You cannot select more than 25 topics
			Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
		
		
		
		
		
			
		
			
				
	
	
		
			394 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			TypeScript
		
	
			
		
		
	
	
			394 lines
		
	
	
		
			15 KiB
		
	
	
	
		
			TypeScript
		
	
| import { Constants } from '../..';
 | |
| import { default as insecureNodeFetch } from 'node-fetch';
 | |
| import https from 'https';
 | |
| import _ from 'lodash';
 | |
| 
 | |
| import tls from 'tls';
 | |
| import { sha256 } from '../../crypto';
 | |
| import pRetry from 'p-retry';
 | |
| import { SeedNodeAPI } from '.';
 | |
| import { allowOnlyOneAtATime } from '../../utils/Promise';
 | |
| import { APPLICATION_JSON } from '../../../types/MIME';
 | |
| import { isLinux } from '../../../OS';
 | |
| import { Snode } from '../../../data/data';
 | |
| 
 | |
| // tslint:disable: function-name
 | |
| 
 | |
| /**
 | |
|  * Fetch all snodes from seed nodes.
 | |
|  * Exported only for tests. This is not to be used by the app directly
 | |
|  * @param seedNodes the seednodes to use to fetch snodes details
 | |
|  */
 | |
| export async function fetchSnodePoolFromSeedNodeWithRetries(
 | |
|   seedNodes: Array<string>
 | |
| ): Promise<Array<Snode>> {
 | |
|   try {
 | |
|     window?.log?.info(`fetchSnodePoolFromSeedNode with seedNodes.length ${seedNodes.length}`);
 | |
| 
 | |
|     let snodes = await getSnodeListFromSeednodeOneAtAtime(seedNodes);
 | |
|     // make sure order of the list is random, so we get version in a non-deterministic way
 | |
|     snodes = _.shuffle(snodes);
 | |
|     // commit changes to be live
 | |
|     // we'll update the version (in case they upgrade) every cycle
 | |
|     const fetchSnodePool = snodes.map(snode => ({
 | |
|       ip: snode.public_ip,
 | |
|       port: snode.storage_port,
 | |
|       pubkey_x25519: snode.pubkey_x25519,
 | |
|       pubkey_ed25519: snode.pubkey_ed25519,
 | |
|     }));
 | |
|     window?.log?.info(
 | |
|       'SeedNodeAPI::fetchSnodePoolFromSeedNodeWithRetries - Refreshed random snode pool with',
 | |
|       snodes.length,
 | |
|       'snodes'
 | |
|     );
 | |
| 
 | |
|     return fetchSnodePool;
 | |
|   } catch (e) {
 | |
|     window?.log?.warn(
 | |
|       'SessionSnodeAPI::fetchSnodePoolFromSeedNodeWithRetries - error',
 | |
|       e.code,
 | |
|       e.message
 | |
|     );
 | |
| 
 | |
|     throw new Error('Failed to contact seed node');
 | |
|   }
 | |
| }
 | |
| 
 | |
| const getSslAgentForSeedNode = async (seedNodeHost: string, isSsl = false) => {
 | |
|   let certContent = '';
