GetProperty("ReturnValue").ToString() -ne "0")
{
return $false
}
$uuid.Value = $OutObj.GetProperty('UUID').ToString()
$VendorName.Value = $OutObj.GetProperty('VendorName').ToString()
$ApplicationName.Value = $OutObj.GetProperty('ApplicationName').ToString()
$EnterpriseName.Value = $OutObj.GetProperty('EnterpriseName').ToString()
return $true
}
$Results = @()
$Obj = new-object psobject
try
{
#create a connection object
$Connection = New-Object Intel.Management.Wsman.WsmanConnection
if ($Credential.username.Length -gt 0) {
$Connection.SetCredentials($Credential.Username, $Credential.Password)
} elseif ($Username.length -gt 0) {
if ($Password.length -gt 0) {
$passwd = ConvertTo-SecureString $Password -AsPlainText Force
$Connection.SetCredentials($Username, $passwd)
} else {
$Cred = Get-Credential $Username
$Connection.SetCredentials($Cred.Username, $Cred.Password)
}
}
if ($Port.Length -lt 1) {
if ($TLS.IsPresent) {
$Port = 16993;
}
else {
$Port = 16992;
}
}
if($CertificateName.Length -gt 0)
{
$Connection.Options.SetClientCertificateByCertificateName($CertificateName)
}
if($AcceptSelfSignedCert.IsPresent)
{
$Connection.Options.AcceptSelfSignedCertificate=$true;
}
#----------------- Code below this line is specific to each script.
ForEach ($Comp in $ComputerName)
{
$skip = $false
$Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp
$Obj | Add-Member -MemberType noteproperty -Name Port -value $Port
$Obj | Add-Member -MemberType noteproperty -Name Operation -value $Operation
try
{
#Attempt Connection with Client
$Connection.SetHost($Comp, $Port)
#---------------------------------
if($operation -eq "Create" -or $operation -eq "CreateWrite")
{
$H = ""
$MSG = ""
$Success = CreateEnterprise $Connection $Enterprise ([ref]$H)
$Success = CreateApplication $Connection $Vendor $Application
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "CreateApplicationFailed"
continue
}
$uuid = GetUUID
$Success = RegisterApplication $Connection $uuid $Vendor $Application $Enterprise ([ref]$H)
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "RegisterApplicationFailed"
continue
}
$BlockHandle = ""
$Success = AllocateBlock $Connection $H $Block $BlockHidden ([ref]$BlockHandle)
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "AllocateBlockFailed"
continue
}
UnregisterApplication $Connection $H
if($operation -ne "CreateWrite")
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful"
}
}
if($operation -eq "Write" -or $operation -eq "CreateWrite")
{
$CurrentBlock = ""
$SessionHandle = ""
$ApplicationHandle = ""
$uuid = GetUUID
$Success = RegisterApplication $Connection $uuid $Vendor $Application $Enterprise ([ref]$SessionHandle)
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "RegisterApplicationFailed"
continue
}
$Success = GetApplicationHandle $Connection $SessionHandle ([ref]$ApplicationHandle)
