From 9dc20580c781e24206bdfcebb14761e07621bc6b Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:05 +0000 Subject: [PATCH 01/57] Add api key data model and helpers This commits introduces a new data model for holding api keys for the API. The keys are stored in the database with a prefix and a hash and bcrypt with 10 passes is used to store the hash and it is "one way safe". Api keys have an expiry logic similar to pre auth keys. A key cannot be retrieved after it has created, only verified. --- api_key.go | 164 ++++++++++++++++++++++++++++++++++++++++++++++++ api_key_test.go | 89 ++++++++++++++++++++++++++ 2 files changed, 253 insertions(+) create mode 100644 api_key.go create mode 100644 api_key_test.go diff --git a/api_key.go b/api_key.go new file mode 100644 index 00000000..a968b260 --- /dev/null +++ b/api_key.go @@ -0,0 +1,164 @@ +package headscale + +import ( + "fmt" + "strings" + "time" + + v1 "github.com/juanfont/headscale/gen/go/headscale/v1" + "golang.org/x/crypto/bcrypt" + "google.golang.org/protobuf/types/known/timestamppb" +) + +const ( + apiPrefixLength = 7 + apiKeyLength = 32 + apiKeyParts = 2 + + errAPIKeyFailedToParse = Error("Failed to parse ApiKey") +) + +// APIKey describes the datamodel for API keys used to remotely authenticate with +// headscale. +type APIKey struct { + ID uint64 `gorm:"primary_key"` + Prefix string `gorm:"uniqueIndex"` + Hash []byte + + CreatedAt *time.Time + Expiration *time.Time + LastSeen *time.Time +} + +// CreateAPIKey creates a new ApiKey in a namespace, and returns it. +func (h *Headscale) CreateAPIKey( + expiration *time.Time, +) (string, *APIKey, error) { + prefix, err := GenerateRandomStringURLSafe(apiPrefixLength) + if err != nil { + return "", nil, err + } + + toBeHashed, err := GenerateRandomStringURLSafe(apiKeyLength) + if err != nil { + return "", nil, err + } + + // Key to return to user, this will only be visible _once_ + keyStr := prefix + "." + toBeHashed + + hash, err := bcrypt.GenerateFromPassword([]byte(toBeHashed), bcrypt.DefaultCost) + if err != nil { + return "", nil, err + } + + key := APIKey{ + Prefix: prefix, + Hash: hash, + Expiration: expiration, + } + h.db.Save(&key) + + return keyStr, &key, nil +} + +// ListAPIKeys returns the list of ApiKeys for a namespace. +func (h *Headscale) ListAPIKeys() ([]APIKey, error) { + keys := []APIKey{} + if err := h.db.Find(&keys).Error; err != nil { + return nil, err + } + + return keys, nil +} + +// GetAPIKey returns a ApiKey for a given key. +func (h *Headscale) GetAPIKey(prefix string) (*APIKey, error) { + key := APIKey{} + if result := h.db.First(&key, "prefix = ?", prefix); result.Error != nil { + return nil, result.Error + } + + return &key, nil +} + +// GetAPIKeyByID returns a ApiKey for a given id. +func (h *Headscale) GetAPIKeyByID(id uint64) (*APIKey, error) { + key := APIKey{} + if result := h.db.Find(&APIKey{ID: id}).First(&key); result.Error != nil { + return nil, result.Error + } + + return &key, nil +} + +// DestroyAPIKey destroys a ApiKey. Returns error if the ApiKey +// does not exist. +func (h *Headscale) DestroyAPIKey(key APIKey) error { + if result := h.db.Unscoped().Delete(key); result.Error != nil { + return result.Error + } + + return nil +} + +// ExpireAPIKey marks a ApiKey as expired. +func (h *Headscale) ExpireAPIKey(key *APIKey) error { + if err := h.db.Model(&key).Update("Expiration", time.Now()).Error; err != nil { + return err + } + + return nil +} + +func (h *Headscale) ValidateAPIKey(keyStr string) (bool, error) { + prefix, hash, err := splitAPIKey(keyStr) + if err != nil { + return false, fmt.Errorf("failed to validate api key: %w", err) + } + + key, err := h.GetAPIKey(prefix) + if err != nil { + return false, fmt.Errorf("failed to validate api key: %w", err) + } + + if key.Expiration.Before(time.Now()) { + return false, nil + } + + if err := bcrypt.CompareHashAndPassword(key.Hash, []byte(hash)); err != nil { + return false, err + } + + return true, nil +} + +func splitAPIKey(key string) (string, string, error) { + parts := strings.Split(key, ".") + if len(parts) != apiKeyParts { + return "", "", errAPIKeyFailedToParse + } + + return parts[0], parts[1], nil +} + +func (key *APIKey) toProto() *v1.ApiKey { + protoKey := v1.ApiKey{ + Id: key.ID, + Prefix: key.Prefix, + } + + if key.Expiration != nil { + protoKey.Expiration = timestamppb.New(*key.Expiration) + } + + if key.CreatedAt != nil { + protoKey.CreatedAt = timestamppb.New(*key.CreatedAt) + } + + if key.LastSeen != nil { + protoKey.LastSeen = timestamppb.New(*key.LastSeen) + } + + return &protoKey +} diff --git a/api_key_test.go b/api_key_test.go new file mode 100644 index 00000000..2ddbbbc0 --- /dev/null +++ b/api_key_test.go @@ -0,0 +1,89 @@ +package headscale + +import ( + "time" + + "gopkg.in/check.v1" +) + +func (*Suite) TestCreateAPIKey(c *check.C) { + apiKeyStr, apiKey, err := app.CreateAPIKey(nil) + c.Assert(err, check.IsNil) + c.Assert(apiKey, check.NotNil) + + // Did we get a valid key? + c.Assert(apiKey.Prefix, check.NotNil) + c.Assert(apiKey.Hash, check.NotNil) + c.Assert(apiKeyStr, check.Not(check.Equals), "") + + _, err = app.ListAPIKeys() + c.Assert(err, check.IsNil) + + keys, err := app.ListAPIKeys() + c.Assert(err, check.IsNil) + c.Assert(len(keys), check.Equals, 1) +} + +func (*Suite) TestAPIKeyDoesNotExist(c *check.C) { + key, err := app.GetAPIKey("does-not-exist") + c.Assert(err, check.NotNil) + c.Assert(key, check.IsNil) +} + +func (*Suite) TestValidateAPIKeyOk(c *check.C) { + nowPlus2 := time.Now().Add(2 * time.Hour) + apiKeyStr, apiKey, err := app.CreateAPIKey(&nowPlus2) + c.Assert(err, check.IsNil) + c.Assert(apiKey, check.NotNil) + + valid, err := app.ValidateAPIKey(apiKeyStr) + c.Assert(err, check.IsNil) + c.Assert(valid, check.Equals, true) +} + +func (*Suite) TestValidateAPIKeyNotOk(c *check.C) { + nowMinus2 := time.Now().Add(time.Duration(-2) * time.Hour) + apiKeyStr, apiKey, err := app.CreateAPIKey(&nowMinus2) + c.Assert(err, check.IsNil) + c.Assert(apiKey, check.NotNil) + + valid, err := app.ValidateAPIKey(apiKeyStr) + c.Assert(err, check.IsNil) + c.Assert(valid, check.Equals, false) + + now := time.Now() + apiKeyStrNow, apiKey, err := app.CreateAPIKey(&now) + c.Assert(err, check.IsNil) + c.Assert(apiKey, check.NotNil) + + validNow, err := app.ValidateAPIKey(apiKeyStrNow) + c.Assert(err, check.IsNil) + c.Assert(validNow, check.Equals, false) + + validSilly, err := app.ValidateAPIKey("nota.validkey") + c.Assert(err, check.NotNil) + c.Assert(validSilly, check.Equals, false) + + validWithErr, err := app.ValidateAPIKey("produceerrorkey") + c.Assert(err, check.NotNil) + c.Assert(validWithErr, check.Equals, false) +} + +func (*Suite) TestExpireAPIKey(c *check.C) { + nowPlus2 := time.Now().Add(2 * time.Hour) + apiKeyStr, apiKey, err := app.CreateAPIKey(&nowPlus2) + c.Assert(err, check.IsNil) + c.Assert(apiKey, check.NotNil) + + valid, err := app.ValidateAPIKey(apiKeyStr) + c.Assert(err, check.IsNil) + c.Assert(valid, check.Equals, true) + + err = app.ExpireAPIKey(apiKey) + c.Assert(err, check.IsNil) + c.Assert(apiKey.Expiration, check.NotNil) + + notValid, err := app.ValidateAPIKey(apiKeyStr) + c.Assert(err, check.IsNil) + c.Assert(notValid, check.Equals, false) +} From 70d82ea18489a7875dff5668f6dce5335a5cc3fa Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:05 +0000 Subject: [PATCH 02/57] Add migration for new data model --- db.go | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/db.go b/db.go index 7b777863..1b53dc88 100644 --- a/db.go +++ b/db.go @@ -58,6 +58,11 @@ func (h *Headscale) initDB() error { return err } + err = db.AutoMigrate(&APIKey{}) + if err != nil { + return err + } + err = h.setValue("db_version", dbVersion) return err From b8e9024845d4b86f4d8a525522bb7c9226e60f8b Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 03/57] Add proto model for api key --- proto/headscale/v1/apikey.proto | 35 ++++++++++++++++++++++++++++++ proto/headscale/v1/headscale.proto | 23 ++++++++++++++++++++ proto/headscale/v1/machine.proto | 14 ++++++------ 3 files changed, 65 insertions(+), 7 deletions(-) create mode 100644 proto/headscale/v1/apikey.proto diff --git a/proto/headscale/v1/apikey.proto b/proto/headscale/v1/apikey.proto new file mode 100644 index 00000000..749e5c22 --- /dev/null +++ b/proto/headscale/v1/apikey.proto @@ -0,0 +1,35 @@ +syntax = "proto3"; +package headscale.v1; +option go_package = "github.com/juanfont/headscale/gen/go/v1"; + +import "google/protobuf/timestamp.proto"; + +message ApiKey { + uint64 id = 1; + string prefix = 2; + google.protobuf.Timestamp expiration = 3; + google.protobuf.Timestamp created_at = 4; + google.protobuf.Timestamp last_seen = 5; +} + +message CreateApiKeyRequest { + google.protobuf.Timestamp expiration = 1; +} + +message CreateApiKeyResponse { + string api_key = 1; +} + +message ExpireApiKeyRequest { + string prefix = 1; +} + +message ExpireApiKeyResponse { +} + +message ListApiKeysRequest { +} + +message ListApiKeysResponse { + repeated ApiKey api_keys = 1; +} diff --git a/proto/headscale/v1/headscale.proto b/proto/headscale/v1/headscale.proto index f7332a88..3cbbb8ed 100644 --- a/proto/headscale/v1/headscale.proto +++ b/proto/headscale/v1/headscale.proto @@ -8,6 +8,7 @@ import "headscale/v1/namespace.proto"; import "headscale/v1/preauthkey.proto"; import "headscale/v1/machine.proto"; import "headscale/v1/routes.proto"; +import "headscale/v1/apikey.proto"; // import "headscale/v1/device.proto"; service HeadscaleService { @@ -131,6 +132,28 @@ service HeadscaleService { } // --- Route end --- + // --- ApiKeys start --- + rpc CreateApiKey(CreateApiKeyRequest) returns (CreateApiKeyResponse) { + option (google.api.http) = { + post: "/api/v1/apikey" + body: "*" + }; + } + + rpc ExpireApiKey(ExpireApiKeyRequest) returns (ExpireApiKeyResponse) { + option (google.api.http) = { + post: "/api/v1/apikey/expire" + body: "*" + }; + } + + rpc ListApiKeys(ListApiKeysRequest) returns (ListApiKeysResponse) { + option (google.api.http) = { + get: "/api/v1/apikey" + }; + } + // --- ApiKeys end --- + // Implement Tailscale API // rpc GetDevice(GetDeviceRequest) returns(GetDeviceResponse) { // option(google.api.http) = { diff --git a/proto/headscale/v1/machine.proto b/proto/headscale/v1/machine.proto index 9b032122..47664e15 100644 --- a/proto/headscale/v1/machine.proto +++ b/proto/headscale/v1/machine.proto @@ -14,13 +14,13 @@ enum RegisterMethod { } message Machine { - uint64 id = 1; - string machine_key = 2; - string node_key = 3; - string disco_key = 4; - repeated string ip_addresses = 5; - string name = 6; - Namespace namespace = 7; + uint64 id = 1; + string machine_key = 2; + string node_key = 3; + string disco_key = 4; + repeated string ip_addresses = 5; + string name = 6; + Namespace namespace = 7; bool registered = 8; RegisterMethod register_method = 9; From b1a9b1ada1c49023ae72a2210089dd486f1524ef Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 04/57] Generate code from proto --- gen/go/headscale/v1/apikey.pb.go | 559 ++++++++++++++++++ gen/go/headscale/v1/device.pb.go | 7 +- gen/go/headscale/v1/headscale.pb.go | 423 +++++++------ gen/go/headscale/v1/headscale.pb.gw.go | 227 +++++++ gen/go/headscale/v1/headscale_grpc.pb.go | 111 ++++ gen/go/headscale/v1/machine.pb.go | 7 +- gen/go/headscale/v1/namespace.pb.go | 7 +- gen/go/headscale/v1/preauthkey.pb.go | 7 +- gen/go/headscale/v1/routes.pb.go | 7 +- .../headscale/v1/apikey.swagger.json | 43 ++ .../headscale/v1/headscale.swagger.json | 148 +++++ 11 files changed, 1338 insertions(+), 208 deletions(-) create mode 100644 gen/go/headscale/v1/apikey.pb.go create mode 100644 gen/openapiv2/headscale/v1/apikey.swagger.json diff --git a/gen/go/headscale/v1/apikey.pb.go b/gen/go/headscale/v1/apikey.pb.go new file mode 100644 index 00000000..ace8b18c --- /dev/null +++ b/gen/go/headscale/v1/apikey.pb.go @@ -0,0 +1,559 @@ +// Code generated by protoc-gen-go. DO NOT EDIT. +// versions: +// protoc-gen-go v1.27.1 +// protoc (unknown) +// source: headscale/v1/apikey.proto + +package v1 + +import ( + reflect "reflect" + sync "sync" + + protoreflect "google.golang.org/protobuf/reflect/protoreflect" + protoimpl "google.golang.org/protobuf/runtime/protoimpl" + timestamppb "google.golang.org/protobuf/types/known/timestamppb" +) + +const ( + // Verify that this generated code is sufficiently up-to-date. + _ = protoimpl.EnforceVersion(20 - protoimpl.MinVersion) + // Verify that runtime/protoimpl is sufficiently up-to-date. + _ = protoimpl.EnforceVersion(protoimpl.MaxVersion - 20) +) + +type ApiKey struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Id uint64 `protobuf:"varint,1,opt,name=id,proto3" json:"id,omitempty"` + Prefix string `protobuf:"bytes,2,opt,name=prefix,proto3" json:"prefix,omitempty"` + Expiration *timestamppb.Timestamp `protobuf:"bytes,3,opt,name=expiration,proto3" json:"expiration,omitempty"` + CreatedAt *timestamppb.Timestamp `protobuf:"bytes,4,opt,name=created_at,json=createdAt,proto3" json:"created_at,omitempty"` + LastSeen *timestamppb.Timestamp `protobuf:"bytes,5,opt,name=last_seen,json=lastSeen,proto3" json:"last_seen,omitempty"` +} + +func (x *ApiKey) Reset() { + *x = ApiKey{} + if protoimpl.UnsafeEnabled { + mi := &file_headscale_v1_apikey_proto_msgTypes[0] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *ApiKey) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*ApiKey) ProtoMessage() {} + +func (x *ApiKey) ProtoReflect() protoreflect.Message { + mi := &file_headscale_v1_apikey_proto_msgTypes[0] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use ApiKey.ProtoReflect.Descriptor instead. +func (*ApiKey) Descriptor() ([]byte, []int) { + return file_headscale_v1_apikey_proto_rawDescGZIP(), []int{0} +} + +func (x *ApiKey) GetId() uint64 { + if x != nil { + return x.Id + } + return 0 +} + +func (x *ApiKey) GetPrefix() string { + if x != nil { + return x.Prefix + } + return "" +} + +func (x *ApiKey) GetExpiration() *timestamppb.Timestamp { + if x != nil { + return x.Expiration + } + return nil +} + +func (x *ApiKey) GetCreatedAt() *timestamppb.Timestamp { + if x != nil { + return x.CreatedAt + } + return nil +} + +func (x *ApiKey) GetLastSeen() *timestamppb.Timestamp { + if x != nil { + return x.LastSeen + } + return nil +} + +type CreateApiKeyRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Expiration *timestamppb.Timestamp `protobuf:"bytes,1,opt,name=expiration,proto3" json:"expiration,omitempty"` +} + +func (x *CreateApiKeyRequest) Reset() { + *x = CreateApiKeyRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_headscale_v1_apikey_proto_msgTypes[1] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *CreateApiKeyRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*CreateApiKeyRequest) ProtoMessage() {} + +func (x *CreateApiKeyRequest) ProtoReflect() protoreflect.Message { + mi := &file_headscale_v1_apikey_proto_msgTypes[1] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use CreateApiKeyRequest.ProtoReflect.Descriptor instead. +func (*CreateApiKeyRequest) Descriptor() ([]byte, []int) { + return file_headscale_v1_apikey_proto_rawDescGZIP(), []int{1} +} + +func (x *CreateApiKeyRequest) GetExpiration() *timestamppb.Timestamp { + if x != nil { + return x.Expiration + } + return nil +} + +type CreateApiKeyResponse struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + ApiKey string `protobuf:"bytes,1,opt,name=api_key,json=apiKey,proto3" json:"api_key,omitempty"` +} + +func (x *CreateApiKeyResponse) Reset() { + *x = CreateApiKeyResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_headscale_v1_apikey_proto_msgTypes[2] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *CreateApiKeyResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*CreateApiKeyResponse) ProtoMessage() {} + +func (x *CreateApiKeyResponse) ProtoReflect() protoreflect.Message { + mi := &file_headscale_v1_apikey_proto_msgTypes[2] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use CreateApiKeyResponse.ProtoReflect.Descriptor instead. +func (*CreateApiKeyResponse) Descriptor() ([]byte, []int) { + return file_headscale_v1_apikey_proto_rawDescGZIP(), []int{2} +} + +func (x *CreateApiKeyResponse) GetApiKey() string { + if x != nil { + return x.ApiKey + } + return "" +} + +type ExpireApiKeyRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + Prefix string `protobuf:"bytes,1,opt,name=prefix,proto3" json:"prefix,omitempty"` +} + +func (x *ExpireApiKeyRequest) Reset() { + *x = ExpireApiKeyRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_headscale_v1_apikey_proto_msgTypes[3] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *ExpireApiKeyRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*ExpireApiKeyRequest) ProtoMessage() {} + +func (x *ExpireApiKeyRequest) ProtoReflect() protoreflect.Message { + mi := &file_headscale_v1_apikey_proto_msgTypes[3] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use ExpireApiKeyRequest.ProtoReflect.Descriptor instead. +func (*ExpireApiKeyRequest) Descriptor() ([]byte, []int) { + return file_headscale_v1_apikey_proto_rawDescGZIP(), []int{3} +} + +func (x *ExpireApiKeyRequest) GetPrefix() string { + if x != nil { + return x.Prefix + } + return "" +} + +type ExpireApiKeyResponse struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields +} + +func (x *ExpireApiKeyResponse) Reset() { + *x = ExpireApiKeyResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_headscale_v1_apikey_proto_msgTypes[4] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *ExpireApiKeyResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*ExpireApiKeyResponse) ProtoMessage() {} + +func (x *ExpireApiKeyResponse) ProtoReflect() protoreflect.Message { + mi := &file_headscale_v1_apikey_proto_msgTypes[4] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use ExpireApiKeyResponse.ProtoReflect.Descriptor instead. +func (*ExpireApiKeyResponse) Descriptor() ([]byte, []int) { + return file_headscale_v1_apikey_proto_rawDescGZIP(), []int{4} +} + +type ListApiKeysRequest struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields +} + +func (x *ListApiKeysRequest) Reset() { + *x = ListApiKeysRequest{} + if protoimpl.UnsafeEnabled { + mi := &file_headscale_v1_apikey_proto_msgTypes[5] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *ListApiKeysRequest) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*ListApiKeysRequest) ProtoMessage() {} + +func (x *ListApiKeysRequest) ProtoReflect() protoreflect.Message { + mi := &file_headscale_v1_apikey_proto_msgTypes[5] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use ListApiKeysRequest.ProtoReflect.Descriptor instead. +func (*ListApiKeysRequest) Descriptor() ([]byte, []int) { + return file_headscale_v1_apikey_proto_rawDescGZIP(), []int{5} +} + +type ListApiKeysResponse struct { + state protoimpl.MessageState + sizeCache protoimpl.SizeCache + unknownFields protoimpl.UnknownFields + + ApiKeys []*ApiKey `protobuf:"bytes,1,rep,name=api_keys,json=apiKeys,proto3" json:"api_keys,omitempty"` +} + +func (x *ListApiKeysResponse) Reset() { + *x = ListApiKeysResponse{} + if protoimpl.UnsafeEnabled { + mi := &file_headscale_v1_apikey_proto_msgTypes[6] + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + ms.StoreMessageInfo(mi) + } +} + +func (x *ListApiKeysResponse) String() string { + return protoimpl.X.MessageStringOf(x) +} + +func (*ListApiKeysResponse) ProtoMessage() {} + +func (x *ListApiKeysResponse) ProtoReflect() protoreflect.Message { + mi := &file_headscale_v1_apikey_proto_msgTypes[6] + if protoimpl.UnsafeEnabled && x != nil { + ms := protoimpl.X.MessageStateOf(protoimpl.Pointer(x)) + if ms.LoadMessageInfo() == nil { + ms.StoreMessageInfo(mi) + } + return ms + } + return mi.MessageOf(x) +} + +// Deprecated: Use ListApiKeysResponse.ProtoReflect.Descriptor instead. +func (*ListApiKeysResponse) Descriptor() ([]byte, []int) { + return file_headscale_v1_apikey_proto_rawDescGZIP(), []int{6} +} + +func (x *ListApiKeysResponse) GetApiKeys() []*ApiKey { + if x != nil { + return x.ApiKeys + } + return nil +} + +var File_headscale_v1_apikey_proto protoreflect.FileDescriptor + +var file_headscale_v1_apikey_proto_rawDesc = []byte{ + 0x0a, 0x19, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2f, 0x76, 0x31, 0x2f, 0x61, + 0x70, 0x69, 0x6b, 0x65, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x12, 0x0c, 0x68, 0x65, 0x61, + 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x1a, 0x1f, 0x67, 0x6f, 0x6f, 0x67, 0x6c, + 0x65, 0x2f, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2f, 0x74, 0x69, 0x6d, 0x65, 0x73, + 0x74, 0x61, 0x6d, 0x70, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x22, 0xe0, 0x01, 0x0a, 0x06, 0x41, + 0x70, 0x69, 0x4b, 0x65, 0x79, 0x12, 0x0e, 0x0a, 0x02, 0x69, 0x64, 0x18, 0x01, 0x20, 0x01, 0x28, + 0x04, 0x52, 0x02, 0x69, 0x64, 0x12, 0x16, 0x0a, 0x06, 0x70, 0x72, 0x65, 0x66, 0x69, 0x78, 0x18, + 0x02, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x70, 0x72, 0x65, 0x66, 0x69, 0x78, 0x12, 0x3a, 0x0a, + 0x0a, 0x65, 0x78, 0x70, 0x69, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x18, 0x03, 0x20, 0x01, 0x28, + 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, + 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x52, 0x0a, 0x65, + 0x78, 0x70, 0x69, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, 0x12, 0x39, 0x0a, 0x0a, 0x63, 0x72, 0x65, + 0x61, 0x74, 0x65, 0x64, 0x5f, 0x61, 0x74, 0x18, 0x04, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, + 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, + 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, 0x61, 0x6d, 0x70, 0x52, 0x09, 0x63, 0x72, 0x65, 0x61, 0x74, + 0x65, 0x64, 0x41, 0x74, 0x12, 0x37, 0x0a, 0x09, 0x6c, 0x61, 0x73, 0x74, 0x5f, 0x73, 0x65, 0x65, + 0x6e, 0x18, 0x05, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, 0x65, + 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, 0x74, + 0x61, 0x6d, 0x70, 0x52, 0x08, 0x6c, 0x61, 0x73, 0x74, 0x53, 0x65, 0x65, 0x6e, 0x22, 0x51, 0x0a, + 0x13, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x71, + 0x75, 0x65, 0x73, 0x74, 0x12, 0x3a, 0x0a, 0x0a, 0x65, 0x78, 0x70, 0x69, 0x72, 0x61, 0x74, 0x69, + 0x6f, 0x6e, 0x18, 0x01, 0x20, 0x01, 0x28, 0x0b, 0x32, 0x1a, 0x2e, 0x67, 0x6f, 0x6f, 0x67, 0x6c, + 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x62, 0x75, 0x66, 0x2e, 0x54, 0x69, 0x6d, 0x65, 0x73, + 0x74, 0x61, 0x6d, 0x70, 0x52, 0x0a, 0x65, 0x78, 0x70, 0x69, 0x72, 0x61, 0x74, 0x69, 0x6f, 0x6e, + 0x22, 0x2f, 0x0a, 0x14, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, + 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x17, 0x0a, 0x07, 0x61, 0x70, 0x69, 0x5f, + 0x6b, 0x65, 0x79, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x61, 0x70, 0x69, 0x4b, 0x65, + 0x79, 0x22, 0x2d, 0x0a, 0x13, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, + 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x12, 0x16, 0x0a, 0x06, 0x70, 0x72, 0x65, 0x66, + 0x69, 0x78, 0x18, 0x01, 0x20, 0x01, 0x28, 0x09, 0x52, 0x06, 0x70, 0x72, 0x65, 0x66, 0x69, 0x78, + 0x22, 0x16, 0x0a, 0x14, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, + 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x14, 0x0a, 0x12, 0x4c, 0x69, 0x73, 0x74, + 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x22, 0x46, + 0x0a, 0x13, 0x4c, 0x69, 0x73, 0x74, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x73, 0x52, 0x65, 0x73, + 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x12, 0x2f, 0x0a, 0x08, 0x61, 0x70, 0x69, 0x5f, 0x6b, 0x65, 0x79, + 0x73, 0x18, 0x01, 0x20, 0x03, 0x28, 0x0b, 0x32, 0x14, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, + 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x52, 0x07, 0x61, + 0x70, 0x69, 0x4b, 0x65, 0x79, 0x73, 0x42, 0x29, 0x5a, 0x27, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, + 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x6a, 0x75, 0x61, 0x6e, 0x66, 0x6f, 0x6e, 0x74, 0x2f, 0x68, 0x65, + 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2f, 0x67, 0x65, 0x6e, 0x2f, 0x67, 0x6f, 0x2f, 0x76, + 0x31, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, +} + +var ( + file_headscale_v1_apikey_proto_rawDescOnce sync.Once + file_headscale_v1_apikey_proto_rawDescData = file_headscale_v1_apikey_proto_rawDesc +) + +func file_headscale_v1_apikey_proto_rawDescGZIP() []byte { + file_headscale_v1_apikey_proto_rawDescOnce.Do(func() { + file_headscale_v1_apikey_proto_rawDescData = protoimpl.X.CompressGZIP(file_headscale_v1_apikey_proto_rawDescData) + }) + return file_headscale_v1_apikey_proto_rawDescData +} + +var file_headscale_v1_apikey_proto_msgTypes = make([]protoimpl.MessageInfo, 7) +var file_headscale_v1_apikey_proto_goTypes = []interface{}{ + (*ApiKey)(nil), // 0: headscale.v1.ApiKey + (*CreateApiKeyRequest)(nil), // 1: headscale.v1.CreateApiKeyRequest + (*CreateApiKeyResponse)(nil), // 2: headscale.v1.CreateApiKeyResponse + (*ExpireApiKeyRequest)(nil), // 3: headscale.v1.ExpireApiKeyRequest + (*ExpireApiKeyResponse)(nil), // 4: headscale.v1.ExpireApiKeyResponse + (*ListApiKeysRequest)(nil), // 5: headscale.v1.ListApiKeysRequest + (*ListApiKeysResponse)(nil), // 6: headscale.v1.ListApiKeysResponse + (*timestamppb.Timestamp)(nil), // 7: google.protobuf.Timestamp +} +var file_headscale_v1_apikey_proto_depIdxs = []int32{ + 7, // 0: headscale.v1.ApiKey.expiration:type_name -> google.protobuf.Timestamp + 7, // 1: headscale.v1.ApiKey.created_at:type_name -> google.protobuf.Timestamp + 7, // 2: headscale.v1.ApiKey.last_seen:type_name -> google.protobuf.Timestamp + 7, // 3: headscale.v1.CreateApiKeyRequest.expiration:type_name -> google.protobuf.Timestamp + 0, // 4: headscale.v1.ListApiKeysResponse.api_keys:type_name -> headscale.v1.ApiKey + 5, // [5:5] is the sub-list for method output_type + 5, // [5:5] is the sub-list for method input_type + 5, // [5:5] is the sub-list for extension type_name + 5, // [5:5] is the sub-list for extension extendee + 0, // [0:5] is the sub-list for field type_name +} + +func init() { file_headscale_v1_apikey_proto_init() } +func file_headscale_v1_apikey_proto_init() { + if File_headscale_v1_apikey_proto != nil { + return + } + if !protoimpl.UnsafeEnabled { + file_headscale_v1_apikey_proto_msgTypes[0].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*ApiKey); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_headscale_v1_apikey_proto_msgTypes[1].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*CreateApiKeyRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_headscale_v1_apikey_proto_msgTypes[2].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*CreateApiKeyResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_headscale_v1_apikey_proto_msgTypes[3].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*ExpireApiKeyRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_headscale_v1_apikey_proto_msgTypes[4].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*ExpireApiKeyResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_headscale_v1_apikey_proto_msgTypes[5].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*ListApiKeysRequest); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + file_headscale_v1_apikey_proto_msgTypes[6].Exporter = func(v interface{}, i int) interface{} { + switch v := v.(*ListApiKeysResponse); i { + case 0: + return &v.state + case 1: + return &v.sizeCache + case 2: + return &v.unknownFields + default: + return nil + } + } + } + type x struct{} + out := protoimpl.TypeBuilder{ + File: protoimpl.DescBuilder{ + GoPackagePath: reflect.TypeOf(x{}).PkgPath(), + RawDescriptor: file_headscale_v1_apikey_proto_rawDesc, + NumEnums: 0, + NumMessages: 7, + NumExtensions: 0, + NumServices: 0, + }, + GoTypes: file_headscale_v1_apikey_proto_goTypes, + DependencyIndexes: file_headscale_v1_apikey_proto_depIdxs, + MessageInfos: file_headscale_v1_apikey_proto_msgTypes, + }.Build() + File_headscale_v1_apikey_proto = out.File + file_headscale_v1_apikey_proto_rawDesc = nil + file_headscale_v1_apikey_proto_goTypes = nil + file_headscale_v1_apikey_proto_depIdxs = nil +} diff --git a/gen/go/headscale/v1/device.pb.go b/gen/go/headscale/v1/device.pb.go index a3b5911a..58792512 100644 --- a/gen/go/headscale/v1/device.pb.go +++ b/gen/go/headscale/v1/device.pb.go @@ -1,17 +1,18 @@ // Code generated by protoc-gen-go. DO NOT EDIT. // versions: // protoc-gen-go v1.27.1 -// protoc v3.17.3 +// protoc (unknown) // source: headscale/v1/device.proto package v1 import ( + reflect "reflect" + sync "sync" + protoreflect "google.golang.org/protobuf/reflect/protoreflect" protoimpl "google.golang.org/protobuf/runtime/protoimpl" timestamppb "google.golang.org/protobuf/types/known/timestamppb" - reflect "reflect" - sync "sync" ) const ( diff --git a/gen/go/headscale/v1/headscale.pb.go b/gen/go/headscale/v1/headscale.pb.go index ad8a50d7..7799082d 100644 --- a/gen/go/headscale/v1/headscale.pb.go +++ b/gen/go/headscale/v1/headscale.pb.go @@ -1,16 +1,17 @@ // Code generated by protoc-gen-go. DO NOT EDIT. // versions: // protoc-gen-go v1.27.1 -// protoc v3.17.3 +// protoc (unknown) // source: headscale/v1/headscale.proto package v1 import ( + reflect "reflect" + _ "google.golang.org/genproto/googleapis/api/annotations" protoreflect "google.golang.org/protobuf/reflect/protoreflect" protoimpl "google.golang.org/protobuf/runtime/protoimpl" - reflect "reflect" ) const ( @@ -34,162 +35,185 @@ var file_headscale_v1_headscale_proto_rawDesc = []byte{ 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x1a, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x19, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2f, 0x76, - 0x31, 0x2f, 0x72, 0x6f, 0x75, 0x74, 0x65, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x32, 0xf4, - 0x12, 0x0a, 0x10, 0x48, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x53, 0x65, 0x72, 0x76, - 0x69, 0x63, 0x65, 0x12, 0x77, 0x0a, 0x0c, 0x47, 0x65, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, - 0x61, 0x63, 0x65, 0x12, 0x21, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, - 0x76, 0x31, 0x2e, 0x47, 0x65, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, - 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, - 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, - 0x63, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x20, 0x82, 0xd3, 0xe4, 0x93, - 0x02, 0x1a, 0x12, 0x18, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6e, 0x61, 0x6d, 0x65, - 0x73, 0x70, 0x61, 0x63, 0x65, 0x2f, 0x7b, 0x6e, 0x61, 0x6d, 0x65, 0x7d, 0x12, 0x7c, 0x0a, 0x0f, - 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x12, - 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x43, - 0x72, 0x65, 0x61, 0x74, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, - 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, - 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, - 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x1c, 0x82, 0xd3, - 0xe4, 0x93, 0x02, 0x16, 0x22, 0x11, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6e, 0x61, - 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x3a, 0x01, 0x2a, 0x12, 0x96, 0x01, 0x0a, 0x0f, 0x52, - 0x65, 0x6e, 0x61, 0x6d, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x12, 0x24, - 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x52, 0x65, - 0x6e, 0x61, 0x6d, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x71, - 0x75, 0x65, 0x73, 0x74, 0x1a, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, - 0x2e, 0x76, 0x31, 0x2e, 0x52, 0x65, 0x6e, 0x61, 0x6d, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, - 0x61, 0x63, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x36, 0x82, 0xd3, 0xe4, - 0x93, 0x02, 0x30, 0x22, 0x2e, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6e, 0x61, 0x6d, - 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x2f, 0x7b, 0x6f, 0x6c, 0x64, 0x5f, 0x6e, 0x61, 0x6d, 0x65, - 0x7d, 0x2f, 0x72, 0x65, 0x6e, 0x61, 0x6d, 0x65, 0x2f, 0x7b, 0x6e, 0x65, 0x77, 0x5f, 0x6e, 0x61, - 0x6d, 0x65, 0x7d, 0x12, 0x80, 0x01, 0x0a, 0x0f, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4e, 0x61, - 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x12, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, - 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4e, 0x61, 0x6d, - 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x25, 0x2e, - 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, 0x6c, - 0x65, 0x74, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x73, 0x70, - 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x20, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1a, 0x2a, 0x18, 0x2f, 0x61, - 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x2f, - 0x7b, 0x6e, 0x61, 0x6d, 0x65, 0x7d, 0x12, 0x76, 0x0a, 0x0e, 0x4c, 0x69, 0x73, 0x74, 0x4e, 0x61, - 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x12, 0x23, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, - 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, - 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x24, 0x2e, - 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, - 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, - 0x6e, 0x73, 0x65, 0x22, 0x19, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x13, 0x12, 0x11, 0x2f, 0x61, 0x70, - 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x12, 0x80, - 0x01, 0x0a, 0x10, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, - 0x4b, 0x65, 0x79, 0x12, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, - 0x76, 0x31, 0x2e, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, - 0x4b, 0x65, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x26, 0x2e, 0x68, 0x65, 0x61, + 0x31, 0x2f, 0x72, 0x6f, 0x75, 0x74, 0x65, 0x73, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x1a, 0x19, + 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2f, 0x76, 0x31, 0x2f, 0x61, 0x70, 0x69, + 0x6b, 0x65, 0x79, 0x2e, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x32, 0xcb, 0x15, 0x0a, 0x10, 0x48, 0x65, + 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x53, 0x65, 0x72, 0x76, 0x69, 0x63, 0x65, 0x12, 0x77, + 0x0a, 0x0c, 0x47, 0x65, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x12, 0x21, + 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, + 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, + 0x74, 0x1a, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, + 0x2e, 0x47, 0x65, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x73, + 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x20, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1a, 0x12, 0x18, 0x2f, + 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, + 0x2f, 0x7b, 0x6e, 0x61, 0x6d, 0x65, 0x7d, 0x12, 0x7c, 0x0a, 0x0f, 0x43, 0x72, 0x65, 0x61, 0x74, + 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x12, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, - 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, - 0x73, 0x65, 0x22, 0x1d, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x17, 0x22, 0x12, 0x2f, 0x61, 0x70, 0x69, - 0x2f, 0x76, 0x31, 0x2f, 0x70, 0x72, 0x65, 0x61, 0x75, 0x74, 0x68, 0x6b, 0x65, 0x79, 0x3a, 0x01, - 0x2a, 0x12, 0x87, 0x01, 0x0a, 0x10, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x50, 0x72, 0x65, 0x41, - 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x12, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, - 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x50, 0x72, 0x65, 0x41, - 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x26, 0x2e, - 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x78, 0x70, - 0x69, 0x72, 0x65, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x73, - 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x24, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1e, 0x22, 0x19, 0x2f, - 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x70, 0x72, 0x65, 0x61, 0x75, 0x74, 0x68, 0x6b, 0x65, - 0x79, 0x2f, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65, 0x3a, 0x01, 0x2a, 0x12, 0x7a, 0x0a, 0x0f, 0x4c, - 0x69, 0x73, 0x74, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x73, 0x12, 0x24, - 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, - 0x73, 0x74, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x73, 0x52, 0x65, 0x71, - 0x75, 0x65, 0x73, 0x74, 0x1a, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, - 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, - 0x65, 0x79, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x1a, 0x82, 0xd3, 0xe4, - 0x93, 0x02, 0x14, 0x12, 0x12, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x70, 0x72, 0x65, - 0x61, 0x75, 0x74, 0x68, 0x6b, 0x65, 0x79, 0x12, 0x89, 0x01, 0x0a, 0x12, 0x44, 0x65, 0x62, 0x75, - 0x67, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x27, - 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, - 0x62, 0x75, 0x67, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, - 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x28, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, - 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, 0x62, 0x75, 0x67, 0x43, 0x72, 0x65, 0x61, - 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, - 0x65, 0x22, 0x20, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1a, 0x22, 0x15, 0x2f, 0x61, 0x70, 0x69, 0x2f, - 0x76, 0x31, 0x2f, 0x64, 0x65, 0x62, 0x75, 0x67, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, - 0x3a, 0x01, 0x2a, 0x12, 0x75, 0x0a, 0x0a, 0x47, 0x65, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, - 0x65, 0x12, 0x1f, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, - 0x2e, 0x47, 0x65, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, - 0x73, 0x74, 0x1a, 0x20, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, - 0x31, 0x2e, 0x47, 0x65, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, - 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x24, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1e, 0x12, 0x1c, 0x2f, 0x61, - 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2f, 0x7b, 0x6d, - 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x12, 0x80, 0x01, 0x0a, 0x0f, 0x52, - 0x65, 0x67, 0x69, 0x73, 0x74, 0x65, 0x72, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x24, - 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x52, 0x65, - 0x67, 0x69, 0x73, 0x74, 0x65, 0x72, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, - 0x75, 0x65, 0x73, 0x74, 0x1a, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, - 0x2e, 0x76, 0x31, 0x2e, 0x52, 0x65, 0x67, 0x69, 0x73, 0x74, 0x65, 0x72, 0x4d, 0x61, 0x63, 0x68, - 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x20, 0x82, 0xd3, 0xe4, - 0x93, 0x02, 0x1a, 0x22, 0x18, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, - 0x68, 0x69, 0x6e, 0x65, 0x2f, 0x72, 0x65, 0x67, 0x69, 0x73, 0x74, 0x65, 0x72, 0x12, 0x7e, 0x0a, - 0x0d, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x22, - 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, - 0x6c, 0x65, 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, - 0x73, 0x74, 0x1a, 0x23, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, - 0x31, 0x2e, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, - 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x24, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1e, 0x2a, - 0x1c, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, - 0x2f, 0x7b, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x12, 0x85, 0x01, - 0x0a, 0x0d, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, - 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, - 0x78, 0x70, 0x69, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, - 0x65, 0x73, 0x74, 0x1a, 0x23, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, - 0x76, 0x31, 0x2e, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, - 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x2b, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x25, - 0x22, 0x23, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, - 0x65, 0x2f, 0x7b, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x2f, 0x65, - 0x78, 0x70, 0x69, 0x72, 0x65, 0x12, 0x6e, 0x0a, 0x0c, 0x4c, 0x69, 0x73, 0x74, 0x4d, 0x61, 0x63, - 0x68, 0x69, 0x6e, 0x65, 0x73, 0x12, 0x21, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, - 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, - 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, - 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x4d, 0x61, 0x63, 0x68, - 0x69, 0x6e, 0x65, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x17, 0x82, 0xd3, - 0xe4, 0x93, 0x02, 0x11, 0x12, 0x0f, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, - 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x8d, 0x01, 0x0a, 0x0c, 0x53, 0x68, 0x61, 0x72, 0x65, 0x4d, - 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x21, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, - 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x53, 0x68, 0x61, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, - 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, - 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x53, 0x68, 0x61, 0x72, 0x65, 0x4d, 0x61, - 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x36, 0x82, - 0xd3, 0xe4, 0x93, 0x02, 0x30, 0x22, 0x2e, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, - 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2f, 0x7b, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, - 0x69, 0x64, 0x7d, 0x2f, 0x73, 0x68, 0x61, 0x72, 0x65, 0x2f, 0x7b, 0x6e, 0x61, 0x6d, 0x65, 0x73, - 0x70, 0x61, 0x63, 0x65, 0x7d, 0x12, 0x95, 0x01, 0x0a, 0x0e, 0x55, 0x6e, 0x73, 0x68, 0x61, 0x72, - 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x23, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, - 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x6e, 0x73, 0x68, 0x61, 0x72, 0x65, 0x4d, - 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x24, 0x2e, - 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x6e, 0x73, - 0x68, 0x61, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, - 0x6e, 0x73, 0x65, 0x22, 0x38, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x32, 0x22, 0x30, 0x2f, 0x61, 0x70, + 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, + 0x1a, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, + 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, + 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x1c, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x16, 0x22, + 0x11, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, + 0x63, 0x65, 0x3a, 0x01, 0x2a, 0x12, 0x96, 0x01, 0x0a, 0x0f, 0x52, 0x65, 0x6e, 0x61, 0x6d, 0x65, + 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x12, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, + 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x52, 0x65, 0x6e, 0x61, 0x6d, 0x65, 0x4e, + 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, + 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x52, + 0x65, 0x6e, 0x61, 0x6d, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, + 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x36, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x30, 0x22, 0x2e, + 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, + 0x65, 0x2f, 0x7b, 0x6f, 0x6c, 0x64, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x7d, 0x2f, 0x72, 0x65, 0x6e, + 0x61, 0x6d, 0x65, 0x2f, 0x7b, 0x6e, 0x65, 0x77, 0x5f, 0x6e, 0x61, 0x6d, 0x65, 0x7d, 0x12, 0x80, + 0x01, 0x0a, 0x0f, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, + 0x63, 0x65, 0x12, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, + 0x31, 0x2e, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, + 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, + 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4e, 0x61, + 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, + 0x20, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1a, 0x2a, 0x18, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, + 0x2f, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x2f, 0x7b, 0x6e, 0x61, 0x6d, 0x65, + 0x7d, 0x12, 0x76, 0x0a, 0x0e, 0x4c, 0x69, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, + 0x63, 0x65, 0x73, 0x12, 0x23, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, + 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, + 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, + 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x4e, 0x61, 0x6d, 0x65, + 0x73, 0x70, 0x61, 0x63, 0x65, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x19, + 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x13, 0x12, 0x11, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, + 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x12, 0x80, 0x01, 0x0a, 0x10, 0x43, 0x72, + 0x65, 0x61, 0x74, 0x65, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x12, 0x25, + 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x43, 0x72, + 0x65, 0x61, 0x74, 0x65, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x52, 0x65, + 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x26, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, + 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x50, 0x72, 0x65, 0x41, 0x75, + 0x74, 0x68, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x1d, 0x82, + 0xd3, 0xe4, 0x93, 0x02, 0x17, 