 | |
|   let pubkey256 = '';
 | |
|   let cert256 = '';
 | |
|   if (!isSsl) {
 | |
|     return undefined;
 | |
|   }
 | |
| 
 | |
|   switch (seedNodeHost) {
 | |
|     case 'storage.seed1.loki.network':
 | |
|       certContent = isLinux() ? storageSeed1Crt : Buffer.from(storageSeed1Crt, 'utf-8').toString();
 | |
|       pubkey256 = 'JOsnIcAanVbgECNA8lHtC8f/cqN9m8EP7jKT6XCjeL8=';
 | |
|       cert256 =
 | |
|         '6E:2B:AC:F3:6E:C1:FF:FF:24:F3:CA:92:C6:94:81:B4:82:43:DF:C7:C6:03:98:B8:F5:6B:7D:30:7B:16:C1:CB';
 | |
|       break;
 | |
|     case 'storage.seed3.loki.network':
 | |
|       certContent = isLinux() ? storageSeed3Crt : Buffer.from(storageSeed3Crt, 'utf-8').toString();
 | |
|       pubkey256 = 'mMmZD3lG4Fi7nTC/EWzRVaU3bbCLsH6Ds2FHSTpo0Rk=';
 | |
|       cert256 =
 | |
|         '24:13:4C:0A:03:D8:42:A6:09:DE:35:76:F4:BD:FB:11:60:DB:F9:88:9F:98:46:B7:60:A6:60:0C:4C:CF:60:72';
 | |
| 
 | |
|       break;
 | |
|     case 'public.loki.foundation':
 | |
|       certContent = isLinux()
 | |
|         ? publicLokiFoundationCtr
 | |
|         : Buffer.from(publicLokiFoundationCtr, 'utf-8').toString();
 | |
|       pubkey256 = 'W+Zv52qlcm1BbdpJzFwxZrE7kfmEboq7h3Dp/+Q3RPg=';
 | |
|       cert256 =
 | |
|         '40:E4:67:7D:18:6B:4D:08:8D:E9:D5:47:52:25:B8:28:E0:D3:63:99:9B:38:46:7D:92:19:5B:61:B9:AE:0E:EA';
 | |
| 
 | |
|       break;
 | |
| 
 | |
|     default:
 | |
|       throw new Error(`Unknown seed node: ${seedNodeHost}`);
 | |
|   }
 | |
| 
 | |
|   // tslint:disable: non-literal-fs-path
 | |
|   // read the cert each time. We only run this request once for each seed node nevertheless.
 | |
|   const sslOptions: https.AgentOptions = {
 | |
|     // as the seed nodes are using a self signed certificate, we have to provide it here.
 | |
|     ca: certContent,
 | |
|     // we have to reject them, otherwise our errors returned in the checkServerIdentity are simply not making the call fail.
 | |
|     // so in production, rejectUnauthorized must be true.
 | |
|     rejectUnauthorized: true,
 | |
|     keepAlive: true,
 | |
| 
 | |
|     checkServerIdentity: (host: string, cert: any) => {
 | |
|       window.log.info(`seednode checkServerIdentity: ${host}`);
 | |
|       // Make sure the certificate is issued to the host we are connected to
 | |
|       const err = tls.checkServerIdentity(host, cert);
 | |
|       if (err) {
 | |
|         return err;
 | |
|       }
 | |
| 
 | |
|       // Pin the public key, similar to HPKP pin-sha25 pinning
 | |
|       if (sha256(cert.pubkey) !== pubkey256) {
 | |