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "GetApplicationHandleFailed"
continue
}
$blockHandles = GetAllocatedBlocks $Connection $SessionHandle $ApplicationHandle
if(-not $AppendWrite)
{
$Success = $true
foreach ($tempBlockHandle in $blockHandles)
{
$tempBlockName = GetBlockName $Connection $SessionHandle $tempBlockHandle
if ($tempBlockName -eq $Block)
{
# Delete the Block
$Success = DeallocateBlock $Connection $SessionHandle $tempBlockHandle
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "DeAllocateBlockFailed"
break
}
}
}
if(-not $Success)
{
continue
}
#
# Now that all pre-existing blocks were deleted, let's create a fresh block to write data into
#
$Success = AllocateBlock $Connection $SessionHandle $Block $BlockHidden ([ref]$CurrentBlock)
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "AllocateBlockFailed"
continue
}
$Success = WriteBlock_Smart $Connection $SessionHandle $Block $CurrentBlock $BlockHidden $BlockData
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "WriteFailed"
continue
}
}
else
{
#
# Append Writes, so we need to fetch the last block to write data
#
$CurrentBlock = ""
foreach ($tempBlockHandle in $blockHandles)
{
$tempBlockName = GetBlockName $Connection $SessionHandle $tempBlockHandle
if ($tempBlockName -eq $Block)
{
$CurrentBlock = $tempBlockHandle
}
}
if($CurrentBlock -eq "")
{
$Success = AllocateBlock $Connection $SessionHandle $Block $BlockHidden ([ref]$CurrentBlock)
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "AllocateBlockFailed"
continue
}
}
$Success = WriteBlock_Smart $Connection $SessionHandle $Block $CurrentBlock $BlockHidden $BlockData
if(-not $Success)
{
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "WriteFailed"
continue
}
}
UnregisterApplication $Connection $SessionHandle
$Obj | Add-Member -MemberType noteproperty -Name "Status" -value "Successful"
}
#------------------------------------
} catch {
#Add Member to Object noting failed attempt
$Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $Comp -Force
$Obj | Add-Member -MemberType noteproperty -Name Port -value $Port -Force
$Obj | Add-Member -MemberType noteproperty -Name Operation -value $Operation -Force
$Obj | Add-Member -MemberType noteproperty -Name Status -value "ExceptionThrown" -Force
$Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message -Force
}
}
#Append to Result
if(-not $skip)
{
$Results += $Obj
}
}
catch
{
#Add Member to Object noting failed attempt
$Obj | Add-Member -MemberType noteproperty -Name ComputerName -value $ComputerName -Force
$Obj | Add-Member -MemberType noteproperty -Name Port -value $Port -Force
$Obj | Add-Member -MemberType noteproperty -Name Operation -value $Operation -Force
$Obj | Add-Member -MemberType noteproperty -Name Status -value "ExceptionThrown" -Force