0x22, 0x12, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x70, + 0x72, 0x65, 0x61, 0x75, 0x74, 0x68, 0x6b, 0x65, 0x79, 0x3a, 0x01, 0x2a, 0x12, 0x87, 0x01, 0x0a, + 0x10, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, + 0x79, 0x12, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, + 0x2e, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, + 0x79, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x26, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, + 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x50, 0x72, + 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, + 0x22, 0x24, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1e, 0x22, 0x19, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, + 0x31, 0x2f, 0x70, 0x72, 0x65, 0x61, 0x75, 0x74, 0x68, 0x6b, 0x65, 0x79, 0x2f, 0x65, 0x78, 0x70, + 0x69, 0x72, 0x65, 0x3a, 0x01, 0x2a, 0x12, 0x7a, 0x0a, 0x0f, 0x4c, 0x69, 0x73, 0x74, 0x50, 0x72, + 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x73, 0x12, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, + 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x50, 0x72, 0x65, + 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, + 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, + 0x69, 0x73, 0x74, 0x50, 0x72, 0x65, 0x41, 0x75, 0x74, 0x68, 0x4b, 0x65, 0x79, 0x73, 0x52, 0x65, + 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x1a, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x14, 0x12, 0x12, + 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x70, 0x72, 0x65, 0x61, 0x75, 0x74, 0x68, 0x6b, + 0x65, 0x79, 0x12, 0x89, 0x01, 0x0a, 0x12, 0x44, 0x65, 0x62, 0x75, 0x67, 0x43, 0x72, 0x65, 0x61, + 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x27, 0x2e, 0x68, 0x65, 0x61, 0x64, + 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, 0x62, 0x75, 0x67, 0x43, 0x72, + 0x65, 0x61, 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, + 0x73, 0x74, 0x1a, 0x28, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, + 0x31, 0x2e, 0x44, 0x65, 0x62, 0x75, 0x67, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x4d, 0x61, 0x63, + 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x20, 0x82, 0xd3, + 0xe4, 0x93, 0x02, 0x1a, 0x22, 0x15, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x64, 0x65, + 0x62, 0x75, 0x67, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x3a, 0x01, 0x2a, 0x12, 0x75, + 0x0a, 0x0a, 0x47, 0x65, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x1f, 0x2e, 0x68, + 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x74, 0x4d, + 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x20, 0x2e, + 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x74, + 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, + 0x24, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1e, 0x12, 0x1c, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, + 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2f, 0x7b, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, + 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x12, 0x80, 0x01, 0x0a, 0x0f, 0x52, 0x65, 0x67, 0x69, 0x73, 0x74, + 0x65, 0x72, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, + 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x52, 0x65, 0x67, 0x69, 0x73, 0x74, 0x65, + 0x72, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, + 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x52, + 0x65, 0x67, 0x69, 0x73, 0x74, 0x65, 0x72, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, + 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x20, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1a, 0x22, 0x18, + 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2f, + 0x72, 0x65, 0x67, 0x69, 0x73, 0x74, 0x65, 0x72, 0x12, 0x7e, 0x0a, 0x0d, 0x44, 0x65, 0x6c, 0x65, + 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, + 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, 0x6c, 0x65, 0x74, 0x65, 0x4d, + 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x23, 0x2e, + 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x44, 0x65, 0x6c, + 0x65, 0x74, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, + 0x73, 0x65, 0x22, 0x24, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x1e, 0x2a, 0x1c, 0x2f, 0x61, 0x70, 0x69, + 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2f, 0x7b, 0x6d, 0x61, 0x63, + 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x12, 0x85, 0x01, 0x0a, 0x0d, 0x45, 0x78, 0x70, + 0x69, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x12, 0x22, 0x2e, 0x68, 0x65, 0x61, + 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, + 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x23, + 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x78, + 0x70, 0x69, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, + 0x6e, 0x73, 0x65, 0x22, 0x2b, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x25, 0x22, 0x23, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2f, 0x7b, 0x6d, 0x61, - 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x2f, 0x75, 0x6e, 0x73, 0x68, 0x61, 0x72, - 0x65, 0x2f, 0x7b, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x7d, 0x12, 0x8b, 0x01, - 0x0a, 0x0f, 0x47, 0x65, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, - 0x65, 0x12, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, - 0x2e, 0x47, 0x65, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, 0x65, - 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, - 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, - 0x65, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x2b, - 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x25, 0x12, 0x23, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, + 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x2f, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65, + 0x12, 0x6e, 0x0a, 0x0c, 0x4c, 0x69, 0x73, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x73, + 0x12, 0x21, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, + 0x4c, 0x69, 0x73, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x73, 0x52, 0x65, 0x71, 0x75, + 0x65, 0x73, 0x74, 0x1a, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, + 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x73, 0x52, + 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x17, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x11, 0x12, + 0x0f, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, + 0x12, 0x8d, 0x01, 0x0a, 0x0c, 0x53, 0x68, 0x61, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, + 0x65, 0x12, 0x21, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, + 0x2e, 0x53, 0x68, 0x61, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x71, + 0x75, 0x65, 0x73, 0x74, 0x1a, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, + 0x2e, 0x76, 0x31, 0x2e, 0x53, 0x68, 0x61, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, + 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x36, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x30, + 0x22, 0x2e, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, + 0x65, 0x2f, 0x7b, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x2f, 0x73, + 0x68, 0x61, 0x72, 0x65, 0x2f, 0x7b, 0x6e, 0x61, 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x7d, + 0x12, 0x95, 0x01, 0x0a, 0x0e, 0x55, 0x6e, 0x73, 0x68, 0x61, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, + 0x69, 0x6e, 0x65, 0x12, 0x23, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, + 0x76, 0x31, 0x2e, 0x55, 0x6e, 0x73, 0x68, 0x61, 0x72, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, + 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x24, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, + 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x55, 0x6e, 0x73, 0x68, 0x61, 0x72, 0x65, 0x4d, + 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x38, + 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x32, 0x22, 0x30, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2f, 0x7b, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, - 0x5f, 0x69, 0x64, 0x7d, 0x2f, 0x72, 0x6f, 0x75, 0x74, 0x65, 0x73, 0x12, 0x97, 0x01, 0x0a, 0x13, - 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, - 0x74, 0x65, 0x73, 0x12, 0x28, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, - 0x76, 0x31, 0x2e, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, - 0x52, 0x6f, 0x75, 0x74, 0x65, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x29, 0x2e, - 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x6e, 0x61, - 0x62, 0x6c, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x73, - 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x2b, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x25, - 0x22, 0x23, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, - 0x65, 0x2f, 0x7b, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x2f, 0x72, - 0x6f, 0x75, 0x74, 0x65, 0x73, 0x42, 0x29, 0x5a, 0x27, 0x67, 0x69, 0x74, 0x68, 0x75, 0x62, 0x2e, - 0x63, 0x6f, 0x6d, 0x2f, 0x6a, 0x75, 0x61, 0x6e, 0x66, 0x6f, 0x6e, 0x74, 0x2f, 0x68, 0x65, 0x61, - 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2f, 0x67, 0x65, 0x6e, 0x2f, 0x67, 0x6f, 0x2f, 0x76, 0x31, - 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, + 0x5f, 0x69, 0x64, 0x7d, 0x2f, 0x75, 0x6e, 0x73, 0x68, 0x61, 0x72, 0x65, 0x2f, 0x7b, 0x6e, 0x61, + 0x6d, 0x65, 0x73, 0x70, 0x61, 0x63, 0x65, 0x7d, 0x12, 0x8b, 0x01, 0x0a, 0x0f, 0x47, 0x65, 0x74, + 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x12, 0x24, 0x2e, 0x68, + 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x47, 0x65, 0x74, 0x4d, + 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x52, 0x65, 0x71, 0x75, 0x65, + 0x73, 0x74, 0x1a, 0x25, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, + 0x31, 0x2e, 0x47, 0x65, 0x74, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, + 0x65, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x2b, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x25, 0x12, 0x23, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, + 0x6e, 0x65, 0x2f, 0x7b, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x2f, + 0x72, 0x6f, 0x75, 0x74, 0x65, 0x73, 0x12, 0x97, 0x01, 0x0a, 0x13, 0x45, 0x6e, 0x61, 0x62, 0x6c, + 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x73, 0x12, 0x28, + 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x6e, + 0x61, 0x62, 0x6c, 0x65, 0x4d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, 0x65, + 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x29, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, + 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x6e, 0x61, 0x62, 0x6c, 0x65, 0x4d, 0x61, + 0x63, 0x68, 0x69, 0x6e, 0x65, 0x52, 0x6f, 0x75, 0x74, 0x65, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, + 0x6e, 0x73, 0x65, 0x22, 0x2b, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x25, 0x22, 0x23, 0x2f, 0x61, 0x70, + 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x6d, 0x61, 0x63, 0x68, 0x69, 0x6e, 0x65, 0x2f, 0x7b, 0x6d, 0x61, + 0x63, 0x68, 0x69, 0x6e, 0x65, 0x5f, 0x69, 0x64, 0x7d, 0x2f, 0x72, 0x6f, 0x75, 0x74, 0x65, 0x73, + 0x12, 0x70, 0x0a, 0x0c, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, + 0x12, 0x21, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, + 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x52, 0x65, 0x71, 0x75, + 0x65, 0x73, 0x74, 0x1a, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, + 0x76, 0x31, 0x2e, 0x43, 0x72, 0x65, 0x61, 0x74, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x52, + 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x19, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x13, 0x22, + 0x0e, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x61, 0x70, 0x69, 0x6b, 0x65, 0x79, 0x3a, + 0x01, 0x2a, 0x12, 0x77, 0x0a, 0x0c, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x41, 0x70, 0x69, 0x4b, + 0x65, 0x79, 0x12, 0x21, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, + 0x31, 0x2e, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x52, 0x65, + 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x22, 0x2e, 0x68, 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, + 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x45, 0x78, 0x70, 0x69, 0x72, 0x65, 0x41, 0x70, 0x69, 0x4b, 0x65, + 0x79, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, 0x20, 0x82, 0xd3, 0xe4, 0x93, 0x02, + 0x1a, 0x22, 0x15, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, 0x2f, 0x61, 0x70, 0x69, 0x6b, 0x65, + 0x79, 0x2f, 0x65, 0x78, 0x70, 0x69, 0x72, 0x65, 0x3a, 0x01, 0x2a, 0x12, 0x6a, 0x0a, 0x0b, 0x4c, + 0x69, 0x73, 0x74, 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x73, 0x12, 0x20, 0x2e, 0x68, 0x65, 0x61, + 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, 0x41, 0x70, + 0x69, 0x4b, 0x65, 0x79, 0x73, 0x52, 0x65, 0x71, 0x75, 0x65, 0x73, 0x74, 0x1a, 0x21, 0x2e, 0x68, + 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2e, 0x76, 0x31, 0x2e, 0x4c, 0x69, 0x73, 0x74, + 0x41, 0x70, 0x69, 0x4b, 0x65, 0x79, 0x73, 0x52, 0x65, 0x73, 0x70, 0x6f, 0x6e, 0x73, 0x65, 0x22, + 0x16, 0x82, 0xd3, 0xe4, 0x93, 0x02, 0x10, 0x12, 0x0e, 0x2f, 0x61, 0x70, 0x69, 0x2f, 0x76, 0x31, + 0x2f, 0x61, 0x70, 0x69, 0x6b, 0x65, 0x79, 0x42, 0x29, 0x5a, 0x27, 0x67, 0x69, 0x74, 0x68, 0x75, + 0x62, 0x2e, 0x63, 0x6f, 0x6d, 0x2f, 0x6a, 0x75, 0x61, 0x6e, 0x66, 0x6f, 0x6e, 0x74, 0x2f, 0x68, + 0x65, 0x61, 0x64, 0x73, 0x63, 0x61, 0x6c, 0x65, 0x2f, 0x67, 0x65, 0x6e, 0x2f, 0x67, 0x6f, 0x2f, + 0x76, 0x31, 0x62, 0x06, 0x70, 0x72, 0x6f, 0x74, 0x6f, 0x33, } var file_headscale_v1_headscale_proto_goTypes = []interface{}{ @@ -211,24 +235,30 @@ var file_headscale_v1_headscale_proto_goTypes = []interface{}{ (*UnshareMachineRequest)(nil), // 15: headscale.v1.UnshareMachineRequest (*GetMachineRouteRequest)(nil), // 16: headscale.v1.GetMachineRouteRequest (*EnableMachineRoutesRequest)(nil), // 17: headscale.v1.EnableMachineRoutesRequest - (*GetNamespaceResponse)(nil), // 18: headscale.v1.GetNamespaceResponse - (*CreateNamespaceResponse)(nil), // 19: headscale.v1.CreateNamespaceResponse - (*RenameNamespaceResponse)(nil), // 20: headscale.v1.RenameNamespaceResponse - (*DeleteNamespaceResponse)(nil), // 21: headscale.v1.DeleteNamespaceResponse - (*ListNamespacesResponse)(nil), // 22: headscale.v1.ListNamespacesResponse - (*CreatePreAuthKeyResponse)(nil), // 23: headscale.v1.CreatePreAuthKeyResponse - (*ExpirePreAuthKeyResponse)(nil), // 24: headscale.v1.ExpirePreAuthKeyResponse - (*ListPreAuthKeysResponse)(nil), // 25: headscale.v1.ListPreAuthKeysResponse - (*DebugCreateMachineResponse)(nil), // 26: headscale.v1.DebugCreateMachineResponse - (*GetMachineResponse)(nil), // 27: headscale.v1.GetMachineResponse - (*RegisterMachineResponse)(nil), // 28: headscale.v1.RegisterMachineResponse - (*DeleteMachineResponse)(nil), // 29: headscale.v1.DeleteMachineResponse - (*ExpireMachineResponse)(nil), // 30: headscale.v1.ExpireMachineResponse - (*ListMachinesResponse)(nil), // 31: headscale.v1.ListMachinesResponse - (*ShareMachineResponse)(nil), // 32: headscale.v1.ShareMachineResponse - (*UnshareMachineResponse)(nil), // 33: headscale.v1.UnshareMachineResponse - (*GetMachineRouteResponse)(nil), // 34: headscale.v1.GetMachineRouteResponse - (*EnableMachineRoutesResponse)(nil), // 35: headscale.v1.EnableMachineRoutesResponse + (*CreateApiKeyRequest)(nil), // 18: headscale.v1.CreateApiKeyRequest + (*ExpireApiKeyRequest)(nil), // 19: headscale.v1.ExpireApiKeyRequest + (*ListApiKeysRequest)(nil), // 20: headscale.v1.ListApiKeysRequest + (*GetNamespaceResponse)(nil), // 21: headscale.v1.GetNamespaceResponse + (*CreateNamespaceResponse)(nil), // 22: headscale.v1.CreateNamespaceResponse + (*RenameNamespaceResponse)(nil), // 23: headscale.v1.RenameNamespaceResponse + (*DeleteNamespaceResponse)(nil), // 24: headscale.v1.DeleteNamespaceResponse + (*ListNamespacesResponse)(nil), // 25: headscale.v1.ListNamespacesResponse + (*CreatePreAuthKeyResponse)(nil), // 26: headscale.v1.CreatePreAuthKeyResponse + (*ExpirePreAuthKeyResponse)(nil), // 27: headscale.v1.ExpirePreAuthKeyResponse + (*ListPreAuthKeysResponse)(nil), // 28: headscale.v1.ListPreAuthKeysResponse + (*DebugCreateMachineResponse)(nil), // 29: headscale.v1.DebugCreateMachineResponse + (*GetMachineResponse)(nil), // 30: headscale.v1.GetMachineResponse + (*RegisterMachineResponse)(nil), // 31: headscale.v1.RegisterMachineResponse + (*DeleteMachineResponse)(nil), // 32: headscale.v1.DeleteMachineResponse + (*ExpireMachineResponse)(nil), // 33: headscale.v1.ExpireMachineResponse + (*ListMachinesResponse)(nil), // 34: headscale.v1.ListMachinesResponse + (*ShareMachineResponse)(nil), // 35: headscale.v1.ShareMachineResponse + (*UnshareMachineResponse)(nil), // 36: headscale.v1.UnshareMachineResponse + (*GetMachineRouteResponse)(nil), // 37: headscale.v1.GetMachineRouteResponse + (*EnableMachineRoutesResponse)(nil), // 38: headscale.v1.EnableMachineRoutesResponse + (*CreateApiKeyResponse)(nil), // 39: headscale.v1.CreateApiKeyResponse + (*ExpireApiKeyResponse)(nil), // 40: headscale.v1.ExpireApiKeyResponse + (*ListApiKeysResponse)(nil), // 41: headscale.v1.ListApiKeysResponse } var file_headscale_v1_headscale_proto_depIdxs = []int32{ 0, // 0: headscale.v1.HeadscaleService.GetNamespace:input_type -> headscale.v1.GetNamespaceRequest @@ -249,26 +279,32 @@ var file_headscale_v1_headscale_proto_depIdxs = []int32{ 15, // 15: headscale.v1.HeadscaleService.UnshareMachine:input_type -> headscale.v1.UnshareMachineRequest 16, // 16: headscale.v1.HeadscaleService.GetMachineRoute:input_type -> headscale.v1.GetMachineRouteRequest 17, // 17: headscale.v1.HeadscaleService.EnableMachineRoutes:input_type -> headscale.v1.EnableMachineRoutesRequest - 18, // 18: headscale.v1.HeadscaleService.GetNamespace:output_type -> headscale.v1.GetNamespaceResponse - 19, // 19: headscale.v1.HeadscaleService.CreateNamespace:output_type -> headscale.v1.CreateNamespaceResponse - 20, // 20: headscale.v1.HeadscaleService.RenameNamespace:output_type -> headscale.v1.RenameNamespaceResponse - 21, // 21: headscale.v1.HeadscaleService.DeleteNamespace:output_type -> headscale.v1.DeleteNamespaceResponse - 22, // 22: headscale.v1.HeadscaleService.ListNamespaces:output_type -> headscale.v1.ListNamespacesResponse - 23, // 23: headscale.v1.HeadscaleService.CreatePreAuthKey:output_type -> headscale.v1.CreatePreAuthKeyResponse - 24, // 24: headscale.v1.HeadscaleService.ExpirePreAuthKey:output_type -> headscale.v1.ExpirePreAuthKeyResponse - 25, // 25: headscale.v1.HeadscaleService.ListPreAuthKeys:output_type -> headscale.v1.ListPreAuthKeysResponse - 26, // 26: headscale.v1.HeadscaleService.DebugCreateMachine:output_type -> headscale.v1.DebugCreateMachineResponse - 27, // 27: headscale.v1.HeadscaleService.GetMachine:output_type -> headscale.v1.GetMachineResponse - 28, // 28: headscale.v1.HeadscaleService.RegisterMachine:output_type -> headscale.v1.RegisterMachineResponse - 29, // 29: headscale.v1.HeadscaleService.DeleteMachine:output_type -> headscale.v1.DeleteMachineResponse - 30, // 30: headscale.v1.HeadscaleService.ExpireMachine:output_type -> headscale.v1.ExpireMachineResponse - 31, // 31: headscale.v1.HeadscaleService.ListMachines:output_type -> headscale.v1.ListMachinesResponse - 32, // 32: headscale.v1.HeadscaleService.ShareMachine:output_type -> headscale.v1.ShareMachineResponse - 33, // 33: headscale.v1.HeadscaleService.UnshareMachine:output_type -> headscale.v1.UnshareMachineResponse - 34, // 34: headscale.v1.HeadscaleService.GetMachineRoute:output_type -> headscale.v1.GetMachineRouteResponse - 35, // 35: headscale.v1.HeadscaleService.EnableMachineRoutes:output_type -> headscale.v1.EnableMachineRoutesResponse - 18, // [18:36] is the sub-list for method output_type - 0, // [0:18] is the sub-list for method input_type + 18, // 18: headscale.v1.HeadscaleService.CreateApiKey:input_type -> headscale.v1.CreateApiKeyRequest + 19, // 19: headscale.v1.HeadscaleService.ExpireApiKey:input_type -> headscale.v1.ExpireApiKeyRequest + 20, // 20: headscale.v1.HeadscaleService.ListApiKeys:input_type -> headscale.v1.ListApiKeysRequest + 21, // 21: headscale.v1.HeadscaleService.GetNamespace:output_type -> headscale.v1.GetNamespaceResponse + 22, // 22: headscale.v1.HeadscaleService.CreateNamespace:output_type -> headscale.v1.CreateNamespaceResponse + 23, // 23: headscale.v1.HeadscaleService.RenameNamespace:output_type -> headscale.v1.RenameNamespaceResponse + 24, // 24: headscale.v1.HeadscaleService.DeleteNamespace:output_type -> headscale.v1.DeleteNamespaceResponse + 25, // 25: headscale.v1.HeadscaleService.ListNamespaces:output_type -> headscale.v1.ListNamespacesResponse + 26, // 26: headscale.v1.HeadscaleService.CreatePreAuthKey:output_type -> headscale.v1.CreatePreAuthKeyResponse + 27, // 27: headscale.v1.HeadscaleService.ExpirePreAuthKey:output_type -> headscale.v1.ExpirePreAuthKeyResponse + 28, // 28: headscale.v1.HeadscaleService.ListPreAuthKeys:output_type -> headscale.v1.ListPreAuthKeysResponse + 29, // 29: headscale.v1.HeadscaleService.DebugCreateMachine:output_type -> headscale.v1.DebugCreateMachineResponse + 30, // 30: headscale.v1.HeadscaleService.GetMachine:output_type -> headscale.v1.GetMachineResponse + 31, // 31: headscale.v1.HeadscaleService.RegisterMachine:output_type -> headscale.v1.RegisterMachineResponse + 32, // 32: headscale.v1.HeadscaleService.DeleteMachine:output_type -> headscale.v1.DeleteMachineResponse + 33, // 33: headscale.v1.HeadscaleService.ExpireMachine:output_type -> headscale.v1.ExpireMachineResponse + 34, // 34: headscale.v1.HeadscaleService.ListMachines:output_type -> headscale.v1.ListMachinesResponse + 35, // 35: headscale.v1.HeadscaleService.ShareMachine:output_type -> headscale.v1.ShareMachineResponse + 36, // 36: headscale.v1.HeadscaleService.UnshareMachine:output_type -> headscale.v1.UnshareMachineResponse + 37, // 37: headscale.v1.HeadscaleService.GetMachineRoute:output_type -> headscale.v1.GetMachineRouteResponse + 38, // 38: headscale.v1.HeadscaleService.EnableMachineRoutes:output_type -> headscale.v1.EnableMachineRoutesResponse + 39, // 39: headscale.v1.HeadscaleService.CreateApiKey:output_type -> headscale.v1.CreateApiKeyResponse + 40, // 40: headscale.v1.HeadscaleService.ExpireApiKey:output_type -> headscale.v1.ExpireApiKeyResponse + 41, // 41: headscale.v1.HeadscaleService.ListApiKeys:output_type -> headscale.v1.ListApiKeysResponse + 21, // [21:42] is the sub-list for method output_type + 0, // [0:21] is the sub-list for method input_type 0, // [0:0] is the sub-list for extension type_name 0, // [0:0] is the sub-list for extension extendee 0, // [0:0] is the sub-list for field type_name @@ -283,6 +319,7 @@ func file_headscale_v1_headscale_proto_init() { file_headscale_v1_preauthkey_proto_init() file_headscale_v1_machine_proto_init() file_headscale_v1_routes_proto_init() + file_headscale_v1_apikey_proto_init() type x struct{} out := protoimpl.TypeBuilder{ File: protoimpl.DescBuilder{ diff --git a/gen/go/headscale/v1/headscale.pb.gw.go b/gen/go/headscale/v1/headscale.pb.gw.go index 41502c8f..b245b895 100644 --- a/gen/go/headscale/v1/headscale.pb.gw.go +++ b/gen/go/headscale/v1/headscale.pb.gw.go @@ -891,6 +891,92 @@ func local_request_HeadscaleService_EnableMachineRoutes_0(ctx context.Context, m } +func request_HeadscaleService_CreateApiKey_0(ctx context.Context, marshaler runtime.Marshaler, client HeadscaleServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq CreateApiKeyRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.CreateApiKey(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func local_request_HeadscaleService_CreateApiKey_0(ctx context.Context, marshaler runtime.Marshaler, server HeadscaleServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq CreateApiKeyRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := server.CreateApiKey(ctx, &protoReq) + return msg, metadata, err + +} + +func request_HeadscaleService_ExpireApiKey_0(ctx context.Context, marshaler runtime.Marshaler, client HeadscaleServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ExpireApiKeyRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := client.ExpireApiKey(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func local_request_HeadscaleService_ExpireApiKey_0(ctx context.Context, marshaler runtime.Marshaler, server HeadscaleServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ExpireApiKeyRequest + var metadata runtime.ServerMetadata + + newReader, berr := utilities.IOReaderFactory(req.Body) + if berr != nil { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", berr) + } + if err := marshaler.NewDecoder(newReader()).Decode(&protoReq); err != nil && err != io.EOF { + return nil, metadata, status.Errorf(codes.InvalidArgument, "%v", err) + } + + msg, err := server.ExpireApiKey(ctx, &protoReq) + return msg, metadata, err + +} + +func request_HeadscaleService_ListApiKeys_0(ctx context.Context, marshaler runtime.Marshaler, client HeadscaleServiceClient, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ListApiKeysRequest + var metadata runtime.ServerMetadata + + msg, err := client.ListApiKeys(ctx, &protoReq, grpc.Header(&metadata.HeaderMD), grpc.Trailer(&metadata.TrailerMD)) + return msg, metadata, err + +} + +func local_request_HeadscaleService_ListApiKeys_0(ctx context.Context, marshaler runtime.Marshaler, server HeadscaleServiceServer, req *http.Request, pathParams map[string]string) (proto.Message, runtime.ServerMetadata, error) { + var protoReq ListApiKeysRequest + var metadata runtime.ServerMetadata + + msg, err := server.ListApiKeys(ctx, &protoReq) + return msg, metadata, err + +} + // RegisterHeadscaleServiceHandlerServer registers the http handlers for service HeadscaleService to "mux". // UnaryRPC :call HeadscaleServiceServer directly. // StreamingRPC :currently unsupported pending https://github.com/grpc/grpc-go/issues/906. @@ -1311,6 +1397,75 @@ func RegisterHeadscaleServiceHandlerServer(ctx context.Context, mux *runtime.Ser }) + mux.Handle("POST", pattern_HeadscaleService_CreateApiKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + var stream runtime.ServerTransportStream + ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/headscale.v1.HeadscaleService/CreateApiKey", runtime.WithHTTPPathPattern("/api/v1/apikey")) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := local_request_HeadscaleService_CreateApiKey_0(rctx, inboundMarshaler, server, req, pathParams) + md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_HeadscaleService_CreateApiKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_HeadscaleService_ExpireApiKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + var stream runtime.ServerTransportStream + ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/headscale.v1.HeadscaleService/ExpireApiKey", runtime.WithHTTPPathPattern("/api/v1/apikey/expire")) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := local_request_HeadscaleService_ExpireApiKey_0(rctx, inboundMarshaler, server, req, pathParams) + md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_HeadscaleService_ExpireApiKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_HeadscaleService_ListApiKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + var stream runtime.ServerTransportStream + ctx = grpc.NewContextWithServerTransportStream(ctx, &stream) + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateIncomingContext(ctx, mux, req, "/headscale.v1.HeadscaleService/ListApiKeys", runtime.WithHTTPPathPattern("/api/v1/apikey")) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := local_request_HeadscaleService_ListApiKeys_0(rctx, inboundMarshaler, server, req, pathParams) + md.HeaderMD, md.TrailerMD = metadata.Join(md.HeaderMD, stream.Header()), metadata.Join(md.TrailerMD, stream.Trailer()) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_HeadscaleService_ListApiKeys_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + return nil } @@ -1712,6 +1867,66 @@ func RegisterHeadscaleServiceHandlerClient(ctx context.Context, mux *runtime.Ser }) + mux.Handle("POST", pattern_HeadscaleService_CreateApiKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req, "/headscale.v1.HeadscaleService/CreateApiKey", runtime.WithHTTPPathPattern("/api/v1/apikey")) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_HeadscaleService_CreateApiKey_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_HeadscaleService_CreateApiKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("POST", pattern_HeadscaleService_ExpireApiKey_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req, "/headscale.v1.HeadscaleService/ExpireApiKey", runtime.WithHTTPPathPattern("/api/v1/apikey/expire")) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_HeadscaleService_ExpireApiKey_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_HeadscaleService_ExpireApiKey_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + + mux.Handle("GET", pattern_HeadscaleService_ListApiKeys_0, func(w http.ResponseWriter, req *http.Request, pathParams map[string]string) { + ctx, cancel := context.WithCancel(req.Context()) + defer cancel() + inboundMarshaler, outboundMarshaler := runtime.MarshalerForRequest(mux, req) + rctx, err := runtime.AnnotateContext(ctx, mux, req, "/headscale.v1.HeadscaleService/ListApiKeys", runtime.WithHTTPPathPattern("/api/v1/apikey")) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + resp, md, err := request_HeadscaleService_ListApiKeys_0(rctx, inboundMarshaler, client, req, pathParams) + ctx = runtime.NewServerMetadataContext(ctx, md) + if err != nil { + runtime.HTTPError(ctx, mux, outboundMarshaler, w, req, err) + return + } + + forward_HeadscaleService_ListApiKeys_0(ctx, mux, outboundMarshaler, w, req, resp, mux.GetForwardResponseOptions()...) + + }) + return nil } @@ -1751,6 +1966,12 @@ var ( pattern_HeadscaleService_GetMachineRoute_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"api", "v1", "machine", "machine_id", "routes"}, "")) pattern_HeadscaleService_EnableMachineRoutes_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 1, 0, 4, 1, 5, 3, 2, 4}, []string{"api", "v1", "machine", "machine_id", "routes"}, "")) + + pattern_HeadscaleService_CreateApiKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"api", "v1", "apikey"}, "")) + + pattern_HeadscaleService_ExpireApiKey_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2, 2, 3}, []string{"api", "v1", "apikey", "expire"}, "")) + + pattern_HeadscaleService_ListApiKeys_0 = runtime.MustPattern(runtime.NewPattern(1, []int{2, 0, 2, 1, 2, 2}, []string{"api", "v1", "apikey"}, "")) ) var ( @@ -1789,4 +2010,10 @@ var ( forward_HeadscaleService_GetMachineRoute_0 = runtime.ForwardResponseMessage forward_HeadscaleService_EnableMachineRoutes_0 = runtime.ForwardResponseMessage + + forward_HeadscaleService_CreateApiKey_0 = runtime.ForwardResponseMessage + + forward_HeadscaleService_ExpireApiKey_0 = runtime.ForwardResponseMessage + + forward_HeadscaleService_ListApiKeys_0 = runtime.ForwardResponseMessage ) diff --git a/gen/go/headscale/v1/headscale_grpc.pb.go b/gen/go/headscale/v1/headscale_grpc.pb.go index ab6cb70c..c75a36c5 100644 --- a/gen/go/headscale/v1/headscale_grpc.pb.go +++ b/gen/go/headscale/v1/headscale_grpc.pb.go @@ -4,6 +4,7 @@ package v1 import ( context "context" + grpc "google.golang.org/grpc" codes "google.golang.org/grpc/codes" status "google.golang.org/grpc/status" @@ -40,6 +41,10 @@ type HeadscaleServiceClient interface { // --- Route start --- GetMachineRoute(ctx context.Context, in *GetMachineRouteRequest, opts ...grpc.CallOption) (*GetMachineRouteResponse, error) EnableMachineRoutes(ctx context.Context, in *EnableMachineRoutesRequest, opts ...grpc.CallOption) (*EnableMachineRoutesResponse, error) + // --- ApiKeys start --- + CreateApiKey(ctx context.Context, in *CreateApiKeyRequest, opts ...grpc.CallOption) (*CreateApiKeyResponse, error) + ExpireApiKey(ctx context.Context, in *ExpireApiKeyRequest, opts ...grpc.CallOption) (*ExpireApiKeyResponse, error) + ListApiKeys(ctx context.Context, in *ListApiKeysRequest, opts ...grpc.CallOption) (*ListApiKeysResponse, error) } type headscaleServiceClient struct { @@ -212,6 +217,33 @@ func (c *headscaleServiceClient) EnableMachineRoutes(ctx context.Context, in *En return out, nil } +func (c *headscaleServiceClient) CreateApiKey(ctx context.Context, in *CreateApiKeyRequest, opts ...grpc.CallOption) (*CreateApiKeyResponse, error) { + out := new(CreateApiKeyResponse) + err := c.cc.Invoke(ctx, "/headscale.v1.HeadscaleService/CreateApiKey", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *headscaleServiceClient) ExpireApiKey(ctx context.Context, in *ExpireApiKeyRequest, opts ...grpc.CallOption) (*ExpireApiKeyResponse, error) { + out := new(ExpireApiKeyResponse) + err := c.cc.Invoke(ctx, "/headscale.v1.HeadscaleService/ExpireApiKey", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + +func (c *headscaleServiceClient) ListApiKeys(ctx context.Context, in *ListApiKeysRequest, opts ...grpc.CallOption) (*ListApiKeysResponse, error) { + out := new(ListApiKeysResponse) + err := c.cc.Invoke(ctx, "/headscale.v1.HeadscaleService/ListApiKeys", in, out, opts...) + if err != nil { + return nil, err + } + return out, nil +} + // HeadscaleServiceServer is the server API for HeadscaleService service. // All implementations must embed UnimplementedHeadscaleServiceServer // for forward compatibility @@ -238,6 +270,10 @@ type HeadscaleServiceServer interface { // --- Route start --- GetMachineRoute(context.Context, *GetMachineRouteRequest) (*GetMachineRouteResponse, error) EnableMachineRoutes(context.Context, *EnableMachineRoutesRequest) (*EnableMachineRoutesResponse, error) + // --- ApiKeys start --- + CreateApiKey(context.Context, *CreateApiKeyRequest) (*CreateApiKeyResponse, error) + ExpireApiKey(context.Context, *ExpireApiKeyRequest) (*ExpireApiKeyResponse, error) + ListApiKeys(context.Context, *ListApiKeysRequest) (*ListApiKeysResponse, error) mustEmbedUnimplementedHeadscaleServiceServer() } @@ -299,6 +335,15 @@ func (UnimplementedHeadscaleServiceServer) GetMachineRoute(context.Context, *Get func (UnimplementedHeadscaleServiceServer) EnableMachineRoutes(context.Context, *EnableMachineRoutesRequest) (*EnableMachineRoutesResponse, error) { return nil, status.Errorf(codes.Unimplemented, "method EnableMachineRoutes not implemented") } +func (UnimplementedHeadscaleServiceServer) CreateApiKey(context.Context, *CreateApiKeyRequest) (*CreateApiKeyResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method CreateApiKey not implemented") +} +func (UnimplementedHeadscaleServiceServer) ExpireApiKey(context.Context, *ExpireApiKeyRequest) (*ExpireApiKeyResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method ExpireApiKey not implemented") +} +func (UnimplementedHeadscaleServiceServer) ListApiKeys(context.Context, *ListApiKeysRequest) (*ListApiKeysResponse, error) { + return nil, status.Errorf(codes.Unimplemented, "method ListApiKeys not implemented") +} func (UnimplementedHeadscaleServiceServer) mustEmbedUnimplementedHeadscaleServiceServer() {} // UnsafeHeadscaleServiceServer may be embedded to opt out of forward compatibility for this service. @@ -636,6 +681,60 @@ func _HeadscaleService_EnableMachineRoutes_Handler(srv interface{}, ctx context. return interceptor(ctx, in, info, handler) } +func _HeadscaleService_CreateApiKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(CreateApiKeyRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(HeadscaleServiceServer).CreateApiKey(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/headscale.v1.HeadscaleService/CreateApiKey", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(HeadscaleServiceServer).CreateApiKey(ctx, req.(*CreateApiKeyRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _HeadscaleService_ExpireApiKey_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ExpireApiKeyRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(HeadscaleServiceServer).ExpireApiKey(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/headscale.v1.HeadscaleService/ExpireApiKey", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(HeadscaleServiceServer).ExpireApiKey(ctx, req.(*ExpireApiKeyRequest)) + } + return interceptor(ctx, in, info, handler) +} + +func _HeadscaleService_ListApiKeys_Handler(srv interface{}, ctx context.Context, dec func(interface{}) error, interceptor grpc.UnaryServerInterceptor) (interface{}, error) { + in := new(ListApiKeysRequest) + if err := dec(in); err != nil { + return nil, err + } + if interceptor == nil { + return srv.(HeadscaleServiceServer).ListApiKeys(ctx, in) + } + info := &grpc.UnaryServerInfo{ + Server: srv, + FullMethod: "/headscale.v1.HeadscaleService/ListApiKeys", + } + handler := func(ctx context.Context, req interface{}) (interface{}, error) { + return srv.(HeadscaleServiceServer).ListApiKeys(ctx, req.(*ListApiKeysRequest)) + } + return interceptor(ctx, in, info, handler) +} + // HeadscaleService_ServiceDesc is the grpc.ServiceDesc for HeadscaleService service. // It's only intended for direct use with grpc.RegisterService, // and not to be introspected or modified (even as a copy) @@ -715,6 +814,18 @@ var HeadscaleService_ServiceDesc = grpc.ServiceDesc{ MethodName: "EnableMachineRoutes", Handler: _HeadscaleService_EnableMachineRoutes_Handler, }, + { + MethodName: "CreateApiKey", + Handler: _HeadscaleService_CreateApiKey_Handler, + }, + { + MethodName: "ExpireApiKey", + Handler: _HeadscaleService_ExpireApiKey_Handler, + }, + { + MethodName: "ListApiKeys", + Handler: _HeadscaleService_ListApiKeys_Handler, + }, }, Streams: []grpc.StreamDesc{}, Metadata: "headscale/v1/headscale.proto", diff --git a/gen/go/headscale/v1/machine.pb.go b/gen/go/headscale/v1/machine.pb.go index 07613697..5f12c6e5 100644 --- a/gen/go/headscale/v1/machine.pb.go +++ b/gen/go/headscale/v1/machine.pb.go @@ -1,17 +1,18 @@ // Code generated by protoc-gen-go. DO NOT EDIT. // versions: // protoc-gen-go v1.27.1 -// protoc v3.17.3 +// protoc (unknown) // source: headscale/v1/machine.proto package v1 import ( + reflect "reflect" + sync "sync" + protoreflect "google.golang.org/protobuf/reflect/protoreflect" protoimpl "google.golang.org/protobuf/runtime/protoimpl" timestamppb "google.golang.org/protobuf/types/known/timestamppb" - reflect "reflect" - sync "sync" ) const ( diff --git a/gen/go/headscale/v1/namespace.pb.go b/gen/go/headscale/v1/namespace.pb.go index 341f8ca0..0e0f8279 100644 --- a/gen/go/headscale/v1/namespace.pb.go +++ b/gen/go/headscale/v1/namespace.pb.go @@ -1,17 +1,18 @@ // Code generated by protoc-gen-go. DO NOT EDIT. // versions: // protoc-gen-go v1.27.1 -// protoc v3.17.3 +// protoc (unknown) // source: headscale/v1/namespace.proto package v1 import ( + reflect "reflect" + sync "sync" + protoreflect "google.golang.org/protobuf/reflect/protoreflect" protoimpl "google.golang.org/protobuf/runtime/protoimpl" timestamppb "google.golang.org/protobuf/types/known/timestamppb" - reflect "reflect" - sync "sync" ) const ( diff --git a/gen/go/headscale/v1/preauthkey.pb.go b/gen/go/headscale/v1/preauthkey.pb.go index 1169a89a..056e0f39 100644 --- a/gen/go/headscale/v1/preauthkey.pb.go +++ b/gen/go/headscale/v1/preauthkey.pb.go @@ -1,17 +1,18 @@ // Code generated by protoc-gen-go. DO NOT EDIT. // versions: // protoc-gen-go v1.27.1 -// protoc v3.17.3 +// protoc (unknown) // source: headscale/v1/preauthkey.proto package v1 import ( + reflect "reflect" + sync "sync" + protoreflect "google.golang.org/protobuf/reflect/protoreflect" protoimpl "google.golang.org/protobuf/runtime/protoimpl" timestamppb "google.golang.org/protobuf/types/known/timestamppb" - reflect "reflect" - sync "sync" ) const ( diff --git a/gen/go/headscale/v1/routes.pb.go b/gen/go/headscale/v1/routes.pb.go index ba40856d..12510f39 100644 --- a/gen/go/headscale/v1/routes.pb.go +++ b/gen/go/headscale/v1/routes.pb.go @@ -1,16 +1,17 @@ // Code generated by protoc-gen-go. DO NOT EDIT. // versions: // protoc-gen-go v1.27.1 -// protoc v3.17.3 +// protoc (unknown) // source: headscale/v1/routes.proto package v1 import ( - protoreflect "google.golang.org/protobuf/reflect/protoreflect" - protoimpl "google.golang.org/protobuf/runtime/protoimpl" reflect "reflect" sync "sync" + + protoreflect "google.golang.org/protobuf/reflect/protoreflect" + protoimpl "google.golang.org/protobuf/runtime/protoimpl" ) const ( diff --git a/gen/openapiv2/headscale/v1/apikey.swagger.json b/gen/openapiv2/headscale/v1/apikey.swagger.json new file mode 100644 index 00000000..0d4ebbe9 --- /dev/null +++ b/gen/openapiv2/headscale/v1/apikey.swagger.json @@ -0,0 +1,43 @@ +{ + "swagger": "2.0", + "info": { + "title": "headscale/v1/apikey.proto", + "version": "version not set" + }, + "consumes": [ + "application/json" + ], + "produces": [ + "application/json" + ], + "paths": {}, + "definitions": { + "protobufAny": { + "type": "object", + "properties": { + "@type": { + "type": "string" + } + }, + "additionalProperties": {} + }, + "rpcStatus": { + "type": "object", + "properties": { + "code": { + "type": "integer", + "format": "int32" + }, + "message": { + "type": "string" + }, + "details": { + "type": "array", + "items": { + "$ref": "#/definitions/protobufAny" + } + } + } + } + } +} diff --git a/gen/openapiv2/headscale/v1/headscale.swagger.json b/gen/openapiv2/headscale/v1/headscale.swagger.json index f1635ac2..d91d0baf 100644 --- a/gen/openapiv2/headscale/v1/headscale.swagger.json +++ b/gen/openapiv2/headscale/v1/headscale.swagger.json @@ -16,6 +16,91 @@ "application/json" ], "paths": { + "/api/v1/apikey": { + "get": { + "operationId": "HeadscaleService_ListApiKeys", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ListApiKeysResponse" + } + }, + "default": { + "description": "An unexpected error response.", + "schema": { + "$ref": "#/definitions/rpcStatus" + } + } + }, + "tags": [ + "HeadscaleService" + ] + }, + "post": { + "summary": "--- ApiKeys start ---", + "operationId": "HeadscaleService_CreateApiKey", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1CreateApiKeyResponse" + } + }, + "default": { + "description": "An unexpected error response.", + "schema": { + "$ref": "#/definitions/rpcStatus" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1CreateApiKeyRequest" + } + } + ], + "tags": [ + "HeadscaleService" + ] + } + }, + "/api/v1/apikey/expire": { + "post": { + "operationId": "HeadscaleService_ExpireApiKey", + "responses": { + "200": { + "description": "A successful response.", + "schema": { + "$ref": "#/definitions/v1ExpireApiKeyResponse" + } + }, + "default": { + "description": "An unexpected error response.", + "schema": { + "$ref": "#/definitions/rpcStatus" + } + } + }, + "parameters": [ + { + "name": "body", + "in": "body", + "required": true, + "schema": { + "$ref": "#/definitions/v1ExpireApiKeyRequest" + } + } + ], + "tags": [ + "HeadscaleService" + ] + } + }, "/api/v1/debug/machine": { "post": { "summary": "--- Machine start ---", @@ -596,6 +681,47 @@ } } }, + "v1ApiKey": { + "type": "object", + "properties": { + "id": { + "type": "string", + "format": "uint64" + }, + "prefix": { + "type": "string" + }, + "expiration": { + "type": "string", + "format": "date-time" + }, + "createdAt": { + "type": "string", + "format": "date-time" + }, + "lastSeen": { + "type": "string", + "format": "date-time" + } + } + }, + "v1CreateApiKeyRequest": { + "type": "object", + "properties": { + "expiration": { + "type": "string", + "format": "date-time" + } + } + }, + "v1CreateApiKeyResponse": { + "type": "object", + "properties": { + "apiKey": { + "type": "string" + } + } + }, "v1CreateNamespaceRequest": { "type": "object", "properties": { @@ -680,6 +806,17 @@ } } }, + "v1ExpireApiKeyRequest": { + "type": "object", + "properties": { + "prefix": { + "type": "string" + } + } + }, + "v1ExpireApiKeyResponse": { + "type": "object" + }, "v1ExpireMachineResponse": { "type": "object", "properties": { @@ -726,6 +863,17 @@ } } }, + "v1ListApiKeysResponse": { + "type": "object", + "properties": { + "apiKeys": { + "type": "array", + "items": { + "$ref": "#/definitions/v1ApiKey" + } + } + } + }, "v1ListMachinesResponse": { "type": "object", "properties": { From f9137f3bb0d8c89ff7b39aad91afecb30c6bc567 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 05/57] Create helper functions around gRPC interface --- grpcv1.go | 56 +++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) diff --git a/grpcv1.go b/grpcv1.go index 1850ce7a..9762d22b 100644 --- a/grpcv1.go +++ b/grpcv1.go @@ -349,6 +349,62 @@ func (api headscaleV1APIServer) EnableMachineRoutes( }, nil } +func (api headscaleV1APIServer) CreateApiKey( + ctx context.Context, + request *v1.CreateApiKeyRequest, +) (*v1.CreateApiKeyResponse, error) { + var expiration time.Time + if request.GetExpiration() != nil { + expiration = request.GetExpiration().AsTime() + } + + apiKey, _, err := api.h.CreateAPIKey( + &expiration, + ) + if err != nil { + return nil, err + } + + return &v1.CreateApiKeyResponse{ApiKey: apiKey}, nil +} + +func (api headscaleV1APIServer) ExpireApiKey( + ctx context.Context, + request *v1.ExpireApiKeyRequest, +) (*v1.ExpireApiKeyResponse, error) { + var apiKey *APIKey + var err error + + apiKey, err = api.h.GetAPIKey(request.Prefix) + if err != nil { + return nil, err + } + + err = api.h.ExpireAPIKey(apiKey) + if err != nil { + return nil, err + } + + return &v1.ExpireApiKeyResponse{}, nil +} + +func (api headscaleV1APIServer) ListApiKeys( + ctx context.Context, + request *v1.ListApiKeysRequest, +) (*v1.ListApiKeysResponse, error) { + apiKeys, err := api.h.ListAPIKeys() + if err != nil { + return nil, err + } + + response := make([]*v1.ApiKey, len(apiKeys)) + for index, key := range apiKeys { + response[index] = key.toProto() + } + + return &v1.ListApiKeysResponse{ApiKeys: response}, nil +} + // The following service calls are for testing and debugging func (api headscaleV1APIServer) DebugCreateMachine( ctx context.Context, From b4259fcd7933ee4423f98fe508c023dd4bcf2273 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 06/57] Add helper function for colouring expiries --- cmd/headscale/cli/pterm_style.go | 20 ++++++++++++++++++++ 1 file changed, 20 insertions(+) create mode 100644 cmd/headscale/cli/pterm_style.go diff --git a/cmd/headscale/cli/pterm_style.go b/cmd/headscale/cli/pterm_style.go new file mode 100644 index 00000000..e2678182 --- /dev/null +++ b/cmd/headscale/cli/pterm_style.go @@ -0,0 +1,20 @@ +package cli + +import ( + "time" + + "github.com/pterm/pterm" +) + +func ColourTime(date time.Time) string { + dateStr := date.Format("2006-01-02 15:04:05") + now := time.Now() + + if date.After(now) { + dateStr = pterm.LightGreen(dateStr) + } else { + dateStr = pterm.LightRed(dateStr) + } + + return dateStr +} From 1fd57a3375ac20590e1a588ffb7122976107ffd0 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 07/57] Add apikeys command to create, list and expire --- cmd/headscale/cli/api_key.go | 183 +++++++++++++++++++++++++++++++++++ 1 file changed, 183 insertions(+) create mode 100644 cmd/headscale/cli/api_key.go diff --git a/cmd/headscale/cli/api_key.go b/cmd/headscale/cli/api_key.go new file mode 100644 index 00000000..fcce6905 --- /dev/null +++ b/cmd/headscale/cli/api_key.go @@ -0,0 +1,183 @@ +package cli + +import ( + "fmt" + "strconv" + "time" + + "github.com/juanfont/headscale" + v1 "github.com/juanfont/headscale/gen/go/headscale/v1" + "github.com/pterm/pterm" + "github.com/rs/zerolog/log" + "github.com/spf13/cobra" + "google.golang.org/protobuf/types/known/timestamppb" +) + +const ( + // 90 days + DefaultApiKeyExpiry = 90 * 24 * time.Hour +) + +func init() { + rootCmd.AddCommand(apiKeysCmd) + apiKeysCmd.AddCommand(listAPIKeys) + + createAPIKeyCmd.Flags(). + DurationP("expiration", "e", DefaultApiKeyExpiry, "Human-readable expiration of the key (30m, 24h, 365d...)") + + apiKeysCmd.AddCommand(createAPIKeyCmd) + + expireAPIKeyCmd.Flags().StringP("prefix", "p", "", "ApiKey prefix") + err := expireAPIKeyCmd.MarkFlagRequired("prefix") + if err != nil { + log.Fatal().Err(err).Msg("") + } + apiKeysCmd.AddCommand(expireAPIKeyCmd) +} + +var apiKeysCmd = &cobra.Command{ + Use: "apikeys", + Short: "Handle the Api keys in Headscale", +} + +var listAPIKeys = &cobra.Command{ + Use: "list", + Short: "List the Api keys for headscale", + Run: func(cmd *cobra.Command, args []string) { + output, _ := cmd.Flags().GetString("output") + + ctx, client, conn, cancel := getHeadscaleCLIClient() + defer cancel() + defer conn.Close() + + request := &v1.ListApiKeysRequest{} + + response, err := client.ListApiKeys(ctx, request) + if err != nil { + ErrorOutput( + err, + fmt.Sprintf("Error getting the list of keys: %s", err), + output, + ) + + return + } + + if output != "" { + SuccessOutput(response.ApiKeys, "", output) + + return + } + + tableData := pterm.TableData{ + {"ID", "Prefix", "Expiration", "Created"}, + } + for _, key := range response.ApiKeys { + expiration := "-" + + if key.GetExpiration() != nil { + expiration = ColourTime(key.Expiration.AsTime()) + } + + tableData = append(tableData, []string{ + strconv.FormatUint(key.GetId(), headscale.Base10), + key.GetPrefix(), + expiration, + key.GetCreatedAt().AsTime().Format(HeadscaleDateTimeFormat), + }) + + } + err = pterm.DefaultTable.WithHasHeader().WithData(tableData).Render() + if err != nil { + ErrorOutput( + err, + fmt.Sprintf("Failed to render pterm table: %s", err), + output, + ) + + return + } + }, +} + +var createAPIKeyCmd = &cobra.Command{ + Use: "create", + Short: "Creates a new Api key", + Long: ` +Creates a new Api key, the Api key is only visible on creation +and cannot be retrieved again. +If you loose a key, create a new one and revoke (expire) the old one.