|         window.log.error('checkServerIdentity: cert.pubkey issue');
 | |
| 
 | |
|         const msg =
 | |
|           'Certificate verification error: ' +
 | |
|           `The public key of '${cert.subject.CN}' ` +
 | |
|           'does not match our pinned fingerprint';
 | |
|         return new Error(msg);
 | |
|       }
 | |
| 
 | |
|       // Pin the exact certificate, rather than the pub key
 | |
|       if (cert.fingerprint256 !== cert256) {
 | |
|         window.log.error('checkServerIdentity: fingerprint256 issue');
 | |
| 
 | |
|         const msg =
 | |
|           'Certificate verification error: ' +
 | |
|           `The certificate of '${cert.subject.CN}' ` +
 | |
|           'does not match our pinned fingerprint';
 | |
|         return new Error(msg);
 | |
|       }
 | |
| 
 | |
|       return undefined;
 | |
|     },
 | |
|   };
 | |
| 
 | |
|   // we're creating a new Agent that will now use the certs we have configured
 | |
|   return new https.Agent(sslOptions);
 | |
| };
 | |
| 
 | |
| export interface SnodeFromSeed {
 | |
|   public_ip: string;
 | |
|   storage_port: number;
 | |
|   pubkey_x25519: string;
 | |
|   pubkey_ed25519: string;
 | |
| }
 | |
| 
 | |
| const getSnodeListFromSeednodeOneAtAtime = async (seedNodes: Array<string>) =>
 | |
|   allowOnlyOneAtATime('getSnodeListFromSeednode', () =>
 | |
|     getSnodeListFromSeednode(seedNodes)
 | |
|   ) as Promise<Array<SnodeFromSeed>>;
 | |
| 
 | |
| /**
 | |
|  * This call will try 4 times to contact a seed nodes (random) and get the snode list from it.
 | |
|  * If all attempts fails, this function will throw the last error.
 | |
|  * The returned list is not shuffled when returned.
 | |
|  */
 | |
| async function getSnodeListFromSeednode(seedNodes: Array<string>): Promise<Array<SnodeFromSeed>> {
 | |
|   const SEED_NODE_RETRIES = 4;
 | |
| 
 | |
|   return pRetry(
 | |
|     async () => {
 | |
|       window?.log?.info('getSnodeListFromSeednode starting...');
 | |
|       if (!seedNodes.length) {
 | |
|         window?.log?.info('loki_snode_api::getSnodeListFromSeednode - seedNodes are empty');
 | |
|         throw new Error('getSnodeListFromSeednode - seedNodes are empty');
 | |
|       }
 | |
|       // do not try/catch, we do want exception to bubble up so pRetry, well, retries
 | |
|       const snodes = await SeedNodeAPI.TEST_fetchSnodePoolFromSeedNodeRetryable(seedNodes);
 | |
| 
 | |
|       return snodes;
 | |
|     },
 | |
|     {
 | |
|       retries: SEED_NODE_RETRIES - 1,
 | |
|       factor: 2,
 | |
|       minTimeout: SeedNodeAPI.getMinTimeout(),
 | |
|       onFailedAttempt: e => {