$Obj | Add-Member -MemberType noteproperty -Name Reason -value $_.Exception.Message -Force
$Results += $Obj
}
# Set back to false for the next cmdlet, if PS is still open
$Connection.Options.AcceptSelfSignedCertificate=$false;
Write-Output $Results
}
}
# SIG # Begin signature block
# MIItjAYJKoZIhvcNAQcCoIItfTCCLXkCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB2T62WylvoLdDi
# Er8XkF93vts+bamoqdxenWTtkLIQ4aCCEX4wggVvMIIEV6ADAgECAhBI/JO0YFWU
# jTanyYqJ1pQWMA0GCSqGSIb3DQEBDAUAMHsxCzAJBgNVBAYTAkdCMRswGQYDVQQI
# DBJHcmVhdGVyIE1hbmNoZXN0ZXIxEDAOBgNVBAcMB1NhbGZvcmQxGjAYBgNVBAoM
# EUNvbW9kbyBDQSBMaW1pdGVkMSEwHwYDVQQDDBhBQUEgQ2VydGlmaWNhdGUgU2Vy
# dmljZXMwHhcNMjEwNTI1MDAwMDAwWhcNMjgxMjMxMjM1OTU5WjBWMQswCQYDVQQG
# EwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMS0wKwYDVQQDEyRTZWN0aWdv
# IFB1YmxpYyBDb2RlIFNpZ25pbmcgUm9vdCBSNDYwggIiMA0GCSqGSIb3DQEBAQUA
# A4ICDwAwggIKAoICAQCN55QSIgQkdC7/FiMCkoq2rjaFrEfUI5ErPtx94jGgUW+s
# hJHjUoq14pbe0IdjJImK/+8Skzt9u7aKvb0Ffyeba2XTpQxpsbxJOZrxbW6q5KCD
# J9qaDStQ6Utbs7hkNqR+Sj2pcaths3OzPAsM79szV+W+NDfjlxtd/R8SPYIDdub7
# P2bSlDFp+m2zNKzBenjcklDyZMeqLQSrw2rq4C+np9xu1+j/2iGrQL+57g2extme
# me/G3h+pDHazJyCh1rr9gOcB0u/rgimVcI3/uxXP/tEPNqIuTzKQdEZrRzUTdwUz
# T2MuuC3hv2WnBGsY2HH6zAjybYmZELGt2z4s5KoYsMYHAXVn3m3pY2MeNn9pib6q
# RT5uWl+PoVvLnTCGMOgDs0DGDQ84zWeoU4j6uDBl+m/H5x2xg3RpPqzEaDux5mcz
# mrYI4IAFSEDu9oJkRqj1c7AGlfJsZZ+/VVscnFcax3hGfHCqlBuCF6yH6bbJDoEc
# QNYWFyn8XJwYK+pF9e+91WdPKF4F7pBMeufG9ND8+s0+MkYTIDaKBOq3qgdGnA2T
# OglmmVhcKaO5DKYwODzQRjY1fJy67sPV+Qp2+n4FG0DKkjXp1XrRtX8ArqmQqsV/
# AZwQsRb8zG4Y3G9i/qZQp7h7uJ0VP/4gDHXIIloTlRmQAOka1cKG8eOO7F/05QID
# AQABo4IBEjCCAQ4wHwYDVR0jBBgwFoAUoBEKIz6W8Qfs4q8p74Klf9AwpLQwHQYD
# VR0OBBYEFDLrkpr/NZZILyhAQnAgNpFcF4XmMA4GA1UdDwEB/wQEAwIBhjAPBgNV
# HRMBAf8EBTADAQH/MBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsGA1UdIAQUMBIwBgYE
# VR0gADAIBgZngQwBBAEwQwYDVR0fBDwwOjA4oDagNIYyaHR0cDovL2NybC5jb21v
# ZG9jYS5jb20vQUFBQ2VydGlmaWNhdGVTZXJ2aWNlcy5jcmwwNAYIKwYBBQUHAQEE
# KDAmMCQGCCsGAQUFBzABhhhodHRwOi8vb2NzcC5jb21vZG9jYS5jb20wDQYJKoZI
# hvcNAQEMBQADggEBABK/oe+LdJqYRLhpRrWrJAoMpIpnuDqBv0WKfVIHqI0fTiGF
# OaNrXi0ghr8QuK55O1PNtPvYRL4G2VxjZ9RAFodEhnIq1jIV9RKDwvnhXRFAZ/ZC
# J3LFI+ICOBpMIOLbAffNRk8monxmwFE2tokCVMf8WPtsAO7+mKYulaEMUykfb9gZ
# pk+e96wJ6l2CxouvgKe9gUhShDHaMuwV5KZMPWw5c9QLhTkg4IUaaOGnSDip0TYl
# d8GNGRbFiExmfS9jzpjoad+sPKhdnckcW67Y8y90z7h+9teDnRGWYpquRRPaf9xH
# +9/DUp/mBlXpnYzyOmJRvOwkDynUWICE5EV7WtgwggXpMIIEUaADAgECAhEA/lzU
# lQGKZRek0E74e2uTOjANBgkqhkiG9w0BAQwFADBUMQswCQYDVQQGEwJHQjEYMBYG
# A1UEChMPU2VjdGlnbyBMaW1pdGVkMSswKQYDVQQDEyJTZWN0aWdvIFB1YmxpYyBD
# b2RlIFNpZ25pbmcgQ0EgUjM2MB4XDTI0MDMxMzAwMDAwMFoXDTI1MDMxMzIzNTk1
# OVowWjELMAkGA1UEBhMCVVMxEzARBgNVBAgMCkNhbGlmb3JuaWExGjAYBgNVBAoM
# EUludGVsIENvcnBvcmF0aW9uMRowGAYDVQQDDBFJbnRlbCBDb3Jwb3JhdGlvbjCC
# AaIwDQYJKoZIhvcNAQEBBQADggGPADCCAYoCggGBAI69Cz15squYBdM5ZXnjFBNn