`, + Run: func(cmd *cobra.Command, args []string) { + output, _ := cmd.Flags().GetString("output") + + log.Trace(). + Msg("Preparing to create ApiKey") + + request := &v1.CreateApiKeyRequest{} + + duration, _ := cmd.Flags().GetDuration("expiration") + expiration := time.Now().UTC().Add(duration) + + log.Trace().Dur("expiration", duration).Msg("expiration has been set") + + request.Expiration = timestamppb.New(expiration) + + ctx, client, conn, cancel := getHeadscaleCLIClient() + defer cancel() + defer conn.Close() + + response, err := client.CreateApiKey(ctx, request) + if err != nil { + ErrorOutput( + err, + fmt.Sprintf("Cannot create Api Key: %s\n", err), + output, + ) + + return + } + + SuccessOutput(response.ApiKey, response.ApiKey, output) + }, +} + +var expireAPIKeyCmd = &cobra.Command{ + Use: "expire", + Short: "Expire an ApiKey", + Aliases: []string{"revoke"}, + Run: func(cmd *cobra.Command, args []string) { + output, _ := cmd.Flags().GetString("output") + + prefix, err := cmd.Flags().GetString("prefix") + if err != nil { + ErrorOutput( + err, + fmt.Sprintf("Error getting prefix from CLI flag: %s", err), + output, + ) + + return + } + + ctx, client, conn, cancel := getHeadscaleCLIClient() + defer cancel() + defer conn.Close() + + request := &v1.ExpireApiKeyRequest{ + Prefix: prefix, + } + + response, err := client.ExpireApiKey(ctx, request) + if err != nil { + ErrorOutput( + err, + fmt.Sprintf("Cannot expire Api Key: %s\n", err), + output, + ) + + return + } + + SuccessOutput(response, "Key expired", output) + }, +} From 6e14fdf0d3efa431b076180bdab465fb2e102641 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 08/57] More reusable stuff in cli --- cmd/headscale/cli/preauthkeys.go | 2 +- cmd/headscale/cli/utils.go | 10 ++++++---- 2 files changed, 7 insertions(+), 5 deletions(-) diff --git a/cmd/headscale/cli/preauthkeys.go b/cmd/headscale/cli/preauthkeys.go index 5342085c..580184f1 100644 --- a/cmd/headscale/cli/preauthkeys.go +++ b/cmd/headscale/cli/preauthkeys.go @@ -83,7 +83,7 @@ var listPreAuthKeys = &cobra.Command{ for _, key := range response.PreAuthKeys { expiration := "-" if key.GetExpiration() != nil { - expiration = key.Expiration.AsTime().Format("2006-01-02 15:04:05") + expiration = ColourTime(key.Expiration.AsTime()) } var reusable string diff --git a/cmd/headscale/cli/utils.go b/cmd/headscale/cli/utils.go index 258acf33..9e2c54cf 100644 --- a/cmd/headscale/cli/utils.go +++ b/cmd/headscale/cli/utils.go @@ -26,7 +26,8 @@ import ( ) const ( - PermissionFallback = 0o700 + PermissionFallback = 0o700 + HeadscaleDateTimeFormat = "2006-01-02 15:04:05" ) func LoadConfig(path string) error { @@ -270,7 +271,8 @@ func getHeadscaleConfig() headscale.Config { if len(prefixes) < 1 { prefixes = append(prefixes, netaddr.MustParseIPPrefix("100.64.0.0/10")) - log.Warn().Msgf("'ip_prefixes' not configured, falling back to default: %v", prefixes) + log.Warn(). + Msgf("'ip_prefixes' not configured, falling back to default: %v", prefixes) } return headscale.Config{ @@ -400,7 +402,7 @@ func getHeadscaleCLIClient() (context.Context, v1.HeadscaleServiceClient, *grpc. // If we are not connecting to a local server, require an API key for authentication apiKey := cfg.CLI.APIKey if apiKey == "" { - log.Fatal().Msgf("HEADSCALE_CLI_API_KEY environment variable needs to be set.") + log.Fatal().Caller().Msgf("HEADSCALE_CLI_API_KEY environment variable needs to be set.") } grpcOptions = append(grpcOptions, grpc.WithPerRPCCredentials(tokenAuth{ @@ -416,7 +418,7 @@ func getHeadscaleCLIClient() (context.Context, v1.HeadscaleServiceClient, *grpc. log.Trace().Caller().Str("address", address).Msg("Connecting via gRPC") conn, err := grpc.DialContext(ctx, address, grpcOptions...) if err != nil { - log.Fatal().Err(err).Msgf("Could not connect: %v", err) + log.Fatal().Caller().Err(err).Msgf("Could not connect: %v", err) } client := v1.NewHeadscaleServiceClient(conn) From 05db1b710935d0b5e1b09f52b2cf2ed88b40f810 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 09/57] Formatting and improving logs for config loading --- cmd/headscale/headscale.go | 2 +- cmd/headscale/headscale_test.go | 6 +++++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/cmd/headscale/headscale.go b/cmd/headscale/headscale.go index d6bf2166..600b186e 100644 --- a/cmd/headscale/headscale.go +++ b/cmd/headscale/headscale.go @@ -44,7 +44,7 @@ func main() { }) if err := cli.LoadConfig(""); err != nil { - log.Fatal().Err(err) + log.Fatal().Caller().Err(err) } machineOutput := cli.HasMachineOutputFlag() diff --git a/cmd/headscale/headscale_test.go b/cmd/headscale/headscale_test.go index 218e458e..5ab46e00 100644 --- a/cmd/headscale/headscale_test.go +++ b/cmd/headscale/headscale_test.go @@ -61,7 +61,11 @@ func (*Suite) TestConfigLoading(c *check.C) { c.Assert(viper.GetString("tls_letsencrypt_listen"), check.Equals, ":http") c.Assert(viper.GetString("tls_letsencrypt_challenge_type"), check.Equals, "HTTP-01") c.Assert(viper.GetStringSlice("dns_config.nameservers")[0], check.Equals, "1.1.1.1") - c.Assert(cli.GetFileMode("unix_socket_permission"), check.Equals, fs.FileMode(0o770)) + c.Assert( + cli.GetFileMode("unix_socket_permission"), + check.Equals, + fs.FileMode(0o770), + ) } func (*Suite) TestDNSConfigLoading(c *check.C) { From e8e573de627323620b64ebd13435ba0d6faa2a8a Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 10/57] Add apikeys command integration test --- integration_cli_test.go | 145 ++++++++++++++++++++++++++++++++++++++++ 1 file changed, 145 insertions(+) diff --git a/integration_cli_test.go b/integration_cli_test.go index 0278da0d..818be911 100644 --- a/integration_cli_test.go +++ b/integration_cli_test.go @@ -1193,3 +1193,148 @@ func (s *IntegrationCLITestSuite) TestRouteCommand() { "route (route-machine) is not available on node", ) } + +func (s *IntegrationCLITestSuite) TestApiKeyCommand() { + count := 5 + + keys := make([]string, count) + + for i := 0; i < count; i++ { + apiResult, err := ExecuteCommand( + &s.headscale, + []string{ + "headscale", + "apikeys", + "create", + "--expiration", + "24h", + "--output", + "json", + }, + []string{}, + ) + assert.Nil(s.T(), err) + assert.NotEmpty(s.T(), apiResult) + + // var apiKey v1.ApiKey + // err = json.Unmarshal([]byte(apiResult), &apiKey) + // assert.Nil(s.T(), err) + + keys[i] = apiResult + } + + assert.Len(s.T(), keys, 5) + + // Test list of keys + listResult, err := ExecuteCommand( + &s.headscale, + []string{ + "headscale", + "apikeys", + "list", + "--output", + "json", + }, + []string{}, + ) + assert.Nil(s.T(), err) + + var listedApiKeys []v1.ApiKey + err = json.Unmarshal([]byte(listResult), &listedApiKeys) + assert.Nil(s.T(), err) + + assert.Len(s.T(), listedApiKeys, 5) + + assert.Equal(s.T(), uint64(1), listedApiKeys[0].Id) + assert.Equal(s.T(), uint64(2), listedApiKeys[1].Id) + assert.Equal(s.T(), uint64(3), listedApiKeys[2].Id) + assert.Equal(s.T(), uint64(4), listedApiKeys[3].Id) + assert.Equal(s.T(), uint64(5), listedApiKeys[4].Id) + + assert.NotEmpty(s.T(), listedApiKeys[0].Prefix) + assert.NotEmpty(s.T(), listedApiKeys[1].Prefix) + assert.NotEmpty(s.T(), listedApiKeys[2].Prefix) + assert.NotEmpty(s.T(), listedApiKeys[3].Prefix) + assert.NotEmpty(s.T(), listedApiKeys[4].Prefix) + + assert.True(s.T(), listedApiKeys[0].Expiration.AsTime().After(time.Now())) + assert.True(s.T(), listedApiKeys[1].Expiration.AsTime().After(time.Now())) + assert.True(s.T(), listedApiKeys[2].Expiration.AsTime().After(time.Now())) + assert.True(s.T(), listedApiKeys[3].Expiration.AsTime().After(time.Now())) + assert.True(s.T(), listedApiKeys[4].Expiration.AsTime().After(time.Now())) + + assert.True( + s.T(), + listedApiKeys[0].Expiration.AsTime().Before(time.Now().Add(time.Hour*26)), + ) + assert.True( + s.T(), + listedApiKeys[1].Expiration.AsTime().Before(time.Now().Add(time.Hour*26)), + ) + assert.True( + s.T(), + listedApiKeys[2].Expiration.AsTime().Before(time.Now().Add(time.Hour*26)), + ) + assert.True( + s.T(), + listedApiKeys[3].Expiration.AsTime().Before(time.Now().Add(time.Hour*26)), + ) + assert.True( + s.T(), + listedApiKeys[4].Expiration.AsTime().Before(time.Now().Add(time.Hour*26)), + ) + + expiredPrefixes := make(map[string]bool) + + // Expire three keys + for i := 0; i < 3; i++ { + _, err := ExecuteCommand( + &s.headscale, + []string{ + "headscale", + "apikeys", + "expire", + "--prefix", + listedApiKeys[i].Prefix, + }, + []string{}, + ) + assert.Nil(s.T(), err) + + expiredPrefixes[listedApiKeys[i].Prefix] = true + } + + // Test list pre auth keys after expire + listAfterExpireResult, err := ExecuteCommand( + &s.headscale, + []string{ + "headscale", + "apikeys", + "list", + "--output", + "json", + }, + []string{}, + ) + assert.Nil(s.T(), err) + + var listedAfterExpireApiKeys []v1.ApiKey + err = json.Unmarshal([]byte(listAfterExpireResult), &listedAfterExpireApiKeys) + assert.Nil(s.T(), err) + + for index := range listedAfterExpireApiKeys { + if _, ok := expiredPrefixes[listedAfterExpireApiKeys[index].Prefix]; ok { + // Expired + assert.True( + s.T(), + listedAfterExpireApiKeys[index].Expiration.AsTime().Before(time.Now()), + ) + } else { + // Not expired + assert.False( + s.T(), + listedAfterExpireApiKeys[index].Expiration.AsTime().Before(time.Now()), + ) + } + } +} From 8218ef96ef40828308e660ce9512bc5062553ddc Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 11/57] Formatting of integration tests --- integration_common_test.go | 9 +-- integration_test.go | 112 +++++++++++++++++++------------------ 2 files changed, 63 insertions(+), 58 deletions(-) diff --git a/integration_common_test.go b/integration_common_test.go index 94291fc6..de304d0d 100644 --- a/integration_common_test.go +++ b/integration_common_test.go @@ -8,16 +8,17 @@ import ( "fmt" "time" - "inet.af/netaddr" - "github.com/ory/dockertest/v3" "github.com/ory/dockertest/v3/docker" + "inet.af/netaddr" ) const DOCKER_EXECUTE_TIMEOUT = 10 * time.Second -var IpPrefix4 = netaddr.MustParseIPPrefix("100.64.0.0/10") -var IpPrefix6 = netaddr.MustParseIPPrefix("fd7a:115c:a1e0::/48") +var ( + IpPrefix4 = netaddr.MustParseIPPrefix("100.64.0.0/10") + IpPrefix6 = netaddr.MustParseIPPrefix("fd7a:115c:a1e0::/48") +) type ExecuteCommandConfig struct { timeout time.Duration diff --git a/integration_test.go b/integration_test.go index ee89ef28..c5bea3d3 100644 --- a/integration_test.go +++ b/integration_test.go @@ -375,7 +375,7 @@ func (s *IntegrationTestSuite) TestGetIpAddresses() { ips, err := getIPs(scales.tailscales) assert.Nil(s.T(), err) - for hostname, _ := range scales.tailscales { + for hostname := range scales.tailscales { ips := ips[hostname] for _, ip := range ips { s.T().Run(hostname, func(t *testing.T) { @@ -464,32 +464,33 @@ func (s *IntegrationTestSuite) TestPingAllPeersByAddress() { if peername == hostname { continue } - s.T().Run(fmt.Sprintf("%s-%s-%d", hostname, peername, i), func(t *testing.T) { - // We are only interested in "direct ping" which means what we - // might need a couple of more attempts before reaching the node. - command := []string{ - "tailscale", "ping", - "--timeout=1s", - "--c=10", - "--until-direct=true", - ip.String(), - } + s.T(). + Run(fmt.Sprintf("%s-%s-%d", hostname, peername, i), func(t *testing.T) { + // We are only interested in "direct ping" which means what we + // might need a couple of more attempts before reaching the node. + command := []string{ + "tailscale", "ping", + "--timeout=1s", + "--c=10", + "--until-direct=true", + ip.String(), + } - fmt.Printf( - "Pinging from %s to %s (%s)\n", - hostname, - peername, - ip, - ) - result, err := ExecuteCommand( - &tailscale, - command, - []string{}, - ) - assert.Nil(t, err) - fmt.Printf("Result for %s: %s\n", hostname, result) - assert.Contains(t, result, "pong") - }) + fmt.Printf( + "Pinging from %s to %s (%s)\n", + hostname, + peername, + ip, + ) + result, err := ExecuteCommand( + &tailscale, + command, + []string{}, + ) + assert.Nil(t, err) + fmt.Printf("Result for %s: %s\n", hostname, result) + assert.Contains(t, result, "pong") + }) } } } @@ -569,32 +570,33 @@ func (s *IntegrationTestSuite) TestSharedNodes() { if peername == hostname { continue } - s.T().Run(fmt.Sprintf("%s-%s-%d", hostname, peername, i), func(t *testing.T) { - // We are only interested in "direct ping" which means what we - // might need a couple of more attempts before reaching the node. - command := []string{ - "tailscale", "ping", - "--timeout=15s", - "--c=20", - "--until-direct=true", - ip.String(), - } + s.T(). + Run(fmt.Sprintf("%s-%s-%d", hostname, peername, i), func(t *testing.T) { + // We are only interested in "direct ping" which means what we + // might need a couple of more attempts before reaching the node. + command := []string{ + "tailscale", "ping", + "--timeout=15s", + "--c=20", + "--until-direct=true", + ip.String(), + } - fmt.Printf( - "Pinging from %s to %s (%s)\n", - hostname, - peername, - ip, - ) - result, err := ExecuteCommand( - &tailscale, - command, - []string{}, - ) - assert.Nil(t, err) - fmt.Printf("Result for %s: %s\n", hostname, result) - assert.Contains(t, result, "pong") - }) + fmt.Printf( + "Pinging from %s to %s (%s)\n", + hostname, + peername, + ip, + ) + result, err := ExecuteCommand( + &tailscale, + command, + []string{}, + ) + assert.Nil(t, err) + fmt.Printf("Result for %s: %s\n", hostname, result) + assert.Contains(t, result, "pong") + }) } } } @@ -625,7 +627,7 @@ func (s *IntegrationTestSuite) TestTailDrop() { []string{}, ) assert.Nil(s.T(), err) - for peername, _ := range ips { + for peername := range ips { if peername == hostname { continue } @@ -705,7 +707,7 @@ func (s *IntegrationTestSuite) TestPingAllPeersByHostname() { ips, err := getIPs(scales.tailscales) assert.Nil(s.T(), err) for hostname, tailscale := range scales.tailscales { - for peername, _ := range ips { + for peername := range ips { if peername == hostname { continue } @@ -774,7 +776,9 @@ func (s *IntegrationTestSuite) TestMagicDNS() { } } -func getIPs(tailscales map[string]dockertest.Resource) (map[string][]netaddr.IP, error) { +func getIPs( + tailscales map[string]dockertest.Resource, +) (map[string][]netaddr.IP, error) { ips := make(map[string][]netaddr.IP) for hostname, tailscale := range tailscales { command := []string{"tailscale", "ip"} From 3393363a67c17186a54bee53f30d5c4feacd3feb Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 12/57] Add safe random hash generators --- utils.go | 27 +++++++++++++++++++++++++++ 1 file changed, 27 insertions(+) diff --git a/utils.go b/utils.go index 9e85599f..562cede6 100644 --- a/utils.go +++ b/utils.go @@ -7,6 +7,8 @@ package headscale import ( "context" + "crypto/rand" + "encoding/base64" "encoding/json" "fmt" "net" @@ -278,3 +280,28 @@ func containsIPPrefix(prefixes []netaddr.IPPrefix, prefix netaddr.IPPrefix) bool return false } + +// GenerateRandomBytes returns securely generated random bytes. +// It will return an error if the system's secure random +// number generator fails to function correctly, in which +// case the caller should not continue. +func GenerateRandomBytes(n int) ([]byte, error) { + b := make([]byte, n) + _, err := rand.Read(b) + // Note that err == nil only if we read len(b) bytes. + if err != nil { + return nil, err + } + + return b, nil +} + +// GenerateRandomStringURLSafe returns a URL-safe, base64 encoded +// securely generated random string. +// It will return an error if the system's secure random +// number generator fails to function correctly, in which +// case the caller should not continue. +func GenerateRandomStringURLSafe(n int) (string, error) { + b, err := GenerateRandomBytes(n) + return base64.RawURLEncoding.EncodeToString(b), err +} From a730f007d840672a084a573d0657753db7bdbb4e Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 13/57] Formatting of DNS files --- dns.go | 11 +++++++++-- dns_test.go | 6 +++++- 2 files changed, 14 insertions(+), 3 deletions(-) diff --git a/dns.go b/dns.go index df896090..8ecd993c 100644 --- a/dns.go +++ b/dns.go @@ -51,7 +51,12 @@ func generateMagicDNSRootDomains(ipPrefixes []netaddr.IPPrefix) []dnsname.FQDN { generateDNSRoot = generateIPv6DNSRootDomain default: - panic(fmt.Sprintf("unsupported IP version with address length %d", ipPrefix.IP().BitLen())) + panic( + fmt.Sprintf( + "unsupported IP version with address length %d", + ipPrefix.IP().BitLen(), + ), + ) } fqdns = append(fqdns, generateDNSRoot(ipPrefix)...) @@ -115,7 +120,9 @@ func generateIPv6DNSRootDomain(ipPrefix netaddr.IPPrefix) []dnsname.FQDN { // function is called only once over the lifetime of a server process. prefixConstantParts := []string{} for i := 0; i < maskBits/nibbleLen; i++ { - prefixConstantParts = append([]string{string(nibbleStr[i])}, prefixConstantParts...) + prefixConstantParts = append( + []string{string(nibbleStr[i])}, + prefixConstantParts...) } makeDomain := func(variablePrefix ...string) (dnsname.FQDN, error) { diff --git a/dns_test.go b/dns_test.go index f8f7fb96..80ee83bb 100644 --- a/dns_test.go +++ b/dns_test.go @@ -81,7 +81,11 @@ func (s *Suite) TestMagicDNSRootDomainsIPv6Single(c *check.C) { domains := generateMagicDNSRootDomains(prefixes) c.Assert(len(domains), check.Equals, 1) - c.Assert(domains[0].WithTrailingDot(), check.Equals, "0.e.1.a.c.5.1.1.a.7.d.f.ip6.arpa.") + c.Assert( + domains[0].WithTrailingDot(), + check.Equals, + "0.e.1.a.c.5.1.1.a.7.d.f.ip6.arpa.", + ) } func (s *Suite) TestMagicDNSRootDomainsIPv6SingleMultiple(c *check.C) { From a6e22387fd886771832f6d99437ba536a09d617b Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 14/57] Formatting of machine.go --- machine.go | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/machine.go b/machine.go index 64fd11b8..f1f72438 100644 --- a/machine.go +++ b/machine.go @@ -530,7 +530,9 @@ func (machine Machine) toNode( addrs = append(addrs, ip) } - allowedIPs := append([]netaddr.IPPrefix{}, addrs...) // we append the node own IP, as it is required by the clients + allowedIPs := append( + []netaddr.IPPrefix{}, + addrs...) // we append the node own IP, as it is required by the clients if includeRoutes { routesStr := []string{} From 00c69ce50cf97df6f89ec1c56d7ac05f30b7e576 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 15/57] Enable remote gRPC and HTTP API This commit enables the existing gRPC and HTTP API from remote locations as long as the user can provide a valid API key. This allows users to control their headscale with the CLI from a workstation. :tada: --- app.go | 70 ++++++++++++++++++++++++++++++++++------------------------ 1 file changed, 41 insertions(+), 29 deletions(-) diff --git a/app.go b/app.go index bc7491ce..61d67ade 100644 --- a/app.go +++ b/app.go @@ -339,26 +339,26 @@ func (h *Headscale) grpcAuthenticationInterceptor(ctx context.Context, ) } - // TODO(kradalby): Implement API key backend: - // - Table in the DB - // - Key name - // - Encrypted - // - Expiry - // - // Currently all other than localhost traffic is unauthorized, this is intentional to allow - // us to make use of gRPC for our CLI, but not having to implement any of the remote capabilities - // and API key auth - return ctx, status.Error( - codes.Unauthenticated, - "Authentication is not implemented yet", - ) + valid, err := h.ValidateAPIKey(strings.TrimPrefix(token, AuthPrefix)) + if err != nil { + log.Error(). + Caller(). + Err(err). + Str("client_address", client.Addr.String()). + Msg("failed to validate token") - // if strings.TrimPrefix(token, AUTH_PREFIX) != a.Token { - // log.Error().Caller().Str("client_address", p.Addr.String()).Msg("invalid token") - // return ctx, status.Error(codes.Unauthenticated, "invalid token") - // } + return ctx, status.Error(codes.Internal, "failed to validate token") + } - // return handler(ctx, req) + if !valid { + log.Info(). + Str("client_address", client.Addr.String()). + Msg("invalid token") + + return ctx, status.Error(codes.Unauthenticated, "invalid token") + } + + return handler(ctx, req) } func (h *Headscale) httpAuthenticationMiddleware(ctx *gin.Context) { @@ -381,19 +381,30 @@ func (h *Headscale) httpAuthenticationMiddleware(ctx *gin.Context) { ctx.AbortWithStatus(http.StatusUnauthorized) - // TODO(kradalby): Implement API key backend - // Currently all traffic is unauthorized, this is intentional to allow - // us to make use of gRPC for our CLI, but not having to implement any of the remote capabilities - // and API key auth - // - // if strings.TrimPrefix(authHeader, AUTH_PREFIX) != a.Token { - // log.Error().Caller().Str("client_address", c.ClientIP()).Msg("invalid token") - // c.AbortWithStatusJSON(http.StatusUnauthorized, gin.H{"error", "unauthorized"}) + valid, err := h.ValidateAPIKey(strings.TrimPrefix(authHeader, AuthPrefix)) + if err != nil { + log.Error(). + Caller(). + Err(err). + Str("client_address", ctx.ClientIP()). + Msg("failed to validate token") - // return - // } + ctx.AbortWithStatus(http.StatusInternalServerError) - // c.Next() + return + } + + if !valid { + log.Info(). + Str("client_address", ctx.ClientIP()). + Msg("invalid token") + + ctx.AbortWithStatus(http.StatusUnauthorized) + + return + } + + ctx.Next() } // ensureUnixSocketIsAbsent will check if the given path for headscales unix socket is clear @@ -630,6 +641,7 @@ func (h *Headscale) getTLSSettings() (*tls.Config, error) { // service, which can be configured to run on any other port. go func() { log.Fatal(). + Caller(). Err(http.ListenAndServe(h.cfg.TLSLetsEncryptListen, certManager.HTTPHandler(http.HandlerFunc(h.redirect)))). Msg("failed to set up a HTTP server") }() From fa197cc18364e0e211811563e6d26c988cdd4a54 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 16/57] Add docs for remote access --- docs/remote-cli.md | 85 ++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 85 insertions(+) create mode 100644 docs/remote-cli.md diff --git a/docs/remote-cli.md b/docs/remote-cli.md new file mode 100644 index 00000000..55193620 --- /dev/null +++ b/docs/remote-cli.md @@ -0,0 +1,85 @@ +# Controlling `headscale` with remote CLI + +## Prerequisit + +- A workstation to run `headscale` (could be Linux, macOS, other supported platforms) +- A `headscale` server (version `0.13.0` or newer) +- Access to create API keys (local access to the `headscale` server) +- `headscale` _must_ be served over TLS/HTTPS + - Remote access does _not_ support unencrypted traffic. + +## Goal + +This documentation has the goal of showing a user how-to set control a `headscale` instance +from a remote machine with the `headscale` command line binary. + +## Create an API key + +We need to create an API key to authenticate our remote `headscale` when using it from our workstation. + +To create a API key, log into your `headscale` server and generate a key: + +```shell +headscale apikeys create --expiration 90d +``` + +Copy the output of the command and save it for later. Please not that you can not retrieve a key again, +if the key is lost, expire the old one, and create a new key. + +To list the keys currently assosicated with the server: + +```shell +headscale apikeys list +``` + +and to expire a key: + +```shell +headscale apikeys expire --prefix "" +``` + + +## Download and configure `headscale` + +1. Download the latest [`headscale` binary from GitHub's release page](https://github.com/juanfont/headscale/releases): + +2. Put the binary somewhere in your `PATH`, e.g. `/usr/local/bin/headcale` + +3. Make `headscale` executable: + +```shell +chmod +x /usr/local/bin/headscale +``` + +4. Configure the CLI through Environment Variables + +```shell +export HEADSCALE_CLI_ADDRESS="" +export HEADSCALE_CLI_API_KEY="" +``` + +This will tell the `headscale` binary to connect to a remote instance, instead of looking +for a local instance (which is what it does on the server). + +The API key is needed to make sure that your are allowed to access the server. The key is _not_ +needed when running directly on the server, as the connection is local. + +5. Test the connection + +Let us run the headscale command to verify that we can connect by listing our nodes: + +```shell +headscale nodes list +``` + +You should now be able to see a list of your nodes from your workstation, and you can +now control the `headscale` server from your workstation. + +## Troubleshooting + +Checklist: + +- Make sure you have the _same_ `headscale` version on your server and workstation +- Make sure you use version `0.13.0` or newer. +- Verify that your TLS certificate is valid + - If it is not valid, set the environment variable `HEADSCALE_CLI_INSECURE=true` to allow insecure certs. From bae7ba46de8e014dbc6c2ce29c304fc6537ab7c1 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 17/57] Update changelog --- CHANGELOG.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 6c74144e..cfa96c32 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -7,6 +7,9 @@ **Features**: - Add IPv6 support to the prefix assigned to namespaces +- Add API Key support + - Enable remote control of `headscale` via CLI [docs](docs/remote-cli.md) + - Enable HTTP API (beta, subject to change) **Changes**: From 56b6528e3b3125d460437c22529d381b7f311b7d Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:11:15 +0000 Subject: [PATCH 18/57] Run prettier --- docs/remote-cli.md | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/docs/remote-cli.md b/docs/remote-cli.md index 55193620..3d4bbafb 100644 --- a/docs/remote-cli.md +++ b/docs/remote-cli.md @@ -13,7 +13,7 @@ This documentation has the goal of showing a user how-to set control a `headscale` instance from a remote machine with the `headscale` command line binary. -## Create an API key +## Create an API key We need to create an API key to authenticate our remote `headscale` when using it from our workstation. @@ -23,7 +23,7 @@ To create a API key, log into your `headscale` server and generate a key: headscale apikeys create --expiration 90d ``` -Copy the output of the command and save it for later. Please not that you can not retrieve a key again, +Copy the output of the command and save it for later. Please not that you can not retrieve a key again, if the key is lost, expire the old one, and create a new key. To list the keys currently assosicated with the server: @@ -38,7 +38,6 @@ and to expire a key: headscale apikeys expire --prefix "" ``` - ## Download and configure `headscale` 1. Download the latest [`headscale` binary from GitHub's release page](https://github.com/juanfont/headscale/releases): @@ -59,7 +58,7 @@ export HEADSCALE_CLI_API_KEY="" ``` This will tell the `headscale` binary to connect to a remote instance, instead of looking -for a local instance (which is what it does on the server). +for a local instance (which is what it does on the server). The API key is needed to make sure that your are allowed to access the server. The key is _not_ needed when running directly on the server, as the connection is local. @@ -81,5 +80,5 @@ Checklist: - Make sure you have the _same_ `headscale` version on your server and workstation - Make sure you use version `0.13.0` or newer. -- Verify that your TLS certificate is valid +- Verify that your TLS certificate is valid - If it is not valid, set the environment variable `HEADSCALE_CLI_INSECURE=true` to allow insecure certs. From 537cd35cb2a408da9354c85d88fc03b6398c0792 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Tue, 25 Jan 2022 22:22:15 +0000 Subject: [PATCH 19/57] Try to add the grpc cert correctly --- app.go | 6 +++++- 1 file changed, 5 insertions(+), 1 deletion(-) diff --git a/app.go b/app.go index 61d67ade..08815889 100644 --- a/app.go +++ b/app.go @@ -572,7 +572,11 @@ func (h *Headscale) Serve() error { if tlsConfig != nil { httpServer.TLSConfig = tlsConfig - grpcOptions = append(grpcOptions, grpc.Creds(credentials.NewTLS(tlsConfig))) + // grpcOptions = append(grpcOptions, grpc.Creds(credentials.NewTLS(tlsConfig))) + grpcOptions = append( + grpcOptions, + grpc.Creds(credentials.NewServerTLSFromCert(&tlsConfig.Certificates[0])), + ) } grpcServer := grpc.NewServer(grpcOptions...) From 150652e939dc383619cd112673f3f18d12d3ee10 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ho=C3=A0ng=20=C4=90=E1=BB=A9c=20Hi=E1=BA=BFu?= Date: Fri, 11 Feb 2022 13:46:36 +0700 Subject: [PATCH 20/57] poll: fix swapped machine<->namespace labels --- poll.go | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/poll.go b/poll.go index bcd6c33f..dd3956fb 100644 --- a/poll.go +++ b/poll.go @@ -193,7 +193,7 @@ func (h *Headscale) PollNetMapHandler(ctx *gin.Context) { // It sounds like we should update the nodes when we have received a endpoint update // even tho the comments in the tailscale code dont explicitly say so. - updateRequestsFromNode.WithLabelValues(machine.Name, machine.Namespace.Name, "endpoint-update"). + updateRequestsFromNode.WithLabelValues(machine.Namespace.Name, machine.Name, "endpoint-update"). Inc() updateChan <- struct{}{} @@ -222,7 +222,7 @@ func (h *Headscale) PollNetMapHandler(ctx *gin.Context) { Str("handler", "PollNetMap"). Str("machine", machine.Name). Msg("Notifying peers") - updateRequestsFromNode.WithLabelValues(machine.Name, machine.Namespace.Name, "full-update"). + updateRequestsFromNode.WithLabelValues(machine.Namespace.Name, machine.Name, "full-update"). Inc() updateChan <- struct{}{} @@ -413,7 +413,7 @@ func (h *Headscale) PollNetMapStream( Str("machine", machine.Name). Str("channel", "update"). Msg("Received a request for update") - updateRequestsReceivedOnChannel.WithLabelValues(machine.Name, machine.Namespace.Name). + updateRequestsReceivedOnChannel.WithLabelValues(machine.Namespace.Name, machine.Name). Inc() if h.isOutdated(machine) { var lastUpdate time.Time @@ -443,7 +443,7 @@ func (h *Headscale) PollNetMapStream( Str("channel", "update"). Err(err). Msg("Could not write the map response") - updateRequestsSentToNode.WithLabelValues(machine.Name, machine.Namespace.Name, "failed"). + updateRequestsSentToNode.WithLabelValues(machine.Namespace.Name, machine.Name, "failed"). Inc() return false @@ -453,7 +453,7 @@ func (h *Headscale) PollNetMapStream( Str("machine", machine.Name). Str("channel", "update"). Msg("Updated Map has been sent") - updateRequestsSentToNode.WithLabelValues(machine.Name, machine.Namespace.Name, "success"). + updateRequestsSentToNode.WithLabelValues(machine.Namespace.Name, machine.Name, "success"). Inc() // Keep track of the last successful update, @@ -582,7 +582,7 @@ func (h *Headscale) scheduledPollWorker( Str("func", "scheduledPollWorker"). Str("machine", machine.Name). Msg("Sending update request") - updateRequestsFromNode.WithLabelValues(machine.Name, machine.Namespace.Name, "scheduled-update"). + updateRequestsFromNode.WithLabelValues(machine.Namespace.Name, machine.Name, "scheduled-update"). Inc() updateChan <- struct{}{} } From 66ff34c2ddb2ca34dcee3a3aa49b14754aeb0591 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Ho=C3=A0ng=20=C4=90=E1=BB=A9c=20Hi=E1=BA=BFu?= Date: Fri, 11 Feb 2022 13:49:09 +0700 Subject: [PATCH 21/57] apply changelog --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 6c74144e..a4a56faf 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -11,6 +11,7 @@ **Changes**: - `ip_prefix` is now superseded by `ip_prefixes` in the configuration [#208](https://github.com/juanfont/headscale/pull/208) +- fix swapped machine<->namespace labels in `/metrics` **0.12.4 (2022-01-29):** From d9aaa0bdfc441e22de13ad1e5e18010b989c68e2 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Fri, 11 Feb 2022 08:26:22 +0000 Subject: [PATCH 22/57] Add docs on how to set up Windows clients --- README.md | 2 +- docs/windows-client.md | 42 ++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 43 insertions(+), 1 deletion(-) create mode 100644 docs/windows-client.md diff --git a/README.md b/README.md index 9a599d3d..491450a5 100644 --- a/README.md +++ b/README.md @@ -42,7 +42,7 @@ headscale implements this coordination server. | Linux | Yes | | OpenBSD | Yes | | macOS | Yes (see `/apple` on your headscale for more information) | -| Windows | Yes | +| Windows | Yes [docs](./docs/windows-client.md) | | Android | [You need to compile the client yourself](https://github.com/juanfont/headscale/issues/58#issuecomment-885255270) | | iOS | Not yet | diff --git a/docs/windows-client.md b/docs/windows-client.md new file mode 100644 index 00000000..2c8ecd56 --- /dev/null +++ b/docs/windows-client.md @@ -0,0 +1,42 @@ +# Connecting a Windows client + +## Goal + +This documentation has the goal of showing how a user can use the official Windows [Tailscale](https://tailscale.com) client with `headscale`. + +## Add registry keys + +To make the Windows client behave as expected and to run well with `headscale`, two registry keys **must** be set: + +- `HKLM:\SOFTWARE\Tailscale IPN\UnattendedMode` must be set to `always` to allow Tailscale to run properly in the background +- `HKLM:\SOFTWARE\Tailscale IPN\LoginURL` must be set to `` to ensure Tailscale contacts the correct control server. + +The Tailscale Windows client has been observed to reset its configuration on logout/reboot and these two keys [resolves that issue](https://github.com/tailscale/tailscale/issues/2798). + +For a guide on how to edit registry keys, [check out Computer Hope](https://www.computerhope.com/issues/ch001348.htm). + +## Installation + +Download the [Official Windows Client](https://tailscale.com/download/windows) and install it. + +When the installation has finished, start Tailscale and log in (you might have to click the icon in the system tray). + +The log in should open a browser Window and direct you to your `headscale` instance. + +## Troubleshooting + +If you are seeing repeated messages like: + +``` +[GIN] 2022/02/10 - 16:39:34 | 200 | 1.105306ms | 127.0.0.1 | POST "/machine/redacted" +``` + +in your `headscale` output, turn on `DEBUG` logging and look for: + +``` +2022-02-11T00:59:29Z DBG Machine registration has expired. Sending a authurl to register machine=redacted +``` + +This typically means that the register keys above was not set appropriatly. + +Ensure they are set correctly, delete Tailscale APP_DATA folder and try to connect again. From ba8afdb7bea3bacae0f26dccd0b4166ac0c49923 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Fri, 11 Feb 2022 08:39:00 +0000 Subject: [PATCH 23/57] Upgrade to tailscale 1.20.4 --- go.mod | 2 +- go.sum | 2 + integration_test.go | 114 +++++++++++++++++++++++--------------------- 3 files changed, 62 insertions(+), 56 deletions(-) diff --git a/go.mod b/go.mod index 8683c324..6de61f92 100644 --- a/go.mod +++ b/go.mod @@ -40,7 +40,7 @@ require ( gorm.io/driver/sqlite v1.1.5 gorm.io/gorm v1.21.15 inet.af/netaddr v0.0.0-20211027220019-c74959edd3b6 - tailscale.com v1.20.3 + tailscale.com v1.20.4 ) require ( diff --git a/go.sum b/go.sum index 86642b87..078111e2 100644 --- a/go.sum +++ b/go.sum @@ -1411,3 +1411,5 @@ sigs.k8s.io/yaml v1.1.0/go.mod h1:UJmg0vDUVViEyp3mgSv9WPwZCDxu4rQW1olrI1uml+o= sourcegraph.com/sourcegraph/appdash v0.0.0-20190731080439-ebfcffb1b5c0/go.mod h1:hI742Nqp5OhwiqlzhgfbWU4mW4yO10fP+LoT9WOswdU= tailscale.com v1.20.3 h1:C3g2AgmQaOi0YT5dAal9mslugPXMxwj0EXY7YfL2QrA= tailscale.com v1.20.3/go.mod h1:kjVy3ji2OH5lZhPLIIRacoY3CN4Bo3Yyb2mtoM8nfJ4= +tailscale.com v1.20.4 h1:7cl/Q2Sbo2Jb2dX7zA+Exbbl7DT5UGZ4iGhQ2xj23X0= +tailscale.com v1.20.4/go.mod h1:kjVy3ji2OH5lZhPLIIRacoY3CN4Bo3Yyb2mtoM8nfJ4= diff --git a/integration_test.go b/integration_test.go index ee89ef28..43845b61 100644 --- a/integration_test.go +++ b/integration_test.go @@ -28,7 +28,7 @@ import ( "tailscale.com/ipn/ipnstate" ) -var tailscaleVersions = []string{"1.20.2", "1.18.2", "1.16.2", "1.14.3", "1.12.3"} +var tailscaleVersions = []string{"1.20.4", "1.18.2", "1.16.2", "1.14.3", "1.12.3"} type TestNamespace struct { count int @@ -375,7 +375,7 @@ func (s *IntegrationTestSuite) TestGetIpAddresses() { ips, err := getIPs(scales.tailscales) assert.Nil(s.T(), err) - for hostname, _ := range scales.tailscales { + for hostname := range scales.tailscales { ips := ips[hostname] for _, ip := range ips { s.T().Run(hostname, func(t *testing.T) { @@ -464,32 +464,33 @@ func (s *IntegrationTestSuite) TestPingAllPeersByAddress() { if peername == hostname { continue } - s.T().Run(fmt.Sprintf("%s-%s-%d", hostname, peername, i), func(t *testing.T) { - // We are only interested in "direct ping" which means what we - // might need a couple of more attempts before reaching the node. - command := []string{ - "tailscale", "ping", - "--timeout=1s", - "--c=10", - "--until-direct=true", - ip.String(), - } + s.T(). + Run(fmt.Sprintf("%s-%s-%d", hostname, peername, i), func(t *testing.T) { + // We are only interested in "direct ping" which means what we + // might need a couple of more attempts before reaching the node. + command := []string{ + "tailscale", "ping", + "--timeout=1s", + "--c=10", + "--until-direct=true", + ip.String(), + } - fmt.Printf( - "Pinging from %s to %s (%s)\n", - hostname, - peername, - ip, - ) - result, err := ExecuteCommand( - &tailscale, - command, - []string{}, - ) - assert.Nil(t, err) - fmt.Printf("Result for %s: %s\n", hostname, result) - assert.Contains(t, result, "pong") - }) + fmt.Printf( + "Pinging from %s to %s (%s)\n", + hostname, + peername, + ip, + ) + result, err := ExecuteCommand( + &tailscale, + command, + []string{}, + ) + assert.Nil(t, err) + fmt.Printf("Result for %s: %s\n", hostname, result) + assert.Contains(t, result, "pong") + }) } } } @@ -569,32 +570,33 @@ func (s *IntegrationTestSuite) TestSharedNodes() { if peername == hostname { continue } - s.T().Run(fmt.Sprintf("%s-%s-%d", hostname, peername, i), func(t *testing.T) { - // We are only interested in "direct ping" which means what we - // might need a couple of more attempts before reaching the node. - command := []string{ - "tailscale", "ping", - "--timeout=15s", - "--c=20", - "--until-direct=true", - ip.String(), - } + s.T(). + Run(fmt.Sprintf("%s-%s-%d", hostname, peername, i), func(t *testing.T) { + // We are only interested in "direct ping" which means what we + // might need a couple of more attempts before reaching the node. + command := []string{ + "tailscale", "ping", + "--timeout=15s", + "--c=20", + "--until-direct=true", + ip.String(), + } - fmt.Printf( - "Pinging from %s to %s (%s)\n", - hostname, - peername, - ip, - ) - result, err := ExecuteCommand( - &tailscale, - command, - []string{}, - ) - assert.Nil(t, err) - fmt.Printf("Result for %s: %s\n", hostname, result) - assert.Contains(t, result, "pong") - }) + fmt.Printf( + "Pinging from %s to %s (%s)\n", + hostname, + peername, + ip, + ) + result, err := ExecuteCommand( + &tailscale, + command, + []string{}, + ) + assert.Nil(t, err) + fmt.Printf("Result for %s: %s\n", hostname, result) + assert.Contains(t, result, "pong") + }) } } } @@ -625,7 +627,7 @@ func (s *IntegrationTestSuite) TestTailDrop() { []string{}, ) assert.Nil(s.T(), err) - for peername, _ := range ips { + for peername := range ips { if peername == hostname { continue } @@ -705,7 +707,7 @@ func (s *IntegrationTestSuite) TestPingAllPeersByHostname() { ips, err := getIPs(scales.tailscales) assert.Nil(s.T(), err) for hostname, tailscale := range scales.tailscales { - for peername, _ := range ips { + for peername := range ips { if peername == hostname { continue } @@ -774,7 +776,9 @@ func (s *IntegrationTestSuite) TestMagicDNS() { } } -func getIPs(tailscales map[string]dockertest.Resource) (map[string][]netaddr.IP, error) { +func getIPs( + tailscales map[string]dockertest.Resource, +) (map[string][]netaddr.IP, error) { ips := make(map[string][]netaddr.IP) for hostname, tailscale := range tailscales { command := []string{"tailscale", "ip"} From 2357fb6f80acf9a5a09fb5503bdbec373c31596b Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Fri, 11 Feb 2022 08:43:31 +0000 Subject: [PATCH 24/57] Upgrade all dependencies --- go.mod | 83 +++++++++++----------- go.sum | 214 +++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 257 insertions(+), 40 deletions(-) diff --git a/go.mod b/go.mod index 6de61f92..bbba4646 100644 --- a/go.mod +++ b/go.mod @@ -7,38 +7,38 @@ require ( github.com/coreos/go-oidc/v3 v3.1.0 github.com/efekarakus/termcolor v1.0.1 github.com/fatih/set v0.2.1 - github.com/gin-gonic/gin v1.7.4 - github.com/gofrs/uuid v4.1.0+incompatible + github.com/gin-gonic/gin v1.7.7 + github.com/gofrs/uuid v4.2.0+incompatible github.com/grpc-ecosystem/go-grpc-middleware v1.3.0 - github.com/grpc-ecosystem/grpc-gateway/v2 v2.6.0 - github.com/infobloxopen/protoc-gen-gorm v1.0.1 - github.com/klauspost/compress v1.13.6 - github.com/ory/dockertest/v3 v3.7.0 + github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.3 + github.com/infobloxopen/protoc-gen-gorm v1.1.0 + github.com/klauspost/compress v1.14.2 + github.com/ory/dockertest/v3 v3.8.1 github.com/patrickmn/go-cache v2.1.0+incompatible github.com/philip-bui/grpc-zerolog v1.0.1 - github.com/prometheus/client_golang v1.11.0 - github.com/pterm/pterm v0.12.30 - github.com/rs/zerolog v1.26.0 + github.com/prometheus/client_golang v1.12.1 + github.com/pterm/pterm v0.12.36 + github.com/rs/zerolog v1.26.1 github.com/soheilhy/cmux v0.1.5 - github.com/spf13/cobra v1.2.1 - github.com/spf13/viper v1.9.0 + github.com/spf13/cobra v1.3.0 + github.com/spf13/viper v1.10.1 github.com/stretchr/testify v1.7.0 - github.com/tailscale/hujson v0.0.0-20211105212140-3a0adc019d83 + github.com/tailscale/hujson v0.0.0-20211215203138-ffd971c5f362 github.com/tcnksm/go-latest v0.0.0-20170313132115-e3007ae9052e github.com/zsais/go-gin-prometheus v0.1.0 - golang.org/x/crypto v0.0.0-20211202192323-5770296d904e + golang.org/x/crypto v0.0.0-20220210151621-f4118a5b28e2 golang.org/x/oauth2 v0.0.0-20211104180415-d3ed0bb246c8 golang.org/x/sync v0.0.0-20210220032951-036812b2e83c - google.golang.org/genproto v0.0.0-20211104193956-4c6863e31247 - google.golang.org/grpc v1.42.0 - google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0 + google.golang.org/genproto v0.0.0-20220210181026-6fee9acbd336 + google.golang.org/grpc v1.44.0 + google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.2.0 google.golang.org/protobuf v1.27.1 gopkg.in/check.v1 v1.0.0-20201130134442-10cb98267c6c gopkg.in/yaml.v2 v2.4.0 - gorm.io/datatypes v1.0.2 - gorm.io/driver/postgres v1.1.1 - gorm.io/driver/sqlite v1.1.5 - gorm.io/gorm v1.21.15 + gorm.io/datatypes v1.0.5 + gorm.io/driver/postgres v1.2.3 + gorm.io/driver/sqlite v1.2.6 + gorm.io/gorm v1.22.5 inet.af/netaddr v0.0.0-20211027220019-c74959edd3b6 tailscale.com v1.20.4 ) @@ -49,12 +49,12 @@ require ( github.com/Nvveen/Gotty v0.0.0-20120604004816-cd527374f1e5 // indirect github.com/atomicgo/cursor v0.0.1 // indirect github.com/beorn7/perks v1.0.1 // indirect - github.com/cenkalti/backoff/v4 v4.1.1 // indirect + github.com/cenkalti/backoff/v4 v4.1.2 // indirect github.com/cespare/xxhash/v2 v2.1.2 // indirect - github.com/containerd/continuity v0.1.0 // indirect + github.com/containerd/continuity v0.2.2 // indirect github.com/davecgh/go-spew v1.1.1 // indirect - github.com/docker/cli v20.10.8+incompatible // indirect - github.com/docker/docker v20.10.8+incompatible // indirect + github.com/docker/cli v20.10.12+incompatible // indirect + github.com/docker/docker v20.10.12+incompatible // indirect github.com/docker/go-connections v0.4.0 // indirect github.com/docker/go-units v0.4.0 // indirect github.com/fsnotify/fsnotify v1.5.1 // indirect @@ -62,29 +62,30 @@ require ( github.com/gin-contrib/sse v0.1.0 // indirect github.com/go-playground/locales v0.14.0 // indirect github.com/go-playground/universal-translator v0.18.0 // indirect - github.com/go-playground/validator/v10 v10.9.0 // indirect + github.com/go-playground/validator/v10 v10.10.0 // indirect + github.com/go-sql-driver/mysql v1.6.0 // indirect github.com/gogo/protobuf v1.3.2 // indirect github.com/golang/glog v1.0.0 // indirect github.com/golang/protobuf v1.5.2 // indirect github.com/google/go-github v17.0.0+incompatible // indirect github.com/google/go-querystring v1.1.0 // indirect github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510 // indirect - github.com/gookit/color v1.4.2 // indirect - github.com/hashicorp/go-version v1.2.0 // indirect + github.com/gookit/color v1.5.0 // indirect + github.com/hashicorp/go-version v1.4.0 // indirect github.com/hashicorp/hcl v1.0.0 // indirect github.com/imdario/mergo v0.3.12 // indirect github.com/inconshreveable/mousetrap v1.0.0 // indirect github.com/jackc/chunkreader/v2 v2.0.1 // indirect - github.com/jackc/pgconn v1.10.0 // indirect + github.com/jackc/pgconn v1.11.0 // indirect github.com/jackc/pgio v1.0.0 // indirect github.com/jackc/pgpassfile v1.0.0 // indirect - github.com/jackc/pgproto3/v2 v2.1.1 // indirect + github.com/jackc/pgproto3/v2 v2.2.0 // indirect github.com/jackc/pgservicefile v0.0.0-20200714003250-2b9c44734f2b // indirect - github.com/jackc/pgtype v1.8.1 // indirect - github.com/jackc/pgx/v4 v4.13.0 // indirect + github.com/jackc/pgtype v1.10.0 // indirect + github.com/jackc/pgx/v4 v4.15.0 // indirect github.com/jinzhu/gorm v1.9.16 // indirect github.com/jinzhu/inflection v1.0.0 // indirect - github.com/jinzhu/now v1.1.2 // indirect + github.com/jinzhu/now v1.1.4 // indirect github.com/json-iterator/go v1.1.12 // indirect github.com/kballard/go-shellquote v0.0.0-20180428030007-95032a82bc51 // indirect github.com/kr/pretty v0.3.0 // indirect @@ -95,16 +96,16 @@ require ( github.com/mattn/go-colorable v0.1.12 // indirect github.com/mattn/go-isatty v0.0.14 // indirect github.com/mattn/go-runewidth v0.0.13 // indirect - github.com/mattn/go-sqlite3 v1.14.8 // indirect + github.com/mattn/go-sqlite3 v1.14.11 // indirect github.com/matttproud/golang_protobuf_extensions v1.0.1 // indirect - github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b // indirect + github.com/mgutz/ansi v0.0.0-20200706080929-d51e80ef957d // indirect github.com/mitchellh/mapstructure v1.4.3 // indirect github.com/moby/term v0.0.0-20210619224110-3f7ff695adc6 // indirect github.com/modern-go/concurrent v0.0.0-20180306012644-bacd9c7ef1dd // indirect github.com/modern-go/reflect2 v1.0.2 // indirect github.com/opencontainers/go-digest v1.0.0 // indirect github.com/opencontainers/image-spec v1.0.2 // indirect - github.com/opencontainers/runc v1.0.3 // indirect + github.com/opencontainers/runc v1.1.0 // indirect github.com/pelletier/go-toml v1.9.4 // indirect github.com/pkg/errors v0.9.1 // indirect github.com/pmezard/go-difflib v1.0.0 // indirect @@ -112,9 +113,9 @@ require ( github.com/prometheus/common v0.32.1 // indirect github.com/prometheus/procfs v0.7.3 // indirect github.com/rivo/uniseg v0.2.0 // indirect - github.com/rogpeppe/go-internal v1.8.1-0.20211023094830-115ce09fd6b4 // indirect + github.com/rogpeppe/go-internal v1.8.1 // indirect github.com/sirupsen/logrus v1.8.1 // indirect - github.com/spf13/afero v1.6.0 // indirect + github.com/spf13/afero v1.8.1 // indirect github.com/spf13/cast v1.4.1 // indirect github.com/spf13/jwalterweatherman v1.1.0 // indirect github.com/spf13/pflag v1.0.5 // indirect @@ -127,12 +128,14 @@ require ( go4.org/intern v0.0.0-20211027215823-ae77deb06f29 // indirect go4.org/mem v0.0.0-20210711025021-927187094b94 // indirect go4.org/unsafe/assume-no-moving-gc v0.0.0-20211027215541-db492cf91b37 // indirect - golang.org/x/net v0.0.0-20211205041911-012df41ee64c // indirect - golang.org/x/sys v0.0.0-20211205182925-97ca703d548d // indirect + golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd // indirect + golang.org/x/sys v0.0.0-20220209214540-3681064d5158 // indirect golang.org/x/term v0.0.0-20210927222741-03fcf44c2211 // indirect golang.org/x/text v0.3.7 // indirect google.golang.org/appengine v1.6.7 // indirect - gopkg.in/ini.v1 v1.66.2 // indirect + gopkg.in/ini.v1 v1.66.4 // indirect gopkg.in/square/go-jose.v2 v2.6.0 // indirect gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b // indirect + gorm.io/driver/mysql v1.2.3 // indirect + sigs.k8s.io/yaml v1.3.0 // indirect ) diff --git a/go.sum b/go.sum index 078111e2..28145899 100644 --- a/go.sum +++ b/go.sum @@ -1,9 +1,11 @@ bazil.org/fuse v0.0.0-20160811212531-371fbbdaa898/go.mod h1:Xbm+BRKSBEpa4q4hTSxohYNQpsxXPbPry4JJWOB3LB8= +bazil.org/fuse v0.0.0-20200407214033-5883e5a4b512/go.mod h1:FbcW6z/2VytnFDhZfumh8Ss8zxHE6qpMP5sHTRe0EaM= cloud.google.com/go v0.26.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= cloud.google.com/go v0.34.0/go.mod h1:aQUYkXzVsufM+DwF1aE+0xfcU+56JwCaLick0ClmMTw= cloud.google.com/go v0.38.0/go.mod h1:990N+gfupTy94rShfmMCWGDn0LpTmnzTp2qbd1dvSRU= cloud.google.com/go v0.44.1/go.mod h1:iSa0KzasP4Uvy3f1mN/7PiObzGgflwredwwASm/v6AU= cloud.google.com/go v0.44.2/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY= +cloud.google.com/go v0.44.3/go.mod h1:60680Gw3Yr4ikxnPRS/oxxkBccT6SA1yMk63TGekxKY= cloud.google.com/go v0.45.1/go.mod h1:RpBamKRgapWJb87xiFSdk4g1CME7QZg3uwTez+TSTjc= cloud.google.com/go v0.46.3/go.mod h1:a6bKKbmY7er1mI7TEI4lsAkts/mkhTSZK8w33B4RAg0= cloud.google.com/go v0.50.0/go.mod h1:r9sluTvynVuxRIOHXQEHMFffphuXHOMZMycpNR5e6To= @@ -16,6 +18,7 @@ cloud.google.com/go v0.62.0/go.mod h1:jmCYTdRCQuc1PHIIJ/maLInMho30T/Y0M4hTdTShOY cloud.google.com/go v0.65.0/go.mod h1:O5N8zS7uWy9vkA9vayVHs65eM1ubvY4h553ofrNHObY= cloud.google.com/go v0.72.0/go.mod h1:M+5Vjvlc2wnp6tjzE102Dw08nGShTscUx2nZMufOKPI= cloud.google.com/go v0.74.0/go.mod h1:VV1xSbzvo+9QJOxLDaJfTjx5e+MePCpCWwvftOeQmWk= +cloud.google.com/go v0.75.0/go.mod h1:VGuuCn7PG0dwsd5XPVm2Mm3wlh3EL55/79EKB6hlPTY= cloud.google.com/go v0.78.0/go.mod h1:QjdrLG0uq+YwhjoVOLsS1t7TW8fs36kLs4XO5R5ECHg= cloud.google.com/go v0.79.0/go.mod h1:3bzgcEeQlzbuEAYu4mrWhKqWjmpprinYgKJLgKHnbb8= cloud.google.com/go v0.81.0/go.mod h1:mk/AM35KwGk/Nm2YSeZbxXdrNK3KZOYHmLkOqC2V6E0= @@ -24,6 +27,10 @@ cloud.google.com/go v0.84.0/go.mod h1:RazrYuxIK6Kb7YrzzhPoLmCVzl7Sup4NrbKPg8KHSU cloud.google.com/go v0.87.0/go.mod h1:TpDYlFy7vuLzZMMZ+B6iRiELaY7z/gJPaqbMx6mlWcY= cloud.google.com/go v0.90.0/go.mod h1:kRX0mNRHe0e2rC6oNakvwQqzyDmg57xJ+SZU1eT2aDQ= cloud.google.com/go v0.93.3/go.mod h1:8utlLll2EF5XMAV15woO4lSbWQlk8rer9aLOfLh7+YI= +cloud.google.com/go v0.94.1/go.mod h1:qAlAugsXlC+JWO+Bke5vCtc9ONxjQT3drlTTnAplMW4= +cloud.google.com/go v0.97.0/go.mod h1:GF7l59pYBVlXQIBLx3a761cZ41F9bBH3JUlihCt2Udc= +cloud.google.com/go v0.98.0/go.mod h1:ua6Ush4NALrHk5QXDWnjvZHN93OuF0HfuEPq9I1X0cM= +cloud.google.com/go v0.99.0/go.mod h1:w0Xx2nLzqWJPuozYQX+hFfCSI8WioryfRDzkoI/Y2ZA= cloud.google.com/go/bigquery v1.0.1/go.mod h1:i/xbL2UlR5RvWAURpBYZTtm/cXjCha9lbfbpx4poX+o= cloud.google.com/go/bigquery v1.3.0/go.mod h1:PjpwJnslEMmckchkHFfq+HTD2DmtT67aNFKH1/VBDHE= cloud.google.com/go/bigquery v1.4.0/go.mod h1:S8dzgnTigyfTmLBfrtrhyYhwRxG72rYxvftPBK2Dvzc= @@ -34,6 +41,7 @@ cloud.google.com/go/datastore v1.0.0/go.mod h1:LXYbyblFSglQ5pkeyhO+Qmw7ukd3C+pD7 cloud.google.com/go/datastore v1.1.0/go.mod h1:umbIZjpQpHh4hmRpGhH4tLFup+FVzqBi1b3c64qFpCk= cloud.google.com/go/firestore v1.1.0/go.mod h1:ulACoGHTpvq5r8rxGJ4ddJZBZqakUQqClKRT5SZwBmk= cloud.google.com/go/firestore v1.6.0/go.mod h1:afJwI0vaXwAG54kI7A//lP/lSPDkQORQuMkv56TxEPU= +cloud.google.com/go/firestore v1.6.1/go.mod h1:asNXNOzBdyVQmEU+ggO8UPodTkEVFW5Qx+rwHnAz+EY= cloud.google.com/go/pubsub v1.0.1/go.mod h1:R0Gpsv3s54REJCy4fxDixWD93lHJMoZTyQ2kNxGRt3I= cloud.google.com/go/pubsub v1.1.0/go.mod h1:EwwdRX2sKPjnvnqCa270oGRyludottCI76h+R3AArQw= cloud.google.com/go/pubsub v1.2.0/go.mod h1:jhfEVHT8odbXTkndysNHCcx0awwzvfOlguIAii9o8iA= @@ -43,6 +51,7 @@ cloud.google.com/go/storage v1.5.0/go.mod h1:tpKbwo567HUNpVclU5sGELwQWBDZ8gh0Zeo cloud.google.com/go/storage v1.6.0/go.mod h1:N7U0C8pVQ/+NIKOBQyamJIeKQKkZ+mxpohlUTyfDhBk= cloud.google.com/go/storage v1.8.0/go.mod h1:Wv1Oy7z6Yz3DshWRJFhqM/UCfaWIRTdp0RXyy7KQOVs= cloud.google.com/go/storage v1.10.0/go.mod h1:FLPqc6j+Ki4BU591ie1oL6qBQGu2Bl/tZ9ullr3+Kg0= +cloud.google.com/go/storage v1.14.0/go.mod h1:GrKmX003DSIwi9o29oFT7YDnHYwZoctc3fOKtUw0Xmo= contrib.go.opencensus.io/exporter/ocagent v0.7.0/go.mod h1:IshRmMJBhDfFj5Y67nVhMYTTIze91RUeT73ipWKs/GY= dmitri.shuralyov.com/gpu/mtl v0.0.0-20190408044501-666a987793e9/go.mod h1:H6x//7gZCb22OMCxBHrMx7a5I7Hp++hsVxbQ4BYO7hU= github.com/AlecAivazis/survey/v2 v2.3.2 h1:TqTB+aDDCLYhf9/bD2TwSO8u8jDSmMUd2SUVO4gCnU8= @@ -53,10 +62,15 @@ github.com/Azure/go-ansiterm v0.0.0-20210617225240-d185dfc1b5a1/go.mod h1:xomTg6 github.com/BurntSushi/toml v0.3.1/go.mod h1:xHWCNGjB5oqiDr8zfno3MHue2Ht5sIBksp03qcyfWMU= github.com/BurntSushi/xgb v0.0.0-20160522181843-27f122750802/go.mod h1:IVnqGOEym/WlBOVXweHU+Q+/VP0lqqI8lqeDx9IjBqo= github.com/DATA-DOG/go-sqlmock v1.5.0/go.mod h1:f/Ixk793poVmq4qj/V1dPUg2JEAKC73Q5eFN3EC/SaM= +github.com/DataDog/datadog-go v3.2.0+incompatible/go.mod h1:LButxg5PwREeZtORoXG3tL4fMGNddJ+vMq1mwgfaqoQ= github.com/Knetic/govaluate v3.0.1-0.20171022003610-9aa49832a739+incompatible/go.mod h1:r7JcOSlj0wfOMncg0iLm8Leh48TZaKVeNIfJntJ2wa0= github.com/MarvinJWendt/testza v0.1.0/go.mod h1:7AxNvlfeHP7Z/hDQ5JtE3OKYT3XFUeLCDE2DQninSqs= github.com/MarvinJWendt/testza v0.2.1 h1:eitywm1lzygA2KCyn55jFVdOaXj5I9LeOsLNeifd2Kw= github.com/MarvinJWendt/testza v0.2.1/go.mod h1:God7bhG8n6uQxwdScay+gjm9/LnO4D3kkcZX4hv9Rp8= +github.com/MarvinJWendt/testza v0.2.8/go.mod h1:nwIcjmr0Zz+Rcwfh3/4UhBp7ePKVhuBExvZqnKYWlII= +github.com/MarvinJWendt/testza v0.2.10/go.mod h1:pd+VWsoGUiFtq+hRKSU1Bktnn+DMCSrDrXDpX2bG66k= +github.com/MarvinJWendt/testza v0.2.12 h1:/PRp/BF+27t2ZxynTiqj0nyND5PbOtfJS0SuTuxmgeg= +github.com/MarvinJWendt/testza v0.2.12/go.mod h1:JOIegYyV7rX+7VZ9r77L/eH6CfJHHzXjB69adAhzZkI= github.com/Masterminds/semver v1.5.0 h1:H65muMkzWKEuNDnfl9d70GUjFniHKHRbFPGBuZ3QEww= github.com/Masterminds/semver/v3 v3.1.1 h1:hLg3sBzpNErnxhQtUy/mmLR2I9foDujNK030IGemrRc= github.com/Masterminds/semver/v3 v3.1.1/go.mod h1:VPu/7SZ7ePZ3QOrcuXROw5FAcLl4a0cBrbBpGY/8hQs= @@ -85,6 +99,7 @@ github.com/apache/thrift v0.13.0/go.mod h1:cp2SuWMxlEZw2r+iP2GNCdIi4C1qmUzdZFSVb github.com/armon/circbuf v0.0.0-20150827004946-bbbad097214e/go.mod h1:3U/XgcO3hCbHZ8TKRvWD2dDTCfh9M9ya+I9JpbB7O8o= github.com/armon/consul-api v0.0.0-20180202201655-eb2c6b5be1b6/go.mod h1:grANhF5doyWs3UAsr3K4I6qtAmlQcZDesFNEHPZAzj8= github.com/armon/go-metrics v0.0.0-20180917152333-f0300d1749da/go.mod h1:Q73ZrmVTwzkszR9V5SSuryQ31EELlFMUz1kKyl939pY= +github.com/armon/go-metrics v0.3.10/go.mod h1:4O98XIr/9W0sxpJ8UaYkvjk10Iff7SnFrb4QAOwNTFc= github.com/armon/go-radix v0.0.0-20180808171621-7fddfc383310/go.mod h1:ufUuZ+zHj4x4TnLV4JWEpy2hxWSpsRywHrMgIH9cCH8= github.com/armon/go-radix v1.0.0/go.mod h1:ufUuZ+zHj4x4TnLV4JWEpy2hxWSpsRywHrMgIH9cCH8= github.com/aryann/difflib v0.0.0-20170710044230-e206f873d14a/go.mod h1:DAHtR1m6lCRdSC2Tm3DSWRPvIPr6xNKyeHdqDQSQT+A= @@ -108,16 +123,24 @@ github.com/cenkalti/backoff v2.2.1+incompatible/go.mod h1:90ReRw6GdpyfrHakVjL/QH github.com/cenkalti/backoff/v4 v4.1.0/go.mod h1:scbssz8iZGpm3xbr14ovlUdkxfGXNInqkPWOWmG2CLw= github.com/cenkalti/backoff/v4 v4.1.1 h1:G2HAfAmvm/GcKan2oOQpBXOd2tT2G57ZnZGWa1PxPBQ= github.com/cenkalti/backoff/v4 v4.1.1/go.mod h1:scbssz8iZGpm3xbr14ovlUdkxfGXNInqkPWOWmG2CLw= +github.com/cenkalti/backoff/v4 v4.1.2 h1:6Yo7N8UP2K6LWZnW94DLVSSrbobcWdVzAYOisuDPIFo= +github.com/cenkalti/backoff/v4 v4.1.2/go.mod h1:scbssz8iZGpm3xbr14ovlUdkxfGXNInqkPWOWmG2CLw= github.com/census-instrumentation/opencensus-proto v0.2.1/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= +github.com/census-instrumentation/opencensus-proto v0.3.0/go.mod h1:f6KPmirojxKA12rnyqOA5BBL4O983OfeGPqjHWSTneU= +github.com/cespare/xxhash v1.1.0 h1:a6HrQnmkObjyL+Gs60czilIUGqrzKutQD6XZog3p+ko= github.com/cespare/xxhash v1.1.0/go.mod h1:XrSqR1VqqWfGrhpAt58auRo0WTKS1nRRg3ghfAqPWnc= github.com/cespare/xxhash/v2 v2.1.1/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= github.com/cespare/xxhash/v2 v2.1.2 h1:YRXhKfTDauu4ajMg1TPgFO5jnlC2HCbmLXMcTG5cbYE= github.com/cespare/xxhash/v2 v2.1.2/go.mod h1:VGX0DQ3Q6kWi7AoAeZDth3/j3BFtOZR5XLFGgcrjCOs= github.com/checkpoint-restore/go-criu/v5 v5.0.0/go.mod h1:cfwC0EG7HMUenopBsUf9d89JlCLQIfgVcNsNN0t6T2M= +github.com/checkpoint-restore/go-criu/v5 v5.3.0/go.mod h1:E/eQpaFtUKGOOSEBZgmKAcn+zUUwWxqcaKZlF54wK8E= github.com/chzyer/logex v1.1.10/go.mod h1:+Ywpsq7O8HXn0nuIou7OrIPyXbp3wmkHB+jjWRnGsAI= github.com/chzyer/readline v0.0.0-20180603132655-2972be24d48e/go.mod h1:nSuG5e5PlCu98SY8svDHJxuZscDgtXS6KTTbou5AhLI= github.com/chzyer/test v0.0.0-20180213035817-a1ea475d72b1/go.mod h1:Q3SI9o4m/ZMnBNeIyt5eFwwo7qiLfzFZmjNmxjkiQlU= github.com/cilium/ebpf v0.6.2/go.mod h1:4tRaxcgiL706VnOzHOdBlY8IEAIdxINsQBcU4xJJXRs= +github.com/cilium/ebpf v0.7.0/go.mod h1:/oI2+1shJiTGAMgl6/RgJr36Eo1jzrRcAWbcXO2usCA= +github.com/circonus-labs/circonus-gometrics v2.3.1+incompatible/go.mod h1:nmEj6Dob7S7YxXgwXpfOuvO54S+tGdZdw9fuRZt25Ag= +github.com/circonus-labs/circonusllhist v0.1.3/go.mod h1:kMXHVDlOchFAehlya5ePtbp5jckzBHf4XRpQvBOLI+I= github.com/clbanning/x2j v0.0.0-20191024224557-825249438eec/go.mod h1:jMjuTZXRI4dUb/I5gc9Hdhagfvm9+RyrPryS/auMzxE= github.com/client9/misspell v0.3.4/go.mod h1:qj6jICC3Q7zFZvVWo7KLAzC3yx5G7kyvSDkc90ppPyw= github.com/cncf/udpa/go v0.0.0-20191209042840-269d4d468f6f/go.mod h1:M8M6+tZqaGXZJjfX53e64911xZQV5JYwmTeXPW+k8Sc= @@ -127,15 +150,20 @@ github.com/cncf/udpa/go v0.0.0-20210930031921-04548b0d99d4/go.mod h1:6pvJx4me5XP github.com/cncf/xds/go v0.0.0-20210312221358-fbca930ec8ed/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cncf/xds/go v0.0.0-20210805033703-aa0b78936158/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cncf/xds/go v0.0.0-20210922020428-25de7278fc84/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= +github.com/cncf/xds/go v0.0.0-20211001041855-01bcc9b48dfe/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cncf/xds/go v0.0.0-20211011173535-cb28da3451f1/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= +github.com/cncf/xds/go v0.0.0-20211130200136-a8f946100490/go.mod h1:eXthEFrGJvWHgFFCl3hGmgk+/aYT6PnTQLykKQRLhEs= github.com/cockroachdb/apd v1.1.0 h1:3LFP3629v+1aKXU5Q37mxmRxX/pIu1nijXydLShEq5I= github.com/cockroachdb/apd v1.1.0/go.mod h1:8Sl8LxpKi29FqWXR16WEFZRNSz3SoPzUzeMeY4+DwBQ= github.com/cockroachdb/datadriven v0.0.0-20190809214429-80d97fb3cbaa/go.mod h1:zn76sxSg3SzpJ0PPJaLDCu+Bu0Lg3sKTORVIj19EIF8= github.com/codahale/hdrhistogram v0.0.0-20161010025455-3a0bb77429bd/go.mod h1:sE/e/2PUdi/liOCUjSTXgM1o87ZssimdTWN964YiIeI= github.com/containerd/console v1.0.2/go.mod h1:ytZPjGgY2oeTkAONYafi2kSj0aYggsf8acV1PGKCbzQ= +github.com/containerd/console v1.0.3/go.mod h1:7LqA/THxQ86k76b8c/EMSiaJ3h1eZkMkXar0TQ1gf3U= github.com/containerd/continuity v0.0.0-20190827140505-75bee3e2ccb6/go.mod h1:GL3xCUCBDV3CZiTSEKksMWbLE66hEyuu9qyDOOqM47Y= github.com/containerd/continuity v0.1.0 h1:UFRRY5JemiAhPZrr/uE0n8fMTLcZsUvySPr1+D7pgr8= github.com/containerd/continuity v0.1.0/go.mod h1:ICJu0PwR54nI0yPEnJ6jcS+J7CZAUXrLh8lPo2knzsM= +github.com/containerd/continuity v0.2.2 h1:QSqfxcn8c+12slxwu00AtzXrsami0MJb/MQs9lOLHLA= +github.com/containerd/continuity v0.2.2/go.mod h1:pWygW9u7LtS1o4N/Tn0FoCFDIXZ7rxcMX7HX1Dmibvk= github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk= github.com/coreos/etcd v3.3.10+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE= github.com/coreos/etcd v3.3.13+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE= @@ -151,15 +179,18 @@ github.com/coreos/pkg v0.0.0-20160727233714-3ac0863d7acf/go.mod h1:E3G3o1h8I7cfc github.com/coreos/pkg v0.0.0-20180928190104-399ea9e2e55f/go.mod h1:E3G3o1h8I7cfcXa63jLwjI0eiQQMgzzUDFVpN/nH/eA= github.com/cpuguy83/go-md2man/v2 v2.0.0-20190314233015-f79a8a8ca69d/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU= github.com/cpuguy83/go-md2man/v2 v2.0.0/go.mod h1:maD7wRr/U5Z6m/iR4s+kqSMx2CaBsrgA7czyZG/E6dU= +github.com/cpuguy83/go-md2man/v2 v2.0.1/go.mod h1:tgQtvFlXSQOSOSIRvRPT7W67SCa46tRHOmNcaadrF8o= github.com/creack/pty v1.1.7/go.mod h1:lj5s0c3V2DBrqTV7llrYr5NG6My20zk30Fl46Y7DoTY= github.com/creack/pty v1.1.9/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E= github.com/creack/pty v1.1.11/go.mod h1:oKZEueFk5CKHvIhNR5MUki03XCEU+Q6VDXinZuGJ33E= github.com/creack/pty v1.1.17 h1:QeVUsEDNrLBW4tMgZHvxy18sKtr6VI492kBhUfhDJNI= github.com/cyphar/filepath-securejoin v0.2.2/go.mod h1:FpkQEhXnPnOthhzymB7CGsFk2G9VLXONKD9G7QGMM+4= +github.com/cyphar/filepath-securejoin v0.2.3/go.mod h1:aPGpWjXOXUn2NCNjFvBE6aRxGGx79pTxQpKOJNYHHl4= github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c= github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38= github.com/denisenkom/go-mssqldb v0.0.0-20191124224453-732737034ffd/go.mod h1:xbL0rPBG9cCiLr28tMa8zpbdarY27NDyej4t/EjAShU= +github.com/denisenkom/go-mssqldb v0.9.0 h1:RSohk2RsiZqLZ0zCjtfn3S4Gp4exhpBWHyQ7D0yGjAk= github.com/denisenkom/go-mssqldb v0.9.0/go.mod h1:xbL0rPBG9cCiLr28tMa8zpbdarY27NDyej4t/EjAShU= github.com/denisenkom/go-mssqldb v0.10.0 h1:QykgLZBorFE95+gO3u9esLd0BmbvpWp0/waNNZfHBM8= github.com/denisenkom/go-mssqldb v0.10.0/go.mod h1:xbL0rPBG9cCiLr28tMa8zpbdarY27NDyej4t/EjAShU= @@ -169,9 +200,14 @@ github.com/dgryski/go-sip13 v0.0.0-20181026042036-e10d5fee7954/go.mod h1:vAd38F8 github.com/docker/cli v20.10.7+incompatible/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= github.com/docker/cli v20.10.8+incompatible h1:/zO/6y9IOpcehE49yMRTV9ea0nBpb8OeqSskXLNfH1E= github.com/docker/cli v20.10.8+incompatible/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= +github.com/docker/cli v20.10.11+incompatible/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= +github.com/docker/cli v20.10.12+incompatible h1:lZlz0uzG+GH+c0plStMUdF/qk3ppmgnswpR5EbqzVGA= +github.com/docker/cli v20.10.12+incompatible/go.mod h1:JLrzqnKDaYBop7H2jaqPtU4hHvMKP+vjCwu2uszcLI8= github.com/docker/docker v20.10.7+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk= github.com/docker/docker v20.10.8+incompatible h1:RVqD337BgQicVCzYrrlhLDWhq6OAD2PJDUg2LsEUvKM= github.com/docker/docker v20.10.8+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk= +github.com/docker/docker v20.10.12+incompatible h1:CEeNmFM0QZIsJCZKMkZx0ZcahTiewkrgiwfYD+dfl1U= +github.com/docker/docker v20.10.12+incompatible/go.mod h1:eEKB0N0r5NX/I1kEveEz05bcu8tLC/8azJZsviup8Sk= github.com/docker/go-connections v0.4.0 h1:El9xVISelRB7BuFusrZozjnkIM5YnzCViNKohAFqRJQ= github.com/docker/go-connections v0.4.0/go.mod h1:Gbd7IOopHjR8Iph03tsViu4nIes5XhDvyHbTtUxmeec= github.com/docker/go-units v0.4.0 h1:3uh0PgVws3nIA0Q+MwDC8yjEPf9zjRfZZWXZYDct3Tw= @@ -194,11 +230,14 @@ github.com/envoyproxy/go-control-plane v0.9.9-0.20201210154907-fd9021fe5dad/go.m github.com/envoyproxy/go-control-plane v0.9.9-0.20210217033140-668b12f5399d/go.mod h1:cXg6YxExXjJnVBQHBLXeUAgxn2UodCpnH306RInaBQk= github.com/envoyproxy/go-control-plane v0.9.9-0.20210512163311-63b5d3c536b0/go.mod h1:hliV/p42l8fGbc6Y9bQ70uLwIvmJyVE5k4iMKlh8wCQ= github.com/envoyproxy/go-control-plane v0.9.10-0.20210907150352-cf90f659a021/go.mod h1:AFq3mo9L8Lqqiid3OhADV3RfLJnjiw63cSpi+fDTRC0= +github.com/envoyproxy/go-control-plane v0.10.1/go.mod h1:AY7fTTXNdv/aJ2O5jwpxAPOWUZ7hQAEvzN5Pf27BkQQ= github.com/envoyproxy/protoc-gen-validate v0.1.0/go.mod h1:iSmxcyjqTsJpI2R4NaDN7+kN2VEUnK/pcBlmesArF7c= +github.com/envoyproxy/protoc-gen-validate v0.6.2/go.mod h1:2t7qjJNvHPx8IjnBOzl9E9/baC+qXE/TeeyBRzgJDws= github.com/erikstmartin/go-testdb v0.0.0-20160219214506-8d10e4a1bae5 h1:Yzb9+7DPaBjB8zlTR87/ElzFsnQfuHnVUVqpZZIcV5Y= github.com/erikstmartin/go-testdb v0.0.0-20160219214506-8d10e4a1bae5/go.mod h1:a2zkGnVExMxdzMo3M0Hi/3sEU+cWnZpSni0O6/Yb/P0= github.com/fatih/color v1.7.0/go.mod h1:Zm6kSWBoL9eyXnKyktHP6abPY2pDugNf5KwzbycvMj4= github.com/fatih/color v1.9.0/go.mod h1:eQcE1qtQxscV5RaZvpXrrb8Drkc3/DdQ+uUYCNjL+zU= +github.com/fatih/color v1.13.0/go.mod h1:kLAiJbzzSOZDVNGyDpeOxJ47H46qBXwg5ILebYFFOfk= github.com/fatih/set v0.2.1 h1:nn2CaJyknWE/6txyUDGwysr3G5QC6xWB/PtVjPBbeaA= github.com/fatih/set v0.2.1/go.mod h1:+RKtMCH+favT2+3YecHGxcc0b4KyVWA1QWWJUs4E0CI= github.com/franela/goblin v0.0.0-20200105215937-c9ffbefa60db/go.mod h1:7dvUGVsVBjqR7JHJk0brhHOZYGmfBYOrK0ZhYMEtBr4= @@ -214,6 +253,8 @@ github.com/gin-contrib/sse v0.1.0 h1:Y/yl/+YNO8GZSjAhjMsSuLt29uWRFHdHYUb5lYOV9qE github.com/gin-contrib/sse v0.1.0/go.mod h1:RHrZQHXnP2xjPF+u1gW/2HnVO7nvIa9PG3Gm+fLHvGI= github.com/gin-gonic/gin v1.7.4 h1:QmUZXrvJ9qZ3GfWvQ+2wnW/1ePrTEJqPKMYEU3lD/DM= github.com/gin-gonic/gin v1.7.4/go.mod h1:jD2toBW3GZUr5UMcdrwQA10I7RuaFOl/SGeDjXkfUtY= +github.com/gin-gonic/gin v1.7.7 h1:3DoBmSbJbZAWqXJC3SLjAPfutPJJRN1U5pALB7EeTTs= +github.com/gin-gonic/gin v1.7.7/go.mod h1:axIBovoeJpVj8S3BwE0uPMTeReE4+AfFtqpqaZ1qq1U= github.com/go-gl/glfw v0.0.0-20190409004039-e6da0acd62b1/go.mod h1:vR7hzQXu2zJy9AVAgeJqvqgH9Q5CA+iKCZ2gyEVpxRU= github.com/go-gl/glfw/v3.3/glfw v0.0.0-20191125211704-12ad95a8df72/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= github.com/go-gl/glfw/v3.3/glfw v0.0.0-20200222043503-6f7a984d4dc4/go.mod h1:tQ2UAYgL5IevRw8kRxooKSPJfGvJ9fJQFa0TUsXzTg8= @@ -235,17 +276,22 @@ github.com/go-playground/universal-translator v0.18.0/go.mod h1:UvRDBj+xPUEGrFYl github.com/go-playground/validator/v10 v10.4.1/go.mod h1:nlOn6nFhuKACm19sB/8EGNn9GlaMV7XkbRSipzJ0Ii4= github.com/go-playground/validator/v10 v10.9.0 h1:NgTtmN58D0m8+UuxtYmGztBJB7VnPgjj221I1QHci2A= github.com/go-playground/validator/v10 v10.9.0/go.mod h1:74x4gJWsvQexRdW8Pn3dXSGrTK4nAUsbPlLADvpJkos= +github.com/go-playground/validator/v10 v10.10.0 h1:I7mrTYv78z8k8VXa/qJlOlEXn/nBh+BF8dHX5nt/dr0= +github.com/go-playground/validator/v10 v10.10.0/go.mod h1:74x4gJWsvQexRdW8Pn3dXSGrTK4nAUsbPlLADvpJkos= github.com/go-sql-driver/mysql v1.4.0/go.mod h1:zAC/RDZ24gD3HViQzih4MyKcchzm+sOG5ZlKdlhCg5w= github.com/go-sql-driver/mysql v1.5.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg= github.com/go-sql-driver/mysql v1.6.0 h1:BCTh4TKNUYmOmMUcQ3IipzF5prigylS7XXjEkfCHuOE= github.com/go-sql-driver/mysql v1.6.0/go.mod h1:DCzpHaOWr8IXmIStZouvnhqoel9Qv2LBy8hT2VhHyBg= github.com/go-stack/stack v1.8.0/go.mod h1:v0f6uXyyMGvRgIKkXu+yp6POWl0qKG85gN/melR3HDY= github.com/godbus/dbus/v5 v5.0.4/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA= +github.com/godbus/dbus/v5 v5.0.6/go.mod h1:xhWf0FNVPg57R7Z0UbKHbJfkEywrmjJnf7w5xrFpKfA= github.com/gofrs/flock v0.8.0/go.mod h1:F1TvTiK9OcQqauNUHlbJvyl9Qa1QvF/gOUDKA14jxHU= github.com/gofrs/uuid v3.2.0+incompatible/go.mod h1:b2aQJv3Z4Fp6yNu3cdSllBxTCLRxnplIgP/c0N/04lM= github.com/gofrs/uuid v4.0.0+incompatible/go.mod h1:b2aQJv3Z4Fp6yNu3cdSllBxTCLRxnplIgP/c0N/04lM= github.com/gofrs/uuid v4.1.0+incompatible h1:sIa2eCvUTwgjbqXrPLfNwUf9S3i3mpH1O1atV+iL/Wk= github.com/gofrs/uuid v4.1.0+incompatible/go.mod h1:b2aQJv3Z4Fp6yNu3cdSllBxTCLRxnplIgP/c0N/04lM= +github.com/gofrs/uuid v4.2.0+incompatible h1:yyYWMnhkhrKwwr8gAOcOCYxOOscHgDS9yZgBrnJfGa0= +github.com/gofrs/uuid v4.2.0+incompatible/go.mod h1:b2aQJv3Z4Fp6yNu3cdSllBxTCLRxnplIgP/c0N/04lM= github.com/gogo/googleapis v1.1.0/go.mod h1:gf4bu3Q80BeJ6H1S1vYPm8/ELATdvryBaNFGgqEef3s= github.com/gogo/protobuf v1.1.1/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ= github.com/gogo/protobuf v1.2.0/go.mod h1:r8qH/GZQm5c6nD/R0oafs1akxWv10x8SbQlK7atdtwQ= @@ -262,6 +308,7 @@ github.com/golang/groupcache v0.0.0-20190129154638-5b532d6fd5ef/go.mod h1:cIg4er github.com/golang/groupcache v0.0.0-20190702054246-869f871628b6/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20191227052852-215e87163ea7/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/groupcache v0.0.0-20200121045136-8c9f03a8e57e/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= +github.com/golang/groupcache v0.0.0-20210331224755-41bb18bfe9da/go.mod h1:cIg4eruTrX1D+g88fzRXU5OdNfaM+9IcxsU14FzY7Hc= github.com/golang/mock v1.1.1/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= github.com/golang/mock v1.2.0/go.mod h1:oTYuIxOrZwtPieC+H1uAHpcLFnEyAGVDL/k47Jfbm0A= github.com/golang/mock v1.3.1/go.mod h1:sBzyDLLjw3U8JLTeZvSv8jJB+tU5PVekmnlKIyFUx0Y= @@ -306,6 +353,7 @@ github.com/google/go-cmp v0.5.4/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/ github.com/google/go-cmp v0.5.5/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= github.com/google/go-cmp v0.5.6 h1:BKbKCqvP6I+rmFHt06ZmyQtvB8xAkWdhFyr0ZUNZcxQ= github.com/google/go-cmp v0.5.6/go.mod h1:v8dTdLbMG2kIc/vJvl+f65V22dbkXbowE6jgT/gNBxE= +github.com/google/go-cmp v0.5.7 h1:81/ik6ipDQS2aGcBfIN5dHDB36BwrStyeAQquSYCV4o= github.com/google/go-github v17.0.0+incompatible h1:N0LgJ1j65A7kfXrZnUDaYCs/Sf4rEjNlfyDHW9dolSY= github.com/google/go-github v17.0.0+incompatible/go.mod h1:zLgOLi98H3fifZn+44m+umXrS52loVEgC2AApnigrVQ= github.com/google/go-querystring v1.1.0 h1:AnCroh3fv4ZBgVIf1Iwtovgjaw/GiKJo8M8yD/fhyJ8= @@ -324,6 +372,7 @@ github.com/google/pprof v0.0.0-20200430221834-fc25d7d30c6d/go.mod h1:ZgVRPoUq/hf github.com/google/pprof v0.0.0-20200708004538-1a94d8640e99/go.mod h1:ZgVRPoUq/hfqzAqh7sHMqb3I9Rq5C59dIz2SbBwJ4eM= github.com/google/pprof v0.0.0-20201023163331-3e6fc7fc9c4c/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE= github.com/google/pprof v0.0.0-20201203190320-1bf35d6f28c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE= +github.com/google/pprof v0.0.0-20201218002935-b9804c9f04c2/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE= github.com/google/pprof v0.0.0-20210122040257-d980be63207e/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE= github.com/google/pprof v0.0.0-20210226084205-cbba55b83ad5/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE= github.com/google/pprof v0.0.0-20210601050228-01bbb1931b22/go.mod h1:kpwsk12EmLew5upagYY7GY0pfYCcupk39gWOCRROcvE= @@ -338,8 +387,12 @@ github.com/google/uuid v1.2.0/go.mod h1:TIyPZe4MgqvfeYDBFedMoGGpEw/LqOeaOT+nhxU+ github.com/googleapis/gax-go/v2 v2.0.4/go.mod h1:0Wqv26UfaUD9n4G6kQubkQ+KchISgw+vpHVxEJEs9eg= github.com/googleapis/gax-go/v2 v2.0.5/go.mod h1:DWXyrwAJ9X0FpwwEdw+IPEYBICEFu5mhpdKc/us6bOk= github.com/googleapis/gax-go/v2 v2.1.0/go.mod h1:Q3nei7sK6ybPYH7twZdmQpAd1MKb7pfu6SK+H1/DsU0= +github.com/googleapis/gax-go/v2 v2.1.1/go.mod h1:hddJymUZASv3XPyGkUpKj8pPO47Rmb0eJc8R6ouapiM= +github.com/googleapis/google-cloud-go-testing v0.0.0-20200911160855-bcd43fbb19e8/go.mod h1:dvDLG8qkwmyD9a/MJJN3XJcT3xFxOKAvTZGvuZmac9g= github.com/gookit/color v1.4.2 h1:tXy44JFSFkKnELV6WaMo/lLfu/meqITX3iAV52do7lk= github.com/gookit/color v1.4.2/go.mod h1:fqRyamkC1W8uxl+lxCQxOT09l/vYfZ+QeiX3rKQHCoQ= +github.com/gookit/color v1.5.0 h1:1Opow3+BWDwqor78DcJkJCIwnkviFi+rrOANki9BUFw= +github.com/gookit/color v1.5.0/go.mod h1:43aQb+Zerm/BWh2GnrgOQm7ffz7tvQXEKV6BFMl7wAo= github.com/gopherjs/gopherjs v0.0.0-20181017120253-0766667cb4d1/go.mod h1:wJfORRmW1u3UXTncJ5qlYoELFm8eSnnEO6hX4iZ3EWY= github.com/gordonklaus/ineffassign v0.0.0-20200309095847-7953dde2c7bf/go.mod h1:cuNKsD1zp2v6XfE/orVX2QE1LC+i254ceGcVeDT3pTU= github.com/gorilla/context v1.1.1/go.mod h1:kBGZzfjB9CEq2AlWe17Uuf7NDRt0dE0s8S51q0aT7Yg= @@ -357,24 +410,33 @@ github.com/grpc-ecosystem/go-grpc-prometheus v1.2.0/go.mod h1:8NvIoxWQoOIhqOTXgf github.com/grpc-ecosystem/grpc-gateway v1.9.0/go.mod h1:vNeuVxBJEsws4ogUvrchl83t/GYV9WGTSLVdBhOQFDY= github.com/grpc-ecosystem/grpc-gateway v1.9.5/go.mod h1:vNeuVxBJEsws4ogUvrchl83t/GYV9WGTSLVdBhOQFDY= github.com/grpc-ecosystem/grpc-gateway v1.14.6/go.mod h1:zdiPV4Yse/1gnckTHtghG4GkDEdKCRJduHpTxT3/jcw= +github.com/grpc-ecosystem/grpc-gateway v1.16.0 h1:gmcG1KaJ57LophUzW0Hy8NmPhnMZb4M0+kPpLofRdBo= github.com/grpc-ecosystem/grpc-gateway v1.16.0/go.mod h1:BDjrQk3hbvj6Nolgz8mAMFbcEtjT1g+wF4CSlocrBnw= github.com/grpc-ecosystem/grpc-gateway/v2 v2.3.0/go.mod h1:d2gYTOTUQklu06xp0AJYYmRdTVU1VKrqhkYfYag2L08= github.com/grpc-ecosystem/grpc-gateway/v2 v2.4.0/go.mod h1:IOyTYjcIO0rkmnGBfJTL0NJ11exy/Tc2QEuv7hCXp24= github.com/grpc-ecosystem/grpc-gateway/v2 v2.6.0 h1:rgxjzoDmDXw5q8HONgyHhBas4to0/XWRo/gPpJhsUNQ= github.com/grpc-ecosystem/grpc-gateway/v2 v2.6.0/go.mod h1:qrJPVzv9YlhsrxJc3P/Q85nr0w1lIRikTl4JlhdDH5w= +github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.3 h1:I8MsauTJQXZ8df8qJvEln0kYNc3bSapuaSsEsnFdEFU= +github.com/grpc-ecosystem/grpc-gateway/v2 v2.7.3/go.mod h1:lZdb/YAJUSj9OqrCHs2ihjtoO3+xK3G53wTYXFWRGDo= github.com/hashicorp/consul/api v1.1.0/go.mod h1:VmuI/Lkw1nC05EYQWNKwWGbkg+FbDBtguAZLlVdkD9Q= github.com/hashicorp/consul/api v1.3.0/go.mod h1:MmDNSzIMUjNpY/mQ398R4bk2FnqQLoPndWW5VkKPlCE= github.com/hashicorp/consul/api v1.10.1/go.mod h1:XjsvQN+RJGWI2TWy1/kqaE16HrR2J/FWgkYjdZQsX9M= +github.com/hashicorp/consul/api v1.11.0/go.mod h1:XjsvQN+RJGWI2TWy1/kqaE16HrR2J/FWgkYjdZQsX9M= github.com/hashicorp/consul/sdk v0.1.1/go.mod h1:VKf9jXwCTEY1QZP2MOLRhb5i/I/ssyNV1vwHyQBF0x8= github.com/hashicorp/consul/sdk v0.3.0/go.mod h1:VKf9jXwCTEY1QZP2MOLRhb5i/I/ssyNV1vwHyQBF0x8= github.com/hashicorp/consul/sdk v0.8.0/go.mod h1:GBvyrGALthsZObzUGsfgHZQDXjg4lOjagTIwIR1vPms= github.com/hashicorp/errwrap v1.0.0/go.mod h1:YH+1FKiLXxHSkmPseP+kNlulaMuP3n2brvKWEqk/Jc4= +github.com/hashicorp/go-cleanhttp v0.5.0/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80= github.com/hashicorp/go-cleanhttp v0.5.1/go.mod h1:JpRdi6/HCYpAwUzNwuwqhbovhLtngrth3wmdIIUrZ80= +github.com/hashicorp/go-cleanhttp v0.5.2/go.mod h1:kO/YDlP8L1346E6Sodw+PrpBSV4/SoxCXGY6BqNFT48= github.com/hashicorp/go-hclog v0.12.0/go.mod h1:whpDNt7SSdeAju8AWKIWsul05p54N/39EeqMAyrmvFQ= +github.com/hashicorp/go-hclog v1.0.0/go.mod h1:whpDNt7SSdeAju8AWKIWsul05p54N/39EeqMAyrmvFQ= github.com/hashicorp/go-immutable-radix v1.0.0/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60= +github.com/hashicorp/go-immutable-radix v1.3.1/go.mod h1:0y9vanUI8NX6FsYoO3zeMjhV/C5i9g4Q3DwcSNZ4P60= github.com/hashicorp/go-msgpack v0.5.3/go.mod h1:ahLV/dePpqEmjfWmKiqvPkv/twdG7iPBM1vqhUKIvfM= github.com/hashicorp/go-multierror v1.0.0/go.mod h1:dHtQlpGsu+cZNNAkkCN/P3hoUDHhCYQXV3UM06sGGrk= github.com/hashicorp/go-multierror v1.1.0/go.mod h1:spPvp8C1qA32ftKqdAHm4hHTbPw+vmowP0z+KUhOZdA= +github.com/hashicorp/go-retryablehttp v0.5.3/go.mod h1:9B5zBasrRhHXnJnui7y6sL7es7NDiJgTc6Er0maI1Xs= github.com/hashicorp/go-rootcerts v1.0.0/go.mod h1:K6zTfqpRlCUIjkwsN4Z+hiSfzSTQa6eBIzfwKfwNnHU= github.com/hashicorp/go-rootcerts v1.0.2/go.mod h1:pqUvnprVnM5bf7AOirdbb01K4ccR319Vf4pU3K5EGc8= github.com/hashicorp/go-sockaddr v1.0.0/go.mod h1:7Xibr9yA9JjQq1JpNB2Vw7kxv8xerXegt+ozgdvDeDU= @@ -383,22 +445,29 @@ github.com/hashicorp/go-uuid v1.0.0/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/b github.com/hashicorp/go-uuid v1.0.1/go.mod h1:6SBZvOh/SIDV7/2o3Jml5SYk/TvGqwFJ/bN7x4byOro= github.com/hashicorp/go-version v1.2.0 h1:3vNe/fWF5CBgRIguda1meWhsZHy3m8gCJ5wx+dIzX/E= github.com/hashicorp/go-version v1.2.0/go.mod h1:fltr4n8CU8Ke44wwGCBoEymUuxUHl09ZGVZPK5anwXA= +github.com/hashicorp/go-version v1.4.0 h1:aAQzgqIrRKRa7w75CKpbBxYsmUoPjzVm1W59ca1L0J4= +github.com/hashicorp/go-version v1.4.0/go.mod h1:fltr4n8CU8Ke44wwGCBoEymUuxUHl09ZGVZPK5anwXA= github.com/hashicorp/go.net v0.0.1/go.mod h1:hjKkEWcCURg++eb33jQU7oqQcI9XDCnUzHA0oac0k90= github.com/hashicorp/golang-lru v0.5.0/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= github.com/hashicorp/golang-lru v0.5.1/go.mod h1:/m3WP610KZHVQ1SGc6re/UDhFvYD7pJ4Ao+sR/qLZy8= +github.com/hashicorp/golang-lru v0.5.4/go.mod h1:iADmTwqILo4mZ8BN3D2Q6+9jd8WM5uGBxy+E8yxSoD4= github.com/hashicorp/hcl v1.0.0 h1:0Anlzjpi4vEasTeNFn2mLJgTSwt0+6sfsiTG8qcWGx4= github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ= github.com/hashicorp/logutils v1.0.0/go.mod h1:QIAnNjmIWmVIIkWDTG1z5v++HQmx9WQRO+LraFDTW64= github.com/hashicorp/mdns v1.0.0/go.mod h1:tL+uN++7HEJ6SQLQ2/p+z2pH24WQKWjBPkE0mNTz8vQ= github.com/hashicorp/mdns v1.0.1/go.mod h1:4gW7WsVCke5TE7EPeYliwHlRUyBtfCwuFwuMg2DmyNY= +github.com/hashicorp/mdns v1.0.4/go.mod h1:mtBihi+LeNXGtG8L9dX59gAEa12BDtBQSp4v/YAJqrc= github.com/hashicorp/memberlist v0.1.3/go.mod h1:ajVTdAv/9Im8oMAAj5G31PhhMCZJV2pPBoIllUwCN7I= github.com/hashicorp/memberlist v0.2.2/go.mod h1:MS2lj3INKhZjWNqd3N0m3J+Jxf3DAOnAH9VT3Sh9MUE= +github.com/hashicorp/memberlist v0.3.0/go.mod h1:MS2lj3INKhZjWNqd3N0m3J+Jxf3DAOnAH9VT3Sh9MUE= github.com/hashicorp/serf v0.8.2/go.mod h1:6hOLApaqBFA1NXqRQAsxw9QxuDEvNxSQRwA/JwenrHc= github.com/hashicorp/serf v0.9.5/go.mod h1:UWDWwZeL5cuWDJdl0C6wrvrUwEqtQ4ZKBKKENpqIUyk= +github.com/hashicorp/serf v0.9.6/go.mod h1:TXZNMjZQijwlDvp+r0b63xZ45H7JmCmgg4gpTwn9UV4= github.com/hinshun/vt10x v0.0.0-20180616224451-1954e6464174 h1:WlZsjVhE8Af9IcZDGgJGQpNflI3+MJSBhsgT5PCtzBQ= github.com/hinshun/vt10x v0.0.0-20180616224451-1954e6464174/go.mod h1:DqJ97dSdRW1W22yXSB90986pcOyQ7r45iio1KN2ez1A= github.com/hpcloud/tail v1.0.0/go.mod h1:ab1qPbhIpdTxEkNHXyeSf5vhxWSCs/tWer42PpOxQnU= github.com/hudl/fargo v1.3.0/go.mod h1:y3CKSmjA+wD2gak7sUSXTAoopbhU08POFhmITJgmKTg= +github.com/iancoleman/strcase v0.2.0/go.mod h1:iwCmte+B7n89clKwxIoIXy/HfoL7AsD47ZCWhYzw7ho= github.com/ianlancetaylor/demangle v0.0.0-20181102032728-5e5cf60278f6/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= github.com/ianlancetaylor/demangle v0.0.0-20200824232613-28f6c0f3b639/go.mod h1:aSSvb/t6k1mPoxDqO4vJh6VOCGPwU4O0C2/Eqndh1Sc= github.com/imdario/mergo v0.3.12 h1:b6R2BslTbIEToALKP7LxUvijTsNI9TAe80pLWN2g/HU= @@ -409,6 +478,9 @@ github.com/influxdata/influxdb1-client v0.0.0-20191209144304-8bf82d3c094d/go.mod github.com/infobloxopen/atlas-app-toolkit v0.24.1-0.20210416193901-4c7518b07e08/go.mod h1:9BTHnpff654rY1J8KxSUOLJ+ZUDn2Vi3mmk26gQDo1M= github.com/infobloxopen/protoc-gen-gorm v1.0.1 h1:IjvQ02gZSll+CjpWjxkLqrpxnvKAGfs5dXRJEpfZx2s= github.com/infobloxopen/protoc-gen-gorm v1.0.1/go.mod h1:gTu86stnDQXwcNqLG9WNJfl3IPUIhxmGNqJ8z4826uo= +github.com/infobloxopen/protoc-gen-gorm v1.1.0 h1:l6JKEkqMTFbtoGIfQmh/aOy7KfljgX4ql772LtG4kas= +github.com/infobloxopen/protoc-gen-gorm v1.1.0/go.mod h1:ohzLmmFMWQztw2RBHunfjKSCjTPUW4JvbgU1Mdazwxg= +github.com/jackc/chunkreader v1.0.0 h1:4s39bBR8ByfqH+DKm8rQA3E1LHZWB9XWcrz8fqaZbe0= github.com/jackc/chunkreader v1.0.0/go.mod h1:RT6O25fNZIuasFJRyZ4R/Y2BbhasbmZXF9QQ7T3kePo= github.com/jackc/chunkreader/v2 v2.0.0/go.mod h1:odVSm741yZoC3dpHEUXIqA9tQRhFrgOHwnPIn9lDKlk= github.com/jackc/chunkreader/v2 v2.0.1 h1:i+RDz65UE+mmpjTfyz0MoVTnzeYxroil2G82ki7MGG8= @@ -425,6 +497,9 @@ github.com/jackc/pgconn v1.9.0/go.mod h1:YctiPyvzfU11JFxoXokUOOKQXQmDMoJL9vJzHH8 github.com/jackc/pgconn v1.9.1-0.20210724152538-d89c8390a530/go.mod h1:4z2w8XhRbP1hYxkpTuBjTS3ne3J48K83+u0zoyvg2pI= github.com/jackc/pgconn v1.10.0 h1:4EYhlDVEMsJ30nNj0mmgwIUXoq7e9sMJrVC2ED6QlCU= github.com/jackc/pgconn v1.10.0/go.mod h1:4z2w8XhRbP1hYxkpTuBjTS3ne3J48K83+u0zoyvg2pI= +github.com/jackc/pgconn v1.10.1/go.mod h1:4z2w8XhRbP1hYxkpTuBjTS3ne3J48K83+u0zoyvg2pI= +github.com/jackc/pgconn v1.11.0 h1:HiHArx4yFbwl91X3qqIHtUFoiIfLNJXCQRsnzkiwwaQ= +github.com/jackc/pgconn v1.11.0/go.mod h1:4z2w8XhRbP1hYxkpTuBjTS3ne3J48K83+u0zoyvg2pI= github.com/jackc/pgio v1.0.0 h1:g12B9UwVnzGhueNavwioyEEpAmqMe1E/BN9ES+8ovkE= github.com/jackc/pgio v1.0.0/go.mod h1:oP+2QK2wFfUWgr+gxjoBH9KGBb31Eio69xUb0w5bYf8= github.com/jackc/pgmock v0.0.0-20190831213851-13a1b77aafa2/go.mod h1:fGZlG77KXmcq05nJLRkk0+p82V8B8Dw8KN2/V9c/OAE= @@ -433,6 +508,7 @@ github.com/jackc/pgmock v0.0.0-20210724152146-4ad1a8207f65 h1:DadwsjnMwFjfWc9y5W github.com/jackc/pgmock v0.0.0-20210724152146-4ad1a8207f65/go.mod h1:5R2h2EEX+qri8jOWMbJCtaPWkrrNc7OHwsp2TCqp7ak= github.com/jackc/pgpassfile v1.0.0 h1:/6Hmqy13Ss2zCq62VdNG8tM1wchn8zjSGOBJ6icpsIM= github.com/jackc/pgpassfile v1.0.0/go.mod h1:CEx0iS5ambNFdcRtxPj5JhEz+xB6uRky5eyVu/W2HEg= +github.com/jackc/pgproto3 v1.1.0 h1:FYYE4yRw+AgI8wXIinMlNjBbp/UitDJwfj5LqqewP1A= github.com/jackc/pgproto3 v1.1.0/go.mod h1:eR5FA3leWg7p9aeAqi37XOTgTIbkABlvcPB3E5rlc78= github.com/jackc/pgproto3/v2 v2.0.0-alpha1.0.20190420180111-c116219b62db/go.mod h1:bhq50y+xrl9n5mRYyCBFKkpRVTLYJVWeCc+mEAI3yXA= github.com/jackc/pgproto3/v2 v2.0.0-alpha1.0.20190609003834-432c2951c711/go.mod h1:uH0AWtUmuShn0bcesswc4aBTWGvw0cAxIJp+6OB//Wg= @@ -442,6 +518,8 @@ github.com/jackc/pgproto3/v2 v2.0.1/go.mod h1:WfJCnwN3HIg9Ish/j3sgWXnAfK8A9Y0bwX github.com/jackc/pgproto3/v2 v2.0.6/go.mod h1:WfJCnwN3HIg9Ish/j3sgWXnAfK8A9Y0bwXYU5xKaEdA= github.com/jackc/pgproto3/v2 v2.1.1 h1:7PQ/4gLoqnl87ZxL7xjO0DR5gYuviDCZxQJsUlFW1eI= github.com/jackc/pgproto3/v2 v2.1.1/go.mod h1:WfJCnwN3HIg9Ish/j3sgWXnAfK8A9Y0bwXYU5xKaEdA= +github.com/jackc/pgproto3/v2 v2.2.0 h1:r7JypeP2D3onoQTCxWdTpCtJ4D+qpKr0TxvoyMhZ5ns= +github.com/jackc/pgproto3/v2 v2.2.0/go.mod h1:WfJCnwN3HIg9Ish/j3sgWXnAfK8A9Y0bwXYU5xKaEdA= github.com/jackc/pgservicefile v0.0.0-20200307190119-3430c5407db8/go.mod h1:vsD4gTJCa9TptPL8sPkXrLZ+hDuNrZCnj29CQpr4X1E= github.com/jackc/pgservicefile v0.0.0-20200714003250-2b9c44734f2b h1:C8S2+VttkHFdOOCXJe+YGfa4vHYwlt4Zx+IVXQ97jYg= github.com/jackc/pgservicefile v0.0.0-20200714003250-2b9c44734f2b/go.mod h1:vsD4gTJCa9TptPL8sPkXrLZ+hDuNrZCnj29CQpr4X1E= @@ -455,6 +533,9 @@ github.com/jackc/pgtype v1.7.0/go.mod h1:ZnHF+rMePVqDKaOfJVI4Q8IVvAQMryDlDkZnKOI github.com/jackc/pgtype v1.8.1-0.20210724151600-32e20a603178/go.mod h1:C516IlIV9NKqfsMCXTdChteoXmwgUceqaLfjg2e3NlM= github.com/jackc/pgtype v1.8.1 h1:9k0IXtdJXHJbyAWQgbWr1lU+MEhPXZz6RIXxfR5oxXs= github.com/jackc/pgtype v1.8.1/go.mod h1:LUMuVrfsFfdKGLw+AFFVv6KtHOFMwRgDDzBt76IqCA4= +github.com/jackc/pgtype v1.9.0/go.mod h1:LUMuVrfsFfdKGLw+AFFVv6KtHOFMwRgDDzBt76IqCA4= +github.com/jackc/pgtype v1.10.0 h1:ILnBWrRMSXGczYvmkYD6PsYyVFUNLTnIUJHHDLmqk38= +github.com/jackc/pgtype v1.10.0/go.mod h1:LUMuVrfsFfdKGLw+AFFVv6KtHOFMwRgDDzBt76IqCA4= github.com/jackc/pgx/v4 v4.0.0-20190420224344-cc3461e65d96/go.mod h1:mdxmSJJuR08CZQyj1PVQBHy9XOp5p8/SHH6a0psbY9Y= github.com/jackc/pgx/v4 v4.0.0-20190421002000-1b8f0016e912/go.mod h1:no/Y67Jkk/9WuGR0JG/JseM9irFbnEPbuWV2EELPNuM= github.com/jackc/pgx/v4 v4.0.0-pre1.0.20190824185557-6972a5742186/go.mod h1:X+GQnOEnf1dqHGpw7JmHqHc1NxDoalibchSk9/RWuDc= @@ -465,11 +546,16 @@ github.com/jackc/pgx/v4 v4.11.0/go.mod h1:i62xJgdrtVDsnL3U8ekyrQXEwGNTRoG7/8r+CI github.com/jackc/pgx/v4 v4.12.1-0.20210724153913-640aa07df17c/go.mod h1:1QD0+tgSXP7iUjYm9C1NxKhny7lq6ee99u/z+IHFcgs= github.com/jackc/pgx/v4 v4.13.0 h1:JCjhT5vmhMAf/YwBHLvrBn4OGdIQBiFG6ym8Zmdx570= github.com/jackc/pgx/v4 v4.13.0/go.mod h1:9P4X524sErlaxj0XSGZk7s+LD0eOyu1ZDUrrpznYDF0= +github.com/jackc/pgx/v4 v4.14.0/go.mod h1:jT3ibf/A0ZVCp89rtCIN0zCJxcE74ypROmHEZYsG/j8= +github.com/jackc/pgx/v4 v4.15.0 h1:B7dTkXsdILD3MF987WGGCcg+tvLW6bZJdEcqVFeU//w= +github.com/jackc/pgx/v4 v4.15.0/go.mod h1:D/zyOyXiaM1TmVWnOM18p0xdDtdakRBa0RsVGI3U3bw= github.com/jackc/puddle v0.0.0-20190413234325-e4ced69a3a2b/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= github.com/jackc/puddle v0.0.0-20190608224051-11cab39313c9/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= github.com/jackc/puddle v1.1.0/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= github.com/jackc/puddle v1.1.1/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= github.com/jackc/puddle v1.1.3/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= +github.com/jackc/puddle v1.2.0/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= +github.com/jackc/puddle v1.2.1/go.mod h1:m4B5Dj62Y0fbyuIc15OsIqK0+JU8nkqQjsgx7dvjSWk= github.com/jhump/protoreflect v1.8.1/go.mod h1:7GcYQDdMU/O/BBrl/cX6PNHpXh6cenjd8pneu5yW7Tg= github.com/jinzhu/gorm v1.9.16 h1:+IyIjPEABKRpsu/F8OvDPy9fyQlgsg2luMV2ZIH5i5o= github.com/jinzhu/gorm v1.9.16/go.mod h1:G3LB3wezTOWM2ITLzPxEXgSkOXAntiLHS7UdBefADcs= @@ -479,6 +565,9 @@ github.com/jinzhu/now v1.0.1/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/ github.com/jinzhu/now v1.1.1/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/z8= github.com/jinzhu/now v1.1.2 h1:eVKgfIdy9b6zbWBMgFpfDPoAMifwSZagU9HmEU6zgiI= github.com/jinzhu/now v1.1.2/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/z8= +github.com/jinzhu/now v1.1.3/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/z8= +github.com/jinzhu/now v1.1.4 h1:tHnRBy1i5F2Dh8BAFxqFzxKqqvezXrL2OW1TnX+Mlas= +github.com/jinzhu/now v1.1.4/go.mod h1:d3SSVoowX0Lcu0IBviAWJpolVfI5UJVZZ7cO71lE/z8= github.com/jmespath/go-jmespath v0.0.0-20180206201540-c2b33e8439af/go.mod h1:Nht3zPeWKUH0NzdCt2Blrr5ys8VGpn0CEB0cQHVjt7k= github.com/jonboulle/clockwork v0.1.0/go.mod h1:Ii8DK3G1RaLaWxj9trq07+26W01tbo22gdxWY5EU2bo= github.com/jpillora/backoff v1.0.0/go.mod h1:J/6gKK9jxlEcS3zixgDgUAsiuZ7yrSoa/FX5e0EB2j4= @@ -503,6 +592,9 @@ github.com/kisielk/gotool v1.0.0/go.mod h1:XhKaO+MFFWcvkIS/tQcRk01m1F5IRFswLeQ+o github.com/klauspost/compress v1.11.7/go.mod h1:aoV0uJVorq1K+umq18yTdKaF57EivdYsUV+/s2qKfXs= github.com/klauspost/compress v1.13.6 h1:P76CopJELS0TiO2mebmnzgWaajssP/EszplttgQxcgc= github.com/klauspost/compress v1.13.6/go.mod h1:/3/Vjq9QcHkK5uEr5lBEmyoZ1iFhe47etQ6QUkpK6sk= +github.com/klauspost/compress v1.14.2 h1:S0OHlFk/Gbon/yauFJ4FfJJF5V0fc5HbBTJazi28pRw= +github.com/klauspost/compress v1.14.2/go.mod h1:/3/Vjq9QcHkK5uEr5lBEmyoZ1iFhe47etQ6QUkpK6sk= +github.com/klauspost/cpuid/v2 v2.0.9/go.mod h1:FInQzS24/EEf25PyTYn52gqo7WaD8xa0213Md/qVLRg= github.com/klauspost/pgzip v1.2.5/go.mod h1:Ch1tH69qFZu15pkjo5kYi6mth2Zzwzt50oCQKQE9RUs= github.com/konsorten/go-windows-terminal-sequences v1.0.1/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ= github.com/konsorten/go-windows-terminal-sequences v1.0.2/go.mod h1:T0+1ngSBFLxvqU3pZ+m/2kptfBszLMUkC4ZK/EgS/cQ= @@ -536,6 +628,7 @@ github.com/lib/pq v1.10.3 h1:v9QZf2Sn6AmjXtQeFpdoq/eaNtYP6IN+7lcrygsIAtg= github.com/lib/pq v1.10.3/go.mod h1:AlVN5x4E4T544tWzH6hKfbfQvm3HdbOxrmggDNAPY9o= github.com/lightstep/lightstep-tracer-common/golang/gogo v0.0.0-20190605223551-bc2310a04743/go.mod h1:qklhhLq1aX+mtWk9cPHPzaBjWImj5ULL6C7HFJtXQMM= github.com/lightstep/lightstep-tracer-go v0.18.1/go.mod h1:jlF1pusYV4pidLvZ+XD0UBX0ZE6WURAspgAczcDHrL4= +github.com/lyft/protoc-gen-star v0.5.3/go.mod h1:V0xaHgaf5oCCqmcxYcWiDfTiKsZsRc87/1qhoTACD8w= github.com/lyft/protoc-gen-validate v0.0.13/go.mod h1:XbGvPuh87YZc5TdIa2/I4pLk0QoUACkjt2znoq26NVQ= github.com/magefile/mage v1.10.0/go.mod h1:z5UZb/iS3GoOSn0JgWuiw7dxlurVYTu+/jHXqQg881A= github.com/magiconair/properties v1.8.0/go.mod h1:PppfXfuXeibc/6YijjN8zIbojt8czPbwD3XqdrwzmxQ= @@ -547,6 +640,7 @@ github.com/mattn/go-colorable v0.1.1/go.mod h1:FuOcm+DKB9mbwrcAfNl7/TZVBZ6rcncea