 | |
|         window?.log?.warn(
 | |
|           `fetchSnodePoolFromSeedNodeRetryable attempt #${e.attemptNumber} failed. ${e.retriesLeft} retries left... Error: ${e.message}`
 | |
|         );
 | |
|       },
 | |
|     }
 | |
|   );
 | |
| }
 | |
| 
 | |
| export function getMinTimeout() {
 | |
|   return 1000;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * This functions choose randonly a seed node from seedNodes and try to get the snodes from it, or throws.
 | |
|  * This function is to be used with a pRetry caller
 | |
|  */
 | |
| export async function TEST_fetchSnodePoolFromSeedNodeRetryable(
 | |
|   seedNodes: Array<string>
 | |
| ): Promise<Array<SnodeFromSeed>> {
 | |
|   window?.log?.info('fetchSnodePoolFromSeedNodeRetryable starting...');
 | |
| 
 | |
|   if (!seedNodes.length) {
 | |
|     window?.log?.info('loki_snode_api::fetchSnodePoolFromSeedNodeRetryable - seedNodes are empty');
 | |
|     throw new Error('fetchSnodePoolFromSeedNodeRetryable: Seed nodes are empty');
 | |
|   }
 | |
| 
 | |
|   const seedNodeUrl = _.sample(seedNodes);
 | |
|   if (!seedNodeUrl) {
 | |
|     window?.log?.warn(
 | |
|       'loki_snode_api::fetchSnodePoolFromSeedNodeRetryable - Could not select random snodes from',
 | |
|       seedNodes
 | |
|     );
 | |
|     throw new Error('fetchSnodePoolFromSeedNodeRetryable: Seed nodes are empty #2');
 | |
|   }
 | |
| 
 | |
|   const tryUrl = new URL(seedNodeUrl);
 | |
| 
 | |
|   const snodes = await getSnodesFromSeedUrl(tryUrl);
 | |
|   if (snodes.length === 0) {
 | |
|     window?.log?.warn(
 | |
|       `loki_snode_api::fetchSnodePoolFromSeedNodeRetryable - ${seedNodeUrl} did not return any snodes`
 | |
|     );
 | |
|     throw new Error(`Failed to contact seed node: ${seedNodeUrl}`);
 | |
|   }
 | |
| 
 | |
|   return snodes;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * Try to get the snode list from the given seed node URL, or throws.
 | |
|  * This function throws for whatever reason might happen (timeout, invalid response, 0 valid snodes returned, ...)
 | |
|  * This function is to be used inside a pRetry function
 | |
|  */
 | |
| async function getSnodesFromSeedUrl(urlObj: URL): Promise<Array<any>> {
 | |
|   // Removed limit until there is a way to get snode info
 | |
|   // for individual nodes (needed for guard nodes);  this way
 | |
|   // we get all active nodes
 | |
|   window?.log?.info(`getSnodesFromSeedUrl starting with ${urlObj.href}`);
 | |
| 
 | |
|   const params = {
 | |
|     active_only: true,
 | |
|     fields: {
 | |
|       public_ip: true,
 | |