# vqzI4WUgaQ/PjBKog2t/IkSByXK+3K1m4CwQtTgqpMCD193E3A/xDHmWVEvpCKUB
# +xc8c/8FE6TymrIKA/0UH7jVesLgCo0AxfM0dkcqrvLKvnchseekdaM2b+E41NSj
# AhhWgGp1LoTZyrAOJNpGsPIfgA/0+J6RCECh9BARbXCRXAnzTuPtWDXfKlOwSa4+
# o2tJM7TPNALTJSLHoZbvfUOpgOh+0lWx49himoW6lfDt5cZDPOT8wNwpd5DWwB8M
# hzLfNEpbvR/85s8SP/dWRrAVkSRxS1wqIZa9OsxD+rjBBIe8JDR1Y9hjGBUKybMA
# Y30Pp8rDpFeH1Ya1A8gNeae8KRSlacroyoxhRviL9n8nCZIhiqL6Q0Qu9cJGwlYi
# L9mAMRyVPI3BHf0s6r6BRqt8yBYP/2dsgc4z9YV9DGJUaKz2kjwud1OJZupFDZio
# +shzbO/h78iJSQiMVHgMVFEVOZFERE3dVSEFsWdPAwIDAQABo4IBrjCCAaowHwYD
# VR0jBBgwFoAUDyrLIIcouOxvSK4rVKYpqhekzQwwHQYDVR0OBBYEFCjtPWp/OnUU
# 51aXAiBwcQ/gvYfGMA4GA1UdDwEB/wQEAwIHgDAMBgNVHRMBAf8EAjAAMBMGA1Ud
# JQQMMAoGCCsGAQUFBwMDMEoGA1UdIARDMEEwNQYMKwYBBAGyMQECAQMCMCUwIwYI
# KwYBBQUHAgEWF2h0dHBzOi8vc2VjdGlnby5jb20vQ1BTMAgGBmeBDAEEATBJBgNV
# HR8EQjBAMD6gPKA6hjhodHRwOi8vY3JsLnNlY3RpZ28uY29tL1NlY3RpZ29QdWJs
# aWNDb2RlU2lnbmluZ0NBUjM2LmNybDB5BggrBgEFBQcBAQRtMGswRAYIKwYBBQUH
# MAKGOGh0dHA6Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWdu
# aW5nQ0FSMzYuY3J0MCMGCCsGAQUFBzABhhdodHRwOi8vb2NzcC5zZWN0aWdvLmNv
# bTAjBgNVHREEHDAagRhwa2llbmdpbmVlcmluZ0BpbnRlbC5jb20wDQYJKoZIhvcN
# AQEMBQADggGBAB01WGV1cWjtTCQGkNtDRpmS08NuUis1F2+0cwIrk2dY8tXKiZ5R
# supkBKWfpjNSHdW79DvVCotBbyRYUdDSeFkQ8jRPm+vlzyFhRWuW4qSYcIlx6qia
# pGZEFsvmEEXMnwG9zEEeKsYlnM/ZSI23uLZCXyhJx35G2PpBr3tMym6gIvta5Dml
# 4S/XEJJI/ZvIKhPO5QUemCS07S9QN7SOKeEkk1LdV1ccCBNtRpAzmGVr4iYS4pbV
# r8yishYe25TSAPeWEy9PYEMnjZbQQS8lD8XFB6gfiTJLFCCzIKsHzMIk+FuJlwVl
# q4ec/Wrx0+fpVeo2SPJZI/iE82gtD5oywotprC47MdvVlcvbePYnHoJqqRtnhX+E
# 6jlGRtnhUCPV+BsRScp4v8DIUJGdV5AzS5rYu3YhJGDJgTgPGvBtmvaPeJtxcKzX
# UnMpPtanuJgW3o1ucSo9SKb9dNqFcLcOUVD2lDjh85Z0anJom924xhVm4cGNWSF7
# az8cVA6zH/Rc6DCCBhowggQCoAMCAQICEGIdbQxSAZ47kHkVIIkhHAowDQYJKoZI
# hvcNAQEMBQAwVjELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRl
# ZDEtMCsGA1UEAxMkU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIFJvb3QgUjQ2
# MB4XDTIxMDMyMjAwMDAwMFoXDTM2MDMyMTIzNTk1OVowVDELMAkGA1UEBhMCR0Ix
# GDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDErMCkGA1UEAxMiU2VjdGlnbyBQdWJs
# aWMgQ29kZSBTaWduaW5nIENBIFIzNjCCAaIwDQYJKoZIhvcNAQEBBQADggGPADCC
# AYoCggGBAJsrnVP6NT+OYAZDasDP9X/2yFNTGMjO02x+/FgHlRd5ZTMLER4ARkZs
# Q3hAyAKwktlQqFZOGP/I+rLSJJmFeRno+DYDY1UOAWKA4xjMHY4qF2p9YZWhhbeF
# pPb09JNqFiTCYy/Rv/zedt4QJuIxeFI61tqb7/foXT1/LW2wHyN79FXSYiTxcv+1
# 8Irpw+5gcTbXnDOsrSHVJYdPE9s+5iRF2Q/TlnCZGZOcA7n9qudjzeN43OE/TpKF
# 2dGq1mVXn37zK/4oiETkgsyqA5lgAQ0c1f1IkOb6rGnhWqkHcxX+HnfKXjVodTmm
# V52L2UIFsf0l4iQ0UgKJUc2RGarhOnG3B++OxR53LPys3J9AnL9o6zlviz5pzsgf
# rQH4lrtNUz4Qq/Va5MbBwuahTcWk4UxuY+PynPjgw9nV/35gRAhC3L81B3/bIaBb
# 659+Vxn9kT2jUztrkmep/aLb+4xJbKZHyvahAEx2XKHafkeKtjiMqcUf/2BG935A
# 591GsllvWwIDAQABo4IBZDCCAWAwHwYDVR0jBBgwFoAUMuuSmv81lkgvKEBCcCA2
# kVwXheYwHQYDVR0OBBYEFA8qyyCHKLjsb0iuK1SmKaoXpM0MMA4GA1UdDwEB/wQE
