From f3de3b1f1d436930d6ed0ab59accc6e138ee7170 Mon Sep 17 00:00:00 2001 From: Ruben Nic Date: Wed, 28 May 2025 19:54:15 -0400 Subject: [PATCH 1/9] Update diff PR to merge into release PR --- .github/workflows/copy-cloud-docs-for-tfe.yml | 137 ++++++++++-------- 1 file changed, 77 insertions(+), 60 deletions(-) diff --git a/.github/workflows/copy-cloud-docs-for-tfe.yml b/.github/workflows/copy-cloud-docs-for-tfe.yml index ad2d10f58..101af0fda 100644 --- a/.github/workflows/copy-cloud-docs-for-tfe.yml +++ b/.github/workflows/copy-cloud-docs-for-tfe.yml @@ -4,7 +4,7 @@ on: workflow_dispatch: inputs: branch: - description: 'Ex: docs-tfe-releases/v123456-1; ptfe-releases/v123456-1' + description: 'Release branch. (Ex: docs-tfe-releases/v123456-1, ptfe-releases/v123456-1)' required: true env: @@ -69,51 +69,41 @@ jobs: uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4 with: ref: ${{env.release_branch}} - path: "${{github.workspace}}/release" + path: '${{github.workspace}}/release' + # MAKE THE RELEASE PR - name: Checkout main for new docs version ACTUAL PR uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4 with: - path: "${{github.workspace}}/new-docs-pr" - - - name: Checkout main for new docs version DIFF PR - uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4 - with: - path: "${{github.workspace}}/new-docs-diff-pr" + path: '${{github.workspace}}/new-docs-pr' - name: Generate version-metadata for workflow - working-directory: "${{github.workspace}}/release" + working-directory: '${{github.workspace}}/release' run: | npm i npm run prebuild-only-version-metadata - # MAKING THE DIFF PR - - name: Copy files for new docs version DIFF PR - uses: ./release/.github/actions/copy-cloud-docs-for-tfe - with: - source_path: "${{github.workspace}}/release" - target_path: "${{github.workspace}}/new-docs-diff-pr" + - name: Create the new TFE version folder for RELEASE PR + run: | + version=$(jq -r '.["terraform-enterprise"][] | select(.isLatest == true) | .version' "${{github.workspace}}/release/app/api/versionMetadata.json") + echo "Latest terraform-enterprise version: $version" + echo "LATEST_TFE_VERSION=$version" >> $GITHUB_ENV + + mkdir -p "${{github.workspace}}/new-docs-pr/app/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" + + cp -a "${{github.workspace}}/release/app/content/terraform-enterprise/${{env.LATEST_TFE_VERSION}}" "${{github.workspace}}/new-docs-pr/app/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" - - name: Open new docs docs version DIFF PR - working-directory: "${{github.workspace}}/new-docs-diff-pr" + - name: Open new docs version ACTUAL PR + working-directory: '${{github.workspace}}/new-docs-pr' env: - branch_name: docs-diff/${{env.SERIES}}-${{env.RELEASE}} + branch_name: docs/${{env.SERIES}}-${{env.RELEASE}} pr_body: | - # Automated Docs DIFF PR for TFE ${{env.SERIES}}-${{env.RELEASE}} - - **❗ DO NOT MERGE THIS PR, IT IS FOR DIFFS ONLY ❗** + # Automated Docs Release PR for TFE ${{env.SERIES}}-${{env.RELEASE}} **TFE Series**: ${{ env.SERIES }} **TFE Release**: ${{ env.RELEASE }} - This copies over `cloud-docs` from: - - ${{github.server_url}}/${{github.repository}}/tree/${{env.release_branch}} - - This PR was created via: - - ${{github.server_url}}/${{github.repository}}/actions/runs/${{github.run_id}} - - Triggered by creation of branch: - - ${{github.server_url}}/${{github.repository}}/tree/${{env.release_branch}} + ...Waiting for the diff PR to be created, before finishing this PR's description... # secrets.WORKFLOW_TESTING_TOKEN requires permissions read:org, repo, workflow run: | @@ -132,38 +122,40 @@ jobs: git checkout -b ${{env.branch_name}} git add . - git commit -m "Automated Docs DIFF PR" --no-verify + git commit -m "Automated Release Docs PR" --no-verify git push origin HEAD gh pr create \ --body="${{env.pr_body}}" \ - --title="Automated Docs DIFF PR for TFE ${{env.SERIES}}-${{env.RELEASE}}" \ + --title="Automated Docs Release PR for TFE ${{env.SERIES}}-${{env.RELEASE}}" \ --draft \ --head ${{env.branch_name}} \ --base main - diff_pr_url=$(gh pr view --json url --jq '.url') - echo "DIFF_PR_URL=${diff_pr_url}" >> $GITHUB_ENV - echo "**Automated DIFF PR URL**: ${diff_pr_url}" >> $GITHUB_STEP_SUMMARY - - echo "(Closed DIFF PR at ${diff_pr_url} in order to prevent an accidental merge)" >> $GITHUB_STEP_SUMMARY - gh pr close "${diff_pr_url}" + pr_url=$(gh pr view --json url --jq '.url') + echo "PR_URL=${pr_url}" >> $GITHUB_ENV + echo "**Automated Release PR URL**: ${pr_url}" >> $GITHUB_STEP_SUMMARY + # MAKE THE DIFF PR + - name: Checkout main for new docs version DIFF PR + uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4 + with: + path: '${{github.workspace}}/new-docs-diff-pr' - # MAKING THE ACTUAL PR - - name: Copy files for new docs version ACTUAL PR + - name: Copy files for new docs version DIFF PR uses: ./release/.github/actions/copy-cloud-docs-for-tfe with: - source_path: "${{github.workspace}}/release" - target_path: "${{github.workspace}}/new-docs-pr" + source_path: '${{github.workspace}}/release' + target_path: '${{github.workspace}}/new-docs-diff-pr' new_TFE_version: ${{env.SERIES}}-${{env.RELEASE}} - - name: Open new docs version ACTUAL PR - working-directory: "${{github.workspace}}/new-docs-pr" + - name: Open new docs version DIFF PR + working-directory: '${{github.workspace}}/new-docs-diff-pr' env: - branch_name: docs/${{env.SERIES}}-${{env.RELEASE}} + release_branch_name: docs/${{env.SERIES}}-${{env.RELEASE}} + branch_name: docs-diff/${{env.SERIES}}-${{env.RELEASE}} pr_body: | - # Automated Docs PR for TFE ${{env.SERIES}}-${{env.RELEASE}} + # Automated Docs Diff PR for TFE ${{env.SERIES}}-${{env.RELEASE}} **TFE Series**: ${{ env.SERIES }} **TFE Release**: ${{ env.RELEASE }} @@ -177,15 +169,8 @@ jobs: Triggered by creation of branch: - ${{github.server_url}}/${{github.repository}}/tree/${{env.release_branch}} - Changes against the current TFE docs: - - ${{ env.DIFF_PR_URL }} - - ### Reviewers - - > **Note**: The `digital-content-events` GH App currently does not have permissions to request PR reviews from teams. - - - [ ] @hashicorp/ptfe-review - - [ ] @hashicorp/web-platform + Merges into the new docs release version branch: + - ${{ env.PR_URL }} # secrets.WORKFLOW_TESTING_TOKEN requires permissions read:org, repo, workflow run: | @@ -204,16 +189,48 @@ jobs: git checkout -b ${{env.branch_name}} git add . - git commit -m "Automated Docs PR" --no-verify + git commit -m "Automated Docs Diff PR" --no-verify git push origin HEAD gh pr create \ --body="${{env.pr_body}}" \ - --title="Automated Docs PR for TFE ${{env.SERIES}}-${{env.RELEASE}}" \ + --title="Automated Docs Diff PR for TFE ${{env.SERIES}}-${{env.RELEASE}}" \ --draft \ --head ${{env.branch_name}} \ - --base main + --base ${{release_branch_name}} - pr_url=$(gh pr view --json url --jq '.url') - echo "PR_URL=${pr_url}" >> $GITHUB_ENV - echo "**Automated ACTUAL PR URL**: ${pr_url}" >> $GITHUB_STEP_SUMMARY + diff_pr_url=$(gh pr view --json url --jq '.url') + echo "DIFF_PR_URL=${diff_pr_url}" >> $GITHUB_ENV + echo "**Automated DIFF PR URL**: ${diff_pr_url}" >> $GITHUB_STEP_SUMMARY + + - name: Update Release PR with diff PR URL + env: + branch_name: docs/${{env.SERIES}}-${{env.RELEASE}} + pr_body: | + # Automated Docs Release PR for TFE ${{env.SERIES}}-${{env.RELEASE}} + + **TFE Series**: ${{ env.SERIES }} + **TFE Release**: ${{ env.RELEASE }} + + This PR was created via: + - ${{github.server_url}}/${{github.repository}}/actions/runs/${{github.run_id}} + + Triggered by creation of branch: + - ${{github.server_url}}/${{github.repository}}/tree/${{env.release_branch}} + + Changes against the current TFE docs: + - ${{ env.DIFF_PR_URL }} + + ### Reviewers + + > **Note**: The `digital-content-events` GH App currently does not have permissions to request PR reviews from teams. + + - [ ] @hashicorp/ptfe-review + - [ ] @hashicorp/web-platform + run: | + echo ${{ secrets.WORKFLOW_TESTING_TOKEN }} | gh auth login --with-token + git config --global user.email "team-rel-eng@hashicorp.com" + git config --global user.name "tfe-release-bot" + + gh pr update ${{env.PR_URL}} \ + --body="${{env.pr_body}}" From f6e4e638c6020dce8a8718190582f5c013129feb Mon Sep 17 00:00:00 2001 From: Ruben Nic Date: Wed, 28 May 2025 20:00:06 -0400 Subject: [PATCH 2/9] forgot to put env before a var --- .github/workflows/copy-cloud-docs-for-tfe.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/copy-cloud-docs-for-tfe.yml b/.github/workflows/copy-cloud-docs-for-tfe.yml index 101af0fda..388b60a60 100644 --- a/.github/workflows/copy-cloud-docs-for-tfe.yml +++ b/.github/workflows/copy-cloud-docs-for-tfe.yml @@ -197,7 +197,7 @@ jobs: --title="Automated Docs Diff PR for TFE ${{env.SERIES}}-${{env.RELEASE}}" \ --draft \ --head ${{env.branch_name}} \ - --base ${{release_branch_name}} + --base ${{env.release_branch_name}} diff_pr_url=$(gh pr view --json url --jq '.url') echo "DIFF_PR_URL=${diff_pr_url}" >> $GITHUB_ENV From ea73de1d0027b3c0d77365c7377691d262d3d14c Mon Sep 17 00:00:00 2001 From: Ruben Nic Date: Wed, 28 May 2025 20:09:33 -0400 Subject: [PATCH 3/9] fix get latest terraform-enterprise version --- .github/workflows/copy-cloud-docs-for-tfe.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/copy-cloud-docs-for-tfe.yml b/.github/workflows/copy-cloud-docs-for-tfe.yml index 388b60a60..24c686b1e 100644 --- a/.github/workflows/copy-cloud-docs-for-tfe.yml +++ b/.github/workflows/copy-cloud-docs-for-tfe.yml @@ -86,12 +86,12 @@ jobs: - name: Create the new TFE version folder for RELEASE PR run: | version=$(jq -r '.["terraform-enterprise"][] | select(.isLatest == true) | .version' "${{github.workspace}}/release/app/api/versionMetadata.json") - echo "Latest terraform-enterprise version: $version" + echo "Latest terraform-enterprise version: ${version}" echo "LATEST_TFE_VERSION=$version" >> $GITHUB_ENV mkdir -p "${{github.workspace}}/new-docs-pr/app/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" - cp -a "${{github.workspace}}/release/app/content/terraform-enterprise/${{env.LATEST_TFE_VERSION}}" "${{github.workspace}}/new-docs-pr/app/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" + cp -a "${{github.workspace}}/release/app/content/terraform-enterprise/${version}" "${{github.workspace}}/new-docs-pr/app/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" - name: Open new docs version ACTUAL PR working-directory: '${{github.workspace}}/new-docs-pr' From 17d39e97aeccdc675de7284e189a696b4c5389fd Mon Sep 17 00:00:00 2001 From: Ruben Nic Date: Wed, 28 May 2025 20:10:51 -0400 Subject: [PATCH 4/9] Update step titles to match --- .github/workflows/copy-cloud-docs-for-tfe.yml | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/.github/workflows/copy-cloud-docs-for-tfe.yml b/.github/workflows/copy-cloud-docs-for-tfe.yml index 24c686b1e..e2d9449cb 100644 --- a/.github/workflows/copy-cloud-docs-for-tfe.yml +++ b/.github/workflows/copy-cloud-docs-for-tfe.yml @@ -72,7 +72,7 @@ jobs: path: '${{github.workspace}}/release' # MAKE THE RELEASE PR - - name: Checkout main for new docs version ACTUAL PR + - name: Checkout main for new docs version RELEASE PR uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4 with: path: '${{github.workspace}}/new-docs-pr' @@ -93,7 +93,7 @@ jobs: cp -a "${{github.workspace}}/release/app/content/terraform-enterprise/${version}" "${{github.workspace}}/new-docs-pr/app/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" - - name: Open new docs version ACTUAL PR + - name: Open new docs version RELEASE PR working-directory: '${{github.workspace}}/new-docs-pr' env: branch_name: docs/${{env.SERIES}}-${{env.RELEASE}} @@ -203,7 +203,7 @@ jobs: echo "DIFF_PR_URL=${diff_pr_url}" >> $GITHUB_ENV echo "**Automated DIFF PR URL**: ${diff_pr_url}" >> $GITHUB_STEP_SUMMARY - - name: Update Release PR with diff PR URL + - name: Update RELEASE PR with DIFF PR URL env: branch_name: docs/${{env.SERIES}}-${{env.RELEASE}} pr_body: | From 1fa3ba50f4c575c922b1c38f2dfb31a4b4068a34 Mon Sep 17 00:00:00 2001 From: Ruben Nic Date: Wed, 28 May 2025 20:15:45 -0400 Subject: [PATCH 5/9] Added /app to dir when not needed --- .github/workflows/copy-cloud-docs-for-tfe.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/copy-cloud-docs-for-tfe.yml b/.github/workflows/copy-cloud-docs-for-tfe.yml index e2d9449cb..2ee6a005a 100644 --- a/.github/workflows/copy-cloud-docs-for-tfe.yml +++ b/.github/workflows/copy-cloud-docs-for-tfe.yml @@ -89,9 +89,9 @@ jobs: echo "Latest terraform-enterprise version: ${version}" echo "LATEST_TFE_VERSION=$version" >> $GITHUB_ENV - mkdir -p "${{github.workspace}}/new-docs-pr/app/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" + mkdir -p "${{github.workspace}}/new-docs-pr/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" - cp -a "${{github.workspace}}/release/app/content/terraform-enterprise/${version}" "${{github.workspace}}/new-docs-pr/app/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" + cp -a "${{github.workspace}}/release/content/terraform-enterprise/${version}" "${{github.workspace}}/new-docs-pr/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" - name: Open new docs version RELEASE PR working-directory: '${{github.workspace}}/new-docs-pr' From 70cd99af955056454f3febdba522563ee7f563c4 Mon Sep 17 00:00:00 2001 From: Ruben Nic Date: Wed, 28 May 2025 20:21:10 -0400 Subject: [PATCH 6/9] Update gh cli action to edit --- .github/workflows/copy-cloud-docs-for-tfe.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/copy-cloud-docs-for-tfe.yml b/.github/workflows/copy-cloud-docs-for-tfe.yml index 2ee6a005a..143744094 100644 --- a/.github/workflows/copy-cloud-docs-for-tfe.yml +++ b/.github/workflows/copy-cloud-docs-for-tfe.yml @@ -232,5 +232,5 @@ jobs: git config --global user.email "team-rel-eng@hashicorp.com" git config --global user.name "tfe-release-bot" - gh pr update ${{env.PR_URL}} \ + gh pr edit ${{env.PR_URL}} \ --body="${{env.pr_body}}" From 4d2fc445adb0b4a00d886640612145056befd698 Mon Sep 17 00:00:00 2001 From: Ruben Nic Date: Wed, 28 May 2025 20:21:26 -0400 Subject: [PATCH 7/9] Copy file contents not the whole file --- .github/workflows/copy-cloud-docs-for-tfe.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/copy-cloud-docs-for-tfe.yml b/.github/workflows/copy-cloud-docs-for-tfe.yml index 143744094..52497d5b6 100644 --- a/.github/workflows/copy-cloud-docs-for-tfe.yml +++ b/.github/workflows/copy-cloud-docs-for-tfe.yml @@ -91,7 +91,7 @@ jobs: mkdir -p "${{github.workspace}}/new-docs-pr/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" - cp -a "${{github.workspace}}/release/content/terraform-enterprise/${version}" "${{github.workspace}}/new-docs-pr/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" + cp -a "${{github.workspace}}/release/content/terraform-enterprise/${version}/." "${{github.workspace}}/new-docs-pr/content/terraform-enterprise/${{env.SERIES}}-${{env.RELEASE}}" - name: Open new docs version RELEASE PR working-directory: '${{github.workspace}}/new-docs-pr' From 685b395f8913fec30f081743e36e14bb28dd1be0 Mon Sep 17 00:00:00 2001 From: Ruben Nic Date: Wed, 28 May 2025 20:33:59 -0400 Subject: [PATCH 8/9] Diff PR should start on Release PR ref --- .github/workflows/copy-cloud-docs-for-tfe.yml | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/workflows/copy-cloud-docs-for-tfe.yml b/.github/workflows/copy-cloud-docs-for-tfe.yml index 52497d5b6..dcdef44b0 100644 --- a/.github/workflows/copy-cloud-docs-for-tfe.yml +++ b/.github/workflows/copy-cloud-docs-for-tfe.yml @@ -141,6 +141,7 @@ jobs: uses: actions/checkout@0ad4b8fadaa221de15dcec353f45205ec38ea70b # v4.1.4 with: path: '${{github.workspace}}/new-docs-diff-pr' + ref: docs/${{env.SERIES}}-${{env.RELEASE}} - name: Copy files for new docs version DIFF PR uses: ./release/.github/actions/copy-cloud-docs-for-tfe From adcd3f2bafef0b4648abbe696323d893566874f7 Mon Sep 17 00:00:00 2001 From: tfe-release-bot Date: Thu, 29 May 2025 00:36:39 +0000 Subject: [PATCH 9/9] Automated Release Docs PR --- .../v000011-1/data/.gitkeep | 0 .../v000011-1/data/enterprise-nav-data.json | 1486 +++++++++++++++ .../v000011-1/docs/.gitkeep | 0 .../docs/enterprise/api-docs/_template.mdx | 222 +++ .../docs/enterprise/api-docs/account.mdx | 278 +++ .../docs/enterprise/api-docs/admin/index.mdx | 17 + .../api-docs/admin/initial-admin-user.mdx | 69 + .../api-docs/admin/module-sharing.mdx | 121 ++ .../api-docs/admin/opa-versions.mdx | 358 ++++ .../api-docs/admin/organizations.mdx | 624 ++++++ .../api-docs/admin/registry-sharing.mdx | 92 + .../docs/enterprise/api-docs/admin/runs.mdx | 224 +++ .../api-docs/admin/sentinel-versions.mdx | 346 ++++ .../enterprise/api-docs/admin/settings.mdx | 897 +++++++++ .../api-docs/admin/terraform-versions.mdx | 363 ++++ .../docs/enterprise/api-docs/admin/users.mdx | 509 +++++ .../enterprise/api-docs/admin/workspaces.mdx | 252 +++ .../docs/enterprise/api-docs/agent-tokens.mdx | 272 +++ .../docs/enterprise/api-docs/agents.mdx | 637 +++++++ .../docs/enterprise/api-docs/applies.mdx | 201 ++ .../api-docs/assessment-results.mdx | 129 ++ .../docs/enterprise/api-docs/changelog.mdx | 565 ++++++ .../docs/enterprise/api-docs/comments.mdx | 227 +++ .../api-docs/configuration-versions.mdx | 561 ++++++ .../enterprise/api-docs/cost-estimates.mdx | 98 + .../api-docs/data-retention-policies.mdx | 291 +++ .../api-docs/github-app-installations.mdx | 127 ++ .../docs/enterprise/api-docs/index.mdx | 374 ++++ .../api-docs/no-code-provisioning.mdx | 924 +++++++++ .../api-docs/notification-configurations.mdx | 1437 ++++++++++++++ .../enterprise/api-docs/oauth-clients.mdx | 603 ++++++ .../docs/enterprise/api-docs/oauth-tokens.mdx | 264 +++ .../api-docs/organization-memberships.mdx | 497 +++++ .../enterprise/api-docs/organization-tags.mdx | 230 +++ .../api-docs/organization-tokens.mdx | 148 ++ .../enterprise/api-docs/organizations.mdx | 986 ++++++++++ .../docs/enterprise/api-docs/plan-exports.mdx | 226 +++ .../docs/enterprise/api-docs/plans.mdx | 203 ++ .../docs/enterprise/api-docs/policies.mdx | 564 ++++++ .../enterprise/api-docs/policy-checks.mdx | 265 +++ .../api-docs/policy-evaluations.mdx | 288 +++ .../enterprise/api-docs/policy-set-params.mdx | 290 +++ .../docs/enterprise/api-docs/policy-sets.mdx | 1298 +++++++++++++ .../api-docs/private-registry/gpg-keys.mdx | 388 ++++ .../manage-module-versions.mdx | 272 +++ .../api-docs/private-registry/modules.mdx | 942 +++++++++ .../provider-versions-platforms.mdx | 707 +++++++ .../api-docs/private-registry/providers.mdx | 471 +++++ .../api-docs/private-registry/tests.mdx | 755 ++++++++ .../api-docs/project-team-access.mdx | 523 +++++ .../docs/enterprise/api-docs/projects.mdx | 719 +++++++ .../enterprise/api-docs/reserved-tag-keys.mdx | 271 +++ .../run-tasks/run-task-stages-and-results.mdx | 366 ++++ .../run-tasks/run-tasks-integration.mdx | 296 +++ .../api-docs/run-tasks/run-tasks.mdx | 814 ++++++++ .../docs/enterprise/api-docs/run-triggers.mdx | 349 ++++ .../docs/enterprise/api-docs/run.mdx | 902 +++++++++ .../docs/enterprise/api-docs/ssh-keys.mdx | 320 ++++ .../enterprise/api-docs/stability-policy.mdx | 25 + .../api-docs/state-version-outputs.mdx | 244 +++ .../enterprise/api-docs/state-versions.mdx | 1241 ++++++++++++ .../docs/enterprise/api-docs/team-access.mdx | 433 +++++ .../docs/enterprise/api-docs/team-members.mdx | 249 +++ .../docs/enterprise/api-docs/team-tokens.mdx | 299 +++ .../docs/enterprise/api-docs/teams.mdx | 466 +++++ .../docs/enterprise/api-docs/user-tokens.mdx | 286 +++ .../docs/enterprise/api-docs/users.mdx | 102 + .../enterprise/api-docs/variable-sets.mdx | 1018 ++++++++++ .../docs/enterprise/api-docs/variables.mdx | 307 +++ .../docs/enterprise/api-docs/vcs-events.mdx | 132 ++ .../api-docs/workspace-resources.mdx | 126 ++ .../api-docs/workspace-variables.mdx | 298 +++ .../docs/enterprise/api-docs/workspaces.mdx | 1686 +++++++++++++++++ .../admin-access.mdx | 29 + .../agents-on-tfe.mdx | 53 + .../customization.mdx | 54 + .../application-administration/general.mdx | 117 ++ .../github-app-integration.mdx | 153 ++ .../application-administration/index.mdx | 21 + .../integration.mdx | 70 + .../opa-tool-versions.mdx | 30 + .../registry-sharing.mdx | 58 + .../application-administration/resources.mdx | 93 + .../sentinel-tool-versions.mdx | 30 + .../docs/enterprise/cost-estimation/aws.mdx | 158 ++ .../docs/enterprise/cost-estimation/azure.mdx | 56 + .../docs/enterprise/cost-estimation/gcp.mdx | 42 + .../docs/enterprise/cost-estimation/index.mdx | 58 + .../enterprise/deploy/configuration/index.mdx | 18 + .../deploy/configuration/license.mdx | 34 + .../deploy/configuration/network.mdx | 240 +++ .../configuration/storage/configure-mode.mdx | 87 + .../storage/connect-database/aurora.mdx | 100 + .../connect-database/failover-resilience.mdx | 87 + .../storage/connect-database/index.mdx | 31 + .../storage/connect-database/patroni.mdx | 196 ++ .../connect-database/postgres-cluster.mdx | 195 ++ .../storage/connect-database/postgres.mdx | 132 ++ .../configuration/storage/connect-object.mdx | 92 + .../configuration/storage/connect-redis.mdx | 137 ++ .../configuration/storage/connect-vault.mdx | 34 + .../deploy/configuration/storage/index.mdx | 50 + .../docs/enterprise/deploy/custom-image.mdx | 47 + .../docs/enterprise/deploy/docker/index.mdx | 341 ++++ .../docs/enterprise/deploy/docker/scale.mdx | 141 ++ .../docs/enterprise/deploy/index.mdx | 59 + .../enterprise/deploy/initial-admin-user.mdx | 115 ++ .../enterprise/deploy/kubernetes/index.mdx | 342 ++++ .../deploy/kubernetes/scale/index.mdx | 23 + .../deploy/kubernetes/scale/replicas.mdx | 96 + .../deploy/kubernetes/scale/run-capacity.mdx | 99 + .../enterprise/deploy/manage/access-cli.mdx | 50 + .../deploy/manage/backup-restore.mdx | 180 ++ .../enterprise/deploy/manage/failover.mdx | 85 + .../docs/enterprise/deploy/manage/index.mdx | 20 + .../deploy/manage/license-report.mdx | 83 + .../docs/enterprise/deploy/manage/monitor.mdx | 157 ++ .../deploy/manage/product-report.mdx | 88 + .../docs/enterprise/deploy/manage/upgrade.mdx | 100 + .../docs/enterprise/deploy/nomad.mdx | 606 ++++++ .../docs/enterprise/deploy/openshift.mdx | 262 +++ .../docs/enterprise/deploy/podman.mdx | 493 +++++ .../docs/enterprise/deploy/prepare-host.mdx | 156 ++ .../deploy/reference/application-security.mdx | 11 + .../docs/enterprise/deploy/reference/cli.mdx | 340 ++++ .../deploy/reference/configuration.mdx | 748 ++++++++ .../deploy/reference/data-security.mdx | 8 + .../deploy/reference/license-data.mdx | 66 + .../enterprise/deploy/reference/metrics.mdx | 70 + .../deploy/reference/product-data.mdx | 10 + .../enterprise/deploy/reference/services.mdx | 72 + .../deploy/reference/startup-checks.mdx | 109 ++ .../deploy/replicated-migration.mdx | 835 ++++++++ .../replicated/administration/index.mdx | 18 + .../infrastructure/admin-cli.mdx | 169 ++ .../infrastructure/automated-recovery.mdx | 251 +++ .../infrastructure/backup-restore.mdx | 204 ++ .../infrastructure/consolidated-services.mdx | 125 ++ .../administration/infrastructure/index.mdx | 21 + .../mounted-to-external-migration.mdx | 139 ++ .../infrastructure/upgrades/index.mdx | 54 + .../infrastructure/upgrades/prepare.mdx | 101 + .../infrastructure/upgrades/upgrade.mdx | 188 ++ .../worker-to-agent-migration.mdx | 184 ++ ...utomated-license-utilization-reporting.mdx | 113 ++ .../administration/license/index.mdx | 20 + .../license/update-tfe-license.mdx | 162 ++ .../reference-architecture/aws.mdx | 433 +++++ .../reference-architecture/azure.mdx | 406 ++++ .../reference-architecture/gcp.mdx | 398 ++++ .../reference-architecture/index.mdx | 33 + .../reference-architecture/vmware.mdx | 296 +++ .../architecture/system-overview/capacity.mdx | 74 + .../system-overview/data-security.mdx | 57 + .../architecture/system-overview/index.mdx | 11 + .../reliability-availability.mdx | 143 ++ .../system-overview/security-model.mdx | 29 + .../enterprise/deploy/replicated/index.mdx | 24 + .../install/automated/active-active.mdx | 325 ++++ .../automated/automating-initial-user.mdx | 129 ++ .../automated/automating-the-installer.mdx | 413 ++++ .../install/automated/encryption-password.mdx | 51 + .../replicated/install/interactive/config.mdx | 54 + .../install/interactive/installer.mdx | 372 ++++ .../replicated/install/operation-modes.mdx | 106 ++ .../install/pre-install-checklist.mdx | 43 + .../deploy/replicated/install/uninstall.mdx | 248 +++ .../deploy/replicated/install/vault.mdx | 30 + .../deploy/replicated/monitoring/logging.mdx | 179 ++ .../replicated/monitoring/monitoring.mdx | 94 + .../replicated/requirements/credentials.mdx | 87 + .../data-storage/minio-setup-guide.mdx | 7 + .../operational-mode-requirements.mdx | 32 + .../data-storage/postgres-requirements.mdx | 16 + .../replicated/requirements/docker_engine.mdx | 119 ++ .../replicated/requirements/hardware.mdx | 19 + .../replicated/requirements/network.mdx | 142 ++ .../os-specific/centos-requirements.mdx | 33 + .../os-specific/rhel-requirements.mdx | 40 + .../requirements/os-specific/supported-os.mdx | 33 + .../deploy/troubleshoot/contact-support.mdx | 61 + .../deploy/troubleshoot/error-messages.mdx | 133 ++ .../enterprise/deploy/troubleshoot/index.mdx | 16 + .../troubleshoot/perform-diagnostics.mdx | 122 ++ .../v000011-1/docs/enterprise/index.mdx | 21 + .../aws-service-catalog/index.mdx | 27 + .../docs/enterprise/integrations/index.mdx | 26 + .../kubernetes/annotations-and-labels.mdx | 26 + .../integrations/kubernetes/api-reference.mdx | 796 ++++++++ .../integrations/kubernetes/index.mdx | 220 +++ .../kubernetes/ops-v2-migration.mdx | 342 ++++ .../integrations/kubernetes/setup.mdx | 98 + .../integrations/run-tasks/index.mdx | 109 ++ .../service-catalog-terraform/admin-guide.mdx | 56 + .../developer-reference.mdx | 112 ++ .../example-customizations.mdx | 174 ++ .../service-catalog-terraform/index.mdx | 239 +++ .../service-catalog-config.mdx | 255 +++ .../troubleshoot.mdx | 120 ++ .../service-graph/customizations.mdx | 97 + .../service-now/service-graph/index.mdx | 83 + .../service-graph/resource-coverage/aws.mdx | 219 +++ .../service-graph/resource-coverage/azure.mdx | 158 ++ .../service-graph/resource-coverage/gcp.mdx | 159 ++ .../service-graph/resource-coverage/index.mdx | 37 + .../resource-coverage/vsphere.mdx | 84 + .../service-graph/service-graph-setup.mdx | 162 ++ .../docs/enterprise/migrate/index.mdx | 91 + .../enterprise/migrate/tf-migrate/index.mdx | 132 ++ .../tf-migrate/reference/configuration.mdx | 88 + .../migrate/tf-migrate/reference/execute.mdx | 65 + .../migrate/tf-migrate/reference/prepare.mdx | 104 + .../no-code-provisioning/module-design.mdx | 72 + .../no-code-provisioning/provisioning.mdx | 89 + .../define-policies/custom-sentinel.mdx | 260 +++ .../define-policies/index.mdx | 19 + .../define-policies/opa.mdx | 259 +++ .../import-reference/index.mdx | 32 + .../import-reference/tfconfig-v2.mdx | 422 +++++ .../import-reference/tfconfig.mdx | 976 ++++++++++ .../import-reference/tfplan-v2.mdx | 388 ++++ .../import-reference/tfplan.mdx | 604 ++++++ .../import-reference/tfrun.mdx | 320 ++++ .../import-reference/tfstate-v2.mdx | 180 ++ .../import-reference/tfstate.mdx | 550 ++++++ .../enterprise/policy-enforcement/index.mdx | 50 + .../manage-policy-sets/index.mdx | 219 +++ .../manage-policy-sets/opa-vcs.mdx | 48 + .../manage-policy-sets/sentinel-vcs.mdx | 139 ++ .../policy-enforcement/prewritten-library.mdx | 26 + .../prewritten-sentinel.mdx | 133 ++ .../policy-enforcement/test-sentinel.mdx | 277 +++ .../policy-enforcement/view-results/index.mdx | 74 + .../policy-enforcement/view-results/json.mdx | 59 + .../enterprise/projects/best-practices.mdx | 40 + .../docs/enterprise/projects/index.mdx | 51 + .../docs/enterprise/projects/manage.mdx | 122 ++ .../docs/enterprise/registry/add.mdx | 79 + .../registry/airgapped-providers.mdx | 53 + .../docs/enterprise/registry/design.mdx | 64 + .../docs/enterprise/registry/index.mdx | 27 + .../registry/manage-module-versions.mdx | 82 + .../enterprise/registry/publish-modules.mdx | 165 ++ .../enterprise/registry/publish-providers.mdx | 266 +++ .../docs/enterprise/registry/test.mdx | 69 + .../docs/enterprise/registry/using.mdx | 149 ++ .../docs/enterprise/releases/2018/index.mdx | 31 + .../docs/enterprise/releases/2019/index.mdx | 45 + .../docs/enterprise/releases/2020/index.mdx | 43 + .../docs/enterprise/releases/2021/index.mdx | 32 + .../enterprise/releases/2021/v202101-1.mdx | 24 + .../enterprise/releases/2021/v202102-1.mdx | 20 + .../enterprise/releases/2021/v202102-2.mdx | 24 + .../enterprise/releases/2021/v202103-1.mdx | 95 + .../enterprise/releases/2021/v202103-2.mdx | 99 + .../enterprise/releases/2021/v202103-3.mdx | 103 + .../enterprise/releases/2021/v202104-1.mdx | 42 + .../enterprise/releases/2021/v202105-1.mdx | 42 + .../enterprise/releases/2021/v202106-1.mdx | 41 + .../enterprise/releases/2021/v202107-1.mdx | 34 + .../enterprise/releases/2021/v202108-1.mdx | 45 + .../enterprise/releases/2021/v202109-1.mdx | 53 + .../enterprise/releases/2021/v202109-2.mdx | 57 + .../enterprise/releases/2021/v202110-1.mdx | 37 + .../enterprise/releases/2021/v202111-1.mdx | 35 + .../enterprise/releases/2021/v202112-1.mdx | 40 + .../enterprise/releases/2021/v202112-2.mdx | 48 + .../docs/enterprise/releases/2022/index.mdx | 34 + .../enterprise/releases/2022/v202201-1.mdx | 45 + .../enterprise/releases/2022/v202201-2.mdx | 47 + .../enterprise/releases/2022/v202202-1.mdx | 40 + .../enterprise/releases/2022/v202203-1.mdx | 45 + .../enterprise/releases/2022/v202204-1.mdx | 48 + .../enterprise/releases/2022/v202204-2.mdx | 51 + .../enterprise/releases/2022/v202205-1.mdx | 41 + .../enterprise/releases/2022/v202206-1.mdx | 38 + .../enterprise/releases/2022/v202207-1.mdx | 55 + .../enterprise/releases/2022/v202207-2.mdx | 59 + .../enterprise/releases/2022/v202208-1.mdx | 35 + .../enterprise/releases/2022/v202208-2.mdx | 37 + .../enterprise/releases/2022/v202208-3.mdx | 41 + .../enterprise/releases/2022/v202209-1.mdx | 48 + .../enterprise/releases/2022/v202209-2.mdx | 53 + .../enterprise/releases/2022/v202210-1.mdx | 58 + .../enterprise/releases/2022/v202211-1.mdx | 51 + .../enterprise/releases/2022/v202212-1.mdx | 62 + .../enterprise/releases/2022/v202212-2.mdx | 66 + .../docs/enterprise/releases/2023/index.mdx | 67 + .../enterprise/releases/2023/v202301-1.mdx | 80 + .../enterprise/releases/2023/v202301-2.mdx | 84 + .../enterprise/releases/2023/v202302-1.mdx | 70 + .../enterprise/releases/2023/v202303-1.mdx | 72 + .../enterprise/releases/2023/v202304-1.mdx | 45 + .../enterprise/releases/2023/v202305-1.mdx | 61 + .../enterprise/releases/2023/v202305-2.mdx | 63 + .../enterprise/releases/2023/v202306-1.mdx | 53 + .../enterprise/releases/2023/v202307-1.mdx | 79 + .../enterprise/releases/2023/v202308-1.mdx | 50 + .../enterprise/releases/2023/v202309-1.mdx | 48 + .../enterprise/releases/2023/v202310-1.mdx | 51 + .../enterprise/releases/2023/v202311-1.mdx | 44 + .../enterprise/releases/2023/v202312-1.mdx | 48 + .../docs/enterprise/releases/2024/index.mdx | 135 ++ .../enterprise/releases/2024/v202401-1.mdx | 73 + .../enterprise/releases/2024/v202401-2.mdx | 76 + .../enterprise/releases/2024/v202402-1.mdx | 52 + .../enterprise/releases/2024/v202402-2.mdx | 57 + .../enterprise/releases/2024/v202404-1.mdx | 72 + .../enterprise/releases/2024/v202404-2.mdx | 80 + .../enterprise/releases/2024/v202405-1.mdx | 70 + .../enterprise/releases/2024/v202406-1.mdx | 65 + .../enterprise/releases/2024/v202407-1.mdx | 59 + .../enterprise/releases/2024/v202408-1.mdx | 56 + .../enterprise/releases/2024/v202409-1.mdx | 50 + .../enterprise/releases/2024/v202409-2.mdx | 53 + .../enterprise/releases/2024/v202409-3.mdx | 54 + .../enterprise/releases/2024/v202410-1.mdx | 61 + .../enterprise/releases/2024/v202411-1.mdx | 55 + .../enterprise/releases/2024/v202411-2.mdx | 58 + .../docs/enterprise/releases/2025/index.mdx | 89 + .../enterprise/releases/2025/v202501-1.mdx | 50 + .../enterprise/releases/2025/v202502-1.mdx | 58 + .../enterprise/releases/2025/v202502-2.mdx | 61 + .../enterprise/releases/2025/v202503-1.mdx | 40 + .../enterprise/releases/2025/v202504-1.mdx | 33 + .../docs/enterprise/releases/index.mdx | 160 ++ .../v000011-1/docs/enterprise/run/api.mdx | 197 ++ .../v000011-1/docs/enterprise/run/cli.mdx | 299 +++ .../docs/enterprise/run/install-software.mdx | 111 ++ .../v000011-1/docs/enterprise/run/manage.mdx | 78 + .../docs/enterprise/run/modes-and-options.mdx | 123 ++ .../docs/enterprise/run/remote-operations.mdx | 148 ++ .../docs/enterprise/run/run-environment.mdx | 125 ++ .../v000011-1/docs/enterprise/run/states.mdx | 218 +++ .../v000011-1/docs/enterprise/run/ui.mdx | 138 ++ .../docs/enterprise/saml/attributes.mdx | 81 + .../docs/enterprise/saml/configuration.mdx | 73 + .../enterprise/saml/idp-configuration/aad.mdx | 87 + .../saml/idp-configuration/adfs.mdx | 110 ++ .../saml/idp-configuration/index.mdx | 84 + .../saml/idp-configuration/okta.mdx | 145 ++ .../saml/idp-configuration/onelogin.mdx | 93 + .../v000011-1/docs/enterprise/saml/login.mdx | 18 + .../docs/enterprise/saml/team-membership.mdx | 44 + .../docs/enterprise/saml/troubleshooting.mdx | 138 ++ .../users-teams-organizations/2fa.mdx | 47 + .../users-teams-organizations/api-tokens.mdx | 125 ++ .../organizations/index.mdx | 337 ++++ .../organizations/manage-reserved-tags.mdx | 59 + .../vcs-speculative-plan-management.mdx | 45 + .../organizations/vcs-status-checks.mdx | 49 + .../users-teams-organizations/permissions.mdx | 392 ++++ .../users-teams-organizations/teams/index.mdx | 59 + .../teams/manage.mdx | 109 ++ .../teams/notifications.mdx | 132 ++ .../users-teams-organizations/users.mdx | 215 +++ .../enterprise/vcs/azure-devops-server.mdx | 92 + .../enterprise/vcs/azure-devops-services.mdx | 130 ++ .../docs/enterprise/vcs/bitbucket-cloud.mdx | 127 ++ .../enterprise/vcs/bitbucket-data-center.mdx | 128 ++ .../docs/enterprise/vcs/github-enterprise.mdx | 140 ++ .../v000011-1/docs/enterprise/vcs/github.mdx | 145 ++ .../docs/enterprise/vcs/gitlab-com.mdx | 119 ++ .../docs/enterprise/vcs/gitlab-eece.mdx | 133 ++ .../v000011-1/docs/enterprise/vcs/index.mdx | 140 ++ .../docs/enterprise/vcs/troubleshooting.mdx | 227 +++ .../enterprise/workspaces/best-practices.mdx | 67 + .../docs/enterprise/workspaces/browse.mdx | 72 + .../enterprise/workspaces/configurations.mdx | 73 + .../docs/enterprise/workspaces/create.mdx | 110 ++ .../aws-configuration.mdx | 165 ++ .../azure-configuration.mdx | 177 ++ .../gcp-configuration.mdx | 174 ++ .../hcp-configuration.mdx | 116 ++ .../aws-configuration.mdx | 102 + .../gcp-configuration.mdx | 119 ++ .../hcp-vault-secrets-backed/index.mdx | 38 + .../dynamic-provider-credentials/index.mdx | 59 + .../kubernetes-configuration.mdx | 171 ++ .../manual-generation.mdx | 42 + .../specifying-multiple-configurations.mdx | 94 + .../vault-backed/aws-configuration.mdx | 135 ++ .../vault-backed/azure-configuration.mdx | 152 ++ .../vault-backed/gcp-configuration.mdx | 167 ++ .../vault-backed/index.mdx | 52 + .../vault-configuration.mdx | 225 +++ .../workload-identity-tokens.mdx | 99 + .../docs/enterprise/workspaces/health.mdx | 245 +++ .../docs/enterprise/workspaces/index.mdx | 100 + .../enterprise/workspaces/json-filtering.mdx | 117 ++ .../enterprise/workspaces/settings/access.mdx | 54 + .../workspaces/settings/deletion.mdx | 125 ++ .../enterprise/workspaces/settings/index.mdx | 212 +++ .../workspaces/settings/notifications.mdx | 130 ++ .../workspaces/settings/run-tasks.mdx | 129 ++ .../workspaces/settings/run-triggers.mdx | 51 + .../workspaces/settings/ssh-keys.mdx | 63 + .../enterprise/workspaces/settings/vcs.mdx | 127 ++ .../docs/enterprise/workspaces/state.mdx | 257 +++ .../docs/enterprise/workspaces/tags.mdx | 94 + .../enterprise/workspaces/variables/index.mdx | 237 +++ .../variables/managing-variables.mdx | 248 +++ .../v000011-1/docs/partials/README.md | 10 + .../api-code-blocks/workspace-with-vcs.mdx | 196 ++ .../partials/api-code-blocks/workspace.mdx | 195 ++ .../api-code-blocks/workspaces-list.mdx | 214 +++ .../externalizing-secret-values.mdx | 17 + .../admin/active-active-scaling-partial.mdx | 44 + .../admin/license-example-usage-payload.mdx | 167 ++ .../admin/license-utilization-intro.mdx | 33 + .../architecture/data-security-partial.mdx | 49 + .../architecture/security-model-partial.mdx | 86 + .../supported-destinations-partial.mdx | 178 ++ .../requirements/custom-image.mdx | 36 + .../requirements/minio-partial.mdx | 93 + .../requirements/operation-modes-partial.mdx | 48 + .../requirements/postgres-partial.mdx | 46 + .../requirements/vault-partial.mdx | 119 ++ .../partials/tfc-package-callouts/agents.mdx | 1 + .../tfc-package-callouts/audit-trails.mdx | 1 + .../aws-service-catalog.mdx | 1 + .../ephemeral-workspaces.mdx | 1 + .../health-assessments.mdx | 1 + .../manage-module-versions.mdx | 1 + .../partials/tfc-package-callouts/nocode.mdx | 1 + .../tfc-package-callouts/notifications.mdx | 1 + .../tfc-package-callouts/policies.mdx | 1 + .../project-permissions.mdx | 1 + .../tfc-package-callouts/run-tasks.mdx | 1 + .../servicenow-catalog.mdx | 1 + .../tfc-package-callouts/team-management.mdx | 1 + .../v000011-1/img/.gitkeep | 0 .../img/docs/RA-TFE-AA-AWS-SingleRegion.png | Bin 0 -> 80276 bytes .../img/docs/RA-TFE-AA-Azure-SingleRegion.png | Bin 0 -> 69537 bytes .../img/docs/RA-TFE-AA-GCP-SingleRegion.png | Bin 0 -> 73041 bytes .../docs/RA-TFE-AA-VMware-SingleRegion.png | Bin 0 -> 39422 bytes .../img/docs/RA-TFE-SA-AWS-SingleRegion.png | Bin 0 -> 66534 bytes .../img/docs/RA-TFE-SA-Azure-SingleRegion.png | Bin 0 -> 76041 bytes .../img/docs/RA-TFE-SA-GCP-SingleRegion.png | Bin 0 -> 65711 bytes .../v000011-1/img/docs/TFE_In_Kubernetes.png | Bin 0 -> 37307 bytes .../img/docs/admin-customization.png | Bin 0 -> 302010 bytes .../img/docs/ado-required-status-check.png | Bin 0 -> 232272 bytes .../docs/azure-devops-server-public-keys.png | Bin 0 -> 132652 bytes ...evops-services-application-permissions.png | Bin 0 -> 101705 bytes .../azure-devops-services-oauth-policies.png | Bin 0 -> 130401 bytes .../v000011-1/img/docs/build-worker.png | Bin 0 -> 205697 bytes .../v000011-1/img/docs/download-mocks.png | Bin 0 -> 56945 bytes .../img/docs/enc-password-manual-install.png | Bin 0 -> 22454 bytes .../v000011-1/img/docs/json-viewer-intro.png | Bin 0 -> 61869 bytes ...n-vcs-general-aggregated-status-checks.png | Bin 0 -> 122466 bytes ...s-general-non-aggregated-status-checks.png | Bin 0 -> 179599 bytes .../v000011-1/img/docs/runs-confirm.png | Bin 0 -> 305292 bytes .../v000011-1/img/docs/saml-error.png | Bin 0 -> 87931 bytes .../v000011-1/img/docs/saml-response.png | Bin 0 -> 327496 bytes .../v000011-1/img/docs/saml-sso-enable.png | Bin 0 -> 38819 bytes .../v000011-1/img/docs/saml_0.png | Bin 0 -> 98297 bytes .../v000011-1/img/docs/saml_1.png | Bin 0 -> 18149 bytes .../v000011-1/img/docs/saml_10.png | Bin 0 -> 25597 bytes .../v000011-1/img/docs/saml_11.png | Bin 0 -> 19412 bytes .../v000011-1/img/docs/saml_12.png | Bin 0 -> 35151 bytes .../v000011-1/img/docs/saml_13.png | Bin 0 -> 48965 bytes .../v000011-1/img/docs/saml_14.png | Bin 0 -> 35011 bytes .../v000011-1/img/docs/saml_15.png | Bin 0 -> 45511 bytes .../v000011-1/img/docs/saml_16.png | Bin 0 -> 44646 bytes .../v000011-1/img/docs/saml_17.png | Bin 0 -> 25418 bytes .../v000011-1/img/docs/saml_19.png | Bin 0 -> 36824 bytes .../v000011-1/img/docs/saml_2.png | Bin 0 -> 218408 bytes .../v000011-1/img/docs/saml_22.png | Bin 0 -> 39519 bytes .../v000011-1/img/docs/saml_23.png | Bin 0 -> 47450 bytes .../v000011-1/img/docs/saml_26.png | Bin 0 -> 37742 bytes .../v000011-1/img/docs/saml_27.png | Bin 0 -> 27101 bytes .../v000011-1/img/docs/saml_3.png | Bin 0 -> 49653 bytes .../v000011-1/img/docs/saml_5.png | Bin 0 -> 51295 bytes .../v000011-1/img/docs/saml_6.png | Bin 0 -> 28816 bytes .../v000011-1/img/docs/saml_8.png | Bin 0 -> 37672 bytes .../v000011-1/img/docs/saml_9.png | Bin 0 -> 17793 bytes .../img/docs/sentinel-json-enter-filter.png | Bin 0 -> 17427 bytes .../img/docs/sentinel-json-quick-filter.png | Bin 0 -> 56943 bytes .../v000011-1/img/docs/sentinel-view-json.png | Bin 0 -> 49721 bytes .../img/docs/service-now-comments.png | Bin 0 -> 288283 bytes .../docs/service-now-service-graph-apikey.png | Bin 0 -> 210155 bytes ...ervice-graph-conditional-class-mapping.png | Bin 0 -> 281274 bytes ...rvice-now-service-graph-deactivate-etl.png | Bin 0 -> 167695 bytes .../docs/service-now-service-graph-design.png | Bin 0 -> 247189 bytes ...ow-service-graph-etl-attribute-mapping.png | Bin 0 -> 741820 bytes ...now-service-graph-etl-condition-update.png | Bin 0 -> 331274 bytes ...service-graph-etl-editing-relationship.png | Bin 0 -> 393932 bytes ...service-graph-etl-setting-relationship.png | Bin 0 -> 368626 bytes .../service-now-service-graph-import-set.png | Bin 0 -> 376904 bytes ...ice-now-service-graph-scheduled-import.png | Bin 0 -> 507242 bytes ...ice-now-service-graph-state-object-url.png | Bin 0 -> 281619 bytes .../docs/service-now-service-graph-tags.png | Bin 0 -> 594043 bytes ...rvice-now-service-graph-team-token-gen.png | Bin 0 -> 307529 bytes .../docs/service-now-service-graph-tfconn.png | Bin 0 -> 282371 bytes ...ice-now-service-graph-webhook-schedule.png | Bin 0 -> 214156 bytes .../service-now-service-graph-webhook-tfc.png | Bin 0 -> 303560 bytes ...ervice-now-service-graph-webhook-token.png | Bin 0 -> 135170 bytes .../v000011-1/img/docs/service-now-store.png | Bin 0 -> 43209 bytes .../img/docs/service-now-updated-config.png | Bin 0 -> 156774 bytes .../img/docs/service-now-vcs-repository.png | Bin 0 -> 181211 bytes ...icenow-catalog-add-variables-to-action.png | Bin 0 -> 215320 bytes ...icenow-catalog-adjust-script-variables.png | Bin 0 -> 236014 bytes .../servicenow-catalog-configure-item.png | Bin 0 -> 93516 bytes .../docs/servicenow-catalog-copied-item.png | Bin 0 -> 146251 bytes .../docs/servicenow-catalog-copy-action.png | Bin 0 -> 84828 bytes .../img/docs/servicenow-catalog-copy-flow.png | Bin 0 -> 115571 bytes .../img/docs/servicenow-catalog-edit-flow.png | Bin 0 -> 106294 bytes ...ervicenow-catalog-fill-new-action-step.png | Bin 0 -> 167001 bytes .../docs/servicenow-catalog-get-variables.png | Bin 0 -> 238140 bytes .../servicenow-catalog-new-varset-form.png | Bin 0 -> 56763 bytes .../docs/servicenow-catalog-new-varset.png | Bin 0 -> 56398 bytes .../docs/servicenow-catalog-open-action.png | Bin 0 -> 114861 bytes .../docs/servicenow-catalog-original-flow.png | Bin 0 -> 63765 bytes .../servicenow-catalog-process-engine.png | Bin 0 -> 36154 bytes ...g-remove-example-variables-from-action.png | Bin 0 -> 222812 bytes ...cenow-catalog-remove-example-variables.png | Bin 0 -> 98146 bytes .../docs/servicenow-catalog-rename-action.png | Bin 0 -> 39580 bytes .../servicenow-catalog-replace-action.png | Bin 0 -> 138206 bytes .../servicenow-catalog-service-portal.png | Bin 0 -> 28681 bytes ...rvicenow-catalog-update-process-engine.png | Bin 0 -> 66390 bytes .../img/docs/servicenow-catalog-variables.png | Bin 0 -> 43305 bytes .../img/docs/sso-aad-saml-add-application.png | Bin 0 -> 92844 bytes .../docs/sso-aad-saml-app-registration.png | Bin 0 -> 245701 bytes .../img/docs/sso-aad-saml-configuration.png | Bin 0 -> 117691 bytes .../docs/sso-aad-saml-manifest-approles.png | Bin 0 -> 318615 bytes .../docs/sso-aad-saml-manifest-devapprole.png | Bin 0 -> 287432 bytes .../sso-aad-saml-new-application-form.png | Bin 0 -> 90134 bytes .../img/docs/sso-aad-saml-role-assignment.png | Bin 0 -> 106210 bytes .../docs/sso-aad-saml-signing-certificate.png | Bin 0 -> 64381 bytes .../img/docs/sso-aad-saml-sso-method.png | Bin 0 -> 280427 bytes .../docs/sso-aad-saml-tfe-saml-settings.png | Bin 0 -> 178002 bytes .../v000011-1/img/docs/sso-aad-saml-urls.png | Bin 0 -> 47560 bytes .../sso-aad-saml-user-claims-memberof.png | Bin 0 -> 38680 bytes ...o-aad-saml-user-claims-name-identifier.png | Bin 0 -> 418068 bytes .../img/docs/sso-onelogin-access.png | Bin 0 -> 129470 bytes .../img/docs/sso-onelogin-configuration.png | Bin 0 -> 137238 bytes .../v000011-1/img/docs/sso-onelogin-info.png | Bin 0 -> 164128 bytes .../docs/sso-onelogin-parameters-memberof.png | Bin 0 -> 120051 bytes .../img/docs/sso-onelogin-parameters.png | Bin 0 -> 116833 bytes .../img/docs/sso-onelogin-sso-certificate.png | Bin 0 -> 124254 bytes .../v000011-1/img/docs/sso-onelogin-sso.png | Bin 0 -> 145892 bytes .../img/docs/sso-onelogin-users-fields.png | Bin 0 -> 121009 bytes .../v000011-1/img/docs/sso-onelogin-users.png | Bin 0 -> 102813 bytes .../terraform-cloud-run-tasks-diagram.png | Bin 0 -> 73901 bytes .../img/docs/tfc-explorer-health.png | Bin 0 -> 183878 bytes .../img/docs/tfe-console-settings.png | Bin 0 -> 178944 bytes .../v000011-1/img/docs/tfe-dashboard.png | Bin 0 -> 112041 bytes .../v000011-1/img/docs/tfe-data-flow-arch.png | Bin 0 -> 158736 bytes .../v000011-1/img/docs/tfe-http-proxy.png | Bin 0 -> 253112 bytes .../v000011-1/img/docs/tfe-proxy-bypass.png | Bin 0 -> 44486 bytes .../v000011-1/img/docs/tfe-support.png | Bin 0 -> 226173 bytes .../tfe_console-custom_agent_image_tag.png | Bin 0 -> 32313 bytes .../img/docs/tfe_console-custom_image_tag.png | Bin 0 -> 55366 bytes .../v000011-1/img/docs/tls-ca.png | Bin 0 -> 46082 bytes .../v000011-1/img/docs/tls-ciphers.png | Bin 0 -> 35426 bytes .../v000011-1/img/docs/tls-hsts.png | Bin 0 -> 28285 bytes .../v000011-1/img/docs/tls-installer.png | Bin 0 -> 61176 bytes .../v000011-1/img/docs/tls-self-signed.png | Bin 0 -> 16399 bytes .../v000011-1/img/docs/tls-server-path.png | Bin 0 -> 28896 bytes .../v000011-1/img/docs/tls-upload.png | Bin 0 -> 22805 bytes .../v000011-1/img/docs/tls-versions.png | Bin 0 -> 30137 bytes .../v000011-1/img/docs/token.png | Bin 0 -> 47408 bytes ...re-mounted-disk-infrastructure-diagram.png | Bin 0 -> 43228 bytes .../img/docs/workspace-net-infra-combined.png | Bin 0 -> 23830 bytes .../img/docs/workspace-net-infra-split.png | Bin 0 -> 24195 bytes .../v000011-1/redirects.jsonc | 784 ++++++++ 566 files changed, 74519 insertions(+) create mode 100644 content/terraform-enterprise/v000011-1/data/.gitkeep create mode 100644 content/terraform-enterprise/v000011-1/data/enterprise-nav-data.json create mode 100644 content/terraform-enterprise/v000011-1/docs/.gitkeep create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/_template.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/account.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/initial-admin-user.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/module-sharing.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/opa-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/organizations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/registry-sharing.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/runs.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/sentinel-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/settings.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/terraform-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/users.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/workspaces.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/agent-tokens.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/agents.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/applies.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/assessment-results.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/changelog.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/comments.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/configuration-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/cost-estimates.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/data-retention-policies.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/github-app-installations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/no-code-provisioning.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/notification-configurations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/oauth-clients.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/oauth-tokens.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-memberships.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-tags.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-tokens.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organizations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/plan-exports.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/plans.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policies.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-checks.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-evaluations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-set-params.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-sets.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/gpg-keys.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/manage-module-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/modules.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/provider-versions-platforms.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/providers.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/tests.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/project-team-access.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/projects.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/reserved-tag-keys.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-task-stages-and-results.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-tasks-integration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-tasks.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-triggers.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/ssh-keys.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/stability-policy.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/state-version-outputs.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/state-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-access.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-members.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-tokens.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/teams.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/user-tokens.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/users.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/variable-sets.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/variables.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/vcs-events.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspace-resources.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspace-variables.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspaces.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/admin-access.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/agents-on-tfe.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/customization.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/general.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/github-app-integration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/integration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/opa-tool-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/registry-sharing.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/resources.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/sentinel-tool-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/aws.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/azure.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/gcp.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/license.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/network.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/configure-mode.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/aurora.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/failover-resilience.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/patroni.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/postgres-cluster.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/postgres.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-object.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-redis.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-vault.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/custom-image.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/docker/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/docker/scale.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/initial-admin-user.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/replicas.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/run-capacity.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/access-cli.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/backup-restore.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/failover.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/license-report.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/monitor.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/product-report.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/upgrade.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/nomad.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/openshift.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/podman.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/prepare-host.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/application-security.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/cli.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/data-security.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/license-data.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/metrics.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/product-data.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/services.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/startup-checks.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated-migration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/admin-cli.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/automated-recovery.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/backup-restore.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/consolidated-services.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/prepare.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/upgrade.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/worker-to-agent-migration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/automated-license-utilization-reporting.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/update-tfe-license.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/aws.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/azure.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/gcp.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/vmware.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/capacity.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/data-security.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/reliability-availability.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/security-model.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/active-active.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/automating-initial-user.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/automating-the-installer.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/encryption-password.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/interactive/config.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/interactive/installer.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/operation-modes.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/pre-install-checklist.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/uninstall.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/vault.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/monitoring/logging.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/monitoring/monitoring.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/credentials.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/minio-setup-guide.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/docker_engine.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/hardware.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/network.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/centos-requirements.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/rhel-requirements.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/supported-os.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/contact-support.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/error-messages.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/perform-diagnostics.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/aws-service-catalog/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/annotations-and-labels.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/api-reference.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/ops-v2-migration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/setup.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/run-tasks/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/admin-guide.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/developer-reference.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/example-customizations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/troubleshoot.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/customizations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/aws.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/azure.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/gcp.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/vsphere.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/service-graph-setup.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/migrate/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/execute.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/prepare.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/no-code-provisioning/module-design.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/no-code-provisioning/provisioning.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/custom-sentinel.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/opa.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfconfig-v2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfconfig.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfplan-v2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfplan.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfrun.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfstate-v2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfstate.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/opa-vcs.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/prewritten-library.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/prewritten-sentinel.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/test-sentinel.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/view-results/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/view-results/json.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/projects/best-practices.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/projects/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/projects/manage.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/add.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/airgapped-providers.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/design.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/manage-module-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/publish-modules.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/publish-providers.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/test.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/registry/using.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2018/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2019/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2020/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202101-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202102-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202102-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-3.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202104-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202105-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202106-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202107-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202108-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202109-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202109-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202110-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202111-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202112-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202112-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202201-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202201-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202202-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202203-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202204-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202204-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202205-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202206-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202207-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202207-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-3.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202209-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202209-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202210-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202211-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202212-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202212-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202301-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202301-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202302-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202303-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202304-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202305-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202305-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202306-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202307-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202308-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202309-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202310-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202311-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202312-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202401-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202401-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202402-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202402-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202404-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202404-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202405-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202406-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202407-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202408-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-3.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202410-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202411-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202411-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202501-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202502-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202502-2.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202503-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202504-1.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/releases/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/api.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/cli.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/install-software.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/manage.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/modes-and-options.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/remote-operations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/run-environment.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/states.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/run/ui.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/attributes.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/aad.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/adfs.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/okta.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/onelogin.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/login.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/team-membership.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/saml/troubleshooting.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/2fa.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/api-tokens.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/manage-reserved-tags.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/vcs-status-checks.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/permissions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/manage.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/notifications.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/users.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/azure-devops-server.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/azure-devops-services.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/bitbucket-cloud.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/bitbucket-data-center.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/github-enterprise.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/github.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/gitlab-com.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/gitlab-eece.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/vcs/troubleshooting.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/best-practices.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/browse.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/configurations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/create.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/aws-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/azure-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/gcp-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/aws-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/gcp-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/kubernetes-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/manual-generation.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/aws-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/azure-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/gcp-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-configuration.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/health.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/json-filtering.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/access.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/deletion.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/notifications.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/run-tasks.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/run-triggers.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/ssh-keys.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/vcs.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/state.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/tags.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/variables/index.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/variables/managing-variables.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/README.md create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspace-with-vcs.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspace.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspaces-list.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/common-kubernetes-blocks/externalizing-secret-values.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/active-active-scaling-partial.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/license-example-usage-payload.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/license-utilization-intro.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/architecture/data-security-partial.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/architecture/security-model-partial.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/monitoring/logging/supported-destinations-partial.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/custom-image.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/minio-partial.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/operation-modes-partial.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/postgres-partial.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/vault-partial.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/agents.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/audit-trails.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/aws-service-catalog.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/ephemeral-workspaces.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/health-assessments.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/manage-module-versions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/nocode.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/notifications.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/policies.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/project-permissions.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/run-tasks.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/servicenow-catalog.mdx create mode 100644 content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/team-management.mdx create mode 100644 content/terraform-enterprise/v000011-1/img/.gitkeep create mode 100644 content/terraform-enterprise/v000011-1/img/docs/RA-TFE-AA-AWS-SingleRegion.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/RA-TFE-AA-Azure-SingleRegion.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/RA-TFE-AA-GCP-SingleRegion.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/RA-TFE-AA-VMware-SingleRegion.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-AWS-SingleRegion.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-Azure-SingleRegion.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-GCP-SingleRegion.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/TFE_In_Kubernetes.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/admin-customization.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/ado-required-status-check.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/azure-devops-server-public-keys.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/azure-devops-services-application-permissions.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/azure-devops-services-oauth-policies.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/build-worker.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/download-mocks.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/enc-password-manual-install.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/json-viewer-intro.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/organization-vcs-general-aggregated-status-checks.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/organization-vcs-general-non-aggregated-status-checks.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/runs-confirm.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml-error.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml-response.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml-sso-enable.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_0.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_1.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_10.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_11.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_12.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_13.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_14.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_15.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_16.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_17.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_19.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_2.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_22.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_23.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_26.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_27.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_3.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_5.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_6.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_8.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/saml_9.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sentinel-json-enter-filter.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sentinel-json-quick-filter.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sentinel-view-json.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-comments.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-apikey.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-conditional-class-mapping.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-deactivate-etl.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-design.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-etl-attribute-mapping.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-etl-condition-update.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-etl-editing-relationship.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-etl-setting-relationship.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-import-set.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-scheduled-import.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-state-object-url.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-tags.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-team-token-gen.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-tfconn.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-webhook-schedule.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-webhook-tfc.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-service-graph-webhook-token.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-store.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-updated-config.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/service-now-vcs-repository.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-add-variables-to-action.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-adjust-script-variables.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-configure-item.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-copied-item.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-copy-action.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-copy-flow.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-edit-flow.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-fill-new-action-step.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-get-variables.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-new-varset-form.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-new-varset.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-open-action.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-original-flow.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-process-engine.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-remove-example-variables-from-action.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-remove-example-variables.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-rename-action.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-replace-action.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-service-portal.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-update-process-engine.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/servicenow-catalog-variables.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-add-application.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-app-registration.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-configuration.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-manifest-approles.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-manifest-devapprole.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-new-application-form.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-role-assignment.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-signing-certificate.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-sso-method.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-tfe-saml-settings.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-urls.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-user-claims-memberof.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-aad-saml-user-claims-name-identifier.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-access.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-configuration.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-info.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-parameters-memberof.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-parameters.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-sso-certificate.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-sso.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-users-fields.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/sso-onelogin-users.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/terraform-cloud-run-tasks-diagram.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfc-explorer-health.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfe-console-settings.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfe-dashboard.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfe-data-flow-arch.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfe-http-proxy.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfe-proxy-bypass.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfe-support.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfe_console-custom_agent_image_tag.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tfe_console-custom_image_tag.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tls-ca.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tls-ciphers.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tls-hsts.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tls-installer.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tls-self-signed.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tls-server-path.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tls-upload.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/tls-versions.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/token.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/vmware-mounted-disk-infrastructure-diagram.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/workspace-net-infra-combined.png create mode 100644 content/terraform-enterprise/v000011-1/img/docs/workspace-net-infra-split.png create mode 100644 content/terraform-enterprise/v000011-1/redirects.jsonc diff --git a/content/terraform-enterprise/v000011-1/data/.gitkeep b/content/terraform-enterprise/v000011-1/data/.gitkeep new file mode 100644 index 000000000..e69de29bb diff --git a/content/terraform-enterprise/v000011-1/data/enterprise-nav-data.json b/content/terraform-enterprise/v000011-1/data/enterprise-nav-data.json new file mode 100644 index 000000000..d12ca760d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/data/enterprise-nav-data.json @@ -0,0 +1,1486 @@ +[ + { "heading": "Terraform Enterprise" }, + { "title": "Overview", "path": "" }, + { + "title": "API", + "routes": [ + { + "title": "API Docs template", + "path": "api-docs/_template", + "hidden": true + }, + { "title": "Overview", "path": "api-docs" }, + { "title": "Account", "path": "api-docs/account" }, + { + "title": "Admin", + "routes": [ + { "title": "Overview", "path": "api-docs/admin" }, + { + "title": "Registry Sharing", + "path": "api-docs/admin/registry-sharing" + }, + { + "title": "Module Sharing", + "path": "api-docs/admin/module-sharing" + }, + { + "title": "Organizations", + "path": "api-docs/admin/organizations" + }, + { "title": "Runs", "path": "api-docs/admin/runs" }, + { + "title": "Settings", + "path": "api-docs/admin/settings" + }, + { + "title": "Terraform Versions", + "path": "api-docs/admin/terraform-versions" + }, + { + "title": "OPA Versions", + "path": "api-docs/admin/opa-versions" + }, + { + "title": "Sentinel Versions", + "path": "api-docs/admin/sentinel-versions" + }, + { "title": "Users", "path": "api-docs/admin/users" }, + { "title": "Initial Admin User", "path": "api-docs/admin/initial-admin-user" }, + { + "title": "Workspaces", + "path": "api-docs/admin/workspaces" + } + ] + }, + { + "title": "Agent Pools", + "path": "api-docs/agents" + }, + { "title": "Agent Tokens", "path": "api-docs/agent-tokens" }, + { "title": "Applies", "path": "api-docs/applies" }, + { "title": "Assessment Results", "path": "api-docs/assessment-results" }, + { + "title": "Comments", + "path": "api-docs/comments" + }, + { + "title": "Configuration Versions", + "path": "api-docs/configuration-versions" + }, + { + "title": "Cost Estimates", + "path": "api-docs/cost-estimates" + }, + { "title": "Data Retention Policies", "path": "api-docs/data-retention-policies" }, + { + "title": "GitHub App Installations", + "path": "api-docs/github-app-installations" + }, + { + "title": "Notification Configurations", + "path": "api-docs/notification-configurations" + }, + { + "title": "No-Code Provisioning", + "path": "api-docs/no-code-provisioning" + }, + { "title": "OAuth Clients", "path": "api-docs/oauth-clients" }, + { "title": "OAuth Tokens", "path": "api-docs/oauth-tokens" }, + { "title": "Organizations", "path": "api-docs/organizations" }, + { + "title": "Organization Memberships", + "path": "api-docs/organization-memberships" + }, + { + "title": "Organization Tags", + "path": "api-docs/organization-tags" + }, + { + "title": "Organization Tokens", + "path": "api-docs/organization-tokens" + }, + { "title": "Plan Exports", "path": "api-docs/plan-exports" }, + { "title": "Plans", "path": "api-docs/plans" }, + { "title": "Policies", "path": "api-docs/policies" }, + { "title": "Policy Checks", "path": "api-docs/policy-checks" }, + { + "title": "Policy Evaluations", + "path": "api-docs/policy-evaluations" + }, + { "title": "Policy Sets", "path": "api-docs/policy-sets" }, + { + "title": "Policy Set Parameters", + "path": "api-docs/policy-set-params" + }, + { + "title": "Private Registry", + "routes": [ + { "title": "Modules", "path": "api-docs/private-registry/modules" }, + { "title": "Manage Module Versions", "path": "api-docs/private-registry/manage-module-versions" }, + { + "title": "Providers", + "path": "api-docs/private-registry/providers" + }, + { + "title": "Private Provider Versions and Platforms", + "path": "api-docs/private-registry/provider-versions-platforms" + }, + { "title": "GPG Keys", "path": "api-docs/private-registry/gpg-keys" }, + { + "title": "Tests", + "path": "api-docs/private-registry/tests" + } + ] + }, + { "title": "Projects", "path": "api-docs/projects" }, + { + "title": "Project Team Access", + "path": "api-docs/project-team-access" + }, + { "title": "Reserved Tag Keys", "path": "api-docs/reserved-tag-keys"}, + { "title": "Runs", "path": "api-docs/run" }, + { + "title": "Run Tasks", + "routes": [ + { "title": "Run Tasks", "path": "api-docs/run-tasks/run-tasks" }, + { + "title": "Stages and Results", + "path": "api-docs/run-tasks/run-task-stages-and-results" + }, + { + "title": "Custom Integration", + "path": "api-docs/run-tasks/run-tasks-integration" + } + ] + }, + { "title": "Run Triggers", "path": "api-docs/run-triggers" }, + { "title": "SSH Keys", "path": "api-docs/ssh-keys" }, + { + "title": "State Versions", + "path": "api-docs/state-versions" + }, + { + "title": "State Version Outputs", + "path": "api-docs/state-version-outputs" + }, + { "title": "Team Access", "path": "api-docs/team-access" }, + { "title": "Team Membership", "path": "api-docs/team-members" }, + { "title": "Team Tokens", "path": "api-docs/team-tokens" }, + { "title": "Teams", "path": "api-docs/teams" }, + { "title": "User Tokens", "path": "api-docs/user-tokens" }, + { "title": "Users", "path": "api-docs/users" }, + { "title": "Variables", "path": "api-docs/variables" }, + { "title": "VCS Events", "path": "api-docs/vcs-events" }, + { "title": "Workspaces", "path": "api-docs/workspaces" }, + { + "title": "Workspace-Specific Variables", + "path": "api-docs/workspace-variables" + }, + { + "title": "Workspace Resources", + "path": "api-docs/workspace-resources" + }, + { + "title": "Variable Sets", + "path": "api-docs/variable-sets" + }, + { + "title": "Changelog", + "path": "api-docs/changelog" + }, + { + "title": "Stability Policy", + "path": "api-docs/stability-policy" + } + ] + }, + { + "title": "Deploy Terraform Enterprise", + "routes": [ + { "title": "Overview", "path": "deploy" }, + { + "title": "Migrate to a non-Replicated runtime", + "path": "deploy/replicated-migration" + }, + { + "title": "Prepare host environment", + "path": "deploy/prepare-host" + }, + { + "title": "Create deployment configuration", + "routes": [ + { + "title": "Overview", + "path": "deploy/configuration" + }, + { + "title": "Configure a license", + "path": "deploy/configuration/license" + }, + { + "title": "Configure network access", + "path": "deploy/configuration/network" + }, + { + "title": "Configure data storage", + "routes": [ + { + "title": "Overview", + "path": "deploy/configuration/storage" + }, + { + "title": "Configure operational mode", + "path": "deploy/configuration/storage/configure-mode" + }, + { + "title": "Configure object storage", + "path": "deploy/configuration/storage/connect-object" + }, + { + "title": "Configure database connection", + "routes": [ + { + "title": "Overview", + "path": "deploy/configuration/storage/connect-database" + }, + { + "title": "Connect to PostgreSQL", + "path": "deploy/configuration/storage/connect-database/postgres" + }, + { + "title": "Connect to a PostgreSQL cluster BETA", + "path": "deploy/configuration/storage/connect-database/postgres-cluster" + }, + { + "title": "Connect to a PostgreSQL cluster deployed with Patroni BETA", + "path": "deploy/configuration/storage/connect-database/patroni" + }, + { + "title": "Connect to a PostgreSQL cluster deployed with Aurora BETA", + "path": "deploy/configuration/storage/connect-database/aurora" + }, + { + "title": "Measure database failover resilience BETA", + "path": "deploy/configuration/storage/connect-database/failover-resilience" + } + ] + }, + { + "title": "Configure Redis connection", + "path": "deploy/configuration/storage/connect-redis" + }, + { + "title": "Configure external Vault connection", + "path": "deploy/configuration/storage/connect-vault" + } + ] + } + ] + }, + { + "title": "Deploy to Nomad", + "path": "deploy/nomad" + }, + { + "title": "Deploy to Kubernetes", + "routes": [ + { + "title": "Install Terraform Enterprise", + "path": "deploy/kubernetes" + }, + { + "title": "Scale up your Kubernetes deployment", + "routes": [ + { + "title": "Overview", + "path": "deploy/kubernetes/scale" + }, + { + "title": "Increase replicas", + "path": "deploy/kubernetes/scale/replicas" + }, + { + "title": "Increase run capacity", + "path": "deploy/kubernetes/scale/run-capacity" + } + + ] + } + ] + }, + { + "title": "Deploy to OpenShift", + "path": "deploy/openshift" + }, + { + "title": "Deploy to Podman", + "path": "deploy/podman" + }, + { + "title": "Deploy to Docker", + "routes": [ + { + "title": "Install Terraform Enterprise", + "path": "deploy/docker" + }, + { + "title": "Scale up your Docker deployment", + "path": "deploy/docker/scale" + } + ] + }, + { + "title": "Deploy to Replicated DEPRECATED", + "routes": [ + { "title": "Overview", "path": "deploy/replicated" }, + { + "title": "Requirements", + "routes": [ + { + "title": "Credentials", + "path": "deploy/replicated/requirements/credentials" + }, + { + "title": "Hardware", + "path": "deploy/replicated/requirements/hardware" + }, + { + "title": "Operating System", + "routes": [ + { + "title": "Supported OS", + "path": "deploy/replicated/requirements/os-specific/supported-os" + }, + { + "title": "RedHat Linux", + "path": "deploy/replicated/requirements/os-specific/rhel-requirements" + }, + { + "title": "CentOS Linux", + "path": "deploy/replicated/requirements/os-specific/centos-requirements" + } + ] + }, + { + "title": "Data Storage", + "routes": [ + { + "title": "Operation Mode", + "path": "deploy/replicated/requirements/data-storage/operational-mode-requirements" + }, + { + "title": "PostgreSQL", + "path": "deploy/replicated/requirements/data-storage/postgres-requirements" + }, + { + "title": "Minio Setup Guide", + "path": "deploy/replicated/requirements/data-storage/minio-setup-guide" + } + ] + }, + { + "title": "Network", + "path": "deploy/replicated/requirements/network" + }, + { + "title": "Docker Engine", + "path": "deploy/replicated/requirements/docker_engine" + } + ] + }, + { + "title": "Installation", + "routes": [ + { + "title": "Pre-Install Checklist", + "path": "deploy/replicated/install/pre-install-checklist" + }, + { + "title": "Operation Modes", + "path": "deploy/replicated/install/operation-modes" + }, + { + "title": "Interactive Install", + "routes": [ + { + "title": "1. Run Installer", + "path": "deploy/replicated/install/interactive/installer" + }, + { + "title": "2. Configure in Browser", + "path": "deploy/replicated/install/interactive/config" + } + ] + }, + { + "title": "Automated Install", + "routes": [ + { + "title": "Automated Installation", + "path": "deploy/replicated/install/automated/automating-the-installer" + }, + { + "title": "Active/Active", + "path": "deploy/replicated/install/automated/active-active" + }, + { + "title": "Initial User Automation", + "path": "deploy/replicated/install/automated/automating-initial-user" + }, + { + "title": "Encryption Password", + "path": "deploy/replicated/install/automated/encryption-password" + } + ] + }, + { + "title": "External Vault", + "path": "deploy/replicated/install/vault" + }, + { + "title": "Uninstall", + "path": "deploy/replicated/install/uninstall" + } + ] + }, + { + "title": "Administration", + "routes": [ + { "title": "Overview", "path": "deploy/replicated/administration" }, + { + "title": "License", + "routes": [ + { + "title": "Overview", + "path": "deploy/replicated/administration/license" + }, + { + "title": "Updating Terraform Enterprise License", + "path": "deploy/replicated/administration/license/update-tfe-license" + }, + { + "title": "Automated License Utilization Reporting", + "path": "deploy/replicated/administration/license/automated-license-utilization-reporting" + } + ] + }, + { + "title": "Infrastructure", + "routes": [ + { + "title": "Overview", + "path": "deploy/replicated/administration/infrastructure" + }, + { + "title": "Automated Recovery", + "path": "deploy/replicated/administration/infrastructure/automated-recovery" + }, + { + "title": "Upgrades", + "routes": [ + { + "title":"Overview", + "path": "deploy/replicated/administration/infrastructure/upgrades" + }, + { + "title": "Prepare to upgrade", + "path": "deploy/replicated/administration/infrastructure/upgrades/prepare" + }, + { + "title":"Upgrade", + "path": "deploy/replicated/administration/infrastructure/upgrades/upgrade" + } + ] + }, + { + "title": "Backups and Restores", + "path": "deploy/replicated/administration/infrastructure/backup-restore" + }, + { + "title": "Admin CLI Commands", + "path": "deploy/replicated/administration/infrastructure/admin-cli" + }, + { + "title": "Alternative Worker to Agent Migration", + "path": "deploy/replicated/administration/infrastructure/worker-to-agent-migration" + }, + { + "title": "Migrating from Mounted Disk Mode to External Services Mode", + "path": "deploy/replicated/administration/infrastructure/mounted-to-external-migration" + }, + { + "title": "Consolidated Services", + "path": "deploy/replicated/administration/infrastructure/consolidated-services" + } + ] + } + ] + }, + { + "title": "Architecture", + "routes": [ + { + "title": "Reference", + "routes": [ + { + "title": "Overview", + "path": "deploy/replicated/architecture/reference-architecture" + }, + { + "title": "AWS Reference Architecture", + "path": "deploy/replicated/architecture/reference-architecture/aws" + }, + { + "title": "Azure Reference Architecture", + "path": "deploy/replicated/architecture/reference-architecture/azure" + }, + { + "title": "GCP Reference Architecture", + "path": "deploy/replicated/architecture/reference-architecture/gcp" + }, + { + "title": "VMware Reference Architecture", + "path": "deploy/replicated/architecture/reference-architecture/vmware" + } + ] + }, + { + "title": "System", + "routes": [ + { + "title": "Overview", + "path": "deploy/replicated/architecture/system-overview" + }, + { + "title": "Reliability & Availability", + "path": "deploy/replicated/architecture/system-overview/reliability-availability" + }, + { + "title": "Capacity & Performance", + "path": "deploy/replicated/architecture/system-overview/capacity" + }, + { + "title": "Security Model", + "path": "deploy/replicated/architecture/system-overview/security-model" + }, + { + "title": "Data Security", + "path": "deploy/replicated/architecture/system-overview/data-security" + } + ] + } + ] + }, + { + "title": "Monitoring", + "routes": [ + { + "title": "Log Forwarding", + "path": "deploy/replicated/monitoring/logging" + }, + { + "title": "Metrics and monitoring", + "path": "deploy/replicated/monitoring/monitoring" + } + ] + } + ] + }, + { + "title": "Create initial admin user", + "path": "deploy/initial-admin-user" + }, + { + "title": "Create a custom worker image", + "path": "deploy/custom-image" + }, + { + "title": "Manage deployment", + "routes": [ + { + "title": "Overview", + "path": "deploy/manage" + }, + { + "title": "Connect to Terraform Enterprise CLI", + "path": "deploy/manage/access-cli" + }, + { + "title": "Backup and restore", + "path": "deploy/manage/backup-restore" + }, + { + "title": "Database failover", + "path": "deploy/manage/failover" + }, + { + "title": "Upgrade", + "path": "deploy/manage/upgrade" + }, + { + "title": "Monitor", + "path": "deploy/manage/monitor" + }, + { "title": "Enable automated license utilization reports", + "path": "deploy/manage/license-report" + }, + { "title": "Enable automated product usage reports", + "path": "deploy/manage/product-report" + } + ] + }, + { + "title": "Reference", + "routes": [ + { + "title": "Configuration", + "path": "deploy/reference/configuration" + }, + { + "title": "CLI", + "path": "deploy/reference/cli" + }, + { + "title": "Startup checks", + "path": "deploy/reference/startup-checks" + }, + { + "title": "Container metrics", + "path": "deploy/reference/metrics" + }, + { + "title": "Application services", + "path": "deploy/reference/services" + }, + { + "title": "Data security", + "path": "deploy/reference/data-security" + }, + { + "title": "Application security", + "path": "deploy/reference/application-security" + }, + { + "title": "License usage data", + "path": "deploy/reference/license-data" + }, + { + "title": "Product usage data", + "path": "deploy/reference/product-data" + } + ] + }, + { + "title": "Troubleshoot", + "routes": [ + { + "title": "Overview", + "path": "deploy/troubleshoot" + }, + { + "title": "Contact support", + "path": "deploy/troubleshoot/contact-support" + }, + { + "title": "Perform diagnostics", + "path": "deploy/troubleshoot/perform-diagnostics" + }, + { + "title": "Error messages", + "path": "deploy/troubleshoot/error-messages" + } + ] + } + ] + }, + { + "title": "Application Administration", + "routes": [ + { "title": "Overview", "path": "application-administration" }, + { + "title": "Access the Admin Interface", + "path": "application-administration/admin-access" + }, + { + "title": "General Settings", + "path": "application-administration/general" + }, + { + "title": "Customize the UI", + "path": "application-administration/customization" + }, + { + "title": "Integration Settings", + "path": "application-administration/integration" + }, + { + "title": "OPA Tool Version Settings", + "path": "application-administration/opa-tool-versions" + }, + { + "title": "Sentinel Tool Version Settings", + "path": "application-administration/sentinel-tool-versions" + }, + { + "title": "GitHub App Integration", + "path": "application-administration/github-app-integration" + }, + { + "title": "Manage Accounts and Resources", + "path": "application-administration/resources" + }, + { + "title": "Share Registry Artifacts", + "path": "application-administration/registry-sharing" + }, + { + "title": "Agents on Terraform Enterprise", + "path": "application-administration/agents-on-tfe" + } + ] + }, + { + "title": "Users, Teams, Organizations", + "routes": [ + { "title": "Users", "path": "users-teams-organizations/users" }, + { + "title": "Teams", + "routes": [ + { + "title": "Overview", + "path": "users-teams-organizations/teams" + }, + { + "title": "Manage teams", + "path": "users-teams-organizations/teams/manage" + }, + { + "title": "Notifications", + "path": "users-teams-organizations/teams/notifications" + } + ] + }, + { + "title": "Organizations", + "routes": [ + {"title": "Overview","path": "users-teams-organizations/organizations"}, + { + "title": "Manage reserved tag keys", + "path": "users-teams-organizations/organizations/manage-reserved-tags" + }, + { "title": "VCS status checks", "path": "users-teams-organizations/organizations/vcs-status-checks" }, + { "title": "Automatically cancel plan-only runs", "path": "users-teams-organizations/organizations/vcs-speculative-plan-management" } + ] + }, + { + "title": "Permissions", + "path": "users-teams-organizations/permissions" + }, + + { + "title": "Two-factor Authentication", + "path": "users-teams-organizations/2fa" + }, + { + "title": "API Tokens", + "path": "users-teams-organizations/api-tokens" + } + ] + }, + { + "title": "SAML SSO", + "routes": [ + { + "title": "Configuration", + "path": "saml/configuration" + }, + { + "title": "Team Membership", + "path": "saml/team-membership" + }, + { + "title": "Attributes", + "path": "saml/attributes" + }, + { + "title": "Login", + "path": "saml/login" + }, + { + "title": "Identity Providers", + "routes": [ + { + "title": "Sample Auth Request", + "path": "saml/idp-configuration" + }, + { + "title": "ADFS", + "path": "saml/idp-configuration/adfs" + }, + { + "title": "Azure Active Directory", + "path": "saml/idp-configuration/aad" + }, + { + "title": "Okta", + "path": "saml/idp-configuration/okta" + }, + { + "title": "OneLogin", + "path": "saml/idp-configuration/onelogin" + } + ] + }, + { + "title": "Troubleshooting", + "path": "saml/troubleshooting" + } + ] + }, + { + "title": "Projects", + "routes": [ + { "title": "Overview", "path": "projects" }, + { + "title": "Managing Projects", + "path": "projects/manage" + }, + { "title": "Best Practices", "path": "projects/best-practices" } + ] + }, + { + "title": "Workspaces", + "routes": [ + { "title": "Overview", "path": "workspaces" }, + { + "title": "Create Workspaces", + "path": "workspaces/create" + }, + { + "title": "Create tags", + "path": "workspaces/tags" + }, + { + "title": "Browse workspaces", + "path": "workspaces/browse" + }, + { + "title": "Terraform Configurations", + "path": "workspaces/configurations" + }, + { + "title": "Dynamic Provider Credentials", + "routes": [ + { + "title": "Overview", + "path": "workspaces/dynamic-provider-credentials" + }, + { + "title": "Workload Identity Tokens", + "path": "workspaces/dynamic-provider-credentials/workload-identity-tokens" + }, + { + "title": "Vault Configuration", + "path": "workspaces/dynamic-provider-credentials/vault-configuration" + }, + { + "title": "AWS Configuration", + "path": "workspaces/dynamic-provider-credentials/aws-configuration" + }, + { + "title": "GCP Configuration", + "path": "workspaces/dynamic-provider-credentials/gcp-configuration" + }, + { + "title": "Azure Configuration", + "path": "workspaces/dynamic-provider-credentials/azure-configuration" + }, + { "title": "Kubernetes Configuration", + "path": "workspaces/dynamic-provider-credentials/kubernetes-configuration" + }, + { + "title": "HCP Configuration", + "path": "workspaces/dynamic-provider-credentials/hcp-configuration" + }, + { + "title": "HCP Vault Secrets", + "routes": [ + { + "title": "Overview", + "path": "workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed" + }, + { + "title": "AWS Configuration", + "path": "workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/aws-configuration" + }, + { + "title": "GCP Configuration", + "path": "workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/gcp-configuration" + } + ] + }, + { + "title": "Manually Generating Workload Identity Tokens", + "path": "workspaces/dynamic-provider-credentials/manual-generation" + }, + { + "title": "Specifying Multiple Configurations", + "path": "workspaces/dynamic-provider-credentials/specifying-multiple-configurations" + }, + { + "title": "Vault-Backed Dynamic Credentials", + "routes": [ + { + "title": "Overview", + "path": "workspaces/dynamic-provider-credentials/vault-backed" + }, + { + "title": "AWS Configuration", + "path": "workspaces/dynamic-provider-credentials/vault-backed/aws-configuration" + }, + { + "title": "GCP Configuration", + "path": "workspaces/dynamic-provider-credentials/vault-backed/gcp-configuration" + }, + { + "title": "Azure Configuration", + "path": "workspaces/dynamic-provider-credentials/vault-backed/azure-configuration" + } + ] + } + ] + }, + { + "title": "Variables", + "routes": [ + { "title": "Overview", "path": "workspaces/variables" }, + { + "title": "Managing Variables", + "path": "workspaces/variables/managing-variables" + } + ] + }, + { "title": "Health", "path": "workspaces/health" }, + { + "title": "Settings", + "routes": [ + { "title": "Overview", "path": "workspaces/settings" }, + { "title": "VCS Connections", "path": "workspaces/settings/vcs" }, + { "title": "Access", "path": "workspaces/settings/access" }, + { + "title": "Notifications", + "path": "workspaces/settings/notifications" + }, + { + "title": "SSH Keys for Modules", + "path": "workspaces/settings/ssh-keys" + }, + { + "title": "Run Triggers", + "path": "workspaces/settings/run-triggers" + }, + { + "title": "Run Tasks", + "path": "workspaces/settings/run-tasks" + }, + { + "title": "Destruction and Deletion", + "path": "workspaces/settings/deletion" + } + ] + }, + { "title": "Terraform State", "path": "workspaces/state" }, + { + "title": "JSON Filtering", + "path": "workspaces/json-filtering" + }, + { "title": "Best Practices", "path": "workspaces/best-practices"} + ] + }, + { + "title": "Terraform Runs", + "routes": [ + { "title": "Remote Operations", "path": "run/remote-operations" }, + { "title": "Viewing and Managing Runs", "path": "run/manage" }, + { "title": "Run States and Stages", "path": "run/states" }, + { "title": "Run Modes and Options", "path": "run/modes-and-options" }, + { "title": "UI/VCS-driven Runs", "path": "run/ui" }, + { "title": "API-driven Runs", "path": "run/api" }, + { "title": "CLI-driven Runs", "path": "run/cli" }, + { + "title": "The Run Environment", + "path": "run/run-environment" + }, + { + "title": "Installing Software", + "path": "run/install-software" + } + ] + }, + + { + "title": "Connect to VCS", + "routes": [ + { "title": "Overview", "path": "vcs" }, + { "title": "GitHub.com (OAuth)", "path": "vcs/github" }, + { + "title": "GitHub Enterprise", + "path": "vcs/github-enterprise" + }, + { "title": "GitLab.com", "path": "vcs/gitlab-com" }, + { "title": "GitLab EE and CE", "path": "vcs/gitlab-eece" }, + { "title": "Bitbucket Cloud", "path": "vcs/bitbucket-cloud" }, + { + "title": "Bitbucket Data Center", + "path": "vcs/bitbucket-data-center" + }, + { + "title": "Azure DevOps Services", + "path": "vcs/azure-devops-services" + }, + { + "title": "Azure DevOps Server", + "path": "vcs/azure-devops-server" + }, + { "title": "Troubleshooting", "path": "vcs/troubleshooting" } + ] + }, + + { + "title": "Private Registry", + "routes": [ + { "title": "Overview", "path": "registry" }, + { + "title": "Adding Public Providers and Modules", + "path": "registry/add" + }, + { + "title": "Publishing Private Providers", + "path": "registry/publish-providers" + }, + { + "title": "Public Providers in an Airgapped Installation", + "path": "registry/airgapped-providers" + }, + { + "title": "Publishing Private Modules", + "path": "registry/publish-modules" + }, + { "title": "Deprecate Module Versions", "path": "registry/manage-module-versions" }, + { + "title": "Test-Integrated Modules", + "path": "registry/test" + }, + { "title": "Using Providers and Modules", "path": "registry/using" }, + { + "title": "Configuration Designer", + "path": "registry/design" + } + ] + }, + { + "title": "No-Code Provisioning", + "routes": [ + { + "title": "Designing No-Code Ready Modules", + "path": "no-code-provisioning/module-design" + }, + { + "title": "Provisioning No-Code Infrastructure", + "path": "no-code-provisioning/provisioning" + } + ] + }, + { + "title": "Migrating to Terraform Enterprise", + "routes": [ + { + "title": "Manually migrate", + "path": "migrate" + }, + { + "title": "Use the tf-migrate CLI", + "routes": [ + { + "title": "Overview", + "path": "migrate/tf-migrate" + }, + { + "title": "tf-migrate commands reference", + "routes": [ + { + "title": "Configuration file reference", + "path": "migrate/tf-migrate/reference/configuration" + }, + { + "title": "prepare command", + "path": "migrate/tf-migrate/reference/prepare" + }, + { + "title": "execute command", + "path": "migrate/tf-migrate/reference/execute" + } + ] + } + ] + } + ] + }, + { + "title": "Policy enforcement", + "routes": [ + { + "title": "Overview", + "path": "policy-enforcement" + }, + { + "title": "Define policies", + "routes": [ + { + "title": "Overview", + "path": "policy-enforcement/define-policies" + }, + { + "title": "Custom Sentinel policies", + "path": "policy-enforcement/define-policies/custom-sentinel" + }, + { + "title": "OPA policies", + "path": "policy-enforcement/define-policies/opa" + } + ] + }, + { + "title": "Create and manage policy sets", + "routes": [ + { + "title": "Overview", + "path": "policy-enforcement/manage-policy-sets" + }, + { + "title": "Create Sentinel policy sets in VCS", + "path": "policy-enforcement/manage-policy-sets/sentinel-vcs" + }, + { + "title": "Connect to OPA policies in VCS", + "path": "policy-enforcement/manage-policy-sets/opa-vcs" + } + ] + }, + { + "title": "Run pre-written Sentinel policies", + "path": "policy-enforcement/prewritten-sentinel" + }, + { + "title": "Test Sentinel policies", + "path": "policy-enforcement/test-sentinel" + }, + { + "title": "View policy results", + "routes": [ + { + "title": "Overview", + "path": "policy-enforcement/view-results" + }, + { + "title": "View Sentinel JSON results", + "path": "policy-enforcement/view-results/json" + } + ] + }, + { + "title": "Pre-written policy library", + "path": "policy-enforcement/prewritten-library" + }, + { + "title": "Sentinel import reference", + "routes": [ + { + "title": "Overview", + "path": "policy-enforcement/import-reference" + }, + { + "title": "tfconfig", + "path": "policy-enforcement/import-reference/tfconfig" + }, + { + "title": "tfconfig/v2", + "path": "policy-enforcement/import-reference/tfconfig-v2" + }, + { + "title": "tfplan", + "path": "policy-enforcement/import-reference/tfplan" + }, + { + "title": "tfplan/v2", + "path": "policy-enforcement/import-reference/tfplan-v2" + }, + { + "title": "tfstate", + "path": "policy-enforcement/import-reference/tfstate" + }, + { + "title": "tfstate/v2", + "path": "policy-enforcement/import-reference/tfstate-v2" + }, + { + "title": "tfrun", + "path": "policy-enforcement/import-reference/tfrun" + } + ] + } + ] + }, + { + "title": "Cost Estimation", + "routes": [ + { "title": "Overview", "path": "cost-estimation" }, + { "title": "AWS", "path": "cost-estimation/aws" }, + { "title": "GCP", "path": "cost-estimation/gcp" }, + { "title": "Azure", "path": "cost-estimation/azure" } + ] + }, + + { + "title": "Integrations", + "routes": [ + { + "title": "Overview", + "path": "integrations" + }, + { + "title": "Kubernetes Operator", + "routes": [ + { + "title": "Overview", + "path": "integrations/kubernetes" + }, + { + "title": "Setup", + "path": "integrations/kubernetes/setup" + }, + { + "title": "API Reference", + "path": "integrations/kubernetes/api-reference" + }, + { + "title": "Annotations and Labels", + "path": "integrations/kubernetes/annotations-and-labels" + }, + { + "title": "Migration Guide", + "path": "integrations/kubernetes/ops-v2-migration" + } + ] + }, + { + "title": "ServiceNow Integrations", + "routes": [ + { + "title": "Service Catalog for Terraform", + "routes": [ + { + "title": "Overview", + "path": "integrations/service-now/service-catalog-terraform" + }, + { + "title": "Service Catalog", + "path": "integrations/service-now/service-catalog-terraform/service-catalog-config" + }, + { + "title": "Admin Guide", + "path": "integrations/service-now/service-catalog-terraform/admin-guide" + }, + { + "title": "Developer Reference", + "path": "integrations/service-now/service-catalog-terraform/developer-reference" + }, + { + "title": "Example Customizations", + "path": "integrations/service-now/service-catalog-terraform/example-customizations" + }, + { + "title": "Troubleshoot", + "path": "integrations/service-now/service-catalog-terraform/troubleshoot" + } + ] + }, + { + "title": "Service Graph Connector for Terraform", + "routes": [ + { + "title": "Overview", + "path": "integrations/service-now/service-graph" + }, + { + "title": "Setup", + "path": "integrations/service-now/service-graph/service-graph-setup" + }, + { + "title": "Resource Coverage", + "routes": [ + { + "title": "Overview", + "path": "integrations/service-now/service-graph/resource-coverage" + }, + { + "title": "AWS", + "path": "integrations/service-now/service-graph/resource-coverage/aws" + }, + { + "title": "Azure", + "path": "integrations/service-now/service-graph/resource-coverage/azure" + }, + { + "title": "GCP", + "path": "integrations/service-now/service-graph/resource-coverage/gcp" + }, + { + "title": "vSphere", + "path": "integrations/service-now/service-graph/resource-coverage/vsphere" + } + ] + }, + { + "title": "Customizations", + "path": "integrations/service-now/service-graph/customizations" + } + ] + } + ] + }, + { + "title": "Run Tasks Integration", + "path": "integrations/run-tasks" + }, + { + "title": "AWS Service Catalog Integration", + "path": "integrations/aws-service-catalog" + } + ] + }, + { + "title": "Releases", + "routes": [ + { + "title": "Overview", + "path": "releases" + }, + { + "title": "2025", + "routes": [ + { "title": "Overview", "path": "releases/2025" }, + { "title": "v202504-1", "path": "releases/2025/v202504-1" }, + { "title": "v202503-1", "path": "releases/2025/v202503-1" }, + { "title": "v202502-2", "path": "releases/2025/v202502-2" }, + { "title": "v202502-1", "path": "releases/2025/v202502-1" }, + { "title": "v202501-1", "path": "releases/2025/v202501-1" } + ] + }, + { + "title": "2024", + "routes": [ + { "title": "Overview", "path": "releases/2024" }, + { "title": "v202411-2", "path": "releases/2024/v202411-2" }, + { "title": "v202411-1", "path": "releases/2024/v202411-1" }, + { "title": "v202410-1", "path": "releases/2024/v202410-1" }, + { "title": "v202409-3", "path": "releases/2024/v202409-3" }, + { "title": "v202409-2", "path": "releases/2024/v202409-2" }, + { "title": "v202409-1", "path": "releases/2024/v202409-1" }, + { "title": "v202408-1", "path": "releases/2024/v202408-1" }, + { "title": "v202407-1", "path": "releases/2024/v202407-1" }, + { "title": "v202406-1", "path": "releases/2024/v202406-1" }, + { "title": "v202405-1", "path": "releases/2024/v202405-1" }, + { "title": "v202404-2", "path": "releases/2024/v202404-2" }, + { "title": "v202404-1", "path": "releases/2024/v202404-1" }, + { "title": "v202402-2", "path": "releases/2024/v202402-2" }, + { "title": "v202402-1", "path": "releases/2024/v202402-1" }, + { "title": "v202401-2", "path": "releases/2024/v202401-2" }, + { "title": "v202401-1", "path": "releases/2024/v202401-1" } + ] + }, + { + "title": "2023", + "routes": [ + { "title": "Overview", "path": "releases/2023" }, + { "title": "v202312-1", "path": "releases/2023/v202312-1" }, + { "title": "v202311-1", "path": "releases/2023/v202311-1" }, + { "title": "v202310-1", "path": "releases/2023/v202310-1" }, + { "title": "v202309-1", "path": "releases/2023/v202309-1" }, + { "title": "v202308-1", "path": "releases/2023/v202308-1" }, + { "title": "v202307-1", "path": "releases/2023/v202307-1" }, + { "title": "v202306-1", "path": "releases/2023/v202306-1" }, + { "title": "v202305-2", "path": "releases/2023/v202305-2" }, + { "title": "v202305-1", "path": "releases/2023/v202305-1" }, + { "title": "v202304-1", "path": "releases/2023/v202304-1" }, + { "title": "v202303-1", "path": "releases/2023/v202303-1" }, + { "title": "v202302-1", "path": "releases/2023/v202302-1" }, + { "title": "v202301-2", "path": "releases/2023/v202301-2" }, + { "title": "v202301-1", "path": "releases/2023/v202301-1" } + ] + }, + { + "title": "2022", + "routes": [ + { "title": "Overview", "path": "releases/2022" }, + { "title": "v202212-2", "path": "releases/2022/v202212-2" }, + { "title": "v202212-1", "path": "releases/2022/v202212-1" }, + { "title": "v202211-1", "path": "releases/2022/v202211-1" }, + { "title": "v202210-1", "path": "releases/2022/v202210-1" }, + { "title": "v202209-2", "path": "releases/2022/v202209-2" }, + { "title": "v202209-1", "path": "releases/2022/v202209-1" }, + { "title": "v202208-3", "path": "releases/2022/v202208-3" }, + { "title": "v202208-2", "path": "releases/2022/v202208-2" }, + { "title": "v202208-1", "path": "releases/2022/v202208-1" }, + { "title": "v202207-2", "path": "releases/2022/v202207-2" }, + { "title": "v202207-1", "path": "releases/2022/v202207-1" }, + { "title": "v202206-1", "path": "releases/2022/v202206-1" }, + { "title": "v202205-1", "path": "releases/2022/v202205-1" }, + { "title": "v202204-2", "path": "releases/2022/v202204-2" }, + { "title": "v202204-1", "path": "releases/2022/v202204-1" }, + { "title": "v202203-1", "path": "releases/2022/v202203-1" }, + { "title": "v202202-1", "path": "releases/2022/v202202-1" }, + { "title": "v202201-2", "path": "releases/2022/v202201-2" }, + { "title": "v202201-1", "path": "releases/2022/v202201-1" } + ] + }, + { + "title": "2021", + "routes": [ + { "title": "Overview", "path": "releases/2021" }, + { "title": "v202112-2", "path": "releases/2021/v202112-2" }, + { "title": "v202112-1", "path": "releases/2021/v202112-1" }, + { "title": "v202111-1", "path": "releases/2021/v202111-1" }, + { "title": "v202110-1", "path": "releases/2021/v202110-1" }, + { "title": "v202109-2", "path": "releases/2021/v202109-2" }, + { "title": "v202109-1", "path": "releases/2021/v202109-1" }, + { "title": "v202108-1", "path": "releases/2021/v202108-1" }, + { "title": "v202107-1", "path": "releases/2021/v202107-1" }, + { "title": "v202106-1", "path": "releases/2021/v202106-1" }, + { "title": "v202105-1", "path": "releases/2021/v202105-1" }, + { "title": "v202104-1", "path": "releases/2021/v202104-1" }, + { "title": "v202103-3", "path": "releases/2021/v202103-3" }, + { "title": "v202103-2", "path": "releases/2021/v202103-2" }, + { "title": "v202103-1", "path": "releases/2021/v202103-1" }, + { "title": "v202102-2", "path": "releases/2021/v202102-2" }, + { "title": "v202102-1", "path": "releases/2021/v202102-1" }, + { "title": "v202101-1", "path": "releases/2021/v202101-1" } + ] + }, + { + "title": "2020", + "routes": [{ "title": "Overview", "path": "releases/2020" }] + }, + { + "title": "2019", + "routes": [{ "title": "Overview", "path": "releases/2019" }] + }, + { + "title": "2018", + "routes": [{ "title": "Overview", "path": "releases/2018" }] + } + ] + }, + { "divider": true }, + { "title": "HCP Terraform Agents", "href": "/cloud-docs/agents" } +] diff --git a/content/terraform-enterprise/v000011-1/docs/.gitkeep b/content/terraform-enterprise/v000011-1/docs/.gitkeep new file mode 100644 index 000000000..e69de29bb diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/_template.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/_template.mdx new file mode 100644 index 000000000..94c74253f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/_template.mdx @@ -0,0 +1,222 @@ +--- +page_title: /example-endpoint API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/endpoint-name` to {A meaningful + description of this endpoint}. Aim for 130-160 characters total. +source: terraform-docs-common +--- + +Follow this template to format each API method. There are usually multiple sections like this on a given API endpoint page. + + + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: http://jsonapi.org/format/#error-objects + +# Example name API reference + +A explanatory sentence about what this thing in HCP Terraform does. + +## Create a Something + +Add at least one sentence of description about what this endpoint does. + + + +`POST /organizations/:organization_name/somethings` + + + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:organization_name` | The name of the organization to create the something in. The organization must already exist in the system, and the user must have permissions to create new somethings. | + + + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + + + +| Status | Response | Reason | +| ------- | -------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "somethings"`) | Successfully created a team | +| [400][] | [JSON API error object][] | Invalid `include` parameter | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [500][] | [JSON API error object][] | Failure during team creation | + + + +### Query Parameters + +[These are standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + + + +| Parameter | Description | +| ----------------------- | ------------------------------------------------------------- | +| `filter[workspace][id]` | **Required.** The workspace ID where this action will happen. | + + + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + + + +| Key path | Type | Default | Description | +| --------------------------- | ------ | ------- | ------------------------------------------------------------------------------------------------------ | +| `data.type` | string | | Must be `"somethings"`. | +| `data[].type` | string | | ... | +| `data.attributes.category` | string | | Whether this is a blue or red something. Valid values are `"blue"` or `"red"`. | +| `data.attributes.sensitive` | bool | `false` | Whether the value is sensitive. If true then the something is written once and not visible thereafter. | +| `filter.workspace.name` | string | | The name of the workspace that owns the something. | +| `filter.organization.name` | string | | The name of the organization that owns the workspace. | + + + +### Available Related Resources + + + +This GET endpoint can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ------------------ | --------------------------------------------- | +| `organization` | The full organization record. | +| `current_run` | Additional information about the current run. | +| `current_run.plan` | The plan used in the current run. | + +### Sample Payload + +```json +{ + "data": { + "type":"somethings", + "attributes": { + "category":"red", + "sensitive":true + } + }, + "filter": { + "organization": { + "name":"my-organization" + }, + "workspace": { + "name":"my-workspace" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/somethings +``` + + + +### Sample Response + +```json +{ + "data": { + "id":"som-EavQ1LztoRTQHSNT", + "type":"somethings", + "attributes": { + "sensitive":true, + "category":"red", + }, + "relationships": { + "configurable": { + "data": { + "id":"ws-4j8p6jX1w33MiDC7", + "type":"workspaces" + }, + "links": { + "related":"/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self":"/api/v2/somethings/som-EavQ1LztoRTQHSNT" + } + } +} +``` + + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/account.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/account.mdx new file mode 100644 index 000000000..570770ef0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/account.mdx @@ -0,0 +1,278 @@ +--- +page_title: /account API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/account` endpoint to manage the current + user. Learn how to read and update your account's details and change your + password. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Account API reference + +Account represents the current user interacting with Terraform. It returns the same type of object as the [Users](/terraform/enterprise/api-docs/users) API, but also includes an email address, which is hidden when viewing info about other users. + +For internal reasons, HCP Terraform associates team and organization tokens with a synthetic user account called _service user_. HCP Terraform returns the associated service user for account requests authenticated by a team or organization token. Use the `authenticated-resource` relationship to access the underlying team or organization associated with a token. For user tokens, you can use the user, itself. + +## Get your account details + +`GET /account/details` + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------- | +| [200][] | [JSON API document][] (`type: "users"`) | The request was successful | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/account/details +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-V3R563qtJNcExAkN", + "type": "users", + "attributes": { + "username": "admin", + "is-service-account": false, + "auth-method": "tfc", + "avatar-url": "https://www.gravatar.com/avatar/9babb00091b97b9ce9538c45807fd35f?s=100&d=mm", + "v2-only": false, + "is-site-admin": true, + "is-sso-login": false, + "email": "admin@hashicorp.com", + "unconfirmed-email": null, + "permissions": { + "can-create-organizations": true, + "can-change-email": true, + "can-change-username": true + } + }, + "relationships": { + "authentication-tokens": { + "links": { + "related": "/api/v2/users/user-V3R563qtJNcExAkN/authentication-tokens" + } + }, + "authenticated-resource": { + "data": { + "id": "user-V3R563qtJNcExAkN", + "type": "users" + }, + "links": { + "related": "/api/v2/users/user-V3R563qtJNcExAkN" + } + } + }, + "links": { + "self": "/api/v2/users/user-V3R563qtJNcExAkN" + } + } +} +``` + +## Update your account info + +Your username and email address can be updated with this endpoint. + +`PATCH /account/update` + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "users"`) | Your info was successfully updated | +| [401][] | [JSON API error object][] | Unauthorized | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| -------------------------- | ------ | ------- | --------------------------------------------------------------- | +| `data.type` | string | | Must be `"users"` | +| `data.attributes.username` | string | | New username | +| `data.attributes.email` | string | | New email address (must be confirmed afterwards to take effect) | + +### Sample Payload + +```json +{ + "data": { + "type": "users", + "attributes": { + "email": "admin@example.com", + "username": "admin" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/account/update +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-V3R563qtJNcExAkN", + "type": "users", + "attributes": { + "username": "admin", + "is-service-account": false, + "auth-method": "hcp_username_password", + "avatar-url": "https://www.gravatar.com/avatar/9babb00091b97b9ce9538c45807fd35f?s=100&d=mm", + "v2-only": false, + "is-site-admin": true, + "is-sso-login": false, + "email": "admin@hashicorp.com", + "unconfirmed-email": null, + "permissions": { + "can-create-organizations": true, + "can-change-email": true, + "can-change-username": true + } + }, + "relationships": { + "authentication-tokens": { + "links": { + "related": "/api/v2/users/user-V3R563qtJNcExAkN/authentication-tokens" + } + } + }, + "links": { + "self": "/api/v2/users/user-V3R563qtJNcExAkN" + } + } +} +``` + +## Change your password + +`PATCH /account/password` + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "users"`) | Your password was successfully changed | +| [401][] | [JSON API error object][] | Unauthorized | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| --------------------------------------- | ------ | ------- | ------------------------------------------------------- | +| `data.type` | string | | Must be `"users"` | +| `data.attributes.current_password` | string | | Current password | +| `data.attributes.password` | string | | New password (must be at least 10 characters in length) | +| `data.attributes.password_confirmation` | string | | New password (confirmation) | + +### Sample Payload + +```json +{ + "data": { + "type": "users", + "attributes": { + "current_password": "current password e.g. 2:C)e'G4{D\n06:[d1~y", + "password": "new password e.g. 34rk492+jgLL0@xhfyisj", + "password_confirmation": "new password e.g. 34rk492+jLL0@xhfyisj" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/account/password +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-V3R563qtJNcExAkN", + "type": "users", + "attributes": { + "username": "admin", + "is-service-account": false, + "auth-method": "hcp_github", + "avatar-url": "https://www.gravatar.com/avatar/9babb00091b97b9ce9538c45807fd35f?s=100&d=mm", + "v2-only": false, + "is-site-admin": true, + "is-sso-login": false, + "email": "admin@hashicorp.com", + "unconfirmed-email": null, + "permissions": { + "can-create-organizations": true, + "can-change-email": true, + "can-change-username": true + } + }, + "relationships": { + "authentication-tokens": { + "links": { + "related": "/api/v2/users/user-V3R563qtJNcExAkN/authentication-tokens" + } + } + }, + "links": { + "self": "/api/v2/users/user-V3R563qtJNcExAkN" + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/index.mdx new file mode 100644 index 000000000..e2138cb2f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/index.mdx @@ -0,0 +1,17 @@ +--- +page_title: /admin API reference for Terraform Enterprise +description: >- + Use the `/admin` set of endpoints to configure and support your Terraform Enterprise installation. Learn about operations available in the HTTP API. +--- + +# Terraform Enterprise Admin API Documentation + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + +Terraform Enterprise provides an API to allow administrators to configure and support their installation. + +## Authentication + +With the exception of the [user impersonation endpoints](/terraform/enterprise/api-docs/admin/users#impersonate-another-user), all requests must be authenticated with a bearer token belonging to a site administrator. Use the HTTP Header `Authorization` with the value `Bearer `. This token can be generated or revoked on the [tokens tab of the user settings page](/terraform/enterprise/users-teams-organizations/users#api-tokens). In the context of the Admin API, your token has management access to all resources in the system. + +For more information on authentication behavior, refer to [the API overview section](/terraform/enterprise/api-docs#authentication). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/initial-admin-user.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/initial-admin-user.mdx new file mode 100644 index 000000000..e64a4f6e8 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/initial-admin-user.mdx @@ -0,0 +1,69 @@ +--- +page_title: /initial-admin-user/ API reference for Terraform Enterprise +description: Learn how to call the initial-admin-user API endpoint to create the initial admin user. +--- + +# `initial-admin-user` API endpoint + +This topic provides reference information about the `initial-admin-user` API endpoint. + +## Introduction + +Send a `POST` request to the `/initial-admin-user` API endpoint to create the initial admin user after deploying Terraform Enterprise. Refer to [Create the initial admin user](/terraform/enterprise/deploy/initial-admin-user) for additional information. + +## Query parameters + +The following table describes the URL query parameters you can include in the request. If your client does not automatically encode URLs, use HTML URL-encoding characters to ensure that requests are successful. + +| Parameter | Description | +| --------- | --------------------------------------------------------- | +| `token` | **Required.** The IACT token retrieved via API or command | + +## Request body + +This `POST` endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type |Description | +| ---------- | ------ |------------------------------------ | +| `username` | string |The username to assign the new user. | +| `email` | string |The email address of the new user. | +| `password` | string |The password of the new user. | + +## Response body + +The `POST` endpoint returns a JSON object with the following properties. + +| Key path | Type | Description | +| -------- | ------ | -------------------------------------------------------------------------- | +| `status` | string | Either `"created"` or `"error"`. | +| `token` | string | If status is `"created"`, this contains a Terraform Enterprise user token for the new user. | +| `error` | string | If status is `"error"`, this contains the reason for the error. | + +## Sample payload + +```json +{ + "username": "manage", + "email": "it@mycompany.com", + "password": "thisisabadpassword" +} +``` + +## Sample request + +```shell +curl \ + --header "Content-Type: application/json" \ + --request POST \ + --data @payload.json \ + https://${TFE_HOSTNAME}/admin/initial-admin-user?token=${IACT_TOKEN} +``` + +## Sample response + +```json +{ + "status": "created", + "token": "aabbccdd.v1.atlas.ddeeffgghhiijjkkllmmnnooppqqrrssttuuvvxxyyzz" +} +``` \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/module-sharing.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/module-sharing.mdx new file mode 100644 index 000000000..1edd604bc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/module-sharing.mdx @@ -0,0 +1,121 @@ +--- +page_title: /module-consumers API reference for Terraform Enterprise +description: >- + Use the `/module-consumers` endpoint to manage sharing permissions for modules in your registry. Learn how to update an organization's module consumers using the API. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Admin Module Consumers API + +Admins and operators who install and maintain their organization's Terraform Enterprise instance are able to use the `module-consumers` endpoint. + +~> **This endpoint is deprecated**: We will remove this endpoint in a future release. Use the [Registry Sharing API](/terraform/enterprise/api-docs/admin/registry-sharing) instead. Continue using the [Admin Organizations API](/terraform/enterprise/api-docs/admin/organizations#update-an-organization) to configure global module sharing. + +There are two ways to configure module sharing using the Admin API: + +- This endpoint, which allows an organization to share modules with a specific list of other organizations. +- The [update an organization endpoint](/terraform/enterprise/api-docs/admin/organizations#update-an-organization), whose `data.attributes.global-module-sharing` property allows an organization to share modules with every organization in the instance. + + +## Update an Organization's Module Consumers + +-> This API endpoint is available in Terraform Enterprise as of version 202012-1. + +`PATCH /admin/organizations/:name/module-consumers` + +This endpoint sets the list of organizations that can use modules from the sharing organization's private registry. Sharing with specific organizations will automatically turn off global module sharing, which is configured with the [update an organization endpoint](/terraform/enterprise/api-docs/admin/organizations#update-an-organization) (via the `data.attributes.global-module-sharing` property). + +| Parameter | Description | +| --------- | ----------------------------------------------------------- | +| `:name` | The name of the organization whose registry is being shared | + +| Status | Response | Reason | +| ------- | ----------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "module-partnerships"`) | The list of module consumers was successfully updated | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| --------------------------------------------------- | -------------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"module-partnerships"` | +| `data.attributes.module-consuming-organization-ids` | array\[string] | | A list of external ids for organizations that will be able to access modules in the producing organization's registry. These should have an `org-` prefix. | + +### Sample Payload + +```json +{ + "data": { + "type": "module-partnerships", + "attributes": { + "module-consuming-organization-ids": [ + "org-939hp5K7kecppVmd" + ] + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://tfe.example.com/api/v2/admin/organizations/my-organization/module-consumers +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "mp-tQATArr4gyYDBvkF", + "type": "module-partnerships", + "attributes": { + "consuming-organization-id": "org-939hp5K7kecppVmd", + "consuming-organization-name": "other-organization", + "producing-organization-id": "org-etdex8r9VLnyHFct", + "producing-organization-name": "my-organization" + } + } + ] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/opa-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/opa-versions.mdx new file mode 100644 index 000000000..63effadd7 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/opa-versions.mdx @@ -0,0 +1,358 @@ +--- +page_title: /admin/opa-versions API reference for Terraform Enterprise +description: >- + Use the `/admin/opa-versions` endpoint to manage available Open Policy Agent (OPA) versions. Learn how to list, show, create, update, and delete OPA versions using the HTTP API. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Admin OPA Versions API + +The `/opa-versions` endpoint lets site administrators manage which versions of OPA you can use to enforce policies. + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + +## List all OPA versions + +`GET /api/v2/admin/opa-versions` + +This endpoint lists all known versions of OPA. + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | -------------------------------------- | +| [200][] | [JSON API document][] (`type: "opa-versions"`) | Successfully lists OPA versions. | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `filter[version]` | **Optional.** A query string. This will find an exact OPA version matching the version queried. This option takes precedence over search queries. | +| `search[version]` | **Optional.** A search query string. This will search for OPA versions matching the version number queried. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 OPA versions per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://app.terraform.io/api/v2/admin/opa-versions" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "opa-versions", + "attributes": { + "version": "0.55.0", + "url": "https://github.com/open-policy-agent/opa/releases/download/v0.55.0/opa_linux_arm64_static", + "sha": "d19603df4ab619e98cc515084f62b839464ee5bff61383d1df7724db8a7027a9", + "deprecated": false, + "deprecated-reason": null, + "official": true, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2023-08-23T22:34:24.561Z" + } + }, + { + "id": "tool-qcbYn12vuRKPgPpy", + "type": "opa-versions", + "attributes": { + "version": "0.54.0", + "url": "https://github.com/open-policy-agent/opa/releases/download/v0.54.0/opa_linux_arm64_static", + "sha": "883e22c082508e2f95ba25333559ba8a5c38c9c5ef667314e132c9d8451450d8", + "deprecated": false, + "deprecated-reason": null, + "official": true, + "enabled": true, + "beta": false, + "usage": 2, + "created-at": "2023-08-23T22:34:24.561Z" + } + } + ], + "links": { + "self": "https://tfe.example.com/api/v2/admin/opa-versions?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://tfe.example.com/api/v2/admin/opa-versions?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": "https://tfe.example.com/api/v2/admin/opa-versions?page%5Bnumber%5D=2&page%5Bsize%5D=20", + "last": "https://tfe.example.com/api/v2/admin/opa-versions?page%5Bnumber%5D=4&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": 2, + "total-pages": 4, + "total-count": 70 + } + } +} +``` + +## Create an OPA version + +`POST /api/v2/admin/opa-versions` + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | ---------------------------------------------- | +| [201][] | [JSON API document][] (`type: "opa-versions"`) | The OPA version was successfully created. | +| [404][] | [JSON API error object][] | Client is not an administrator. | +| [422][] | [JSON API error object][] | Validation errors. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | ------ | ------- | ----------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"opa-versions"`. | +| `data.attributes.version` | string | | A semantic version string in N.N.N or N.N.N-bundleName format (`"0.11.0"` or `"0.12.20-beta1"`). | +| `data.attributes.url` | string | | The URL where you can download the 64-bit Linux binary of this version. | +| `data.attributes.sha` | string | | The SHA-256 checksum of the OPA binary. | +| `data.attributes.deprecated` | bool | `false` | Whether or not this version of OPA is deprecated. | +| `data.attributes.deprecated-reason` | string | `null` | Additional context about why a version of OPA is deprecated. Field is null unless deprecated is `true`. | +| `data.attributes.official` | bool | `false` | Whether or not this is an official release of OPA. | +| `data.attributes.enabled` | bool | `true` | Whether or not this version of OPA is enabled for use in HCP Terraform. | +| `data.attributes.beta` | bool | `false` | Whether or not this version of OPA is a beta pre-release. | + +### Sample Payload + +```json +{ + "data": { + "type": "opa-versions", + "attributes": { + "version": "0.11.8", + "url": "https://github.com/open-policy-agent/opa/releases/download/v0.54.0/opa_linux_arm64_static", + "sha": "883e22c082508e2f95ba25333559ba8a5c38c9c5ef667314e132c9d8451450d8", + "official": true, + "enabled": true, + "beta": false + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/opa-versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "opa-versions", + "attributes": { + "version": "0.54.0", + "url": "https://github.com/open-policy-agent/opa/releases/download/v0.54.0/opa_linux_arm64_static", + "sha": "883e22c082508e2f95ba25333559ba8a5c38c9c5ef667314e132c9d8451450d8", + "official": true, + "deprecated": false, + "deprecated-reason": null, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2023-08-23T22:34:24.561Z" + } + } +} +``` + +## Show an OPA version + +`GET /api/v2/admin/opa-versions/:id` + +| Parameter | Description | +| --------- | --------------------------------------- | +| `:id` | The ID of the OPA version to show. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "opa-versions"`) | The request was successful, returns the OPA version with the matching ID. | +| [404][] | [JSON API error object][] | The request could not find a matching OPA version with the specified ID, or the client is not an administrator. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/admin/opa-versions/tool-L4oe7rNwn7J4E5Yr +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "opa-versions", + "attributes": { + "version": "0.54.0", + "url": "https://github.com/open-policy-agent/opa/releases/download/v0.54.0/opa_linux_arm64_static", + "sha": "883e22c082508e2f95ba25333559ba8a5c38c9c5ef667314e132c9d8451450d8", + "official": true, + "deprecated": false, + "deprecated-reason": null, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2023-08-23T22:34:24.561Z" + } + } +} +``` + +## Update an OPA version + +`PATCH /api/v2/admin/opa-versions/:id` + +| Parameter | Description | +| --------- | ----------------------------------------- | +| `:id` | The ID of the OPA version to update. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "opa-versions"`) | The OPA version was successfully updated. | +| [404][] | [JSON API error object][] | The request could not find a matching OPA version with the specified ID, or the client is not an administrator. | +| [422][] | [JSON API error object][] | Validation errors. | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | ------ | ---------------- | ----------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"opa-versions"`. | +| `data.attributes.version` | string | (previous value) | A semantic version string in N.N.N or N.N.N-bundleName format (`"0.11.0"` or `"0.12.20-beta1"`). | +| `data.attributes.url` | string | (previous value) | The URL where you can download the 64-bit Linux binary of this version. | +| `data.attributes.sha` | string | (previous value) | The SHA-256 checksum of the OPA binary. | +| `data.attributes.official` | bool | (previous value) | Whether or not this is an official release of OPA. | +| `data.attributes.deprecated` | bool | (previous value) | Whether or not this version of OPA is deprecated. | +| `data.attributes.deprecated-reason` | string | (previous value) | Additional context about why a version of OPA is deprecated. | +| `data.attributes.enabled` | bool | (previous value) | Whether or not this version of OPA is enabled for use in HCP Terraform. | +| `data.attributes.beta` | bool | (previous value) | Whether or not this version of OPA is a beta pre-release. | + +### Sample Payload + +```json +{ + "data": { + "type": "opa-versions", + "attributes": { + "deprecated": true, + "deprecated-reason": "A bug was discovered in this version of OPA. Please upgrade as soon as possible" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/opa-versions/tool-L4oe7rNwn7J4E5Yr +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "opa-versions", + "attributes": { + "version": "0.54.0", + "url": "https://github.com/open-policy-agent/opa/releases/download/v0.54.0/opa_linux_arm64_static", + "sha": "883e22c082508e2f95ba25333559ba8a5c38c9c5ef667314e132c9d8451450d8", + "official": true, + "deprecated": true, + "deprecated-reason": "A bug was discovered in this version of OPA. Please upgrade as soon as possible", + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2023-08-23T22:34:24.561Z" + } + } +} +``` + +## Delete an OPA version + +`DELETE /api/v2/admin/opa-versions/:id` + +This endpoint removes an OPA version from HCP Terraform. You cannot remove officially labeled OPA versions or versions used by a workspace or policy set. + +| Parameter | Description | +| --------- | ----------------------------------------- | +| `:id` | The ID of the OPA version to delete. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------------------------------------------------- | +| [204][] | Empty response | The OPA version was successfully deleted. | +| [404][] | [JSON API error object][] | The request could not find a matching OPA version with the specified ID, or the client is not an administrator. | +| [422][] | [JSON API error object][] | The request could not remove the OPA version because it is an official version or a workspace or policy set uses it. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/admin/opa-versions/tool-L4oe7rNwn7J4E5Yr +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/organizations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/organizations.mdx new file mode 100644 index 000000000..2943057cc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/organizations.mdx @@ -0,0 +1,624 @@ +--- +page_title: /admin/organizations API reference for Terraform Enterprise +description: >- + Use the `/admin/organizations` endpoint to manage organizations. Learn how to list, show, update, and delete organizations, list module and provider consumers, and update module consumers. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Admin Organizations API + +The `admin/organizations` API endpoint contains endpoints to help site administrators manage organizations. + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + + + +## List all Organizations + +`GET /api/v2/admin/organizations` + +This endpoint lists all organizations in the Terraform Enterprise installation. + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | --------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | Successfully listed organizations | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `q` | **Optional.** A search query string. Organizations are searchable by name and notification email. This query takes precedence over the attribute specific searches `q[email]` or `q[name]`. | +| `q[email]` | **Optional.** A search query string. This query searches organizations by notification email. If used with `q[name]`, it returns organizations that match both queries. | +| `q[name]` | **Optional.** A search query string. This query searches organizations by name. If used with `q[email]`, it returns organizations that match both queries. | +| `filter[module_producer]` | **Optional.** Allows filtering organizations based on their module sharing configuration. Accepts a boolean true/false value. A `true` value returns organizations that are configured to share their modules, and a `false` value returns organizations that are not configured to share their modules. | +| `filter[provider_producer]` | **Optional.** Allows filtering organizations based on their provider sharing configuration. Accepts a boolean true/false value. A `true` value returns organizations that are configured to share their providers, and a `false` value returns organizations that are not configured to share their providers. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 organizations per page. | + +### Available Related Resources + +This GET endpoint can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ------------- | --------------------------------------- | +| `owners` | A list of owners for each organization. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://tfe.example.com/api/v2/admin/organizations" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "my-organization", + "type": "organizations", + "attributes": { + "access-beta-tools": false, + "external-id": "org-XBiRp755dav5p3P2", + "is-disabled": false, + "name": "my-organization", + "apply-timeout": null, + "plan-timeout": null, + "terraform-worker-sudo-enabled": false, + "notification-email": "my-organization@example.com", + "global-module-sharing": false, + "global-provider-sharing": false, + "sso-enabled": false, + "workspace-limit": null + }, + "relationships": { + "owners": { + "data": [ + { + "id": "user-hxTQDETqnJsi5VYP", + "type": "users" + } + ] + }, + "subscription": { + "data": null + }, + "feature-set": { + "data": null + }, + "module-consumers": { + "links": { + "related": "/api/v2/admin/organizations/my-organization/relationships/module-consumers" + } + } + }, + "links": { + "self": "/api/v2/admin/organizations/my-organization" + } + } + ], + "links": { + "self": "https://tfe.example.com/api/v2/admin/organizations?page%5Bnumber%5D=1\u0026page%5Bsize%5D=20", + "first": "https://tfe.example.com/api/v2/admin/organizations?page%5Bnumber%5D=1\u0026page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://tfe.example.com/api/v2/admin/organizations?page%5Bnumber%5D=1\u0026page%5Bsize%5D=20" + }, + "meta": { + "status-counts": { + "total": 1, + "active": 1, + "disabled": 0 + }, + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } +} +``` + +## Show an Organization + +`GET /api/v2/admin/organizations/:name` + +| Parameter | Description | +| --------- | ------------------------------------ | +| `:name` | The name of the organization to show | + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | The request was successful | +| [404][] | [JSON API error object][] | Organization not found, or client is not an administrator | + +### Available Related Resources + +This GET endpoint can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ------------- | -------------------------------------- | +| `owners` | A list of owners for the organization. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://tfe.example.com/api/v2/admin/organizations/my-organization +``` + +### Sample Response + +```json +{ + "data": { + "id": "my-organization", + "type": "organizations", + "attributes": { + "access-beta-tools": false, + "external-id": "org-XBiRp755dav5p3P2", + "is-disabled": false, + "name": "my-organization", + "apply-timeout": null, + "plan-timeout": null, + "terraform-worker-sudo-enabled": false, + "notification-email": "my-organization@example.com", + "global-module-sharing": false, + "global-provider-sharing": false, + "sso-enabled": false, + "workspace-limit": null + }, + "relationships": { + "owners": { + "data": [ + { + "id": "user-hxTQDETqnJsi5VYP", + "type": "users" + } + ] + }, + "subscription": { + "data": null + }, + "feature-set": { + "data": null + }, + "module-consumers": { + "links": { + "related": "/api/v2/admin/organizations/my-organization/relationships/module-consumers" + } + } + }, + "links": { + "self": "/api/v2/admin/organizations/my-organization" + } + } +} +``` + +## Update an Organization + +`PATCH /admin/organizations/:name` + +| Parameter | Description | +| --------- | -------------------------------------- | +| `:name` | The name of the organization to update | + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | The organization was successfully updated | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. Note that the Admin Organizations API may offer a different set of attributes than the [Organizations API](/terraform/enterprise/api-docs/organizations#request-body-1). + +| Key path | Type | Default | Description | +| ------------------------------------------------------ | ------- | ------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"organizations"` | +| `data.attributes.access-beta-tools` | boolean | false | Whether or not workspaces in the organization can be configured to use beta Terraform versions. | +| `data.attributes.global-module-sharing` | boolean | false | If true, modules in the organization's private module repository will be available to all other organizations in this Terraform Enterprise instance. Enabling this will disable any previously configured [module consumers](#list-module-consumers-for-an-organization). | +| `data.attributes.global-provider-sharing` | boolean | false | If true, providers in the organization's private provider repository will be available to all other organizations in this Terraform Enterprise instance. Enabling this will disable any previously configured [provider consumers](#list-provicer-consumers-for-an-organization). | +| `data.attributes.is-disabled` | boolean | false | Removes all permissions from the organization and makes it inaccessible to users. | +| `data.attributes.apply-timeout` | string | 24h | Maximum run time for Terraform applies for this organization. Will use the configured global defaults if left unset. Specify a duration with a decimal number and a unit suffix. | +| `data.attributes.plan-timeout` | string | 2h | Maximum run time for Terraform plans for this organization. Will use the configured global defaults if left unset. Specify a duration with a decimal number and a unit suffix. | +| `data.attributes.terraform-build-worker-apply-timeout` | string | 24h | Deprecated. Please use `data.attributes.apply-timeout` instead. | +| `data.attributes.terraform-build-worker-plan-timeout` | string | 2h | Deprecated. Please use `data.attributes.plan-timeout` instead. | +| `data.attributes.workspace-limit` | integer | | Maximum number of workspaces for this organization. If this number is set to a value lower than the number of workspaces the organization has, it will prevent additional workspaces from being created, but existing workspaces will not be affected. If set to 0, this limit will have no effect. | + +### Sample Payload + +```json +{ + "data": { + "type": "organizations", + "attributes": { + "global-module-sharing": true + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://tfe.example.com/api/v2/admin/organizations/my-organization +``` + +### Sample Response + +```json +{ + "data": { + "id": "my-organization", + "type": "organizations", + "attributes": { + "access-beta-tools": false, + "external-id": "org-XBiRp755dav5p3P2", + "is-disabled": false, + "name": "my-organization", + "apply-timeout": null, + "plan-timeout": null, + "terraform-worker-sudo-enabled": false, + "notification-email": "my-organization@example.com", + "global-module-sharing": true, + "global-provider-sharing": false, + "sso-enabled": false, + "workspace-limit": null + }, + "relationships": { + "owners": { + "data": [ + { + "id": "user-hxTQDETqnJsi5VYP", + "type": "users" + } + ] + }, + "subscription": { + "data": null + }, + "feature-set": { + "data": null + }, + "module-consumers": { + "links": { + "related": "/api/v2/admin/organizations/my-organization/relationships/module-consumers" + } + } + }, + "links": { + "self": "/api/v2/admin/organizations/my-organization" + } + } +} +``` + +## Delete an Organization + +`DELETE /admin/organizations/:name` + +| Parameter | Description | +| --------- | -------------------------------------- | +| `:name` | The name of the organization to delete | + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------------------------------------- | +| [204][] | Empty response | The organization was successfully deleted | +| [404][] | [JSON API error object][] | Organization not found, or client is not an administrator | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://tfe.example.com/api/v2/admin/organizations/my-organization +``` + +## List Module Consumers for an Organization + +-> This API endpoint is available in Terraform Enterprise as of version 202103-1. + +`GET /api/v2/admin/organizations/:name/relationships/module-consumers` + +This endpoint lists specific organizations in the Terraform Enterprise installation that have permission to use an organization's modules. It will be empty if the organization is sharing modules using global module sharing, or if the organization has no module sharing configuration. + +| Parameter | Description | +| --------- | -------------------------------------------------------------------- | +| `:name` | The name of the organization whose module consumers should be listed | + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | The request was successful | +| [404][] | [JSON API error object][] | Organization not found, or client is not an administrator | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ----------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 organizations per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/module-consumers +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "my-organization", + "type": "organizations", + "attributes": { + "access-beta-tools": false, + "external-id": "org-XBiRp755dav5p3P2", + "is-disabled": false, + "name": "my-organization", + "apply-timeout": null, + "plan-timeout": null, + "terraform-worker-sudo-enabled": false, + "notification-email": "my-organization@example.com", + "global-module-sharing": false, + "global-provider-sharing": false, + "sso-enabled": false, + "workspace-limit": null + }, + "relationships": { + "module-consumers": { + "links": { + "related": "/api/v2/admin/organizations/my-organization/relationships/module-consumers" + } + }, + "owners": { + "data": [ + { + "id": "user-hxTQDETqnJsi5VYP", + "type": "users" + } + ] + }, + "subscription": { + "data": null + }, + "feature-set": { + "data": null + } + }, + "links": { + "self": "https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/module-consumers?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/module-consumers?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/module-consumers?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } + } + ] +} +``` + +## Update an Organization's Module Consumers + +-> This API endpoint is available in Terraform Enterprise as of version 202103-1. + +~> **Note:** This API endpoint is **deprecated** and will be removed in a future release. Transition existing integrations with this API to the [Admin Registry Sharing API](/terraform/enterprise/api-docs/admin/registry-sharing). + +`PATCH /admin/organizations/:name/relationships/module-consumers` + +This endpoint is used to specify a list of organizations that can use modules from the sharing organization's private registry. Setting a list of module consumers will turn off global module sharing for an organization. + +| Parameter | Description | +| --------- | ----------------------------------------------------------- | +| `:name` | The name of the organization whose registry is being shared | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------------------------------------ | +| [204][] | No content | The list of module consumers was successfully updated | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, module consumer not found, etc..) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | | A list of resource identifier objects that defines which organizations will consume modules. These objects must contain `id` and `type` properties, and the `type` property must be `organizations` (e.g. `{ "id": "an-org", "type": "organizations" }`). | + +### Sample Payload + +```json +{ + "data": [ + { + "id": "an-org", + "type": "organizations" + + }, + { + "id": "another-org", + "type": "organizations" + } + ] +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/module-consumers +``` + +### Sample Response + +The response body will be empty if successful. + +## List Provider Consumers for an Organization + +-> This API endpoint is available in Terraform Enterprise as of version 202301-1. + +`GET /api/v2/admin/organizations/:name/relationships/provider-consumers` + +This endpoint lists specific organizations in the Terraform Enterprise installation that have permission to use an organization's providers. It will be empty if the organization is sharing providers using global provider sharing, or if the organization has no provider sharing configuration. + +| Parameter | Description | +| --------- | ---------------------------------------------------------------------- | +| `:name` | The name of the organization whose provider consumers should be listed | + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | The request was successful | +| [404][] | [JSON API error object][] | Organization not found, or client is not an administrator | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ----------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 organizations per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/provider-consumers +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "my-organization", + "type": "organizations", + "attributes": { + "access-beta-tools": false, + "external-id": "org-XBiRp755dav5p3P2", + "is-disabled": false, + "name": "my-organization", + "apply-timeout": null, + "plan-timeout": null, + "terraform-worker-sudo-enabled": false, + "notification-email": "my-organization@example.com", + "global-module-sharing": false, + "global-provider-sharing": false, + "sso-enabled": false, + "workspace-limit": null + }, + "relationships": { + "provider-consumers": { + "links": { + "related": "/api/v2/admin/organizations/my-organization/relationships/provider-consumers" + } + }, + "owners": { + "data": [ + { + "id": "user-hxTQDETqnJsi5VYP", + "type": "users" + } + ] + }, + "subscription": { + "data": null + }, + "feature-set": { + "data": null + } + }, + "links": { + "self": "https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/provider-consumers?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/provider-consumers?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://tfe.example.com/api/v2/admin/organizations/my-organization/relationships/provider-consumers?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } + } + ] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/registry-sharing.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/registry-sharing.mdx new file mode 100644 index 000000000..565a5b4e0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/registry-sharing.mdx @@ -0,0 +1,92 @@ +--- +page_title: /registry-partnerships API reference for Terraform Enterprise +description: >- + Use the `/registry-partnerships` endpoint to configure registry sharing. Learn how to update which organizations can use modules and providers from your private registry using the HTTP API. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Registry Partnership API Endpoint + +Admins and operators who install and maintain their organization's Terraform Enterprise instance are able to use the `registry-partnerships` endpoint to configure registry sharing. + +## Introduction + +There are two ways to configure registry sharing via the Admin API: + +- This endpoint, which allows an organization to share modules and providers with a specific list of other organizations. +- The [update an organization endpoint](/terraform/enterprise/api-docs/admin/organizations#update-an-organization), whose `data.attributes.global-module-sharing` and `data.attributes.global-provider-sharing` properties allows an organization to share modules and providers with every organization in the instance. + +Enabling one option will automatically disable the other. For more information, see [Administration: Registry Sharing](/terraform/enterprise/application-administration/registry-sharing). + +## Update an Organization's Provider Partnership + +-> This API endpoint is available in Terraform Enterprise as of version 202301-1. + +`PUT /admin/organizations/:name/registry-partnerships` + +This endpoint sets the list of organizations that can use modules and providers from the sharing organization's private registry. Sharing with specific organizations will automatically turn off global module and/or provider sharing, which is configured with the [update an organization endpoint](/terraform/enterprise/api-docs/admin/organizations#update-an-organization) (via the `data.attributes.global-module-sharing` and `data.attributes.global-provider-sharing` properties). + +| Parameter | Description | +| --------- | ----------------------------------------------------------- | +| `:name` | The name of the organization whose registry is being shared | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------------ | +| [204][] | No content | The list of module and provider consumers was successfully updated | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PUT endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ------------------------------------ | -------------- | ------- | ------------------------------------------------------------------------------------------------------------ | +| `data.type` | string | | Must be `"registry-partnerships"` | +| `data.attributes.module-consumers` | array\[string] | | A list of organization names that will be able to access modules in the producing organization's registry. | +| `data.attributes.provider-consumers` | array\[string] | | A list of organization names that will be able to access providers in the producing organization's registry. | + +### Sample Payload + +```json +{ + "data": { + "type": "registry-partnerships", + "attributes": { + "module_consumers": ["org1-name"], + "provider_consumers": ["org1-name", "org2-name"] + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PUT \ + --data @payload.json \ + https://tfe.example.com/api/v2/admin/organizations/my-organization/registry-partnerships +``` + +### Sample Response + +The response body will be empty if successful. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/runs.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/runs.mdx new file mode 100644 index 000000000..780b62000 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/runs.mdx @@ -0,0 +1,224 @@ +--- +page_title: /admin/runs API reference for Terraform Enterprise +description: >- + Use the `/admin/runs` endpoint to interact with Terraform runs. Learn how to list runs and cancel runs using the HTTP API. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Admin Runs API + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + +The Runs Admin API contains endpoints to help site administrators manage runs. + +## List all runs + +`GET /api/v2/admin/runs` + +This endpoint lists all runs in the Terraform Enterprise installation. + +| Status | Response | Reason | +| ------- | -------------------------------------- | ------------------------------- | +| [200][] | [JSON API document][] (`type: "runs"`) | Successfully listed runs | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Query Parameters + +[These are standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ---------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `q` | **Optional.** A search query string. Runs are searchable by ID, workspace name, organization name or email, and VCS repository identifier. | +| `filter[status]` | **Optional.** A comma-separated list of Run statuses to restrict results to, which can include any of the following: `"pending"`, `"plan_queued"`, `"planning"`, `"planned"`, `"confirmed"`, `"apply_queued"`, `"applying"`, `"applied"`, `"discarded"`, `"errored"`, `"canceled"`, `"cost_estimating"`, `"cost_estimated"`, `"policy_checking"`, `"policy_override"`, `"policy_soft_failed"`, `"policy_checked"`, and `"planned_and_finished"`. | +| `filter[from]` | **Optional.** Must be formatted in RFC 3339 and UTC. | +| `filter[to]` | **Optional.** Must be formatted in RFC 3339 and UTC. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 runs per page. | + +A VCS repository identifier is a reference to a VCS repository in the format `:org/:repo`, where `:org` and `:repo` refer to the organization (or project) and repository in your VCS provider. + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://app.terraform.io/api/v2/admin/runs" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "run-VCsNJXa59eUza53R", + "type": "runs", + "attributes": { + "status": "pending", + "status-timestamps": { + "planned-at": "2018-03-02T23:42:06+00:00", + "discarded-at": "2018-03-02T23:42:06+00:00" + }, + "has-changes": true, + "created-at": "2018-03-02T23:42:06.651Z" + }, + "relationships": { + "workspace": { + "data": { + "id": "ws-mJtb6bXGybq5zbf3", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/runs/run-VCsNJXa59eUza53R" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/admin/runs?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/admin/runs?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/admin/runs?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + }, + "status-counts": { + "pending": 1, + "planning": 0, + "planned": 0, + "confirmed": 0, + "applying": 0, + "applied": 0, + "discarded": 0, + "errored": 0, + "canceled": 0, + "policy-checking": 0, + "policy-override": 0, + "policy-checked": 0, + "total": 1 + } + } +} +``` + +## Force a run into the "cancelled" state + +`POST /admin/runs/:id/actions/force-cancel` + +| Parameter | Description | +| --------- | ---------------------------- | +| `:id` | The ID of the run to cancel. | + +This endpoint forces a run (and its plan/apply, if applicable) into the `"canceled"` state. This action should only be performed for runs that are stuck and no longer progressing normally, as there is a risk of lost state data if a progressing apply is force-canceled. Healthy runs can be [requested for cancellation by end-users](/terraform/enterprise/run/states). + +| Status | Response | Reason | +| ------- | -------------------------------------- | ------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "runs"`) | Successfully canceled the run. | +| [404][] | [JSON API error object][] | Run not found, or client is not an administrator. | + +### Request body + +This POST endpoint allows an optional JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| --------- | ------ | ------- | ----------------------------------------------------------- | +| `comment` | string | `null` | An optional explanation for why the run was force-canceled. | + +### Sample Payload + +```json +{ + "comment": "This run was stuck and would never finish." +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + "https://app.terraform.io/api/v2/admin/runs/run-VCsNJXa59eUza53R/actions/force-cancel" +``` + +### Sample Response + +```json +{ + "data": { + "id": "run-VCsNJXa59eUza53R", + "type": "runs", + "attributes": { + "status": "errored", + "status-timestamps": { + "planned-at": "2018-03-02T23:42:06Z" + }, + "has-changes": true, + "created-at": "2018-03-02T23:42:06.651Z" + }, + "relationships": { + "workspace": { + "data": { + "id": "ws-mJtb6bXGybq5zbf3", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/runs/run-VCsNJXa59eUza53R" + } + } +} +``` + +### Available Related Resources + +This GET endpoint can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ------------------------------- | ----------------------------------------------------------- | +| `workspace` | The workspace this run belongs in. | +| `workspace.organization` | The organization of the associated workspace. | +| `workspace.organization.owners` | The owners of the organization of the associated workspace. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/sentinel-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/sentinel-versions.mdx new file mode 100644 index 000000000..74c34ff62 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/sentinel-versions.mdx @@ -0,0 +1,346 @@ +--- +page_title: /admin/sentinel-versions API reference for Terraform Enterprise +description: >- + Use the `/admin/sentinel-versions` endpoint to manage available Sentinel versions. Learn how to list, show, create, update, and delete Sentinel versions using the HTTP API. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Admin Sentinel Versions API + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + +The Sentinel Versions Admin API lets site administrators manage which versions of Sentinel are available to the HCP Terraform users within their enterprise. + +## List all Sentinel versions + +`GET /api/v2/admin/sentinel-versions` + +This endpoint lists all known versions of Sentinel. + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | -------------------------------------- | +| [200][] | [JSON API document][] (`type: "sentinel-versions"`) | Successfully lists Sentinel versions. | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `filter[version]` | **Optional.** A query string. This will find an exact Sentinel version matching the version queried. This option takes precedence over search queries. | +| `search[version]` | **Optional.** A search query string. This will search for Sentinel versions matching the version number queried. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 Sentinel versions per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://app.terraform.io/api/v2/admin/sentinel-versions" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "sentinel-versions", + "attributes": { + "version": "0.22.1", + "url": "https://releases.hashicorp.com/sentinel/0.22.1/sentinel_0.22.1_linux_amd64.zip", + "sha": "0a4a2b2baf46bfeb81d5137b2656b159ccc881487df3bebacd350ea48b53e76c", + "deprecated": false, + "deprecated-reason": null, + "official": true, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2023-08-23T22:34:24.561Z" + } + } + ], + "links": { + "self": "https://tfe.example.com/api/v2/admin/sentinel-versions?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://tfe.example.com/api/v2/admin/sentinel-versions?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": "https://tfe.example.com/api/v2/admin/sentinel-versions?page%5Bnumber%5D=2&page%5Bsize%5D=20", + "last": "https://tfe.example.com/api/v2/admin/sentinel-versions?page%5Bnumber%5D=4&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": 2, + "total-pages": 4, + "total-count": 70 + } + } +} +``` + +## Create a Sentinel version + +`POST /api/v2/admin/sentinel-versions` + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | ---------------------------------------------- | +| [201][] | [JSON API document][] (`type: "sentinel-versions"`) | The Sentinel version was successfully created. | +| [404][] | [JSON API error object][] | The client is not an administrator. | +| [422][] | [JSON API error object][] | Validation errors. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | ------ | ------- | ------------------------------------------------------------------------------------------------------------ | +| `data.type` | string | | Must be `"sentinel-versions"`. | +| `data.attributes.version` | string | | A semantic version string in N.N.N or N.N.N-bundleName format (`"0.11.0"` or `"0.12.20-beta1"`). | +| `data.attributes.url` | string | | The URL where you can download the 64-bit Linux binary of this version. | +| `data.attributes.sha` | string | | The SHA-256 checksum of the compressed Sentinel binary. | +| `data.attributes.deprecated` | bool | `false` | Whether or not this version of Sentinel is deprecated. | +| `data.attributes.deprecated-reason` | string | `null` | Additional context about why a version of Sentinel is deprecated. Field is null unless deprecated is `true`. | +| `data.attributes.official` | bool | `false` | Whether or not this is an official release of Sentinel. | +| `data.attributes.enabled` | bool | `true` | Whether or not this version of Sentinel is enabled for use in HCP Terraform. | +| `data.attributes.beta` | bool | `false` | Whether or not this version of Sentinel is a beta pre-release. | + +### Sample Payload + +```json +{ + "data": { + "type": "sentinel-versions", + "attributes": { + "version": "0.22.1", + "url": "https://releases.hashicorp.com/sentinel/0.22.1/sentinel_0.22.1_linux_amd64.zip", + "sha": "0a4a2b2baf46bfeb81d5137b2656b159ccc881487df3bebacd350ea48b53e76c", + "official": true, + "enabled": true, + "beta": false + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/sentinel-versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "sentinel-versions", + "attributes": { + "version": "0.22.1", + "url": "https://releases.hashicorp.com/sentinel/0.22.1/sentinel_0.22.1_linux_amd64.zip", + "sha": "0a4a2b2baf46bfeb81d5137b2656b159ccc881487df3bebacd350ea48b53e76c", + "official": true, + "deprecated": false, + "deprecated-reason": null, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2023-08-23T22:34:24.561Z" + } + } +} +``` + +## Show a Sentinel version + +`GET /api/v2/admin/sentinel-versions/:id` + +| Parameter | Description | +| --------- | --------------------------------------- | +| `:id` | The ID of the Sentinel version to show. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "sentinel-versions"`) | Successfully shows the specified Sentinel version. | +| [404][] | [JSON API error object][] | Could not find the specified Sentinel version, or client is not an administrator. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/admin/sentinel-versions/tool-L4oe7rNwn7J4E5Yr +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "sentinel-versions", + "attributes": { + "version": "0.22.1", + "url": "https://releases.hashicorp.com/sentinel/0.22.1/sentinel_0.22.1_linux_amd64.zip", + "sha": "0a4a2b2baf46bfeb81d5137b2656b159ccc881487df3bebacd350ea48b53e76c", + "official": true, + "deprecated": false, + "deprecated-reason": null, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2023-08-23T22:34:24.561Z" + } + } +} +``` + +## Update a Sentinel version + +`PATCH /api/v2/admin/sentinel-versions/:id` + +| Parameter | Description | +| --------- | ----------------------------------------- | +| `:id` | The ID of the Sentinel version to update. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "sentinel-versions"`) | The Sentinel version was successfully updated. | +| [404][] | [JSON API error object][] | Could not find the specified Sentinel version, or client is not an administrator. | +| [422][] | [JSON API error object][] | Validation errors. | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | ------ | ---------------- | --------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"sentinel-versions"`. | +| `data.attributes.version` | string | (previous value) | A semantic version string in N.N.N or N.N.N-bundleName format (`"0.11.0"`, `"0.12.20-beta1"`). | +| `data.attributes.url` | string | (previous value) | The URL you can download the 64-bit Linux binary of this version. | +| `data.attributes.sha` | string | (previous value) | The SHA-256 checksum of the compressed Sentinel binary. | +| `data.attributes.official` | bool | (previous value) | Whether or not this is an official release of Sentinel. | +| `data.attributes.deprecated` | bool | (previous value) | Whether or not this version of Sentinel is deprecated. | +| `data.attributes.deprecated-reason` | string | (previous value) | Additional context about why a version of Sentinel is deprecated. | +| `data.attributes.enabled` | bool | (previous value) | Whether or not this version of Sentinel is enabled for use in HCP Terraform. | +| `data.attributes.beta` | bool | (previous value) | Whether or not this version of Sentinel is a beta pre-release. | + +### Sample Payload + +```json +{ + "data": { + "type": "sentinel-versions", + "attributes": { + "deprecated": true, + "deprecated-reason": "A bug was discovered in this version of Sentinel. Please upgrade as soon as possible" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/sentinel-versions/tool-L4oe7rNwn7J4E5Yr +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "sentinel-versions", + "attributes": { + "version": "0.22.1", + "url": "https://releases.hashicorp.com/sentinel/0.22.1/sentinel_0.22.1_linux_amd64.zip", + "sha": "0a4a2b2baf46bfeb81d5137b2656b159ccc881487df3bebacd350ea48b53e76c", + "official": true, + "deprecated": true, + "deprecated-reason": "A bug was discovered in this version of Sentinel. Please upgrade as soon as possible", + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2023-08-23T22:34:24.561Z" + } + } +} +``` + +## Delete a Sentinel version + +`DELETE /api/v2/admin/sentinel-versions/:id` + +This endpoint removes a Sentinel version from HCP Terraform. You cannot remove officially labeled Sentinel versions or any version used by a workspace. + +| Parameter | Description | +| --------- | ----------------------------------------- | +| `:id` | The ID of the Sentinel version to delete. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------------------------------------------------- | +| [204][] | Empty response | The Sentinel version was successfully deleted. | +| [404][] | [JSON API error object][] | The request could not find a matching Sentinel version with the specified ID, or the client is not an administrator. | +| [422][] | [JSON API error object][] | The request could not remove the Sentinel version because it is an official version or a workspace uses it. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/admin/sentinel-versions/tool-L4oe7rNwn7J4E5Yr +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/settings.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/settings.mdx new file mode 100644 index 000000000..c1da765c6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/settings.mdx @@ -0,0 +1,897 @@ +--- +page_title: /admin/general-settings API reference for Terraform Enterprise +description: >- + Use the `/admin/general-settings` set of endpoints to configure Terraform Enterprise. Learn how to list and update general, customization, cost estimation, SAML, SMTP, and Twilio settings using the HTTP API. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents +[JSON API error object]: https://jsonapi.org/format/#error-objects +[speculative plans]: /terraform/enterprise/run/remote-operations#speculative-plans + +# Terraform Enterprise Settings API + +This topic provides reference information for the following endpoints: + +- `/admin/general-settings` +- `/admin/data-retention-policy-settings` +- `/admin/cost-estimation-settings` +- `/admin/saml-settings` +- `/admin/smtp-settings` +- `/admin/twilio-settings` +- `/admin/customization-settings` +- `/admin/oidc-settings` + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + +## List General Settings + +`GET /api/v2/admin/general-settings` + +| Status | Response | Reason | +| ------- | -------------------------------------------------- | ------------------------------------ | +| [200][] | [JSON API document][] (`type: "general-settings"`) | Successfully listed General settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/admin/general-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "general", + "type": "general-settings", + "attributes": { + "limit-user-organization-creation": true, + "api-rate-limiting-enabled": true, + "api-rate-limit": 30, + "plan-timeout": "2h", + "apply-timeout": "24h", + "send-passing-statuses-for-untriggered-speculative-plans": false, + "allow-speculative-plans-on-pull-requests-from-forks": false, + "default-remote-state-access": true + } + } +} +``` + +## Update General Settings + +`PATCH /api/v2/admin/general-settings` + +| Status | Response | Reason | +| ------- | -------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "general-settings"`) | Successfully updated the General settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ------------------------------------------------------------------------- | ------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.attributes.allow-speculative-plans-on-pull-requests-from-forks` | bool | `false` | When set to `false`, [speculative plans][] are not run on pull requests from forks of a repository. It is currently supported for the following VCS providers: GitHub.com, GitHub.com (OAuth), GitHub Enterprise, Bitbucket Cloud, Azure DevOps Server, Azure DevOps Services. To learn more about this setting, refer to the [documentation](/terraform/enterprise/application-administration/general#allow-speculative-plans-on-pull-requests-from-forks) | +| `data.attributes.api-rate-limit` | integer | 30 | The number of allowable API requests per second for any client. This value cannot be less than 30. To learn more about API Rate Limiting, refer to the [rate limiting documentation][] | +| `data.attributes.api-rate-limiting-enabled` | bool | `true` | Whether or not rate limiting is enabled for API requests. To learn more about API Rate Limiting, refer to the [rate limiting documentation][] | +| `data.attributes.default-remote-state-access` | bool | `true` | Determines the default value for the `global-remote-state` attribute on new workspaces. For more details, refer to [Administration: General Settings](/terraform/enterprise/application-administration/general#remote-state-sharing) and [Workspaces API: Create a Workspace](/terraform/enterprise/api-docs/workspaces#create-a-workspace). | +| `data.attributes.limit-user-organization-creation` | bool | `true` | When set to `true`, limits the ability to create organizations to users with the `site-admin` permission only. | +| `data.attributes.send-passing-statuses-for-untriggered-speculative-plans` | bool | `false` | When set to `true`, workspaces automatically send passing commit statuses for any pull requests that don't affect their tracked files. | +| `data.attributes.plan-timeout` | string | `2h` | Default maximum run time for Terraform plans. Can be overridden on a per-organization basis. Specify a duration with a decimal number and a unit suffix. | +| `data.attributes.apply-timeout` | string | `24h` | Default maximum run time for Terraform applies. Can be overridden on a per-organization basis. Specify a duration with a decimal number and a unit suffix. | +| `data.attributes.terraform-build-worker-plan-timeout` | string | `2h` | Deprecated. Please use `data.attributes.plan-timeout` instead. | +| `data.attributes.terraform-build-worker-apply-timeout` | string | `24h` | Deprecated. Please use `data.attributes.apply-timeout` instead. | + + +[rate limiting documentation]: /terraform/enterprise/api-docs#rate-limiting + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "limit-user-organization-creation": true, + "api-rate-limiting-enabled": true, + "api-rate-limit": 50, + "plan-timeout": "2h", + "apply-timeout": "24h" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/general-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "general", + "type": "general-settings", + "attributes": { + "limit-user-organization-creation": true, + "api-rate-limiting-enabled": true, + "api-rate-limit": 50, + "send-passing-statuses-for-untriggered-speculative-plans": false, + "allow-speculative-plans-on-pull-requests-from-forks": false, + "plan-timeout": "2h", + "apply-timeout": "24h", + "default-remote-state-access": true + } + } +} +``` + +## Show data retention policy settings + +`GET /api/v2/admin/data-retention-policy-settings` + +This endpoint returns the global data retention policy for all organizations. +When a global data retention policy is not set, organizations retain all backing data by default. +Read more about [admin data retention policy settings](/terraform/enterprise/application-administration/general#data-retention-policies). + +Admin settings only support the [`data-retention-policy-delete-olders`](/terraform/enterprise/api-docs/data-retention-policies#data-retention-policy-delete-olders) policy type. + +Refer to [Data Retention Policy API](/terraform/enterprise/api-docs/data-retention-policies#show-data-retention-policy) for details. + +## Create or update data retention policy settings + +`POST /api/v2/admin/data-retention-policy-settings` + +This endpoint creates a default data retention policy for all organizations on the site. +When a global data retention policy is not set, organizations retain all backing data by default. +Read more about [admin data retention policy settings](/terraform/enterprise/application-administration/general#data-retention-policies). + +Admin settings only support the [`data-retention-policy-delete-olders`](/terraform/enterprise/api-docs/data-retention-policies#data-retention-policy-delete-olders) policy type. + +Refer to [Data Retention Policy API](/terraform/enterprise/api-docs/data-retention-policies#create-or-update-data-retention-policy) for details. + +## Remove data retention policy + +`DELETE /api/v2/admin/data-retention-policy-settings` + +This endpoint removes the data retention policy set at the site admin level. +When a data retention policy is not set for the site admin, organizations retain all backing data by default. + +Read more about [admin data retention policy settings](/terraform/enterprise/application-administration/general#data-retention-policies). + +See [Data Retention Policy API](/terraform/enterprise/api-docs/data-retention-policies#remove-data-retention-policy) for details. + +## List Cost Estimation Settings + +`GET /api/v2/admin/cost-estimation-settings` + +| Status | Response | Reason | +| ------- | ---------------------------------------------------------- | -------------------------------------------- | +| [200][] | [JSON API document][] (`type: "cost-estimation-settings"`) | Successfully listed Cost Estimation settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/admin/cost-estimation-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "cost-estimation", + "type": "cost-estimation-settings", + "attributes": { + "enabled": true, + "aws-access-key-id": "AKIAIOSFODNN7EXAMPLE", + "aws-secret-key": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY", + "gcp-credentials": "{\"private_key\":\"-----BEGIN PRIVATE KEY-----\\n....=\\n-----END PRIVATE KEY-----\",\"private_key_id\":\"some_id\",...}", + "azure-client-id": "9b516fe8-415s-9119-bab0-EXAMPLEID1", + "azure-client-secret": "9b516fe8-415s-9119-bab0-EXAMPLESEC1", + "azure-subscription-id": "9b516fe8-415s-9119-bab0-EXAMPLEID2", + "azure-tenant-id": "9b516fe8-415s-9119-bab0-EXAMPLEID3" + } + } +} +``` + +## Update Cost Estimation Settings + +`PATCH /api/v2/admin/cost-estimation-settings` + +| Status | Response | Reason | +| ------- | ---------------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "cost-estimation-settings"`) | Successfully updated Cost Estimation settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +If `data.attributes.enabled` is set to `true`, there must be at least one set of credentials populated with valid values. For example, either both `aws-access-key-id` and `aws-secret-key` must be set, _or_ `gcp-credentials` must be set. + +See [SAML Configuration](/terraform/enterprise/saml/configuration) for more details on attribute values. + +| Key path | Type | Default | Description | +| --------------------------------------- | ------ | ------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `data.attributes.enabled` | bool | `false` | Allows organizations to opt-in to the Cost Estimation feature. | +| `data.attributes.aws-access-key-id` | string | | An AWS Access Key ID that the Cost Estimation feature will use to authorize to AWS's Pricing API. | +| `data.attributes.aws-secret-key` | string | | An AWS Secret Key that the Cost Estimation feature will use to authorize to AWS's Pricing API. | +| `data.attributes.gcp-credentials` | string | | A JSON string containing GCP credentials that the Cost Estimation feature will use to authorize to the Google Cloud Platform's Pricing API. This must be the contents of a valid JSON key that is downloaded when [creating a Service Account in GCP](https://cloud.google.com/video-intelligence/docs/common/auth#creating_a_service_account_in_the). | +| `data.attributes.azure-client-id` | string | | An Azure Client ID that the Cost Estimation feature will use to authorize to Azure's RateCard API. | +| `data.attributes.azure-client-secret` | string | | An Azure Client Secret that the Cost Estimation feature will use to authorize to Azure's RateCard API. | +| `data.attributes.azure-subscription-id` | string | | An Azure Subscription ID that the Cost Estimation feature will use to authorize to Azure's RateCard API. | +| `data.attributes.azure-tenant-id` | string | | An Azure Tenant ID that the Cost Estimation feature will use to authorize to Azure's RateCard API. | + +```json +{ + "data": { + "attributes": { + "enabled": true, + "aws-access-key-id": "AKIAIOSFODNN7EXAMPLE", + "aws-secret-key": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY", + "gcp-credentials": "{\"private_key\":\"-----BEGIN PRIVATE KEY-----\\n....=\\n-----END PRIVATE KEY-----\",\"private_key_id\":\"some_id\",...}", + "azure-client-id": "9b516fe8-415s-9119-bab0-EXAMPLEID1", + "azure-client-secret": "9b516fe8-415s-9119-bab0-EXAMPLESEC1", + "azure-subscription-id": "9b516fe8-415s-9119-bab0-EXAMPLEID2", + "azure-tenant-id": "9b516fe8-415s-9119-bab0-EXAMPLEID3" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/cost-estimation-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "cost-estimation", + "type": "cost-estimation-settings", + "attributes": { + "enabled": true, + "aws-access-key-id": "AKIAIOSFODNN7EXAMPLE", + "aws-secret-key": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY", + "gcp-credentials": "{\"private_key\":\"-----BEGIN PRIVATE KEY-----\\n....=\\n-----END PRIVATE KEY-----\",\"private_key_id\":\"some_id\",...}", + "azure-client-id": "9b516fe8-415s-9119-bab0-EXAMPLEID1", + "azure-client-secret": "9b516fe8-415s-9119-bab0-EXAMPLESEC1", + "azure-subscription-id": "9b516fe8-415s-9119-bab0-EXAMPLEID2", + "azure-tenant-id": "9b516fe8-415s-9119-bab0-EXAMPLEID3" + } + } +} +``` + +## List SAML Settings + +`GET /api/v2/admin/saml-settings` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ----------------------------------- | +| [200][] | [JSON API document][] (`type: "saml-settings"`) | Successfully listed SAML settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/admin/saml-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "saml", + "type": "saml-settings", + "attributes": { + "enabled": true, + "debug": false, + "old-idp-cert": null, + "idp-cert": "SAMPLE-CERTIFICATE", + "slo-endpoint-url": "https://example.com/slo", + "sso-endpoint-url": "https://example.com/sso", + "attr-username": "Username", + "attr-groups": "MemberOf", + "attr-site-admin": "SiteAdmin", + "site-admin-role": "site-admins", + "sso-api-token-session-timeout": 1209600, + "acs-consumer-url": "https://example.com/users/saml/auth", + "metadata-url": "https://example.com/users/saml/metadata" + } + } +} +``` + +## Update SAML Settings + +`PATCH /api/v2/admin/saml-settings` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "saml-settings"`) | Successfully updated SAML settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +If `data.attributes.enabled` is set to `true`, all remaining attributes must have valid values. You can omit attributes if they have a default value, or if a value was set by a previous update. Omitted attributes keep their previous values. + +See [SAML Configuration](/terraform/enterprise/saml/configuration) for more details on attribute values. + +| Key path | Type | Default | Description | +| ----------------------------------------------- | ------- | --------------- | ----------------------------------------------------------------------------------------------------------------------------------------- | +| `data.attributes.enabled` | bool | `false` | Allows SAML to be used. If true, all remaining attributes must have valid values. | +| `data.attributes.debug` | bool | `false` | Enables a SAML debug dialog that allows an admin to see the SAMLResponse XML and processed values during login. | +| `data.attributes.idp-cert` | string | | Identity Provider Certificate specifies the PEM encoded X.509 Certificate as provided by the IdP configuration. | +| `data.attributes.slo-endpoint-url` | string | | Single Log Out URL specifies the HTTPS endpoint on your IdP for single logout requests. This value is provided by the IdP configuration. | +| `data.attributes.sso-endpoint-url` | string | | Single Sign On URL specifies the HTTPS endpoint on your IdP for single sign-on requests. This value is provided by the IdP configuration. | +| `data.attributes.attr-username` | string | `"Username"` | Username Attribute Name specifies the name of the SAML attribute that determines the user's username. | +| `data.attributes.attr-groups` | string | `"MemberOf"` | Team Attribute Name specifies the name of the SAML attribute that determines team membership. | +| `data.attributes.attr-site-admin` | string | `"SiteAdmin"` | Specifies the role for site admin access. Overrides the "Site Admin Role" method. | +| `data.attributes.site-admin-role` | string | `"site-admins"` | Specifies the role for site admin access, provided in the list of roles sent in the Team Attribute Name attribute. | +| `data.attributes.sso-api-token-session-timeout` | integer | 1209600 | Specifies the Single Sign On session timeout in seconds. Defaults to 14 days. | + +```json +{ + "data": { + "attributes": { + "enabled": true, + "debug": false, + "idp-cert": "NEW-CERTIFICATE", + "slo-endpoint-url": "https://example.com/slo", + "sso-endpoint-url": "https://example.com/sso", + "attr-username": "Username", + "attr-groups": "MemberOf", + "attr-site-admin": "SiteAdmin", + "site-admin-role": "site-admins", + "sso-api-token-session-timeout": 1209600 + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/saml-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "saml", + "type": "saml-settings", + "attributes": { + "enabled": true, + "debug": false, + "old-idp-cert": "SAMPLE-CERTIFICATE", + "idp-cert": "NEW-CERTIFICATE", + "slo-endpoint-url": "https://example.com/slo", + "sso-endpoint-url": "https://example.com/sso", + "attr-username": "Username", + "attr-groups": "MemberOf", + "attr-site-admin": "SiteAdmin", + "site-admin-role": "site-admins", + "sso-api-token-session-timeout": 1209600, + "acs-consumer-url": "https://example.com/users/saml/auth", + "metadata-url": "https://example.com/users/saml/metadata" + } + } +} +``` + +## Revoke previous SAML IdP Certificate + +`POST /api/v2/admin/saml-settings/actions/revoke-old-certificate` + +When reconfiguring the IdP certificate, Terraform Enterprise will retain the old IdP certificate to allow for a rotation period. This PUT endpoint will revoke the older IdP certificate when the new IdP certificate is known to be functioning correctly. + +See [SAML Configuration](/terraform/enterprise/saml/configuration) for more details. + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/admin/saml-settings/actions/revoke-old-certificate +``` + +### Sample Response + +```json +{ + "data": { + "id": "saml", + "type": "saml-settings", + "attributes": { + "enabled": true, + "debug": false, + "old-idp-cert": null, + "idp-cert": "NEW-CERTIFICATE", + "slo-endpoint-url": "https://example.com/slo", + "sso-endpoint-url": "https://example.com/sso", + "attr-username": "Username", + "attr-groups": "MemberOf", + "attr-site-admin": "SiteAdmin", + "site-admin-role": "site-admins", + "sso-api-token-session-timeout": 1209600, + "acs-consumer-url": "https://example.com/users/saml/auth", + "metadata-url": "https://example.com/users/saml/metadata" + } + } +} +``` + +## List SMTP Settings + +`GET /api/v2/admin/smtp-settings` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ----------------------------------- | +| [200][] | [JSON API document][] (`type: "smtp-settings"`) | Successfully listed SMTP settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/admin/smtp-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "smtp", + "type": "smtp-settings", + "attributes": { + "enabled": true, + "host": "example.com", + "port": 25, + "sender": "sample_user@example.com", + "auth": "login", + "username": "sample_user" + } + } +} +``` + +## Update SMTP Settings + +`PATCH /api/v2/admin/smtp-settings` + +When a request to this endpoint is submitted, a test message will be sent to the specified `test-email-address`. If the test message delivery fails, the API will return an error code indicating the reason for the failure. + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "smtp-settings"`) | Successfully updated the SMTP settings | +| [401][] | [JSON API error object][] | SMTP user credentials are invalid | +| [404][] | [JSON API error object][] | User unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [500][] | [JSON API error object][] | SMTP server returned a server error | +| [504][] | [JSON API error object][] | SMTP server timed out | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +If `data.attributes.enabled` is set to `true`, all remaining attributes must have valid values. You can omit attributes if they have a default value, or if a value was set by a previous update. Omitted attributes keep their previous values. + +| Key path | Type | Default | Description | +| ------------------------------------ | ------- | -------- | ------------------------------------------------------------------------------------------------------------------------------- | +| `data.attributes.enabled` | bool | `false` | Allows SMTP to be used. If true, all remaining attributes must have valid values. | +| `data.attributes.host` | string | | The host address of the SMTP server. | +| `data.attributes.port` | integer | | The port of the SMTP server. | +| `data.attributes.sender` | string | | The desired sender address. | +| `data.attributes.auth` | string | `"none"` | The authentication type. Valid values are `"none"`, `"plain"`, and `"login"`. | +| `data.attributes.username` | string | | The username used to authenticate to the SMTP server. Only required if `data.attributes.auth` is set to `"login"` or `"plain"`. | +| `data.attributes.password` | string | | The username used to authenticate to the SMTP server. Only required if `data.attributes.auth` is set to `"login"` or `"plain"`. | +| `data.attributes.test-email-address` | string | | The email address to send a test message to. Not persisted and only used during testing. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "enabled": true, + "host": "example.com", + "port": 25, + "sender": "sample_user@example.com", + "auth": "login", + "username": "sample_user", + "password": "sample_password", + "test-email-address": "test@example.com" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/smtp-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "smtp", + "type": "smtp-settings", + "attributes": { + "enabled": true, + "host": "example.com", + "port": 25, + "sender": "sample_user@example.com", + "auth": "login", + "username": "sample_user" + } + } +} +``` + +## List Twilio Settings + +`GET /api/v2/admin/twilio-settings` + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | ----------------------------------- | +| [200][] | [JSON API document][] (`type: "twilio-settings"`) | Successfully listed Twilio settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/admin/twilio-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "twilio", + "type": "twilio-settings", + "attributes": { + "enabled": true, + "account-sid": "12345abcd", + "from-number": "555-555-5555" + } + } +} +``` + +## Update Twilio Settings + +`PATCH /api/v2/admin/twilio-settings` + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "twilio-settings"`) | Successfully listed Twilio settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +If `data.attributes.enabled` is set to `true`, all remaining attributes must have valid values. You can omit attributes if they have a default value, or if a value was set by a previous update. Omitted attributes keep their previous values. + +| Key path | Type | Default | Description | +| ----------------------------- | ------ | ------- | ----------------------------------------------------------------------------------- | +| `data.attributes.enabled` | bool | `false` | Allows Twilio to be used. If true, all remaining attributes must have valid values. | +| `data.attributes.account-sid` | string | | The Twilio account id. | +| `data.attributes.auth-token` | string | | The Twilio authentication token. | +| `data.attributes.from-number` | string | | The Twilio registered phone number that will be used to send the message. | + +```json +{ + "data": { + "attributes": { + "enabled": true, + "account-sid": "12345abcd", + "auth-token": "sample_token", + "from-number": "555-555-5555" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/twilio-settings +``` + +### Sample Response + +```json +{ + "data": { + "id": "twilio", + "type": "twilio-settings", + "attributes": { + "enabled": true, + "account-sid": "12345abcd", + "from-number": "555-555-5555" + } + } +} +``` + +## Verify Twilio Settings + +`POST /api/v2/admin/twilio-settings/verify` + +Uses the `test-number` attribute to send a test SMS when Twilio is enabled. + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------- | +| [200][] | none | Twilio test message sent successfully | +| [400][] | [JSON API error object][] | Verification settings invalid (missing test number, Twilio disabled, etc.) | +| [404][] | [JSON API error object][] | User unauthorized to perform action | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ----------------------------- | ------ | ------- | ------------------------------------------------------------------------------------- | +| `data.attributes.test-number` | string | | The target phone number for the test SMS. Not persisted and only used during testing. | + +```json +{ + "data": { + "attributes": { + "test-number": "555-555-0000" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/twilio-settings/verify +``` + +## List Customization Settings + +`GET /api/v2/admin/customization-settings` + +-> This API endpoint is available in Terraform Enterprise as of version 202003-1. + +| Status | Response | Reason | +| ------- | -------------------------------------------------------- | ------------------------------------------ | +| [200][] | [JSON API document][] (`type: "customization-settings"`) | Successfully listed Customization settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/admin/customization-settings +``` + +### Sample Response + +Note that the `support-email-address` attribute in the following example returns `support@hashicorp.com`, which is a not a functional email address. If you need assistance, visit the [HashiCorp support page](https://support.hashicorp.com/hc/en-us) and open a ticket. + +```json +{ + "data": { + "id": "customization", + "type": "customization-settings", + "attributes": { + "support-email-address": "support@hashicorp.com", + "login-help": "", + "footer": "", + "error": "", + "new-user": "" + } + } +} +``` + +## Update Customization Settings + +`PATCH /api/v2/admin/customization-settings` + +| Status | Response | Reason | +| ------- | -------------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "customization-settings"`) | Successfully updated the Customization settings | +| [404][] | [JSON API error object][] | User unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| --------------------------------------- | ------ | ------------------------- | --------------------------------------------------------------------------------------------- | +| `data.attributes.support-email-address` | string | `"support@hashicorp.com"`

Note that this is a non-functional address. If you need assistance, visit the [HashiCorp support page](https://support.hashicorp.com/hc/en-us) and open a ticket.

| The deprecated support address for outgoing emails. | +| `data.attributes.login-help` | string | `""` | The login help text presented to users on the login page. | +| `data.attributes.footer` | string | `""` | Custom footer content that is added to the application. | +| `data.attributes.error` | string | `""` | Error instruction content that is presented to users upon unexpected errors. | +| `data.attributes.new-user` | string | `""` | New user instructions that is presented when the user is not yet attached to an organization. | + +### Sample Payload + +In the following example, the `support-email-address` attribute specifies `support@hashicorp.com`, which is not a functional email address. If you need assistance, visit the [HashiCorp support page](https://support.hashicorp.com/hc/en-us) and open a ticket. + +```json +{ + "data": { + "attributes": { + "support-email-address": "support@hashicorp.com", + "login-help": "
Login Help
", + "footer": "