|       storage_port: true,
 | |
|       pubkey_x25519: true,
 | |
|       pubkey_ed25519: true,
 | |
|     },
 | |
|   };
 | |
| 
 | |
|   const endpoint = 'json_rpc';
 | |
|   const url = `${urlObj.href}${endpoint}`;
 | |
|   const body = {
 | |
|     jsonrpc: '2.0',
 | |
|     method: 'get_n_service_nodes',
 | |
|     params,
 | |
|   };
 | |
| 
 | |
|   const sslAgent = await getSslAgentForSeedNode(
 | |
|     urlObj.hostname,
 | |
|     urlObj.protocol !== Constants.PROTOCOLS.HTTP
 | |
|   );
 | |
| 
 | |
|   const fetchOptions = {
 | |
|     method: 'POST',
 | |
|     timeout: 5000,
 | |
|     body: JSON.stringify(body),
 | |
|     headers: {
 | |
|       'User-Agent': 'WhatsApp',
 | |
|       'Accept-Language': 'en-us',
 | |
|     },
 | |
|     agent: sslAgent,
 | |
|   };
 | |
|   window?.log?.info(`insecureNodeFetch => plaintext for getSnodesFromSeedUrl  ${url}`);
 | |
| 
 | |
|   const response = await insecureNodeFetch(url, fetchOptions);
 | |
| 
 | |
|   if (response.status !== 200) {
 | |
|     window?.log?.error(
 | |
|       `loki_snode_api:::getSnodesFromSeedUrl - invalid response from seed ${urlObj.toString()}:`,
 | |
|       response
 | |
|     );
 | |
|     throw new Error(
 | |
|       `getSnodesFromSeedUrl: status is not 200 ${response.status} from ${urlObj.href}`
 | |
|     );
 | |
|   }
 | |
| 
 | |
|   if (response.headers.get('Content-Type') !== APPLICATION_JSON) {
 | |
|     window?.log?.error('Response is not json');
 | |
|     throw new Error(`getSnodesFromSeedUrl: response is not json Content-Type from ${urlObj.href}`);
 | |
|   }
 | |
| 
 | |
|   try {
 | |
|     const json = await response.json();
 | |
|     const result = json.result;
 | |
| 
 | |
|     if (!result) {
 | |
|       window?.log?.error(
 | |
|         `loki_snode_api:::getSnodesFromSeedUrl - invalid result from seed ${urlObj.toString()}:`,
 | |
|         response
 | |
|       );
 | |
|       throw new Error(`getSnodesFromSeedUrl: json.result is empty from ${urlObj.href}`);
 | |
|     }
 | |
|     // Filter 0.0.0.0 nodes which haven't submitted uptime proofs
 | |
|     const validNodes = result.service_node_states.filter(
 | |
|       (snode: any) => snode.public_ip !== '0.0.0.0'
 | |
|     );
 | |
| 
 | |
|     if (validNodes.length === 0) {
 | |
|       throw new Error(`Did not get a single valid snode from ${urlObj.href}`);
 | |
|     }
 | |
|     return validNodes;
 | |
|   } catch (e) {
 | |
|     window?.log?.error('Invalid json response');
 | |
|     throw new Error(`getSnodesFromSeedUrl: cannot parse content as JSON from ${urlObj.href}`);
 | |
|   }
 | |