# AwIBhjASBgNVHRMBAf8ECDAGAQH/AgEAMBMGA1UdJQQMMAoGCCsGAQUFBwMDMBsG
# A1UdIAQUMBIwBgYEVR0gADAIBgZngQwBBAEwSwYDVR0fBEQwQjBAoD6gPIY6aHR0
# cDovL2NybC5zZWN0aWdvLmNvbS9TZWN0aWdvUHVibGljQ29kZVNpZ25pbmdSb290
# UjQ2LmNybDB7BggrBgEFBQcBAQRvMG0wRgYIKwYBBQUHMAKGOmh0dHA6Ly9jcnQu
# c2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY0NvZGVTaWduaW5nUm9vdFI0Ni5wN2Mw
# IwYIKwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEB
# DAUAA4ICAQAG/4Lhd2M2bnuhFSCbE/8E/ph1RGHDVpVx0ZE/haHrQECxyNbgcv2F
# ymQ5PPmNS6Dah66dtgCjBsULYAor5wxxcgEPRl05pZOzI3IEGwwsepp+8iGsLKaV
# pL3z5CmgELIqmk/Q5zFgR1TSGmxqoEEhk60FqONzDn7D8p4W89h8sX+V1imaUb69
# 3TGqWp3T32IKGfIgy9jkd7GM7YCa2xulWfQ6E1xZtYNEX/ewGnp9ZeHPsNwwviJM
# BZL4xVd40uPWUnOJUoSiugaz0yWLODRtQxs5qU6E58KKmfHwJotl5WZ7nIQuDT0m
# WjwEx7zSM7fs9Tx6N+Q/3+49qTtUvAQsrEAxwmzOTJ6Jp6uWmHCgrHW4dHM3ITpv
# G5Ipy62KyqYovk5O6cC+040Si15KJpuQ9VJnbPvqYqfMB9nEKX/d2rd1Q3DiuDex
# MKCCQdJGpOqUsxLuCOuFOoGbO7Uv3RjUpY39jkkp0a+yls6tN85fJe+Y8voTnbPU
# 1knpy24wUFBkfenBa+pRFHwCBB1QtS+vGNRhsceP3kSPNrrfN2sRzFYsNfrFaWz8
# YOdU254qNZQfd9O/VjxZ2Gjr3xgANHtM3HxfzPYF6/pKK8EE4dj66qKKtm2DTL1K
# FCg/OYJyfrdLJq1q2/HXntgr2GVw+ZWhrWgMTn8v1SjZsLlrgIfZHDGCG2Qwghtg
# AgEBMGkwVDELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDEr
# MCkGA1UEAxMiU2VjdGlnbyBQdWJsaWMgQ29kZSBTaWduaW5nIENBIFIzNgIRAP5c
# 1JUBimUXpNBO+HtrkzowDQYJYIZIAWUDBAIBBQCgfDAQBgorBgEEAYI3AgEMMQIw
# ADAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgorBgEEAYI3AgELMQ4wDAYK
# KwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgOfqIoJm2bJ49298CmCkzGPqW8Jhx
# UXErtQIJ5ob3EbEwDQYJKoZIhvcNAQEBBQAEggGAduwwr52q+OBjnqhTAHrTNJMk
# Y3dZlEvFXopYiVPeFIVRDmSWrfEpSfEQSkJB7W96uRX2t5IcMRBw26FSmi6peWdu
# 6ngKdneeqA7cW6jI53Zoun5LgR57C4QuTJdW+WVtQ1W2xSbap05aAElMDXVdCCaE
# 4YhE0kjIyOxkbu9dTKdSc1/LkttSenY6yb+mRImH4HeeeY42G2UcZKtx839ENqfr
# 4C707bC5dBuZ5x4TByiom1ff3ZwEP2k0lvPKb9uyUtTTCc3SLGEhr1w9UBB5/Onv
# +D5ovdm2XGLzQ5y6q7EKN2AuixEh+K7bg4Np97xMN6fvB//9GNqwl9iDxnf3w+Xh
# tfCT4mJfFWf9Nu9FFuh4/qq+hAeutrYRBWKH3dGxF5igtcMTDaepCUOCGR4v1eYt
# Fv1un5hOVGEBYMjbtcri1A4hTyFNkwnxHeW7fEbzVSELvOM+jt9rhnbIC7f8R6OP
# vDXGuYn0dqFNPFsYLajDx8+NRNOoVLNUOuOPwRGvoYIYzjCCGMoGCisGAQQBgjcD
# AwExghi6MIIYtgYJKoZIhvcNAQcCoIIYpzCCGKMCAQMxDzANBglghkgBZQMEAgIF
# ADCB9AYLKoZIhvcNAQkQAQSggeQEgeEwgd4CAQEGCisGAQQBsjECAQEwMTANBglg
# hkgBZQMEAgEFAAQg7GUQt3S1sPfCGQgBhkDZIEcZQWCvQgjkGGUNIsaQR0QCFQDc
# e0IvJPEuhXYnvtl7P+WMn8npuBgPMjAyNTAxMjcxOTAzMDVaoHKkcDBuMQswCQYD
# VQQGEwJHQjETMBEGA1UECBMKTWFuY2hlc3RlcjEYMBYGA1UEChMPU2VjdGlnbyBM
# aW1pdGVkMTAwLgYDVQQDEydTZWN0aWdvIFB1YmxpYyBUaW1lIFN0YW1waW5nIFNp
# Z25lciBSMzWgghL/MIIGXTCCBMWgAwIBAgIQOlJqLITOVeYdZfzMEtjpiTANBgkq
# hkiG9w0BAQwFADBVMQswCQYDVQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1p
# dGVkMSwwKgYDVQQDEyNTZWN0aWdvIFB1YmxpYyBUaW1lIFN0YW1waW5nIENBIFIz
# NjAeFw0yNDAxMTUwMDAwMDBaFw0zNTA0MTQyMzU5NTlaMG4xCzAJBgNVBAYTAkdC