Custom Footer Content

", + "error": "Custom Error Instructions", + "new-user": "New user? Click Here" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/customization-settings +``` + +### Sample Response + +In the following example, the `support-email-address` attribute specifies `support@hashicorp.com`, which is a not a functional address. If you need assistance, visit the [HashiCorp support page](https://support.hashicorp.com/hc/en-us) and open a ticket. + +```json +{ + "data": { + "id": "customization", + "type": "customization-settings", + "attributes": { + "support-email-address": "support@hashicorp.com", + "login-help": "\u003cdiv\u003eLogin Help\u003c/div\u003e", + "footer": "\u003cp\u003eCustom Footer Content\u003c/p\u003e", + "error": "\u003cem\u003eCustom Error Instructions\u003c/em\u003e", + "new-user": "New user? \u003ca href=\"#\"\u003eClick Here\u003c/a\u003e" + } + } +} +``` + +## Rotate OIDC Signing Key + +`POST /api/v2/admin/oidc-settings/actions/rotate-key` + +This endpoint rotates the OIDC signing key used for signing tokens issued for [dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials). This key automatically rotates every 90 days, hitting this endpoint resets this timer. Hitting this endpoint has _no effect_ on the next trim time. This endpoint should only be used if a leak of the key is suspected. + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------- | +| [204][] | none | Successfully rotated key | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/admin/oidc-settings/actions/rotate-key +``` + +## Trim OIDC Signing Key + +`POST /api/v2/admin/oidc-settings/actions/trim-key` + +This endpoint trims the OIDC signing key used for signing tokens issued for [dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials). This key automatically trims old versions 30 days after the last rotation, hitting this endpoint resets this timer. Hitting this endpoint has _no effect_ on the next rotation time. This endpoint should only be used after rotating the key if a leak of the key is suspected. + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------- | +| [204][] | none | Successfully trimmed key | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/admin/oidc-settings/actions/trim-key +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/terraform-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/terraform-versions.mdx new file mode 100644 index 000000000..d96eeff06 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/terraform-versions.mdx @@ -0,0 +1,363 @@ +--- +page_title: /admin/terraform-versions API reference for Terraform Enterprise +description: >- + Use the `/admin/terraform-versions` endpoint to manage available Terraform versions. Learn how to list, show, create, update, and delete Terraform versions using the HTTP API. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Admin Terraform Versions API + +The `/admin/terraform-versions` API endpoint lets site administrators manage which versions of Terraform are available to use for Terraform operations. + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + + +## List all Terraform versions + +`GET /api/v2/admin/terraform-versions` + +This endpoint lists all known versions of Terraform. + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | -------------------------------------- | +| [200][] | [JSON API document][] (`type: "terraform-versions"`) | Successfully listed Terraform versions | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ----------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `filter[version]` | **Optional.** A query string. This will find an exact Terraform version matching the version queried. This option takes precedence over search queries. | +| `search[version]` | **Optional.** A search query string. This will search for Terraform versions matching the version number queried. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 Terraform versions per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://app.terraform.io/api/v2/admin/terraform-versions" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "terraform-versions", + "attributes": { + "version": "0.11.8", + "url": "https://releases.hashicorp.com/terraform/0.11.8/terraform_0.11.8_linux_amd64.zip", + "sha": "84ccfb8e13b5fce63051294f787885b76a1fedef6bdbecf51c5e586c9e20c9b7", + "deprecated": false, + "deprecated-reason": null, + "official": true, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2018-08-15T22:34:24.561Z" + } + }, + { + "id": "tool-qcbYn12vuRKPgPpy", + "type": "terraform-versions", + "attributes": { + "version": "0.11.7", + "url": "https://releases.hashicorp.com/terraform/0.11.7/terraform_0.11.7_linux_amd64.zip", + "sha": "6b8ce67647a59b2a3f70199c304abca0ddec0e49fd060944c26f666298e23418", + "deprecated": false, + "deprecated-reason": null, + "official": true, + "enabled": true, + "beta": false, + "usage": 2, + "created-at": null + } + } + ], + "links": { + "self": "https://tfe.example.com/api/v2/admin/terraform-versions?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://tfe.example.com/api/v2/admin/terraform-versions?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": "https://tfe.example.com/api/v2/admin/terraform-versions?page%5Bnumber%5D=2&page%5Bsize%5D=20", + "last": "https://tfe.example.com/api/v2/admin/terraform-versions?page%5Bnumber%5D=4&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": 2, + "total-pages": 4, + "total-count": 70 + } + } +} +``` + +## Create a Terraform version + +`POST /api/v2/admin/terraform-versions` + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | ---------------------------------------------- | +| [201][] | [JSON API document][] (`type: "terraform-versions"`) | The Terraform version was successfully created | +| [404][] | [JSON API error object][] | Client is not an administrator | +| [422][] | [JSON API error object][] | Validation errors | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | ------ | ------- | ----------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"terraform-versions"` | +| `data.attributes.version` | string | | A semantic version string in N.N.N or N.N.N-bundleName format (e.g. `"0.11.0"`, `"0.12.20-beta1"`.) | +| `data.attributes.url` | string | | The URL where a ZIP-compressed 64-bit Linux binary of this version can be downloaded | +| `data.attributes.sha` | string | | The SHA-256 checksum of the compressed Terraform binary | +| `data.attributes.deprecated` | bool | `false` | Whether or not this version of Terraform is deprecated | +| `data.attributes.deprecated-reason` | string | `null` | Additional context about why a version of Terraform is deprecated. Field is null unless deprecated is true. | +| `data.attributes.official` | bool | `false` | Whether or not this is an official release of Terraform | +| `data.attributes.enabled` | bool | `true` | Whether or not this version of Terraform is enabled for use in HCP Terraform | +| `data.attributes.beta` | bool | `false` | Whether or not this version of Terraform is a beta pre-release | + +### Sample Payload + +```json +{ + "data": { + "type": "terraform-versions", + "attributes": { + "version": "0.11.8", + "url": "https://releases.hashicorp.com/terraform/0.11.8/terraform_0.11.8_linux_amd64.zip", + "sha": "84ccfb8e13b5fce63051294f787885b76a1fedef6bdbecf51c5e586c9e20c9b7", + "official": true, + "enabled": true, + "beta": false + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/terraform-versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "terraform-versions", + "attributes": { + "version": "0.11.8", + "url": "https://releases.hashicorp.com/terraform/0.11.8/terraform_0.11.8_linux_amd64.zip", + "sha": "84ccfb8e13b5fce63051294f787885b76a1fedef6bdbecf51c5e586c9e20c9b7", + "official": true, + "deprecated": false, + "deprecated-reason": null, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2018-08-15T22:34:24.561Z" + } + } +} +``` + +## Show a Terraform version + +`GET /api/v2/admin/terraform-versions/:id` + +| Parameter | Description | +| --------- | --------------------------------------- | +| `:id` | The ID of the Terraform version to show | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "terraform-versions"`) | The request was successful | +| [404][] | [JSON API error object][] | Terraform version not found, or client is not an administrator | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/admin/terraform-versions/tool-L4oe7rNwn7J4E5Yr +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "terraform-versions", + "attributes": { + "version": "0.11.8", + "url": "https://releases.hashicorp.com/terraform/0.11.8/terraform_0.11.8_linux_amd64.zip", + "sha": "84ccfb8e13b5fce63051294f787885b76a1fedef6bdbecf51c5e586c9e20c9b7", + "official": true, + "deprecated": false, + "deprecated-reason": null, + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2018-08-15T22:34:24.561Z" + } + } +} +``` + +## Update a Terraform version + +`PATCH /api/v2/admin/terraform-versions/:id` + +| Parameter | Description | +| --------- | ----------------------------------------- | +| `:id` | The ID of the Terraform version to update | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "terraform-versions"`) | The Terraform version was successfully updated | +| [404][] | [JSON API error object][] | Terraform version not found, or client is not an administrator | +| [422][] | [JSON API error object][] | Validation errors | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | ------ | ---------------- | --------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"terraform-versions"` | +| `data.attributes.version` | string | (previous value) | A semantic version string in N.N.N or N.N.N-bundleName format (e.g. `"0.11.0"`, `"0.12.20-beta1"`.) | +| `data.attributes.url` | string | (previous value) | The URL where a ZIP-compressed 64-bit Linux binary of this version can be downloaded | +| `data.attributes.sha` | string | (previous value) | The SHA-256 checksum of the compressed Terraform binary | +| `data.attributes.official` | bool | (previous value) | Whether or not this is an official release of Terraform | +| `data.attributes.deprecated` | bool | (previous value) | Whether or not this version of Terraform is deprecated | +| `data.attributes.deprecated-reason` | string | (previous value) | Additional context about why a version of Terraform is deprecated. | +| `data.attributes.enabled` | bool | (previous value) | Whether or not this version of Terraform is enabled for use in HCP Terraform | +| `data.attributes.beta` | bool | (previous value) | Whether or not this version of Terraform is a beta pre-release | + +### Sample Payload + +```json +{ + "data": { + "type": "terraform-versions", + "attributes": { + "deprecated": true, + "deprecated-reason": "A bug was discovered in this version of Terraform. Please upgrade as soon as possible" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/terraform-versions/tool-L4oe7rNwn7J4E5Yr +``` + +### Sample Response + +```json +{ + "data": { + "id": "tool-L4oe7rNwn7J4E5Yr", + "type": "terraform-versions", + "attributes": { + "version": "0.11.8", + "url": "https://releases.hashicorp.com/terraform/0.11.8/terraform_0.11.8_linux_amd64.zip", + "sha": "84ccfb8e13b5fce63051294f787885b76a1fedef6bdbecf51c5e586c9e20c9b7", + "official": true, + "deprecated": true, + "deprecated-reason": "A bug was discovered in this version of Terraform. Please upgrade as soon as possible", + "enabled": true, + "beta": false, + "usage": 0, + "created-at": "2018-08-15T22:34:24.561Z" + } + } +} +``` + +## Delete a Terraform version + +`DELETE /api/v2/admin/terraform-versions/:id` + +This endpoint removes a Terraform version from HCP Terraform. Versions cannot be removed if they are labeled as official versions of Terraform or if there are workspaces using them. + +| Parameter | Description | +| --------- | ----------------------------------------- | +| `:id` | The ID of the Terraform version to delete | + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | Empty response | The Terraform version was successfully deleted | +| [404][] | [JSON API error object][] | Terraform version not found, or client is not an administrator | +| [422][] | [JSON API error object][] | The Terraform version cannot be removed (it is official or is in use) | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/admin/terraform-versions/tool-L4oe7rNwn7J4E5Yr +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/users.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/users.mdx new file mode 100644 index 000000000..f71cc4ab6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/users.mdx @@ -0,0 +1,509 @@ +--- +page_title: /admin/users API reference for Terraform Enterprise +description: >- + Use the `/admin/users` endpoint to manage users. Learn how to list, delete, suspend, re-activate, and impersonate users, grant and revoke administrative privileges, and disable 2FA. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Admin Users API + +The `admin/users` API contains endpoints to help site administrators manage user accounts. + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + +## List all users + +`GET /api/v2/admin/users` + +This endpoint lists all user accounts in the Terraform Enterprise installation. + +| Status | Response | Reason | +| ------- | --------------------------------------- | ------------------------------- | +| [200][] | [JSON API document][] (`type: "users"`) | Successfully listed users | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Query Parameters + +[These are standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ------------------- | ------------------------------------------------------------------------------------------------------- | +| `q` | **Optional.** A search query string. Users are searchable by username and email address. | +| `filter[admin]` | **Optional.** Can be `"true"` or `"false"` to show only administrators or non-administrators. | +| `filter[suspended]` | **Optional.** Can be `"true"` or `"false"` to show only suspended users or users who are not suspended. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 users per page. | + +### Available Related Resources + +This GET endpoint can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| --------------- | ------------------------------------------------------ | +| `organizations` | A list of organizations that each user is a member of. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://app.terraform.io/api/v2/admin/users" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "user-ZL4MsEKnd6iTigTb", + "type": "users", + "attributes": { + "username": "myuser", + "email": "myuser@example.com", + "avatar-url": "https://www.gravatar.com/avatar/3a23b75d5aa41029b88b73f47a0d90db?s=100&d=mm", + "is-admin": true, + "is-suspended": false, + "is-service-account": false + }, + "relationships": { + "organizations": { + "data": [ + { + "id": "my-organization", + "type": "organizations" + } + ] + } + }, + "links": { + "self": "/api/v2/users/myuser" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/admin/users?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/admin/users?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/admin/users?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + }, + "status-counts": { + "total": 1, + "suspended": 0, + "admin": 1 + } + } +} +``` + +## Delete a user account + +`DELETE /admin/users/:id` + +This endpoint deletes a user's account from Terraform Enterprise. To prevent unowned organizations, a user cannot be deleted if they are the sole owner of any organizations. The organizations must be given a new owner or deleted first. + +| Parameter | Description | +| --------- | ----------------------------- | +| `:id` | The ID of the user to delete. | + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------------------------------------------------------------------- | +| [204][] | Empty body | Successfully removed the user account. | +| [404][] | [JSON API error object][] | Client is not an administrator. | +| [422][] | [JSON API error object][] | The user cannot be deleted because they are the sole owner of one or more organizations. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + "https://app.terraform.io/api/v2/admin/users/user-ZL4MsEKnd6iTigTb" +``` + +## Suspend a user + +`POST /admin/users/:id/actions/suspend` + +| Parameter | Description | +| --------- | ------------------------------ | +| `:id` | The ID of the user to suspend. | + +This endpoint suspends a user's account, preventing them from authenticating and accessing resources. + +| Status | Response | Reason | +| ------- | --------------------------------------- | ------------------------------------------ | +| [200][] | [JSON API document][] (`type: "users"`) | Successfully suspended the user's account. | +| [400][] | [JSON API error object][] | User is already suspended. | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + "https://app.terraform.io/api/v2/admin/users/user-ZL4MsEKnd6iTigTb/actions/suspend" +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-ZL4MsEKnd6iTigTb", + "type": "users", + "attributes": { + "username": "myuser", + "email": "myuser@example.com", + "avatar-url": "https://www.gravatar.com/avatar/3a23b75d5aa41029b88b73f47a0d90db?s=100&d=mm", + "is-admin": false, + "is-suspended": true, + "is-service-account": false + }, + "relationships": { + "organizations": { + "data": [ + { + "id": "my-organization", + "type": "organizations" + } + ] + } + }, + "links": { + "self": "/api/v2/users/myuser" + } + } +} +``` + +## Re-activate a suspended user + +`POST /admin/users/:id/actions/unsuspend` + +| Parameter | Description | +| --------- | ---------------------------------- | +| `:id` | The ID of the user to re-activate. | + +This endpoint re-activates a suspended user's account, allowing them to resume authenticating and accessing resources. + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "users"`) | Successfully re-activated the user's account. | +| [400][] | [JSON API error object][] | User is not suspended. | +| [404][] | [JSON API error object][] | User not found, or client is not an administrator. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + "https://app.terraform.io/api/v2/admin/users/user-ZL4MsEKnd6iTigTb/actions/unsuspend" +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-ZL4MsEKnd6iTigTb", + "type": "users", + "attributes": { + "username": "myuser", + "email": "myuser@example.com", + "avatar-url": "https://www.gravatar.com/avatar/3a23b75d5aa41029b88b73f47a0d90db?s=100&d=mm", + "is-admin": false, + "is-suspended": false, + "is-service-account": false + }, + "relationships": { + "organizations": { + "data": [ + { + "id": "my-organization", + "type": "organizations" + } + ] + } + }, + "links": { + "self": "/api/v2/users/myuser" + } + } +} +``` + +## Grant a user administrative privileges + +`POST /admin/users/:id/actions/grant_admin` + +| Parameter | Description | +| --------- | -------------------------------------------- | +| `:id` | The ID of the user to make an administrator. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "users"`) | Successfully made the user an administrator. | +| [400][] | [JSON API error object][] | User is already an administrator. | +| [404][] | [JSON API error object][] | User not found, or client is not an administrator. | +| [422][] | [JSON API error object][] | Validation errors | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + "https://app.terraform.io/api/v2/admin/users/user-ZL4MsEKnd6iTigTb/actions/grant_admin" +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-ZL4MsEKnd6iTigTb", + "type": "users", + "attributes": { + "username": "myuser", + "email": "myuser@example.com", + "avatar-url": "https://www.gravatar.com/avatar/3a23b75d5aa41029b88b73f47a0d90db?s=100&d=mm", + "is-admin": true, + "is-suspended": false, + "is-service-account": false + }, + "relationships": { + "organizations": { + "data": [ + { + "id": "my-organization", + "type": "organizations" + } + ] + } + }, + "links": { + "self": "/api/v2/users/myuser" + } + } +} +``` + +## Revoke an user's administrative privileges + +`POST /admin/users/:id/actions/revoke_admin` + +| Parameter | Description | +| --------- | -------------------------------------- | +| `:id` | The ID of the administrator to demote. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "users"`) | Successfully made the user an administrator. | +| [400][] | [JSON API error object][] | User is not an administrator. | +| [404][] | [JSON API error object][] | User not found, or client is not an administrator. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + "https://app.terraform.io/api/v2/admin/users/user-ZL4MsEKnd6iTigTb/actions/revoke_admin" +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-ZL4MsEKnd6iTigTb", + "type": "users", + "attributes": { + "username": "myuser", + "email": "myuser@example.com", + "avatar-url": "https://www.gravatar.com/avatar/3a23b75d5aa41029b88b73f47a0d90db?s=100&d=mm", + "is-admin": false, + "is-suspended": false, + "is-service-account": false + }, + "relationships": { + "organizations": { + "data": [ + { + "id": "my-organization", + "type": "organizations" + } + ] + } + }, + "links": { + "self": "/api/v2/users/myuser" + } + } +} +``` + +## Disable a user's two-factor authentication + +`POST /admin/users/:id/actions/disable_two_factor` + +| Parameter | Description | +| --------- | -------------------------------------- | +| `:id` | The ID of the user to disable 2FA for. | + +This endpoint disables a user's two-factor authentication in the situation where they have lost access to their device and recovery codes. Before disabling a user's two-factor authentication, completing a security verification process is recommended to ensure the request is legitimate. + +| Status | Response | Reason | +| ------- | --------------------------------------- | ----------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "users"`) | Successfully disabled the user's two-factor authentication. | +| [400][] | [JSON API error object][] | User does not have two-factor authentication enabled. | +| [404][] | [JSON API error object][] | User not found, or client is not an administrator. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + "https://app.terraform.io/api/v2/admin/users/user-ZL4MsEKnd6iTigTb/actions/disable_two_factor" +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-ZL4MsEKnd6iTigTb", + "type": "users", + "attributes": { + "username": "myuser", + "email": "myuser@example.com", + "avatar-url": "https://www.gravatar.com/avatar/3a23b75d5aa41029b88b73f47a0d90db?s=100&d=mm", + "is-admin": false, + "is-suspended": false, + "is-service-account": false + }, + "relationships": { + "organizations": { + "data": [ + { + "id": "my-organization", + "type": "organizations" + } + ] + } + }, + "links": { + "self": "/api/v2/users/myuser" + } + } +} +``` + +## Impersonate another user + +`POST /admin/users/:id/actions/impersonate` + +| Parameter | Description | +| --------- | ---------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the user to impersonate. It is not possible to impersonate service accounts or your own account. | + +[impersonate-ui]: /terraform/enterprise/application-administration/resources#impersonating-a-user + +Impersonation allows an admin to begin a new session as another user in the system; for more information, see [Impersonating a User][impersonate-ui] in the Terraform Enterprise administration section. + +-> **Note:** Impersonation is [intended as a UI feature][impersonate-ui], and this endpoint exists to support that UI. + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------- | +| [204][] | Empty body | Successfully impersonated the user. | +| [400][] | [JSON API error object][] | A reason for impersonation is required. | +| [403][] | [JSON API error object][] | Client is already impersonating another user. | +| [403][] | [JSON API error object][] | User cannot be impersonated. | +| [404][] | [JSON API error object][] | User not found, or client is not an administrator. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| -------- | ------ | ------- | -------------------------------------------------------------------- | +| `reason` | string | | A reason for impersonation, which will be recorded in the Audit Log. | + +### Sample Payload + +```json +{ + "reason": "Reason for impersonation" +} +``` + +### Sample Request + +```shell +curl \ + --header "Cookie: $COOKIE" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/admin/users/user-ZL4MsEKnd6iTigTb/actions/impersonate +``` + +## End an impersonation session + +`POST /admin/users/actions/unimpersonate` + +When an admin has used the above endpoint to begin an impersonation session, they can make a request to this endpoint, using the cookie provided originally, in order to end that session and log out as the impersonated user. + +This endpoint does not respond with a body, but the response does include a `Set-Cookie` header to persist a new session as the original admin user. As such, this endpoint will have no effect unless the client is able to persist and use cookies. + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------------------------- | +| [204][] | Empty body | Successfully ended the impersonation session. | +| [400][] | [JSON API error object][] | Client is not in an impersonation session. | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Sample Request + +```shell +curl \ + --header "Cookie: $COOKIE" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/admin/users/actions/unimpersonate +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/workspaces.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/workspaces.mdx new file mode 100644 index 000000000..d93bd702c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/admin/workspaces.mdx @@ -0,0 +1,252 @@ +--- +page_title: /admin/workspaces API reference for Terraform Enterprise +description: >- + Use the `/admin/workspaces` endpoint to manage workspaces. Learn how to list, show, and destroy workspaces using the HTTP API. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Admin Workspaces API + +The `admin/workspaces` API contains endpoints to help site administrators manage workspaces. + +-> **Terraform Enterprise Only:** The admin API is exclusive to Terraform Enterprise, and can only be used by the admins and operators who install and maintain their organization's Terraform Enterprise instance. + +## List all workspaces + +`GET /api/v2/admin/workspaces` + +This endpoint lists all workspaces in the Terraform Enterprise installation. + +| Status | Response | Reason | +| ------- | -------------------------------------------- | ------------------------------- | +| [200][] | [JSON API document][] (`type: "workspaces"`) | Successfully listed workspaces | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Query Parameters + +[These are standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ----------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `q` | **Optional.** A search query string. Workspaces are searchable by name and organization name. | +| `filter[current_run][status]` | **Optional.** A comma-separated list of Run statuses to restrict results to, which can include any of the following: `"pending"`, `"plan_queued"`, `"planning"`, `"planned"`, `"confirmed"`, `"apply_queued"`, `"applying"`, `"applied"`, `"discarded"`, `"errored"`, `"canceled"`, `"cost_estimating"`, `"cost_estimated"`, `"policy_checking"`, `"policy_override"`, `"policy_soft_failed"`, `"policy_checked"`, and `"planned_and_finished"`. | +| `sort` | **Optional.** Allows sorting the organization's workspaces by a provided value. You can sort by `"name"`, `"current-run.created-at"` (the time of the current run), and `"latest-change-at"` (the creation time of the latest state version or the workspace itself if no state version exists). Prepending a hyphen to the sort parameter reverses the order. For example, `"-name"` sorts by name in reverse alphabetical order. If omitted, the default sort order is arbitrary but stable.| +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 workspaces per page. | + +### Available Related Resources + +This GET endpoint can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| --------------------- | -------------------------------------------------------------- | +| `organization` | The organization for each returned workspace. | +| `organization.owners` | A list of owners for each workspace's associated organization. | +| `current_run` | The current run for each returned workspace. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://app.terraform.io/api/v2/admin/workspaces" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "ws-2HRvNs49EWPjDqT1", + "type": "workspaces", + "attributes": { + "name": "my-workspace", + "locked": false, + "vcs-repo": { + "identifier": "my-organization/my-repository" + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + }, + "current-run": { + "data": { + "id": "run-jm8ekSaW3F52FACN", + "type": "runs" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + ], + "links": { + "self": "http://localhost:3000/api/v2/admin/workspaces?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "http://localhost:3000/api/v2/admin/workspaces?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "http://localhost:3000/api/v2/admin/workspaces?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 0, + "total-count": 1 + }, + "status-counts": { + "pending": 1, + "planning": 0, + "planned": 0, + "confirmed": 0, + "applying": 0, + "applied": 0, + "discarded": 0, + "errored": 0, + "canceled": 0, + "policy-checking": 0, + "policy-override": 0, + "policy-checked": 0, + "none": 0, + "total": 1, + } + } +} +``` + +## Show a workspace + +`GET /api/v2/admin/workspaces/:id` + +This endpoint returns the workspace with the specified `workspace_id`. + +| Status | Response | Reason | +| ------- | -------------------------------------------- | ------------------------------- | +| [200][] | [JSON API document][] (`type: "workspaces"`) | Successfully listed workspaces | +| [404][] | [JSON API error object][] | Client is not an administrator. | + +### Query Parameters + +| Parameter | Description | +| --------------- | ---------------- | +| `:workspace_id` | The workspace ID | + +### Available Related Resources + +This GET endpoint can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| --------------------- | -------------------------------------------------------------- | +| `organization` | The organization for each returned workspace. | +| `organization.owners` | A list of owners for each workspace's associated organization. | +| `current_run` | The current run for each returned workspace. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://app.terraform.io/api/v2/admin/workspaces/ws-2HRvNs49EWPjDqT1" +``` + +### Sample Response + +```json +{ + "data": { + "id": "ws-2HRvNs49EWPjDqT1", + "type": "workspaces", + "attributes": { + "name": "my-workspace", + "locked": false, + "vcs-repo": { + "identifier": "my-organization/my-repository" + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + }, + "current-run": { + "data": { + "id": "run-jm8ekSaW3F52FACN", + "type": "runs" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } +} +``` + +## Destroy a workspace + +`DELETE /admin/workspaces/:id` + +| Parameter | Description | +| --------------- | ---------------- | +| `:workspace_id` | The workspace ID | + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------------------------------------- | +| [204][] | | The workspace was successfully destroyed | +| [404][] | [JSON API error object][] | Workspace not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/admin/workspaces/ws-2HRvNs49EWPjDqT1 +``` + +### Sample Response + +The response body will be empty if successful. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/agent-tokens.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/agent-tokens.mdx new file mode 100644 index 000000000..e1d27c139 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/agent-tokens.mdx @@ -0,0 +1,272 @@ +--- +page_title: /authentication-tokens API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/authentication-tokens` endpoint to manage + agent tokens. Learn how to read, create, and destroy agent tokens. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Agent token API reference + + + +@include 'tfc-package-callouts/agents.mdx' + + + +## List Agent Tokens + +`GET /agent-pools/:agent_pool_id/authentication-tokens` + +| Parameter | Description | +| ---------------- | ------------------------- | +| `:agent_pool_id` | The ID of the Agent Pool. | + +The objects returned by this endpoint only contain metadata, and do not include the secret text of any authentication tokens. A token is only shown upon creation, and cannot be recovered later. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "authentication-tokens"`) | Success | +| [404][] | [JSON API error object][] | Agent Pool not found, or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ---------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 tokens per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/agent-pools/apool-MCf6kkxu5FyHbqhd/authentication-tokens +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "at-bonpPzYqv2bGD7vr", + "type": "authentication-tokens", + "attributes": { + "created-at": "2020-08-07T19:38:20.868Z", + "last-used-at": "2020-08-07T19:40:55.139Z", + "description": "asdfsdf", + "token": null + }, + "relationships": { + "created-by": { + "data": { + "id": "user-Nxv6svuhVrTW7eb1", + "type": "users" + } + } + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/agent-pools/apool-MCf6kkxu5FyHbqhd/authentication-tokens?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/agent-pools/apool-MCf6kkxu5FyHbqhd/authentication-tokens?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/agent-pools/apool-MCf6kkxu5FyHbqhd/authentication-tokens?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } +} +``` + +## Show an Agent Token + +`GET /authentication-tokens/:id` + +| Parameter | Description | +| --------- | --------------------------------- | +| `:id` | The ID of the Agent Token to show | + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "authentication-tokens"`) | Success | +| [404][] | [JSON API error object][] | Agent Token not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/authentication-tokens/at-bonpPzYqv2bGD7vr +``` + +### Sample Response + +```json +{ + "data": { + "id": "at-bonpPzYqv2bGD7vr", + "type": "authentication-tokens", + "attributes": { + "created-at": "2020-08-07T19:38:20.868Z", + "last-used-at": "2020-08-07T19:40:55.139Z", + "description": "test token", + "token": null + }, + "relationships": { + "created-by": { + "data": { + "id": "user-Nxv6svuhVrTW7eb1", + "type": "users" + } + } + } + } +} +``` + +## Create an Agent Token + +`POST /agent-pools/:agent_pool_id/authentication-tokens` + +| Parameter | Description | +| ---------------- | ------------------------ | +| `:agent_pool_id` | The ID of the Agent Pool | + +This endpoint returns the secret text of the created authentication token. A token is only shown upon creation, and cannot be recovered later. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "authentication-tokens"`) | The request was successful | +| [404][] | [JSON API error object][] | Agent Pool not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [500][] | [JSON API error object][] | Failure during Agent Token creation | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------- | ------ | ------- | ------------------------------------ | +| `data.type` | string | | Must be `"authentication-tokens"`. | +| `data.attributes.description` | string | | The description for the Agent Token. | + +### Sample Payload + +```json +{ + "data": { + "type": "authentication-tokens", + "attributes": { + "description":"api" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/agent-pools/apool-xkuMi7x4LsEnBUdY/authentication-tokens +``` + +### Sample Response + +```json +{ + "data": { + "id": "at-2rG2oYU9JEvfaqji", + "type": "authentication-tokens", + "attributes": { + "created-at": "2020-08-10T22:29:21.907Z", + "last-used-at": null, + "description": "api", + "token": "eHub7TsW7fz7LQ.atlasv1.cHGFcvf2VxVfUH4PZ7UNdaGB6SjyKWs5phdZ371zkI2KniZs2qKgrAcazhlsiy02awk" + }, + "relationships": { + "created-by": { + "data": { + "id": "user-Nxv6svuhVrTW7eb1", + "type": "users" + } + } + } + } +} +``` + +## Destroy an Agent Token + +`DELETE /api/v2/authentication-tokens/:id` + +| Parameter | Description | +| --------- | ------------------------------------- | +| `:id` | The ID of the Agent Token to destroy. | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------- | +| [204][] | Empty response | The Agent Token was successfully destroyed | +| [404][] | [JSON API error object][] | Agent Token not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/authentication-tokens/at-6yEmxNAhaoQLH1Da +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/agents.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/agents.mdx new file mode 100644 index 000000000..58acfa2aa --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/agents.mdx @@ -0,0 +1,637 @@ +--- +page_title: /agents and /agent-pools API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/agents` endpoint to read and delete + agents. Use the `/agent-pools` endpoint to read, create, update, and delete + agent pools. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Agents and agent pools API reference + +An Agent Pool represents a group of Agents, often related to one another by sharing a common network segment or purpose. +A workspace may be configured to use one of the organization's agent pools to run remote operations with isolated, +private, or on-premises infrastructure. + + + +@include 'tfc-package-callouts/agents.mdx' + + + +## List Agent Pools + +`GET /organizations/:organization_name/agent-pools` + +| Parameter | Description | +| -------------------- | ----------------------------- | +| `:organization_name` | The name of the organization. | + +This endpoint allows you to list agent pools, their agents, and their tokens for an organization. + +| Status | Response | Reason | +| ------- | --------------------------------------------- | ---------------------- | +| [200][] | [JSON API document][] (`type: "agent-pools"`) | Success | +| [404][] | [JSON API error object][] | Organization not found | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | | +| ---------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | - | +| `q` | **Optional.** A search query string. Agent pools are searchable by name. | | +| `sort` | **Optional.** Allows sorting the returned agents pools. Valid values are `"name"` and `"created-at"`. Prepending a hyphen to the sort parameter will reverse the order (e.g. `"-name"`). | | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 agent pools per page. | | +| `filter[allowed_workspaces][name]` | **Optional.** Filters agent pools to those associated with the given workspace. The workspace must have permission to use the agent pool. Refer to [Scoping Agent Pools to Specific Workspaces](/terraform/cloud-docs/agents#scope-an-agent-pool-to-specific-workspaces). | | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/organizations/my-organization/agent-pools +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "apool-yoGUFz5zcRMMz53i", + "type": "agent-pools", + "attributes": { + "name": "example-pool", + "created-at": "2020-08-05T18:10:26.964Z", + "organization-scoped": false, + "agent-count": 3 + }, + "relationships": { + "agents": { + "links": { + "related": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/agents" + } + }, + "authentication-tokens": { + "links": { + "related": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/authentication-tokens" + } + }, + "workspaces": { + "data": [ + { + "id": "ws-9EEkcEQSA3XgWyGe", + "type": "workspaces" + } + ] + }, + "allowed-workspaces": { + "data": [ + { + "id": "ws-x9taqV23mxrGcDrn", + "type": "workspaces" + } + ] + } + }, + "links": { + "self": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/my-organization/agent-pools?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/my-organization/agent-pools?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/my-organization/agent-pools?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + }, + "status-counts": { + "total": 1, + "matching": 1 + } + } +} +``` + +## List Agents + +`GET /agent-pools/:agent_pool_id/agents` + +| Parameter | Description | +| ---------------- | --------------------------------- | +| `:agent_pool_id` | The ID of the Agent Pool to list. | + +| Status | Response | Reason | +| ------- | ---------------------------------------- | ------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "agents"`) | Success | +| [404][] | [JSON API error object][] | Agent Pool not found, or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ------------------------- | ---------------------------------------------------------------------------- | +| `filter[last-ping-since]` | **Optional.** Accepts a date in ISO8601 format (ex. `2020-08-11T10:41:23Z`). | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 agents per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/agent-pools/apool-xkuMi7x4LsEnBUdY/agents +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "agent-A726QeosTCpCumAs", + "type": "agents", + "attributes": { + "name": "my-cool-agent", + "status": "idle", + "ip-address": "123.123.123.123", + "last-ping-at": "2020-10-09T18:52:25.246Z" + }, + "links": { + "self": "/api/v2/agents/agent-A726QeosTCpCumAs" + } + }, + { + "id": "agent-4cQzjbr1cnM6Pcxr", + "type": "agents", + "attributes": { + "name": "my-other-cool-agent", + "status": "exited", + "ip-address": "123.123.123.123", + "last-ping-at": "2020-08-12T15:25:09.726Z" + }, + "links": { + "self": "/api/v2/agents/agent-4cQzjbr1cnM6Pcxr" + } + }, + { + "id": "agent-yEJjXQCucpNxtxd2", + "type": "agents", + "attributes": { + "name": null, + "status": "errored", + "ip-address": "123.123.123.123", + "last-ping-at": "2020-08-11T06:22:20.300Z" + }, + "links": { + "self": "/api/v2/agents/agent-yEJjXQCucpNxtxd2" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/agents?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/agents?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/agents?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 3 + } + } +} +``` + +## Show an Agent Pool + +`GET /agent-pools/:id` + +| Parameter | Description | +| --------- | -------------------------------- | +| `:id` | The ID of the Agent Pool to show | + +| Status | Response | Reason | +| ------- | --------------------------------------------- | ------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "agent-pools"`) | Success | +| [404][] | [JSON API error object][] | Agent Pool not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/agent-pools/apool-MCf6kkxu5FyHbqhd +``` + +### Sample Response + +```json +{ + "data": { + "id": "apool-yoGUFz5zcRMMz53i", + "type": "agent-pools", + "attributes": { + "name": "example-pool", + "created-at": "2020-08-05T18:10:26.964Z", + "organization-scoped": false + }, + "relationships": { + "agents": { + "links": { + "related": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/agents" + } + }, + "authentication-tokens": { + "links": { + "related": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/authentication-tokens" + } + }, + "workspaces": { + "data": [ + { + "id": "ws-9EEkcEQSA3XgWyGe", + "type": "workspaces" + } + ] + }, + "allowed-workspaces": { + "data": [ + { + "id": "ws-x9taqV23mxrGcDrn", + "type": "workspaces" + } + ] + } + }, + "links": { + "self": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i" + } + } +} +``` + +## Show an Agent + +`GET /agents/:id` + +| Parameter | Description | +| --------- | --------------------------- | +| `:id` | The ID of the agent to show | + +| Status | Response | Reason | +| ------- | ---------------------------------------- | ------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "agents"`) | Success | +| [404][] | [JSON API error object][] | Agent not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/agents/agent-73PJNzbZB5idR7AQ +``` + +### Sample Response + +```json +{ + "data": { + "id": "agent-Zz9PTEcUgBtYzht8", + "type": "agents", + "attributes": { + "name": "my-agent", + "status": "busy", + "ip-address": "123.123.123.123", + "last-ping-at": "2020-09-08T18:47:35.361Z" + }, + "links": { + "self": "/api/v2/agents/agent-Zz9PTEcUgBtYzht8" + } + } +} +``` + +This endpoint lists details about an agent along with that agent's status. [Learn more about agents statuses](/terraform/cloud-docs/agents/agent-pools#view-agent-statuses). + +## Delete an Agent + +`DELETE /agents/:id` + +| Parameter | Description | +| --------- | ----------------------------- | +| `:id` | The ID of the agent to delete | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------------------------------------------------------ | +| [204][] | No Content | Success | +| [412][] | [JSON API error object][] | Agent is not deletable. Agents must have a status of `unknown`, `errored`, or `exited` before being deleted. | +| [404][] | [JSON API error object][] | Agent not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --request DELETE \ + https://app.terraform.io/api/v2/agents/agent-73PJNzbZB5idR7AQ +``` + +## Create an Agent Pool + +`POST /organizations/:organization_name/agent-pools` + +| Parameter | Description | +| -------------------- | ----------------------------- | +| `:organization_name` | The name of the organization. | + +This endpoint allows you to create an Agent Pool for an organization. Only one Agent Pool may exist for an organization. + +| Status | Response | Reason | +| ------- | --------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "agent-pools"`) | Agent Pool successfully created | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------- | ------ | ------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"agent-pools"`. | +| `data.attributes.name` | string | | The name of the agent pool, which can only include letters, numbers, `-`, and `_`. This will be used as an identifier and must be unique in the organization. | +| `data.attributes.organization-scoped` | bool | true | The scope of the agent pool. If true, all workspaces in the organization can use the agent pool. | +| `data.relationships.allowed-workspaces.data.type` | string | | Must be `"workspaces"`. | +| `data.relationships.allowed-workspaces.data.id` | string | | The ID of the workspace that has permission to use the agent pool. Refer to [Scoping Agent Pools to Specific Workspaces](/terraform/cloud-docs/agents#scope-an-agent-pool-to-specific-workspaces). | + +### Sample Payload + +```json +{ + "data": { + "type": "agent-pools", + "attributes": { + "name": "my-pool", + "organization-scoped": false + }, + "relationships": { + "allowed-workspaces": { + "data": [ + { + "id": "ws-x9taqV23mxrGcDrn", + "type": "workspaces" + } + ] + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/agent-pools +``` + +### Sample Response + +```json +{ + "data": { + "id": "apool-55jZekR57npjHHYQ", + "type": "agent-pools", + "attributes": { + "name": "my-pool", + "created-at": "2020-10-13T16:32:45.165Z", + "organization-scoped": false, + + }, + "relationships": { + "agents": { + "links": { + "related": "/api/v2/agent-pools/apool-55jZekR57npjHHYQ/agents" + } + }, + "authentication-tokens": { + "links": { + "related": "/api/v2/agent-pools/apool-55jZekR57npjHHYQ/authentication-tokens" + } + }, + "workspaces": { + "data": [] + }, + "allowed-workspaces": { + "data": [ + { + "id": "ws-x9taqV23mxrGcDrn", + "type": "workspaces" + } + ] + } + }, + "links": { + "self": "/api/v2/agent-pools/apool-55jZekR57npjHHYQ" + } + } +} +``` + +## Update an Agent Pool + +`PATCH /agent-pools/:id` + +| Parameter | Description | +| --------- | ---------------------------------- | +| `:id` | The ID of the Agent Pool to update | + +| Status | Response | Reason | +| ------- | --------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "agent-pools"`) | Success | +| [404][] | [JSON API error object][] | Agent Pool not found, or user unauthorized to perform action | +| [422][] | JSON error document | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------- | ------ | ---------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"agent-pools"`. | +| `data.attributes.name` | string | (previous value) | The name of the agent pool, which can only include letters, numbers, `-`, and `_`. This will be used as an identifier and must be unique in the organization. | +| `data.attributes.organization-scoped` | bool | true | The scope of the agent pool. If true, all workspaces in the organization can use the agent pool. | +| `data.relationships.allowed-workspaces.data.type` | string | | Must be `"workspaces"`. | +| `data.relationships.allowed-workspaces.data.id` | string | | The ID of the workspace that has permission to use the agent pool. Refer to [Scoping Agent Pools to Specific Workspaces](/terraform/cloud-docs/agents#scope-an-agent-pool-to-specific-workspaces). | + +### Sample Payload + +```json +{ + "data": { + "type": "agent-pools", + "attributes": { + "name": "example-pool", + "organization-scoped": false + }, + "relationships": { + "allowed-workspaces": { + "data": [ + { + "id": "ws-x9taqV23mxrGcDrn", + "type": "workspaces" + } + ] + } + } + } +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/agent-pools/apool-MCf6kkxu5FyHbqhd +``` + +### Sample Response + +```json +{ + "data": { + "id": "apool-yoGUFz5zcRMMz53i", + "type": "agent-pools", + "attributes": { + "name": "example-pool", + "created-at": "2020-08-05T18:10:26.964Z" + }, + "relationships": { + "agents": { + "links": { + "related": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/agents" + } + }, + "authentication-tokens": { + "links": { + "related": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i/authentication-tokens" + } + }, + "workspaces": { + "data": [ + { + "id": "ws-9EEkcEQSA3XgWyGe", + "type": "workspaces" + } + ] + }, + "allowed-workspaces": { + "data": [ + { + "id": "ws-x9taqV23mxrGcDrn", + "type": "workspaces" + } + ] + } + }, + "links": { + "self": "/api/v2/agent-pools/apool-yoGUFz5zcRMMz53i" + } + } +} +``` + +## Delete an Agent Pool + +`DELETE /agent-pools/:agent_pool_id` + +| Parameter | Description | +| ---------------- | ------------------------------------- | +| `:agent_pool_id` | The ID of the agent pool ID to delete | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/agent-pools/apool-MCf6kkxu5FyHbqhd +``` + +### Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ------------- | ------------------------------------------- | +| `workspaces` | The workspaces attached to this agent pool. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/applies.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/applies.mdx new file mode 100644 index 000000000..a124bf588 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/applies.mdx @@ -0,0 +1,201 @@ +--- +page_title: /applies API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/applies` endpoint to read the results of + a Terraform apply and to recover any failed state uploads after applying. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[307]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/307 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Applies API reference + +An apply represents the results of applying a Terraform Run's execution plan. + +## Attributes + +### Apply States + +You'll find the apply state in `data.attributes.status`, as one of the following values. + +| State | Description | +| ------------------------- | ------------------------------------------------------------------------------ | +| `pending` | The initial status of a apply once it has been created. | +| `managed_queued`/`queued` | The apply has been queued, awaiting backend service capacity to run terraform. | +| `running` | The apply is running. | +| `errored` | The apply has errored. This is a final state. | +| `canceled` | The apply has been canceled. This is a final state. | +| `finished` | The apply has completed successfully. This is a final state. | +| `unreachable` | The apply will not run. This is a final state. | + +## Show an apply + +`GET /applies/:id` + +| Parameter | Description | +| --------- | ---------------------------- | +| `id` | The ID of the apply to show. | + +There is no endpoint to list applies. You can find the ID for an apply in the +`relationships.apply` property of a run object. + +| Status | Response | Reason | +| ------- | ----------------------------------------- | ------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "applies"`) | The request was successful | +| [404][] | [JSON API error object][] | Apply not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/applies/apply-47MBvjwzBG8YKc2v +``` + +### Sample Response + +```json +{ + "data": { + "id": "apply-47MBvjwzBG8YKc2v", + "type": "applies", + "attributes": { + "execution-details": { + "mode": "remote", + }, + "status": "finished", + "status-timestamps": { + "queued-at": "2018-10-17T18:58:27+00:00", + "started-at": "2018-10-17T18:58:29+00:00", + "finished-at": "2018-10-17T18:58:37+00:00" + }, + "log-read-url": "https://archivist.terraform.io/v1/object/dmF1bHQ6djE6OFA1eEdlSFVHRSs4YUcwaW83a1dRRDA0U2E3T3FiWk1HM2NyQlNtcS9JS1hHN3dmTXJmaFhEYTlHdTF1ZlgxZ2wzVC9kVTlNcjRPOEJkK050VFI3U3dvS2ZuaUhFSGpVenJVUFYzSFVZQ1VZYno3T3UyYjdDRVRPRE5pbWJDVTIrNllQTENyTndYd1Y0ak1DL1dPVlN1VlNxKzYzbWlIcnJPa2dRRkJZZGtFeTNiaU84YlZ4QWs2QzlLY3VJb3lmWlIrajF4a1hYZTlsWnFYemRkL2pNOG9Zc0ZDakdVMCtURUE3dDNMODRsRnY4cWl1dUN5dUVuUzdnZzFwL3BNeHlwbXNXZWRrUDhXdzhGNnF4c3dqaXlZS29oL3FKakI5dm9uYU5ZKzAybnloREdnQ3J2Rk5WMlBJemZQTg", + "resource-additions": 1, + "resource-changes": 0, + "resource-destructions": 0, + "resource-imports": 0 + }, + "relationships": { + "state-versions": { + "data": [ + { + "id": "sv-TpnsuD3iewwsfeRD", + "type": "state-versions" + }, + { + "id": "sv-Fu1n6a3TgJ1Typq9", + "type": "state-versions" + } + ] + } + }, + "links": { + "self": "/api/v2/applies/apply-47MBvjwzBG8YKc2v" + } + } +} +``` + +_Using HCP Terraform agents_ + +[HCP Terraform agents](/terraform/enterprise/api-docs/agents) allow HCP Terraform to communicate with isolated, private, or on-premises infrastructure. When a workspace is set to use the agent execution mode, the apply response will include additional details about the agent pool and agent used. + +```json +{ + "data": { + "id": "apply-47MBvjwzBG8YKc2v", + "type": "applies", + "attributes": { + "execution-details": { + "agent-id": "agent-S1Y7tcKxXPJDQAvq", + "agent-name": "agent_01", + "agent-pool-id": "apool-Zigq2VGreKq7nwph", + "agent-pool-name": "first-pool", + "mode": "agent", + }, + "status": "finished", + "status-timestamps": { + "queued-at": "2018-10-17T18:58:27+00:00", + "started-at": "2018-10-17T18:58:29+00:00", + "finished-at": "2018-10-17T18:58:37+00:00" + }, + "log-read-url": "https://archivist.terraform.io/v1/object/dmF1bHQ6djE6OFA1eEdlSFVHRSs4YUcwaW83a1dRRDA0U2E3T3FiWk1HM2NyQlNtcS9JS1hHN3dmTXJmaFhEYTlHdTF1ZlgxZ2wzVC9kVTlNcjRPOEJkK050VFI3U3dvS2ZuaUhFSGpVenJVUFYzSFVZQ1VZYno3T3UyYjdDRVRPRE5pbWJDVTIrNllQTENyTndYd1Y0ak1DL1dPVlN1VlNxKzYzbWlIcnJPa2dRRkJZZGtFeTNiaU84YlZ4QWs2QzlLY3VJb3lmWlIrajF4a1hYZTlsWnFYemRkL2pNOG9Zc0ZDakdVMCtURUE3dDNMODRsRnY4cWl1dUN5dUVuUzdnZzFwL3BNeHlwbXNXZWRrUDhXdzhGNnF4c3dqaXlZS29oL3FKakI5dm9uYU5ZKzAybnloREdnQ3J2Rk5WMlBJemZQTg", + "resource-additions": 1, + "resource-changes": 0, + "resource-destructions": 0, + "resource-imports": 0 + }, + "relationships": { + "state-versions": { + "data": [ + { + "id": "sv-TpnsuD3iewwsfeRD", + "type": "state-versions" + }, + { + "id": "sv-Fu1n6a3TgJ1Typq9", + "type": "state-versions" + } + ] + } + }, + "links": { + "self": "/api/v2/applies/apply-47MBvjwzBG8YKc2v" + } + } +} +``` + +## Recover a failed state upload after applying + +`GET /applies/:id/errored-state` + +| Parameter | Description | +| --------- | ----------------------------------------- | +| `id` | The ID of the apply to recover state for. | + +It is possible that during the course of a Run, Terraform may fail to upload a +state file. This can happen for a variety of reasons, but should be an +exceptionally rare occurrence. HCP Terraform agent versions greater than 1.12.0 +include a fallback mechanism which attempts to upload the state directly to +HCP Terraform's backend storage system in these cases. This endpoint then +makes the raw data from these failed uploads available to users who are +authorized to read the state contents. + +| Status | Response | Reason | +| ------- | -------------------------------------------- | ----------------------------------------------------------------------------------- | +| [307][] | HTTP temporary redirect to state storage URL | Errored state available and user is authorized to read it | +| [404][] | [JSON API error object][] | Apply not found, errored state not uploaded, or user unauthorized to perform action | + +When a 307 redirect is returned, the storage URL to the raw state file will be +present in the `Location` header of the response. The URL in the `Location` +header will expire after one minute. It is recommended for the API client to +follow the redirect immediately. Each successful request to the errored-state +endpoint will generate a new, unique storage URL with the same one minute +expiration window. + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/applies/apply-47MBvjwzBG8YKc2v/errored-state +``` + +### Sample Response + + HTTP/1.1 307 Temporary Redirect + Content-Length: 22 + Content-Type: text/plain + Location: https://archivist.terraform.io/v1/object/dmF1bHQ6djE6OFA1eEdlSFVHRSs4YUcwaW83a1dRRDA0U2E3T3FiWk1HM2NyQlNtcS9JS1hHN3dmTXJmaFhEYTlHdTF1ZlgxZ2wzVC9kVTlNcjRPOEJkK050VFI3U3dvS2ZuaUhFSGpVenJVUFYzSFVZQ1VZYno3T3UyYjdDRVRPRE5pbWJDVTIrNllQTENyTndYd1Y0ak1DL1dPVlN1VlNxKzYzbWlIcnJPa2dRRkJZZGtFeTNiaU84YlZ4QWs2QzlLY3VJb3lmWlIrajF4a1hYZTlsWnFYemRkL2pNOG9Zc0ZDakdVMCtURUE3dDNMODRsRnY4cWl1dUN5dUVuUzdnZzFwL3BNeHlwbXNXZWRrUDhXdzhGNnF4c3dqaXlZS29oL3FKakI5dm9uYU5ZKzAybnloREdnQ3J2Rk5WMlBJemZQTg + + 307 Temporary Redirect diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/assessment-results.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/assessment-results.mdx new file mode 100644 index 000000000..6ce07a2ed --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/assessment-results.mdx @@ -0,0 +1,129 @@ +--- +page_title: /assessment-results API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/assessment-results` endpoint to read a + health assessment's results, including details on continuous validation and + drift detection. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +# Health assessment results API reference + +An Assessment Result is the summary record of an instance of health assessment. HCP Terraform can perform automatic health assessments in a workspace to assess whether its real infrastructure matches the requirements defined in its Terraform configuration. Refer to [Health](/terraform/enterprise/workspaces/health) for more details. + + + +@include 'tfc-package-callouts/health-assessments.mdx' + + + +## Show Assessment Result + +Any user with read access to a workspace can retrieve assessment results for the workspace. + +`GET api/v2/assessment-results/:assessment_result_id` + +| Parameter | Description | +| ----------------------- | ------------------------ | +| `:assessment_result_id` | The assessment result ID | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/assessment-results/asmtres-cHh5777xm +``` + +### Sample Response + +```json +{ + "id": "asmtres-UG5rE9L1373hMYMA", + "type": "assessment-results", + "data": { + "attributes": { + "drifted": true, + "succeeded": true, + "error-msg": null, + "created-at": "2022-07-02T22:29:58+00:00", + }, + "links": { + "self": "/api/v2/assessment-results/asmtres-UG5rE9L1373hMYMA/" + "json-output": "/api/v2/assessment-results/asmtres-UG5rE9L1373hMYMA/json-output" + "json-schema": "/api/v2/assessment-results/asmtres-UG5rE9L1373hMYMA/json-schema" + "log-output": "/api/v2/assessment-results/asmtres-UG5rE9L1373hMYMA/log-output" + } + } +} +``` + +## Retrieve the JSON output from the assessment execution + +The following endpoints retrieve files documenting the plan, schema, and logged runtime associated with the specified assessment result. They provide complete context for an assessment result. The responses do not adhere to JSON API spec. + +You cannot access these endpoints with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access them with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens) that has admin level access to the workspace. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for details. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### JSON Plan + +The following endpoint returns the JSON plan output associated with the assessment result. + +`GET api/v2/assessment-results/:assessment_result_id/json-output` + +#### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/assessment-results/asmtres-cHh5777xm/json-output +``` + +### JSON Schema file + +The following endpoint returns the JSON [provider schema](/terraform/cli/commands/providers/schema) associated with the assessment result. + +`GET api/v2/assessment-results/:assessment_result_id/json-schema` + +#### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/assessment-results/asmtres-cHh5777xm/json-schema +``` + +### JSON Log Output + +The following endpoint returns Terraform JSON log output. + +`GET api/v2/assessment-results/assessment_result_id/log-output` + +#### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/assessment-results/asmtres-cHh5777xm/log-output +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/changelog.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/changelog.mdx new file mode 100644 index 000000000..3fec8bba9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/changelog.mdx @@ -0,0 +1,565 @@ +--- +page_title: API Changelog for Terraform Enterprise +page_id: api-changelog +description: >- + Use this log of Terraform Enterprise API changes to track new features and + evolving functionality over time. +source: terraform-docs-common +--- + +# API Changelog + +Keep track of changes to the API for HCP Terraform and Terraform Enterprise. + +## 2025-3-10 + +- Document unique pagination metadata given in the response of [Organization Runs Index API](/terraform/enterprise/api-docs/run##list-runs-in-an-organization). + +## 2025-03-10 + +- Add new field `current_rum_count` to the [explorer API](/terraform/enterprise/api-docs/explorer) in the `workspaces` view type that lists a workspace's current resources under management. + +## 2024-11-19 + +- Clarify `tag-bindings` and `effective-tag-bindings` on [workspaces](/terraform/enterprise/api-docs/workspaces) and [projects](/terraform/enterprise/api-docs/projects) +- Adds new documentation for `PATCH`ing tag bindings on [projects](/terraform/enterprise/api-docs/projects) and [workspaces](/terraform/enterprise/api-docs/workspaces) + +## 2024-10-15 + +- Add new documentation for the ability to deprecate, and revert the deprecation of, module versions. Learn more about [Managing module versions](/terraform/enterprise/api-docs/private-registry/manage-module-versions). + +## 2024-10-14 + +- Update the [Organizations API](/terraform/enterprise/api-docs/organizations) to support the `speculative-plan-management-enabled` attribute, which controls [automatic cancellation of plan-only runs triggered by outdated commits](/terraform/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management). + +## 2024-10-11 + +- Add documentation for new timeframe filter on List endpoints for [Runs](/terraform/enterprise/api-docs/run) API + +## 2024-09-02 + +- Add warning about the deprecation and future removal of the [Policy Checks](/terraform/enterprise/api-docs/policy-checks) API. + +## 2024-08-16 + +- Fixes Workspace API responses to be consistent and contain all attributes and relationships. + +## 2024-08-14 + +- Add documentation for a new API endpoint that lists an [organization's team tokens](/terraform/enterprise/api-docs/team-tokens). + +## 2024-08-01 + + +This endpoint is exclusive to Terraform Enterprise, and not available in HCP Terraform. + + +- Update the [admin settings API](/terraform/enterprise/api-docs/admin/settings##update-general-settings) and [admin organizations API](/terraform/enterprise/api-docs/admin/organizations#update-an-organization) to indicate that the `terraform-build-worker-plan-timeout` and `terraform-build-worker-apply-timeout` attributes are deprecated and will be replaced by `plan-timeout` and `apply-timeout`, respectively. + + + +## 2024-07-24 + +- Remove beta tags from documentation for audit trail tokens. + + +## 2024-07-15 + +- Update the [Team API](/terraform/enterprise/api-docs/teams) to include `allow-member-token-management`. + + + +## 2024-07-12 + +- Add beta tags to documentation for audit trail tokens. + + +## 2024-06-25 + +- Add API documentation for new [team token management setting](/terraform/enterprise/users-teams-organizations/api-tokens). +- Update API documentation for the [manage teams permission](/terraform/enterprise/users-teams-organizations/permissions#team-management-permissions). + +## 2024-05-29 + +- Add API documentation for the new [audit trails token](/terraform/enterprise/api-docs/audit-trails-tokens). + +## 2024-05-23 + +- Update the [registry modules API](/terraform/enterprise/api-docs/private-registry/modules#create-a-module-version) for publishing new versions of branch based modules. + +## 2024-05-10 + +- Add API documentation for new [manage agent pools permission](/terraform/enterprise/users-teams-organizations/permissions#manage-agent-pools). + +## 2024-04-25 + +- Project names can now be up to 40 characters. + +## 2024-04-08 + +- Add API documentation for new [team management permissions](/terraform/enterprise/users-teams-organizations/permissions#team-management-permissions). + +## 2024-04-04 + +- Add a `sort` parameter to the [Projects list API](/terraform/enterprise/api-docs/projects#query-parameters) to allow sorting projects by name. +- Add a `description` attribute to the [Projects API](/terraform/enterprise/api-docs/projects). +- Add `project-count` and `workspace-count` attributes to sample [Projects API](/terraform/enterprise/api-docs/projects) responses. + +## 2024-3-27 + +- Add `private-vcs` to [Feature Entitlements](/terraform/enterprise/api-docs#feature-entitlements). + +## 2024-3-26 + +- Add API documentation for searching [variable sets](/terraform/enterprise/api-docs/variable-sets#list-variable-sets) by name. + +## 2024-3-14 + +- Add documentation for creating runs with debugging mode enabled. + +## 2024-3-12 + +- Update OAuth Client API endpoints to create, update, and return projects associated with an oauth client. +- Add API endpoints to [Attach an OAuth Client](/terraform/enterprise/api-docs/oauth-clients#attach-an-oauth-client-to-projects) and [Detach an OAuth Client](/terraform/enterprise/api-docs/oauth-clients#detach-an-oauth-client-from-projects) from a project. +- Add `organization-scoped` attribute to the [OAuth Clients API](/terraform/enterprise/api-docs/oauth-clients). + +## 2024-2-29 + +- Update [run task stages](/terraform/enterprise/api-docs/run-tasks/run-task-stages-and-results) with new multi-stage payload format. +- Update [run tasks](/terraform/enterprise/api-docs/run-tasks/run-tasks) with global run tasks request/response payloads. + +## 2024-2-27 + +- Add `private-policy-agents` to [Feature Entitlements](/terraform/enterprise/api-docs#feature-entitlements). + +## 2024-2-20 + +- Add documentation for configuring organization and workspace data retention policies through the API and on the different [types of data retention policies](/terraform/enterprise/api-docs/data-retention-policies). + + +## 2024-2-8 + +- Add [Explorer API documentation](/terraform/enterprise/api-docs/explorer) + + +## 2024-1-30 + +- Update the [Audit trails](/terraform/enterprise/api-docs/audit-trails) documentation to expand on the payloads for each event. + +## 2024-1-24 + +- Introduce configurable data retention policies at the site-wide level and extend data retention policies at the organization and workspace levels. +- Added and/or updated data retention policy documentation to the following topics: + - [Admin Settings Documentation](/terraform/enterprise/application-administration/general#data-retention-policies) + - [Admin API Documentation](/terraform/enterprise/api-docs/admin/settings#data-retention-policies) + - [Organization Documentation](/terraform/enterprise/users-teams-organizations/organizations#data-retention-policies) + - [Workspace Documentation](/terraform/enterprise/workspaces/settings/deletion#data-retention-policies) + +## 2024-1-4 + +- Update the [Organizations API](/terraform/enterprise/api-docs/organizations) to support the `aggregated-commit-status-enabled` attribute, which controls whether [Aggregated Status Checks](/terraform/enterprise/users-teams-organizations/organizations/vcs-status-checks) are enabled. + +## 2023-11-17 + +- Added the [`opa-versions` endpoint](/terraform/enterprise/api-docs/admin/opa-versions) to allow administrators to manage available Open Policy Agent (OPA) versions. +- Added the [`sentinel-versions` endpoint](/terraform/enterprise/api-docs/admin/sentinel-versions) to allow administrators to manage available Sentinel versions. +- Add `authenticated-resource` relationship to the [`account` API](/terraform/enterprise/api-docs/account). + +## 2023-11-15 + +- Introduce configurable data retention policies at the [organization](/terraform/enterprise/users-teams-organizations/organizations#data-retention-policies) and [workspace](/terraform/enterprise/workspaces/settings/deletion#data-retention-policies) levels. +- Added data retention policy documentation to the following topics: + - [`state-versions` API documentation](/terraform/enterprise/api-docs/state-versions) + - [`configuration-versions` API documentation](/terraform/enterprise/api-docs/configuration-versions) + - [Organizations documentation](/terraform/enterprise/users-teams-organizations/organizations#destruction-and-deletion) + - [Workspaces documentation](/terraform/enterprise/workspaces/settings/deletion#data-retention-policies) + +## 2023-11-07 + +- Add `auto_destroy_activity_duration` to the [Workspaces API](/terraform/enterprise/api-docs/workspaces), which allows Terraform Cloud to schedule auto-destroy runs [based on workspace inactivity](/terraform/enterprise/workspaces/settings/deletion#automatically-destroy). + +## 2023-10-31 + +- Update the [Workspaces API](/terraform/enterprise/api-docs/workspaces) to support the `auto-apply-run-trigger` attribute, which controls if run trigger runs are auto-applied. + +## 2023-10-30 + +- Add `priority` attribute to the [Variable Sets API](/terraform/enterprise/api-docs/variable-sets). + +## 2023-10-04 + +- Updates to [run task integration API](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) + - Fix invalid JSON in the example payload. + - Clarify the expected JSON:API payload fields. +- Add `policy-tool-version` attribute to [Policy Set Outcomes](/terraform/enterprise/api-docs/policy-evaluations#list-policy-outcomes). + +## 2023-10-03 + +- Update [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to include `agent-enabled` and `policy-tool-version`. +- Update [Policy Evaluations API](/terraform/enterprise/api-docs/policy-evaluations) to include `policy-tool-version`. + +## 2023-09-29 + +- Add support for [streamlined run task reviews](/terraform/enterprise/integrations/run-tasks), enabling run task integrations to return high fidelity results. + - Update the [Terraform cloud run task API](/terraform/enterprise/api-docs/run-tasks/run-tasks) to enable streamlined run task reviews. + - The [run task integration API](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) now guides integrations through sending rich results. + - Updated the run task payload [JSON Schema](https://github.com/hashicorp/terraform-docs-common/blob/main/website/public/schema/run-tasks/runtask-result.json). + +## 2023-09-25 + +- Add `intermediate` boolean attribute to the [State Versions API](/terraform/enterprise/api-docs/state-versions). + +## 2023-09-19 + +- Add [failed state upload recovery](/terraform/enterprise/api-docs/applies#recover-a-failed-state-upload-after-applying) endpoint. + +## 2023-09-15 + +- Add `auto-destroy-at` attribute to the [Workspaces API](/terraform/enterprise/api-docs/workspaces). +- Update the [Notification Configurations API](/terraform/enterprise/api-docs/notification-configurations) to include [automatic destroy run](/terraform/enterprise/api-docs/notification-configurations#automatic-destroy-runs) details. + +## 2023-09-08 + +- Update the [Organizations API](/terraform/enterprise/api-docs/organizations) to include `default-execution-mode` and `default-agent-pool`. +- Update the [Workspaces API](/terraform/enterprise/api-docs/workspaces) to add a `setting-overwrites` object to allow you to overwrite `default-execution-mode` and `default-agent-pool`. + +## 2023-09-06 + +- Update Policy Sets API endpoints to create, update, and return excluded workspaces associated with a policy set. +- Add API endpoints to [Attach a Policy Set](/terraform/enterprise/api-docs/policy-sets#attach-a-policy-set-to-exclusions) and [Detach a Policy Set](/terraform/enterprise/api-docs/policy-sets#detach-a-policy-set-to-exclusions) from excluded workspaces. + +## 2023-08-21 + +- Add `save-plan` attribute, `planned_and_saved` status, and `save_plan` operation type to [Runs endpoints](/terraform/enterprise/api-docs/run). + +## 2023-08-10 + +- Add `provisional` to `configuration-versions` endpoint. + +## 2023-07-26 + +- Add support for a `custom` option to the `team_project` access level along with various customizable permissions. The `project-access` permissions apply to the project itself, and `workspace-access` permissions apply to all workspaces within the project. For more information, see [Project Team Access](/terraform/enterprise/api-docs/project-team-access). + +## 2023-06-09 + +- Introduce support for [`import` blocks](/terraform/language/import/generating-configuration). + - [Runs](/terraform/enterprise/api-docs/run#create-a-run) have a new `allow-config-generation` option. + - [Plans](/terraform/enterprise/api-docs/plans#show-a-plan) have new `resource-imports` and `generated-configuration` properties. + - [Applies](/terraform/enterprise/api-docs/applies#show-an-apply) have a new `resource-imports` property. +- The workspaces associated with a policy set can now be updated using the [Policy Sets PATCH endpoint](/terraform/enterprise/api-docs/policy-sets#update-a-policy-set) +- Update the [Workspaces](/terraform/enterprise/api-docs/workspaces) API endpoints to include the associated [project](/terraform/enterprise/api-docs/projects). + +## 2023-05-25 + +- Terraform Cloud sets the `configuration_version_download_url`, `configuration_version_id`, and `workspace_working_directory` properties for all stages of the [Run Task Request](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration#request-body). +- Add the new `enforcement-level` property in the request and response of [Policies endpoints](/terraform/enterprise/api-docs/policies). +- Deprecate the old `enforce` property in the request and response of [Policies endpoints](/terraform/enterprise/api-docs/policies). +- Add new properties to limit run tasks and policies for the Terraform Cloud free tier. We updated the [entitlement set](/terraform/enterprise/api-docs/organizations#show-the-entitlement-set), [feature set](/terraform/enterprise/api-docs/feature-sets#sample-response), and [subscription](/terraform/enterprise/api-docs/subscriptions#sample-response) endpoints with the following properties: + - `run-task-limit` + - `run-task-workspace-limit` + - `run-task-mandatory-enforcement-limit` + - `policy-set-limit` + - `policy-limit` + - `policy-mandatory-enforcement-limit` + - `versioned-policy-set-limit` + +## 2023-04-25 + +- Add the `version-id` property to the response for the Create, List, and Update [Workspace Variables endpoints](/terraform/enterprise/api-docs/workspaces-variables). + +## 2023-03-30 + +- Add the `sort` query parameter to the Workspaces API's [list workspaces endpoint](/terraform/enterprise/api-docs/workspaces#list-workspaces). + +## 2023-03-24 + +- Update the [Variable Sets](/terraform/enterprise/api-docs/variable-sets) API endpoints to include assigning variable sets to projects. + +## 2023-03-20 + +- Add a names filter to the [Projects list API](/terraform/enterprise/api-docs/projects#query-parameters) to allow fetching a list of projects by name. + +## 2023-03-13 + +- Update [Project Team Access API](/terraform/enterprise/api-docs/project-team-access) to include additional Project roles. +- Update [Permissions](/terraform/enterprise/users-teams-organizations/permissions) to reflect the decoupling of projects and workspaces in the Organization Permissions UI. + +## 2023-03-08 + +- Introduced the [GitHub App Installation APIs](/terraform/enterprise/api-docs/github-app-installations). +- Updated [Workspaces API](/terraform/enterprise/api-docs/workspaces) to accept `vcs-repo.github-app-installation-id` to connect a workspace to a GitHub App Installation. +- Updated [Registry Module API](/terraform/enterprise/api-docs/private-registry/modules) to accept `vcs-repo.github-app-installation-id` to connect to a GitHub App Installation. +- Updated [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to accept `vcs-repo.github-app-installation-id` to connect to a GitHub App Installation. + +## 2023-02-16 + +- Add `manage-membership` to the organization access settings of the [Team API](/terraform/enterprise/api-docs/teams). + +## 2023-02-03 + +- Updated the [List Runs API](/terraform/enterprise/api-docs/run#list-runs-in-a-workspace) to note that the filter query parameters accept comma-separated lists. + +## 2023-01-18 + +- Updated the [Team API](/terraform/enterprise/api-docs/teams) to include the `read-workspaces` and `read-projects` permissions which grants teams view access to workspaces and projects. + +## 2023-01-17 + +- Add [Projects API](/terraform/enterprise/api-docs/projects) for creating, updating and deleting projects. +- Add [Project Team Access API](/terraform/enterprise/api-docs/project-team-access) for managing access for teams to individual projects. +- Update [Workspaces API](/terraform/enterprise/api-docs/workspaces) to include examples of creating a workspace in a project and moving a workspace between projects. +- Update [List Teams API](/terraform/enterprise/api-docs/teams#query-parameters) to accept a search parameter `q`, so that teams can be searched by name. + +## 2023-01-12 + +- Added new rollback to previous state endpoint to [State Versions API](/terraform/enterprise/api-docs/state-versions) + +## 2022-12-22 + +- Updated [Safe Delete a workspace](/terraform/enterprise/api-docs/workspaces#safe-delete-a-workspace) to fix HTTP verb as `POST`. + +## 2022-11-18 + +- Update [Policies API](/terraform/enterprise/api-docs/policies) to fix policy enforcement level defaults. Enforcement level is a required field, so no defaults are available. + +## 2022-11-03 + +- Update [Policy Checks](/terraform/enterprise/api-docs/policy-checks) to fix policy set outcome return data type. + +### 2022-10-17 + +- Updated the [Organizations API](/terraform/enterprise/api-docs/organizations) with the `allow-force-delete-workspaces`, which controls whether workspace administrators can delete workspaces with resources under management. +- Updated the [Workspaces API](/terraform/enterprise/api-docs/workspaces) with a safe delete endpoint that guards against deleting workspaces that are managing resources. + +### 2022-10-12 + +- Update [Policy Checks](/terraform/enterprise/api-docs/policy-checks) with result counts and support for filtering policy set outcomes. +- Update [Team Membership API](/terraform/enterprise/api-docs/team-members) to include adding and removing users from teams using organization membership ID. + + + +### 2022-10-06 + +- Updated the [Policies API](/terraform/enterprise/api-docs/policies) with support for Open Policy Agent (OPA) policies. +- Update [Policy Sets](/terraform/enterprise/api-docs/policy-sets) with support for OPA policy sets. +- Updated [Policy Checks](/terraform/enterprise/api-docs/policy-checks) to add support for listing policy evaluations and policy set outcomes. +- Update [Run Tasks Stage](/terraform/enterprise/api-docs/run-tasks/run-task-stages-and-results) to include the new `policy_evaluations` attribute in the output. + + +### 2022-09-21 + +- Update [State Versions](/terraform/enterprise/api-docs/state-versions#create) with optional `json-state-outputs` and `json-state` attributes, which are base-64 encoded external JSON representations of the terraform state. The read-only `hosted-json-state-download-url` attribute links to this version of the state file when available. +- Update [State Version Outputs](/terraform/enterprise/api-docs/state-version-outputs) with a `detailed-type` attribute, which refines the output with the precise Terraform type. + +### 2022-07-26 + +- Updated the [Run status list](/terraform/enterprise/api-docs/run#run-states) with `fetching`, `queuing`, `pre_plan_running` and `pre_plan_completed` +- Update [Run Tasks](/terraform/enterprise/api-docs/run-tasks.mdx) to include the new `stages` attribute when attaching or updating workspace tasks. +- Updated [Run Tasks Integration](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) to specify the different request payloads for different stages. + +### 2022-06-23 + + + +- Added the [Assessments](/terraform/enterprise/api-docs/assessments). + +- Updated [Workspace](/terraform/enterprise/api-docs/workspaces#create-a-workspace) and + [Notification Configurations](/terraform/enterprise/api-docs/notification-configurations#notification-triggers) to account for assessments. + + +- Added new query parameter(s) to [List Runs endpoint](/terraform/enterprise/api-docs/run#list-runs-in-a-workspace). + +### 2022-06-21 + +- Updated [Admin Organizations](/terraform/enterprise/api-docs/admin/organizations) endpoints with new `workspace-limit` setting. This is available in Terraform Enterprise v202207-1 and later. +- Updated [List Agent Pools](/terraform/enterprise/api-docs/agents#list-agent-pools) to accept a filter parameter `filter[allowed_workspaces][name]` so that agent pools can be filtered by name of an associated workspace. The given workspace must be allowed to use the agent pool. Refer to [Scoping Agent Pools to Specific Workspaces](/terraform/cloud-docs/agents#scope-an-agent-pool-to-specific-workspaces). +- Added new `organization-scoped` attribute and `allowed-workspaces` relationship to the request/response body of the below endpoints. This is available in Terraform Enterprise v202207-1 and later. + - [Show an Agent Pool](/terraform/enterprise/api-docs/agents#show-an-agent-pool) + - [Create an Agent Pool](/terraform/enterprise/api-docs/agents#create-an-agent-pool) + - [Update an Agent Pool](/terraform/enterprise/api-docs/agents#update-an-agent-pool) + +### 2022-06-17 + +- Updated [Creating a Run Task](/terraform/enterprise/workspaces/settings/run-tasks#creating-a-run-task) section to include the new description information for the run task to be configured. +- Update [Run Tasks](/terraform/enterprise/api-docs/run-tasks.mdx) to include the new description attribute. + +### 2022-06-09 + +- Updated [List Agent Pools](/terraform/enterprise/api-docs/agents#list-agent-pools) to accept a search parameter `q`, so that agent pools can be searched by `name`. This is available in Terraform Enterprise v202207-1 and later. +- Fixed [List Workspaces](/terraform/enterprise/api-docs/workspaces#list-workspaces) to add missing `search[tags]` query parameter. +- Updated [List Workspaces](/terraform/enterprise/api-docs/workspaces#list-workspaces) to add new `search[exclude_tags]` query parameter. This is available in Terraform Enterprise v202207-1 and later. + +### 2022-05-11 + +- Updated Run Tasks permission to the following endpoints: + - [Organizations](/terraform/enterprise/api-docs/organizations#list-organizations). + - [Team Access](/terraform/enterprise/api-docs/team-access#list-team-access-to-a-workspace). + - [Teams](/terraform/enterprise/api-docs/teams#list-teams). + +### 2022-05-04 + +- Updated [Feature Sets](/terraform/enterprise/api-docs/feature-sets#list-feature-sets) to add new `run-tasks` attribute. + +### 2022-05-03 + +- Added Run Tasks permission to the following endpoints: + - [Organizations](/terraform/enterprise/api-docs/organizations#list-organizations) + - [Workspaces](/terraform/enterprise/api-docs/workspaces#show-workspace) + +### 2022-04-29 + +- Updated [Run Tasks Integration](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) to specify the allowed `status` attribute values. +- Updated [Organization Memberships](/terraform/enterprise/api-docs/organization-memberships#query-parameters) to add new `filter[email]` query parameter. +- Updated [Teams](/terraform/enterprise/api-docs/teams#query-parameters) to add new `filter[names]` query parameter. + +### 2022-04-04 + +- Added the [Run Tasks Integration](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) endpoint. + +### 2022-03-14 + +- Added the [Download Configuration Files](/terraform/enterprise/api-docs/configuration-versions#download-configuration-files) endpoints. + +### 2022-03-11 + +- Introduced [Archiving Configuration Versions](/terraform/enterprise/workspaces/configurations#archiving-configuration-versions). + - Updated [Configuration Versions](/terraform/enterprise/api-docs/configuration-versions#attributes) to add new `fetching` and `archived` states. + - Updated [Runs](/terraform/enterprise/api-docs/run#attributes) to add new `fetching` state. + - Added the [Archive a Configuration Version](/terraform/enterprise/api-docs/configuration-versions#archive-a-configuration-version) endpoint. + +### 2022-02-25 + +- Updated [Workspace Run Tasks](/terraform/enterprise/api-docs/run-tasks/run-tasks#show-a-run-task) to add new `enabled`attribute. + +### 2022-02-28 + +- Introduced the [Registry Providers](/terraform/enterprise/api-docs/private-registry/providers) endpoints to manage private providers for a private registry. + +### 2021-12-09 + +- Added `variables` field for POST /runs and the run resource, enabling run-specific variable values. + +### 2021-12-03 + +- OAuth API updated to handle `secret` and `rsa_public_key` fields for POST/PUT. + +### 2021-11-17 + +- Added pagination support to the following endpoints: + - [Feature Sets](/terraform/enterprise/api-docs/feature-sets#list-feature-sets) - `GET /feature-sets` + - [Notification Configurations](/terraform/enterprise/api-docs/notification-configurations#list-notification-configurations) - `GET /workspaces/:workspace_id/notification-configurations` + - [Oauth Clients](/terraform/enterprise/api-docs/oauth-clients#list-oauth-clients) - `GET /organizations/:organization_name/oauth-clients` + - [Oauth Tokens](/terraform/enterprise/api-docs/oauth-tokens#list-oauth-tokens) - `GET /oauth-clients/:oauth_client_id/oauth-tokens` + - [Organization Feature Sets](/terraform/enterprise/api-docs/feature-sets#list-feature-sets-for-organization) - `GET /organizations/:organization_name/feature-sets` + - [Organizations](/terraform/enterprise/api-docs/organizations#list-organizations) - `GET /organizations` + - [Policy Checks](/terraform/enterprise/api-docs/policy-checks#list-policy-checks) - `GET /runs/:run_id/policy-checks` + - [Policy Set Parameters](/terraform/enterprise/api-docs/policy-set-params#list-parameters) - `GET /policy-sets/:policy_set_id/parameters` + - [SSH Keys](/terraform/enterprise/api-docs/ssh-keys#list-ssh-keys) - `GET /organizations/:organization_name/ssh-keys` + - [User Tokens](/terraform/enterprise/api-docs/user-tokens#list-user-tokens) - `GET /users/:user_id/authentication-tokens` + +### 2021-11-11 + +- Introduced the [Variable Sets](/terraform/enterprise/api-docs/variable-sets) endpoints for viewing and administering Variable Sets + +### 2021-11-18 + +- Introduced the [Registry Providers](/terraform/enterprise/api-docs/private-registry/providers) endpoint to manage public providers for a + private registry. These endpoints will be available in the following Terraform Enterprise Release: `v202112-1` + +### 2021-09-12 + +- Added [Run Tasks Stages and Results](/terraform/enterprise/api-docs/run-tasks/run-task-stages-and-results) endpoint. + +### 2021-08-18 + +- Introduced the [State Version Outputs](/terraform/enterprise/api-docs/state-versions) endpoint to retrieve the Outputs for a + given State Version + +### 2021-08-11 + +- **BREAKING CHANGE:** Security fix to [Configuration versions](/terraform/enterprise/api-docs/configuration-versions): upload-url attribute for [uploading configuration files](/terraform/enterprise/api-docs/configuration-versions#upload-configuration-files) is now only available on the create response. + +### 2021-07-30 + +- Introduced Workspace Tagging + - Updated [Workspaces](/terraform/enterprise/api-docs/workspaces): + - added `tag-names` attribute. + - added `POST /workspaces/:workspace_id/relationships/tags` + - added `DELETE /workspaces/:workspace_id/relationships/tags` + - Added [Organization Tags](/terraform/enterprise/api-docs/organization-tags). + - Added `tags` attribute to [`tfrun`](/terraform/enterprise/policy-enforcement/sentinel/import/tfrun) + +### 2021-07-19 + +- [Notification configurations](/terraform/enterprise/api-docs/notification-configurations): Gave organization tokens permission to create and manage notification configurations. + +### 2021-07-09 + +- [State versions](/terraform/enterprise/api-docs/state-versions): Fixed the ID format for the workspace relationship of a state version. Previously, the reported ID was unusable due to a bug. +- [Workspaces](/terraform/enterprise/api-docs/workspaces): Added `locked_by` as an includable related resource. +- Added [Run Tasks](/terraform/enterprise/api-docs/run-tasks/run-tasks) API endpoint. + +### 2021-06-8 + +- Updated [Registry Module APIs](/terraform/enterprise/api-docs/private-registry/modules). + - added `registry_name` scoped APIs. + - added `organization_name` scoped APIs. + - added [Module List API](/terraform/enterprise/api-docs/private-registry/modules#list-registry-modules-for-an-organization). + - updated [Module Delete APIs](/terraform/enterprise/api-docs/private-registry/modules#delete-a-module) (see deprecation note below). + - **CLOUD**: added public registry module related APIs. +- **DEPRECATION**: The following [Registry Module APIs](/terraform/enterprise/api-docs/private-registry/modules) have been replaced with newer apis and will be removed in the future. + - The following endpoints to delete modules are replaced with [Module Delete APIs](/terraform/enterprise/api-docs/private-registry/modules#delete-a-module) + - `POST /registry-modules/actions/delete/:organization_name/:name/:provider/:version` replaced with `DELETE /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name/:provider/:version` + - `POST /registry-modules/actions/delete/:organization_name/:name/:provider` replaced with `DELETE /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name/:provider` + - `POST /registry-modules/actions/delete/:organization_name/:name` replaced with `DELETE /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name` + - `POST /registry-modules` replaced with [`POST /organizations/:organization_name/registry-modules/vcs`](/terraform/enterprise/api-docs/private-registry/modules#publish-a-private-module-from-a-vcs) + - `POST /registry-modules/:organization_name/:name/:provider/versions` replaced with [`POST /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name/:provider/versions`](/terraform/enterprise/api-docs/private-registry/modules#create-a-module-version) + - `GET /registry-modules/show/:organization_name/:name/:provider` replaced with [`GET /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name/:provider`](/terraform/enterprise/api-docs/private-registry/modules#get-a-module) + +### 2021-05-27 + +- **CLOUD**: [Agents](/terraform/enterprise/api-docs/agents): added [delete endpoint](/terraform/enterprise/api-docs/agents#delete-an-agent). + +### 2021-05-19 + +- [Runs](/terraform/enterprise/api-docs/run): added `refresh`, `refresh-only`, and `replace-addrs` attributes. + +### 2021-04-16 + +- Introduced [Controlled Remote State Access](https://www.hashicorp.com/blog/announcing-controlled-remote-state-access-for-terraform-cloud-and-enterprise). + - [Admin Settings](/terraform/enterprise/api-docs/admin/settings): added `default-remote-state-access` attribute. + - [Workspaces](/terraform/enterprise/api-docs/workspaces): + - added `global-remote-state` attribute. + - added [Remote State Consumers](/terraform/enterprise/api-docs/workspaces#get-remote-state-consumers) relationship. + +### 2021-04-13 + +- [Teams](/terraform/enterprise/api-docs/teams): added `manage-policy-overrides` property to the `organization-access` attribute. + +### 2021-03-23 + +- **ENTERPRISE**: `v202103-1` Introduced [Share Modules Across Organizations with Terraform Enterprise](https://www.hashicorp.com/blog/share-modules-across-organizations-terraform-enterprise). + - [Admin Organizations](/terraform/enterprise/api-docs/admin/organizations): + - added new query parameters to [List all Organizations endpoint](/terraform/enterprise/api-docs/admin/organizations#query-parameters) + - added module-consumers link in `relationships` response + - added [update module consumers endpoint](/terraform/enterprise/api-docs/admin/organizations#update-an-organization-39-s-module-consumers) + - added [list module consumers endpoint](/terraform/enterprise/api-docs/admin/organizations#list-module-consumers-for-an-organization) + - [Organizations](/terraform/enterprise/api-docs/organizations): added [Module Producers](/terraform/enterprise/api-docs/organizations#show-module-producers) + - **DEPRECATION**: [Admin Module Sharing](/terraform/enterprise/api-docs/admin/module-sharing): is replaced with a new JSON::Api compliant [endpoint](/terraform/enterprise/api-docs/admin/organizations#update-an-organization-39-s-module-consumers) + +### 2021-03-18 + +- **CLOUD**: Introduced [New Workspace Overview for Terraform Cloud](https://www.hashicorp.com/blog/new-workspace-overview-for-terraform-cloud). + - [Workspaces](/terraform/enterprise/api-docs/workspaces): + - added `resource-count` and `updated-at` attributes. + - added [performance attributes](/terraform/enterprise/api-docs/workspaces#workspace-performance-attributes) (`apply-duration-average`, `plan-duration-average`, `policy-check-failures`, `run-failures`, `workspaces-kpis-run-count`). + - added `readme` and `outputs` [related resources](/terraform/enterprise/api-docs/workspaces#available-related-resources). + - [Team Access](/terraform/enterprise/api-docs/team-access): updated to support pagination. + +### 2021-03-11 + +- Added [VCS Events](/terraform/enterprise/api-docs/vcs-events), limited to GitLab.com connections. + +### 2021-03-08 + +- [Workspaces](/terraform/enterprise/api-docs/workspaces): added `current_configuration_version` and `current_configuration_version.ingress_attributes` as includable related resources. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/comments.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/comments.mdx new file mode 100644 index 000000000..2e9641432 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/comments.mdx @@ -0,0 +1,227 @@ +--- +page_title: /comments API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/comments` endpoint to create and read + comments on Terraform runs. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[307]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/307 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Comments API reference + +Comments allow users to leave feedback or record decisions about a run. + +## List Comments for a Run + +`GET /runs/:id/comments` + +| Parameter | Description | +| --------- | ------------------ | +| `id` | The ID of the run. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/runs/run-KTuq99JSzgmDSvYj/comments +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "wsc-JdFX3u8o114F4CWf", + "type": "comments", + "attributes": { + "body": "A comment body" + }, + "relationships": { + "run-event": { + "data": { + "id": "re-fo1YXZ8W5bp5GBKM", + "type": "run-events" + }, + "links": { + "related": "/api/v2/run-events/re-fo1YXZ8W5bp5GBKM" + } + } + }, + "links": { + "self": "/api/v2/comments/wsc-JdFX3u8o114F4CWf" + } + }, + { + "id": "wsc-QdhSPFTNoCTpfafp", + "type": "comments", + "attributes": { + "body": "Another comment body" + }, + "relationships": { + "run-event": { + "data": { + "id": "re-fo1YXZ8W5bp5GBKM", + "type": "run-events" + }, + "links": { + "related": "/api/v2/run-events/re-fo1YXZ8W5bp5GBKM" + } + } + }, + "links": { + "self": "/api/v2/comments/wsc-QdhSPFTNoCTpfafp" + } + } + ] +} +``` + +## Show a Comment + +`GET /comments/:id` + +| Parameter | Description | +| --------- | ---------------------- | +| `id` | The ID of the comment. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/comments/wsc-gTFq83JSzjmAvYj +``` + +### Sample Response + +```json +{ + "data": { + "id": "wsc-gTFq83JSzjmAvYj", + "type": "comments", + "attributes": { + "body": "Another comment" + }, + "relationships": { + "run-event": { + "data": { + "id": "re-8RB5ZaFrDanG2hGY", + "type": "run-events" + }, + "links": { + "related": "/api/v2/run-events/re-8RB5ZaFrDanG2hGY" + } + } + }, + "links": { + "self": "/api/v2/comments/wsc-gTFq83JSzjmAvYj" + } + } +} +``` + +## Create Comment + +`POST /runs/:id/comments` + +| Parameter | Description | +| --------- | ------------------ | +| `id` | The ID of the run. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as the request payload. + +| Key Path | Type | Default | Description | +| ---------------------- | ------ | ------- | ------------------------ | +| `data.type` | string | | Must be `"comments"`. | +| `data.attributes.body` | string | | The body of the comment. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "body": "A comment about the run", + }, + "type": "comments" + } +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/runs/run-KTuq99JSzgmDSvYj/comments +``` + +### Sample Response + +```json +{ + "data": { + "id": "wsc-oRiShushpgLU4JD2", + "type": "comments", + "attributes": { + "body": "A comment about the run" + }, + "relationships": { + "run-event": { + "data": { + "id": "re-E3xsBX11F1fbm2zV", + "type": "run-events" + }, + "links": { + "related": "/api/v2/run-events/re-E3xsBX11F1fbm2zV" + } + } + }, + "links": { + "self": "/api/v2/comments/wsc-oRiShushpgLU4JD2" + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/configuration-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/configuration-versions.mdx new file mode 100644 index 000000000..8b5f07752 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/configuration-versions.mdx @@ -0,0 +1,561 @@ +--- +page_title: /configuration-versions API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/configuration-versions` endpoint to list, + show, and create a configuration version and its files within a workspace. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[302]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/302 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Configuration versions API reference + +-> **Note:** Before working with the runs or configuration versions APIs, read the [API-driven run workflow](/terraform/enterprise/run/api) page, which includes both a full overview of this workflow and a walkthrough of a simple implementation of it. + +A configuration version (`configuration-version`) is a resource used to reference the uploaded configuration files. It is associated with the run to use the uploaded configuration files for performing the plan and apply. + +You need read runs permission to list and view configuration versions for a workspace, and you need queue plans permission to create new configuration versions. Refer to the [permissions](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) documentation for more details. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Attributes + +### Configuration Version States + +The configuration version state is found in `data.attributes.status`, and you can reference the following list of possible states. + +A configuration version created through the API or CLI can only be used in runs if it is in an `uploaded` state. A configuration version created through a linked VCS repository may also be used in runs if it is in an `archived` state. + +| State | Description | | +| ---------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | - | +| `pending` | The initial status of a configuration version after it has been created. Pending configuration versions cannot be used to create new runs. | | +| `fetching` | For configuration versions created from a commit to a connected VCS repository, HCP Terraform is currently fetching the associated files from VCS. | | +| `uploaded` | The configuration version is fully processed and can be used in runs. | | +| `archived` | All immediate runs are complete and HCP Terraform has discarded the files associated with this configuration version. If the configuration version was created through a connected VCS repository, it can still be used in new runs. In those cases, HCP Terraform will re-fetch the files from VCS. | | +| `errored` | HCP Terraform could not process this configuration version, and it cannot be used to create new runs. You can try again by pushing a new commit to your linked VCS repository or creating a new configuration version with the API or CLI. | | +| `backing_data_soft_deleted` | Indicates that the configuration version's backing data is marked for garbage collection. If no action is taken, the backing data associated with this configuration version is permanently deleted after a set number of days. You can restore the backing data associated with the configuration version before it is permanently deleted. | | +| `backing_data_permanently_deleted` | The configuration version's backing data has been permanently deleted and can no longer be restored. | | + +## List Configuration Versions + +`GET /workspaces/:workspace_id/configuration-versions` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The ID of the workspace to list configurations from. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | -------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 configuration versions per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/workspaces/ws-2Qhk7LHgbMrm3grF/configuration-versions +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "cv-ntv3HbhJqvFzamy7", + "type": "configuration-versions", + "attributes": { + "error": null, + "error-message": null, + "source": "gitlab", + "speculative":false, + "status": "uploaded", + "status-timestamps": {}, + "provisional": false + }, + "relationships": { + "ingress-attributes": { + "data": { + "id": "ia-i4MrTxmQXYxH2nYD", + "type": "ingress-attributes" + }, + "links": { + "related": + "/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/ingress-attributes" + } + } + }, + "links": { + "self": "/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7", + "download": "/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/download" + } + } + ] +} +``` + +## Show a Configuration Version + +`GET /configuration-versions/:configuration-id` + +| Parameter | Description | +| ------------------- | ------------------------------------ | +| `:configuration-id` | The id of the configuration to show. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7 +``` + +### Sample Response + +```json +{ + "data": { + "id": "cv-ntv3HbhJqvFzamy7", + "type": "configuration-versions", + "attributes": { + "error": null, + "error-message": null, + "source": "gitlab", + "speculative":false, + "status": "uploaded", + "status-timestamps": {}, + "provisional": false + }, + "relationships": { + "ingress-attributes": { + "data": { + "id": "ia-i4MrTxmQXYxH2nYD", + "type": "ingress-attributes" + }, + "links": { + "related": + "/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/ingress-attributes" + } + } + }, + "links": { + "self": "/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7", + "download": "/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/download" + } + } +} +``` + +## Show a Configuration Version's Commit Information + +An ingress attributes resource (`ingress-attributes`) is used to reference commit information for configuration versions created in a workspace with a VCS repository. + +`GET /configuration-versions/:configuration-id/ingress-attributes` + +| Parameter | Description | +| ------------------- | ------------------------------------ | +| `:configuration-id` | The id of the configuration to show. | + +Ingress attributes can also be fetched as part of a query to a particular configuration version via `include`: + +`GET /configuration-versions/:configuration-id?include=ingress-attributes` + +| Parameter | Description | +| ------------------- | ------------------------------------ | +| `:configuration-id` | The id of the configuration to show. | + + + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/configuration-versions/cv-TrHjxIzad9Ae9i8x/ingress-attributes +``` + +### Sample Response + +```json +{ + "data": { + "id": "ia-zqHjxJzaB9Ae6i9t", + "type": "ingress-attributes", + "attributes": { + "branch": "add-cool-stuff", + "clone-url": "https://github.com/hashicorp/foobar.git", + "commit-message": "Adding really cool infrastructure", + "commit-sha": "1e1c1018d1bbc0b8517d072718e0d87c1a0eda95", + "commit-url": "https://github.com/hashicorp/foobar/commit/1e1c1018d1bbc0b8517d072718e0d87c1a0eda95", + "compare-url": "https://github.com/hashicorp/foobar/pull/163", + "identifier": "hashicorp/foobar", + "is-pull-request": true, + "on-default-branch": false, + "pull-request-number": 163, + "pull-request-url": "https://github.com/hashicorp/foobar/pull/163", + "pull-request-title": "Adding really cool infrastructure", + "pull-request-body": "These are changes to add really cool stuff. We should absolutely merge this.", + "tag": null, + "sender-username": "chrisarcand", + "sender-avatar-url": "https://avatars.githubusercontent.com/u/2430490?v=4", + "sender-html-url": "https://github.com/chrisarcand" + }, + "relationships": { + "created-by": { + "data": { + "id": "user-PQk2Z3dfXAax18P6s", + "type": "users" + }, + "links": { + "related": "/api/v2/ingress-attributes/ia-zqHjxJzaB9Ae6i9t/created-by" + } + } + }, + "links": { + "self": "/api/v2/ingress-attributes/ia-zqHjxJzaB9Ae6i9t" + } + } +} +``` + +## Create a Configuration Version + +`POST /workspaces/:workspace_id/configuration-versions` + +| Parameter | Description | +| --------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The ID of the workspace to create the new configuration version in. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------------- | ------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.attributes.auto-queue-runs` | boolean | true | When true, runs are queued automatically when the configuration version is uploaded. | +| `data.attributes.speculative` | boolean | false | When true, this configuration version may only be used to create runs which are speculative, that is, can neither be confirmed nor applied. | +| `data.attributes.provisional` | boolean | false | When true, this configuration version does not immediately become the workspace current configuration version. If the associated run is applied, it then becomes the current configuration version unless a newer one exists. | + +### Sample Payload + +```json +{ + "data": { + "type": "configuration-versions", + "attributes": { + "auto-queue-runs": true + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-2Qhk7LHgbMrm3grF/configuration-versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "cv-UYwHEakurukz85nW", + "type": "configuration-versions", + "attributes": { + "auto-queue-runs": true, + "error": null, + "error-message": null, + "source": "tfe-api", + "speculative":false, + "status": "pending", + "status-timestamps": {}, + "upload-url": + "https://archivist.terraform.io/v1/object/9224c6b3-2e14-4cd7-adff-ed484d7294c2", + "provisional": false + }, + "relationships": { + "ingress-attributes": { + "data": null, + "links": { + "related": + "/api/v2/configuration-versions/cv-UYwHEakurukz85nW/ingress-attributes" + } + } + }, + "links": { "self": "/api/v2/configuration-versions/cv-UYwHEakurukz85nW" } + } +} +``` + +### Configuration Files Upload URL + +Once a configuration version is created, use the `upload-url` attribute to [upload configuration files](#upload-configuration-files) associated with that version. The `upload-url` attribute is only provided in the response when creating configuration versions. + +## Upload Configuration Files + +-> **Note**: If `auto-queue-runs` was either not provided or set to `true` during creation of the configuration version, a run using this configuration version will be automatically queued on the workspace. If `auto-queue-runs` was set to `false` explicitly, then it is necessary to [create a run on the workspace](/terraform/enterprise/api-docs/run#create-a-run) manually after the configuration version is uploaded. + +`PUT https://archivist.terraform.io/v1/object/` + +**The URL is provided in the `upload-url` attribute when creating a `configuration-versions` resource. After creation, the URL is hidden on the resource and no longer available.** + +### Sample Request + +**@filename is the name of configuration file you wish to upload.** + +```shell +curl \ + --header "Content-Type: application/octet-stream" \ + --request PUT \ + --data-binary @filename \ + https://archivist.terraform.io/v1/object/4c44d964-eba7-4dd5-ad29-1ece7b99e8da +``` + +## Archive a Configuration Version + +`POST /configuration-versions/:configuration_version_id/actions/archive` + +| Parameter | Description | +| -------------------------- | ----------------------------------------------- | +| `configuration_version_id` | The ID of the configuration version to archive. | + +This endpoint notifies HCP Terraform to discard the uploaded `.tar.gz` file associated with this configuration version. This endpoint can only archive configuration versions that were created with the API or CLI, are in an `uploaded` [state](#configuration-version-states), have no runs in progress, and are not the current configuration version for any workspace. Otherwise, calling this endpoint will result in an error. + +HCP Terraform automatically archives configuration versions created through VCS when associated runs are complete and then re-fetches the files for subsequent runs. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------- | +| [202][] | none | Successfully initiated the archive process. | +| [409][] | [JSON API error object][] | Configuration version was in a non-archivable state or the configuration version was created with VCS and cannot be archived through the API. | +| [404][] | [JSON API error object][] | Configuration version was not found or user not authorized. | + +### Request Body + +This POST endpoint does not take a request body. + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/actions/archive +``` + +## Download Configuration Files + +`GET /configuration-versions/:configuration_version_id/download` + +| Parameter | Description | +| -------------------------- | ------------------------------------------------ | +| `configuration_version_id` | The ID of the configuration version to download. | + +`GET /runs/:run_id/configuration-version/download` + +| Parameter | Description | +| --------- | ------------------------------------------------------------------- | +| `run_id` | The ID of the run whose configuration version should be downloaded. | + +These endpoints generate a temporary URL to the location of the configuration version in a `.tar.gz` archive, and then redirect to that link. If using a client that can follow redirects, you can use these endpoints to save the `.tar.gz` archive locally without needing to save the temporary URL. These endpoints will return an error if attempting to download a configuration version that is not in an `uploaded` [state](#configuration-version-states). + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------------------------------------------------------------------------------------------------------- | +| [302][] | HTTP Redirect | Configuration version found and temporary download URL generated | +| [404][] | [JSON API error object][] | Configuration version not found, or specified configuration version is not uploaded, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --location \ + https://app.terraform.io/api/v2/configuration-versions/cv-C6Py6WQ1cUXQX2x2/download \ + > export.tar.gz +``` + +## Mark a Configuration Version for Garbage Collection + + +This endpoint is exclusive to Terraform Enterprise, and not available in HCP Terraform. Learn more about Terraform Enterprise. + + +`POST /api/v2/configuration-versions/:configuration-id/actions/soft_delete_backing_data` + +| Parameter | Description | +| ------------------- | --------------------------------------------------- | +| `:configuration-id` | The ID of the configuration version to soft delete. | + +This endpoint directs Terraform Enterprise to _soft delete_ the backing files associated with the configuration version. Soft deletion refers to marking the configuration version for garbage collection. Terraform permanently deletes configuration versions marked for soft deletion after a set number of days unless the configuration version is restored. Once a configuration version is soft deleted, any attempts to read the configuration version will fail. Refer to [Configuration Version States](#configuration-version-states) for information about all data states. + +This endpoint can only soft delete configuration versions that meet the following criteria: + +- Were created using the API or CLI, +- are in an [`uploaded` state](#configuration-version-states), +- and are not the current configuration version. + +Otherwise, the endpoint returns an error. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ------------------------------------------------------------------------------------------------------------------------- | +| [200][] | none | Terraform successfully marked the data for garbage collection. | +| [400][] | [JSON API error object][] | Terraform failed to transition the state to `backing_data_soft_deleted`. | +| [404][] | [JSON API error object][] | Terraform did not find the configuration version or the user is not authorized to modify the configuration version state. | + +### Request Body + +This POST endpoint does not take a request body. + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/actions/soft_delete_backing_data + --data {"data": {"attributes": {"delete-older-than-n-days": 23}}} +``` + +## Restore Configuration Versions Marked for Garbage Collection + + +This endpoint is exclusive to Terraform Enterprise, and not available in HCP Terraform. Learn more about Terraform Enterprise. + + +`POST /api/v2/configuration-versions/:configuration-id/actions/restore_backing_data` + +| Parameter | Description | +| ------------------- | ---------------------------------------------------------------------------------------- | +| `:configuration-id` | The ID of the configuration version to restore back to its uploaded state if applicable. | + +This endpoint directs Terraform Enterprise to restore backing files associated with this configuration version. This endpoint can only restore delete configuration versions that meet the following criteria: + +- are not in a [`backing_data_permanently_deleted` state](#configuration-version-states). + +Otherwise, the endpoint returns an error. Terraform restores applicable configuration versions back to their `uploaded` state. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ------------------------------------------------------------------------------------------------------------------------- | +| [200][] | none | Terraform successfully initiated the restore process. | +| [400][] | [JSON API error object][] | Terraform failed to transition the state to `uploaded`. | +| [404][] | [JSON API error object][] | Terraform did not find the configuration version or the user is not authorized to modify the configuration version state. | + +### Request Body + +This POST endpoint does not take a request body. + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/actions/restore_backing_data +``` + +## Permanently Delete a Configuration Version + + +This endpoint is exclusive to Terraform Enterprise, and not available in HCP Terraform. Learn more about Terraform Enterprise. + + +`POST /api/v2/configuration-versions/:configuration-id/actions/permanently_delete_backing_data` + +| Parameter | Description | +| ------------------- | ---------------------------------------------------------- | +| `:configuration-id` | The ID of the configuration version to permanently delete. | + +This endpoint directs Terraform Enterprise to permanently delete backing files associated with this configuration version. This endpoint can only permanently delete configuration versions that meet the following criteria: + +- Were created using the API or CLI, +- are in a [`backing_data_soft_deleted` state](#configuration-version-states), +- and are not the current configuration version. + +Otherwise, the endpoint returns an error. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ------------------------------------------------------------------------------------------------------------------------- | +| [200][] | none | Terraform successfully deleted the data permanently. | +| [400][] | [JSON API error object][] | Terraform failed to transition the state to `backing_data_permanently_deleted`. | +| [404][] | [JSON API error object][] | Terraform did not find the configuration version or the user is not authorized to modify the configuration version state. | + +### Request Body + +This POST endpoint does not take a request body. + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/actions/permanently_delete_backing_data +``` + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| -------------------- | ------------------------------------------------- | +| `ingress_attributes` | The commit information used in the configuration. | +| `run` | The run created by the configuration. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/cost-estimates.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/cost-estimates.mdx new file mode 100644 index 000000000..a58a2b848 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/cost-estimates.mdx @@ -0,0 +1,98 @@ +--- +page_title: /cost-estimates API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/cost-estimates` endpoint to read a cost + estimate using its ID. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Cost estimates API reference + +## Show a cost estimate + +-> **Note**: The hash in the `resources` attribute structure represents low-level Cost Estimation details. The keys or structure may change over time. Use the data in this hash at your own risk. + +`GET /cost-estimates/:id` + +| Parameter | Description | +| --------- | ------------------------------------ | +| `id` | The ID of the cost estimate to show. | + +There is no endpoint to list cost estimates. You can find the ID for a cost estimate in the +`relationships.cost-estimate` property of a run object. + +| Status | Response | Reason | +| ------- | ------------------------------------------------ | --------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "cost-estimates"`) | The request was successful | +| [404][] | [JSON API error object][] | Cost estimate not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/cost-estimates/ce-BPvFFrYCqRV6qVBK +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "ce-BPvFFrYCqRV6qVBK", + "type": "cost-estimates", + "attributes": { + "error-message": null, + "status": "finished", + "status-timestamps": { + "queued-at": "2017-11-29T20:02:17+00:00", + "finished-at": "2017-11-29T20:02:20+00:00" + }, + "resources": {...}, + "resources-count": 4, + "matched-resources-count": 3, + "unmatched-resources-count": 1, + "prior-monthly-cost": "0.0", + "proposed-monthly-cost": "25.488", + "delta-monthly-cost": "25.488", + }, + "links": { + "self": "/api/v2/cost-estimate/ce-9VYRc9bpfJEsnwum" + } + } + ] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/data-retention-policies.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/data-retention-policies.mdx new file mode 100644 index 000000000..2678528ba --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/data-retention-policies.mdx @@ -0,0 +1,291 @@ +--- +page_title: /data-retention-policy API endpoint reference +description: >- + Use the `/data-retention-policy` endpoint to configure data storage policy. Learn how to call the data retention policy endpoint to delete data after a specific number of days. +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + + +# Data retention policy API + +Data retention policies allow administrators to control storage usage by specifying how long backing data is retained for different resources. + +A data retention policy determines when Terraform Enterprise automatically marks _backing data_ for garbage collection. Backing data refers to [configuration version](/terraform/enterprise/api-docs/configuration-versions) or [state version](/terraform/enterprise/api-docs/state-versions) files. + +You can set data retention policies per workspace, organization, and Terraform Enterprise installation. +## Default policy settings + +When the data retention policy is unspecified for a workspace, the workspace inherits the data retention policy defined for the organization. Refer to [Data Retention Policies](/terraform/enterprise/workspaces/settings/deletion#data-retention-policies) in the workspace settings documentation for additional information. + +When the data retention policy is unspecified for an organization, the organization inherits the [global data retention policy](/terraform/enterprise/application-administration/general#data-retention-policies). Refer to [Data Retention Policies](/terraform/enterprise/users-teams-organizations/organizations#destruction-and-deletion) in the organization settings documentation for additional information. + + +## Show data retention policy + +This endpoint shows the data retention policy set on the target resource. + +| Resource | API Endpoint | +| --------------| ----------------------------------------------- | +| [Workspaces](/terraform/enterprise/api-docs/workspaces#show-data-retention-policy) | `GET /workspaces/:workspace_id/relationships/data-retention-policy` | +| [Organizations](/terraform/enterprise/api-docs/organizations#show-data-retention-policy) | `GET /organizations/:organization_name/relationships/data-retention-policy` | +| [Site-wide](/terraform/enterprise/api-docs/admin/settings#show-data-retention-policy) | `GET /admin/data-retention-policy-settings` | + +For more information on the types of data retention policies, and the keys returned for each, refer to [Data Retention Policy Types](#data-retention-policy-types) + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ------------------------------------------------------------- | +| [200][] | [JSON API document][] with `type` set to `"data-retention-policy-delete-olders"` or `"data-retention-policy-dont-deletes"` | Successful request. Refer to [Data Retention Policy Types](#data-retention-policy-types). | +| [404][] | [JSON API error object][] | Target resource not found, data retention policy does not exist, or user unauthorized to perform action. | + +### Request body + +No request body. + +### Sample request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/relationships/data-retention-policy +``` + +### Sample response + +```json +{ + "data": { + "id": "drp-Kh74zpKVGNWbpugQ", + "type": "data-retention-policy-delete-olders", + "attributes": { + "delete-older-than-n-days": 60 + }, + "relationships": { + "target": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + } + } + } +} +``` + +## Create or update data retention policy + +This endpoint creates a data retention policy attached to a target resource or updates the existing policy. + +| Resource | API Endpoint | +| --------------| ----------------------------------------------- | +| [Workspaces](/terraform/enterprise/api-docs/workspaces#create-or-update-data-retention-policy) | `POST /workspaces/:workspace_id/relationships/data-retention-policy` | +| [Organizations](/terraform/enterprise/api-docs/organizations#create-or-update-data-retention-policy) | `POST /organizations/:organization_name/relationships/data-retention-policy` | +| [Site-wide](/terraform/enterprise/api-docs/admin/settings#create-or-update-data-retention-policy) | `POST /admin/data-retention-policy-settings` | + +You can also call the endpoint to change the type of the data retention policy. Sending a `POST` or `PATCH` request and specifying a different type of policy in the payload automatically creates the new data retention policy for the target resource to replace the existing policy. +For more information on the types of data retention policies, refer to [Data Retention Policy Types](#data-retention-policy-types). + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No content | Successfully updated the target resource's data retention policy. | +| [404][] | [JSON API error object][] | Target resource not found or user is not authorized to perform action. | + +### Request body + +This `POST` endpoint requires a JSON object with the following properties as a request payload: + +| Key path | Type | Description | +| ----------------- | ------ | ------------------------------ | +| `data.type` | string | A [data retention policy type](#data-retention-policy-types) | +| `data.attributes` | object | The attributes for the specified [policy type](#data-retention-policy-types) | + +### Sample payload + +```json +{ + "data": { + "type": "data-retention-policy-delete-olders", + "attributes": { + "deleteOlderThanNDays": 33 + } + } +} +``` + +### Sample request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-UYv6RYM8fVhzeGG5/relationships/data-retention-policy +``` + +### Sample response + +```json +{ + "data": { + "id": "drp-Kh74zpKVGNWbpugQ", + "type": "data-retention-policy-delete-olders", + "attributes": { + "delete-older-than-n-days": 33 + }, + "relationships": { + "target": { + "data": { + "id": "ws-7aiqKYf6ejMFdtWS", + "type": "workspaces" + } + } + } + } +} +``` + +## Remove data retention policy + +This endpoint removes the data retention policy explicitly set on a target resource. + +| Resource | API Endpoint | +| --------------| ----------------------------------------------- | +| [Workspaces](/terraform/enterprise/api-docs/workspaces#remove-data-retention-policy) | `DELETE /workspaces/:workspace_id/relationships/data-retention-policy` | +| [Organizations](/terraform/enterprise/api-docs/organizations#remove-data-retention-policy) | `DELETE /organizations/:organization_name/relationships/data-retention-policy` | +| [Site-wide](/terraform/enterprise/api-docs/admin/settings#remove-data-retention-policy) | `DELETE /admin/data-retention-policy-settings` | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | No Content | Successfully removed the target resource's data retention policy. | +| [404][] | [JSON API error object][] | Target resource not found, or user unauthorized to perform action. | + +### Request body + +No request body. + +### Sample request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/hashicorp/relationships/data-retention-policy +``` + +### Response + +No response body. + +Status code `204`. + +## Data retention policy types + +You can send a `POST` or `PATCH` request to `/data-retention-policy` and `/data-retention-policy-settings` endpoints to set the policy or change the existing policy. The schema for each type has a set of attributes that are specific to the type. + +Specify one of the following data retention policy types in the `data.type` parameter in the request payload: + +- `data-retention-policy-delete-olders`: Directs Terraform Enterprise to delete backing data older than a set number of days. Refer to [`data-retention-policy-delete-olders`](#data-retention-policy-delete-olders) for additional information. +- `data-retention-policy-dont-deletes`: Directs Terraform Enterprise to preserve backing data for the related resource. Refer to [`data-retention-policy-dont-deletes`](#data-retention-policy-dont-deletes) for additional information. + +To view the existing policy, send a `GET` request to the endpoint. Endpoints are polymorphic and may return different policy types depending on how Terraform Enterprise has been configured. + +### `data-retention-policy-delete-olders` + +This policy directs Terraform Enterprise to delete backing data older than a set number of days. + +### Properties + +| Key path | Type | Description | +| -------------------------------------- | ------- | ---------------------------------------------- | +| `data.type` | string | Must be `data-retention-policy-delete-olders`. | +| `data.attributes.deleteOlderThanNDays` | integer | The number of days to retain backing data for. | +| `data.relationships.target` | object | The resource the policy is attached to. An organization, workspace, or `null` for the site-wide policy. Cannot be updated directly. | + +### Sample payload + +```json +{ + "data": { + "type": "data-retention-policy-delete-olders", + "attributes": { + "deleteOlderThanNDays": 33 + } + } +} +``` + +### Sample response body + +```json +{ + "data": { + "id": "drp-Kh74zpKVGNWbpugQ", + "type": "data-retention-policy-delete-olders", + "attributes": { + "delete-older-than-n-days": 33 + }, + "relationships": { + "target": { + "data": { + "id": "ws-7aiqKYf6ejMFdtWS", + "type": "workspaces" + } + } + } + } +} +``` + +### `data-retention-policy-dont-deletes` + +This policy directs Terraform Enterprise to preserve backing data for the related resource. + +### Properties + +| Key path | Type | Description | +| -------------------------------------- | ------- | ---------------------------------------------- | +| `data.type` | string | Must be `data-retention-policy-dont-deletes`. | +| `data.attributes` | object | Not applicable. This policy type does not have attributes. | +| `data.relationships.target` | object | The resource the policy is attached to. An organization, workspace. Cannot be updated directly. | + +### Sample payload + +```json +{ + "data": { + "type": "data-retention-policy-dont-deletes", + "attributes": {} + } +} +``` + +### Sample response body + +```json +{ + "data": { + "id": "drp-Kh74zpKVGNWbpugQ", + "type": "data-retention-policy-dont-deletes", + "attributes": {}, + "relationships": { + "target": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + } + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/github-app-installations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/github-app-installations.mdx new file mode 100644 index 000000000..8573467c0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/github-app-installations.mdx @@ -0,0 +1,127 @@ +--- +page_title: /github-app/installations API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/github-app/installations` endpoint to + view details about where you have installed the Terraform Enterprise GitHub + App. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# GitHub App installations API reference + +You can create a GitHub App installation using the HCP Terraform UI. Learn how to [create a GitHub App installation](/terraform/enterprise/vcs/github-app). + +~> **Note:** To use this resource in Terraform Enterprise installations, you must configure the GitHub App in the site admin area. + +~> **Note:** You can only use this API if you have already authorized the Terraform Cloud GitHub App. Manage your [GitHub App token](/terraform/enterprise/users-teams-organizations/users#github-app-oauth-token) from **Account Settings** > **Tokens**. + +## List Installations + +This endpoint lists GitHub App installations available to the current user. + +`GET /github-app/installations` + +### Query Parameters + +Queries only return GitHub App Installations that the current user has access to within GitHub. + +| Parameter | Description | +| ------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------- | +| `filter[name]` | **Optional.** If present, returns a list of available GitHub App installations that match the GitHub organization or login. | +| `filter[installation_id]` | **Optional.** If present, returns a list of available GitHub App installations that match the installation ID within GitHub. (**Not HCP Terraform**) | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/github-app/installations +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "ghain-BYrbNeGQ8nAzKouu", + "type": "github-app-installations", + "attributes": { + "name": "octouser", + "installation-id": 54810170, + "icon-url": "https://avatars.githubusercontent.com/u/29916665?v=4", + "installation-type": "User", + "installation-url": "https://github.com/settings/installations/54810170" + } + } + ] +} +``` + +## Show Installation + +`GET /github-app/installation/:gh_app_installation_id` + +| Parameter | Description | +| ------------------------- | ------------------------------ | +| `:gh_app_installation_id` | The Github App Installation ID | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/github-app/installation/ghain-R4xmKTaxnhLFioUq +``` + +### Sample Response + +```json +{ + "data": { + "id": "ghain-R4xmKTaxnhLFioUq", + "type": "github-app-installations", + "attributes": { + "name": "octouser", + "installation-id": 54810170, + "icon-url": "https://avatars.githubusercontent.com/u/29916665?v=4", + "installation-type": "User", + "installation-url": "https://github.com/settings/installations/54810170" + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/index.mdx new file mode 100644 index 000000000..9615d628e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/index.mdx @@ -0,0 +1,374 @@ +--- +page_title: API documentation for Terraform Enterprise +description: >- + Learn about API authentication, response codes, versioning, formatting, rate + limiting, and clients. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# HCP Terraform API documentation + +HCP Terraform provides an API for a subset of its features. If you need assistance or want to submit a feature request, visit the [HashiCorp support center](https://support.hashicorp.com/hc/en-us) and open a ticket. + +-> **Note:** Before planning an API integration, consider whether [the `tfe` Terraform provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs) meets your needs. It can't create or approve runs in response to arbitrary events, but it's a useful tool for managing your organizations, teams, and workspaces as code. + +HashiCorp provides a [stability policy](/terraform/enterprise/api-docs/stability-policy) for the HCP Terraform API, ensuring backwards compatibility for stable endpoints. The [changelog](/terraform/enterprise/api-docs/changelog) tracks changes to the API for HCP Terraform and Terraform Enterprise. + +## Authentication + +All requests must be authenticated with a bearer token. Use the HTTP header `Authorization` with the value `Bearer `. If the token is absent or invalid, HCP Terraform responds with [HTTP status 401][401] and a [JSON API error object][]. The 401 status code is reserved for problems with the authentication token; forbidden requests with a valid token result in a 404. + +You can use the following types of tokens to authenticate: + +- [User tokens](/terraform/enterprise/users-teams-organizations/users#api-tokens) — each HCP Terraform user can have any number of API tokens, which can make requests on their behalf. +- [Team tokens](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens) — each team can have one API token at a time. This is intended for performing plans and applies via a CI/CD pipeline. +- [Organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens) — each organization can have one API token at a time. This is intended for automating the management of teams, team membership, and workspaces. The organization token cannot perform plans and applies. + +- [Audit trails token](/terraform/enterprise/users-teams-organizations/api-tokens#audit-trails-tokens) - each organization can have a single token that can read that organization's audit trails. Use this token type to authenticate integrations pulling audit trail data, for example, using the [HCP Terraform for Splunk](/terraform/enterprise/integrations/splunk) app. + + +### Blob Storage Authentication + +HCP Terraform relies on a HashiCorp-developed blob storage service for storing statefiles and multiple other pieces of customer data, all of which are documented on our [data security page](/terraform/enterprise/architectural-details/data-security). + +Unlike the HCP Terraform API, this service does not require that a bearer token be submitted with each request. Instead, each URL includes a securely generated secret and is only valid for 25 hours. + +For example, the [state versions api](/terraform/enterprise/api-docs/state-versions) returns a field named `hosted-state-download`, which is a URL of this form: +`https://archivist.terraform.io/v1/object/` + +This is a broadly accepted pattern for secure access. It is important to treat these URLs themselves as secrets. They should not be logged, nor shared with untrusted parties. + +## Feature Entitlements + +HCP Terraform is available at multiple pricing tiers (including free), which offer different feature sets. + +Each organization has a set of _entitlements_ that corresponds to its pricing tier. These entitlements determine which HCP Terraform features the organization can use. + +If an organization doesn't have the necessary entitlement to use a given feature, HCP Terraform returns a 404 error for API requests to any endpoints devoted to that feature. + +The [show entitlement set](/terraform/enterprise/api-docs/organizations#show-the-entitlement-set) endpoint can return information about an organization's current entitlements, which is useful if your client needs to change its interface when a given feature isn't available. + +The following entitlements are available: + +- `agents` — Allows isolated, private or on-premises infrastructure to communicate with an organization in HCP Terraform. Affects the [agent pools][], [agents][], and [agent tokens][] endpoints. + +- `audit-logging` — Allows an organization to access [audit trails][]. + +- `configuration-designer` — Allows an organization to use the [Configuration Designer][]. +- `cost-estimation` — Allows an organization to access [cost estimation][]. +- `global-run-tasks` — Allows an organization to apply [run tasks](/terraform/enterprise/workspaces/settings/run-tasks) to every workspace. Affects the [run tasks][] endpoints. This feature is currently in beta. +- `module-tests-generation` - Allows an organization to generate tests for private registry modules. This feature is currently in beta. +- `operations` — Allows an organization to perform runs within HCP Terraform. Affects the [runs][], [plans][], and [applies][] endpoints. +- `policy-enforcement` — Allows an organization to use [Sentinel][]. Affects the [policies][], [policy sets][], and [policy checks][] endpoints. +- `private-module-registry` — Allows an organization to publish and use modules with the [private module registry][]. Affects the [registry modules][] endpoints. +- `private-policy-agents` - Allows an organization to ensure that HTTP enabled [Sentinel][] and OPA [policies][] can communicate with isolated, private, or on-premises infrastructure. +- `run-tasks` — Allows an organization to use [run tasks](/terraform/enterprise/workspaces/settings/run-tasks). Affects the [run tasks][] endpoints. +- `self-serve-billing` — Allows an organization to pay via credit card using the in-app billing UI. +- `sentinel` - **DEPRECATED** Use `policy-enforcement` instead. +- `state-storage` — Allows an organization to store state versions in its workspaces, which enables local Terraform runs with HCP Terraform. Affects the [state versions][] endpoints. +- `sso` — Allows an organization to manage and authenticate users with single sign on. +- `teams` — Allows an organization to manage access to its workspaces with [teams](/terraform/enterprise/users-teams-organizations/teams). Without this entitlement, an organization only has an owners team. Affects the [teams][], [team members][], [team access][], and [team tokens][] endpoints. +- `user-limit` — An integer value representing the maximum number of users allowed for the organization. If blank, there is no limit. +- `vcs-integrations` — Allows an organization to [connect with a VCS provider][vcs integrations] and link VCS repositories to workspaces. Affects the [OAuth Clients][o-clients], and [OAuth Tokens][o-tokens] endpoints, and determines whether the `data.attributes.vcs-repo` property can be set for [workspaces][]. + +[agents]: /terraform/enterprise/api-docs/agents + +[agent pools]: /terraform/enterprise/api-docs/agents + +[agent tokens]: /terraform/enterprise/api-docs/agent-tokens + +[applies]: /terraform/enterprise/api-docs/applies + + + +[audit trails]: /terraform/enterprise/api-docs/audit-trails + + + +[Configuration Designer]: /terraform/enterprise/registry/design + +[cost estimation]: /terraform/enterprise/cost-estimation + +[o-clients]: /terraform/enterprise/api-docs/oauth-clients + +[o-tokens]: /terraform/enterprise/api-docs/oauth-tokens + +[plans]: /terraform/enterprise/api-docs/plans + +[policies]: /terraform/enterprise/api-docs/policies + +[policy checks]: /terraform/enterprise/api-docs/policy-checks + +[policy sets]: /terraform/enterprise/api-docs/policy-sets + +[private module registry]: /terraform/enterprise/registry + +[registry modules]: /terraform/enterprise/api-docs/private-registry/modules + +[registry providers]: /terraform/enterprise/api-docs/private-registry/providers + +[runs]: /terraform/enterprise/api-docs/run + +[run tasks]: /terraform/enterprise/api-docs/run-tasks/run-tasks + +[Sentinel]: /terraform/enterprise/policy-enforcement/sentinel + +[single sign on]: /terraform/enterprise/users-teams-organizations/single-sign-on + +[state versions]: /terraform/enterprise/api-docs/state-versions + +[teams]: /terraform/enterprise/api-docs/teams + +[team access]: /terraform/enterprise/api-docs/team-access + +[team members]: /terraform/enterprise/api-docs/team-members + +[team tokens]: /terraform/enterprise/api-docs/team-tokens + +[vcs integrations]: /terraform/enterprise/vcs + +[workspaces]: /terraform/enterprise/api-docs/workspaces + +## Response Codes + +This API returns standard HTTP response codes. + +We return 404 Not Found codes for resources that a user doesn't have access to, as well as for resources that don't exist. This is to avoid telling a potential attacker that a given resource exists. + +## Versioning + +The API documented in these pages is the second version of HCP Terraform's API, and resides under the `/v2` prefix. + +Future APIs will increment this version, leaving the `/v1` API intact, though in the future we might deprecate certain features. In that case, we'll provide ample notice to migrate to the new API. + +## Paths + +All V2 API endpoints use `/api/v2` as a prefix unless otherwise specified. + +For example, if the API endpoint documentation defines the path `/runs` then the full path is `/api/v2/runs`. + +## JSON API Formatting + +The HCP Terraform endpoints use the [JSON API specification](https://jsonapi.org/), which specifies key aspects of the API. Most notably: + +- [HTTP error codes](https://jsonapi.org/examples/#error-objects-error-codes) +- [Error objects](https://jsonapi.org/examples/#error-objects-basics) +- [Document structure][document] +- [HTTP request/response headers](https://jsonapi.org/format/#content-negotiation) + +[document]: https://jsonapi.org/format/#document-structure + +### JSON API Documents + +Since our API endpoints use the JSON API spec, most of them return [JSON API documents][document]. + +Endpoints that use the POST method also require a JSON API document as the request payload. A request object usually looks something like this: + +```json +{ + "data": { + "type":"vars", + "attributes": { + "key":"some_key", + "value":"some_value", + "category":"terraform", + "hcl":false, + "sensitive":false + }, + "relationships": { + "workspace": { + "data": { + "id":"ws-4j8p6jX1w33MiDC7", + "type":"workspaces" + } + } + } + } +} +``` + +These objects always include a top-level `data` property, which: + +- Must have a `type` property to indicate what type of API object you're interacting with. +- Often has an `attributes` property to specify attributes of the object you're creating or modifying. +- Sometimes has a `relationships` property to specify other objects that are linked to what you're working with. + +In the documentation for each API method, we use dot notation to explain the structure of nested objects in the request. For example, the properties of the request object above are listed as follows: + +| Key path | Type | Default | Description | +| ---------------------------------------- | ------ | ------- | --------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"vars"`. | +| `data.attributes.key` | string | | The name of the variable. | +| `data.attributes.value` | string | | The value of the variable. | +| `data.attributes.category` | string | | Whether this is a Terraform or environment variable. Valid values are `"terraform"` or `"env"`. | +| `data.attributes.hcl` | bool | `false` | Whether to evaluate the value of the variable as a string of HCL code. Has no effect for environment variables. | +| `data.attributes.sensitive` | bool | `false` | Whether the value is sensitive. If true then the variable is written once and not visible thereafter. | +| `data.relationships.workspace.data.type` | string | | Must be `"workspaces"`. | +| `data.relationships.workspace.data.id` | string | | The ID of the workspace that owns the variable. | + +We also always include a sample payload object, to show the document structure more visually. + +### Query Parameters + +Although most of our API endpoints use the POST method and receive their parameters as a JSON object in the request payload, some of them use the GET method. These GET endpoints sometimes require URL query parameters, in the standard `...path?key1=value1&key2=value2` format. + +Since these parameters were originally designed as part of a JSON object, they sometimes have characters that must be [percent-encoded](https://en.wikipedia.org/wiki/Percent-encoding) in a query parameter. For example, `[` becomes `%5B` and `]` becomes `%5D`. + +For more about URI structure and query strings, see [the specification (RFC 3986)](https://tools.ietf.org/html/rfc3986) or [the Wikipedia page on URIs](https://en.wikipedia.org/wiki/Uniform_Resource_Identifier). + +### Pagination + +Most of the endpoints that return lists of objects support pagination. A client may pass the following query parameters to control pagination on supported endpoints: + +| Parameter | Description | +| -------------- | --------------------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 items per page. The maximum page size is 100. | + +Additional data is returned in the `links` and `meta` top level attributes of the response. + +```json +{ + "data": [...], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/hashicorp/workspaces?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/hashicorp/workspaces?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": "https://app.terraform.io/api/v2/organizations/hashicorp/workspaces?page%5Bnumber%5D=2&page%5Bsize%5D=20", + "last": "https://app.terraform.io/api/v2/organizations/hashicorp/workspaces?page%5Bnumber%5D=2&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": 2, + "total-pages": 2, + "total-count": 21 + } + } +} +``` + +### Inclusion of Related Resources + +Some of the API's GET endpoints can return additional information about nested resources by adding an `include` query parameter, whose value is a comma-separated list of resource types. + +The related resource options are listed in each endpoint's documentation where available. + +The related resources will appear in an `included` section of the response. + +Example: + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/teams/team-n8UQ6wfhyym25sMe?include=users +``` + +```json +{ + "data": { + "id": "team-n8UQ6wfhyym25sMe", + "type": "teams", + "attributes": { + "name": "owners", + "users-count": 1 + ... + }, + "relationships": { + "users": { + "data": [ + { + "id": "user-62goNpx1ThQf689e", + "type": "users" + } + ] + } ... + } + ... + }, + "included": [ + { + "id": "user-62goNpx1ThQf689e", + "type": "users", + "attributes": { + "username": "hashibot" + ... + } ... + } + ] +} +``` + +## Rate Limiting + +You can make up to 30 requests per second to the API as an authenticated or unauthenticated request. If you reach the rate limit then your access will be throttled and an error response will be returned. Some endpoints have lower rate limits to prevent abuse, including endpoints that poll Terraform for a list of runs and endpoints related to user authentication. The adjusted limits are unnoticeable under normal use. If you receive a rate-limited response, the limit is reflected in the `x-ratelimit-limit` header once triggered. + +Authenticated requests are allocated to the user associated with the authentication token. This means that a user with multiple tokens will still be limited to 30 requests per second, additional tokens will not allow you to increase the requests per second permitted. + +Unauthenticated requests are associated with the requesting IP address. + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------- | +| [429][] | [JSON API error object][] | Rate limit has been reached. | + +```json +{ + "errors": [ + { + "detail": "You have exceeded the API's rate limit.", + "status": 429, + "title": "Too many requests" + } + ] +} +``` + +## Client libraries and tools + +HashiCorp maintains [go-tfe](https://github.com/hashicorp/go-tfe), a Go client for HCP Terraform's API. + +Additionally, the community of HCP Terraform users and vendors have built client libraries in other languages. These client libraries and tools are not tested nor officially maintained by HashiCorp, but are listed below in order to help users find them easily. + +If you have built a client library and would like to add it to this community list, please [contribute](https://github.com/hashicorp/terraform-website#contributions-welcome) to [this page](https://github.com/hashicorp/terraform-docs-common/blob/main/website/docs/cloud-docs/api-docs/index.mdx#client-libraries-and-tools). + +- [tfh](https://github.com/hashicorp-community/tf-helper): UNIX shell console app +- [tf_api_gateway](https://github.com/PlethoraOfHate/tf_api_gateway): Python API library and console app +- [terrasnek](https://github.com/dahlke/terrasnek): Python API library +- [terraform-enterprise-client](https://github.com/skierkowski/terraform-enterprise-client): Ruby API library and console app +- [pyterprise](https://github.com/JFryy/terraform-enterprise-api-python-client): A simple Python API client library. +- [Tfe.NetClient](https://github.com/everis-technology/Tfe.NetClient): .NET Client Library diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/no-code-provisioning.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/no-code-provisioning.mdx new file mode 100644 index 000000000..c8c0bfd9f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/no-code-provisioning.mdx @@ -0,0 +1,924 @@ +--- +page_title: /no-code-modules API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/no-code-modules` endpoint to designate + and configure no-code modules. You can also use this endpoint to deploy and + upgrade no-code workspaces. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: http://jsonapi.org/format/#error-objects + +# No-code provisioning API reference + +The no-code provisioning API allows you to create, configure, and deploy Terraform modules in the no-code provisioning workflows within HCP Terraform. For more information on no-code modules, refer to [Designing No-Code Ready Modules](/terraform/enterprise/no-code-provisioning/module-design). + +## Enable no-code provisioning for a module + +`POST /organizations/:organization_name/no-code-modules` + +| Parameter | Description | +| -------------------- | --------------------------------------------------- | +| `:organization_name` | The name of the organization the module belongs to. | + +To deploy a module using the no-code provisioning workflow, the module must meet the following requirement: + +1. The module must exist in your organization's private registry. +2. The module must meet the [design requirements](/terraform/enterprise/no-code-provisioning/module-design#requirements) for a no-code module. +3. You must enable no-code provisioning for the module. + +You can send a `POST` request to the `/no-code-modules` endpoint to enable no-code provisioning for a specific module. You can also call this endpoint to set options for the allowed values of a variable for a no-code module in your organization. + +-> **Note**: This endpoint can not be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | --------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "no-code-modules"`) | Successfully enabled a module for no-code provisioning. | +| [404][] | [JSON API error object][] | Not found, or the user is unauthorized to perform this action. | +| [422][] | [JSON API error object][] | Malformed request body (e.g., missing attributes, wrong types, etc.). | +| [500][] | [JSON API error object][] | Internal system failure. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------------------------------------------------- | ------- | ---------------------------- | ---------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"no-code-modules"`. | +| `data.attributes.version-pin` | string | Latest version of the module | The module version to use in no-code provisioning workflows. | +| `data.attributes.enabled` | boolean | `false` | Set to `true` to enable no-code provisioning workflows. | +| `data.relationships.registry-module.data.id` | string | | The ID of a module in the organization's private registry. | +| `data.relationships.registry-module.data.type` | string | | Must be `"registry-module"`. | +| `data.relationships.variable-options.data[].type` | string | | Must be `"variable-options"`. | +| `data.relationships.variable-options.data[].attributes.variable-name` | string | | The name of a variable within the module. | +| `data.relationships.variable-options.data[].attributes.variable-type` | string | | The data type for the variable. Can be [any type supported by Terraform](/terraform/language/expressions/types#types). | +| `data.relationships.variable-options.data[].attributes.options` | Any\[] | | A list of allowed values for the variable. | + +### Sample Payload + +```json +{ + "data": { + "type": "no-code-modules", + "attributes": { + "version-pin": "1.0.1", + "enabled": true + }, + "relationships": { + "registry-module": { + "data": { + "id": "mod-2aaFrmRPZs2N9epr", + "type": "registry-module" + } + }, + "variable-options": { + "data": [ + { + "type": "variable-options", + "attributes": { + "variable-name": "amis", + "variable-type": "string", + "options": [ + "ami-1", + "ami-2", + "ami-3" + ] + } + }, + { + "type": "variable-options", + "attributes": { + "variable-name": "region", + "variable-type": "string", + "options": [ + "eu-north-1", + "us-east-2", + "us-west-1" + ] + } + } + ] + } + } + } +} + +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/no-code-modules +``` + +### Sample Response + +```json +{ + "data": { + "id": "nocode-9HE91XDNY3faePn2", + "type": "no-code-modules", + "attributes": { + "enabled": true, + "version-pin": "1.0.1" + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "registry-module": { + "data": { + "id": "mod-2aaFrmRPZs2N9epr", + "type": "registry-modules" + }, + "links": { + "related": "/api/v2/registry-modules/mod-2aaFrmRPZs2N9epr" + } + }, + "variable-options": { + "data": [ + { + "id": "ncvaropt-fcHDfnZ1EGdRzFNC", + "type": "variable-options" + }, + { + "id": "ncvaropt-dZMfdh9KBcwFjyv2", + "type": "variable-options" + } + ] + } + }, + "links": { + "self": "/api/v2/no-code-modules/nocode-9HE91XDNY3faePn2" + } + } +} +``` + +## Update no-code provisioning settings + +`PATCH /no-code-modules/:id` + +| Parameter | Description | +| --------- | -------------------------------------------- | +| `:id` | The unique identifier of the no-code module. | + +Send a `PATCH` request to the `/no-code-modules/:id` endpoint to update the settings for the no-code provisioning of a module. You can update the following settings: + +- Enable or disable no-code provisioning. +- Adjust the set of options for allowed variable values. +- Change the module version being provisioned. +- Change the module being provisioned. + +The [API call that enables no-code provisioning for a module](#allow-no-code-provisioning-of-a-module-within-an-organization) returns that module's unique identifier. + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | --------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "no-code-modules"`) | Successfully updated a no-code module. | +| [404][] | [JSON API error object][] | Not found, or the user is unauthorized to perform this action. | +| [422][] | [JSON API error object][] | Malformed request body (e.g., missing attributes, wrong types, etc.). | +| [500][] | [JSON API error object][] | Internal system failure. | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------------------------------------------------- | ------- | -------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"no-code-modules"`. | +| `data.attributes.version-pin` | string | Existing value | The module version to use in no-code provisioning workflows. | +| `data.attributes.enabled` | boolean | Existing value | Set to `true` to enable no-code provisioning workflows, or `false` to disable them. | +| `data.relationships.registry-module.data.id` | string | Existing value | The ID of a module in the organization's Private Registry. | +| `data.relationships.registry-module.data.type` | string | Existing value | Must be `"registry-module"`. | +| `data.relationships.variable-options.data[].id` | string | | The ID of an existing variable-options set. If provided, a new variable-options set replaces the set with this ID. If not provided, this creates a new variable-option set. | +| `data.relationships.variable-options.data[].type` | string | | Must be `"variable-options"`. | +| `data.relationships.variable-options.data[].attributes.variable-name` | string | | The name of a variable within the module. | +| `data.relationships.variable-options.data[].attributes.variable-type` | string | | The data type for the variable. Can be [any type supported by Terraform](/terraform/language/expressions/types#types). | +| `data.relationships.variable-options.data[].attributes.options` | Any\[] | | A list of allowed values for the variable. | + +### Sample Payload + +```json +{ + "data": { + "type": "no-code-modules", + "attributes": { + "enabled": false + }, + "relationships": { + "registry-module": { + "data": { + "id": "mod-zyai9dwH4VPPaVuC", + "type": "registry-module" + } + }, + "variable-options": { + "data": [ + { + "id": "ncvaropt-fcHDfnZ1EGdRzFNC", + "type": "variable-options", + "attributes": { + "variable-name": "Linux AMIs", + "variable-type": "array", + "options": [ + "Xenial Xerus", + "Trusty Tahr" + ] + } + }, + { + "id": "ncvaropt-dZMfdh9KBcwFjyv2", + "type": "variable-options", + "attributes": { + "variable-name": "region", + "variable-type": "array", + "options": [ + "eu-north-1", + "us-east-2", + "us-west-1" + ] + } + } + ] + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/no-code-modules/nocode-9HE91XDNY3faePn2 +``` + +### Sample Response + +```json +{ + "data": { + "id": "nocode-9HE91XDNY3faePn2", + "type": "no-code-modules", + "attributes": { + "enabled": true, + "version-pin": "1.0.1" + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "registry-module": { + "data": { + "id": "mod-2aaFrmRPZs2N9epr", + "type": "registry-modules" + }, + "links": { + "related": "/api/v2/registry-modules/mod-2aaFrmRPZs2N9epr" + } + }, + "variable-options": { + "data": [ + { + "id": "ncvaropt-fcHDfnZ1EGdRzFNC", + "type": "variable-options" + }, + { + "id": "ncvaropt-dZMfdh9KBcwFjyv2", + "type": "variable-options" + } + ] + } + }, + "links": { + "self": "/api/v2/no-code-modules/nocode-9HE91XDNY3faePn2" + } + } +} +``` + +## Read a no-code module's properties + +`GET /no-code-modules/:id` + +| Parameter | Description | +| --------- | -------------------------------------------- | +| `:id` | The unique identifier of the no-code module. | + +Use this API to read the details of an existing no-code module. + +The [API call that enables no-code provisioning for a module](#allow-no-code-provisioning-of-a-module-within-an-organization) returns that module's unique identifier. + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | --------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "no-code-modules"`) | Successfully read the no-code module. | +| [400][] | [JSON API error object][] | Invalid `include` parameter. | +| [404][] | [JSON API error object][] | Not found, or the user is unauthorized to perform this action. | +| [422][] | [JSON API error object][] | Malformed request body (e.g., missing attributes, wrong types, etc.). | +| [500][] | [JSON API error object][] | Internal system failure. | + +### Query Parameters + +This endpoint uses our [standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Use HTML URL encoding syntax, such as `%5B` to represent `[` and `%5D` to represent `]`, if your tooling does not automatically encode URLs. + +Terraform returns related resources when you add the [`include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources) to the request. + +| Parameter | Description | +| --------- | ------------------------------------------------- | +| `include` | List related resource to include in the response. | + +The following resource types are available: + +| Resource Name | Description | +| ------------------ | --------------------------------------------------------- | +| `variable_options` | Module variables with a configured set of allowed values. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/no-code-modules/nocode-9HE91XDNY3faePn2?include=variable_options +``` + +### Sample Response + +```json +{ + "data": { + "id": "nocode-9HE91XDNY3faePn2", + "type": "no-code-modules", + "attributes": { + "enabled": true, + "version-pin": "1.0.1" + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "registry-module": { + "data": { + "id": "mod-2aaFrmRPZs2N9epr", + "type": "registry-modules" + }, + "links": { + "related": "/api/v2/registry-modules/mod-2aaFrmRPZs2N9epr" + } + }, + "variable-options": { + "data": [ + { + "id": "ncvaropt-fcHDfnZ1EGdRzFNC", + "type": "variable-options" + }, + { + "id": "ncvaropt-dZMfdh9KBcwFjyv2", + "type": "variable-options" + } + ] + } + }, + "links": { + "self": "/api/v2/no-code-modules/nocode-9HE91XDNY3faePn2" + } + }, + "included": [ + { + "id": "ncvaropt-fcHDfnZ1EGdRzFNC", + "type": "variable-options", + "attributes": { + "variable-name": "Linux AMIs", + "variable-type": "array", + "options": [ + "Xenial Xerus", + "Trusty Tahr" + ] + }, + "relationships": { + "no-code-allowed-module": { + "data": { + "id": "nocode-9HE91XDNY3faePn2", + "type": "no-code-allowed-modules" + } + } + } + }, + { + "id": "ncvaropt-dZMfdh9KBcwFjyv2", + "type": "variable-options", + "attributes": { + "variable-name": "region", + "variable-type": "array", + "options": [ + "eu-north-1", + "us-east-2", + "us-west-1" + ] + }, + "relationships": { + "no-code-allowed-module": { + "data": { + "id": "nocode-9HE91XDNY3faePn2", + "type": "no-code-allowed-modules" + } + } + } + } + ] +} +``` + +## Create a no-code module workspace + +This endpoint creates a workspace from a no-code module. + +`POST /no-code-modules/:id/workspaces` + +| Parameter | Description | +| --------- | ------------------------------------------ | +| `:id` | The ID of the no-code module to provision. | + +Each HCP Terraform organization has a list of which modules you can use to create workspaces using no-code provisioning. You can use this API to create a workspace by selecting a no-code module to enable a no-code provisioning workflow. + +-> **Note**: This endpoint can not be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | -------------------------------------------- | -------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "workspaces"`) | Successfully created a workspace from a no-code module for no-code provisioning. | +| [404][] | [JSON API error object][] | Not found, or the user is unauthorized to perform this action. | +| [422][] | [JSON API error object][] | Malformed request body (e.g., missing attributes, wrong types, etc.). | +| [500][] | [JSON API error object][] | Internal system failure. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | | +| ------------------------------------------------------- | ------- | -------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | - | +| `data.type` | string | none | Must be `"workspaces"`. | | +| `data.attributes.agent-pool-id` | string | none | Required when `execution-mode` is set to `agent`. The ID of the agent pool belonging to the workspace's organization. This value must not be specified if `execution-mode` is set to `remote`. | | +| `data.attributes.auto_apply` | boolean | `false` | If `true`, Terraform automatically applies changes when a Terraform `plan` is successful. | | +| `data.attributes.description` | string | `""` | A description for the workspace. | | +| `data.attributes.execution-mode` | string | none | Which [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) to use. Valid values are `remote`, and `agent`. When not provided, defaults to `remote`. | | +| `data.attributes.name` | string | none | The name of the workspace. You can only include letters, numbers, `-`, and `_`. Terraform uses this value to identify the workspace and must be unique in the organization. | | +| `data.attributes.source-name` | string | none | A friendly name for the application or client creating this workspace. If set, this will be displayed on the workspace as "Created via ``". | | +| `data.attributes.source-url` | string | (nothing) | A URL for the application or client creating this workspace. This can be the URL of a related resource in another app, or a link to documentation or other info about the client. | | +| `data.attributes.terraform-version` | string | latest release | Specifies the version of Terraform to use for this workspace. You can specify an exact version or a [version constraint](/terraform/language/expressions/version-constraints) such as `~> 1.0.0`. If you specify a constraint, the workspace always uses the newest release that meets that constraint. If omitted when creating a workspace, this defaults to the latest released version. | | +| `data.relationships.project.data.id` | string | | The ID of the project to create the workspace in. You must have permission to create workspaces in the project, either by organization-level permissions or team admin access to a specific project. | | +| `data.relationships.project.data.type` | string | | Must be `"project"`. | | +| `data.relationships.vars.data[].type` | string | | Must be `"vars"`. | | +| `data.relationships.vars.data[].attributes.key` | string | | The name of the variable. | | +| `data.relationships.vars.data[].attributes.value` | string | `""` | The value of the variable. | | +| `data.relationships.vars.data[].attributes.description` | string | | The description of the variable. | | +| `data.relationships.vars.data[].attributes.category` | string | | Whether this is a Terraform or environment variable. Valid values are `"terraform"` or `"env"`. | | +| `data.relationships.vars.data[].attributes.hcl` | boolean | `false` | Whether to evaluate the value of the variable as a string of HCL code. Has no effect for environment variables. | | +| `data.relationships.vars.data[].attributes.sensitive` | boolean | `false` | Whether the value is sensitive. If `true` then the variable is written once and not visible thereafter. | | + +### Sample Payload + +```json +{ + "data": { + "type": "workspaces", + "attributes": { + "name": "no-code-workspace", + "description": "A workspace to enable the no-code provisioning workflow." + }, + "relationships": { + "project": { + "data": { + "id": "prj-yuEN6sJVra5t6XVy", + "type": "project" + } + }, + "vars": { + "data": [ + { + "type": "vars", + "attributes": { + "key": "region", + "value": "eu-central-1", + "category": "terraform", + "hcl": true, + "sensitive": false, + } + }, + { + "type": "vars", + "attributes": { + "key": "ami", + "value": "ami‑077062", + "category": "terraform", + "hcl": true, + "sensitive": false, + } + } + ] + } + } + } +} + +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/no-code-modules/nocode-WGckovT2RQxupyt1/workspaces +``` + +### Sample Response + +```json +{ + "data": { + "id": "ws-qACTToFUM5BvDKhC", + "type": "workspaces", + "attributes": { + "allow-destroy-plan": true, + "auto-apply": false, + "auto-destroy-at": null, + "auto-destroy-status": null, + "created-at": "2023-09-08T10:36:04.391Z", + "environment": "default", + "locked": false, + "name": "no-code-workspace", + "queue-all-runs": false, + "speculative-enabled": true, + "structured-run-output-enabled": true, + "terraform-version": "1.5.6", + "working-directory": null, + "global-remote-state": true, + "updated-at": "2023-09-08T10:36:04.427Z", + "resource-count": 0, + "apply-duration-average": null, + "plan-duration-average": null, + "policy-check-failures": null, + "run-failures": null, + "workspace-kpis-runs-count": null, + "latest-change-at": "2023-09-08T10:36:04.391Z", + "operations": true, + "execution-mode": "remote", + "vcs-repo": null, + "vcs-repo-identifier": null, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-queue-run": true, + "can-read-variable": true, + "can-update-variable": true, + "can-read-state-versions": true, + "can-read-state-outputs": true, + "can-create-state-versions": true, + "can-queue-apply": true, + "can-lock": true, + "can-unlock": true, + "can-force-unlock": true, + "can-read-settings": true, + "can-manage-tags": true, + "can-manage-run-tasks": true, + "can-force-delete": true, + "can-manage-assessments": true, + "can-manage-ephemeral-workspaces": true, + "can-read-assessment-results": true, + "can-queue-destroy": true + }, + "actions": { + "is-destroyable": true + }, + "description": null, + "file-triggers-enabled": true, + "trigger-prefixes": [], + "trigger-patterns": [], + "assessments-enabled": false, + "last-assessment-result-at": null, + "source": "tfe-module", + "source-name": null, + "source-url": null, + "source-module-id": "private/my-organization/lambda/aws/1.0.9", + "no-code-upgrade-available": false, + "tag-names": [], + "setting-overwrites": { + "execution-mode": false, + "agent-pool": false + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + }, + "current-run": { + "data": null + }, + "latest-run": { + "data": null + }, + "outputs": { + "data": [] + }, + "remote-state-consumers": { + "links": { + "related": "/api/v2/workspaces/ws-qACTToFUM5BvDKhC/relationships/remote-state-consumers" + } + }, + "current-state-version": { + "data": null + }, + "current-configuration-version": { + "data": { + "id": "cv-vizi2p3mnrt3utgA", + "type": "configuration-versions" + }, + "links": { + "related": "/api/v2/configuration-versions/cv-vizi2p3mnrt3utgA" + } + }, + "agent-pool": { + "data": null + }, + "readme": { + "data": null + }, + "project": { + "data": { + "id": "prj-yuEN6sJVra5t6XVy", + "type": "projects" + } + }, + "current-assessment-result": { + "data": null + }, + "no-code-module-version": { + "data": { + "id": "nocodever-vFcQjZLs3ZHTe4TU", + "type": "no-code-module-versions" + } + }, + "vars": { + "data": [] + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/workspaces/no-code-workspace", + "self-html": "/app/my-organization/workspaces/no-code-workspace" + } + } +} +``` + +## Initiate a no-code workspace update + +Upgrading a workspace's no-code provisioning settings is a multi-step process. + +1. Use this API to initiate the update. HCP Terraform starts a new plan, which describes the resources to add, update, or remove from the workspace. +2. Poll the [read workspace upgrade plan status API](#read-workspace-upgrade-plan-status) to wait for HCP Terraform to complete the plan. +3. Use the [confirm and apply a workspace upgrade plan API](#confirm-and-apply-a-workspace-upgrade-plan) to complete the workspace upgrade. + +`POST /no-code-modules/:no_code_module_id/workspaces/:id/upgrade` + +| Parameter | Description | +| -------------------- | ----------------------------- | +| `:no_code_module_id` | The ID of the no-code module. | +| `:id` | The ID of the workspace. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------------- | ------- | ------- | --------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"workspaces"`. | +| `data.relationships.vars.data[].type` | string | | Must be `"vars"`. | +| `data.relationships.vars.data[].attributes.key` | string | | The name of the variable. | +| `data.relationships.vars.data[].attributes.value` | string | `""` | The value of the variable. | +| `data.relationships.vars.data[].attributes.description` | string | | The description of the variable. | +| `data.relationships.vars.data[].attributes.category` | string | | Whether this is a Terraform or environment variable. Valid values are `"terraform"` or `"env"`. | +| `data.relationships.vars.data[].attributes.hcl` | boolean | `false` | Whether to evaluate the value of the variable as a string of HCL code. Has no effect for environment variables. | +| `data.relationships.vars.data[].attributes.sensitive` | boolean | `false` | Whether the value is sensitive. If `true` then the variable is written once and not visible thereafter. | + +### Sample Payload + +```json +{ + "data": { + "type": "workspaces", + "relationships": { + "vars": { + "data": [ + { + "type": "vars", + "attributes": { + "key": "region", + "value": "eu-central-1", + "category": "terraform", + "hcl": true, + "sensitive": false, + } + }, + { + "type": "vars", + "attributes": { + "key": "ami", + "value": "ami‑077062", + "category": "terraform", + "hcl": true, + "sensitive": false, + } + } + ] + } + } + } +} + +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/no-code-modules/nocode-WGckovT2RQxupyt1/workspaces/ws-qACTToFUM5BvDKhC/upgrade +``` + +### Sample Response + +```json +{ + "data": { + "id": "run-Cyij8ctBHM1g5xdX", + "type": "workspace-upgrade", + "attributes": { + "status": "planned", + "plan-url": "https://app.terraform.io/app/my-organization/no-code-workspace/runs/run-Cyij8ctBHM1g5xdX" + }, + "relationships": { + "workspace": { + "data": { + "id": "ws-VvKtcfueHNkR6GqP", + "type": "workspaces" + } + } + } + } +} +``` + +## Read workspace upgrade plan status + +This endpoint returns the plan details and status for updating a workspace to new no-code provisioning settings. + +`GET /no-code-modules/:no_code_module_id/workspaces/:workspace_id/upgrade/:id` + +| Parameter | Description | +| -------------------- | ----------------------------- | +| `:no_code_module_id` | The ID of the no-code module. | +| `:workspace_id` | The ID of workspace. | +| `:id` | The ID of update. | + +Returns the details of a no-code workspace update run, including the run's current state, such as `pending`, `fetching`, `planning`, `planned`, or `cost_estimated`. Refer to [Run States and Stages](/terraform/enterprise/run/states) for more information on the states a run can return. + +| Status | Response | Reason | +| ------- | --------------------------------------------------- | ------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "workspace-upgrade"`) | Success | +| [404][] | [JSON API error object][] | Workspace upgrade not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/no-code-modules/nocode-WGckovT2RQxupyt1/workspaces/ws-qACTToFUM5BvDKhC/upgrade/run-Cyij8ctBHM1g5xdX +``` + +### Sample Response + +```json +{ + "data": { + "id": "run-Cyij8ctBHM1g5xdX", + "type": "workspace-upgrade", + "attributes": { + "status": "planned_and_finished", + "plan-url": "https://app.terraform.io/app/my-organization/no-code-workspace/runs/run-Cyij8ctBHM1g5xdX" + }, + "relationships": { + "workspace": { + "data": { + "id": "ws-VvKtcfueHNkR6GqP", + "type": "workspaces" + } + } + } + } +} +``` + +## Confirm and apply a workspace upgrade plan + +Use this endpoint to confirm an update and finalize the update for a workspace to use new no-code provisioning settings. + +`POST /no-code-modules/:no_code_module_id/workspaces/:workspace_id/upgrade/:id` + +| Parameter | Description | +| -------------------- | ----------------------------- | +| `:no_code_module_id` | The ID of the no-code module. | +| `:workspace_id` | The ID of workspace. | +| `:id` | The ID of update. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/no-code-modules/nocode-WGckovT2RQxupyt1/workspaces/ws-qACTToFUM5BvDKhC/upgrade/run-Cyij8ctBHM1g5xdX +``` + +### Sample Response + +```json +{ "Workspace update completed" } +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/notification-configurations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/notification-configurations.mdx new file mode 100644 index 000000000..2fa78f811 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/notification-configurations.mdx @@ -0,0 +1,1437 @@ +--- +page_title: /notification-configurations API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/notification-configurations` endpoint to + read, create, update, verify, and delete workspace configurations and create + team configurations. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Notification configurations API reference + +HCP Terraform can send notifications for run state transitions and workspace events. You can specify a destination URL, request type, and what events will trigger the notification. Each workspace can have up to 20 notification configurations, and they apply to all runs for that workspace. + +Interacting with notification configurations requires admin access to the relevant workspace. ([More about permissions](/terraform/enterprise/users-teams-organizations/permissions).) + +-> **Note:** [Speculative plans](/terraform/enterprise/run/modes-and-options#plan-only-speculative-plan) and workspaces configured with `Local` [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) do not support notifications. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Notification triggers + +Notifications are sent in response to triggers related to workspace events, and can be defined at workspace and team levels. You can specify workspace events in the `triggers` array attribute. + +### Workspace notification triggers + +The following triggers are available for workspace notifications. + +| Display Name | Value | Description | +| ------------------------ | -------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| Created | `"run:created"` | A run is created and enters the [Pending stage](/terraform/enterprise/run/states#the-pending-stage) | +| Planning | `"run:planning"` | A run acquires the lock and starts to execute. | +| Needs Attention | `"run:needs_attention"` | A plan has changes and Terraform requires user input to continue. This input may include approving the plan or a [policy override](/terraform/enterprise/run/states#the-policy-check-stage). | +| Applying | `"run:applying"` | A run enters the [Apply stage](/terraform/enterprise/run/states#the-apply-stage), where Terraform makes the infrastructure changes described in the plan. | +| Completed | `"run:completed"` | A run completes successfully. | +| Errored | `"run:errored"` | A run terminates early due to error or cancellation. | +| Drifted | `"assessment:drifted"` | HCP Terraform detected configuration drift. This option is only available if you enabled drift detection for the workspace. | +| Checks Failed | `"assessment:check_failure"` | One or more continuous validation checks did not pass. This option is only available if you enabled drift detection for the workspace. | +| Health Assessment Failed | `"assessment:failed"` | A health assessment failed. This option is only available if you enable health assessments for the workspace. | +| Auto Destroy Reminder | `"workspace:auto_destro_reminder"` | An automated workspace destroy run is imminent. | +| Auto Destroy Results | `"workspace:auto_destroy_run_results"` | HCP Terraform attempted an automated workspace destroy run. | + +### Team notification triggers + +The following triggers are available for [team notifications](#team-notification-configuration). + +| Display Name | Value | Description | +| -------------- | ----------------------- | -------------------------------------------------------------------------------------------------- | +| Change Request | `"team:change_request"` | HCP Terraform sent a change request to a workspace that the specified team has explicit access to. | + +## Notification payload + +The notification is an HTTP POST request with a detailed payload. The content depends on the type of notification. + +For Slack and Microsoft Teams notifications, the payload conforms to the respective webhook API and results in a notification message with informational attachments. Refer to [Slack Notification Payloads](/terraform/enterprise/workspaces/settings/notifications#slack) and [Microsoft Teams Notification Payloads](/terraform/enterprise/workspaces/settings/notifications#microsoft-teams) for examples. For generic notifications, the payload varies based on whether the notification contains information about run events or workspace events. + +### Run notification payload + +Run events include detailed information about a specific run, including the time it began and the associated workspace and organization. Generic notifications for run events contain the following information: + +| Name | Type | Description | +| -------------------------------- | ------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `payload_version` | number | Always "1". | +| `notification_configuration_id` | string | The ID of the configuration associated with this notification. | +| `run_url` | string | URL used to access the run UI page. | +| `run_id` | string | ID of the run which triggered this notification. | +| `run_message` | string | The reason the run was queued. | +| `run_created_at` | string | Timestamp of the run's creation. | +| `run_created_by` | string | Username of the user who created the run. | +| `workspace_id` | string | ID of the run's workspace. | +| `workspace_name` | string | Human-readable name of the run's workspace. | +| `organization_name` | string | Human-readable name of the run's organization. | +| `notifications` | array | List of events which caused this notification to be sent, with each event represented by an object. At present, this is always one event, but in the future HCP Terraform may roll up several notifications for a run into a single request. | +| `notifications[].message` | string | Human-readable reason for the notification. | +| `notifications[].trigger` | string | Value of the trigger which caused the notification to be sent. | +| `notifications[].run_status` | string | Status of the run at the time of notification. | +| `notifications[].run_updated_at` | string | Timestamp of the run's update. | +| `notifications[].run_updated_by` | string | Username of the user who caused the run to update. | + +#### Sample payload + +```json +{ + "payload_version": 1, + "notification_configuration_id": "nc-AeUQ2zfKZzW9TiGZ", + "run_url": "https://app.terraform.io/app/acme-org/my-workspace/runs/run-FwnENkvDnrpyFC7M", + "run_id": "run-FwnENkvDnrpyFC7M", + "run_message": "Add five new queue workers", + "run_created_at": "2019-01-25T18:34:00.000Z", + "run_created_by": "sample-user", + "workspace_id": "ws-XdeUVMWShTesDMME", + "workspace_name": "my-workspace", + "organization_name": "acme-org", + "notifications": [ + { + "message": "Run Canceled", + "trigger": "run:errored", + "run_status": "canceled", + "run_updated_at": "2019-01-25T18:37:04.000Z", + "run_updated_by": "sample-user" + } + ] +} +``` + +### Change request notification payload + +Change request events contain the following fields in their payloads. + +| Name | Type | Description | +| ------------------------------- | ------ | -------------------------------------------------------------- | +| `payload_version` | number | Always "1". | +| `notification_configuration_id` | string | The ID of the configuration associated with this notification. | +| `change_request_url` | string | URL used to access the change request UI page. | +| `change_request_subject` | string | title of the change request which triggered this notification. | +| `change_request_message` | string | The contents of the change request. | +| `change_request_created_at` | string | Timestamp of the change request's creation. | +| `change_request_created_by` | string | Username of the user who created the change_request. | +| `workspace_id` | string | ID of the run's workspace. | +| `workspace_name` | string | Human-readable name of the run's workspace. | +| `organization_name` | string | Human-readable name of the run's organization. | + +##### `Send a test` payload + +This is a sample payload you can send to test if notifications are working. The payload does not have a `run` or `workspace` context, resulting in null values. + +You can trigger a test notification from the workspace notification settings page. You can read more about verifying a [notification configuration](/terraform/enterprise/workspaces/settings/notifications#enabling-and-verifying-a-configuration). + +```json +{ + "payload_version": 1, + "notification_configuration_id": "nc-jWvVsmp5VxsaCeXm", + "run_url": null, + "run_id": null, + "run_message": null, + "run_created_at": null, + "run_created_by": null, + "workspace_id": null, + "workspace_name": null, + "organization_name": null, + "notifications": [ + { + "message": "Verification of test", + "trigger": "verification", + "run_status": null, + "run_updated_at": null, + "run_updated_by": null, + } + ] +} +``` + +### Workspace notification payload + +Workspace events include detailed information about workspace-level validation events like [health assessments](/terraform/enterprise/workspaces/health) if you enable them for the workspace. Much of the information provides details about the associated [assessment result](/terraform/enterprise/api-docs/assessment-results), which HCP Terraform uses to track instances of continuous validation. + +HCP Terraform returns different types of attributes returned in the payload details, depending on the type of `trigger_scope`. There are two main values for `trigger_scope`: `assessment` and `workspace`, examples of which you can see below. + +#### Health assessments + +Health assessment notifications for workspace events contain the following information: + + + +@include 'tfc-package-callouts/health-assessments.mdx' + + + +| Name | Type | Description | +| ------------------------------------------------------ | ------ | ------------------------------------------------------------------------------------------- | +| `payload_version` | number | Always "2". | +| `notification_configuration_id` | string | The ID of the configuration associated with this notification. | +| `notification_configuration_url` | string | URL to get the notification configuration from the HCP Terraform API. | +| `trigger_scope` | string | Always "assessment" for workspace assessment notifications. | +| `trigger` | string | Value of the trigger that caused the notification to be sent. | +| `message` | string | Human-readable reason for the notification. | +| `details` | object | Object containing details specific to the notification. | +| `details.new_assessment_result` | object | The most recent assessment result. This result triggered the notification. | +| `details.new_assessment_result.id` | string | ID of the assessment result. | +| `details.new_assessment_result.url` | string | URL to get the assessment result from the HCP Terraform API. | +| `details.new_assessment_result.succeeded` | bool | Whether assessment succeeded. | +| `details.new_assessment_result.all_checks_succeeded` | bool | Whether all conditions passed. | +| `details.new_assessment_result.checks_passed` | number | The number of resources, data sources, and outputs passing their conditions. | +| `details.new_assessment_result.checks_failed` | number | The number of resources, data sources, and outputs with one or more failing conditions. | +| `details.new_assessment_result.checks_errored` | number | The number of resources, data sources, and outputs that had a condition error. | +| `details.new_assessment_result.checks_unknown` | number | The number of resources, data sources, and outputs that had conditions left unevaluated. | +| `details.new_assessment_result.drifted` | bool | Whether assessment detected drift. | +| `details.new_assessment_result.resources_drifted` | number | The number of resources whose configuration does not match from the workspace's state file. | +| `details.new_assessment_result.resources_undrifted` | number | The number of real resources whose configuration matches the workspace's state file. | +| `details.new_assessment_result.created_at` | string | Timestamp for when HCP Terraform created the assessment result. | +| `details.prior_assessment_result` | object | The assessment result immediately prior to the one that triggered the notification. | +| `details.prior_assessment_result.id` | string | ID of the assessment result. | +| `details.prior_assessment_result.url` | string | URL to get the assessment result from the HCP Terraform API. | +| `details.prior_assessment_result.succeeded` | bool | Whether assessment succeeded. | +| `details.prior_assessment_result.all_checks_succeeded` | bool | Whether all conditions passed. | +| `details.prior_assessment_result.checks_passed` | number | The number of resources, data sources, and outputs passing their conditions. | +| `details.prior_assessment_result.checks_failed` | number | The number of resources, data sources, and outputs with one or more failing conditions. | +| `details.prior_assessment_result.checks_errored` | number | The number of resources, data sources, and outputs that had a condition error. | +| `details.prior_assessment_result.checks_unknown` | number | The number of resources, data sources, and outputs that had conditions left unevaluated. | +| `details.prior_assessment_result.drifted` | bool | Whether assessment detected drift. | +| `details.prior_assessment_result.resources_drifted` | number | The number of resources whose configuration does not match the workspace's state file. | +| `details.prior_assessment_result.resources_undrifted` | number | The number of resources whose configuration matches the workspace's state file. | +| `details.prior_assessment_result.created_at` | string | Timestamp of the assessment result. | +| `details.workspace_id` | string | ID of the workspace that generated the notification. | +| `details.workspace_name` | string | Human-readable name of the workspace. | +| `details.organization_name` | string | Human-readable name of the organization. | + +##### Sample payload + +Health assessment payloads have information about resource drift and continuous validation checks. + +```json +{ + "payload_version": "2", + "notification_configuration_id": "nc-SZ3V3cLFxK6sqLKn", + "notification_configuration_url": "https://app.terraform.io/api/v2/notification-configurations/nc-SZ3V3cLFxK6sqLKn", + "trigger_scope": "assessment", + "trigger": "assessment:drifted", + "message": "Drift Detected", + "details": { + "new_assessment_result": { + "id": "asmtres-vRVQxpqq64EA9V5a", + "url": "https://app.terraform.io/api/v2/assessment-results/asmtres-vRVQxpqq64EA9V5a", + "succeeded": true, + "drifted": true, + "all_checks_succeeded": true, + "resources_drifted": 4, + "resources_undrifted": 55, + "checks_passed": 33, + "checks_failed": 0, + "checks_errored": 0, + "checks_unknown": 0, + "created_at": "2022-06-09T05:23:10Z" + }, + "prior_assessment_result": { + "id": "asmtres-A6zEbpGArqP74fdL", + "url": "https://app.terraform.io/api/v2/assessment-results/asmtres-A6zEbpGArqP74fdL", + "succeeded": true, + "drifted": true, + "all_checks_succeeded": true, + "resources_drifted": 4, + "resources_undrifted": 55, + "checks_passed": 33, + "checks_failed": 0, + "checks_errored": 0, + "checks_unknown": 0, + "created_at": "2022-06-09T05:22:51Z" + }, + "workspace_id": "ws-XdeUVMWShTesDMME", + "workspace_name": "my-workspace", + "organization_name": "acme-org" + } +} +``` + +#### Automatic destroy runs + + + +@include 'tfc-package-callouts/ephemeral-workspaces.mdx' + + + +Automatic destroy run notifications for workspace events contain the following information: + +| Name | Type | Description | +| ---------------------------------- | ------ | ---------------------------------------------------------------------------------------------------------- | +| `payload_version` | string | Always 2. | +| `notification_configuration_id` | string | The ID of the notification's configuration. | +| `notification_configuration_url` | string | The URL to get the notification's configuration from the HCP Terraform API. | +| `trigger_scope` | string | Always "workspace" for ephemeral workspace notifications | +| `trigger` | string | Value of the trigger that caused HCP Terraform to send the notification. | +| `message` | string | Human-readable reason for the notification. | +| `details` | object | Object containing details specific to the notification. | +| `details.auto_destroy_at` | string | Timestamp when HCP Terraform will schedule the next destroy run. Only applies to reminder notifications. | +| `details.run_created_at` | string | Timestamp of when HCP Terraform successfully created a destroy run. Only applies to results notifications. | +| `details.run_status` | string | Status of the scheduled destroy run. Only applies to results notifications. | +| `details.run_external_id` | string | The ID of the scheduled destroy run. Only applies to results notifications. | +| `details.run_create_error_message` | string | Message detailing why the run was unable to be queued. Only applies to results notifications. | +| `details.trigger_type` | string | The type of notification, and the value is either "reminder" or "results". | +| `details.workspace_name` | string | Human-readable name of the workspace. | +| `details.organization_name` | string | Human-readable name of the organization. | + +##### Sample payload + +The shape of data in auto destroy notification payloads may differ depending on the success of the run HCP Terraform created. Refer to the specific examples below. + +###### Reminder + +Reminders that HCP Terraform will trigger a destroy run at some point in the future. + +```json +{ + "payload_version": "2", + "notification_configuration_id": "nc-SZ3V3cLFxK6sqLKn", + "notification_configuration_url": "https://app.terraform.io/api/v2/notification-configurations/nc-SZ3V3cLFxK6sqLKn", + "trigger_scope": "workspace", + "trigger": "workspace:auto_destroy_reminder", + "message": "Auto Destroy Reminder", + "details": { + "auto_destroy_at": "2025-01-01T00:00:00Z", + "run_created_at": null, + "run_status": null, + "run_external_id": null, + "run_create_error_message": null, + "trigger_type": "reminder", + "workspace_name": "learned-english-dog", + "organization_name": "acme-org" + } +} +``` + +###### Results + +The final result of the scheduled auto destroy run includes additional metadata about the run. + +```json +{ + "payload_version": "2", + "notification_configuration_id": "nc-SZ3V3cLFxK6sqLKn", + "notification_configuration_url": "https://app.terraform.io/api/v2/notification-configurations/nc-SZ3V3cLFxK6sqLKn", + "trigger_scope": "workspace", + "trigger": "workspace:auto_destroy_results", + "message": "Auto Destroy Results", + "details": { + "auto_destroy_at": null, + "run_created_at": "2022-06-09T05:22:51Z", + "run_status": "applied", + "run_external_id": "run-vRVQxpqq64EA9V5a", + "run_create_error_message": null, + "trigger_type": "results", + "workspace_name": "learned-english-dog", + "organization_name": "acme-org" + } +} +``` + +###### Failed run creation + +Run-specific values are empty when HCP Terraform was unable to create an auto destroy run. + +```json +{ + "payload_version": "2", + "notification_configuration_id": "nc-SZ3V3cLFxK6sqLKn", + "notification_configuration_url": "https://app.terraform.io/api/v2/notification-configurations/nc-SZ3V3cLFxK6sqLKn", + "trigger_scope": "workspace", + "trigger": "workspace:auto_destroy_results", + "message": "Auto Destroy Results", + "details": { + "auto_destroy_at": null, + "run_created_at": null, + "run_status": null, + "run_external_id": null, + "run_create_error_message": "Configuration version is missing", + "trigger_type": "results", + "workspace_name": "learned-english-dog", + "organization_name": "acme-org" + } +} +``` + +## Notification authenticity + +If a `token` is configured, HCP Terraform provides an HMAC signature on all `"generic"` notification requests, using the `token` as the key. This is sent in the `X-TFE-Notification-Signature` header. The digest algorithm used is SHA-512. Notification target servers should verify the source of the HTTP request by computing the HMAC of the request body using the same shared secret, and dropping any requests with invalid signatures. + +Sample Ruby code for verifying the HMAC: + +```ruby +token = SecureRandom.hex +hmac = OpenSSL::HMAC.hexdigest(OpenSSL::Digest.new("sha512"), token, @request.body) +fail "Invalid HMAC" if hmac != @request.headers["X-TFE-Notification-Signature"] +``` + +## Notification verification and delivery responses + +When saving a configuration with `enabled` set to `true`, or when using the [verify API][], HCP Terraform sends a verification request to the configured URL. The response to this request is stored and available in the `delivery-responses` array of the `notification-configuration` resource. + +Configurations cannot be enabled if the verification request fails. Success is defined as an HTTP response with status code of `2xx`. +Configurations with `destination_type` `email` can only be verified manually, they do not require an HTTP response. + +The most recent response is stored in the `delivery-responses` array. + +Each delivery response has several fields: + +| Name | Type | Description | +| ------------ | ------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `body` | string | Response body (may be truncated). | +| `code` | string | HTTP status code, e.g. `400`. | +| `headers` | object | All HTTP headers received, represented as an object with keys for each header name (lowercased) and an array of string values (most arrays will be size one). | +| `sent-at` | date | The UTC timestamp when the notification was sent. | +| `successful` | bool | Whether HCP Terraform considers this response to be successful. | +| `url` | string | The URL to which the request was sent. | + +[verify API]: #verify-a-notification-configuration + +## Create a notification configuration + +`POST /workspaces/:workspace_id/notification-configurations` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:workspace_id` | The ID of the workspace to list configurations for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +| Status | Response | Reason | +| ------- | ------------------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "notification-configurations"`) | Successfully created a notification configuration | +| [400][] | [JSON API error object][] | Unable to complete verification request to destination URL | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +If `enabled` is set to `true`, a verification request will be sent before saving the configuration. If this request receives no response or the response is not successful (HTTP 2xx), the configuration will not save. + +| Key path | Type | Default | Description | +| ---------------------------------- | -------------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"notification-configuration"`. | +| `data.attributes.destination-type` | string | | Type of notification payload to send. Valid values are `"generic"`, `"email"`, `"slack"` or `"microsoft-teams"`. | +| `data.attributes.enabled` | bool | `false` | Disabled configurations will not send any notifications. | +| `data.attributes.name` | string | | Human-readable name for the configuration. | +| `data.attributes.token` | string or null | `null` | Optional write-only secure token, which can be used at the receiving server to verify request authenticity. See [Notification Authenticity][notification-authenticity] for more details. | +| `data.attributes.triggers` | array | `[]` | Array of triggers for which this configuration will send notifications. See [Notification Triggers][notification-triggers] for more details and a list of allowed values. | +| `data.attributes.url` | string | | HTTP or HTTPS URL to which notification requests will be made, only for configurations with `"destination_type:"` `"slack"`, `"microsoft-teams"` or `"generic"` | +| `data.relationships.users` | array | | Array of users part of the organization, only for configurations with `"destination_type:"` `"email"` | + +[notification-authenticity]: #notification-authenticity + +[notification-triggers]: #notification-triggers + +### Sample payload for generic notification configurations + +```json +{ + "data": { + "type": "notification-configuration", + "attributes": { + "destination-type": "generic", + "enabled": true, + "name": "Webhook server test", + "url": "https://httpstat.us/200", + "triggers": [ + "run:applying", + "run:completed", + "run:created", + "run:errored", + "run:needs_attention", + "run:planning" + ] + } + } +} +``` + +### Sample payload for email notification configurations + +```json +{ + "data": { + "type": "notification-configurations", + "attributes": { + "destination-type": "email", + "enabled": true, + "name": "Notify organization users about run", + "triggers": [ + "run:applying", + "run:completed", + "run:created", + "run:errored", + "run:needs_attention", + "run:planning" + ] + }, + "relationships": { + "users": { + "data": [ { "id": "organization-user-id", "type": "users" } ] + } + } + } +} +``` + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-XdeUVMWShTesDMME/notification-configurations +``` + +### Sample response + +```json +{ + "data": { + "id": "nc-AeUQ2zfKZzW9TiGZ", + "type": "notification-configurations", + "attributes": { + "enabled": true, + "name": "Webhook server test", + "url": "https://httpstat.us/200", + "destination-type": "generic", + "token": null, + "triggers": [ + "run:applying", + "run:completed", + "run:created", + "run:errored", + "run:needs_attention", + "run:planning" + ], + "delivery-responses": [ + { + "url": "https://httpstat.us/200", + "body": "\"200 OK\"", + "code": "200", + "headers": { + "cache-control": [ + "private" + ], + "content-length": [ + "129" + ], + "content-type": [ + "application/json; charset=utf-8" + ], + "content-encoding": [ + "gzip" + ], + "vary": [ + "Accept-Encoding" + ], + "server": [ + "Microsoft-IIS/10.0" + ], + "x-aspnetmvc-version": [ + "5.1" + ], + "access-control-allow-origin": [ + "*" + ], + "x-aspnet-version": [ + "4.0.30319" + ], + "x-powered-by": [ + "ASP.NET" + ], + "set-cookie": [ + "ARRAffinity=77c477e3e649643e5771873e1a13179fb00983bc73c71e196bf25967fd453df9;Path=/;HttpOnly;Domain=httpstat.us" + ], + "date": [ + "Tue, 08 Jan 2019 21:34:37 GMT" + ] + }, + "sent-at": "2019-01-08 21:34:37 UTC", + "successful": "true" + } + ], + "created-at": "2019-01-08T21:32:14.125Z", + "updated-at": "2019-01-08T21:34:37.274Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ" + } + } +} +``` + +## List notification configurations + +Use the following endpoint to list all notification configurations for a workspace. + +`GET /workspaces/:workspace_id/notification-configurations` + +| Parameter | Description | +| --------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The ID of the workspace to list configurations from. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results. | + +### Query parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ------------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 notification configurations per page. | + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/workspaces/ws-XdeUVMWShTesDMME/notification-configurations +``` + +### Sample response + +```json +{ + "data": [ + { + "id": "nc-W6VGEi8A7Cfoaf4K", + "type": "notification-configurations", + "attributes": { + "enabled": false, + "name": "Slack: #devops", + "url": "https://hooks.slack.com/services/T00000000/BC012345/0PWCpQmYyD4bTTRYZ53q4w", + "destination-type": "slack", + "token": null, + "triggers": [ + "run:errored", + "run:needs_attention" + ], + "delivery-responses": [], + "created-at": "2019-01-08T21:34:28.367Z", + "updated-at": "2019-01-08T21:34:28.367Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-W6VGEi8A7Cfoaf4K" + } + }, + { + "id": "nc-AeUQ2zfKZzW9TiGZ", + "type": "notification-configurations", + "attributes": { + "enabled": true, + "name": "Webhook server test", + "url": "https://httpstat.us/200", + "destination-type": "generic", + "token": null, + "triggers": [ + "run:applying", + "run:completed", + "run:created", + "run:errored", + "run:needs_attention", + "run:planning" + ], + "delivery-responses": [ + { + "url": "https://httpstat.us/200", + "body": "\"200 OK\"", + "code": "200", + "headers": { + "cache-control": [ + "private" + ], + "content-length": [ + "129" + ], + "content-type": [ + "application/json; charset=utf-8" + ], + "content-encoding": [ + "gzip" + ], + "vary": [ + "Accept-Encoding" + ], + "server": [ + "Microsoft-IIS/10.0" + ], + "x-aspnetmvc-version": [ + "5.1" + ], + "access-control-allow-origin": [ + "*" + ], + "x-aspnet-version": [ + "4.0.30319" + ], + "x-powered-by": [ + "ASP.NET" + ], + "set-cookie": [ + "ARRAffinity=77c477e3e649643e5771873e1a13179fb00983bc73c71e196bf25967fd453df9;Path=/;HttpOnly;Domain=httpstat.us" + ], + "date": [ + "Tue, 08 Jan 2019 21:34:37 GMT" + ] + }, + "sent-at": "2019-01-08 21:34:37 UTC", + "successful": "true" + } + ], + "created-at": "2019-01-08T21:32:14.125Z", + "updated-at": "2019-01-08T21:34:37.274Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ" + } + } + ] +} + +``` + +## Show a notification configuration + +`GET /notification-configurations/:notification-configuration-id` + +| Parameter | Description | +| -------------------------------- | ------------------------------------------------- | +| `:notification-configuration-id` | The id of the notification configuration to show. | + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ +``` + +### Sample response + +The `type` and `id` attributes in `relationships.subscribable` may also reference a `"teams"` and team ID, respectively. + +```json +{ + "data": { + "id": "nc-AeUQ2zfKZzW9TiGZ", + "type": "notification-configurations", + "attributes": { + "enabled": true, + "name": "Webhook server test", + "url": "https://httpstat.us/200", + "destination-type": "generic", + "token": null, + "triggers": [ + "run:applying", + "run:completed", + "run:created", + "run:errored", + "run:needs_attention", + "run:planning" + ], + "delivery-responses": [ + { + "url": "https://httpstat.us/200", + "body": "\"200 OK\"", + "code": "200", + "headers": { + "cache-control": [ + "private" + ], + "content-length": [ + "129" + ], + "content-type": [ + "application/json; charset=utf-8" + ], + "content-encoding": [ + "gzip" + ], + "vary": [ + "Accept-Encoding" + ], + "server": [ + "Microsoft-IIS/10.0" + ], + "x-aspnetmvc-version": [ + "5.1" + ], + "access-control-allow-origin": [ + "*" + ], + "x-aspnet-version": [ + "4.0.30319" + ], + "x-powered-by": [ + "ASP.NET" + ], + "set-cookie": [ + "ARRAffinity=77c477e3e649643e5771873e1a13179fb00983bc73c71e196bf25967fd453df9;Path=/;HttpOnly;Domain=httpstat.us" + ], + "date": [ + "Tue, 08 Jan 2019 21:34:37 GMT" + ] + }, + "sent-at": "2019-01-08 21:34:37 UTC", + "successful": "true" + } + ], + "created-at": "2019-01-08T21:32:14.125Z", + "updated-at": "2019-01-08T21:34:37.274Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ" + } + } +} +``` + +## Update a notification configuration + +`PATCH /notification-configurations/:notification-configuration-id` + +| Parameter | Description | +| -------------------------------- | --------------------------------------------------- | +| `:notification-configuration-id` | The id of the notification configuration to update. | + +If the `enabled` attribute is true, updating the configuration will cause HCP Terraform to send a verification request. If a response is received, it will be stored and returned in the `delivery-responses` attribute. More details in the [Notification Verification and Delivery Responses][] section above. + +[Notification Verification and Delivery Responses]: #notification-verification-and-delivery-responses + +| Status | Response | Reason | +| ------- | ------------------------------------------------------------- | ---------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "notification-configurations"`) | Successfully updated the notification configuration | +| [400][] | [JSON API error object][] | Unable to complete verification request to destination URL | +| [404][] | [JSON API error object][] | Notification configuration not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +If `enabled` is set to `true`, a verification request will be sent before saving the configuration. If this request fails to send, or the response is not successful (HTTP 2xx), the configuration will not save. + +| Key path | Type | Default | Description | +| -------------------------- | ------ | ---------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | (previous value) | Must be `"notification-configuration"`. | +| `data.attributes.enabled` | bool | (previous value) | Disabled configurations will not send any notifications. | +| `data.attributes.name` | string | (previous value) | User-readable name for the configuration. | +| `data.attributes.token` | string | (previous value) | Optional write-only secure token, which can be used at the receiving server to verify request authenticity. See [Notification Authenticity][notification-authenticity] for more details. | +| `data.attributes.triggers` | array | (previous value) | Array of triggers for sending notifications. See [Notification Triggers][notification-triggers] for more details. | +| `data.attributes.url` | string | (previous value) | HTTP or HTTPS URL to which notification requests will be made, only for configurations with `"destination_type:"` `"slack"`, `"microsoft-teams"` or `"generic"` | +| `data.relationships.users` | array | | Array of users part of the organization, only for configurations with `"destination_type:"` `"email"` | + +[notification-authenticity]: #notification-authenticity + +[notification-triggers]: #notification-triggers + +### Sample payload + +```json +{ + "data": { + "id": "nc-W6VGEi8A7Cfoaf4K", + "type": "notification-configurations", + "attributes": { + "enabled": false, + "name": "Slack: #devops", + "url": "https://hooks.slack.com/services/T00000001/BC012345/0PWCpQmYyD4bTTRYZ53q4w", + "destination-type": "slack", + "token": null, + "triggers": [ + "run:created", + "run:errored", + "run:needs_attention" + ], + } + } +} +``` + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/notification-configurations/nc-W6VGEi8A7Cfoaf4K +``` + +### Sample response + +```json +{ + "data": { + "id": "nc-W6VGEi8A7Cfoaf4K", + "type": "notification-configurations", + "attributes": { + "enabled": false, + "name": "Slack: #devops", + "url": "https://hooks.slack.com/services/T00000001/BC012345/0PWCpQmYyD4bTTRYZ53q4w", + "destination-type": "slack", + "token": null, + "triggers": [ + "run:created", + "run:errored", + "run:needs_attention" + ], + "delivery-responses": [], + "created-at": "2019-01-08T21:34:28.367Z", + "updated-at": "2019-01-08T21:49:02.103Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-W6VGEi8A7Cfoaf4K" + } + }, +} +``` + +## Verify a notification configuration + +`POST /notification-configurations/:notification-configuration-id/actions/verify` + +| Parameter | Description | +| -------------------------------- | --------------------------------------------------- | +| `:notification-configuration-id` | The id of the notification configuration to verify. | + +This will cause HCP Terraform to send a verification request for the specified configuration. If a response is received, it will be stored and returned in the `delivery-responses` attribute. More details in the [Notification Verification and Delivery Responses][] section above. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------------- | ---------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "notification-configurations"`) | Successfully verified the notification configuration | +| [400][] | [JSON API error object][] | Unable to complete verification request to destination URL | + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ/actions/verify +``` + +### Sample response + +```json +{ + "data": { + "id": "nc-AeUQ2zfKZzW9TiGZ", + "type": "notification-configurations", + "attributes": { + "enabled": true, + "name": "Webhook server test", + "url": "https://httpstat.us/200", + "destination-type": "generic", + "token": null, + "triggers": [ + "run:applying", + "run:completed", + "run:created", + "run:errored", + "run:needs_attention", + "run:planning" + ], + "delivery-responses": [ + { + "url": "https://httpstat.us/200", + "body": "\"200 OK\"", + "code": "200", + "headers": { + "cache-control": [ + "private" + ], + "content-length": [ + "129" + ], + "content-type": [ + "application/json; charset=utf-8" + ], + "content-encoding": [ + "gzip" + ], + "vary": [ + "Accept-Encoding" + ], + "server": [ + "Microsoft-IIS/10.0" + ], + "x-aspnetmvc-version": [ + "5.1" + ], + "access-control-allow-origin": [ + "*" + ], + "x-aspnet-version": [ + "4.0.30319" + ], + "x-powered-by": [ + "ASP.NET" + ], + "set-cookie": [ + "ARRAffinity=77c477e3e649643e5771873e1a13179fb00983bc73c71e196bf25967fd453df9;Path=/;HttpOnly;Domain=httpstat.us" + ], + "date": [ + "Tue, 08 Jan 2019 21:34:37 GMT" + ] + }, + "sent-at": "2019-01-08 21:34:37 UTC", + "successful": "true" + } + ], + "created-at": "2019-01-08T21:32:14.125Z", + "updated-at": "2019-01-08T21:34:37.274Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ" + } + } +} +``` + +## Delete a notification configuration + +This endpoint deletes a notification configuration. + +`DELETE /notification-configurations/:notification-configuration-id` + +| Parameter | Description | +| -------------------------------- | --------------------------------------------------- | +| `:notification-configuration-id` | The id of the notification configuration to delete. | + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------------------------------------------------------- | +| [204][] | None | Successfully deleted the notification configuration | +| [404][] | [JSON API error object][] | Notification configuration not found, or user unauthorized to perform action | + +### Sample request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ +``` + +## Team notification configuration + +Team notifications allow you to configure relevant alerts that notify teams you specify whenever a certain event occurs. + + + +@include 'tfc-package-callouts/notifications.mdx' + + + +### Create a team notification configuration + +By default, every team has a default email notification configuration with no users assigned. If a notification configuration has no users assigned, HCP Terraform sends email notifications to all team members. + +Use this endpoint to create a notification configuration to notify a team. + +`POST /teams/:team_id/notification-configurations` + +| Parameter | Description | +| ---------- | ------------------------------------------------- | +| `:team_id` | The ID of the team to create a configuration for. | + +| Status | Response | Reason | +| ------- | ------------------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "notification-configurations"`) | Successfully created a notification configuration | +| [400][] | [JSON API error object][] | Unable to complete verification request to destination URL | +| [404][] | [JSON API error object][] | Team not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +#### Request body + +This `POST` endpoint requires a JSON object with the following properties as a request payload. Properties without a default value are required. + +If `enabled` is set to `true`, HCP Terraform sends a verification request before saving the configuration. If this request does not receive a response or the response is not successful (HTTP 2xx), the configuration will not be saved. + +| Key path | Type | Default | Description | +| ----------------------------------- | -------------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"notification-configuration"`. | +| `data.attributes.destination-type` | string | | Type of notification payload to send. Valid values are `"generic"`, `"email"`, `"slack"` or `"microsoft-teams"`. | +| `data.attributes.enabled` | bool | `false` | Disabled configurations will not send any notifications. | +| `data.attributes.name` | string | | Human-readable name for the configuration. | +| `data.attributes.token` | string or null | `null` | Optional write-only secure token, which can be used at the receiving server to verify request authenticity. See [Notification Authenticity][notification-authenticity] for more details. | +| `data.attributes.triggers` | array | `[]` | Array of triggers for which this configuration will send notifications. See [Notification Triggers][notification-triggers] for more details and a list of allowed values. | +| `data.attributes.url` | string | | HTTP or HTTPS URL to which notification requests will be made, only for configurations with `"destination_type:"` `"slack"`, `"microsoft-teams"` or `"generic"` | +| `data.attributes.email_all_members` | bool | | Email all team members, only for configurations with `"destination_type:" "email"`. | +| `data.relationships.users` | array | | Array of users part of the organization, only for configurations with `"destination_type:"` `"email"` | + +[notification-authenticity]: #notification-authenticity + +[notification-triggers]: #notification-triggers + +#### Sample payload for generic notification configurations + +```json +{ + "data": { + "type": "notification-configuration", + "attributes": { + "destination-type": "generic", + "enabled": true, + "name": "Webhook server test", + "url": "https://httpstat.us/200", + "triggers": [ + "change_request:created" + ] + } + } +} +``` + +#### Sample payload for email notification configurations + +```json +{ + "data": { + "type": "notification-configurations", + "attributes": { + "destination-type": "email", + "enabled": true, + "name": "Email teams about change requests", + "triggers": [ + "change_request:created" + ] + }, + "relationships": { + "users": { + "data": [ { "id": "organization-user-id", "type": "users" } ] + } + } + } +} +``` + +#### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/teams/team-6p5jTwJQXwqZBncC/notification-configurations +``` + +#### Sample response + +```json +{ + "data": { + "id": "nc-AeUQ2zfKZzW9TiGZ", + "type": "notification-configurations", + "attributes": { + "enabled": true, + "name": "Webhook server test", + "url": "https://httpstat.us/200", + "destination-type": "generic", + "token": null, + "triggers": [ + "change_request:created" + ], + "delivery-responses": [ + { + "url": "https://httpstat.us/200", + "body": "\"200 OK\"", + "code": "200", + "headers": { + "cache-control": [ + "private" + ], + "content-length": [ + "129" + ], + "content-type": [ + "application/json; charset=utf-8" + ], + "content-encoding": [ + "gzip" + ], + "vary": [ + "Accept-Encoding" + ], + "server": [ + "Microsoft-IIS/10.0" + ], + "x-aspnetmvc-version": [ + "5.1" + ], + "access-control-allow-origin": [ + "*" + ], + "x-aspnet-version": [ + "4.0.30319" + ], + "x-powered-by": [ + "ASP.NET" + ], + "set-cookie": [ + "ARRAffinity=77c477e3e649643e5771873e1a13179fb00983bc73c71e196bf25967fd453df9;Path=/;HttpOnly;Domain=httpstat.us" + ], + "date": [ + "Tue, 08 Jan 2024 21:34:37 GMT" + ] + }, + "sent-at": "2024-01-08 21:34:37 UTC", + "successful": "true" + } + ], + "created-at": "2024-01-08T21:32:14.125Z", + "updated-at": "2024-01-08T21:34:37.274Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "team-6p5jTwJQXwqZBncC", + "type": "teams" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ" + } + } +} +``` + +### List team notification configurations + +Use this endpoint to list notification configurations for a team. + +`GET /teams/:team_id/notification-configurations` + +| Parameter | Description | +| ---------- | ------------------------------------------------ | +| `:team_id` | The ID of the teams to list configurations from. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ------------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 notification configurations per page. | + +#### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/teams/team-6p5jTwJQXwqZBncC/notification-configurations +``` + +#### Sample response + +```json +{ + "data": [ + { + "id": "nc-W6VGEi8A7Cfoaf4K", + "type": "notification-configurations", + "attributes": { + "enabled": false, + "name": "Slack: #devops", + "url": "https://hooks.slack.com/services/T00000000/BC012345/0PWCpQmYyD4bTTRYZ53q4w", + "destination-type": "slack", + "token": null, + "triggers": [ + "change_request:created" + ], + "delivery-responses": [], + "created-at": "2019-01-08T21:34:28.367Z", + "updated-at": "2019-01-08T21:34:28.367Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "team-TdeUVMWShTesDMME", + "type": "teams" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-W6VGEi8A7Cfoaf4K" + } + }, + { + "id": "nc-AeUQ2zfKZzW9TiGZ", + "type": "notification-configurations", + "attributes": { + "enabled": true, + "name": "Webhook server test", + "url": "https://httpstat.us/200", + "destination-type": "generic", + "token": null, + "triggers": [ + "change_request:created" + ], + "delivery-responses": [ + { + "url": "https://httpstat.us/200", + "body": "\"200 OK\"", + "code": "200", + "headers": { + "cache-control": [ + "private" + ], + "content-length": [ + "129" + ], + "content-type": [ + "application/json; charset=utf-8" + ], + "content-encoding": [ + "gzip" + ], + "vary": [ + "Accept-Encoding" + ], + "server": [ + "Microsoft-IIS/10.0" + ], + "x-aspnetmvc-version": [ + "5.1" + ], + "access-control-allow-origin": [ + "*" + ], + "x-aspnet-version": [ + "4.0.30319" + ], + "x-powered-by": [ + "ASP.NET" + ], + "set-cookie": [ + "ARRAffinity=77c477e3e649643e5771873e1a13179fb00983bc73c71e196bf25967fd453df9;Path=/;HttpOnly;Domain=httpstat.us" + ], + "date": [ + "Tue, 08 Jan 2019 21:34:37 GMT" + ] + }, + "sent-at": "2019-01-08 21:34:37 UTC", + "successful": "true" + } + ], + "created-at": "2019-01-08T21:32:14.125Z", + "updated-at": "2019-01-08T21:34:37.274Z" + }, + "relationships": { + "subscribable": { + "data": { + "id": "team-XdeUVMWShTesDMME", + "type": "teams" + } + } + }, + "links": { + "self": "/api/v2/notification-configurations/nc-AeUQ2zfKZzW9TiGZ" + } + } + ] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/oauth-clients.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/oauth-clients.mdx new file mode 100644 index 000000000..c16d5161c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/oauth-clients.mdx @@ -0,0 +1,603 @@ +--- +page_title: /oauth-clients API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/oauth-clients` endpoint to manage + connections between VCS providers and organizations and projects. Learn how to + read, create, update, and destroy clients. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# OAuth client API reference + +An OAuth client represents the connection between an organization and a VCS provider. By default, you can globally access an OAuth client throughout the organization, or you can have scope access to one or more [projects](/terraform/enterprise/projects/manage). + +## List OAuth Clients + +`GET /organizations/:organization_name/oauth-clients` + +| Parameter | Description | +| -------------------- | ----------------------------- | +| `:organization_name` | The name of the organization. | + +This endpoint allows you to list VCS connections between an organization and a VCS provider (GitHub, Bitbucket, or GitLab) for use when creating or setting up workspaces. + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ---------------------- | +| [200][] | [JSON API document][] (`type: "oauth-clients"`) | Success | +| [404][] | [JSON API error object][] | Organization not found | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results. + +| Parameter | Description | +| -------------- | ----------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 oauth clients per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/organizations/my-organization/oauth-clients +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "oc-XKFwG6ggfA9n7t1K", + "type": "oauth-clients", + "attributes": { + "created-at": "2018-04-16T20:42:53.771Z", + "callback-url": "https://app.terraform.io/auth/35936d44-842c-4ddd-b4d4-7c741383dc3a/callback", + "connect-path": "/auth/35936d44-842c-4ddd-b4d4-7c741383dc3a?organization_id=1", + "service-provider": "github", + "service-provider-display-name": "GitHub", + "name": null, + "http-url": "https://github.com", + "api-url": "https://api.github.com", + "key": null, + "rsa-public-key": null, + "organization-scoped": false + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "oauth-tokens": { + "data": [], + "links": { + "related": "/api/v2/oauth-tokens/ot-KaeqH4cy72VPXFQT" + } + }, + "agent-pool": { + "data": { + "id": "apool-VsmjEMcYkShrckpK", + "type": "agent-pools" + }, + "links": { + "related": "/api/v2/agent-pools/apool-VsmjEMcYkShrckpK" + } + } + } + } + ] +} +``` + +## Show an OAuth Client + +`GET /oauth-clients/:id` + +| Parameter | Description | +| --------- | ---------------------------------- | +| `:id` | The ID of the OAuth Client to show | + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "oauth-clients"`) | Success | +| [404][] | [JSON API error object][] | OAuth Client not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/oauth-clients/oc-XKFwG6ggfA9n7t1K +``` + +### Sample Response + +```json +{ + "data": { + "id": "oc-XKFwG6ggfA9n7t1K", + "type": "oauth-clients", + "attributes": { + "created-at": "2018-04-16T20:42:53.771Z", + "callback-url": "https://app.terraform.io/auth/35936d44-842c-4ddd-b4d4-7c741383dc3a/callback", + "connect-path": "/auth/35936d44-842c-4ddd-b4d4-7c741383dc3a?organization_id=1", + "service-provider": "github", + "service-provider-display-name": "GitHub", + "name": null, + "http-url": "https://github.com", + "api-url": "https://api.github.com", + "key": null, + "rsa-public-key": null, + "organization-scoped": false + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "oauth-tokens": { + "data": [], + "links": { + "related": "/api/v2/oauth-tokens/ot-KaeqH4cy72VPXFQT" + } + }, + "agent-pool": { + "data": { + "id": "apool-VsmjEMcYkShrckpK", + "type": "agent-pools" + }, + "links": { + "related": "/api/v2/agent-pools/apool-VsmjEMcYkShrckpK" + } + } + } + } +} +``` + +## Create an OAuth Client + +`POST /organizations/:organization_name/oauth-clients` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:organization_name` | The name of the organization that will be connected to the VCS provider. The organization must already exist in the system, and the user must have permission to manage VCS settings. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +This endpoint allows you to create a VCS connection between an organization and a VCS provider (GitHub or GitLab) for use when creating or setting up workspaces. By using this API endpoint, you can provide a pre-generated OAuth token string instead of going through the process of creating a GitHub or GitLab OAuth Application. + +To learn how to generate one of these token strings for your VCS provider, you can read the following documentation: + +- [GitHub and GitHub Enterprise](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/creating-a-personal-access-token) +- [GitLab, GitLab Community Edition, and GitLab Enterprise Edition](https://docs.gitlab.com/ee/user/profile/personal_access_tokens.html#create-a-personal-access-token) +- [Azure DevOps Server](https://docs.microsoft.com/en-us/azure/devops/organizations/accounts/use-personal-access-tokens-to-authenticate?view=azure-devops-2019&tabs=preview-page) + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "oauth-clients"`) | OAuth Client successfully created | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------- | -------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"oauth-clients"`. | +| `data.attributes.service-provider` | string | | The VCS provider being connected with. Valid options are `"github"`, `"github_enterprise"`, `"gitlab_hosted"`, `"gitlab_community_edition"`, `"gitlab_enterprise_edition"`, or `"ado_server"`. | +| `data.attributes.name` | string | `null` | An optional display name for the OAuth Client. If left `null`, the UI will default to the display name of the VCS provider. | +| `data.attributes.key` | string | | The OAuth Client key. It can refer to a Consumer Key, Application Key, or another type of client key for the VCS provider. | +| `data.attributes.http-url` | string | | The homepage of your VCS provider (e.g. `"https://github.com"` or `"https://ghe.example.com"` or `"https://gitlab.com"`). | +| `data.attributes.api-url` | string | | The base URL as per your VCS provider's API documentation (e.g. `"https://api.github.com"`, `"https://ghe.example.com/api/v3"` or `"https://gitlab.com/api/v4"`). | +| `data.attributes.oauth-token-string` | string | | The token string you were given by your VCS provider | +| `data.attributes.private-key` | string | | **Required for Azure DevOps Server. Not used for any other providers.** The text of the SSH private key associated with your Azure DevOps Server account. | +| `data.attributes.secret` | string | | The OAuth client secret. For Bitbucket Data Center, the secret is the text of the SSH private key associated with your Bitbucket Data Center application link. | +| `data.attributes.rsa-public-key` | string | | **Required for Bitbucket Data Center in conjunction with the `secret`. Not used for any other providers.** The text of the SSH public key associated with your Bitbucket Data Center application link. | +| `data.attributes.organization-scoped` | boolean | | Whether or not the OAuth client is scoped to all projects and workspaces in the organization. Defaults to `true`. | +| `data.relationships.projects.data[]` | array\[object] | `[]` | A list of resource identifier objects that defines which projects are associated with the OAuth client. If `data.attributes.organization-scoped` is set to `false`, the OAuth client is only available to this list of projects. Each object in this list must contain a project `id` and use the `"projects"` type. For example, `{ "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }`. | +| `data.relationships.agent-pool.data` | object | `{}` | The Agent Pool associated to the VCS connection. This pool will be responsible for forwarding VCS Provider API calls and cloning VCS repositories. | + +### Sample Payload + +```json +{ + "data": { + "type": "oauth-clients", + "attributes": { + "service-provider": "github", + "http-url": "https://github.com", + "api-url": "https://api.github.com", + "oauth-token-string": "4306823352f0009d0ed81f1b654ac17a", + "organization-scoped": false + }, + "relationships": { + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "agent-pool": { + "data": { + "id": "apool-VsmjEMcYkShrckzzz", + "type": "agent-pools" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/oauth-clients +``` + +### Sample Response + +```json +{ + "data": { + "id": "oc-XKFwG6ggfA9n7t1K", + "type": "oauth-clients", + "attributes": { + "created-at": "2018-04-16T20:42:53.771Z", + "callback-url": "https://app.terraform.io/auth/35936d44-842c-4ddd-b4d4-7c741383dc3a/callback", + "connect-path": "/auth/35936d44-842c-4ddd-b4d4-7c741383dc3a?organization_id=1", + "service-provider": "github", + "service-provider-display-name": "GitHub", + "name": null, + "http-url": "https://github.com", + "api-url": "https://api.github.com", + "key": null, + "rsa-public-key": null, + "organization-scoped": false + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "oauth-tokens": { + "data": [], + "links": { + "related": "/api/v2/oauth-tokens/ot-KaeqH4cy72VPXFQT" + } + }, + "agent-pool": { + "data": { + "id": "apool-VsmjEMcYkShrckzzz", + "type": "agent-pools" + } + } + } + } +} +``` + +## Update an OAuth Client + +`PATCH /oauth-clients/:id` + +| Parameter | Description | +| --------- | ------------------------------------- | +| `:id` | The ID of the OAuth Client to update. | + +Use caution when changing attributes with this endpoint; editing an OAuth client that workspaces are currently using can have unexpected effects. + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "oauth-clients"`) | The request was successful | +| [404][] | [JSON API error object][] | OAuth Client not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ------------------------------------- | -------------- | ---------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `data.type` | string | | Must be `"oauth-clients"`. | +| `data.attributes.name` | string | (previous value) | An optional display name for the OAuth Client. If set to `null`, the UI will default to the display name of the VCS provider. | +| `data.attributes.key` | string | (previous value) | The OAuth Client key. It can refer to a Consumer Key, Application Key, or another type of client key for the VCS provider. | +| `data.attributes.secret` | string | (previous value) | The OAuth client secret. For Bitbucket Data Center, this secret is the text of the SSH private key associated with your Bitbucket Data Center application link. | +| `data.attributes.rsa-public-key` | string | (previous value) | **Required for Bitbucket Data Center in conjunction with the `secret`. Not used for any other providers.** The text of the SSH public key associated with your Bitbucket Data Center application link. | +| `data.attributes.organization-scoped` | boolean | (previous value) | Whether or not the OAuth client is available to all projects and workspaces in the organization. | +| `data.relationships.projects` | array\[object] | (previous value) | A list of resource identifier objects that defines which projects are associated with the OAuth client. If `data.attributes.organization-scoped` is set to `false`, the OAuth client is only available to this list of projects. Each object in this list must contain a project `id` and use the `"projects"` type. For example, `{ "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }`. Sending an empty array clears all project assignments. | +| `data.relationships.agent-pool.data` | object | `{}` | The Agent Pool associated to the VCS connection. This pool will be responsible for forwarding VCS Provider API calls and cloning VCS repositories. | + +### Sample Payload + +```json +{ + "data": { + "id": "oc-XKFwG6ggfA9n7t1K", + "type": "oauth-clients", + "attributes": { + "key": "key", + "secret": "secret", + "organization-scoped": false + }, + "relationships": { + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "agent-pool": { + "data": { + "id": "apool-VsmjEMcYkShrckzzz", + "type": "agent-pools" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/oauth-clients/oc-XKFwG6ggfA9n7t1K +``` + +### Sample Response + +```json +{ + "data": { + "id": "oc-XKFwG6ggfA9n7t1K", + "type": "oauth-clients", + "attributes": { + "created-at": "2018-04-16T20:42:53.771Z", + "callback-url": "https://app.terraform.io/auth/35936d44-842c-4ddd-b4d4-7c741383dc3a/callback", + "connect-path": "/auth/35936d44-842c-4ddd-b4d4-7c741383dc3a?organization_id=1", + "service-provider": "github", + "service-provider-display-name": "GitHub", + "name": null, + "http-url": "https://github.com", + "api-url": "https://api.github.com", + "key": null, + "rsa-public-key": null, + "organization-scoped": false + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "oauth-tokens": { + "data": [], + "links": { + "related": "/api/v2/oauth-tokens/ot-KaeqH4cy72VPXFQT" + } + }, + "agent-pool": { + "data": { + "id": "apool-VsmjEMcYkShrckzzz", + "type": "agent-pools" + } + } + } + } +} +``` + +## Destroy an OAuth Client + +`DELETE /oauth-clients/:id` + +| Parameter | Description | +| --------- | ------------------------------------- | +| `:id` | The ID of the OAuth Client to destroy | + +This endpoint allows you to remove an existing connection between an organization and a VCS provider (GitHub, Bitbucket, or GitLab). + +**Note:** Removing the OAuth Client will unlink workspaces that use this connection from their repositories, and these workspaces will need to be manually linked to another repository. + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------------------------ | +| [204][] | Empty response | The OAuth Client was successfully destroyed | +| [404][] | [JSON API error object][] | Organization or OAuth Client not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/oauth-clients/oc-XKFwG6ggfA9n7t1K +``` + +## Attach to a project + +`POST /oauth-clients/:id/relationships/projects` + +| Parameter | Description | +| --------- | ------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the OAuth client to attach to a project. Use the [List OAuth Clients](#list-oauth-clients) endpoint to reference your OAuth client IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------- | +| [204][] | Nothing | The request was successful | +| [404][] | [JSON API error object][] | OAuth Client not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (one or more projects not found, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | `[]` | A list of resource identifier objects that defines which projects to attach the OAuth client to. These objects must contain `id` and `type` properties, and the `type` property must be `projects` (e.g. `{ "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }`). | + +### Sample Payload + +```json +{ + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }, + { "id": "prj-2HRvNs49EWPjDqT1", "type": "projects" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/oauth-clients/oc-XKFwG6ggfA9n7t1K/relationships/projects +``` + +## Detach an OAuth Client from projects + +`DELETE /oauth-clients/:id/relationships/projects` + +| Parameter | Description | +| --------- | ----------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the oauth client you want to detach from the specified projects. Use the "List OAuth Clients" endpoint to find IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------- | +| [204][] | Nothing | The request was successful | +| [404][] | [JSON API error object][] | OAuth Client not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (one or more projects not found, wrong types, etc.) | + +### Request Body + +This DELETE endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | `[]` | A list of resource identifier objects that defines which projects are associated with the OAuth client. If `data.attributes.organization-scoped` is set to `false`, the OAuth client is only available to this list of projects. Each object in this list must contain a project `id` and use the `"projects"` type. For example, `{ "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }`. | + +### Sample Payload + +```json +{ + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }, + { "id": "prj-2HRvNs49EWPjDqT1", "type": "projects" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/oauth-clients/oc-XKFwG6ggfA9n7t1K/relationships/projects +``` + +### Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| -------------- | --------------------------------------- | +| `oauth_tokens` | The OAuth tokens managed by this client | +| `projects` | The projects scoped to this client | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/oauth-tokens.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/oauth-tokens.mdx new file mode 100644 index 000000000..83cdaaae1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/oauth-tokens.mdx @@ -0,0 +1,264 @@ +--- +page_title: /oauth-tokens API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/oauth-tokens` endpoint to manage the + OAuth tokens that connect workspaces to VCS providers. Learn how to read, + update, and destroy tokens. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# OAuth token API reference + +The `oauth-token` object represents a VCS configuration which includes the OAuth connection and the associated OAuth token. This object is used when creating a workspace to identify which VCS connection to use. + +## List OAuth Tokens + +List all the OAuth Tokens for a given OAuth Client + +`GET /oauth-clients/:oauth_client_id/oauth-tokens` + +| Parameter | Description | +| ------------------ | -------------------------- | +| `:oauth_client_id` | The ID of the OAuth Client | + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "oauth-tokens"`) | Success | +| [404][] | [JSON API error object][] | OAuth Client not found, or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results. + +| Parameter | Description | +| -------------- | ---------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 oauth tokens per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/oauth-clients/oc-GhHqb5rkeK19mLB8/oauth-tokens +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "ot-hmAyP66qk2AMVdbJ", + "type": "oauth-tokens", + "attributes": { + "created-at":"2017-11-02T06:37:49.284Z", + "service-provider-user":"skierkowski", + "has-ssh-key": false + }, + "relationships": { + "oauth-client": { + "data": { + "id": "oc-GhHqb5rkeK19mLB8", + "type": "oauth-clients" + }, + "links": { + "related": "/api/v2/oauth-clients/oc-GhHqb5rkeK19mLB8" + } + } + }, + "links": { + "self": "/api/v2/oauth-tokens/ot-hmAyP66qk2AMVdbJ" + } + } + ] +} +``` + +## Show an OAuth Token + +`GET /oauth-tokens/:id` + +| Parameter | Description | +| --------- | --------------------------------- | +| `:id` | The ID of the OAuth token to show | + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | ------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "oauth-tokens"`) | Success | +| [404][] | [JSON API error object][] | OAuth Token not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/oauth-tokens/ot-29t7xkUKiNC2XasL +``` + +### Sample Response + +```json +{ + "data": { + "id": "ot-29t7xkUKiNC2XasL", + "type": "oauth-tokens", + "attributes": { + "created-at": "2018-08-29T14:07:22.144Z", + "service-provider-user": "EM26Jj0ikRsIFFh3fE5C", + "has-ssh-key": false + }, + "relationships": { + "oauth-client": { + "data": { + "id": "oc-WMipGbuW8q7xCRmJ", + "type": "oauth-clients" + }, + "links": { + "related": "/api/v2/oauth-clients/oc-WMipGbuW8q7xCRmJ" + } + } + }, + "links": { + "self": "/api/v2/oauth-tokens/ot-29t7xkUKiNC2XasL" + } + } +} +``` + +## Update an OAuth Token + +`PATCH /oauth-tokens/:id` + +| Parameter | Description | +| --------- | ----------------------------------- | +| `:id` | The ID of the OAuth token to update | + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "oauth-tokens"`) | OAuth Token successfully updated | +| [404][] | [JSON API error object][] | OAuth Token not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------- | ------ | ------- | ------------------------- | +| `data.type` | string | | Must be `"oauth-tokens"`. | +| `data.attributes.ssh-key` | string | | **Optional.** The SSH key | + +### Sample Payload + +```json +{ + "data": { + "id": "ot-29t7xkUKiNC2XasL", + "type": "oauth-tokens", + "attributes": { + "ssh-key": "..." + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/oauth-tokens/ot-29t7xkUKiNC2XasL +``` + +### Sample Response + +```json +{ + "data": { + "id": "ot-29t7xkUKiNC2XasL", + "type": "oauth-tokens", + "attributes": { + "created-at": "2018-08-29T14:07:22.144Z", + "service-provider-user": "EM26Jj0ikRsIFFh3fE5C", + "has-ssh-key": false + }, + "relationships": { + "oauth-client": { + "data": { + "id": "oc-WMipGbuW8q7xCRmJ", + "type": "oauth-clients" + }, + "links": { + "related": "/api/v2/oauth-clients/oc-WMipGbuW8q7xCRmJ" + } + } + }, + "links": { + "self": "/api/v2/oauth-tokens/ot-29t7xkUKiNC2XasL" + } + } +} +``` + +## Destroy an OAuth Token + +`DELETE /oauth-tokens/:id` + +| Parameter | Description | +| --------- | ------------------------------------ | +| `:id` | The ID of the OAuth Token to destroy | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------- | +| [204][] | Empty response | The OAuth Token was successfully destroyed | +| [404][] | [JSON API error object][] | OAuth Token not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/oauth-tokens/ot-29t7xkUKiNC2XasL +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-memberships.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-memberships.mdx new file mode 100644 index 000000000..dec59d296 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-memberships.mdx @@ -0,0 +1,497 @@ +--- +page_title: /organization-memberships API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/organization-memberships` endpoint to + manage membership in an organization. Invite, list, and remove members from + organizations. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Organization memberships API reference + +Users are added to organizations by inviting them to join. Once accepted, they become members of the organization. The Organization Membership resource represents this membership. + +You can invite users who already have an account, as well as new users. If the user has an existing account with the same email address used to invite them, they can reuse the same login. + +-> **Note:** Once a user is a member of the organization, you can manage their team memberships using [the Team Membership API](/terraform/enterprise/api-docs/team-members). + +## Invite a User to an Organization + +`POST /organizations/:organization_name/organization-memberships` + +| Parameter | Description | +| -------------------- | ----------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization the user will be invited to join. The inviting user must have permission to manage organization memberships. | + +-> **Note:** Organization membership management is restricted to members of the owners team, the owners [team API token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens), the [organization API token](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens), and users or teams with one of the [Team Management](/terraform/enterprise/users-teams-organizations/permissions#team-management-permissions) permissions. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] | Successfully invited the user | +| [400][] | [JSON API error object][] | Unable to invite user due to organization limits | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Unable to invite user due to validation errors | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------------- | -------------- | ------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"organization-memberships"`. | +| `data.attributes.email` | string | | The email address of the user to be invited. | +| `data.relationships.teams.data[]` | array\[object] | | A list of resource identifier objects that defines which teams the invited user will be a member of. These objects must contain `id` and `type` properties, and the `type` property must be `teams` (e.g. `{ "id": "team-GeLZkdnK6xAVjA5H", "type": "teams" }`). Obtain team IDs from the [List Teams](/terraform/enterprise/api-docs/teams#list-teams) endpoint. All users must be added to at least one team. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "email": "test@example.com" + }, + "relationships": { + "teams": { + "data": [ + { + "type": "teams", + "id": "team-GeLZkdnK6xAVjA5H" + } + ] + } + }, + "type": "organization-memberships" + } +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/organization-memberships +``` + +### Sample Response + +```json +{ + "data": { + "id": "ou-nX7inDHhmC3quYgy", + "type": "organization-memberships", + "attributes": { + "status": "invited" + }, + "relationships": { + "teams": { + "data": [ + { + "id": "team-GeLZkdnK6xAVjA5H", + "type": "teams" + } + ] + }, + "user": { + "data": { + "id": "user-J8oxGmRk5eC2WLfX", + "type": "users" + } + }, + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + }, + "included": [ + { + "id": "user-J8oxGmRk5eC2WLfX", + "type": "users", + "attributes": { + "username": null, + "is-service-account": false, + "auth-method": "hcp_sso", + "avatar-url": "https://www.gravatar.com/avatar/55502f40dc8b7c769880b10874abc9d0?s=100&d=mm", + "two-factor": { + "enabled": false, + "verified": false + }, + "email": "test@example.com", + "permissions": { + "can-create-organizations": true, + "can-change-email": true, + "can-change-username": true, + "can-manage-user-tokens": false + } + }, + "relationships": { + "authentication-tokens": { + "links": { + "related": "/api/v2/users/user-J8oxGmRk5eC2WLfX/authentication-tokens" + } + } + }, + "links": { + "self": "/api/v2/users/user-J8oxGmRk5eC2WLfX" + } + } + ] +} +``` + +## List Memberships for an Organization + +`GET /organizations/:organization_name/organization-memberships` + +| Parameter | Description | +| -------------------- | -------------------------------------------------------- | +| `:organization_name` | The name of the organization to list the memberships of. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ---------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `q` | **Optional.** A search query string. Organization memberships are searchable by user name and email. | +| `filter[status]` | **Optional.** If specified, restricts results to those with the matching status value. Valid values are `invited` and `active`. | +| `filter[email]` | **Optional.** If specified, restricts results to those with a matching user email address. If multiple comma separated values are specified, results matching any of the values are returned. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 users per page. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/organization-memberships +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "ou-tTJph1AQVK5ZmdND", + "type": "organization-memberships", + "attributes": { + "status": "active" + }, + "relationships": { + "teams": { + "data": [ + { + "id": "team-yUrEehvfG4pdmSjc", + "type": "teams" + } + ] + }, + "user": { + "data": { + "id": "user-vaQqszES9JnuK4eB", + "type": "users" + } + }, + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + }, + { + "id": "ou-D6HPYFt4GzeBt3gB", + "type": "organization-memberships", + "attributes": { + "status": "active" + }, + "relationships": { + "teams": { + "data": [ + { + "id": "team-yUrEehvfG4pdmSjc", + "type": "teams" + } + ] + }, + "user": { + "data": { + "id": "user-oqCgH7NgTn95jTGc", + "type": "users" + } + }, + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + }, + { + "id": "ou-x1E2eBwYwusLDC7h", + "type": "organization-memberships", + "attributes": { + "status": "invited" + }, + "relationships": { + "teams": { + "data": [ + { + "id": "team-yUrEehvfG4pdmSjc", + "type": "teams" + } + ] + }, + "user": { + "data": { + "id": "user-UntUdBTHsVRQMzC8", + "type": "users" + } + }, + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/my-organization/organization-memberships?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/my-organization/organization-memberships?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/my-organization/organization-memberships?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "status-counts": { + "total": 3, + "active": 2, + "invited": 1 + }, + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 3 + } + } +} +``` + +## List User's Own Memberships + +`GET /organization-memberships` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organization-memberships +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "ou-VgJgfbDVN3APUm2F", + "type": "organization-memberships", + "attributes": { + "status": "invited" + }, + "relationships": { + "teams": { + "data": [ + { + "id": "team-4QrJKzxB3J5N4cJc", + "type": "teams" + } + ] + }, + "user": { + "data": { + "id": "user-vaQqszES9JnuK4eB", + "type": "users" + } + }, + "organization": { + "data": { + "id": "acme-corp", + "type": "organizations" + } + } + } + }, + { + "id": "ou-tTJph1AQVK5ZmdND", + "type": "organization-memberships", + "attributes": { + "status": "active" + }, + "relationships": { + "teams": { + "data": [ + { + "id": "team-yUrEehvfG4pdmSjc", + "type": "teams" + } + ] + }, + "user": { + "data": { + "id": "user-vaQqszES9JnuK4eB", + "type": "users" + } + }, + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + } + ] +} +``` + +## Show a Membership + +`GET /organization-memberships/:organization_membership_id` + +| Parameter | Description | +| ----------------------------- | --------------------------- | +| `:organization_membership_id` | The organization membership | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------------- | ------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organization-memberships"`) | The request was successful | +| [404][] | [JSON API error object][] | Organization membership not found, or user unauthorized to perform action | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organization-memberships/ou-kit6GaMo3zPGCzWb +``` + +### Sample Response + +```json +{ + "data": { + "id": "ou-kit6GaMo3zPGCzWb", + "type": "organization-memberships", + "attributes": { + "status": "active" + }, + "relationships": { + "teams": { + "data": [ + { + "id": "team-97LkM7QciNkwb2nh", + "type": "teams" + } + ] + }, + "user": { + "data": { + "id": "user-hn6v2WK1naDpGadd", + "type": "users" + } + }, + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + } + } + } +} +``` + +## Remove User from Organization + +`DELETE /organization-memberships/:organization_membership_id` + +| Parameter | Description | +| ----------------------------- | --------------------------- | +| `:organization_membership_id` | The organization membership | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------------------- | +| [204][] | Empty body | Successfully removed the user from the organization | +| [403][] | [JSON API error object][] | Unable to remove the user: you cannot remove yourself from organizations which you own | +| [404][] | [JSON API error object][] | Organization membership not found, or user unauthorized to perform action | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organization-memberships/ou-tTJph1AQVK5ZmdND +``` + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +- `user` - The user associated with the membership. +- `teams` - Teams the user is a member of. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-tags.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-tags.mdx new file mode 100644 index 000000000..bcebf92fb --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-tags.mdx @@ -0,0 +1,230 @@ +--- +page_title: /tags API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's organization `/tags` endpoint to assign, + list, and delete tags for an organization. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Organization tags API reference + +This API returns the list of tags used in workspaces across the organization. Tags can be added to this pool via workspaces. Tags deleted here will be removed from all other workspaces. Tags can be added, applied, removed and deleted in bulk. + +Tags are subject to the following rules: + +- Workspace tags or tags must be one or more characters, have a 255 character limit, and can include letters, numbers, colons, hyphens, and underscores. +- You can create tags for a workspace using the user interface or the API. After you create a tag, you can assign it to other workspaces in the same organization. +- You cannot create tags for a workspace using the CLI. +- You cannot set tags at the project level, so there is no tag inheritance from projects to workspaces. + +## List Tags + +`GET /organizations/:organization_name/tags` + +| Parameter | Description | +| -------------------- | ---------------------------------------------- | +| `:organization_name` | The name of the organization to list tags from | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ------------------------------- | ---------------------------------------------------------------------------------------- | +| `q` | **Optional.** A search query string. Organization tags are searchable by name likeness. | +| `filter[exclude][taggable][id]` | **Optional.** If specified, omits organization's related workspace's tags. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 organization tags per page. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/tags +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "tag-1", + "type": "tags", + "attributes": { + "name": "tag1", + "created-at": "2022-03-09T06:04:39.585Z", + "instance-count": 1 + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + }, + { + "id": "tag-2", + "type": "tags", + "attributes": { + "name": "tag2", + "created-at": "2022-03-09T06:04:39.585Z", + "instance-count": 2 + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + } + ] +} +``` + +## Delete tags + +This endpoint deletes one or more tags from an organization. The organization and tags must already +exist. Tags deleted here will be removed from all other resources. + +`DELETE /organizations/:organization_name/tags` + +| Parameter | Description | +| -------------------- | ------------------------------------------------ | +| `:organization_name` | The name of the organization to delete tags from | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | -------------------------------------------------------------- | +| [204][] | No Content | Successfully removed tags from organization | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +It is important to note that `type` and `id` are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ---------------------------- | +| `data[].type` | string | | Must be `"tags"`. | +| `data[].id` | string | | The id of the tag to remove. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "tags", + "id": "tag-Yfha4YpPievQ8wJw" + } + ] +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/hashicorp/tags +``` + +## Sample Response + +No response body. + +Status code `204`. + +## Add workspaces to a tag + +`POST /tags/:tag_id/relationships/workspaces` + +| Parameter | Description | +| --------- | ---------------------------------------------------- | +| `:tag_id` | The ID of the tag that workspaces should have added. | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ----------------------------------------------------- | +| [204][] | No Content | Successfully added workspaces to tag | +| [404][] | [JSON API error object][] | Tag not found, or user unauthorized to perform action | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ------------------------------- | +| `data[].type` | string | | Must be `"workspaces"`. | +| `data[].id` | string | | The id of the workspace to add. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/tags/tag-2/relationships/workspaces +``` + +### Sample Payload + +```json +{ + "data": [ + { + "type": "workspaces", + "id": "ws-pmKTbUwH2VPiiTC4" + } + ] +} +``` + +### Sample Response + +No response body. + +Status code `204`. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-tokens.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-tokens.mdx new file mode 100644 index 000000000..75894a177 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organization-tokens.mdx @@ -0,0 +1,148 @@ +--- +page_title: /organizations/authentication-token API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/organizations/authentication-token` + endpoint to generate and delete organization-level API tokens. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Organization tokens API reference + +## Generate a new organization token + +`POST /organizations/:organization_name/authentication-token` + +| Parameter | Description | +| -------------------- | ----------------------------------------------------- | +| `:organization_name` | The name of the organization to generate a token for. | + +Generates a new [organization API token](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens), replacing any existing token. + +Only members of the owners team, the owners [team API token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens), and the [organization API token](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens) can access this endpoint. + +This endpoint returns the secret text of the new authentication token. You can only access this token when you create it and can not recover it later. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------- | +| [201][] | [JSON API document][] (`type: "authentication-tokens"`) | Success | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ---------------------------- | ------ | ------- | ------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"authentication-token"`. | +| `data.attributes.expired-at` | string | `null` | The UTC date and time that the Organization Token will expire, in ISO 8601 format. If omitted or set to `null` the token will never expire. | + +### Sample Payload + +```json +{ + "data": { + "type": "authentication-token", + "attributes": { + "expired-at": "2023-04-06T12:00:00.000Z" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/authentication-token +``` + +### Sample Response + +```json +{ + "data": { + "id": "4111756", + "type": "authentication-tokens", + "attributes": { + "created-at": "2017-11-29T19:11:28.075Z", + "last-used-at": null, + "description": null, + "token": "ZgqYdzuvlv8Iyg.atlasv1.6nV7t1OyFls341jo1xdZTP72fN0uu9VL55ozqzekfmToGFbhoFvvygIRy2mwVAXomOE", + "expired-at": "2023-04-06T12:00:00.000Z" + }, + "relationships": { + "created-by": { + "data": { + "id": "user-62goNpx1ThQf689e", + "type": "users" + } + } + } + } +} +``` + +## Delete the organization token + +`DELETE /organizations/:organization/authentication-token` + +| Parameter | Description | +| -------------------- | --------------------------------------------- | +| `:organization_name` | Which organization's token should be deleted. | + +Only members of the owners team, the owners [team API token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens), and the [organization API token](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens) can access this endpoint. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------- | +| [204][] | No Content | Success | +| [404][] | [JSON API error object][] | User not authorized | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/my-organization/authentication-token +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organizations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organizations.mdx new file mode 100644 index 000000000..186f708b5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/organizations.mdx @@ -0,0 +1,986 @@ +--- +page_title: /organizations API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/organizations` endpoint to create, + update, and destroy organizations, and read their entitlement sets, module + producers, and data retention policies. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Organizations API reference + +The Organizations API is used to list, show, create, update, and destroy organizations. + +## List Organizations + +`GET /organizations` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | The request was successful | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +Currently, this endpoint returns a full, unpaginated list of organizations (without pagination metadata) if both of the pagination query parameters are omitted. To avoid inconsistent behavior, we recommend always supplying pagination parameters when building against this API. + +| Parameter | Description | +| -------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `q` | **Optional.** A search query string. Organizations are searchable by name and notification email. This query takes precedence over the attribute specific searches `q[email]` or `q[name]`. | +| `q[email]` | **Optional.** A search query string. This query searches organizations by notification email. If used with `q[name]`, it returns organizations that match both queries. | +| `q[name]` | **Optional.** A search query string. This query searches organizations by name. If used with `q[email]`, it returns organizations that match both queries. | +| `page[number]` | **Optional.** Defaults to the first page, if omitted when `page[size]` is provided. | +| `page[size]` | **Optional.** Defaults to 20 organizations per page, if omitted when `page[number]` is provided. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/organizations\?page\[number\]\=1\&page\[size\]\=20 +``` + +### Sample Response + +**Note:** Only HCP Terraform organizations return the `two-factor-conformant` and `assessments-enforced` properties. + +```json +{ + "data": [ + { + "id": "hashicorp", + "type": "organizations", + "attributes": { + "external-id": "org-Hysjx5eUviuKVCJY", + "created-at": "2021-08-24T23:10:04.675Z", + "email": "hashicorp@example.com", + "session-timeout": null, + "session-remember": null, + "collaborator-auth-policy": "password", + "plan-expired": false, + "plan-expires-at": null, + "plan-is-trial": false, + "plan-is-enterprise": false, + "plan-identifier": "developer", + "cost-estimation-enabled": true, + "send-passing-statuses-for-untriggered-speculative-plans": true, + "aggregated-commit-status-enabled": false, + "speculative-plan-management-enabled": true, + "allow-force-delete-workspaces": true, + "name": "hashicorp", + "permissions": { + "can-update": true, + "can-destroy": true, + "can-access-via-teams": true, + "can-create-module": true, + "can-create-team": true, + "can-create-workspace": true, + "can-manage-users": true, + "can-manage-subscription": true, + "can-manage-sso": true, + "can-update-oauth": true, + "can-update-sentinel": true, + "can-update-ssh-keys": true, + "can-update-api-token": true, + "can-traverse": true, + "can-start-trial": true, + "can-update-agent-pools": true, + "can-manage-tags": true, + "can-manage-varsets": true, + "can-read-varsets": true, + "can-manage-public-providers": true, + "can-create-provider": true, + "can-manage-public-modules": true, + "can-manage-custom-providers": false, + "can-manage-run-tasks": false, + "can-read-run-tasks": false, + "can-create-project": true + }, + "fair-run-queuing-enabled": true, + "saml-enabled": false, + "owners-team-saml-role-id": null, + "two-factor-conformant": false, + "assessments-enforced": false, + "default-execution-mode": "remote" + }, + "relationships": { + "default-agent-pool": { + "data": null + }, + "oauth-tokens": { + "links": { + "related": "/api/v2/organizations/hashicorp/oauth-tokens" + } + }, + "authentication-token": { + "links": { + "related": "/api/v2/organizations/hashicorp/authentication-token" + } + }, + "entitlement-set": { + "data": { + "id": "org-Hysjx5eUviuKVCJY", + "type": "entitlement-sets" + }, + "links": { + "related": "/api/v2/organizations/hashicorp/entitlement-set" + } + }, + "subscription": { + "links": { + "related": "/api/v2/organizations/hashicorp/subscription" + } + } + }, + "links": { + "self": "/api/v2/organizations/hashicorp" + } + }, + { + "id": "hashicorp-two", + "type": "organizations", + "attributes": { + "external-id": "org-iJ5tr4WgB4WpA1hD", + "created-at": "2022-01-04T18:57:16.036Z", + "email": "hashicorp@example.com", + "session-timeout": null, + "session-remember": null, + "collaborator-auth-policy": "password", + "plan-expired": false, + "plan-expires-at": null, + "plan-is-trial": false, + "plan-is-enterprise": false, + "plan-identifier": "free", + "cost-estimation-enabled": false, + "send-passing-statuses-for-untriggered-speculative-plans": false, + "aggregated-commit-status-enabled": true, + "speculative-plan-management-enabled": true, + "allow-force-delete-workspaces": false, + "name": "hashicorp-two", + "permissions": { + "can-update": true, + "can-destroy": true, + "can-access-via-teams": true, + "can-create-module": true, + "can-create-team": false, + "can-create-workspace": true, + "can-manage-users": true, + "can-manage-subscription": true, + "can-manage-sso": false, + "can-update-oauth": true, + "can-update-sentinel": false, + "can-update-ssh-keys": true, + "can-update-api-token": true, + "can-traverse": true, + "can-start-trial": true, + "can-update-agent-pools": false, + "can-manage-tags": true, + "can-manage-varsets": true, + "can-read-varsets": true, + "can-manage-public-providers": true, + "can-create-provider": true, + "can-manage-public-modules": true, + "can-manage-custom-providers": false, + "can-manage-run-tasks": false, + "can-read-run-tasks": false, + "can-create-project": false + }, + "fair-run-queuing-enabled": true, + "saml-enabled": false, + "owners-team-saml-role-id": null, + "two-factor-conformant": false, + "assessments-enforced": false, + "default-execution-mode": "remote" + }, + "relationships": { + "default-agent-pool": { + "data": null + }, + "oauth-tokens": { + "links": { + "related": "/api/v2/organizations/hashicorp-two/oauth-tokens" + } + }, + "authentication-token": { + "links": { + "related": "/api/v2/organizations/hashicorp-two/authentication-token" + } + }, + "entitlement-set": { + "data": { + "id": "org-iJ5tr4WgB4WpA1hD", + "type": "entitlement-sets" + }, + "links": { + "related": "/api/v2/organizations/hashicorp-two/entitlement-set" + } + }, + "subscription": { + "links": { + "related": "/api/v2/organizations/hashicorp-two/subscription" + } + } + }, + "links": { + "self": "/api/v2/organizations/hashicorp-two" + } + } + ], + "links": { + "self": "https://tfe-zone-b0c8608c.ngrok.io/api/v2/organizations?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://tfe-zone-b0c8608c.ngrok.io/api/v2/organizations?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://tfe-zone-b0c8608c.ngrok.io/api/v2/organizations?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 2 + } + } +} +``` + +## Show an Organization + +`GET /organizations/:organization_name` + +| Parameter | Description | +| -------------------- | ------------------------------------ | +| `:organization_name` | The name of the organization to show | + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | The request was successful | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/organizations/hashicorp +``` + +### Sample Response + +**Note:** Only HCP Terraform organizations return the `two-factor-conformant` and `assessments-enforced` properties. + +```json +{ + "data": { + "id": "hashicorp", + "type": "organizations", + "attributes": { + "external-id": "org-WV6DfwfxxXvLfvfs", + "created-at": "2020-03-26T22:13:38.456Z", + "email": "user@example.com", + "session-timeout": null, + "session-remember": null, + "collaborator-auth-policy": "password", + "plan-expired": false, + "plan-expires-at": null, + "plan-is-trial": false, + "plan-is-enterprise": false, + "cost-estimation-enabled": false, + "send-passing-statuses-for-untriggered-speculative-plans": false, + "aggregated-commit-status-enabled": true, + "speculative-plan-management-enabled": true, + "allow-force-delete-workspaces": false, + "name": "hashicorp", + "permissions": { + "can-update": true, + "can-destroy": true, + "can-access-via-teams": true, + "can-create-module": true, + "can-create-team": false, + "can-create-workspace": true, + "can-manage-users": true, + "can-manage-subscription": true, + "can-manage-sso": false, + "can-update-oauth": true, + "can-update-sentinel": false, + "can-update-ssh-keys": true, + "can-update-api-token": true, + "can-traverse": true, + "can-start-trial": true, + "can-update-agent-pools": false, + "can-manage-tags": true, + "can-manage-public-modules": true, + "can-manage-public-providers": false, + "can-manage-run-tasks": false, + "can-read-run-tasks": false, + "can-create-provider": false, + "can-create-project": true + }, + "fair-run-queuing-enabled": true, + "saml-enabled": false, + "owners-team-saml-role-id": null, + "two-factor-conformant": false, + "assessments-enforced": false, + "default-execution-mode": "remote" + }, + "relationships": { + "default-agent-pool": { + "data": null + }, + "oauth-tokens": { + "links": { + "related": "/api/v2/organizations/hashicorp/oauth-tokens" + } + }, + "authentication-token": { + "links": { + "related": "/api/v2/organizations/hashicorp/authentication-token" + } + }, + "entitlement-set": { + "data": { + "id": "org-WV6DfwfxxXvLfvfs", + "type": "entitlement-sets" + }, + "links": { + "related": "/api/v2/organizations/hashicorp/entitlement-set" + } + }, + "subscription": { + "links": { + "related": "/api/v2/organizations/hashicorp/subscription" + } + } + }, + "links": { + "self": "/api/v2/organizations/hashicorp" + } + } +} +``` + +## Create an Organization + +`POST /organizations` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "organizations"`) | The organization was successfully created | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------------------------------- | ------- | ---------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"organizations"` | +| `data.attributes.name` | string | | Name of the organization | +| `data.attributes.email` | string | | Admin email address | +| `data.attributes.session-timeout` | integer | 20160 | Session timeout after inactivity (minutes) | +| `data.attributes.session-remember` | integer | 20160 | Session expiration (minutes) | +| `data.attributes.collaborator-auth-policy` | string | password | Authentication policy (`password` or `two_factor_mandatory`) | +| `data.attributes.cost-estimation-enabled` | boolean | false | Whether or not the cost estimation feature is enabled for all workspaces in the organization. Defaults to false. In Terraform Enterprise, you must also enable cost estimation in [Site Administration](/terraform/enterprise/admin/application/integration#cost-estimation-integration). | +| `data.attributes.send-passing-statuses-for-untriggered-speculative-plans` | boolean | false | Whether or not to send VCS status updates for untriggered speculative plans. This can be useful if large numbers of untriggered workspaces are exhausting request limits for connected version control service providers like GitHub. Defaults to false. In Terraform Enterprise, this setting is always false and cannot be changed but is also available in Site Administration. | +| `data.attributes.aggregated-commit-status-enabled` | boolean | true | Whether or not to aggregate VCS status updates for triggered workspaces. This is useful for monorepo projects with configuration spanning many workspaces. Defaults to `true`. You cannot use this option if `send-passing-statuses-for-untriggered-speculative-plans` is set to `true`. | +| `data.attributes.speculative-plan-management-enabled` | boolean | true | Whether or not to enable [Automatically cancel plan-only runs](/terraform/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management). Defaults to `true`. | +| `data.attributes.owners-team-saml-role-id` | string | (nothing) | **Optional.** **SAML only** The name of the ["owners" team](/terraform/enterprise/saml/team-membership#managing-membership-of-the-owners-team) | +| `data.attributes.assessments-enforced` | boolean | (false) | Whether or not to compel health assessments for all eligible workspaces. When true, health assessments occur on all compatible workspaces, regardless of the value of the workspace setting `assessments-enabled`. When false, health assessments only occur for workspaces that opt in by setting `assessments-enabled: true`. | +| `data.attributes.allow-force-delete-workspaces` | boolean | (false) | Whether workspace administrators can [delete workspaces with resources under management](/terraform/enterprise/users-teams-organizations/organizations#general). If false, only organization owners may delete these workspaces. | +| `data.attributes.default-execution-mode` | boolean | `remote` | Which [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) to use by default. Valid values are `remote`, `local`, and `agent`. | +| `data.attributes.default-agent-pool-id` | string | (previous value) | Required when `default-execution-mode` is set to `agent`. The ID of the agent pool belonging to the organization. Do _not_ specify this value if you set `execution-mode` to `remote` or `local`. | + +### Sample Payload + +```json +{ + "data": { + "type": "organizations", + "attributes": { + "name": "hashicorp", + "email": "user@example.com" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations +``` + +### Sample Response + +**Note:** Only HCP Terraform organizations return the `two-factor-conformant` and `assessments-enforced` properties. + +```json +{ + "data": { + "id": "hashicorp", + "type": "organizations", + "attributes": { + "external-id": "org-Bzyc2JuegvVLAibn", + "created-at": "2021-08-30T18:09:57.561Z", + "email": "user@example.com", + "session-timeout": null, + "session-remember": null, + "collaborator-auth-policy": "password", + "plan-expired": false, + "plan-expires-at": null, + "plan-is-trial": false, + "plan-is-enterprise": false, + "cost-estimation-enabled": false, + "send-passing-statuses-for-untriggered-speculative-plans": false, + "aggregated-commit-status-enabled": true, + "speculative-plan-management-enabled": true, + "allow-force-delete-workspaces": false, + "name": "hashicorp", + "permissions": { + "can-update": true, + "can-destroy": true, + "can-access-via-teams": true, + "can-create-module": true, + "can-create-team": false, + "can-create-workspace": true, + "can-manage-users": true, + "can-manage-subscription": true, + "can-manage-sso": false, + "can-update-oauth": true, + "can-update-sentinel": false, + "can-update-ssh-keys": true, + "can-update-api-token": true, + "can-traverse": true, + "can-start-trial": true, + "can-update-agent-pools": false, + "can-manage-tags": true, + "can-manage-public-modules": true, + "can-manage-public-providers": false, + "can-manage-run-tasks": false, + "can-read-run-tasks": false, + "can-create-provider": false, + "can-create-project": true + }, + "fair-run-queuing-enabled": true, + "saml-enabled": false, + "owners-team-saml-role-id": null, + "two-factor-conformant": false, + "assessments-enforced": false, + "default-execution-mode": "remote" + }, + "relationships": { + "default-agent-pool": { + "data": null + }, + "oauth-tokens": { + "links": { + "related": "/api/v2/organizations/hashicorp/oauth-tokens" + } + }, + "authentication-token": { + "links": { + "related": "/api/v2/organizations/hashicorp/authentication-token" + } + }, + "entitlement-set": { + "data": { + "id": "org-Bzyc2JuegvVLAibn", + "type": "entitlement-sets" + }, + "links": { + "related": "/api/v2/organizations/hashicorp/entitlement-set" + } + }, + "subscription": { + "links": { + "related": "/api/v2/organizations/hashicorp/subscription" + } + } + }, + "links": { + "self": "/api/v2/organizations/hashicorp" + } + }, + "included": [ + { + "id": "org-Bzyc2JuegvVLAibn", + "type": "entitlement-sets", + "attributes": { + "agents": false, + "audit-logging": false, + "configuration-designer": true, + "cost-estimation": false, + "global-run-tasks": false, + "module-tests-generation": false, + "operations": true, + "policy-enforcement": false, + "policy-limit": null, + "policy-mandatory-enforcement-limit": null, + "policy-set-limit": null, + "private-module-registry": true, + "run-task-limit": null, + "run-task-mandatory-enforcement-limit": null, + "run-task-workspace-limit": null, + "run-tasks": false, + "self-serve-billing": true, + "sentinel": false, + "sso": false, + "state-storage": true, + "teams": false, + "usage-reporting": false, + "user-limit": 5, + "vcs-integrations": true, + "versioned-policy-set-limit": null + }, + "links": { + "self": "/api/v2/entitlement-sets/org-Bzyc2JuegvVLAibn" + } + } + ] +} +``` + +## Update an Organization + +`PATCH /organizations/:organization_name` + +| Parameter | Description | +| -------------------- | -------------------------------------- | +| `:organization_name` | The name of the organization to update | + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | The organization was successfully updated | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ------------------------------------------------------------------------- | ------- | ---------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"organizations"` | +| `data.attributes.name` | string | | Name of the organization | +| `data.attributes.email` | string | | Admin email address | +| `data.attributes.session-timeout` | integer | 20160 | Session timeout after inactivity (minutes) | +| `data.attributes.session-remember` | integer | 20160 | Session expiration (minutes) | +| `data.attributes.collaborator-auth-policy` | string | password | Authentication policy (`password` or `two_factor_mandatory`) | +| `data.attributes.cost-estimation-enabled` | boolean | false | Whether or not the cost estimation feature is enabled for all workspaces in the organization. Defaults to false. In Terraform Enterprise, you must also enable cost estimation in [Site Administration](/terraform/enterprise/admin/application/integration#cost-estimation-integration). | +| `data.attributes.send-passing-statuses-for-untriggered-speculative-plans` | boolean | false | Whether or not to send VCS status updates for untriggered speculative plans. This can be useful if large numbers of untriggered workspaces are exhausting request limits for connected version control service providers like GitHub. Defaults to false. In Terraform Enterprise, this setting is always false and cannot be changed but is also available in Site Administration. | +| `data.attributes.aggregated-commit-status-enabled` | boolean | true | Whether or not to aggregate VCS status updates for triggered workspaces. This is useful for monorepo projects with configuration spanning many workspaces. Defaults to `true`. You cannot use this option if `send-passing-statuses-for-untriggered-speculative-plans` is set to `true`. | +| `data.attributes.speculative-plan-management-enabled` | boolean | true | Whether or not to enable [Automatically cancel plan-only runs](/terraform/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management). Defaults to `true`. | +| `data.attributes.owners-team-saml-role-id` | string | (nothing) | **Optional.** **SAML only** The name of the ["owners" team](/terraform/enterprise/saml/team-membership#managing-membership-of-the-owners-team) | +| `data.attributes.assessments-enforced` | boolean | false | Whether or not to compel health assessments for all eligible workspaces. When true, health assessments occur on all compatible workspaces, regardless of the value of the workspace setting `assessments-enabled`. When false, health assessments only occur for workspaces that opt in by setting `assessments-enabled: true`. | +| `data.attributes.allow-force-delete-workspaces` | boolean | false | Whether workspace administrators can [delete workspaces with resources under management](/terraform/enterprise/users-teams-organizations/organizations#general). If false, only organization owners may delete these workspaces. | +| `data.attributes.default-execution-mode` | boolean | `remote` | Which [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) to use by default. Valid values are `remote`, `local`, and `agent`. | +| `data.attributes.default-agent-pool-id` | string | (previous value) | Required when `default-execution-mode` is set to `agent`. The ID of the agent pool belonging to the organization. Do _not_ specify this value if you set `execution-mode` to `remote` or `local`. | + +### Sample Payload + +```json +{ + "data": { + "type": "organizations", + "attributes": { + "email": "admin@example.com" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/hashicorp +``` + +### Sample Response + +**Note:** The `two-factor-conformant` and `assessments-enforced` properties are only returned from HCP Terraform organizations. + +```json +{ + "data": { + "id": "hashicorp", + "type": "organizations", + "attributes": { + "external-id": "org-Bzyc2JuegvVLAibn", + "created-at": "2021-08-30T18:09:57.561Z", + "email": "admin@example.com", + "session-timeout": null, + "session-remember": null, + "collaborator-auth-policy": "password", + "plan-expired": false, + "plan-expires-at": null, + "plan-is-trial": false, + "plan-is-enterprise": false, + "cost-estimation-enabled": false, + "send-passing-statuses-for-untriggered-speculative-plans": false, + "aggregated-commit-status-enabled": true, + "speculative-plan-management-enabled": true, + "name": "hashicorp", + "permissions": { + "can-update": true, + "can-destroy": true, + "can-access-via-teams": true, + "can-create-module": true, + "can-create-team": false, + "can-create-workspace": true, + "can-manage-users": true, + "can-manage-subscription": true, + "can-manage-sso": false, + "can-update-oauth": true, + "can-update-sentinel": false, + "can-update-ssh-keys": true, + "can-update-api-token": true, + "can-traverse": true, + "can-start-trial": true, + "can-update-agent-pools": false, + "can-manage-tags": true, + "can-manage-public-modules": true, + "can-manage-public-providers": false, + "can-manage-run-tasks": false, + "can-read-run-tasks": false, + "can-create-provider": false, + "can-create-project": true + }, + "fair-run-queuing-enabled": true, + "saml-enabled": false, + "owners-team-saml-role-id": null, + "two-factor-conformant": false, + "assessments-enforced": false, + "default-execution-mode": "remote" + }, + "relationships": { + "default-agent-pool": { + "data": null + }, + "oauth-tokens": { + "links": { + "related": "/api/v2/organizations/hashicorp/oauth-tokens" + } + }, + "authentication-token": { + "links": { + "related": "/api/v2/organizations/hashicorp/authentication-token" + } + }, + "entitlement-set": { + "data": { + "id": "org-Bzyc2JuegvVLAibn", + "type": "entitlement-sets" + }, + "links": { + "related": "/api/v2/organizations/hashicorp/entitlement-set" + } + }, + "subscription": { + "links": { + "related": "/api/v2/organizations/hashicorp/subscription" + } + } + }, + "links": { + "self": "/api/v2/organizations/hashicorp" + } + } +} +``` + +## Destroy an Organization + +`DELETE /organizations/:organization_name` + +| Parameter | Description | +| -------------------- | --------------------------------------- | +| `:organization_name` | The name of the organization to destroy | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------- | +| [204][] | | The organization was successfully destroyed | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/hashicorp +``` + +### Sample Response + +The response body will be empty if successful. + +## Show the Entitlement Set + +This endpoint shows the [entitlements](/terraform/enterprise/api-docs#feature-entitlements) for an organization. + +`GET /organizations/:organization_name/entitlement-set` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------ | +| `:organization_name` | The name of the organization's entitlement set to view | + +| Status | Response | Reason | +| ------- | -------------------------------------------------- | ------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "entitlement-sets"`) | The request was successful | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/entitlement-set +``` + +### Sample Response + +```json +{ + "data": { + "id": "org-Bzyc2JuegvVLAibn", + "type": "entitlement-sets", + "attributes": { + "agents": false, + "audit-logging": false, + "configuration-designer": true, + "cost-estimation": false, + "global-run-tasks": false, + "module-tests-generation": false, + "operations": true, + "policy-enforcement": false, + "policy-limit": 5, + "policy-mandatory-enforcement-limit": null, + "policy-set-limit": 1, + "private-module-registry": true, + "private-policy-agents": false, + "private-vcs": false, + "run-task-limit": 1, + "run-task-mandatory-enforcement-limit": 1, + "run-task-workspace-limit": 10, + "run-tasks": false, + "self-serve-billing": true, + "sentinel": false, + "sso": false, + "state-storage": true, + "teams": false, + "usage-reporting": false, + "user-limit": 5, + "vcs-integrations": true, + "versioned-policy-set-limit": null + }, + "links": { + "self": "/api/v2/entitlement-sets/org-Bzyc2JuegvVLAibn" + } + } +} +``` + +## Show Module Producers + + +This endpoint is exclusive to Terraform Enterprise, and not available in HCP Terraform. + + +This endpoint shows organizations that are configured to share modules with an organization through [Module Sharing](/terraform/enterprise/admin/application/module-sharing). + +`GET /organizations/:organization_name/relationships/module-producers` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------- | +| `:organization_name` | The name of the organization's module producers to view | + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "organizations"`) | The request was successful | +| [404][] | [JSON API error object][] | Organization not found or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | -------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 module producers per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://tfe.example.com/api/v2/organizations/hashicorp/relationships/module-producers +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "hc-nomad", + "type": "organizations", + "attributes": { + "name": "hc-nomad", + "external-id": "org-ArQSQMAkFQsSUZjB" + }, + "links": { + "self": "/api/v2/organizations/hc-nomad" + } + } + ], + "links": { + "self": "https://tfe.example.com/api/v2/organizations/hashicorp/relationships/module-producers?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://tfe.example.com/api/v2/organizations/hashicorp/relationships/module-producers?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://tfe.example.com/api/v2/organizations/hashicorp/relationships/module-producers?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } +} +``` + +## Show data retention policy + + +This endpoint is exclusive to Terraform Enterprise and is not available in HCP Terraform. + + +`GET /organizations/:organization_name/relationships/data-retention-policy` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to show the data retention policy for. | + +This endpoint shows the data retention policy set explicitly on the organization. + +When no data retention policy is set for the organization, the endpoint returns the default policy configured for the Terraform Enterprise installation. Read more about [organization data retention policies](/terraform/enterprise/users-teams-organizations/organizations#data-retention-policies). + +For additional information, refer to [Data Retention Policy Types](/terraform/enterprise/api-docs/data-retention-policies#data-retention-policy-types) in the Terraform Enterprise documentation. + +## Create or update data retention policy + + +This endpoint is exclusive to Terraform Enterprise and is not available in HCP Terraform. + + +`POST /organizations/:organization_name/relationships/data-retention-policy` + +| Parameter | Description | +| -------------------- | --------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to update the data retention policy for. | + +This endpoint creates a data retention policy for an organization or updates the existing policy. + +Read more about [organization data retention policies](/terraform/enterprise/users-teams-organizations/organizations#data-retention-policies). + +Refer to [Data Retention Policy API](/terraform/enterprise/api-docs/data-retention-policies#create-or-update-data-retention-policy) in the Terraform Enterprise documentation for details. + +## Remove data retention policy + + +This endpoint is exclusive to Terraform Enterprise and is not available in HCP Terraform. + + +`DELETE /organizations/:organization_name/relationships/data-retention-policy` + +| Parameter | Description | +| -------------------- | --------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to remove the data retention policy for. | + +This endpoint removes the data retention policy explicitly set on an organization. +When the data retention policy is deleted, the organization inherits the default policy configured for the Terraform Enterprise installation. Refer to [Data Retention Policies](/terraform/enterprise/application-administration/general#data-retention-policies) for additional information. + +Refer to [Data Retention Policies](/terraform/enterprise/users-teams-organizations/organizations#data-retention-policies) for information about configuring data retention policies for an organization. + +Refer to [Data Retention Policy API](/terraform/enterprise/api-docs/data-retention-policies#remove-data-retention-policy) in the Terraform Enterprise documentation for details. + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ----------------- | ------------------------------------------------------------------------------------------ | +| `entitlement_set` | The entitlement set that determines which HCP Terraform features the organization can use. | + +## Relationships + +The following relationships may be present in various responses. + +| Resource Name | Description | +| ----------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `module-producers` | Other organizations configured to share modules with the organization. | +| `oauth-tokens` | OAuth tokens associated with VCS configurations for the organization. | +| `authentication-token` | The API token for an organization. | +| `entitlement-set` | The entitlement set that determines which HCP Terraform features the organization can use. | +| `subscription` | The current subscription for an organization. | +| `default-agent-pool` | An organization's default agent pool. Set this value if your `default-execution-mode` is `agent`. | +| `data-retention-policy` | Specifies an organization's data retention policy. Refer to [Data Retention Policy APIs](/terraform/enterprise/api-docs/data-retention-policies) in the Terraform Enterprise documentation for more details. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/plan-exports.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/plan-exports.mdx new file mode 100644 index 000000000..dabfc4fd4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/plan-exports.mdx @@ -0,0 +1,226 @@ +--- +page_title: /plan-exports API reference for Terraform Enterprise +description: >- + Use the `/plan-exports` endpoint to manage plan exports for a Terraform run. + Create and show plan exports, or download and delete exported plan data. +source: terraform-docs-common +--- + +# Plan exports API reference + +Plan exports allow users to download data exported from the plan of a Run in a Terraform workspace. Currently, the only supported format for exporting plan data is to generate mock data for Sentinel. + +## Create a plan export + +`POST /plan-exports` + +This endpoint exports data from a plan in the specified format. The export process is asynchronous, and the resulting data becomes downloadable when its status is `"finished"`. The data is then available for one hour before expiring. After the hour is up, a new export can be created. + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "plan-exports"`) | Successfully created a plan export | +| [404][] | [JSON API error object][] | Plan not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.), or a plan export of the provided `data-type` is already pending or downloadable for this plan | + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------ | ------ | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"plan-exports"`. | +| `data.attributes.data-type` | string | | The format for the export. Currently, the only supported format is `"sentinel-mock-bundle-v0"`. | +| `data.relationships.plan.data` | object | | A JSON API relationship object that represents the plan being exported. This object must have a `type` of `plans`, and the `id` of a finished Terraform plan that does not already have a downloadable export of the specified `data-type` (e.g: `{"type": "plans", "id": "plan-8F5JFydVYAmtTjET"}`) | + +### Sample Payload + +```json +{ + "data": { + "type": "plan-exports", + "attributes": { + "data-type": "sentinel-mock-bundle-v0" + }, + "relationships": { + "plan": { + "data": { + "id": "plan-8F5JFydVYAmtTjET", + "type": "plans" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/plan-exports +``` + +### Sample Response + +```json +{ + "data": { + "id": "pe-3yVQZvHzf5j3WRJ1", + "type": "plan-exports", + "attributes": { + "data-type": "sentinel-mock-bundle-v0", + "status": "queued", + "status-timestamps": { + "queued-at": "2019-03-04T22:29:53+00:00", + }, + }, + "relationships": { + "plan": { + "data": { + "id": "plan-8F5JFydVYAmtTjET", + "type": "plans" + } + } + }, + "links": { + "self": "/api/v2/plan-exports/pe-3yVQZvHzf5j3WRJ1", + } + } +} +``` + +## Show a plan export + +`GET /plan-exports/:id` + +| Parameter | Description | +| --------- | ---------------------------------- | +| `id` | The ID of the plan export to show. | + +There is no endpoint to list plan exports. You can find IDs for plan exports in the +`relationships.exports` property of a plan object. + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | ------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "plan-exports"`) | The request was successful | +| [404][] | [JSON API error object][] | Plan export not found, or user unauthorized to perform action | + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/plan-exports/pe-3yVQZvHzf5j3WRJ1 +``` + +### Sample Response + +```json +{ + "data": { + "id": "pe-3yVQZvHzf5j3WRJ1", + "type": "plan-exports", + "attributes": { + "data-type": "sentinel-mock-bundle-v0", + "status": "finished", + "status-timestamps": { + "queued-at": "2019-03-04T22:29:53+00:00", + "finished-at": "2019-03-04T22:29:58+00:00", + "expired-at": "2019-03-04T23:29:58+00:00" + }, + }, + "relationships": { + "plan": { + "data": { + "id": "plan-8F5JFydVYAmtTjET", + "type": "plans" + } + } + }, + "links": { + "self": "/api/v2/plan-exports/pe-3yVQZvHzf5j3WRJ1", + "download": "/api/v2/plan-exports/pe-3yVQZvHzf5j3WRJ1/download" + } + } +} +``` + +## Download exported plan data + +`GET /plan-exports/:id/download` + +This endpoint generates a temporary URL to the location of the exported plan data in a `.tar.gz` archive, and then redirects to that link. If using a client that can follow redirects, you can use this endpoint to save the `.tar.gz` archive locally without needing to save the temporary URL. + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------- | +| [302][] | HTTP Redirect | Plan export found and temporary download URL generated | +| [404][] | [JSON API error object][] | Plan export not found, or user unauthorized to perform action | + +[302]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/302 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --location \ + https://app.terraform.io/api/v2/plan-exports/pe-3yVQZvHzf5j3WRJ1/download \ + > export.tar.gz +``` + +## Delete exported plan data + +`DELETE /plan-exports/:id` + +Plan exports expire after being available for one hour, but they can be deleted manually as well. + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------- | +| [204][] | No content | Plan export deleted successfully | +| [404][] | [JSON API error object][] | Plan export not found, or user unauthorized to perform action | + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + -X DELETE \ + https://app.terraform.io/api/v2/plan-exports/pe-3yVQZvHzf5j3WRJ1 +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/plans.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/plans.mdx new file mode 100644 index 000000000..aee7e4eae --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/plans.mdx @@ -0,0 +1,203 @@ +--- +page_title: /plans API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/plans` endpoint to read a Terraform run + plan or generate JSON-formatted execution plans. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[307]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/307 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Plans API reference + +A plan represents the execution plan of a Run in a Terraform workspace. + +## Attributes + +### Plan States + +The plan state is found in `data.attributes.status`, and you can reference the following list of possible states. + +| State | Description | +| ------------------------- | ----------------------------------------------------------------------------- | +| `pending` | The initial status of a plan once it has been created. | +| `managed_queued`/`queued` | The plan has been queued, awaiting backend service capacity to run terraform. | +| `running` | The plan is running. | +| `errored` | The plan has errored. This is a final state. | +| `canceled` | The plan has been canceled. This is a final state. | +| `finished` | The plan has completed successfully. This is a final state. | +| `unreachable` | The plan will not run. This is a final state. | + +## Show a plan + +`GET /plans/:id` + +| Parameter | Description | +| --------- | --------------------------- | +| `id` | The ID of the plan to show. | + +There is no endpoint to list plans. You can find the ID for a plan in the +`relationships.plan` property of a run object. + +| Status | Response | Reason | +| ------- | --------------------------------------- | ------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "plans"`) | The request was successful | +| [404][] | [JSON API error object][] | Plan not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/plans/plan-8F5JFydVYAmtTjET +``` + +### Sample Response + +```json +{ + "data": { + "id": "plan-8F5JFydVYAmtTjET", + "type": "plans", + "attributes": { + "execution-details": { + "mode": "remote", + }, + "generated-configuration": false, + "has-changes": true, + "resource-additions": 0, + "resource-changes": 1, + "resource-destructions": 0, + "resource-imports": 0, + "status": "finished", + "status-timestamps": { + "queued-at": "2018-07-02T22:29:53+00:00", + "pending-at": "2018-07-02T22:29:53+00:00", + "started-at": "2018-07-02T22:29:54+00:00", + "finished-at": "2018-07-02T22:29:58+00:00" + }, + "log-read-url": "https://archivist.terraform.io/v1/object/dmF1bHQ6djE6OFA1eEdlSFVHRSs4YUcwaW83a1dRRDA0U2E3T3FiWk1HM2NyQlNtcS9JS1hHN3dmTXJmaFhEYTlHdTF1ZlgxZ2wzVC9kVTlNcjRPOEJkK050VFI3U3dvS2ZuaUhFSGpVenJVUFYzSFVZQ1VZYno3T3UyYjdDRVRPRE5pbWJDVTIrNllQTENyTndYd1Y0ak1DL1dPVlN1VlNxKzYzbWlIcnJPa2dRRkJZZGtFeTNiaU84YlZ4QWs2QzlLY3VJb3lmWlIrajF4a1hYZTlsWnFYemRkL2pNOG9Zc0ZDakdVMCtURUE3dDNMODRsRnY4cWl1dUN5dUVuUzdnZzFwL3BNeHlwbXNXZWRrUDhXdzhGNnF4c3dqaXlZS29oL3FKakI5dm9uYU5ZKzAybnloREdnQ3J2Rk5WMlBJemZQTg" + }, + "relationships": { + "state-versions": { + "data": [] + } + }, + "links": { + "self": "/api/v2/plans/plan-8F5JFydVYAmtTjET", + "json-output": "/api/v2/plans/plan-8F5JFydVYAmtTjET/json-output" + } + } +} +``` + +_Using HCP Terraform agents_ + +[HCP Terraform agents](/terraform/enterprise/api-docs/agents) allow HCP Terraform to communicate with isolated, private, or on-premises infrastructure. When a workspace is set to use the agent execution mode, the plan response will include additional details about the agent pool and agent used. + +```json +{ + "data": { + "id": "plan-8F5JFydVYAmtTjET", + "type": "plans", + "attributes": { + "execution-details": { + "agent-id": "agent-S1Y7tcKxXPJDQAvq", + "agent-name": "agent_01", + "agent-pool-id": "apool-Zigq2VGreKq7nwph", + "agent-pool-name": "first-pool", + "mode": "agent", + }, + "generated-configuration": false, + "has-changes": true, + "resource-additions": 0, + "resource-changes": 1, + "resource-destructions": 0, + "resource-imports": 0, + "status": "finished", + "status-timestamps": { + "queued-at": "2018-07-02T22:29:53+00:00", + "pending-at": "2018-07-02T22:29:53+00:00", + "started-at": "2018-07-02T22:29:54+00:00", + "finished-at": "2018-07-02T22:29:58+00:00" + }, + "log-read-url": "https://archivist.terraform.io/v1/object/dmF1bHQ6djE6OFA1eEdlSFVHRSs4YUcwaW83a1dRRDA0U2E3T3FiWk1HM2NyQlNtcS9JS1hHN3dmTXJmaFhEYTlHdTF1ZlgxZ2wzVC9kVTlNcjRPOEJkK050VFI3U3dvS2ZuaUhFSGpVenJVUFYzSFVZQ1VZYno3T3UyYjdDRVRPRE5pbWJDVTIrNllQTENyTndYd1Y0ak1DL1dPVlN1VlNxKzYzbWlIcnJPa2dRRkJZZGtFeTNiaU84YlZ4QWs2QzlLY3VJb3lmWlIrajF4a1hYZTlsWnFYemRkL2pNOG9Zc0ZDakdVMCtURUE3dDNMODRsRnY4cWl1dUN5dUVuUzdnZzFwL3BNeHlwbXNXZWRrUDhXdzhGNnF4c3dqaXlZS29oL3FKakI5dm9uYU5ZKzAybnloREdnQ3J2Rk5WMlBJemZQTg" + }, + "relationships": { + "state-versions": { + "data": [] + } + }, + "links": { + "self": "/api/v2/plans/plan-8F5JFydVYAmtTjET", + "json-output": "/api/v2/plans/plan-8F5JFydVYAmtTjET/json-output" + } + } +} +``` + +## Retrieve the JSON execution plan + +`GET /plans/:id/json-output` + +`GET /runs/:id/plan/json-output` + +These endpoints generate a temporary authenticated URL to the location of the [JSON formatted execution plan](/terraform/internals/json-format#format-summary). When successful, this endpoint responds with a temporary redirect that should be followed. If using a client that can follow redirects, you can use this endpoint to save the `.json` file locally without needing to save the temporary URL. + +This temporary URL provided by the redirect has a life of **1 minute**, and should not be relied upon beyond the initial request. If you need repeat access, you should use this endpoint to generate a new URL each time. + +-> **Note:** This endpoint is available for plans using Terraform 0.12 and later. For Terraform Enterprise, this endpoint is available from v202005-1, and its stability was improved in v202007-1. + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens) that has admin level access to the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------------------------------------------- | +| [204][] | No Content | Plan JSON supported, but plan has not yet completed. | +| [307][] | Temporary Redirect | Plan JSON found and temporary download URL generated | +| [422][] | [JSON API error object][] | Plan does not use a supported version of terraform (< 0.12.X) | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --location \ + https://app.terraform.io/api/v2/plans/plan-8F5JFydVYAmtTjET/json-output | + > json-output.json +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policies.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policies.mdx new file mode 100644 index 000000000..64118b236 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policies.mdx @@ -0,0 +1,564 @@ +--- +page_title: /policies API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/policies` endpoint to list, show, create, + upload, update, and delete Sentinel and OPA policies. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Policies API reference + +Policies are rules that HCP Terraform enforces on Terraform runs. You can use policies to validate that the Terraform plan complies with security rules and best practices. HCP Terraform policy enforcement lets you use the policy-as-code frameworks Sentinel and Open Policy Agent (OPA) to apply policy checks to HCP Terraform workspaces. Refer to [Policy Enforcement](/terraform/enterprise/policy-enforcement) for more details. + +[Policy sets](/terraform/enterprise/policy-enforcement/manage-policy-sets) are collections of policies that you can apply globally or to specific [projects](/terraform/enterprise/projects/manage) and workspaces, in your organization. For each run in the selected workspaces, HCP Terraform checks the Terraform plan against the policy set and displays the results in the UI. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +This page documents the API endpoints to create, read, update, and delete policies in an organization. To manage policy sets, use the [Policy Sets API](/terraform/enterprise/api-docs/policy-sets). To manage the policy results, use the [Runs API](/terraform/enterprise/api-docs/run). + +## Create a Policy + +`POST /organizations/:organization_name/policies` + +| Parameter | Description | +| -------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The organization to create the policy in. The organization must already exist in the system, and the token authenticating the API request must have permission to manage policies. (([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) | + +\[permissions-citation]: #intentionally-unused---keep-for-maintainers) + +This creates a new policy object for the organization, but does not upload the actual policy code. After creation, you must use the [Upload a Policy endpoint (below)](#upload-a-policy) with the new policy's upload path. (This endpoint's response body includes the upload path in its `links.upload` property.) + +| Status | Response | Reason | +| ------- | ------------------------------------------ | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "policies"`) | Successfully created a policy | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------------------- | -------------- | ---------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"policies"`. | +| `data.attributes.name` | string | | The name of the policy, which can include letters, numbers, `-`, and `_`. You cannot modify this name after creation. | +| `data.attributes.description` | string | `null` | Text describing the policy's purpose. This field supports Markdown and appears in the HCP Terraform UI. | +| `data.attributes.kind` | string | `sentinel` | The policy-as-code framework for the policy. Valid values are `"sentinel"` and `"opa"`. | +| `data.attributes.query` | string | | The OPA query to run. Only valid for OPA policies. | +| `data.attributes.enforcement-level` | string | | The enforcement level of the policy. For Sentinel, valid values are `"hard-mandatory"`, `"soft-mandatory"`, and `"advisory"`. For OPA, Valid values are `"mandatory"`and `"advisory"`. Refer to [Managing Policies](/terraform/enterprise/policy-enforcement/manage-policy-sets) for details. | +| `data.attributes.enforce` | array\[object] | | **DEPRECATED** Use `enforcement-level` instead. An array of enforcement configurations that map policy file paths to their enforcement modes. Policies support a single file, so this array should consist of a single element. For Sentinel, if the path in the enforcement map does not match the Sentinel policy (`.sentinel`), then HCP Terraform uses the default `hard-mandatory` enforcement level. For OPA, the default enforcement level is `advisory`. | +| `data.attributes.enforce[].path` | string | | **DEPRECATED** For Sentinel, must be `.sentinel`, where `` has the same value as `data.attributes.name`. For OPA, must be `.rego`. | +| `data.attributes.enforce[].mode` | string | | **DEPRECATED** Use `enforcement-level` instead. The enforcement level of the policy. For Sentinel, valid values are `"hard-mandatory"`, `"soft-mandatory"`, and `"advisory"`. For OPA, Valid values are `"mandatory"`and `"advisory"`. Refer to [Managing Policies](/terraform/enterprise/policy-enforcement/manage-policy-sets) for details. | +| `data.relationships.policy-sets.data[]` | array\[object] | `[]` | A list of resource identifier objects to define which policy sets include the new policy. These objects must contain `id` and `type` properties, and the `type` property must be `policy-sets`. For example,`{ "id": "polset-3yVQZvHzf5j3WRJ1","type": "policy-sets" }`. | + +### Sample Payload (Sentinel) + +```json +{ + "data": { + "attributes": { + "enforcement-level": "hard-mandatory", + "name": "my-example-policy", + "description": "An example policy.", + "kind": "sentinel" + }, + "relationships": { + "policy-sets": { + "data": [ + { "id": "polset-3yVQZvHzf5j3WRJ1", "type": "policy-sets" } + ] + } + }, + "type": "policies" + } +} +``` + +### Sample Payload (OPA) + +-> **Note**: We have deprecated the `enforce` property in requests and responses but continue to provide it for backward compatibility. The below sample uses the deprecated `enforce` property. + +```json +{ + "data": { + "attributes": { + "enforce": [ + { + "path": "my-example-policy.rego", + "mode": "advisory" + } + ], + "name": "my-example-policy", + "description": "An example policy.", + "kind": "opa", + "query": "terraform.main" + }, + "relationships": { + "policy-sets": { + "data": [ + { "id": "polset-3yVQZvHzf5j3WRJ1", "type": "policy-sets" } + ] + } + }, + "type": "policies" + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/policies +``` + +### Sample Response (Sentinel) + +```json +{ + "data": { + "id":"pol-u3S5p2Uwk21keu1s", + "type":"policies", + "attributes": { + "name":"my-example-policy", + "description":"An example policy.", + "enforcement-level":"advisory", + "enforce": [ + { + "path":"my-example-policy.sentinel", + "mode":"advisory" + } + ], + "policy-set-count": 1, + "updated-at": null + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "policy-sets": { + "data": [ + { "id": "polset-3yVQZvHzf5j3WRJ1", "type": "policy-sets" } + ] + } + }, + "links": { + "self":"/api/v2/policies/pol-u3S5p2Uwk21keu1s", + "upload":"/api/v2/policies/pol-u3S5p2Uwk21keu1s/upload" + } + } +} +``` + +### Sample Response (OPA) + +```json +{ + "data": { + "id":"pol-u3S5p2Uwk21keu1s", + "type":"policies", + "attributes": { + "name":"my-example-policy", + "description":"An example policy.", + "kind": "opa", + "query": "terraform.main", + "enforcement-level": "advisory", + "enforce": [ + { + "path":"my-example-policy.rego", + "mode":"advisory" + } + ], + "policy-set-count": 1, + "updated-at": null + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "policy-sets": { + "data": [ + { "id": "polset-3yVQZvHzf5j3WRJ1", "type": "policy-sets" } + ] + } + }, + "links": { + "self":"/api/v2/policies/pol-u3S5p2Uwk21keu1s", + "upload":"/api/v2/policies/pol-u3S5p2Uwk21keu1s/upload" + } + } +} +``` + +## Show a Policy + +`GET /policies/:policy_id` + +| Parameter | Description | +| ------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:policy_id` | The ID of the policy to show. Refer to [List Policies](/terraform/enterprise/api-docs/policies#list-policies) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | ------------------------------------------ | ------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "policies"`) | The request was successful | +| [404][] | [JSON API error object][] | Policy not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl --request GET \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/policies/pol-oXUppaX2ximkqp8w +``` + +### Sample Response + +```json +{ + "data": { + "id": "pol-oXUppaX2ximkqp8w", + "type": "policies", + "attributes": { + "name": "my-example-policy", + "description":"An example policy.", + "kind": "sentinel", + "enforcement-level": "soft-mandatory", + "enforce": [ + { + "path": "my-example-policy.sentinel", + "mode": "soft-mandatory" + } + ], + "policy-set-count": 1, + "updated-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "policy-sets": { + "data": [ + { "id": "polset-3yVQZvHzf5j3WRJ1", "type": "policy-sets" } + ] + } + }, + "links": { + "self": "/api/v2/policies/pol-oXUppaX2ximkqp8w", + "upload": "/api/v2/policies/pol-oXUppaX2ximkqp8w/upload", + "download": "/api/v2/policies/pol-oXUppaX2ximkqp8w/download" + } + } +} +``` + +## Upload a Policy + +`PUT /policies/:policy_id/upload` + +| Parameter | Description | +| ------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:policy_id` | The ID of the policy to upload code to. Refer to [List Policies](/terraform/enterprise/api-docs/policies#list-policies) for reference information about finding the policy ID. The ID also appears in the response when you create a policy. | + +This endpoint uploads code to an existing Sentinel or OPA policy. + +-> **Note**: This endpoint does not use JSON-API's conventions for HTTP headers and body serialization. + +-> **Note**: This endpoint limits the size of uploaded policies to 10MB. If a larger payload is uploaded, an HTTP 413 error will be returned, and the policy will not be saved. Consider refactoring policies into multiple smaller, more concise documents if you reach this limit. + +### Request Body + +This PUT endpoint requires the text of a valid Sentinel or OPA policy with a `Content-Type` of `application/octet-stream`. + +- Refer to [Defining Sentinel Policies](/terraform/enterprise/policy-enforcement/sentinel) for details about writing Sentinel code. +- Refer to [Defining OPA Policies](/terraform/enterprise/policy-enforcement/opa) for details about writing OPA code. + +### Sample Payload + +```plain +main = rule { true } +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/octet-stream" \ + --request PUT \ + --data-binary @payload.file \ + https://app.terraform.io/api/v2/policies/pol-u3S5p2Uwk21keu1s/upload +``` + +## Update a Policy + +`PATCH /policies/:policy_id` + +| Parameter | Description | +| ------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:policy_id` | The ID of the policy to update. Refer to [List Policies](/terraform/enterprise/api-docs/policies#list-policies) for reference information about finding IDs. | + +This endpoint can update the enforcement mode of an existing policy. To update the policy code itself, use the upload endpoint. + +| Status | Response | Reason | +| ------- | ------------------------------------------ | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "policies"`) | Successfully updated the policy | +| [404][] | [JSON API error object][] | Policy not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | -------------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"policies"`. | +| `data.attributes.description` | string | `null` | Text describing the policy's purpose. This field supports Markdown and appears in the HCP Terraform UI. | +| `data.attributes.query` | string | | The OPA query to run. This is only valid for OPA policies. | +| `data.attributes.enforcement-level` | string | | The enforcement level of the policy. For Sentinel, valid values are `"hard-mandatory"`, `"soft-mandatory"`, and `"advisory"`. For OPA, Valid values are `"mandatory"`and `"advisory"`. Refer to [Managing Policies](/terraform/enterprise/policy-enforcement/manage-policy-sets) for details. | +| `data.attributes.enforce` | array\[object] | | **DEPRECATED** Use `enforcement-level` instead. An array of enforcement configurations that map policy file paths to their enforcement modes. Policies support a single file, so this array should consist of a single element. For Sentinel, if the path in the enforcement map does not match the Sentinel policy (`.sentinel`), then HCP Terraform uses the default `hard-mandatory` enforcement level. For OPA, the default enforcement level is `advisory`. | +| `data.attributes.enforce[].path` | string | | **DEPRECATED** For Sentinel, must be `.sentinel`, where `` has the same value as `data.attributes.name`. For OPA, must be `.rego`. | +| `data.attributes.enforce[].mode` | string | | **DEPRECATED** Use `enforcement-level` instead. The enforcement level of the policy. For Sentinel, valid values are `"hard-mandatory"`, `"soft-mandatory"`, and `"advisory"`. For OPA, Valid values are `"mandatory"`and `"advisory"`. Refer to [Managing Policies](/terraform/enterprise/policy-enforcement/manage-policy-sets) for details. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "enforcement-level": "soft-mandatory" + }, + "type":"policies" + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/policies/pol-u3S5p2Uwk21keu1s +``` + +### Sample Response + +```json +{ + "data": { + "id":"pol-u3S5p2Uwk21keu1s", + "type":"policies", + "attributes": { + "name":"my-example-policy", + "description":"An example policy.", + "kind": "sentinel", + "enforcement-level": "soft-mandatory", + "enforce": [ + { + "path":"my-example-policy.sentinel", + "mode":"soft-mandatory" + } + ], + "policy-set-count": 0, + "updated-at":"2017-10-10T20:58:04.621Z" + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + }, + "links": { + "self":"/api/v2/policies/pol-u3S5p2Uwk21keu1s", + "upload":"/api/v2/policies/pol-u3S5p2Uwk21keu1s/upload", + "download":"/api/v2/policies/pol-u3S5p2Uwk21keu1s/download" + } + } +} +``` + +## List Policies + +`GET /organizations/:organization_name/policies` + +| Parameter | Description | +| -------------------- | -------------------------------------- | +| `:organization_name` | The organization to list policies for. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | Array of [JSON API document][]s (`type: "policies"`) | Success | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | | +| -------------- | --------------------------------------------------------------------------------------------------------------------------------- | - | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 policies per page. | | +| `search[name]` | **Optional.** Allows searching the organization's policies by name. | | +| `filter[kind]` | **Optional.** If specified, restricts results to those with the matching policy kind value. Valid values are `sentinel` and `opa` | | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/organizations/my-organization/policies +``` + +### Sample Response + +```json +{ + "data": [ + { + "attributes": { + "enforcement-level": "advisory", + "enforce": [ + { + "mode": "advisory", + "path": "my-example-policy.sentinel" + } + ], + "name": "my-example-policy", + "description": "An example policy.", + "policy-set-count": 0, + "updated-at": "2017-10-10T20:52:13.898Z", + "kind": "sentinel" + }, + "id": "pol-u3S5p2Uwk21keu1s", + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + }, + "links": { + "download": "/api/v2/policies/pol-u3S5p2Uwk21keu1s/download", + "self": "/api/v2/policies/pol-u3S5p2Uwk21keu1s", + "upload": "/api/v2/policies/pol-u3S5p2Uwk21keu1s/upload" + }, + "type": "policies" + }, + { + "id":"pol-vM2rBfj7V2Faq8By", + "type":"policies", + "attributes":{ + "name":"policy1", + "description":null, + "enforcement-level": "advisory", + "enforce":[ + { + "path":"policy1.rego", + "mode":"advisory" + } + ], + "policy-set-count":1, + "updated-at":"2022-09-13T04:57:43.516Z", + "kind":"opa", + "query":"data.terraform.rules.policy1.rule" + }, + "relationships":{ + "organization":{ + "data":{ + "id":"hashicorp", + "type":"organizations" + } + }, + "policy-sets":{ + "data":[ + { + "id":"polset-FYu3k5WY5eecwwdt", + "type":"policy-sets" + } + ] + } + }, + "links":{ + "self":"/api/v2/policies/pol-vM2rBfj7V2Faq8By", + "upload":"/api/v2/policies/pol-vM2rBfj7V2Faq8By/upload", + "download":"/api/v2/policies/pol-vM2rBfj7V2Faq8By/download" + } + } + ] +} +``` + +## Delete a Policy + +`DELETE /policies/:policy_id` + +| Parameter | Description | +| ------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:policy_id` | The ID of the policy to delete. Refer to [List Policies](/terraform/enterprise/api-docs/policies#list-policies) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------- | +| [204][] | No Content | Successfully deleted the policy | +| [404][] | [JSON API error object][] | Policy not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/policies/pl-u3S5p2Uwk21keu1s +``` + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ------------- | ------------------------------------------------------ | +| `policy_sets` | Policy sets that any returned policies are members of. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-checks.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-checks.mdx new file mode 100644 index 000000000..621f40d36 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-checks.mdx @@ -0,0 +1,265 @@ +--- +page_title: /policy-checks API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/policy-checks` endpoint to manage and + override the Sentinel policy checks that HCP Terraform performs during a run. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Policy checks API reference + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Policy checks are the default workflow for Sentinel. Policy checks use the latest version of the Sentinel runtime and have access to cost estimation data. +This set of APIs provides endpoints to get, list, and override policy checks. + +~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions. + +## List Policy Checks + +This endpoint lists the policy checks in a run. + +-> **Note**: The `sentinel` hash in the `result` attribute structure represents low-level Sentinel details generated by the policy engine. The keys or structure may change over time. Use the data in this hash at your own risk. + +`GET /runs/:run_id/policy-checks` + +| Parameter | Description | +| --------- | -------------------------------------------- | +| `run_id` | The ID of the run to list policy checks for. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results. + +| Parameter | Description | +| -------------- | ----------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 policy checks per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/runs/run-CZcmD7eagjhyXavN/policy-checks +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "polchk-9VYRc9bpfJEsnwum", + "type": "policy-checks", + "attributes": { + "result": { + "result": false, + "passed": 0, + "total-failed": 1, + "hard-failed": 0, + "soft-failed": 1, + "advisory-failed": 0, + "duration-ms": 0, + "sentinel": {...} + }, + "scope": "organization", + "status": "soft_failed", + "status-timestamps": { + "queued-at": "2017-11-29T20:02:17+00:00", + "soft-failed-at": "2017-11-29T20:02:20+00:00" + }, + "actions": { + "is-overridable": true + }, + "permissions": { + "can-override": false + } + }, + "relationships": { + "run": { + "data": { + "id": "run-veDoQbv6xh6TbnJD", + "type": "runs" + } + } + }, + "links": { + "output": "/api/v2/policy-checks/polchk-9VYRc9bpfJEsnwum/output" + } + } + ] +} +``` + +## Show Policy Check + +This endpoint gets information about a specific policy check ID. Policy check IDs can appear in audit logs. + +-> **Note**: The `sentinel` hash in the `result` attribute structure represents low-level Sentinel details generated by the policy engine. The keys or structure may change over time. Use the data in this hash at your own risk. + +`GET /policy-checks/:id` + +| Parameter | Description | +| --------- | ----------------------------------- | +| `id` | The ID of the policy check to show. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/policy-checks/polchk-9VYRc9bpfJEsnwum +``` + +### Sample Response + +```json +{ + "data": { + "id": "polchk-9VYRc9bpfJEsnwum", + "type": "policy-checks", + "attributes": { + "result": { + "result": false, + "passed": 0, + "total-failed": 1, + "hard-failed": 0, + "soft-failed": 1, + "advisory-failed": 0, + "duration-ms": 0, + "sentinel": {...} + }, + "scope": "organization", + "status": "soft_failed", + "status-timestamps": { + "queued-at": "2017-11-29T20:02:17+00:00", + "soft-failed-at": "2017-11-29T20:02:20+00:00" + }, + "actions": { + "is-overridable": true + }, + "permissions": { + "can-override": false + } + }, + "relationships": { + "run": { + "data": { + "id": "run-veDoQbv6xh6TbnJD", + "type": "runs" + } + } + }, + "links": { + "output": "/api/v2/policy-checks/polchk-9VYRc9bpfJEsnwum/output" + } + } +} +``` + +## Override Policy + +This endpoint overrides a soft-mandatory or warning policy. + +-> **Note**: The `sentinel` hash in the `result` attribute structure represents low-level Sentinel details generated by the policy engine. The keys or structure may change over time. Use the data in this hash at your own risk. + +`POST /policy-checks/:id/actions/override` + +| Parameter | Description | +| --------- | --------------------------------------- | +| `id` | The ID of the policy check to override. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/policy-checks/polchk-EasPB4Srx5NAiWAU/actions/override +``` + +### Sample Response + +```json +{ + "data": { + "id": "polchk-EasPB4Srx5NAiWAU", + "type": "policy-checks", + "attributes": { + "result": { + "result": false, + "passed": 0, + "total-failed": 1, + "hard-failed": 0, + "soft-failed": 1, + "advisory-failed": 0, + "duration-ms": 0, + "sentinel": {...} + }, + "scope": "organization", + "status": "overridden", + "status-timestamps": { + "queued-at": "2017-11-29T20:13:37+00:00", + "soft-failed-at": "2017-11-29T20:13:40+00:00", + "overridden-at": "2017-11-29T20:14:11+00:00" + }, + "actions": { + "is-overridable": true + }, + "permissions": { + "can-override": false + } + }, + "links": { + "output": "/api/v2/policy-checks/polchk-EasPB4Srx5NAiWAU/output" + } + } +} +``` + +### Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| --------------- | ------------------------------------- | +| `run` | The run this policy check belongs to. | +| `run.workspace` | The associated workspace of the run. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-evaluations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-evaluations.mdx new file mode 100644 index 000000000..9733bfbed --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-evaluations.mdx @@ -0,0 +1,288 @@ +--- +page_title: /policy-evaluations API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/policy-evaluations` endpoint to read + policy outcomes and evaluations from Sentinel and OPA policies that HCP + Terraform performs during a Terraform run. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Policy evaluations API reference + +Policy evaluations are run within the [HCP Terraform agents](/terraform/enterprise/api-docs/agents) in HCP Terraform's infrastructure. Policy evaluations do not have access to cost estimation data. +This set of APIs provides endpoints to list and get policy evaluations and policy outcomes. + +## List Policy Evaluations in the Task Stage + +Each run passes through several stages of action (pending, plan, policy check, apply, and completion), and shows the progress through those stages as [run states](/terraform/enterprise/run/states). +This endpoint allows you to list policy evaluations that are part of the task stage. + +`GET /task-stages/:task_stage_id/policy-evaluations` + +| Parameter | Description | +| ---------------- | ------------------------- | +| `:task_stage_id` | The task stage ID to get. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------- | +| [200][] | [JSON API document][] | Success | +| [404][] | [JSON API error object][] | Task stage not found | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling does not automatically encode URLs. + +| Parameter | Description | +| -------------- | ----------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint returns the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint returns 20 agent pools per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/task-stages/ts-rL5ZsuwfjqfPJcdi/policy-evaluations +``` + +### Sample Response + +```json +{ + "data":[ + { + "id":"poleval-8Jj9Hfoz892D9WMX", + "type":"policy-evaluations", + "attributes":{ + "status":"passed", + "policy-kind":"opa", + "policy-tool-version": "0.44.0", + "result-count": { + "advisory-failed":0, + "errored":0, + "mandatory-failed":0, + "passed":1 + } + "status-timestamps":{ + "passed-at":"2022-09-16T01:40:30+00:00", + "queued-at":"2022-09-16T01:40:04+00:00", + "running-at":"2022-09-16T01:40:08+00:00" + }, + "created-at":"2022-09-16T01:39:07.782Z", + "updated-at":"2022-09-16T01:40:30.010Z" + }, + "relationships":{ + "policy-attachable":{ + "data":{ + "id":"ts-yxskot8Gz5yHa38W", + "type":"task-stages" + } + }, + "policy-set-outcomes":{ + "links":{ + "related":"/api/v2/policy-evaluations/poleval-8Jj9Hfoz892D9WMX/policy-set-outcomes" + } + } + }, + "links":{ + "self":"/api/v2/policy-evaluations/poleval-8Jj9Hfoz892D9WMX" + } + } + ] +} +``` + +## List Policy Outcomes + +`GET /policy-evaluations/:policy_evaluation_id/policy-set-outcomes` + +| Parameter | Description | +| ----------------------- | ---------------------------------------------------------- | +| `:policy_evaluation_id` | The ID of the policy evaluation the outcome belongs to get | + +This endpoint allows you to list policy set outcomes that are part of the policy evaluation. + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------- | +| [200][] | [JSON API document][] | Success | +| [404][] | [JSON API error object][] | Policy evaluation not found | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling does not automatically encode URLs. + +| Parameter | Description | +| ----------------------------- | ---------------------------------------------------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint returns the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint returns 20 policy sets per page. | +| `filter[n][status]` | **Optional.** If omitted, the endpoint returns all policies regardless of status. Must be either "passed", "failed", or "errored". | +| `filter[n][enforcementLevel]` | **Optional.** Only used if paired with a non-errored status filter. Must be either "advisory" or "mandatory." | + +-> **Note**: You can use `filter[n]` to combine combinations of statuses and enforcement levels. Policy outcomes with an errored status do not have an enforcement level. + +### Sample Request + +The following example requests demonstrate how to call the `policy-set-outcomes` endpoint using cuRL. + +#### All Policy Outcomes + +The following example call returns all policy set outcomes. + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/policy-evaluations/poleval-8Jj9Hfoz892D9WMX/policy-set-outcomes +``` + +#### Failed and Errored Policy Outcomes + +The following example call filters the response so that it only contains failed outcomes and errors. + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/policy-evaluations/poleval-8Jj9Hfoz892D9WMX/policy-set-outcomes?filter[0][status]=errored&filter[1][status]=failed&filter[1][enforcementLevel]=mandatory +``` + +### Sample Response + +The following example response shows that the `policyVCS` policy failed. + +```json +{ + "data":[ + { + "id":"psout-cu8E9a97LBepZZXd", + "type":"policy-set-outcomes", + "attributes":{ + "outcomes":[ + { + "enforcement_level":"advisory", + "query":"data.terraform.main.main", + "status":"failed", + "policy_name":"policyVCS", + "description":"" + } + ], + "error":"", + "overridable":true, + "policy-set-name":"opa-policies-vcs", + "policy-set-description":null, + "result-count":{ + "advisory-failed":1, + "errored":0, + "mandatory-failed":0, + "passed":0 + }, + "policy-tool-version": "0.54.0" + }, + "relationships":{ + "policy-evaluation":{ + "data":{ + "id":"poleval-8Jj9Hfoz892D9WMX", + "type":"policy-evaluations" + } + } + } + } + ], + "links":{ + "self":"/api/v2/policy-evaluations/poleval-8Jj9Hfoz892D9WMX/policy-set-outcomes?page%5Bnumber%5D=1\u0026page%5Bsize%5D=20", + "first":"/api/v2/policy-evaluations/poleval-8Jj9Hfoz892D9WMX/policy-set-outcomes?page%5Bnumber%5D=1\u0026page%5Bsize%5D=20", + "prev":null, + "next":null, + "last":"/api/v2/policy-evaluations/poleval-8Jj9Hfoz892D9WMX/policy-set-outcomes?page%5Bnumber%5D=1\u0026page%5Bsize%5D=20" + }, + "meta":{ + "pagination":{ + "current-page":1, + "page-size":20, + "prev-page":null, + "next-page":null, + "total-pages":1, + "total-count":1 + } + } +} +``` + +## Show a Policy Outcome + +`GET /policy-set-outcomes/:policy_set_outcome_id` + +| Parameter | Description | +| ------------------------ | --------------------------------------------------------------------------------------------------------------------------------------------- | +| `:policy_set_outcome_id` | The ID of the policy outcome to show. Refer to [List the Policy Outcomes](#list-policy-outcomes) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------------- | +| [200][] | [JSON API document][] | The request was successful | +| [404][] | [JSON API error object][] | Policy set outcome not found or user unauthorized to perform action | + +### Sample Request + +The following example request gets the outcomes for the `psout-cu8E9a97LBepZZXd` policy set. + +```shell +curl --request GET \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/policy-set-outcomes/psout-cu8E9a97LBepZZXd +``` + +### Sample Response + +The following example response shows that the `policyVCS` policy failed. + +```json +{ + "data":{ + "id":"psout-cu8E9a97LBepZZXd", + "type":"policy-set-outcomes", + "attributes":{ + "outcomes":[ + { + "enforcement_level":"advisory", + "query":"data.terraform.main.main", + "status":"failed", + "policy_name":"policyVCS", + "description":"" + } + ], + "error":"", + "overridable":true, + "policy-set-name":"opa-policies-vcs", + "policy-set-description":null, + "result-count":{ + "advisory-failed":1, + "errored":0, + "mandatory-failed":0, + "passed":0 + }, + "policy-tool-version": "0.54.0" + }, + "relationships":{ + "policy-evaluation":{ + "data":{ + "id":"poleval-8Jj9Hfoz892D9WMX", + "type":"policy-evaluations" + } + } + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-set-params.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-set-params.mdx new file mode 100644 index 000000000..4065a72ca --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-set-params.mdx @@ -0,0 +1,290 @@ +--- +page_title: /parameters API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/parameters` endpoint to manage the + key/value pairs that Sentinel uses for policy checks. Read, create, update, + and delete parameters. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Policy set parameters API references + +[Sentinel parameters](/sentinel/docs/language/parameters) are a list of key/value pairs that HCP Terraform sends to the Sentinel runtime when performing policy checks on workspaces. They can help you avoid hardcoding sensitive parameters into a policy. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Parameters are only available for Sentinel policies. This set of APIs provides endpoints to create, update, list and delete parameters. + +## Create a Parameter + +`POST /policy-sets/:policy_set_id/parameters` + +| Parameter | Description | +| ---------------- | ---------------------------------------------------- | +| `:policy_set_id` | The ID of the policy set to create the parameter in. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------- | ------ | ------- | ------------------------------------------------------------------------------------------------------ | +| `data.type` | string | | Must be `"vars"`. | +| `data.attributes.key` | string | | The name of the parameter. | +| `data.attributes.value` | string | `""` | The value of the parameter. | +| `data.attributes.category` | string | | The category of the parameters. Must be `"policy-set"`. | +| `data.attributes.sensitive` | bool | `false` | Whether the value is sensitive. If true then the parameter is written once and not visible thereafter. | + +### Sample Payload + +```json +{ + "data": { + "type":"vars", + "attributes": { + "key":"some_key", + "value":"some_value", + "category":"policy-set", + "sensitive":false + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s/parameters +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-EavQ1LztoRTQHSNT", + "type":"vars", + "attributes": { + "key":"some_key", + "value":"some_value", + "sensitive":false, + "category":"policy-set" + }, + "relationships": { + "configurable": { + "data": { + "id":"pol-u3S5p2Uwk21keu1s", + "type":"policy-sets" + }, + "links": { + "related":"/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s" + } + } + }, + "links": { + "self":"/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s/parameters/var-EavQ1LztoRTQHSNT" + } + } +} +``` + +## List Parameters + +`GET /policy-sets/:policy_set_id/parameters` + +| Parameter | Description | +| ---------------- | ------------------------------------------------ | +| `:policy_set_id` | The ID of the policy set to list parameters for. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results. + +| Parameter | Description | +| -------------- | -------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 parameters per page. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ +"https://app.terraform.io/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s/parameters" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id":"var-AD4pibb9nxo1468E", + "type":"vars", + "attributes": { + "key":"name", + "value":"hello", + "sensitive":false, + "category":"policy-set", + }, + "relationships": { + "configurable": { + "data": { + "id":"pol-u3S5p2Uwk21keu1s", + "type":"policy-sets" + }, + "links": { + "related":"/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s" + } + } + }, + "links": { + "self":"/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s/parameters/var-AD4pibb9nxo1468E" + } + } + ] +} +``` + +## Update Parameters + +`PATCH /policy-sets/:policy_set_id/parameters/:parameter_id` + +| Parameter | Description | +| ---------------- | ------------------------------------------------- | +| `:policy_set_id` | The ID of the policy set that owns the parameter. | +| `:parameter_id` | The ID of the parameter to be updated. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------- | ------ | ------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"vars"`. | +| `data.id` | string | | The ID of the parameter to update. | +| `data.attributes` | object | | New attributes for the parameter. This object can include `key`, `value`, `category` and `sensitive` properties, which are described above under [create a parameter](#create-a-parameter). All of these properties are optional; if omitted, a property will be left unchanged. | + +### Sample Payload + +```json +{ + "data": { + "id":"var-yRmifb4PJj7cLkMG", + "attributes": { + "key":"name", + "value":"mars", + "category":"policy-set", + "sensitive": false + }, + "type":"vars" + } +} +``` + +### Sample Request + +```bash +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s/parameters/var-yRmifb4PJj7cLkMG +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-yRmifb4PJj7cLkMG", + "type":"vars", + "attributes": { + "key":"name", + "value":"mars", + "sensitive":false, + "category":"policy-set", + }, + "relationships": { + "configurable": { + "data": { + "id":"pol-u3S5p2Uwk21keu1s", + "type":"policy-sets" + }, + "links": { + "related":"/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s" + } + } + }, + "links": { + "self":"/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s/parameters/var-yRmifb4PJj7cLkMG" + } + } +} +``` + +## Delete Parameters + +`DELETE /policy-sets/:policy_set_id/parameters/:parameter_id` + +| Parameter | Description | +| ---------------- | ------------------------------------------------- | +| `:policy_set_id` | The ID of the policy set that owns the parameter. | +| `:parameter_id` | The ID of the parameter to be deleted. | + +### Sample Request + +```bash +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/policy-sets/polset-u3S5p2Uwk21keu1s/parameters/var-yRmifb4PJj7cLkMG +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-sets.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-sets.mdx new file mode 100644 index 000000000..a0e73b0a9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/policy-sets.mdx @@ -0,0 +1,1298 @@ +--- +page_title: /policy-sets API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/policy-sets` endpoint to read, create, + delete, update and version Sentinel and OPA policy sets. Also, attach, + exclude, and detach policy sets to workspaces and projects. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Policy sets API reference + +[Policy Enforcement](/terraform/enterprise/policy-enforcement) lets you use the policy-as-code frameworks Sentinel and Open Policy Agent (OPA) to apply policy checks to HCP Terraform workspaces. + +[Policy sets](/terraform/enterprise/policy-enforcement/manage-policy-sets) are collections of policies that you can apply globally or to specific [projects](/terraform/enterprise/projects/manage) and workspaces. For each run in the selected workspaces, HCP Terraform checks the Terraform plan against the policy set. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +This API provides endpoints to create, read, update, and delete policy sets in an HCP Terraform organization. To view and manage individual policies, use the [Policies API](/terraform/enterprise/api-docs/policies). + +Many of these endpoints let you create policy sets from a designated repository in a Version Control System (VCS). For more information about how to configure a policy set VCS repository, refer to [Sentinel Policy Set VCS Repositories](/terraform/enterprise/policy-enforcement/sentinel/vcs) and [OPA Policy Set VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs). + +Instead of connecting HCP Terraform to a VCS repository, you can use the the [Policy Set Versions endpoint](#create-a-policy-set-version) to create an entire policy set from a `tar.gz` file. + +Interacting with policy sets requires permission to manage policies. ([More about permissions](/terraform/enterprise/users-teams-organizations/permissions).) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Create a policy set + +`POST /organizations/:organization_name/policy-sets` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The organization to create the policy set in. The organization must already exist in the system, and the token authenticating the API request must have permission to manage policies. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | --------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "policy-sets"`) | Successfully created a policy set | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------------------------- | -------------- | ---------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"policy-sets"`. | +| `data.attributes.name` | string | | The name of the policy set. Can include letters, numbers, `-`, and `_`. | +| `data.attributes.description` | string | `null` | Text describing the policy set's purpose. This field supports Markdown and appears in the HCP Terraform UI. | +| `data.attributes.global` | boolean | `false` | Whether HCP Terraform should automatically apply this policy set to all of an organization's workspaces. | +| `data.attributes.kind` | string | `sentinel` | The policy-as-code framework associated with the policy. Valid values are `sentinel` and `opa`. | +| `data.attributes.overridable` | boolean | `false` | Whether or not users can override this policy when it fails during a run. Valid for sentinel policies only if `agent-enabled` is set to `true`. | +| `data.attributes.vcs-repo` | object | `null` | VCS repository information. When present, HCP Terraform sources the policies and configuration from the specified VCS repository. This attribute and `policies` relationships are mutually exclusive, and you cannot use them simultaneously. | +| `data.attributes.vcs-repo.branch` | string | `null` | The branch of the VCS repository where HCP Terraform should retrieve the policy set. If empty, HCP Terraform uses the default branch. | +| `data.attributes.vcs-repo.identifier` | string | | The VCS repository identifier in the format `/`. For example, `hashicorp/my-policy-set`. The format for Azure DevOps is `//_git/`. | +| `data.attributes.vcs-repo.oauth-token-id` | string | | The OAuth Token ID HCP Terraform should use to connect to the VCS host. This value must not be specified if `github-app-installation-id` is specified. | +| `data.attributes.vcs-repo.github-app-installation-id` | string | | The VCS Connection GitHub App Installation to use. Find this ID on the account settings page. Requires previously authorizing the GitHub App and generating a user-to-server token. Manage the token from **Account Settings** within HCP Terraform. You can not specify this value if `oauth-token-id` is specified. | +| `data.attributes.vcs-repo.ingress-submodules` | boolean | `false` | Whether HCP Terraform should instantiate repository submodules when retrieving the policy set. | +| `data.attributes.policies-path` | string | `null` | The VCS repository subdirectory that contains the policies for this policy set. HCP Terraform ignores files and directories outside of this sub-path and does not update the policy set when those files change. This attribute is only valid when you specify a VCS repository for the policy set. | +| `data.relationships.projects.data[]` | array\[object] | `[]` | A list of resource identifier objects that defines which projects are associated with the policy set. These objects must contain `id` and `type` properties, and the `type` property must be `projects`. For example, `{ "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }`. You can only specify this attribute when `data.attributes.global` is `false`. | +| `data.relationships.workspaces.data[]` | array\[object] | `[]` | A list of resource identifier objects that defines which workspaces are associated with the policy set. These objects must contain `id` and `type` properties, and the `type` property must be `workspaces`. For example, `{ "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" }`. Obtain workspace IDs from the [workspace's settings page](/terraform/enterprise/workspaces/settings) or the [Show Workspace endpoint](/terraform/enterprise/api-docs/workspaces#show-workspace). You can only specify this attribute when `data.attributes.global` is `false`. | +| `data.relationships.workspace-exclusions.data[]` | array\[object] | `[]` | A list of resource identifier objects specifying which workspaces HCP Terraform excludes from a policy set's enforcement. These objects must contain `id` and `type` properties, and the `type` property must be `workspaces`. For example, `{ "id": "ws-FVVvzCDaykN1oHiw", "type": "workspaces" }`. | +| `data.relationships.policies.data[]` | array\[object] | `[]` | A list of resource identifier objects that defines which policies are members of the policy set. These objects must contain `id` and `type` properties, and the `type` property must be `policies`. For example, `{ "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" }`. | +| `data.attributes.agent-enabled` | boolean | `false` | Only valid for `sentinel` policy sets. Whether this policy set should run as a policy evaluation in the HCP Terraform agent. | +| `data.attributes.policy-tool-version` | string | `latest` | The version of the tool that HCP Terraform uses to evaluate policies. You can only set a policy tool version for 'sentinel' policy sets if `agent-enabled` is `true`. | + +### Sample Payload + +```json +{ + "data": { + "type": "policy-sets", + "attributes": { + "name": "production", + "description": "This set contains policies that should be checked on all production infrastructure workspaces.", + "global": false, + "kind": "sentinel", + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true, + "policies-path": "/policy-sets/foo", + "vcs-repo": { + "branch": "main", + "identifier": "hashicorp/my-policy-sets", + "ingress-submodules": false, + "oauth-token-id": "ot-7Fr9d83jWsi8u23A" + } + }, + "relationships": { + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + }, + "workspace-exclusions": { + "data": [ + { "id": "ws-FVVvzCDaykN1oHiw", "type": "workspaces" } + ] + } + } + } +} +``` + +### Sample payload with individual policy relationships + +```json +{ + "data": { + "type": "policy-sets", + "attributes": { + "name": "production", + "description": "This set contains policies that should be checked on all production infrastructure workspaces.", + "kind": "sentinel", + "global": false, + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true + }, + "relationships": { + "policies": { + "data": [ + { "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/policy-sets +``` + +### Sample Response + +```json +{ + "data": { + "id":"polset-3yVQZvHzf5j3WRJ1", + "type":"policy-sets", + "attributes": { + "name": "production", + "description": "This set contains policies that should be checked on all production infrastructure workspaces.", + "kind": "sentinel", + "global": false, + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true, + "workspace-count": 1, + "policies-path": "/policy-sets/foo", + "versioned": true, + "vcs-repo": { + "branch": "main", + "identifier": "hashicorp/my-policy-sets", + "ingress-submodules": false, + "oauth-token-id": "ot-7Fr9d83jWsi8u23A" + }, + "created-at": "2018-09-11T18:21:21.784Z", + "updated-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + }, + "workspace-exclusions": { + "data": [ + { "id": "ws-FVVvzCDaykN1oHiw", "type": "workspaces" } + ] + }, + }, + "links": { + "self":"/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1" + } + } +} +``` + +### Sample response with individual policy relationships + +```json +{ + "data": { + "id":"polset-3yVQZvHzf5j3WRJ1", + "type":"policy-sets", + "attributes": { + "name": "production", + "description": "This set contains policies that should be checked on all production infrastructure workspaces.", + "kind": "sentinel", + "global": false, + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true, + "policy-count": 1, + "workspace-count": 1, + "versioned": false, + "created-at": "2018-09-11T18:21:21.784Z", + "updated-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "policies": { + "data": [ + { "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + } + }, + "links": { + "self":"/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1" + } + } +} +``` + +## List policy sets + +`GET /organizations/:organization_name/policy-sets` + +| Parameter | Description | +| -------------------- | ----------------------------------------- | +| `:organization_name` | The organization to list policy sets for. | + +| Status | Response | Reason | +| ------- | --------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "policy-sets"`) | Request was successful | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `filter[versioned]` | **Optional.** Allows filtering policy sets based on whether they are versioned (VCS-managed or API-managed), or use individual policy relationships. Accepts a boolean true/false value. A `true` value returns versioned sets, and a `false` value returns sets with individual policy relationships. If omitted, all policy sets are returned. | +| `filter[kind]` | **Optional.** If specified, restricts results to those with the matching policy kind value. Valid values are `sentinel` and `opa`. | +| `include` | **Optional.** Enables you to include related resource data. Value must be a comma-separated list containing one or more of `projects`, `workspaces`, `workspace-exclusions`, `policies`, `newest_version`, or `current_version`. See the [relationships section](#relationships) for details. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 policy sets per page. | +| `search[name]` | **Optional.** Allows searching the organization's policy sets by name. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/organizations/my-organization/policy-sets +``` + +### Sample Response + +```json +{ + "data": [ + { + "id":"polset-3yVQZvHzf5j3WRJ1", + "type":"policy-sets", + "attributes": { + "name": "production", + "description": "This set contains policies that should be checked on all production infrastructure workspaces.", + "kind": "sentinel", + "global": false, + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true, + "workspace-count": 1, + "policies-path": "/policy-sets/foo", + "versioned": true, + "vcs-repo": { + "branch": "main", + "identifier": "hashicorp/my-policy-sets", + "ingress-submodules": false, + "oauth-token-id": "ot-7Fr9d83jWsi8u23A" + }, + "created-at": "2018-09-11T18:21:21.784Z", + "updated-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + }, + "workspace-exclusions": { + "data": [ + { "id": "ws-FVVvzCDaykN1oHiw", "type": "workspaces" } + ] + }, + }, + "links": { + "self":"/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1" + } + } + ] +} +``` + +### Sample response with individual policy relationships + +```json +{ + "data": [ + { + "id":"polset-3yVQZvHzf5j3WRJ1", + "type":"policy-sets", + "attributes": { + "name": "production", + "description": "This set contains policies that should be checked on all production infrastructure workspaces.", + "kind": "sentinel", + "global": false, + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true, + "policy-count": 1, + "workspace-count": 1, + "versioned": false, + "created-at": "2018-09-11T18:21:21.784Z", + "updated-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "policies": { + "data": [ + { "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + } + }, + "links": { + "self":"/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1" + } + }, + ] +} +``` + +## Show a policy set + +`GET /policy-sets/:id` + +| Parameter | Description | +| --------- | ----------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set to show. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | --------------------------------------------- | ----------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "policy-sets"`) | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | + +| Parameter | Description | +| --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `include` | **Optional.** Enables you to include related resource data. Value must be a comma-separated list containing one or more of `projects`, `workspaces`, `workspace-exclusions`, `policies`, `newest_version`, or `current_version`. See the [relationships section](#relationships) for details. | + +### Sample Request + +```shell +curl --request GET \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1?include=current_version +``` + +### Sample Response + +```json +{ + "data": { + "id":"polset-3yVQZvHzf5j3WRJ1", + "type":"policy-sets", + "attributes": { + "name": "production", + "description": "This set contains policies that should be checked on all production infrastructure workspaces.", + "kind": "sentinel", + "global": false, + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true, + "policy-count": 0, + "workspace-count": 1, + "policies-path": "/policy-sets/foo", + "versioned": true, + "vcs-repo": { + "branch": "main", + "identifier": "hashicorp/my-policy-sets", + "ingress-submodules": false, + "oauth-token-id": "ot-7Fr9d83jWsi8u23A" + }, + "created-at": "2018-09-11T18:21:21.784Z", + "updated-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "current-version": { + "data": { + "id": "polsetver-m4yhbUBCgyDVpDL4", + "type": "policy-set-versions" + } + }, + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + }, + "workspace-exclusions": { + "data": [ + { "id": "ws-FVVvzCDaykN1oHiw", "type": "workspaces" } + ] + }, + }, + "links": { + "self":"/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1" + } + }, + "included": [ + { + "id": "polsetver-m4yhbUBCgyDVpDL4", + "type": "policy-set-versions", + "attributes": { + "source": "github", + "status": "ready", + "status-timestamps": { + "ready-at": "2019-06-21T21:29:48+00:00", + "ingressing-at": "2019-06-21T21:29:47+00:00" + }, + "error": null, + "ingress-attributes": { + "commit-sha": "8766a423cb902887deb0f7da4d9beaed432984bb", + "commit-url": "https://github.com/hashicorp/my-policy-sets/commit/8766a423cb902887deb0f7da4d9beaed432984bb", + "identifier": "hashicorp/my-policy-sets" + }, + "created-at": "2019-06-21T21:29:47.792Z", + "updated-at": "2019-06-21T21:29:48.887Z" + }, + "relationships": { + "policy-set": { + "data": { + "id": "polset-a2mJwtmKygrA11dh", + "type": "policy-sets" + } + } + }, + "links": { + "self": "/api/v2/policy-set-versions/polsetver-E4S7jz8HMjBienLS" + } + } + ] +} +``` + +### Sample response with individual policy relationships + +```json +{ + "data": { + "id":"polset-3yVQZvHzf5j3WRJ1", + "type":"policy-sets", + "attributes": { + "name": "production", + "description": "This set contains policies that should be checked on all production infrastructure workspaces.", + "kind": "sentinel", + "global": false, + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true, + "policy-count": 1, + "workspace-count": 1, + "versioned": false, + "created-at": "2018-09-11T18:21:21.784Z", + "updated-at": "2018-09-11T18:21:21.784Z", + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "policies": { + "data": [ + { "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + } + }, + "links": { + "self":"/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1" + } + } +} +``` + +-> **Note:** The `data.relationships.projects` and `data.relationships.workspaces` refer to the projects and workspaces attached to the policy set. HCP Terraform omits these keys for policy sets marked as global, which are implicitly related to all of the organization's workspaces. + +## Update a policy set + +`PATCH /policy-sets/:id` + +| Parameter | Description | +| --------- | ------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set to update. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | --------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "policy-sets"`) | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------------------------- | -------------- | ---------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"policy-sets"`. | +| `data.attributes.name` | string | (previous value) | The name of the policy set. Can include letters, numbers, `-`, and `_`. | +| `data.attributes.description` | string | (previous value) | A description of the set's purpose. This field supports markdown and appears in the HCP Terraform UI. | +| `data.attributes.global` | boolean | (previous value) | Whether or not the policies in this set should be checked in all of the organization's workspaces or only in workspaces directly attached to the set. | +| `data.attributes.vcs-repo` | object | (previous value) | VCS repository information. When present, HCP Terraform sources the policies and configuration from the specified VCS repository instead of using definitions from HCP Terraform. Note that this option and `policies` relationships are mutually exclusive and may not be used simultaneously. | +| `data.attributes.vcs-repo.branch` | string | (previous value) | The branch of the VCS repo. When empty, HCP Terraform uses the VCS provider's default branch value. | +| `data.attributes.vcs-repo.identifier` | string | (previous value) | The VCS repository identifier in the the following format: `/`. An example identifier in GitHub is `hashicorp/my-policy-set`. The format for Azure DevOps is `//_git/`. | +| `data.attributes.vcs-repo.oauth-token-id` | string | (previous value) | The OAuth token ID to use to connect to the VCS host. | +| `data.attributes.vcs-repo.ingress-submodules` | boolean | (previous value) | Determines whether HCP Terraform instantiates repository submodules during the clone operation. | +| `data.attributes.policies-path` | boolean | (previous value) | The subdirectory of the attached VCS repository that contains the policies for this policy set. HCP Terraform ignores files and directories outside of the sub-path. Changes to the unrelated files do not update the policy set. You can only enable this option when a VCS repository is present. | +| `data.relationships.projects` | array\[object] | (previous value) | An array of references to projects that the policy set should be assigned to. Sending an empty array clears all project assignments. You can only specify this attribute when `data.attributes.global` is `false`. | +| `data.relationships.workspaces` | array\[object] | (previous value) | An array of references to workspaces that the policy set should be assigned to. Sending an empty array clears all workspace assignments. You can only specify this attribute when `data.attributes.global` is `false`. | +| `data.relationships.workspace-exclusions` | array\[object] | (previous value) | An array of references to excluded workspaces that HCP Terraform will not enforce this policy set upon. Sending an empty array clears all exclusions assignments. | +| `data.attributes.agent-enabled` | boolean | `false` | Only valid for `sentinel` policy sets. Whether this policy set should run as a policy evaluation in the HCP Terraform agent. | +| `data.attributes.policy-tool-version` | string | `latest` | The version of the tool that HCP Terraform uses to evaluate policies. You can only set a policy tool version for 'sentinel' policy sets if `agent-enabled` is `true`. | + +### Sample Payload + +```json +{ + "data": { + "type": "policy-sets", + "attributes": { + "name": "workspace-scoped-policy-set", + "description": "Policies added to this policy set will be enforced on specified workspaces", + "global": false, + "agent-enabled": true, + "policy-tool-version": "0.23.0" + }, + "relationships": { + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + }, + "workspace-exclusions": { + "data": [ + { "id": "ws-FVVvzCDaykN1oHiw", "type": "workspaces" } + ] + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1 +``` + +### Sample Response + +```json +{ + "data": { + "id":"polset-3yVQZvHzf5j3WRJ1", + "type":"policy-sets", + "attributes": { + "name": "workspace-scoped-policy-set", + "description": "Policies added to this policy set will be enforced on specified workspaces", + "global": false, + "kind": "sentinel", + "agent-enabled": true, + "policy-tool-version": "0.23.0", + "overridable": true, + "policy-count": 1, + "workspace-count": 1, + "versioned": false, + "created-at": "2018-09-11T18:21:21.784Z", + "updated-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "organization": { + "data": { "id": "my-organization", "type": "organizations" } + }, + "policies": { + "data": [ + { "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" } + ] + }, + "projects": { + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" } + ] + }, + "workspaces": { + "data": [ + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] + }, + "workspace-exclusions": { + "data": [ + { "id": "ws-FVVvzCDaykN1oHiw", "type": "workspaces" } + ] + } + }, + "links": { + "self":"/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1" + } + } +} +``` + +## Add policies to the policy set + +`POST /policy-sets/:id/relationships/policies` + +| Parameter | Description | +| --------- | ---------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set to add policies to. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------- | +| [204][] | No Content | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (one or more policies not found, wrong types, etc.) | + +~> **Note:** This endpoint may only be used when there is no VCS repository associated with the policy set. + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `data[]` | array\[object] | | A list of resource identifier objects that defines which policies will be added to the set. These objects must contain `id` and `type` properties, and the `type` property must be `policies` (e.g. `{ "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" }`). | + +### Sample Payload + +```json +{ + "data": [ + { "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" }, + { "id": "pol-2HRvNs49EWPjDqT1", "type": "policies" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/relationships/policies +``` + +## Attach a policy set to projects + +`POST /policy-sets/:id/relationships/projects` + +| Parameter | Description | +| --------- | ------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set to attach to projects. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +-> **Note:** You can not attach global policy sets to individual projects. + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------- | +| [204][] | Nothing | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (one or more projects not found, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | | A list of resource identifier objects that defines which projects to attach the policy set to. These objects must contain `id` and `type` properties, and the `type` property must be `projects` (e.g. `{ "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }`). | + +### Sample Payload + +```json +{ + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }, + { "id": "prj-2HRvNs49EWPjDqT1", "type": "projects" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/relationships/projects +``` + +## Attach a policy set to workspaces + +`POST /policy-sets/:id/relationships/workspaces` + +| Parameter | Description | +| --------- | --------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set to attach to workspaces. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +-> **Note:** Policy sets marked as global cannot be attached to individual workspaces. + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------------------------------------------------------- | +| [204][] | No Content | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (one or more workspaces not found, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | | A list of resource identifier objects that defines the workspaces the policy set will be attached to. These objects must contain `id` and `type` properties, and the `type` property must be `workspaces` (e.g. `{ "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" }`). | + +### Sample Payload + +```json +{ + "data": [ + { "id": "ws-u3S5p2Uwk21keu1s", "type": "workspaces" }, + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/relationships/workspaces +``` + +## Exclude a workspace from a policy set + +`POST /policy-sets/:id/relationships/workspace-exclusions` + +| Parameter | Description | +| --------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:id` | The ID of a policy set that you want HCP Terraform to exclude from the workspaces you specify. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------------------------------- | +| [204][] | No Content | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (one or more excluded workspaces not found, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | | A list of resource identifier objects that defines the excluded workspaces the policy set will be attached to. These objects must contain `id` and `type` properties, and the `type` property must be `workspaces` (e.g. `{ "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" }`). | + +### Sample Payload + +```json +{ + "data": [ + { "id": "ws-u3S5p2Uwk21keu1s", "type": "workspaces" }, + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/relationships/workspace-exclusions +``` + +## Remove policies from the policy set + +`DELETE /policy-sets/:id/relationships/policies` + +| Parameter | Description | +| --------- | --------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set to remove policies from. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No Content | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (wrong types, etc.) | + +~> **Note:** This endpoint may only be used when there is no VCS repository associated with the policy set. + +### Request Body + +This DELETE endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | | A list of resource identifier objects that defines which policies will be removed from the set. These objects must contain `id` and `type` properties, and the `type` property must be `policies` (e.g. `{ "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" }`). | + +### Sample Payload + +```json +{ + "data": [ + { "id": "pol-u3S5p2Uwk21keu1s", "type": "policies" }, + { "id": "pol-2HRvNs49EWPjDqT1", "type": "policies" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/relationships/policies +``` + +## Detach a policy set from projects + +`DELETE /policy-sets/:id/relationships/projects` + +| Parameter | Description | +| --------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set you want to detach from the specified projects. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +-> **Note:** You can not attach global policy sets to individual projects. + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------- | +| [204][] | Nothing | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (one or more projects not found, wrong types, etc.) | + +### Request Body + +This DELETE endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | | A list of resource identifier objects that defines the projects the policy set will be detached from. These objects must contain `id` and `type` properties, and the `type` property must be `projects`. For example, `{ "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }`. | + +### Sample Payload + +```json +{ + "data": [ + { "id": "prj-AwfuCJTkdai4xj9w", "type": "projects" }, + { "id": "prj-2HRvNs49EWPjDqT1", "type": "projects" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/relationships/projects +``` + +## Detach the policy set from workspaces + +`DELETE /policy-sets/:id/relationships/workspaces` + +| Parameter | Description | +| --------- | ----------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set to detach from workspaces. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +-> **Note:** Policy sets marked as global cannot be detached from individual workspaces. + +| Status | Response | Reason | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No Content | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (wrong types, etc.) | + +### Request Body + +This DELETE endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | | A list of resource identifier objects that defines which workspaces the policy set will be detached from. These objects must contain `id` and `type` properties, and the `type` property must be `workspaces` (e.g. `{ "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" }`). Obtain workspace IDs from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +### Sample Payload + +```json +{ + "data": [ + { "id": "ws-u3S5p2Uwk21keu1s", "type": "workspaces" }, + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/relationships/workspaces +``` + +## Reinclude a workspace to a policy set + +`DELETE /policy-sets/:id/relationships/workspace-exclusions` + +| Parameter | Description | +| --------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:id` | The ID of the policy set HCP Terraform should reinclude (enforce) on the specified workspaces. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No Content | The request was successful | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (wrong types, etc.) | + +### Request Body + +This DELETE endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | -------------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data[]` | array\[object] | | A list of resource identifier objects that defines which workspaces HCP Terraform should reinclude (enforce) this policy set on. These objects must contain `id` and `type` properties, and the `type` property must be `workspaces` (e.g. `{ "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" }`). Obtain workspace IDs from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +### Sample Payload + +```json +{ + "data": [ + { "id": "ws-u3S5p2Uwk21keu1s", "type": "workspaces" }, + { "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" } + ] +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/relationships/workspace-exclusions +``` + +## Delete a policy set + +`DELETE /policy-sets/:id` + +| Parameter | Description | +| --------- | ------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the policy set to delete. Refer to [List Policy Sets](#list-policy-sets) for reference information about finding IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------ | +| [204][] | No Content | Successfully deleted the policy set | +| [404][] | [JSON API error object][] | Policy set not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1 +``` + +## Create a policy set version + +For versioned policy sets which have no VCS repository attached, versions of policy code may be uploaded directly to the API by creating a new policy set version and, in a subsequent request, uploading a tarball (tar.gz) of data to it. + +`POST /policy-sets/:id/versions` + +| Parameter | Description | +| --------- | ----------------------------------------------------- | +| `:id` | The ID of the policy set to create a new version for. | + +| Status | Response | Reason | +| ------- | ----------------------------------------------------- | ----------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "policy-set-versions"`) | The request was successful. | +| [404][] | [JSON API error object][] | Policy set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | The policy set does not support uploading versions. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/policy-sets/polset-3yVQZvHzf5j3WRJ1/versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "polsetver-cXciu9nQwmk9Cfrn", + "type": "policy-set-versions", + "attributes": { + "source": "tfe-api", + "status": "pending", + "status-timestamps": {}, + "error": null, + "created-at": "2019-06-28T23:53:15.875Z", + "updated-at": "2019-06-28T23:53:15.875Z" + }, + "relationships": { + "policy-set": { + "data": { + "id": "polset-ws1CZBzm2h5K6ZT5", + "type": "policy-sets" + } + } + }, + "links": { + "self": "/api/v2/policy-set-versions/polsetver-cXciu9nQwmk9Cfrn", + "upload": "https://archivist.terraform.io/v1/object/dmF1bHQ6djE6NWJPbHQ4QjV4R1ox..." + } + } +} +``` + +The `upload` link URL in the above response is valid for one hour after creation. Make a `PUT` request to this URL directly, sending the policy set contents in `tar.gz` format as the request body. Once uploaded successfully, you can request the [Show Policy Set](#show-a-policy-set) endpoint again to verify that the status has changed from `pending` to `ready`. + +## Upload policy set versions + +`PUT https://archivist.terraform.io/v1/object/` + +The URL is provided in the `upload` attribute in the `policy-set-versions` resource. + +### Sample Request + +In the example below, `policy-set.tar.gz` is the local filename of the policy set version file to upload. + +```shell +curl \ + --header "Content-Type: application/octet-stream" \ + --request PUT \ + --data-binary @policy-set.tar.gz \ + https://archivist.terraform.io/v1/object/dmF1bHQ6djE6NWJPbHQ4QjV4R1ox... +``` + +## Show a policy set version + +`GET /policy-set-versions/:id` + +| Parameter | Description | +| --------- | ----------------------------------------- | +| `:id` | The ID of the policy set version to show. | + +| Status | Response | Reason | +| ------- | ----------------------------------------------------- | ------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "policy-set-versions"`) | The request was successful. | +| [404][] | [JSON API error object][] | Policy set version not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --request GET \ + https://app.terraform.io/api/v2/policy-set-versions/polsetver-cXciu9nQwmk9Cfrn +``` + +### Sample Response + +```json +{ + "data": { + "id": "polsetver-cXciu9nQwmk9Cfrn", + "type": "policy-set-versions", + "attributes": { + "source": "tfe-api", + "status": "pending", + "status-timestamps": {}, + "error": null, + "created-at": "2019-06-28T23:53:15.875Z", + "updated-at": "2019-06-28T23:53:15.875Z" + }, + "relationships": { + "policy-set": { + "data": { + "id": "polset-ws1CZBzm2h5K6ZT5", + "type": "policy-sets" + } + } + }, + "links": { + "self": "/api/v2/policy-set-versions/polsetver-cXciu9nQwmk9Cfrn", + "upload": "https://archivist.terraform.io/v1/object/dmF1bHQ6djE6NWJPbHQ4QjV4R1ox..." + } + } +} +``` + +The `upload` link URL in the above response is valid for one hour after the `created_at` timestamp of the policy set version. Make a `PUT` request to this URL directly, sending the policy set contents in `tar.gz` format as the request body. Once uploaded successfully, you can request the [Show Policy Set Version](#show-a-policy-set-version) endpoint again to verify that the status has changed from `pending` to `ready`. + +## Available related resources + +The GET endpoints above can optionally return related resources for policy sets, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ---------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `current_version` | The most recent **successful** policy set version. | +| `newest_version` | The most recently created policy set version, regardless of status. Note that this relationship may include an errored and unusable version, and is intended to allow checking for VCS errors. | +| `policies` | Individually managed policies which are associated with the policy set. | +| `projects` | The projects this policy set applies to. | +| `workspaces` | The workspaces this policy set applies to. | +| `workspace-exclusions` | The workspaces excluded from this policy set's enforcement. | + +The following resource types may be included for policy set versions: + +| Resource Name | Description | +| ------------- | ---------------------------------------------------------------- | +| `policy_set` | The policy set associated with the specified policy set version. | + +## Relationships + +The following relationships may be present in various responses for policy sets: + +| Resource Name | Description | +| ---------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `current-version` | The most recent **successful** policy set version. | +| `newest-version` | The most recently created policy set version, regardless of status. Note that this relationship may include an errored and unusable version, and is intended to allow checking for VCS errors. | +| `organization` | The organization associated with the specified policy set. | +| `policies` | Individually managed policies which are associated with the policy set. | +| `projects` | The projects this policy set applies to. | +| `workspaces` | The workspaces this policy set applies to. | +| `workspace-exclusions` | The workspaces excluded from this policy set's enforcement. | + +The following relationships may be present in various responses for policy set versions: + +| Resource Name | Description | +| ------------- | ---------------------------------------------------------------- | +| `policy-set` | The policy set associated with the specified policy set version. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/gpg-keys.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/gpg-keys.mdx new file mode 100644 index 000000000..3386ea42c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/gpg-keys.mdx @@ -0,0 +1,388 @@ +--- +page_title: /gpg-keys API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/gpg-keys` endpoint to read, add, get, + update, and delete the GPG keys that HCP Terraform uses to sign private + providers. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# GPG keys API reference + +These endpoints are only relevant to private providers. When you [publish a private provider](/terraform/enterprise/registry/publish-providers) to the HCP Terraform private registry, you must upload the public key of the GPG key-pair that you used to sign the release. The HCP Terraform registry supports RSA or DSA formatted GPG keys. Refer to [Preparing and adding a signing key](/terraform/registry/providers/publishing#preparing-and-adding-a-signing-key) for more details. + +You need [owners team](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) or [Manage Private Registry](/terraform/enterprise/users-teams-organizations/permissions#manage-private-registry) permissions to add, update, or delete GPG keys in a private registry. + +## List GPG Keys + +`GET /api/registry/:registry_name/v2/gpg-keys` + +### Parameters + +| Parameter | Description | +| ---------------- | ------------------ | +| `:registry_name` | Must be `private`. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling does not automatically encode URLs. + +| Parameter | Description | +| ------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `filter[namespace]` | **Required.** A comma-separated list of one or more namespaces. The namespaces must be an authorized HCP Terraform or Terraform Enterprise organization name. | +| `page[number]` | **Optional.** If omitted, the endpoint returns the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint returns 20 GPG keys per page. | + +Gets a list of GPG keys belonging to the specified namespaces. + +| Status | Response | Reason | +| ------- | ------------------------------------------ | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "gpg-keys"`) | Successfully fetched GPG keys | +| [400][] | [JSON API error object][] | Error - missing namespaces in request | +| [403][] | [JSON API error object][] | Forbidden - no authorized namespaces specified in request | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + "https://app.terraform.io/api/registry/private/v2/gpg-keys?filter%5Bnamespace%5D=my-organization,my-other-organization" +``` + +### Sample Response + +```json +{ + "data": [ + { + "type": "gpg-keys", + "id": "1", + "attributes": { + "ascii-armor": "-----BEGIN PGP PUBLIC KEY BLOCK-----...", + "created-at": "2022-02-08T19:15:47Z", + "key-id": "C4E5E6C66C79C778", + "namespace": "my-other-organization", + "source": "", + "source-url": null, + "trust-signature": "", + "updated-at": "2022-02-08T19:15:47Z" + }, + "links": { + "self": "/v2/gpg-keys/1" + } + }, + { + "type": "gpg-keys", + "id": "140", + "attributes": { + "ascii-armor": "-----BEGIN PGP PUBLIC KEY BLOCK-----...", + "created-at": "2022-04-28T21:32:11Z", + "key-id": "C4E5E6C66C79C778", + "namespace": "my-organization", + "source": "", + "source-url": null, + "trust-signature": "", + "updated-at": "2022-04-28T21:32:11Z" + }, + "links": { + "self": "/v2/gpg-keys/140" + } + } + ], + "links": { + "first": "/v2/gpg-keys?filter%5Bnamespace%5D=my-organization%2Cmy-other-organization&page%5Bnumber%5D=1&page%5Bsize%5D=15", + "last": "/v2/gpg-keys?filter%5Bnamespace%5D=my-organization%2Cmy-other-organization&page%5Bnumber%5D=1&page%5Bsize%5D=15", + "next": null, + "prev": null + }, + "meta": { + "pagination": { + "page-size": 15, + "current-page": 1, + "next-page": null, + "prev-page": null, + "total-pages": 1, + "total-count": 2 + } + } +} +``` + +## Add a GPG Key + +`POST /api/registry/:registry_name/v2/gpg-keys` + +### Parameters + +| Parameter | Description | +| ---------------- | ------------------ | +| `:registry_name` | Must be `private`. | + +Uploads a GPG Key to a private registry scoped with a namespace. The response will provide a "key-id", which is required to [Create a Provider Version](/terraform/enterprise/api-docs/private-registry/provider-versions-platforms#create-a-provider-version). + +| Status | Response | Reason | +| ------- | ------------------------------------------ | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "gpg-keys"`) | Successfully uploads a GPG key to a private provider | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [403][] | [JSON API error object][] | Forbidden - not available for public providers | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------- | ------ | ------- | -------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"gpg-keys"`. | +| `data.attributes.namespace` | string | | The namespace of the provider. Must be the same as the `organization_name` for the provider. | +| `data.attributes.ascii-armor` | string | | A valid gpg-key string. | + +### Sample Payload + +```json +{ + "data": { + "type": "gpg-keys", + "attributes": { + "namespace": "hashicorp", + "ascii-armor": "-----BEGIN PGP PUBLIC KEY BLOCK-----\n\nmQINB...=txfz\n-----END PGP PUBLIC KEY BLOCK-----\n" + } } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/registry/private/v2/gpg-keys +``` + +### Sample Response + +```json +{ + "data": { + "type": "gpg-keys", + "id": "23", + "attributes": { + "ascii-armor": "-----BEGIN PGP PUBLIC KEY BLOCK-----\n\nmQINB...=txfz\n-----END PGP PUBLIC KEY BLOCK-----\n", + "created-at": "2022-02-11T19:16:59Z", + "key-id": "32966F3FB5AC1129", + "namespace": "hashicorp", + "source": "", + "source-url": null, + "trust-signature": "", + "updated-at": "2022-02-11T19:16:59Z" + }, + "links": { + "self": "/v2/gpg-keys/23" + } + } +} +``` + +## Get GPG Key + +`GET /api/registry/:registry_name/v2/gpg-keys/:namespace/:key_id` + +### Parameters + +| Parameter | Description | +| ---------------- | ---------------------------------------------------- | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider scoped to the GPG key. | +| `:key_id` | The id of the GPG key. | + +Gets the content of a GPG key. + +| Status | Response | Reason | +| ------- | ------------------------------------------ | ---------------------------------------------- | +| [200][] | [JSON API document][] (`type: "gpg-keys"`) | Successfully fetched GPG key | +| [403][] | [JSON API error object][] | Forbidden - not available for public providers | +| [404][] | [JSON API error object][] | GPG key not found or user not authorized | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/registry/private/v2/gpg-keys/hashicorp/32966F3FB5AC1129 +``` + +### Sample Response + +```json +{ + "data": { + "type": "gpg-keys", + "id": "2", + "attributes": { + "ascii-armor": "-----BEGIN PGP PUBLIC KEY BLOCK-----\n\nmQINB...=txfz\n-----END PGP PUBLIC KEY BLOCK-----\n", + "created-at": "2022-02-24T17:07:25Z", + "key-id": "32966F3FB5AC1129", + "namespace": "hashicorp", + "source": "", + "source-url": null, + "trust-signature": "", + "updated-at": "2022-02-24T17:07:25Z" + }, + "links": { + "self": "/v2/gpg-keys/2" + } + } +} +``` + +## Update a GPG Key + +`PATCH /api/registry/:registry_name/v2/gpg-keys/:namespace/:key_id` + +### Parameters + +| Parameter | Description | +| ---------------- | ---------------------------------------------------- | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider scoped to the GPG key. | +| `:key_id` | The id of the GPG key. | + +Updates the specified GPG key. Only the `namespace` attribute can be updated, and `namespace` has to match an `organization` the user has permission to access. + +| Status | Response | Reason | +| ------- | ------------------------------------------ | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "gpg-keys"`) | Successfully updates a GPG key | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [403][] | [JSON API error object][] | Forbidden - not available for public providers | +| [404][] | [JSON API error object][] | GPG key not found or user not authorized | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------- | ------ | ------- | -------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"gpg-keys"`. | +| `data.attributes.namespace` | string | | The namespace of the provider. Must be the same as the `organization_name` for the provider. | + +### Sample Payload + +```json +{ + "data": { + "type": "gpg-keys", + "attributes": { + "namespace": "new-namespace", + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/registry/private/v2/gpg-keys/hashicorp/32966F3FB5AC1129 +``` + +### Sample Response + +```json +{ + "data": { + "type": "gpg-keys", + "id": "2", + "attributes": { + "ascii-armor": "-----BEGIN PGP PUBLIC KEY BLOCK-----\n\nmQINB...=txfz\n-----END PGP PUBLIC KEY BLOCK-----\n", + "created-at": "2022-02-24T17:07:25Z", + "key-id": "32966F3FB5AC1129", + "namespace": "new-name", + "source": "", + "source-url": null, + "trust-signature": "", + "updated-at": "2022-02-24T17:12:10Z" + }, + "links": { + "self": "/v2/gpg-keys/2" + } + } +} +``` + +## Delete a GPG Key + +`DELETE /api/registry/:registry_name/v2/gpg-keys/:namespace/:key_id` + +### Parameters + +| Parameter | Description | +| ---------------- | ---------------------------------------------------- | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider scoped to the GPG key. | +| `:key_id` | The id of the GPG key. | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------------------------ | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "gpg-keys"`) | Successfully deletes a GPG key | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [403][] | [JSON API error object][] | Forbidden - not available for public providers | +| [404][] | [JSON API error object][] | GPG key not found or user not authorized | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/registry/private/v2/gpg-keys/hashicorp/32966F3FB5AC1129 +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/manage-module-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/manage-module-versions.mdx new file mode 100644 index 000000000..0b7f06da4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/manage-module-versions.mdx @@ -0,0 +1,272 @@ +--- +page_title: Manage module versions API reference for Terraform Enterprise +description: >- + Use the module management endpoints to deprecate and revert the deprecation of + module versions you published to an organization's private registry. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[503]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/503 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Manage module versions API reference + +This topic provides reference information about API endpoints that let your deprecate module versions in your organization’s private registry. + +## Introduction + +When you deprecate a module version, HCP Terraform adds warnings to the module's registry page and to run outputs when anyone uses the deprecated version. + + + +@include "tfc-package-callouts/manage-module-versions.mdx" + + + +After deprecating a module version, you can revert that deprecated status to remove the warnings from that version in the registry and outputs. For more details on module deprecation, refer to [Deprecate module versions](/terraform/enterprise/registry/manage-module-versions). + +## Deprecate a module version + +Use this endpoint to deprecate a module version. + +`PATCH /api/v2/organizations/:organization_name/registry-modules/private/:organization_name/:module_name/:module_provider/:module_version` + +| Parameter | Description | +| :------------------- | :------------------------------------------------------------- | +| `:organization_name` | The name of the organization the module belongs to. | +| `:module_name` | The name of the module whose version you want to deprecate. | +| `:module_provider` | Specifies the Terraform provider that this module is used for. | +| `:module_version` | The module version you want to deprecate. | + +This endpoint allows you to deprecate a specific module version. Deprecating a module version adds warnings to the run output of any consumers using this module. + +| Status | Response | Reason | +| :----------------------------------------------------------------------------------------------------------------------------------------- | :--------------------------------------------------------------------------- | :---------------------------------------------------------------------------------------------------------- | +| [200](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200) | [JSON API document](http://terraform/cloud-docs/api-docs#json-api-documents) | Successfully deprecated a module version. | +| [404](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404) | [JSON API error object](http://jsonapi.org/format/#error-objects) | This organization is not authorized to deprecate this module version, or the module version does not exist. | +| [422](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422) | [JSON API error object](http://jsonapi.org/format/#error-objects) | Malformed request body, for example the request is missing attributes or uses the wrong types. | +| [500](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500) or [503](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/503) | [JSON API error object](http://jsonapi.org/format/#error-objects) | Failure occurred while deprecating a module version. | + +### Sample payload + +```json +{ + "data": { + "type": "module-versions", + "attributes": { + "deprecation": { + "deprecated-status": "Deprecated", + "reason": "Deprecated due to a security vulnerability issue.", + "link": "https://www.hashicorp.com/" + } + } + } +} +``` + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ +https://app.terraform.io/api/v2/organizations/hashicorp/registry-modules/private/hashicorp/lb-http/google/11.0.0 +``` + +### Sample response + +```json +{ + "data": { + "type": "module-versions", + "id": "1", + "relationships": { + "deprecation": { + "data": { + "id": "2", + "type": "deprecations" + } + } + } + }, + "included": [ + { + "type": "deprecations", + "id": "2", + "attributes": { + "link": "https://www.hashicorp.com/", + "reason": "Deprecated due to a security vulnerability issue. Applies will be blocked in 15 days." + } + } + ] +} +``` + +## Revert the deprecation status for a module version + +Use this endpoint to revert the deprecation of a module version. + +`PATCH /api/v2/organizations/:organization_name/registry-modules/private/:organization_name/:module_name/:module_provider/:module_version` + +| Parameter | Description | +| :------------------- | :------------------------------------------------------------- | +| `:organization_name` | The name of the organization the module belongs to. | +| `:module_name` | The name of the module you want to revert the deprecation of. | +| `:module_provider` | Specifies the Terraform provider that this module is used for. | +| `:module_version` | The module version you want to revert the deprecation of. | + +Deprecating a module version adds warnings to the run output of any consumers using this module. Reverting the deprecation status removes warnings from the output of consumers and fully reinstates the module version. + +| Status | Response | Reason | +| :--------------------------------------------------------------------------- | :---------------------------------------------------------------------------- | :--------------------------------------------------------------------------------------------------------------------------- | +| [200](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200) | [JSON API document](http:///terraform/cloud-docs/api-docs#json-api-documents) | Successfully reverted a module version’s deprecation status and reinstated that version. | +| [404](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404) | [JSON API error object](http://jsonapi.org/format/#error-objects) | This organization is not authorized to revert the depreciation of this module version, or the module version does not exist. | +| [422](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422) | [JSON API error object](http://jsonapi.org/format/#error-objects) | Malformed request body, for example the request is missing attributes or uses the wrong types. | +| [500](https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500) or [503] | [JSON API error object](http://jsonapi.org/format/#error-objects) | Failure occurred while reverting the deprecation of a module version. | + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ +https://app.terraform.io/api/v2/organizations/hashicorp/registry-modules/private/hashicorp/lb-http/google/11.0.0 +``` + +### Sample payload + +```json +{ + "data": { + "type": "module-versions", + "attributes": { + "deprecation": { + "deprecated-status": "Undeprecated" + } + } + } +} +``` + +### Sample response + +```json +{ + "data": { + "type": "module-versions", + "id": "1" + } +} +``` + +## Fetch a module version’s deprecation data + +Send a `GET` request to the `/modules/:GitHub-organization/:module/:provider/versions` endpoint to retrieve data about private registry modules, including the module's deprecation status. Refer to the [private registry module API example](/terraform/enterprise/api-docs/private-registry/modules#sample-registry-request-private-module) for additional information. + +For example, if you want to know the deprecation status of v0.0.1 of the `aws` provider’s `consul` module in your `my-cloud-org` organization, you could perform the following API call: + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/registry/v1/modules/my-cloud-org/consul/aws/0.0.1 +``` + +If the module is deprecated, your response includes a `deprecation` key with the details of that module version’s deprecation. + +```json +{ + "id": "hashicorp/consul/aws/0.0.1", + "owner": "gruntwork-team", + "namespace": "hashicorp", + "name": "consul", + "version": "0.0.1", + "provider": "aws", + "description": "A Terraform Module for how to run Consul on AWS using Terraform and Packer" + // ... // + "deprecation": { + "reason": "This version was deprecated due to a vulnerability issue. Please upgrade to 0.0.2.", + "link": "https://hashicorp.com" + } +} +``` + +To check the deprecation status of all of the `consul` module’s versions, you could perform the following API call: + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/registry/v1/modules/my-cloud-org/consul/aws/versions +``` + +The response includes multiple versions, and each version has a `deprecation` key listing the details of that module’s deprecation. If a module version has not been deprecated, the `deprecation` field returns `null`. + +```json +{ + "modules": [ + { + "source": "hashicorp/consul/aws", + "versions": [ + { + "version": "0.0.1", + // ... // + "deprecation": { + "reason": "security vulnerability", + "link": "www.hashicorp.com" + } + }, + { + "version": "0.0.2", + "submodules": [], + "root": { + "dependencies": [], + "providers": [ + { + "name": "template", + "version": "" + }, + { + "name": "aws", + "version": "" + } + ] + }, + "deprecation": null + } + ] + } + ] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/modules.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/modules.mdx new file mode 100644 index 000000000..d5df734ec --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/modules.mdx @@ -0,0 +1,942 @@ +--- +page_title: /registry-modules API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/registry-modules` endpoint to read, + publish, update, delete, and add versions to modules in your organization's + private registry. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Registry modules API reference + +-> **Note:** Public Module Curation is only available in HCP Terraform. Where applicable, the `registry_name` parameter must be `private` for Terraform Enterprise. + +## HCP Terraform Registry Implementation + +The HCP Terraform Module Registry implements the [Registry standard API](/terraform/registry/api-docs) for consuming/exposing private modules. Refer to the [Module Registry HTTP API](/terraform/registry/api-docs) to perform the following: + +- Browse available modules +- Search modules by keyword +- List available versions for a specific module +- Download source code for a specific module version +- List latest version of a module for all providers +- Get the latest version for a specific module provider +- Get a specific module +- Download the latest version of a module + +For publicly curated modules, the HCP Terraform Module Registry acts as a proxy to the [Terraform Registry](https://registry.terraform.io) for the following: + +- List available versions for a specific module +- Get a specific module +- Get the latest version for a specific module provider + +The HCP Terraform Module Registry endpoints differs from the Module Registry endpoints in the following ways: + +- The `:namespace` parameter should be replaced with the organization name for private modules. +- The private module registry discovery endpoints have the path prefix provided in the [discovery document](/terraform/registry/api-docs#service-discovery) which is currently `/api/registry/v1`. +- The public module registry discovery endpoints have the path prefix provided in the [discovery document](/terraform/registry/api-docs#service-discovery) which is currently `/api/registry/public/v1`. +- [Authentication](/terraform/enterprise/api-docs#authentication) is handled the same as all other HCP Terraform endpoints. + +### Sample Registry Request (private module) + +List available versions for the `consul` module for the `aws` provider on the module registry published from the Github organization `my-gh-repo-org`: + +```shell +$ curl https://registry.terraform.io/v1/modules/my-gh-repo-org/consul/aws/versions +``` + +The same request for the same module and provider on the HCP Terraform module registry for the `my-cloud-org` organization: + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/registry/v1/modules/my-cloud-org/consul/aws/versions +``` + +### Sample Proxy Request (public module) + +List available versions for the `consul` module for the `aws` provider on the module registry published from the Github organization `my-gh-repo-org`: + +```shell +$ curl https://registry.terraform.io/v1/modules/my-gh-repo-org/consul/aws/versions +``` + +The same request for the same module and provider on the HCP Terraform module registry: + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/registry/public/v1/modules/my-gh-repo-org/consul/aws/versions +``` + +## List Registry Modules for an Organization + +`GET /organizations/:organization_name/registry-modules` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------ | +| `:organization_name` | The name of the organization to list available modules from. | + +Lists the modules that are available to a given organization. This includes the full list of publicly curated and private modules and is filterable. + +| Status | Response | Reason | +| ------- | -------------------------------------------------- | -------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "registry-modules"`) | The request was successful | +| [404][] | [JSON API error object][] | Modules not found or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `q` | **Optional.** A search query string. Modules are searchable by name, namespace, provider fields. | +| `filter[field name]` | **Optional.** If specified, restricts results to those with the matching field name value. Valid values are `registry_name`, `provider`, and `organization_name`. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 registry modules per page. | + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "mod-kwt1cBiX2SdDz38w", + "type": "registry-modules", + "attributes": { + "name": "api-gateway", + "namespace": "my-organization", + "provider": "alicloud", + "status": "setup_complete", + "version-statuses": [ + { + "version": "1.1.0", + "status": "ok" + } + ], + "created-at": "2021-04-07T19:01:18.528Z", + "updated-at": "2021-04-07T19:01:19.863Z", + "registry-name": "private", + "permissions": { + "can-delete": true, + "can-resync": true, + "can-retry": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-modules/private/my-organization/api-gateway/alicloud" + } + }, + { + "id": "mod-PopQnMtYDCcd3PRX", + "type": "registry-modules", + "attributes": { + "name": "aurora", + "namespace": "my-organization", + "provider": "aws", + "status": "setup_complete", + "version-statuses": [ + { + "version": "4.1.0", + "status": "ok" + } + ], + "created-at": "2021-04-07T19:04:41.375Z", + "updated-at": "2021-04-07T19:04:42.828Z", + "registry-name": "private", + "permissions": { + "can-delete": true, + "can-resync": true, + "can-retry": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-modules/private/my-organization/aurora/aws" + } + }, + ..., + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/my-organization/registry-modules?page%5Bnumber%5D=1&page%5Bsize%5D=6", + "first": "https://app.terraform.io/api/v2/organizations/my-organization/registry-modules?page%5Bnumber%5D=1&page%5Bsize%5D=6", + "prev": null, + "next": "https://app.terraform.io/api/v2/organizations/my-organization/registry-modules?page%5Bnumber%5D=2&page%5Bsize%5D=6", + "last": "https://app.terraform.io/api/v2/organizations/my-organization/registry-modules?page%5Bnumber%5D=29&page%5Bsize%5D=6" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 6, + "prev-page": null, + "next-page": 2, + "total-pages": 29, + "total-count": 169 + } + } +} +``` + +## Publish a Private Module from a VCS + +~> **Deprecation warning**: the following endpoint `POST /registry-modules` is replaced by the below endpoint and will be removed from future versions of the API! + +`POST /organizations/:organization_name/registry-modules/vcs` + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create a module in. The organization must already exist, and the token authenticating the API request must belong to a team or team member with the **Manage modules** permission enabled. | + +Publishes a new registry private module from a VCS repository, with module versions managed automatically by the repository's tags. The publishing process will fetch all tags in the source repository that look like [SemVer](https://semver.org/) versions with optional 'v' prefix. For each version, the tag is cloned and the config parsed to populate module details (input and output variables, readme, submodules, etc.). The [Module Registry Requirements](/terraform/registry/modules/publish#requirements) define additional requirements on naming, standard module structure and tags for releases. + +| Status | Response | Reason | +| ------- | -------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "registry-modules"`) | Successfully published module | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------------------------- | ------- | ------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"registry-modules"`. | +| `data.attributes.vcs-repo.identifier` | string | | The repository from which to ingress the configuration. | +| `data.attributes.vcs-repo.oauth-token-id` | string | | The VCS Connection (OAuth Connection + Token) to use as identified. Get this ID from the [oauth-tokens](/terraform/enterprise/api-docs/oauth-tokens) endpoint. You can not specify this value if `github-app-installation-id` is specified. | +| `data.attributes.vcs-repo.github-app-installation-id` | string | | The VCS Connection GitHub App Installation to use. Find this ID on the account settings page. Requires previously authorizing the GitHub App and generating a user-to-server token. Manage the token from **Account Settings** within HCP Terraform. You can not specify this value if `oauth-token-id` is specified. | +| `data.attributes.vcs-repo.display_identifier` | string | | The display identifier for the repository. For most VCS providers outside of Bitbucket Cloud, this identifier matches the `data.attributes.vcs-repo.identifier` string. | +| `data.attributes.no-code` | boolean | | Allows you to enable or disable the no-code publishing workflow for a module. | +| `data.attributes.vcs-repo.branch` | string | | The repository branch to publish the module from if you are using the branch-based publishing workflow. If omitted, the module will be published using the tag-based publishing workflow. | + +A VCS repository identifier is a reference to a VCS repository in the format `:org/:repo`, where `:org` and `:repo` refer to the organization, or project key for Bitbucket Data Center, and repository in your VCS provider. The format for Azure DevOps is `:org/:project/_git/:repo`. + +The OAuth Token ID identifies the VCS connection, and therefore the organization, that the module will be created in. + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "vcs-repo": { + "identifier":"lafentres/terraform-aws-my-module", + "oauth-token-id":"ot-hmAyP66qk2AMVdbJ", + "display_identifier":"lafentres/terraform-aws-my-module", + "branch": "main" + }, + "no-code": true + }, + "type":"registry-modules" + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules/vcs +``` + +### Sample Response + +```json +{ + "data": { + "id": "mod-fZn7uHu99ZCpAKZJ", + "type": "registry-modules", + "attributes": { + "name": "my-module", + "namespace": "my-organization", + "registry-name": "private", + "provider": "aws", + "status": "pending", + "version-statuses": [], + "created-at": "2020-07-09T19:36:56.288Z", + "updated-at": "2020-07-09T19:36:56.288Z", + "vcs-repo": { + "branch": "", + "ingress-submodules": true, + "identifier": "lafentres/terraform-aws-my-module", + "display-identifier": "lafentres/terraform-aws-my-module", + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ", + "webhook-url": "https://app.terraform.io/webhooks/vcs/a12b3456..." + }, + "permissions": { + "can-delete": true, + "can-resync": true, + "can-retry": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-modules/private/my-organization/my-module/aws" + } + } +} +``` + +## Create a Module (with no VCS connection) + +`POST /organizations/:organization_name/registry-modules` + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create a module in. The organization must already exist, and the token authenticating the API request must belong to a team or team member with the **Manage modules** permission enabled. | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Creates a new registry module without a backing VCS repository. + +#### Private modules + +After creating a module, a version must be created and uploaded in order to be usable. Modules created this way do not automatically update with new versions; instead, you must explicitly create and upload each new version with the [Create a Module Version](#create-a-module-version) endpoint. + +#### Public modules + +When created, the public module record will be available in the organization's registry module list. You cannot create versions for public modules as they are maintained in the public registry. + +| Status | Response | Reason | +| ------- | -------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "registry-modules"`) | Successfully published module | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [403][] | [JSON API error object][] | Forbidden - public module curation disabled | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------- | ------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"registry-modules"`. | +| `data.attributes.name` | string | | The name of this module. May contain alphanumeric characters, with dashes and underscores allowed in non-leading or trailing positions. Maximum length is 64 characters. | +| `data.attributes.provider` | string | | Specifies the Terraform provider that this module is used for. May contain lowercase alphanumeric characters. Maximum length is 64 characters. | +| `data.attributes.namespace` | string | | The namespace of this module. Cannot be set for private modules. May contain alphanumeric characters, with dashes and underscores allowed in non-leading or trailing positions. Maximum length is 64 characters. | +| `data.attributes.registry-name` | string | | Indicates whether this is a publicly maintained module or private. Must be either `public` or `private`. | +| `data.attributes.no-code` | boolean | | Allows you to enable or disable the no-code publishing workflow for a module. | + +### Sample Payload (private module) + +```json +{ + "data": { + "type": "registry-modules", + "attributes": { + "name": "my-module", + "provider": "aws", + "registry-name": "private", + "no-code": true + } + } +} +``` + +### Sample Payload (public module) + +```json +{ + "data": { + "type": "registry-modules", + "attributes": { + "name": "vpc", + "namespace": "terraform-aws-modules", + "provider": "aws", + "registry-name": "public", + "no-code": true + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules +``` + +### Sample Response (private module) + +```json +{ + "data": { + "id": "mod-fZn7uHu99ZCpAKZJ", + "type": "registry-modules", + "attributes": { + "name": "my-module", + "namespace": "my-organization", + "registry-name": "private", + "provider": "aws", + "status": "pending", + "version-statuses": [], + "created-at": "2020-07-09T19:36:56.288Z", + "updated-at": "2020-07-09T19:36:56.288Z", + "permissions": { + "can-delete": true, + "can-resync": true, + "can-retry": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-modules/private/my-organization/my-module/aws" + } + } +} +``` + +### Sample Response (public module) + +```json +{ + "data": { + "id": "mod-fZn7uHu99ZCpAKZJ", + "type": "registry-modules", + "attributes": { + "name": "vpc", + "namespace": "terraform-aws-modules", + "registry-name": "public", + "provider": "aws", + "status": "pending", + "version-statuses": [], + "created-at": "2020-07-09T19:36:56.288Z", + "updated-at": "2020-07-09T19:36:56.288Z", + "permissions": { + "can-delete": true, + "can-resync": true, + "can-retry": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-modules/public/terraform-aws-modules/vpc/aws" + } + } +} +``` + +## Create a Module Version + +~> **Deprecation warning**: the following endpoint `POST /registry-modules/:organization_name/:name/:provider/versions` is replaced by the below endpoint and will be removed from future versions of the API! + +`POST /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name/:provider/versions` + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create a module in. The organization must already exist, and the token authenticating the API request must belong to a team or team member with the **Manage modules** permission enabled. | +| `:namespace` | The namespace of the module for which the version is being created. For private modules this is the same as the `:organization_name` parameter | +| `:name` | The name of the module for which the version is being created. | +| `:provider` | The name of the provider for which the version is being created. | +| `:registry-name` | Must be `private`. | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Creates a new registry module version. This endpoint only applies to private modules without a VCS repository and VCS-linked branch based modules. VCS-linked tag-based modules automatically create new versions for new tags. After creating the version for a non-VCS backed module, you should upload the module to the link that HCP Terraform returns. + +| Status | Response | Reason | +| ------- | ---------------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "registry-module-versions"`) | Successfully published module version | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [403][] | [JSON API error object][] | Forbidden - not available for public modules | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ---------------------------- | ------ | ------- | --------------------------------------------------- | +| `data.type` | string | | Must be `"registry-module-versions"`. | +| `data.attributes.version` | string | | A valid semver version string. | +| `data.attributes.commit-sha` | string | | The commit SHA to use to create the module version. | + +### Sample Payload + +```json +{ + "data": { + "type": "registry-module-versions", + "attributes": { + "version": "1.2.3", + "commit-sha": "abcdef12345" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules/private/my-organization/my-module/aws/versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "modver-qjjF7ArLXJSWU3WU", + "type": "registry-module-versions", + "attributes": { + "source": "tfe-api", + "status": "pending", + "version": "1.2.3", + "created-at": "2018-09-24T20:47:20.931Z", + "updated-at": "2018-09-24T20:47:20.931Z" + }, + "relationships": { + "registry-module": { + "data": { + "id": "1881", + "type": "registry-modules" + } + } + }, + "links": { + "upload": "https://archivist.terraform.io/v1/object/dmF1bHQ6djE6NWJPbHQ4QjV4R1ox..." + } + } +} +``` + +## Add a Module Version (Private Module) + +`PUT https://archivist.terraform.io/v1/object/` + +**The URL is provided in the `upload` links attribute in the `registry-module-versions` resource.** + +### Expected Archive Format + +HCP Terraform expects the module version uploaded to be a gzip tarball with the module in the root (not in a subdirectory). + +Given the following folder structure: + + terraform-null-test + ├── README.md + ├── examples + │   └── default + │   ├── README.md + │   └── main.tf + └── main.tf + +Package the files in an archive format by running `tar zcvf module.tar.gz *` in the module's directory. + + ~$ cd terraform-null-test + terraform-null-test$ tar zcvf module.tar.gz * + a README.md + a examples + a examples/default + a examples/default/main.tf + a examples/default/README.md + a main.tf + +### Sample Request + +```shell +curl \ + --header "Content-Type: application/octet-stream" \ + --request PUT \ + --data-binary @module.tar.gz \ + https://archivist.terraform.io/v1/object/dmF1bHQ6djE6NWJPbHQ4QjV4R1ox... +``` + +After the registry module version is successfully parsed, its status will become `"ok"`. + +## Get a Module + +~> **Deprecation warning**: the following endpoint `GET /registry-modules/show/:organization_name/:name/:provider` is replaced by the below endpoint and will be removed from future versions of the API! + +`GET /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name/:provider` + +### Parameters + +| Parameter | Description | +| -------------------- | ----------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization the module belongs to. | +| `:namespace` | The namespace of the module. For private modules this is the name of the organization that owns the module. | +| `:name` | The module name. | +| `:provider` | The module provider. Must be lowercase alphanumeric. | +| `:registry-name` | Either `public` or `private`. | + +| Status | Response | Reason | +| ------- | -------------------------------------------------- | ------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "registry-modules"`) | The request was successful | +| [403][] | [JSON API error object][] | Forbidden - public module curation disabled | +| [404][] | [JSON API error object][] | Module not found or user unauthorized to perform action | + +### Sample Request (private module) + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules/private/my-organization/my-module/aws +``` + +### Sample Request (public module) + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules/public/terraform-aws-modules/vpc/aws +``` + +### Sample Response (private module) + +```json +{ + "data": { + "id": "mod-fZn7uHu99ZCpAKZJ", + "type": "registry-modules", + "attributes": { + "name": "my-module", + "provider": "aws", + "namespace": "my-organization", + "registry-name": "private", + "status": "setup_complete", + "version-statuses": [ + { + "version": "1.0.0", + "status": "ok" + } + ], + "created-at": "2020-07-09T19:36:56.288Z", + "updated-at": "2020-07-09T20:16:20.538Z", + "vcs-repo": { + "branch": "", + "ingress-submodules": true, + "identifier": "lafentres/terraform-aws-my-module", + "display-identifier": "lafentres/terraform-aws-my-module", + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ", + "webhook-url": "https://app.terraform.io/webhooks/vcs/a12b3456..." + }, + "permissions": { + "can-delete": true, + "can-resync": true, + "can-retry": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-modules/private/my-organization/my-module/aws" + } + } +} +``` + +### Sample Response (public module) + +```json +{ + "data": { + "id": "mod-fZn7uHu99ZCpAKZJ", + "type": "registry-modules", + "attributes": { + "name": "vpc", + "provider": "aws", + "namespace": "terraform-aws-modules", + "registry-name": "public", + "status": "setup_complete", + "version-statuses": [], + "created-at": "2020-07-09T19:36:56.288Z", + "updated-at": "2020-07-09T20:16:20.538Z", + "permissions": { + "can-delete": true, + "can-resync": true, + "can-retry": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-modules/public/terraform-aws-modules/vpc/aws" + } + } +} +``` + +## Update a Private Registry Module + +`PATCH /organizations/:organization_name/registry-modules/private/:namespace/:name/:provider/` + +### Parameters + +| Parameter | Description | +| -------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to update a module from. The organization must already exist, and the token authenticating the API request must belong to the `owners` team or a member of the `owners` team. | +| `:namespace` | The module namespace that the update affects. For private modules this is the name of the organization that owns the module. | +| `:name` | The module name that the update affects. | +| `:provider` | The name of the provider of the module that is being updated. | + +### Request Body + +These PATCH endpoints require a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------- | ------- | ---------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `data.type` | string | | Must be `"registry-modules"`. | +| `data.attributes.vcs-repo.branch` | string | (previous value) | The repository branch that Terraform executes tests and publishes new versions from. This cannot be used with the `data.attributes.vcs-repo.tags` key. | +| `data.attributes.vcs-repo.tags` | boolean | (previous value) | Whether the registry module should be tag-based. This cannot be used with the `data.attributes.vcs-repo.branch` key. | +| `data.attributes.test-config.tests-enabled` | boolean | (previous value) | Allows you to enable or disable tests for the module. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "vcs-repo": { + "branch": "main", + "tags": false + }, + "test-config": { + "tests-enabled": true + } + }, + "type": "registry-modules" + } +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules/private/my-organization/registry-name/registry-provider/ +``` + +### Sample Response + +```json +{ + "data": { + "id": "mod-fZn7uHu99ZCpAKZJ", + "type": "registry-modules", + "attributes": { + "name": "my-module", + "namespace": "my-organization", + "registry-name": "private", + "provider": "aws", + "status": "pending", + "version-statuses": [], + "created-at": "2020-07-09T19:36:56.288Z", + "updated-at": "2020-07-09T19:36:56.288Z", + "vcs-repo": { + "branch": "main", + "ingress-submodules": true, + "identifier": "lafentres/terraform-aws-my-module", + "display-identifier": "lafentres/terraform-aws-my-module", + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ", + "webhook-url": "https://app.terraform.io/webhooks/vcs/a12b3456..." + }, + "permissions": { + "can-delete": true, + "can-resync": true, + "can-retry": true + }, + "test-config": { + "id": "tc-tcR6bxV5zE75Zb3B", + "tests-enabled": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-modules/private/my-organization/my-module/aws" + } + } +} +``` + +## Delete a Module + +