github.com/mattn/go-colorable v0.1.2/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE= github.com/mattn/go-colorable v0.1.4/go.mod h1:U0ppj6V5qS13XJ6of8GYAs25YV2eR4EVcfRqFIhoBtE= github.com/mattn/go-colorable v0.1.6/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= +github.com/mattn/go-colorable v0.1.9/go.mod h1:u6P/XSegPjTcexA+o6vUJrdnUu04hMope9wVRipJSqc= github.com/mattn/go-colorable v0.1.12 h1:jF+Du6AlPIjs2BiUiQlKOX0rt3SujHxPnksPKZbaA40= github.com/mattn/go-colorable v0.1.12/go.mod h1:u5H1YNBxpqRaxsYJYSkiCWKzEfiAb1Gb520KVy5xxl4= github.com/mattn/go-isatty v0.0.3/go.mod h1:M+lRXTBqGeGNdLjl/ufCoiOlB5xdOkqRJdNxMWT7Zi4= @@ -568,12 +662,18 @@ github.com/mattn/go-sqlite3 v1.14.5/go.mod h1:WVKg1VTActs4Qso6iwGbiFih2UIHo0ENGw github.com/mattn/go-sqlite3 v1.14.6/go.mod h1:NyWgC/yNuGj7Q9rpYnZvas74GogHl5/Z4A/KQRfk6bU= github.com/mattn/go-sqlite3 v1.14.8 h1:gDp86IdQsN/xWjIEmr9MF6o9mpksUgh0fu+9ByFxzIU= github.com/mattn/go-sqlite3 v1.14.8/go.mod h1:NyWgC/yNuGj7Q9rpYnZvas74GogHl5/Z4A/KQRfk6bU= +github.com/mattn/go-sqlite3 v1.14.9/go.mod h1:NyWgC/yNuGj7Q9rpYnZvas74GogHl5/Z4A/KQRfk6bU= +github.com/mattn/go-sqlite3 v1.14.11 h1:gt+cp9c0XGqe9S/wAHTL3n/7MqY+siPWgWJgqdsFrzQ= +github.com/mattn/go-sqlite3 v1.14.11/go.mod h1:NyWgC/yNuGj7Q9rpYnZvas74GogHl5/Z4A/KQRfk6bU= github.com/matttproud/golang_protobuf_extensions v1.0.1 h1:4hp9jkHxhMHkqkrB3Ix0jegS5sx/RkqARlsWZ6pIwiU= github.com/matttproud/golang_protobuf_extensions v1.0.1/go.mod h1:D8He9yQNgCq6Z5Ld7szi9bcBfOoFv/3dc6xSMkL2PC0= github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b h1:j7+1HpAFS1zy5+Q4qx1fWh90gTKwiN4QCGoY9TWyyO4= github.com/mgutz/ansi v0.0.0-20170206155736-9520e82c474b/go.mod h1:01TrycV0kFyexm33Z7vhZRXopbI8J3TDReVlkTgMUxE= +github.com/mgutz/ansi v0.0.0-20200706080929-d51e80ef957d h1:5PJl274Y63IEHC+7izoQE9x6ikvDFZS2mDVS3drnohI= +github.com/mgutz/ansi v0.0.0-20200706080929-d51e80ef957d/go.mod h1:01TrycV0kFyexm33Z7vhZRXopbI8J3TDReVlkTgMUxE= github.com/miekg/dns v1.0.14/go.mod h1:W1PPwlIAgtquWBMBEV9nkV9Cazfe8ScdGz/Lj7v3Nrg= github.com/miekg/dns v1.1.26/go.mod h1:bPDLeHnStXmXAq1m/Ch/hvfNHr14JKNPMBo3VZKjuso= +github.com/miekg/dns v1.1.41/go.mod h1:p6aan82bvRIyn+zDIv9xYNUpwa73JcSh9BKwknJysuI= github.com/mitchellh/cli v1.0.0/go.mod h1:hNIlj7HEI86fIcpObd7a0FcrxTWetlwJDGcceTlRvqc= github.com/mitchellh/cli v1.1.0/go.mod h1:xcISNoH86gajksDmfB23e/pu+B+GeFRMYmoHXxx3xhI= github.com/mitchellh/go-homedir v1.0.0/go.mod h1:SfyaCUpYCn1Vlf4IUYiD9fPX4A5wJrkLzIz1N1q0pr0= @@ -588,6 +688,7 @@ github.com/mitchellh/mapstructure v1.4.2/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RR github.com/mitchellh/mapstructure v1.4.3 h1:OVowDSCllw/YjdLkam3/sm7wEtOy59d8ndGgCcyj8cs= github.com/mitchellh/mapstructure v1.4.3/go.mod h1:bFUtVrKA4DC2yAKiSyO/QUcy7e+RRV2QTWOzhPopBRo= github.com/moby/sys/mountinfo v0.4.1/go.mod h1:rEr8tzG/lsIZHBtN/JjGG+LMYx9eXgW2JI+6q0qou+A= +github.com/moby/sys/mountinfo v0.5.0/go.mod h1:3bMD3Rg+zkqx8MRYPi7Pyb0Ie97QEBmdxbhnCLlSvSU= github.com/moby/term v0.0.0-20201216013528-df9cb8a40635/go.mod h1:FBS0z0QWA44HXygs7VXDUOGoN/1TV3RuWkLO04am3wc= github.com/moby/term v0.0.0-20210619224110-3f7ff695adc6 h1:dcztxKSvZ4Id8iPpHERQBbIJfabdt4wUm5qy3wOL2Zc= github.com/moby/term v0.0.0-20210619224110-3f7ff695adc6/go.mod h1:E2VnQOmVuvZB6UYnnDB0qG5Nq/1tD9acaOpo6xmt0Kw= @@ -624,10 +725,14 @@ github.com/opencontainers/image-spec v1.0.1/go.mod h1:BtxoFyWECRxE4U/7sNtV5W15zM github.com/opencontainers/image-spec v1.0.2 h1:9yCKha/T5XdGtO0q9Q9a6T5NUCsTn/DrBg0D7ufOcFM= github.com/opencontainers/image-spec v1.0.2/go.mod h1:BtxoFyWECRxE4U/7sNtV5W15zMzWCbyJoFRP3s7yZA0= github.com/opencontainers/runc v1.0.0-rc9/go.mod h1:qT5XzbpPznkRYVz/mWwUaVBUv2rmF59PVA73FjuZG0U= +github.com/opencontainers/runc v1.0.2/go.mod h1:aTaHFFwQXuA71CiyxOdFFIorAoemI04suvGRQFzWTD0= github.com/opencontainers/runc v1.0.3 h1:1hbqejyQWCJBvtKAfdO0b1FmaEf2z/bxnjqbARass5k= github.com/opencontainers/runc v1.0.3/go.mod h1:aTaHFFwQXuA71CiyxOdFFIorAoemI04suvGRQFzWTD0= +github.com/opencontainers/runc v1.1.0 h1:O9+X96OcDjkmmZyfaG996kV7yq8HsoU2h1XRRQcefG8= +github.com/opencontainers/runc v1.1.0/go.mod h1:Tj1hFw6eFWp/o33uxGf5yF2BX5yz2Z6iptFpuvbbKqc= github.com/opencontainers/runtime-spec v1.0.3-0.20210326190908-1c3f411f0417/go.mod h1:jwyrGlmzljRJv/Fgzds9SsS/C5hL+LL3ko9hs6T5lQ0= github.com/opencontainers/selinux v1.8.2/go.mod h1:MUIHuUEvKB1wtJjQdOyYRgOnLD2xAPP8dBsCoU0KuF8= +github.com/opencontainers/selinux v1.10.0/go.mod h1:2i0OySw99QjzBBQByd1Gr9gSjvuho1lHsJxIJ3gGbJI= github.com/opentracing-contrib/go-observer v0.0.0-20170622124052-a52f23424492/go.mod h1:Ngi6UdF0k5OKD5t5wlmGhe/EDKPoUM3BXZSSfIuJbis= github.com/opentracing/basictracer-go v1.0.0/go.mod h1:QfBfYuafItcjQuMwinw9GhYKwFXS9KnPs5lxoYwgW74= github.com/opentracing/opentracing-go v1.0.2/go.mod h1:UkNAQd3GIcIGf0SeVgPpRdFStlNbqXla1AfSYxPUl2o= @@ -638,8 +743,11 @@ github.com/openzipkin/zipkin-go v0.2.1/go.mod h1:NaW6tEwdmWMaCDZzg8sh+IBNOxHMPnh github.com/openzipkin/zipkin-go v0.2.2/go.mod h1:NaW6tEwdmWMaCDZzg8sh+IBNOxHMPnhQw8ySjnjRyN4= github.com/ory/dockertest/v3 v3.7.0 h1:Bijzonc69Ont3OU0a3TWKJ1Rzlh3TsDXP1JrTAkSmsM= github.com/ory/dockertest/v3 v3.7.0/go.mod h1:PvCCgnP7AfBZeVrzwiUTjZx/IUXlGLC1zQlUQrLIlUE= +github.com/ory/dockertest/v3 v3.8.1 h1:vU/8d1We4qIad2YM0kOwRVtnyue7ExvacPiw1yDm17g= +github.com/ory/dockertest/v3 v3.8.1/go.mod h1:wSRQ3wmkz+uSARYMk7kVJFDBGm8x5gSxIhI7NDc+BAQ= github.com/pact-foundation/pact-go v1.0.4/go.mod h1:uExwJY4kCzNPcHRj+hCR/HBbOOIwwtUjcrb0b5/5kLM= github.com/pascaldekloe/goe v0.0.0-20180627143212-57f6aae5913c/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc= +github.com/pascaldekloe/goe v0.1.0/go.mod h1:lzWF7FIEvWOWxwDKqyGYQf6ZUaNfKdP144TG7ZOy1lc= github.com/patrickmn/go-cache v2.1.0+incompatible h1:HRMgzkcYKYpi3C8ajMPV8OFXaaRUnok+kx1WdO15EQc= github.com/patrickmn/go-cache v2.1.0+incompatible/go.mod h1:3Qf8kWWT7OJRJbdiICTKqZju1ZixQ/KpMGzzAfe6+WQ= github.com/pborman/uuid v1.2.0/go.mod h1:X/NO0urCmaxf9VXbdlT7C2Yzkj2IKimNn4k+gtPdI/k= @@ -660,6 +768,7 @@ github.com/pkg/errors v0.9.1/go.mod h1:bwawxfHBFNV+L2hUp1rHADufV3IMtnDRdf1r5NINE github.com/pkg/profile v1.2.1/go.mod h1:hJw3o1OdXxsrSjjVksARp5W95eeEaEfptyVZyv6JUPA= github.com/pkg/profile v1.5.0/go.mod h1:qBsxPvzyUincmltOk6iyRVxHYg4adc0OFOv72ZdLa18= github.com/pkg/sftp v1.10.1/go.mod h1:lYOWFsE0bwd1+KfKJaKeuokY15vzFx25BLbzYYoAxZI= +github.com/pkg/sftp v1.13.1/go.mod h1:3HaPG6Dq1ILlpPZRO0HVMrsydcdLt6HRDccSgb87qRg= github.com/pmezard/go-difflib v1.0.0 h1:4DBwDE0NGyQoBHbLQYPwSUPoCMWR5BEzIk/f1lZbAQM= github.com/pmezard/go-difflib v1.0.0/go.mod h1:iKH77koFhYxTK1pcRnkKkqfTogsbg7gZNVY4sRDYZ/4= github.com/posener/complete v1.1.1/go.mod h1:em0nMJCgc9GFtwrmVmEMR/ZL6WyhyjMBndrE9hABlRI= @@ -669,9 +778,12 @@ github.com/prometheus/client_golang v0.9.3-0.20190127221311-3c4408c8b829/go.mod github.com/prometheus/client_golang v0.9.3/go.mod h1:/TN21ttK/J9q6uSwhBd54HahCDft0ttaMvbicHlPoso= github.com/prometheus/client_golang v1.0.0/go.mod h1:db9x61etRT2tGnBNRi70OPL5FsnadC4Ky3P0J6CfImo= github.com/prometheus/client_golang v1.3.0/go.mod h1:hJaj2vgQTGQmVCsAACORcieXFeDPbaTKGT+JTgUa3og= +github.com/prometheus/client_golang v1.4.0/go.mod h1:e9GMxYsXl05ICDXkRhurwBS4Q3OK1iX/F2sw+iXX5zU= github.com/prometheus/client_golang v1.7.1/go.mod h1:PY5Wy2awLA44sXw4AOSfFBetzPP4j5+D6mVACh+pe2M= github.com/prometheus/client_golang v1.11.0 h1:HNkLOAEQMIDv/K+04rukrLx6ch7msSRwf3/SASFAGtQ= github.com/prometheus/client_golang v1.11.0/go.mod h1:Z6t4BnS23TR94PD6BsDNk8yVqroYurpAkEiz0P2BEV0= +github.com/prometheus/client_golang v1.12.1 h1:ZiaPsmm9uiBeaSMRznKsCDNtPCS0T3JVDGF+06gjBzk= +github.com/prometheus/client_golang v1.12.1/go.mod h1:3Z9XVyYiZYEO+YQWt3RD2R3jrbd179Rt297l4aS6nDY= github.com/prometheus/client_model v0.0.0-20180712105110-5c3871d89910/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo= github.com/prometheus/client_model v0.0.0-20190115171406-56726106282f/go.mod h1:MbSGuTsp3dbXC40dX6PRTWyKYBIrTGTE9sqQNg2J8bo= github.com/prometheus/client_model v0.0.0-20190129233127-fd36f4220a90/go.mod h1:xMI15A0UPsDsEKsMN9yxemIoYk6Tm2C1GtYGdfGttqA= @@ -684,6 +796,7 @@ github.com/prometheus/common v0.2.0/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y8 github.com/prometheus/common v0.4.0/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4= github.com/prometheus/common v0.4.1/go.mod h1:TNfzLD0ON7rHzMJeJkieUDPYmFC7Snx/y86RQel1bk4= github.com/prometheus/common v0.7.0/go.mod h1:DjGbpBbp5NYNiECxcL/VnbXCCaQpKd3tt26CguLLsqA= +github.com/prometheus/common v0.9.1/go.mod h1:yhUN8i9wzaXS3w1O07YhxHEBxD+W35wd8bs7vj7HSQ4= github.com/prometheus/common v0.10.0/go.mod h1:Tlit/dnDKsSWFlCLTWaA1cyBgKHSMdTB80sz/V91rCo= github.com/prometheus/common v0.26.0/go.mod h1:M7rCNAaPfAosfx8veZJCuw84e35h3Cfd9VFqTh1DIvc= github.com/prometheus/common v0.32.1 h1:hWIdL3N2HoUx3B8j3YN9mWor0qhY/NlEKZEaXxuIRh4= @@ -702,6 +815,10 @@ github.com/pterm/pterm v0.12.27/go.mod h1:PhQ89w4i95rhgE+xedAoqous6K9X+r6aSOI2eF github.com/pterm/pterm v0.12.29/go.mod h1:WI3qxgvoQFFGKGjGnJR849gU0TsEOvKn5Q8LlY1U7lg= github.com/pterm/pterm v0.12.30 h1:ZfXzqtOJVKZ2Uhd+L5o6jmbO44PH3Mee4mxq303nh1Y= github.com/pterm/pterm v0.12.30/go.mod h1:MOqLIyMOgmTDz9yorcYbcw+HsgoZo3BQfg2wtl3HEFE= +github.com/pterm/pterm v0.12.31/go.mod h1:32ZAWZVXD7ZfG0s8qqHXePte42kdz8ECtRyEejaWgXU= +github.com/pterm/pterm v0.12.33/go.mod h1:x+h2uL+n7CP/rel9+bImHD5lF3nM9vJj80k9ybiiTTE= +github.com/pterm/pterm v0.12.36 h1:Ui5zZj7xA8lXR0CxWXlKGCQMW1cZVUMOS8jEXs6ur/g= +github.com/pterm/pterm v0.12.36/go.mod h1:NjiL09hFhT/vWjQHSj1athJpx6H8cjpHXNAK5bUw8T8= github.com/rcrowley/go-metrics v0.0.0-20181016184325-3113b8401b8a/go.mod h1:bCqnVzQkZxMG4s8nGwiZ5l3QUCyqpo9Y+/ZMZ9VjZe4= github.com/rivo/uniseg v0.2.0 h1:S1pD9weZBuJdFmowNwbpi7BJ8TNftyUImj/0WQi72jY= github.com/rivo/uniseg v0.2.0/go.mod h1:J6wj4VEh+S6ZtnVlnTBMWIodfgj8LQOQFoIToxlJtxc= @@ -712,19 +829,26 @@ github.com/rogpeppe/go-internal v1.6.1/go.mod h1:xXDCJY+GAPziupqXw64V24skbSoqbTE github.com/rogpeppe/go-internal v1.8.0/go.mod h1:WmiCO8CzOY8rg0OYDC4/i/2WRWAB6poM+XZ2dLUbcbE= github.com/rogpeppe/go-internal v1.8.1-0.20211023094830-115ce09fd6b4 h1:Ha8xCaq6ln1a+R91Km45Oq6lPXj2Mla6CRJYcuV2h1w= github.com/rogpeppe/go-internal v1.8.1-0.20211023094830-115ce09fd6b4/go.mod h1:JeRgkft04UBgHMgCIwADu4Pn6Mtm5d4nPKWu0nJ5d+o= +github.com/rogpeppe/go-internal v1.8.1 h1:geMPLpDpQOgVyCg5z5GoRwLHepNdb71NXb67XFkP+Eg= +github.com/rogpeppe/go-internal v1.8.1/go.mod h1:JeRgkft04UBgHMgCIwADu4Pn6Mtm5d4nPKWu0nJ5d+o= github.com/rs/xid v1.2.1/go.mod h1:+uKXf+4Djp6Md1KODXJxgGQPKngRmWyn10oCKFzNHOQ= github.com/rs/xid v1.3.0/go.mod h1:trrq9SKmegXys3aeAKXMUTdJsYXVwGY3RLcfgqegfbg= github.com/rs/zerolog v1.13.0/go.mod h1:YbFCdg8HfsridGWAh22vktObvhZbQsZXe4/zB0OKkWU= github.com/rs/zerolog v1.15.0/go.mod h1:xYTKnLHcpfU2225ny5qZjxnj9NvkumZYjJHlAThCjNc= github.com/rs/zerolog v1.26.0 h1:ORM4ibhEZeTeQlCojCK2kPz1ogAY4bGs4tD+SaAdGaE= github.com/rs/zerolog v1.26.0/go.mod h1:yBiM87lvSqX8h0Ww4sdzNSkVYZ8dL2xjZJG1lAuGZEo= +github.com/rs/zerolog v1.26.1 h1:/ihwxqH+4z8UxyI70wM1z9yCvkWcfz/a3mj48k/Zngc= +github.com/rs/zerolog v1.26.1/go.mod h1:/wSSJWX7lVrsOwlbyTRSOJvqRlc+WjWlfes+CiJ+tmc= github.com/russross/blackfriday/v2 v2.0.1/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM= +github.com/russross/blackfriday/v2 v2.1.0/go.mod h1:+Rmxgy9KzJVeS9/2gXHxylqXiyQDYRxCVz55jmeOWTM= github.com/ryanuber/columnize v0.0.0-20160712163229-9b3edd62028f/go.mod h1:sm1tb6uqfes/u+d4ooFouqFdy9/2g9QGwK3SQygK0Ts= github.com/sagikazarmark/crypt v0.1.0/go.mod h1:B/mN0msZuINBtQ1zZLEQcegFJJf9vnYIR88KRMEuODE= +github.com/sagikazarmark/crypt v0.3.0/go.mod h1:uD/D+6UF4SrIR1uGEv7bBNkNqLGqUr43MRiaGWX1Nig= github.com/samuel/go-zookeeper v0.0.0-20190923202752-2cc03de413da/go.mod h1:gi+0XIa01GRL2eRQVjQkKGqKF3SF9vZR/HnPullcV2E= github.com/satori/go.uuid v1.2.0/go.mod h1:dA0hQrYB0VpLJoorglMZABFdXlWrHn1NEOzdhQKdks0= github.com/sean-/seed v0.0.0-20170313163322-e2103e2c3529/go.mod h1:DxrIzT+xaE7yg65j358z/aeFdxmN0P9QXhEzd20vsDc= github.com/seccomp/libseccomp-golang v0.9.1/go.mod h1:GbW5+tmTXfcxTToHLXlScSlAvWlF4P2Ca7zGrPiEpWo= +github.com/seccomp/libseccomp-golang v0.9.2-0.20210429002308-3879420cc921/go.mod h1:JA8cRccbGaA1s33RQf7Y1+q9gHmZX1yB/z9WDN1C6fg= github.com/shopspring/decimal v0.0.0-20180709203117-cd690d0c9e24/go.mod h1:M+9NzErvs504Cn4c5DxATwIqPbtswREoFCre64PpcG4= github.com/shopspring/decimal v0.0.0-20200227202807-02e2044944cc/go.mod h1:DKyhrW/HYNuLGql+MJL6WCR6knT2jwCFRcu2hWCYk4o= github.com/shopspring/decimal v1.2.0 h1:abSATXmQEYyShuxI4/vyW3tV1MrKAJzCZ/0zLUXYbsQ= @@ -746,8 +870,11 @@ github.com/soheilhy/cmux v0.1.5/go.mod h1:T7TcVDs9LWfQgPlPsdngu6I6QIoyIFZDDC6sNE github.com/sony/gobreaker v0.4.1/go.mod h1:ZKptC7FHNvhBz7dN2LGjPVBz2sZJmc0/PkyDJOjmxWY= github.com/spaolacci/murmur3 v0.0.0-20180118202830-f09979ecbc72/go.mod h1:JwIasOWyU6f++ZhiEuf87xNszmSA2myDM2Kzu9HwQUA= github.com/spf13/afero v1.1.2/go.mod h1:j4pytiNVoe2o6bmDsKpLACNPDBIoEAkihy7loJ1B0CQ= +github.com/spf13/afero v1.3.3/go.mod h1:5KUK8ByomD5Ti5Artl0RtHeI5pTF7MIDuXL3yY520V4= github.com/spf13/afero v1.6.0 h1:xoax2sJ2DT8S8xA2paPFjDCScCNeWsg75VG0DLRreiY= github.com/spf13/afero v1.6.0/go.mod h1:Ai8FlHk4v/PARR026UzYexafAt9roJ7LcLMAmO6Z93I= +github.com/spf13/afero v1.8.1 h1:izYHOT71f9iZ7iq37Uqjael60/vYC6vMtzedudZ0zEk= +github.com/spf13/afero v1.8.1/go.mod h1:CtAatgMJh6bJEIs48Ay/FOnkljP3WeGUG0MC1RfAqwo= github.com/spf13/cast v1.3.0/go.mod h1:Qx5cxh0v+4UWYiBimWS+eyWzqEqokIECu5etghLkUJE= github.com/spf13/cast v1.3.1/go.mod h1:Qx5cxh0v+4UWYiBimWS+eyWzqEqokIECu5etghLkUJE= github.com/spf13/cast v1.4.1 h1:s0hze+J0196ZfEMTs80N7UlFt0BDuQ7Q+JDnHiMWKdA= @@ -757,6 +884,8 @@ github.com/spf13/cobra v1.0.0/go.mod h1:/6GTrnGXV9HjY+aR4k0oJ5tcvakLuG6EuKReYlHN github.com/spf13/cobra v1.0.1-0.20201006035406-b97b5ead31f7/go.mod h1:yk5b0mALVusDL5fMM6Rd1wgnoO5jUPhwsQ6LQAJTidQ= github.com/spf13/cobra v1.2.1 h1:+KmjbUw1hriSNMF55oPrkZcb27aECyrj8V2ytv7kWDw= github.com/spf13/cobra v1.2.1/go.mod h1:ExllRjgxM/piMAM+3tAZvg8fsklGAf3tPfi+i8t68Nk= +github.com/spf13/cobra v1.3.0 h1:R7cSvGu+Vv+qX0gW5R/85dx2kmmJT5z5NM8ifdYjdn0= +github.com/spf13/cobra v1.3.0/go.mod h1:BrRVncBjOJa/eUcVVm9CE+oC6as8k+VYr4NY7WCi9V4= github.com/spf13/jwalterweatherman v1.0.0/go.mod h1:cQK4TGJAtQXfYWX+Ddv3mKDzgVb68N+wFjFa4jdeBTo= github.com/spf13/jwalterweatherman v1.1.0 h1:ue6voC5bR5F8YxI5S67j9i582FU4Qvo2bmqnqMYADFk= github.com/spf13/jwalterweatherman v1.1.0/go.mod h1:aNWZUN0dPAAO/Ljvb5BEdw96iTZ0EXowPYD95IqWIGo= @@ -769,6 +898,9 @@ github.com/spf13/viper v1.7.0/go.mod h1:8WkrPz2fc9jxqZNCJI/76HCieCp4Q8HaLFoCha5q github.com/spf13/viper v1.8.1/go.mod h1:o0Pch8wJ9BVSWGQMbra6iw0oQ5oktSIBaujf1rJH9Ns= github.com/spf13/viper v1.9.0 h1:yR6EXjTp0y0cLN8OZg1CRZmOBdI88UcGkhgyJhu6nZk= github.com/spf13/viper v1.9.0/go.mod h1:+i6ajR7OX2XaiBkrcZJFK21htRk7eDeLg7+O6bhUPP4= +github.com/spf13/viper v1.10.0/go.mod h1:SoyBPwAtKDzypXNDFKN5kzH7ppppbGZtls1UpIy5AsM= +github.com/spf13/viper v1.10.1 h1:nuJZuYpG7gTj/XqiUwg8bA0cp1+M2mC3J4g5luUYBKk= +github.com/spf13/viper v1.10.1/go.mod h1:IGlFPqhNAPKRxohIzWpI5QEy4kuI7tcl5WvR+8qy1rU= github.com/streadway/amqp v0.0.0-20190404075320-75d898a42a94/go.mod h1:AZpEONHx3DKn8O/DFsRAY58/XVQiIPMTMB1SddzLXVw= github.com/streadway/amqp v0.0.0-20190827072141-edfb9018d271/go.mod h1:AZpEONHx3DKn8O/DFsRAY58/XVQiIPMTMB1SddzLXVw= github.com/streadway/handy v0.0.0-20190108123426-d5acb3125c2a/go.mod h1:qNTQ5P5JnDBl6z3cMAg/SywNDC5ABu5ApDIw6lUbRmI= @@ -789,13 +921,18 @@ github.com/subosito/gotenv v1.2.0/go.mod h1:N0PQaV/YGNqwC0u51sEeR/aUtSLEXKX9iv69 github.com/syndtr/gocapability v0.0.0-20200815063812-42c35b437635/go.mod h1:hkRG7XYTFWNJGYcbNJQlaLq0fg1yr4J4t/NcTQtrfww= github.com/tailscale/hujson v0.0.0-20211105212140-3a0adc019d83 h1:f7nwzdAHTUUOJjHZuDvLz9CEAlUM228amCRvwzlPvsA= github.com/tailscale/hujson v0.0.0-20211105212140-3a0adc019d83/go.mod h1:iTDXJsA6A2wNNjurgic2rk+is6uzU4U2NLm4T+edr6M= +github.com/tailscale/hujson v0.0.0-20211215203138-ffd971c5f362 h1:xx7EMpWIKUrMMg+QanclF7bj8QTH/XYdQb/eplkmkgw= +github.com/tailscale/hujson v0.0.0-20211215203138-ffd971c5f362/go.mod h1:iTDXJsA6A2wNNjurgic2rk+is6uzU4U2NLm4T+edr6M= github.com/tcnksm/go-latest v0.0.0-20170313132115-e3007ae9052e h1:IWllFTiDjjLIf2oeKxpIUmtiDV5sn71VgeQgg6vcE7k= github.com/tcnksm/go-latest v0.0.0-20170313132115-e3007ae9052e/go.mod h1:d7u6HkTYKSv5m6MCKkOQlHwaShTMl3HjqSGW3XtVhXM= github.com/tmc/grpc-websocket-proxy v0.0.0-20170815181823-89b8d40f7ca8/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U= github.com/tmc/grpc-websocket-proxy v0.0.0-20190109142713-0ad062ec5ee5/go.mod h1:ncp9v5uamzpCO7NfCPTXjqaC+bZgJeR0sMTm6dMHP7U= +github.com/tv42/httpunix v0.0.0-20150427012821-b75d8614f926/go.mod h1:9ESjWnEqriFuLhtthL60Sar/7RFoluCcXsuvEwTV5KM= +github.com/tv42/httpunix v0.0.0-20191220191345-2ba4b9c3382c/go.mod h1:hzIxponao9Kjc7aWznkXaL4U4TWaDSs8zcsY4Ka08nM= github.com/twitchtv/twirp v7.1.0+incompatible/go.mod h1:RRJoFSAmTEh2weEqWtpPE3vFK5YBhA6bqp2l1kfCC5A= github.com/ugorji/go v1.1.4/go.mod h1:uQMGLiO92mf5W77hV/PUCpI3pbzQx3CRekS0kk+RGrc= github.com/ugorji/go v1.1.7/go.mod h1:kZn38zHttfInRq0xu/PH0az30d+z6vm202qpg1oXVMw= +github.com/ugorji/go v1.2.6 h1:tGiWC9HENWE2tqYycIqFTNorMmFRVhNwCpDOpWqnk8E= github.com/ugorji/go v1.2.6/go.mod h1:anCg0y61KIhDlPZmnH+so+RQbysYVyDko0IMgJv0Nn0= github.com/ugorji/go/codec v1.1.7/go.mod h1:Ax+UKWsSmolVDwsd+7N3ZtXu+yMGCf907BLYF3GoBXY= github.com/ugorji/go/codec v1.2.6 h1:7kbGefxLoDBuYXOms4yD7223OpNMMPNPZxXk5TvFcyQ= @@ -828,8 +965,11 @@ go.etcd.io/bbolt v1.3.2/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU= go.etcd.io/bbolt v1.3.3/go.mod h1:IbVyRI1SCnLcuJnV2u8VeU0CEYM7e686BmAb1XKL+uU= go.etcd.io/etcd v0.0.0-20191023171146-3cf2f69b5738/go.mod h1:dnLIgRNXwCJa5e+c6mIZCrds/GIG4ncV9HhK5PX7jPg= go.etcd.io/etcd/api/v3 v3.5.0/go.mod h1:cbVKeC6lCfl7j/8jBhAK6aIYO9XOjdptoxU/nLQcPvs= +go.etcd.io/etcd/api/v3 v3.5.1/go.mod h1:cbVKeC6lCfl7j/8jBhAK6aIYO9XOjdptoxU/nLQcPvs= go.etcd.io/etcd/client/pkg/v3 v3.5.0/go.mod h1:IJHfcCEKxYu1Os13ZdwCwIUTUVGYTSAM3YSwc9/Ac1g= +go.etcd.io/etcd/client/pkg/v3 v3.5.1/go.mod h1:IJHfcCEKxYu1Os13ZdwCwIUTUVGYTSAM3YSwc9/Ac1g= go.etcd.io/etcd/client/v2 v2.305.0/go.mod h1:h9puh54ZTgAKtEbut2oe9P4L/oqKCVB6xsXlzd7alYQ= +go.etcd.io/etcd/client/v2 v2.305.1/go.mod h1:pMEacxZW7o8pg4CrFE7pquyCJJzZvkvdD2RibOCCCGs= go.opencensus.io v0.20.1/go.mod h1:6WKK9ahsWS3RSO+PY9ZHZUfv2irvY6gN279GOPZjmmk= go.opencensus.io v0.20.2/go.mod h1:6WKK9ahsWS3RSO+PY9ZHZUfv2irvY6gN279GOPZjmmk= go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU= @@ -880,11 +1020,17 @@ golang.org/x/crypto v0.0.0-20200323165209-0ec3e9974c59/go.mod h1:LzIPMQfyMNhhGPh golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9/go.mod h1:LzIPMQfyMNhhGPhUkYOs5KpL4U8rLKemX1yGLhDgUto= golang.org/x/crypto v0.0.0-20201203163018-be400aefbc4c/go.mod h1:jdWPYTVW3xRLrWPugEBEK3UY2ZEsg3UU495nc5E+M+I= golang.org/x/crypto v0.0.0-20210322153248-0c34fe9e7dc2/go.mod h1:T9bdIzuCu7OtxOm1hfPfRQxPLYneinmdGuTeoZ9dtd4= +golang.org/x/crypto v0.0.0-20210421170649-83a5a9bb288b/go.mod h1:T9bdIzuCu7OtxOm1hfPfRQxPLYneinmdGuTeoZ9dtd4= golang.org/x/crypto v0.0.0-20210616213533-5ff15b29337e/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= golang.org/x/crypto v0.0.0-20210711020723-a769d52b0f97/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= golang.org/x/crypto v0.0.0-20210817164053-32db794688a5/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= +golang.org/x/crypto v0.0.0-20210921155107-089bfa567519/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= +golang.org/x/crypto v0.0.0-20211108221036-ceb1ce70b4fa/go.mod h1:GvvjBRRGRdwPK5ydBHafDWAxML/pGHZbMvKqRZ5+Abc= golang.org/x/crypto v0.0.0-20211202192323-5770296d904e h1:MUP6MR3rJ7Gk9LEia0LP2ytiH6MuCfs7qYz+47jGdD8= golang.org/x/crypto v0.0.0-20211202192323-5770296d904e/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= +golang.org/x/crypto v0.0.0-20211215165025-cf75a172585e/go.mod h1:P+XmwS30IXTQdn5tA2iutPOUgjI07+tq3H3K9MVA1s8= +golang.org/x/crypto v0.0.0-20220210151621-f4118a5b28e2 h1:XdAboW3BNMv9ocSCOk/u1MFioZGzCNkiJZ19v9Oe3Ig= +golang.org/x/crypto v0.0.0-20220210151621-f4118a5b28e2/go.mod h1:IxCIyHEi3zRg3s0A5j5BB6A9Jmi73HwBIUl50j+osU4= golang.org/x/exp v0.0.0-20190121172915-509febef88a4/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190306152737-a1d7652674e8/go.mod h1:CJ0aWSM057203Lf6IL+f9T1iT9GByDxfZKAQTCR3kQA= golang.org/x/exp v0.0.0-20190510132918-efd6b22b2522/go.mod h1:ZjyILWgesfNpC6sMxTJOJm9Kp84zZh5NQWvqDGG3Qr8= @@ -921,6 +1067,7 @@ golang.org/x/mod v0.3.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.4.0/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.4.1/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= golang.org/x/mod v0.4.2/go.mod h1:s0Qsj1ACt9ePp/hMypM3fl4fZqREWJwdYDEqhRiZZUA= +golang.org/x/mod v0.5.0/go.mod h1:5OXOZSfqPIIbmVBIIKWRFfZjPR0E5r58TLhUjH0a2Ro= golang.org/x/net v0.0.0-20180218175443-cbe0f9307d01/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180724234803-3673e40ba225/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= golang.org/x/net v0.0.0-20180826012351-8a410e7b638d/go.mod h1:mL1N/T3taQHkDXs73rZJwtUhF3w3ftmwwsq0BUmARs4= @@ -971,11 +1118,16 @@ golang.org/x/net v0.0.0-20210119194325-5f4716e94777/go.mod h1:m0MpNAwzfU5UDzcl9v golang.org/x/net v0.0.0-20210226172049-e18ecbb05110/go.mod h1:m0MpNAwzfU5UDzcl9v0D8zg8gWTRqZa9RBIspLL5mdg= golang.org/x/net v0.0.0-20210316092652-d523dce5a7f4/go.mod h1:RBQZq4jEuRlivfhVLdyRGr576XBO4/greRjx4P4O3yc= golang.org/x/net v0.0.0-20210405180319-a5a99cb37ef4/go.mod h1:p54w0d4576C0XHj96bSt6lcn1PtDYWL6XObtHCRCNQM= +golang.org/x/net v0.0.0-20210410081132-afb366fc7cd1/go.mod h1:9tjilg8BloeKEkVJvy7fQ90B1CfIiPueXVOjqfkSzI8= golang.org/x/net v0.0.0-20210503060351-7fd8e65b6420/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= golang.org/x/net v0.0.0-20210525063256-abc453219eb5/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= golang.org/x/net v0.0.0-20210805182204-aaa1db679c0d/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= +golang.org/x/net v0.0.0-20210813160813-60bc85c4be6d/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= golang.org/x/net v0.0.0-20211205041911-012df41ee64c h1:7SfqwP5fxEtl/P02w5IhKc86ziJ+A25yFrkVgoy2FT8= golang.org/x/net v0.0.0-20211205041911-012df41ee64c/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= +golang.org/x/net v0.0.0-20220114011407-0dd24b26b47d/go.mod h1:9nx3DQGgdP8bBQD5qxJ1jj9UTztislL4KSBs9R2vV5Y= +golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd h1:O7DYs+zxREGLKzKoMQrtrEacpb0ZVXA5rIwylE2Xchk= +golang.org/x/net v0.0.0-20220127200216-cd36cc0744dd/go.mod h1:CfG3xpIq0wQ8r1q4Su4UZFWDARRcnwPjda9FqA0JpMk= golang.org/x/oauth2 v0.0.0-20180821212333-d2e6202438be/go.mod h1:N/0e6XlmueqKjAGxoOufVs8QHGRruUQn6yWY3a++T0U= golang.org/x/oauth2 v0.0.0-20190226205417-e64efc72b421/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= golang.org/x/oauth2 v0.0.0-20190604053449-0f29369cfe45/go.mod h1:gOpvHmFTYa4IltrdGE7lF6nIHvwfUNPOp7c8zoXwtLw= @@ -993,6 +1145,7 @@ golang.org/x/oauth2 v0.0.0-20210514164344-f6687ab2804c/go.mod h1:KelEdhl1UZF7XfJ golang.org/x/oauth2 v0.0.0-20210628180205-a41e5a781914/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= golang.org/x/oauth2 v0.0.0-20210805134026-6f1e6394065a/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= golang.org/x/oauth2 v0.0.0-20210819190943-2bc19b11175f/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= +golang.org/x/oauth2 v0.0.0-20211005180243-6b3c2da341f1/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= golang.org/x/oauth2 v0.0.0-20211104180415-d3ed0bb246c8 h1:RerP+noqYHUQ8CMRcPlC2nvTa4dcBIjegkuWdcUDuqg= golang.org/x/oauth2 v0.0.0-20211104180415-d3ed0bb246c8/go.mod h1:KelEdhl1UZF7XfJ4dDtk6s++YSgaE7mD/BuKKDLBl4A= golang.org/x/sync v0.0.0-20180314180146-1d60e4601c6f/go.mod h1:RxMgew5VJxzue5/jJTE5uejpjVlOe/izrB70Jof72aM= @@ -1038,6 +1191,7 @@ golang.org/x/sys v0.0.0-20191026070338-33540a1f6037/go.mod h1:h1NjWce9XRLGQEsW7w golang.org/x/sys v0.0.0-20191113165036-4c7a9d0fe056/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191115151921-52ab43148777/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191204072324-ce4227a45e2e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20191210023423-ac6580df4449/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191220142924-d4481acd189f/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20191228213918-04cbcbbfeed8/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20200106162015-b016eb3dc98e/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= @@ -1069,12 +1223,15 @@ golang.org/x/sys v0.0.0-20210104204734-6f8348627aad/go.mod h1:h1NjWce9XRLGQEsW7w golang.org/x/sys v0.0.0-20210119212857-b64e53b001e4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210124154548-22da62e12c0c/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210220050731-9a76102bfb43/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20210225134936-a50acf3fe073/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20210303074136-134d130e1a04/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210305230114-8fe3ee5dd75b/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210315160823-c6e025ad8005/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210320140829-1e4c9ba3b0c4/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210330210617-4fbd30eecc44/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210403161142-5e06dd20ab57/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210423082822-04245dca01da/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= +golang.org/x/sys v0.0.0-20210423185535-09eb48e85fd7/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210426230700-d19ff857e887/go.mod h1:h1NjWce9XRLGQEsW7wpKNCjG9DtNlClVuFLEZdDNbEs= golang.org/x/sys v0.0.0-20210510120138-977fb7262007/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20210514084401-e8d321eab015/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= @@ -1085,10 +1242,21 @@ golang.org/x/sys v0.0.0-20210616094352-59db8d763f22/go.mod h1:oPkhp1MJrh7nUepCBc golang.org/x/sys v0.0.0-20210630005230-0f9fa26af87c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20210806184541-e5e7981a1069/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20210809222454-d867a43fc93e/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20210816183151-1e6c022a8912/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20210823070655-63515b42dcdf/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20210906170528-6f6e22806c34/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20210908233432-aa78b53d3365/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20210927094055-39ccf1dd6fa6/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20211007075335-d3039528d8ac/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20211013075003-97ac67df715c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20211025201205-69cdffdb9359/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20211116061358-0a5406a5449c/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20211124211545-fe61309f8881/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/sys v0.0.0-20211205182925-97ca703d548d h1:FjkYO/PPp4Wi0EAUOVLxePm7qVW4r4ctbWpURyuOD0E= golang.org/x/sys v0.0.0-20211205182925-97ca703d548d/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20220114195835-da31bd327af9/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= +golang.org/x/sys v0.0.0-20220209214540-3681064d5158 h1:rm+CHSpPEEW2IsXUib1ThaHIjuBVZjxNgSKmBLFfD4c= +golang.org/x/sys v0.0.0-20220209214540-3681064d5158/go.mod h1:oPkhp1MJrh7nUepCBck5+mAzfO9JrbApNNgaTdGDITg= golang.org/x/term v0.0.0-20201117132131-f5c789dd3221/go.mod h1:Nr5EML6q2oocZ2LXRh80K7BxOlk5/8JxuGnuhpl+muw= golang.org/x/term v0.0.0-20201126162022-7de9c90e9dd1/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= golang.org/x/term v0.0.0-20210220032956-6a3ed077a48d/go.mod h1:bj7SfCRtBDWHUb9snDiAeCFNEtKQo2Wmx5Cou7ajbmo= @@ -1170,6 +1338,7 @@ golang.org/x/tools v0.0.0-20201201161351-ac6f37ff4c2a/go.mod h1:emZCQorbCU4vsT4f golang.org/x/tools v0.0.0-20201208233053-a543418bbed2/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA= golang.org/x/tools v0.0.0-20210105154028-b0ab187a4818/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA= golang.org/x/tools v0.0.0-20210106214847-113979e3529a/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA= +golang.org/x/tools v0.0.0-20210108195828-e2f9c7f1fc8e/go.mod h1:emZCQorbCU4vsT4fOWvOPXz4eW1wZW4PmDk9uLelYpA= golang.org/x/tools v0.1.0/go.mod h1:xkSsbof2nBLbhDlRMhhhyNLN/zl3eTqcnHD5viDpcZ0= golang.org/x/tools v0.1.1/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk= golang.org/x/tools v0.1.2/go.mod h1:o0xws9oXOQQZyjljx8fwUC0k7L1pTE6eaCbjGeHmOkk= @@ -1213,7 +1382,12 @@ google.golang.org/api v0.48.0/go.mod h1:71Pr1vy+TAZRPkPs/xlCf5SsU8WjuAWv1Pfjbtuk google.golang.org/api v0.50.0/go.mod h1:4bNT5pAuq5ji4SRZm+5QIkjny9JAyVD/3gaSihNefaw= google.golang.org/api v0.51.0/go.mod h1:t4HdrdoNgyN5cbEfm7Lum0lcLDLiise1F8qDKX00sOU= google.golang.org/api v0.54.0/go.mod h1:7C4bFFOvVDGXjfDTAsgGwDgAxRDeQ4X8NvUedIt6z3k= +google.golang.org/api v0.55.0/go.mod h1:38yMfeP1kfjsl8isn0tliTjIb1rJXcQi4UXlbqivdVE= google.golang.org/api v0.56.0/go.mod h1:38yMfeP1kfjsl8isn0tliTjIb1rJXcQi4UXlbqivdVE= +google.golang.org/api v0.57.0/go.mod h1:dVPlbZyBo2/OjBpmvNdpn2GRm6rPy75jyU7bmhdrMgI= +google.golang.org/api v0.59.0/go.mod h1:sT2boj7M9YJxZzgeZqXogmhfmRWDtPzT31xkieUbuZU= +google.golang.org/api v0.61.0/go.mod h1:xQRti5UdCmoCEqFxcz93fTl338AVqDgyaDRuOZ3hg9I= +google.golang.org/api v0.62.0/go.mod h1:dKmwPCydfsad4qCH08MSdgWjfHOyfpd4VtDGgRFdavw= google.golang.org/appengine v1.1.0/go.mod h1:EbEs0AVv82hx2wNQdGPgUI5lhzA/G0D9YwlJXL52JkM= google.golang.org/appengine v1.2.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= google.golang.org/appengine v1.4.0/go.mod h1:xpcJRLb0r/rnEns0DIKYYv+WjYCduHsrkT7/EB5XEv4= @@ -1262,9 +1436,11 @@ google.golang.org/genproto v0.0.0-20201109203340-2640f1f9cdfb/go.mod h1:FWY/as6D google.golang.org/genproto v0.0.0-20201201144952-b05cb90ed32e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20201210142538-e3217bee35cc/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20201214200347-8c77b98c765d/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= +google.golang.org/genproto v0.0.0-20210108203827-ffc7fda8c3d7/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20210207032614-bba0dbe2a9ea/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20210222152913-aa3ee6e6a81c/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20210224155714-063164c882e6/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= +google.golang.org/genproto v0.0.0-20210226172003-ab064af71705/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20210303154014-9728d6b83eeb/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20210310155132-4ce2db91004e/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= google.golang.org/genproto v0.0.0-20210319143718-93e7006c17a6/go.mod h1:FWY/as6DDZQgahTzZj3fqbO1CbirC29ZNUFHwi0/+no= @@ -1282,9 +1458,22 @@ google.golang.org/genproto v0.0.0-20210805201207-89edb61ffb67/go.mod h1:ob2IJxKr google.golang.org/genproto v0.0.0-20210813162853-db860fec028c/go.mod h1:cFeNkxwySK631ADgubI+/XFU/xp8FD5KIVV4rj8UC5w= google.golang.org/genproto v0.0.0-20210821163610-241b8fcbd6c8/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY= google.golang.org/genproto v0.0.0-20210828152312-66f60bf46e71/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY= +google.golang.org/genproto v0.0.0-20210831024726-fe130286e0e2/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY= google.golang.org/genproto v0.0.0-20210903162649-d08c68adba83/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY= +google.golang.org/genproto v0.0.0-20210909211513-a8c4777a87af/go.mod h1:eFjDcFEctNawg4eG61bRv87N7iHBWyVhJu7u1kqDUXY= +google.golang.org/genproto v0.0.0-20210924002016-3dee208752a0/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20211008145708-270636b82663/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20211028162531-8db9c33dc351/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= google.golang.org/genproto v0.0.0-20211104193956-4c6863e31247 h1:ZONpjmFT5e+I/0/xE3XXbG5OIvX2hRYzol04MhKBl2E= google.golang.org/genproto v0.0.0-20211104193956-4c6863e31247/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20211118181313-81c1377c94b1/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20211129164237-f09f9a12af12/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20211203200212-54befc351ae9/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20211206160659-862468c7d6e0/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20211208223120-3a66f561d7aa/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20220118154757-00ab72f36ad5/go.mod h1:5CzLGKJ67TSI2B9POpiiyGha0AjJvZIUgRMt1dSmuhc= +google.golang.org/genproto v0.0.0-20220210181026-6fee9acbd336 h1:RK2ysGpQApbI6U7xn+ROT2rrm08lE/t8AcGqG8XI1CY= +google.golang.org/genproto v0.0.0-20220210181026-6fee9acbd336/go.mod h1:kGP+zUP2Ddo0ayMi4YuN7C3WZyJvGLZRh8Z5wnAqvEI= google.golang.org/grpc v1.17.0/go.mod h1:6QZJwpn2B+Zp71q/5VxRsJ6NXXVCE5NRUHRo+f3cWCs= google.golang.org/grpc v1.19.0/go.mod h1:mqu4LbDTu4XGKhr4mRzUsmM4RtVoemTSY81AxZiDr8c= google.golang.org/grpc v1.20.0/go.mod h1:chYK+tFQF0nDUGJgXMSgLCQk3phJEuONr2DCgLDdAQM= @@ -1316,11 +1505,17 @@ google.golang.org/grpc v1.38.0/go.mod h1:NREThFqKR1f3iQ6oBuvc5LadQuXVGo9rkm5ZGrQ google.golang.org/grpc v1.39.0/go.mod h1:PImNr+rS9TWYb2O4/emRugxiyHZ5JyHW5F+RPnDzfrE= google.golang.org/grpc v1.39.1/go.mod h1:PImNr+rS9TWYb2O4/emRugxiyHZ5JyHW5F+RPnDzfrE= google.golang.org/grpc v1.40.0/go.mod h1:ogyxbiOoUXAkP+4+xa6PZSE9DZgIHtSpzjDTB9KAK34= +google.golang.org/grpc v1.40.1/go.mod h1:ogyxbiOoUXAkP+4+xa6PZSE9DZgIHtSpzjDTB9KAK34= google.golang.org/grpc v1.42.0 h1:XT2/MFpuPFsEX2fWh3YQtHkZ+WYZFQRfaUgLZYj/p6A= google.golang.org/grpc v1.42.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU= +google.golang.org/grpc v1.43.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU= +google.golang.org/grpc v1.44.0 h1:weqSxi/TMs1SqFRMHCtBgXRs8k3X39QIDEZ0pRcttUg= +google.golang.org/grpc v1.44.0/go.mod h1:k+4IHHFw41K8+bbowsex27ge2rCb65oeWqe4jJ590SU= google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.0.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw= google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0 h1:M1YKkFIboKNieVO5DLUEVzQfGwJD30Nv2jfUgzb5UcE= google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.1.0/go.mod h1:6Kw0yEErY5E/yWrBtf03jp27GLLJujG4z/JK95pnjjw= +google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.2.0 h1:TLkBREm4nIsEcexnCjgQd5GQWaHcqMzwQV0TX9pq8S0= +google.golang.org/grpc/cmd/protoc-gen-go-grpc v1.2.0/go.mod h1:DNq5QpG7LJqD2AamLZ7zvKE0DEpVl2BSEVjFycAAjRY= google.golang.org/grpc/examples v0.0.0-20210309220351-d5b628860d4e/go.mod h1:Ly7ZA/ARzg8fnPU9TyZIxoz33sEUuWX7txiqs8lPTgE= google.golang.org/grpc/examples v0.0.0-20210601155443-8bdcb4c9ab8d/go.mod h1:bF8wuZSAZTcbF7ZPKrDI/qY52toTP/yxLpRRY4Eu9Js= google.golang.org/protobuf v0.0.0-20200109180630-ec00e32a8dfd/go.mod h1:DFci5gLYBciE7Vtevhsrf46CRTquxDuWsQurQQe4oz8= @@ -1355,6 +1550,8 @@ gopkg.in/ini.v1 v1.62.0/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k= gopkg.in/ini.v1 v1.63.2/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k= gopkg.in/ini.v1 v1.66.2 h1:XfR1dOYubytKy4Shzc2LHrrGhU0lDCfDGG1yLPmpgsI= gopkg.in/ini.v1 v1.66.2/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k= +gopkg.in/ini.v1 v1.66.4 h1:SsAcf+mM7mRZo2nJNGt8mZCjG8ZRaNGMURJw7BsIST4= +gopkg.in/ini.v1 v1.66.4/go.mod h1:pNLf8WUiyNEtQjuu5G5vTm06TEv9tsIgeAvK8hOrP4k= gopkg.in/resty.v1 v1.12.0/go.mod h1:mDo4pnntr5jdWRML875a/NmxYqAlA73dVijT2AXvQQo= gopkg.in/square/go-jose.v2 v2.5.1/go.mod h1:M9dMgbHiYLoDGQrXy7OpJDJWiKiU//h+vD76mk0e1AI= gopkg.in/square/go-jose.v2 v2.6.0 h1:NGk74WTnPKBNUhNzQX7PYcTLUjoq7mzKk2OKbvwk2iI= @@ -1376,14 +1573,23 @@ gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b h1:h8qDotaEPuJATrMmW04NCwg7v gopkg.in/yaml.v3 v3.0.0-20210107192922-496545a6307b/go.mod h1:K4uyk7z7BCEPqu6E+C64Yfv1cQ7kz7rIZviUmN+EgEM= gorm.io/datatypes v1.0.2 h1:ChZ5VfWGB23qEr1kZosidvG9CF9HIczwoxLhBS7Ebs4= gorm.io/datatypes v1.0.2/go.mod h1:1O1JVE4grFGcQTOGQbIBitiXUP6Sv84/KZU7eWeUv1k= +gorm.io/datatypes v1.0.5 h1:3vHCfg4Bz8SDx83zE+ASskF+g/j0kWrcKrY9jFUyAl0= +gorm.io/datatypes v1.0.5/go.mod h1:acG/OHGwod+1KrbwPL1t+aavb7jOBOETeyl5M8K5VQs= gorm.io/driver/mysql v1.1.2 h1:OofcyE2lga734MxwcCW9uB4mWNXMr50uaGRVwQL2B0M= gorm.io/driver/mysql v1.1.2/go.mod h1:4P/X9vSc3WTrhTLZ259cpFd6xKNYiSSdSZngkSBGIMM= +gorm.io/driver/mysql v1.2.2/go.mod h1:qsiz+XcAyMrS6QY+X3M9R6b/lKM1imKmcuK9kac5LTo= +gorm.io/driver/mysql v1.2.3 h1:cZqzlOfg5Kf1VIdLC1D9hT6Cy9BgxhExLj/2tIgUe7Y= +gorm.io/driver/mysql v1.2.3/go.mod h1:qsiz+XcAyMrS6QY+X3M9R6b/lKM1imKmcuK9kac5LTo= gorm.io/driver/postgres v1.1.0/go.mod h1:hXQIwafeRjJvUm+OMxcFWyswJ/vevcpPLlGocwAwuqw= gorm.io/driver/postgres v1.1.1 h1:tWLmqYCyaoh89fi7DhM6QggujrOnmfo3H98AzgNAAu0= gorm.io/driver/postgres v1.1.1/go.mod h1:tpe2xN7aCst1NUdYyWQyxPtnHC+Zfp6NEux9PXD1OU0= +gorm.io/driver/postgres v1.2.3 h1:f4t0TmNMy9gh3TU2PX+EppoA6YsgFnyq8Ojtddb42To= +gorm.io/driver/postgres v1.2.3/go.mod h1:pJV6RgYQPG47aM1f0QeOzFH9HxQc8JcmAgjRCgS0wjs= gorm.io/driver/sqlite v1.1.4/go.mod h1:mJCeTFr7+crvS+TRnWc5Z3UvwxUN1BGBLMrf5LA9DYw= gorm.io/driver/sqlite v1.1.5 h1:JU8G59VyKu1x1RMQgjefQnkZjDe9wHc1kARDZPu5dZs= gorm.io/driver/sqlite v1.1.5/go.mod h1:NpaYMcVKEh6vLJ47VP6T7Weieu4H1Drs3dGD/K6GrGc= +gorm.io/driver/sqlite v1.2.6 h1:SStaH/b+280M7C8vXeZLz/zo9cLQmIGwwj3cSj7p6l4= +gorm.io/driver/sqlite v1.2.6/go.mod h1:gyoX0vHiiwi0g49tv+x2E7l8ksauLK0U/gShcdUsjWY= gorm.io/driver/sqlserver v1.0.9 h1:P7Dm/BKqsrOjyhRSnLXvG2g1W/eJUgxdrdBwgJw3tEg= gorm.io/driver/sqlserver v1.0.9/go.mod h1:iBdxY2CepkTt9Q1r84RbZA1qCai300Qlp8kQf9qE9II= gorm.io/gorm v1.20.7/go.mod h1:0HFTzE/SqkGTzK6TlDPPQbAYCluiVvhzoA1+aVyzenw= @@ -1392,8 +1598,14 @@ gorm.io/gorm v1.21.12/go.mod h1:F+OptMscr0P2F2qU97WT1WimdH9GaQPoDW7AYd5i2Y0= gorm.io/gorm v1.21.14/go.mod h1:F+OptMscr0P2F2qU97WT1WimdH9GaQPoDW7AYd5i2Y0= gorm.io/gorm v1.21.15 h1:gAyaDoPw0lCyrSFWhBlahbUA1U4P5RViC1uIqoB+1Rk= gorm.io/gorm v1.21.15/go.mod h1:F+OptMscr0P2F2qU97WT1WimdH9GaQPoDW7AYd5i2Y0= +gorm.io/gorm v1.22.3/go.mod h1:F+OptMscr0P2F2qU97WT1WimdH9GaQPoDW7AYd5i2Y0= +gorm.io/gorm v1.22.4/go.mod h1:1aeVC+pe9ZmvKZban/gW4QPra7PRoTEssyc922qCAkk= +gorm.io/gorm v1.22.5 h1:lYREBgc02Be/5lSCTuysZZDb6ffL2qrat6fg9CFbvXU= +gorm.io/gorm v1.22.5/go.mod h1:l2lP/RyAtc1ynaTjFksBde/O8v9oOGIApu2/xRitmZk= gotest.tools/v3 v3.0.2 h1:kG1BFyqVHuQoVQiR1bWGnfz/fmHvvuiSPIV7rvl360E= gotest.tools/v3 v3.0.2/go.mod h1:3SzNCllyD9/Y+b5r9JIKQ474KzkZyqLqEfYqMsX94Bk= +gotest.tools/v3 v3.0.3 h1:4AuOwCGf4lLR9u3YOe2awrHygurzhO/HeQ6laiA6Sx0= +gotest.tools/v3 v3.0.3/go.mod h1:Z7Lb0S5l+klDB31fvDQX8ss/FlKDxtlFlw3Oa8Ymbl8= honnef.co/go/tools v0.0.0-20180728063816-88497007e858/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190106161140-3f1c8253044a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= @@ -1408,6 +1620,8 @@ rsc.io/binaryregexp v0.2.0/go.mod h1:qTv7/COck+e2FymRvadv62gMdZztPaShugOCi3I+8D8 rsc.io/quote/v3 v3.1.0/go.mod h1:yEA65RcK8LyAZtP9Kv3t0HmxON59tX3rD+tICJqUlj0= rsc.io/sampler v1.3.0/go.mod h1:T1hPZKmBbMNahiBKFy5HrXp6adAjACjK9JXDnKaTXpA= sigs.k8s.io/yaml v1.1.0/go.mod h1:UJmg0vDUVViEyp3mgSv9WPwZCDxu4rQW1olrI1uml+o= +sigs.k8s.io/yaml v1.3.0 h1:a2VclLzOGrwOHDiV8EfBGhvjHvP46CtW5j6POvhYGGo= +sigs.k8s.io/yaml v1.3.0/go.mod h1:GeOyir5tyXNByN85N/dRIT9es5UQNerPYEKK56eTBm8= sourcegraph.com/sourcegraph/appdash v0.0.0-20190731080439-ebfcffb1b5c0/go.mod h1:hI742Nqp5OhwiqlzhgfbWU4mW4yO10fP+LoT9WOswdU= tailscale.com v1.20.3 h1:C3g2AgmQaOi0YT5dAal9mslugPXMxwj0EXY7YfL2QrA= tailscale.com v1.20.3/go.mod h1:kjVy3ji2OH5lZhPLIIRacoY3CN4Bo3Yyb2mtoM8nfJ4= From 1d40de309519d010d1e7ba849a9a91b78933c80a Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Fri, 11 Feb 2022 08:45:02 +0000 Subject: [PATCH 25/57] Update changelog --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 6c74144e..330636f0 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -11,6 +11,7 @@ **Changes**: - `ip_prefix` is now superseded by `ip_prefixes` in the configuration [#208](https://github.com/juanfont/headscale/pull/208) +- Upgrade `tailscale` (1.20.4) and other dependencies to latest [#314](https://github.com/juanfont/headscale/pull/314) **0.12.4 (2022-01-29):** From 1b47ddd5836ba07845e527e2c8b9ee8580658fb1 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Fri, 11 Feb 2022 18:36:53 +0000 Subject: [PATCH 26/57] Improve the windows client docs as per discord recommendations --- docs/images/windows-registry.png | Bin 0 -> 103356 bytes docs/windows-client.md | 16 ++++++++++++---- 2 files changed, 12 insertions(+), 4 deletions(-) create mode 100644 docs/images/windows-registry.png diff --git a/docs/images/windows-registry.png b/docs/images/windows-registry.png new file mode 100644 index 0000000000000000000000000000000000000000..1324ca6c4d8e8e486d46569aabce5e2acd870ebc GIT binary patch literal 103356 zcmY(qb8u$C);&BEKCv+|p4hf+Op+%yCz{x{ZB1<3wlOg$wyke|RqwrXzuHx&PychO z&+hKkYp=aKOi^9}0Tu`L%a<<*Qj(&|U%r5o{e3?MfcoV2_3K$D zOpCFq8~t0Q#ifqwVP-mauBu@U7^p>|#mM{Ces>dbU`}Aw2j#Kajx%sxZ-O~KRN@Gal zlDiB3qQ~at>n540VaLOZR^yDcBu@ziIk_oR;gl?37LFv3lJW`)Me2rJJ)C4*XmzB+>g$YHE z`W8r{8$&4Nl?4@l5ik|R9Jp^pyB|!=>k{+`v+sn$ggjT?ITMQT#uv616k4lVja-b>`sbiy# zI<6Ig;9iMR17LrxG?0=4wEJvzGaeo-FA(_K}L#V>L%xp85OD-`UBR%64zNL$XtaO&Bh()(jT!m26W_4xt) zTmd^mO$EOsnI$2)Q41sE3ouw|OzeD~cD2(0eEle_yyU2-`Mbv5gjbh>}F0$dsy!y^Wi>8}Lhu1mc)fJ#ztFHEJ5G)~JisBP}9>e4Se#;Yl1wGCN?_ z(B&G=##_Xi0v*^t>sA6l2<`uL|6!k3HD*6E&0ML%j+gAjhOR8ZB!lOwz72pIDu#?x zN>io|{M88G>$L-CCI-vot_ZE>B`Vunx1jACiJ=PAu)HiJg&Fyb0m9W83-S_s*G?h+1%P8c$!5C;vrH~`#fPpvm{pVu8vch9pi{r=e& zCq%(*EhX%srBojmXz6}nkL2_i!Pax06D17XTZ#wgHp;YMqB*j55tdjOzTaTW_ywHM zH6=S?bm1q!hFJP1`{0^xteKKDibWu1tCCa!*yZr#P^;crpmWBH(ht*&LjhtQA#4c* zYq^-Avdts(H`&!SFi84FmPfA(vUBGM!T(y%cPKv~mS3K$JcuIw+mlPz=>~6)FYkjW z(Nz}$NxsgYl%~=Ua=k8nBQ`u#STqq9+zGnG))gYG8nFQlHVV2rNc4bLDjYVk0H)mT zL=7yJWv1C}_u%WqpK8jcB zvr8(O4rNWk!i4BsIAUOES%?=i!#ar)9XvSO%^dH-PR!Qi|LYyWh@NUBunE|_MIhx6 zb|TngJOl`U8kbaz%o#yr;%bY}moSmqgV*sW3^1Pb7}r!SDgTPv)nN%W5q6^y>$Y%a zXc8JpqZ2+QbZ;1K*a?S@9~5pSw#c$2+zX6z$S-OUyX4cO8NS@K4Z%c(^e)W43R-SR zPT0!$;Hx4;A)aBhA$COq8{G|Iz-oh_ydpTW>cW*ImxtRNhID(_U9)Mv++|sf`scu6 zelUIFHyqo7n9bJ#h(9AV`n>o8rN0W+qNGM1*oQh-oz3($lfofM#j4pv>F6Lks>Q1h zgpq4nU*Me`_K-=`z$Yo$2!`v{1^43O!Cu)4&~I_#WMDaw!HzoujxrpWg?GxR8GqS6BCijuy@Q5MicA` z-e*~hY<$;KQjos{>l4F?B@6u@rPGl8n?Ck>s;Y%H<_KJ49@UKxZ_>Eh457L(#ARix zHnu}3-AdHTc`6o;aeBwA16`O60k{QN3*R6RuF(dAh!ubKx~c9J6a+kp@hb+SLBJr> z*VJGeM+!?PH#iz_#?dGfu)&yX7AO{uJU>ZGuhYXaYZ!FSOJ~r^Xv<5&z?2@t)%Tcs z+=(cfoKEbm?(suWE$A;_I(g*x$K0C50-3E*Yt_Vg4jUHfMLG2)HGU^|GJbK_QFY7a zNKDK?BHrdfmx5Id!0L&#Hkag z5>k5-qQsM3<~pU(F z=Vv%|XMKbuoj?qf@xQ@4i)CptL;g3Wts|1J8RNiTj{L)zUK80q!r{KeifVd zugWI$pc#guC#g)hrjOoy$}`4=2JbTt#HLj=Df$EBSBY;Vr&^?W;V}{Rf4)wO2q*N> zkO^Ir&nGL;ao~AFvTxI`Sl|Q&c#QPre6awev697!dx*Wfq8Tw z_lLfVCRwP7KlAV+UrRo+b zn6G>c5;yW%J#6Z*ORKDth3sW;TZMcQV|VA9R>)eIh$@C};MFC$W!%pOB#;?KZPn=% zY4sDrDz5v&0kTsj)=bd&-QIuJS#wx|FPs0YINqptMz1fj1I`BDcisE0G}-;l>LPy%W(sk&^_3uFpHdx>Q!Bv+AvkB0c|@OviFezZt^I zp-+UjAe{xwbL=x(IIk6FiE%0z$O|F#e#(^~@V=Wxz-6~u?r^)kyL0T`B7}#6gDP}; zI@52{cQeg}fYz3QMv+3bcD!r)yx(bWmoXLYqP<((Xr995a(rKhkIM31BK+uu6zF;w zX#U`L!m9S14a4$0X4zWxx^WsN!0enKiSi#y#)1q=wE$>Lxo1(4EBun1i4s0TSIlmD zR;CIJN&gaa*M{5}-|GhK_(ZMV4)Ib&52Tk&I2N2;)HS10LPY506A_B)Z+d)hqi*9P z9)Y4kr)2b);Ru}u_okh)HUo5va;$yV`Y)aGW~WyjZ2tZoe-bzPG|CWWgApQ_=ZWa!43dK>iaxvjbtf zH3s_&M8%LZ8n2%*UTcX=Zb4!RjG{7~_D+aHQqwHGjA?cj5p0$c5j3^*sfhCc&E{1H zsNVVs5$)LLTzY>zsYo%@+0#u zP|v@rD|>ytX#bq9dVR*{*r+?yrLpPWhtl#xmq{vYBE_Wnu?oNJs{wj}2F^>Z4K!@5 z{M&OX5`x450N9Aw(5l*Q<(ftNR-cN>tn6$=;)evV0SeyISaT!P_O_F;@@SrmmeZIyLqloudRUR`B#61SUu%1!y7Gi{lH$A0ZKbv>9u&2=Tjvj z8XA%yn(*y*fBU?6^VEA&$hmJQELa*N!8%W*z z=prgIC_><5tj*Yte5uNRUO{h;A|(v(n~$G&kDsS)liqmi9k(^of=4I zC`5cI_`DK~d;0FDwz9I2-v{#w0vNp03Bmb;L>xl<-*I2>BF)Zy9^YLE9k05$7pC10 zlmwnf&!yn@Dp=UB|3GlyR+jU*g_CK;7UDH9L0WSBPZW@a>>CN*|21cGepsB{HSdK= zLl{PvvPnz9$uxiHRvrae#?a5O;TGniC(|^`Wz3xLEjNVkvaZoGn)77D(%T(jB<$DU zW)ejL-)&`;Erj5KmylN*u4Bzv!IX-4F5a|rU7`$moL5d6Q~f~A$tjb8u$B_3+mx+S z!w+dxO^DJWER&TfmPth`MeQ~%RTF5{(3mP-_3iy)P3^M%k-(PI*;b^nSoUXyg0zOm z7?mQ&cc<>}cVM%`G%*@oYZn|F?)_u^hylmc=+vlOYGie}*@>Y?QesRe$fHEQN1;~8 zKu3adN){AJC12dslHh*O#z^`oZq9zS!k~S%`Viux_dwHNfP*wH_kH&&A)pVN( z$i*?(vWNBbIPD|3E5#I6@9&1RE>x)spEb)=W3cCpaLcu$kXZ#pH@TzYxan_~oR^FJ z`aj!V!tg8LqAJ{G9p&PhpPx@iNKjDm!ObT-93n{LCj%qa=%Nkp)3k&in=KIawX|Bi z7j@DX;?X>H9B!*Z;@XRiVCZuFU8b6%Z4ZM|so8k)CxU^0FIMEFO4y*)YCStZ$N?-$lG;)pP3hz6jZpV)L#FGqlW_KKd-l}(;i_?o&vBnE zQ33A`ns8&+MZoolhyNBU=luqmM(va~en(jX(G1m1rhhUEdm|Vj{iq$J&5%qda1#5D zIXe-&cCleJJJn{iFtETEV-r``^4XN(lFck^a_Rl~n)4Bvw506~T}fE6zWWXIahFa! zOI4ghZk$YW`#ha}|Ms5kw$}OBc^5R?efQfo*H6It6WsgI#pmxNB68o<*k=3CM^fYI zc-{YoCV1;G_=Rc+5*Kd$cp)_Cj&Xw{$g7hwb3?ScIN1ORHlQNQe@{? zmc!`in}GN5unqAy(x1WntVN_Tyf=Sm$D6;KzU%4F-=4i^Xv(r%UC}k9XT&S*5R8f%?iR8+JhmU5%^#a`OPi9K@J&|QU5D9^)-9i-?us$*)<0sJ01f|V6B7DoaE9eqqHKB>dacri_v_{ht1dJo;REITCNGCgTaTP*<>CrR3?9%!`7{`4)4m>Zv#Npk88T+Qd`I^9=td|ZVH+$Evy5$ZNy zbU}ODO_X8%$k%lpxV3pZF67wqoM%DgeJGfpik!`IJCS+ZuwD}WapNuHb2K<`p|EwB z2iJYi;qwj>nYzh4mX3$*|N6(3yd-SO!q(Li=zbkXv$Szzi^O}^^U~IK`~j_Zy~={F zgt$_cBc(JNCPUxqq-b+y>t-y4(q!f7`mFofeKToGKid5)SM4)3|40iZVy|>!C^=M` zozg}y;b<}5-~3*Yz`$jCU#f(upjW#^*zw$mv|-O@ycBp#yqd{jwSyZ_q|OP)%wVlTFgh)m8z-z_x^ztVZ_f+ghWA1nA%DN=C&B zPS5)()w-ST2;FMcx?X=f#qVeGka8DNC!^Y45zTSW7~eGreUhoxyb?nR>xAPDb_XGf zy`J0XrKESmq|5Uc@W3&dZu-Ku39lCGM0J&vMo3PfyA7vDW8NO5GBY#pdgYO3L@5}AzbNEW{?