# MRMwEQYDVQQIEwpNYW5jaGVzdGVyMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQx
# MDAuBgNVBAMTJ1NlY3RpZ28gUHVibGljIFRpbWUgU3RhbXBpbmcgU2lnbmVyIFIz
# NTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAI3RZ/TBSJu9/ThJOk1h
# gZvD2NxFpWEENo0GnuOYloD11BlbmKCGtcY0xiMrsN7LlEgcyoshtP3P2J/vneZh
# uiMmspY7hk/Q3l0FPZPBllo9vwT6GpoNnxXLZz7HU2ITBsTNOs9fhbdAWr/Mm8MN
# tYov32osvjYYlDNfefnBajrQqSV8Wf5ZvbaY5lZhKqQJUaXxpi4TXZKohLgxU7g9
# RrFd477j7jxilCU2ptz+d1OCzNFAsXgyPEM+NEMPUz2q+ktNlxMZXPF9WLIhOhE3
# E8/oNSJkNTqhcBGsbDI/1qCU9fBhuSojZ0u5/1+IjMG6AINyI6XLxM8OAGQmaMB8
# gs2IZxUTOD7jTFR2HE1xoL7qvSO4+JHtvNceHu//dGeVm5Pdkay3Et+YTt9EwAXB
# sd0PPmC0cuqNJNcOI0XnwjE+2+Zk8bauVz5ir7YHz7mlj5Bmf7W8SJ8jQwO2IDoH
# HFC46ePg+eoNors0QrC0PWnOgDeMkW6gmLBtq3CEOSDU8iNicwNsNb7ABz0W1E3q
# lSw7jTmNoGCKCgVkLD2FaMs2qAVVOjuUxvmtWMn1pIFVUvZ1yrPIVbYt1aTld2nr
# mh544Auh3tgggy/WluoLXlHtAJgvFwrVsKXj8ekFt0TmaPL0lHvQEe5jHbufhc05
# lvCtdwbfBl/2ARSTuy1s8CgFAgMBAAGjggGOMIIBijAfBgNVHSMEGDAWgBRfWO1M
# MXqiYUKNUoC6s2GXGaIymzAdBgNVHQ4EFgQUaO+kMklptlI4HepDOSz0FGqeDIUw
# DgYDVR0PAQH/BAQDAgbAMAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYB
# BQUHAwgwSgYDVR0gBEMwQTA1BgwrBgEEAbIxAQIBAwgwJTAjBggrBgEFBQcCARYX
# aHR0cHM6Ly9zZWN0aWdvLmNvbS9DUFMwCAYGZ4EMAQQCMEoGA1UdHwRDMEEwP6A9
# oDuGOWh0dHA6Ly9jcmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY1RpbWVTdGFt
# cGluZ0NBUjM2LmNybDB6BggrBgEFBQcBAQRuMGwwRQYIKwYBBQUHMAKGOWh0dHA6
# Ly9jcnQuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY1RpbWVTdGFtcGluZ0NBUjM2
# LmNydDAjBggrBgEFBQcwAYYXaHR0cDovL29jc3Auc2VjdGlnby5jb20wDQYJKoZI
# hvcNAQEMBQADggGBALDcLsn6TzZMii/2yU/V7xhPH58Oxr/+EnrZjpIyvYTz2u/z
# bL+fzB7lbrPml8ERajOVbudan6x08J1RMXD9hByq+yEfpv1G+z2pmnln5XucfA9M
# fzLMrCArNNMbUjVcRcsAr18eeZeloN5V4jwrovDeLOdZl0tB7fOX5F6N2rmXaNTu
# JR8yS2F+EWaL5VVg+RH8FelXtRvVDLJZ5uqSNIckdGa/eUFhtDKTTz9LtOUh46v2
# JD5Q3nt8mDhAjTKp2fo/KJ6FLWdKAvApGzjpPwDqFeJKf+kJdoBKd2zQuwzk5Wgp
# h9uA46VYK8p/BTJJahKCuGdyKFIFfEfakC4NXa+vwY4IRp49lzQPLo7WticqMaaq
# b8hE2QmCFIyLOvWIg4837bd+60FcCGbHwmL/g1ObIf0rRS9ceK4DY9rfBnHFH2v1
# d4hRVvZXyCVlrL7ZQuVzjjkLMK9VJlXTVkHpuC8K5S4HHTv2AJx6mOdkMJwS4gLl
# J7gXrIVpnxG+aIniGDCCBhQwggP8oAMCAQICEHojrtpTaZYPkcg+XPTH4z8wDQYJ
# KoZIhvcNAQEMBQAwVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28gTGlt
# aXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgVGltZSBTdGFtcGluZyBSb290
# IFI0NjAeFw0yMTAzMjIwMDAwMDBaFw0zNjAzMjEyMzU5NTlaMFUxCzAJBgNVBAYT
# AkdCMRgwFgYDVQQKEw9TZWN0aWdvIExpbWl0ZWQxLDAqBgNVBAMTI1NlY3RpZ28g
# UHVibGljIFRpbWUgU3RhbXBpbmcgQ0EgUjM2MIIBojANBgkqhkiG9w0BAQEFAAOC
# AY8AMIIBigKCAYEAzZjYQ0GrboIr7PYzfiY05ImM0+8iEoBUPu8mr4wOgYPjoiIz
# 5vzf7d5wu8GFK1JWN5hciN9rdqOhbdxLcSVwnOTJmUGfAMQm4eXOls3iQwfapEFW
# uOsYmBKXPNSpwZAFoLGl5y1EaGGc5LByM8wjcbSF52/Z42YaJRsPXY545E3QAPN2
# mxDh0OLozhiGgYT1xtjXVfEzYBVmfQaI5QL35cTTAjsJAp85R+KAsOfuL9Z7LFnj