+ **Deprecation warning**: the following endpoints: + +- `POST /registry-modules/actions/delete/:organization_name/:name/:provider/:version` +- `POST /registry-modules/actions/delete/:organization_name/:name/:provider` +- `POST /registry-modules/actions/delete/:organization_name/:name` + +are replaced by the below endpoints and will be removed from future versions of the API! + +
+ +- `DELETE /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name/:provider/:version` +- `DELETE /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name/:provider` +- `DELETE /organizations/:organization_name/registry-modules/:registry_name/:namespace/:name` + +### Parameters + +| Parameter | Description | +| -------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to delete a module from. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:namespace` | The module namespace that the deletion will affect. For private modules this is the name of the organization that owns the module. | +| `:name` | The module name that the deletion will affect. | +| `:provider` | If specified, the provider for the module that the deletion will affect. | +| `:version` | If specified, the version for the module and provider that will be deleted. | +| `:registry_name` | Either `public` or `private` | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +When removing modules, there are three versions of the endpoint, depending on how many parameters are specified. + +- If all parameters (module namespace, name, provider, and version) are specified, the specified version for the given provider of the module is deleted. +- If module namespace, name, and provider are specified, the specified provider for the given module is deleted along with all its versions. +- If only module namespace and name are specified, the entire module is deleted. + +For public modules, only the the endpoint specifying the module namespace and name is valid. The other DELETE endpoints will 404. +For public modules, this only removes the record from the organization's HCP Terraform Registry and does not remove the public module from registry.terraform.io. + +If a version deletion would leave a provider with no versions, the provider will be deleted. If a provider deletion would leave a module with no providers, the module will be deleted. + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------- | +| [204][] | No Content | Success | +| [403][] | [JSON API error object][] | Forbidden - public module curation disabled | +| [404][] | [JSON API error object][] | Module, provider, or version not found or user not authorized | + +### Sample Request (private module) + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules/private/my-organization/my-module/aws/2.0.0 +``` + +### Sample Request (public module) + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-modules/public/terraform-aws-modules/vpc/aws +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/provider-versions-platforms.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/provider-versions-platforms.mdx new file mode 100644 index 000000000..029dda55d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/provider-versions-platforms.mdx @@ -0,0 +1,707 @@ +--- +page_title: /registry-providers API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/registry-providers` endpoint to read, + create, and delete private providers versions and platforms in your private + registry. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Private provider versions and platforms API reference + +These endpoints are only relevant to private providers. When you [publish a private provider](/terraform/enterprise/registry/publish-providers) to the HCP Terraform private registry, you must also create at least one version and at least one platform for that version before consumers can use the provider in configurations. Unlike the public Terraform Registry, the private registry does not automatically upload new releases. You must manually add new provider versions and the associated release files. + +All members of an organization can view and use both public and private providers, but you need [owners team](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) or [Manage Private Registry](/terraform/enterprise/users-teams-organizations/permissions#manage-private-registry) permissions to add, update, or delete provider versions and platforms in private registry. + +## Create a Provider Version + +`POST /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name/versions` + +The private registry does not automatically update private providers when you release new versions. You must use this endpoint to add each new version. Consumers cannot use new versions until you upload all [required release files](/terraform/enterprise/registry/publish-providers#release-files) and [Create a Provider Platform](#create-a-provider-platform). + +### Parameters + +| Parameter | Description | +| -------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create a provider in. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider for which the version is being created. For private providers this is the same as the `:organization_name` parameter. | +| `:name` | The name of the provider for which the version is being created. | + +Creates a new registry provider version. This endpoint only applies to private providers. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------------ | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "registry-provider-versions"`) | Success | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [403][] | [JSON API error object][] | Forbidden - not available for public providers | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------- | ------ | ------- | ----------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"registry-provider-versions"`. | +| `data.attributes.version` | string | | A valid semver version string. | +| `data.attributes.key-id` | string | | A valid gpg-key string. | +| `data.attributes.protocols` | array | | An array of Terraform provider API versions that this version supports. Must be one or all of the following values `["4.0","5.0","6.0"]`. | + +-> **Note:** Only Terraform 0.13 and later support third-party provider registries, and that Terraform version requires provider API version 5.0 or later. So you do not need to list major versions 4.0 or earlier in the `protocols` attribute. + +### Sample Payload + +```json +{ + "data": { + "type": "registry-provider-versions", + "attributes": { + "version": "3.1.1", + "key-id": "32966F3FB5AC1129", + "protocols": ["5.0"] + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "provver-y5KZUsSBRLV9zCtL", + "type": "registry-provider-versions", + "attributes": { + "version": "3.1.1", + "created-at": "2022-02-11T19:16:59.876Z", + "updated-at": "2022-02-11T19:16:59.876Z", + "key-id": "32966F3FB5AC1129", + "protocols": ["5.0"], + "permissions": { + "can-delete": true, + "can-upload-asset": true + }, + "shasums-uploaded": false, + "shasums-sig-uploaded": false + }, + "relationships": { + "registry-provider": { + "data": { + "id": "prov-cmEmLstBfjNNA9F3", + "type": "registry-providers" + } + }, + "platforms": { + "data": [], + "links": { + "related": "/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms" + } + } + }, + "links": { + "shasums-upload": "https://archivist.terraform.io/v1/object/dmF1b...", + "shasums-sig-upload": "https://archivist.terraform.io/v1/object/dmF1b..." + } + } +} + +``` + +## Get All Versions for a Single Provider + +`GET /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name/versions/` + +### Parameters + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization the provider belongs to. | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider. Must be the same as the `organization_name` for the provider. | +| `:name` | The provider name. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "registry-providers"`) | Success | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | Provider not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "provver-y5KZUsSBRLV9zCtL", + "type": "registry-provider-versions", + "attributes": { + "version": "3.1.1", + "created-at": "2022-02-11T19:16:59.876Z", + "updated-at": "2022-02-11T19:16:59.876Z", + "key-id": "32966F3FB5AC1129", + "protocols": ["5.0"], + "permissions": { + "can-delete": true, + "can-upload-asset": true + }, + "shasums-uploaded": true, + "shasums-sig-uploaded": true + }, + "relationships": { + "registry-provider": { + "data": { + "id": "prov-cmEmLstBfjNNA9F3", + "type": "registry-providers" + } + }, + "platforms": { + "data": [ + { + "id": "provpltfrm-GSHhNzptr9s3WoLD", + "type": "registry-provider-platforms" + }, + { + "id": "provpltfrm-A1PHitiM2KkKpVoM", + "type": "registry-provider-platforms" + }, + { + "id": "provpltfrm-BLJWvWyJ2QMs525k", + "type": "registry-provider-platforms" + }, + { + "id": "provpltfrm-qQYosUguetYtXGzJ", + "type": "registry-provider-platforms" + }, + { + "id": "provpltfrm-pjDHFN46y193bS7t", + "type": "registry-provider-platforms" + } + ], + "links": { + "related": "/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms" + } + } + }, + "links": { + "shasums-download": "https://archivist.terraform.io/v1/object/dmF1b...", + "shasums-sig-download": "https://archivist.terraform.io/v1/object/dmF1b..." + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } +} +``` + +**Note:** The `shasums-uploaded` and `shasums-sig-uploaded` properties will be false if those files have not been uploaded to Archivist. In this case, instead of including links to `shasums-download` and `shasums-sig-download`, the response will include upload links (`shasums-upload` and `shasums-sig-upload`). + +## Get a Version + +`GET /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name/versions/:version` + +### Parameters + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization the provider belongs to. | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider. Must be the same as the `organization_name` for the provider. | +| `:name` | The provider name. | +| `:version` | The version of the provider being created to which different platforms can be added. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "registry-providers"`) | Success | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | Provider not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1 +``` + +### Sample Response + +```json +{ + "data": { + "id": "provver-y5KZUsSBRLV9zCtL", + "type": "registry-provider-versions", + "attributes": { + "version": "3.1.1", + "created-at": "2022-02-11T19:16:59.876Z", + "updated-at": "2022-02-11T19:16:59.876Z", + "key-id": "32966F3FB5AC1129", + "protocols": ["5.0"], + "permissions": { + "can-delete": true, + "can-upload-asset": true + }, + "shasums-uploaded": true, + "shasums-sig-uploaded": true + }, + "relationships": { + "registry-provider": { + "data": { + "id": "prov-cmEmLstBfjNNA9F3", + "type": "registry-providers" + } + }, + "platforms": { + "data": [ + { + "id": "provpltfrm-GSHhNzptr9s3WoLD", + "type": "registry-provider-platforms" + }, + { + "id": "provpltfrm-A1PHitiM2KkKpVoM", + "type": "registry-provider-platforms" + }, + { + "id": "provpltfrm-BLJWvWyJ2QMs525k", + "type": "registry-provider-platforms" + }, + { + "id": "provpltfrm-qQYosUguetYtXGzJ", + "type": "registry-provider-platforms" + }, + { + "id": "provpltfrm-pjDHFN46y193bS7t", + "type": "registry-provider-platforms" + } + ], + "links": { + "related": "/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms" + } + } + }, + "links": { + "shasums-download": "https://archivist.terraform.io/v1/object/dmF1b...", + "shasums-sig-download": "https://archivist.terraform.io/v1/object/dmF1b..." + } + } +} +``` + +**Note:** `shasums-uploaded` and `shasums-sig-uploaded` will be false if those files haven't been uploaded to Archivist yet. In this case, instead of including links to `shasums-download` and `shasums-sig-download`, the response will include upload links (`shasums-upload` and `shasums-sig-upload`). + +## Delete a Version + +`DELETE /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name/versions/:provider_version` + +### Parameters + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to delete a provider version from. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider for which the version is being deleted. For private providers this is the same as the `:organization_name` parameter. | +| `:name` | The name of the provider for which the version is being deleted. | +| `:version` | The version for the provider that will be deleted along with its corresponding platforms. | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No Content | Success | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | Provider not found or user not authorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/public/hashicorp/aws/versions/3.1.1 +``` + +## Create a Provider Platform + +`POST /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name/versions/:version/platforms` + +Platforms are binaries that allow the provider to run on a particular operating system and architecture combination (e.g., Linux and AMD64). GoReleaser creates binaries automatically when you [create a release on GitHub](/terraform/registry/providers/publishing#creating-a-github-release) or [create a release locally](/terraform/registry/providers/publishing#using-goreleaser-locally). + +You must upload one or more platforms for each version of a private provider. After you create a platform, you must upload the platform binary file to the `provider-binary-upload` URL. + +### Parameters + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create a provider platform in. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider for which the platform is being created. For private providers this is the same as the `:organization_name` parameter. | +| `:name` | The name of the provider for which the platform is being created. | +| `:version` | The provider version of the provider for which the platform is being created. | + +Creates a new registry provider platform. This endpoint only applies to private providers. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "registry-provider-platforms"`) | Success | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [403][] | [JSON API error object][] | Forbidden - not available for public providers | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------------------------- | ------ | ------- | ---------------------------------------- | +| `data.type` | string | | Must be `"registry-provider-platforms"`. | +| `data.attributes.os` | string | | A valid operating system string. | +| `data.attributes.arch` | string | | A valid architecture string. | +| `data.attributes.shasum` | string | | A valid shasum string. | +| `data.attributes.filename` | string | | A valid filename string. | + +### Sample Payload + +```json +{ + "data": { + "type": "registry-provider-version-platforms", + "attributes": { + "os": "linux", + "arch": "amd64", + "shasum": "8f69533bc8afc227b40d15116358f91505bb638ce5919712fbb38a2dec1bba38", + "filename": "terraform-provider-aws_3.1.1_linux_amd64.zip" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms +``` + +### Sample Response + +```json +{ + "data": { + "id": "provpltfrm-BLJWvWyJ2QMs525k", + "type": "registry-provider-platforms", + "attributes": { + "os": "linux", + "arch": "amd64", + "filename": "terraform-provider-aws_3.1.1_linux_amd64.zip", + "shasum": "8f69533bc8afc227b40d15116358f91505bb638ce5919712fbb38a2dec1bba38", + "permissions": { + "can-delete": true, + "can-upload-asset": true + }, + "provider-binary-uploaded": false + }, + "relationships": { + "registry-provider-version": { + "data": { + "id": "provver-y5KZUsSBRLV9zCtL", + "type": "registry-provider-versions" + } + } + }, + "links": { + "provider-binary-upload": "https://archivist.terraform.io/v1/object/dmF1b..." + } + } +} + +``` + +## Get All Platforms for a Single Version + +`GET /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name/versions/:version/platforms` + +### Parameters + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization the provider belongs to. | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider. Must be the same as the `organization_name` for the provider. | +| `:name` | The provider name. | +| `:version` | The version of the provider. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "registry-providers"`) | Success | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | Provider not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "provpltfrm-GSHhNzptr9s3WoLD", + "type": "registry-provider-platforms", + "attributes": { + "os": "darwin", + "arch": "amd64", + "filename": "terraform-provider-aws_3.1.1_darwin_amd64.zip", + "shasum": "fd580e71bd76d76913e1925f2641be9330c536464af9a08a5b8994da65a26cbc", + "permissions": { + "can-delete": true, + "can-upload-asset": true + }, + "provider-binary-uploaded": true + }, + "relationships": { + "registry-provider-version": { + "data": { + "id": "provver-y5KZUsSBRLV9zCtL", + "type": "registry-provider-versions" + } + } + }, + "links": { + "provider-binary-download": "https://archivist.terraform.io/v1/object/dmF1b..." + } + }, + { + "id": "provpltfrm-A1PHitiM2KkKpVoM", + "type": "registry-provider-platforms", + "attributes": { + "os": "darwin", + "arch": "arm64", + "filename": "terraform-provider-aws_3.1.1_darwin_arm64.zip", + "shasum": "de3c351d7f35a3c8c583c0da5c1c4d558b8cea3731a49b15f63de5bbbafc0165", + "permissions": { + "can-delete": true, + "can-upload-asset": true + }, + "provider-binary-uploaded": true + }, + "relationships": { + "registry-provider-version": { + "data": { + "id": "provver-y5KZUsSBRLV9zCtL", + "type": "registry-provider-versions" + } + } + }, + "links": { + "provider-binary-download": "https://archivist.terraform.io/v1/object/dmF1b..." + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 2 + } + } +} +``` + +**Note:** The `provider-binary-uploaded` property will be `false` if that file has not been uploaded to Archivist. In this case, instead of including a link to `provider-binary-download`, the response will include an upload link `provider-binary-upload`. + +## Get a Platform + +`GET /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name/versions/:version/platforms/:os/:arch` + +### Parameters + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization the provider belongs to. | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider. Must be the same as the `organization_name` for the provider. | +| `:name` | The provider name. | +| `:version` | The version of the provider. | +| `:os` | The operating system of the provider platform. | +| `:arch` | The architecture of the provider platform. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "registry-providers"`) | Success | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | Provider not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms/linux/amd64 +``` + +### Sample Response + +```json +{ + "data": { + "id": "provpltfrm-BLJWvWyJ2QMs525k", + "type": "registry-provider-platforms", + "attributes": { + "os": "linux", + "arch": "amd64", + "filename": "terraform-provider-aws_3.1.1_linux_amd64.zip", + "shasum": "8f69533bc8afc227b40d15116358f91505bb638ce5919712fbb38a2dec1bba38", + "permissions": { + "can-delete": true, + "can-upload-asset": true + }, + "provider-binary-uploaded": true + }, + "relationships": { + "registry-provider-version": { + "data": { + "id": "provver-y5KZUsSBRLV9zCtL", + "type": "registry-provider-versions" + } + } + }, + "links": { + "provider-binary-download": "https://archivist.terraform.io/v1/object/dmF1b..." + } + } +} +``` + +**Note:** The `provider-binary-uploaded` property will be `false` if that file has not been uploaded to Archivist. In this case, instead of including a link to `provider-binary-download`, the response will include an upload link `provider-binary-upload`. + +## Delete a Platform + +`DELETE /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name/versions/:version/platforms/:os/:arch` + +### Parameters + +| Parameter | Description | +| -------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to delete a provider platform from. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:registry_name` | Must be `private`. | +| `:namespace` | The namespace of the provider for which the platform is being deleted. For private providers this is the same as the `:organization_name` parameter. | +| `:name` | The name of the provider for which the platform is being deleted. | +| `:version` | The version for which the platform is being deleted. | +| `:os` | The operating system of the provider platform that is being deleted. | +| `:arch` | The architecture of the provider platform that is being deleted. | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No Content | Success | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | Provider not found or user not authorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws/versions/3.1.1/platforms/linux/amd64 +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/providers.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/providers.mdx new file mode 100644 index 000000000..44719c2f1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/providers.mdx @@ -0,0 +1,471 @@ +--- +page_title: /registry-providers API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's organization `/registry-providers` endpoint + to list, create, get, and delete providers in your private registry. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Registry providers API reference + +You can add publicly curated providers from the [Terraform Registry](https://registry.terraform.io/) and custom, private providers to your HCP Terraform private registry. The private registry stores a pointer to public providers so that you can view their data from within HCP Terraform. This lets you clearly designate all of the providers that are recommended for the organization and makes them centrally accessible. + +All members of an organization can view and use both public and private providers, but you need [owners team](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) or [Manage Private Registry](/terraform/enterprise/users-teams-organizations/permissions#manage-private-registry) permissions to add, update, or delete them them in private registry. + +## HCP Terraform Registry Implementation + +For publicly curated providers, the HCP Terraform Registry acts as a proxy to the [Terraform Registry](https://registry.terraform.io) for the following: + +- The public registry discovery endpoints have the path prefix provided in the [discovery document](/terraform/registry/api-docs#service-discovery) which is currently `/api/registry/public/v1`. +- [Authentication](/terraform/enterprise/api-docs#authentication) is handled the same as all other HCP Terraform endpoints. + +## List Terraform Registry Providers for an Organization + +`GET /organizations/:organization_name/registry-providers` + +### Parameters + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------- | +| `:organization_name` | The name of the organization to list available providers from. | + +Lists the providers included in the private registry for the specified organization. + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | ---------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "registry-providers"`) | Success | +| [404][] | [JSON API error object][] | Providers not found or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------- | +| `q` | **Optional.** A search query string. Providers are searchable by both their name and their namespace fields. | +| `filter[field name]` | **Optional.** If specified, restricts results to those with the matching field name value. Valid values are `registry_name`, and `organization_name`. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 registry providers per page. | + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-providers +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "prov-kwt1cBiX2SdDz38w", + "type": "registry-providers", + "attributes": { + "name": "aws", + "namespace": "my-organization", + "created-at": "2021-04-07T19:01:18.528Z", + "updated-at": "2021-04-07T19:01:19.863Z", + "registry-name": "public", + "permissions": { + "can-delete": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-providers/public/my-organization/aws" + } + }, + { + "id": "prov-PopQnMtYDCcd3PRX", + "type": "registry-providers", + "attributes": { + "name": "aurora", + "namespace": "my-organization", + "created-at": "2021-04-07T19:04:41.375Z", + "updated-at": "2021-04-07T19:04:42.828Z", + "registry-name": "public", + "permissions": { + "can-delete": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-providers/public/my-organization/aurora" + } + }, + ..., + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/my-organization/registry-providers?page%5Bnumber%5D=1&page%5Bsize%5D=6", + "first": "https://app.terraform.io/api/v2/organizations/my-organization/registry-providers?page%5Bnumber%5D=1&page%5Bsize%5D=6", + "prev": null, + "next": "https://app.terraform.io/api/v2/organizations/my-organization/registry-providers?page%5Bnumber%5D=2&page%5Bsize%5D=6", + "last": "https://app.terraform.io/api/v2/organizations/my-organization/registry-providers?page%5Bnumber%5D=29&page%5Bsize%5D=6" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 6, + "prev-page": null, + "next-page": 2, + "total-pages": 29, + "total-count": 169 + } + } +} +``` + +## Create a Provider + +`POST /organizations/:organization_name/registry-providers` + +Use this endpoint to create both public and private providers: + +- **Public providers:** The public provider record will be available in the organization's registry provider list immediately after creation. You cannot create versions for public providers; you must use the versions available on the Terraform Registry. +- **Private providers:** The private provider record will be available in the organization's registry provider list immediately after creation, but you must [create a version and upload release assets](/terraform/enterprise/registry/publish-providers#publishing-a-provider-and-creating-a-version) before consumers can use it. The private registry does not automatically update private providers when you release new versions. You must add each new version with the [Create a Provider Version](/terraform/enterprise/api-docs/private-registry/provider-versions-platforms#create-a-provider-version) endpoint. + +### Parameters + +| Parameter | Description | +| -------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create a provider in. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "registry-providers"`) | Successfully published provider | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +~> **Important:** For private providers, you must also create a version, a platform, and upload release assets before consumers can use the provider. Refer to [Publishing a Private Provider](/terraform/enterprise/registry/publish-providers) for more details. + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------- | ------ | ------- | ------------------------------------------------------------------------------------------------------------ | +| `data.type` | string | | Must be `"registry-providers"`. | +| `data.attributes.name` | string | | The name of the provider. | +| `data.attributes.namespace` | string | | The namespace of the provider. For private providers this is the same as the `:organization_name` parameter. | +| `data.attributes.registry-name` | string | | Whether this is a publicly maintained provider or private. Must be either `public` or `private`. | + +### Sample Payload (Private Provider) + +```json +{ + "data": { + "type": "registry-providers", + "attributes": { + "name": "aws", + "namespace": "hashicorp", + "registry-name": "private" + } + } +} +``` + +### Sample Payload (Public Provider) + +```json +{ + "data": { + "type": "registry-providers", + "attributes": { + "name": "aws", + "namespace": "hashicorp", + "registry-name": "public" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-providers +``` + +### Sample Response (Private Provider) + +```json +{ + "data": { + "id": "prov-cmEmLstBfjNNA9F3", + "type": "registry-providers", + "attributes": { + "name": "aws", + "namespace": "hashicorp", + "registry-name": "private", + "created-at": "2022-02-11T19:16:59.533Z", + "updated-at": "2022-02-11T19:16:59.533Z", + "permissions": { + "can-delete": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "versions": { + "data": [], + "links": { + "related": "/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws" + } + } + }, + "links": { + "self": "/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws" + } + } +} +``` + +### Sample Response (Public Provider) + +```json +{ + "data": { + "id": "prov-fZn7uHu99ZCpAKZJ", + "type": "registry-providers", + "attributes": { + "name": "aws", + "namespace": "hashicorp", + "registry-name": "public", + "created-at": "2020-07-09T19:36:56.288Z", + "updated-at": "2020-07-09T19:36:56.288Z", + "permissions": { + "can-delete": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-providers/public/hashicorp/aws" + } + } +} +``` + +## Get a Provider + +`GET /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name` + +### Parameters + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------ | +| `:organization_name` | The name of the organization the provider belongs to. | +| `:registry_name` | Whether this is a publicly maintained provider or private. Must be either `public` or `private`. | +| `:namespace` | The namespace of the provider. For private providers this is the same as the `:organization_name` parameter. | +| `:name` | The provider name. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "registry-providers"`) | Success | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | Provider not found or user unauthorized to perform action | + +### Sample Request (Private Provider) + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws +``` + +### Sample Request (Public Provider) + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-providers/public/hashicorp/aws +``` + +### Sample Response (Private Provider) + +```json +{ + "data": { + "id": "prov-cmEmLstBfjNNA9F3", + "type": "registry-providers", + "attributes": { + "name": "aws", + "namespace": "hashicorp", + "created-at": "2022-02-11T19:16:59.533Z", + "updated-at": "2022-02-11T19:16:59.533Z", + "registry-name": "private", + "permissions": { + "can-delete": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "versions": { + "data": [ + { + "id": "provver-y5KZUsSBRLV9zCtL", + "type": "registry-provider-versions" + } + ], + "links": { + "related": "/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws" + } + } + }, + "links": { + "self": "/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws" + } + } +} +``` + +### Sample Response (Public Provider) + +```json +{ + "data": { + "id": "prov-fZn7uHu99ZCpAKZJ", + "type": "registry-providers", + "attributes": { + "name": "aws", + "namespace": "hashicorp", + "registry-name": "public", + "created-at": "2020-07-09T19:36:56.288Z", + "updated-at": "2020-07-09T20:16:20.538Z", + "permissions": { + "can-delete": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/registry-providers/public/hashicorp/aws" + } + } +} +``` + +## Delete a Provider + +`DELETE /organizations/:organization_name/registry-providers/:registry_name/:namespace/:name` + +### Parameters + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:organization_name` | The name of the organization to delete a provider from. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:registry_name` | Whether this is a publicly maintained provider or private. Must be either `public` or `private`. | +| `:namespace` | The namespace of the provider that will be deleted. | +| `:name` | The name of the provider that will be deleted. | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No Content | Success | +| [403][] | [JSON API error object][] | Forbidden - public provider curation disabled | +| [404][] | [JSON API error object][] | Provider not found or user not authorized to perform action | + +### Sample Request (Private Provider) + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/hashicorp/registry-providers/private/hashicorp/aws +``` + +### Sample Request (Public Provider) + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/my-organization/registry-providers/public/hashicorp/aws +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/tests.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/tests.mdx new file mode 100644 index 000000000..ea1b7f4b6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/private-registry/tests.mdx @@ -0,0 +1,755 @@ +--- +page_title: /tests API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/tests` endpoint to list, get, create, and + cancel Terraform test runs. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Tests API reference + +Tests are terraform operations(runs) and are referred to as Test Runs within the HCP Terraform API. + +Performing a test on a new configuration is a multi-step process. + +1. [Create a configuration version on the registry module](#create-a-configuration-version-for-a-test). +2. [Upload configuration files to the configuration version](#upload-configuration-files-for-a-test). +3. [Create a test on the module](#create-a-test-run); HCP Terraform completes this step automatically when you upload a configuration file. + +Alternatively, you can create a test with a pre-existing configuration version, even one from another module. This is useful for promoting known good code from one module to another. + +## Attributes + +The `tests` API endpoint has the following attributes. + +### Test Run States + +The state of the test operation is found in `data.attributes.status`, and you can reference the following list of possible states. + +| State | Description | +| ---------- | ----------------------------------------------------- | +| `pending` | The initial status of a run after creation. | +| `queued` | HCP Terraform has queued the test operation to start. | +| `running` | HCP Terraform is executing the test. | +| `errored` | The test has errored. This is a final state. | +| `canceled` | The test has been canceled. This is a final state. | +| `finished` | The test has completed. This is a final state. | + +### Test run status + +The final test status is found in `data.attributes.test-status`, and you can reference the following list of possible states. + +| Status | Description | +| ------ | ---------------------------- | +| `pass` | The given tests have passed. | +| `fail` | The given tests have failed. | + +### Detailed test status + +The test results can be found via the following attributes + +| Status | Description | | +| ------------------------------- | ------------------------------------------- | - | +| `data.attributes.tests-passed` | The number of tests that have passed. | | +| `data.attributes.tests-failed` | The number of tests that have failed. | | +| `data.attributes.tests-errored` | The number of tests that have errored out. | | +| `data.attributes.tests-skipped` | The number of tests that have been skipped. | | + +### Test Sources + +List tests for a module. You can use the following sources as [tests list](/terraform/enterprise/api-docs/private-registry/tests#list-tests-for-a-module) query parameters. + +| Source | Description | +| --------------------------- | ---------------------------------------------------------------------------------------- | +| `terraform` | Indicates a test was queued from HCP Terraform CLI. | +| `tfe-api` | Indicates a test was queued from HCP Terraform API. | +| `tfe-configuration-version` | Indicates a test was queued from a Configuration Version, triggered from a VCS provider. | + +## Create a Test + +`POST /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/test-runs` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization for the module. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:namespace` | The namespace of the module for which the test is being created. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module for which the test is being created. | +| `:provider` | The name of the provider for which the test is being created. | + +A test run executes tests against a registry module, using a configuration version and the modules’s current environment variables. + +Creating a test run requires permission to access the specified module. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for more information. + +When creating a test run, you may optionally provide a list of variable objects containing key and value attributes. These values apply to that test run specifically and take precedence over variables with the same key that are created within the module. All values must be expressed as an HCL literal in the same syntax you would use when writing Terraform code. + +**Sample Test Variables:** + +```json +"attributes": { + "variables": [ + { "key": "replicas", "value": "2" }, + { "key": "access_key", "value": "\"ABCDE12345\"" } + ] +} +``` + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------------------------------------------------- | -------------------- | ------------- | -------------------------------------------------------------------------------------------------- | +| `data.attributes.verbose` | bool | `false` | Specifies whether Terraform should print the plan or state for each test run block as it executes. | +| `data.attributes.test-directory` | string | `"tests"` | Sets the directory where HCP Terraform executes the tests. | +| `data.attributes.filters` | array\[string] | (empty array) | When specified, HCP Terraform only executes the test files contained within this array. | +| `data.attributes.variables` | array\[{key, value}] | (empty array) | Specifies an optional list of test-specific environment variable values. | +| `data.relationships.configuration-version.data.id` | string | none | Specifies the configuration version that HCP Terraform executes the test against. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "verbose": true, + "filters": ["tests/test.tftest.hcl"], + "test-directory": "tests", + "variables": [ + { "key" : "number", "value": 4} + ] + }, + "type":"test-runs" + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/private/registry-provider/test-runs +``` + +### Sample Response + +```json +{ + "data": { + "id": "trun-KFg8DSiRz4E37mdJ", + "type": "test-runs", + "attributes": { + "status": "queued", + "status-timestamps": { + "queued-at": "2023-10-03T18:27:39+00:00" + }, + "created-at": "2023-10-03T18:27:39.239Z", + "updated-at": "2023-10-03T18:27:39.264Z", + "test-configurable-type": "RegistryModule", + "test-configurable-id": "mod-9rjVHLCUE9QD3k6L", + "variables": [ + { + "key": "number", + "value": "4" + } + ], + "filters": [ + "tests/test.tftest.hcl" + ], + "test-directory": "tests", + "verbose": true, + "test-status": null, + "tests-passed": null, + "tests-failed": null, + "tests-errored": null, + "tests-skipped": null, + "source": "tfe-api", + "message": "Queued manually via the Terraform Enterprise API" + }, + "relationships": { + "configuration-version": { + "data": { + "id": "cv-d3zBGFf5DfWY4GY9", + "type": "configuration-versions" + }, + "links": { + "related": "/api/v2/configuration-versions/cv-d3zBGFf5DfWY4GY9" + } + }, + "created-by": { + "data": { + "id": "user-zsRFs3AGaAHzbEfs", + "type": "users" + }, + "links": { + "related": "/api/v2/users/user-zsRFs3AGaAHzbEfs" + } + } + } + } +} +``` + +## Create a Configuration Version for a Test + +`POST /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/test-runs/configuration-versions` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization for the module. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:namespace` | The namespace of the module for which the configuration version is being created. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module for which the configuration version is being created. | +| `:provider` | The name of the provider for which the configuration version is being created. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/test-runs/configuration-versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "cv-aaady7niJMY1wAvx", + "type": "configuration-versions", + "attributes": { + "auto-queue-runs": true, + "error": null, + "error-message": null, + "source": "tfe-api", + "speculative": false, + "status": "pending", + "status-timestamps": {}, + "changed-files": [], + "provisional": false, + "upload-url": "https://archivist.terraform.io/v1/object/dmF1bHQ6djM6eFliQ0l1ZEhNUDRMZmdWeExoYWZ1WnFwaCtYQUFSQjFaWVcySkEyT0tyZTZXQ0hjN3ZYQkFvbkJHWkg2Y0U2MDRHRXFvQVl6cUJqQzJ0VkppVHBXTlJNWmpVc1ZTekg5Q1hMZ0hNaUpNdUhib1hGS1RpT3czRGdRaWtPZFZ3VWpDQ1U0S2dhK2xLTUQ2ZFZDaUZ3SktiNytrMlpoVHd0cXdGVHIway8zRkFmejdzMSt0Rm9TNFBTV3dWYjZUTzJVNE1jaW9UZ2VKVFJNRnUvbjBudUp4U0l6VzFDYkNzVVFsb2VFbC9DRFlCTWFsbXBMNzZLUGQxeTJHb09ZTkxHL1d2K1NtcmlEQXptZTh1Q1BwR1dhbVBXQTRiREdlTkI3Qyt1YTRRamFkRzBWYUg3NE52TGpqT1NKbzFrZ3J3QmxnMGhHT3VaTHNhSmo0eXpv" + }, + "relationships": { + "ingress-attributes": { + "data": null, + "links": { + "related": "/api/v2/configuration-versions/cv-aaady7niJMY1wAvx/ingress-attributes" + } + } + }, + "links": { + "self": "/api/v2/configuration-versions/cv-aaady7niJMY1wAvx" + } + } +} +``` + +## Upload Configuration Files for a Test + +`PUT https://archivist.terraform.io/v1/object/` + +**The URL is provided in the `upload-url` attribute when creating a `configuration-versions` resource. After creation, the URL is hidden on the resource and no longer available.** + +### Sample Request + +**@filename is the name of the configuration file you wish to upload.** + +```shell +curl \ + --header "Content-Type: application/octet-stream" \ + --request PUT \ + --data-binary @filename \ + https://archivist.terraform.io/v1/object/4c44d964-eba7-4dd5-ad29-1ece7b99e8da +``` + +## List Tests for a Module + +`GET /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/test-runs/` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization for the module. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:namespace` | The namespace of the module which the tests have executed against. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module which the tests have executed against. | +| `:provider` | The name of the provider which the tests have executed against. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling does not automatically encode URLs. + +| Parameter | Description | Required | +| ---------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------- | +| `page[number]` | If omitted, the endpoint returns the first page. | Optional | +| `page[size]` | If omitted, the endpoint returns 20 runs per page. | Optional | +| `filter[source]` | **Optional.** A comma-separated list of test sources; the result will only include tests that came from one of these sources. Options are listed in [Test Sources](/terraform/enterprise/api-docs/private-registry/tests#test-sources). | | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/test-runs +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "trun-KFg8DSiRz4E37mdJ", + "type": "test-runs", + "attributes": { + "status": "finished", + "status-timestamps": { + "queued-at": "2023-10-03T18:27:39+00:00", + "started-at": "2023-10-03T18:27:41+00:00", + "finished-at": "2023-10-03T18:27:53+00:00" + }, + "log-read-url": "https://archivist.terraform.io/v1/object/dmF1bHQ6djM6eFliQ0l1ZEhNUDRMZmdWeExoYWZ1WnFwaCtYQUFSQjFaWVcySkEyT0tyZTZXQ0hjN3ZYQkFvbkJHWkg2Y0U2MDRHRXFvQVl6cUJqQzJ0VkppVHBXTlJNWmpVc1ZTekg5Q1hMZ0hNaUpNdUhib1hGS1RpT3czRGdRaWtPZFZ3VWpDQ1U0S2dhK2xLTUQ2ZFZDaUZ3SktiNytrMlpoVHd0cXdGVHIway8zRkFmejdzMSt0Rm9TNFBTV3dWYjZUTzJVNE1jaW9UZ2VKVFJNRnUvbjBudUp4U0l6VzFDYkNzVVFsb2VFbC9DRFlCTWFsbXBMNzZLUGQxeTJHb09ZTkxHL1d2K1NtcmlEQXptZTh1Q1BwR1dhbVBXQTRiREdlTkI3Qyt1YTRRamFkRzBWYUg3NE52TGpqT1NKbzFrZ3J3QmxnMGhHT3VaTHNhSmo0eXpv", + "created-at": "2023-10-03T18:27:39.239Z", + "updated-at": "2023-10-03T18:27:53.574Z", + "test-configurable-type": "RegistryModule", + "test-configurable-id": "mod-9rjVHLCUE9QD3k6L", + "variables": [ + { + "key": "number", + "value": "4" + } + ], + "filters": [ + "tests/test.tftest.hcl" + ], + "test-directory": "tests", + "verbose": true, + "test-status": "pass", + "tests-passed": 1, + "tests-failed": 0, + "tests-errored": 0, + "tests-skipped": 0, + "source": "tfe-api", + "message": "Queued manually via the Terraform Enterprise API" + }, + "relationships": { + "configuration-version": { + "data": { + "id": "cv-d3zBGFf5DfWY4GY9", + "type": "configuration-versions" + }, + "links": { + "related": "/api/v2/configuration-versions/cv-d3zBGFf5DfWY4GY9" + } + }, + "created-by": { + "data": { + "id": "user-zsRFs3AGaAHzbEfs", + "type": "users" + }, + "links": { + "related": "/api/v2/users/user-zsRFs3AGaAHzbEfs" + } + } + } + }, + {...} + ] +} +``` + +## Get Test Details + +`GET /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/test-runs/:test_run_id` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization for the module. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:namespace` | The namespace of the module which the test was executed against. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module which the test was executed against. | +| `:provider` | The name of the provider which the test was executed against. | +| `:test_run_id` | The test ID to get. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/test-runs/trun-xFMAHM3FhkFBL6Z7 +``` + +### Sample Response + +```json +{ + "data": { + "id": "trun-KFg8DSiRz4E37mdJ", + "type": "test-runs", + "attributes": { + "status": "finished", + "status-timestamps": { + "queued-at": "2023-10-03T18:27:39+00:00", + "started-at": "2023-10-03T18:27:41+00:00", + "finished-at": "2023-10-03T18:27:53+00:00" + }, + "log-read-url": "https://archivist.terraform.io/v1/object/dmF1bHQ6djM6eFliQ0l1ZEhNUDRMZmdWeExoYWZ1WnFwaCtYQUFSQjFaWVcySkEyT0tyZTZXQ0hjN3ZYQkFvbkJHWkg2Y0U2MDRHRXFvQVl6cUJqQzJ0VkppVHBXTlJNWmpVc1ZTekg5Q1hMZ0hNaUpNdUhib1hGS1RpT3czRGdRaWtPZFZ3VWpDQ1U0S2dhK2xLTUQ2ZFZDaUZ3SktiNytrMlpoVHd0cXdGVHIway8zRkFmejdzMSt0Rm9TNFBTV3dWYjZUTzJVNE1jaW9UZ2VKVFJNRnUvbjBudUp4U0l6VzFDYkNzVVFsb2VFbC9DRFlCTWFsbXBMNzZLUGQxeTJHb09ZTkxHL1d2K1NtcmlEQXptZTh1Q1BwR1dhbVBXQTRiREdlTkI3Qyt1YTRRamFkRzBWYUg3NE52TGpqT1NKbzFrZ3J3QmxnMGhHT3VaTHNhSmo0eXpv", + "created-at": "2023-10-03T18:27:39.239Z", + "updated-at": "2023-10-03T18:27:53.574Z", + "test-configurable-type": "RegistryModule", + "test-configurable-id": "mod-9rjVHLCUE9QD3k6L", + "variables": [ + { + "key": "number", + "value": "4" + } + ], + "filters": [ + "tests/test.tftest.hcl" + ], + "test-directory": "tests", + "verbose": true, + "test-status": "pass", + "tests-passed": 1, + "tests-failed": 0, + "tests-errored": 0, + "tests-skipped": 0, + "source": "tfe-api", + "message": "Queued manually via the Terraform Enterprise API" + }, + "relationships": { + "configuration-version": { + "data": { + "id": "cv-d3zBGFf5DfWY4GY9", + "type": "configuration-versions" + }, + "links": { + "related": "/api/v2/configuration-versions/cv-d3zBGFf5DfWY4GY9" + } + }, + "created-by": { + "data": { + "id": "user-zsRFs3AGaAHzbEfs", + "type": "users" + }, + "links": { + "related": "/api/v2/users/user-zsRFs3AGaAHzbEfs" + } + } + } + } +} +``` + +## Cancel a Test + +`POST /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/test-runs/:test_run_id/cancel` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:organization_name` | The name of the organization to create a test in. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:namespace` | The namespace of the module for which the test is being canceled. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module for which the test is being canceled. | +| `:provider` | The name of the provider for which the test is being canceled. | +| `:test_run_id` | The test ID to cancel. | + +Use the `cancel` action to interrupt a test that is currently running. The action sends an `INT` signal to the running Terraform process, which instructs Terraform to safely end the tests and attempt to teardown any infrastructure that your tests create. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ------------------------------------------ | +| [202][] | none | Successfully queued a cancel request. | +| [409][] | [JSON API error object][] | Test was not running; cancel not allowed. | +| [404][] | [JSON API error object][] | Test was not found or user not authorized. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/test-runs/trun-xFMAHM3FhkFBL6Z7/cancel +``` + +## Forcefully cancel a Test + +`POST /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/test-runs/:test_run_id/force-cancel` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization for the module. The organization must already exist, and the token authenticating the API request must belong to the `owners` team or a member of the `owners` team. | +| `:namespace` | The namespace of the module for which the test is being force-canceled. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module for which the test is being force-canceled. | +| `:provider` | The name of the provider for which the test is being force-canceled. | +| `:test_run_id` | The test ID to cancel. | + +The `force-cancel` action ends the test immediately. Once invoked, Terraform places the test into a `canceled` state and terminates the running Terraform process. + +~> **Warning:** This endpoint has potentially dangerous side-effects, including loss of any in-flight state in the running Terraform process. Use this operation with extreme caution. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | -------------------------------------------------------------- | +| [202][] | none | Successfully queued a cancel request. | +| [409][] | [JSON API error object][] | Test was not running, or has not been canceled non-forcefully. | +| [404][] | [JSON API error object][] | Test was not found or user not authorized. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/test-runs/trun-xFMAHM3FhkFBL6Z7/force-cancel +``` + +## Create an Environment Variable for Module Tests + +`POST /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/vars` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:organization_name` | The name of the organization of the module. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:namespace` | The namespace of the module for which the testing environment variable is being created. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module for which the testing environment variable is being created. | +| `:provider` | The name of the provider for which the testing environment variable is being created. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------- | ------ | ------- | -------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | none | Must be `"vars"`. | +| `data.attributes.key` | string | none | The variable's name. Test variable keys must begin with a letter or underscore and can only contain letters, numbers, and underscores. | +| `data.attributes.value` | string | `""` | The value of the variable. | +| `data.attributes.description` | string | none | The description of the variable. | +| `data.attributes.category` | string | none | This must be `"env"`. | +| `data.attributes.sensitive` | bool | `false` | Whether the value is sensitive. When set to `true`, Terraform writes the variable once and is not visible thereafter. | + +### Sample Payload + +```json +{ + "data": { + "type":"vars", + "attributes": { + "key":"some_key", + "value":"some_value", + "description":"some description", + "category":"env", + "sensitive":false + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/vars +``` + +### Sample Response + + { + "data": { + "id": "var-xSCUzCxdqMs2ygcg", + "type": "vars", + "attributes": { + "key": "keykey", + "value": "some_value", + "sensitive": false, + "category": "env", + "hcl": false, + "created-at": "2023-10-03T19:47:05.393Z", + "description": "some description", + "version-id": "699b14ea5d5e5c02f6352fac6bfd0a1424c21d32be14d1d9eb79f5e1f28f663a" + }, + "links": { + "self": "/api/v2/vars/var-xSCUzCxdqMs2ygcg" + } + } + } + +## List Test Variables for a Module + +`GET /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/vars` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization for the module. The organization must already exist, and the token authenticating the API request must belong to the `owners` team or a member of the `owners` team. | +| `:namespace` | The namespace of the module which the test environment variables were created for. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module which the test environment variables were created for. | +| `:provider` | The name of the provider which the test environment variables were created for. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/vars +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "var-xSCUzCxdqMs2ygcg", + "type": "vars", + "attributes": { + "key": "keykey", + "value": "some_value", + "sensitive": false, + "category": "env", + "hcl": false, + "created-at": "2023-10-03T19:47:05.393Z", + "description": "some description", + "version-id": "699b14ea5d5e5c02f6352fac6bfd0a1424c21d32be14d1d9eb79f5e1f28f663a" + }, + "links": { + "self": "/api/v2/vars/var-xSCUzCxdqMs2ygcg" + } + } + ] +} +``` + +## Update Test Variables for a Module + +`PATCH /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/vars/variable_id` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization for the module. The organization must already exist, and the token authenticating the API request must belong to the "owners" team or a member of the "owners" team. | +| `:namespace` | The namespace of the module for which the test environment variable is being updated. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module for which the test environment variable is being updated. | +| `:provider` | The name of the provider for which the test environment variable is being updated. | +| `:variable_id` | The ID of the variable to update. | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------- | ------ | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"vars"`. | +| `data.attributes` | object | none | New attributes for the variable. This object can include `key`, `value`, `description`, `category`, and `sensitive` properties. Refer to [Create an Environment Variable for Module Tests](#create-an-environment-variable-for-module-tests) for additional information. All properties are optional. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "key":"name", + "value":"mars", + "description": "new description", + "category":"env", + "sensitive": false + }, + "type":"vars" + } +} +``` + +### Sample Request + +```bash +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/vars/var-yRmifb4PJj7cLkMG +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-yRmifb4PJj7cLkMG", + "type":"vars", + "attributes": { + "key":"name", + "value":"mars", + "description":"new description", + "sensitive":false, + "category":"env", + "hcl":false + } + } +} +``` + +## Delete Test Variable for a Module + +`DELETE /organizations/:organization_name/tests/registry-modules/private/:namespace/:name/:provider/vars/variable_id` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization for the module. The organization must already exist, and the token authenticating the API request must belong to the `owners` team or a member of the `owners` team. | +| `:namespace` | The namespace of the module for which the test environment variable is being deleted. For private modules this is the same as the `:organization_name` parameter. | +| `:name` | The name of the module for which the test environment variable is being deleted. | +| `:provider` | The name of the provider for which the test environment variable is being deleted. | +| `:variable_id` | The ID of the variable to delete. | + +### Sample Request + +```bash +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/my-organization/tests/registry-modules/private/my-organization/registry-name/registry-provider/vars/var-yRmifb4PJj7cLkMG +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/project-team-access.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/project-team-access.mdx new file mode 100644 index 000000000..e77d49774 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/project-team-access.mdx @@ -0,0 +1,523 @@ +--- +page_title: /team-projects API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/team-projects` endpoint to read, add, + update, and remove team access from a project. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Project team access API reference + + + +-> **Note:** Team management is available in HCP Terraform **Standard** Edition. [Learn more about HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing). + + + +The team access APIs are used to associate a team to permissions on a project. A single `team-project` resource contains the relationship between the Team and Project, including the privileges the team has on the project. + +## Resource permissions + +A `team-project` resource represents a team's local permissions on a specific project. Teams can also have organization-level permissions that grant access to projects. HCP Terraform uses the more restrictive access level. For example, a team with the **Manage projects** permission enabled has admin access on all projects, even if their `team-project` on a particular project only grants read access. For more information, refer to [Managing Project Access](/terraform/enterprise/users-teams-organizations/teams/manage#managing-project-access). + +Any member of an organization can view team access relative to their own team memberships, including secret teams of which they are a member. Organization owners and project admins can modify team access or view the full set of secret team accesses. The organization token and the owners team token can act as an owner on these endpoints. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for additional information. + +## Project Team Access Levels + +| Access Level | Description | +| ------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `read` | Read project and Read workspace access role on project workspaces | +| `write` | Read project and Write workspace access role on project workspaces | +| `maintain` | Read project and Admin workspace access role on project workspaces | +| `admin` | Admin project, Admin workspace access role on project workspaces, create workspaces within project, move workspaces between projects, manage project team access | +| `custom` | Custom access permissions on project and project's workspaces | + +## List Team Access to a Project + +`GET /team-projects` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "team-projects"`) | The request was successful | +| [404][] | [JSON API error object][] | Project not found or user unauthorized to perform action | + +### Query Parameters + +[These are standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). + +| Parameter | Description | +| --------------------- | ----------------------------------------------------- | +| `filter[project][id]` | **Required.** The project ID to list team access for. | +| `page[number]` | **Optional.** | +| `page[size]` | **Optional.** | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + "https://app.terraform.io/api/v2/team-projects?filter%5Bproject%5D%5Bid%5D=prj-ckZoJwdERaWcFHwi" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "tprj-TLznAnYdcsD2Dcmm", + "type": "team-projects", + "attributes": { + "access": "read", + "project-access": { + "settings": "read", + "teams": "none" + }, + "workspace-access": { + "create": false, + "move": false, + "locking": false, + "delete": false, + "runs": "read", + "variables": "read", + "state-versions": "read", + "sentinel-mocks": "none", + "run-tasks": false + } + }, + "relationships": { + "team": { + "data": { + "id": "team-KpibQGL5GqRAWBwT", + "type": "teams" + }, + "links": { + "related": "/api/v2/teams/team-KpibQGL5GqRAWBwT" + } + }, + "project": { + "data": { + "id": "prj-ckZoJwdERaWcFHwi", + "type": "projects" + }, + "links": { + "related": "/api/v2/projects/prj-ckZoJwdERaWcFHwi" + } + } + }, + "links": { + "self": "/api/v2/team-projects/tprj-TLznAnYdcsD2Dcmm" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/team-projects?filter%5Bproject%5D%5Bid%5D=prj-ckZoJwdERaWcFHwi&page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/team-projects?filter%5Bproject%5D%5Bid%5D=prj-ckZoJwdERaWcFHwi&page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/team-projects?filter%5Bproject%5D%5Bid%5D=prj-ckZoJwdERaWcFHwi&page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } +} +``` + +## Show a Team Access relationship + +`GET /team-projects/:id` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "team-projects"`) | The request was successful | +| [404][] | [JSON API error object][] | Team access not found or user unauthorized to perform action | + +| Parameter | Description | +| --------- | ---------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the team/project relationship. Obtain this from the [list team access action](#list-team-access-to-a-project) described above. | + +As mentioned in [Add Team Access to a Project](#add-team-access-to-a-project) and [Update to a Project](#update-team-access-to-a-project), several permission attributes are not editable unless you set `access` to `custom`. If you set `access` to `read`, `plan`, `write`, or `admin`, certain attributes are read-only and reflect the _implicit permissions_ granted to the current access level. + +For example, if you set `access` to `read`, the implicit permission level for project settings and workspace run is "read". Conversely, if you set the access level to `admin`, the implicit permission level for the project settings is "delete", while the workspace runs permission is "apply". + +Several permission attributes are not editable unless `access` is set to `custom`. When access is `read`, `plan`, `write`, or `admin`, these attributes are read-only and reflect the implicit permissions granted to the current access level. + +For example, when access is `read`, the implicit level for the project settings and workspace runs permissions are "read". Conversely, when the access level is `admin`, the implicit level for the project settings is "delete" and the workspace runs permission is "apply". To see all of the implied permissions at different access levels, see [Implied Custom Permission Levels](#implied-custom-permission-levels). + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/team-projects/tprj-s68jV4FWCDwWvQq8 +``` + +### Sample Response + +```json +{ + "data": { + "id": "tprj-TLznAnYdcsD2Dcmm", + "type": "team-projects", + "attributes": { + "access": "read", + "project-access": { + "settings": "read", + "teams": "none" + }, + "workspace-access": { + "create": false, + "move": false, + "locking": false, + "delete": false, + "runs": "read", + "variables": "read", + "state-versions": "read", + "sentinel-mocks": "none", + "run-tasks": false + } + }, + "relationships": { + "team": { + "data": { + "id": "team-KpibQGL5GqRAWBwT", + "type": "teams" + }, + "links": { + "related": "/api/v2/teams/team-KpibQGL5GqRAWBwT" + } + }, + "project": { + "data": { + "id": "prj-ckZoJwdERaWcFHwi", + "type": "projects" + }, + "links": { + "related": "/api/v2/projects/prj-ckZoJwdERaWcFHwi" + } + } + }, + "links": { + "self": "/api/v2/team-projects/tprj-TLznAnYdcsD2Dcmm" + } + } +} +``` + +## Add Team Access to a Project + +`POST /team-projects` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | ---------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "team-projects"`) | The request was successful | +| [404][] | [JSON API error object][] | Project or Team not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------- | ------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"team-projects"`. | +| `data.attributes.access` | string | | The type of access to grant. Valid values are `read`, `write`, `maintain`, `admin`, or `custom`. | +| `data.relationships.project.data.type` | string | | Must be `projects`. | +| `data.relationships.project.data.id` | string | | The project ID to which the team is to be added. | +| `data.relationships.team.data.type` | string | | Must be `teams`. | +| `data.relationships.team.data.id` | string | | The ID of the team to add to the project. | +| `data.attributes.project-access.settings` | string | "read" | If `access` is `custom`, the permission to grant for the project's settings. Can only be used when `access` is `custom`. Valid values include `read`, `update`, or `delete`. | +| `data.attributes.project-access.teams` | string | "none" | If `access` is `custom`, the permission to grant for the project's teams. Can only be used when `access` is `custom`. Valid values include `none`, `read`, or `manage`. | +| `data.attributes.workspace-access.runs` | string | "read" | If `access` is `custom`, the permission to grant for the project's workspaces' runs. Can only be used when `access` is `custom`. Valid values include `read`, `plan`, or `apply`. | +| `data.attributes.workspace-access.sentinel-mocks` | string | "none" | If `access` is `custom`, the permission to grant for the project's workspaces' Sentinel mocks. Can only be used when `access` is `custom`. Valid values include `none`, or `read`. | +| `data.attributes.workspace-access.state-versions` | string | "none" | If `access` is `custom`, the permission to grant for the project's workspaces state versions. Can only be used when `access` is `custom`. Valid values include `none`, `read-outputs`, `read`, or `write`. | +| `data.attributes.workspace-access.variables` | string | "none" | If `access` is `custom`, the permission to grant for the project's workspaces' variables. Can only be used when `access` is `custom`. Valid values include `none`, `read`, or `write`. | +| `data.attributes.workspace-access.create` | boolean | false | If `access` is `custom`, this permission allows the team to create workspaces in the project. | +| `data.attributes.workspace-access.locking` | boolean | false | If `access` is `custom`, the permission granting the ability to manually lock or unlock the project's workspaces. Can only be used when `access` is `custom`. | +| `data.attributes.workspace-access.delete` | boolean | false | If `access` is `custom`, the permission granting the ability to delete the project's workspaces. Can only be used when `access` is `custom`. | +| `data.attributes.workspace-access.move` | boolean | false | If `access` is `move`, this permission allows the team to move workspaces into and out of the project. The team must also have permissions to the project(s) receiving the the workspace(s). | +| `data.attributes.workspace-access.run-tasks` | boolean | false | If `access` is `custom`, this permission allows the team to manage run tasks within the project's workspaces. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "access": "read" + }, + "relationships": { + "project": { + "data": { + "type": "projects", + "id": "prj-ckZoJwdERaWcFHwi" + } + }, + "team": { + "data": { + "type": "teams", + "id": "team-xMGyoUhKmTkTzmAy" + } + } + }, + "type": "team-projects" + } +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/team-projects +``` + +### Sample Response + +```json +{ + "data": { + "id": "tprj-WbG7p5KnT7S7HZqw", + "type": "team-projects", + "attributes": { + "access": "read", + "project-access": { + "settings": "read", + "teams": "none" + }, + "workspace-access": { + "create": false, + "move": false, + "locking": false, + "runs": "read", + "variables": "read", + "state-versions": "read", + "sentinel-mocks": "none", + "run-tasks": false + } + }, + "relationships": { + "team": { + "data": { + "id": "team-xMGyoUhKmTkTzmAy", + "type": "teams" + }, + "links": { + "related": "/api/v2/teams/team-xMGyoUhKmTkTzmAy" + } + }, + "project": { + "data": { + "id": "prj-ckZoJwdERaWcFHwi", + "type": "projects" + }, + "links": { + "related": "/api/v2/projects/prj-ckZoJwdERaWcFHwi" + } + } + }, + "links": { + "self": "/api/v2/team-projects/tprj-WbG7p5KnT7S7HZqw" + } + } +} +``` + +## Update Team Access to a Project + +`PATCH /team-projects/:id` + +| Status | Response | Reason | +| ------- | ----------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "team-projects"`) | The request was successful | +| [404][] | [JSON API error object][] | Team Access not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +| Parameter | | | Description | +| ------------------------ | ------ | - | ---------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | | | The ID of the team/project relationship. Obtain this from the [list team access action](#list-team-access-to-a-project) described above. | +| `data.attributes.access` | string | | The type of access to grant. Valid values are `read`, `write`, `maintain`, `admin`, or `custom`. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/team-projects/tprj-WbG7p5KnT7S7HZqw +``` + +### Sample Payload + +```json +{ + "data": { + "id": "tprj-WbG7p5KnT7S7HZqw", + "attributes": { + "access": "custom", + "project-access": { + "settings": "delete" + "teams": "manage", + }, + "workspace-access" : { + "runs": "apply", + "sentinel-mocks": "read", + "state-versions": "write", + "variables": "write", + "create": true, + "locking": true, + "delete": true, + "move": true, + "run-tasks": true + } + } + } +} +``` + +### Sample Response + +```json +{ + "data": { + "id": "tprj-WbG7p5KnT7S7HZqw", + "type": "team-projects", + "attributes": { + "access": "custom", + "project-access": { + "settings": "delete" + "teams": "manage", + }, + "workspace-access" : { + "runs": "apply", + "sentinel-mocks": "read", + "state-versions": "write", + "variables": "write", + "create": true, + "locking": true, + "delete": true, + "move": true, + "run-tasks": true + } + }, + "relationships": { + "team": { + "data": { + "id": "team-xMGyoUhKmTkTzmAy", + "type": "teams" + }, + "links": { + "related": "/api/v2/teams/team-xMGyoUhKmTkTzmAy" + } + }, + "project": { + "data": { + "id": "prj-ckZoJwdERaWcFHwi", + "type": "projects" + }, + "links": { + "related": "/api/v2/projects/prj-ckZoJwdERaWcFHwi" + } + } + }, + "links": { + "self": "/api/v2/team-projects/tprj-WbG7p5KnT7S7HZqw" + } + } +} +``` + +## Remove Team Access from a Project + +`DELETE /team-projects/:id` + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------ | +| [204][] | | The Team Access was successfully destroyed | +| [404][] | [JSON API error object][] | Team Access not found or user unauthorized to perform action | + +| Parameter | Description | +| --------- | ---------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the team/project relationship. Obtain this from the [list team access action](#list-team-access-to-a-project) described above. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/team-projects/tprj-WbG7p5KnT7S7HZqw +``` + +## Implied Custom Permission Levels + +As mentioned above, when setting team access levels (`read`, `write`, `maintain`, or `admin`), you can individually set the following permissions if you use the `custom` access level. +The below table lists each access level alongside its implicit custom permission level. If you use the `custom` access level and do not specify a certain permission's level, that permission uses the default value listed below. + +| Permissions | `read` | `write` | `maintain` | `admin ` | `custom` default | +| ------------------------------- | ------ | ------- | ---------- | -------- | ---------------- | +| project-access.settings | "read" | "read" | "read" | "delete" | "read" | +| project-access.teams | "none" | "none" | "none" | "manage" | "none" | +| workspace-access.runs | "read" | "apply" | "apply" | "apply" | "read" | +| workspace-access.sentinel-mocks | "none" | "read" | "read" | "read" | "none" | +| workspace-access.state-versions | "read" | "write" | "write" | "write" | "none" | +| workspace-access.variables | "read" | "write" | "write" | "write" | "none" | +| workspace-access.create | false | false | true | true | false | +| workspace-access.locking | false | true | true | true | false | +| workspace-access.delete | false | false | true | true | false | +| workspace-access.move | false | false | false | true | false | +| workspace-access.run-tasks | false | false | true | true | false | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/projects.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/projects.mdx new file mode 100644 index 000000000..211c0b3ee --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/projects.mdx @@ -0,0 +1,719 @@ +--- +page_title: /projects API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/projects` endpoint to list, show, create, + update, and delete an organization's projects. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +[speculative plans]: /terraform/enterprise/run/remote-operations#speculative-plans + +# Projects API reference + +This topic provides reference information about the projects API. + +The scope of the API includes the following endpoints: + +| Method | Path | Action | +| -------- | ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `POST` | `/organizations/:organization_name/projects` | Call this endpoint to [create a project](#create-a-project). | +| `PATCH` | `/projects/:project_id` | Call this endpoint to [update an existing project](#update-a-project). | +| `GET` | `/organizations/:organization_name/projects` | Call this endpoint to [list existing projects](#list-projects). | +| `GET` | `/projects/:project_id` | Call this endpoint to [show project details](#show-project). | +| `DELETE` | `/projects/:project_id` | Call this endpoint to [delete a project](#delete-a-project). | +| `GET` | `/projects/:project_id/tag-bindings` | Call this endpoint to [list project tag bindings](#list-project-tag-bindings). (For projects, this returns the same result set as the `effective-tag-bindings` endpoint.) | +| `GET` | `/projects/:project_id/effective-tag-bindings` | Call this endpoint to [list project effective tag bindings](#list-project-tag-bindings). (For projects, this returns the same result set as the `tag-bindings` endpoint.) | + +## Requirements + +You must be on a team with one of the **Owners** or **Manage projects** permissions settings enabled to create and manage projects. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for additional information. + +You can also provide an organization API token to call project API endpoints. Refer to [Organization API Tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens) for additional information. + +## Create a Project + +`POST /organizations/:organization_name/projects` + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create the project in. The organization must already exist in the system, and the user must have permissions to create new projects. | + +-> **Note:** Project creation is restricted to the owners team, teams with the "Manage Projects" permission, and the [organization API token](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------------- | --------------- | ------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | none | Must be `"projects"`. | +| `data.attributes.name` | string | | The name of the project. The name can contain letters, numbers, spaces, `-`, and `_`, but cannot start or end with spaces. It must be at least three characters long and no more than 40 characters long. | +| `data.attributes.description` | string | none | Optional. The description of the project. It must be no more than 256 characters long. | +| `data.attributes.auto-destroy-activity-duration` | string | none | Specifies the default for how long each workspace in the project should wait before automatically destroying its infrastructure. You can specify a duration up to four digits that is greater than `0` followed by either a `d` for days or `h` hours. For example, to queue destroy runs after fourteen days of inactivity set `auto-destroy-activity-duration: "14d"`. All future workspaces in this project inherit this default value. Refer to [Automatically destroy inactive workspaces](/terraform/enterprise/projects/managing#automatically-destroy-inactive-workspaces) for additional information. | +| `data.relationships.tag-bindings.data` | list of objects | none | Specifies a list of tags to bind to the project. Workspaces inherit the tags bound to their project. | +| `data.relationships.tag-bindings.data.type` | string | none | Must be `tag-bindings` for each object in the list. | +| `data.relationships.tag-bindings.data.attributes.key` | string | none | Specifies the tag key for each object in the list. | +| `data.relationships.tag-bindings.data.attributes.value` | string | none | Specifies the tag value for each object in the list. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "name": "Test Project", + "description": "An example project for documentation.", + }, + "type": "projects", + "relationships": { + "tag-bindings": { + "data": [ + { + "type": "tag-bindings", + "attributes": { + "key": "environment", + "value": "development" + } + }, + ] + } + } + } +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/projects +``` + +### Sample Response + +```json +{ + "data": { + "id": "prj-WsVcWRr7SfxRci1v", + "type": "projects", + "attributes": { + "name": "Test Project", + "description": "An example project for documentation.", + "permissions": { + "can-update": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-WsVcWRr7SfxRci1v/tag-bindings" + } + }, + "effective-tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-WsVcWRr7SfxRci1v/effective-tag-bindings" + } + } + }, + "links": { + "self": "/api/v2/projects/prj-WsVcWRr7SfxRci1v" + } + } +} +``` + +## Update a Project + +Call the following endpoint to update a project: + +`PATCH /projects/:project_id` + +| Parameter | Description | +| ------------- | ------------------------------- | +| `:project_id` | The ID of the project to update | + +### Request Body + +These PATCH endpoints require a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------------- | --------------- | -------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | none | Must be `"projects"`. | +| `data.attributes.name` | string | existing value | A new name for the project. The name can contain letters, numbers, spaces, `-`, and `_`, but cannot start or end with spaces. It must be at least 3 characters long and no more than 40 characters long. | +| `data.attributes.description` | string | existing value | The new description for the project. It must be no more than 256 characters long. | +| `data.attributes.auto-destroy-activity-duration` | string | none | Specifies how long each workspace in the project should wait before automatically destroying its infrastructure by default. You can specify a duration up to four digits that is greater than `0` followed by either a `d` for days or `h` hours. For example, to queue destroy runs after fourteen days of inactivity set `auto-destroy-activity-duration: "14d"`. When you update this value, all workspaces in the project receive the new value unless you previously configured an override. Refer to [Automatically destroy inactive workspaces](/terraform/enterprise/projects/managing#automatically-destroy-inactive-workspaces) for additional information. | +| `data.relationships.tag-bindings.data` | list of objects | none | Specifies a list of tags to bind to the project. Workspaces inherit the tags bound to their project. | +| `data.relationships.tag-bindings.data.type` | string | none | Must be `tag-bindings` for each object in the list. | +| `data.relationships.tag-bindings.data.attributes.key` | string | none | Specifies the tag key for each object in the list. | +| `data.relationships.tag-bindings.data.attributes.value` | string | none | Specifies the tag value for each object in the list. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "name": "Infrastructure Project" + }, + "type": "projects", + "relationships": { + "tag-bindings": { + "data": [ + { + "type": "tag-bindings", + "attributes": { + "key": "environment", + "value": "staging" + } + } + ] + } + } + } +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/projects/prj-WsVcWRr7SfxRci1v +``` + +### Sample Response + +```json +{ + "data": { + "id": "prj-WsVcWRr7SfxRci1v", + "type": "projects", + "attributes": { + "name": "Infrastructure Project", + "description": null, + "workspace-count": 4, + "team-count": 2, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-create-workspace": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-WsVcWRr7SfxRci1v/tag-bindings" + } + }, + "effective-tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-WsVcWRr7SfxRci1v/effective-tag-bindings" + } + } + }, + "links": { + "self": "/api/v2/projects/prj-WsVcWRr7SfxRci1v" + } + } +} +``` + +## List projects + +This endpoint lists projects in the organization. + +`GET /organizations/:organization_name/projects` + +| Parameter | Description | +| -------------------- | ----------------------------------------------------- | +| `:organization_name` | The name of the organization to list the projects of. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| --------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 projects per page. | +| `q` | **Optional.** A search query string. This query searches projects by name. This search is case-insensitive. If both `q` and `filter[names]` are specified, `filter[names]` will be used. | +| `filter[names]` | **Optional.** If specified, returns the project with the matching name. This filter is case-insensitive. If multiple comma separated values are specified, projects matching any of the names are returned. | +| `filter[permissions][create-workspace]` | **Optional.** If present, returns a list of projects that the authenticated user can create workspaces in. | +| `filter[permissions][update]` | **Optional.** If present, returns a list of projects that the authenticated user can update. | +| `sort` | **Optional.** Allows sorting the organization's projects by `"name"`. Prepending a hyphen to the sort parameter reverses the order. For example, `"-name"` sorts by name in reverse alphabetical order. If omitted, the default sort order is arbitrary but stable. | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/projects +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "prj-W6k9K23oSXRHGpj3", + "type": "projects", + "attributes": { + "name": "Default Project", + "description": null, + "workspace-count": 2, + "team-count": 1, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-create-workspace": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-W6k9K23oSXRHGpj3/tag-bindings" + } + }, + "effective-tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-W6k9K23oSXRHGpj3/effective-tag-bindings" + } + } + }, + "links": { + "self": "/api/v2/projects/prj-W6k9K23oSXRHGpj3" + } + }, + { + "id": "prj-YoriCxAawTMDLswn", + "type": "projects", + "attributes": { + "name": "Infrastructure Project", + "description": null, + "workspace-count": 4, + "team-count": 2, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-create-workspace": true + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-YoriCxAawTMDLswn/tag-bindings" + } + }, + "effective-tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-YoriCxAawTMDLswn/effective-tag-bindings" + } + } + }, + "links": { + "self": "/api/v2/projects/prj-YoriCxAawTMDLswn" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/my-organization/projects?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/my-organization/projects?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/my-organization/projects?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "status-counts": { + "total": 2, + "matching": 2 + }, + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 2 + } + } +} +``` + +## Show project + +`GET /projects/:project_id` + +| Parameter | Description | +| ------------- | -------------- | +| `:project_id` | The project ID | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/projects/prj-WsVcWRr7SfxRci1v +``` + +### Sample Response + +```json +{ + "data": { + "id": "prj-WsVcWRr7SfxRci1v", + "type": "projects", + "attributes": { + "name": "Infrastructure Project", + "description": null, + "workspace-count": 4, + "team-count": 2, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-create-workspace": true + }, + "auto-destroy-activity-duration": "2d" + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-WsVcWRr7SfxRci1v/tag-bindings" + } + }, + "effective-tag-bindings": { + "links": { + "related": "/api/v2/projects/prj-WsVcWRr7SfxRci1v/effective-tag-bindings" + } + } + }, + "links": { + "self": "/api/v2/projects/prj-WsVcWRr7SfxRci1v" + } + } +} +``` + +## Delete a project + +A project cannot be deleted if it contains stacks or workspaces. + +`DELETE /projects/:project_id` + +| Parameter | Description | +| ------------- | ------------------------------- | +| `:project_id` | The ID of the project to delete | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ----------------------------------------------------------------- | +| [204][] | No Content | Successfully deleted the project | +| [403][] | [JSON API error object][] | Not authorized to perform a force delete on the project | +| [404][] | [JSON API error object][] | Project not found, or user unauthorized to perform project delete | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/projects/prj-WsVcWRr7SfxRci1v +``` + +## List project tag bindings + +Call the following endpoints to list the tags bound to a project. + +- `GET /projects/:project_id/tag-bindings`: Lists the set of tags associated with the project. Tags set on the project are inherited by its workspaces. + +| Parameter | Description | +| ------------- | ---------------------- | +| `:project_id` | The ID of the project. | + +### Sample request + +The following request returns all tags bound to a project with the ID +`prj-WsVcWRr7SfxRci1v`. + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/projects/prj-WsVcWRr7SfxRci1v/tag-bindings +``` + +### Sample response + +```json +{ + "data": [ + { + "type": "tag-bindings", + "attributes": { + "key": "added", + "value": "new", + "created-at": "2024-11-20T00:04:47.948Z" + } + }, + { + "type": "tag-bindings", + "attributes": { + "key": "aww", + "value": "aww", + "created-at": "2024-11-20T00:04:47.948Z" + } + } + ] +} +``` + +## Add or update tag bindings on a project + +This endpoint can be used to add key-value Tag Bindings to an existing resource, or to update +existing Tag Binding values on the resource. It cannot be used to remove any tag bindings from the resource. +This endpoint is useful when you want to ensure a modification is additive. + +Tag Bindings have special constraints: + +- Up to 10 tags can be applied to a project +- All workspaces belonging to the project will inherit the Tag Bindings applied to this project. +- Keys must be no more than 128 characters, allowing all alphanumeric characters plus the symbols `_`, `.`, `=`, `+`, `-`, `@`, `:`. +- Values allow the same characters, but can be up to 256 characters. +- Certain key prefixes, including `hc:` and `hcp:` are not allowed. + +`PATCH /projects/:project_id/tag-bindings` + +| Parameter | Description | +| ------------- | ------------------------------- | +| `:project_id` | The ID of the project to update | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +It is important to note that for each data item, `type`, as well as `attributes.key` is required. + +| Key path | Type | Default | Description | +| ------------------------- | ------ | ------- | ------------------------------------- | +| `data[].type` | string | | Must be `"tag-bindings"`. | +| `data[].attributes.key` | string | | The key of the tag to add or update. | +| `data[].attributes.value` | string | | The name of the tag to add or update. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "tag-bindings", + "attributes": { + "key": "costcenter", + "value": "123" + } + }, + { + "type": "tag-bindings", + "attributes": { + "key": "bar", + "value": "baz" + } + } + ] +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/projects/prj-82d2281aa259ba09/tag-bindings +``` + +### Sample Response + +Example status code 200 response after updating tag bindings: + + + +```json +{ + "data": [ + { + "id": "tb-e4a5847b2cf06559", + "type": "tag-bindings", + "attributes": { + "key": "costcenter", + "value": "123" + } + }, + { + "id": "tb-97ce954636f93a6c", + "type": "tag-bindings", + "attributes": { + "key": "bar", + "value": "baz" + } + } + ] +} +``` + + + +## Move workspaces into a project + +This endpoint allows you to move one or more workspaces into a project. You must have permission to move workspaces on +the destination project as well as any source project(s). If you are not authorized to move any of the workspaces in the +request, or if any workspaces in the request are not found, then no workspaces will be moved. + +`POST /projects/:project_id/relationships/workspaces` + +| Parameter | Description | +| ------------- | --------------------------------- | +| `:project_id` | The ID of the destination project | + +This POST endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ---------------------------------------------------------- | +| `data[].type` | string | | Must be `"workspaces"` | +| `data[].id` | string | | The ids of workspaces to move into the destination project | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | -------------------------------------------------------------------------------------------------------- | +| [204][] | No Content | Successfully moved workspace(s) | +| [403][] | [JSON API error object][] | Workspace(s) not found, or user is not authorized to move all workspaces out of their current project(s) | +| [404][] | [JSON API error object][] | Project not found, or user unauthorized to move workspaces into project | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "workspaces", + "id": "ws-AQEct2XFuH4HBsmS" + } + ] +} + +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/projects/prj-zXm4y2BjeGPgHtkp/relationships/workspaces +``` + +### Sample Error Response + +```json +{ + "errors": [ + { + "status": "403", + "title": "forbidden", + "detail": "Workspace(s) not found, or you are not authorized to move them: ws-AQEct2XFuH4HBmS" + } + ] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/reserved-tag-keys.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/reserved-tag-keys.mdx new file mode 100644 index 000000000..51655fd03 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/reserved-tag-keys.mdx @@ -0,0 +1,271 @@ +--- +page_title: /reserved-tag-keys API reference for Terraform Enterprise +description: >- + Use the `/reserved-tag-keys` API endpoints to reserve tag keys that have + special meaning for your organization. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +[speculative plans]: /terraform/enterprise/run/remote-operations#speculative-plans + +# Reserved tag keys API reference + +Use the `/reserved-tag-keys` API endpoints to define and manage tag keys that +have special meaning for your organization. Reserving tag keys enable project +and workspace managers to follow a consistent tagging strategy across the +organization. You can also use them to provide project managers with a means of +disabling overrides for inherited tags. + +The following table describes the available endpoints: + +| Method | Path | Description | +| -------- | ----------------------------------------------------- | --------------------------------------------------------------------------------- | +| `GET` | `/organizations/:organization_name/reserved-tag-keys` | [List reserved tag keys](#list-reserved-tag-keys) for the specified organization. | +| `POST` | `/organizations/:organization_name/reserved-tag-keys` | [Add a reserved tag key](#add-a-reserved-tag-key) to the specified organization. | +| `PATCH` | `/reserved-tags/:reserved_tag_key_id` | [Update a reserved tag key](#add-a-reserved-tag-value) with the specified ID. | +| `DELETE` | `/reserved-tags/:reserved_tag_key_id` | [Delete a reserved tag key](#delete-a-reserved-tag-key) with the specified ID. | + +## Path parameters + +The `/reserved-tag-keys/` API endpoints require the following path parameters: + +| Parameter | Description | +| ---------------------- | ---------------------------------------------------------- | +| `:reserved_tag_key_id` | The external ID of the reserved tag key. | +| `:organization_name` | The name of the organization containing the reserved tags. | + +## List reserved tag keys + +`GET /organizations/:organization_name/reserved-tag-keys` + +### Sample payload + +This endpoint does not require a payload. + +### Sample request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/organizations/my-organization/reserved-tag-keys +``` + +### Sample response + +```json +{ + "data": [ + { + "id": "rtk-jjnTseo8NN1jACbk", + "type": "reserved-tag-keys", + "attributes": { + "key": "environment", + "disable-overrides": false, + "created-at": "2024-08-13T23:06:42.523Z", + "updated-at": "2024-08-13T23:06:42.523Z" + } + }, + { + "id": "rtk-F1s7kKUShAQxhA1b", + "type": "reserved-tag-keys", + "attributes": { + "key": "cost-center", + "disable-overrides": false, + "created-at": "2024-08-13T23:06:51.445Z", + "updated-at": "2024-08-13T23:06:51.445Z" + } + }, + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/my-organization/reserved-tag-keys?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/my-organization/reserved-tag-keys?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/my-organization/reserved-tag-keys?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 2 + } + } +} + +``` + +## Create a reserved tag key + +`POST /organizations/:organization_name/reserved-tag-keys` + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------------------------------ | ------- | ------- | --------------------------------- | +| `data.type` | string | none | Must be `reserved-tag-keys`. | +| `data.attributes.key` | string | none | The key targeted by this reserved | +| tag key. | | | | +| `data.attributes.disable-overrides` | boolean | none | If `true`, disables | +| overriding inherited tags with the specified key at the workspace level. | | | | + +### Sample payload + +```json +{ + "data": { + "type": "reserved-tag-keys", + "attributes": { + "key": "environment", + "disable-overrides": false + } + } +} +``` + +### Sample request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/organizations/${ORGANIZATION_NAME}/reserved-tag-keys +``` + +### Sample response + +```json +{ + "data": { + "id": "rtk-Tj86UdGahKGDiYXY", + "type": "reserved-tag-keys", + "attributes": { + "key": "environment", + "disable-overrides": false, + "created-at": "2024-09-04T05:02:06.794Z", + "updated-at": "2024-09-04T05:02:06.794Z" + } + } +} +``` + +## Update a reserved tag key + +`PATCH /reserved-tags/:reserved_tag_key_id` + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------------------------------ | ------- | ------- | --------------------------------- | +| `data.type` | string | none | Must be `reserved-tag-keys`. | +| `data.attributes.key` | string | none | The key targeted by this reserved | +| tag key. | | | | +| `data.attributes.disable-overrides` | boolean | none | If `true`, disables | +| overriding inherited tags with the specified key at the workspace level. | | | | + +### Sample payload + +```json +{ + "data": { + "id": "rtk-Tj86UdGahKGDiYXY", + "type": "reserved-tag-keys", + "attributes": { + "key": "env", + "disable-overrides": true, + "created-at": "2024-09-04T05:02:06.794Z", + "updated-at": "2024-09-04T05:02:06.794Z" + } + } +} +``` + +### Sample request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + https://app.terraform.io/api/v2/reserved-tags/${RESERVED_TAG_ID} +``` + +### Sample response + +```json +{ + "data": { + "id": "rtk-zMtWLDftAjY3b5pA", + "type": "reserved-tag-keys", + "attributes": { + "key": "env", + "disable-overrides": true, + "created-at": "2024-09-04T05:05:10.449Z", + "updated-at": "2024-09-04T05:05:13.486Z" + } + } +} +``` + +## Delete a reserved tag key + +`DELETE /reserved-tags/:reserved_tag_key_id` + +### Sample payload + +This endpoint does not require a payload. + +### Sample request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/reserved-tags/rtk-zMtWLDftAjY3b5pA +``` + +### Sample response + +This endpoint does not return a response body. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-task-stages-and-results.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-task-stages-and-results.mdx new file mode 100644 index 000000000..40c8a1f25 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-task-stages-and-results.mdx @@ -0,0 +1,366 @@ +--- +page_title: /task-stages API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/task-stages` endpoint to read run tasks + and their results, and override run task stages. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API documents]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +[run]: /terraform/enterprise/run/states + +# Run task stages and results API reference + +HCP Terraform uses run task stages and run task results to track [run task](/terraform/enterprise/workspaces/settings/run-tasks) execution. + + + +@include 'tfc-package-callouts/run-tasks.mdx' + + + +When HCP Terraform creates a [run][], it reads the run tasks associated to the workspace. Each run task in the workspace is configured to begin during a specific [run stage](/terraform/enterprise/run/states). HCP Terraform creates a run task stage object for each run stage that triggers run tasks. You can configure run tasks during the [Pre-Plan Stage](/terraform/enterprise/run/states#the-pre-plan-stage), [Post-Plan Stage](/terraform/enterprise/run/states#the-post-plan-stage), [Pre-Apply Stage](/terraform/enterprise/run/states#the-pre-apply-stage) and [Post-Apply Stage](/terraform/enterprise/run/states#the-post-apply-stage). + +Run task stages then create a run task result for each run task. For example, a workspace has two run tasks called `alpha` and `beta`. For each run, HCP Terraform creates one run task stage called `post-plan`. That run task stage has two run task results: one for the `alpha` run task and one for the `beta` run task. + +This page lists the endpoints to retrieve run task stages and run task results. Refer to the [Run Tasks API](/terraform/enterprise/api-docs/run-tasks/run-tasks) for endpoints to create and manage run tasks within HCP Terraform. Refer to the [Run Tasks Integration API](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) for endpoints to build custom run tasks for the HCP Terraform ecosystem. + +## Attributes + +### Run Task Stage Status + +The run task stage status is found in `data.attributes.status`, and you can reference the following list of possible values. + +| Status | Description | +| ------------------- | -------------------------------------------------------------------------------------------------------------------------------------- | +| `pending` | The initial status of a run task stage after creation. | +| `running` | The run task stage is executing one or more tasks, which have not yet completed. | +| `passed` | All of the run task results in the stage passed. | +| `failed` | One more results in the run task stage failed. | +| `awaiting_override` | The task stage is waiting for user input. Once a user manually overrides the failed run tasks, the run returns to the `running` state. | +| `errored` | The run task stage has errored. | +| `canceled` | The run task stage has been canceled. | +| `unreachable` | The run task stage could not be executed. | + +### Run Task Result Status + +The run task result status is found in `data.attributes.status`, and you can reference the following list of possible values. + +| Status | Description | +| ------------- | --------------------------------------------------------------------- | +| `pending` | The initial status of a run task result after creation. | +| `running` | The associated run task is begun execution and has not yet completed. | +| `passed` | The associated run task executed and returned a passing result. | +| `failed` | The associated run task executed and returned a failed result. | +| `errored` | The associated run task has errored during execution. | +| `canceled` | The associated run task execution has been canceled. | +| `unreachable` | The associated run task could not be executed. | + +## List the Run Task Stages in a Run + +`GET /runs/:run_id/task-stages` + +| Parameter | Description | +| --------- | ----------------------------------- | +| `run_id` | The run ID to list task stages for. | + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------------------- | +| [200][] | Array of [JSON API documents][] (`type: "task-stages"`) | Successfully listed task-stages | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | -------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 runs per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/runs/run-XdgtChJuuUwLoSmw/task-stages +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "ts-rL5ZsuwfjqfPJcdi", + "type": "task-stages", + "attributes": { + "status": "passed", + "stage": "post_plan", + "status-timestamps": { + "passed-at": "2022-06-08T20:32:12+08:00", + "running-at": "2022-06-08T20:32:11+08:00" + }, + "created-at": "2022-06-08T12:31:56.94Z", + "updated-at": "2022-06-08T12:32:12.315Z" + }, + "relationships": { + "run": { + "data": { + "id": "run-XdgtChJuuUwLoSmw", + "type": "runs" + } + }, + "task-results": { + "data": [ + { + "id": "taskrs-EmnmsEDL1jgd1GTP", + "type": "task-results" + } + ] + }, + "policy-evaluations":{ + "data":[ + { + "id":"poleval-iouaha9KLgGWkBRQ", + "type":"policy-evaluations" + } + ] + } + }, + "links": { + "self": "/api/v2/task-stages/ts-rL5ZsuwfjqfPJcdi" + } + } + ] +} +``` + +## Show a Run Task Stage + +`GET /task-stages/:task_stage_id` + +| Parameter | Description | +| ---------------- | ----------------------------- | +| `:task_stage_id` | The run task stage ID to get. | + +This endpoint shows details of a specific task stage. + +| Status | Response | Reason | +| ------- | --------------------------------------------- | ------------------------------------------- | +| [200][] | [JSON API document][] (`type: "task-stages"`) | Success | +| [404][] | [JSON API error object][] | Task stage not found or user not authorized | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/task-stages/ts-rL5ZsuwfjqfPJcdi +``` + +### Sample Response + +```json +{ + "data": { + "id": "ts-rL5ZsuwfjqfPJcdi", + "type": "task-stages", + "attributes": { + "status": "passed", + "stage": "post_plan", + "status-timestamps": { + "passed-at": "2022-06-08T20:32:12+08:00", + "running-at": "2022-06-08T20:32:11+08:00" + }, + "created-at": "2022-06-08T12:31:56.94Z", + "updated-at": "2022-06-08T12:32:12.315Z" + }, + "relationships": { + "run": { + "data": { + "id": "run-XdgtChJuuUwLoSmw", + "type": "runs" + } + }, + "task-results": { + "data": [ + { + "id": "taskrs-EmnmsEDL1jgd1GTP", + "type": "task-results" + } + ] + }, + "policy-evaluations":{ + "data":[ + { + "id":"poleval-iouaha9KLgGWkBRQ", + "type":"policy-evaluations" + } + ] + } + }, + "links": { + "self": "/api/v2/task-stages/ts-rL5ZsuwfjqfPJcdi" + } + } +} +``` + +## Show a Run Task Result + +`GET /task-results/:task_result_id` + +| Parameter | Description | +| ----------------- | ------------------------------ | +| `:task_result_id` | The run task result ID to get. | + +This endpoint shows the details for a specific run task result. + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | -------------------------------------------- | +| [200][] | [JSON API document][] (`type: "task-results"`) | Success | +| [404][] | [JSON API error object][] | Task result not found or user not authorized | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/task-results/taskrs-EmnmsEDL1jgd1GZz +``` + +### Sample Response + +```json +{ + "data": { + "id": "taskrs-EmnmsEDL1jgd1GZz", + "type": "task-results", + "attributes": { + "message": "No issues found.\nSeverity threshold is set to low.", + "status": "passed", + "status-timestamps": { + "passed-at": "2022-06-08T20:32:12+08:00", + "running-at": "2022-06-08T20:32:11+08:00" + }, + "url": "https://external.service/project/task-123abc", + "created-at": "2022-06-08T12:31:56.954Z", + "updated-at": "2022-06-08T12:32:12.27Z", + "task-id": "task-b6MaHZmGopHDtqhn", + "task-name": "example-task", + "task-url": "https://external.service/task-123abc", + "stage": "post_plan", + "is-speculative": false, + "workspace-task-id": "wstask-258juqenQeWb3DZz", + "workspace-task-enforcement-level": "mandatory" + }, + "relationships": { + "task-stage": { + "data": { + "id": "ts-rL5ZsuwfjqfPJczZ", + "type": "task-stages" + } + } + }, + "links": { + "self": "/api/v2/task-results/taskrs-EmnmsEDL1jgd1GZz" + } + } +} +``` + +## Available Related Resources + +### Task Stage + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource | Description | +| -------------------- | ---------------------------------------------------------- | +| `run` | Information about the associated run. | +| `run.workspace` | Information about the associated workspace. | +| `task-results` | Information about the results for a task-stage. | +| `policy-evaluations` | Information about the policy evaluations for a task-stage. | + +## Override a Task Stage + +`POST /task-stages/:task_stage_id/actions/override` + +| Parameter | Description | +| ---------------- | ------------------------------------- | +| `:task_stage_id` | The ID of the task stage to override. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/task-stages/ts-rL5ZsuwfjqfPJcdi/actions/override +``` + +### Sample Response + +```json +{ + "data":{ + "id":"ts-F7MumZQcJzVh1ZZk", + "type":"task-stages", + "attributes":{ + "status":"running", + "stage":"post_plan", + "status-timestamps":{ + "running-at":"2022-09-21T06:36:54+00:00", + "awaiting-override-at":"2022-09-21T06:31:50+00:00" + }, + "created-at":"2022-09-21T06:29:44.632Z", + "updated-at":"2022-09-21T06:36:54.952Z", + "permissions":{ + "can-override-policy":true, + "can-override-tasks":false, + "can-override":true + }, + "actions":{ + "is-overridable":false + } + }, + "relationships":{ + "run":{ + "data":{ + "id":"run-K6N4BAz8NfUyR2QB", + "type":"runs" + } + }, + "task-results":{ + "data":[ + + ] + }, + "policy-evaluations":{ + "data":[ + { + "id":"poleval-atNKxwvjYy4Gwk3k", + "type":"policy-evaluations" + } + ] + } + }, + "links":{ + "self":"/api/v2/task-stages/ts-F7MumZQcJzVh1ZZk" + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-tasks-integration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-tasks-integration.mdx new file mode 100644 index 000000000..4a285f56e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-tasks-integration.mdx @@ -0,0 +1,296 @@ +--- +page_title: Run tasks integration API for Terraform Enterprise +description: >- + Use Terraform Enterprise API's run task integration API to trigger run tasks + at specific run phases and learn how to read run task responses. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Run tasks integration API + +[Run tasks](/terraform/enterprise/workspaces/settings/run-tasks) allow HCP Terraform to interact with external systems at specific points in the HCP Terraform run lifecycle. +This page lists the API endpoints used to trigger a run task and the expected response from the integration. + + + +@include 'tfc-package-callouts/run-tasks.mdx' + + + +Refer to [run tasks](/terraform/enterprise/api-docs/run-tasks/run-tasks) for the API endpoints to create and manage run tasks within HCP Terraform. You can also access a complete list of all run tasks in the [Terraform Registry](https://registry.terraform.io/browse/run-tasks). + +## Run Task Request + +When a run reaches the appropriate phase and a run task is triggered, HCP Terraform will send a request to the run task's URL. +The service receiving the run task request should respond with `200 OK`, or HCP Terraform will retry to trigger the run task. + +`POST :url` + +| Parameter | Description | +| --------- | ------------------------------------------------------- | +| `:url` | The URL configured in the run task to send requests to. | + +| Status | Response | Reason | +| ------- | ---------- | --------------------------------- | +| [200][] | No Content | Successfully submitted a run task | + +### Request Body + +The POST request submits a JSON object with the following properties as a request payload. + +#### Common Properties + +All request payloads contain the following properties. + +| Key path | Type | Values | Description | +| ------------------------------------ | ------- | -------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `payload_version` | integer | `1` | Schema version of the payload. Only `1` is supported. | +| `stage` | string | `pre_plan`, `post_plan`, `pre_apply`, `post_apply` | The [run stage](/terraform/enterprise/run/states) when HCP Terraform triggers the run task. | +| `access_token` | string | | Bearer token to use when calling back to HCP Terraform. | +| `capabilities` | object | | A map of the capabilities that the caller supports. | +| `capabilities.outcomes` | bool | | A flag indicating the caller accepts detailed run task outcomes. | +| `configuration_version_download_url` | string | | The URL to [download the configuration version](/terraform/enterprise/api-docs/configuration-versions#download-configuration-files). This is `null` if the configuration version is not available to download. | +| `configuration_version_id` | string | | The ID of the [configuration version](/terraform/enterprise/api-docs/configuration-versions) for the run. | +| `is_speculative` | bool | | Whether the task is part of a [speculative run](/terraform/enterprise/run/remote-operations#speculative-plans). | +| `organization_name` | string | | Name of the organization the task is configured within. | +| `run_app_url` | string | | URL within HCP Terraform to the run. | +| `run_created_at` | string | | When the run was started. | +| `run_created_by` | string | | Who created the run. | +| `run_id` | string | | Id of the run this task is part of. | +| `run_message` | string | | Message that was associated with the run. | +| `task_result_callback_url` | string | | URL that should called back with the result of this task. | +| `task_result_enforcement_level` | string | `mandatory`, `advisory` | Enforcement level for this task. | +| `task_result_id` | string | | ID of task result within HCP Terraform. | +| `vcs_branch` | string | | Repository branch that the workspace executes from. This is `null` if the workspace does not have a VCS repository. | +| `vcs_commit_url` | string | | URL to the commit that triggered this run. This is `null` if the workspace does not a VCS repository. | +| `vcs_pull_request_url` | string | | URL to the Pull Request/Merge Request that triggered this run. This is `null` if the run was not triggered. | +| `vcs_repo_url` | string | | URL to the workspace's VCS repository. This is `null` if the workspace does not have a VCS repository. | +| `workspace_app_url` | string | | URL within HCP Terraform to the workspace. | +| `workspace_id` | string | | Id of the workspace the task is associated with. | +| `workspace_name` | string | | Name of the workspace. | +| `workspace_working_directory` | string | | The working directory specified in the run's [workspace settings](/terraform/enterprise/workspaces/settings#terraform-working-directory). | + +#### Post-Plan, Pre-Apply, and Post-Apply Properties + +Requests with `stage` set to `post_plan`, `pre_apply` or `post_apply` contain the following additional properties. + +| Key path | Type | Values | Description | +| ------------------- | ------ | ------ | --------------------------------------------------------- | +| `plan_json_api_url` | string | | The URL to retrieve the JSON Terraform plan for this run. | + +### Sample Payload + +```json +{ + "payload_version": 1, + "stage": "post_plan", + "access_token": "4QEuyyxug1f2rw.atlasv1.iDyxqhXGVZ0ykes53YdQyHyYtFOrdAWNBxcVUgWvzb64NFHjcquu8gJMEdUwoSLRu4Q", + "capabilities": { + "outcomes": true + }, + "configuration_version_download_url": "https://app.terraform.io/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/download", + "configuration_version_id": "cv-ntv3HbhJqvFzamy7", + "is_speculative": false, + "organization_name": "hashicorp", + "plan_json_api_url": "https://app.terraform.io/api/v2/plans/plan-6AFmRJW1PFJ7qbAh/json-output", + "run_app_url": "https://app.terraform.io/app/hashicorp/my-workspace/runs/run-i3Df5to9ELvibKpQ", + "run_created_at": "2021-09-02T14:47:13.036Z", + "run_created_by": "username", + "run_id": "run-i3Df5to9ELvibKpQ", + "run_message": "Triggered via UI", + "task_result_callback_url": "https://app.terraform.io/api/v2/task-results/5ea8d46c-2ceb-42cd-83f2-82e54697bddd/callback", + "task_result_enforcement_level": "mandatory", + "task_result_id": "taskrs-2nH5dncYoXaMVQmJ", + "vcs_branch": "main", + "vcs_commit_url": "https://github.com/hashicorp/terraform-random/commit/7d8fb2a2d601edebdb7a59ad2088a96673637d22", + "vcs_pull_request_url": null, + "vcs_repo_url": "https://github.com/hashicorp/terraform-random", + "workspace_app_url": "https://app.terraform.io/app/hashicorp/my-workspace", + "workspace_id": "ws-ck4G5bb1Yei5szRh", + "workspace_name": "tfr_github_0", + "workspace_working_directory": "/terraform" +} +``` + +### Request Headers + +The POST request submits the following properties as the request headers. + +| Name | Value | Description | +| ---------------------- | ------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `Content-Type` | `application/json` | Specifies the type of data in the request body | +| `User-Agent` | `TFC/1.0 (+https://app.terraform.io; TFC)` | Identifies the request is coming from HCP Terraform | +| `X-TFC-Task-Signature` | string | If the run task is configured with an [HMAC Key](/terraform/enterprise/integrations/run-tasks#securing-your-run-task), this header contains the signed SHA512 sum of the request payload using the configured HMAC key. Otherwise, this is an empty string. | + +## Run Task Callback + +While a run task runs, it may send progressive updates to HCP Terraform with a `running` status. Once an integrator determines that Terraform supports detailed run task outcomes, they can send these outcomes by appending to the run task's callback payload. + +Once the external integration fulfills the request, that integration must call back into HCP Terraform with the overall result of either `passed` or `failed`. Terraform expects this callback within 10 minutes, or the request is considered errored. + +You can send outcomes with a status of `running`, `passed`, or `failed`, but it is a good practice only to send outcomes when a run task is `running`. + +`PATCH :callback_url` + +| Parameter | Description | +| --------------- | ----------------------------------------------------------------------------------------------------------- | +| `:callback_url` | The `task_result_callback_url` specified in the run task request. Typically `/task-results/:guid/callback`. | + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------------------------------------------------------------------------------------------- | +| [200][] | No Content | Successfully submitted a run task result | +| [401][] | [JSON API error object][] | Not authorized to perform action | +| [422][] | [JSON API error object][] | Invalid response payload. This could be caused by invalid attributes, or sending a status that is not accepted. | + +### Request Body + +The PATCH request submits a JSON object with the following properties as a request payload. This payload is also described in the [JSON API schema for run task results](https://github.com/hashicorp/terraform-docs-common/blob/main/website/public/schema/run-tasks/runtask-result.json). + +| Key path | Type | Description | +| ----------------------------- | ------ | --------------------------------------------------------------------------------- | +| `data.type` | string | Must be `"task-results"`. | +| `data.attributes.status` | string | The current status of the task. Only `passed`, `failed` or `running` are allowed. | +| `data.attributes.message` | string | (Recommended, but optional) A short message describing the status of the task. | +| `data.attributes.url` | string | (Optional) A URL where users can obtain more information about the task. | +| `relationships.outcomes.data` | array | (Recommended, but optional) A collection of detailed run task outcomes. | + +Status values other than passed, failed, or running return an error. Both the passed and failed statuses represent a final state for a run task. The running status allows one or more partial updates until the task has reached a final state. + +```json +{ + "data": { + "type": "task-results", + "attributes": { + "status": "passed", + "message": "4 passed, 0 skipped, 0 failed", + "url": "https://external.service.dev/terraform-plan-checker/run-i3Df5to9ELvibKpQ" + }, + "relationships": { + "outcomes": { + "data": [...] + } + } + } +} +``` + +#### Outcomes Payload Body + +A run task result may optionally contain one or more detailed outcomes, which improves result visibility and content in the HCP Terraform user interface. The following attributes define the outcome. + +| Key path | Type | Description | +| ------------------ | ----------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `outcome-id` | string | A partner supplied identifier for this outcome. | +| `description` | string | A one-line description of the result. | +| `body` | string | (Optional) A detailed message for the result in Markdown format. It is recommended to keep it under 1MB, with a maximum allowable limit of 5MB. | +| `url` | string | (Optional) A URL that a user can navigate to for more information about this result. | +| `tags` | object | (Optional) An object containing tag arrays, named by the property key. | +| `tags.key` | string | The two or three word name of the header tag. [Special handling](#severity-and-status-tags) is given to `severity` and `status` keys. | +| `tags.key[].label` | string | The text value of the tag. | +| `tags.key[].level` | enum string | (Optional) The error level for the tag. Defaults to `none`, but accepts `none`, `info`, `warning`, or `error`. For levels other than `none`, labels render with a color and icon for that level. | + +##### Severity and Status Tags + +Run task outcomes with tags named "severity" or "status" are enriched within the outcomes display list in HCP Terraform, enabling an earlier response to issues with severity and status. + +```json +{ + "type": "task-result-outcomes", + "attributes": { + "outcome-id": "PRTNR-CC-TF-127", + "description": "ST-2942: S3 Bucket will not enforce MFA login on delete requests", + "tags": { + "Status": [ + { + "label": "Denied", + "level": "error" + } + ], + "Severity": [ + { + "label": "High", + "level": "error" + }, + { + "label": "Recoverable", + "level": "info" + } + ], + "Cost Centre": [ + { + "label": "IT-OPS" + } + ] + }, + "body": "# Resolution for issue ST-2942\n\n## Impact\n\nFollow instructions in the [AWS S3 docs](https://docs.aws.amazon.com/AmazonS3/latest/userguide/MultiFactorAuthenticationDelete.html) to manually configure the MFA setting.\n—-- Payload truncated —--", + "url": "https://external.service.dev/result/PRTNR-CC-TF-127" + } +} +``` + +##### Complete Callback Payload Example + +The example below shows a complete payload explaining the data structure of a callback payload, including all the necessary fields. + +```json +{ + "data": { + "type": "task-results", + "attributes": { + "status": "failed", + "message": "0 passed, 0 skipped, 1 failed", + "url": "https://external.service.dev/terraform-plan-checker/run-i3Df5to9ELvibKpQ" + }, + "relationships": { + "outcomes": { + "data": [ + { + "type": "task-result-outcomes", + "attributes": { + "outcome-id": "PRTNR-CC-TF-127", + "description": "ST-2942: S3 Bucket will not enforce MFA login on delete requests", + "tags": { + "Status": [ + { + "label": "Denied", + "level": "error" + } + ], + "Severity": [ + { + "label": "High", + "level": "error" + }, + { + "label": "Recoverable", + "level": "info" + } + ], + "Cost Centre": [ + { + "label": "IT-OPS" + } + ] + }, + "body": "# Resolution for issue ST-2942\n\n## Impact\n\nFollow instructions in the [AWS S3 docs](https://docs.aws.amazon.com/AmazonS3/latest/userguide/MultiFactorAuthenticationDelete.html) to manually configure the MFA setting.\n—-- Payload truncated —--", + "url": "https://external.service.dev/result/PRTNR-CC-TF-127" + } + } + ] + } + } + } +} +``` + +### Request Headers + +The PATCH request must use the token supplied in the originating request (`access_token`) for [authentication](/terraform/enterprise/api-docs#authentication). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-tasks.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-tasks.mdx new file mode 100644 index 000000000..a2c11e17c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-tasks/run-tasks.mdx @@ -0,0 +1,814 @@ +--- +page_title: /tasks API reference for Terraform Enterprise +description: >- + Use Terraform Enterprise API's `/tasks` endpoint to read, create, update, and + delete run tasks, and read, update, delete and associate run tasks to + workspaces. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +[JSON API Schema document]: https://github.com/hashicorp/terraform-docs-common/blob/main/website/public/schema/run-tasks/runtask-results.json + +# Run tasks API reference + +[Run tasks](/terraform/enterprise/workspaces/settings/run-tasks) allow HCP Terraform to interact with external systems at specific points in the HCP Terraform run lifecycle. Run tasks are reusable configurations that you can associate to any workspace in an organization. This page lists the API endpoints for run tasks in an organization and explains how to associate run tasks to workspaces. + + + +@include 'tfc-package-callouts/run-tasks.mdx' + + + +Refer to [run tasks Integration](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) for the API endpoints related triggering run tasks and the expected integration response. + +## Required Permissions + +To interact with run tasks on an organization, you need the [Manage Run Tasks permission](/terraform/enterprise/users-teams-organizations/permissions#manage-run-tasks). To associate or dissociate run tasks in a workspace, you need the [Manage Workspace Run Tasks permission](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) on that particular workspace. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Create a Run Task + +`POST /organizations/:organization_name/tasks` + +| Parameter | Description | +| -------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The organization to create a run task in. The organization must already exist in HCP Terraform, and the token authenticating the API request must have [owner permission](/terraform/enterprise/users-teams-organizations/permissions). | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "tasks"`) | Successfully created a run task | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required unless otherwise specified. + +| Key path | Type | Default | Description | +| -------------------------------------------------------- | ------ | ------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"tasks"`. | +| `data.attributes.name` | string | | The name of the task. Can include letters, numbers, `-`, and `_`. | +| `data.attributes.url` | string | | URL to send a run task payload. | +| `data.attributes.description` | string | | The description of the run task. Can be up to 300 characters long including spaces, letters, numbers, and special characters. | +| `data.attributes.category` | string | | Must be `"task"`. | +| `data.attributes.hmac-key` | string | | (Optional) HMAC key to verify run task. | +| `data.attributes.enabled` | bool | true | (Optional) Whether the task will be run. | +| `data.attributes.global-configuration.enabled` | bool | false | (Optional) Whether the task will be associated on all workspaces. | +| `data.attributes.global-configuration.stages` | array | | (Optional) An array of strings representing the stages of the run lifecycle when the run task should begin. Must be one or more of `"pre_plan"`, `"post_plan"`, `"pre_apply"`, or `"post_apply"`. | +| `data.attributes.global-configuration.enforcement-level` | string | | (Optional) The enforcement level of the workspace task. Must be `"advisory"` or `"mandatory"`. | + +### Sample Payload + +```json +{ + "data": { + "type": "tasks", + "attributes": { + "name": "example", + "url": "http://example.com", + "description": "Simple description", + "hmac_key": "secret", + "enabled": "true", + "category": "task", + "global-configuration": { + "enabled": true, + "stages": ["pre_plan"], + "enforcement-level": "mandatory" + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/tasks +``` + +### Sample Response + +```json +{ + "data": { + "id": "task-7oD7doVTQdAFnMLV", + "type": "tasks", + "attributes": { + "category": "task", + "name": "my-run-task", + "url": "http://example.com", + "description": "Simple description", + "enabled": "true", + "hmac-key": null, + "global-configuration": { + "enabled": true, + "stages": ["pre_plan"], + "enforcement-level": "mandatory" + } + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "tasks": { + "data": [] + } + }, + "links": { + "self": "/api/v2/tasks/task-7oD7doVTQdAFnMLV" + } + } +} +``` + +## List Run Tasks + +`GET /organizations/:organization_name/tasks` + +| Parameter | Description | +| -------------------- | ----------------------------------- | +| `:organization_name` | The organization to list tasks for. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "tasks"`) | Request was successful | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `include` | **Optional.** Allows including related resource data. Value must be a comma-separated list containing one or more of `workspace_tasks` or `workspace_tasks.workspace`. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 run tasks per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/organizations/my-organization/tasks +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "task-7oD7doVTQdAFnMLV", + "type": "tasks", + "attributes": { + "category": "task", + "name": "my-task", + "url": "http://example.com", + "description": "Simple description", + "enabled": "true", + "hmac-key": null, + "global-configuration": { + "enabled": true, + "stages": ["pre_plan"], + "enforcement-level": "mandatory" + } + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "tasks": { + "data": [] + } + }, + "links": { + "self": "/api/v2/tasks/task-7oD7doVTQdAFnMLV" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/hashicorp/tasks?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/hashicorp/tasks?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/hashicorp/tasks?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } +} +``` + +## Show a Run Task + +`GET /tasks/:id` + +| Parameter | Description | +| --------- | --------------------------------------------------------------------------------------------- | +| `:id` | The ID of the task to show. Use the ["List Run Tasks"](#list-run-tasks) endpoint to find IDs. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | --------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "tasks"`) | The request was successful | +| [404][] | [JSON API error object][] | Run task not found or user unauthorized to perform action | + +| Parameter | Description | +| --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `include` | **Optional.** Allows including related resource data. Value must be a comma-separated list containing one or more of `workspace_tasks` or `workspace_tasks.workspace`. | + +### Sample Request + +```shell +curl --request GET \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/tasks/task-7oD7doVTQdAFnMLV +``` + +### Sample Response + +```json +{ + "data": { + "id": "task-7oD7doVTQdAFnMLV", + "type": "tasks", + "attributes": { + "category": "task", + "name": "my-task", + "url": "http://example.com", + "description": "Simple description", + "enabled": "true", + "hmac-key": null, + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "tasks": { + "data": [ + { + "id": "task-xjKZw9KaeXda61az", + "type": "tasks" + } + ] + } + }, + "links": { + "self": "/api/v2/tasks/task-7oD7doVTQdAFnMLV" + } + } +} +``` + +## Update a Run Task + +`PATCH /tasks/:id` + +| Parameter | Description | +| --------- | ----------------------------------------------------------------------------------------------- | +| `:id` | The ID of the task to update. Use the ["List Run Tasks"](#list-run-tasks) endpoint to find IDs. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "tasks"`) | The request was successful | +| [404][] | [JSON API error object][] | Run task not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required unless otherwise specified. + +| Key path | Type | Default | Description | +| -------------------------------------------------------- | ------ | ---------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"tasks"`. | +| `data.attributes.name` | string | (previous value) | The name of the run task. Can include letters, numbers, `-`, and `_`. | +| `data.attributes.url` | string | (previous value) | URL to send a run task payload. | +| `data.attributes.description` | string | | The description of the run task. Can be up to 300 characters long including spaces, letters, numbers, and special characters. | +| `data.attributes.category` | string | (previous value) | Must be `"task"`. | +| `data.attributes.hmac-key` | string | (previous value) | (Optional) HMAC key to verify run task. | +| `data.attributes.enabled` | bool | (previous value) | (Optional) Whether the task will be run. | +| `data.attributes.global-configuration.enabled` | bool | (previous value) | (Optional) Whether the task will be associated on all workspaces. | +| `data.attributes.global-configuration.stages` | array | (previous value) | (Optional) An array of strings representing the stages of the run lifecycle when the run task should begin. Must be one or more of `"pre_plan"`, `"post_plan"`, `"pre_apply"`, or `"post_apply"`. | +| `data.attributes.global-configuration.enforcement-level` | string | (previous value) | (Optional) The enforcement level of the workspace task. Must be `"advisory"` or `"mandatory"`. | + +### Sample Payload + +```json +{ + "data": { + "type": "tasks", + "attributes": { + "name": "new-example", + "url": "http://new-example.com", + "description": "New description", + "hmac_key": "new-secret", + "enabled": "false", + "category": "task", + "global-configuration": { + "enabled": false + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/tasks/task-7oD7doVTQdAFnMLV +``` + +### Sample Response + +```json +{ + "data": { + "id": "task-7oD7doVTQdAFnMLV", + "type": "tasks", + "attributes": { + "category": "task", + "name": "new-example", + "url": "http://new-example.com", + "description": "New description", + "enabled": "false", + "hmac-key": null, + "global-configuration": { + "enabled": false, + "stages": ["pre_plan"], + "enforcement-level": "mandatory" + } + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "tasks": { + "data": [ + { + "id": "wstask-xjKZw9KaeXda61az", + "type": "workspace-tasks" + } + ] + } + }, + "links": { + "self": "/api/v2/tasks/task-7oD7doVTQdAFnMLV" + } + } +} +``` + +## Delete a Run Task + +`DELETE /tasks/:id` + +| Parameter | Description | +| --------- | --------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the run task to delete. Use the ["List Run Tasks"](#list-run-tasks) endpoint to find IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------------------------------------- | +| [204][] | No Content | Successfully deleted the run task | +| [404][] | [JSON API error object][] | Run task not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/tasks/task-7oD7doVTQdAFnMLV +``` + +## Associate a Run Task to a Workspace + +`POST /workspaces/:workspace_id/tasks` + +| Parameter | Description | +| --------------- | ------------------------ | +| `:workspace_id` | The ID of the workspace. | + +This endpoint associates an existing run task to a specific workspace. + +This involves setting the run task enforcement level, which determines whether the run task blocks runs from completing. + +- Advisory run tasks can not block a run from completing. If the task fails, the run will proceed with a warning. + +- Mandatory run tasks block a run from completing. If the task fails (including a timeout or unexpected remote error condition), the run stops with an error. + +You may also configure the run task to begin during specific [run stages](/terraform/enterprise/run/states). Run tasks use the [Post-Plan Stage](/terraform/enterprise/run/states#the-post-plan-stage) by default. + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------------------------------------------------- | +| [204][] | No Content | The request was successful | +| [404][] | [JSON API error object][] | Workspace or run task not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | ------ | --------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"workspace-tasks"`. | +| `data.attributes.enforcement-level` | string | | The enforcement level of the workspace task. Must be `"advisory"` or `"mandatory"`. | +| `data.attributes.stage` | string | `"post_plan"` | **DEPRECATED** Use `stages` instead. The stage in the run lifecycle when the run task should begin. Must be `"pre_plan"`, `"post_plan"`, `"pre_apply"`, or `"post_apply"`. | +| `data.attributes.stages` | array | `["post_plan"]` | An array of strings representing the stages of the run lifecycle when the run task should begin. Must be one or more of `"pre_plan"`, `"post_plan"`, `"pre_apply"`, or `"post_apply"`. | +| `data.relationships.task.data.id` | string | | The ID of the run task. | +| `data.relationships.task.data.type` | string | | Must be `"tasks"`. | + +### Sample Payload + +```json +{ + "data": { + "type": "workspace-tasks", + "attributes": { + "enforcement-level": "advisory", + "stages": ["post_plan"] + }, + "relationships": { + "task": { + "data": { + "id": "task-7oD7doVTQdAFnMLV", + "type": "tasks" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-PphL7ix3yGasYGrq/tasks +``` + +### Sample Response + +```json +{ + "data": { + "id": "wstask-tBXYu8GVAFBpcmPm", + "type": "workspace-tasks", + "attributes": { + "enforcement-level": "advisory", + "stage": "post_plan", + "stages": ["post_plan"] + }, + "relationships": { + "task": { + "data": { + "id": "task-7oD7doVTQdAFnMLV", + "type": "tasks" + } + }, + "workspace": { + "data": { + "id": "ws-PphL7ix3yGasYGrq", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/workspaces/ws-PphL7ix3yGasYGrq/tasks/task-tBXYu8GVAFBpcmPm" + } + } +} +``` + +## List Workspace Run Tasks + +`GET /workspaces/:workspace_id/tasks` + +| Parameter | Description | +| --------------- | -------------------------------- | +| `:workspace_id` | The workspace to list tasks for. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | ----------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "tasks"`) | Request was successful | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 run tasks per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "wstask-tBXYu8GVAFBpcmPm", + "type": "workspace-tasks", + "attributes": { + "enforcement-level": "advisory", + "stage": "post_plan", + "stages": ["post_plan"] + }, + "relationships": { + "task": { + "data": { + "id": "task-hu74ST39g566Q4m5", + "type": "tasks" + } + }, + "workspace": { + "data": { + "id": "ws-kRsDRPtTmtcEme4t", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks/task-tBXYu8GVAFBpcmPm" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } +} +``` + +## Show Workspace Run Task + +`GET /workspaces/:workspace_id/tasks/:id` + +| Parameter | Description | +| --------- | --------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the workspace task to show. Use the ["List Workspace Run Tasks"](#list-workspace-run-tasks) endpoint to find IDs. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | ------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "tasks"`) | The request was successful | +| [404][] | [JSON API error object][] | Workspace run task not found or user unauthorized to perform action | + +### Sample Request + +```shell +curl --request GET \ + -H "Authorization: Bearer $TOKEN" \ + -H "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks/wstask-tBXYu8GVAFBpcmPm +``` + +### Sample Response + +```json +{ + "data": { + "id": "wstask-tBXYu8GVAFBpcmPm", + "type": "workspace-tasks", + "attributes": { + "enforcement-level": "advisory", + "stage": "post_plan", + "stages": ["post_plan"] + }, + "relationships": { + "task": { + "data": { + "id": "task-hu74ST39g566Q4m5", + "type": "tasks" + } + }, + "workspace": { + "data": { + "id": "ws-kRsDRPtTmtcEme4t", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks/wstask-tBXYu8GVAFBpcmPm" + } + } +} +``` + +## Update Workspace Run Task + +`PATCH /workspaces/:workspace_id/tasks/:id` + +| Parameter | Description | +| --------- | ------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the task to update. Use the ["List Workspace Run Tasks"](#list-workspace-run-tasks) endpoint to find IDs. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | ------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "tasks"`) | The request was successful | +| [404][] | [JSON API error object][] | Workspace run task not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------------- | ------ | ---------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | (previous value) | Must be `"workspace-tasks"`. | +| `data.attributes.enforcement-level` | string | (previous value) | The enforcement level of the workspace run task. Must be `"advisory"` or `"mandatory"`. | +| `data.attributes.stage` | string | (previous value) | **DEPRECATED** Use `stages` instead. The stage in the run lifecycle when the run task should begin. Must be `"pre_plan"` or `"post_plan"`. | +| `data.attributes.stages` | array | (previous value) | An array of strings representing the stages of the run lifecycle when the run task should begin. Must be one or more of `"pre_plan"`, `"post_plan"`, `"pre_apply"`, or `"post_apply"`. | + +### Sample Payload + +```json +{ + "data": { + "type": "workspace-tasks", + "attributes": { + "enforcement-level": "mandatory", + "stages": ["post_plan"] + } + } +} +``` + +#### Deprecated Payload + +```json +{ + "data": { + "type": "workspace-tasks", + "attributes": { + "enforcement-level": "mandatory", + "stages": ["post_plan"] + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks/wstask-tBXYu8GVAFBpcmPm +``` + +### Sample Response + +```json +{ + "data": { + "id": "wstask-tBXYu8GVAFBpcmPm", + "type": "workspace-tasks", + "attributes": { + "enforcement-level": "mandatory", + "stage": "post_plan", + "stages": ["post_plan"] + }, + "relationships": { + "task": { + "data": { + "id": "task-hu74ST39g566Q4m5", + "type": "tasks" + } + }, + "workspace": { + "data": { + "id": "ws-kRsDRPtTmtcEme4t", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks/task-tBXYu8GVAFBpcmPm" + } + } +} +``` + +## Delete Workspace Run Task + +`DELETE /workspaces/:workspace_id/tasks/:id` + +| Parameter | Description | +| --------- | --------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the Workspace run task to delete. Use the ["List Workspace Run Tasks"](#list-workspace-run-tasks) endpoint to find IDs. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------- | +| [204][] | No Content | Successfully deleted the workspace run task | +| [404][] | [JSON API error object][] | Workspace run task not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/workspaces/ws-kRsDRPtTmtcEme4t/tasks/wstask-tBXYu8GVAFBpcmPm +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-triggers.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-triggers.mdx new file mode 100644 index 000000000..e557a25a3 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run-triggers.mdx @@ -0,0 +1,349 @@ +--- +page_title: /run-triggers API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/run-triggers` endpoint to read, create, + and delete run triggers. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Run triggers API reference + +## Create a Run Trigger + +`POST /workspaces/:workspace_id/run-triggers` + +| Parameter | Description | +| --------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The ID of the workspace to create the run trigger in. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | ------------------------------------------------------------------------ | +| [201][] | [JSON API document][] (`type: "run-triggers"`) | Successfully created a run trigger | +| [404][] | [JSON API error object][] | Workspace or sourceable not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Permissions + +In order to create a run trigger, the user must have admin access to the specified workspace and permission to read runs for the sourceable workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------ | ------ | ------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.relationships.sourceable.data` | object | | A JSON API relationship object that represents the source workspace for the run trigger. This object must have `id` and `type` properties, and the `type` property must be `workspaces` (e.g. `{ "id": "ws-2HRvNs49EWPjDqT1", "type": "workspaces" }`). Obtain workspace IDs from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +### Sample Payload + +```json +{ + "data": { + "relationships": { + "sourceable": { + "data": { + "id": "ws-2HRvNs49EWPjDqT1", + "type": "workspaces" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --request POST \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-XdeUVMWShTesDMME/run-triggers +``` + +### Sample Response + +```json +{ + "data": { + "id": "rt-3yVQZvHzf5j3WRJ1", + "type": "run-triggers", + "attributes": { + "workspace-name": "workspace-1", + "sourceable-name": "workspace-2", + "created-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "workspace": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + }, + "sourceable": { + "data": { + "id": "ws-2HRvNs49EWPjDqT1", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/run-triggers/rt-3yVQZvHzf5j3WRJ1" + } + } +} +``` + +## List Run Triggers + +`GET /workspaces/:workspace_id/run-triggers` + +| Parameter | Description | +| --------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The ID of the workspace to list run triggers for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | -------------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "run-triggers"`) | Request was successful | +| [400][] | [JSON API error object][] | Required parameter `filter[run-trigger][type]` is missing or has been given an invalid value | +| [404][] | [JSON API error object][] | Workspace not found or user unauthorized to perform action | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| --------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `filter[run-trigger][type]` | **Required** Which type of run triggers to list; valid values are `inbound` or `outbound`. `inbound` run triggers create runs in the specified workspace, and `outbound` run triggers create runs in other workspaces. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 run triggers per page. | + +### Permissions + +In order to list run triggers, the user must have permission to read runs for the specified workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-XdeUVMWShTesDMME/run-triggers?filter%5Brun-trigger%5D%5Btype%5D=inbound +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "rt-WygcwSBuYaQWrM39", + "type": "run-triggers", + "attributes": { + "workspace-name": "workspace-1", + "sourceable-name": "workspace-2", + "created-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "workspace": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + }, + "sourceable": { + "data": { + "id": "ws-2HRvNs49EWPjDqT1", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/run-triggers/rt-WygcwSBuYaQWrM39" + } + }, + { + "id": "rt-8F5JFydVYAmtTjET", + "type": "run-triggers", + "attributes": { + "workspace-name": "workspace-1", + "sourceable-name": "workspace-3", + "created-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "workspace": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + }, + "sourceable": { + "data": { + "id": "ws-BUHBEM97xboT8TVz", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/run-triggers/rt-8F5JFydVYAmtTjET" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/workspaces/ws-xdiJLyGpCugbFDE1/run-triggers?filter%5Brun-trigger%5D%5Btype%5D=inbound&page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/workspaces/ws-xdiJLyGpCugbFDE1/run-triggers?filter%5Brun-trigger%5D%5Btype%5D=inbound&page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/workspaces/ws-xdiJLyGpCugbFDE1/run-triggers?filter%5Brun-trigger%5D%5Btype%5D=inbound&page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 2 + } + } +} +``` + +## Show a Run Trigger + +`GET /run-triggers/:run_trigger_id` + +| Parameter | Description | +| ----------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:run_trigger_id` | The ID of the run trigger to show. Send a `GET` request to the `run-triggers` endpoint to find IDs. Refer to [List Run Triggers](#list-run-triggers) for details. | + +| Status | Response | Reason | +| ------- | ---------------------------------------------- | ------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "run-triggers"`) | The request was successful | +| [404][] | [JSON API error object][] | Run trigger not found or user unauthorized to perform action | + +### Permissions + +In order to show a run trigger, the user must have permission to read runs for either the workspace or sourceable workspace of the specified run trigger. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/run-triggers/rt-3yVQZvHzf5j3WRJ1 +``` + +### Sample Response + +```json +{ + "data": { + "id": "rt-3yVQZvHzf5j3WRJ1", + "type": "run-triggers", + "attributes": { + "workspace-name": "workspace-1", + "sourceable-name": "workspace-2", + "created-at": "2018-09-11T18:21:21.784Z" + }, + "relationships": { + "workspace": { + "data": { + "id": "ws-XdeUVMWShTesDMME", + "type": "workspaces" + } + }, + "sourceable": { + "data": { + "id": "ws-2HRvNs49EWPjDqT1", + "type": "workspaces" + } + } + }, + "links": { + "self": "/api/v2/run-triggers/rt-3yVQZvHzf5j3WRJ1" + } + } +} +``` + +## Delete a Run Trigger + +`DELETE /run-triggers/:run_trigger_id` + +| Parameter | Description | +| ----------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:run_trigger_id` | The ID of the run trigger to delete. Send a `GET` request to the `run-triggers` endpoint o find IDs. Refer to [List Run Triggers](#list-run-triggers) for details. | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------ | +| [204][] | No Content | Successfully deleted the run trigger | +| [404][] | [JSON API error object][] | Run trigger not found or user unauthorized to perform action | + +### Permissions + +In order to delete a run trigger, the user must have admin access to the specified workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Sample Request + +```shell +curl \ + --request DELETE \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/run-triggers/rt-3yVQZvHzf5j3WRJ1 +``` + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +These includes respect read permissions. If you do not have access to read the related resource, it will not be returned. + +- `workspace` - The full workspace object. +- `sourceable` - The full source workspace object. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run.mdx new file mode 100644 index 000000000..950e1d888 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/run.mdx @@ -0,0 +1,902 @@ +--- +page_title: /runs API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/runs` endpoint to read, get, create, + apply, discard, execute, and cancel Terraform runs. You can also list a + workspace's or organization's runs. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Runs API reference + +-> **Note:** Before working with the runs or configuration versions APIs, read the [API-driven run workflow](/terraform/enterprise/run/api) page, which includes both a full overview of this workflow and a walkthrough of a simple implementation of it. + +Performing a run on a new configuration is a multi-step process. + +1. [Create a configuration version on the workspace](/terraform/enterprise/api-docs/configuration-versions#create-a-configuration-version). +2. [Upload configuration files to the configuration version](/terraform/enterprise/api-docs/configuration-versions#upload-configuration-files). +3. [Create a run on the workspace](#create-a-run); this is done automatically when a configuration file is uploaded. +4. [Create and queue an apply on the run](#apply-a-run); if the run can't be auto-applied. + +Alternatively, you can create a run with a pre-existing configuration version, even one from another workspace. This is useful for promoting known good code from one workspace to another. + +## Attributes + +### Run States + +The run state is found in `data.attributes.status`, and you can reference the following list of possible states. + +| State | Description | +| ---------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `pending` | The initial status of a run after creation. | +| `fetching` | The run is waiting for HCP Terraform to fetch the configuration from VCS. | +| `fetching_completed` | HCP Terraform has fetched the configuration from VCS and the run will continue. | +| `pre_plan_running` | The pre-plan phase of the run is in progress. | +| `pre_plan_completed` | The pre-plan phase of the run has completed. | +| `queuing` | HCP Terraform is queuing the run to start the planning phase. | +| `plan_queued` | HCP Terraform is waiting for its backend services to start the plan. | +| `planning` | The planning phase of a run is in progress. | +| `planned` | The planning phase of a run has completed. | +| `cost_estimating` | The cost estimation phase of a run is in progress. | +| `cost_estimated` | The cost estimation phase of a run has completed. | +| `policy_checking` | The sentinel policy checking phase of a run is in progress. | +| `policy_override` | A sentinel policy has soft failed, and a user can override it to continue the run. | +| `policy_soft_failed` | A sentinel policy has soft failed for a plan-only run. This is a final state. | +| `policy_checked` | The sentinel policy checking phase of a run has completed. | +| `confirmed` | A user has confirmed the plan. | +| `post_plan_running` | The post-plan phase of the run is in progress. | +| `post_plan_completed` | The post-plan phase of the run has completed. | +| `planned_and_finished` | The run is completed. This status only exists for plan-only runs and runs that produce a plan with no changes to apply. This is a final state. | +| `planned_and_saved` | The run has finished its planning, checks, and estimates, and can be confirmed for apply. This status is only used for saved plan runs. | +| `apply_queued` | Once the changes in the plan have been confirmed, the run will transition to `apply_queued`. This status indicates that the run should start as soon as the backend services that run terraform have available capacity. In HCP Terraform, you should seldom see this status, as our aim is to always have capacity. However, in Terraform Enterprise this status will be more common due to the self-hosted nature. | +| `applying` | Terraform is applying the changes specified in the plan. | +| `applied` | Terraform has applied the changes specified in the plan. | +| `discarded` | The run has been discarded. This is a final state. | +| `errored` | The run has errored. This is a final state. | +| `canceled` | The run has been canceled. | +| `force_canceled` | A workspace admin forcefully canceled the run. | + +### Run Operations + +The run operation specifies the Terraform execution mode. You can reference the following list of possible execution modes and use them as query parameters in the [workspace](/terraform/enterprise/api-docs/run#list-runs-in-a-workspace) and [organization](/terraform/enterprise/api-docs/run#list-runs-in-a-organization) runs lists. + +| Operation | Description | +| ---------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `plan_only` | The run does not have an apply phase. This is also called a [_speculative plan_](/terraform/enterprise/run/modes-and-options#plan-only-speculative-plan). | +| `plan_and_apply` | The run includes both plan and apply phases. | +| `save_plan` | The run is a saved plan run. It can include both plan and apply phases, but only becomes the workspace's current run if a user chooses to apply it. | +| `refresh_only` | The run should update Terraform state, but not make changes to resources. | +| `destroy` | The run should destroy all objects, regardless of configuration changes. | +| `empty_apply` | The run should perform an apply with no changes to resources. This is most commonly used to [upgrade terraform state versions](/terraform/enterprise/workspaces/state#upgrading-state). | + +### Run Sources + +You can use the following sources as query parameters in [workspace](/terraform/enterprise/api-docs/run#list-runs-in-a-workspace) and [organization](/terraform/enterprise/api-docs/run#list-runs-in-a-organization) runs lists. + +| Source | Description | +| --------------------------- | --------------------------------------------------------------------------------------- | +| `tfe-ui` | Indicates a run was queued from HCP Terraform UI. | +| `tfe-api` | Indicates a run was queued from HCP Terraform API. | +| `tfe-configuration-version` | Indicates a run was queued from a Configuration Version, triggered from a VCS provider. | + +### Run Status Groups + +The run status group specifies a collection of run states by logical category. + +| Group | Description | +| ------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `non_final` | Inclusive of runs that are currently running, require user confirmation, or are queued/pending. | +| `final` | Inclusive of runs that have reached their final and terminal state. | +| `discardable` | Inclusive of runs whose state falls under the following: `planned`, `planned_and_saved`, `cost_estimated`, `policy_checked`, `policy_override`, `post_plan_running`, `post_plan_completed` | + +## Create a Run + +`POST /runs` + +A run performs a plan and apply, using a configuration version and the workspace’s current variables. You can specify a configuration version when creating a run; if you don’t provide one, the run defaults to the workspace’s most recently used version. (A configuration version is “used” when it is created or used for a run in this workspace.) + +Creating a run requires permission to queue plans for the specified workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +When creating a run, you may optionally provide a list of variable objects containing key and value attributes. These values apply to that run specifically and take precedence over variables with the same key applied to the workspace(e.g., variable sets). Refer to [Variable Precedence](/terraform/enterprise/workspaces/variables#precedence) for more information. All values must be expressed as an HCL literal in the same syntax you would use when writing Terraform code. Refer to [Types](/terraform/language/expressions/types#types) in the Terraform documentation for more details. + +Setting `debugging_mode: true` enables debugging mode for the queued run only. This is equivalent to setting the `TF_LOG` environment variable to `TRACE` for this run. See [Debugging Terraform](/terraform/internals/debugging) for more information. + +**Sample Run Variables:** + +```json +"attributes": { + "variables": [ + { "key": "replicas", "value": "2" }, + { "key": "access_key", "value": "\"ABCDE12345\"" } + ] +} +``` + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------------------------------------------------- | -------------------- | ---------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.attributes.allow-empty-apply` | bool | none | Specifies whether Terraform can apply the run even when the plan [contains no changes](/terraform/enterprise/run/modes-and-options#allow-empty-apply). Use this property to [upgrade state](/terraform/enterprise/workspaces/state#upgrading-state) after upgrading a workspace to a new terraform version. | +| `data.attributes.allow-config-generation` | bool | `false` | Specifies whether Terraform can [generate resource configuration](/terraform/language/import/generating-configuration) when planning to import new resources. When set to `false`, Terraform returns an error when `import` blocks do not have a corresponding `resource` block. | +| `data.attributes.auto-apply` | bool | Defaults to the [Auto Apply](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply) workspace setting. | Determines if Terraform automatically applies the configuration on a successful `terraform plan`. | +| `data.attributes.debugging-mode` | bool | `false` | When set to `true`, enables verbose logging for the queued plan. | +| `data.attributes.is-destroy` | bool | `false` | When set to `true`, the plan destroys all provisioned resources. Mutually exclusive with `refresh-only`. | +| `data.attributes.message` | string | `"Queued manually via the Terraform Enterprise API"` | Specifies the message associated with this run. | +| `data.attributes.refresh` | bool | `true` | Specifies whether or not to refresh the state before a plan. | +| `data.attributes.refresh-only` | bool | `false` | When set to `true`, this run refreshes the state without modifying any resources. Mutually exclusive with `is-destroy`. | +| `data.attributes.replace-addrs` | array\[string] | | Specifies an optional list of resource addresses to be passed to the `-replace` flag. | +| `data.attributes.target-addrs` | array\[string] | | Specifies an optional list of resource addresses to be passed to the `-target` flag. | +| `data.attributes.variables` | array\[{key, value}] | (empty array) | Specifies an optional list of run-specific variable values. Refer to [Run-Specific Variables](/terraform/enterprise/workspaces/variables/managing-variables#run-specific-variables) for details. | +| `data.attributes.plan-only` | bool | (from configuration version) | Specifies if this is a [speculative, plan-only](/terraform/enterprise/run/modes-and-options#plan-only-speculative-plan) run that Terraform cannot apply. Often used in conjunction with terraform-version in order to test whether an upgrade would succeed. | +| `data.attributes.save-plan` | bool | `false` | When set to `true`, the run is executed as a `save plan` run. A `save plan` run plans and checks the configuration without becoming the workspace's current run. These run types only becomes the current run if you confirm that you want to apply them when prompted. When creating new [configuration versions](/terraform/enterprise/api-docs/configuration-versions) for saved plan runs, be sure to make them `provisional`. | +| `data.attributes.terraform-version` | string | none | Specifies the Terraform version to use in this run. Only valid for plan-only runs; must be a valid Terraform version available to the organization. | +| `data.relationships.workspace.data.id` | string | none | Specifies the workspace ID to execute the run in. | +| `data.relationships.configuration-version.data.id` | string | none | Specifies the configuration version to use for this run. If the `configuration-version` object is omitted, Terraform uses the workspace's latest configuration version to create the run . | + +| Status | Response | Reason | +| ------- | -------------------------------------- | --------------------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "runs"`) | Successfully created a run | +| [404][] | [JSON API error object][] | Organization or workspace not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "message": "Custom message" + }, + "type":"runs", + "relationships": { + "workspace": { + "data": { + "type": "workspaces", + "id": "ws-LLGHCr4SWy28wyGN" + } + }, + "configuration-version": { + "data": { + "type": "configuration-versions", + "id": "cv-n4XQPBa2QnecZJ4G" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/runs +``` + +### Sample Response + +```json +{ + "data": { + "id": "run-CZcmD7eagjhyX0vN", + "type": "runs", + "attributes": { + "actions": { + "is-cancelable": true, + "is-confirmable": false, + "is-discardable": false, + "is-force-cancelable": false + }, + "canceled-at": null, + "created-at": "2021-05-24T07:38:04.171Z", + "has-changes": false, + "auto-apply": false, + "allow-empty-apply": false, + "allow-config-generation": false, + "is-destroy": false, + "message": "Custom message", + "plan-only": false, + "source": "tfe-api", + "status-timestamps": { + "plan-queueable-at": "2021-05-24T07:38:04+00:00" + }, + "status": "pending", + "trigger-reason": "manual", + "target-addrs": null, + "permissions": { + "can-apply": true, + "can-cancel": true, + "can-comment": true, + "can-discard": true, + "can-force-execute": true, + "can-force-cancel": true, + "can-override-policy-check": true + }, + "refresh": false, + "refresh-only": false, + "replace-addrs": null, + "save-plan": false, + "variables": [] + }, + "relationships": { + "apply": {...}, + "comments": {...}, + "configuration-version": {...}, + "cost-estimate": {...}, + "created-by": {...}, + "input-state-version": {...}, + "plan": {...}, + "run-events": {...}, + "policy-checks": {...}, + "workspace": {...}, + "workspace-run-alerts": {...} + }, + "links": { + "self": "/api/v2/runs/run-CZcmD7eagjhyX0vN" + } + } +} +``` + +## Apply a Run + +`POST /runs/:run_id/actions/apply` + +| Parameter | Description | +| --------- | ------------------- | +| `run_id` | The run ID to apply | + +Applies a run that is paused waiting for confirmation after a plan. This includes runs in the "needs confirmation" and "policy checked" states. This action is only required for runs that can't be auto-applied. Plans can be auto-applied if the auto-apply setting is enabled on the workspace and the plan was queued by a new VCS commit or by a user with permission to apply runs for the workspace. + +-> **Note:** If the run has a soft failed sentinel policy, you will need to [override the policy check](/terraform/enterprise/api-docs/policy-checks#override-policy) before Terraform can apply the run. You can find policy check details in the `relationships` section of the [run details endpoint](#get-run-details) response. + +Applying a run requires permission to apply runs for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +This endpoint queues the request to perform an apply; the apply might not happen immediately. + +Since this endpoint represents an action (not a resource), it does not return any object in the response body. + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ------------------------------------------------------- | +| [202][] | none | Successfully queued an apply request. | +| [409][] | [JSON API error object][] | Run was not paused for confirmation; apply not allowed. | + +### Request Body + +This POST endpoint allows an optional JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| --------- | ------ | ------- | ---------------------------------- | +| `comment` | string | `null` | An optional comment about the run. | + +### Sample Payload + +This payload is optional, so the `curl` command will work without the `--data @payload.json` option too. + +```json +{ + "comment":"Looks good to me" +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/runs/run-DQGdmrWMX8z9yWQB/actions/apply +``` + +## List Runs in a Workspace + +`GET /workspaces/:workspace_id/runs` + +| Parameter | Description | +| -------------- | ---------------------------------- | +| `workspace_id` | The workspace ID to list runs for. | + +By default, `plan_only` runs will be excluded from the results. To see all runs, use `filter[operation]` with all available operations included as a comma-separated list. +This endpoint has an adjusted rate limit of 30 requests per minute. Note that most endpoints are limited to 30 requests per second. + +| Status | Response | Reason | +| ------- | ------------------------------------------------ | ------------------------ | +| [200][] | Array of [JSON API document][]s (`type: "runs"`) | Successfully listed runs | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | Required | +| -------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------- | +| `page[number]` | If omitted, the endpoint returns the first page. | Optional | +| `page[size]` | If omitted, the endpoint returns 20 runs per page. | Optional | +| `filter[operation]` | A comma-separated list of run operations. The result lists runs that perform one of these operations. For details on options, refer to [Run operations](/terraform/enterprise/api-docs/run#run-operations). | Optional | +| `filter[status]` | A comma-separated list of run statuses. The result lists runs that are in one of the statuses you specify. For details on options, refer to [Run states](/terraform/enterprise/api-docs/run#run-states). | Optional | +| `filter[agent_pool_names]` | A comma-separated list of agent pool names. The result lists runs that use one of the agent pools you specify. | Optional | +| `filter[source]` | A comma-separated list of run sources. The result lists runs that came from one of the sources you specify. Options are listed in [Run Sources](/terraform/enterprise/api-docs/run#run-sources). | Optional | +| `filter[status_group]` | A single status group. The result lists runs whose status falls under this status group. For details on options, refer to [Run status groups](/terraform/enterprise/api-docs/run#run-status-groups). | Optional | +| `filter[timeframe]` | A single year period. The result lists runs that were created within the year you specify. An integer year or the string "year" for the past year are valid values. If omitted, the endpoint returns all runs since the creation of the workspace. | Optional | +| `search[user]` | Searches for runs that match the VCS username you supply. | Optional | +| `search[commit]` | Searches for runs that match the commit sha you specify. | Optional | +| `search[basic]` | Searches for runs that match the VCS username, commit sha, run_id, or run message your specify. HCP Terraform prioritizes `search[commit]` or `search[user]` and ignores `search[basic]` in favor of the higher priority parameters if you include them in your query. | Optional | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-yF7z4gyEQRhaCNG9/runs +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "run-CZcmD7eagjhyX0vN", + "type": "runs", + "attributes": { + "actions": { + "is-cancelable": true, + "is-confirmable": false, + "is-discardable": false, + "is-force-cancelable": false + }, + "canceled-at": null, + "created-at": "2021-05-24T07:38:04.171Z", + "has-changes": false, + "auto-apply": false, + "allow-empty-apply": false, + "allow-config-generation": false, + "is-destroy": false, + "message": "Custom message", + "plan-only": false, + "source": "tfe-api", + "status-timestamps": { + "plan-queueable-at": "2021-05-24T07:38:04+00:00" + }, + "status": "pending", + "trigger-reason": "manual", + "target-addrs": null, + "permissions": { + "can-apply": true, + "can-cancel": true, + "can-comment": true, + "can-discard": true, + "can-force-execute": true, + "can-force-cancel": true, + "can-override-policy-check": true + }, + "refresh": false, + "refresh-only": false, + "replace-addrs": null, + "save-plan": false, + "variables": [] + }, + "relationships": { + "apply": {...}, + "comments": {...}, + "configuration-version": {...}, + "cost-estimate": {...}, + "created-by": {...}, + "input-state-version": {...}, + "plan": {...}, + "run-events": {...}, + "policy-checks": {...}, + "workspace": {...}, + "workspace-run-alerts": {...} + }, + "links": { + "self": "/api/v2/runs/run-bWSq4YeYpfrW4mx7" + } + }, + {...} + ], + "links": { + "first": "https://app.terraform.io/api/v2/workspaces/ws-yF7z4gyEQRhaCNG9/runs?page[number]=1&page[size]=20", + "last": "https://app.terraform.io/api/v2/workspaces/ws-yF7z4gyEQRhaCNG9/runs?page[number]=19206&page[size]=20", + "self": "https://app.terraform.io/api/v2/workspaces/ws-yF7z4gyEQRhaCNG9/runs?page[number]=2&page[size]=20", + "prev": "https://app.terraform.io/api/v2/workspaces/ws-yF7z4gyEQRhaCNG9/runs?page[number]=1&page[size]=20", + "next": "https://app.terraform.io/api/v2/workspaces/ws-yF7z4gyEQRhaCNG9/runs?page[number]=3&page[size]=20" + }, + "meta": { + "pagination": { + "current-page": 2, + "next-page": 3, + "prev-page": 1, + "page-size": 20, + "total-count": 384105, + "total-pages": 19206 + } + } +} +``` + +## List Runs in an Organization + +`GET /organizations/:organization_name/runs` + +| Parameter | Description | +| ------------------- | --------------------------------------- | +| `organization_name` | The organization name to list runs for. | + +This endpoint has an adjusted rate limit of 30 requests per minute. Note that most endpoints are limited to 30 requests per second. + +Note that this endpoint differs from others in the pagination metadata included in the response, such as the exclusion of the typical `total-count` and `total-pages`. See the Sample Response below for more details. + +| Status | Response | Reason | +| ------- | ------------------------------------------------ | ------------------------ | +| [200][] | Array of [JSON API document][]s (`type: "runs"`) | Successfully listed runs | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | Required | +| -------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------- | +| `page[number]` | If omitted, the endpoint returns the first page. | Optional | +| `page[size]` | If omitted, the endpoint returns 20 runs per page. | Optional | +| `filter[operation]` | A comma-separated list of run operations. The result lists runs that perform one of these operations. For details on options, refer to [Run operations](/terraform/enterprise/api-docs/run#run-operations). | Optional | +| `filter[status]` | A comma-separated list of run statuses. The result lists runs that are in one of the statuses you specify. For details on options, refer to [Run states](/terraform/enterprise/api-docs/run#run-states). | Optional | +| `filter[agent_pool_names]` | A comma-separated list of agent pool names. The result lists runs that use one of the agent pools you specify. | Optional | +| `filter[workspace_names]` | A comma-separated list of workspace names. The result lists runs that belong to one of the workspaces your specify. | Optional | +| `filter[source]` | A comma-separated list of run sources. The result lists runs that came from one of the sources you specify. Options are listed in [Run Sources](/terraform/enterprise/api-docs/run#run-sources). | Optional | +| `filter[status_group]` | A single status group. The result lists runs whose status falls under this status group. For details on options, refer to [Run status groups](/terraform/enterprise/api-docs/run#run-status-groups). | Optional | +| `filter[timeframe]` | A single year period. The result lists runs that were created within the year you specify. An integer year or the string "year" for the past year are valid values. If omitted, the endpoint returns runs created in the last year. | Optional | +| `search[user]` | Searches for runs that match the VCS username you supply. | Optional | +| `search[commit]` | Searches for runs that match the commit sha you specify. | Optional | +| `search[basic]` | Searches for runs that match the VCS username, commit sha, run_id, or run message your specify. HCP Terraform prioritizes `search[commit]` or `search[user]` and ignores `search[basic]` in favor of the higher priority parameters if you include them in your query. | Optional | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/hashicorp/runs +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "run-CZcmD7eagjhyX0vN", + "type": "runs", + "attributes": { + "actions": { + "is-cancelable": true, + "is-confirmable": false, + "is-discardable": false, + "is-force-cancelable": false + }, + "canceled-at": null, + "created-at": "2021-05-24T07:38:04.171Z", + "has-changes": false, + "auto-apply": false, + "allow-empty-apply": false, + "allow-config-generation": false, + "is-destroy": false, + "message": "Custom message", + "plan-only": false, + "source": "tfe-api", + "status-timestamps": { + "plan-queueable-at": "2021-05-24T07:38:04+00:00" + }, + "status": "pending", + "trigger-reason": "manual", + "target-addrs": null, + "permissions": { + "can-apply": true, + "can-cancel": true, + "can-comment": true, + "can-discard": true, + "can-force-execute": true, + "can-force-cancel": true, + "can-override-policy-check": true + }, + "refresh": false, + "refresh-only": false, + "replace-addrs": null, + "save-plan": false, + "variables": [] + }, + "relationships": { + "apply": {...}, + "comments": {...}, + "configuration-version": {...}, + "cost-estimate": {...}, + "created-by": {...}, + "input-state-version": {...}, + "plan": {...}, + "run-events": {...}, + "policy-checks": {...}, + "workspace": {...}, + "workspace-run-alerts": {...} + }, + "links": { + "self": "/api/v2/runs/run-bWSq4YeYpfrW4mx7" + } + }, + {...} + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/hashicorp/runs?page[number]=2&page[size]=20", + "prev": "https://app.terraform.io/api/v2/organizations/hashicorp/runs?page[number]=1&page[size]=20", + "next": "https://app.terraform.io/api/v2/organizations/hashicorp/runs?page[number]=3&page[size]=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "next-page": 2, + "prev-page": null, + "page-size": 20 + } + } +} +``` + +## Get run details + +`GET /runs/:run_id` + +| Parameter | Description | +| --------- | ------------------ | +| `:run_id` | The run ID to get. | + +This endpoint is used for showing details of a specific run. + +| Status | Response | Reason | +| ------- | -------------------------------------- | ------------------------------------ | +| [200][] | [JSON API document][] (`type: "runs"`) | Success | +| [404][] | [JSON API error object][] | Run not found or user not authorized | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/runs/run-bWSq4YeYpfrW4mx7 +``` + +### Sample Response + +```json +{ + "data": { + "id": "run-CZcmD7eagjhyX0vN", + "type": "runs", + "attributes": { + "actions": { + "is-cancelable": true, + "is-confirmable": false, + "is-discardable": false, + "is-force-cancelable": false + }, + "canceled-at": null, + "created-at": "2021-05-24T07:38:04.171Z", + "has-changes": false, + "auto-apply": false, + "allow-empty-apply": false, + "allow-config-generation": false, + "is-destroy": false, + "message": "Custom message", + "plan-only": false, + "source": "tfe-api", + "status-timestamps": { + "plan-queueable-at": "2021-05-24T07:38:04+00:00" + }, + "status": "pending", + "trigger-reason": "manual", + "target-addrs": null, + "permissions": { + "can-apply": true, + "can-cancel": true, + "can-comment": true, + "can-discard": true, + "can-force-execute": true, + "can-force-cancel": true, + "can-override-policy-check": true + }, + "refresh": false, + "refresh-only": false, + "replace-addrs": null, + "save-plan": false, + "variables": [] + }, + "relationships": { + "apply": {...}, + "comments": {...}, + "configuration-version": {...}, + "cost-estimate": {...}, + "created-by": {...}, + "input-state-version": {...}, + "plan": {...}, + "run-events": {...}, + "policy-checks": {...}, + "task-stages": {...}, + "workspace": {...}, + "workspace-run-alerts": {...} + }, + "links": { + "self": "/api/v2/runs/run-bWSq4YeYpfrW4mx7" + } + } +} +``` + +## Discard a Run + +`POST /runs/:run_id/actions/discard` + +| Parameter | Description | +| --------- | --------------------- | +| `run_id` | The run ID to discard | + +The `discard` action can be used to skip any remaining work on runs that are paused waiting for confirmation or priority. This includes runs in the "pending," "needs confirmation," "policy checked," and "policy override" states. + +Discarding a run requires permission to apply runs for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +This endpoint queues the request to perform a discard; the discard might not happen immediately. After discarding, the run is completed and later runs can proceed. + +This endpoint represents an action as opposed to a resource. As such, it does not return any object in the response body. + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [202][] | none | Successfully queued a discard request. | +| [409][] | [JSON API error object][] | Run was not paused for confirmation or priority; discard not allowed. | + +### Request Body + +This POST endpoint allows an optional JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| --------- | ------ | ------- | ------------------------------------------------------ | +| `comment` | string | `null` | An optional explanation for why the run was discarded. | + +### Sample Payload + +This payload is optional, so the `curl` command will work without the `--data @payload.json` option too. + +```json +{ + "comment": "This run was discarded" +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/runs/run-DQGdmrWMX8z9yWQB/actions/discard +``` + +## Cancel a Run + +`POST /runs/:run_id/actions/cancel` + +| Parameter | Description | +| --------- | -------------------- | +| `run_id` | The run ID to cancel | + +The `cancel` action can be used to interrupt a run that is currently planning or applying. Performing a cancel is roughly equivalent to hitting ctrl+c during a Terraform plan or apply on the CLI. The running Terraform process is sent an `INT` signal, which instructs Terraform to end its work and wrap up in the safest way possible. + +Canceling a run requires permission to apply runs for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +This endpoint queues the request to perform a cancel; the cancel might not happen immediately. After canceling, the run is completed and later runs can proceed. + +This endpoint represents an action as opposed to a resource. As such, it does not return any object in the response body. + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ----------------------------------------------------- | +| [202][] | none | Successfully queued a cancel request. | +| [409][] | [JSON API error object][] | Run was not planning or applying; cancel not allowed. | +| [404][] | [JSON API error object][] | Run was not found or user not authorized. | + +### Request Body + +This POST endpoint allows an optional JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| --------- | ------ | ------- | ----------------------------------------------------- | +| `comment` | string | `null` | An optional explanation for why the run was canceled. | + +### Sample Payload + +This payload is optional, so the `curl` command will work without the `--data @payload.json` option too. + +```json +{ + "comment": "This run was stuck and would never finish." +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/runs/run-DQGdmrWMX8z9yWQB/actions/cancel +``` + +## Forcefully cancel a run + +`POST /runs/:run_id/actions/force-cancel` + +| Parameter | Description | +| --------- | -------------------- | +| `run_id` | The run ID to cancel | + +The `force-cancel` action is like [cancel](#cancel-a-run), but ends the run immediately. Once invoked, the run is placed into a `canceled` state, and the running Terraform process is terminated. The workspace is immediately unlocked, allowing further runs to be queued. The `force-cancel` operation requires admin access to the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +This endpoint enforces a prerequisite that a [non-forceful cancel](#cancel-a-run) is performed first, and a cool-off period has elapsed. To determine if this criteria is met, it is useful to check the `data.attributes.is-force-cancelable` value of the [run details endpoint](#get-run-details). The time at which the force-cancel action will become available can be found using the [run details endpoint](#get-run-details), in the key `data.attributes.force_cancel_available_at`. Note that this key is only present in the payload after the initial cancel has been initiated. + +This endpoint represents an action as opposed to a resource. As such, it does not return any object in the response body. + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +~> **Warning:** This endpoint has potentially dangerous side-effects, including loss of any in-flight state in the running Terraform process. Use this operation with extreme caution. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ------------------------------------------------------------------------------------------------------------------ | +| [202][] | none | Successfully queued a cancel request. | +| [409][] | [JSON API error object][] | Run was not planning or applying, has not been canceled non-forcefully, or the cool-off period has not yet passed. | +| [404][] | [JSON API error object][] | Run was not found or user not authorized. | + +### Request Body + +This POST endpoint allows an optional JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| --------- | ------ | ------- | ----------------------------------------------------- | +| `comment` | string | `null` | An optional explanation for why the run was canceled. | + +### Sample Payload + +This payload is optional, so the `curl` command will work without the `--data @payload.json` option too. + +```json +{ + "comment": "This run was stuck and would never finish." +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/runs/run-DQGdmrWMX8z9yWQB/actions/force-cancel +``` + +## Forcefully execute a run + +`POST /runs/:run_id/actions/force-execute` + +| Parameter | Description | +| --------- | --------------------- | +| `run_id` | The run ID to execute | + +The force-execute action cancels all prior runs that are not already complete, unlocking the run's workspace and allowing the run to be executed. (It initiates the same actions as the "Run this plan now" button at the top of the view of a pending run.) + +Force-executing a run requires permission to apply runs for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +This endpoint enforces the following prerequisites: + +- The target run is in the "pending" state. +- The workspace is locked by another run. +- The run locking the workspace can be discarded. + +This endpoint represents an action as opposed to a resource. As such, it does not return any object in the response body. + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +~> **Note:** While useful at times, force-executing a run circumvents the typical workflow of applying runs using HCP Terraform. It is not intended for regular use. If you find yourself using it frequently, please reach out to HashiCorp Support for help in developing an alternative approach. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------------------------------- | +| [202][] | none | Successfully initiated the force-execution process. | +| [403][] | [JSON API error object][] | Run is not pending, its workspace was not locked, or its workspace association was not found. | +| [409][] | [JSON API error object][] | The run locking the workspace was not in a discardable state. | +| [404][] | [JSON API error object][] | Run was not found or user not authorized. | + +### Request Body + +This POST endpoint does not take a request body. + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/runs/run-DQGdmrWMX8z9yWQB/actions/force-execute +``` + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +- `plan` - Additional information about plans. +- `apply` - Additional information about applies. +- `created_by` - Full user records of the users responsible for creating the runs. +- `cost_estimate` - Additional information about cost estimates. +- `configuration_version` - The configuration record used in the run. +- `configuration_version.ingress_attributes` - The commit information used in the run. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/ssh-keys.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/ssh-keys.mdx new file mode 100644 index 000000000..70f2e5482 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/ssh-keys.mdx @@ -0,0 +1,320 @@ +--- +page_title: /ssh-keys API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/ssh-keys` endpoint to read, get, create, + update, and delete an organization's SSH keys. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# SSH keys API reference + +The `ssh-key` object represents an SSH key which includes a name and the SSH private key. An organization can have multiple SSH keys available. + +SSH keys can be used in two places: + +- You can assign them to VCS provider integrations, which are available in the API as `oauth-tokens`. Refer to [OAuth Tokens](/terraform/enterprise/api-docs/oauth-tokens) for additional information. Azure DevOps Server and Bitbucket Data Center require an SSH key. Other providers only require an SSH key when your repositories include submodules that are only accessible using an SSH connection instead of your VCS provider's API. +- They can be [assigned to workspaces](/terraform/enterprise/api-docs/workspaces#assign-an-ssh-key-to-a-workspace) and used when Terraform needs to clone modules from a Git server. This is only necessary when your configurations directly reference modules from a Git server; you do not need to do this if you use HCP Terraform's [private module registry](/terraform/enterprise/registry). + +Listing and viewing SSH keys requires either permission to manage VCS settings for the organization, or admin access to at least one workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +~> **Important:** The list and read methods on this API only provide metadata about SSH keys. The actual private key text is write-only, and HCP Terraform never provides it to users via the API or UI. + +## List SSH Keys + +`GET /organizations/:organization_name/ssh-keys` + +| Parameter | Description | +| -------------------- | -------------------------------------------------- | +| `:organization_name` | The name of the organization to list SSH keys for. | + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ---------------------------------------------------- | --------------------------------------------- | +| [200][] | Array of [JSON API document][]s (`type: "ssh-keys"`) | Success | +| [404][] | [JSON API error object][] | Organization not found or user not authorized | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results. + +| Parameter | Description | +| -------------- | ------------------------------------------------------------------------ | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 ssh keys per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/organizations/my-organization/ssh-keys +``` + +### Sample Response + +```json +{ + "data": [ + { + "attributes": { + "name": "SSH Key" + }, + "id": "sshkey-GxrePWre1Ezug7aM", + "links": { + "self": "/api/v2/ssh-keys/sshkey-GxrePWre1Ezug7aM" + }, + "type": "ssh-keys" + } + ] +} +``` + +## Get an SSH Key + +`GET /ssh-keys/:ssh_key_id` + +| Parameter | Description | +| ------------- | ---------------------- | +| `:ssh_key_id` | The SSH key ID to get. | + +This endpoint is for looking up the name associated with an SSH key ID. It does not retrieve the key text. + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ------------------------------------------ | ---------------------------------------- | +| [200][] | [JSON API document][] (`type: "ssh-keys"`) | Success | +| [404][] | [JSON API error object][] | SSH key not found or user not authorized | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/ssh-keys/sshkey-GxrePWre1Ezug7aM +``` + +### Sample Response + +```json +{ + "data": { + "attributes": { + "name": "SSH Key" + }, + "id": "sshkey-GxrePWre1Ezug7aM", + "links": { + "self": "/api/v2/ssh-keys/sshkey-GxrePWre1Ezug7aM" + }, + "type": "ssh-keys" + } +} +``` + +## Create an SSH Key + +`POST /organizations/:organization_name/ssh-keys` + +| Parameter | Description | +| -------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create an SSH key in. The organization must already exist, and the token authenticating the API request must have permission to manage VCS settings. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ------------------------------------------ | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "ssh-keys"`) | Success | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [404][] | [JSON API error object][] | User not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------- | ------ | ------- | -------------------------------- | +| `data.type` | string | | Must be `"ssh-keys"`. | +| `data.attributes.name` | string | | A name to identify the SSH key. | +| `data.attributes.value` | string | | The text of the SSH private key. | + +### Sample Payload + +```json +{ + "data": { + "type": "ssh-keys", + "attributes": { + "name": "SSH Key", + "value": "-----BEGIN RSA PRIVATE KEY-----\nMIIEowIBAAKCAQEAm6+JVgl..." + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/ssh-keys +``` + +### Sample Response + +```json +{ + "data": { + "attributes": { + "name": "SSH Key" + }, + "id": "sshkey-GxrePWre1Ezug7aM", + "links": { + "self": "/api/v2/ssh-keys/sshkey-GxrePWre1Ezug7aM" + }, + "type": "ssh-keys" + } +} +``` + +## Update an SSH Key + +`PATCH /ssh-keys/:ssh_key_id` + +| Parameter | Description | +| ------------- | ------------------------- | +| `:ssh_key_id` | The SSH key ID to update. | + +This endpoint replaces the name of an existing SSH key. + +Editing SSH keys requires permission to manage VCS settings. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ------------------------------------------ | ---------------------------------------- | +| [200][] | [JSON API document][] (`type: "ssh-keys"`) | Success | +| [404][] | [JSON API error object][] | SSH key not found or user not authorized | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ---------------------- | ------ | --------- | --------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"ssh-keys"`. | +| `data.attributes.name` | string | (nothing) | A name to identify the SSH key. If omitted, the existing name is preserved. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "name": "SSH Key for GitHub" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/ssh-keys/sshkey-GxrePWre1Ezug7aM +``` + +### Sample Response + +```json +{ + "data": { + "attributes": { + "name": "SSH Key for GitHub" + }, + "id": "sshkey-GxrePWre1Ezug7aM", + "links": { + "self": "/api/v2/ssh-keys/sshkey-GxrePWre1Ezug7aM" + }, + "type": "ssh-keys" + } +} +``` + +## Delete an SSH Key + +`DELETE /ssh-keys/:ssh_key_id` + +| Parameter | Description | +| ------------- | ------------------------- | +| `:ssh_key_id` | The SSH key ID to delete. | + +Deleting SSH keys requires permission to manage VCS settings. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +-> **Note:** This endpoint cannot be accessed with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ------------------------- | ---------------------------------------- | +| [204][] | No Content | Success | +| [404][] | [JSON API error object][] | SSH key not found or user not authorized | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/ssh-keys/sshkey-GxrePWre1Ezug7aM +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/stability-policy.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/stability-policy.mdx new file mode 100644 index 000000000..1b59e2d1f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/stability-policy.mdx @@ -0,0 +1,25 @@ +--- +page_title: API stability policy for Terraform Enterprise +description: >- + Learn how HashiCorp plans for stability, backward compatibility, and + deprecation for the Terraform Enterprise APIs. +source: terraform-docs-common +--- + +# API stability policy + +The HCP Terraform API will continue to evolve, but we consider it stable for general use, and HashiCorp will maintain all stable API endpoints in a backwards compatible manner. (Stable endpoints are any endpoints _not_ marked as beta.) If we need to make a change that we consider backwards incompatible, then we will create a new endpoint that serves the same purpose; the old endpoint will be maintained until declared [deprecated](#deprecation-policy). + +The following changes are considered to be backwards compatible: + +- Adding new API endpoints. +- Adding new attributes, links, or relationships to existing API requests and responses. +- Adding new optional query parameters to existing API requests. + +Security vulnerabilities are an exception to this stability policy; we will make backwards incompatible changes to stable endpoints if it is necessary to protect our security or the security of our users. + +Endpoints that are in beta are subject to change without notice. + +## Deprecation Policy + +The deprecation policy provides users the opportunity to continue to consume API endpoints for a period of time after they have been superseded. Deprecation notices for endpoints should be readily available through various channels of communication, including documentation and HTTP responses. An endpoint should be available for at least three (3) months from the date on which it has been declared deprecated. (This time is cited as a minimum; endpoint availability may be longer based on contracted agreements.) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/state-version-outputs.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/state-version-outputs.mdx new file mode 100644 index 000000000..cb5ef168b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/state-version-outputs.mdx @@ -0,0 +1,244 @@ +--- +page_title: /state-version-outputs API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/state-version-outputs` endpoint to read + the outputs from a specified Terraform state version or a workspace's current + outputs. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# State version outputs API reference + +State version outputs are the [output values](/terraform/language/values/outputs) from a Terraform state file. They include +the name and value of the output, as well as a sensitive boolean if the value should be hidden by default in UIs. + +~> **Important:** The state version outputs for a state version (as well as some other information about it) might be **populated asynchronously** by HCP Terraform. These values might not be immediately available after the state version is uploaded. The `resources-processed` property on the associated [state version object](/terraform/enterprise/api-docs/state-versions) indicates whether or not HCP Terraform has finished any necessary asynchronous processing. If you need to use these values, be sure to wait for `resources-processed` to become `true` before assuming that the values are in fact empty. + +## List State Version Outputs + +`GET /state-versions/:state_version_id/outputs` + +Listing state version outputs requires permission to read state outputs for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +| Parameter | Description | +| ------------------- | ------------------------------------ | +| `:state_version_id` | The ID of the desired state version. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Successfully returned a list of outputs for the given state version. | +| [404][] | [JSON API error object][] | State version not found, or user unauthorized to perform action. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 state version outputs per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/state-versions/sv-SDboVZC8TCxXEneJ/outputs +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "wsout-xFAmCR3VkBGepcee", + "type": "state-version-outputs", + "attributes": { + "name": "fruits", + "sensitive": false, + "type": "array", + "value": [ + "apple", + "strawberry", + "blueberry", + "rasberry" + ], + "detailed_type": [ + "tuple", + [ + "string", + "string", + "string", + "string" + ] + ] + }, + "links": { + "self": "/api/v2/state-version-outputs/wsout-xFAmCR3VkBGepcee" + } + }, + { + "id": "wsout-vspuB754AUNkfxwo", + "type": "state-version-outputs", + "attributes": { + "name": "vegetables", + "sensitive": false, + "type": "array", + "value": [ + "carrots", + "potato", + "tomato", + "onions" + ], + "detailed_type": [ + "tuple", + [ + "string", + "string", + "string", + "string" + ] + ] + }, + "links": { + "self": "/api/v2/state-version-outputs/wsout-vspuB754AUNkfxwo" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/state-versions/sv-SVB5wMrDL1XUgJ4G/outputs?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/state-versions/sv-SVB5wMrDL1XUgJ4G/outputs?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/state-versions/sv-SVB5wMrDL1XUgJ4G/outputs?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 2 + } + } +} +``` + +## Show a State Version Output + +`GET /state-version-outputs/:state_version_output_id` + +| Parameter | Description | +| -------------------------- | ------------------------------------------- | +| `:state_version_output_id` | The ID of the desired state version output. | + +State version output IDs must be obtained from a [state version object](/terraform/enterprise/api-docs/state-versions). When requesting a state version, you can optionally add `?include=outputs` to include full details for all of that state version's outputs. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "state-version-outputs"`) | Success. | +| [404][] | [JSON API error object][] | State version output not found or user not authorized. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + https://app.terraform.io/api/v2/state-version-outputs/wsout-J2zM24JPFbfc7bE5 +``` + +### Sample Response + +```json +{ + "data": { + "id": "wsout-J2zM24JPFbfc7bE5", + "type": "state-version-outputs", + "attributes": { + "name": "flavor", + "sensitive": false, + "type": "string", + "value": "Peanut Butter", + "detailed-type": "string" + }, + "links": { + "self": "/api/v2/state-version-outputs/wsout-J2zM24JPFbfc7bE5" + } + } +} +``` + +## Show Current State Version Outputs for a Workspace + +This endpoint allows organization users, who do not have permissions to read state versions, to fetch the latest [output values](/terraform/language/values/outputs) for a workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +-> **Note:** Sensitive values are not revealed and will be returned as `null`. To fetch an output including sensitive values see [Show a State Version Output](/terraform/enterprise/api-docs/state-version-outputs#show-a-state-version-output). + +`GET /workspaces/:workspace_id/current-state-version-outputs` + +| Parameter | Description | +| --------------- | --------------------------------------------- | +| `:workspace_id` | The ID of the workspace to read outputs from. | + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "state-version-outputs"`) | Successfully returned a list of outputs for the given workspace. | +| [404][] | [JSON API error object][] | State version outputs not found or user not authorized. | +| [503][] | [JSON API error object][] | State version outputs are being processed and are not ready. Retry the request. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-G4zM299PFbfc10E5/current-state-version-outputs +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "wsout-J2zM24JPFbfc7bE5", + "type": "state-version-outputs", + "attributes": { + "name": "flavor", + "sensitive": false, + "type": "string", + "value": "Peanut Butter", + "detailed-type": "string" + }, + "links": { + "self": "/api/v2/state-version-outputs/wsout-J2zM24JPFbfc7bE5" + } + }, + { + "id": "wsout-FLzM23Gcd5f37bE5", + "type": "state-version-outputs", + "attributes": { + "name": "recipe", + "sensitive": true, + "type": "string", + "value": "Don Douglas' Peanut Butter Frenzy", + "detailed-type": "string" + }, + "links": { + "self": "/api/v2/state-version-outputs/wsout-FLzM23Gcd5f37bE5" + } + } + ] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/state-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/state-versions.mdx new file mode 100644 index 000000000..9e8873612 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/state-versions.mdx @@ -0,0 +1,1241 @@ +--- +page_title: /state-versions API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/state-versions` endpoint to read, create, + upload, fetch, rollback, delete, and mark state versions for garbage + collection. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# State versions API reference + +## Attributes + +State version API objects represent an instance of Terraform state data, but do not directly contain the stored state. Instead, they contain information about the state, its properties, and its contents, and include one or more URLs from which the state can be downloaded. + +Some of the information returned in a state version API object might be **populated asynchronously** by HCP Terraform. This includes resources, modules, providers, and the [state version outputs](/terraform/enterprise/api-docs/state-version-outputs) associated with the state version. These values might not be immediately available after the state version is uploaded. The `resources-processed` property on the state version object indicates whether or not HCP Terraform has finished any necessary asynchronous processing. If you need to use these values, be sure to wait for `resources-processed` to become `true` before assuming that the values are in fact empty. + +| Attribute | Description | +| -------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `billable-rum-count` | Count of billable Resources Under Management (RUM). Only present for organization members on HCP Terraform RUM plans with visibility of billable RUM usage. | +| `hosted-json-state-download-url` | A URL from which you can download the state data in a [stable format](/terraform/internals/json-format) appropriate for external integrations to consume. Only available if the state was created by Terraform 1.3+. | +| `hosted-state-download-url` | A URL from which you can download the raw state data, in the format used internally by Terraform. | +| `hosted-json-state-upload-url` | A URL to which you can upload state data in a [stable format](/terraform/internals/json-format) appropriate for external integrations to consume. You can upload JSON state content once per state version. | +| `hosted-state-upload-url` | A URL to which you can upload state data in the format used Terraform uses internally. You can upload state data once per state version. | +| `modules` | Extracted information about the Terraform modules in this state data. Populated asynchronously. | +| `providers` | Extracted information about the Terraform providers used for resources in this state data. Populated asynchronously. | +| `intermediate` | A boolean flag that indicates the state version is a snapshot and not yet set as the current state version for a workspace. The last intermediate state version becomes the current state version when the workspace is unlocked. Not yet supported in Terraform Enterprise. | +| `resources` | Extracted information about the resources in this state data. Populated asynchronously. | +| `resources-processed` | A Boolean flag indicating whether HCP Terraform has finished asynchronously extracting outputs, resources, and other information about this state data. | +| `serial` | The serial number of this state instance, which increases every time Terraform creates new state in the workspace. | +| `state-version` | The version of the internal state format used for this state. Different Terraform versions read and write different format versions, but it only changes infrequently. | +| `status` | Indicates a state version's content upload [status](/terraform/enterprise/api-docs/state-versions#state-version-status). This status can be `pending`, `finalized` or `discarded`. | +| `terraform-version` | The Terraform version that created this state. Populated asynchronously. | +| `vcs-commit-sha` | The SHA of the configuration commit used in the Terraform run that produced this state. Only present if the workspace is connected to a VCS repository. | +| `vcs-commit-url` | A link to the configuration commit used in the Terraform run that produced this state. Only present if the workspace is connected to a VCS repository. | + +### State Version Status + +The state version status is found in `data.attributes.status`, and you can reference the following list of possible statuses. +A state version created through the API or CLI will only be listed in the UI if it is has a `finalized` status. + +| State | Description | +| ---------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `pending` | Indicates that a state version has been created but the state data is not encoded within the request. Pending state versions do not contain state data and do not appear in the UI. You cannot unlock the workspace until the latest state version is finalized. | +| `finalized` | Indicates that the state version has been successfully uploaded to HCP Terraform or that the state version was created with a valid `state` attribute. | +| `discarded` | The state version was discarded because it was superseded by a newer state version before it could be uploaded. | +| `backing_data_soft_deleted` | The backing files associated with this state version are marked for garbage collection. Terraform permanently deletes backing files associated with this state version after a set number of days, but you can restore the backing data associated with it before it is permanently deleted. | +| `backing_data_permanently_deleted` | The backing files associated with this state version have been permanently deleted and can no longer be restored. | + +## Create a State Version + +> **Hands-on:** Try the [Version Remote State with the HCP Terraform API](/terraform/tutorials/cloud/cloud-state-api) tutorial to download a remote state file and use the Terraform API to create a new state version. + +`POST /workspaces/:workspace_id/state-versions` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to create the new state version in. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +Creates a state version and sets it as the current state version for the given workspace. The workspace must be locked by the user creating a state version. The workspace may be locked [with the API](/terraform/enterprise/api-docs/workspaces#lock-a-workspace) or [with the UI](/terraform/enterprise/workspaces/settings#locking). This is most useful for migrating existing state from Terraform Community edition into a new HCP Terraform workspace. + +Creating state versions requires permission to read and write state versions for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +!> **Warning:** Use caution when uploading state to workspaces that have already performed Terraform runs. Replacing state improperly can result in orphaned or duplicated infrastructure resources. + +-> **Note:** For Free Tier organizations, HCP Terraform always retains at least the last 100 states (across all workspaces) and at least the most recent state for every workspace. Additional states beyond the last 100 are retained for six months, and are then deleted. + +-> **Note:** You cannot access this endpoint with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ------------------------- | ----------------------------------------------------------------- | +| [201][] | [JSON API document][] | Successfully created a state version. | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action. | +| [409][] | [JSON API error object][] | Conflict; check the error object for more information. | +| [412][] | [JSON API error object][] | Precondition failed; check the error object for more information. | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.). | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------ | ------- | --------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"state-versions"`. | +| `data.attributes.serial` | integer | | The serial of the state version. Must match the serial value extracted from the raw state file. | +| `data.attributes.md5` | string | | An MD5 hash of the raw state version. | +| `data.attributes.state` | string | (nothing) | **Optional** Base64 encoded raw state file. If omitted, you must use the upload method below to complete the state version creation. The workspace may not be unlocked normally until the state version is uploaded. | +| `data.attributes.lineage` | string | (nothing) | **Optional** Lineage of the state version. Should match the lineage extracted from the raw state file. Early versions of terraform did not have the concept of lineage, so this is an optional attribute. | +| `data.attributes.json-state` | string | (nothing) | **Optional** Base64 encoded json state, as expressed by `terraform show -json`. See [JSON Output Format](/terraform/internals/json-format) for more details. | +| `data.attributes.json-state-outputs` | string | (nothing) | **Optional** Base64 encoded output values as represented by `terraform show -json` (the contents of the values/outputs key). If provided, the workspace outputs populate immediately. If omitted, HCP Terraform populates the workspace outputs from the given state after a short time. | +| `data.relationships.run.data.id` | string | (nothing) | **Optional** The ID of the run to associate with the state version. | + +### Sample Payload + +```json +{ + "data": { + "type":"state-versions", + "attributes": { + "serial": 1, + "md5": "d41d8cd98f00b204e9800998ecf8427e", + "lineage": "871d1b4a-e579-fb7c-ffdb-f0c858a647a7", + "state": "...", + "json-state": "...", + "json-state-outputs": "..." + }, + "relationships": { + "run": { + "data": { + "type": "runs", + "id": "run-bWSq4YeYpfrW4mx7" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-6fHMCom98SDXSQUv/state-versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "sv-DmoXecHePnNznaA4", + "type": "state-versions", + "attributes": { + "vcs-commit-sha": null, + "vcs-commit-url": null, + "created-at": "2018-07-12T20:32:01.490Z", + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/f55b739b-ff03-4716-b436-726466b96dc4", + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/4fde7951-93c0-4414-9a40-f3abc4bac490", + "hosted-state-upload-url": null, + "hosted-json-state-upload-url": null, + "status": "finalized", + "intermediate": true, + "serial": 1 + }, + "links": { + "self": "/api/v2/state-versions/sv-DmoXecHePnNznaA4" + } + } +} +``` + +## Upload State and JSON State + + You can upload state version content in the same request when creating a state version. However, we _strongly_ recommend that you upload content separately. + +`PUT https://archivist.terraform.io/v1/object/` + +HCP Terraform returns a `hosted-state-upload-url` or `hosted-json-state-upload-url` returned when you create a `state-version`. Once you upload state content, this URL is hidden on the resource and _no longer available_. + +### Sample Request + +In the below example, `@filename` is the name of Terraform state file you wish to upload. + +```shell +curl \ + --header "Content-Type: application/octet-stream" \ + --request PUT \ + --data-binary @filename \ + https://archivist.terraform.io/v1/object/4c44d964-eba7-4dd5-ad29-1ece7b99e8da +``` + +## List State Versions for a Workspace + +`GET /state-versions` + +Listing state versions requires permission to read state versions for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ---------------------------- | -------------------------------------------------------------------------------------- | +| `filter[workspace][name]` | **Required** The name of one workspace to list versions for. | +| `filter[organization][name]` | **Required** The name of the organization that owns the desired workspace. | +| `filter[status]` | **Optional.** Filter state versions by status: `pending`, `finalized`, or `discarded`. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 state versions per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + "https://app.terraform.io/api/v2/state-versions?filter%5Bworkspace%5D%5Bname%5D=my-workspace&filter%5Borganization%5D%5Bname%5D=my-organization" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "sv-g4rqST72reoHMM5a", + "type": "state-versions", + "attributes": { + "created-at": "2021-06-08T01:22:03.794Z", + "size": 940, + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-state-upload-url": null, + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-json-state-upload-url": null, + "status": "finalized", + "intermediate": false, + "modules": { + "root": { + "null-resource": 1, + "data.terraform-remote-state": 1 + } + }, + "providers": { + "provider[\"terraform.io/builtin/terraform\"]": { + "data.terraform-remote-state": 1 + }, + "provider[\"registry.terraform.io/hashicorp/null\"]": { + "null-resource": 1 + } + }, + "resources": [ + { + "name": "other_username", + "type": "data.terraform_remote_state", + "count": 1, + "module": "root", + "provider": "provider[\"terraform.io/builtin/terraform\"]" + }, + { + "name": "random", + "type": "null_resource", + "count": 1, + "module": "root", + "provider": "provider[\"registry.terraform.io/hashicorp/null\"]" + } + ], + "resources-processed": true, + "serial": 9, + "state-version": 4, + "terraform-version": "0.15.4", + "vcs-commit-url": "https://gitlab.com/my-organization/terraform-test/-/commit/abcdef12345", + "vcs-commit-sha": "abcdef12345" + }, + "relationships": { + "run": { + "data": { + "id": "run-YfmFLWpgTv31VZsP", + "type": "runs" + } + }, + "created-by": { + "data": { + "id": "user-onZs69ThPZjBK2wo", + "type": "users" + }, + "links": { + "self": "/api/v2/users/user-onZs69ThPZjBK2wo", + "related": "/api/v2/runs/run-YfmFLWpgTv31VZsP/created-by" + } + }, + "workspace": { + "data": { + "id": "ws-noZcaGXsac6aZSJR", + "type": "workspaces" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-V22qbeM92xb5mw9n", + "type": "state-version-outputs" + }, + { + "id": "wsout-ymkuRnrNFeU5wGpV", + "type": "state-version-outputs" + }, + { + "id": "wsout-v82BjkZnFEcscipg", + "type": "state-version-outputs" + } + ] + } + }, + "links": { + "self": "/api/v2/state-versions/sv-g4rqST72reoHMM5a" + } + }, + { + "id": "sv-QYKf6GvNv75ZPTBr", + "type": "state-versions", + "attributes": { + "created-at": "2021-06-01T21:40:25.941Z", + "size": 819, + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-state-upload-url": null, + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-json-state-upload-url": null, + "status": "finalized", + "intermediate": false, + "modules": { + "root": { + "data.terraform-remote-state": 1 + } + }, + "providers": { + "provider[\"terraform.io/builtin/terraform\"]": { + "data.terraform-remote-state": 1 + } + }, + "resources": [ + { + "name": "other_username", + "type": "data.terraform_remote_state", + "count": 1, + "module": "root", + "provider": "provider[\"terraform.io/builtin/terraform\"]" + } + ], + "resources-processed": true, + "serial": 8, + "state-version": 4, + "terraform-version": "0.15.4", + "vcs-commit-url": "https://gitlab.com/my-organization/terraform-test/-/commit/12345abcdef", + "vcs-commit-sha": "12345abcdef" + }, + "relationships": { + "run": { + "data": { + "id": "run-cVtxks6R8wsjCZMD", + "type": "runs" + } + }, + "created-by": { + "data": { + "id": "user-onZs69ThPZjBK2wo", + "type": "users" + }, + "links": { + "self": "/api/v2/users/user-onZs69ThPZjBK2wo", + "related": "/api/v2/runs/run-YfmFLWpgTv31VZsP/created-by" + } + }, + "workspace": { + "data": { + "id": "ws-noZcaGXsac6aZSJR", + "type": "workspaces" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-MmqMhmht6jFmLRvh", + "type": "state-version-outputs" + }, + { + "id": "wsout-Kuo9TCHg3oDLDQqa", + "type": "state-version-outputs" + } + ] + } + }, + "links": { + "self": "/api/v2/state-versions/sv-QYKf6GvNv75ZPTBr" + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/state-versions?filter%5Borganization%5D%5Bname%5D=hashicorp&filter%5Bworkspace%5D%5Bname%5D=my-workspace&page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/state-versions?filter%5Borganization%5D%5Bname%5D=hashicorp&filter%5Bworkspace%5D%5Bname%5D=my-workspace&page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io.io/api/v2/state-versions?filter%5Borganization%5D%5Bname%5D=hashicorp&filter%5Bworkspace%5D%5Bname%5D=my-workspace&page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 10 + } + } +} +``` + +## Fetch the Current State Version for a Workspace + +`GET /workspaces/:workspace_id/current-state-version` + +| Parameter | Description | +| --------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The ID for the workspace whose current state version you want to fetch. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +Fetches the current state version for the given workspace. This state version +will be the input state when running terraform operations. + +Viewing state versions requires permission to read state versions for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Successfully returned current state version for the given workspace. | +| [404][] | [JSON API error object][] | Workspace not found, workspace does not have a current state version, or user unauthorized to perform action. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-6fHMCom98SDXSQUv/current-state-version +``` + +### Sample Response + +```json +{ + "data": { + "id": "sv-g4rqST72reoHMM5a", + "type": "state-versions", + "attributes": { + "billable-rum-count": 0, + "created-at": "2021-06-08T01:22:03.794Z", + "size": 940, + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-state-upload-url": null, + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-json-state-upload-url": null, + "status": "finalized", + "intermediate": false, + "modules": { + "root": { + "null-resource": 1, + "data.terraform-remote-state": 1 + } + }, + "providers": { + "provider[\"terraform.io/builtin/terraform\"]": { + "data.terraform-remote-state": 1 + }, + "provider[\"registry.terraform.io/hashicorp/null\"]": { + "null-resource": 1 + } + }, + "resources": [ + { + "name": "other_username", + "type": "data.terraform_remote_state", + "count": 1, + "module": "root", + "provider": "provider[\"terraform.io/builtin/terraform\"]" + }, + { + "name": "random", + "type": "null_resource", + "count": 1, + "module": "root", + "provider": "provider[\"registry.terraform.io/hashicorp/null\"]" + } + ], + "resources-processed": true, + "serial": 9, + "state-version": 4, + "terraform-version": "0.15.4", + "vcs-commit-url": "https://gitlab.com/my-organization/terraform-test/-/commit/abcdef12345", + "vcs-commit-sha": "abcdef12345" + }, + "relationships": { + "run": { + "data": { + "id": "run-YfmFLWpgTv31VZsP", + "type": "runs" + } + }, + "created-by": { + "data": { + "id": "user-onZs69ThPZjBK2wo", + "type": "users" + }, + "links": { + "self": "/api/v2/users/user-onZs69ThPZjBK2wo", + "related": "/api/v2/runs/run-YfmFLWpgTv31VZsP/created-by" + } + }, + "workspace": { + "data": { + "id": "ws-noZcaGXsac6aZSJR", + "type": "workspaces" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-V22qbeM92xb5mw9n", + "type": "state-version-outputs" + }, + { + "id": "wsout-ymkuRnrNFeU5wGpV", + "type": "state-version-outputs" + }, + { + "id": "wsout-v82BjkZnFEcscipg", + "type": "state-version-outputs" + } + ] + } + }, + "links": { + "self": "/api/v2/state-versions/sv-g4rqST72reoHMM5a" + } + } +} +``` + +## Show a State Version + +`GET /state-versions/:state_version_id` + +Viewing state versions requires permission to read state versions for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Parameter | Description | +| ------------------- | ------------------------------------ | +| `:state_version_id` | The ID of the desired state version. | + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Successfully returned current state version for the given workspace. | +| [404][] | [JSON API error object][] | Workspace not found, workspace does not have a current state version, or user unauthorized to perform action. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/state-versions/sv-SDboVZC8TCxXEneJ +``` + +### Sample Response + +```json +{ + "data": { + "id": "sv-g4rqST72reoHMM5a", + "type": "state-versions", + "attributes": { + "created-at": "2021-06-08T01:22:03.794Z", + "size": 940, + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-state-upload-url": null, + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-json-state-upload-url": null, + "status": "finalized", + "intermediate": false, + "modules": { + "root": { + "null-resource": 1, + "data.terraform-remote-state": 1 + } + }, + "providers": { + "provider[\"terraform.io/builtin/terraform\"]": { + "data.terraform-remote-state": 1 + }, + "provider[\"registry.terraform.io/hashicorp/null\"]": { + "null-resource": 1 + } + }, + "resources": [ + { + "name": "other_username", + "type": "data.terraform_remote_state", + "count": 1, + "module": "root", + "provider": "provider[\"terraform.io/builtin/terraform\"]" + }, + { + "name": "random", + "type": "null_resource", + "count": 1, + "module": "root", + "provider": "provider[\"registry.terraform.io/hashicorp/null\"]" + } + ], + "resources-processed": true, + "serial": 9, + "state-version": 4, + "terraform-version": "0.15.4", + "vcs-commit-url": "https://gitlab.com/my-organization/terraform-test/-/commit/abcdef12345", + "vcs-commit-sha": "abcdef12345" + }, + "relationships": { + "run": { + "data": { + "id": "run-YfmFLWpgTv31VZsP", + "type": "runs" + } + }, + "created-by": { + "data": { + "id": "user-onZs69ThPZjBK2wo", + "type": "users" + }, + "links": { + "self": "/api/v2/users/user-onZs69ThPZjBK2wo", + "related": "/api/v2/runs/run-YfmFLWpgTv31VZsP/created-by" + } + }, + "workspace": { + "data": { + "id": "ws-noZcaGXsac6aZSJR", + "type": "workspaces" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-V22qbeM92xb5mw9n", + "type": "state-version-outputs" + }, + { + "id": "wsout-ymkuRnrNFeU5wGpV", + "type": "state-version-outputs" + }, + { + "id": "wsout-v82BjkZnFEcscipg", + "type": "state-version-outputs" + } + ] + } + }, + "links": { + "self": "/api/v2/state-versions/sv-g4rqST72reoHMM5a" + } + } +} +``` + +## Rollback to a Previous State Version + +`PATCH /workspaces/:workspace_id/state-versions` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to create the new state version in. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +Creates a state version by duplicating the specified state version and sets it as the current state version for the given workspace. The workspace must be locked by the user creating a state version. The workspace may be locked [with the API](/terraform/enterprise/api-docs/workspaces#lock-a-workspace) or [with the UI](/terraform/enterprise/workspaces/settings#locking). This is most useful for rolling back to a known-good state after an operation such as a Terraform upgrade didn't go as planned. + +Creating state versions requires permission to read and write state versions for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +!> **Warning:** Use caution when rolling back to a previous state. Replacing state improperly can result in orphaned or duplicated infrastructure resources. + +-> **Note:** You cannot access this endpoint with [organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------------------------------------------- | +| [201][] | [JSON API document][] | Successfully rolled back. | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action. | +| [409][] | [JSON API error object][] | Conflict; check the error object for more information. | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.). | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------------------------------------- | ------ | ------- | -------------------------------------------------------------- | +| `data.type` | string | | Must be `"state-versions"`. | +| `data.relationships.rollback-state-version.data.id` | string | | The ID of the state version to use for the rollback operation. | + +### Sample Payload + +```json +{ + "data": { + "type":"state-versions", + "relationships": { + "rollback-state-version": { + "data": { + "type": "state-versions", + "id": "sv-bWfq4Y1YpRKW4mx7" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-6fHMCom98SDXSQUv/state-versions +``` + +### Sample Response + +```json +{ + "data": { + "id": "sv-DmoXecHePnNznaA4", + "type": "state-versions", + "attributes": { + "created-at": "2022-11-22T01:22:03.794Z", + "size": 940, + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-state-upload-url": null, + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-json-state-upload-url": null, + "modules": { + "root": { + "null-resource": 1, + "data.terraform-remote-state": 1 + } + }, + "providers": { + "provider[\"terraform.io/builtin/terraform\"]": { + "data.terraform-remote-state": 1 + }, + "provider[\"registry.terraform.io/hashicorp/null\"]": { + "null-resource": 1 + } + }, + "resources": [ + { + "name": "other_username", + "type": "data.terraform_remote_state", + "count": 1, + "module": "root", + "provider": "provider[\"terraform.io/builtin/terraform\"]" + }, + { + "name": "random", + "type": "null_resource", + "count": 1, + "module": "root", + "provider": "provider[\"registry.terraform.io/hashicorp/null\"]" + } + ], + "resources-processed": true, + "serial": 9, + "state-version": 4, + "terraform-version": "1.3.5" + }, + "relationships": { + "rollback-state-version": { + "data": { + "id": "sv-YfmFLgTv31VZsP", + "type": "state-versions" + } + } + }, + "links": { + "self": "/api/v2/state-versions/sv-DmoXecHePnNznaA4" + } + } +} +``` + +## Mark a State Version for Garbage Collection + + +This endpoint is exclusive to Terraform Enterprise, and not available in HCP Terraform. Learn more about Terraform Enterprise. + + +`POST /api/v2/state-versions/:state_version_id/actions/soft_delete_backing_data` + +This endpoint directs Terraform Enterprise to _soft delete_ the backing files associated with this state version. Soft deletion marks the state version for garbage collection. Terraform permanently deletes state versions after a set number of days unless the state version is restored. Once a state version is soft deleted, any attempts to read the state version will fail. Refer to [State Version Status](#state-version-status) for information about all data states. + +This endpoint can only soft delete state versions that are in an [`finalized` state](#state-version-status) and are not the current state version. Otherwise, calling this endpoint results in an error. + +You must have organization owner permissions to soft delete state versions. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for additional information about permissions. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Parameter | Description | +| ------------------- | ----------------------------------------------------------- | +| `:state_version_id` | The ID of the state version to mark for garbage collection. | + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Terraform successfully marked the data for garbage collection. | +| [400][] | [JSON API error object][] | Terraform failed to transition the state to `backing_data_soft_deleted`. | +| [404][] | [JSON API error object][] | Terraform did not find the state version or the user is not authorized to modify the state version. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/state-versions/sv-ntv3HbhJqvFzamy7/actions/soft_delete_backing_data + --data {"data": {"attributes": {"delete-older-than-n-days": 23}}} +``` + +### Sample Response + +```json +{ + "data": { + "id": "sv-g4rqST72reoHMM5a", + "type": "state-versions", + "attributes": { + "created-at": "2021-06-08T01:22:03.794Z", + "size": 940, + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-state-upload-url": null, + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-json-state-upload-url": null, + "status": "backing_data_soft_deleted", + "intermediate": false, + "delete-older-than-n-days": 23, + "modules": { + "root": { + "null-resource": 1, + "data.terraform-remote-state": 1 + } + }, + "providers": { + "provider[\"terraform.io/builtin/terraform\"]": { + "data.terraform-remote-state": 1 + }, + "provider[\"registry.terraform.io/hashicorp/null\"]": { + "null-resource": 1 + } + }, + "resources": [ + { + "name": "other_username", + "type": "data.terraform_remote_state", + "count": 1, + "module": "root", + "provider": "provider[\"terraform.io/builtin/terraform\"]" + }, + { + "name": "random", + "type": "null_resource", + "count": 1, + "module": "root", + "provider": "provider[\"registry.terraform.io/hashicorp/null\"]" + } + ], + "resources-processed": true, + "serial": 9, + "state-version": 4, + "terraform-version": "0.15.4", + "vcs-commit-url": "https://gitlab.com/my-organization/terraform-test/-/commit/abcdef12345", + "vcs-commit-sha": "abcdef12345" + }, + "relationships": { + "run": { + "data": { + "id": "run-YfmFLWpgTv31VZsP", + "type": "runs" + } + }, + "created-by": { + "data": { + "id": "user-onZs69ThPZjBK2wo", + "type": "users" + }, + "links": { + "self": "/api/v2/users/user-onZs69ThPZjBK2wo", + "related": "/api/v2/runs/run-YfmFLWpgTv31VZsP/created-by" + } + }, + "workspace": { + "data": { + "id": "ws-noZcaGXsac6aZSJR", + "type": "workspaces" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-V22qbeM92xb5mw9n", + "type": "state-version-outputs" + }, + { + "id": "wsout-ymkuRnrNFeU5wGpV", + "type": "state-version-outputs" + }, + { + "id": "wsout-v82BjkZnFEcscipg", + "type": "state-version-outputs" + } + ] + } + }, + "links": { + "self": "/api/v2/state-versions/sv-g4rqST72reoHMM5a" + } + } +} +``` + +## Restore a State Version Marked for Garbage Collection + + +This endpoint is exclusive to Terraform Enterprise, and not available in HCP Terraform. Learn more about Terraform Enterprise. + + +`POST /api/v2/state-versions/:state_version_id/actions/restore_backing_data` + +This endpoint directs Terraform Enterprise to restore backing files associated with this state version. This endpoint can only restore state versions that are not in a [`backing_data_permanently_deleted` state](#state-version-status). Terraform restores applicable state versions back to their `finalized` state. Otherwise, calling this endpoint results in an error. + +You must have organization owner permissions to restore state versions. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for additional information about permissions. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Parameter | Description | +| ------------------- | --------------------------------------- | +| `:state_version_id` | The ID of the state version to restore. | + +| Status | Response | Reason | +| ------- | ------------------------- | --------------------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Terraform successfully initiated the restore process. | +| [400][] | [JSON API error object][] | Terraform failed to transition the state to `finalized`. | +| [404][] | [JSON API error object][] | Terraform did not find the state version or the user is not authorized to modify the state version. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/state-versions/sv-ntv3HbhJqvFzamy7/actions/restore_backing_data +``` + +### Sample Response + +```json +{ + "data": { + "id": "sv-g4rqST72reoHMM5a", + "type": "state-versions", + "attributes": { + "created-at": "2021-06-08T01:22:03.794Z", + "size": 940, + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-state-upload-url": null, + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-json-state-upload-url": null, + "status": "uploaded", + "intermediate": false, + "modules": { + "root": { + "null-resource": 1, + "data.terraform-remote-state": 1 + } + }, + "providers": { + "provider[\"terraform.io/builtin/terraform\"]": { + "data.terraform-remote-state": 1 + }, + "provider[\"registry.terraform.io/hashicorp/null\"]": { + "null-resource": 1 + } + }, + "resources": [ + { + "name": "other_username", + "type": "data.terraform_remote_state", + "count": 1, + "module": "root", + "provider": "provider[\"terraform.io/builtin/terraform\"]" + }, + { + "name": "random", + "type": "null_resource", + "count": 1, + "module": "root", + "provider": "provider[\"registry.terraform.io/hashicorp/null\"]" + } + ], + "resources-processed": true, + "serial": 9, + "state-version": 4, + "terraform-version": "0.15.4", + "vcs-commit-url": "https://gitlab.com/my-organization/terraform-test/-/commit/abcdef12345", + "vcs-commit-sha": "abcdef12345" + }, + "relationships": { + "run": { + "data": { + "id": "run-YfmFLWpgTv31VZsP", + "type": "runs" + } + }, + "created-by": { + "data": { + "id": "user-onZs69ThPZjBK2wo", + "type": "users" + }, + "links": { + "self": "/api/v2/users/user-onZs69ThPZjBK2wo", + "related": "/api/v2/runs/run-YfmFLWpgTv31VZsP/created-by" + } + }, + "workspace": { + "data": { + "id": "ws-noZcaGXsac6aZSJR", + "type": "workspaces" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-V22qbeM92xb5mw9n", + "type": "state-version-outputs" + }, + { + "id": "wsout-ymkuRnrNFeU5wGpV", + "type": "state-version-outputs" + }, + { + "id": "wsout-v82BjkZnFEcscipg", + "type": "state-version-outputs" + } + ] + } + }, + "links": { + "self": "/api/v2/state-versions/sv-g4rqST72reoHMM5a" + } + } +} +``` + +## Permanently Delete a State Version + + +This endpoint is exclusive to Terraform Enterprise, and not available in HCP Terraform. Learn more about Terraform Enterprise. + + +`POST /api/v2/state-versions/:state_version_id/actions/permanently_delete_backing_data` + +This endpoint directs Terraform Enterprise to permanently delete backing files associated with this state version. This endpoint can only permanently delete state versions that are in an [`backing_data_soft_deleted` state](#state-version-status) and are not the current state version. Otherwise, calling this endpoint results in an error. + +You must have organization owner permissions to permanently delete state versions. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for additional information about permissions. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Parameter | Description | +| ------------------- | -------------------------------------------------- | +| `:state_version_id` | The ID of the state version to permanently delete. | + +| Status | Response | Reason | +| ------- | ------------------------- | -------------------------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Terraform deleted the data permanently. | +| [400][] | [JSON API error object][] | Terraform failed to transition the state to `backing_data_permanently_deleted`. | +| [404][] | [JSON API error object][] | Terraform did not find the state version or the user is not authorized to modify the state version data. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/state-versions/sv-ntv3HbhJqvFzamy7/actions/permanently_delete_backing_data +``` + +### Sample Response + +```json +{ + "data": { + "id": "sv-g4rqST72reoHMM5a", + "type": "state-versions", + "attributes": { + "created-at": "2021-06-08T01:22:03.794Z", + "size": 940, + "hosted-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-state-upload-url": null, + "hosted-json-state-download-url": "https://archivist.terraform.io/v1/object/...", + "hosted-json-state-upload-url": null, + "status": "backing_data_permanently_deleted", + "intermediate": false, + "modules": { + "root": { + "null-resource": 1, + "data.terraform-remote-state": 1 + } + }, + "providers": { + "provider[\"terraform.io/builtin/terraform\"]": { + "data.terraform-remote-state": 1 + }, + "provider[\"registry.terraform.io/hashicorp/null\"]": { + "null-resource": 1 + } + }, + "resources": [ + { + "name": "other_username", + "type": "data.terraform_remote_state", + "count": 1, + "module": "root", + "provider": "provider[\"terraform.io/builtin/terraform\"]" + }, + { + "name": "random", + "type": "null_resource", + "count": 1, + "module": "root", + "provider": "provider[\"registry.terraform.io/hashicorp/null\"]" + } + ], + "resources-processed": true, + "serial": 9, + "state-version": 4, + "terraform-version": "0.15.4", + "vcs-commit-url": "https://gitlab.com/my-organization/terraform-test/-/commit/abcdef12345", + "vcs-commit-sha": "abcdef12345" + }, + "relationships": { + "run": { + "data": { + "id": "run-YfmFLWpgTv31VZsP", + "type": "runs" + } + }, + "created-by": { + "data": { + "id": "user-onZs69ThPZjBK2wo", + "type": "users" + }, + "links": { + "self": "/api/v2/users/user-onZs69ThPZjBK2wo", + "related": "/api/v2/runs/run-YfmFLWpgTv31VZsP/created-by" + } + }, + "workspace": { + "data": { + "id": "ws-noZcaGXsac6aZSJR", + "type": "workspaces" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-V22qbeM92xb5mw9n", + "type": "state-version-outputs" + }, + { + "id": "wsout-ymkuRnrNFeU5wGpV", + "type": "state-version-outputs" + }, + { + "id": "wsout-v82BjkZnFEcscipg", + "type": "state-version-outputs" + } + ] + } + }, + "links": { + "self": "/api/v2/state-versions/sv-g4rqST72reoHMM5a" + } + } +} +``` + +## List State Version Outputs + +The output values from a state version are also available via the API. For details, see the [state version outputs documentation.](/terraform/enterprise/api-docs/state-version-outputs#list-state-version-outputs) + +### Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +- `created_by` - The user that created the state version. For state versions created via a run executed by HCP Terraform, this is an internal user account. +- `run` - The run that created the state version, if applicable. +- `run.created_by` - The user that manually triggered the run, if applicable. +- `run.configuration_version` - The configuration version used in the run. +- `outputs` - The parsed outputs for this state version. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-access.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-access.mdx new file mode 100644 index 000000000..8d873b5c3 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-access.mdx @@ -0,0 +1,433 @@ +--- +page_title: /team-workspaces API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/team-workspaces` endpoint to manage team + access to a workspace. Read, add, update, and remove a team's access to + workspaces. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Team access API reference + + + +-> **Note:** Team management is available in HCP Terraform **Standard** Edition. [Learn more about HCP Terraform pricing here](https://www.hashicorp.com/products/terraform/pricing). + + + +The team access APIs are used to associate a team to permissions on a workspace. A single `team-workspace` resource contains the relationship between the Team and Workspace, including the privileges the team has on the workspace. + +## Resource permissions + +A `team-workspace` resource represents a team's local permissions on a specific workspace. Teams can also have organization-level permissions that grant access to workspaces. HCP Terraform uses the more restrictive access level. For example, a team with the **Manage workspaces** permission enabled has admin access on all workspaces, even if their `team-workspace` on a particular workspace only grants read access. For more information, refer to [Managing Workspace Access](/terraform/enterprise/users-teams-organizations/teams/manage#managing-workspace-access). + +Any member of an organization can view team access relative to their own team memberships, including secret teams of which they are a member. Organization owners and workspace admins can modify team access or view the full set of secret team accesses. The organization token and the owners team token can act as an owner on these endpoints. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for additional information. + +## List Team Access to a Workspace + +`GET /team-workspaces` + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | ---------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "team-workspaces"`) | The request was successful | +| [404][] | [JSON API error object][] | Workspace not found or user unauthorized to perform action | + +### Query Parameters + +[These are standard URL query parameters](/terraform/enterprise/api-docs#query-parameters); remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results. + +| Parameter | Description | +| ----------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `filter[workspace][id]` | **Required.** The workspace ID to list team access for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | +| `page[number]` | **Optional.** | +| `page[size]` | **Optional.** | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + "https://app.terraform.io/api/v2/team-workspaces?filter%5Bworkspace%5D%5Bid%5D=ws-XGA52YVykdTgryTN" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "tws-19iugLwoNgtWZbKP", + "type": "team-workspaces", + "attributes": { + "access": "custom", + "runs": "apply", + "variables": "none", + "state-versions": "none", + "sentinel-mocks": "none", + "workspace-locking": false, + "run-tasks": false + }, + "relationships": { + "team": { + "data": { + "id": "team-DBycxkdQrGFf5zEM", + "type": "teams" + }, + "links": { + "related": "/api/v2/teams/team-DBycxkdQrGFf5zEM" + } + }, + "workspace": { + "data": { + "id": "ws-XGA52YVykdTgryTN", + "type": "workspaces" + }, + "links": { + "related": "/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self": "/api/v2/team-workspaces/tws-19iugLwoNgtWZbKP" + } + } + ] +} +``` + +## Show a Team Access relationship + +`GET /team-workspaces/:id` + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | ------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "team-workspaces"`) | The request was successful | +| [404][] | [JSON API error object][] | Team access not found or user unauthorized to perform action | + +| Parameter | Description | +| --------- | -------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the team/workspace relationship. Obtain this from the [list team access action](#list-team-access-to-a-workspace) described above. | + +-> **Note:** As mentioned in [Add Team Access to a Workspace](#add-team-access-to-a-workspace) and [Update Team Access +to a Workspace](#update-team-access-to-a-workspace), several permission attributes are not editable unless `access` is +set to `custom`. When access is `read`, `plan`, `write`, or `admin`, these attributes are read-only and reflect the +implicit permissions granted to the current access level. + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/team-workspaces/tws-s68jV4FWCDwWvQq8 +``` + +### Sample Response + +```json +{ + "data": { + "id": "tws-s68jV4FWCDwWvQq8", + "type": "team-workspaces", + "attributes": { + "access": "write", + "runs": "apply", + "variables": "write", + "state-versions": "write", + "sentinel-mocks": "read", + "workspace-locking": true, + "run-tasks": false + }, + "relationships": { + "team": { + "data": { + "id": "team-DBycxkdQrGFf5zEM", + "type": "teams" + }, + "links": { + "related": "/api/v2/teams/team-DBycxkdQrGFf5zEM" + } + }, + "workspace": { + "data": { + "id": "ws-XGA52YVykdTgryTN", + "type": "workspaces" + }, + "links": { + "related": "/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self": "/api/v2/team-workspaces/tws-s68jV4FWCDwWvQq8" + } + } +} +``` + +## Add Team Access to a Workspace + +`POST /team-workspaces` + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | ------------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "team-workspaces"`) | The request was successful | +| [404][] | [JSON API error object][] | Workspace or Team not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ---------------------------------------- | ------- | ------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"team-workspaces"`. | +| `data.attributes.access` | string | | The type of access to grant. Valid values are `read`, `plan`, `write`, `admin`, or `custom`. | +| `data.attributes.runs` | string | "read" | If `access` is `custom`, the permission to grant for the workspace's runs. Can only be used when `access` is `custom`. Valid values include `read`, `plan`, or `apply`. | +| `data.attributes.variables` | string | "none" | If `access` is `custom`, the permission to grant for the workspace's variables. Can only be used when `access` is `custom`. Valid values include `none`, `read`, or `write`. | +| `data.attributes.state-versions` | string | "none" | If `access` is `custom`, the permission to grant for the workspace's state versions. Can only be used when `access` is `custom`. Valid values include `none`, `read-outputs`, `read`, or `write`. | +| `data.attributes.sentinel-mocks` | string | "none" | If `access` is `custom`, the permission to grant for the workspace's Sentinel mocks. Can only be used when `access` is `custom`. Valid values include `none`, or `read`. | +| `data.attributes.workspace-locking` | boolean | false | If `access` is `custom`, the permission granting the ability to manually lock or unlock the workspace. Can only be used when `access` is `custom`. | +| `data.attributes.run-tasks` | boolean | false | If `access` is `custom`, this permission allows the team to manage run tasks within the workspace. | +| `data.relationships.workspace.data.type` | string | | Must be `workspaces`. | +| `data.relationships.workspace.data.id` | string | | The workspace ID to which the team is to be added. | +| `data.relationships.team.data.type` | string | | Must be `teams`. | +| `data.relationships.team.data.id` | string | | The ID of the team to add to the workspace. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "access": "custom", + "runs": "apply", + "variables": "none", + "state-versions": "read-outputs", + "plan-outputs": "none", + "sentinel-mocks": "read", + "workspace-locking": false, + "run-tasks": false + }, + "relationships": { + "workspace": { + "data": { + "type": "workspaces", + "id": "ws-XGA52YVykdTgryTN" + } + }, + "team": { + "data": { + "type": "teams", + "id": "team-DBycxkdQrGFf5zEM" + } + } + }, + "type": "team-workspaces" + } +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/team-workspaces +``` + +### Sample Response + +```json +{ + "data": { + "id": "tws-sezDAcCYWLnd3xz2", + "type": "team-workspaces", + "attributes": { + "access": "custom", + "runs": "apply", + "variables": "none", + "state-versions": "read-outputs", + "sentinel-mocks": "read", + "workspace-locking": false, + "run-tasks": false + }, + "relationships": { + "team": { + "data": { + "id": "team-DBycxkdQrGFf5zEM", + "type": "teams" + }, + "links": { + "related": "/api/v2/teams/team-DBycxkdQrGFf5zEM" + } + }, + "workspace": { + "data": { + "id": "ws-XGA52YVykdTgryTN", + "type": "workspaces" + }, + "links": { + "related": "/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self": "/api/v2/team-workspaces/tws-sezDAcCYWLnd3xz2" + } + } +} +``` + +## Update Team Access to a Workspace + +`PATCH /team-workspaces/:id` + +| Status | Response | Reason | +| ------- | ------------------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "team-workspaces"`) | The request was successful | +| [404][] | [JSON API error object][] | Team Access not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | + +| Parameter | | | Description | +| ----------------------------------- | ------- | ------ | -------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | | | The ID of the team/workspace relationship. Obtain this from the [list team access action](#list-team-access-to-a-workspace) described above. | +| `data.attributes.access` | string | | The type of access to grant. Valid values are `read`, `plan`, `write`, `admin`, or `custom`. | +| `data.attributes.runs` | string | "read" | If `access` is `custom`, the permission to grant for the workspace's runs. Can only be used when `access` is `custom`. | +| `data.attributes.variables` | string | "none" | If `access` is `custom`, the permission to grant for the workspace's variables. Can only be used when `access` is `custom`. | +| `data.attributes.state-versions` | string | "none" | If `access` is `custom`, the permission to grant for the workspace's state versions. Can only be used when `access` is `custom`. | +| `data.attributes.sentinel-mocks` | string | "none" | If `access` is `custom`, the permission to grant for the workspace's Sentinel mocks. Can only be used when `access` is `custom`. | +| `data.attributes.workspace-locking` | boolean | false | If `access` is `custom`, the permission granting the ability to manually lock or unlock the workspace. Can only be used when `access` is `custom`. | +| `data.attributes.run-tasks` | boolean | false | If `access` is `custom`, this permission allows the team to manage run tasks within the workspace. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/team-workspaces/tws-s68jV4FWCDwWvQq8 +``` + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "access": "custom", + "state-versions": "none" + } + } +} +``` + +### Sample Response + +```json +{ + "data": { + "id": "tws-s68jV4FWCDwWvQq8", + "type": "team-workspaces", + "attributes": { + "access": "custom", + "runs": "apply", + "variables": "write", + "state-versions": "none", + "sentinel-mocks": "read", + "workspace-locking": true, + "run-tasks": true + }, + "relationships": { + "team": { + "data": { + "id": "team-DBycxkdQrGFf5zEM", + "type": "teams" + }, + "links": { + "related": "/api/v2/teams/team-DBycxkdQrGFf5zEM" + } + }, + "workspace": { + "data": { + "id": "ws-XGA52YVykdTgryTN", + "type": "workspaces" + }, + "links": { + "related": "/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self": "/api/v2/team-workspaces/tws-s68jV4FWCDwWvQq8" + } + } +} +``` + +## Remove Team Access to a Workspace + +`DELETE /team-workspaces/:id` + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------ | +| [204][] | | The Team Access was successfully destroyed | +| [404][] | [JSON API error object][] | Team Access not found or user unauthorized to perform action | + +| Parameter | Description | +| --------- | -------------------------------------------------------------------------------------------------------------------------------------------- | +| `:id` | The ID of the team/workspace relationship. Obtain this from the [list team access action](#list-team-access-to-a-workspace) described above. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/team-workspaces/tws-sezDAcCYWLnd3xz2 +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-members.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-members.mdx new file mode 100644 index 000000000..b3cf58069 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-members.mdx @@ -0,0 +1,249 @@ +--- +page_title: /relationships API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/relationships` endpoints to add and + remove users from teams using an account or organization membership ID. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Team membership API reference + + + +-> **Note:** Team management is available in HCP Terraform **Standard** Edition. Free organizations can also use this API, but can only manage membership of their owners team. [Learn more about HCP Terraform pricing here](https://www.hashicorp.com/products/terraform/pricing). + + + +The Team Membership API is used to add or remove users from teams. The [Team API](/terraform/enterprise/api-docs/teams) is used to create or destroy teams. + +## Organization Membership + +-> **Note:** To add users to a team, they must first receive and accept the invitation to join the organization by email. This process ensures that you do not accidentally add the wrong person by mistyping a username. Refer to [the Organization Memberships API documentation](/terraform/enterprise/api-docs/organization-memberships) for more information. + +## Add a User to Team (With user ID) + +This method adds multiple users to a team using the user ID. Both users and teams must already exist. + +`POST /teams/:team_id/relationships/users` + +| Parameter | Description | +| ---------- | ------------------- | +| `:team_id` | The ID of the team. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ------------------------------------------------ | +| `data[].type` | string | | Must be `"users"`. | +| `data[].id` | string | | The ID of the user you want to add to this team. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "users", + "id": "myuser1" + }, + { + "type": "users", + "id": "myuser2" + } + ] +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/teams/257525/relationships/users +``` + +## Add a User to Team (With organization membership ID) + +This method adds multiple users to a team using the organization membership ID. Unlike the user ID method, the user only needs an invitation to the organization. + +`POST /teams/:team_id/relationships/organization-memberships` + +| Parameter | Description | +| ---------- | ------------------- | +| `:team_id` | The ID of the team. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | -------------------------------------------------- | +| `data[].type` | string | | Must be `"organization-memberships"`. | +| `data[].id` | string | | The organization membership ID of the user to add. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "organization-memberships", + "id": "ou-nX7inDHhmC3quYgy" + }, + { + "type": "organization-memberships", + "id": "ou-tTJph1AQVK5ZmdND" + } + ] +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/teams/257525/relationships/organization-memberships +``` + +## Delete a User from Team (With user ID) + +This method removes multiple users from a team using the user ID. Both users and teams must already exist. This method only removes a user from this team. It does not delete that user overall. + +`DELETE /teams/:team_id/relationships/users` + +| Parameter | Description | +| ---------- | ------------------- | +| `:team_id` | The ID of the team. | + +### Request Body + +This DELETE endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | -------------------------------------------- | +| `data[].type` | string | | Must be `"users"`. | +| `data[].id` | string | | The ID of the user to remove from this team. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "users", + "id": "myuser1" + }, + { + "type": "users", + "id": "myuser2" + } + ] +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/teams/257525/relationships/users +``` + +## Delete a User from Team (With organization membership ID) + +This method removes multiple users from a team using the organization membership ID. This method only removes a user from this team. It does not delete that user overall. + +`DELETE /teams/:team_id/relationships/organization-memberships` + +| Parameter | Description | +| ---------- | ------------------- | +| `:team_id` | The ID of the team. | + +### Request Body + +This DELETE endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ----------------------------------------------------- | +| `data[].type` | string | | Must be `"organization-memberships"`. | +| `data[].id` | string | | The organization membership ID of the user to remove. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "organization-memberships", + "id": "ou-nX7inDHhmC3quYgy" + }, + { + "type": "organization-memberships", + "id": "ou-tTJph1AQVK5ZmdND" + } + ] +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/teams/257525/relationships/organization-memberships +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-tokens.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-tokens.mdx new file mode 100644 index 000000000..ed5921623 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/team-tokens.mdx @@ -0,0 +1,299 @@ +--- +page_title: /teams/authentication-token API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/teams/authentication-token` endpoint to + generate, delete, and list a team's API tokens. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Team tokens API reference + +Team API tokens grant access to a team's workspaces. Each team can have an API token that is not associated with a specific user. You can create and delete team tokens and list an organization's team tokens. + +## Generate a new team token + +Generates a new team token and overrides existing token if one exists. + +| Method | Path | +| :----- | :----------------------------------- | +| POST | /teams/:team_id/authentication-token | + +This endpoint returns the secret text of the new authentication token. You can only access this token when you create it and can not recover it later. + +### Parameters + +- `:team_id` (`string: `) - specifies the team ID for generating the team token + +### Request body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +| Key path | Type | Default | Description | +| ---------------------------- | ------ | ------- | ----------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"authentication-token"`. | +| `data.attributes.expired-at` | string | `null` | The UTC date and time that the Team Token will expire, in ISO 8601 format. If omitted or set to `null` the token will never expire. | + +### Sample payload + +```json +{ + "data": { + "type": "authentication-token", + "attributes": { + "expired-at": "2023-04-06T12:00:00.000Z" + } + } +} +``` + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/teams/team-BUHBEM97xboT8TVz/authentication-token +``` + +### Sample response + +```json +{ + "data": { + "id": "4111797", + "type": "authentication-tokens", + "attributes": { + "created-at": "2017-11-29T19:18:09.976Z", + "last-used-at": null, + "description": null, + "token": "QnbSxjjhVMHJgw.atlasv1.gxZnWIjI5j752DGqdwEUVLOFf0mtyaQ00H9bA1j90qWb254lEkQyOdfqqcq9zZL7Sm0", + "expired-at": "2023-04-06T12:00:00.000Z" + }, + "relationships": { + "team": { + "data": { + "id": "team-Y7RyjccPVBKVEdp7", + "type": "teams" + } + }, + "created-by": { + "data": { + "id": "user-62goNpx1ThQf689e", + "type": "users" + } + } + } + } +} +``` + +## Delete the team token + +| Method | Path | +| :----- | :----------------------------------- | +| DELETE | /teams/:team_id/authentication-token | + +### Parameters + +- `:team_id` (`string: `) - specifies the team_id from which to delete the token + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/teams/team-BUHBEM97xboT8TVz/authentication-token +``` + +## List team tokens + +Lists the [team tokens](/terraform/enterprise/users-teams-organizations/teams#api-tokens) in an organization. + +`GET organizations/:organization_name/team-tokens` + +| Parameter | Description | +| -------------------- | ---------------------------------------------------------------- | +| `:organization_name` | The name of the organization whose team tokens you want to list. | + +This endpoint returns object metadata and does not include secret authentication details of tokens. You can only view a token when you create it and cannot recover it later. + +By default, this endpoint returns tokens by ascending expiration date. + +| Status | Response | Reason | +| ------- | --------------------------------------------- | ---------------------------------------------- | +| [200][] | [JSON API document][] (`type: "team-tokens"`) | The request was successful. | +| [200][] | Empty [JSON API document][] | The specified organization has no team tokens. | +| [404][] | [JSON API error object][] | Organization not found. | + +### Query parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters) and searching with the `q` parameter. Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint returns the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint returns 20 tokens per page. | +| `q` | **Optional.** A search query string. You can search for a team authentication token using the team name. | +| `sort` | **Optional.** Allows sorting the team tokens by `"team-name"`, `"created-by"`, `"expired-at"`, and `"last-used-at"`. Prepending a hyphen to the sort parameter reverses the order. For example, `"-team-name"` sorts by name in reverse alphabetical order. If omitted, the default sort order ascending. | + +### Sample response + +```json +{ + "data": [ + { + "id": "at-TLhN8cc6ro6qYDvp", + "type": "authentication-tokens", + "attributes": { + "created-at": "2024-06-19T18:28:25.267Z", + "last-used-at": null, + "description": null, + "token": null, + "expired-at": "2024-07-19T18:28:25.030Z" + }, + "relationships": { + "team": { + "data": { + "id": "team-Y7RyjccPVBKVEdp7", + "type": "teams" + } + }, + "created-by": { + "data": { + "id": "user-ccU6h629sszLJBpY", + "type": "users" + } + } + } + }, + { + "id": "at-qfc2wqqJ1T5sCamM", + "type": "authentication-tokens", + "attributes": { + "created-at": "2024-06-19T18:44:44.051Z", + "last-used-at": null, + "description": null, + "token": null, + "expired-at": "2024-07-19T18:44:43.818Z" + }, + "relationships": { + "team": { + "data": { + "id": "team-58pFiBffTLMxLphR", + "type": "teams" + } + }, + "created-by": { + "data": { + "id": "user-ccU6h629hhzLJBpY", + "type": "users" + } + } + } + }, + ] +} +``` + +## Show a team token + +Use this endpoint to display a [team token](/terraform/enterprise/users-teams-organizations/teams#api-tokens) for a particular team. + +`GET /teams/:team-id/authentication-token` + +| Parameter | Description | +| ---------- | ------------------- | +| `:team-id` | The ID of the Team. | + +You can also fetch a team token directly by using the token's ID with the `authentication-tokens/` endpoint. + +`GET /authentication-tokens/:token-id` + +| Parameter | Description | +| ----------- | ------------------------- | +| `:token-id` | The ID of the Team Token. | + +The object returned by this endpoint only contains metadata, and does not include the secret text of the authentication token. A token's secret test is only shown upon creation, and cannot be recovered later. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "authentication-tokens"`) | The request was successful | +| [404][] | [JSON API error object][] | Team Token not found, or unauthorized to view the Team Token | + +### Sample request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/teams/team-6yEmxNAhaoQLH1Da/authentication-token +``` + +### Sample response + +```json +{ + "data": { + "id": "at-6yEmxNAhaoQLH1Da", + "type": "authentication-tokens", + "attributes": { + "created-at": "2023-11-25T22:31:30.624Z", + "last-used-at": "2023-11-26T20:34:59.487Z", + "description": null, + "token": null, + "expired-at": "2024-04-06T12:00:00.000Z" + }, + "relationships": { + "team": { + "data": { + "id": "team-LnREdjodkvZFGdXL", + "type": "teams" + } + }, + "created-by": { + "data": { + "id": "user-MA4GL63FmYRpSFxa", + "type": "users" + } + } + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/teams.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/teams.mdx new file mode 100644 index 000000000..1f96792b0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/teams.mdx @@ -0,0 +1,466 @@ +--- +page_title: /teams API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/teams` endpoint to read, create, update, + and delete teams. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Teams API reference + +The Teams API is used to create, edit, and destroy teams as well as manage a team's organization-level permissions. The [Team Membership API](/terraform/enterprise/api-docs/team-members) is used to add or remove users from a team. Use the [Team Access API](/terraform/enterprise/api-docs/team-access) to associate a team with privileges on an individual workspace. + + + +@include 'tfc-package-callouts/team-management.mdx' + + + +Any member of an organization can view visible teams and any secret teams they are a member of. Only organization owners can modify teams or view the full set of secret teams. The organization token and the owners team token can act as an owner on these endpoints. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Organization Membership + +-> **Note:** Users must be invited to join organizations before they can be added to teams. See [the Organization Memberships API documentation](/terraform/enterprise/api-docs/organization-memberships) for more information. Invited users who have not yet accepted will not appear in Teams API responses. + +## List teams + +`GET organizations/:organization_name/teams` + +| Parameter | Description | +| -------------------- | ------------------------------------------------ | +| `:organization_name` | The name of the organization to list teams from. | + +The response may identify HashiCorp API service accounts, for example `api-team_XXXXXX`, as a members of a team. However, API service accounts do not appear in the UI. As a result, there may be differences between the number of team members reported by the UI and the API. For example, the UI may report `0` members on a team when and the API reports `1`. + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| --------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `q` | **Optional.** Allows querying a list of teams by name. This search is case-insensitive. | +| `filter[names]` | **Optional.** If specified, restricts results to a team with a matching name. If multiple comma separated values are specified, teams matching any of the names are returned. | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 teams per page. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/organizations/my-organization/teams +``` + +### Sample Response + +The `sso-team-id` attribute is only returned in Terraform Enterprise 202204-1 and later, or in HCP Terraform. +The `allow-member-token-management` attribute is set to `false` for Terraform Enterprise versions older than 202408-1. + +```json +{ + "data": [ + { + "id": "team-6p5jTwJQXwqZBncC", + "type": "teams", + "attributes": { + "name": "team-creation-test", + "sso-team-id": "cb265c8e41bddf3f9926b2cf3d190f0e1627daa4", + "users-count": 0, + "visibility": "organization", + "allow-member-token-management": true, + "permissions": { + "can-update-membership": true, + "can-destroy": true, + "can-update-organization-access": true, + "can-update-api-token": true, + "can-update-visibility": true + }, + "organization-access": { + "manage-policies": true, + "manage-policy-overrides": false, + "manage-run-tasks": true, + "manage-workspaces": false, + "manage-vcs-settings": false, + "manage-agent-pools": false, + "manage-projects": false, + "read-projects": false, + "read-workspaces": false + } + }, + "relationships": { + "users": { + "data": [] + }, + "authentication-token": { + "meta": {} + } + }, + "links": { + "self": "/api/v2/teams/team-6p5jTwJQXwqZBncC" + } + } + ] +} +``` + +## Create a Team + +`POST /organizations/:organization_name/teams` + +| Parameter | Description | +| -------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization to create the team in. The organization must already exist in the system, and the user must have permissions to create new teams. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "teams"`) | Successfully created a team | +| [400][] | [JSON API error object][] | Invalid `include` parameter | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [500][] | [JSON API error object][] | Failure during team creation | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +-> **Note:** You cannot set `manage-workspaces` to `false` when setting `manage-projects` to `true`, since project permissions cascade down to workspaces. This is also the case for `read-workspaces` and `read-projects`. If `read-projects` is `true`, `read-workspaces` must be `true` as well. + +| Key path | Type | Default | Description | +| ------------------------------------- | ------ | ---------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"teams"`. | +| `data.attributes.name` | string | | The name of the team, which can only include letters, numbers, `-`, and `_`. This will be used as an identifier and must be unique in the organization. | +| `data.attributes.sso-team-id` | string | (nothing) | The unique identifier of the team from the SAML `MemberOf` attribute. Only available in Terraform Enterprise 202204-1 and later, or in HCP Terraform. | +| `data.attributes.organization-access` | object | (nothing) | Settings for the team's organization access. This object can include the `manage-policies`, `manage-policy-overrides`, `manage-run-tasks`, `manage-workspaces`, `manage-vcs-settings`, `manage-agent-pools`, `manage-providers`, `manage-modules`, `manage-projects`, `read-projects`, `read-workspaces`, `manage-membership`, `manage-teams`, and `manage-organization-access` properties with boolean values. All properties default to `false`. | +| `data.attributes.visibility` | string | `"secret"` | The team's visibility. Must be `"secret"` or `"organization"` (visible). | + +### Sample Payload + +```json +{ + "data": { + "type": "teams", + "attributes": { + "name": "team-creation-test", + "sso-team-id": "cb265c8e41bddf3f9926b2cf3d190f0e1627daa4", + "organization-access": { + "manage-workspaces": true + } + } + } +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/teams +``` + +### Sample Response + +The `sso-team-id` attribute is only returned in Terraform Enterprise 202204-1 and later, or in HCP Terraform. + +```json +{ + "data": { + "attributes": { + "name": "team-creation-test", + "sso-team-id": "cb265c8e41bddf3f9926b2cf3d190f0e1627daa4", + "organization-access": { + "manage-policies": false, + "manage-policy-overrides": false, + "manage-run-tasks": false, + "manage-vcs-settings": false, + "manage-agent-pools": false, + "manage-workspaces": true, + "manage-providers": false, + "manage-modules": false, + "manage-projects": false, + "read-projects": false, + "read-workspaces": true, + "manage-membership": false, + "manage-teams": false, + "manage-organization-access": false + }, + "permissions": { + "can-update-membership": true, + "can-destroy": true, + "can-update-organization-access": true, + "can-update-api-token": true, + "can-update-visibility": true + }, + "users-count": 0, + "visibility": "secret", + "allow-member-token-management": true + }, + "id": "team-6p5jTwJQXwqZBncC", + "links": { + "self": "/api/v2/teams/team-6p5jTwJQXwqZBncC" + }, + "relationships": { + "authentication-token": { + "meta": {} + }, + "users": { + "data": [] + } + }, + "type": "teams" + } +} +``` + +## Show Team Information + +`GET /teams/:team_id` + +| Parameter | Description | +| ---------- | ------------------------ | +| `:team_id` | The team ID to be shown. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/teams/team-6p5jTwJQXwqZBncC +``` + +### Sample Response + +The `sso-team-id` attribute is only returned in Terraform Enterprise 202204-1 and later, or in HCP Terraform. + +```json +{ + "data": { + "id": "team-6p5jTwJQXwqZBncC", + "type": "teams", + "attributes": { + "name": "team-creation-test", + "sso-team-id": "cb265c8e41bddf3f9926b2cf3d190f0e1627daa4", + "users-count": 0, + "visibility": "organization", + "allow-member-token-management": true, + "permissions": { + "can-update-membership": true, + "can-destroy": true, + "can-update-organization-access": true, + "can-update-api-token": true, + "can-update-visibility": true + }, + "organization-access": { + "manage-policies": true, + "manage-policy-overrides": false, + "manage-run-tasks": true, + "manage-workspaces": false, + "manage-vcs-settings": false, + "manage-agent-pools": false, + "manage-providers": false, + "manage-modules": false, + "manage-projects": false, + "read-projects": false, + "read-workspaces": false, + "manage-membership": false, + "manage-teams": false, + "manage-organization-access": false + } + }, + "relationships": { + "users": { + "data": [] + }, + "authentication-token": { + "meta": {} + } + }, + "links": { + "self": "/api/v2/teams/team-6p5jTwJQXwqZBncC" + } + } +} +``` + +## Update a Team + +`PATCH /teams/:team_id` + +| Parameter | Description | +| ---------- | -------------------------- | +| `:team_id` | The team ID to be updated. | + +| Status | Response | Reason | +| ------- | --------------------------------------- | -------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "teams"`) | Successfully created a team | +| [400][] | [JSON API error object][] | Invalid `include` parameter | +| [404][] | [JSON API error object][] | Team not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [500][] | [JSON API error object][] | Failure during team creation | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +-> **Note:** You cannot set `manage-workspaces` to `false` when setting `manage-projects` to `true`, since project permissions cascade down to workspaces. This is also the case for `read-workspaces` and `read-projects`. If `read-projects` is `true`, `read-workspaces` must be `true` as well. + +| Key path | Type | Default | Description | +| --------------------------------------------- | ------- | ---------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"teams"`. | +| `data.attributes.name` | string | (previous value) | The name of the team, which can only include letters, numbers, `-`, and `_`. This will be used as an identifier and must be unique in the organization. | +| `data.attributes.sso-team-id` | string | (previous value) | The unique identifier of the team from the SAML `MemberOf` attribute. Only available in Terraform Enterprise 202204-1 and later, or in HCP Terraform. | +| `data.attributes.organization-access` | object | (previous value) | Settings for the team's organization access. This object can include the `manage-policies`, `manage-policy-overrides`, `manage-run-tasks`, `manage-workspaces`, `manage-vcs-settings`, `manage-agent-pools`, `manage-providers`, `manage-modules`, `manage-projects`, `read-projects`, `read-workspaces`, `manage-membership`, `manage-teams`, and `manage-organization-access` properties with boolean values. All properties default to `false`. | +| `data.attributes.visibility` | string | (previous value) | The team's visibility. Must be `"secret"` or `"organization"` (visible). | +| `data.attributes.allow-team-token-management` | boolean | (previous value) | The ability to enable and disable team token management for a team. Defaults to true. | + +### Sample Payload + +```json +{ + "data": { + "type": "teams", + "attributes": { + "visibility": "organization", + "allow-member-token-management": true, + "organization-access": { + "manage-vcs-settings": true + } + } + } +} +``` + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/teams/team-6p5jTwJQXwqZBncC +``` + +### Sample Response + +The `sso-team-id` attribute is only returned in Terraform Enterprise 202204-1 and later, or in HCP Terraform. + +```json +{ + "data": { + "attributes": { + "name": "team-creation-test", + "sso-team-id": "cb265c8e41bddf3f9926b2cf3d190f0e1627daa4", + "organization-access": { + "manage-policies": false, + "manage-policy-overrides": false, + "manage-run-tasks": true, + "manage-vcs-settings": true, + "manage-agent-pools": false, + "manage-workspaces": true, + "manage-providers": false, + "manage-modules": false, + "manage-projects": false, + "read-projects": false, + "read-workspaces": true, + "manage-membership": false, + "manage-teams": false, + "manage-organization-access": false + }, + "visibility": "organization", + "allow-member-token-management": true, + "permissions": { + "can-update-membership": true, + "can-destroy": true, + "can-update-organization-access": true, + "can-update-api-token": true, + "can-update-visibility": true + }, + "users-count": 0 + }, + "id": "team-6p5jTwJQXwqZBncC", + "links": { + "self": "/api/v2/teams/team-6p5jTwJQXwqZBncC" + }, + "relationships": { + "authentication-token": { + "meta": {} + }, + "users": { + "data": [] + } + }, + "type": "teams" + } +} +``` + +## Delete a Team + +`DELETE /teams/:team_id` + +| Parameter | Description | +| ---------- | -------------------------- | +| `:team_id` | The team ID to be deleted. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/teams/team-6p5jTwJQXwqZBncC +``` + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +- `users` (`string`) - Returns the full user record for every member of a team. +- `organization-memberships` (`string`) - Returns the full organization membership record for every member of a team. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/user-tokens.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/user-tokens.mdx new file mode 100644 index 000000000..a26352ea0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/user-tokens.mdx @@ -0,0 +1,286 @@ +--- +page_title: /users/authentication-tokens API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/users/authentication-tokens` endpoint to + read, create, and destroy user-specific API tokens. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# User tokens API reference + +## List User Tokens + +`GET /users/:user_id/authentication-tokens` + +| Parameter | Description | +| ---------- | ------------------- | +| `:user_id` | The ID of the User. | + +Use the [Account API](/terraform/enterprise/api-docs/account) to find your own user ID. + +The objects returned by this endpoint only contain metadata, and do not include the secret text of any authentication tokens. A token is only shown upon creation, and cannot be recovered later. + +-> **Note:** You must access this endpoint with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens), and it will only return useful data for that token's user account. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------------------------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "authentication-tokens"`) | The request was successful | +| [200][] | Empty [JSON API document][] (no type) | User has no authentication tokens, or request was made by someone other than the user | +| [404][] | [JSON API error object][] | User not found | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. If neither pagination query parameters are provided, the endpoint will not be paginated and will return all results. + +| Parameter | Description | +| -------------- | --------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 user tokens per page. | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/users/user-MA4GL63FmYRpSFxa/authentication-tokens +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "at-QmATJea6aWj1xR2t", + "type": "authentication-tokens", + "attributes": { + "created-at": "2018-11-06T22:56:10.203Z", + "last-used-at": null, + "description": null, + "token": null, + "expired-at": null + }, + "relationships": { + "created-by": { + "data": null + } + } + }, + { + "id": "at-6yEmxNAhaoQLH1Da", + "type": "authentication-tokens", + "attributes": { + "created-at": "2018-11-25T22:31:30.624Z", + "last-used-at": "2018-11-26T20:27:54.931Z", + "description": "api", + "token": null, + "expired-at": "2023-04-06T12:00:00.000Z" + }, + "relationships": { + "created-by": { + "data": { + "id": "user-MA4GL63FmYRpSFxa", + "type": "users" + } + } + } + } + ] +} +``` + +## Show a User Token + +`GET /authentication-tokens/:id` + +| Parameter | Description | +| --------- | ------------------------- | +| `:id` | The ID of the User Token. | + +The objects returned by this endpoint only contain metadata, and do not include the secret text of any authentication tokens. A token is only shown upon creation, and cannot be recovered later. + +-> **Note:** You must access this endpoint with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens), and it will only return useful data for that token's user account. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | ------------------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "authentication-tokens"`) | The request was successful | +| [404][] | [JSON API error object][] | User Token not found, or unauthorized to view the User Token | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/authentication-tokens/at-6yEmxNAhaoQLH1Da +``` + +### Sample Response + +```json +{ + "data": { + "id": "at-6yEmxNAhaoQLH1Da", + "type": "authentication-tokens", + "attributes": { + "created-at": "2018-11-25T22:31:30.624Z", + "last-used-at": "2018-11-26T20:34:59.487Z", + "description": "api", + "token": null, + "expired-at": "2023-04-06T12:00:00.000Z" + }, + "relationships": { + "created-by": { + "data": { + "id": "user-MA4GL63FmYRpSFxa", + "type": "users" + } + } + } + } +} +``` + +## Create a User Token + +`POST /users/:user_id/authentication-tokens` + +| Parameter | Description | +| ---------- | ------------------- | +| `:user_id` | The ID of the User. | + +Use the [Account API](/terraform/enterprise/api-docs/account) to find your own user ID. + +This endpoint returns the secret text of the created authentication token. A token is only shown upon creation, and cannot be recovered later. + +-> **Note:** You must access this endpoint with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens), and it will only create new tokens for that token's user account. + +| Status | Response | Reason | +| ------- | ------------------------------------------------------- | -------------------------------------------------------------- | +| [201][] | [JSON API document][] (`type: "authentication-tokens"`) | The request was successful | +| [404][] | [JSON API error object][] | User not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Malformed request body (missing attributes, wrong types, etc.) | +| [500][] | [JSON API error object][] | Failure during User Token creation | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------- | ------ | ------- | ----------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"authentication-tokens"`. | +| `data.attributes.description` | string | | The description for the User Token. | +| `data.attributes.expired-at` | string | `null` | The UTC date and time that the User Token will expire, in ISO 8601 format. If omitted or set to `null` the token will never expire. | + +### Sample Payload + +```json +{ + "data": { + "type": "authentication-tokens", + "attributes": { + "description":"api", + "expired-at": "2023-04-06T12:00:00.000Z" + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/users/user-MA4GL63FmYRpSFxa/authentication-tokens +``` + +### Sample Response + +```json +{ + "data": { + "id": "at-MKD1X3i4HS3AuD41", + "type": "authentication-tokens", + "attributes": { + "created-at": "2018-11-26T20:48:35.054Z", + "last-used-at": null, + "description": "api", + "token": "6tL24nM38M7XWQ.atlasv1.KmWckRfzeNmUVFNvpvwUEChKaLGznCSD6fPf3VPzqMMVzmSxFU0p2Ibzpo2h5eTGwPU", + "expired-at": "2023-04-06T12:00:00.000Z" + }, + "relationships": { + "created-by": { + "data": { + "id": "user-MA4GL63FmYRpSFxa", + "type": "users" + } + } + } + } +} +``` + +## Destroy a User Token + +`DELETE /authentication-tokens/:id` + +| Parameter | Description | +| --------- | ------------------------------------ | +| `:id` | The ID of the User Token to destroy. | + +-> **Note:** You must access this endpoint with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens), and it will only delete tokens for that token's user account. + +| Status | Response | Reason | +| ------- | ------------------------- | ------------------------------------------------------------ | +| [204][] | Empty response | The User Token was successfully destroyed | +| [404][] | [JSON API error object][] | User Token not found, or user unauthorized to perform action | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/authentication-tokens/at-6yEmxNAhaoQLH1Da +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/users.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/users.mdx new file mode 100644 index 000000000..4c8625e8c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/users.mdx @@ -0,0 +1,102 @@ +--- +page_title: /users API reference for Terraform Enterprise +description: Use the Terraform Enterprise API's `/users` endpoint to read a user's details. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Users API reference + +HCP Terraform's user objects do not contain any identifying information about a user, other than their HCP Terraform username and avatar image; they are intended for displaying names and avatars in contexts that refer to a user by ID, like lists of team members or the details of a run. Most of these contexts can already include user objects via an `?include` parameter, so you shouldn't usually need to make a separate call to this endpoint. + +## Show a User + +Shows details for a given user. + +`GET /users/:user_id` + +| Parameter | Description | +| ---------- | --------------------------- | +| `:user_id` | The ID of the desired user. | + +To find the ID that corresponds to a given username, you can request a [team object](/terraform/enterprise/api-docs/teams) for a team that user belongs to, specify `?include=users` in the request, and look for the user's name in the included list of user objects. + +| Status | Response | Reason | +| ------- | --------------------------------------- | ------------------------------------------------ | +| [200][] | [JSON API document][] (`type: "users"`) | The request was successful | +| [401][] | [JSON API error object][] | Unauthorized | +| [404][] | [JSON API error object][] | User not found, or unauthorized to view the user | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/users/user-MA4GL63FmYRpSFxa +``` + +### Sample Response + +```json +{ + "data": { + "id": "user-MA4GL63FmYRpSFxa", + "type": "users", + "attributes": { + "username": "admin", + "is-service-account": false, + "auth-method": "hcp_sso", + "avatar-url": "https://www.gravatar.com/avatar/fa1f0c9364253d351bf1c7f5c534cd40?s=100&d=mm", + "v2-only": true, + "permissions": { + "can-create-organizations": false, + "can-change-email": true, + "can-change-username": true + } + }, + "relationships": { + "authentication-tokens": { + "links": { + "related": "/api/v2/users/user-MA4GL63FmYRpSFxa/authentication-tokens" + } + } + }, + "links": { + "self": "/api/v2/users/user-MA4GL63FmYRpSFxa" + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/variable-sets.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/variable-sets.mdx new file mode 100644 index 000000000..8bca544f1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/variable-sets.mdx @@ -0,0 +1,1018 @@ +--- +page_title: /varsets API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/varsets` endpoint to read, create, + update, and delete variable sets, and apply or remove variable sets from + workspaces and projects. +source: terraform-docs-common +--- + +# Variable sets API reference + +A [variable set](/terraform/enterprise/workspaces/variables#scope) is a resource that allows you to reuse the same variables across multiple workspaces and projects. For example, you could define a variable set of provider credentials and automatically apply it to a selection of workspaces, all workspaces in a project, or all workspaces in an organization. + +Projects and organizations can both own variable sets. The owner of a variable set can determine the precedence of that set. Refer to [**Manage variable sets**](/terraform/enterprise/workspaces/variables/managing-variables#permissions) for more details on variable set permissions. + +To view the variables applied from a variable set on a particular workspace, you must have [**Read** variables permission](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) on that workspace. + +## Create a Variable Set + +`POST organizations/:organization_name/varsets` + +| Parameter | Description | +| -------------------- | --------------------------------------------------------- | +| `:organization_name` | The name of the organization the variable set belongs to. | + +### Request Body + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------- | ------- | ------------------------------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.attributes.name` | string | | The name of the variable set. | +| `data.attributes.description` | string | `""` | Text displayed in the UI to contextualize the variable set and its purpose. | +| `data.attributes.global` | boolean | `false` | When true, HCP Terraform automatically applies the variable set to all current and future workspaces in the organization. | +| `data.attributes.priority` | boolean | `false` | When true, the variables in the set override any other variable values with a more specific scope, including values set on the command line. | +| `data.relationships.workspaces` | array | `[]` | Array of references to workspaces that the variable set should be assigned to. | +| `data.relationships.projects` | array | `[]` | Array of references to projects that the variable set should be assigned to. | +| `data.relationships.vars` | array | `[]` | Array of complete variable definitions that comprise the variable set. | +| `data.relationships.parent` | object | Organization that the variable set belongs to | The parent that owns this variable set. If the parent is a project, `data.attributes.global` must be `false`. | +| `data.relationships.parent.data.type` | string | `"organizations"` | The resource type of the parent that owns this variable set. Valid values are `organizations` or `projects`. | +| `data.relationships.parent.data.id` | string | Name of organization that the variable set belongs to. | The ID of the parent that owns the variable set. For organizations, use name instead of ID. | + +HCP Terraform does not allow different global variable sets to contain conflicting variables with the same name and type. You will receive a 422 response if you try to create a global variable set that contains conflicting variables. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Successfully added variable set | +| [404][] | [JSON API error object][] | Organization not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Sample Payload + +```json +{ + "data": { + "type": "varsets", + "attributes": { + "name": "MyVarset", + "description": "Full of vars and such for mass reuse", + "global": false, + "priority": false, + }, + "relationships": { + "workspaces": { + "data": [ + { + "id": "ws-z6YvbWEYoE168kpq", + "type": "workspaces" + } + ] + }, + "vars": { + "data": [ + { + "type": "vars", + "attributes": { + "key": "c2e4612d993c18e42ef30405ea7d0e9ae", + "value": "8676328808c5bf56ac5c8c0def3b7071", + "category": "terraform" + } + } + ] + }, + "parent": { + "data": { + "id": "prj-kFjgSzcZSr5c3imE", + "type": "projects" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/varsets +``` + +### Sample Response + +```json +{ + "data": { + "id": "varset-kjkN545LH2Sfercv", + "type": "varsets", + "attributes": { + "name": "MyVarset", + "description": "Full of vars and such for mass reuse", + "global": false, + "priority": false, + }, + "relationships": { + "workspaces": { + "data": [ + { + "id": "ws-z6YvbWEYoE168kpq", + "type": "workspaces" + } + ] + }, + "projects": { + "data": [ + { + "id": "prj-kFjgSzcZSr5c3imE", + "type": "projects" + } + ] + }, + "vars": { + "data": [ + { + "id": "var-Nh0doz0hzj9hrm34qq", + "type": "vars", + "attributes": { + "key": "c2e4612d993c18e42ef30405ea7d0e9ae", + "value": "8676328808c5bf56ac5c8c0def3b7071", + "category": "terraform" + } + } + ] + }, + "parent": { + "data": { + "id": "prj-kFjgSzcZSr5c3imE", + "type": "projects" + } + } + } + } +} +``` + +## Update a Variable Set + +`PUT/PATCH varsets/:varset_id` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +HCP Terraform does not allow global variable sets to contain conflicting variables with the same name and type. You will receive a 422 response if you try to create a global variable set that contains conflicting variables. + +HCP Terraform does not allow you to change the parent organization or project of a variable set. Instead, you must delete the variable set and recreate it in the desired organization or project. + +### Request Body + +| Key path | Type | Default | Description | +| ------------------------------- | ------- | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.attributes.name` | string | | The name of the variable set. | +| `data.attributes.description` | string | | Text displayed in the UI to contextualize the variable set and its purpose. | +| `data.attributes.global` | boolean | | When true, HCP Terraform automatically applies the variable set to all current and future workspaces in the organization. | +| `data.attributes.priority` | boolean | `false` | When true, the variables in the set override any other variable values set with a more specific scope, including values set on the command line. | +| `data.relationships.workspaces` | array | | **Optional** Array of references to workspaces that the variable set should be assigned to. Sending an empty array clears all workspace assignments. | +| `data.relationships.projects` | array | | **Optional** Array of references to projects that the variable set should be assigned to. Sending an empty array clears all project assignments. | +| `data.relationships.vars` | array | | **Optional** Array of complete variable definitions to add to the variable set. | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ------------------------------------------------------------------------------ | +| [200][] | [JSON API document][] | Successfully updated variable set | +| [404][] | [JSON API error object][] | Organization or variable set not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Sample Payload + +```json +{ + "data": { + "type": "varsets", + "attributes": { + "name": "MyVarset", + "description": "Full of vars and such for mass reuse. Now global!", + "global": true, + "priority": true, + }, + "relationships": { + "workspaces": { + "data": [ + { + "id": "ws-FRFwkYoUoGn1e34b", + "type": "workspaces" + } + ] + }, + "projects": { + "data": [ + { + "id": "prj-kFjgSzcZSr5c3imE", + "type": "projects" + } + ] + }, + "vars": { + "data": [ + { + "type": "vars", + "attributes": { + "key": "c2e4612d993c18e42ef30405ea7d0e9ae", + "value": "8676328808c5bf56ac5c8c0def3b7071", + "category": "terraform" + } + } + ] + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/varsets/varset-kjkN545LH2Sfercv +``` + +### Sample Response + +```json +{ + "data": { + "id": "varset-kjkN545LH2Sfercv", + "type": "varsets", + "attributes": { + "name": "MyVarset", + "description": "Full of vars and such for mass reuse. Now global!", + "global": true, + "priority": true + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "workspaces": { + "data": [ + { + "id": "ws-FRFwkYoUoGn1e34b", + "type": "workspaces" + } + ] + }, + "projects": { + "data": [ + { + "id": "prj-kFjgSzcZSr5c3imE", + "type": "projects" + } + ] + }, + "vars": { + "data": [ + { + "id": "var-Nh0doz0hzj9hrm34qq", + "type": "vars", + "attributes": { + "key": "c2e4612d993c18e42ef30405ea7d0e9ae", + "value": "8676328808c5bf56ac5c8c0def3b7071", + "category": "terraform" + } + } + ] + }, + "parent": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + } + } + } +} +``` + +## Delete a Variable Set + +`DELETE varsets/:varset_id` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/varsets/varset-kjkN545LH2Sfercv +``` + +On success, this endpoint responds with no content. + +## Show Variable Set + +Fetch details about the specified variable set. + +`GET varsets/:varset_id` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request GET \ + https://app.terraform.io/api/v2/varsets/varset-kjkN545LH2Sfercv +``` + +### Sample Response + +```json +{ + "data": { + "id": "varset-kjkN545LH2Sfercv", + "type": "varsets", + "attributes": { + "name": "MyVarset", + "description": "Full of vars and such for mass reuse", + "global": false, + "priority": false, + "updated-at": "2023-03-06T21:48:33.588Z", + "var-count": 5, + "workspace-count": 2, + "project-count": 2 + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "vars": { + "data": [ + { + "id": "var-mMqadSCxZtrQJAv8", + "type": "vars" + }, + { + "id": "var-hFxUUKSk35QMsRVH", + "type": "vars" + }, + { + "id": "var-fkd6N48tXRmoaPxH", + "type": "vars" + }, + { + "id": "var-abcbBMBMWcZw3WiV", + "type": "vars" + }, + { + "id": "var-vqvRKK1ZoqQCiMwN", + "type": "vars" + } + ] + }, + "workspaces": { + "data": [ + { + "id": "ws-UohFdKAHUGsQ8Dtf", + "type": "workspaces" + }, + { + "id": "ws-XhGhaaCrsx9ATson", + "type": "workspaces" + } + ] + }, + "projects": { + "data": [ + { + "id": "prj-1JMwvPHFsdpsPhnt", + "type": "projects" + }, + { + "id": "prj-SLDGqbYqELXE1obp", + "type": "projects" + } + ] + }, + "parent": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + } + } + } +} +``` + +## List Variable Sets + +List all variable sets for an organization. + +`GET organizations/:organization_name/varsets` + +| Parameter | Description | +| -------------------- | -------------------------------------------------------- | +| `:organization_name` | The name of the organization the variable sets belong to | + +List all variable sets for a project. This includes global variable sets from the project's organization. + +`GET projects/:project_id/varsets` + +| Parameter | Description | +| ------------- | -------------- | +| `:project_id` | The project ID | + +List all variable sets for a workspace. This includes global variable sets from the workspace's organization and variable sets +attached to the project this workspace is contained within. + +`GET workspaces/:workspace_id/varsets` + +| Parameter | Description | +| --------------- | ---------------- | +| `:workspace_id` | The workspace ID | + +### Query Parameters + +All list endpoints support pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters) and searching with the `q` parameter. Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | -------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint returns the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint returns 20 varsets per page. | +| `q` | **Optional.** A search query string. You can search for a variable set using its name. | + +### Sample Response + +```json +{ + "data": [ + { + "id": "varset-kjkN545LH2Sfercv", + "type": "varsets", + "attributes": { + "name": "MyVarset", + "description": "Full of vars and such for mass reuse", + "global": false, + "priority": false, + "updated-at": "2023-03-06T21:48:33.588Z", + "var-count": 5, + "workspace-count": 2, + "project-count": 2 + }, + "relationships": { + "organization": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + }, + "vars": { + "data": [ + { + "id": "var-mMqadSCxZtrQJAv8", + "type": "vars" + }, + { + "id": "var-hFxUUKSk35QMsRVH", + "type": "vars" + }, + { + "id": "var-fkd6N48tXRmoaPxH", + "type": "vars" + }, + { + "id": "var-abcbBMBMWcZw3WiV", + "type": "vars" + }, + { + "id": "var-vqvRKK1ZoqQCiMwN", + "type": "vars" + } + ] + }, + "workspaces": { + "data": [ + { + "id": "ws-UohFdKAHUGsQ8Dtf", + "type": "workspaces" + }, + { + "id": "ws-XhGhaaCrsx9ATson", + "type": "workspaces" + } + ] + }, + "projects": { + "data": [ + { + "id": "prj-1JMwvPHFsdpsPhnt", + "type": "projects" + }, + { + "id": "prj-SLDGqbYqELXE1obp", + "type": "projects" + } + ] + }, + "parent": { + "data": { + "id": "hashicorp", + "type": "organizations" + } + } + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/hashicorp/varsets?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/hashicorp/varsets?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/hashicorp/varsets?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "page-size": 20, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 1 + } + } +} +``` + +### Variable Relationships + +## Add Variable + +`POST varsets/:varset_external_id/relationships/vars` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------- | ------ | ------- | --------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"vars"`. | +| `data.attributes.key` | string | | The name of the variable. | +| `data.attributes.value` | string | `""` | The value of the variable. | +| `data.attributes.description` | string | | The description of the variable. | +| `data.attributes.category` | string | | Whether this is a Terraform or environment variable. Valid values are `"terraform"` or `"env"`. | +| `data.attributes.hcl` | bool | `false` | Whether to evaluate the value of the variable as a string of HCL code. Has no effect for environment variables. | +| `data.attributes.sensitive` | bool | `false` | Whether the value is sensitive. If true, variable is not visible in the UI. | + +HCP Terraform does not allow different global variable sets to contain conflicting variables with the same name and type. You will receive a 422 response if you try to add a conflicting variable to a global variable set. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Successfully added variable to variable set | +| [404][] | [JSON API error object][] | Variable set not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Sample Payload + +```json +{ + "data": { + "type": "vars", + "attributes": { + "key": "g6e45ae7564a17e81ef62fd1c7fa86138", + "value": "61e400d5ccffb3782f215344481e6c82", + "description": "cheeeese", + "sensitive": false, + "category": "terraform", + "hcl": false + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/varsets/varset-4q8f7H0NHG733bBH/relationships/vars +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-EavQ1LztoRTQHSNT", + "type": "vars", + "attributes": { + "key": "g6e45ae7564a17e81ef62fd1c7fa86138", + "value": "61e400d5ccffb3782f215344481e6c82", + "description": "cheeeese", + "sensitive": false, + "category": "terraform", + "hcl": false + } + } +} +``` + +## Update a Variable in a Variable Set + +`PATCH varsets/:varset_id/relationships/vars/:var_id` + +| Parameter | Description | +| ------------ | -------------------------------- | +| `:varset_id` | The variable set ID | +| `:var_id` | The ID of the variable to delete | + +HCP Terraform does not allow different global variable sets to contain conflicting variables with the same name and type. You will receive a 422 response if you try to add a conflicting variable to a global variable set. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [200][] | [JSON API document][] | Successfully updated variable for variable set | +| [404][] | [JSON API error object][] | Variable set not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Sample Payload + +```json +{ + "data": { + "type": "vars", + "attributes": { + "key": "g6e45ae7564a17e81ef62fd1c7fa86138", + "value": "61e400d5ccffb3782f215344481e6c82", + "description": "new cheeeese", + "sensitive": false, + "category": "terraform", + "hcl": false + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/varsets/varset-4q8f7H0NHG733bBH/relationships/vars/var-EavQ1LztoRTQHSNT +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-EavQ1LztoRTQHSNT", + "type": "vars", + "attributes": { + "key": "g6e45ae7564a17e81ef62fd1c7fa86138", + "value": "61e400d5ccffb3782f215344481e6c82", + "description": "new cheeeese", + "sensitive": false, + "category": "terraform", + "hcl": false + } + } +} +``` + +## Delete a Variable in a Variable Set + +`DELETE varsets/:varset_id/relationships/vars/:var_id` + +| Parameter | Description | +| ------------ | -------------------------------- | +| `:varset_id` | The variable set ID | +| `:var_id` | The ID of the variable to delete | + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/varsets/varset-4q8f7H0NHG733bBH/relationships/vars/var-EavQ1LztoRTQHSNT +``` + +On success, this endpoint responds with no content. + +## List Variables in a Variable Set + +`GET varsets/:varset_id/relationships/vars` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +### Sample Response + +```json +{ + "data": [ + { + "id": "var-134r1k34nj5kjn", + "type": "vars", + "attributes": { + "key": "F115037558b045dd82da40b089e5db745", + "value": "1754288480dfd3060e2c37890422905f", + "sensitive": false, + "category": "terraform", + "hcl": false, + "created-at": "2021-10-29T18:54:29.379Z", + "description": "" + }, + "relationships": { + "varset": { + "data": { + "id": "varset-992UMULdeDuebi1x", + "type": "varsets" + }, + "links": { "related": "/api/v2/varsets/1" } + } + }, + "links": { "self": "/api/v2/vars/var-BEPU9NjPVCiCfrXj" } + } + ], + "links": { + "self": "app.terraform.io/app/varsets/varset-992UMULdeDuebi1x/vars", + "first": "app.terraform.io/app/varsets/varset-992UMULdeDuebi1x/vars?page=1", + "prev": null, + "next": null, + "last": "app.terraform.io/app/varsets/varset-992UMULdeDuebi1x/vars?page=1" + } +} +``` + +## Apply Variable Set to Workspaces + +Accepts a list of workspaces to add the variable set to. + +`POST varsets/:varset_id/relationships/workspaces` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | -------------------------------------------------- | +| `data[].type` | string | | Must be `"workspaces"` | +| `data[].id` | string | | The id of the workspace to add the variable set to | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | | Successfully added variable set to the requested workspaces | +| [404][] | [JSON API error object][] | Variable set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "workspaces", + "id": "ws-YwfuBJZkdai4xj9w" + } + ] +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/varsets/varset-kjkN545LH2Sfercv/relationships/workspaces +``` + +## Remove a Variable Set from Workspaces + +Accepts a list of workspaces to remove the variable set from. + +`DELETE varsets/:varset_id/relationships/workspaces` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ------------------------------------------------------- | +| `data[].type` | string | | Must be `"workspaces"` | +| `data[].id` | string | | The id of the workspace to delete the variable set from | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | | Successfully removed variable set from the requested workspaces | +| [404][] | [JSON API error object][] | Variable set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "workspaces", + "id": "ws-YwfuBJZkdai4xj9w" + }, + { + "type": "workspaces", + "id": "ws-YwfuBJZkdai4xj9w" + } + ] +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/varsets/varset-kjkN545LH2Sfercv/relationships/workspaces +``` + +## Apply Variable Set to Projects + +Accepts a list of projects to add the variable set to. When you apply a variable set to a project, all the workspaces in that project will have the variable set applied to them. + +`POST varsets/:varset_id/relationships/projects` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ------------------------------------------------ | +| `data[].type` | string | | Must be `"projects"` | +| `data[].id` | string | | The id of the project to add the variable set to | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | | Successfully added variable set to the requested projects | +| [404][] | [JSON API error object][] | Variable set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "projects", + "id": "prj-YwfuBJZkdai4xj9w" + } + ] +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/varsets/varset-kjkN545LH2Sfercv/relationships/projects +``` + +## Remove a Variable Set from Projects + +Accepts a list of projects to remove the variable set from. + +`DELETE varsets/:varset_id/relationships/projects` + +| Parameter | Description | +| ------------ | ------------------- | +| `:varset_id` | The variable set ID | + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ----------------------------------------------------- | +| `data[].type` | string | | Must be `"projects"` | +| `data[].id` | string | | The id of the project to delete the variable set from | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | | Successfully removed variable set from the requested projects | +| [404][] | [JSON API error object][] | Variable set not found or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "projects", + "id": "prj-YwfuBJZkdai4xj9w" + }, + { + "type": "projects", + "id": "prj-lkjasdfiojwerlkj" + } + ] +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/varsets/varset-kjkN545LH2Sfercv/relationships/projects +``` + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[json api document]: /terraform/enterprise/api-docs#json-api-documents + +[json api error object]: https://jsonapi.org/format/#error-objects + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +| Resource Name | Description | +| ------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `vars` | Show each variable in a variable set and all of their attributes including `id`, `key`, `value`, `sensitive`, `category`, `hcl`, `created_at`, and `description`. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/variables.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/variables.mdx new file mode 100644 index 000000000..987dca355 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/variables.mdx @@ -0,0 +1,307 @@ +--- +page_title: /vars API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/vars` endpoint to manage + organization-level variables. Learn how to read, create, update, and delete + variables using the API. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Variables API reference + +~> **Important**: The Variables API is **deprecated** and will be removed in a future release. All existing integrations with this API should transition to the [Workspace Variables API](/terraform/enterprise/api-docs/workspace-variables). + +This set of APIs covers create, update, list and delete operations on variables. + +## Create a Variable + +`POST /vars` + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ---------------------------------------- | ------ | ------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"vars"`. | +| `data.attributes.key` | string | | The name of the variable. | +| `data.attributes.value` | string | `""` | The value of the variable. | +| `data.attributes.description` | string | | The description of the variable. | +| `data.attributes.category` | string | | Whether this is a Terraform or environment variable. Valid values are `"terraform"` or `"env"`. | +| `data.attributes.hcl` | bool | `false` | Whether to evaluate the value of the variable as a string of HCL code. Has no effect for environment variables. | +| `data.attributes.sensitive` | bool | `false` | Whether the value is sensitive. If true then the variable is written once and not visible thereafter. | +| `data.relationships.workspace.data.type` | string | | Must be `"workspaces"`. | +| `data.relationships.workspace.data.id` | string | | The ID of the workspace that owns the variable. Obtain workspace IDs from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +**Deprecation warning**: The custom `filter` properties are replaced by JSON API `relationships` and will be removed from future versions of the API! + +| Key path | Type | Default | Description | +| -------------------------- | ------ | ------- | ----------------------------------------------------- | +| `filter.workspace.name` | string | | The name of the workspace that owns the variable. | +| `filter.organization.name` | string | | The name of the organization that owns the workspace. | + +### Sample Payload + +```json +{ + "data": { + "type":"vars", + "attributes": { + "key":"some_key", + "value":"some_value", + "description":"some description", + "category":"terraform", + "hcl":false, + "sensitive":false + }, + "relationships": { + "workspace": { + "data": { + "id":"ws-4j8p6jX1w33MiDC7", + "type":"workspaces" + } + } + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/vars +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-EavQ1LztoRTQHSNT", + "type":"vars", + "attributes": { + "key":"some_key", + "value":"some_value", + "description":"some description", + "sensitive":false, + "category":"terraform", + "hcl":false + }, + "relationships": { + "configurable": { + "data": { + "id":"ws-4j8p6jX1w33MiDC7", + "type":"workspaces" + }, + "links": { + "related":"/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self":"/api/v2/vars/var-EavQ1LztoRTQHSNT" + } + } +} +``` + +## List Variables + +`GET /vars` + +### Query Parameters + +[These are standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ---------------------------- | -------------------------------------------------------------------------- | +| `filter[workspace][name]` | **Required** The name of one workspace to list variables for. | +| `filter[organization][name]` | **Required** The name of the organization that owns the desired workspace. | + +These two parameters are optional but linked; if you include one, you must include both. Without a filter, this method lists variables for all workspaces where you have permission to read variables. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ +"https://app.terraform.io/api/v2/vars?filter%5Borganization%5D%5Bname%5D=my-organization&filter%5Bworkspace%5D%5Bname%5D=my-workspace" +# ?filter[organization][name]=my-organization&filter[workspace][name]=demo01 +``` + +### Sample Response + +```json +{ + "data": [ + { + "id":"var-AD4pibb9nxo1468E", + "type":"vars","attributes": { + "key":"name", + "value":"hello", + "description":"some description", + "sensitive":false, + "category":"terraform", + "hcl":false + }, + "relationships": { + "configurable": { + "data": { + "id":"ws-cZE9LERN3rGPRAmH", + "type":"workspaces" + }, + "links": { + "related":"/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self":"/api/v2/vars/var-AD4pibb9nxo1468E" + } + } + ] +} +``` + +## Update Variables + +`PATCH /vars/:variable_id` + +| Parameter | Description | +| -------------- | ------------------------------------- | +| `:variable_id` | The ID of the variable to be updated. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------- | ------ | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"vars"`. | +| `data.id` | string | | The ID of the variable to update. | +| `data.attributes` | object | | New attributes for the variable. This object can include `key`, `value`, `description`, `category`, `hcl`, and `sensitive` properties, which are described above under [create a variable](#create-a-variable). All of these properties are optional; if omitted, a property will be left unchanged. | + +### Sample Payload + +```json +{ + "data": { + "id":"var-yRmifb4PJj7cLkMG", + "attributes": { + "key":"name", + "value":"mars", + "description": "new description", + "category":"terraform", + "hcl": false, + "sensitive": false + }, + "type":"vars" + } +} +``` + +### Sample Request + +```bash +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/vars/var-yRmifb4PJj7cLkMG +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-yRmifb4PJj7cLkMG", + "type":"vars", + "attributes": { + "key":"name", + "value":"mars", + "description":"new description", + "sensitive":false, + "category":"terraform", + "hcl":false + }, + "relationships": { + "configurable": { + "data": { + "id":"ws-4j8p6jX1w33MiDC7", + "type":"workspaces" + }, + "links": { + "related":"/api/v2/organizations/workspace-v2-06/workspaces/workspace-v2-06" + } + } + }, + "links": { + "self":"/api/v2/vars/var-yRmifb4PJj7cLkMG" + } + } +} +``` + +## Delete Variables + +`DELETE /vars/:variable_id` + +| Parameter | Description | +| -------------- | ------------------------------------- | +| `:variable_id` | The ID of the variable to be deleted. | + +### Sample Request + +```bash +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/vars/var-yRmifb4PJj7cLkMG +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/vcs-events.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/vcs-events.mdx new file mode 100644 index 000000000..7c97d1181 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/vcs-events.mdx @@ -0,0 +1,132 @@ +--- +page_title: /vcs-events API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/vcs-events` endpoint to list VCS-related + events within your organization. +source: terraform-docs-common +--- + +# VCS events API reference + +-> **Note**: The VCS Events API is still in beta as support is being added for additional VCS providers. Currently only GitLab.com connections established after December 2020 are supported. + +VCS (version control system) events describe changes within your organization for VCS-related actions. Events are only stored for 10 days. If information about the [OAuth Client](/terraform/enterprise/api-docs/oauth-clients) or [OAuth Token](/terraform/enterprise/api-docs/oauth-tokens) are available at the time of the event, it will be logged with the event. + +## List VCS events + +This endpoint lists VCS events for an organization + +`GET /organizations/:organization_name/vcs-events` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:organization_name` | The name of the organization to list VCS events from. The organization must already exist in the system and the user must have permissions to manage VCS settings. | + +-> **Note:** Viewing VCS events is restricted to the owners team, teams with the "Manage VCS Settings", and the [organization API token](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens). ([More about permissions](/terraform/enterprise/users-teams-organizations/permissions).) + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ----------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 workspaces per page. | +| `filter[from]` | **Optional.** Must be RFC3339 formatted and in UTC. If omitted, the endpoint will default to 10 days ago. | +| `filter[to]` | **Optional.** Must be RFC3339 formatted and in UTC. If omitted, the endpoint will default to now. | +| `filter[oauth_client_external_ids]` | **Optional.** Format as a comma-separated string. If omitted, the endpoint will return all events. | +| `filter[levels]` | **Optional.** `info` and `error` are the only accepted values. If omitted, the endpoint will return both info and error events. | +| `include` | **Optional.** Allows including related resource data. This endpoint only supports `oauth_client` as a value. Only the `name`, `service-provider`, and `id` will be returned on the OAuth Client object in the `included` block. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/vcs-events?filter%5Bfrom%5D=2021-02-02T14%3A09%3A00Z&filter%5Bto%5D=2021-02-12T14%3A09%3A59Z&filter%5Boauth_client_external_ids%5D=oc-hhTM7WNUUgbXJpkW&filter%5Blevels%5D=info&include=oauth_client +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "ve-DJpbEwZc98ZedHZG", + "type": "vcs-events", + "attributes": { + "created-at": "2021-02-09 20:07:49.686182 +0000 UTC", + "level": "info", + "message": "Loaded 11 repositories", + "organization-id": "org-SBVreZxVessAmCZG" + }, + "relationships": { + "oauth-client": { + "data": { + "id": "oc-LePsVhHXhCM6jWf3", + "type": "oauth-clients" + }, + "links": { + "related": "/api/v2/oauth-clients/oc-LePsVhHXhCM6jWf3" + } + }, + "oauth-token": { + "data": { + "id": "ot-Ma2cs8tzjv3LYZHw", + "type": "oauth-tokens" + }, + "links": { + "related": "/api/v2/oauth-tokens/ot-Ma2cs8tzjv3LYZHw" + } + } + } + } + ], + "included": [ + { + "id": "oc-LePsVhHXhCM6jWf3", + "type": "oauth-clients", + "attributes": { + "name": "working", + "service-provider": "gitlab_hosted" + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + }, + "links": { + "related": "/api/v2/organizations/my-organization" + } + }, + "oauth-tokens": { + "data": [ + { + "id": "ot-Ma2cs8tzjv3LYZHw", + "type": "oauth-tokens" + } + ] + } + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/organizations/my-organization/vcs-events?filter%5Bfrom%5D=2021-02-02T14%3A09%3A00Z\u0026filter%5Blevels%5D=info\u0026filter%5Boauth_client_external_ids%5D=oc-LePsVhHXhCM6jWf3\u0026filter%5Bto%5D=2021-02-12T14%3A09%3A59Z\u0026include=oauth_client\u0026organization_name=my-organization\u0026page%5Bnumber%5D=1\u0026page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/organizations/my-organization/vcs-events?filter%5Bfrom%5D=2021-02-02T14%3A09%3A00Z\u0026filter%5Blevels%5D=info\u0026filter%5Boauth_client_external_ids%5D=oc-LePsVhHXhCM6jWf3\u0026filter%5Bto%5D=2021-02-12T14%3A09%3A59Z\u0026include=oauth_client\u0026organization_name=my-organization\u0026page%5Bnumber%5D=1\u0026page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/organizations/my-organization/vcs-events?filter%5Bfrom%5D=2021-02-02T14%3A09%3A00Z\u0026filter%5Blevels%5D=info\u0026filter%5Boauth_client_external_ids%5D=oc-LePsVhHXhCM6jWf3\u0026filter%5Bto%5D=2021-02-12T14%3A09%3A59Z\u0026include=oauth_client\u0026organization_name=my-organization\u0026page%5Bnumber%5D=1\u0026page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "prev-page": null, + "next-page": null, + "total-pages": 1, + "total-count": 8 + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspace-resources.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspace-resources.mdx new file mode 100644 index 000000000..9f53485fc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspace-resources.mdx @@ -0,0 +1,126 @@ +--- +page_title: /workspaces/resources API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/workspaces/resources` endpoint to list + all of a workspace's resources. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Workspace resources API reference + +## List Workspace Resources + +`GET /workspaces/:workspace_id/resources` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:workspace_id` | The ID of the workspace to retrieve resources from. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [show workspace](/terraform/enterprise/api-docs/workspaces#show-workspace) endpoint. | + +| Status | Response | Reason | +| ------- | ------------------------------------------- | ----------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "resources"`) | Request was successful. | +| [404][] | [JSON API error object][] | Workspace not found or user unauthorized to perform action. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | ----------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 workspace resources per page. | + +### Permissions + +To list resources the user must have permission to read resources for the specified workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Sample Request + +```shell +curl \ + --request GET \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-DiTzUDRpjrArAfSS/resources +``` + +### Sample Response + +```json +{ + "data": [ + { + "id": "wsr-KNYb3Jj3JTBgoBFs", + "type": "resources", + "attributes": { + "address": "random_pet.animal", + "name": "animal", + "created-at": "2021-10-27", + "updated-at": "2021-10-27", + "module": "root", + "provider": "hashicorp/random", + "provider-type": "random_pet", + "modified-by-state-version-id": "sv-y4pjfGHkGUBAa9AX", + "name-index": null + } + }, + { + "id": "wsr-kYsf5A3hQ1y9zFWq", + "type": "resources", + "attributes": { + "address": "random_pet.animal2", + "name": "animal2", + "created-at": "2021-10-27", + "updated-at": "2021-10-27", + "module": "root", + "provider": "hashicorp/random", + "provider-type": "random_pet", + "modified-by-state-version-id": "sv-y4pjfGHkGUBAa9AX", + "name-index": null + } + } + ], + "links": { + "self": "https://app.terraform.io/api/v2/workspaces/ws-DiTzUDRpjrArAfSS/resources?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "first": "https://app.terraform.io/api/v2/workspaces/ws-DiTzUDRpjrArAfSS/resources?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "prev": null, + "next": null, + "last": "https://app.terraform.io/api/v2/workspaces/ws-DiTzUDRpjrArAfSS/resources?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + ... +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspace-variables.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspace-variables.mdx new file mode 100644 index 000000000..d3a92c657 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspace-variables.mdx @@ -0,0 +1,298 @@ +--- +page_title: /workspaces/vars API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's workspace `/workspaces/vars` endpoint to + manage workspace-specific variables. Read, create, update, and delete + workspace variables. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +# Workspace variables API reference + +This set of APIs covers create, update, list and delete operations on workspace variables. + +Viewing variables requires permission to read variables for their workspace. Creating, updating, and deleting variables requires permission to read and write variables for their workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Create a Variable + +`POST /workspaces/:workspace_id/vars` + +| Parameter | Description | +| --------------- | -------------------------------------------------- | +| `:workspace_id` | The ID of the workspace to create the variable in. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------------------- | ------ | ------- | --------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"vars"`. | +| `data.attributes.key` | string | | The name of the variable. | +| `data.attributes.value` | string | `""` | The value of the variable. | +| `data.attributes.description` | string | | The description of the variable. | +| `data.attributes.category` | string | | Whether this is a Terraform or environment variable. Valid values are `"terraform"` or `"env"`. | +| `data.attributes.hcl` | bool | `false` | Whether to evaluate the value of the variable as a string of HCL code. Has no effect for environment variables. | +| `data.attributes.sensitive` | bool | `false` | Whether the value is sensitive. If true then the variable is written once and not visible thereafter. | + +**Deprecation warning**: The custom `filter` properties are replaced by JSON API `relationships` and will be removed from future versions of the API! + +| Key path | Type | Default | Description | +| -------------------------- | ------ | ------- | ----------------------------------------------------- | +| `filter.workspace.name` | string | | The name of the workspace that owns the variable. | +| `filter.organization.name` | string | | The name of the organization that owns the workspace. | + +### Sample Payload + +```json +{ + "data": { + "type":"vars", + "attributes": { + "key":"some_key", + "value":"some_value", + "description":"some description", + "category":"terraform", + "hcl":false, + "sensitive":false + } + } +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-4j8p6jX1w33MiDC7/vars +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-EavQ1LztoRTQHSNT", + "type":"vars", + "attributes": { + "key":"some_key", + "value":"some_value", + "description":"some description", + "sensitive":false, + "category":"terraform", + "hcl":false, + "version-id":"1aa07d63ea8ff4df941c94ca9ddfd5d2bd04" + }, + "relationships": { + "configurable": { + "data": { + "id":"ws-4j8p6jX1w33MiDC7", + "type":"workspaces" + }, + "links": { + "related":"/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self":"/api/v2/workspaces/ws-4j8p6jX1w33MiDC7/vars/var-EavQ1LztoRTQHSNT" + } + } +} +``` + +## List Variables + +`GET /workspaces/:workspace_id/vars` + +| Parameter | Description | +| --------------- | ---------------------------------------------- | +| `:workspace_id` | The ID of the workspace to list variables for. | + +### Sample Request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ +"https://app.terraform.io/api/v2/workspaces/ws-cZE9LERN3rGPRAmH/vars" +``` + +### Sample Response + +```json +{ + "data": [ + { + "id":"var-AD4pibb9nxo1468E", + "type":"vars","attributes": { + "key":"name", + "value":"hello", + "description":"some description", + "sensitive":false, + "category":"terraform", + "hcl":false, + "version-id":"1aa07d63ea8ff4df941c94ca9ddfd5d2bd04" + }, + "relationships": { + "configurable": { + "data": { + "id":"ws-cZE9LERN3rGPRAmH", + "type":"workspaces" + }, + "links": { + "related":"/api/v2/organizations/my-organization/workspaces/my-workspace" + } + } + }, + "links": { + "self":"/api/v2/workspaces/ws-cZE9LERN3rGPRAmH/vars/var-AD4pibb9nxo1468E" + } + } + ] +} +``` + +## Update Variables + +`PATCH /workspaces/:workspace_id/vars/:variable_id` + +| Parameter | Description | +| --------------- | ----------------------------------------------- | +| `:workspace_id` | The ID of the workspace that owns the variable. | +| `:variable_id` | The ID of the variable to be updated. | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ----------------- | ------ | ------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"vars"`. | +| `data.id` | string | | The ID of the variable to update. | +| `data.attributes` | object | | New attributes for the variable. This object can include `key`, `value`, `description`, `category`, `hcl`, and `sensitive` properties, which are described above under [create a variable](#create-a-variable). All of these properties are optional; if omitted, a property will be left unchanged. | + +### Sample Payload + +```json +{ + "data": { + "id":"var-yRmifb4PJj7cLkMG", + "attributes": { + "key":"name", + "value":"mars", + "description":"some description", + "category":"terraform", + "hcl": false, + "sensitive": false + }, + "type":"vars" + } +} +``` + +### Sample Request + +```bash +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-4j8p6jX1w33MiDC7/vars/var-yRmifb4PJj7cLkMG +``` + +### Sample Response + +```json +{ + "data": { + "id":"var-yRmifb4PJj7cLkMG", + "type":"vars", + "attributes": { + "key":"name", + "value":"mars", + "description":"some description", + "sensitive":false, + "category":"terraform", + "hcl":false, + "version-id":"1aa07d63ea8ff4df941c94ca9ddfd5d2bd04" + }, + "relationships": { + "configurable": { + "data": { + "id":"ws-4j8p6jX1w33MiDC7", + "type":"workspaces" + }, + "links": { + "related":"/api/v2/organizations/workspace-v2-06/workspaces/workspace-v2-06" + } + } + }, + "links": { + "self":"/api/v2/workspaces/ws-4j8p6jX1w33MiDC7/vars/var-yRmifb4PJj7cLkMG" + } + } +} +``` + +## Delete Variables + +`DELETE /workspaces/:workspace_id/vars/:variable_id` + +| Parameter | Description | +| --------------- | ----------------------------------------------- | +| `:workspace_id` | The ID of the workspace that owns the variable. | +| `:variable_id` | The ID of the variable to be deleted. | + +### Sample Request + +```bash +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/workspaces/ws-4j8p6jX1w33MiDC7/vars/var-yRmifb4PJj7cLkMG +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspaces.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspaces.mdx new file mode 100644 index 000000000..57e82778f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/api-docs/workspaces.mdx @@ -0,0 +1,1686 @@ +--- +page_title: /workspaces API reference for Terraform Enterprise +description: >- + Use the Terraform Enterprise API's `/workspaces` endpoint to read, create, + update, lock, unlock, and delete workspaces and manage SSH keys, tags, and + remote state consumers. +source: terraform-docs-common +--- + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +[JSON API document]: /terraform/enterprise/api-docs#json-api-documents + +[JSON API error object]: https://jsonapi.org/format/#error-objects + +[speculative plans]: /terraform/enterprise/run/remote-operations#speculative-plans + +# Workspaces API reference + +This topic provides reference information about the workspaces AP. Workspaces represent running infrastructure managed by Terraform. + +## Overview + +The scope of the API includes the following endpoints: + +| Method | Path | Action | +| -------- | ------------------------------------------------------------------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `POST` | `/organizations/:organization_name/workspaces` | Call this endpoint to [create a workspace](#create-a-workspace). You can apply tags stored as key-value pairs when creating the workspace. | +| `POST` | `/organizations/:organization_name/workspaces/:name/actions/safe-delete` | Call this endpoint to [safely delete a workspace](#safe-delete-a-workspace) by querying the organization and workspace names. | +| `POST` | `/workspaces/:workspace_id/actions/safe-delete` | Call this endpoint [safely delete a workspace](#safe-delete-a-workspace) by querying the workspace ID. | +| `POST` | `/workspaces/:workspace_id/actions/lock` | Call this endpoint to [lock a workspace](#lock-a-workspace). | +| `POST` | `/workspaces/:workspace_id/actions/unlock` | Call this endpoint to [unlock a workspace](#unlock-a-workspace). | +| `POST` | `/workspaces/:workspace_id/actions/force-unlock` | Call this endpoint to [force a workspace to unlock](#force-unlock-a-workspace). | +| `POST` | `/workspaces/:workspace_id/relationships/remote-state-consumers` | Call this endpoint to [add remote state consumers](#get-remote-state-consumers). | +| `POST` | `/workspaces/:workspace_id/relationships/tags` | Call this endpoint to [bind flat string tags to an existing workspace](#add-tags-to-a-workspace). | +| `POST` | `/workspaces/:workspace_id/relationships/data-retention-policy` | Call this endpoint to [show the workspace data retention policy](#show-data-retention-policy). | +| `GET` | `/organizations/:organization_name/workspaces` | Call this endpoint to [list existing workspaces](#list-workspaces). Each project in the response contains a link to `effective-tag-bindings` and `tag-bindings` collections. You can filter the response by tag keys and values using a query string parameter. | +| `GET` | `/organizations/:organization_name/workspaces/:name` | Call this endpoint to [show workspace details](#show-workspace) by querying the organization and workspace names. | +| `GET` | `/workspaces/:workspace_id` | Call this endpoint to [show workspace details](#show-workspace). | +| `GET` | `/workspaces/:workspace_id/relationships/remote-state-consumers` | Call this endpoint to [list remote state consumers](#get-remote-state-consumers). | +| `GET` | `/workspaces/:workspace_id/relationships/tags` | Call this endpoint to [list flat string workspace tags](#get-tags). | +| `GET` | `/workspaces/:workspace_id/tag-bindings` | Call this endpoint to [list workspace key-value tags](#get-tags) bound directly to this workspace. | +| `GET` | `/workspaces/:workspace_id/effective-tag-bindings` | Call this endpoint to [list all workspace key-value tags](#get-tags), including both those bound directly to the workspace as well as those inherited from the parent project. | +| `GET` | `/workspaces/:workspace_id/relationships/data-retention-policy` | Call this endpoint to [show the workspace data retention policy](#show-data-retention-policy). | +| `PATCH` | `/workspaces/:workspace_id/relationships/ssh-key` | Call this endpoint to manage SSH key assignments for workspaces. Refer to [Assign an SSH key to a workspace](#assign-an-ssh-key-to-a-workspace) and [Unassign an SSH key from a workspace](#unassign-an-ssh-key-from-a-workspace) for instructions. | +| `PATCH` | `/workspaces/:workspace_id` | Call this endpoint to [update a workspace](#update-a-workspace). You can apply tags stored as key-value pairs when updating the workspace. | +| `PATCH` | `/organizations/:organization_name/workspaces/:name` | Call this endpoint to [update a workspace](#update-a-workspace) by querying the organization and workspace names. | +| `PATCH` | `/workspaces/:workspace_id/relationships/remote-state-consumers` | Call this endpoint to [replace remote state consumers](#replace-remote-state-consumers). | +| `DELETE` | `/workspaces/:workspace_id/relationships/remote-state-consumers` | Call this endpoint to [delete remote state consumers](#delete-remote-state-consumers). | +| `DELETE` | `/workspaces/:workspace_id/relationships/tags` | Call this endpoint to [delete flat string workspace tags](#remove-tags-from-workspace) from the workspace. | +| `DELETE` | `/workspaces/:workspace_id/relationships/data-retention-policy` | Call this endpoint to [remove a workspace data retention policy](#remove-data-retention-policy). | +| `DELETE` | `/workspaces/:workspace_id` | Call this endpoint to [force delete a workspace](#force-delete-a-workspace), which deletes the workspace without first checking for managed resources. | +| `DELETE` | `/organizations/:organization_name/workspaces/:name` | Call this endpoint to [force delete a workspace](#force-delete-a-workspace), which deletes the workspace without first checking for managed resources, by querying the organization and workspace names. | + +## Requirements + +- You must be a member of a team with the **Read** permission enabled for Terraform runs to view workspaces. +- You must be a member of a team with the **Admin** permissions enabled on the workspace to change settings and force-unlock it. +- You must be a member of a team with the **Lock/unlock** permission enabled to lock and unlock the workspace. +- You must meet one of the following requirements to create a workspace: + - Be the team owner + - Be on a team with the **Manage all workspaces** permission enabled + - Present an [organization API token](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens) when calling the API. + +Refer to [Workspace Permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-permissions) for additional information. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Create a Workspace + +Use the following endpoint to create a new workspace: + +`POST /organizations/:organization_name/workspaces` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:organization_name` | The name of the organization to create the workspace in. The organization must already exist in the system, and the user must have permissions to create new workspaces. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +By supplying the necessary attributes under a `vcs-repository` object, you can create a workspace that is configured against a VCS Repository. + +| Key path | Type | Default | Description | +| ------------------------------------------------------- | --------------- | --------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | none | Must be `"workspaces"`. | +| `data.attributes.name` | string | none | The name of the workspace. Workspace names can only include letters, numbers, `-`, and `_`. The name a unique identifier n the organization. | +| `data.attributes.agent-pool-id` | string | none | Required when `execution-mode` is set to `agent`. The ID of the agent pool belonging to the workspace's organization. This value must not be specified if `execution-mode` is set to `remote` or `local` or if `operations` is set to `true`. | +| `data.attributes.allow-destroy-plan` | boolean | `true` | Whether destroy plans can be queued on the workspace. | +| `data.attributes.assessments-enabled` | boolean | `false` | (previously `drift-detection`) Whether or not HCP Terraform performs health assessments for the workspace. May be overridden by the organization setting `assessments-enforced`. Only available for Plus tier organizations, in workspaces running Terraform version 0.15.4+ and operating in [Remote execution mode](/terraform/enterprise/workspaces/settings#execution-mode). | +| `data.attributes.auto-apply` | boolean | `false` | Whether to automatically apply changes when a Terraform plan is successful in runs initiated by VCS, UI or CLI, [with some exceptions](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply). | +| `data.attributes.auto-apply-run-trigger` | boolean | `false` | Whether to automatically apply changes when a Terraform plan is successful in runs initiated by run triggers. | +| `data.attributes.auto-destroy-at` | string | (nothing) | Timestamp when the next scheduled destroy run will occur, refer to [Scheduled Destroy](/terraform/enterprise/workspaces/settings/deletion#automatically-destroy). | +| `data.attributes.auto-destroy-activity-duration` | string | (nothing) | Value and units for [automatically scheduled destroy runs based on workspace activity](/terraform/enterprise/workspaces/settings/deletion#automatically-destroy). Valid values are greater than 0 and four digits or less. Valid units are `d` and `h`. For example, to queue destroy runs after fourteen days of inactivity set `auto-destroy-activity-duration: "14d"`. | +| `data.attributes.description` | string | (nothing) | A description for the workspace. | +| `data.attributes.execution-mode` | string | (nothing) | Which [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) to use. Valid values are `remote`, `local`, and `agent`. When set to `local`, the workspace will be used for state storage only. This value _must not_ be specified if `operations` is specified, and _must_ be specified if `setting-overwrites.execution-mode` is set to `true`. | +| `data.attributes.file-triggers-enabled` | boolean | `true` | Whether to filter runs based on the changed files in a VCS push. If enabled, it uses either `trigger-prefixes` in conjunction with `working_directory` or `trigger-patterns` to describe the set of changed files that will start a run. If disabled, any push triggers a run. | +| `data.attributes.global-remote-state` | boolean | `false` | Whether the workspace should allow all workspaces in the organization to [access its state data](/terraform/enterprise/workspaces/state) during runs. If `false`, then only specifically approved workspaces can access its state. Manage allowed workspaces using the [Remote State Consumers](/terraform/enterprise/api-docs/workspaces#get-remote-state-consumers) endpoints, documented later on this page. Terraform Enterprise admins can choose the default value for new workspaces if this attribute is omitted. | +| `data.attributes.operations` | boolean | `true` | **DEPRECATED** Use `execution-mode` instead. Whether to use remote execution mode. When set to `false`, the workspace will be used for state storage only. This value must not be specified if `execution-mode` is specified. | +| `data.attributes.queue-all-runs` | boolean | `false` | Whether runs should be queued immediately after workspace creation. When set to false, runs triggered by a VCS change will not be queued until at least one run is manually queued. | +| `data.attributes.source-name` | string | none | A friendly name for the application or client creating this workspace. If set, this will be displayed on the workspace as "Created via ``". | +| `data.attributes.source-url` | string | none | A URL for the application or client creating this workspace. This can be the URL of a related resource in another app, or a link to documentation or other info about the client. | +| `data.attributes.speculative-enabled` | boolean | `true` | Whether this workspace allows automatic [speculative plans][]. Setting this to `false` prevents HCP Terraform from running plans on pull requests, which can improve security if the VCS repository is public or includes untrusted contributors. It doesn't prevent manual speculative plans via the CLI or the runs API. | +| `data.attributes.terraform-version` | string | latest release | Specifies the version of Terraform to use for this workspace. You can specify an exact version or a [version constraint](/terraform/language/expressions/version-constraints) such as `~> 1.0.0`. If you specify a constraint, the workspace always uses the newest release that meets that constraint. If omitted when creating a workspace, this defaults to the latest released version. | +| `data.attributes.trigger-patterns` | array | `[]` | List of glob patterns that describe the files HCP Terraform monitors for changes. Trigger patterns are always appended to the root directory of the repository. | +| `data.attributes.trigger-prefixes` | array | `[]` | List of trigger prefixes that describe the paths HCP Terraform monitors for changes, in addition to the working directory. Trigger prefixes are always appended to the root directory of the repository. HCP Terraform starts a run when files are changed in any directory path matching the provided set of prefixes. | +| `data.attributes.vcs-repo.branch` | string | repository's default branch | The repository branch that Terraform executes from. If omitted or submitted as an empty string, this defaults to the repository's default branch. | +| `data.attributes.vcs-repo.identifier` | string | none | A reference to your VCS repository in the format :org/:repo where :org and :repo refer to the organization and repository in your VCS provider. The format for Azure DevOps is `:org/:project/_git/:repo`. | +| `data.attributes.vcs-repo.ingress-submodules` | boolean | `false` | Whether submodules should be fetched when cloning the VCS repository. | +| `data.attributes.vcs-repo.oauth-token-id` | string | none | Specifies the VCS OAuth connection and token. Call the [`oauth-tokens`](/terraform/enterprise/api-docs/oauth-tokens) endpoint to retrieve the OAuth ID. | +| `data.attributes.vcs-repo.tags-regex` | string | none | A regular expression used to match Git tags. HCP Terraform triggers a run when this value is present and a VCS event occurs that contains a matching Git tag for the regular expression. | +| `data.attributes.vcs-repo` | object | none | Settings for the workspace's VCS repository. If omitted, the workspace is created without a VCS repo. If included, you must specify at least the `oauth-token-id` and `identifier` keys. | +| `data.attributes.working-directory` | string | (nothing) | A relative path that Terraform will execute within. This defaults to the root of your repository and is typically set to a subdirectory matching the environment when multiple environments exist within the same repository. | +| `data.attributes.setting-overwrites` | object | none | The keys in this object are attributes that have organization-level defaults. Each attribute key stores a boolean value which is `true` by default. To overwrite the default inherited value, set an attribute's value to `false`. For example, to set `execution-mode` as the organization default, set `setting-overwrites.execution-mode` to `false`. | +| `data.relationships` | object | none | Specifies a group of workspace associations. | +| `data.relationships.project.data.id` | string | default project | The ID of the project to create the workspace in. If left blank, Terraform creates the workspace in the organization's default project. You must have permission to create workspaces in the project, either by organization-level permissions or team admin access to a specific project. | +| `data.relationships.tag-bindings.data` | list of objects | none | Specifies a list of tags to attach to the workspace. | +| `data.relationships.tag-bindings.data.type` | string | none | Must be `tag-bindings` for each object in the list. | +| `data.relationships.tag-bindings.data.attributes.key` | string | none | Specifies the tag key for each object in the list. | +| `data.relationships.tag-bindings.data.attributes.value` | string | none | Specifies the tag value for each object in the list. | + +### Sample Payload + +_Without a VCS repository_ + +```json +{ + "data": { + "attributes": { + "name": "workspace-1" + }, + "type": "workspaces" + } +} +``` + +_With Key/Value Tags_ + +```json +{ + "data": { + "attributes": { + "name": "workspace-1" + }, + "type": "workspaces", + "relationships": { + "tag-bindings": { + { + "data": [{ + "type": "tag-bindings", + "attributes": { "key": "env", "value": "test"} + }] + } + } + } + } +} +``` + +_With a VCS repository_ + +```json +{ + "data": { + "attributes": { + "name": "workspace-2", + "terraform_version": "0.11.1", + "working-directory": "", + "vcs-repo": { + "identifier": "example/terraform-test-proj", + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ", + "branch": "", + "tags-regex": null + } + }, + "type": "workspaces" + } +} +``` + +_Using Git Tags_ + +HCP Terraform triggers a run when you push a Git tag that matches the regular expression (SemVer): `1.2.3`, `22.33.44`, etc. + +```json +{ + "data": { + "attributes": { + "name": "workspace-3", + "terraform_version": "0.12.1", + "file-triggers-enabled": false, + "working-directory": "/networking", + "vcs-repo": { + "identifier": "example/terraform-test-proj-monorepo", + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ", + "branch": "", + "tags-regex": "\d+.\d+.\d+" + } + }, + "type": "workspaces" + } +} +``` + +_For a monorepo using trigger prefixes_ + +A run will be triggered in this workspace when changes are detected in any of the specified directories: `/networking`, `/modules`, or `/vendor`. + +```json +{ + "data": { + "attributes": { + "name": "workspace-3", + "terraform_version": "0.12.1", + "file-triggers-enabled": true, + "trigger-prefixes": ["/modules", "/vendor"], + "working-directory": "/networking", + "vcs-repo": { + "identifier": "example/terraform-test-proj-monorepo", + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ", + "branch": "" + }, + "updated-at": "2017-11-29T19:18:09.976Z" + }, + "type": "workspaces" + } +} +``` + +_For a monorepo using trigger patterns_ + +A run will be triggered in this workspace when HCP Terraform detects any of the following changes: + +- A file with the extension `tf` in any directory structure in which the last folder is named `networking` (e.g., `root/networking` and `root/module/networking`) +- Any file changed in the folder `/base`, no subfolders are included +- Any file changed in the folder `/submodule` and all of its subfolders + +```json +{ + "data": { + "attributes": { + "name": "workspace-4", + "terraform_version": "1.2.2", + "file-triggers-enabled": true, + "trigger-patterns": ["/**/networking/*.tf", "/base/*", "/submodule/**/*"], + "vcs-repo": { + "identifier": "example/terraform-test-proj-monorepo", + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ", + "branch": "" + }, + "updated-at": "2022-06-09T19:18:09.976Z" + }, + "type": "workspaces" + } +} +``` + +_Using HCP Terraform agents_ + +[HCP Terraform agents](/terraform/enterprise/api-docs/agents) allow HCP Terraform to communicate with isolated, private, or on-premises infrastructure. + +```json +{ + "data": { + "attributes": { + "name":"workspace-1", + "execution-mode": "agent", + "agent-pool-id": "apool-ZjT6A7mVFm5WHT5a" + } + }, + "type": "workspaces" +} +``` + +_Using an organization default execution mode_ + +```json +{ + "data": { + "attributes": { + "name":"workspace-with-default", + "setting-overwrites": { + "execution-mode": false + } + } + }, + "type": "workspaces" +} + +``` + +_With a project_ + +```json +{ + "data": { + "type": "workspaces", + "attributes": { + "name": "workspace-in-project" + }, + "relationships": { + "project": { + "data": { + "type": "projects", + "id": "prj-jT92VLSFpv8FwKtc" + } + } + } + } +} +``` + +_With key-value tags_ + +```json +{ + "data": { + "type": "workspaces", + "attributes": { + "name": "workspace-in-project" + } + } +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/workspaces +``` + +### Sample Response + +_Without a VCS repository_ + +**Note:** The `assessments-enabled` property is only accepted by or returned from HCP Terraform. + +@include 'api-code-blocks/workspace.mdx' + +_With a VCS repository_ + +@include 'api-code-blocks/workspace-with-vcs.mdx' + +_With a project_ + +```json +{ + "data": { + "id": "ws-HRkJLSYWF97jucqQ", + "type": "workspaces", + "attributes": { + "allow-destroy-plan": true, + "auto-apply": false, + "auto-apply-run-trigger": false, + "auto-destroy-at": null, + "auto-destroy-activity-duration": null, + "created-at": "2022-12-05T20:57:13.829Z", + "environment": "default", + "locked": false, + "locked-reason": "", + "name": "workspace-in-project", + "queue-all-runs": false, + "speculative-enabled": true, + "structured-run-output-enabled": true, + "terraform-version": "1.3.5", + "working-directory": null, + "global-remote-state": true, + "updated-at": "2022-12-05T20:57:13.829Z", + "resource-count": 0, + "apply-duration-average": null, + "plan-duration-average": null, + "policy-check-failures": null, + "run-failures": null, + "workspace-kpis-runs-count": null, + "latest-change-at": "2022-12-05T20:57:13.829Z", + "operations": true, + "execution-mode": "remote", + "vcs-repo": null, + "vcs-repo-identifier": null, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-queue-run": true, + "can-read-variable": true, + "can-update-variable": true, + "can-read-state-versions": true, + "can-read-state-outputs": true, + "can-create-state-versions": true, + "can-queue-apply": true, + "can-lock": true, + "can-unlock": true, + "can-force-unlock": true, + "can-read-settings": true, + "can-manage-tags": true, + "can-manage-run-tasks": false, + "can-force-delete": true, + "can-manage-assessments": true, + "can-read-assessment-results": true, + "can-queue-destroy": true + }, + "actions": { + "is-destroyable": true + }, + "description": null, + "file-triggers-enabled": true, + "trigger-prefixes": [], + "trigger-patterns": [], + "assessments-enabled": false, + "last-assessment-result-at": null, + "source": "tfe-api", + "source-name": null, + "source-url": null, + "tag-names": [], + "setting-overwrites": { + "execution-mode": false, + "agent-pool": false + } + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + }, + "current-run": { + "data": null + }, + "effective-tag-bindings": { + "links": { + "related": "/api/v2/workspaces/ws-HRkJLSYWF97jucqQ/effective-tag-bindings" + } + }, + "latest-run": { + "data": null + }, + "outputs": { + "data": [] + }, + "remote-state-consumers": { + "links": { + "related": "/api/v2/workspaces/ws-HRkJLSYWF97jucqQ/relationships/remote-state-consumers" + } + }, + "current-state-version": { + "data": null + }, + "current-configuration-version": { + "data": null + }, + "agent-pool": { + "data": null + }, + "readme": { + "data": null + }, + "project": { + "data": { + "id": "prj-jT92VLSFpv8FwKtc", + "type": "projects" + } + }, + "current-assessment-result": { + "data": null + }, + "tag-bindings": { + "links": { + "related": "/api/v2/workspaces/ws-HRkJLSYWF97jucqQ/tag-bindings" + } + }, + "vars": { + "data": [] + }, + }, + "links": { + "self": "/api/v2/organizations/my-organization/workspaces/workspace-in-project" + } + } +} +``` + +## Update a Workspace + +Use one of the following endpoint to update a workspace: + +- `PATCH /organizations/:organization_name/workspaces/:name` +- `PATCH /workspaces/:workspace_id` + +| Parameter | Description | +| -------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The ID of the workspace to update | +| `:organization_name` | The name of the organization the workspace belongs to. | +| `:name` | The name of the workspace to update. Workspace names are unique identifiers in the organization and can only include letters, numbers, `-`, and `_`. | + +### Request Body + +These PATCH endpoints require a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------------------------------------------------- | --------------- | ---------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `data.type` | string | | Must be `"workspaces"`. | +| `data.attributes.name` | string | (previous value) | A new name for the workspace, which can only include letters, numbers, `-`, and `_`. This will be used as an identifier and must be unique in the organization. **Warning:** Changing a workspace's name changes its URL in the API and UI. | +| `data.attributes.agent-pool-id` | string | (previous value) | Required when `execution-mode` is set to `agent`. The ID of the agent pool belonging to the workspace's organization. This value must not be specified if `execution-mode` is set to `remote` or `local` or if `operations` is set to `true`. | +| `data.attributes.allow-destroy-plan` | boolean | (previous value) | Whether destroy plans can be queued on the workspace. | +| `data.attributes.assessments-enabled` | boolean | `false` | (previously `drift-detection`) Whether or not HCP Terraform performs health assessments for the workspace. May be overridden by the organization setting `assessments-enforced`. Only available for Plus tier organizations, in workspaces running Terraform version 0.15.4+ and operating in [Remote execution mode](/terraform/enterprise/workspaces/settings#execution-mode). | +| `data.attributes.auto-apply` | boolean | (previous value) | Whether to automatically apply changes when a Terraform plan is successful in runs initiated by VCS, UI or CLI, [with some exceptions](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply). | +| `data.attributes.auto-apply-run-trigger` | boolean | (previous value) | Whether to automatically apply changes when a Terraform plan is successful in runs initiated by run triggers. | +| `data.attributes.auto-destroy-at` | string | (previous value) | Timestamp when the next scheduled destroy run will occur, refer to [Scheduled Destroy](/terraform/enterprise/workspaces/settings/deletion#automatically-destroy). | +| `data.attributes.auto-destroy-activity-duration` | string | (previous value) | Value and units for [automatically scheduled destroy runs based on workspace activity](/terraform/enterprise/workspaces/settings/deletion#automatically-destroy). Valid values are greater than 0 and four digits or less. Valid units are `d` and `h`. For example, to queue destroy runs after fourteen days of inactivity set `auto-destroy-activity-duration: "14d"`. | +| `data.attributes.description` | string | (previous value) | A description for the workspace. | +| `data.attributes.execution-mode` | string | (previous value) | Which [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) to use. Valid values are `remote`, `local`, and `agent`. When set to `local`, the workspace will be used for state storage only. This value _must not_ be specified if `operations` is specified, and _must_ be specified if `setting-overwrites.execution-mode` is set to `true`. | +| `data.attributes.file-triggers-enabled` | boolean | (previous value) | Whether to filter runs based on the changed files in a VCS push. If enabled, it uses either `trigger-prefixes` in conjunction with `working_directory` or `trigger-patterns` to describe the set of changed files that will start a run. If disabled, any push will trigger a run. | +| `data.attributes.global-remote-state` | boolean | (previous value) | Whether the workspace should allow all workspaces in the organization to [access its state data](/terraform/enterprise/workspaces/state) during runs. If `false`, then only specifically approved workspaces can access its state. Manage allowed workspaces using the [Remote State Consumers](/terraform/enterprise/api-docs/workspaces#get-remote-state-consumers) endpoints, documented later on this page. | +| `data.attributes.operations` | boolean | (previous value) | **DEPRECATED** Use `execution-mode` instead. Whether to use remote execution mode. When set to `false`, the workspace will be used for state storage only. This value must not be specified if `execution-mode` is specified. | +| `data.attributes.queue-all-runs` | boolean | (previous value) | Whether runs should be queued immediately after workspace creation. When set to false, runs triggered by a VCS change will not be queued until at least one run is manually queued. | +| `data.attributes.speculative-enabled` | boolean | (previous value) | Whether this workspace allows automatic [speculative plans][]. Setting this to `false` prevents HCP Terraform from running plans on pull requests, which can improve security if the VCS repository is public or includes untrusted contributors. It doesn't prevent manual speculative plans via the CLI or the runs API. | +| `data.attributes.terraform-version` | string | (previous value) | The version of Terraform to use for this workspace. This can be either an exact version or a [version constraint](/terraform/language/expressions/version-constraints) (like `~> 1.0.0`); if you specify a constraint, the workspace will always use the newest release that meets that constraint. | +| `data.attributes.trigger-patterns` | array | (previous value) | List of glob patterns that describe the files HCP Terraform monitors for changes. Trigger patterns are always appended to the root directory of the repository. | +| `data.attributes.trigger-prefixes` | array | (previous value) | List of trigger prefixes that describe the paths HCP Terraform monitors for changes, in addition to the working directory. Trigger prefixes are always appended to the root directory of the repository. HCP Terraform will start a run when files are changed in any directory path matching the provided set of prefixes. | +| `data.attributes.vcs-repo.branch` | string | (previous value) | The repository branch that Terraform will execute from. | +| `data.attributes.vcs-repo.identifier` | string | (previous value) | A reference to your VCS repository in the format :org/:repo where :org and :repo refer to the organization and repository in your VCS provider. The format for Azure DevOps is `:org/:project/_git/:repo`. | +| `data.attributes.vcs-repo.ingress-submodules` | boolean | (previous value) | Whether submodules should be fetched when cloning the VCS repository. | +| `data.attributes.vcs-repo.oauth-token-id` | string | | The VCS Connection (OAuth Connection + Token) to use as identified. Get this ID from the [oauth-tokens](/terraform/enterprise/api-docs/oauth-tokens) endpoint. You can not specify this value if `github-app-installation-id` is specified. | +| `data.attributes.vcs-repo.github-app-installation-id` | string | | The VCS Connection GitHub App Installation to use. Find this ID on the account settings page. Requires previously authorizing the GitHub App and generating a user-to-server token. Manage the token from **Account Settings** within HCP Terraform. You can not specify this value if `oauth-token-id` is specified. | +| `data.attributes.vcs-repo.tags-regex` | string | (previous value) | A regular expression used to match Git tags. HCP Terraform triggers a run when this value is present and a VCS event occurs that contains a matching Git tag for the regular expression. | +| `data.attributes.vcs-repo` | object or null | (previous value) | To delete a workspace's existing VCS repo, specify `null` instead of an object. To modify a workspace's existing VCS repo, include whichever of the keys below you wish to modify. To add a new VCS repo to a workspace that didn't previously have one, include at least the `oauth-token-id` and `identifier` keys. | +| `data.attributes.working-directory` | string | (previous value) | A relative path that Terraform will execute within. This defaults to the root of your repository and is typically set to a subdirectory matching the environment when multiple environments exist within the same repository. | +| `data.attributes.setting-overwrites` | object | | The keys in this object are attributes that have organization-level defaults. Each attribute key stores a boolean value which is `true` by default. To overwrite the default inherited value, set an attribute's value to `false`. For example, to set `execution-mode` as the organization default, you set `setting-overwrites.execution-mode = false`. | +| `data.relationships` | object | none | Specifies a group of workspace relationships. | +| `data.relationships.project.data.id` | string | existing value | The ID of the project to move the workspace to. If left blank or unchanged, the workspace will not be moved. You must have admin permissions on both the source project and destination project in order to move a workspace between projects. | +| `data.relationships.tag-bindings.data` | list of objects | none | Specifies a list of tags to attach to the workspace. | +| `data.relationships.tag-bindings.data.type` | string | none | Must be `tag-bindings` for each object in the list. | +| `data.relationships.tag-bindings.data.attributes.key` | string | none | Specifies the tag key for each object in the list. | +| `data.relationships.tag-bindings.data.attributes.value` | string | none | Specifies the tag value for each object in the list. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "name": "workspace-2", + "resource-count": 0, + "terraform_version": "0.11.1", + "working-directory": "", + "vcs-repo": { + "identifier": "example/terraform-test-proj", + "branch": "", + "ingress-submodules": false, + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ" + }, + "updated-at": "2017-11-29T19:18:09.976Z" + }, + "relationships": { + "project": { + "data": { + "type": "projects", + "id": "prj-7HWWPGY3fYxztELU" + } + }, + "tag-bindings": { + "data": [ + { + "type": "tag-bindings", + "attributes": { + "key": "environment", + "value": "development" + } + }, + ] + } + }, + "type": "workspaces" + } +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/organizations/my-organization/workspaces/workspace-2 +``` + +### Sample Response + +@include 'api-code-blocks/workspace-with-vcs.mdx' + +## List workspaces + +This endpoint lists workspaces in the organization. + +`GET /organizations/:organization_name/workspaces` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------- | +| `:organization_name` | The name of the organization to list the workspaces of. | + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| ----------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 workspaces per page. | +| `search[name]` | **Optional.** If specified, restricts results to workspaces with a name that matches the search string using a fuzzy search. | +| `search[tags]` | **Optional.** If specified, restricts results to workspaces with that tag. If multiple comma separated values are specified, results matching all of the tags are returned. | +| `search[exclude-tags]` | **Optional.** If specified, results exclude workspaces with that tag. If multiple comma separated values are specified, workspaces with tags matching any of the tags are excluded. | +| `search[wildcard-name]` | **Optional.** If specified, restricts results to workspaces with partial matching, using `*` on prefix, suffix, or both. For example, `search[wildcard-name]=*-prod` returns all workspaces ending in `-prod`, `search[wildcard-name]=prod-*` returns all workspaces beginning with `prod-`, and `search[wildcard-name]=*-prod-*` returns all workspaces with substring `-prod-` regardless of prefix and/or suffix. | +| `sort` | **Optional.** Allows sorting the organization's workspaces by a provided value. You can sort by `"name"`, `"current-run.created-at"` (the time of the current run), and `"latest-change-at"` (the creation time of the latest state version or the workspace itself if no state version exists). Prepending a hyphen to the sort parameter reverses the order. For example, `"-name"` sorts by name in reverse alphabetical order. If omitted, the default sort order is arbitrary but stable. | +| `filter[project][id]` | **Optional.** If specified, restricts results to workspaces in the specific project. | +| `filter[current-run][status]` | **Optional.** If specified, restricts results to workspaces that match the status of a current run. | +| `filter[tagged][i][key]` | **Optional.** If specified, restricts results to workspaces that are tagged with the provided key. Use a value of "0" for `i` if you are only using a single filter. For multiple tag filters, use an incrementing integer value for each filter. Multiple tag filters will be combined together with a logical AND when filtering results. | +| `filter[tagged][i][value]` | **Optional.** If specified, restricts results to workspaces that are tagged with the provided value. This is useful when combined with a `key` filter for more specificity. Use a value of "0" for `i` if you are only using a single filter. For multiple tag filters, use an incrementing integer value for each filter. Multiple tag filters will be combined together with a logical AND when filtering results. | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/workspaces +``` + +_With multiple tag filters_ + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/workspaces?filter%5B%tagged5D%5B0%5D%5Bkey%5D=environment&filter%5B%tagged5D%5B0%5D%5Bvalue%5D=development&filter%5B%tagged5D%5B1%5D%5Bkey%5D=meets-compliance +``` + +### Sample Response + +@include 'api-code-blocks/workspaces-list.mdx' + +## Show workspace + +Details on a workspace can be retrieved from two endpoints, which behave identically. + +One refers to a workspace by its ID: + +`GET /workspaces/:workspace_id` + +| Parameter | Description | +| --------------- | ---------------- | +| `:workspace_id` | The workspace ID | + +The other refers to a workspace by its name and organization: + +`GET /organizations/:organization_name/workspaces/:name` + +| Parameter | Description | +| -------------------- | ----------------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization the workspace belongs to. | +| `:name` | The name of the workspace to show details for, which can only include letters, numbers, `-`, and `_`. | + +### Workspace performance attributes + +The following attributes are helpful in determining the overall health and performance of your workspace configuration. These metrics refer to the **past 30 runs that have either resulted in an error or successfully applied**. + +| Parameter | Type | Description | +| ------------------------------------------ | ------ | --------------------------------------------------------------------------------------- | +| `data.attributes.apply-duration-average` | number | This is the average time runs spend in the **apply** phase, represented in milliseconds | +| `data.attributes.plan-duration-average` | number | This is the average time runs spend in the **plan** phase, represented in milliseconds | +| `data.attributes.policy-check-failures` | number | Reports the number of run failures resulting from a policy check failure | +| `data.attributes.run-failures` | number | Reports the number of failed runs | +| `data.attributes.workspace-kpis-run-count` | number | Total number of runs taken into account by these metrics | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/my-organization/workspaces/workspace-1 +``` + +### Sample Response + +@include 'api-code-blocks/workspace.mdx' + +## Safe Delete a workspace + +When you delete an HCP Terraform workspace with resources, Terraform can no longer track or manage that infrastructure. During a safe delete, HCP Terraform only deletes the workspace if it is not managing resources. + +You can safe delete a workspace using two endpoints that behave identically. The first endpoint identifies a workspace with the workspace ID, and the other identifies the workspace by its name and organization. + +`POST /workspaces/:workspace_id/actions/safe-delete` + +| Parameter | Description | +| --------------- | ---------------------------------- | +| `:workspace_id` | The ID of the workspace to delete. | + +`POST /organizations/:organization_name/workspaces/:name/actions/safe-delete` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the workspace's organization. | +| `:name` | The name of the workspace to delete, which can only include letters, numbers, `-`, and `_`. | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | No Content | Successfully deleted the workspace | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform workspace delete | +| [409][] | [JSON API error object][] | Workspace is not safe to delete because it is managing resources | + +## Force Delete a workspace + +During a force delete, HCP Terraform removes the specified workspace without checking whether it is managing resources. We recommend using the [safe delete endpoint](#safe-delete-a-workspace) instead, when possible. + +!> **Warning:** Terraform cannot track or manage the workspace's infrastructure after deletion. We recommend [destroying the workspace's infrastructure](/terraform/enterprise/run/modes-and-options#destroy-mode) before you delete it. + +By default, only organization owners can force delete workspaces. Organization owners can also update [organization's settings]\(/terraform/cloud-docs/users-teams organizations/organizations#general) to let workspace admins force delete their own workspaces. + +You can use two endpoints to force delete a workspace, which behave identically. One endpoint identifies the workspace with its workspace ID and the other endpoint identifies the workspace with its name and organization. + +`DELETE /workspaces/:workspace_id` + +| Parameter | Description | +| --------------- | --------------------------------- | +| `:workspace_id` | The ID of the workspace to delete | + +`DELETE /organizations/:organization_name/workspaces/:name` + +| Parameter | Description | +| -------------------- | ------------------------------------------------------------------------------------------- | +| `:organization_name` | The name of the organization the workspace belongs to. | +| `:name` | The name of the workspace to delete, which can only include letters, numbers, `-`, and `_`. | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | No Content | Successfully deleted the workspace | +| [403][] | [JSON API error object][] | Not authorized to perform a force delete on the workspace | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform workspace delete | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + https://app.terraform.io/api/v2/organizations/my-organization/workspaces/workspace-1 +``` + +## Lock a workspace + +This endpoint locks a workspace. + +`POST /workspaces/:workspace_id/actions/lock` + +| Parameter | Description | +| --------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to lock. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +| Status | Response | Reason(s) | +| ------- | -------------------------------------------- | ----------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "workspaces"`) | Successfully locked the workspace | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | +| [409][] | [JSON API error object][] | Workspace already locked | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------- | ------ | ------- | ------------------------------------- | +| `reason` | string | `""` | The reason for locking the workspace. | + +### Sample Payload + +```json +{ + "reason": "Locking workspace-1" +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-SihZTyXKfNXUWuUa/actions/lock +``` + +### Sample Response + +@include 'api-code-blocks/workspace.mdx' + +## Unlock a workspace + +This endpoint unlocks a workspace. Unlocking a workspace sets the current state version to the latest finalized intermediate state version. If intermediate state versions are available, but HCP Terraform has not yet finalized the latest intermediate state version, the unlock will fail with a 503 response. For this particular error, it's recommended to retry the unlock operation for a short period of time until the platform finalizes the state version. If you must force-unlock a workspace under these conditions, ensure that state was saved successfully by inspecting the latest state version using the [State Version List API](/terraform/enterprise/api-docs/state-versions#list-state-versions-for-a-workspace) + +`POST /workspaces/:workspace_id/actions/unlock` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to unlock. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +| Status | Response | Reason(s) | +| ------- | -------------------------------------------- | ----------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "workspaces"`) | Successfully unlocked the workspace | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | +| [409][] | [JSON API error object][] | Workspace already unlocked, or locked by a different user | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/workspaces/ws-SihZTyXKfNXUWuUa/actions/unlock +``` + +### Sample Response + +@include 'api-code-blocks/workspace.mdx' + +## Force Unlock a workspace + +This endpoint force unlocks a workspace. Only users with admin access are authorized to force unlock a workspace. + +`POST /workspaces/:workspace_id/actions/force-unlock` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to force unlock. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +| Status | Response | Reason(s) | +| ------- | -------------------------------------------- | ----------------------------------------------------------- | +| [200][] | [JSON API document][] (`type: "workspaces"`) | Successfully force unlocked the workspace | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | +| [409][] | [JSON API error object][] | Workspace already unlocked | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + https://app.terraform.io/api/v2/workspaces/ws-SihZTyXKfNXUWuUa/actions/force-unlock +``` + +### Sample Response + +@include 'api-code-blocks/workspace-with-vcs.mdx' + +## Assign an SSH key to a workspace + +This endpoint assigns an SSH key to a workspace. + +`PATCH /workspaces/:workspace_id/relationships/ssh-key` + +| Parameter | Description | +| --------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to assign the SSH key to. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------------------- | ------ | ------- | ------------------------------------------------------------------------------------------------------------ | +| `data.type` | string | | Must be `"workspaces"`. | +| `data.attributes.id` | string | | The SSH key ID to assign. Obtain this from the [ssh-keys](/terraform/enterprise/api-docs/ssh-keys) endpoint. | + +#### Sample Payload + +```json +{ + "data": { + "attributes": { + "id": "sshkey-GxrePWre1Ezug7aM" + }, + "type": "workspaces" + } +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-SihZTyXKfNXUWuUa/relationships/ssh-key +``` + +### Sample Response + +@include 'api-code-blocks/workspace-with-vcs.mdx' + +## Unassign an SSH key from a workspace + +This endpoint unassigns the currently assigned SSH key from a workspace. + +`PATCH /workspaces/:workspace_id/relationships/ssh-key` + +| Parameter | Description | +| --------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to assign the SSH key to. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| -------------------- | ------ | ------- | ----------------------- | +| `data.type` | string | | Must be `"workspaces"`. | +| `data.attributes.id` | string | | Must be `null`. | + +### Sample Payload + +```json +{ + "data": { + "attributes": { + "id": null + }, + "type": "workspaces" + } +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-SihZTyXKfNXUWuUa/relationships/ssh-key +``` + +### Sample Response + +@include 'api-code-blocks/workspace-with-vcs.mdx' + +## Get Remote State Consumers + +`GET /workspaces/:workspace_id/relationships/remote-state-consumers` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to get remote state consumers for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +This endpoint retrieves the list of other workspaces that are allowed to access the given workspace's state during runs. + +- If `global-remote-state` is set to false for the workspace, this will return the list of other workspaces that are specifically authorized to access the workspace's state. +- If `global-remote-state` is set to true, this will return a list of every workspace in the organization except for the subject workspace. + +The list returned by this endpoint is subject to the caller's normal workspace permissions; it will not include workspaces that the provided API token is unable to read. + +### Query Parameters + +This endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| -------------- | -------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 workspaces per page. | + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-SihZTyXKfNXUWuUa/relationships/remote-state-consumers +``` + +### Sample Response + +@include 'api-code-blocks/workspaces-list.mdx' + +## Replace Remote State Consumers + +`PATCH /workspaces/:workspace_id/relationships/remote-state-consumers` + +| Parameter | Description | +| --------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to replace remote state consumers for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +This endpoint updates the workspace's remote state consumers to be _exactly_ the list of workspaces specified in the payload. It can only be used for workspaces where `global-remote-state` is false. + +This endpoint can only be used by teams with permission to manage workspaces for the entire organization — only those who can _view_ the entire list of consumers can _replace_ the entire list. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) Teams with admin permissions on specific workspaces can still modify remote state consumers for those workspaces, but must use the add (POST) and remove (DELETE) endpoints listed below instead of this PATCH endpoint. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | No Content | Successfully updated remote state consumers | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ----------------------------------------------------------- | +| `data[].type` | string | | Must be `"workspaces"`. | +| `data[].id` | string | | The ID of a workspace to be set as a remote state consumer. | + +### Sample Payload + +```json +{ + "data": [ + { + "id": "ws-7aiqKYf6ejMFdtWS", + "type": "workspaces" + } + ] +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-UYv6RYM8fVhzeGG5/relationships/remote-state-consumers +``` + +### Response + +No response body. + +Status code `204`. + +## Add Remote State Consumers + +`POST /workspaces/:workspace_id/relationships/remote-state-consumers` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to add remote state consumers for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +This endpoint adds one or more remote state consumers to the workspace. It can only be used for workspaces where `global-remote-state` is false. + +- The workspaces specified as consumers must be readable to the API token that makes the request. +- A workspace cannot be added as a consumer of itself. (A workspace can always read its own state, regardless of access settings.) +- You can safely add a consumer workspace that is already present; it will be ignored, and the rest of the consumers in the request will be processed normally. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | No Content | Successfully updated remote state consumers | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ----------------------------------------------------------- | +| `data[].type` | string | | Must be `"workspaces"`. | +| `data[].id` | string | | The ID of a workspace to be set as a remote state consumer. | + +### Sample Payload + +```json +{ + "data": [ + { + "id": "ws-7aiqKYf6ejMFdtWS", + "type": "workspaces" + } + ] +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-UYv6RYM8fVhzeGG5/relationships/remote-state-consumers +``` + +### Response + +No response body. + +Status code `204`. + +## Delete Remote State Consumers + +`DELETE /workspaces/:workspace_id/relationships/remote-state-consumers` + +| Parameter | Description | +| --------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to remove remote state consumers for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +This endpoint removes one or more remote state consumers from a workspace, according to the contents of the payload. It can only be used for workspaces where `global-remote-state` is false. + +- The workspaces specified as consumers must be readable to the API token that makes the request. +- You can safely remove a consumer workspace that is already absent; it will be ignored, and the rest of the consumers in the request will be processed normally. + +| Status | Response | Reason(s) | +| ------- | ------------------------- | --------------------------------------------------------------------- | +| [204][] | No Content | Successfully updated remote state consumers | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | +| [422][] | [JSON API error object][] | Problem with payload or request; details provided in the error object | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ------------- | ------ | ------- | ---------------------------------------------------------------- | +| `data[].type` | string | | Must be `"workspaces"`. | +| `data[].id` | string | | The ID of a workspace to remove from the remote state consumers. | + +### Sample Payload + +```json +{ + "data": [ + { + "id": "ws-7aiqKYf6ejMFdtWS", + "type": "workspaces" + } + ] +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-UYv6RYM8fVhzeGG5/relationships/remote-state-consumers +``` + +### Response + +No response body. + +Status code `204`. + +## List workspace tags + +Workspace tags are [organization tags](/terraform/enterprise/api-docs/organization-tags) added to a workspace. They are a flat list of keys that can only be applied to workspaces when using the `tags` attribute in the Terraform `cloud` block in Terraform v1.9 and older. To list key-value tags supported in Terraform v1.10 and newer, refer to [List workspace tag bindings](#list-workspace-tag-bindings). + +`GET /workspaces/:workspace_id/relationships/tags`: Paginated list of flat string tags attached to the workspace. + +### Path parameters + +| Parameter | Description | +| --------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to fetch tags for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +### Query Parameters + +Only the flat string tags endpoint supports pagination [with standard URL query parameters](/terraform/enterprise/api-docs#query-parameters). Remember to percent-encode `[` as `%5B` and `]` as `%5D` if your tooling doesn't automatically encode URLs. Conversely, all tags are returned when using fetching tag-bindings or effective-tag-bindings endpoints. + +| Parameter | Description | +| -------------- | -------------------------------------------------------------------------- | +| `page[number]` | **Optional.** If omitted, the endpoint will return the first page. | +| `page[size]` | **Optional.** If omitted, the endpoint will return 20 workspaces per page. | + +### Sample Requests + + + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-db61c9eb5cab5ae2/relationships/tags +``` + + + +### Sample Responses + + + +```json +{ + "data": [ + { + "id": "tag-1", + "type": "tags", + "attributes": { + "name": "tag1", + "created-at": "2022-03-09T06:04:39.585Z", + "instance-count": 1 + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + }, + { + "id": "tag-2", + "type": "tags", + "attributes": { + "name": "tag2", + "created-at": "2022-03-09T06:04:39.585Z", + "instance-count": 2 + }, + "relationships": { + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + } + } + } + ] +} +``` + + + +## List workspace tag bindings + +Call the following endpoints to list the tags attached to a workspace: + +- `GET /workspaces/:workspace_id/tag-bindings`: Lists key-value tags directly bound to the workspace. +- `GET /workspaces/:workspace_id/effective-tag-bindings`: Lists all key-value tags bound to the workspace, including those inherited from the parent project. + +### Path parameters + +| Parameter | Description | +| --------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to fetch tags for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +### Sample Requests + + + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-db61c9eb5cab5ae2/tag-bindings +``` + + + + + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/workspaces/ws-db61c9eb5cab5ae2/effective-tag-bindings +``` + + + +### Sample Responses + + + +```json +{ + "data": [ + { + "id": "tb-232e23631380f79e", + "type": "tag-bindings", + "attributes": { + "key": "costcenter", + "value": "123", + "created-at": "2024-11-19T23:59:24.648Z" + } + } + ], + "links": { + "target": "/api/v2/workspaces/ws-db61c9eb5cab5ae2" + } +} +``` + + +
+ + +```json +{ + "data": [ + { + "id": "07cc44202a430fc2", + "type": "effective-tag-bindings", + "attributes": { + "key": "costcenter", + "value": "123" + } + }, + { + "id": "f8b11951f98e11f8", + "type": "effective-tag-bindings", + "attributes": { + "key": "dept", + "value": "r+d" + }, + "relationships": { + "inherited-from": { + "links": { + "related": "/api/v2/projects/prj-af7d174fa1ea7423" + } + } + } + } + ] +} +``` + + + +## Add flat string tags to a workspace + +`POST /workspaces/:workspace_id/relationships/tags` + +To add key-value tags to an existing workspace, call the `PATCH /workspaces/:workspace_id` and provide workspace tag bindings in the JSON payload. Refer to [Update a workspace](#update-a-workspace) for additional information. + +You can also bind key-value tags when creating a workspace. Refer to [Create a workspace](#create-a-workspace) for additional information. + +Refer to [Define project tags](/terraform/enterprise/projects/manage#define-project-tags) for information about supported tag values. + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:workspace_id` | The workspace ID to add tags to. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No Content | Successfully added tags to workspace | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +It is important to note that `type`, as well as one of `id` _or_ `attributes.name` is required. + +| Key path | Type | Default | Description | +| ------------------------ | ------ | ------- | --------------------------- | +| `data[].type` | string | | Must be `"tags"`. | +| `data[].id` | string | | The ID of the tag to add. | +| `data[].attributes.name` | string | | The name of the tag to add. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "tags", + "attributes": { + "name": "foo" + } + }, + { + "type": "tags", + "attributes": { + "name": "bar" + } + } + ] +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/workspace-2/relationships/tags +``` + +### Sample Response + +No response body. + +Status code `204`. + +## Remove tags from workspace + +This endpoint removes one or more tags from a workspace. The workspace must already exist, and tag +element that supplies an `id` attribute must exist. If the `name` attribute is used, and no matching +organization tag is found, no action will occur for that entry. Tags removed from all workspaces will be +removed from the organization-wide list. + +To remove key-value tags to an existing workspace, call the `PATCH /workspaces/:workspace_id` and provide workspace tag bindings in the JSON payload. Refer to [Update a workspace](#update-a-workspace) for additional information. + +`DELETE /workspaces/:workspace_id/relationships/tags` + +| Parameter | Description | +| --------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to remove tags from. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or the [Show Workspace](#show-workspace) endpoint. | + +| Status | Response | Reason(s) | +| ------- | ------------------------- | ----------------------------------------------------------- | +| [204][] | No Content | Successfully removed tags to workspace | +| [404][] | [JSON API error object][] | Workspace not found, or user unauthorized to perform action | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +It is important to note that `type`, as well as one of `id` _or_ `attributes.name` is required. + +| Key path | Type | Default | Description | +| ------------------------ | ------ | ------- | ------------------------------ | +| `data[].type` | string | | Must be `"tags"`. | +| `data[].id` | string | | The ID of the tag to remove. | +| `data[].attributes.name` | string | | The name of the tag to remove. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "tags", + "id": "tag-Yfha4YpPievQ8wJw" + } + ] +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request DELETE \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/workspace-2/relationships/tags +``` + +### Sample Response + +No response body. + +Status code `204`. + +## Add/update tag-bindings on a workspace + +This endpoint adds keys and values or updates values of tag-bindings on an existing resource by key. +It does not remove any keys from the collection. This endpoint is useful when you want to ensure a +modification is additive. + +Tag Bindings have special constraints: + +- Up to 10 tags can be applied to a workspace, but an additional 10 tags may be inherited from its project. +- Keys must be no more than 128 characters, allowing all alphanumeric characters plus the symbols `_`, `.`, `=`, `+`, `-`, `@`, `:`. +- Values allow the same characters, but can be up to 256 characters. +- Certain key prefixes, including `hc:` and `hcp:` are not allowed. + +`PATCH /workspaces/:workspace_id/tag-bindings` + +| Parameter | Description | +| --------------- | --------------------------------- | +| `:workspace_id` | The ID of the workspace to update | + +### Request Body + +This PATCH endpoint requires a JSON object with the following properties as a request payload. + +It is important to note that for each data item, `type`, as well as `attributes.key` is required. + +| Key path | Type | Default | Description | +| ------------------------- | ------ | ------- | ---------------------------------- | +| `data[].type` | string | | Must be `"tag-bindings"`. | +| `data[].attributes.key` | string | | The key of the tag to add/update. | +| `data[].attributes.value` | string | | The name of the tag to add/update. | + +### Sample Payload + +```json +{ + "data": [ + { + "type": "tag-bindings", + "attributes": { + "key": "costcenter", + "value": "123" + } + }, + { + "type": "tag-bindings", + "attributes": { + "key": "bar", + "value": "baz" + } + } + ] +} +``` + +### Sample Request + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request PATCH \ + --data @payload.json \ + https://app.terraform.io/api/v2/workspaces/ws-82d2281aa259ba09/tag-bindings +``` + +### Sample Response + +Status Code 200 + + + +```json +{ + "data": [ + { + "id": "tb-e4a5847b2cf06559", + "type": "tag-bindings", + "attributes": { + "key": "costcenter", + "value": "123" + } + }, + { + "id": "tb-97ce954636f93a6c", + "type": "tag-bindings", + "attributes": { + "key": "bar", + "value": "baz" + } + } + ] +} +``` + + + +## Show data retention policy + + +This endpoint is exclusive to Terraform Enterprise and is not available in HCP Terraform. + + +`GET /workspaces/:workspace_id/relationships/data-retention-policy` + +| Parameter | Description | +| --------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The ID of the workspace to show the data retention policy for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or by sending a `GET` request to the [`/workspaces`](#show-workspace) endpoint. | + +This endpoint shows the data retention policy set explicitly on the workspace. +When no data retention policy is set for the workspace, the endpoint returns the default policy configured for the organization. Refer to [Data Retention Policies](/terraform/enterprise/workspaces/settings/deletion#data-retention-policies) for instructions on configuring data retention policies for workspaces. + +Refer to [Data Retention Policy API](/terraform/enterprise/api-docs/data-retention-policies#show-data-retention-policy) in the Terraform Enterprise documentation for details. + +## Create or update data retention policy + + +This endpoint is exclusive to Terraform Enterprise and is not available in HCP Terraform. + + +`POST /workspaces/:workspace_id/relationships/data-retention-policy` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `:workspace_id` | The workspace ID to update the data retention policy for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or by sending a `GET` request to the [`/workspaces`](#show-workspace) endpoint. | + +This endpoint creates a data retention policy for a workspace or updates the existing policy. +Refer to [Data Retention Policies](/terraform/enterprise/workspaces/settings/deletion#data-retention-policies) for additional information. + +Refer to [Data Retention Policy API](/terraform/enterprise/api-docs/data-retention-policies#create-or-update-data-retention-policy) in the Terraform Enterprise documentation for details. + +## Remove data retention policy + + +This endpoint is exclusive to Terraform Enterprise and is not available in HCP Terraform. + + +`DELETE /workspaces/:workspace_id/relationships/data-retention-policy` + +| Parameter | Description | +| --------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `:workspace_id` | The workspace ID to remove the data retenetion policy for. Obtain this from the [workspace settings](/terraform/enterprise/workspaces/settings) or by sending a `GET` request to the [`/workspaces`](#show-workspace) endpoint. | + +This endpoint removes the data retention policy explicitly set on a workspace. +When no data retention policy is set for the workspace, the endpoint returns the default policy configured for the organization. Refer to [Data Retention Policies](/terraform/enterprise/users-teams-organizations/organizations#destruction-and-deletion) for instructions on configuring data retention policies for organizations. + +Read more about [workspace data retention policies](/terraform/enterprise/workspaces/settings/deletion#data-retention-policies). + +Refer to [Data Retention Policy API](/terraform/enterprise/api-docs/data-retention-policies#remove-data-retention-policy) in the Terraform Enterprise documentation for details. + +## Available Related Resources + +The GET endpoints above can optionally return related resources, if requested with [the `include` query parameter](/terraform/enterprise/api-docs#inclusion-of-related-resources). The following resource types are available: + +- `current_configuration_version` - The last configuration this workspace received, excluding plan-only configurations. Terraform uses this configuration for new runs, unless you provide a different one. +- `current_configuration_version.ingress_attributes` - The commit information for the current configuration version. +- `current_run` - Additional information about the current run. +- `current_run.configuration_version` - The configuration used in the current run. +- `current_run.configuration_version.ingress_attributes` - The commit information used in the current run. +- `current_run.plan` - The plan used in the current run. +- `locked_by` - The user, team, or run responsible for locking the workspace, if the workspace is currently locked. +- `organization` - The full organization record. +- `outputs` - The outputs for the most recently applied run. +- `project` - The full project record. +- `readme` - The most recent workspace README.md. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/admin-access.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/admin-access.mdx new file mode 100644 index 000000000..82283fbba --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/admin-access.mdx @@ -0,0 +1,29 @@ +--- +page_title: Access Terraform Enterprise administration settings +description: >- + The admin interface provides access to general settings, system-wide integration settings, and accounts and resources. Learn how to access the administration settings. +--- + +# Access Administration Settings + +This topic describes how to access the Terraform Enterprise administration interface. The interface provies access to general settings, system-wide integration settings, and accounts and resources. + +## Introduction + +In Terraform Enterprise instances, the HCP Terraform application includes an admin interface for managing general settings, systemwide integration settings, and accounts and resources. + +Administration functions can be managed via user interface (as described by the pages in this section) or via the [Admin API](/terraform/enterprise/api-docs/admin). Only Terraform Enterprise users with the site-admin permission can access the administrative functions. + +The initial user account for a Terraform Enterprise instance is the first site admin. Site admins can grant admin permissions to other users in the "Users" section of the admin pages. See [Promoting a User to Administrator](/terraform/enterprise/application-administration/resources#promoting-a-user-to-administrator) for details. + +To navigate to the site admin section of the UI, click your user icon, then click **Admin**: + +The admin area defaults to showing the user management page. Use the navigation to access the other administrative functions. + +## Administration Tasks + +- [General settings](/terraform/enterprise/application-administration/general) +- [Service Integrations](/terraform/enterprise/application-administration/integration) +- [Managing Accounts and Resources](/terraform/enterprise/application-administration/resources) +- [Managing OPA tool versions](/terraform/enterprise/application-administration/opa-tool-versions) +- [Managing Sentinel tool versions](/terraform/enterprise/application-administration/sentinel-tool-versions) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/agents-on-tfe.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/agents-on-tfe.mdx new file mode 100644 index 000000000..b7bf816c0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/agents-on-tfe.mdx @@ -0,0 +1,53 @@ +--- +page_title: HCP Terraform agents for Terraform Enterprise +description: HCP Terraform agents let Terraform manage isolated, private, or on-premises + infrastructure. Learn about HCP Terraform agent behavior for Terraform Enterprise. +--- + +# HCP Terraform agents for Terraform Enterprise + +This topic describes HCP Terraform agent behavior when connected to Terraform Enterprise. + +## Introduction + +HCP Terraform agents allow Terraform Enterprise to communicate with isolated, +private, or on-premises infrastructure. By deploying lightweight agents within a +specific network segment, you can establish a simple connection between your +environment and Terraform Enterprise which allows for provisioning operations and +management. + +Refer to [HCP Terraform agents](/terraform/cloud-docs/agents) for additional information about HCP Terraform agents + +## Requirements + +Terraform Enterprise v202109-1 or later is required to connect to HCP Terraform agents. + +## Agents on HCP Terraform and Terraform Enterprise + +The following list describes the differences between connecting agents to Terraform Enterprise and connecting to agents on HCP Terraform, which is the software-as-a-service edition of Terraform Enterprise: + +* **No restriction on Agent Count**: Terraform Enterprise does not + place a limitation on the number of Agents that can be registered per organization. + +* **Hostname Registration**: HCP Terraform agents registering with a Terraform Enterprise instance + must define the Terraform Enterprise hostname via the `-address` CLI flag or `TFC_ADDRESS` environment + variable when running `tfc-agent`. By default, `tfc-agent` will attempt to connect to + HCP Terraform, so this value must be explicitly defined when registering with a + Terraform Enterprise instance. + +* **Custom Bundle Support**: HCP Terraform agents on Terraform Enterprise support + [custom Terraform bundles](https://github.com/hashicorp/terraform/tree/main/tools/terraform-bundle). + Custom bundles are created and defined within the Terraform Enterprise application; Agents will + download the custom bundle based on the Terraform version information. See + [using a custom Terraform bundle](https://support.hashicorp.com/hc/en-us/articles/360016992613-Using-custom-and-community-providers-in-Terraform-Cloud-and-Enterprise) + for more detail on custom bundles in Terraform Enterprise. + +* **Network Access Requirements**: HCP Terraform agents on Terraform Enterprise must be able to + communicate with the Terraform Enterprise instance via HTTPS. Additionally, the agent must also be + able to communicate with any services required by the Terraform code it is executing. + This includes the Terraform releases distribution service, [releases.hashicorp.com](https://releases.hashicorp.com), + as well as the [Terraform provider registry](https://registry.terraform.io). Agents + executing in a workspace that leverage a Terraform version that provides a custom + Terraform bundle with pre-existing provider binaries do not need access to these resources. + +* **Agent Version Compatibility**: Terraform Enterprise places restrictions on what versions of HCP Terraform agents can be registered. This is to prevent an incompatible agent from registering with a Terraform Enterprise instance and attempting to execute a Terraform operation in an undefined way. Compatible versions of HCP Terraform agents on Terraform Enterprise will vary based on the specific Terraform Enterprise release sequence; any changes to compatible HCP Terraform agents versions will be noted in the [Terraform Enterprise release notes](/terraform/enterprise/releases). \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/customization.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/customization.mdx new file mode 100644 index 000000000..37cfdf34c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/customization.mdx @@ -0,0 +1,54 @@ +--- +page_title: Customize the UI +description: >- + Use customization settings to modify the Terraform Enterprise user interface. Learn how to change UI text, customize support email addresses, and provide instructions in the UI. +--- + +# Customize the UI + +This topic describes how to customize different parts of the user interface to accommodate the specific needs of your organization. Refer to the [Customization API](/terraform/enterprise/api-docs/admin/settings#list-customization-settings) for instructions about customizing the UI using the API. + +## Access Customization Settings + +To access the customization settings, visit the site admin area and click **Customization**. To save the settings, click **Save Customization Settings**. + +~> **Note:** Terraform Enterprise sanitizes customization content before displaying it, and might remove HTML elements or attributes that pose a possible security risk. + +## Support + +You can update the support content displayed in the UI. + +### Email Address + +Terraform Enterprise uses the support email address for system emails, error pages, and all other situations where users are prompted to contact support. You can specify a local email address if you want users to contact a specific person or team when they have issues. + +Note that this field defaults to `support@hashicorp.com`, which is not a functional email address for HashiCorp support. If you need assistance or want to submit a feature request, visit the [HashiCorp support center](https://support.hashicorp.com/hc/en-us) and open a ticket. + +### Error Instructions + +-> Supports HTML + +Instructions to display when users encounter unexpected errors. You can use this space to provide links to your support triage process or other ticketing systems. + +## Application + +You can customize the following UI elements. + +### Login Help + +-> Supports HTML + +The content provided in this field replaces the "Need an Account? Sign up here." prompt. This is an opportunity to provide system usage disclaimers, or any custom new user processes you may have. + + +### New User Instructions + +-> Supports HTML + +Instructions shown to new users who aren't yet members of an organization. If you have a custom provisioning process for granting organization access, you can explain it here. (By default, new users are prompted to contact the system administrator for organization membership.) + +### Footer Content + +-> Supports HTML + +Content to display in the footer of every application page. Useful for disclaimers and other site-wide communication. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/general.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/general.mdx new file mode 100644 index 000000000..5291998d4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/general.mdx @@ -0,0 +1,117 @@ +--- +page_title: Configure general Terraform Enterprise settings +description: >- + Use general settings to control global behavior. Learn how to enable 2FA, limit organization creation, set timeouts, connect agents, and control remote state sharing and speculative plans. +--- + +# Configure General Settings + +This topic describes how to configure general settings in Terraform Enterprise. General settings affect global behaviors, including 2FA, limits on creating organizations, service timeouts, HCP Terraform agent connections, and remote state sharing. Refer to the [Admin Settings API](/terraform/enterprise/api-docs/admin/settings) documentation for instruction on how to configure general settings using the API. + +## Access General Settings + +To access general settings, visit the site admin area and click **Settings**. To save the settings, click **Save Settings**. + +## Require Site Admins to Enable Two-factor Authentication + +This setting can make the site more secure by requiring that admins enable two-factor authentication to access site admin functionality. You can use this setting in conjunction with SAML. + +Admins that do not have two-factor authentication enabled may still log in, but will be unable to perform any admin-only functions until they enable and verify two-factor authentication. + +You can use this setting in conjunction with [SAML Single Sign On](/terraform/enterprise/saml/configuration). + +## Organization Creation + +Organization creation can be limited to site administrators or allowed for all users. Limiting organization creation to administrators means that the need for new organizations can be audited and their creation easily monitored. + +When new user accounts are created, if they cannot create their own organizations, they will be unable to access any HCP Terraform resources until they are added to a team. + +## API Rate Limiting + +By default, requests to the HCP Terraform API from a single user or IP address are [limited to 30 requests per second](/terraform/enterprise/api-docs#rate-limiting) to prevent abuse or hogging of resources. Since usage patterns may vary for a given instance, this can be updated to match local needs. A few endpoints have lower limits to prevent certain spam and abuse scenarios. If you receive a rate limited response, the limit will be reflected in the `x-ratelimit-limit` header once triggered. + +## HCP Terraform agents + +HCP Terraform agents allow Terraform Enterprise to communicate with isolated, private, or on-premises infrastructure. + +You can enable agents by clicking the **Enable agents functionality** checkbox. + +Agents also use HTTP polling to acquire operations from Terraform Enterprise. This interval is the minimum number of seconds an agent should wait before polling for again in the event that there are no jobs to execute. + +To set the minimum polling interval, enter a number in the **Minimum polling interval in seconds** field. + +~> **Note:** Using a value that is significantly lower than the previous value may temporarily cause agents to report as **Unknown** because the agent may already be waiting for a longer period of time. + +Refer to [HCP Terraform agents on Terraform Enterprise](/terraform/enterprise/admin/agents-on-tfe) for more details and requirements. + +## Health Assessments + +**Automatic Assessment Interval** sets the minimum amount of time that must pass after a run or health assessment before a new health assessment can start. Decreasing the interval increases the frequency of health assessments. A high volume of concurrent runs and assessments in your organization may result in provider API rate-limiting or performance degradation. + +**Maximum concurrent assessments triggered** sets the number of health assessments that can start for each polling event. HCP Terraform polls all workspaces every 5 minutes to check if they are due for an assessment. This setting prevents running assessments on all of your workspaces at once. + +~> **Note:** If the previous polling event's assessments are still in progress, the number of concurrent active assessments may exceed the **Maximum concurrent assessments triggered** setting. + +## Organization and Workspace Limits + +By default, you can create unlimited organizations and each organization can have unlimited workspaces. However, you can optionally limit these settings. + +To limit organizations, check the **Limit organizations per user** box and enter a number in the **Organizations per user limit** field. + +To limit workspaces, check the **Limit workspaces per organization** box and enter a number in the **Workspaces per organization limit** field. + +## Terraform Run Timeout Settings + +The default timeout setting for Terraform runs are 2h for plans, and 24h for applies. + +These are configurable on a global level, or in the Admin settings at an organization level. + +~> **Note:** The maximum supported timeout for plans or applies is **24h**. + +## Commit Statuses for Untriggered Speculative Plans + +This setting affects Terraform Enterprise's behavior with shared VCS repositories that contain multiple Terraform configurations. + +Workspaces that use part of a shared repository typically don't run plans for changes that don't affect their files; this includes [speculative plans](/terraform/enterprise/run/modes-and-options#plan-only-speculative-plan) on pull requests. Since "pending" status checks can block pull requests, a workspace will automatically send passing commit statuses for any PRs that don't affect its files. + +However, if this results in sending too many status checks to your VCS provider due to a large number of workspaces sharing one VCS repository, you can disable this behavior and ignore the pending status checks for unaffected workspaces. + +## Remote State Sharing + +The "Share state globally by default" admin setting determines the default value for the "Share state globally" setting on newly created workspaces. + +- When true, a newly created workspace will allow all workspaces in its organization to read its state. +- When false, a newly created workspace will not allow any other workspaces to read its state. + +In all cases, a workspace's state access settings can be changed after creation by workspace admins; this admin setting only affects the initial default value. Additionally, if the `global-remote-state` attribute is provided when creating a workspace via the API, the provided value will be used instead of using the default. + +Refer to the following resources for more information: + +- [Terraform State in HCP Terraform: Accessing State from Other Workspaces](/terraform/enterprise/workspaces/state#accessing-state-from-other-workspaces) +- [Workspace Settings: Remote State Sharing](/terraform/enterprise/workspaces/settings#remote-state-sharing) + +## Allow Speculative Plans on Pull Requests from Forks + +This setting is supported for the following VCS providers: GitHub.com, GitHub.com (OAuth), GitHub Enterprise, Bitbucket Cloud, Azure DevOps Server, Azure DevOps Services. + +By default, this setting is disabled because Terraform Enterprise assumes that forks of a trusted repository are not necessarily themselves trusted. Enabling this setting may allow Terraform Enterprise to execute malicious code or expose sensitive information through [speculative plans](/terraform/enterprise/run/modes-and-options#plan-only-speculative-plan) on pull requests that originated from a repository fork. + +## Data Retention Policies + + +Data retention policies are exclusive to Terraform Enterprise and unavailable in HCP Terraform. Learn more about Terraform Enterprise. + + +By default, the **Set data retention policy** option is disabled. As a result, no data retention policy is active and Terraform Enterprise retains all data associated with configuration and state versions. + +To set a global data retention policy, enable the **Set data retention policy** setting and choose a duration from the drop-down menu. When a duration is set, Terraform _soft deletes_ the backing data associated with configuration versions and state versions. Soft deleting refers to marking a data object for garbage collection so that Terraform deletes it after the set number of days. + +Once an object is soft deleted, any attempts to read the object will fail. Until the garbage collection process begins, you can restore soft deleted objects using the APIs described in the [configuration version documentation](/terraform/enterprise/api-docs/configuration-versions) and the [state version documentation](/terraform/enterprise/api-docs/state-versions). Terraform permanently deletes the archivist storage after the garbage collection grace period elapses. + +Organization owners can configure their organizations to inherit or override the global policy. Refer to [Organization settings](/terraform/enterprise/users-teams-organizations/organizations#data-retention-policies) for instructions. + +Workspace admins can also configure their workspaces to inherit the parent policy or override the global policy in the workspace settings. Refer to [Workspace settings](/terraform/enterprise/workspaces/settings/deletion#data-retention-policies) for instructions. + +## Automated License Utilization Reporting + +Automated license utilization reporting sends license utilization data to HashiCorp without requiring you to manually collect and report them. [Learn about automated license utilization reporting](/terraform/enterprise/deploy/manage/license-report). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/github-app-integration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/github-app-integration.mdx new file mode 100644 index 000000000..1d787cd01 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/github-app-integration.mdx @@ -0,0 +1,153 @@ +--- +page_title: Integrate with a GitHub App +description: >- + Learn how to integrate Terraform Enterprise with a GitHub App to let organizations access GitHub repositories. +--- + +# Integrate with a GitHub App + +This topic describes how to integrate your Terraform Enterpise deployment with a GitHub App. + +## Introduction + +Site administrators can provision a GitHub App integration that all organizations on the same Terraform Enterprise instance can use to access GitHub repositories. Integrating with a GitHub App offers advantages over connecting to GitHub repositories using GitHub OAuth. Refer to [GitHub Documentation](https://docs.github.com/en/developers/apps/getting-started-with-apps/differences-between-github-apps-and-oauth-apps) to learn more. + + +## Configuring GitHub App Integration + +These instructions are for using repositories from GitHub.com or Self-hosted GitHub Enterprise with Terraform Enterprise. + +For more information on using a GitHub App and GitHub Permissions in HCP Terraform, see [GitHub Permissions in HCP Terraform](/terraform/cloud-docs/vcs/github-app#github-permissions). + +### Step 1: Configure GitHub App Settings in Terraform Enterprise + +You can integrate with either GitHub.com or a self-hosted GitHub Enterprise instance. + +1. Go to the admin interface and then click **VCS Integrations**. The **VCS Integrations** page appears. + +2. Click **Create global GitHub App**. The **Location** and **GitHub App Owner** options appear. + +3. For the **Location** option, choose if you want to integrate with **GitHub.com** or a **Self-hosted GitHub Enterprise** instance. + + - If integrating with a **Self-hosted GitHub Enterprise** instance, fill in the **HTTP URL** and **API URL** of your GitHub Enterprise instance. + + | Field | Value | + | -------- | ------------------------------------------- | + | HTTP URL | `https://` | + | API URL | `https:///api/v3` | + +4. For the **GitHub App Owner**, choose either **Personal Account** or **Organization Account**. + + - If assigning ownership to a GitHub Organization, fill in the **Organization Name**. + + -> **Note**: You can change this later. See the [Transferring GitHub App Ownership](#transferring-github-app-ownership) section below for more information. + +5. Click **Create global GitHub App**. You will be redirected to the **Create GitHub App** screen on GitHub. + +6. Modify the default GitHub App name if necessary. When done, click **Create GitHub App for [GitHub User Handle]**. + + +-> **Note**: The GitHub App name must satisfy GitHub's requirements. + +### Step 2: Authorize and Install the GitHub App + +In order to start using your GitHub App, you must authorize and install it. + +1. Click **Authorize**. The GitHub Authorization dialog appears. + +2. Accept the authorization. Afterwards, the GitHub installation dialog will appear. + + -> **Note**: If the installation dialog fails to appear, make sure your browser settings allow pop-ups for your Terraform Enterprise site. + +3. Select the repositories you want to grant access to. + +-> **Note**: This will limit which GitHub repositories your workspaces, policy sets, and registry modules have access to. + +### Finished + +Your Global GitHub App for Terraform Enterprise is fully installed and configured. You can now create Terraform workspaces based on the GitHub repositories your Global GitHub App has access to. + +
+ +## GitHub App Management + +### Currently Unsupported Features + +~> **Warning**: Do not modify or remove the default Client Secret, Private Key, or Webhook Secret. + +* GitHub App Client Secret Rotation +* GitHub App Private Key Rotation +* GitHub App Webhook Secret Rotation + +### Required Permissions and Events + +#### Repository permissions + +These permissions are set by default. Do not alter these permissions unless specified to do so in a future Terraform Enterprise release. + +| Permission | Access | +| ------------------ | -------------- | +| Commit statuses | Read and write | +| Contents | Read-only | +| Metadata | Read-only | +| Pull requests | Read-only | + + +#### Required Subscribe Events + +These events are set by default. Do not alter these events unless specified to do so in a future Terraform Enterprise release. + +| Event | Description | +| ------------- | ------------------------------------------- | +| Create | Branch or tag created. | +| Pull Request | Pull request assigned, edited, opened, etc. | +| Delete | Branch or tag deleted | +| Push | Git push to a repository | + +