#E1)OapB`tK$tF51uQSaY7{Ql<+_ zOWUe)n);QA&`&7)WHsMPXg|+lKAsXj?-ca-4l~X0J!{6k?-1G71tz9Z)l@h~i4i%d z%07m0vw+K_U!4V1b~;@hk)$~lu|K?~!H%cM#Xe?L)O)|XTQFAb)Fg}c@lc2VP%q=% zs`6M)xVu|5{YMI$0(!tSEZ>y++dXoL57AOZF^noKm#s0yzMeuOlG^)aPt;XZWt7Ih zb7mwVG_&|qm~zCANJOydIZU#ZgQ~l(`rwfEmx8c#TiowYEUQ|f;Qg^&yus|$XFTZf z)N7Cu%VDVO2|x*+NH#({>$lx@o6X&i=eLV<$vZ__wj1`3I*%Lfxci+iFBwOx8D=(J zd^XurVd%xv^{cx?FWZJ!&67@S$jk1hROQ_tr7=1l<85Rfe9eSq3Lm>6R8PV#%nrp*bWd47Wn=Y6}6fBs$nm&kXQP$(_p<#=T17@ z^fTzPoWc9p(&gGsJ-P3Fmc!xnRyv!<_KUl@c?GZgv}%vRG}}z|hW=AMpVc(8u7k*> zF8fQqNB=Af)g7=v5~EN=Pq^ke(;pf?F@`_>yndW)*t(9du_L~VrRcm}D|qG2Xu>)T zmD*AQz20f`ICmRur|#--ZQh=zXq*X$Bs;@?6-NG6U8s(6F23|Wx<$O)+fWT5Ft2g+{oRJF@(b7(C<4Nd#U*ZZ zyVUclDG#sjerj#bbURR~J)N%Vbc^wFsW+9}45}cN#1N&(@jQzwkLJCd{ERs^)#Lj- z6L{Ng#%NtRJ@&|U*>o%Vt{6KwFklQ_u0N&b$}go*VcqnP2?_Z6D*uqJQI2G&qEwqX!Oj53CXB`3%w{27{u44DgXhgJTTIr%G9EFsXwQbO&;5*I;mE`bT^`P&| z8cc#C@m`&jSMwkJ3J5J(J6EF;eF$_WVjJ>CwqPO2@p6Q#p_T9cff^4MM;^Z!z8wfF zLc{kvp|yghOOp8H5KJlMmlWrt=)g_k(3Zi#pvG4<@xBoaTyP_%z%{BJa5`OYzCgGdn_W;wwZ?U zzW1%jC>M0UBhOC=f;OEMVA3TC-(G#5wk7yaTKD;~JC}5{7L^82mvnn5lQ8KzpOSg9 z;@I*Bz%91^hqcS0NWQ3rUl#&a(NY;=R-C5h7>w9X1>hnQJCNSZwIZNlh!Odpwy$%q zM-^Ocd&$MqZl1o?nmgYLEAv)Q!jq4Dy6=%|CoQoggv)l;f`+X)Gl}AV%VJVt?a^c$ zb0e!RYSeWsBg$y?N$hmaD4C=1O*9lZg2_sd!63-Slp;j_2~f!+SSV=Ac^aT_SeSF;h|Ww0wjTaH`a7-v`aM8Z zB5d;=V>WUr*`}7sa22sD$3d70sSF<2CoeaoEtSlX4@1915-O)a8Y>*|#|kgY|EdxH zFU#@;45z_Bv?VkaKW2f>yZ6_Guhl^4E%JPQ0L|39rrzP~{FIQc-33P`g8Wlfqvma8 zwQE^P309C?vZR59FlV%LP*|p2P^04rJG_Ks#a{m`2h)RvNm)n|?D$7oagO(g+m@4P z*?jByhlD$t6($n6%3ci|^9Z!%OB(NwB!vz@|_T$j(R7)UP%O9f^Q@>p3p z%Gl>8i9u_k;`K=Cb(94;&t~2nqsCSdGO_1L!VvV9sy@k+H^Lzto^#SKU(!3&;B$}v z(XIs}z8oc54d8r(SX|h_aHZ78$i@38_G>7Zdl3`Qy3hS&k}Elhpgk|hlTsn_SMsxP z&GR=`5-CvOXO@;LW*Pj!+={9sr0IoLYlS+fC|Giz(tRg3<`D0Ok0O{UVpKzGeA8m+ z1!oK=7W@XB_ZS+C)q8z_1V({WZjLG{8`Ijc*(FHaR!)NS!0wcx=zC>PK=UF`h6Oy^ zu**9EEm0q%qOAw_P6p%WhyNsOOusE@2-e~5^v23GaJCoBY7UsZd@?tXOH^UuM&w)AOS49}j<#llUNPl>Dp6{Se+9jfZG`OTb?nG=R3Fi6x ze5Xz~hOnMTfA8cIrrZ*-3X(u8x^>1H!QfvMN(Tw#A+@6o`lKlaO+tgS%?0oOWQG|M z#wl$ubh`rET5SmS-Oi9@QO$AW%4T=w@BV08A_XvVT|@SMaeorSY_=V-v{y2eRjC!<3;_%@56=)W%wuDYy@@3_(!fNO$5;+5(~1<7x6Ish zcX{+Q5@+;6B)96=p?ZBnb`e%)Ot7l&HF+wS`M)TjUgdk92JJ4IL6xlRU zjTyf_QiT+{K}52t6Q0EVlpUSv8cUt(5$g50q22@grk$EFD=SKnEOCQbcQa3OGuxf| zpIU%4p_&!yk(^&Df3P|b3GicEWjUy0+8k`^o z7+I(IoBxPn?GPkjO9rwvFkJ~5S6)ks4b+K^NbWMrZwizn8m>qWMQx>aZSO&WX-Ci# zzeksIf}@P#r*m41MD{?MF%bF<#h531#vE(flkdW+isOu0%hiGvZ`nz#db9Q^o( z^6?=|_N)ljyFjG8?%J_l`cV0gR&c=h1=AFUWfUJTyt10~7v&s+VuP^F1R{e+3Jel+ zAa=`9tS$CJ?ZgP?F}q;T*$N;iSd4JlmKNCSSpCDi7I2~+1c1|>sUsOS#MgK)%0Gz1 zNVfI#DKkac+KOeXwDM19?Bg4hMN$_t%F~=9r}{tcVq%IKyx6tnbo#zqp8CgQH zly?iQ__rkS(xx_i&34?qMmEb4ofjNyCA{xmN%ICeg(uZ4-(`LUm8O5W%Bw(qo$(I9 z&?mHx#vv5I@>ZU7__kr`_z`M1)wH0^Z&RtnYPX}#Wx3F6>dT3tz<^LsY?FU#RxRwK zPKdwj&o0r4?^N+Wh;@Y<)w8aF_402@Mc`z*tyD52~=K`l%We+_BM^R~9&q0z>^n0TQ3&SEC@H z7y{FGPpiBJ_zJWUi+-a&h((Mff#QH<7__EYg=v&5=zC+Gs2mm4N8p?3&feGicq&eg z8G!xUzCjV6X|qGFRr5a-$vy$F((3mzGU;$Q@Sq{`Pt4OmR2KMc3+8)A6%;Eeqi2MZ zTNf#*VK#K1$Ars|o%Pt+*oK7Q24 z)@-741tgNuBwA;-t77Ttg>R+>V5h#tulbf0DP+k5dllc_kEqD^BU2EEy zOeB~R`KK{-wWHL0?y{?m!I-T%6k(b`<+LudAru}1c&?JVUT6rS;crC<<48Xwp&P%8 zq#nCtR%g(CiHNZPjCQ1qor@rJG8zhw7;cLWj!*w(4^nS)ED*YSfe5~sk2pcEw*+hj z)WYTARfxSVX<*0}t(eI8!;w`bnvvXnuvPh&HfkarThhxc?_$9@6Nm6L=Qp_GC|a{w zzuE8pKd=jjuE3uXAWTI0s9MlH&Sd<_wBkQvS=bHN-tKVq8V)jonCht);r)2Fx*Gqh z8oezN_0-=uOYo%EC#awqbj21FwSx4Avi5l}jZG545`iVd9TE=6yhwNejcYl2kONYQ zoRm2ZT3zs;E936p&kpTP_s%C8;a{d6;NVg504@qvr3RY3Rf)~fazh3SyNL^I9&r3F zq5>m!oJlc%1Pw)7Ae|v6n@USN8{i@c{7PAqVs?4C&nz<4a7n^mWoSu8hUZ_7?oE{dIN-?O!?RVshjil%;?5n<(vWJq=4CtEtN0J}{w$IJh9Ch8f) zl72_D`uLA-{;inUrE>NDRrc-aEk83LaUgqTl~0n;!hJZfOag{4hO97BDJm?gU|NbE zjPKeiZ%mY8REam@){tB31m>7NKOihW((G1AZRLqw%eEv~Z;;=B>2v_XarKyZrc_dr z2={v+6aYDBRwqO4xk(fv?jm{=jT2d%;hoi|bHEXC#-j@5z|Anl(8PJMU9U+?A7_iu1lmpgHlWH* zC>{SK41^!Dm(DiWsHd!d*v5fZFu?8Z&lR4n_w2{(UcrXz)re`g`*J;(acf-XwP#K5-KYJ#!`V5y-Gtqs^a)RvS$kX#v3T;;5o01o1l1j}}22{=C${^&QY>c7%`r$enI zENOxJquz%c`kqedNVI$S5M-+$y}kJ~>hGg!GMwPDXgsTd=p*FcWV<8l-lvlu7frWG zmJBiqW6axtB9Kkq)b|82L4@sEPeIEk7w6IcmfV&s z1S3m~uHhLo_v$=4?vyt=F^O+rTB`vyn2fB^3zQRTYdlETW8*6{{ue($_}JCM>&2Bc zQfH#laQY;Nh-7d^ent80z9()~*)H7$w!%Q>6Dg2ttgvgZu5ntYbq;MG(2tO&)uWsk zyl<>Kq0;~EykYU4f6AG-phA?Fp&8nxCd-g+6p^3EP5a+2{}$%?Dfo{N5^GjG{R{OJlpBXOu%PRDMSF* zPv$4HAFB&OdI^iUlC<)E$7pz2og4qdA>lXY$n3EDg6(x`_kz?+OpCNr3&geTkr~sJP1Z`dda|$i=-p8d9X#wJk$m^&hs!?qVqHqN|^q;RcBE@47+Vpj1l)1X*=Ve z@K~0N4t=t>4b?z=F|vYCvB60z>^JLQ^bEEmFqsJ}lkc?_AkI$jwuSbW`dOVL3!vroscb(Ys9rB{ibEU$O-#F#O z?hwy-gI&M4Ma|_~XX8)MFER+)u#*<|0xC~nwE!W}fwfQpe&`}7fnoSOff7lQtruVw ziy9}+7-{j2CXN!Qt!?O{s<35HVuhp}K-djL;qU^Cs?rk4Z)V)2OrbWKD!H*}EPg*K zz!`}I=*U(C*#rP$ds)A6XjBhcudCz>%+Rr%M~5Ph8Mr4uG^4dK46}etnR*(U9R*dV z)WWh8%(@4tG63Iv%gR@lq-wBI!7h6OXM?QBJTfJ0RF&sMAp3`S1Ma_UK{p+M^;l#g z;2<`)GK7%tk4x{PJ6|G%eKOj8$n=WsXO6ZD!Z$Qh=>^K=cH4HhkgSyQDbZr}o00rX zcK+%{phe*}f%$%T} z$yWPa%OUS!SI8yz!I3IOj=gCfXbLjIRU=PbE^n?QBSEWatqwe=^-v5;j~mT=QneYc zp*K$SA2{|1AT5qS|-WtnUc6t$mya|u87)9?&}eC;ObG9&&Q!SW|q}W z1E@ROnDe;+?c-i%3lJB{o}%{Cuofb8{;&Qp= zwzif+yXN)&9)s8N$)8f$YFzF0*!q~Qhv&VFV(Y!D)p+&zcVHgpH3>>9@nY>(%Pkh_ zttmM-W4x!>XCQkBW@|69EWUup%+Y)#*rW`7rnL$R*z)Gn3 zYF>l;=fAm0znzIff!2eB&#Ra)_lYsNeA8ipj3?AoP%M1~_sg?PI}d|a!+2W=!JJyx z-4mL?-E2&mRp#mh|49b96c%q^%_fTWJXjECb?;BT3&l~ z9@js^8$sC)ivr4>*M-$?^Bi6EL#r<#TU>{?pKl5vJ+H=um7Z4QlclT=YN44<<))0h zU$G1^+ds#Apf_$7RYiP@8l!fu%+8y6*DUN@@`@>(*W4a)FFNM28A9dVp3A2NK6#Sx zb+0yTy)MpdClkkF&%@%!EQDTk2;T%A1)gRCICNi+yFX6}^}OCO**ic~{Z>=A<{bY5 zEpJ@pR8>PxJ$}eUPF*ZUq-m&K!S=jx!*kUoe%?-RBcFFmc@HiN3`>e6s?iMI+r`Os zhs&Y+jA-ts8l4p0^HdR}_vdb%trjt&81p73BA!pQv8y~q|Ejl9)eNZaE*+~l+Frr?rVf|QJQ)SWprFy(z;uZyr%yMxHJ9`+f}cxcr$QkN?C77;tmNvvu~ z*UfE*Z+o?`X?9=5LvPUZkNf`aFHU z8O;{rKdhe9nPooo1mL~~jvTNrzi09{Wc&kq1yu-T)ERbh3Qjl6kFUgqRebToJfT*< zMf+1jIx_P6YHw;0#aw3ROnAIJCZ}_n#^(@~D9AJ?Z3~|lj!Y#n4ZnNPI#dMa5h;36 zNItEm1RPb|p0yo!PBk<(&It#a(@2enjae`J>8ym57GZtp=?|5 zI2ZX`B~6zdIcs;}&fevfhRKGv*_NibVA8dDY>?MOWL?IoI=dg|ZIUf*c>lJ3^xEYc z)^plfqVL|hSmT)Ap~*S6q*cb2L=0o*tbq1&LP~hH#8H85hYDX+;uw(%JRk7wE7Ggb z@;R~Gdh2Q1K}7pAv6S^^5UBLf_4xMa^D?kiwd|B4f+Wzib~+b;TM4fwtw=cg4IT<} z^d?LAaMhL3gmC0oXzN=RE`CJ@ag@0&g;v8yS39{g32J`{ceeSv2$JUxoZbxg=bnJi ziOc2-d4_XMe`|`03c3UTOm zBQ1cB-2{>pJ5>U{+YI&vC3=aZiF^rmZ?obD1*wU>BB&OzCS*Qs~XF}oG+TN>SlQH<7Q%dN-Ovl`&8ks-@# z7(7N)3kyA<`KVXLrJg3}Pf*%U%Am%La2$L6Mb`Q!xfpzQX7B`w{Yer9;Ul!I$EgF- z@}mXM9f^e*ekqaT2ZXM zxTc-~qGm1&(%5}Z1=U(EoizjL42?)kP)w09m3U?veol8bU$(wpWXbZof9j;@b~Po) zS>zoO-c&RSd~7y%y#_RQy(@(7O|_qAT690m5yt1g+IHRgUwU1(V0DN3)9RcV%Zd5Y zlINX?D)iZ2n08eR61?I83tq3bItjDBGuJR#R2|)$b$p=Ze7x~J3ZQ~zpS5V`qOfE@ zM_r19`mJRCA|mIG2!0o`-}^$syyu45xok45(-@ZXwjiN2TIwJ*x75_+ZGWs>R@Qr0 zbm{eqN7D9KrKjz42tHiN9gHwJLPm$&j8}Xx?LVlswl@9#1GvO>IKlCT-ORQc#d2uF zK@r(Czt%-cXkGP(@Qi*)FK_td`RQP7PW6z$Q+v&**RFTPVJJH~GMM8Kl$2vq?^Aw@ z)v)CKpOx{1fsDN(97T^W0XP5Ic__znjMtKoPt7PPB`&i^%ylGa;e}hQ&pg$H!c59w z3Em7g+Y;n&9Cy6GFqv02@spcyM%4Rw-}3WX4MUFLazO+l-}Y&S-uZ~)es zov@*abYdl#)_PVq&i{IiL_6Ikb5oj<{V-JGK@%ge^TBiBwF1MCznMoGt@D0fo$d7! zHhgGBQ|7iK2tFSITLPi0i0UU7GLknkVy5DfL|Zq}-U6duCY3iBLf}1N!{h9{EQIfK zA~ntTBFR*vqwspsx->VM9pgTGQ%L4ySy|QgwB~bnFpnvBm+dez=JWh^n0!_fS(leg zt>Sf#hw*Gm(K*5WEz5cA7DVun$)fu?48GKQH0Qv7J$*T=DW%bIz*ep9uoAPw66dsa z9sT+I+WkpUquu}bwRb7l>3TiW)O1J5#yqSe8a;v=y>*HOSydRNu+&O?6BBLdZLbba z;AZEuupyS*FDiT!PVeW5!!Pn7maH0R2^4^^umJv5Z5U~VSUCjLvqJn zHT0)=0W9KPbJUsFERGG|%eaxsJl7B4JISOQp^N21OcIv_;k0RhpolcusHOPGsY%pY zk37NB(IsqV#*~%!wJ(MC{Qogv(lwxet>8+wBm&Ue*2np zpB7j{_JQTQ)3#k6N64Wx);dS7Q=sXW?bj`ukq|%_1q8G5Yn}2;l<1@k_ON}dQLhQ5 z)FM?iuw5!H8u2zUk)N_Sw%sK4z-q%~Cg~`*Ua%tGHHErz|GPvMBqt#8x8v++CYiOp zx_|C1y(mmEMPA#gK6h3)cVoU3?Y>p{mqy57WCU`682Pv(j2yHv;Ij;8L8wgg4lEhA z4@We+L1;=95kheoR2@Gvbv`y)L+Vw zpe4*d_%U1ERsN$K=o{iXmO990W{!Qy+wj*yBE=|CkK7-sC?+wb>G$gO_6C>Z_Oyec zB)(8NdW39(y;^38Y;4*GOb5OP!(LI#hMhXxc;CX$lLnlH7mr#h6b;70`}`TY+J|1p zgN95YR0Y@PD@ot3^RqRL1U{D)S$O7yY0HwR(c`dSd<=2gDBkAaB6jlo@_((LFSN%dH+ zA3WwRJCY=|XsBMH)$N_HnUR$cIqR2-Hx{1J=&bHHuu-o#6X z%u)43J^U?jTclnrIo5a{kSmCe&@-8a1rsoeVR6i_sD>>o)SjyM|qQ)PSeTd9=R zntYWJz(m#m2W%`JE6Fd{ZPKYbAT3O6WkdfWBC*jWk@}a-z(J>k zrg&|tb%VvrxPo&Zkz;q8ktpeP>jwgvcX>=!>D>&6ma{cW%V-p`&s8t1Kaf)kz`_785kJYZA+E(K!!K5#}M}A zYYSyoE}kcbU2FwZlOI=3H=thWA!W%LF{lR#*XluGBJa5Vxb2|9D6&`>Gbn;G`y*D7 z@i`rXdDkyN9Ow`So<^e1z>?3+7vAv$k@g(2*aQYP{CC-QCx*0T@@z$Z#}|`PS*71f zCc;i|xRn5cV|gw)@G0l0+JAcz)rvAXDNK9RsKEh$81>0xSFbf(ZH`L&;mx)-Wavq+~!{>7NMu+C=k`a z*>qiTw-S0Z0wu3((Q!si>Ox%{cp3f9dYi?!n0c#1McYEnxqOi3KwoxDt#Ye-V2XW3 zZlNh-%>B8rGre%3pzD}_q;*Tm?#(%vLZTzERkt?Ku(6T9=YJ=-oK|XubsvU_p40(8 zk{>sX#$qcl{~o+aR}^f~@W$KS-IO4d8Ui?KykwnU@1Dzh=>A{D#20lT6#%Y(e?hk~ zht={Gr(f>^TF{JUl4@b$M14mUT@eoZrYuPyGi*eUaWHQlW-s?x4ZV!cl15R$qjET} z#Di-j*if;i{Q$zPBTL40&TGfU5yqmX5xlE^DD$|LMmkttJP}#YKx`r)8u-B(Gl9!J zky26xcorStmH2KGSSe*HDb5T#CsV;|$vkl^SRzQ(Bl-M5o#3UVfHPuTTPK|UWna`1 zLLNK>e}_lRNv^D?Vmw@>gw%|QNh|!T3|786f#H34GtuYV*W|?GR=hyc=+vlZNdtU9>)KW^S zBG6bDM2vwNiA!($+P32scftNYrrv?Q5@-q63_I%BwrzH7XUFc2ZQIzfZQFJ_wr$(y z^qG6lnfVLrDXprn-YPb#K_VRoE7J-w$Y0sWVK6Or)oR>82$e7EOZFEpSFH@SS&c8U zkr9}VpwB3gQ+we`FkVZQ_vOM$-buly|DlR4#|b?q9Cd=1-Ana@j1;3PQfoj34@*i_ z$xT$cU{2-XJ+GRUTqN$)r)T^0;cO?=sA*~bb7k_5Z(4@;ral=U&RHoFkz32mTxG8TACE|yu2OV8x^xGe@o>VI4Fr#!d4xsq6X_-a( zH{=zZ3uZ659nRBk@MA^*G$?K5y_S3@rfmKnu`n!HQPZ|3Z~<7fV5DvsH3Q$P*;-5p z8#o@ZiBe%Sgvj!^UL!POBEqP|Vy(i6etf}4OGriZEl zv=+yE7uWwAoqAo6?53PMQ2Fa}J+v%lF9V9KjvshOL<>fl640@eT<3sda zHqAcc#pL73&lJU(_u%Rh+Bk+Z*YFtBWW1SW6%M2EMXW_)Y6;J2N~l=|TwSZY0=4od zmEzeh(v@kSJzjfyL#a`?oD90{PP2POQ{1UADpLpT>z7)VhG?HY0xuR04lLu8%~k|P zni7($*9r=9a*IXu6ROA|uo8*Gg)pDiq}K6=}IFQ|rg8GHZTxm|VmQ&GA4B z+!O}wZufl*Y~!U%DdJ97@$~$R$%%sy;jps7L3geY){T7aS6QF_68XgtpjT^UGfkRwA6}q z%~`Djk^|Suk&-wfIy}aUC6bsw%YRNC4J~Xz#;dW+@9Et6fs|H$Fu}&9^}ln?U%N)w zs6NYOt1nrS7a+PX(OPdGv{zf&+2Ed)k41!6GBKzf+7U&D3k!iaa=6u~TsS*eS|0{3 zu(YBG4n|h>^iuLcNFpnCmU<&y5W;n%qzV)<*%2k0lT|A={GeC`pSab>ULjN#l8kQ+ z0QnM?cho=wy$M6(wZCJe;XEZ>6Yf?I+32H)Pp6n3G` ziukt#KevFU2Qj}l(5qC)qI>(YHLMvDJ@aQuX!hK zo1LlI*NV<{1%s@d4$-}L-=;%C#h2p>jhB~D3U=-lbS=BA1OO$|a2V*R4XeDwuPhmOUVDFj4+ zWT_6hqmyZA##zpvejG9}wi|1@cn(h3iPO4l8?=#A(<)ks!lsIyz>-<&u_?|X;b7IW zkvZ4~mcAu)h5L(~qR z3#i%PfyA`~EP6IdrrIzswhbmbYOrKnOfFE!ctsMaz>Of41T&=kDE4m1*f6d!pd+A- zXatL-JKXlqFXu+M?!`Vr2DjaJjV$kAOBe{__Jgb`FK_JC+$DFW1D_eOUZ%>qrX*&MfPmCeT>W zh%I&s&2kWxZ;y)@gs0aZg03u4B8%ckq%Q;-jV79U6!s6dQEMO$#K9&}LfZIw?6Dp% zT?CsraeJcRQI(3gcmPT8AChtvViCeX5m-DE6{s3;1y!;dN#a5Iqmf})Dl9Q2@&Rfu z89`_!2TdO0+8;>fwrwGD?$CM65;@qbr+&t9Im|NMCaTc@ZO(1;`JBz{x8I?C7h&mag#po63%i75VZwdL; zA-X_H9(u6D9Mp?D(Rf5)8r9{_o45*YqH)&ok3@7`GQxm(cWx)KK0bh=D*XKh(Y(A} z{q9TJR|l>?A%c%}=HrZw#0HvrapTDB^R~Mwx@6}=EAl_gz-CJ#ws4*3FSbgh-cQ zZFll8r+9mo;-ooQL^o!0|7b}TF1}`15Gt@!ZP=e(0yfvTR=LI-Q^Lu9=oYBG*!tsO ze_v3^^5>GJO^CFk4yi@@@M!7LG?KPXGQkBI7N9lE3(Er~h^VLvYQ~FsCg13$^Kgm6 z^^z7r;>Si9`i2#?h9Rw(!s*{xZ#1Cwr14?m(M0*Fy|`sZkICQ5M8f)b#Qb>b8PzZ8 z!-B|6iTV953>cuw?uc4It;Kyh|Qj86S6y zPN+@-I3q*t)focnUN>6%a7=5YNn@nl)6l3(dC`SRsIU!eL4*yJs2VI3kjj7P;(`%c zYW^E9z9Ar(I!M&OP7RXH?b~7b^MSFd89yh;u}VoX9CKBYOAqee@)L$VdbQB%!|}fj zAPUi2lU62KWNBJp1S zrk^{OI++r>hVkg?CK^8WBOgMlL>RtCF$^muTIUu?xT)AkDu~)`jc3Gh(~k6L7Tu8? z&bkuBXo^{Q>IJ8Ly6Eg5-lr{yy4WX zstlgsqm<%t$>NU-G9=sp7b}rH@>XXz{?5|{NU5tHTBh`YkN3~`M>R<*>Y0U;_cTFW z)K$9~lj6CC7v;6XyAZmqX&LwNR7xj`fBsgO@$>Wj-Hw0o; zs?fMmiyjFz*5*m$!8fYQ z*F380$ElyU*o04lwmgMXisv98M3IA!?_q#9Ah@M|Bs<`s=%7Mzp@?Ed)G_%^0YNB4 z#1D!h!Z74yZHI}vYOg)a%iNs)rk{Ps-?usUhaKF;*G5dc3j=R+HSLg!z!#N$pO>l?IJ9w7Kf>C6b`|g_q3`{t7@X zgfFN;=aW>hSEwm-t@DW~NgiMPyy$rpXe3<1qHBU|!`NWKpp1N>%y0?@7n(o1`0aK4c4&L4ZrhO!>49;gnQQ9bvkeA%wsTGO zCPWJA5XB#xSCKs+rs>3oCzc_iBrohqfQprG8zQ@ea)a4d1=7v@y)Vw^d+X|oc$oo^ zw7ttTboy?9e7Rj=CxLYQ98LT^K_vz)?{CA9g}#*>=5eP9CI{nCMC<4^ILr0dUNC$l zzqe+?99`ssM$$sdaAyVusV~Mb>VxfvcI9EX3o+krnRR9)ktzr*j+bY)4z-t!bgAdK zMxx?oN|J@Z{K%S-wsckv;KUe$Yhv0C6ORA z{AAixkUYBXcKvaSvw%R7hZ>xV!&=?HF{B;EGjSt@VgX;LU`p1DX}8L>n_|Qw6^jB{ zj3ipcQC!D`Gr6HqNGCVciGlGzx2Bkcxd36D>6I-;15o-IgKbIR{(z$aELRIIwsMa1_DnOls!bdf=LG?yc70#+EC=!abpHOG048hyf6VKSL? znw>*-Z~=l5g^>F!1`a>>zsXE-k-S`d1A(kcy zKm!R3c~o0rS*F?nt>#G`wk0yiDxOwKZVhO-0l}iwI=DzM5zS~ia6wZ2H;nfIyVor1 zzdyp9e>lsbIRmk#OgIQx7Q!lUO0p7mfBs+*0W{+)5;7R7N?q@af)j4+OB)gBDv=Oh z7Crqm*zIwgDlhjt3`Qj()hF^t>lUAu!X1)iFx12-%yi`*N{z(iOb^h(3$l@t#!rAc zuL23tm;IurMSc+Dn>ud{k>=7#)QL44YbVzAGfOF01C#hH)rzXTmln%bXPinYy`e&C z_`%@&J~@Mbk?N>zyeE z>LOo}3?kUH)3IuapKyybYG1Ngx#R*`0@XYc1t+n&!dWCI$_EK-#Agu$@*V?5;^^R;b39Wd7|9!U!mu>5cGS@kKOwUF9?3H zd!k6vB>05&)5Gua%w@oq?DqNm-Td0<#yo?Ub4tAL+d%%!krh=c;O9Bqs zb`m`iZT3D?~RPzv-$BvYzBp8`t*4XGiQl3DWt0MeS>;R26}jcztT?EO!cD zT1}!SM>z2yAujAOZ}ZCr-*SUwvgD6bp{w}I&0N31{4nG_`IbJ;Y4#M zsNFhF3kbMJsha%qvgO6qGrTiF{PnVNQgzeP<)2Z{-szS#nlb7Au~?tmsY^7ICR$ur ze=|Zlo4U>IEeHM6caV}_4od)|qPSERV1*#VRGdAKp$4(Nt?G_rx{x+?1gdR#?&+{vIG=Y-v zX?5CosQLb4t)eEC-x{Y?L@igCAdGv&i}xkA{KGnyq#fx zFIP>`RYf_OaXl-(=Y-Pw^^O0wt}DJdx)kSSj4NVB<*bd@h2Lk-%j#doo`)U`1cc_F zEFjb0v+mn`uV@tRyC*jWXhd5z^?Sf7F#itd$^zlGVAkTz+QF;P4HnC4d!O5id;PTc z30H+rf)Yy;Mgexuq;T2`r<*#sEY8=NtnbhJPy!E0Dk&ScQCbB7uWxXEbwmM{8b3nn zWhw5NWr3Hsuz0k=vG{3XPkre4L%WE08f^8(hQTPYm|qQkXz0PqYe`YTC0TCm(@B>L zR4p}=o=0(-&po$m0TKimwqfy9Nh;ke*Q-gC^v|aXgiBN`%0`^qZkLlSTbbOvb5BZh zh!Ym9nXKl7j*9!rV6f)xeG7(J3XNp7Wgtc0kx+J|rVQ%e#=}c!w!p zaN+ETSa{g}LmrfgiHq4<<9Q6%-ARg`c|w&$@plYsHZ~n5&-&NHpZCl9_anrqZg_Yc zscwfMZUKhLfP6eH`?+-1E6>hNy@$sd!kWGs+B&kE#wV@w9=7j6IZl0<5fUkjc$!Un zT=8f9&xkAWxT|a2@1=|=s(iBGgA7OcKlmhtDC8QSuOmAdNv#H~GRC{IuftFTgdD5W zQ@rn~jCdRxXl;4Yag1Jnu9B9w=lkh3Ei9z49offw)U1F{JCe}q6o_i&jIpYw>+5(7($*k) zKUNHr;;ARir&nn_;?i&~qTfNkP=2fXV}S_3Lk{ zsN~yCk4F;)c+N8;7{4dqv}HL$%DtQ5rnw)FF|+QMGHT-I^m)D>=BHm*DZdZ>z=Eka zfwYmEhAo%&PI*^dmT%P^SDnLp9ox>szrc{oTu{RE24yIs^|SFb<^tx0441GX-V8K2 z$D!iSD9$Ti*DGp3JmpJ7zuG9X*W9umDd>B=v?_kI>@=D5ye2UWA_3^2HHNts2WAVT zG&tl2F^x;G`whX2h?tX^@flZ{Uqv-u_f6`0p|zsx|K#zyo|jEfBMN|xk9UEK#{H+9 zkAo7Mu2*@Dbz?Gk$v1MUqjf7@=eEOS&(FnWbEb+x_VZn3F`Lr(?U%ba&X1=QJBy(; zTu5$OQ9C*EE6$mgT(S@#WT67d*y=M)=dAGI42~R~(>4>(9ao;=gbtkxXQYKShEvb^ zw-T5!RF)bhqd5bok2^&ldyt(l$%HOXkVk=}_So5{w-!0j(n)Q;ZqA;$==qCy&a%$b|34M>%l8Ht9?j2ea#v(Kn7sRS0C3}6*4@|n$_mPWbm(9cdtpuSVU1BOI)3p~)J)PSA z-qiFkTBU~!%c~LA{G$;L%gVd+3ZG@pKZ~Np>bfqk|HQMVDrM5lPrM~Q+lsWbAsjlU z^A!voF2P@i2AZ!&)R=vcEcI^VqZM2CGk7z;^?mfq`o?cv&ovEKCXV`U_Urg9o9{cM z4*8JNU5y^~8v~`jRy=>cMgqhZbbPbed+ve@-rtu~z|R@HocokxIu#}JfyG=jR+>>n zBBNhPLFM~edbn90rcl5oR988H=X_cpr_)7d6gXTokx)9WF5z+#sqeuW{QHql*TX;& z${hPEe!}k*o>@Vv)=ILuvwxJM@^Uw1P_ur@!ga>z36Go6uICMeRPYI7c6-2Ep7oN) z=^*#?gy(&8D3t5kF_Ku2hs;ncQo4g2dD9%OP3!UB_v=UhU#^|!&Duud)TeV8P14@2 zi)=7$iC(*gn1jiTVPjH112yEowh{PFjw-74m@}#1uevo%F6r$Cu=X&FG{fn?EJQ#A2U!)Pv8_84PJ}P2rD^zC$Ka zPXaW+no|fhLw$vjSRhJ_nVtB~q>snwddt2oWK#Z+`hMozaNVm+RH zJ+JA2Ej<|8avy%^dj4g1Uba5neeM55gaSXpo;7Wl7%qF&WxEvQVVogHnXrTa+ddgz z8eX89oKwpOkFd>qKT476%41|ZG6#E%`lob4;d{=Mbd_@dEE@_RDlm$zMbmlmozQ)O z!Y~3LCam1>c^Y$7ZCr`+nA6jagY2eF(E6+whi0DnaRl7PSi*l!DyUG+DnCJeC$JLp zw!cbP3#wct+17cOLroZpNnp9e?fLpxRxAiV3~=@b(}HE=FWtzXGO$+$Hp)=rh9_#1 znEiG{75uLjU=e<4+wdNqk?#~&G)ZSU3cU_Yv+DWmKW&cx*Y|pA1%H={WX7k-%O?33 zfRJnng7j)vP6wkq`~wm^QRS)O?_k;Dxa>$cAU*bXMqoFy4f5bxX_fuO4S3_0JRTd3 zQCwZIIY-oS>zmFnIjLJk^t!AV{>AYwb&!fa=sNxK)tRE#e*I*g^Er`sujgJhYa`e5 zIdz@<o^Jj5^wB{V!{NEMs(jU1T0JevFE-n*75>mXs1?_R|_hIizM}yZ_lbOW;hm zzn-wH>0C)1?Do8RA6_r%X>)sd;myvL`^w=pHh$Me(dp$QU;w1 z?@H0OZ95dyxt4jOq0y`s(7GApqcEUJ;g7bQFzS|FeDx^-!2Z zVN+}NXPu_$Lz>p6{wQ7G>uVJ|ybJNIR1h*VGxlhZfm;ksq7Kuz1Cq6&q;__sdCkFM zLK=ce@2ZqaC2i98G`Lku*EOLkD1U%?8@LD|y-db3xeSHLFt(&++m)oQ`zHyVVj}Yv z%Zb4#{2LG=4a82moc8^?=_r;n+${;B`E)!Ic;4xnKU2B{j@PIO$E14g(O5pg|4x*G z%B$U&-P;}7XmgYT#`TGHSa(d`ofdYF-SxD7Xti>7<)IZp^JpT^RoCqeyiW67R=K&` zHxD8xKd+iTr|7#K#l4$Ubv%hD42i4mZh5^f21kf5ZT~JOm3R4wZh=2LMWr5f6FJR*=-IMh?u69**% zJIAFCD6_o9PeU*e*a_SoZqs7ugu89@8vD9p6sa=@5*kdUdtdrUrV-v3gobAH2)Tcc zsqrQj*&@IbINg9s&p!8j7Ys@A;!b6I8BBFG5R3)a69jx1t#@2E|DA04$TM%C^>N({ zPWjlVeG4VCmM%eq7#&#=HMhJg&ePX*4y;~k*)m`iYZfvnq*D;MJ#W$XJ`9YR!kM!6 zo>)=a+EW^9@w`^}-xq4z5_G5h#=uss#O8WkNApjFVDPm~|6*@up#wu zYzI|%xt7>;*Nr5tNIZVUti)22)X%QRvw3?SmtjPLow2Vb&P6~O z;Il;hr*I7OrufFO=9*}8?VOdPoz7v*&ZnUx-b*cP^-YiC%j}$chyjp+JI^cUR2u4L zn~XeJPvOmh2UC({PP!Zy4(Tx#ayBRgrJ!f3H%@OsLvRYqzIl51e1<`J| zv+7VX!m(92CH-3-&zo?Q=Mk8{*nM)rq*%~D&--$C?jNqd#*e>}P@>ZvPLR3<@P_7Y z>`15#5|xS1Hze!YK*!@(FcdEhDY37s=nDCpf!w&-QDnx=CSF0>ZX%}Yijg?HJypXli8!9Z>=62Yw?;77Ac ze%cx^LWkrj8+=x=WGe4lyQ&qBDHF0*(^4;1QQZlYb*k;_%LkZGsP8r# zGu2VJ$~KljzfM-hU;MrFex;{F$4ojcuft!|$m5){Ntk9IGgUf49_|B7>9~7tLHOnQ zz0Ci7oAde9?$W*|MO+dVY z1jhL25_I5Z}Q`0o+G1kQ1WZSksRV7d> zgEw5JM!4y^ozUY=Q^wDD{&?nqDCc_+t{F3t&3)b^mZne}UrIKcg~(s~`{r?P@>m@Y ziwNJkb>GF2Aj3R8k)oel5hZv*JW)JRCDpWKx>O8&{PCH6+pUOdz3{QOH`T*;Tah1c zSc|r9uMoXhF5~M`dAc#S5MT3VE|W4l^O^DcN%f>r$joX$`TWWJ+3eTMvVIol_iC$F z_#T%nCtF*bJ0m>&T2--Et{QI3Hk7N6{g;lsTTlT{@)#1tKfPH5Cj3>?`BcS&9M?rD zl8GktdovIluk=T3&j8uZq4v zx!Vs*~mq@@Hv4__aj-!eOeMJxVSVksPlTQZwFBX1nEURVks6$BjrN`&}31$L~!53+Hm! zL*8g-*cOph-{wt^`IkAWCQQ^n_c%Z8bCAnqEzsideRLn^*DB=O&z6_-@Ba~l`vaiG zkYGX^DAk*FV~i>bi1*cWZ9g+?S{+KNII+!ZT>=6>7E|lIPfA3@(E28do&V8bKG`X1 zx`!-;)PHjO;VlEjAWlQNTdBk?Qn|`tmu}Y+?Kr+Wc9qW zCOKDruUDz1xeTkCVb!tXj{=G2v2-4~;26J#uuUzMq=5tQ%Pq z*lFVd3u-7+SU{s$hJQClP|FvTDiq3-)UX@g2JAU?pVwCv_}hj-p%g7e6UxYl7`iZh2rneY41o{p#Fa8wHUO|Sh7+fD-A-b3NpFJ7!}^Z&IXZvDU!>_mBOI<`978W`UuYXt7X zMUdKY^}ODmr+H5wu7{JpM1iFI4cC$8oLzOLt1h3KWuq1BoLesgs6Dp@_tVEe5o2L= zsTxO}+VB>M-__EX?9Q8(nal~C%i=WhrKob~b=*esa@??>Z* zzpV({evToL)uV8EkA=Ee_uRh8sq52|U`Lg)>L*-3Z{_@Ng3_}LcD;wa_Gnw@LEf7z zqY=@^z0CnFtq~7{P40A9F-++Gg2{iIQDG}hQf_uT*O^k&_0$bhVNERdwbQkn;5g0q z`jEuA(e*c!U!KK=Gx-F19;HZ{szm84rc~`*=A47odVL~dSNq=>uU{ z23h*UB4L;Vvxnl>ubbY$n9dgmf+)tw6UOcG#_f@;Gi~>(MheF7MTL8lK4+MuJd%P+ zdhM-b3nCIFpW7404d>;}NM|7Om=h#r*hzkUp|{EX(hZ8OoP62r?2z*E>#D-^*7;x0 zW)_mPa_J`S5Aps18mg)Q(Hy1xyH0ERbBnrZ*a6#KRG8d&#I#byYW#*3S{)19`6t2oL>*9Df;&0VanNh*&RF4=f0etOW?-d z8ziiNwf+p2@$Hw9tM#wlsrS&b_$PR-dGYQ0WFToqAsMtNx16!RbZ8q=QRu?FdNj}7 zJQRNWBm%FvGyIV<{p7kx%eJGw@mzXMQ$6`>{zUg_LyAEA{nPUHtq#K+YR_Gb{@X>~ z^5+!}(iq(Rm<*%7ymrX4cD{8E;= zDN-2DYT~w!weu%+%WaSN=Cq>n7)s+4%;-g0Dk;t0c{gdZZ4HYKSTKC5GhvYM#=VV&8Jq#n!fEp!98k9rL2`V_-#Tp4{|N0#z4DYXu z1nzfDs%qN4UCwGRH4)Q6fON%R8NI9?ySaf|z$#=-_rq|#&Lf6tmRx0!R1I4|AY3^LFCpN$ zyU$rNy6CswMS-5>SLZ43N4Oj7GUp*&X50L`nn^?h!P!LL;iD>nVw*?{NREYDg6 z7K)gWy_W?FB%O3`Z@GPH3UE1Yynxc@E8x3m#3eyUXb>wFK@G-HR@ccF%zEtf z9hasbq_1hBlAjQ1{VC%Z8vZnd8sauI#zXIqr9u39pnO_0UcPKuZR6gsfV<7pb;X;p z|CM&r!N+Nfv-_U?CbMbH=bUN8D6mnG&_n=;$J^O zr>uG1yv~*fM;}@`&F_n=YT2+7=AlkP^|k9Os+w~@R@d}KKi%*~oYXMwa(-U*oCd0q zq?cO$o8`@=02H*ZY8M+%U1jwQn^Y=9m#6veJt^^gf8zO>FP=AU;)RD>?T&g@p#o7I ze&ps^HKZ_6=x#dZcyq3~1zr|cUssh#d-r%Ft{9vpzG12CbbbxtK5e*O<1D;zgA1;7 zJ*^q8HJVE+t#gQ8P$h$Zf=l>*h4~8H!KoOvsdUJ1dbE+r(HhEgo$_X12Zz(j>onT+ zIZk(t7}T(oEd)~~u_?Q5Hre(U9wz5BPG@^6YGdyNi$Ybq}?w_l?|;RF9|5P+wsSm^L(Q^|=-v-CXXw! zJ?PxP>KJMl=-%NIV=w{L+p2vo`Cp;&{C+9_e6mZ*QO zY05V~AVZ)clmV_06Q7uSNcsR5V?6+7cLrEejI`DcF^a+=v7$VhtR6D{^+;MpLdhxI z&LYV!AL~TbjjB`7-!djF!Jf$CWCVAI3;+*uiZ|NIN27vjX3(K9wC)OP-65GNu|8{6 zOQuuag+0lXGFAmjvlOfFNRN~)&Fmxo@>W`e2`Hwb%xO#;unEqm&38hvRll|Vl26jGXt7sM#DjHgPD zoy!*(#kcU|Q9NcjmN7hsv7D7V6|Ky7sS1l0KvSSPCEjZcXy8%=M0`nBYkC`oD^_!sO zIDjy9SrP!K+@Hb?(NL|3TPRZq?=QyGqr6`a-3N#EO9)xlwg7rQ-oCJPu6{6c>z9v? zP#?0@ggj26WW2o^c0x4%wz!y(3!4zB^gtW3{KI1mxK2coFh)*^G`un+5bszu%MGzM zSiR`SbPS?c1#_^}Wv63vEQ|*ykFTf>zx;LQI0fN~c>)+!u*@&VR(eKRK#gZ8f+v?B z)2Z7MP6Zj4XHBByJKw4(=+tc@*?wWP0V8+wu=->iJm<#Et9r=K!E6%(rtY+I<) zuj@Y8eHh$+vk=iOE#J?_qwbG%m9mz6y>m~OuLi^6M@p0wg|JpCnFBFl0|DYZ*{xEF zrp#FBF*TqhVxkev%-sxzab}^o$~d-Vyj|XEDlEHIVM2J`1iEGsAg~svB4>@R&>`&d6jni_AC*MkXG&d@cm*`qoFUmVt*T@WG_&(CKF6j{iz2p8 zoM=#brigTKGD5fk+P`zrY6LVi8uC*NYImp2d5kQc^I)pe7Ljr;?^MBi}yN2-lBcXYM`17_5`x0Lmzi;NX*7-MNhaM^ktcd*ChQlO(;V%pgBZK~ zNc>1w1<0q+xehb;Ca?L=1@+*k088Q&zS&*3ljPq5X-Ii{`HDZGe*GWICtyZoeHLZLT<07@cUaRoXI+ufU? zqb8Zh$KL*-01qMNA{jp4gE*0Fpu~MUo+#`n^oIo_J1dXF#0L!=dhGXmk zlakFI@u$F&#AXr3IxNr-T7(;LxhQe|dCCm2FWOs2MI8i~@p1uu-6`zc+ndgVaB~$t zBIuWZQuuk?=T8!SWQfg+=94H$m4(2Y#uPdDBz76rH0qytK@YE>uQg!CpNUI^ z0SZz`w;MJaZ4Q@D3_zj*WE2A5$2=nf=>tE4q0Ubg`XSrLFN}xiuXdGpEDPl{NnWTT zsz&l8&Jv8zglET{34&xwK|sUjpx#*RmXx`U_5-*Jjy*SW3v!XD z3X*Am5DdtAA%6=*odFOvAi*>B-+@?g@$#c3qpc( zFI|5?YY8sWRpgf{!=cM@-PPua8A~QQLoA(}J-WoKzJLF!7kswJzp+H4wybmUj9I&4 zZ&(2P#mm?vcD*Su3N{0~^Qzk0aj1c(N0f1GT{ETpVZD6|H6a~V0zI1K)$9JW#arDu z4qem%2Lj4<-G?|7jp;QK1-&AKa~}C9HK9yFMqRFgjwryIfM!f? zK14W`NN|NT$HH;I2BxAE4=)KpGmAz%>esTP!irV#WN?XAFl`>*(I9e!_Qu{98ycv}jA>2b9%{-O~oxz%jP5 zJt-er0FuDM%WYUc`a|Vwd2GNMDEUfDU|TCCNM+uF5tPVn%+FY1@Smk_IShJmgulhE z5T=UW_iT1Vo~iI!Aok$HOw%aZH;2%IpTS;oJ(;fft|8BG-Vk@Dv)iunu*95(KoLf| zPMsio%s~~yH+e&cqVs@gZom`jXn;W@>l{MlU6ESv5*Avk3Kp5y&J<{S)=pj!;vesT z`6FkkTBaL92G3TD-lsnTM{;+@dq+%fNY?}M_#L-5Csy$1K^d?S*)uFHe~C4%3SU8z zHzzt#$8tgf_Y4tjAsc#1e8HiieP5BKcdtD?V)YC^$WXI-e(^s47!a5RL)oP$K|btr z_h|W#J;AV*Ibdhi|+DvEt;M;dqF!2W=e9x)6j5-3m_x&!td{p z9OW{h3W8-r_#pTrBnyD{^7lNj5|f}aIqjm|{UIofqj1pXuPhQ9qqt1o3Kc{el+{0g zZh~wzuqR2xASIjjM>+}eG?UB|bI1K`!WjkL+^=EED@ZEE&{gOaq(kJ6X2Lc%uTPn{ zGcq+9@vk5!xITs+PF~O)-M}DgJ{o}B2x3J$*UsHv62VPMRA&M5tP$_o-^|1HEQGqF zx*}I`oXVd*l4h~sB)Ed;52tL0;&(i3$;3|<@eF*cJ^@!_x>RKJ8;2L}52R|s_1K;r z{(iJRubTu&MER0fZiRiYU>4QXp1+-2+;CsLf6I8=;6$igBW^jm1YWZz3d%=02u;KXeI80`JsYYG!jdda!-K zv7h$z-713YhlH!pgOr^*@=1w$a``62I9Yx5O)Y#L6zBuX>uy+zx9lS>Ep8I$&^sQ? zE58bzJvDfM(;M=XHScaP6BiOiKTVM5Lq&9-MYtkCDD#_$Vh>?b!x8@pa4YLFtb@wM zqs3>e$@;z3amO&1KRZF=oe+XsMHY3o=ysdGoS@ZYZH=ZL6t1g8#S9kRCg()1gxsVR z<*(Jn%@;q?3Miw~VbQoew`I=J!9_)7?JZ(t2B$qW^d~aOXq%aX)in5#Y+sysQ)H7= z-ze{1(z`CShM&VyY(?^C#y7(DuGFtM37nRyN!(*B*r7KMKbN#CLP)U$!&1AjZT>*! zuo5Ns9&q+WW!3H-(-Tq1}Xi4M7JC4&8|yYlP=hh3_wo8qGnE4T$=x*7~;c23s?GAQ%LVv zI!4?FQu9)7P=i)fX84CrIoPj*zQ{}{#w1JxQesCkQf2T}9d;$NQIhi|khDbfWwc(A zPjN{dNQbznmt-nM1}IvPBCGyq#NTaV6#n2tw}RZDuTtB$OxWn1_8acvW^*zUBv31j zb+o;~M!f`91SEg;Fyy&t8y!#{xnPna?S@Dqg@Qu{dB3oVRy zChnZz2d0KknmCj{d#TD}z^N^cJBiq!8DXc$g*k#m;3<%K_2Y~Hwn>g57UH59@}f1M zfqwLVM1rFI(G%y#@@n`QI_=hmU`Mdlu`kF2N!lf7%IAAg0Wv%E1oc$k1-gk?r$K01 zV07w|{VX^ttnJGm{ zMalA9MRH;ua{U^hbH^MGSpIB z!Kpu|2EUTo4Y899?2$YYXm>oRYV*r>vipexKFRm#pZug`#{M3T6bg@IBZmV#FtLr8 zMB4>q`%z0ztJGSA%;&O0)#@caKku)XHcgn z2$~>oQ62XEZC6N%%9!-Tz-+*-gVl$S6d*>rU5&N1%Jy)el7vgLsCDw|XrM&n$SHgm zL_`-5v7L(*+lgj>zsXHV?8|9lgJKa?-UN?mA_)o6vARhohd=naPwG2dlptCEKLD{n zPQSQA2wI)e8{v)fDMyV!ezGBU2#|oI!Rz44cDr4#^|Lf6U3mTlef3JSF|35GC23l% z9C^&=6NSUMq6wrMS1gAbc!K11I4%?{)D7}LB_Yg*U4|TkN8X&l3cp+S5AVrgNVJ4_ z>F9ilOKLcP35ixXOZbw-3}#rb9oQ)}hX2CZai}f44SXQjQy?6v$)z?1fw9g7uB)F3}E}ME3_v7pC;3@cop?C21&B9rSUDzkr=_bw;t#MBsk53G* z&|D{^jZdL94qt}wBoGpxGY-_%GsD;m!9Jq6+a-AR&_$zw(KSl}htuphw9o?BdrShu zdwy|KJWPO+!zml4@GJNxok3x4WQZ`T3=NiC7qN3KI6{i=3kIGX&~?mu@A{`h1h&&Q z4$7X+&heKua%V6=eZ%1tLMQohbhqyP|86aiWkuSlK>BW*>h1p*EYP#_UocMZr~e%b zc%riOkp@{F9wVYN&pao%xBr$7@FO0xS>VgV&%*pK#}%n9B1ax#RE)R4J!g*>7W|qS zHV7F3w(#tSDFm@A@SVcJC7fn(*(gg+9DB@{E;#QzPEo@=pIbxlrPVk=k2yV<3{9+b z9Ah#$_UPk&bm6&W;Z-cT@-rz)K!b{7rmZ)LQ0$p!A&&LPz-4Fh4&rq6M2te6H*Ayg8vlY%c!02~r33?3p^FjN;{kZ?#{=rFb^aoO3A!cH0iopu0GA*qb`dscMg-hr@(5d=fyWcf=5Q0#Bx z+K@=P#OX2$;St4V!TDkY;qvgt_|`(Q$_dL9L#U}~DD4v^-YU;xWde?_pwWPn;I#(_ zDG8aRfTfWU5TcM!HRI9J@zmisEO&;Hf_nfXSwQ*Bc@JM8kCI?C40gVBSVHjmhcI3j z{e<%bZtAE!co!n!80q1%K~xy;L?oD@1ZsK;j z#>(3WfgyefNYKTHY$xVh;0Y;03Lzq8-lJSM6_O%{=O_{pB!Cy@JIM(JgG+{0rCt^Y zWpSmVnz5xInU#p&RpO|tWdLTDD?Ri#1K7g!51}XkQ|>_kHn25s!00QBdTE`26 zU)g06QUurzz*;>0W5NyqsgtXRGvZlT=<5tljOwnfI)1`{RFE4Ipd2^bZJ{$bI%p{TM4pVfxBHu}!rn@7Rvw!e`M@M(a zyz}^B^&0lUHep5f&aM9c{G8|cvWD&0dDOmalupQ^^K1;ODgNQ@248C6(cQxaOMm$P z)5g8C{wo&1qt{cK0&H1pC4^0*WoGgaVB(3L=bCpkhma9Jn~i6!0_m0TmI=CH)_4cs zJ}j9TvM_}n%`H2W`6=I>Z#oYbsCq%$+Wh;!A9vx8FDMHWp%h#M4}x_{OBC3NwBr7G z?_+R;oV7v;AtUA=A;l_*Si2}V9&|+c@Vs@`7*D>!iSU?bB+~ty6`2%mAsWxmeR74> zcMd1aemCfNBI1P^ufV-%Ba|R4+A)Mv!Fur}l&*5jj9#TttJR8CtYid*$yhg=StUtH zM`e~JQG^CO;w*G4!6(V7kdVwL z0VbRXZVe?#T0(jYL-Df># zHFkyqenJqjbJg%|Aoq`6S^U!VmGDjsSGwO|FmN{ldh5$GJBQQ6Spb9J2M&sk_P^65{KrD2VS_O9bqv!Tx9rba zdJ5f^A&<)t_-$==dOOL#Mk( z?3`x!*g>p(a(p`BqI9xM>9TaYQ%HBJ;)g_7R4?79`)=9q zfdScp6)An;g%>#QqC^{Oxc0ErC})hqf?1vgKaCR9Xf)skP{Ia|80cS}$~`zjkOv^6 zeMXcau!vN}w)Aa6eV#&!Qiz|9pc~+EG>6jDWAnppkQV6ZGE)-`W(lbWv^Q2edoWW=%xGcS^7;F7|ZNC+9n^g`$Kof(Vi^xhCPm> z;9!}N_9t5Cw#R3|AA;;d*HhT}K5Vw^U$lkK?8EAw>^pk3^kes3XaUb?Jf`2-wPnts z^IK>8xBam6!!o}vMM|STFY_zDd)s-1-?&%Zu64Fqx>vxzOF#4JF5Bm2ei}V!@6CH+ z0mn#+@6W*ga}wNn+}IHCRbc<&dO*2_-ylAK0D8wK9qwXwX9W)nZfZQkgM;!t>Ervf zkx)HDD{GP945XFgdD{U@kXVr_Wl}7rL_Bc2!Y}M~$8}+vCvvM{qK?H!Z?n$zc%NFY zcUph91^(=Sa2QB`<@NU2@vm(BfAe$5kq(+*M;>`3i>W%Tbrf}c2SovJkt9ioHxW_2 zj*=|=2@XW9}0r|(kFCq0CULD+OI4!1l7yTi)-?r^1^(i?GE4jNws)?h z55U1#?ip0R5u)V8gCv6fJXwk(Sy)%1^p7-Usl2bq#0Q#sgo?vZ8Gv%XOxV@Ij|4dy z)ly_4sBf+=m|QH)X6qc`=#ff+V5kByteR_mht!BbMK>%JftK&eD{63?7H8y8TY{p zq^R9&wHj@2snu#FNn$NzU=yy_XssRX5N<0qD6QRfA)VC^jnMgavP*+6I8dd<@o2(i#Gn^uHZ3rUq>8qL{O%Y67sAemB_`PW!=(SE-E)XPx`iXduZ>%N zJsYh=j@DRf)q_5|g)>7ZpMCL9e*K4Sr)*nfBib41{Mhjmyj0a{)mob*$uY+qlV#B2 zGRCB+U;QUuprzyZT=tJ|RF(`tM!&ZOLQmBsjch%YVA)e?Q2u!1={L5ed@`Mvk@ZM{so6RNwhNDwY zJ@r?=`PJw)qi;ft61kEn2aOk&h#vJHu?>I8@GE%c!P&?6Qf|23`ft4U+Ii<*fEx?z zqSm~*&&+;u{x&=BX{_&0W0z;Kj*#T^kcXY4!v1fsv1>P$Q1e!crPke_F=_v#lTSap%SYwonMPN4%_m*>hSxm9Z!_CHd%Ac zT3;=a)tVMR`SH0;PdOZgP(aRXnfoF}4pdI4a4TB{=9^BDG8o!(jx(3*2v1$usJBdg zzm1gtN6x4Fi1>$fCj<%u20Hraql14ac(#l&2&Z>zYZpcF%rno-oH_IOvT4&QVp$JuzO)O*N7+RZDVx`n^#~l~qn*n&GX*xt!S{c28Zf#D$@RfD2-&hu|#QBBn`L<&s?E8 z8dCf`0LcTDfSBvWi?(-mf+c8Ws3y5=2i~z=?_x&S}|5C0fKLYXD&tt*zEu_sM7HHVkTXQQ4Mc zJcP5gmAd0$#0r?%Ae^rFelu6^eE!)M_=n>y&NNh^e9r|JT#)Cv);jQ?0@4carIc|T zpMLu3n{U4PZzwUo6WDEaN+|G+`r|PTb_OPSJv z(MQK|97WMN=bV$KX%t1D`OIemk!#tGEc2dqO_%wMw;^-EdP=HUyLrrUhyUW2KWnyl zeH&G^7pP8ae5`PrhdUjLyb5{_T2)e&XG1kbO@qac#tqxVJ0Z!}P&SOp zkl>8|cnBzC!A7WH1tG!rqL=UIHmrvw3N$p=n$XB@d$u#!8k}$5u~+xvzMsw4JGcK;3;b{3tx* z2>z|$B^qUM1tQmf{KuJ7rcAl}?z=z!@q-_H@WJi2+wP3-p23O|T;Y+^5-sNwvO^2% z#AUy>dE%*`njL?Cuk*=<^QvISIeEX7L-86pn zRd<}a!JRixbu(_gMW zrmtT{mtJ<|rI%kB>p0fYX{Y@sBr;5E@Z~w<#`H;5Py1F`@Fqt&ea?B2GRsUi)cEH+ z+xw+wfu054l?9k8gchL5;sn_4!YOh!@>NP?Q#2E^@Z%rZ?}qEAWBFqTAGz=5^`>mG zph@emGWCYbZdhr2pHSk<-~NHYBV({V@6o=rKZ%yBO<4QIg{|I-=`UU!PqMH!kJ5hV z6xzNOR^4d3b=H0O_8UpGzWwzh#>CaWsJiz-hiAIB@oH<$d+CJ_ZNJO@2OmKuKlLle zRAic{X!rd;8-%;~K&;WlMn_$@9v|Z`TEF+>-)n(?INl2STLDX5c;SUXTj9^<_aR+T zf8!e`?zGcRLWs>a+w8Q{PGdqNHSN__ zozQH*PSh~j2-Yu>s4!&9#~z*iz`YMq3B`r$Z@hJrO}ElSU-|OqzjV~UE?GRBqk>W5 zl&)2)CeQLb|KSgRSQJGFBc5@_8U6kJK_To<*&5_o94gQ^J6mw7izF&DQc|EYHht@) zldrn+R}as4oRl1CHLc5IqVIn9jG@-BxAuugAH8SR-7b+?+h20g&*!~7f7+ebeeU0m zc zyzgK9?40MHf8mKsFS~TcLyuFtxzFw&ynn{Mi?W5+{{GerfBIiN|JGl*Mz*Y^>065i zIUb98yxO@M*c`=o&OWVSU(fQ^!;j5-aONwIzxcwcE39zSj0dl|;$jl?t?z!fZ5l&) z{`gZb+&A+z93>EBmvJd})H?o34|+fMEbzBl;2(~+{+#~SpX;EtzOS!#^2sM3aKHg) zopqLu6r(DqIdP}RgHVcuw7QBYhVVC-;-UVYM4U~+zh$#_Lu%J-y-C#6X}1h?tSJ)f zZm`bhK6&7nv@X)gO*!d|lfTqQwA0R8UwP#(S6X30q-n$o8&yr#R;K*vPc97QdIEpH zTCJXS)>(fso`^H+)W+c@5+@vLYcom&xwdtr#rQGNm`i?k!4H0L8p_iUjUU(7a{i&m z9u<9H>{tV`^HB;xLH-cQ5#6UckV^CaVxK}`i7r4Xzy3& zJ=t8ac<#Jx<1IEDUmw5!jyunJ>iKuu#rOCAuyvxGto8LnP)C(St+cPU`f6*Dp(pRU zw~|bf>Dbp_elwPew5?V_h6Mw|x%snZrm8-WREGzLaT%9&Br@>oJv!gtW9Of8cHNA& zf8@af@5+0B(M1AAANIZj zT&}8Wd+l=C%q?jINJycV07_7rAT|UMRC>`*1w{n07X(ynpCSqtAQZ8peu|2UiUkWA z3?=m56CjBpA?@BfGpFqGKkwRSZf*iWqVRn`aOb(totZPI?6c0^Yp=b^`=XXm2I5eR zdyHB~D+jWu5j7_WickCS2^W0zjLo*#^2NKnqM2%a-u>~N_eeyKm@qj=dbKW@9h6T0;{{% zvvl!w;cu<$a)EKsIvYidKgIS|Ugp+WoJxTh7Cb*BqbQ-Qmt+KzMIf;&p&}t;l9>?A zqDZXGh*Afog#;-PbKbg5NMs#FZ4Cgch9_Nt^vst~mu)*lR3)Yz+p_X9cdC<@Ns=_1 z&9W@5wMwY~F~5%X*D01R$Q61Qd=nMuBb_U9;FZR4(&%U2;_8C)zxMtQe{lYzkBsf@ zd34^qp8mdU%$Q{lJaE%>*T$s1rKQUj%btXEn&&1}Nh8vcimkPcSh=dxyU8Zbiwn;G zwq;npEM|o2NRn5nj1g6QVuisv+C92?R05+CSYHWvtnMl>TQHe}g)YHD3*Ii};dGA@ z^4W?O0O((}#}2n#cjdQ#^rM%(_6>r@0{g|b=luOQL__yKaQ8KH9^P-?H)oSKUNyAx z?6bd;FlIqB>iW;tw`DJo{e_|4NT{OKT9y!%on)U^9`@yLe64>{lTYJRN$`=eCm8Ia?8q1Sij~Hy$|~!WvC3L$ZDdSr zOyYgNv%Q{rq#no2zYIF$iwL1kU}V*&6rRe8qO5I5 zNRXFJ+j7cw+iun~apLwbohd2OR%TiA{)Zk+qTU_1pYf$LzOcatz^?hr)mL5oo$vNX zX}=nK#G%L3i_ZVFozK(bg`{?Suqt2w%Dpy9dd7{J_{0CX^oS$(H$*SpYwz(JPaZpV zgEzhYbuZg(rxh!gkeB-(eCVrooq6~XZ+X$~dv5#UU3$lDc;JDr-+9JX!2^j`001BW zNklPt*Eh$`XkszKUbIWS-+6t^KT{~OwNXt^McZnCV zwKCG2Gp}X4qBt>%T-mm9)(|npq;1hwDoS-mL@NdsHhP<>jyh#A)NVDK%|JsG{99#N z#&KMmQENRlfEfdaK|46l*so?mj7>^f?FudXHoEPhhdKy=<|vk|^c()`%|mZ{yO)t8 z`rT!}5T;^u2UjJr6LiO&*FYAYBAwj((9OJXu6i2kj=Selj=VrfTG1&$!l z9>vI#cS;LbW~16-tp_yvbyNb+oCE?HM7{dMX+aMUC53g4q_~%)y=mUOcElAdWgaE* zs}Dc8O*EFA7IB$J#~$~QS>HW}v@1!2=dU?o{N`g9EqJ^j89Rzb$L~`=EE&SB6 zxYaR`d~)#HS|V`As^}NL{k<(q7593F=R%_Rk(Z zn--u72ry{Fxfop=`l%Z;`s=6!{*?rt%I^7B$3ETP1J0HZBH(W&N%9mX7mNg$EWnsj zQdr|u1YURRtPVt@;j&RS?Io`v)gfxIuPfxyYfe=Sw1a{=j(Wxu^%KQFcc)c|M5=LF zGCK1j`oY^gZ4i+og7KJDqPOqG{b$ElRA;+K?CYaPlhIV0^!bRicf0_Gy1 z%yUbjY5_GbnR*&Y9!gSM6Vq774U)_d>7c3s(CQ6wcvNHX!(IXcD|1~#9T<|*OQ8|9 zNEKO!znEeq-E(Mz662794`vXdoOfLh*ArDn@Vf<1;fO~$tYoka`-CNXxZB`mukU<~ zFC)${`f*eOFEj~2W$|c*_Hv$tDPhXj z`W8t5u>gs+Q-VZ9z=#?V)q28c#r53CvB@G2W!Nti=`*;smP&b3YAI#Pn#oe4*fS-R ziW4X?DXWsAI5Dmgf#(udRbs&!hfH}1p3CqA8Sk`~ykeypG$$9Gvs~BE`|Hwy-R)~= z)9&-c8Tf~_eyts)%!E7gD)q_28{3890S|8&v2A1rs3R-gj?q>1+;f6rA9l3 zKKuns{_x`cM_!`)L;cQI47K?z&yhdZV374CN3^ZJ)`+XrH_S(~jCgkAtf0_JzG41l zB#l3WQ`Pc8mbL;SjbsqDt_gLqlPy2^;;cq?Z381c= zldwJPiSIc{MY1XlXvKg5!Io8xagdSPoM>C3&B#wB+JfBl51nup`OTf#kmO{dDb(1U zXri?lQmCj!*3`9u#B%_lLB(j`QX3iVI&kCIqIR5&FHAv#`Y>Je4s0YkyA zHKrsQMwXAFC;*9ty9;4c=Z%*gFLSuLYOW4N0Q7=m+AD59>6m&XrKBU0&I8B76o3e0 zYNEiV2HtB#CUCEz^D!B=l<1o zY!$I5?Zm*)+uwB5gsognJa4X?9gCg=XAA(oA28QctvfIQ{|7#j8S!sq&9y#pwof|~8BY3yDfg#&{@6Rt^IxnH+~@1xtKT1RtI zVQ3DYw(dM=59XcK*d_Hob$j@mLzfF_iQTD!W3J4_9>LcS?(NqCLM9FO_WEu)y2N+6dPMMLSIcMk2?Y^%$+IxihAkeW zX|-ra+{IIWWP>r>dw0h*;h#bdH-4+@9azZH6$@Kt4^D1}|bT};Wy6opoiuPM6uJYh{B0N5H#wmMMgL9fOm-wG_! zR$J?VOK~lc;anq9LA&b%994JyZma9}uoapJNe%VNB(!s_Jx9NeO5lYj0UjU9I(U(T zGX(1~*iOP*GTxC^mMWDdm;C&)uY08ukrLUwMQI%M_1|&-T;R>4rZLR>-QnpRMo#`jTY>%uE`=8rzhA(Pn2wZo~~`Mw#3)9eeL~%&L5$rVWA;DG2*ql{h=|# z9e`UEetlvCF;QSETC&C&!r|znK-tE1>KO#ij1ev27C>V4wyy11x2!vNgx$hPx-P5t88&^+5*ihe95F>WuGjw;wd%cmbvBnecUbQ|OWWdL9`vF3Z*BY(w z9`WzKj~t~V&+$ZKtLtDKxz{uOd42J>)_Z@ckn+w#J@Lf%u<0Jax}dXyY+(%xILtPf zICjdk3HY13(UhqhPM$V#@{|pxOq)1m>cmZ^k1wi~q>LbAO*@K7NK;lrQc~^UTJue7 zog|4;Dx{_b!fal9N#OtphVIVeK*3ny)mA8fVQnmg$DdcRYKj62G0F=`(vVh34**xe z27){U#;dMR#YpgMRUL4ln5|%;j-mWF75o7ehzN$zVAMCnrb~n$fjC8*S((?1_F$B-n zaD*Yi40W|E?v(M*EQx|dRf`X48d$kvbqn2C1yzX5R)`$jXv6cbB#mk+2bRkx=r>eB z1x*Uchhre>TD1mcTpKg>8-C)SyK@1P_>Mea_3`zC;@*MJ!PE#yZro?W4p7L9o?Y*c zytLs<<7xn3`RAdl3Sr18MD1YSVE>Z_J>Y{cG@72e9DR>$PPS`b8VSM({f1?t3p-BL9STL}Ho{^jm zA!REsvNVZRgc;pdBr*3OR^(k0NA;v50N5f(N2~)_blnjeW=$T|7?{B=jsFr_t2=99 z432O@Jimos%bD{!q?7?^2s)7GYDU;$!N3fHo(f)!Xm!;Ptf(O0U<22*wrmYxria4R zypba!tPpEW$&#%#(Tdh9BarM(2d6KRM4mx~LS!(!-u13`Ir!=k|65nn9Ewla2_@w5 z?>aH~jDt@K{fi~4pq5-wc90!U1^EI)H>6Hc<$dLWmY2t{Qmi1CB`KS2NPF$JW$pJU zisCpHLNFW`NEPu2;X&$-mti9sZQ!m5YlVGGf-zi$;uv5>af~Rp2U|AR78uS+0ET{j z*Y&BwatKQV%PR$FVIFGSu_FiL9U)ejZDHi_?c-m41~&6+b;K%x59qqh>L5Dy_s9+4 z^?F!Bh5m|0h91l(u3IV{amR%L1x7 zXOWE%DSw0qpgToj!?0n^zXm&yKZXnA9{E0b+cW)dWJA_I_wcw~`-f-h`}*Q<{X6@! z`f=V}c+o6&LrUX9fv>Zy^4JsO(m3KmKI75-x@#ivEn1Is)H2pYMNTA*afSyeR#6z; zPx1;yi$zfk+kzpT3kkFy3n|!L`0GB`5o@1XwqXYaFSC<^lIEB&V zp>45L!%78DtyZ)neXZCYe&w8mFpl~9p_}nNLsx~BA6tK+--T?#x}#u#VQ|)ixL%ip z!|JEchwQ- zlu%2AMRPr)a#W#C(5mNH90p6GmTs+MyLz%#f(W!>wO)V4dp8!wnlP-_pU~>=?)*bn z^>g!{M00kVjh&(1M;r`?S@_DW#mxi-%r?r%%XSSxoWFZQwo$qg2s?Lw>h=(}if{$= znAHXxU$fipVE1(WVfZOXvv#Kqw}K~&;cubY_zLHT#UG!L4YJ|A!iNzOu5ZtwLO+Ol zb*qMZHs3|)?%igwXzIHgZn#4Lx$C3}ans>*)J>?L{#p(C&%Um{^>v-6>p@x9@Bi`k z^~K*>-~A;C281Q45uqoAK)AOs%dj+2Y~JyXsDIWt zzy{ar$YI=7#-JJtH&R=Jc&mM}^$j8nkChOE<8%HQ)_gGMx|LMJi-zu5heb2`VN?Py zBnk92dxDAy!3u?u?o$$-s-P& zSRKeFK^ZvvKcK0?B9?6}cpJkO?9Lbv!0}n_UkQ?g4&(@1c*yJuf;|T{&QF9x8rTO{ z=^}K5sW%+UpV@lg*~HgnkM)cn_JjrwEWcbx6`tGFM9^^faU$!_>os(iII$Op<7k*Ul%Ln`L-T;&2K;N#MTXwFF#ep%J)7 zaJcd(m~{314qrWds4dI-uCde)2{SH8DOkmv#?m#aIJO>UE|iINU5_EU$|l!{DJd9R zn2XUuE@g4-S01*v*J{uDf2}*=(>m~3x3|zKIiB}4@wfhs{WVhNQFM6DxnC=bDoSjNH$wPElAtC736c^^P`J2izbS@WoK&6VRFx!MncFn!@u+95cmS^MLc>CJ z&ITJxYt7+77+T%|JO|fBOrbV|IGIb`dFS02PMqz?p=@cn_bVz$7(@#U{bTkG?>q5W zfppr??HsSe_?qZPXnD5*o|i8FpNEPl$UI z>;UI$tR5U|_uvtY=pH-zJ}QA1ssx0R5!bSHoeE6qfKirVvB%>G>p6S^>#8TzBMX-# z5s{5JP1AcMC*y_ml&&N(@E9l+u^1l4@Buh4U_R8g7sh;@(Z%Dmd+hV>J!EbK|5ly6 zfn{=i(~w5j*kI=t9FAOn$N4%V){| zD`CF&utE+kSmPmt7S)B0!;f|Kqrp7Dn}hDf58dPI({_JFuLx%g2GZ(t)Sp=458E^& zcIHmU;a1)=Od&`z9CrV}C=C(GZps^*T!P(%!DY(LKz5CC$hl$RgyvvnAG#@WY1n2| zY#fCtDcnxDb$0sJ%?)qih~ep}{tb7C1pn0op*yjybuhl7sr(u?l=<7pr&3#xp`7?3b#KCX>E))_H)P2R;hiUP$c-BP=vENI_7Ad;{sIL@hI4%5r}~hNjJ- zf>G9p4|#+C@*^Gw%q-hgP!DThMDU?v#Hs9Rnbz@yf1PR`51 z)+Sd4AY?2V11DGk5IjRn2g}J0hOv#Xi(x`p4AgO-1yluE$(TlL z%CkPN69RM4+>v#-eRee&{J@xD$h`H1cLiD=kiT$VcosOlxSkXw;7V#>Fza~s2w8Fb zA86w^KcE(-eXtm|oCw+>7j>Qk1K3S$c4rIUrzR zhWAvKhRr_6tG;+yuPlnZ6Z$@;(;yWujj_Q6hzfI=k36}8`&eC6Vm0tFfJ5)R_CgnB6@$7OFH>1~-AR^ZVJn*j zvPE=3t4Nl4r6Z+Iys@l)RlGO1OJ3Q&ctQ{+?#-*J_u1ap6w{u`>a zmGBfJbYO>5tBs?waNzSWMzbRfas_Ee73rvxcY?zP4GKV?p~U%7S~v%sS2|XL8AA;00-gZ4 zHSJC?m-51B4nTPC**OXim4%^VtVf*$`jG*@ffPmq%m}Av=vGM})VS7dY=vze%?(!g5Pl{2WN3K5nH*(^xffmI}<y6&hOvfa zKcxjMGf6^NQ^70(W*qWha67RMCMJHCn6?~Dzk}zW)*Zh`6CzzR9CncDS`C4@q zM6l10L8BFd$Cjn)J8gy39#T;}e4El!X?(ka5h*kcwT9Rq_tgFC>HgYkwVZQ3Jw3sI zksRj=2qq&>v4*}F`NK2ydA;$plnUADM0COlCj`ueb%CRXMh-{xKk)t!64A*YKUqro z?i1ckMDKgw`_Q@J=HU*KBy8Xs5-3O{Q311x@mf|bc}xoX*rRuoTV<;@AR&BdVT`Z$ zi!n)IBh|SAJn9`$-Y(FmIxWiEx0F>d_DXMCk- zm4jih z+F{kKqBzr%OP>U_+sGXSyHS#06_n>nXcEF;A#P%&EQ~kKI1LL8*61PEe!WFAdcddz zo=*~}*YOAkRCkOO<4BH>(47CEnq5-l?z zZLkGE%H@=Mt)ze*!f7N(>nIspAWmeJcd&G|WQ?zj6>)?}qj$|TL!qgIMOzuN&QlI9 z-=vu!4(Q32P{AAluz=%s-c&Z$8b%)=?Ui*Ud7EWD(AL6tIzxylD|m)v5*tprFUtl=L!YMbL3ume4HvWTrb z77tP8DXlD}v848LGHvS=%pthYtP<9FV;%EDDJ2ycOMt>&<>cWY%3-%fG025mM1=-` z39L83{E9C0yD+9&Np^@A4;Ce04()&i?BJG-wea4+9IhPsDos&RDuhHOnBg>KN!C@Q zEJe7!b#OW=L2;azyhF}aR%o4REIfE}gQpchTS%-{l32YvvG|ccjlRAlBdsq?hBIS1?OK-6va8`p4)D^d73ZCbS=_Qe}s_uBnlzu&80`|2obBw52TN~$Aw>8~%}|KNjY zaB$}I&6@pVk|<84`243nQ5hL$O)3Cq!S*zBPDUx^`E6Ivj^+4W_dZ~#HRNm=N4)rT zJSf>aC6z4NZ6eAVh%mNWtG3(b#n=DiHc~M;KbXVi_2Kuu=QF2$oWM5{UYraDo<~j} zL3gVc+v^g@==MD6Ztbk?H6r2y|KYqp&O~_z2dUVTUERC<)%}%=uO8& z65)qSfA$*{QPt_JSp4|dF=KSn>}~Y!y2~Dg1w@UI5-xciVVsra4Ojg|MoE^WW5#d3 zd`bIf-}`=_8n2Z~k~GemN!)+%VMnf?wi?;u=jvz2ggvIR`jDfKjiX2lF>{yQSF}rx zdpPPWd+GL@En2!fM;RzsL1@Lw9j8vyI_}NJj_aE|_u5;cEQL9wDAFR*D!5X7Rk_N* ztWY#GR74TTd;#18GftWcJ{HB3X*;h-C>T1AD=gW!Nd(VyZ6q!X!+wax7d8n+?(N;L$uDj zs!&|XMMOzV99Kk)Ixj+44=Z{iy6~b|haP+g>RJIkq;rmeB#O#TYwk^VG}Cd-IQsNy zpT?pbRkYD5C!eOHsL?lO&YWvM_>qsE`svRB6}0NSWX87hmMkwqpwtwfJoS`R^=C55 zWTa&pC1XDKnKNUJ1$ka{bSxi!1}XvE7oDk9DZr zc+zHLdpBsPw6C{$-Q2r79ipn5Ib-_+4?G-xM$$r{W@6WExBJ`dn<}DqZbXFj$?Bl) zf876rTdOFFIF6N4T&Tw(wKdQDtlL}9HvX2aOgE%RpZw$}3Eb2e2iDmL5ix2sdfE6P z&EajhaNxuQwkZCi$6>5UFB|>+7Up>_g#{WtJj?6ro(~A3s9}MBEBp_>R%=C7(a_58 zp7N3Z`RE5OIrU?ducTsmq&mL!_!Xy}`rY@wmsYGGTOb^?001BWNkllyhnN16q9~T)k5^r@xKnz&{L=58`=-O+f*3V-U_~A4huWmQ&!|(p z`{*}+>(ZZIdG&9yWQ^7W`>v~QxV=^9=OPG?$;I+|f(5s}0$Q{CjeZ-Iz;jswSX@DcVx;p(@FDBR z5k-m5tKVJo_s3oPhS}G@`-r!#7+Tp9Hfi=>_2)UJ^0vs|c=!QExW^xUY>yZ3dBvY+ z51Cfc9(?2LU$<;%Ig0B%X%#E*n7O6*-uu=gk6yfN`Quf2>#f&acg^1qefx0()lgXt ztsGo2=ep~>j?O)2R+sJTxh&H4YkNgBu;9Tv#%{RvYxjR^=_=#$pZ(-#*I##Ifg3NomvIVoOofP4GSKOS{E*%>Dk?ILol=}I1t$k!hFqi)-v;mkru#Spq&tF@Rwq%- zEW?49SSwSSTjt(sZQ)$?g)g45$<$4jKK9Uz7i~uw7RpX1W$0&8NF90b$WdWDGRPv~ zfo`28X$+@Nj7ZtNcRzU9rN92+CEr2V!g4CFl57#STxaOW<4(Ks>O0C6kNp0}U%&Z| z8%jaPzw<+h>T|wYF|c&kJ@)wA=g)ZX&WEnM`Z|*Kz&9Rn)z!BkH%mBD?)1-}k^6S1 zwS3Dd8_&7%wxMF>Cr|lUaH~d1W{IY5w)y-;OLyFLS8}eQWR_(lsl@6*=qN*BAh3Vo zmNdRhbORY&a3Nv^UwSO;l}d?x4??jBKXHw3#-)x3apo2EWMJwe=ajcjRF-I?$(#N4 zFaKz_mVD=%-+0gaKY;0dWxG!$k1bvF{Y!s^%(Y6=&?=h`^!AOjL`kN34nt+-`gON; z@9jO(zJ-97&pB5iA0R4!Ttm8}Cj$>JKEPg(T$xC~aDe*&nm}d04V8xYoiq|Esj_%E1d7AX>$voj zZU$T)=Q`DrWq5YjH_l*lq~Ct>N00i%$9sxZKls$i!L0>54BPA@pP?kpIO43=Ya7b+Pl_V8sO=G;_wc5b)l@w)dPFDEP`%e1G zSzjM6qa2N$5c*eTylge{+VhBqaN~`}F^~QK*V20C8)wZ2-uJ!>F1+Zi#~e@; zISIGbrjuX2=k7_Uyq9$B@yGr0vR|Xl6Di=1T6xtjEQbUB>&U}gk>7sb9R)c!wit9; zM{&g&;_wu8xuX$_a2=;a4m(a$Nl7EAsIrAq7TH-sqb>;nlhVYIcG4SRkxiu|WSCP4 zfNidLPzYU8ha;5?9b(HW@9*g!SUG45L_s@ciRyW1bVy5ip1=_&0$VV7$~&bH@Wxr^ zV6HHfC^Ft*qdQY}Zn*Z&J$HXi(ul}+;21*?lPk~34-T!EwBbhEZnZ7N*_#e{{att6 zR20R)VE*w_K8<2M6?GgXY4nlzoH*<3uTUJn`5o`P{8v{Xr4UoF)KL%S#Ik522B`~A zaYRZXOT{1%sKJ)QInqSF7+Nu~YFR1?DJ|Ums$_CVB=aaOnpl-+Nv0r?gV}{y7Ai1? z>sTat)iQ$Ed4j7WvxwmBwZ>sKSClC5ofNKIzM^G}r$ilc$bpY7U2^wbk5FT5HQ0I2 zN$>vVcfYl=O-f0MRWnhY5^0hlyR0-%&W!x;bx|qh(9l5eY^7;xjESPC(P*r7w*L)# zYna#hq?1nK2WOrlA1m;ZhWz)ZvwygsBuR>*`p}0yYz?Y)(l|vGA_uuWV{VX+v{an8 zsL3K{9IFEWaj}QfYvB^IGUCj7NKI!_#8H&3C9kLR71fGiy&K9Q*vkcvbD5JXe{sr3 z=6veZUX$CEOGs6T>hw0Dc*phjOGdztg>#(_N8?i(%zyv0%Z_;Cfwm%wGwH)cx@(bO5(dGkqspL=~F6H}42cCW3sTDWxKzPs*m>^n}P zqP5ZFjRqedXcsW*jPPJ}2(feSINjLk(~-*PKBE$N9!g*h|8BR?5YFu+lGgVyKFrm( z-V7g6j;=gHnm3jk+Wq{4q9nSDz@9= zMJK%T!_B@;9$%FYEL|~m?6_1XO39!6^v{@|^MM8P@7`eAq^#M0#)rPN%Qm}Sb<^Kg z(u$Y9c*Y5DdvBtrE?GgRp7!yk>dDgRkb@6(R28mx$u_%Pe#tNUdK)Tfe(SrJee2?% z_eM!7qmQ3{CKko$I+!6MrH2LwCyX7ZBF#a|c-4^Ee#Tz6&$*e34mK$Og4}iIeOpYP zoN6^~%9O>67aLa|a>N^&u}bvBpZ)Bw=rpnts;y)C?d7vy_v*u{p%sT8zTau5pH>uf z&EM{y`Qq2KI;MYvahr{`i|@OU?3l~`c*{Zizv}jD{;+7#!ku>6Q_Fbg-S+4>kdtgW zp{Kp{pVlWEZLy;$^Bb?ZpL9%~y=R`N(>Cqgfcb?^I^no6iAv)5phJ(SC|=$+FPZuB z`>(m1T+!E%JsE_z&%XOeDReaMvdex$)TVsZp>I4)i@v7Za@?gy@g?*RN&+}_uO-fqR<*(q-(WfYjTw=%?)Mgin5)ngeW89dr)!1eC<{|c+UgVrcFsB zqO$O&>S?BkVMHks3Q?JBC?DK^zy1FFr$6O+`Mcl$`I{Gi|8KY7zWFAb{`rRMPe1tt zqVmkIe0jjE7#JA3`@#9wUAus)A`{-}2(iejN>D@{wT(*Brk2s{J8$1^>Sn+D`|R(0 z`&?>f8&2AI<>QZ+gSZ*y*X6rnu*Faf5aK5zAK&QbQ3`U_vU_0F66(;ioKOkV7|*DfO2WWvO0%N9M{&}xgVw~rbbIr{MrzL$tb zUt{Arb8kYH02fvPD4a!++V_9?^KAT>9k$(C*{T>Srf;(8Kx;viik)Y^?7Ugu&8yaf^Y45A2Tq)O z?d{~mey`f+%U}8GVBXnr+b!lldX8X!=?nk;g_c>>87yzR?Y3)g znj?f*HJE?ptaBDGo>||_m2C%apA?*mixS7&(D709Fnxj^i7v7Uik2mRhHz(-gC^=fB1!w zWOZ!uCMn6r_BP9^UpT$AO9rdruDkBL?jH})K;Fz6QS4e( z`MQ1g{rg|9DxJOT*H>Kdt?$(?sj?#HdYgT1hK-QInKCDz{osec=;>*^WalkHf)MHG zv`>BVyWhR=mYeUPvWydCoxxjC4-;wNMO?r6ou66gh;`NwPxkJj3orQ5_rG`XMYCp| z_x0~w{7qMtTI&S$d277>-HWYpl7I1Kz3{X!uR{uOygx1cEnJ-4m5$!`o)0kPjR6X} zaK`3Yso=vU$miG%A4? zk_1B32YHR4-eYYFTx^RZ$FxUZHFx%P58QL>jkhgZ+>#)EkZIKSx8Ggk?1Dv)-7|jU ziLr?9yYs%G7L`7G^D)Qyl@ISYrRn3e9mps+`NkssXAJrDvde$8@V@KbbNul?`^n`< zY#}=GN&l-Kk02OTKrE*DC<^@zH=`6R--X)w;gxc zbjtKMyy=Z3{mhrn++yNJi|=}nX~*HNv6WLj8~o*OH@C{dyH#&J>UG|%h@xh@r3g9T zS=nB?YT44okNtDkSG+um;+OCJsvB>*b^5f;{`99m{r49?j|`Lm?aDkUgdkmp(2kE~ zlK$u$pWAB6h9`aYGdpy^Sna z9(CZWZ@&E=tiz4icFP&_A6ssS_I&ZAdvE#kq86g%?aZh zV;{Z$K__jgD%DI%#CL?CII_uR8*g#t6@U8dXTAUWKT^)yTC8jVDS9wJ$ zt;m>S$!qrAGmAHR?}yI3;-S>Fu{vuLh6mUmz49)V_J4lxtxJD&(Jy}TEpi2lR}GLXR~Ibvb)I#6d24OJmtPBi zYh5A5_1&MbMyWCY_V~uRUn5UNktc}Wd(DLpmQYrzmE30cmy;Y|yxn13w2*7X9!0M} z!ciqKQQ(#Lkrz6SOIxC%@Ch%@!vK+Xunq$C>lOa?yG3|I|C3SJuff{k>&DSr!o`jpq3N zX7cF#c@rjY3c4;~gy{@*+JNc;P7~$^&dcV?I9W`bHtE7|ee1_RzVyupzx>A+Uv&S% zMc@4CM)?f&l--SpjXH_SI^yPmzVpfL1OtE z58D3|U;5$uKfa4KIbcO1lEQLHK9P#lZE2@$ro&eHj z+HNghxMazpM<2al;Xfyg+33il-wcW>kq)*8lSabXWIC35i|OMARxSVL#oy`4#((EK z7rpVt(<2r4^z`H<^)V{hiUkV}JN&2xk3HHLyUDSKpA@H>dV2;32bDy;x38yn-aYfg zxL%X0P&8m1B|vnjbew3N#>fGy{&wY`cYOH{Z3_dtY!3qOC{2gjMMSjQE<4ULLzjR5 z5|w0S32y}!L$2~Z(d)T92}^()mA+dH4BL{t5+V*<2F$-LypMInrTlA*#%JBX^=#vB z2}uQfcaYo%-~VB9lqOj>J&Rzy5m>6RT*AEu;-|2P8u`B>*MZTKG@X~6^``SG@8qoj zPVvP55x+u70!9tnWX{;wxd>JlKbo543=umoQi_{Ec!(0}A4f@(`Zg>mqn=`G3DW?M{s@S#T=aZH0PrG;=sOf=Lod%o;7XMg#Osgrwqr*5Ph zjkCUX9^h3%crTW!k+p^f5~2qmexx~eY=2Mh%U3K-dQys&OLR|j0=kLmEP3R?aT{$C_Y)Go0<=j;O2a)fRQ3x*yRR{7 zM!$?o01^PWd0;JM`0ZMmVnKq^oV0gr+r|aaJC54_r{DhSwKv>S=-$Ftc{Pw=U9C$R zlaAl`^iw}@z$~8{gU&)-T>n&d+{0Z_?gK@`9FHRg6p7blQAe37*8CefcgdqsOtVPzn-KlJ@s?{ z{qFyI+hv#j&H(j5+&h2X&#(CH-0N=MW0yTw4s=9<8ToA|9RG*kUJ=9VQ`sVyov186a_2puw+cr-nYPii-qc)o_3w+7oyQgq%)02(eGWLNcjM@uhpzkm6~7aLe*TL; z+%$g?r5adiLP!-kSKagA-BY*TIvq3a(FF_V%$Z}Y)mnEttr*2k08+QWWHN#H1Y{(_ zF-akaKpLvi6KmUP^V&Qjt1{K}rUMjip|Z5EsheXPV-u-oo%=N+mw;>+6O5$zxOX0V z&Nsex=bd-5$1jo8QSkrzDSELb;PDyyySPk{fmQ- zsOOTO{(8IJU$XP=TQ9l$%K3AzAxWox?h8j9yq_YP_t?U0!wn}i;taq^{)7*n^oPqY zO^CDCeMylTEc4#p=)wDLPkXc8@#7ag^4RRZ{jHhwRIW-r*`W^bx8O<=SUM0Lcib^& zo_o#%^B)>JefoAYb~xkHpX-kR>~9r4y7cj}6DKPbJ+@@|@2~pv%BrBM%KFAdx-o6a zbRpE)U;Rp!0DOb9@hOoEJ{QSW(P2TmRLoL`)K-mH&( z;3EqVN}yr~mlH5iMFZI1tX{1(5rh?2k}=x#sIxx3{2``1LH|Z+Y@@ z6kCptef1k>l_ly7jRT#cF@~)@c&1I+e&B{VkKXW)`8QlM?}lq0ntSa-H_Ulx?wkka z&c5%4*$><>`{C>UzToETiIjtdM%GqZ%e2t|*W#1CthFV-EJOSTFBd!Q5Ml`YiSRx0 z11FMK&$)iq#ozzlr9Zvz;YVFzDQa|b@=sDB0}i4|aan<-cZ+8vQmZfftqphIJ~V z?=cp)Kz#A>!A>Jez_ColsUQEydr$h%;80Og`O>{-COVQro&NbVDxyQ)a>$i`{Nb(4= zyKI;=Qr#z1-%Zvm1Ofe%fSP*xRLuc$hC zoHc*-i=Ui$!ZG8=joEzD&91!i%AWoPjT!foU;N_DM;w&t-dpatbE~blG+f0VH+9># zg;cNH`?WevvflK-HyyCujIFXbb5+@BP+qPgl3AlSPJLMoa+pmM@E?#8>wx4Q8)J*k zfKnCi7e+-&K<6nzha+j(${|P%P?3<) zCr&;2m}A~XN%Vu?{OZS-elLl~_B6(S=X*ccarfOen6k;n6E-^N4F~S9{kHvMdq~i- zR*Nd%5b0m8`s;>9+@-Q~b}%2{`ctMb@TUYcQUpW$nW!uwlpy`Ly`&Pyr0D}QjwH#gdF+-WC&1UrS41n&9_RsqP5;e(&f zhk(Bo_I%g7-gUtR7d){MBhRzG`+I<=mqM#ZM7HB}BEd-j5Cl#*S5ZirSG0WoP2Zh9 zy$|{F+^>PW1)O1k-wHC3_m4i(p7N5n5RJR>_S=i1h)8M`C^|+qu>P!66hewyZn^{L=BqAJ36f=cM??1s9zB(T|0U@*pn|OL(swedpWX?#p@)I_MxTq)OC<7hkMM zWJ*=0IO^D=g{IWU7tNY={PD*jxLg&B7q2|vtsni(?=IUYEeO!leHF4q$rM!*N3er1 zXuVgmVhV~EmxF8C~?97H=-!KYxoSoX3-%bTO|^> zV%a+UzyscW`Z+JzZF^o`80}HYP7)MZ9zhITGW5bHkMNk@k*? zs-2`!?u?h2a+Fkqq@LIYE?OIVZGtPUnKsc%|&5q+9dn?Y7JAzrXeN4K|(xcpX9Bc2X5)VQGz# zT645eNF%j`my)EfENKKInLxlN?4-k8!jGjjIlzm05unyBS?xW8e%Tf&pNovNO1u@$ zkdjqdMR5uSpIY@+l`mqU6a`RJKX2ZBZ-4vS|8~{2TgiwG# zL&mf9UaAP>L#3e@hBX3G6~)>C(!P`=Op*B(RpY1+gjg2k5ZrN?cet``1-F=FGmA+Z znnqLGz*^Jfs!o-q$@@MhGQ^Htf(7QlcxAEs_ngsIT=vgW%_ipjZV@e53{jms8~}AE=axlyt@lxP71G z#cnMh(zfu7Ii4759~g3L^=JsoU#6P}pu(}oz2nxKZaHVxc^izI@YvF&uRrjBZD(M$ zbjKaH{QT#a9dgLQmC0er#h@=Ftv1?t%-fE5%ZbOn_j^D1l4e515Ecf7mIFIilr{NI zV9_a(d12BhCV_0kc2Ptzxzg%L>WC`Sj&xia8OIqstHy~)dQa_E+3e{BeUJ6Qr+1Tan&5N_paN6b`{)YjI9wAOIIYL##UDnqwg<72?zvEFcZ{S9nb{`T3{LHd?P^w z%o?QUFa(lE1S;ZPN*|}*fD|Ss53--ac;KUZFI=_5=9}KJcoEz;6!$j!ZoT`iNgHoK zR7S8!SSiJs=W&e-Yv?i%$^;^q=k#+3CKs!fU~Gj&-ILrC6p^sjhx}mh6C&3N@`z=u zqOcGJihF5&tmIyM?y=XNdr-BKk~9@;2jD7_JfH-;s=)c|eGGIo5C}4&JkF2p!O?~=jHH-d zG{#ym9V(3yw#wvDtQjIwOXTf(7|t-w9qCwWHROCG1$qhGBC;&YC{7FGr3M^Uj9g)O z2CK>{={MbU%74A}=!4#L*e@>oB~aq?LT5Z5DG_T8ymy>O7Ogz)Nm+{8S5_p-+m2S% zXHNT6t5v*wubB{~@m?m8kgwQluUG83ce`*IB6o>5c@ifTS>-@aBx14_fB;bxbt(s( zNF}_j$V)Ahqbg$1G8KtZpa#H_5hOFDD#M}$FePFv!ZXS|h#G~7q6Q@3JaCJUJy!ya zOT*IuoI1|^s+?=c#^B&!Z%=Q;v~(a#DXrFuQk@Cv6fREK3AYz4_9ban6jfeTY1V5PFhi}m{CRStXT7fX)H@3yhAF5|I_acy&pr1k zjICg}tk?eFDi=O4%4X6G1X9jBDRfAnBIk7+QoT*2iOLr9DApB(pg9+gz$94up(4_P zbPTnKHdj_e5;=Rr;es`8)O!(dE6TF0szeA8$8abW&d2~b5fldltfJo{crTqRwbV0b zZa;J8_6T1qBuD1$PSS{W*l9->(IuDsh)mTpW*kwJw~I7|26^wX2fzER2Mg&O70wr$ zL)g54_E94yVOpI$&3c@3k)$-$olcR&iSpE&fa*)t*Qxlv=m{X9ti?Ll7)jqi?x`v!azl=)Y`7D7j%AsN~ zDzL`KBrcqaWWdjaH(193Qi}{?3`$~&E@DBxj1*inz~445jTq2egZ1t9`45$mFcc>M zB!~N>f#_MoqQMDE34JA58ZJ?AC$%-g&GPotNt z;2n%c7QXrH>7SB~an4enn>5Q%gkHxqqynfMX)lD#jI*&+xPDavQ8ZEmRUSvFh@{2J zAEr{G!GG<_3T_?=m~jJ8Zb{ZiS4r5KN|cHBRz$dp@hA|9;+PqcsNJb_tRn!d7Vs|w zu5l#tv70H0GwviwZ*O>}NW`-aY}is(1`DAEvc0GP2yKKIZGln)78+c6{2?6r^#89J z(czRKhVoR#y4Fx3qjZ2b7~WhY z|KM24lFV2W3FhoUi3%zQy>%egbR;B{6qr3>*E@DavEdB26!<)a08AcI8#xLvdE{GQY5AIB|0dWPaP;7HM$*e zrU9-6Rk`gpGhV#?&RD0io=D*0;wBl2BC0G9c$MJcj~>nrI@HX>X@*p-NNP}~R#lv3 z&Uy*WA)J@SyM*zSt#OHta$_T{T!keZAljq?_bLFd1(%;AN~pXct)2BuD27&`-F!Q& z0okD%v^#4z{$=#vs03bU5`Z>mKp!lw4V)4o-@@6l)G;V|0Wcp?t8B+{s=!suhX|_L zov0zLah{oAG^XO922jvX5@}14DiF9Jmxr~56)3?&d6kt4xRh{gzPmB@(FNG>iB>}QnfgDo6G}meBT_H$DI25*3*3$!{55a8YStDGh ze4~-JJ2;PSXjc`I*oMR0V8L+|9t6_UmGzA08{vy5pG3fhtbCOUg}k6RuF4{cW5vXJ zR8^FMi`#h9PzdB<2*fES9)i;e1(G~%g11|PBRpxsD>zt{%_PA?sh#B4dB`Bf8D@l|yR%z6;1+to$(}MO|AN(yr;;uXIy6W#&@qy?!!(gfiBM!f$ z0%4+OzG}zz1-N~f;0AGVtP>-pz{wy0&}s}g*rn9Lkb2_(0Gb~-lA;KrbB-4{Tn@^J z5Ue0rhlX}AZ8jPtgaRo61K)$17PJIPd7WwW*W6ZK0`s^Yne1#e1KyqV`9aF1!>I=5HnTOh)5(A zB2`W!DA`pP44}k$mB_x~fE5_>BI~VErHtT36R~tAM#g4`r~_Y#fY~up;XNmxNk~az zbvbNo$&itTbusSAfi%Z4mmv&`PgN>0SO|s? zkupNM2BQZlT+7k_WA8n{C9A6J@qN+_72fMa2fFD%XqqS>AQB`fhQDbT)0jscQIcT> z%vlEmMrdh7Q2(Q2LNUUVZh| zt5YW845}QCLsu3kSqj+6hRGmmQcG8-n?3hlY##(VQDX3 zMgYj5p`wr?$Au8sE+{xoAVnU6qr_2zmkUB_Ol6)Uhdb8?eU34L@1;Xy=yj^txg-J&x2MFw|5L1|i`U*IHHH;xC%4?Lwp; z%~LSJFnZRclM+={dF_leN#r!dJlE1m=Ki9XBszHT4iY8_>Vica_8==vd@x~wCzA!> zJmJo+5JrjYO}HC)Iga^2k+ZIlD1J!RdadA+D!XlPO|`NRTk@WZj{z7ku_q|Zw!FL{ zk78a{vs=Dvd5YjA8rd$93t&W`Y;S+|eVm&<&YS!ie?VxA`#hIM$yRn%VwVDZZ}z1`f(y`A=#^*=sDId3)#3W&s4mA)Mxfp< z954zjTLdh*>a;~_1x9s~WL4!nKnt!<3ea#Pq(B}RP@;)=GFS(-!~lpM1&};gG$uyH z;3_35g$uX@34OQ_5oSF3fHPpg3sFxT!EtH_WR;=@BMDW-(v)1x3MuS`BUUAKz=lW+ zaq&U|m0b^&SJ2F(#s^<4r+9c7I<_mxr?_X(>;#l`(36iC#bN4dE7Ffp%~|NVn7DiP3GwEl-?s$|;K% zFZSL)99cdFA7k-EA+~G#;QTXBIPscmue$f{d#>raV^26P=2337dF;TzS`4###4dIk zqwNNc^2fEIC)p+HO1ORjwlR*Pm*3B1WTP0zII_Ic8!Y{haKiv<7PjPg*BRIIb@(@Wxd|kwfApY6NmJ zS@aX)E`j;fbLS%#OUSI_+s6k*+(A*w&K``g5U9suRXMQZl{c_4`@MXYh%Si{ZxbPn z7AjZ;<_gAVKqZ_!g2|poa4e>AbSZ^IDFQjI zxU-JxO%hfHEkum+j_u@;-vAl))oV$~fDofN*d$d+-fNoio z27W%@ZrijDhaV?O#3&$6ECXAu3K9WwA(9L|fkz4g0}OpvBL}40t^$C_98%hDa<*lBJGvDEju{|w_uBcOwC(X!eROa-w2X)&YKWZhQXP1S>FpejAq`htB#cRj3PnzjbP(a- z^B1NntrS|Dl+e5dLChZ!R&W+$iu{8o9i9ZEk_2CM1Y2kUV~wh34NTJU_ViJ~n3=Zc zO~iH&xn-nr@mDx1dD-*LZQXjOcK^-t&&Hocp=AyzR}T zbS{~{iR2Ba!AQp`9_(d;ehQXgJurvsa8fAMtRY7U{@8?Fzd_Y%I3onyWf0)=!efn# z>K2qpC%I}hDkNyt>jc4o1c4ypa8=Z6kb!}Zs~6kgQrV#(*L76uvAwq6KoeU|Sl|g| z0UjL!FZ^*`1}+JQkiJ&NA`1t!t!}5C*XtbBsq)0Y)6sV?1x=Tohy zvOxw?#z+%M0_fgO{zoQec4iIPEiRh|_Icog&wuKW4HA1oJLX7Q9}-yV1kM%kPL=NN9|t z9!pSTm{x_rp=Xx8LRlGCc7~H=fFQnOlN@Aq92XOMjG2%C<`XfhfNMl_k!K$k*gRf)=np>7m&Kg;L&{J@(3bqJEQCdGLq$2_CII~QYIl2M+)&RK3_yU zIb^CSppFrsRTV5HiFSfIU6;e5hTJh76Cv4a2eaYYU}C1rbHhQW>anKzf3{md)RN!z zr*Qxv7ctmYhsDFTylsDhs;OhZk3oFTxyAlAj{A;%-QUwr$6Gt9r?sQo0~2HM;C}nt z-;(fi=gxU3u!YNIw^?kJpucmYXNNOmqO#K+oU+TE8}FG(qbT?6$MNF&#@e30xQlQm z_t+FLI3pxzL4<-3ZfC^P?a)A;Ce_zZ|A(CD?>=`P#_UjDe(Ar>-*e$tF8IbO@;pc1bES~TK28+WP_gQU?*cUE2MzL%bKCbo2c;&lWHShxLeNsw znl#cOqlGO=!EKVlJ18l%VJlFU49SA2KH!bOMu;}CYY2+Xaoq_QQjc_pe8o1*7ZAk- zLW*!lcw+-;8(H2WXCgYZ94dq|ou}?F2~`6iiBx`G#s}u~N2)BMa2&ftIU)`@3I`;? zi(>@Zlt$F7a#WT`j8d99Ee;7vp;%I-sc?cy zsA;IuSICOw^@Zd=T(48!pw0wd%TShJ)LsF|}~kOsR(uicPIe8#dM^4JGr#)Pf307?e$v3ep@$yIk!P4283R32jT0Q-cQLtOhwg=w7(T%c-~e{dxNvS+Pn|@R@G3=Uj--(mwKwlJy1HgPq2QE# z_6tuSovz=@*VT?e^E~miv zPix}ugaw{d7Knx01B*BCh4YfvP$;O_wEyn={&`JBGAHl9|HE(p&5Mo$Cw zWGQQrxcIx5yyg`rQn`NJ^4s@0=GmJzR@zTL^w2{t{rT4?PaaS#(FGaEvO_{#cjc8w zyx@hDHpooAXX&4By!4y@aPp}w1w~8>b!qbFob=oueD9mRY`(|yUBH|kgNYowVd4=m zEOHPqTqAo8?wNME`iDPS|EvF6f9qcop#}#AAZ=Q-)5Ol%eb03AT#LM?uD8~e)>f5> z#q6-u=8SX{zhSX0n@g`0_FM(obuu_gk;E6Y2;RBY@bK`ebtAKPoj+shbRUXU8cE=LX3LE%s`XP$uUj09*pv) zB2j8D4e4L}{K~_RIcCR4T)DLDRzcgWo{f%< zmW7=@b7pI_`1k+#*-=M5eYZK&R<2x;YoH>5rf5l`kYor=&eiCIs+1yElG?)