# dcuPkZWjssMETFIueH69rxbFOUD64G+rUo7xFIdRAuDNvWBsv0iGDPGaR2nZlY24
# tz5fISYk1sPY4gir99aXAGnoo0vX3Okew4MsiyBn5ZnUDMKzUcQrpVavGacrIkmD
# Yu/bcOUR1mVBIZ0X7P4bKf38JF7Mp7tY3LFF/h7hvBS2tgTYXlD7TnIMPrxyXCfB
# 5yQq3FFoXRXM3/DvqQ4shoVWF/mwwz9xoRku05iphp22fTfjKRIVpm4gFT24JKsp
# EpM8mFa9eTgKWWCvAgMBAAGjggFcMIIBWDAfBgNVHSMEGDAWgBT2d2rdP/0BE/8W
# oWyCAi/QCj0UJTAdBgNVHQ4EFgQUX1jtTDF6omFCjVKAurNhlxmiMpswDgYDVR0P
# AQH/BAQDAgGGMBIGA1UdEwEB/wQIMAYBAf8CAQAwEwYDVR0lBAwwCgYIKwYBBQUH
# AwgwEQYDVR0gBAowCDAGBgRVHSAAMEwGA1UdHwRFMEMwQaA/oD2GO2h0dHA6Ly9j
# cmwuc2VjdGlnby5jb20vU2VjdGlnb1B1YmxpY1RpbWVTdGFtcGluZ1Jvb3RSNDYu
# Y3JsMHwGCCsGAQUFBwEBBHAwbjBHBggrBgEFBQcwAoY7aHR0cDovL2NydC5zZWN0
# aWdvLmNvbS9TZWN0aWdvUHVibGljVGltZVN0YW1waW5nUm9vdFI0Ni5wN2MwIwYI
# KwYBBQUHMAGGF2h0dHA6Ly9vY3NwLnNlY3RpZ28uY29tMA0GCSqGSIb3DQEBDAUA
# A4ICAQAS13sgrQ41WAyegR0lWP1MLWd0r8diJiH2VVRpxqFGhnZbaF+IQ7JATGce
# TWOS+kgnMAzGYRzpm8jIcjlSQ8JtcqymKhgx1s6cFZBSfvfeoyigF8iCGlH+SVSo
# 3HHr98NepjSFJTU5KSRKK+3nVSWYkSVQgJlgGh3MPcz9IWN4I/n1qfDGzqHCPWZ+
# /Mb5vVyhgaeqxLPbBIqv6cM74Nvyo1xNsllECJJrOvsrJQkajVz4xJwZ8blAdX5u
# mzwFfk7K/0K3fpjgiXpqNOpXaJ+KSRW0HdE0FSDC7+ZKJJSJx78mn+rwEyT+A3z7
# Ss0gT5CpTrcmhUwIw9jbvnYuYRKxFVWjKklW3z83epDVzoWJttxFpujdrNmRwh1Y
# ZVIB2guAAjEQoF42H0BA7WBCueHVMDyV1e4nM9K4As7PVSNvQ8LI1WRaTuGSFUd9
# y8F8jw22BZC6mJoB40d7SlZIYfaildlgpgbgtu6SDsek2L8qomG57Yp5qTqof0Dw
# J4Q4HsShvRl/59T4IJBovRwmqWafH0cIPEX7cEttS5+tXrgRtMjjTOp6A9l0D6xc
# KZtxnLqiTH9KPCy6xZEi0UDcMTww5Fl4VvoGbMG2oonuX3f1tsoHLaO/Fwkj3xVr
# 3lDkmeUqivebQTvGkx5hGuJaSVQ+x60xJ/Y29RBr8Tm9XJ59AjCCBoIwggRqoAMC
# AQICEDbCsL18Gzrno7PdNsvJdWgwDQYJKoZIhvcNAQEMBQAwgYgxCzAJBgNVBAYT
# AlVTMRMwEQYDVQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEe
# MBwGA1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1
# c3QgUlNBIENlcnRpZmljYXRpb24gQXV0aG9yaXR5MB4XDTIxMDMyMjAwMDAwMFoX
# DTM4MDExODIzNTk1OVowVzELMAkGA1UEBhMCR0IxGDAWBgNVBAoTD1NlY3RpZ28g
# TGltaXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQdWJsaWMgVGltZSBTdGFtcGluZyBS
# b290IFI0NjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAIid2LlFZ50d
# 3ei5JoGaVFTAfEkFm8xaFQ/ZlBBEtEFAgXcUmanU5HYsyAhTXiDQkiUvpVdYqZ1u
# YoZEMgtHES1l1Cc6HaqZzEbOOp6YiTx63ywTon434aXVydmhx7Dx4IBrAou7hNGs
# KioIBPy5GMN7KmgYmuu4f92sKKjbxqohUSfjk1mJlAjthgF7Hjx4vvyVDQGsd5Ka
# rLW5d73E3ThobSkob2SL48LpUR/O627pDchxll+bTSv1gASn/hp6IuHJorEu6Eop
# oB1CNFp/+HpTXeNARXUmdRMKbnXWflq+/g36NJXB35ZvxQw6zid61qmrlD/IbKJA
# 6COw/8lFSPQwBP1ityZdwuCysCKZ9ZjczMqbUcLFyq6KdOpuzVDR3ZUwxDKL1wCA
# xgL2Mpz7eZbrb/JWXiOcNzDpQsmwGQ6Stw8tTCqPumhLRPb7YkzM8/6NnWH3T9Cl
# mcGSF22LEyJYNWCHrQqYubNeKolzqUbCqhSqmr/UdUeb49zYHr7ALL8bAJyPDmub
# NqMtuaobKASBqP84uhqcRY/pjnYd+V5/dcu9ieERjiRKKsxCG1t6tG9oj7liwPdd
# XEcYGOUiWLm742st50jGwTzxbMpepmOP1mLnJskvZaN5e45NuzAHteORlsSuDt5t
# 4BBRCJL+5EZnnw0ezntk9R8QJyAkL6/bAgMBAAGjggEWMIIBEjAfBgNVHSMEGDAW