+ +### Transferring GitHub App Ownership + +During the setup process for your GitHub App, you can choose a default owner for the application. + +If you want to transfer ownership of the GitHub App to another user or organization, follow the [transferring GitHub App ownership](https://docs.github.com/en/developers/apps/managing-github-apps/transferring-ownership-of-a-github-app) instructions. No actions need to be taken within Terraform Enterprise. + +### Removing Global GitHub App from Terraform Enterprise + +~> **Warning**: Do not delete the GitHub App from GitHub until you have first removed it from Terraform Enterprise. + +In order to remove the GitHub App from your Terraform Enterprise instance, you must first remove all installations for the application in GitHub. + +#### Step 1: Remove GitHub App Installations + +~> **Warning**: Uninstalling the application will remove the connections it has to workspaces, policy sets, and registry modules. + +1. Go to the admin interface and then click **VCS Integrations**. The **VCS Integrations** page appears. + +2. If you previously authorized the GitHub App, accessible installations will be shown. Otherwise, you will need to authorize the GitHub App to continue with the removal. + +3. For each installation, click **View in GitHub**. A new tab will open showing the installation settings page within GitHub. + + -> **Note**: You can also find the list of **[Installed GitHub Apps](https://github.com/settings/installations)** on the **Applications** page in GitHub **Settings**. + +4. Locate the **Danger zone** section. + +5. Click **Uninstall** to uninstall the application. Repeat this process for each installation. + +#### Step 2: Remove GitHub App from Terraform Enterprise + + +After you have removed all GitHub App installations, remove the GitHub App from Terraform Enterprise. + +-> **Note**: You may need to refresh the **VCS Integrations** page to verify that all app installations have been removed. + +1. Click the red delete button. A confirmation modal will appear. + +7. In the confirmation modal, click **Delete**. A success message will appear and you will be navigated back to the admin interface home page. + +3. You are now free to delete the GitHub App in GitHub. + +### Additional Resources + +- [About GitHub Apps](https://docs.github.com/en/developers/apps/getting-started-with-apps/about-apps) +- [Differences between GitHub Apps and OAuth Apps](https://docs.github.com/en/developers/apps/getting-started-with-apps/differences-between-github-apps-and-oauth-apps) \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/index.mdx new file mode 100644 index 000000000..40aaaae61 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/index.mdx @@ -0,0 +1,21 @@ +--- +page_title: Terraform Enterprise application administration +description: >- + Use application administration settings to customize your Terraform Enterprise instance. +--- + +# Application administration overview + +Terraform Enterprise is a software distribution that manages a private instance of the HCP Terraform application. + +## Infrastructure administration +- Maintenance +- Upgrades +- Backups +- Monitoring + +## Application administration +- Integrations +- Customize the UI +- Connect to agents +- Policy settings diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/integration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/integration.mdx new file mode 100644 index 000000000..455cccf37 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/integration.mdx @@ -0,0 +1,70 @@ +--- +page_title: Integrate with external services +description: >- + Integrate with external services to send communications and authenticate users. Learn how to configure cost estimation, and SAML, SMTP, and Twilio integrations. +--- + +# Integrate with External Services + +This topic describes how to integrate Terraform Enterprise with external services so that Terraform Enterprise can send communications and authenticate users. Refer to the [Admin Settings API](/terraform/enterprise/api-docs/admin/settings) for instructions on configuring integrations using the API. + +## Introdution + +You can integrate with the following external services: + +* Cost Estimation +* SAML Single Sign-On +* SMTP +* Twilio + +## Cost Estimation Integration + +Cost Estimation integration allows Terraform Enterprise to estimate costs for resources during a run. Refer to the [usage instructions](/terraform/enterprise/cost-estimation). + +To access the Cost Estimation settings, click **Cost Estimation**. To enable Cost Estimation, check the **Enable Cost Estimation** box on the settings page, configure the settings, and click "Save settings." At least one provider needs to be configured in order to save. + +* **AWS Instance Profile**: If checked this option will be used without need to input the Access Key or Secret Key in the above form (fields will be greyed out). +* **AWS Access Key ID**: The AWS Access Key ID for a given IAM user. The role associated to these credentials must have full access to the "Price List" service and all of that service's resources. Cost Estimation makes API calls in the `us-east-1` region. +* **AWS Secret Key**: The AWS Secret Key pair for the same Access Key ID. +* **GCP Credentials**: The contents of the JSON that is downloaded when you create a GCP Service Account. +* **Azure Client ID**: The Azure Client ID for a given Service Account. The role associated to these credentials must have full access to the `RateCard` service and all of that service's resources. +* **Azure Client Secret**: The Azure Client Secret pair for the same Client ID. +* **Azure Subscription ID**: The Azure Subscription ID for your account. +* **Azure Tenant ID**: The Azure Subscription ID for your account. + +## SAML Integration + +The SAML integration settings allow configuration of a SAML Single Sign-On integration for Terraform Enterprise. To access the SAML settings, click **SAML**. + +-> **Note:** Since enabling SAML is an involved process, there is a [separate SAML section of the documentation](/terraform/enterprise/saml/configuration). Consult those pages for detailed requirements and configuration instructions for both Terraform Enterprise and your IdP. + +To enable SAML, click **Enable SAML single sign-on** under "SAML Settings". Configure the fields below, then click **Save SAML settings**. To update the settings, update the field values, and save. + +The **Enable SAML debugging** option can be used if sign-on is failing. It provides additional debugging information during login tests. It should not be left on during normal operations. + +## SMTP Integration + +SMTP integration allows Terraform Enterprise to send email-based notifications, such as new user invitations, password resets, and system errors. We strongly recommend configuring SMTP. + +To access the SMTP settings, click **SMTP**. To enable SMTP, check the **Enable email sending with SMTP** box on the settings page, configure the settings, and click "Save SMTP settings." + +* **Sender Email**: The address that system mails should come from. A plain email address; do not include a display name. +* **Send test email to**: A sample address to send a test email to. Used to validate the settings when configuring SMTP; not stored. +* **Host** and **Port**: The host and port details for the SMTP server that will be used. +* **Authentication**: The type of authentication used by the server. Options are `none`, `login`, and `plain`. +* **Username**: Username used to authenticate to the server. Not required if the authentication setting is `none`. +* **Password**: Password to authenticate to the server. Not required if the authentication setting is `none`. + +-> **Note**: The SMTP server used with Terraform Enterprise must support connection via SSL with a valid certificate and `STARTTLS` secure communication; `SMTPS` is not supported in Terraform Enterprise. + +## Twilio Integration + +Twilio integration is used to send SMS messages for two-factor authentication. It is optional; application-based 2FA is also supported. + +To access the Twilio settings, click **Twilio**. To enable Twilio, check the **Enable SMS sending with Twilio** box on the settings page and configure the relevant settings: + +* **Account SID**: The unique identifier for your Twilio [application](https://www.twilio.com/docs/usage/api/applications). +* **Auth Token**: The token that allows [authentication](https://support.twilio.com/hc/en-us/articles/223136027-Auth-Tokens-and-How-to-Change-Them) with your Account SID. +* **From Number**: The number the message should come from. Must be registered with Twilio. + +You can also verify the Twilio settings by sending a test message. Enter a number in the **From Number** field and click **Send Test SMS**. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/opa-tool-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/opa-tool-versions.mdx new file mode 100644 index 000000000..e3eb94ab2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/opa-tool-versions.mdx @@ -0,0 +1,30 @@ +--- +page_title: Add an Open Policy Agent (OPA) tool version +description: >- + Learn how to add and manage Open Policy Agent (OPA) versions in the UI. +--- + +# Manage Open Policy Agent tool versions + +This topic describes how to specify which version of the Open Policy Agent (OPA) framework Terraform Enterprise uses to monitor compliance. + +## Requirements + +You must have one of the following user roles to access the **OPA Versions** page: + +- Site admin +- Configuration +- Support +- Version maintenance + +## Add an OPA version + +1. Navigate to the **OPA Versions** +1. Click **Add OPA version**. +1. In the **Version** text box, enter the version number you want to add, for example `0.44.0`. +1. Enable the **Enable this version** option. +1. In the **URL** text box, enter `https://github.com/open-policy-agent/opa/releases/download/v0.44.0/opa_linux_amd64_static`. +1. In the **SHA256 Checksum** text box, enter `5ddb21d3fcfca130a47a42e730c05f055c68af6c1b37465879f6c59b10527eae`. +1. Click **Add OPA version** to complete the setup. + +Refer to the [OPA Github repository](https://github.com/open-policy-agent/opa/releases) releases page for additional information. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/registry-sharing.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/registry-sharing.mdx new file mode 100644 index 000000000..64f1c634b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/registry-sharing.mdx @@ -0,0 +1,58 @@ +--- +page_title: Share modules and providers from a private registry +description: >- + Use registry sharing to share modules and providers with other organizations in the same Terraform Enterprise instance. Learn how to manage shared registries, stop sharing, and edit registry sharing settings in the UI. +--- + +# Share Modules and Providers from a Private Registry + +This topic describes how to share modules and providers from your private Terraform Enterprise registry. + +## Introduction + +Site administrators can share modules and providers from an organization's private registry with other organizations in the same Terraform Enterprise instance. This allows other organizations to use these modules and providers in their Terraform configuration without needing to ingress or maintain the modules or providers themselves. + +There are two ways to share between organizations: + +1. [Global sharing](#global-sharing): modules and providers from an organization are available to all other organizations in that Terraform Enterprise instance +1. [Partnership sharing](#partnership-sharing): modules and providers from an organization are available to a specific set of organizations in that Terraform Enterprise instance + +**Note:** The two sharing options are mutually exclusive, so turning one on will turn the other one off. This means that if you have configured a set of partnerships for an organization, they will be lost if you switch that organization to use global sharing. + +-> **API:** Refer to the [Admin Organizations API](/terraform/enterprise/api-docs/admin/organizations). + +## Managing Shared Registries + +To access the list of shared registries in the Terraform Enterprise instance, click **Registry**. + +Click on **Select organization** to choose the organization that contains the modules or providers to share. Type the name of the sharing organization or select it from the drop-down. + +Once you select the sharing organization, you can configure the sharing type. + +### Global Sharing + +To share the organization's modules or providers with all other organizations in the Terraform Enterprise instance, click the toggle switch next to **Share modules with all organizations** or **Share providers with all organizations**. + +Click **Share registry** to save the sharing settings. You will be redirected to the initial registry sharing page, which now shows the organization sharing its registry with "All organizations". + +### Partnership Sharing + +To share the organization's modules or providers with a limited group of organizations, the corresponding toggle should be turned off. Add a list of consuming organizations by clicking on the dropdown below and selecting the name(s) of the organizations who will be able to access modules or providers from the sharing organization. If you have many organizations in the dropdown, you can start typing the name to filter the list. + +Once you have selected a list of organizations to share with, click **Share registry** to save the sharing settings. You will be redirected to the initial registry sharing page, which now shows how many organizations the organization is sharing its registry with. + +## Stop Sharing a Registry + +~> **Important**: Removing or changing existing sharing settings can break Terraform workspaces for organizations that are using shared modules or providers. Proceed with caution! + +To stop sharing modules or providers from the **Registry** page, click on the three dots next to any organization that's currently sharing modules or sharing providers. + +Click **Stop sharing**. You will be prompted to confirm the action by typing in the name of the organization. + +## Edit Registry Sharing Settings + +If you wish to change sharing settings for an organization, from the **Registry** page, click on the three dots next to any organization that's currently sharing modules or providers. Click **Edit sharing** and you will be able to modify the sharing settings for that organization. For example, you may wish to: + +- Share with an additional organization (add a consumer) +- Stop sharing with an organization (remove a consumer) +- Change an organization from partnership sharing to global sharing diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/resources.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/resources.mdx new file mode 100644 index 000000000..118280895 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/resources.mdx @@ -0,0 +1,93 @@ +--- +page_title: Manage Terraform Enterprise accounts and resources +description: >- + Learn how Terraform Enterprise administrators can manage resources, users, organizations, workspaces, runs, and Terraform versions. +--- + +# Manage Accounts and Resources + +This topic describes how Terraform Enterprise site administrators can manage accounts and resources. + +## Introduction + +Terraform Enterprise site administrators have access to all organizations, users, runs, and workspaces. This visibility is intended to provide access to management actions such as adding administrators, updating Terraform versions or adding custom Terraform bundles, suspending or deleting users, and creating or deleting organizations. It also allows for "impersonation" to aid in assisting regular users with issues in the HCP Terraform application. + +-> **API:** Refer to the [Admin Users API](/terraform/enterprise/api-docs/admin/users), [Admin Organizations API](/terraform/enterprise/api-docs/admin/organizations), [Admin Workspaces API](/terraform/enterprise/api-docs/admin/workspaces), [Admin Runs API](/terraform/enterprise/api-docs/admin/runs) and [Admin Terraform Versions API](/terraform/enterprise/api-docs/admin/terraform-versions). + +## Viewing, Searching, and Filtering Lists + +Terraform Enterprise presents each type of account or resource as a searchable list that you can access by clicking the name of the resource. You can search and filter by relevant attributes, and the UI offers pre-existing filters to show useful sets, such as site administrators (users) or **Needs Attention** (workspaces, runs). + +## Managing Users + +To access the list of all users in the Terraform Enterprise instance, click **Users**. + +Selecting a user from the list shows their detail page, which includes their status and any organizations they belong to. The detail page offers four actions: promoting to administrator, suspending, deleting, and impersonating. For users with active [two-factor authentication (2FA)](/terraform/enterprise/users-teams-organizations/2fa), it also offers an administrative option to disable their 2FA in the event that a reset is needed. + +### Promoting a User to Administrator + +This adds the user to the list of site administrators, which grants them access to this administrative area. Because admins have a very wide purview, if SMTP is configured, it will also send an email to the other site administrators notifying them that a user was added. + +To promote a user, click **Promote to admin** on the user detail page. + +### Suspending or Deleting a User + +Suspending a user retains their account, but does not allow them to access any HCP Terraform resources. Deleting a user removes their account completely; they would have to create a new account in order to log in again. + +Suspended users can be unsuspended at any time. Deleted users cannot be recovered. + +To suspend a user, click **Suspend user**. To delete them, click **Delete User** in the "Delete User" section. + +### Impersonating a User + +User impersonation allows Terraform Enterprise admins to access organization and workspace data and view runs. As an administrator, direct access to these resources only supports urgent interventions like deletion or force-canceling; to view and interact with resources, impersonation is required. + +When impersonating a user, a reason is required and will be logged to the audit log. Any actions taken while impersonating will record both the impersonating admin and the impersonated user as the actor. + +Impersonation can be performed from multiple places: + +- From a user details admin page, click **Impersonate**. +- From an organization, workspace, or run details admin page, all of which include a drop-down list of organization owners to impersonate. +- When a site admin encounters a 404 error for a resource that they do not have standard user access to. + +### Resetting Two-Factor Authentication + +If a user has lost access to their 2FA device, a site admin can disable the configured 2FA and allow the user to log in using only their username and password or perform a standard password reset. If the user has active 2FA, a button labeled **Disable 2FA** appears next to the admin promotion button. + +Be sure that the user's identity and the validity of their request have been verified according to appropriate security procedures before disabling their configured 2FA. + +-> **Note:** If the user belongs to an organization that requires 2FA, upon login, they will be redirected to [set it up again](/terraform/enterprise/users-teams-organizations/2fa) before they can view any other part of Terraform Enterprise. + +## Managing Organizations + +The **Organizations** page lets you configure the organizations in your Terraform Enterprise instance. If there are multiple organizations, click each one in the admin list to view its details. + +You can disable or delete organizations, as well as impersonate an owner to modify an organization's settings, profile, and workspaces. You can also control whether the organization can use beta Terraform versions in runs, set timeouts for plans and applies, and set a limit on the number of workspaces that an organization can contain. + +Typically, all organizations on a Terraform Enterprise instance are granted "Premium" plan status to ensure access to all available features. However, it's also possible to set other statuses. An organization whose trial period is expired will be unable to make use of features in the HCP Terraform application. + +## Managing Workspaces and Runs + +The administrative view of workspaces and runs provides limited detail (name, status, and IDs) to avoid exposing sensitive data when it isn't needed. Site administrators can view and investigate workspaces and runs more deeply by impersonating a user with full access to the desired resource. (See [Impersonating a User](#impersonating-a-user) above.) + +### Deleting Workspaces + +A workspace can be administratively deleted, using the **Delete this Workspace** button on its details page, if it should not have been created, or is presenting issues for the application. + +### Force-Canceling Runs + +A run can be administratively force-canceled if it becomes stuck or is presenting issues to the application. Runs can be force-canceled from the run list or the run details page. The run details page also offers the option to impersonate an organization owner for additional details on the run. + +We recommend impersonating a user (if necessary) to view run details prior to force-canceling a run, to ensure that graceful cancellation was attempted, and that the run is no longer progressing. + +## Managing Terraform Versions + +Terraform Enterprise ships with a default list of Terraform versions. However, the addition of new versions after installation is the responsibility of site administrators. + +To add a new version of Terraform, click **Terraform Versions** and then click **Add Terraform Version**. Provide the version number, Linux 64-bit download URL, and SHA256 checksum of the binary. Set the status to **Beta** to make the version available to site administrators, or Enabled to add it for everyone. + +~> **Important:** Terraform Enterprise ships with a default list of Terraform versions. Any modifications to these default Terraform versions will be overwritten. As such, it is recommended to create new Terraform versions instead of modifying the default Terraform versions. + +The versions you add may be recent standard Terraform releases from HashiCorp, or custom Terraform versions. One common use for custom versions is to add a Terraform bundle that includes [pre-installed providers](/terraform/enterprise/run/install-software#custom-and-community-providers) commonly needed by the instance. + +Versions of Terraform can also be modified by clicking them in the list. They can be set to disabled (unavailable for use) if no workspaces are currently using them. The list indicates how many workspaces are currently using a given version. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/sentinel-tool-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/sentinel-tool-versions.mdx new file mode 100644 index 000000000..1ed6a1039 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/application-administration/sentinel-tool-versions.mdx @@ -0,0 +1,30 @@ +--- +page_title: Manage Sentinel tool versions in Terraform Enterprise +description: >- + Learn how to add and manage Sentinel versions in the Terraform Enterprise user interface. +--- + +# Manage Sentinel tool versions + +This topic describes how to specify which version of Sentinel Terraform Enterprise uses to monitor compliance. + +## Requirements + +You must have one of the following user roles to access the **Sentinel Versions** page: + +- Site admin +- Configuration +- Support +- Version maintenance + +## Add a Sentinel version + +1. Navigate to the **Sentinel Versions** page. +1. Click **Add Sentinel version**. +1. Enter `0.24.2` for **Version**. +1. Check the **Enable this version** box. +1. Enter `https://releases.hashicorp.com/sentinel/0.24.2/sentinel_0.24.2_linux_amd64.zip` for the **URL**. +1. Enter `a17aad9797e7b9b0072c887c2e761703e2bee742ff327011ccec5e6686fc5b8b` as your **SHA256 Checksum**. +1. Click **Add Sentinel version**. + +For more details, refer to the [Sentinel GitHub repository releases page](https://releases.hashicorp.com/sentinel). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/aws.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/aws.mdx new file mode 100644 index 000000000..f777c0c65 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/aws.mdx @@ -0,0 +1,158 @@ +--- +page_title: AWS resources included in cost estimation in Terraform Enterprise +description: Learn which AWS resources Terraform Enterprise includes in cost estimation. +source: terraform-docs-common +--- + +# AWS resources included in cost estimation + +HCP Terraform can estimate monthly costs for many AWS Terraform resources. + +-> **Note:** Terraform Enterprise requires AWS credentials to support cost estimation. These credentials are configured at the instance level, not the organization level. See the [Application Administration docs](/terraform/enterprise/admin/application/integration) for more details. + +## Supported Resources + +Cost estimation supports the following resources. Not all possible values for attributes of each resource are supported, ex. newer instance types or EBS volume types. + +| Resource | Incurs Cost | +| ------------------------------------------- | ----------- | +| `aws_alb` | X | +| `aws_autoscaling_group` | X | +| `aws_cloudhsm_v2_hsm` | X | +| `aws_cloudwatch_dashboard` | X | +| `aws_cloudwatch_metric_alarm` | X | +| `aws_db_instance` | X | +| `aws_dynamodb_table` | X | +| `aws_ebs_volume` | X | +| `aws_elasticache_cluster` | X | +| `aws_elasticsearch_domain` | X | +| `aws_elb` | X | +| `aws_instance` | X | +| `aws_kms_key` | X | +| `aws_lb` | X | +| `aws_rds_cluster_instance` | X | +| `aws_acm_certificate_validation` | | +| `aws_alb_listener` | | +| `aws_alb_listener_rule` | | +| `aws_alb_target_group` | | +| `aws_alb_target_group_attachment` | | +| `aws_api_gateway_api_key` | | +| `aws_api_gateway_deployment` | | +| `aws_api_gateway_integration` | | +| `aws_api_gateway_integration_response` | | +| `aws_api_gateway_method` | | +| `aws_api_gateway_method_response` | | +| `aws_api_gateway_resource` | | +| `aws_api_gateway_usage_plan_key` | | +| `aws_appautoscaling_policy` | | +| `aws_appautoscaling_target` | | +| `aws_autoscaling_lifecycle_hook` | | +| `aws_autoscaling_policy` | | +| `aws_cloudformation_stack` | | +| `aws_cloudfront_distribution` | | +| `aws_cloudfront_origin_access_identity` | | +| `aws_cloudwatch_event_rule` | | +| `aws_cloudwatch_event_target` | | +| `aws_cloudwatch_log_group` | | +| `aws_cloudwatch_log_metric_filter` | | +| `aws_cloudwatch_log_stream` | | +| `aws_cloudwatch_log_subscription_filter` | | +| `aws_codebuild_webhook` | | +| `aws_codedeploy_deployment_group` | | +| `aws_cognito_identity_provider` | | +| `aws_cognito_user_pool` | | +| `aws_cognito_user_pool_client` | | +| `aws_cognito_user_pool_domain` | | +| `aws_config_config_rule` | | +| `aws_customer_gateway` | | +| `aws_db_parameter_group` | | +| `aws_db_subnet_group` | | +| `aws_dynamodb_table_item` | | +| `aws_ecr_lifecycle_policy` | | +| `aws_ecr_repository_policy` | | +| `aws_ecs_cluster` | | +| `aws_ecs_task_definition` | | +| `aws_efs_mount_target` | | +| `aws_eip_association` | | +| `aws_elastic_beanstalk_application` | | +| `aws_elastic_beanstalk_application_version` | | +| `aws_elastic_beanstalk_environment` | | +| `aws_elasticache_parameter_group` | | +| `aws_elasticache_subnet_group` | | +| `aws_flow_log` | | +| `aws_iam_access_key` | | +| `aws_iam_account_alias` | | +| `aws_iam_account_password_policy` | | +| `aws_iam_group` | | +| `aws_iam_group_membership` | | +| `aws_iam_group_policy` | | +| `aws_iam_group_policy_attachment` | | +| `aws_iam_instance_profile` | | +| `aws_iam_policy` | | +| `aws_iam_policy_attachment` | | +| `aws_iam_role` | | +| `aws_iam_role_policy` | | +| `aws_iam_role_policy_attachment` | | +| `aws_iam_saml_provider` | | +| `aws_iam_service_linked_role` | | +| `aws_iam_user` | | +| `aws_iam_user_group_membership` | | +| `aws_iam_user_login_profile` | | +| `aws_iam_user_policy` | | +| `aws_iam_user_policy_attachment` | | +| `aws_iam_user_ssh_key` | | +| `aws_internet_gateway` | | +| `aws_key_pair` | | +| `aws_kms_alias` | | +| `aws_lambda_alias` | | +| `aws_lambda_event_source_mapping` | | +| `aws_lambda_function` | | +| `aws_lambda_layer_version` | | +| `aws_lambda_permission` | | +| `aws_launch_configuration` | | +| `aws_lb_listener` | | +| `aws_lb_listener_rule` | | +| `aws_lb_target_group` | | +| `aws_lb_target_group_attachment` | | +| `aws_network_acl` | | +| `aws_network_acl_rule` | | +| `aws_network_interface` | | +| `aws_placement_group` | | +| `aws_rds_cluster_parameter_group` | | +| `aws_route` | | +| `aws_route53_record` | | +| `aws_route53_zone_association` | | +| `aws_route_table` | | +| `aws_route_table_association` | | +| `aws_s3_bucket` | | +| `aws_s3_bucket_notification` | | +| `aws_s3_bucket_object` | | +| `aws_s3_bucket_policy` | | +| `aws_s3_bucket_public_access_block` | | +| `aws_security_group` | | +| `aws_security_group_rule` | | +| `aws_service_discovery_service` | | +| `aws_sfn_state_machine` | | +| `aws_sns_topic` | | +| `aws_sns_topic_subscription` | | +| `aws_sqs_queue` | | +| `aws_sqs_queue_policy` | | +| `aws_ssm_maintenance_window` | | +| `aws_ssm_maintenance_window_target` | | +| `aws_ssm_maintenance_window_task` | | +| `aws_ssm_parameter` | | +| `aws_subnet` | | +| `aws_volume_attachment` | | +| `aws_vpc` | | +| `aws_vpc_dhcp_options` | | +| `aws_vpc_dhcp_options_association` | | +| `aws_vpc_endpoint` | | +| `aws_vpc_endpoint_route_table_association` | | +| `aws_vpc_endpoint_service` | | +| `aws_vpc_ipv4_cidr_block_association` | | +| `aws_vpc_peering_connection_accepter` | | +| `aws_vpc_peering_connection_options` | | +| `aws_vpn_connection_route` | | +| `aws_waf_ipset` | | +| `aws_waf_rule` | | +| `aws_waf_web_acl` | | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/azure.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/azure.mdx new file mode 100644 index 000000000..564769851 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/azure.mdx @@ -0,0 +1,56 @@ +--- +page_title: Azure resources included in cost estimation in Terraform Enterprise +description: Learn which Azure resources Terraform Enterprise includes in cost estimation. +source: terraform-docs-common +--- + +# Azure resources included in cost estimation + +HCP Terraform can estimate monthly costs for many Azure Terraform resources. + +-> **Note:** Terraform Enterprise requires Azure credentials to support cost estimation. These credentials are configured at the instance level, not the organization level. See the [Application Administration docs](/terraform/enterprise/admin/application/integration) for more details. + +## Supported Resources + +Cost estimation supports the following resources. Not all possible values for attributes of each resource are supported, ex. newer VM sizes or managed disk types. + +| Resource | Incurs Cost | +| ------------------------------------------------------ | ----------- | +| `azurerm_app_service_custom_hostname_binding` | X | +| `azurerm_app_service_environment` | X | +| `azurerm_app_service_plan` | X | +| `azurerm_app_service_virtual_network_swift_connection` | X | +| `azurerm_cosmosdb_sql_database` | X | +| `azurerm_databricks_workspace` | X | +| `azurerm_firewall` | X | +| `azurerm_hdinsight_hadoop_cluster` | X | +| `azurerm_hdinsight_hbase_cluster` | X | +| `azurerm_hdinsight_interactive_query_cluster` | X | +| `azurerm_hdinsight_kafka_cluster` | X | +| `azurerm_hdinsight_spark_cluster` | X | +| `azurerm_integration_service_environment` | X | +| `azurerm_linux_virtual_machine` | X | +| `azurerm_linux_virtual_machine_scale_set` | X | +| `azurerm_managed_disk` | X | +| `azurerm_mariadb_server` | X | +| `azurerm_mssql_elasticpool` | X | +| `azurerm_mysql_server` | X | +| `azurerm_postgresql_server` | X | +| `azurerm_sql_database` | X | +| `azurerm_virtual_machine` | X | +| `azurerm_virtual_machine_scale_set` | X | +| `azurerm_windows_virtual_machine` | X | +| `azurerm_windows_virtual_machine_scale_set` | X | +| `azurerm_app_service` | | +| `azurerm_cosmosdb_account` | | +| `azurerm_cosmosdb_sql_container` | | +| `azurerm_cosmosdb_table` | | +| `azurerm_mysql_database` | | +| `azurerm_network_security_group` | | +| `azurerm_postgresql_database` | | +| `azurerm_resource_group` | | +| `azurerm_sql_server` | | +| `azurerm_sql_virtual_network_rule` | | +| `azurerm_subnet` | | +| `azurerm_subnet_route_table_association` | | +| `azurerm_virtual_network` | | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/gcp.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/gcp.mdx new file mode 100644 index 000000000..e1660de81 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/gcp.mdx @@ -0,0 +1,42 @@ +--- +page_title: GCP resources included in cost estimation in Terraform Enterprise +description: Learn which GCP resources Terraform Enterprise includes in cost estimation. +source: terraform-docs-common +--- + +# GCP resources included in cost estimation + +HCP Terraform can estimate monthly costs for many GCP Terraform resources. + +-> **Note:** Terraform Enterprise requires GCP credentials to support cost estimation. These credentials are configured at the instance level, not the organization level. See the [Application Administration docs](/terraform/enterprise/admin/application/integration) for more details. + +## Supported Resources + +Cost estimation supports the following resources. Not all possible values for attributes of each resource are supported, ex. new or custom machine types. + +| Resource | Incurs Cost | +| --------------------------------------- | ----------- | +| `google_compute_disk` | X | +| `google_compute_instance` | X | +| `google_sql_database_instance` | X | +| `google_billing_account_iam_member` | | +| `google_compute_address` | | +| `google_compute_subnetwork_iam_member` | | +| `google_folder_iam_member` | | +| `google_folder_iam_policy` | | +| `google_kms_crypto_key_iam_member` | | +| `google_kms_key_ring_iam_member` | | +| `google_kms_key_ring_iam_policy` | | +| `google_organization_iam_member` | | +| `google_project` | | +| `google_project_iam_member` | | +| `google_project_iam_policy` | | +| `google_project_service` | | +| `google_pubsub_subscription_iam_member` | | +| `google_pubsub_subscription_iam_policy` | | +| `google_pubsub_topic_iam_member` | | +| `google_service_account` | | +| `google_service_account_iam_member` | | +| `google_service_account_key` | | +| `google_storage_bucket_iam_member` | | +| `google_storage_bucket_iam_policy` | | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/index.mdx new file mode 100644 index 000000000..d81c7e6c1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/cost-estimation/index.mdx @@ -0,0 +1,58 @@ +--- +page_title: Cost estimation overview for Terraform Enterprise +description: >- + Terraform Enterprise can estimate the total cost and delta of resources from + your Terraform configuration. Use cost estimation to get hourly and monthly + cost estimates for each resource. +source: terraform-docs-common +--- + +# Cost estimation overview + +> **Hands-on:** Try the [Control Costs with Policies](/terraform/tutorials/cloud-get-started/cost-estimation) tutorial to practice enabling cost estimation and define a policy to check the total monthly delta. + +HCP Terraform provides cost estimates for many resources found in your Terraform configuration. For each resource an hourly and monthly cost is shown, along with the monthly delta. The total cost and delta of all estimable resources is also shown. + +## Enabling Cost Estimation + +HCP Terraform disables cost estimation by default. To enable cost estimation: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise, then navigate to the organization where you want to enable cost estimation. +2. Choose **Settings** from the sidebar, then **Cost Estimation**. +3. Toggle the **Enable cost estimation for all workspaces** setting. +4. Click **Update settings**. + +## Viewing a Cost Estimate + +When enabled, HCP Terraform performs a cost estimate for every run. Estimated costs appear in the run UI as an extra run phase, between the plan and apply. + +The estimate displays a total monthly cost by default; you can expand the estimate to see an itemized list of resource costs, as well as the list of unestimated resources. + +Note that this is just an estimate; some resources don't have cost information available or have unpredictable usage-based pricing. Supported resources are listed in this document's sub-pages. + +## Verifying Costs in Policies + +You can use a Sentinel policy to validate your configuration's cost estimates using the [`tfrun`](/terraform/enterprise/policy-enforcement/import-reference/tfrun) import. The example policy below checks that the new cost delta is no more than $100. A new `t3.nano` instance should be well below that. A `decimal` import is available for more accurate math when working with currency numbers. + +```python +import "tfrun" +import "decimal" + +delta_monthly_cost = decimal.new(tfrun.cost_estimate.delta_monthly_cost) + +if delta_monthly_cost.greater_than(100) { + print("This policy prevents a user from increasing their spending by more than $100 per month in a single run without a warning.") +} + +main = rule { + delta_monthly_cost.less_than(100) +} +``` + +## Supported Resources + +Cost estimation in HCP Terraform supports Terraform resources within three major cloud providers. + +- [AWS](/terraform/enterprise/cost-estimation/aws) +- [GCP](/terraform/enterprise/cost-estimation/gcp) +- [Azure](/terraform/enterprise/cost-estimation/azure) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/index.mdx new file mode 100644 index 000000000..e471614c1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/index.mdx @@ -0,0 +1,18 @@ +--- +page_title: Create deployment configuration overview +description: Learn about the deployment configuration file for your runtime environment +--- + +# Create deployment configuration overview + +This topic provides overview information about how to create the deployment configuration file for non-Replicated runtimes. If you are deploying Terraform Enterprise to Replicated, refer [Deploy to Replicated](//terraform/enterprise/deploy/replicated) for instructions. + +## Workflow + +Create a deployment configuration file for your runtime environment and specify the Terraform Enterprise configurations. For example, create a values.yaml if you are deploying to Kubernetes or a compose.yaml file if you are deploying to Docker. The runtime platform starts the Linux container for Terraform Enterprise according to the settings defined in the configuration file. Specify settings to control the following actions: + +1. Access the HashiCorp license: If you do not have a license, contact your HashiCorp account manager. Refer to [Configure a license](/terraform/enterprise/deploy/configuration/license) for instructions. +1. Enable access to external services. Configure ingress and egress ports so that Terraform Enterprise can provision resources and perform other tasks. Refer to [Configure network access](/terraform/enterprise/deploy/configuration/network) for instructions. +1. Enable the operation mode. You can operate Terraform Enterprise in different modes that determine how it manages and stores data. Refer to [Configure operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) for instructions on how to set the mode. +1. Store and retrieve data. You can configure how Terraform Enterprise stores and retrieves data associated with your infrastructure resources. Refer to [Data storage settings overview](/terraform/enterprise/deploy/configuration/storage/) for additional information. +1. Customize the Terraform application. Terraform Enterprise performs Terraform runs in ephemeral containers. It is optional, but you can add custom tools and logic to your Terraform run environment. Refer to [Customize run environment](/terraform/enterprise/deploy/custom-image) for instructions. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/license.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/license.mdx new file mode 100644 index 000000000..925eb1d53 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/license.mdx @@ -0,0 +1,34 @@ +--- +page_title: Configure a Terraform Enterprise license +description: You must configure a license to deploy Terraform Enterprise to a supported runtime environment. Learn how to acquire and configure a Terraform Enterprise license. +--- + +# Configure a license + +This topic describes how to configure the license so that you can deploy Terraform Enterprise to one of the supported runtimes environments. For information about configuring a Terraform Enterprise for the Replicated platform, refer to [Deploy Terraform Enterprise to Replicated](/terraform/enterprise/deploy/replicated). + + +## Acquiring a new Terraform Enterprise license + +To acquire a new Terraform Enterprise license from HashiCorp, contact your account manager. + +## Apply the Terraform Enterprise license + +There are two ways to apply the new license file on startup: + +- Provide the body of the license file as a string to an environment variable called `TFE_LICENSE`. +- Store the license in a file and provide the file path to an environment variable called `TFE_LICENSE_PATH`. + +## License expiration and termination + +To prevent unexpected outages caused by delays in license updates, HashiCorp licenses provisioned for production use +will not terminate on their expiry date. + +If your license expires, you cannot use it for authentication with the HashiCorp image registry (`images.registry.hashicorp.com`). If you configure your installation to pull directly from the HashiCorp registry and your license expires, you cannot reinstall, scale, or upgrade. You can check your license expiration date using the [`tfectl app license` command](/terraform/enterprise/deploy/reference/cli#review-hashicorp-license-status). + +## License updates + +To update an existing installation with a new license, you will need to modify the `TFE_LICENSE` or `TFE_LICENSE_PATH` +variable and restart the application. + +@include "replicated-and-fdo/admin/license-example-usage-payload.mdx" diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/network.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/network.mdx new file mode 100644 index 000000000..7a3dfa1f4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/network.mdx @@ -0,0 +1,240 @@ +--- +page_title: Configure network access for Terraform Enterprise installation +description: Linux instances running Terraform Enterprise require network access to send and receive traffic. Learn how to configure network access. +--- + +# Configure network access + +This topic describes how to configure network settings to allow Terraform to send and receive traffic. Refer to [Create deployment configuration overview](/terraform/enterprise/deploy/configuration) for an overview of the configuration process. + +## Overview + +You must configure the Linux instance that runs Terraform Enterprise to allow incoming network traffic across several ports. You must also configure Terraform Enterprise to access several external services so that Terraform can download and update resources. + +Configure the following parameters in your deployment configuration file to configure network access: + +1. Ports for ingress traffic. The Terraform binary accepts traffic from the following sources: + - users + - clients + - VCS + - metrics + - TFE servers +1. Egress destination endpoints. To run Terraform Enterprise in an airgapped environment, you must also whitelist the domains that serve the Terraform Enterprise image from the registry. +1. For Docker deployments, you can also disable access to EC2 instance metadata service. +1. Specify any optional network settings, such cloud provider API endpoints for cost estimation. +1. Specify any specific network settings necessary for your environment, such as allowing traffic through firewalls. + +Refer to [environment variables configuration reference](/terraform/enterprise/deploy/) for information about all environment variables. + + +## Define ingress settings + +Specify the following values in your deployment configuration file to configure access into Terraform Enterprise. Refer to [Configuration reference](/terraform/enterprise/deploy/reference/configuration) for information about all configuration settings. + +### Hostnames + +Specify the following settings in your deployment configuration file to set the hostname: + +- [`TFE_HOSTNAME`](/terraform/enterprise/deploy/reference/configuration#tfe_hostname): This should match the hostname you created when preparing the host environment. Refer to [Assign a DNS hostname](/terraform/enterprise/deploy/prepare-host#assign-a-dns-hostname) for additional information. +- [`TFE_HOSTNAME_SECONDARY`](/terraform/enterprise/deploy/reference/configuration#tfe_hostname): You should only configure this setting if you created a secondary hostname for external-facing endpoints when preparing the host environment. Refer to [Assign a DNS hostname](/terraform/enterprise/deploy/prepare-host#assign-a-dns-hostname) for additional information. + + +### Enable access from users, clients, and VCS + +Specify the following settings in your deployment configuration file to enable ingress from users, clients, and the VCS: + +- `TFE_HTTP_PORT`: Specifies the port for accessing Terraform Enterprise over HTTP. HTTP redirects to HTTPS. The default value is `80`. +- `TFE_HTTPS_PORT`: Specifies the port for accessing Terraform Enterprise over HTTPS. The default is `443`. + +#### Ports for Podman + +Podman does not expose privileged ports. If you are deploying to Podman, specify the variables in the `kube.yaml` pod specification file: + +```yaml +- name: "TFE_HTTP_PORT" + value: "8080" +- name: "TFE_HTTPS_PORT" + value: "8443" +``` + +You must also specify the port values in the `kube.yaml` pod specification file: + +```yaml +"ports": +- "containerPort": 8080 + "hostPort": 80 +- "containerPort": 8443 + "hostPort": 443 +- "containerPort": 9090 + "hostPort": 9090 +``` + +#### Integrate with SaaS version control provider + +To integrate with SaaS VCSs, such as GitHub.com, GitLab.com, Bitbucket Cloud, Azure DevOps Services, you must enable ingress from the public internet so that you can use inbound web hooks to reach Terraform Enterprise. Refer [Webhooks](/terraform/enterprise/vcs#webhooks) for additional information. + +You should also configure appropriate security controls, such as a web application firewall (WAF). Refer to your cloud provider documentation for instructions about deploying a WAF. + +### Enable requests for metrics + +Specify the following variables in your deployment configuration file to enable Terraform Enterprise to receive requests for system metrics: + +- `TFE_METRICS_HTTP_PORT`: TCP port on which Terraform Enterprise handles HTTP metrics requests. Default is `9090`. +- `TFE_METRICS_HTTPS_PORT`: TCP port on which Terraform Enterprise handles HTTPS metrics requests. Default is `9091`. + +The metrics endpoints are optional. You can enable metrics collection by setting `TFE_METRICS_ENABLE` to `true`. + +### Terraform Enterprise servers + +If you plan to operate Terraform Enterprise in `active-active` mode, forward requests to port `8201` to enable high availability requests from Vault. + +## Define egress settings + +Add the following destination endpoints to your deployment configuration file so that Terraform can connect to external services. + +### HashiCorp container registry + +- `https://images.releases.hashicorp.com`: The endpoint hosts release container images. +- `https://helm.releases.hashicorp.com`: The endpoint hosts the helm chart for Kubernetes installation. + +### Domains to whitelist for airgapped environments + +To run Terraform Enterprise in an airgapped environment, you must also whitelist the following domains. This because the service that provides the container image is globally routable and may come from any of the regions: + +- `s3-r-w.us-east-1.amazonaws.com` +- `s3-r-w.us-west-2.amazonaws.com` +- `s3-r-w.eu-central-1.amazonaws.com` +- `s3-r-w.eu-west-1.amazonaws.com` + +Note that the domains are owned by Amazon, not HashiCorp, and may change at any time. Refer to this documentation to verify the domains each time you run the deployment configuration. + +### HashiCorp service APIs + +Terraform Enterprise calls the following hostnames unless you have supplied a custom Terraform bundle. Refer to [Custom and Community Providers](/terraform/enterprise/run/install-software#custom-and-community-providers) +for additional information: + +- `registry.terraform.io` +- `releases.hashicorp.com` +- `https://yy0ffni7mf-dsn.algolia.net/`: Specifies the API endpoint of the Terraform Registry's [Algolia](https://www.algolia.com) application. Terraform Enterprise uses Algolia to index resources in the registry and power the public search feature. +- `reporting.hashicorp.services`: Specifies the license entitlement reporting API endpoint. Refer to [Enable automated license reports](/terraform/enterprise/deploy/manage/license-report) for additional information. + + +### Additional outbound network targets + +Terraform Enterprise also needs egress access to the following systems: + +- Any VCS servers and services you that you plan to use. +- Login or authentication servers if you want to enable ADFS, Okta, or other SAML services. +- Cloud API endpoints that you intend to manage with Terraform +- Third party services that you intend to integrate or manage with the Terraform Enterprise server. + +### Cost estimation APIs + +When [Cost Estimation](/terraform/enterprise/application-administration/integration#cost-estimation-integration) is enabled, Terraform Enterprise uses the following cloud provider's APIs to get up-to-date pricing information: + +- `api.pricing.us-east-1.amazonaws.com` +- `cloudbilling.googleapis.com` +- `prices.azure.com` + +## Specify the Docker network container for run execution + +In the [`TFE_RUN_PIPELINE_DOCKER_NETWORK` configuration](/terraform/enterprise/deploy/reference/configuration#tfe_run_pipeline_docker_network), specify the network address where Docker creates the container Terraform uses to execute runs. This is an optional configuration that enables you to prevent Terraform Enterprise from accessing the EC2 instance metadata service in AWS. Refer to [Disable access to EC2 instance metadata service](#disable-access-to-ec2-instance-metadata-service) for instructions. + +The network must already exist and will not be created automatically. Leave blank to use the default network. Defaults to `""`. + + +## Disable access to EC2 instance metadata service + +1. Create a Docker network. Docker uses this network to create containers that run Terraform Enterprise. We recommend using a name that matches your deployment. The following example creates a network called `tfe-workers`: + + ```shell-session + $ docker network create tfe-workers + ``` + +1. Run the `docker network inspect` command to get the subnet and gateway for the Docker network: + + ```shell-session + $ docker network inspect tfe-workers + ``` + +1. Copy the subnet address from the `docker network inspect` command output so that you can use it in the IP table. In the following example, the subnet is `172.18.0.0/16`: + + ```json + [ + { + "Name": "tfe-workers", + "Id": "10cd24aeba3df774ef2bf1dcb64cadbf2016160fd2cd64bb46f07595e8eb3a83", + "Created": "2024-07-08T13:09:52.596315311-07:00", + "Scope": "local", + "Driver": "bridge", + "EnableIPv6": false, + "IPAM": { + "Driver": "default", + "Options": {}, + "Config": [ + { + "Subnet": "172.18.0.0/16", + "Gateway": "172.18.0.1" + } + ] + }, + "Internal": false, + "Attachable": false, + "Ingress": false, + "ConfigFrom": { + "Network": "" + }, + "ConfigOnly": false, + "Containers": {}, + "Options": {}, + "Labels": {} + } + ] + ``` + +1. Add a rule to the IP table that blocks Terraform Enterprise access to the EC2 instance metadata service. Specify the EC2 instance metadata service address, `169.254.169.254`, as the destination and the subnet address you copied in step 3 as the source. You can use the following command template and replace `` with your subnet address to add the rule using the `iptables` command: + + ```shell-session + $ iptables -I DOCKER-USER -d 169.254.169.254 -s -j DROP + ``` + +1. Ensure that the `TFE_RUN_PIPELINE_DOCKER_NETWORK` environment variable is set to the name of the Docker network you created in your Docker Compose file for deploying Terraform Enterprise. The following example sets the variable to a network named `tfe-workers`: + + ```yaml + services: + tfe: + environment: + TFE_RUN_PIPELINE_DOCKER_NETWORK: tfe-workers + ``` + +When you start Terraform Enterprise, the Terraform Enterprise container will connect to the `tfe-workers` Docker network and apply the IP table rule. + +## Specify integration settings + +You can configure Terraform Enterprise to be accessible over a primary and a secondary hostname. Configuring multiple hostnames lets you federate workloads associated with external services, such as OIDC, version control systems (VCS), and custom run tasks. Configure [`TFE_HOSTNAME_SECONDARY`](/terraform/enterprise/deploy/reference/configuration#tfe_hostname_secondary) to direct integration traffic to a secondary host name and specify `primary` or `secondary` for each integration type: + +- [`TFE_OIDC_HOSTNAME_CHOICE`](/terraform/enterprise/deploy/reference/configuration#tfe_oidc_hostname_choice) +- [`TFE_VCS_HOSTNAME_CHOICE`](/terraform/enterprise/deploy/reference/configuration#tfe_vcs_hostname_choice) +- [`TFE_RUN_TASK_HOSTNAME_CHOICE`](/terraform/enterprise/deploy/reference/configuration#tfe_run_task_hostname_choice) + + +## Specify additional configuration settings + +1. If a firewall is configured on the instance, run one of the following commands to allow traffic to flow out of the `docker0` interface to the instance's primary address. We recommend doing this before you install Docker. + + - To use UFW, run: `ufw allow in on docker0` + - To use firewalld, run: `firewall-cmd --permanent --zone=trusted --change-interface=docker0` + +1. Get a domain name for the instance. Using an IP address to access the product is not supported as many systems use TLS and need to verify that the certificate is correct, which can only be done with a hostname at present. + +1. **For GCP only:** Configure Docker to use an MTU (maximum transmission unit) of `1460`, as required by Google ([GCP Cloud VPN Documentation: MTU Considerations](https://cloud.google.com/network-connectivity/docs/vpn/concepts/mtu-considerations)). + + To configure Docker's MTU, create an `/etc/docker/daemon.json` file with the following content: + + ```json + { + "mtu": 1460 + } + ``` + +1. Ensure that the Docker bridge network address is not being used elsewhere on the network. If it is, refer to the [Docker documentation](https://docs.docker.com/network/bridge/) for information on how to change it. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/configure-mode.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/configure-mode.mdx new file mode 100644 index 000000000..1ad93623c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/configure-mode.mdx @@ -0,0 +1,87 @@ +--- +page_title: Configure operational mode for Terraform Enterprise deployments +description: Terraform Enterprise's operational mode determines data storage, which affects resilience and scalability. Learn how to configure the operational mode for your deployment. +--- + +# Configure the operational mode + +This topic describes how to specify the operational mode for your Terraform Enterprise deployment. + +## Introduction + +The operational mode determines where Terraform Enterprise stores and retrieves data, which can impact your backup and restore procedures, disaster recovery procedures, and scaling options. The operational mode is required to deploy Terraform Enterprise for all runtimes except Kubernetes. Refer to [Data storage settings overview](/terraform/enterprise/deploy/configuration/storage) for additional information. + +### Recommended modes + +Use the following guidelines to help you choose the appropriate mode. + +#### `active-active` + +Set `TFE_OPERATIONAL_MODE` to `active-active` under the following conditions: + +- Your environment has an external PostgreSQL server, S3-compatible object storage, and Redis instance. +- You have experience managing a PostgreSQL server, such as Amazon RDS for PostgreSQL, Google Cloud SQL for PostgreSQL, or Azure Database for PostgreSQL. +- You have experience managing an S3-compatible object storage location, such as AWS S3, Azure Blob Storage, Google Cloud Storage, or MinIO. +- You have experience managing a Redis instance, such as AWS ElastiCache for Redis, Azure Cache for Redis, or Google Cloud Memorystore for Redis. +- You want to use native backup and restore features provided by the external PostgreSQL server and S3-compatible object storage. +- You want to scale beyond a single instance of Terraform Enterprise to increase reliability and performance. + +#### `external` + +Set `TFE_OPERATIONAL_MODE` to `external` under the following conditions: + +- Your environment has an external PostgreSQL server, S3-compatible object storage, and Redis instance. +- You have experience managing a PostgreSQL server, such as Amazon RDS for PostgreSQL, Google Cloud SQL for PostgreSQL, or Azure Database for PostgreSQL. +- You have experience managing an S3-compatible object storage location, such as AWS S3, Azure Blob Storage, Google Cloud Storage, or MinIO. +- You have experience managing a Redis instance, such as AWS ElastiCache for Redis, Azure Cache for Redis, or Google Cloud Memorystore for Redis. +- You want to use native backup and restore features provided by the external PostgreSQL server and S3-compatible object storage. +- You want to scale beyond a single instance of Terraform Enterprise to increase reliability and performance. + +#### `disk` + +Set `TFE_OPERATIONAL_MODE` to `disk` under the following conditions: + +- Your environment does not have an external PostgreSQL server or S3-compatible object storage. +- You have experience managing persistent storage, such as an AWS EBS volume, an Azure Managed Disk, a Google Cloud Persistent Disk, or an iSCSI location. +- You are familiar with using command line tools, such as `cp`, `scp`, and `rsync`, to backup and restore data. + +## Requirements + +The requirements depend on which operational mode you choose. + +### `external` mode + +- Refer to the [PostgreSQL configuration requirements](/terraform/enterprise/deploy/configuration/storage/connect-database) for stateful application data storage requirement details. +- Refer to the [data object storage configuration requirements](/terraform/enterprise/deploy/configuration/storage/connect-object) for requirements. + +### `active-active` mode + +- Refer to the [PostgreSQL configuration requirements](/terraform/enterprise/deploy/configuration/storage/connect-database) for stateful application data storage requirement details. +- Refer to the [data object storage configuration requirements](/terraform/enterprise/deploy/configuration/storage/connect-object) for requirements. +- Refer to the [Redis data store configuration requirements](/terraform/enterprise/deploy/configuration/storage/connect-redis) for requirements. + +### `disk` mode + +One of the following mounted disk types is required for the persistent storage volume: + +- AWS EBS +- GCP zonal persistent disk +- Azure disk storage +- iSCSI +- SAN +- A disk physically connected to the host machine + +## Specify operational mode + +Add the `TFE_OPERATIONAL_MODE` variable to your Terraform Enterprise configuration and specify a mode. The following example sets the mode to `external` when deploying to Docker: + +```yaml +name: terraform-enterprise +services: + tfe: + image: images.releases.hashicorp.com/hashicorp/terraform-enterprise: + environment: + TFE_OPERATIONAL_MODE: "external" +``` + +Refer to the [`TFE_OPERATIONAL_MODE` configuration reference](/terraform/enterprise/deploy/reference/configuration) for details about operational mode settings. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/aurora.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/aurora.mdx new file mode 100644 index 000000000..f2a71b8fe --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/aurora.mdx @@ -0,0 +1,100 @@ +--- +page_title: Connect to a PostgreSQL cluster deployed to Aurora +description: Learn how to connect Terraform Enterprise to a highly-available PostgreSQL database cluster deployed to AWS Aurora. +--- + +# Connect to a PostgreSQL cluster deployed to Aurora + +This topic describes how to connect Terraform Enterprise to a highly-available PostgreSQL cluster deployed to AWS Aurora. + + + +**Connecting to a database cluster is in beta**. These instructions describe an example scenario that we tested and verified for non-production use cases. You should evaluate your requirements and business needs to determine the optimal architecture and configurations for your specific environment. + + + +## Overview + +To connect Terraform Enterprise to a highly-available PostgreSQL cluster deployed to AWS Aurora, deploy the Aurora cluster and specify the cluster endpoint in the Terraform Enterprise configuration. + +It is optional, but you can create and run a test workload against Terraform Enterprise to measure the resilience of your high availability PostgreSQL cluster. + +### AWS Aurora + +AWS Aurora is a managed database service that natively supports high-availability and a writer or cluster endpoint that does not require load balancing. Aurora supports read-only endpoints, but Terraform Enterprise does not support them. + +Refer to the following topics in the AWS documentation for additional information about Aurora: + +- [What is Amazon Aurora?](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/CHAP_AuroraOverview.html) +- [High availability for Amazon Aurora](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/Concepts.AuroraHighAvailability.html) +- [Cluster endpoints for Amazon Aurora](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/Aurora.Endpoints.Cluster.html) + +## Requirements + +During testing, the following deployment configuration resulted in seven successful failover recoveries after 10 iterations. Refer to [Measure failover resilience](#measure-failover-resilience) for additional information: + +- Release v202409-1 +- Operational mode to either `active-active` or `external` +- Set the [`TFE_DATABASE_HOST` variable](/terraform/enterprise/deploy/reference/configuration#tfe_database_host) an HAProxy load balancer +- Set the [`TFE_DATABASE_RECONNECT_ENABLED`](/terraform/enterprise/deploy/reference/configuration#tfe_database_reconnect_enabled) to ` true` +- Terraform Enterprise nodes hosted on [Google Kubernetes Engine (GKE)](https://cloud.google.com/kubernetes-engine) +- Terraform Enterprise deployed to three nodes + +Terraform Enterprise does not support RDS proxy. + +## Deploy an Aurora cluster + +Deploy an RDS cluster with Terraform. Refer to [`rds_cluster` documentation](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/rds_cluster#aurora-with-postgresql-engine) in the Terraform registry for configuration instructions. + +The following example configuration provisions a cluster called `experiment` and two cluster instances: + +```hcl +data "aws_availability_zones" "available" { + state = "available" +} + +resource "aws_rds_cluster" "aurora_postgresql" { + cluster_identifier = "experiment" + engine = "aurora-postgresql" + engine_version = "16.2" + availability_zones = slice(data.aws_availability_zones.available.names, 0, 3) + delete_automated_backups = true + backup_retention_period = 1 + deletion_protection = false + skip_final_snapshot = true + storage_encrypted = true + ... +} + +resource "aws_rds_cluster_instance" "cluster_instances_n" { + count = 2 + identifier = format("%s-aurora-node-%d", "experiment", count.index + 1) + cluster_identifier = aws_rds_cluster.aurora_postgresql.id + instance_class = "db.r5.xlarge" + engine = aws_rds_cluster.aurora_postgresql.engine + engine_version = aws_rds_cluster.aurora_postgresql.engine_version +} +``` + +## Measure failover resilience + +You can collect recovery time objective (RTO) data to assess the resilience of your HA system. Refer to the following topics for additional information: + +- [PostgreSQL database failover](/terraform/enterprise/deploy/manage/failover) +- [Measure failover resilience](/terraform/enterprise/deploy/configuration/storage/connect-database/failover-resilience) + +In the example scenario, we executed test workloads against the instance every 15 seconds for 10 iterations. If the workload did not report success within 10 seconds, we consider the instance unhealthy. The instance is also considered non-operational if any run fails. We considered Terraform Enterprise to be fully operational when five consecutive runs finished successfully. + +We observed the following outcomes after triggering 10 failovers: + +- Seven failed over successfully within approximately one minute. +- Two failed over and returned to partial operation. 30-50 percent of the runs executed after failover continued to fail, but Terraform Enterprise successfully completed some of those runs. Manually restarting the Terraform Enterprise nodes resolved the issues. +- One failover never returned to operation. Manually restarting the Vault process inside the Terraform Enterprise node or fully restarting all nodes resolved the issue. +- Recovery times ranged from a minimum RTO of less than 25 seconds to a maximum of one minute. +- Average RTO was 51 seconds across successful failovers. + +## Troubleshooting + +You may need to manually address issues after a failover to return to functionality. For example, the Vault process may still be connected to a read-only instance if the affected instance can not process runs. + +Refer to [Unable to write to database after a failover](/terraform/enterprise/deploy/troubleshoot/error-messages#unable-to-write-to-database-after-a-failover) in the Terraform troubleshooting documentation for symptoms and solutions. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/failover-resilience.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/failover-resilience.mdx new file mode 100644 index 000000000..6513ff0e0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/failover-resilience.mdx @@ -0,0 +1,87 @@ +--- +page_title: Measure failover resilience +description: Learn how to measure database failover resilience for Terraform Enteprise deployments connect to an HA PostgreSQL cluster. +--- + +# Measure failover resilience + +This topic describes how to measure the failover resilience for a Terraform Enterprise deployment connected to a PostgreSQL database cluster. + +## Overview + +You can connect Terraform Enterprise to a database cluster so that the application can fail over to another database instance if there is an issue with the primary instance. Refer to the following topics for additional information: + +- [PostgreSQL database failover](/terraform/enterprise/deploy/manage/failover) +- [Connect to a PostgreSQL cluster](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres-cluster) + +You can test the resilience of your failover system by develping and running test workloads against the database cluster and measuring the recovery time objective (RTO). + +Note that RTO varies significantly based on organizational priorities and the complexity of the services involved. + +## Define test workloads + +You can continuously execute a workload against Terraform Enterprise and measure the time since the last successful execution of the workload. With this continuous measurement running, you can then trigger a failover on the Postgres cluster and record the outage duration. + +The following sequence of steps describe an example workload: + +1. Reset workspace to cleanup any blocking run. +1. Create and upload a configuration version. +1. Create a run. +1. Wait for the plan to finish. +1. Discard the plan. + +## Define a protocol + +Determine what success and failure means in terms of measuring RTO for your instances. The following criteria represent an example protocol: + +1. Execute the workloads every fifteen seconds. + 1. If the workload does not report success within 10 seconds, the instance is unhealthy. + 1. The instance is healthy whenfive consecutive runs complete successfully. + 1. The instance is non-operational if any run fails. +1. [Trigger a failover](#trigger-a-failover). +1. Wait until the system becomes operational. + 1. If the workload does not report success within 10 seconds, the instance is unhealthy. + 1. The instance is healthy whenfive consecutive runs complete successfully. + 1. The instance is non-operational if any run fails. +1. Complete 10 iterations. + +## Trigger a failover + +Create a separate organization and workspace to prevent modifying the initial dataset and to enable you to repeat tests. Determine a mechanism for triggering a failover. For example, if Terraform Enterprise is connected to a database cluster hosted on AWS, you can use the relational database service (RDS) to trigger a failover in the AWS console: + + ```shell-session + $ aws rds failover-db-cluster --db-cluster-identifier --region us-west-2` + ``` + +## Compute metrics + +Compute the RTO by logging the duration between the first failed run and the first of five consecutively successful runs. You can measure RTO using [`go-tfe`](https://github.com/hashicorp/go-tfe) client. + +### Patroni example + +The following table contains example data collected by running test workloads against a Terraform Enterprise deployment connected to a PostgreSQL cluster running on Patroni: + +| Failover | RTO | First failed run | First of five consecutive successful runs | +| --- | --- | --- | --- | +| 1 | 0:03:42 | 17:16:06.275 | 17:19:47.832 | +| 2 | - | - | Terraform Enterprise returned the operation within one minute, but runs continued to fail. Restarting all nodes resolved the issue. | +| 3 | 0:04:56 | 17:34:10.940 | 17:39:07.467 | +| 4 | 0:02:18 | 18:01:50.913 | 18:04:08.902 | +| 5 | - | 18:07:30.912 | Terraform Enterprise returned the operation within one minute, but runs continued to fail. Restarting all nodes resolved the issue. | + +### Aurora example + +The following table contains example data collected by running test workloads against a Terraform Enterprise deployment connected to a PostgreSQL cluster running on Aurora: + +| Failover | RTO | Failover start | First failed run | First of five consecutive successful runs | +| --- | --- | --- | --- | --- | +| 1 | 53.6s | 10:13 | 10:13:37.539 | 10:14:31.186 | +| 2 | 61.3s | 10:17 | 10:17:14.430 | 10:18:15.763 | +| 3 | infinite | 10:21 | 10:21:30.875 | Terraform Enterprise is partially operational, but runs randomly fail.
After restarting the nodes, the application is fully operational. | +| 4 | < 25s | 11:36 | No run failed. Failover succeeded in less than the measurement interval of 25s | NA | +| 5 | 55.5s | 11:43 | 11:43:12.188 | 11:44:07.725 | +| 6 | 57.5s | 11:47 | 11:47:44.293 | 11:48:41.828 | +| 7 | 42.7s | 11:51 | 11:51:43.751 | 11:52:26.485 | +| 8 | infinite | 12:27 | 12:27:16.227 | Terraform Enterprise became unoperational. All nodes went down and all runs failed.
Vault sealed on all three nodes.
Either restart the nodes or restart the Vault process inside the nodes. | +| 9 | infinite | 13:27 | 13:28:00.917 | Terraform Enterprise is operational, but all runs failed.
Restarting all nodes resolved the issue. | +| 10 | 58.6s | 13:50 | 13:50:37.778 | 13:51:36.330 | \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/index.mdx new file mode 100644 index 000000000..00f1c85ef --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/index.mdx @@ -0,0 +1,31 @@ +--- +page_title: Database connection overview +description: Terraform Enterprise uses an external PostgreSQL database to store stateful application data in external or active-active mode. Learn about connecting external PostgreSQL databases. +--- + +# Database connection overview + +This topic provides overview information about configuring Terraform Enterprise to connect to an +external PostgreSQL database. + +You only need to connect to an external database when operating +Terraform Enterprise in `active-active` or `external` mode. These modes instruct +Terraform Enterprise to store and retrieve data in an externally-managed +database. If you prefer to allow Terraform Enterprise to manage the database, +configure Terraform Enterprise to run in `disk` mode. Refer to +[Configure operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) +for additional information. + +-> **Connecting to HA PostgreSQL is in beta.** Do not deploy beta features in production environments. Provision a dedicated test environment before connecting Terraform Enterprise to an HA PostgreSQL cluster. If you have questions or feedback, contact your HashiCorp account representative. + +## Workflows + +Terraform Enterprise stores stateful application data, such as, workspace +settings, organization settings, run information, and user information in a +PostgreSQL database. + +You can deploy an external database or a cluster of highly-available database nodes and configure Terraform Enterprise to connect to it. +Refer to the following topics for instructions: + +- [Connect to an external PostgreSQL database](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres): Describes how to connecto to a single-node database instance. +- [Connect to a highly-available PostgreSQL cluster](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres-cluster): Describes how to connecto to a cluster of database instances. This functionality is in beta. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/patroni.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/patroni.mdx new file mode 100644 index 000000000..649d16ffc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/patroni.mdx @@ -0,0 +1,196 @@ +--- +page_title: Connect to a PostgreSQL cluster deployed to Patroni +description: Learn how to connect Terraform Enterprise to a PostgresSQL cluster deployed to Patroni in high availability mode so that you can enable HA failover workflows. +--- + +# Connect to a PostgreSQL cluster deployed to Patroni + +This topic describes how to connect Terraform Enterprise to a highly-available PostgreSQL cluster deployed to Patroni on Kubernetes. + + + +**Connecting to a database cluster is in beta**. These instructions describe an example scenario that we tested and verified for non-production use cases. You should evaluate your requirements and business needs to determine the optimal architecture and configurations for your specific environment. + + + +## Overview + +Install the `postgres-operator` chart, which creates a Postgres construct that manages PostgreSQL clusters on Kubernetes. Refer to the [Postgres operator documentation](https://postgres-operator.readthedocs.io/en/latest/#scope) for additional information. + +1. Create a custom `values.yaml` file and define the necessary Kubernetes objects, such as the HAProxy and a service that enables the proxy to discover the Patroni pods. +1. Deploy the configurations using the Postgres operator Helm chart. + +It is optional, but you can create and run a test workload against Terraform Enterprise to measure the resilience of your high availability PostgreSQL cluster. + +## Requirements + +During testing, the following deployment configuration resulted in three successful failover recoveries after five iterations. Refer to [Measure failover resilience](#measure-failover-resilience) for additional information. + +### Load balancer + +You must deploy a load balancer between Terraform Enterprise and the PostgreSQL cluster on Patroni. Refer to the [requirements for connecting Terraform Enterprise to a PostgreSQL cluster](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres-cluster#requirements) for additional information. + +The scenario described in these instructions uses an HAProxy. For a production deployment of Patroni on Kubernetes, we recommend using the Kubernetes load balancer service. You can configure the load balancer service in the Patroni cluster manifest. Refer to the [Patroni documentation](https://postgres-operator.readthedocs.io/en/latest/administrator/#load-balancers-and-allowed-ip-ranges) for details. + +### Terraform Enterprise + +We tested the scenario described in this topic against the following Terraform Enterprise deployment: + +- Release v202409-1 +- `active-active` operational mode +- Deployed to [Google Kubernetes Engine (GKE)](https://cloud.google.com/kubernetes-engine) +- Deployed on three nodes +- The follow environment variables configured: + - [`TFE_DATABASE_HOST` variable](/terraform/enterprise/deploy/reference/configuration#tfe_database_host) set to an HAProxy load balancer + - [`TFE_DATABASE_RECONNECT_ENABLED`](/terraform/enterprise/deploy/reference/configuration#tfe_database_reconnect_enabled) set to `true`. + +### Patroni + +We tested the scenario described in this topic against the following Patroni deployment: + +- Deployed with three nodes +- Served to Terraform Enterprise through an HAProxy load balancer + +## Configure Kubernetes objects + +Create a `values.yaml` file to override the default Postgres operator values. + +### Define cluster resource defaults + +The Postgres operator Helm chart contains default values for all Patroni clusters deployed using the operator. Refer to the [Zalando Postgres operator values](https://github.com/zalando/postgres-operator/blob/master/charts/postgres-operator/values.yaml) for additional information. + +Specify the resources that the Postgres containers should use in the `configPostgresPodResources` field. The following example configures resource requests, such as CPU and memory limits for the Postgres containers in the pods: + +```yaml +configPostgresPodResources + # CPU limits for the postgres containers + default_cpu_limit: "8" + # CPU request value for the postgres containers + default_cpu_request: "4" + # memory limits for the postgres containers + default_memory_limit: 32Gi + # memory request value for the postgres containers + default_memory_request: 16Gi +``` + +### Define cluster behaviors + +Kubernetes allocates resources to the Patroni cluster according to the [values you define in the `configPostgresPodResources` field](#define-cluster-reource-defaults) and starts individual Postgres clusters according to the cluster manifest. The manifest is a custom resource definition (CRD) that defines parameters for each cluster. Refer to the following Postgres operator topics for additional information about the cluster manifest: + +- [Cluster manifest reference documentation](https://postgres-operator.readthedocs.io/en/latest/reference/cluster_manifest/) +- [Zalando Postgres operator repository](https://github.com/zalando/postgres-operator/tree/master/manifests) + +The following example manifest specifies the cluster configuration we tested for this scenario: + +```yaml +apiVersion: "acid.zalan.do/v1" +kind: postgresql +metadata: + name: patroni + namespace: failover +spec: + teamId: "terraform-enterprise" + volume: + size: 10Gi + numberOfInstances: 3 + users: + cluster_admin: # database owner + - superuser + - createdb + user: [] # role for application foo + databases: + db: user # dbname: owner + postgresql: + version: "15" +``` + +### Discovery service + +Define a service that enables the HAProxy to discover the IP addresses of the Patroni pods. The following example uses the Spilo application for discovery. It discovers all Patroni pods and then uses the HAproxy to route to the master: + +```yaml +apiVersion: v1 +kind: Service +metadata: + name: patroni-headless + namespace: failover +spec: + clusterIP: None + selector: + cluster-name: patroni + application: spilo + # spilo-role = "master" + ports: + - port: 5432 + name: postgresql + - port: 8008 + name: api +``` + +### HAProxy + +Define an HAProxy that routes traffic to the primary node by setting the [`/primary` Patroni endpoint](https://patroni.readthedocs.io/en/latest/rest_api.html). + +The HAProxy configuration is crucial to the successful recovery of Terraform Enterprise after a failover. By default, the proxy runs a health check every two seconds, which is too long for many implementations. We recommend configuring HAProxy with an interval of maximum `1s`. + +Refer to [HAProxy documentation](https://www.haproxy.com/documentation/haproxy-configuration-tutorials/service-reliability/health-checks/#change-the-interval) for instructions on how to change the health check interval. + +The following configuration uses the Kubernetes DNS set up in `resolv.conf` and applies server-templates and service names to the HAProxy. It also uses a Kubernetes resolver to resolve the DNS name of the Patroni service. If it is unable to resolve the DNS name, it uses the last known IP address or the `libc` resolver in that order. + +```yaml + global + log stdout format raw local0 + maxconn 2000 + + defaults + log global + mode tcp + option tcplog + timeout connect 5000ms + timeout client 50000ms + timeout server 50000ms + + + resolvers kubernetes + parse-resolv-conf + hold valid 10s + + listen postgres + bind *:5000 + mode tcp + retry-on all-retryable-errors + + option httpchk + http-check send meth HEAD uri /primary + http-check expect status 200 + + default-server inter 1s fall 3 rise 2 on-marked-down shutdown-sessions + + server-template patroni- 1-3 + + patroni-headless.failover.svc.cluster.local:5432 check port 8008 resolvers + kubernetes init-addr last,libc,none +``` + +## Deploy the configurations + +Install the Postgres operator chart and apply the configuration files to deploy Patroni and the HAProxy. Refer to the [Postgres operator documentation](https://postgres-operator.readthedocs.io/en/latest/quickstart/#deployment-options) for instructions on how to deploy. + +## Measure failover resilience + +You can collect recovery time objective (RTO) data to assess the resilience of your HA system. Refer to the following topics for additional information: + +- [PostgreSQL database failover](/terraform/enterprise/deploy/manage/failover) +- [Measure failover resilience](/terraform/enterprise/deploy/configuration/storage/connect-database/failover-resilience) + +In the example scenario, we observed the following outcomes: + +- Recovery times ranging from a minimum RTO of 2m18s to a maximum of 4m56s +- Average RTO of 3m38s across successful failovers. +- Two out of five failovers experienced issues where Terraform Enterprise returned the operation within one minute, but node restarts were needed to resolve continued run failures. + +## Troubleshooting + +You may need to manually address issues after a failover to return to functionality. For example, the Vault process may still be connected to a read-only instance if the affected instance can not process runs. + +Refer to [Unable to write to database after a failover](/terraform/enterprise/deploy/troubleshoot/error-messages#unable-to-write-to-database-after-a-failover) in the Terraform troubleshooting documentation for symptoms and solutions. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/postgres-cluster.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/postgres-cluster.mdx new file mode 100644 index 000000000..15cc2d40c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/postgres-cluster.mdx @@ -0,0 +1,195 @@ +--- +page_title: Connect to a highly-available PostgreSQL cluster +description: + Learn how to configure Terraform Enterprise to connect to an external + PostgreSQL database cluster so that your Terraform Enterprise instances can store + stateful application data in a highly-available database. +--- + +# Connect to a PostgreSQL cluster + +This topic describes how to configure Terraform Enterprise to connect to an +external cluster of PostgreSQL database servers. +You only need to complete this task under the following conditions: + +- You want to operate Terraform Enterprise in `active-active` or `external` mode. Refer to [Configure operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) for additional information. +- You want to connect Terraform Enterprise to a PostgreSQL database cluster. To connect to a single PostgreSQL node, refer to [Connect to an external PostgreSQL database](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres). +- You want to configure Terraform Enterprise to failover to a PostgreSQL database replica node. Refer to [PostgreSQL database failover](/terraform/enterprise/deploy/manage/failover) for additional information. + +Before you connect to a highly-available PostgreSQL cluster, review the [Known issues](#known-issues) section so that you are aware of potential issues. + +## Introduction + +Complete the following steps to configure Terraform Enterprise to store and retrieve the data in an externally-managed PostgreSQL cluster: + +1. Prepare the PostgreSQL server to host the data. Preparation includes creating + a user appropriate permissions and creating the extensions in the database. +1. Specify the connection settings in your deployment configuration. If your + server requires additional connection parameters, you must also specify them + in the configuration. +You may need to take additional action to resolve issues related to a failover event. + +## Requirements + +Before proceeding, verify that you meet the following requirements. + +### Server + +One of the following servers is required: + +- PostgreSQL server, such as Amazon RDS for PostgreSQL, version 13.x, 14.4 + and up, 15.x or 16.x + + Note that PostgreSQL v12 will reach end of life on November 12, 2024. As a + result, Terraform Enterprise will no longer v12 after that date. + +- PostgreSQL-compatible database service, such as Amazon Aurora PostgreSQL. +- Self-managed PostgreSQL-compatible server cluster, such as Patroni PostgreSQL + +### User + +Create a PostgreSQL user with the following permissions on the database: + +- Permissions to create, modify, and read all tables and indices on all schemas + within the database. Database owners commonly have these permissions. +- Permissions to create extensions. If you are unable to create a user with the + `CREATE EXTENSION` privilege, refer to [Create extensions](#create-extensions) + for instructions on creating the necessary extensions. + +### Load balancer + +Terraform Enterprise requires a single URL to configure the +PostgreSQL backend. In a cluster, the URL should point to the load +balancer, which handles the distribution of connections to the appropriate +database nodes. + +### Runtime + +You can only connect to a database cluster when deploying Terraform Enterprise to the following runtimes: + + - Nomad + - Kubernetes + - OpenShift + - Podman + - Docker + +For information about connecting to an external database for Replicated deployments, refer to [PostgreSQL Requirements for Terraform Enterprise on Replicated](/terraform/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements). + +## Create extensions + +Create extensions for the `rails`, `vault`, `registry`, and `task_worker` +PostgreSQL schemas. The database server automatically creates these schemas if +they do not already exist. + +Run the following commands on the PostgreSQL server to create the extensions: + +```shell-session +CREATE EXTENSION IF NOT EXISTS "hstore" WITH SCHEMA "rails"; +CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA "rails"; +CREATE EXTENSION IF NOT EXISTS "citext" WITH SCHEMA "registry"; +``` + +## Specify PostgreSQL connection settings + +Add the following settings to your Terraform Enterprise configuration: + +- Set the `TFE_DATABASE_HOST` variable to the location of your PostgreSQL + server. Format the location as `HOST[:PORT]`, for example `db.example.com` or + `db.example.com:5432`. Multi host connection strings are not supported. +- Set the `TFE_DATABASE_NAME` variable to the name of the database you want to + store the data in. +- Set the `TFE_DATABASE_USER` variable to the user name you want to use to + access the database. +- Set the `TFE_DATABASE_PASSWORD` variable to the password for the user. +- Set the `TFE_DATABASE_RECONNECT_ENABLED` variable to `true`. + +Refer to +[Database settings](/terraform/enterprise/deploy/reference/configuration#database-settings) +in the configuration reference for addtional information. + +### Additional connection parameters + +Add the `TFE_DATABASE_PARAMETERS` variable to your configuration and specify any +additional connection parameters necessary to connect to the server. + +#### `sslmode` + +When providing extra keyword parameters for the database connection, the +`sslmode` parameter only allows the following values: + +- `require` +- `verify-full` +- `verify-ca` +- `disable` + +When operating Terraform Enterprise in `external` mode, the `sslmode` parameter +is set to `require` by default. When operating Terraform Enterprise in `disk` +mode, the `sslmode` parameter is set to `disable` by default. + +Terraform Enterprise provides a certificates file at +`/etc/ssl/private/terraform-enterprise/bundle.pem`, which is required by the +`verify-full` and `verify-ca` modes. + +Refer to the +[PostgreSQL library documentation](https://www.postgresql.org/docs/12/libpq-ssl.html) +for additional information about using `sslmode`. + +#### Client certificate configuration + +You can configure Terraform Enterprise to use PostgreSQL client certificates to authenticate with the server. When providing client certificates, the database password is not required and the `sslmode` parameter is set to `verify-full`. +Terraform Enterprise requires PostgreSQL server certificate to use Subject Alternative Names (SANs) rather than relying solely on the legacy Common Name field. + +Configure the following settings to use PostgreSQL client certificates: +- Set the `TFE_DATABASE_USE_MTLS` variable to `true`. +- Specify the path to the CA certificate file in the `TFE_DATABASE_CA_CERT_FILE` variable. +- Specify the path to the client certificate file in the `TFE_DATABASE_CLIENT_CERT_FILE` variable. +- Specify the path to the client key in the `TFE_DATABASE_CLIENT_KEY_FILE` variable. + + +## Post-failover tasks + +In the event that Terraform Enterprise fails over to the secondary database node, you may need to perform the following actions. + +### Restart failed runs + +Runs can enter a non-terminal state, such as `pending`, and fail to progress when a failover occurs. This is because Terraform Enterprise may be connected to read-only instances of the database. You can perform one of the following tasks to resolve the non-terminal state: + +- Cancel the run: You can cancel `plan` operations that are unfinished. A `plan` operation in the `pending` state blocks the workspace until it is canceled. You can cancel the run on the run’s page or in the + organization settings. Refer to [Runs]](/terraform/cloud-docs/users-teams-organizations/organizations#runs) in the organization settings documentation for additional information. +- Start a new run: If the operation is finished, but the runs state is still non-terminal, then you cannot cancel the run. Runs in this state do not block the workspace. + +### Restart Terraform Enterprise + +If Terraform Enterprise does not return to full operational +capacity or fully go down after a failover, we recommend +manually restarting the faulty Terraform Enterprise nodes. Restarting +forces Terraform Enterprise to reconnect to the correct PostgreSQL node. + +### Restart the Vault process + +A failover may affect Vault when Terraform Enterprise is connected to a Patroni cluster with `HAProxy` configured to check server status at an interval of one second or longer. +If a failover occurs and Vault is still connected to the read-only node, then Vault can seal. + +A single node can seal Vault and render it non-functional. Requests that Terraform Enterprise routes to the affected instance will fail. Some runs will also fail when Terraform Enterprise is in `active-active` mode and deployed with multiple nodes. + +Restart the Vault process or restart the node to resolve this issue. + +## Known Issues + +Interruptions to the database connection affect ongoing processes and lead to +issues in Terraform Enterprise. These issues are related to network timing and do not occur reliably. +They are also more likely to occur if a failover occurs under high +load. + +Read replicas are not supported. Terraform Enterprise does not distinguish between read and write endpoints. +You must route all database interactions, including reads and writes, through the load balancer to the primary node. +This ensures that Terraform Enterprise always interacts with the correct node. + +Multi-primary topology is not supported. Terraform Enterprise is designed to +operate with a strongly consistent data model. Therefore, we do not recommend using a multi-writer +cluster configuration. In multi-writer setups, data written +to one primary node may not be immediately available to others, leading to +potential data inconsistencies. To maintain data integrity and consistency, +all write operations should be directed to a single primary node. This +guarantees that data is immediately consistent and available across the +system. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/postgres.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/postgres.mdx new file mode 100644 index 000000000..8f6ccdbe5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-database/postgres.mdx @@ -0,0 +1,132 @@ +--- +page_title: Configure external PostgreSQL connection +description: + Learn how to configure Terraform Enterprise to connect to an external + PostgreSQL database so that your Terraform Enterprise instances can store + stateful application data. +--- + +# Connect to an external PostgreSQL database + +This topic describes how to configure Terraform Enterprise to connect to an +external PostgreSQL database. You only need to complete this task under the following conditions: + +- You want to operate Terraform Enterprise in `active-active` or `external` mode, which instructs +Terraform Enterprise to store and retrieve data in an externally-managed database. Refer to +[Configure operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) +for additional information. +- You want to connect to a single PostgreSQL node. To connect Terraform Enterprise to an HA PostgreSQL database cluster, refer to [Connect to a highly-available PostgreSQL cluster](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres-cluster). + +## Overview + +Complete the following steps to connect Terraform Enterprise to a single PostgreSQL node: + +1. Create extensions for the database schemas. +1. Specify the connection settings in your deployment configuration. If your + server requires additional connection parameters, you must also specify them + in the configuration. + +## Requirements + +Before proceeding, verify that you meet the following requirements. + +### Server + +One of the following servers is required: + +- PostgreSQL server, such as Amazon RDS for PostgreSQL, version 13.x, 14.4 + and up, 15.x or 16.x + + + Note that PostgreSQL v12 will reach end of life on November 12, 2024. As a + result, Terraform Enterprise will no longer v12 after that date. + + +- PostgreSQL-compatible server, such as Amazon Aurora PostgreSQL. + +### User + +Create a PostgreSQL user with the following permissions on the database: + +- Permissions to create, modify, and read all tables and indices on all schemas + within the database. Database owners commonly have these permissions. +- Permissions to create extensions. If you are unable to create a user with the + `CREATE EXTENSION` privilege, refer to [Create extensions](#create-extensions) + for instructions on creating the necessary extensions. +- The `rails`, `vault`, `registry`, `task_worker`, and `terraform_enterprise` PostgreSQL schemas are required. We recommend allowing the PostgreSQL user to create schemas so that Terraform Enterprise can create them automatically. If the PostgreSQL user does not have permissions to create schemas, they must be created prior to installation. + + + Note that if you are changing the database user, ensure the new user is the owner of all + enum types in the database to avoid failures for any potential migrations that + attempt to `ALTER TYPE`. + + +## Create extensions + +Create extensions for the `rails`, `vault`, `registry`, and `task_worker` +PostgreSQL schemas. The database server automatically creates these schemas if +they do not already exist. + +Run the following commands on the PostgreSQL server to create the extensions: + +```shell-session +CREATE EXTENSION IF NOT EXISTS "hstore" WITH SCHEMA "rails"; +CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA "rails"; +CREATE EXTENSION IF NOT EXISTS "citext" WITH SCHEMA "registry"; +``` + +## Specify PostgreSQL connection settings + +Add the following settings to your Terraform Enterprise configuration: + +- Set the `TFE_DATABASE_HOST` variable to the location of your PostgreSQL + server. Format the location as `HOST[:PORT]`, for example `db.example.com` or + `db.example.com:5432`. Multi host connection strings are not supported. +- Set the `TFE_DATABASE_NAME` variable to the name of the database you want to + store the data in. +- Set the `TFE_DATABASE_USER` variable to the user name you want to use to + access the database. +- Set the `TFE_DATABASE_PASSWORD` variable to the password for the user. + +Refer to +[Database settings](/terraform/enterprise/deploy/reference/configuration#database-settings) +in the configuration reference for additional information. + +### Additional connection parameters + +Add the `TFE_DATABASE_PARAMETERS` variable to your configuration and specify any +additional connection parameters necessary to connect to the server. + +#### `sslmode` + +When providing extra keyword parameters for the database connection, the +`sslmode` parameter only allows the following values: + +- `require` +- `verify-full` +- `verify-ca` +- `disable` + +When operating Terraform Enterprise in `external` mode, the `sslmode` parameter +is set to `require` by default. When operating Terraform Enterprise in `disk` +mode, the `sslmode` parameter is set to `disable` by default. + +Terraform Enterprise provides a certificates file at +`/etc/ssl/private/terraform-enterprise/bundle.pem`, which is required by the +`verify-full` and `verify-ca` modes. + +Refer to the +[PostgreSQL library documentation](https://www.postgresql.org/docs/12/libpq-ssl.html) +for additional information about using `sslmode`. + +#### Client certificate configuration + +You can configure Terraform Enterprise to use PostgreSQL client certificates to authenticate with the server. When providing client certificates, the database password is not required and the `sslmode` parameter is set to `verify-full`. +Terraform Enterprise requires PostgreSQL server certificate to use Subject Alternative Names (SANs) rather than relying solely on the legacy Common Name field. + +Configure the following settings to use PostgreSQL client certificates: + +- Set the `TFE_DATABASE_USE_MTLS` variable to `true`. +- Specify the path to the CA certificate file in the `TFE_DATABASE_CA_CERT_FILE` variable. +- Specify the path to the client certificate file in the `TFE_DATABASE_CLIENT_CERT_FILE` variable. +- Specify the path to the client key in the `TFE_DATABASE_CLIENT_KEY_FILE` variable. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-object.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-object.mdx new file mode 100644 index 000000000..c847117e9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-object.mdx @@ -0,0 +1,92 @@ +--- +page_title: Configure data object storage +description: Learn how to configure the Terraform Enterprise connection to an S3-compatible data storage service. +--- + +# Configure data object storage + +This topic describes how to configure Terraform Enterprise to connect to an external data object service. This step is only required when Terraform Enterprise is configured to operate in `external` or `active-active` mode. Refer to [Data storage settings overview](/terraform/enterprise/deploy/configuration/storage) for additional information. + +## Introduction + +Terraform Enterprise stores artifacts that it produces during operation, such as state files, plan files, run logs, and configuration versions, in an S3-compatible storage service. Complete the following steps to configure the connection to an externally-managed data object storage system: + +1. In your object storage service, create a dedicated user that has permissions to access and manage the storage resources. Refer to the documentation for your object storage service for instructions. +1. Configure the connection settings in the Terraform Enterprise deployment configuration. + +## Requirements + +- Any S3-compatible object storage service, GCP Cloud Storage, or Azure blob storage. +- A bucket on the object storage platform for Terraform Enterprise to use. Your infrastructure provider may require the bucket to be in the same region as the Terraform Enterprise instance. +- Disable any lifecycle rules that would delete, archive, or transition objects in the object storage container. Terraform Enterprise expects to manage all data in the object storage service, so any lifecycle operations may result in unexpected data inconsistencies. + +## Configure connection settings + +1. Add the `TFE_OBJECT_STORAGE_TYPE` variable to the configuration and set one of the following storage types: + + - `s3`: Stores objects in an AWS S3 bucket. + - `azure`: Stores objects in an Azure blob. + - `google`: Stores objects in Google's cloud platform. + + Refer to the [`TFE_OBJECT_STORAGE_TYPE` reference documentation](/terraform/enterprise/deploy/reference/configuration#tfe_object_storage_type) for additional information. + +1. Configure the connection settings for the object type. + + + + + + ```yaml + ... + env: + variables: + TFE_OBJECT_STORAGE_TYPE: s3 + TFE_OBJECT_STORAGE_S3_BUCKET: + TFE_OBJECT_STORAGE_S3_REGION: + TFE_OBJECT_STORAGE_S3_USE_INSTANCE_PROFILE: + secrets: + TFE_OBJECT_STORAGE_S3_ACCESS_KEY_ID: + TFE_OBJECT_STORAGE_S3_SECRET_ACCESS_KEY: '' + ``` + + Refer to the [S3-compatible storage configuration reference](/terraform/enterprise/deploy/reference/configuration#s3-compatible-storage) for information about all available settings. + + + + + ```yaml + ... + env: + variables: + TFE_OBJECT_STORAGE_TYPE: azure + TFE_OBJECT_STORAGE_AZURE_ACCOUNT_NAME: + TFE_OBJECT_STORAGE_AZURE_CONTAINER: + TFE_OBJECT_STORAGE_AZURE_ENDPOINT: + secrets: + TFE_OBJECT_STORAGE_AZURE_ACCOUNT_KEY: '' + ``` + + Refer to the [Azure blob storage configuration reference](/terraform/enterprise/deploy/reference/configuration#azure-blob-storage-settings) for information about all available settings. + + + + + + ```yaml + ... + env: + variables: + TFE_OBJECT_STORAGE_TYPE: google + TFE_OBJECT_STORAGE_GOOGLE_BUCKET: + TFE_OBJECT_STORAGE_GOOGLE_PROJECT: + secrets: + TFE_OBJECT_STORAGE_GOOGLE_CREDENTIALS: + ``` + + Refer to the [Google cloud platform storage configuration reference](/terraform/enterprise/deploy/reference/configuration#google-cloud-platform-storage) for information about all available settings. + + + + + + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-redis.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-redis.mdx new file mode 100644 index 000000000..7399bec47 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-redis.mdx @@ -0,0 +1,137 @@ +--- +page_title: Configure Redis data store connection +description: Learn how to configure the connection to an externally-managed Redis data store when operating Terraform Enterprise in `active-active` mode. +--- + +# Configure Redis data store connection + +This topic describes how to configure Terraform Enterprise connection to an externally-managed Redis data store. This step is only necessary when operating Terraform Enterprise in an `active-active` operational mode. To allow Terraform Enterprise to self-manage Redis, configure Terraform Enterprise to run in `disk` operational mode on a compatible runtime platform, such as `Docker` or `Podman`. Refer to [Configure operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) for additional information. + +## Introduction + +Terraform Enterprise uses Redis to cache and manage the background job scheduler queue across available hosts. Redis server configuration is required for any runtime platform configured to operate in `active-active` mode. You can operate Terraform Enterprise in `active-active` mode on the following runtime platforms: + +- Kubernetes +- OpenShift +- Nomad + +## Requirements + +Before proceeding, ensure that your environment meets the following requirements: + +- Either a cloud-managed or self-hosted Redis server is required. +- Terraform Enterprise supports Redis server 6 and 7. We recommend using version 7. +- Redis Cluster is not supported. + +Example Redis servers: + +- [Amazon ElastiCache for Redis](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/WhatIs.html) +- [Official Redis Docker container](https://hub.docker.com/_/redis) + +### Secure Redis servers + +For secure Redis servers, create a user with read and write access. + +### TLS requirements + +Verify that you meet the following requirements when TLS is required to connect to the Redis server: + +- A valid TLS certificate and key are configured on the Redis server. +- The Redis server is properly configured to accept TLS connections. +- The Terraform Enterprise client is configured to use TLS when connecting to Redis. Refer to the [TLS configuration reference](/terraform/enterprise/deploy/reference/configuration#tls-settings) for additional information. + +For detailed information on configuring TLS for Redis, refer to the [official Redis documentation on encryption](https://redis.io/docs/latest/operate/oss_and_stack/management/security/encryption/). + +## Specify Redis connection settings +You can connect to either a Redis standalone instance, or a Redis Enterprise instance in non-clustering mode. +The redis authentication can be configured for all Redis configurations. + +### Authentication +You can configure Redis to use the default user and require a password. +```redis.conf +requirepass +``` + +In that case you would configure Terraform Enterprise +``` + TFE_REDIS_USE_AUTH: true + TFE_REDIS_PASSWORD: +``` + +You can also configure Redis with [ACL](https://redis.io/docs/latest/operate/oss_and_stack/management/security/acl/) since Redis 6. +```redis.conf +user on > ~* &* +@all +``` + + +If you use a Redis user, it is crucial that they have sufficient permissions. +In our testing, we used the following permissions `~* &* +@all`. + + +In that case, you would configure Terraform Enterprise with the following environment variables: +``` + TFE_REDIS_USE_AUTH: true + TFE_REDIS_USER: + TFE_REDIS_PASSWORD: +``` + +### Redis Standalone + +Add the following settings to your Terraform Enterprise configuration: + +- Set the `TFE_REDIS_HOST` variable to the location of your Redis server. Format the location as `HOST[:PORT]`, for example `redis.example.com` or `redis.example.com:6379`. +- Set the `TFE_REDIS_USE_TLS` variable to `true` if your Redis server requires TLS. Defaults to `false`. +- Set the `TFE_REDIS_USE_AUTH` variable to `true` if your Redis server requires authentication. +- Set the `TFE_REDIS_PASSWORD` variable to the password for the user. + +Refer to [Redis settings](/terraform/enterprise/deploy/reference/configuration#redis-settings) in the configuration reference for additional information. + +### Redis Enterprise + +Terraform Enterprise can use Redis Enterprise in non-clustering mode as it's Redis service. To do so, you must +configure a separate Redis endpoint for `sidekiq`, an internal component. This +requirement exists because `sidekiq` and other components that rely on Redis must be kept +separate. In normal operation, this is accomplishing using numbered Redis databases, which +are not supported in Redis Enterprise. By defining a separate endpoint for `sidekiq` usage, +Terraform Enterprise will use the default database `0` while still maintaining separation between `sidekiq` and +other components. + +Add the following settings to your Terraform Enterprise configuration: + +- Set the `TFE_REDIS_SIDEKIQ_HOST` variable to the location of your Redis server. Format the location as `HOST[:PORT]`, for example `redis.example.com` or `redis.example.com:6379`. +- Set the `TFE_REDIS_SIDEKIQ_USE_TLS` variable to `true` if your Redis server requires TLS. Defaults to `false`. +- Set the `TFE_REDIS_SIDEKIQ_USE_AUTH` variable to `true` if your Redis server requires authentication. +- Set the `TFE_REDIS_SIDEKIQ_PASSWORD` variable to the password for the user. + +### Redis Sentinel + + +Redis Sentinel is not supported for Terraform Enterprise on Replicated. + + +Terraform Enterprise can use Redis Sentinel as a highly available Redis service. Read more about highly available Redis +services with Redis Sentinel in the [Redis Sentinel documentation](https://redis.io/docs/latest/operate/oss_and_stack/management/sentinel/). + +Terraform Enterprise queries Redis Sentinel instances to determine which Redis instance is active master. Terraform Enterprise performs queries while Redis replicates transaction data to other replicas. + +You cannot use Redis Sentinel and [Redis Enterprise](#redis-enterprise) in the same Terraform Enterprise deployment. + +Use the following settings in your Terraform Enterprise configuration to use Redis Sentinel. Refer to the [Configuration reference](/terraform/enterprise/deploy/reference/configuration) for information about all configuration settings: +- Set the `TFE_REDIS_SENTINEL_ENABLED` variable to `true` in order to use Redis Sentinel. +- Set the `TFE_REDIS_SENTINEL_HOSTS` variable to a comma separated list of the locations of Redis Sentinel hosts. Format the locations as `HOST[:PORT],HOST[:PORT],...`, for example `redis-sentinel-1.example.com,redis-sentinel-2.example.com:26379`. +- Set the `TFE_REDIS_SENTINEL_LEADER_NAME` variable to the name of a service, such as `main`. Terraform Enterprise queries Redis Sentinel for the service to discover an active Redis host. This name should return a valid Redis service location when issuing a `SENTINEL GET-MASTER-ADDR-BY-NAME ` command to Redis Sentinel. +- Set the `TFE_REDIS_SENTINEL_USERNAME` variable to the username for the Redis Sentinel user. This setting is optional and is used to authenticate with Redis Sentinel instances. +- Set the `TFE_REDIS_SENTINEL_PASSWORD` variable to the password for the Redis Sentinel user. This setting is optional and is used to authenticate with Redis Sentinel instances. +- Set the `TFE_REDIS_USER` variable to the username for the Redis user. This setting is optional and is used to authenticate with Redis instances. +- Set the `TFE_REDIS_PASSWORD` variable to the password for the Redis Sentinel user. This setting is optional and is used to authenticate with Redis instances. + +### Failover benchmarks for Redis Sentinel + +We tested failover performance for a Terraform Enterprise deployment connected to a Redis Sentinel cluster. The cluster consisted of three Sentinel instances and three Redis instances. We observed the following outcomes: + +- Failover events that were manually triggered through Redis Sentinel showed no observable down time in Terraform Enterprise. This suggests a high degree of safety in planned maintenance operations. +- The recovery time objective (RTO) during manually triggered failover events ranged from 47s to 2m10s. +- The average RTO was 1m16s across successful failovers. +- One out of 16 failovers experienced issues that required Terraform Enterprise node restarts to resolve continued run failures. + +Terraform Enterprise performance when using Redis Sentinel depends on how Redis Sentinel is configured to monitor and recover from Redis instance problems. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-vault.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-vault.mdx new file mode 100644 index 000000000..0c2072e40 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/connect-vault.mdx @@ -0,0 +1,34 @@ +--- +page_title: Connect to an external Vault server +description: Using an external Vault server can help satisfy data encryption and auditing compliance requirements. Learn how to connect external Vault servers. +--- + +# Connect to an external Vault server + +This topic describes how to configure Terraform Enterprise to connect to an external Vault server. + +## Introduction + +Using an external Vault server may be necessary if your organization is subject to specific data encryption and auditing compliance requirements. The internal Vault server shipped with Terraform Enterprise that is suitable for most cases. + +You should only use an external Vault server if you have experience managing Vault in production. You are responsible for all Vault server operations, including sealing, unsealing, and replication. + +Do not configure multiple Terraform Enterprise instances to use the same namespace on an external Vault server unless they are part of a Terraform Enterprise deployment in `active-active` mode because doing so will result in data loss. Refer to [Configure the operational mode](/terraform/enterprise/deploy/configuration/configure-mode) for additional information about operational modes. + +Complete the following steps to connect to Terraform Enterprise to an external Vault server: + +1. Configure the Vault server: You must enable settings and create policies that allow Terraform Enterprise to connect to Vault. +1. Specify the Vault settings in the Terraform Enterprise configuration: Refer to the [deployment overview](/terraform/enterprise/deploy) for additional information about configuring Terraform Enterprise. + +## Requirements + +You must configure the settings for your external Vault connection before the initial Terraform Enterprise installation. You can only change the configuration after installing Terraform Enterprise using the [backup and restore API](/terraform/enterprise/deploy/manage/backup-restore). + +## Specify Vault settings + +Add the following settings to your Terraform Enterprise configuration: + +- Set `TFE_VAULT_USE_EXTERNAL` to `true` +- Set `TFE_VAULT_ADDRESS` to the address of your Vault server. +- Set `TFE_VAULT_ROLE_ID` to the Vault secret ID. +- Configure any additional settings specific to your implementation. Refer to the [Vault settings reference](/terraform/enterprise/deploy/reference/configuration#vault-settings) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/index.mdx new file mode 100644 index 000000000..561d8de43 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/configuration/storage/index.mdx @@ -0,0 +1,50 @@ +--- +page_title: Data storage settings overview +description: Learn about Terraform Enterprise data storage and management configurations, including operational modes, PostgreSQL database connection settings, Redis connection settings, and external Vault server settings +--- + +# Data storage settings overview + +This topic provides an overview of data storage and management configurations for Terraform Enterprise. + +## Overview + +You can configure Terraform Enterprise to run as a self-contained application that manages the associated data storage or as an integrated installation that connects to externally-managed data storage systems. Complete the following steps: + +1. Decide on a Terraform Enterprise architecture and determine which data storage systems you must deploy and maintain externally. +1. Determine which operational mode aligns with how you want to manage data storage for your organization. +1. Deploy the external data storage systems and connect to them in your deployment configuration file. + +## Data storage systems + +Terraform Enterprise uses the following types of storage systems to store data associated with your deployment: + +- **PostgreSQL database**: Terraform Enterprise stores stateful application data, workspace settings, organization settings, run information, and user information in a PostgreSQL database. + + Note that PostgreSQL v12 will reach end of life on November 12, 2024. As a + result, Terraform Enterprise will no longer v12 after that date. + + +- **S3-compatible storage service**: Terraform Enterprise stores artifacts that it produces during operation, such as state files, plan files, run logs, and configuration versions, in an S3-compatible storage service. +- **Vault**: Terraform Enterprise stores encryption keys in Vault that encrypt and decrypt data objects. By default, Terraform Enterprise stores the keys in the internal Vault server, but if your organization has specific data encryption and auditing requirements, you can connect to an external Vault server to manage the data instead. +- **Redis data store**: You can configure Terraform to cache application data in a Redis data store. This system is optional but recommended to improve performance. + +### Operational modes + +You must choose an operational mode before you install and deploy Terraform Enterprise. The operation mode determines where Terraform Enterprise stores its data. Where you store Terraform Enterprise data can impact your backup and restore procedures, disaster recovery procedures, and scaling options. + +The following table provides an overview of how the operational mode directs Terraform Enterprise to store data. Refer to [Configure the operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) for instructions: + +| Mode | PostgreSQL | Object storage | Vault | Redis | +| --- | --- | --- | --- | --- | +| `external` | External. You manage outside of Terraform Enterprise. | External. You manage outside of Terraform Enterprise. | PostgreSQL database unless you specify an external Vault server. | Docker volume on the instance. | +| `active-active` | External. You manage outside of Terraform Enterprise. | External. You manage outside of Terraform Enterprise. | PostgreSQL database unless you specify an external Vault server. | External. You manage outside of Terraform Enterprise. | +| `disk` | Internal directory on the instance. You manage persistent storage. | Internal directory on the instance. You manage persistent storage. | PostgreSQL database unless you specify an external Vault server. | Docker volume on the instance. | + + + + + + + + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/custom-image.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/custom-image.mdx new file mode 100644 index 000000000..63505ab04 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/custom-image.mdx @@ -0,0 +1,47 @@ +--- +page_title: Build and deploy a custom worker image +description: >- + Terraform Enterprise requires a custom worker image to add custom tools and logic to the run enviornment. Learn how to build and run a custom worker image. +--- + +# Build and deploy a custom worker image + +This topic describes how to build and deploy a custom worker image so that you can add custom tools or logic to your Terraform run environments. + +## Introduction + +Terraform Enterprise performs Terraform runs in ephemeral containers using a built-in `tfc-agent` container image by default. To add custom tools or logic to your Terraform run environment, you must build a custom image and configure Terraform Enterprise to use it. + +## Requirements + +The base image must be `hashicorp/tfc-agent:1.6.0` or later. + +## Dockerfile + +Build your custom image using the below `Dockerfile`. + +```Dockerfile +FROM hashicorp/tfc-agent:latest + +# Switch the to root user in order to perform privileged actions such as +# installing software. +USER root + +# Install sudo. The container runs as a non-root user, but people may rely on +# the ability to apt-get install things. +RUN apt-get -y install sudo + +# Permit tfc-agent to use sudo apt-get commands. +RUN echo 'tfc-agent ALL=NOPASSWD: /usr/bin/apt-get , /usr/bin/apt' >> /etc/sudoers.d/50-tfc-agent + +# Switch back to the tfc-agent user as needed by Terraform agents. +USER tfc-agent +``` + +## Agent + +Update the environment variable `TFE_RUN_PIPELINE_IMAGE` in your yaml file: + +```yaml +TFE_RUN_PIPELINE_IMAGE: registry.example.com/example/tfc-agent:custom-tag +``` \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/docker/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/docker/index.mdx new file mode 100644 index 000000000..739bfabf6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/docker/index.mdx @@ -0,0 +1,341 @@ +--- +page_title: Deploy Terraform Enterprise to Docker overview +description: Learn how to deploy Terraform Enterprise to Docker using Docker Compose. +--- + +# Deploy Terraform Enterprise to Docker + +This topic describes how to deploy Terraform Enterprise to Docker using Docker Compose. You can use another installation method, but we recommend Docker Compose because it simplifies managing the necessary Docker volumes and container configuration. + +## Overview + +Complete the following steps to install Terraform Enterprise: + +1. Complete the prerequisites +1. Set up the installation folders and files +1. Download and install the Docker image +1. Apply the deployment installation + +Complete post installation tasks, such creating the initial admin user account and configuring service management controls. + + +## Prerequisites + +Complete the following tasks before attempting to install Terraform Enterprise. + +### Prepare the deployment environment + +Provide a DNS hostname for Terraform Enterprise and the associated TLS certificate. Additionally, you must configure your network so that your host can receive and send traffic. Refer to [Prepare the host environment](/terraform/enterprise/deploy/prepare-host) for details about preparing the host environment. + +### Deploy storage systems for `active` and `external` mode + +If you intend to operate Terraform Enterprise in `active` or `external` mode, deploy the database and other storage devices so that Terraform can connect to them when the application starts. Refer to [Data storage settings overview](/terraform/enterprise/deploy/configuration/storage) for additional information. + +### Create the deployment configuration + +Create a deployment configuration file and specify settings for the operational mode, license, TLS certificates, and network configuration. Add any additional configurations necessary for your environment. Refer to [Configuration file overview](/terraform/enterprise/deploy/configuration/) for additional information. + + +## Set up installation folders and files + +1. Connect to the host instance. +1. Create a dedicated directory for the Terraform Enterprise installation files. +1. Navigate to the installation directory. +1. Create a `certs` directory. +1. Place your TLS certificate (`cert.pem`), TLS private key (`key.pem`), and CA certificates bundle (`bundle.pem`) inside inside the`certs` directory. If you do not have a CA certificates bundle, place your TLS certificate (`cert.pem`) inside `bundle.pem` instead. +1. Place your deployment configuration file into the Terraform Enterprise installation directory. Refer to [Example deployment configurations](#example-deployment-configurations) for pre-formatted configurations that you can copy and modify. Refer to the [configuration reference](/terraform/enterprise/deploy/reference/configuration) for information about all deployment configuration settings. + +## Download and install the image + +1. Log in to the Terraform Enterprise container image registry, using `terraform` + as the username, and your Hashicorp Terraform Enterprise license as the password: + + ```shell-session + $ echo "" | docker login --username terraform images.releases.hashicorp.com --password-stdin + ``` + +1. Pull the Terraform Enterprise image from the registry. + + ```shell-session + $ docker pull images.releases.hashicorp.com/hashicorp/terraform-enterprise: + ``` + +## Apply the deployment configuration + +1. Spin up your Terraform Enterprise container by running: + + ```shell-session + $ docker compose up --detach + ``` + +1. In a separate terminal session you can monitor the logs by running the following command: + + ```shell-session + $ docker compose logs --follow + ``` + +1. Monitor the health of the application until it starts reporting healthy with the following command: + + ```shell-session + $ docker compose exec tfe tfe-health-check-status + ``` + +1. If you are operating Terraform in `active-active` mode, repeat the steps for each node in the installation. + + +## Post installation tasks + +Complete the following tasks after the initial installation. + +### Review startup checks + +When you start Terraform Enterprise, several startup checks also run to prevent errors related to invalid configurations or certificates, as well as other issues that could prevent the application from running successfully or safely. Refer to the [startup checks reference](/terraform/enterprise/deploy/reference/startup-checks) for additional information. + +### Create the initial admin user + +[Provision your first administrative user](/terraform/enterprise/deploy/initial-admin-user) and start using Terraform Enterprise. + +### Manage Docker containers + +We recommend using Docker's native lifecycle management to automatically restart Terraform Enterprise containers that fail due to transient network or infrastructure issues. You can manage Docker container lifecycles using Docker's restart policy. Refer to the [Docker documentation](https://docs.docker.com/config/containers/start-containers-automatically/#use-a-restart-policy) for details. + +### Manage the Docker service + +You can use `systemd` to automatically run `docker compose` when the system starts up. Managing the Docker Compose lifecycle is outside the scope of these instructions, but we provide the following example for managing Docker Compose on your Linux host for your convenience. + +Store the following configuration as `/etc/systemd/system/terraform-enterprise.service`: + +```ini +[Unit] +Description=Terraform Enterprise Service +Requires=docker.service +After=docker.service network.target + +[Service] +Type=oneshot +RemainAfterExit=yes +WorkingDirectory=/etc/terraform-enterprise +ExecStart=/usr/local/bin/docker compose up -d +ExecStop=/usr/local/bin/docker compose down +TimeoutStartSec=0 + +[Install] +WantedBy=multi-user.target +``` + +Run the following command to enable the service: + +```shell-session +$ systemctl enable --now terraform-enterprise +``` + +### Route requests to Terraform Enterprise public hostname + +You can direct requests sent to Terraform Enterprise's fully qualified domain name to the instance's internal IP address. This is useful for cloud environments where HTTP clients running on instances behind a load balancer cannot send requests to the public hostname of that load balancer. + +Add the `TFE_RUN_PIPELINE_DOCKER_EXTRA_HOSTS` variable to your deployment configuration file and specify a comma-separated list of additional hosts to send requests to. Format each item in the list as `HOST:IP`. The IP must be a routable address for the instance where Terraform Enterprise is running. + +The following example sends requests to the fully-qualified domain name ``: + +```yaml +name: terraform-enterprise +services: + tfe: + image: images.releases.hashicorp.com/hashicorp/terraform-enterprise: + environment: + TFE_HOSTNAME: "terraform.example.com" + TFE_RUN_PIPELINE_DOCKER_EXTRA_HOSTS: "terraform.example.com:" +``` + +This configuration injects `/etc/hosts` entries into the ephemeral Docker containers used to launch the underlying `terraform` binary. Refer to the [`TFE_RUN_PIPELINE_DOCKER_EXTRA_HOSTS` reference](/terraform/enterprise/deploy/reference/configuration#tfe_run_pipeline_docker_extra_hosts) for additional information. + +## Example deployment configurations + +You can copy one of the following example configurations and modify the values to per your environment. Refer to [Configuration Reference](/terraform/enterprise/deploy/reference/configuration) +for a list of all configuration options. + +Refer to the [Docker Compose documentation](https://docs.docker.com/compose/) +for details on installing, configuring, and running Docker Compose. + +### Example `disk` mode configuration + +The following compose configuration deploys Terraform Enterprise in `disk` mode using a bind +mount to make the disk path used for Terraform Enterprise data storage available. The path you specify as the source of the bind mount must exist on the instance running Terraform Enterprise. This path must be backed by durable +storage as provided by your cloud provider, such as Elastic Block Storage for AWS. + +```yaml +# Caution: $ is a reserved character in docker compose files for variable interpolation and can be escaped by using $$. +# https://docs.docker.com/compose/how-tos/environment-variables/variable-interpolation/ +--- +name: terraform-enterprise +services: + tfe: + image: images.releases.hashicorp.com/hashicorp/terraform-enterprise: + environment: + TFE_LICENSE: "" + TFE_HOSTNAME: "" + TFE_ENCRYPTION_PASSWORD: '' + TFE_OPERATIONAL_MODE: "disk" + TFE_DISK_CACHE_VOLUME_NAME: "${COMPOSE_PROJECT_NAME}_terraform-enterprise-cache" + TFE_TLS_CERT_FILE: "/etc/ssl/private/terraform-enterprise/cert.pem" + TFE_TLS_KEY_FILE: "/etc/ssl/private/terraform-enterprise/key.pem" + TFE_TLS_CA_BUNDLE_FILE: "/etc/ssl/private/terraform-enterprise/bundle.pem" + TFE_IACT_SUBNETS: "" + cap_add: + - IPC_LOCK + read_only: true + tmpfs: + - /tmp:mode=01777 + - /run + - /var/log/terraform-enterprise + ports: + - "80:80" + - "443:443" + volumes: + - type: bind + source: /var/run/docker.sock + target: /run/docker.sock + - type: bind + source: ./certs + target: /etc/ssl/private/terraform-enterprise + - type: bind + source: + target: /var/lib/terraform-enterprise + - type: volume + source: terraform-enterprise-cache + target: /var/cache/tfe-task-worker/terraform +volumes: + terraform-enterprise-cache: +``` + +### Example `external` mode configuration + +The following compose configuration deploys Terraform Enterprise in `external` mode and expects to connect to an external PostgreSQL server and an external S3-compatible object storage server. + +```yaml +# Caution: $ is a reserved character in docker compose files for variable interpolation and can be escaped by using $$. +# https://docs.docker.com/compose/how-tos/environment-variables/variable-interpolation/ +--- +name: terraform-enterprise +services: + tfe: + image: images.releases.hashicorp.com/hashicorp/terraform-enterprise: + environment: + TFE_LICENSE: "" + TFE_HOSTNAME: "" + TFE_ENCRYPTION_PASSWORD: '' + TFE_OPERATIONAL_MODE: "external" + TFE_DISK_CACHE_VOLUME_NAME: "${COMPOSE_PROJECT_NAME}_terraform-enterprise-cache" + TFE_TLS_CERT_FILE: "/etc/ssl/private/terraform-enterprise/cert.pem" + TFE_TLS_KEY_FILE: "/etc/ssl/private/terraform-enterprise/key.pem" + TFE_TLS_CA_BUNDLE_FILE: "/etc/ssl/private/terraform-enterprise/bundle.pem" + TFE_IACT_SUBNETS: "" + + # Database settings. See the configuration reference for more settings. + TFE_DATABASE_USER: "" + TFE_DATABASE_PASSWORD: '' + TFE_DATABASE_HOST: "" + TFE_DATABASE_NAME: "" + TFE_DATABASE_PARAMETERS: "" + + # Object storage settings. See the configuration reference for more settings. + TFE_OBJECT_STORAGE_TYPE: "s3" + TFE_OBJECT_STORAGE_S3_ACCESS_KEY_ID: "" + TFE_OBJECT_STORAGE_S3_SECRET_ACCESS_KEY: '' + TFE_OBJECT_STORAGE_S3_REGION: "" + TFE_OBJECT_STORAGE_S3_BUCKET: "" + cap_add: + - IPC_LOCK + read_only: true + tmpfs: + - /tmp:mode=01777 + - /run + - /var/log/terraform-enterprise + ports: + - "80:80" + - "443:443" + volumes: + - type: bind + source: /var/run/docker.sock + target: /run/docker.sock + - type: bind + source: ./certs + target: /etc/ssl/private/terraform-enterprise + - type: volume + source: terraform-enterprise-cache + target: /var/cache/tfe-task-worker/terraform +volumes: + terraform-enterprise-cache: +``` + +### Example `active-active` mode configuration + +The following compose configuration deploys Terraform Enterprise in `active-active` mode and expects to connect to an external PostgreSQL server, external S3-compatible object storage server, and external Redis-compatible caching server. + +```yaml +# Caution: $ is a reserved character in docker compose files for variable interpolation and can be escaped by using $$. +# https://docs.docker.com/compose/how-tos/environment-variables/variable-interpolation/ +--- +name: terraform-enterprise +services: + tfe: + image: images.releases.hashicorp.com/hashicorp/terraform-enterprise: + environment: + TFE_LICENSE: "" + TFE_HOSTNAME: "" + TFE_ENCRYPTION_PASSWORD: '' + TFE_OPERATIONAL_MODE: "active-active" + TFE_DISK_CACHE_VOLUME_NAME: "${COMPOSE_PROJECT_NAME}_terraform-enterprise-cache" + TFE_TLS_CERT_FILE: "/etc/ssl/private/terraform-enterprise/cert.pem" + TFE_TLS_KEY_FILE: "/etc/ssl/private/terraform-enterprise/key.pem" + TFE_TLS_CA_BUNDLE_FILE: "/etc/ssl/private/terraform-enterprise/bundle.pem" + TFE_IACT_SUBNETS: "" + + # Database settings. See the configuration reference for more settings. + TFE_DATABASE_USER: "" + TFE_DATABASE_PASSWORD: '' + TFE_DATABASE_HOST: "" + TFE_DATABASE_NAME: "" + TFE_DATABASE_PARAMETERS: "" + + # Object storage settings. See the configuration reference for more settings. + TFE_OBJECT_STORAGE_TYPE: "s3" + TFE_OBJECT_STORAGE_S3_ACCESS_KEY_ID: "" + TFE_OBJECT_STORAGE_S3_SECRET_ACCESS_KEY: "" + TFE_OBJECT_STORAGE_S3_REGION: "" + TFE_OBJECT_STORAGE_S3_BUCKET: "" + + # Redis settings. See the configuration reference for more settings. + TFE_REDIS_HOST: "" + TFE_REDIS_USER: "" + TFE_REDIS_PASSWORD: "" + TFE_REDIS_USE_TLS: "" + TFE_REDIS_USE_AUTH: "" + + # Vault cluster settings. + # If you are using the default internal vault, this should be the private routable IP address of the node itself. + TFE_VAULT_CLUSTER_ADDRESS: "https://:8201" + cap_add: + - IPC_LOCK + read_only: true + tmpfs: + - /tmp:mode=01777 + - /run + - /var/log/terraform-enterprise + ports: + - "80:80" + - "443:443" + - "8201:8201" + volumes: + - type: bind + source: /var/run/docker.sock + target: /run/docker.sock + - type: bind + source: ./certs + target: /etc/ssl/private/terraform-enterprise + - type: volume + source: terraform-enterprise-cache + target: /var/cache/tfe-task-worker/terraform +volumes: + terraform-enterprise-cache: +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/docker/scale.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/docker/scale.mdx new file mode 100644 index 000000000..8a5823eba --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/docker/scale.mdx @@ -0,0 +1,141 @@ +--- +page_title: Scale Terraform Enterprise instances hosted on Docker +description: >- + Learn how to migrate Terraform Enterprise instances hosted on Docker to `active-active` mode so that you can scale your deployment. +--- + +# Scale Terraform Enterprise instances hosted on Docker + +This topic describes how to migrate Terraform Enterprise instances hosted on Docker to `active-active` mode so that you can scale your deployment. + +## Introduction + +When your organization requires increased reliability or performance from Terraform Enterprise that your current single application instance cannot provide, we recommend switching to `active-active` mode. In this mode, Terraform Enterprise connects to external systems that store and manage application and state data. + +Operating Terraform Enterprise in `active-active` mode improves application scalability, but it also increases operational complexity. Consider the following aspects of operating Terraform Enterprise in `active-active` mode: + +- Observability concerns when monitoring multiple instances +- Custom automation required to manage the lifecycle of application nodes +- [CLI-based commands](/terraform/enterprise/deploy/reference/cli) for administration + +-> **Note**: Contact your Customer Success Manager before attempting to follow this guide. They can walk you through the process and make it as seamless as possible. + +## Prerequisite + +The primary requirement for `active-active` is an auto-scaling group or equivalent with a single instance running Terraform Enterprise. This auto-scaling group (ASG) should be behind a load balancer, and you can expose it to the public Internet, depending on your requirements. + +As mentioned earlier, your Terraform Enterprise application installation should be completely automated to ensure the auto-scaling group can scale down to zero and back up to one without human intervention. + +-> **Note**: Operating Terraform Enterprise in `active-active` mode on VMware infrastructure requires configuring a load balancer to route traffic across Terraform Enterprise servers. This documentation does not cover that setup. While auto-scaling groups are unavailable via native vCenter options, you must still configure a fully automated deployment. You must also reduce the available servers to one for upgrades, maintenance, and support. + +Your Terraform Enterprise application must be configured to run in [`external` operational mode](/terraform/enterprise/deploy/reference/configuration#external) to connect to an external PostgreSQL database and object storage. + +## Step 1: Prepare to Externalize Redis + +Prior to reconfiguring Terraform Enterprise, Redis must be externalized. Redis is used for background work scheduling across multiple nodes in an `active-active` installation. + +### Prepare Network + +There are new access requirements involving ingress and egress: + +- **Port 6379** (or the port the external Redis uses) must be open between the nodes and the Redis service. +- **Port 8201** must be open between the nodes to allow Vault to run in [High Availability](/vault/docs/internals/high-availability) mode. + +### Provision Redis + +Externalizing Redis allows multiple active application nodes. Terraform Enterprise installs as a standard product on VMware machines and validated to work with the native Redis services from AWS, Azure, and GCP. +The Redis deployment must satify the [requirements](/terraform/enterprise/deploy/configuration/storage/connect-redis#requirements) of Terraform Enterprise. + +Refer to the [cloud-specific configuration guides for more details](#redis-server). + +## Step 2: Update your Configuration File Templates + +Before installing, you must change the templates for the configuration files mentioned in the [prerequisites](#prerequisite). + +### Update Application Settings + +Your existing Terraform Enterprise application settings are still necessary, but must be expanded. Refer to [Configuration Reference](/terraform/enterprise/deploy/reference/configuration) for a full list of configuration options. + +#### Enable `active-active` mode + +Update the Terraform Enterprise configuration to reflect the `active-active` operational mode: + +| **Key** | **Required Value** | **Specific Format Required** | +| -------------------- | ------------------ | ---------------------------- | +| `TFE_OPERATIONAL_MODE` | `active-active` | **Yes**, string. | + +#### Configure External Redis + +You must also expand your Terraform Enterprise application settings to support an external Redis instance: + +| **Key** | **Required Value** | **Specific Format Required** | +| ---------------------| ------------------------------------------------------------------------- | ---------------------------- | +| TFE_REDIS_HOST | Hostname in `host:port` format of an external Redis instance. | **Yes**, string. | +| TFE_REDIS_USE_AUTH\* | Set to `true`, if you are using a Redis service that requires a password. | **Yes**, boolean. | +| TFE_REDIS_USER\* | User used to authenticate to Redis. | **Yes**, string. | +| TFE_REDIS_PASSWORD\* | User used to authenticate to Redis. | **Yes**, string. | +| TFE_REDIS_USE_TLS\* | Set to `true` if you are using a Redis service that requires TLS. | **Yes**, boolean. | + +_\* Fields marked with an asterisk are only necessary if your particular external Redis instance requires them._ + +To use in-transit encryption with GCP Memorystore for Redis, you must [download the CA certificate](https://cloud.google.com/memorystore/docs/redis/enabling-in-transit-encryption#downloading_the_certificate_authority) for your Redis instance and configure it within the `ca_certs` Terraform Enterprise application setting. Additionally, ensure to configure the `redis_port` and `redis_use_tls` settings correctly. + +#### Add Encryption Password + +Add the encryption password value to your configuration. The password must be identical between node instances for the `active-active` architecture to function: + +| **Key** | **Description** | **Value can change between deployments?** | **Specific Format Required** | +| ------------ | ----------------------------------------- | --------------------------------------------------------------- | ---------------------------- | +| `TFE_ENCRYPTION_PASSWORD` | Used to encrypt sensitive data | **No.** Changing makes decrypting existing data impossible. | No | + + +## Step 3: Connect to External Redis + +Once you are prepared to include the modified configuration options in your configuration files, you must connect a single node to your newly provisioned Redis service by rebuilding your node instance with the new settings. + +### Re-provision Terraform Enterprise Instance + +Terminate the existing instance by scaling down to zero. Once terminated, you can scale back up to one instance using your revised configuration. + +### Wait for Terraform Enterprise to Install + +It can take up to 15 minutes for the node to provision and install the Terraform Enterprise application. You can monitor the provisioning status by watching your auto scaling group in your cloud’s web console. To confirm the successful implementation of the Terraform Enterprise application you can use the `tfectl` CLI tool in the Terraform Enterprise container to monitor the application status: + +```bash +tfectl app status +``` + +Refer to the [CLI reference](/terraform/enterprise/deploy/reference/cli) for more status and troubleshooting commands. + +### Validate Application + +With installation complete, it is time to validate the new Redis connection. Terraform Enterprise uses Redis both as a cache for API requests and a queue for long running jobs (e.g., Terraform runs). Test the queue for long running jobs by running real Terraform operations through the system. + +Once you are satisfied the application is running as expected, you can move on to step 4 to scale up to two nodes. + +## Step 4: Scale to Two Nodes + +You can now safely change the number of instances in your auto scaling group (or equivalent) to two. + +### Scale Down to Zero Nodes + +Scale down to zero nodes to fully disable the admin dashboard. Wait until the the existing instance is terminated. + +### Scale Up to Two Nodes + +Now that you have tested your external Redis connection change the min and max instance count of your Auto Scaling Group to two nodes. + +### Wait for Terraform Enterprise to Install + +You need to wait up to 15 minutes for the application to respond as healthy on both nodes. Monitor the status of the install [using the same methods](#validate-application). + +Note that you must check each node _independently_. + +### Validate Application + +Finally, confirm the application is functioning as expected when running multiple nodes by running Terraform plans and applying them through the system (and any other tests specific to your environment). + +Confirm the general functionality of the Terraform Enterprise user interface to validate [the tokens you added in Step 2 are set correctly](#step-2-update-your-configuration-file-templates). Browse the `Run` interface and your organization's private registry to confirm your application functions as expected. + + +@include "replicated-and-fdo/admin/active-active-scaling-partial.mdx" diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/index.mdx new file mode 100644 index 000000000..7ce55d96a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/index.mdx @@ -0,0 +1,59 @@ +--- +page_title: Terraform Enterprise deployment overview +description: Terraform Enterprise offers flexible deployment options for container runtime environments and data management modes. Learn about the deployment process. +--- + +# Terraform Enterprise deployment overview + +This topic provides an overview of the Terraform Enterprise deployment process. For information about deploying Terraform Enterprise using the Replicated platform, refer to [Deploy Terraform Enterprise to Replicated](/terraform/enterprise/deploy/replicated). If your existing Terraform Enterprise instances were deployed to Replicated, [refer to our migration guide](/terraform/enterprise/deploy/replicated-migration) for instructions on how to deploy the platform to one of the supported runtimes. + +## Introduction + +Terraform Enterprise runs in containerized instances that support flexible deployment options for self-hosted environments. You can deploy Terraform Enterprise to the following non-Replicated runtimes: + +- Docker +- Kubernetes +- OpenShift +- Nomad +- Podman + +You can configure Terraform Enterprise to run as a self-contained application that manages the associated data storage or as an integrated installation that connects to externally-managed data storage systems. Refer to [Data storage overview](/terraform/enterprise/deploy/configuration/storage) for additional information. + +## Terraform module workflow + +HashiCorp provides the following Terraform modules in the public Terraform registry to help you deploy Terraform Enterprise: + +- [Amazon Web Services EC2](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-hvd/aws/latest) +- [Amazon Web Services EKS](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-eks-hvd/aws/latest) +- [Microsoft Azure VM](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-hvd/azurerm/latest) +- [Microsoft Azure AKS](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-aks-hvd/azurerm/latest) +- [Google Cloud GCE](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-hvd/google/latest) +- [Google Cloud GKE](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-gke-hvd/google/latest) + +Each official module above aligns with HashiCorp Validated Designs, HashiCorp's official recommendations based on extensive experience working with various organizations to deploy our solutions. To learn more about using HashiCorp Validated Designs, contact your account team. + +## Manual workflow + +Terraform Enterprise supports several container runtime environments and operating modes for managing data that provide you with flexible deployment options. To deploy Terraform Enterprise, create a configuration file that specifies your deployment settings, complete any external prerequisites associated with your deployment configuration, then use your runtime interface to run the installation. + +### Prepare the deployment environment + +Create a host instance on your cloud provider and install a runtime environment. You must also configure network access, assign a DNS hostname, and install the TLS certificate. If you intend to connect Terraform Enterprise to an external Vault server or PostgreSQL database, you must also configure and launch those systems. Refer to [Prepare the Terraform Enterprise host environment](/terraform/enterprise/deploy/prepare-host/) for details. + +### Create the configuration + +Create a deployment configuration file for your runtime environment, such as a values.yaml if you are deploying to Kubernetes or a compose.yaml file if you are deploying to Docker, and specify the Terraform Enterprise configurations. The runtime platform starts the Linux container for Terraform Enterprise according to the settings defined in the configuration file. Refer to [Create deployment configuration overview](/terraform/enterprise/deploy/configuration/) for additional information. + +### Install Terraform Enterprise + +After completing the prerequisites, deploy Terraform Enterprise to your runtime environment. Refer to the following topics for instructions: + +- [Deploy Terraform Enterprise to Docker](/terraform/enterprise/deploy/docker) +- [Deploy Terraform Enterprise to Kubernetes](/terraform/enterprise/deploy/kubernetes) +- [Deploy Terraform Enterprise to OpenShift](/terraform/enterprise/deploy/openshift) +- [Deploy Terraform Enterprise to Podman](/terraform/enterprise/deploy/podman) +- [Deploy Terraform Enterprise to Nomad](/terraform/enterprise/deploy/nomad) + +### Review startup checks + +When you start Terraform Enterprise, several startup checks also run to prevent errors related to invalid configurations or certificates, as well as other issues that could prevent the application from running successfully or safely. Refer to the [startup checks reference](/terraform/enterprise/deploy/reference/startup-checks) for additional information. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/initial-admin-user.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/initial-admin-user.mdx new file mode 100644 index 000000000..90c34c8d3 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/initial-admin-user.mdx @@ -0,0 +1,115 @@ +--- +page_title: Create the initial admin user for Terraform Enterprise +description: >- + You must create an admin user to manage Terraform Enterprise and run workloads. Learn how to create the initial admin user in Terraform Enterprise. +--- + +# Create initial Terraform Enterprise admin user + +This topic describes how to create the initial admin user for managing the Terraform Enterprise application and run workloads. Create the initial admin user after installing Terraform Enterprise. Refer to [Deploy Terraform Enterprise](/terraform/enterprise/deploy) for additional information about the deployment process. + +## Overview + +Complete the following steps to create the initial admin user: + +1. **Retrieve the initial admin creation token**: The initial admin creation token (IACT) is available for a limited time after starting Terraform Enterprise. You must present the token to authenticate your request to create an admin user. +1. **Create initial admin user**: You can create the initial admin user in two ways: using the browser or directly from the container or pod. + +## Requirements + +Terraform Enteprise must not have any other users in the system when creating an admin user by presenting the IACT. + +## Retrieve initial admin creation token + +You may set the initial admin creation token in [`TFE_IACT_TOKEN` setting reference](/terraform/enterprise/deploy/reference/configuration#tfe_iact_token) if desired. If it is set, you may proceed to [Create initial admin user](#create-initial-admin-user). + +If this value is not set, a random token will be generated. By default, you have 60 minutes to retrieve the IACT upon start up. Refer to the [`TFE_IACT_TIME_LIMIT` setting reference](/terraform/enterprise/deploy/reference/configuration#tfe_iact_time_limit) for additional information about changing the time limit. + +You can retrieve the IACT from the Terraform Enterprise UI or from the Terraform Enterprise container or pod. + +### UI + +Navigate to `https://${TFE_HOSTNAME}/admin/retrieve-iact` in your browser on a workstation to retrieve your token. The host name is one of the addresses specified in the [`TFE_IACT_SUBNETS` setting](/terraform/enterprise/deploy/reference/configuration#tfe_iact_subnets). + + +### Container or pod + +You can retrieve your IACT token directly from the Terraform Enterprise container or pod: + + + + +Run the following command to retrieve your IACT token from a Kubernetes pod. +```shell-session +$ kubectl exec -it -n -- tfectl admin token +``` + + + + +Run the following command to retrieve your IACT token from a Docker container. +```shell-session +$ docker exec tfectl admin token +``` + + + + +Run the following command to retrieve your IACT token from a Podman container. +```shell-session +$ podman exec -it tfectl admin token +``` + + + + + +Run the following command to retrieve your IACT token from a Nomad allocation. +```shell-session +$ nomad alloc exec -namespace= -it -task tfectl admin token +``` + + + +## Create initial admin user + +You can create the initial admin user in the Terraform Enterprise UI or by sending a `POST` request to the `/admin/initial-admin-user` API endpoint. + +### UI + +1. Navigate to `https://${TFE_HOSTNAME}/admin/account/new?token=${IACT_TOKEN}` in your browser on a workstation. The host name is one of the addresses specified in the [`TFE_IACT_SUBNETS` setting](/terraform/enterprise/deploy/reference/configuration#tfe_iact_subnets). +1. When prompted, complete the steps to create the admin user. + +### Container or pod + +1. Create a JSON document with the username, email address, and password for the admin user you want to create. Refer to [`initial-admin-user` reference documentation](/terraform/enterprise/api-docs/admin/initial-admin-user) for additional information. + + The following example payload creates a user named `manage`: + + ```json + { + "username": "manage", + "email": "it@mycompany.com", + "password": "thisisabadpassword" + } + ``` + +1. Send a `POST` request to the `/admin/initial-admin-user` endpoint. You must present the IACT token. Refer to [Retrieve initial admin creation token](#retrieve-initial-admin-creation-token) for instructions. + + The following example sends the initial admin user details in a file called `payload.json`: + ```shell + curl \ + --header "Content-Type: application/json" \ + --request POST \ + --data @payload.json \ + https://${TFE_HOSTNAME}/admin/initial-admin-user?token=${IACT_TOKEN} + ``` + +The API returns a `created` status response: + +```json +{ + "status": "created", + "token": "aabbccdd.v1.atlas.ddeeffgghhiijjkkllmmnnooppqqrrssttuuvvxxyyzz" +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/index.mdx new file mode 100644 index 000000000..b8817d1e4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/index.mdx @@ -0,0 +1,342 @@ +--- +page_title: Deploy Terraform Enterprise to Kubernetes +description: >- + Learn how to deploy Terraform Enterprise to Kubernetes-orchestrated containers using Helm. +--- + +# Deploy Terraform Enterprise to Kubernetes + +This topic describes how to deploy Terraform Enterprise to Kubernetes. You should have a deep understanding of Kubernetes before deploying Terraform Enterprise to a production Kubernetes environment. + +## Overview + +You should deploy external service dependencies outside the Kubernetes cluster and scale reliably to accommodate Terraform Enterprise workloads. The following diagram shows the Terraform Enterprise architecture when deployed to Kubernetes-orchestrated containers: + +![Example of Kubernetes Architecture](/img/docs/TFE_In_Kubernetes.png) + +Complete the following steps to install Terraform Enterprise: + +1. Complete the prerequisites. +1. Install the Helm chart and apply your override values. +1. Complete post installation tasks. + +Complete post installation tasks, such creating the initial admin user account. + +## Prerequisites + +Complete the following tasks before attempting to install Terraform Enterprise. + +### Prepare the deployment environment + +Provide a DNS hostname for Terraform Enterprise and the associated TLS certificate. Additionally, you must configure your network so that your host can receive and send traffic. Refer to [Prepare the host environment](/terraform/enterprise/deploy/prepare-host) for details about preparing the host environment. + +### Deploy external storage systems + +Deploy the database and other storage devices so that Terraform can connect to them when the application starts. Refer to [Data storage settings overview](/terraform/enterprise/deploy/configuration/storage) for additional information. + +### Create the deployment configuration + +Create a custom YAML configuration file, for example `/tmp/overrides.yaml`, to override the default values in the Terraform Enterprise Helm chart. The file contains settings for the operational mode, license, TLS certificates, and network configuration. Add any additional configurations necessary for your environment. Refer to [Configuration file overview](/terraform/enterprise/deploy/configuration/) for additional information. + +@include 'common-kubernetes-blocks/externalizing-secret-values.mdx' + +#### Automatic environment configuration + +There are a collection of environment variables that are predetermined or computed when using the Terraform Enterprise Helm chart. When you configure the variables as `.Values.env.variables` entries, Terraform Enterprise overwrites them with the predetermined or computed values. Refer to [the config-map.yaml template](https://github.com/hashicorp/terraform-enterprise-helm/blob/main/templates/config-map.yaml) for version of the chart that you are using. + +#### Running as non-root + +By default, Terraform Enterprise runs as the `terraform-enterprise` user. If you want to enforce Terraform Enterprise as a non-root user, you must set the Helm chart values: + +* `.securityContext.runAsNonRoot: true` +* `.securityContext.runAsUser: 1000` +* `.securityContext.fsGroup: 1012`. + +## Install Terraform Enterprise with Helm + +1. Connect to the host instance. + +1. Log in to the Terraform Enterprise container image registry. + + ```shell-session + $ cat | docker login --username terraform images.releases.hashicorp.com --password-stdin + ``` + +1. Pull the Terraform Enterprise image from the registry. + + ```shell-session + $ docker pull images.releases.hashicorp.com/hashicorp/terraform-enterprise: + ``` + +1. Create a custom namespace. + + ```shell-session + $ kubectl create namespace + ``` + +1. Create an image pull secret in `` to fetch the `terraform-enterprise` container from the ``. This URL can be `images.releases.hashicorp.com`, or your internal container registry. If you are using `images.releases.hashicorp.com`, use `terraform` as the `` parameter in the following command with `--docker-password=$(cat /path/to/terraform.hclic)` + + ```shell-session + $ kubectl create secret docker-registry terraform-enterprise --docker-server= --docker-username= --docker-password= -n + ``` + +1. Add the Hashicorp Helm registry: + + ```shell-session + $ helm repo add hashicorp https://helm.releases.hashicorp.com + ``` + +1. Render the `terraform-enterprise` chart with your custom [values file](https://helm.sh/docs/chart_template_guide/values_files/) ``, for example `tmp/overrides.yaml`. + + ```shell-session + $ helm template terraform-enterprise hashicorp/terraform-enterprise –n --values + ``` + +1. Install `terraform-enterprise`, this step can take several minutes. + + ```shell-session + $ helm install terraform-enterprise hashicorp/terraform-enterprise –n --values + ``` + +1. Inspect `terraform-enterprise` pods to verify their successful start. + + ```shell-session + $ kubectl get pods -n + ``` + + If Terraform Enterprise pods fail to start, refer to [Kubernetes Troubleshooting](/terraform/enterprise/deploy/troubleshoot/error-messages#kubernetes). + +1. By default, Terraform Enterprise installs a load balancer service. Retrieve the external IP address of this service. + + ```shell-session + $ kubectl get services -n + ``` + +1. Set up a DNS record that points to your external IP address to enable routing to your ``. A DNS address is required to communicate with Terraform Enterprise, and it is managed outside of Kubernetes and the Terraform Enterprise helm chart or application. + +1. Validate the readiness of the Terraform Enterprise application by querying the health check endpoint. + + ```shell-session + $ curl https://tfe.test.hashicorp.com/_health_check + ``` + +## Post installation tasks + +Complete the following tasks after the initial installation. + +### Review startup checks + +When you start Terraform Enterprise, several startup checks also run to prevent errors related to invalid configurations or certificates, as well as other issues that could prevent the application from running successfully or safely. Refer to the [startup checks reference](/terraform/enterprise/deploy/reference/startup-checks) for additional information. + +### Create initial admin user + +[Provision your first administrative user](/terraform/enterprise/deploy/initial-admin-user) and start using Terraform Enterprise. + +### Configure the security context + +Modify the `.securityContext` Helm chart value to set the pod security configuration. Modify the `.container.securityContext` Helm chart value to set the container security configuration. You must also omit the `allowPrivilegeEscalation` container security context option or set it to `true`. + +### Create a custom Helm chart fork + +The [Terraform Enterprise Helm Chart](https://github.com/hashicorp/terraform-enterprise-helm) is designed to meet the needs of the majority of our users. You can fork our Helm chart and adapt it to your organization’s requirements. + +If you contact HashiCorp support, include your custom helm chart alongside your support bundle to ensure support has all the information they need. + +### Custom ingress +You can define an optional ingress resource using the ingress controller. Refer the [Terraform Enterprise Helm Chart](https://github.com/hashicorp/terraform-enterprise-helm) documentation for additional information about the controller. + +Specify values for the ingress section in the deployment configuration. Refer to the example values file in the [Terraform Enterprise Helm chart repository](https://github.com/hashicorp/terraform-enterprise-helm/blob/main/docs/example/terraform-enterprise-prereqs/values.yaml#L46C9-L46C9) for a demonstration of how to enable ingress configuration. + +Complete the following steps to set up an custom ingress configuration with Nginx: +1. Install the [nginx controller](https://kubernetes.github.io/ingress-nginx/deploy/) in a different namespace. +1. Deploy Terraform Enterprise with Ingress configured in your values file. +1. Get the address from the ingress resource like so: + +```shell-session +$ kubectl get ingress +NAME CLASS HOSTS ADDRESS PORTS AGE +terraform-enterprise nginx 80, 443 60s +``` + +## Example configurations + +The following examples for each cloud-platform are based on cloud native hosted PostgreSQL, storage, or Redis cache services. You can copy an example configuration and modify the values to per your environment. Refer to [Configuration Reference](/terraform/enterprise/deploy/reference/configuration) +for a list of all configuration options. + +The examples also depend on the following conditions: + +- Values under `.env.variables` are set as a `ConfigMap` and mounted as Terraform Enterprise environment variables. +- Values under `.env.secrets` are set as Kubernetes secrets and mounted as Terraform Enterprise environment variables. +- Extend the `env.configMapRefs[]` or `env.secretRefs[]` with your own resources to add additional `ConfigMap` or `Secret` resources within your environment configuration. + +- Values marked `BASE_64_ENCODED*` indicate that the value given must be base 64 encoded. If you are using this certificate configuration to host Terraform Enterprise web traffic, this value must be valid with the `env.TFE_HOSTNAME`, or match the wildcard pattern. + + +### AWS Elastic Kubernetes Service (EKS) + +```YAML +replicaCount: +tls: + certData: + keyData: + caCertData: +image: + repository: images.releases.hashicorp.com + name: hashicorp/terraform-enterprise + tag: +env: + variables: + TFE_HOSTNAME: + TFE_IACT_SUBNETS: + + # Database settings. + TFE_DATABASE_HOST: + TFE_DATABASE_NAME: + TFE_DATABASE_PARAMETERS: + TFE_DATABASE_USER: + + # Redis settings. + TFE_REDIS_HOST: + TFE_REDIS_USE_TLS: + TFE_REDIS_USE_AUTH: + TFE_REDIS_USER: + + # S3 settings. For Server Side Encryption settings, see to the configuration reference. + TFE_OBJECT_STORAGE_TYPE: s3 + TFE_OBJECT_STORAGE_S3_BUCKET: + TFE_OBJECT_STORAGE_S3_REGION: + TFE_OBJECT_STORAGE_S3_USE_INSTANCE_PROFILE: + secrets: + TFE_DATABASE_PASSWORD: '' + TFE_OBJECT_STORAGE_S3_ACCESS_KEY_ID: + TFE_OBJECT_STORAGE_S3_SECRET_ACCESS_KEY: '' + TFE_REDIS_PASSWORD: '' + TFE_LICENSE: + TFE_ENCRYPTION_PASSWORD: '' +``` + +### Google Kubernetes Engine (GKE) + +```YAML +replicaCount: +tls: + certData: + keyData: + caCertData: +image: + repository: images.releases.hashicorp.com + name: hashicorp/terraform-enterprise + tag: +env: + variables: + TFE_HOSTNAME: + TFE_IACT_SUBNETS: + + # Database settings. + TFE_DATABASE_HOST: + TFE_DATABASE_NAME: + TFE_DATABASE_PARAMETERS: + TFE_DATABASE_USER: + + # Redis settings. + TFE_REDIS_HOST: + TFE_REDIS_USE_TLS: + TFE_REDIS_USE_AUTH: + TFE_REDIS_USER: + + # Google Cloud Storage settings. + TFE_OBJECT_STORAGE_TYPE: google + TFE_OBJECT_STORAGE_GOOGLE_BUCKET: + TFE_OBJECT_STORAGE_GOOGLE_PROJECT: + secrets: + TFE_DATABASE_PASSWORD: '' + TFE_OBJECT_STORAGE_GOOGLE_CREDENTIALS: + TFE_REDIS_PASSWORD: '' + TFE_LICENSE: + TFE_ENCRYPTION_PASSWORD: '' +``` + +### Azure Kubernetes Service (AKS) + + +```YAML +replicaCount: +tls: + certData: + keyData: + caCertData: +image: + repository: images.releases.hashicorp.com + name: hashicorp/terraform-enterprise + tag: +env: + variables: + TFE_HOSTNAME: + TFE_IACT_SUBNETS: + + # Database settings. + TFE_DATABASE_HOST: + TFE_DATABASE_NAME: + TFE_DATABASE_PARAMETERS: + TFE_DATABASE_USER: + + # Redis settings. + TFE_REDIS_HOST: + TFE_REDIS_USE_TLS: + TFE_REDIS_USE_AUTH: + TFE_REDIS_USER: + + # Azure container storage settings. + TFE_OBJECT_STORAGE_TYPE: azure + TFE_OBJECT_STORAGE_AZURE_ACCOUNT_NAME: + TFE_OBJECT_STORAGE_AZURE_CONTAINER: + TFE_OBJECT_STORAGE_AZURE_ENDPOINT: + secrets: + TFE_DATABASE_PASSWORD: '' + TFE_OBJECT_STORAGE_AZURE_ACCOUNT_KEY: '' + TFE_REDIS_PASSWORD: '' + TFE_LICENSE: + TFE_ENCRYPTION_PASSWORD: '' +``` + +#### Using AKS with Workload Identity + +If you are using AKS with Workload Identity, the configuration is slightly different. You must set omit the `TFE_OBJECT_STORAGE_AZURE_ACCOUNT_KEY` secret, and configure +the AKS cluster as an OIDC provider. + +```yaml +serviceAccount: + enabled: true + name: "" + annotations: + azure.workload.identity/client-id: "" + labels: + azure.workload.identity/use: "true" +pod: + labels: + azure.workload.identity/use: "true" +agents: + rbac: + enabled: true +``` + +The `` is the client_id from the Azure User Assigned Identity. One can find this value in the Azure portal. + +This user assigned identity needs a federated identity credential with the following subject format +`"system:serviceaccount:${KUBERNETES_NAMESPACE}:${SERVICE_ACCOUNT_NAME}"`. + +The issuer of the federated identity should be the cluster's issuer URL. One can retrieve this URL by running the following command: + +```shell-session +$ az aks show --resource-group --name --query "oidcIssuerProfile.issuerUrl" --output tsv +``` + +## Terraform modules for managed-kubernetes + +HashiCorp provides the following Terraform modules in the public Terraform registry to help you deploy Terraform Enterprise on EKS, GKE and AKS: + +- [Amazon Web Services EKS](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-eks-hvd/aws/latest) +- [Google Cloud GKE](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-gke-hvd/google/latest) +- [Microsoft Azure AKS](https://registry.terraform.io/modules/hashicorp/terraform-enterprise-aks-hvd/azurerm/latest) + +Each official module above aligns with HashiCorp Validated Designs, HashiCorp's official recommendations based on extensive experience working with various organizations to deploy our solutions. To learn more about using HashiCorp Validated Designs, contact your account team. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/index.mdx new file mode 100644 index 000000000..f71f747dd --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/index.mdx @@ -0,0 +1,23 @@ +--- +page_title: Scale Terraform Enterprise instances on Kubernetes +description: >- + Learn how to increase the number of replica instances of your Terraform Enterprise deployment on Kubernetes to scale up Terraform activities. +--- + +# Scale Terraform Enterprise instances on Kubernetes + +This topic provides overview information about scaling your Terraform Enterprise deployment to meet demand. + +## Workflows + +To handle increased computational workload requirements of your organization, you can scale Terraform Enterprise horizontally by increasing the number of `terraform-enterprise` pods and `terraform-enterprise agent` pods. Refer to [Increase number of replica instances](/terraform/enterprise/deploy/kubernetes/scale/replicas) for instructions. + +You can also increase run capacity to reduce run queue lengths and shorten wait time for runs to begin execution. Refer to [Increase run capacity](/terraform/enterprise/deploy/kubernetes/scale/run-capacity) for instructions. + +## Impact on external resources + +Scaling your deployment up to meet larger demands may impact the following external resources. + +- **PostgreSQL**: In our testing, CPU utilization and memory usage increased when scaling Terraform Enterprise pods with increasing capacity concurrency. We recommend closely monitoring both CPU utilization and memory usage and provide additional resources as necessary. +- **Redis**: In our testing, Redis CPU or memory spiked in some cases. You should monitor your Redis server and provide additional resources as necessary. + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/replicas.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/replicas.mdx new file mode 100644 index 000000000..c6525d189 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/replicas.mdx @@ -0,0 +1,96 @@ +--- +page_title: Increase number of replica instances +description: >- + Learn how to increase the number of replica instances of your Terraform Enterprise deployment on Kubernetes. +--- + +# Increase number of replica instances + +This topic describes how to increase the number of replica instances of your Terraform Enterprise deployment on Kubernetes so that your deployment can scale to meet demand. + +## Introduction + +To handle increased computational workload requirements of your organization, you can scale Terraform Enterprise horizontally by increasing the number of `terraform-enterprise` pods and `terraform-enterprise agent` pods. Refer to the [Scale Terraform Enterprise instances on Kubernetes overview](/terraform/enterprise/deploy/kubernetes/scale) for additional information. + +## Requirements + +The requirements for your Kubernetes cluster depend on the specific workloads. Update CPU, RAM, storage, and network capacity according to your applications demands. + +### CPU requirements + +The following minimum requirements for a Terraform Enterprise pod are appropriate for most initial production deployments and for development and test environments: + +| CPU | Memory | +| ------- | ---------| +| 2 core | 3 GB RAM | + +We tested with a minimum memory of 2.5GB and 0.75 vCPU and scaled up to maximum of 7.5GB and 4 vCPU. + +```YAML +resources: + requests: + memory: "2500Mi" + cpu: "750m" + limits: + memory: "7500Mi" + cpu: "4000m" +``` + +### Database requirements + +The following table describes the recommended minimum memory and CPU requirements for the PostgreSQL database. You may require additional resources depending on the anticipated demands on Terraform Enterprise within your organization: + +| Type | CPU | Memory | Storage | +| ------- | -------|-----------|---------| +| Minimum | 4 core | 16 GB RAM | 50 GB | +| Scaling | 8 core | 32 GB RAM | 50 GB | + + +### Redis cache requirements + +We successfully tested Terraform Enterprise with the following data store configuration: + +- 6GB Redis cache. +- Multi-AZ enabled. +- Automated failover enabled. + + +## Increase `terraform-enterprise` pods + +Kubernetes creates a _`Deployment`_ object that manages the `terraform-enterprise` pods through a _`ReplicaSet`_. Refer to the Kubernetes documentation to learn about [`Deployment`s](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/) and [`ReplicaSet`s](https://kubernetes.io/docs/concepts/workloads/controllers/replicaset/). + +The [`deployment.yaml`](https://github.com/hashicorp/terraform-enterprise-helm/blob/0e1a2eb6644bdf6b710c9ce97ed1d2b8e3c558ae/templates/deployment.yaml#L13) file generated during the Terraform Enterprise deployment process includes the `replicas` field, which determines how many `terraform-enterprise` pods Kubernetes should create. + +```YAML +apiVersion: apps/v1 +kind: Deployment +metadata: + name: terraform-enterprise + labels: + app: terraform-enterprise +spec: + replicas: {{ .Values.replicaCount }} + selector: + matchLabels: + app: terraform-enterprise + template: + metadata: + annotations: + {{- if .Values.pod.annotations }} + {{ toYaml .Values.pod.annotations | indent 8 }} + {{ end }} + labels: + app: terraform-enterprise +``` + +Complete the following steps to increase the number of `terraform-enterprise` pods for your deployment: + +1. Update the value of `replicaCount` in the [values file](https://github.com/hashicorp/terraform-enterprise-helm/blob/0e1a2eb6644bdf6b710c9ce97ed1d2b8e3c558ae/values.yaml#L8) of your Helm chart. The `replicaCount` value maps to the `spec.replicas` value in the deployment file. The maximum number of `terraform-enterprise` pods you can instruct Kuberneteds to create is `5`. +1. Run the `helm upgrade` command to update the deployment. + +In the following example, the `replicaCount` is set to `3`, which sets the `spec.replicas` value to `3` after running `helm ugrade`: + +```YAML + replicaCount: 3 + ... +``` \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/run-capacity.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/run-capacity.mdx new file mode 100644 index 000000000..0e37c62e2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/kubernetes/scale/run-capacity.mdx @@ -0,0 +1,99 @@ +--- +page_title: Increase Terraform Enterprise run capacity on Kubernetes +description: >- + Learn how to increase the run capacity when operating Terraform Enterprise on Kubernetes. +--- + +# Increase Terraform Enterprise run capacity + +This topic describes how to increase the run capacity of your Terraform Enterprise deployment on Kubernetes. For instructions on how to create the number of replicas, refer to [Increase number of replicas](/terraform/enterprise/deploy/kubernetes/scale/replicas). + +## Introduction + +Terraform Enterprise executes runs by creating agent jobs in a different namespace, which in turn creates agent pods. Each run executes in its own agent pod. When run finishes, Terraform automatically cleanse up the agent job and agent pod. You can increase the maximum number of concurrent agent pods to reduce run queue lengths and wait time for runs to begin execution. + +Complete the following steps to increase run capacity: + +- Configure the maximum number of concurrent agent jobs. +- Configure memory and CPU limits for individual pods. +- Adjust the Kubernetes worker timeout settings to allow Kubernetes to automatically scale the cluster. + +## Configure concurrency + +To increase the number of agent pods that Terraform Enterpise can run concurrently, update the `TFE_CAPACITY_CONCURRENCY` value on the values file on the Helm chart and run `helm upgrade` to update the deployment. + +The `TFE_CAPACITY_CONCURRENCY` value sets the maximum number of agent jobs each Terraform Enterprise pod can create at a given time in the `TFE_CAPACITY_CONCURRENCY` setting. The default concurrency is set to `10`. You can specify up to `50` agent jobs. The following example sets the concurrent number of agent jobs allowed to `11`: + +``` YAML + env: + ... + variables: + TFE_CAPACITY_CONCURRENCY: "11" +``` + +`TFE_CAPACITY_CONCURRENCY` applies to each `terraform-enterprise` pod. For example, if you have three `terraform-enterprise` pods, and `TFE_CAPACITY_CONCURRENCY` is `10`, the maximum number of agent pods for Terraform Enterprise is `30`. Refer to [`TFE_CAPACITY_CONCURRENCY`](/terraform/enterprise/deploy/configuration#tfe_capacity_concurrency) for additional information. + +## Configure limits for individual agent pods + +You can increase the maximum amount of memory and CPU for each agent pod in the `TFE_CAPACITY_MEMORY`and `TFE_CAPACITY_CPU` values and run `helm upgrade` to update the deployment. Refer to the [Helm chart](https://github.com/hashicorp/terraform-enterprise-helm/blob/0e1a2eb6644bdf6b710c9ce97ed1d2b8e3c558ae/values.yaml#L167-L169) for additional information. + +In the following example, the CPU limit is set to `0`, which enables an unlimited about of CPU. The memory limit is set to `2048`, which enables up to 2048 mebibytes. + +``` YAML + env: + ... + variables: + TFE_CAPACITY_CONCURRENCY: "10" # Set the maximum number of concurrent runs, eg: 10 + TFE_CAPACITY_CPU: "0" # Set the maximum CPU utilization. "0" equals unlimited. + TFE_CAPACITY_MEMORY: "2048" # Set the maximum memory utilization, eg: "2048" equals 2048Mi. +``` + +## Use Kubernetes cluster autoscaling + + +Enable the `autoscaling` setting for your Kubernetes cluster so that Kubernetes can automatically scale the node capacity when Kubernetes cannot schedule the run due to resource constraints. You must also adjust the [`TFE_RUN_PIPELINE_KUBERNETES_WORKER_TIMEOUT`](/terraform/enterprise/deploy/reference/configuration#tfe_run_pipeline_kubernetes_worker_timeout) setting so that Terraform Enterprise does not timeout before the Kubernetes environment can scale to meet resource demand for additional runs. This setting should be set to be greater than the number of seconds Kubernetes requires to scale out and initiate a new node fitting the constraints and requirements for the agent jobs that Terraform Enterprise generates. + +When `autoscaling` is enabled for the Kubernetes cluster, Terraform Enterprise still complies with the maximum number of jobs it can run concurrently per the `TFE_CAPACITY_CONCURRENCY` configuration. We recommend that you carefully configure your Kubernetes environment with infrastructure layer upper and lower bounds on node availability to meet your business needs outside of Terraform Enterprise. + +### Google Cloud Platform Kubernetes Engine with Autopilot + +You can use Google Cloud Platform Kubernetes Engine (GKE) pod annotations to fine tune the stability and availability of Terraform Enterprise. GKE Autopilot is a mode of operation that manages clusters. Refer to the [Autopilot documentation](https://cloud.google.com/kubernetes-engine/docs/concepts/autopilot-overview) for additional information. + +At a minimum, we recommend the following annotations and node selectors: + +- require that `tfc-agent` pods are not interruptable using the following annotation: `cluster-autoscaler.kubernetes.io/safe-to-evict=false` +- select a balanced compute class for both Terraform Enterprise pods and `tfc-agent` workloads using the following node selector: `cloud.google.com/compute-class: "Balanced"` +- set resource requests for CPU and memory for Terraform Enterprise and `tfc-agent` pods + +Manage these settings in the [Terraform Enterprise Helm chart values](https://github.com/hashicorp/terraform-enterprise-helm/blob/main/values.yaml). + +The following example shows how to configure features significant to operating Terraform Enterprise in GKE Autopilot. Note that the example is incomplete and does not include additional configurations for operating Terraform Enterprise: + +```yaml +# Terraform Enterprise resource requests, annotations, and node selectors +resources: + requests: + memory: "8000Mi" + cpu: "8" +nodeSelector: + cloud.google.com/compute-class: "Balanced" +pod: + annotations: + cluster-autoscaler.kubernetes.io/safe-to-evict: "false" + +# Agent resource requests, annotations, and node selectors, utilizing the agent pod template feature +agentWorkerPodTemplate : + metadata : + annotations : + "cluster-autoscaler.kubernetes.io/safe-to-evict": "false" + spec : + nodeSelector : + cloud.google.com/compute-class: "Balanced" + containers: + - name: "tfc-agent" + image: "hashicorp/tfc-agent:1.17.5" + resources : + requests : + memory: 2Gi + cpu: 2 +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/access-cli.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/access-cli.mdx new file mode 100644 index 000000000..f3b236ca2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/access-cli.mdx @@ -0,0 +1,50 @@ +--- +page_title: Access the Terraform Enterprise CLI +description: >- + The Terraform Enterprise CLI lets you reconfigure Terraform Enterprise, stop the application safely, and produce support bundles. Learn how to access the CLI. +--- + +# Access the Terraform Enterprise CLI + +Terraform Enterprise provides a command line interface that enables you to change its configuration, stop the application safely, and produce support bundles. Refer to [CLI reference](/terraform/enterprise/deploy/reference/cli) for information about the commands available. + +## Docker + +To connect to the Docker container hosting Terraform Enterprise, execute the following command from the server where Terraform Enterprise is running. If you have named your container something other than `terraform-enterprise` please replace that with your container name. + +```bash +$ docker exec -it terraform-enterprise bash +``` + +## Kubernetes + +Complete the following steps to connect to the Kubernetes pod hosting Terraform Enterprise: + +1. Authenticate to the Kubernetes cluster by executing the relevant command. + + + + ```bash + $ az aks get-credentials --resource-group --name + ``` + + ```bash + $ aws eks --region update-kubeconfig --name + ``` + + ```bash + $ gcloud container clusters get-credentials --project= + ``` + + +1. Retrieve the pod name by executing the following command. + + ```bash + $ kubectl get pods -n + ``` + +1. Execute the following command to remote into the pod. + + ```bash + $ kubectl exec -n -it -- bash + ``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/backup-restore.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/backup-restore.mdx new file mode 100644 index 000000000..0f1e6f977 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/backup-restore.mdx @@ -0,0 +1,180 @@ +--- +page_title: Back up and restore Terraform Enterprise +description: >- + Use Terraform Enterprise's back up and restore APIs for disaster recovery. +--- + +# Back up and restore Terraform Enterprise + +Terraform Enterprise provides an API to back up and restore all of its application data. + +The backup and restore API is separate from the Terraform Enterprise application-level APIs. As such, a separate authorization token is required to use the backup and restore API. See [Authentication](#authentication) below for more details. + +Using the backup and restore API is the only supported way to migrate between a deployment with an external Vault and one with the internal Vault service. + +> **Note**: We do not recommend using the backup and restore API to maintain periodic Terraform Enterprise application data backups. For best practices, refer to our recommended patterns covering the [backup](/terraform/tutorials/recommended-patterns/pattern-backups) and [restore](/terraform/tutorials/recommended-patterns/pattern-recovery) processes. + +## About backups and restores + +The backup and restore API backs up all of the data stored in a Terraform Enterprise installation, including both the blob storage and the PostgreSQL database. It does not back up the installation configuration. This backup can then be restored to a new installation of Terraform Enterprise. + +Please note the following when using the backup and restore API: + +- The version of Terraform Enterprise cannot be changed between a backup and restore. That is, a backup taken from one version of Terraform Enterprise cannot be restored to an installation running a different version of Terraform Enterprise. +- The version of PostgreSQL being used cannot be changed between a backup and restore. That is, a backup taken from a Terraform Enterprise installation using one version of PostgreSQL cannot be restored to an installation using a different version of PostgreSQL. +- The Terraform Enterprise installation that will be restored to must be a new, running installation with no existing application data. +- Once a restore is completed, the Terraform Enterprise application will need to be restarted before it can use the restored data. + +See also: + +- [Data Security](/terraform/enterprise/deploy/reference/data-security) for details about the contents of Terraform Enterprise's blob storage and PostgreSQL database. + +### Authentication + +The backup and restore API uses a separate authorization token which can be found within the Terraform Enterprise Docker container. + +```shell-session +$ docker exec -t terraform-enterprise-tfe-1 /bin/bash -c 'cat /var/run/terraform-enterprise/backup-restore/config.hcl | grep backup_token' +``` + +-> **Note:** This authorization token is specific to the Terraform Enterprise installation. As a result, the authorization token used to create a backup may be different than the authorization token used to perform a restore. Please ensure you are using the correct authorization token when performing a backup or restore operation. + +The backup and restore API is separate from the Terraform Enterprise application-level APIs and cannot be accessed with Terraform Enterprise user, team, or organization API tokens. + +To use this authorization token with the backup and restore API, pass the `Authorization: Bearer ` header in your API requests. + +~> **Important:** Since this authorization token can access all of the data in a Terraform Enterprise installation, protect it very carefully. + +### Security and encryption + +Terraform Enterprise uses HashiCorp Vault to encrypt and decrypt its data. The Vault encryption keys that are used to encrypt and decrypt this data are not preserved during a backup or restore. Instead, during a backup, the data is decrypted by Vault and then re-encrypted using a password provided by you, resulting in an encrypted backup blob. During a restore, the same password that you provided during the backup must be used to decrypt the data before it is re-encrypted with the new Terraform Enterprise installation's Vault encryption keys. + +The backup and restore API expect this password to be provided as a JSON object with a `password` property within the request payload. The value for the `password` property can be any valid string. Here's what an example JSON object looks like. + +```json +{ + "password": "befit-brakeman-footstep-unclasp" +} +``` + +~> **Important:** The same password that was provided during backup must be provided during restore. This password can be used to access all of the data that was backed up. Please protect it very carefully. + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +## Creating a backup + +`POST /_backup/api/v1/backup` + +To initiate a backup, make a POST request to the backup endpoint on a running Terraform Enterprise installation. + +The response to this request will be an encrypted binary blob containing all of your Terraform Enterprise data. When using this endpoint, please: + +- Remember to specify an output file for the encrypted backup blob. +- Be prepared to download and store many gigabytes of data to the filesystem of whichever machine the request is sent from. For best performance and to avoid disconnections, we recommend sending this request from a server colocated with the Terraform Enterprise installation rather than from a workstation. +- Treat this encrypted backup blob as sensitive data and ensure it is stored securely. +- Remember the password that was used to encrypt this backup blob. + +| Status | Response | Reason | +| ------- | ------------------ | ----------------------------- | +| [200][] | Binary backup blob | Successfully created a backup | +| [400][] | (none) | Invalid request | +| [500][] | (none) | Internal server error | + +~> **Important:** A successful backup **must** return `200`. If `200` is not returned and the call silently closes, the backup blob may be incomplete, resulting in data loss. + +### Request body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------- | ------ | ------- | ---------------------------------------------------------- | +| `password` | string | | The password used to encrypt the backup blob. | +| `skip_object_storage` | bool | `false` | Whether or not to skip backing up the object storage data. | + +### Sample payload + +```json +{ + "password": "befit-brakeman-footstep-unclasp" +} +``` + +### Sample request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --request POST \ + --data @payload.json \ + --output backup.blob \ + https:///_backup/api/v1/backup +``` + +## Restoring a backup + +`POST /_backup/api/v1/restore` + +Before restoring, you must first create a new Terraform Enterprise installation. + +-> **Note:** The authorization token used to restore the backup is specific to the Terraform Enterprise installation. If restoring to a separate Terraform Enterprise installation, the authorization token will be different for the restore than it was for the backup. See [Authentication](#authentication) above for more details. + +Once the Terraform Enterprise application is up and running, you can initiate a restore by making a POST request to the restore endpoint. + +Be prepared to upload many gigabytes of data from the filesystem of whichever machine the request is sent from. For best performance and to avoid disconnections, we recommend sending this request from a server colocated with the Terraform Enterprise installation rather than from a workstation. + +| Status | Response | Reason | +| ------- | -------- | ------------------------------ | +| [200][] | (none) | Successfully restored a backup | +| [400][] | (none) | Invalid request | +| [500][] | (none) | Internal server error | + +### Request body + +This POST endpoint requires the following form fields which must be provided as `multipart/form-data`. + +| Form field | Description | +| ---------- | ---------------------------------------------------------------------------------- | +| `snapshot` | An encrypted backup blob downloaded from the Terraform Enterprise backup endpoint. | +| `config` | A JSON file containing a JSON object. See the table below. | + +The JSON file used in the `config` form field above must contain a JSON object with the following properties. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ---------- | ------ | ------- | --------------------------------------------- | +| `password` | string | | The password used to decrypt the backup blob. | + +### Sample payload + +```json +{ + "password": "befit-brakeman-footstep-unclasp" +} +``` + +### Sample request + +```shell +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --request POST \ + --form config=@payload.json \ + --form snapshot=@backup.blob \ + https:///_backup/api/v1/restore +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/failover.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/failover.mdx new file mode 100644 index 000000000..176988e5b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/failover.mdx @@ -0,0 +1,85 @@ +--- +page_title: PostgreSQL database failover +description: Learn how implementing automatic failover for your Terraform Enterprise database and a high-availability (HA) PostgreSQL database cluster improves resilience and reduces data loss in the event of a failure. +--- + +# PostgreSQL database failover + +This topic provides an overview of the PostgreSQL database failover process and associated concepts to help you understand how failover works in Terraform Enterprise. This information is only relevant when operating Terraform Enterprise in `active-active` or `external` mode and when Terraform Enterprise is connected to an external database cluster. Refer to [Database connection overview](/terraform/enterprise/deploy/configuration/storage/connect-database) for additional information. + +## Introduction + +Configuring your Terraform Enterprise deployment to connect to a PostgreSQL database replica ensures continuous database availability when Terraform Enterprise is unable to reach the primary database. To enable failover, configure Terraform Enterprise to reconnect when a failover event occurs. Additionally, you must configure your monitoring tool or PostgreSQL software to detect failures that trigger failover operations. + +Refer to [Connect to a PostgreSQL cluster](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres-cluster) for instructions. + +For additional guidance, refer to the following example scenarios: + +- [Connect to a PostgreSQL cluster deployed to Patroni](/terraform/enterprise/deploy/configuration/storage/connect-database/patroni) +- [Connect to a PostgreSQL cluster deployed to Aurora](/terraform/enterprise/deploy/configuration/storage/connect-database/aurora) + +## Failover event stages + +The following stages describe the lifecycle of a failover event. + +### Failure detection + +Continuous health checks monitor the primary database node for signs of failure, such as connectivity issues or system crashes. When a health check fails, the monitoring tool reports that the primary node is unavailable. This involves checking predefined health metrics and thresholds to confirm the node’s failure status. + +### Failover operations + +You should deploy an external monitoring tool that is able to promote the most up-to-date standby node to the primary node during a failover event. The tool should also enable the node to handle read and write operations. + +This step may involve manually updating load balancers or connection strings used by applications. Terraform Enterprise notifies applications and clients connected to the database the change either through automatic reconfiguration or by using tools that support failover transitions. + +### Resolution + +After addressing the cause of the failure, you can restore the failed primary node and then demote the standby node. Update the primary node with data it was unable to store while it was unavailable and direct it to rejoin the cluster. + + +## Failover metrics + +Recovery point objective (RPO) and recovery time objective (RTO) are metrics that define the resilience of your system. These metrics help you understand and plan your disaster recovery and data protection strategies. + +### RPO + +RPO refers to the maximum acceptable amount of data loss measured in time. It describes how much data you can afford to lose in the event of a failure. For example, an RPO of 10 minutes means that, in the worst case, up to 10 minutes of data could be lost due to a failure. + +Achieving a low RPO requires frequent data replication and backups, which ensures that data is consistently synchronized across primary and replica nodes. In PostgreSQL, the [replication method](#replication) and the frequency of backups directly affect the RPO. + +The synchronous replication method results in lower RPO because it ensures that the database commits transactions to both the primary and replica nodes simultaneously. But using synchronous replication may impact performance. Asynchronous replication can provide better database performance but result in a higher RPO. Note that RPO is a function of the database configuration and unrelated to Terraform Enterprise performance. + +### RTO + +RTO refers to the maximum acceptable amount of time to restore normal operations after a failure. It describes how quickly you recover from a failure. An RTO of 15 minutes, for instance, indicates that the system must be fully operational within 15 minutes of a failure. + +In a highly-available (HA) PostgreSQL architecture, automated failover processes, efficient database recovery mechanisms, and robust monitoring tools that quickly detect and address issues can help you achieve a low RTO. The complexity of the HA topology, the effectiveness of failover mechanisms, and the speed at which data can be restored all contribute to the RTO. + +## High availability + +In order to implement a failover strategy, your Terraform Enterprise deployment must connect to a high-availability or highly-available (HA) PostgreSQL cluster. An HA PostgreSQL cluster ensures that the database remains operational and accessible during failures. For technical details, refer to the PostgreSQL [documentation](https://www.postgresql.org/docs/current/high-availability.html) on high-availability + +### Architecture of a PostgreSQL cluster + +A common HA cluster architecture has the following components: + +- **Primary node**: The database server where write operations occur. It handles both read and write requests but focuses primarily on write transactions. +- **Standby nodes**: These are replicas of the primary node. They receive updates from the primary node and can serve read-only queries to balance the load. +- **Load balancer**: This component distributes incoming connections across the primary and standby nodes. The load balancer ensures that no single node becomes a bottleneck and to manage failovers seamlessly. +- **Failover manager**: A system or tool that monitors the health of nodes and orchestrates the failover process if the primary node fails. + +### Replication +Replication refers to copying data from the primary node to standby nodes to ensure data redundancy and availability. Streaming replication refers to when the primary node sends a continuous stream of write-ahead logs (WAL) to standby nodes. The standby nodes then apply these logs to stay synchronized with the primary database. You can specify one of the following replication types in the `synchronous_commit` setting of your PostgreSQL configuration: + +- `asynchronous`: PostgreSQL commits transactions on the primary node without waiting for the standby nodes to acknowledge. This offers better performance but increases the risk of data loss. +- `synchronous`: PostgreSQL does not commit transactions until at least one standby node has acknowledged receipt. This reduces the risk of data loss but can impact write performance due to the added latency. + +Replication lag in `asynchronous` mode refers to the delay between when PostgreSQL commits a transaction on the primary node and when the commit is replicated to the standby nodes. This lag can impact data consistency during failover. Minimizing replication lag is crucial for ensuring that standby nodes are as up-to-date as possible with the primary node’s state. + +## Next steps + +Refer to the following topics for guidance on implementing failover for your Terraform Enterprise deployment: + +- [Connect to a PostgreSQL cluster](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres-cluster) for instructions. +- [Connect to a PostgreSQL cluster deployed to Patroni](/terraform/enterprise/deploy/configuration/storage/connect-database/patroni) +- [Connect to a PostgreSQL cluster deployed to Aurora](/terraform/enterprise/deploy/configuration/storage/connect-database/aurora) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/index.mdx new file mode 100644 index 000000000..20abed3f0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/index.mdx @@ -0,0 +1,20 @@ +--- +page_title: Manage Terraform Enterprise deployment overview +description: Learn about Terraform Enterprise deployment management procedures, including monitoring, backing up, and upgrading your Terraform Enterprise installation. +--- + +# Manage Terraform Enterprise deployment overview + +This topic provides overview information about managing Terraform Enterprise deployed to non-Replicated runtimes. For information about managing Replicated deployments, refer to [Manage Terraform Enterprise on Replicated overview](/terraform/enterprise/deploy/replicated/manage). + +## Deployment management tasks + +You can perform the following deployment management tasks: + +- Connect to the Terraform Enterprise admin CLI. Refer to [Access the Terraform Enterprise command line](/terraform/enterprise/deploy/manage/access-cli) for instructions. +- Create and restore backups of the data stored by Terraform Enterprise. Refer to [Backup and restore](/terraform/enterprise/deploy/manage/backup-restore) for instructions. +- Upgrade to a new version of Terraform Enterprise. Refer to [Upgrade Terraform Enterprise](/terraform/enterprise/deploy/manage/upgrade) for instructions. +- Enable Terraform Enterprise observability features to ensure that your deployment operates as expected. Refer to [Monitor Terraform Enterprise](/terraform/enterprise/deploy/manage/monitor) for instructions. +- Configure your deployment to automatically send license consumption data to HashiCorp. This streamlines your license reporting processes. Refer to [Enable automated license reports](/terraform/enterprise/deploy/manage/license-report) for instructions. +- Configure your deployment to automatically send product usage data to HashiCorp. This streamlines your license reporting processes. Refer to [Enable automated product usage reports](/terraform/enterprise/deploy/manage/product-report) for instructions. + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/license-report.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/license-report.mdx new file mode 100644 index 000000000..af5dc805e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/license-report.mdx @@ -0,0 +1,83 @@ +--- +page_title: Enable automated license utilization reports +description: >- + License utilization reports provide insights about consumption to help you manage your budget. Learn how to enable automated license utilization reports. +--- + +# Enable automated license utilization reporting + +This topic describes how to enable Terraform Enterprise to automatically report license usage information to HashiCorp. Refer to [Terraform Enterprise license data reference](/terraform/enterprise/deploy/reference/license-data) for information about the license data Terraform Enterprise sends to HashiCorp. + +## Introduction + +License usage reports provide the following benefits: + +- Insight into how much more you can deploy under your current contract. +- Protection against over-utilization. +- Predictable consumption for budgeting purposes. + +Additionally, you can review license usage with your existing monitoring solutions, such as Splunk and Datadog. Monitoring license consumption enables you to optimize and manage your deployments. Refer to [Monitor Terraform Enterprise](/terraform/enterprise/deploy/manage/monitor) for instructions on how to enable log forwarding for non-Replicated runtimes. Refer to documentation for [enabling log forwarding for Replicated deployments](/terraform/enterprise/deploy/replicated/monitoring/logging) if Terraform is deployed to Replicated. + +## Requirements + +- Configure your network to allow outbound HTTPS traffic on port `443`. +- Configure your network to allow HTTPS egress on port `443` from `https://reporting.hashicorp.services` by allow-listing the following IP addresses: + + - `100.20.70.12` + - `35.166.5.22` + - `23.95.85.111` + - `44.215.244.1` + +- Configure your network to allow egress to `https://api.replicated.com` + +Refer to [Configure network access](/terraform/enterprise/deploy/configuration/network) for additional information. + +## Enable license reporting + +Terraform is configured to automatically report license usage data by default. When enabled, Terraform sends HashiCorp the minimum data required to validate license usage as defined in our contracts in order to guide you through data insights and improve product value, experience, and quality. Refer to [Opt out of license utilization reporting](#opt-out-of-license-utilization-reporting) for instructions on how to disable automatic reports. + + +## Check logs + +Terraform Enterprise automatically begins reporting license utilization data within approximately 24 hours from start up. Refer to [Log location and format](/terraform/enterprise/deploy/manage/monitor#log-location-and-format) to verify that the data sent successfully. + +```json +{ + "@level": "debug", + "@message": "export finished successfully", + "@module": "tfe-licensing.licensingexporter", + "@timestamp": "2023-05-10T17:48:06.656979Z" +} +``` + +If your installation is air-gapped or your network does not allow the correct egress, logs show the following error: + +```json +{ + "@level": "error", + "@message": "error exporting snapshot", + "@module": "tfe-licensing.census", + "@timestamp": "2023-05-11T01:50:51.662155Z", + "err": "export failed with error POST https://reporting.hashicorp.services giving up after 5 attempt(s): Post \"https://reporting.hashicorp.services\": dial tcp 35.166.5.222:443: i/o timeout" +} +``` + +In this case, reconfigure your network to allow egress and check back in roughly 24 hours. + +## Opt out of license utilization reporting + +If your installation is air-gapped or you want to manually collect and report on the same license utilization metrics, you can opt-out of automated reporting. Note that you are still required to manually collect and send license utilization metrics to HashiCorp, even when you opt out of sending automated license usage reports. + +Before opting out, we strongly recommend reviewing the [license report reference](/terraform/enterprise/deploy/reference/license-data). Report any concerns related to the automatically-reported data to your account manager. + +1. Add the following environment variable to your deployment configuration `TFE_LICENSE_REPORTING_OPT_OUT=TRUE`. +1. Restart the application. +1. Check your product logs after approximately 24 hours to verify that the system is no longer attempting to send reports. + +### Check logs + +Automatic license utilization reporting will start sending data within roughly 24 hours. [Check the product logs](/terraform/enterprise/deploy/manage/monitor#enable-log-forwarding) for records that the data sent successfully. + +Terraform Enterprise logs report an error when your installation is air-gapped or when your network does not allow the correct egress. + + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/monitor.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/monitor.mdx new file mode 100644 index 000000000..9507309a6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/monitor.mdx @@ -0,0 +1,157 @@ +--- +page_title: Monitor Terraform Enterprise deployments +description: Learn how to enable logs and metrics to monitor your Terraform Enterprise installation's performance. +--- + +# Monitor Terraform Enterprise + +This topic describes how to enable logs and metrics in Terraform Enterprise so that you can monitor your non-Replicated deployment. For information about monitoring Replicated deployments, refer to [Terraform Enterprise Log Forwarding](/terraform/enterprise/deploy/replicated/monitoring/logging) and [Monitoring a Terraform Enterprise Instance](/terraform/enterprise/deploy/replicated/monitoring/monitoring) in the Replicated administration section. + +## Overview + +Complete the following steps to monitor your Terraform Enterprise deployment: + +1. Enable log forwarding. Terraform Enterprise writes logs directly to standard output and standard error, which allows you to forward logs using native tooling for your deployment platform. +1. Enable metrics collection. Metrics collection is disabled by default. Update your deployment configuration file to enable metrics collection + +## Enable log forwarding + +Terraform Enterprise writes logs directly to standard output and standard error. This allows you to forward logs using native tooling for your deployment platform. +Terraform Enterprise logs directly to standard output and standard error. This +allows you to forward logs using native tooling for your deployment platform. + +### Log location and format + +The individual service logs are located within the +`/var/log/terraform-enterprise` directory inside the container. + +```sh +/var/log/terraform-enterprise +├── atlas.log +├── nginx.log +├── sidekiq.log +└── vault.log +``` + +Each service log is a plain text file containing the logs for that service. Logs +are collated and logged to the container's standard output in JSON format. Each +log entry contains two fields: + +* `component`: The name of the individual service that emitted the log entry. +* `log`: The contents of the log message. + +An example set of log entries emitted by a Terraform Enterprise container would appear as follows: + +```sh +{"log":"2023-09-18 02:39:05 [INFO] msg=Worker start worker=AuthenticationTokenDeletionWorker","component":"sidekiq"} +{"log":"2023-09-18T02:39:05.098Z pid=156 tid=2pos class=FailedJobWorker jid=1010d28ac591979d9decb61f INFO: start","component":"sidekiq"} +{"log":"2023-09-18 02:39:05 [INFO] msg=Worker start worker=FailedJobWorker","component":"sidekiq"} +{"log":"2023-09-18 02:39:05 [INFO] msg=Worker finish worker=AuthenticationTokenDeletionWorker","component":"sidekiq"} +{"log":"2023-09-18T02:39:05.114Z pid=156 tid=2pyc class=AuthenticationTokenDeletionWorker jid=515e8a727a3e4948e9dbb04a elapsed=0.034 INFO: done","component":"sidekiq"} +{"log":"2023-09-18 02:39:05 [INFO] agent_jobs_processed=[] agent_jobs_errored=[] msg=Worker finish worker=FailedJobWorker","component":"sidekiq"} +{"log":"2023-09-18T02:39:05.118Z pid=156 tid=2pos class=FailedJobWorker jid=1010d28ac591979d9decb61f queue=default elapsed=0.02 INFO: done","component":"sidekiq"} +{"log":"2023-09-18 02:39:13 [INFO] [3efaaec9-48d4-4517-9fde-127f80faacb4] [dd.service=atlas dd.trace_id=1904097642804464614 dd.span_id=0 ddsource=ruby] {\"method\":\"GET\",\"path\":\"/\",\"format\":\"html\",\"status\":301,\"allocations\":493,\"duration\":0.72,\"view\":0.0,\"db\":0.0,\"location\":\"https://tfe.example.com/session\",\"dd\":{\"trace_id\":\"1904097642804464614\",\"span_id\":\"0\",\"env\":\"\",\"service\":\"atlas\",\"version\":\"\"},\"ddsource\":[\"ruby\"],\"uuid\":\"3efaaec9-48d4-4517-9fde-127f80faacb4\",\"remote_ip\":\"1.2.3.4\",\"request_id\":\"3efaaec9-48d4-4517-9fde-127f80faacb4\",\"user_agent\":\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36\",\"user\":null,\"auth_source\":null}","component":"atlas"} +{"log":"2023-09-18 02:39:13 [INFO] [3cb89cfa-7d7f-4aeb-9e60-2256b016a839] [dd.service=atlas dd.trace_id=4370203755142829190 dd.span_id=0 ddsource=ruby] {\"method\":\"GET\",\"path\":\"/session\",\"format\":\"html\",\"status\":200,\"allocations\":3895,\"duration\":7.3,\"view\":5.77,\"db\":0.59,\"dd\":{\"trace_id\":\"4370203755142829190\",\"span_id\":\"0\",\"env\":\"\",\"service\":\"atlas\",\"version\":\"\"},\"ddsource\":[\"ruby\"],\"uuid\":\"3cb89cfa-7d7f-4aeb-9e60-2256b016a839\",\"remote_ip\":\"1.2.3.4\",\"request_id\":\"3cb89cfa-7d7f-4aeb-9e60-2256b016a839\",\"user_agent\":\"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36\",\"user\":null,\"auth_source\":null}","component":"atlas"} +{"log":"1.2.3.4 - - [18/Sep/2023:02:39:13 +0000] \"GET / HTTP/1.1\" 301 117 \"-\" \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36\"","component":"nginx"} +{"log":"1.2.3.4 - - [18/Sep/2023:02:39:13 +0000] \"GET /session HTTP/1.1\" 200 1735 \"-\" \"Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36\"","component":"nginx"} +{"log":"Storing the encrypted Vault token in Redis","component":"vault"} +``` + +Note that the format of individual service logs is considered an internal implementation +detail and is subject to change at any release. + +### External log forwarding + +We strongly recommend using an external log forwarding solution that aligns with +your existing observability solutions. Depending on the deployment platform, +native or third-party solutions (e.g., host-level monitoring agents) may be an +appropriate solution for log aggregation and forwarding. Hashicorp does not provide +support for third-party log forwarding solutions. + +#### Docker + +Docker supports a multitude of logging drivers. See the [Docker logging +driver](https://docs.docker.com/config/containers/logging/configure/) list for what +options are available. + +#### Kubernetes + +Kubernetes supports several architectures for log-forwarding. See the +[Kubernetes logging architectures documentation](https://kubernetes.io/docs/concepts/cluster-administration/logging/#cluster-level-logging-architectures) +for what options are available. + +### Native log forwarding + +As a convenience to aid in migrating from legacy Replicated environments +to Flexible Deployments, Terraform Enterprise provides a mechanism to inject +FluentBit `[OUTPUT]` configuration directives. This allows Terraform Enterprise +to use FluentBit plugins to forward log data directly to a number of external +destinations. + +FluentBit configuration must be provided the Terraform Enterprise container in +a file mounted to the container. That is, the configuration value must point to +a _filesystem path_ on the Docker container where the FluentBit configuration is +located; the configuration must _not_ contain the actual configuration itself. +This means it is the responsibility of the Terraform Enterprise operator to mount the config +snippet to the Docker container. + +| **Key** | **Description** | **Specific Format Required** | +| ------------------------------ | --------------------------------------------------------------------------------------------------- | ---------------------------- | +| TFE_LOG_FORWARDING_CONFIG_PATH | Filesystem path on the Terraform Enterprise container containing FluentBit `[OUTPUT]` configuration | **Yes**, string. | + + +Exposing FluentBit configuration to Terraform Enterprise operators is provided as a convenience to +facilitate migration Terraform Enterprise installations. Customers are encouraged +to migrate away from relying on injected FluentBit configuration, and provide their +own log forwarding and aggregation solution in their infrastructure. + + +#### Limitations + +The FluentBit solution provided in [legacy Replicated Terraform Enterprise deployments](/terraform/enterprise/deploy/replicated/monitoring/logging) +emitted log entries that contained additional metadata keys, such as hostname and +IP address. This allowed for additional observability value from log entries, as +operators could identify the source of log entries. Unlike Replicated deployments, +logs emitted by the FluentBit plugins made available in Terraform Enterprise +Flexible Deployments do not contain additional metadata attached to each log entry. +This is due to the isolated nature of the FluentBit process within the Terraform +Enterprise Docker container; by definition, processes within the Docker container +are not exposed to host-level details. + +Because of this, we strongly recommend using an external log forwarding solution +that aligns with your existing observability solutions. See [external log forwarding](#external-log-forwarding) +for further discussion. + +Additionally, note that built-in log forwarding is only available for Docker-deployed +Terraform Enterprise installations. Terraform Enterprise deployed on Kubernetes +does not support leveraging the built-in FluentBit. + +#### Supported external destinations + +You can only forward logs to one of the supported external destinations below. +Each supported external destination contains example configuration for convenience. + +@include "replicated-and-fdo/monitoring/logging/supported-destinations-partial.mdx" + +## Enable metrics collection + +Metrics collection is disabled by default. Set the `TFE_METRICS_ENABLE` variable to `true` in your runtime configuration. The metrics service is not supported in Kubernetes installations. Refer to the [configuration reference](/terraform/enterprise/deploy/reference/configuration) for additional details. + +### Access metrics + +Terraform Enterprise exposes metrics on a port separate from the application. This allows operators to use network access controls to restrict access to metrics data to authorized consumers, such as a Prometheus server. + +By default, metrics are exposed on the following ports: + +- `9090` for HTTP. +- `9091` for HTTPS. + +You can configure the ports by setting the `TFE_METRICS_HTTP_PORT` and `TFE_METRICS_HTTPS_PORT` environment variables. Refer to the [configuration reference](/terraform/enterprise/deploy/reference/configuration) for additional details. + +The HTTP and HTTPS ports serve metrics on the path `/metrics`. + +By default, requests to the /metrics endpoint will emit metrics in JSON format. Use the query parameter `?format=prometheus` to emit metrics in Prometheus format. + +When using Prometheus, we recommend using a scrape interval shorter than the expiration time of 15 seconds to ensure that Terraform Enterprise reports data points from short-lived processes. + +Refer to the [metrics reference](/terraform/enterprise/deploy/reference/metrics) for details about the metrics Terraform Enterprise emits. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/product-report.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/product-report.mdx new file mode 100644 index 000000000..9a2ad3ad6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/product-report.mdx @@ -0,0 +1,88 @@ +--- +page_title: Enable automated product usage reports +description: >- + Learn how to enable automated license utilization reports. +--- + +# Enable automated product usage reports + +This topic describes how to enable Terraform Enterprise to automatically report product usage information to HashiCorp. Refer to [Terraform Enterprise product data reference](/terraform/enterprise/deploy/reference/product-data) for information about the product usage data Terraform Enterprise sends to HashiCorp. + +## Introduction + +Product usage reports provide the following benefits: + +- Insight into how much more you can deploy under your current contract. +- Protection against over-utilization. +- Predictable consumption for budgeting purposes. + +Additionally, you can review usage with your existing monitoring solutions, such as Splunk and Datadog. Monitoring product usage enables you to optimize and manage your deployments. Refer to [Monitor Terraform Enterprise](/terraform/enterprise/deploy/manage/monitor) for instructions on how to enable log forwarding for non-Replicated runtimes. Refer to documentation for [enabling log forwarding for Replicated deployments](/terraform/enterprise/deploy/replicated/monitoring/logging) if Terraform is deployed to Replicated. + +## Requirements + +- Configure your network to allow outbound HTTPS traffic on port `443`. +- Configure your network to allow HTTPS egress on port `443` from `https://reporting.hashicorp.services` by allow-listing the following IP addresses: + + - `100.20.70.12` + - `35.166.5.22` + - `23.95.85.111` + - `44.215.244.1` + +- Configure your network to allow egress to `https://api.replicated.com` + +Refer to [Configure network access](/terraform/enterprise/deploy/configuration/network) for additional information. + +## Enable product usage reporting + +Terraform is configured to automatically report product usage data by default. Refer to [Opt out of product usage reporting](#opt-out-of-product-usage-reporting) for instructions on how to disable automatic reports. + +## Check logs + +Terraform Enterprise automatically begins reporting data within approximately 24 hours from start up. Refer to [Log location and format](/terraform/enterprise/deploy/manage/monitor#log-location-and-format) to verify that the data sent successfully. + +```json +{ + "@level": "debug", + "@message": "export finished successfully", + "@module": "tfe-licensing.licensingexporter", + "@timestamp": "2023-05-10T17:48:06.656979Z" +} +``` + +Terraform Enterprise logs report an error when your installation is air-gapped or when your network does not allow the correct egress: + +```json +{ + "@level": "error", + "@message": "error exporting snapshot", + "@module": "tfe-licensing.census", + "@timestamp": "2023-05-11T01:50:51.662155Z", + "err": "export failed with error POST https://reporting.hashicorp.services giving up after 5 attempt(s): Post \"https://reporting.hashicorp.services\": dial tcp 35.166.5.222:443: i/o timeout" +} +``` + +In this case, reconfigure your network to allow egress and check back in roughly 24 hours. + +## Opt out of product usage reporting + +If your installation is air-gapped or you do not want to report product utilization data to HashiCorp, you can opt out of reporting. + +1. Add the following environment variable to your deployment configuration `TFE_USAGE_REPORTING_OPT_OUT=TRUE`. +1. Restart your system. +1. Check your product logs roughly 24 hours after opting out to make sure that the system does not send reports. + +When opting out in an internet-connected environment, the report contains fields in the JSON output set to `0`. + +### Manually reporting product usage in air-gapped environments +To report product usage in air-gapped environments, you can leverage the following CLI command: + +``` +tfectl admin usage-report +``` + +When in `disk` operating mode, Terraform Enterprise generates the product usage report in the `/run/terraform-enterprise/usage-report` directory. + +When in `external` and `active-active` mode and on Kubernetes, Terraform Enterprise uploads the product usage report to the same object store bucket where Terraform state files are stored. +Each specific run of the admin `usage-report` command generates the product usage report in a new JSON file. + +To send product usage reports to HashiCorp, visit the [**Licensing utilization reporting** page](https://portal.cloud.hashicorp.com/license-utilization/reports/create) and use the upload form. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/upgrade.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/upgrade.mdx new file mode 100644 index 000000000..d7679d18e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/manage/upgrade.mdx @@ -0,0 +1,100 @@ +--- +page_title: Upgrade Terraform Enterprise +description: Learn how to upgrade Terraform Enterprise using Docker Compose and Helm to run new versions on Nomad, Kubernetes, OpenShift, Podman, or Docker. +--- + +# Upgrade Terraform Enterprise + +This topic describes how to upgrade Terraform Enterprise installations on non-Replicated runtimes. For information about upgrading Replicated deployments, refer to [Upgrade Terraform Enterprise on Replicated](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades). + +## Introduction + +We recommend upgrading in a non-production environment first before upgrading the production instance of Terraform Enterprise. + +## Upgrade + +Complete the following steps to upgrade Terraform Enterprise: + +1. Back up your Terraform Enterprise data. Refer to [Backup and restore](/terraform/enterprise/deploy/manage/backup-restore) for instructions. + +1. Use the Terraform Enterprise CLI to stop any existing Terraform runs and prevent Terraform Enterprise from starting new operations. Refer to [Gracefully stop work on a node](/terraform/enterprise/deploy/reference/cli#gracefully-stop-work-on-a-node) for instructions. + +1. If your deployment is configured to run multiple `terraform-enterprise` nodes, scale down to a single node. You can run multiple nodes when Terraform Enterprise is in `active-active` mode. Refer to [Configure the operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) for additional information. + +1. Stop the Terraform Enterprise application. + + + + + For installs that use Docker Compose, use the following command: + + ```shell-session + $ docker compose down + ``` + + + + + For installs that use Helm charts, update the `values.yaml` file's `replicaCount`: + + ```yaml + replicaCount: 0 + ``` + + + + +1. Pull the new Terraform Enterprise image for a specific [release](/terraform/enterprise/releases): `images.releases.hashicorp.com/hashicorp/terraform-enterprise:vYYYYMM-#`. + + + + + For installs that use Docker Compose, update the `compose.yaml` with the appropriate image tag: + + ```yaml + name: terraform-enterprise + services: + tfe: + image: images.releases.hashicorp.com/hashicorp/terraform-enterprise: + ``` + + + + + For installs that use Helm charts, update the `values.yaml` with the appropriate image tag and `replicaCount`: + + ```yaml + replicaCount: 1 + image: + repository: images.releases.hashicorp.com + name: hashicorp/terraform-enterprise + tag: + ``` + + + + +1. Start the Terraform Enterprise application with the new image. + + + + + For installs that use Docker Compose, use the following command: + + ```shell-session + $ docker compose up --detach + ``` + + + + + For installs that use Helm charts, upgrade the helm release with the new values: + + ```shell-session + $ helm -n upgrade --values= terraform-enterprise hashicorp/terraform-enterprise + ``` + + + + +1. Repeat the process for the production instance of Terraform Enterprise. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/nomad.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/nomad.mdx new file mode 100644 index 000000000..80154c88a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/nomad.mdx @@ -0,0 +1,606 @@ +--- +page_title: Deploy Terraform Enterprise to HashiCorp Nomad +description: >- + Learn how to install Terraform Enterprise on Nomad. +--- + +# Deploy Terraform Enterprise to HashiCorp Nomad + +This topic describes how to deploy Terraform Enterprise to a HashiCorp Nomad cluster. + +Complete the following steps to deploy Terraform Enterprise to Nomad-orchestrated containers: + +1. Complete the prerequisites. +1. Parameterize the Terraform Enterprise license, host, and TLS encryption settings by adding Nomad variables to your job specifications. This enable you to use the same job specification with different configurations. Refer to [Job Specification](/nomad/docs/job-specification) in the Nomad documentation for additional information. +1. Add Terraform Enterprise environment variables to your Nomad job specification to configure Terraform behavior. Refer to the [Terraform Enterprise configuration reference](/terraform/enterprise/deploy/configuration) for additional information. +1. Create a Nomad job specification for operating the Terraform Enterprise agent. Refer to [Custom Worker Image](/terraform/enterprise/deploy/custom-image) for additional information about the Terraform Enterprise agent. +1. Run the Nomad command for pulling the Terraform Enterprise image and installing the binary. + +## Prerequisites + +You can deploy Terraform Enterprise on Nomad version v1.5.0 and newer. + +Complete the following prerequisites before installing Terraform Enterprise on [Nomad](/nomad). + +Refer to the [Nomad clusters on the cloud tutorial](/nomad/tutorials/cluster-setup/cluster-setup-overview) for instructions on how to setup a Nomad cluster. + +### Nomad requirements + +You must provide the following Nomad items. + +Please make sure you have the following environment variables set before running Nomad commands from CLI: + +```bash +export NOMAD_ADDR=http://:4646 +export NOMAD_TOKEN= +export NOMAD_CLIENT_CERT= +export NOMAD_CLIENT_KEY= +export NOMAD_CA_CERT= +``` + +You can read more about the Nomad environment variables [here](/nomad/docs/commands). + +### Prepare the host environment + +Provide a DNS hostname for Terraform Enterprise and the associated TLS certificate. Additionally, you must configure your network so that your host can receive and send traffic. Refer to [Prepare the host environment](/terraform/enterprise/deploy/prepare-host) for details about preparing the host environment. + +### Deploy external storage systems + +Deploy the database and other storage devices so that Terraform can connect to them when the application starts. Refer to [Data storage settings overview](/terraform/enterprise/deploy/storage) for additional information. + +Terraform Enterprise requires the following external services to be present and accessible from the Nomad cluster: + +1. A PostgreSQL database. Refer to [PostgreSQL Requirements for Terraform Enterprise](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/postgres-requirements) for additional information. +1. An S3-compatible storage service, such as AWS S3, Azure Cloud Storage, and Google Cloud Storage. Refer to [External Services Mode](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/operational-mode-requirements#external-services-mode) for additional information. +1. Redis version 6 or 7. Redis Cluster is not supported. + +### Create the deployment configuration + +Create a custom YAML configuration file, for example `/tmp/overrides.yaml`, to override the default values in the Terraform Enterprise Helm chart. The file contains settings for the operational mode, license, TLS certificates, and network configuration. Add any additional configurations necessary for your environment. Refer to [Configuration file overview](/terraform/enterprise/deploy/reference/configuration) for additional information. + +### Create an ACL policy + +Create a token that grants access to the namespace where the Terraform Enterprise agents will run. The Terraform Enterprise job must present the token to the Terraform Enterprise agent so that it can run the agent job that performs Terraform operations. Refer to the [Nomad ACL system fundamentals](https://developer.hashicorp.com/nomad/tutorials/access-control/access-control) tutorial for instructions on how to create ACL policies linked to tokens. + +Create a policy file named `terraform-enterprise-policy.hcl` with the following content, and apply it to the `terraform-enterprise` namespace so that Terraform Enterprise has permission to run and manage agent jobs. + +```hcl +namespace "tfe-agents" { + capabilities = [ + "submit-job", + "dispatch-job", + "list-jobs", + "read-job", + "read-logs" + ] +} +``` + +The following example applies the `terraform-enterprise-policy` policy to the `tfe-job-task` task within the `tfe-job-group` of the `tfe-job` job. + + ```shell-session + $ nomad acl policy apply \ + -namespace terraform-enterprise -job tfe-job \ + -group tfe-job-group -task tfe-job-task \ + terraform-enterprise-policy ./terraform-enterprise-policy.hcl + ``` +Refer to the [Nomad documentation](/nomad/docs/commands/acl/policy/apply) for additional information about applying ACL policies. + +### Enable a workload identity + +Enable a workload identity on the Nomad cluster so that Nomad can inject the Nomad ACL token. The workload identity passes the token using the `NOMAD_TOKEN` environment variable. Refer to [Workload Identity](/nomad/docs/concepts/workload-identity) for additional information. + +Terraform Enterprise does not use workload identities on Nomad v1.4 and older. Instead, you must pass the `NOMAD_TOKEN` directly in the Terraform Enterprise job specification. Refer to [Configure Terraform Enterprise Nomad job specification](/terraform/enterprise/deploy/nomad#configure-terraform-enterprise-nomad-job-specification) for additional information. + +### Create namespaces + +Create at least two separate Nomad namespaces to provide better isolation, security, and control over Nomad workloads. One namespace is for the Terraform Enterprise job and the second is for the Terraform Enterprise agent job. Refer to the [Namespaces tutorial](/nomad/tutorials/manage-clusters/namespaces) in the Nomad documentation for instructions on how to create a namespace. + +## Parameterize Terraform Enterprise settings + +Add the following variables to your Terraform Enterprise Nomad job: + +- `tfe_license`: Specifies the Terraform Enterprise license key. +- `tfe_hostname`: Specifies the hostname of the Terraform Enterprise instance. +- `tfe_tls_cert_file`: Specifies the base64 encoded TLS certificate file. +- `tfe_tls_key_file`: Specifies the base64 encoded TLS key file. +- `tfe_tls_ca_bundle_file`: Specifies the base64 encoded TLS CA bundle file. + +Create file `var.hcl` and add the following variables: + +```hcl + path = "nomad/jobs/tfe-job/tfe-group/tfe-task" + namespace = "terraform-enterprise" + + items { + # The field should contain the base64 encoded value of the cert. Mappped to the TFE_TLS_CERT_FILE environment variable. + tfe_tls_cert_file = "" + + # The field should contain the base64 encoded value of the bundle. Mapped to the TFE_TLS_CA_BUNDLE_FILE environment variable. + tfe_tls_ca_bundle_file = "" + + # The field should contain the base64 encoded value of the key. Mappped to the TFE_TLS_KEY_FILE environment variable. + tfe_tls_key_file = "" + + # A valid TFE license. Mapped to the TFE_LICENSE environment variable. + tfe_license = "" + + # The hostname of the TFE instance. Mapped to the TFE_HOSTNAME environment variable. + tfe_hostname = "" + } + ``` + +`path` variable specifies the path where the Nomad variables will be stored. +Update the `path` variable if default value of `job_name` is overridden in the `var.hcl` file. + +Apply the Nomad variables to the job specification by running the following command: + ```bash + $ nomad var put @var.hcl + ``` + +Refer to [Nomad Variables](/nomad/docs/concepts/variables) in the Nomad documentation for additional information. + +Refer to the [example Nomad job specification](#nomad-job-specification) for additional guidance. + +## Configure Terraform Enterprise Nomad job specification + +This job is responsible for running the Terraform Enterprise image on Nomad. + +Refer to the [example Nomad job specification for TFE](/terraform/enterprise/flexible-deployments/install/nomad/install#nomad-job-specification-for-tfe) for a template that you can copy and modify. + +Pass the variables that you defined in the [Parameterize Terraform Enterprise settings](#parameterize-terraform-enterprise-settings) section. Refer to [Assigning Values to job Variables](/nomad/docs/job-specification/hcl2/variables#assigning-values-to-job-variables) in the Nomad documentation for instructions. The following variables are required: + +- `tfe_image_username` +- `tfe_image_password` + +The following variables are optional: + +- `tfe_image` +- `namespace` + +Terraform Enterprise does not use workload identities on Nomad v1.4 and older. If you are deploying to Nomad v1.4.x or older, complete the following steps: + +1. Manually create an ACL token. Refer to [Command: `acl token create`](/nomad/docs/commands/acl/token/create) in the Nomad documentation for instructions. +1. Remove the `identity` stanza. +1. Pass the ACL token to the Terraform Enterprise job. Export the token to the `NOMAD_TOKEN` environment variable and add it to the `env` stanza. + +Refer to the [example Nomad job specification](#nomad-job-specification) for a template that you can copy and modify. Run the `nomad job run` command and specify job configuration to submit the changes. Refer to [Command: job run](/nomad/docs/commands/job/run) in the Nomad documentation for additional information about the command. + +## Configure a Nomad batch job to run the Terraform Enterprise agent + +Terraform Enterprise creates ephemeral agent jobs to execute Terraform runs when operating in Remote execution mode. A run is an invocation of the `terraform plan` or `terraform apply` command. To enable this behavior, create a Nomad batch job specification that defines how Terraform Enterprise agents run on Nomad. + +You can use the [example Nomad batch job specification for TFE agent](/terraform/enterprise/flexible-deployments/install/nomad/install#nomad-batch-job-specification) as a template to copy and change. After registering the batch job in Nomad, manual execution of batch jobs is not required. When Terraform executes a plan or apply, it automatically dispatches the jobs as Nomad batch jobs and completes the run. + +Refer to [Batch Job](/nomad/docs/job-specification/job#batch-job) in the Nomad documentation for more information. + +## Run the Nomad jobs + +### 1. Deploy Terraform Enterprise Instance + +Run the `nomad job run` command to pull the Terraform Enterprise image and install the application. Pass the Terraform Enterprise job specification as the command argument. You must also provide the credentials for the registry to download the image: + +```shell-session +$ nomad job run \ + -var="tfe_image_username=$TFE_REGISTRY_USERNAME" \ + -var="tfe_image_password=$TFE_REGISTRY_PASSWORD" \ + +``` + +### 2. Register Terraform Agent Job +Run the `nomad job run` command and pass the Terraform agent job specification to register the batch job in Nomad: + +```shell-session +$ nomad job run +``` + +Alternatively, you can pull and install the Terraform Enterprise image using the Terraform Enterprise On Nomad Pack tool. Refer to the [`terraform-enterprise-fdo-nomad-pack` repository](https://github.com/hashicorp/nomad-pack-community-registry/tree/main/packs/tfe_fdo_nomad) on GitHub for instructions. + +## Post installation tasks + +Complete the following tasks after starting Terraform Enterprise. + +### Review startup checks + +When you start Terraform Enterprise, several startup checks also run to prevent errors related to invalid configurations or certificates, as well as other issues that could prevent the application from running successfully or safely. Refer to the [startup checks reference](/terraform/enterprise/deploy/reference/startup-checks) for additional information. + +### Create initial admin user + +[Provision your first administrative user](/terraform/enterprise/deploy/initial-admin-user) and start using Terraform Enterprise. + +## Deploy a load balancer to the Nomad Cluster (Optional) + +You can deploy a load balancer to the Nomad cluster so that you can manage external traffic loads. Refer to the [load balancer tutorial](/nomad/tutorials/load-balancing) in the Nomad documentation for instructions. +Refer to the [example NGINX configuration](/terraform/enterprise/flexible-deployments/install/nomad/install#nomad-nginx-job-for-load-balancing) for additional guidance. + +## Examples + +You can copy the following examples and modify the values to match your deployment. + +### Nomad job specification + +The following example configuration defines a Terraform Enterprise job specification. You can copy the example and modify the values to match your deployment. +This example uses minimal configuration options. Refer to [Configuration Reference](/terraform/enterprise/flexible-deployments/install/configuration) +for a list of all the configuration options. + +```hcl +variable "tfe_image" { + description = "The TFE image to use" + type = string + default = "images.releases.hashicorp.com/hashicorp/terraform-enterprise:v202408-1" +} + +variable "tfe_image_username" { + description = "Username for the registry to download TFE image" + type = string +} + +variable "tfe_image_password" { + description = "Password for the registry to download TFE image" + type = string +} + +variable "namespace" { + description = "The Nomad namespace to run the job" + type = string + default = "" +} + +job "tfe-job" { + datacenters = ["dc1"] + namespace = var.namespace + type = "service" + + group "tfe-group" { + count = 1 + + restart { + attempts = 3 + delay = "60s" + interval = "10m" + mode = "fail" + } + + update { + max_parallel = 1 + min_healthy_time = "30s" + healthy_deadline = "15m" + progress_deadline = "20m" + health_check = "checks" + } + + network { + port "tfe" { + # static port is not required if load balancer is used. + static = 443 + to = 8443 + } + port "tfehttp" { + # static port is not required if load balancer is used. + static = 80 + to = 8080 + } + port "vault" { + to = 8201 + } + } + + service { + name = "tfe-svc" + port = "tfe" + provider = "nomad" + check { + name = "tfe_probe" + type = "http" + protocol = "https" + port = "tfe" + path = "/_health_check" + interval = "5s" + timeout = "2s" + method = "GET" + } + } + + task "tfe-task" { + driver = "docker" + + identity { + # Expose Workload Identity in NOMAD_TOKEN env var + env = true + } + + template { + data = < | docker login --username terraform images.releases.hashicorp.com --password-stdin + ``` + +1. Pull the Terraform Enterprise image from the registry. + + ```shell-session + $ docker pull images.releases.hashicorp.com/hashicorp/terraform-enterprise: + ``` + +1. Create a new project. + + ```shell-session + $ oc new-project + ``` + +1. Create an image pull secret in `` to fetch the `terraform-enterprise` container from the ``. This URL can be `images.releases.hashicorp.com`, or your internal container registry. If you are using `images.releases.hashicorp.com`, use `terraform` as the `` parameter in the following command with `--docker-password=$(cat /path/to/terraform.hclic)` + + ```shell-session + $ oc create secret docker-registry terraform-enterprise --docker-server= --docker-username= --docker-password= -n + ``` + +1. Add the Hashicorp Helm registry: + + ```shell-session + $ helm repo add hashicorp https://helm.releases.hashicorp.com + ``` + +1. Render the `terraform-enterprise` chart with your custom [values file](https://helm.sh/docs/chart_template_guide/values_files/) ``, for example `tmp/overrides.yaml`. + + ```shell-session + $ helm template terraform-enterprise hashicorp/terraform-enterprise –n --values + ``` + +1. Install `terraform-enterprise`, this step can take several minutes. + + ```shell-session + $ helm install terraform-enterprise hashicorp/terraform-enterprise –n --values + ``` + +1. Inspect `terraform-enterprise` pods to verify their successful start. + + ```shell-session + $ oc get pods -n + ``` + + If Terraform Enterprise pods fail to start, refer to [Kubernetes Troubleshooting](/terraform/enterprise/deploy/troubleshoot#kubernetes). + +1. By default, Terraform Enterprise installs a load balancer service. Retrieve the external IP address of this service. + + ```shell-session + $ oc get services -n + ``` + +1. Set up a DNS record that points to your external IP address to enable routing to your ``. A DNS address is required to communicate with Terraform Enterprise, and it is managed outside of OpenShift and the Terraform Enterprise helm chart or application. + +1. Validate the readiness of the Terraform Enterprise application by querying the health check endpoint. + + ```shell-session + $ curl https://tfe.test.hashicorp.com/_health_check + ``` + +## Post installation tasks + +Complete the following tasks after the initial installation. + +### Review startup checks + +When you start Terraform Enterprise, several startup checks also run to prevent errors related to invalid configurations or certificates, as well as other issues that could prevent the application from running successfully or safely. Refer to the [startup checks reference](/terraform/enterprise/deploy/reference/startup-checks) for additional information. + +### Configuring a route + +When you deploy Terraform Enterprise to OpenShift, the Helm chart does not create an [OpenShift route](https://docs.openshift.com/container-platform/latest/networking/routes/route-configuration.html) by default. + +Provisioning a route creates a public-facing URL at which users can access the Terraform Enterprise UI and API. + +```shell-session +$ oc expose svc/terraform-enterprise --hostname terraform-enterprise.apps. --name terraform-enterprise -n +``` +-> **Note:** Use the options on the `oc expose` command to tailor the route to the needs of your environment. + +The newly created route can then be retrieved from the cluster: + +```shell-session +$ oc get routes +NAME HOST/PORT PATH SERVICES PORT TERMINATION WILDCARD +terraform-enterprise terraform-enterprise.apps. terraform-enterprise https-port reencrypt/Redirect None +``` + +### Create the initial admin user + +[Provision your first administrative user](/terraform/enterprise/deploy/initial-admin-user) and start using Terraform Enterprise. + +### Extend or fork the OpenShift `terraform-enterprise` helm chart + +The [Terraform Enterprise Helm Chart](https://github.com/hashicorp/terraform-enterprise-helm) is intended to meet the needs of the majority of our users. Many OpenShift primitives, such as routing, are absent in the `terraform-enterprise` Helm chart. You can fork our Helm chart and adapt it to your organization’s requirements. Alternatively, you can use the `terraform-enterprise` Helm chart as a [sub-chart](https://helm.sh/docs/chart_template_guide/subcharts_and_globals/), thus relegating OpenShift primitives to the parent chart to be deployed around the `terraform-enterprise` chart contents. + +If you contact HashiCorp support, include your custom Helm chart alongside your support bundle to ensure support has all the information they need. + +## Example deployment configuration + +The following example configuration deploys Terraform Enterprise to OpenShift in Azure with hosted external services. The configuration is based on cloud native hosted PostgreSQL, storage, or Redis cache services. You can copy the example configuration and modify the values to per your environment. Refer to [Configuration Reference](/terraform/enterprise/deploy/reference/configuration) +for a list of all configuration options. + +The example also depends on the following conditions: + +- Values under `.env.variables` are set as a `ConfigMap` and mounted as Terraform Enterprise environment variables. +- Values under `.env.secrets` are set as Kubernetes secrets and mounted as Terraform Enterprise environment variables. +- Extend the `env.configMapRefs[]` or `env.secretRefs[]` with your own resources to add additional `ConfigMap` or `Secret` resources within your environment configuration. + +- Values marked `BASE_64_ENCODED*` indicate that the value given must be base 64 encoded. If you are using this certificate configuration to host Terraform Enterprise web traffic, this value must be valid with the `env.TFE_HOSTNAME`, or match the wildcard pattern. + +```yaml +replicaCount: +tls: + certData: + keyData: + caCertData: +image: + repository: images.releases.hashicorp.com + name: hashicorp/terraform-enterprise + tag: +openshift: + enabled: true +env: + variables: + TFE_HOSTNAME: + TFE_IACT_SUBNETS: + + # Database settings. + TFE_DATABASE_HOST: + TFE_DATABASE_NAME: + TFE_DATABASE_PARAMETERS: + TFE_DATABASE_USER: + + # Redis settings. + TFE_REDIS_HOST: + TFE_REDIS_USE_TLS: + TFE_REDIS_USE_AUTH: + TFE_REDIS_USER: + + # Azure container storage settings. + TFE_OBJECT_STORAGE_TYPE: azure + TFE_OBJECT_STORAGE_AZURE_ACCOUNT_NAME: + TFE_OBJECT_STORAGE_AZURE_CONTAINER: + TFE_OBJECT_STORAGE_AZURE_ENDPOINT: + + # Terraform Enterprise on OpenShift Required settings + TFE_RUN_PIPELINE_IMAGE: + TFE_RUN_PIPELINE_KUBERNETES_IMAGE_PULL_SECRET_NAME: + + secrets: + TFE_DATABASE_PASSWORD: '' + TFE_OBJECT_STORAGE_AZURE_ACCOUNT_KEY: '' + TFE_REDIS_PASSWORD: '' + TFE_LICENSE: '' + TFE_ENCRYPTION_PASSWORD: '' +``` + + +Refer to the following materials for additional guidance on setting up Helm chart values files: +- [Terraform Enterprise Helm repository](https://github.com/hashicorp/terraform-enterprise-helm) +- [Release version tags](/terraform/enterprise/releases) +- Generic reference for [values file](https://helm.sh/docs/chart_template_guide/values_files/) to override the default values in the Helm chart. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/podman.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/podman.mdx new file mode 100644 index 000000000..eb29ccb0a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/podman.mdx @@ -0,0 +1,493 @@ +--- +page_title: Deploy Terraform Enterprise to Podman +description: >- + Learn how to deploy Terraform Enterprise using Podman. +--- + +# Deploy Terraform Enterprise to Podman + +This topic describes how to install and run Terraform Enterprise on Podman. These installation steps set up a rootful Podman installation with a non-root user so that the Podman service runs as root while processes within the Terraform Enterprise container run as non-root. + +## Overview + +Complete the following steps to install Terraform Enterprise: + +1. Complete the prerequisites. +1. Set up installation folders and files. +1. Download and install image. +1. Apply the deployment configuration. + +## Prerequisites + +Complete the following tasks before attempting to install Terraform Enterprise. + +### Prepare the deployment environment + +Set up a host instance and provide a DNS hostname for Terraform Enterprise and the associated TLS certificate. Additionally, you must configure your network so that your host can receive and send traffic. Refer to [Prepare the host environment](/terraform/enterprise/deploy/prepare-host) for details about preparing the host environment. + +### Deploy storage systems for `active` and `external` mode + +If you intend to operate Terraform Enterprise in `active` or `external` mode, deploy the database and other storage devices so that Terraform can connect to them when the application starts. Refer to [Data storage settings overview](/terraform/enterprise/deploy/configuration/storage) for additional information. + +### Create the deployment configuration + +Create a deployment configuration file and specify settings for the operational mode, license, TLS certificates, and network configuration. Add any additional configurations necessary for your environment. Refer to [Configuration file overview](/terraform/enterprise/deploy/configuration/) for additional information. + +## Set up installation folders and files + +1. Connect to the host instance. +1. Create a dedicated directory for the Terraform Enterprise installation files +1. Navigate to the installation directory. +1. Create a `certs` directory. +1. Place your TLS certificate (`cert.pem`), TLS private key (`key.pem`), and CA certificates bundle (`bundle.pem`) inside inside the`certs` directory. If you do not have a CA certificates bundle, place your TLS certificate (`cert.pem`) inside `bundle.pem` instead. +1. Place your deployment configuration file into the Terraform Enterprise installation directory. Refer to [Example deployment configurations](#example-deployment-configurations) for pre-formatted configurations that you can copy and modify. Refer to the [configuration reference](/terraform/enterprise/deploy/reference/configuration) for information about all deployment configuration settings. + +## Download and install image + + 1. Log in to the Terraform Enterprise container image registry, using `terraform` + as the username, and your Hashicorp Terraform Enterprise license as the password: + + ```shell-session + # echo "" | podman login --username terraform images.releases.hashicorp.com --password-stdin + ``` + + 1. Pull the Terraform Enterprise image from the registry. + + ```shell-session + # podman pull images.releases.hashicorp.com/hashicorp/terraform-enterprise: + ``` + +## Apply the deployment configuration + +Refer to [Deployment configuration reference](/terraform/enterprise/deploy/reference/configuration) for a list of all the configuration options. + + 1. Create a Terraform Enterprise pod by running the following command: + + ```shell-session + # podman kube play + ``` + + 1. In a separate terminal session, you can monitor the logs by running the following command: + + ```shell-session + # podman logs -f + ``` + + 1. Monitor the health of the application until it starts reporting healthy with the following command: + + ```shell-session + # podman exec tfe-health-check-status + ``` + +## Post installation tasks actions + +Complete the following tasks after the initial installation. + +### Review startup checks + +When you start Terraform Enterprise, several startup checks also run to prevent errors related to invalid configurations or certificates, as well as other issues that could prevent the application from running successfully or safely. Refer to the [startup checks reference](/terraform/enterprise/deploy/reference/startup-checks) for additional information. + +### Create the initial admin user + +[Provision your first administrative user](/terraform/enterprise/deploy/initial-admin-user) and start using Terraform Enterprise. + +### Service management + +To learn more about managing the lifecycle of Podman pods, refer to [the Podman docs for more information about pods](https://podman.io/). +We have included possible options for managing a pod's lifecycle on a Red Hat Enterprise Linux (RHEL) host for convenience. + +### Manage Podman service + +Complete the following steps to create a `systemd` service that automatically starts your pod and its containers. We +recommend using [Quadlet](https://www.redhat.com/sysadmin/quadlet-podman), which is an opinionated tool for running Podman +containers, to deploy `systemd`. Quadlet generates a `systemd` service that manages the Terraform Enterprise pod and +all containers, including the internal infrastructure container. + + 1. Ensure the Terraform Enterprise pod is not running. + + 1. Navigate to `/etc/containers/systemd/`. Define the service files in this directory. + + 1. Create a Quadlet unit file for the Terraform Enterprise pod and container at `/etc/containers/systemd/terraform-enterprise.kube`: + ```ini + [Install] + WantedBy=default.target + [Service] + Restart=always + [Kube] + Yaml=tfe.yaml + ``` + + 1. Copy your Kubernetes YAML file to `/etc/containers/systemd/tfe.yaml`: + ```shell-session + # cp /etc/containers/systemd/tfe.yaml + ``` + + 1. Reload the `systemd` daemon and enable the service: + ```shell-session + # systemctl daemon-reload + # systemctl start terraform-enterprise.service + ``` + + 1. Check the status of your service: + ```shell-session + # systemctl status terraform-enterprise.service + + ● terraform-enterprise.service + Loaded: loaded (/etc/containers/systemd/terraform-enterprise.kube; generated) + Active: active (running) since Sun 2024-02-25 21:15:55 UTC; 15min ago + Main PID: 35893 (conmon) + Tasks: 4 (limit: 404901) + Memory: 5.2M + CGroup: /system.slice/terraform-enterprise.service + ├─35893 /usr/bin/conmon --api-version 1 -c 74f1271d9a481711950c62b509f126c3fdf8678a9d552c5ccc692eb6ed5cf4d1 -u 74f1271d9a481711950c62b509f126c3fdf8678a9d552c5ccc692eb6ed5cf4d1 -> + ├─36028 /usr/sbin/dnsmasq -u root --conf-file=/run/containers/cni/dnsname/podman-default-kube-network/dnsmasq.conf + ├─36030 /usr/bin/conmon --api-version 1 -c 973d3ff4f7ada5880a9947be4d90b3d556c7ce841037de34c7eaa07c044a3ec0 -u 973d3ff4f7ada5880a9947be4d90b3d556c7ce841037de34c7eaa07c044a3ec0 -> + └─36083 /usr/bin/conmon --api-version 1 -c 435ea68e87dbef3c0965ffdfb9fe1fc36c5500a63eb00dc0fe2499aaa560a563 -u 435ea68e87dbef3c0965ffdfb9fe1fc36c5500a63eb00dc0fe2499aaa560a563 -> + ``` + +## Example configurations + +You can copy one of the following example configurations and modify the values to per your environment. Refer to [Configuration Reference](/terraform/enterprise/deploy/reference/configuration) +for a list of all configuration options. + + +### Example `disk` mode configuration + +The following Kubernetes YAML deploys Terraform Enterprise in `disk` mode. In this mode, Terraform Enterprise runs as a pod composed of a Terraform Enterprise container. + +```yaml +--- +apiVersion: "v1" +kind: "Pod" +metadata: + labels: + app: "terraform-enterprise" + name: "terraform-enterprise" +spec: + restartPolicy: "Never" + containers: + - env: + - name: "TFE_OPERATIONAL_MODE" + value: "disk" + - name: "TFE_LICENSE" + value: "" + - name: "TFE_HOSTNAME" + value: "" + - name: "TFE_HTTP_PORT" + value: "8080" + - name: "TFE_HTTPS_PORT" + value: "8443" + - name: "TFE_TLS_CERT_FILE" + value: "/etc/ssl/private/terraform-enterprise/cert.pem" + - name: "TFE_TLS_KEY_FILE" + value: "/etc/ssl/private/terraform-enterprise/key.pem" + - name: "TFE_TLS_CA_BUNDLE_FILE" + value: "/etc/ssl/private/terraform-enterprise/bundle.pem" + - name: "TFE_DISK_CACHE_VOLUME_NAME" + value: "terraform-enterprise_terraform-enterprise-cache" + - name: "TFE_ENCRYPTION_PASSWORD" + value: '' + image: "images.releases.hashicorp.com/hashicorp/terraform-enterprise:" + name: "terraform-enterprise" + ports: + - containerPort: 8080 + hostPort: 80 + - containerPort: 8443 + hostPort: 443 + - containerPort: 9090 + hostPort: 9090 + securityContext: + capabilities: + add: + - "CAP_IPC_LOCK" + readOnlyRootFilesystem: true + seLinuxOptions: + type: "spc_t" + volumeMounts: + - mountPath: "/etc/ssl/private/terraform-enterprise" + name: "certs" + - mountPath: "/var/log/terraform-enterprise" + name: "log" + - mountPath: "/run" + name: "run" + - mountPath: "/tmp" + name: "tmp" + - mountPath: "/var/lib/terraform-enterprise" + name: "data" + - mountPath: "/run/docker.sock" + name: "docker-sock" + - mountPath: "/var/cache/tfe-task-worker/terraform" + name: "terraform-enterprise_terraform-enterprise-cache-pvc" + volumes: + - hostPath: + path: "" + type: "Directory" + name: "certs" + - emptyDir: + medium: "Memory" + name: "log" + - emptyDir: + medium: "Memory" + name: "run" + - emptyDir: + medium: "Memory" + name: "tmp" + - hostPath: + path: "" + type: "Directory" + name: "data" + - hostPath: + path: "/run/podman/podman.sock" + type: "File" + name: "docker-sock" + - name: "terraform-enterprise_terraform-enterprise-cache-pvc" + persistentVolumeClaim: + claimName: "terraform-enterprise_terraform-enterprise-cache" +``` + +### Example `external` mode configuration + +The following Kubernetes YAML configuration deploys Terraform Enterprise in `external` mode. In this mode, Terraform Enterprise runs as a pod composed of a Terraform Enterprise container. + +```yaml +--- +apiVersion: "v1" +kind: "Pod" +metadata: + labels: + app: "terraform-enterprise" + name: "terraform-enterprise" +spec: + restartPolicy: "Never" + containers: + - env: + - name: "TFE_LICENSE" + value: "" + - name: "TFE_HOSTNAME" + value: "" + - name: "TFE_OPERATIONAL_MODE" + value: "external" + - name: "TFE_HTTP_PORT" + value: "8080" + - name: "TFE_HTTPS_PORT" + value: "8443" + - name: "TFE_ENCRYPTION_PASSWORD" + value: '' + - name: "TFE_DISK_CACHE_VOLUME_NAME" + value: "terraform-enterprise_terraform-enterprise-cache" + - name: "TFE_TLS_CA_BUNDLE_FILE" + value: "/etc/ssl/private/terraform-enterprise/bundle.pem" + - name: "TFE_TLS_CERT_FILE" + value: "/etc/ssl/private/terraform-enterprise/cert.pem" + - name: "TFE_TLS_KEY_FILE" + value: "/etc/ssl/private/terraform-enterprise/key.pem" + + + # Database settings. See the configuration reference for more settings. + - name: "TFE_DATABASE_HOST" + value: "" + - name: "TFE_DATABASE_NAME" + value: "" + - name: "TFE_DATABASE_PARAMETERS" + value: "" + - name: 'TFE_DATABASE_PASSWORD' + value: "" + - name: "TFE_DATABASE_USER" + value: "" + + # Object storage settings. See the configuration reference for more settings. + - name: "TFE_OBJECT_STORAGE_TYPE" + value: "s3" + - name: "TFE_OBJECT_STORAGE_S3_ACCESS_KEY_ID" + value: "" + - name: "TFE_OBJECT_STORAGE_S3_SECRET_ACCESS_KEY" + value: '' + - name: "TFE_OBJECT_STORAGE_S3_BUCKET" + value: "" + - name: "TFE_OBJECT_STORAGE_S3_REGION" + value: "" + + image: "images.releases.hashicorp.com/hashicorp/terraform-enterprise:" + name: "terraform-enterprise" + ports: + - containerPort: 8080 + hostPort: 80 + - containerPort: 8443 + hostPort: 443 + - containerPort: 9090 + hostPort: 9090 + securityContext: + capabilities: + add: + - "CAP_IPC_LOCK" + readOnlyRootFilesystem: true + seLinuxOptions: + type: "spc_t" + volumeMounts: + - mountPath: "/etc/ssl/private/terraform-enterprise" + name: "certs" + - mountPath: "/var/log/terraform-enterprise" + name: "log" + - mountPath: "/run" + name: "run" + - mountPath: "/tmp" + name: "tmp" + - mountPath: "/run/docker.sock" + name: "docker-sock" + - mountPath: "/var/cache/tfe-task-worker/terraform" + name: "terraform-enterprise_terraform-enterprise-cache-pvc" + volumes: + - hostPath: + path: "" + type: "Directory" + name: "certs" + - emptyDir: + medium: "Memory" + name: "log" + - emptyDir: + medium: "Memory" + name: "run" + - emptyDir: + medium: "Memory" + name: "tmp" + - hostPath: + path: "/run/podman/podman.sock" + type: "File" + name: "docker-sock" + - name: "terraform-enterprise_terraform-enterprise-cache-pvc" + persistentVolumeClaim: + claimName: "terraform-enterprise_terraform-enterprise-cache" +``` + +### Example `active-active` mode configuration + +The following Kubernetes YAML configuration deploys Terraform Enterprise in `active-active` mode. In this mode, +each node runs a Podman pod composed of a Terraform Enterprise container. + +```yaml +--- +apiVersion: "v1" +kind: "Pod" +metadata: + labels: + app: "terraform-enterprise" + name: "terraform-enterprise" +spec: + containers: + - env: + - name: "TFE_LICENSE" + value: "" + - name: "TFE_HOSTNAME" + value: "" + - name: "TFE_HTTP_PORT" + value: "8080" + - name: "TFE_HTTPS_PORT" + value: "8443" + - name: "TFE_OPERATIONAL_MODE" + value: "active-active" + - name: "TFE_ENCRYPTION_PASSWORD" + value: '' + - name: "TFE_DISK_CACHE_VOLUME_NAME" + value: "terraform-enterprise_terraform-enterprise-cache" + - name: "TFE_TLS_CA_BUNDLE_FILE" + value: "/etc/ssl/private/terraform-enterprise/bundle.pem" + - name: "TFE_TLS_CERT_FILE" + value: "/etc/ssl/private/terraform-enterprise/cert.pem" + - name: "TFE_TLS_KEY_FILE" + value: "/etc/ssl/private/terraform-enterprise/key.pem" + + # Database settings. See the configuration reference for more settings. + - name: "TFE_DATABASE_HOST" + value: "" + - name: "TFE_DATABASE_NAME" + value: "" + - name: "TFE_DATABASE_PARAMETERS" + value: "" + - name: "TFE_DATABASE_PASSWORD" + value: '' + - name: "TFE_DATABASE_USER" + value: "" + + # Object storage settings. See the configuration reference for more settings. + - name: "TFE_OBJECT_STORAGE_TYPE" + value: "s3" + - name: "TFE_OBJECT_STORAGE_S3_ACCESS_KEY_ID" + value: "" + - name: "TFE_OBJECT_STORAGE_S3_SECRET_ACCESS_KEY" + value: '' + - name: "TFE_OBJECT_STORAGE_S3_BUCKET" + value: "" + - name: "TFE_OBJECT_STORAGE_S3_REGION" + value: "" + + # Redis settings. See the configuration reference for more settings. + - name: "TFE_REDIS_HOST" + value: "" + - name: "TFE_REDIS_PASSWORD" + value: '' + - name: "TFE_REDIS_USER" + value: "" + - name: "TFE_REDIS_USE_AUTH" + value: "" + - name: "TFE_REDIS_USE_TLS" + value: "" + + # Vault cluster settings. + # If you are using the default internal vault, this should be the private routable IP address of the node itself. + - name: "TFE_VAULT_CLUSTER_ADDRESS" + value: "https://10.0.66.189:8201" + + image: "images.releases.hashicorp.com/hashicorp/terraform-enterprise:" + name: "terraform-enterprise" + ports: + - containerPort: 8080 + hostPort: 80 + - containerPort: 8443 + hostPort: 443 + - containerPort: 8201 + hostPort: 8201 + - containerPort: 9090 + hostPort: 9090 + securityContext: + capabilities: + add: + - "CAP_IPC_LOCK" + readOnlyRootFilesystem: true + seLinuxOptions: + type: "spc_t" + volumeMounts: + - mountPath: "/etc/ssl/private/terraform-enterprise" + name: "certs" + - mountPath: "/var/log/terraform-enterprise" + name: "log" + - mountPath: "/run" + name: "run" + - mountPath: "/tmp" + name: "tmp" + - mountPath: "/run/docker.sock" + name: "docker-sock" + - mountPath: "/var/cache/tfe-task-worker/terraform" + name: "terraform-enterprise_terraform-enterprise-cache-pvc" + restartPolicy: "Never" + volumes: + - hostPath: + path: "" + type: "Directory" + name: "certs" + - emptyDir: + medium: "Memory" + name: "log" + - emptyDir: + medium: "Memory" + name: "run" + - emptyDir: + medium: "Memory" + name: "tmp" + - hostPath: + path: "/run/podman/podman.sock" + type: "File" + name: "docker-sock" + - name: "terraform-enterprise_terraform-enterprise-cache-pvc" + persistentVolumeClaim: + claimName: "terraform-enterprise_terraform-enterprise-cache" +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/prepare-host.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/prepare-host.mdx new file mode 100644 index 000000000..67b79b369 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/prepare-host.mdx @@ -0,0 +1,156 @@ +--- +page_title: Prepare host environment +description: This topic describes how to configure the host environment for running Terraform Enterprise. +--- + +# Prepare the Terraform Enterprise host environment + +This topic describes how to prepare a Linux instance on your cloud provider to host a non-Replicated Terraform Enterprise deployment. For information about deploying to Replicated, refer to [Deploy to Replicated](/terraform/enterprise/deploy/replicated). + +## Overview + +Complete the following steps to set up your Terraform Enterprise host environment: + +1. Determine which runtime is most suitable for your architecture. +1. Provide a DNS hostname for Terraform Enterprise and the associated TLS certificate. +1. Configure your network so that your host can receive and send traffic. + +## Requirements + +The requirements depend on the runtime platform you intend to use. + +### Docker + +Terraform Enterprise supports the following versions of Docker Engine that can run amd64 containers. We do not publish arm64 images: + +- 23.0.x +- 24.0.x +- 25.0.x +- 26.0.x +- 26.1.x + +### Kubernetes + +You can create a host for your Terraform Enterprise Kubernetes cluster on the following cloud service providers: + +- Amazon Elastic Kubernetes Service (EKS) +- Google Cloud Google Kubernetes Engine (GKE) + - GKE Autopilot. Refer to [Increase run capacity](/terraform/enterprise/deploy/kubernetes/scale/run-capacity) for additional information. +- Azure Kubernetes Service (AKS) + + +You can install Terraform Enterprise using the Helm CLI version 3.0 or later. Refer to the [Helm documentation](https://helm.sh/docs/intro/install/) for instructions on installing Helm. + +### Nomad + +- Nomad v1.5.0 and newer. + +### OpenShift + +You can create a host for your Terraform Enterprise OpenShift cluster on the following cloud service providers: + +- AWS Elastic Kubernetes Service (EKS) +- Google Cloud Google Kubernetes Engine (GKE) +- Azure Azure Kubernetes Service (AKS) + +You can install Terraform Enterprise using the Helm CLI version 3.0 or later. Refer to the [Helm documentation](https://helm.sh/docs/intro/install/) for instructions on installing Helm. + +### Podman + +- Podman v4.3.0 or later. +- If installing on Red Hat Enterprise Linux (RHEL), RHEL 8 or later is required. + +## Install the runtime + +Refer to the documentation for your runtime for installation instructions: + +- [Install Docker Engine](https://docs.docker.com/engine/install/) for your operating system. +- [Install Kubernetes](https://kubernetes.io/docs/tasks/tools/) +- [Install OpenShift](https://docs.openshift.com/container-platform/latest/installing/overview/index.html) +- [Install Podman](https://podman.io/docs/installation) +- [Install Nomad](/nomad/docs/install) + +### Enable the Podman socket + +If you are deploying to Podman, set up Podman’s docker-compatible REST API that runs as a `systemd` socket-activated service: + +```shell-session +$ systemctl enable --now podman.socket +``` + +### Set the security context for Podman on RHEL and SELinux + +We recommend adding `type: spc_t` to the `kube.yaml` file when using volumes for an unprivileged Podman container on an SELinux-enabled system. This setting ensures the correct permissions are in place to access the volume when Terraform Enterprise creates the pod and container. + +Specify the value in the Kubernetes pod specification's security context: + +```yaml +"securityContext": + "seLinuxOptions": + "type": "spc_t" +``` + +## Assign a DNS hostname + +Terraform Enterprise requires a DNS hostname so that it is accessible to users and services. Refer to the documentation for your cloud provider for instructions. + +You can add a secondary hostname so that users can access Terraform Enterprise using an alternative address. For example, you can provide an address for OIDC workload identity federation or to let external users to interact with Terraform Enterprise. + +Refer to [Configure network settings](/terraform/enterprise/deploy/configuration/network) for instructions. + +## Create TLS certificates + +Generate the following TLS certificates: + +- `cert.pem`: The end-entity certificate for your DNS hostname with any intermediate certificates appended to it. +- `key.pem`: The private key for the end-entity certificate. Must not be protected by a passphrase. +- `bundle.pem`: Additional certificates to be added to the Certificate Authority (CA) bundle. + +If your certificate files are from Let’s Encrypt, the file names map to the following Terraform Enterprise files: + +| Terraform Enterprise | Let's Encrypt | +| --- | --- | +| key.pem | privkey.pem | +| cert.pem | fullchain.pem | +| bundle.pem | fullchain.pem | + +If you do not have a certificate, you can generate a self-signed certificate. + +The following example uses the `openssl` command to generate an RSA key and certificate for `MyOrganization`. Specify details about your organization in the `-subj` flag or omit and enter them when prompted. Refer to the [OpenSSL documentation](https://docs.openssl.org/master/man1/openssl-req/) for information about forming the command. The `-nodes` option is required because Terraform Enterprise cannot use a private key that is protected by a passphrase. + +```shell-session +openssl req -nodes -x509 -sha256 -newkey rsa:4096 \ + -keyout cert.key \ + -out cert.crt \ + -days 356 \ + -subj "/C=US/ST=CA/L=San Francisco/O=MyOrganization/OU=Global/CN=example.com" \ + -addext "subjectAltName=DNS:example.com" +``` + +When generating the key, replace `` with the Terraform Enterprise hostname: + +```shell-session +You are about to be asked to enter information that will be incorporated +into your certificate request. +What you are about to enter is what is called a Distinguished Name or a DN. +There are quite a few fields but you can leave some blank +For some fields there will be a default value, +If you enter '.', the field will be left blank. +----- +Country Name (2 letter code) [AU]:US +State or Province Name (full name) [Some-State]:California +Locality Name (eg, city) []:San Francisco +Organization Name (eg, company) [Internet Widgits Pty Ltd]:HashiCorp, Inc. +Organizational Unit Name (eg, section) []:Engineering +Common Name (e.g. server FQDN or YOUR name) []: +Email Address []: +``` + +Copy the `cert.pem` file to a new file named `bundle.pem`: + +```shell-session +$ cp cert.pem bundle.pem +``` + +## Configure network access +You must configure the host to allow traffic to and from the Linux instance that Terraform Enterprise runs in. Refer to [Configure network access](/terraform/enterprise/deploy/configuration/network) for instructions. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/application-security.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/application-security.mdx new file mode 100644 index 000000000..eb0a2f4fa --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/application-security.mdx @@ -0,0 +1,11 @@ +--- +page_title: Terraform Enterprise security reference +description: >- + Learn about Terraform Enterprise application roles and security best practices. +--- + +# Terraform Enterprise security reference + +This page explains the aspects of the Terraform security model that are unique to Terraform Enterprise. We recommend also reviewing the core concepts in [HCP Terraform Security model](/terraform/cloud-docs/architectural-details/security-model). + +@include "replicated-and-fdo/architecture/security-model-partial.mdx" diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/cli.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/cli.mdx new file mode 100644 index 000000000..1a39c4927 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/cli.mdx @@ -0,0 +1,340 @@ +--- +page_title: Terraform Enterprise admin CLI reference +description: >- + Learn how to use `tfectl` subcommands to manage your Terraform Enterprise deployment. +--- + +# Terraform Enterprise admin CLI reference + +This topic provides reference information about `tfectl` commands that enable you to manage and administrate your Terraform Enterprise deployment. + +## Introduction + +Terraform Enterprise includes a command line interface that enable you to change its configuration, stop the application safely, and produce support bundles. You must have access into the Docker container or Kubernetes pod to run these commands. For instructions on connecting to the command line, refer to [Access the Terraform Enterprise command line](/terraform/enterprise/deploy/manage/access-cli). + +## `tfectl` command + +The `tfectl` command is the root of the interface. It exposes a number of commands to perform different operations. + +Most of the commands run directly on the node where Terraform Enterprise executes them. Some commands support a `--node` flag that you can use to specify which node to run a command on. The value of `--node` depends on the runtime environment of the Terraform Enterprise installation i.e: +- Container ID (Docker) +- Pod Name (Kubernetes) +- Hostname + + +Multi node commands are only relevant and possible if you are running Terraform Enterprise on Kubernetes, or on another deployment option using the 'active-active' operational mode. + + +## Gracefully stop work on a node + +This command stops a terraform-enterprise node from executing new plans and applies. It allows the current work to complete before safely stopping the node from picking up any new tasks, which lets you safely stop the application. + +Drain a single node. + +```shell-session +$ tfectl node drain --node NODE_NAME +``` + +If you do not provide the `--node` flag, the command will drain the node you run it on. + +```shell-session +$ tfectl node drain +``` + +Use the `--all` flag to drain all the nodes. + +```shell-session +$ tfectl node drain --all +``` + +Restart the application to resume processing work after draining all the nodes. + +## Support bundle + +The `support bundle` command generates support bundle on a Terraform Enterprise installation. + +Generate a support bundle on a specific node. + +```shell-session +$ tfectl support bundle --node NODE_NAME +``` + +If you do not provide the `--node` flag, Terraform Enterprise will by default generate the support bundle on the same node where you run the command. + +```shell-session +$ tfectl support bundle +``` + +Use the `--all` flag to generate the support bundle on all the nodes. + +```shell-session +$ tfectl support bundle --all +``` + +For mounted disk installations, Terraform Enterprise will generate support bundles in `/run/terraform-enterprise/support-bundles`. Downloading this file makes it immediately available, but it should be disabled once the file has been downloaded. + +For External Services, Active/Active and Kubernetes installations, Terraform Enterprise will upload the support bundles to the same object store bucket where Terraform state files are stored. +Each specific run of the admin `support bundle` command will upload the bundle to a directory with the same JobID, which is a timestamp in +[RFC3339](https://datatracker.ietf.org/doc/html/rfc3339) format (`bucket/node/timestamp`). + +If you are sending a support bundle to HashiCorp Support, package and send all associated bundles to ensure that we have all the necessary information. + +Example upload structure: + +```shell-session +support-bundles +└── 2020-11-10T02:03:05Z + ├── 10.0.0.5 + │ └── 10.0.0.5-support-bundle-timestamp.tar.gz + └── 10.0.0.6 + └── 10.0.0.6-support-bundle-timestamp.tar.gz +``` + +## Enable or disable support bundle downloads + +The `support bundle-download` command enables the administrator of a mounted disk installation to access support bundles via https in the Terraform Enterprise node. + +To enable downloads, use the `--enable` flag. + +```shell-session +$ tfectl support bundle-download --enable +``` + +By enabling this feature, you will be able to download support bundles from `https://${TFE_HOSTNAME}/_support-bundles/${timestamp}/${filename}`. The filename follows the structure of `${node_hostname}-support-bundle-${timestamp}.tar.gz`. + +Once you have finished downloading support bundles, it is recommended to disable this feature using the following command: + +```shell-session +$ tfectl support bundle-download --disable +``` + +If the command is executed in a Terraform Enterprise installation that is not running on a mounted disk, it will have no effect and perform no action. + +## Connect to the internal Rails Console + +At times, it may become necessary to modify the internal state of the Terraform Enterprise application. An example is when you have lost credentials +for all your admin accounts and need to manually set an existing user as an administrator. + +This operation is very **dangerous**, and we strongly advise against using this command without the guidance of HashiCorp support. +Once you have a concrete action plan on what needs to be changed via the Rails console, execute: + +```shell-session +$ tfectl support console +``` + +This will prompt you for confirmation. Only the word `yes` is a valid response to proceed. + +## Review HashiCorp license status + +This command displays the status of the license installed on your Terraform Enterprise application. + +```shell-session +$ tfectl app license +``` + +## Retrieve the initial admin user creation token + +To create the first admin user in your Terraform Enterprise installation, you will need the **Initial Admin Creation Token** or **IACT**. +You can retrieve this from any Terraform Enterprise node using: + +```shell-session +$ tfectl admin token +``` + +This command should return the token value. You can also retrieve the REST resource that will allow you to create your +initial admin user with the IACT token appended at the end via the flag: + +```shell-session +$ tfectl admin token --url +``` + +This will provide the URL formatted to be used with `curl` or `wget`, and it only supports `POST` operations. + +## Generate product usage report + +The `admin usage-report` command generates a product usage report in JSON format that you can view and download. + +```shell-session +$ tfectl admin usage-report +``` + +When in `external` and `active-active` mode and on Kubernetes, Terraform Enterprise uploads the product usage report to the same object store bucket where Terraform state files are stored. + +Each specific run of the admin `usage-report` command generates the product usage report in a new JSON file. + +To send product usage reports to HashiCorp, visit the [**Licensing utilization reporting** page](https://portal.cloud.hashicorp.com/license-utilization/reports/create) and use the upload form. + +## List all Terraform Enterprise installation nodes + +To get a list of valid node values, use the following command: + +```shell-session +$ tfectl node list +``` + +This will return a list of all active nodes in the installation that are sharing the same database connection. + +## View application health + +Terraform Enterprise runs several integral systems for the application's overall health. +To view the health of these systems, run the following command: + +```shell-session +$ tfectl app status +``` + +You can also view the health on other nodes in the Terraform Enterprise installation. To see the status of a specific node, use the `--node` flag, e.g.: + + +```shell-session +$ tfectl app status --node NODE_NAME +``` + +For a health check on every node in the Terraform Enterprise installation, you could run: + +```shell-session +$ tfectl app status --all +``` + +## View application configuration + +Reviewing the actual values used by the Terraform Enterprise application during execution is a useful method to verify +correct configuration. To view it, simply run: + +```shell-session +$ tfectl app config +``` + +This command will print the application's configuration in JSON format, with sensitive values redacted. To see +the configuration without redaction, use: + +```shell-session +$ tfectl app config --unredacted +``` + +However, some values, like the `TLS CA Bundle Data`, are truncated for readability. For the full configuration +without truncation, use: + +```shell-session +$ tfectl app config --full +``` + +You can save the configuration to a file with: + +```shell-session +$ tfectl app config --out /path/to/config.json +``` + +To get the node's configuration from a specific node: + +```shell-session +$ tfectl app config --node NODE_NAME +``` + +To read the configuration from all the nodes in the Terraform Enterprise installation, you can use: + +```shell-session +$ tfectl app config --all +``` + +To convert your Terraform Enterprise configuration into a suitable Docker Compose file format, use the following command: + +```shell-session +$ tfectl app config --format docker +``` +Use this command when migrating from a Replicated installation to another deployment option. + +## Change encryption password + +The `TFE_ENCRYPTION_PASSWORD` is used as a key for envelope encryption. This password is necessary to start and run Terraform Enterprise. The blob data cannot be decrypted without it. To change it, use: + +```shell-session +$ tfectl app rotate-encryption-password +``` + +You'll be prompted for confirmation, where 'yes' is the only acceptable value. Then, you'll need to provide your current +and new passwords: + +```shell-session +$ tfectl app rotate-encryption-password --current CURRENT_PASSWORD --new NEW_PASSWORD +``` + +**WARNING**: After changing the encryption password, restart your Terraform Enterprise nodes with the new password as the value of the `TFE_ENCRYPTION_PASSWORD` environment variable. +Ensure no one is using the system to avoid corrupting the application's state. + +Back up the old password in case you need to restore the application. Otherwise, data in the backup can't be accessed. + +## Trigger startup checks + +Terraform Enterprise runs validations to ensure proper application configuration. Use the following commands to manually trigger the validations: + +```shell-session +$ tfectl app startup-check +``` + +## View ongoing database migrations + +This command retrieves the current version of the ongoing database migrations: + +```shell-session +$ tfectl db last-applied-migration +``` + +## View Terraform Enterprise application version + +This command retrieves the currently running version of Terraform Enterprise: + +```shell-session +$ tfectl app version +``` + +## Mounted disk commands + + + These commands are not relevant if you manage your own database instance or run Terraform Enterprise with an external database. + + +When using `TFE_OPERATIONAL_MODE: disk`, Terraform Enterprise runs its Postgres instance managed through the container. +Admin CLI provides commands for common operations. + +### Create a database backup + +To create backups of the internal database instance, use the following command: + +```shell-session +$ tfectl db backup +``` + +This command will generate the backup in the directory passed via the environment variable `TFE_DISK_PATH`, default `/var/lib/terraform-enterprise`. +The backup filename will be created in the format `TIMESTAMP_hashicorp.db`. ` + +You can specify the backup's destination via the `--out` flag, e.g. + +```shell-session +$ tfectl db backup --out /path/to/backup.db +``` + +### Recreate database indices + +Rebuild Postgres database indices using: + +```shell-session +$ tfectl db reindex +``` + +### Restore database from a backup + +* The execution of this command will **momentarily shut down your Terraform Enterprise instance**. Please make sure that no work +is being executed, and no one is using the instance before running this command. After the restore takes place, Atlas +will come back online. + +* This operation is **irreversible**, once a database backup has been loaded, all data created between the time of the +backup and the date of restoration **will be lost**. + +To restore a database from a backup file, run: + +```shell-session +$ tfectl db restore --file /path/to/backup.db +``` + +Confirmation is needed, with only `yes` as a valid response. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/configuration.mdx new file mode 100644 index 000000000..559e48368 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/configuration.mdx @@ -0,0 +1,748 @@ +--- +page_title: Terraform Enterprise configuration reference +description: >- + Learn about the configuration options for deploying Terraform Enterprise. +--- + +# Terraform Enterprise configuration reference + +This topic contains reference information about the configurations you can specify for Terraform Enterprise. + +## Introduction + +Specify environment variables to configure the operational mode, connections to external systems, and other settings. Specify the variables in a configuration file for your runtime environment, such as a +[Docker Compose file](https://docs.docker.com/compose/compose-file/03-compose-file/), Kubernetes [Helm chart](https://helm.sh/), or in the `env` block of your [Nomad job](/nomad/docs/job-specification/env). Refer to [Create deployment configuration overview](/terraform/enterprise/deploy/configuration) for additional information. + + +## Application settings + +### `TFE_CAPACITY_CONCURRENCY` + +Maximum number of Terraform runs that can execute concurrently on each +Terraform Enterprise node. Defaults to `10`. + +### `TFE_CAPACITY_CPU` + +Maximum number of CPU cores a Terraform run is allowed to use. Set to `0` for +no limit. Defaults to `0`. +Ignored if `TFE_RUN_PIPELINE_DRIVER` is set to `nomad`. + +### `TFE_CAPACITY_MEMORY` + +Maximum amount of memory (MiB) a Terraform run is allowed to use. Defaults to +`2048`. +Ignored if `TFE_RUN_PIPELINE_DRIVER` is set to `nomad`. + +### `TFE_ENCRYPTION_PASSWORD` + +Encryption password used to encrypt and decrypt the internal Vault root token +and unseal key. + +Required when `TFE_VAULT_USE_EXTERNAL` is `false`. + +### `TFE_HOSTNAME` + +Hostname where Terraform Enterprise is accessed (e.g., +`terraform.example.com`). + +Required always. + +### `TFE_HOSTNAME_SECONDARY` + +Specifies a secondary hostname for Terraform Enterprise. You can use this setting for external-facing endpoints, such as OIDC workload identity federation. This hostname must be externally resolvable and configured with appropriate DNS and TLS settings, for example `tfe-external.example.com`. + + Refer to [Configure network access](/terraform/enterprise/deploy/configuration/network) for additional information. + + +### `TFE_LICENSE` + +The raw HashiCorp license (e.g., `02MV4UU4...MSEKE6T2`). Defaults to `""`. + +Required when `TFE_LICENSE_PATH` is unset. + +### `TFE_LICENSE_PATH` + +Path to a file containing the raw HashiCorp license. Must be mounted inside the +container (e.g., `/opt/terraform-enterprise-license`). Defaults to `""`. + +Required when `TFE_LICENSE` is unset. + +### `TFE_LICENSE_REPORTING_OPT_OUT` + +Whether to opt out of reporting licensing information to HashiCorp. Defaults to `false`. + +### `TFE_USAGE_REPORTING_OPT_OUT` + +Whether to opt out of reporting usage information to HashiCorp. Defaults to `false`. + +### `TFE_RUN_PIPELINE_DRIVER` + +Driver for Terraform runs. Must be one of `nomad`, `docker` or `kubernetes`. Defaults to +`docker`. +If set to `nomad`, the `TFE_CAPACITY_CPU` and `TFE_CAPACITY_MEMORY` settings are ignored. + +Required for all deployment options. + +### `TFE_OPERATIONAL_MODE` + +Determines how Terraform Enterprise stores and retrieves data. This variable is required for all runtimes except Kubernetes. + +You can set one of the following values: + +- `disk`: Runs Terraform Enterprise, PostgreSQL database, optional Redis data store, and S3-compatible storage in the same container. In this mode, Terraform Enterprise manages the storage objects. By default, this mode limits the number of Terraform Enterprise instances to one. +- `external`: Runs Terraform and optional Redis store in the same container. In this mode, Terraform Enterprise can manage the Redis store, but you are responsible for managing the PostgreSQL database and S3-compatible storage as external services. By default, this mode limits the number of Terraform Enterprise instances to one. +- `active-active`: Runs Terraform Enterprise in its own container. In this mode, you are responsible for managing the PostgreSQL, optional Redis data store, and S3-compatible storage as external services. As a result, you can deploy more than one instance of Terraform Enterprise. Terraform Enterprise operates in `active-active` mode when it is deployed to Kubernetes. + +Refer to [Configure the operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) for additional information. + +### `TFE_RUN_PIPELINE_IMAGE` + +Container image used to execute Terraform runs. Leave blank to use the default +image that comes with Terraform Enterprise. Defaults to `""`. + +### `TFE_DISK_PATH` + +Path where Terraform Enterprise stores application data. Must be backed by +persistent and performant storage such as a container volume or block storage. +Defaults to `/var/lib/terraform-enterprise`. + +Required when `TFE_OPERATIONAL_MODE` is `disk` on Docker runtime. + +### `TFE_BACKUP_RESTORE_TOKEN` + +The authentication token for the backup/restore API. Leave blank to have it be automatically generated. Defaults to `""`. + +### `TFE_HTTP_PORT` + +Port application listens on for HTTP. Default `80`. + +### `TFE_HTTPS_PORT` + +Port application listens to HTTPS on. Default `443`. + +## Database settings + +### `TFE_DATABASE_HOST` + +The PostgreSQL server to connect to in the format `HOST[:PORT]` (e.g., +`db.example.com` or `db.example.com:5432`). If only `HOST` is provided then the +`:PORT` defaults to `:5432`. + +Required when connecting to an external PostgreSQL server. + +### `TFE_DATABASE_NAME` + +Name of the PostgreSQL database to store application data in. + +Required when connecting to an external PostgreSQL server. + +### `TFE_DATABASE_PARAMETERS` + +PostgreSQL server parameters for the connection URI. Used to configure the +PostgreSQL connection (e.g., `sslmode=require`). + +### `TFE_DATABASE_PASSWORD` + +PostgreSQL password. + +Required when connecting to an external PostgreSQL server without client certificates. + +### `TFE_DATABASE_USER` + +PostgreSQL user. + +Required when connecting to an external PostgreSQL server. + +### `TFE_DATABASE_RECONNECT_ENABLED` + +Enables Terraform Enterprise to reconnect to the database when the database connection is interrupted. We recommend setting to `true` when connecting to an external PostgreSQL cluster. Refer to [Connect to a PostgreSQL cluster ](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres-cluster) for additional information. + +This setting is not applicable for Replicated. + +Defaults is `false`. + +### `TFE_DATABASE_USE_MTLS` + +Whether to use mTLS while authenticating with the PostgreSQL server. When mTLS is enabled, Terraform Enterprise uses client certificates to authenticate with the PostgreSQL server. +Terraform Enterprise requires PostgreSQL server certificate to use Subject Alternative Names (SANs) rather than relying solely on the legacy Common Name field. + +Defaults to `false`. + +### `TFE_DATABASE_CA_CERT_FILE` + +Specifies the path to a file containing the root certificate for validating PostgreSQL server certificates. +Defaults to `""`. + +Required when `TFE_DATABASE_USE_MTLS` is `true`. + +### `TFE_DATABASE_CLIENT_CERT_FILE` + +Specifies the path to a file containing the client certificate that Terraform Enterprise uses for authenticating with the PostgreSQL server. +Defaults to `""`. + +Required when `TFE_DATABASE_USE_MTLS` is `true`. + +### `TFE_DATABASE_CLIENT_KEY_FILE` + +Specifies the path to a file containing the client private key corresponding to the PostgreSQL client certificate provided in `TFE_DATABASE_CLIENT_CERT_FILE`. +Defaults to `""`. + +Required when `TFE_DATABASE_USE_MTLS` is `true`. + +## Redis settings + +### `TFE_REDIS_HOST` + +The Redis server to connect to in the format `HOST[:PORT]` (e.g., +`redis.example.com` or `redis.example.com:`). If only `HOST` is provided then +the `:PORT` defaults to `:6379`. + +Required when Redis server is externalized. + +### `TFE_REDIS_USE_AUTH` + +Must be `true` or `false`. `true` indicates Redis server is configured to use `TFE_REDIS_PASSWORD` and `TFE_REDIS_USER` (optional) for authentication. Defaults to `false`. + +### `TFE_REDIS_USE_TLS` + +Must be `true` or `false`. `true` indicates to use TLS to access Redis. Defaults to `false`. + +### `TFE_REDIS_USER` + +Redis server user. This value is required when `TFE_REDIS_USE_AUTH` is set to `true`, and Redis server is configured to use username for authentication. There is no need to set this config when running Redis server internally as credential is not required. + +### `TFE_REDIS_PASSWORD` + +Redis server password. This value is required when `TFE_REDIS_USE_AUTH` is set to `true`. There is no need to set this config when running Redis server internally as credential is not required. + +### `TFE_REDIS_SIDEKIQ_HOST` + +The Redis server to connect to in the format `HOST[:PORT]` (e.g., +`redis.example.com` or `redis.example.com:`). If only `HOST` is provided then +the `:PORT` defaults to `:6379`. + +Required when Redis server is externalized and Redis Enterprise is the external +service target. + +### `TFE_REDIS_SIDEKIQ_USE_AUTH` + +Must be `true` or `false`. `true` indicates Redis server is configured to use `TFE_REDIS_SIDEKIQ_PASSWORD` and `TFE_REDIS_SIDEKIQ_USER` (optional) for authentication. Defaults to `false`. + +### `TFE_REDIS_SIDEKIQ_USE_TLS` + +Must be `true` or `false`. `true` indicates to use TLS to access Redis. Defaults to `false`. + +### `TFE_REDIS_SIDEKIQ_USER` + +Redis server user. This value is required when `TFE_REDIS_SIDEKIQ_USE_AUTH` is set to `true`, and Redis server is configured to use username for authentication. There is no need to set this config when running Redis server internally as credential is not required. + +### `TFE_REDIS_SIDEKIQ_PASSWORD` + +Redis server password. This value is required when `TFE_REDIS_SIDEKIQ_USE_AUTH` is set to `true`. There is no need to set this config when running Redis server internally as credential is not required. + +### `TFE_REDIS_SENTINEL_ENABLED` + +Must be `true` or `false`. `true` indicates Redis Sentinel is configured. Defaults to `true`. + +### `TFE_REDIS_SENTINEL_HOSTS` + +Specifies one or more Redis Sentinel server addresses to connect to using the `HOST:PORT` format. The port number is optional and defaults to `:26379` when only the host address is provided. + +The following example specifies two servers. The first server uses the default port number. The second server is configured to explicitly listen on port `26379`: + +```yaml +TFE_REDIS_SENTINEL_HOSTS: redis-sentinel-1.example.com,redis-sentinel-2.example.com:26379 +``` + +Required when `TFE_REDIS_SENTINEL_ENABLED` is set to `true`. + +### `TFE_REDIS_SENTINEL_LEADER_NAME` + +The name of a Redis Sentinel master such as `main`. This name should return a valid Redis service location when issuing +a `SENTINEL GET-MASTER-ADDR-BY-NAME ` command to Redis Sentinel. + +Required when `TFE_REDIS_SENTINEL_ENABLED` is set to `true`. + +### `TFE_REDIS_SENTINEL_USERNAME` + +Redis Sentinel server user. + +### `TFE_REDIS_SENTINEL_PASSWORD` + +Redis Sentinel server password. + +## Initial admin creation token + +### `TFE_IACT_TOKEN` +A pre-populated initial admin creation token. If you do not set this value, a random one will be generated for you. + +### `TFE_IACT_SUBNETS` + +Comma-separated list of subnets in CIDR notation that are allowed to retrieve +the initial admin creation token via the API (e.g., +`10.0.0.0/8,192.168.0.0/24`). Leave blank to disable retrieving the initial +admin creation token via the API from outside the host. Defaults to +`""`. + +If you do not set this value, you must gain access to the container or pod command line and run `curl http://localhost:80/admin/retrieve-iact` to retrieve the initial admin token. + +### `TFE_IACT_TIME_LIMIT` + +Number of minutes that the initial admin creation token can be retrieved via +the API after the application starts. Defaults to `60`. + +### `TFE_IACT_TRUSTED_PROXIES` + +Comma-separated list of proxy IP addresses that are allowed to retrieve the initial admin creation token via the API. Leave blank to disable retrieving the initial admin creation token through a proxy. Defaults to `""`. + +## Network settings + +### `http_proxy` +Configures the proxy address to use for HTTP requests, for example`http://proxy.example.com:8080`. Do not set a value blank to disable using a proxy server. Defaults to `""`. + +### `https_proxy` +Configures the proxy address to use for HTTPS requests, for example `http://proxy.example.com:8080`. Leave blank to disable using a proxy server. Defaults to `""`. + +### `no_proxy` +Specifies a list of domains that instances, such as S3, are allowed to connect directly to without going through the proxy, for example `localhost,127.0.0.1`. Defaults to `""`. +When defining a proxy, this should include following addresses `127.0.0.1,localhost,,` but is not limited to. + +### `TFE_OIDC_HOSTNAME_CHOICE` + +Specifies which hostname Terraform Enterprise should use to federate OIDC workloads for OIDC-related integrations. You can specify one of the following values: + +- `primary`: Terraform Enterprise uses the hostname specified in the [`TFE_HOSTNAME`](#tfe_hostname) setting. +- `secondary`: Terraform Enterprise uses the hostname specified in the [`TFE_HOSTNAME`](#tfe_hostname_secondary) setting. + +Default is `primary`. + +### `TFE_VCS_HOSTNAME_CHOICE` + +Specifies which hostname Terraform Enterprise should use to federate version control system (VCS) workloads for VCS-related integrations. You can specify one of the following values: + +- `primary`: Terraform Enterprise uses the hostname specified in the `TFE_HOSTNAME` setting. +- `secondary`: Terraform Enterprise uses the hostname specified in the `TFE_HOSTNAME_SECONDARY` setting. + +You must set up new VCS connections if you update the `TFE_VCS_HOSTNAME_CHOICE` configuration. When `TFE_VCS_HOSTNAME_CHOICE` is set to `secondary`, you should continue using the secondary hostname while setting up the new VCS connection. When setup is complete, you can use the primary hostname for all other activities. + +Refer to [Configure a VCS host for Terraform Enterprise](/terraform/enterprise/vcs#configure-a-vcs-host-for-terraform-enterprise) for additional information. + +Default is `primary`. + +### `TFE_RUN_TASK_HOSTNAME_CHOICE` + +Specifies which hostname Terraform Enterprise should use to federate run task workloads for custom integrations. You can specify one of the following values: + +- `primary`: Terraform Enterprise uses the hostname specified in the `TFE_HOSTNAME` setting. +- `secondary`: Terraform Enterprise uses the hostname specified in the `TFE_HOSTNAME_SECONDARY` setting. + +Default is `primary`. + +## Observability settings + +### `TFE_LOG_FORWARDING_CONFIG_PATH` + +The path to a file containing valid Fluent Bit `[OUTPUT]` configuration. The +contents of the file you specify are appended to your existing Fluent Bit +configuration if you set `TFE_LOG_FORWARDING_ENABLED` to `true`. +Refer to [Enable log forwarding](/terraform/enterprise/deploy/manage/monitor#enable-log-forwarding) +for more information. + +This setting is not applicable for Kubernetes. + +### `TFE_LOG_FORWARDING_ENABLED` + +Whether to enable log forwarding. Defaults to `false`. + +This setting is not applicable for Kubernetes. + +### `TFE_METRICS_ENABLE` + +Whether to enable metrics collection. Defaults to `false`. + +### `TFE_METRICS_HTTP_PORT` + +The HTTP port that metrics will be exposed on. Defaults to `9090`. + +### `TFE_METRICS_HTTPS_PORT` + +The HTTPS port that metrics will be exposed on. Defaults to `9091`. + +## Object storage settings + +### `TFE_OBJECT_STORAGE_TYPE` + +Type of object storage to use. Must be one of `s3`, `azure`, or `google`. + +Required when object storage is externalized. + +### Azure blob Storage settings + +#### `TFE_OBJECT_STORAGE_AZURE_ACCOUNT_KEY` + +Azure Blob Storage access key. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `azure` and +`TFE_OBJECT_STORAGE_AZURE_USE_MSI` is `false`. + +#### `TFE_OBJECT_STORAGE_AZURE_ACCOUNT_NAME` + +Azure Blob Storage account name. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `azure`. + +#### `TFE_OBJECT_STORAGE_AZURE_CLIENT_ID` + +Client ID of a user-assigned Managed Service Identity. Leave blank to use the +system-assigned Managed Service Identity. Defaults to `""`. + +#### `TFE_OBJECT_STORAGE_AZURE_CONTAINER` + +Azure Blob Storage container name. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `azure`. + +#### `TFE_OBJECT_STORAGE_AZURE_ENDPOINT` + +Azure Storage endpoint. Useful if using a private endpoint for Azure Storage. +Leave blank to use the default Azure Storage endpoint. Defaults to `""`. + +#### `TFE_OBJECT_STORAGE_AZURE_USE_MSI` + +Whether to use Managed Service Identity (MSI) for authentication. Defaults to +`false`. + +### Google Cloud Platform storage + +#### `TFE_OBJECT_STORAGE_GOOGLE_BUCKET` + +Google Cloud Storage bucket name. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `google`. + +#### `TFE_OBJECT_STORAGE_GOOGLE_CREDENTIALS` + +Google Cloud Storage JSON credentials. Must be given as an escaped string of +JSON or Base64 encoded JSON. Leave blank to use the attached service account. +Defaults to `""`. + +#### `TFE_OBJECT_STORAGE_GOOGLE_PROJECT` + +Google Cloud Storage project name. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `google`. + +### S3-compatible Storage + +#### `TFE_OBJECT_STORAGE_S3_ACCESS_KEY_ID` + +S3 access key ID. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `s3` and +`TFE_OBJECT_STORAGE_S3_USE_INSTANCE_PROFILE` is `false`. + +#### `TFE_OBJECT_STORAGE_S3_BUCKET` + +S3 bucket name. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `s3`. + +#### `TFE_OBJECT_STORAGE_S3_ENDPOINT` + +S3 endpoint. Useful when using a private S3 endpoint. Leave blank to use the +default AWS S3 endpoint. Defaults to `""`. + +#### `TFE_OBJECT_STORAGE_S3_REGION` + +S3 region. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `s3`. + +#### `TFE_OBJECT_STORAGE_S3_SECRET_ACCESS_KEY` + +S3 secret access key. + +Required when `TFE_OBJECT_STORAGE_TYPE` is `s3` and +`TFE_OBJECT_STORAGE_S3_USE_INSTANCE_PROFILE` is `false`. + +#### `TFE_OBJECT_STORAGE_S3_SERVER_SIDE_ENCRYPTION` + +Server-side encryption algorithm to use. Leave blank to have the AWS SDK use a +default value. Set to `AES256` to use AES-256 encryption, the AWS S3 default +since January 5, 2023. Set to `aws:kms` to use an AWS KMS key to encrypt data +in which case you must specify +`TFE_OBJECT_STORAGE_S3_SERVER_SIDE_ENCRYPTION_KMS_KEY_ID`. Defaults to `""`. + +#### `TFE_OBJECT_STORAGE_S3_SERVER_SIDE_ENCRYPTION_KMS_KEY_ID` + +KMS key ID to use for server-side encryption. Leave blank to use AWS-managed +keys. Defaults to `""`. + +#### `TFE_OBJECT_STORAGE_S3_USE_INSTANCE_PROFILE` + +Whether to use the default AWS credential chain for authentication. When set to `true`, Terraform Enterprise attempts to authenticate to AWS using the following workload identities: + +- EC2 IAM instance profile +- IAM roles for Kubernetes service accounts (IRSA) +- EKS pod identity + +Defaults to `false`. + +#### `TFE_OBJECT_STORAGE_S3_UPLOAD_PART_SIZE` + +Optional configuration of the size of the data packets sent to S3. Defaults to `1024` if left blank. + + +#### `TFE_OBJECT_STORAGE_S3_UPLOAD_CONCURRENCY` + +Optional configuration of the concurrency when sending data to S3. Defaults to `3` if left blank. + +## TLS settings + +### `TFE_TLS_CA_BUNDLE_FILE` + +Path to a file containing TLS CA certificates to be added to the OS CA +certificates bundle. Leave blank to not add CA certificates to the OS CA +certificates bundle. Defaults to `""`. + +### `TFE_TLS_CERT_FILE` + +Path to a file containing the TLS certificate Terraform Enterprise will use +when serving TLS connections to clients. + +Required always. + +### `TFE_TLS_CERT_FILE_SECONDARY` + +Specifies the path to the TLS certificate file used for the secondary hostname, for example `/etc/ssl/private/terraform-enterprise/ext_cert.pem`. + +Configure this setting to secure HTTPS connections for external integrations using the secondary hostname. + +This settings is required when [`TFE_HOSTNAME_SECONDARY`](#tfe_hostname_secondary) is set. + +### `TFE_TLS_CIPHERS` + +TLS ciphers to use for TLS. Must be valid OpenSSL format. Leave blank to use +the default ciphers. Defaults to `""`. + +### `TFE_TLS_ENFORCE` + +Whether or not to enforce TLS, Strict-Transport-Security headers, and secure +cookies. Defaults to `false`. + +### `TFE_TLS_KEY_FILE` + +Path to a file containing the TLS private key Terraform Enterprise will use +when serving TLS connections to clients. + +### `TFE_TLS_KEY_FILE_SECONDARY` + +Specifies the path to the TLS private key file used for the secondary hostname, for example `/etc/ssl/private/terraform-enterprise/ext_key.pem`. + +You must also configure the [`TFE_TLS_CERT_FILE_SECONDARY`](#tfe_tls_cert_file_secondary) setting to enable secure HTTPS connections. + +This settings is required when [`TFE_HOSTNAME_SECONDARY`](#tfe_hostname_secondary) is set. + +### `TFE_TLS_VERSION` + +TLS version to use. Must be one of `tls_1_2`, `tls_1_3`, or blank. Leave blank +to use both TLS v1.2 and TLS v1.3. Defaults to `""`. + +## Vault settings + +### `TFE_VAULT_ADDRESS` + +Address of the external Vault server (e.g., https://vault.example.com:8200). +Defaults to `""`. + +Required when `TFE_VAULT_USE_EXTERNAL` is `true`. + +### `TFE_VAULT_CLUSTER_ADDRESS` + +Cluster URL of the internal Vault server on this node (e.g., +http://192.168.0.1:8201). Must be reachable across nodes. Defaults to +`http://{{ GetPrivateIP }}:8201`. + +Required when `TFE_OPERATIONAL_MODE` is `active-active`. + +### `TFE_VAULT_DISABLE_MLOCK` + +Disable mlock for internal Vault. Defaults to `false`. + +### `TFE_VAULT_NAMESPACE` + +Vault namespace. External Vault only. Leave blank to use the default namespace. +Defaults to `""`. + +### `TFE_VAULT_PATH` + +Vault path when AppRole is mounted. External Vault only. Defaults to +`auth/approle`. + +### `TFE_VAULT_ROLE_ID` + +Vault role ID. External Vault only. + +Required when `TFE_VAULT_USE_EXTERNAL` is `true`. + +### `TFE_VAULT_SECRET_ID` + +Vault secret ID. External Vault only. + +Required when `TFE_VAULT_USE_EXTERNAL` is `true`. + +### `TFE_VAULT_TOKEN_RENEW` + +How often, in seconds, to renew the Vault token. External Vault only. Defaults +to `3600`. + +### `TFE_VAULT_USE_EXTERNAL` + +Whether to use external Vault. Defaults to `false`. + +## Docker driver settings + +### `TFE_RUN_PIPELINE_DOCKER_EXTRA_HOSTS` + +Comma-separated list of extra hosts in the format `HOST:IP,HOST:IP` to set in +the `/etc/hosts` file within the container used to execute Terraform runs. +Leave blank to not set any extra hosts. Defaults to `""`. + +### `TFE_RUN_PIPELINE_DOCKER_NETWORK` + +Network where the container used to execute Terraform runs will be created. The +network must already exist, it will not be created automatically. Leave blank +to use the default network. Defaults to `""`. + +### `TFE_DISK_CACHE_PATH` + +Path where Terraform Enterprise caches Terraform binaries. The volume specified +in `TFE_DISK_CACHE_VOLUME_NAME` must be mounted to this path. Defaults to +`/var/cache/tfe-task-worker`. + +Required when `TFE_RUN_PIPELINE_DRIVER` is `docker`. + +### `TFE_DISK_CACHE_VOLUME_NAME` + +Container volume name backing the `TFE_DISK_CACHE_PATH`. + +Required when `TFE_RUN_PIPELINE_DRIVER` is `docker`. + +## Kubernetes driver settings + +### `TFE_RUN_PIPELINE_KUBERNETES_IMAGE_PULL_SECRET_NAME` + +The name of an ImagePullSecret in the [namespace]-agents namespace to use when pulling the custom source tfc-agent image. If an ImagePullSecret is required to access a private repository you must create the secret within the [namespace]-agents namespace after this helm chart has installed, but before attempting a plan or apply. See Prerequisites for instructions for creating ImagePullSecrets. + +### `TFE_RUN_PIPELINE_KUBERNETES_KUBECONFIG_PATH` + +The path to a Kubernetes configuration file. + +### `TFE_RUN_PIPELINE_KUBERNETES_NAMESPACE` + +The Kubernetes namespace to create ephemeral run containers. Defaults to +`default`. + +### `TFE_RUN_PIPELINE_KUBERNETES_OPEN_SHIFT_ENABLED` + +A feature toggle to enable or disable compatibility with an OpenShift runtime +environment. Defaults to `false`. + +### `TFE_RUN_PIPELINE_KUBERNETES_DEBUG_ENABLED` + +Boolean flag that will delay the deletion of jobs from the cluster for their inspection. + +### `TFE_RUN_PIPELINE_KUBERNETES_DEBUG_JOBS_TTL` + +Time in seconds after which the jobs delayed by the `TFE_RUN_PIPELINE_KUBERNETES_DEBUG_ENABLED` flag will get deleted. Defaults to 86400, 1 day. + +### `TFE_RUN_PIPELINE_KUBERNETES_POD_TEMPLATE` + +This is a base64-encoded custom pod template in JSON format, equivalent to Kubernetes' `corev1.PodTemplateSpec`, used in a job. The values here will override corresponding values from Terraform Enterprise configuration. Note that only one container is allowed in the pod template. + +### `TFE_RUN_PIPELINE_KUBERNETES_WORKER_TIMEOUT` + +Time in seconds after which Terraform Enterprise will fails jobs submitted to Kubernetes. Defaults to `60`. + +## Nomad driver settings + +### `TFE_RUN_PIPELINE_NOMAD_NAMESPACE` + +The Nomad namespace where Terraform Enterprise agent job starts. Defaults to `tfe-agents`. + +### `TFE_RUN_PIPELINE_NOMAD_AGENT_JOB_ID` + +Specifies the ID of the batch job that runs the Terraform Enterprise agent. Defaults to `tfe-agent-job`. + +### `TFE_RUN_PIPELINE_NOMAD_WORKER_TIMEOUT` + +Max timeout in seconds used by Terraform Enterprise workers to connect with Nomad and start an agent job. Defaults to `60`. + +## Proxy configuration + +Terraform Enterprise relies on the native application runtime for setting proxy values. For configuring proxies in Docker, +refer to the official [Docker proxy configuration guide](https://docs.docker.com/network/proxy/). For Kubernetes, refer to the +[Kubernetes proxy configuration guide](https://kubernetes.io/docs/concepts/cluster-administration/proxies/). For Nomad deployments, refer to the [reference architecture guide](/terraform/enterprise/deploy/replicated/architecture/reference-architecture) + +## Replicated to flexible deployments configuration mapping + +The following table describes how the Replicated configuration maps to the configuration settings for non-Replicated deployments. Refer to [settings](#application-settings) for more information about the variables. + +| Replicated | Non-Replicated | +| --------------------------- | ------------------------------------------------------------------------------------------------------------------- | +| aws_access_key_id | [TFE_OBJECT_STORAGE_S3_ACCESS_KEY_ID](#tfe_object_storage_s3_access_key_id) | +| aws_instance_profile | [TFE_OBJECT_STORAGE_S3_USE_INSTANCE_PROFILE](#tfe_object_storage_s3_use_instance_profile) | +| aws_secret_access_key | [TFE_OBJECT_STORAGE_S3_SECRET_ACCESS_KEY](#tfe_object_storage_s3_secret_access_key) | +| azure_account_key | [TFE_OBJECT_STORAGE_AZURE_ACCOUNT_KEY](#tfe_object_storage_azure_account_key) | +| azure_account_name | [TFE_OBJECT_STORAGE_AZURE_ACCOUNT_NAME](#tfe_object_storage_azure_account_name) | +| azure_client_id | [TFE_OBJECT_STORAGE_AZURE_CLIENT_ID](#tfe_object_storage_azure_client_id) | +| azure_container | [TFE_OBJECT_STORAGE_AZURE_CONTAINER](#tfe_object_storage_azure_container) | +| azure_endpoint | [TFE_OBJECT_STORAGE_AZURE_ENDPOINT](#tfe_object_storage_azure_endpoint) | +| azure_use_msi | [TFE_OBJECT_STORAGE_AZURE_USE_MSI](#tfe_object_storage_azure_use_msi) | +| backup_token | [TFE_BACKUP_RESTORE_TOKEN](#tfe_backup_restore_token) | +| capacity_concurrency | [TFE_CAPACITY_CONCURRENCY](#tfe_capacity_concurrency) | +| capacity_cpus | [TFE_CAPACITY_CPU](#tfe_capacity_cpu) | +| capacity_memory | [TFE_CAPACITY_MEMORY](#tfe_capacity_memory) | +| custom_agent_image_tag | [TFE_RUN_PIPELINE_IMAGE](#tfe_run_pipeline_image) | +| disk_path | [TFE_DISK_PATH](#tfe_disk_path) | +| enable_active_active | [TFE_OPERATIONAL_MODE](#tfe_operational_mode) | +| enc_password | [TFE_ENCRYPTION_PASSWORD](#tfe_encryption_password) | +| extern_vault_addr | [TFE_VAULT_ADDRESS](#tfe_vault_address) | +| extern_vault_namespace | [TFE_VAULT_NAMESPACE](#tfe_vault_namespace) | +| extern_vault_path | [TFE_VAULT_PATH](#tfe_vault_path) | +| extern_vault_role_id | [TFE_VAULT_ROLE_ID](#tfe_vault_role_id) | +| extern_vault_secret_id | [TFE_VAULT_SECRET_ID](#tfe_vault_secret_id) | +| extern_vault_token_renew | [TFE_VAULT_TOKEN_RENEW](#tfe_vault_token_renew) | +| force_tls | [TFE_TLS_ENFORCE](#tfe_tls_enforce) | +| gcs_bucket | [TFE_OBJECT_STORAGE_GOOGLE_BUCKET](#tfe_object_storage_google_bucket) | +| gcs_credentials | [TFE_OBJECT_STORAGE_GOOGLE_CREDENTIALS](#tfe_object_storage_google_credentials) | +| gcs_project | [TFE_OBJECT_STORAGE_GOOGLE_PROJECT](#tfe_object_storage_google_project) | +| hostname | [TFE_HOSTNAME](#tfe_hostname) | +| iact_subnet_list | [TFE_IACT_SUBNETS](#tfe_iact_subnets) | +| iact_subnet_time_limit | [TFE_IACT_TIME_LIMIT](#tfe_iact_time_limit) | +| log_forwarding_config | [TFE_LOG_FORWARDING_CONFIG_PATH](#tfe_log_forwarding_config_path) | +| log_forwarding_enabled | [TFE_LOG_FORWARDING_ENABLED](#tfe_log_forwarding_enabled) | +| metrics_endpoint_enabled | [TFE_METRICS_ENABLE](#tfe_metrics_enable) | +| metrics_endpoint_port_http | [TFE_METRICS_HTTP_PORT](#tfe_metrics_http_port) | +| metrics_endpoint_port_https | [TFE_METRICS_HTTPS_PORT](#tfe_metrics_https_port) | +| optout_license_reporting | [TFE_LICENSE_REPORTING_OPT_OUT](#tfe_license_reporting_opt_out) | +| optout_usage_reporting | [TFE_USAGE_REPORTING_OPT_OUT](#tfe_usage_reporting_opt_out) | +| pg_dbname | [TFE_DATABASE_NAME](#tfe_database_name) | +| pg_extra_params | [TFE_DATABASE_PARAMETERS](#tfe_database_parameters) | +| pg_netloc | [TFE_DATABASE_HOST](#tfe_database_host) | +| pg_password | [TFE_DATABASE_PASSWORD](#tfe_database_password) | +| pg_user | [TFE_DATABASE_USER](#tfe_database_user) | +| placement | [TFE_OBJECT_STORAGE_TYPE](#tfe_object_storage_type) | +| production_type | [TFE_OPERATIONAL_MODE](#tfe_operational_mode) | +| redis_host | [TFE_REDIS_HOST](#tfe_redis_host) | +| redis_pass | [TFE_REDIS_PASSWORD](#tfe_redis_password) | +| redis_port | [TFE_REDIS_HOST](#tfe_redis_host) | +| redis_use_password_auth | [TFE_REDIS_USE_AUTH](#tfe_redis_use_auth) | +| redis_use_tls | [TFE_REDIS_USE_TLS](#tfe_redis_use_tls) | +| s3_bucket | [TFE_OBJECT_STORAGE_S3_BUCKET](#tfe_object_storage_s3_bucket) | +| s3_endpoint | [TFE_OBJECT_STORAGE_S3_ENDPOINT](#tfe_object_storage_s3_endpoint) | +| s3_region | [TFE_OBJECT_STORAGE_S3_REGION](#tfe_object_storage_s3_region) | +| s3_sse | [TFE_OBJECT_STORAGE_S3_SERVER_SIDE_ENCRYPTION](#tfe_object_storage_s3_server_side_encryption) | +| s3_sse_kms_key_id | [TFE_OBJECT_STORAGE_S3_SERVER_SIDE_ENCRYPTION_KMS_KEY_ID](#tfe_object_storage_s3_server_side_encryption_kms_key_id) | +| tls_ciphers | [TFE_TLS_CIPHERS](#tfe_tls_ciphers) | +| tls_vers | [TFE_TLS_VERSION](#tfe_tls_version) | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/data-security.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/data-security.mdx new file mode 100644 index 000000000..caa44683f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/data-security.mdx @@ -0,0 +1,8 @@ +--- +page_title: Terraform Enterprise data security reference +description: >- + Terraform Enterprise objects may contain sensitive data. Learn about storage + and encryption methods Terraform Enterprise uses to protect sensitive data. +--- + +@include "replicated-and-fdo/architecture/data-security-partial.mdx" diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/license-data.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/license-data.mdx new file mode 100644 index 000000000..0c150673a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/license-data.mdx @@ -0,0 +1,66 @@ +--- +page_title: License report reference +description: Learn about the license usage information HashiCorp collects in order to meter license consumption in your organization. +--- + +# License report reference + +By default, Terraform Enterpise automatically sends license usage metrics to HashiCorp. Refer to [Enable automated license utilization reporting](/terraform/enterprise/deploy/manage/license-report) for additional information. HashiCorp collects the following data as a JSON payload: + +- `payload_version`: The version of this payload schema +- `license_id`: The license ID for this product +- `product`: The product that this contribution is for +- `product_version`: The product version this contribution is for +- `export_timestamp`: The date and time for this contribution + - `snapshots`: An array of snapshot details. A snapshot is a structure that represents a single data collection. + - `snapshot_version`: The version of the snapshot package that produced this snapshot + - `snapshot_id`: A unique identifier for this particular snapshot + - `process_id`: An identifier for the system that produced this snapshot + - `timestamp`: The date and time for this snapshot + - `schema_version`: The version of the schema associated with this snapshot + - `service`: The service that produced this snapshot (likely to be product name) + - `metrics`: A map of representations of snapshot metrics contained within this snapshot + - `key`: The key name associated with this metric + - `workspacecount`: Total number of workspaces defined in the Terraform Enterprise instance + - `kind`: The kind of metric (feature, counter, sum, or mean) + - `mode`: The mode of operation associated with this metric (write or collect) + - `value`: The value of the metric at the time the licensing exporter took this snapshot +- `metadata`: Optional product-specific metadata + - `replicated_license_id`: The unique ID of the Replicated license. When deployed to a non-Replicated runtime, this field returns empty. + - `sf_opportunity_id`: The Salesforce opportunity ID associated with the license. When deployed to a non-Replicated runtime, this field returns empty. + +## Example payload + +```json +{ + "payload_version": "1", + "license_id": "934b62bd-7e7b-7872-7341-9683ecd9acb4", + "product": "terraform", + "product_version": "v202305-01", + "export_timestamp": "2023-05-24T10:11:12Z", + "snapshots": [ + { + "snapshot_version": 1, + "snapshot_id": "01GW2Y117Z2BZ7MGS9YQXPF2A4", + "process_id": "01GVKT7533WF8TBNSJYZV0T10F", + "timestamp": "2023-05-23T20:33:32.927Z", + "schema_version": "1.0.0", + "service": "terraform", + "metrics": { + "terraform.workspacecount": { + "key": "terraform.workspacecount", + "kind": "counter", + "mode": "write", + "value": 20 + } + } + } + ], + "metadata": { + "terraform": { + "replicated_license_id": "vi15fg2ysml54yhhd8evcfjl63h6pt6k", + "sf_opportunity_id": "ix0z0kj5f7egd64bo1" + } + } +} +``` \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/metrics.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/metrics.mdx new file mode 100644 index 000000000..1481d5d5b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/metrics.mdx @@ -0,0 +1,70 @@ +--- +page_title: Container metrics reference +description: >- + Learn about the metrics that are exposed by Terraform Enterprise. +--- + +# Container metrics reference + +This topic provides reference information about the metrics that Terraform Enterprise can expose when enabled. Refer to [Monitor Terraform Enterprise](/terraform/enterprise/deploy/manage/monitor) for instructions on how to enable metrics. + +## Container metrics + +The following table describes metrics report runtime information about Terraform Enterprise containers. + +| Exposed Metric | Metrics Type | Description | +| ----------------------------------------- | ------------ | ---------------------------------------------------------------------------------------------------------------- | +| `tfe.container.cpu.usage.user` | `counter` | Running count, in nanoseconds, of the total amount of time processes in the container have spent in userspace | +| `tfe.container.cpu.usage.kernel` | `counter` | Running count, in nanoseconds, of the total amount of time processes in the container have spent in kernel space | +| `tfe.container.memory.used_bytes` | `gauge` | The amount of memory allocated to the container in bytes, minus memory that is used for page cache | +| `tfe.container.memory.limit` | `gauge` | The maximum amount of memory in bytes that can be allocated by the container | +| `tfe.container.network.rx_bytes_total` | `counter` | Running count of the number of network bytes received by the container | +| `tfe.container.network.rx_packets_total` | `counter` | Running count of the number of network packets received by the container | +| `tfe.container.network.tx_bytes_total` | `counter` | Running count of the number of network bytes transmitted by the container | +| `tfe.container.network.tx_packets_total` | `counter` | Running count of the number of network packets transmitted by the container | +| `tfe.container.disk.io_op_read_total` | `counter` | Running count of the number of read disk operations executed by the container | +| `tfe.container.disk.io_op_write_total` | `counter` | Running count of the number of write disk operations executed by the container | +| `tfe.container.disk.io_bytes_read_total` | `counter` | Running count of the number of disk bytes read by the container | +| `tfe.container.disk.io_bytes_write_total` | `counter` | Running count of the number of disk bytes written by the container | +| `tfe.container.process_count` | `gauge` | The number of processes active within the container | +| `tfe.container.process_limit` | `gauge` | The maximum number of processes that can be executed inside the container | + +The following metadata labels will be added to each container metric emitted: + +- `id`: The container ID +- `name`: The container name +- `image`: The container image + +-> **Note:** `tfe.container.*` metrics are not emitted on Kubernetes +installations. + +Worker container metrics include four additional labels: `run_type`, `run_id`, +`workspace_name`, and `organization_name`. You can use these labels to associate +a worker container with its type, run, workspace, and organization, +respectively. Metrics for long-running service containers will not include these +labels. + +In addition to the per-container metrics, the following global metrics are +exposed: + +| Exposed Metric | Metrics Type | Description | +| ----------------------- | ------------ | ----------------------------------------------------------------------------------------- | +| `tfe.run.count` | `gauge ` | Number of running containers being used for Terraform runs. | +| `tfe.run.limit` | `gauge` | Maximum number of runs as defined by the `TFE_CAPACITY_CONCURRENCY` environment variable. | +| `tfe.run.current.count` | `gauge` | Number of active Terraform runs labeled by organization, workspace, and status. | + +The name and ID for worker containers are unique for each run, and worker +container names take the form of a UUID. Be aware of this when planning for +Prometheus storage capacity requirements that relate to metric cardinality. +Environments that do not need to track resource consumption of individual build +containers or runs can use [Prometheus metric +relabelling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs) +to remove the unique ID, name, and run type labels from container metrics. This +reduces cardinality within the dataset while still retaining the ability to +associate resource usage with a given workspace and organization. + +#### Grafana dashboard + +This [template Grafana dashboard](https://grafana.com/grafana/dashboards/15630) +demonstrates how you can use Grafana and Prometheus to visualize exported +Terraform Enterprise metrics. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/product-data.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/product-data.mdx new file mode 100644 index 000000000..4983cd9ac --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/product-data.mdx @@ -0,0 +1,10 @@ +--- +page_title: Terraform Enterprise usage data reference +description: Learn about the product usage data Terraform Enterprise collects. +--- + +# Terraform Enterprise usage data reference + +This topic provides reference information about the product usage information Terraform Enterprise collects so that HashiCorp can improve service. Refer to [Enable automated product usage reports](/terraform/enterprise/deploy/manage/product-report). For information about how to configure Terraform Enterprise to automatically send product usage reports. + +@include "replicated-and-fdo/admin/license-example-usage-payload.mdx" \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/services.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/services.mdx new file mode 100644 index 000000000..7f98e0749 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/services.mdx @@ -0,0 +1,72 @@ +--- +page_title: Terraform Enterprise services reference +description: Reference information about the services included with Terraform Enterprise. +--- + +# Terraform Enterprise services + +This topic provides reference information about the individual services in Terraform Enterprise. For information about troubleshooting service errors, refer to [Perform diagnostics](/terraform/enterprise/deploy/troubleshoot/perform-diagnostics). + +- `archivist` - Object storage API which simplifies the service architecture + and minimizes inner-network cross talk by colocating the logical storage and + front-end API handler pieces. + +- `atlas` - The Terraform Enterprise API. + +- `atlas-ui` - The Terraform Enterprise user interface. + +- `backup-restore` - A tool that provides both an API to backup and restore a + Terraform Enterprise backup snapshot and a command line tool to inspect a + backup snapshot. A backup snapshot is an encrypted binary file containing the + Archivist data, Vault transit keys, and PostgreSQL schema dumps for a given + Terraform Enterprise instance. + +- `licensing` - A library and service that provides enterprise license + functionality for Terraform. + +- `metrics` - A Terraform Enterprise component to aggregate metrics and expose + them over HTTP and HTTPS. + +- `nginx` - The NGINX reverse proxy which facilitates access to the Terraform + Enterprise services. + +- `outbound-http-proxy` - Security control used to filter user-controlled + network traffic (e.g. sentinel imports) and prevent them from accessing + internal services directly. + +- `postgres` - The PostgreSQL database holds relational data such as workspace + applies and where their state is stored in object storage. An internal + PostgreSQL service is started when the operational mode is `disk` on Docker runtime. PostgreSQL + server host config must be provided for application on cloud-managed Kubernetes, or for `external` and `active-active` operational mode on Docker runtime. + +- `redis` - An in-memory database, use for caching and `sidekiq` queue. An + internal Redis service is started when the operational mode is `disk` or + `external`. Redis server host config must be provided for `active-active` + mode for application on cloud-managed Kubernetes, or for `external` and `active-active` operational mode on Docker runtime. + +- `registry_api` - Terraform Private Module Registry API. + +- `sidekiq` - Background job scheduler system. + +- `slug-ingress` - Listens for VCS webhooks. Packages VCS repo data as a slug + and sends it to `archivist`. + +- `task-worker` - A service that manages asynchronous units of work in + Terraform Enterprise. + +- `terraform-registry-api` - The API to the Terraform Registry. + +- `terraform-registry-worker` - Processes VCS slugs and prepares modules to be + published on the Terraform private Module Registry. + +- `terraform-state-parser` - Reads Terraform state files and parses important + information out of them. Terraform state is consumed from a remote state URL, + and compiled data is sent in the payload of a callback to Atlas. + +- `tfe-health-check` - This tool is to help our customers and us know exactly + why Terraform Enterprise has gotten into an unhealthy state, checking the + health and connections to Postgres, Redis, Vault, storage, etc. + +- `vault` - HashiCorp Vault utilizes transit encryption for items such as + sensitive workspace variables. + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/startup-checks.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/startup-checks.mdx new file mode 100644 index 000000000..a99d507bc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/reference/startup-checks.mdx @@ -0,0 +1,109 @@ +--- +page_title: Startup checks reference +description: >- + Terraform Enterprise startup checks validate the Terraform Enterprise + configuration. Learn about the checks that run when you start Terraform Enterprise. +--- + +# Startup checks reference + +This topic contains reference information about Terraform Enterprise startup checks. The startup checks validate the configuration in order to prevent operators from starting Terraform Enterprise with invalid certificates and other issues that could prevent the application from running successfully or safely. + +Startup checks: + +- Run concurrently at startup +- Cannot be skipped +- Have a 1 minute timeout + +The results of the startup checks are logged alongside application logs. When +all of the startup checks pass, the application will continue to start up. + +``` +2023-06-30T17:54:58.628Z [INFO] terraform-enterprise: check passed: name=configuration duration="29.741µs" +2023-06-30T17:54:58.628Z [INFO] terraform-enterprise: check passed: name=database duration=10.053393ms +2023-06-30T17:54:58.628Z [INFO] terraform-enterprise: check passed: name=disk duration="169.438µs" +2023-06-30T17:54:58.628Z [INFO] terraform-enterprise: check passed: name=license duration=7.896534ms +2023-06-30T17:54:58.628Z [INFO] terraform-enterprise: check passed: name=redis duration="632.735µs" +2023-06-30T17:54:58.628Z [INFO] terraform-enterprise: check passed: name=tls duration="241.12µs" +2023-06-30T17:54:58.628Z [INFO] terraform-enterprise: check passed: name=upgrade duration=29.954ms" +``` + +If any of the startup checks fail, the application will log the checks that +failed and exit. Operators can check the logs for information on how they can +resolve the failing checks. + +``` +2023-06-30T18:14:45.792Z [INFO] terraform-enterprise: check passed: name=configuration duration="102.266µs" +2023-06-30T18:14:45.792Z [INFO] terraform-enterprise: check passed: name=database duration=11.925026ms +2023-06-30T18:14:45.792Z [INFO] terraform-enterprise: check passed: name=disk duration="360.432µs" +2023-06-30T18:14:45.792Z [ERROR] terraform-enterprise: check failed: name=license duration="423.448µs" err="failed parsing license: incorrectly formatted license" +2023-06-30T18:14:45.792Z [INFO] terraform-enterprise: check passed: name=redis duration="945.784µs" +2023-06-30T18:14:45.792Z [INFO] terraform-enterprise: check passed: name=tls duration="795.072µs" +2023-06-30T18:14:45.792Z [INFO] terraform-enterprise: check passed: name=upgrade duration=29.954ms" +2023-06-30T18:14:45.792Z [ERROR] terraform-enterprise: the following startup checks failed: checks=["license"] +2023-06-30T18:14:45.792Z [ERROR] terraform-enterprise: startup: error="startup checks failed" +``` + +## Types of checks + +Startup checks run the following validations to detect misses and gaps during the setup +of the installation. + +### Configuration Variables + +This check validates required configuration and acceptable values listed in the +[installation configuration reference](/terraform/enterprise/deploy/reference/configuration). + +### Database + +This check validates database access by querying for the supported version. When the database connection fails, it will retry using a linear backoff strategy. For external database configuration, the following must be set and are used for validation. +* `TFE_DATABASE_HOST` +* `TFE_DATABASE_NAME` +* `TFE_DATABASE_USER` +* `TFE_DATABASE_PASSWORD` + +The database validation can fail for the following reasons: + +* The database user set via `TFE_DATABASE_USER` has insufficient permissions to execute the query: `SHOW server_version;` +* The Postgres database version is a value other than `12`, `13`, `14` or `15`. + +### Filesystem access + +This validation only applies to application running `TFE_OPERATIONAL_MODE: disk` on Docker runtime. + +Validates the application has read / write privileges in the directory configured in `TFE_DISK_PATH`. This filesystem access validation can fail for the following reasons: + +* The application has no privilege to read / write files to the directory and its subdirectories configured in `TFE_DISK_PATH`. + +### License + +This check validates that the application has read privilege to the license and that it is a valid HashiCorp-provided license. License validation does not fail if the license is expired, but it can fail for the following reasons: + +- The license value was not provided via `TFE_LICENSE` or `TFE_LICENSE_PATH` is empty. + +### Redis + +This check validates the application's connectivity to Redis. When the connection fails, the check retries using a linear backoff strategy. For external Redis configurations, you must set the following variables: +* `TFE_REDIS_HOST` +* If `TFE_REDIS_USE_TLS` is set to `true` the application will use `rediss` instead of `redis` as the scheme. +* If `TFE_REDIS_USE_AUTH` is set to `true` the application will use the credentials provided by `TFE_REDIS_PASSWORD` and `TFE_REDIS_USER` (optional) for authentication. + +### TLS certificates + +This check validates that the `TFE_TLS_CA_BUNDLE_FILE` variable has been set and that it points to a valid PEM-encoded file. + +### Upgrade + +This check ensures that upgrades to Terraform Enterprise occur in a sequential manner and do not forego +[required Terraform Enterprise releases](/terraform/enterprise/releases). +The upgrade check fails and logs error messages if the following conditions apply: + +* A Terraform Enterprise instance is trying to upgrade to a version of the application that is not newer than the current version: +`"failed validating TFE version: vYYYYMM-P is not newer than existing version vYYYYMM-P"` + +* A Terraform Enterprise instance has skipped over required releases: +`"failed to meet upgrade requirements: missing required releases: vYYYYMM-P, vYYYYMM-P"` + +### Kubernetes + +This validation applies to `TFE_RUN_PIPELINE_KUBERNETES_POD_TEMPLATE`, if provided. It ensures that the template is a valid `corev1.PodTemplateSpec` and contains no more than one `corev1.Container`. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated-migration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated-migration.mdx new file mode 100644 index 000000000..d70b9cc42 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated-migration.mdx @@ -0,0 +1,835 @@ +--- +page_title: Migrate from Replicated to another runtime +description: >- + Learn how to migrate your Terraform Enterprise installation from Replicated to another supported runtime environment. +--- + +# Migrate from Replicated to another runtime + +This topic describes how to migrate Terraform Enterprise instances from Replicated to another runtime environment. + +## Overview + +The target runtime must host instances on the same version of Terraform Enterprise as the instances hosted in Replicated. You cannot combine an application upgrade and migration. Upgrade your current installation of Terraform Enterprise to the latest version before proceeding with your migration. Use the same procedure to migrate from Replicated to all other supported runtimes: + +1. Back up your Terraform Enterprise data tier, which includes the PostgreSQL database and object storage. +1. Upgrade your existing Replicated installation to `v202309-1` or later. +1. Deploy the same version of Terraform Enterprise to your new runtime. +1. Migrate your data tier to your new installation. + +The migration paths are specific to the [operational mode](/terraform/enterprise/deploy/configuration/storage/configure-mode) of your existing Terraform Enterprise installation and the runtime environment you want to migrate to. + +- Docker: + + - Refer to the [Migrate Terraform Enterprise from Replicated to Docker Engine](https://www.hashicorp.com/resources/video-migrate-terraform-enterprise-from-replicated-to-docker-engine) video for a comprehensive walkthrough that describes how to migrate to a Docker runtime. + - [Migrating using mounted disk operational mode to Docker runtime](#mounted-disk-to-docker) + - [Migrating using external services operational mode to Docker runtime](#external-services-to-docker) + +- Kubernetes + + - [Migrating using mounted disk to Cloud-managed Kubernetes](#mounted-disk-to-cloud-managed-kubernetes) + - [Migrating using external services or Active/Active to Cloud-managed Kubernetes](#external-services-or-active-active-to-cloud-managed-kubernetes) + +- Podman + - The procedure for [migrating to Podman](#migrate-to-podman) is the same for `disk` and `external` operational modes. + +- Nomad + - [Migrating using mounted disk to Nomad](#mounted-disk-to-nomad) + - [Migrating using external services or Active/Active to Nomad](#external-services-or-active-active-to-nomad) + + + +## Prerequisites + +### Back up data tier + +1. We always recommend backing up your data tier before conducting maintenance or upgrade operations. The backup method will depend on your existing installation. + + - For mounted disk installations, refer to [Backup a Mounted Disk Deployment](/terraform/tutorials/recommended-patterns/pattern-backups#backup-a-mounted-disk-deployment) in the Terraform Enterprise backup tutorial for recommended patterns. + - For external services or active active installations, refer to [Object Store](/terraform/tutorials/recommended-patterns/pattern-backups#object-store) and [Database](/terraform/tutorials/recommended-patterns/pattern-backups#database) in the Terraform Enterprise backup tutorial for recommended patterns. + + In both cases, we recommend backing up the environment variables of the Terraform Enterprise Docker container so that you can refer to them when configuring your target runtime. + + ```shell-session + $ docker exec terraform-enterprise env > env.txt + ``` + +### Upgrade your existing Terraform Enterprise installation + +1. [Upgrade your Replicated-hosted Terraform Enterprise](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) installation to [v202309-1](/terraform/enterprise/releases/2023/v202309-1) or later. +1. Run the following commands to validate that the upgrade completed successfully: + 1. Validate the release version. + ```shell-session + $ replicatedctl app inspect + ``` + 1. Check that Replicated has started. + ```shell-session + $ replicatedctl app status + ``` + 1. Check that the docker containers are up. + ```shell-session + $ sudo docker ps + ``` + 1. Do a health check. + ```shell-session + $ tfe-admin health-check + ``` + 1. Do a `terraform plan` and a `terraform apply`. + +## Mounted disk to Docker + +Before proceeding with this migration guide, make sure you meet all the [prerequisites](#prerequisites) and that a Flexible +Deployment Options license file has been provided by your HashiCorp business partner. +Do not proceed with this guide if any of the prerequisites are not fulfilled. + +If at any point you need to revert your settings, see [the rollback steps](/terraform/enterprise/deploy/replicated-migration#mounted-disk-rollback-steps). + +### Migration steps + +#### Step 1: Backup your data tier + +We always recommend backing up your data tier before conducting any maintenance or migration. See the backup data guide under the [prerequisites](#prerequisites) section for a detailed +guide on how to move forward with the backup process. + +#### Step 2: Upgrade Terraform Enterprise + +Upgrade your Replicated-hosted Terraform Enterprise installation to [v202309-1](/terraform/enterprise/releases/2023/v202309-1) or later. Refer to [Upgrading](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) +for instructions. + +#### Step 3: Verify Docker Engine version + +Docker should already be installed for you because Replicated is installed on this host. You may still need to install Docker Compose if you have not already. +Refer to [Docker Engine Requirements](/terraform/enterprise/deploy/replicated/requirements/docker_engine) for more information. + +If you cannot upgrade Docker Engine or install in a supported Docker configuration then install and migrate Terraform Enterprise to a different runtime. + +#### Step 4: Generate Docker Compose configuration + +Docker Compose configurations generated on releases older than v202410-1 may contain formatting errors. Terraform Enterprise may format passwords or secrets that contain special characters incorrectly if your configuration contains double quotation marks instead of single quotation marks. + +To address this issue, you can manually replace double quotation marks with single quotation marks around secrets in your compose configuration. + +We fixed this issue in v202410-1. Refer to the [v202410-1 release notes](/terraform/enterprise/releases/2024/v202410-1) for additional information. + +To convert your existing configuration into a Docker Compose format on your current Terraform Enterprise installation (Replicated), follow these steps: +1. Create a `/etc/terraform-enterprise` directory. +1. Generate the Docker Compose configuration and save it to `/etc/terraform-enterprise/docker-compose.yml` using the following command: +```shell-session +sudo docker exec terraform-enterprise tfectl app config --format docker > /etc/terraform-enterprise/docker-compose.yml +``` +Your saved output should resemble the configuration file in [the example `disk` mode configuration](/terraform/enterprise/deploy/docker#example-disk-mode-configuration). Incorporate the saved output values into this configuration file to ensure correctness. + +Terraform Enterprise may generate a configuration that contains errors. Manually review the configuration to verify that it is complete and accurate. + +#### Step 5: Prepare the host and install + +To make migration smoother and faster, we recommend using the same host as your current Replicated instance. + +-> **Note**: If you want to use a separate host for your new docker-based Terraform Enterprise, we can provide alternative steps. [Reach out to support for assistance](/terraform/enterprise/deploy/troubleshoot/contact-support). + +1. Review the configuration file from the previous step. Update any values as needed before moving on to the next step. Pay special attention to placeholder values enclosed in `<>`, such as `image` and `TFE_LICENSE`, and replace them with your actual values. + + Alternatively, you can use the [mounted disk example](/terraform/enterprise/deploy/docker#example-disk-mode-configuration) as a starting point and adjust it to fit your environment. + + Note that the volumes `type` fields are set to `bind` for the `tfe` service. You can source many of your required values from the Replicated application configuration backup you created earlier. For a comprehensive list of configuration settings, refer to the [Configuration Reference](/terraform/enterprise/deploy/reference/configuration). + +1. Log in to the Terraform Enterprise container image registry. + + ```shell-session + $ cat | docker login --username terraform images.releases.hashicorp.com --password-stdin + ``` + +1. Pull the Terraform Enterprise image from the registry. + + ```shell-session + $ docker pull images.releases.hashicorp.com/hashicorp/terraform-enterprise: + ``` + +1. Create a new `systemd` service for Terraform Enterprise by creating a `/etc/systemd/system/terraform-enterprise.service` file with [the contents on the Docker Installation guide](/terraform/enterprise/deploy/docker). Update this systemd unit file if any of the following are true: + + - The name or the path of the `docker-compose.yml` has changed. + - The path to the Docker binary and the command to invoke `docker compose` is different because Docker Engine 1.13.1 is installed. + +#### Step 6: Stop Replicated and migrate + +Next, you can stop Replicated and migrate your Terraform Enterprise installation to Docker. + +1. SSH into your Terraform Enterprise (Replicated) instance. +1. Stop Terraform Enterprise (Replicated). Ensure the application has fully stopped before proceeding. + ```shell-session + $ replicatedctl app stop + ``` +1. Back up your data. If you have already backed up your data proceed forward. If not, or if you want another backup for safe keeping, do the following. + - Retrieve your mounted disk path. + + ```shell-session + $ replicatedctl app-config export --template '{{ .disk_path.Value }}' | tr -d '\r' + ``` + + - We will refer to this path as the `${DISK_PATH}` going forward. Next, archive your mounted disk data. + + ```shell-session + $ tar -zcvf data.tar.gz -C ${DISK_PATH} aux postgres + ``` + - Copy your `data.tar.gz` archive to a safe place. + +1. Start (and enable on start up) the Docker Compose based Terraform Enterprise. + + ```shell-session + $ systemctl enable --now terraform-enterprise + ``` + +1. Check the status of your service with `systemctl status terraform-enterprise`, or use `docker ps` to find your container's name then run `docker logs [name]`. You can also run `curl https://[hostname]/_health_check` to check the health check endpoint. Terraform Enterprise should now be running using Docker Compose, so your Replicated services can be shut down and disabled. + +1. Shut down Replicated. + + ```shell-session + $ systemctl disable --now replicated replicated-ui replicated-operator + ``` + +1. Next, stop and remove the unnecessary Replicated containers. + ```shell-session + $ docker stop replicated-premkit + ``` + ```shell-session + $ docker stop replicated-statsd + ``` + ```shell-session + $ docker rm -f replicated replicated-ui replicated-operator replicated-premkit replicated-statsd retraced-api retraced-processor retraced-cron retraced-nsqd retraced-postgres + ``` + +-> **Note**: some of the `docker stop` commands may return “Container not found” errors because not every Replicated install has every container. + +#### Step 7: Validate migration success + +Finally, test that your new Terraform Enterprise installation works properly. If you have an existing suite of release acceptance tests, you can use those instead of doing the following steps. We recommend testing capabilities that you use in production, as you would for a Terraform Enterprise upgrade. For example: If you are using sentinel or run tasks in production, we recommend testing a run that includes these integrations in a lower environment before deploying to production. + +1. Execute a plan and apply it from the CLI, testing several subsystems. Ensuring that proxies are correctly configured, certificates are properly configured, and the instance can download Terraform binaries and execute runs. +1. Execute a plan and apply it from VCS, testing that webhooks are working and certificates are in place on both sides. +1. Publish a new module to the private module registry. +1. Execute a plan and apply it with a module or provider from the private registry to ensure the registry is functioning. +1. (_Optional_) Execute a plan and apply it with Sentinel and cost estimation, ensuring run tasks and cost estimation work. +1. (_Optional_) Execute a plan and apply it on a workspace that uses an agent pool, testing that external agents can connect and run jobs successfully. + +#### Mounted Disk rollback steps + +In the unlikely event you encounter issues and need to roll back, you can revert back to Terraform Enterprise (Replicated) using the following commands. + +1. Stop and disable Terraform Enterprise (Docker). + ```shell-session + $ systemctl disable --now terraform-enterprise + ``` +1. Start and enable Replicated. + ```shell-session + $ systemctl enable --now replicated replicated-ui replicated-operator + ``` +1. Start Terraform Enterprise (Replicated) + ```shell-session + $ replicatedctl app start + ``` + +## External services or Active Active to Docker + +Before proceeding with this migration guide, make sure you meet all the [prerequisites](#prerequisites) and that a Flexible +Deployment Options license file has been provided by your HashiCorp business partner. +Do not proceed with this guide if any of the prerequisites are not fulfilled. + +When Terraform Enterprise is operating in `active-active` mode, you can scale directly up to your target number of nodes after the migration is complete. You do not need to scale to one node before scaling to all nodes. + +If at any point you need to revert your settings, see [the rollback steps](/terraform/enterprise/deploy/replicated-migration#external-services-rollback-steps). + +### Migration steps + +#### Step 1: Backup your data tier + +We always recommend backing up your data tier before conducting any maintenance or migration. See the backup data guide under the [prerequisites](#prerequisites) section for a detailed +guide on how to move forward with the backup process. + +#### Step 2: Upgrade Terraform Enterprise + +Upgrade your Replicated-hosted Terraform Enterprise installation to [v202309-1](/terraform/enterprise/releases/2023/v202309-1) or later. Refer to [Upgrading](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) +for instructions. + +#### Step 3: Verify Docker engine version + +Docker should already be installed for you because Replicated is installed on this host. You may still need to install Docker Compose if you have not already. +See the [Docker Engine Requirements](/terraform/enterprise/deploy/replicated/requirements/docker_engine) for more information. + +If you cannot upgrade Docker Engine or install in a supported Docker configuration then install and migrate Terraform Enterprise to a different runtime. + +#### Step 4: Generate Docker Compose configuration + +Docker Compose configurations generated on releases older than v202410-1 may contain formatting errors. Terraform Enterprise may format passwords or secrets that contain special characters incorrectly if your configuration contains double quotation marks instead of single quotation marks. + +To address this issue, you can manually replace double quotation marks with single quotation marks around secrets in your compose configuration. + +We fixed this issue in v202410-1. Refer to the [v202410-1 release notes](/terraform/enterprise/releases/2024/v202410-1) for additional information. + +To convert your existing configuration into a Docker Compose format on your current Terraform Enterprise installation (Replicated), follow these steps: +1. Create a directory at `/etc/terraform-enterprise`. + +1. Generate the Docker Compose configuration and save it to `/etc/terraform-enterprise/docker-compose.yml` using the following command: + ```shell-session + sudo docker exec terraform-enterprise tfectl app config --format docker > /etc/terraform-enterprise/docker-compose.yml + ``` +Your saved output should resemble the configuration file in [our external services example](/terraform/enterprise/deploy/docker#example-external-mode-configuration). Incorporate the saved output values into this configuration file to ensure correctness. + +Terraform Enterprise may generate a configuration that contains errors. Manually review the configuration to verify that it is complete and accurate. + +#### Step 5: Prepare the host and install + +To make migration smoother and faster, we recommend using the same host(s) as your current Replicated instance. + +-> **Note**: If you want to use a separate host for your new docker-based Terraform Enterprise, we can provide alternative steps. [Reach out to support for assistance](/terraform/enterprise/deploy/troubleshoot/contact-support). + +1. Complete the instructions for creating and applying TLS certificates. Refer to [Create TLS certificates](/terraform/enterprise/deploy/prepare-host#create-tls-certificates) and [Set up installation folders and files](/terraform/enterprise/deploy/docker#set-up-installation-folders-and-files) for instructions. +1. Review the configuration file from previous step. Update any values as needed before moving on to the next step. Pay special attention to placeholder values enclosed in `<>`, such as `image` and `TFE_LICENSE`, and replace them with your actual values. + + Alternatively, you can use the [external services installation instructions for Docker deployments](/terraform/enterprise/deploy/docker#example-external-mode-configuration) or the [active-active installation instructions for Docker deployments](/terraform/enterprise/deploy/docker#example-active-active-mode-configuration) as a starting point and adjust it to fit your environment. + + Update, verify, and remove any unsuitable configuration variables that don't match the reality of your current Terraform Enterprise deployment. For a comprehensive list of available configuration settings, refer to the [Configuration Reference](/terraform/enterprise/deploy/reference/configuration). + + If you are operating Terraform in active-active mode then ensure that port 8201 is added to the exported docker ports to enable high availability requests from Vault. + + To quickly identify many of the required configuration values, inspect the existing Terraform Enterprise application using the `replicatedctl app-config export` command. + +1. Log into the registry and then use the `docker` command to pull the `terraform-enterprise` image version. + + ```shell-session + $ cat | docker login --username terraform images.releases.hashicorp.com --password-stdin + ``` + + When prompted for a password, use the contents of your HashiCorp license file as your password. + + ```shell-session + $ docker pull images.releases.hashicorp.com/hashicorp/terraform-enterprise: + ``` + +1. Optionally create a new systemd service for Terraform Enterprise. Refer to [Manage the Docker service](/terraform/enterprise/deploy/docker#manage-the-docker-service) for instructions. + + -> **Note**: If you want to use a separate host for your new Docker-based Terraform Enterprise deployment, [contact HashiCorp support](/terraform/enterprise/deploy/troubleshoot/contact-support) for assistance. + +#### Step 6: Stop Replicated and migrate + +Next, you can stop Replicated and migrate your Terraform Enterprise installation to Docker. + +1. SSH into your Terraform Enterprise (Replicated) instance. +1. Stop Terraform Enterprise (Replicated). Ensure the application has fully stopped before proceeding. + ```shell-session + $ replicatedctl app stop + ``` + If you are operating Terraform in active-active mode then complete this step on all Terraform Enterprise hosts before continuing. +1. Start (and enable on start up) the Docker Compose based Terraform Enterprise. + ```shell-session + $ systemctl enable --now terraform-enterprise + ``` + If you are operating Terraform in active-active mode then complete this step on all Terraform Enterprise hosts before continuing. +1. Check the status of your service with `systemctl status terraform-enterprise`, or use `docker ps` to find your container's name then run `docker logs [name]`. You can also run `curl https://[hostname]/_health_check` to check the health check endpoint. Terraform Enterprise should now be running using Docker Compose, so your Replicated services can be shut down and disabled. + +1. Shut down Replicated. + + ```shell-session + $ systemctl disable --now replicated replicated-ui replicated-operator + ``` + +1. Next, stop and remove the unnecessary Replicated containers. + ```shell-session + $ docker stop replicated-premkit + ``` + ```shell-session + $ docker stop replicated-statsd + ``` + ```shell-session + $ docker rm -f replicated replicated-ui replicated-operator replicated-premkit replicated-statsd retraced-api retraced-processor retraced-cron retraced-nsqd retraced-postgres + ``` + +-> **Note**: Some of the `docker stop` commands may return “Container not found” errors because not every Replicated install has every container. + +#### Step 7: Validate migration success + +Finally, test that your new Terraform Enterprise installation works properly. If you have an existing suite of release acceptance tests, execute those instead of doing the following steps. We recommend testing capabilities that you use in production, as you would for a Terraform Enterprise upgrade. For example: If you are using sentinel or run tasks in production, we recommend testing a run that includes these integrations in a lower environment before deploying to production. + +1. Execute a plan and apply it from the CLI, testing several subsystems. Ensuring that proxies are correctly configured, certificates are properly configured, and the instance can download Terraform binaries and execute runs. +1. Execute a plan and apply it from VCS, testing that webhooks are working and certificates are in place on both sides. +1. Publish a new module to the private module registry. +1. Execute a plan and apply it with a module or provider from the private registry to ensure the registry is functioning. +1. (_Optional_) Execute a plan and apply it with Sentinel and cost estimation, ensuring run tasks and cost estimation work. +1. (_Optional_) Execute a plan and apply it on a workspace that uses an agent pool, testing that external agents can connect and run jobs successfully. + +#### External Services or Active Active rollback steps + +In the unlikely event you encounter issues and need to roll back, you can revert back to Terraform Enterprise (Replicated) using the following commands. + +1. Stop and disable Terraform Enterprise (Docker). + ```shell-session + $ systemctl disable --now terraform-enterprise + ``` + If you are operating Terraform in active-active mode then complete this step on all Terraform Enterprise hosts before continuing. +1. Start and enable Replicated. + ```shell-session + $ systemctl enable --now replicated replicated-ui replicated-operator + ``` +1. Start Terraform Enterprise (Replicated) + ```shell-session + $ replicatedctl app start + ``` + If you are operating Terraform in active-active mode then complete this step on all Terraform Enterprise hosts before continuing. + +## Mounted disk to Cloud-managed Kubernetes + +You must provide an external PostgreSQL database server, external object storage, and external Redis storage. Refer to the [prerequisites for deploying to Kubernetes](/terraform/enterprise/deploy/kubernetes#prerequisites) for additional information. + +If you currently use the [mounted disk operational mode](/terraform/enterprise/operational-modes#operational-modes) for Terraform Enterprise on Replicated, you do not meet the above requirements. +You must first [migrate to external services mode](/terraform/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration), and then follow the external services to Kubernetes migration guide as well as deploy an external Redis server. +At a high level, this process involves: + +1. [Backing up your data](/terraform/tutorials/recommended-patterns/pattern-backups#backup-a-mounted-disk-deployment). +1. [Restoring your data to external services](/terraform/tutorials/recommended-patterns/pattern-recovery). +1. Testing that the external services migration succeeded. +1. Deploying external redis. +1. Follow the guide for [External Services to Kubernetes migration](/terraform/enterprise/deploy/replicated/replicated-migration#external-services-or-active-active-to-cloud-managed-kubernetes). + +Contact your HashiCorp account representative or HashiCorp support if you have additional questions. + +## External services or Active/Active to Cloud-managed Kubernetes + +Redis is a _required service_ for running Terraform Enterprise in Kubernetes. If your deployment is in operating in [`external` mode](/terraform/enterprise/deploy/reference/configuration#external), you must deploy an external Redis server. + +If you are currently operating Terraform Enterprise in `active-active` mode, then you have all required service dependencies for migrating to Kubernetes. Refer to the [prerequisites for deploying to Kubernetes](/terraform/enterprise/deploy/kubernetes#prerequisites) for additional information. + +Before proceeding with this migration guide, make sure you meet all the [prerequisites](#prerequisites) and that a Flexible +Deployment Options license file has been provided by your HashiCorp business partner. +Do not proceed with this guide if any of the prerequisites are not fulfilled. + +When Terraform Enterprise is operating in `active-active` mode, you can scale directly up to your target number of nodes after the migration is complete. You do not need to scale to one node before scaling to all nodes. + +If at any point you need to revert your settings, see [the rollback steps](/terraform/enterprise/deploy/replicated-migration#kubernetes-rollback-steps). + +### Migration steps + +#### Step 1: Backup your data tier + +We always recommend backing up your data tier before conducting any maintenance or migration. See the backup data guide under the [prerequisites](#prerequisites) section for a detailed +guide on how to move forward with the backup process. + +#### Step 2: Upgrade Terraform Enterprise + +Upgrade your Replicated-hosted Terraform Enterprise installation to [v202309-1](/terraform/enterprise/releases/2023/v202309-1) or later. Refer to [Upgrading](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) +for instructions. + +#### Step 1: Prepare the custom Helm Values file for Terraform Enterprise + +1. On Terraform Enterprise (Replicated), view existing configuration: + + ```shell-session + $ replicatedctl app-config export + ``` + +1. Create a custom [Helm Values file](https://helm.sh/docs/chart_template_guide/values_files/) e.g `overrides.yaml` to override the [default values](https://github.com/hashicorp/terraform-enterprise-helm/blob/main/values.yaml) in the [Terraform Enterprise Helm chart](https://github.com/hashicorp/terraform-enterprise-helm/tree/main). + +1. On the `env.secrets` and `env.variables` sections of the [overrides values file](https://github.com/hashicorp/terraform-enterprise-helm/blob/main/values.yaml), use the external services credentials from the Replicated installation for the Kubernetes installation. Specifically the following: + 1. The `TFE_OBJECT_STORAGE_TYPE` and `TFE_OBJECT_STORAGE_*` variables should specify the object storage type and the container or bucket credentials from your Replicated installation. + 1. The `TFE_DATABASE_*` variables should specify database credentials from the Replicated installation. + 1. The `TFE_REDIS_*` values on the Helm chart should specify the same credentials from the external Redis in your Replicated installation. + 1. If there is an external vault, the `TFE_VAULT_*` values on the Helm chart should specify the same credentials from the external Vault in your Replicated installation. + 1. The `TFE_ENCRYPTION_PASSWORD` value should match the Replicated installation value. You can get this from your Replicated instance via SSH by running the following command: + ```shell-session + $ replicatedctl app-config export --template '{{ .enc_password.Value }}' + ``` + Refer to the [Replicated to flexible deployments configuration mapping](/terraform/enterprise/deploy/reference/configuration#replicated-to-flexible-deployments-configuration-mapping) for more information on how the Replicated configuration maps to the variables and secrets on Terraform Enterprise Helm chart. + + Refer to the [example Kubernetes configuration](/terraform/enterprise/deploy/kubernetes#examples) for additional reference information about cloud-specific override values for the Helm deployment. + +#### Step 2: Migrate to Kubernetes + +1. Stop your Replicated installation by executing the following command: + + ```shell-session + $ replicatedctl app stop + ``` + +1. Wait for the application to stop: + + ```shell-session + $ replicatedctl app status + ``` + +1. [Install Terraform Enterprise on Kubernetes using Helm](/terraform/enterprise/deploy/kubernetes). + +#### Step 3: Validate migration success + +Finally, test that your new Terraform Enterprise installation works properly. If you have an existing suite of release acceptance tests, you can use those instead of doing the following steps. We recommend testing capabilities that you use in production, as you would for a Terraform Enterprise upgrade. For example: If you are using sentinel or run tasks in production, we recommend testing a run that includes these integrations in a lower environment before deploying to production. You should +be able to log in to your new Terraform Enterprise installation with the credentials previously used for your Replicated installation. + +1. Execute a plan and apply it from the CLI, testing several subsystems. Ensuring that proxies are correctly configured, certificates are properly configured, and the instance can download Terraform binaries and execute runs. +1. Execute a plan and apply it from VCS, testing that webhooks are working and certificates are in place on both sides. +1. Publish a new module to the private module registry. +1. Execute a plan and apply it with a module or provider from the private registry to ensure the registry is functioning. +1. (_Optional_) Execute a plan and apply it with Sentinel and cost estimation, ensuring run tasks and cost estimation work. +1. (_Optional_) Execute a plan and apply it on a workspace that uses an agent pool, testing that external agents can connect and run jobs successfully. + +#### Kubernetes rollback steps + +In the unlikely event you encounter issues that cannot be worked around, you can rollback to Terraform Enterprise (Replicated). + +1. If it is possible to `exec` into the pods, run the `node drain` command to stop Terraform Enterprise from executing further instructions. + + ```shell-session + $ tfectl node drain --all + ``` + +1. Uninstall the deployment. + + ```shell-session + $ helm uninstall terraform-enterprise + ``` + +1. Restart Terraform Enterprise on Replicated using the same external services. + ```shell-session + $ replicatedctl app start + ``` + +## Migrate to Podman + +Before proceeding with this migration guide, make sure you meet all the [prerequisites](#prerequisites) and that a Flexible +Deployment Options license file has been provided by your HashiCorp business partner. +Do not proceed with this guide if any of the prerequisites are not fulfilled. + +Complete the following steps to migrate from Replicated to Podman. + +The minimum Terraform Enterprise version necessary for Podman is [v202404-1](/terraform/enterprise/releases/2024/v202404-1). + +When Terraform Enterprise is operating in `active-active` mode, you can scale directly up to your target number of nodes after the migration is complete. You do not need to scale to one node before scaling to all nodes. + +#### Step 1: Prepare the host + +We recommend deploying Terraform Enterprise to the same host as your current Replicated instance. + +[Contact HashiCorp support](/terraform/enterprise/deploy/troubleshoot/contact-support) for assistance migrating your Terraform Enterprise installation to a separate host. + +1. We recommend reusing your Replicated certificate to minimize the upgrade's effect on your other stack components. + + Create a directory with the following: + + - TLS certificate (`cert.pem`) + - TLS private key (`key.pem`) + - CA certificates bundle (`bundle.pem`) + + If you do not have a CA certificates bundle, place your TLS certificate (`cert.pem`) inside `bundle.pem` instead. + Add your certificates to a folder on your host. + + If you cannot access your certificate, key, or bundle file, you can retrieve them from the Replicated Terraform Enterprise container. Run the following command to list the certificate paths in the container: + + ```sh + docker exec terraform-enterprise tfectl app config --unredacted | jq '{cert: .tls.cert_file, key: .tls.key_file, bundle: .tls.ca_bundle_file}' + ``` + + Depending on your setup, the file paths may differ from the following example output: + + ```sh + { + "cert": "/etc/ssl/private/terraform-enterprise/cert.pem", + "key": "/etc/ssl/private/terraform-enterprise/key.pem", + "bundle": "/etc/ssl/private/terraform-enterprise/bundle.pem" + } + ``` + + You can then copy the files from the container into the host. + + ```sh + docker cp terraform-enterprise:/etc/ssl/private/terraform-enterprise/cert.pem /cert.pem + docker cp terraform-enterprise:/etc/ssl/private/terraform-enterprise/key.pem /key.pem + docker cp terraform-enterprise:/etc/ssl/private/terraform-enterprise/bundle.pem /bundle.pem + ``` + +1. Next, backup your Replicated configuration. + Your Replicated configuration contains necessary information, such as the `` as `enc_password` and the `` as `disk_path`. + + ``` + replicatedctl app-config export > replicated-app-config.backup.json + ``` + +1. Create a yaml file based on the template for your current operational mode: + - [Mounted Disk operational mode Kubernetes YAML example](/terraform/enterprise/deploy/podman#example-disk-mode-configuration). + - [External operational mode Kubernetes YAML example](/terraform/enterprise/deploy/podman#example-external-mode-configuration). + - [Active/Active operational mode Kubernetes YAML example](/terraform/enterprise/deploy/podman#example-active-active-mode-configuration). + + Replace the values enclosed in `<>` with your installation's values. For example, set `TFE_HOSTNAME` to the DNS hostname you use to access Terraform Enterprise. + +#### Step 2: Stop Terraform Enterprise and remove Replicated + +Replicated runs using `docker`, while Podman uses `podman-docker`. Installing Podman removes docker, which is why we recommend backing up your data before stopping your Terraform Enterprise instance. Ensure you have [backed up your data](#step-1-backup-your-data-tier-3) and [Replicated configuration](#step-3-prepare-the-host) before proceeding. + +1. Stop Terraform Enterprise (Replicated). Ensure the application has fully stopped before proceeding. + + ```shell-session + $ replicatedctl app stop + ``` + +1. Shut down Replicated. + + ```shell-session + $ systemctl disable --now replicated replicated-ui replicated-operator + ``` + +1. Next, stop and clean up your unnecessary Replicated containers. + ```shell-session + $ docker stop replicated-premkit + ``` + ```shell-session + $ docker stop replicated-statsd + ``` + ```shell-session + $ docker rm -f replicated replicated-ui replicated-operator replicated-premkit replicated-statsd retraced-api retraced-processor retraced-cron retraced-nsqd retraced-postgres + ``` + +#### Step 3: Install Podman + +Verify that you have met the [prerequisites for deploying to Podman](/terraform/enterprise/deploy/podman#prerequisites) before installing Terraform Enterprise on Podman. +Follow the [Podman installation guide](/terraform/enterprise/deploy/podman). + +#### Step 4: Download and install image + +1. Log into the Terraform Enterprise container image registry using `terraform` + as the username and your HashiCorp Terraform Enterprise license as the password: + + ```shell-session + $ echo "" | podman login --username terraform images.releases.hashicorp.com --password-stdin + ``` + +1. Pull the Terraform Enterprise image from the registry. + + ```shell-session + $ podman pull images.releases.hashicorp.com/hashicorp/terraform-enterprise: + ``` + +#### Step 5: Start a Terraform pod + +1. Create a Terraform Enterprise pod by running the following command: + + ```shell-session + $ podman kube play + ``` + +1. In a separate terminal session, you can monitor the logs by running the following command: + + ```shell-session + $ podman logs -f + ``` + +1. Monitor the health of the application until it starts reporting healthy with the following command: + + ```shell-session + $ podman exec tfe-health-check-status + ``` + +#### Step 6: Validate migration success + +Complete the following steps to verify that your new Terraform Enterprise installation works as expected. Alternatively, you can execute your existing suite of release acceptance tests. We recommend testing capabilities that you use in production, as you would for a Terraform Enterprise upgrade. For example: If you are using sentinel or run tasks in production, we recommend testing a run that includes these integrations in a lower environment before deploying to production. + +1. Execute a plan and apply it from the CLI to test several subsystems. This step ensures that proxies are correctly configured, certificates are properly configured, and that the instance can download Terraform binaries and execute runs. +1. Execute a plan and apply it from version control to test that webhooks are working and certificates are in place on both sides. +1. Publish a new module to the private module registry. +1. Execute a plan and apply it with a module or provider from the private registry to ensure the registry is functioning. +1. (_Optional_) Execute a plan and apply it with Sentinel and cost estimation policies enabled. This step ensures that run tasks and cost estimation function as expected. +1. (_Optional_) Execute a plan and apply it on a workspace that uses an agent pool to verify that external agents can connect and run jobs successfully. + +#### Mounted Disk rollback steps + +Complete the following steps to revert to a Replicated deployment. + +1. Stop Terraform Enterprise on Podman. + + ```shell-session + $ podman kube down + ``` + +2. Remove Podman. + + ```shell-session + $ dnf module remove -y container-tools + ``` + + ```shell-session + $ dnf remove -y podman-docker + ``` + +3. Install Terraform Enterprise on Replicated. + + If available, you can reuse the instance initialization script to reinstall Terraform Enterprise on Replicated. Otherwise, refer to the [Replicated installation guide](/terraform/enterprise/deploy/replicated/install/interactive/installer#installation). + +## Mounted disk to Nomad + +You must provide an external PostgreSQL database server, external object storage, and external Redis storage. Refer to the [prerequisites for deploying to Nomad](/terraform/enterprise/deploy/nomad#prerequisites) for additional information. + +You must complete additional steps to migrate a Terraform Enterprise deployment on Replicated in [`disk` mode](/terraform/enterprise/deploy/storage/configure-mode): + +1. [Migrate your Replicated deployment to `external` mode](/terraform/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration) +1. Verify that the migration succeeded. +1. Deploy an external Redis server. + +You can then complete the steps for migrating to Nomad in `external` mode: + +1. Back up your data. Refer to the [Backup a Mounted Disk Deployment](/terraform/tutorials/recommended-patterns/pattern-backups#backup-a-mounted-disk-deployment) for instructions. +1. Restore your data to external services. Refer to the [Terraform Enterprise recovery and restore - recommended pattern](/terraform/tutorials/recommended-patterns/pattern-recovery) tutorial for instructions. +1. Verify that the external services migration succeeded. +1. Complete the steps for migrating to Nomad in `external` mode. Refer to [External Services to Nomad migration](/terraform/enterprise/deploy/replicated-migration#external-services-or-active-active-to-nomad) for instructions. + +Contact your HashiCorp account representative or HashiCorp support if you have additional questions. + +## External services or Active/Active to Nomad + +Redis is required to run Terraform Enterprise in Nomad. If you are migrating a Replicated deployment in [`external` operational mode](/terraform/enterprise/operational-modes#operational-modes), you need to deploy an external Redis server. + +If you are migrating a Replicated deployment in `active-active` operational mode, you should already have all the required service dependencies. Refer to the [prerequisites for deploying to Nomad](/terraform/enterprise/deploy/nomad#prerequisites) for additional information. + +Before proceeding, verify that you meet the [prerequisites](#prerequisites) and that you have a Terraform Enterprise license file. Do not continue if any of the prerequisites are not fulfilled. + +If you need to revert at any point, refer to [Nomad rollback steps](/terraform/enterprise/deploy/replicated-migration#nomad-rollback-steps) for instructions. + +### Migration steps +Complete the following steps to perform the migration. +#### Step 1: Backup your data tier + +Back up your data tier before conducting any maintenance or migration. Refer to [Back up data tier](#back-up-data-tier) for instructions. + +#### Step 2: Upgrade to a compatible version of Terraform Enterprise + +The existing version of Terraform Enterprise must be able to run on non-Replicated runtimes. Refer to [Upgrade existing Terraform Enterprise installation to a compatible version](#upgrade-existing-terraform-enterprise-installation-to-a-flexible-deployment-options-compatible-version) for upgrade instructions. +#### Step 3: Prepare the Nomad job file for Terraform Enterprise + +1. Run the following command to view existing configuration: + + ```shell-session + $ replicatedctl app-config export + ``` + +1. Create a Nomad job file for Terraform Enterprise. Refer to [Configure Terraform Enterprise Nomad job specification](/terraform/enterprise/deploy/nomad#configure-terraform-enterprise-nomad-job-specification) for additional information. + +1. In the Terraform Enterprise Nomad job specification, specify the following values: + 1. The `TFE_OBJECT_STORAGE_TYPE` and `TFE_OBJECT_STORAGE_*` variables should specify the object storage type and the container or bucket credentials from your Replicated installation. + 1. The `TFE_DATABASE_*` variables should specify database credentials from the Replicated installation. + 1. The `TFE_REDIS_*` values on the Helm chart should specify the same credentials from the external Redis in your Replicated installation. + 1. If Terraform Enterprise is connected to an external Vault server, the `TFE_VAULT_*` values on the Helm chart should specify the same credentials from the external Vault in your Replicated installation. + 1. The `TFE_ENCRYPTION_PASSWORD` value should match the Replicated installation value. You can get this from your Replicated instance by connecting to the instance over SSH and running the following command: + ```shell-session + $ replicatedctl app-config export --template '{{ .enc_password.Value }}' + ``` + Refer to the [Replicated to flexible deployments configuration mapping](/terraform/enterprise/deploy/reference/configuration#replicated-to-flexible-deployments-configuration-mapping) for details about the configurations. + +#### Step 4: Migrate to Nomad + +When Terraform Enterprise is operating in `active-active` mode, you can scale directly up to your target number of nodes after the migration is complete. You do not need to scale to one node before scaling to all nodes. + +1. Stop your Replicated installation by executing the following command: + + ```shell-session + $ replicatedctl app stop + ``` + +1. Wait for the application to stop: + + ```shell-session + $ replicatedctl app status + ``` + +1. Install Terraform Enterprise on Nomad. Refer to [Deply Terraform Enterprise to Nomad](/terraform/enterprise/deploy/nomad) for instructions. + +#### Step 5: Validate migration success + +Verify that your new Terraform Enterprise installation works properly. If you have an existing suite of release acceptance tests, you can use them instead of completing the following steps. We recommend testing capabilities that you use in production, as you would for a Terraform Enterprise upgrade. For example: If you are using sentinel or run tasks in production, we recommend testing a run that includes these integrations in a lower environment before deploying to production. You should +be able to log in to your new Terraform Enterprise installation with the credentials previously used for your Replicated installation. + +1. Execute a plan and apply it from the CLI, testing several subsystems. Ensuring that proxies are correctly configured, certificates are properly configured, and the instance can download Terraform binaries and execute runs. +1. Execute a plan and apply it from VCS, testing that webhooks are working and certificates are in place on both sides. +1. Publish a new module to the private module registry. +1. Execute a plan and apply it with a module or provider from the private registry to ensure the registry is functioning. +1. (_Optional_) Execute a plan and apply it with Sentinel and cost estimation, ensuring run tasks and cost estimation work. +1. (_Optional_) Execute a plan and apply it on a workspace that uses an agent pool, testing that external agents can connect and run jobs successfully. + +#### Nomad rollback steps + +Complete the following steps if an unresolvable issue emerges: + +1. If you are able to connect to a job allocation using the [`nomad alloc exec`](/nomad/docs/commands/alloc/exec) command, run the `node drain` command to stop Terraform Enterprise from executing further instructions. + + ```shell-session + $ tfectl node drain --all + ``` + +1. Stop Terraform Enterprise job and purge it. + + ```shell-session + $ nomad job stop -purge -namespace=$namespace + ``` + +1. Optionally, cleanup Nomad variables, ACLs, and namespaces. + + ```shell-session + $ nomad var purge -namespace=$namespace + ``` + + ```shell-session + $ nomad acl policy delete -namespace=$namespace + ``` + + ```shell-session + $ nomad namespace delete -force $namespace + ``` + +1. Restart Terraform Enterprise on Replicated using the same external services. + ```shell-session + $ replicatedctl app start + ``` + +## Troubleshooting + +Refer to the following documentation to ensure you have uninterrupted visibility into the health of the application: + +- [Startup checks reference](/terraform/enterprise/deploy/reference/startup-checks) + +- [Monitor Terraform Enterprise](/terraform/enterprise/deploy/manage/monitor) + +- [Metrics reference](/terraform/enterprise/deploy/reference/metrics) + +### Common Issues + +Below are a list of common migration issues and symptoms of those issues. + +#### Self signed certificates CA not in CA bundle + +##### Symptoms: + +- Plans fail +- Errors in `/var/log/terraform-enterprise/task-worker.log` and `/var/log/terraform-enterprise/atlas.log`, particularly when making calls to Archivist, where the certificate is from an unknown issuer. + +##### Fix: + +- Bring the additional certificates from the full chain certificate into the CA bundle +- Note that this action is partially automated when deploying to Replicated. For other runtimes, you may need to manually concatenate the certificates from the full chain certificate into the CA bundle for the instance to talk to itself. + +#### Required CA not in CA bundle + +##### Symptom: + +- Setting up VCS fails with unknown certificate issuer error + +##### Fix: + +- Include the CA in the CA Bundle + +#### Internal calls to instance or AWS Metadata Endpoint unnecessarily proxied + +##### Symptom: + +- Plans May fail, Logs may fail to load (but not always) +- The proxy directs traffic unexpectedly + +##### Fix: + +- When deployed to Replicated, Terraform builds much of the default `no_proxy` or `NO_PROXY` address list, but you are responsible for managing the list when deploying to the other supported runtimes. In addition to manually adding the entries from your Replicated `Additional No Proxy List` configuration, add the following entries to the `no_proxy` or `NO_PROXY` address list: + - `localhost` + - `127.0.0.1` + - `169.254.169.254` + - FQDN of instance + - Rest of `no_proxy` list diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/index.mdx new file mode 100644 index 000000000..3596680a2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/index.mdx @@ -0,0 +1,18 @@ +--- +page_title: Administration for Replicated deployments overview +description: >- + Learn about administrating Terraform Enterprise deployments on the legacy Replicated platform. +--- + +# Administration for Replicated deployments overview + +This topic contains overview information administrating the Terraform Enterprise host and infrastructure when deployed to the legacy Replicated runtime. For information about administration for non-Replicated runtimes, including Docker, Kubernetes, Nomad, OpenShift, and Podman, refer to [Manage Terraform Enterprise deployment overview](/terraform/enterprise/deploy/manage). + +## Workflows + +Installing and managing a Terraform Enterprise involves administering both the [application](/terraform/enterprise/application-administration) itself and the infrastructure behind that application. + +You can perform the following actions: + +- [Manage your HashiCorp license](/terraform/enterprise/deploy/replicated/administration/license) +- [Manage your infrastructure](/terraform/enterprise/deploy/replicated/administration/infrastructure) \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/admin-cli.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/admin-cli.mdx new file mode 100644 index 000000000..46aca748d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/admin-cli.mdx @@ -0,0 +1,169 @@ +--- +page_title: Admin CLI Commands - Infrastructure Administration - Terraform Enterprise +description: >- + Use the admin CLI to configure Terraform Enterprise when in active/active mode. Learn how to change the configuration, stop the application safely, upgrade TFE, and patch Terraform Enterprise instances using the CLI. +--- + +# Terraform Enterprise Admin CLI Commands + +The [Active/Active](/terraform/enterprise/deploy/replicated/install/automated/active-active) operational mode disables the Replicated Admin Console. Instead, it provides admin CLI commands to change the configuration, stop the application safely, and produce support bundles. You must use SSH to log in to a node in the Active/Active cluster to run these commands. + +Admin CLI commands are available on installations using the Standalone operational mode. + +### Commands + +Note that `tfe-admin` is an alias for `replicated admin`, and can be used interchangeably. + +#### support-bundle + +```bash +tfe-admin support-bundle +``` + +This command generates a support bundle for all nodes. + +The support bundle will be created in `/var/lib/replicated/support-bundles`. + +For External Services and Active/Active installations, the support bundles will be uploaded to the same object store bucket that is used to store Terraform state files. The support bundles for a specific run of the admin command will all be uploaded to a directory with the same JobID, which is a timestamp in [RFC3339](https://datatracker.ietf.org/doc/html/rfc3339) format. If you are sending a support bundle to HashiCorp Support, package and send all associated bundles to ensure that we have all the necessary information. + +Example upload structure + +```bash +support-bundles +└── 2020-11-10T02:03:05Z + ├── 10.0.0.5 + │ └── replicated-support702524260.tar.gz + └── 10.0.0.6 + └── replicated-support577188727.tar.gz +``` + +#### node-drain + +```bash +tfe-admin node-drain +``` + +This command will quiesce the current node and remove it from service. It will allow current work to complete and safely stop the node from picking up any new jobs from the Redis queue, allowing the application to be safely stopped. Currently, it only affects `localhost` (it does not support running on one node to drain other nodes). + +-> **Note:** There is no reverse drain command - a restart is needed to restore the node. + +#### app-config + +```bash +replicatedctl app-config set --value +``` + +This command allows you to use the CLI to make real-time application changes, such as `capacity_concurrency`. You must provide both an allowable `` (setting name) and `` (new setting value). Run `replicatedctl app-config export` for a complete list of the current `app-config` settings. + +For the configuration changes to take effect, you must restart the Terraform Enterprise application **on each node instance**. To restart Terraform Enterprise: + +1. Run `replicatedctl app stop` to stop the application. +1. Run `replicatedctl app status` to confirm the application is stopped. +1. Run `replicatedctl app start` to start the application. + +-> **Note:** You should ensure that any ad hoc changes made in this fashion are captured in the standard node build configuration, as the next time you build/rebuild a node only the configuration stored for that purpose will be in effect and ad hoc changes could be lost. + +-> **Hint:** Adding a function to your Linux start-up like an alias can give you a short cut to the admin `app-config` command only requiring a single command and parameters, such as: + +```bash +# shortcut: tfe-app-config +tfe-app-config () +{ + replicatedctl app-config set "$1" --value "$2" +} +``` + +#### list-nodes + +```bash +tfe-admin list-nodes +``` + +This command lists the IP addresses of all active nodes in the installation. Nodes send a heartbeat every 5 seconds to signal that they are active. If Terraform Enterprise does not receive a heartbeat from a node within 30 seconds, it considers the node inactive and removes the node from the list. + +#### rotate-encryption-password + +```bash +tfe-admin rotate-encryption-password CURRENT_PASSWORD NEW_PASSWORD +``` + +This command rotates the [encryption password](/terraform/enterprise/deploy/replicated/install/automated/encryption-password) in use by Terraform Enterprise. + +To prevent sensitive information from being stored in the shell history, temporarily write the current and new encryption passwords to files and read them upon execution, deleting the temporary files when finished: + +```bash +tfe-admin rotate-encryption-password "$(cat current_password.txt)" "$(cat new_password.txt)" +``` + +A successful encryption password rotation will show the following output: + +```bash +Encryption password successfully rotated! + +Updating the `enc_password` application configuration on 2 node(s) to reflect the new encryption password. + +You must update any installation or automation processes to reflect the new encryption password! +``` + +An unsuccessful encryption password rotation will show an error: + +```bash +Error rotating encryption password: +Error: +exit status 1 +Output: +Encryption password not rotated! +Error reading previous Vault configuration: failed decrypting unseal key: could not decrypt ciphertext: chacha20poly1305: message authentication failed +``` + +#### license-info + +```bash +tfe-admin license-info +``` + +This command lists the license information and workspace count for the Terraform Enterprise installation on which it is run. + +## Other Supporting Commands + +There are additional commands available for checking status and troubleshooting directly on nodes. You can use them to confirm successful installation or to check on the status of a running node as part of troubleshooting activities. Also, there are additional command aliases available that allow you to run more abbreviated versions of commands like just `support-bundle`. Run an `alias` command with no parameters to see the list of available command aliases. + +### Commands + +#### health-check + +```bash +tfe-admin health-check +(alias health-check) +``` + +This command tests and reports on the status of the major Terraform Enterprise services. Each will be listed as PASS or FAIL. If any are marked as FAIL, your Terraform Enterprise implementation is NOT healthy and additional action must be taken. + +#### replicated status + +```bash +replicatedctl system status +``` + +Displays status info on the Replicated sub-system. Key values to note are that status values return as "ready". This reports on the status of the system on the node instance that it is run on. + +#### Terraform Enterprise application status + +```bash +replicatedctl app status +``` + +Displays status info on the Terraform Enterprise application. Key values to note are that `State` and `DesiredState` are both "started" and `IsTransitioning` is false. This reports on the status of the application on the node instance that it is run on. + +## Upgrading Terraform Enterprise or Patching Terraform Enterprise Node Instances + +The mechanism used to upgrade the Terraform Enterprise node instances is to fully repave the instances (destroy and rebuild entirely). +This is another reason why using automation to build the instances is important. Currently, the safest way to perform and upgrade is to shut down all node instances, rebuild one node to validate a successful upgrade, and then scale to additional nodes (currently max 5). + +These are the steps required to repave the node instances: + +- Run the `node-drain` command as described previously on each node to complete active work and stop new work from being processed. +- Update the instance build configuration such as setting a new `ReleaseSequence` to upgrade versions and/or make any other alterations such as patching the base image used for building the instances. +- Follow the instructions in [Terraform Enterprise Active/Active](/terraform/enterprise/deploy/replicated/install/automated/active-active#scale-down-to-zero-nodes) to scale down to zero nodes and proceed through scaling up to one node, validating success, and then scaling additional nodes. + +If planned and orchestrated efficiently, the total downtime for the repaving will be the amount of time it has taken to build one node as processing will resume as soon as the first node is functional. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/automated-recovery.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/automated-recovery.mdx new file mode 100644 index 000000000..923be6bef --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/automated-recovery.mdx @@ -0,0 +1,251 @@ +--- +page_title: Automated Recovery - Infrastructure Administration - Terraform Enterprise +description: >- + Use automated recovery to provice a short Mean-Time-To-Recovery (MTTR) in the event of an outage. Learn how to configure and restore snapshots. +--- + +# Terraform Enterprise Automated Recovery + +This guide explains how to configure automated recovery for a Terraform +Enterprise installation. The goal is to provide a short Mean-Time-To-Recovery (MTTR) +in the event of an outage. There are two steps in the automated recovery process: + +1. Configure snapshots on your current install to backup data +1. Provision a new Terraform Enterprise instance using the latest snapshot + +This guide will walk through both of these steps. + +## Configure snapshots + +Snapshots are taken on the Terraform Enterprise instance. That instance can +have two types of data on it: + +- Terraform Enterprise application data: The core product data such as + run history, configuration history, state history. This data + changes frequently. +- Terraform Enterprise installer data: The data used + to configure Terraform Enterprise itself such as installation type, database + connection settings, hostname. This data rarely changes. + +In the Mounted Disk and External Services operational modes, only +installer data is stored on the instance. Application data +is stored in the mounted disk or in an external PostgreSQL instance. + +Automated snapshots are more effective when using _Mounted Disk_ or +_External Services_ as the amount of backed up data is smaller and +less risky. + +You can configure snapshots in the dashboard under `Console Settings`, in the +`Snapshot & Restore` section. We recommend selecting `Enable Automatic +Scheduled Snapshots`. The interval depends on the operational mode, but we +recommend Daily for Mounted Disk or External Services because the snapshots +contain only configuration data, not application data. + +## Restore a snapshot in a new Terraform Enterprise instance + +## Version Checking + +-> **Note**: `replicatedctl` is located at `/usr/local/bin/replicatedctl`. On some operating systems, `/usr/local/bin` is not in the user's `$PATH`. In these cases, either add `/usr/local/bin` to the path or refer to `replicatedctl` with the full path. + +Using the restore mechanism requires Replicated version 2.17.0 or greater. +You can check the version using `replicatedctl version`. + +## Script + +Below are examples of restore scripts that are run on machine boot. +There are many mechanisms that can run a script on boot (cloud-init, systemd, /etc/init.d). +Which one is used is up to the user. + +This script is presented as an example. Anyone using it needs to understand +what it's doing and is free to modify it to meet any additional needs they have. + +### S3 + +This example uses S3 as the mechanism to store snapshots on a debian-based system. + +``` +#!/bin/bash + +set -e -u -o pipefail + +bucket=your_bucket_to_store_snapshots +region=region_of_the_bucket +access_key=aws_access_key_id +secret_key=aws_secret_access_key + +access="--store s3 --s3-bucket $bucket --s3-region $region --s3-key-id $access_key --s3-secret-key $secret_key" + +# jq is used by this script, so install it. For other Linux distros, either preinstall jq +# and remove these lines, or change to the mechanism your distro uses to install jq. + +apt-get update +apt-get install -y jq + +# Run the installer. + +curl https://install.terraform.io/ptfe/stable | bash -s fast-timeouts + +# Wait for replicated to start before proceeding +until replicatedctl system status --template '{{and (eq .Replicated "ready") (eq .Retraced "ready")}}' | grep -q true; do + sleep 1 + echo "Replicated is not yet ready." +done +echo "Replicated is ready." + +# This retrieves a list of all the snapshots currently available. +replicatedctl snapshot ls $access -o json > /tmp/snapshots.json + +# Pull just the snapshot id out of the list of snapshots +id=$(jq -r 'sort_by(.finished) | .[-1].id // ""' /tmp/snapshots.json) + +# If there are no snapshots available, exit out +if test "$id" = ""; then + echo "No snapshots found" + exit 1 +fi + +echo "Restoring snapshot: $id" + +# Restore the detected snapshot. This ignores preflight checks to be sure the application +# is booted. +replicatedctl snapshot restore $access --dismiss-preflight-checks "$id" + +# Wait until the application reports itself as running. This step can be removed if +# something upstream is prepared to wait for the application to finish booting. +until curl -f -s --connect-timeout 1 http://localhost/_health_check; do + sleep 1 +done + +echo +echo "Application booted!" +``` + +### SFTP + +This example uses sftp to store the snapshots. + +``` +#!/bin/bash + +set -e -u -o pipefail + +key_file=path_to_your_ssh_key +key="$(base64 -w0 "$key_file")" +host=sftp_server_hostname_or_ip +user=user_to_sftp_on_the_remote_server + +access="--store sftp --sftp-host $host --sftp-user $user --sftp-key $key" + +# jq is used by this script, so install it. For other Linux distros, either preinstall jq +# and remove these lines, or change to the mechanism your distro uses to install jq. + +apt-get update +apt-get install -y jq + +# Run the installer. + +curl https://install.terraform.io/ptfe/stable | bash -s fast-timeouts + +# Wait for replicated to start before proceeding +until replicatedctl system status --template '{{and (eq .Replicated "ready") (eq .Retraced "ready")}}' | grep -q true; do + sleep 1 + echo "Replicated is not yet ready." +done +echo "Replicated is ready." + +# This retrieves a list of all the snapshots currently available. +replicatedctl snapshot ls $access -o json > /tmp/snapshots.json + +# Pull just the snapshot id out of the list of snapshots +id=$(jq -r 'sort_by(.finished) | .[-1].id // ""' /tmp/snapshots.json) + +# If there are no snapshots available, exit out +if test "$id" = ""; then + echo "No snapshots found" + exit 1 +fi + +echo "Restoring snapshot: $id" + +# Restore the detected snapshot. This ignores preflight checks to be sure the application +# is booted. +replicatedctl snapshot restore $access --dismiss-preflight-checks "$id" + +# Wait until the application reports itself as running. This step can be removed if +# something upstream is prepared to wait for the application to finish booting. +until curl -f -s --connect-timeout 1 http://localhost/_health_check; do + sleep 1 +done + +echo +echo "Application booted!" +``` + +### Local directory + +This example uses a local directory to store the snapshots. If this is intended to be run +on a brand new system, the local directory would be either mounted block device or a +network filesystem like NFS or CIFS. + +``` +#!/bin/bash + +set -e -u -o pipefail + +path=absolute_path_to_directory_of_snapshots + +access="--store local --path $path" + +# jq is used by this script, so install it. For other Linux distros, either preinstall jq +# and remove these lines, or change to the mechanism your distro uses to install jq. + +apt-get update +apt-get install -y jq + +# Run the installer. + +curl https://install.terraform.io/ptfe/stable | bash -s fast-timeouts + +# Wait for replicated to start before proceeding +until replicatedctl system status --template '{{and (eq .Replicated "ready") (eq .Retraced "ready")}}' | grep -q true; do + sleep 1 + echo "Replicated is not yet ready." +done +echo "Replicated is ready." + +# This retrieves a list of all the snapshots currently available. +replicatedctl snapshot ls $access -o json > /tmp/snapshots.json + +# Pull just the snapshot id out of the list of snapshots +id=$(jq -r 'sort_by(.finished) | .[-1].id // ""' /tmp/snapshots.json) + +# If there are no snapshots available, exit out +if test "$id" = ""; then + echo "No snapshots found" + exit 1 +fi + +echo "Restoring snapshot: $id" + +# Restore the detected snapshot. This ignores preflight checks to be sure the application +# is booted. +replicatedctl snapshot restore $access --dismiss-preflight-checks "$id" + +# Wait until the application reports itself as running. This step can be removed if +# something upstream is prepared to wait for the application to finish booting. +until curl -f -s --connect-timeout 1 http://localhost/_health_check; do + sleep 1 +done + +echo +echo "Application booted!" +``` + +## Airgap recovery considerations + +The instructions above are tailored for the online install method. When restoring on an airgap instance, there are several additional considerations: + +1. The minimum version of Replicated is 2.31.0, rather than 2.17.0. +1. The license file and airgap package must be in place on the new instance prior to restore. The restore process expects to find them in the same locations as they were on the original instance. +1. The snapshot being used must also be from an airgap instance. +1. The `install.sh` script and method used must be from the Replicated airgap installer boostrapper, using the process described for [airgap installation](/terraform/enterprise/deploy/replicated/install/interactive/installer#run-the-installer-airgapped). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/backup-restore.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/backup-restore.mdx new file mode 100644 index 000000000..9fc0a7f29 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/backup-restore.mdx @@ -0,0 +1,204 @@ +--- +page_title: Backups and Restores - Infrastructure Administration - Terraform Enterprise +description: >- + Use the `/_backup` endpoint to backup and restore all data stored in your installation. Learn how to create and restore backups using the HTTP API. +--- + +# Terraform Enterprise Backups and Restores + +Terraform Enterprise provides an API to backup and restore all of its application data. + +The backup and restore API is separate from the Terraform Enterprise application-level APIs. As such, a separate authorization token is required to use the backup and restore API. See [Authentication](#authentication) below for more details. + +Using the backup and restore API is the only supported way to migrate between operational modes (mounted disk, external services). + +> **Note**: We do not recommend using the backup and restore API to maintain periodic Terraform Enterprise application data backups. For best practices, refer to our recommended patterns covering the [backup](/terraform/tutorials/recommended-patterns/pattern-backups) and [restore](/terraform/tutorials/recommended-patterns/pattern-recovery) processes. + +## About Backups and Restores + +The backup and restore API backs up all of the data stored in a Terraform Enterprise installation, including both the blob storage and the PostgreSQL database. It does not back up the installation configuration. This backup can then be restored to a new installation of Terraform Enterprise. + +Note the following when using the backup and restore API: + +- The version of Terraform Enterprise cannot be changed between a backup and restore. A backup taken from one version of Terraform Enterprise cannot be restored to an installation running a different version of Terraform Enterprise. +- The version of PostgreSQL being used cannot be changed between a backup and restore. A backup taken from a Terraform Enterprise installation using one version of PostgreSQL cannot be restored to an installation using a different version of PostgreSQL. +- Terraform Enterprise internally uses PostgreSQL v14, so customers using PostgreSQL v15 cannot use the [backup and restore API](/terraform/enterprise/deploy/manage/backup-restore). Instead, use cloud-native tools, or manually backup and restore your database with `pg_dump` and `pg_restore`. +- The Terraform Enterprise installation that will be restored to must be a new, + running installation with no existing application data. +- The backup and restore API times out after 5000 seconds (83.3 minutes). If you have a lot of + data in the object store, use [`skip-object-storage`](#request-body) to + finish the backup in time. Then after you restore the backup, manually move your object store data. See this + [support article](https://support.hashicorp.com/hc/en-us/articles/10536697730323-Migrate-TFE-from-Mounted-Disk-to-External-Services-mode-with-Backup-Restore-API) for details. +- Once a restore is completed, the Terraform Enterprise application will need to be restarted before it can use the restored data. + +See also: + +- [Data Security](/terraform/enterprise/deploy/replicated/architecture/system-overview/data-security) for details about the contents of Terraform Enterprise's blob storage and PostgreSQL database. + +### Authentication + +The backup and restore API uses a separate authorization token which can be found on the settings dashboard (`https://:8800/settings`) near the bottom of the page: + +![Screenshot: the TFE install dashboard, with the API token visible](/img/docs/token.png) + +If the Replicated console dashboard is unavailable, execute `replicatedctl app-config export --template '{{.backup_token.Value}}'` from the TFE node shell to get the backup API authorization token. + +-> **Note:** This authorization token is specific to the Terraform Enterprise installation. As a result, the authorization token used to create a backup may be different than the authorization token used to perform a restore. Please ensure you are using the correct authorization token when performing a backup or restore operation. + +The backup and restore API is separate from the Terraform Enterprise application-level APIs and cannot be accessed with Terraform Enterprise user, team, or organization API tokens. + +To use this authorization token with the backup and restore API, pass the `Authorization: Bearer ` header in your API requests. + +~> **Important:** Since this authorization token can access all of the data in a Terraform Enterprise installation, protect it very carefully. + +### Security and Encryption + +Terraform Enterprise uses HashiCorp Vault to encrypt and decrypt its data. The Vault encryption keys that are used to encrypt and decrypt this data are not preserved during a backup or restore. Instead, during a backup, the data is decrypted by Vault and then re-encrypted using a password provided by you, resulting in an encrypted backup blob. During a restore, the same password that you provided during the backup must be used to decrypt the data before it is re-encrypted with the new Terraform Enterprise installation's Vault encryption keys. + +The backup and restore API expect this password to be provided as a JSON object with a `password` property within the request payload. The value for the `password` property can be any valid string. Here's what an example JSON object looks like. + +```json +{ + "password": "befit-brakeman-footstep-unclasp" +} +``` + +~> **Important:** The same password that was provided during backup must be provided during restore. This password can be used to access all of the data that was backed up. Please protect it very carefully. + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[201]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/201 + +[202]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/202 + +[204]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/204 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[401]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/401 + +[403]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/403 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[409]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/409 + +[412]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/412 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[429]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/429 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +[504]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/504 + +## Creating a Backup + +`POST /_backup/api/v1/backup` + +To initiate a backup, make a POST request to the backup endpoint on a running Terraform Enterprise installation. + +The response to this request will be an encrypted binary blob containing all of your Terraform Enterprise data. When using this endpoint, please: + +- Remember to specify an output file for the encrypted backup blob. +- Be prepared to download and store many gigabytes of data to the filesystem of whichever machine the request is sent from. For best performance and to avoid disconnections, we recommend sending this request from a server colocated with the Terraform Enterprise installation rather than from a workstation. +- Treat this encrypted backup blob as sensitive data and ensure it is stored securely. +- Remember the password that was used to encrypt this backup blob. + +| Status | Response | Reason | +| ------- | ------------------ | ----------------------------- | +| [200][] | Binary backup blob | Successfully created a backup | +| [400][] | (none) | Invalid request | +| [500][] | (none) | Internal server error | + +~> **Important:** A successful backup **must** return `200`. If `200` is not returned and the call silently closes, the backup blob may be incomplete, resulting in data loss. + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| --------------------- | ------ | ------- | ---------------------------------------------------------- | +| `password` | string | | The password used to encrypt the backup blob. | +| `skip_object_storage` | bool | `false` | Whether or not to skip backing up the object storage data. | + +### Sample Payload + +```json +{ + "password": "befit-brakeman-footstep-unclasp" +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --request POST \ + --data @payload.json \ + --output backup.blob \ + https:///_backup/api/v1/backup +``` + +## Restoring a Backup + +`POST /_backup/api/v1/restore` + +Before restoring, you must first create a new Terraform Enterprise installation. + +-> **Note:** The authorization token used to restore the backup is specific to the Terraform Enterprise installation. If restoring to a separate Terraform Enterprise installation, the authorization token will be different for the restore than it was for the backup. See [Authentication](#authentication) above for more details. + +Once the Terraform Enterprise application is up and running, you can initiate a restore by making a POST request to the restore endpoint. + +Be prepared to upload many gigabytes of data from the filesystem of whichever machine the request is sent from. For best performance and to avoid disconnections, we recommend sending this request from a server colocated with the Terraform Enterprise installation rather than from a workstation. + +Once the restore is complete, you must **restart the application.** The application will not restart automatically. There are two ways to do this: + +- Log into the install dashboard and stop, then start the application. +- From the CLI, run `replicatedctl app stop`, then run `replicatedctl app start`. + +| Status | Response | Reason | +| ------- | -------- | ------------------------------ | +| [200][] | (none) | Successfully restored a backup | +| [400][] | (none) | Invalid request | +| [500][] | (none) | Internal server error | + +### Request Body + +This POST endpoint requires the following form fields which must be provided as `multipart/form-data`. + +| Form field | Description | +| ---------- | ---------------------------------------------------------------------------------- | +| `snapshot` | An encrypted backup blob downloaded from the Terraform Enterprise backup endpoint. | +| `config` | A JSON file containing a JSON object. See the table below. | + +The JSON file used in the `config` form field above must contain a JSON object with the following properties. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ---------- | ------ | ------- | --------------------------------------------- | +| `password` | string | | The password used to decrypt the backup blob. | + +### Sample Payload + +```json +{ + "password": "befit-brakeman-footstep-unclasp" +} +``` + +### Sample Request + +```shell +curl \ + --header "Authorization: Bearer $TOKEN" \ + --request POST \ + --form config=@payload.json \ + --form snapshot=@backup.blob \ + https:///_backup/api/v1/restore +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/consolidated-services.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/consolidated-services.mdx new file mode 100644 index 000000000..c0e61cd85 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/consolidated-services.mdx @@ -0,0 +1,125 @@ +--- +page_title: Consolidated Services - Infrastructure Administration - Terraform Enterprise +description: >- + Terraform Enterprise is adopting a simplified architecture where all server services are consolidated into a single container named `terraform-enterprise`. +--- + +# Terraform Enterprise Consolidated Services Architecture + +Terraform Enterprise is adopting a simplified architecture where all server +services are consolidated into a single container called +`terraform-enterprise`. This change improves +how you install and operate Terraform Enterprise, and includes an immediate +security benefit of running containers as a non-root user. This architecture is the default +configuration in the v202309-1 release, and you can disable it using the `consolidated_services_enabled` setting until v202401-1, +when we will remove the setting. + +## Changes + +When `consolidated_services_enabled` is enabled: + +- Terraform Enterprise services run inside the `terraform-enterprise` + container. +- Containers run as a non-root user. + +- When log-forwarding is not enabled, all service logs are logged to STDOUT, are in `json-file` format and include a new `component` attribute that specifies which Terraform Enterprise service emitted the log. + + The log below is an example of a log from the `atlas` component and is in escaped JSON format. + ```JSON + {"component":"atlas","log":"2023-09-14 19:04:42 [INFO] [d6e4e6db-06b6-4297-b1ff-ae310ebee25e] [dd.service=atlas + dd.trace_id=4001067029455957720 dd.span_id=0] {\"method\":\"GET\",\"path\":\"/_health_check\",\"format\":\"html\", + \"status\":200,\"allocations\":503,\"duration\":1.26,\"view\":0.32,\"db\":0.0,\"dd\":{\"trace_id\": + \"4001067029455957720\",\"span_id\":\"0\",\"env\":\"\",\"service\":\"atlas\",\"version\":\"\"},\"ddsource\": + [\"ruby\"],\"uuid\":\"d6e4e6db-06b6-4297-b1ff-ae310ebee25e\",\"remote_ip\":\"127.0.0.1\",\"request_id\": + \"d6e4e6db-06b6-4297-b1ff-ae310ebee25e\",\"user_agent\":\"Load Balancer Agent\",\"user\":null,\"auth_source\":null}"} + ``` + + The log below is an example of a log from the `sidekiq` component and is a JSON formatted log. + ```JSON + {"component":"sidekiq","log":"2023-09-14 19:04:19 [INFO] msg=Worker finish worker=AgentStatusWorker"} + ``` + + The log below is an example of an Audit Log from the `atlas` component and is in JSON escaped format. + + ```JSON + {"component":"atlas","log":"2023-09-14 19:59:36 [INFO] [9787b874-565a-4cd1-9146-f9e89a6286f4] [dd.service=atlas + dd.trace_id=1839403271971964936 dd.span_id=0] [Audit Log] {\"resource\":\"workspace\",\"action\":\"create\", + \"resource_id\":\"ws-8RoTSc9iow6JE6Nt\",\"organization\":\"banana\",\"organization_id\":\"org-DPfZszgSorjbaF9M\", + \"actor\":\"manage\",\"timestamp\":\"2023-09-14T19:59:36Z\",\"meta\":{\"project_id\":\"prj-f54CoqSE8X9sXd5F\"}, + \"actor_ip\":\"24.17.65.143\"}"} + ``` + + The following components emit log messages in escaped JSON format: + + - `archivist` + - `task-worker` + - `slug-ingress` + - `outbound-http-proxy` + - `terraform-registry-api` + - `terraform-state-parser` + - `terraform-registry-worker` + + +If using the log-forwarding feature, your service logs are sent to your configured log aggregation service and are in the format that the `fluent-bit` plugin uses. + +In previous releases, the `container_name` attribute contained the name of the Terraform Enterprise service that emitted the log. In the v202309-1 release and beyond, the `container_name` attribute is `terraform-enterprise`, and the `component` metadata attribute logs the name of the service responsible for emitting that log. +For example, prior to v202309-1 your log metadata resembles: + ``` + service: terraform_enterprise + container_name: tfe-atlas + component: n/a + ``` + +After v202309-1, the log metadata resembles: + ``` + service: terraform_enterprise + container_name: terraform_enterprise + component: atlas + ``` + + +## What hasn’t changed? + +Terraform runs continue to execute in isolated, short-lived containers. + +### How can I disable consolidated services? + +1. Disable the `consolidated_services_enabled` setting. + + ``` + replicatedctl app-config set consolidated_services_enabled --value 0 + ``` + +1. Restart Terraform Enterprise. + + ```sh + replicatedctl app stop + + replicatedctl app status + + replicatedctl app start + ``` + +## Frequently Asked Questions (F.A.Q) + +### What should I test to verify if I'm impacted by this change? + +We advise users to evaluate the impact this will have on your monitoring and +log forwarding implementation. + +All server services are now included in a single container. If you are +monitoring container metrics, please note that you will have fewer containers +reporting information. Run containers are not impacted by this change, they +remain separate and short-lived. + +Service logs have been consolidated into a single log stream. + +### Where should I seek help with issues? + +Contact [HashiCorp support](/terraform/enterprise/deploy/troubleshoot/contact-support) for help with any issues. + +### Will this always be an optional architecture? + +No. In v202401-1, consolidated services will become the default and only +option. + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/index.mdx new file mode 100644 index 000000000..de007ab14 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/index.mdx @@ -0,0 +1,21 @@ +--- +page_title: Infrastructure administration overview +description: >- + Learn about administrating Terraform Enterprise infrastructure deployed to the legacy Replicated platform. +--- + +# Infrastructure administration overview for Replicated deployments + +This topic contains overview information administrating the Terraform Enterprise infrastructure when deployed to the legacy Replicated runtime. For information about administration for non-Replicated runtimes, including Docker, Kubernetes, Nomad, OpenShift, and Podman, refer to [Manage Terraform Enterprise deployment overview](/terraform/enterprise/deploy/manage). + +## Workflows + +You can perform the following actions: + +- [Use the CLI](/terraform/enterprise/deploy/replicated/administration/infrastructure/admin-cli) +- [Enable automated recovery](/terraform/enterprise/deploy/replicated/administration/infrastructure/automated-recovery) +- [Back up and restore your deployment](/terraform/enterprise/deploy/replicated/administration/infrastructure/backup-restore) +- [Learn about the consolidated services architecture](/terraform/enterprise/deploy/replicated/administration/infrastructure/consolidated-services) +- [Migrate to `external` mode from `disk` mode](/terraform/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration) +- [Upgrade your installation](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) +- [Migrate worker images to agents](/terraform/enterprise/deploy/replicated/administration/infrastructure/worker-to-agent-migration) \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration.mdx new file mode 100644 index 000000000..de660ca9c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration.mdx @@ -0,0 +1,139 @@ +--- +page_title: Migrating from Mounted Disk Mode to External Services Mode - Infrastructure Administration - Terraform Enterprise +description: >- + Migrating from Mounted Disk Mode to External Services Mode +--- + +# Migrating from `disk` to `external` mode + +You must choose an operational mode before you install and deploy Terraform Enterprise. To change the operational mode, you must backup the data of your Terraform Enterprise installation and restore it to a new one. If you currently use the [`disk` operational mode](/terraform/enterprise/deploy/reference/configuration#disk) and are migrating to a [non-Replicated runtime](/terraform/enterprise/deploy) other than `disk` mode on Docker, you must first migrate to `external` mode. + +## Create a Backup + +To create a backup, retrieve the backup API token from your Terraform Enterprise installation's settings page. Store this token in an environment variable. + +```shell-session +$ export TOKEN= +``` + +Next, create a file named `payload.json` that includes your Terraform Enterprise encryption password. + +```json +{ + "password": "" +} +``` + +Optionally, if you have a large number of objects in storage which is causing your backup to become very large, you can skip the backup of the object storage by adding the `skip_object_storage` field to the `payload.json` file. + +```json +{ + "password": "", + "skip_object_storage": true +} +``` + +Finally, create the an encrypted backup file named `backup.blob` in the current directory. + +```shell-session +$ curl \ + --header "Authorization: Bearer ${TOKEN}" \ + --request POST \ + --data @payload.json \ + --output backup.blob \ + https:///_backup/api/v1/backup +``` + +## Prepare the New environment + +Create a new Terraform Enterprise installation. The new installation must meet the following requirements: + +1. The [`TFE_OPERATIONAL_MODE`](/terraform/enterprise/deploy/reference/configuration#tfe_operational_mode) configuration must be set to `external` or `active-active`. +1. It is configured with the same encryption password as the instance that you created the backup from. +1. The PostgreSQL database version matches the version your mounted disk installation uses. + +## Restore the Backup + +Retrieve the backup API token from your new Terraform Enterprise installation's settings page. Store this token in an environment variable. + +```shell-session +$ export TOKEN= +``` + +Use the same `payload.json` and `backup.blob` files to restore the backup. + +```shell-session +$ curl \ + --header "Authorization: Bearer ${TOKEN}" \ + --request POST \ + --form config=@payload.json \ + --form snapshot=@backup.blob \ + https:///_backup/api/v1/restore + ``` + +## Upload to Object Store (Optional) + +If you set `skip_object_storage` to true in your `payload.json` file, you must separately upload your local disk storage to your S3-compatible object store. + +SSH into the old Terraform Enterprise instance and navigate to the configured mounted disk path. If you do not know the mounted disk path, you can retrieve it using the `replicatedctl` command. + +```shell-session +$ replicatedctl app-config export | grep "disk_path" -A1 +``` + +Navigate to the mounted disk path. + +```shell-session +$ cd +``` + +Next, set your AWS credentials as environment variables. These credentials must have access to write to S3. + +```shell-session +export AWS_ACCESS_KEY_ID= +export AWS_SECRET_ACCESS_KEY= +export REGION= +export BUCKET= +``` + +Next, upload the contents of each directory in the `/aux/archivist` directory. + +~> NOTE: Some directories may not exist in your installation. Ensure that you upload all contents of the `archivist` directory to your object storage and that you prefix each directory with `archivist`. + +```shell-session +aws s3 cp --recursive terraform s3://${BUCKET}/archivistterraform + +aws s3 cp --recursive sentinel s3://${BUCKET}/archivistsentinel + +aws s3 cp --recursive plan-export s3://${BUCKET}/archivistplan-export + +aws s3 cp --recursive policy-set-versions s3://${BUCKET}/archivistpolicy-set-versions +``` + +## Restart Terraform Enterprise + +SSH into the new Terraform Enterprise instance and stop the Terraform Enterprise application. + +```shell-session +$ replicatedctl app stop +``` + +Watch the status of the Terraform Enterprise application until the `State` is `stopped`. + +```shell-session +$ watch replicatedctl app status +``` + +Once it has stopped, start Terraform Enterprise application. + +```shell-session +$ replicatedctl app start +``` + +Watch the status of the Terraform Enterprise application until the `State` is `started`. + +```shell-session +$ watch replicatedctl app status +``` + +Once the Terraform Enterprise application is started, you have successfully migrated to external services. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/index.mdx new file mode 100644 index 000000000..dfd502557 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/index.mdx @@ -0,0 +1,54 @@ +--- +page_title: Upgrade Replicated deployment overview +description: This overview describes how to upgrade Terraform Enterprise deployments, including air-gapped Terraform Enterprise deployments, that run on Replicated. +--- + +# Upgrade Replicated deployment overview + +This topic provides an overview of how to upgrade Terraform Enterprise deployments that run on the Replicated platform. For instructions on upgrading Terraform Enterprise deployed to other runtimes, refer [Upgrade Terraform Enterprise](/terraform/enterprise/deploy/manage/upgrade). + + +