?*4}%U z9UT_BRm+Hcp;w*rF_PWM zp{={+6=%L<%cL2v_}GUjNvBPoDwKf(v_vCHoZsB)z$FdBRU}rT#3M)fcr6>7668s` zN<*(N(bAPPbKbnQo7Z;HP80mFB8`GQ(DKP8mrO*e4^&tLb%XChyG3LaLQR`rUVr`m zhdg!Zf8X@{XC1xtzFP*Hv#OSuluae_C6$Tc3MEwl=9+j+SYW~eY=JoX!uiA*B@HF7 zyzci09J>E4zq$GOCq8}oy*Ev5Hk-An-~Po<4ms{{r_sM9(YocUjywL@KmF-X4?6VN zw4x7v=!<0u-N*i75ram1*|Imj?zPJ|4Ce!l70Wl?{JY=%?dxCrw}1a~P~`Q%)z|*{ zc`rQa+;bQI^;5`W=njs{PwLNBEQupaXLFSzR^^F0#mcXL>&EYVXOFU&KRn#1)!oJ| z!uncjy2Wt!o;4dO_sR$arYyMW5L{rTL7tec@=gY3aY<`))x%rXDIgUukW?fB!g)&A zrqMG;%KA`uOL41p?MB+(H&k@pjR$tUzWLVMZ~BADozQaQaFNv-n^AaICtf;RRH7B& zZ)>0&wl6rsQYWpP?s#8GCyY=}an!l?*SG!GuTdzoaxKhA!3ntq!ie5VS0ZUWLvTh_ zL*O1M>%)BtMGKxPNZj=M+pb;TY}Q9BVvGpud0AjDp(cWqu2aiQw__o*CKqir7K|B)9Y43xR-m;1b#qcO??!i?&WlN;{}=!3|3ylc zwf1dqd)xWvpI?^cLrFGlJ?xHcFKEvE-Tb}om}8D%yCRE$i_!!N70JZGrw2D~w{j%1 z;88FG5$@=4M(;wtY7GDe=l}p907*naROuuM1C&o_V0n_aw-hlmV(Xbb@;f+-(FmCp z79lq;GGvWFjwNAF{@g!PQC-Z$J6-=T;-@ zjVvG~r#)@%<_-lw0Nx|NN)4mLgw3TkHs(OUV`iz-5~+5qOrw3Ik$IA(P#GE{(-s5* zj!7Y*Rh|31tW;8i57rRrq)A?(p1HRgfE9T0@B{aoHFeVR)%PtL+*OeA@Q+EU5=#(e z23eBBB2Tyg#v|Y6i7h59u+;*wBlJdL3lN1#TM5d_0Fw0)2QHd3wXuBFs`}nfwdG_Z zr*bk)ky8<@dgEyy`^4vdboimi0vQPXv5&ulRRO5rOgTkDDRJMbd#6m9Vsyh0?LTMg zp>vPHY7BF0%lX#J-|+g+pMSyJ8H0M9OMmO>J+9uxzyzvIhk%7ELbM=PX#tKY#v7rj zwRz*0FTC?x-#-u~+X|3^iWaIUYawlsOKq)d%EE`rJ47*}^COa%qdx?Ci@k)wAbioE zGa*@vcq8s#8P#sEMlZ^#LeS`z6ihFV(GxhgOi5BXjQWWkxXv;mL#G8{&9aIN9u(z) zen$b$7stRTbiofV+3|u>Cze?*h2t}TSBaxDUQi8THH0DgLmp?n56JZ5GmL2fK~k%m zNlh&rg3)`t+2AaBYDq4MOl?==9bk4VSq~1;pDwEFLLI(la?R>tZMIArJo-&anJfw2(CC{8OIOdi=S_*z4V5tVpns;b`Jt6?z{Bwm|ns-|v5fTMQl&pfbp0 zK*ta0d=LEp0bl>m{~Ze^?kxQ+L38KMIsRG4Yh!G|)j$CQAU}#oFsvJCbW$g^vRiqe z3l%(sM!Yx9o5~yKlr#hF;Si7wn+Fduh$M~fuJIw-N47_#<+CU4ez&tMItVI`j9hxw znZN$f`y0MctzoKcO*eg|sOtuGmXsBBI!P_JRiTVW^&u@;%MJYi%>*~JT6M?L*)!)# zQA{6W>!vaDQla1z!}t{luUPy7J4KuEvgPk)&@W7eWY3l(DY zDy9daN|!HS2wuoPvPCAgn6SVT*#hYCJV}E(!#sj0FJ!Fs0~usbZ@%R()28pbXwgC; zLsfdCbBQEw)gmsSwgH9AoRkcj^4O&!&g4{NgW8e zcknGFt_md0*Dn0(A%`CR>Q_G-wJIL}b`HHHL_nGe5^BqcH0p;ocx{0ndY z@n!p&WJ;@5^FG0XQ$ni0ENls7gG{AK2uW}zz+q!TNZ_z?kUu47f=j*2T!_y!SkrrA z`_zZjV}mrt>RJ$ zH8L2)+^QYCh|&R70a!Zt5?KrqAP=SNMDW^EW_@OTylUes<10Ql2!$Evb+9^=sk8N} zn$j(%w~HCAYG%8bxn*?jXlKsmkzLuck{FM)euD##(krw~!f%bY27WwF>==DDwkBG;8_P_cz>TgAfhf_{D zCF-z0qW;$QZ*QGNfvOOyvV^!4pgPBt5l`%C3xi#1gB0f8`_?SK`@ZGNSKocln!E2_ zf7kML%a?Dw`|hE;?%rIL$;OSP64Qukj#9Xev?$95)<1eA+hAeA^&?8CSD`9<iH;>Byy!!fKyYauTz4UYEe16r6HdQ1lwD^Q%8A_cdR*5a$4(YtGbi{!NPEW)~ z&slu+jW;%xNUJuAvGamU!o=X6I>#~e`!%^oGS9^K6Bc+PSpW-{tpm40-{%}9krEdD z-6Id&eY$Rb_?)j?b;C`W*2WHNIdbT+2T3`tIk4-dwX4gby~o1+c9}&|7XNzjdCf*+ zAenys%`00LlY|UiNy@vFMEaMzZ(nxfzfV!(Yv28TOKFdiz|Hk{tUTvqpFQiH|L7p( zMFFXBTL=BeouvgKYY0<5lu5l22HbI@c=)sAN2%zn{>*1rT=H+Thr51s)Osf|+b4-P zMx;h1S|?IM^O+IARs$gJ;DJ1VW_xg9yWRw0y|h;O-cx#uCyN;(@J5v)D`k8FWuOHx zd1yOcJ+kLCC!3pql=H2x;KGMQcq4%ojqr)!SLyM2{Pq!F84UH#%}U^*2#LIqpxqF% zI)U@ihNTdSrO+cI8k(Yg^WFb)Af?fJ!tWKWA%IMgeI;4*SHb@9FF{&fCa(8H0U*qV ztl}l{2F6t0OV2>Be?b1rW%0-qMcszF&bwBv5oUO|ImcbRgqjK5oE*CY4~zY7m}euC z{(if8Z2j|S@V6p(+DZCbT4{$gVAU&&Xjwc(L_IlR6nLfuX;7+ez8rn`k{L{pUZ(EHFTl}Xjtecqn?1}M$d7{S432Qq_UwCJH$n`X`)^5kW5 z<>$}a5=@y55~ZV)XNa0EYeb)2;hG_Lk&wtMD`&_1ULSE-Om5JFjx@F4b znIHbZM~VEQhaJ4zv>Bu8x6teXz$T6^r$U$Ih)iS=92HesYh3rUO9ywIf9z2wt+;Q~ z9&?OR!oqLQ>u%|d%D^LdG}_MgSbbuf2@CumSzs)rzV-Nh9mN8Pgx6p9%Yj*Y9dpbJ z?p-;wV78Xp3$3oX;_5@5xvy8G+zRi9Zu-OT)@`8qbHuCPbn>fDI{l!7pE26*Lh}fC z3t|1T^huVJ3E#ftdtX?)VUMT1s1oU$U;KP3+iyAj-LHAW8Al(nh}{vGIv?j0E|gk> zDudKY_S5@=7g+aN8W~=H-i52L_{H>*R?Su@mYdYb1`h!%l*G_Nc?7k*wWUf-KhEP- z4DDb}fQO_1`PO^3jdx=;TfBhxX6(0P&K`!heay`s9h8V>%=L(`(Qh<%^s$}u=a@jS zu4Rr9A0T>G@GALQ9{H7(fS?^8AB>=&5h=VDh7p&9kUb9UMNk6l{+`+6B|(TN9(L?3 z8PIb82X%xL82a##agHvWUf@ghazC+Y4B+x*z^#N+8N+hyJ&S?2@v%2t7dtcs`3$^$ z-w}SK(Wv&Ef9zKmQ#~gLVIYYi+ce?F#b5YipCo~{F=kMs4ay%0I`!;OcX`Yxzd9sGlfFEuq|r~TY0S% zGrD%*hQV#iRd+yh<;5;HGO6?FU6r47?w8T%p!fy`0p;o$=Y0txhDAzgjuj43rz1v( zTbv>*sj^0)G@6CL98uSz)VEYw%1S$x(gAXGL6?>9fO{6C5lN?A6t*H!>y(uhs?it} z-C^x5DmIvU>P5A2GwnI`po0!{lw$D`+QVBmY-(@bW50Q1x;n{*e6n!Y1!uqK9pC%P zxo3X-tQJcB*erA*{^GhurSR}i@a1=)T}*8HM7Dr}<`X$^72sFLc%r3AlM$CJ+->SV zzxQq5{mPf#`>}V7Slwh;V; zo?@@=i^Jj=i{_!>4d| z`NTpQRw{NvZkLfjyXfVb5el+Jywzhs_vUr}({lw0BtKgGrVo`OV0yS$1VeiJ--^u` z$w8|EMd2`u^ zWrNA{x(lT*3pmeq$iIb!6c(i+dQ%zdvD1re>3vdbXJmcZfYK;+3a2F5ydoK-X&9BZ zT+4f3OB(eI>o&An?+a&ZS(-tHfwD}R8M|Zyjh|osqnEt$73)_GU2@qkE`Q&9C+{+S z_3}Sm@sl6D;$=tw>-R5Rziu5CDN3nYt<^11pV7N+)g_evD5zUaYc|QcISb~!|LGs!eB99oEL(j~Hn~ad5iexIkYLhagBOZO?)lBHuGS_y?1-bKpkH2b^$`ah zK*O89@P*Hw_k&;S49mv`ufMv5$R5vMd%!D8)dIEvRALqbbm2>}T&jdMx;VhflL^a5VaM41 z5nsX9!p;D;Bu+|3UOTeX%M#{7gl zL~z7;fcVa{%Pd+6#|JMgVp5G{H6#Jxf6f5KJ!c1Gv?{)jh!!P<)kas2raFDfe*2t% z9;L>bv?>vFj^$f8rWpGi#B3k-Mm}b~*y*Q;!p|Q5Mj|@>^wY8QvvwQ&tsUMTJqkPT zbc)kYI}J6iP{$l@WoXxq;YlT&D|VebYyN_H^XJdqeg53}3wE8q`;2)Dc3H4smw5}O zO`fL8YKTcvR1_WODvMoU&)ffCfX~|U(8}XJ)LZ$`@2UkK4CDYY=zMbK`#poAuep9&o07tdyuL!Z){N;RwT7+Lb)Fbyz3VvJ_O9by z;mV@w7JzI_7WW~sA*t}pENSgTVx4x6{7kGfHb@^qiGy4hKb3dN^`6>0ewNzDC-`K- zY2nQSUS¨d&G~%K7r_O#;IVQtr|VQ&9p*Dv{p*Y1kcBfgmg%@|7vWkvNQ3h+uGX zCsV$VS0KDr9tvQt8=z283SY?pEmkAQaE4iI(%3!g)blQx0*|;MKV$1+`aM~pE%fmd z&rjhKTxm#@Pn0tPTCy6A&&yC9`HuegC`9 z#Ci98r$D2;-au8$|H<{Bf=!xk8*+``|08bCO7U1`03UFix^!)05&(8Sc`PGAhS+$= zZ@#?OKC?oVdQ`qdA};^TIoXy}s8HQ`M|+RM-%euc#*tyE1LWQNX}sf4DZURuD5at% z>fm7Wlb`(bsi&R_=NzQB#Fv+x|E~AIfU#aB4g~z?$-9d$zSsoyy4SsdbYjU}^o@%o zsl?~)s(9ULZ$RY*OH0l@?;YtStfl6o~OIJxzP`5>i zaat_9cgypRf8(#NylVDrB3-r72&HtC!$3m_cXS$937{w=in&wpZQVr8pOR{d^N3N` z8d886b>LvD>PU(56-?|kX<-EwE@TRB-#(svu!SZ*nXteU-U0~aaYsVj2DRRa1&tA0 z^dwAaPyi)|ZV@tpQmv zlcIv@hD-QUJe}JznF< zQV+J(nB$6-8lraxTlG0*W53`jXKZVDoHUBea6EB4Uh#AAy?9+8$I||L-ZPKW@nFE; zAecj3_u(F6C(`=~*Yk~jBc2|kdj-GWDi9eNTk)6Pf$0v<8FmoQfH{OHPBeB z92sP@_<&l6{6Ov_JH`Ss98&#qp->BMJ0KPU~# zHxfLwf+qz*wpdnt>glJPvG~j98G}-$ zDCTM_ty3mQ9wt72ohu-n?HMNt;igC`0YFs#Ly=Uh@b(flq#qtU;JV=)u?F*mIhSEM)QNt z3PSib{EJGWoHHO8k_uF_QYhZeJ&eo!Xt2+`B|}oC(VVe=F((Z>h$Lu=s zX2JrGO$(r7#CoZ`C}r|4IGR|>Cp_<#LX*%bQrRjvZ8CJ8-pGrINpabC<($<5mEx+_ z=KT)bd)eAe7@3@(G}yd-+0tF6O@^Lhtcr($UQkHU@ue=fLmQ&UeT1JCwDU)CNVyqiON^gC`H2X?OKmX{`+pfEDdXlQ5%8D{<9$I(j zovEubA9NsJ72vpndICPUs{$mrrHoodLSe3n1fy|y1(?9GpN-W$5il`QRn{h{=7r>(W^=bktki3rIa#4s1O2A^wN72BP0JR!1&czv z*gtTsAie~i@!*)z3WEE!`cS9kl+xNbDN2u>)bm=^?rI8omUUaGc-{3j8K`e4I=+^T z8lq+%>gl9K`yBblKv7fiukc8W0&$@KF0b_^K!|z}?SW+cr4xJ61S-nBOxxgFhrDB3`aY z>qQ3~FngaxxlR?K1R7NsKKI;vk7HB+|9|c4%`|71Dg&kHdhK%_kpY0bl2|^`q9bxy zObYr9uYJQ0e*EtUe%JE9tlX5;sBnY>aC_uMBRRsVI$?2ohH#QASjUAzBq;Df5m^Tw z0alH6bD+NMt4{ipqvE zO>?*vN@q0SNC3Wr5-Z}+&I$yrRj1oAH7wuZHRQxklA%>qA&4wZoD&^ardj3#b&4X( zQ>AO`Mn(n(ClA}IYi&9>Fd~(OwsvqvDw7Dv$y#e2N_l5VRdvd$+sLxA-4)K~Nm_J@ zG|x!Nk#3u6Ss7fm+su&a>AUV~(zKp5+U<@~T3RN&$eUSqYxF zLk@hRz$&-SId2Omg3HsCd~kq|D7B54BV2H*TNd?tU2EZ7rKKs$ZdsztQE;H!OMyt1 z2-15Sz?+dX(n+>*!>v)7W^nPZ%0r$*DeIxH0A|L_p&Igc=)2b8lw%6q*yZ<@7rbG7 zKklT)wwib|VSy))1^T_Fcg1i#BVQ+u|A1fUP6pL!Sm=d$Cj|B-Xf6senLVm6Dky7{ z6fV@06iZ1#qodtMGjXbc(!r3N2-8Z`vjx0uwfDH(O`=s=ys2XWH zIB(Y4wJXa`cej1_S%25^UFOWb>(<+LKkQH%9=T`vT?^(fxaaQW&02lK=1mLt+kf?4 zcN#%er`;MEZ4VEXqwP@IgrpJDbxZKrr34z|K&W%BaxU9t+PaZphERRreKA9Q@w*A`Xt& z9fFClK8VTuiKH2zNGsf%5i6lv?&8s)@cK;{=3e4&u7m0ROOw~(xdJsATYaC(NY}xh>6(@p+^FQi;4Y|aFJor zDchu)u2Y4OAaB(LX8t|&ksspIAiWGaDD6-=3w|^fn+K6rD=kE~k6pB+LbnrTG%wLY za7uw|#mHTBIuJ|j`;fRC8xuCRR?tC6f{4-xn1ZB=eCcchwW>i$lN1t!*82l+pV=N8 zYXEy6N8?uB2b8_R4to~8f?j+O-ZDDrnD#XW$>KT0Z6;nPEbt_>fX7541k=@{auL7) zdL?=qd|ceAE6h*Aut!@m3x#(e7|^XCYmwHD^d`=HhgJcBn=duHWDHdmrA=&E zmQ)`QFa6s+U-lA!5Bw0*&9dkS=Ht67O8S7KKI zdHb|xeYNba6}K(hxO(+I^Y`csjSO$t)EOD})*0}hw2)$BsP^7(Ut>&B6q!lZuU|hj zG&Fb4oRQ&S-)fbuHmdBhCV&t^>x4ibRv}Lh`uo?=^l8mRQ&sHVsF9%EQMyNxv$Mgx zfWx;bb@i`)ed?*FYHcFeVmuH27^qZODaT=in^KQuiCmn%%AwDc#tK6qfyD-g zqTNydno$)GHc^ZbI4KGg_tVEU==uC1rzZCh9x2Ie2%a_Kzy$a?4rax(>V5TCZQ~Q? zHDQ5A#RC0)0O_abKgRTnSq&dVr$7J*bEr_m=`a0WtwAj%>4ORtV=2s8LZ^9Ib&biC zOe0vRz_|un8au{rW8q>1NNYt^ zWjTk!D|F(!M6crBpwUSypnY4%R=TEK)r>}3<4*NBboXIbjtG) zNc2K!7lP4nKt^VEoObyY#>Z`m1xYXyVFp3)6X^@FPhggcE-qVD8hKmHGL8zAv8`bz zn0H_cB%a0g&({|>z_()))3}MU_w8fl&rUzH9oEy@LA@?4E^Uc!rNn8cLf`AGcb#RO zed}9KC89IWd=CaZuAW(y9?ZL7P^JpGqtG0Le2y%F=x*F_Pnx?G%YRQa?0kodLRhrG z`|~#+;l4p!xWH3#MQ3&(@xVcorcT{^(SA=|^pwLFJ>`JC_gl2*K2O=_-~;zMaNj)_ zJ@ueN_gc7c(O!!dEm(Nb1sA!ZWYFKE*#gu@(mNNKf-aWu@NzpuD>0z3cU?HIsUqDa zjp{}SlXHh;phf{j?K`|DlrCqEgM&YhGirg)uqa29?RWinp*V-w(9w5epU26;pe%y- z2=m27+ZF zrXvLk8!K1JayPLsK$p z7|IpZG}TS-HNMFeJ|E0!AfrY?%@l72Qff*(r{oa(F&Z8?L5Tq8rX~>HON2&FEJU|4 zGgQ`6mXQ{+o*|1&1eGYL)FayqC#@5K)JbsjD~Dny0KADr^M+iIMtL8hg${`EwQweR8{DBQDT@EGR$%XZYU8lE?QG2H#couK~xxxHi&bMi-v8S z>w~^h;Nx4AV&E>#g*))JRg@N~h-h;fdC5G81QOjg6~i>TDQhI8=*@3_%U3VFIF6>= zU2y>J-JV@ds}94uj!LJW_6e2^)ZNn#Lm3_QX*h|qd4NIVcKDTF&1 zYIs|~iXk{xaxEKYJ&0NuCQ&sF_XOetU=ksQ7l+OedvK(5q;L_4D@ zBatMiRjHIS#_7c2O=7k5T8G4hBn^onW1K>T9?uB`!Dwf6Df_Zo>^Vf^igNM{8GGgB zkRT>(a3+l&DNv$uAB5}{T|$yS`Cy&z6+{BV#{(H`HAd~!u{IL?I9n+NTIU+v{T;>hhq;UStJY*nM4G{1S^eF zfd$mIf)xSUx-kL`ohe^Qr;M%{#w7xk5&|dtS&VDj{g447yE0HIwdMRFv{*ndXqr}1 zp}0H8_(Y(}d#XB@pYg^YpZp3+xj0<(#<-&i~T+aXl+6HZQ?NBxv1*3UV?9 zL=s~=gknnJ;!tkk`^ufqxLCFos>?wN;H}_ONl6G@NCxAf6+|(3oyT5XK3VQ2*cX4q zO@p0b9Mg=D3--b2#vPXN)?>YeZ}-ic*l@xEJ8FR-5#8_-LX-$~Fzr1U;WdI)wu32G zq$QM1Au~_a5OurUkFkjAU;-kN>qu_EL~aqL0SZvM@YW;YjNQ$_3hF3XMR!&!P=y($ zO}g?5pe9>( z5Wn&kDUFy;m{V=R^=Tt;1qTU4CbYJ$2*`@UJQ1J@O+ABy6ycRPXGv> z9aC^X8LZYLrpGITP8A2_I3_D;v`*sLa%52&*h(s>eDlEFKZIa;5sd55%8IF4F&Kl* z41Xet@-*XLU=La%@%@40e=h}}Q6ot$`EWqP623h|XjzYf{f&_T7WLI&ss71eIzqA- zvIDfjsnr$xA91)bmOk5>f6`n2v!S9vu=aS&y8w1N-ioQP57ys$xL&@a+gsL6!NNkz zFQ5OV;3+YQ1q>&tl&vbpU$`xxEXqL22j$=cg|CtuaBRZ+Ik$^>#?%Gm9S_PWAQY#F^Mg{K_(u!55=(^yQPHaJtVj(KqEmEO7I<)`3$6RyO z?W}ka%eq?YY+No!`QsQb9cu?YAQgv!-f-7TknCUV*tYz2|I>-T6Bc+fT7db!2!G+? z`-^q&X>`NE^JmK>le#ugn|8@}e^lBw8F|n?2i8rJWOb8H{?2!P90#Qh%kP*rIFOow zOiVlas22>iTS6v6!YLBq8$kU3H@~_{N|Wl^^jY&ZZyx#H#a|oHO=x(EBr(}QbJDY) z{}QY(p8$_Imu_{a_l6;ir4gTCTGde&2jpyUy#cL4kcD*#JTy%8k`m*;C)zT4z`O;2 zT)K1!5`@Z^kX>L(9r#0PCw;sD4ByaT4OB)4y1&j9H+CGPRo-w)>qb-7V>ngSmJ{75>>E763AGDhc$HT zR4_)MEYJ=;P;SeRPf*+QV0# z{`O1X_hIUGRMna^kU42lCsC$R-sO9cXxG2Rgq zWzY#bwR-ZC-`=#ww*ULG%ii_+S8W{GyruG;(){+Cn~G|*EI0rCD^E&D+;{7}Pe0$dSGehcGn@Eg+;!(@Aeh1e%0UKvtjk9ZQpp^wZFOM+E@JjX~R`% zeb;t}e{scCscwGfTVIPz?m0~b4n@2`9 zAs8YJ0%1kfVf~y$IHx?sPMs5Fkx{7UY3@VS$P@N>J*mt&aj`qs0y`aV@v;Mz3B319 zmMn?ftbXzKhrYI69fR%P9&UW^gI~PlT=*0P9PwIf57(CfT@qgVw3bgMT~j(0N|Q=Z zk4)wy>rT{zs9BL0l?k#=l#|e&Lgih%Xpgy?9{OA#_-TwNLU9gWPvjJFkeoc(f_y=~ z`_>Pf^`=jLu-V!4?GKzq-Ij1R)8>SaeI##hA7vGvleSG9&|aM!xt5tUe2P#`#^INk*KWg6~`KX<~xWg$NzNV z{e%Uc)E4M3t{-TGRChaVA*CUD`cX&CnKftWvfDkmde&4jl~9NW0ZVvy*1OOC%xAy) zw8IW%`U9PP_WK*nhR0%w@{y( z@{Mm#ojmAW^=J&}54_a>%l{R5hjA5xgHYG9L}jUzsF^H~0GHK5lCi2h9p%mO>Tdq(}O7_L6~hodyW?RTvpU!mzVk&&s|0MK8#*L@M>YA717J zt+?}^xwB@~b)t2$s@>`mt-trK`OU$)P`gZhjTn#QNdXFGwscHnkTZ2Dxk0Jxc;uyb}9M@%9gg%owV%{*z?QR(Tb z8*X<~W*_{N{RR^kik2;%<%Lv2!}l$}_1C{!_KXw%j;z<k@x=N+cI6tP4=>vpAJWU)lG6rHQ>|!dmnw{bvF?eBi&8=?0xuu zUv)E?u=cLMOrJJWi^KO}Bav+uKCIQywbJ@wGzlVqAQ4eyk90BvJY!R@>s;1lqsW0^IaT`1d~ zf|B&R@Bd(}RzLnTpGnf12J15&4M|JnB-0V=%wPjjZq2&XoK54a8?XKaQ4vD7a@7l8 z{K6pUdCz;^Wk0^OHQKu7s;d_-Ilt}Q@y9*$KY#Y0t)jZ*lJ9@@;tNM@IO!!X`|3qs ztL&y-=ghh1o)tw=L>WJfBb-d2QJFM89w1xN=WX@Bp7=Xqfe8z2%L3pMfhmt36*aQ3 zwIq|bM_bQ$`jL~H)6PEU3)lVrntD<%x}6Zhk9%DOx=maGsDz$s(yaaYt~>9z?KUmV4}W|Gv_Ek?yY{v_&-u(3-}%nB zcZrN3TlN-t+dAPV)OY>^?>h4v7hMQ3E$1%#_y0KUjJKP5{>e{$D%jC2?c%>~_~Re{ zxEdnnt`aN)G-HP(LX zn@lm6E8$noYsgq&5Ngdx8G;G{3{tDEq4zi!sh>M1H7S!d^Iyu?V zjm=d5w-0@Ki)yT|45`KjJ=htTdC9vzn(eaN%Rl~+%7m5@Bd&r2N{jh(XJ7x@Uw!yv z?{U;lHQjg5iuIc|KK-GG(&wA!f*Iv6}<;qR%V!xx0Y^LTpCq8TG@2?+Py=vO7 zdmQuZ7m-wNdi|?++iiBOR`W=m!X*eop-Bc^V=54RFW2^6;>1=H7MQR=-vU^lu>PGJ z({|vmJb7Vs{_EdfbIV_D`Q!E1wKq{GR5Ht*$$oR~jiK7u*|cVG+SC;*R;*fe-*6k8 zhnN4usol+M_StQ6XLt)#Ju?aNmT3^xoobRuzV(A|{dwshPC5N8|N5ODQqiSg-ua%h zU-9abkK2EDh+cZHlP4M83jT;g_P_7$J2q@t?-O(D(tBV0yqA*oxBmC9g=$QyH#cL{zEMD5x@E=v;DECjW8c*{s@^~Ub-=n+R8S~JbRIq}4sZ(RxvBMpIxs(6yw zv)`;I{_Z3TuxQgx+IN4qk)SPvi27S;nr<6%?eO+U#RahW;^K2%(b2iAd}(y*DyuZ= z#qtuAmf!f>By4mlha@owWk^4DAz0y5u&E1aea6fKX8S-%qJx*(OB7-VF)_G*G28qL zfgDkRY#;0Ga1IQoCCkc(pt3id{b_1AZQf&iUB8mwfi@e>(f^T~`XJ%d(5?GE|q(_g-|+q?GQx^NwjV_CmETEtIp9 zYBeOzu{2Y3*t3FhDUI55;ofI|`ZGWJ(WNK9^n}a5{`Ff|t~>t+?{Biad?leep*gBK zc6v|nHz*D*&wAHCe&O@y&YHjfp@$qcI6%X<-}`re_o|g^Ry1~*^P-o$5jjtdhT<_F z6NT`V?Pwu4x7&%S)v{){y>_5cUw8X$>CD-qY&{4_K@2)m-i@GV5j@H zVkB|<^|bzq?V*c?8Ub(#MTNS6NPR#-LT0n_m{^i1XD`@w?%ZAH&7D1O?yULqXU?0q z%Yp^d7A%-LZ}+M5b{}lD*ANv_Sn^!~(W?S^LOb+;bE^unL>w}X#3&L)hL9C0@;VfR zvj$C?4q3y-KoEv>P6GopI0zP(uFFa$AyK7BCO0>3{j=_wQY?!gKBvi{(Sh zWLp=sLt^^d+R?;!6Bc+NgaoO9Ah2!R07I|71qFe)mjSipL{D2fniN)tu@ zYr%#}2qhF1?272U-m7APs3=I0-a{%Rgphj5-ZQi6|9orheR2{=JX>-wF|(gMIeX7u zGqcvaXV!e{EAOjJ?JJ)?@dWPVXTzkxhBCfW19P)XOv zRA&D?FW8?|R=!|DjY6OO`w=RM+vtmzzrj zI!9o{}-pdG=l3si5cbMSb+eV`?_0*5?R5~;E1Y}gdXxcRwP5(}2D=b0z zJs`TUEq?M1JjjjsaLD)oiA*a$`SDL90jeP`)BV4=`B&iT-hyqfyZ<(4PJ!YgjaMJ? zs@&=UvnrLNpa|(Ex)`(59`m1>Yh|DQ2q zMtl=VAJ&CdBuDk$52rm&c{tf&f-2f{oF+6?HkYW|fOiW)K?l@3MW0r57^7ZRu!t}< z%Tr4PFMeEa2x&i z1}j4aNifmMdVB~7QNh({TcOVe$tA0OA`mREGLj~orxrYl?r4BCL0+DOJFpTp8bMnn znQ*w~ZK+;v^e~hi+%ymvaeHg1X?4mer(AvY)q_e>FN#pd?ZG|p-~(Bf9eT*2Hup>t zpx<*t)>+nUH;~tM0-D9B_ zco1|fS!+2%Zm_*}-|dyV@6LnNxhJl$1z6Z^x81T_{r1pfK@-RE67D-J> zl@`vWNG9em#mizsz1QH4BNESGEeMiYk9Hmol3)@@sKg2Bb4~?iD-Hw{a#IW$S;xa1 zvTymeL|}78AhN{-TI1;4k}ekKM0*QavMg$pdd`V3rl3g7r>K_+Di(*e7$$RhhT^_~ zDBVYMOU!wCNl*eqZ3*D0K86_M%`AvhefHUV?|pd8)5NZN0!)WsCX=+lc@@B0e4#3jC~{v* zP)$|m{h}(ZN1}OTq-W^A3n0tj3-b&tqv&zdS`!dbM7P+6yN=2ul?ZH>2n^Efh0(WC z5%5l9kTnM?mAY4s;DekBG`1{O8UmOmFoDi=>oE>i=prG6umtIv(aFv&0QXU;#%Yx! zS05(DJ&Jr+`g4<{_$-r{4T2)GAc*tcfwtZy zfwnpbyWxJSuv%!r1Y<5t)yx>j!Ze-t7ik@RT7ETeQ7Z?dea7-{iNHUPz=&T=9rI~* z#=qr^RYx3g*rZ7lmo8m;+h6WrLGjSKwxnVUnLy)-%Ca7a@-)M2C!#QI3w36r-^+S* zE{6al(Lf8!a)*_M9VBld|3V~^2=b>k99;o7NIZcV{WPqgIEtYQAXMeRSrSs%F?ozq zFbtZK>_rK$p#xAN?+;XcV{~Orw{>jW?%3$qwr$(CZ96%!)v=9^ZKu<*?Jv)J z$9?bfjWxzOKWpz@RjbyjHRqaxuN1N&;0UtD0TK|!QYaX=;u%1=rKTgI0}31>8^DNM z?g$*>#6*ymSptH&t>ZM);_rKHnI9U54%#ofq_853GQ}xkpLB7U?wwYz!_%9J-qUSQ zpWhtFELO|;{o&}Z`_bNgqfiKShkJ-t-+{f$eiw$I$LIkS>FS*p;!He+O&q)gKO%UT zk%CP01w-!o*02mlEJ6!Q?;*5k2e0sIeTj|$X$BywhU(whfNgLEiyYwtD>koXoq}r? zQld$FNA4454UG0>^^C*GO&kYB07;8zUi2^Xv62 z!9orf4BF&a1XdR-S{Wf+vk_|Fu;}=Db=HGxUc1rvwzR+vE(7n;1T(yq;|50_fz58$ zgnnJEeC^>fYxkOW9g^!`#IrqYvvhIOKf;|QJeZ_XSY$>_<0uwsVw>cqL8s*wfnwo? zjvGdJ1GNEtR0fJo~#Fp zHjtPzVkG+n2%Bd=`_*t>>xT+@Zp%UkrVob1pDvDMR4A8`OBSZ=`@}ZyY6ZB?^J%fM z9-a`_@inPc@I0M2#`E1G5hR3ggXd3e@8_cZZ90CsMI((F0)i*Ugc(gzovAfJ$n!NJ zPxuk(u;^$m`Bti16@2z`Ov{$Wb)BOz2_lV$3;;)q=l|?Gi08jwEkfkK9VBMqM+f9M;qs4)+fv?*P#EI=B+qb&8-;%02=TULW+3%gxCf{ok!wiSNliKPv zTFqN-8<(9|JzAJ(Shc{x+2Mu?JDRlmkzL9fzp-?vJwB}S~%^Mla$!7)@x0KjomX%5?0x$k<=F;S-iCm+zdd9 zeHU$wPT>@;1jyPdLCNZXi+D#WXK^oTK>l_uf2&BbrQs(R){_Xr!wGeMHPR+0 zNz=y+k}(zqTac3Kkb%Y)DoGb7pyfVg&%rj&*Yj-w9qCyPLLY&U)*Xw8;K8VpF*7YY zj8mc-{;;89Kr_;-p$E3!P(DGKA`fk5M(*tx-sgL z5GUSMZ51X;j`CwKVF-vQE_}35uO>l5tzv5=)jx5qI5PYhdM00ma$3Iqp62>)Ypeq7 znBtNW01SJ_5&)%!VITS!SU)Q5F!VH4a58M!F+rKkA5YX#G@8Mh{@oCorr*@eWTYBM z9ByU4dFcHYCMem)25j!&t3n1ygA&thlZ`1V!ZTMAt{$VXfv#a5bZt-ODH5`eJ$i&HUeK#cinVxdSs1{Hh86KENVCi0Ri&G zja@0wiQHrz&nOpAh~dt101?YYD*KpF4)!=TSH$~}6MiB9-EbCr2Kq3DMOr|GItC`0 zjnk1>8k!N7^*muYX&2`XOJO5N4=ksN8u%>IG14LKfGj|nmcBffsY0TUtACapc3>w3 zggCf4xd;3SU8R0Zj4qO2BfJ+q3DoHX=K?Y74G&pQiK@Dk$;)sxvuEa_af$sH1 zn*bb(o!oP}@da8Sa%=1UFQP0>7PHBSc1oAL)v4NoDSI{1o&A>3|Vrq}okpC^4eu%wOD@2~Hi-oEuN zE?v*l6yORl5Gah6pfov{52##1fjojofv^2Bq1krycBV zFdadRLDUL9Dhe18rFdP1RRB*$a(bHE1tVr$BAJxK5D5$x7;Y`j;<6`0O@hTe=TX5P zJzs_c0yky?LmG_A)0SsOLlL)T!5}mM(Ye+(vY$XV?*qJFnTio{r0F=+LBKP`j9N2> zNmj%B1R{a=Dg^{c*Do5V;unQrLTJVdnhG)NXb+9I)h8A9@r)ePnZc|g#ZvSwbWkVk zO;G=dQf$9DJ|0jFe+V&}pEr9f)DX9uJ&9dFo3_*pY%-JLCUE)Tcw44Xg+^P=!K7V; zCsmCupcAyTKHCKUr!wA0d(lv0UaOd6ND{tC082h%4}7`{_FV7TIh5oP%G3Mj_M~5c zQyV@J9Q(?}RN-Jc zu^VB~fy;MOQ#vZJ5}$>V1k*xV_hsjXd=~>qj`bm8RmFQBkJ)=Za>Hdgr95Myun~PH z^qZ&tbY6O;2%T<8*}Xn`4eKFpzi?#X=8$A(gupdcNu;W~s0EnDkdst+9Wll)WA2tu zSnl$%70}`+26ohsE{2mRq9T@?O`;%(V6{HvcY z@?{{wX-Yz7vsOPT)-E*zu)OX0aN{}N(EmR+jv>VE2m44I5V8qD(D2jM$jpGoZJR?B*= zc4-AtYLnZbyj>|CrT`7*^d&Z1lyc@c6C|F)kn_g}HJR7JVu+Pao}k-R{-*#XX`xYlQw{A#GWf=*ws!&HU&*#vW4P2h@AIL7poPN(>SarLG!oK+g3xh_|mW{_A zO=mR-CTSre_F_#+)-1+s^eiowxaR$W+A$zm0bzD&4mlA+jcvx?fh?i0?(2)&XK>Mk zu`{rtmc1Hr=t-@3;%bQZGvP0kw72XCCgXZGF;LYDmum{Su|8URO71Iq-nLCm%gXty zmfk=d*L|Rf9J@gGIpFCsEcQSgBN6b{*wMheE{h%pYf-8htRZPw4PiJFHR$6|*53@9 zBh;g+gcy{r{cg+{z**Ixc7)e>0y;>#5SE_J3MF|Y(BzWB&gY~jKbQBZ`%ETGCE{(5 zRm-o@pOB1!3vdwPz$0N!ZH%L zs2nz7BGJ@|ldP{mo_<($@zV)WI|UcV@bvFSFr5q@W7cIdl``Z$tktJ=(mltSqV79S zG76-qKvGqKbv}E}@Sa9i_my1c2;AR(Z&gLQ0C=XM0IZuUEV;&zfIy-M4QV;@^*MKM%Fz54)=-`*tonzv4PC{hqwHSL)K(WqTWj^*_DJek@t{KIBea5?l+^7b>Fyx_vW% z1D(x^7#u6tY{Y&M$`kDsrxj~9{sy!C`!jK1ee(s+S$mdLF7O9j$in)b&;s~6lvQqI zhq)5ch_X55A+0PUP*BBvhV0I*6MVbYc*Z^w<9I8B!0usvYmPG$;o1FyJfh5z8SjgB z?yc*IL%Jk!b6ka%f@~r#V`<3S7-~F5n5hoEr{7D?x61dlKCAhqv-1&MK8yMAIcN8` z?%q`90)K)kChcS_K5R#of)I@i8j4KVc@<_~OC0==^C^l$q}Vo|0F1E=_KJXv9qbi4 zqxUT)-@`V8E(ft9dyX?qn<*geW|83b3-G_F%o${7|KE0Ui6yeo2>io361 z4?=BUXz7*&@|#4oD+7vIg@D6}Q*0CtPRzvOV1bL|gV%0X>ag^{0$3RsDl9k4{=NA5o z?;(ru!_H=Ay%Go4tsM7ojus76qDTU;96R5DF%g1AT1;aRLm40gN`4oZ+_G%PN$(5?4w>3{%gtvI7+p=#gA5CSA# z+g5-0mB+CnH^F08E<*mVg}u6si);2vzh_)G?)TN)c#ng;(XI>hIv$@Z(m3#+SqV`x zR@=!uWJ0d@EXd&rT=$H_>O{FD+g`Ev-myJbx(=6g`7bHj&0TiR3Z6pvk2=>f~| z^7<@t%X#FF-{HHh9X4n-#(Pbj$$2a^yj^v#7|Zj#RtD=oOh5T*fYN4vP5#t1?hs-2 zdtU{g$e-X{vkm91dmm@-Y_FF3Tw|E5C%(B~1HWrsHJS)n>V3@oa-xO}Bc#o^yZ>{e z?Y<U5+Qmh!t4^JvRccnntxyf?4j=QoTQDa&_#bMf2PlE*VL)PAHz+zRt`s(l>nF5^ zZH#SapW$Nm4NI5a=US2;Nn{~V_uvOwb_Tx(*4+6S&tyk?@uTe`Nf)t-v}SG9mm$fi z;l?}Hm)U;ru+hLEZ|NIXeAlYstm-u!H~6EDNm0d*TUQ@C^%`LzO-s{a83zk2D2P2x zuoau$cLGFuOr+e)a?efm6uB*g=O3Ab+@xUFj>2#{-zznq&YvIS>RSt&7(6Ll=J8k@ zrWPgBfDerpvoYOR0jbaxAfAxnlV~B4fDs7%XX+}~ciJtj>v17pmR5qM zUsb@dP~oUYsGlVc`(qMWi3lHEilcOz%r&Y|A4t`{icQT?6I5w~@uRonyBlc7OW&2< z+jKgEUYnIC=e@xc1x9ZD#M+iRp??iG-2MMeWAr*}{Z<_rq6@-|wc9v6uoq|KmCR z-t*VZ7hU(Y!?e z=i;*^M=CI}k;V^9%8%Ke6S_FN?V?knGwg0VuI?w%DrO&^cMrZq zjw8J8@Az3C%B6T8B~`sk_UCromyhRN?LiqrgL~m!FKPUnwOe=WUwfVD@^5lTW>%W> z{Z;Xc92wqmN_6T$23UAKtw^XFYS4 z%|>d^fhFMtu7GkI<*Immk5A33Ti(ab_%QPqdAqhsG0`6vSueZEz8QenIGyNWQuOjT zPpijj^UJpjjF9*9(XRul8x&Zbw8;zZr}trW6Iyl>^WErkr)H^$l0CWl&Fpnf0Co*4F;1hUHHM zJ#YW|wuscsp z?Km!l|9vojhhLcGfO?s(@2O^fh@$S#E9p?}b|dUE-qEf{k9xE4i&nmuU_y=O$%Tn@ zp4N+&4SCK>kKx^CL|>PU$ZxHiyT4PqJv`j!W5!^q;`nZh?`!hIzr4HLZlE!bUqKaz zJLoH&yd(RdNM^Ih7z@HhqTE^A%PH=AI=`O#swoIOuJ?}AcZ=5lRwj-0e(uRn{bd1N zyM29@1RDzCYJUPn{)v+m#qi2>Z zP9X9T_jjsdF@of@Zds=5IE+5HxAT1yRuYq$D?$&{9g)jD7nExqRu?(?v=m5)0oS<)ig0&u(6Mo_zV`m}eAbyWTCfL4ek}sAoM_ z*mlOY_3eC(!ry#-_{;T%v#A4IzO&qbq~8grZlQ+!;@tJ>E;{d<%C4S+sz!hDx4LdF zyg3fx_um{Ry?WNvU9{_3NAB3p=QI6}hp(;YM0fn#gR`EG-34j-o=-R&lsKM(pT};t zMnFBqm%p}6Um8Yxy#X&V$<6Ng{%J!ngow5C#k|^bSgk9yOW{}DXP1y~(;thA`tMhS z`96PI0w*t;uL38`X8Z?J*z3--<*N?1UEkL>X#-RA96lv?zLwE>QQfz$0)!(%YRIn| zuV1#$>Us+Xen0uWSE25>R>L;0;zfHpjkJqPmiBewCAS(y8g;?x%>%}Bzig4Q9KSGL zi3Y4Qe6(^~Ff|rob8a#i7?M~y9KqD`JYvT7pynW$MttRP?qO6hb=Ek zTB2l5YpHXROokz->&nb$NLIYi!JTr+MNBOtwAxW&s@S~MoF_m!@HauTpKn`F$9Dxi+jB;UC-uj?uha)O@Y^_bND_2dcBvEm#orzAuHn>+^56|HoUlzxR2A{bPAwgb^0ud!N6a?-U#2 zw@zJb0SaQ}7*-PMhwT7~SgZT3!E?jDSJ{e9CBv0-1r%*}wrIy~ADSZXra?JD zdMq=?$sUWt`)x9N`fccU(OHq(>V+!%=JQUq9&qOSy*Imz?@VWh#_M&L=T@?t%tsp? z4KK^rd-BPOPm+_6#B18Y4kp@3AJS0+2b3pC;svNAb)nE4qkru$&B#7!F`}etFym-o z=F>go!F6cxj|4%~c`dI?PILc1gJnNq4+}W%*&vH^kjUkGclU$(yyd)(YQCO|cv~}9 zb$O~;9PGH&7dad!D*O2zTOb3h;D$-)4ExP`WM_SDy@ zA3mALM4?ZJygZ{?f>h4slZSR~ej`J4qkcFi0HIjxbH!a`_;sq_(vSKMoJ=B;3E`%| zWqIfu`6lsk`uiI$xe6*;*`Q=hVQ+&b(SByy1--7_JnPmiPuQ{_O4f$5k{UT)!7|6J zkd{Z&mOVyaEI=(9bLZ9=FBvW=Dm^gKS)lU}ojiskxp5 z`vR^(Rf=JRpt)EBv_w1M1<S721o|M zA#RH&`Yb^!4wd%C^_~RmV!`=fhC>swK>ApTZ@_CjfiyjEiao2Tf=I9xMTidlSw^Yp zq+o$R5Gv6sI}jPEnuA5164mD)}Zs1tvNl{7)rU+M?it#wohYs7?^c1#m8B6R|Hw z+*O+FoM*?4(xB24vx0E|3E|KRlz;Y_K;XP?73C_BI3|8D2K)&tjQgR2K;{U5hx)vc z*RQ|ggY?@CL4^vSRvVKV&WKu8r~uOw5a6{z1B2nm`}~U)-q-k=F*1uFZQ~=6%Dc`8 z1*W=?rWqSg0fOoOau%Il>#=nf4^EGjTHYHve)1ex5O#<2IFCd4Qzm|y2L@W@YHt3Y zZoYMG`%w=Oszuu6gO37Z!HE1#E+_LVJ!UW#Dj2MR&;vNZ#)nMW1RozG)MMU(?g#im zz}zrtd-%a_n1N=2p$_Z80pJeE|ZEJdbt_sKdoxS3I9uy~c5u;e4tNkF*$y*TFN2{zB zur*hSSl%^JM{i0K8&eRl%muz8lk`zeswDFG(mqIF&J;S;Nd__G0S+J1-3(zQ5}tsh zWZ|5(is(=RDwwmDD;MGX79RoM7G-RR0Uj*32^A>Fk)teu9(0mws-+aRv<{oD>Jtm` zxdK-SX(-32=$eBb;mvKJdIT;jE4{3Xpr==ct8ppVU$cM#^#z^Pbzd&bK*Sk>s5r`; zRa5R`bj$+4=Ni3Ym^m1JiqL42DC{;_Ns4cpa-UBW*tB62A(ayifOU;jPI8Ty3^37x z>v^O2oR3h&O(YF*1ob~Uq!&!5Hpl&F8$K|t@yg$MOZDb^xn~x#3`Le7GKR&F&0!3? zO9?&`G{p(1<;no*k^uuYf;}Khr$k=06n!B7Ks97i0#PDDCxam=CXKVYz|Imn?d zDNZqj!Ks#muj<8GTrIw#<>nuNifQXce`zfw{{BfK)9n3?PAxcljicw?YO{7nqek2N zu&iB%#|eG`Jze8ouD+$`YxI{2T!vbR3M=-GWZtsSF(geA&2d)-X3;^wJ$4-WX;~}9 zXh{6+ns6_LYjQz6*>0*C0opaH{7HDzZR5(}HPf7<2pp4hUV_PZ>(cv5(9~(mb;WVI zv(hyv5=2X_eil)oR*m@_nyc=+38-udV=pdjk^+v4W=+XbLPT`o?C}CD-cyPa9$SE$ zh!F`t3~`VsDWtD5k7xz^g@WxQ>ZCT~v=iC#D4s9mA~ppXWf{ltma-%|6g>G4i? zTsMd^o_(GoFdbkE2IK*h>o7wTFt@M~O)Zju2r~TA}3OSf>VP&>8tYXjfREYW{*M(3bg%eAtBH4lIKxtcyk$~`17#-eds3Ba)&F0-Bh5xAcGn%KkHfAVM57L z4)&2-5c9tB?>^IQU)?W{+E<=UYS1i%QUgvtLdQbaVAupye7rnbzbTtB{O=qT-hYp) zNA@`&2_$XyWAibLiGzNjDlb7MwA^DTE`V@3-*a(T3#?KOd}Pt(kKcIrCl*e3Jn_%W|pgy z=NWu>@>v6u03n`Ylnrw`8E(aB4n5Y?g=dW0I0q<*8oaNz^P=s{jvIkMx-{c5q*PR6 z7Gmvq^~3=Qqg1V0DUO||q+dH6!#qNM$dXg$02XP4W6+eVnO$%sHNVlRPd}|ZmkUpa6fmZbOqkV&=q1xl4epsJXPz8}r+uoaDP3&i7 z^Y>j@lr=(L+rp!uSNwVF4o&yX2Mz9baUnAVQ=K8xMd)_h`aM$gN@|7S$OMi z#MqQ8iA{&kp_UczXuL;5q)}ToKeM_+$8~SY}AF?m4A_jkuE%cih+7LGM;Z8ud z=Y)SQwE1atgYPukt=1#QbDC^p@rZgXti#)H5Zi|3*fx4>j1)hx%NSJw+s;@T{?+RC zyvFarhVigY!hZi8CbG%D8SbHJO@*q44P16*S!`sx|LAbT{e1j}`ERwC<+^2w$11ea z8^fAojF9+)0l^jV@~t;BEj76v7lc1OJu!H>?Kw;54L^v#xk2-F3Lqe-3+8zeQi2!O zax=T^S*X$LibeX{^&c4EbSMxj>UvGh8SD2*f&JU`KtLG6nV1USwXs6>HBwld|4v#p zbGeHHpilTRgyOboujWFc429lzfRn`9s@L?dq||D3pb90+`-SYN zu{z@P5hC;k7&I=mzKJsbYxQ%)0?R%HObv$kTGp{`%6v6)8#Ja+3H%=~EyFYP*jrmH zrsIm+8wu-Z&``#7xNb1MHZ}fCds@KMnAFvTBC47TEYxg%*a?1OsgMUYjO$vzfvw@I z-ZlO^!apN1>VWBOdNu;n)hA$J%$MbKKCWAnGJ#P8)gCNadQ-i8Bj_89PJaDPrXYOD zBJF}!4W}cmNcBShL_%Y6L-Qd*hT@|u4h2AbXm8UP2Pzf&g$=9^a2n^5tXBJ^enXD` z&$`IIN80w14A*f!8gs$9Yn9{wxPM5_6*JFvrnG|s8nn79(5sWrVBDJ(MrasE7KC2D z6O*PvTQwA5wCZEL9td$6H@vv6I;(|M^7 z0sPB$2}v1?oh}I3KPj|b#>zse?&hv>2);17obtO9Z>Z}fhjCKU+-M+-Z<0|7)w8$O4}=$1*rk zL$IxIA1w<{x!0C^4cxYbnuAR(Bv@9V^e86wBx;b`DQQ*GTBAoZ+SP#5#0V+x+3h0I zSWj_YXRF2YHPD1ONcONft6EJqS(ij6;-=wabEJ+^#lA9Su<^%#C?Ef8+1Mb~L!)Aw zy-QU2YNHpq<}q02p$4_}D!)X?%CiMI4vr}XJ49fEl6CcbvFiO)5JXzg!6n)W8laNQ z>A{bK3PFm+xr1QLc15Xgg`}yljkTu{b*gILoV4sf?_Cp+iMF!WB)c4FpKFBWk8Hq0BfAwqm0mK#`&~lyXBodYuI#9rCn| zX<5d-Fm5oBm!IkD3uso8q6*Q7@8+OgoDlopb@I=DHtM&F>Sn`=!NthOAjWTQ9pQ|w zF2=}|>!*y3(JvQ*574|ya~6*Tp4HKqg|CN*0hjJavX5vDAv)>0d67EHF8?~PBuOHZ zq*CdUmg7a|9K?wgs|mwdoie+7znfu*GIH*a7;i}X|93gWMNRqfJ7PTB>L+1~&Q<^u z28b`~t)=7i${+*bkE-yUJjWP07~%|oXn{wR;TD z&%YO9pwduCWlqw8MLKLH7{=lK+azpuP*^Vd1!io2C)k0rfUwD(JpY#0qX`@mQED9J z-uz$XmAo&USI|5@gJTu2%dAzBNoTBCgUwk^veC_>XO zs_MFjc*}^jqrFR--f&+pKfYOnU+;JBo1PR!Wa^n{AgJv@C2i~0M}aL^hZRp8Rv>W! z(xSjDpZVRN{x##5kC$!Rs}4gL~-rHq+G03l|@*Dwne;(^^*if0@QNiyOs`6XDx z$}$0`7%rzno@HV#szu246)(S9E|d;aQXKh=#9%Ykx9ufT$N&2c>~P3=&8ZVMz(W})7`-`j;aw0_(3n)l_)TLNh~ z9R0lw=gO_ip+J^^%5yrnR|E*4-RaPXYU)>LJkZ5M?e8w+m>}mVvt%YUwBh@cg$1Zz|Zo4;lmCf0C_#Tyoh3uf|bKv%^uYJ4oL*EK=Wf7MNq-KsQvybFuDCU*%xv4G9=^7>H`(|t}U5_WxRYq5|wf}Xn8f~d}yEPDSh=T@aABIkoOQO z80^NN*;vCuf{HQREFBaHqjG%(-w^>T6zr}854NeSLiq88UcMuiU1DsQ(RDijU8nHX z6{+KI4m(aPt1Pzh_s5L_|48mj@BDZ4VDl5IdZxD-!&-QZQ6GMiNLuaB@~^-@zSn2R zML72=*v4H?M|s|MwCXV=`W zUI8p%mCKtx;NqXIrrt2@JH_IPZav@Ax4Q!x_-sMogQ0DGkcQ z=bpi|w~C$J8T&zdVJ>pxL6Q7~H(|Ht_8WumiFB}CO&hNj@(AkiFA=GV<}~LXwKv!J zp^L^DzD1`IiCP$9RAi2(dS3@yCe{utfsWChaN#A=I-bueh#-1+DQ7)!2XFgMc8=~V z4n0;$C49Eort&-CS?T4IXeAu@U)N}Y!8BUBb4JN1zGgxZv=h{+Qeep;>eYv=BPl4c zxkh>|J0i#mQj$~$a7bUR%eCgbjgbhA=WhSFIr0#oBOboe17Xf-2~kBdNfdEp9kM*d zlveCdpJqAliQ##k(O7ZmXeX5Cs+=VW4Xc_Ztre?g+KJ*6P*70ID9^)*G&*G|(TPYT z6gmni%QRCV0JY)!PaKowb*U2O@5s6U)vk%>mggvkLUMj%Big*|UQ|{>KIc}7kzVqY z&P0?xDaPrtCRHG}WE~`VKtt50ahk?$7znC@&chsAAvasmc(g*5lQ;%ud*@u*`k|-P zXfu**Nll%aP1{8+3hRQxy2hEZh2wbxX&;(6R*aOZuQ+AOtg*M3Uv{CbO?=wBB#l8o z&lKC(X7-^OTDQnl{hRSE3Q($$$zU{`-J8OSo=9qbKg=a)vC;oelzlBvDgYH37ys<9 zh?X*M(KiHc=wY>BRl|ohggf27Y-umrIBn$Q!4XHgOj;$>tY!T(TWK6itT^Q-PHcnm zs8!8e(W0Ddd<-I!7ZxWP$5D58w@`#tGmaz%gt2qZT|a)2>o6y#(EY;$H1YRTrI`lD zH53%xf>HmfydB^YhB`Yv9alB0-Vf0-hE^a310s#l6s5Yd!ibw+L@mfYImK4K_IZgC zW2-Q_DEMhk`!r6 zat>Mu>g4p)iWP?mlag;CxIl_EbT@`fxM}R8UG@{8wAfq-?-00osex^t14k+ zQCh0Gbjoa+vfKxdRw_lM(s=oYjRPiVezncsCx;`v+F0>y-Fs(cWt8*k>Z&Y743%X* z34T6av`n4CoPHw>%Ek*ygynmyPE}`6AX9|P+B2HQOMhpKpL9qP3ohU9uw<3$T$}RU z5v5s+&MRe~r6U(AWUhCQ`(VY=p7SV%Y4YZ$Y`Ob3@;*(flp@-Lm#={Vk;s$|-1~5G ziQwz=@p@!jj)feyan_XCxo=jfW}0ZaZjQG0U)}mSh^e~c<=gGiq!G-|xV(U$>z*?b z(E#AaW{$rZiUSp8DJ*07rV=G=31=e3%YX}uYUCuQ-B7g{?*o_S<%68MC8ZMPtL9w; z6+xzjsz&v9>_TIj{R3Vx6e`iY=e_K;G7~ z;!Dg>P)Gtr{oeeprz%vYS*7`3??*+^(p0Kwp((#8qmDbH2r4qFOkz$>P9h&Ol`8e> zMmS~IQ3%1jB{^>q+}0qVh&P7g{MwQW<{`qijh>v zW9kLw4@2(mt6BK4G+W>l7^{(vx!ows59K}%a&Z<_K$%a-KtTrOl zHa<5Q#3-)c+QZW?H_}$AF}Zn;V4DviotmcWV)$2bydUpJ)w?*1|FZmcdeH(o!!b<3 z!1o@#aQ-kGCgFN+UEki`fK-%7?L60YS(9nuwd1TdI`6r_O;H0Q2x(t5HW?FNW5R!- zh0^GPpyi%81}j&azMN1jd$(ypu4?6M`>oFZ<7~-_4dOG$IoLeba7d7p^wIuXB0@6B z<0=$sB*VgZ7_DKo#=>gImCo2^sZv#uheC-_1lR6*OnAp6mK>BM z&;`?Rx<*aScrO3xF^Z=4_(JzL7WY|oBkl(%(CpGuXi$m00T2+%our7M%8#@la%ib% z4+m&W&phc&uLY($%O+%Du63(EV|fxg%RDX+0?zNDYiv8P3Bte0-@^HvQ9c~-<@yg-siA6}=J^R07 zk~17B##cQs*jaw@->a1jA%1RQXv)xMt`Ovq?bMiUfaSw7wYpLpbnKYA}xXi7H zXS>0JB8KOW9z_yv@0HCBu@I>5zb4A^{a#Nr6Z0Q#8p~v}M@o(_E@BOpc@BF)Vh!P& zZB$4Ylb|?I(tJE%PN5w=Xht;QDC#h`Gipr}hE)wa%^e+=Au_e{B!B$5(6Y^ z1~E65wfzRm?`l{Z#VXr-6Kmgf92iy$7tU%?hqtnc##d0%G6MS>Euj+VZf$`zRY$|N zR6hUPZ7x|+qAt~W`J8y)9fcVbNSmuxD;=fzB%#qaF`K#794KS0t@zL)=z&FIYiI|T5lPrJ2 zBSlnlE?GU~I8R5i!lvsuNqXzhx0Pt+FB{r4Z`8h|i>J%1uIfobFknMxR*q=dXOYNO zv&E3wf0(Are;rem{gCupUdwO0pO+4-r&ZS>Gc=#<6ySO#{;KorXy!{?Fpk8`C;`|!O!YKb=_!Ermz4sZVRuC~a4l%I|J#)NMgHEOsPCM!D5vb2Z&U02H! z!=t`$#_wl5j4~Xyrm?jb`vV?@q?e(3-eOu$Yo_VIfO$E0cXzVpnP0TB3yJj5)hg6XUSpiSf0Cq) zZq>*RcQgQ0Z;B+>%%qIRYNPB7g{oYOemJZx5N{ld^EjKUUMwDentLhv|0j8W2L&_I z+=pl1L_&vcUY1M({F(-EIiCSlVMfKhvX#|0$I?yC;WQ;VXmXl(83*PkD=+Wt?C4f; z@2Ame|1{gwD9S~vW||$vl181gx%ZAID<_zUkdPRAx{;MA!EzeHghQh0W`qQF*E!f^ zuxJNn&j4_<+MOS#(j=k_NoiJ*yqqHOFZ{m%^9&60FwZtPOjM(8S5d|MkvJ&a7zT*2 z6nQg|9K6-a2#z(C%|^3cug9{3kiPXVKx3FgEt{1Hj0gf@dLSMrAuP1Us@_m1jVHs2 ztbIFSgVhsTyDMakZG$se_&OZ3-LU*yB2XewBG3T>X(E;{dp=2$NChf5GrC9<6w!%E zr5;NW_-?b;Kp=MFE5sWob%3PU98DA7dPft(QXy$nyGrA%_p_DR~ zD6VzfjrLRww|Msq}HmjE?+OhjrXd}PjBjK zUPsD;fFK|UT#rE4bODM9{a9%4ainkL|WtR&O8SO8RfoVC9x?H4FGDi zM!U^Gs_tWg7-Cu0-nVG9ifY<=V_T0k;t_GZURPDsG!5%V@S1hI>v`}{N-0hW$=QLt z_smecss2F+FL{A9el8{XS&m^ky;qMMmC2S90I)7A+n_N<&gVUSJl=b*z)*85PMe5` zEU00OS+CbcQLvc))b?JZlFEX><3gY;T-P?s zek5u4F_4{75wCqaHWC(9(K;1JpGav60rVt}Iz0gKw^E`kJ&FWQwN{oB{B?d9W71jp zG{rOq`oRQRvxEd@Q|{_jYr9x1>Uxnw8a3&hl7Qi8jN7Z3hZ2?2<2V4IF&HB~NsN$_ z0+rX+=T;Br_2lH~dVTI(>3yFPG)-e|5rPLmYjxAK*jS6_LQ03YK4K<;knh{qNoD8o%@-2nYh- z5d;!IwKyU*2Gm;Vp$}CJK2UySrBqcHn`X0m@|1Iw8H?F@w8QDz>P}_p2Q~Q7(7Tj- z+F9q0pVBOtkL(z$Co}D^Fpf}Qi3jV+G~cS6H6zj!P{M7lpww-h&)PkdVhCVtQ6E(R zRS2+LohURz*8!y3mdn*ih;V$eqDX?&DKyI!8NIh0mpBk66D+sXm$w9gw*UcL(RXBf zBnTWQOlcOjGebWNtK;L*`^9nzDb+{x1sO;3+bgA?J}Yvt4pi6kB`$lG--3W3APBrN z0z(AU#$~5d7{CuuRYxJbPzc`l*6H)})8%rRl(LSJFYn!u_7iz~i(koB)7TB;uYdE~ z6q3avCE7q#Mj=LWgoXVsxJRaWamHxg6XeW*H|-COS(%^5u4+tLAgA$s3%k%fR`t54Sw8 zZT`kDhVV5HmC1C7`0?-l*tRVIR8`e=U5pg}$QJIDTKsU>DIbgm)4%x2p=o^BR;~yF zj~oGZQ>ldHS5KK&zze^^nipT4r8qigR0^eY&!0bk_Rf>m4@#-JUi|al|EcSRF|KQe zqAJJnl1Z_RvYv>m2QK$V4w(#J5D*032m(<-?+51`B|*-Kp~rDtEEbuO6)c%zpdk3Z z?KYdICr>c%;?0Mu`jo!-;vas@TAfO-R*Nsc{MYLE2x2e_Q&6M@nkZ0vOvCBvX-7Py z+omuM#N$cx7NdbZVG|#X+4@>*PPIKB;=?RcChY9o8iv8-qwjkTeq^nVF&`6;{wCL* zF(!mC8KzVDvDlpt^V5-0Jr)E~3fZ%T#Fr05Wl)L|S6hQa*VlEaQfxQtzkc>-Yi-~6 zN#hX44}bB?T+^mVdy9FwqOTn9Th=_AT(?bDj|C+eryw8*JOl*L(ClPTs{~!s9o0E- z$Ldc$`BQ+Tt!ewt+47^0e$_S`L}SUtbu|SUKSGQYeyG6oer%d%dAxE?4_yn|q>xDD zMk^vyMCHd|Y&CB`LBO*l=^cos`Pu;!0+iDcROY@Jq;OFN=i2&mQ4n~W5C}j<79@q_ zOx}?)%Ct-tzw##)>Rg+FOE4`l#(%qNrME zJy;9p7j0P`#gr!;ho~t|1?_xlWAax11_^)bt^1pi2NDF{3<3(BA(e+P_yp*xvgx|T z(Xt=fgsLCO*kWo{S(Zj!$Cqbq3DhaYF@ZA13?zVF0mQ*4#B7c!1&GndqNwh?-*-ov z>Z}^wWhZ#@&0u`sH1RfIt z#Bfj9$eOv_DWjqy&8ELr1JDP?V8joWNC){-#91?rBrIbdW8TXe2 zhO3cmSzK2aq$CIk0)oJ+ATYPLki1b5a&(T$j`oyNQ4}e}zV~%q)7(|;@ZIm~tYWbS z(zcgb>{UK4X)6c_0y_v??fuQ|Eo~g<#nM`zeRGP4@4WNwFmwx7P<)VfMNxPkII^V3 ztks=fi6?Otu(DD=20$7DaJ!(Kx3v3(F&77>SrVzsa5K ztw|Y6?5#O=QWgXRfmcL;!(--_7Aur01Y=D0$(xg>PtGq+b0S5H+OF4YU6KSuO5_7G znJvL-&cw!g#g9Xp3j%_`EeMdn7J1?`(R{n2Qve!L0Ko6R`-9U{nyKoe<>*6BX1LSY zo$M_Z)5FfHV*U1cAFE!2E~pe6^izh=66SMZ~V_s;VN-R!Ex2 zSv$@x0Jy8Y#ls=p`u!g6I#8)62nYg#z#an3Hr*zbp84K&X2FxZowYeH7D>#I^usV5 zuNF%E{79lU({WdOD+{1g?=jviB{lUb1wlX%5Craoz}z;vYM>Np(*S_?zAQ`5 zyFd#>O%XuGkhYEYewM{yJ}+J0=T+}g5(ESRLE!ZvFpk7+V5`d-cXoERTCFyljj=lt zS2x;Q%-NzvWlAbLwKyZqO?vUKZ{*UGARq{QcM!PZ%ae%R)sa=^^TKhf`InVTF-!DO z=yXm_%8XLdu-WP)v!ylfb6&pcT}pz0ARq|51_biFq_eQY7=zIy^-z{2C;Ho+)8M~! W(P=HGmj~wn0000` to ensure Tailscale contacts the correct control server. +- `HKLM:\SOFTWARE\Tailscale IPN\UnattendedMode` must be set to `always` as a `string` type, to allow Tailscale to run properly in the background +- `HKLM:\SOFTWARE\Tailscale IPN\LoginURL` must be set to `` as a `string` type, to ensure Tailscale contacts the correct control server. + +![windows-registry](./images/windows-registry.png) The Tailscale Windows client has been observed to reset its configuration on logout/reboot and these two keys [resolves that issue](https://github.com/tailscale/tailscale/issues/2798). @@ -37,6 +39,12 @@ in your `headscale` output, turn on `DEBUG` logging and look for: 2022-02-11T00:59:29Z DBG Machine registration has expired. Sending a authurl to register machine=redacted ``` -This typically means that the register keys above was not set appropriatly. +This typically means that the registry keys above was not set appropriately. -Ensure they are set correctly, delete Tailscale APP_DATA folder and try to connect again. +To reset and try again, it is important to do the following: + +1. Ensure the registry keys from the previous guide is correctly set. +2. Shut down the Tailscale service (or the client running in the tray) +3. Delete Tailscale Application data folder, located at `C:\Users\\AppData\Local\Tailscale` and try to connect again. +4. Ensure the Windows node is deleted from headscale (to ensure fresh setup) +5. Start Tailscale on the windows machine and retry the login. From dd8bae8c619e2453d01a41fc52706789702f639d Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Fri, 11 Feb 2022 18:39:41 +0000 Subject: [PATCH 27/57] Add link from the docs readme --- docs/README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/docs/README.md b/docs/README.md index f42d67de..f8824a97 100644 --- a/docs/README.md +++ b/docs/README.md @@ -10,6 +10,7 @@ please ask on [Discord](https://discord.gg/XcQxk2VHjx) instead of opening an Iss ### How-to - [Running headscale on Linux](running-headscale-linux.md) +- [Using a Windows client with headscale](windows-client.md) ### References From 8853ccd5b4b34b4a4a7085e3ab0d6fbe632cf9f8 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 13:25:27 +0000 Subject: [PATCH 28/57] Terminate tls immediatly, mux after --- app.go | 178 +++++++++++++++++++++++++++++++-------------------------- 1 file changed, 97 insertions(+), 81 deletions(-) diff --git a/app.go b/app.go index 08815889..b7d71c32 100644 --- a/app.go +++ b/app.go @@ -35,7 +35,7 @@ import ( "golang.org/x/sync/errgroup" "google.golang.org/grpc" "google.golang.org/grpc/codes" - "google.golang.org/grpc/credentials" + // "google.golang.org/grpc/credentials" "google.golang.org/grpc/metadata" "google.golang.org/grpc/peer" "google.golang.org/grpc/reflection" @@ -418,14 +418,65 @@ func (h *Headscale) ensureUnixSocketIsAbsent() error { return os.Remove(h.cfg.UnixSocket) } +func (h *Headscale) createRouter(grpcMux *runtime.ServeMux) *gin.Engine { + router := gin.Default() + + prometheus := ginprometheus.NewPrometheus("gin") + prometheus.Use(router) + + router.GET( + "/health", + func(c *gin.Context) { c.JSON(http.StatusOK, gin.H{"healthy": "ok"}) }, + ) + router.GET("/key", h.KeyHandler) + router.GET("/register", h.RegisterWebAPI) + router.POST("/machine/:id/map", h.PollNetMapHandler) + router.POST("/machine/:id", h.RegistrationHandler) + router.GET("/oidc/register/:mkey", h.RegisterOIDC) + router.GET("/oidc/callback", h.OIDCCallback) + router.GET("/apple", h.AppleMobileConfig) + router.GET("/apple/:platform", h.ApplePlatformConfig) + router.GET("/swagger", SwaggerUI) + router.GET("/swagger/v1/openapiv2.json", SwaggerAPIv1) + + api := router.Group("/api") + api.Use(h.httpAuthenticationMiddleware) + { + api.Any("/v1/*any", gin.WrapF(grpcMux.ServeHTTP)) + } + + router.NoRoute(stdoutHandler) + + return router +} + // Serve launches a GIN server with the Headscale API. func (h *Headscale) Serve() error { var err error - ctx := context.Background() - ctx, cancel := context.WithCancel(ctx) + // Fetch an initial DERP Map before we start serving + h.DERPMap = GetDERPMap(h.cfg.DERP) - defer cancel() + if h.cfg.DERP.AutoUpdate { + derpMapCancelChannel := make(chan struct{}) + defer func() { derpMapCancelChannel <- struct{}{} }() + go h.scheduledDERPMapUpdateWorker(derpMapCancelChannel) + } + + // I HATE THIS + go h.watchForKVUpdates(updateInterval) + go h.expireEphemeralNodes(updateInterval) + + if zl.GlobalLevel() == zl.TraceLevel { + zerolog.RespLog = true + } else { + zerolog.RespLog = false + } + + // + // + // Set up LOCAL listeners + // err = h.ensureUnixSocketIsAbsent() if err != nil { @@ -455,7 +506,35 @@ func (h *Headscale) Serve() error { os.Exit(0) }(sigc) - networkListener, err := net.Listen("tcp", h.cfg.Addr) + // + // + // Set up REMOTE listeners + // + ctx := context.Background() + ctx, cancel := context.WithCancel(ctx) + + defer cancel() + + var networkListener net.Listener + + tlsConfig, err := h.getTLSSettings() + if err != nil { + log.Error().Err(err).Msg("Failed to set up TLS configuration") + + return err + } + + // if tlsConfig != nil { + // httpServer.TLSConfig = tlsConfig + // + // grpcOptions = append(grpcOptions, grpc.Creds(credentials.NewTLS(tlsConfig))) + // } + + if tlsConfig != nil { + networkListener, err = tls.Listen("tcp", h.cfg.Addr, tlsConfig) + } else { + networkListener, err = net.Listen("tcp", h.cfg.Addr) + } if err != nil { return fmt.Errorf("failed to bind to TCP address: %w", err) } @@ -463,6 +542,7 @@ func (h *Headscale) Serve() error { // Create the cmux object that will multiplex 2 protocols on the same port. // The two following listeners will be served on the same port below gracefully. networkMutex := cmux.New(networkListener) + // Match gRPC requests here grpcListener := networkMutex.MatchWithWriters( cmux.HTTP2MatchHeaderFieldSendSettings("content-type", "application/grpc"), @@ -495,46 +575,7 @@ func (h *Headscale) Serve() error { return err } - router := gin.Default() - - prometheus := ginprometheus.NewPrometheus("gin") - prometheus.Use(router) - - router.GET( - "/health", - func(c *gin.Context) { c.JSON(http.StatusOK, gin.H{"healthy": "ok"}) }, - ) - router.GET("/key", h.KeyHandler) - router.GET("/register", h.RegisterWebAPI) - router.POST("/machine/:id/map", h.PollNetMapHandler) - router.POST("/machine/:id", h.RegistrationHandler) - router.GET("/oidc/register/:mkey", h.RegisterOIDC) - router.GET("/oidc/callback", h.OIDCCallback) - router.GET("/apple", h.AppleMobileConfig) - router.GET("/apple/:platform", h.ApplePlatformConfig) - router.GET("/swagger", SwaggerUI) - router.GET("/swagger/v1/openapiv2.json", SwaggerAPIv1) - - api := router.Group("/api") - api.Use(h.httpAuthenticationMiddleware) - { - api.Any("/v1/*any", gin.WrapF(grpcGatewayMux.ServeHTTP)) - } - - router.NoRoute(stdoutHandler) - - // Fetch an initial DERP Map before we start serving - h.DERPMap = GetDERPMap(h.cfg.DERP) - - if h.cfg.DERP.AutoUpdate { - derpMapCancelChannel := make(chan struct{}) - defer func() { derpMapCancelChannel <- struct{}{} }() - go h.scheduledDERPMapUpdateWorker(derpMapCancelChannel) - } - - // I HATE THIS - go h.watchForKVUpdates(updateInterval) - go h.expireEphemeralNodes(updateInterval) + router := h.createRouter(grpcGatewayMux) httpServer := &http.Server{ Addr: h.cfg.Addr, @@ -547,12 +588,6 @@ func (h *Headscale) Serve() error { WriteTimeout: 0, } - if zl.GlobalLevel() == zl.TraceLevel { - zerolog.RespLog = true - } else { - zerolog.RespLog = false - } - grpcOptions := []grpc.ServerOption{ grpc.UnaryInterceptor( grpc_middleware.ChainUnaryServer( @@ -562,23 +597,6 @@ func (h *Headscale) Serve() error { ), } - tlsConfig, err := h.getTLSSettings() - if err != nil { - log.Error().Err(err).Msg("Failed to set up TLS configuration") - - return err - } - - if tlsConfig != nil { - httpServer.TLSConfig = tlsConfig - - // grpcOptions = append(grpcOptions, grpc.Creds(credentials.NewTLS(tlsConfig))) - grpcOptions = append( - grpcOptions, - grpc.Creds(credentials.NewServerTLSFromCert(&tlsConfig.Certificates[0])), - ) - } - grpcServer := grpc.NewServer(grpcOptions...) // Start the local gRPC server without TLS and without authentication @@ -592,22 +610,20 @@ func (h *Headscale) Serve() error { errorGroup := new(errgroup.Group) errorGroup.Go(func() error { return grpcSocket.Serve(socketListener) }) - - // TODO(kradalby): Verify if we need the same TLS setup for gRPC as HTTP errorGroup.Go(func() error { return grpcServer.Serve(grpcListener) }) - - if tlsConfig != nil { - errorGroup.Go(func() error { - tlsl := tls.NewListener(httpListener, tlsConfig) - - return httpServer.Serve(tlsl) - }) - } else { - errorGroup.Go(func() error { return httpServer.Serve(httpListener) }) - } - + errorGroup.Go(func() error { return httpServer.Serve(httpListener) }) errorGroup.Go(func() error { return networkMutex.Serve() }) + // if tlsConfig != nil { + // errorGroup.Go(func() error { + // tlsl := tls.NewListener(httpListener, tlsConfig) + // + // return httpServer.Serve(tlsl) + // }) + // } else { + // errorGroup.Go(func() error { return httpServer.Serve(httpListener) }) + // } + log.Info(). Msgf("listening and serving (multiplexed HTTP and gRPC) on: %s", h.cfg.Addr) From 2aba37d2efc1d259f7dcd0088da0bb5f0c7924bc Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 14:42:23 +0000 Subject: [PATCH 29/57] Try to support plaintext http2 after termination --- app.go | 7 ++++++- 1 file changed, 6 insertions(+), 1 deletion(-) diff --git a/app.go b/app.go index b7d71c32..6efeec90 100644 --- a/app.go +++ b/app.go @@ -31,10 +31,13 @@ import ( ginprometheus "github.com/zsais/go-gin-prometheus" "golang.org/x/crypto/acme" "golang.org/x/crypto/acme/autocert" + "golang.org/x/net/http2" + "golang.org/x/net/http2/h2c" "golang.org/x/oauth2" "golang.org/x/sync/errgroup" "google.golang.org/grpc" "google.golang.org/grpc/codes" + // "google.golang.org/grpc/credentials" "google.golang.org/grpc/metadata" "google.golang.org/grpc/peer" @@ -577,9 +580,11 @@ func (h *Headscale) Serve() error { router := h.createRouter(grpcGatewayMux) + h2s := &http2.Server{} + httpServer := &http.Server{ Addr: h.cfg.Addr, - Handler: router, + Handler: h2c.NewHandler(router, h2s), ReadTimeout: HTTPReadTimeout, // Go does not handle timeouts in HTTP very well, and there is // no good way to handle streaming timeouts, therefore we need to From 811d3d510c6788779c9fddd25a2523e9329bb510 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 16:14:33 +0000 Subject: [PATCH 30/57] Add grpc_listen_addr config option --- cmd/headscale/cli/utils.go | 3 +++ 1 file changed, 3 insertions(+) diff --git a/cmd/headscale/cli/utils.go b/cmd/headscale/cli/utils.go index 9e2c54cf..eca43e80 100644 --- a/cmd/headscale/cli/utils.go +++ b/cmd/headscale/cli/utils.go @@ -55,6 +55,8 @@ func LoadConfig(path string) error { viper.SetDefault("unix_socket", "/var/run/headscale.sock") viper.SetDefault("unix_socket_permission", "0o770") + viper.SetDefault("grpc_listen_addr", ":50443") + viper.SetDefault("cli.insecure", false) viper.SetDefault("cli.timeout", "5s") @@ -278,6 +280,7 @@ func getHeadscaleConfig() headscale.Config { return headscale.Config{ ServerURL: viper.GetString("server_url"), Addr: viper.GetString("listen_addr"), + GRPCAddr: viper.GetString("grpc_listen_addr"), IPPrefixes: prefixes, PrivateKeyPath: absPath(viper.GetString("private_key_path")), BaseDomain: baseDomain, From bfc6f6e0eb52a348b7702ed7630ef1f60397dd85 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 16:15:26 +0000 Subject: [PATCH 31/57] Split grpc and http --- app.go | 105 ++++++++++++++++++++++++++------------------------------- 1 file changed, 47 insertions(+), 58 deletions(-) diff --git a/app.go b/app.go index 6efeec90..bf07172b 100644 --- a/app.go +++ b/app.go @@ -27,12 +27,9 @@ import ( zerolog "github.com/philip-bui/grpc-zerolog" zl "github.com/rs/zerolog" "github.com/rs/zerolog/log" - "github.com/soheilhy/cmux" ginprometheus "github.com/zsais/go-gin-prometheus" "golang.org/x/crypto/acme" "golang.org/x/crypto/acme/autocert" - "golang.org/x/net/http2" - "golang.org/x/net/http2/h2c" "golang.org/x/oauth2" "golang.org/x/sync/errgroup" "google.golang.org/grpc" @@ -71,6 +68,7 @@ const ( type Config struct { ServerURL string Addr string + GRPCAddr string EphemeralNodeInactivityTimeout time.Duration IPPrefixes []netaddr.IPPrefix PrivateKeyPath string @@ -518,8 +516,6 @@ func (h *Headscale) Serve() error { defer cancel() - var networkListener net.Listener - tlsConfig, err := h.getTLSSettings() if err != nil { log.Error().Err(err).Msg("Failed to set up TLS configuration") @@ -527,35 +523,22 @@ func (h *Headscale) Serve() error { return err } - // if tlsConfig != nil { - // httpServer.TLSConfig = tlsConfig + // var httpListener net.Listener // - // grpcOptions = append(grpcOptions, grpc.Creds(credentials.NewTLS(tlsConfig))) + // if tlsConfig != nil { + // httpListener, err = tls.Listen("tcp", h.cfg.Addr, tlsConfig) + // } else { + // httpListener, err = net.Listen("tcp", h.cfg.Addr) // } + // if err != nil { + // return fmt.Errorf("failed to bind to TCP address: %w", err) + // } + // - if tlsConfig != nil { - networkListener, err = tls.Listen("tcp", h.cfg.Addr, tlsConfig) - } else { - networkListener, err = net.Listen("tcp", h.cfg.Addr) - } - if err != nil { - return fmt.Errorf("failed to bind to TCP address: %w", err) - } - - // Create the cmux object that will multiplex 2 protocols on the same port. - // The two following listeners will be served on the same port below gracefully. - networkMutex := cmux.New(networkListener) - - // Match gRPC requests here - grpcListener := networkMutex.MatchWithWriters( - cmux.HTTP2MatchHeaderFieldSendSettings("content-type", "application/grpc"), - cmux.HTTP2MatchHeaderFieldSendSettings( - "content-type", - "application/grpc+proto", - ), - ) - // Otherwise match regular http requests. - httpListener := networkMutex.Match(cmux.Any()) + // + // + // gRPC setup + // grpcGatewayMux := runtime.NewServeMux() @@ -578,21 +561,6 @@ func (h *Headscale) Serve() error { return err } - router := h.createRouter(grpcGatewayMux) - - h2s := &http2.Server{} - - httpServer := &http.Server{ - Addr: h.cfg.Addr, - Handler: h2c.NewHandler(router, h2s), - ReadTimeout: HTTPReadTimeout, - // Go does not handle timeouts in HTTP very well, and there is - // no good way to handle streaming timeouts, therefore we need to - // keep this at unlimited and be careful to clean up connections - // https://blog.cloudflare.com/the-complete-guide-to-golang-net-http-timeouts/#aboutstreaming - WriteTimeout: 0, - } - grpcOptions := []grpc.ServerOption{ grpc.UnaryInterceptor( grpc_middleware.ChainUnaryServer( @@ -612,22 +580,43 @@ func (h *Headscale) Serve() error { reflection.Register(grpcServer) reflection.Register(grpcSocket) + var grpcListener net.Listener + if tlsConfig != nil { + grpcListener, err = tls.Listen("tcp", h.cfg.GRPCAddr, tlsConfig) + } else { + grpcListener, err = net.Listen("tcp", h.cfg.GRPCAddr) + } + if err != nil { + return fmt.Errorf("failed to bind to TCP address: %w", err) + } + + // + // + // HTTP setup + // + + router := h.createRouter(grpcGatewayMux) + + httpServer := &http.Server{ + Addr: h.cfg.Addr, + Handler: router, + ReadTimeout: HTTPReadTimeout, + // Go does not handle timeouts in HTTP very well, and there is + // no good way to handle streaming timeouts, therefore we need to + // keep this at unlimited and be careful to clean up connections + // https://blog.cloudflare.com/the-complete-guide-to-golang-net-http-timeouts/#aboutstreaming + WriteTimeout: 0, + } + + if tlsConfig != nil { + httpServer.TLSConfig = tlsConfig + } + errorGroup := new(errgroup.Group) errorGroup.Go(func() error { return grpcSocket.Serve(socketListener) }) errorGroup.Go(func() error { return grpcServer.Serve(grpcListener) }) - errorGroup.Go(func() error { return httpServer.Serve(httpListener) }) - errorGroup.Go(func() error { return networkMutex.Serve() }) - - // if tlsConfig != nil { - // errorGroup.Go(func() error { - // tlsl := tls.NewListener(httpListener, tlsConfig) - // - // return httpServer.Serve(tlsl) - // }) - // } else { - // errorGroup.Go(func() error { return httpServer.Serve(httpListener) }) - // } + errorGroup.Go(func() error { return httpServer.ListenAndServe() }) log.Info(). Msgf("listening and serving (multiplexed HTTP and gRPC) on: %s", h.cfg.Addr) From 59e48993f2f7ebdbb24ab063cebfa1eaba46a288 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 16:33:18 +0000 Subject: [PATCH 32/57] Change the http listener --- app.go | 9 ++++++++- 1 file changed, 8 insertions(+), 1 deletion(-) diff --git a/app.go b/app.go index bf07172b..987e64e4 100644 --- a/app.go +++ b/app.go @@ -608,15 +608,22 @@ func (h *Headscale) Serve() error { WriteTimeout: 0, } + var