| }
 | |
| 
 | |
| const storageSeed1Crt = `-----BEGIN CERTIFICATE-----
 | |
| MIIEITCCAwmgAwIBAgIUJsox1ZQPK/6iDsCC+MUJfNAlFuYwDQYJKoZIhvcNAQEL
 | |
| BQAwgYAxCzAJBgNVBAYTAkFVMREwDwYDVQQIDAhWaWN0b3JpYTESMBAGA1UEBwwJ
 | |
| TWVsYm91cm5lMSUwIwYDVQQKDBxPeGVuIFByaXZhY3kgVGVjaCBGb3VuZGF0aW9u
 | |
| MSMwIQYDVQQDDBpzdG9yYWdlLnNlZWQxLmxva2kubmV0d29yazAeFw0yMTA0MDcw
 | |
| MTE5MjZaFw0yMzA0MDcwMTE5MjZaMIGAMQswCQYDVQQGEwJBVTERMA8GA1UECAwI
 | |
| VmljdG9yaWExEjAQBgNVBAcMCU1lbGJvdXJuZTElMCMGA1UECgwcT3hlbiBQcml2
 | |
| YWN5IFRlY2ggRm91bmRhdGlvbjEjMCEGA1UEAwwac3RvcmFnZS5zZWVkMS5sb2tp
 | |
| Lm5ldHdvcmswggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtWH3Rz8Dd
 | |
| kEmM7tcBWHrJ/G8drr/+qidboEVYzxpyRjszaDxKXVhx4eBBsAD5RuCWuTuZmM8k
 | |
| TKEDLtf8xfb5SQ7YNX+346s9NXS5Poy4CIPASiW/QWXgIHFbVdv2hC+cKOP61OLM
 | |
| OGnOxfig6tQyd6EaCkedpY1DvSa2lPnQSOwC/jXCx6Vboc0zTY5R2bHtNc9hjIFP
 | |
| F4VClLAQSh2F4R1V9MH5KZMW+CCP6oaJY658W9JYXYRwlLrL2EFOVxHgcxq/6+fw
 | |
| +axXK9OXJrGZjuA+hiz+L/uAOtE4WuxrSeuNMHSrMtM9QqVn4bBuMJ21mAzfNoMP
 | |
| OIwgMT9DwUjVAgMBAAGjgZAwgY0wHQYDVR0OBBYEFOubJp9SoXIw+ONiWgkOaW8K
 | |
| zI/TMB8GA1UdIwQYMBaAFOubJp9SoXIw+ONiWgkOaW8KzI/TMA8GA1UdEwEB/wQF
 | |
| MAMBAf8wJQYDVR0RBB4wHIIac3RvcmFnZS5zZWVkMS5sb2tpLm5ldHdvcmswEwYD
 | |
| VR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBAIiHNhNrjYvwXVWs
 | |
| gacx8T/dpqpu9GE3L17LotgQr4R+IYHpNtcmwOTdtWWFfUTr75OCs+c3DqgRKEoj
 | |
| lnULOsVcalpAGIvW15/fmZWOf66Dpa4+ljDmAc3SOQiD0gGNtqblgI5zG1HF38QP
 | |
| hjYRhCZ5CVeGOLucvQ8tVVwQvArPFIkBr0jH9jHVgRWEI2MeI3FsU2H93D4TfGln
 | |
| N4SmmCfYBqygaaZBWkJEt0bYhn8uGHdU9UY9L2FPtfHVKkmFgO7cASGlvXS7B/TT
 | |
| /8IgbtM3O8mZc2asmdQhGwoAKz93ryyCd8X2UZJg/IwCSCayOlYZWY2fR4OPQmmV
 | |
| gxJsm+g=
 | |
| -----END CERTIFICATE-----
 | |
| `;
 | |
| 
 | |
| const storageSeed3Crt = `-----BEGIN CERTIFICATE-----
 | |
| MIIEITCCAwmgAwIBAgIUc486Dy9Y00bUFfDeYmJIgSS5xREwDQYJKoZIhvcNAQEL
 | |
| BQAwgYAxCzAJBgNVBAYTAkFVMREwDwYDVQQIDAhWaWN0b3JpYTESMBAGA1UEBwwJ
 | |
| TWVsYm91cm5lMSUwIwYDVQQKDBxPeGVuIFByaXZhY3kgVGVjaCBGb3VuZGF0aW9u
 | |
| MSMwIQYDVQQDDBpzdG9yYWdlLnNlZWQzLmxva2kubmV0d29yazAeFw0yMTA0MDcw
 | |
| MTIwNTJaFw0yMzA0MDcwMTIwNTJaMIGAMQswCQYDVQQGEwJBVTERMA8GA1UECAwI
 | |
| VmljdG9yaWExEjAQBgNVBAcMCU1lbGJvdXJuZTElMCMGA1UECgwcT3hlbiBQcml2
 | |
| YWN5IFRlY2ggRm91bmRhdGlvbjEjMCEGA1UEAwwac3RvcmFnZS5zZWVkMy5sb2tp
 | |
| Lm5ldHdvcmswggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCtokMlsFzf
 | |
| piYeD0EVNikMyvjltpF6fUEde9NOVrTtNTQT6kkDk+/0HF5LYgPaatv6v7fpUQHi
 | |
| kIwd6F0LTRGeWDFdsaWMdtlR1n/GxLPrOROsE8dcLt6GLavPf9rDabgva93m/JD6
 | |
| XW+Ne+MPEwqS8dAmFGhZd0gju6AtKFoSHnIf5pSQN6fSZUF/JQtHLVprAKKWKDiS