The Replicated deployment option is limited to customers who purchased Terraform Enterprise before January 2024. Terraform Enterprise supports new deployment options and will end support for the Replicated Native Scheduler option.

+ +

The final Replicated release of Terraform Enterprise will be in March 2025. HashiCorp will support this release until April 1, 2026.

+ +

To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by November 2024. For more information, refer to Terraform Enterprise deployment overview or contact your HashiCorp account representative.

+
+ +## Workflows + +We recommend [contacting HashiCorp support](/terraform/enterprise/deploy/troubleshoot/contact-support) or your account team before starting on an upgrade journey if you have any questions or concerns. Complete the following steps to upgrade Terraform Enterprise: + +1. Plan your upgrade: There are several preparatory actions you should take to plan your upgrade. For example, you should review release notes for versions along your upgrade path so that you are aware of required releases and new or deprecated features and other updates may affect your existing workflows. Refer to [Plan your upgrade](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades/plan) for details. +1. Perform the upgrade steps: Verify that you meet the requirements and follow the instructions for upgrading an Internet-connected or air-gapped deployment. Refer to [Upgrade your Replicated deployment upgrade](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades/upgrade) for details. + +## Upgrade duration +You can expect an upgrade for a single Terraform Enterprise instance to last 15-30 minutes. In rare cases, a release may include synchronous database migrations that could extend the upgrade duration for large-scale deployments. + +To help you prepare for an extended upgrade, refer to the release notes for the version you are upgrading to. For example, the following release notes describe potential extended upgrades: + +- [v202406-1 release notes](/terraform/enterprise/releases/2024/v202406-1): The upgrade appears to stall when the data directory contains 1 TB or more of data and Terraform Enterprise is in `disk` mode. +- [v202210-1 release notes](/terraform/enterprise/releases/2022/v202210-1): The migration may add two minutes per 5,000 organizations. + +When skipping releases, be sure to review release notes for all skipped releases for a cumulative list of all breaking changes, known issues, fixes, and features added between your current and target version. + +## Releases +Refer to the [releases documentation](/terraform/enterprise/releases) for details about new releases. We update the releases documentation every time we release a new version. + +Unless a release is delayed or pushed up due to unseen circumstances, we release a new version of Terraform Enterprise once a month. The target release date for the next version appears at the top of the release page. You can also monitor [our forum](https://discuss.hashicorp.com/tags/c/release-notifications/57/terraform-enterprise) for release updates. + +The first release of each month has a `-1` at the end of the version number. The release usually includes application changes, such as new functionality, bug fixes, and performance enhancements. We increment the number at the end of the version as we release subsequent versions. These versions are generally patches that resolve a moderate to high severity issue. Some months do not include a patch release. + +### Required releases +You cannot skip a release that contains critical updates, such as an upgrade or breaking change to an internal dependency. For example, if your current release is `v202206-1` and you want to upgrade to `v202210-1`, but `v202207-2*` is required, you must first upgrade to `v202207-2*` before performing another upgrade from `v202207-2*` to `v202210-1`. + +We denote required releases with an asterisk next to the version number in the [releases documentation](/terraform/enterprise/releases), for example, `v202207-2*`. Releases without an asterisk are optional and you can skip them when jumping multiple releases. We mark releases as required if they contain changes that require a full application startup before proceeding to a further release. + +## Terraform Enterprise environment +Upgrading may require a change to the stack of technologies that supports your Terraform Enterprise deployment. The environment may include the following components: + +- Cloud or platform provider the host is running on, such as AWS or VMware +- Host, such as the EC2 instance +- Operating system, such as RHEL 7.6 +- Postgres version +- Redis version diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/prepare.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/prepare.mdx new file mode 100644 index 000000000..e910ec953 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/prepare.mdx @@ -0,0 +1,101 @@ +--- +page_title: Prepare your Terraform Enterprise environment for a version upgrade +description: This overview describes how to upgrade Terraform Enterprise deployments, including air-gapped Terraform Enterprise deployments, that run on Replicated. +--- + +# Prepare your environment for a version upgrade + +This topic describes how to prepare your Terraform Enterprise environment for a version upgrade when deployed to the Replicated platform. For instructions on upgrading Terraform Enterprise deployed to other runtimes, refer [Upgrade Terraform Enterprise](/terraform/enterprise/deploy/manage/upgrade). + + +

The Replicated deployment option is limited to customers who purchased Terraform Enterprise before January 2024. Terraform Enterprise supports new deployment options and will end support for the Replicated Native Scheduler option.

+ +

The final Replicated release of Terraform Enterprise will be in March 2025. HashiCorp will support this release until April 1, 2026.

+ +

To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by November 2024. For more information, refer to Terraform Enterprise deployment overview or contact your HashiCorp account representative.

+
+ +## Overview + +You should create a plan for upgrading your Terraform Enterprise deployment to minimize potential issues. Complete the following steps to prepare for your upgrade: + +1. **Thoroughly review release information**: The release notes contain critical information about each release, including required versions along the upgrade path and breaking changes. When skipping releases, be sure to review release notes for all skipped releases for a cumulative list of all breaking changes, known issues, fixes, and features added between your current and target version. +1. **Verify your Replicated license**: You must have an active license to complete the upgrade. +1. **Configure log forwarding**: If the upgrade fails, forwarding logs to a persistent storage system can help you diagnose the problem. +1. **Back up your system**: Create backups of stateful data, configuration files, and other artifacts so that you are prepared in case you experience issues during the upgrade. +1. **Test against a dev/test environment**: Create a mirror of your production environment so that you can safely test your upgrade path. Test environments do not count against your Terraform Enterprise license. + +### Pre-upgrade checklist +Use the following checklist to help you prepare for upgrading your Terraform Enterprise deployment: + +- [ ] OS version is supported at my target version. +- [ ] Postgres version is supported at my target version. +- [ ] Redis version is supported at my target version if running in `active-active` mode. +- [ ] Docker version is supported at my target version. +- [ ] I know the required releases between my current and target version. +- [ ] I understand that I will have to fully start the application at each required release between my current and target version +- [ ] I have reviewed the breaking changes in all releases between my current and target version and have planned accordingly. +- [ ] I have reviewed the deprecated features in all releases between my current and target version and planned accordingly. +- [ ] I have configured Terraform Enterprise to forward logs from my installation so that they are still available if the installation restarts. +- [ ] I have tested my upgrade path in a test environment that mimics my production environment. +- [ ] I have created a backup of my Terraform Enterprise data. +- [ ] I have created a backup of my Terraform Enterprise configuration. Store the Terraform Enterprise configuration in a `settings.json` file. You can use the Replicated snapshot feature to create the backup. +- [ ] I have created a backup of my Replicated configuration. Store the Replicated configuration in a `replicated.conf` file. You can use the Replicated snapshot feature to create the backup. + +## Review release information +Refer to the [releases documentation](/terraform/enterprise/releases) for details about new releases. Focus on the following aspects of the releases in your upgrade path: + +### Updates to functionality +The Highlights, Features, and Improvements sections in the release notes describe information about changes between your current release and the target release so that you can adjust workflows accordingly. + +### Required releases +Note any required releases between your current release and the target release. The release notes denote required releases with an asterisk. + +You must include required releases as part of the upgrade path to your target version. You must also start the application after upgrading to a required version before proceeding with the upgrade. + +Refer to the [releases overview page](/terraform/enterprise/releases) and click the **Replicated** tab for additional details. + +### Breaking changes +Check the release notes for all versions along your upgrade path for breaking changes. +Failing to take action associated with a breaking change may cause upgrade failures or disruptions to core application workflows. + +The release documentation describes breaking changes, if any, for each release. For example, the [v202210-1 release](/terraform/enterprise/releases/2022/v202210-1) includes a breaking change for customers on Postgres v10. + +## Verify the Replicated license +An expired Replicated license can cause an installation to fail. Before upgrading, ensure your license is valid. If your license is expired, contact your HashiCorp account manager. Refer to the [licensing documentation](/terraform/enterprise/deploy/replicated/administration/license/update-tfe-license) for details. + +## Configure log forwarding +We recommend configuring Terraform Enterprise to forward logs to a persistent storage system. Log forwarding prevents you from losing log information if an error occurs during an upgrade and the system restarts. If you do not have your own log forwarding toolstack, you can use the embedded Fluentbit feature. + +Refer to the following topics for instructions on how to enable log forwarding with Fluentbit: + +- [Terraform Enterprise Log Forwarding](/terraform/enterprise/deploy/replicated/monitoring/logging) +- [Forward Terraform Enterprise logs to Datadog](/terraform/tutorials/enterprise/tfe-log-forwarding) + +## Back up your system +We recommend regularly backing up all stateful services and configuration files, as well as external services, such as Postgres, object storage, `replicated.conf`, and `settings.json` so that you can recover in the unlikely event that Terraform Enterprise encounters an edge case issue. + +Refer to the following topics for instructions: + +- [Terraform Enterprise backup - recommended pattern tutorial](https://developer.hashicorp.com/terraform/tutorials/recommended-patterns/pattern-backups) +- [Terraform Enterprise Backups and Restores](/terraform/enterprise/deploy/replicated/administration/infrastructure/backup-restore) + +## Test your upgrade plan +We strongly recommend that you create a dedicated test environment for testing your upgrade plan before scheduling an upgrade in production. You can use the same Terraform Enterprise license in your test environment as your production environment. Test environments do not count against your workspace allowance. + +The following components and configuration in your test environment should match your production environment as closely as possible: + +- Environment dependencies: + - Cloud platform, for example AWS + - Host type, such as EC2 instance with the same resource allocations + - Operating system version + - Postgres version + - Redis version if Terraform Enterprise is in `active/active`mode + - Docker version +- Installed Terraform Enterprise version +- Terraform Enterprise configuration files: + - `replicated.conf` + - `settings.json` +- Replicated version + +Dev/test environments should not share external services with your production environment, including Postgres, object storage, and Redis. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/upgrade.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/upgrade.mdx new file mode 100644 index 000000000..753616510 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/upgrades/upgrade.mdx @@ -0,0 +1,188 @@ +--- +page_title: Upgrades - Infrastructure Administration - Terraform Enterprise +description: >- + Learn how to upgrade Terraform Enterprise deployments, including air-gapped Terraform Enteprise deployments, that run on Replicated. +--- + +# Upgrade Terraform Enterprise deployed to Replicated + +This topic describes how to upgrade Terraform Enterprise deployed to the Replicated platform. For instructions on upgrading Terraform Enterprise deployed to other runtimes, refer [Upgrade Terraform Enterprise](/terraform/enterprise/deploy/manage/upgrade). + + + +

The Replicated deployment option is limited to customers who purchased Terraform Enterprise before January 2024. Terraform Enterprise supports new deployment options and will end support for the Replicated Native Scheduler option.

+ +

The final Replicated release of Terraform Enterprise will be in March 2025. HashiCorp will support this release until April 1, 2026.

+ +

To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by November 2024. For more information, refer to Terraform Enterprise deployment overview or contact your HashiCorp account representative.

+
+ +## Overview + +Complete the following steps to upgrade your Terraform Enterprise deployment: + + +1. Creata a backup of your application settings so that you can restore if an issue appears during the upgrade. +1. Prune dangling resources to clear space on the host for the upgraded images. +1. Use either the Replicated console or CLI to perform the upgrade. The instructions for either mechanism depends on whether Terraform Enterprise has Internet connectivity or is air-gapped. +1. You can track upgrade progress from the Replicated admin console or using the Replicated CLI. If you experience issues during the upgrade, refer to the [troubleshooting instructions](#troubleshooting). +1. Complete any [post-upgrade tasks](#post-upgrade-tasks). + +Do not manually restart the application during the upgrade. Doing so will cause upgrade failure and loss of logs required to diagnose potential upgrade issues. + +### Multi-node deployments +This topic describes upgrading single-node deployment of Terraform Enterprise in `external` mode. Refer to the following topics for information about upgrading multi-node deployments in `active-active`: + +- [Terraform Enterprise Active/Active](/terraform/enterprise/deploy/replicated/install/automated/active-active) +- [Terraform Enterprise Admin CLI Commands](/terraform/enterprise/deploy/replicated/administration/infrastructure/admin-cli) + + +## Requirements + +1. Complete the steps described in [Prepare your environment for a version upgrade](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades/prepare) before beginning the upgrade process. +1. Review the following Terraform Enterprise requirements to ensure that your environment is supported: + + - [TLS requirements](/terraform/enterprise/deploy/replicated/requirements/credentials) + - [Hardware](/terraform/enterprise/deploy/replicated/requirements/hardware) + - [Operating system](/terraform/enterprise/deploy/replicated/requirements/os-specific/supported-os) + - [PostgreSQL](/terraform/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements) + - [Network](/terraform/enterprise/deploy/replicated/requirements/network) + - [Docker Engine](/terraform/enterprise/deploy/replicated/requirements/docker_engine) + +1. Review the [upgrading and patching information](/terraform/enterprise/deploy/replicated/administration/infrastructure/admin-cli#upgrading-tfe-or-patching-tfe-node-instances) for your Terraform Enterprise active/active architecture. + +1. Create a backup copy of the storage prior to upgrading your instance. Backup and restore responsibility varies depending on your Terraform Enterprise [operation mode](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability#operation-modes). + +## Back up your application settings + +Connect to the Terraform Enterprise host machine using SSH and run the following command to export a copy of current application settings: + +```shell-session +$ replicatedctl app-config export --hidden > backup_settings.json +``` + +## Prune dangling resources + +Run the following command to manually prune dangling Docker resources to clear space for upgraded images. + + ``` + docker container prune -f + docker volume prune -f + ``` + +## Upgrade Internet-connected deployments + + + + +1. Open the installer dashboard at `https://:8800/dashboard` in your browser. +1. Click **Check Now**. Terraform recognizes the new version. +1. Click **View Update**. +1. Review the release notes and then click **Install Update**. + + + + +1. Connect to the Terraform Enterprise host machine using SSH. +1. Fetch the versions of Terraform Enterprise. + + ``` + $ replicatedctl app-release ls --fetch + ``` + +1. Upgrade to the latest version of Terraform Enterprise. + + ``` + $ replicatedctl app-release apply + ``` + + Alternatively, upgrade to a specific version of Terraform Enterprise. + + ``` + $ replicatedctl app-release apply --sequence "504" + ``` + + + + +## Upgrade air-gapped deployments + + + + +1. Open the installer dashboard at `https://:8800/dashboard` in your browser. +1. Check the **Update Path** field in the console settings for you instance to determine the update path where the installer should look for new `.airgap` packages. +1. Download the new `.airgap` package to the instance and place it at the location specified in the **Update Path** field. +1. From the installer dashboard, click **Check Now**. Terraform recognizes the new version. +1. Click **View Update**. +1. Review the release notes and then click **Install Update**. + + + + + +1. Connect to the Terraform Enterprise host machine using SSH. + +1. Print the `AirgapPackagePath`. + + ``` + $ replicatedctl params export --template '{{.AirgapPackagePath}}' + ``` + +1. On the Terraform Enterprise host machine, upload the desired airgap packages into the `AirgapPackagePath`. + +1. Fetch the versions of Terraform Enterprise from the uploaded airgap packages. + + ``` + $ replicatedctl app-release ls --fetch + ``` + +1. List the available versions of airgap packages for the upgrade. + + ``` + $ replicatedctl app-release ls + ``` + +1. Upgrade to the latest version of the available airgap packages. + + ``` + $ replicatedctl app-release apply + ``` + + Alternatively, upgrade to a specific version, using one of the options listed in the output of the previous step. + + ``` + $ replicatedctl app-release apply --sequence "504" + ``` + + + + +## Track upgrade progress + +To track progress from the UI, check the **Status** widget on the Replicated admin console. The **Status** widget is not available for deployments in `active-active` mode. + +Run the `replicatedctl app status` command to track progress from the CLI. + +## Post-upgrade tasks + +Complete the following tasks if you are stopping at a required release: + +1. Fully start the application before proceeding to your next release. +1. Run the `tfe-admin health-check` command to verify that service connectivity has successfully re-established. + +## Troubleshooting + +This section describes potential causes of issues during or after an upgrade. + +### Upgrade fails to proceed +If you suspect your upgrade is stuck, check log messages in `tfe-migrations`. Migrations can take longer than usual and extend the upgrade window. + +If there are no migrations in progress and the upgrade is still not completed in a timely manner, contact support. + +Do not manually restart the application during the upgrade. Doing so will cause upgrade failure and loss of logs required to diagnose potential upgrade issues. + +### Missing or improper functionality +The functionality may have been deprecated in a version in your upgrade path. The functionality may also be related to deprecated or removed support for an operating system, Postgres version, or other dependency. Refer to the release notes for information about deprecated, removed, or replaced functionality and for potential workarounds. + +Once a functionality is removed or a dependency dropped, Terraform Enterprise no longer officially supports it. As a result, the functionality or dependency is no longer covered in the release regression testing suite. If the removed feature or dependency is the cause of issues related to upgrades or operability, you may be required to migrate off the feature or dependency to get help from HashiCorp support. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/worker-to-agent-migration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/worker-to-agent-migration.mdx new file mode 100644 index 000000000..7a719de52 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/infrastructure/worker-to-agent-migration.mdx @@ -0,0 +1,184 @@ +--- +page_title: >- + Migrate from Alternative Worker Images to Custom Agents - v202302-1 +description: Learn how to migrate from using alternative worker images to custom agents. Available as of Terraform Enterprise v202302-1. +--- + +# Migrate Alternative Worker Images to Agents: v202302-1 + +## Summary + +Terraform Enterprise v202302-1 introduced the `agent` run pipeline mode which +changes the container image used to perform Terraform runs. The previous run +pipeline mode is now referred to as the `legacy` run pipeline mode. + +If you currently use the _default_ image, you do not need to take action. +Terraform Enterprise will automatically migrate you to the new default agent +image when you adopt v202302-1 or later. + +If you currently use a [legacy custom +image](/terraform/enterprise/deploy/replicated/install/interactive/installer#legacy) Terraform +Enterprise will continue using your legacy custom image until you migrate to an +agent custom image and enable the `agent` run pipeline mode. Before adopting +v202306-1, you must [build an agent custom +image](/terraform/enterprise/deploy/replicated/install/interactive/installer#agent). If your +legacy custom image also [executes custom +scripts](/terraform/enterprise/deploy/replicated/install/interactive/installer#executing-custom-scripts), +you must update migrate your customization [agent +hooks](/terraform/cloud-docs/agents/hooks) instead. + +Terraform Enterprise will stop supporting legacy custom images in v202306-1. + +Continue reading to determine if this change impacts you and what action to +take. + +## What are alternative worker images? + +An alternative worker image is the [custom +image](/terraform/enterprise/deploy/replicated/install/interactive/installer#custom-image) +Terraform Enterprise uses to perform Terraform runs. + +## What is changing and why? + +We are replacing three components of the run pipeline, `terraform-build-worker`, +`terraform-build-manager`, and `tfe-rabbitmq` with local HCP Terraform/Enterprise +agents. If you use an alternative worker image to execute custom logic within +the run lifecycle, you will need to migrate that logic to an agent custom image. + +Like Terraform runs that use alternative worker images, runs that use custom agents will still execute in isolated, +short-lived [Docker +containers](/terraform/enterprise/deploy/replicated/architecture/system-overview/security-model#terraform-enterprise-isolates-terraform-operations-via-docker-containers). +This change does not affect the Terraform Runs API and UI. + +This change is part of an ongoing effort to refresh the architecture of +Terraform Enterprise, improve performance and reliability of runs, and support +new application-level features. Some immediate benefits of this change include: + +- The run pipeline contains fewer components, making it easier to understand and debug. +- Local runs and remote agent runs can now use the same base images, and the + same pre- and post- run hooks. +- Runs are more evenly distributed across Active/Active nodes by eliminating a + redundant queue. +- You can now access previously inaccessible run logs (Sentinel, cost + estimation, and plan-export-worker logs) via Docker logs and any tool that can + interact with it. This includes the `docker logs` command, the Docker API, and + [Terraform Enterprise log forwarding](/terraform/enterprise/deploy/replicated/monitoring/logging). + +In v202302-1, Terraform Enterprise installations using the default worker image (not an alternative worker image) will automatically use the new run pipeline. + +Installations that use an alternative worker image will continue to use the legacy run pipeline when you upgrade to v202302-1. You must migrate your Terraform Enterprise installation to use an agent custom image before adopting v202306-1, which requires rebuilding your alternative worker image as an agent custom image. + +Once you rebuild your image, you must manually switch to the new run pipeline by setting the `run_pipeline_mode = "agent"`. You can revert back to the legacy run pipeline at any time before you adopt v202306-1 by setting `run_pipeline_mode = "legacy"`. The `legacy` option will become unavailable in v202306-1 and later. + +## Check if you use an alternative worker image + +By default, Terraform Enterprise uses the standard image included in a release. You can verify whether your pipeline uses an alternative worker image by reviewing your `settings.json` file or your admin console. + +In the admin console's **Settings** tab, check if **Provide the location of a custom image** is selected. If it is, your pipeline uses the alternative worker image specified in the **Custom image tag** field. + +![The `custom_image_tag` setting in the user interface.](/img/docs/tfe_console-custom_image_tag.png) + +You can also review your `settings.json` file to check if your pipeline uses alternative worker image. If your file includes the `custom_image_tag` field, your pipeline uses the worker image specified. + +## Migrate to a custom agent image + +To migrate to a custom agent image, first review the customizations in +your worker image. Then build your new agent image, add your customizations, and +test the new, customized agent image. + +### Step 1: Evaluate customizations in your current image + +Before making any changes, you must evaluate your current image and familiarize yourself with all of the implemented customizations. + +Consider the following: + +- Which custom tools does your image include? +- Does the image use the initialize and/or finalize hook(s)? +- If yes, what do your initialize and/or finalize script(s) do? + +### Step 2: Build your new custom agent image + +Starting with v202302-1, the Docker container that HCP Terraform and Enterprise uses for Terraform +operations is based on the [`hashicorp/tfc-agent`](https://hub.docker.com/r/hashicorp/tfc-agent) Docker +image. Like the legacy worker image, the agent image supports customizations to perform +custom logic, but there are several implementation differences between +worker images and agent images to consider. + +The following tables describe the differences between the +legacy alternative worker image and the new custom agent image. + +-> **Note:** You must build custom images from `hashicorp/tfc-agent:1.6` or later. + +#### Use an image + +| | Alternative worker image | Custom agent image | +| ------------------------- | ----------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------- | +| Building a custom image | [Documentation](/terraform/enterprise/v202301-1/install/interactive/installer#alternative-terraform-worker-image) | [Documentation](/terraform/cloud-docs/agents/agents#optional-configuration-run-an-agent-using-docker) | +| Executing custom scripts | [Documentation](/terraform/enterprise/v202301-1/install/interactive/installer#executing-custom-scripts) | [Documentation](/terraform/cloud-docs/agents/hooks) | +| `settings.json` parameter | Set the `custom_image_tag` field to your custom worker image | Set the `custom_agent_image_tag` field to your custom agent image. | +| Image location | The image must be located on the host. | If Terraform Enterprise cannot find the image on the host, it will try to pull it from the specified location. | + +#### Customize an image + +| | Alternative Worker Image | Custom Agent Image | +| ----------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| Base image | The base image must be `ubuntu:bionic` or an official RHEL7 image (e.g., `registry.access.redhat.com/ubi7/ubi-minimal`). | The base image must be the `hashicorp/tfc-agent`. | +| Image location | The image must exist on the Terraform Enterprise host. You can add it by running `docker pull` from a local registry or any other similar method. | We recommend that the image exist locally, but if it does not, the `tfe-task-worker` Docker driver will pull the image from the specified source. | +| Required software | The image must contain the software packages defined the [requirements](/terraform/enterprise/deploy/replicated/install/interactive/installer#requirements). | N/A | +| Certificates | The `/usr/local/share/ca-certificates` directory must contain all necessary PEM-encoded CA certificates. Each file added to this directory must end with the `.crt` extension. Terraform Enterprise will not automatically add the CA certificates configured in the CA Bundle settings to the image at runtime. | The `/usr/local/share/ca-certificates` directory must contain all necessary PEM-encoded CA certificates. Each file added to this directory must end with the `.crt` extension. Terraform Enterprise will not automatically add the CA certificates configured in the CA Bundle settings to the image at runtime.

This will be similar to the certificate config in this [Dockerfile example](/terraform/enterprise/deploy/replicated/install/interactive/installer#ubuntu). | +| Terraform binary | The image cannot include Terraform. Terraform Enterprise installs Terraform at runtime. | The image cannot include Terraform. Terraform Enterprise installs Terraform at runtime. | +| Rhel 7 | In addition to the packages that `yum` installs, `curl` installs the `envdir` tool Python port because it is a dependency of the Terraform Build Worker service. If the alternative worker image does not include `envdir`, Terraform runs will fail within Terraform Enterprise. | N/A | +| Run before plans and applies | The same [initialize script](/terraform/enterprise/deploy/replicated/install/interactive/installer#initialize-script) runs before a `terraform init` during both plans and applies. | You can have separate [hooks](/terraform/cloud-docs/agents/hooks#supported-hooks) that run before and after plans and applies:
`terraform-pre-plan`
`terraform-pre-apply`. | +| Run after plans and applies | The same [finalize script](/terraform/enterprise/deploy/replicated/install/interactive/installer#finalize-script) runs after `terraform plan` and `terraform apply` complete. | You can have separate [hooks](/terraform/cloud-docs/agents/hooks#supported-hooks) that run before and after plans and applies:
`terraform-post-plan`
`terraform-post-apply` | +| Configuration | Ensure your worker image contains an executable shell script at:
`/usr/local/bin/init_custom_worker.sh`
`/usr/local/bin/finalize_custom_worker.sh` | Store hooks in a hooks directory, and name them according to their purpose. For example:
`~/.tfc-agent/hooks/terraform-pre-plan`
`~/.tfc-agent/hooks/terraform-post-plan`
`~/.tfc-agent/hooks/terraform-pre-apply`
`~/.tfc-agent/hooks/terraform-post-apply` | +| Non-zero exit codes | If the script exits with a non-zero exit code, the Terraform Enterprise run will immediately fail with an error. | If a `terraform apply` does not complete successfully, the hook will still run. If a hook exits with a non-zero exit code, the Terraform run will fail immediately. | +| `stdout`/`stderr` | The build worker logs whether or not a custom script has executed but does not log the script's standard output and standard error. If the custom script exits non-zero, then its standard output and standard error print to the UI logs. | The standard output and standard error from the hook will print alongside the Terraform run output in the HCP Terraform/Enterprise user interface, but not in the UI logs. | +| File locations | You cannot customize the name or location of the script. | The hook name must match one of the [supported hooks](/terraform/cloud-docs/agents/hooks#supported-hooks). You cannot customize or change these names. Because of this, you can only configure one hook of each type for each agent. For example, you could create a pre-plan and pre-apply hook, but you cannot create two pre-plan hooks. | +| Script permissions | The script must have execute permissions. | Each hook must have the execute permission set. | +| Execution timeout | The execution of the script does not have a timeout. It is up to the Terraform Enterprise administrator to ensure scripts execute in a timely fashion. | Each hook has a 60 second timeout. If a hook times out the Terraform run will fail immediately. | +| Execution context | The execution of the script is not sandboxed. The script executes in the same container where `terraform` runs, and both can access the same set of environment variables. | Like with alternative worker images, the execution of the script is not sandboxed. The script executes in the same container where `terraform` runs, and both can access the same set of environment variables. | +| Reading and writing variables | Users can "export" environment variables for subsequent Terraform commands (plan, apply, etc) to use, by writing their environment variable value to a file `/env/FOO` where `FOO` is the name of the environment variable. | Writing to environment variables requires a minimum agent version of [1.9.0](/terraform/cloud-docs/agents/v1.9.x/agents). Instead of directly calling “export”, write to environment variables using “echo”. Terraform parses and sets the environment variable later when other Terraform commands execute. For example, write `echo FOO=bar >> $TFC_AGENT_ENV`, instead of `export FOO=bar`. | +| Running in Docker | Example Dockerfile snippet:
`ADD init_custom_worker.sh /usr/local/bin/init_custom_worker.sh` | When running `tfc-agent` using Docker, you must build a new Docker image containing the hooks. To configure hooks, [follow these instructions](/terraform/cloud-docs/agents/hooks#running-an-agent-with-docker). | +| Execute/running as a binary | Scripts always run in the worker container. To execute, initialize and finalize scripts and all the commands they invoke, ensure your worker image contains an executable shell script at `/usr/local/bin/_custom_worker.sh`. | If you want to run agents outside of containers, you must create your own remote agent pool.