httpListener net.Listener if tlsConfig != nil { httpServer.TLSConfig = tlsConfig + httpListener, err = tls.Listen("tcp", h.cfg.Addr, tlsConfig) + } else { + httpListener, err = net.Listen("tcp", h.cfg.Addr) + } + if err != nil { + return fmt.Errorf("failed to bind to TCP address: %w", err) } errorGroup := new(errgroup.Group) errorGroup.Go(func() error { return grpcSocket.Serve(socketListener) }) errorGroup.Go(func() error { return grpcServer.Serve(grpcListener) }) - errorGroup.Go(func() error { return httpServer.ListenAndServe() }) + errorGroup.Go(func() error { return httpServer.Serve(httpListener) }) log.Info(). Msgf("listening and serving (multiplexed HTTP and gRPC) on: %s", h.cfg.Addr) From 30a2ccd9758c96efa42e2f9691f151be480ec5a6 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 17:05:30 +0000 Subject: [PATCH 33/57] Add tls certs as creds for grpc --- app.go | 116 +++++++++++++++++++++++++++++---------------------------- 1 file changed, 59 insertions(+), 57 deletions(-) diff --git a/app.go b/app.go index 987e64e4..8d228b48 100644 --- a/app.go +++ b/app.go @@ -34,6 +34,8 @@ import ( "golang.org/x/sync/errgroup" "google.golang.org/grpc" "google.golang.org/grpc/codes" + "google.golang.org/grpc/credentials" + "google.golang.org/grpc/internal/credentials" // "google.golang.org/grpc/credentials" "google.golang.org/grpc/metadata" @@ -474,6 +476,13 @@ func (h *Headscale) Serve() error { zerolog.RespLog = false } + // Prepare group for running listeners + errorGroup := new(errgroup.Group) + + ctx := context.Background() + ctx, cancel := context.WithCancel(ctx) + defer cancel() + // // // Set up LOCAL listeners @@ -507,39 +516,6 @@ func (h *Headscale) Serve() error { os.Exit(0) }(sigc) - // - // - // Set up REMOTE listeners - // - ctx := context.Background() - ctx, cancel := context.WithCancel(ctx) - - defer cancel() - - tlsConfig, err := h.getTLSSettings() - if err != nil { - log.Error().Err(err).Msg("Failed to set up TLS configuration") - - return err - } - - // var httpListener net.Listener - // - // if tlsConfig != nil { - // httpListener, err = tls.Listen("tcp", h.cfg.Addr, tlsConfig) - // } else { - // httpListener, err = net.Listen("tcp", h.cfg.Addr) - // } - // if err != nil { - // return fmt.Errorf("failed to bind to TCP address: %w", err) - // } - // - - // - // - // gRPC setup - // - grpcGatewayMux := runtime.NewServeMux() // Make the grpc-gateway connect to grpc over socket @@ -561,33 +537,63 @@ func (h *Headscale) Serve() error { return err } - grpcOptions := []grpc.ServerOption{ - grpc.UnaryInterceptor( - grpc_middleware.ChainUnaryServer( - h.grpcAuthenticationInterceptor, - zerolog.NewUnaryServerInterceptor(), - ), - ), - } - - grpcServer := grpc.NewServer(grpcOptions...) - // Start the local gRPC server without TLS and without authentication grpcSocket := grpc.NewServer(zerolog.UnaryInterceptor()) - v1.RegisterHeadscaleServiceServer(grpcServer, newHeadscaleV1APIServer(h)) v1.RegisterHeadscaleServiceServer(grpcSocket, newHeadscaleV1APIServer(h)) - reflection.Register(grpcServer) reflection.Register(grpcSocket) - var grpcListener net.Listener - if tlsConfig != nil { - grpcListener, err = tls.Listen("tcp", h.cfg.GRPCAddr, tlsConfig) - } else { - grpcListener, err = net.Listen("tcp", h.cfg.GRPCAddr) - } + errorGroup.Go(func() error { return grpcSocket.Serve(socketListener) }) + + // + // + // Set up REMOTE listeners + // + + tlsConfig, err := h.getTLSSettings() if err != nil { - return fmt.Errorf("failed to bind to TCP address: %w", err) + log.Error().Err(err).Msg("Failed to set up TLS configuration") + + return err + } + + // + // + // gRPC setup + // + + // If TLS has been enabled, set up the remote gRPC server + if tlsConfig != nil { + log.Info().Msgf("Enabling remote gRPC at %s", h.cfg.GRPCAddr) + + grpcOptions := []grpc.ServerOption{ + grpc.UnaryInterceptor( + grpc_middleware.ChainUnaryServer( + h.grpcAuthenticationInterceptor, + zerolog.NewUnaryServerInterceptor(), + ), + ), + grpc.Creds(credentials.NewTLS(tlsConfig)), + } + + grpcServer := grpc.NewServer(grpcOptions...) + + v1.RegisterHeadscaleServiceServer(grpcServer, newHeadscaleV1APIServer(h)) + reflection.Register(grpcServer) + + var grpcListener net.Listener + // if tlsConfig != nil { + // grpcListener, err = tls.Listen("tcp", h.cfg.GRPCAddr, tlsConfig) + // } else { + grpcListener, err = net.Listen("tcp", h.cfg.GRPCAddr) + // } + if err != nil { + return fmt.Errorf("failed to bind to TCP address: %w", err) + } + + errorGroup.Go(func() error { return grpcServer.Serve(grpcListener) }) + } else { + log.Info().Msg("TLS is not configured, not enabling remote gRPC") } // @@ -619,10 +625,6 @@ func (h *Headscale) Serve() error { return fmt.Errorf("failed to bind to TCP address: %w", err) } - errorGroup := new(errgroup.Group) - - errorGroup.Go(func() error { return grpcSocket.Serve(socketListener) }) - errorGroup.Go(func() error { return grpcServer.Serve(grpcListener) }) errorGroup.Go(func() error { return httpServer.Serve(httpListener) }) log.Info(). From 531298fa593181f0a07cc860ed9ba15c37a04850 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 17:13:51 +0000 Subject: [PATCH 34/57] Fix import --- app.go | 3 --- 1 file changed, 3 deletions(-) diff --git a/app.go b/app.go index 8d228b48..0444247f 100644 --- a/app.go +++ b/app.go @@ -35,9 +35,6 @@ import ( "google.golang.org/grpc" "google.golang.org/grpc/codes" "google.golang.org/grpc/credentials" - "google.golang.org/grpc/internal/credentials" - - // "google.golang.org/grpc/credentials" "google.golang.org/grpc/metadata" "google.golang.org/grpc/peer" "google.golang.org/grpc/reflection" From c73b57e7dcbbfef7dee166333bc37b1349e20854 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 19:08:33 +0000 Subject: [PATCH 35/57] Use undeprecated method for insecure --- cmd/headscale/cli/utils.go | 14 +++++++++++--- 1 file changed, 11 insertions(+), 3 deletions(-) diff --git a/cmd/headscale/cli/utils.go b/cmd/headscale/cli/utils.go index eca43e80..e3e1758e 100644 --- a/cmd/headscale/cli/utils.go +++ b/cmd/headscale/cli/utils.go @@ -19,6 +19,8 @@ import ( "github.com/rs/zerolog/log" "github.com/spf13/viper" "google.golang.org/grpc" + "google.golang.org/grpc/credentials" + "google.golang.org/grpc/credentials/insecure" "gopkg.in/yaml.v2" "inet.af/netaddr" "tailscale.com/tailcfg" @@ -398,7 +400,7 @@ func getHeadscaleCLIClient() (context.Context, v1.HeadscaleServiceClient, *grpc. grpcOptions = append( grpcOptions, - grpc.WithInsecure(), + grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithContextDialer(headscale.GrpcSocketDialer), ) } else { @@ -414,7 +416,13 @@ func getHeadscaleCLIClient() (context.Context, v1.HeadscaleServiceClient, *grpc. ) if cfg.CLI.Insecure { - grpcOptions = append(grpcOptions, grpc.WithInsecure()) + grpcOptions = append(grpcOptions, + grpc.WithTransportCredentials(insecure.NewCredentials()), + ) + } else { + grpcOptions = append(grpcOptions, + grpc.WithTransportCredentials(credentials.NewClientTLSFromCert(nil, "")), + ) } } @@ -492,7 +500,7 @@ func (t tokenAuth) GetRequestMetadata( } func (tokenAuth) RequireTransportSecurity() bool { - return true + return false } // loadOIDCMatchMap is a wrapper around viper to verifies that the keys in From e18078d7f8a001c88e173c4c944c7e4f365a14ce Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 19:08:41 +0000 Subject: [PATCH 36/57] Rename j --- cmd/headscale/cli/utils.go | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/cmd/headscale/cli/utils.go b/cmd/headscale/cli/utils.go index e3e1758e..6a95e271 100644 --- a/cmd/headscale/cli/utils.go +++ b/cmd/headscale/cli/utils.go @@ -438,21 +438,21 @@ func getHeadscaleCLIClient() (context.Context, v1.HeadscaleServiceClient, *grpc. } func SuccessOutput(result interface{}, override string, outputFormat string) { - var j []byte + var jsonBytes []byte var err error switch outputFormat { case "json": - j, err = json.MarshalIndent(result, "", "\t") + jsonBytes, err = json.MarshalIndent(result, "", "\t") if err != nil { log.Fatal().Err(err) } case "json-line": - j, err = json.Marshal(result) + jsonBytes, err = json.Marshal(result) if err != nil { log.Fatal().Err(err) } case "yaml": - j, err = yaml.Marshal(result) + jsonBytes, err = yaml.Marshal(result) if err != nil { log.Fatal().Err(err) } @@ -464,7 +464,7 @@ func SuccessOutput(result interface{}, override string, outputFormat string) { } //nolint - fmt.Println(string(j)) + fmt.Println(string(jsonBytes)) } func ErrorOutput(errResult error, override string, outputFormat string) { From 58bfea4e6459927dff5264c83c5d4bc6dcc6bbd6 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 19:08:59 +0000 Subject: [PATCH 37/57] Update examples and docs --- config-example.yaml | 7 +++++++ docs/remote-cli.md | 10 +++++++++- 2 files changed, 16 insertions(+), 1 deletion(-) diff --git a/config-example.yaml b/config-example.yaml index 940fe57f..4fc06c97 100644 --- a/config-example.yaml +++ b/config-example.yaml @@ -16,6 +16,13 @@ server_url: http://127.0.0.1:8080 # listen_addr: 0.0.0.0:8080 +# Address to listen for gRPC. +# gRPC is used for controlling a headscale server +# remotely with the CLI +# Note: Remote access _only_ works if you have +# valid certificates. +grpc_listen_addr: 0.0.0.0:50443 + # Private key used encrypt the traffic between headscale # and Tailscale clients. # The private key file which will be diff --git a/docs/remote-cli.md b/docs/remote-cli.md index 3d4bbafb..1a1dc1de 100644 --- a/docs/remote-cli.md +++ b/docs/remote-cli.md @@ -7,6 +7,7 @@ - Access to create API keys (local access to the `headscale` server) - `headscale` _must_ be served over TLS/HTTPS - Remote access does _not_ support unencrypted traffic. +- Port `50443` must be open in the firewall (or port overriden by `grpc_listen_addr` option) ## Goal @@ -53,10 +54,17 @@ chmod +x /usr/local/bin/headscale 4. Configure the CLI through Environment Variables ```shell -export HEADSCALE_CLI_ADDRESS="" +export HEADSCALE_CLI_ADDRESS=":" export HEADSCALE_CLI_API_KEY="" ``` +for example: + +```shell +export HEADSCALE_CLI_ADDRESS="headscale.example.com:50443" +export HEADSCALE_CLI_API_KEY="abcde12345" +``` + This will tell the `headscale` binary to connect to a remote instance, instead of looking for a local instance (which is what it does on the server). From 4078e75b50d46b2c162c7d8201713ca7e2fc1c53 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 19:30:25 +0000 Subject: [PATCH 38/57] Correct log message --- app.go | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/app.go b/app.go index 0444247f..aad8156b 100644 --- a/app.go +++ b/app.go @@ -589,6 +589,9 @@ func (h *Headscale) Serve() error { } errorGroup.Go(func() error { return grpcServer.Serve(grpcListener) }) + + log.Info(). + Msgf("listening and serving gRPC on: %s", h.cfg.GRPCAddr) } else { log.Info().Msg("TLS is not configured, not enabling remote gRPC") } @@ -625,7 +628,7 @@ func (h *Headscale) Serve() error { errorGroup.Go(func() error { return httpServer.Serve(httpListener) }) log.Info(). - Msgf("listening and serving (multiplexed HTTP and gRPC) on: %s", h.cfg.Addr) + Msgf("listening and serving HTTP on: %s", h.cfg.Addr) return errorGroup.Wait() } From 315ff9daf064d9ac78af14fa245ebb0136e24863 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 19:35:55 +0000 Subject: [PATCH 39/57] Remove insecure, only allow valid certs --- app.go | 7 +++---- cmd/headscale/cli/utils.go | 21 +++++---------------- docs/remote-cli.md | 4 ++-- 3 files changed, 10 insertions(+), 22 deletions(-) diff --git a/app.go b/app.go index aad8156b..4922fba8 100644 --- a/app.go +++ b/app.go @@ -119,10 +119,9 @@ type DERPConfig struct { } type CLIConfig struct { - Address string - APIKey string - Insecure bool - Timeout time.Duration + Address string + APIKey string + Timeout time.Duration } // Headscale represents the base app of the service. diff --git a/cmd/headscale/cli/utils.go b/cmd/headscale/cli/utils.go index 6a95e271..072e3040 100644 --- a/cmd/headscale/cli/utils.go +++ b/cmd/headscale/cli/utils.go @@ -59,7 +59,6 @@ func LoadConfig(path string) error { viper.SetDefault("grpc_listen_addr", ":50443") - viper.SetDefault("cli.insecure", false) viper.SetDefault("cli.timeout", "5s") if err := viper.ReadInConfig(); err != nil { @@ -326,10 +325,9 @@ func getHeadscaleConfig() headscale.Config { }, CLI: headscale.CLIConfig{ - Address: viper.GetString("cli.address"), - APIKey: viper.GetString("cli.api_key"), - Insecure: viper.GetBool("cli.insecure"), - Timeout: viper.GetDuration("cli.timeout"), + Address: viper.GetString("cli.address"), + APIKey: viper.GetString("cli.api_key"), + Timeout: viper.GetDuration("cli.timeout"), }, } } @@ -413,17 +411,8 @@ func getHeadscaleCLIClient() (context.Context, v1.HeadscaleServiceClient, *grpc. grpc.WithPerRPCCredentials(tokenAuth{ token: apiKey, }), + grpc.WithTransportCredentials(credentials.NewClientTLSFromCert(nil, "")), ) - - if cfg.CLI.Insecure { - grpcOptions = append(grpcOptions, - grpc.WithTransportCredentials(insecure.NewCredentials()), - ) - } else { - grpcOptions = append(grpcOptions, - grpc.WithTransportCredentials(credentials.NewClientTLSFromCert(nil, "")), - ) - } } log.Trace().Caller().Str("address", address).Msg("Connecting via gRPC") @@ -500,7 +489,7 @@ func (t tokenAuth) GetRequestMetadata( } func (tokenAuth) RequireTransportSecurity() bool { - return false + return true } // loadOIDCMatchMap is a wrapper around viper to verifies that the keys in diff --git a/docs/remote-cli.md b/docs/remote-cli.md index 1a1dc1de..adcced78 100644 --- a/docs/remote-cli.md +++ b/docs/remote-cli.md @@ -88,5 +88,5 @@ Checklist: - Make sure you have the _same_ `headscale` version on your server and workstation - Make sure you use version `0.13.0` or newer. -- Verify that your TLS certificate is valid - - If it is not valid, set the environment variable `HEADSCALE_CLI_INSECURE=true` to allow insecure certs. +- Verify that your TLS certificate is valid and trusted + - If you do not have access to a trusted certificate (e.g. from Let's Encrypt), add your self signed certificate to the trust store of your OS. From 2fbcc38f8f1066966b848d51a0e10c3ce9c3468c Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 19:36:43 +0000 Subject: [PATCH 40/57] Emph trusted cert --- docs/remote-cli.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/remote-cli.md b/docs/remote-cli.md index adcced78..5ff2f4a0 100644 --- a/docs/remote-cli.md +++ b/docs/remote-cli.md @@ -5,7 +5,7 @@ - A workstation to run `headscale` (could be Linux, macOS, other supported platforms) - A `headscale` server (version `0.13.0` or newer) - Access to create API keys (local access to the `headscale` server) -- `headscale` _must_ be served over TLS/HTTPS +- `headscale` _must_ be served over TLS/HTTPS with a _trusted_ certificate - Remote access does _not_ support unencrypted traffic. - Port `50443` must be open in the firewall (or port overriden by `grpc_listen_addr` option) From ead8b68a03370e1fbb991ebf152a4125e275fc11 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 19:42:55 +0000 Subject: [PATCH 41/57] Fix lint --- cmd/headscale/cli/api_key.go | 10 +++++----- cmd/headscale/cli/pterm_style.go | 3 +-- utils.go | 9 +++++---- 3 files changed, 11 insertions(+), 11 deletions(-) diff --git a/cmd/headscale/cli/api_key.go b/cmd/headscale/cli/api_key.go index fcce6905..975149ff 100644 --- a/cmd/headscale/cli/api_key.go +++ b/cmd/headscale/cli/api_key.go @@ -14,8 +14,8 @@ import ( ) const ( - // 90 days - DefaultApiKeyExpiry = 90 * 24 * time.Hour + // 90 days. + DefaultAPIKeyExpiry = 90 * 24 * time.Hour ) func init() { @@ -23,7 +23,7 @@ func init() { apiKeysCmd.AddCommand(listAPIKeys) createAPIKeyCmd.Flags(). - DurationP("expiration", "e", DefaultApiKeyExpiry, "Human-readable expiration of the key (30m, 24h, 365d...)") + DurationP("expiration", "e", DefaultAPIKeyExpiry, "Human-readable expiration of the key (30m, 24h, 365d...)") apiKeysCmd.AddCommand(createAPIKeyCmd) @@ -104,8 +104,8 @@ var createAPIKeyCmd = &cobra.Command{ Use: "create", Short: "Creates a new Api key", Long: ` -Creates a new Api key, the Api key is only visible on creation -and cannot be retrieved again. +Creates a new Api key, the Api key is only visible on creation +and cannot be retrieved again. If you loose a key, create a new one and revoke (expire) the old one.`, Run: func(cmd *cobra.Command, args []string) { output, _ := cmd.Flags().GetString("output") diff --git a/cmd/headscale/cli/pterm_style.go b/cmd/headscale/cli/pterm_style.go index e2678182..85fd050b 100644 --- a/cmd/headscale/cli/pterm_style.go +++ b/cmd/headscale/cli/pterm_style.go @@ -8,9 +8,8 @@ import ( func ColourTime(date time.Time) string { dateStr := date.Format("2006-01-02 15:04:05") - now := time.Now() - if date.After(now) { + if date.After(time.Now()) { dateStr = pterm.LightGreen(dateStr) } else { dateStr = pterm.LightRed(dateStr) diff --git a/utils.go b/utils.go index 562cede6..a6be8cc4 100644 --- a/utils.go +++ b/utils.go @@ -286,14 +286,14 @@ func containsIPPrefix(prefixes []netaddr.IPPrefix, prefix netaddr.IPPrefix) bool // number generator fails to function correctly, in which // case the caller should not continue. func GenerateRandomBytes(n int) ([]byte, error) { - b := make([]byte, n) - _, err := rand.Read(b) + bytes := make([]byte, n) + // Note that err == nil only if we read len(b) bytes. - if err != nil { + if _, err := rand.Read(bytes); err != nil { return nil, err } - return b, nil + return bytes, nil } // GenerateRandomStringURLSafe returns a URL-safe, base64 encoded @@ -303,5 +303,6 @@ func GenerateRandomBytes(n int) ([]byte, error) { // case the caller should not continue. func GenerateRandomStringURLSafe(n int) (string, error) { b, err := GenerateRandomBytes(n) + return base64.RawURLEncoding.EncodeToString(b), err } From d79ccfc05a00c470def605f4e70bc69844d30d97 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 19:48:05 +0000 Subject: [PATCH 42/57] Add comment on why grpc is on its own port, replace deprecated --- app.go | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/app.go b/app.go index 4922fba8..126ed861 100644 --- a/app.go +++ b/app.go @@ -35,6 +35,7 @@ import ( "google.golang.org/grpc" "google.golang.org/grpc/codes" "google.golang.org/grpc/credentials" + "google.golang.org/grpc/credentials/insecure" "google.golang.org/grpc/metadata" "google.golang.org/grpc/peer" "google.golang.org/grpc/reflection" @@ -518,7 +519,7 @@ func (h *Headscale) Serve() error { grpcGatewayConn, err := grpc.Dial( h.cfg.UnixSocket, []grpc.DialOption{ - grpc.WithInsecure(), + grpc.WithTransportCredentials(insecure.NewCredentials()), grpc.WithContextDialer(GrpcSocketDialer), }..., ) @@ -558,6 +559,13 @@ func (h *Headscale) Serve() error { // gRPC setup // + // We are sadly not able to run gRPC and HTTPS (2.0) on the same + // port because the connection mux does not support matching them + // since they are so similar. There is multiple issues open and we + // can revisit this if changes: + // https://github.com/soheilhy/cmux/issues/68 + // https://github.com/soheilhy/cmux/issues/91 + // If TLS has been enabled, set up the remote gRPC server if tlsConfig != nil { log.Info().Msgf("Enabling remote gRPC at %s", h.cfg.GRPCAddr) From 4841e16386b8f8dff6b6f220ab3664dcd55269ae Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 20:39:42 +0000 Subject: [PATCH 43/57] Add remote control doc --- docs/README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/docs/README.md b/docs/README.md index f42d67de..cc3b3bae 100644 --- a/docs/README.md +++ b/docs/README.md @@ -10,6 +10,7 @@ please ask on [Discord](https://discord.gg/XcQxk2VHjx) instead of opening an Iss ### How-to - [Running headscale on Linux](running-headscale-linux.md) +- [Control headscale remotly](remote-cli.md) ### References From 2bc8051ae52f7c48bfcf35d893a2b5563e7ffb2c Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 20:46:05 +0000 Subject: [PATCH 44/57] Remove kv-namespace-worker This commit removes the namespace kv worker and related code, now that we talk over gRPC to the server, and not directly to the DB, we should not need this anymore. --- app.go | 16 ---------------- machine_test.go | 13 ------------- namespaces.go | 38 -------------------------------------- 3 files changed, 67 deletions(-) diff --git a/app.go b/app.go index bc7491ce..22b4ceee 100644 --- a/app.go +++ b/app.go @@ -269,20 +269,6 @@ func (h *Headscale) expireEphemeralNodesWorker() { } } -// WatchForKVUpdates checks the KV DB table for requests to perform tailnet upgrades -// This is a way to communitate the CLI with the headscale server. -func (h *Headscale) watchForKVUpdates(milliSeconds int64) { - ticker := time.NewTicker(time.Duration(milliSeconds) * time.Millisecond) - for range ticker.C { - h.watchForKVUpdatesWorker() - } -} - -func (h *Headscale) watchForKVUpdatesWorker() { - h.checkForNamespacesPendingUpdates() - // more functions will come here in the future -} - func (h *Headscale) grpcAuthenticationInterceptor(ctx context.Context, req interface{}, info *grpc.UnaryServerInfo, @@ -521,8 +507,6 @@ func (h *Headscale) Serve() error { go h.scheduledDERPMapUpdateWorker(derpMapCancelChannel) } - // I HATE THIS - go h.watchForKVUpdates(updateInterval) go h.expireEphemeralNodes(updateInterval) httpServer := &http.Server{ diff --git a/machine_test.go b/machine_test.go index 1cc4d40c..ff1dc914 100644 --- a/machine_test.go +++ b/machine_test.go @@ -1,7 +1,6 @@ package headscale import ( - "encoding/json" "strconv" "time" @@ -88,18 +87,6 @@ func (s *Suite) TestDeleteMachine(c *check.C) { err = app.DeleteMachine(&machine) c.Assert(err, check.IsNil) - namespacesPendingUpdates, err := app.getValue("namespaces_pending_updates") - c.Assert(err, check.IsNil) - - names := []string{} - err = json.Unmarshal([]byte(namespacesPendingUpdates), &names) - c.Assert(err, check.IsNil) - c.Assert(names, check.DeepEquals, []string{namespace.Name}) - - app.checkForNamespacesPendingUpdates() - - namespacesPendingUpdates, _ = app.getValue("namespaces_pending_updates") - c.Assert(namespacesPendingUpdates, check.Equals, "") _, err = app.GetMachine(namespace.Name, "testmachine") c.Assert(err, check.NotNil) } diff --git a/namespaces.go b/namespaces.go index e512068d..223455af 100644 --- a/namespaces.go +++ b/namespaces.go @@ -235,44 +235,6 @@ func (h *Headscale) RequestMapUpdates(namespaceID uint) error { return h.setValue("namespaces_pending_updates", string(data)) } -func (h *Headscale) checkForNamespacesPendingUpdates() { - namespacesPendingUpdates, err := h.getValue("namespaces_pending_updates") - if err != nil { - return - } - if namespacesPendingUpdates == "" { - return - } - - namespaces := []string{} - err = json.Unmarshal([]byte(namespacesPendingUpdates), &namespaces) - if err != nil { - return - } - for _, namespace := range namespaces { - log.Trace(). - Str("func", "RequestMapUpdates"). - Str("machine", namespace). - Msg("Sending updates to nodes in namespacespace") - h.setLastStateChangeToNow(namespace) - } - newPendingUpdateValue, err := h.getValue("namespaces_pending_updates") - if err != nil { - return - } - if namespacesPendingUpdates == newPendingUpdateValue { // only clear when no changes, so we notified everybody - err = h.setValue("namespaces_pending_updates", "") - if err != nil { - log.Error(). - Str("func", "checkForNamespacesPendingUpdates"). - Err(err). - Msg("Could not save to KV") - - return - } - } -} - func (n *Namespace) toUser() *tailcfg.User { user := tailcfg.User{ ID: tailcfg.UserID(n.ID), From 6fa0903a8e05a0d8d98068c4ca281fe5c4495c98 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 20:50:17 +0000 Subject: [PATCH 45/57] Update changelog --- CHANGELOG.md | 1 + 1 file changed, 1 insertion(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index aa06be0c..045a394f 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -13,6 +13,7 @@ - `ip_prefix` is now superseded by `ip_prefixes` in the configuration [#208](https://github.com/juanfont/headscale/pull/208) - Upgrade `tailscale` (1.20.4) and other dependencies to latest [#314](https://github.com/juanfont/headscale/pull/314) - fix swapped machine<->namespace labels in `/metrics` [#312](https://github.com/juanfont/headscale/pull/312) +- remove key-value based update mechanism for namespace changes [#316](https://github.com/juanfont/headscale/pull/316) **0.12.4 (2022-01-29):** From bb80b679bc561681ed68880d383c5660752deb6f Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sat, 12 Feb 2022 21:04:00 +0000 Subject: [PATCH 46/57] Remove RequestMapUpdates function --- machine.go | 15 +++++--------- namespaces.go | 55 --------------------------------------------------- routes.go | 5 ----- sharing.go | 5 ----- 4 files changed, 5 insertions(+), 75 deletions(-) diff --git a/machine.go b/machine.go index 64fd11b8..2b462985 100644 --- a/machine.go +++ b/machine.go @@ -353,13 +353,12 @@ func (h *Headscale) DeleteMachine(machine *Machine) error { } machine.Registered = false - namespaceID := machine.NamespaceID h.db.Save(&machine) // we mark it as unregistered, just in case if err := h.db.Delete(&machine).Error; err != nil { return err } - return h.RequestMapUpdates(namespaceID) + return nil } func (h *Headscale) TouchMachine(machine *Machine) error { @@ -377,12 +376,11 @@ func (h *Headscale) HardDeleteMachine(machine *Machine) error { return err } - namespaceID := machine.NamespaceID if err := h.db.Unscoped().Delete(&machine).Error; err != nil { return err } - return h.RequestMapUpdates(namespaceID) + return nil } // GetHostInfo returns a Hostinfo struct for the machine. @@ -530,7 +528,9 @@ func (machine Machine) toNode( addrs = append(addrs, ip) } - allowedIPs := append([]netaddr.IPPrefix{}, addrs...) // we append the node own IP, as it is required by the clients + allowedIPs := append( + []netaddr.IPPrefix{}, + addrs...) // we append the node own IP, as it is required by the clients if includeRoutes { routesStr := []string{} @@ -862,11 +862,6 @@ func (h *Headscale) EnableRoutes(machine *Machine, routeStrs ...string) error { machine.EnabledRoutes = datatypes.JSON(routes) h.db.Save(&machine) - err = h.RequestMapUpdates(machine.NamespaceID) - if err != nil { - return err - } - return nil } diff --git a/namespaces.go b/namespaces.go index 223455af..bdd440cf 100644 --- a/namespaces.go +++ b/namespaces.go @@ -1,9 +1,7 @@ package headscale import ( - "encoding/json" "errors" - "fmt" "strconv" "time" @@ -104,11 +102,6 @@ func (h *Headscale) RenameNamespace(oldName, newName string) error { return result.Error } - err = h.RequestMapUpdates(oldNamespace.ID) - if err != nil { - return err - } - return nil } @@ -187,54 +180,6 @@ func (h *Headscale) SetMachineNamespace(machine *Machine, namespaceName string) return nil } -// TODO(kradalby): Remove the need for this. -// RequestMapUpdates signals the KV worker to update the maps for this namespace. -func (h *Headscale) RequestMapUpdates(namespaceID uint) error { - namespace := Namespace{} - if err := h.db.First(&namespace, namespaceID).Error; err != nil { - return err - } - - namespacesPendingUpdates, err := h.getValue("namespaces_pending_updates") - if err != nil || namespacesPendingUpdates == "" { - err = h.setValue( - "namespaces_pending_updates", - fmt.Sprintf(`["%s"]`, namespace.Name), - ) - if err != nil { - return err - } - - return nil - } - names := []string{} - err = json.Unmarshal([]byte(namespacesPendingUpdates), &names) - if err != nil { - err = h.setValue( - "namespaces_pending_updates", - fmt.Sprintf(`["%s"]`, namespace.Name), - ) - if err != nil { - return err - } - - return nil - } - - names = append(names, namespace.Name) - data, err := json.Marshal(names) - if err != nil { - log.Error(). - Str("func", "RequestMapUpdates"). - Err(err). - Msg("Could not marshal namespaces_pending_updates") - - return err - } - - return h.setValue("namespaces_pending_updates", string(data)) -} - func (n *Namespace) toUser() *tailcfg.User { user := tailcfg.User{ ID: tailcfg.UserID(n.ID), diff --git a/routes.go b/routes.go index 448095a5..0065a03f 100644 --- a/routes.go +++ b/routes.go @@ -143,10 +143,5 @@ func (h *Headscale) EnableNodeRoute( machine.EnabledRoutes = datatypes.JSON(routes) h.db.Save(&machine) - err = h.RequestMapUpdates(machine.NamespaceID) - if err != nil { - return err - } - return nil } diff --git a/sharing.go b/sharing.go index be1689d5..caac5319 100644 --- a/sharing.go +++ b/sharing.go @@ -67,11 +67,6 @@ func (h *Headscale) RemoveSharedMachineFromNamespace( return errMachineNotShared } - err := h.RequestMapUpdates(namespace.ID) - if err != nil { - return err - } - return nil } From 0018a78d5a146d3fbd1e0157e9dc8809fd0ed544 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sun, 13 Feb 2022 08:41:49 +0000 Subject: [PATCH 47/57] Add insecure option Add option to not _validate_ if the certificate served from headscale is trusted. --- app.go | 7 ++++--- cmd/headscale/cli/utils.go | 25 +++++++++++++++++++++---- docs/remote-cli.md | 5 +++-- 3 files changed, 28 insertions(+), 9 deletions(-) diff --git a/app.go b/app.go index 126ed861..0ad33605 100644 --- a/app.go +++ b/app.go @@ -120,9 +120,10 @@ type DERPConfig struct { } type CLIConfig struct { - Address string - APIKey string - Timeout time.Duration + Address string + APIKey string + Timeout time.Duration + Insecure bool } // Headscale represents the base app of the service. diff --git a/cmd/headscale/cli/utils.go b/cmd/headscale/cli/utils.go index 072e3040..84ff977b 100644 --- a/cmd/headscale/cli/utils.go +++ b/cmd/headscale/cli/utils.go @@ -2,6 +2,7 @@ package cli import ( "context" + "crypto/tls" "encoding/json" "errors" "fmt" @@ -60,6 +61,7 @@ func LoadConfig(path string) error { viper.SetDefault("grpc_listen_addr", ":50443") viper.SetDefault("cli.timeout", "5s") + viper.SetDefault("cli.insecure", false) if err := viper.ReadInConfig(); err != nil { return fmt.Errorf("fatal error reading config file: %w", err) @@ -325,9 +327,10 @@ func getHeadscaleConfig() headscale.Config { }, CLI: headscale.CLIConfig{ - Address: viper.GetString("cli.address"), - APIKey: viper.GetString("cli.api_key"), - Timeout: viper.GetDuration("cli.timeout"), + Address: viper.GetString("cli.address"), + APIKey: viper.GetString("cli.api_key"), + Timeout: viper.GetDuration("cli.timeout"), + Insecure: viper.GetBool("cli.insecure"), }, } } @@ -411,8 +414,22 @@ func getHeadscaleCLIClient() (context.Context, v1.HeadscaleServiceClient, *grpc. grpc.WithPerRPCCredentials(tokenAuth{ token: apiKey, }), - grpc.WithTransportCredentials(credentials.NewClientTLSFromCert(nil, "")), ) + + if cfg.CLI.Insecure { + tlsConfig := &tls.Config{ + InsecureSkipVerify: true, + } + + grpcOptions = append(grpcOptions, + grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)), + ) + + } else { + grpcOptions = append(grpcOptions, + grpc.WithTransportCredentials(credentials.NewClientTLSFromCert(nil, "")), + ) + } } log.Trace().Caller().Str("address", address).Msg("Connecting via gRPC") diff --git a/docs/remote-cli.md b/docs/remote-cli.md index 5ff2f4a0..5ba27ee0 100644 --- a/docs/remote-cli.md +++ b/docs/remote-cli.md @@ -5,7 +5,7 @@ - A workstation to run `headscale` (could be Linux, macOS, other supported platforms) - A `headscale` server (version `0.13.0` or newer) - Access to create API keys (local access to the `headscale` server) -- `headscale` _must_ be served over TLS/HTTPS with a _trusted_ certificate +- `headscale` _must_ be served over TLS/HTTPS - Remote access does _not_ support unencrypted traffic. - Port `50443` must be open in the firewall (or port overriden by `grpc_listen_addr` option) @@ -89,4 +89,5 @@ Checklist: - Make sure you have the _same_ `headscale` version on your server and workstation - Make sure you use version `0.13.0` or newer. - Verify that your TLS certificate is valid and trusted - - If you do not have access to a trusted certificate (e.g. from Let's Encrypt), add your self signed certificate to the trust store of your OS. + - If you do not have access to a trusted certificate (e.g. from Let's Encrypt), add your self signed certificate to the trust store of your OS or + - Set `HEADSCALE_CLI_INSECURE` to 0 in your environement From c3b68adfed83e85c5c3c0237fbcc3573935d5128 Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sun, 13 Feb 2022 08:46:35 +0000 Subject: [PATCH 48/57] Fix lint --- cmd/headscale/cli/utils.go | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/cmd/headscale/cli/utils.go b/cmd/headscale/cli/utils.go index 84ff977b..9a3f84d8 100644 --- a/cmd/headscale/cli/utils.go +++ b/cmd/headscale/cli/utils.go @@ -418,13 +418,15 @@ func getHeadscaleCLIClient() (context.Context, v1.HeadscaleServiceClient, *grpc. if cfg.CLI.Insecure { tlsConfig := &tls.Config{ + // turn of gosec as we are intentionally setting + // insecure. + //nolint:gosec InsecureSkipVerify: true, } grpcOptions = append(grpcOptions, grpc.WithTransportCredentials(credentials.NewTLS(tlsConfig)), ) - } else { grpcOptions = append(grpcOptions, grpc.WithTransportCredentials(credentials.NewClientTLSFromCert(nil, "")), From 4e547963849f48de60ad9eeeb00dd1089d22662a Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sun, 13 Feb 2022 09:08:46 +0000 Subject: [PATCH 49/57] Allow gRPC server to run insecure --- app.go | 22 +++++++++++----------- cmd/headscale/cli/utils.go | 9 ++++++--- config-example.yaml | 6 ++++++ 3 files changed, 23 insertions(+), 14 deletions(-) diff --git a/app.go b/app.go index 0ad33605..ba87fcc7 100644 --- a/app.go +++ b/app.go @@ -69,6 +69,7 @@ type Config struct { ServerURL string Addr string GRPCAddr string + GRPCAllowInsecure bool EphemeralNodeInactivityTimeout time.Duration IPPrefixes []netaddr.IPPrefix PrivateKeyPath string @@ -567,8 +568,7 @@ func (h *Headscale) Serve() error { // https://github.com/soheilhy/cmux/issues/68 // https://github.com/soheilhy/cmux/issues/91 - // If TLS has been enabled, set up the remote gRPC server - if tlsConfig != nil { + if tlsConfig != nil || h.cfg.GRPCAllowInsecure { log.Info().Msgf("Enabling remote gRPC at %s", h.cfg.GRPCAddr) grpcOptions := []grpc.ServerOption{ @@ -578,7 +578,14 @@ func (h *Headscale) Serve() error { zerolog.NewUnaryServerInterceptor(), ), ), - grpc.Creds(credentials.NewTLS(tlsConfig)), + } + + if tlsConfig != nil { + grpcOptions = append(grpcOptions, + grpc.Creds(credentials.NewTLS(tlsConfig)), + ) + } else { + log.Warn().Msg("gRPC is running without security") } grpcServer := grpc.NewServer(grpcOptions...) @@ -586,12 +593,7 @@ func (h *Headscale) Serve() error { v1.RegisterHeadscaleServiceServer(grpcServer, newHeadscaleV1APIServer(h)) reflection.Register(grpcServer) - var grpcListener net.Listener - // if tlsConfig != nil { - // grpcListener, err = tls.Listen("tcp", h.cfg.GRPCAddr, tlsConfig) - // } else { - grpcListener, err = net.Listen("tcp", h.cfg.GRPCAddr) - // } + grpcListener, err := net.Listen("tcp", h.cfg.GRPCAddr) if err != nil { return fmt.Errorf("failed to bind to TCP address: %w", err) } @@ -600,8 +602,6 @@ func (h *Headscale) Serve() error { log.Info(). Msgf("listening and serving gRPC on: %s", h.cfg.GRPCAddr) - } else { - log.Info().Msg("TLS is not configured, not enabling remote gRPC") } // diff --git a/cmd/headscale/cli/utils.go b/cmd/headscale/cli/utils.go index 9a3f84d8..85dcae71 100644 --- a/cmd/headscale/cli/utils.go +++ b/cmd/headscale/cli/utils.go @@ -59,6 +59,7 @@ func LoadConfig(path string) error { viper.SetDefault("unix_socket_permission", "0o770") viper.SetDefault("grpc_listen_addr", ":50443") + viper.SetDefault("grpc_allow_insecure", false) viper.SetDefault("cli.timeout", "5s") viper.SetDefault("cli.insecure", false) @@ -281,9 +282,11 @@ func getHeadscaleConfig() headscale.Config { } return headscale.Config{ - ServerURL: viper.GetString("server_url"), - Addr: viper.GetString("listen_addr"), - GRPCAddr: viper.GetString("grpc_listen_addr"), + ServerURL: viper.GetString("server_url"), + Addr: viper.GetString("listen_addr"), + GRPCAddr: viper.GetString("grpc_listen_addr"), + GRPCAllowInsecure: viper.GetBool("grpc_allow_insecure"), + IPPrefixes: prefixes, PrivateKeyPath: absPath(viper.GetString("private_key_path")), BaseDomain: baseDomain, diff --git a/config-example.yaml b/config-example.yaml index 4fc06c97..ba0c653f 100644 --- a/config-example.yaml +++ b/config-example.yaml @@ -23,6 +23,12 @@ listen_addr: 0.0.0.0:8080 # valid certificates. grpc_listen_addr: 0.0.0.0:50443 +# Allow the gRPC admin interface to run in INSECURE +# mode. This is not recommended as the traffic will +# be unencrypted. Only enable if you know what you +# are doing. +grpc_allow_insecure: false + # Private key used encrypt the traffic between headscale # and Tailscale clients. # The private key file which will be From 14b23544e42a0ef3e773fa7efd3703dbf130396d Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sun, 13 Feb 2022 09:48:33 +0000 Subject: [PATCH 50/57] Add note about running grpc behind a proxy and combining ports --- docs/remote-cli.md | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/docs/remote-cli.md b/docs/remote-cli.md index 5ba27ee0..3b1dc845 100644 --- a/docs/remote-cli.md +++ b/docs/remote-cli.md @@ -82,6 +82,13 @@ headscale nodes list You should now be able to see a list of your nodes from your workstation, and you can now control the `headscale` server from your workstation. +## Behind a proxy + +It is possible to run the gRPC remote endpoint behind a reverse proxy, like Nginx, and have it run on the _same_ port as `headscale`. + +While this is _not a supported_ feature, an example on how this can be set up on +[NixOS is shown here](https://github.com/kradalby/dotfiles/blob/4489cdbb19cddfbfae82cd70448a38fde5a76711/machines/headscale.oracldn/headscale.nix#L61-L91). + ## Troubleshooting Checklist: From 9f8034947141da706aa743caeda679d85c17ea7d Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sun, 13 Feb 2022 11:02:31 +0000 Subject: [PATCH 51/57] Add sponsorship button This commit adds a sponsor/funding section to headscale. @juanfont and I have discussed this and this arrangement is agreed upon and hopefully this can bring us to a place in the future were even more features and prioritization can be put upon the project. --- .github/FUNDING.yml | 2 ++ 1 file changed, 2 insertions(+) create mode 100644 .github/FUNDING.yml diff --git a/.github/FUNDING.yml b/.github/FUNDING.yml new file mode 100644 index 00000000..16fba08e --- /dev/null +++ b/.github/FUNDING.yml @@ -0,0 +1,2 @@ +ko_fi: kradalby +github: [kradalby] From f30ee3d2df705b1573f9ae539f74f5263c35288c Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Sun, 13 Feb 2022 11:07:45 +0000 Subject: [PATCH 52/57] Add note about support in readme --- README.md | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/README.md b/README.md index 491450a5..cf246544 100644 --- a/README.md +++ b/README.md @@ -18,6 +18,12 @@ The control server works as an exchange point of Wireguard public keys for the n headscale implements this coordination server. +## Support + +If you like `headscale` and find it useful, there is sponsorship and donation buttons available in the repo. + +If you would like to sponsor features, bugs or prioritisation, reach out to one of the maintainers. + ## Status - [x] Base functionality (nodes can communicate with each other) From b2889bc355140913ca3c80159b232030442ea4a0 Mon Sep 17 00:00:00 2001 From: ohdearaugustin Date: Mon, 14 Feb 2022 21:24:51 +0100 Subject: [PATCH 53/57] github/workflows: set specific go version --- .github/workflows/build.yml | 2 +- .github/workflows/release.yml | 2 +- .github/workflows/test-integration.yml | 2 +- .github/workflows/test.yml | 2 +- 4 files changed, 4 insertions(+), 4 deletions(-) diff --git a/.github/workflows/build.yml b/.github/workflows/build.yml index d92e9e6e..37423c38 100644 --- a/.github/workflows/build.yml +++ b/.github/workflows/build.yml @@ -31,7 +31,7 @@ jobs: if: steps.changed-files.outputs.any_changed == 'true' uses: actions/setup-go@v2 with: - go-version: "1.17" + go-version: "1.17.7" - name: Install dependencies if: steps.changed-files.outputs.any_changed == 'true' diff --git a/.github/workflows/release.yml b/.github/workflows/release.yml index c9a40bc0..8999f7bf 100644 --- a/.github/workflows/release.yml +++ b/.github/workflows/release.yml @@ -18,7 +18,7 @@ jobs: - name: Set up Go uses: actions/setup-go@v2 with: - go-version: 1.17 + go-version: 1.17.7 - name: Install dependencies run: | diff --git a/.github/workflows/test-integration.yml b/.github/workflows/test-integration.yml index 9f526f97..d9c52c7b 100644 --- a/.github/workflows/test-integration.yml +++ b/.github/workflows/test-integration.yml @@ -25,7 +25,7 @@ jobs: if: steps.changed-files.outputs.any_changed == 'true' uses: actions/setup-go@v2 with: - go-version: "1.17" + go-version: "1.17.7" - name: Run Integration tests if: steps.changed-files.outputs.any_changed == 'true' diff --git a/.github/workflows/test.yml b/.github/workflows/test.yml index 9ce8a779..663220be 100644 --- a/.github/workflows/test.yml +++ b/.github/workflows/test.yml @@ -25,7 +25,7 @@ jobs: if: steps.changed-files.outputs.any_changed == 'true' uses: actions/setup-go@v2 with: - go-version: "1.17" + go-version: "1.17.7" - name: Install dependencies if: steps.changed-files.outputs.any_changed == 'true' From 0b9dd19ec7fc8d4a7b5bfb8c684c1ed266eb185a Mon Sep 17 00:00:00 2001 From: ohdearaugustin Date: Mon, 14 Feb 2022 21:25:11 +0100 Subject: [PATCH 54/57] Dockerfiles: update go version to 1.17.7 --- Dockerfile | 2 +- Dockerfile.alpine | 2 +- Dockerfile.debug | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/Dockerfile b/Dockerfile index 050439b5..6e577753 100644 --- a/Dockerfile +++ b/Dockerfile @@ -1,5 +1,5 @@ # Builder image -FROM docker.io/golang:1.17.1-bullseye AS build +FROM docker.io/golang:1.17.7-bullseye AS build ENV GOPATH /go WORKDIR /go/src/headscale diff --git a/Dockerfile.alpine b/Dockerfile.alpine index a75bbfea..b07e1904 100644 --- a/Dockerfile.alpine +++ b/Dockerfile.alpine @@ -1,5 +1,5 @@ # Builder image -FROM docker.io/golang:1.17.1-alpine AS build +FROM docker.io/golang:1.17.7-alpine AS build ENV GOPATH /go WORKDIR /go/src/headscale diff --git a/Dockerfile.debug b/Dockerfile.debug index b81ee67e..3d2675f9 100644 --- a/Dockerfile.debug +++ b/Dockerfile.debug @@ -1,5 +1,5 @@ # Builder image -FROM docker.io/golang:1.17.1-bullseye AS build +FROM docker.io/golang:1.17.7-bullseye AS build ENV GOPATH /go WORKDIR /go/src/headscale From 61bfa79be2313e7458a7379b5dd6d1836356f20e Mon Sep 17 00:00:00 2001 From: Tanner <97977342+m-tanner-dev0@users.noreply.github.com> Date: Thu, 17 Feb 2022 17:55:40 -0800 Subject: [PATCH 55/57] Update README.md change flippant language --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index cf246544..1d86380e 100644 --- a/README.md +++ b/README.md @@ -10,7 +10,7 @@ Join our [Discord](https://discord.gg/XcQxk2VHjx) server for a chat. ## Overview -Tailscale is [a modern VPN](https://tailscale.com/) built on top of [Wireguard](https://www.wireguard.com/). It [works like an overlay network](https://tailscale.com/blog/how-tailscale-works/) between the computers of your networks - using all kinds of [NAT traversal sorcery](https://tailscale.com/blog/how-nat-traversal-works/). +Tailscale is [a modern VPN](https://tailscale.com/) built on top of [Wireguard](https://www.wireguard.com/). It [works like an overlay network](https://tailscale.com/blog/how-tailscale-works/) between the computers of your networks - using [NAT traversal](https://tailscale.com/blog/how-nat-traversal-works/). Everything in Tailscale is Open Source, except the GUI clients for proprietary OS (Windows and macOS/iOS), and the 'coordination/control server'. @@ -52,7 +52,7 @@ If you would like to sponsor features, bugs or prioritisation, reach out to one | Android | [You need to compile the client yourself](https://github.com/juanfont/headscale/issues/58#issuecomment-885255270) | | iOS | Not yet | -## Roadmap 🤷 +## Roadmap Suggestions/PRs welcomed! From 5fbef07627d92602659f3a41fd1e5f00a84cdb9e Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Fri, 18 Feb 2022 18:54:27 +0000 Subject: [PATCH 56/57] Update changelog for 0.13.0 --- CHANGELOG.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CHANGELOG.md b/CHANGELOG.md index f6e44161..70bda12d 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -2,7 +2,7 @@ **TBD (TBD):** -**0.13.0 (2022-xx-xx):** +**0.13.0 (2022-02-18):** **Features**: From 7916fa8b45a0540b1e18b36e5280d5595705644b Mon Sep 17 00:00:00 2001 From: Kristoffer Dalby Date: Fri, 18 Feb 2022 19:57:03 +0000 Subject: [PATCH 57/57] Add ohdearaugustin to CODEOWNERS for config and docs --- .github/CODEOWNERS | 9 +++++++++ 1 file changed, 9 insertions(+) create mode 100644 .github/CODEOWNERS diff --git a/.github/CODEOWNERS b/.github/CODEOWNERS new file mode 100644 index 00000000..565684fe --- /dev/null +++ b/.github/CODEOWNERS @@ -0,0 +1,9 @@ +* @juanfont @kradalby + +*.md @ohdearaugustin +*.yml @ohdearaugustin +*.yaml @ohdearaugustin +Dockerfile* @ohdearaugustin +.goreleaser.yaml @ohdearaugustin +/docs/ @ohdearaugustin +/.github/workflows/ @ohdearaugustin