# gBRTeb9aqitKz1SA4dibwJ3ysgNmyzAdBgNVHQ4EFgQU9ndq3T/9ARP/FqFsggIv
# 0Ao9FCUwDgYDVR0PAQH/BAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wEwYDVR0lBAww
# CgYIKwYBBQUHAwgwEQYDVR0gBAowCDAGBgRVHSAAMFAGA1UdHwRJMEcwRaBDoEGG
# P2h0dHA6Ly9jcmwudXNlcnRydXN0LmNvbS9VU0VSVHJ1c3RSU0FDZXJ0aWZpY2F0
# aW9uQXV0aG9yaXR5LmNybDA1BggrBgEFBQcBAQQpMCcwJQYIKwYBBQUHMAGGGWh0
# dHA6Ly9vY3NwLnVzZXJ0cnVzdC5jb20wDQYJKoZIhvcNAQEMBQADggIBAA6+ZUHt
# aES45aHF1BGH5Lc7JYzrftrIF5Ht2PFDxKKFOct/awAEWgHQMVHol9ZLSyd/pYMb
# aC0IZ+XBW9xhdkkmUV/KbUOiL7g98M/yzRyqUOZ1/IY7Ay0YbMniIibJrPcgFp73
# WDnRDKtVutShPSZQZAdtFwXnuiWl8eFARK3PmLqEm9UsVX+55DbVIz33Mbhba0HU
# TEYv3yJ1fwKGxPBsP/MgTECimh7eXomvMm0/GPxX2uhwCcs/YLxDnBdVVlxvDjHj
# O1cuwbOpkiJGHmLXXVNbsdXUC2xBrq9fLrfe8IBsA4hopwsCj8hTuwKXJlSTrZcP
# RVSccP5i9U28gZ7OMzoJGlxZ5384OKm0r568Mo9TYrqzKeKZgFo0fj2/0iHbj55h
# c20jfxvK3mQi+H7xpbzxZOFGm/yVQkpo+ffv5gdhp+hv1GDsvJOtJinJmgGbBFZI
# ThbqI+MHvAmMmkfb3fTxmSkop2mSJL1Y2x/955S29Gu0gSJIkc3z30vU/iXrMpWx
# 2tS7UVfVP+5tKuzGtgkP7d/doqDrLF1u6Ci3TpjAZdeLLlRQZm867eVeXED58LXd
# 1Dk6UvaAhvmWYXoiLz4JA5gPBcz7J311uahxCweNxE+xxxR3kT0WKzASo5G/PyDe
# z6NHdIUKBeE3jDPs2ACc6CkJ1Sji4PKWVT0/MYIEkTCCBI0CAQEwaTBVMQswCQYD
# VQQGEwJHQjEYMBYGA1UEChMPU2VjdGlnbyBMaW1pdGVkMSwwKgYDVQQDEyNTZWN0
# aWdvIFB1YmxpYyBUaW1lIFN0YW1waW5nIENBIFIzNgIQOlJqLITOVeYdZfzMEtjp
# iTANBglghkgBZQMEAgIFAKCCAfkwGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE
# MBwGCSqGSIb3DQEJBTEPFw0yNTAxMjcxOTAzMDVaMD8GCSqGSIb3DQEJBDEyBDA2
# jhkkA+c96GWkfSryceQm/Qz3gtsDZyrGhtbKE7Oy62PgtLaBkcjodQmo5+3OuqEw
# ggF6BgsqhkiG9w0BCRACDDGCAWkwggFlMIIBYTAWBBT4YJgZpvuILPfoUpfyoRlS
# GhZ3XzCBhwQUxq5U5HiG8Xw9VRJIjGnDSnr5wt0wbzBbpFkwVzELMAkGA1UEBhMC
# R0IxGDAWBgNVBAoTD1NlY3RpZ28gTGltaXRlZDEuMCwGA1UEAxMlU2VjdGlnbyBQ
# dWJsaWMgVGltZSBTdGFtcGluZyBSb290IFI0NgIQeiOu2lNplg+RyD5c9MfjPzCB
# vAQUhT1jLZOCgmF80JA1xJHeksFC2scwgaMwgY6kgYswgYgxCzAJBgNVBAYTAlVT
# MRMwEQYDVQQIEwpOZXcgSmVyc2V5MRQwEgYDVQQHEwtKZXJzZXkgQ2l0eTEeMBwG
# A1UEChMVVGhlIFVTRVJUUlVTVCBOZXR3b3JrMS4wLAYDVQQDEyVVU0VSVHJ1c3Qg
# UlNBIENlcnRpZmljYXRpb24gQXV0aG9yaXR5AhA2wrC9fBs656Oz3TbLyXVoMA0G
# CSqGSIb3DQEBAQUABIICAAxlEyK6UwXK63aZvJxBVaravyZKTj2OJ9QI3/XvSFuS
# tFVnGboZ4xWPRiK+3SUPZbG3AbR9BiQr6K5X2bJOdlGo7AOPr11Wf+z5PKZOZXTf
# 5AVPemNZ4APxgEajRwj4MXX+PyAYtEdprfvLLJXiXF6s4bZ5oLnGOMd777w5UFnI
# gyXSyb5Xg6tnysNSxGuSKEl8eYXA2DO39Ou2M5B3bzcrzHCqZ9XxtYzwm0MpkQZM
# uZ2ajlcOu5y4mvR04X8cheHX82dggcixvmCoXVKQ68OV2g3QeqrmVvUJ7Z+KkieJ
# XNFGquQ2/Z4Q7jiKM5+vnrh4gE3BszDKHpJPkLsD6mEkW94PLI/f1MQTU5tETJM+
# ZUgccsUks3Nmif7Wz7g02I4AZMA9rX9AiJREicwrOTeAb4Zit5DFrJyr9D32GV/0
# dB4YxSSo1Qi1bVKc4PVM60cbNwuHFMEC3c6oxX5M7+WiohJAsHdTGGxucOmtcKo6
# ss2p+eM2ACdjrx2Jb5ecbCCIXtVyRV4hYsYpZuNIYnfr1PD5CSGDL6iFnSTqsR5Z
# tljedWe0d1PUIKIqw7bUDYXUmsUOvgSmBZU3+IKCn+Tau3MiY0NKcnP3gnmk5CM1
# BRtxiTXjymFRyckql0Z+o4nYpNmatDjNLeFBdPquQoU9A2GGdOsL+O40gphDgXTD
# SIG # End signature block