 | |
| ZwmWbmrZR2aofLD/VRpetabajnZlv9EeWloQwvUsw1C1hkAmmtFeeXtg7ePwrOzo
 | |
| 6CnmcUJwOmi+LWqQV4A+58RZPFKaZoC5pzaKd0OYB8eZ8HB1F41UjGJgheX5Cyl4
 | |
| +amfF3l8dSq1AgMBAAGjgZAwgY0wHQYDVR0OBBYEFM9VSq4pGydjtX92Beul4+ml
 | |
| jBKtMB8GA1UdIwQYMBaAFM9VSq4pGydjtX92Beul4+mljBKtMA8GA1UdEwEB/wQF
 | |
| MAMBAf8wJQYDVR0RBB4wHIIac3RvcmFnZS5zZWVkMy5sb2tpLm5ldHdvcmswEwYD
 | |
| VR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQELBQADggEBAAYxmhhkcKE1n6g1
 | |
| JqOa3UCBo4EfbqY5+FDZ0FVqv/cwemwVpKLbe6luRIS8poomdPCyMOS45V7wN3H9
 | |
| cFpfJ1TW19ydPVKmCXrl29ngmnY1q7YDwE/4qi3VK/UiqDkTHMKWjVPkenOyi8u6
 | |
| VVQANXSnKrn6GtigNFjGyD38O+j7AUSXBtXOJczaoF6r6BWgwQZ2WmgjuwvKTWSN
 | |
| 4r8uObERoAQYVaeXfgdr4e9X/JdskBDaLFfoW/rrSozHB4FqVNFW96k+aIUgRa5p
 | |
| 9kv115QcBPCSh9qOyTHij4tswS6SyOFaiKrNC4hgHQXP4QgioKmtsR/2Y+qJ6ddH
 | |
| 6oo+4QU=
 | |
| -----END CERTIFICATE-----
 | |
| `;
 | |
| 
 | |
| const publicLokiFoundationCtr = `-----BEGIN CERTIFICATE-----
 | |
| MIIEEzCCAvugAwIBAgIUY9RQqbjhsQEkdeSgV9L0os9xZ7AwDQYJKoZIhvcNAQEL
 | |
| BQAwfDELMAkGA1UEBhMCQVUxETAPBgNVBAgMCFZpY3RvcmlhMRIwEAYDVQQHDAlN
 | |
| ZWxib3VybmUxJTAjBgNVBAoMHE94ZW4gUHJpdmFjeSBUZWNoIEZvdW5kYXRpb24x
 | |
| HzAdBgNVBAMMFnB1YmxpYy5sb2tpLmZvdW5kYXRpb24wHhcNMjEwNDA3MDExMDMx
 | |
| WhcNMjMwNDA3MDExMDMxWjB8MQswCQYDVQQGEwJBVTERMA8GA1UECAwIVmljdG9y
 | |
| aWExEjAQBgNVBAcMCU1lbGJvdXJuZTElMCMGA1UECgwcT3hlbiBQcml2YWN5IFRl
 | |
| Y2ggRm91bmRhdGlvbjEfMB0GA1UEAwwWcHVibGljLmxva2kuZm91bmRhdGlvbjCC
 | |
| ASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAM5dBJSIR5+VNNUxUOo6FG0e
 | |
| RmZteRqBt50KXGbOi2A23a6sa57pLFh9Yw3hmlWV+QCL7ipG1X4IC55OStgoesf+
 | |
| K65VwEMP6Mtq0sSJS3R5TiuV2ZSRdSZTVjUyRXVe5T4Aw6wXVTAbc/HsyS780tDh
 | |
| GclfDHhonPhZpmTAnSbfMOS+BfOnBNvDxdto0kVh6k5nrGlkT4ECloulHTQF2lwJ
 | |
| 0D6IOtv9AJplPdg6s2c4dY7durOdvr3NNVfvn5PTeRvbEPqzZur4WUUKIPNGu6mY
 | |
| PxImqd4eUsL0Vod4aAsTIx4YMmCTi0m9W6zJI6nXcK/6a+iiA3+NTNMzEA9gQhEC
 | |
| AwEAAaOBjDCBiTAdBgNVHQ4EFgQU/zahokxLvvFUpbnM6z/pwS1KsvwwHwYDVR0j
 | |
| BBgwFoAU/zahokxLvvFUpbnM6z/pwS1KsvwwDwYDVR0TAQH/BAUwAwEB/zAhBgNV
 | |
| HREEGjAYghZwdWJsaWMubG9raS5mb3VuZGF0aW9uMBMGA1UdJQQMMAoGCCsGAQUF
 | |
| BwMBMA0GCSqGSIb3DQEBCwUAA4IBAQBql+JvoqpaYrFFTOuDn08U+pdcd3GM7tbI
 | |
| zRH5LU+YnIpp9aRheek+2COW8DXsIy/kUngETCMLmX6ZaUj/WdHnTDkB0KTgxSHv
 | |
| ad3ZznKPKZ26qJOklr+0ZWj4J3jHbisSzql6mqq7R2Kp4ESwzwqxvkbykM5RUnmz
 | |
| Go/3Ol7bpN/ZVwwEkGfD/5rRHf57E/gZn2pBO+zotlQgr7HKRsIXQ2hIXVQqWmPQ
 | |
| lvfIwrwAZlfES7BARFnHOpyVQxV8uNcV5K5eXzuVFjHBqvq+BtyGhWkP9yKJCHS9
 | |
| OUXxch0rzRsH2C/kRVVhEk0pI3qlFiRC8pCJs98SNE9l69EQtG7I
 | |
| -----END CERTIFICATE-----
 | |
| `;
 |