To run hooks as a binary, you need to [change the permissions to the hook scripts](/terraform/cloud-docs/agents/hooks#running-an-agent-as-a-binary). | + +### Step 3: Test your custom agent image + +We strongly recommend that you test your custom agent image before applying it to your production installation of Terraform Enterprise. + +#### Test on Terraform Enterprise v202301 or earlier + +Terraform Enterprise v202301 and earlier use worker images, but you can still test your agent image by configuring a test workspace to use a remote agent. You will need to install your agent on the host of your choice, and configure your workspace to use that agent. Follow the process described [here](/terraform/cloud-docs/agents/agents) for more details. + +#### Test on Terraform Enterprise v202302 or later + +To test in v202302 or later, install a test installation of Terraform Enterprise, define a `custom_agent_image_tag`, and set `run_pipeline_mode = "agent"` in your test installation’s `settings.json`. + +### Step 4: Adopt the new image + +After building and testing the new custom agent image, adopt the new image in your production Terraform Enterprise installation (v202302 or later) by defining a `custom_agent_image_tag`, and setting `run_pipeline_mode = "agent"` in your `settings.json` file. + +## Frequently Asked Questions + +**Q. I currently use an alternative worker image, but I no longer need the customizations. What should I do?** + +**A.** If you want to use the default agent image going forward instead of a customized image, please remove your alternative worker image from use before you upgrade to v202302-1. If you want to remove the alternative worker image after upgrading to v202302-1 or later, set `run_pipeline_mode = "agent"` in your `settings.json` file without specifying a custom agent image. + +**Q. I already use a custom image for my remote agents. Can I re-use that image for my local agent image?** + +**A.** Yes. If your remote agent image accomplishes everything you want, you can specify that image as your custom agent image. + +**Q. I use an alternative worker image, when do I need to complete my migration to a custom agent image?** + +**A.** Terraform Enterprise will stop supporting workers in v202306-1. To maintain your customizations, you must complete your migration to a custom agent image before upgrading to v202306-1 or later. + +**Q. Can I switch back to the legacy run pipeline?** + +**A.** Yes, until v202306-1 you can switch between workers and agents. To switch back to the worker run pipeline, set `run_pipeline_mode = "legacy"` in `settings.json`. We will remove `legacy` mode in v202306-1. + +**Q. I use an alternative worker image to dynamically manage run credentials. What is the best way to accomplish this with a custom agent image?** + +**A.** You can dynamically manage credentials using workspace variables and/or agent hooks. Upcoming enhancements to Terraform Enterprise will make this easier. Please reach out to your HashiCorp account representative for more information. + +**Q. I have a custom workflow on my alternative worker image that does not seem possible on a custom agent image. What should I do?** + +**A.** Please reach out to your HashiCorp account representative for further guidance. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/automated-license-utilization-reporting.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/automated-license-utilization-reporting.mdx new file mode 100644 index 000000000..8dd4caf7a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/automated-license-utilization-reporting.mdx @@ -0,0 +1,113 @@ +--- +page_title: Automated license utilization reporting +description: >- + Learn what data HashiCorp collects to meter Enterprise license utilization. Enable or disable reporting. Review sample payloads and logs. +--- + +@include "replicated-and-fdo/admin/license-utilization-intro.mdx" + +Make sure that your network also allows egress to `https://api.replicated.com` as described in the [network requirements documentation](/terraform/enterprise/deploy/replicated/requirements/network#egress). + +### Upgrade Terraform Enterprise + +Upgrade to Terraform Enterprise [v202305-1](/terraform/enterprise/releases/2023/v202305-1) or later. + +### Check logs + +Automatic license utilization reporting will start sending data within roughly 24 hours. [Check the product logs](/terraform/enterprise/deploy/replicated/monitoring/monitoring#monitoring-a-terraform-enterprise-instance) for records that the data sent successfully. + +```json +{ + "@level": "debug", + "@message": "export finished successfully", + "@module": "tfe-licensing.licensingexporter", + "@timestamp": "2023-05-10T17:48:06.656979Z" +} +``` + +If your installation is air-gapped or your network does not allow the correct egress, logs show the following error: + +```json +{ + "@level": "error", + "@message": "error exporting snapshot", + "@module": "tfe-licensing.census", + "@timestamp": "2023-05-11T01:50:51.662155Z", + "err": "export failed with error POST https://reporting.hashicorp.services giving up after 5 attempt(s): Post \"https://reporting.hashicorp.services\": dial tcp 35.166.5.222:443: i/o timeout" +} +``` + +In this case, reconfigure your network to allow egress and check back in roughly 24 hours. + +## Opt out of license utilization reporting + +If your installation is air-gapped or you want to manually collect and report on the same license utilization metrics, you can opt-out of automated reporting. + +Manually reporting these metrics can be time consuming. Opting out of automated reporting does not mean that you also opt out from sending license utilization metrics. Customers who opt out of automated reporting will still be required to manually collect and send license utilization metrics to HashiCorp. + +If you are considering opting out because you’re worried about the data, we strongly recommend that you review the [example payloads](#example-payloads) before opting out. If you have concerns with any of the automatically-reported data please bring them to your account manager. + +Add the following JSON to the Replicated Application Settings Config (`settings.json`), then check the product logs for a confirmation message. + +```json +{ + "optout_license_reporting": { + "value": 1 + } +} +``` + +If you are on a standalone installation, you can also configure this setting in the [Replicated Admin Console UI](/terraform/enterprise/application-administration/admin-access). + +Now [restart your system](/terraform/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration#restart-terraform-enterprise). + +Check your product logs roughly 24 hours after opting out to make sure that the system isn’t trying to send reports. + +Refer to the [License data reference](/terraform/enterprise/deploy/reference/license-data) for information about the license data Terraform Enterprise reports to HashiCorp. + +## Enable product usage reporting + +Terraform Enterprise reports product usage data to HashiCorp in order to guide you through data insights and improve product value, experience, and quality. You can enable and disable product usage reporting separately from license utilization reporting. + +## Allow outbound HTTPS traffic on port 443 + +Make sure that your network allows egress to `https://api.replicated.com`, as described in the [network requirements documentation](/terraform/enterprise/deploy/replicated/requirements/network#egress). + +Make sure that your network also allows HTTPS egress on port 443 from `https://reporting.hashicorp.services` by allow-listing the following IP addresses: + +- `100.20.70.12` +- `35.166.5.22` +- `23.95.85.111` +- `44.215.244.1` + +### Upgrade Terraform Enterprise + +Upgrade to Terraform Enterprise [v202402-1](/terraform/enterprise/releases/2023/v202402-1) or later. + +### Check logs + +Terraform starts sending data within approximately 24 hours. [Check the product logs](/terraform/enterprise/deploy/replicated/monitoring/monitoring#monitoring-a-terraform-enterprise-instance) for records that the data sent successfully. + +Terraform Enterprise logs report an error when your installation is air-gapped or when your network does not allow the correct egress. + +## Opt out of product usage reporting + +If your installation is air-gapped or you do not want to report product utilization data to HashiCorp, you can opt out of reporting. + +1. Add the following JSON to the Replicated application settings configuration specifying in the `settings.json` file. + + ```json + { + "optout_usage_reporting": { + "value": 1 + } + } + ``` + + If you are on a standalone installation, you can also configure this setting in the Replicated admin console UI. + + +1. Restart your system. +1. Check your product logs roughly 24 hours after opting out to make sure that the system does not send reports. + +@include "replicated-and-fdo/admin/license-example-usage-payload.mdx" \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/index.mdx new file mode 100644 index 000000000..344cee6b5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/index.mdx @@ -0,0 +1,20 @@ +--- +page_title: Administration - Legacy Deployment - Terraform Enterprise +description: >- + Learn how to administer the Terraform Enterprise application itself, and the + infrastructure that it runs on. +--- + +# Terraform Enterprise Licenses + +Terraform Enterprise requires a valid license before you can install it. Your HashiCorp account team provides a license after you purchase the product or engage in a trial. This license is required to install a Replicated deployment of Terraform Enterprise. If you are deploying Terraform Enterprise to a non-Replicated runtime, refer to [Configure a license](/terraform/enterprise/deploy/configuration/license) for additional information.. + +Contact your HashiCorp account team for to obtain a license. + +## License + +Refer to the following topics for information about managing your license: + +- [Automated license utilization reporting](/terraform/enterprise/deploy/replicated/administration/license/automated-license-utilization-reporting) + +- [Updating a Terraform Enterprise License](/terraform/enterprise/deploy/replicated/administration/license/update-tfe-license) \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/update-tfe-license.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/update-tfe-license.mdx new file mode 100644 index 000000000..cd61a7313 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/administration/license/update-tfe-license.mdx @@ -0,0 +1,162 @@ +--- +page_title: >- + Updating Terraform Enterprise License - Application Administration - Terraform + Enterprise +description: >- + Use the Replicated console to manage your Terraform Enterprise license. Learn how to find your license expiration date, update the license online or offline, and troubleshoot license issues. +--- + +# Updating a Terraform Enterprise License + +Terraform Enterprise requires an up-to-date license to maintain normal operations. These licenses have an expiration date, and must be updated once expired. This article provides the guidelines for updating licenses in Terraform Enterprise. + +## Find the License Expiration Date + +You can find the expiration date through either the Replicated console UI or the Replicated command line interface. + +**Note**: [Automated license utilization reporting](/terraform/enterprise/deploy/replicated/administration/license/automated-license-utilization-reporting) automatically sends data to HashiCorp to validate your license entitlements. + +### Replicated Console + +1. Navigate to the Replicated console at `https://<>:8800` and click on the gear icon. + +1. Select the **View License** menu to display the license details, including the expiration date. + +### Replicated Command Line Interface + +1. Connect to the Terraform Enterprise host machine using SSH. + +1. Use the `replicatedctl license inspect` command to inspect the license information. The `ExpirationTime` value in the output indicates the expiration date/time in UTC. + + ```shell + $ replicatedctl license inspect + [ + { + "ID": "670bd320b95245325d80be703330f9b3", + "Assignee": "Test Customer Name", + "LegacyChannelName": "Stable", + "ChannelID": "", + "Channels": [], + "ExpirationTime": "2021-06-30T00:00:00Z", + "ExpirationPolicy": "ignore", + "IsExpired": false, + "IsActivationRequired": false, + "ActivationEmail": "", + "Fields": [ + { + "FieldName": "max_hosts", + "FieldTitle": "Maximum Number of Hosts", + "FieldType": "Integer", + "Value": "9999" + }, + { + "FieldName": "min_hosts", + "FieldTitle": "Minimum Number of Hosts", + "FieldType": "Integer", + "Value": "1" + } + ] + } + ] + ``` + +## Update License - Online Installation Type + +### Automatic Updates + +With the online installation type, you can use the following steps to configure Terraform Enterprise to periodically check for the updated license. + +1. Navigate to the Replicated console at `https://<>:8800` + +1. Click on the gear icon and select the **Console Settings** menu. + +1. Scroll down to the **License Sync** section and select how often Terraform Enterprise should check the license. + +### Manual Updates + +#### Replicated Console + +1. Navigate to the Replicated console at `https://<>:8800`, click the gear icon, and select the **View License** menu. + +1. Click on **Sync License** to start the operation. + +#### Replicated Command Line Interface + +1. Obtain the newly updated license file from HashiCorp and copy it to the Terraform Enterprise host machine. + +1. Connect to the Terraform Enterprise host machine using SSH. + +1. Load the new license. + + ``` + $ replicatedctl license-load < /path/to/license.rli + ``` + +## Update License - Airgap Installation Type + +### Replicated Console + +1. Navigate to the Replicated console at `https://<>:8800`. + +1. Click the gear icon and select the **Console Settings** menu. + +1. Select **Airgapped Settings** and upload the license. + +### Replicated Command Line Interface + +1. Obtain the updated license and airgap package from HashiCorp and copy them to the Terraform Enterprise host. + +1. Connect to the Terraform Enterprise host machine using SSH. + +1. Execute the following command, updating the paths as needed. + + ```shell + $ replicatedctl license-load \ + --airgap-package /path/to/bundle.airgap < /path/to/license.rli + ``` + +## Troubleshooting + +### No error but the license is not updated + +In the Airgap installation, the license update operation may finish without any error but the license detail displayed on the Replicated console or the Replicated command line output is still not updated. This symptom can be related to the incorrect license file being used. In order to further identify the symptom, please follow these steps: + +1. Connect to the Terraform Enterprise host machine using SSH. + +1. Run `docker logs replicated` and look for the warning message below. + + ```plaintext + WARN 2021-02-22T01:40:00+00:00 tasks/app_tasksteps.go:113 Airgap license on disk does not match installed license + ``` + +1. Please contact your assigned Customer Success Manager or [HashiCorp Support](https://www.hashicorp.com/technical-support-services-and-policies) for further assistance. When contacting support, please include the output from running `replicatedctl license inspect` on the Terraform Enterprise host machine. + +### Unable to sync license: Error: Unsuccessful HTTP response + +Terraform can produce this error message for several different issues. + +```plaintext +Unable to sync license: Error: Unsuccessful HTTP response +``` + +- Network communication to the Replicated servers + + Terraform Enterprise requires network communication to the Replicated endpoints, as noted in the [network requirements](/terraform/enterprise/deploy/replicated/requirements/network) guideline. During the license sync operation, the Replicated installer attempts to contact `api.replicated.com` to retrieve the license information. In the online installation type, you might see the above error if the network infrastructure changed after you installed Terraform Enterprise. The specific IP addresses of Replicated services for the Terraform Enterprise are available in [Replicated’s GitHub repository](https://github.com/replicatedhq/ips/blob/master/ip_addresses.json). + +- Customer name on new license does not match existing license + + This may occur with an Airgap installation for a variety of reasons. One example is when a trial license is associated with a different customer name from the subsequent paid license. Please contact [HashiCorp Support](https://www.hashicorp.com/technical-support-services-and-policies) for assistance. In your request, include the output from running`replicatedctl license inspect` on the Terraform Enterprise host machine. + +### Incorrect version of airgap file + +This error indicates that you are using the incorrect version of airgap file against the installed version of Terraform Enterprise. + +```plaintext +installed app release (325b33bf0ad539c994644423128cad5e:502) does not match the airgap package +``` + +The airgap download page displays the versions of Terraform Enterprise and their SHA256 checksum values. Check these against the version of the airgap package in your local environment. + +## Get Support + +If you continue to experience the issues, please contact [HashiCorp Support](https://www.hashicorp.com/technical-support-services-and-policies) for assistance. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/aws.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/aws.mdx new file mode 100644 index 000000000..cab6f63d0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/aws.mdx @@ -0,0 +1,433 @@ +--- +page_title: AWS Reference Architecture - Terraform Enterprise +description: |- + This document provides recommended practices and a reference architecture for + HashiCorp Terraform Enterprise implementations on AWS. +--- + +# Terraform Enterprise AWS Reference Architecture + +## Introduction + +This document provides recommended practices and a reference architecture for +HashiCorp Terraform Enterprise implementations on AWS. + +## Implementation Modes + +Terraform Enterprise can be installed and function in different implementation modes with increasing capability and complexity: + +- _Standalone:_ The base architecture with a single application node that supports the standard implementation requirements for the platform. +- _Active/Active:_ This is an extension of _Standalone_ mode that adds multiple active node capability that can expand horizontally to support larger and increasing execution loads. + +Since the architectures of the modes progresses logically, this guide will present the base _Standalone_ mode first and then discuss the differences that alter the implementation into the _Active/Active_ mode. + +## Required Reading + +Prior to making hardware sizing and architectural decisions, read through the +[pre-install checklist](/terraform/enterprise/deploy/replicated/install/pre-install-checklist) +to familiarize yourself with the application components and architecture. +Further, read the [reliability and availability +guidance](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability) +as a primer to understanding the recommendations in this reference +architecture. + +## Infrastructure Requirements + +-> **Note:** This reference architecture focuses on the _External Services_ operational mode. + +Depending on the chosen [operational +mode](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#operational-mode-decision), +the infrastructure requirements for Terraform Enterprise range from a single AWS EC2 instance +for mounted disk installations to multiple instances connected to RDS and S3 for a +stateless production installation. + +The following table provides high-level server guidelines. Of particular +note is the strong recommendation to avoid non-fixed performance CPUs, +or “Burstable CPU” in AWS terms, such as T-series instances. + +### Terraform Enterprise Server (EC2 via Auto Scaling Group) + +| Type | CPU | Memory | Disk | AWS Instance Types | +| ------- | ------ | --------- | ---- | ------------------ | +| Minimum | 4 core | 16 GB RAM | 50GB | m5.xlarge | +| Scaled | 8 core | 32 GB RAM | 50GB | m5.2xlarge | + +#### Hardware Sizing Considerations + +- The minimum size would be appropriate for most initial production + deployments, or for development/testing environments. + +- The scaled size is for production environments where there is a + consistent high workload in the form of concurrent Terraform runs. + +### PostgreSQL Database (RDS Multi-AZ) + +| Type | CPU | Memory | Storage | AWS Instance Types | +| ------- | ------ | --------- | ------- | ------------------ | +| Minimum | 4 core | 16 GB RAM | 50GB | db.m5d.xlarge | +| Scaled | 8 core | 32 GB RAM | 50GB | db.m5d.2xlarge | + +#### Hardware Sizing Considerations + +- The minimum size would be appropriate for most initial production + deployments, or for development/testing environments. + +- The scaled size is for production environments where there is a + consistent high workload in the form of concurrent Terraform runs. + +### Object Storage (S3) + +An [S3 Standard](https://aws.amazon.com/s3/storage-classes/) bucket must be +specified during the Terraform Enterprise installation for application data to be stored +securely and redundantly away from the EC2 servers running the Terraform Enterprise +application. This S3 bucket must be in the same region as the EC2 and RDS +instances. It is recommended the VPC containing the Terraform Enterprise servers be configured +with a [VPC endpoint for +S3](https://docs.aws.amazon.com/vpc/latest/privatelink/vpc-endpoints.html). +Within the Terraform Enterprise application, Vault is used to encrypt all application data stored in the S3 bucket. This +allows for further [server-side +encryption](https://docs.aws.amazon.com/AmazonS3/latest/userguide/serv-side-encryption.html) +by S3 if required by your security policy. + +-> **Note:** Terraform Enterprise has routine jobs that delete expired objects from S3 storage and operations that destroy database records and the associated storage objects. We recommend enabling S3 Versioning so that you will have regular snapshots that you can use to restore your database if necessary. + +### Other Considerations + +#### Additional AWS Resources + +In order to successfully provision this reference architecture you must +also be permitted to create the following AWS resources: + +- VPC +- Subnet +- Route Table +- Route Table Association +- Security Group +- Load Balancer (Application, Network, or Classic Load Balancer) +- Launch Configuration +- Auto Scaling Group +- Target Group (if using Application or Network Load Balancer) +- CloudWatch Alarm +- IAM Instance Profile +- IAM Role +- IAM Role Policy +- Route 53 (optional) + +#### Network + +To deploy Terraform Enterprise in AWS you will need to create new or use existing +networking infrastructure. The below infrastructure diagram highlights +some of the key components (VPC, subnets, DB subnet group) and you will +also have security group, routing table and gateway requirements. These +elements are likely to be very unique to your environment and not +something this Reference Architecture can specify in detail. An [example Terraform +configuration](https://github.com/hashicorp/private-terraform-enterprise/blob/master/examples/aws/network/main.tf) +is provided to demonstrate how these resources can be provisioned and +how they interrelate. + +#### DNS + +DNS can be configured external to AWS or using [Route 53](https://aws.amazon.com/route53/). The +fully qualified domain name should resolve to the Load Balancer (if using one) or the Terraform Enterprise instance using a +CNAME if using external DNS or an [alias +record set](https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/resource-record-sets-choosing-alias-non-alias.html) +if using Route 53. Creating the required DNS entry is outside the scope +of this guide. + +Another approach would be to use an external registrar or DNS server to point to a Route 53 CNAME record using +a canonical, but not necessarily public, domain name, which then forwards to the ALIAS record for the ELB. This +pattern is required if using Route 53 Health Checks and failover pairs to automatically fail over to the standby +instance. This is documented further below. + +#### SSL/TLS Certificates and Load Balancers + +An SSL/TLS certificate signed by a public or private CA is required for secure communication between +clients, VCS systems, and the Terraform Enterprise application server. The certificate can be specified during the +UI-based installation or in a configuration file used for an unattended installation. + +If a Classic or Application Load Balancer is used, SSL/TLS will be terminated on the load balancer. +In this configuration, the Terraform Enterprise instances should still be configured to listen +for incoming SSL/TLS connections. If a Network Load Balancer is used, SSL/TLS may be terminated at the load balancer +or on the Terraform Enterprise instance. + +HashiCorp does not recommend the use of self-signed certificates on the Terraform Enterprise instance unless you use a +load balancer and place a public certificate (such as an AWS Certificate Manager certificate) +on the load balancer. + +If you want to use a Network Load Balancer (NLB) with Terraform Enterprise, use either an internet-facing NLB or an internal NLB that targets by IP. +An internal NLB that targets by instance ID cannot be used with Terraform Enterprise since NLBs configured in this way do not support loopbacks. +Amazon provides [load balancer troubleshooting](https://docs.aws.amazon.com/elasticloadbalancing/latest/network/load-balancer-troubleshooting.html) +information for Network Load Balancers. + +### Infrastructure Diagram - Standalone + +![aws-sa-infrastructure-diagram](/img/docs/RA-TFE-SA-AWS-SingleRegion.png) + +### Application Layer + +The Application Layer is composed of an Auto Scaling Group and a Launch Configuration +providing an auto-recovery mechanism in the event of an instance or Availability Zone failure. + +### Storage Layer + +The Storage Layer is composed of multiple service endpoints (RDS, S3) all +configured with or benefiting from inherent resiliency +provided by AWS. + +#### Additional Information + +- [RDS Multi-AZ deployments](https://aws.amazon.com/rds/details/multi-az/) + +- [S3 Standard storage class](https://aws.amazon.com/s3/storage-classes/) + +## Infrastructure Provisioning + +The recommended way to deploy Terraform Enterprise is through use of a Terraform configuration +that defines the required resources, their references to other resources, and associated +dependencies. + +## Normal Operation + +### Component Interaction + +The Load Balancer routes all traffic to the Terraform Enterprise instance, which is managed by +an Auto Scaling Group with maximum and minimum instance counts set to one. + +The Terraform Enterprise application is connected to the PostgreSQL database via the RDS +Multi-AZ endpoint and all database requests are routed via the RDS +Multi-AZ endpoint to the _RDS-main_ database instance. + +The Terraform Enterprise application is connected to object storage via the S3 endpoint +for the defined bucket and all object storage requests are routed to the +highly available infrastructure supporting S3. + +### Monitoring + +There is not currently a full monitoring guide for Terraform Enterprise. The following pages include information relevant to monitoring: + +- [Log Forwarding](/terraform/enterprise/deploy/replicated/monitoring/logging) +- [Diagnostics](/terraform/enterprise//deploy/troubleshoot) +- [Reliability and Availability](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability) + +### Upgrades + +See [the Upgrades section](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) of the documentation. + +## High Availability - Failure Scenarios + +AWS provides availability and reliability recommendations in the [Well-Architected +framework](https://aws.amazon.com/architecture/well-architected/). +Working in accordance with those recommendations, the Terraform Enterprise Reference +Architecture is designed to handle different failure scenarios with +different probabilities. As the architecture evolves it will provide a +higher level of service continuity. + +### Terraform Enterprise Server + +By utilizing an Auto Scaling Group, a Terraform Enterprise instance can automatically recover +in the event of any outage except for the loss of an entire region. + +In the event of a Terraform Enterprise instance failing in a way that AWS can +observe, the health checks on the Auto Scaling Group trigger, causing +a replacement instance to be launched. Once launched, +it reinitializes the software, and on completion, processing on this EC2 instance will +resume as normal. + +With _External Services_ (PostgreSQL Database, Object Storage) in use, +there is still some application configuration data present on the Terraform Enterprise server +such as installation type, database connection settings, hostname. This data +rarely changes. If the configuration on Terraform Enterprise changes you should update the +Launch Configuration to include the updates so that any newly +launched EC2 instance uses them. + +### Availability Zone Failure + +In the event of the Availability Zone hosting the main instances (EC2 +and RDS) failing, the Auto Scaling Group for the EC2 instance will automatically +begin booting a new one in an operational AZ. + +- Multi-AZ RDS automatically fails over to the RDS Standby Replica + (_RDS-standby_). The [AWS documentation provides more + detail](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.MultiAZ.html) + on the exact behavior and expected impact. + +- S3 is resilient to Availability Zone failure based on its architecture. + +See below for more detail on how each component handles Availability Zone failure. + +### PostgreSQL Database + +Using RDS Multi-AZ as an external database service leverages the highly +available infrastructure provided by AWS. From the AWS website: + +> _In a Multi-AZ deployment, Amazon RDS automatically provisions and +> maintains a synchronous standby replica in a different Availability +> Zone. In the event of a planned or unplanned outage of your DB +> instance, Amazon RDS automatically switches to a standby replica in +> another Availability Zone. ([source](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/Concepts.MultiAZ.html))_ + +### Object Storage + +Using S3 as an external object store leverages the highly available +infrastructure provided by AWS. S3 buckets are replicated to all +Availability Zones within the region selected during bucket creation. +From the AWS website: + +> _Amazon S3 runs on the world’s largest global cloud infrastructure, +> and was built from the ground up to deliver a customer promise of +> 99.999999999% of durability. Data is automatically distributed across +> a minimum of three physical facilities that are geographically +> separated within an AWS Region. ([source](https://aws.amazon.com/s3/))_ + +## Disaster Recovery - Failure Scenarios + +AWS provides availability and reliability recommendations in the [Well-Architected +framework](https://aws.amazon.com/architecture/well-architected/). Working in accordance with those +recommendations the Terraform Enterprise Reference Architecture is designed to handle +different failure scenarios that have different probabilities. As the +architecture evolves it will provide a higher level of service +continuity. + +### Data Corruption + +The Terraform Enterprise application architecture relies on multiple service endpoints +(RDS, S3) all providing their own backup and recovery +functionality to support a low MTTR in the event of data corruption. + +### PostgreSQL Database + +Backup and recovery of PostgreSQL is managed by AWS and configured +through the AWS management console on CLI. More details of RDS for +PostgreSQL features are available [here](https://aws.amazon.com/rds/postgresql/) +and summarised below: + +> _Automated Backups – The automated backup feature of Amazon RDS is +> turned on by default and enables point-in-time recovery for your DB +> Instance. Amazon RDS will backup your database and transaction logs +> and store both for a user-specified retention period._ +> +> _DB Snapshots – DB Snapshots are user-initiated backups of your DB +> Instance. These full database backups will be stored by Amazon RDS +> until you explicitly delete them._ + +### Object Storage + +There is no automatic backup/snapshot of S3 by AWS, so it is recommended +to script a bucket copy process from the bucket used by the Terraform Enterprise +application to a “backup bucket” in S3 that runs at regular intervals. +The [Amazon S3 Standard-Infrequent +Access](https://aws.amazon.com/s3/storage-classes/) storage class +is identified as a solution targeted more for DR backups than S3 +Standard. From the AWS website: + +> _Amazon S3 Standard-Infrequent Access (S3 Standard-IA) is an Amazon S3 +> storage class for data that is accessed less frequently, but requires +> rapid access when needed. S3 Standard-IA offers the high durability, +> high throughput, and low latency of S3 Standard, with a low per GB +> storage price and per GB retrieval fee. This combination of low cost +> and high performance make S3 Standard-IA ideal for long-term storage, +> backups, and as a data store for disaster recovery. ([source](https://aws.amazon.com/s3/storage-classes/))_ + +## Multi-Region Deployment to Address Region Failure + +Terraform Enterprise is currently architected to provide high availability within a +single AWS Region. Using multiple AWS Regions will give you greater +control over your recovery time in the event of a hard dependency +failure on a regional AWS service. In this section, implementation patterns to support this are discussed. + +We recommend provisioning an identical infrastructure in a secondary AWS +Region. Depending on recovery time objectives and tolerances for +additional cost to support AWS Region failure, the infrastructure can be +running (Warm Standby) or stopped (Cold Standby). Please note that with _Standalone_ implementation mode, only one Terraform Enterprise instance can be running against the same database. + +This deployment acts to minimize the Mean Time To Recovery (MTTR) in the event of a regional failure, avoiding the need to replicate and stand up the data plane infrastructure during an outage. If the primary AWS Region hosting the Terraform Enterprise application fails, you will need to perform some configuration before traffic is directed to the secondary AWS Region: + +- [RDS cross-region read replicas](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_ReadRepl.html) can be used in a warm standby architecture or [RDS database backups](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_CommonTasks.BackupRestore.html) can be used in a cold standby architecture. + +- [S3 cross-region replication](https://docs.aws.amazon.com/AmazonS3/latest/userguide/replication.html) must be configured so the object storage component of the Storage Layer is available in the secondary AWS Region. + +- DNS must be redirected to the Load Balancer acting as the entry point for the infrastructure deployed in the secondary AWS Region. + +## Active/Active Implementation Mode + +### Overview + +As stated previously, the _Active/Active_ implementation mode is an extension of the _Standalone_ implementation mode that increases the scalability and load capacity of the Terraform Enterprise platform. The same application runs on multiple Terraform Enterprise instances utilizing the same external services in a shared model. The primary architectural and implementation differences for _Active/Active_ are: + +- It can only be run in the _External Services_ mode. +- The additional nodes are active and processing work at all times. +- In addition to the existing external services, there is a memory cache which is currently implemented with cloud native implementations of Redis. This is used for the processing queue for the application and has been moved from the individual instance to be a shared resource that manages distribution of work. +- There are additional configuration parameters to manage the operation of the node cluster and the memory cache. + +The following sections will provide further detail on the infrastructure and implementation differences. + +### Migration to Active/Active + +If you are considering a migration from a _Standalone_ implementation to _Active/Active_, it is straightforward and there is guidance available to assist with that effort. However, you should first make a determination if the move is necessary. The _Standalone_ mode is capable of handling significant load and the first paths to supporting higher load can be simply increasing the compute power in the existing implementation. A discussion with your HashiCorp representatives may be warranted. + +Also note that if your existing architecture does not already depict what is shown and discussed above, you will likely need to make adjustments to bring it into alignment. This could be either before or during the migration. Certain tenets of the reference architecture described here are highly recommended and potentially necessary to support _Active/Active_ mode such as load balancers and scaling groups. + +### Infrastructure Diagram - Active/Active + +![aws-aa-infrastructure-diagram](/img/docs/RA-TFE-AA-AWS-SingleRegion.png) + +The above diagram shows the infrastructure components of an _Active/Active_ implementation at a high-level. + +### Infrastructure Requirements + +#### Active Nodes + +The diagram depicts two active nodes to be concise. Additional nodes can be added by altering your configuration to launch another instance that points to the same shared external services. The number and sizing of nodes should be based on load requirements and redundancy needs. Nodes should be deployed in alternate zones to accommodate zone failure. + +The cluster is comprised of essentially independent nodes in a SaaS type model. There are no concerns of leader election or minimal or optimum node counts. When a new node enters the cluster it simply starts taking new work from the load balancer and from the memory cache queue and thus spreading the load horizontally. + +#### Memory Cache + +The AWS implementation of the memory cache is handled by [Amazon ElastiCache](https://aws.amazon.com/elasticache/), specifically using the [ElastiCache for Redis](https://aws.amazon.com/elasticache/redis/) service. [Getting Started with Amazon ElastiCache for Redis](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/GettingStarted.html) provides a high level walk-through of implementing the service. + +[Determine Your Requirements](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/cluster-create-determine-requirements.html) provides details regarding the implementation options for the memory cache. +For Terraform Enterprise, we recommend a Redis (cluster mode disabled) cluster and enabling Multi-AZ with Automated Failover to improve fault tolerance and reduce downtime. Enabling Multi-AZ on your replication group minimizes the impact of a primary node failure by automatically failing over ElastiCache to a replica. For more information, refer to [Minimizing downtime in ElastiCache for Redis with Multi-AZ](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/AutoFailover.html). + +In addition to enabling Multi-AZ with Redis Replication Groups, ensure the memory cache replica nodes are located across availability zones as described in [Mitigating Failures](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/FaultTolerance.html). There should be a replica node in every AZ that has a Terraform Enterprise compute instance deployed for the cluster. While testing environments may use a single node, production environments should prioritize high availability with replication. For specifics on how Amazon ElastiCache for Redis handles replication, visit [Understanding Redis replication](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/Replication.Redis.Groups.html). + +When sizing for Amazon ElasticCache, choose from the available `cache.x.x` EC2 instance sizes for your cluster. Start with a smaller size taking into consideration the anticipated load, like `cache.m5.large` and adjust based on the actual demand. You can find help in the [Choosing Your Node Size](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/nodes-select-size.html#CacheNodes.SelectSize) guide. + +Security is a priority in Amazon ElasticCache, as Redis instances are protected by private IPs and access is restricted to the account owning the cluster. Use Security Groups to limit access by port to the Redis cluster. For more information, consult the [Access Authorization](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/GettingStarted.AuthorizeAccess.html) guide. + +For Redis version compatibility requirements, see the Terraform Enterprise [operational mode requirements](/terraform/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements#active-active-mode) + +Additional information: + +- Terraform Enterprise currently does not support or require Redis (cluster mode enabled) clusters, as the compute instances are architected to provide high availability within a single region. See [Multi-Region Implementation to Address Region Failure](#multi-region-implementation-to-address-region-failure) for more details. +- Local Zone is an option in Amazon ElasticCache that brings the memory cache geographically closer to users. However, we do not recommend this feature for Terraform Enterprise because the memory cache nodes only need to be close to Terraform Enterprise compute nodes, and it also doesn't support Multi-AZ. +- It is worth noting that [Redis Append Only Files (AOF) for transaction logs](https://docs.aws.amazon.com/AmazonElastiCache/latest/red-ug/FaultTolerance.html#FaultTolerance.Redis.Cluster.AOF) is considered an alternative to Replication Groups for mitigating cluster failures, however we do not recommend this approach due to its shortcomings. + +### Normal Operation + +#### Component Interaction + +The Load Balancer routes all traffic to the Terraform Enterprise instance, which is managed by +an Auto Scaling Group. This is a standard round-robin distribution for now, with no accounting for current load on the nodes. The instance counts on the Auto Scaling Group control the number of nodes in operation and can be used to increase or decrease the number of active nodes. + +_Active/Active_ Terraform Enterprise is not currently architected to support dynamic scaling based on load or other factors. The maximum and minimum instance counts on the Auto Scaling Group should be set to the same value. Adding a node can be done at will by setting these values. However, removing a node requires that the node be allowed to finish active work and stop accepting new work before being terminated. The operational documentation has the details on how to "drain" a node. + +#### Replicated Console + +The Replicated Console that allows access to certain information and realtime configuration for _Standalone_ is not available in _Active/Active_. This functionality, including generating support bundles, has been replaced with CLI commands to be executed on the nodes. The operational documentation has the details on how to utilize these commands. + +#### Upgrades + +Upgrading the Terraform Enterprise version still follows a similar pattern as with _Standalone_. However, there is not an online option with the Replicated Console. It is possible to upgrade a minor release with CLI commands in a rolling fashion. A "required" release or any change that potentially affects the shared external services will need to be done with a short outage. This involves scaling down to a single node, replacing that node, and then scaling back out. The operational documentation has the details on how these processes can operate. + +### Failure Scenarios + +#### Memory Cache + +As mentioned, the Amazon ElasticCache service in Multi-AZ mode provides automatic replication and failover. In the event of a larger failure or any normal maintenance with proper draining, the memory cache will not be required to be restored. If it is damaged it can be re-paved, and if not it can be left to continue operation. + +### Multi-Region Implementation to Address Region Failure + +Similar to _Standalone_, _Active/Active_ Terraform Enterprise is currently architected to provide high availability within a +single region. You cannot deploy additional nodes associated to the primary cluster in different regions. It is possible to deploy to multiple regions to give you greater +control over your recovery time in the event of a hard dependency +failure on a regional service. An identical infrastructure will still need to be instantiated separately with a failover scenario resulting in control of processing being transferred to the second implementation, as described in the earlier section on this topic. In addition, this identical infrastructure will require its own Memory Cache external service instance. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/azure.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/azure.mdx new file mode 100644 index 000000000..ac99d1c52 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/azure.mdx @@ -0,0 +1,406 @@ +--- +page_title: Azure Reference Architecture - Terraform Enterprise +description: |- + This document provides recommended practices and a reference + architecture for HashiCorp Terraform Enterprise + implementations on Azure. +--- + +# Terraform Enterprise Azure Reference Architecture + +## Introduction + +This document provides recommended practices and a reference +architecture for HashiCorp Terraform Enterprise +implementations on Azure. + +## Implementation Modes + +Terraform Enterprise can be installed and function in different implementation modes with increasing capability and complexity: + +- _Standalone:_ The base architecture with a single application node that supports the standard implementation requirements for the platform. +- _Active/Active:_ This is an extension of _Standalone_ mode that adds multiple active node capability that can expand horizontally to support larger and increasing execution loads. + +Since the architectures of the modes progresses logically, this guide will present the base _Standalone_ mode first and then discuss the differences that alter the implementation into the _Active/Active_ mode. + +## Required Reading + +Prior to making hardware sizing and architectural decisions, read through the +[pre-install checklist](/terraform/enterprise/deploy/replicated/install/pre-install-checklist) +to familiarize yourself with the application components and architecture. +Further, read the [reliability and availability +guidance](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability) +as a primer to understanding the recommendations in this reference +architecture. + +## Infrastructure Requirements + +-> **Note:** This reference architecture focuses on the _External Services_ operational mode. + +Requirements depend on the chosen [operational +mode](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#opearational-mode-decision). For example, +an installation on Mounted Disk mode may require a single Azure VM instance, +whereas a stateless production installation may require multiple instances +connected to [Azure Database for +PostgreSQL](https://azure.microsoft.com/en-us/services/postgresql/) and [Azure +Blob Storage](https://azure.microsoft.com/en-us/services/storage/blobs/) for a +stateless production installation. + +The following table provides high-level server recommendations and is meant as +a guideline. Of particular note is the strong recommendation to avoid non-fixed +performance CPUs, or “Burstable CPU” in Azure terms, such as B-series +instances. + +### Terraform Enterprise Servers (Azure VMs) + +| Type | CPU | Memory | Disk | Azure VM Sizes | +| ------- | ------ | --------- | ---- | -------------- | +| Minimum | 4 core | 16 GB RAM | 50GB | Standard_D4_v4 | +| Scaled | 8 core | 32 GB RAM | 50GB | Standard_D8_v4 | + +#### Hardware Sizing Considerations + +- The default osDisk size for most Linux images on Azure is 30GB. When + increasing the size of the osDisk partition, there may be additional + steps required to fully utilize the disk space, such as using a tool + like `fdisk`. This process is documented in the Azure knowledge base + article ["How to: Resize Linux osDisk partition on Azure"](https://blogs.msdn.microsoft.com/linuxonazure/2017/04/03/how-to-resize-linux-osdisk-partition-on-azure/). + +- The minimum size would be appropriate for most initial production + deployments or for development/testing environments. + +- The scaled size is for production environments where there is a + consistently high workload in the form of concurrent Terraform runs. + +### PostgreSQL Database (Azure Database for PostgreSQL) + +| Type | CPU | Memory | Storage | Azure DB Sizes | +| ------- | ------ | --------- | ------- | -------------- | +| Minimum | 4 core | 8 GB RAM | 50GB | GP_Gen5_4 | +| Scaled | 8 core | 16 GB RAM | 50GB | GP_Gen5_8 | + +#### Hardware Sizing Considerations + +- The minimum size would be appropriate for most initial production + deployments or for development/testing environments. +- The scaled size is for production environments where there is + a consistent high workload in the form of concurrent Terraform + runs. + - Be aware that a 4 vCPU database has a maximum capacity of 1Tb. For organizations which require long-term logging for audit, larger databases may be required. The 8 vCPU database has a maximum of 1.5Tb. + +### Object Storage (Azure Blob Storage) + +An Azure Blob Storage +[container](https://docs.microsoft.com/en-us/azure/storage/blobs/storage-blobs-introduction#containers) +must be specified during the Terraform Enterprise installation for application data to +be stored securely and redundantly away from the Azure VMs running the +Terraform Enterprise application. This Azure Blob Storage container must be in the same +region as the VMs and Azure Database for PostgreSQL instance. + +We recommend that the virtual network containing the Terraform Enterprise servers be configured with a +[Virtual Network (VNet) service +endpoint](https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-service-endpoints-overview) +for Azure Storage. Vault is used to encrypt all application data stored +in the Azure Blob Storage container. This allows for further +[server-side +encryption](https://docs.microsoft.com/en-us/azure/storage/common/storage-service-encryption) +by Azure Blob Storage if required by your security policy. + +For increased durability in a single-region deployment, we recommend using zone-redundant storage (ZRS) which synchronously writes across three Azure availability zones in the region. For a multi-region deployment, use geo-zone-redundant storage (GZRS) for added region redundancy. + +### Other Considerations + +#### Additional Azure Resources + +In order to successfully provision this reference architecture you must +also be permitted to create the following Azure resources: + +- [Resource Group(s)](https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-overview#resource-groups) + +- [Load Balancer](https://docs.microsoft.com/en-us/azure/load-balancer/load-balancer-overview) + +- [Virtual Network](https://azure.microsoft.com/en-us/services/virtual-network/) + +- [Subnet](https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-manage-subnet) + +- [Public IP](https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-ip-addresses-overview-arm#public-ip-addresses) + +- [Managed Disk](https://azure.microsoft.com/en-us/services/managed-disks/) + +- [Network Interface](https://docs.microsoft.com/en-us/azure/virtual-network/virtual-network-network-interface) + +#### Network + +To deploy Terraform Enterprise in Azure you will need to create new or use existing +networking infrastructure. The infrastructure diagram highlights some of +the key components. These elements are likely to be very unique to your +environment and not something this Reference Architecture can specify in +detail. + +#### Load Balancer + +There are a few options available: + +- Azure Public Load Balancer: This is a layer-4 Load Balancer and offers the simplest solution Azure has to offer. In this mode you must do TLS pass-through and can not use a Web Application Firewall (WAF), although this is often mitigated with other firewall appliances that sit in front of the Load Balancer + +- Azure Public Application Gateway: this is a layer-7 Load Balancer, offers more features and is more reliable than the public Load Balancer, but is more complex. In this mode, you can do TLS termination, however, you must also serve the same certificate on the backend instances essentially creating a pass-through scenario. You can use a Web Application Firewall (WAF) in this configuration. Application Gateway can utilize version 2 of the PaaS in Azure, but private IP addressing is not possible with this option + +- Azure Private Application Gateway: this is a layer-7 Load Balancer, offers more features and is more reliable than the public Load Balancer, but is more complex. In this mode you can do TLS termination, however, you must also serve the same certificate on the backend instances, essentially creating a pass-through scenario, and you must also upload a private CA bundle to the Application Gateway. In the Private configuration, Application Gateway can utilize **ONLY** version 1 of the PaaS in Azure, but can use private IP addresses. + +#### DNS + +DNS can be configured outside of Azure or using +[Azure +DNS](https://azure.microsoft.com/en-gb/services/dns/). The fully +qualified domain name should resolve to the Load Balancer. Creating the +required DNS entry is outside the scope of this guide. + +#### SSL/TLS + +An SSL/TLS certificate is required for secure communication between +clients and the Terraform Enterprise application server. The certificate can be +specified during the UI-based installation or the path to the +certificate codified during an unattended installation. + +### Infrastructure Diagram - Standalone + +![azure-infrastructure-diagram](/img/docs/RA-TFE-SA-Azure-SingleRegion.png) + +The above diagram show the infrastructure components at a high-level. + +-> **Note:** The diagram shows an Azure load balancer but for private IP usage in a hybrid model, use an Azure Application Gateway v1. Also note that the VM Scale Set would be declared as multi-zone in order to benefit from cross-availability zone redundancy. + +### Application Layer + +For a single-region deployment, the Application Layer is composed of a multi-AZ VM scale set of one Terraform Enterprise server (Azure VM) running in different availability zones in a single subnet. Were the VM to fail due to unplanned events such as hardware or software faults or a network issue such as an availability zone outage, the scale set would recreate the instance in the other zone. + +-> **Note:** As Microsoft currently do not support multi-region global load balancing using private IP addressing, a multi-region deployment is only possible using public IP addressing. See [this document](https://docs.microsoft.com/en-us/azure/architecture/guide/technology-choices/load-balancing-overview#decision-tree-for-load-balancing-in-azure) for more information. + +### Storage Layer + +The Storage Layer is composed of multiple service endpoints (Azure Database for PostgreSQL and +Azure Blob Storage) all configured with or benefitting from +inherent resiliency provided by Azure. + +#### Additional Information + +- [Azure Database for PostgreSQL deployments](https://docs.microsoft.com/en-us/azure/postgresql/concepts-business-continuity) + +- [Azure Blob Storage](https://docs.microsoft.com/en-us/azure/storage/blobs/storage-blobs-introduction) + +## Infrastructure Provisioning + +The recommended way to deploy Terraform Enterprise is through use of a Terraform +configuration that defines the required resources, their references to +other resources, and associated dependencies. + +## Normal Operation + +### Component Interaction + +The Load Balancer routes all traffic to the active Terraform Enterprise instance, which +handles all requests to the Terraform Enterprise application. + +The Terraform Enterprise application is connected to the PostgreSQL database via the +Azure provided database server name endpoint. All database requests are +routed to the highly available infrastructure supporting Azure Database for PostgreSQL. + +The Terraform Enterprise application is connected to object storage via the Azure Blob +Storage endpoint for the defined container. All object storage requests +are routed to the highly available infrastructure supporting Azure Storage. + +### Monitoring + +There is not currently a full monitoring guide for Terraform Enterprise. The following pages include information relevant to monitoring: + +- [Log Forwarding](/terraform/enterprise/deploy/replicated/monitoring/logging) +- [Diagnostics](/terraform/enterprise//deploy/troubleshoot) +- [Reliability and Availability](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability) + +### Upgrades + +See [the Upgrades section](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) of the documentation. + +## High Availability - Failure Scenarios + +Azure provides availability and reliability recommendations on [Azure reliability](https://azure.microsoft.com/en-us/features/reliability/). Working in accordance with those recommendations, the Terraform Enterprise Reference Architecture is designed to handle different failure +scenarios that have different probabilities. As the architecture evolves it will provide a +higher level of service continuity. + +### Terraform Enterprise Server + +By utilizing an VM Scale Set, a Terraform Enterprise instance can automatically recover +in the event of any outage except for the loss of an entire region. + +In the event of a Terraform Enterprise instance failing in a way that Azure can observe, the health checks on the VM Scale Set trigger, causing a replacement instance to be launched. Once launched, it reinitializes the software, and on completion, processing on this Azure VM will resume as normal. + +With _External Services_ (PostgreSQL Database, Object Storage) in use, +there is still some application configuration data present on the Terraform Enterprise server +such as installation type, database connection settings, hostname. This data +rarely changes. If the configuration on Terraform Enterprise changes you should include this updated scale set configuration so that any newly launched instance uses this it. + +### PostgreSQL Database + +The Azure Database for PostgreSQL service provides a guaranteed high +level of availability. The financially backed service level agreement +(SLA) is 99.99% upon general availability. There is virtually no +application down time when using this service. More information on Azure +Database for PostgreSQL service redundancy is available in the +[Azure +documentation](https://docs.microsoft.com/en-us/azure/postgresql/concepts-high-availability). + +### Object Storage + +Using Azure Blob Storage as an external object store leverages the +highly available infrastructure provided by Azure. More information on +Azure Storage redundancy is available in the +[Azure +documentation](https://docs.microsoft.com/en-us/azure/storage/common/storage-redundancy). + +## Disaster Recovery - Failure Scenarios + +Azure provides availability and reliability recommendations on [Azure reliability](https://azure.microsoft.com/en-us/features/reliability/). Working in accordance with those recommendations the Terraform Enterprise Reference Architecture is designed to handle different failure +scenarios that have different probabilities. The ability to provide better +service continuity will improve as the architecture evolves. + +### Data Corruption + +The Terraform Enterprise application architecture relies on multiple service endpoints +(Azure DB and Azure Storage) all providing their own backup and +recovery functionality to support a low MTTR in the event of data +corruption. + +### PostgreSQL Database + +Backup and recovery of PostgreSQL is managed by Azure and configured +through the Azure portal or CLI. More details of Azure DB for PostgreSQL +features are available +[here](https://docs.microsoft.com/en-us/azure/postgresql/concepts-backup) +and summarised below: + +> _Automated Backups – Azure Database for PostgreSQL automatically +> creates server backups and stores them in user configured locally +> redundant or geo-redundant storage._ +> +> _Backup redundancy – Azure Database for PostgreSQL provides the +> flexibility to choose between locally redundant or geo-redundant +> backup storage._ + +### Object Storage + +There is no automatic backup/snapshot of Azure Blob Storage by Azure, so it +is recommended to script a container copy process from the container +used by the Terraform Enterprise application to a “backup container” in Azure Blob Storage +that runs at regular intervals. It is important the copy process is not +so frequent that data corruption in the source content is copied to the +backup before it is identified. + +## Multi-Region Deployment to Address Region Failure + +Terraform Enterprise is currently architected to provide high availability within a +single Azure Region only. It is possible to deploy to multiple Azure Regions to give you greater +control over your recovery time in the event of a hard dependency +failure on a regional Azure service. In this section, implementation patterns to support this are discussed. + +An identical infrastructure should be provisioned in a secondary Azure +Region. Depending on recovery time objectives and tolerances for +additional cost to support Azure Region failure, the infrastructure can be +running (Warm Standby) or stopped (Cold Standby). In the event of the primary Azure Region hosting the Terraform Enterprise +application failing, the secondary Azure Region will require some +configuration before traffic is directed to it along with some global +services such as DNS. + +- [Azure Database for PostgreSQL's + geo-restore + feature](https://docs.microsoft.com/en-us/azure/postgresql/concepts-business-continuity) + provides the ability to recover the database backup to the + secondary Azure Region. + +- [Geo-zone-redundant storage (GZRS) for Azure + Storage](https://docs.microsoft.com/en-us/azure/storage/common/storage-redundancy#redundancy-in-a-secondary-region) + must be configured so the object storage component of the Storage + Layer is available in the secondary Azure Region. + +- DNS must be redirected to the Load Balancer acting as the entry + point for the infrastructure deployed in the secondary Azure + Region. + +## Active/Active Implementation Mode + +### Overview + +As stated previously, the _Active/Active_ implementation mode is an extension of the _Standalone_ implementation mode that increases the scalability and load capacity of the Terraform Enterprise platform. The same application runs on multiple Terraform Enterprise instances utilizing the same external services in a shared model. The primary architectural and implementation differences for _Active/Active_ are: + +- It can only be run in the _External Services_ mode. +- The additional nodes are active and processing work at all times. +- In an addition to the existing external services, there is a memory cache which is currently implemented with cloud native implementations of Redis. This is used for the processing queue for the application and has been moved from the individual instance to be a shared resource that manages distribution of work. +- There are additional configuration parameters to manage the operation of the node cluster and the memory cache. + +The following sections will provide further detail on the infrastructure and implementation differences. + +### Migration to Active/Active + +If you are considering a migration from a _Standalone_ implementation to _Active/Active_, it is straightforward and there is guidance available to assist with that effort. However, you should first make a determination if the move is necessary. The _Standalone_ mode is capable of handling significant load and the first paths to supporting higher load can be simply increasing the compute power in the existing implementation. A discussion with your HashiCorp representatives may be warranted. + +Also note that if your existing architecture does not already depict what is shown and discussed above, you will likely need to make adjustments to bring it into alignment. This could be either before or during the migration. Certain tenets of the reference architecture described here are highly recommended and potentially necessary to support _Active/Active_ mode such as load balancers and scaling groups. + +### Infrastructure Diagram - Active/Active + +![aws-aa-infrastructure-diagram](/img/docs/RA-TFE-AA-Azure-SingleRegion.png) + +The above diagram shows the infrastructure components of an _Active/Active_ implementation at a high-level. + +### Infrastructure Requirements + +#### Active Nodes + +The diagram depicts two active nodes to be concise. Additional nodes can be added by altering your configuration to launch another instance that points to the same shared external services. The number and sizing of nodes should be based on load requirements and redundancy needs. Nodes should be deployed in alternate zones to accommodate zone failure. + +The cluster is comprised of essentially independent nodes in a SaaS type model. There are no concerns of leader election or minimal or optimum node counts. When a new node enters the cluster it simply starts taking new work from the load balancer and from the memory cache queue and thus spreading the load horizontally. + +#### Memory Cache + +The Azure implementation of the memory cache is handled by [Azure Cache for Redis](https://azure.microsoft.com/en-us/services/cache/). Specifically documented in [Azure Cache for Redis Documentation](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/). + +[About Azure Cache for Redis](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-overview) provides a high level walk-through of implementing the memory cache with a description of some of the implementation options. Primary differentiators are set by tiers from "Basic" to "Enterprise Flash" described [this section](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-overview#service-tiers) including a chart by feature sets . The primary differences are sizing/capacity and how far high availability and fault tolerance might extend. Note that only the Premium and Enterprise tiers provide persistence and encryption and true zone redundancy. The enterprise tiers involve actually acquiring Redis Enterprise licensees through the Azure Marketplace which is an option if that level of direct vendor support is desired/required. You can start at a lower tier and migrate upwards, however, migrating downwards is not supported, other than re-creating the memory cache. + +You should start by selecting the tier level appropriate to the environment you are deploying. A lower testing or sandbox environment could use a Basic or Standard tier. However, a production level environment should always be configured with Premium or Enterprise tiers to benefit from the HA features that coincide with the other external services in the Terraform Enterprise platform. Additional considerations described in [Best practices](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-best-practices) can be useful for ensuring reliability and failover requirements for the environment. + +Sizing for Azure Cache for Redis is determined by the tier, tier family, and capacity. Cache Names within tiers specify the sizing such as shown in these [pricing tables](https://azure.microsoft.com/en-au/pricing/details/cache/). You can start the size off in a small to moderate range such as a "P1" for Premium tier, with some consideration of anticipated active load, and scale up or down as demand is understood with the aid of [monitor Azure Cache for Redis](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-how-to-monitor). + +Enterprise-grade security is inherently covered in the Azure Cache for Redis implementation because Redis instances are protected with [network isolation options](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-network-isolation) and particularly with [virtual network support](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-how-to-premium-vnet) in the Premium tier. There is also [detailed security information](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/security-baseline) available for hardening your implementation. + +Terraform Enterprise _Active/Active_ does not currently support the Redis cluster protocol, so you should not enable clustering for a successful _Active/Active_ setup. + +For Redis version compatibility requirements, see the Terraform Enterprise [operational mode requirements](/terraform/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements#active-active-mode). +The minimum TLS version can also be configured and defaults to 1.0 - you should explicitly set it to 1.2 for latest. + +### Normal Operation + +#### Component Interaction + +The Load Balancer routes all traffic to the Terraform Enterprise instance, which is managed by +an VM Scale Set. This is a standard round-robin distribution for now, with no accounting for current load on the nodes. The instance counts on the VM Scale Set control the number of nodes in operation and can be used to increase or decrease the number of active nodes. + +_Active/Active_ Terraform Enterprise is not currently architected to support dynamic scaling based on load or other factors. The maximum and minimum instance counts on the VM Scale Set should be set to the same value. Adding a node can be done at will bt setting these values. However, removing a node requires that the node be allowed to finish active work and stop accepting new work before being terminated. The operational documentation has the details on how to "drain" a node. + +#### Replicated Console + +The Replicated Console that allows access to certain information and realtime configuration for _Standalone_ is not available in _Active/Active_. This functionality, including generating support bundles, has been replaced with CLI commands to be executed on the nodes. The operational documentation has the details on how to utilize these commands. + +#### Upgrades + +Upgrading the Terraform Enterprise version still follows a similar pattern as with _Standalone_. However, there is not an online option with the Replicated Console. It is possible to upgrade a minor release with CLI commands in a rolling fashion. A "required" release or any change that potentially affects the shared external services will need to be done with a short outage. This involves scaling down to a single node, replacing that node, and then scaling back out. The operational documentation has the details on how these processes can operate. + +### Failure Scenarios + +#### Memory Cache + +As mentioned, the Azure Cache for Redis service at the proper tier level provides automatic replication and failover. In the event of a larger failure or any normal maintenance with proper draining, the memory cache will not be required to be restored. If it is damaged it can be re-paved, and if not it can be left to continue operation. + +### Multi-Region Implementation to Address Region Failure + +Similar to _Standalone_, _Active/Active_ Terraform Enterprise is currently architected to provide high availability within a +single region. You cannot deploy additional nodes associated to the primary cluster in different regions. It is possible to deploy to multiple regions to give you greater +control over your recovery time in the event of a hard dependency +failure on a regional service. An identical infrastructure will still need to be instantiated separately with a failover scenario resulting in control of processing being transferred to the second implementation, as described in the earlier section on this topic. In addition, this identical infrastructure will require its own Memory Cache external service instance. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/gcp.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/gcp.mdx new file mode 100644 index 000000000..471deaf91 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/gcp.mdx @@ -0,0 +1,398 @@ +--- +page_title: GCP Reference Architecture - Terraform Enterprise +description: |- + This document provides recommended practices and a reference architecture for + HashiCorp Terraform Enterprise implementations on GCP. +--- + +# Terraform Enterprise GCP Reference Architecture + +## Introduction + +This document provides recommended practices and a reference architecture for +HashiCorp Terraform Enterprise implementations on GCP. + +## Implementation Modes + +Terraform Enterprise can be installed and function in different implementation modes with increasing capability and complexity: + +- _Standalone:_ The base architecture with a single application node that supports the standard implementation requirements for the platform. +- _Active/Active:_ This is an extension of _Standalone_ mode that adds multiple active node capability that can expand horizontally to support larger and increasing execution loads. + +Since the architectures of the modes progresses logically, this guide will present the base _Standalone_ mode first and then discuss the differences that alter the implementation into the _Active/Active_ mode. + +## Required Reading + +Prior to making hardware sizing and architectural decisions, read through the +[pre-install checklist](/terraform/enterprise/deploy/replicated/install/pre-install-checklist) +to familiarize yourself with the application components and architecture. +Further, read the [reliability and availability +guidance](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability) +as a primer to understanding the recommendations in this reference +architecture. + +## Infrastructure Requirements + +-> **Note:** This reference architecture focuses on the _External Services_ operational mode. + +Depending on the chosen [operational +mode](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#operational-mode-decision), the +infrastructure requirements for Terraform Enterprise range from a single Cloud +Compute VM instance for _Mounted Disk_ installations to multiple instances +connected to Cloud SQL and Cloud Storage for a stateless production +installation. + +The following table provides high-level server guidelines. Of particular +note is the strong recommendation to avoid non-fixed performance CPUs, +or “Shared-core machine types” in GCP terms, such as f1-series and g1-series instances. + +### Terraform Enterprise Server (Compute Engine VM via Regional Managed Instance Group) + +| Type | CPU | Memory | Disk | GCP Machine Types | +| ------- | ------ | --------- | ------------ | ----------------- | +| Minimum | 4 core | 15 GB RAM | 50GB/200GB\* | n1-standard-4 | +| Scaled | 8 core | 30 GB RAM | 50GB/200GB\* | n1-standard-8 | + +#### Hardware Sizing Considerations + +- \*Terraform Enterprise requires 50GB for installation, but + [GCP documentation for storage performance](https://cloud.google.com/compute/docs/disks/#performance) + recommends "to ensure consistent performance for more general use of the boot device, + use either an SSD persistent disk as your boot disk or use a standard persistent disk + that is at least 200 GB in size." + +- The minimum size would be appropriate for most initial production + deployments, or for development/testing environments. + +- The scaled size is for production environments where there is a + consistent high workload in the form of concurrent Terraform runs. + +### PostgreSQL Database (Cloud SQL PostgreSQL Production) + +| Type | CPU | Memory | Storage | GCP Machine Types | +| ------- | ------ | --------- | ------- | ---------------------------- | +| Minimum | 4 core | 16 GB RAM | 50GB | Custom PostgreSQL Production | +| Scaled | 8 core | 32 GB RAM | 50GB | Custom PostgreSQL Production | + +#### Hardware Sizing Considerations + +- The minimum size would be appropriate for most initial production + deployments, or for development/testing environments. + +- The scaled size is for production environments where there is a + consistent high workload in the form of concurrent Terraform runs. + +### Object Storage (Cloud Storage) + +A [Regional Cloud Storage](https://cloud.google.com/storage/docs/storage-classes) bucket must be +specified during the Terraform Enterprise installation for application data to be stored +securely and redundantly away from the Compute Engine VMs running the +application. This Cloud Storage bucket must be in the same region as the Compute Engine and Cloud SQL +instances. +Vault is used to encrypt all application data stored in the Cloud Storage bucket. This +allows for further [server-side +encryption](https://cloud.google.com/storage/docs/encryption/). +by Cloud Storage. + +### Other Considerations + +#### Additional GCP Resources + +In order to successfully provision this reference architecture you must +also be permitted to create the following GCP resources: + +- [Project](https://cloud.google.com/resource-manager/docs/creating-managing-projects) +- [VPC Network](https://cloud.google.com/vpc/docs/vpc) +- [Subnet](https://cloud.google.com/vpc/docs/using-vpc) +- [Firewall](https://cloud.google.com/vpc/docs/firewalls) +- [Target Pool](https://cloud.google.com/load-balancing/docs/target-pools) +- [Forwarding Rule](https://cloud.google.com/load-balancing/docs/forwarding-rules) +- [Compute Instance Template](https://cloud.google.com/compute/docs/instance-templates/) +- [Regional Managed Instance Group](https://cloud.google.com/compute/docs/instance-groups/distributing-instances-with-regional-instance-groups) +- [Cloud DNS (optional)](https://cloud.google.com/dns/) + +#### Network + +To deploy Terraform Enterprise in GCP you will need to create new or use existing +networking infrastructure. The below infrastructure diagram highlights +some of the key components (network, subnets) and you will +also have firewall and gateway requirements. These +elements are likely to be very unique to your environment and not +something this Reference Architecture can specify in detail. + +#### DNS + +DNS can be configured external to GCP or using [Cloud DNS](https://cloud.google.com/dns/). The +fully qualified domain name should resolve to the Forwarding Rules associated with the Terraform Enterprise deployment. +Creating the required DNS entry is outside the scope +of this guide. + +#### SSL/TLS Certificates and Load Balancers + +An SSL/TLS certificate signed by a public or private CA is required for secure communication between +clients, VCS systems, and the Terraform Enterprise application server. The certificate can be specified during the +UI-based installation or in a configuration file used for an unattended installation. + +### Infrastructure Diagram - Standalone + +![gcp-infrastructure-diagram](/img/docs/RA-TFE-SA-GCP-SingleRegion.png) + +The above diagram shows the infrastructure components at a high-level. + +### Application Layer + +The Application Layer is composed of a Regional Managed Instance Group and an Instance Template +providing an auto-recovery mechanism in the event of an instance or Zone failure. + +### Storage Layer + +The Storage Layer is composed of multiple service endpoints (Cloud SQL, Cloud Storage) all +configured with or benefiting from inherent resiliency +provided by GCP. + +#### Additional Information + +- [Cloud SQL high-availability](https://cloud.google.com/sql/docs/postgres/high-availability). + +- [Regional Cloud Storage](https://cloud.google.com/storage/docs/storage-classes). + +## Infrastructure Provisioning + +The recommended way to deploy Terraform Enterprise is through use of a Terraform configuration +that defines the required resources, their references to other resources, and associated +dependencies. + +## Normal Operation + +### Component Interaction + +The Forwarding Rule routes all traffic to the Terraform Enterprise instance, which is managed by +a Regional Managed Instance Group with maximum and minimum instance counts set to one. + +The Terraform Enterprise application is connected to the PostgreSQL database via the Cloud SQL +endpoint and all database requests are routed via the Cloud SQL endpoint to the database instance. + +The Terraform Enterprise application is connected to object storage via the Cloud Storage endpoint +for the defined bucket and all object storage requests are routed to the +highly available infrastructure supporting Cloud Storage. + +### Monitoring + +There is not currently a full monitoring guide for Terraform Enterprise. The following pages include information relevant to monitoring: + +- [Log Forwarding](/terraform/enterprise/deploy/replicated/monitoring/logging) +- [Diagnostics](/terraform/enterprise/deploy/troubleshoot/contact-support) +- [Reliability and Availability](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability) + +### Upgrades + +See [the Upgrades section](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) of the documentation. + +## High Availability - Failure Scenarios + +GCP provides guidance on [designing robust systems](https://cloud.google.com/compute/docs/tutorials/robustsystems). +Working in accordance with those recommendations, the Terraform Enterprise Reference +Architecture is designed to handle different failure scenarios with +different probabilities. As the architecture evolves it will provide a +higher level of service continuity. + +### Terraform Enterprise Server + +By utilizing a Regional Managed Instance Group, a Terraform Enterprise instance can automatically recover +in the event of any outage except for the loss of an entire region. + +In the event of the Terraform Enterprise instance failing in a way that GCP can +observe, [Live Migration](https://cloud.google.com/compute/docs/instances/live-migration) +is used to move the instance to new physical hardware automatically. +In the event that Live Migration is not possible the instance will crash and be restarted +on new physical hardware automatically. Once launched, it reinitializes the software, and on completion, processing on this instance will resume as normal. + +With _External Services_ (PostgreSQL Database, Object Storage) in use, there is still some application configuration data present on the Terraform Enterprise server such as installation type, database connection settings, hostname. This data rarely changes. If the configuration on Terraform Enterprise changes you should update the +Instance Template to include the updates so that any newly +launched Compute Engine VM uses them. + +### Zone Failure + +In the event of the Zone hosting the main instances (Compute Engine and Cloud SQL) failing, +the Regional Managed Instance Group for the Compute VMs will automatically +begin booting a new one in an operational Zone. + +- Cloud SQL automatically and transparently fails over to the standby zone. + The [GCP documentation provides more + detail](https://cloud.google.com/sql/docs/postgres/high-availability) + on the exact behavior and expected impact. + +- Cloud Storage is resilient to Zone failure based on its architecture. + +See below for more detail on how each component handles Zone failure. + +### PostgreSQL Database + +Using Cloud SQL as an external database service leverages the highly +available infrastructure provided by GCP. From the GCP website: + +> _A Cloud SQL instance configured for high availability is also called a regional instance. +> A regional instance is located in two zones within the configured region, so if it cannot +> serve data from its primary zone, it fails over and continues to serve data from its secondary zone. +> ([source](https://cloud.google.com/sql/docs/postgres/high-availability))_ + +### Object Storage + +Using Regional Cloud Storage as an external object store leverages the highly available +infrastructure provided by GCP. Regional Cloud Storage buckets are resilient to Zone failure +within the region selected during bucket creation. +From the GCP website: + +> _Regional Storage is appropriate for storing data in the same regional location +> as Compute Engine instances or Kubernetes Engine clusters that use the data. +> Doing so gives you better performance for data-intensive computations, as opposed +> to storing your data in a multi-regional location. +> ([source](https://cloud.google.com/storage/docs/storage-classes))_ + +## Disaster Recovery - Failure Scenarios + +GCP provides guidance on [designing robust systems](https://cloud.google.com/compute/docs/tutorials/robustsystems). +Working in accordance with those recommendations the Terraform Enterprise Reference Architecture is designed to handle +different failure scenarios that have different probabilities. As the +architecture evolves it will continue to provide a higher level of service +continuity. + +### Data Corruption + +The Terraform Enterprise application architecture relies on multiple service endpoints +(Cloud SQL, Cloud Storage) all providing their own backup and recovery +functionality to support a low MTTR in the event of data corruption. + +### PostgreSQL Database + +Backup and restoration of PostgreSQL is managed by GCP and configured +through the GCP management console or CLI. + +Automated (scheduled) and on-demand backups are available in GCP. Review the +[backup](https://cloud.google.com/sql/docs/postgres/backup-recovery/backups) +and [restoration](https://cloud.google.com/sql/docs/postgres/backup-recovery/restore) +documentation for further guidance. + +More details of Cloud SQL (PostgreSQL) features are available [here](https://cloud.google.com/sql/docs/postgres/). + +### Object Storage + +There is no automatic backup/snapshot of Cloud Storage by GCP, so it is recommended +to script a bucket copy process from the bucket used by the Terraform Enterprise +application to a “backup bucket” in Cloud Storage that runs at regular intervals. +The [Nearline Storage](https://cloud.google.com/storage/docs/storage-classes#nearline) storage class +is identified as a solution targeted more for DR backups. From the GCP website: + +> _Nearline Storage is ideal for data you plan to read or modify on average once a month or less. +> For example, if you want to continuously add files to Cloud Storage and plan to access those +> files once a month for analysis, Nearline Storage is a great choice. +> Nearline Storage is also appropriate for data backup, disaster recovery, and archival storage. +> ([source](https://cloud.google.com/storage/docs/storage-classes#nearline))_ + +## Multi-Region Deployment to Address Region Failure + +Terraform Enterprise is currently architected to provide high availability within a +single GCP Region only. It is possible to deploy to multiple GCP Regions to give you greater +control over your recovery time in the event of a hard dependency +failure on a regional GCP service. In this section, implementation patterns to support this are discussed. + +An identical infrastructure should be provisioned in a secondary GCP +Region. Depending on recovery time objectives and tolerances for +additional cost to support GCP Region failure, the infrastructure can be +running (Warm Standby) or stopped (Cold Standby). In the event of the +primary GCP Region hosting the Terraform Enterprise application failing, the secondary +GCP Region will require some configuration before traffic is directed to +it along with some global services such as DNS. + +- [Cloud SQL cross-region read replicas](https://cloud.google.com/sql/docs/postgres/replication/cross-region-replicas) can be used in a warm standby architecture. See also [Managing Cloud SQL read replicas](https://cloud.google.com/sql/docs/postgres/replication/manage-replicas). + + - Note that read replicas do not inherently provide high availability in the sense that there can be automatic failover from the primary to the read replica. As described in the above reference, the read replica will need to be promoted to a stand-alone Cloud SQL primary instance. Promoting a replica to a stand-alone Cloud SQL primary instance is an irreversible action, so when the failover needs to be reverted, the database must be restored to an original primary location (potentially by starting it as a read replica and promoting it), and the secondary read replica will need to be destroyed and re-established. + + - GCP now offers a [high availability option for Cloud SQL](https://cloud.google.com/sql/docs/mysql/high-availability) databases which could be incorporated into a more automatic failover scenario.\* + +- [Cloud SQL database backups](https://cloud.google.com/sql/docs/postgres/backup-recovery/restoring) can be used in a cold standby architecture. + + - GCP now offers a [Point-in-time recovery](https://cloud.google.com/sql/docs/postgres/backup-recovery/pitr) option for Cloud SQL databases which could be incorporated into a backup and recovery scheme with reduced downtime and higher reliability.\* + +- [Multi-Regional Cloud Storage replication](https://cloud.google.com/storage/docs/storage-classes) must be configured so the object storage component of the Storage Layer is available in multiple GCP Regions. + +- DNS must be redirected to the Forwarding Rule acting as the entry point for the infrastructure deployed in the secondary GCP Region. + +- Terraform Enterprise in the _Standalone_ mode is an Active/Passive model. At no point should more than one Terraform Enterprise instance be actively connected to the same database instance. + +\* **Note:** We are investigating incorporating these newer CloudSQL capabilities into this reference architecture, but do not have additional details at this time. + +## Active/Active Implementation Mode + +### Overview + +As stated previously, the _Active/Active_ implementation mode is an extension of the _Standalone_ implementation mode that increases the scalability and load capacity of the Terraform Enterprise platform. The same application runs on multiple Terraform Enterprise instances utilizing the same external services in a shared model. The primary architectural and implementation differences for _Active/Active_ are: + +- It can only be run in the _External Services_ mode. +- The additional nodes are active and processing work at all times. +- In an addition to the existing external services, there is a memory cache which is currently implemented with cloud native implementations of Redis. This is used for the processing queue for the application and has been moved from the individual instance to be a shared resource that manages distribution of work. +- There are additional configuration parameters to manage the operation of the node cluster and the memory cache. + +The following sections will provide further detail on the infrastructure and implementation differences. + +### Migration to Active/Active + +If you are considering a migration from a _Standalone_ implementation to _Active/Active_, it is straightforward and there is guidance available to assist with that effort. However, you should first make a determination if the move is necessary. The _Standalone_ mode is capable of handling significant load and the first paths to supporting higher load can be simply increasing the compute power in the existing implementation. A discussion with your HashiCorp representatives may be warranted. + +Also note that if your existing architecture does not already depict what is shown and discussed above, you will likely need to make adjustments to bring it into alignment. This could be either before or during the migration. Certain tenets of the reference architecture described here are highly recommended and potentially necessary to support _Active/Active_ mode such as load balancers and scaling groups. + +### Infrastructure Diagram - Active/Active + +![gcp-aa-infrastructure-diagram](/img/docs/RA-TFE-AA-GCP-SingleRegion.png) + +The above diagram shows the infrastructure components of an _Active/Active_ implementation at a high-level. + +### Infrastructure Requirements + +#### Active Nodes + +The diagram depicts two active nodes to be concise. Additional nodes can be added by altering your configuration to launch another instance that points to the same shared external services. The number and sizing of nodes should be based on load requirements and redundancy needs. Nodes should be deployed in alternate zones to accommodate zone failure. + +The cluster is comprised of essentially independent nodes in a SaaS type model. There are no concerns of leader election or minimal or optimum node counts. When a new node enters the cluster it simply starts taking new work from the load balancer and from the memory cache queue and thus spreading the load horizontally. + +#### Memory Cache + +The GCP implementation of the memory cache is handled by [Google Cloud Memorystore services](https://cloud.google.com/memorystore). Specifically using [Memorystore for Redis](https://cloud.google.com/memorystore/docs/redis). + +[Memorystore for Redis Overview](https://cloud.google.com/memorystore/docs/redis/redis-overview) provides a high level description of the implementation options for the memory cache. A primary differentiator is Basic Tier and Standard Tier. The primary difference is that the Standard Tier offers [high availability](https://cloud.google.com/memorystore/docs/redis/high-availability)] where instances are always replicated across zones and provides 99.9% availability SLAs (note that reading from a replica is not supported). A lower testing or sandbox environment could use the Basic Tier, however, a production level environment should always use Standard Tier to gain the HA features that coincide with the other external services in the Terraform Enterprise platform. + +Memorystore for Redis service supports [realtime scaling of instance size](https://cloud.google.com/memorystore/docs/redis/scaling-instances). You can start the size off in a smaller range with some consideration of anticipated active load, and scale up or down as demand is understood with the aid of [monitoring ](https://cloud.google.com/memorystore/docs/redis/monitoring-instances). + +Enterprise-grade security is inherently covered in the Memorystore for Redis implementation because Redis instances are protected from the Internet using private IPs, and access to instances is controlled and limited to applications running on the same Virtual Private Network as the Redis instance. Additional security measures can be instituted using [IAM based access control and permissions](https://cloud.google.com/memorystore/docs/redis/access-control). However, this may add additional complication to your realtime scaling of instances. + +For Redis version compatibility requirements, see the Terraform Enterprise [operational mode requirements](/terraform/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements#active-active-mode) + +### Normal Operation + +#### Component Interaction + +The Forwarding Rule routes traffic to the Terraform Enterprise node instances, which is managed by +a Regional Managed Instance Group. This is a standard round-robin distribution for now, with no accounting for current load on the nodes. The instance counts on the Regional Managed Instance Group control the number of nodes in operation and can be used to increase or decrease the number of active nodes. + +_Active/Active_ Terraform Enterprise is not currently architected to support dynamic scaling based on load or other factors. The maximum and minimum instance counts on the Regional Managed Instance Group should be set to the same value. Adding a node can be done at will by setting these values. However, removing a node requires that the node be allowed to finish active work and stop accepting new work before being terminated. The operational documentation has the details on how to "drain" a node. + +#### Replicated Console + +The Replicated Console that allows access to certain information and realtime configuration for _Standalone_ is not available in _Active/Active_. This functionality, including generating support bundles, has been replaced with CLI commands to be executed on the nodes. The operational documentation has the details on how to utilize these commands. + +#### Upgrades + +Upgrading the Terraform Enterprise version still follows a similar pattern as with _Standalone_. However, there is not an online option with the Replicated Console. It is possible to upgrade a minor release with CLI commands in a rolling fashion. A "required" release or any change the potentially affects the shared external services will need to be done with a short outage. This involves scaling down to a single node, replacing that node, and then scaling back out. The operational documentation has the details on how these processes can operate. + +### Failure Scenarios + +#### Memory Cache + +As mentioned, the Memorystore for Redis service in Standard Tier mode provides automatic replication and failover. In the event of a larger failure or any normal maintenance with proper draining, the memory cache will not be required to be restored. If it is damaged it can be re-paved, and if not it can be left to continue operation. + +### Multi-Region Implementation to Address Region Failure + +Similar to _Standalone_, _Active/Active_ Terraform Enterprise is currently architected to provide high availability within a +single region. You cannot deploy additional nodes associated to the primary cluster in different regions. It is possible to deploy to multiple regions to give you greater +control over your recovery time in the event of a hard dependency +failure on a regional service. An identical infrastructure will still need to be instantiated separately with a failover scenario resulting in control of processing being transferred to the second implementation, as described in the earlier section on this topic. In addition, this identical infrastructure will require its own memory cache external service instance. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/index.mdx new file mode 100644 index 000000000..dd6f5c21e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/index.mdx @@ -0,0 +1,33 @@ +--- +page_title: Reference Architectures - Terraform Enterprise +description: >- + Links to Terraform Enterprise reference architectures for AWS, Azure, Google + Cloud Platform, and VMware. +--- + +# Terraform Enterprise Reference Architectures + +HashiCorp provides reference architectures detailing the recommended +infrastructure and resources that should be provisioned in order to +support a highly-available Terraform Enterprise deployment. + +Depending on where you choose to deploy Terraform Enterprise, +there are different services available to maximize the resiliency of +the deployment, for example, most major cloud service providers offer +a resilient relational database service offering, removing the need +for the customer to manage a complex database cluster/failover +architecture. We have taken this into consideration and created a +reference architecture for the most common deployment configurations, +making the most appropriate use of those cloud vendor services. + +~> **Note:** The discontinued clustered version of Terraform Enterprise is no longer supported, and we strongly advise all customers to move to an Active/Active installation. Please contact your support representative if you need assistance. + +## Reference Architectures + +- [Amazon Web Services](/terraform/enterprise/deploy/replicated/architecture/reference-architecture/aws) + +- [Microsoft Azure](/terraform/enterprise/deploy/replicated/architecture/reference-architecture/azure) + +- [Google Cloud Platform](/terraform/enterprise/deploy/replicated/architecture/reference-architecture/gcp) + +- [VMware](/terraform/enterprise/deploy/replicated/architecture/reference-architecture/vmware) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/vmware.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/vmware.mdx new file mode 100644 index 000000000..1d756ace9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/reference-architecture/vmware.mdx @@ -0,0 +1,296 @@ +--- +page_title: VMware Reference Architecture - Terraform Enterprise +description: |- + This document provides recommended practices and a reference architecture for + HashiCorp Terraform Enterprise implementations on VMware. +--- + +# Terraform Enterprise VMware Reference Architecture + +## Introduction + +This document provides recommended practices and a reference architecture for +HashiCorp Terraform Enterprise implementations on VMware. + +## Implementation Modes + +Terraform Enterprise can be installed and function in different implementation modes with increasing capability and complexity: + +- _Standalone/Mounted Disk:_ The base architecture with a single application node that supports the standard implementation requirements for the platform. +- _Active/Active:_ This is an extension of _Standalone_ mode that adds multiple active node capability that can expand horizontally to support larger and increasing execution loads. + +This guide will present the base _Standalone/Mounted Disk_ mode first and then discuss the differences that alter the implementation into the _Active/Active_ mode. + +## Required Reading + +Prior to making hardware sizing and architectural decisions, read through the +[pre-install checklist](/terraform/enterprise/deploy/replicated/install/pre-install-checklist) +to familiarise yourself with the application components and architecture. +Further, read the [reliability and availability +guidance](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability) +as a primer to understanding the recommendations in this reference +architecture. + +## Infrastructure Requirements + +The [operational +mode](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#operational-mode-decision) determines the +infrastructure requirements for your instance. For example, an installation in +Mounted Disk mode may require a single virtual machine, whereas a stateless +production installation may require multiple virtual machines to host the +HCP Terraform application, PostgreSQL, Redis, and external Vault servers. + +## Standalone/Mounted Disk + +This mode requires that you specify the local path for data storage. The local path should be a mounted disk from a SAN or NAS device, or some other replicated storage. This allows for rapid recovery or failover. + +If you need or want to define storage externally and independently, you can choose the _External Services_ +operational mode. This is a more complicated implementation in VMware that requires you to independently manage other services which will not be detailed in this document. You will need to deploy S3-compatible storage either by connecting to a true AWS S3 bucket or by using a compatible alternative on-prem solution, such as [Ceph](https://ceph.com/). You will also need to deploy and separately manage an external PostgreSQL database on an additional server or servers. + +Some additional information about the _External Services_ option can be found at the end of this document. + +Although it is possible for Terraform Enterprise to use an external Vault server instead of its internally managed one, we do not recommended it. External Vault usage is not addressed in this document. + +The following table provides high-level server recommendations as a guideline. +Please note, thick provision, lazy zeroed storage is preferred. Thin +provisioned is only recommended if you are using an external PostgreSQL database and external Vault server. Using thin provisioned disks when using +the internal database or Vault may result in serious performance issues. + +### Terraform Enterprise Servers + +| Type | CPU Sockets | Total Cores\* | Memory | Disk | +| ------- | ----------- | ------------- | --------- | ---- | +| Minimum | 2 | 4 | 16 GB RAM | 40GB | +| Scaled | 2 | 8 | 32 GB RAM | 40GB | + +-> **Note:** Per VMware’s recommendation, always allocate the least amount of vCPUs and cores necessary and scale the resources based on application demand. HashiCorp recommends starting with 4 CPUs and increasing if necessary. + +#### Hardware Sizing Considerations + +- The minimum size would be appropriate for most initial production + deployments, or for development/testing environments. + +- The scaled size is for production environments where there is + a consistent high workload in the form of concurrent terraform + runs. + +- Please monitor the actual CPU utilization in vCenter before making + the decision to increase the CPU allocation. + +### Other Considerations + +#### Network + +To deploy Terraform Enterprise on VMware you will need to create new or use existing networking +infrastructure that has access to any infrastructure you expect to +manage with the Terraform Enterprise server. If you plan to use your Terraform Enterprise server to manage or +deploy infrastructure on external providers (eg Amazon Web Services, Microsoft Azure or Google Cloud), you will need to make sure the Terraform Enterprise server has unimpeded access to those providers. The same goes for any other public or private datacenter the server will need to +connect with. + +#### DNS + +The fully qualified domain name should resolve to the IP address of the virtual +machine using an A record. Creating the required DNS entry is outside the scope +of this guide. + +#### SSL/TLS + +A valid, signed SSL/TLS certificate is required for secure communication between clients and +the Terraform Enterprise application server. Requesting a certificate is outside the scope +of this guide. You will be prompted for the public and private certificates during installation. + +## Infrastructure Diagram + +![vmware-mounted-disk-infrastructure-diagram](/img/docs/vmware-mounted-disk-infrastructure-diagram.png) + +### Application Layer + +The Application Layer is a VMware virtual machine running on an ESXi cluster +providing an auto-recovery mechanism in the event of virtual machine or physical server failure. + +### Storage Layer + +The Storage Layer is provided in the form of attached disk space configured with or benefiting from inherent resiliency +provided by the NAS or SAN. The primary Terraform Enterprise VM will have 2 disks which must meet the requirements detailed [here](/terraform/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements). The first disk is independent to this VM and contains the OS and Terraform Enterprise components specific to this individual install, such as configuration information. The second disk will contain Terraform Enterprise's configuration information such as Workspaces and their resulting Terraform state files. This second disk needs to be regularly backed up, for instance via replication or snapshotting inherent to your SAN or other software, at a rate that meets your desired RPO. +Similarly, the standby VM will have two disks. An OS disk that is independent to that VM and a disk which is simply a point in time copy of the primary instance's second disk. + +-> **Note:** Terraform Enterprise's storage device or service must be highly reliable and high-speed in both I/O and connectivity to meet performance requirements. Device types in the supported list will usually meet these requirements, but many standard NAS and other device types will not perform at the level required. Only use a NAS or other device type not in the supported list if you are certain it can accommodate these requirements. + +The specific selection and configuration of the storage device is not covered in this document. +For more information about high-speed and highly available storage, please see your storage vendor. +We recommend that each of these VMs be deployed as immutable architecture to enable one to easily redeploy the secondary VM when the primary has been upgraded or changed. If this is not possible a snapshot methodology inherent to Terraform Enterprise along with examples of restoring those snapshots is available at [Terraform Enterprise Automated Recovery](/terraform/enterprise/deploy/replicated/administration/infrastructure/automated-recovery). + +For more information about Terraform Enterprise's disk requirements, see [Before Installing: Disk Requirements](/terraform/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements). + +## Active/Active + +The Active/Active mode provides a higher level of availability and failover as well as horizontal scaling. It requires additional external services, and all of the requirements and instructions are available on the [Terraform Enterprise Active/Active page](/terraform/enterprise/deploy/replicated/install/automated/active-active). + +We have tested Active/Active on VMware vSphere internally, with ESXi version 7.0.1 and vCenter Server version 7.0.2.00200, but should work on any version supported by the [vSphere Provider for Terraform](https://github.com/hashicorp/terraform-provider-vsphere). + +We recommend a setup with the following: + +- A load balancer to route traffic to both Terraform Enterprise virtual machines. +- Both virtual machines located in the same physical datacenter and on the same network. High network latency between the Terraform Enterprise virtual machines and the external services may result in plan and apply issues. +- High-speed disks, as they are [critical for good performance](/terraform/enterprise/deploy/replicated/architecture/system-overview/capacity). +- Both Terraform Enterprise virtual machines can access an external Redis server, a PostgreSQL database, and an S3-compatible blob storage bucket. Terraform Enterprise will use an internal Vault server by default. Optionally, you can configure Terraform Enterprise to use an [existing Vault cluster](/terraform/enterprise/deploy/replicated/install/vault). + +An example of a recommended setup: + +![Terraform Enterprise Active/Active on VMware](/img/docs/RA-TFE-AA-VMware-SingleRegion.png) + +## Infrastructure Provisioning + +The recommended way to deploy Terraform Enterprise for production is through use of a Terraform configuration +that defines the required resources, their references to other resources and +dependencies. + +## Normal Operation + +### Component Interaction + +In Mounted Disk Mode the PostgreSQL database will be run in a local container and data will be +written to the specified path (which should be a mounted storage device, +replicated and/or backed up frequently.) In Active/Active or External Services Mod the external PostgreSQL server will be used. + +State and other data will be +written to the specified local path (which should be a mounted storage +device, replicated and/or backed up frequently) in Mounted Disk, and the S3-compatible storage in Active/Active or External Service Mode. + +Redis is used to managed job flow and does not contain stateful data. In Mounted Disk Mode and External Services this service will be started locally as a container. In Active/Active this will be an external server. + +Vault will be run in a local container and used only for transit data encryption and decryption. This stateless use of Vault provides easy recovery in the event of a Vault service failure. + +### Monitoring + +While there is not currently a full monitoring guide for Terraform Enterprise, information around +[logging](/terraform/enterprise/deploy/replicated/monitoring/logging), +[diagnostics](/terraform/enterprise//deploy/troubleshoot) +as well as [reliability and +availability](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability) +can be found on our website. + +### Upgrades + +See [the Upgrades section](/terraform/enterprise/deploy/replicated/administration/infrastructure/upgrades) of the documentation. For Active/Active you'll need to scale down to a single virtual machine before proceeding with an upgrade. + +## High Availability + +### Failure Scenarios + +VMware vSphere provides a high level of resilience in various cases +of failure, such as at the server hardware layer through vSphere High Availability (HA) and at the network layer through virtual distributed +switching. In addition, employing tools such as VMware Site Recovery Manager or utilizing stretched clusters +can assist in recovery in the case of a total data center to support failover to a DR datacenter. See the Disaster Recovery section. + +The Active/Active deployment method can provide additional failover. + +#### Terraform Enterprise Servers (VMware Virtual Machine) + +Should the _TFE-main_ server fail, it can +be recovered in place, or the virtual machine can restored to a Disaster Recovery target, to +resume service when the failure is limited to the Terraform Enterprise server layer. See the Disaster Recovery section. + +#### Single ESXi Host Failure + +In the event of a single ESXi host failure, vSphere HA will restart the Terraform Enterprise virtual +machine to a functioning ESXi host in the cluster. This restart can take up to 30 seconds for the failed virtual machine to come back online on a healthy host within the cluster. + +If VMware vSphere Fault Tolerance (FT) has been configured for the Terraform Enterprise server, the failover does not result in any visiable outage to the end user. + +#### PostgreSQL Database + +When running in _Mounted Disk_ operational mode the PostgreSQL server runs inside a +Docker container. If the PostgreSQL service fails a new container should +be automatically created. However, if the service is hung, or otherwise +fails without triggering a new container deployment, the Terraform Enterprise server +should be stopped and the standby server started. All PostgreSQL data will +have been written to the mounted disk and will then be accessible on +the standby node. + +#### Object Storage + +The object storage will be stored on the mounted disk and the +expectation is that the NAS or SAN or other highly available mounted +storage is fault tolerant and replicated or has fast recovery available. + +#### Redis (Active/Active Only) + +The Redis service does not contain stateful data and does not require backups or data sync. +The Redis deployment must satify the [requirements](/terraform/enterprise/deploy/configuration/storage/connect-redis#requirements) of Terraform Enterprise. + +## Disaster Recovery + +### Failure Scenarios + +#### Terraform Enterprise Servers (VMware Virtual Machine) + +Through deployment of two virtual machines in different ESXi clusters, +the Terraform Enterprise Reference Architecture is designed to provide improved +availability and reliability. Should the _TFE-main_ server fail, it can +be recovered, or traffic can be routed to a newly built Terraform Enterprise server, with a backup restored to it, to +resume service when the failure is limited to the Terraform Enterprise server layer. The +load balancer should be manually updated to point to the new Terraform Enterprise +VM after services have been started on it in the event of a failure. The specifics of how data should be handled in a Disaster Recovery event will depend on the operational mode. + +**For a mounted disk install:** + +If the backup method is to snapshot the virtual machine from the ESX host, file-quiesence must be enabled to ensure data consistency. The other backup option is to make use of the [Backup and Restore API](/terraform/enterprise/deploy/replicated/administration/infrastructure/backup-restore). + +Once a Disaster has been declared, or an in-place recovery after a failure is otherwise not an option, either a new virtual machine should be created and the backup from the primary should be restored into it via the API, or the virtual machine snapshot should be deployed to the the new ESX host. Please be aware, some configuration items may need to be updated; if the DR database address is different from the primary, for example. After any configuration changes, the Terraform Enterprise server will need to be restarted. + +#### Mounted Disk - Data layer - PostgreSQL Database & Object Storage + +The PostgreSQL data and object storage will be written to the mounted disk. The +expectation is that the Terraform Enterprise application data is backedup via the [Backup and Restore API](/terraform/enterprise/deploy/replicated/administration/infrastructure/backup-restore), or the entire virtual machine is backed up via snapshot (with file-quiescence enabled), and then replicated or backed up +offsite and made available to in the event of a DR. + +#### Active/Active Disaster Recovery + +You should back up and replicate the stateful external services (PostgreSQL and Blob Storage) to an offsite location to enable a disaster recovery or datacenter failover. Use service-native tools for backups rather than the [Backup/Restore API](/terraform/enterprise/deploy/replicated/administration/infrastructure/backup-restore), which is designed to help with platform migration. If you use virtual machine snapshots, you must enable `file-quiecense`. You do not need to back up the Redis instance because it does not store stateful data. + +Redeploy the Terraform Enterprise virtual machines in the restore location using the same automation as in the primary datacenter, and update names and IP addresses for the external services as is necessary, or restore the virtual machine snapshot to the target datacenter and update any configuration as needed (database and redis urls, object storage endpoint) and restart the Terraform Enterprise application. + +## External Services Storage Options + +This information is included if _External Services_ operational mode is required. + +### External Services - Object Storage Options + +An [S3 Standard](https://aws.amazon.com/s3/storage-classes/) bucket, or compatible storage, must be +specified during the Terraform Enterprise installation for application data to be stored +securely and redundantly away from the virtual servers running the Terraform Enterprise +application. This object storage must be accessible via the network to the Terraform Enterprise virtual +machine. Vault is used to encrypt all +application data stored in this location. This allows for further [server-side +encryption](https://docs.aws.amazon.com/AmazonS3/latest/dev/serv-side-encryption.html) +by S3 if required by your security policy. + +Recommended object storage solutions are AWS S3, Google Cloud storage, Azure blob storage. Other options for S3-compatible storage are [MinIO](https://www.minio.io/), and [Ceph](https://ceph.com/), and [ECS](https://www.delltechnologies.com/en-us/storage/ecs/index.html/), among many others. Please feel free to reach out to [support](https://www.hashicorp.com/support) with questions. + +### External Services - PostgreSQL Database + +#### External Services - PostgreSQL Database Management + +Using a PostgreSQL cluster will provide fault tolerance at the database layer. +Documentation on how to deploy a PostgreSQL cluster can be found on the [PostgreSQL +documentation page](https://www.postgresql.org/docs/9.5/static/creating-cluster.html). + +Backup and recovery of PostgreSQL will vary based on your implementation +and is not covered in this document. We do recommend regular database snapshots. + +#### External Services - PostgreSQL Database Sizing + +| Type | CPU Sockets | Total Cores | Memory | Storage | +| ---------- | ----------- | ----------- | ------------ | ------- | +| Production | 2 | 4-8 core | 16-32 GB RAM | 50GB | + +### Active/Active - Redis Server + +Redis server versions `5.x` is supported and has been tested thoroughly with Terraform Enterprise. Redis (cluster enabled) Cluster is _not_ currently supported. Options are provided for the following: + +- redis_port: Allows for connecting to a Redis server running on a nonstandard port +- redis_use_password_auth: This can be set to 1 if you are using password authentication, or 0 if not. +- redis_use_tls: Allows to enabling(1) or disabling(0) the TLS requirement + +Additional details can be found on the [Active/Active Installation page](/terraform/enterprise/deploy/replicated/install/automated/active-active). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/capacity.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/capacity.mdx new file mode 100644 index 000000000..1bff0f13f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/capacity.mdx @@ -0,0 +1,74 @@ +--- +page_title: Capacity and Performance - System Overview - Terraform Enterprise +description: >- + Learn about maximum capacity and performance as well as how to adjust capacity + and memory for your instance. +--- + +# Capacity and Performance + +The maximum capacity and performance of Terraform Enterprise is dependent entirely on the resources +provided by the Linux instance it is installed on. There are a few settings that allow Terraform Enterprise's capacity to be adjusted to suit the instance. + +## Memory + Concurrency + +The amount of memory to allocate to a Terraform run and the number of concurrent runs are the primary elements in +understanding capacity above the base services. + +By default, Terraform Enterprise allocates 512 MB of memory to each Terraform run, with a default concurrency of 10 parallel runs. +Therefore, by default Terraform Enterprise requires 5.2 GB of memory reserved for runs. + +After factoring in the memory needed to run the base services that make up the application, the default memory footprint of Terraform Enterprise is approximately 4 GB. + +### Settings + +The settings for per-run memory and concurrency are available in the dashboard on port 8800, on the Settings page, under the Capacity section. They can also be set via +the [application settings JSON file when using the automated install procedure](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#available-settings). + +## Increasing Concurrency + +To increase the number of concurrent runs, adjust the `capacity_concurrency` setting. This setting is not limited by +system checks; it depends on the operator to provide enough memory to the system to accommodate the requested +concurrent capacity. For example, if `capacity_concurrency` is set to `100` and the worker memory is set to 512, the instance would require a minimum of 52 GB of memory just for Terraform runs. The rest of the Terraform Enterprise application requires a minimum of 4 GB of memory in addition to the Operating System requirements. + +## Adjusting Memory + +The default memory limit of 512 MB per Terraform run is also configurable. Note that this setting is not limited by +system checks; it depends on the operator to provide enough memory to the system to accommodate the requested limits. +If the memory limit is adjusted to 1024 MB with the default capacity of 10, the instance would require, at a minimum, +10 GB of memory reserved for Terraform runs. + +### Downward Adjustment + +We do not recommend adjusting the memory limit below 512 MB. Memory is Terraform's primary resource and it +becomes easy for it to go above smaller limits and be terminated mid-run by the Linux kernel. + +## CPU + +The required CPU resources for an individual Terraform run vary considerably, but in general they are a much more minor +factor than memory due to Terraform mostly waiting on IO from APIs to return. + +Our rule of thumb is 10 Terraform runs per CPU core, with 2 CPU cores allocated for the base Terraform Enterprise services. +So a 4-core instance with 16 GB of memory could comfortably run 20 Terraform runs, if the runs are allocated the default +512 MB each. + +As of the `v202109-1` Terraform Enterprise release, you can use the `capacity_cpus` Replicated configuration option to set the maximum number of CPU cores that can be allocated to a Terraform run. When `capacity_cpus` is set, the configuration places a hard quota on the number of cores that a Terraform operation and underlying provider plugin logic can consume. This can be an effective tool to prevent one expensive workspace from +monopolizing the CPU resources of the host. + +## Disk + +The amount of disk storage available to a system plays a small role in the capacity of an instance. +A root volume with 200 GB of storage can sustain a capacity well over 100 concurrent runs. + +## Disk I/O + +Because of the amount of churn caused by container creation as well as Terraform state management, +highly concurrent setups will begin pushing hard on disk I/O. In cloud environments like AWS that limit disk +I/O to IOPS that are credited per disk, it's important to provision a minimum number to prevent I/O related +stalls. Low disk I/O can create significant performance issues. + +This resource is harder to predict than memory or CPU usage because it varies per Terraform module, +but we generally recommend a minimum of 50 IOPS per concurrent Terraform run. So if an instance is configured for 10 concurrent runs, the disk should have 500 IOPS allocated. For reference, on AWS, an EBS volume +with an allocated size of 250 GB comes with a steady state of 750 IOPS. + +We recommend using a disk with a minimum of 500 IOPS, but high load systems should consider increasing this significantly. For example, a production instance with a consistently high level of utilization and a concurrency of 10 should ideally have a disk with about 3,000 IOPS. Internal testing has shown performance increases with additional IOPs up to 8,000. Scaling the disk beyond 8,000 IOPs does not significantly improve performance. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/data-security.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/data-security.mdx new file mode 100644 index 000000000..6c3b2930f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/data-security.mdx @@ -0,0 +1,57 @@ +--- +page_title: Data Security - Architectural Details - Terraform Enterprise +description: >- + Learn which parts of the application contain sensitive data and what storage + and encryption methods we use. +source: terraform-docs-common +--- + +# Data Security + +HCP Terraform takes the security of the data it manages +seriously. This table lists which parts of the HCP Terraform and Terraform Enterprise app can contain sensitive data, what storage is used, and what encryption is used. + +### HCP Terraform and Enterprise + +| Object | Storage | Encrypted | +| :----------------------------------- | :----------- | :----------------------- | +| Ingressed VCS Data | Blob Storage | Vault Transit Encryption | +| Terraform Plan Result | Blob Storage | Vault Transit Encryption | +| Terraform State | Blob Storage | Vault Transit Encryption | +| Terraform Logs | Blob Storage | Vault Transit Encryption | +| Terraform/Environment Variables | PostgreSQL | Vault Transit Encryption | +| Organization/Workspace/Team Settings | PostgreSQL | No | +| Account Password | PostgreSQL | bcrypt | +| 2FA Recovery Codes | PostgreSQL | Vault Transit Encryption | +| SSH Keys | PostgreSQL | Vault Transit Encryption | +| User/Team/Organization Tokens | PostgreSQL | HMAC SHA512 | +| OAuth Client ID + Secret | PostgreSQL | Vault Transit Encryption | +| OAuth User Tokens | PostgreSQL | Vault Transit Encryption | + +### Terraform Enterprise Specific + +| Object | Storage | Encrypted | +| :--------------------------- | :--------- | :----------------------- | +| Twilio Account Configuration | PostgreSQL | Vault Transit Encryption | +| SMTP Configuration | PostgreSQL | Vault Transit Encryption | +| SAML Configuration | PostgreSQL | Vault Transit Encryption | +| Vault Unseal Key | PostgreSQL | ChaCha20+Poly1305 | + +## Vault Transit Encryption + +The [Vault Transit Secret Engine](/vault/docs/secrets/transit) +handles encryption for data in-transit and is used when encrypting data from the +application to persistent storage. + +## Blob Storage Encryption + +All objects persisted to blob storage are symmetrically encrypted prior to being +written. Each object is encrypted with a unique encryption key. Objects are +encrypted using 128 bit AES in CTR mode. The key material is processed +through the [Vault transit secret engine](/vault/docs/secrets/transit), +which uses the default transit encryption cipher (AES-GCM with a 256-bit AES key +and a 96-bit nonce), and stored alongside the object. This pattern is called envelope encryption. + +The Vault transit secret engine's +[datakey generation](/vault/api-docs/secret/transit#generate-data-key) creates the encryption key material using bit material from the kernel's cryptographically secure pseudo-random +number generator (CSPRNG) as the `context` value. Blob storage encryption generates a unique key for each object and relies on envelope encryption, so Vault does not rotate the encryption key material for individual objects. The root encryption keys within the envelope encryption scheme are rotated automatically by HCP Terraform every 365 days. These keys are not automatically rotated within TFE. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/index.mdx new file mode 100644 index 000000000..12b1ed68d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/index.mdx @@ -0,0 +1,11 @@ +--- +page_title: System Overview - Terraform Enterprise +description: >- + Learn about the architecture and operational characteristics of Terraform Enterprise. +--- + +# System Overview + +This section collects information about the architecture and operational characteristics of Terraform Enterprise. + +For the most part, documents in this section are not intended as task-oriented instructions. Instead, they are offered as background information to help inform your own proactive administration, maintenance, and architecture practices. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/reliability-availability.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/reliability-availability.mdx new file mode 100644 index 000000000..1f7460bfa --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/reliability-availability.mdx @@ -0,0 +1,143 @@ +--- +page_title: Reliability and Availability - System Overview - Terraform Enterprise +description: >- + Learn about the components that determine reliability and how to recover from + failures in each operation mode. +--- + +# Reliability and Availability + +This section covers details relating to the reliability and availability of +Terraform Enterprise installations. This documentation may be +useful to customers evaluating Terraform Enterprise or operators responsible for installing and +maintaining Terraform Enterprise. + +## Components + +Terraform Enterprise consists of several distinct components that each play a +role when considering the reliability of the overall system: + +- **Application Layer** + + - _TFE Core_ - A Rails application at the center of Terraform Enterprise; + consists of web frontends and background workers + + - _TFE Services_ - A set of Go services that provide various pieces of key + functionality for Terraform Enterprise + + - _Terraform Workers_ - A fleet of isolated execution environments that + perform Terraform Runs on behalf of Terraform Enterprise users + +- **Coordination Layer** + + - _Redis_ - Used for Rails caching and coordination between Terraform Enterprise Core's web + and background workers + +- **Storage Layer** + + - _PostgreSQL Database_ - Serves as the primary store of Terraform + Enterprise's application data such as workspace settings and user settings + + - _Blob Storage_ - Used for storage of Terraform state files, plan files, + configuration, and output logs + + - _HashiCorp Vault_ - Used for encryption of sensitive data. There are + two types of Vault data in Terraform Enterprise - + [key material](/vault/docs/concepts/seal) and + [storage backend data](/vault/docs/configuration/storage). + + - _Configuration Data_ - The information provided and/or generated at + install-time (e.g. database credentials, hostname, etc.) + +## Operation Modes + +This section describes how to set up your Terraform Enterprise deployment to recover from +failures in the various operational modes (_Mounted Disk_, _External_ +_Services_). The operational mode is selected at install time and can not be +changed once the install is running. + +The below tables explain where each data type in the +[Storage Layer](#components) is stored and +the corresponding snapshot and restore procedure. For the data types that use +Terraform Enterprise's built-in snapshot and restore function, follow +[these instructions](/terraform/enterprise/deploy/replicated/administration/infrastructure/automated-recovery). For the data types that do +**not** use the built-in functionality, backup and restore is the responsibility +of the user. + +_Data Location_ + +| | Configuration | Vault | PostgreSQL | Blob Storage | +| ------------------- | ------------------------------------ | ---------------------------------------------------------------------------------------- | -------------------------- | -------------------------- | +| _Mounted Disk_ | Stored in Docker volumes on instance | Key material on host in `/var/lib/tfe-vault`, storage backend is mounted disk PostgreSQL | Stored in mounted disks | Stored in mounted disks | +| _External Services_ | Stored in Docker volumes on instance | Key material on host in `/var/lib/tfe-vault`, storage backend is external PostgreSQL | Stored in external service | Stored in external service | +| External Vault | - | Key material in external Vault with user-defined storage backend | - | - | + +_Backup and Restore Responsibility_ + +| | Configuration | Vault | PostgreSQL | Blob Storage | +| ------------------- | -------------------- | -------------------- | ---------- | ------------ | +| _Mounted Disk_ | Terraform Enterprise | Terraform Enterprise | User | User | +| _External Services_ | Terraform Enterprise | Terraform Enterprise | User | User | +| External Vault | - | User | - | - | + +### Mounted Disk + +_PostgreSQL Database_ and _Blob Storage_ use mounted disks for their +data. Backup and restore of those volumes is the responsibility of the user, and +is not managed by Terraform Enterprise's built-in systems. + +_Vault Data_ is stored in PostgreSQL and accordingly lives on the mounted disk. As +long as the user has restored the mounted disk successfully, the built-in restore +mechanism will restore Vault operations in the event of a failure. + +_Configuration Data_ for the installation is stored in Docker +volumes on the instance. The built-in snapshot mechanism can package up the +Configuration data and store it off the instance, and the built-in restore +mechanism can recover the configuration data and restore +operation in the event of a failure. +Configure snapshot and restore by following the [automated recovery instructions](/terraform/enterprise/deploy/replicated/administration/infrastructure/automated-recovery). + +If the instance running Terraform Enterprise is lost, the use of mounted disks +means no state data is lost. + +### External Services + +In the _External Services_ operation mode, the +**Application Layer** and **Coordination Layer** execute on a Linux instance, +but the **Storage Layer** is configured to use external services in the form of +a PostgreSQL server and an S3-compatible Blob Storage. + +The maintenance of PostgreSQL and Blob Storage are handled by the user, +which includes backing up and restoring if necessary. + +_Vault Data_ is stored in PostgreSQL. As long as PostgreSQL has been restored +successfully by the user, the built-in restore mechanism will restore Vault +operations in the event of a failure. + +_Configuration Data_ for the installation is stored in Docker +volumes on the instance. The built-in snapshot mechanism can package up the +data and store it off the instance, and the built-in restore +mechanism can recover the data and restore operation in the event of a failure. +Configure snapshot and restore by following the [automated recovery instructions](/terraform/enterprise/deploy/replicated/administration/infrastructure/automated-recovery). + +If the instance running Terraform Enterprise is lost, the use of +external services means no state data is lost. + +-> **NOTE:** Customers running an [optional external Vault cluster](/terraform/enterprise/deploy/replicated/install/vault) are +responsible for backing up the Vault data and restoring it if necessary. + +### Availability During Upgrades + +Upgrades use the installer dashboard. +Once an upgrade has been been detected (either online or airgap), the new code +is imported. Once ready, all services on the instance are restarted running +the new code. The expected downtime is between 30 seconds and 5 minutes, +depending on whether database updates have to be applied. + +Only application services are changed during the upgrade; data is not backed up +or restored. The only data changes that may occur during upgrade are the application of +migrations the new version might apply to the _PostgreSQL Database_. + +When an upgrade is ready to start the new code, the system waits for all +Terraform runs to finish before continuing. Once the new code has started, the +queue of runs is continued in the same order. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/security-model.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/security-model.mdx new file mode 100644 index 000000000..0a51ae8fe --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/architecture/system-overview/security-model.mdx @@ -0,0 +1,29 @@ +--- +page_title: Security Model- System Overview - Terraform Enterprise +description: >- + Learn the organizational roles required for security and our recommendations + for securely operating Terraform Enterprise. +--- + +# Terraform Enterprise Security Model + +This page explains the aspects of the Terraform security model that are unique to Terraform Enterprise. We recommend also reviewing the core concepts in [HCP Terraform Security model](/terraform/cloud-docs/architectural-details/security-model). + +@include "replicated-and-fdo/architecture/security-model-partial.mdx" + +#### Restrict Terraform Build Worker Metadata Access + +By default, Terraform Enterprise does not prevent Terraform operations from accessing the instance metadata service, which may contain IAM credentials or other sensitive data. Refer to [AWS](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-metadata.html), [Azure](https://docs.microsoft.com/en-us/azure/virtual-machines/windows/instance-metadata-service?tabs=windows), or [Google Cloud](https://cloud.google.com/compute/docs/storing-retrieving-metadata) documentation for more information on this service. + +Terraform Enterprise allows you to restrict access to the metadata endpoint from Terraform operations, preventing workspaces from reading any data from the metadata service. You can do this by: + +- Visiting the installer dashboard "Settings" page and enabling “Restrict Terraform Build Worker Instance Metadata Access” under the “Advanced Configuration” section. +- Setting [restrict_worker_metadata_access](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#restrict_worker_metadata_access) in the application settings file. + +We recommend enabling this setting to prevent Terraform operations from accessing the instance metadata endpoint, unless you are relying on the [instance profile to provide default credentials to workspaces](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#instance-profile-as-default-credentials). + +#### Disable Unneeded Dashboard UI Access + +For standalone deployments, port 8800 is reserved for the [Replicated admin console](/terraform/enterprise/application-administration/admin-access), which is used for configuring Terraform Enterprise. This port should only be exposed to infrastructure admins. If you choose to configure Terraform Enterprise with the [automated process](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer), you can disable the Replicated admin console by passing the `disable-replicated-ui` argument to the installation script: + +`sudo bash ./install.sh disable-replicated-ui` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/index.mdx new file mode 100644 index 000000000..a5bb45af0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/index.mdx @@ -0,0 +1,24 @@ +--- +page_title: Legacy Deployment Overview (Replicated) - Terraform Enterprise +description: >- + Learn about the history and context of the Terraform Enterprise Replicated deployment option. +--- + +# Terraform Enterprise on Replicated + +This topic provides overview information about the Replicated deployment option for Terraform Enterprise. Deploying Terraform Enterprise to Replicated is deprecated. Refer to [Terraform Enterprise deployment overview](/terraform/enterprise/deploy) for information about deploying to the supported runtime environments. + + + +The Replicated deployment option is limited to customers who purchased Terraform Enterprise before January 2024. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + +The final Replicated release of Terraform Enterprise will be in March 2025. HashiCorp will support this release until April 1, 2026. + +To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by November 2024. For more information, refer to [Terraform Enterprise deployment overview](/terraform/enterprise/deploy) or contact your HashiCorp account representative. + + + +Before Terraform Enterprise v202309-1, you could _only_ deploy Terraform Enterprise with Replicated. Introduced in v202309-1, Terraform Enterprise supports more [flexible deployment options](/terraform/enterprise/deploy/), such as Docker Engine and Kubernetes. If Terraform Enterprise is currently deployed to Replicated today and want to migrate your Terraform Enterprise installation to an alternate deployment option, [refer to our migration guide](/terraform/enterprise/deploy/replicated-migration). + +You can deploy Terraform Enterprise using the [Replicated Native Scheduler](https://help.replicated.com/docs/native/getting-started/overview/), bundling Replicated with Terraform Enterprise. Replicated provides self-managed platform capabilities such as installation, upgrade, container orchestration, platform administration, license management, and support bundles. + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/active-active.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/active-active.mdx new file mode 100644 index 000000000..6b848e34a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/active-active.mdx @@ -0,0 +1,325 @@ +--- +page_title: Automated Installation - Active/Active - Terraform Enterprise +description: >- + Use active/active architecture to increase the reliability and performance of Terraform Enterprise. Learn how to prepare for an external Redis server, update configuration files, connect to external Redis, and then scale to two nodes. +--- + +# Terraform Enterprise Active/Active + +When your organization requires increased reliability or performance from Terraform Enterprise that your current single application instance cannot provide, it is time to scale to the Active/Active architecture. + +Before scaling to Active/Active, you should weigh its benefits against increasing operational complexity. Specifically, consider the following aspects of the Active/Active architecture: + +- Hard requirement of a completely automated installation +- Observability concerns when monitoring multiple instances +- Custom automation required to manage the lifecycle of application nodes +- [CLI-based commands](/terraform/enterprise/deploy/replicated/administration/infrastructure/admin-cli) for administration instead of the Replicated Admin Console + +-> **Note**: Please contact your Customer Success Manager before attempting to follow this guide. They will be able to walk you through the process to make it as seamless as possible. + +### Prerequisite + +As mentioned above, the Active/Active architecture requires an existing [automated installation](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer) of Terraform Enterprise that follows our [best practices for deployment](/terraform/enterprise/deploy/replicated/architecture/reference-architecture). + +The primary requirement is an auto scaling group (or equivalent) with a single instance running Terraform Enterprise. This ASG should be behind a load balancer and can be exposed to the public Internet or not depending on your requirements. As mentioned earlier, the installation of the Terraform Enterprise application should be automated completely so that the auto scaling group can be scaled to zero and back to one without human intervention. + +-> **Note**: Active/Active installations on VMware infrastructure also require you to configure a Load Balancer to route traffic across the Terraform Enterprise servers. This documentation does not cover that setup. While auto-scaling groups are not available via native vCenter options, you must still configure a fully automated deployment. You must also reduce the available servers to one server for upgrades, maintenance, and support. + +The application itself must be using [External Services](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#operational-mode-decision) mode to connect to an external PostgreSQL database and object storage. + +All admin and application configuration must be automated via your settings files and current with running configuration, i.e. it cannot have been altered via the Replicated Admin Console and not synced to the file. Specifically, you should be using the following configuration files: + +- `/etc/replicated.conf` - contains the configuration for the Replicated installer +- `/etc/ptfe-settings.json` - contains the configuration for the Terraform Enterprise application + +-> **Note**: The location for the latter is controlled by the "ImportSettingsFrom" setting in `/etc/replicated.conf` and is sometimes named `settings.json` or `replicated-tfe.conf` + +The requirement for automation is two-fold. First, the nodes need to be able to spin up and down without human intervention. More importantly though, you will need to ensure configuration is managed in this way going forward as the Replicated Admin Console will be disabled. **The Replicated Admin Console does not function correctly when running multiple nodes and must not be used**. + +### Step 1: Prepare to Externalize Redis + +#### Prepare Network + +There are new access requirements involving ingress and egress: + +- **Port 6379** (or the port the external Redis will be configured to use) must be open between the nodes and the Redis service +- **Port 8201** must be open between the nodes to allow Vault to run in [High Availability](/vault/docs/internals/high-availability) mode +- **Port 8800** should now be closed, as the Replicated Admin Console is no longer available when running multiple nodes + +#### Provision Redis + +Externalizing Redis allows multiple active application nodes. Terraform Enterprise works with the native Redis services from AWS, Azure, and GCP, and installs as a standard product on VMware machines. +The Redis deployment must satify the [requirements](/terraform/enterprise/deploy/configuration/storage/connect-redis#requirements) of Terraform Enterprise. + +-> **Note**: Please see the cloud-specific configuration guides at the end of this document for details [here](#appendix-1-aws-elasticcache). + +### Step 2: Update your Configuration File Templates + +Before installing, you need to make changes to the templates for the configuration files mentioned earlier in the prerequisites. + +#### Update Installer Settings + +The existing settings for the installer and infrastructure (`replicated.conf`) are still needed and require to be expanded. Please see documentation for the existing options [here](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#installer-settings). + +##### Pin Your Version + +To upgrade to the Active/Active functionality and for ongoing upgrades, you need to pin your installation to the appropriate release by setting the following: + +| **Key** | **Description** | **Specific Format Required** | +| --------------- | ------------------------------------------- | ---------------------------- | +| ReleaseSequence | Refers to a version of Terraform Enterprise | **Yes**, integer. | + +The following example pins the deployment to the the [v202101-1](/terraform/enterprise/releases/2021/v202101-1) release of Terraform Enterprise (which is the first to support multiple nodes): + +```json +{ + "ReleaseSequence": 504 +} +``` + +#### Update Application Settings + +The existing settings for the Terraform Enterprise application (`ptfe-settings.json`) are still needed and require to be expanded. Please see documentation for the existing options [here](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#application-settings). + +##### Enable Active/Active + +| **Key** | **Required Value** | **Specific Format Required** | +| -------------------- | ------------------ | ---------------------------- | +| enable_active_active | “1” | **Yes**, string. | + +```json +{ + "enable_active_active": { + "value": "1" + } +} +``` + +##### Configure External Redis + +The settings for the Terraform Enterprise application must also be expanded to support an external Redis instance: + +| **Key** | **Required Value** | **Specific Format Required** | +| ------------------------- | --------------------------------------------------------------------------------- | ---------------------------- | +| redis_host | Hostname of an external Redis instance which is resolvable from the Terraform Enterprise instance. | **Yes**, string. | +| redis_port | Port number of your external Redis instance. | **Yes**, string. | +| redis_use_password_auth\* | Set to `1`, if you are using a Redis service that requires a password. | **Yes**, string. | +| redis_pass\* | Password used to authenticate to Redis. | **Yes**, string. | +| redis_use_tls\* | Set to `1` if you are using a Redis service that requires TLS. | **Yes**, string. | + +_\* Fields marked with an asterisk are only necessary if your particular external Redis instance requires them._ + +For example: + +```json +{ + "redis_host": { + "value": "someredis.host.com" + }, + "redis_port": { + "value": "6379" + }, + "redis_use_password_auth": { + "value": "1" + }, + "redis_pass": { + "value": "somepassword" + }, + "redis_use_tls": { + "value": "1" + } +} +``` + +-> **Note:** To use in-transit encryption with GCP Memorystore for Redis, you must [download the CA certificate](https://cloud.google.com/memorystore/docs/redis/enabling-in-transit-encryption#downloading_the_certificate_authority) for your Redis instance and configure it within the `ca_certs` Terraform Enterprise application setting. Additionally, you must ensure that the `redis_port` and `redis_use_tls` settings are configured correctly. + +##### Add Encryption Password + +!> The Encryption Password value must be added to the config and is **required to be identical between node instances** for the Active/Active architecture to function: + +| **Key** | **Description** | **Value can change between deployments?** | **Specific Format Required** | +| ------------ | --------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------- | ---------------------------- | +| enc_password | Used to encrypt sensitive data ([docs](/terraform/enterprise/deploy/replicated/install/automated/encryption-password)) | **No.** Changing will make decrypting existing data impossible. | No | + +```json +{ + "enc_password": { + "value": "767fee4e6046de48943df2decc55f3cd" + } +} +``` + +-> **Note**: In versions prior to `v202104-1` the following values were also required to be set: `install_id`, `root_secret`, `user_token`, `cookie_hash`, `archivist_token`, `internal_api_token`, `registry_session_secret_key` (HEX), and `registry_session_encryption_key` (HEX). These values are no longer required but will still work if they are still set by your configuration. + +### Step 3: Connect to External Redis + +Once you are prepared to include the modified configuration options in your configuration files, you must connect a single node to your newly provisioned Redis service by rebuilding your node instance with the new settings. + +#### Re-provision Terraform Enterprise Instance + +Terminate the existing instance by scaling down to zero. Once terminated, you can scale back up to one instance using your revised configuration. + +#### Wait for Terraform Enterprise to Install + +It can take up to 15 minutes for the node to provision and the Terraform Enterprise application to be installed and respond as healthy. You can monitor the status of the node provisioning by watching your auto scaling group in your cloud’s web console. To confirm the successful implementation of the Terraform Enterprise application you can SSH onto the node and run the following command to monitor the installation directly: + +```bash +replicatedctl app status +``` + +Which will output something similar to the following: + +```json +[ + { + "AppID": "218b78fa2bd6f0044c6a1010a51d5852", + "Sequence": 504, + "PatchSequence": 0, + "State": "starting", + "DesiredState": "started", + "IsCancellable": false, + "IsTransitioning": true, + "LastModifiedAt": "2021-01-07T21:15:11.650385151Z" + } +] +``` + +Installation is complete once `isTransitioning` is `false` and `State` is `started`. + +Refer to the [Admin CLI Commands](/terraform/enterprise/deploy/replicated/administration/infrastructure/admin-cli) documentation for more status and troubleshooting commands. + +#### Validate Application + +With installation complete, it is time to validate the new Redis connection. Terraform Enterprise uses Redis both as a cache for API requests and a queue for long running jobs, e.g. Terraform Runs. Test the latter behavior by running real Terraform plans and applies through the system. + +Once you are satisfied the application is running as expected, you can move on to step 4 to scale up to 2 nodes. + +### Step 4: Scale to Two Nodes + +You can now safely change the number of instances in your Auto Scaling Group ( or equivalent) to two. + +#### Disable the Replicated Admin Console + +Before scaling beyond the first node, you must disable the Replicated Admin Console as mentioned earlier in this guide. This is done by adding the `disable-replicated-ui` flag as a parameter when you call the install script, as such: + +``` +sudo bash ./install.sh disable-replicated-ui +``` + +Locate where the `install.sh` script is run as part of your provisioning/installation process and add the parameter. If there are other parameters on the same line, they should be left in place. + +#### Scale Down to Zero Nodes + +Scale down to zero nodes to fully disable the admin dashboard. Once the existing instance has terminated... + +#### Scale Up to Two Nodes + +Now that you have tested your external Redis connection change the min and max instance count of your Auto Scaling Group to 2 nodes. + +#### Wait for Terraform Enterprise to Install + +You need to wait up to 15 minutes for the application to respond as healthy on both nodes. Monitor the status of the install with the same methods used previously for one node in Step 3. + +-> **Note**: Each node needs to be checked independently. + +#### Validate Application + +Finally, confirm the application is functioning as expected when running multiple nodes. Run Terraform plan and applies through the system (and any other tests specific to your environment) like you did to validate the application in Step 3. + +Confirm the general functionality of the Terraform Enterprise UI to validate the tokens you added in Step 2 are set correctly. Browse the `Run` interface and your organization's private registry to confirm your application functions as expected. + +@include "replicated-and-fdo/admin/active-active-scaling-partial.mdx" + + +## Appendix 1: AWS ElasticCache + +The following example Terraform configuration shows how to configure a replication group for use with TFE: + +In this example, the required variables are: + +- **vpc_id** is the ID of VPC where Terraform Enterprise application will be deployed +- **subnet_ids** are the IDs of Subnets within the VPC to use for the ElastiCache Subnet Group +- **security_group_ids** are the IDs of Security Groups within the VPC that will be attached to Terraform Enterprise instances for Redis ingress +- **availability_zones** are the zones within the VPC to deploy the ElastiCache setup to + +```terraform +resource "aws_elasticache_subnet_group" "tfe" { + name = "tfe-test-elasticache" + subnet_ids = var.subnet_ids +} + +resource "aws_security_group" "redis_ingress" { + name = "external-redis-ingress" + description = "Allow traffic to redis from instances in the associated SGs" + vpc_id = var.vpc_id + + ingress { + description = "Terraform Enterprise ingress to redis" + from_port = 7480 + to_port = 7480 + protocol = "tcp" + security_groups = var.security_group_ids + } +} + +resource "aws_elasticache_replication_group" "tfe" { + node_type = "cache.m4.large" + replication_group_id = "tfe-test-redis" + replication_group_description = "External Redis for TFE." + + apply_immediately = true + at_rest_encryption_enabled = true + auth_token = random_pet.redis_password.id + automatic_failover_enabled = true + availability_zones = var.availability_zones + engine = "redis" + engine_version = "7.0" + num_cache_clusters = length(var.availability_zones) + parameter_group_name = "default.redis7" + port = 7480 + security_group_ids = [aws_security_group.redis_ingress.id] + subnet_group_name = aws_elasticache_subnet_group.tfe.name + transit_encryption_enabled = true +} +``` + +## + +## Appendix 2: GCP Memorystore for Redis + +-> **Note**: Memorystore on Google Cloud does not support persistence, so encryption at rest is not an option. + +Requirements/Options: + +- **authorized_network** - The network you wish to deploy the instance into. Internal testing was done using the same network Terraform Enterprise is deployed into. If a different network is used, the customer needs to ensure the 2 networks are open on port **6379**. +- **memory_size_gb** - How much memory to allocate to Redis. Initial testing was done with just 1GB configured. Larger deployments may require additional memory. (HCP Terraform uses an m4.large, which is just 6GB of memory, for reference.) +- **location_id** - What region to deploy into - should be the same one Terraform Enterprise is deployed into. If Standard_HA tier is selected, an alternative_location_id will also need to be provided as a failover location. +- **redis_version** - Redis `6.x` and `7.x` are the fully tested and supported version of Redis for Terraform Enterprise. Redis `7.x` is the recommended version. + +The default example provided on the provider page can be used to deploy memorystore [here](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/redis_instance). The host output of the resource can then be provided to the terraform module in order to configure connectivity. + +You may consider using other options in the configuration depending on your requirements, such as including the **auth_enabled** flag set to true, which must then be accompanied by including an additional Terraform Enterprise configuration item called **redis_password** set to the value returned in the **auth_string** attribute from the memorystore resource. + +## + +## Appendix 3: Azure Cache for Redis + +-> **Note**: Azure Cache on Azure only supports persistence and encryption with their Premium tier. All other tiers, Basic and Standard, do not support data persistence. + +The minimum instance size for Redis to be used with Terraform Enterprise is 6 GiB. For Azure, this allows for some minimum configurations across the 3 tiers using Cache Names for their different Tiers. Our recommendations on cache sizing for Azure Cache for Redis is in the table below: + +| | **Basic** | **Standard** | **Premium** | +| ------------------ | --------- | ------------ | ----------- | +| **Cache** **Name** | C3 | C0 | P2 | + +Make sure you configure the minimum TLS version to the Terraform Enterprise supported version of 1.2 as the Azure resource defaults to 1.0. The default port for Azure Cache for Redis is 6380 and will need to be modified in the Application Settings `ptfe-replicated.conf` in order for Terraform Enterprise to connect to Azure Cache for Redis. + +The default example provided on the provider page can be used to deploy Azure Cache for Redis [here](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/redis_cache). The outputs of the resource can then be provided to the Terraform module in order to configure connectivity + +## + +## Appendix 4: Redis on VMware + +Redis on VMware was tested with a virtual machine with 2 CPUs and 8 GB of memory running Ubuntu 20.04. Both Redis v6 and v7 are supported. A full list of supported Operating Systems can be found on the [Pre-Install Checklist](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#operating-system-requirements). + +The sizing of your Redis server will depend on your company or organization's workload. Monitoring of the virtual machine and resizing based on utilization is recommended. More details on memory utilization can be found on [Redis' website](https://redis.io/topics/memory-optimization). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/automating-initial-user.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/automating-initial-user.mdx new file mode 100644 index 000000000..c042dfe2e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/automating-initial-user.mdx @@ -0,0 +1,129 @@ +--- +page_title: Automating Initial User - Install and Config - Terraform Enterprise +description: >- + Use the `/admin/initial-admin-user` endpoint to create the initial admin user. Generate an initial admin creation token and then create the initial admin user with the HTTP API. +--- + +# Terraform Enterprise - Automating Initial User Creation + +After Terraform Enterprise is installed, the initial admin user must then be created to begin using the product. +Normally this user is created by opening the application from the installer dashboard. However, if further automation is desired, an API is available to create this user. + +## Initial Admin Creation Token (IACT) + +To create the initial admin user via the API, the request must be authenticated with the Initial Admin Creation Token (IACT). This token +can only be used to create the admin user when there are no users configured in the system. The IACT can be retrieved in several different ways. + +### Shell Command or Automated Deployment Script + +After installation, run the following from a shell connected to your Terraform Enterprise instance: + +```shell +replicated admin --tty=0 retrieve-iact +``` + +If you want to create the initial user in an automated deployment script, run a command that lets you capture the IACT. The following example command outputs the complete IACT with the carriage return character removed. The `--tty=0` flag enables the command to run successfully in automation, such as cloud-init. Without this flag set, the command will return an empty string: + +```shell +initial_token=$(replicated admin --tty=0 retrieve-iact | tr -d '\r') +``` + +The command outputs the complete IACT with the carriage return character removed, which facilitates use in automation. + +### Via API + +The option `iact_subnet_list` can be set to a CIDR mask that will allow clients in that address range to query the retrieval API directly. This allows installers the ability to create the installation and then immediately request the IACT token without running a command on the installation machine. + +~> NOTE: `iact_subnet_list` has no default value. If unset, no clients will be able to request the IACT token via the API. + +The API will be relative to the installation, for example `https://tfe.mycompany.com/admin/retrieve-iact`, with `/admin/retrieve-iact` being the path that returns the token. + +When this feature is used, it is governed by another setting: `iact_subnet_time_limit`. This is a time limit, measured from the installation starting, that controls external access to the IACT. By default this is set to 60 minutes, meaning that during the initial 60 minutes after the installation boots, the API can be used by a client within the subnet list. After that time, access is not allowed. + +If a customer wishes to disable the time limit and allow access to the IACT forever, set the limit to `unlimited`. + +## Initial Admin Creation API + +With the IACT in hand, the initial admin creation API can now be used. This API is available under the path `/admin/initial-admin-user` of your primary hostname. For instance, if your Terraform Enterprise instance was located at `tfe.mycompany.com`, the initial admin creation API would be `https://tfe.mycompany.com/admin/initial-admin-user`. + +This API requires the IACT as well as a JSON document describing the username, email address, and password of the initial admin user. + +## Creating the Initial Admin User API + +`POST /admin/initial-admin-user` + +| Status | Response | Reason | +| ------- | ------------------- | -------------------------------------------------------------- | +| [200][] | JSON document | Successfully created the user | +| [404][] | JSON error document | Unauthorized to perform action | +| [422][] | JSON error document | Malformed request body (missing attributes, wrong types, etc.) | +| [500][] | JSON error document | Failure during user creation | + +[200]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/200 + +[400]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/400 + +[404]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/404 + +[422]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/422 + +[500]: https://developer.mozilla.org/en-US/docs/Web/HTTP/Status/500 + +### Query Parameters + +These are standard URL query parameters; remember to percent-encode values if your tooling doesn't automatically encode URLs. + +| Parameter | Description | +| --------- | --------------------------------------------------------- | +| `token` | **Required.** The IACT token retrieved via API or command | + +### Request Body + +This POST endpoint requires a JSON object with the following properties as a request payload. + +Properties without a default value are required. + +| Key path | Type | Default | Description | +| ---------- | ------ | ------- | ------------------------------------ | +| `username` | string | | The username to assign the new user. | +| `email` | string | | The email address of the new user. | +| `password` | string | | The password of the new user. | + +### Response Body + +The POST endpoint will return a JSON object with the following properties. + +| Key path | Type | Description | +| -------- | ------ | -------------------------------------------------------------------------- | +| `status` | string | Either `"created"` or `"error"`. | +| `token` | string | If status is `"created"`, this contains a Terraform Enterprise user token for the new user. | +| `error` | string | If status is `"error"`, this contains the reason for the error. | + +### Sample Payload + +```json +{ + "username": "manage", + "email": "it@mycompany.com", + "password": "thisisabadpassword" +} +``` + +### Sample Request + +```shell +curl \ + --header "Content-Type: application/json" \ + --request POST \ + --data @payload.json \ + https://tfe.company.com/admin/initial-admin-user?token=$(cat iact.txt) +``` + +### Sample Response + +```json +{ + "status": "created", + "token": "aabbccdd.v1.atlas.ddeeffgghhiijjkkllmmnnooppqqrrssttuuvvxxyyzz" +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/automating-the-installer.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/automating-the-installer.mdx new file mode 100644 index 000000000..4ddc285b9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/automating-the-installer.mdx @@ -0,0 +1,413 @@ +--- +page_title: Automated Installation - Install and Config - Terraform Enterprise +description: >- + Do an automated installation of Terraform Enterprise. Learn about application and installer settings, and how to wait for Terraform Enterprise to become ready. +--- + +# Automated Terraform Enterprise Installation + +The installation of Terraform Enterprise can be automated for both online and airgapped installs. There are two parts to automating the install: configuring [Replicated](https://help.replicated.com/) -- the platform which runs Terraform Enterprise -- and configuring Terraform Enterprise itself. + +Before starting the install process, you must: + +- prepare an [application settings](#application-settings) file, which defines the settings for the Terraform Enterprise application. +- prepare `/etc/replicated.conf`, which defines the settings for the Replicated installer. +- copy your license file to the instance. +- download the `.airgap` bundle to the instance (Airgapped mode only). + +You may also need to provide additional flags (such as the instance's public and private IP addresses) in order to avoid being prompted for those values when running the installer (which may result in either a failure of the installer or a unbounded delay while waiting for input). + +This document expects that the user is already familiar with how to do a [manual install](/terraform/enterprise/deploy/replicated/install/interactive/installer#installation). + +## Application settings + +This file contains the values you would normally provide in the settings +screen. You need to create this file first since it is referenced in the +`ImportSettingsFrom` property in `/etc/replicated.conf`. + +### Format + +The settings file is JSON formatted. All values must be strings. The following +example shows a possible settings file for a _Mounted Disk_ installation. + +```json +{ + "hostname": { + "value": "terraform.example.com" + }, + "disk_path": { + "value": "/opt/terraform-enterprise" + }, + "enc_password": { + "value": "CHANGEME" + } +} +``` + +> Note: The JSON file must be valid JSON for the install to work, so it's best to validate it before using for an install. + +The easiest way to check the application config is valid JSON would be with `python`, which will be present on most Linux installs: + +``` +$ python -m json.tool settings.json +Expecting property name enclosed in double quotes: line 8 column 5 (char 171) +``` + +After fixing the JSON file, the command will return the valid JSON: + +``` +$ python -m json.tool settings.json +{ + "hostname": { + "value": "terraform.example.com" + }, + "disk_path": { + "value": "/opt/terraform-enterprise" + }, + "enc_password": { + "value": "CHANGEME" + } +} +``` + +### Discovery + +One the easiest ways to get the settings is to [perform a manual install](/terraform/enterprise/deploy/replicated/install/interactive/installer#installation) and configure all the settings the way you want them. Then you can SSH in, request the settings in JSON format and use that file in a future automated install. + +-> **Note**: `replicatedctl` is located at `/usr/local/bin/replicatedctl`. On some operating systems, `/usr/local/bin` is not in the user's `$PATH`. In these cases, either add `/usr/local/bin` to the `$PATH` or refer to `replicatedctl` with the full path. + +To extract the settings as JSON, access the instance via SSH, then run: + +``` +$ replicatedctl app-config export > settings.json +``` + +The following example shows `replicatedctl app-config export` output for an +instance configured in _Mounted Disk_ mode. + +``` +$ replicatedctl app-config export +{ + "aws_access_key_id": {}, + "aws_instance_profile": {}, + "aws_secret_access_key": {}, + "azure_account_key": {}, + "azure_account_name": {}, + "azure_client_id": {}, + "azure_container": {}, + "azure_endpoint": {}, + "azure_use_msi": {}, + "backup_token": {}, + "ca_certs": {}, + "capacity_concurrency": { + "value": "10" + }, + "capacity_cpus": {}, + "capacity_memory": { + "value": "512" + }, + "custom_image_tag": { + "value": "hashicorp/build-worker:now" + }, + "disk_path": { + "value": "/opt/terraform-enterprise" + }, + "enable_active_active": {}, + "enc_password": { + "value": "CHANGEME" + }, + "extern_vault_addr": {}, + "extern_vault_enable": {}, + "extern_vault_namespace": {}, + "extern_vault_path": {}, + "extern_vault_propagate": {}, + "extern_vault_role_id": {}, + "extern_vault_secret_id": {}, + "extern_vault_token_renew": {}, + "extra_no_proxy": {}, + "force_tls": {}, + "gcs_bucket": {}, + "gcs_credentials": {}, + "gcs_project": {}, + "hairpin_addressing": {}, + "hostname": { + "value": "terraform.example.org" + }, + "iact_subnet_list": {}, + "iact_subnet_time_limit": {}, + "log_forwarding_config": {}, + "log_forwarding_enabled": {}, + "metrics_endpoint_enabled": {}, + "metrics_endpoint_port_http": {}, + "metrics_endpoint_port_https": {}, + "pg_dbname": {}, + "pg_extra_params": {}, + "pg_netloc": {}, + "pg_password": {}, + "pg_user": {}, + "placement": {}, + "production_type": { + "value": "disk" + }, + "redis_host": {}, + "redis_pass": {}, + "redis_port": {}, + "redis_use_password_auth": {}, + "redis_use_tls": {}, + "restrict_worker_metadata_access": {}, + "s3_bucket": {}, + "s3_endpoint": {}, + "s3_region": {}, + "s3_sse": {}, + "s3_sse_kms_key_id": {}, + "tbw_image": { + "value": "default_image" + }, + "tls_ciphers": {}, + "tls_vers": { + "value": "tls_1_2_tls_1_3" + } +} +``` + +Note that when you build your own settings file, you do not need to include parameters that do not have `value` keys, such as `extra_no_proxy` in the output above. + +### Available settings + +The settings available to configure your installation are summarized below. It is expected the user will have completed a manual installation first and will already be familiar with the nature of these parameters from the settings screen. + +The following settings apply to every installation: + +- `hostname` — (Required) The hostname you will use to access your installation. + +- `enc_password` — (Required) The [password](/terraform/enterprise/deploy/replicated/install/automated/encryption-password) used to encrypt and decrypt the internally-managed Vault unseal key and root token. Not required only when opting out of internally-managed Vault. + +- `capacity_concurrency` — Number of concurrent plans and applies; defaults to `10`. + +- `capacity_cpus` - The maximum number of CPU cores that a Terraform plan or apply can use on the system; defaults to `0` (unlimited). + +- `capacity_memory` — The maximum amount of memory (in megabytes) that a Terraform plan or apply can use on the system; defaults to `512`. + +- `iact_subnet_list` - A comma-separated list of CIDR masks that configure the ability to retrieve the [IACT](/terraform/enterprise/deploy/replicated/install/automated/automating-initial-user) from outside the host. For example: "10.0.0.0/24, 10.0.1.0/24". If not set, no subnets can retrieve the IACT. + +- `iact_subnet_time_limit` - The time limit that requests from the subnets listed can request the [IACT](/terraform/enterprise/deploy/replicated/install/automated/automating-initial-user), as measured from the instance creation in minutes; defaults to 60. + +- `extra_no_proxy` — (Optional) When configured to use a proxy, a `,` (comma) separated list of hosts to exclude from proxying. Please note that this list does not support whitespace characters. For example: `127.0.0.1,tfe.myapp.com,myco.github.com`. + +- `restrict_worker_metadata_access` - Prevents the environment where Terraform operations are executed from accessing the cloud instance metadata service. This should not be set when Terraform operations rely on using instance metadata (i.e., the instance IAM profile) as part of the Terraform provider configuration. _Note: a bug in Docker version [19.03.3](https://docs.docker.com/engine/release-notes/19.03/#known-issues-1) prevents this setting from working correctly. Operators should avoid using this Docker version when enabling this setting._; Valid values 0 or 1, defaults to 0. + +- `run_pipeline_mode` - Which pipeline to use to perform Terraform runs. Set to `agent` to use Terraform agents. Set to `legacy` to use Terraform Build Worker. Defaults to `agent` unless `custom_image_tag` is non-empty. + +- `hairpin_addressing` - When set, Terraform Enterprise services will direct traffic destined for the installation's FQDN toward the instance's internal IP address. This is useful for cloud environments where HTTP clients running on instances behind a load balancer cannot send requests to the public hostname of that load balancer. Defaults to `false`. + +- `tls_vers` - (Optional) Set to `tls_1_2` to enable only TLS 1.2, or to `tls_1_3` to enable only TLS 1.3. When unset, Terraform Enterprise defaults to both TLS 1.2 and 1.3 (`tls_1_2_tls_1_3`). + +- `tls_ciphers` - (Optional) Set to an OpenSSL [cipher list format](https://www.openssl.org/docs/man1.1.1/man1/ciphers.html) string to enable a custom TLS ciphersuite. When unset, Terraform Enterprise uses a default ciphersuite. + +- `force_tls` - When set, Terraform Enterprise will require all application traffic to use HTTPS by sending a 'Strict-Transport-Security' header value in responses, and marking cookies as secure. A valid, trusted TLS certificate must be installed when this option is set, as browsers will refuse to serve webpages that have an HSTS header set that also serve self-signed or untrusted certificates. + +- `log_forwarding_enabled` - (Optional) Whether or not to enable [log forwarding](/terraform/enterprise/deploy/replicated/monitoring/logging) for Terraform Enterprise. Set to `1` to enable log forwarding and `0` to disable log forwarding. Defaults to `0`. + +- `log_forwarding_config` - (Optional) Valid [log forwarding](/terraform/enterprise/deploy/replicated/monitoring/logging) configuration specifying external destination(s) to forward logs. + +- `metrics_endpoint_enabled` - (Optional) Enable an endpoint to [expose container metrics](/terraform/enterprise/deploy/replicated/monitoring/monitoring#terraform-enterprise-metrics). Defaults to `0`. + +- `metrics_endpoint_port_http` - (Optional) Defines the TCP port on which HTTP metrics requests will be handled. Defaults to `9090`. + +- `metrics_endpoint_port_https` - (Optional) Defines the TCP port on which HTTPS metrics requests will be handled. Defaults to `9091`. + +- `optout_license_reporting` - (Optional) Whether to opt out of Terraform Enterprise license usage data reporting to HashiCorp. Set to `0` to report license usage data to HashiCorp and `1` to disable (or opt out of) reporting usage data. Defaults to `0`. + +- `ca_certs` — (Optional) Custom certificate authority (CA) bundle. JSON does not allow raw newline characters, so replace any newlines + in the data with `\n`. For instance: + + ``` + --- X509 CERT --- + aabbccddeeff + --- X509 CERT --- + ``` + + would become + + ``` + --- X509 CERT ---\naabbccddeeff\n--- X509 CERT ---\n + ``` + +- `extern_vault_enable` — (Optional) Indicate if an external Vault cluster is being used. Set to `1` if so. + + - These variables are only used if `extern_vault_enable` is set to `1`. + - `extern_vault_addr` — (Required) URL of external Vault cluster. + - `extern_vault_role_id` — (Required) AppRole RoleId to use to authenticate with the Vault cluster. + - `extern_vault_secret_id` — (Required) AppRole SecretId to use to authenticate with the Vault cluster. + - `extern_vault_path` — (Optional) Path on the Vault server for the AppRole auth. Defaults to `auth/approle`. + - `extern_vault_token_renew` — (Optional) How often (in seconds) to renew the Vault token. Defaults to `3600`. + - `extern_vault_namespace` — (Optional) The Vault namespace to use. Leave blank to use the default namespace. When running v202205-1, be aware of this [known issue](/terraform/enterprise/releases/2022/v202205-1#known-issues). + +- `vault_path` — (Optional) Path on the host system to store the vault files. If `extern_vault_enable` is set, this has no effect. + +- `vault_store_snapshot` — (Optional) Indicate if the vault files should be stored in snapshots. Set to `0` if not. Defaults to `1`. + +- `production_type` — Either `external` or `disk`. Defaults to `disk`. + +If you have chosen `disk` for `production_type`, `disk_path` is required: + +- `disk_path` — Path on instance to persistent storage. +- `pg_password` — The password for the internal PostgreSQL access. The password will be auto-generated for each installation if not provided. + +If you want to use a [custom image](/terraform/enterprise/deploy/replicated/install/interactive/installer#custom-image), the following settings apply: + +For a [legacy custom image](/terraform/enterprise/deploy/replicated/install/interactive/installer#legacy): + +- `tbw_image` - Set this to `custom_image` if you want to use a legacy custom image. Defaults to `default_image`. +- `custom_image_tag` - The legacy custom image to use (e.g. `registry.example.com/example/terraform-enterprise-worker:custom-tag`). Leave blank to use the built-in default image. Defaults to `""`. + +For an [agent custom image](/terraform/enterprise/deploy/replicated/install/interactive/installer#agent): + +- `custom_agent_image_tag` - The agent custom image to use (e.g. `registry.example.com/example/tfc-agent:custom-tag`). Leave blank to use the built-in default image. Defaults to `""`. + +If you have chosen `external` for `production_type`, the following settings apply: + +- `pg_user` — (Required) PostgreSQL user to connect as. +- `pg_password` — (Required) The password for the PostgreSQL user. +- `pg_netloc` — (Required) The hostname and port of the target PostgreSQL server, in the format `hostname:port`. +- `pg_dbname` — (Required) The database name. +- `pg_extra_params` — (Optional) Parameter keywords of the form `param1=value1¶m2=value2` to support additional options that may be necessary for your specific PostgreSQL server. Allowed values are [documented on the PostgreSQL site](https://www.postgresql.org/docs/12/libpq-connect.html#LIBPQ-PARAMKEYWORDS). An additional restriction on the `sslmode` parameter is that only the `require`, `verify-full`, `verify-ca`, and `disable` values are allowed. + +Select which placement will be used for blob storage: S3, Azure, or GCS. Based on this value, you only need to provide one set of the following variables. + +- `placement` — (Required) Set to `placement_s3` for S3, `placement_azure` for Azure, or `placement_gcs` for GCS. + +For S3 (or S3-compatible storage providers): + +- `aws_instance_profile` (Optional) When set, use credentials from the AWS instance profile. Set to 1 to use the instance profile. Defaults to 0. If selected, `aws_access_key_id` and `aws_secret_access_key` are not required. +- `aws_access_key_id` — (Required unless `aws_instance_profile` is set) AWS access key ID for S3 bucket access. To use AWS instance profiles for this information, set it to `""`. +- `aws_secret_access_key` — (Required unless `aws_instance_profile` is set) AWS secret access key for S3 bucket access. To use AWS instance profiles for this information, set it to `""`. +- `s3_endpoint` — (Optional) Endpoint URL (hostname only or fully qualified URI). Usually only needed if using a VPC endpoint or an S3-compatible storage provider. +- `s3_bucket` — (Required) The S3 bucket where resources will be stored. +- `s3_region` — (Required) The region where the S3 bucket exists. +- `s3_sse` — (Optional) Enables server-side encryption of objects in S3; if provided, must be set to `aws:kms`. +- `s3_sse_kms_key_id` — (Optional) An optional KMS key for use when S3 server-side encryption is enabled. + +As of the `v202103-1` release, Terraform Enterprise supports using AWS IMDSv2 when using the instance profile to obtain credentials to connect to S3 object storage. + +For Azure: + +- `azure_account_name` — (Required) The Azure storage account name. +- `azure_container` — (Required) The Azure storage container name. +- `azure_endpoint` — (Optional) The Azure storage account endpoint. Leave blank to use the default Blob Storage endpoint. +- `azure_account_key` — (Optional) The storage account key used for authentication. Ignored when `azure_use_msi` is `1`. +- `azure_client_id` — (Optional) The client ID of the user-assigned managed identity used for authentication. Leave blank to use the system-assigned managed identity. Only used when `azure_use_msi` is `1`. +- `azure_use_msi` — (Optional) Use a managed identity for authentication instead of a storage account key. Set to `1` to enable and `0` to disable. Defaults to `0`. + +For GCS: + +- `gcs_project` — (Required) The GCP project where the bucket resides. +- `gcs_bucket` — (Required) The storage bucket name. +- `gcs_credentials` — (Optional) JSON blob containing the GCP credentials document. If this value is not present or `{}`, then GCP attempts to [authenticate with the service account](https://cloud.google.com/docs/authentication/production) attached to the instance. **Note:** This is a string, so ensure values are properly escaped. + +## Installer settings + +### Online + +The following is an example `/etc/replicated.conf` suitable for an automated online install using a certificate trusted by a public or private CA. `ImportSettingsFrom` must be the full path to the application settings file. You also need to provide the full path to your license file in `LicenseFileLocation`. + +See the full set of configuration parameters in the [Replicated documentation](https://help.replicated.com/docs/native/customer-installations/automating/#configure-replicated-automatically). + +```json +{ + "DaemonAuthenticationType": "password", + "DaemonAuthenticationPassword": "your-password-here", + "TlsBootstrapType": "server-path", + "TlsBootstrapHostname": "server.company.com", + "TlsBootstrapCert": "/etc/server.crt", + "TlsBootstrapKey": "/etc/server.key", + "BypassPreflightChecks": true, + "ImportSettingsFrom": "/path/to/settings.json", + "LicenseFileLocation": "/path/to/license.rli" +} +``` + +#### Invoking the online installation script + +Once `/etc/replicated.conf` has been created, you can retrieve and execute the install script as `root`: + +```bash +curl -o install.sh https://install.terraform.io/ptfe/stable +bash ./install.sh \ + no-proxy \ + private-address=1.2.3.4 \ + public-address=5.6.7.8 +``` + +We recommend you always supply the `private-address` and `public-address` flags to the installer. If the virtual machine instance will not have its own separate public IP address (i.e. you are using a load balancer and a private subnet), you should provide the private IP address for both flags. + +The installer will prompt you for these flags if it cannot determine them automatically. If you use `cloud-init` or another non-interactive method to run the installer, you will see this prompt in the log output, but the installer will continue to run. If the installer is unable to determine the IP addresses and you do not provide them, the installation will appear to be successful, but Terraform Enterprise will have degraded functionality. For example, you may see `Internal error: SIW-001` when importing modules to the private registry or notice that the Archivist and Vault containers are unhealthy when you run the `tfe-admin health-check` command. + +### Airgapped + +The following is an example `/etc/replicated.conf` suitable for an automated airgapped install, which builds on the online example above. Note the addition of `LicenseBootstrapAirgapPackagePath`, which is a path to the `.airgap` bundle on the instance. + +```json +{ + "DaemonAuthenticationType": "password", + "DaemonAuthenticationPassword": "your-password-here", + "TlsBootstrapType": "server-path", + "TlsBootstrapHostname": "server.company.com", + "TlsBootstrapCert": "/etc/server.crt", + "TlsBootstrapKey": "/etc/server.key", + "BypassPreflightChecks": true, + "ImportSettingsFrom": "/path/to/settings.json", + "LicenseFileLocation": "/path/to/license.rli", + "LicenseBootstrapAirgapPackagePath": "/path/to/bundle.airgap" +} +``` + +#### Invoking the airgap installation script + +Following on from the [manual airgapped install](/terraform/enterprise/deploy/replicated/install/interactive/installer#run-the-installer-airgapped) steps, you must also have the installer bootstrapper already on the instance. For illustrative purposes, it is assumed the installer bootstrapper has been unarchived in `/tmp`. + +Once `/etc/replicated.conf` has been created, you can now execute the install script as `root`: + +```bash +cd /tmp +./install.sh \ + airgap \ + no-proxy \ + private-address=1.2.3.4 \ + public-address=5.6.7.8 +``` + +-> **Note**: The `./install.sh` script must be executed from the directory in which it is placed. + +## Waiting for Terraform Enterprise to become ready + +Once the installer finishes, you may poll the `/_health_check` endpoint until a `200` is returned by the application, indicating that it is fully started: + +```bash +while ! curl -ksfS --connect-timeout 5 https://tfe.example.com/_health_check; do + sleep 5 +done +``` + +## If the installation does not appear to be configured correctly + +If the installation script (`install.sh`) exits successfully, but the Replicated web UI prompts for additional configuration rather than skipping that step, it's likely that the supplied configuration files were not applied during installation. + +- Verify the locations and permissions of the files. The Replicated configuration file should be placed in `/etc/replicated.conf`, and the application settings file should be placed in the path specified in the Replicated configuration file. The permissions of both files should be `600` if owned by the `replicated` user, or `644`. +- Run a JSON validator on the files to check their validity. + +After resolving any issues with file validity or permissions, run the following commands to reload your configuration: + +~> **Important:** These commands are only for fixing a new installation. Do not run these commands on an existing installation, as they will destroy important data. + +```bash +sudo systemctl stop replicated replicated-ui replicated-operator +sudo rm -rf /var/lib/replicated +sudo systemctl start replicated replicated-ui replicated-operator +``` + +## References + +- [Replicated installer flags](https://help.replicated.com/docs/native/customer-installations/installing-via-script/#flags) +- [`/etc/replicated.conf`](https://help.replicated.com/docs/native/customer-installations/automating/#configure-replicated-automatically) +- [application settings](https://help.replicated.com/docs/native/customer-installations/automating/#configure-replicated-automatically) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/encryption-password.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/encryption-password.mdx new file mode 100644 index 000000000..d8d477ec2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/automated/encryption-password.mdx @@ -0,0 +1,51 @@ +--- +page_title: Encryption Password - Install and Config - Terraform Enterprise +description: >- + The Terraform Enterprise encryption password protects the internally-managed Vault unseal key and root token. Learn how to specify and retrieve the encryption password. +--- + +# Terraform Enterprise Encryption Password + +When using internally-managed Vault, Terraform Enterprise requires that the operator specify a password that will be +used to to encrypt and decrypt the internally-managed Vault unseal key and root token. This password is called the +"encryption password". Please be sure to retain this value as it will be needed in the event of a re-installation. + +The encryption password is used to protect the internally-managed Vault unseal key and root token with a password +provided by the operator. It allows Terraform Enterprise to securely store the Vault unseal key and root token in +PostgreSQL, which means that Vault is only dependent on the encryption password itself and the data in PostgreSQL. + +## Specifying the Encryption Password + +### Manual Installation + +For manual installations, the encryption password can be specified via the "Encryption Password" field: + +![User interface for encryption password field.](/img/docs/enc-password-manual-install.png) + +### Automated Installation + +For automated installations, the encryption password can be specified via the `enc_password` setting in the +[application settings JSON file](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#available-settings): + +```json +{ + "hostname": { + "value": "terraform.example.com" + }, + "installation_type": { + "value": "poc" + }, + "enc_password": { + "value": "CHANGEME" + } +} +``` + +## Retrieving the Encryption Password + +To retrieve the encryption password that Terraform Enterprise is currently configured to use, connect to your Terraform +Enterprise instance and execute the following: + +``` +replicatedctl app-config export --template '{{.enc_password.Value}}' +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/interactive/config.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/interactive/config.mdx new file mode 100644 index 000000000..0d321ca81 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/interactive/config.mdx @@ -0,0 +1,54 @@ +--- +page_title: Configuration - Install and Config - Terraform Enterprise +description: >- + Use a web browser to configure Terraform Enterprise after installation. Learn how to create an administrator with the UI or HTTP API, and create your first organization. +--- + +# Terraform Enterprise Configuration + +After you have completed the installation process you will need to create an +admin user. When the admin user creation has been completed you will +be able to create your first organizations and users and enable the enterprise +features for those accounts. + +~> **Note:** If you are performing an upgrade or restore for an existing +installation you _do not_ need to follow these steps. If your upgraded or +restored installation does not function without the steps below then it was not +correctly restored from backup. Please contact HashiCorp for help. + +## System Configuration + +In all examples below, be sure to replace "``" with the hostname +of your Terraform Enterprise instance. + +Navigate to `https://:8800/` in your browser. You will +be presented with the installer dashboard. + +### Creating an Administrator (UI) + +After clicking on the "Open", right below the "Stop Now" button, you will +be brought to a page asking you to create the first Terraform Enterprise administrator account. +You will be able to create additional administrators once you log in. + +### Creating an Administrator (API) + +The initial Admin user can be created via a special API. Customers can use this +method to more easily perform automated installations of Terraform Enterprise. + +The API and usage documents are under [Automating Initial User](/terraform/enterprise/deploy/replicated/install/automated/automating-initial-user). + +### Creating an organization + +The next step will create the first organization. + +After this is done, you can either continue with the creation of a new workspace, +choose to configure other aspects of Terraform Enterprise, or add more users. + +## Success! + +You have successfully configured the installation and configuration steps that +are specific to Terraform Enterprise! You can now configure SMTP +(`https:///app/admin/smtp/`), Twilio (`https:///app/admin/twillio`), +SAML (`https:///app/admin/saml`), or follow the +[Get Started - HCP Terraform](/terraform/tutorials/cloud-get-started?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) +tutorials to start using the software. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/interactive/installer.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/interactive/installer.mdx new file mode 100644 index 000000000..f0714d510 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/interactive/installer.mdx @@ -0,0 +1,372 @@ +--- +page_title: Interactive Installation - Install and Config - Terraform Enterprise +description: >- + Use the Terraform Enterprise installer on a customer-controlled machine. Learn about proxy usage, TLS configuration, using a custom container image, operational mode, installation, and configuration. +--- + +# Interactive Terraform Enterprise Installation + +## Delivery + +This document outlines the procedure for using the Terraform Enterprise +installer to set up Terraform Enterprise on a customer-controlled machine. + +-> **Important:** Before you begin, consult the [Pre-Install Checklist](/terraform/enterprise/deploy/replicated/install/pre-install-checklist) for prerequisites. You'll need to prepare data files and a Linux instance. + +## Proxy Usage + +If your installation requires using a proxy server, you will be asked for the proxy server information when you first +run the installer via `ssh`. This proxy server will be used for all outbound HTTP and HTTPS connections. + +Optionally, if you're running the installer script in an automated manner, you can pass a `http-proxy` flag to set +the address of the proxy. For example: + +``` +./install.sh http-proxy=http://internal.mycompany.com:8080 +``` + +### Proxy Exclusions (NO_PROXY) + +If certain hostnames should not use the proxy and the instance should connect directly to them (for instance, for S3), then you can pass an additional option to provide a list of domains: + +``` +./install.sh additional-no-proxy=s3.amazonaws.com,internal-vcs.mycompany.com,example.com +``` + +Passing this option to the installation script is particularly useful if the hostnames that should not use the proxy include services that the instance needs to be able to reach during installation, such as S3. Alternately, if the only hosts you need to add are those that are not used during installation, such as a private VCS instance, you can provide these hosts after initial installation is complete, in the settings tab in your dashboard (available on port 8800 under `/console/settings`). + +### Reconfiguring the Proxy + +To change the proxy settings after installation, use the Console settings page, accessed from the dashboard on port 8800 under `/console/settings`. + +![Terraform Enterprise Console Settings](/img/docs/tfe-console-settings.png) + +On the Console Settings page, there is a section for HTTP Proxy: + +![Terraform Enterprise HTTP Proxy Settings](/img/docs/tfe-http-proxy.png) + +This change updates the proxy settings for the Terraform Enterprise application services. To update the proxy settings for the installer (for example, to handle configuration tests correctly), additional steps are necessary: + +1. Locate the Replicated configuration files on the instance under either `/etc/sysconfig/` or `/etc/default`: `replicated` and `replicated-operator`. +1. Open the files for editing. On the line that includes `REPLICATED_OPTS` for `replicated` or `REPLICATED_OPERATOR_OPTS` for `replicated-operator`, add `-e HTTP_PROXY= -e NO_PROXY=` to the existing command options. The list of `no_proxy` hosts is a comma-separated list with no spaces, and should include following addresses `127.0.0.1,,,` but not limited to. +1. Docker also needs to be able to communicate to endpoints with the same rules of proxy settings as `replicated` and `replicated-operator`, the steps 1-6 of this [document](https://docs.docker.com/config/daemon/systemd/#httphttps-proxy) are required. + `NOTE: Please take precautions on application outage when applying configuration change, i.e. wait for all runs to finish, prevent new runs to trigger` +1. Restart the Replicated services following [the instructions for your distribution](https://help.replicated.com/docs/native/customer-installations/installing-via-script/#restarting-replicated). + +### Proxy and Service Discovery Process + +Unless the execution mode of a workspace is set to "local", Terraform Enterprise performs [remote operations](/terraform/enterprise/run/remote-operations), running Terraform in its own worker VMs. + +When running within Terraform Enterprise's worker VMs, Terraform uses [service discovery](/terraform/internals/remote-service-discovery) to find the Terraform Enterprise service itself. Depending on your infrastructure setup, you may need to tell Terraform Enterprise not to access its own hostname via the proxy, so that Terraform can communicate with the Terraform Enterprise services. + +To do this, add Terraform Enterprise's fully qualified hostname to the **Proxy Bypass** setting in Terraform Enterprise's dashboard. The proxy bypass setting can be found on port **8800** on the path `/settings`. + +![Terraform Enterprise Proxy Bypass](/img/docs/tfe-proxy-bypass.png) + +Save the configuration using the **Save** button at the bottom of the page. Once configuration has been saved, please proceed to restart the application. + +You can use the equivalent setting, [extra_no_proxy](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#available-settings), to automate this step. + +The Terraform CLI performs a TLS handshake with Terraform Enterprise during service discovery, and will need access to the Certificate Authority that Terraform Enterprise uses. + +Either add the CA to the [CA Custom Bundle](#certificate-authority-ca-bundle) configuration so that Terraform Enterprise will make the CA available in the worker container, or, if a [custom worker image](#custom-agent-image) is configured, add the CA directly to its certificate file (located at `/etc/ssl/certs/ca-certificates.crt`). + +## TLS Configuration + +There are two sections for TLS configuration; the "TLS Key & Cert" section and the "SSL/TLS Configuration" section. + +### TLS Key & Cert + +The "TLS Key & Cert" section is where the TLS certificate and private key can be configured to allow HTTPS connections to Terraform Enterprise. The TLS certificate and private key files can be self-signed, located in a path on the server, or uploaded. Both the TLS certificate and private key files must be PEM-encoded. The TLS certificate file can contain a full chain of TLS certificates if necessary. + +For convenience, a brand new Terraform Enterprise installation may prompt for these settings after the initial setup. You can provide a key and certificate immediately, or use a self-signed certificate to begin with and change the settings later. + +![Installer TLS Key and Cert](/img/docs/tls-installer.png) + +For an existing installation, these settings can be found in the Replicated console on port 8800. Click on the gear icon in the top right corner, click "Console Settings", and scroll to the "TLS Key & Cert" section. + +The key and certificate settings can be one of three values, each of which are detailed below. + +#### Self-signed (generated) + +When the "Self-signed (generated)" radio button is selected, a self-signed TLS certificate and private key will be automatically generated. An example screenshot is below: + +![Self-signed TLS Key and Cert](/img/docs/tls-self-signed.png) + +#### Server path + +When the "Server path" radio button is selected, the TLS certificate and private key will be read from the specified file paths on the server. An example screenshot is below: + +![Server Path TLS Key and Cert](/img/docs/tls-server-path.png) + +#### Upload files + +When the "Upload file" radio button is selected, the TLS certificate and private key must be uploaded. An example screenshot is below: + +![Upload File TLS Key and Cert](/img/docs/tls-upload.png) + +~> **Note:** Changes to the key and certificate settings require a restart of the Terraform Enterprise application. + +### Certificate Authority (CA) Bundle + +Terraform Enterprise needs to be able to access all services that it integrates with, such as VCS providers or database servers. +Because it typically accesses them via SSL/TLS, it is critical that the certificates used by any service +that Terraform Enterprise integrates with are trusted by Terraform Enterprise. + +This section is used to allow Terraform Enterprise to connect to services that use SSL/TLS certificates issued by private CAs. +It allows multiple certificates to be specified as trusted, and should contain all certificates that Terraform Enterprise +should trust when presented with them from itself or another application. + +A collection of certificates for trusted issuers is known as a `Certificate Authority (CA) Bundle`. +All certificates in the certificate signing chain, meaning the root certificate and any intermediate certificates, +must be included here. These multiple certificates are listed one after another in text format. + +~> **Note:** If Terraform Enterprise is configured with a SSL key and certificate issued against a private CA, +the certificate chain for that CA must be included here as well. This allows the instance +to query itself. + +Certificates must be formatted using PEM encoding, that is, as text. For example: + +``` +-----BEGIN CERTIFICATE----- +MIIFtTCCA52gAwIBAgIIYY3HhjsBggUwDQYJKoZIhvcNAQEFBQAwRDEWMBQGA1UE +AwwNQUNFRElDT00gUm9vdDEMMAoGA1UECwwDUEtJMQ8wDQYDVQQKDAZFRElDT00x +CzAJBgNVBAYTAkVTMB4XDTA4MDQxODE2MjQyMloXDTI4MDQxMzE2MjQyMlowRDEW +MBQGA1UEAwwNQUNFRElDT00gUm9vdDEMMAoGA1UECwwDUEtJMQ8wDQYDVQQKDAZF +.... +-----END CERTIFICATE----- +-----BEGIN CERTIFICATE----- +MIIB5zCCAY6gAwIBAgIUNJADaMM+URJrPMdoIeeAs9/CEt4wCgYIKoZIzj0EAwIw +UjELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAkNBMRYwFAYDVQQHEw1TYW4gRnJhbmNp +c2NvMR4wHAYDVQQDExVoYXNoaWNvcnAuZW5naW5lZXJpbmcwHhcNMTgwMjI4MDYx +.... +-----END CERTIFICATE----- +``` + +The user interface to upload these certificates looks like this: + +![Terraform Enterprise Certificate Authority User Interface](/img/docs/tls-ca.png) + +#### TLS Versions + +As of version 201902-01, TLS versions 1.0 and 1.1 are no longer supported in Terraform Enterprise. Your options now include TLS v1.2 and TLS v1.3: + +![Terraform Enterprise TLS Versions User Interface](/img/docs/tls-versions.png) + +#### TLS Ciphersuites + +Terraform Enterprise uses the `HIGH:!aNULL:!MD5` ciphersuites by default. You can also provide a custom ciphersuite if necessary. + +![Terraform Enterprise TLS Ciphersuite User Interface](/img/docs/tls-ciphers.png) + +(This value must be defined in the OpenSSL [cipher list format](https://www.openssl.org/docs/man1.1.1/man1/ciphers.html) + +#### Force TLS with HSTS + +Terraform Enterprise may be configured to force TLS via the enabling of HTTP Strict Transport Security: + +![Terraform Enterprise TLS HSTS User Interface](/img/docs/tls-hsts.png) + +## Custom Image + +@include "replicated-and-fdo/requirements/custom-image.mdx" + +### Legacy + +Build your custom image using either the Ubuntu or Red Hat `Dockerfile` below. +Then update the `custom_image_tag` setting with your image (e.g. +`registry.example.com/example/terraform-enterprise-worker:custom-tag`). + +![The `custom_image_tag` setting in the user interface.](/img/docs/tfe_console-custom_image_tag.png) + +#### Requirements + +- The base image must be `ubuntu:bionic` or an [offical Red Hat Enterprise Linux 7 image](https://catalog.redhat.com/software/containers/search?p=1&rows=60&vendor_name=Red%20Hat&build_categories_list=Scratch%20image&product_listings_names=Red%20Hat%20Universal%20Base%20Image%207) + (e.g. `registry.access.redhat.com/ubi7/ubi-minimal:latest`). +- The image must exist on the Terraform Enterprise host. You can add it by + running `docker pull` from a local registry or any other similar method. +- The software packages defined in the examples below must be installed on the + image. +- All necessary CA certificates must be added to the container's CA bundle. The + CA certificates configured in the [CA Bundle settings](#certificate-authority-ca-bundle) + will not be automatically added to this image at runtime. See the examples + below for more details. +- Terraform must not be installed on the image. Terraform Enterprise installs + Terraform at runtime. + +#### Ubuntu + +```Dockerfile +FROM ubuntu:bionic + +# Install required software for Terraform Enterprise. +RUN DEBIAN_FRONTEND=noninteractive && \ + apt-get update && \ + apt-get install -y --no-install-recommends awscli ca-certificates curl daemontools git-core iproute2 netcat-openbsd openssh-client psmisc redis-tools ssh sudo unzip wget + +# Include all necessary CA certificates. +ADD example-root-ca.crt /usr/local/share/ca-certificates/ +ADD example-intermediate-ca.crt /usr/local/share/ca-certificates/ +RUN update-ca-certificates +``` + +#### Red Hat Enterprise Linux 7 + +In addition to the packages that yum installs, curl installs the envdir tool +Python port because it is a dependency of the Terraform Build Worker service. +If the envdir tool is not installed on the alternative worker image, Terraform +runs will fail within Terraform Enterprise. + +```docker +FROM registry.access.redhat.com/ubi7/ubi-minimal:latest + +# Update installed packages and clear cache. +RUN microdnf --assumeyes update && \ + rm --recursive --force /var/cache/yum + +# Install required software for Terraform Enterprise. +RUN microdnf --assumeyes install curl git iproute nmap-ncat openssh openssl psmisc sudo unzip wget && \ + microdnf clean all && \ + curl --location --output /usr/local/bin/envdir https://github.com/jezdez/envdir/releases/download/0.7/envdir-0.7.pyz && \ + chmod +x /usr/local/bin/envdir + +# Include all necessary CA certificates. +ADD example-root-ca.crt /usr/share/pki/ca-trust-source/anchors +ADD example-intermediate-ca.crt /usr/share/pki/ca-trust-source/anchors +RUN update-ca-trust +``` + +#### Executing Custom Scripts + +The custom image supports executing custom scripts during different points of a +run. + +-> **Note:** Custom scripts are for the `legacy` run pipeline mode only. As of Terraform Enterprise v202302-1, the default run pipeline mode is `agent`. If you wish to use a custom image for the `legacy` run pipeline mode, you must [build a legacy custom image](#legacy). See the [release notes](/terraform/enterprise/releases/2023/v202302-1) and the [worker to agent migration guide](/terraform/enterprise/deploy/replicated/administration/infrastructure/worker-to-agent-migration) for more information about the run pipeline mode change. Support for the `legacy` run pipeline mode and legacy custom images will end in v202305-1. + +##### Initialize Script + +To execute an initialize script, ensure your worker image contains an executable shell script at +`/usr/local/bin/init_custom_worker.sh`. This script, and all commands it invokes, will be executed before a Terraform +Enterprise run executes `terraform init`. This initialize script will be executed during both plans and applies. + +Example `Dockerfile` snippet for adding an initialize script: + +``` +ADD init_custom_worker.sh /usr/local/bin/init_custom_worker.sh +``` + +##### Finalize Script + +To execute a finalize script, ensure your worker image contains an executable shell script at +`/usr/local/bin/finalize_custom_worker.sh`. This script, and all commands it invokes, will be executed after a Terraform +Enterprise run finishes executing `terraform plan` or `terraform apply`. This finalize script will be executed during +both plans and applies. + +Example `Dockerfile` snippet for adding a finalize script: + +``` +ADD finalize_custom_worker.sh /usr/local/bin/finalize_custom_worker.sh +``` + +## Operational Mode Decision + +Terraform Enterprise can store its state in a few different ways, and you'll +need to decide which works best for your installation. Each option has a +different approach to +[recovering from failures](/terraform/enterprise/deploy/replicated/administration/infrastructure/automated-recovery). +The mode should be selected based on your organization's needs. See +[Pre-Install Checklist: Operational Mode Decision](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#operational-mode-decision) +for more details. + +## Installation + +The installer can run in two modes, Online or Airgapped. Each of these modes has a different way of executing the installer, but the result is the same. + +~> **Note:** After running the installation script, the remainder of the installation is done through a browser using the installer dashboard on port 8800 of the Terraform Enterprise instance. To complete the installation, you must be able to connect to that port via HTTPS. The installer uses an internal CA to issue bootstrap certificates, so you will see a security warning when first connecting, and you'll need to proceed with the connection anyway. + +### Run the Installer - Online + +If your instance can access the Internet, use the Online install mode. + +1. From a shell on your instance: + - To execute the installer directly, run `curl https://install.terraform.io/ptfe/stable | sudo bash`. + - To inspect the script locally before running, run `curl https://install.terraform.io/ptfe/stable > install.sh` and, once you are satisfied with the script's content, execute it with `sudo bash install.sh`. + - RedHat Enterprise Linux requires Docker to be pre-installed. As such, execute the installer script using `sudo bash install.sh no-docker` to prevent the installer script from automatically installing Docker. +1. The installation will take a few minutes and you'll be presented with a message + about how and where to access the rest of the setup via the web. This will be + `https://:8800`. + - You will see a security warning when first connecting. This is expected and you'll need + to proceed with the connection anyway. + +### Run the Installer - Airgapped + +If the instance cannot reach the Internet, follow these steps to begin an Airgapped installation. + +#### Prepare the Instance + +1. Airgap installations require Docker to be pre-installed. Double-check that your instance has a supported version of Docker (see [Pre-Install Checklist: Software Requirements](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#software-requirements) for details). +1. Download the `.airgap` file using the information given to you in your setup email and place that file somewhere on the the instance. + - If you use are using `wget` to download the file, be sure to use `wget --content-disposition ""` so the downloaded file gets the correct extension. + - The url generated for the .airgap file is only valid for a short time, so you may wish to download the file and upload it to your own artifacts repository. +1. [Download the installer bootstrapper](https://install.terraform.io/airgap/latest.tar.gz) and put it into its own directory on the instance (e.g. `/opt/tfe-installer/`) + - The downloaded file may be named `replicated.tar.gz` or `latest.tar.gz`. We'll refer to it as `replicated.tar.gz` for the rest of this page. + +#### Execute the Installer + +From a shell on your instance, in the directory where you placed the `replicated.tar.gz` installer bootstrapper: + +1. Run `tar xzf replicated.tar.gz` +1. Run `sudo ./install.sh airgap` +1. When asked, select the interface of the primary private network interface used to access the instance. +1. The software will take a few minutes and you'll be presented with a message about how and where to access the rest of the setup via the web. This will be `https://:8800`. + - You will see a security warning when first connecting. This is expected and you'll need + to proceed with the connection anyway. + +### Continue Installation In Browser + +1. Configure the hostname and the SSL certificate. +1. Upload the license file provided to you in your setup email. +1. Indicate whether you're doing an Online or Airgapped installation. Choose Online if + you're not sure. + - If you are doing an Airgapped install, provide the path on the the instance + to the `.airgap` file that you downloaded using the initial instructions in + your setup email. +1. Secure access to the installer dashboard. We recommend at least setting up the + simple password authentication. If you're so inclined, LDAP authentication can also be + configured. +1. The system will now perform a set of pre-flight checks on the instance and + the configuration up to this point and indicate any failures. You can either fix the issues + and re-run the checks, or ignore the warnings and proceed. If the system is running behind a proxy and is unable to connect to `releases.hashicorp.com:443`, it is likely safe to proceed; this check does not currently use the proxy. For any other issues, if you proceed despite the warnings, you are assuming the support responsibility. +1. Set an encryption password used to encrypt the sensitive information at rest. The default value is auto-generated, + but we strongly suggest you create your own password. Be sure to retain the value, because you will need to use this + password to restore access to the data in the event of a reinstall. See [Encryption Password](/terraform/enterprise/deploy/replicated/install/automated/encryption-password) for more information. +1. Configure the operational mode for this installation. See + [Pre-Install Checklist: Operational Modes](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#operational-mode-decision) for information on what the different values are. Ensure that you've met the relevant pre-install requirements for the mode you chose. +1. _Optional:_ Adjust the concurrent capacity of the instance. This should + only be used if the hardware provides more resources than the baseline + configuration and you wish to increase the work that the instance does + concurrently. This setting should be adjusted with care as setting it too + high can result in an very unresponsive instance. +1. _Optional:_ Provide the text version of a certificate (or certificates) that will be added to the trusted + list for the product. This is used when services the product communicates with do not use + globally trusted certificates but rather a private Certificate Authority (CA). This is typically + used when Terraform Enterprise uses a private certificate (it must trust itself) or a + VCS provider uses a private CA. +1. _Optional:_ Adjust the path used to store the vault files that are used to encrypt + sensitive data. This is a path on the host system, which allows you + to store these files outside of the product to enhance security. Additionally, + you can configure the system not to store the vault files within any snapshots, + giving you full custody of these files. These files will need to be provided before + any snapshot restore process is performed, and should be placed into the path configured. +1. _Optional:_ Configure the product to use an externally managed Vault cluster. + See [Externally Managed Vault Cluster](/terraform/enterprise/deploy/replicated/install/vault) for details about the required Vault configuration before using this option. + +### Finish Bootstrapping + +Once configured, the software will finish downloading. When it’s ready, the UI +will indicate so and there will be an Open link to click to access the Terraform Enterprise UI. + +## Configuration + +After completing a new install you should head to the [configuration +page](/terraform/enterprise/deploy/replicated/install/interactive/config) to continue setting up Terraform Enterprise. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/operation-modes.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/operation-modes.mdx new file mode 100644 index 000000000..604c95d0d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/operation-modes.mdx @@ -0,0 +1,106 @@ +--- +page_title: Operational Modes - Terraform Enterprise +description: Learn about the different operational modes of Terraform Enterprise. +--- + +# Terraform Enterprise Operational Modes + +You must choose an operational mode before you install and deploy Terraform +Enterprise. Each operational mode changes where Terraform Enterprise stores its +data. + +## Terraform Enterprise Data + +Terraform Enterprise uses the following types of data. + +- **PostgreSQL Database:** - Stateful Terraform Enterprise application data. This includes workspace settings, organization settings, run information, and user information. + +- **Object Storage:** - Artifacts that Terraform Enterprise produces during operation. This includes state files, plan files, run logs, configuration versions, etc. + +- **Vault:** - Encryption keys that encrypt and decrypt objects within object storage. + +- **Redis:** - Application coordination and data caching. + +- **Configuration:** - Configuration settings. This includes the hostname, object storage credentials, database credentials, concurrency settings, etc. + +## Operational Modes + +The following table summarizes where each Terraform Enterprise operational mode +stores each type of application data. + +| Operational Mode | PostgreSQL Database | Object Storage | Vault | Redis | Configuration | +| --------------------------------------- | ------------------------------------------------------------------- | ------------------------------------------------------------------ | -------------------------------------------------------------------------------------------------------- | ------------------------------------- | ----------------------------- | +| [External Services](#external-services) | External, user-managed PostgreSQL database | External, user-managed object storage location | PostgreSQL Database unless using [External Vault](/terraform/enterprise/deploy/replicated/install/vault) | Docker volume on the instance | Docker volume on the instance | +| [Active/Active](#active-active) | External, user-managed PostgreSQL database | External, user-managed object storage location | PostgreSQL Database unless using [External Vault](/terraform/enterprise/deploy/replicated/install/vault) | External, user-managed Redis instance | Docker volume on the instance | +| [Mounted Disk](#mounted-disk) | Directory on the instance backed by user-managed persistent storage | Directory on the instance backed by user-managed persisent storage | PostgreSQL Database unless using [External Vault](/terraform/enterprise/deploy/replicated/install/vault) | Docker volume on the instance | Docker volume on the instance | + +## External Services + +The External Services operational mode stores the PostgreSQL Database and +Object Storage data on an external PostgreSQL server and S3-compatible object +storage. This allows you to backup, restore, and scale the PostgreSQL Database +or Object Storage independently of the Terraform Enterprise instance. + +You are responsible for providing and maintaining the external PostgreSQL +server and S3-compatible object storage. + +External Services stores configuration data on a Docker volume on the instance. +Use `replicatedctl app-config export` to retrieve the configuration data. + +### When to Use External Services + +We recommend using External Services in the following use cases: + +- Your environment has an external PostgreSQL server and S3-compatible object storage. +- You have experience managing a PostgreSQL server such as Amazon RDS for PostgreSQL, Google Cloud SQL for PostgreSQL, Azure Database for PostgreSQL, etc. +- You have experience managing an S3-compatible object storage location such as AWS S3, Azure Blob Storage, Google Cloud Storage, MinIO, etc. +- You want to use native backup and restore features provided by the external PostgreSQL server and S3-compatible object storage. + +## Active/Active + +The Active/Active operational mode stores the PostgreSQL Database and Object +Storage data on an external PostgreSQL server and S3-compatible object storage. +This allows you to backup, restore, and scale the PostgreSQL Database or Object +Storage independently of the Terraform Enterprise instance. Additionally, +Active/Active stores Redis data in an external Redis instance, allowing you +to use multiple instances of Terraform Enterprise in an +[Active/Active](/terraform/enterprise/deploy/replicated/install/automated/active-active) +architecture. + +You are responsible for providing and maintaining the external PostgreSQL +server, S3-compatible object storage, and Redis instance. + +Active/Active stores configuration data on a Docker volume on the instance. Use +`replicatedctl app-config export` to retrieve the configuration data. + +### When to Use Active/Active + +We recommend Active/Active for the following use cases: + +- Your environment has an external PostgreSQL server, S3-compatible object storage, and Redis instance. +- You have experience managing a PostgreSQL server such as Amazon RDS for PostgreSQL, Google Cloud SQL for PostgreSQL, Azure Database for PostgreSQL, etc. +- You have experience managing an S3-compatible object storage location such as AWS S3, Azure Blob Storage, Google Cloud Storage, MinIO, etc. +- You have experience managing a Redis instance such as AWS ElastiCache for Redis, Azure Cache for Redis, Google Cloud Memorystore for Redis, etc. +- You want to use native backup and restore features provided by the external PostgreSQL server and S3-compatible object storage. +- You want to scale beyond a single instance of Terraform Enterprise to increase reliability and performance. + +## Mounted Disk + +The Mounted Disk operational mode stores the PostgreSQL Database and Object +Storage data in a directory on the instance. It is expected that this directory +is backed by persistent storage that you can mount to the instance. This allows +you to backup and restore the PostgreSQL Database or Object Storage data +independently of the Terraform Enterprise instance. + +You are responsible for providing and maintaining the persistent storage. + +Mounted Disk stores configuration data on a Docker volume on the instance. Use +`replicatedctl app-config export` to retrieve the configuration data. + +### When to Use Mounted Disk + +We recommend Mounted Disk for the following use cases: + +- Your environment does not have an external PostgreSQL server or S3-compatible object storage. +- You have experience managing persistent storage such as an AWS EBS volume, an Azure Managed Disk, a Google Cloud Persistent Disk, an iSCSI location, etc. +- You are familiar with using tools like `cp`, `scp`, and `rsync` to backup and restore data. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/pre-install-checklist.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/pre-install-checklist.mdx new file mode 100644 index 000000000..b936c16cf --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/pre-install-checklist.mdx @@ -0,0 +1,43 @@ +--- +page_title: Pre-Install Checklist - Before Installing - Terraform Enterprise +description: >- + Make key architecture decisions and prepare infrastructure and data files for + Terraform Enterprise. +--- + +# Terraform Enterprise Pre-Install Checklist + +Complete all of the following tasks before installing Terraform Enterprise. + +## Choose an Operational Mode + +Choose an [operational mode](/terraform/enterprise/deploy/replicated/install/operation-modes) for Terraform +Enterprise. Each operational mode has a different approach to data +[reliability and availability](/terraform/enterprise/deploy/replicated/architecture/system-overview/reliability-availability). +You must make this decision before you begin installation because some modes +have additional requirements. You cannot change the operational mode once +Terraform Enterprise is running. + +## Obtain Credentials + +You must obtain an Enterprise license and a TLS certificate for Terraform Enterprise to use. If you choose the external services operational mode, Terraform Enterprise requires access to an S3-compliant endpoint for object storage. Refer to [Credentials](/terraform/enterprise/deploy/replicated/requirements/credentials) for details. + +## Prepare Data Storage + +Make sure your data storage services or device meet Terraform Enterprise's requirements. These differ depending on the operational mode you choose for your instance. Refer to the following for your use case: + +- [Operational Mode Data Storage Requirements](/terraform/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements) +- [PostgreSQL Requirements](/terraform/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements) +- [Minio Setup Guide](/terraform/enterprise/deploy/replicated/requirements/data-storage/minio-setup-guide) +- [Externally Managed Vault](/terraform/enterprise/deploy/replicated/install/vault) + +## Configure Linux Instance + +You must prepare a running Linux instance for Terraform Enterprise before running the installer. This might require additional configuration or software installation, depending on the operating system (OS) and your operational requirements. You will start and manage this instance like any other server. + +Configure the following for the Linux Instance: + +- **Operating System:** Refer to [Supported OS](/terraform/enterprise/deploy/replicated/requirements/os-specific/supported-os) for details. +- **Hardware:** Incorrect amounts of disk space or memory can cause significant performance issues. Refer to [Hardware Requirements](/terraform/enterprise/deploy/replicated/requirements/hardware) for details. +- **Network:** Terraform Enterprise is a networked application. Its Linux instance(s) must allow several kinds of incoming and outgoing network traffic. Refer to [Network Requirements](/terraform/enterprise/deploy/replicated/requirements/network) for details. +- **Docker Engine:** Terraform Enterprise requires a Docker engine. Refer to [Docker Requirements](/terraform/enterprise/deploy/replicated/requirements/docker_engine) for configuration details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/uninstall.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/uninstall.mdx new file mode 100644 index 000000000..8df99b549 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/uninstall.mdx @@ -0,0 +1,248 @@ +--- +page_title: Uninstall - Terraform Enterprise +description: >- + Learn to run a script that removes Terraform Enterprise and all of its + services (excluding Docker) from a system. +--- + +# Uninstall Terraform Enterprise + +If you installed Terraform Enterprise on VMware instances, you may not be able to easily request new virtual machines for a broken or corrupted installation. Instead, you can use the `uninstall` script to remove Terraform Enterprise and all of its services (excluding Docker) from a system. This includes the default Replicated snapshot directory - `/var/lib/replicated/snapshots`. If you have Replicated snapshots you wish to keep, please back up this directory before running the uninstall script. + +~> **Important**: This script does not touch the mounted disk path, so you will need to manually clean that up if necessary. + +Please contact [support][support] with questions or issues. + +## While the Script Runs + +After you initiate `uninstall`: + +1. Enter `yes` when asked if you want to continue with the installation. + + ``` + $ sudo ./uninstall.sh + This script will completely uninstall Terraform Enterprise and Replicated on this system, as well as remove associated files. + Do you wish to continue? (y/n)yes + Proceeding with uninstall... + ``` + + If there are snapshots present on the system, choose whether to move them to another directory, delete them, or cancel the uninstall. Here is an example of moving snapshots to another directory: + + ``` + There appear to be Replicated snapshots stored in /var/lib/replicated/snapshots. + 1) Move the snapshots to another directory + 2) Continue uninstall and delete the snapshots + 3) Cancel the uninstall + Select an option: 1 + Enter the directory to move the snapshots to: /tmp + The snapshots will be moved to /tmp. + Press Y to continue or N to cancel. y + Moving snapshots... + Files moved. + ``` + + The script continues and stops the Replicated services, removes the Docker containers, and removes Replicated executables and configuration files from the system. + + ``` + Stopping and disabling the replicated services... + Removed /etc/systemd/system/docker.service.wants/replicated-operator.service. + Removed /etc/systemd/system/docker.service.wants/replicated.service. + Removed /etc/systemd/system/docker.service.wants/replicated-ui.service. + Replicated services stopped and disabled. + Stopping any running application containers + a8dd38ebcc67 + 11a3c7d476a3 + 45f786c7c632 + 31664ff29012 + c0122c1dce13 + 8c6b98b6d498 + d3856e83038d + b5e160999e2b + a7f69f5507de + 45a07127fa15 + 7a364889673d + d5f6218e1d3c + 3f10e192a503 + 818bb2464291 + 1bd96c43b48d + 8388555131dd + 0a0cb265a2bf + rabbitmq + telegraf + influxdb + anchor_isolation_network + Removing Replicated Docker containers... + replicated + replicated-ui + replicated-operator + replicated-premkit + replicated-statsd + retraced-api + retraced-processor + retraced-cron + retraced-nsqd + retraced-postgres + Removing Replicated files and executables... + Run systemctl daemon-reload... + Terraform Enterprise and Replicated should now be uninstalled. + ``` + +1. Choose an option to prune Docker volumes: + +- Select `Prune all Docker volumes` if you only use this system for Terraform Enterprise. +- Select `Prune only application Docker volumes` to prune only Replicated and Hashicorp Docker volumes and leave the rest intact. +- Select `Skip this step` to leave all Docker volumes intact. + + ``` + I can now clean up the Docker images for you. + 1) Prune all Docker volumes + 2) Prune only application Docker volumes + 3) Skip this step + Select an option: 1 + Prunning all Docker volumes... + WARNING! This will remove: + - all stopped containers + - all networks not used by at least one container + - all volumes not used by at least one container + - all images without at least one container associated to them + - all build cache + + Are you sure you want to continue? [y/N] y + Deleted Containers: + a8dd38ebcc67ab878ba60fa740df494ff91922aba04f205d675b6a7e4c6d451e + 11a3c7d476a3e1515c97d882c4cc7db8df64b9b7b491575197e57decb45b525c + 45f786c7c632aac83e4ebf5e939a20651fb8026e1123977eee8a842f1bbcbed1 + 31664ff29012ee7192abb82e8dcbce4ee564e92a24e6de8a03e948a5ca2eb8c5 + 848813ade8b911d356945e309194deed2ba73f165b36ed252a01b2206366ef1c + 1e040b17eb8aca1275dff36dc7175edcb32ab684a697380e9862c436fae8d9f1 + c0122c1dce13b85177987c53c41cbbaf9cf39442601a5360a066e527c022275a + 8c6b98b6d498114a2e71e979dd3c6ef01006b4b80d94a5f39a1b850c6aaae8f0 + 5f2760b94e171fd86c643096f0df6603477899abf4fdde690e40dc35d1bdfd8b + d3856e83038dad46cfbdfe8e39ad57a5896d29b2feab6d4ac1089b18e51e2c9c + 83e2a6ffe045b97cdcec150f3e283e53b19bd90380359fa3db85ba6706a3ca46 + b5e160999e2b7c9d82cbb1217463a844c0a9c54af6c0f4129640e780d712bee8 + c638514eecccff260aabd7d634fd49c34d3938d679d485beb463eb0c58821ca8 + a7f69f5507de8e1501ee9324fc2a82f4e12d2784143ced4500d4036f8f807317 + 45a07127fa15d75161b1764dba060bae6b1115fd567cf9966a59c200d912ad23 + 7a364889673df8a645776b36d538c1429559673d3cc808e68f408939faa6cb35 + 01b60968a765c70c9a72b901ac8e6389805e65c6e158eee9ac588f347b6aaa33 + d5f6218e1d3c016a95740affdd591c64d34dfb8bb2717c18ce4b667fafc272ff + 3f10e192a5038fabc94fda54cad3877ff88865d34f460fe0d02500eca965ea9a + 818bb2464291c5e0b7c6d65c0d10790a57ad95e040d770b1a5df2e7efe093242 + a3ddfd00b603a5dd71f382f9312965de222544fc5938b3f968df36b4c7cab8e3 + 715e6c1fe62eada1da160d0011bc2c26e336a233be5543dabad2dd67cd99994c + d851bcb83703d95553b1a276532861d7e6b790166609102b5134b6befdb9c905 + 16da96c20b2f43d849703524effddf6100a54a6aed3bee9878ca4e3b2b47f742 + c10e0d567406699e3c3bb97225f4ebe94541e8a4a1edf77592b68e06ee778a4b + 1bd96c43b48d2634b251ead68575a7bfba255f52a9909d2f0c00a5f5dd6cd14e + 8388555131dd1ec8f9d9d218295d35ff287f9038430848ee2d721fd92c896b83 + 473ec860bc666b3265e4c50415bca607011f857024b8469f5aeffe0a251935e8 + 0a0cb265a2bfa773086d2a98a3a6412c1d54eaacad6706f319315485c9825996 + dbf1b59e8b8451c0ece04fb57fc42aef4b6accb53fbcbe5850ed873a806f64a9 + 73bccf22ef84311ccf6dc2fa608191c8321fd77b4444c0406933c0eca7886bc9 + ``` + +The script removes dangling Docker volumes and the Docker networks that were created for the application. You may see errors such as the ones below, these are normal and just mean the script is attempting to clean up something that's already been removed. + +```` +``` +Deleted Networks: +tfe_terraform_isolation +replicated_retraced +tfe_services + +Deleted Volumes: +rabbitmq +d8e5aa7b8454be6b2a1e3e230170eccd6b4e46e1a79af86bb2bcbfbc09665a04 +17e584502a4b54a28ef5a54bdf884f0e8f4912071e52db2786379197f12d2c45 +cf8a92056862b7e6322658c900162d5fdf6d4528b4a247139a7dcf33b7d689aa +70ff9f127bfab073cf6d855bde073f2f97d715ab5af6fa28908d54ba31204608 +88189c95b0bdc5dc97e027dafd9ac077838d6ddbf295273c1c44c44478f1c815 +influxdb +config +66e70bcfc0cf10f28c2d4e0dbe445d37d7953b4a20e010f3b23790901f49f95a +a063cc63466436ef9992c03936c0c26d0cfa150d3f3ffaa7156cec62b788903c +10f6c1f088586fbb903cb5f368fd3f14eed47803d91df9c75d1d976f00b17af9 +471f949aff03bd40f9bcf61d4da0e0fd1c2aab7f49e0673fa2a469442eb3c78c +6b973f2ec922cfe902a0fb8d2fc6dead476c0f55f1ab9b73833665a2330ad947 +a5abdb8ab07d354cd1cc2a0368681718da632527e0efd79593e3805ac517261c +f3777b2b116e9734fa8e10514caeb1f51f4a1770896094fbb74904346fa5f18b +redis +e9c8c5566302e65db0d39c1c7c8ca5d886599f535eec5c655b9e99eac73042e8 +5a41d77a1085b1fccd450804484f989e9bc5c21351666e7dcfe4d20a56c4fd4b +090ed8544eb926967c55d5343bc291d14a95534fb6ed3d7c2cd510af83c11786 +79e2e42e6a316129c0c9ff0314c774652b1c8d70029385ec55583cd6efbae8a8 +nomad-workers +b0c7e5919e3185bf09a15fd8e466db614a82aaf6987f38ac656a396561499f30 +cc70bd77c11fedf6d0b656eb474e83893fd9a0d0db6e421686adf2defb4eade1 +aux +c749451acfc48aa4b355248d90aaf667c7ab2bc1818fadfbd9fd91b7c9710b34 +09a6d3e6ac704ac1e151ae925f0bb25ce24f5a330b9d2ffd69f2a9fa0db1abc9 + +Deleted Images: +untagged: hashicorp/build-worker:now +deleted: sha256:378b3ecd0a947d834964ab4f690189923c884417d6c9a6fa58989b99330c570f +deleted: sha256:c7155461ae7897540d42450b157c5584a3ca53a92c0fca151c1b163fd6458176 +deleted: sha256:82c7cbdecbe94986e0a3880702679a42badfc925eb81a5f0e1d23be4a1c4375d +untagged: 10.1.0.20:9874/hashicorp-ptfe-rabbitmq:9e22de8 +untagged: registry.replicated.com/terraformenterprise/uagwz2oacr7rk.hashicorp-ptfe-rabbitmq:9e22de8 +untagged: registry.replicated.com/terraformenterprise/uagwz2oacr7rk.hashicorp-ptfe-rabbitmq@sha256:b70a3d010ff77616b1036d96942aa016973ef58c60faf3030c94ceb84cd2867b +deleted: sha256:11de65e463132236bd73df48a8ffa490ff2b525a6fadf8f89e876b7a50c59efc +deleted: sha256:e50dc68f15e464a836e20ff11ce3d436c0950ffdf81669987a91b5f67a600222 +deleted: sha256:931118288655ef2e98fa288528cfe5bc325a092d9a729e0ed663ac95cb4c3643 +deleted: sha256:b41fbc32924dfe39aa506aacc31029ac0cae428e0afc48ce710abadf6c3c248b +deleted: sha256:d2fafd954f9d13009ae22483bc6767f8c13621f0a00fe7516f6a53ca02b872e9 +deleted: sha256:11d8011c83b4c445be64bab28e30c8776e69cda90a739663c3f57b55ed83a519 +deleted: sha256:751e8ca997e66f4b7892df7c90f70933380598e9c32394ff787642988272a679 +deleted: sha256:56cedf40e0080b58fe0bda77607e4321b658f6486de25f6750334e60827d239c +deleted: sha256:5987af1ce8b66c0ac9bc8fca0a58b29dcf283e756bafad1b9347a1e6a6f907e3 +deleted: sha256:58f67ec54ffec23435af7a061e142547586ad71d2ca083845bc3b5a024965143 +untagged: 10.1.0.20:9874/hashicorp-tfe-telegraf:1.16.3-alpine +... + +Total reclaimed space: 6.168GB +Done. +Removing the Replicated and TFE Docker networks... +Error: No such network: replicated_retraced +Error: No such network: tfe_services +Error: No such network: tfe_terraform_isolation +Unable to remove all Docker application networks, or none to be removed. +Done. +Removing any dangling Docker volumes... +"docker volume rm" requires at least 1 argument. +See 'docker volume rm --help'. + +Usage: docker volume rm [OPTIONS] VOLUME [VOLUME...] + +Remove one or more volumes +Unable to remove dangling Docker volumes, or none to be removed. + +Uninstall Complete +``` +```` + +## Run the Uninstaller + +### Online + +If the system can reach [install.terraform.io][install], go to a shell on your instance and run one of the following: + +- **Download the uninstaller**: Run `curl https://install.terraform.io/tfe/uninstall > uninstall.sh`. + +- **Make the script executable**: Run `chmod +x uninstall.sh`. + +- **Execute the uninstaller**: Run `sudo bash uninstall.sh` to execute the script. + +### Airgapped + +If the system cannot reach [install.terraform.io][install]: + +1. [Download the uninstall script][uninstall link] from a machine that has access to [install.terraform.io][install], and upload the script to the Terraform Enterprise server. + +1. From a shell on your instance, run `sudo bash uninstall.sh`. + +[install]: https://install.terraform.io/tfe/uninstall + +[uninstall link]: https://install.terraform.io/tfe/uninstall + +[support]: https://support.hashicorp.com diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/vault.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/vault.mdx new file mode 100644 index 000000000..1f3e80419 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/install/vault.mdx @@ -0,0 +1,30 @@ +--- +page_title: External Vault - Terraform Enterprise +description: >- + Learn about the data storage requirements of using an external Vault server with Terraform Enterprise. +--- + +# External Vault Requirements for Terraform Enterprise + +Terraform Enterprise automatically creates an internally-managed Vault server +that stores its data in the PostgreSQL Database. We strongly recommend that +organizations use this internally-managed Vault server. However, some +organizations have specific requirements around data encryption and auditing. +Those organizations can configure Terraform Enterprise to use an external Vault +server rather than the internally-managed Vault server. + +We only recommend using external Vault when you have experience managing Vault +in production. This approach requires that you assume full responsibility for +the Vault server, including sealing, unsealing, replication, etc. + +!> **Warning:** Do not configure multiple Terraform Enterprise instances to use the same namespace on an external Vault server unless they are part of an [Active/Active](/terraform/enterprise/deploy/replicated/install/automated/active-active) installation. Doing so will result in data loss. + + +### External Vault Configuration + +~> **Important:** You must configure External Vault during initial installation. After installation, you can only change the configuration using the [backup and restore API](/terraform/enterprise/deploy/replicated/administration/infrastructure/backup-restore). + +Run the following commands to configure your external Vault server for use with +Terraform Enterprise. + +@include "replicated-and-fdo/requirements/vault-partial.mdx" diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/monitoring/logging.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/monitoring/logging.mdx new file mode 100644 index 000000000..ff373555c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/monitoring/logging.mdx @@ -0,0 +1,179 @@ +--- +page_title: Log Forwarding - Infrastructure Administration - Terraform Enterprise +description: >- + Use log forwarding to increase observability, meet retention requirements, and aid troubleshooting. Learn how to configure forwarding, and audit and rotate logs. +--- + +# Terraform Enterprise Log Forwarding + +Terraform Enterprise supports forwarding its logs to one or more external +destinations, a process called log forwarding. Log forwarding provides increased +observability, assistance complying with log retention requirements, and +information during troubleshooting. + +## Requirements + +Log forwarding requires: + +- Terraform Enterprise running on an instance using `systemd-journald`. Execute + `systemctl status systemd-journald` to check if the `systemd-journald` service + is started and enabled. +- A version of Docker that supports the `journald` logging driver. Execute + `docker info --format '{{.Plugins.Log}}'` to check if the `journald` plugin is + listed. +- Network connectivity between Terraform Enterprise and the external + destination(s) where logs should be forwarded. + +## Enable Log Forwarding + +Log forwarding is disabled by default. To enable log forwarding, set the +`log_forwarding_enabled` Terraform Enterprise application setting to the value +`1`. + +```sh +tfe-admin app-config -k log_forwarding_enabled -v 1 +``` + +When log forwarding is enabled, the Terraform Enterprise application settings +show the following for `log_forwarding_enabled`: + +```json + "log_forwarding_enabled": { + "value": "1" + }, +``` + +-> **Note**: [Automated license utilization reporting](/terraform/enterprise/deploy/replicated/administration/license/automated-license-utilization-reporting) (which securely sends HashiCorp the minimum data required to validate license utilization) is on by default. + +## Configure External Destinations + +The `log_forwarding_config` Terraform Enterprise application setting must +contain valid +[Fluent Bit `[OUTPUT]` configuration](https://docs.fluentbit.io/manual/administration/configuring-fluent-bit) +specifying +[supported external destination(s)](#supported-external-destinations) +where Terraform Enterprise should forward logs. The default configuration does +not forward any logs. + +Since the Terraform Enterprise application settings are stored as JSON +strings, we recommend first creating a `fluent-bit.conf` file with the valid +Fluent Bit `[OUTPUT]` configuration and then using that file to configure the +`log_forwarding_config` application setting. This method ensures that the +configuration is stored in the application settings exactly how it appears in +the `fluent-bit.conf` file. + +For a Standalone installation of Terraform Enterprise: + +```sh +replicatedctl app-config set log_forwarding_config --value "$(cat fluent-bit.conf)" +``` + +For an Active/Active installation of Terraform Enterprise: + +```sh +tfe-admin app-config -k log_forwarding_config -v "$(cat fluent-bit.conf)" +``` + +Once configured, the Terraform Enterprise application settings show the +`log_forwarding_config` setting in escaped JSON string format: + +```json + "log_forwarding_config": { + "value": "# Match all logs and do not forward them anywhere.\n[OUTPUT]\n Name null\n Match *\n" + }, +``` + +That escaped JSON string renders to the following: + +```ini +# Match all logs and do not forward them anywhere. +[OUTPUT] + Name null + Match * +``` + +To forward logs to multiple external destinations, use multiple `[OUTPUT]` +directives. + +```ini +# Forward all logs to Datadog. +[OUTPUT] + Name datadog + Match * + ... + +# Forward all logs to Fluent Bit or Fluentd. +[OUTPUT] + Name forward + Match * + ... +``` + +-> **Note:** Do not use an `[OUTPUT]` directive with the +[`stdout` Fluent Bit output plugin](https://docs.fluentbit.io/manual/pipeline/outputs/standard-output). +Doing this creates a loop that continuously emits logs! + +### Restart Terraform Enterprise + +Once log forwarding is enabled and configured, you need to restart Terraform +Enterprise for the changes to take effect. [Learn how to restart Terraform Enterprise](/terraform/enterprise/deploy/replicated/administration/infrastructure/mounted-to-external-migration#restart-terraform-enterprise). + +## Supported External Destinations + +You can only forward logs to one of the supported external destinations below. +Each supported external destination contains example configuration for convenience. + +@include "replicated-and-fdo/monitoring/logging/supported-destinations-partial.mdx" + +## Audit Logs + +Terraform Enterprise emits its audit logs along with its application logs. +Currently, log forwarding can forward either all Terraform Enterprise logs or no +logs at all. To distinguish audit logs from application logs, audit log entries +contain the string `[Audit Log]`. + +Here's an example audit log entry formatted for readability: + +```json +2021-08-31 04:58:30 [INFO] [7a233ad1-c50c-4737-a925-3be901e55fcb] [Audit Log] +{ + "resource":"run", + "action":"create", + "resource_id":"run-nL77p69bsesoF3RK", + "organization":"example-org", + "organization_id":"org-pveSPvxocni226Fn", + "actor":"example-user", + "timestamp":"2021-08-31T04:58:30Z", + "actor_ip":"19.115.231.192" +} +``` + +If you have a requirement to split audit logs from application logs, we +recommend forwarding all Terraform Enterprise logs to a log aggregation system, +filtering the audit logs based on the `[Audit Log]` string, and forwarding just +the audit logs to the desired destination. + +## Log Rotation + +Log forwarding uses the `journald` Docker logging driver to send Terraform +Enterprise logs to `systemd-journald`. This can cause increased disk utilization +for the `/var/log/journal` path. + +To limit disk utilization, configure the `SystemMaxFileSize` and +`SystemMaxFiles` settings within `/etc/systemd/journald.conf`. + +The following configuration tells `systemd-journald` to use up to 7GB of disk +space by limiting the size a log file to 1024MB and keeping up to 7 files at any +given time: + +```ini +[Journal] +SystemMaxFileSize=1024M +SystemMaxFiles=7 +``` + +To apply these changes, restart `systemd-journald`: + +```sh +sudo systemctl restart systemd-journald +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/monitoring/monitoring.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/monitoring/monitoring.mdx new file mode 100644 index 000000000..6d90a63c5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/monitoring/monitoring.mdx @@ -0,0 +1,94 @@ +--- +page_title: Monitoring - Infrastructure Administration - Terraform Enterprise +description: >- + Learn how to use health checks, metrics, and telemetry to monitor the health of your Terraform Enterprise instance. +--- + +# Monitoring a Terraform Enterprise Instance + +This document outlines best practices for monitoring a Terraform Enterprise instance. + +## Health Check + +Terraform Enterprise provides a `/_health_check` endpoint on the instance. If Terraform Enterprise is up, the health check will return a `200 OK`. + +The `/_health_check` endpoint operates in 2 modes: + +- Full check +- Minimal check + +With a full check, the service will attempt to verify the status of internal components and PostgreSQL, in contrast to a minimal check which returns `200 OK` automatically after a successful full check. + +The endpoint's default behavior is to perform a full check during startup of the instance, and minimal checks after Terraform Enterprise is active and running. + +-> **Note:** If you wish to force a full check, an additional query parameter is required: `/_health_check?full=1`. Take extra caution as every call will make requests to internal components and PostgreSQL, increasing system load and latency. + +## Metrics & Telemetry + +In addition to health-check monitoring, we recommend monitoring standard server metrics on the Terraform Enterprise instance: + +- I/O +- RAM +- CPU +- Disk + +As of the `v202201-1` release, Terraform Enterprise supports exporting container-level resource utilization metrics. + +### Terraform Enterprise Metrics + +The Terraform Enterprise Metrics service collects a number of runtime metrics. Operators can use this data to gain real-time visibility into their installation. Additionally, these metrics can be used to set up monitoring and alerting to detect anomalous incidents, performance degradation, and utilization trends. Metrics are aggregated on a five second interval and are retained in memory for fifteen seconds. In order to leverage Terraform Enterprise metrics in monitoring, data must be stored in metric aggregation software. Terraform Enterprise currently supports exposing metrics data in Prometheus format, as well as a JSON representation. + +#### Enable Metrics Collection + +Metrics collection can be configured with the `metrics_endpoint_enabled` config flag in the [application config file](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#application-settings). By default, `metrics_endpoint_enabled` is set to `"0"` (disabled). To enable metrics collection, set this value to `"1"`. + +#### Access Metrics + +When enabled, Terraform Enterprise will expose metrics on a port separate from the application. This allows operators to use network access controls to restrict access to metrics data to authorized consumers, i.e., a Prometheus server. By default, port 9090 is used for plaintext HTTP requests, and port 9091 for HTTPS traffic. Both of these values are configurable via the `metrics_endpoint_port_http` and `metrics_endpoint_port_https` configuration values, respectively. + +Both the HTTP and HTTPS ports will respond to HTTP requests with the path `/metrics`. By default, requests to the `/metrics` endpoint will generate a response in JSON format; adding the query string `?format=prometheus` will generate a response in Prometheus format. + +When using Prometheus, it is recommended to use a scrape interval shorter than the expiration time of 15 seconds, to ensure that data points from short-lived processes are not missed. + +#### Container Metrics + +These metrics report runtime information about Terraform Enterprise containers. + +| Exposed Metric | Metrics Type | Description | +| :---------------------------------------- | :----------: | :--------------------------------------------------------------------------------------------------------------- | +| `tfe.container.cpu.usage.user` | `counter` | Running count, in nanoseconds, of the total amount of time processes in the container have spent in userspace | +| `tfe.container.cpu.usage.kernel` | `counter` | Running count, in nanoseconds, of the total amount of time processes in the container have spent in kernel space | +| `tfe.container.memory.used_bytes` | `gauge` | The amount of memory allocated to the container in bytes, minus memory that is used for page cache | +| `tfe.container.memory.limit` | `gauge` | The maximum amount of memory in bytes that can be allocated by the container | +| `tfe.container.network.rx_bytes_total` | `counter` | Running count of the number of network bytes received by the container | +| `tfe.container.network.rx_packets_total` | `counter` | Running count of the number of network packets received by the container | +| `tfe.container.network.tx_bytes_total` | `counter` | Running count of the number of network bytes transmitted by the container | +| `tfe.container.network.tx_packets_total` | `counter` | Running count of the number of network packets transmitted by the container | +| `tfe.container.disk.io_op_read_total` | `counter` | Running count of the number of read disk operations executed by the container | +| `tfe.container.disk.io_op_write_total` | `counter` | Running count of the number of write disk operations executed by the container | +| `tfe.container.disk.io_bytes_read_total` | `counter` | Running count of the number of disk bytes read by the container | +| `tfe.container.disk.io_bytes_write_total` | `counter` | Running count of the number of disk bytes written by the container | +| `tfe.container.process_count` | `gauge` | The number of processes active within the container | +| `tfe.container.process_limit` | `gauge` | The maximum number of processes that can be executed inside the container | + +The following metadata labels will be added to each container metric emitted: + +- `id`: The container ID +- `name`: The container name +- `image`: The container image + +Build worker container metrics include four additional labels: `run_type`, `run_id`, `workspace_name`, and `organization_name`. You can use these labels to associate a build worker container with its type, run, workspace, and organization, respectively. Metrics for long-running service containers will not include these labels. + +In addition to the per-container metrics, the following global metrics are exposed: + +| Exposed Metric | Metrics Type | Description | +| :---------------------- | :----------: | :-------------------------------------------------------------------------------- | +| `tfe.run.count` | `gauge ` | Number of running containers being used for Terraform operators (runs and plans) | +| `tfe.run.limit` | `gauge` | Maximum number of jobs as defined by the `capacity_concurrency` Replicated config | +| `tfe.run.current.count` | `gauge` | Number of active Terraform runs labeled by organization, workspace, and status | + +The name and ID for build worker containers are unique for each build, and build container names take the form of a UUID. Be aware of this when planning for Prometheus storage capacity requirements that relate to metric cardinality. Environments that do not need to track resource consumption of individual build containers or runs can use [Prometheus metric relabelling](https://prometheus.io/docs/prometheus/latest/configuration/configuration/#metric_relabel_configs) to remove the unique ID, name, and run type labels from container metrics. This reduces cardinality within the dataset while still retaining the ability to associate resource usage with a given workspace and organization. + +#### Grafana Dashboard + +This [template Grafana dashboard](https://grafana.com/grafana/dashboards/15630) demonstrates how you can use Grafana and Prometheus to visualize exported Terraform Enterprise metrics. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/credentials.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/credentials.mdx new file mode 100644 index 000000000..dcc74fbeb --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/credentials.mdx @@ -0,0 +1,87 @@ +--- +page_title: Credentials - Requirements - Terraform Enterprise +description: >- + You must obtain a license file from HashiCorp, a TLS certificate, and a + private key. +--- + +# Credentials + +Terraform Enterprise requires the following credentials and permissions. + +## License File + +To deploy Terraform Enterprise, you must obtain a license file from HashiCorp. + +## TLS Certificate and Private Key + +Terraform Enterprise requires a TLS certificate and private key in order to operate. This certificate must match Terraform Enterprise's hostname, either by being issued for the FQDN or being a wildcard certificate. + +The certificate can be signed by a public or private CA, but it _must_ be trusted by all of the services that Terraform Enterprise is expected to interface with; this includes your VCS provider, any CI systems or other tools that call Terraform Enterprise's API, and any services that Terraform Enterprise workspaces might send notifications to (for example: Slack). Due to these wide-ranging interactions, we recommend using a certificate signed by a public CA. + +The key and X.509 certificate must be PEM (base64) encoded, and should be provided to the installer as text. + +~> **Important:** If you use a certificate issued by a private Certificate +Authority, you must provide the certificate for that CA in the +`Certificate Authority (CA) Bundle` section of the installation. This allows services +running within Terraform Enterprise to access each other properly. +See [Installation: Certificate Authority (CA) Bundle](/terraform/enterprise/deploy/replicated/install/interactive/installer#certificate-authority-ca-bundle) +for more on this. + +Terraform Enterprise validates the certificate to ensure it uses a Subject Alternative Name (SAN) for Domain Names (DN) entries and not just a Common Name (CN) entry. + +## IAM Policies - External Services Mode + +If you choose the [external services operational mode](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#choose-an-operational-mode), Terraform Enterprise requires access to an S3-compliant endpoint for object storage. You can grant access to the object storage endpoint by either assigning an AWS instance profile or an equivalent IAM system in non-AWS environments. + +### S3 Policy + +At a minimum, Terraform Enterprise requires the following S3 permissions: + +``` +{ + "Effect": "Allow", + "Action": [ + "s3:PutObject", + "s3:ListBucket", + "s3:GetObject", + "s3:DeleteObject", + "s3:GetBucketLocation" + ], + "Resource": [ + "", + "/*" + ] +} +``` + +-> **Note:** The `s3:ListAllMyBuckets` permission is necessary when testing authentication via the Replicated web console. However, the permission is not required for Terraform Enterprise to function and can be removed once the authentication is successfully tested. + +### KMS Policy + +At a minimum, Terraform Enterprise will require the following permissions if the objects in the bucket are to be encrypted via resources in AWS's KMS: + +``` +{ + "Effect": "Allow", + "Action": [ + "kms:Decrypt", + "kms:Encrypt", + "kms:DescribeKey", + "kms:ReEncrypt*", + "kms:GenerateDataKey*" + ], + "Resource": [ + "" + ] +} +``` + +### Instance Profile as Default Credentials + +You can use Terraform Enterprise's instance profile to provide default credentials to workspaces. When using IMDSv2, configure the PUT response hop limit with a value of 2 within the [instance metadata options](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-instance-metadata-options.html). Terraform will attempt to use the instance profile to provision resources when you do not set credentials as environment variables. However, this approach presents a few security risks: + +1. All workspaces will have the same permissions because they have access to the same instance profile. You cannot selectively allow or deny access to the instance profile for each workspace. +1. Workspaces will share the instance profile with the Terraform Enterprise application. All workspaces within the application will have access to any resources that Terraform Enterprise depends on, such as its S3 bucket, KMS keys, etc. + +~> **Important:** If you choose not to use the instance profile for default credentials, we highly recommend that you [restrict build worker metadata access](/terraform/enterprise/deploy/replicated/architecture/system-overview/security-model#restrict-terraform-build-worker-metadata-access) to prevent workspaces from accessing the instance profile. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/minio-setup-guide.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/minio-setup-guide.mdx new file mode 100644 index 000000000..9109e6afc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/minio-setup-guide.mdx @@ -0,0 +1,7 @@ +--- +page_title: Minio Setup Guide - Installation - Terraform Enterprise +description: >- + Learn how to set up Minio for external object storage for HashiCorp Terraform Enterprise. +--- + +@include "replicated-and-fdo/requirements/minio-partial.mdx" diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements.mdx new file mode 100644 index 000000000..806e5e1cb --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/operational-mode-requirements.mdx @@ -0,0 +1,32 @@ +--- +page_title: Operational Mode Requirements - Requirements - Terraform Enterprise +description: >- + Learn about the data storage requirements for each Terraform Enterprise operational mode. +--- + +# Operation Mode Data Storage Requirements + +Terraform Enterprise data storage requirements differ based on the +[operational mode](/terraform/enterprise/deploy/replicated/install/operation-modes) +you choose for your instance. If you are following one of the +[reference architectures](/terraform/enterprise/deploy/replicated/architecture/reference-architecture), we recommend referring to it while preparing your data storage services. + +## External Services Mode + +External Services mode has the following requirements: + +- [PostgreSQL Requirements](/terraform/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements) +- Any S3-compatible object storage service, GCP Cloud Storage or Azure blob storage meets Terraform Enterprise's object storage requirements. You must create a bucket for Terraform Enterprise to use, and specify that bucket during installation. Depending on your infrastructure provider, you might need to ensure the bucket is in the same region as the Terraform Enterprise instance. + - Disable any lifecycle rules that would delete, archive, or transition objects in this container. Terraform Enterprise expects to manage all data the object storage service, so any lifecycle moves may result in unexpected data inconsistencies. + +@include "replicated-and-fdo/requirements/operation-modes-partial.mdx" + +### Database Maintenance + +There are three CLI commands available as of v202005-2 to facilitate management of the PostgreSQL database that runs on the host as part of the Mounted Disk operational mode: + +- `replicated admin db-backup`: This will run a `pg_dump` and store the backup in `/backup/ptfe.db` on the host. +- `replicated admin db-restore`: This will run a `pg_restore` using `/backup/ptfe.db` as it's data source. +- `replicated admin db-reindex`: This will run a `REINDEX` against the application database. Note: A reindex can take anywhere from minutes to hours to complete, depending on the size of your database. Running this command locks the database and prevents any other action against it. + +These commands will only display output if there is an error. Please contact [support](https://support.hashicorp.com) if you have any questions or issues with these commands. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements.mdx new file mode 100644 index 000000000..62584ecd7 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements.mdx @@ -0,0 +1,16 @@ +--- +page_title: PostgreSQL Requirements - Before Installing - Terraform Enterprise +description: >- + Learn about the data storage requirements for PostgreSQL when using the external services operational mode of Terraform Enterprise. +--- + +# PostgreSQL Requirements for Terraform Enterprise + +-> **Note:** These requirements apply to the External Services operational mode, not the Mounted Disk operational mode. Refer to the [Pre-Install Checklist](/terraform/enterprise/deploy/replicated/install/pre-install-checklist) for more information. + + + PostgreSQL v12 will reach end of life on November 12, 2024, and as a result will no + longer be supported in Terraform Enterprise after that date. + + +@include "replicated-and-fdo/requirements/postgres-partial.mdx" diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/docker_engine.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/docker_engine.mdx new file mode 100644 index 000000000..260d830a5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/docker_engine.mdx @@ -0,0 +1,119 @@ +--- +page_title: Docker Engine - Legacy Deployment - Requirements - Terraform Enterprise +description: >- + Configure and verify a Docker engine for your Terraform Enterprise + installation. +--- + +# Docker Engine Requirements + +This topic describes the Docker engine requirements for deploy Terraform Enterprise to Replicated. For information about deploying Terraform Enterprise natively to Docker using Docker Compose, refer to [Terraform Enterprise deployment overview](/terraform/enterprise/deploy). Deploying to Docker natively is faster than Replicated deployments and results in faster startups, reduced resource requirements, and improved security. + + +Terraform Enterprise requires **at least one** of the following Docker Engine configurations, in order of preference: + + 1. Docker Engine 23.x - 25.x + +!> **Compatibility warning**: Terraform Enterprise does not yet support the pre-installed Docker version that comes with Amazon Linux 2023. You must uninstall your Docker version and manually install Docker Engine 24.x to ensure compatibility with Terraform Enterprise. + +Docker v20.10 is *only* supported on Amazon Linux 2. Docker v20.10 is no longer receiving updates from Docker, including security updates. Customers using Amazon Linux 2 are encouraged to move to an operating system that supports Docker 23 or 24. In order run Docker v20.10, you will need *one* of the following: + + 1. [`runc` v1.0.0-rc93 or greater](#docker-engine-with-a-compatible-runc-version) + 1. [`libseccomp` 2.4.4 or greater](#docker-engine-with-a-compatible-libseccomp-version) + 1. A [modified `libseccomp` profile](#docker-engine-using-a-modified-libseccomp-profile) + +New online installations of Terraform Enterprise install a supported version of Docker Engine by default. Alternatively, you can install Docker Engine manually as long as you adhere to the above requirements. + +Upgrades to Terraform Enterprise do not upgrade Docker Engine. It is your responsibility to keep Docker Engine up to date within these requirements to ensure stability and security. + +## Docker Compose Compatibility + + Docker Engine comes prepackaged with Docker Compose and compatibility is assessed by meeting the Docker Engine requirements. + + ```sh + # Docker Engine 24.0 + docker compose version + ``` + + +## Docker Engine With a Compatible `runc` Version + + 1. [Install](https://docs.docker.com/engine/install/) a supported Docker Engine version. + + 1. Install the latest version of `containerd` for your operating system. + + On Debian/Ubuntu: + + ```sh + sudo apt install containerd + ``` + + On RHEL/CentOS: + + ```sh + sudo yum install containerd.io + ``` + + 1. Confirm that the installed `containerd` version is 1.4.9, 1.5.5, or greater. + + ```sh + containerd --version + ``` + + 1. Confirm that the installed `runc` version is v1.0.0-rc93 or greater: + + ```sh + runc --version + ``` + + 1. If your Docker Engine and `runc` versions meet the requirements from previous steps, your system is properly configured. Otherwise, proceed to [ option 2](#option-2-docker-engine-with-a-compatible-libseccomp-version). + +## Docker Engine With a Compatible `libseccomp` Version + + -> **Note:** These instructions should only be used if your operating system does not meet the requirements detailed in [Docker Engine With a Compatible `runc` Version](#docker-engine-with-a-compatible-runc-version). + + 1. [Install](https://docs.docker.com/engine/install/) a supported Docker Engine version. + + 1. Install the latest version of `libseccomp` for your operating system. + + On Debian/Ubuntu: + + ```sh + sudo apt install libseccomp2 + ``` + + On RHEL/CentOS: + + ```sh + sudo yum install libseccomp + ``` + + 1. Confirm that the installed `libseccomp` version is 2.4.4 or greater. + + ```sh + runc --version + ``` + + 1. If your Docker Engine and `libseccomp` versions meet the requirements from previous steps, your system is properly configured. Otherwise, proceed to [option 3](#option-3-docker-engine-using-a-modified-libseccomp-profile). + +## Docker Engine Using a Modified `libseccomp` Profile + + -> **Note:** These instructions should only be used if your operating system does not meet the requirements detailed in either [Docker Engine With a Compatible `runc` Version](#docker-engine-with-a-compatible-runc-version) or [Docker Engine With a Compatible `libseccomp` Version](https://terraform.io/docker-engine-with-a-compatible-libseccomp-version). + + 1. [Install](https://docs.docker.com/engine/install/) a supported Docker Engine version. + + 1. Check if the file `/etc/docker/seccomp.json` exists. If it does, proceed to step 4. + + 1. Download the [default moby `libseccomp` profile](https://raw.githubusercontent.com/moby/moby/master/profiles/seccomp/default.json) and save it to the file `/etc/docker/seccomp.json`. + + ```sh + sudo curl -L -o /etc/docker/seccomp.json \ + https://raw.githubusercontent.com/moby/moby/master/profiles/seccomp/default.json + ``` + + 1. In the `/etc/docker/seccomp.json` file, change `"defaultAction": "SCMP_ACT_ERRNO",` to `"defaultAction": "SCMP_ACT_TRACE",`. + + ```sh + sudo sed -i 's/"defaultAction":\s*"SCMP_ACT_ERRNO"/"defaultAction": "SCMP_ACT_TRACE"/1' /etc/docker/seccomp.json + ``` + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/hardware.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/hardware.mdx new file mode 100644 index 000000000..0dd0f7b2f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/hardware.mdx @@ -0,0 +1,19 @@ +--- +page_title: Hardware and Data Storage - Requirements - Terraform Enterprise +description: Required disk space and memory for your Terraform Enterprise instance. +--- + +# Hardware and Data Storage Requirements + +You must set up the correct hardware before installing and running Terraform Enterprise. Incorrect amounts of disk space or memory can cause significant performance issues. + +## Hardware + +These requirements provide the instance with enough resources to run the +Terraform Enterprise application as well as the Terraform plans and applies. + +- At least 10GB of disk space on the root volume +- At least 40GB of disk space for the Docker data directory (defaults to `/var/lib/docker`) +- At least 8GB of system memory +- At least 4 CPU cores + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/network.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/network.mdx new file mode 100644 index 000000000..c9b32ddc3 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/network.mdx @@ -0,0 +1,142 @@ +--- +page_title: Network Requirements - Before Installing - Terraform Enterprise +description: >- + The Linux instance that runs Terraform Enterprise must allow several kinds of + incoming network access. +--- + +# Network Requirements for Terraform Enterprise + +The Linux instance that runs Terraform Enterprise must allow several kinds of incoming network access. Terraform Enterprise also needs to access several external services to handle updates and resource downloads. + +## Ingress + +### Source — User/Client/VCS + +- **443:** Terraform Enterprise application access (HTTPS) + +~> **Important:** Integration with a SaaS VCS provider (GitHub.com, GitLab.com, Bitbucket Cloud, or Azure DevOps Services) requires ingress from the public internet. This lets the [inbound web hooks](/terraform/enterprise/vcs#webhooks) reach Terraform Enterprise. You should also configure appropriate security controls, such as a Web Application Firewall (WAF). + +### Source — Administrators + +- **22:** SSH access (administration and debugging) +- **8800:** Replicated (TFE setup dashboard, HTTPS) + +### Source - Metrics + +- **9090** TCP port on which Terraform Enterprise handles HTTP metrics requests +- **9091** TCP port on which Terraform Enterprise handles HTTPS metrics requests + +The metrics endpoints are optional. You can enable them in the [application settings](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#available-settings) when you install Terraform Enterprise. + +### Source — TFE Server(s) + +- **8201:** Vault HA request forwarding (only necessary when operating in Active/Active mode) + +Additionally, the following ports are used by various application components internally. +This list serves as a point of reference; it is not necessary to expose these ports +for accessibility in a firewall: + +- **2003:** Graphite (Carbon) feeding port (monitoring, metrics) +- **2004:** Graphite (Carbon) feeding port (monitoring, metrics) +- **3121:** Terraform Enterprise private registry +- **4150-4151, 4160-4161, 4170-4171:** Replicated NSQD (messaging platform daemon for internal communication) +- **5432:** PostgreSQL +- **6379:** Redis (application-level caching and coordination) +- **7586:** Terraform Enterprise ingress (pulls in version control system data for application, stores it via Archivist) +- **7588:** Terraform Enterprise state parser +- **7675:** Terraform Enterprise Archivist (stores data in object storage, encrypts it via Vault) +- **8086:** InfluxDB default UDP Service (monitoring, metrics) +- **8125:** StatsD (monitoring, metrics) +- **8200:** Vault (encryption service) +- **9292:** Atlas engine (old name of Terraform Enterprise engine) +- **9870-9880 (inclusive):** host and subnet traffic only; not publicly accessible + - **9873:** Replicated Retraced engine API (Replicated audit subcomponent) + - **9874-9879:** Replicated entry point span +- **23000-23100 (inclusive):** host and subnet traffic only; not publicly accessible + - **23005:** Terraform Enterprise health check point + - **23020:** Nomad (scheduler for Sentinel runs) +- **32774-32776, 49150-49165:** Replicated internal Graphite and StatsD ports (mapped to external ports 2003, 2004, and 8125) + +## Egress + +### Destination - Online Installations + +If Terraform Enterprise is installed in online mode, it accesses the following hostnames to get software updates: + +- `api.replicated.com` +- `get.replicated.com` +- `registry-data.replicated.com` +- `registry.replicated.com` +- `*.quay.io` +- `cdn.quay.io` +- `quay-registry.s3.amazonaws.com` +- `*.cloudfront.net` +- `hub.docker.com` +- `index.docker.io` +- `auth.docker.io` +- `registry-1.docker.io` +- `download.docker.com` +- `production.cloudflare.docker.com` +- `install.terraform.io` + +-> **Note:** We recommend allowing traffic by FQDN and not IP Address or range. IP address allowlists make your service dependent on an external factor, like an external IP address, that you do not control. + +The following hostnames are accessed unless a +[custom Terraform bundle](/terraform/enterprise/run/install-software#custom-and-community-providers) +is supplied: + +- `registry.terraform.io` (when using Terraform 0.12 and later) +- `releases.hashicorp.com` +- `https://yy0ffni7mf-dsn.algolia.net/` - this URL is specific to the Terraform Registry’s [Algolia](https://www.algolia.com/) application. The Terraform Registry uses Algolia to index the current resources in the registry and power HCP Terraform public-facing search for public providers and module curation. +- `github.com` - Public providers and modules are hosted in Github. + +Additionally, unless you have opted out of license entitlement reporting, Terraform Enterprise will need egress access to: + +- `reporting.hashicorp.services` + +~> **Note:** Airgapped installs do not check for updates over the network. + +### Destination - Additional Outbound Network Targets + +Terraform Enterprise also needs egress access to: + +- any VCS servers/services that will be utilized +- login/authentication servers if SAML will be configured (ADFS, Okta, etc) +- the various cloud API endpoints that will be managed with Terraform +- any other third party services that will either be integrated with the Terraform Enterprise server or managed with it. + +### Destination - Cost Estimation APIs + +When [Cost Estimation](/terraform/enterprise/application-administration/integration#cost-estimation-integration) is enabled, it uses the respective cloud provider's APIs to get up-to-date pricing info. + +- `api.pricing.us-east-1.amazonaws.com` +- `cloudbilling.googleapis.com` +- `prices.azure.com` + +~> **Note:** Versions of Terraform Enterprise earlier than v202105-1 used `management.azure.com` and `ratecard.azure-api.net` rather than `prices.azure.com`. + +## Other Configuration + +1. If a firewall is configured on the instance, run one of the following to allow traffic to flow out of the `docker0` interface to the instance's primary address. We recommend doing this before you install Docker. + + - To use UFW, run: `ufw allow in on docker0` + - To use firewalld, run: `firewall-cmd --permanent --zone=trusted --change-interface=docker0` + +1. Get a domain name for the instance. Using an IP address to access the product is not supported as many systems use TLS and need to verify that the certificate is correct, which can only be done with a hostname at present. + +1. **For GCP only:** Configure Docker to use an MTU (maximum transmission unit) of 1460, as required by Google ([GCP Cloud VPN Documentation: MTU Considerations](https://cloud.google.com/network-connectivity/docs/vpn/concepts/mtu-considerations)). + + To configure Docker's MTU, create an `/etc/docker/daemon.json` file with the following content: + + ```json + { + "mtu": 1460 + } + ``` + + ~> **Note:** The above only affects the default network `bridge` aka `docker0`. To apply this to the networks `tfe_services` and `tfe_terraform_isolation`, it is [required](https://support.hashicorp.com/hc/en-us/articles/4405507244691) to delete these two networks and recreate them with the correct MTU for an existing install or to create these two networks prior to installing Terraform Enterprise for a new install. + +1. Ensure the Docker bridge network address is not in use elsewhere on the network. If it is, please refer to the [Docker documentation](https://docs.docker.com/network/bridge/) for information on how to change it. + +~> **Note:** Beginning in version `v202004-1`, non-default Docker networks named `tfe_services` and `tfe_terraform_isolation` were added for the Terraform Enterprise component Docker containers as part of a network segmentation update. Custom configuration [may be required for MTU settings](https://support.hashicorp.com/hc/en-us/articles/4405507244691). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/centos-requirements.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/centos-requirements.mdx new file mode 100644 index 000000000..d45aa8110 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/centos-requirements.mdx @@ -0,0 +1,33 @@ +--- +page_title: CentOS Linux Requirements - Installation - Terraform Enterprise +description: >- + Learn about the requirements for installing Terraform Enterprise on CentOS Linux. +--- + +# CentOS Requirements for Terraform Enterprise + +When installing Terraform Enterprise on CentOS Linux, ensure you meet the following requirements: + +## Install Requirements + +- A [supported version](/terraform/enterprise/deploy/replicated/requirements/os-specific/supported-os) of CentOS. +- A [supported Docker Engine](/terraform/enterprise/deploy/replicated/requirements/docker_engine) configuration. + +## FAQ + +### Can I use the Docker version in the Extra Packages for Enterprise Linux repository? + +Sure! Just be sure to [modify the default `libeseccomp` +profile](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#option-3-docker-engine-using-a-modified-libseccomp-profile). + +### Which storage driver should I use? + +The `overlay2` storage driver. + +### Can an installation where `docker info` says that I’m using devicemapper with a loopback file work? + +No. This is an installation that Docker provides as sample and is not supported by Terraform Enterprise due to the significant instability in it. Docker themselves [do not suggest using this mode](https://docs.docker.com/storage/storagedriver/device-mapper-driver/#configure-loop-lvm-mode-for-testing). + +### How do I know if an installation is in devicemapper loopback mode? + +Run the command `docker info | grep dev/loop`. If there is any output, you’re in devicemapper loopback mode. Docker may also print warning about loopback mode when you run the above command, which is another indicator. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/rhel-requirements.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/rhel-requirements.mdx new file mode 100644 index 000000000..6b5d284b0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/rhel-requirements.mdx @@ -0,0 +1,40 @@ +--- +page_title: RHEL Requirements - Installation - Terraform Enterprise +description: >- + Learn about the requirements for installing Terraform Enterprise on RedHat Enterprise Linux. +--- + +# RHEL Requirements for Terraform Enterprise + +When installing Terraform Enterprise on RedHat Enterprise Linux (RHEL), ensure you meet the following requirements. + +## Install Requirements + +- A [supported version](/terraform/enterprise/deploy/replicated/requirements/os-specific/supported-os) of RedHat Enterprise Linux. +- A [supported Docker Engine](/terraform/enterprise/deploy/replicated/requirements/docker_engine) configuration. + +## FAQ + +### When I run the installer, it allows me to download and install Docker CE on RedHat. Can I use that? + +Yes, this is the recommended option. Docker CE is compatible with Terraform Enterprise, and tested nightly. It is not directly supported by RedHat, but there is a robust [open source community](https://www.docker.com/support/). + + +### How can I prevent accidental upgrades of Docker? + +To pin the version of Docker and prevent an inadvertent upgrade, follow [this guide](https://access.redhat.com/solutions/98873) from RedHat. + +For Red Hat Enterprise Linux v8 please use Docker CE for CentOS. This is tested nightly and ahead of each release of Terraform Enterprise. + + +### Which storage driver should I use? + +The `overlay2` storage driver. + +### Can an installation where `docker info` says that I’m using devicemapper with a loopback file work? + +No. This is an installation that docker provides as sample and is not supported by Terraform Enterprise due to the significant instability in it. Docker themselves do not suggest using [this mode](https://docs.docker.com/storage/storagedriver/device-mapper-driver/#configure-loop-lvm-mode-for-testing). + +### How do I know if an installation is in devicemapper loopback mode? + +Run the command `sudo docker info | grep dev/loop`. If there is any output, you’re in devicemapper loopback mode. Docker may also print warning about loopback mode when you run the above command, which is another indicator. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/supported-os.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/supported-os.mdx new file mode 100644 index 000000000..01f2261e1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/replicated/requirements/os-specific/supported-os.mdx @@ -0,0 +1,33 @@ +--- +page_title: Supported Operating Systems - Requirements - Terraform Enterprise +description: >- + Terraform Enterprise can run on Debian, Ubuntu, CentOS, and several types of + Linux (RedHat, Amazon, and Oracle). +--- + +# Supported Operating Systems + +Terraform Enterprise currently supports running under the following operating systems: + +- Debian 11 +- Ubuntu 20.04 / 22.04 / 24.04 +- Red Hat Enterprise Linux 8.4 - 8.8 ([RedHat Linux Requirements](/terraform/enterprise/replicated/requirements/os-specific/rhel-requirements)) +- CentOS 8.4 ([CentOS Requirements](/terraform/enterprise/replicated/requirements/os-specific/centos-requirements)) +- Amazon Linux 2.0 / 2023 +- Oracle Linux 8.4 + +## SELinux + +Terraform Enterprise supports SELinux running in enforcing mode when certain requirements are met. These requirements vary depending on the type of Terraform Enterprise installation. + +For External Services installations, you must install the latest version of the `container-selinux` package. + +For Mounted Disk installations, you must: + +- Install the latest version of the `container-selinux` package. +- Add the `container_file_t` type to the SELinux context for the mounted disk path and its subdirectories. The commands below update the mounted disk path `/opt/tfe` and its subdirectories to use the correct SELinux context. + + ``` + semanage fcontext -a -t container_file_t "/opt/tfe(/.*)?" + restorecon -R /opt/tfe + ``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/contact-support.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/contact-support.mdx new file mode 100644 index 000000000..10c2be7a6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/contact-support.mdx @@ -0,0 +1,61 @@ +--- +page_title: Get support for Terraform Enterprise +description: Learn to how to get HashiCorp support for Terraform Enterprise. +--- + +# Get support for Terraform Enterprise + +If some aspect of Terraform Enterprise is not working as +expected, reach out to support for help. + +## Open a ticket + +If you need assistance or want to submit a feature request, visit the [HashiCorp support center](https://support.hashicorp.com/hc/en-us) and open a ticket. + +## Diagnostics + +For most technical issues, HashiCorp support will ask you to include diagnostic +information in your support request. To ensure the required information is included, +Terraform Enterprise can automatically generate a support bundle including logs and configuration details. + +### Support bundles + +Provide the following information with any support requests: + - Deployment runtime, such as Docker or Kubernetes. + - Deployment cloud service, such as AWS, AzureRM, GCP, or your local data center. + - Operational mode, such as `disk` or `external` + - Your [support bundle](/terraform/enterprise/deploy/troubleshoot/perform-diagnostics#generate-a-support-bundle) + +#### Replicated deployments + +If Terraform Enterprise is deployed to the legacy Replicated runtime, you can access diagnostic information in the installer dashboard or on port `8800` of your installation. + +The installer dashboard is disabled for Replicated deployments in [`active-active` mode](/terraform/enterprise/reference/configuration#active-active). Instead, you can generate and save support bundles to your configured object storage location by executing the `tfe-admin support-bundle` command on a node instance from every node in the cluster. + +On the dashboard, click on the Support tab: + +![Terraform Enterprise Dashboard Top](/img/docs/tfe-dashboard.png) + +On the next page, click **Download Support Bundle** to download the support bundle directly to your web browser. + +![Terraform Enterprise Support](/img/docs/tfe-support.png) + +## Uploading the Support Bundle + +Once you have downloaded your support bundle, please use a secure method to upload it to HashiCorp support. + +### Existing Customers + +Attach the bundle to your support ticket. + +If possible, use the SendSafely integration available in the [HashiCorp support portal](https://support.hashicorp.com/hc/en-us). SendSafely lets you upload large file. + +If you are unable to use the integration in the portal, upload the bundle directly to `https://hashicorp.sendsafely.com/u/ptfe-support-bundles`. + +### Pre-Sales Customers + +If you are in the pre-sales phase, please upload support bundle files directly to `https://hashicorp.sendsafely.com/u/ptfe-support-bundles`. + +### About the Bundle + +The support bundle contains logging and telemetry data from various components in Terraform Enterprise. It may also include log data from Terraform builds you have executed on your Terraform Enterprise installation. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/error-messages.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/error-messages.mdx new file mode 100644 index 000000000..c79808606 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/error-messages.mdx @@ -0,0 +1,133 @@ +--- +page_title: Troubleshooting common application errors +description: Learn about the errors Terraform Enterprise may report if your deployment is misconfigured and how to resolve them. +--- + +# Troubleshooting common application errors + +This topic describes the errors Terraform Enterprise may report if your deployment is misconfigured and how to resolve them. + +## Kubernetes Fails to Pull Image + +### Symptom + +Kubernetes pods are failing to pull the container image with a `BackOff` error. + +### Signals + +`kubectl describe pod` is stuck in the `Waiting` state with the `ErrImagePull` +reason. + +```sh +$ kubectl describe pod terraform-enterprise-7f649f6598-2k79b +... +Containers: + terraform-enterprise: + State: Waiting + Reason: ErrImagePull +... +``` + +### Solution + +Update the image pull policy for the deployment to `always`. + +## Empty S3 static credentials + +### Symptom + +Application fails to start. + +### Signals + +Logs show the following S3 prefix detection error. + +```sh +2023-05-10T23:38:18.100Z [ERROR] terraform-enterprise: startup: error="failed detecting s3 prefix: could not list objects: operation error S3: ListObjectsV2, failed to sign request: failed to retrieve credentials: failed to refresh cached credentials, static credentials are empty" +``` + +### Solution + +Set `TFE_OBJECT_STORAGE_S3_USE_INSTANCE_PROFILE` to `true` when using IAM auth +for S3. + +## Unknown certificate with VCS integration + +### Symptom + +You cannot configure a VCS connection within Terraform Enterprise. + +### Signals + +Setting up VCS fails with `unknown certificate issuer` error. + +### Solution + +Include the CA certificate for your VCS server in the CA Bundle. Ensure the +`TFE_TLS_CA_BUNDLE_FILE` is set to a path pointing to your CA bundle. + +## Unknown certificate with failing Terraform runs + +### Symptom + +Terraform plans and applies fail. + +### Signals + +Logs for task worker and archivist show an x509 error. + +### Solution + +Include the CA certificates for all hosts that Terraform must communicate with, +including your Terraform Enterprise server itself, in the CA Bundle. Ensure the +`TFE_TLS_CA_BUNDLE_FILE` is set to a path pointing to your CA bundle. + +## Unable to fetch Terraform binary + +### Symptom + +Terraform plans and applies fail with `failed downloading terraform`. + +### Signals + +Terraform run logs contain. + +```sh +Operation failed: failed fetching Terraform: failed downloading terraform: failed downloading "https://releases.hashicorp.com/terraform/1.3.2/terraform_1.3.2_linux_amd64.zip": GET https://releases.hashicorp.com/terraform/1.3.2/terraform_1.3.2_linux_amd64.zip giving up after 5 attempt(s): failed making temp file: open /tmp/terraform/8c23e18ed1846a552fc22ed5ee80eec9.download-67d5219a-aa5c-cd41-3262-2b9d57c1bfe2: read-only file system +``` + +### Solution + +Ensure the `TFE_DISK_CACHE_PATH` location is properly backed by a writable +volume. + +## Unable to write to database after a failover + +### Symptom + +If Terraform Enteprise is connected to a PostgreSQL database cluster, you may experience issues after a failover. + +### Signals + +The Vault logs contain the following entry: + + + + +cannot execute INSERT in a read-only transaction (SQLSTATE 25006) + + + + +### Solutions + +You may need to manually address issues after a failover to return to functionality. The Vault process may still be connected to a read-only instance if the affected instance can not process runs. Perform the following actions to resolve this issue: + +1. Restart Terraform Enterprise. + +1. Reopen sealed Vault processes. If the Vault process seals before the failover resolves, either restart Terraform Enterprise or restart the Vault process. Use the following command to restart the Vault process: + + ```sh + $ supervisorctl restart tfe:vault + ``` + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/index.mdx new file mode 100644 index 000000000..11ed677ed --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/index.mdx @@ -0,0 +1,16 @@ +--- +page_title: Troubleshooting Terraform Enterprise +description: Use Terraform Enterprise logs and error messages to troubleshoot and debug errors. +--- + +# Troubleshooting overview + +This topic provides overview information about the troubleshooting tasks you can perform and the debugging information available through Terraform Enterprise interfaces to help your resolve errors with your deployment. + +## Workflows + +You can perform the following actions to troubleshoot your Terraform Enterprise deployment: + +1. [Contact HashiCorp support](/terraform/enterprise/deploy/troubleshoot/contact-support) and provide a support bundle to get help from the HashiCorp support team. +1. [Perform diagnistics](/terraform/enterprise/deploy/troubleshoot/perform-diagnostics), such as checking service health status and logs and enabling debug mode on Kubernetes. +1. Refer to the [error messages reference](/terraform/enterprise/deploy/troubleshoot/error-messages) for information about the errors Terraform Enterprise prints and steps to resolve them. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/perform-diagnostics.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/perform-diagnostics.mdx new file mode 100644 index 000000000..f45c4c0c9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/deploy/troubleshoot/perform-diagnostics.mdx @@ -0,0 +1,122 @@ +--- +page_title: Perform diagnostics on your Terraform Enterprise deployment +description: >- + Instructions for diagnosing problems with your Terraform Enterprise deployment. +--- + +# Perform diagnostics on your Terraform Enterprise deployment + +This topic provides instructions on how to perform diagnostic tasks to identify and resolve errors with your Terraform Enterprise deployment. + +## Run a health check + +Terraform Enterprise provides a `/_health_check` endpoint on the instance. If +Terraform Enterprise is up, the health check will return a `200 OK`. + +The `/_health_check` endpoint operates in 2 modes: + +- Full check +- Minimal check + +With a full check, the service will attempt to verify the status of internal +components and PostgreSQL, in contrast to a minimal check which returns `200 +OK` automatically after a successful check. + +The endpoint's default behavior is to perform a full check during startup of +the instance, and minimal checks after Terraform Enterprise is active and +running. + +To force a full check, include the additional query parameter `?full=1`. This +parameter causes every call to make requests to internal components and +PostgreSQL, increasing system load and latency. Use it sparingly. + +## Generate a support bundle + +A support bundle is a collection of logs and other information about your +installation that you can then send to HashiCorp Support for further +troubleshooting. + +You can generate a support bundle using the `tfectl support bundle` command. +Refer to [Support bundle](/terraform/enterprise/deploy/reference/cli#support-bundle) +in the CLI reference for additional information. + +### Support bundle contents + +Support bundles contain the following information: + +- Logs for all Terraform Enterprise services. +- License information for the installation. +- The Terraform Enterprise environment configuration with redacted secrets. +- Additional diagnostic information about the container, such as the contents + of `/etc/hosts`, disk and memory usage, and network configuration. + +Logs are available within the bundle under the `host` directory. All other +information is available within the `results.json` file located at the root of +the bundle. + +## Check service status + +To check the status of the services, execute the following command within +Terraform Enterprise container. + +```bash +$ supervisorctl status +``` + +Terraform Enterprise lists all services and their status in the console. Refer to the [Terraform Enterprise services reference](/terraform/enterprise/deploy/reference/services) for information about each service. + +```sh +$ supervisorctl status + +logs RUNNING pid 39, uptime 1:38:49 +postgres RUNNING pid 103, uptime 1:38:48 +redis RUNNING pid 77, uptime 1:38:49 +tfe:archivist RUNNING pid 199, uptime 1:38:46 +tfe:atlas RUNNING pid 200, uptime 1:38:46 +tfe:atlas-ui RUNNING pid 201, uptime 1:38:46 +tfe:backup-restore RUNNING pid 203, uptime 1:38:46 +tfe:licensing RUNNING pid 205, uptime 1:38:46 +tfe:metrics RUNNING pid 211, uptime 1:38:46 +tfe:nginx RUNNING pid 215, uptime 1:38:46 +tfe:outbound-http-proxy RUNNING pid 220, uptime 1:38:46 +tfe:sidekiq RUNNING pid 238, uptime 1:38:46 +tfe:slug-ingress RUNNING pid 248, uptime 1:38:46 +tfe:task-worker RUNNING pid 257, uptime 1:38:46 +tfe:terraform-registry-api RUNNING pid 265, uptime 1:38:46 +tfe:terraform-registry-worker RUNNING pid 280, uptime 1:38:46 +tfe:terraform-state-parser RUNNING pid 291, uptime 1:38:46 +tfe:tfe-health-check RUNNING pid 298, uptime 1:38:46 +tfe:vault RUNNING pid 309, uptime 1:38:46 +tfe-next RUNNING pid 40, uptime 1:38:49 +``` + +## Inspect logs + +To inspect the logs for a particular service, execute the following command +within the Terraform Enterprise container where `SERVICE_NAME` is the name of a +Terraform Enterprise service. + +```sh +$ cat /var/log/terraform-enterprise/SERVICE_NAME.log +``` + +For example, we can see why `tfe:licensing` exited. + +```sh +$ cat /var/log/terraform-enterprise/licensing.log +{"@level":"info","@message":"initializing database","@module":"tfe-licensing","@timestamp":"2023-05-10T20:46:26.379084Z"} +{"@level":"error","@message":"error opening database connection","@module":"tfe-licensing","@timestamp":"2023-05-10T20:46:26.399064Z","error":"failed to connect to `host=/var/run/postgresql user=terraform-enterprise database=`: server error (FATAL: role \"terraform-enterprise\" does not exist (SQLSTATE 28000))"} +``` + +## Run Kubernetes in debug mode + +Terraform Enterprise dispatches plans and applies via jobs when running inside Kubernetes. These jobs are removed immediately +after their execution, which can make it hard to understand if a job failed due to cluster-specific errors. + +To make troubleshooting easier in these scenarios, it is possible to keep the kubernetes jobs alive for a limited period of time, +after which they will get garbage collected by the cluster. To enable this, provide the following environment variables to +the deployment, either via the `env.variables` entry in the `values.yaml` override, or via the `ConfigMap` attached to the +deployment holding all of the environment variables. + +- `TFE_RUN_PIPELINE_KUBERNETES_DEBUG_ENABLED`. Boolean flag to enable debug mode, set to `true`. +- `TFE_RUN_PIPELINE_KUBERNETES_DEBUG_JOBS_TTL`. (Optional) time in seconds after which the jobs will get deleted; default is `86400`. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/index.mdx new file mode 100644 index 000000000..0a1308d45 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/index.mdx @@ -0,0 +1,21 @@ +--- +page_title: Terraform Enterprise +description: >- + Terraform Enterprise is a self-hosted instance of HCP Terraform with + features like audit logging and SAML single sign-on. +--- + +# Terraform Enterprise + +Terraform Enterprise is HashiCorp's self-hosted distribution of [HCP Terraform](/terraform/cloud-docs). Terraform Enterprise offers a private instance of HCP Terraform application, with no resource limits and additional enterprise-grade architectural features like audit logging and SAML single sign-on. + +HCP Terraform and Terraform Enterprise are different distributions of the same application. When this documentation refers to HCP Terraform, the information applies to Terraform Enterprise unless specifically stated otherwise. + +-> **Introducing HCP Terraform**: Effective April 22, 2024, Terraform Cloud is now HCP Terraform. To learn more about this name change, refer to [Introducing the Infrastructure Cloud](https://www.hashicorp.com/blog/introducing-the-infrastructure-cloud). + +Before mid-2019, we referred to all distributions of HCP Terraform as Terraform Enterprise, and the self-hosted distribution as Private Terraform Enterprise (PTFE). These older names sometimes appear in supporting tools, like the [`tfe` Terraform provider](https://registry.terraform.io/providers/hashicorp/tfe/latest), which you can also use with HCP Terraform. + + +## Deploying Terraform Enterprise + +The [installation](/terraform/enterprise/deploy) and [administration](/terraform/enterprise/application-administration) instructions are for customers who feel confident that they can successfully deploy Terraform Enterprise on their own. If you are unsure, or have questions, please talk to your Solutions Engineer (pre-sales, POC or trial) or Customer Success Manager (existing customers). If you have read the documentation and are ready to schedule your install, please inform your Sales Engineer (pre-sales, POC or trial) or Customer Success Manager (existing customers) of your install time window so they can make sure they are available if necessary. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/aws-service-catalog/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/aws-service-catalog/index.mdx new file mode 100644 index 000000000..e06a14e92 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/aws-service-catalog/index.mdx @@ -0,0 +1,27 @@ +--- +page_title: Terraform Enterprise for AWS Service Catalog overview +description: >- + Terraform Enterprise for AWS Service Catalog lets you provision infrastructure + with HCP Terraform inside AWS Service Catalog. +source: terraform-docs-common +--- + +# HCP Terraform for AWS Service Catalog overview + +This integration allows administrators to curate a portfolio of pre-approved Terraform configurations on AWS Service Catalog. This enables end users like engineers, database administrators, and data scientists to deploy these Terraform configurations with a single action from the AWS interface. By combining HCP Terraform with AWS Service Catalog, we’re combining a self-service interface that many customers are familiar with, AWS Service Catalog, with the existing workflows and policy guardrails of HCP Terraform. + + + +@include 'tfc-package-callouts/aws-service-catalog.mdx' + + + +## Installation & Configuration + +To start using this integration, you'll need to install the [AWS Service Catalog Engine for Terraform Cloud](https://github.com/hashicorp/aws-service-catalog-engine-for-tfc) provided by HashiCorp on GitHub by following the [setup instructions](https://github.com/hashicorp/aws-service-catalog-engine-for-tfc#getting-started) provided in the README. If you run into any setup troubles along the way, the README also includes [troubleshooting steps](https://github.com/hashicorp/aws-service-catalog-engine-for-tfc#troubleshooting) that should help resolve common issues that you may encounter. + +With the engine installed, the necessary code and infrastructure to integrate the HCP Terraform engine with AWS Service Catalog will automatically be configured. The setup can be completed in just a few minutes, and it only needs to be done once. Once the setup is complete, you can immediately start using AWS Service Catalog to develop and manage AWS Service Catalog products, and make them accessible to your end users across all your accounts. + +## Usage + +You can access this new feature through the AWS Service Catalog console in any AWS regions where AWS Service Catalog is supported and follow the AWS Service Catalog Administrator Guide to [create your first Terraform product](https://docs.aws.amazon.com/servicecatalog/latest/adminguide/getstarted-product-Terraform.html). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/index.mdx new file mode 100644 index 000000000..dc8851bfb --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/index.mdx @@ -0,0 +1,26 @@ +--- +page_title: Integrations overview for Terraform Enterprise +description: >- + Use Terraform Enterprise integrations to connect HCP Terraform with + third-party platforms and systems. +source: terraform-docs-common +--- + +# Overview + +The HCP Terraform ecosystem features a variety of integrations to let HCP +Terraform connect with third-party systems and platforms. The following list +contains HashiCorp's official HCP Terraform integrations, which use HCP +Terraform's native APIs: + +- The [HCP Terraform Operator for Kubernetes](/terraform/enterprise/integrations/kubernetes) integration can manage HCP Terraform resources with Kubernetes custom resources. +- The [ServiceNow Service Catalog for Terraform](/terraform/enterprise/integrations/service-now/service-catalog-terraform) lets you provision self-serve infrastructure using ServiceNow. +- The [ServiceNow Service Graph Connector for Terraform](/terraform/enterprise/integrations/service-now/service-graph) integration lets you securely import HCP Terraform resources into your ServiceNow instance. +- The [HCP Terraform for Splunk](/terraform/enterprise/integrations/splunk) integration lets you pull HCP Terraform logs into Splunk. +- The [HCP Terraform for AWS Service Catalog](/terraform/enterprise/integrations/aws-service-catalog) integration lets you create pre-approved Terraform configurations on the AWS Service Catalog. + +If the platform you want to integrate HCP Terraform with does not have an +official integration, you can build a custom run task to integrate with a tool +of your choice. Run tasks can access plan details, display custom messages in +the run pipeline, and prevent runs from applying. Learn more about [Run +tasks](/terraform/enterprise/integrations/run-tasks). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/annotations-and-labels.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/annotations-and-labels.mdx new file mode 100644 index 000000000..e38bdb08c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/annotations-and-labels.mdx @@ -0,0 +1,26 @@ +--- +page_title: Terraform Enterprise Operator for Kubernetes annotations and labels +description: >- + Use annotations and labels with the Terraform Enterprise Operator for + Kubernetes to manage Terraform runs. +source: terraform-docs-common +--- + +# HCP Terraform Operator for Kubernetes annotations and labels + +This topic contains reference information about the annotations and labels the HCP Terraform and Terraform Enterprise operators use for Kubernetes. + +## Annotations + +| Annotation key | Target resources | Possible values | Description | +| -------------------------------------------------- | ---------------- | --------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `workspace.app.terraform.io/run-new` | Workspace | `"true"` | Set this annotation to `"true"` to trigger a new run. Example: `kubectl annotate workspace workspace.app.terraform.io/run-new="true"`. | +| `workspace.app.terraform.io/run-type` | Workspace | `plan`, `apply`, `refresh` | Specifies the run type. Changing this annotation does not start a new run. Refer to [Run Modes and Options](/terraform/enterprise/run/modes-and-options) for more information. Defaults to `"plan"`. | +| `workspace.app.terraform.io/run-terraform-version` | Workspace | Any valid Terraform version | Specifies the Terraform version to use. Changing this annotation does not start a new run. Only valid when the annotation `workspace.app.terraform.io/run-type` is set to `plan`. Defaults to the Workspace version. | + +## Labels + +| Label key | Target resources | Possible values | Description | +| -------------------------------------- | ---------------- | ------------------------ | ------------------------------------------------------------------------------------------- | +| `agentpool.app.terraform.io/pool-name` | Pod[Agent] | Any valid AgentPool name | Associate the resource with a specific agent pool by specifying the name of the agent pool. | +| `agentpool.app.terraform.io/pool-id` | Pod[Agent] | Any valid AgentPool ID | Associate the resource with a specific agent pool by specifying the ID of the agent pool. | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/api-reference.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/api-reference.mdx new file mode 100644 index 000000000..1c1be5281 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/api-reference.mdx @@ -0,0 +1,796 @@ +--- +page_title: Terraform Enterprise Operator for Kubernetes API reference +description: >- + Use the Terraform Enterprise Operator for Kubernetes API to manage HCP + Terraform workspaces, modules, and agent pools. +source: terraform-docs-common +--- + +# HCP Terraform Operator for Kubernetes API reference + +## Packages + +- [app.terraform.io/v1alpha2](#appterraformiov1alpha2) + +## app.terraform.io/v1alpha2 + +Package v1alpha2 contains API Schema definitions for the app v1alpha2 API group. + +### Resource Types + +- [AgentPool](#agentpool) +- [Module](#module) +- [Project](#project) +- [Workspace](#workspace) + +#### AgentDeployment + +_Appears in:_ + +- [AgentPoolSpec](#agentpoolspec) + +| Field | Description | +| -------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------- | +| `replicas` _integer_ | | +| `spec` _[PodSpec](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#podspec-v1-core)_ | | +| `annotations` _object (keys:string, values:string)_ | The annotations that the operator will apply to the pod template in the deployment. | +| `labels` _object (keys:string, values:string)_ | The labels that the operator will apply to the pod template in the deployment. | + +#### AgentDeploymentAutoscaling + +AgentDeploymentAutoscaling allows you to configure the operator to scale the deployment for an AgentPool up and down to meet demand. + +_Appears in:_ + +- [AgentPoolSpec](#agentpoolspec) + +| Field | Description | +| -------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `maxReplicas` _integer_ | MaxReplicas is the maximum number of replicas for the Agent deployment. | +| `minReplicas` _integer_ | MinReplicas is the minimum number of replicas for the Agent deployment. | +| `targetWorkspaces` _[TargetWorkspace](#targetworkspace)_ | TargetWorkspaces is a list of HCP Terraform Workspaces which the agent pool should scale up to meet demand. When this field is omitted the autoscaler will target all workspaces that are associated with the AgentPool. | +| `cooldownPeriodSeconds` _integer_ | CooldownPeriodSeconds is the time to wait between scaling events. Defaults to 300. | +| `cooldownPeriod` _[AgentDeploymentAutoscalingCooldownPeriod](#agentdeploymentautoscalingcooldownperiod)_ | CoolDownPeriod configures the period to wait between scaling up and scaling down | + +#### AgentDeploymentAutoscalingCooldownPeriod + +AgentDeploymentAutoscalingCooldownPeriod configures the period to wait between scaling up and scaling down, + +_Appears in:_ + +- [AgentDeploymentAutoscaling](#agentdeploymentautoscaling) + +| Field | Description | +| ---------------------------- | --------------------------------------------------------- | +| `scaleUpSeconds` _integer_ | ScaleUpSeconds is the time to wait before scaling up. | +| `scaleDownSeconds` _integer_ | ScaleDownSeconds is the time to wait before scaling down. | + +#### AgentDeploymentAutoscalingStatus + +AgentDeploymentAutoscalingStatus + +_Appears in:_ + +- [AgentPoolStatus](#agentpoolstatus) + +| Field | Description | +| -------------------------------------------------------------------------------------------------------------- | ----------------------------------- | +| `desiredReplicas` _integer_ | Desired number of agent replicas | +| `lastScalingEvent` _[Time](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#time-v1-meta)_ | Last time the agent pool was scaled | + +#### AgentPool + +AgentPool manages HCP Terraform Agent Pools, HCP Terraform Agent Tokens and can perform HCP Terraform Agent scaling. + +More information: + +- [Manage agent pools](/terraform/cloud-docs/agents/agent-pools) +- [Agent API tokens](/terraform/enterprise/users-teams-organizations/api-tokens#agent-api-tokens) +- [HCP Terraform agents](/terraform/cloud-docs/agents) + +| Field | Description | +| ------------------------------------------------------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `apiVersion` _string_ | `app.terraform.io/v1alpha2` | +| `kind` _string_ | `AgentPool` | +| `kind` _string_ | Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. [More information](https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds) | +| `apiVersion` _string_ | APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. [More information](https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources) | +| `metadata` _[ObjectMeta](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#objectmeta-v1-meta)_ | Refer to Kubernetes API documentation for fields of `metadata`. | +| `spec` _[AgentPoolSpec](#agentpoolspec)_ | | + +#### AgentPoolSpec + +AgentPoolSpec defines the desired state of AgentPool. + +_Appears in:_ + +- [AgentPool](#agentpool) + +| Field | Description | +| ------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------- | +| `name` _string_ | Agent Pool name. [More information](/terraform/cloud-docs/agents/agent-pools). | +| `organization` _string_ | Organization name where the Workspace will be created. [More information](/terraform/enterprise/users-teams-organizations/organizations). | +| `token` _[Token](#token)_ | API Token to be used for API calls. | +| `agentTokens` _[AgentToken](#agenttoken) array_ | List of the agent tokens to generate. | +| `agentDeployment` _[AgentDeployment](#agentdeployment)_ | Agent deployment settings | +| `autoscaling` _[AgentDeploymentAutoscaling](#agentdeploymentautoscaling)_ | Agent deployment settings | + +#### AgentToken + +Agent Token is a secret token that a HCP Terraform Agent is used to connect to the HCP Terraform Agent Pool. In `spec` only the field `Name` is allowed, the rest are used in `status`. + +More information: + +- [HCP Terraform agents](/terraform/cloud-docs/agents) + +_Appears in:_ + +- [AgentPoolSpec](#agentpoolspec) +- [AgentPoolStatus](#agentpoolstatus) + +| Field | Description | +| ---------------------- | ------------------------------------------------ | +| `name` _string_ | Agent Token name. | +| `id` _string_ | Agent Token ID. | +| `createdAt` _integer_ | Timestamp of when the agent token was created. | +| `lastUsedAt` _integer_ | Timestamp of when the agent token was last used. | + +#### ConfigurationVersionStatus + +A configuration version is a resource used to reference the uploaded configuration files. + +More information: + +- [Configuration versions API reference](/terraform/enterprise/api-docs/configuration-versions) +- [The API-driven run workflow](/terraform/enterprise/run/api) + +_Appears in:_ + +- [ModuleStatus](#modulestatus) + +| Field | Description | +| ------------- | ------------------------- | +| `id` _string_ | Configuration Version ID. | + +#### ConsumerWorkspace + +ConsumerWorkspace allows access to the state for specific workspaces within the same organization. Only one of the fields `ID` or `Name` is allowed. At least one of the fields `ID` or `Name` is mandatory. + +More information: + +- [Remote state access controls](/terraform/enterprise/workspaces/state#remote-state-access-controls) + +_Appears in:_ + +- [RemoteStateSharing](#remotestatesharing) + +| Field | Description | +| --------------- | -------------------------------------------------------------- | +| `id` _string_ | Consumer Workspace ID. Must match pattern: `^ws-[a-zA-Z0-9]+$` | +| `name` _string_ | Consumer Workspace name. | + +#### CustomPermissions + +Custom permissions let you assign specific, finer-grained permissions to a team than the broader fixed permission sets provide. + +More information: + +- [Custom workspace permissions](/terraform/enterprise/users-teams-organizations/permissions#custom-workspace-permissions) + +_Appears in:_ + +- [TeamAccess](#teamaccess) + +| Field | Description | +| ---------------------------- | ------------------------------------------------------------------------------------------------------------ | +| `runs` _string_ | Run access. Must be one of the following values: `apply`, `plan`, `read`. Default: `read`. | +| `runTasks` _boolean_ | Manage Workspace Run Tasks. Default: `false`. | +| `sentinel` _string_ | Download Sentinel mocks. Must be one of the following values: `none`, `read`. Default: `none`. | +| `stateVersions` _string_ | State access. Must be one of the following values: `none`, `read`, `read-outputs`, `write`. Default: `none`. | +| `variables` _string_ | Variable access. Must be one of the following values: `none`, `read`, `write`. Default: `none`. | +| `workspaceLocking` _boolean_ | Lock/unlock workspace. Default: `false`. | + +#### CustomProjectPermissions + +Custom permissions let you assign specific, finer-grained permissions to a team than the broader fixed permission sets provide. + +More information: + +- [Custom project permissions](/terraform/enterprise/users-teams-organizations/permissions#custom-project-permissions) +- [General workspace permissions](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) + +_Appears in:_ + +- [ProjectTeamAccess](#projectteamaccess) + +| Field | Description | +| ----------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `projectAccess` _[ProjectSettingsPermissionType](#projectsettingspermissiontype)_ | Project access. Must be one of the following values: `delete`, `read`, `update`. Default: `read`. | +| `teamManagement` _[ProjectTeamsPermissionType](#projectteamspermissiontype)_ | Team management. Must be one of the following values: `manage`, `none`, `read`. Default: `none`. | +| `createWorkspace` _boolean_ | Allow users to create workspaces in the project. This grants read access to all workspaces in the project. Default: `false`. | +| `deleteWorkspace` _boolean_ | Allows users to delete workspaces in the project. Default: `false`. | +| `moveWorkspace` _boolean_ | Allows users to move workspaces out of the project. A user must have this permission on both the source and destination project to successfully move a workspace from one project to another. Default: `false`. | +| `lockWorkspace` _boolean_ | Allows users to manually lock the workspace to temporarily prevent runs. When a workspace's execution mode is set to "local", users must have this permission to perform local CLI runs using the workspace's state. Default: `false`. | +| `runs` _[WorkspaceRunsPermissionType](#workspacerunspermissiontype)_ | Run access. Must be one of the following values: `apply`, `plan`, `read`. Default: `read`. | +| `runTasks` _boolean_ | Manage Workspace Run Tasks. Default: `false`. | +| `sentinelMocks` _[WorkspaceSentinelMocksPermissionType](#workspacesentinelmockspermissiontype)_ | Download Sentinel mocks. Must be one of the following values: `none`, `read`. Default: `none`. | +| `stateVersions` _[WorkspaceStateVersionsPermissionType](#workspacestateversionspermissiontype)_ | State access. Must be one of the following values: `none`, `read`, `read-outputs`, `write`. Default: `none`. | +| `variables` _[WorkspaceVariablesPermissionType](#workspacevariablespermissiontype)_ | Variable access. Must be one of the following values: `none`, `read`, `write`. Default: `none`. | + +#### DeletionPolicy + +_Underlying type:_ _string_ + +DeletionPolicy defines the strategy the Kubernetes operator uses when you delete a resource, either manually or by a system event. + +You must use one of the following values: + +- `retain`: When you delete the custom resource, the operator does not delete the workspace. +- `soft`: Attempts to delete the associated workspace only if it does not contain any managed resources. +- `destroy`: Executes a destroy operation to remove all resources managed by the associated workspace. Once the destruction of these resources is successful, the operator deletes the workspace, and then deletes the custom resource. +- `force`: Forcefully and immediately deletes the workspace and the custom resource. + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +#### Module + +Module implements API-driven Run Workflows. + +More information: + +- [The API-driven run workflow](/terraform/enterprise/run/api) + +| Field | Description | +| ------------------------------------------------------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `apiVersion` _string_ | `app.terraform.io/v1alpha2` | +| `kind` _string_ | `Module` | +| `kind` _string_ | Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. [More information](https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds) | +| `apiVersion` _string_ | APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. [More information](https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources) | +| `metadata` _[ObjectMeta](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#objectmeta-v1-meta)_ | Refer to Kubernetes API documentation for fields of `metadata`. | +| `spec` _[ModuleSpec](#modulespec)_ | | + +#### ModuleOutput + +Module outputs to store in ConfigMap(non-sensitive) or Secret(sensitive). + +_Appears in:_ + +- [ModuleSpec](#modulespec) + +| Field | Description | +| --------------------- | ----------------------------------------------------------------- | +| `name` _string_ | Output name must match with the module output. | +| `sensitive` _boolean_ | Specify whether or not the output is sensitive. Default: `false`. | + +#### ModuleSource + +Module source and version to execute. + +_Appears in:_ + +- [ModuleSpec](#modulespec) + +| Field | Description | +| ------------------ | ------------------------------------------------------------------------------------------- | +| `source` _string_ | Non local Terraform module source. [More information](/terraform/language/modules/sources). | +| `version` _string_ | Terraform module version. | + +#### ModuleSpec + +ModuleSpec defines the desired state of Module. + +_Appears in:_ + +- [Module](#module) + +| Field | Description | +| ----------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `organization` _string_ | Organization name where the Workspace will be created. [More information](/terraform/enterprise/users-teams-organizations/organizations). | +| `token` _[Token](#token)_ | API Token to be used for API calls. | +| `module` _[ModuleSource](#modulesource)_ | Module source and version to execute. | +| `workspace` _[ModuleWorkspace](#moduleworkspace)_ | Workspace to execute the module. | +| `name` _string_ | Name of the module that will be uploaded and executed. Default: `this`. | +| `variables` _[ModuleVariable](#modulevariable) array_ | Variables to pass to the module, they must exist in the Workspace. | +| `outputs` _[ModuleOutput](#moduleoutput) array_ | Module outputs to store in ConfigMap(non-sensitive) or Secret(sensitive). | +| `destroyOnDeletion` _boolean_ | Specify whether or not to execute a Destroy run when the object is deleted from the Kubernetes. Default: `false`. | +| `restartedAt` _string_ | Allows executing a new Run without changing any Workspace or Module attributes. Example: ``kubectl patch KIND NAME --type=merge --patch '{"spec": \{"restartedAt": "'\`date -u -Iseconds\`'"\}\}'`` | + +#### ModuleVariable + +Variables to pass to the module. + +_Appears in:_ + +- [ModuleSpec](#modulespec) + +| Field | Description | +| --------------- | ------------------------------------------ | +| `name` _string_ | Variable name must exist in the Workspace. | + +#### ModuleWorkspace + +Workspace to execute the module. Only one of the fields `ID` or `Name` is allowed. At least one of the fields `ID` or `Name` is mandatory. + +_Appears in:_ + +- [ModuleSpec](#modulespec) + +| Field | Description | +| --------------- | ------------------------------------------------------------ | +| `id` _string_ | Module Workspace ID. Must match pattern: `^ws-[a-zA-Z0-9]+$` | +| `name` _string_ | Module Workspace Name. | + +#### Notification + +Notifications allow you to send messages to other applications based on run and workspace events. + +More information: + +- [Workspace notifications](/terraform/enterprise/workspaces/settings/notifications) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| -------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `name` _string_ | Notification name. | +| `type` _[NotificationDestinationType](#notificationdestinationtype)_ | The type of the notification. Must be one of the following values: `email`, `generic`, `microsoft-teams`, `slack`. | +| `enabled` _boolean_ | Whether the notification configuration should be enabled or not. Default: `true`. | +| `token` _string_ | The token of the notification. | +| `triggers` _[NotificationTrigger](#notificationtrigger) array_ | The list of run events that will trigger notifications. Trigger represents the different TFC notifications that can be sent as a run's progress transitions between different states. There are two categories of triggers: - Health Events: `assessment:check_failure`, `assessment:drifted`, `assessment:failed`. - Run Events: `run:applying`, `run:completed`, `run:created`, `run:errored`, `run:needs_attention`, `run:planning`. | +| `url` _string_ | The URL of the notification. Must match pattern: `^https?://.*` | +| `emailAddresses` _string array_ | The list of email addresses that will receive notification emails. It is only available for Terraform Enterprise users. It is not available in HCP Terraform. | +| `emailUsers` _string array_ | The list of users belonging to the organization that will receive notification emails. | + +#### NotificationTrigger + +_Underlying type:_ _string_ + +NotificationTrigger represents the different TFC notifications that can be sent as a run's progress transitions between different states. This must be aligned with go-tfe type `NotificationTriggerType`. + +Must be one of the following values: `run:applying`, `assessment:check_failure`, `run:completed`, `run:created`, `assessment:drifted`, `run:errored`, `assessment:failed`, `run:needs_attention`, `run:planning`. + +_Appears in:_ + +- [Notification](#notification) + +#### OutputStatus + +Outputs status. + +_Appears in:_ + +- [ModuleStatus](#modulestatus) + +| Field | Description | +| ---------------- | -------------------------------------------------- | +| `runID` _string_ | Run ID of the latest run that updated the outputs. | + +#### PlanStatus + +_Appears in:_ + +- [WorkspaceStatus](#workspacestatus) + +| Field | Description | +| --------------------------- | ------------------------------------------------------- | +| `id` _string_ | Latest plan-only/speculative plan HCP Terraform run ID. | +| `terraformVersion` _string_ | The version of Terraform to use for this run. | + +#### Project + +Project manages HCP Terraform Projects. + +More information: + +- [Manage projects](/terraform/enterprise/projects/manage) + +| Field | Description | +| ------------------------------------------------------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `apiVersion` _string_ | `app.terraform.io/v1alpha2` | +| `kind` _string_ | `Project` | +| `kind` _string_ | Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. [More information](https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds) | +| `apiVersion` _string_ | APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. [More information](https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources) | +| `metadata` _[ObjectMeta](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#objectmeta-v1-meta)_ | Refer to Kubernetes API documentation for fields of `metadata`. | +| `spec` _[ProjectSpec](#projectspec)_ | | + +#### ProjectSpec + +ProjectSpec defines the desired state of Project. + +More information: + +- [Manage projects](/terraform/enterprise/workspaces/organize-workspaces-with-projects) + +_Appears in:_ + +- [Project](#project) + +| Field | Description | +| ------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `organization` _string_ | Organization name where the Workspace will be created. [More information](/terraform/enterprise/users-teams-organizations/organizations). | +| `token` _[Token](#token)_ | API Token to be used for API calls. | +| `name` _string_ | Name of the Project. | +| `teamAccess` _[ProjectTeamAccess](#projectteamaccess) array_ | HCP Terraform's access model is team-based. In order to perform an action within a HCP Terraform organization, users must belong to a team that has been granted the appropriate permissions. You can assign project-specific permissions to teams. More information: [Manage projects](/terraform/enterprise/workspaces/organize-workspaces-with-projects#permissions) and [Project permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions). | + +#### ProjectTeamAccess + +HCP Terraform's access model is team-based. In order to perform an action within a HCP Terraform organization, users must belong to a team that has been granted the appropriate permissions. You can assign project-specific permissions to teams. + +More information: + +- [Manage projects](/terraform/enterprise/workspaces/organize-workspaces-with-projects#permissions) +- [Project permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions) + +_Appears in:_ + +- [ProjectSpec](#projectspec) + +| Field | Description | +| ---------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `team` _[Team](#team)_ | Team to grant access. [More information](/terraform/enterprise/users-teams-organizations/teams). | +| `access` _[TeamProjectAccessType](#teamprojectaccesstype)_ | There are two ways to choose which permissions a given team has on a project: fixed permission sets, and custom permissions. Must be one of the following values: `admin`, `custom`, `maintain`, `read`, `write`. More information: [Project permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions) and [General project permissions](/terraform/enterprise/users-teams-organizations/permissions#general-project-permissions). | +| `custom` _[CustomProjectPermissions](#customprojectpermissions)_ | Custom permissions let you assign specific, finer-grained permissions to a team than the broader fixed permission sets provide. [More information](/terraform/enterprise/users-teams-organizations/permissions#custom-project-permissions). | + +#### RemoteStateSharing + +RemoteStateSharing allows remote state access between workspaces. By default, new workspaces in HCP Terraform do not allow other workspaces to access their state. + +More information: + +- [Accessing state from other workspaces](/terraform/enterprise/workspaces/state#accessing-state-from-other-workspaces) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| ------------------------------------------------------------ | -------------------------------------------------------------------------------------------- | +| `allWorkspaces` _boolean_ | Allow access to the state for all workspaces within the same organization. Default: `false`. | +| `workspaces` _[ConsumerWorkspace](#consumerworkspace) array_ | Allow access to the state for specific workspaces within the same organization. | + +#### RunStatus + +_Appears in:_ + +- [ModuleStatus](#modulestatus) +- [WorkspaceStatus](#workspacestatus) + +| Field | Description | +| ------------------------------- | ------------------------------------------------------- | +| `id` _string_ | Current(both active and finished) HCP Terraform run ID. | +| `configurationVersion` _string_ | The configuration version of this run. | +| `outputRunID` _string_ | Run ID of the latest run that could update the outputs. | + +#### RunTrigger + +RunTrigger allows you to connect this workspace to one or more source workspaces. These connections allow runs to queue automatically in this workspace on successful apply of runs in any of the source workspaces. + +Only one of the fields `ID` or `Name` is allowed. + +At least one of the fields `ID` or `Name` is mandatory. + +More information: + +- [Run triggers](/terraform/enterprise/workspaces/settings/run-triggers) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| --------------- | ------------------------------------------------------------ | +| `id` _string_ | Source Workspace ID. Must match pattern: `^ws-[a-zA-Z0-9]+$` | +| `name` _string_ | Source Workspace Name. | + +#### SSHKey + +SSH key used to clone Terraform modules. + +Only one of the fields `ID` or `Name` is allowed. + +At least one of the fields `ID` or `Name` is mandatory. + +More information: + +- [Use SSH Keys for cloning modules](/terraform/enterprise/workspaces/settings/ssh-keys) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| --------------- | ------------------------------------------------------- | +| `id` _string_ | SSH key ID. Must match pattern: `^sshkey-[a-zA-Z0-9]+$` | +| `name` _string_ | SSH key name. | + +#### Tag + +_Underlying type:_ _string_ + +Tags allows you to correlate, organize, and even filter workspaces based on the assigned tags. + +Tags must be one or more characters; can include letters, numbers, colons, hyphens, and underscores; and must begin and end with a letter or number. + +Must match pattern: `^[A-Za-z0-9][A-Za-z0-9:_-]*$` + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +#### TargetWorkspace + +TargetWorkspace is the name or ID of the workspace you want autoscale against. + +_Appears in:_ + +- [AgentDeploymentAutoscaling](#agentdeploymentautoscaling) + +| Field | Description | +| ----------------------- | --------------------------------------------------------------------------------------- | +| `id` _string_ | Workspace ID | +| `name` _string_ | Workspace Name | +| `wildcardName` _string_ | Wildcard Name to match match workspace names using `*` on name suffix, prefix, or both. | + +#### Team + +Teams are groups of HCP Terraform users within an organization. If a user belongs to at least one team in an organization, they are considered a member of that organization. + +Only one of the fields `ID` or `Name` is allowed. + +At least one of the fields `ID` or `Name` is mandatory. + +More information: + +- [Teams overview](/terraform/enterprise/users-teams-organizations/teams) + +_Appears in:_ + +- [ProjectTeamAccess](#projectteamaccess) +- [TeamAccess](#teamaccess) + +| Field | Description | +| --------------- | -------------------------------------------------- | +| `id` _string_ | Team ID. Must match pattern: `^team-[a-zA-Z0-9]+$` | +| `name` _string_ | Team name. | + +#### TeamAccess + +HCP Terraform workspaces can only be accessed by users with the correct permissions. You can manage permissions for a workspace on a per-team basis. When a workspace is created, only the owners team and teams with the "manage workspaces" permission can access it, with full admin permissions. These teams' access can't be removed from a workspace. + +More information: + +- [Manage access to workspaces](/terraform/enterprise/workspaces/settings/access) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| -------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `team` _[Team](#team)_ | Team to grant access. [More information](/terraform/enterprise/users-teams-organizations/teams). | +| `access` _string_ | There are two ways to choose which permissions a given team has on a workspace: fixed permission sets, and custom permissions. Must be one of the following values: `admin`, `custom`, `plan`, `read`, `write`. [More information](/terraform/enterprise/users-teams-organizations/permissions#workspace-permissions). | +| `custom` _[CustomPermissions](#custompermissions)_ | Custom permissions let you assign specific, finer-grained permissions to a team than the broader fixed permission sets provide. [More information](/terraform/enterprise/users-teams-organizations/permissions#custom-workspace-permissions). | + +#### Token + +Token refers to a Kubernetes Secret object within the same namespace as the Workspace object + +_Appears in:_ + +- [AgentPoolSpec](#agentpoolspec) +- [ModuleSpec](#modulespec) +- [ProjectSpec](#projectspec) +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| ------------------------------------------------------------------------------------------------------------------------------------ | ------------------------------------------------------ | +| `secretKeyRef` _[SecretKeySelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#secretkeyselector-v1-core)_ | Selects a key of a secret in the workspace's namespace | + +#### ValueFrom + +ValueFrom source for the variable's value. Cannot be used if value is not empty. + +_Appears in:_ + +- [Variable](#variable) + +| Field | Description | +| --------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------- | +| `configMapKeyRef` _[ConfigMapKeySelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#configmapkeyselector-v1-core)_ | Selects a key of a ConfigMap. | +| `secretKeyRef` _[SecretKeySelector](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#secretkeyselector-v1-core)_ | Selects a key of a Secret. | + +#### Variable + +Variables let you customize configurations, modify Terraform's behavior, and store information like provider credentials. + +More information: + +- [Workspace variables](/terraform/enterprise/workspaces/variables) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| ------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `name` _string_ | Name of the variable. | +| `description` _string_ | Description of the variable. | +| `hcl` _boolean_ | Parse this field as HashiCorp Configuration Language (HCL). This allows you to interpolate values at runtime. Default: `false`. | +| `sensitive` _boolean_ | Sensitive variables are never shown in the UI or API. They may appear in Terraform logs if your configuration is designed to output them. Default: `false`. | +| `value` _string_ | Value of the variable. | +| `valueFrom` _[ValueFrom](#valuefrom)_ | Source for the variable's value. Cannot be used if value is not empty. | + +#### VariableSetStatus + +_Appears in:_ + +- [WorkspaceStatus](#workspacestatus) + +| Field | Description | +| --------------- | ----------- | +| `id` _string_ | | +| `name` _string_ | | + +#### VariableStatus + +_Appears in:_ + +- [WorkspaceStatus](#workspacestatus) + +| Field | Description | +| -------------------- | --------------------------------------------------- | +| `name` _string_ | Name of the variable. | +| `id` _string_ | ID of the variable. | +| `versionID` _string_ | VersionID is a hash of the variable on the TFC end. | +| `valueID` _string_ | ValueID is a hash of the variable on the CRD end. | +| `category` _string_ | Category of the variable. | + +#### VersionControl + +VersionControl settings for the workspace's VCS repository, enabling the UI/VCS-driven run workflow. Omit this argument to utilize the CLI-driven and API-driven workflows, where runs are not driven by webhooks on your VCS provider. + +More information: + +- [UI and VCS-driven run workflow](/terraform/enterprise/run/ui) +- [Connect to VCS Providers](/terraform/enterprise/vcs) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| ---------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `oAuthTokenID` _string_ | The VCS Connection (OAuth Connection + Token) to use. Must match pattern: `^ot-[a-zA-Z0-9]+$` | +| `repository` _string_ | A reference to your VCS repository in the format `/` where `` and `` refer to the organization and repository in your VCS provider. | +| `branch` _string_ | The repository branch that Run will execute from. This defaults to the repository's default branch (e.g. main). | +| `speculativePlans` _boolean_ | Whether this workspace allows automatic speculative plans on PR. Default: `true`. More information: [Speculative plans on pull requests](/terraform/enterprise/run/ui#speculative-plans-on-pull-requests) and [Speculative plans](/terraform/enterprise/run/remote-operations#speculative-plans). | + +#### Workspace + +Workspace manages HCP Terraform Workspaces. + +More information: + +- [Workspaces](/terraform/enterprise/workspaces) + +| Field | Description | +| ------------------------------------------------------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `apiVersion` _string_ | `app.terraform.io/v1alpha2` | +| `kind` _string_ | `Workspace` | +| `kind` _string_ | Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. [More information](https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds) | +| `apiVersion` _string_ | APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. [More information](https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources) | +| `metadata` _[ObjectMeta](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#objectmeta-v1-meta)_ | Refer to Kubernetes API documentation for fields of `metadata`. | +| `spec` _[WorkspaceSpec](#workspacespec)_ | | + +#### WorkspaceAgentPool + +AgentPool allows HCP Terraform to communicate with isolated, private, or on-premises infrastructure. + +Only one of the fields `ID` or `Name` is allowed. + +At least one of the fields `ID` or `Name` is mandatory. + +More information: + +- [HCP Terraform agents](/terraform/cloud-docs/agents) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| --------------- | --------------------------------------------------------- | +| `id` _string_ | Agent Pool ID. Must match pattern: `^apool-[a-zA-Z0-9]+$` | +| `name` _string_ | Agent Pool name. | + +#### WorkspaceProject + +Projects let you organize your workspaces into groups. + +Only one of the fields `ID` or `Name` is allowed. + +At least one of the fields `ID` or `Name` is mandatory. + +More information: + +- [Organize workspaces with projects](/terraform/tutorials/cloud/projects) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| --------------- | ---------------------------------------------------- | +| `id` _string_ | Project ID. Must match pattern: `^prj-[a-zA-Z0-9]+$` | +| `name` _string_ | Project name. | + +#### WorkspaceRunTask + +Run tasks allow HCP Terraform to interact with external systems at specific points in the HCP Terraform run lifecycle. + +Only one of the fields `ID` or `Name` is allowed. + +At least one of the fields `ID` or `Name` is mandatory. + +More information: + +- [Run tasks](/terraform/enterprise/workspaces/settings/run-tasks) + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| --------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `id` _string_ | Run Task ID. Must match pattern: `^task-[a-zA-Z0-9]+$` | +| `name` _string_ | Run Task Name. | +| `enforcementLevel` _string_ | Run Task Enforcement Level. Can be one of `advisory` or `mandatory`. Default: `advisory`. Must be one of the following values: `advisory`, `mandatory` Default: `advisory`. | +| `stage` _string_ | Run Task Stage. Must be one of the following values: `pre_apply`, `pre_plan`, `post_plan`. Default: `post_plan`. | + +#### WorkspaceSpec + +WorkspaceSpec defines the desired state of Workspace. + +_Appears in:_ + +- [Workspace](#workspace) + +| Field | Description | +| -------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `name` _string_ | Workspace name. | +| `organization` _string_ | Organization name where the Workspace will be created. [More information](/terraform/enterprise/users-teams-organizations/organizations). | +| `token` _[Token](#token)_ | API Token to be used for API calls. | +| `applyMethod` _string_ | Define either change will be applied automatically(auto) or require an operator to confirm(manual). Must be one of the following values: `auto`, `manual`. Default: `manual`. [More information](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply). | +| `allowDestroyPlan` _boolean_ | Allows a destroy plan to be created and applied. Default: `true`. [More information](/terraform/enterprise/workspaces/settings#destruction-and-deletion). | +| `description` _string_ | Workspace description. | +| `agentPool` _[WorkspaceAgentPool](#workspaceagentpool)_ | HCP Terraform Agents allow HCP Terraform to communicate with isolated, private, or on-premises infrastructure. [More information](/terraform/cloud-docs/agents). | +| `executionMode` _string_ | Define where the Terraform code will be executed. Must be one of the following values: `agent`, `local`, `remote`. Default: `remote`. [More information](/terraform/enterprise/workspaces/settings#execution-mode). | +| `runTasks` _[WorkspaceRunTask](#workspaceruntask) array_ | Run tasks allow HCP Terraform to interact with external systems at specific points in the HCP Terraform run lifecycle. [More information](/terraform/enterprise/workspaces/settings/run-tasks). | +| `tags` _[Tag](#tag) array_ | Workspace tags are used to help identify and group together workspaces. Tags must be one or more characters; can include letters, numbers, colons, hyphens, and underscores; and must begin and end with a letter or number. | +| `teamAccess` _[TeamAccess](#teamaccess) array_ | HCP Terraform workspaces can only be accessed by users with the correct permissions. You can manage permissions for a workspace on a per-team basis. When a workspace is created, only the owners team and teams with the "manage workspaces" permission can access it, with full admin permissions. These teams' access can't be removed from a workspace. [More information](/terraform/enterprise/workspaces/settings/access). | +| `terraformVersion` _string_ | The version of Terraform to use for this workspace. If not specified, the latest available version will be used. Must match pattern: `^\\d\{1\}\\.\\d\{1,2\}\\.\\d\{1,2\}$` [More information](/terraform/enterprise/workspaces/settings#terraform-version) | +| `workingDirectory` _string_ | The directory where Terraform will execute, specified as a relative path from the root of the configuration directory. [More information](/terraform/enterprise/workspaces/settings#terraform-working-directory) | +| `environmentVariables` _[Variable](#variable) array_ | Terraform Environment variables for all plans and applies in this workspace. Variables defined within a workspace always overwrite variables from variable sets that have the same type and the same key. More information: [Workspace variables](/terraform/enterprise/workspaces/variables) and [Environment variables](/terraform/enterprise/workspaces/variables#environment-variables). | +| `terraformVariables` _[Variable](#variable) array_ | Terraform variables for all plans and applies in this workspace. Variables defined within a workspace always overwrite variables from variable sets that have the same type and the same key. More information: [Workspace variables](/terraform/enterprise/workspaces/variables) and [Terraform variables](/terraform/enterprise/workspaces/variables#terraform-variables). | +| `remoteStateSharing` _[RemoteStateSharing](#remotestatesharing)_ | Remote state access between workspaces. By default, new workspaces in HCP Terraform do not allow other workspaces to access their state. [More information](/terraform/enterprise/workspaces/state#accessing-state-from-other-workspaces). | +| `runTriggers` _[RunTrigger](#runtrigger) array_ | Run triggers allow you to connect this workspace to one or more source workspaces. These connections allow runs to queue automatically in this workspace on successful apply of runs in any of the source workspaces. [More information](/terraform/enterprise/workspaces/settings/run-triggers). | +| `versionControl` _[VersionControl](#versioncontrol)_ | Settings for the workspace's VCS repository, enabling the UI/VCS-driven run workflow. Omit this argument to utilize the CLI-driven and API-driven workflows, where runs are not driven by webhooks on your VCS provider. More information: [UI and VCS-driven run workflow](/terraform/enterprise/run/ui) and [Connect to VCS providers](/terraform/enterprise/vcs) | +| `sshKey` _[SSHKey](#sshkey)_ | SSH key used to clone Terraform modules. [More information](/terraform/enterprise/workspaces/settings/ssh-keys). | +| `notifications` _[Notification](#notification) array_ | Notifications allow you to send messages to other applications based on run and workspace events. [More information](/terraform/enterprise/workspaces/settings/notifications). | +| `project` _[WorkspaceProject](#workspaceproject)_ | Projects let you organize your workspaces into groups. Default: default organization project. [More information](/terraform/tutorials/cloud/projects). | +| `deletionPolicy` _[DeletionPolicy](#deletionpolicy)_ | The Deletion Policy specifies the behavior of the custom resource and its associated workspace when the custom resource is deleted. - `retain`: When you delete the custom resource, the operator does not delete the workspace. - `soft`: Attempts to delete the associated workspace only if it does not contain any managed resources. - `destroy`: Executes a destroy operation to remove all resources managed by the associated workspace. Once the destruction of these resources is successful, the operator deletes the workspace, and then deletes the custom resource. - `force`: Forcefully and immediately deletes the workspace and the custom resource. Default: `retain`. | +| `variableSets` _[WorkspaceVariableSet](#workspacevariableset) array_ | HCP Terraform variable sets let you reuse variables in an efficient and centralized way. [More information](/terraform/tutorials/cloud/cloud-multiple-variable-sets) | + +#### WorkspaceVariableSet + +_Appears in:_ + +- [WorkspaceSpec](#workspacespec) + +| Field | Description | +| --------------- | ----------------------------------------------------------------------------------------------------------------------------------------------- | +| `id` _string_ | ID of the variable set. Must match pattern: `varset-[a-zA-Z0-9]+$` [More information](/terraform/tutorials/cloud/cloud-multiple-variable-sets). | +| `name` _string_ | Name of the variable set. [More information](/terraform/tutorials/cloud/cloud-multiple-variable-sets). | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/index.mdx new file mode 100644 index 000000000..0b3e18a39 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/index.mdx @@ -0,0 +1,220 @@ +--- +page_title: Terraform Enterprise Operator for Kubernetes overview +description: >- + The Terraform Enterprise Operator for Kubernetes allows you to provision + infrastructure directly from the Kubernetes control plane. +source: terraform-docs-common +--- + +# HCP Terraform Operator for Kubernetes overview + +The [HCP Terraform Operator for Kubernetes](https://github.com/hashicorp/hcp-terraform-operator) allows you to manage HCP Terraform resources with Kubernetes custom resources. You can provision infrastructure internal or external to your Kubernetes cluster directly from the Kubernetes control plane. + +The operator's CustomResourceDefinitions (CRD) let you dynamically create HCP Terraform workspaces with Terraform modules, populate workspace variables, and provision infrastructure with Terraform runs. + +## Key benefits + +The HCP Terraform Operator for Kubernetes v2 offers several improvements over v1: + +- **Flexible resource management**: The operator now features multiple custom resources, each with separate controllers for different HCP Terraform resources. This provides additional flexibility and the ability to manage more custom resources concurrently, significantly improving performance for large-scale deployments. + +- **Namespace management**: The `--namespace` option allows you to tailor the operator's watch scope to specific namespaces, which enables more fine-grained resource management. + +- **Configurable synchronization**: The `--sync-period` option allows you to configure the synchronization frequency between custom resources and HCP Terraform, ensuring timely updates and smoother operations. + +## Supported HCP Terraform features + +The HCP Terraform Operator for Kubernetes allows you to create agent pools, deploy modules, and manage workspaces through Kubernetes controllers. These controllers enable you to automate and manage HCP Terraform resources using custom resources in Kubernetes. + +### Agent pools + +Agent pools in HCP Terraform manage the execution environment for Terraform runs. The HCP Terraform Operator for Kubernetes allows you to create and manage agent pools as part of your Kubernetes infrastructure. + +The following example creates a new agent pool with the name `agent-pool-development` and generates an agent token with the name `token-red`. + +```yaml +--- +apiVersion: app.terraform.io/v1alpha2 +kind: AgentPool +metadata: + name: my-agent-pool +spec: + organization: kubernetes-operator + token: + secretKeyRef: + name: tfc-operator + key: token + name: agent-pool-development + agentTokens: + - name: token-red +``` + +The operator stores the `token-red` agent token in a Kubernetes secret named `my-agent-pool-token-red`. + +You can also enable agent autoscaling by providing a `.spec.autoscaling` configuration in your `AgentPool` specification. + + + +```yaml +--- +apiVersion: app.terraform.io/v1alpha2 +kind: AgentPool +metadata: + name: this +spec: + organization: kubernetes-operator + token: + secretKeyRef: + name: tfc-operator + key: token + name: agent-pool-development + agentTokens: + - name: token-red + agentDeployment: + replicas: 1 + autoscaling: + targetWorkspaces: + - name: us-west-development + - id: ws-NUVHA9feCXzAmPHx + - wildcardName: eu-development-* + minReplicas: 1 + maxReplicas: 3 + cooldownPeriod: + scaleUpSeconds: 30 + scaleDownSeconds: 30 +``` + + + +In the above example, the operator ensures that at least one agent pod is continuously running and dynamically scales the number of pods up to a maximum of three based on the workload or resource demand. The operator then monitors resource demands by observing the load of the designated workspaces specified by the `name`, `id`, or `wildcardName` patterns. When the workload decreases, the operator downscales the number of agent pods. + +Refer to the [agent pool API reference](/terraform/enterprise/integrations/kubernetes/api-reference#agentpool) for the complete `AgentPool` specification. + +### Module + +The `Module` controller enforces an [API-driven Run workflow](/terraform/enterprise/run/api) and lets you deploy Terraform modules within workspaces. + +The following example deploys version `1.0.0` of the `hashicorp/module/random` module in the `workspace-name` workspace. + +```yaml +--- +apiVersion: app.terraform.io/v1alpha2 +kind: Module +metadata: + name: my-module +spec: + organization: kubernetes-operator + token: + secretKeyRef: + name: tfc-operator + key: token + module: + source: hashicorp/module/random + version: 1.0.0 + workspace: + name: workspace-name + variables: + - name: string_length + outputs: + - name: random_string +``` + +The operator passes the workspace's `string_length` variable to the module and stores the `random_string` outputs as either a Kubernetes secret or a ConfigMap. If the workspace marks the output as `sensitive`, the operator stores the `random_string` as a Kubernetes secret; otherwise, the operator stores it as a ConfigMap. The variables must be accessible within the workspace as a workspace variable, workspace variable set, or project variable set. + +Refer to the [module API reference](/terraform/enterprise/integrations/kubernetes/api-reference#module) for the complete `Module` specification. + +### Project + +Projects let you organize your workspaces and scope access to workspace resources. The `Project` controller allows you to create, configure, and manage [projects](/terraform/tutorials/cloud/projects) directly from Kubernetes. + +The following example creates a new project named `testing`. + +```yaml +--- +apiVersion: app.terraform.io/v1alpha2 +kind: Project +metadata: + name: testing +spec: + organization: kubernetes-operator + token: + secretKeyRef: + name: tfc-operator + key: token + name: project-demo +``` + +The `Project` controller allows you to manage team access [permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions). + +The following example creates a project named `testing` and grants the `qa` team admin access to the project. + + + +```yaml +--- +apiVersion: app.terraform.io/v1alpha2 +kind: Project +metadata: + name: testing +spec: + organization: kubernetes-operator + token: + secretKeyRef: + name: tfc-operator + key: token + name: project-demo + teamAccess: + - team: + name: qa + access: admin +``` + + + +Refer to the [project API reference](/terraform/enterprise/integrations/kubernetes/api-reference#project) for the complete `Project` specification. + +### Workspace + +HCP Terraform workspaces organize and manage Terraform configurations. The HCP Terraform Operator for Kubernetes allows you to create, configure, and manage workspaces directly from Kubernetes. + +The following example creates a new workspace named `us-west-development`, configured to use Terraform version `1.6.2`. This workspace has two variables, `nodes` and `rds-secret`. The variable `rds-secret` is treated as sensitive, and the operator reads the value for the variable from a Kubernetes secret named `us-west-development-secrets`. + +```yaml +--- +apiVersion: app.terraform.io/v1alpha2 +kind: Workspace +metadata: + name: us-west-development +spec: + organization: kubernetes-operator + token: + secretKeyRef: + name: tfc-operator + key: token + name: us-west-development + description: US West development workspace + terraformVersion: 1.6.2 + applyMethod: auto + agentPool: + name: ap-us-west-development + terraformVariables: + - name: nodes + value: 2 + - name: rds-secret + sensitive: true + valueFrom: + secretKeyRef: + name: us-west-development-secrets + key: rds-secret + runTasks: + - name: rt-us-west-development + stage: pre_plan +``` + +In the above example, the `applyMethod` has the value of `auto`, so HCP Terraform automatically applies any changes to this workspace. The specification also configures the workspace to use the `ap-us-west-development` agent pool and run the `rt-us-west-development` run task at the `pre_plan` stage. + +The operator stores the value of the workspace outputs as Kubernetes secrets or ConfigMaps. If the outputs are marked as `sensitive`, they are stored as Kubernetes secrets, otherwise they are stored as ConfigMaps. + +-> **Note**: The operator rolls back any external modifications made to the workspace to match the state specified in the custom resource definition. + +Refer to the [workspace API reference](/terraform/enterprise/integrations/kubernetes/api-reference#workspace) for the complete `Workspace` specification. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/ops-v2-migration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/ops-v2-migration.mdx new file mode 100644 index 000000000..49c8bc127 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/ops-v2-migration.mdx @@ -0,0 +1,342 @@ +--- +page_title: Migrate to Terraform Enterprise Operator for Kubernetes v2 +description: >- + Learn how to upgrade the Terraform Kubernetes Operator from version 1 to + version 2. +source: terraform-docs-common +--- + +# Migrate to HCP Terraform Operator for Kubernetes v2 + +~> **Warning**: Version 1 of the HCP Terraform Operator for Kubernetes is **deprecated** and no longer maintained. If you are installing the operator for the first time, refer to [Set up the HCP Terraform Operator for Kubernetes](/terraform/enterprise/integrations/kubernetes/setup) for guidance. + +To upgrade the HCP Terraform Operator for Kubernetes from version 1 to the HCP Terraform Operator for Kubernetes (version 2), there is a one-time process that you need to complete. This process upgrades the operator to the newest version and migrate your custom resources. + +## Prerequisites + +The migration process requires the following tools to be installed locally: + +- [kubectl](https://kubernetes.io/docs/tasks/tools/#kubectl) +- [Helm](https://helm.sh/docs/intro/install/) + +## Prepare for the upgrade + +Configure an environment variable named `RELEASE_NAMESPACE` with the value of the namespace that the Helm chart is installed in. + +```shell-session +$ export RELEASE_NAMESPACE= +``` + +Next, create an environment variable named `RELEASE_NAME` with the value of the name that you gave your installation for the Helm chart. + +```shell-session +$ export RELEASE_NAME= +``` + +Before you migrate to HCP Terraform Operator for Kubernetes v2, you must first update v1 of the operator to the latest version, including the custom resource definitions. + +```shell-session +$ helm upgrade --namespace ${RELEASE_NAMESPACE} ${RELEASE_NAME} hashicorp/terraform +``` + +Next, backup the workspace resources. + +```shell-session +$ kubectl get workspace --all-namespaces -o yaml > backup_tfc_operator_v1.yaml +``` + +## Manifest schema migration + +Version 2 of the HCP Terraform Operator for Kubernetes renames and moves many existing fields. When you migrate, you must update your specification to match version 2's field names. + +### Workspace controller + +The table below lists the field mapping of the `Workspace` controller between v1 and v2 of the operator. + +| Version 1 | Version 2 | Changes between versions | +| --------------------------------------- | ---------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `apiVersion: app.terraform.io/v1alpha1` | `apiVersion: app.terraform.io/v1alpha2` | The `apiVersion` is now `v1alpha2`. | +| `kind: Workspace` | `kind: Workspace` | None. | +| `metadata` | `metadata` | None. | +| `spec.organization` | `spec.organization` | None. | +| `spec.secretsMountPath` | `spec.token.secretKeyRef` | In v2 the operator keeps the HCP Terraform access token in a Kubernetes Secret. | +| `spec.vcs` | `spec.versionControl` | Renamed the `vcs` field to `versionControl`. | +| `spec.vcs.token_id` | `spec.versionControl.oAuthTokenID` | Renamed the `token_id` field to `oAuthTokenID`. | +| `spec.vcs.repo_identifier` | `spec.versionControl.repository` | Renamed the `repo_identifier` field to `repository`. | +| `spec.vcs.branch` | `spec.versionControl.branch` | None. | +| `spec.vcs.ingress_submodules` | `spec.workingDirectory` | Moved. | +| `spec.variables.[*]` | `spec.environmentVariables.[*]` OR `spec.terraformVariables.[*]` | We split variables into two possible places. In v1's CRD, if `spec.variables.environmentVariable` was `true`, migrate those variables to `spec.environmentVariables`. If `false`, migrate those variables to `spec.terraformVariables`. | +| `spec.variables.[*]key` | `spec.environmentVariables.[*]name` OR `spec.terraformVariables.[*]name` | Renamed the `key` field as `name`. [Learn more](#workspace-variables). | +| `spec.variables.[*]value` | `spec.environmentVariables.[*]value` OR `spec.terraformVariables.[*]value` | [Learn more](#workspace-variables). | +| `spec.variables.[*]valueFrom` | `spec.environmentVariables.[*]valueFrom` OR `spec.terraformVariables.[*]valueFrom` | [Learn more](#workspace-variables). | +| `spec.variables.[*]hcl` | `spec.environmentVariables.[*]hcl` OR `spec.terraformVariables.[*]hcl` | [Learn more](#workspace-variables). | +| `spec.variables.sensitive` | `spec.environmentVariables.[*]sensitive` OR `spec.terraformVariables.[*]sensitive` | [Learn more](#workspace-variables). | +| `spec.variables.environmentVariable` | N/A | Removed, variables are split between `spec.environmentVariables` and `spec.terraformVariables`. | +| `spec.runTriggers.[*]` | `spec.runTriggers.[*]` | None. | +| `spec.runTriggers.[*].sourceableName` | `spec.runTriggers.[*].name` | The `sourceableName` field is now `name`. | +| `spec.sshKeyID` | `spec.sshKey.id` | Moved the `sshKeyID` to `spec.sshKey.id`. | +| `spec.outputs` | N/A | Removed. | +| `spec.terraformVersion` | `spec.terraformVersion` | None. | +| `spec.notifications.[*]` | `spec.notifications.[*]` | None. | +| `spec.notifications.[*].type` | `spec.notifications.[*].type` | None. | +| `spec.notifications.[*].enabled` | `spec.notifications.[*].enabled` | None. | +| `spec.notifications.[*].name` | `spec.notifications.[*].name` | None. | +| `spec.notifications.[*].url` | `spec.notifications.[*].url` | None. | +| `spec.notifications.[*].token` | `spec.notifications.[*].token` | None. | +| `spec.notifications.[*].triggers.[*]` | `spec.notifications.[*].triggers.[*]` | None. | +| `spec.notifications.[*].recipients.[*]` | `spec.notifications.[*].emailAddresses.[*]` | Renamed the `recipients` field to `emailAddresses`. | +| `spec.notifications.[*].users.[*]` | `spec.notifications.[*].emailUsers.[*]` | Renamed the `users` field to `emailUsers`. | +| `spec.omitNamespacePrefix` | N/A | Removed. In v1 `spec.omitNamespacePrefix` is a boolean field that affects how the operator generates a workspace name. In v2, you must explicitly set workspace names in `spec.name`. | +| `spec.agentPoolID` | `spec.agentPool.id` | Moved the `agentPoolID` field to `spec.agentPool.id`. | +| `spec.agentPoolName` | `spec.agentPool.name` | Moved the `agentPoolName` field to `spec.agentPool.name`. | +| `spec.module` | N/A | Removed. You now configure modules with a separate `Module` CRD. [Learn more](#module-controller). | + +Below is an example of configuring a variable in v1 of the operator. + + + +```yaml +apiVersion: app.terraform.io/v1alpha1 +kind: Workspace +metadata: + name: migration + spec: + variables: + - key: username + value: "user" + hcl: true + sensitive: false + environmentVariable: false + - key: SECRET_KEY + value: "s3cr3t" + hcl: false + sensitive: false + environmentVariable: true +``` + + + +In v2 of the operator, you must configure Terraform variables in `spec.terraformVariables` and environment variables `spec.environmentVariables`. + + + +```yaml +apiVersion: app.terraform.io/v1alpha2 +kind: Workspace +metadata: + name: migration + spec: + terraformVariables: + - name: username + value: "user" + hcl: true + sensitive: false + environmentVariables: + - name: SECRET_KEY + value: "s3cr3t" + hcl: false + sensitive: false +``` + + + +### Module controller + +HCP Terraform Operator for Kubernetes v2 configures modules in a new `Module` controller separate from the `Workspace` controller. Below is a template of a custom resource manifest: + +```yaml +apiVersion: app.terraform.io/v1alpha2 +kind: Module +metadata: + name: +spec: + organization: + token: + secretKeyRef: + name: + key: + name: operator +``` + +The table below describes the mapping between the `Workspace` controller from v1 and the `Module` controller in v2 of the operator. + +| Version 1 (Workspace CRD) | Version 2 (Module CRD) | Notes | +| ---------------------------------------------------------- | -------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `spec.module` | N/A | In v2 of the operator a `Module` is a separate controller with its own CRD. | +| N/A | `spec.name: operator` | In v1 of the operator, the name of the generated module is hardcoded to `operator`. In v2, the default name of the generated module is `this`, but you can rename it. | +| `spec.module.source` | `spec.module.source` | This supports all Terraform [module sources](/terraform/language/modules/sources). | +| `spec.module.version` | `spec.module.version` | Refer to [module sources](/terraform/language/modules/sources) for versioning information for each module source. | +| `spec.variables.[*]` | `spec.variables.[*].name` | You should include variable names in the module. This is a reference to variables in the workspace that is executing the module. | +| `spec.outputs.[*].key` | `spec.outputs.[*].name` | You should include output names in the module. This is a reference to the output variables produced by the module. | +| `status.workspaceID` OR `metadata.namespace-metadata.name` | `spec.workspace.id` OR `spec.workspace.name` | The workspace where the module is executed. The workspace must be in the same organization. | + +Below is an example migration of a `Module` between v1 and v2 of the operator: + + + +```yaml +apiVersion: app.terraform.io/v1alpha1 +kind: Workspace +metadata: + name: migration +spec: + module: + source: app.terraform.io/org-name/module-name/provider + version: 0.0.42 + variables: + - key: username + value: "user" + hcl: true + sensitive: false + environmentVariable: false + - key: SECRET_KEY + value: "s3cr3t" + hcl: false + sensitive: false + environmentVariable: true +``` + + + +In v2 of the operator, separate controllers manage workspace and modules. + + + +```yaml +apiVersion: app.terraform.io/v1alpha2 +kind: Workspace +metadata: + name: migration + spec: + terraformVariables: + - name: username + value: "user" + hcl: true + sensitive: false + environmentVariables: + - name: SECRET_KEY + value: "s3cr3t" + hcl: false + sensitive: false +``` + + + + + +```yaml +apiVersion: app.terraform.io/v1alpha2 +kind: Module +metadata: + name: migration +spec: + name: operator + module: + source: app.terraform.io/org-name/module-name/provider + version: 0.0.42 + workspace: + name: migration +``` + + + +## Upgrade the operator + +Download Workspace CRD patch A: + +```shell-session +$ curl -sO https://raw.githubusercontent.com/hashicorp/hcp-terraform-operator/main/docs/migration/crds/workspaces_patch_a.yaml +``` + +View the changes that patch A applies to the workspace CRD. + +```shell-session +$ kubectl diff --filename workspaces_patch_a.yaml +``` + +Patch the workspace CRD with patch A. This patch adds `app.terraform.io/v1alpha2` support, but excludes `.status.runStatus` because it has a different format in `app.terraform.io/v1alpha1` and causes JSON un-marshalling issues. + +!> **Upgrade warning**: Once you apply a patch, Kubernetes converts existing `app.terraform.io/v1alpha1` custom resources to `app.terraform.io/v1alpha2` according to the updated schema, meaning that v1 of the operator can no longer serve custom resources. Before patching, update your existing custom resources to satisfy the v2 schema requirements. [Learn more](#manifest-schema-migration). + +```shell-session +$ kubectl patch crd workspaces.app.terraform.io --patch-file workspaces_patch_a.yaml +``` + +Install the Operator v2 Helm chart with the `helm install` command. Be sure to set the `operator.watchedNamespaces` value to the list of namespaces your Workspace resources are deployed to. If this value is not provided, the operator will watch all namespaces in the Kubernetes cluster. + +```shell-session +$ helm install \ + ${RELEASE_NAME} hashicorp/hcp-terraform-operator \ + --version 2.4.0 \ + --namespace ${RELEASE_NAMESPACE} \ + --set 'operator.watchedNamespaces={white,blue,red}' \ + --set controllers.agentPool.workers=5 \ + --set controllers.module.workers=5 \ + --set controllers.workspace.workers=5 +``` + +Next, create a Kubernetes secret to store the HCP Terraform API token following the [Usage Guide](https://github.com/hashicorp/hcp-terraform-operator/blob/main/docs/usage.md#prerequisites). The API token can be copied from the Kubernetes secret that you created for v1 of the operator. By default, this is named `terraformrc`. Use the `kubectl get secret` command to get the API token. + +```shell-session +$ kubectl --namespace ${RELEASE_NAMESPACE} get secret terraformrc -o json | jq '.data.credentials' | tr -d '"' | base64 -d +``` + +Update existing custom resources [according to the schema migration guidance](#manifest-schema-migration) and apply your changes. + +```shell-session +$ kubectl apply --filename +``` + +Download Workspace CRD patch B. + +```shell-session +$ curl -sO https://raw.githubusercontent.com/hashicorp/hcp-terraform-operator/main/docs/migration/crds/workspaces_patch_b.yaml +``` + +View the changes that patch B applies to the workspace CRD. + +```shell-session +$ kubectl diff --filename workspaces_patch_b.yaml +``` + +Patch the workspace CRD with patch B. This patch adds `.status.runStatus` support, which was excluded in patch A. + +```shell-session +$ kubectl patch crd workspaces.app.terraform.io --patch-file workspaces_patch_b.yaml +``` + +The v2 operator will fail to proceed if a custom resource has the v1 finalizer `finalizer.workspace.app.terraform.io`. If you encounter an error, check the logs for more information. + +```shell-session +$ kubectl logs -f +``` + +Specifically, look for an error message such as the following. + + ERROR Migration {"workspace": "default/", "msg": "spec contains old finalizer finalizer.workspace.app.terraform.io"} + +The `finalizer` exists to provide greater control over the migration process. Verify the custom resource, and when you’re ready to migrate it, use the `kubectl patch` command to update the `finalizer` value. + +```shell-session +$ kubectl patch workspace migration --type=merge --patch '{"metadata": {"finalizers": ["workspace.app.terraform.io/finalizer"]}}' +``` + +Review the operator logs once more and verify there are no error messages. + +```shell-session +$ kubectl logs -f +``` + +The operator reconciles resources during the next sync period. This interval is set by the `operator.syncPeriod` configuration of the operator and defaults to five minutes. + +If you have any migrated `Module` custom resources, apply them now. + +```shell-session +$ kubectl apply --filename +``` + +In v2 of the operator, the `applyMethod` is set to `manual` by default. In this case, a new run in a managed workspace requires manual approval. Run the following command for each `Workspace` resource to change it to `auto` approval. + +```shell-session +$ kubectl patch workspace --type=merge --patch '{"spec": {"applyMethod": "auto"}}' +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/setup.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/setup.mdx new file mode 100644 index 000000000..fa9517afb --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/kubernetes/setup.mdx @@ -0,0 +1,98 @@ +--- +page_title: Set up the Terraform Enterprise Operator for Kubernetes +description: >- + Learn how to install and configure the Terraform Enterprise Operator for + Kubernetes. +source: terraform-docs-common +--- + +# Set up the HCP Terraform Operator for Kubernetes + +The HCP Terraform Operator for Kubernetes' CustomResourceDefinitions (CRD) allow you to dynamically create HCP Terraform workspaces with Terraform modules, populate workspace variables, and provision infrastructure with Terraform runs. + +You can install the operator with the official [HashiCorp Helm chart](https://github.com/hashicorp/hcp-terraform-operator). + +## Prerequisites + +All HCP Terraform users can use the HCP Terraform Operator for Kubernetes. You can use the operator to manage the supported features that your organization's pricing tier enables. + +## Networking requirements + +The HCP Terraform Operator for Kubernetes makes outbound requests over HTTPS (TCP port 443) to the HCP Terraform application APIs. This may require perimeter networking as well as container host networking changes, depending on your environment. Refer to [HCP Terraform IP Ranges](/terraform/enterprise/architectural-details/ip-ranges) for more information about IP ranges. Below, we list the services that run on specific IP ranges. + +| Hostname | Port/Protocol | Directionality | Purpose | +| ------------------ | -------------- | -------------- | --------------------------------------------------------------------------------------------------------------- | +| `app.terraform.io` | tcp/443, HTTPS | Outbound | Dynamically managing HCP Terraform workspaces and returning the output to Kubernetes with the HCP Terraform API | + +For self-managed Terraform Enterprise instances, ensure that the operator can reach your Terraform Enterprise hostname over HTTPS (TCP port 443). + +## Compatibility + +The HCP Terraform Operator for Kubernetes supports the following versions: + +- Helm 3.0.1 and above +- Kubernetes 1.15 and above + +## Install and configure + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to integrate with Kubernetes. + +2. Generate an [organization token](/terraform/enterprise/users-teams-organizations/api-tokens#organization-api-tokens) within HCP Terraform or Terraform Enterprise and save it to a file. These instructions assume you are using a file named `credentials`. + +3. Set the `NAMESPACE` environment variable. This will be the namespace that you will install the Helm chart to. + + export NAMESPACE=tfc-operator-system + +4. Create the namespace. + + kubectl create namespace $NAMESPACE + +5. Create a [Kubernetes Secret](https://kubernetes.io/docs/concepts/configuration/secret/) with the HCP Terraform API credentials. + + kubectl -n $NAMESPACE create secret generic terraformrc --from-file=credentials + +6. Add sensitive variables, such as your cloud provider credentials, to the namespace. + + kubectl -n $NAMESPACE create secret generic workspacesecrets --from-literal=secret_key=abc123 + +7. Add the HashiCorp Helm repository. + + helm repo add hashicorp https://helm.releases.hashicorp.com + +8. Install the [HCP Terraform Operator for Kubernetes with Helm](https://github.com/hashicorp/hcp-terraform-operator). By default, the operator communicates with `app.terraform.io`. When deploying in a self-managed Terraform Enterprise, you must set the `operator.tfeAddress` to the specific hostname of the Terraform Enterprise instance. + + - The following example command installs the Helm chart for HCP Terraform Cloud, which is the default: + + ```shell-session + $ helm install --namespace ${RELEASE_NAMESPACE} hashicorp/hcp-terraform-operator tfc-operator + ``` + + - To install the Helm chart for self-managed Terraform Enterprise, specify your instance's hostname: + + ```shell-session + $ helm install --namespace ${RELEASE_NAMESPACE} hashicorp/hcp-terraform-operator tfc-operator \ + --set operator.tfeAddress="TERRAFORM_ENTERPRISE_HOSTNAME" + ``` + + - Alternatively, you can set this configuration in the [value.yaml](https://github.com/hashicorp/hcp-terraform-operator/blob/main/charts/hcp-terraform-operator/values.yaml) file. + + ```yaml + operator: + tfeAddress: + ``` + + - Use the following command to apply the values.yaml file: + + ```shell-session + $ helm install --namespace ${NAMESPACE} hashicorp/hcp-terraform-operator tfc-operator -f value.yaml + ``` + +9. To create a Terraform workspace, agent pool or etc, you can find different [examples](https://github.com/hashicorp/hcp-terraform-operator/tree/main/docs/examples) of the YAML manifests. + +### Upgrade + +When a new version of the HCP Terraform Operator for Kubernetes Helm Chart is available from the HashiCorp Helm repository, you can upgrade with the following command. + +```shell-session +$ helm upgrade --namespace ${RELEASE_NAMESPACE} hashicorp/hcp-terraform-operator tfc-operator +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/run-tasks/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/run-tasks/index.mdx new file mode 100644 index 000000000..c64b59a21 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/run-tasks/index.mdx @@ -0,0 +1,109 @@ +--- +page_title: Set up Terraform Enterprise run task integrations +description: >- + Use run tasks to execute tasks in external systems at specific points in the + Terraform Enterprise run lifecycle. +source: terraform-docs-common +--- + +# Set up run task integrations + +In addition to using existing technology partners integrations, HashiCorp HCP Terraform customers can build their own custom run task integrations. Custom integrations have access to plan details in between the plan and apply phase, and can display custom messages within the run pipeline as well as prevent a run from continuing to the apply phase. + + + +@include 'tfc-package-callouts/run-tasks.mdx' + + + +## Prerequisites + +To build a custom integration, you must have a server capable of receiving requests from HCP Terraform and responding with a status update to a supplied callback URL. When creating a run task, you supply an endpoint url to receive the hook. We send a test POST to the supplied URL, and it must respond with a 200 for the run task to be created. + +This feature relies heavily on the proper parsing of [plan JSON output](/terraform/internals/json-format). When sending this output to an external system, be certain that system can properly interpret the information provided. + +## Available Run Tasks + +You can view the most up-to-date list of run tasks in the [Terraform Registry](https://registry.terraform.io/browse/run-tasks). + +## Integration Details + +When a run reaches the appropriate phase and a run task is triggered, the supplied URL will receive details about the run in a payload similar to the one below. The server receiving the run task should respond `200 OK`, or Terraform will retry to trigger the run task. + +Refer to the [Run Task Integration API](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) for the exact payload specification. + +```json +{ + "payload_version": 1, + "stage": "post_plan", + "access_token": "4QEuyyxug1f2rw.atlasv1.iDyxqhXGVZ0ykes53YdQyHyYtFOrdAWNBxcVUgWvzb64NFHjcquu8gJMEdUwoSLRu4Q", + "capabilities": { + "outcomes": true + }, + "configuration_version_download_url": "https://app.terraform.io/api/v2/configuration-versions/cv-ntv3HbhJqvFzamy7/download", + "configuration_version_id": "cv-ntv3HbhJqvFzamy7", + "is_speculative": false, + "organization_name": "hashicorp", + "plan_json_api_url": "https://app.terraform.io/api/v2/plans/plan-6AFmRJW1PFJ7qbAh/json-output", + "run_app_url": "https://app.terraform.io/app/hashicorp/my-workspace/runs/run-i3Df5to9ELvibKpQ", + "run_created_at": "2021-09-02T14:47:13.036Z", + "run_created_by": "username", + "run_id": "run-i3Df5to9ELvibKpQ", + "run_message": "Triggered via UI", + "task_result_callback_url": "https://app.terraform.io/api/v2/task-results/5ea8d46c-2ceb-42cd-83f2-82e54697bddd/callback", + "task_result_enforcement_level": "mandatory", + "task_result_id": "taskrs-2nH5dncYoXaMVQmJ", + "vcs_branch": "main", + "vcs_commit_url": "https://github.com/hashicorp/terraform-random/commit/7d8fb2a2d601edebdb7a59ad2088a96673637d22", + "vcs_pull_request_url": null, + "vcs_repo_url": "https://github.com/hashicorp/terraform-random", + "workspace_app_url": "https://app.terraform.io/app/hashicorp/my-workspace", + "workspace_id": "ws-ck4G5bb1Yei5szRh", + "workspace_name": "tfr_github_0", + "workspace_working_directory": "/terraform" +} +``` + +Once your server receives this payload, HCP Terraform expects you to callback to the supplied `task_result_callback_url` using the `access_token` as an [Authentication Header](/terraform/enterprise/api-docs#authentication) with a [jsonapi](/terraform/enterprise/api-docs#json-api-formatting) payload of the form: + +```json +{ + "data": { + "type": "task-results", + "attributes": { + "status": "running", + "message": "Hello task", + "url": "https://example.com", + "outcomes": [...] + } + } +} +``` + +HCP Terraform expects this callback within 10 minutes, or the task will be considered to have `errored`. The supplied message attribute will be displayed in HCP Terraform on the run details page. The status can be `running`, `passed` or `failed`. + +Here's what the data flow looks like: + +![Screenshot: a diagram of the user and data flow for an HCP Terraform run task](/img/docs/terraform-cloud-run-tasks-diagram.png) + +Refer to the [run task integration API](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration#structured-results) for the exact payload specifications, and the [run task JSON schema](https://github.com/hashicorp/terraform-docs-common/blob/main/website/public/schema/run-tasks/runtask-result.json) for code generation and payload validation. + +## Securing your Run Task + +When creating your run task, you can supply an HMAC key which HCP Terraform will use to create a signature of the payload in the `X-Tfc-Task-Signature` header when calling your service. + +The signature is a sha512 sum of the webhook body using the provided HMAC key. The generation of the signature depends on your implementation, however an example of how to generate a signature in bash is provided below. + +```bash +$ echo -n $WEBHOOK_BODY | openssl dgst -sha512 -hmac "$HMAC_KEY" +``` + +## HCP Packer Run Task + +> **Hands On:** Try the [Set Up HCP Terraform Run Task for HCP Packer](/packer/tutorials/hcp/setup-hcp-terraform-run-task), [Standard tier run task image validation](/packer/tutorials/hcp/run-tasks-data-source-image-validation), and [Plus tier run task image validation](/packer/tutorials/hcp/run-tasks-resource-image-validation) tutorials to set up and test the HCP Terraform Run Task integration end to end. + +[Packer](https://www.packer.io/) lets you create identical machine images for multiple platforms from a single source template. The [HCP Packer registry](/hcp/docs/packer) lets you track golden images, designate images for test and production environments, and query images to use in Packer and Terraform configurations. + +The HCP Packer validation run task checks the image artifacts within a Terraform configuration. If the configuration references images marked as unusable (revoked), the run task fails and provides an error message containing the number of revoked artifacts and whether HCP Packer has metadata for newer versions. For HCP Packer Plus registries, run tasks also help you identify hardcoded and untracked images that may not meet security and compliance requirements. + +To get started, [create an HCP Packer account](https://cloud.hashicorp.com/products/packer) and follow the instructions in the [HCP Packer Run Task](/hcp/docs/packer/manage-image-use/terraform-cloud-run-tasks) documentation. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/admin-guide.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/admin-guide.mdx new file mode 100644 index 000000000..735371a43 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/admin-guide.mdx @@ -0,0 +1,56 @@ +--- +page_title: Configure the ServiceNow Service Catalog integration +description: Learn how to configure the ServiceNow Service Catalog integration workers. +source: terraform-docs-common +--- + +# Configure the ServiceNow Service Catalog integration + +ServiceNow administrators have several options with configuring the Terraform +integration. + +If you haven't yet installed the integration, see the [installation +documentation](/terraform/enterprise/integrations/service-now/service-catalog-terraform). + +Once the integration has been installed, you can add and customize a service +catalog and VCS repositories using the [service catalog +documentation](/terraform/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config). + +You can also configure how frequently ServiceNow will poll HCP Terraform using +the documentation below. + +## Configure Polling Workers + +The integration includes 3 ServiceNow Scheduled Flows to poll the HCP Terraform +API using ServiceNow Outbound HTTP REST requests. By default, all flows +schedules are set to 5 minutes. These can be customized inside the ServiceNow +Server Studio: + +1. Select the Worker Poll Run State Flow. +2. Adjust Repeat Intervals +3. Click "Done" +4. Click "Save" +5. Click "Activate" + +### Worker Poll Apply Run + +This worker approves runs for any workspaces that have finished a Terraform plan +and are ready to apply their changes. It also adds a comment on the request item +for those workspaces notifying that a run has been triggered. + +### Worker Poll Destroy Workspace + +This worker looks for any records in the Terraform ServiceNow table that are +marked for deletion with the value `is_destroyable` set to true. It then checks +the status of the workspace to ensure it is ready to be deleted. Once the +destroy run has been completed, this work will send the delete request for the +workspace to Terraform. + +### Worker Poll Run State + +The worker synchronizes ServiceNow with the current run state of Terraform +workspaces by polling the HCP Terraform API. On state changes, the worker adds +a comment to the ServiceNow request item with the updated run state and other +metadata. + +![screenshot: ServiceNow integration comments](/img/docs/service-now-comments.png) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/developer-reference.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/developer-reference.mdx new file mode 100644 index 000000000..13ae4b216 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/developer-reference.mdx @@ -0,0 +1,112 @@ +--- +page_title: ServiceNow Service Catalog integration developer reference +description: Learn how developers can customize the ServiceNow Service Catalog integration. +source: terraform-docs-common +--- + +# Terraform ServiceNow Service Catalog Integration Developer Reference + +The Terraform ServiceNow integration can be customized by ServiceNow developers +using the information found in this document. + +## Terraform Variables and ServiceNow Variable Sets + +ServiceNow has the concept of a Variable Set which is a collection of ServiceNow +Variables that can be referenced in a Flow from a Service Catalog item. The +Terraform Integration codebase can create [Terraform Variables and Terraform +Environment Variables](/terraform/enterprise/workspaces/variables) via the API using the +`tf_variable.createVariablesFromSet()` function. + +This function looks for variables following these conventions: + +| ServiceNow Variable Name | HCP Terraform Variable | +| -------------------------------- | ---------------------------------------------------------- | +| `tf_var_VARIABLE_NAME` | Terraform Variable: `VARIABLE_NAME` | +| `tf_env_ENV_NAME` | Environment Variable: `ENV_NAME` | +| `sensitive_tf_var_VARIABLE_NAME` | Sensitive Terraform Variable (Write Only): `VARIABLE_NAME` | +| `sensitive_tf_env_ENV_NAME` | Sensitive Environment Variable (Write Only): `ENV_NAME` | + +This function takes the ServiceNow Variable Set and HCP Terraform workspace +ID. It will loop through the given variable set collection and create any +necessary Terraform variables or environment variables in the workspace. + +## Customizing with ServiceNow "Script Includes" Libraries + +The Terraform/ServiceNow Integration codebase includes [ServiceNow Script +Includes +Classes](https://docs.servicenow.com/csh?topicname=c_ScriptIncludes.html&version=latest) +that are used to interface with HCP Terraform. The codebase also includes +example catalog items and flows that implement the interface to the HCP Terraform API. + +These classes and examples can be used to help create ServiceNow Catalog Items +customized to your specific ServiceNow instance and requirements. + +### Script Include Classes + +The ServiceNow Script Include Classes can be found in the ServiceNow Studio > +Server Development > Script Include. + +| Class Name | Description | +| ---------------------- | -------------------------------------------------------------- | +| `tf_config` | Helper to pull values from the SN Terraform Configs Table | +| `tf_get_workspace` | Client-callable script to retrieve workspace data | +| `tf_http` | ServiceNow HTTP REST wrapper for requests to the Terraform API | +| `tf_no_code_workspace` | Resources for Terraform no-code module API requests | +| `tf_run` | Resources for Terraform run API requests | +| `tf_terraform_record` | Manage ServiceNow Terraform Table Records | +| `tf_test_config` | Client-callable script to test Terraform connectivity | +| `tf_util` | Miscellaneous helper functions | +| `tf_variable` | Resources for Terraform variable API Requests | +| `tf_vcs_record` | Manage ServiceNow Terraform VCS repositories table records | +| `tf_workspace` | Resources for Terraform workspace API requests | + +### Example Service Catalog Flows and Actions + +The ServiceNow Service Catalog for Terraform provides sample catalog items that use **Flows** +and **Workflows** as their primary process engines. **Flows** are a newer solution developed +by ServiceNow and are generally preferred over **Workflows**. To see which engine an item is using, open it +in the edit mode and navigate to the **Process Engine** tab. For example, **Create Workspace** uses a **Workflow**, +whereas **Create Workspace Flow** is built upon a **Flow**. You can access both in the **Studio**. You can also +manage **Flows** in the **Flow Designer**. To manage **Workflows**, navigate to **All > Workflow Editor**. + +You can find the ServiceNow Example Flows for Terraform in the **ServiceNow Studio > Flows** (or **All > Flow Designer**). +Search for items that belong to the **Terraform** application. By default, Flows execute when someone submits an order request +for a catalog item based on a Flow. Admins can customize the Flows and Actions to add approval flows, set approval rules based +on certain conditions, and configure multiple users or roles as approvers for specific catalog items. + +| Flow Name | Description | +| ------------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| Create Workspace | Creates a new HCP Terraform workspace from VCS repository. | +| Create Workspace with Vars | Creates a new HCP Terraform workspace from VCS repository and creates any variables provided. | +| Create Run | Creates and queues a new run in the HCP Terraform workspace. | +| Apply Run | Applies a run in the HCP Terraform workspace. | +| Provision Resources | Creates a new HCP Terraform workspace (with auto-apply), creates and queues a run, then applies the run when ready. | +| Provision Resources with Vars | Creates a new HCP Terraform workspace (with auto-apply), creates any variables, creates/queues a run, applies the run when ready. | +| Provision No-Code Workspace and Deploy Resources | Creates a new HCP Terraform workspace based on a no-code module configured in the private registry (with auto-apply), creates any variables, creates and queues a run, then applies the run when ready. | +| Delete Workspace | Creates a destroy run plan. | +| Worker Poll Run State | Polls the HCP Terraform API for the current run state of a workspace. | +| Worker Poll Apply Run | Polls the HCP Terraform API and applies any pending Terraform runs. | +| Worker Poll Destroy Workspace | Queries ServiceNow Terraform Records for resources marked `is_destroyable`, applies the destroy run to destroy resources, and deletes the corresponding Terraform workspace. | +| Update No-Code Workspace and Deploy Resources | Updates an existing no-code workspace to the most recent no-code module version, updates that workspace's attached variable values, and then starts a new Terraform run. | +| Update Workspace | Updates HCP Terraform workspace configurations, such as VCS repository, description, project, execution mode, and agent pool ID (if applicable). | +| Update Workspace with Vars | Allows you to change details about the HCP Terraform workspace configurations and attached variable values. | +| Update Resources | Updates HCP Terraform workspace details and starts a new Terraform run with these new values. | +| Update Resources with Vars | Updates your existing HCP Terraform workspace and its variables, then starts a Terraform run with these updated values. | + +## ServiceNow ACLs + +Access control lists (ACLs) restrict user access to objects and operations based +on permissions granted. This integration includes the following roles that can +be used to manage various components. + +| Access Control Roles | Description | +| :---------------------------------- | --------------------------------------------------------------------------------------------- | +| `x_terraform.config_user` | Can manage the connection from the ServiceNow application to your HCP Terraform organization. | +| `x_terraform.terraform_user` | Can manage all of the Terraform resources created in ServiceNow. | +| `x_terraform.vcs_repositories_user` | Can manage the VCS repositories available for catalog items to be ordered by end-users. | + +For users who only need to order from the Terraform Catalog, we recommend +creating another role with read-only permissions for +`x_terraform_vcs_repositories` to view the available repositories for ordering +infrastructure. Install the Terraform ServiceNow Service Catalog integration by +following [the installation guide](/terraform/enterprise/integrations/service-now/service-catalog-terraform). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/example-customizations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/example-customizations.mdx new file mode 100644 index 000000000..c14d11a22 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/example-customizations.mdx @@ -0,0 +1,174 @@ +--- +page_title: ServiceNow Service Catalog integration example configurations +description: >- + Learn from example common customizations of the ServiceNow Service Catalog + integration. +source: terraform-docs-common +--- + +# ServiceNow Service Catalog integration example configurations + +This example use case creates a Terraform Catalog Item for requesting resources +with custom variable values passed to the Terraform configuration. + +## Change the scope + +When you make a customization to the app, ensure you switch to the "Terraform" +scope. This guarantees that all items you create are correctly assigned to that +scope. To change the scope in your ServiceNow instance, click the globe icon at +the top right of the screen. For detailed instructions on changing the scope, +refer to the [ServiceNow +documentation](https://developer.servicenow.com/dev.do#!/learn/learning-plans/xanadu/new_to_servicenow/app_store_learnv2_buildneedit_xanadu_application_scope). + +## Make a copy of the existing Catalog Item + +The ServiceNow Service Catalog for Terraform application provides pre-configured [Catalog +Items](/terraform/enterprise/integrations/service-now/service-catalog-terraform/developer-reference#example-service-catalog-flows-and-actions) +for immediate use. We recommend creating a copy of the most recent version of the +Catalog Item to ensure you have access to the latest features and +improvements. Make a copy of the most appropriate Catalog Item for your specific +business requirements by following these steps: + +1. Navigate to **All > Service Catalog > Catalogs > Terraform Catalog**, and review the + Catalog Items based on flows, whose names use the suffix "Flow". + We recommend choosing Flows over Workflows because Flows provide enhanced functionality and performance and are actively developed by ServiceNow. + For more information, refer + to [Catalog Items based on Flows vs. Workflows](/terraform/enterprise/integrations/service-now/service-catalog-terraform/developer-reference#example-service-catalog-flows-and-actions). +2. Open the Catalog Item in editing mode: + 1. Click the Catalog Item to open the request form. + 2. Click **...** in the top right corner. + 3. Select **Configure Item** from the menu. + ![Screenshot: ServiceNow Configure Catalog Item](/img/docs/servicenow-catalog-configure-item.png "Screenshot of the ServiceNow Configure Catalog Item dropdown menu") +3. Click the **Process Engine** tab in the Catalog Item configuration. Take + note of the Flow name associated with the Catalog Item, because you need to + create a copy of this Flow as well. + ![Screenshot: ServiceNow Process Engine](/img/docs/servicenow-catalog-process-engine.png "Screenshot of the ServiceNow Configure Catalog Item – Process Engine tab") +4. Start the copying process: + 1. Click the **Copy** button above the **Related Links** section. + 2. Assign a new name to the copied Catalog Item. + 3. Optionally, modify the description and short description fields. + Right-click the header and select **Save**. + ![Screenshot: ServiceNow Copy Item](/img/docs/servicenow-catalog-copied-item.png "Screenshot of the copied ServiceNow Catalog Item") + +## Adjust the Variable Set + +If a Catalog Item requires users to input variable values, +you must update the variable set with those required variables. +Although some default Catalog Items come with pre-defined example variables, it +is common practice to remove these and replace them with your own custom +variables. + +1. Create a new Variable Set. + 1. On the Catalog Item's configuration page, under the **Related Links** + section, click the **Variable Sets** tab. + 2. Click the **New** button to create a new variable set. Ensure that the + variables in your new set match the variables required by your Terraform + configuration. + ![Screenshot: ServiceNow New Variable Set](/img/docs/servicenow-catalog-new-varset.png "Screenshot of the ServiceNow Catalog Item – new Variable Set") + 3. Select **Single-Row Variable Set** and provide a title and description. + 4. Click **Submit**. Upon submission, you will be redirected back to the Catalog + Item's configuration page. + ![Screenshot: ServiceNow New Variable Set Form](/img/docs/servicenow-catalog-new-varset-form.png "Screenshot of the ServiceNow Catalog Item – new Variable Set") + 5. Click the name of your newly created Variable Set and create your + variables. You must follow the [naming convention for Terraform + variables](/terraform/enterprise/integrations/service-now/service-catalog-terraform/developer-reference#terraform-variables-and-servicenow-variable-sets). + ServiceNow offers various types of variable representation (such as strings, + booleans, and dropdown menus). Refer to the [ServiceNow documentation on + variables](https://docs.servicenow.com/csh?topicname=c_ServiceCatalogVariables.html&version=latest) + and select the types that best suit your use case. You can also set default + values for the variables in the **Default Value** tab, which ServiceNow prefills for the end users. + ![Screenshot: ServiceNow New Variables](/img/docs/servicenow-catalog-variables.png "Screenshot of the ServiceNow Catalog Item – new variables") +2. Attach the newly created Variable Set to your custom Catalog Item and remove + the default Workspace Variables. + 1. Return to the **Variable Sets** tab on the Catalog Item's configuration page + and click the **Edit** button. + 2. Move the "Workspace Variables" Set from the right side to the left side + and click **Save**. Do not remove the + "Workspace Request Create" or the "Workspace Request Update" Sets. + ![Screenshot: ServiceNow Remove Example Variables](/img/docs/servicenow-catalog-remove-example-variables.png "Screenshot of the ServiceNow Catalog Item – new variables") + +## Make a copy of the Flow and Action + +1. Open the ServiceNow Studio by navigating to **All > Studio** and open the + "Terraform" application. Once in the **Terraform** application, navigate to + **Flow Designer > Flows**. + ![Screenshot: ServiceNow Flow Designer Interface](/img/docs/servicenow-catalog-original-flow.png "Screenshot of the ServiceNow Flow Designer – selecting a Flow") + + Another way to access the ServiceNow Studio is to click **All**, select + "Flow Designer", then select **Flows**. You can set the **Application** + filter to "Terraform" to quickly find the desired Flow. +2. Open the Flow referenced in your Catalog Item. Click **...** + in the top right corner of the Flow Designer interface and + select **Copy flow**. Provide a name for the copied Flow and + click **Copy**. + ![Screenshot: ServiceNow Copy Flow Interface](/img/docs/servicenow-catalog-copy-flow.png "Screenshot of the ServiceNow Flow Designer – copying a Flow") +3. Customize your newly copied Flow by clicking **Edit flow**. + ![Screenshot: ServiceNow Edit New Flow Interface](/img/docs/servicenow-catalog-edit-flow.png "Screenshot of the ServiceNow Flow Designer – editing a Flow") + 1. Do not change the **Service Catalog** trigger. + 2. Update the "Get Catalog Variables" action: + 1. Keep the "Requested Item Record" in the **Submitted Request** field. + 2. Select your newly created Catalog Item from the dropdown menu for + **Template Catalog Item**. + 3. Move all of your variables to the **Selected** side in the **Catalog + Variables** section. Remove any previous example variables from the + **Available** side. + ![Screenshot: ServiceNow Get Variables Flow Step](/img/docs/servicenow-catalog-get-variables.png "Screenshot of the ServiceNow Flow Designer – getting Variables step") + 4. Click **Done** to finish configuring this Action. +4. Unfold the second Action in the Flow and click the arrow to open it in + the Action Designer. + ![Screenshot: ServiceNow Open Action Designer](/img/docs/servicenow-catalog-open-action.png "Screenshot of the ServiceNow Action Designer") + 1. Click **...** in the top right corner and select **Copy Action**. + ![Screenshot: ServiceNow Copy Action](/img/docs/servicenow-catalog-copy-action.png "Screenshot of the ServiceNow Copy Action") + Rename it and click **Copy**. + ![Screenshot: ServiceNow Rename Action](/img/docs/servicenow-catalog-rename-action.png "Screenshot of the ServiceNow Rename Action") + 2. In the the Inputs section, remove any previous example variables. + ![Screenshot: ServiceNow Remove Variables From Action](/img/docs/servicenow-catalog-remove-example-variables-from-action.png "Screenshot of the ServiceNow Action Input Variables") + 3. Add your custom variables by clicking the **Create Input** button. Ensure that the variable names match your Catalog Item variables and select the variable type that matches each variable. Click **Save**. + ![Screenshot: ServiceNow Add Variables To Action](/img/docs/servicenow-catalog-add-variables-to-action.png "Screenshot of adding ServiceNow Action Input Variables") + 4. Open the **Script step** within the Action. Remove any example variables + and add your custom variables by clicking **Create Variable** at the + bottom. Enter the name of each variable and drag the corresponding data + pill from the right into the **Value field**. + ![Screenshot: ServiceNow Add Script Step Variables To Action](/img/docs/servicenow-catalog-adjust-script-variables.png "Screenshot of adjusting ServiceNow Action Script Variables") + 5. Click **Save** and then **Publish**. +5. Reopen the Flow and attach the newly created Action to the Flow + after "Get Catalog Variables" step: + 1. Remove the "Create Terraform Workspace with Vars" Action that you copied earlier and replace it with + your newly created Action. + ![Screenshot: ServiceNow Replace Action Step](/img/docs/servicenow-catalog-replace-action.png "Screenshot of replacing ServiceNow Action step") + 2. Connect the new Action to the Flow by dragging and dropping the data pills + from the "Get Catalog Variables" Action to the corresponding inputs of + your new Action. Click **Done** to save this step. + ![Screenshot: ServiceNow Fill Variables for Action](/img/docs/servicenow-catalog-fill-new-action-step.png "Screenshot of filling out ServiceNow Action variables") + 3. Click **Save**. + 4. Click **Activate** to enable the Flow and make it available for use. + +## Set the Flow for your Catalog Item + +1. Navigate back to the Catalog by clicking on **All** and then go to **Service + Catalog > Catalogs > Terraform Catalog**. +2. Locate your custom Catalog Item and click **...** at the top + of the item. From the dropdown menu, select **Configure item**. +3. In the configuration settings, click the **Process Engine** tab. +4. In the **Flow** field, search for the Flow you recently created. Click + the Flow then click the **Update**. + ![Screenshot: ServiceNow Update Process Engine](/img/docs/servicenow-catalog-update-process-engine.png "Screenshot of updating Process Engine for the Catalog Item") + +## Test the Catalog Item + +The new item is now available in the Terraform Service Catalog. To make the +new item accessible to your end users via the Service Portal, follow these +steps: + +1. Navigate to the configuration page of the item you want to make available. +2. Locate the **Catalogs** field on the configuration page and click the lock + icon next to it. +3. In the search bar, type "Service Catalog" and select it from the search + results. Add "Service Catalog" to the list of catalogs associated with the + item. Click the lock icon again to lock the changes. + ![Screenshot: ServiceNow Enable Service Portal](/img/docs/servicenow-catalog-service-portal.png "Screenshot of adding the Catalog Item to the Service Portal") +4. Click the **Update** button at the top of the page. + +After completing these steps, end users will be able to +access the new item through the Service Portal of your ServiceNow instance. You +can access the Service Portal by navigating to **All > Service Portal Home**. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/index.mdx new file mode 100644 index 000000000..83f011183 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/index.mdx @@ -0,0 +1,239 @@ +--- +page_title: Set up ServiceNow Service Catalog integration for Terraform Enterprise +description: >- + Learn how to set up the ServiceNow Service Catalog integration for Terraform + Enterprise. +source: terraform-docs-common +--- + +# Set up ServiceNow Service Catalog integration for HCP Terraform + +-> **Integration version:** v2.8.1 + +The Terraform ServiceNow Service Catalog integration enables your end-users to +provision self-serve infrastructure via ServiceNow. By connecting ServiceNow to +HCP Terraform, this integration lets ServiceNow users order Service Items, +create workspaces, and perform Terraform runs using prepared Terraform +configurations hosted in VCS repositories or as [no-code +modules](/terraform/enterprise/no-code-provisioning/module-design) for +self-service provisioning. + + + +@include 'tfc-package-callouts/servicenow-catalog.mdx' + + + +## Summary of the Setup Process + +The integration relies on Terraform ServiceNow Catalog integration software +installed within your ServiceNow instance. Installing and configuring this +integration requires administration in both ServiceNow and HCP Terraform. +Since administrators of these services within your organization are not +necessarily the same person, this documentation refers to a **ServiceNow Admin** +and a **Terraform Admin**. + +First, the Terraform Admin configures your HCP Terraform organization with a +dedicated team for the ServiceNow integration, and obtains a team API token for +that team. The Terraform Admin provides the following to your ServiceNow admin: + +- An Organization name +- A team API token +- The hostname of your HCP Terraform instance +- Any available no-code modules or version control repositories containing Terraform configurations +- Other required variables + token, the hostname of your HCP Terraform instance, and details about no-code + modules or version control repositories containing Terraform configurations and + required variables to the ServiceNow Admin. + +Next, the ServiceNow Admin will install the Terraform ServiceNow Catalog +integration to your ServiceNow instance, and configure it using the team API +token and hostname. + +Finally, the ServiceNow Admin will create a Service Catalog within ServiceNow +for the Terraform integration, and configure it using the version control +repositories or no-code modules, and variable definitions provided by the +Terraform Admin. + +| ServiceNow Admin | Terraform Admin | +| ----------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| | Prepare an organization for use with the ServiceNow Catalog. | +| | Create a team that can manage workspaces in that organization. | +| | Create a team API token so the integration can use that team's permissions. | +| | If using VCS repositories, retrieve the OAuth token IDs and repository identifiers that HCP Terraform uses to identify your VCS repositories. If using a no-code flow, [create a no-code ready module](/terraform/enterprise/no-code-provisioning/provisioning) in your organization's private registry. Learn more in [Configure VCS Repositories or No-Code Modules](/terraform/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config#configure-vcs-repositories-or-no-code-modules). | +| | Provide the API token, OAuth token ID, repository identifiers, variable definitions, and HCP Terraform hostname to the ServiceNow Admin. | +| Install the Terraform integration application from the ServiceNow App Store. | | +| Connect the integration application with HCP Terraform. | | +| Add the Terraform Service Catalog to ServiceNow. | | +| If you are using the VCS flow, configure the VCS repositories in ServiceNow. | | +| Configure variable sets for use with the VCS repositories or no-code modules. | | + +Once these steps are complete, self-serve infrastructure will be available +through the ServiceNow Catalog. HCP Terraform will provision and manage +requested infrastructure and report the status back to ServiceNow. + +## Prerequisites + +To start using Terraform with the ServiceNow Catalog Integration, you must have: + +- An administrator account on a Terraform Enterprise instance or within a + HCP Terraform organization. +- An administrator account on your ServiceNow instance. +- If you are using the VCS flow, one or more [supported version control + systems](/terraform/enterprise/vcs#supported-vcs-providers) (VCSs) with read + access to repositories with Terraform configurations. +- If you are using no-code provisioning, one or more [no-code modules](/terraform/enterprise/no-code-provisioning/provisioning) created in + your organization's private registry. Refer to the [no-code module + configuration](/terraform/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config#no-code-module-configuration) + for information about using no-code modules with the ServiceNow Service Catalog + for Terraform. + +You can use this integration on the following ServiceNow server versions: + +- Washington DC +- Xanadu +- Yokohama + +It requires the following ServiceNow plugins as dependencies: + +- Flow Designer support for the Service Catalog (`com.glideapp.servicecatalog.flow_designer`) +- ServiceNow IntegrationHub Action Step - Script (`com.glide.hub.action_step.script`) +- ServiceNow IntegrationHub Action Step - REST (`com.glide.hub.action_step.rest`) + +-> **Note:** Dependent plugins are installed on your ServiceNow instance automatically when the app is downloaded from the ServiceNow Store. + +## Configure HCP Terraform + +Before installing the ServiceNow integration, the Terraform Admin will need to +perform the following steps to configure and gather information from HCP +Terraform. + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise. +2. Either [create an + organization](/terraform/enterprise/users-teams-organizations/organizations#creating-organizations) + or choose an existing organization where ServiceNow will create new + workspaces. + **Save the organization name for later.** +3. [Create a team](/terraform/enterprise/users-teams-organizations/teams) for that + organization called "ServiceNow", and ensure that it has [permission to + manage + workspaces](/terraform/enterprise/users-teams-organizations/permissions#manage-all-workspaces). + You do not need to add any users to this team. + [permissions-citation]: #intentionally-unused---keep-for-maintainers +4. On the "ServiceNow" team's settings page, generate a [team API + token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). + **Save the team API token for later.** +5. If you are using the [VCS flow](/terraform/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config#vcs-configuration): + 1. Ensure your Terraform organization is [connected to a VCS provider](/terraform/enterprise/vcs). Repositories that are connectable to HCP Terraform workspaces can also be used as workspace templates in the ServiceNow integration. + 2. On your organization's VCS provider settings page (**Settings** > **VCS Providers**), find the OAuth Token ID for the VCS provider(s) that you intend to use with the ServiceNow integration. HCP Terraform uses the OAuth token ID to identify and authorize the VCS provider. **Save the OAuth token ID for later.** + 3. Identify the VCS repositories in the VCS provider containing Terraform configurations that the ServiceNow Terraform integration will deploy. Take note of any Terraform or environment variables used by the repositories you select. Save the Terraform and environment variables for later. +6. If using the [no-code flow](/terraform/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config#no-code-module-configuration), create one or more no-code modules in the private registry of your HCP Terraform. **Save the no-code module names for later.** +7. Provide the following information to the ServiceNow Admin: + - The organization name + - The team API token + - The hostname of your Terraform Enterprise instance, or of HCP Terraform. The hostname of HCP Terraform is `app.terraform.io`. + - The no-code module name(s) or the OAuth token ID(s) of your VCS provider(s), and the repository identifier for each VCS repository containing Terraform configurations that will be used by the integration. + - Any Terraform or environment variables required by the configurations in the + given VCS repositories. + +-> **Note:** Repository identifiers are determined by your VCS provider; they +typically use a format like `/` or +`/`. Azure DevOps repositories use the format +`//_git/`. A GitHub repository hosted at +`https://github.com/exampleorg/examplerepo/` would have the repository +identifier `exampleorg/examplerepo`. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +For instance, if you are configuring this integration for your company, `Example +Corp`, using two GitHub repositories, you would share values like the following +with the ServiceNow Admin. + +```markdown +Terraform Enterprise Organization Name: `ServiceNowExampleOrg` + +Team API Token: `q2uPExampleELkQ.atlasv1.A7jGHmvufExampleTeamAPITokenimVYxwunJk0xD8ObVol054` + +Terraform Enterprise Hostname: `terraform.corp.example` + +OAuth Token ID (GitHub org: example-corp): `ot-DhjEXAMPLELVtFA` + - Repository ID (Developer Environment): `example-corp/developer-repo` + - Environment variables: + - `AWS_ACCESS_KEY_ID=AKIAEXAMPLEKEY` + - `AWS_SECRET_ACCESS_KEY=ZB0ExampleSecretAccessKeyGjUiJh` + - `AWS_DEFAULT_REGION=us-west-2` + - Terraform variables: + - `instance_type=t2.medium` + - Repository ID (Testing Environment): `example-corp/testing-repo` + - Environment variables: + - `AWS_ACCESS_KEY_ID=AKIAEXAMPLEKEY` + - `AWS_SECRET_ACCESS_KEY=ZB0ExampleSecretAccessKeyGjUiJh` + - `AWS_DEFAULT_REGION=us-west-2` + - Terraform variables: + - `instance_type=t2.large` +``` + +## Install the ServiceNow Integration + +Before beginning setup, the ServiceNow Admin must install the Terraform +ServiceNow Catalog integration software. + +This can be added to your ServiceNow instance from the [ServiceNow +Store](https://store.servicenow.com/sn_appstore_store.do). Search for the "Terraform" integration, +published by "HashiCorp Inc". + +![Screenshot: ServiceNow Store Page](/img/docs/service-now-store.png "Screenshot of the ServiceNow Store listing for the Terraform Integration") + +## Connect ServiceNow to HCP Terraform + +-> **ServiceNow Roles:** `admin` or `x_terraform.config_user` + +Once the integration is installed, the ServiceNow Admin can connect your +ServiceNow instance to HCP Terraform. Before you begin, you will need the +information described in the "Configure HCP Terraform" section from your +Terraform Admin. + +Once you have this information, connect ServiceNow to HCP Terraform with +the following steps. + +1. Navigate to your ServiceNow Service Management Screen. +2. Using the left-hand navigation, open the configuration table for the + integration to manage the HCP Terraform connection. + - Terraform > Configs +3. Click on "New" to create a new HCP Terraform connection. + - Set Org Name to the HCP Terraform organization name. + - Click on the "Lock" icon to set Hostname to the hostname of your Terraform + Enterprise instance. If you are using the SaaS version of HCP Terraform, + the hostname is `https://app.terraform.io`. Be sure to include "https://" + before the hostname. + - Set API Team Token to the HCP Terraform team API token. + - (Optional) To use the [MID Server](https://docs.servicenow.com/csh?topicname=mid-server-landing.html&version=latest), + select the checkbox and type the `name` in the `MID Server Name` field. +4. Click "Submit". + +![Screenshot: ServiceNow Terraform Config](/img/docs/service-now-updated-config.png "Screenshot of the ServiceNow Terraform Config New Record page") + +## Create and Populate a Service Catalog + +Now that you have connected ServiceNow to HCP Terraform, you are ready to +create a Service Catalog using the VCS repositories or no-code modules provided +by the Terraform Admin. + +Navigate to the [Service Catalog documentation](/terraform/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config) to +begin. You can also refer to this documentation whenever you need to add or +update request items. + +### ServiceNow Developer Reference + +ServiceNow developers who wish to customize the Terraform integration can refer +to the [developer documentation](/terraform/enterprise/integrations/service-now/service-catalog-terraform/developer-reference). + +### ServiceNow Administrator's Guide. + +Refer to the [ServiceNow Administrator documentation](/terraform/enterprise/integrations/service-now/service-catalog-terraform/admin-guide) for +information about configuring the integration. + +### Example Customizations + +Once the ServiceNow integration is installed, you can consult the [example +customizations documentation](/terraform/enterprise/integrations/service-now/service-catalog-terraform/example-customizations). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config.mdx new file mode 100644 index 000000000..ce972ed70 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config.mdx @@ -0,0 +1,255 @@ +--- +page_title: Create and manage ServiceNow Service Catalog items with Terraform Enterprise +description: >- + Create and manage service catalog items to allow end users to provision + infrastructure using ServiceNow and Terraform Enterprise. +source: terraform-docs-common +--- + +# Create and manage ServiceNow Service Catalog items + +When using ServiceNow with the HCP Terraform integration, you will configure +at least one service catalog item. You will also configure one or more version +control system (VCS) repositories or no-code modules containing the Terraform +configurations which will be used to provision that infrastructure. End users +will request infrastructure from the service catalog, and HCP Terraform will +fulfill the request by creating a new workspace, applying the configuration, and +then reporting the results back to ServiceNow. + +## Prerequisites + +Before configuring a service catalog, you must install and configure the +HCP Terraform integration software on your ServiceNow instance. These steps +are covered in the [installation documentation](/terraform/enterprise/integrations/service-now/service-catalog-terraform). + +Additionally, you must have have the following information: + +1. The no-code module name or the OAuth token ID and repository identifier for + each VCS repository that HCP Terraform will use to provision + infrastructure. Your Terraform Admin will provide these to you. Learn more in + [Configure VCS Repositories or No-Code + Modules](/terraform/enterprise/integrations/service-now/service-catalog-terraform/service-catalog-config#configure-vcs-repositories-or-no-code-modules). +2. Any Terraform or environment variables required by the configurations in the + given VCS repositories or no-code modules. + +Once these steps are complete, in order for end users to provision +infrastructure with ServiceNow and HCP Terraform, the ServiceNow Admin will +perform the following steps to make Service Items available to your end users. + +1. Add at least one service catalog for use with Terraform. +2. If you are using the VCS flow, configure at least one one VCS repository in ServiceNow. +3. Create variable sets to define Terraform and environment variables to be used + by HCP Terraform to provision infrastructure. + +## Add the Terraform Service Catalog + +-> **ServiceNow Role:** `admin` + +First, add a Service Catalog for use with the Terraform integration. Depending +on your organization's needs, you might use a single service catalog, or +several. If you already have a Service Catalog to use with Terraform, skip to +the next step. + +1. In ServiceNow, open the Service Catalog > Catalogs view by searching for + "Service Catalog" in the left-hand navigation. + 1. Click the plus sign in the top right. + 2. Select "Catalogs > Terraform Catalog > Title and Image" and choose a + location to add the Service Catalog. + 3. Close the "Sections" dialog box by clicking the "x" in the upper right-hand + corner. + +-> **Note:** In step 1, be sure to choose "Catalogs", not "Catalog" from the +left-hand navigation. + +## Configure VCS Repositories or No-Code Modules + +-> **ServiceNow Roles:** `admin` or `x_terraform.vcs_repositories_user` + +Terraform workspaces created through the ServiceNow Service Catalog for +Terraform can be associated with a VCS +provider repository or be backed by a [no-code +module](/terraform/enterprise/no-code-provisioning/provisioning) in your +organization's private registry. Administrators determine which workspace type +end users can request from the Terraform Catalog. Below are the key +differences between the version control and no-code approaches. + +### VCS configuration + +To make infrastructure available to your users through version control +workspaces, you must add one or more VCS repositories containing Terraform +configurations to the Service Catalog for Terraform. + +1. In ServiceNow, open the "Terraform > VCS Repositories" table by searching for + "Terraform" in the left-hand navigation. +2. Click "New" to add a VCS repository, and fill in the following fields: + - Name: The name for this repository. This name will be visible to end + users, and does not have to be the same as the repository name as defined + by your VCS provider. Ideally it will succinctly describe the + infrastructure that will be provisioned by Terraform from the repository. + - OAuth Token ID: The OAuth token ID that from your HCP Terraform + organization's VCS providers settings. This ID specifies which VCS + provider configured in HCP Terraform hosts the desired repository. + - Identifier: The VCS repository that contains the Terraform configuration + for this workspace template. Repository identifiers are determined by your + VCS provider; they typically use a format like + `/` or `/`. Azure DevOps + repositories use the format `//_git/`. + - The remaining fields are optional. + - Branch: The branch within the repository, if different from the default + branch. + - Working Directory: The directory within the repository containing + Terraform configuration. + - Terraform Version: The version of Terraform to use. This will default to + the latest version of Terraform supported by your HCP Terraform + instance. +3. Click "Submit". + +![Screenshot: ServiceNow New VCS Repository](/img/docs/service-now-vcs-repository.png "Screenshot of the ServiceNow Terraform New VCS Repository page") + +After configuring your repositories in ServiceNow, the names of those +repositories will be available in the "VCS Repository" dropdown menu a user +orders new workspaces through the following items in the Terraform Catalog: + +- **Create Workspace** +- **Create Workspace with Variables** +- **Provision Resources** +- **Provision Resources with Variables** + +### No-Code Module Configuration + +In version 2.5.0 and newer, ServiceNow administrators can configure +Catalog Items using [no-code +modules](/terraform/enterprise/no-code-provisioning/provisioning). This release +introduces two new additions to the Terraform Catalog - no-code workspace +create and update Items. Both utilize no-code modules from the private registry +in HCP Terraform to enable end users to request infrastructure without writing +code. + + + +@include 'tfc-package-callouts/nocode.mdx' + + + +The following Catalog Items allow you to build and manage workspaces with +no-code modules: + +- **Provision No-Code Workspace and Deploy Resources**: creates a new Terraform + workspace based on a no-code module of your choice, supplies required variable + values, runs and applies Terraform. +- **Update No-Code Workspace and Deploy Resources**: Updates an existing no-code + workspace to the most recent no-code module version, updates that workspace's + attached variable values, and then starts and applies a new Terraform run. + +Administrators can skip configuring VCS repositories in ServiceNow when using +no-code modules. The only input required in the no-code workspace request form +is the name of the no-code module. + +Before utilizing a no-code module, you must publish it to the your organization's +private module registry. With this one-time configuration complete, ServiceNow +Administrators can then call the modules through Catalog requests without +repository management, simplifying the use of infrastructure-as-code. + +> **Hands On:** Try the [Self-service enablement with HCP Terraform and ServiceNow tutorial](/terraform/tutorials/it-saas/servicenow-no-code). + +## Configure a Variable Set + +Most Terraform configurations can be customized with Terraform variables or +environment variables. You can create a Variable Set within ServiceNow to +contain the variables needed for a given configuration. Your Terraform Admin +should provide these to you. + +1. In ServiceNow, open the "Service Catalog > Variable Sets" table by searching for + "variable sets" in the left-hand navigation. +2. Click "New" to add a Variable Set. +3. Select "Single-Row Variable Set". + - Title: User-visible title for the variable set. + - Internal name: The internal name for the variable set. + - Order: The order in which the variable set will be displayed. + - Type: Should be set to "Single Row" + - Application: Should be set to "Terraform" + - Display title: Whether the title is displayed to the end user. + - Layout: How the variables in the set will be displayed on the screen. + - Description: A long description of the variable set. +4. Click "Submit" to create the variable set. +5. Find and click on the title of the new variable set in the Variable Sets + table. +6. At the bottom of the variable set details page, click "New" to add a new + variable. + +- Type: Should be "Single Line Text" for most variables, or "Masked" for + variables containing sensitive values. +- Question: The user-visible question or label for the variable. +- Name: The internal name of the variable. This must be derived from the name of the + Terraform or environment variable. Consult the table below to determine the + proper prefix for each variable name. +- Tooltip: A tooltip to display for the variable. +- Example Text: Example text to show in the variable's input box. + +1. Under the "Default Value" tab, you can set a default value for the variable. +2. Continue to add new variables corresponding to the Terraform and environment + variables the configuration requires. + +When the Terraform integration applies configuration, it will map ServiceNow +variables to Terraform and environment variables using the following convention. +ServiceNow variables that begin with "sensitive\_" will be saved as sensitive +variables within HCP Terraform. + +| ServiceNow Variable Name | HCP Terraform Variable | +| -------------------------------- | ---------------------------------------------------------- | +| `tf_var_VARIABLE_NAME` | Terraform Variable: `VARIABLE_NAME` | +| `tf_env_ENV_NAME` | Environment Variable: `ENV_NAME` | +| `sensitive_tf_var_VARIABLE_NAME` | Sensitive Terraform Variable (Write Only): `VARIABLE_NAME` | +| `sensitive_tf_env_ENV_NAME` | Sensitive Environment Variable (Write Only): `ENV_NAME` | + +## Provision Infrastructure + +Once you configure the Service Catalog for Terraform, ServiceNow users +can request infrastructure to be provisioned by HCP Terraform. + +These requests will be fulfilled by HCP Terraform, which will: + +1. Create a new workspace from the no-code module or the VCS repository provided by ServiceNow. +2. Configure variables for that workspace, also provided by ServiceNow. +3. Plan and apply the change. +4. Report the results, including any outputs from Terraform, to ServiceNow. + +Once this is complete, ServiceNow will reflect that the Request Item has been +provisioned. + +-> **Note:** The integration creates workspaces with +[auto-apply](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply) +enabled. HCP Terraform will queue an apply for these workspaces whenever +changes are merged to the associated VCS repositories. This is known as the +[VCS-driven run workflow](/terraform/enterprise/run/ui). It is important to keep in mind +that all of the ServiceNow workspaces connected to a given repository will be +updated whenever changes are merged to the associated branch in that repository. + +## Execution Mode + +If using v2.2.0 or above, the Service Catalog app allows you to set an [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) for your Terraform workspaces. There are two modes to choose from: + +- The default value is "Remote", which instructs HCP Terraform to perform runs on its disposable virtual machines. +- Selecting "Agent" mode allows you to run Terraform operations on isolated, private, or on-premises infrastructure. This option requires you to create an Agent Pool in your organization beforehand, then provide that Agent Pool's id when you order a new workspace through the Service Catalog. + + + +@include 'tfc-package-callouts/agents.mdx' + + + +## Workspace Name + +Version 2.4.0 of the Service Catalog for Terraform introduces the ability to set custom names for your Terraform workspaces. You can choose a prefix for your workspace name that the Service Catalog app will append the ServiceNow RITM number to. If you do not define a workspace prefix, ServiceNow will use RITM number as the workspace name. + +Workspace names can include letters, numbers, dashes (`-`), and underscores (`_`), and should not exceed 90 characters. +Refer to the [workspace naming recommendations](/terraform/enterprise/workspaces/create#workspace-naming) for best practices. + +## Workspace Tags + +Version 2.8.0 extends support for the key-value pair tags while still also supporting flat string tags version 2.4.0 introduced. Use the "Workspace Tags" field to provide a comma-separated list of key-value pair tags in the format "env: prod, instance: test" that will be parsed and attached to the workspace in HCP Terraform. + +Tags give you an easier way to categorize, filter, and manage workspaces provisioned through the Service Catalog for Terraform. +We recommend that you set naming conventions for tags with your end users to avoid variations such as `ec2`, `aws-ec2`, `aws_ec2`. + +Workspace tags have a 255 character limit and can contain letters, numbers, colons, hyphens, and underscores. Refer to the [workspace tagging rules](/terraform/enterprise/workspaces/create#workspace-tags) for more details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/troubleshoot.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/troubleshoot.mdx new file mode 100644 index 000000000..b43864651 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-catalog-terraform/troubleshoot.mdx @@ -0,0 +1,120 @@ +--- +page_title: >- + Troubleshoot the ServiceNow Service Catalog Integration for Terraform + Enterprise +description: Troubleshooting tips for ServiceNow Service Catalog Integration. +source: terraform-docs-common +--- + +# Troubleshoot the ServiceNow Service Catalog integration + +This page offers troubleshooting tips for common issues with the ServiceNow Service Catalog Integration for HCP Terraform. +It also provides instructions on how to find and read logs to diagnose and resolve issues. + +## Find logs + +Logs are crucial for diagnosing issues. You can find logs in ServiceNow in the following places: + +### Workflow logs + +To find workflow logs, click on the RITM number on a failed ticket to open the request item. +Scroll down to **Related Links > Workflow Context** and open the **Workflow Log** tab. + +### Flow logs + +To find flow logs, click on the RITM number on a failed ticket to open the request item. +Scroll down to **Related Links > Flow Context > Open Context Record** and open the **Flow engine log entries** tab. + +### Application logs + +To find application logs, navigate to **All > System Log > Application Logs.** +Set the **Application** filter to "Terraform". +Search for logs around the time your issue occurred. Some records include HTTP status codes and detailed error messages. + +### Outbound requests + +ServiceNow logs all outgoing API calls, including calls to HCP Terraform. To view the log of outbound requests, navigate to **All > System Logs > Outbound HTTP Requests.** +To customize the table view, add columns like "URL," "URL Path," and "Application scope." +Logs from the Catalog app are marked with the `x_325709_terraform` scope. + +## Enable email notifications + +To enable email notifications and receive updates on your requested item tickets: + +1. Log in to your ServiceNow instance as an administrator. +2. **Click System Properties > Email Properties**. +3. In the **Outbound Email Configuration** panel, select **Yes** next to the check-box with the email that ServiceNow should send notifications to. + +To ensure you have relevant notifications configured in your instance: + +1. Navigate to **System Notification > Email > Notifications.** +2. Search for "Request Opened" and "Request Item Commented" and ensure they are activated. + +Reach out to ServiceNow customer support if you run into any issues with the global configurations. + +## Common problems + +This section details frequently encountered issues and how they can be resolved. + +### Failure to create a workspace + +If you order the "create a workspace" catalog item and nothing happens in ServiceNow and HCP Terraform does not create a workspace then there are several possible reasons why: + +Ensure your HCP Terraform token, hostname, and organization name is correct. + +1. Make sure to use a **Team API Token**. This can be found in HCP Terraform under "API Tokens". +2. Ensure the team API token has the correct permissions. +3. Double-check your organization name by copying and pasting it from HCP Terraform or Terraform Enterprise. +4. Double-check your host name. +5. Make sure you created your team API token in the same organization you are using +6. Test your configuration. First click **Update** to process any changes then \*\*Test Config to make sure the connection is working. + +Verify your VCS configuration. + +1. The **Identifier** field should not have any spaces. The ServiceNow Service Catalog Integration requires that you format repository names in the `username/repo_name` format. +2. The **Name** can be anything, but it is better to avoid special characters as per naming convention. +3. Double-check the OAuth token ID in your HCP Terraform/Terraform Enterprise settings. To retrieve your OAuth token ID, navigate to your HCP Terraform organization's settings page, then click **Provider** in the left navigation bar under **Version Control**. + +### Failure to successfully order any catalog item + +After placing an order for any catalog item, navigate to the comments section in the newly created RITM ticket. +The latest comment will contain a response from HCP Terraform. + +### Frequency of comments and outputs + +When you place an order in the Terraform Catalog, ServiceNow submits and processes the order, then attaches additional comments to the order to indicate whether HCP Terraform successfully created the workspace. + +By default, ServiceNow polls HCP Terraform every 5 minutes for the latest status of the Terraform run. ServiceNow does not show any comments until the next ping. + +To configure ServiceNow to poll HCP Terraform more frequently: + +1. Navigate to **All > Flow designer**. +2. Set the **Application** filter to **Terraform**. +3. Under the **Name** column click **Worker Poll Run State**. +4. Click on the trigger and adjust the interval to your desired schedule. +5. Click **Done > Save > Activate** to save your changes. + +### Using no-code modules feature + +If ServiceNow fails to deploy a no-code module catalog item, verify the following: + +1. Ensure that your HCP Terraform organization has an [HCP Plus tier](https://www.hashicorp.com/products/terraform/pricing) subscription. +2. Ensure the name you enter for your no-code module in the catalog user form matches the no-code module in HCP Terraform. + +### Updating no-code workspaces + +If the “update no-code workspace” catalog item returns the output message “No update has been made to the workspace”, then you have not upgraded your no-code module in HCP Terraform. + +### Application Scope + +If you are making customizations and you encounter unexpected issues, make sure to change the scope from **Global** to **Terraform** and recreate your customized items in the **Terraform scope**. +For additional instructions on customizations, refer to the [example customizations](/terraform/enterprise/integrations/service-now/service-catalog-terraform/example-customizations) documentation. + +### MID server + +If you are using a MID server in your configuration, check the connectivity by using the **Test Config** button on the configurations page. +Additionally, when ServiceNow provisions a MID server, navigate to **MID Servers > Servers** to check if the status is “up” and “validated”. + +### Configuration + +While the app allows multiple config entries, only one should be present as this can interfere with the functionality of the app. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/customizations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/customizations.mdx new file mode 100644 index 000000000..9263ecc2a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/customizations.mdx @@ -0,0 +1,97 @@ +--- +page_title: Customize the ServiceNow Service Graph Connector for Terraform Enterprise +description: >- + Learn how to edit ETL mappings in the ServiceNow Service Graph Connector for + Terraform Enterprise integration. +source: terraform-docs-common +--- + +# Customize the ServiceNow Service Graph Connector for Terraform + +-> **ServiceNow roles:** `admin` + +-> **ServiceNow plugin requirement:** `IntegrationHub ETL` + +You can update and customize the default ETL mapping rules offered by the Service Graph Connector for Terraform. + +To ensure that your custom rules remain intact during future updates, you can clone the existing ETL record and maintain it separately from the default one. + +This documentation guides you through the process of mapping a resource using an example of an AWS virtual private network (VPC). Although this resource is already covered by the application, the principles discussed apply to any new potential resource mapping. + +Any customizations should be done from the application's scope: **Service Graph Connector for Terraform**. + +## Clone the ETL map + +Navigate to the **IntegrationHub ETL** in the top menu. Check the **SG-Terraform** record and click **Duplicate**. Refer to the [ServiceNow documentation](https://docs.servicenow.com/en-US/bundle/utah-servicenow-platform/page/product/configuration-management/task/duplicate-cmdb-transform-map.html) to create a duplicate of an existing ETL transform map. + +## Build a resource in HCP Terraform + +Create a new workspace in your HCP Terraform organization and create a Terraform resource that you would like to map. It helps to have a Terraform state record of the resource to ensure accurate mapping. + +[Configure a webhook](/terraform/enterprise/integrations/service-now/service-graph/service-graph-setup#configure-terraform-webhook) and initiate a Terraform run. + +## Download Terraform State + +Once the run is successfully completed, open your ServiceNow instance, click on **All** and navigate to **Scheduled Imports**. + +Open the **SG-Terraform Scheduled Process State** record, search for the import set corresponding to the latest webhook request. Click the **Import Set** field to open the import set. Wait for the import set to be successfully processed. + +Since there are no existing ETL rules configured for the new resource, it is ignored during the ETL process. + +Open the **Outbound Http Requests** tab to list the requests sent from your ServiceNow instance to HCP Terraform and get the latest state of the workspace. + +![ServiceNow Service Graph Connector Outbound Http Requests interface](/img/docs/service-now-service-graph-state-object-url.png) + +Open the record that starts with " by clicking on the timestamp. Copy the content of the URL field and open it you your browser to download the Terraform state file. + +Locate the resource in the state object. This JSON record will serve as a source for the future mapping. + +## Identify the CI target + +Pick a suitable Configuration Item (CI) target for your resource. For example, the AWS virtual private network (VPC) resource is mapped to Cloud Network (`cmdb_ci_network`) by the Service Graph Connector for Terraform. Refer to the [ServiceNow CMDB documentation](https://docs.servicenow.com/en-US/bundle/utah-servicenow-platform/page/product/configuration-management/reference/cmdb-tables-details.html) for more details on available CI tables. + +## Consult the CI Class Manager + +After selecting an appropriate CI target, it is important to consult the CI Class Manager for guidance on dependent relationships. Many CMDB resources rely on other CI tables. If a related class is not properly mapped, the ETL job will generate errors or warnings and fail to import your resource into the CMDB. + +In the top navigation, click on **All**, search for **CI Class Manager**, and click on **Open Hierarchy**. Search for your target CI Class and check **Dependent Relationships** tab to learn more about dependent mappings required by the resource. + +For example, according to the **CI Class Manager**, **Cloud Network** should be hosted on **Logical Datacenter** and **Cloud Service Account**. + +## Set the mapping rules + +Open the **IntegrationHub ETL** from the top navigation menu and select your cloned ETL map record prepared for customization. Refer to the [ServiceNow documentation](https://docs.servicenow.com/en-US/bundle/utah-servicenow-platform/page/product/configuration-management/concept/create-etl-transform-map.html) for instructions to create an ETL transform map. + +Click on the first **Specify Basic Details** section of the ETL Transform Map Assistant. Select the import set number containing your resource from the **Sample Import Set** dropdown and click **Mark as Complete**. + +Open the **Preview and Prepare Data** section and review the imported rows. Click **Mark as Complete**. + +The third section provides the interface for mapping resource attributes. Click on **Select CMDB Classes to Map Source Data**. Click on **Add Conditional Class** button at the top. Set the rules that will identify your resource in the import set. Use the `type` field value from the Terraform state object to identify your resource (on the ServiceNow side, field name are prefaced with `u_`). Set the target CMDB CI Class name and click **Save**. + +![ServiceNow Service Graph Connector: setting the Conditional Class rules in the ETL mapping](/img/docs/service-now-service-graph-conditional-class-mapping.png) + +To modify the mapping for your new Conditional Class record, select **Edit Mapping**. On the right side of the interface, drag the relevant data pills and drop them into the corresponding CMDB fields on the left side. Refer to the Terraform state record to verify the presence of attributes. For uniqueness, the **Source Native Key** value is typically mapped to the `arn` field when dealing with AWS resources. All resources mapped in the Service Graph Connector for Terraform will have the **Operational status** and **Name** fields populated. + +![ServiceNow Service Graph Connector: mapping resource attributes in the ETL](/img/docs/service-now-service-graph-etl-attribute-mapping.png) + +Once the mapping is completed, click on the left arrow at the top to return to the list of Conditional Classes. Map two more conditional classes in the same manner, according to the rules set in the CI Class Manager: **Logical Datacenter** (**AWS Datacenter** in case of AWS VPC) and **Cloud Service Account**. Since the AWS cloud provider is already covered by the application, these classes are already present. Click **Edit Class** to include your newly mapped resource into the listed conditional rules. Add another **OR** condition to each of them and click **Save**. + +![ServiceNow Service Graph Connector: updating conditions on existing parent records when a new resource is mapped](/img/docs/service-now-service-graph-etl-condition-update.png) + +Click **Mark as Complete** to finalize the **Select CMDB Classes to Map Source Data** section. + +## Set the required relationships + +Click **Add Relationships** to continue to the next section. Click the **Add Conditional Relationship** button at the top of the page. The following configuration tells the ETL that when a record with `aws_vpc` type is found in the import set, it should be hosted on **AWS Datacenter 1**. Click **Save**. + +![ServiceNow Service Graph Connector: setting dependent relationships in the ETL mapping interface](/img/docs/service-now-service-graph-etl-setting-relationship.png) + +A similar dependent relationship needs to be established from **AWS Datacenter** to **Cloud Service Account**. Since the AWS cloud provider is already covered by the application, the relationship record is present in the application. Click **Edit Relationship** and add another **OR** condition containing your new resource to the list. Click **Save**. + +![ServiceNow Service Graph Connector: updating existing dependent relationships in the ETL mapping interface](/img/docs/service-now-service-graph-etl-editing-relationship.png) + +Click **Mark as Complete** to finalize the **Add Relationships** section. + +## Run a test + +There are two ways to test the new resource mapping. You can utilize the **Test and Rollback Integration Results** interface of the ETL Transform Map Assistant. Alternatively, you can initiate a new run in your HCP Terraform workspace that includes the deployment of the resource. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/index.mdx new file mode 100644 index 000000000..e625181e1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/index.mdx @@ -0,0 +1,83 @@ +--- +page_title: ServiceNow Service Graph Connector for Terraform Enterprise overview +description: >- + Use the ServiceNow Service Graph Connector to enable users to import Terraform + Enterprise-built infrastructure into ServiceNow CMDB. +source: terraform-docs-common +--- + +# ServiceNow Service Graph Connector for Terraform overview + +-> **Integration version:** v1.2.0 + +Use the Service Graph Connector for Terraform to securely import HCP Terraform resources into your ServiceNow instance. The ServiceNow Service Graph for Terraform is a certified scoped application available in the [ServiceNow Store](https://store.servicenow.com/sn_appstore_store.do#!/store/application/0b0600891b52c150c216ebd56e4bcb32). + +The integration is based on the [Service Graph Connector](https://www.servicenow.com/products/service-graph-connectors.html) technology that provides a framework for discovering and mapping relationships between the organization's infrastructure and the ServiceNow Configuration Items (CIs), and then automatically updating the [ServiceNow CMDB (Configuration Management Database)](https://www.servicenow.com/products/servicenow-platform/configuration-management-database.html) with this information. This enables platform teams to gain a comprehensive view of the resources they support. The CMDB is a central repository within the ServiceNow platform, which provides a single source of truth for your infrastructure and offers configurable dashboards for monitoring and reporting. + +## Key benefits + +- **Enhanced visibility**: The Service Graph Connector for Terraform updates the CMDB dashboards with resources deployed in HCP Terraform. +- **Improved efficiency**: By connecting Terraform to the ServiceNow CMDB, platform teams can manage and search Terraform-provisioned resources in the CMDB alongside the rest of the company's infrastructure. +- **Consistent management**: Terraform state file changes get automatically and securely updated in the ServiceNow CMDB, capturing status changes for all technical resources in a timely manner. +- **Extensibility**: ServiceNow admins can customize mappings for additional resource types, potentially working with HashiCorp’s entire Terraform ecosystem made up of thousands of providers. + +## Technical design + +The diagram below shows how the Service Graph Connector for Terraform connects HCP Terraform to your ServiceNow instance. + +![ServiceNow Service Graph Connector for Terraform: design diagram](/img/docs/service-now-service-graph-design.png) + +The Service Graph Connector for Terraform integrates with HCP Terraform to fetch up-to-date information about your deployments. It leverages the Terraform state as the primary data source. The application doesn't make any requests to your cloud provider or require you to share any cloud credentials. + +## Import methods + +The integration offers two methods of importing your Terraform resources into CMDB. You can configure the application to periodically pull all your resources in one batch. Alternatively, you can set up webhooks in your Terraform workspaces, which will notify your ServiceNow instance about new deployments. + +### Scheduled polling + +The Service Graph Connector for Terraform can be scheduled to periodically poll HCP Terraform. Depending on the size of your infrastructure and how frequently the state of your resources needs to be refreshed in CMDB, the polling schedule can be set anywhere from once a week to every second. This option is not recommended for big environments with thousands of Terraform workspaces as the import job will take several hours to complete. + +The scheduled job makes a request to HCP Terraform to obtain all organizations that the HCP Terraform API token provided to the application has access to. It will attempt to import all relevant resources from all workspaces within each of those organizations. The processing time depends of the number of organizations and workspaces in HCP Terraform. Configuring the import job to run frequently is not recommended for big environments. + +To access the scheduler, search for **Service Graph Connector for Terraform** in the top navigation menu and select **SG-Import Schedule**. You can change the polling settings and view all previous import sets pulled into your ServiceNow instance using this method. + +### HCP Terraform Webhook Notifications + +You can configure [webhook notifications](/terraform/enterprise/workspaces/settings/notifications) for all relevant workspaces in HCP Terraform organization. Webhooks offer an event-based approach to importing your resources. The import is triggered as soon as a Terraform run is successfully completed in HCP Terraform. + +Webhook POST requests are sent to an API endpoint exposed by the Service Graph Connector for Terraform in your ServiceNow instance. Each webhook request includes an HMAC token, and the endpoint validates the signature using the secret you provide. Learn more about [HCP Terraform notification authenticity](/terraform/enterprise/workspaces/settings/notifications#notification-authenticity). + +Internally, the application uses a scheduled job as a helper to keep track of the incoming webhook requests. To activate, configure, and view the history of all webhook imports, navigate to **Scheduled Imports** and select **SG-Terraform Scheduled Process State**. By default, the job is set to run every minute. + +-> **Tip:** Both import options may be enabled, or you may choose to configure only the webhooks or the scheduled import. + +The [setup page](/terraform/enterprise/integrations/service-now/service-graph/service-graph-setup) provides configuration details for both import modes. + +## ETL (Extract, Transform, Load) + +After the application successfully imports the resources, they are temporarily stored in a staging database table. The import set records are then transferred to the ETL (Extract, Transform, Load) pipeline. Search for **IntegrationHub ETL** in the top navigation menu to view and edit the default ETL rules of the Service Graph Connector for Terraform. The application's ETL Transform Map is called **SG-Terraform**. + +To deactivate resources that you do not want imported into the CMDB, navigate to the **Select CMDB Classes to Map Source Data** section of the application's ETL record, and toggle the switch on the resource mapping record to deactivate it. + +![screenshot: ServiceNow Service Graph Connector for Terraform resource ETL deactivation button](/img/docs/service-now-service-graph-deactivate-etl.png) + +-> **Tip:** Run an import before you open the ETL map as the interface requires at least one import set stored in the memory to be able to display the rules. + +## Supported resources + +The Service Graph Connector for Terraform supports selected resources from the following cloud providers: + +- AWS +- Microsoft Azure +- Google Cloud +- VMware vSphere + +The [resource mapping](/terraform/enterprise/integrations/service-now/service-graph/resource-coverage) documentation contains tables detailing the mapping of objects and attributes between HCP Terraform and ServiceNow CMDB. + +## Destroyed resources + +After the destroy operation is completed in HCP Terraform and the application's import job is finished in your ServiceNow instance, the **Operational Status** field of all resources in the CMDB removed from the Terraform state during the deletion process will be updated to **Non-Operational**. + +## Get started + +Refer to the [setup page](/terraform/enterprise/integrations/service-now/service-graph/service-graph-setup) for information on how to configure the integration in your ServiceNow instance. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/aws.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/aws.mdx new file mode 100644 index 000000000..d2ccc40b1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/aws.mdx @@ -0,0 +1,219 @@ +--- +page_title: ServiceNow Service Graph Connector AWS resource coverage +description: >- + Use the ServiceNow Service Graph integration to import selected resources from + AWS into ServiceNow CMDB. +source: terraform-docs-common +--- + +# ServiceNow Service Graph Connector AWS resource coverage + +This page details the mapping rules for importing AWS resources, provisioned with Terraform, into ServiceNow CMDB. + +## Mapping of Terraform resources to CMDB CI Classes + +| AWS resource | Terraform resource name | ServiceNow CMDB CI Class | ServiceNow CMDB Category Name | +| ------------------------------------------------------------------------------------- | --------------------------- | -------------------------------- | ----------------------------- | +| AWS account | N/A | `cmdb_ci_cloud_service_account` | Cloud Service Account | +| AWS region | N/A | `cmdb_ci_aws_datacenter` | AWS Datacenter | +| EC2 Instance | `aws_instance` | `cmdb_ci_vm_instance` | Virtual Machine Instance | +| S3 Bucket | `aws_s3_bucket` | `cmdb_ci_cloud_object_storage` | Cloud Object Storage | +| ECS Cluster | `aws_ecs_cluster` | `cmdb_ci_cloud_ecs_cluster` | AWS Cloud ECS Cluster | +| EKS Cluster | `aws_eks_cluster` | `cmdb_ci_kubernetes_cluster` | Kubernetes Cluster | +| VPC | `aws_vpc` | `cmdb_ci_network` | Cloud Network | +| Database Instance (_non-Aurora databases: e.g., MySQL, PostgreSQL, SQL Server, etc._) | `aws_db_instance` | `cmdb_ci_cloud_database` | Cloud DataBase | +| RDS Aurora Cluster | `aws_rds_cluster` | `cmdb_ci_cloud_db_cluster` | Cloud DataBase Cluster | +| RDS Aurora Instance | `aws_rds_cluster_instance` | `cmdb_ci_cloud_database` | Cloud DataBase | +| DynamoDB Global Table | `aws_dynamodb_global_table` | `cmdb_ci_dynamodb_global_table` | DynamoDB Global Table | +| DynamoDB Table | `aws_dynamodb_table` | `cmdb_ci_dynamodb_table` | DynamoDB Table | +| Security Group | `aws_security_group` | `cmdb_ci_compute_security_group` | Compute Security Group | +| Lambda | `aws_lambda_function` | `cmdb_ci_cloud_function` | Cloud Function | +| Load Balancer | `aws_lb` | `cmdb_ci_cloud_load_balancer` | Cloud Load Balancer | +| Tags | N/A | `cmdb_key_value` | Key Value | + +## Resource relationships + +| Child CI Class | Relationship type | Parent CI Class | +| ----------------------------------------------------------- | ----------------- | --------------------------------------------------------- | +| AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | Hosted On::Hosts | Cloud Service Account 1 (`cmdb_ci_cloud_service_account`) | +| AWS Datacenter 2 (`cmdb_ci_aws_datacenter`) | Hosted On::Hosts | Cloud Service Account 6 (`cmdb_ci_cloud_service_account`) | +| Virtual Machine Instance 1 (`cmdb_ci_vm_instance`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| Virtual Machine Instance 1 (`cmdb_ci_vm_instance`) | Reference | Key Value 1 (`cmdb_key_value`) | +| AWS Cloud ECS Cluster 1 (`cmdb_ci_cloud_ecs_cluster`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| AWS Cloud ECS Cluster 1 (`cmdb_ci_cloud_ecs_cluster`) | Reference | Key Value 2 (`cmdb_key_value`) | +| Cloud Object Storage 1 (`cmdb_ci_cloud_object_storage`) | Hosted On::Hosts | AWS Datacenter 2 (`cmdb_ci_aws_datacenter`) | +| Cloud Object Storage 1 (`cmdb_ci_cloud_object_storage`) | Reference | Key Value 3 (`cmdb_key_value`) | +| Kubernetes Cluster 1 (`cmdb_ci_kubernetes_cluster`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| Kubernetes Cluster 1 (`cmdb_ci_kubernetes_cluster`) | Reference | Key Value 4 (`cmdb_key_value`) | +| Cloud Network 1 (`cmdb_ci_network`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| Cloud Network 1 (`cmdb_ci_network`) | Reference | Key Value 5 (`cmdb_key_value`) | +| Cloud DataBase 1 (`cmdb_ci_cloud_database` ) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| Cloud DataBase 1 (`cmdb_ci_cloud_database` ) | Reference | Key Value 6 (`cmdb_key_value`) | +| Cloud DataBase Cluster 1 (`cmdb_ci_cloud_db_cluster`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| Cloud DataBase Cluster 1 (`cmdb_ci_cloud_db_cluster`) | Reference | Key Value 7 (`cmdb_key_value`) | +| DynamoDB Global Table 1 (`cmdb_ci_dynamodb_global_table`) | Hosted On::Hosts | Cloud Service Account 1 (`cmdb_ci_cloud_service_account`) | +| DynamoDB Table 1 (`cmdb_ci_dynamodb_table`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| DynamoDB Table 1 (`cmdb_ci_dynamodb_table`) | Reference | Key Value 8 (`cmdb_key_value`) | +| Compute Security Group 1 (`cmdb_ci_compute_security_group`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| Compute Security Group 1 (`cmdb_ci_compute_security_group`) | Reference | Key Value 10 (`cmdb_key_value`) | +| Cloud Function 1 (`cmdb_ci_cloud_function`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| Cloud Function 1 (`cmdb_ci_cloud_function`) | Reference | Key Value 11 (`cmdb_key_value`) | +| Cloud Load Balancer 1 (`cmdb_ci_cloud_load_balancer`) | Hosted On::Hosts | AWS Datacenter 1 (`cmdb_ci_aws_datacenter`) | +| Cloud Load Balancer 1 (`cmdb_ci_cloud_load_balancer`) | Reference | Key Value 12 (`cmdb_key_value`) | + +## Field attributes mapping + +### Cloud Service Account (`cmdb_ci_cloud_service_account`) + +| CMDB field | Terraform state field | +| ------------------ | -------------------------------------------- | +| Source Native Key | Resource account number extracted from `arn` | +| Account Id | Resource account number extracted from `arn` | +| Datacenter Type | Resource cloud provider extracted from `arn` | +| Object ID | Resource id extracted from `arn` | +| Name | Resource name extracted from `arn` | +| Operational Status | Defaults to "1" ("Operational") | + +### AWS Datacenter (`cmdb_ci_aws_datacenter`) + +| CMDB field | Terraform state field | +| ------------------ | --------------------------------------------------------------- | +| Source Native Key | Concatenation of region and account number extracted from `arn` | +| Object Id | Region extracted from `arn` | +| Region | Region extracted from `arn` | +| Name | Region extracted from `arn` | +| Operational Status | Defaults to "1" ("Operational") | + +### Virtual Machine Instance (`cmdb_ci_vm_instance`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| Object Id | `id` | +| Placement Group ID | `placement_group` | +| IP Address | `public_ip` | +| Status | `instance_state` | +| VM Instance ID | `id` | +| Name | `id` | +| State | `state` | +| CPU | `cpu_core_count` | +| Operational Status | Defaults to "1" ("Operational") | + +### AWS Cloud ECS Cluster (`cmdb_ci_cloud_ecs_cluster`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Object Storage (`cmdb_ci_cloud_object_storage`) + +| CMDB field | Terraform state field | +| ------------------ | -------------------------------------------- | +| Source Native Key | `arn` | +| Object Id | `id` | +| Cloud Provider | Resource cloud provider extracted from `arn` | +| Name | `bucket` | +| Operational Status | Defaults to "1" ("Operational") | + +### Kubernetes Cluster (`cmdb_ci_kubernetes_cluster`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| IP Address | `endpoint` | +| Port | Defaults to "6443" | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Network (`cmdb_ci_network`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud DataBase (`cmdb_ci_cloud_database`) + +| CMDB field | Terraform state field | +| --------------------------- | -------------------------------------------- | +| Source Native Key | `arn` | +| Object Id | `id` | +| Version | `engine_version` | +| Type | `engine` | +| TCP port(s) | `port` | +| Category | `instance_class` | +| Fully qualified domain name | `endpoint` | +| Location | Region extracted from `arn` | +| Name | `name` | +| Vendor | Resource cloud provider extracted from `arn` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud DataBase Cluster (`cmdb_ci_cloud_db_cluster`) + +| CMDB field | Terraform state field | +| --------------------------- | -------------------------------------------- | +| Source Native Key | `arn` | +| Cluster ID | `cluster_resource_id` | +| Name | `name` | +| TCP port(s) | `port` | +| Fully qualified domain name | `endpoint` | +| Vendor | Resource cloud provider extracted from `arn` | +| Operational Status | Defaults to "1" ("Operational") | + +### DynamoDB Table (`cmdb_ci_dynamodb_table`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| Object Id | `arn` | +| Location | Region extracted from `arn` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### DynamoDB Global Table (`cmdb_ci_dynamodb_global_table`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| Object Id | `arn` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Compute Security Group (`cmdb_ci_compute_security_group`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| Object Id | `id` | +| Location | Region extracted from `arn` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Function (`cmdb_ci_cloud_function`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| Object Id | `arn` | +| Language | `runtime` | +| Code Size | `source_code_size` | +| Location | Region extracted from `arn` | +| Name | `function_name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Load Balancer (`cmdb_ci_cloud_load_balancer`) + +| CMDB field | Terraform state field | +| -------------------------- | ------------------------------- | +| Source Native Key | `arn` | +| Object Id | `id` | +| Canonical Hosted Zone Name | `dns_name` | +| Canonical Hosted Zone ID | `zone_id` | +| Location | Region extracted from `arn` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/azure.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/azure.mdx new file mode 100644 index 000000000..0a503bec6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/azure.mdx @@ -0,0 +1,158 @@ +--- +page_title: ServiceNow Service Graph Connector Microsoft Azure resource coverage +description: >- + Use the ServiceNow Service Graph integration to import selected resources from + Microsoft Azure into ServiceNow CMDB. +source: terraform-docs-common +--- + +# ServiceNow Service Graph Connector Microsoft Azure resource coverage + +This page describes how Terraform-provisioned Azure resources are mapped to the classes within the ServiceNow CMDB. + +## Mapping of Terraform resources to CMDB CI Classes + +| Azure resource | Terraform resource name | ServiceNow CMDB CI Class | ServiceNow CMDB Category Name | +| ---------------------- | --------------------------------- | -------------------------------- | ----------------------------- | +| Azure account | N/A | `cmdb_ci_cloud_service_account` | Cloud Service Account | +| Azure region | N/A | `cmdb_ci_azure_datacenter` | Azure Datacenter | +| Resource Group | `azurerm_resource_group` | `cmdb_ci_resource_group` | Resource Group | +| Windows VM | `azurerm_windows_virtual_machine` | `cmdb_ci_vm_instance` | Virtual Machine Instance | +| Linux VM | `azurerm_linux_virtual_machine` | `cmdb_ci_vm_instance` | Virtual Machine Instance | +| AKS Cluster | `azurerm_kubernetes_cluster` | `cmdb_ci_kubernetes_cluster` | Kubernetes Cluster | +| Storage Container | `azurerm_storage_container` | `cmdb_ci_cloud_storage_account` | Cloud Storage Account | +| MariaDB Database | `azurerm_mariadb_server` | `cmdb_ci_cloud_database` | Cloud DataBase | +| MS SQL Database | `azurerm_mssql_server` | `cmdb_ci_cloud_database` | Cloud DataBase | +| MySQL Database | `azurerm_mysql_server` | `cmdb_ci_cloud_database` | Cloud DataBase | +| PostgreSQL Database | `azurerm_postgresql_server` | `cmdb_ci_cloud_database` | Cloud DataBase | +| Network security group | `azurerm_network_security_group` | `cmdb_ci_compute_security_group` | Compute Security Group | +| Linux Function App | `azurerm_linux_function_app` | `cmdb_ci_cloud_function` | Cloud Function | +| Windows Function App | `azurerm_windows_function_app` | `cmdb_ci_cloud_function` | Cloud Function | +| Virtual Network | `azurerm_virtual_network` | `cmdb_ci_network` | Cloud Network | +| Tags | N/A | `cmdb_key_value` | Key Value | + +## Resource relationships + +| Child CI Class | Relationship type | Parent CI Class | +| ----------------------------------------------------------- | ---------------------- | --------------------------------------------------------- | +| Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | Hosted On::Hosts | Cloud Service Account 2 (`cmdb_ci_cloud_service_account`) | +| Azure Datacenter 2 (`cmdb_ci_azure_datacenter`) | Hosted On::Hosts | Cloud Service Account 3 (`cmdb_ci_cloud_service_account`) | +| Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | Contains::Contained by | Resource Group 1 (`cmdb_ci_resource_group`) | +| Cloud Storage Account 1 (`cmdb_ci_cloud_storage_account`) | Hosted On::Hosts | Azure Datacenter 2 (`cmdb_ci_azure_datacenter`) | +| Virtual Machine Instance 2 (`cmdb_ci_vm_instance`) | Hosted On::Hosts | Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | +| Virtual Machine Instance 2 (`cmdb_ci_vm_instance`) | Reference | Key Value 14 (`cmdb_key_value`) | +| Virtual Machine Instance 3 (`cmdb_ci_vm_instance`) | Hosted On::Hosts | Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | +| Virtual Machine Instance 3 (`cmdb_ci_vm_instance`) | Reference | Key Value 15 (`cmdb_key_value`) | +| Kubernetes Cluster 2 (`cmdb_ci_kubernetes_cluster`) | Hosted On::Hosts | Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | +| Kubernetes Cluster 2 (`cmdb_ci_kubernetes_cluster`) | Reference | Key Value 16 (`cmdb_key_value`) | +| Cloud DataBase 2 (`cmdb_ci_cloud_database` ) | Hosted On::Hosts | Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | +| Cloud DataBase 2 (`cmdb_ci_cloud_database` ) | Reference | Key Value 9 (`cmdb_key_value`) | +| Compute Security Group 2 (`cmdb_ci_compute_security_group`) | Hosted On::Hosts | Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | +| Compute Security Group 2 (`cmdb_ci_compute_security_group`) | Reference | Key Value 17 (`cmdb_key_value`) | +| Cloud Function 2 (`cmdb_ci_cloud_function`) | Hosted On::Hosts | Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | +| Cloud Function 2 (`cmdb_ci_cloud_function`) | Reference | Key Value 19 (`cmdb_key_value`) | +| Cloud Network 2 (`cmdb_ci_network`) | Hosted On::Hosts | Azure Datacenter 1 (`cmdb_ci_azure_datacenter`) | +| Cloud Network 2 (`cmdb_ci_network`) | Reference | Key Value 20 (`cmdb_key_value`) | + +## Field attributes mapping + +### Cloud Service Account (`cmdb_ci_cloud_service_account`) + +| CMDB field | Terraform state field | +| ------------------ | ----------------------------------- | +| Source Native Key | Subscription ID extracted from `id` | +| Account Id | Subscription ID extracted from `id` | +| Datacenter Type | Defaults to `azure` | +| Object ID | Subscription ID extracted from `id` | +| Name | Subscription ID extracted from `id` | +| Operational Status | Defaults to "1" ("Operational") | + +### Azure Datacenter (`cmdb_ci_azure_datacenter`) + +| CMDB field | Terraform state field | +| ------------------ | ----------------------------------------------- | +| Source Native Key | Concatenation of `location` and Subscription ID | +| Object Id | `location` | +| Region | `location` | +| Name | `location` | +| Operational Status | Defaults to "1" ("Operational") | + +### Virtual Machine Instance (`cmdb_ci_vm_instance`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Storage Account (`cmdb_ci_cloud_storage_account`) + +| CMDB field | Terraform state field | +| --------------------------- | ------------------------------- | +| Source Native Key | `resource_manager_id` | +| Object Id | `resource_manager_id` | +| Fully qualified domain name | `id` | +| Blob Service | `storage_account_name` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Resource Group (`cmdb_ci_resource_group`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Location | `location` | +| Operational Status | Defaults to "1" ("Operational") | + +### Kubernetes Cluster (`cmdb_ci_kubernetes_cluster`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| IP Address | `fqdn` | +| Port | Defaults to "6443" | +| Name | `name` | +| Location | `location` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud DataBase (`cmdb_ci_cloud_database`) + +| CMDB field | Terraform state field | +| --------------------------- | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Version | `engine_version` | +| Fully qualified domain name | `fqdn` | +| Name | `name` | +| Vendor | Defaults to `azure` | +| Operational Status | Defaults to "1" ("Operational") | + +### Compute Security Group (`cmdb_ci_compute_security_group`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Function (`cmdb_ci_cloud_function`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Network (`cmdb_ci_network`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/gcp.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/gcp.mdx new file mode 100644 index 000000000..5681430c8 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/gcp.mdx @@ -0,0 +1,159 @@ +--- +page_title: ServiceNow Service Graph Connector Google Cloud resource coverage +description: >- + Use the ServiceNow Service Graph for Terraform Enterprise integration to + import selected resources from Google Cloud into ServiceNow CMDB. +source: terraform-docs-common +--- + +# ServiceNow Service Graph Connector Google Cloud resource coverage + +This page provides details on how Google Cloud resources, set up using Terraform, are corresponded to the classes within the ServiceNow CMDB. + +## Mapping of Terraform resources to CMDB CI Classes + +| Google resource | Terraform resource name | ServiceNow CMDB CI Class | ServiceNow CMDB Category Name | +| ------------------------ | --------------------------------------------------------------------- | -------------------------------- | ----------------------------- | +| Project ID | N/A | `cmdb_ci_cloud_service_account` | Cloud Service Account | +| Region (location) | N/A | `cmdb_ci_google_datacenter` | Google Datacenter | +| Virtual Machine Instance | `google_compute_instance` | `cmdb_ci_vm_instance` | Virtual Machine Instance | +| Kubernetes Cluster | `google_container_cluster` | `cmdb_ci_kubernetes_cluster` | Kubernetes Cluster | +| Google Storage | `google_storage_bucket` | `cmdb_ci_cloud_storage_account` | Cloud Storage Account | +| Google BigQuery | `google_bigquery_table` | `cmdb_ci_cloud_database` | Cloud DataBase | +| Google SQL | `google_sql_database` | `cmdb_ci_cloud_database` | Cloud DataBase | +| Google Compute Firewall | `google_compute_firewall` | `cmdb_ci_compute_security_group` | Compute Security Group | +| Cloud Function | `google_cloudfunctions_function` or `google_cloudfunctions2_function` | `cmdb_ci_cloud_function` | Cloud Function | +| Load Balancer | `google_compute_forwarding_rule` | `cmdb_ci_cloud_load_balancer` | Cloud Load Balancer | +| VPC | `google_compute_network` | `cmdb_ci_network` | Cloud Network | +| Tags | N/A | `cmdb_key_value` | Key Value | + +## Resource relationships + +| Child CI Class | Relationship type | Parent CI Class | +| ----------------------------------------------------------- | ----------------- | --------------------------------------------------------- | +| Google Datacenter 1 (`cmdb_ci_google_datacenter`) | Hosted On::Hosts | Cloud Service Account 4 (`cmdb_ci_cloud_service_account`) | +| Google Datacenter 2 (`cmdb_ci_google_datacenter`) | Hosted On::Hosts | Cloud Service Account 4 (`cmdb_ci_cloud_service_account`) | +| Virtual Machine Instance 4 (`cmdb_ci_vm_instance`) | Hosted On::Hosts | Google Datacenter 1 (`cmdb_ci_google_datacenter`) | +| Virtual Machine Instance 4 (`cmdb_ci_vm_instance`) | Reference | Key Value 13 (`cmdb_key_value`) | +| Cloud Network 3 (`cmdb_ci_network`) | Hosted On::Hosts | Google Datacenter 1 (`cmdb_ci_google_datacenter`) | +| Cloud Network 3 (`cmdb_ci_network`) | Reference | Key Value 18 (`cmdb_key_value`) | +| Compute Security Group 3 (`cmdb_ci_compute_security_group`) | Hosted On::Hosts | Google Datacenter 1 (`cmdb_ci_google_datacenter`) | +| Compute Security Group 3 (`cmdb_ci_compute_security_group`) | Reference | Key Value 21 (`cmdb_key_value`) | +| Kubernetes Cluster 3 (`cmdb_ci_kubernetes_cluster`) | Hosted On::Hosts | Google Datacenter 1 (`cmdb_ci_google_datacenter`) | +| Kubernetes Cluster 3 (`cmdb_ci_kubernetes_cluster`) | Reference | Key Value 22 (`cmdb_key_value`) | +| Cloud DataBase 3 (`cmdb_ci_cloud_database` ) | Hosted On::Hosts | Google Datacenter 1 (`cmdb_ci_google_datacenter`) | +| Cloud DataBase 2 (`cmdb_ci_cloud_database` ) | Reference | Key Value 24 (`cmdb_key_value`) | +| Cloud Function 3 (`cmdb_ci_cloud_function`) | Hosted On::Hosts | Google Datacenter 1 (`cmdb_ci_google_datacenter`) | +| Cloud Function 3 (`cmdb_ci_cloud_function`) | Reference | Key Value 25 (`cmdb_key_value`) | +| Cloud Load Balancer 2 (`cmdb_ci_cloud_load_balancer`) | Hosted On::Hosts | Google Datacenter 1 (`cmdb_ci_google_datacenter`) | +| Cloud Load Balancer 2 (`cmdb_ci_cloud_load_balancer`) | Reference | Key Value 26 (`cmdb_key_value`) | +| Cloud Storage Account 2 (`cmdb_ci_cloud_storage_account`) | Hosted On::Hosts | Google Datacenter 2 (`cmdb_ci_google_datacenter`) | +| Cloud Storage Account 2 (`cmdb_ci_cloud_storage_account`) | Reference | Key Value 23 (`cmdb_key_value`) | + +## Field attributes mapping + +### Cloud Service Account (`cmdb_ci_cloud_service_account`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `project` | +| Account Id | `project` | +| Datacenter Type | Defaults to `google` | +| Object ID | `project` | +| Name | `project` | +| Operational Status | Defaults to "1" ("Operational") | + +### Google Datacenter (`cmdb_ci_google_datacenter`) + +| CMDB field | Terraform state field | +| ------------------ | --------------------------------------------------------- | +| Source Native Key | Concatenation of `project` and region extracted from `id` | +| Object Id | Region extracted from `id` | +| Region | Region extracted from `id` | +| Name | Region extracted from `id` | +| Operational Status | Defaults to "1" ("Operational") | + +### Virtual Machine Instance (`cmdb_ci_vm_instance`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Category | `machine_type` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Network (`cmdb_ci_network`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Compute Security Group (`cmdb_ci_compute_security_group`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Kubernetes Cluster (`cmdb_ci_kubernetes_cluster`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `arn` | +| IP Address | `endpoint` | +| Port | Defaults to "6443" | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Object Storage (`cmdb_ci_cloud_object_storage`) + +| CMDB field | Terraform state field | +| ------------------ | -------------------------------------------- | +| Source Native Key | `arn` | +| Object Id | `id` | +| Cloud Provider | Resource cloud provider extracted from `arn` | +| Name | `bucket` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Storage Account (`cmdb_ci_cloud_storage_account`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Name | `location` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud DataBase (`cmdb_ci_cloud_database`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | Name extracted from `id` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Function (`cmdb_ci_cloud_function`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### Cloud Load Balancer (`cmdb_ci_cloud_load_balancer`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/index.mdx new file mode 100644 index 000000000..ec81da07c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/index.mdx @@ -0,0 +1,37 @@ +--- +page_title: >- + ServiceNow Service Graph Connector for Terraform Enterprise resource coverage + overview +description: >- + The ServiceNow Service Graph for Terraform Enterprise integration imports + selected resources from major cloud providers into ServiceNow CMDB. +source: terraform-docs-common +--- + +# ServiceNow Service Graph Connector for Terraform resource coverage overview + +The tables provided in this section illustrate the mapping of resources from the Terraform state to the ServiceNow CMDB configuration items (CIs) by the Service Graph Connector for Terraform. + +While the default ETL map provided by the application can be utilized without modification, it is also possible to customize it according to the specific requirements of your organization. Check [customizations](/terraform/enterprise/integrations/service-now/service-graph/customizations) for more details. + +The application supports selected resources from major cloud providers. The following pages provide mapping details for each supported provider: + +- [AWS](/terraform/enterprise/integrations/service-now/service-graph/resource-coverage/aws) +- [Azure](/terraform/enterprise/integrations/service-now/service-graph/resource-coverage/azure) +- [GCP](/terraform/enterprise/integrations/service-now/service-graph/resource-coverage/gcp) +- [VMware vSphere](/terraform/enterprise/integrations/service-now/service-graph/resource-coverage/vsphere) + +# Importing Tags + +The Service Graph Connector for Terraform imports the Terraform tags associated with your resource into CMDB. Tags are mapped to the **Key Value** CI Class. +Along with the tags assigned in your Terraform code, the integration also includes `tf_organization` and `tf_workspace` tags. These tags are used to indicate the HCP Terraform organization and workspace where the resource was provisioned. + +The visibility of the **Tags** tab in CMDB varies for different configuration items. By default, not every configuration item has the **Tags** tab enabled. For instance, the **Virtual Machine Instance** class page includes the **Tags** tab, whereas the **AWS Cloud ECS Cluster** page does not. + +The following example illustrates how the **Tags** tab can be enabled for **AWS Cloud ECS Cluster** CI class in CMDB. + +1. Enter `cmdb_ci_cloud_ecs_cluster.list` in the search menu of your ServiceNow instance. +2. Open any record. Right-click on the gray bar at the top, select **Configure** and proceed to **Related Lists**. If you are in a different scope, click **Edit this view**. +3. Transfer **Key Value->Configuration item** from the left column to the right and click **Save**. Tags become available in CMDB for all AWS ECS cluster records. + +![screenshot: ServiceNow Service Graph Connector - enable the Tags tab in CMDB](/img/docs/service-now-service-graph-tags.png) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/vsphere.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/vsphere.mdx new file mode 100644 index 000000000..9e9f91fe2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/resource-coverage/vsphere.mdx @@ -0,0 +1,84 @@ +--- +page_title: ServiceNow Service Graph Connector VMware vSphere resource coverage +description: >- + Use the ServiceNow Service Graph integration to import selected resources from + VMware vSphere into ServiceNow CMDB. +source: terraform-docs-common +--- + +# ServiceNow Service Graph Connector VMware vSphere resource coverage + +This page explains the rules of associating VMware vSphere resources, created via Terraform, with the classes in the ServiceNow CMDB. + +## Mapping of Terraform resources to CMDB CI Classes + +| vSphere resource | Terraform resource name | ServiceNow CMDB CI Class | ServiceNow CMDB Category Name | +| ------------------------- | --------------------------- | ------------------------------- | ------------------------------- | +| vCenter server | N/A | `cmdb_ci_cloud_service_account` | Cloud Service Account | +| vSphere Datacenter | `vsphere_datacenter` | `cmdb_ci_vcenter_datacenter` | VMware vCenter Datacenter | +| vSphere Virtual Machine | `vsphere_virtual_machine` | `cmdb_ci_vmware_instance` | VMware Virtual Machine Instance | +| vSphere Datastore Cluster | `vsphere_datastore_cluster` | `cmdb_ci_vcenter_datastore` | VMware vCenter Datastore | +| vSphere Network | `vsphere_network` | `cmdb_ci_vcenter_network` | VMware vCenter Network | +| Tags | N/A | `cmdb_key_value` | Key Value | + +## Resource relationships + +| Child CI Class | Relationship type | Parent CI Class | +| ------------------------------------------------------------- | ----------------- | ---------------------------------------------------------- | +| VMware vCenter Datacenter 1 (`cmdb_ci_vcenter_datacenter`) | Hosted On::Hosts | Cloud Service Account 5 (`cmdb_ci_cloud_service_account`) | +| VMware Virtual Machine Instance 1 (`cmdb_ci_vmware_instance`) | Hosted On::Hosts | VMware vCenter Datacenter 1 (`cmdb_ci_vcenter_datacenter`) | +| VMware Virtual Machine Instance 1 (`cmdb_ci_vmware_instance`) | Reference | Key Value 27 (`cmdb_key_value`) | +| VMware vCenter Network 1 (`cmdb_ci_vcenter_network`) | Hosted On::Hosts | VMware vCenter Datacenter 1 (`cmdb_ci_vcenter_datacenter`) | +| VMware vCenter Network 1 (`cmdb_ci_vcenter_network`) | Reference | Key Value 28 (`cmdb_key_value`) | +| VMware vCenter Datastore 1 (`cmdb_ci_vcenter_datastore`) | Hosted On::Hosts | VMware vCenter Datacenter 1 (`cmdb_ci_vcenter_datacenter`) | +| VMware vCenter Datastore 1 (`cmdb_ci_vcenter_datastore`) | Reference | Key Value 29 (`cmdb_key_value`) | + +## Field attributes mapping + +### Cloud Service Account (`cmdb_ci_cloud_service_account`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | Defaults to "VMware_vCenter" | +| Account Id | Defaults to "VMware_vCenter" | +| Datacenter Type | Defaults to "VMware_vCenter" | +| Object ID | Defaults to "VMware_vCenter" | +| Name | Defaults to "VMware_vCenter" | +| Operational Status | Defaults to "1" ("Operational") | + +### VMware vCenter Datacenter (`cmdb_ci_vcenter_datacenter`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `datacenter_id` | +| Object Id | `datacenter_id` | +| Region | `datacenter_id` | +| Name | `datacenter_id` | +| Operational Status | Defaults to "1" ("Operational") | + +### VMware Virtual Machine Instance (`cmdb_ci_vmware_instance`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### VMware vCenter Network (`cmdb_ci_vcenter_network`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | + +### VMware vCenter Datastore (`cmdb_ci_vcenter_datastore`) + +| CMDB field | Terraform state field | +| ------------------ | ------------------------------- | +| Source Native Key | `id` | +| Object Id | `id` | +| Name | `name` | +| Operational Status | Defaults to "1" ("Operational") | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/service-graph-setup.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/service-graph-setup.mdx new file mode 100644 index 000000000..c71384b3d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/integrations/service-now/service-graph/service-graph-setup.mdx @@ -0,0 +1,162 @@ +--- +page_title: Set up the ServiceNow Service Graph Connector for Terraform Enterprise +description: >- + Learn how to set up the ServiceNow Service Graph Connector for Terraform + Enterprise. +source: terraform-docs-common +--- + +# Set up the ServiceNow Service Graph Connector + +-> **Note:** Follow the [Configure ServiceNow Service Graph Connector for HCP Terraform](/terraform/tutorials/it-saas/servicenow-sgc) tutorial for hands-on instructions on how to import an AWS resource deployed in your HCP Terraform organization to the ServiceNow CMDB by using the Service Graph Connector for Terraform. + +The ServiceNow Service Graph Connector for Terraform is a certified scoped application available in the ServiceNow Store. Search for ”Service Graph Connector for Terraform” published by ”HashiCorp Inc” and click **Install**. + +## Prerequisites + +To start using the Service Graph Connector for Terraform, you must have: + +- An administrator account on a Terraform Enterprise instance or within an HCP Terraform organization. +- An administrator account on your ServiceNow vendor instance. + +The Service Graph Connector for Terraform supports the following ServiceNow server versions: + +- Washington DC +- Xanadu +- Yokohama + +The following ServiceNow plugins are required dependencies: + +- ITOM Discovery License +- Integration Commons for CMDB +- Discovery and Service Mapping Patterns +- ServiceNow IntegrationHub Standard Pack + +Additionally, you can install the IntegrationHub ETL application if you want to modify the default CMDB mappings. + +-> **Note:** Dependent plugins are installed on your ServiceNow instance automatically when the app is downloaded from the ServiceNow Store. Before installing the Service Graph Connector for Terraform, you must activate the ITOM Discovery License plugin in your production instance. + +## Connect ServiceNow to HCP Terraform + +-> **ServiceNow roles:** `admin`, `x_hashi_service_gr.terraform_user` + +Once the integration is installed, you can proceed to the guided setup form where you will enter your Terraform credentials. This step will establish a secure connection between HCP Terraform and your ServiceNow instance. + +### Create and scope Terraform API token + +In order for ServiceNow to connect to HCP Terraform, you must give it an HCP Terraform API token. The permissions of this token determine what resources the Service Graph Connector will import into the CMDB. While you could use a user API token, it could import resources from multiple organizations. By providing a team API token, you can scope permissions to only import resources from specified workspaces within a single organization. + +To create a team API token: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to create a team token. +2. Choose **Settings** from the sidebar, then **Teams**. +3. In **Team API Token** section, click **Create a team token**. + +Save this token in a safe place since HCP Terraform only displays it once. You will use it to configure ServiceNow in the next section. + +![ServiceNow Service Graph Connector Configure Team API token in HCP Terraform](/img/docs/service-now-service-graph-team-token-gen.png) + +### Configure Service Graph Connector for Terraform API token + +In the top navigation of your ServiceNow instance's control panel, click on **All**, search for **Service Graph Connector for Terraform**, and click **SG-Setup**. Next, click **Get Started**. + +Next, in the **Configure the Terraform connection** section, click **Get Started**. + +In the **Configure Terraform authentication credentials** section, click **Configure**. + +If you want to route traffic between your HCP Terraform and the ServiceNow instance through a MID server acting as a proxy, change the **Applies to** dropdown to "Specific MID servers" and select your previously configured MID server name. If you don't use MID servers, leave the default value. + +Set the **API Key** to the HCP Terraform team API token that you created in the previous section and click **Update**. + +![ServiceNow Service Graph Connector API Key Credentials configuration screen. The API key is provided, then saved by clicking the Update button](/img/docs/service-now-service-graph-apikey.png) + +In the **Configure Terraform authentication credentials** section, click **Mark as Complete**. + +### Configure Terraform Webhook Notification token + +To improve security, HCP Terraform includes an HMAC signature on all "generic" webhook notifications using a user-provided **token**. This token is an arbitrary secret string that HCP Terraform uses to sign each webhook notification. ServiceNow uses the same token to verify the request authenticity. Refer to [Notification Authenticity](/terraform/enterprise/api-docs/notification-configurations#notification-authenticity) for more information. + +Create a token and save it in a safe place. This secret token can be any value but should be treated as sensitive. + +In the **Configure Terraform Webhook token** section, click **Configure**. In the **Token** field, enter the secret token that will be shared between the HCP Terraform and your ServiceNow instance and click **Update**. + +![ServiceNow Service Graph Connector Webhook token configuration screen. The Token is provided, then saved by clicking the Update button](/img/docs/service-now-service-graph-webhook-token.png) + +In the **Configure Terraform Webhook token** section, click **Mark as Complete**. + +### Configure Terraform connection + +In the **Configure Terraform connection** section, click **Configure**. + +If you are using Terraform Enterprise, set the **Connection URL** to the URL of your Terraform Enterprise instance. If you are using HCP Terraform, leave the **Connection URL** as the default value of `https://app.terraform.io`. + +![ServiceNow Service Graph Connector HTTP Connection configuration screen. A Terraform Enterprise URL may be provided in the Connection URL field, the saved by clicking the Update button](/img/docs/service-now-service-graph-tfconn.png) + +If you want to use a MID server, check **Use MID server** box, change **MID Selection** dropdown to "Specific MID sever" and select your previously configured and validated MID server. + +Click **Update** to save these settings. In the **Configure Terraform connection** section, click **Mark as Complete**. + +## Import Resources + +Refer to the documentation explaining the difference between the [two modes of import](/terraform/enterprise/integrations/service-now/service-graph#import-methods) offered by the Service Graph Connector for Terraform. Both options may be enabled, or you may choose to enable only the webhook or scheduled import. + +### Configure scheduled import + +In the **Set up scheduled import job** section of the setup form, proceed to **Configure the scheduled jobs** and click **Configure**. + +You can use the **Execute Now** option to run a single import job, which is useful for testing. The import set will be displayed in the table below the scheduled import form, after refreshing the page. Once the import is successfully triggered, click on the **Import Set** field of the record to view the logs associated with the import run, as well as its status. + +Activate the job by checking the **Activate** box. Set the **Repeat Interval** and click **Update**. Note that the import processing time depends of the number of organizations and workspaces in your HCP Terraform. Setting the import job to run frequently is not recommended for big environments. + +![ServiceNow Service Graph Connector scheduled import screen](/img/docs/service-now-service-graph-scheduled-import.png) + +You can also access the scheduler interface by searching for **Service Graph Connector for Terraform** in the top navigation menu and selecting **SG-Import Schedule**. + +### Configure Terraform Webhook + +In the top navigation, click on **All**, search for **Scheduled Imports**, and click on **Scheduled Imports**. + +Select the **SG-Terraform Scheduled Process State** record, then click **To edit the record click here**. + +Click the **Active** checkbox to enable it. Leave the default value for the **Repeat Interval** of 5 seconds. Click **Update**. + +![ServiceNow Service Graph Connector scheduled import screen showing the Active checkbox enabled](/img/docs/service-now-service-graph-webhook-schedule.png) + +Next, create the webhook in HCP Terraform. Select a workspace and click **Settings > Notifications**. Click **Create a Notification**. + +Keep the **Destination** as the default option of **Webhook**. Choose a descriptive name **Name**. + +Set the **Webhook URL** enter `https:///api/x_hashi_service_gr/sg_terraform_webhook` and replace `` with the hostname of your ServiceNow instance. + +In the **Token** field, enter the same string you provided in **Terraform Webhook token** section the of the Service Graph guided setup form. + +Under **Health Events** choose **No events**. + +Under **Run Events** choose **Only certain events** and enable notifications only on **Completed** runs. Click **Create Notification**. + +![HCP Terraform notification creation screen, showing a webhook pointing to ServiceNow which is only triggered on completed runs](/img/docs/service-now-service-graph-webhook-tfc.png) + +Trigger a run in your workspace. Once the run is successfully completed, a webhook notification request will be sent to your ServiceNow instance. + +### Monitor the import job + +By following these steps, you can track the status of import jobs in ServiceNow and verify the completion of the import process before accessing the imported resources in the CMDB. + +For scheduled imports, navigate back to the **SG-Import Schedule** interface. For webhook imports, go to the **SG-Terraform Scheduled Process State** interface. + +Under the form, you will find a table containing all registered import sets. Locate and select the relevant import set record. + +Click on the **Import Set** field to open it and view its details. The **Outbound Http Requests** tab lists all requests made by your ServiceNow instance to HCP Terraform in order to retrieve the latest Terraform state. + +Monitor the state of the import job. Wait for it to change to **Complete**, indicated by a green mark. +Once the import job is complete, you can access the imported resources in the CMDB. + +![ServiceNow Service Graph Connector: import set with successfully completed status](/img/docs/service-now-service-graph-import-set.png) + +You can also access all import sets, regardless of the import type, by navigating to **All** and selecting **Import Sets** under the **Advanced** category. + +### View resources in ServiceNow CMDB + +In the top navigation of ServiceNow, click on **All** and search for **CMDB Workspace**, and click on **CMDB Workspace**. + +Perform a search by entering a Configuration Item (CI) name in the **Search** field (for example, **Virtual Machine Instance**). CI names supported by the application are listed on the [resource mapping page](/terraform/enterprise/integrations/service-now/service-graph/resource-coverage). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/index.mdx new file mode 100644 index 000000000..de34c14dd --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/index.mdx @@ -0,0 +1,91 @@ +--- +page_title: Migrate Terraform state to Terraform Enterprise or Terraform Enterprise +description: >- + Learn how to migrate existing Terraform state to Terraform Enterprise or + Terraform Enterprise so that you can manage existing infrastructure without + de-provisioning. +source: terraform-docs-common +--- + +# Migrate Terraform state to HCP Terraform or Terraform Enterprise + +This topic describes how to migrate existing Terraform state files to HCP Terraform or Terraform Enterprise without first de-provisioning them. Refer to [State](/terraform/language/state) in the Terraform configuration language reference for additional information about Terraform state. + +## Overview + +Perform the following actions to migrate existing resources to one or more workspaces in HCP Terraform or Terraform Enterprise: + +1. Stop all Terraform operations associated with the state files. +2. Migrate Terraform state files using either the Terraform CLI or the HCP Terraform or Terraform Enterprise API. + +Use one of the following methods to migrate your state: + +1. Manually using the Terraform CLI +2. Automatically using `tf-migrate` +3. Manually using the HCP Terraform API + +## Requirements + +- Terraform v1.1 and later is required to configure the `cloud` block. For Terraform v1.0 and older, use the [`remote` backend](/terraform/language/settings/backends/remote) instead. +- Create an account on [HCP Terraform](https://app.terraform.io/) or on a [Terraform Enterprise instance](/terraform/enterprise/users-teams-organizations/users#creating-an-account). +- You must present a token linked to appropriate permissions to use the API. Refer to the following topics for additional information: + - [HCP Terraform API overview](/terraform/enterprise/api-docs) + - [Terraform Enterprise API overview](/terraform/enterprise/api-docs) + +## Stop Terraform operations + +Stop all Terraform operations associated with the state files. This may require locking or deleting CI jobs, restricting access to the state backend, and communicating with other teams. You should also only migrate state files into HCP Terraform or Terraform Enterprise workspaces that have never performed a run. + +## Migrate state using the CLI + +> **Hands-on:** Complete the [Migrate State to HCP Terraform](/terraform/tutorials/state/cloud-migrate) tutorial for additional guidance on how to migrate Terraform state using the CLI. + +1. Add the `cloud` block to your Terraform configuration and specify the following fields: + + 1. `hostname` field: Specify either `app.terraform.io` for HCP Terraform or the hostname of your Terraform Enterprise deployment. + 2. `organization` field: Specify your HCP Terraform or Terraform Enterprise organization. + 3. `workspaces` block: Add a `tags` or `name` field and specify one or more destination workspaces as a list of strings. + + Refer to [The `cloud` Block](/terraform/cli/cloud/settings#the-cloud-block) in the Terraform CLI documentation for additional information. The following example migrates the state associated with the configuration to the `networking` workspace on HCP Terraform: + + ```hcl + terraform { + cloud { + hostname = "app.terraform.io" + organization = "my-org" + workspaces { + tags = ["networking"] + } + } + } + ``` + +2. Run `terraform init`. Terraform creates any workspaces specified in the configuration if they do not already exist in the organization. + +## Migrate state using Terraform migrate + +You can use the Terraform migrate CLI tool to automatically migrate state to HCP Terraform and Terraform Enterprise. The tool does not ship with HCP Terraform. You must download and install the binary for the CLI tool separately. Refer to the [Terraform migrate documentation](/terraform/enterprise/migrate/tf-migrate) for more information. + +## Migrate state using the API + +1. Encode your state files as a base64 string and generate an MD5 hash. The following example generates the string and hash file for a single `terraform.tfstate` file: + + ```shell-session + $ cat terraform.tfstate | base64 + dGVycmFmb3JtLnRmc3RhdGUK + $ md5sum terraform.tfstate + 690a3f8ae079c629494a52c68757d585 terraform.tfstate + ``` +2. If the workspace does not yet exist in your organization, send a `POST` request to the `/organizations/:organization_name/workspaces` endpoint to create it. Otherwise, proceed to the next step. Refer to the following topics for details: + - [Create a workspace](/terraform/enterprise/api-docs/workspaces#create-a-workspace) in the HCP Terraform API reference documentation. + - [Create a workspace](/terraform/enterprise/api-docs/workspaces#create-a-workspace) in the Terraform Enterprise API reference documentation. +3. Send a `POST` request to the `/workspaces/:workspace_id/actions/lock` endpoint to lock the workspace. Refer to the following topics for details: + - [Lock a workspace](/terraform/enterprise/api-docs/workspaces#lock-a-workspace) in the HCP Terraform API reference documentation. + - [Lock a workspace](/terraform/enterprise/api-docs/workspaces#lock-a-workspace) in the Terraform Enterprise API reference documentation. +4. To upload your state files to the workspace, send a `POST` request to the `/workspaces/:workspace_id/state-versions` endpoint. Specify the MD5 string in the `data.attributes.md5` field and encoded state file in the `data.attributes.state` field of the request body. Refer to the following topics for details: + - [Create a state version](/terraform/enterprise/api-docs/state-versions#create-a-state-version) in the HCP Terraform API reference documentation. + - [Create a state version](/terraform/enterprise/api-docs/state-versions#create-a-state-version) in the Terraform Enterprise API reference documentation. +5. Send a `POST` request to the `/workspaces/:workspace_id/actions/unlock` endpoint to unlock the workspace. + +Refer to the following external article for an example of how to create a script in Python to automate multiple state files: +[Migrating A Lot of State with Python and the HCP Terraform (previously Terraform Cloud) API](https://medium.com/hashicorp-engineering/migrating-a-lot-of-state-with-python-and-the-terraform-cloud-api-997ec798cd11). The example uses the [Workspaces API](/terraform/enterprise/api-docs/workspaces#create-a-workspace) to create the necessary workspaces in HCP Terraform and the [State Versions API](/terraform/enterprise/api-docs/state-versions) to migrate the state files to those workspaces. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/index.mdx new file mode 100644 index 000000000..9712d3e46 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/index.mdx @@ -0,0 +1,132 @@ +--- +page_title: Terraform migrate overview +description: Learn how to install and configure the Terraform migrate tf-migrate CLI tool. +source: terraform-docs-common +--- + +# Terraform migrate + +The Terraform migrate `tf-migrate` CLI automatically migrates your Terraform Community Edition state and variables to HCP Terraform or Terraform Enterprise. It also updates your local configuration with the new state storage location and optionally creates a pull request to update your code repository. + +**Hands-on**: Complete the [Migrate to HCP Terraform in bulk](/terraform/tutorials/cloud/bulk-migrate-hcp) tutorial to get started with `tf-migrate`. + +## Overview + +Complete the following steps to install and configure `tf-migrate`: + +1. [Download and install `tf-migrate`](#install). +2. Configure `tf-migrate` to [authenticate](#connect-to-hcp-terraform-or-enterprise-terraform) to HCP Terraform or Terraform Enterprise. +3. Enable logging so that you can troubleshoot potential issues that may occur during the migration process. + +### GitHub and GitLab connection requirements + +The `tf-migrate` tool can optionally open a pull request to update your configuration in GitHub or GitLab. + +If your Terraform files are stored in GitHub, you must configure an API token that meets the following requirements: + +- The token must be a classic token. Refer to the [GitHub documentation](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/managing-your-personal-access-tokens) for additional information. +- The token must have the `repo` OAuth scope. + +If your Terraform files are stored in GitLab Cloud, you must configure an API token that meets the following requirements: + +- The token must be a personal access token. Refer to the [GitHub documentation](https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/managing-your-personal-access-tokens) for additional information. +- The token must be have `read_repository` and `write_repository` scopes. + +## Install + + + + + +HashiCorp distributes `tf-migrate` as a binary package. To install `tf-migrate`, find the [appropriate binary](https://releases.hashicorp.com/tf-migrate/) for your operating system and download it as a zip archive. + +After you download `tf-migrate`, unzip the archive. + +Finally, make sure that the `tf-migrate` binary is available in a directory that is in your system's `PATH`. + +### Verify the installation + +Every build of `tf-migrate` includes a `SHA256SUMS` and a `SHA256SUMS.sig` file to validate your downloaded binary. Refer to the [verify HashiCorp binary downloads tutorial](https://developer.hashicorp.com/well-architected-framework/operational-excellence/verify-hashicorp-binary) for more information. + + + + + +[Homebrew](https://brew.sh/) is a free and open-source package management system for macOS. You can install the official [`tf-migrate`](https://github.com/hashicorp/homebrew-tap) formula from the terminal. + +First, install the HashiCorp tap, a repository of all our Homebrew packages. + + $ brew tap hashicorp/tap + +Now, install `tf-migrate` with the `hashicorp/tap/tf-migrate` formula. + + $ brew install hashicorp/tap/tf-migrate + + + + + +## Connect to HCP Terraform or Enterprise Terraform + +The `tf-migrate` tool uses your locally configured Terraform CLI API token. If you have not authenticated your local Terraform installation with HCP Terraform, use the `terraform login` command to create an authentication token. + + $ terraform login + + Terraform will request an API token for app.terraform.io using your browser. + + If login is successful, Terraform will store the token in plain text in + the following file for use by subsequent commands: + /Users/redacted/.terraform.d/credentials.tfrc.json + + Do you want to proceed? + Only 'yes' will be accepted to confirm. + + Enter a value: yes + +Terraform opens a browser to the HCP Terraform sign in screen, where you can then enter a token name in the web UI, or leave the default name. Click **Create API token** to generate the authentication token. + +HCP Terraform only displays your token once. Copy this token, then when the Terraform CLI prompts you, paste the user token exactly once into your terminal. Press **Enter** to complete the authentication process. + +`tf-migrate` can optionally create a pull request that updates the state storage location specified in your Terraform configuration. To do this, `tf-migrate` uses the GitHub or GitLab Cloud API, and requires an API token with permissions to modify your Git repository. + +To configure your API token, set the `TF_GIT_PAT_TOKEN` environment variable + + $ export TF_GIT_PAT_TOKEN= + +## Supported backends + +The `tf-migrate` tool supports migrating state from the following backends to HCP Terraform or Terraform Enterprise: + +- [local](/terraform/language/backend/local) +- [azurerm](/terraform/language/backend/azurerm) +- [consul](/terraform/language/backend/consul) +- [cos](/terraform/language/backend/cos) +- [gcs](/terraform/language/backend/gcs) +- [http](/terraform/language/backend/http) +- [Kubernetes](/terraform/language/backend/kubernetes) +- [oss](/terraform/language/backend/oss) +- [pg](/terraform/language/backend/pg) +- [s3](/terraform/language/backend/s3) + +`tf-migrate` does not support migrating state from an existing `cloud` integration or `remote` backend. + +## Enable logging + +You can enable detailed logging by setting the `TF_MIGRATE_ENABLE_LOG` environment variable to `true`. When you enable this setting, `tf-migrate` writes the logs to the following locations, depending on your operating system: + +| Platform | Location | +| --------------- | --------------------------------------------------------------- | +| macOS and Linux | `/Users//.tf-migrate/logs//.log` | +| Windows | `C:\Users\\.tf-migrate\logs\\.log` | + +You can set the `TF_MIGRATE_LOG_LEVEL` environment variable to one of the following values to change the verbosity of the logs in order of decreasing verbosity: + +- `TRACE` +- `DEBUG` +- `INFO` +- `WARN` +- `ERROR` + +## Additional configuration + +You can create an optional configuration file to modify the `tf-migrate` CLI behavior and specify the path to the configuration file when you run `tf-migrate prepare`. Any command-line flags you provide with these commands override the configuration file. Refer to the [configuration reference](/terraform/enterprise/migrate/tf-migrate/reference/configuration) for additional information. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/configuration.mdx new file mode 100644 index 000000000..215f5b9a2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/configuration.mdx @@ -0,0 +1,88 @@ +--- +page_title: Configuration file reference +description: >- + You can configure `tf-migrate` to control how it migrate your state to + Terraform Enterprise or Terraform Enterprise. +source: terraform-docs-common +--- + +# `tf-migrate` configuration file reference + +This topic describes the parameters for configuring the `tf-migrate` CLI. + +## Configuration model + +A `tf-migrate` configuration file supports the following parameters. + +- [`skip-dir`](#skip-dir): list of strings +- [`projects`](#projects): list of objects + - [`dir`](#projects-dir): string + - [`workspaces`](#projects-workspaces): list of objects + - [`name`](#projects-workspaces): string + - [`env-vars`](#projects-workspaces): + - [`terraform-vars`](#projects-workspaces): list of strings + +## Specification + +This section provides details about the fields you can configure in a `tf-migrate` configuration file. + +### `skip-dir` + +Specifies a list of paths to directories you want `tf-migrate` to skip. This parameter is identical to using the [`-skip-dir` command-line flag](/terraform/enterprise/migrate/tf-migrate/reference/prepare#available-options). By default, `tf-migrate` processes all child directories containing Terraform configuration files. + +- Data type: List of strings +- Default: None + +### `projects` + +Specifies a list of project configurations that align with local directories. The `tf-migrate` tool creates one project in HCP Terraform or Terraform Enterprise per configuration. In each project, `tf-migrate` creates one workspace per local workspace. + +- Data type: List of objects +- Default: None + +### `projects.dir` + +Specifies the relative or absolute path to the Terraform configuration to migrate. + +- Data type: String +- Default: None + +### `projects.workspaces` + +Specifies workspace configurations in the project. Terraform creates a workspace in HCP Terraform or Terraform Enterprise for each workspace configuration. The following table describes the attributes you can configure in each item in the list of workspaces: + +| Attribute | Description | Data type | Default | +| ---------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------- | ------- | +| `name` | Specifies the name of the local workspace. | String | None | +| `env-vars` | Specifies a map of environment variables to set during the migration. Each key must start with `TF_VAR`. You must specify `env-vars`, `terraform-vars`, or both. | Object | None | +| `terraform-vars` | Specifies a list of Terraform variables files to use for configuring the workspace. Each file must end with either `.tfvars` or `tfvars.json`. You must specify `terraform-vars`, `env-vars`, or both. The path can be a relative or absolute path. | List of strings | None | + +- Data type: List of objects +- Default: None + +## Example configuration file + +In the following example, Terraform creates one project using data from the `example/project1` directory. The project has a workspace named `staging` and a workspace named `dev`: + +```hcl +skip-dir = ["example/skip/dir1", "example/skip/dir2"] + +projects = [ + { + dir = "example/project1" + workspaces = [ + { + name = "staging" + env-vars = { + "TF_VAR_region": "us-east-2" + } + terraform-vars = ["staging.tfvars"] + }, + { + name = "dev" + terraform-vars = ["dev.tfvars"] + } + ] + } +] +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/execute.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/execute.mdx new file mode 100644 index 000000000..511175e82 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/execute.mdx @@ -0,0 +1,65 @@ +--- +page_title: tf-migrate execute reference +description: >- + The `tf-migrate execute` command runs a prepared migration to migrate locally + existing state to Terraform Enterprise or Terraform Enterprise. +source: terraform-docs-common +--- + +# `tf-migrate execute` reference + +The `tf-migrate execute` command directs Terraform to run the `init`, `plan`, and `apply` commands on the configuration generated with the `tf-migrate prepare` command. + +## Usage + + $ tf-migrate execute + +## Description + +The `tf-migrate execute` command creates the project and workspace in HCP Terraform or Terraform Enterprise, migrates the existing state, and updates your configuration to replace the `backend` block with the `cloud` block. If you responded to the prompt in the prepare workflow to create a pull request, `tf-migrate` creates the pull request after it completes the migration. + +When Terraform migrate completes the migration, it displays the number of workspaces migrated, a link to each HCP Terraform workspace, and a link to the GitHub pull request if you configured it to create one. + +## Example + +The `tf-migrate execute` command automatically performs the migration and code updates. + + + + $ tf-migrate execute + ✓ Init command ran successfully + ✓ Plan command ran successfully and changes are detected + ✓ Apply command ran successfully + Apply complete! Resources: 7 added, 0 changed, 0 destroyed. + + + Migration Summary + ┌───────────────────────────────┬───────┐ + │ Metric │ Count │ + ├───────────────────────────────┼───────┤ + │ Number of Projects Migrated │ 2 │ + │ Number of Directories Skipped │ 0 │ + │ Number of New Workspaces │ 2 │ + │ Number of Variables Migrated │ 8 │ + └───────────────────────────────┴───────┘ + ┌───────────────────────────────────────────────────────────────────────────────────────────────────┐ + │ Workspace URLs │ + ├───────────────────────────────────────────────────────────────────────────────────────────────────┤ + │ https://app.terraform.io//workspaces/web_default │ + │ https://app.terraform.io//workspaces/api_default │ + └───────────────────────────────────────────────────────────────────────────────────────────────────┘ + ┌────────────────────────────────────────────────────────────────────────┐ + │ Pull Request Link │ + ├────────────────────────────────────────────────────────────────────────┤ + │ https://github.com//learn-terraform-migrate/pull/1 │ + └────────────────────────────────────────────────────────────────────────┘ + + + +## Available options + +You can include the following flags when you run the `tf-migrate execute` command: + +| Option | Description | Default | Required | +| ---------- | ------------------------------------------------------------------------------------------------------------------- | ------- | -------- | +| `-dry-run` | If set, Terraform migrate only shows the output from the `terraform plan` step, and does not perform the migration. | None | No | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/prepare.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/prepare.mdx new file mode 100644 index 000000000..ae735703b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/migrate/tf-migrate/reference/prepare.mdx @@ -0,0 +1,104 @@ +--- +page_title: tf-migrate prepare reference +description: >- + The `tf-migrate prepare` command gathers information and creates a plan to + migrate your Terraform Community Edition state. +source: terraform-docs-common +--- + +# `tf-migrate prepare` reference + +The `tf-migrate prepare` command recursively scans the current directory for Terraform state files, then generates new Terraform configuration to migrate the state to HCP Terraform or Terraform Enterprise. + +## Usage + + $ tf-migrate prepare [options] + +## Description + +The `tf-migrate prepare` command prompts you for the following information: + +- The HCP Terraform or Terraform Enterprise organization to migrate your state to. +- If you would like to create a new branch named `hcp-migrate-` where `` is the name of the branch you currently have checked out. +- If you would like it to automatically create a pull request with the updated code change when the migration is complete. + +The `tf-migrate prepare` command generates a new Terraform configuration in the `_hcp-migrate-configs` directory to perform the migration. This configuration creates the following resources: + +- One workspace per state file. The `tf-migrate` tool names the workspace following the `-` pattern. The `tf-migrate` tool also creates workspace variables from the Terraform configuration's variables. +- One project to store all workspaces. The `tf-migrate` tool uses the directory path to the state file as the project name. For example, if your configuration is stored at `./frontend/networking/terraform.tfstate`, `tf-migrate` names the project "frontend_networking". Because of this, your directory path must be between 3-40 characters and only include letters, numbers, inner spaces, hyphens, and underscores. +- A new local git branch if you responded to the prompt to create a new branch with `yes`. +- A new pull request in the remote git repository if you responded to the prompt to create a pull request with `yes`. + +The `tf-migrate` CLI tool adds the generated configuration to the `.gitignore` file so that the configuration is not committed to source control. + +The `tf-migrate` tool creates the following structure in HCP Terraform or Terraform Enterprise depending on your local configuration: + +| Source | Result | +| :------------------------------------------------------------------------- | :----------------------------------------------------------- | +| Single configuration, single state | Single HCP workspace | +| Single configuration, multiple states for each Community Edition workspace | One HCP workspace per state | +| Multiple configurations, one state per configuration | One HCP workspace per configuration | +| Multiple configurations, multiple states per configuration | One HCP workspace per combination of configuration and state | + +## Example + +The `tf-migrate prepare` command generates the configuration to migrate this state to a single HCP Terraform workspace. + + + + $ tf-migrate prepare + ✓ Current working directory: /tmp/learn-terraform-migrate + ✓ Environment readiness checks completed + ✓ Found 3 HCP Terraform organizations + ┌────────────────────────────┐ + │ Available Orgs │ + ├────────────────────────────┤ + │ my-org-1 │ + │ my-org-2 │ + │ my-org-3 │ + └────────────────────────────┘ + Enter the name of the HCP Terraform organization to migrate to: my-org-1 + ✓ You have selected organization my-org-1 for migration + ✓ Found 2 directories with Terraform files + ┌────────────────────────────────┐ + │ Terraform File Directories │ + ├────────────────────────────────┤ + │ web │ + │ api │ + └────────────────────────────────┘ + Create a local branch named hcp-migrate-main from the current branch main: ... ? + + + Only 'yes or no' will be accepted as input. + Type 'yes' to approve the step + Type 'no' to to skip + + + Enter a value: yes + + ✓ Successfully created branch hcp-migrate-main + Do you want to open a pull request from hcp-migrate-main ... ? + + + Only 'yes or no' will be accepted as input. + Type 'yes' to approve the step + Type 'no' to to skip + + + Enter a value: yes + + ✓ Migration config generation completed + ✓ Successfully updated .gitignore + + + +## Available options + +You can include the following flags when you run the `tf-migrate prepare` command: + +| Option | Description | Default | Required | +| --------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------- | -------- | +| `-config` | Specifies the path to an optional configuration file. Refer to [`tf-migrate` configuration file reference](/terraform/enterprise/migrate/tf-migrate/reference/configuration) for more information. | None | No | +| `-hostname` | The hostname of your Terraform Enterprise server. If you do not provide a hostname, `tf-migrate` defaults to HCP Terraform. | `app.terraform.io` | No | +| `-skip-dir` | Specifies a comma-separated list of relative paths to exclude from the migration. | None | No | +| `--parallelism` | Specifies the number of threads `tf-migrate` uses to scan the local directory and prepare the migration. Set this value to `1` to disable parallelism. | The number of logical CPUs in the system. | No | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/no-code-provisioning/module-design.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/no-code-provisioning/module-design.mdx new file mode 100644 index 000000000..8b62ff5f9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/no-code-provisioning/module-design.mdx @@ -0,0 +1,72 @@ +--- +page_title: Design no-code ready modules for Terraform Enterprise +description: >- + No-code ready modules let users deploy a module's resources without writing + configuration. Learn how to prepare modules for no-code provisioning. +source: terraform-docs-common +--- + +# Design no-code ready modules + +Terraform [modules](/terraform/language/modules) let you define standardized collections of infrastructure resources that downstream users can more easily deploy. No-code ready modules build on these advantages by letting users deploy a module's resources without writing any Terraform configuration. This practice is called no-code provisioning. + + + +@include 'tfc-package-callouts/nocode.mdx' + + + +No-code provisioning enables a self-service workflow that lets users provision approved collections of resources without learning Terraform or infrastructure best practices. You can enable no-code provisioning for any public or private module in your [private registry](/terraform/enterprise/registry). Users can then [provision no-code infrastructure](/terraform/enterprise/no-code-provisioning/provisioning), set the module's input variables, and deploy its resources. + +> **Hands On:** Try the [Create and Use No-Code Ready Modules tutorial](/terraform/tutorials/cloud/no-code-provisioning). + +The same best practices apply to both standard and no-code ready module design. However, no-code modules have additional requirements and considerations. + +## Requirements + +A no-code ready module must meet the following requirements: + +- **Root Module Structure:** The module must follow [standard module structure](/terraform/language/modules/develop/structure) and define its resources in the root directory of the repository. This structure allows the public and private registries to generate documentation, track resource usage, and parse submodules and examples. +- **Provider Configuration:** A no-code ready module must declare the required provider(s) directly in the module. This configuration differs from the recommendations for [modules used in written configuration](/terraform/language/modules/develop/providers#legacy-shared-modules-with-provider-configurations). + +### Provider credentials + +Organization administrators must determine how no-code workspaces access credentials for provider authentication and design modules accordingly. + +When module consumers follow the no-code workflow, HCP Terraform automatically creates a new workspace for the resources and attempts to provision them. New workspaces must be able to access credentials for all providers defined within the module. + +You can grant new no-code workspace provider credentials using one of the following methods: + +- Recommended: Create a [project-scoped variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets) that HCP Terraform applies to all existing and future workspaces within a project. This approach allows you to create specific teams for those less familiar with Terraform, then give those teams access to your no-code projects. +- Create a [global variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets) that HCP Terraform applies to all existing and future workspaces in the organization. This action automatically grants newly-created workspaces access to the required provider credentials. +- Expose provider credentials as sensitive outputs in another workspace. You must add additional configuration to the module to access these values through [remote state data sources](/terraform/language/state/remote-state-data) and then reference them in provider configuration. This approach provides more control over access to these credentials than placing them in a global variable set. +- Elect to let the first run in new no-code workspaces fail and have module users add credentials directly to the workspace after creation. This approach provides the most control over access to provider credentials, but requires manual intervention. Module users must manually start a new run to provision infrastructure after they configure the credentials. + +## Module Design Recommendations + +Similarly to a [standard module](/terraform/language/modules/develop#when-to-write-a-module), a well-designed no-code ready module composes resources so that they are easy for others to deploy. However, no-code module users are less familiar with Terraform, so we recommend the following best practices for no-code module design. + +### Build For a Specific Use Case + +No-code ready module users are typically less familiar with Terraform and infrastructure management. Reduce the amount of technical decision-making required to deploy the module by scoping it to a single, specific use case. This approach lets users focus on business concerns instead of infrastructure concerns. + +For example, you could build modules that satisfy the following well-scoped use cases: + +- Deploying all resources needed for a three-tier web application +- Deploying a database with constraints on resource allocation and deployment region + +### Updating a Module's Version + +When you enable no-code provisioning for a module, HCP Terraform pins the **No-code Ready** designation to the specific module version of your choice. HCP Terraform deploys that selected module version whenever a user provisions a workspace using that module, ensuring that no-code users always provision the correct version. Pinning the **No-code Ready** designation to a specific module version lets you set variable input options, which are tied to that specific module version. + +By default, a module selects the latest version available. If you pinned a specific module version and a newer one becomes available, you can always update your module's version. + +### Provide Variable Defaults When Possible + +The no-code provisioning workflow prompts users to set values for the module version's input variables before creating the new workspace and deploying resources. We recommend setting reasonable defaults when possible to reduce the effort and expertise needed to deploy the module. Remember that the workspace can also access variable values set through global or project level variable sets in your organization. + +### Define Dropdown Options for Variables without Defaults + +If your module has variables without defaults, you can define options to limit the values a user can input when you enable a module for no-code provisioning. You can define input options using the HCP Terraform UI, the [No-Code Provisioning API](/terraform/enterprise/api-docs/no-code-provisioning), or the [TFE provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/no_code_module). We recommend using the TFE provider if you want to track variable input options through a code approval process, therefore keeping your configuration as code. + +HCP Terraform surfaces any subsequent changes to a variable’s input options when no-code users provision a new module version. If you update the selected module version enabled for no-code provisioning, consider revisiting the variables and adjusting the defined input values accordingly. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/no-code-provisioning/provisioning.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/no-code-provisioning/provisioning.mdx new file mode 100644 index 000000000..46c36667f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/no-code-provisioning/provisioning.mdx @@ -0,0 +1,89 @@ +--- +page_title: Provision no-code infrastructure in Terraform Enterprise +description: >- + No-code ready modules let users deploy a module's resources without writing + configuration. Learn how to provision infrastructure from a no-code ready + module. +source: terraform-docs-common +--- + +# Provision no-code infrastructure + +No-code provisioning lets you deploy infrastructure resources in a new HCP Terraform workspace without writing any Terraform configuration. You can create a no-code workspace from any module version labeled **No-code Ready** in your organization's [private registry](/terraform/enterprise/registry). + + + +@include 'tfc-package-callouts/nocode.mdx' + + + +> **Hands On:** Try the [Create and Use No-Code Ready Modules tutorial](/terraform/tutorials/cloud/no-code-provisioning). + +## Permissions + +To use no-code provisioning, you must be a member of a team with [manage all projects permissions](/terraform/enterprise/users-teams-organizations/permissions#manage-all-projects), [manage all workspaces permissions](/terraform/enterprise/users-teams-organizations/permissions#manage-all-workspaces), or [admin permissions for a project](/terraform/enterprise/users-teams-organizations/permissions#project-admins). When using [custom project permissions](/terraform/enterprise/users-teams-organizations/permissions#custom-project-permissions), your team must be able to create workspaces, write variables, and apply runs in a project. + +## Provider Credentials + +Terraform automatically starts a new run to provision no-code infrastructure upon workspace creation. No-code modules contain provider blocks in their configuration, but still require provider credentials for successful deployment. Organization administrators determine how new workspaces should [access provider credentials](/terraform/enterprise/no-code-provisioning/module-design#provider-credentials), which may require specific module design. + +## Creating a Workspace and Deploying Resources + +The no-code provisioning workflow creates a new HCP Terraform workspace to deploy and manage the no-code ready module's resources. HCP Terraform automatically starts a run to provision the module's resources in the new workspace. Depending on the workspace's settings, Terraform either automatically applies the plan or prompts you for approval to provision the infrastructure. + +To launch the no-code workflow: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization with the module you want to provision. + +2. Click **Registry** in the main HCP Terraform navigation to access your organization's private registry. + +3. Click **Modules** to view the list of available modules in the private registry. You can filter for no-code ready modules in your registry. No-code enabled modules have a **No-code Ready** badge next to their names. + +4. Select the no-code ready module to view its details, then click **Provision workspace**. The **Configure module inputs** page appears. + + HCP Terraform scans the module configuration for input variables and prompts for values for any variables without defaults or undefined in an existing global variable set. Terraform requires values for these variables to successfully complete runs in the workspace. HCP Terraform performs type validation for the variable values if the module configuration specifies a type. + +5. (Optional) Set values for the input variables. If your organization has defined options for a variable's values, these options appear in a dropdown menu. You can skip this step and configure the variables later in your workspace. However, HCP Terraform does not prompt you for these values again, and your Terraform runs may fail. + +6. Click **Next: Workspace settings**. + +7. Enter a **Workspace Name**. The name must be unique within the organization and can include letters, numbers, dashes (-), and underscores (\_). Refer to the [workspace naming recommendations](/terraform/enterprise/workspaces/create#workspace-naming) for more guidance. + +8. Choose a **Project** for the workspace. Teams with access to the specified project can view the workspace automatically. Refer to [Organizing Workspaces with Projects](/terraform/enterprise/projects/manage) for more details. If the specified project contains any project-scoped variable sets, HCP Terraform automatically applies those sets to the workspace. + +9. Add an optional **Description** for the workspace. + +10. Select an apply method for the workspace. **Auto apply** automatically applies any successful runs in the workspace, including the initial run on workspace creation. **Manual apply** prompts operators to review and confirm the changes in a run. **Auto apply** is the default option for a no-code workspace. + +11. Click **Create workspace**. HCP Terraform creates a new workspace and starts a run. Depending on the apply method, it automatically applies your infrastructure or prompts you for approval to create the no-code module's resources. + +## Operations in No-Code Workspaces + +No-code workspaces have a limited feature set because you cannot access the resource configuration. However, you can edit workspace variables and settings, including notifications, permissions, and run triggers. You can use run triggers to connect the workspace to one or more source workspaces, start new runs when you change workspace variables, or queue destroy runs. + +### Updating Variables + +To change a variable's options after provisioning, go to the **Variables** section in your workspace to see your workspace's variables listed. To edit a variable: + +1. Click the ellipses next to the variable you want to edit and select **Edit**. +2. Enter your desired value and click **Save variable**. + +Start a new run in your workspace to update your existing infrastructure with your new variable value. + +### Module Version Updates + +When you [update the module version](/terraform/enterprise/no-code-provisioning/module-design#updating-a-module-s-version) designated for no-code provisioning, every workspace provisioned from the module is notified that an updated version is available on the workspace overview page. HCP Terraform does not automatically update workspaces. A workspace admin must respond to the update notification to upgrade the workspace, and HCP Terraform prompts for values for any new input variables. + +To change the version of the module that users can deploy: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to your organization. + +2. Choose **Registry** from the sidebar and navigate to the module in your organization's registry. + +3. Click **Configure Settings**. + +4. Click **Edit version and variable options**. + +5. Choose the desired module version from the **Module version** dropdown. + +6. Click **Save**. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/custom-sentinel.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/custom-sentinel.mdx new file mode 100644 index 000000000..16334c880 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/custom-sentinel.mdx @@ -0,0 +1,260 @@ +--- +page_title: Define Sentinel policies in Terraform Enterprise +description: >- + Learn how to use the Sentinel policy language to create policies in Terraform + Enterprise. +source: terraform-docs-common +--- + +# Define Sentinel policies in HCP Terraform + +This topic describes how to create and manage custom policies using Sentinel policy language. For instructions about how to use pre-written Sentinel policies from the registry, refer to [Run pre-written Sentinel policies](/terraform/enterprise/policy-enforcement/prewritten-sentinel). + +## Overview + +To define a policy, create a file and declare an `import` function to include reusable libraries, external data, and other functions. Sentinel policy language includes several types of elements you can import using the `import` function. + +Declare and configure additional Sentinel policy language elements. The details depend on which elements you want to use in your policy. Refer to the [Sentinel documentation](/sentinel/docs) for additional information. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +## Declare an `import` function + +A policy can include imports that enable a policy to access reusable libraries, external data, and functions. Refer to [imports](/sentinel/docs/concepts/imports) in the Sentinel documentation for more details. + +HCP Terraform provides four imports to define policy rules for the plan, configuration, state, and run associated with a policy check. + +- [tfplan](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) - Access a Terraform plan, which is the file created as a result of the [`terraform plan` command](/terraform/cli/commands/plan). The plan represents the changes that Terraform must make to reach the desired infrastructure state described in the configuration. +- [tfconfig](/terraform/enterprise/policy-enforcement/import-reference/tfconfig-v2) - Access a Terraform configuration. The configuration is the set of `.tf` files that describe the desired infrastructure state. +- [tfstate](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2) - Access the Terraform [state](/terraform/language/state). Terraform uses state to map real-world resources to your configuration. +- [tfrun](/terraform/enterprise/policy-enforcement/import-reference/tfrun) - Access data associated with a [run in HCP Terraform](/terraform/enterprise/run/remote-operations). For example, you could retrieve the run's workspace. + +You can create mocks of these imports to use with the the [Sentinel +CLI](/sentinel/docs/commands) mocking and testing features. Refer to [Mocking Terraform Sentinel Data](/terraform/enterprise/policy-enforcement/test-sentinel) for more details. + + + +HCP Terraform does not support custom imports. + + + +## Declare additional elements + +The following functions and idioms will be useful as you start writing Sentinel +policies for Terraform. + +### Iterate over modules and find resources + +The most basic Sentinel task for Terraform is to enforce a rule on all resources +of a given type. Before you can do that, you need to get a collection of all the +relevant resources from all modules. The easiest way to do that is to copy and +use a function like the following into your policies. + +The following example uses the `tfplan` import. Refer to our [guides for other examples](https://github.com/hashicorp/terraform-guides/tree/master/governance/second-generation/common-functions) of +functions that iterate over the `tfconfig` and `tfstate` imports. + +```python +import "tfplan" +import "strings" + +# Find all resources of specific type from all modules using the tfplan import +find_resources_from_plan = func(type) { + resources = {} + for tfplan.module_paths as path { + for tfplan.module(path).resources[type] else {} as name, instances { + for instances as index, r { + # Get the address of the resource instance + if length(path) == 0 { + # root module + address = type + "." + name + "[" + string(index) + "]" + } else { + # non-root module + address = "module." + strings.join(path, ".module.") + "." + + type + "." + name + "[" + string(index) + "]" + } + # Add the instance to resources, setting the key to the address + resources[address] = r + } + } + } + return resources +} +``` + +Call the function to get all resources of a desired type by passing the +type as a string in quotation marks: + +```python +aws_instances = find_resources_from_plan("aws_instance") +``` + +This example function does several useful things while finding resources: + +- It checks every module (including the root module) for resources of the + specified type by iterating over the `module_paths` namespace. The top-level + `resources` namespace is more convenient, but it only reveals resources from + the root module. +- It iterates over the named resources and [resource + instances](/terraform/language/expressions/references#resources) + found in each module, starting with `tfplan.module(path).resources[type]` + which is a series of nested maps keyed by resource names and instance counts. +- It uses the Sentinel [`else` + operator](/sentinel/docs/language/spec#else-operator) to + recover from `undefined` values which would occur for modules that don't have + any resources of the specified type. +- It builds a flat `resources` map of all resource instances of the specified + type. Using a flat map simplifies the code used by Sentinel policies to + evaluate rules. +- It computes an `address` variable for each resource instance and uses this as + the key in the `resources` map. This allows writers of Sentinel policies to + print the full [address](/terraform/cli/state/resource-addressing) of each + resource instance that violate a policy, using the same address format used in + plan and apply logs. Doing this tells users who see violation messages exactly + which resources they need to modify in their Terraform code to comply with the + Sentinel policies. +- It sets the value of the `resources` map to the data associated with the + resource instance (`r`). This is the data that Sentinel policies apply rules + against. + +### Validate resource attributes + +Once you have a collection of resources instances of a desired type indexed by +their addresses, you usually want to validate that one or more resource +attributes meets some conditions by iterating over the resource instances. + +While you could use Sentinel's [`all` and `any` +expressions](/sentinel/docs/language/boolexpr#any-all-expressions) +directly inside Sentinel rules, your rules would only report the first violation +because Sentinel uses short-circuit logic. It is therefore usually preferred to +use a [`for` loop](/sentinel/docs/language/loops) outside +of your rules so that you can report all violations that occur. You can do this +inside functions or directly in the policy itself. + +Here is a function that calls the `find_resources_from_plan` function and +validates that the instance types of all EC2 instances being provisioned are in +a given list: + +```python +# Validate that all EC2 instances have instance_type in the allowed_types list +validate_ec2_instance_types = func(allowed_types) { + validated = true + aws_instances = find_resources_from_plan("aws_instance") + for aws_instances as address, r { + # Determine if the attribute is computed + if r.diff["instance_type"].computed else false is true { + print("EC2 instance", address, + "has attribute, instance_type, that is computed.") + } else { + # Validate that each instance has allowed value + if (r.applied.instance_type else "") not in allowed_types { + print("EC2 instance", address, "has instance_type", + r.applied.instance_type, "that is not in the allowed list:", + allowed_types) + validated = false + } + } + } + return validated +} +``` + +The boolean variable `validated` is initially set to `true`, but it is set to +`false` if any resource instance violates the condition requiring that the +`instance_type` attribute be in the `allowed_types` list. Since the function +returns `true` or `false`, it can be called inside Sentinel rules. + +Note that this function prints a warning message for **every** resource instance +that violates the condition. This allows writers of Terraform code to fix all +violations after just one policy check. It also prints warnings when the +attribute being evaluated is +[computed](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2#value-computed) and does +not evaluate the condition in this case since the applied value will not be +known. + +While this function allows a rule to validate an attribute against a list, some +rules will only need to validate an attribute against a single value; in those +cases, you could either use a list with a single value or embed that value +inside the function itself, drop the `allowed_types` parameter from the function +definition, and use the `is` operator instead of the `in` operator to compare +the resource attribute against the embedded value. + +### Write Rules + +Having used the standardized `find_resources_from_plan` function and having +written your own function to validate that resources instances of a specific +type satisfy some condition, you can define a list with allowed values and write +a rule that evaluates the value returned by your validation function. + +```python +# Allowed Types +allowed_types = [ + "t2.small", + "t2.medium", + "t2.large", +] + +# Main rule +main = rule { + validate_ec2_instance_types(allowed_types) +} + +``` + +### Validate multiple conditions in a single policy + +If you want a policy to validate multiple conditions against resources of a +specific type, you could define a separate validation function for each +condition or use a single function to evaluate all the conditions. In the latter +case, you would make this function return a list of boolean values, using one +for each condition. You can then use multiple Sentinel rules that evaluate +those boolean values or evaluate all of them in your `main` rule. Here is a +partial example: + +```python +# Function to validate that S3 buckets have private ACL and use KMS encryption +validate_private_acl_and_kms_encryption = func() { + result = { + "private": true, + "encrypted_by_kms": true, + } + s3_buckets = find_resources_from_plan("aws_s3_bucket") + # Iterate over resource instances and check that S3 buckets + # have private ACL and are encrypted by a KMS key + # If an S3 bucket is not private, set result["private"] to false + # If an S3 bucket is not encrypted, set result["encrypted_by_kms"] to false + for s3_buckets as joined_path, resource_map { + #... + } + return result +} + +# Call the validation function +validations = validate_private_acl_and_kms_encryption() + +# ACL rule +is_private = rule { + validations["private"] +} + +# KMS Encryption Rule +is_encrypted_by_kms = rule { + validations["encrypted_by_kms"] +} + +# Main rule +main = rule { + is_private and is_encrypted_by_kms +} +``` + +You can write similar functions and policies to restrict Terraform configurations using the `tfconfig` import and to restrict Terraform state using the `tfstate` import. + +## Next steps + +1. Group your policies into sets and apply them to your workspaces. Refer to [Create policy sets](/terraform/enterprise/policy-enforcement/manage-policy-sets#create-policy-sets) for additional information. +2. View results and address Terraform runs that do not comply with your policies. Refer to [View results](/terraform/enterprise/policy-enforcement/view-results) for additional information. +3. You can also view Sentinel policy results in JSON format. Refer to [View Sentinel JSON results](/terraform/enterprise/policy-enforcement/view-results/json) for additional information. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/index.mdx new file mode 100644 index 000000000..bc5881f61 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/index.mdx @@ -0,0 +1,19 @@ +--- +page_title: Define policies overview +description: >- + You can define policies using HashiCorp Sentinel or Open Policy Agent (OPA). + Learn how to define policies for governing how Terraform provisions + infrastructure. +source: terraform-docs-common +--- + +# Define policies overview + +This topic provides overview information about how to define policies as code. Policies are rules for enforcing how Terraform provisions infrastructure as code for your workspaces and projects. + +## Workflows + +You can use two policy-as-code frameworks to define fine-grained, logic-based policies: Sentinel and Open Policy Agent (OPA). Depending on the settings, policies can act as advisory warnings or firm requirements that prevent Terraform from provisioning infrastructure. + +- **Sentinel:** You define policies with the [Sentinel policy language](/sentinel/docs/concepts/language) and use imports to parse the Terraform plan, state, and configuration. Refer to [Define custom Sentinel policies](/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel) for details. +- **OPA:** You define policies with the [Rego policy language](https://www.openpolicyagent.org/docs/latest/policy-language/). Refer to [Defining OPA Policies](/terraform/enterprise/policy-enforcement/define-policies/opa) for details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/opa.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/opa.mdx new file mode 100644 index 000000000..92305f8e9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/define-policies/opa.mdx @@ -0,0 +1,259 @@ +--- +page_title: Define Open Policy Agent policies for Terraform Enterprise +description: >- + Use the Rego policy language to define Open Policy Agent (OPA) policies for + Terraform Enterprise. +source: terraform-docs-common +--- + +# Define Open Policy Agent policies for HCP Terraform + +This topic describes how to create and manage custom policies using the open policy agent (OPA) framework. Refer to the following topics for instructions on using HashiCorp Sentinel policies: + +- [Define custom Sentinel policies](/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel) +- [Copy pre-written Sentinel policies](/terraform/enterprise/define-policies/prewritten-sentinel) + + + +@include 'tfc-package-callouts/policies.mdx' + + + +## Overview + +> **Hands-on:** Try the [Detect Infrastructure Drift and Enforce OPA Policies](/terraform/tutorials/cloud/drift-and-opa) tutorial. + +You can write OPA policies using the Rego policy language, which is the native query language for the OPA framework. Refer to the following topics in the [OPA documentation](https://www.openpolicyagent.org/docs/latest/policy-language/) for additional information: + +- [How Do I Write Rego Policies?](https://www.openpolicyagent.org/docs/v0.13.5/how-do-i-write-policies/) +- [Rego Policy Playground](https://play.openpolicyagent.org/) + +## OPA query + +You must write a query to identify a specific policy rule within your Rego code. The query may evaluate code from multiple Rego files. + +The result of each query must return an array, which HCP Terraform uses to determine whether the policy has passed or failed. If the array is empty, HCP Terraform reports that the policy has passed. + +The query is typically a combination of the policy package name and rule name, such as `data.terraform.deny`. + +## OPA input + +HCP Terraform combines the output from the Terraform run and plan into a single JSON file and passes that file to OPA as input. Refer to the [OPA Overview documentation](https://www.openpolicyagent.org/docs/latest/#the-input-document) for more details about how OPA uses JSON input data. + +The run data contains information like workspace details and the organization name. To access the properties from the Terraform plan data in your policies, use `input.plan`. To access properties from the Terraform run, use `input.run`. + +The following example shows sample OPA input data. + +```json +{ +"plan": { + "format_version": "1.1", + "output_changes": { + }, + "planned_values": { + }, + "resource_changes": [ + ], + "terraform_version": "1.2.7" +}, + +"run": { + "organization": { + "name": "hashicorp" + }, + "workspace": { + } +} +} +``` + +Use the [Retrieve JSON Execution Plan endpoint](/terraform/enterprise/api-docs/plans#retrieve-the-json-execution-plan) to retrieve Terraform plan output data for testing. Refer to [Terraform Run Data](#terraform-run-data) for the properties included in Terraform run output data. + +## Example Policies + +The following example policy parses a Terraform plan and checks whether it includes security group updates that allow ingress traffic from all CIDRs (`0.0.0.0/0`). + +The OPA query for this example policy is `data.terraform.policies.public_ingress.deny`. + +```rego +package terraform.policies.public_ingress + +import input.plan as plan + +deny[msg] { + r := plan.resource_changes[_] + r.type == "aws_security_group" + r.change.after.ingress[_].cidr_blocks[_] == "0.0.0.0/0" + msg := sprintf("%v has 0.0.0.0/0 as allowed ingress", [r.address]) +} +``` + +The following example policy ensures that databases are no larger than 128 GB. + +The OPA query for this policy is `data.terraform.policies.fws.database.fws_db_001.rule`. + +```rego +package terraform.policies.fws.database.fws_db_001 + +import future.keywords.in +import input.plan as tfplan + +actions := [ + ["no-op"], + ["create"], + ["update"], +] + +db_size := 128 + +resources := [resource_changes | + resource_changes := tfplan.resource_changes[_] + resource_changes.type == "fakewebservices_database" + resource_changes.mode == "managed" + resource_changes.change.actions in actions +] + +violations := [resource | + resource := resources[_] + not resource.change.after.size == db_size +] + +violators[address] { + address := violations[_].address +} + +rule[msg] { + count(violations) != 0 + msg := sprintf( + "%d %q severity resource violation(s) have been detected.", + [count(violations), rego.metadata.rule().custom.severity] + ) +} +``` + +## Test policies + +You can write tests for your policies by [mocking](https://www.openpolicyagent.org/docs/latest/policy-testing/#data-and-function-mocking) the input data the policies use during Terraform runs. + +The following example policy called `block_auto_apply_runs` checks whether or not an HCP Terraform workspace has been configured to automatically apply a successful Terraform plan. + +```rego +package terraform.tfc.block_auto_apply_runs + +import input.run as run + +deny[msg] { + run.workspace.auto_apply != false + msg := sprintf( + "HCP Terraform workspace %s has been configured to automatically provision Terraform infrastructure. Change the workspace Apply Method settings to 'Manual Apply'", + [run.workspace.name], + ) +} +``` + +The following test validates `block_auto_apply_runs`. The test is written in rego and uses the OPA [test format](https://www.openpolicyagent.org/docs/latest/policy-testing/#test-format) to check that the workspace [apply method](/terraform/enterprise/workspaces/settings#apply-method) is not configured to auto apply. You can run this test with the `opa test` CLI command. Refer to [Policy Testing](https://www.openpolicyagent.org/docs/latest/policy-testing/) in the OPA documentation for more details. + +```rego +package terraform.tfc.block_auto_apply_runs + +import future.keywords + +test_run_workspace_auto_apply if { + deny with input as {"run": {"workspace": {"auto_apply": true}}} +} +``` + +## Terraform run data + +Each [Terraform run](/terraform/docs/glossary#run) outputs data describing the run settings and the associated workspace. + +### Schema + +The following code shows the schema for Terraform run data. + + run + ├── id (string) + ├── created_at (string) + ├── created_by (string) + ├── message (string) + ├── commit_sha (string) + ├── is_destroy (boolean) + ├── refresh (boolean) + ├── refresh_only (boolean) + ├── replace_addrs (array of strings) + ├── speculative (boolean) + ├── target_addrs (array of strings) + └── project + │ ├── id (string) + │ └── name (string) + ├── variables (map of keys) + ├── organization + │ └── name (string) + └── workspace + ├── id (string) + ├── name (string) + ├── created_at (string) + ├── description (string) + ├── execution_mode (string) + ├── auto_apply (bool) + ├── tags (array of strings) + ├── working_directory (string) + └── vcs_repo (map of keys) + +### Properties + +The following sections contain details about each property in Terraform run data. + +#### Run namespace + +The following table contains the attributes for the `run` namespace. + +| Properties Name | Type | Description | +| --------------- | ------------------------------------------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `id` | String | The ID associated with the current Terraform run | +| `created_at` | String | The time Terraform created the run. The timestamp follows the [standard timestamp format in RFC 3339](https://datatracker.ietf.org/doc/html/rfc3339). | +| `created_by` | String | A string that specifies the user name of the HCP Terraform user for the specific run. | +| `message` | String | The message associated with the Terraform run. The default value is "Queued manually via the Terraform Enterprise API". | +| `commit_sha` | String | The checksum hash (SHA) that identifies the commit | +| `is_destroy` | Boolean | Whether the plan is a destroy plan that destroys all provisioned resources | +| `refresh` | Boolean | Whether the state refreshed prior to the plan | +| `refresh_only` | Boolean | Whether the plan is in refresh-only mode. In refresh-only mode, Terraform ignores configuration changes and updates state with any changes made outside of Terraform. | +| `replace_addrs` | An array of strings representing [resource addresses](/terraform/cli/state/resource-addressing) | The targets specified using the [`-replace`](/terraform/cli/commands/plan#replace-address) flag in the CLI or the `replace-addrs` property in the API. Undefined if there are no specified resource targets. | +| `speculative` | Boolean | Whether the plan associated with the run is a [speculative plan](/terraform/enterprise/run/remote-operations#speculative-plans) only | +| `target_addrs` | An array of strings representing [resource addresses](/terraform/cli/state/resource-addressing). | The targets specified using the [`-target`](/terraform/cli/commands/plan#resource-targeting) flag in the CLI or the `target-addrs` property in the API. Undefined if there are no specified resource targets. | +| `variables` | A string-keyed map of values. | Provides the variables configured within the run. Each variable `name` maps to two properties: `category` and `sensitive`. The `category` property is a string indicating the variable type, either "input" or "environment". The `sensitive` property is a boolean, indicating whether the variable is a [sensitive value](/terraform/enterprise/workspaces/variables/managing-variables#sensitive-values). | + +#### Project Namespace + +The following table contains the properties for the `project` namespace. + +| Property Name | Type | Description | +| ------------- | ------ | --------------------------------------------------------------------------------------- | +| `id` | String | The ID associated with the Terraform project | +| `name` | String | The name of the project, which can only include letters, numbers, spaces, `-`, and `_`. | + +#### Organization namespace + +The `organization` namespace has one property called `name`. The `name` property is a string that specifies the name of the HCP Terraform organization for the run. + +#### Workspace namespace + +The following table contains the properties for the `workspace` namespace. + +| Property Name | Type | Description | +| ------------------- | ----------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `id` | String | The ID associated with the Terraform workspace | +| `name` | String | The name of the workspace, which can only include letters, numbers, `-`, and `_` | +| `created_at` | String | The time of the workspace's creation. The timestamp follows the [standard timestamp format in RFC 3339](https://datatracker.ietf.org/doc/html/rfc3339). | +| `description` | String | The description for the workspace. This value can be `null`. | +| `auto_apply` | Boolean | The workspace's [auto-apply](/terraform/enterprise/workspaces/settings#apply-method) setting | +| `tags` | Array of strings | The list of tag names for the workspace | +| `working_directory` | String | The configured [Terraform working directory](/terraform/enterprise/workspaces/settings#terraform-working-directory) of the workspace. This value can be `null`. | +| `execution_mode` | String | The configured Terraform execution mode of the workspace. The default value is `remote`. | +| `vcs_repo` | A string-keyed map to objects | Data associated with a VCS repository connected to the workspace. The map contains `identifier` (string), ` display_identifier` (string), `branch` (string), and `ingress_submodules` (boolean). Refer to the HCP Terraform [Workspaces API documentation](/terraform/enterprise/api-docs/workspaces) for details about each property. This value can be `null`. | + +## Next steps + +- Group your policies into sets and apply them to your workspaces. Refer to [Create policy sets](/policy-enforcement/manage-policy-sets#create-policy-sets) for additional information. +- View results and address Terraform runs that do not comply with your policies. Refer to [View results](/terraform/enterprise/policy-enforcement/view-results) for additional information. +- You can also view Sentinel policy results in JSON format. Refer to [View Sentinel JSON results](/terraform/enterprise/policy-enforcement/view-results/json) for additional information. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/index.mdx new file mode 100644 index 000000000..eebf3b47f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/index.mdx @@ -0,0 +1,32 @@ +--- +page_title: Sentinel import function reference +description: >- + Use the Sentinel import function to configure policy behaviors in custom + Sentinel policies. +source: terraform-docs-common +--- + +# `import` function reference overview + +This topic provides an overview of the Sentinel `import` function, which you can use to import Sentinel libraries into your custom Sentinel policies. Refer to [Define custom Sentinel policies](/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel) for additional information about how to use the `import` function. + +## Functions for Terraform + +You can add Sentinel the `import` function, which enables a policy to access reusable libraries, external data, and other functions. Refer to the [Sentinel imports documentation](/sentinel/docs/language/imports) for more details. + +HCP Terraform provides the following importable libraries to define policy rules for the plan, configuration, state, and run associated with a policy check. + +- [`tfplan`](/terraform/enterprise/policy-enforcement/import-reference/tfplan) : Provides access to a Terraform plan, which is the file created when you run the `terraform plan` command. This library is deprecated. Use `tfplanv/2` instead. +- [`tfplan/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2): Provides access to a Terraform plan, which is the file created when you run the `terraform plan` command. +- [`tfconfig`](/terraform/enterprise/policy-enforcement/import-reference/tfconfig): Provides access to a Terraform configuration. The configuration is the set of `.tf` files that describe the desired infrastructure state. This library is deprecated. Use `tfconfig/v2` instead. +- [`tfconfig/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfconfig-v2): Provides access to a Terraform configuration. The configuration is the set of `.tf` files that describe the desired infrastructure state. +- [`tfstate`](/terraform/enterprise/policy-enforcement/import-reference/tfstate): Provides access to the Terraform state. Terraform uses state to map real-world resources to your configuration. This library is deprecated. Use `tfstate/v2` instead. +- [`tfstate/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2): Provides access to the Terraform state. Terraform uses state to map real-world resources to your configuration. +- [`tfrun`](/terraform/enterprise/policy-enforcement/import-reference/tfrun): Provides access to data associated with a run in HCP Terraform. For example, you could retrieve the run's workspace. + +## Test `import` functions + +You can create mocks of these functions and test them using the Sentinel CLI. Refer to the following topics for additional information: + +- [Test Sentinel policies](/terraform/enterprise/policy-enforcement/test-sentinel) +- [Sentinel CLI documentation](/sentinel/docs/commands) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfconfig-v2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfconfig-v2.mdx new file mode 100644 index 000000000..637d596f0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfconfig-v2.mdx @@ -0,0 +1,422 @@ +--- +page_title: tfconfig/v2 Sentinel import +description: >- + Use the tfconfig/v2 import to give Sentinel access to a Terraform + configuration. +source: terraform-docs-common +--- + +-> **Note:** This is documentation for the next version of the `tfconfig` +Sentinel import, designed specifically for Terraform 0.12. This import requires +Terraform 0.12 or higher, and must currently be loaded by path, using an alias, +example: `import "tfconfig/v2" as tfconfig`. + +# tfconfig/v2 Sentinel import + +The `tfconfig/v2` import provides access to a Terraform configuration. + +The Terraform configuration is the set of `*.tf` files that are used to +describe the desired infrastructure state. Policies using the `tfconfig` +import can access all aspects of the configuration: providers, resources, +data sources, modules, and variables. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Some use cases for `tfconfig` include: + +- **Organizational naming conventions**: requiring that configuration elements + are named in a way that conforms to some organization-wide standard. +- **Required inputs and outputs**: organizations may require a particular set + of input variable names across all workspaces or may require a particular + set of outputs for asset management purposes. +- **Enforcing particular modules**: organizations may provide a number of + "building block" modules and require that each workspace be built only from + combinations of these modules. +- **Enforcing particular providers or resources**: an organization may wish to + require or prevent the use of providers and/or resources so that configuration + authors cannot use alternative approaches to work around policy + restrictions. + +The data in the `tfconfig/v2` import is sourced from the JSON configuration file +that is generated by the [`terraform show -json`](/terraform/cli/commands/show#json-output) command. For more information on +the file format, see the [JSON Output Format](/terraform/internals/json-format) +page. + +## Import Overview + +The `tfconfig/v2` import is structured as a series of _collections_, keyed as a +specific format, such as resource address, module address, or a +specifically-formatted provider key. + + tfconfig/v2 + ├── strip_index() (function) + ├── providers + │ └── (indexed by [module_address:]provider[.alias]) + │ ├── provider_config_key (string) + │ ├── name (string) + │ ├── full_name (string) + │ ├── alias (string) + │ ├── module_address (string) + │ ├── config (block expression representation) + │ └── version_constraint (string) + ├── resources + │ └── (indexed by address) + │ ├── address (string) + │ ├── module_address (string) + │ ├── mode (string) + │ ├── type (string) + │ ├── name (string) + │ ├── provider_config_key (string) + │ ├── provisioners (list) + │ │ └── (ordered provisioners for this resource only) + │ ├── config (block expression representation) + │ ├── count (expression representation) + │ ├── for_each (expression representation) + │ └── depends_on (list of strings) + ├── provisioners + │ └── (indexed by resource_address:index) + │ ├── resource_address (string) + │ ├── type (string) + │ ├── index (string) + │ └── config (block expression representation) + ├── variables + │ └── (indexed by module_address:name) + │ ├── module_address (string) + │ ├── name (string) + │ ├── default (value) + │ └── description (string) + ├── outputs + │ └── (indexed by module_address:name) + │ ├── module_address (string) + │ ├── name (string) + │ ├── sensitive (boolean) + │ ├── value (expression representation) + │ ├── description (string) + │ └── depends_on (list of strings) + └── module_calls + └── (indexed by module_address:name) + ├── module_address (string) + ├── name (string) + ├── source (string) + ├── config (block expression representation) + ├── count (expression representation) + ├── depends_on (expression representation) + ├── for_each (expression representation) + └── version_constraint (string) + +The collections are: + +- [`providers`](#the-providers-collection) - The configuration for all provider + instances across all modules in the configuration. +- [`resources`](#the-resources-collection) - The configuration of all resources + across all modules in the configuration. +- [`variables`](#the-variables-collection) - The configuration of all variable + definitions across all modules in the configuration. +- [`outputs`](#the-outputs-collection) - The configuration of all output + definitions across all modules in the configuration. +- [`module_calls`](#the-module_calls-collection) - The configuration of all module + calls (individual [`module`](/terraform/language/modules) blocks) across + all modules in the configuration. + +These collections are specifically designed to be used with the +[`filter`](/sentinel/docs/language/collection-operations#filter-expression) +quantifier expression in Sentinel, so that one can collect a list of resources +to perform policy checks on without having to write complex module or +configuration traversal. As an example, the following code will return all +`aws_instance` resource types within the configuration, regardless of what +module they are in: + + all_aws_instances = filter tfconfig.resources as _, r { + r.mode is "managed" and + r.type is "aws_instance" + } + +You can add specific attributes to the filter to narrow the search, such as the +module address. The following code would return resources in a module named +`foo` only: + + all_aws_instances = filter tfconfig.resources as _, r { + r.module_address is "module.foo" and + r.mode is "managed" and + r.type is "aws_instance" + } + +### Address Differences Between `tfconfig`, `tfplan`, and `tfstate` + +This import deals with configuration before it is expanded into a +resource graph by Terraform. As such, it is not possible to compute an index as +the import is building its collections and computing addresses for resources and +modules. + +As such, addresses found here may not always match the expanded addresses found +in the [`tfplan/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) and [`tfstate/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2) +imports, specifically when +[`count`](/terraform/language/resources#count-multiple-resource-instances-by-count) +and +[`for_each`](/terraform/language/resources#for_each-multiple-resource-instances-defined-by-a-map-or-set-of-strings), +are used. + +As an example, consider a resource named `null_resource.foo` with a count of `2` +located in a module named `bar`. While there will possibly be entries in the +other imports for `module.bar.null_resource.foo[0]` and +`module.bar.null_resource.foo[1]`, in `tfconfig/v2`, there will only be a +`module.bar.null_resource.foo`. As mentioned in the start of this section, this +is because configuration actually _defines_ this scaling, whereas _expansion_ +actually happens when the resource graph is built, which happens as a natural +part of the refresh and planning process. + +The `strip_index` helper function, found in this import, can assist in +removing the indexes from addresses found in the `tfplan/v2` and `tfstate/v2` +imports so that data from those imports can be used to reference data in this +one. + +## The `strip_index` Function + +The `strip_index` helper function can be used to remove indexes from addresses +found in [`tfplan/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) and [`tfstate/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2), +by removing the indexes from each resource. + +This can be used to help facilitate cross-import lookups for data between plan, +state, and config. + + import "tfconfig/v2" as tfconfig + import "tfplan/v2" as tfplan + + main = rule { + all filter tfplan.resource_changes as _, rc { + rc.mode is "managed" and + rc.type is "aws_instance" + } as _, rc { + tfconfig.resources[tfconfig.strip_index(rc.address)].config.ami.constant_value is "ami-abcdefgh012345" + } + } + +## Expression Representations + +Most collections in this import will have one of two kinds of _expression +representations_. This is a verbose format for expressing a (parsed) +configuration value independent of the configuration source code, which is not +100% available to a policy check in HCP Terraform. + + (expression representation) + ├── constant_value (value) + └── references (list of strings) + +There are two major parts to an expression representation: + +- Any _strictly constant value_ is expressed as an expression with a + `constant_value` field. +- Any expression that requires some degree of evaluation to generate the final + value - even if that value is known at plan time - is not expressed in + configuration. Instead, any particular references that are made are added to + the `references` field. More details on this field can be found in the + [expression + representation](/terraform/internals/json-format#expression-representation) + section of the JSON output format documentation. + +For example, to determine if an output is based on a particular +resource value, one could do: + + import "tfconfig/v2" as tfconfig + + main = rule { + tfconfig.outputs["instance_id"].value.references is ["aws_instance.foo"] + } + +-> **Note:** The representation does not account for +complex interpolations or other expressions that combine constants with other +expression data. For example, the partially constant data in `"foo${var.bar}"` would be lost. + +### Block Expression Representation + +Expanding on the above, a multi-value expression representation (such as the +kind found in a [`resources`](#the-resources-collection) collection element) is +similar, but the root value is a keyed map of expression representations. This +is repeated until a "scalar" expression value is encountered, ie: a field that +is not a block in the resource's schema. + + (block expression representation) + └── (attribute key) + ├── (child block expression representation) + │ └── (...) + ├── constant_value (value) + └── references (list of strings) + +As an example, one can validate expressions in an +[`aws_instance`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance) resource using the +following: + + import "tfconfig/v2" as tfconfig + + main = rule { + tfconfig.resources["aws_instance.foo"].config.ami.constant_value is "ami-abcdefgh012345" + } + +Note that _nested blocks_, sometimes known as _sub-resources_, will be nested in +configuration as a list of blocks (reflecting their ultimate nature as a list +of objects). An example would be the `aws_instance` resource's +[`ebs_block_device`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/instance#ebs-ephemeral-and-root-block-devices) block: + + import "tfconfig/v2" as tfconfig + + main = rule { + tfconfig.resources["aws_instance.foo"].config.ebs_block_device[0].volume_size < 10 + } + +## The `providers` Collection + +The `providers` collection is a collection representing the configurations of +all provider instances across all modules in the configuration. + +This collection is indexed by an opaque key. This is currently +`module_address:provider.alias`, the same value as found in the +`provider_config_key` field. `module_address` and the colon delimiter are +omitted for the root module. + +The `provider_config_key` field is also found in the `resources` collection and +can be used to locate a provider that belongs to a configured resource. + +The fields in this collection are as follows: + +- `provider_config_key` - The opaque configuration key, used as the index key. +- `name` - The name of the provider, ie: `aws`. +- `full_name` - The fully-qualified name of the provider, e.g. `registry.terraform.io/hashicorp/aws`. +- `alias` - The alias of the provider, ie: `east`. Empty for a default provider. +- `module_address` - The address of the module this provider appears in. +- `config` - A [block expression + representation](#block-expression-representation) with provider configuration + values. +- `version_constraint` - The defined version constraint for this provider. + +## The `resources` Collection + +The `resources` collection is a collection representing all of the resources +found in all modules in the configuration. + +This collection is indexed by the resource address. + +The fields in this collection are as follows: + +- `address` - The resource address. This is the index of the collection. +- `module_address` - The module address that this resource was found in. +- `mode` - The resource mode, either `managed` (resources) or `data` (data + sources). +- `type` - The type of resource, ie: `null_resource` in `null_resource.foo`. +- `name` - The name of the resource, ie: `foo` in `null_resource.foo`. +- `provider_config_key` - The opaque configuration key that serves as the index + of the [`providers`](#the-providers-collection) collection. +- `provisioners` - The ordered list of provisioners for this resource. The + syntax of the provisioners matches those found in the + [`provisioners`](#the-provisioners-collection) collection, but is a list + indexed by the order the provisioners show up in the resource. +- `config` - The [block expression + representation](#block-expression-representation) of the configuration values + found in the resource. +- `count` - The [expression data](#expression-representations) for the `count` + value in the resource. +- `for_each` - The [expression data](#expression-representations) for the + `for_each` value in the resource. +- `depends_on` - The contents of the `depends_on` config directive, which + declares explicit dependencies for this resource. + +## The `provisioners` Collection + +The `provisioners` collection is a collection of all of the provisioners found +across all resources in the configuration. + +While normally bound to a resource in an ordered fashion, this collection allows +for the filtering of provisioners within a single expression. + +This collection is indexed with a key following the format +`resource_address:index`, with each field matching their respective field in the +particular element below: + +- `resource_address`: The address of the resource that the provisioner was found + in. This can be found in the [`resources`](#the-resources-collection) + collection. +- `type`: The provisioner type, ie: `local_exec`. +- `index`: The provisioner index as it shows up in the resource provisioner + order. +- `config`: The [block expression + representation](#block-expression-representation) of the configuration values + in the provisioner. + +## The `variables` Collection + +The `variables` collection is a collection of all variables across all modules +in the configuration. + +Note that this tracks variable definitions, not values. See the [`tfplan/v2` +`variables` collection](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2#the-variables-collection) for variable +values set within a plan. + +This collection is indexed by the key format `module_address:name`, with each +field matching their respective name below. `module_address` and the colon +delimiter are omitted for the root module. + +- `module_address` - The address of the module the variable was found in. +- `name` - The name of the variable. +- `default` - The defined default value of the variable. +- `description` - The description of the variable. + +## The `outputs` Collection + +The `outputs` collection is a collection of all outputs across all modules in +the configuration. + +Note that this tracks variable definitions, not values. See the [`tfstate/v2` +`outputs` collection](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2#the-outputs-collection) for the final +values of outputs set within a state. The [`tfplan/v2` `output_changes` +collection](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2#the-output_changes-collection) also contains a more +complex collection of planned output changes. + +This collection is indexed by the key format `module_address:name`, with each +field matching their respective name below. `module_address` and the colon +delimiter are omitted for the root module. + +- `module_address` - The address of the module the output was found in. +- `name` - The name of the output. +- `sensitive` - Indicates whether or not the output was marked as + [`sensitive`](/terraform/language/values/outputs#sensitive-suppressing-values-in-cli-output). +- `value` - An [expression representation](#expression-representations) for the output. +- `description` - The description of the output. +- `depends_on` - A list of resource names that the output depends on. These are + the hard-defined output dependencies as defined in the + [`depends_on`](/terraform/language/values/outputs#depends_on-explicit-output-dependencies) + field in an output declaration, not the dependencies that get derived from + natural evaluation of the output expression (these can be found in the + `references` field of the expression representation). + +## The `module_calls` Collection + +The `module_calls` collection is a collection of all module declarations at all +levels within the configuration. + +Note that this is the +[`module`](/terraform/language/modules#calling-a-child-module) stanza in +any particular configuration, and not the module itself. Hence, a declaration +for `module.foo` would actually be declared in the root module, which would be +represented by a blank field in `module_address`. + +This collection is indexed by the key format `module_address:name`, with each +field matching their respective name below. `module_address` and the colon +delimiter are omitted for the root module. + +- `module_address` - The address of the module the declaration was found in. +- `name` - The name of the module. +- `source` - The contents of the `source` field. +- `config` - A [block expression + representation](#block-expression-representation) for all parameter values + sent to the module. +- `count` - An [expression representation](#expression-representations) for the + `count` field. +- `depends_on`: An [expression representation](#expression-representations) for the + `depends_on` field. +- `for_each` - An [expression representation](#expression-representations) for + the `for_each` field. +- `version_constraint` - The string value found in the `version` field of the + module declaration. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfconfig.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfconfig.mdx new file mode 100644 index 000000000..dd83787db --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfconfig.mdx @@ -0,0 +1,976 @@ +--- +page_title: tfconfig Sentinel import +description: Use tfconfig import to give Sentinel access to a Terraform configuration. +source: terraform-docs-common +--- + +# tfconfig Sentinel import + +~> **Warning:** The `tfconfig` import is now deprecated and will be permanently removed in August 2025. We recommend that you start using the updated [tfconfig/v2](/terraform/enterprise/policy-enforcement/import-reference/tfconfig-v2) import as soon as possible to avoid disruptions. The `tfconfig/v2` import offers improved functionality and is designed to better support your policy enforcement needs. + +The `tfconfig` import provides access to a Terraform configuration. + +The Terraform configuration is the set of `*.tf` files that are used to +describe the desired infrastructure state. Policies using the `tfconfig` +import can access all aspects of the configuration: providers, resources, +data sources, modules, and variables. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Some use cases for `tfconfig` include: + +- **Organizational naming conventions**: requiring that configuration elements + are named in a way that conforms to some organization-wide standard. +- **Required inputs and outputs**: organizations may require a particular set + of input variable names across all workspaces or may require a particular + set of outputs for asset management purposes. +- **Enforcing particular modules**: organizations may provide a number of + "building block" modules and require that each workspace be built only from + combinations of these modules. +- **Enforcing particular providers or resources**: an organization may wish to + require or prevent the use of providers and/or resources so that configuration + authors cannot use alternative approaches to work around policy + restrictions. + +Note with these use cases that this import is concerned with object _names_ +in the configuration. Since this is the configuration and not an invocation +of Terraform, you can't see values for variables, the state, or the diff for +a pending plan. If you want to write policy around expressions used +within configuration blocks, you likely want to use the +[`tfplan`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) import. + +## Namespace Overview + +The following is a tree view of the import namespace. For more detail on a +particular part of the namespace, see below. + +-> **Note:** The root-level alias keys shown here (`data`, `modules`, +`providers`, `resources`, and `variables`) are shortcuts to a [module +namespace](#namespace-module) scoped to the root module. For more details, see +the section on [root namespace aliases](#root-namespace-aliases). + + tfconfig + ├── module() (function) + │ └── (module namespace) + │ ├── data + │ │ └── TYPE.NAME + │ │ ├── config (map of keys) + │ │ ├── references (map of keys) (TF 0.12 and later) + │ │ └── provisioners + │ │ └── NUMBER + │ │ ├── config (map of keys) + │ │ ├── references (map of keys) (TF 0.12 and later) + │ │ └── type (string) + │ ├── modules + │ │ └── NAME + │ │ ├── config (map of keys) + │ │ ├── references (map of keys) (TF 0.12 and later) + │ │ ├── source (string) + │ │ └── version (string) + │ ├──outputs + │ │ └── NAME + │ │ ├── depends_on (list of strings) + │ │ ├── description (string) + │ │ ├── sensitive (boolean) + │ │ ├── references (list of strings) (TF 0.12 and later) + │ │ └── value (value) + │ ├── providers + │ │ └── TYPE + │ │ ├── alias + │ │ │ └── ALIAS + │ │ │ ├── config (map of keys) + │ │ | ├── references (map of keys) (TF 0.12 and later) + │ │ │ └── version (string) + │ │ ├── config (map of keys) + │ │ ├── references (map of keys) (TF 0.12 and later) + │ │ └── version (string) + │ ├── resources + │ │ └── TYPE.NAME + │ │ ├── config (map of keys) + │ │ ├── references (map of keys) (TF 0.12 and later) + │ │ └── provisioners + │ │ └── NUMBER + │ │ ├── config (map of keys) + │ │ ├── references (map of keys) (TF 0.12 and later) + │ │ └── type (string) + │ └── variables + │ └── NAME + │ ├── default (value) + │ └── description (string) + ├── module_paths ([][]string) + │ + ├── data (root module alias) + ├── modules (root module alias) + ├── outputs (root module alias) + ├── providers (root module alias) + ├── resources (root module alias) + └── variables (root module alias) + +### `references` with Terraform 0.12 + +**With Terraform 0.11 or earlier**, if a configuration value is defined as an +expression (and not a static value), the value will be accessible in its raw, +non-interpolated string (just as with a constant value). + +As an example, consider the following resource block: + +```hcl +resource "local_file" "accounts" { + content = "some text" + filename = "${var.subdomain}.${var.domain}/accounts.txt" +} +``` + +In this example, one might want to ensure `domain` and `subdomain` input +variables are used within `filename` in this configuration. With Terraform 0.11 or +earlier, the following policy would evaluate to `true`: + +```python +import "tfconfig" + +# filename_value is the raw, non-interpolated string +filename_value = tfconfig.resources.local_file.accounts.config.filename + +main = rule { + filename_value contains "${var.domain}" and + filename_value contains "${var.subdomain}" +} +``` + +**With Terraform 0.12 or later**, any non-static +values (such as interpolated strings) are not present within the +configuration value and `references` should be used instead: + +```python +import "tfconfig" + +# filename_references is a list of string values containing the references used in the expression +filename_references = tfconfig.resources.local_file.accounts.references.filename + +main = rule { + filename_references contains "var.domain" and + filename_references contains "var.subdomain" +} +``` + +The `references` value is present in any namespace where non-constant +configuration values can be expressed. This is essentially every namespace +which has a `config` value as well as the `outputs` namespace. + +-> **Note:** Remember, this import enforces policy around the literal Terraform +configuration and not the final values as a result of invoking Terraform. If +you want to write policy around the _result_ of expressions used within +configuration blocks (for example, if you wanted to ensure the final value of +`filename` above includes `accounts.txt`), you likely want to use the +[`tfplan`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) import. + +## Namespace: Root + +The root-level namespace consists of the values and functions documented below. + +In addition to this, the root-level `data`, `modules`, `providers`, `resources`, +and `variables` keys all alias to their corresponding namespaces within the +[module namespace](#namespace-module). + + + +### Function: `module()` + + module = func(ADDR) + +- **Return Type:** A [module namespace](#namespace-module). + +The `module()` function in the [root namespace](#namespace-root) returns the +[module namespace](#namespace-module) for a particular module address. + +The address must be a list and is the module address, split on the period (`.`), +excluding the root module. + +Hence, a module with an address of simply `foo` (or `root.foo`) would be +`["foo"]`, and a module within that (so address `foo.bar`) would be read as +`["foo", "bar"]`. + +[`null`][ref-null] is returned if a module address is invalid, or if the module +is not present in the configuration. + +[ref-null]: /sentinel/docs/language/spec#null + +As an example, given the following module block: + +```hcl +module "foo" { + # ... +} +``` + +If the module contained the following content: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { subject.module(["foo"]).resources.null_resource.foo.config.triggers[0].foo is "bar" } +``` + + + +### Value: `module_paths` + +- **Value Type:** List of a list of strings. + +The `module_paths` value within the [root namespace](#namespace-root) is a list +of all of the modules within the Terraform configuration. + +Modules not present in the configuration will not be present here, even if they +are present in the diff or state. + +This data is represented as a list of a list of strings, with the inner list +being the module address, split on the period (`.`). + +The root module is included in this list, represented as an empty inner list. + +As an example, if the following module block was present within a Terraform +configuration: + +```hcl +module "foo" { + # ... +} +``` + +The value of `module_paths` would be: + + [ + [], + ["foo"], + ] + +And the following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.module_paths contains ["foo"] } +``` + +#### Iterating Through Modules + +Iterating through all modules to find particular resources can be useful. This +[example][iterate-over-modules] shows how to use `module_paths` with the +[`module()` function](#function-module-) to find all resources of a +particular type from all modules using the `tfplan` import. By changing `tfplan` +in this function to `tfconfig`, you could make a similar function find all +resources of a specific type in the Terraform configuration. + +[iterate-over-modules]: /terraform/enterprise/policy-enforcement/sentinel#sentinel-imports + +## Namespace: Module + +The **module namespace** can be loaded by calling [`module()`](#root-function-module) +for a particular module. + +It can be used to load the following child namespaces: + +- `data` - Loads the [resource namespace](#namespace-resources-data-sources), + filtered against data sources. +- `modules` - Loads the [module configuration + namespace](#namespace-module-configuration). +- `outputs` - Loads the [output namespace](#namespace-outputs). +- `providers` - Loads the [provider namespace](#namespace-providers). +- `resources` - Loads the [resource + namespace](#namespace-resources-data-sources), filtered against resources. +- `variables` - Loads the [variable namespace](#namespace-variables). + +### Root Namespace Aliases + +The root-level `data`, `modules`, `providers`, `resources`, and `variables` keys +all alias to their corresponding namespaces within the module namespace, loaded +for the root module. They are the equivalent of running `module([]).KEY`. + + + +## Namespace: Resources/Data Sources + +The **resource namespace** is a namespace _type_ that applies to both resources +(accessed by using the `resources` namespace key) and data sources (accessed +using the `data` namespace key). + +Accessing an individual resource or data source within each respective namespace +can be accomplished by specifying the type and name, in the syntax +`[resources|data].TYPE.NAME`. + +In addition, each of these namespace levels is a map, allowing you to filter +based on type and name. Some examples of multi-level access are below: + +- To fetch all `aws_instance` resources within the root module, you can specify + `tfconfig.resources.aws_instance`. This would give you a map of resource + namespaces indexed from the names of each resource (`foo`, `bar`, and so + on). +- To fetch all resources within the root module, irrespective of type, use + `tfconfig.resources`. This is indexed by type, as shown above with + `tfconfig.resources.aws_instance`, with names being the next level down. + +As an example, perhaps you wish to deny use of the `local_file` resource +in your configuration. Consider the following resource block: + +```hcl +resource "local_file" "foo" { + content = "foo!" + filename = "${path.module}/foo.bar" +} +``` + +The following policy would fail: + +```python +import "tfconfig" + +main = rule { tfconfig.resources not contains "local_file" } +``` + +Further explanation of the namespace will be in the context of resources. As +mentioned, when operating on data sources, use the same syntax, except with +`data` in place of `resources`. + + + +### Value: `config` + +- **Value Type:** A string-keyed map of values. + +The `config` value within the [resource +namespace](#namespace-resources-data-sources) is a map of key-value pairs that +directly map to Terraform config keys and values. + +-> **With Terraform 0.11 or earlier**, if the config value is defined as an +expression (and not a static value), the value will be in its raw, +non-interpolated string. **With Terraform 0.12 or later**, any non-static +values (such as interpolated strings) are not present and +[`references`](#resources-value-references) should be used instead. + +As an example, consider the following resource block: + +```hcl +resource "local_file" "accounts" { + content = "some text" + filename = "accounts.txt" +} +``` + +In this example, one might want to access `filename` to validate that the correct +file name is used. Given the above example, the following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { + tfconfig.resources.local_file.accounts.config.filename is "accounts.txt" +} +``` + + + +### Value: `references` + +- **Value Type:** A string-keyed map of list values containing strings. + +-> **Note:** This value is only present when using Terraform 0.12 or later. + +The `references` value within the [resource namespace](#namespace-resources-data-sources) +contains the identifiers within non-constant expressions found in [`config`](#resources-value-config). +See the [documentation on `references`](#references-with-terraform-0-12) for more information. + + + +### Value: `provisioners` + +- **Value Type:** List of [provisioner namespaces](#namespace-provisioners). + +The `provisioners` value within the [resource namespace](#namespace-resources) +represents the [provisioners][ref-tf-provisioners] within a specific resource. + +Provisioners are listed in the order they were provided in the configuration +file. + +While the `provisioners` value will be present within data sources, it will +always be an empty map (in Terraform 0.11) or `null` (in Terraform 0.12) since +data sources cannot actually have provisioners. + +The data within a provisioner can be inspected via the returned [provisioner +namespace](#namespace-provisioners). + +[ref-tf-provisioners]: /terraform/language/resources/provisioners/syntax + +## Namespace: Provisioners + +The **provisioner namespace** represents the configuration for a particular +[provisioner][ref-tf-provisioners] within a specific resource. + + + +### Value: `config` + +- **Value Type:** A string-keyed map of values. + +The `config` value within the [provisioner namespace](#namespace-provisioners) +represents the values of the keys within the provisioner. + +-> **With Terraform 0.11 or earlier**, if the config value is defined as an +expression (and not a static value), the value will be in its raw, +non-interpolated string. **With Terraform 0.12 or later**, any non-static +values (such as interpolated strings) are not present and +[`references`](#provisioners-value-references) should be used instead. + +As an example, given the following resource block: + +```hcl +resource "null_resource" "foo" { + # ... + + provisioner "local-exec" { + command = "echo ${self.private_ip} > file.txt" + } +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { + tfconfig.resources.null_resource.foo.provisioners[0].config.command is "echo ${self.private_ip} > file.txt" +} +``` + + + +### Value: `references` + +- **Value Type:** A string-keyed map of list values containing strings. + +-> **Note:** This value is only present when using Terraform 0.12 or later. + +The `references` value within the [provisioner namespace](#namespace-provisioners) +contains the identifiers within non-constant expressions found in [`config`](#provisioners-value-config). +See the [documentation on `references`](#references-with-terraform-0-12) for more information. + + + +### Value: `type` + +- **Value Type:** String. + +The `type` value within the [provisioner namespace](#namespace-provisioners) +represents the type of the specific provisioner. + +As an example, in the following resource block: + +```hcl +resource "null_resource" "foo" { + # ... + + provisioner "local-exec" { + command = "echo ${self.private_ip} > file.txt" + } +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.resources.null_resource.foo.provisioners[0].type is "local-exec" } +``` + +## Namespace: Module Configuration + +The **module configuration** namespace displays data on _module configuration_ +as it is given within a `module` block. This means that the namespace concerns +itself with the contents of the declaration block (example: the `source` +parameter and variable assignment keys), not the data within the module +(example: any contained resources or data sources). For the latter, the module +instance would need to be looked up with the [`module()` +function](#root-function-module). + + + +### Value: `source` + +- **Value Type:** String. + +The `source` value within the [module configuration +namespace](#namespace-module-configuration) represents the module source path as +supplied to the module configuration. + +As an example, given the module declaration block: + +```hcl +module "foo" { + source = "./foo" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.modules.foo.source is "./foo" } +``` + + + +### Value: `version` + +- **Value Type:** String. + +The `version` value within the [module configuration +namespace](#namespace-module-configuration) represents the [version +constraint][module-version-constraint] for modules that support it, such as +modules within the [Terraform Module Registry][terraform-module-registry] or the +[HCP Terraform private module registry][tfe-private-registry]. + +[module-version-constraint]: /terraform/language/modules#module-versions + +[terraform-module-registry]: https://registry.terraform.io/ + +[tfe-private-registry]: /terraform/enterprise/registry + +As an example, given the module declaration block: + +```hcl +module "foo" { + source = "foo/bar" + version = "~> 1.2" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.modules.foo.version is "~> 1.2" } +``` + + + +### Value: `config` + +- **Value Type:** A string-keyed map of values. + +-> **With Terraform 0.11 or earlier**, if the config value is defined as an +expression (and not a static value), the value will be in its raw, +non-interpolated string. **With Terraform 0.12 or later**, any non-static +values (such as interpolated strings) are not present and +[`references`](#modules-value-references) should be used instead. + +The `config` value within the [module configuration +namespace](#namespace-module-configuration) represents the values of the keys +within the module configuration. This is every key within a module declaration +block except [`source`](#modules-value-source) and [`version`](#modules-value-version), which +have their own values. + +As an example, given the module declaration block: + +```hcl +module "foo" { + source = "./foo" + + bar = "baz" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.modules.foo.config.bar is "baz" } +``` + + + +### Value: `references` + +- **Value Type:** A string-keyed map of list values containing strings. + +-> **Note:** This value is only present when using Terraform 0.12 or later. + +The `references` value within the [module configuration namespace](#namespace-module-configuration) +contains the identifiers within non-constant expressions found in [`config`](#modules-value-config). +See the [documentation on `references`](#references-with-terraform-0-12) for more information. + +## Namespace: Outputs + +The **output namespace** represents _declared_ output data within a +configuration. As such, configuration for the [`value`](#outputs-value-value) attribute +will be in its raw form, and not yet interpolated. For fully interpolated output +values, see the [`tfstate` import][ref-tfe-sentinel-tfstate]. + +[ref-tfe-sentinel-tfstate]: /terraform/enterprise/policy-enforcement/import-reference/tfstate-v2 + +This namespace is indexed by output name. + + + +### Value: `depends_on` + +- **Value Type:** A list of strings. + +The `depends_on` value within the [output namespace](#namespace-outputs) +represents any _explicit_ dependencies for this output. For more information, +see the [depends_on output setting][ref-depends_on] within the general Terraform +documentation. + +[ref-depends_on]: /terraform/language/values/outputs#depends_on + +As an example, given the following output declaration block: + +```hcl +output "id" { + depends_on = ["null_resource.bar"] + value = "${null_resource.foo.id}" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.outputs.id.depends_on[0] is "null_resource.bar" } +``` + + + +### Value: `description` + +- **Value Type:** String. + +The `description` value within the [output namespace](#namespace-outputs) +represents the defined description for this output. + +As an example, given the following output declaration block: + +```hcl +output "id" { + description = "foobar" + value = "${null_resource.foo.id}" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.outputs.id.description is "foobar" } +``` + + + +### Value: `sensitive` + +- **Value Type:** Boolean. + +The `sensitive` value within the [output namespace](#namespace-outputs) +represents if this value has been marked as sensitive or not. + +As an example, given the following output declaration block: + +```hcl +output "id" { + sensitive = true + value = "${null_resource.foo.id}" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { subject.outputs.id.sensitive } +``` + + + +### Value: `value` + +- **Value Type:** Any primitive type, list or map. + +The `value` value within the [output namespace](#namespace-outputs) represents +the defined value for the output as declared in the configuration. Primitives +will bear the implicit type of their declaration (string, int, float, or bool), +and maps and lists will be represented as such. + +-> **With Terraform 0.11 or earlier**, if the config value is defined as an +expression (and not a static value), the value will be in its raw, +non-interpolated string. **With Terraform 0.12 or later**, any non-static +values (such as interpolated strings) are not present and +[`references`](#outputs-value-references) should be used instead. + +As an example, given the following output declaration block: + +```hcl +output "id" { + value = "${null_resource.foo.id}" +} +``` + +With Terraform 0.11 or earlier the following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.outputs.id.value is "${null_resource.foo.id}" } +``` + + + +### Value: `references` + +- **Value Type:**. List of strings. + +-> **Note:** This value is only present when using Terraform 0.12 or later. + +The `references` value within the [output namespace](#namespace-outputs) +contains the names of any referenced identifiers when [`value`](#outputs-value-value) +is a non-constant expression. + +As an example, given the following output declaration block: + +```hcl +output "id" { + value = "${null_resource.foo.id}" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.outputs.id.references contains "null_resource.foo.id" } +``` + +## Namespace: Providers + +The **provider namespace** represents data on the declared providers within a +namespace. + +This namespace is indexed by provider type and _only_ contains data about +providers when actually declared. If you are using a completely implicit +provider configuration, this namespace will be empty. + +This namespace is populated based on the following criteria: + +- The top-level namespace [`config`](#providers-value-config) and + [`version`](#providers-value-version) values are populated with the configuration and + version information from the default provider (the provider declaration that + lacks an alias). +- Any aliased providers are added as namespaces within the + [`alias`](#providers-value-alias) value. +- If a module lacks a default provider configuration, the top-level `config` and + `version` values will be empty. + + + +### Value: `alias` + +- **Value Type:** A map of [provider namespaces](#namespace-providers), indexed + by alias. + +The `alias` value within the [provider namespace](#namespace-providers) +represents all declared [non-default provider +instances][ref-tf-provider-instances] for a specific provider type, indexed by +their specific alias. + +[ref-tf-provider-instances]: /terraform/language/providers/configuration#alias-multiple-provider-configurations + +The return type is a provider namespace with the data for the instance in +question loaded. The `alias` key will not be available within this namespace. + +As an example, given the following provider declaration block: + +```hcl +provider "aws" { + alias = "east" + region = "us-east-1" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.providers.aws.alias.east.config.region is "us-east-1" } +``` + + + +### Value: `config` + +- **Value Type:** A string-keyed map of values. + +-> **With Terraform 0.11 or earlier**, if the config value is defined as an +expression (and not a static value), the value will be in its raw, +non-interpolated string. **With Terraform 0.12 or later**, any non-static +values (such as interpolated strings) are not present and +[`references`](#providers-value-references) should be used instead. + +The `config` value within the [provider namespace](#namespace-providers) +represents the values of the keys within the provider's configuration, with the +exception of the provider version, which is represented by the +[`version`](#providers-value-version) value. [`alias`](#providers-value-alias) is also not included +when the provider is aliased. + +As an example, given the following provider declaration block: + +```hcl +provider "aws" { + region = "us-east-1" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.providers.aws.config.region is "us-east-1" } +``` + + + +### Value: `references` + +- **Value Type:** A string-keyed map of list values containing strings. + +-> **Note:** This value is only present when using Terraform 0.12 or later. + +The `references` value within the [provider namespace](#namespace-providers) +contains the identifiers within non-constant expressions found in [`config`](#providers-value-config). +See the [documentation on `references`](#references-with-terraform-0-12) for more information. + + + +### Value: `version` + +- **Value Type:** String. + +The `version` value within the [provider namespace](#namespace-providers) +represents the explicit expected version of the supplied provider. This includes +the pessimistic operator. + +As an example, given the following provider declaration block: + +```hcl +provider "aws" { + version = "~> 1.34" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.providers.aws.version is "~> 1.34" } +``` + +## Namespace: Variables + +The **variable namespace** represents _declared_ variable data within a +configuration. As such, static data can be extracted, such as defaults, but not +dynamic data, such as the current value of a variable within a plan (although +this can be extracted within the [`tfplan` import][ref-tfe-sentinel-tfplan]). + +[ref-tfe-sentinel-tfplan]: /terraform/enterprise/policy-enforcement/import-reference/tfplan-v2 + +This namespace is indexed by variable name. + + + +### Value: `default` + +- **Value Type:** Any primitive type, list, map, or `null`. + +The `default` value within the [variable namespace](#namespace-variables) +represents the default for the variable as declared in the configuration. + +The actual value will be as configured. Primitives will bear the implicit type +of their declaration (string, int, float, or bool), and maps and lists will be +represented as such. + +If no default is present, the value will be [`null`][ref-sentinel-null] (not to +be confused with [`undefined`][ref-sentinel-undefined]). + +[ref-sentinel-null]: /sentinel/docs/language/spec#null + +[ref-sentinel-undefined]: /sentinel/docs/language/undefined + +As an example, given the following variable blocks: + +```hcl +variable "foo" { + default = "bar" +} + +variable "number" { + default = 42 +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +default_foo = rule { tfconfig.variables.foo.default is "bar" } +default_number = rule { tfconfig.variables.number.default is 42 } + +main = rule { default_foo and default_number } +``` + + + +### Value: `description` + +- **Value Type:** String. + +The `description` value within the [variable namespace](#namespace-variables) +represents the description of the variable, as provided in configuration. + +As an example, given the following variable block: + +```hcl +variable "foo" { + description = "foobar" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfconfig" + +main = rule { tfconfig.variables.foo.description is "foobar" } +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfplan-v2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfplan-v2.mdx new file mode 100644 index 000000000..68d18aa3d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfplan-v2.mdx @@ -0,0 +1,388 @@ +--- +page_title: tfplan/v2 Sentinel import +description: Use tfplan/v2 import to give Sentinel access to a Terraform plan. +source: terraform-docs-common +--- + +-> **Note:** This is documentation for the next version of the `tfplan` Sentinel +import, designed specifically for Terraform 0.12. This import requires +Terraform 0.12 or higher, and must currently be loaded by path, using an alias, +example: `import "tfplan/v2" as tfplan`. + +# tfplan/v2 Sentinel import + +The `tfplan/v2` import provides access to a Terraform plan. + +A Terraform plan is the file created as a result of `terraform plan` and is the +input to `terraform apply`. The plan represents the changes that Terraform needs +to make to infrastructure to reach the desired state represented by the +configuration. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +In addition to the diff data available in the plan, there is a "planned state" +that is available through this import, via the +[`planned_values`](#the-planned_values-collection) collection. This collection +presents the Terraform state as how it might look after the plan data is +applied, but is not guaranteed to be the final state. + +The data in the `tfplan/v2` import is sourced from the JSON configuration file +that is generated by the [`terraform show -json`](/terraform/cli/commands/show#json-output) command. For more information on +the file format, see the [JSON Output Format](/terraform/internals/json-format) +page. + +The entirety of the JSON output file is exposed as a Sentinel map via the +[`raw`](#the-raw-collection) collection. This allows direct, low-level access to +the JSON data, but should only be used in complex situations where the +higher-level collections do not serve the purpose. + +## Import Overview + +The `tfplan/v2` import is structured as a series of _collections_, keyed as a +specific format depending on the collection. + + tfplan/v2 + ├── terraform_version (string) + ├── variables + │ └── (indexed by name) + │ ├── name (string) + │ └── value (value) + ├── planned_values + │ ├── outputs (tfstate/v2 outputs representation) + │ └── resources (tfstate/v2 resources representation) + ├── resource_changes + │ └── (indexed by address[:deposed]) + │ ├── address (string) + │ ├── module_address (string) + │ ├── mode (string) + │ ├── type (string) + │ ├── name (string) + │ ├── index (float (number) or string) + │ ├── provider_name (string) + │ ├── deposed (string) + │ └── change (change representation) + ├── resource_drift + │ └── (indexed by address[:deposed]) + │ ├── address (string) + │ ├── module_address (string) + │ ├── mode (string) + │ ├── type (string) + │ ├── name (string) + │ ├── index (float (number) or string) + │ ├── provider_name (string) + │ ├── deposed (string) + │ └── change (change representation) + ├── output_changes + │ └── (indexed by name) + │ ├── name (string) + │ └── change (change representation) + └── raw (map) + +The collections are: + +- [`variables`](#the-variables-collection) - The values of variables that have + been set in the plan itself. This collection only contains variables set in + the root module. +- [`planned_values`](#the-planned_values-collection) - The state representation + of _planned values_, or an estimation of what the state will look like after + the plan is applied. +- [`resource_changes`](#the-resource_changes-and-resource_drift-collections) - The set of change + operations for resources and data sources within this plan. +- [`resource_drift`](#the-resource_changes-and-resource_drift-collections) - A description of the + changes Terraform detected when it compared the most recent state to the prior saved state. +- [`output_changes`](#the-output_changes-collection) - The changes to outputs + within this plan. This collection only contains outputs set in the root + module. +- [`raw`](#the-raw-collection) - Access to the raw plan data as stored by + HCP Terraform. + +These collections are specifically designed to be used with the +[`filter`](/sentinel/docs/language/collection-operations#filter-expression) +quantifier expression in Sentinel, so that one can collect a list of resources +to perform policy checks on without having to write complex discovery code. As +an example, the following code will return all `aws_instance` resource changes, +across all modules in the plan: + + all_aws_instances = filter tfplan.resource_changes as _, rc { + rc.mode is "managed" and + rc.type is "aws_instance" + } + +You can add specific attributes to the filter to narrow the search, such as the +module address, or the operation being performed. The following code would +return resources in a module named `foo` only, and further narrow the search +down to only resources that were being created: + + all_aws_instances = filter tfplan.resource_changes as _, rc { + rc.module_address is "module.foo" and + rc.mode is "managed" and + rc.type is "aws_instance" and + rc.change.actions is ["create"] + } + +### Change Representation + +Certain collections in this import contain a _change representation_, an object +with details about changes to a particular entity, such as a resource (within +the [`resource_changes`](#the-resource_changes-collection) collection), or +output (within the [`output_changes`](#the-output_changes-collection) +collection). + + (change representation) + ├── actions (list) + ├── before (value, or map) + ├── after (value, or map) + └── after_unknown (boolean, or map of booleans) + +This change representation contains the following fields: + +- `actions` - A list of actions being carried out for this change. The order is + important, for example a regular replace operation is denoted by `["delete", + "create"]`, but a + [`create_before_destroy`](/terraform/language/meta-arguments/lifecycle#create_before_destroy) + resource will have an operation order of `["create", "delete"]`. +- `before` - The representation of the resource data object value before the + action. For create-only actions, this is unset. For no-op actions, this value + will be identical with `after`. +- `after` - The representation of the resource data object value after the + action. For delete-only actions, this is unset. For no-op actions, this value + will be identical with `before`. Note that unknown values will not show up in + this field. +- `after_unknown` - A deep object of booleans that denotes any values that are + unknown in a resource. These values were previously referred to as "computed" + values. If the value cannot be found in this map, then its value should be + available within `after`, so long as the operation supports it. + +#### Actions + +As mentioned above, actions show up within the `actions` field of a change +representation and indicate the type of actions being performed as part of the +change, and the order that they are being performed in. + +The current list of actions are as follows: + +- `create` - The action will create the associated entity. Depending on the + order this appears in, the entity may be created alongside a copy of the + entity before replacing it. +- `read` - The action will read the associated entity. In practice, seeing this + change type should be rare, as reads generally happen before a plan is + executed (usually during a refresh). +- `update` - The action will update the associated entity in a way that alters its state + in some way. +- `delete` - The action will remove the associated entity, deleting any + applicable state and associated real resources or infrastructure. +- `no-op` - No action will be performed on the associated entity. + +The `actions` field is a list, as some real-world actions are actually a +composite of more than one primitive action. At this point in time, this +is generally only applicable to resource replacement, in which the following +action orders apply: + +- **Normal replacement:** `["delete", "create"]` - Applies to default lifecycle + configurations. +- **Create-before-destroy:** `["create", "delete"]` - Applies when + [`create_before_destroy`](/terraform/language/meta-arguments/lifecycle#create_before_destroy) + is used in a lifecycle configuration. + +Note that, in most situations, the plan will list all "changes", including no-op +changes. This makes filtering on change type crucial to the accurate selection +of data if you are concerned with the state change of a particular resource. + +To filter on a change type, use exact list comparison. For example, the +following example from the [Import Overview](#import-overview) filters on +exactly the resources being created _only_: + + all_aws_instances = filter tfplan.resource_changes as _, rc { + rc.module_address is "module.foo" and + rc.mode is "managed" and + rc.type is "aws_instance" and + rc.change.actions is ["create"] + } + +#### `before`, `after`, and `after_unknown` + +The exact attribute changes for a particular operation are outlined in the +`before` and `after` attributes. Depending on the entity being operated on, this +will either be a map (as with +[`resource_changes`](#the-resource_changes-collection)) or a singular value (as +with [`output_changes`](#the-output_changes-collection)). + +What you can expect in these fields varies depending on the operation: + +- For fresh create operations, `before` will generally be `null`, and `after` + will contain the data you can expect to see after the change. +- For full delete operations, this will be reversed - `before` will contain + data, and `after` will be `null`. +- Update or replace operations will have data in both fields relevant to their + states before and after the operation. +- No-op operations should have identical data in `before` and `after`. + +For resources, if a field cannot be found in `after`, it generally means one of +two things: + +- The attribute does not exist in the resource schema. Generally, known + attributes that do not have a value will show up as `null` or otherwise empty + in `after`. +- The attribute is _unknown_, that is, it was unable to be determined at plan + time and will only be available after apply-time values have been able to be + calculated. + +In the latter case, there should be a value for the particular attribute in +`after_unknown`, which can be checked to assert that the value is indeed +unknown, versus invalid: + + import "tfplan/v2" as tfplan + + no_unknown_amis = rule { + all filter tfplan.resource_changes as _, rc { + rc.module_address is "module.foo" and + rc.mode is "managed" and + rc.type is "aws_instance" and + rc.change.actions is ["create"] + } as _, rc { + rc.change.after_unknown.ami else false is false + } + } + +For output changes, `after_unknown` will simply be `true` if the value won't be +known until the plan is applied. + +## The `terraform_version` Value + +The top-level `terraform_version` value in this import gives the Terraform +version that made the plan. This can be used to do version validation. + + import "tfplan/v2" as tfplan + import "strings" + + v = strings.split(tfplan.terraform_version, ".") + version_major = int(v[1]) + version_minor = int(v[2]) + + main = rule { + version_major is 12 and version_minor >= 19 + } + +-> **NOTE:** The above example will give errors when working with pre-release +versions (example: `0.12.0beta1`). Future versions of this import will include +helpers to assist with processing versions that will account for these kinds of +exceptions. + +## The `variables` Collection + +The `variables` collection is a collection of the variables set in the root +module when creating the plan. + +This collection is indexed on the name of the variable. + +The valid values are: + +- `name` - The name of the variable, also used as the collection key. +- `value` - The value of the variable assigned during the plan. + +## The `planned_values` Collection + +The `planned_values` collection is a special collection in that it contains two +fields that alias to state collections with the _planned_ state set. This is the +best prediction of what the state will look like after the plan is executed. + +The two fields are: + +- `outputs` - The prediction of what output values will look like after the + state is applied. For more details on the structure of this collection, see + the [`outputs`](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2#the-outputs-collection) collection in the + [`tfstate/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2) documentation. +- `resources` - The prediction of what resource values will look like after the + state is applied. For more details on the structure of this collection, see + the [`resources`](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2#the-resources-collection) collection in the + [`tfstate/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2) documentation. + +-> **NOTE:** Unknown values are omitted from the `planned_values` state +representations, regardless of whether or not they existed before. Use +[`resource_changes`](#the-resource_changes-collection) if awareness of unknown +data is important. + +## The `resource_changes` and `resource_drift` Collections + +The `resource_changes` and `resource_drift` collections are a set of change operations for resources +and data sources within this plan. + +The `resource_drift` collection provides a description of the changes Terraform detected +when it compared the most recent state to the prior saved state. + +The `resource_changes` collection includes all resources that have been found in the configuration and state, +regardless of whether or not they are changing. + +~> When [resource targeting](/terraform/cli/commands/plan#resource-targeting) is in effect, the `resource_changes` collection will only include the resources specified as targets for the run. This may lead to unexpected outcomes if a policy expects a resource to be present in the plan. To prohibit targeted runs altogether, ensure [`tfrun.target_addrs`](/terraform/enterprise/policy-enforcement/import-reference/tfrun#value-target_addrs) is undefined or empty. + +This collection is indexed on the complete resource address as the key. If +`deposed` is non-empty, it is appended to the end, and may look something like +`aws_instance.foo:deposed-abc123`. + +An element contains the following fields: + +- `address` - The absolute resource address - also the key for the collection's + index, if `deposed` is empty. + +- `module_address` - The module portion of the absolute resource address. + +- `mode` - The resource mode, either `managed` (resources) or `data` (data + sources). + +- `type` - The resource type, example: `aws_instance` for `aws_instance.foo`. + +- `name` - The resource name, example: `foo` for `aws_instance.foo`. + +- `index` - The resource index. Can be either a number or a string. + +- `provider_name` - The name of the provider this resource belongs to. This + allows the provider to be interpreted unambiguously in the unusual situation + where a provider offers a resource type whose name does not start with its own + name, such as the `googlebeta` provider offering `google_compute_instance`. + + -> **Note:** Starting with Terraform 0.13, the `provider_name` field contains the + _full_ source address to the provider in the Terraform Registry. Example: + `registry.terraform.io/hashicorp/null` for the null provider. + +- `deposed` - An identifier used during replacement operations, and can be used + to identify the exact resource being replaced in state. + +- `change` - The data describing the change that will be made to this resource. + For more details, see [Change Representation](#change-representation). + +## The `output_changes` Collection + +The `output_changes` collection is a collection of the change operations for +outputs within this plan. + +Only outputs for the root module are included. + +This collection is indexed by the name of the output. The fields in a collection +value are below: + +- `name` - The name of the output, also the index key. +- `change` - The data describing the change that will be made to this output. + For more details, see [Change Representation](#change-representation). + +## The `raw` Collection + +The `raw` collection exposes the raw, unprocessed plan data, direct from the +data stored by HCP Terraform. + +This is the same data that is produced by [`terraform show -json`](/terraform/cli/commands/show#json-output) on the plan file for the run this +policy check is attached to. + +Use of this data is only recommended in expert situations where the data the +collections present may not exactly serve the needs of the policy. For more +information on the file format, see the [JSON Output +Format](/terraform/internals/json-format) page. + +-> **NOTE:** Although designed to be relatively stable, the actual makeup for +the JSON output format is a Terraform CLI concern and as such not managed by +HCP Terraform. Use at your own risk, follow the [Terraform CLI +project](https://github.com/hashicorp/terraform), and watch the file format +documentation for any changes. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfplan.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfplan.mdx new file mode 100644 index 000000000..12832dd58 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfplan.mdx @@ -0,0 +1,604 @@ +--- +page_title: tfplan Sentinel import reference +description: Use the tfplan import to give Sentinel access to a Terraform plan. +source: terraform-docs-common +--- + +# tfplan Sentinel import reference + +~> **Warning:** The `tfplan` import is now deprecated and will be permanently removed in August 2025. We recommend that you start using the updated [tfplan/v2](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) import as soon as possible to avoid disruptions. The `tfplan/v2` import offers improved functionality and is designed to better support your policy enforcement needs. + +The `tfplan` import provides access to a Terraform plan. A Terraform plan is the +file created as a result of `terraform plan` and is the input to `terraform +apply`. The plan represents the changes that Terraform needs to make to +infrastructure to reach the desired state represented by the configuration. + +In addition to the diff data available in the plan, there is an +[`applied`](#value-applied) state available that merges the plan with the state +to create the planned state after apply. + +Finally, this import also allows you to access the configuration files and the +Terraform state at the time the plan was run. See the section on [accessing a +plan's state and configuration +data](#accessing-a-plan-39-s-state-and-configuration-data) for more information. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +## Namespace Overview + +The following is a tree view of the import namespace. For more detail on a +particular part of the namespace, see below. + +-> Note that the root-level alias keys shown here (`data`, `path`, and +`resources`) are shortcuts to a [module namespace](#namespace-module) scoped to +the root module. For more details, see the section on [root namespace +aliases](#root-namespace-aliases). + + tfplan + ├── module() (function) + │ └── (module namespace) + │ ├── path ([]string) + │ ├── data + │ │ └── TYPE.NAME[NUMBER] + │ │ ├── applied (map of keys) + │ │ └── diff + │ │ └── KEY + │ │ ├── computed (bool) + │ │ ├── new (string) + │ │ └── old (string) + │ └── resources + │ └── TYPE.NAME[NUMBER] + │ ├── applied (map of keys) + │ ├── destroy (bool) + │ ├── requires_new (bool) + │ └── diff + │ └── KEY + │ ├── computed (bool) + │ ├── new (string) + │ └── old (string) + ├── module_paths ([][]string) + ├── terraform_version (string) + ├── variables (map of keys) + │ + ├── data (root module alias) + ├── path (root module alias) + ├── resources (root module alias) + │ + ├── config (tfconfig namespace alias) + └── state (tfstate import alias) + +## Namespace: Root + +The root-level namespace consists of the values and functions documented below. + +In addition to this, the root-level `data`, `path`, and `resources` keys alias +to their corresponding namespaces or values within the [module +namespace](#namespace-module). + +### Accessing a Plan's State and Configuration Data + +The `config` and `state` keys alias to the [`tfconfig`][import-tfconfig] and +[`tfstate`][import-tfstate] namespaces, respectively, with the data sourced from +the Terraform _plan_ (as opposed to actual configuration and state). + +[import-tfconfig]: /terraform/enterprise/policy-enforcement/import-reference/tfconfig-v2 + +[import-tfstate]: /terraform/enterprise/policy-enforcement/import-reference/tfstate-v2 + +-> Note that these aliases are not represented as maps. While they will appear +empty when viewed as maps, the specific import namespace keys will still be +accessible. + +-> Note that while current versions of HCP Terraform source configuration and +state data from the plan for the Terraform run in question, future versions may +source data accessed through the `tfconfig` and `tfstate` imports (as opposed to +`tfplan.config` and `tfplan.state`) from actual config bundles, or state as +stored by HCP Terraform. When this happens, the distinction here will be useful - +the data in the aliased namespaces will be the config and state data as the +_plan_ sees it, versus the actual "physical" data. + +### Function: `module()` + + module = func(ADDR) + +- **Return Type:** A [module namespace](#namespace-module). + +The `module()` function in the [root namespace](#namespace-root) returns the +[module namespace](#namespace-module) for a particular module address. + +The address must be a list and is the module address, split on the period (`.`), +excluding the root module. + +Hence, a module with an address of simply `foo` (or `root.foo`) would be +`["foo"]`, and a module within that (so address `foo.bar`) would be read as +`["foo", "bar"]`. + +[`null`][ref-null] is returned if a module address is invalid, or if the module +is not present in the diff. + +[ref-null]: /sentinel/docs/language/spec#null + +As an example, given the following module block: + +```hcl +module "foo" { + # ... +} +``` + +If the module contained the following content: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfplan" + +main = rule { tfplan.module(["foo"]).resources.null_resource.foo[0].applied.triggers.foo is "bar" } +``` + +### Value: `module_paths` + +- **Value Type:** List of a list of strings. + +The `module_paths` value within the [root namespace](#namespace-root) is a list +of all of the modules within the Terraform diff for the current plan. + +Modules not present in the diff will not be present here, even if they are +present in the configuration or state. + +This data is represented as a list of a list of strings, with the inner list +being the module address, split on the period (`.`). + +The root module is included in this list, represented as an empty inner list, as +long as there are changes. + +As an example, if the following module block was present within a Terraform +configuration: + +```hcl +module "foo" { + # ... +} +``` + +The value of `module_paths` would be: + + [ + [], + ["foo"], + ] + +And the following policy would evaluate to `true`: + +```python +import "tfplan" + +main = rule { tfplan.module_paths contains ["foo"] } +``` + +-> Note the above example only applies if the module is present in the diff. + +#### Iterating Through Modules + +Iterating through all modules to find particular resources can be useful. This +[example][iterate-over-modules] shows how to use `module_paths` with the +[`module()` function](#function-module-) to find all resources of a +particular type from all modules that have pending changes using the `tfplan` +import. + +[iterate-over-modules]: /terraform/enterprise/policy-enforcement/sentinel#sentinel-imports + +### Value: `terraform_version` + +- **Value Type:** String. + +The `terraform_version` value within the [root namespace](#namespace-root) +represents the version of Terraform used to create the plan. This can be used to +enforce a specific version of Terraform in a policy check. + +As an example, the following policy would evaluate to `true`, as long as the +plan was made with a version of Terraform in the 0.11.x series, excluding any +pre-release versions (example: `-beta1` or `-rc1`): + +```python +import "tfplan" + +main = rule { tfplan.terraform_version matches "^0\\.11\\.\\d+$" } +``` + +### Value: `variables` + +- **Value Type:** A string-keyed map of values. + +The `variables` value within the [root namespace](#namespace-root) represents +all of the variables that were set when creating the plan. This will only +contain variables set for the root module. + +Note that unlike the [`default`][import-tfconfig-variables-default] value in the +[`tfconfig` variables namespace][import-tfconfig-variables], primitive values +here are stringified, and type conversion will need to be performed to perform +comparison for int, float, or boolean values. This only applies to variables +that are primitives themselves and not primitives within maps and lists, which +will be their original types. + +[import-tfconfig-variables-default]: /terraform/enterprise/policy-enforcement/import-reference/tfconfig-v2#value-default + +[import-tfconfig-variables]: /terraform/enterprise/policy-enforcement/import-reference/tfconfig-v2#namespace-variables + +If a default was accepted for the particular variable, the default value will be +populated here. + +As an example, given the following variable blocks: + +```hcl +variable "foo" { + default = "bar" +} + +variable "number" { + default = 42 +} + +variable "map" { + default = { + foo = "bar" + number = 42 + } +} +``` + +The following policy would evaluate to `true`, if no values were entered to +change these variables: + +```python +import "tfplan" + +default_foo = rule { tfplan.variables.foo is "bar" } +default_number = rule { tfplan.variables.number is "42" } +default_map_string = rule { tfplan.variables.map["foo"] is "bar" } +default_map_int = rule { tfplan.variables.map["number"] is 42 } + +main = rule { default_foo and default_number and default_map_string and default_map_int } +``` + +## Namespace: Module + +The **module namespace** can be loaded by calling +[`module()`](#function-module-) for a particular module. + +It can be used to load the following child namespaces, in addition to the values +documented below: + +- `data` - Loads the [resource namespace](#namespace-resources-data-sources), + filtered against data sources. +- `resources` - Loads the [resource + namespace](#namespace-resources-data-sources), filtered against resources. + +### Root Namespace Aliases + +The root-level `data` and `resources` keys both alias to their corresponding +namespaces within the module namespace, loaded for the root module. They are the +equivalent of running `module([]).KEY`. + +### Value: `path` + +- **Value Type:** List of strings. + +The `path` value within the [module namespace](#namespace-module) contains the +path of the module that the namespace represents. This is represented as a list +of strings. + +As an example, if the following module block was present within a Terraform +configuration: + +```hcl +module "foo" { + # ... +} +``` + +The following policy would evaluate to `true` _only_ if the diff had changes for +that module: + +```python +import "tfplan" + +main = rule { tfplan.module(["foo"]).path contains "foo" } +``` + +## Namespace: Resources/Data Sources + +The **resource namespace** is a namespace _type_ that applies to both resources +(accessed by using the `resources` namespace key) and data sources (accessed +using the `data` namespace key). + +Accessing an individual resource or data source within each respective namespace +can be accomplished by specifying the type, name, and resource number (as if the +resource or data source had a `count` value in it) in the syntax +`[resources|data].TYPE.NAME[NUMBER]`. Note that NUMBER is always needed, even if +you did not use `count` in the resource. + +In addition, each of these namespace levels is a map, allowing you to filter +based on type and name. + +-> The (somewhat strange) notation here of `TYPE.NAME[NUMBER]` may imply that +the inner resource index map is actually a list, but it's not - using the square +bracket notation over the dotted notation (`TYPE.NAME.NUMBER`) is required here +as an identifier cannot start with a number. + +Some examples of multi-level access are below: + +- To fetch all `aws_instance.foo` resource instances within the root module, you + can specify `tfplan.resources.aws_instance.foo`. This would then be indexed by + resource count index (`0`, `1`, `2`, and so on). Note that as mentioned above, + these elements must be accessed using square-bracket map notation (so `[0]`, + `[1]`, `[2]`, and so on) instead of dotted notation. +- To fetch all `aws_instance` resources within the root module, you can specify + `tfplan.resources.aws_instance`. This would be indexed from the names of + each resource (`foo`, `bar`, and so on), with each of those maps containing + instances indexed by resource count index as per above. +- To fetch all resources within the root module, irrespective of type, use + `tfplan.resources`. This is indexed by type, as shown above with + `tfplan.resources.aws_instance`, with names being the next level down, and so + on. + +~> When [resource targeting](/terraform/cli/commands/plan#resource-targeting) is in effect, `tfplan.resources` will only include the resources specified as targets for the run. This may lead to unexpected outcomes if a policy expects a resource to be present in the plan. To prohibit targeted runs altogether, ensure [`tfrun.target_addrs`](/terraform/enterprise/policy-enforcement/import-reference/tfrun#value-target_addrs) is undefined or empty. + +Further explanation of the namespace will be in the context of resources. As +mentioned, when operating on data sources, use the same syntax, except with +`data` in place of `resources`. + +### Value: `applied` + +- **Value Type:** A string-keyed map of values. + +The `applied` value within the [resource +namespace](#namespace-resources-data-sources) contains a "predicted" +representation of the resource's state post-apply. It's created by merging the +pending resource's diff on top of the existing data from the resource's state +(if any). The map is a complex representation of these values with data going +as far down as needed to represent any state values such as maps, lists, and +sets. + +As an example, given the following resource: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true` if the resource was in the diff: + +```python +import "tfplan" + +main = rule { tfplan.resources.null_resource.foo[0].applied.triggers.foo is "bar" } +``` + +-> Note that some values will not be available in the `applied` state because +they cannot be known until the plan is actually applied. In Terraform 0.11 or +earlier, these values are represented by a placeholder (the UUID value +`74D93920-ED26-11E3-AC10-0800200C9A66`) and in Terraform 0.12 or later they +are `undefined`. **In either case**, you should instead use the +[`computed`](#value-computed) key within the [diff +namespace](#namespace-resource-diff) to determine that a computed value will +exist. + +-> If a resource is being destroyed, its `applied` value is omitted from the +namespace and trying to fetch it will return undefined. + +### Value: `diff` + +- **Value Type:** A map of [diff namespaces](#namespace-resource-diff). + +The `diff` value within the [resource +namespace](#namespace-resources-data-sources) contains the diff for a particular +resource. Each key within the map links to a [diff +namespace](#namespace-resource-diff) for that particular key. + +Note that unlike the [`applied`](#value-applied) value, this map is not complex; +the map is only 1 level deep with each key possibly representing a diff for a +particular complex value within the resource. + +See the below section for more details on the diff namespace, in addition to +usage examples. + +### Value: `destroy` + +- **Value Type:** Boolean. + +The `destroy` value within the [resource +namespace](#namespace-resources-data-sources) is `true` if a resource is being +destroyed for _any_ reason, including cases where it's being deleted as part of +a resource re-creation, in which case [`requires_new`](#value-requires_new) will +also be set. + +As an example, given the following resource: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true` when `null_resource.foo` is being +destroyed: + +```python +import "tfplan" + +main = rule { tfplan.resources.null_resource.foo[0].destroy } +``` + +### Value: `requires_new` + +- **Value Type:** Boolean. + +The `requires_new` value within the [resource +namespace](#namespace-resources-data-sources) is `true` if the resource is still +present in the configuration, but must be replaced to satisfy its current diff. +Whenever `requires_new` is `true`, [`destroy`](#value-destroy) is also `true`. + +As an example, given the following resource: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true` if one of the `triggers` in +`null_resource.foo` was being changed: + +```python +import "tfplan" + +main = rule { tfplan.resources.null_resource.foo[0].requires_new } +``` + +## Namespace: Resource Diff + +The **diff namespace** is a namespace that represents the diff for a specific +attribute within a resource. For details on reading a particular attribute, +see the [`diff`](#value-diff) value in the [resource +namespace](#namespace-resources-data-sources). + +### Value: `computed` + +- **Value Type:** Boolean. + +The `computed` value within the [diff namespace](#namespace-resource-diff) is +`true` if the resource key in question depends on another value that isn't yet +known. Typically, that means the value it depends on belongs to a resource that +either doesn't exist yet, or is changing state in such a way as to affect the +dependent value so that it can't be known until the apply is complete. + +-> Keep in mind that when using `computed` with complex structures such as maps, +lists, and sets, it's sometimes necessary to test the count attribute for the +structure, versus a key within it, depending on whether or not the diff has +marked the whole structure as computed. This is demonstrated in the example +below. Count keys are `%` for maps, and `#` for lists and sets. If you are +having trouble determining the type of specific field within a resource, contact +the support team. + +As an example, given the following resource: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} + +resource "null_resource" "bar" { + triggers = { + foo_id = "${null_resource.foo.id}" + } +} +``` + +The following policy would evaluate to `true`, if the `id` of +`null_resource.foo` was currently not known, such as when the resource is +pending creation, or is being deleted and re-created: + +```python +import "tfplan" + +main = rule { tfplan.resources.null_resource.bar[0].diff["triggers.%"].computed } +``` + +### Value: `new` + +- **Value Type:** String. + +The `new` value within the [diff namespace](#namespace-resource-diff) contains +the new value of a changing attribute, _if_ the value is known at plan time. + +-> `new` will be an empty string if the attribute's value is currently unknown. +For more details on detecting unknown values, see [`computed`](#value-computed). + +Note that this value is _always_ a string, regardless of the actual type of the +value changing. [Type conversion][ref-sentinel-type-conversion] within policy +may be necessary to achieve the comparison needed. + +[ref-sentinel-type-conversion]: /sentinel/docs/language/values#type-conversion + +As an example, given the following resource: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true`, if the resource was in the diff +and each of the concerned keys were changing to new values: + +```python +import "tfplan" + +main = rule { tfplan.resources.null_resource.foo[0].diff["triggers.foo"].new is "bar" } +``` + +### Value: `old` + +- **Value Type:** String. + +The `old` value within the [diff namespace](#namespace-resource-diff) contains +the old value of a changing attribute. + +Note that this value is _always_ a string, regardless of the actual type of the +value changing. [Type conversion][ref-sentinel-type-conversion] within policy +may be necessary to achieve the comparison needed. + +If the value did not exist in the previous state, `old` will always be an empty +string. + +As an example, given the following resource: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "baz" + } +} +``` + +If that resource was previously in config as: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfplan" + +main = rule { tfplan.resources.null_resource.foo[0].diff["triggers.foo"].old is "bar" } +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfrun.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfrun.mdx new file mode 100644 index 000000000..51d03dfd0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfrun.mdx @@ -0,0 +1,320 @@ +--- +page_title: tfrun Sentinel import reference +description: >- + Use tfrun import to give Sentinel access to data associated with a Terraform + run. +source: terraform-docs-common +--- + +# tfrun Sentinel import reference + +The `tfrun` import provides access to data associated with a [Terraform run][run-glossary]. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +This import currently consists of run attributes, as well as namespaces for the `organization`, `workspace` and `cost-estimate`. Each namespace provides static data regarding the HCP Terraform application that can then be consumed by Sentinel during a policy evaluation. + + tfrun + ├── id (string) + ├── created_at (string) + ├── created_by (string) + ├── message (string) + ├── commit_sha (string) + ├── is_destroy (boolean) + ├── refresh (boolean) + ├── refresh_only (boolean) + ├── replace_addrs (array of strings) + ├── speculative (boolean) + ├── target_addrs (array of strings) + ├── project + │ ├── id (string) + │ └── name (string) + ├── variables (map of keys) + ├── organization + │ └── name (string) + ├── workspace + │ ├── id (string) + │ ├── name (string) + │ ├── created_at (string) + │ ├── description (string) + │ ├── execution_mode (string) + │ ├── auto_apply (bool) + │ ├── tags (array of strings) + | ├── tag_bindings (array of objects) + │ ├── working_directory (string) + │ └── vcs_repo (map of keys) + └── cost_estimate + ├── prior_monthly_cost (string) + ├── proposed_monthly_cost (string) + └── delta_monthly_cost (string) + +-> **Note:** When writing policies using this import, keep in mind that workspace +data is generally editable by users outside of the context of policy +enforcement. For example, consider the case of omitting the enforcement of +policy rules for development workspaces by the workspace name (allowing the +policy to pass if the workspace ends in `-dev`). While this is useful for +extremely granular exceptions, the workspace name could be edited by +workspace admins, effectively bypassing the policy. In this case, where an +extremely strict separation of policy managers vs. workspace practitioners is +required, using [policy sets](/terraform/enterprise/policy-enforcement/manage-policy-sets) +to only enforce the policy on non-development workspaces is more appropriate. + +[run-glossary]: /terraform/docs/glossary#run + +[workspace-glossary]: /terraform/docs/glossary#workspace + +## Namespace: root + +The **root namespace** contains data associated with the current run. + +### Value: `id` + +- **Value Type:** String. + +Specifies the ID that is associated with the current Terraform run. + +### Value: `created_at` + +- **Value Type:** String. + +The `created_at` value within the [root namespace](#namespace-root) specifies the time that the run was created. The timestamp returned follows the format outlined in [RFC3339](https://datatracker.ietf.org/doc/html/rfc3339). + +Users can use the `time` import to [load](/sentinel/docs/imports/time#time-load-timeish) a run timestamp and create a new timespace from the specified value. See the `time` import [documentation](/sentinel/docs/imports/time#import-time) for available actions that can be performed on timespaces. + +### Value: `created_by` + +- **Value Type:** String. + +The `created_by` value within the [root namespace](#namespace-root) is string that specifies the user name of the HCP Terraform user for the specific run. + +### Value: `message` + +- **Value Type:** String. + +Specifies the message that is associated with the Terraform run. + +The default value is _"Queued manually via the Terraform Enterprise API"_. + +### Value: `commit_sha` + +- **Value Type:** String. + +Specifies the checksum hash (SHA) that identifies the commit. + +### Value: `is_destroy` + +- **Value Type:** Boolean. + +Specifies if the plan is a destroy plan, which will destroy all provisioned resources. + +### Value: `refresh` + +- **Value Type:** Boolean. + +Specifies whether the state was refreshed prior to the plan. + +### Value: `refresh_only` + +- **Value Type:** Boolean. + +Specifies whether the plan is in refresh-only mode, which ignores configuration changes and updates state with any changes made outside of Terraform. + +### Value: `replace_addrs` + +- **Value Type:** An array of strings representing [resource addresses](/terraform/cli/state/resource-addressing). + +Provides the targets specified using the [`-replace`](/terraform/cli/commands/plan#resource-targeting) flag in the CLI or the `replace-addrs` attribute in the API. Will be null if no resource targets are specified. + +### Value: `speculative` + +- **Value Type:** Boolean. + +Specifies whether the plan associated with the run is a [speculative plan](/terraform/enterprise/run/remote-operations#speculative-plans) only. + +### Value: `target_addrs` + +- **Value Type:** An array of strings representing [resource addresses](/terraform/cli/state/resource-addressing). + +Provides the targets specified using the [`-target`](/terraform/cli/commands/plan#resource-targeting) flag in the CLI or the `target-addrs` attribute in the API. Will be null if no resource targets are specified. + +To prohibit targeted runs altogether, make sure the `target_addrs` value is null or empty: + + import "tfrun" + + main = tfrun.target_addrs is null or tfrun.target_addrs is empty + +### Value: `variables` + +- **Value Type:** A string-keyed map of values. + +Provides the names of the variables that are configured within the run and the [sensitivity](/terraform/enterprise/workspaces/variables/managing-variables#sensitive-values) state of the value. + + variables (map of keys) + └── name (string) + └── category (string) + └── sensitive (boolean) + +## Namespace: project + +The **project namespace** contains data associated with the current run's [projects](/terraform/enterprise/api-docs/projects). + +### Value: `id` + +- **Value Type:** String. + +Specifies the ID that is associated with the current project. + +### Value: `name` + +- **Value Type:** String. + +Specifies the name assigned to the HCP Terraform project. + +## Namespace: organization + +The **organization namespace** contains data associated with the current run's HCP Terraform [organization](/terraform/enterprise/users-teams-organizations/organizations). + +### Value: `name` + +- **Value Type:** String. + +Specifies the name assigned to the HCP Terraform organization. + +## Namespace: workspace + +The **workspace namespace** contains data associated with the current run's workspace. + +### Value: `id` + +- **Value Type:** String. + +Specifies the ID that is associated with the Terraform workspace. + +### Value: `name` + +- **Value Type:** String. + +The name of the workspace, which can only include letters, numbers, `-`, and `_`. + +As an example, in a workspace named `app-us-east-dev` the following policy would evaluate to `true`: + + # Enforces production rules on all non-development workspaces + + import "tfrun" + import "strings" + + # (Actual policy logic omitted) + evaluate_production_policy = rule { ... } + + main = rule when strings.has_suffix(tfrun.workspace.name, "-dev") is false { + evaluate_production_policy + } + +### Value: `created_at` + +- **Value Type:** String. + +Specifies the time that the workspace was created. The timestamp returned follows the format outlined in [RFC3339](https://datatracker.ietf.org/doc/html/rfc3339). + +Users can use the `time` import to [load](/sentinel/docs/imports/time#time-load-timeish) a workspace timestamp, and create a new timespace from the specified value. See the `time` import [documentation](/sentinel/docs/imports/time#import-time) for available actions that can be performed on timespaces. + +### Value: `description` + +- **Value Type:** String. + +Contains the description for the workspace. + +This value can be `null`. + +### Value: `auto_apply` + +- **Value Type:** Boolean. + +Contains the workspace's [auto-apply](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply) setting. + +### Value: `tags` + +- **Value Type:** Array of strings. + +Contains the list of tag names for the workspace, as well as the keys from tag bindings. + +### Value: `tag_bindings` + +- **Value Type:** Array of objects. + +Contains the complete list of tag bindings for the workspace, which includes inherited tag bindings, as well as the workspace key-only tags. Each binding has a string `key`, a nullable string `value`, as well as a boolean `inherited` properties. + + tag_bindings (array of objects) + ├── key (string) + ├── value (string or null) + └── inherited (boolean) + +### Value: `working_directory` + +- **Value Type:** String. + +Contains the configured [Terraform working directory](/terraform/enterprise/workspaces/settings#terraform-working-directory) of the workspace. + +This value can be `null`. + +### Value: `execution_mode` + +- **Value Type:** String. + +Contains the configured [Terraform execution mode](/terraform/enterprise/workspaces/settings#execution-mode) of the workspace. + +The default value is `remote`. + +### Value: `vcs_repo` + +- **Value Type:** A string-keyed map of values. + +Contains data associated with a VCS repository connected to the workspace. + +Details regarding each attribute can be found in the documentation for the HCP Terraform [Workspaces API](/terraform/enterprise/api-docs/workspaces). + +This value can be `null`. + + vcs_repo (map of keys) + ├── identifier (string) + ├── display_identifier (string) + ├── branch (string) + └── ingress_submodules (bool) + +## Namespace: cost_estimate + +The **cost_estimation namespace** contains data associated with the current run's cost estimate. + +This namespace is only present if a cost estimate is available. + +-> Cost estimation is disabled for runs using [resource targeting](/terraform/cli/commands/plan#resource-targeting), which may cause unexpected failures. + +-> **Note:** Cost estimates are not available for Terraform 0.11. + +### Value: `prior_monthly_cost` + +- **Value Type:** String. + +Contains the monthly cost estimate at the beginning of a plan. + +This value contains a positive decimal and can be `"0.0"`. + +### Value: `proposed_monthly_cost` + +- **Value Type:** String. + +Contains the monthly cost estimate if the plan were to be applied. + +This value contains a positive decimal and can be `"0.0"`. + +### Value: `delta_monthly_cost` + +- **Value Type:** String. + +Contains the difference between the prior and proposed monthly cost estimates. + +This value may contain a positive or negative decimal and can be `"0.0"`. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfstate-v2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfstate-v2.mdx new file mode 100644 index 000000000..0de4f5cbd --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfstate-v2.mdx @@ -0,0 +1,180 @@ +--- +page_title: tfstate/v2 Sentinel import +description: Use tfstate/v2 import to give Sentinel access to Terraform state. +source: terraform-docs-common +--- + +-> **Note:** This is documentation for the next version of the `tfstate` +Sentinel import, designed specifically for Terraform 0.12. This import requires +Terraform 0.12 or higher, and must currently be loaded by path, using an alias, +example: `import "tfstate/v2" as tfstate`. + +# tfstate/v2 Sentinel import + +The `tfstate/v2` import provides access to a Terraform state. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +The _state_ is the data that Terraform has recorded about a workspace at a +particular point in its lifecycle, usually after an apply. You can read more +general information about how Terraform uses state +[here](/terraform/language/state). + +-> **NOTE:** Since HCP Terraform currently only supports policy checks at plan +time, the usefulness of this import is somewhat limited, as it will usually give +you the state _prior_ to the plan the policy check is currently being run for. +Depending on your needs, you may find the +[`planned_values`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2#the-planned_values-collection) collection in +`tfplan/v2` more useful, which will give you a _predicted_ state by applying +plan data to the data found here. The one exception to this rule is _data +sources_, which will always give up to date data here, as long as the data +source could be evaluated at plan time. + +The data in the `tfstate/v2` import is sourced from the JSON configuration file +that is generated by the [`terraform show -json`](/terraform/cli/commands/show#json-output) command. For more information on +the file format, see the [JSON Output Format](/terraform/internals/json-format) +page. + +## Import Overview + +The `tfstate/v2` import is structured as currently two _collections_, keyed in +resource address and output name, respectively. + + (tfstate/v2) + ├── terraform_version (string) + ├── resources + │ └── (indexed by address) + │ ├── address (string) + │ ├── module_address (string) + │ ├── mode (string) + │ ├── type (string) + │ ├── name (string) + │ ├── index (float (number) or string) + │ ├── provider_name (string) + │ ├── values (map) + │ ├── depends_on (list of strings) + │ ├── tainted (boolean) + │ └── deposed_key (string) + └── outputs + └── (indexed by name) + ├── name (string) + ├── sensitive (boolean) + └── value (value) + +The collections are: + +- [`resources`](#the-resources-collection) - The state of all resources across + all modules in the state. +- [`outputs`](#the-outputs-collection) - The state of all outputs from the root module in the state. + +These collections are specifically designed to be used with the +[`filter`](/sentinel/docs/language/collection-operations#filter-expression) +quantifier expression in Sentinel, so that one can collect a list of resources +to perform policy checks on without having to write complex module traversal. As +an example, the following code will return all `aws_instance` resource types +within the state, regardless of what module they are in: + + all_aws_instances = filter tfstate.resources as _, r { + r.mode is "managed" and + r.type is "aws_instance" + } + +You can add specific attributes to the filter to narrow the search, such as the +module address. The following code would return resources in a module named +`foo` only: + + all_aws_instances = filter tfstate.resources as _, r { + r.module_address is "module.foo" and + r.mode is "managed" and + r.type is "aws_instance" + } + +## The `terraform_version` Value + +The top-level `terraform_version` value in this import gives the Terraform +version that recorded the state. This can be used to do version validation. + + import "tfstate/v2" as tfstate + import "strings" + + v = strings.split(tfstate.terraform_version, ".") + version_major = int(v[1]) + version_minor = int(v[2]) + + main = rule { + version_major is 12 and version_minor >= 19 + } + +-> **NOTE:** The above example will give errors when working with pre-release +versions (example: `0.12.0beta1`). Future versions of this import will include +helpers to assist with processing versions that will account for these kinds of +exceptions. + +## The `resources` Collection + +The `resources` collection is a collection representing all of the resources in +the state, across all modules. + +This collection is indexed on the complete resource address as the key. + +An element in the collection has the following values: + +- `address` - The absolute resource address - also the key for the collection's + index. + +- `module_address` - The address portion of the absolute resource address. + +- `mode` - The resource mode, either `managed` (resources) or `data` (data + sources). + +- `type` - The resource type, example: `aws_instance` for `aws_instance.foo`. + +- `name` - The resource name, example: `foo` for `aws_instance.foo`. + +- `index` - The resource index. Can be either a number or a string. + +- `provider_name` - The name of the provider this resource belongs to. This + allows the provider to be interpreted unambiguously in the unusual situation + where a provider offers a resource type whose name does not start with its own + name, such as the `googlebeta` provider offering `google_compute_instance`. + + -> **Note:** Starting with Terraform 0.13, the `provider_name` field contains the + _full_ source address to the provider in the Terraform Registry. Example: + `registry.terraform.io/hashicorp/null` for the null provider. + +- `values` - An object (map) representation of the attribute values of the + resource, whose structure depends on the resource type schema. When accessing + proposed state through the [`planned_values`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2#the-planned_values-collection) + collection of the tfplan/v2 import, unknown values will be omitted. + +- `depends_on` - The addresses of the resources that this resource depends on. + +- `tainted` - `true` if the resource has been explicitly marked as + [tainted](/terraform/cli/commands/taint) in the state. + +- `deposed_key` - Set if the resource has been marked deposed and will be + destroyed on the next apply. This matches the deposed field in the + [`resource_changes`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2#the-resource_changes-collection) + collection in the [`tfplan/v2`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) import. + +## The `outputs` Collection + +The `outputs` collection is a collection of outputs from the root module of the +state. + +Note that no child modules are included in this output set, and there is no way +to fetch child module output values. This is to encourage the correct flow of +outputs to the recommended root consumption level. + +The collection is indexed on the output name, with the following fields: + +- `name`: The name of the output, also the collection key. +- `sensitive`: Whether or not the value was marked as + [sensitive](/terraform/language/values/outputs#sensitive-suppressing-values-in-cli-output) + in + configuration. +- `value`: The value of the output. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfstate.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfstate.mdx new file mode 100644 index 000000000..42e259019 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/import-reference/tfstate.mdx @@ -0,0 +1,550 @@ +--- +page_title: tfstate Sentinel import +description: Use the tfstate import to give Sentinel access to Terraform state. +source: terraform-docs-common +--- + +# Import: tfstate + +~> **Warning:** The `tfstate` import is now deprecated and will be permanently removed in August 2025. We recommend that you start using the updated [tfstate/v2](/terraform/enterprise/policy-enforcement/import-reference/tfstate-v2) import as soon as possible to avoid disruptions. The `tfstate/v2` import offers improved functionality and is designed to better support your policy enforcement needs. + +The `tfstate` import provides access to the Terraform state. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +The _state_ is the data that Terraform has recorded about a workspace at a +particular point in its lifecycle, usually after an apply. You can read more +general information about how Terraform uses state [here][ref-tf-state]. + +[ref-tf-state]: /terraform/language/state + +-> **Note:** Since HCP Terraform currently only supports policy checks at plan +time, the usefulness of this import is somewhat limited, as it will usually give +you the state _prior_ to the plan the policy check is currently being run for. +Depending on your needs, you may find the +[`applied`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2#value-applied) collection in `tfplan` more useful, +which will give you a _predicted_ state by applying plan data to the data found +here. The one exception to this rule is _data sources_, which will always give +up to date data here, as long as the data source could be evaluated at plan +time. + +## Namespace Overview + +The following is a tree view of the import namespace. For more detail on a +particular part of the namespace, see below. + +-> Note that the root-level alias keys shown here (`data`, `outputs`, `path`, +and `resources`) are shortcuts to a [module namespace](#namespace-module) scoped +to the root module. For more details, see the section on [root namespace +aliases](#root-namespace-aliases). + + tfstate + ├── module() (function) + │ └── (module namespace) + │ ├── path ([]string) + │ ├── data + │ │ └── TYPE.NAME[NUMBER] + │ │ ├── attr (map of keys) + │ │ ├── depends_on ([]string) + │ │ ├── id (string) + │ │ └── tainted (boolean) + │ ├── outputs (root module only in TF 0.12 or later) + │ │ └── NAME + │ │ ├── sensitive (bool) + │ │ ├── type (string) + │ │ └── value (value) + │ └── resources + │ └── TYPE.NAME[NUMBER] + │ ├── attr (map of keys) + │ ├── depends_on ([]string) + │ ├── id (string) + │ └── tainted (boolean) + │ + ├── module_paths ([][]string) + ├── terraform_version (string) + │ + ├── data (root module alias) + ├── outputs (root module alias) + ├── path (root module alias) + └── resources (root module alias) + +## Namespace: Root + +The root-level namespace consists of the values and functions documented below. + +In addition to this, the root-level `data`, `outputs`, `path`, and `resources` +keys alias to their corresponding namespaces or values within the [module +namespace](#namespace-module). + +### Function: `module()` + + module = func(ADDR) + +- **Return Type:** A [module namespace](#namespace-module). + +The `module()` function in the [root namespace](#namespace-root) returns the +[module namespace](#namespace-module) for a particular module address. + +The address must be a list and is the module address, split on the period (`.`), +excluding the root module. + +Hence, a module with an address of simply `foo` (or `root.foo`) would be +`["foo"]`, and a module within that (so address `foo.bar`) would be read as +`["foo", "bar"]`. + +[`null`][ref-null] is returned if a module address is invalid, or if the module +is not present in the state. + +[ref-null]: /sentinel/docs/language/spec#null + +As an example, given the following module block: + +```hcl +module "foo" { + # ... +} +``` + +If the module contained the following content: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true` if the resource was present in +the state: + +```python +import "tfstate" + +main = rule { tfstate.module(["foo"]).resources.null_resource.foo[0].attr.triggers.foo is "bar" } +``` + +### Value: `module_paths` + +- **Value Type:** List of a list of strings. + +The `module_paths` value within the [root namespace](#namespace-root) is a list +of all of the modules within the Terraform state at plan-time. + +Modules not present in the state will not be present here, even if they are +present in the configuration or the diff. + +This data is represented as a list of a list of strings, with the inner list +being the module address, split on the period (`.`). + +The root module is included in this list, represented as an empty inner list, as +long as it is present in state. + +As an example, if the following module block was present within a Terraform +configuration: + +```hcl +module "foo" { + # ... +} +``` + +The value of `module_paths` would be: + + [ + [], + ["foo"], + ] + +And the following policy would evaluate to `true`: + +```python +import "tfstate" + +main = rule { tfstate.module_paths contains ["foo"] } +``` + +-> Note the above example only applies if the module is present in the state. + +#### Iterating Through Modules + +Iterating through all modules to find particular resources can be useful. This +[example][iterate-over-modules] shows how to use `module_paths` with the +[`module()` function](#function-module-) to find all resources of a +particular type from all modules using the `tfplan` import. By changing `tfplan` +in this function to `tfstate`, you could make a similar function find all +resources of a specific type in the current state. + +[iterate-over-modules]: /terraform/enterprise/policy-enforcement/sentinel#sentinel-imports + +### Value: `terraform_version` + +- **Value Type:** String. + +The `terraform_version` value within the [root namespace](#namespace-root) +represents the version of Terraform in use when the state was saved. This can be +used to enforce a specific version of Terraform in a policy check. + +As an example, the following policy would evaluate to `true` as long as the +state was made with a version of Terraform in the 0.11.x series, excluding any +pre-release versions (example: `-beta1` or `-rc1`): + +```python +import "tfstate" + +main = rule { tfstate.terraform_version matches "^0\\.11\\.\\d+$" } +``` + +-> **NOTE:** This value is also available via the [`tfplan`](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) +import, which will be more current when a policy check is run against a plan. +It's recommended you use the value in `tfplan` until HCP Terraform +supports policy checks in other stages of the workspace lifecycle. See the +[`terraform_version`][import-tfplan-terraform-version] reference within the +`tfplan` import for more details. + +[import-tfplan-terraform-version]: /terraform/enterprise/policy-enforcement/import-reference/tfplan-v2#value-terraform_version + +## Namespace: Module + +The **module namespace** can be loaded by calling +[`module()`](#function-module-) for a particular module. + +It can be used to load the following child namespaces, in addition to the values +documented below: + +- `data` - Loads the [resource namespace](#namespace-resources-data-sources), + filtered against data sources. +- `outputs` - Loads the [output namespace](#namespace-outputs), which supply the + outputs present in this module's state. Note that with Terraform 0.12 or + later, this value is only available for the root namespace. +- `resources` - Loads the [resource + namespace](#namespace-resources-data-sources), filtered against resources. + +### Root Namespace Aliases + +The root-level `data`, `outputs`, and `resources` keys both alias to their +corresponding namespaces within the module namespace, loaded for the root +module. They are the equivalent of running `module([]).KEY`. + +### Value: `path` + +- **Value Type:** List of strings. + +The `path` value within the [module namespace](#namespace-module) contains the +path of the module that the namespace represents. This is represented as a list +of strings. + +As an example, if the following module block was present within a Terraform +configuration: + +```hcl +module "foo" { + # ... +} +``` + +The following policy would evaluate to `true`, _only_ if the module was present +in the state: + +```python +import "tfstate" + +main = rule { tfstate.module(["foo"]).path contains "foo" } +``` + +## Namespace: Resources/Data Sources + +The **resource namespace** is a namespace _type_ that applies to both resources +(accessed by using the `resources` namespace key) and data sources (accessed +using the `data` namespace key). + +Accessing an individual resource or data source within each respective namespace +can be accomplished by specifying the type, name, and resource number (as if the +resource or data source had a `count` value in it) in the syntax +`[resources|data].TYPE.NAME[NUMBER]`. Note that NUMBER is always needed, even if +you did not use `count` in the resource. + +In addition, each of these namespace levels is a map, allowing you to filter +based on type and name. + +-> The (somewhat strange) notation here of `TYPE.NAME[NUMBER]` may imply that +the inner resource index map is actually a list, but it's not - using the square +bracket notation over the dotted notation (`TYPE.NAME.NUMBER`) is required here +as an identifier cannot start with number. + +Some examples of multi-level access are below: + +- To fetch all `aws_instance.foo` resource instances within the root module, you + can specify `tfstate.resources.aws_instance.foo`. This would then be indexed + by resource count index (`0`, `1`, `2`, and so on). Note that as mentioned + above, these elements must be accessed using square-bracket map notation (so + `[0]`, `[1]`, `[2]`, and so on) instead of dotted notation. +- To fetch all `aws_instance` resources within the root module, you can specify + `tfstate.resources.aws_instance`. This would be indexed from the names of + each resource (`foo`, `bar`, and so on), with each of those maps containing + instances indexed by resource count index as per above. +- To fetch all resources within the root module, irrespective of type, use + `tfstate.resources`. This is indexed by type, as shown above with + `tfstate.resources.aws_instance`, with names being the next level down, and so + on. + +Further explanation of the namespace will be in the context of resources. As +mentioned, when operating on data sources, use the same syntax, except with +`data` in place of `resources`. + +### Value: `attr` + +- **Value Type:** A string-keyed map of values. + +The `attr` value within the [resource +namespace](#namespace-resources-data-sources) is a direct mapping to the state +of the resource. + +The map is a complex representation of these values with data going as far down +as needed to represent any state values such as maps, lists, and sets. + +As an example, given the following resource: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true` if the resource was in the state: + +```python +import "tfstate" + +main = rule { tfstate.resources.null_resource.foo[0].attr.triggers.foo is "bar" } +``` + +### Value: `depends_on` + +- **Value Type:** A list of strings. + +The `depends_on` value within the [resource +namespace](#namespace-resources-data-sources) contains the dependencies for the +resource. + +This is a list of full resource addresses, relative to the module (example: +`null_resource.foo`). + +As an example, given the following resources: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} + +resource "null_resource" "bar" { + # ... + + depends_on = [ + "null_resource.foo", + ] +} +``` + +The following policy would evaluate to `true` if the resource was in the state: + +```python +import "tfstate" + +main = rule { tfstate.resources.null_resource.bar[0].depends_on contains "null_resource.foo" } +``` + +### Value: `id` + +- **Value Type:** String. + +The `id` value within the [resource +namespace](#namespace-resources-data-sources) contains the id of the resource. + +-> **NOTE:** The example below uses a _data source_ here because the +[`null_data_source`][ref-tf-null-data-source] data source gives a static ID, +which makes documenting the example easier. As previously mentioned, data +sources share the same namespace as resources, but need to be loaded with the +`data` key. For more information, see the +[synopsis](#namespace-resources-data-sources) for the namespace itself. + +[ref-tf-null-data-source]: https://registry.terraform.io/providers/hashicorp/null/latest/docs/data-sources/data_source + +As an example, given the following data source: + +```hcl +data "null_data_source" "foo" { + # ... +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfstate" + +main = rule { tfstate.data.null_data_source.foo[0].id is "static" } +``` + +### Value: `tainted` + +- **Value Type:** Boolean. + +The `tainted` value within the [resource +namespace](#namespace-resources-data-sources) is `true` if the resource is +marked as tainted in Terraform state. + +As an example, given the following resource: + +```hcl +resource "null_resource" "foo" { + triggers = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true`, if the resource was marked as +tainted in the state: + +```python +import "tfstate" + +main = rule { tfstate.resources.null_resource.foo[0].tainted } +``` + +## Namespace: Outputs + +The **output namespace** represents all of the outputs present within a +[module](#namespace-module). Outputs are present in a state if they were saved +during a previous apply, or if they were updated with known values during the +pre-plan refresh. + +**With Terraform 0.11 or earlier** this can be used to fetch both the outputs +of the root module, and the outputs of any module in the state below the root. +This makes it possible to see outputs that have not been threaded to the root +module. + +**With Terraform 0.12 or later** outputs are available in the top-level (root +module) namespace only and not accessible within submodules. + +This namespace is indexed by output name. + +### Value: `sensitive` + +- **Value Type:** Boolean. + +The `sensitive` value within the [output namespace](#namespace-outputs) is +`true` when the output has been [marked as sensitive][ref-tf-sensitive-outputs]. + +[ref-tf-sensitive-outputs]: /terraform/language/values/outputs#sensitive-suppressing-values-in-cli-output + +As an example, given the following output: + +```hcl +output "foo" { + sensitive = true + value = "bar" +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfstate" + +main = rule { tfstate.outputs.foo.sensitive } +``` + +### Value: `type` + +- **Value Type:** String. + +The `type` value within the [output namespace](#namespace-outputs) gives the +output's type. This will be one of `string`, `list`, or `map`. These are +currently the only types available for outputs in Terraform. + +As an example, given the following output: + +```hcl +output "string" { + value = "foo" +} + +output "list" { + value = [ + "foo", + "bar", + ] +} + +output "map" { + value = { + foo = "bar" + } +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfstate" + +type_string = rule { tfstate.outputs.string.type is "string" } +type_list = rule { tfstate.outputs.list.type is "list" } +type_map = rule { tfstate.outputs.map.type is "map" } + +main = rule { type_string and type_list and type_map } +``` + +### Value: `value` + +- **Value Type:** String, list, or map. + +The `value` value within the [output namespace](#namespace-outputs) is the value +of the output in question. + +Note that the only valid primitive output type in Terraform is currently a +string, which means that any int, float, or boolean value will need to be +converted before it can be used in comparison. This does not apply to primitives +within maps and lists, which will be their original types. + +As an example, given the following output blocks: + +```hcl +output "foo" { + value = "bar" +} + +output "number" { + value = "42" +} + +output "map" { + value = { + foo = "bar" + number = 42 + } +} +``` + +The following policy would evaluate to `true`: + +```python +import "tfstate" + +value_foo = rule { tfstate.outputs.foo.value is "bar" } +value_number = rule { int(tfstate.outputs.number.value) is 42 } +value_map_string = rule { tfstate.outputs.map.value["foo"] is "bar" } +value_map_int = rule { tfstate.outputs.map.value["number"] is 42 } + +main = rule { value_foo and value_number and value_map_string and value_map_int } +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/index.mdx new file mode 100644 index 000000000..7a53f5ced --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/index.mdx @@ -0,0 +1,50 @@ +--- +page_title: Terraform Enterprise policy enforcement overview +description: >- + Policies are rules for provisioning infrastructure that you can use to + validate Terraform plans. Learn how to use Sentinel and OPA to enforce + policies. +source: terraform-docs-common +--- + +# HCP Terraform policy enforcement overview + +This topic provides overview information about policies in HCP Terraform. Policies are rules for Terraform runs that let you validate that Terraform plans comply with security rules and best practices. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +> **Hands-on:** Try the [Enforce Policy with Sentinel](/terraform/tutorials/policy) and [Detect Infrastructure Drift and Enforce OPA Policies](/terraform/tutorials/cloud/drift-and-opa) tutorials. + +## Introduction + +You can implement policies that check for any number of conditions, such as whether infrastructure configuration adheres to security standards or best practices. For example, you may want to write a policy to check whether Terraform plans to deploy production infrastructure to the correct region. + +You can also use policies to enforce standards for your organization’s workflows. For example, you could write a policy to prevent new infrastructure deployments on Fridays, reducing the risk of production incidents outside of your team’s working hours. + +## Workflow + +The following workflow describes how to create and manage policies manually. + +### Define policy + +You can use either the Sentinel or OPA framework to create custom policies. You can also copy pre-written Sentinel policies created and maintained by HashiCorp. + +### Create and apply policy sets + +Policy sets are collections of policies you can apply globally or to specific [projects](/terraform/enterprise/projects/manage) and workspaces in your organization. For each run in the selected workspaces, HCP Terraform checks the Terraform plan against the policy set. + +You can also exclude specific workspaces from global or project-scoped policy sets. HCP Terraform won't enforce a policy set's policies on any runs in an excluded workspace. For example, if you attach a policy set to a project and then exclude one of the project's workspaces from that policy set, HCP Terraform will not enforce the policy set on the excluded workspace. + +You can create policy sets from the [user interface](/terraform/enterprise/policy-enforcement/manage-policy-sets#create-policy-sets), the API, or by connecting HCP Terraform to your version control system. A policy set can only contain policies written in a single policy framework, but you can add Sentinel or OPA policy sets to the same workspace. + +Refer to [Managing Policy Sets](/terraform/enterprise/policy-enforcement/manage-policy-sets) for details. + +### Review policy results + +The HCP Terraform UI displays policy results for each policy set you apply to the workspace. Depending on their [enforcement level](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-enforcement-levels), failed policies can stop the run. You can override failed policies with the right permissions. + +Refer to [Policy Results](/terraform/enterprise/policy-enforcement/view-results) for details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx new file mode 100644 index 000000000..c5cf8a8a8 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/index.mdx @@ -0,0 +1,219 @@ +--- +page_title: Manage policies and policy sets in Terraform Enterprise +description: >- + Learn how to create and manage policies and policy sets in Terraform + Enterprise. +source: terraform-docs-common +--- + +# Manage policies and policy sets in HCP Terraform + +Policies are rules that HCP Terraform enforces on Terraform runs. You can define policies using either the [Sentinel](/terraform/enterprise/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Policy sets are collections of policies you can apply globally or to specific [projects](/terraform/enterprise/projects/manage) and workspaces in your organization. For each run in the applicable workspaces, HCP Terraform checks the Terraform plan against the policy set. Depending on the [enforcement level](#policy-enforcement-levels), failed policies can stop a run in a workspace. If you do not want to enforce a policy set on a specific workspace, you can exclude the workspace from that set. + +## Permissions + +To view and manage policies and policy sets, you must have [manage policy permissions](/terraform/enterprise/users-teams-organizations/permissions#manage-policies) for your organization. + +## Policy checks versus policy evaluations + +Policy checks and evaluations can access different types of data and enable slightly different workflows. + +### Policy checks + +Only Sentinel policies can run as policy checks. Checks can access cost estimation data but can only use the latest version of Sentinel. + +~> **Warning:** Policy checks are deprecated and will be permanently removed in August 2025. We recommend that you start using policy evaluations to avoid disruptions. + +### Policy evaluations + +OPA policy sets can only run as policy evaluations, and you can enable policy evaluations for Sentinel policy sets by selecting the `Agent` policy set type. Policy evaluations run within the [HCP Terraform agent](/terraform/cloud-docs/agents) in HCP Terraform's infrastructure. + +For Sentinel policy sets, using policy evaluations lets you: + +- Enable overrides for soft-mandatory and hard-mandatory policies, letting any user with [Manage Policy Overrides permission](/terraform/enterprise/users-teams-organizations/permissions#manage-policy-overrides) proceed with a run in the event of policy failure. +- Select a specific Sentinel runtime version for the policy set. + +Policy evaluations **cannot** access cost estimation data, so use policy checks if your policies rely on cost estimates. + +~> **Tip:** Sentinel runtime version pinning is supported only for Sentinel 0.23.1 and above, as well as HCP Terraform agent versions 1.13.1 and above + +## Policy enforcement levels + +You can set an enforcement level for each policy that determines what happens when a Terraform plan does not pass the policy rule. Sentinel and OPA policies have different enforcement levels available. + +### Sentinel + +Sentinel provides three policy enforcement levels: + +- **advisory:** Failed policies never interrupt the run. They provide information about policy check failures in the UI. +- **soft mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/enterprise/users-teams-organizations/permissions#manage-policy-overrides) can override these failures and allow the run to complete. +- **hard mandatory:** Failed policies stop the run. Terraform does not apply runs with failed **hard mandatory** policies until a user fixes the issue that caused the failure. + +### OPA + +OPA provides two policy enforcement levels: + +- **advisory** Failed policies never interrupt the run. They provide information about policy failures in the UI. +- **mandatory:** Failed policies stop the run, but any user with [Manage Policy Overrides permission](/terraform/enterprise/users-teams-organizations/permissions#manage-policy-overrides) can override these failures and allow the run to complete. + +## Policy publishing workflows + +You can create policies and policy sets for your HCP Terraform organization in one of three ways: + +- **HCP Terraform web UI:** Add individually-managed policies manually in the HCP Terraform UI, and store your policy code in HCP Terraform. This workflow is ideal for initial experimentation with policy enforcement, but we do not recommend it for organizations with large numbers of policies. +- **Version control:** Connect HCP Terraform to a version control repository containing a policy set. When you push changes to the repository, HCP Terraform automatically uses the updated policy set. +- **Automated:** Push versions of policy sets to HCP Terraform with the [HCP Terraform Policy Sets API](/terraform/enterprise/api-docs/policy-sets#create-a-policy-set-version) or the `tfe` provider [`tfe_policy_set`](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/policy_set) resource. This workflow is ideal for automated Continuous Integration and Deployment (CI/CD) pipelines. + +### Manage individual policies in the web UI + +You can add policies directly to HCP Terraform using the web UI. This process requires you to paste completed, valid Sentinel or Rego code into the UI. We recommend validating your policy code before adding it to HCP Terraform. + +#### Add managed policies + +To add an individually managed policy: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to add policies to. +2. Choose **Settings** from the sidebar, then **Policies**. A list of managed policies in HCP Terraform appears. Each policy designates its policy framework (Sentinel or OPA) and associated policy sets. +3. Click **Create a new policy**. +4. Choose the **Policy framework** you want to use. You can only create a policy set from policies written using the same framework. You cannot change the framework type after you create the policy. +5. Complete the following fields to define the policy: + - **Policy Name:** Add a name containing letters, numbers, `-`, and `_`. HCP Terraform displays this name in the UI. The name must be unique within your organization. + - **Description:** Describe the policy’s purpose. The description supports Markdown rendering, and HCP Terraform displays this text in the UI. + - **Enforcement mode:** Choose whether this policy can stop Terraform runs and whether users can override it. Refer to [policy enforcement levels](#policy-enforcement-levels) for more details. + - **(OPA Only) Query:** Write a query to identify a specific policy rule within your rego code. HCP Terraform uses this query to determine the result of the policy. The query is typically a combination of the policy package name and rule name, such as `terraform.deny`. The result of this query must be an array. The policy passes when the array is empty. + - **Policy code**: Paste the code for the policy: either Sentinel code or Rego code for OPA policies. The UI provides syntax highlighting for the policy language. + - **(Optional) Policy sets:** Select one or more existing managed policy sets where you want to add the new policy. You can only select policy sets compatible with the chosen policy set framework. If there are no policy sets available, you can [create a new one](#create-policy-sets). + +The policy is now available in the HCP Terraform UI for you to edit and add to one or more policy sets. + +#### Edit managed policies + +To edit a managed policy: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to edit policies for. +2. Choose **Settings** from the sidebar, then **Policies**. +3. Click the policy you want to edit to go to its details page. +4. Edit the policy's fields and then click **Update policy**. + +#### Delete managed policies + +~> **Warning:** Deleting a policy that applies to an active run causes that run’s policy evaluation stage to error. We recommend warning other members of your organization before you delete widely used policies. + +You can not restore policies after deletion. You must manually re-add them to HCP Terraform. You may want to save the policy code in a separate location before you delete the policy. + +To delete a managed policy: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to delete a policy in. +2. Choose **Settings** from the sidebar, then **Policies**. +3. Click the policy you want to delete to go to its details page. +4. Click **Delete policy** and then click **Yes, delete policy** to confirm. + +The policy no longer appears in HCP Terraform and in any associated policy sets. + +## Manage policy sets + +Policy sets are collections of policies that you can apply globally or to specific [projects](/terraform/enterprise/projects/manage) and workspaces. + +To view and manage policy sets, go to the **Policy Sets** section of your organization’s settings. This page contains all of the policy sets available in the organization, including those added through the API. + +The way you set up and configure a new policy set depends on your workflow and where you store policies. + +- For [managed policies](#managed-policies), you use the UI to create a policy set and add managed policies. +- For policy sets in a version control system, you use the UI to create a policy set connected to that repository. HCP Terraform automatically refreshes the policy set when you change relevant files in that repository. Version control policy sets have specific organization and formatting requirements. Refer to [Sentinel VCS Repositories](/terraform/enterprise/policy-enforcement/sentinel/vcs) and [OPA VCS Repositories](/terraform/enterprise/policy-enforcement/opa/vcs) for details. +- For automated workflows like continuous deployment, you can use the UI to create an empty policy set and then use the [Policy Sets API](/terraform/enterprise/api-docs/policy-sets) to add policies. You can also use the API or the [`tfe` provider (Sentinel Only)](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/policy_set) to add an entire, packaged policy set. + +### Create policy sets + +To create a policy set: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to create a policy set in. + +2. Choose **Settings** from the sidebar, then **Policies**. + +3. Click **Connect a new policy set**. + +4. Choose your workflow. + - For managed policies, click **create a policy set with individually managed policies**. HCP Terraform shows a form to create a policy set and add individually managed policies. + - For version control policies, choose a version control provider and then select the repository with your policy set. HCP Terraform shows a form to create a policy set connected to that repository. + - For automated workflows, click **No VCS Connection**. HCP Terraform shows a form to create an empty policy set. You can use the API to add policies to this empty policy set later. + +5. Choose a **Policy framework** for the policies you want to add. A policy set can only contain policies that use the same framework (OPA or Sentinel). You cannot change a policy set's framework type after creation. + +6. Choose a policy set scope: + - **Policies enforced globally:** HCP Terraform automatically enforces this global policy set on all of an organization's existing and future workspaces. + - **Policies enforced on selected projects and workspaces:** Use the text fields to find and select the workspaces and projects to enforce this policy set on. This affects all current and future workspaces for any chosen projects. + +7. **(Optional)** Add **Policy exclusions** for this policy set. Specify any workspaces in the policy set's scope that HCP Terraform will not enforce this policy set on. + +8. **(Sentinel Only)** Choose a policy set type: + - **Standard:** This is the default workflow. A Sentinel policy set uses a [policy check](#policy-checks) in HCP Terraform and lets you access cost estimation data. + - **Agent:** A Sentinel policy set uses a [policy evaluation](#policy-evaluations) in HCP Terraform. This lets you enable policy overrides and enforce a Sentinel runtime version + +9. **(OPA Only)** Select a **Runtime version** for this policy set. + +10. **(OPA Only)** Allow **Overrides**, which enables users with override policy permissions to apply plans that have [mandatory policy](#policy-enforcement-levels) failures. + +11. **(VCS Only)** Optionally specify the **VCS branch** within your VCS repository where HCP Terraform should import new versions of policies. If you do not set this field, HCP Terraform uses your selected VCS repository's default branch. + +12. **(VCS Only)** Specify where your policy set files live using the **Policies path**. This lets you maintain multiple policy sets within a single repository. Use a relative path from your root directory to the directory that contains either the `sentinel.hcl` (Sentinel) or `policies.hcl` (OPA) configuration files. If you do not set this field, HCP Terraform uses the repository's root directory. + +13. **(Managed Policies Only)** Select managed **Policies** to add to the policy set. You can only add policies written with the same policy framework you selected for this set. + +14. Choose a descriptive and unique **Name** for the policy set. You can use any combination of letters, numbers, `-`, and `_`. + +15. Write an optional **Description** that tells other users about the purpose of the policy set and what it contains. + +### Edit policy sets + +To edit a policy set: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to edit a policy set in. +2. Choose **Settings** from the sidebar, then **Policies**. +3. Click the policy set you want to edit to go to its settings page. +4. Adjust the settings and click **Update policy set**. + +### Evaluate a policy runtime upgrade + +You can validate that changing a policy runtime version does not introduce any breaking changes. + +To perform a policy evaluation: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to your organization. +2. Choose **Settings** from the sidebar, then **Policies** in your organization’s settings. +3. Click the policy set you want to upgrade. +4. Click the **Evaluate** tab. +5. Select the **Runtime version** you wish to upgrade to. +6. Select a **Workspace** to test the policy and upgraded version against. +7. Click **Evaluate**. + +HCP Terraform will execute the policy set using the specified version and the latest plan data for the selected workspace. It will display the evaluation results. If the evaluation returns a `Failed` status, inspect the JSON output to determine whether the issue is related to a non-compliant resource or is due to a syntax issue. +If the evaluation results in an error, check that the policy configuration is valid. + +### Delete policy sets + +~> **Warning:** Deleting a policy set that applies to an active run causes that run’s policy evaluation stage to error. We recommend warning other members of your organization before you delete widely used policy sets. + +You can not restore policy sets after deletion. You must manually re-add them to HCP Terraform. + +To delete a policy set: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to delete a policy set in. +2. Choose **Settings** from the sidebar, then **Policies** in your organization’s settings. +3. Click the policy set you want to delete to go to its details page. +4. Click **Delete policy** and then click **Yes, delete policy set** to confirm. + +The policy set no longer appears on the UI and HCP Terraform no longer applies it to any workspaces. For managed policy sets, all of the individual policies are still available in HCP Terraform. You must delete each policy individually to remove it from your organization. + +### (Sentinel only) Sentinel parameters + +[Sentinel parameters](/sentinel/docs/language/parameters) are a list of key/value pairs that HCP Terraform sends to the Sentinel runtime when performing policy checks on workspaces. If the value parses as JSON, HCP Terraform sends it to Sentinel as the corresponding type (string, boolean, integer, map, or list). If the value fails JSON validation, HCP Terraform sends it as a string. + +You can set Sentinel parameters when you [edit a policy set](#edit-policy-sets). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/opa-vcs.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/opa-vcs.mdx new file mode 100644 index 000000000..adb5027c9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/opa-vcs.mdx @@ -0,0 +1,48 @@ +--- +page_title: Configure an OPA policy set with a VCS repository +description: Use a VCS repository to configure an OPA policy set in Terraform Enterprise. +source: terraform-docs-common +--- + +# Configure an OPA policy set with a VCS repository + +To enable policy enforcement, you must group OPA policies into policy sets and apply those policy sets globally or to specific [projects](/terraform/enterprise/projects/manage) and workspaces. + +> **Hands-on:** Try the [Detect Infrastructure Drift and Enforce OPA Policies](/terraform/tutorials/cloud/drift-and-opa) tutorial. + +One way to create policy sets is by connecting HCP Terraform to a version control repository. When you push changes to the repository, HCP Terraform automatically uses the updated policy set. Refer to [Managing Policy Sets](/terraform/enterprise/policy-enforcement/manage-policy-sets) for more details. + +An OPA policy set repository contains a HashiCorp Configuration Language (HCL) configuration file and policy files. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +## Configuration File + +The root directory of your policy set repository must contain a configuration file named either `policies.hcl` or `policies.json`. Policy enforcement supports both HCL and the JSON variant of HCL syntax. +The configuration file contains one or more `policy` blocks that define each policy in the policy set. Unlike Sentinel, OPA policies do not need to be in separate files. You use an [OPA query](/terraform/enterprise/policy-enforcement/opa#opa-query) to identify each policy rule. + +The following example uses a query to define a policy named `policy1`. This query may evaluate across multiple files, or a single file. + +```hcl +policy "policy1" { + query = "data.terraform.policy1.deny" +} +``` + +Optionally, you can also provide a `description` and an `enforcement_level` property. If you do not specify an enforcement level, HCP Terraform uses `advisory`, meaning policy failures produce warnings but do not block Terraform runs. Refer to [Policy Enforcement Levels](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-enforcement-levels) for more details. + +```hcl +policy "policy1" { + query = "data.terraform.policy1.deny" + enforcement_level = "mandatory" + description = "policy1 description" +} +``` + +## Policy Code Files + +All Rego policy files must end with `.rego` and exist in the local GitHub repository for the policy set. You can store them in separate directories from the configuration file. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs.mdx new file mode 100644 index 000000000..3bb8a8157 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs.mdx @@ -0,0 +1,139 @@ +--- +page_title: Configure a Sentinel policy set with a VCS repository +description: >- + Use a VCS repository to configure a Sentinel policy set in Terraform + Enterprise. +source: terraform-docs-common +--- + +# Configure a Sentinel policy set with a VCS repository + +To enable policy enforcement, you must group Sentinel policies into policy sets. You can then apply those policy sets globally or to specific [projects](/terraform/enterprise/projects/manage) and workspaces. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +One way to create policy sets is by connecting HCP Terraform to a version control repository. When you push changes to the repository, HCP Terraform automatically uses the updated policy set. Refer to [Managing Policy Sets](/terraform/enterprise/policy-enforcement/manage-policy-sets) for more details. + +A Sentinel policy set repository contains a Sentinel configuration file, policy files, and module files. + +## Configuration File + +Your repository must contain a configuration file named `sentinel.hcl` that defines the following features of the policy set: + +- Each policy included in the set. The policy name must match the names of individual [policy code files](#policy-code-files) exactly. HCP Terraform ignores policy files in the repository that are not listed in the configuration file. For each policy, the configuration file must designate the policy’s [enforcement level](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-enforcement-levels) and [source](#policy-source). +- [Terraform modules](#modules) that policies in the set need to access. + +The following example shows a portion of a `sentinel.hcl` configuration file that defines a policy named `terraform-maintenance-windows`. The policy has a `hard-mandatory` enforcement level, meaning that it can block Terraform runs when it fails and users cannot override it. + +```hcl +policy "terraform-maintenance-windows" { + source = "./terraform-maintenance-windows.sentinel" + enforcement_level = "hard-mandatory" +} +``` + +To configure a module, add a `module` entry to your `sentinel.hcl` file. The following example adds a module called `timezone`. + +```hcl +module "timezone" { + source = "./modules/timezone.sentinel" +} +``` + +The repositories for [policy libraries on the Terraform Registry](https://registry.terraform.io/browse/policies) contain more examples. + +## Policy Code Files + +Define each Sentinel policy in a separate file within your repository. All local policy files must reside in the same directory as the `sentinel.hcl` configuration file and end with the `.sentinel` suffix. + +### Policy Source + +A policy's `source` field can either reference a file within the policy repository, or it can reference a remote source. For example, the configuration could reference a policy from HashiCorp's [foundational policies library](https://github.com/hashicorp/terraform-foundational-policies-library). Sentinel only supports HTTP and HTTPS remote sources. + +To specify a local source, prefix the `source` with a `./`, or `../`. The following example shows how to reference a local source policy called `terraform-maintenance-windows.sentinel`. + +```hcl +policy "terraform-maintenance-windows" { + source = "./terraform-maintenance-windows.sentinel" + enforcement_level = "hard-mandatory" +} +``` + +To specify a remote source, supply the URL as the `source`. The following example references a policy from HashiCorp's foundational policies library. + +```hcl +policy "deny-public-ssh-nsg-rules" { + source = "https://registry.terraform.io/v2/policies/hashicorp/azure-networking-terraform/1.0.2/policy/deny-public-ssh-nsg-rules.sentinel?checksum=sha256:75c95bf1d6eb48153cb31f15c49c237bf7829549beebe20effa07bcdd3f3cb74" + enforcement_level = "advisory" +} +``` + +For GitHub, you must use the URL of the raw policy content. Other URL types cause HCP Terraform to error when checking the policy. For example, do not use `https://github.com/hashicorp/policy-library-azure-networking-terraform/blob/main/policies/deny-public-ssh-nsg-rules/deny-public-ssh-nsg-rules.sentinel`. + +To access the raw URL, open the Sentinel file in your Github repository, right-click **Raw** on the top right of the page, and save the link address. + +### Example Policy + +The following example policy uses the `time` and `tfrun` imports and a custom `timezone` module to do the following tasks: + +1. Load the time when the Terraform run occurred +2. Convert the loaded time with the correct offset using the [Timezone API](https://timezoneapi.io/) +3. Verify that the provisioning operation occurs only on a specific day + +The example policy also uses a [rule expression](/sentinel/docs/language/spec#rule-expressions) with the `when` predicate. If the value of `tfrun.workspace.auto_apply` is false, the rule is not evaluated and returns true. + +Finally, the example uses parameters to facilitate module reuse within Terraform. Refer to the [Sentinel parameter documentation](/sentinel/docs/language/parameters) for details. + +```hcl +import "time" +import "tfrun" +import "timezone" + +param token default "WbNKULOBheqV" +param maintenance_days default ["Friday", "Saturday", "Sunday"] +param timezone_id default "America/Los_Angeles" + +tfrun_created_at = time.load(tfrun.created_at) + +supported_maintenance_day = rule when tfrun.workspace.auto_apply is true { + tfrun_created_at.add(time.hour * timezone.offset(timezone_id, token)).weekday_name in maintenance_days +} + +main = rule { + supported_maintenance_day +} +``` + +To expand the policy, you could use the [time.hour](/sentinel/docs/imports/time#time-hour) function to also restrict provisioning to specific times of day. + +## Modules + +HCP Terraform supports [Sentinel modules](/sentinel/docs/extending/modules). Modules let you write reusable policy code that you can import and use within several policies at once. + +You can store modules locally or retrieve them from a remote HTTP or HTTPS source. + +-> **Note:** We recommend reviewing [Sentinel runtime's modules documentation](/sentinel/docs/extending/modules) to learn how to use modules within Sentinel. However, the configuration examples in the runtime documentation are relevant to the Sentinel CLI and not HCP Terraform. + +The following example module loads the code at `./modules/timezone.sentinel` relative to the policy set working directory. Other modules can access this code with the statement `import "timezone"`. + +```hcl +import "http" +import "json" +import "decimal" + +httpGet = func(id, token){ + uri = "https://timezoneapi.io/api/timezone/?" + id + "&token=" + token + request = http.get(uri) + return json.unmarshal(request.body) +} + +offset = func(id, token) { + tz = httpGet(id, token) + offset = decimal.new(tz.data.datetime.offset_hours).int + return offset +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/prewritten-library.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/prewritten-library.mdx new file mode 100644 index 000000000..fc023061d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/prewritten-library.mdx @@ -0,0 +1,26 @@ +--- +page_title: Pre-written policy library +description: >- + HashiCorp authors and maintains a library of pre-written Sentinel policies + that enforce CIS and other compliance standards. Learn about the available + pre-written policies. +source: terraform-docs-common +--- + +# Pre-written policy library reference + +This topic provides reference information about the Sentinel policy libraries that HashiCorp authors and maintains. For instructions on how to run the policy libraries, refer to [Run pre-written Sentinel policies ](/terraform/enterprise/policy-enforcement/prewritten-sentinel). + +## Center for Internet Security (CIS) + +The Center for Internet Security (CIS) is a non-profit organization that publishes standards for configuring secure cloud services. Refer to the [CIS website](https://www.cisecurity.org) for additional information. + +HashiCorp publishes pre-written policies that support the following CIS benchmarks. + +### AWS + +- Amazon Web Services Foundations version 1.2. Refer to the [AWS documentation](https://docs.aws.amazon.com/securityhub/latest/userguide/cis-aws-foundations-benchmark.html#cis1v2-standard) for additional information about this version. +- Amazon Web Services Foundations version 1.4. Refer to the [AWS documentation](https://docs.aws.amazon.com/securityhub/latest/userguide/cis-aws-foundations-benchmark.html#cis1v4-standard) for additional information about this version. +- Amazon Web Services Foundations version 3.0. Refer to the [AWS documentation](https://docs.aws.amazon.com/securityhub/latest/userguide/cis-aws-foundations-benchmark.html#cis3v0-standard) for additional information about this version. + +Refer to the [CIS policy set for AWS GitHub repository](https://github.com/hashicorp/policy-library-CIS-Policy-Set-for-AWS-Terraform) for details about these policies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/prewritten-sentinel.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/prewritten-sentinel.mdx new file mode 100644 index 000000000..ea73b949a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/prewritten-sentinel.mdx @@ -0,0 +1,133 @@ +--- +page_title: Run pre-written Sentinel policies +description: >- + Learn how to download and install pre-written Sentinel policies created and + maintained by HashiCorp. +source: terraform-docs-common +--- + +# Run pre-written Sentinel policies + +This topic describes how to run Sentinel policies created and maintained by HashiCorp. For instructions about how to create your own custom Sentinel policies, refer to [Define custom Sentinel policies](/terraform/enterprise/policy-enforcement/define-policies/custom-sentinel). + +## Overview + +Pre-written Sentinel policy libraries streamline your compliance processes and enhance security across your infrastructure. HashiCorp's ready-to-use policies can help you enforce best practices and security standards across your AWS environment. + +Complete the following steps to implement pre-written Sentinel policies in your workspaces: + +1. Obtain the policies you want to implement. Download policies directly into your repository or create a fork of the HashiCorp repositories. Alternatively, you can add the Terraform module to your configuration, which acquires the policies and connects them to your workspaces in a single step. +2. Connect policies to your workspace. After you download policies or fork policy repositories, you must connect them to your HCP Terraform or Terraform Enterprise workspaces. + +Refer to the [Sentinel documentation](/sentinel/docs) for information about the Sentinel language. + +## Requirements + +You must use one of the following Terraform applications: + +- HCP Terraform +- Terraform Enterprise v202406-1 or newer + +### Permissions + +To create new policy sets and policies, your HCP Terraform or Terraform Enterprise user account must either be a member of the owners team or have the **Manage Policies** organization-level permissions enabled. Refer to the following topics for additional information: + +- [Organization owners](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) +- [Manage policies](/terraform/enterprise/users-teams-organizations/permissions#manage-policies) + +### Version control system + +You must have a GitHub account connected to HCP Terraform or Terraform Enterprise to manually connect policy sets to your workspaces. Refer to [Connecting VCS Providers](/terraform/enterprise/vcs) for instructions. + +## Get policies + +Refer to the [pre-written policy library reference](/terraform/enterprise/policy-enforcement/prewritten-library) for a complete list of available policy sets. You can also [browse the registry](https://registry.terraform.io/search/policies?q=Pre-written) to discover additional policy libraries. + +Use one of the following methods to get pre-written policies: + +- **Download policies from the registry**: Use this method if you want to assemble custom policy sets without customizing policies. +- **Fork the HashiCorp policy GitHub repository**: Use this method if you intend to customize the policies. +- **Add the Terraform module to your configuration**: Use this method to implement specific versions of the policies as-is. This method also connects the policies to workspaces in the Terraform configuration file instead of connecting them as a separate step. + + + + + +Complete the following steps to download policies from the registry and apply them directly to your workspaces. + +1. Browse the policy libraries available in the [Terraform registry](https://registry.terraform.io/search/policies?q=Pre-written). +2. Click on a policy library and click **Choose policies**. +3. Select the policies you want to implement. The registry generates code in the **USAGE INSTRUCTIONS** box. +4. Click **Copy Code Snippet** to copy the code to your clipboard. +5. Create a GitHub repository to store the policies and the policy set configuration file. +6. Create a file called `sentinel.hcl` in the repository. +7. Paste the code from your clipboard into `sentinel.hcl` and commit your changes. +8. Complete the instructions for [connecting the policies to your workspace](#connect-policies-to-your-workspace). + + + + +Create a fork of the repository containing the policies you want to implement. Refer to the [GitHub documentation](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/working-with-forks/fork-a-repo) for instructions on how to create a fork. + +The following repositories are available: + +- [policy-library-CIS-Policy-Set-for-AWS-Terraform](https://github.com/hashicorp/policy-library-CIS-Policy-Set-for-AWS-Terraform) + +HashiCorp Sentinel policy libraries include a `sentinel.hcl` file. The file defines an example policy set using the policies included in the library. Modify the file to customize your policy set. Refer to [Sentinel Policy Set VCS Repositories](/terraform/enterprise/policy-enforcement/manage-policy-sets/sentinel-vcs) for additional information. + +After forking the repository, complete the instructions for [connecting the policies to your workspace](#connect-policies-to-your-workspace). + + + + +This method enables you to connect the policies to workspaces in the Terraform configuration file. As a result, you can skip the instructions described in [Connect policies to your workspaces](#connect-policies-to-your-workspaces). + +1. Go to the [module in the Terraform registry](https://registry.terraform.io/modules/hashicorp/CIS-Policy-Set/AWS/latest) and copy the code generated in the **Provision Instructions** tile. + +2. Add the `module` block to your Terraform configuration and define the following arguments: + + - `source`: Specify the path to the module you downloaded. + - `tfe_organization`: Specify the name of your organization on Terraform Enterprise or HCP Terraform. + - `policy_set_workspace_names`: Specify a list of workspace names that you want to apply the policies to. + + The following example configuration applies invokes the module for `target_workspace_1`: + + ```hcl + module "cis_v1-2-0_policies" { + source = "../prewritten-policy" + name = "cis-1-2-0" + tfe_organization = "" + policy_set_workspace_names = ["target_workspace_1"] + } + ``` + +3. Run `terraform plan` to view the plan. + +4. Run `terraform apply` to apply the changes. After running the command, Terraform will evaluate Sentinel policies for each following run of the workspaces you specified. + + + + +## Connect policies to your workspace + +Skip this step if you [added the Terraform module](#add-the-terraform-module-to-your-configuration) to your configuration. When you use the module, the `policy_set_workspace_names` argument instructs Terraform to connect the policies to the HCP Terraform workspaces specified in the configuration. + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization with workspaces you want to connect policies to. +2. Choose **Settings** from the sidebar. +3. Click **Policy Sets** and click **Connect a new policy set**. +4. Click the **Version control provider (VCS)** tile. +5. Enable the **Sentinel** option as the policy framework. +6. Specify a name and description for the set. +7. Configure any additional options for the policy set and click **Next**. +8. Choose the GitHub connection type, then choose the repository you created in [Set up a repository for the policies](#set-up-a-repository-for-the-policies). +9. If the `sentinel.hcl` policy set file is stored in a subfolder, specify the path to the file in the **Policies path** field. The default is the root directory. +10. If you want to apply updated policy sets to the workspace from a specific branch, specify the name in the **VCS branch** field. The default is the default branch configured for the repository. +11. Click **Next** and specify any additional parameters you want to pass to the Sentinel runtime and click **Connect policy set** to finish applying the policies to the workspace. + +Run a plan in the workspace to trigger the connected policies. Refer to [Start a Terraform run](/terraform/enterprise/run/remote-operations#starting-runs) for additional information. + +## Next steps + +- Group your policies into sets and apply them to your workspaces. Refer to [Create policy sets](/terraform/enterprise/policy-enforcement/manage-policy-sets#create-policy-sets) for additional information. +- View results and address Terraform runs that do not comply with your policies. Refer to [View results](/terraform/enterprise/policy-enforcement/view-results) for additional information. +- You can also view Sentinel policy results in JSON format. Refer to [View Sentinel JSON results](/terraform/enterprise/policy-enforcement/view-results/json) for additional information. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/test-sentinel.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/test-sentinel.mdx new file mode 100644 index 000000000..91be1391f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/test-sentinel.mdx @@ -0,0 +1,277 @@ +--- +page_title: Generate mock Sentinel data with Terraform Enterprise +description: >- + Learn how to generate mock Sentinel data to test your policies with Terraform + Enterprise. +source: terraform-docs-common +--- + +# Generate mock Sentinel data with Terraform + +We recommend that you test your Sentinel policies extensively before deploying +them within HCP Terraform. An important part of this process is mocking +the data that you wish your policies to operate on. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Due to the highly variable structure of data that can be produced by an +individual Terraform configuration, HCP Terraform provides the ability to +generate mock data from existing configurations. This can be used to create +sample data for a new policy, or data to reproduce issues in an existing one. + +Testing policies is done using the [Sentinel +CLI](/sentinel/docs/commands). More general information on +testing Sentinel policies can be found in the [Testing +section](/sentinel/docs/writing/testing) of the [Sentinel +runtime documentation](https://docs.hashicorp.com/sentinel). + +~> **Be careful!** Mock data generated by HCP Terraform directly exposes any +and all data within the configuration, plan, and state. Terraform attempts to +scrub sensitive data from these mocks, but we do not guarantee 100% accuracy. +Treat this data with care, and avoid generating mocks with live sensitive data +when possible. Access to this information requires [permission to download +Sentinel mocks](/terraform/enterprise/users-teams-organizations/permissions) for the +workspace where the data was generated. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Generating Mock Data Using the UI + +Mock data can be generated using the UI by expanding the plan status section of +the run page, and clicking on the **Download Sentinel mocks** button. + +![sentinel mock generate ui](/img/docs/download-mocks.png) + +For more information on creating a run, see the +[Terraform Runs and Remote Operations](/terraform/enterprise/run/remote-operations) section of the docs. + +If the button is not visible, then the plan is ineligible for mock generation or +the user doesn't have the necessary permissions. See [Mock Data +Availability](#mock-data-availability) for more details. + +## Generating Mock Data Using the API + +Mock data can also be created with the [Plan Export +API](/terraform/enterprise/api-docs/plan-exports). + +Multiple steps are required for mock generation. The export process is +asynchronous, so you must monitor the request to know when the data is generated +and available for download. + +1. Get the plan ID for the run that you want to generate the mock for by + [getting the run details](/terraform/enterprise/api-docs/run#get-run-details). + Look for the `id` of the `plan` object within the `relationships` section of + the return data. +2. [Request a plan + export](/terraform/enterprise/api-docs/plan-exports#create-a-plan-export) using the + discovered plan ID. Supply the Sentinel export type `sentinel-mock-bundle-v0`. +3. Monitor the export request by [viewing the plan + export](/terraform/enterprise/api-docs/plan-exports#show-a-plan-export). When the + status is `finished`, the data is ready for download. +4. Finally, [download the export + data](/terraform/enterprise/api-docs/plan-exports#download-exported-plan-data). + You have up to an hour from the completion of the export request - after + that, the mock data expires and must be re-generated. + +## Using Mock Data + +-> **Note:** The v2 mock files are only available on Terraform 0.12 and higher. + +Mock data is supplied as a bundled tarball, containing the following files: + + mock-tfconfig.sentinel # tfconfig mock data + mock-tfconfig-v2.sentinel # tfconfig/v2 mock data + mock-tfplan.sentinel # tfplan mock data + mock-tfplan-v2.sentinel # tfplan/v2 mock data + mock-tfstate.sentinel # tfstate mock data + mock-tfstate-v2.sentinel # tfstate/v2 mock data + mock-tfrun.sentinel # tfrun mock data + sentinel.hcl # sample configuration file + +The sample `sentinel.hcl` file contains mappings to the mocks so that you +can get started testing with `sentinel apply` right away. For `sentinel test`, +however, we recommend a more detailed layout. + +We recommend placing the files for `sentinel test` in a subdirectory +of the repository holding your policies, so they don't interfere with the +command's automatic policy detection. While the test data is Sentinel code, it's +not a policy and will produce errors if evaluated like one. + + . + ├── foo.sentinel + ├── sentinel.hcl + ├── test + │   └── foo + │   ├── fail.hcl + │   └── pass.hcl + └── testdata + ├── mock-tfconfig.sentinel + ├── mock-tfconfig-v2.sentinel + ├── mock-tfplan.sentinel + ├── mock-tfplan-v2.sentinel + ├── mock-tfstate.sentinel + ├── mock-tfstate-v2.sentinel + └── mock-tfrun.sentinel + +Each configuration that needs access to the mock should reference the mock data +files within the `mock` block in the Sentinel configuration file. + +For `sentinel apply`, this path is relative to the working directory. Assuming +you always run this command from the repository root, the `sentinel.hcl` +configuration file would look like: + +```hcl +mock "tfconfig" { + module { + source = "testdata/mock-tfconfig.sentinel" + } +} + +mock "tfconfig/v1" { + module { + source = "testdata/mock-tfconfig.sentinel" + } +} + +mock "tfconfig/v2" { + module { + source = "testdata/mock-tfconfig-v2.sentinel" + } +} + +mock "tfplan" { + module { + source = "testdata/mock-tfplan.sentinel" + } +} + +mock "tfplan/v1" { + module { + source = "testdata/mock-tfplan.sentinel" + } +} + +mock "tfplan/v2" { + module { + source = "testdata/mock-tfplan-v2.sentinel" + } +} + +mock "tfstate" { + module { + source = "testdata/mock-tfstate.sentinel" + } +} + +mock "tfstate/v1" { + module { + source = "testdata/mock-tfstate.sentinel" + } +} + +mock "tfstate/v2" { + module { + source = "testdata/mock-tfstate-v2.sentinel" + } +} + +mock "tfrun" { + module { + source = "testdata/mock-tfrun.sentinel" + } +} +``` + +For `sentinel test`, the paths are relative to the specific test configuration +file. For example, the contents of `pass.hcl`, asserting that the result of the +`main` rule was `true`, would be: + + mock "tfconfig" { + module { + source = "../../testdata/mock-tfconfig.sentinel" + } + } + + mock "tfconfig/v1" { + module { + source = "../../testdata/mock-tfconfig.sentinel" + } + } + + mock "tfconfig/v2" { + module { + source = "../../testdata/mock-tfconfig-v2.sentinel" + } + } + + mock "tfplan" { + module { + source = "../../testdata/mock-tfplan.sentinel" + } + } + + mock "tfplan/v1" { + module { + source = "../../testdata/mock-tfplan.sentinel" + } + } + + mock "tfplan/v2" { + module { + source = "../../testdata/mock-tfplan-v2.sentinel" + } + } + + mock "tfstate" { + module { + source = "../../testdata/mock-tfstate.sentinel" + } + } + + mock "tfstate/v1" { + module { + source = "../../testdata/mock-tfstate.sentinel" + } + } + + mock "tfstate/v2" { + module { + source = "../../testdata/mock-tfstate-v2.sentinel" + } + } + + mock "tfrun" { + module { + source = "../../testdata/mock-tfrun.sentinel" + } + } + + test { + rules = { + main = true + } + } + +## Mock Data Availability + +The following factors can prevent you from generating mock data: + +- You do not have permission to download Sentinel mocks for the workspace. + ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + Permission is required to protect the possibly sensitive data which can be + produced via mock generation. +- The run has not progressed past the planning stage, or did not create a plan + successfully. +- The run progressed past the planning stage prior to July 23, 2021. Prior to this date, HCP Terraform only kept JSON plans for 7 days. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +If a plan cannot have its mock data exported due to any of these reasons, the +**Download Sentinel mocks** button within the plan status section of the UI will +not be visible. + +-> **Note:** Only a successful plan is required for mock generation. Sentinel can still generate the data if apply or policy checks fail. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/view-results/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/view-results/index.mdx new file mode 100644 index 000000000..9c744110c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/view-results/index.mdx @@ -0,0 +1,74 @@ +--- +page_title: View policy enforcement results in Terraform Enterprise +description: >- + Learn how to view and override policy enforcement results in Terraform + Enterprise. +source: terraform-docs-common +--- + +# View policy enforcement results + +When you add [policy sets](/terraform/enterprise/policy-enforcement/manage-policy-sets) to a workspace, HCP Terraform enforces those policy sets on every Terraform run. HCP Terraform displays the policy enforcement results in the UI for each run. Depending on each policy’s [enforcement level](/terraform/enterprise/policy-enforcement/manage-policy-sets#policy-enforcement-levels), policy failures can also stop the run and prevent Terraform from provisioning infrastructure. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +## Policy Evaluation Run Stages + +HCP Terraform only evaluates policies for successful plans. HCP Terraform evaluates Sentinel and OPA policy sets separately and at different points in the run. + +- Sentinel policy checks occur after Terraform completes the plan and after both [run tasks](/terraform/enterprise/workspaces/settings/run-tasks) and [cost estimation](https://terraform.io/cloud-dodcs/cost-estimation). This order lets you write Sentinel policies to restrict costs based on the data in the cost estimates. +- Sentinel policy evaluations occur after Terraform completes the plan and after any run tasks. HCP Terraform evaluates Sentinel policy evaluations immediately before cost estimation. +- OPA policy evaluations occur after Terraform completes the plan and after any run tasks. HCP Terraform evaluates OPA policies immediately before cost estimation. + +Refer to [Run States and Stages](/terraform/enterprise/run/states) for more details. + +## View Policy Results + +To view the policy results for both Sentinel and OPA policies: + +1. Go to your workspace and navigate to the **Runs** page. +2. Click a run to view its details. + +HCP Terraform displays a timeline of the run’s events. For workspaces with both Sentinel and OPA policy sets, the run details page displays two separate run events: **OPA policies** for OPA policy sets and **Policy check** for Sentinel policy sets. + +Click a policy evaluation event to view policy results and details about any failed policies. + +-> **Note:** For Sentinel, the Terraform CLI also prints policy results for [CLI-driven runs](/terraform/enterprise/run/cli). CLI support for policy results is not available for OPA. + +## Override Policies + +You need [manage policy overrides](/terraform/enterprise/users-teams-organizations/permissions#manage-policy-overrides) permissions to override failed Sentinel and OPA policies. + +Sentinel and OPA have different policy enforcement levels that determine when you need to override failed policies to allow a run to continue. +To override failed policies, go to the run details page and click **Override and Continue** at the bottom. + +For Sentinel only, you can also override `soft-mandatory` policies with the Terraform CLI. Run the `terraform apply` command and then enter `override` when prompted. + +-> **Note:** HCP Terraform does not allow policy overrides for [no-operation plans containing no infrastructure changes](/terraform/enterprise/run/modes-and-options#allow-empty-apply), unless you choose the **Allow empty apply** option when starting the run. + +### Sentinel + +#### Policy checks + +Policies with an `advisory` enforcement level never stop runs. If they fail, HCP Terraform displays a warning in the policy results and the run continues. + +You can override `soft-mandatory` policies to allow the run to continue. Overriding failed policies on a run does not affect policy evaluations on future runs in that workspace. + +You cannot override `hard-mandatory` policies, and all of these policies must pass for the run to continue. + +#### Policy evaluations + +Policies with an `advisory` enforcement level never stop runs. If they fail, HCP Terraform displays a warning in the policy results and the run continues. + +When running Sentinel policies as policy evaluations, `soft-mandatory` and `hard-mandatory` enforcement levels are internally converted to `mandatory` enforcement level. +You can override `mandatory` policies to allow the run to continue. + +### OPA + +Policies with an `advisory` enforcement level never stop runs. If they fail, HCP Terraform displays a warning in the policy results and the run continues. + +You can override `mandatory` policies to allow the run to continue. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/view-results/json.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/view-results/json.mdx new file mode 100644 index 000000000..c0fa9f370 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/policy-enforcement/view-results/json.mdx @@ -0,0 +1,59 @@ +--- +page_title: View and filter Sentinel JSON data +description: Learn how to view and filter Sentinel JSON data. +source: terraform-docs-common +--- + +# View and filter Sentinel JSON data + +When using the HCP Terraform UI, Sentinel policy check results are available +both in a human-readable log form, and in a more detailed, lower-level JSON +form. While the logs may suppress some output that would make the logs harder +to read, the JSON output exposes the lower-level output directly to you. Being +able to parse this data in its entirety is especially important when working +with [non-boolean rule +data](/sentinel/docs/language/rules#non-boolean-values) in +a policy designed to work with Sentinel 0.17.0 and higher. + + + +@include 'tfc-package-callouts/policies.mdx' + + + +-> The JSON data exposed is the same as you would see when using the [policy +checks API](/terraform/enterprise/api-docs/policy-checks), with the data starting at the +`sentinel` key. + +## Viewing JSON Data + +To view the JSON data, expand the policy check on the [runs +page](/terraform/enterprise/run/manage) if it is not already expanded. The logs are +always displayed first, so click the **View JSON Data** button to view the JSON +data. You can click the **View Logs** button to switch back to the log view. + +![viewing json data](/img/docs/sentinel-view-json.png) + +## Filtering JSON Data + +The JSON data is filterable using a [jq](https://stedolan.github.io/jq/)-subset +filtering language. See the [JSON +filtering](/terraform/enterprise/workspaces/json-filtering) page for more details on +the filtering language. + +Filters are entered by putting the filter in the aptly named **filter** box in +the JSON viewer. After entering the filter, pressing **Apply** or the enter key +on your keyboard will apply the filter. The filtered results, if any, are +displayed in result box. Clearing the filter will restore the original JSON +data. + +![entering a json filter](/img/docs/sentinel-json-enter-filter.png) + +### Quick-Filtering `main` Rules + +Clicking the **Filter "main" rules** button will quickly apply a filter that +shows you the results of the `main` rule for every policy in the policy set. You +can use this to quickly get the results of each policy in the set, without +having navigate through the rest of the policy result data. + +![using the quick filter](/img/docs/sentinel-json-quick-filter.png) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/projects/best-practices.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/projects/best-practices.mdx new file mode 100644 index 000000000..b1b60daf3 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/projects/best-practices.mdx @@ -0,0 +1,40 @@ +--- +page_title: Best Practices - Projects - Terraform Enterprise +description: >- + Best practices to structure your configuration and Terraform Enterprise + projects +source: terraform-docs-common +--- + +# Project Best Practices + +Projects let you group and scope access to your workspaces. You can group related workspaces into projects and give teams more permissive access to individual projects rather than granting them permissions to the entire organization. + +Projects offer several advantages to help you further develop your workspace strategy: + +- **Focused workspace view**: You can scope which workspaces HCP Terraform displays by project, allowing for a more organized view. +- **Simplified workspace management**: You can create project-level permissions and variable sets that apply to all current and future workspaces in the project. For example, you can create a project variable set containing your cloud provider credentials for all workspaces in the project to access. +- **Reduced risk with centralized control**: You can scope project permissions to only grant teams administrator access to the projects and workspaces they need. + +## Recommendations + +When using projects, we recommend the following: + +- **Automate with Terraform**: Automate the creation of projects, variable sets, and teams together using the [TFE provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs). +- **Designate a landing zone project**: Landing zone projects contain workspaces used to create all other projects, teams, and workspaces. This lets you have a variable set that includes the organization token, which the TFE provider can use to create other resources in your organization. You can also create a [Sentinel policy](/terraform/enterprise/policy-enforcement) to prevent users in other projects from accessing the organization token. +- **Maintain least privilege**: Restrict the number of project administrators to maintain the principal of least privilege. + +## Project boundaries + +Finally, decide on the logical boundaries for your projects. Some considerations to keep in mind include: + +- **Provider boundaries**: For smaller organizations, creating one project per cloud account may make it easier to manage access. Projects can use [dynamic credentials](/terraform/tutorials/cloud/dynamic-credentials) by configuring a project variable set to avoid hard-coding long-lived static credentials. +- **Least privilege**: You can create teams and grant them access to projects with workspaces of similar areas of ownership. For example, a production networking workspace should be in a separate project from a development compute workspace. +- **Use variable sets**: Project-wide variable sets let you configure and reuse values such as default tags for cost-codes, owners, and support contacts. Projects can own variable sets, enabling you to separate management and access to sets between projects. +- **Practitioner efficiency**: Consider if it makes sense for a practitioner to need to visit multiple projects to complete a deployment. + +## Next steps + +This article introduces some considerations to keep in mind as your organization matures their project usage. Being deliberate about how you use these to organize your infrastructure will ensure smoother and safer operations. To learn more about HCP Terraform and Terraform Enterprise best practices, refer to [Workspace Best Practices](/terraform/enterprise/workspaces/best-practices). To learn best practices for writing Terraform configuration, refer to the [Terraform Style Guide](/terraform/language/style). + +[HCP Terraform](/terraform/tutorials/cloud-get-started) provides a place to try these concepts hands-on, and you can [get started for free](https://app.terraform.io/public/signup/account). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/projects/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/projects/index.mdx new file mode 100644 index 000000000..62f7b9a26 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/projects/index.mdx @@ -0,0 +1,51 @@ +--- +page_title: Projects - Terraform Enterprise +description: >- + Use projects to organize and group workspaces and create ownership boundaries + across your infrastructure. +source: terraform-docs-common +--- + +# Overview + + + +@include 'tfc-package-callouts/project-permissions.mdx' + + + +Projects let you organize your workspaces and scope access to workspace +resources. Each project has a separate permissions set that you can use to grant +teams access to all workspaces in the project, defining access control +boundaries for teams and their resources. Project-level permissions are more +granular than organization-level permissions, but more specific than individual +workspace-level grants. + +When deciding how to structure your projects, consider which groups of resources +need distinct access rules. You may wish to define projects by business units, +departments, subsidiaries, or technical teams. + +> **Hands On:** Try our [Managing +> Projects](/terraform/tutorials/cloud/projects) +> tutorial. + +## Default Project + +Every workspace must belong to exactly one project. By default, all workspaces +belong to an organization's **Default Project**. You can rename the default +project, but you cannot delete it. You can specify a workspace's project at the +time of creation and move it to a different project later. + +The “Manage Workspaces” team permission lets users create and manage workspaces. +Users with this permission can read and manage all workspaces, but new +workspaces are automatically added to the “Default Project” and users cannot +access the metadata for other projects. To create workspaces under other +projects, users also need the "Manage Projects & Workspaces" permission or the +admin role for the project they wish to use. + +## Managing Projects + +The "Manage all Projects" team permission lets users manage projects. Users with +this permission can view, edit, delete, and assign team access to all of an +organization's projects. Refer to [Managing +Projects](/terraform/enterprise/projects/manage) for more details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/projects/manage.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/projects/manage.mdx new file mode 100644 index 000000000..3cc40daf6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/projects/manage.mdx @@ -0,0 +1,122 @@ +--- +page_title: Manage projects in Terraform Enterprise +description: |- + Use projects to organize and group workspaces and create ownership boundaries + across your infrastructure. +source: terraform-docs-common +--- + +# Manage projects + +This topic describes how to create and manage projects in HCP Terraform and Terraform Enterprise. A project is a folder containing one or more workspaces. + +## Requirements + +You must have the following permissions to manage projects: + +- You must be a member of a team with the **Manage all Projects** permissions enabled to create a project. Refer to [Organization Permissions](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions) for additional information. +- You must be a member of a team with the **Visible** option enabled under **Visibility** in the organization settings to configure a new team's access to the project. Refer to [Team Visibility](/terraform/enterprise/users-teams-organizations/teams/manage#team-visibility) for additional information. +- You must be a member of a team with update and delete permissions to be able to update and delete teams respectively. + +To delete tags on a project, you must be member of a team with the **Admin** permission group enabled for the project. + +To create tags for a project, you must be member of a team with the **Write** permission group enabled for the project. + +## View a project + +To view your organization's projects: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and select **Projects** from the sidebar. +2. Search for a project that you want to view. You can use the following methods: + - Sort by column header. + - Use the search bar to search on the name of a project or a tag. +3. Click on a project's name to view more details. + +## Create a project + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and select **Projects** from the sidebar. +2. Click **+ New project**. +3. Specify a name for the project. The name must be unique within the organization and can only include letters, numbers, inner spaces, hyphens, and underscores. +4. Add a description for the project. This field is optional. +5. Open the **Add key value tags** menu to add tags to your project. Workspaces you create within the project inherit project tags. Refer to [Define project tags](#define-project-tags) for additional information. +6. Click **+Add tag** and specify a tag key and tag value. If your organization has defined reserved tag keys, they appear in the **Tag key** field as suggestions. Refer to [Create and manage reserved tags](/terraform/enterprise/users-teams-organizations/organizations/manage-reserved-tags) for additional information. +7. Click **+ Add tag** to attach any additional tags. +8. Click **Create** to finish creating the project. + +HCP Terraform returns a new project page displaying all the project +information. + +## Edit a project + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and select **Projects** from the sidebar. +2. Click on a project name of the project you want to edit. +3. Choose **Settings** from the sidebar. + +On this **General settings** page, you can update the project name, project +description, and delete the project. On the **Team access** page, you can modify +team access to the project. + +## Automatically destroy inactive workspaces + + + +@include 'tfc-package-callouts/ephemeral-workspaces.mdx' + + + +You can configure HCP Terraform to automatically destroy each workspace's +infrastructure in a project after a period of inactivity. A workspace +is _inactive_ if the workspace's state has not changed within your designated +time period. + +If you configure a project to auto-destroy its infrastructure when inactive, +any run that updates Terraform state further delays the scheduled auto-destroy +time by the length of your designated timeframe. + + +HCP Terraform and Terraform Enterprise do not prompt you to approve automated destroy plans. We recommend only using this setting for development environments. + + +To schedule an auto-destroy run after a period of workspace inactivity: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the project with workspaces you want to destroy. +2. Choose **Settings** from the sidebar, then **Auto-destroy Workspaces**. +3. Click **Set up default**. +4. Select or customize a desired timeframe of inactivity. +5. Click **Confirm default**. + +You can configure an individual workspace's auto-destroy settings to override +this default configuration. Refer to [automatically destroy workspaces](/terraform/enterprise/workspaces/settings/deletion#automatically-destroy) for more information. + +## Delete a project + +You can only delete projects that do not contain stacks or workspaces. + +To delete an empty project: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise. +2. Click **Projects**. +3. Search for a project that you want to review by scrolling down the table or + searching for a project name in the search bar above the project table. +4. Choose **Settings** from the sidebar. +5. Click the **Delete** button. A **Delete project** modal appears. +6. Click the **Delete** button to confirm the deletion. + +HCP Terraform returns to the **Projects** view with the deleted project +removed from the list. + +## Define project tags + +You can define tags stored as key-value pairs to help you organize your projects and track resource consumption. Workspaces created in the project automatically inherit the tags, but workspace administrators with appropriate permissions can attach new key-value pairs to their workspaces to override inherited tags. Refer to [Create workspace tags](/terraform/enterprise/workspaces/tags) for additional information about using tags in workspaces. + +The following rules apply to tag keys and values: + +- Tags must be one or more characters. +- Tags have a 255 character limit. +- Tags can include letters, numbers, colons, hyphens, and underscores. +- Tag values are optional. +- You can create up to 10 unique tags per workspace and 10 unique tags per project. As a result, each workspace can have up to 20 tags. +- You cannot use the following strings at the beginning of a tag key: + - `hcp` + - `hc` + - `ibm` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/add.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/add.mdx new file mode 100644 index 000000000..72fbd0d5d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/add.mdx @@ -0,0 +1,79 @@ +--- +page_title: Add public providers and modules to the Terraform Enterprise private registry +description: >- + Learn how to add providers and modules from the public Terraform registry to + your organization's private registry. +source: terraform-docs-common +--- + +[vcs]: /terraform/enterprise/vcs + +# Add public providers and modules to the HCP Terraform private registry + +You can add providers and modules from the public [Terraform Registry](/terraform/registry) to your HCP Terraform private registry. The private registry stores a pointer to these public providers and modules so that you can view their data from within HCP Terraform. This lets you clearly designate which public providers and modules are recommended for the organization and makes their supporting documentation and examples centrally accessible. + +-> **Note:** Your Terraform Enterprise instance must allow access to `registry.terraform.io` and `https://yy0ffni7mf-dsn.algolia.net/`. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +You can add providers and modules through the UI as detailed below or through the [Registry Providers API](/terraform/enterprise/api-docs/private-registry/providers) and the [Registry Modules API](/terraform/enterprise/api-docs/private-registry/modules#create-a-module-with-no-vcs-connection-). + +## Permissions + +All members of an organization can view and use public providers and modules. Members of the [owners team](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) and teams with [Manage Private Registry permissions](/terraform/enterprise/users-teams-organizations/permissions#manage-private-registry) can add and delete them from the private registry. + +## Adding a Public Provider or Module + +> **Hands-on:** Try the [Add Public Providers and Modules to your Private Registry](/terraform/tutorials/modules/private-registry-add) tutorial and [Share Modules in the Private Registry](/terraform/tutorials/modules/module-private-registry-share) tutorials. + +To add a public provider or module: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to add a public provider or module to. + +2. Select **Registry** from the sidebar. The organization's private registry appears with a list of available providers and modules. + +3. Click **Search public registry**. The **Public Registry Search** page appears. + +4. Enter any combination of namespaces, such as `hashicorp`, and module or provider names into the search field. You can click **Providers** and **Modules** to toggle between lists of providers and modules that meet the search criteria. + +5. Do one of the following to add a provider or module to your private registry: + - Hover over the provider or module and click **+ Add**. + - Click the provider or module to view its details and then click **Add to HCP Terraform**. + +6. Click **Add to organization** in the dialog box. Members of your organization can now begin using it from the private registry. + +## Enabling and Disabling No-Code Provisioning + + + +@include 'tfc-package-callouts/nocode.mdx' + + + +You can enable no-code provisioning for public modules after adding them to your registry. + +To support the auto-apply workflow, ensure that downstream users can automatically load provider credentials into their new no-code workspaces. You can enable access by either creating a [global or project-scoped variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets) with the credentials for the module's provider, or by accessing outputs with credentials from other workspaces. Refer to [Provider Credentials](/terraform/enterprise/no-code-provisioning/module-design#provider-credentials) for more details. + +To enable no-code provisioning: + +1. Verify that the module meets the [requirements for no-code provisioning](/terraform/enterprise/no-code-provisioning/module-design#requirements). +2. Click the module to view its details. +3. Select **Enable no-code provisioning** from the **Manage Module for Organization** dropdown. + +Your module’s details page now has a **No-Code Ready** badge to indicate that it supports no-code provisioning. + +To disable no-code provisioning, select **Disable no-code provisioning** from the **Manage Module for Organization** dropdown. Disabling also removes the **No-Code Ready** badge from the module’s details page. + +## Removing a Public Provider or Module + +Removing a public provider or module from a private registry does not remove it from the public Terraform Registry. Users in the organization can still use the removed provider or module without changing their configurations. + +To remove a public provider or module from an organization's private registry: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization whose registry you want to remove a provider or module from. + +2. Select **Registry** from the sidebar. The organization's private registry appears with a list of available providers and modules. + +3. Select the provider or module to view its details, open the **Manage for Organization** menu, and click **Remove from organization** (providers) or **Delete module** (modules). + +4. Enter the provider or module name in the dialog box to confirm and then click **Remove** (providers) or **Delete** (modules). The provider or module no longer appears in the organization's private registry. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/airgapped-providers.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/airgapped-providers.mdx new file mode 100644 index 000000000..99798d9e9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/airgapped-providers.mdx @@ -0,0 +1,53 @@ +--- +page_title: Publish a public provider to an airgapped private registry +description: >- + Private registries in airgapped environments cannot access public providers. Learn how to publish an official public provider to an + airgapped private registry. +--- + +# Publish Public Providers to an Airgapped Private Registry + +This topic describes how to publish an official HashiCorp provider hosted in the public registry to a private registry in an airgapped environment. + +## Introduction + +Your Terraform Enterprise installation must be able to access the [public Terraform Registry](https://registry.terraform.io) to build workspaces that rely on official public HashiCorp providers. However, this is a problem if your Terraform Enterprise installation is in an airgapped environment without internet access. + +To solve this, you can download the public provider and [re-upload it to your private registry](/terraform/enterprise/registry/publish-providers). There are a few differences in the workflow for re-uploading a public HashiCorp provider. In this example, you will download the AWS provider and re-upload it to your private registry. You can use the same workflow for [any official HashiCorp provider](https://registry.terraform.io/browse/providers?tier=official). + +To re-upload a public HashiCorp provider to your private registry, complete the following steps. + +## Download required files + +Download the provider binary files for the provider, the `SHASUMS` file, and the `SHA256SUMS.72D7468F.sig` file. These files are available at [https://releases.hashicorp.com](https://releases.hashicorp.com). For this example, you can refer to the [AWS provider files](https://releases.hashicorp.com/terraform-provider-aws/5.14.0/) for more details. You will only re-upload the binaries for the `linux_amd64` architecture, but you can use this same process to re-upload multiple builds of the same provider. + +First, download the `SHASUMS` file. This file contains a SHA256 checksum for each build of this specific provider version. + +```shell-session +$ curl \ + https://releases.hashicorp.com/terraform-provider-aws/5.14.0/terraform-provider-aws_5.14.0_SHA256SUMS \ + --output terraform-provider-aws_5.14.0_SHA256SUMS +``` + +Next, download the `SHA256SUMS.72D7468F.sig` file. This file is a GPG binary signature of the `SHA256SUMS` file. + +```shell-session +$ curl \ + https://releases.hashicorp.com/terraform-provider-aws/5.14.0/terraform-provider-aws_5.14.0_SHA256SUMS.72D7468F.sig \ + --output terraform-provider-aws_5.14.0_SHA256SUMS.72D7468F.sig +``` + +Finally, download the `linux_amd64` build of the provider binary. + +```shell-session +$ curl \ + https://releases.hashicorp.com/terraform-provider-aws/5.14.0/terraform-provider-aws_5.14.0_linux_amd64.zip \ + --output terraform-provider-aws_5.14.0_linux_amd64.zip +``` + +## Create the provider + +Re-upload the provider by following the guide in [Publishing a provider](/terraform/enterprise/registry/publish-providers#publishing-a-provider). There are _two differences_ that you need to make in this workflow: + +- Do not sign the binary with your GPG key; [HashiCorp's public PGP key](https://www.hashicorp.com/.well-known/pgp-key.txt) has already signed it. +- Do not upload your public GPG key. Instead, use HashiCorp's public key. Terraform Enterprise version v202309-1 and newer includes the public key by default. The key ID is `34365D9472D7468F`. You can verify the ID by [importing the public key locally](/terraform/tutorials/cli/verify-archive#download-and-import-hashicorp-s-public-key). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/design.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/design.mdx new file mode 100644 index 000000000..935081361 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/design.mdx @@ -0,0 +1,64 @@ +--- +page_title: Use the configuration designer in Terraform Enterprise +description: >- + Learn how to outline a configuration with private modules and define variables + with the Terraform Enterprise configuration designer. +source: terraform-docs-common +--- + +# Use the configuration designer + +HCP Terraform's private registry includes a configuration designer that can help you spend less time writing boilerplate code in a module-centric Terraform workflow. + +The configuration designer lets you outline a configuration for a new workspace by choosing any number of private modules. It then lists those modules' variables as a fillable HTML form, with a helper interface for finding values that you can interpolate. When you are finished, the designer returns the text of a `main.tf` configuration. This is the same Terraform code you would have written in your text editor. + +## Accessing the Configuration Designer + +Go to your organization's private registry, and then click **<> Design Configuration**. + +The **Select Modules** page appears. + +## Adding Modules + +Filter and search the left side of the **Select Modules** page to find private modules that you can add to your configuration. + +Click **Add Module** for all of the modules you want to use in your configuration. These modules appear in the **Selected Modules** list on the right side of the page. + +### Setting Versions + +Selecting a module adds its most recent version to the configuration. To specify a different version: + +1. Click the module's version number from the **Selected Modules** list on the right. +2. Select an alternate version from the menu. + +## Setting Variables + +When you finish selecting modules, click **Next »** to go to the **Set Variables** page. + +The left side of this page lists your chosen modules, and the right side lists all variables for the currently selected module. Each variable is labeled as required or optional. + +You can switch between modules without losing your work; click a module's **Configure** button to switch to its variable list. + +Once you set a value for all of a module's required variables, its **Configure** button changes to a green **Configured** button. + +### Interpolation Searching + +Variable values can be literal strings, or can interpolate other values. When you start typing an interpolation token (`${`), the designer displays a help message. As you continue typing, it searches the available outputs in your other selected modules, as well as outputs from workspaces where you are authorized to read state outputs. You can select one of these search results, or type a full name if you need to reference a value HCP Terraform does not know about. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Deferring Variables + +Sometimes, configuration users should be able to set certain variables according to their use cases. + +Select the **Deferred** checkbox to delegate a variable to configuration users. This ties the variable's value to a new top-level Terraform variable with no default value. All users that create a workspace from your configuration will have to provide a value for that variable. + +## The Output Configuration + +When all modules are configured, click **Next »**. + +The **Publish** page appears. Use the **Preview configuration** menu to review the generated code. + +The configuration designer does not create any repositories or workspaces. To create workspaces with the configuration, you must download the generated code, save it as the `main.tf` file in a new directory, and commit it to version control. After you download the code, you can make any necessary changes or additions. For example, you may want to add non-module resources. + +When you are sure you have downloaded the results, click **Done** to discard the configuration. HCP Terraform does not save output from previous configuration designer runs. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/index.mdx new file mode 100644 index 000000000..0405c2445 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/index.mdx @@ -0,0 +1,27 @@ +--- +page_title: Terraform Enterprise private registry overview +description: >- + The Terraform Enterprise private registry lets you share private modules and + providers across your organization. +source: terraform-docs-common +--- + +# HCP Terraform private registry overview + +HCP Terraform's private registry works similarly to the [public Terraform Registry](/terraform/registry) and helps you share [Terraform providers](/terraform/language/providers) and [Terraform modules](/terraform/language/modules) across your organization. It includes support for versioning and a searchable list of available providers and modules. + +> **Hands-on:** Try the [Add Public Providers and Modules to your Private Registry](/terraform/tutorials/modules/private-registry-add) tutorial and [Share Modules in the Private Registry](/terraform/tutorials/modules/module-private-registry-share) tutorials. + +## Public Providers and Modules + +[Public modules and providers](/terraform/enterprise/registry/add) are hosted on the public Terraform Registry and HCP Terraform can automatically synchronize them to an organization's private registry. This lets you clearly designate which public providers and modules are recommended for the organization and makes their supporting documentation and examples centrally accessible. + +-> **Note:** Your Terraform Enterprise instance must allow access to `registry.terraform.io` and `https://yy0ffni7mf-dsn.algolia.net/`. + +## Private Providers and Modules + +[Private providers](/terraform/enterprise/registry/publish-providers) and [private modules](/terraform/enterprise/registry/publish-modules) are hosted on an organization's private registry and are only available to members of that organization. In Terraform Enterprise, private providers and modules are also available to other organizations that are [configured to share](/terraform/enterprise/admin/application/registry-sharing) with that organization. + +## Managing Usage + +You can create [Sentinel policies](/terraform/enterprise/policy-enforcement) to manage how members of your organization can use modules from the private registry. For example, you can mandate that all non-root modules in Terraform configurations must be private or public modules from your own private registry. You can also apply a policy that requires all modules to use recent versions. Refer to our [example policy on GitHub](https://github.com/hashicorp/terraform-sentinel-policies/blob/main/cloud-agnostic/http-examples/use-recent-versions-from-pmr.sentinel). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/manage-module-versions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/manage-module-versions.mdx new file mode 100644 index 000000000..e43344db2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/manage-module-versions.mdx @@ -0,0 +1,82 @@ +--- +page_title: Deprecate module versions in Terraform Enterprise +description: >- + Learn how to deprecate a module version and revert a module version’s + deprecation. Deprecating a module version allows you to warn users of that + version’s end of life, enabling consumers to upgrade their modules when it’s + convenient and without disrupting their workflows. +source: terraform-docs-common +--- + +# Deprecate module versions + +Deprecating a module version in your organization’s private registry adds warnings to the module's registry page and warnings in the run outputs of any users of that version. Once you have deprecated a module version, you can revert it back to remove the warnings from that version. + + + +@include "tfc-package-callouts/manage-module-versions.mdx" + + + +You can also [deprecate module versions using the HCP Terraform API](/terraform/enterprise/api-docs/private-registry/manage-module-versions). + +## Background + +Deprecating a module version allows platform teams and module authors to mark the end-of-life for specific private module versions. Deprecating module versions helps consumers recognize versions that are still maintained and supported but not recommended. + +You can deprecate a private module version to warn existing users to upgrade that version in their configuration. The private registry also denotes which module versions are deprecated, alerting new consumers that they should use a non-deprecated version instead. + +## Requirements + +To deprecate a module version or to revert a version’s deprecation: + +- you must have permission to manage [private registry modules](https://developer.hashicorp.com/terraform/cloud-docs/users-teams-organizations/permissions#manage-private-registry) +- the module must be in the [private](https://developer.hashicorp.com/terraform/cloud-docs/registry/publish-modules) registry + +## Deprecate a module version + +To deprecate a module version, perform the following steps: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to your organization. +2. Choose **Registry** in the sidebar to navigate to your organization’s private registry, then find the module you want to deprecate a version of. +3. Open the **Manage module for organization** dropdown. +4. Select a module version for deprecation. +5. You can optionally provide an explanation in the **Reason for module deprecation** field to help users understand why this module version is being deprecated. This custom message is displayed to module users in deprecation warnings. +6. You can optionally enter a URL into the **Link to additional information** field if there is a website where consumers can learn more about that module version’s deprecation. +7. Click **Deprecate**. + +If the module version you are deprecating has the [**No-code ready**](/terraform/enterprise/no-code-provisioning/module-design#updating-a-module-s-version) pin, then HCP Terraform lets you select another version to create no-code modules from. We recommend adding the **No-code ready** pin to another non-deprecated module version so that users provisioning workspaces from your module can use a version that you plan to continue supporting. + +### Deprecation warnings + +After you deprecate a module version, consumers of that version receive warnings in their operation outputs urging them to update that version in both HCP Terraform and the Terraform CLI. + +~> **Note**: Only workspaces in the [remote or agent execution modes](/terraform/enterprise/workspaces/settings#execution-mode) can receive warnings for a module version’s deprecation. + +If you provided a reason for a module version’s deprecation, then the warning users receive contains that reason and the following message: + +```shell +Found the following deprecated module versions, consider using an updated version. + +``` + +A run’s output mode affects where a module deprecation’s warning appears. If a run set to the default [**Structured Run Output**](/terraform/enterprise/workspaces/settings#user-interface) mode, then module deprecation warnings show up under a run’s Diagnostics dropdown. + +If a run is in the **Console UI** mode, module deprecation warnings appear in the run’s logs: + +```shell +Warning: Deprecated modules found, consider installing an updating version. The following are affected: +Version X.X.X of +``` + +## Revert the deprecation of a module version + +To revert a module version’s deprecation, perform the following steps: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to your organization. +2. Choose **Registry** in the sidebar to navigate to your organization’s private registry, then find the deprecated module version you want to revert the deprecation of. +3. Open the **Manage module for organization** dropdown. +4. Select **Revert module version deprecation X.X.X**. +5. Click **Revert Deprecation**. + +Reverting the deprecation of a module version removes all warnings from that version in both the module’s registry page and in the run outputs of that module version’s consumers. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/publish-modules.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/publish-modules.mdx new file mode 100644 index 000000000..657f74057 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/publish-modules.mdx @@ -0,0 +1,165 @@ +--- +page_title: Publish private modules to the Terraform Enterprise private registry +description: >- + Use the Terraform Enterprise private registry to publish and share private + modules across your organization. +source: terraform-docs-common +--- + +[vcs]: /terraform/enterprise/vcs + +# Publish private modules to the HCP Terraform private registry + +> **Hands-on:** Try the [Share Modules in the Private Module Registry](/terraform/tutorials/modules/module-private-registry-share) tutorial. + +In addition to [adding modules from the Terraform Registry](/terraform/enterprise/registry/add), you can publish private modules to an organization's HCP Terraform private registry. The registry handles downloads and controls access with HCP Terraform API tokens, so consumers do not need access to the module's source repository, even when running Terraform from the command line. + +The private registry uses your configured [Version Control System (VCS) integrations][vcs] and defers to your VCS provider for most management tasks. For example, your VCS provider handles new version releases. The only manual tasks are adding a new module and deleting module versions. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Permissions + +Private modules are only available to members of the organization where you add them. In Terraform Enterprise, they are also available to organizations that you configure to [share modules](/terraform/enterprise/admin/application/registry-sharing) with that organization. + +Members of the [owners team](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) and teams with [Manage Private Registry permissions](/terraform/enterprise/users-teams-organizations/permissions#manage-private-registry) can publish and delete modules from the private registry. + +## Preparing a Module Repository + +After you configure at least one [connection to a VCS provider][vcs], you can publish a new module by specifying a properly formatted VCS repository (details below). The registry automatically detects the rest of the information it needs, including the module's name and its available versions. + +A module repository must meet all of the following requirements before you can add it to the registry: + +- **Location and permissions:** The repository must be in one of + your configured [VCS providers][vcs], and HCP Terraform's VCS user account must have admin access to the repository. The registry needs admin access to create the webhooks to import new module versions. GitLab repositories must be in the main organization or group, and not in any subgroups. + +- **Named `terraform--`:** Module repositories must use this + three-part name format, where `` reflects the type of infrastructure + the module manages and `` is the main provider where it creates that + infrastructure. The `` segment must be all lowercase. The `` + segment can contain additional hyphens. Examples: `terraform-google-vault` or + `terraform-aws-ec2-instance`. + +- **Standard module structure:** The module must adhere to the + [standard module structure](/terraform/language/modules/develop/structure). + This allows the registry to inspect your module and generate documentation, + track resource usage, and more. + +## Publishing a New Module + +You can publish modules through the UI as shown below or with the [Registry Modules API](/terraform/enterprise/api-docs/private-registry/modules). The API also supports publishing modules without a VCS repo as the source, which is not possible in the UI. + +To publish a new module: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to publish a module. + +2. Select **Registry** from the sidebar. + +3. Click **Publish** and select **Module**. + + The **Add Module** page appears with a list of available repositories. + +4. Select the repository containing the module you want to publish. + + You can search the list by typing part or all of a repository name into the filter field. Remember that VCS providers use `/` strings to locate repositories. The namespace is an organization name for most providers, but Bitbucket Data Center, not Bitbucket Cloud, uses project keys, like `INFRA`. + +5. When prompted, choose either the **Tag** or **Branch** module publishing type. + +6. (Optional) If this module is a [no-code ready module](/terraform/enterprise/no-code-provisioning/module-design), select the **Add Module to no-code provision allowlist** checkbox. + +7. Click **Publish module**. + + HCP Terraform displays a loading page while it imports the module versions and then takes you to the new module's details page. On the details page, you can view available versions, read documentation, and copy a usage example. + + + +@include 'tfc-package-callouts/nocode.mdx' + + + +### Tag-based publishing considerations + +When using the **Tag** module publishing type, the registry uses `x.y.z` formatted release tags to identify module versions. Your repository must contain at least one release tag for you to publish a module. Release tag names must be a [semantic version](http://semver.org), which you can optionally prefix with a `v`. For example, `v1.0.4` and `0.9.2`. The registry ignores tags that do not match these formats. + + + +### Branch-based publishing considerations + +When using the **Branch** module publishing type, you must provide the name of an existing branch in your VCS repository and give the module a **Module version**. Your VCS repository does not need to contain a matching tag or release. + +You can only enable testing on modules published using branch-based publishing. Refer to the [test-integrated modules](/terraform/enterprise/registry/test) documentation for more information. + + + +## Releasing New Versions of a Module + + + +The process to release a new module version differs between the tag-based and branch-based publishing workflows. + +### Tag-Based Publishing Workflow + + + +To release a new version of a module in the tag-based publishing workflow, push a new release tag to its VCS repository. The registry automatically imports the new version. + +Refer to [Preparing a Module Repository](#preparing-a-module-repository) for details about release tag requirements. + + + +### Branch-Based Publishing Workflow + +To release a new version of a module using the branch-based publishing workflow, navigate to the module overview screen, then click the **Publish New Version** button. Select the commit SHA that the new version will point to, and assign a new module version. You cannot re-use an existing module version. + +## Update Publish Settings + +After publishing your module, you can change between tag-based and branch-based publishing. To update your module's publish settings, navigate to the the module overview page, click the **Manage Module for Organization** dropdown, and then click **Publish Settings**. + +- To change from tag-based to branch-based publishing, you must configure a **Module branch** and [create a new module version](#branch-based-publishing-workflow), as HCP Terraform will not automatically create one. + +- To change from branch-based publishing to tag-based publishing, you must create at least one tag in your VCS repository. + + + +## Deleting Versions and Modules + +-> **Note:** Deleting a tag from your VCS repository does not automatically remove the version from the private registry. + +You can delete individual versions of a module or the entire module. If deleting a module version would leave a module with no versions, HCP Terraform removes the entire module. To delete a module or version: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the module's details page. + +2. If you want to delete a single version, use the **Versions** menu to select it. + +3. Click **Delete module**. + +4. Select an action from the menu: + + - **Delete only this module version:** Deletes only the version of the module you were viewing when you clicked **Delete module**. + - **Delete all versions for this provider for this module:** Deletes the entire module for a single provider. This action is important if you have modules with the same name but with different providers. For example, if you have module repos named `terraform-aws-appserver` and `terraform-azure-appserver`, the registry treats them as alternate providers of the same `appserver` module. + - **Delete all providers and versions for this module:** Deletes all modules with this name, even if they are from different providers. For example, this action deletes both `terraform-aws-appserver` and `terraform-azure-appserver`. + +5. Type the module name and click **Delete**. + +### Restoring a Deleted Module or Version + +Deletion is permanent, but there are ways to restore deleted modules and module versions. + +- To restore a deleted module, re-add it as a new module. +- To restore a deleted version, either delete the corresponding tag from your VCS and push a new tag with the same name, or delete the entire module from the registry and re-add it. + +## Sharing Modules Across Organizations + +HCP Terraform does not typically allow one organization's workspaces to use private modules from a different organization. This restriction is because HCP Terraform gives Terraform temporary credentials to access modules that are only valid for that workspace's organization. Although it is possible to mix modules from multiple organizations when you run Terraform on the command line, we strongly recommend against it. + +Instead, you can share modules across organizations by sharing the underlying VCS repository. Grant each organization access to the module's repository, and then add the module to each organization's registry. When you push tags to publish new module versions, both organizations update accordingly. + +Terraform Enterprise administrators can configure [module sharing](/terraform/enterprise/admin/application/registry-sharing) to allow organizations to use private modules from other organizations. + +## Generating Module Tests (Beta) + +You can generate and run generated tests for your module with [the `terraform test` command](/terraform/cli/commands/test). + +Before you can generate tests for a module, it must have at least one version published. Tests can only be generated once per module and are intended to be reviewed by the module's authors before being checked into version control and maintained with the rest of the module's content. If the module's configuration files exceed 128KB in total size, HCP Terraform will not be able to generate tests for that module. + +You must have [permission to manage registry modules](/terraform/enterprise/users-teams-organizations/permissions#manage-private-registry) and [permission to manage module test generation](/terraform/enterprise/users-teams-organizations/permissions#manage-module-test-generation-beta) to generate tests. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/publish-providers.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/publish-providers.mdx new file mode 100644 index 000000000..a7a1d6f81 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/publish-providers.mdx @@ -0,0 +1,266 @@ +--- +page_title: Publish private providers to the Terraform Enterprise private registry +description: >- + Use the Terraform Enterprise private registry to publish and share private + providers across your organization. +source: terraform-docs-common +--- + +# Publish private providers to the HCP Terraform private registry + +In addition to [curating public providers from the Terraform Registry](/terraform/enterprise/registry/add), you can publish private providers to an organization's HCP Terraform private registry. Once you have published a private provider through the API, members of your organization can search for it in the private registry UI and use it in configurations. + +## Requirements + +Review the following before publishing a new provider or provider version. + +### Permissions + +Users must be members of an organization to access its registry and private providers. In Terraform Enterprise, providers are also available to organizations that you configure to [share registry access](/terraform/enterprise/admin/application/registry-sharing). + +You must be a member of the [owners team](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) or a team with [Manage Private Registry permissions](/terraform/enterprise/users-teams-organizations/permissions#manage-private-registry) to publish and delete private providers from the private registry. + +### Release files + +You must publish at least one version of your provider that follows [semantic versioning format](http://semver.org). For each version, you must upload the `SHA256SUMS` file, `SHA256SUMS.sig` file, and one or more provider binaries. Using GoReleaser to [create a release on GitHub](/terraform/registry/providers/publishing#creating-a-github-release) or [create a release locally](/terraform/registry/providers/publishing#using-goreleaser-locally) generates these files automatically. The private registry does not have strict naming conventions, but we recommend using GoReleaser file naming schemes for consistency. + +Private providers do not currently support documentation. + +### Signed releases + +GPG signing is required for private providers, and you must upload the public key of the GPG keypair used to sign the release. Refer to [Preparing and Adding a Signing Key](/terraform/registry/providers/publishing#preparing-and-adding-a-signing-key) for more details. Unlike the public Terraform Registry, the private registry does not automatically upload new releases. You must manually add new provider versions and the associated release files. + +-> **Note**: If you are using the [provider API](/terraform/enterprise/api-docs/private-registry/providers) to upload an official HashiCorp public provider into your private registry, use [HashiCorp's public PGP key](https://www.hashicorp.com/.well-known/pgp-key.txt). You do not need to upload this public key, and it is automatically included in Terraform Enterprise version v202309-1 and newer. + +## Publishing a provider + +Before consumers can use a private provider, you must do the following: + +1. [Create the provider](#create-the-provider) +2. [Upload a GPG signing key](#add-your-public-key) +3. [Create at least one version](#create-a-version) +4. [Create at least one platform for that version](#create-a-provider-platform) +5. [Upload release files](#upload-provider-binary) + +### Create the provider + +Create a file named `provider.json` with the following contents. Replace `PROVIDER_NAME` with the name of your provider and replace `ORG_NAME` with the name of your organization. + +```json +{ + "data": { + "type": "registry-providers", + "attributes": { + "name": "PROVIDER_NAME", + "namespace": "ORG_NAME", + "registry-name": "private" + } + } +} +``` + +Use the [Create a Provider endpoint](/terraform/enterprise/api-docs/private-registry/providers#create-a-provider) to create the provider in HCP Terraform. Replace `TOKEN` in the `Authorization` header with your HCP Terraform API token and replace `ORG_NAME` with the name of your organization. + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @provider.json \ + https://app.terraform.io/api/v2/organizations/ORG_NAME/registry-providers +``` + +The provider is now available in your organization’s HCP Terraform private registry, but consumers cannot use it until you add a version and a platform. + +To create a version and a platform, you need the following resources: + +- The Provider binaries +- A public GPG signing key +- A `SHA256SUMS` file +- A `SHA256SUMS.sig` file from at least one release + +### Add your public key + +-> **Note**: If you are uploading an official HashiCorp public provider into your private registry, skip this step and instead use [HashiCorp's public PGP key](https://www.hashicorp.com/.well-known/pgp-key.txt) in the the [create a version](#create-a-version) step. The key ID for HashiCorp's public ID is `34365D9472D7468F`, and you can verify the ID by [importing the public key locally](/terraform/tutorials/cli/verify-archive#download-and-import-hashicorp-s-public-key). + +Create a file named `key.json` with the following contents. Replace `ORG_NAME` with the name of your organization, and input your public key in an RSA or DSA format in the `ascii-armor` field. + +```hcl +{ + "data": { + "type": "gpg-keys", + "attributes": { + "namespace": "ORG_NAME", + "ascii-armor": "-----BEGIN PGP PUBLIC KEY BLOCK-----\n\nmQINB...=txfz\n-----END PGP PUBLIC KEY BLOCK-----\n" + } } +} +``` + +Use the [Add a GPG key endpoint](/terraform/enterprise/api-docs/private-registry/gpg-keys#add-a-gpg-key) to add the public key that matches the signing key for the release. Replace `TOKEN` in the `Authorization` header with your HCP Terraform API token. + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @key.json \ + https://app.terraform.io/api/registry/private/v2/gpg-keys +``` + +The response contains a `key-id` that you will use to create a provider version. + +```json +"key-id": "34365D9472D7468F" +``` + +### Create a version + +Create a file named `version.json` with the following contents. Replace the value of the `version` field with the version of your provider, and replace the `key-id` field with the id of the GPG key that you created in the [Add your public key](#add-your-public-key) step. If you are uploading an official HashiCorp public provider, use the value `34365D9472D7468F` for your `key-id`. + +```hcl +{ + "data": { + "type": "registry-provider-versions", + "attributes": { + "version": "5.14.0", + "key-id": "34365D9472D7468F", + "protocols": ["5.0"] + } + } +} +``` + +Use the [Create a Provider Version endpoint](/terraform/enterprise/api-docs/private-registry/provider-versions-platforms#create-a-provider-version) to create a version for your provider. Replace `TOKEN` in the `Authorization` header with your HCP Terraform API token, and replace both instances of `ORG_NAME` with the name of your organization. If are not using the `aws` provider, then replace `aws` with your provider's name. + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @version.json \ + https://app.terraform.io/api/v2/organizations/ORG_NAME/registry-providers/private/ORG_NAME/aws/versions +``` + + The response includes URL links that you will use to upload the `SHA256SUMS` and `SHA256.sig` files. + +```json +"links": { + "shasums-upload": "https://archivist.terraform.io/v1/object/dmF1b64hd73ghd63", + "shasums-sig-upload": "https://archivist.terraform.io/v1/object/dmF1b37dj37dh33d" + } +``` + +### Upload signatures + +Upload the `SHA256SUMS` and `SHA256SUMS.sig` files to the URLs [returned in the previous step](#create-a-version). The example command below uploads the files from your local machine. First upload the `SHA256SUMS` file to the URL returned in the `shasums-upload` field. + +```shell-session +$ curl \ + -T terraform-provider-aws_5.14.0_SHA256SUMS \ + https://archivist.terraform.io/v1/object/dmF1b64hd73ghd63... +``` + +Next, upload the `SHA256SUMS.sig` file to the URL returned in the `shasums-sig-upload` field. + +```shell-session +$ curl \ + -T terraform-provider-aws_5.14.0_SHA256SUMS.72D7468F.sig \ + https://archivist.terraform.io/v1/object/dmF1b37dj37dh33d... +``` + +### Create a provider platform + +First, calculate the SHA256 hash of the provider binary that you intend to upload. This should match the SHA256 hash of the file listed in the `SHA256SUMS` file. + +```shell-session +$ shasum -a 256 terraform-provider-aws_5.14.0_linux_amd64.zip +f1d83b3e5a29bae471f9841a4e0153eac5bccedbdece369e2f6186e9044db64e terraform-provider-aws_5.14.0_linux_amd64.zip +``` + +Next, create a file named `platform.json`. Replace the `os`, `arch`, `filename`, and `shasum` fields with the values that match the provider you intend to upload. + +```json +{ + "data": { + "type": "registry-provider-version-platforms", + "attributes": { + "os": "linux", + "arch": "amd64", + "shasum": "f1d83b3e5a29bae471f9841a4e0153eac5bccedbdece369e2f6186e9044db64e", + "filename": "terraform-provider-aws_5.14.0_linux_amd64.zip" + } + } +} +``` + +Use the [Create a Provider Platform endpoint](/terraform/enterprise/api-docs/private-registry/provider-versions-platforms#create-a-provider-platform) to create a platform for the version. Platforms are binaries that allow the provider to run on a particular operating system and architecture combination (e.g., Linux and AMD64). Replace `TOKEN` in the `Authorization` header with your HCP Terraform API token and replace both instances of `ORG_NAME` with the name of your organization. + +```shell-session +$ curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @platform.json \ + https://app.terraform.io/api/v2/organizations/ORG_NAME/registry-providers/private/ORG_NAME/aws/versions/5.14.0/platforms +``` + +The response includes a `provider-binary-upload` URL that you will use to upload the binary file for the platform. + +```json +"links": { + "provider-binary-upload": "https://archivist.terraform.io/v1/object/dmF1b45c367djh45nj78" + } +``` + +### Upload provider binary + +Upload the platform binary file to the `provider-binary-upload` URL returned in the [previous step](#create-a-version). The example command below uploads the binary from your local machine. + +```shell-session +$ curl -T local-example/terraform-provider-random_5.14.0_linux_amd64.zip + https://archivist.terraform.io/v1/object/dmF1b45c367djh45nj78 +``` + +The version is available in the HCP Terraform user interface. Consumers can now begin using this provider version in configurations. You can repeat these steps starting from [Create a provider platform](#create-a-provider-platform) to add additional platform binaries for the release. + +## Checking Release Files + +Consumers cannot use a private provider version until you upload all required [release files](#release-files). To determine whether these files have been uploaded: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to publish a private provider. +2. Click **Registry** and click the private provider to go to its details page. +3. Use the version menu to navigate to the version you want to check. The UI shows a warning banner for versions that do not have all required release files. +4. Open the **Manage Provider** menu and select **Show release files**. The **Release Files** page appears containing lists of uploaded and missing files for the current version. + +## Managing private providers + +Use the HCP Terraform API to create, read, update, and delete the following: + +- [GPG keys](/terraform/enterprise/api-docs/private-registry/gpg-keys) +- [Private providers](/terraform/enterprise/api-docs/private-registry/providers) +- [Provider versions and platforms](/terraform/enterprise/api-docs/private-registry/provider-versions-platforms) + +## Deleting private providers and versions + +In addition to the [Registry Providers API](/terraform/enterprise/api-docs/private-registry/providers#delete-a-provider), you can delete providers and provider versions through the HCP Terraform UI. To delete providers and versions in the UI: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization whose private registry you want to delete a provider or provider version from. + +2. Click **Registry** and click the private provider to go to its details page. + +3. If you want to delete a single version, use the **Versions** menu to select it. + +4. Open the **Manage Provider** menu and select **Delete Provider**. The **Delete Provider from Organization** box appears. + +5. Select an action from the menu: + + - **Delete only this provider version:** Deletes only the version of the provider you are currently viewing. + - **Delete all versions for this provider:** Deletes the entire provider and all associated versions. + +6. Type the provider name into the confirmation box and click **Delete**. + +The provider version or entire provider has been deleted from this organization's private registry and its data has been removed. Consumers will no longer be able to reference it in configurations. + +### Restoring a deleted provider + +Deletion is permanent, but you can restore a deleted private provider by re-adding it to your organization and recreating its versions and platforms. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/test.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/test.mdx new file mode 100644 index 000000000..9b2f7084f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/test.mdx @@ -0,0 +1,69 @@ +--- +page_title: Test private modules in the Terraform Enterprise private registry +description: Use the Terraform Enterprise private registry to run module tests. +source: terraform-docs-common +--- + +# Test private modules in the HCP Terraform private registry + +You can configure HCP Terraform to automatically run tests for modules in your private registry. When enabled, HCP Terraform will run tests for every commit to the designated branch. This lets you verify that it is safe to publish new module versions. + +## Enable testing + +If your module uses the [branch-based publishing workflow](/terraform/enterprise/registry/publish-modules#branch-based-publishing) and its source code includes [tests](/terraform/language/v1.6.x/tests), you can enable testing at any time. + +To enable testing when you publish your module: + +- Choose the **Branch** module publishing type +- Assign a branch and a module version +- Under testing, click the **Enable testing for module** checkbox +- Click **Publish module** + +To enable testing after you publishing your branch-based module: + +- Navigate to the module overview screen +- Click **Configure Tests** to open the **Tests Settings** screen +- Click **Enable testing for module** + +## Run tests remotely from the CLI + +After publishing and enabling testing for your module, you can use the Terraform CLI locally to trigger remotely-executed tests in HCP Terraform. This lets you test your module changes using the credentials configured in HCP Terraform without committing your changes to version control. + +To run your tests remotely, use the `-cloud-run` flag with the path to your module in your private registry. + +```shell +terraform test -cloud-run=app.terraform.io/:ORG/:MODULE_NAME/:PROVIDER +``` + +## Configure environment variables + +You can define test-specific environment variables that HCP Terraform will use for testing. If your tests provision infrastructure, you must configure provider credentials for the module. + +To add environment variables to your module's tests: + +1. On the module overview screen, click **Configure Tests**. +2. In the **Variables** section on the **Tests Settings** screen, click **+ Add variable**. +3. Provide a **Key** and **Value** for your environment variable, and if you want to protect the variable's value, click the **Sensitive** checkbox. `TF_VAR_x` variables of a string type that are not defined in a config must be wrapped in double-quotes. +4. Click **Add variable** to save it. + + + +## Generated module tests + +~> **Note**: Generated module tests are available in HCP Terraform **Plus** Edition and are in public beta. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. + +HCP Terraform can generate [test files](/terraform/language/tests) for any private module in your registry. You can only generate tests one time per module. + +To generate tests for your module: + +1. On the module overview screen, click **Generate tests**. +2. Click **Confirm**. It will take a few minutes to generate your module tests. +3. HCP Terraform displays generated configuration. To download all of the test files, click **Download generated tests**. +4. Create a `tests` directory in your configuration. +5. Unzip the downloaded files into the new `tests` directory. + +Generated test files remain available on the module overview page for later retrieval. Click **View test files** to view and download any previously generated tests. + +Organization owners can control this feature on the organization's [General Settings](/terraform/enterprise/users-teams-organizations/organizations#organization-settings) page. + + diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/registry/using.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/using.mdx new file mode 100644 index 000000000..98542f2bd --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/registry/using.mdx @@ -0,0 +1,149 @@ +--- +page_title: Use providers and modules from the Terraform Enterprise private registry +description: >- + Learn how to use providers and modules from the Terraform Enterprise private + registry in your Terraform configuration. +source: terraform-docs-common +--- + +# Use providers and modules from the HCP Terraform private registry + +All users in an organization can view the HCP Terraform private registry and use the available providers and modules. A private registry has some key requirements and differences from the [public Terraform Registry](/terraform/registry): + +- **Location:** Search for providers, modules, and usage examples in the HCP Terraform private registry UI. +- **Provider and Module block `source` argument:** Private providers and modules use a [different format](/terraform/enterprise/registry/using#using-private-providers-and-modules-in-configurations). +- **Terraform version:** HCP Terraform workspaces using version 0.11 and higher can automatically access your private modules during Terraform runs, and workspaces using version 0.13 and higher can also automatically access private providers. +- **Authentication:** If you run Terraform on the command line, you must [authenticate](/terraform/enterprise/registry/using#authentication) to HCP Terraform or your instance to use providers and modules in your organization’s private registry. + +HCP Terraform supports using modules in written configuration or through the [no-code provisioning workflow](/terraform/enterprise/no-code-provisioning/provisioning). + +## Finding Providers and Modules + +To find available providers and modules, click the **Registry** button. The **Registry** page appears. + +Click **Providers** and **Modules** to toggle back and forth between lists of available providers and modules in the private registry. You can also use the search field to filter for titles that contain a specific keyword. The search does not include READMEs or resource details. + +### Shared Providers and Modules - Terraform Enterprise + +On Terraform Enterprise, your [registry sharing](/terraform/enterprise/admin/application/registry-sharing) configuration may grant you access to another organization's providers and modules. Providers and modules that are shared with your current organization have a **Shared** badge in the private registry (below). Providers and modules in your current organization that are shared with other organizations have a badge that says **Sharing**. + +### Viewing Provider and Module Details and Versions + +Click a provider or module to view its details page. Use the **Versions** menu in the upper right to switch between the available versions, and use the **Readme**, **Inputs**, **Outputs**, **Dependencies**, and **Resources** tabs to view more information about the selected version. + +### Viewing Nested Modules and Examples + +Use the **Submodules** menu to navigate to the detail pages for any nested modules. Use the **Examples** menu to navigate to the detail pages for any available example modules. + +## Provisioning Infrastructure from No-Code Ready Modules + +You can use modules marked **No-Code Ready** to create a new workspace and automatically provision the module's resources without writing any Terraform configuration. Refer to [Provisioning No-Code Infrastructure](/terraform/enterprise/no-code-provisioning/provisioning) for details. + +## Using Public Providers and Modules in Configurations + +> **Hands-on:** Try the [Use Modules from the Registry](/terraform/tutorials/modules/module-use) tutorial. + +The syntax for public providers in a private registry is the same as for providers that you use directly from the public Terraform Registry. The syntax for the [provider block](/terraform/language/providers/configuration#provider-configuration-1) `source` argument is `/`. + +```hcl +terraform { + required_providers { + google = { + source = "hashicorp/google" + version = "4.0.0" + } + } +``` + +The syntax for referencing public modules in the [module block](/terraform/language/modules/syntax) `source` argument is `//`. + +```hcl +module "subnets" { + source = "hashicorp/subnets/cidr" + version = "1.0.0" +} +``` + +## Using Private Providers and Modules in Configurations + +The syntax for referencing private providers in the [provider block](/terraform/language/providers/configuration#provider-configuration-1) `source` argument is `//`. For the SaaS version of HCP Terraform, the hostname is `app.terraform.io`. + +```hcl +terraform { + required_providers { + random = { + source = "app.terraform.io/demo-custom-provider/random" + version = "1.1.0" + } + } +``` + +The syntax for referencing private modules in the [module block](/terraform/language/modules/syntax) `source` argument is `///`. + +- **Hostname:** For the SaaS version of HCP Terraform, use `app.terraform.io`. In Terraform Enterprise, use the hostname for your instance or the [generic hostname](/terraform/enterprise/registry/using#generic-hostname-terraform-enterprise). +- **Organization:** If you are using a shared module with Terraform Enterprise, the module's organization name may be different from your organization's name. Check the source string at the top of the module's registry page to find the proper organization name. + +```hcl +module "vpc" { + source = "app.terraform.io/example_corp/vpc/aws" + version = "1.0.4" +} +``` + +### Generic Hostname - HCP Terraform and Terraform Enterprise + +You can use the generic hostname `localterraform.com` in module sources to reference modules without modifying the HCP Terraform or Terraform Enterprise instance. When you run Terraform, it automatically requests any `localterraform.com` modules from the instance it runs on. + +```hcl +module "vpc" { + source = "localterraform.com/example_corp/vpc/aws" + version = "1.0.4" +} +``` + +~> **Important**: CLI-driven workflows require Terraform CLI v1.4.0 or above. + +To test configurations on a developer workstation without the remote backend configured, you must replace the generic hostname with a literal hostname in all module sources and then change them back before committing to VCS. We are working on making this workflow smoother, but we only recommend `localterraform.com` for large organizations that use multiple Terraform Enterprise instances. + +### Provider and Module Availability + +A workspace can only use private providers and modules from its own organization's registry. When using providers or modules from multiple organizations in the same configuration, we recommend: + +- **HCP Terraform:** [Add providers and modules to the registry](/terraform/enterprise/registry/publish-modules#sharing-modules-across-organizations) for each organization that requires access. + +- **Terraform Enterprise:** Check your site's [registry sharing](/terraform/enterprise/admin/application/registry-sharing) configuration. Workspaces can also use private providers and modules from organizations that are sharing with the workspace's organization. + +## Running Configurations with Private Providers and Modules + +### Version Requirements + +Terraform version 0.11 or later is required to use private modules in HCP Terraform workspaces and to use the CLI to apply configurations with private modules. Terraform version 0.13 and later is required to use private providers in HCP Terraform workspaces and apply configurations with private providers. + +### Authentication + +To authenticate with HCP Terraform, you can use either a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or a [team token](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens). The type of token you choose may grant different permissions. + +- **User Token**: Allows you to access providers and modules from any organization in which you are a member. You are a member of an organization if you belong to any team in that organization. You can also access modules from any organization that is sharing modules with any of your organizations. + + -> **Note:** When SAML SSO is enabled, there is a [session timeout for user API tokens](/terraform/enterprise/saml/login#api-token-expiration), requiring you to periodically re-authenticate through the web UI. Expired tokens produce a _401 Unauthorized_ error. A SAML SSO account with [IsServiceAccount](/terraform/enterprise/saml/attributes#isserviceaccount) is treated as a service account and will not have the session timeout. + +- **Team Token**: Allows you to access the private registry of that team's organization and the registries from any other organizations that have configured sharing. + +_Permissions Example_ + +A user belongs to three organizations (1, 2, and 3), and organizations 1 and 2 share access with each other. In this case, the user's token gives them access to the private registries for all of the organizations they belong to: 1, 2, and 3. However, a team token from a team in organization 1 only gives the user access to the private registry in organizations 1 and 2. + +#### Configure Authentication + +To configure authentication to HCP Terraform or your Terraform Enterprise instance, you can: + +- (Terraform 0.12.21 or later) Use the [`terraform login`](/terraform/cli/commands/login) command to obtain and save a user API token. +- Create a token and [manually configure credentials in the CLI config file][cli-credentials]. + +Make sure the hostname matches the hostname you use in provider and module sources because if the same HCP Terraform server is available at two hostnames, Terraform will not know that they reference the same server. To support multiple hostnames for provider and module sources, use the `terraform login` command multiple times and specify a different hostname each time. + +[user-token]: /terraform/enterprise/users-teams-organizations/users#api-tokens + +[cli-credentials]: /terraform/cli/config/config-file#credentials + +[permissions-citation]: #intentionally-unused---keep-for-maintainers diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2018/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2018/index.mdx new file mode 100644 index 000000000..e95e30039 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2018/index.mdx @@ -0,0 +1,31 @@ +--- +page_title: 2018 Releases - Terraform Enterprise +description: The 2018 Terraform Enterprise releases. +--- + +# Terraform Enterprise Releases - 2018 + +Terraform Enterprise releases from 2018 are listed in the table below. + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI** | Sentinel | +| ----------- | ---------------- | ------------------------------------------------------------------ | ----------------------------------------------------------------------- | ------------------------------------------------------------------------------ | +| v201812-2\* | 314 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.10](https://github.com/hashicorp/terraform/releases/tag/v0.11.10) | [0.6.0](https://docs.hashicorp.com/sentinel/changelog#0-6-0-november-30-2018) | +| v201812-1 | 311 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.10](https://github.com/hashicorp/terraform/releases/tag/v0.11.10) | [0.6.0](https://docs.hashicorp.com/sentinel/changelog#0-6-0-november-30-2018) | +| v201811-1 | 307 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.4.0](https://docs.hashicorp.com/sentinel/changelog#0-4-0-october-1-2018) | +| v201810-2 | 299 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.4.0](https://docs.hashicorp.com/sentinel/changelog#0-4-0-october-1-2018) | +| v201810-1 | 296 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.4.0](https://docs.hashicorp.com/sentinel/changelog#0-4-0-october-1-2018) | +| v201809-1\* | 291 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.3.1](https://docs.hashicorp.com/sentinel/changelog#0-3-1-august-3-2018) | +| v201808-2 | 288 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.3.1](https://docs.hashicorp.com/sentinel/changelog#0-3-1-august-3-2018) | +| v201808-1 | 284 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.3.1](https://docs.hashicorp.com/sentinel/changelog#0-3-1-august-3-2018) | +| v201807-2 | 281 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.3.0](https://docs.hashicorp.com/sentinel/changelog#0-3-0-july-20-2018) | +| v201807-1 | 278 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.2.0](https://docs.hashicorp.com/sentinel/changelog#0-2-0-april-11-2018) | +| v201806-2 | 275 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.2.0](https://docs.hashicorp.com/sentinel/changelog#0-2-0-april-11-2018) | +| v201806-1 | 272 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.2.0](https://docs.hashicorp.com/sentinel/changelog#0-2-0-april-11-2018) | +| v201805-1\* | 263 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.7](https://github.com/hashicorp/terraform/releases/tag/v0.11.7) | [0.2.0](https://docs.hashicorp.com/sentinel/changelog#0-2-0-april-11-2018) | +| v201804-3\* | 259 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.1](https://github.com/hashicorp/terraform/releases/tag/v0.11.1) | [0.2.0](https://docs.hashicorp.com/sentinel/changelog#0-2-0-april-11-2018) | +| v201804-2\* | 255 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.1](https://github.com/hashicorp/terraform/releases/tag/v0.11.1) | [0.1.0](https://docs.hashicorp.com/sentinel/changelog#0-1-0-september-19-2017) | +| v201804-1\* | 251 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.1](https://github.com/hashicorp/terraform/releases/tag/v0.11.1) | [0.1.0](https://docs.hashicorp.com/sentinel/changelog#0-1-0-september-19-2017) | + +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2019/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2019/index.mdx new file mode 100644 index 000000000..99c26d62f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2019/index.mdx @@ -0,0 +1,45 @@ +--- +page_title: 2019 Releases - Terraform Enterprise +description: The 2019 Terraform Enterprise releases. +--- + +# Terraform Enterprise Releases - 2019 + +Terraform Enterprise releases from 2019 are listed in the table below. + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI** | Sentinel | +| ----------- | ---------------- | -------------------------------------------------------------------- | ----------------------------------------------------------------------- | ------------------------------------------------------------------------------- | +| v201912-4 | 408 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.17](https://github.com/hashicorp/terraform/releases/tag/v0.12.17) | [0.13.0](https://docs.hashicorp.com/sentinel/changelog#0-13-0-november-15-2019) | +| v201912-3 | 407 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.17](https://github.com/hashicorp/terraform/releases/tag/v0.12.17) | [0.13.0](https://docs.hashicorp.com/sentinel/changelog#0-13-0-november-15-2019) | +| v201912-2 | 406 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.17](https://github.com/hashicorp/terraform/releases/tag/v0.12.17) | [0.13.0](https://docs.hashicorp.com/sentinel/changelog#0-13-0-november-15-2019) | +| v201912-1\* | 405 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.17](https://github.com/hashicorp/terraform/releases/tag/v0.12.17) | [0.13.0](https://docs.hashicorp.com/sentinel/changelog#0-13-0-november-15-2019) | +| v201911-3 | 403 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.12.0](https://docs.hashicorp.com/sentinel/changelog#0-12-0-october-7-2019) | +| v201911-2 | 400 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.12.0](https://docs.hashicorp.com/sentinel/changelog#0-12-0-october-7-2019) | +| v201911-1 | 397 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.12.0](https://docs.hashicorp.com/sentinel/changelog#0-12-0-october-7-2019) | +| v201910-1 | 394 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.11.0](https://docs.hashicorp.com/sentinel/changelog#0-12-0-october-7-2019) | +| v201909-3 | 390 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.10.4](https://docs.hashicorp.com/sentinel/changelog#0-12-0-october-7-2019) | +| v201909-2 | 387 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.10.4](https://docs.hashicorp.com/sentinel/changelog#0-12-0-october-7-2019) | +| v201909-1 | 384 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.10.4](https://docs.hashicorp.com/sentinel/changelog#0-12-0-october-7-2019) | +| v201908-2 | 381 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.10.2](https://docs.hashicorp.com/sentinel/changelog#0-10-2-june-25-2019) | +| v201908-1 | 378 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.10.2](https://docs.hashicorp.com/sentinel/changelog#0-10-2-june-25-2019) | +| v201907-1 | 374 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.10.2](https://docs.hashicorp.com/sentinel/changelog#0-10-2-june-25-2019) | +| v201906-2 | 370 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.10.1](https://docs.hashicorp.com/sentinel/changelog#0-10-1-may-9-2019) | +| v201906-1 | 367 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.2](https://github.com/hashicorp/terraform/releases/tag/v0.12.2) | [0.10.1](https://docs.hashicorp.com/sentinel/changelog#0-10-1-may-9-2019) | +| v201905-4 | 363 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.13](https://github.com/hashicorp/terraform/releases/tag/v0.11.13) | [0.10.0](https://docs.hashicorp.com/sentinel/changelog#0-10-0-april-18-2019) | +| v201905-3 | 360 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.13](https://github.com/hashicorp/terraform/releases/tag/v0.11.13) | [0.10.0](https://docs.hashicorp.com/sentinel/changelog#0-10-0-april-18-2019) | +| v201905-2 | 357 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.13](https://github.com/hashicorp/terraform/releases/tag/v0.11.13) | [0.10.0](https://docs.hashicorp.com/sentinel/changelog#0-10-0-april-18-2019) | +| v201905-1 | 354 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.13](https://github.com/hashicorp/terraform/releases/tag/v0.11.13) | [0.10.0](https://docs.hashicorp.com/sentinel/changelog#0-10-0-april-18-2019) | +| v201904-1 | 350 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.13](https://github.com/hashicorp/terraform/releases/tag/v0.11.13) | [0.9.2](https://docs.hashicorp.com/sentinel/changelog#0-9-2-march-15-2019) | +| v201903-1 | 346 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.13](https://github.com/hashicorp/terraform/releases/tag/v0.11.13) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | +| v201902-2\* | 343 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.11](https://github.com/hashicorp/terraform/releases/tag/v0.11.11) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | +| v201902-1 | 340 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.11](https://github.com/hashicorp/terraform/releases/tag/v0.11.11) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | +| v201901-6 | 337 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.11](https://github.com/hashicorp/terraform/releases/tag/v0.11.11) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | +| v201901-5 | 334 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.11](https://github.com/hashicorp/terraform/releases/tag/v0.11.11) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | +| v201901-4 | 331 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.11.11](https://github.com/hashicorp/terraform/releases/tag/v0.11.11) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | +| v201901-3 | 327 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.11](https://github.com/hashicorp/terraform/releases/tag/v0.11.11) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | +| v201901-2 | 324 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.11](https://github.com/hashicorp/terraform/releases/tag/v0.11.11) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | +| v201901-1 | 319 | [2.9.2](https://release-notes.replicated.com/release-notes/2.9.2/) | [0.11.11](https://github.com/hashicorp/terraform/releases/tag/v0.11.11) | [0.8.1](https://docs.hashicorp.com/sentinel/changelog#0-8-1-january-17-2019) | + +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2020/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2020/index.mdx new file mode 100644 index 000000000..7f1e3c614 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2020/index.mdx @@ -0,0 +1,43 @@ +--- +page_title: 2020 Releases - Terraform Enterprise +description: The 2020 Terraform Enterprise releases. +--- + +# Terraform Enterprise Releases - 2020 + +Terraform Enterprise releases from 2020 are listed in the table below. + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI** | Sentinel | +| ---------- | ---------------- | -------------------------------------------------------------------- | ----------------------------------------------------------------------- | ------------------------------------------------------------------------------ | +| v202012-2 | 502 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.5](https://github.com/hashicorp/terraform/releases/tag/v0.13.5) | [0.16.1](https://docs.hashicorp.com/sentinel/changelog#0-16-1-october-21-2020) | +| v202012-1 | 501 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.5](https://github.com/hashicorp/terraform/releases/tag/v0.13.5) | [0.16.1](https://docs.hashicorp.com/sentinel/changelog#0-16-1-october-21-2020) | +| v202011-2 | 487 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.5](https://github.com/hashicorp/terraform/releases/tag/v0.13.5) | [0.16.0](https://docs.hashicorp.com/sentinel/changelog#0-16-0-october-14-2020) | +| v202011-1 | 484 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.5](https://github.com/hashicorp/terraform/releases/tag/v0.13.5) | [0.16.0](https://docs.hashicorp.com/sentinel/changelog#0-16-0-october-14-2020) | +| v202010-2 | 479 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.3](https://github.com/hashicorp/terraform/releases/tag/v0.13.3) | [0.15.5](https://docs.hashicorp.com/sentinel/changelog#0-15-5-may-20-2020) | +| v202010-1 | 473 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.3](https://github.com/hashicorp/terraform/releases/tag/v0.13.3) | [0.15.5](https://docs.hashicorp.com/sentinel/changelog#0-15-5-may-20-2020) | +| v202009-2 | 462 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.0](https://github.com/hashicorp/terraform/releases/tag/v0.13.0) | [0.15.5](https://docs.hashicorp.com/sentinel/changelog#0-15-5-may-20-2020) | +| v202009-1 | 460 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.0](https://github.com/hashicorp/terraform/releases/tag/v0.13.0) | [0.15.5](https://docs.hashicorp.com/sentinel/changelog#0-15-5-may-20-2020) | +| v202008-1 | 454 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.28](https://github.com/hashicorp/terraform/releases/tag/v0.12.28) | [0.15.5](https://docs.hashicorp.com/sentinel/changelog#0-15-5-may-20-2020) | +| v202007-2 | 445 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.28](https://github.com/hashicorp/terraform/releases/tag/v0.12.28) | [0.15.5](https://docs.hashicorp.com/sentinel/changelog#0-15-5-may-20-2020) | +| v202007-1 | 444 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.28](https://github.com/hashicorp/terraform/releases/tag/v0.12.28) | [0.15.5](https://docs.hashicorp.com/sentinel/changelog#0-15-5-may-20-2020) | +| v202006-1 | 439 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.24](https://github.com/hashicorp/terraform/releases/tag/v0.12.24) | [0.15.5](https://docs.hashicorp.com/sentinel/changelog#0-15-5-may-20-2020) | +| v202005-2 | 430 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.24](https://github.com/hashicorp/terraform/releases/tag/v0.12.24) | [0.15.3](https://docs.hashicorp.com/sentinel/changelog#0-15-3-april-16-2020) | +| v202005-1 | 425 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.24](https://github.com/hashicorp/terraform/releases/tag/v0.12.24) | [0.15.3](https://docs.hashicorp.com/sentinel/changelog#0-15-3-april-16-2020) | +| v202004-3 | 424 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.24](https://github.com/hashicorp/terraform/releases/tag/v0.12.24) | [0.15.2](https://docs.hashicorp.com/sentinel/changelog#0-15-2-april-2-2020) | +| v202004-2 | 423 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.24](https://github.com/hashicorp/terraform/releases/tag/v0.12.24) | [0.15.2](https://docs.hashicorp.com/sentinel/changelog#0-15-2-april-2-2020) | +| v202004-1 | 422 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.24](https://github.com/hashicorp/terraform/releases/tag/v0.12.24) | [0.15.2](https://docs.hashicorp.com/sentinel/changelog#0-15-2-april-2-2020) | +| v202003-1 | 421 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.23](https://github.com/hashicorp/terraform/releases/tag/v0.12.23) | [0.15.1](https://docs.hashicorp.com/sentinel/changelog#0.15.1-october-21-2020) | +| v202002-2 | 419 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.20](https://github.com/hashicorp/terraform/releases/tag/v0.12.20) | [0.14.4](https://docs.hashicorp.com/sentinel/changelog#0-14-4-february-6-2020) | +| v202002-1b | 418 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.20](https://github.com/hashicorp/terraform/releases/tag/v0.12.20) | [0.14.4](https://docs.hashicorp.com/sentinel/changelog#0-14-4-february-6-2020) | +| v202002-1 | 417 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.20](https://github.com/hashicorp/terraform/releases/tag/v0.12.20) | [0.14.4](https://docs.hashicorp.com/sentinel/changelog#0-14-4-february-6-2020) | +| v202001-7 | 416 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.19](https://github.com/hashicorp/terraform/releases/tag/v0.12.19) | [0.14.2](https://docs.hashicorp.com/sentinel/changelog#0-14-2-january-15-2020) | +| v202001-6 | 415 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.19](https://github.com/hashicorp/terraform/releases/tag/v0.12.19) | [0.14.2](https://docs.hashicorp.com/sentinel/changelog#0-14-2-january-15-2020) | +| v202001-5 | 414 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.19](https://github.com/hashicorp/terraform/releases/tag/v0.12.19) | [0.14.2](https://docs.hashicorp.com/sentinel/changelog#0-14-2-january-15-2020) | +| v202001-4 | 413 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.19](https://github.com/hashicorp/terraform/releases/tag/v0.12.19) | [0.14.2](https://docs.hashicorp.com/sentinel/changelog#0-14-2-january-15-2020) | +| v202001-3 | 412 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.19](https://github.com/hashicorp/terraform/releases/tag/v0.12.19) | [0.14.2](https://docs.hashicorp.com/sentinel/changelog#0-14-2-january-15-2020) | +| v202001-2 | 411 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.19](https://github.com/hashicorp/terraform/releases/tag/v0.12.19) | [0.14.2](https://docs.hashicorp.com/sentinel/changelog#0-14-2-january-15-2020) | +| v202001-1 | 409 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.12.19](https://github.com/hashicorp/terraform/releases/tag/v0.12.19) | [0.14.2](https://docs.hashicorp.com/sentinel/changelog#0-14-2-january-15-2020) | + +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/index.mdx new file mode 100644 index 000000000..ef60a527f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/index.mdx @@ -0,0 +1,32 @@ +--- +page_title: 2021 Releases - Terraform Enterprise +description: The 2021 Terraform Enterprise releases. +--- + +# Terraform Enterprise Releases - 2021 + +Terraform Enterprise releases from 2021 are listed in the table below. + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI** | Sentinel | +| ------------------------------------------------------------ | ---------------- | -------------------------------------------------------------------- | --------------------------------------------------------------------- | ------------------------------------------------------------------------------ | +| [v202112-2](/terraform/enterprise/releases/2021/v202112-2) | 590 | [2.53.2](https://release-notes.replicated.com/release-notes/2.53.2/) | [1.0.11](https://github.com/hashicorp/terraform/releases/tag/v1.0.11) | [0.18.4](https://docs.hashicorp.com/sentinel/changelog#0-18-4-july-20-2021) | +| [v202112-1](/terraform/enterprise/releases/2021/v202112-1) | 588 | [2.53.2](https://release-notes.replicated.com/release-notes/2.53.2/) | [1.0.11](https://github.com/hashicorp/terraform/releases/tag/v1.0.11) | [0.18.4](https://docs.hashicorp.com/sentinel/changelog#0-18-4-july-20-2021) | +| [v202111-1](/terraform/enterprise/releases/2021/v202111-1) | 582 | [2.53.0](https://release-notes.replicated.com/release-notes/2.53.0/) | [1.0.9](https://github.com/hashicorp/terraform/releases/tag/v1.0.9) | [0.18.4](https://docs.hashicorp.com/sentinel/changelog#0-18-4-july-20-2021) | +| [v202110-1](/terraform/enterprise/releases/2021/v202110-1) | 576 | [2.52.0](https://release-notes.replicated.com/release-notes/2.52.0/) | [1.0.7](https://github.com/hashicorp/terraform/releases/tag/v1.0.7) | [0.18.4](https://docs.hashicorp.com/sentinel/changelog#0-18-4-july-20-2021) | +| [v202109-2](/terraform/enterprise/releases/2021/v202109-2) | 568 | [2.52.0](https://release-notes.replicated.com/release-notes/2.52.0/) | [1.0.5](https://github.com/hashicorp/terraform/releases/tag/v1.0.5) | [0.18.4](https://docs.hashicorp.com/sentinel/changelog#0-18-4-july-20-2021) | +| [v202109-1](/terraform/enterprise/releases/2021/v202109-1) | 565 | [2.52.0](https://release-notes.replicated.com/release-notes/2.52.0/) | [1.0.5](https://github.com/hashicorp/terraform/releases/tag/v1.0.5) | [0.18.4](https://docs.hashicorp.com/sentinel/changelog#0-18-4-july-20-2021) | +| [v202108-1](/terraform/enterprise/releases/2021/v202108-1) | 557 | [2.52.0](https://release-notes.replicated.com/release-notes/2.52.0/) | [1.0.3](https://github.com/hashicorp/terraform/releases/tag/v1.0.3) | [0.18.3](https://docs.hashicorp.com/sentinel/changelog#0-18-3-june-1-2021) | +| [v202107-1](/terraform/enterprise/releases/2021/v202107-1) | 550 | [2.50.0](https://release-notes.replicated.com/release-notes/2.50.0/) | [1.0.1](https://github.com/hashicorp/terraform/releases/tag/v1.0.1) | [0.18.3](https://docs.hashicorp.com/sentinel/changelog#0-18-3-june-1-2021) | +| [v202106-1](/terraform/enterprise/releases/2021/v202106-1) | 544 | [2.50.0](https://release-notes.replicated.com/release-notes/2.50.0/) | [1.0.0](https://github.com/hashicorp/terraform/releases/tag/v1.0.0) | [0.18.3](https://docs.hashicorp.com/sentinel/changelog#0-18-3-june-1-2021) | +| [v202105-1](/terraform/enterprise/releases/2021/v202105-1) | 534 | [2.50.0](https://release-notes.replicated.com/release-notes/2.50.0/) | [0.15.3](https://github.com/hashicorp/terraform/releases/tag/v0.15.3) | [0.18.1](https://docs.hashicorp.com/sentinel/changelog#0-18-1-may-11-2021) | +| [v202104-1](/terraform/enterprise/releases/2021/v202104-1) | 528 | [2.50.0](https://release-notes.replicated.com/release-notes/2.50.0/) | [0.15.0](https://github.com/hashicorp/terraform/releases/tag/v0.15.0) | [0.18.0](https://docs.hashicorp.com/sentinel/changelog#0-18-0-march-25-2021) | +| [v202103-3](/terraform/enterprise/releases/2021/v202103-3) | 523 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.14.7](https://github.com/hashicorp/terraform/releases/tag/v0.14.7) | [0.17.4](https://docs.hashicorp.com/sentinel/changelog#0-17-4-february-2-2021) | +| [v202103-2](/terraform/enterprise/releases/2021/v202103-2) | 520 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.14.7](https://github.com/hashicorp/terraform/releases/tag/v0.14.7) | [0.17.4](https://docs.hashicorp.com/sentinel/changelog#0-17-4-february-2-2021) | +| [v202103-1](/terraform/enterprise/releases/2021/v202103-1)\* | 519 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.14.7](https://github.com/hashicorp/terraform/releases/tag/v0.14.7) | [0.17.4](https://docs.hashicorp.com/sentinel/changelog#0-17-4-february-2-2021) | +| [v202102-2](/terraform/enterprise/releases/2021/v202102-2) | 509 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.5](https://github.com/hashicorp/terraform/releases/tag/v0.13.5) | [0.16.1](https://docs.hashicorp.com/sentinel/changelog#0-16-1-october-21-2020) | +| [v202102-1](/terraform/enterprise/releases/2021/v202102-1) | 507 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.5](https://github.com/hashicorp/terraform/releases/tag/v0.13.5) | [0.16.1](https://docs.hashicorp.com/sentinel/changelog#0-16-1-october-21-2020) | +| [v202101-1](/terraform/enterprise/releases/2021/v202101-1) | 504 | [2.29.0](https://release-notes.replicated.com/release-notes/2.29.0/) | [0.13.5](https://github.com/hashicorp/terraform/releases/tag/v0.13.5) | [0.16.1](https://docs.hashicorp.com/sentinel/changelog#0-16-1-october-21-2020) | + +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202101-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202101-1.mdx new file mode 100644 index 000000000..e27ee28a0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202101-1.mdx @@ -0,0 +1,24 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the known issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202101-1 (504) release. +--- + +# TFE Release v202101-1 (504) + +### Upcoming Deprecation Notifications: + +* The AWS CLI that ships with Terraform Enterprise will be upgraded to AWS CLI version 2 in the next Terraform Enterprise release (v202102-1). [Version 2 of the AWS CLI contains breaking changes](https://docs.aws.amazon.com/cli/latest/userguide/cliv2-migration.html) that could cause disruptions in custom builds. If you are currently using any AWS CLI features in your workspaces please prepare for the deprecation or migrate to a custom build image to continue using version AWS CLI version 1. + +### Application Level Breaking Changes: + +* The encryption password is no longer automatically generated and must be explicitly set by the user during installation. The encryption password can be set via the "Encryption Password" field for a manual installation and via the `enc_password` setting for an automated installation. Loss of the encryption password can lead to application data loss. To retrieve an installation's current encryption password, execute `replicatedctl app-config export --template '{{.enc_password.Value}}'`. + +### Application Level Features: + +* Enables the ability to run Terraform Enterprise in Active/Active configuration for increased reliability. If you’re interested in scaling your existing installation to two nodes, please reach out your Technical Account Manager for more information. + +### Application Level Bug Fixes: + +* Fixed issue where Forgot Password emails would not send. +* Updated the error message shown when the encryption password is empty. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202102-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202102-1.mdx new file mode 100644 index 000000000..7964fde82 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202102-1.mdx @@ -0,0 +1,20 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202102-1 (507) release. +--- + +# TFE Release v202102-1 (507) + +### Application Level Breaking Changes: + +* The AWS CLI that ships with Terraform Enterprise will be upgraded to AWS CLI version 2. [Version 2 of the AWS CLI contains breaking changes](https://docs.aws.amazon.com/cli/latest/userguide/cliv2-migration.html) that could cause disruptions in custom builds. If you are currently using any AWS CLI features in your workspaces please prepare for the deprecation or migrate to a custom build image to continue using version AWS CLI version 1. + +### Application Level Bug Fixes: + +* Fixed an issue where the `tfe-admin app-config` command would not accept empty configuration values. + +### Application Level Security Fixes: + +* Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. +* Fixed issue where password reset URLs could be seen in logs on server. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202102-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202102-2.mdx new file mode 100644 index 000000000..c3f229c31 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202102-2.mdx @@ -0,0 +1,24 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202102-2 (509) release. +--- + +# TFE Release v202102-2 (509) + +### Bug Fixes Since v202102-1: + +* Fixed issue initializing plugins properly during Terraform Apply in certain upgrade scenarios (eg Terraform 0.12 to 0.13). + +### Application Level Breaking Changes: + +* The AWS CLI that ships with Terraform Enterprise will be upgraded to AWS CLI version 2. [Version 2 of the AWS CLI contains breaking changes](https://docs.aws.amazon.com/cli/latest/userguide/cliv2-migration.html) that could cause disruptions in custom builds. If you are currently using any AWS CLI features in your workspaces please prepare for the deprecation or migrate to a custom build image to continue using version AWS CLI version 1. + +### Application Level Bug Fixes: + +* Fixed an issue where the `tfe-admin app-config` command would not accept empty configuration values. + +### Application Level Security Fixes: + +* Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. +* Fixed issue where password reset URLs could be seen in logs on server. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-1.mdx new file mode 100644 index 000000000..54404ff7a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-1.mdx @@ -0,0 +1,95 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202103-1 (519) release. +--- + +# TFE Release v202103-1 (519 Required) + +### Application Level Breaking Changes: + +* The internally-managed PostgreSQL server has been upgraded from PostgreSQL 9.5 to PostgreSQL 12. Operators should back up their Terraform Enterprise data before upgrading to v202103-\* This change only affects mounted disk and proof of concept installations. Please refer to the "PostgreSQL Upgrade" section for more information. +* Changed organization name requirements to not be ambiguous with organization ID format. Although very unlikely, if an existing organization name matches a pattern `org-<16 base58 chars>`, it must be renamed. + +### Upcoming Deprecation Notifications: + +* The Admin API endpoint to list an organization's module consumers has been deprecated, and will be removed in Terraform Enterprise v202106-\* Clients should transition to the new JSON:API compliant endpoint: [List Module Consumers for an Organization](/terraform/enterprise/api-docs/admin/organizations#list-module-consumers-for-an-organization). +* The Admin API endpoint to update an organization's module consumers has been deprecated, and will be removed in Terraform Enterprise v202106-\* Clients should transition to the new JSON:API compliant endpoint: [Update an Organization's Module Consumers](/terraform/enterprise/api-docs/admin/organizations#update-an-organization-39-s-module-consumers) + +### Application Level Features: + +* Added support for PostgreSQL SCRAM-SHA-256 password authentication. +* Added `db-backup-poc`, `db-restore-poc`, and `db-reindex-poc` admin commands to allow proof of concept installations to backup, restore, and reindex the PostgreSQL database. +* Changes how TBW handles initialization during the apply phase, removing the `-backend=false` reinitialization in favor of persisting the entire filesystem between plan and apply. +* Adds Sensitive Variable Override File, which will mark TFE sensitive variables as sensitive in Terraform during runs. +* Support IMDSv2 when configuring object storage with S3 and Use Instance Profile for Access. +* Update the base OS image to Ubuntu Bionic (18.04) for the default Terraform worker image. +* Add support for forcing TLS via HSTS response headers and `Secure` cookie flags. +* Added a link to an example Terraform config repo when creating a VCS workspace. +* Added the `hostname` argument to example commands in the UI where applicable +* Added Terraform CLI versions up through 0.15.0-beta1 to Terraform Enterprise. +* Added run relationship to policy-checks API responses. +* Added ability to rename organizations in organization settings. +* Added the ability to filter JSON results in select places where JSON data is available (such as the state viewer). The filter language is a jq subset; see the documentation for more details. +* Added the ability to see the JSON response for policy checks within the run viewer, along with a shortcut to quickly see the results for all "main" rules within a policy check. +* Added the workspace name to the page title +* Fixed streamed log undefined waiting text +* Fixed log viewer printing "undefined" for empty logs +* Added Additional VCS Info to Workspace API Response +* Added ability to view module submodules in the private registry +* Added ability to view module examples in the private registry. +* Added JSON:API compliant endpoint to fetch an organization's module consumers. +* Added JSON:API compliant endpoint to update an organization's module consumers. +* Added ability to filter module producing organizations to the admin/organizations API endpoint. +* Added the ability to include the related run and workspace to the policy checks API endpoint. +* Changed team access API to only use pagination when requested. + +### Application Level Bug Fixes: + +* Upgrades go-isolation to pick up bug fix for directories with spaces in the name. +* Adjust container permissions to support running `tfe-admin` commands in environments where SELinux operates in `enforcing` mode. +* Fix a race condition in Active/Active deployments that would potentially result in transient Vault authentication failures when using an internal Vault deployment. +* Fixed an issue where the footer did not display for logged-in users. +* Fixed a bug where a workspace would think it had a working configuration version after someone ran `terraform plan`, but it wouldn't be able to queue new runs. +* Fixed keyboard accessibility for modules in the private registry +* Changed admin organizations api returns 422 if global_module_sharing: null passed in +* Fixed an issue with the reliability of copying text from log output in the Google Chrome browser +* Fixed an inconsistency of icon colors within certain button types. +* Fixed alignment and icon issues on Notifications page +* Added ability to keyboard-navigate into streamed logs on a run and provisioning instructions on a module +* Fixed pagination params for page size and number for audit trail endpoint +* Fixed sourceable run trigger dropdown when there are more than 50 workspaces available +* Changed instructions to add a new GitHub.com (custom) provider to align with a change to the GitHub UI/UX +* Fixed email logos not rendering if `ASSET_HOST` is not set in a TFE instance +* Fixed GitHub icon rendering in Firefox +* Added keyboard-only navigation to workspace heading links +* Added keyboard-only navigation for accordion elements such as run phase expanding boxes. +* Fixed accessibility of heading order for screen readers +* Fixed price error for certain AWS Elasticache node types during Cost Estimation. +* Fixed a potential issue where some cost estimates might be off by 1-2% +* Fixed the user invitation modal list of teams, ensuring teams are correctly paginated to include all of them. +* Fixed an issue where working directories were having their leading and trailing slashes stripped during updating. +* Fixed Modules ingress for Bitbucket Webhook events containing multiple changes. +* Fixed an issue where custom CA certificates were not being passed to the `telegraf` container. +* Fixed API issue where includable resource parameters were required to be underscored, even as the API is generally hyphenated. +* Fixed workspace variables API to require the correct workspace in URL +* Fixed issue not showing all teams when adding team access to a workspace. + +### Application Level Security Fixes: + +* Enforce organization-level setting that requires users within an organization to have two-factor authentication enabled (CVE-2021-3153). +* Reduce exposure by proactively revoking per-run tokens on run completion. +* Update go-slug to v0.5.0 to pick up security fixes for maliciously crafted tarballs. +* Update Rails to 6.0.3.5, addressing security vulnerabilities. +* Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. + +### PostgreSQL Upgrade: + +The [PostgreSQL versioning policy](https://www.postgresql.org/support/versioning/) states that PostgreSQL 9.5 had its final release on February 11, 202\* As such, the internally-managed PostgreSQL server has been upgraded from PostgreSQL 9.5 to PostgreSQL 12. This change only affects mounted disk and proof of concept installations. It does not affect external services installations. + +The first time a Terraform Enterprise installation is upgraded to v202103-1, a program will be executed that will upgrade the PostgreSQL 9.5 data to PostgreSQL 12. This program takes a backup of the PostgreSQL data before upgrading. Regardless, operators should back up their Terraform Enterprise data before upgrading to Terraform Enterprise v202103-\* + +Additionally, operators should familiarize themselves with the following knowledge base articles. + +* [How to Manually Backup Internally-Managed PostgreSQL Data](https://support.hashicorp.com/hc/en-us/articles/1500003527861) +* [PostgreSQL 12 Upgrade Error: Timeout waiting for event PostgreSQL Upgraded](https://support.hashicorp.com/hc/en-us/articles/1500003501501) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-2.mdx new file mode 100644 index 000000000..b6de10358 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-2.mdx @@ -0,0 +1,99 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202103-2 (520) release. +--- + +# TFE Release v202103-2 (520) + +### Bug Fixes Since v202103-1: + +* Fixed an issue where runs would fail to plan when using Terraform 0.13.x versions created with `terraform-bundle`. + +### Application Level Breaking Changes: + +* The internally-managed PostgreSQL server has been upgraded from PostgreSQL 9.5 to PostgreSQL 12. Operators should back up their Terraform Enterprise data before upgrading to v202103-1. This change only affects mounted disk and proof of concept installations. Please refer to the "PostgreSQL Upgrade" section for more information. +* Changed organization name requirements to not be ambiguous with organization ID format. Although very unlikely, if an existing organization name matches a pattern `org-<16 base58 chars>`, it must be renamed. + +### Upcoming Deprecation Notifications: + +* The Admin API endpoint to list an organization's module consumers has been deprecated, and will be removed in Terraform Enterprise v202106-1. Clients should transition to the new JSON:API compliant endpoint: [List Module Consumers for an Organization](/terraform/enterprise/api-docs/admin/organizations#list-module-consumers-for-an-organization). +* The Admin API endpoint to update an organization's module consumers has been deprecated, and will be removed in Terraform Enterprise v202106-1. Clients should transition to the new JSON:API compliant endpoint: [Update an Organization's Module Consumers](/terraform/enterprise/api-docs/admin/organizations#update-an-organization-39-s-module-consumers) + +### Application Level Features: + +* Added support for PostgreSQL SCRAM-SHA-256 password authentication. +* Added `db-backup-poc`, `db-restore-poc`, and `db-reindex-poc` admin commands to allow proof of concept installations to backup, restore, and reindex the PostgreSQL database. +* Changes how TBW handles initialization during the apply phase, removing the `-backend=false` reinitialization in favor of persisting the entire filesystem between plan and apply. +* Adds Sensitive Variable Override File, which will mark TFE sensitive variables as sensitive in Terraform during runs. +* Support IMDSv2 when configuring object storage with S3 and Use Instance Profile for Access. +* Update the base OS image to Ubuntu Bionic (18.04) for the default Terraform worker image. +* Add support for forcing TLS via HSTS response headers and `Secure` cookie flags. +* Added a link to an example Terraform config repo when creating a VCS workspace. +* Added the `hostname` argument to example commands in the UI where applicable +* Added Terraform CLI versions up through 0.15.0-beta1 to Terraform Enterprise. +* Added run relationship to policy-checks API responses. +* Added ability to rename organizations in organization settings. +* Added the ability to filter JSON results in select places where JSON data is available (such as the state viewer). The filter language is a jq subset; see the documentation for more details. +* Added the ability to see the JSON response for policy checks within the run viewer, along with a shortcut to quickly see the results for all "main" rules within a policy check. +* Added the workspace name to the page title +* Fixed streamed log undefined waiting text +* Fixed log viewer printing "undefined" for empty logs +* Added Additional VCS Info to Workspace API Response +* Added ability to view module submodules in the private registry +* Added ability to view module examples in the private registry. +* Added JSON:API compliant endpoint to fetch an organization's module consumers. +* Added JSON:API compliant endpoint to update an organization's module consumers. +* Added ability to filter module producing organizations to the admin/organizations API endpoint. +* Added the ability to include the related run and workspace to the policy checks API endpoint. +* Changed team access API to only use pagination when requested. + +### Application Level Bug Fixes: + +* Upgrades go-isolation to pick up bug fix for directories with spaces in the name. +* Adjust container permissions to support running `tfe-admin` commands in environments where SELinux operates in `enforcing` mode. +* Fix a race condition in Active/Active deployments that would potentially result in transient Vault authentication failures when using an internal Vault deployment. +* Fixed an issue where the footer did not display for logged-in users. +* Fixed a bug where a workspace would think it had a working configuration version after someone ran `terraform plan`, but it wouldn't be able to queue new runs. +* Fixed keyboard accessibility for modules in the private registry +* Changed admin organizations api returns 422 if global_module_sharing: null passed in +* Fixed an issue with the reliability of copying text from log output in the Google Chrome browser +* Fixed an inconsistency of icon colors within certain button types. +* Fixed alignment and icon issues on Notifications page +* Added ability to keyboard-navigate into streamed logs on a run and provisioning instructions on a module +* Fixed pagination params for page size and number for audit trail endpoint +* Fixed sourceable run trigger dropdown when there are more than 50 workspaces available +* Changed instructions to add a new GitHub.com (custom) provider to align with a change to the GitHub UI/UX +* Fixed email logos not rendering if `ASSET_HOST` is not set in a TFE instance +* Fixed GitHub icon rendering in Firefox +* Added keyboard-only navigation to workspace heading links +* Added keyboard-only navigation for accordion elements such as run phase expanding boxes. +* Fixed accessibility of heading order for screen readers +* Fixed price error for certain AWS Elasticache node types during Cost Estimation. +* Fixed a potential issue where some cost estimates might be off by 1-2% +* Fixed the user invitation modal list of teams, ensuring teams are correctly paginated to include all of them. +* Fixed an issue where working directories were having their leading and trailing slashes stripped during updating. +* Fixed Modules ingress for Bitbucket Webhook events containing multiple changes. +* Fixed an issue where custom CA certificates were not being passed to the `telegraf` container. +* Fixed API issue where includable resource parameters were required to be underscored, even as the API is generally hyphenated. +* Fixed workspace variables API to require the correct workspace in URL +* Fixed issue not showing all teams when adding team access to a workspace. + +### Application Level Security Fixes: + +* Enforce organization-level setting that requires users within an organization to have two-factor authentication enabled (CVE-2021-3153). +* Reduce exposure by proactively revoking per-run tokens on run completion. +* Update go-slug to v0.5.0 to pick up security fixes for maliciously crafted tarballs. +* Update Rails to 6.0.3.5, addressing security vulnerabilities. +* Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. + +### PostgreSQL Upgrade: + +The [PostgreSQL versioning policy](https://www.postgresql.org/support/versioning/) states that PostgreSQL 9.5 had its final release on February 11, 2021. As such, the internally-managed PostgreSQL server has been upgraded from PostgreSQL 9.5 to PostgreSQL 12. This change only affects mounted disk and proof of concept installations. It does not affect external services installations. + +The first time a Terraform Enterprise installation is upgraded to v202103-1, a program will be executed that will upgrade the PostgreSQL 9.5 data to PostgreSQL 12. This program takes a backup of the PostgreSQL data before upgrading. Regardless, operators should back up their Terraform Enterprise data before upgrading to Terraform Enterprise v202103-1. + +Additionally, operators should familiarize themselves with the following knowledge base articles. + +* [How to Manually Backup Internally-Managed PostgreSQL Data](https://support.hashicorp.com/hc/en-us/articles/1500003527861) +* [PostgreSQL 12 Upgrade Error: Timeout waiting for event PostgreSQL Upgraded](https://support.hashicorp.com/hc/en-us/articles/1500003501501) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-3.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-3.mdx new file mode 100644 index 000000000..9ff13d467 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202103-3.mdx @@ -0,0 +1,103 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202103-3 (523) release. +--- + +# TFE Release v202103-3 (523) + +### Bug Fixes Since v202103-2: + +* Fixed an issue where certain ephemeral Docker volumes were inadvertently included in Replicated snapshots, leading to snapshot timeouts. + +### Bug Fixes Since v202103-1: + +* Fixed an issue where runs would fail to plan when using Terraform 0.13.x versions created with `terraform-bundle`. + +### Application Level Breaking Changes: + +* The internally-managed PostgreSQL server has been upgraded from PostgreSQL 9.5 to PostgreSQL 12. Operators should back up their Terraform Enterprise data before upgrading to v202103-1. This change only affects mounted disk and proof of concept installations. Please refer to the "PostgreSQL Upgrade" section for more information. +* Changed organization name requirements to not be ambiguous with organization ID format. Although very unlikely, if an existing organization name matches a pattern `org-<16 base58 chars>`, it must be renamed. + +### Upcoming Deprecation Notifications: + +* The Admin API endpoint to list an organization's module consumers has been deprecated, and will be removed in Terraform Enterprise v202106-1. Clients should transition to the new JSON:API compliant endpoint: [List Module Consumers for an Organization](/terraform/enterprise/api-docs/admin/organizations#list-module-consumers-for-an-organization). +* The Admin API endpoint to update an organization's module consumers has been deprecated, and will be removed in Terraform Enterprise v202106-1. Clients should transition to the new JSON:API compliant endpoint: [Update an Organization's Module Consumers](/terraform/enterprise/api-docs/admin/organizations#update-an-organization-39-s-module-consumers) + +### Application Level Features: + +* Added support for PostgreSQL SCRAM-SHA-256 password authentication. +* Added `db-backup-poc`, `db-restore-poc`, and `db-reindex-poc` admin commands to allow proof of concept installations to backup, restore, and reindex the PostgreSQL database. +* Changes how TBW handles initialization during the apply phase, removing the `-backend=false` reinitialization in favor of persisting the entire filesystem between plan and apply. +* Adds Sensitive Variable Override File, which will mark TFE sensitive variables as sensitive in Terraform during runs. +* Support IMDSv2 when configuring object storage with S3 and Use Instance Profile for Access. +* Update the base OS image to Ubuntu Bionic (18.04) for the default Terraform worker image. +* Add support for forcing TLS via HSTS response headers and `Secure` cookie flags. +* Added a link to an example Terraform config repo when creating a VCS workspace. +* Added the `hostname` argument to example commands in the UI where applicable +* Added Terraform CLI versions up through 0.15.0-beta1 to Terraform Enterprise. +* Added run relationship to policy-checks API responses. +* Added ability to rename organizations in organization settings. +* Added the ability to filter JSON results in select places where JSON data is available (such as the state viewer). The filter language is a jq subset; see the documentation for more details. +* Added the ability to see the JSON response for policy checks within the run viewer, along with a shortcut to quickly see the results for all "main" rules within a policy check. +* Added the workspace name to the page title +* Fixed streamed log undefined waiting text +* Fixed log viewer printing "undefined" for empty logs +* Added Additional VCS Info to Workspace API Response +* Added ability to view module submodules in the private registry +* Added ability to view module examples in the private registry. +* Added JSON:API compliant endpoint to fetch an organization's module consumers. +* Added JSON:API compliant endpoint to update an organization's module consumers. +* Added ability to filter module producing organizations to the admin/organizations API endpoint. +* Added the ability to include the related run and workspace to the policy checks API endpoint. +* Changed team access API to only use pagination when requested. + +### Application Level Bug Fixes: + +* Upgrades go-isolation to pick up bug fix for directories with spaces in the name. +* Adjust container permissions to support running `tfe-admin` commands in environments where SELinux operates in `enforcing` mode. +* Fix a race condition in Active/Active deployments that would potentially result in transient Vault authentication failures when using an internal Vault deployment. +* Fixed an issue where the footer did not display for logged-in users. +* Fixed a bug where a workspace would think it had a working configuration version after someone ran `terraform plan`, but it wouldn't be able to queue new runs. +* Fixed keyboard accessibility for modules in the private registry +* Changed admin organizations api returns 422 if global_module_sharing: null passed in +* Fixed an issue with the reliability of copying text from log output in the Google Chrome browser +* Fixed an inconsistency of icon colors within certain button types. +* Fixed alignment and icon issues on Notifications page +* Added ability to keyboard-navigate into streamed logs on a run and provisioning instructions on a module +* Fixed pagination params for page size and number for audit trail endpoint +* Fixed sourceable run trigger dropdown when there are more than 50 workspaces available +* Changed instructions to add a new GitHub.com (custom) provider to align with a change to the GitHub UI/UX +* Fixed email logos not rendering if `ASSET_HOST` is not set in a TFE instance +* Fixed GitHub icon rendering in Firefox +* Added keyboard-only navigation to workspace heading links +* Added keyboard-only navigation for accordion elements such as run phase expanding boxes. +* Fixed accessibility of heading order for screen readers +* Fixed price error for certain AWS Elasticache node types during Cost Estimation. +* Fixed a potential issue where some cost estimates might be off by 1-2% +* Fixed the user invitation modal list of teams, ensuring teams are correctly paginated to include all of them. +* Fixed an issue where working directories were having their leading and trailing slashes stripped during updating. +* Fixed Modules ingress for Bitbucket Webhook events containing multiple changes. +* Fixed an issue where custom CA certificates were not being passed to the `telegraf` container. +* Fixed API issue where includable resource parameters were required to be underscored, even as the API is generally hyphenated. +* Fixed workspace variables API to require the correct workspace in URL +* Fixed issue not showing all teams when adding team access to a workspace. + +### Application Level Security Fixes: + +* Enforce organization-level setting that requires users within an organization to have two-factor authentication enabled (CVE-2021-3153). +* Reduce exposure by proactively revoking per-run tokens on run completion. +* Update go-slug to v0.5.0 to pick up security fixes for maliciously crafted tarballs. +* Update Rails to 6.0.3.5, addressing security vulnerabilities. +* Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. + +### PostgreSQL Upgrade: + +The [PostgreSQL versioning policy](https://www.postgresql.org/support/versioning/) states that PostgreSQL 9.5 had its final release on February 11, 2021. As such, the internally-managed PostgreSQL server has been upgraded from PostgreSQL 9.5 to PostgreSQL 12. This change only affects mounted disk and proof of concept installations. It does not affect external services installations. + +The first time a Terraform Enterprise installation is upgraded to v202103-1, a program will be executed that will upgrade the PostgreSQL 9.5 data to PostgreSQL 12. This program takes a backup of the PostgreSQL data before upgrading. Regardless, operators should back up their Terraform Enterprise data before upgrading to Terraform Enterprise v202103-1. + +Additionally, operators should familiarize themselves with the following knowledge base articles. + +* [How to Manually Backup Internally-Managed PostgreSQL Data](https://support.hashicorp.com/hc/en-us/articles/1500003527861) +* [PostgreSQL 12 Upgrade Error: Timeout waiting for event PostgreSQL Upgraded](https://support.hashicorp.com/hc/en-us/articles/1500003501501) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202104-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202104-1.mdx new file mode 100644 index 000000000..ed4a7cf88 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202104-1.mdx @@ -0,0 +1,42 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202104-1 (528) release. +--- + +# TFE Release v202104-1 (528) + +### Application Level Breaking Changes: + +- Added a new organization permission, "Manage Policy Overrides", to isolate the permission for allowing overrides of `soft-mandatory` policy checks. The existing "Manage Policies" permission will no longer allow for `soft-mandatory` overrides. +- Increased minimim required Replicated version to 2.50.0. + +### Application Level Features: + +- Added policy check events to the audit log and audit trail APIs. +- Added ability to define working directory while changing a workspace's VCS source +- Changed the Sentinel runtime to version 0.18.0. For the latest changes, see the [release notes](https://docs.hashicorp.com/sentinel/changelog). +- Changed Modules page to be Registry and updated urls +- Added Terraform CLI versions up through 0.15.0 to Terraform Enterprise. +- Added the ability to restrict state access (usually performed via the `terraform_remote_state` data source) to specific workspaces within an organization, along with an admin setting to configure the default setting for new workspaces and a command line migration assistant. +- Added UI for disabling automatic speculative plans in VCS-connected workspaces. (This already existed in the API, and is now also available in each workspace's VCS settings page.) +- Added Firefox ESR and older Chrome/Firefox/Safari/Edge versions (latest 2) to browser support list +- Added Replicated configuration to restrict Terraform run environments from being able to reach cloud provider metadata endpoints, e.g., `http://169.254.169.254`. +- Active/Active configurations now require fewer tokens during install, only needing `enc_password` across all nodes (previously required tokens such as `cookie_hash`, `install_id` etc) See [documentation for more details](/terraform/enterprise/v202104-1/replicated/install/automated/active-active). + +### Application Level Bug Fixes: + +- Fixed an issue where `tfe-admin support-bundle` would fail to upload support bundles to S3 due to permissions issues. +- Fixed an issue where the Backup and Restore API would restore files to the root of the Azure storage account instead of inside the configured Azure blob container. +- Changed GitHub token validation to accept new formats +- Changed maximum displayable teams to 500 from 250 on team access selection wizard +- Fixed an issue in JSON filtering where unknown keys were not being handled as expected by jq (missing keys should render null values). + +### Application Level Security Fixes: + +- Removed the logic to upgrade the internally-managed PostgreSQL server from PostgreSQL 9.5 to PostgreSQL 12. Installations running a release of Terraform Enterprise prior to v202103-1 must upgrade to required release v202103-1 in order to upgrade the internally-managed PostgreSQL server. This change only affects mounted disk and proof of concept installations. +- Rotated the secret used to generate password reset tokens and account unlock tokens. Existing password reset tokens and account unlock tokens generated before this change is deployed will be rendered invalid. +- Removed the ability for run tokens used in build workers to list all workspaces in the organization, a permission that is not required for the run token's intended purpose of reading workspaces to share state across workspaces using the terraform_remote_state data source. +- Removed the ability for Terraform code in a run environment to initiate network communication with internal TFE services. +- Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. +- Introduced additional security controls to prevent SSRF attacks in various TFE components. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202105-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202105-1.mdx new file mode 100644 index 000000000..74dc6aaa9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202105-1.mdx @@ -0,0 +1,42 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202105-1 (534) release. +--- + +# TFE Release v202105-1 (534) + +### Application Level Features: + +* Changed run page to keep apply logs open after an active run completes. +* Added "Created via" to the sidebar +* Added Link as the Run Triggers header +* Changed count display for run triggers +* Changed submodule and examples UI +* Added Terraform CLI versions up through 0.15.3 to Terraform Enterprise. +* Changed the maximum Sentinel job execution time to 1 hour. +* Changed the Sentinel runtime to version 0.18.1. For the latest changes, see the [release notes](https://docs.hashicorp.com/sentinel/changelog). +* Changed mock generation so that: 1) best efforts are made to obfuscate sensitive values, and 2) generate the sample configuration file as HCL instead of legacy JSON. + +### Application Level Bug Fixes: + +* Fixed plan logs upload expiration to match the actual maximum plan runtime. +* Reduce Terraform State Parser maximum memory usage on small states. +* Fixed error when deleting workspaces +* Fixed OOM errors when deleting large workspaces +* Fixed run trigger scrollbars when overflow is present +* Fixed module view published date bug. +* Fixed an issue where a user couldn't accept an invitation if they'd ever had an expired invite. +* Fixed an issue preventing users who had an invalid invitation token from clicking through to the sign up form. +* Fixed some communication components between the Sentinel worker and TFE internal API to ensure the worker does not execute a policy check before it is ready. +* Fixed an issue where policy check results were being submitted for already completed checks, causing confusing results (passing results for failed checks, for example). +* Changed refresh interval for GitLab.com OAuth Token refreshes. +* Fixed unpacking custom provider binaries when using Terraform 0.14.x and 0.15.x. +* Changed frontend route params for organization and workspace names case insensitive +* Changed retry behavior to not retry HTTP basic auth failures when ingressing configurations + +### Application Level Security Fixes: + +* Added `autocomplete=off` attribute to password fields +* Updated the Ruby version used by the application to 2.7.3. +* Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202106-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202106-1.mdx new file mode 100644 index 000000000..27df2522b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202106-1.mdx @@ -0,0 +1,41 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202106-1 (544) release. +--- + +# TFE Release v202106-1 (544) + +### Application Level Features: + +- Added support for several new capabilities in remote runs triggered via the CLI and API: `-refresh=false`, `-refresh-only`, and `-replace=ADDRESS`. See [the documentation](/terraform/cloud-docs/run/modes-and-options) for more details on each of these options. +- Added Terraform CLI versions up through 0.15.5 to Terraform Enterprise. +- Changed Terraform Cost Estimation to use the new, free Azure pricing API. This changes the [Azure egress hostname](/terraform/enterprise/v202106-1/replicated/requirements/network#prices-azure-com) to `prices.azure.com`. +- Updated the UX for the Registry +- Changed the Sentinel runtime to version 0.18.3. For the latest changes, see the [release notes](https://docs.hashicorp.com/sentinel/changelog). + +### Application Level Bug Fixes: + +- Upgrade Golang 1.14.0 => 1.16.4 +- Fixed unexpected exceptions when accessing a JSON plan that was created before April 2019. +- Fix issue where runs might get stuck in cost estimating +- Fixed an authorisation check for service accounts and SSO, which prevented service account created runs from being auto applied. +- Fixed an issue that prevented commenting on runs by certain users who otherwise should be permissed. +- Fixed support for Azure appservice v2/V2 tiers with spaces +- Fixed an issue where Sentinel VCS status checks were not receiving a response from speculative plans. +- Fixed a potential conflict condition when starting multiple TFE instances simultaneously. + +### Application Level Security Fixes: + +- The Vault unseal key and root token are no longer persisted to disk in the Vault container. +- The PostgreSQL 9.5 to 12 upgrade container has been removed. +- The PostgreSQL default password migration container has been removed. + +### API: + +- Updated [Registry Module APIs](/terraform/cloud-docs/api-docs/private-registry/modules). + - added `registry_name` scoped APIs. + - added `organization_name` scoped APIs. + - added [Module List API](/terraform/cloud-docs/api-docs/private-registry/modules#list-registry-modules-for-an-organization). + - updated [Module Delete APIs](/terraform/cloud-docs/api-docs/private-registry/modules#delete-a-module). +- [Runs](/terraform/cloud-docs/api-docs/run): added `refresh`, `refresh-only`, and `replace-addrs` attributes. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202107-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202107-1.mdx new file mode 100644 index 000000000..50fbf25ff --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202107-1.mdx @@ -0,0 +1,34 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202107-1 (550) release. +--- + +# TFE Release v202107-1 (550) + +### Application Level Breaking Changes: + +* Changed default run messages to no longer include detailed information about the run (destroy run, resource targets, etc.). Instead, destroy runs and refresh-only runs are now clearly labeled wherever they're displayed. + +### Application Level Features: + +* Added labels for destroy runs and refresh-only runs in workspace run lists. +* Modified preflight checks to use HTTP and the system HTTP proxy when verifying connectivity to releases.hashicorp.com. +* Added structured run output for the apply phase of a run. New Apply User Interface +* Changed the organization settings left navigation sidebar into thematic groups, with settings in alphabetical order within a group. + +### Application Level Bug Fixes: + +* Fixed icon rendering on workspace overviews in safari +* Fixed typo in policy sets UI +* Fixed slow module search API endpoint which could cause performance issues for terraform-registry. +* Fixed creating apply-able Runs for Bitbucket Server +* Fixed error running Cost Estimation on Terraform 1.0.1 plans +* Fixed extra border on run phases expandable boxes +* Fixed modal dialog focus trap issues +* Fixed module change version drop down with only one version + +### Application Level Security Fixes: + +* Addressed authorization flaw that allowed privilege escalation via the TFE run token (HCSEC-2021-18 / CVE-2021-36230). +* Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202108-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202108-1.mdx new file mode 100644 index 000000000..94eaa9482 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202108-1.mdx @@ -0,0 +1,45 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about known issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202108-1 (557) release. +--- + +# TFE Release v202108-1 (557) + +### Application Level Features: + +* Added run metadata to Docker containers performing Terraform operations +* Added Terraform CLI versions up through 1.0.3 to Terraform Enterprise. +* Added `locked_by` as an includable resource in the workspaces API. +* Added ability for organization tokens to manage workspace notification configurations. +* Updated run status badges and filtering options +* Added the [Workspace Overview to Terraform Cloud](https://www.hashicorp.com/blog/new-workspace-overview-for-terraform-cloud) capability for Enterprise environments, including the newly released resource grid. +* Added the ability to group and filter workspaces using singleton tags. + +### Application Level Bug Fixes: + +* Fixed broken GitLab.com OAuth Application registration link. +* Fixed handling Oauth Token refresh on failed workspace updates. +* Fixed incorrect display of apply logs for canceled runs. +* Fixed bug where JSON plan output was only kept for a week after run completion. +* Fixed broken API token copy buttons in some browsers. +* Fixed workspace relationship ID in state version API +* Fixed organization settings navigation by hiding sections and switching to sentence case + +### Application Level Security Fixes: + +* Removed the ability for new users to change two-factor authentication settings without first confirming their email. +* Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. + +### API: + +* Introduced Workspace Tagging + * Updated [Workspaces](/terraform/cloud-docs/api-docs/workspaces): + * added `tag_names` attribute. + * added `POST /workspaces/:workspace_id/relationships/tags` + * added `DELETE /workspaces/workspace-2/relationships/tags` + * Added [Organization Tags](/terraform/cloud-docs/api-docs/organization-tags). + * Added `tags` attribute to [`tfrun`](/terraform/cloud-docs/policy-enforcement/sentinel/import/tfrun) +* [Notification configurations](/terraform/cloud-docs/api-docs/notification-configurations): Gave organization tokens permission to create and manage notification configurations. +* [State versions](/terraform/cloud-docs/api-docs/state-versions): Fixed the ID format for the workspace relationship of a state version. Previously, the reported ID was unusable due to a bug. +* [Workspaces](/terraform/cloud-docs/api-docs/workspaces): Added `locked_by` as an includable related resource. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202109-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202109-1.mdx new file mode 100644 index 000000000..f8498ff9f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202109-1.mdx @@ -0,0 +1,53 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the known issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202109-1 (565) release. +--- + +# TFE Release v202109-1 (565) + +## Known Issues + +1. [February 8, 2022] This release includes a regression that removed default log rotation settings of Docker logs using the `json-file` logging driver (the default driver), affecting log rotation on installations with the new log forwarding feature disabled. If you do not enable the log forwarding feature on your installation, we recommend that you configure global log rotation settings to prevent disk space issues. For more information about configuring log rotation, refer to [Log Rotation](/terraform/enterprise/v202109-1/replicated/install/pre-install-checklist#log-rotation). This issue is fixed in v202201-2. + +## Deprecation Notice + +The following operating systems are no longer supported: + +- Ubuntu 14 +- Debian 7 + +Docker logs using the `json-file` logging driver (the default driver) will no longer be automatically rotated. Please refer to the [log rotation documentation](/terraform/enterprise/v202109-1/replicated/install/pre-install-checklist#log-rotation) for details on how to configure log rotation. + +## Application Level Features + +1. Added Terraform CLI versions up through 1.1.0-alpha20210811 to Terraform Enterprise. +1. Added 'capacity_cpus' Replicated configuration option to limit the number of CPU cores available to individual Terraform runs. +1. Changed structured run UI to always show error logs immediately. +1. Changed apply UI to show "no changes" for runs which only change outputs. +1. Changed apply UI to hide output values by default, and improved display of complex values. +1. Added advanced UI for Terraform Plan, including an interactive diff. +1. Added support for Terraform Cloud Agents. +1. Added support for forwarding Terraform Enterprise logs to one or more external destinations. + +## Application Level Bug Fixes + +1. Fixed sidekiq admin panel to be accessible to Configuration and Support admin RBAC roles. +1. Changed apply progress UI for to clarify the final state of replaced resources. +1. Updated Nomad to 1.1.4 +1. Updated Vault to 1.8.2 +1. Fixed registry modules with errors so that they are accessible. +1. Updated Sentinel to 0.18.4 +1. Updated Telegraf to 1.19.3 to fix a `panic: runtime error: slice bounds out of range` error. +1. Updated InfluxDB to 1.8.9. + +## Application Level Security Fixes + +1. Hid the upload-url attribute on ConfigurationVersion API resources after the initial create action in order to prevent a privilege escalation. +1. Mitigated a potential Host header injection vulnerability. +1. Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. + +## API + +1. Introduced the [State Version Outputs](/terraform/cloud-docs/api-docs/state-versions) endpoint to retrieve the Outputs for a given State Version +1. **Breaking** Security fix to [Configuration versions](/terraform/cloud-docs/api-docs/configuration-versions): upload-url attribute for [uploading configuration files](/terraform/cloud-docs/api-docs/configuration-versions#upload-configuration-files) is now only available on the create response. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202109-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202109-2.mdx new file mode 100644 index 000000000..c85f383a1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202109-2.mdx @@ -0,0 +1,57 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the known issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202109-2 (568) release. +--- + +# TFE Release v202109-2 (568) + +## Known Issues + +1. [February 8, 2022] This release includes a regression that removed default log rotation settings of Docker logs using the `json-file` logging driver (the default driver), affecting log rotation on installations with the new log forwarding feature disabled. If you do not enable the log forwarding feature, we recommend that you configure global log rotation settings to prevent disk space issues. For more information about configuring log rotation, refer to [Log Rotation](/terraform/enterprise/v202109-2/replicated/install/pre-install-checklist#log-rotation). This issue is fixed in v202201-2. + +## Application Level Bug Fixes Since v202109-1 + +1. Updated Fluent Bit to v1.8.7 to fix a DNS resolution issue which prevents operators from sending logs to Datadog. + +## Deprecation Notice + +The following operating systems are no longer supported: + +- Ubuntu 14 +- Debian 7 + +Docker logs using the `json-file` logging driver (the default driver) will no longer be automatically rotated. Please refer to the [log rotation documentation](/terraform/enterprise/v202109-2/replicated/install/pre-install-checklist#log-rotation) for details on how to configure log rotation. + +## Application Level Features + +1. Added Terraform CLI versions up through 1.1.0-alpha20210811 to Terraform Enterprise. +1. Added 'capacity_cpus' Replicated configuration option to limit the number of CPU cores available to individual Terraform runs. +1. Changed structured run UI to always show error logs immediately. +1. Changed apply UI to show "no changes" for runs which only change outputs. +1. Changed apply UI to hide output values by default, and improved display of complex values. +1. Added advanced UI for Terraform Plan, including an interactive diff. +1. Added support for Terraform Cloud Agents. +1. Added support for forwarding Terraform Enterprise logs to one or more external destinations. + +## Application Level Bug Fixes + +1. Fixed sidekiq admin panel to be accessible to Configuration and Support admin RBAC roles. +1. Changed apply progress UI for to clarify the final state of replaced resources. +1. Updated Nomad to 1.1.4 +1. Updated Vault to 1.8.2 +1. Fixed registry modules with errors so that they are accessible. +1. Updated Sentinel to 0.18.4 +1. Updated Telegraf to 1.19.3 to fix a `panic: runtime error: slice bounds out of range` error. +1. Updated InfluxDB to 1.8.9. + +## Application Level Security Fixes + +1. Hid the upload-url attribute on ConfigurationVersion API resources after the initial create action in order to prevent a privilege escalation. +1. Mitigated a potential Host header injection vulnerability. +1. Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. + +## API + +1. Introduced the [State Version Outputs](/terraform/cloud-docs/api-docs/state-versions) endpoint to retrieve the Outputs for a given State Version +1. **Breaking** Security fix to [Configuration versions](/terraform/cloud-docs/api-docs/configuration-versions): upload-url attribute for [uploading configuration files](/terraform/cloud-docs/api-docs/configuration-versions#upload-configuration-files) is now only available on the create response. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202110-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202110-1.mdx new file mode 100644 index 000000000..4cf6de42f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202110-1.mdx @@ -0,0 +1,37 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the known issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202110-1 (576) release. +--- + +# TFE Release v202110-1 (576) + +## Known Issues + +1. [February 8, 2022] This release includes a regression that removed default log rotation settings of Docker logs using the `json-file` logging driver (the default driver), affecting log rotation on installations with the new log forwarding feature disabled. If you do not enable the log forwarding feature on your installation, we recommend that you configure global log rotation settings to prevent disk space issues. For more information about configuring log rotation, refer to [Log Rotation](/terraform/enterprise/v202110-1/replicated/install/pre-install-checklist#log-rotation). This issue is fixed in v202201-2. + +## Installer Level Features + +1. RHEL 8 is now supported via the Replicated installer +1. RHEL 7.9 is now supported as an Alternative Worker Image + +## Application Level Features + +1. Added a clear filters link to private module search results + +## Application Level Bug Fixes + +1. Updated Vault to version 1.8.4 to fix an issue where database connections were not properly being removed from the connection pool. +1. Fixed an issue where fetching structured run output for a plan would result in a 500 status code. +1. Fixed dasherized keys within object output values on state version and state version output endpoints. For example, output maps containing key "my_output_key" would become "my-output-key" due to automatic jsonapi formatting. +1. Fixed "a.filter is not a function" error when expanding structured output plans containing sensitive set attributes and blocks. +1. Fixed hourly pricing for azurerm_managed_disk +1. Added support for plan json 1.0 +1. Fixed an issue where status timestamps were not populated correctly in configuration version API responses. +1. Fixed issue where the workspace UI showed elements only applicable to remote/agent execution modes when local execution mode was enabled. +1. Fixed Cost Estimation failure when looking up Elastisearch costs when using deprecated instance names ending in `elastisearch`. +1. Fixed issue where invalid UTF-8 characters in README can result in errors loading Workspaces. + +## Application Level Security Fixes + +1. Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202111-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202111-1.mdx new file mode 100644 index 000000000..1888cce39 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202111-1.mdx @@ -0,0 +1,35 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the known issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202111-1 (582) release. +--- + +# TFE Release v202111-1 (582) + +## Known Issues + +1. [February 8, 2022] This release includes a regression that removed default log rotation settings of Docker logs using the `json-file` logging driver (the default driver), affecting log rotation on installations with the new log forwarding feature disabled. If you do not enable the log forwarding feature on your installation, we recommend that you configure global log rotation settings to prevent disk space issues. For more information about configuring log rotation, refer to [Log Rotation](/terraform/enterprise/v202111-1/replicated/install/pre-install-checklist#log-rotation). This issue is fixed in v202201-2. + +## APPLICATION LEVEL BREAKING CHANGES: + +- Certain application container images were updated to use Alpine 3.14 which has specific Docker, `runc`, and `libseccomp` version requirements. Please refer to [the Alpine 3.14 release notes](https://wiki.alpinelinux.org/wiki/Release_Notes_for_Alpine_3.14.0#faccessat2) to determine if your installation meets these new requirements before upgrading. + +## APPLICATION LEVEL FEATURES: + +- Added support for terraform-json 0.13.0 +- Added increase github changed files probe for pull requests from 300 to 3000 +- Added a `tfe-admin list-nodes` command to list all active nodes in an active/active installation. + +## APPLICATION LEVEL BUG FIXES: + +- Fixed an issue where a workspace throws errors if it's locked by a team or user that is then deleted. +- Fixed an issue where all workspaces attached to a particular VCS repo would occasionally become unable to process webhooks. +- Fixed an issue where log forwarding was not configured with HTTP proxy environment variables. +- Fixed the Terraform version selector (in the workspace settings) for workspaces that use a custom version constraint (like `~> *0.5`). The selector will now show the constraint instead of the latest version. +- Fixed an issue where visible teams weren't visible in Terraform Enterprise due to an incorrect SQL join. +- Fixed issue where users could continue to select beta version of Terraform via API, even as betas are not allowed on the associated organization. + +## APPLICATION LEVEL SECURITY FIXES: + +- Updated the version of the internally-managed Vault server to \*8.4. +- Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202112-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202112-1.mdx new file mode 100644 index 000000000..86e39f041 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202112-1.mdx @@ -0,0 +1,40 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the known issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202112-1 (588) release. +--- + +# TFE Release v202112-1 (588) + +## Known Issues + +1. [February 8, 2022] This release includes a regression that removed default log rotation settings of Docker logs using the `json-file` logging driver (the default driver), affecting log rotation on installations with the new log forwarding feature disabled. If you do not enable the log forwarding feature on your installation, we recommend that you configure global log rotation settings to prevent disk space issues. For more information about configuring log rotation, refer to [Log Rotation](/terraform/enterprise/v202112-1/replicated/install/pre-install-checklist#log-rotation). This issue is fixed in v202201-2. + +## UPCOMING DEPRECATION NOTICE: + +1. Effective April, 2022 there will be an update to Terraform Enterprise container names. This change may break container monitoring or custom tooling that identifies containers by name. More specific information regarding name changes will be made available in future release notes. + +## APPLICATION LEVEL FEATURES: + +1. SAML certificate signing and digest methods now are configurable +1. Added conditional pagination ability on GET indices for the following: SSH Keys, Parameters (on Policy Sets), Policy Checks (on Runs), Organizations, Policy Checks (on Runs), Oauth Clients, Oauth Tokens, Authentication (User) Tokens, Notification Configurations, Feature Sets, Feature Sets (on Organizations). If pagination parameters are not provided all results will be returned. +1. Added support for public provider and public module curation +1. Added support for tfc-agent 1.x series + +## APPLICATION LEVEL BUG FIXES: + +1. Fixed a bug where the `tfe-admin` command would set a configuration key to the value `''` instead of unsetting the configuration value. +1. Fixed an issue where custom CA certificates were not injected into the `tfe-fluent-bit` container. +1. Fixed an issue where Replicated snapshots were not executing for demo mode installations. +1. Fixed provider/module APIs to allow prefix searching, also fixes bug where providers were returned for unrelated (but member of) organizations. +1. Fixed structured run output to show a less verbose diff for json-encoded array fields +1. Added a fix to prevent the removal of the last owner of an organization via the API. It also gives precedence to returning an error if you remove the last owner over removing yourself (if you are an owner of the organization). Meaning that even though if you try to remove yourself (and you happen to be the only owner), the error that you'll receive is the same as if one tried to remove the only owner. You'll only receive the error message: `You cannot remove yourself from an organization you own` if you try to remove yourself and are not the only owner of an organization. Therefore the unit tests for "removing self as owner" had to be updated to include multiple owners in the organization. + +## APPLICATION LEVEL SECURITY FIXES: + +1. The Docker container running Nomad (`ptfe_nomad`) no longer runs with the `privileged` attribute. +1. Updated the version of the internally-managed Vault server to 1.9.0 +1. Updated the version of the internally-managed Nomad server to 1.1.6 +1. Updated `tfe-fluent-bit` to use Fluent Bit 1.8.10. +1. Updated `archivist` to address CVE in direct and indirect `jwt-go` dependency. +1. Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202112-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202112-2.mdx new file mode 100644 index 000000000..885f0849e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2021/v202112-2.mdx @@ -0,0 +1,48 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the known issues, bug fixes, deprecations, breaking changes, features and security fixes for the v202112-2 (590) release. +--- + +# TFE Release v202112-2 (590) + +## Known Issues + +1. [February 8, 2022] This release includes a regression that removed default log rotation settings of Docker logs using the `json-file` logging driver (the default driver), affecting log rotation on installations with the new log forwarding feature disabled. If you do not enable the log forwarding feature on your installation, we recommend that you configure global log rotation settings to prevent disk space issues. For more information about configuring log rotation, refer to [Log Rotation](/terraform/enterprise/v202112-2/replicated/install/pre-install-checklist#log-rotation). This issue is fixed in v202201-2. + +## APPLICATION LEVEL BUG FIXES SINCE v202112-1: + +1. Updated the version of the terraform-registry that shipped with the v202112-1 release. + +## UPCOMING DEPRECATION NOTICE: + +1. Effective April, 2022 there will be an update to Terraform Enterprise container names. This change may break container monitoring or custom tooling that identifies containers by name. More specific information regarding name changes will be made available in future release notes. + +## APPLICATION LEVEL BREAKING CHANGES: + +None + +## APPLICATION LEVEL FEATURES: + +1. SAML certificate signing and digest methods now are configurable. +1. Added conditional pagination ability on GET indices for the following: SSH Keys, Parameters (on Policy Sets), Policy Checks (on Runs), Organizations, Policy Checks (on Runs), Oauth Clients, Oauth Tokens, Authentication (User) Tokens, Notification Configurations, Feature Sets, Feature Sets (on Organizations). All results are returned if pagination parameters are not provided. +1. Added support for public provider and public module curation. +1. Added support for tfc-agent 1.x series. + +## APPLICATION LEVEL BUG FIXES: + +1. Fixed a bug where the `tfe-admin` command would set a configuration key to the value `''` instead of unsetting the configuration value. +1. Fixed an issue where custom CA certificates were not injected into the `tfe-fluent-bit` container. +1. Fixed an issue where Replicated snapshots were not executing for demo mode installations. +1. Fixed provider/module APIs to allow prefix searching, also fixes bug where providers were returned for unrelated (but member of) organizations. +1. Fixed structured run output to show a less verbose diff for json-encoded array fields. +1. Added a fix to prevent the removal of the last owner of an organization via the API. It also gives precedence to returning an error if you are an organization owner and you remove the last owner over removing yourself. If you try to remove yourself and you are the only owner, the error is the same as if you tried to remove the only owner:`You cannot remove yourself from an organization you own`. Therefore, we updated the unit tests for "removing self as owner" to include multiple owners in the organization. + +## APPLICATION LEVEL SECURITY FIXES: + +1. The Docker container running Nomad (`ptfe_nomad`) no longer runs with the `privileged` attribute. +1. Updated the version of the internally-managed Vault server to 1.9.0. +1. Updated the version of the internally-managed Nomad server to 1.1.6. +1. Updated `tfe-fluent-bit` to use Fluent Bit 1.8.10. +1. Updated `archivist` to address CVE in direct and indirect `jwt-go` dependency. +1. Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/index.mdx new file mode 100644 index 000000000..55c141269 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/index.mdx @@ -0,0 +1,34 @@ +--- +page_title: 2022 Releases - Terraform Enterprise +description: The 2022 Terraform Enterprise releases. +--- + +# Terraform Enterprise Releases - 2022 + +Terraform Enterprise releases from 2022 are listed in the table below. + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI** | Sentinel | +| ------------------------------------------------------------ | ---------------- | -------------------------------------------------------------------- | ------------------------------------------------------------------- | ---------------------------------------------------------------------------------- | +| [v202212-2](/terraform/enterprise/releases/2022/v202212-2) | 667 | [2.54.0](https://release-notes.replicated.com/release-notes/2.54.0/) | [1.3.2](https://github.com/hashicorp/terraform/releases/tag/v1.3.2) | [0.18.13](https://docs.hashicorp.com/sentinel/changelog#0-18-13-october-31-2022) | +| [v202212-1](/terraform/enterprise/releases/2022/v202212-1) | 665 | [2.54.0](https://release-notes.replicated.com/release-notes/2.54.0/) | [1.3.2](https://github.com/hashicorp/terraform/releases/tag/v1.3.2) | [0.18.13](https://docs.hashicorp.com/sentinel/changelog#0-18-13-october-31-2022) | +| [v202211-1](/terraform/enterprise/releases/2022/v202211-1) | 660 | [2.54.0](https://release-notes.replicated.com/release-notes/2.54.0/) | [1.3.2](https://github.com/hashicorp/terraform/releases/tag/v1.3.2) | [0.18.13](https://docs.hashicorp.com/sentinel/changelog#0-18-13-october-31-2022) | +| [v202210-1](/terraform/enterprise/releases/2022/v202210-1) | 659 | [2.54.0](https://release-notes.replicated.com/release-notes/2.54.0/) | [1.2.9](https://github.com/hashicorp/terraform/releases/tag/v1.2.9) | [0.18.12](https://docs.hashicorp.com/sentinel/changelog#0-18-12-september-15-2022) | +| [v202209-2](/terraform/enterprise/releases/2022/v202209-2) | 655 | [2.53.7](https://release-notes.replicated.com/release-notes/2.53.7/) | [1.2.7](https://github.com/hashicorp/terraform/releases/tag/v1.2.7) | [0.18.11](https://docs.hashicorp.com/sentinel/changelog#0-18-11-june-8-2022) | +| [v202209-1](/terraform/enterprise/releases/2022/v202209-1) | 654 | [2.53.7](https://release-notes.replicated.com/release-notes/2.53.7/) | [1.2.7](https://github.com/hashicorp/terraform/releases/tag/v1.2.7) | [0.18.11](https://docs.hashicorp.com/sentinel/changelog#0-18-11-june-8-2022) | +| [v202208-3](/terraform/enterprise/releases/2022/v202208-3) | 652 | [2.53.7](https://release-notes.replicated.com/release-notes/2.53.7/) | [1.2.4](https://github.com/hashicorp/terraform/releases/tag/v1.2.4) | [0.18.11](https://docs.hashicorp.com/sentinel/changelog#0-18-11-june-8-2022) | +| [v202208-2](/terraform/enterprise/releases/2022/v202208-2) | 651 | [2.53.7](https://release-notes.replicated.com/release-notes/2.53.7/) | [1.2.4](https://github.com/hashicorp/terraform/releases/tag/v1.2.4) | [0.18.11](https://docs.hashicorp.com/sentinel/changelog#0-18-11-june-8-2022) | +| [v202208-1](/terraform/enterprise/releases/2022/v202208-1) | 647 | [2.53.7](https://release-notes.replicated.com/release-notes/2.53.7/) | [1.2.4](https://github.com/hashicorp/terraform/releases/tag/v1.2.4) | [0.18.11](https://docs.hashicorp.com/sentinel/changelog#0-18-11-june-8-2022) | +| [v202207-2](/terraform/enterprise/releases/2022/v202207-2)\* | 642 | [2.53.7](https://release-notes.replicated.com/release-notes/2.53.7/) | [1.2.4](https://github.com/hashicorp/terraform/releases/tag/v1.2.4) | [0.18.11](https://docs.hashicorp.com/sentinel/changelog#0-18-11-june-8-2022) | +| [v202207-1](/terraform/enterprise/releases/2022/v202207-1) | 641 | [2.53.7](https://release-notes.replicated.com/release-notes/2.53.7/) | [1.2.4](https://github.com/hashicorp/terraform/releases/tag/v1.2.4) | [0.18.11](https://docs.hashicorp.com/sentinel/changelog#0-18-11-june-8-2022) | +| [v202206-1](/terraform/enterprise/releases/2022/v202206-1) | 636 | [2.53.6](https://release-notes.replicated.com/release-notes/2.53.6/) | [1.2.1](https://github.com/hashicorp/terraform/releases/tag/v1.2.1) | [0.18.10](https://docs.hashicorp.com/sentinel/changelog#0-18-10-may-20-2022) | +| [v202205-1](/terraform/enterprise/releases/2022/v202205-1) | 619 | [2.53.4](https://release-notes.replicated.com/release-notes/2.53.4/) | [1.1.9](https://github.com/hashicorp/terraform/releases/tag/v1.1.9) | [0.18.6](https://docs.hashicorp.com/sentinel/changelog#0-18-6-february-2-2022) | +| [v202204-2](/terraform/enterprise/releases/2022/v202204-2)\* | 610 | [2.53.4](https://release-notes.replicated.com/release-notes/2.53.4/) | [1.1.7](https://github.com/hashicorp/terraform/releases/tag/v1.1.7) | [0.18.6](https://docs.hashicorp.com/sentinel/changelog#0-18-6-february-2-2022) | +| [v202204-1](/terraform/enterprise/releases/2022/v202204-1) | 609 | [2.53.4](https://release-notes.replicated.com/release-notes/2.53.4/) | [1.1.7](https://github.com/hashicorp/terraform/releases/tag/v1.1.7) | [0.18.6](https://docs.hashicorp.com/sentinel/changelog#0-18-6-february-2-2022) | +| [v202203-1](/terraform/enterprise/releases/2022/v202203-1) | 607 | [2.53.4](https://release-notes.replicated.com/release-notes/2.53.4/) | [1.1.6](https://github.com/hashicorp/terraform/releases/tag/v1.1.6) | [0.18.6](https://docs.hashicorp.com/sentinel/changelog#0-18-6-february-2-2022) | +| [v202202-1](/terraform/enterprise/releases/2022/v202202-1) | 599 | [2.53.2](https://release-notes.replicated.com/release-notes/2.53.2/) | [1.1.5](https://github.com/hashicorp/terraform/releases/tag/v1.1.5) | [0.18.6](https://docs.hashicorp.com/sentinel/changelog#0-18-6-february-2-2022) | +| [v202201-2](/terraform/enterprise/releases/2022/v202201-2) | 595 | [2.53.2](https://release-notes.replicated.com/release-notes/2.53.2/) | [1.1.3](https://github.com/hashicorp/terraform/releases/tag/v1.1.3) | [0.18.4](https://docs.hashicorp.com/sentinel/changelog#0-18-4-july-20-2021) | +| [v202201-1](/terraform/enterprise/releases/2022/v202201-1) | 594 | [2.53.2](https://release-notes.replicated.com/release-notes/2.53.2/) | [1.1.3](https://github.com/hashicorp/terraform/releases/tag/v1.1.3) | [0.18.4](https://docs.hashicorp.com/sentinel/changelog#0-18-4-july-20-2021) | + +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202201-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202201-1.mdx new file mode 100644 index 000000000..ea508ffbe --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202201-1.mdx @@ -0,0 +1,45 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202201-1 (594) release. +--- + +# Terraform Enterprise v202201-1 (594) + +## Deprecations + +1. If you are using Terraform CLI v1.1.0 or v1.1.1, please upgrade to the latest version as soon as possible. Terraform CLI v1.1.0 and v1.1.1 both have a bug where a failure to construct the apply-time graph can cause Terraform to incorrectly report success and save an empty state, effectively “forgetting” all existing infrastructure. Although configurations that already worked on previous releases should not encounter this problem, it’s possible that incorrect future configuration changes would trigger this behavior during the apply step. + +The Terraform Enterprise April 2022 release will: + +1. Remove the [demo operational mode](/terraform/enterprise/v202201-1/replicated/install/pre-install-checklist#operational-mode-decision), which is also known as the proof of concept (PoC) operational mode. The mounted disk operational mode will replace the demo operational mode for both non-production and production Terraform Enterprise environments. To check which mode your installation is using, run `replicatedctl app-config export --template '{{ .installation_type.Value }}'`. The value `poc` indicates that your installation is using the demo operational mode. The April 2022 release notes will contain more information about how to migrate. +1. Update the names of containers, which may break container monitoring or custom tooling that identifies containers by name. The April 2022 release notes will explain these name changes in more detail and provide a complete list of old and new container names. + +## Features + +1. The setting to [require site admins to enable two-factor authentication](/terraform/enterprise/application-administration/general#require-site-admins-to-enable-two-factor-authentication) now applies when SAML is enabled. +1. Install-specific values are now available in the API. The UI also uses a new API-driven page configuration during bootstrapping. +1. Users who are logged in can now view and manage their active sessions within their user settings. +1. The [CLI integration](/terraform/cli/cloud) is now available for using Terraform Enterprise from the command line. We recommend using this native integration for Terraform versions 1.1 or later, as it provides an improved user experience and various enhancements. +1. Terraform versions 1.1.0 and 1.1.1 are now marked as deprecated. Deprecated versions cannot be selected in the workspace settings, but workspaces already using a deprecated version will display a warning. +1. Container resource usage metrics are now available in Prometheus format. +1. The private registry UI now displays a warning message for old versions of provider documentation with a link to the latest version. It also includes an **On this Page** outline for provider documentation that lets you navigate more quickly between sections. +1. Added an outline to the public provider documentation page +1. The [new `tfe-admin rotate-encryption-password` command](/terraform/enterprise/v202201-1/replicated/administration/infrastructure/admin-cli) rotates the encryption password on active/active installations of Terraform Enterprise. +1. A workspace's ID can now be copied from the workspace overview page. +1. New speculative attribute has been added to the [Configuration Versions API](/terraform/cloud-docs/api-docs/configuration-versions) response. +1. Add new option to allow teams that aren't the owner team to manage modules in the private registry. + +## Bug Fixes + +1. Obscured OAuth connection errors when connecting VCS providers, such as misconfigured scopes. +1. The Fluent Bit service did not respect lowercase versions of the `HTTP_PROXY` and `NO_PROXY` environment variables. +1. Terraform Enterprise installations using Replicated's `self-signed` TLS certificates returned 500 when fetching structured run output. +1. Resource names will not be mistakenly truncated in structured plan output. +1. Fixed a typo on the workspace variables page. + +## Security + +1. Removed an insecure reference to the initial admin user token from the `REGISTRY_BASE_URL` environment variable in the Registry service. +1. Updated Telegraf to version 1.12.1. +1. Updated InfluxDB to version 2.1.1. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202201-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202201-2.mdx new file mode 100644 index 000000000..dc0445bf5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202201-2.mdx @@ -0,0 +1,47 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202201-2 (595) release. +--- + +# Terraform Enterprise v202201-2 (595) + +## Changes Since v202201-1 + +1. Reintroduced the default log rotation settings for the `json-file` Docker logging driver, fixing a regression that was introduced in v202109-1 where container log files would grow unbounded and never rotate when the log forwarding feature was disabled. + +## Deprecations + +1. If you are using Terraform CLI v1.1.0 or v1.1.1, please upgrade to the latest version as soon as possible. Terraform CLI v1.1.0 and v1.1.1 both have a bug where a failure to construct the apply-time graph can cause Terraform to incorrectly report success and save an empty state, effectively “forgetting” all existing infrastructure. Although configurations that already worked on previous releases should not encounter this problem, it’s possible that incorrect future configuration changes would trigger this behavior during the apply step. + +The Terraform Enterprise April 2022 release will: + +1. Remove the [demo operational mode](/terraform/enterprise/v202201-2/replicated/install/pre-install-checklist#operational-mode-decision), which is also known as the proof of concept (PoC) operational mode. The mounted disk operational mode will replace the demo operational mode for both non-production and production Terraform Enterprise environments. To check which mode your installation is using, run `replicatedctl app-config export --template '{{ .installation_type.Value }}'`. The value `poc` indicates that your installation is using the demo operational mode. The April 2022 release notes will contain more information about how to migrate. +1. Update the names of containers, which may break container monitoring or custom tooling that identifies containers by name. The April 2022 release notes will explain these name changes in more detail and provide a complete list of old and new container names. + +## Features + +1. The setting to [require site admins to enable two-factor authentication](/terraform/enterprise/application-administration/general#require-site-admins-to-enable-two-factor-authentication) now applies when SAML is enabled. +1. Users who are logged in can now view and manage their active sessions within their user settings. +1. The [CLI integration](/terraform/cli/cloud) is now available for using Terraform Enterprise from the command line. We recommend using this native integration for Terraform versions 1.1 or later, as it provides an improved user experience and various enhancements. +1. Terraform versions 1.1.0 and 1.1.1 are now marked as deprecated. Deprecated versions cannot be selected in the workspace settings, but workspaces already using a deprecated version will display a warning. +1. Container resource usage metrics are now available in Prometheus format. +1. The private registry UI now displays a warning message for old versions of provider documentation with a link to the latest version. It also includes an **On this Page** outline for provider documentation that lets you navigate more quickly between sections. +1. Added an outline to the public provider documentation page +1. The [new `tfe-admin rotate-encryption-password` command](/terraform/enterprise/v202201-2/replicated/administration/infrastructure/admin-cli) rotates the encryption password on active/active installations of Terraform Enterprise. +1. A workspace's ID can now be copied from the workspace overview page. +1. New speculative attribute has been added to the [Configuration Versions API](/terraform/cloud-docs/api-docs/configuration-versions) response. + +## Bug Fixes + +1. Obscured OAuth connection errors when connecting VCS providers, such as misconfigured scopes. +1. The Fluent Bit service did not respect lowercase versions of the `HTTP_PROXY` and `NO_PROXY` environment variables. +1. Terraform Enterprise installations using Replicated's `self-signed` TLS certificates returned 500 when fetching structured run output. +1. Resource names will not be mistakenly truncated in structured plan output. +1. Fixed a typo on the workspace variables page. + +## Security + +1. Removed an insecure reference to the initial admin user token from the `REGISTRY_BASE_URL` environment variable in the Registry service. +1. Updated Telegraf to version 1.12.1. +1. Updated InfluxDB to version 2.1.1. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202202-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202202-1.mdx new file mode 100644 index 000000000..fe535e94e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202202-1.mdx @@ -0,0 +1,40 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202202-1 (599) release. +--- + +# Terraform Enterprise v202202-1 (599) + +## Deprecations + +The Terraform Enterprise April 2022 release will: + +1. Remove the [demo operational mode](/terraform/enterprise/v202202-1/replicated/install/pre-install-checklist#operational-mode-decision), which is also known as the proof of concept (PoC) operational mode. The mounted disk operational mode will replace the demo operational mode for both non-production and production Terraform Enterprise environments. To check which mode your installation is using, run `replicatedctl app-config export --template '{{ .installation_type.Value }}'`. The value `poc` indicates that your installation is using the demo operational mode. The April 2022 release notes will contain more information about how to migrate. +1. Update the names of containers, which may break container monitoring or custom tooling that identifies containers by name. The April 2022 release notes will explain these name changes in more detail and provide a complete list of old and new container names. +1. Change the default value of [`restrict_worker_metadata_access`](/terraform/enterprise/v202202-1/replicated/install/automated/automating-the-installer#restrict_worker_metadata_access) to 1 (true) instead of 0 (false). If you rely on the instance metadata endpoint (and make use of its instance profile), you must explicitly set the `restrict_worker_metadata_access` configuration flag in `replicated.conf` to 0. + +## Features + +1. Changed tag name restrictions to include letters, numbers, colons, hyphens, and underscores; and must begin and end with an alphanumeric character. +1. Added the ability to fuzzy find or find an exact match for Terraform versions using query parameters. + +## Bug Fixes + +1. Fixed rendering of multi-paragraph Terraform diagnostic messages. +2. Fixed run source UI "triggered from CLI" when using CLI cloud integration. +3. Fixed `deprecated-reason` to be null if tool version is un-deprecated in the Terraform Versions API. +4. Fixed slow initial UI load for users who belong to hundreds of organizations. +5. Fixed bug to disallow workspace from being renamed when a run has not completed. +6. Fixed a UI issue where newly created organization API tokens weren't shown when the previous one was recently deleted. +7. Updated Sentinel to 0.18.6 + +## Security + +1. Modified Terraform Enterprise application logging configuration to remediate inadvertent capture of HTTP request bodies (CVE-2022-25374). +1. Enables ACLs for the internally-managed Nomad service so that requests to Nomad must be authenticated. +1. Fixed rate limiting to be based on the AuthenticationToken instead of remote IP in some cases. +1. Updated the version of Rails to address CVE 2022-23633. +1. Updated the version of the internally-managed Vault server to 1.9.3. +1. Updated the version of the internally-managed Nomad server to 1.2.4. +1. Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202203-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202203-1.mdx new file mode 100644 index 000000000..7946a36de --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202203-1.mdx @@ -0,0 +1,45 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202203-1 (607) release. +--- + +# Terraform Enterprise v202203-1 (607) + +## Known Issues + +1. [April 21, 2022] This release includes an issue with the `tfe-bootstrap` container being unable to negotiate the Docker API version causing the installation and upgrade of Terraform Enterprise to fail with `Error response from daemon: client version 1.41 is too new. Maximum supported API version is 1.40` affecting docker `v19.03.x` or older. This issue is fixed in `v202204-2`. +1. [May 10, 2022] This release includes an issue with Audit Log tagging, causing audit logs to no longer be tagged with the [Audit Log] prefix. This issue will be fixed in 'v202205-1'. + +## Breaking Changes + +The minimum required Replicated version is now 2.53.4. Airgap customers can visit this URL to download the latest Replicated version: [https://install.terraform.io/airgap/latest.tar.gz](https://install.terraform.io/airgap/latest.tar.gz). + +## Deprecations + +The Terraform Enterprise April 2022 release will: + +1. Remove the [demo operational mode](/terraform/enterprise/v202203-1/replicated/install/pre-install-checklist#operational-mode-decision), which is also known as the proof of concept (PoC) operational mode. The mounted disk operational mode will replace the demo operational mode for both non-production and production Terraform Enterprise environments. To check which mode your installation is using, run `replicatedctl app-config export --template '{{ .installation_type.Value }}'`. The value `poc` indicates that your installation is using the demo operational mode. The April 2022 release notes will contain more information about how to migrate. +1. Update the names of containers, which may break container monitoring or custom tooling that identifies containers by name. The April 2022 release notes will explain these name changes in more detail and provide a complete list of old and new container names. +1. Change the default value of [`restrict_worker_metadata_access`](/terraform/enterprise/v202203-1/replicated/install/automated/automating-the-installer#restrict_worker_metadata_access) to 1 (true) instead of 0 (false). If you rely on the instance metadata endpoint and make use of its instance profile, you must explicitly set the `restrict_worker_metadata_access` configuration flag in `replicated.conf` to 0. + +## Features + +1. Added the ability to [archive configuration versions](/terraform/cloud-docs/workspaces/configurations#archiving-configuration-versions) either automatically or manually in order to free up storage space and limit the amount of sensitive data stored in Terraform Enterprise. +1. Improved the performance and reliability when destroying large workspaces. +1. Added support to [publish private providers](/terraform/cloud-docs/registry/publish-providers) in the Terraform Cloud private registry. Once you have published a private provider through the API, members of your organization can search for it in the private registry UI and use it in configurations. +1. Added API endpoints to the Terraform Cloud API for [downloading configuration versions](/terraform/cloud-docs/api-docs/configuration-versions#download-configuration-files). A configuration version is a resource used to reference the uploaded configuration files that are associated with the Terraform runs. +1. Added [Variable Sets](/terraform/cloud-docs/api-docs/variable-sets) which let you reuse the same variables across multiple workspaces. For example, you could define a variable set of provider credentials and automatically apply it to all of the workspaces using that provider. . +1. Added html and/or plain-text email format support to all account-related emails that are sent to users on behalf of TFE. + +## Bug Fixes + +1. Fixed response code for JSON parse errors as parse failures should result in 400 Bad Request responses to clients. +1. Fixed API dasherizing state output keys when the top level output type is an array containing maps. +1. Fixed 500 error when fetching admin organization that does not exist. +1. Fixed syntax error when setting a Terraform variable to `null`. +1. Fixed Tag creation dates that are now displayed correctly. + +## Security + +Ongoing container updates to address reported vulnerabilities in underlying packages / dependencies, including OpenSSL-related [CVE-2022-0778](https://nvd.nist.gov/vuln/detail/CVE-2022-0778). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202204-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202204-1.mdx new file mode 100644 index 000000000..8211261a9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202204-1.mdx @@ -0,0 +1,48 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202201-1 (594) release. +--- + +# Terraform Enterprise v202204-1 (609) + +## Known Issues + +1. [April 21, 2022] This release includes an issue with the `tfe-bootstrap` container being unable to negotiate the Docker API version causing the installation and upgrade of Terraform Enterprise to fail with `Error response from daemon: client version 1.41 is too new. Maximum supported API version is 1.40` affecting docker `v19.03.x` or older. This issue is fixed in `v202204-2`. +2. [May 3, 2022] `tfe-admin health-check` fails with `sh: /root/ptfe-health-check: not found` after a change to the `ptfe_health_check` container Entrypoint to run the process as an unprivileged user under `/run/ptfe-health-check` but the `alias` was still referencing `/root/ptfe-health-check`. This issue will be fixed in `v202205-1`. +3. [May 10, 2022] This release includes an issue with Audit Log tagging, causing audit logs to no longer be tagged with the [Audit Log] prefix. This issue will be fixed in 'v202205-1'. + +## Breaking Changes + +1. The demo [operational mode](/terraform/enterprise/v202204-1/replicated/install/pre-install-checklist#operational-mode-decision) has been removed. If you are currently running demo mode, we strongly suggest that you upgrade to Terraform Enterprise v202204-1. To do this, you must [migrate your application data](/terraform/enterprise/v202307-1/admin/infrastructure/demo-to-disk-migration). + +The Terraform Enterprise May 2022 release will change the names of application containers from `ptfe_*` to `tfe-*` for product consistency. For example, `ptfe_nginx` will be changed to `tfe-nginx`. If you have downstream configuration (monitoring, log forwarding etc.) that references the older naming scheme, you will need to update container references to the new names. + +## Features + +1. Added a log storage memory limit to log forwarding. When the 128MB limit is reached, logs will be stored in a buffer on the filesystem until they can be forwarded. +1. Changed cost estimation so that it uses the [HTTP proxy settings](/terraform/enterprise/v202204-1/replicated/install/interactive/installer#proxy-usage) configured within Terraform Enterprise. +1. Added the ability to specify an ['SSO team ID'](/terraform/cloud-docs/users-teams-organizations/single-sign-on#team-names-and-sso-team-ids) for teams that Terraform Enterprise can use to map teams to non-human readable 'MemberOf' values in SAML assertions. +1. Updated display of download count metrics for modules in the private registry +1. Added an API endpoint to fetch a workspace's current state version outputs. Refer to [Show Current State Version Outputs For a Workspace](/terraform/cloud-docs/api-docs/state-version-outputs#show-current-state-version-outputs-for-a-workspace) for details. +1. Updated the default `json-file` log rotation settings for all containers in order to improve the performance of support bundle generation. + + | Previous Settings | New Settings | + | :----------------------------------: | :--------------------------------: | + | `max-size: 10m` and `max-file: 3` | `max-size: 8m` and `max-file: 4` | + | `max-size: 10m` and `max-file: 10` | `max-size: 32m` and `max-file: 4` | + | `max-size: 100m` and `max-file: 10` | `max-size: 64m` and `max-file: 8` | + | `max-size: 100m` and `max-file: 200` | `max-size: 50m` and `max-file: 20` | + +## Bug Fixes + +1. The [`iact_subnet_list` setting](/terraform/enterprise/v202204-1/replicated/install/automated/automating-the-installer#iact_subnet_list) now allows you to use `, ` to separate IPv4 addresses. +2. Fixed situation where occasionally you could not create a workspace after a workspace with the same name was deleted. +3. Fixed an issue causing configuration version tarballs downloaded through the API to have a non-human-readable filename and no file extension. +4. Fixed several issues with Terraform Cloud agent pools. + +## Security + +1. Added no-cache and no-store headers for some API responses that may contain sensitive data (2FA configuration, SSO configuration, and state versions). +1. Removed credentials from health-check endpoint for an internal service. +1. Adopted container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202204-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202204-2.mdx new file mode 100644 index 000000000..28d713a56 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202204-2.mdx @@ -0,0 +1,51 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202204-2 (610) release. +--- + +# Terraform Enterprise v202204-2 (610 Required) + +## Changes Since v202204-1 + +The `tfe-bootstrap` container now automatically negotiates the Docker API version before making requests to the Docker API to prevent `Error response from daemon: client version 1.41 is too new. Maximum supported API version is 1.40` errors upon Terraform Enterprise installation or upgrade. + +## Known Issues + +1. [May 3, 2022] `tfe-admin health-check` fails with `sh: /root/ptfe-health-check: not found` after a change to the `ptfe_health_check` container Entrypoint to run the process as an unprivileged user under `/run/ptfe-health-check` but the `alias` was still referencing `/root/ptfe-health-check`. This issue will be fixed in `v202205-1`. +1. [May 10, 2022] This release includes an issue with Audit Log tagging, causing audit logs to no longer be tagged with the [Audit Log] prefix. This issue will be fixed in 'v202205-1'. + +## Breaking Changes + +1. The demo [operational mode](/terraform/enterprise/v202204-2/replicated/install/pre-install-checklist#operational-mode-decision) has been removed. If you are currently running demo mode, we strongly suggest that you upgrade to Terraform Enterprise v202204-1. To do this, you must [migrate your application data](/terraform/enterprise/v202307-1/admin/infrastructure/demo-to-disk-migration). + +The Terraform Enterprise May 2022 release will change the names of application containers from `ptfe_*` to `tfe-*` for product consistency. For example, `ptfe_nginx` will be changed to `tfe-nginx`. If you have downstream configuration (monitoring, log forwarding etc.) that references the older naming scheme, you will need to update container references to the new names. + +## Features + +1. Added a log storage memory limit to log forwarding. When the 128MB limit is reached, logs will be stored in a buffer on the filesystem until they can be forwarded. +1. Changed cost estimation so that it uses the [HTTP proxy settings](/terraform/enterprise/v202204-2/replicated/install/interactive/installer#proxy-usage) configured within Terraform Enterprise. +1. Added the ability to specify an ['SSO team ID'](/terraform/cloud-docs/users-teams-organizations/single-sign-on#team-names-and-sso-team-ids) for teams that Terraform Enterprise can use to map teams to non-human readable 'MemberOf' values in SAML assertions. +1. Updated display of download count metrics for modules in the private registry +1. Added an API endpoint to fetch a workspace's current state version outputs. Refer to [Show Current State Version Outputs For a Workspace](/terraform/cloud-docs/api-docs/state-version-outputs#show-current-state-version-outputs-for-a-workspace) for details. +1. Updated the default `json-file` log rotation settings for all containers in order to improve the performance of support bundle generation. + + | Previous Settings | New Settings | + | :----------------------------------: | :--------------------------------: | + | `max-size: 10m` and `max-file: 3` | `max-size: 8m` and `max-file: 4` | + | `max-size: 10m` and `max-file: 10` | `max-size: 32m` and `max-file: 4` | + | `max-size: 100m` and `max-file: 10` | `max-size: 64m` and `max-file: 8` | + | `max-size: 100m` and `max-file: 200` | `max-size: 50m` and `max-file: 20` | + +## Bug Fixes + +1. The [`iact_subnet_list` setting](/terraform/enterprise/v202204-2/replicated/install/automated/automating-the-installer#iact_subnet_list) now allows you to use `, ` to separate IPv4 addresses. +2. Fixed situation where occasionally you could not create a workspace after a workspace with the same name was deleted. +3. Fixed an issue causing configuration version tarballs downloaded through the API to have a non-human-readable filename and no file extension. +4. Fixed several issues with Terraform Cloud agent pools. + +## Security + +1. Added no-cache and no-store headers for some API responses that may contain sensitive data (2FA configuration, SSO configuration, and state versions). +1. Removed credentials from health-check endpoint for an internal service. +1. Adopted container updates to address reported vulnerabilities in underlying packages / dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202205-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202205-1.mdx new file mode 100644 index 000000000..9d1831f0f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202205-1.mdx @@ -0,0 +1,41 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202205-1 (619) release. +--- + +# Terraform Enterprise v202205-1 (619) + +## Known Issues + +1. External Vault users using the default Vault namespace will see the error `/usr/bin/vault-external-configure: line 37: VAULT_NAMESPACE: unbound variable` in the `tfe-vault` logs when attempting to start Terraform Enterprise. This error prevents Terraform Enterprise from starting. To resolve this, run `tfe-admin app-config -k extern_vault_namespace -v 'root'` and restart Terraform Enterprise. This does not affect External Vault users that use a custom Vault namespace. + +## Breaking Changes + +1. All container names now follow the same naming convention: `tfe-`. If you have tooling that identifies containers by name, make sure this tooling is updated to reflect the new naming convention. + +## Features + +1. Add option to de-register [inactive Agents](/terraform/cloud-docs/agents#agent-capacity-usage) through the **Organization Settings > Agents** UI. +2. Updated [Organization Memberships api](/terraform/cloud-docs/api-docs/organization-memberships#query-parameters) to add new `filter[email]` query parameter. +3. Updated [Teams api](/terraform/cloud-docs/api-docs/teams#query-parameters) to add new `filter[names]` query parameter. + +## Bug Fixes + +1. Fixed a bug where long words in a workspace readme were overflowing its column +2. Fixed potential issue when remembering 2FA logins with modern web browsers. +3. Changed logging to remove deprecation warnings related to :after_commit callbacks. This reduces noise in log output. +4. Fixed an issue with mock generation for nested attributes within a provider, which blocked Sentinel mocks from generating +5. Fixed application navigation to optimize for mobile use. +6. Fixed speculative, plan-only runs with incorrect run statuses that could prevent you from renaming workspaces. +7. Fixed a bug that broke retries for recoverable Git operations. +8. Fixed a bug that caused Git operations to retry unrecoverable authentication errors. +9. Improved agent dequeueing performance for large agent pools. +10. Changed Vault CLI commands to Vault API calls for token creation. This will prevent any Vault CLI/Server version mismatch errors. +11. Fixed issue where log tags such as "[Audit Log]" were not visible in logs. + +## Security + +1. Adopted container updates to address reported vulnerabilities in underlying packages / dependencies. +2. Updated the version of the internally-managed Vault server to 1.10.2. +3. Updated the version of the internally-managed Nomad server to 1.2.6. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202206-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202206-1.mdx new file mode 100644 index 000000000..a36c95b2a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202206-1.mdx @@ -0,0 +1,38 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202206-1 (636) release. +--- + +# Terraform Enterprise v202206-1 (636) + +## Features + +1. Added [Run Task](/terraform/enterprise/workspaces/settings/run-tasks) functionality to Terraform Enterprise. +1. Added several new run options to simplify Terraform upgrades: [perform plan-only runs with an alternate Terraform version](/terraform/enterprise/run/ui#testing-terraform-upgrades-with-speculative-plans), re-try completed speculative plans with an alternate Terraform version, and use [empty apply runs](/terraform/enterprise/run/modes-and-options#allow-empty-apply) to upgrade your state without requiring config changes. +1. Added functionality to the [backup and restore API](/terraform/enterprise/v202206-1/replicated/administration/infrastructure/backup-restore) that lets Terraform Enterprise skip backing up the object storage data. +1. Added a warning in **Workspace > Settings > General** when you select a new Terraform version that is not recommended. +1. Updated the email template used when testing SMTP configuration. +1. Updated the email template used when sending VCS notifications. +1. Added support for [sending notifications to Microsoft Teams channels](/terraform/enterprise/workspaces/settings/notifications#microsoft-teams). +1. Terraform CLI versions up through 1.2.1 are now available. +1. Added a background task to backfill the `plan_only` column on the runs table. This is an internal cleanup task to support ongoing app improvements. No action is required. A future TFE release will perform any remaining work for this backfill as a normal database migration during the upgrade. + +## Bug Fixes + +1. Fixed SAML performance issue. Previously the SAML login performance would degrade significantly in installs with large amounts of Organizations and Teams. This release significantly improves the overall performance of SAML logins. +1. Fixed VCS Workspace creation not enabling "Automatic speculative plans" when enabled by the user. +1. [Structured run output](/terraform/enterprise/workspaces/settings#user-interface) will no longer throw the error `undefined is not an object` when objects are deleted. +1. Fixed a bug that was blocking users from cancelling runs in certain states. +1. Fixed a performance issue where requests to the `/workspaces` endpoint were taking longer than 3000ms. +1. Service Accounts will no longer be emailed when an Organization is deleted. +1. Fix 'Copy' button in two-factor settings for copying recovery codes. +1. Fixed an issue where upgrading Terraform Enterprise would overwrite existing Terraform CLI Versions. +1. Fixed an unbound variable error issue when `extern_vault_namespace` was unset. + +## Security + +1. Adopted container updates to address reported vulnerabilities in underlying packages / dependencies. +1. Updated go-getter version to protect against security vulnerabilities. +1. Updated ruby to 2.7.6, receiving a fix against a security vulnerability. +1. Updated Sentinel to 0.18.10 which included multiple security fixes for remote source installation. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202207-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202207-1.mdx new file mode 100644 index 000000000..da44c9bbc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202207-1.mdx @@ -0,0 +1,55 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202207-1 (641) release. +--- + +# Terraform Enterprise v202207-1 (641) + +## Known Issues + +1. Only applicable when using External Vault. You must update your [External Vault](/terraform/enterprise/v202207-1/replicated/install/vault) policy to use specific API paths instead of wildcard matching. Skipping this step prevents Terraform Enterprise from starting. + +## Highlights + +1. This release includes a data migration that will strengthen the association between a workspace and its current configuration version. This will improve query performance in many Terraform Enterprise workflows and reduce unnecessary `git clone` operations by keeping Terraform Enterprise from archiving the latest configuration version. **This migration will lengthen the upgrade process. You can expect it to take roughly 1 to 1.5 minutes per 10,000 workspaces.** +1. Using the new `azure_use_msi` and `azure_client_id` [settings](/terraform/enterprise/v202207-1/replicated/install/automated/automating-the-installer#available-settings), it is now possible to authenticate to Azure Blob Storage with a system-assigned or user-assigned Azure managed identity. +1. The `gcs_credentials` setting is now optional. Terraform Enterprise will attempt to authenticate to Google Blob Storage with the attached service account when the `gcs_credentials` variable is unset. +1. The internally-managed PostgreSQL server has been upgraded from PostgreSQL 12 to PostgreSQL 14. This change only affects mounted disk mode. It does not affect external services installations. The first time a Terraform Enterprise installation is upgraded to v202207-1, a program will be executed that will upgrade the PostgreSQL 12 data to PostgreSQL 14. This program takes a backup of the PostgreSQL data before upgrading. Regardless, operators should back up their Terraform Enterprise data before upgrading to Terraform Enterprise v202207-1. +1. External Services mode now officially supports PostgreSQL v13.x and v14.x. Follow the instructions to upgrade your PostgreSQL server: [Amazon RDS](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_UpgradeDBInstance.PostgreSQL.html), [Azure PostgreSQL](https://docs.microsoft.com/en-us/azure/postgresql/single-server/how-to-upgrade-using-dump-and-restore), [Google Cloud PostgreSQL](https://cloud.google.com/sql/docs/postgres/upgrade-major-db-version-inplace), or a [self-hosted PostgreSQL database](https://www.postgresql.org/docs/current/upgrading.html). +1. The `azure_endpoint` setting is now optional. The default Azure Blob Storage endpoint will be used when this setting is unset. If you have previously set a value for this setting and wish to use the default Azure Blob Storage endpoint, use `tfe-admin app-config -k azure_endpoint -v ''` to unset it to prevent a `dial tcp: lookup example_account.core.windows.net on 127.0.0.11:53: no such host"` error on application startup. + +-> **Note:** As of November 2, 2022, Terraform Enterprise fixed an issue that prevented the previously mentioned data migration from completing when workspaces had large amounts of configuration versions. This fix also improves performance. The digest of the new `tfe-atlas` container is: `sha256:0814d28867f5fa1b42a192237be94c8699f5af5102afcd8c10731636fc42e5b8` + +## Features + +1. When you create a new workspace in the UI from a version control repository, Terraform Enterprise scans its configuration files for Terraform variables and displays any that do not have a default value and are not defined in an existing global variable set. This lets you set values for these variables in preparation for your first Terraform run. If you skip this step, you can still create these variables manually later from within the workspace. +1. You can now [scope agent pools](/terraform/cloud-docs/agents#scope-an-agent-pool-to-specific-workspaces) to specific workspaces from the Agent Pool settings page. This will allow you to protect sensitive workspaces by restricting which workspaces can target each agent pool. +1. The [Prometheus metrics endpoint](/terraform/enterprise/v202207-1/replicated/monitoring/monitoring#terraform-enterprise-metrics) now ships an additional metric `tfe_run_current_count`, which represents the current count of TFE runs in a given workspace, organization, and status. +1. Administrators can use [Admin Settings](/terraform/enterprise/api-docs/admin/settings) to set the maximum number of workspaces for any single organization. + +## Improvements + +1. When [listing workspaces](/terraform/enterprise/api-docs/workspaces#list-workspaces), you can now use the `exclude-tags` parameter to exclude workspaces with specific tags. +1. Any trailing `/` character will now be trimmed from the External Vault address (`extern_vault_addr`) to prevent making API requests to incorrect API paths. +1. API responses to the provider registry may now be shown in a different order than the previous release. + +## Bug Fixes + +1. Archivist will now return 500 status codes when Vault calls fail, and it is not a result of user error. Previously all Vault failures caused Archivist to return 400 status codes. +1. The edit button for workspace notification configurations now displays correctly instead of appearing as an unstyled link. +1. Logs no longer contain unhelpful `ruby_analytics` log messages. +1. The workspace variables settings page can now display all variable sets applied to a workspace, rather than just the first twenty. +1. Users may now authenticate via SAML in multiple concurrent sessions. Previously a bug would log out any existing sessions when authenticating via SAML. +1. Workspaces will no longer occasionally get stuck in a pending state when multiple runs are triggered at the same time. +1. Long variable keys on a workspace's variable page used to hide the corresponding sensitive and/or HCL tags. These tags now appear in the UI as expected. +1. VCS workspaces that end with a trailing `/` character will correctly render the `README.md` file if present. +1. Structured run output will no longer attempt to display a diff for data sources in the plan UI. This prevents a spurious error when data sources are used in a Terraform plan. +1. Changed ingress logic to avoid displaying unsupported GitHub repositories. +1. API rate limiting logic was modified to differentiate between the types of token being used for access, reducing reliance on the IP-based fallback rule which was causing problems in some shared environment use cases. + +## Security + +1. The [External Vault](/terraform/enterprise/v202207-1/replicated/install/vault) policy has been updated to use specific API paths instead of wildcard matching. +1. The version of the internally-managed Nomad server has been updated to 1.3.1. +1. Container updates have been adopted, addressing reported vulnerabilities (CVEs) in underlying packages / dependencies. This change bumps the version of Fluent Bit in `tfe-fluent-bit` to 1.9.5. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202207-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202207-2.mdx new file mode 100644 index 000000000..491ec15ac --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202207-2.mdx @@ -0,0 +1,59 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202207-2 (642) release. +--- + +# Terraform Enterprise v202207-2 (642 Required) + +## Changes Since v202207-1 + +1. For customers running a standalone TFE installation with metrics enabled, this release fixes a bug with metrics delivery. + +## Known Issues + +1. Only applicable when using External Vault. You must update your [External Vault](/terraform/enterprise/v202207-2/replicated/install/vault) policy to use specific API paths instead of wildcard matching. Skipping this step prevents Terraform Enterprise from starting. + +## Highlights + +1. This release includes a data migration that will strengthen the association between a workspace and its current configuration version. This will improve query performance in many Terraform Enterprise workflows and reduce unnecessary `git clone` operations by keeping Terraform Enterprise from archiving the latest configuration version. **This migration will lengthen the upgrade process. You can expect it to take roughly 1 to 1.5 minutes per 10,000 workspaces.** +1. Using the new `azure_use_msi` and `azure_client_id` [settings](/terraform/enterprise/v202207-2/replicated/install/automated/automating-the-installer#available-settings), it is now possible to authenticate to Azure Blob Storage with a system-assigned or user-assigned Azure managed identity. +1. The `gcs_credentials` setting is now optional. Terraform Enterprise will attempt to authenticate to Google Blob Storage with the attached service account when the `gcs_credentials` variable is unset. +1. The internally-managed PostgreSQL server has been upgraded from PostgreSQL 12 to PostgreSQL 14. This change only affects mounted disk mode. It does not affect external services installations. The first time a Terraform Enterprise installation is upgraded to v202207-1, a program will be executed that will upgrade the PostgreSQL 12 data to PostgreSQL 14. This program takes a backup of the PostgreSQL data before upgrading. Regardless, operators should back up their Terraform Enterprise data before upgrading to Terraform Enterprise v202207-1. +1. External Services mode now officially supports PostgreSQL v13.x and v14.x. Follow the instructions to upgrade your PostgreSQL server: [Amazon RDS](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_UpgradeDBInstance.PostgreSQL.html), [Azure PostgreSQL](https://docs.microsoft.com/en-us/azure/postgresql/single-server/how-to-upgrade-using-dump-and-restore), [Google Cloud PostgreSQL](https://cloud.google.com/sql/docs/postgres/upgrade-major-db-version-inplace), or a [self-hosted PostgreSQL database](https://www.postgresql.org/docs/current/upgrading.html). +1. The `azure_endpoint` setting is now optional. The default Azure Blob Storage endpoint will be used when this setting is unset. If you have previously set a value for this setting and wish to use the default Azure Blob Storage endpoint, use `tfe-admin app-config -k azure_endpoint -v ''` to unset it to prevent a `dial tcp: lookup example_account.core.windows.net on 127.0.0.11:53: no such host"` error on application startup. + +-> **Note:** As of November 2, 2022, Terraform Enterprise fixed an issue that prevented the previously mentioned data migration from completing when workspaces had large amounts of configuration versions. This fix also improves performance. The digest of the new `tfe-atlas` container is: `sha256:0814d28867f5fa1b42a192237be94c8699f5af5102afcd8c10731636fc42e5b8` + +## Features + +1. When you create a new workspace in the UI from a version control repository, Terraform Enterprise scans its configuration files for Terraform variables and displays any that do not have a default value and are not defined in an existing global variable set. This lets you set values for these variables in preparation for your first Terraform run. If you skip this step, you can still create these variables manually later from within the workspace. +1. You can now [scope agent pools](/terraform/cloud-docs/agents#scope-an-agent-pool-to-specific-workspaces) to specific workspaces from the Agent Pool settings page. This will allow you to protect sensitive workspaces by restricting which workspaces can target each agent pool. +1. The [Prometheus metrics endpoint](/terraform/enterprise/v202207-2/replicated/monitoring/monitoring#terraform-enterprise-metrics) now ships an additional metric `tfe_run_current_count`, which represents the current count of TFE runs in a given workspace, organization, and status. +1. Administrators can use [Admin Settings](/terraform/enterprise/api-docs/admin/settings) to set the maximum number of workspaces for any single organization. + +## Improvements + +1. When [listing workspaces](/terraform/enterprise/api-docs/workspaces#list-workspaces), you can now use the `exclude-tags` parameter to exclude workspaces with specific tags. +1. Any trailing `/` character will now be trimmed from the External Vault address (`extern_vault_addr`) to prevent making API requests to incorrect API paths. +1. API responses to the provider registry may now be shown in a different order than the previous release. + +## Bug Fixes + +1. Archivist will now return 500 status codes when Vault calls fail, and it is not a result of user error. Previously all Vault failures caused Archivist to return 400 status codes. +1. The edit button for workspace notification configurations now displays correctly instead of appearing as an unstyled link. +1. Logs no longer contain unhelpful `ruby_analytics` log messages. +1. The workspace variables settings page can now display all variable sets applied to a workspace, rather than just the first twenty. +1. Users may now authenticate via SAML in multiple concurrent sessions. Previously a bug would log out any existing sessions when authenticating via SAML. +1. Workspaces will no longer occasionally get stuck in a pending state when multiple runs are triggered at the same time. +1. Long variable keys on a workspace's variable page used to hide the corresponding sensitive and/or HCL tags. These tags now appear in the UI as expected. +1. VCS workspaces that end with a trailing `/` character will correctly render the `README.md` file if present. +1. Structured run output will no longer attempt to display a diff for data sources in the plan UI. This prevents a spurious error when data sources are used in a Terraform plan. +1. Changed ingress logic to avoid displaying unsupported GitHub repositories. +1. API rate limiting logic was modified to differentiate between the types of token being used for access, reducing reliance on the IP-based fallback rule which was causing problems in some shared environment use cases. + +## Security + +1. The [External Vault](/terraform/enterprise/v202207-2/replicated/install/vault) policy has been updated to use specific API paths instead of wildcard matching. +1. The version of the internally-managed Nomad server has been updated to 1.3.1. +1. Container updates have been adopted, addressing reported vulnerabilities (CVEs) in underlying packages / dependencies. This change bumps the version of Fluent Bit in `tfe-fluent-bit` to 1.9.5. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-1.mdx new file mode 100644 index 000000000..a86cfccab --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-1.mdx @@ -0,0 +1,35 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202208-1 (647) release. +--- + +# Terraform Enterprise v202208-1 (647) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Known Issues + +1. Database migrations will fail during startup when using PostgreSQL 10 and 11. This is fixed in v202208-2. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Features + +1. You can enable workload identity at either the workspace level or the variable set level by specifying a value for the `TFC_WORKLOAD_IDENTITY_AUDIENCE` [environment variable](/terraform/cloud-docs/workspaces/variables). Enabling workload identity generates a token, stored in the `TFC_WORKLOAD_IDENTITY_TOKEN` variable in your run environment. You can use the token to authenticate cloud providers instead of relying on long-lived credentials in Terraform Enterprise. Contact your HashiCorp representative for details and setup instructions. + +## Improvements + +1. Terraform bundles now attempt to determine the version of the `terraform` binary to more efficiently extract Terraform plugins. +1. When you create a VCS-backed workspace and configure variables in the UI, Terraform Enterprise now validates variable values for the correct type (boolean, string, number, map, list). If the type is incorrect, Terraform Enterprise displays an error message. This helps you configure the required variables for the first run. +1. When generating Sentinel mocks, the `full_name` field will now be included in provider configuration blocks. The value of this field is the entire fully-qualified provider name including hostname and namespace, providing alignment with Terraform CLI json output. + +## Bug Fixes + +1. The Run UI now renders one-line errors in plans or applies correctly, so you do not need to download raw text logs to review the output. +1. The Module Registry Protocol endpoint `/v1/modules/{namespace}/{name}/{provider}/versions` no longer errors when handling modules with a large number of versions. + +## Security + +1. Reading outputs through the Workspaces API's includable relationships now requires permission to read the state version outputs of the workspace. +1. Terraform Enterprise updated `rails` to 6.1.6. This change addresses reported vulnerabilities (CVEs). +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-2.mdx new file mode 100644 index 000000000..9a37347f6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-2.mdx @@ -0,0 +1,37 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202208-2 (651) release. +--- + +# Terraform Enterprise v202208-2 (651) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Changes Since v202208-1 + +1. Database migrations will now successfully complete on startup when running PostgreSQL 10 and 11. + +## Known Issues +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Features + +1. You can enable workload identity at either the workspace level or the variable set level by specifying a value for the `TFC_WORKLOAD_IDENTITY_AUDIENCE` [environment variable](/terraform/cloud-docs/workspaces/variables). Enabling workload identity generates a token, stored in the `TFC_WORKLOAD_IDENTITY_TOKEN` variable in your run environment. You can use the token to authenticate cloud providers instead of relying on long-lived credentials in Terraform Enterprise. Contact your HashiCorp representative for details and setup instructions. + +## Improvements + +1. Terraform bundles now attempt to determine the version of the `terraform` binary to more efficiently extract Terraform plugins. +1. When you create a VCS-backed workspace and configure variables in the UI, Terraform Enterprise now validates variable values for the correct type (boolean, string, number, map, list). If the type is incorrect, Terraform Enterprise displays an error message. This helps you configure the required variables for the first run. +1. When generating Sentinel mocks, the `full_name` field will now be included in provider configuration blocks. The value of this field is the entire fully-qualified provider name including hostname and namespace, providing alignment with Terraform CLI json output. + +## Bug Fixes + +1. The Run UI now renders one-line errors in plans or applies correctly, so you do not need to download raw text logs to review the output. +1. The Module Registry Protocol endpoint `/v1/modules/{namespace}/{name}/{provider}/versions` no longer errors when handling modules with a large number of versions. + +## Security + +1. Reading outputs through the Workspaces API's includable relationships now requires permission to read the state version outputs of the workspace. +1. Terraform Enterprise updated `rails` to 6.1.6. This change addresses reported vulnerabilities (CVEs). +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-3.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-3.mdx new file mode 100644 index 000000000..20f96dad8 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202208-3.mdx @@ -0,0 +1,41 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202208-3 (652) release. +--- + +# Terraform Enterprise v202208-3 (652) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Changes Since v202208-2 + +1. Fixed a regression where run pipeline metrics would not appear in the Prometheus endpoint. + +## Changes Since v202208-1 + +1. Database migrations will now successfully complete on startup when running PostgreSQL 10 and 11. + +## Known Issues +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Features + +1. You can enable workload identity at either the workspace level or the variable set level by specifying a value for the `TFC_WORKLOAD_IDENTITY_AUDIENCE` [environment variable](/terraform/cloud-docs/workspaces/variables). Enabling workload identity generates a token, stored in the `TFC_WORKLOAD_IDENTITY_TOKEN` variable in your run environment. You can use the token to authenticate cloud providers instead of relying on long-lived credentials in Terraform Enterprise. Contact your HashiCorp representative for details and setup instructions. + +## Improvements + +1. Terraform bundles now attempt to determine the version of the `terraform` binary to more efficiently extract Terraform plugins. +1. When you create a VCS-backed workspace and configure variables in the UI, Terraform Enterprise now validates variable values for the correct type (boolean, string, number, map, list). If the type is incorrect, Terraform Enterprise displays an error message. This helps you configure the required variables for the first run. +1. When generating Sentinel mocks, the `full_name` field will now be included in provider configuration blocks. The value of this field is the entire fully-qualified provider name including hostname and namespace, providing alignment with Terraform CLI json output. + +## Bug Fixes + +1. The Run UI now renders one-line errors in plans or applies correctly, so you do not need to download raw text logs to review the output. +1. The Module Registry Protocol endpoint `/v1/modules/{namespace}/{name}/{provider}/versions` no longer errors when handling modules with a large number of versions. + +## Security + +1. Reading outputs through the Workspaces API's includable relationships now requires permission to read the state version outputs of the workspace. +1. Terraform Enterprise updated `rails` to 6.1.6. This change addresses reported vulnerabilities (CVEs). +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202209-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202209-1.mdx new file mode 100644 index 000000000..0bf678ffe --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202209-1.mdx @@ -0,0 +1,48 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202209-1 (654) release. +--- + +# Terraform Enterprise v202209-1 (654) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Known Issues + +1. The newly introduced data migration contains database logic that is incompatible with PostgreSQL 10.x. You must upgrade your PostgreSQL server to version 11.x or later in order to run Terraform Enterprise v202209-1. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Breaking Changes + +1. [Speculative Plans](/terraform/enterprise/run/remote-operations#speculative-plans) are now enabled by default for workspaces using the version control workflow. Because of this change, the UI default now matches the defaults in the [Workspace API](/terraform/enterprise/api-docs/workspaces) and the [Terraform Cloud/Enterprise Provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/workspace#speculative_enabled). + +## Highlights + +1. Terraform Enterprise now enforces the following background migrations and runs them synchronously during upgrades: `DeleteDuplicateHostedFilesForConfigVersions`, `BackfillArchivistObjectStorageDeletionRequests`, `DeleteSoftDeletedHostedFiles`, and `BackfillHostedFileStorageDeletionRequests`. These will block the upgrade process until they are complete. If you have a large installation and are concerned about this blocking the upgrade process you can stop at `v202208-3` and wait until `tfe-admin background-migration-status-all` returns a `0` exit code before proceeding further. +2. This release contains a data migration that will lengthen the upgrade process. You can expect it to take roughly 1-2 minutes for 5,000 organizations, 2-4 minutes for 10,000 organizations. + +## Features + +1. Each HTML template can now produce a text-only version of the email. +1. You can now set a workspace to automatically trigger Terraform runs when you publish a [git tag with a specific format](/terraform/enterprise/workspaces/settings/vcs#trigger-runs-when-a-git-tag-is-published) + +## Improvements + +1. The `PeriodicHostedFileGCWorker` and `DeleteArchivistObjectsWorker` jobs have been removed as they have been superseded by the `StorageDeletionWorker`. The `StorageDeletionWorker` deletes both hosted files and archivist objects more efficiently than the aforementioned jobs, making them unnecessary. +1. The State Version Outputs API has new attributes that store and reveal extra type information. You can now include the attribute `json-state-outputs` when creating a [state version](/terraform/enterprise/api-docs/state-versions#create-a-state-version). These values describe the output values of the state. You can also view the `detailed-type` attribute when viewing [state version outputs](/terraform/enterprise/api-docs/state-version-outputs#list-state-version-outputs), which refines the output with the precise Terraform type. + +## Bug Fixes + +1. Plan output parsing error is now more descriptive and supports a max json nesting of 400. +1. The structured run output diagnostic renderer displays more context for errors caused when you incorrectly call a function or when a pre or postcondition fails. The additional context for incorrect function invocation is only available for runs using Terraform version 1.3.0+. +1. We increased the time between when you delete a workspace and when we actually remove that workspace from the Terraform Enterprise database. This buffer period reduces the likelihood of race conditions when you delete a workspace containing lot of data. +1. When you delete a workspace in admin view, Terraform Enterprise now properly cancels the deletion when you select **Cancel** or close the dialog. +1. Improved explanations for Runs that were not automatically applied in workspaces with auto-approve enabled +1. The workspace destruction process is more reliable. Previously, when you deleted a workspace, Terraform Enterprise would sometimes fail to clean up all associated records. This failure sometimes caused confusion in the UI or caused Terraform Enterprise to consume resources longer than necessary. We made several improvements to address these issues. +1. Build agents and the Terraform build worker now ignore `TF_TOKEN_hostname` workspace variables that match the Terraform Enterprise hostname. These processes must authenticate to the Terraform Enterprise host using a run-specific authentication token. + +## Security + +1. This release updates the internally-managed Nomad server to version 1.3.4. +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202209-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202209-2.mdx new file mode 100644 index 000000000..a98793e76 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202209-2.mdx @@ -0,0 +1,53 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202209-2 (655) release. +--- + +# Terraform Enterprise v202209-2 (655) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Changes Since v202209-1 + +1. Updated the internally-managed Vault policy to fix a `403 permission denied` error that prevented Terraform Enterprise from starting. + +## Known Issues + +1. The newly introduced data migration contains database logic that is incompatible with PostgreSQL 10.x. You must upgrade your PostgreSQL server to version 11.x or later in order to run Terraform Enterprise v202209-1. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Breaking Changes + +1. [Speculative Plans](/terraform/enterprise/run/remote-operations#speculative-plans) are now enabled by default for workspaces using the version control workflow. Because of this change, the UI default now matches the defaults in the [Workspace API](/terraform/enterprise/api-docs/workspaces) and the [Terraform Cloud/Enterprise Provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/workspace#speculative_enabled). + +## Highlights + +1. Terraform Enterprise now enforces the following background migrations and runs them synchronously during upgrades: `DeleteDuplicateHostedFilesForConfigVersions`, `BackfillArchivistObjectStorageDeletionRequests`, `DeleteSoftDeletedHostedFiles`, and `BackfillHostedFileStorageDeletionRequests`. These will block the upgrade process until they are complete. If you have a large installation and are concerned about this blocking the upgrade process you can stop at `v202208-3` and wait until `tfe-admin background-migration-status-all` returns a `0` exit code before proceeding further. +1. This release contains a data migration that will lengthen the upgrade process. You can expect it to take roughly 1-2 minutes for 5,000 organizations, 2-4 minutes for 10,000 organizations. + + +## Features + +1. Each HTML template can now produce a text-only version of the email. +1. You can now set a workspace to automatically trigger Terraform runs when you publish a [git tag with a specific format](/terraform/enterprise/workspaces/settings/vcs#trigger-runs-when-a-git-tag-is-published) + +## Improvements + +1. The `PeriodicHostedFileGCWorker` and `DeleteArchivistObjectsWorker` jobs have been removed as they have been superseded by the `StorageDeletionWorker`. The `StorageDeletionWorker` deletes both hosted files and archivist objects more efficiently than the aforementioned jobs, making them unnecessary. +1. The State Version Outputs API has new attributes that store and reveal extra type information. You can now include the attribute `json-state-outputs` when creating a [state version](/terraform/enterprise/api-docs/state-versions#create-a-state-version). These values describe the output values of the state. You can also view the `detailed-type` attribute when viewing [state version outputs](/terraform/enterprise/api-docs/state-version-outputs#list-state-version-outputs), which refines the output with the precise Terraform type. + +## Bug Fixes + +1. Plan output parsing error is now more descriptive and supports a max json nesting of 400. +1. The structured run output diagnostic renderer displays more context for errors caused when you incorrectly call a function or when a pre or postcondition fails. The additional context for incorrect function invocation is only available for runs using Terraform version 1.3.0+. +1. We increased the time between when you delete a workspace and when we actually remove that workspace from the Terraform Enterprise database. This buffer period reduces the likelihood of race conditions when you delete a workspace containing lot of data. +1. When you delete a workspace in admin view, Terraform Enterprise now properly cancels the deletion when you select **Cancel** or close the dialog. +1. Improved explanations for Runs that were not automatically applied in workspaces with auto-approve enabled +1. The workspace destruction process is more reliable. Previously, when you deleted a workspace, Terraform Enterprise would sometimes fail to clean up all associated records. This failure sometimes caused confusion in the UI or caused Terraform Enterprise to consume resources longer than necessary. We made several improvements to address these issues. +1. Build agents and the Terraform build worker now ignore `TF_TOKEN_hostname` workspace variables that match the Terraform Enterprise hostname. These processes must authenticate to the Terraform Enterprise host using a run-specific authentication token. + +## Security + +1. This release updates the internally-managed Nomad server to version 1.3.4. +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202210-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202210-1.mdx new file mode 100644 index 000000000..f22e3d701 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202210-1.mdx @@ -0,0 +1,58 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202210-1 (659) release. +--- + +# Terraform Enterprise v202210-1 (659) + +_Updated October 6, 2022_ + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Known Issues +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Breaking Changes + +PostgreSQL server version 10 is no longer supported. If you are using an external PostgreSQL server with your Terraform Enterprise installation, you must upgrade to PostgreSQL server version 11 or later. However, we recommend upgrading to PostgreSQL server version 12 or later instead of PostgreSQL server version 11 since PostgreSQL server version 11 is deprecated. + +## Deprecations + +The following operating systems are deprecated, and will no longer be supported following the February Terraform Enterprise release (v202302-1). + +- Debian 8, 9 +- Ubuntu 14.04, 16.04 +- Amazon Linux 2014.03, 2014.09, 2015.03, 2015.09, 2016.03, 2016.09, 2017.03, 2017.09, 2018.03 + +The following PostgreSQL server versions are deprecated, and will no longer be supported following the February Terraform Enterprise release (v202302-1). + +- PostgreSQL 11 + +## Highlights + +1. This release contains a data migration that will lengthen the upgrade process. You can expect it to take roughly 1-2 minutes per 5,000 organizations. + +## Features + +1. You can now query by `name` and `email` when listing organizations using the [Organizations API](/terraform/cloud-docs/api-docs/organizations) endpoint. +1. You can now forcefully cancel policy checks on Terraform runs. + +## Improvements + +1. The [State Versions API](/terraform/cloud-docs/api-docs/state-versions#create-a-state-version) endpoint now accepts an optional `json-state` attribute when creating a state version. The `json-state` attribute is a Base64 encoded string containing the JSON format of the Terraform state file as expressed by `terraform show -json`. Runs using Terraform version 1.3+ will set this `json-state` attribute when creating a state version which can then be used by Terraform Enterprise integrations. + +## Bug Fixes + +1. When comparing JSON-encoded arrays with null values, the structured run output now displays the resource diff under the `plan finished` tab without errors. Previously, the structured run output contained errors for `aws_ecs_task_definition` resources with empty `container_definitions`. +1. Resource status badges are now vertically aligned in structured run output, regardless of the length of the resource name. +1. The UI now displays output from apply operations without depending on the actual values of sensitive data. Previously, run logs contained the plaintext value of sensitive outputs. Terraform version 1.4+ omits all sensitive output values in the downloaded run logs. +1. Enabling workload identity in workspaces with policy checks no longer causes runs to stop responding and eventually fail. +1. Run tasks now timeout after 10 minutes, preventing runs from staying in a pending state indefinitely. +1. Workspace outputs of type `object` with keys containing dashes will no longer be `null` when you view them using `terraform output`. +1. Terraform Enterprise provides more informative errors when it cannot archive a configuration version. + +## Security + +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. +1. Fluent Bit is updated to version 1.9.7. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202211-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202211-1.mdx new file mode 100644 index 000000000..af08fef35 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202211-1.mdx @@ -0,0 +1,51 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202211-1 (660) release. +--- + +# Terraform Enterprise v202211-1 (660) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Known Issues +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +The following operating systems are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + +- Debian 8, 9 +- Ubuntu 14.04, 16.04 +- Amazon Linux 2014.03, 2014.09, 2015.03, 2015.09, 2016.03, 2016.09, 2017.03, 2017.09, 2018.03 + +The following PostgreSQL server versions are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + +- PostgreSQL 11 + +## Features + +1. The [Workspaces API](/terraform/enterprise/api-docs/workspaces) now supports two options for deleting workspaces: safe delete and force delete. Safe delete prevents you from accidentally deleting locked workspaces or workspaces that are managing resources. When you delete a workspace with resources, Terraform can no longer track or manage the remaining infrastructure. Organization owners can force delete locked workspaces with resources, and they can choose whether to give workspace administrators force delete permissions. + +## Improvements + +1. The API produces a clearer error message when you try to assign the same team to a workspace more than once. +1. The SQL query to retrieve organization owners is optimized to improve the latency for requests using the owners team API token. +1. You can now re-authorize OAuth clients without losing workspace VCS connections. + +## Bug Fixes + +1. The post plan completed run state will now trigger a needs attention notification when a Post Plan Task is configured. +1. The run summary now shows a warning when advisory policies fail instead of a passing icon. +1. The plan UI output no longer suggests sensitive config values exist when they are not defined. +1. The Workspace Outputs API no longer replaces dashes with underscores for keys in the `detailed-type` field. This bug prevented Terraform CLI 1.2+ from displaying output values when their names contained dashes. +1. Terraform Enterprise now delays populating outputs from state versions until it can parse the state file outside of the create request. This helps avoid long request times and timeouts when Terraform produces thousands of outputs. +1. Workspace resources that have multiple instances now store their resource address using the correct index key. These resources previously used an integer index that didn't match the resource address in Terraform state. In particular, this affects resources created with the `for_each` meta-argument. +1. The UI no longer incorrectly tags variables from variable sets as **Overwritten**. When navigating between workspaces that share a variable set, the UI used to occasionally tag variables as **Overwritten** when there were no local overrides in the current workspace. +1. Exceptions in Sidekiq workers cannot log sensitive run variables. + +## Security + +1. Updated Fluent Bit to version 1.9.9. +1. The `tfe-fluent-bit` container now uses a [Distroless](https://github.com/GoogleContainerTools/distroless) image, which improves security by eliminating unnecessary packages. +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202212-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202212-1.mdx new file mode 100644 index 000000000..2815e7766 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202212-1.mdx @@ -0,0 +1,62 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202212-1 (665) release. +--- + +# Terraform Enterprise v202212-1 (665) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Known Issues + +1. The Certificate Authority (CA) bundle is not injected into the `tfe-task-worker` container, resulting in x509 errors in Sentinel policies when connecting to HTTPS endpoints. This is fixed in Terraform Enterprise v202212-2. + +1. The logging for some services (tfe-atlas and tfe-sidekiq) are set to `debug` causing an increase in logging output. This is corrected in v202301-2. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +The following operating systems are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + +- Debian 8, 9 +- Ubuntu 14.04, 16.04 +- Amazon Linux 2014.03, 2014.09, 2015.03, 2015.09, 2016.03, 2016.09, 2017.03, 2017.09, 2018.03 + +The following PostgreSQL server versions are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + +- PostgreSQL 11 + +## Highlights + +1. The `tfe-nomad` container has been removed and replaced with a new `tfe-task-worker` container. The `tfe-task-worker` container is now responsible for running `sentinel`, `cost-estimation`, and `plan-exporter` tasks. Logs for these tasks can now be found in the `tfe-task-worker` container logs. This change is part of a larger effort to refresh the architecture of Terraform Enterprise, improve performance and reliability of runs, and support future application-level features. +1. A new `tfe-atlas-ui` container has been added to serve the Terraform Enterprise frontend and static assets. +1. Terraform Enterprise no longer starts when connected to an [unsupported PostgreSQL server version](/terraform/enterprise/v202212-1/replicated/requirements/data-storage/postgres-requirements) to prevent potential database incompatibility issues when upgrading. The entry `PostgreSQL version X does not meet PostgreSQL version requirements` will appear in the logs. +1. Terraform Enterprise now supports [Run tasks in the Pre-plan and Pre-apply](/terraform/cloud-docs/workspaces/settings/run-tasks#associating-run-tasks-with-a-workspace) stages of a run. Run tasks are custom integrations that can send run data to external services. They can either produce warnings or stop runs, depending on your workspace settings. + +## Features + +1. For Terraform versions 1.2+, Terraform Enterprise hides data sources reads in the plan UI by default. Use the filter checkbox to show them when necessary. +1. The [List Workspaces API endpoint](/terraform/enterprise/api-docs/workspaces#list-workspaces) now supports wildcard matching. For example, searching with `search[wildcard-name]=*-prod` returns all workspaces ending in `-prod`. + +## Improvements + +1. Improved the performance of a data migration added in Terraform Enterprise v202207-1 for installations with large amounts of configuration versions. +1. You no longer need to confirm plans with no infrastructure changes that Terraform created with the `allow-empty-apply` option. You may want to use this option when you [upgrade your workspace's state](/terraform/enterprise/workspaces/state#upgrading-state) to a new Terraform version. +1. The users administration page now displays a warning next to accounts with an unconfirmed email address. + +## Bug Fixes + +1. Terraform Enterprise no longer occasionally fails to save outputs associated with a new state. +1. The `tfe-registry-worker` now consistently cleans up the temp disk space that it used during module ingress. +1. Using the the API to create a module version beginning with `v` no longer prevents the registry from displaying other module versions. Versions like `v1.0.3` previously caused failures. +1. You can now download Sentinel mocks for older Terraform runs. +1. When you cancel a Terraform run during the apply process, Terraform Enterprise now displays the resource state as `Unknown`. Previously, the UI showed a message incorrectly implying that Terraform was still attempting to complete the apply. +1. The VCS provider settings no longer displays a blank page for organizations with large numbers of VCS providers. +1. Failed attempts to reauthorize VCS providers no longer prevent new reauthorization workflows. +1. OAuth clients that the `tfe-provider` is managing can no longer start VCS provider reauthorization. +1. Public GitHub avatars will no longer be used for private provider logos when the namespace for the private provider matches a GitHub username. + +## Security + +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202212-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202212-2.mdx new file mode 100644 index 000000000..0a267c238 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2022/v202212-2.mdx @@ -0,0 +1,66 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202212-2 (667) release. +--- + +# Terraform Enterprise v202212-2 (667) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Known Issues + +1. VCS-managed Sentinel policies will fail with `"getent": executable file not found in $PATH`. This will be fixed in Terraform Enterprise v202301-1. + +1. The logging for some services (tfe-atlas and tfe-sidekiq) are set to `debug` causing an increase in logging output. This is corrected in v202301-2. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Changes Since v202212-1 + +1. The Certificate Authority (CA) bundle is now injected into the `tfe-task-worker` container, fixing an issue where Sentinel policies would return x509 errors when connecting to HTTPS endpoints. + +## Deprecations + +The following operating systems are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + +- Debian 8, 9 +- Ubuntu 14.04, 16.04 +- Amazon Linux 2014.03, 2014.09, 2015.03, 2015.09, 2016.03, 2016.09, 2017.03, 2017.09, 2018.03 + +The following PostgreSQL server versions are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + +- PostgreSQL 11 + +## Highlights + +1. The `tfe-nomad` container has been removed and replaced with a new `tfe-task-worker` container. The `tfe-task-worker` container is now responsible for running `sentinel`, `cost-estimation`, and `plan-exporter` tasks. Logs for these tasks can now be found in the `tfe-task-worker` container logs. This change is part of a larger effort to refresh the architecture of Terraform Enterprise, improve performance and reliability of runs, and support future application-level features. +1. A new `tfe-atlas-ui` container has been added to serve the Terraform Enterprise frontend and static assets. +1. Terraform Enterprise no longer starts when connected to an [unsupported PostgreSQL server version](/terraform/enterprise/v202212-2/replicated/requirements/data-storage/postgres-requirements) to prevent potential database incompatibility issues when upgrading. The entry `PostgreSQL version X does not meet PostgreSQL version requirements` will appear in the logs. +1. Terraform Enterprise now supports [Run tasks in the Pre-plan and Pre-apply](/terraform/cloud-docs/workspaces/settings/run-tasks#associating-run-tasks-with-a-workspace) stages of a run. Run tasks are custom integrations that can send run data to external services. They can either produce warnings or stop runs, depending on your workspace settings. + +## Features + +1. For Terraform versions 1.2+, Terraform Enterprise hides data sources reads in the plan UI by default. Use the filter checkbox to show them when necessary. +1. The [List Workspaces API endpoint](/terraform/enterprise/api-docs/workspaces#list-workspaces) now supports wildcard matching. For example, searching with `search[wildcard-name]=*-prod` returns all workspaces ending in `-prod`. + +## Improvements + +1. Improved the performance of a data migration added in Terraform Enterprise v202207-1 for installations with large amounts of configuration versions. +1. You no longer need to confirm plans with no infrastructure changes that Terraform created with the `allow-empty-apply` option. You may want to use this option when you [upgrade your workspace's state](/terraform/enterprise/workspaces/state#upgrading-state) to a new Terraform version. +1. The users administration page now displays a warning next to accounts with an unconfirmed email address. + +## Bug Fixes + +1. Terraform Enterprise no longer occasionally fails to save outputs associated with a new state. +1. The `tfe-registry-worker` now consistently cleans up the temp disk space that it used during module ingress. +1. Using the the API to create a module version beginning with `v` no longer prevents the registry from displaying other module versions. Versions like `v1.0.3` previously caused failures. +1. You can now download Sentinel mocks for older Terraform runs. +1. When you cancel a Terraform run during the apply process, Terraform Enterprise now displays the resource state as `Unknown`. Previously, the UI showed a message incorrectly implying that Terraform was still attempting to complete the apply. +1. The VCS provider settings no longer displays a blank page for organizations with large numbers of VCS providers. +1. Failed attempts to reauthorize VCS providers no longer prevent new reauthorization workflows. +1. OAuth clients that the `tfe-provider` is managing can no longer start VCS provider reauthorization. +1. Public GitHub avatars will no longer be used for private provider logos when the namespace for the private provider matches a GitHub username. + +## Security + +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/index.mdx new file mode 100644 index 000000000..0d4919dec --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/index.mdx @@ -0,0 +1,67 @@ +--- +page_title: 2023 Releases - Terraform Enterprise +description: The 2023 Terraform Enterprise releases. +--- + +# Terraform Enterprise Releases - 2023 + +Terraform Enterprise releases from 2023 are listed in the table below. + + + + + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively in a Kubernetes environment. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | Linked
Terraform CLI\** | Sentinel | Tested Kubernetes Versions (EKS, AKS, GKE) | Helm Chart Version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ------------------------------ | ------------------ | +| [v202312-1](/terraform/enterprise/releases/2023/v202312-1) | [1.6.4](https://github.com/hashicorp/terraform/releases/tag/v1.6.4) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [1.24](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.24.9](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.27.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202311-1](/terraform/enterprise/releases/2023/v202311-1) | [1.6.2](https://github.com/hashicorp/terraform/releases/tag/v1.6.2) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [1.24](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.24.9](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.27.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.0) | +| [v202310-1](/terraform/enterprise/releases/2023/v202310-1) | [1.6.0](https://github.com/hashicorp/terraform/releases/tag/v1.6.0) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [1.24](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.24.9](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.27.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.0.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.0.0) | +| [v202309-1](/terraform/enterprise/releases/2023/v202309-1) | [1.5.6](https://github.com/hashicorp/terraform/releases/tag/v1.5.6) | [0.22.1](https://docs.hashicorp.com/sentinel/changelog#0-22-1-june-22-2023) | [1.24](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.24.9](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.27.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.0.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.0.0) | + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Docker. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | Linked
Terraform CLI\** | Sentinel | Recommended Docker Compose version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- | +| [v202312-1](/terraform/enterprise/releases/2023/v202312-1) | [1.6.4](https://github.com/hashicorp/terraform/releases/tag/v1.6.4) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202311-1](/terraform/enterprise/releases/2023/v202311-1) | [1.6.2](https://github.com/hashicorp/terraform/releases/tag/v1.6.2) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202310-1](/terraform/enterprise/releases/2023/v202310-1) | [1.6.0](https://github.com/hashicorp/terraform/releases/tag/v1.6.0) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202309-1](/terraform/enterprise/releases/2023/v202309-1) | [1.5.6](https://github.com/hashicorp/terraform/releases/tag/v1.5.6) | [0.22.1](https://docs.hashicorp.com/sentinel/changelog#0-22-1-june-22-2023) | [V2](https://docs.docker.com/compose/migrate/) | + +
+ + +Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in **March 2025**. HashiCorp will support this release until April 1, 2026. + +To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by **November 2024**. For more information, refer to [Terraform Enterprise deployment overview](/terraform/enterprise/deploy) or contact your HashiCorp account representative. + +Below is a list of the most recent Terraform Enterprise releases for the replicated deployment method. [Learn more about Replicated](/terraform/enterprise/deploy/replicated). + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI\** | Sentinel | +| ------------------------------------------------------------ | ---------------- | -------------------------------------------------------------------- | ------------------------------------------------------------------- | -------------------------------------------------------------------------------------- | +| [v202312-1](/terraform/enterprise/releases/2023/v202312-1) | 745 | [2.56.1](https://release-notes.replicated.com/release-notes/2.56.1/) | [1.6.4](https://github.com/hashicorp/terraform/releases/tag/v1.6.4) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | +| [v202311-1](/terraform/enterprise/releases/2023/v202311-1) | 742 | [2.56.1](https://release-notes.replicated.com/release-notes/2.56.1/) | [1.6.2](https://github.com/hashicorp/terraform/releases/tag/v1.6.2) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | +| [v202310-1](/terraform/enterprise/releases/2023/v202310-1) | 741 | [2.56.0](https://release-notes.replicated.com/release-notes/2.56.0/) | [1.6.0](https://github.com/hashicorp/terraform/releases/tag/v1.6.0) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | +| [v202309-1](/terraform/enterprise/releases/2023/v202309-1) | 733 | [2.56.0](https://release-notes.replicated.com/release-notes/2.56.0/) | [1.5.6](https://github.com/hashicorp/terraform/releases/tag/v1.5.6) | [0.22.1](https://docs.hashicorp.com/sentinel/changelog#0-22-1-june-22-2023) | +| [v202308-1](/terraform/enterprise/releases/2023/v202308-1) | 725 | [2.56.0](https://release-notes.replicated.com/release-notes/2.56.0/) | [1.5.4](https://github.com/hashicorp/terraform/releases/tag/v1.5.4) | [0.22.1](https://docs.hashicorp.com/sentinel/changelog#0-22-1-june-22-2023) | +| [v202307-1](/terraform/enterprise/releases/2023/v202307-1) | 722 | [2.55.0](https://release-notes.replicated.com/release-notes/2.55.0/) | [1.5.1](https://github.com/hashicorp/terraform/releases/tag/v1.5.1) | [0.22.1](https://docs.hashicorp.com/sentinel/changelog#0-22-1-june-22-2023) | +| [v202306-1](/terraform/enterprise/releases/2023/v202306-1) | 713 | [2.55.0](https://release-notes.replicated.com/release-notes/2.55.0/) | [1.4.6](https://github.com/hashicorp/terraform/releases/tag/v1.4.6) | [0.22.0](https://docs.hashicorp.com/sentinel/changelog#0-22-0-may-31-2023) | +| [v202305-2](/terraform/enterprise/releases/2023/v202305-2) | 706 | [2.55.0](https://release-notes.replicated.com/release-notes/2.55.0/) | [1.4.6](https://github.com/hashicorp/terraform/releases/tag/v1.4.6) | [0.21.0](https://docs.hashicorp.com/sentinel/changelog#0-21-0-march-8-2023) | +| [v202305-1](/terraform/enterprise/releases/2023/v202305-1) | 703 | [2.55.0](https://release-notes.replicated.com/release-notes/2.55.0/) | [1.4.6](https://github.com/hashicorp/terraform/releases/tag/v1.4.6) | [0.21.0](https://docs.hashicorp.com/sentinel/changelog#0-21-0-march-8-2023) | +| [v202304-1](/terraform/enterprise/releases/2023/v202304-1)\* | 692 | [2.54.1](https://release-notes.replicated.com/release-notes/2.54.1/) | [1.4.4](https://github.com/hashicorp/terraform/releases/tag/v1.4.4) | [0.21.0](https://docs.hashicorp.com/sentinel/changelog#0-21-0-march-8-2023) | +| [v202303-1](/terraform/enterprise/releases/2023/v202303-1) | 688 | [2.54.1](https://release-notes.replicated.com/release-notes/2.54.1/) | [1.4.0](https://github.com/hashicorp/terraform/releases/tag/v1.4.0) | [0.20.0](https://docs.hashicorp.com/sentinel/changelog#0-20-0-february-16-2023) | +| [v202302-1](/terraform/enterprise/releases/2023/v202302-1) | 681 | [2.54.1](https://release-notes.replicated.com/release-notes/2.54.1/) | [1.3.8](https://github.com/hashicorp/terraform/releases/tag/v1.3.8) | [0.19.5](https://docs.hashicorp.com/sentinel/v0.19.x/changelog#0-19-5-february-9-2023) | +| [v202301-2](/terraform/enterprise/releases/2023/v202301-2) | 676 | [2.54.0](https://release-notes.replicated.com/release-notes/2.54.0/) | [1.3.7](https://github.com/hashicorp/terraform/releases/tag/v1.3.7) | [0.18.13](https://docs.hashicorp.com/sentinel/changelog#0-18-13-october-31-2022) | +| [v202301-1](/terraform/enterprise/releases/2023/v202301-1) | 675 | [2.54.0](https://release-notes.replicated.com/release-notes/2.54.0/) | [1.3.7](https://github.com/hashicorp/terraform/releases/tag/v1.3.7) | [0.18.13](https://docs.hashicorp.com/sentinel/changelog#0-18-13-october-31-2022) | +| [v202207-2](/terraform/enterprise/releases/2022/v202207-2)\* | 642 | [2.53.7](https://release-notes.replicated.com/release-notes/2.53.7/) | [1.2.4](https://github.com/hashicorp/terraform/releases/tag/v1.2.4) | [0.18.11](https://docs.hashicorp.com/sentinel/changelog#0-18-11-june-8-2022) | + +
+
+ +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202301-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202301-1.mdx new file mode 100644 index 000000000..2a6cfa61c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202301-1.mdx @@ -0,0 +1,80 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202301-1 (675) release. +--- + +# Terraform Enterprise v202301-1 (675) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Known Issues + +1. The logging for some services (tfe-atlas and tfe-sidekiq) are set to `debug` causing an increase in logging output. This is corrected in v202301-2. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +- The following operating systems are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + - Debian 8, 9 + - Ubuntu 14.04, 16.04 + - Amazon Linux 2014.03, 2014.09, 2015.03, 2015.09, 2016.03, 2016.09, 2017.03, 2017.09, 2018.03 +- The following PostgreSQL server versions are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + - PostgreSQL 11 +- Terraform Build Workers are deprecated and will be removed in v202305-1; the base image responsible for executing Terraform runs is changing to tfc-agent. If you are using an alternative worker image, you must migrate to a new image using the tfc-agent base image before v202305-1. If you are not using an alternative worker image no action is required, you will automatically migrate to the new base image in v202302-1 or higher. For more information, refer to the Custom Agent Image migration [guide](/terraform/enterprise/v202301-1/replicated/administration/infrastructure/worker-to-agent-migration). + +## Breaking Changes + +1. The "Manage Policies" Organization Permission has been modified to remove excessive access to resources. **This is a breaking change** as Policy Managers may now require additional permission to perform tasks. As per the API Stability Policy, backwards incompatible changes may be necessary to protect your security. The following permissions changes have been made: + + - Policy Managers will no longer be able to read State Versions. + - Policy Managers will no longer be able to read State Version Outputs. + - Policy Managers will no longer be able to read Assessments and Assessment Results. + - Policy Managers will no longer be able to read variables and variable sets which are not Policy Set parameters. + - Policy Managers will no longer be able to create Workspace Comments. + - Policy Managers will no longer be able to read Workspace Resources. + - Policy Managers will no longer be able to read Run Triggers. + - Policy Managers will no longer be able to list Configuration Versions. + - Policy Managers will no longer be able to read Workspace Notification Configurations. + - Policy Managers will be able to read OAuth Client and OAuth Tokens. Without this change, policy managers cannot add VCS backed Policy Sets. + - Policy Managers be able to list runs in a workspace. + +## Highlights + +1. We've streamlined and updated the Graphical User Interface's navigation menus to match Terraform Cloud. You can now navigate the app from the side menu instead of using a mix of the top menu, side menu, and tabs. + +## Features + +1. You can now share providers in your private registries across many organizations, just like you can for modules. Choose if you want to share all modules and providers, only modules, or only providers. No more publishing and republishing providers in separate organizations. +1. New workspace state feature allows rollback to an older version of state. This can be used to fall back to a known good version of state following an event such as an unfinished upgrade or unwanted state manipulation. The operation does not remove prior states and does not change underlying infrastructure. + +## Improvements + +1. Terraform Enterprise will show a summary of the resources to be created, modified, and destroyed near the prompt to apply or discard a run. It highlights failed policy checks, destroyed resources, or failed run tasks more prominently, so users have better visibility into whether they are applying a potentially dangerous plan. +1. The organization access permissions are now more consistently formatted and have clearer permission subheadings. +1. Rare instances of workspaces failing to delete now have more informative logging. +1. The private registry will now validate providers are supported by the Terraform SDK. +1. Workspace API responses now include a `self-html` link, which is a browsable URL for the workspace. +1. The private registry will no longer accept identifiers for prerelease versions of modules or providers that do not conform to [the SemVer standard](https://semver.org/#spec-item-9). Attempts to publish a version with an invalid prerelease version identifier (e.g. `1.2.3.4` or `1.2.3-beta!`) will now fail. +1. Diagnostics results view for Structured Run Output can now be collapsed. +1. When a workspace set to Structured Run Output mode has a successful apply, the Outputs view will be expanded by default. + +## Bug Fixes + +1. Database schemas are now created every time the application is started, fixing an issue where the `task_worker` schema was missing upon upgrade. +1. Sentinel policy runs no longer fail with the error `exec: "getent": executable file not found in $PATH`. +1. The `tfe-admin support-bundle` command no longer fails uploading support bundles to Google Cloud Storage. +1. Attempts to update a user's email to an invalid value will now be rejected when the update it attempted, not during confirmation of the new email. +1. Old workspaces which have undergone a destroy run before Oct 3, 2023 may now be safe-deleted. +1. Provider binary's name is now validated at the time of publishing, fixing an issue where a provider could be made unusable if the filename contained invalid characters. +1. Sentinel will no longer assume that unknown values are boolean, fixing an issue for some Terraform plan variations. +1. The teams/organization-memberships endpoint no longer gives a 500 response error when you try to delete a member whose user record could not be found. +1. For modules or providers with prerelease versions (e.g. `v1.2.3-preview-2`), the registry's internal sorting was sometimes incorrect. This could result in the wrong version being presented as the "latest" version in some API responses. As new versions of a module or provider are added to the database, they will now be resorted correctly. +1. State version output type validations no longer cause exceptions due to optional attribute bugs in Terraform. +1. State version parser service omits detailed type information in callback responses for V1-V3 statefiles since detailed types are V4 statefile specific. This prevents validation exceptions in TFC when state version outputs are processed and stored. +1. When creating multiple workspaces simultaneously with the same tags, each workspace will be created successfully with respective tags attached to it, instead of sometimes returning a `404 Not Found` error. +1. VCS runs will no longer trigger on discarded workspaces. + +## Security + +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202301-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202301-2.mdx new file mode 100644 index 000000000..79bd87832 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202301-2.mdx @@ -0,0 +1,84 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202301-2 (676) release. +--- + +# Terraform Enterprise v202301-2 (676) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Changes Since v202301-1 + +1. Logs for tfe-atlas, tfe-atlas-ui and tfe-sidekiq will no longer contain debug logs. This change fixes the issue introduced in v202212-1 where the log level was set to `debug`, causing a large increase in the log size for these services. + +## Known Issues + +1. Saving boolean `false` variable values causes 500 errors. This has been fixed in [`v202303-1`](/terraform/enterprise/releases/2023/v202303-1#bug-fixes). +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +- The following operating systems are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + - Debian 8, 9 + - Ubuntu 14.04, 16.04 + - Amazon Linux 2014.03, 2014.09, 2015.03, 2015.09, 2016.03, 2016.09, 2017.03, 2017.09, 2018.03 +- The following PostgreSQL server versions are deprecated, and Terraform Enterprise will stop supporting them following the February 2023 release (v202302-1). + - PostgreSQL 11 +- Terraform Build Workers are deprecated and will be removed in v202305-1; the base image responsible for executing Terraform runs is changing to tfc-agent. If you are using an alternative worker image, you must migrate to a new image using the tfc-agent base image before v202305-1. If you are not using an alternative worker image no action is required, you will automatically migrate to the new base image in v202302-1 or higher. For more information, refer to the Custom Agent Image migration [guide](/terraform/enterprise/v202301-2/replicated/administration/infrastructure/worker-to-agent-migration). + +## Breaking Changes + +1. The "Manage Policies" Organization Permission has been modified to remove excessive access to resources. **This is a breaking change** as Policy Managers may now require additional permission to perform tasks. As per the API Stability Policy, backwards incompatible changes may be necessary to protect your security. The following permissions changes have been made: + + - Policy Managers will no longer be able to read State Versions. + - Policy Managers will no longer be able to read State Version Outputs. + - Policy Managers will no longer be able to read Assessments and Assessment Results. + - Policy Managers will no longer be able to read variables and variable sets which are not Policy Set parameters. + - Policy Managers will no longer be able to create Workspace Comments. + - Policy Managers will no longer be able to read Workspace Resources. + - Policy Managers will no longer be able to read Run Triggers. + - Policy Managers will no longer be able to list Configuration Versions. + - Policy Managers will no longer be able to read Workspace Notification Configurations. + - Policy Managers will be able to read OAuth Client and OAuth Tokens. Without this change, policy managers cannot add VCS backed Policy Sets. + - Policy Managers be able to list runs in a workspace. + +## Highlights + +1. We've streamlined and updated the Graphical User Interface's navigation menus to match Terraform Cloud. You can now navigate the app from the side menu instead of using a mix of the top menu, side menu, and tabs. + +## Features + +1. You can now share providers in your private registries across many organizations, just like you can for modules. Choose if you want to share all modules and providers, only modules, or only providers. No more publishing and republishing providers in separate organizations. +1. New workspace state feature allows rollback to an older version of state. This can be used to fall back to a known good version of state following an event such as an unfinished upgrade or unwanted state manipulation. The operation does not remove prior states and does not change underlying infrastructure. + +## Improvements + +1. Terraform Enterprise will show a summary of the resources to be created, modified, and destroyed near the prompt to apply or discard a run. It highlights failed policy checks, destroyed resources, or failed run tasks more prominently, so users have better visibility into whether they are applying a potentially dangerous plan. +1. The organization access permissions are now more consistently formatted and have clearer permission subheadings. +1. Rare instances of workspaces failing to delete now have more informative logging. +1. The private registry will now validate providers are supported by the Terraform SDK. +1. Workspace API responses now include a `self-html` link, which is a browsable URL for the workspace. +1. The private registry will no longer accept identifiers for prerelease versions of modules or providers that do not conform to [the SemVer standard](https://semver.org/#spec-item-9). Attempts to publish a version with an invalid prerelease version identifier (e.g. `1.2.3.4` or `1.2.3-beta!`) will now fail. +1. Diagnostics results view for Structured Run Output can now be collapsed. +1. When a workspace set to Structured Run Output mode has a successful apply, the Outputs view will be expanded by default. + +## Bug Fixes + +1. Database schemas are now created every time the application is started, fixing an issue where the `task_worker` schema was missing upon upgrade. +1. Sentinel policy runs no longer fail with the error `exec: "getent": executable file not found in $PATH`. +1. The `tfe-admin support-bundle` command no longer fails uploading support bundles to Google Cloud Storage. +1. Attempts to update a user's email to an invalid value will now be rejected when the update it attempted, not during confirmation of the new email. +1. Old workspaces which have undergone a destroy run before Oct 3, 2023 may now be safe-deleted. +1. Provider binary's name is now validated at the time of publishing, fixing an issue where a provider could be made unusable if the filename contained invalid characters. +1. Sentinel will no longer assume that unknown values are boolean, fixing an issue for some Terraform plan variations. +1. The teams/organization-memberships endpoint no longer gives a 500 response error when you try to delete a member whose user record could not be found. +1. For modules or providers with prerelease versions (e.g. `v1.2.3-preview-2`), the registry's internal sorting was sometimes incorrect. This could result in the wrong version being presented as the "latest" version in some API responses. As new versions of a module or provider are added to the database, they will now be resorted correctly. +1. State version output type validations no longer cause exceptions due to optional attribute bugs in Terraform. +1. State version parser service omits detailed type information in callback responses for V1-V3 statefiles since detailed types are V4 statefile specific. This prevents validation exceptions in TFC when state version outputs are processed and stored. +1. When creating multiple workspaces simultaneously with the same tags, each workspace will be created successfully with respective tags attached to it, instead of sometimes returning a `404 Not Found` error. +1. VCS runs will no longer trigger on discarded workspaces. + +## Security + +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202302-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202302-1.mdx new file mode 100644 index 000000000..2eec8b7a4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202302-1.mdx @@ -0,0 +1,70 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202302-1 (681) release. +--- + +# Terraform Enterprise v202302-1 (681) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Known Issues + +1. When you assign a team the `manage-workspaces` permission through the API the team is also explicitly granted the `read-workspaces` permission, which provides a subset of the functionality. However, using the API to revoke just the `manage-workspace` permission does **not** revoke the `read-workspaces` permission. This means that existing automation (including the `tfe` provider) for revoking the `manage-workspaces` permission will leave the team with the `read-workspaces` permission, whereas previously the team would be left with no workspace access at the organization level. This will be resolved in upcoming versions of Terraform Enterprise and the `tfe` provider. +1. Terraform runs remain queued indefinitely when using the `agent` run pipeline mode unless the **Enable agents functionality** checkbox is checked in the [admin interface](/terraform/enterprise/application-administration/admin-access). The logs for `tfe-task-worker` will show `[ERROR] core: Unexpected HTTP response code: method=POST url=https://terraform.example.com/api/agent/register status=404`. This is resolved in Terraform Enterprise v202303-1. +1. [April 6, 2023] The `tfe-admin node-drain` command does not currently work when the `run_pipeline_mode` configuration setting is set to `agent`. See the notes under the _Highlights_ section for more details regarding this setting. This issue is fixed in the v202305-1 release. +1. Saving boolean `false` variable values causes 500 errors. This has been fixed in [`v202303-1`](/terraform/enterprise/releases/2023/v202303-1#bug-fixes). +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Breaking Changes + +1. The sub claim for workload identity tokens now contains project information. You must [update the trust relationship](https://support.hashicorp.com/hc/en-us/articles/13138701895699-Updating-Workload-Identity-for-Projects) on your cloud provider to expect project information in this claim. + +## Deprecations and End of Support + +The following operating systems are no longer supported: + +- Debian 8, 9 +- Ubuntu 14.04, 16.04 +- Amazon Linux 2014.03, 2014.09, 2015.03, 2015.09, 2016.03, 2016.09, 2017.03, 2017.09, 2018.03 + +The following PostgreSQL server versions are no longer supported: + +- 11 + +Terraform Build Workers are deprecated and will be removed in Terraform Enterprise v202305-1. The base image responsible for executing Terraform runs is now `hashicorp/tfc-agent`. If you are using an alternative worker image, you must migrate to a new image using `hashicorp/tfc-agent` as its base image before Terraform Enterprise v202305-1. If you are not using an alternative worker image then you will automatically migrate to the new base image and no futher action is required. For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202302-1/replicated/administration/infrastructure/worker-to-agent-migration). + +[Updated: August 2023] The `aws` CLI utility is no longer included in the base image. If the `aws` CLI utility is needed in your custom agent image, you may install it by following the [AWS CLI installation instructions](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html). For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202302-1/replicated/administration/infrastructure/worker-to-agent-migration). + +## Highlights + +1. Three components of the run pipeline, `tfe-build-worker`, `tfe-build-manager`, and `tfe-rabbitmq`, have been replaced with `tfe-task-worker`, a local implementation of [tfc-agent](https://hub.docker.com/r/hashicorp/tfc-agent). If you are using an alternative worker image, you will need to [migrate to a new image](/terraform/enterprise/v202302-1/replicated/administration/infrastructure/worker-to-agent-migration) before enabling the new run pipeline. If you are not using an alternative worker image then you will automatically migrate to the new run pipeline. The new run pipeline can be manually enabled by setting the `run_pipeline_mode` configuration setting to `agent` or disabled by setting the `run_pipeline_mode` configuration setting to `legacy`. Monitoring integrations may need to be updated if you are monitoring `tfe-build-worker`, `tfe-build-manager`, or `tfe-rabbitmq`. +1. Workspaces can now be grouped into projects. Projects help users organize and centrally manage their workspaces at scale while providing more granular permissions to a subset of workspaces. Each project has a separate permissions set that you can use to grant teams access to all workspaces in the project. [This blog post](https://www.hashicorp.com/blog/terraform-cloud-adds-projects-to-organize-workspaces-at-scale) covers projects in more detail. +1. The [GitHub App Integration](/terraform/enterprise/application-administration/github-app-integration) is now available for Terraform Enterprise. Connect your Workspaces, Policy Sets, & Registry Modules without creating an Organization OAuth Client. Requires site-admin access to setup. +1. Red Hat Enterprise Linux 8.7 is now supported. + +## Features + +1. Sentinel Policy Checks now run Sentinel 0.19.5, introducing support for static imports, allowing supporting data to be imported into a policy. +1. Organization owners can now assign teams read access to workspaces and projects within a particular organization. +1. Added Terraform versions 1.3.8 and 1.4.0-beta1. +1. Structured run output is enabled for CLI-driven workspaces when using Terraform CLI version 1.4.0-beta1 or later. +1. The VCS Events page is now available for Terraform Enterprise. The page displays VCS-related messages such as when processing fails due to a duplicate webhook. + +## Improvements + +1. `tfe-admin support-bundle` will now upload support bundles to object storage for both external services and active/active installations. +1. The name of the VCS repository is now included in 400 request errors when an error occurs while creating a VCS workspace. +1. When a webhook is received that contains the same commit SHA of a previously processed webhook that created a non-speculative run, it will no longer be processed and a message will be logged to the VCS Events page. + +## Bug Fixes + +1. Previously, a bug was introduced which changed the flash message design. The design bug is now fixed. +1. The sidebar items of the workspace overview page are now displayed with proper height when the workspace has a long README. +1. The workspace overview page now displays its sidebar component visibly in small screens. +1. Terraform plans no longer error when generating Sentinel mock files. + +## Security + +1. The endpoint used for confirming a user's email address now has a tighter rate limit to reduce risk of email spam attacks. +1. The endpoint used for sending "Forgot Password" emails now has a rate limit to reduce risk of email spam attacks. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202303-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202303-1.mdx new file mode 100644 index 000000000..3a73bd963 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202303-1.mdx @@ -0,0 +1,72 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202303-1 (688) release. +--- + +# Terraform Enterprise v202303-1 (688) + +Last required release: [v202207-2 (642)](/terraform/enterprise/releases/2022/v202207-2) + +## Breaking Changes + +1. Terraform Enterprise's cookie format has been updated to increase security, and will no longer accept any cookies generated by releases prior to v202011-1. When upgrading from Terraform Enterprise v202010-1 or earlier without logging in to an interim release, any users currently logged in to the application may see a failure to load after upgrade. This failure to load can be solved by clearing the cookies for Terraform Enterprise. This potential issue will not affect users upgrading from versions newer than v202011-1 releases as long as they have been on an intermediate version for more than a month. + +## Known Issues + +1. [April 6, 2023] The `tfe-admin node-drain` command does not currently work when the `run_pipeline_mode` configuration setting is set to `agent`. See the notes under the _Highlights_ section for more details regarding this setting. This issue is fixed in the v202305-1 release. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations and End of Support + +1. The following operating systems are no longer supported: + - Debian 8, 9 + - Ubuntu 14.04, 16.04 + - Amazon Linux 2014.03, 2014.09, 2015.03, 2015.09, 2016.03, 2016.09, 2017.03, 2017.09, 2018.03 +2. The following PostgreSQL server versions are no longer supported: + - 11 +3. Terraform Build Workers are deprecated and will be removed in Terraform Enterprise v202305-1. The base image responsible for executing Terraform runs is now `hashicorp/tfc-agent`. If you are using an alternative worker image you must migrate to a new image, using `hashicorp/tfc-agent` as the base image before Terraform Enterprise v202305-1. If you are not using an alternative worker image, then you will automatically migrate to the new base image and no futher action is required. For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202303-1/replicated/administration/infrastructure/worker-to-agent-migration). +4. [Updated: August 2023] The `aws` CLI utility is no longer included in the base image. If the `aws` CLI utility is needed in your custom agent image, you may install it by following the [AWS CLI installation instructions](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html). For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202303-1/replicated/administration/infrastructure/worker-to-agent-migration). + +## Highlights + +1. Introducing native Open Policy Agent (OPA) support, which extends the policy as code features of Terraform Enterprise to support the Rego policy language. +1. You can now use Dynamic Provider Credentials in place of static credentials for the Vault, AzureRM, AzureAD, Google Cloud Platform, and AWS providers. The [Dynamic Provider Credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) documentation has more information and prerequisites for usage. +1. This release contains a data migration for an upcoming variable sets feature. This migration will lengthen the upgrade process. The migration time will vary based on the number of variable sets attached to workspaces. It will add approximately 1 minute per 50,000 workspaces. +1. Terraform Enterprise now supports [Health assessments](/terraform/enterprise/workspaces/health). + +- [Drift detection](/terraform/enterprise/workspaces/health#drift-detection) determines whether your real-world infrastructure matches your Terraform state file. You can enable Drift detection at a workspace level or at an organization level. +- Terraform Enterprise sends [notifications](/terraform/enterprise/workspaces/settings/notifications) about health assessment results according to your workspace's settings. + +## Features + +1. A manage membership permission allows a team to invite users to the organization, and add or remove them from non-owner teams. +1. Terraform Enterprise users can now manage their GitHub App token within user settings. +1. You can use the [rotate key](/terraform/enterprise/api-docs/admin/settings#rotate-oidc-signing-key) and [trim key](/terraform/enterprise/api-docs/admin/settings#trim-oidc-signing-key) admin endpoints to control the OIDC key used to sign Workload Identity and Dynamic Provider Credential tokens. +1. Terraform Enterprise now uses Sentinel 0.20 for policy checks, bringing improvements to the JSON response and introducing named functions. + +## Improvements + +1. The plan diff UI now makes paginated requests to fetch plan log output. This prevents unconstrained memory usage in the object store service for very large plans. +1. UI workspace variables are now listed alphabetically. +1. You can now use the Terraform Enterprise API to access authorized GitHub App Installations for the current user. Requires the User API actor to generate a GitHub App user-to-server token in Terraform Enterprise UI prior to use. +1. UI application icons have been rejuvenated, migrating from a mixture of [Font Awesome](https://fontawesome.com) and [Structure](https://github.com/hashicorp/structure-icons) to the [Flight Icon library](https://helios.hashicorp.design/icons/library), which is part of the [Helios Design System](https://helios.hashicorp.design). +1. Resources can now be filtered by action types including, `Create`, `Update`, `Replace`, `Delete`, `Read`, and `Move` using the actions filter on the run page. +1. The manage-workspaces and manage-projects roles no longer require read-workspaces and read-projects permissions (respectively). Introducing a new UI that makes selecting organization-level project and workspace permissions for teams clearer, by separating Project and Workspace permissions out into their own set of interactive selectors. + +## Bug Fixes + +1. Terraform runs using the `agent` run pipeline mode will no longer fail with the error `dial unix /var/run/docker.sock: connect: permission denied` when SELinux is enforcing. +1. The agent job dequeuing logic will no longer result in a blocked agent pool and HTTP 500 errors in the tfc-agent logs. +1. Saving boolean `false` variable values no longer causes 500 errors. Null and missing values now default to empty string (""), which was the documented default. +1. Terraform plan and apply operations that are executed on internal Terraform Cloud Agents in Terraform Enterprise will now function even when the "enable agents" toggle in the site admin panel is disabled. +1. Terraform runs using the `agent` run pipeline mode now support the [`hairpin_addressing`](/terraform/enterprise/v202303-1/replicated/install/automated/automating-the-installer#hairpin_addressing) setting. When enabled, direct traffic destined for the installation's FQDN will route toward the instance's internal IP address. +1. Changing a Variable Set's scope from workspace to global will no longer result in an incorrect Variable Sets count on a workspace's "Variables" page. This was only a visual bug and has been fixed. +1. The log entry for rotating an OIDC key is now shown at the DEBUG level. Previously, it was set to INFO level. +1. The Getting Started with state guide now has the correct command `terraform apply` to copy (it had a `-` in it previously). +1. The manage-workspaces permission no longer grants read-projects. + +## Security + +1. Terraform Enterprise no longer listens on public port 23001. +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202304-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202304-1.mdx new file mode 100644 index 000000000..18577467c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202304-1.mdx @@ -0,0 +1,45 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202304-1 (692) release. +--- + +# Terraform Enterprise v202304-1 (692) + +**This is a required release!** + +## Known Issues + +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +1. Terraform Build Workers are deprecated and will be removed in Terraform Enterprise v202305-1. The base image responsible for executing Terraform runs is now `hashicorp/tfc-agent`. If you are using an alternative worker image you must migrate to a new image, using `hashicorp/tfc-agent` as the base image before Terraform Enterprise v202305-1. If you are not using an alternative worker image, then you will automatically migrate to the new base image and no futher action is required. For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202304-1/replicated/administration/infrastructure/worker-to-agent-migration). +2. [Updated: August 2023] The `aws` CLI utility is no longer included in the base image. If the `aws` CLI utility is needed in your custom agent image, you may install it by following the [AWS CLI installation instructions](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html). For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202304-1/replicated/administration/infrastructure/worker-to-agent-migration). + +## Improvements + +1. The Projects List API now allows filtering by project names. You can use a `filter[names]` query parameter with one or more comma-sepearated project names and the results will be limited to projects with those exact name(s). For example: `/api/v2/organizations/my-organization/projects?filter[names]=my-project,my-other-project` +2. Application improvement now reduces network pressure during long apply operations, or until a job is marked as errored due to a killed agent process. +3. Design improvements to the user, team, and organization token UI and generation flow. +4. Highlight newly created team, user, and organization authentication tokens in the UI +5. Upgrading Sentinel to 0.21, adding support for `defined` expressions and per-policy parameter values. +6. Add ability to search an organization's teams by name and varsets by name. +7. The base font size across the application is increased to 16px in order to use the new Helios design system components at their intended size, increasing their adoption and accessibility. +8. Additional Project access roles have been added, `write` and `maintain`. For more information, refer to the [Project Team Access API](/terraform/enterprise/api-docs/project-team-access#project-team-access-levels) documentation. + +## Bug Fixes + +1. The `tfe-task-worker` container no longer fails with a permission denied error when SELinux is enforcing. +2. Background migrations will no longer wait indefinitely on database locks, and will now timeout gracefully after 2 hours and retry. +3. When a run is being cancelled, or undergoing actions that modify the state of a run, the Run Actions form will display a 'waiting' state until the run update occurs. +4. Users had reported intermittently seeing duplicate rows in the Workspace Overview "Resources" section of a workspace. This bug has been resolved and that UI updated to more consistently show the correct amount of rows, matching the number of Terraform resources managed by the workspace. +5. The application no longer needs to be refreshed after transitioning from the team settings page into user settings via the UI. +6. Sentinel will no longer assume that unknown values are boolean, fixing an issue for some Terraform plan variations. +7. Consuming private providers from other organizations no longer fails when trying to use them in a Terraform configuration. + +## Security + +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. +2. The version of Ruby used to run the app has been updated to v3.1. +3. The Link SSO Identity to a different account page now has reCaptcha. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202305-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202305-1.mdx new file mode 100644 index 000000000..819cbeaef --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202305-1.mdx @@ -0,0 +1,61 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202305-1 (703) release. +--- + +# Terraform Enterprise v202305-1 (703) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +## Known Issues + +1. Some installations may experience longer page loads on pages that load a list of organizations. This issue is resolved in v202305-2. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +-> **Note:** The deadline for the deprecation of Terraform Build Workers has been extended to v202306-1 to ensure we support writing to environment variables. + +1. [New date] Terraform Build Workers are deprecated and will be removed in Terraform Enterprise v202306-1. The base image responsible for executing Terraform runs is now `hashicorp/tfc-agent`. If you are using an alternative worker image you must migrate to a new image, using `hashicorp/tfc-agent` as the base image before Terraform Enterprise v202306-1. If you are not using an alternative worker image, then you will automatically migrate to the new base image and no futher action is required. For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202305-1/replicated/administration/infrastructure/worker-to-agent-migration). +2. [Updated: August 2023] The `aws` CLI utility is no longer included in the base image. If the `aws` CLI utility is needed in your custom agent image, you may install it by following the [AWS CLI installation instructions](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html). For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202305-1/replicated/administration/infrastructure/worker-to-agent-migration). + +## Features + +1. Users can now apply variable sets to specified projects. Applying a variable set to a project(s) means that the variable set is accessible to all existing and future workspaces within that project(s). + Users can apply variable sets to projects through: + +- [the variable sets settings page](/terraform/tutorials/cloud/cloud-multiple-variable-sets#create-a-credentials-variable-set) +- [the variable sets' API endpoints](/terraform/cloud-docs/api-docs/variable-sets#apply-variable-set-to-projects) +- [the TFE Terraform Provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/project_variable_set) + +1. You can now specify a base64 encoded PEM format CA certificate for usage when connecting with Vault for dynamic or Vault-backed credentials via the `TFC_VAULT_ENCODED_CACERT` environment variable. +1. When creating authentication tokens for users, teams, and organizations, you can now set an expiration date and time for that token. You can no longer authenticate with tokens past their expiration date and time. +1. Dynamic Provider Credentials now support generating credentials with [Vault Dynamic Secrets Engines for AWS, Azure, and Google Cloud](/terraform/cloud-docs/workspaces/dynamic-provider-credentials/vault-backed). +1. A TTL can now be set on a user token through the user settings of the user interface. +1. Added [automated license utilization reporting](/terraform/enterprise/v202305-1/replicated/administration/license/automated-license-utilization-reporting), which sends minimal product-license metering data to HashiCorp without requiring you to manually collect and report them. + +## Improvements + +1. Optimize workspace variable overwrite creation to speed up varset creation. Requests to create variable sets should not time out now. +1. Fixed date/timestamp on workspace resource table in Terraform Cloud's user interface. +1. Octokit now logs an error when there is a problem editing the settings of a workspace. +1. Updated the variable sets user interface to use the new Helios design system components. +1. Updated the project user interface to use the new Helios design system PowerSelect style override. +1. Improve the user interface for organization, team, and user API tokens, by updating the tokens' icon and last used text. +1. OPA tool versions are now added automatically, no longer requiring manual effort. +1. Team management at the workspace level is paginated. +1. Team management at the workspace level is searchable. +1. Workspace settings now use a fluid page layout, matching Organization settings. +1. All headings and subheadings now use the new Helios design system typography, font weight, and color to create consistency in page styling and information hierarchy for users. + +## Bug Fixes + +1. Granting a team the `manage-workspaces` or `manage-projects` organization permissions would prevent a team from accessing some resources granted by their read-only equivalents, `read-workspaces` and `read-projects`. For example, the manage permissions were not providing access to non-global variable sets, even though read permissions grant this access at the same level. +1. TFE now supports the `node-drain` command when running in `agent` run pipeline mode. +1. The `gcs_credentials` setting can now be set to `{}` to configure Terraform Enterprise to authenticate to Google Cloud Storage using the attached service account. + +# Security + +1. Updated the Nokogiri Gem, which can now [resolve multiple CVEs with libxml](https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-pxvg-2qj5-37jq) +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202305-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202305-2.mdx new file mode 100644 index 000000000..0912cefa4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202305-2.mdx @@ -0,0 +1,63 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202305-2 (704) release. +--- + +# Terraform Enterprise v202305-2 (706) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +## Changes Since v202305-1 + +1. Some installations may experience longer page loads on pages that load a list of organizations. This issue is resolved in v202305-2. + +## Known Issues +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +-> **Note:** The deadline for the deprecation of Terraform Build Workers has been extended to v202306-1 to ensure we support writing to environment variables. + +1. [New date] Terraform Build Workers are deprecated and will be removed in Terraform Enterprise v202306-1. The base image responsible for executing Terraform runs is now `hashicorp/tfc-agent`. If you are using an alternative worker image you must migrate to a new image, using `hashicorp/tfc-agent` as the base image before Terraform Enterprise v202306-1. If you are not using an alternative worker image, then you will automatically migrate to the new base image and no futher action is required. For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202305-2/replicated/administration/infrastructure/worker-to-agent-migration). +2. [Updated: August 2023] The `aws` CLI utility is no longer included in the base image. If the `aws` CLI utility is needed in your custom agent image, you may install it by following the [AWS CLI installation instructions](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html). For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202305-2/replicated/administration/infrastructure/worker-to-agent-migration). + +## Features + +1. Users can now apply variable sets to specified projects. Applying a variable set to a project(s) means that the variable set is accessible to all existing and future workspaces within that project(s). + Users can apply variable sets to projects through: + +- [the variable sets settings page](/terraform/tutorials/cloud/cloud-multiple-variable-sets#create-a-credentials-variable-set) +- [the variable sets' API endpoints](/terraform/cloud-docs/api-docs/variable-sets#apply-variable-set-to-projects) +- [the TFE Terraform Provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/project_variable_set) + +1. You can now specify a base64 encoded PEM format CA certificate for usage when connecting with Vault for dynamic or Vault-backed credentials via the `TFC_VAULT_ENCODED_CACERT` environment variable. +1. When creating authentication tokens for users, teams, and organizations, you can now set an expiration date and time for that token. You can no longer authenticate with tokens past their expiration date and time. +1. Dynamic Provider Credentials now support generating credentials with [Vault Dynamic Secrets Engines for AWS, Azure, and Google Cloud](/terraform/cloud-docs/workspaces/dynamic-provider-credentials/vault-backed). +1. A TTL can now be set on a user token through the user settings of the user interface. +1. Added [automated license utilization reporting](/terraform/enterprise/v202305-2/replicated/administration/license/automated-license-utilization-reporting), which sends minimal product-license metering data to HashiCorp without requiring you to manually collect and report them. + +## Improvements + +1. Optimize workspace variable overwrite creation to speed up varset creation. Requests to create variable sets should not time out now. +1. Fixed date/timestamp on workspace resource table in Terraform Cloud's user interface. +1. Octokit now logs an error when there is a problem editing the settings of a workspace. +1. Updated the variable sets user interface to use the new Helios design system components. +1. Updated the project user interface to use the new Helios design system PowerSelect style override. +1. Improve the user interface for organization, team, and user API tokens, by updating the tokens' icon and last used text. +1. OPA tool versions are now added automatically, no longer requiring manual effort. +1. Team management at the workspace level is paginated. +1. Team management at the workspace level is searchable. +1. Workspace settings now use a fluid page layout, matching Organization settings. +1. All headings and subheadings now use the new Helios design system typography, font weight, and color to create consistency in page styling and information hierarchy for users. + +## Bug Fixes + +1. Granting a team the `manage-workspaces` or `manage-projects` organization permissions would prevent a team from accessing some resources granted by their read-only equivalents, `read-workspaces` and `read-projects`. For example, the manage permissions were not providing access to non-global variable sets, even though read permissions grant this access at the same level. +1. TFE now supports the `node-drain` command when running in `agent` run pipeline mode. +1. The `gcs_credentials` setting can now be set to `{}` to configure Terraform Enterprise to authenticate to Google Cloud Storage using the attached service account. + +# Security + +1. Updated the Nokogiri Gem, which can now [resolve multiple CVEs with libxml](https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-pxvg-2qj5-37jq) +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202306-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202306-1.mdx new file mode 100644 index 000000000..4b421dc0c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202306-1.mdx @@ -0,0 +1,53 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202306-1 (710) release. +--- + +# Terraform Enterprise v202306-1 (713) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +## Known Issues + +1. The `RunExternalStatus` data migration now runs in the foreground for visibility. However, if there are a large number of runs this migration can take a long time to complete. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +1. In Terraform Enterprise v202308-1 the server services will be consolidated into a single container named `terraform-enterprise`. This container runs as a non-root user and contains the logs for all of the server services. Terraform runs will continue to execute in isolated, short-lived containers but will now run as a non-root user. This change is available now using the optional `consolidated_services` setting. See the [consolidated services documentation](/terraform/enterprise/v202306-1/replicated/administration/infrastructure/consolidated-services) for more information on this change. + +1. The following Docker Engine versions are deprecated. Support for them will be removed in Terraform Enterprise v202308-1. + +- Docker Engine 19.03 + +1. Terraform Build Workers are now deprecated and have been removed. The base image responsible for executing Terraform runs is now `hashicorp/tfc-agent`. If you were using an alternative worker image you must migrate to a new image, using `hashicorp/tfc-agent` as the base image. If you are not using an alternative worker image, then you will automatically migrate to the new base image and no futher action is required. For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202306-1/replicated/administration/infrastructure/worker-to-agent-migration). +1. [Updated: August 2023] The `aws` CLI utility is no longer included in the base image. If the `aws` CLI utility is needed in your custom agent image, you may install it by following the [AWS CLI installation instructions](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html). For more information, refer to the [Custom Agent Image migration guide](/terraform/enterprise/v202306-1/replicated/administration/infrastructure/worker-to-agent-migration). + +## Highlights + +1. [No-code provisioning](/terraform/enterprise/no-code-provisioning/module-design) is now available in Terraform Enterprise. No-code provisioning enables organizations to set up self-service workflows for application developers that need infrastructure but are not familiar with Terraform. +1. Docker Engine 23.0 and 24.0 are now supported. + +## Improvements + +1. You can now cancel a passed policy check to unblock runs that are stuck at the policy check step. +1. Terraform Enterprise now uses Sentinel v0.22.0 for policy checks, adding support for the `sentinel` block. +1. Prefixed the names of the ephemeral Docker containers that run Terraform plan and apply operations with "tfe-agent-". +1. The [Run Tasks Integration API](/terraform/enterprise/api-docs/run-tasks/run-tasks-integration) payload now includes the `configuration_version_id` and `workspace_working_directory` attributes. +1. You can now access Sentinel policy check results through a new and streamlined user interface. +1. Added a new **Copy Configuration** link to copy the full configuration details of a module from its overview page. +1. The `tfe-admin retrieve-iact` command no longer contains trailing whitespace. + +## Bug Fixes + +1. Run tasks and policy sets no longer count discarded workspaces that have yet to be deleted. +1. Long workspace notification names are now properly displayed on the notifications page. +1. Long workspace run task names and descriptions are now properly displayed on the run tasks page. +1. Workspaces using the [GitHub App Integration](/terraform/enterprise/application-administration/github-app-integration) can now renew expiring refresh tokens. +1. Workspaces can no longer be assigned an agent pool that is not scoped to that workspace. Affected workspaces will revalidate their assigned agent pool on next save. +1. APIs now return project scoped variable set information for all users with the proper permissions. + +## Security + +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202307-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202307-1.mdx new file mode 100644 index 000000000..71ddf888c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202307-1.mdx @@ -0,0 +1,79 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202307-1 (722) release. +--- + +# Terraform Enterprise v202307-1 (722) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +## Known Issues + +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Breaking Changes + +1. The "Manage Policy Overrides" organization permission has been modified to remove excessive privileges. **This is a breaking change** as Policy Overriders may now require explicit additional permissions to perform other tasks. As per the [API Stability Policy](https://developer.hashicorp.com/terraform/enterprise/api-docs/stability-policy), backwards-incompatible changes may be necessary to protect your security. + + **Policy Overriders can no longer:** + _ Read cost estimate results. + _ Read run triggers. + _ Read state version outputs. + _ Read state versions. + _ Read workspace resources. + _ Read workspace variables. + + **Policy Overriders can now:** + _ List and read task stages on a run. + _ List comments on a run. \* List runs in a workspace. + +1. Cost estimation is now disabled by default for new organizations. + +## Known Issues +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). + +## Deprecations + +1. Redis v5 has reached the end of it's maintenance cycle and is no longer supported. + +2. [Updated] In Terraform Enterprise v202309-1 the server services will be consolidated into a single container named terraform-enterprise. This container runs as a non-root user and contains the logs for all of the server services. Terraform runs will continue to execute in isolated, short-lived containers but will run as a non-root user. A preview of this change is available now using the optional consolidated_services setting. See the [consolidated services documentation](https://developer.hashicorp.com/terraform/enterprise/v202307-1/replicated/administration/infrastructure/consolidated-services) for more information on this change. +3. The following Docker Engine versions are deprecated. Support for them will be removed in Terraform Enterprise v202308-1. + - Docker Engine 19.03 + - Docker Engine 20.10 +4. The following PostgreSQL server versions are no longer supported due to a [known defect](https://www.postgresql.org/about/news/postgresql-144-released-2470/): + - 14.0, 14.1, 14.2, 14.3 + +## Highlights + +1. Redis v6 and v7 are now supported. + +## Features + +1. Terraform 1.5 added the ability to import new resources by using `import` blocks in your Terraform configuration, as well as the ability to generate `resource` blocks for newly imported resources. These features are now fully supported in Terraform Enterprise. +1. [Continuous Validation](https://developer.hashicorp.com/terraform/cloud-docs/workspaces/health#continuous-validation) is now GA for Terraform Enterprise, allowing you to regularly verify whether your workspace’s custom assertions continue to pass, validating your real-world infrastructure. + +## Improvements + +1. The variable sets web copy has been updated to fix heading capitalization and remove some redundant text. +1. The workspaces associated with a policy set can now be updated using the [policy sets PATCH endpoint](/terraform/cloud-docs/api-docs/policy-sets#update-a-policy-set). +1. Module documentation can now render GitHub emojis. +1. No-code module variables are now sorted alphabetically for consistency. +1. You can now run [on-demand Health Assessments](https://developer.hashicorp.com/terraform/cloud-docs/workspaces/health#on-demand-assessments) for your workspace with the "Start Health Assessment" button. + +## Bug Fixes + +1. Workspaces will no longer list Run triggers where the user cannot read them. +1. Workspace email notifications will navigate the user to the relevant workspace, instead of all workspaces. +1. Per-policy parameters are now correctly configured for policy checks. +1. There were irrelevant errors related to `ddtrace` in log output. This has been resolved and these messages will no longer appear in logs. +1. Workspace resources no longer fail to be parsed when a user uploads state versions in quick succession. The workspace resources UI will now reflect the latest state version uploaded. +1. The Beta tag has been removed from No Code Provisioning flows. +1. When running with consolidated services enabled, the node-drain command now has a longer timeout and actually waits for runs to finish before terminating services. This will prevent stuck or zombied runs from appearing after restart. +1. The tfe-task-worker service will now start only after the atlas service has successfully started. This resolves an issue where, periodically, the tfe-task-worker would start and begin processing queued runs before atlas was available. This could result in a situation where the Terraform Enterprise would error during startup. +1. The task worker service now waits for the Terraform Enterprise API to be up before executing tasks. + +## Security + +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202308-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202308-1.mdx new file mode 100644 index 000000000..8e97725a8 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202308-1.mdx @@ -0,0 +1,50 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202308-1 (725) release. +--- + +# Terraform Enterprise v202308-1 (725) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +## Known Issues +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations + +1. Terraform Enterprise no longer supports the following PostgreSQL server versions due to a [known defect](https://www.postgresql.org/about/news/postgresql-144-released-2470/): 14.0, 14.1, 14.2, and 14.3. +2. In Terraform Enterprise v202309-1 the server services will be consolidated into a single container named `terraform-enterprise`. This container runs as a non-root user and contains the logs for all server services. Terraform runs will continue to execute in isolated, short-lived containers but will run as a non-root user. A preview of this change is available now using the optional consolidated_services setting. See [consolidated services](/terraform/enterprise/v202308-1/replicated/administration/infrastructure/consolidated-services) for more information on this change. +3. When consolidated services mode is enabled in v202309-1 or higher, logs will now appear in json-lines format, and will be prepended with the name of the service that generated the log message. If you are forwarding logs, you may need to update your log forwarding configuration to accommodate the consolidated log file and the json format change. The legacy architecture will remain available until v202312-1, but will be disabled by default. If you need to revert to the legacy architecture in v202309-1 or higher, set `consolidated_services = false` in your settings.json file. For assistance please contact [support](https://support.hashicorp.com/). +4. Docker 19.03 and 20.10 have reached end of life and are no longer supported in Terraform Enterprise. + +## Features + +1. Added the ability to specify multiple dynamic provider credentials configurations per provider in a workspace. For more information, see [specifying multiple configurations](https://developer.hashicorp.com/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). +1. Adds customizable permissions for teams on a project level. Users now have the ability to set various project and workspace permissions at the project level which apply to the project itself and all workspaces contained therein. For more see our documentation on [Project Team Access](https://developer.hashicorp.com/terraform/cloud-docs/api-docs/project-team-access#implied-custom-permission-levels). + +## Improvements + +1. Improved the load speed of the policy sets page. +1. Credentials generated in AWS when using Vault-backed dynamic credentials for AWS with the iam_user auth type are eventually consistent, meaning they can take 5-10 seconds (or more) to be valid. This was causing unexpected `InvalidClientTokenId` errors to be thrown from the AWS provider for some users. You can now specify a number of seconds to wait after requesting Vault-Backed dynamic credentials for AWS before proceeding with your Terraform run, to ensure your new credentials will be ready to use before attempting to authenticate with them. +1. The time required for Vault to issue Azure credentials is proportional to the number of Azure roles in the account. You can now specify a number of seconds to wait after requesting Vault-Backed dynamic credentials for Azure before proceeding with your Terraform run, to ensure your new credentials will be ready to use. +1. Increased the timeout on the backup and restore API endpoint, which will prevent most timeout issues when running with large data sets. +1. Terraform Enterprise has set the rate limit for the workspace runs endpoint (/api/v2/workspaces/.../runs) has been at 30/min. + +## Bug Fixes + +1. Policy Set and Run Task names no longer update page headings when editing 'name' fields. +1. Fixes a bug that prevented users from updating their organization name when there is only a letter case change. +1. Users reported seeing duplicate resources in the workspace overview for some workspaces. For those workspaces impacted, the false copies of resources will be removed. +1. Users had reported seeing errors related to `duplicate key value violates unique constraint "index_storage_deletion_requests_on_storage_record"` in their log output. This has been resolved and these messages will no longer appear. +1. Fixed an issue where users could have accidentally made private provider records with os or arch values like `${os[1]}`. Then when they attempted to delete those records, the registry request would fail, since the request URL would contain invalid characters. +1. Limited the number of repositories returned by [GitHub App VCS connections](https://developer.hashicorp.com/terraform/enterprise/application-administration/github-app-integration) to 100, to avoid timeouts that prevented the UI from loading properly when [creating a workspace/module](https://developer.hashicorp.com/terraform/enterprise/workspaces/creating#create-a-workspace). Users with more than 100 repositories will need to use the text field to specify the repository name to connect to, if it is not loaded in the list of repos. +1. Users can no longer see the option to update a variable in the workspace's variables page if they don't have permission to update variables. +1. Organization list now refreshes after modifying an organization's name. +1. Email notifications are no longer sent to suspended users or users outside the organization. + +## Security + +1. Updated the UI for required permissions for OPA policy set overrides. +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202309-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202309-1.mdx new file mode 100644 index 000000000..776e42e6b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202309-1.mdx @@ -0,0 +1,48 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202309-1 (733) release. +--- + +# Terraform Enterprise v202309-1 (733) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible deployment options `terraform-enterprise` container digest: amd64/linux `sha256:20bab21966b1ff5743d3490404e6dfbd39e63b6f5ecc6848ba6b3557b540b139` + +## Known Issue +1. [Updated October 3, 2023] Azure DevOps VCS-backed workspaces may be unable to connect to the VCS, execute plans or runs, or import modules. The error in the logs shows `no matching host key type found. Their offer: ssh-rsa","component":"atlas"`. There are several workarounds available depending on the deployment option of TFE. Refer to this [knowledge base article](https://support.hashicorp.com/hc/en-us/articles/21326572948243) for more information. +1. [Updated September 29, 2023] Users reported a bug where after logging in to Terraform Enterprise, the application presents users with another "step-up" authentication login prompt when attempting to access the users settings page. A fix for this bug will be included in the `v202310-1` release. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Breaking Changes +1. This release enables the consolidated services architecture announced in [v202306-1](/terraform/enterprise/releases/2023/v202306-1). + +Application services are now consolidated into the `terraform-enterprise` container. This container runs as a non-root user and contains the logs for all application services. The `terraform-enterprise` container logs are in JSON-lines format. The 'service' key preceding the log message indicates the service that reported the log message. If using the `fluentbit` log forwarding integration, the ‘component’ metadata attribute indicates which service reported the corresponding log message. + +If you are monitoring containers or forwarding log messages to an external destination, you may need to update queries in your monitoring and log aggregation tools to reflect these changes. Terraform runs will continue to execute in isolated, short-lived containers, but will now run as a non-root user. This change can be disabled using the `consolidated_services_enabled` setting until v202401-1, when we will remove it. You can only disable this change if you are deploying with Replicated. For more details, refer to [Consolidated Services documentation](/terraform/enterprise/v202309-1/replicated/administration/infrastructure/consolidated-services). + +## Highlights +1. Terraform Enterprise now supports more flexible deployment options. You can deploy Terraform Enterprise with cloud-managed Kubernetes services (Amazon EKS, Azure AKS, and Google Cloud GKE) using helm, or with Docker Engine using Docker Compose. + * To get started with one of the new deployment options, check out the [shared requirements](/terraform/enterprise/v202309-1/flexible-deployments/install/requirements), the requirements for your desired deployment option ([docker](/terraform/enterprise/v202309-1/flexible-deployments/install/docker/requirements) or [cloud-managed Kubernetes](/terraform/enterprise/v202309-1/flexible-deployments/install/kubernetes/requirements), and the [migration guides](/terraform/enterprise/v202309-1/replicated/replicated-migration) for migrating from Replicated. + * The new lightweight, single-container architecture provides significantly faster startup times, and includes new startup checks that can help quickly diagnose configuration issues and prevent the application from starting up in a risky state. + * Flexible Deployment Options requires a new [license file](/terraform/enterprise/v202309-1/flexible-deployments/install/requirements/license) to download and install Terraform Enterprise for Docker or cloud-managed Kubernetes. All existing customers will receive the new license file by Thursday, September 21. If you do not receive your license file, please contact your HashiCorp account representative. +1. You can now apply policy sets to projects in your organization. For each run in a project's workspace, Terraform Enterprise checks the Terraform plan against the policy set. Refer to the [Policy Enforcement documentation](/terraform/cloud-docs/policy-enforcement) for details. + +## Improvements + +1. The no-code header no longer shows up in the sidebar when an organization cannot access the no-code feature. +1. All TFE installations now automatically include a copy of HashiCorp's public GPG keys. This simplifies the process of hosting an official HashiCorp Terraform provider for use in an air-gapped TFE installation. +1. Temporary run data will now be retained for 1 day instead of 1 week. This will reduce disk usage when using the mounted disk operation mode, and object storage usage when using external services or active/active mode. This change does not impact user-visible behavior. + +## Bug Fixes +1. Removed a duplicate checkbox for overriding policy sets. +1. Fixed the dropdown with search components on the Policy Set and Variable Set pages to return the correct options after a search. +1. Allow users to search for workspaces from page 2 and above. +1. Notification delivery results for emails would always display in the frontend as an error regardless of delivery outcome. The frontend status should now be updated on successful email delivery. +1. Fixes a bug where certain types of corrupt files in a module upload could cause publishing to fail without notifying the user of the failure. +1. Users should now be able to see an error message if their modules cannot be uploaded into Registry, even in some rare cases. Previously in those cases users would just keep seeing "publishing in progress" messages. + +## Security +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202310-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202310-1.mdx new file mode 100644 index 000000000..de765fa9b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202310-1.mdx @@ -0,0 +1,51 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202310-1 (741) release. +--- + +# Terraform Enterprise v202310-1 (741) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:b29fddcf650f384066995e7da1ddc11432851bb07c942840359e91eadf3381c2` + +## Known Issues +1. Azure DevOps VCS-backed workspaces may be unable to connect to the VCS, execute plans or runs, or import modules. The error in the logs shows `no matching host key type found. Their offer: ssh-rsa","component":"atlas"`. There are several workarounds available depending on the deployment option of TFE. Refer to this [knowledge base article](https://support.hashicorp.com/hc/en-us/articles/21326572948243) for more information. +1. [Updated October 26, 2023] For installations with `consolidated_services_enabled` set to enabled, startup checks may fail when authenticating to GCP object storage with a service account. This has been fixed in the `v202311-1` release. +1. [Updated February 26, 2024] In rare cases, no code modules created before upgrading to this release could contain errors that would cause upgrade failures. This issue is fixed in v202401-2. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Breaking Changes +1. [Consolidated](/terraform/enterprise/v202310-1/replicated/administration/infrastructure/consolidated-services) services mode is enabled by default as of v202309-1, but you can disable it using the `consolidated_services_enabled` setting until v202401-1, when we permanently remove it. This setting only applies to Replicated deployments. + +## Highlights +1. You can now exclude specific workspaces from global or project-scoped policy sets. Terraform Enterprise will not enforce a policy set's policies on any runs in an excluded workspace. +1. Workspace admins can now schedule automatic destroy runs to trigger the deletion of all ephemeral infrastructure managed by a workspace at some point in the future. + * You can schedule an automatic destroy in [Destruction and Deletion](/terraform/enterprise/v202310-1/workspaces/settings/deletion#automatically-destroy) under Workspace Settings. + * Workspace Event notification triggers now include auto destroy notifications. For more details, refer to the [Notification Configuration documentation](/terraform/enterprise/api-docs/notification-configurations#automatic-destroy-runs). + +## Features +1. Organizations now specify a default execution mode, which their workspaces may inherit. By default, new workspaces will inherit the organization default execution mode (and default agent pool, if applicable), but can override this default with a different execution mode. +1. Terraform Enterprise now includes an [upgrade startup check](/terraform/enterprise/v202310-1/flexible-deployments/monitoring/startup-checks) that ensures that upgrades occur in a sequential manner and do not forego required Terraform Enterprise releases. + +## Improvements +1. Terraform Enterprise can now connect to an external Vault server using TLS v1.3. +1. Added fallback mechanism for persisting Terraform state when backend errors occur during runs. + +## Bug Fixes +1. Terraform Enterprise can now connect to Redis servers using a password containing certain special characters (e.g., `+`, `<`, etc.). +1. Terraform Enterprise can now connect to database servers using a password containing certain special characters (e.g., `+`, `<`, etc.). +1. Terraform Enterprise now respects the `redis_port` configuration setting when consolidated services is enabled. +1. A user without read access to a project can no longer assign it to a policy set or see if it's already assigned. +1. Fixed premature expiration of Terraform artifacts during runs. +1. Fixed bug preventing repository publishing by ID when using ADO VCS provider. +1. Fixed validation issue for creating GitLab.com providers in regards to new key format. +1. Policy Checks will now error when attempting to queue if associated Policies or Policy Sets have been deleted, as the Policy Check is no longer valid. +1. Instruct terraform CLI to save snapshot state versions on a 1 hour interval to compensate for a terraform CLI bug in 1.5.0 ~ 1.5.7 that is saving state versions every 20 seconds in the absence of the header. +1. Users reported a bug where after logging in to Terraform Enterprise, the application presents users with another "step-up" authentication login prompt when attempting to access the user settings page. This bug has been resolved and SSO users can now access their user settings. +1. Triggering a high number of remote runs in a short time now reliably works. Previously, some jobs might be stuck in the `plan_queued` stage. + +## Security +1. Container updates address reported vulnerabilities (CVEs) in underlying packages and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202311-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202311-1.mdx new file mode 100644 index 000000000..c1af1601e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202311-1.mdx @@ -0,0 +1,44 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202311-1 (742) release. +--- + +# Terraform Enterprise v202311-1 (742) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:93fad2721b712ab78723b31c8cc98d317d48d43a3acd8c0ace2425b7e372360d` + +## Known Issues +1. [Updated April 16, 2024] If you set the maximum run time on the site admin page to be longer than 24 hours, Terraform Enterprise will not trigger runs on this release version (v202311-1). Configure your maximum run time to 24 hours or less. +1. [Updated February 26, 2024] In rare cases, no code modules created before upgrading to this release could contain errors that would cause upgrade failures. This issue is fixed in v202401-2. +1. [Updated: February 26, 2024] Customers using `terraform-bundle` and that have defined a working directory may see an error in their runs that reads `Operation failed: failed packing filesystem: illegal slug error: invalid symlink`. You can work around this error using a [custom agent](/terraform/enterprise/flexible-deployments/install/custom-image) image built on `tfc-agent` v1.12. This issue is resolved in v202401-1 of Terraform Enterprise. Contact [support](https://support.hashicorp.com) for help with this issue. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Highlights +The v202311-1 release contains two significant changes that improve storage utilization: +1. You can now configure data retention policies that allow Terraform Enterprise to automatically delete old configuration versions and state versions. This prevents unbounded storage growth. +1. The overall executable plan storage footprint has been dramatically reduced by removing the provider version cache from the executable plan storage for every plan. + +## Features +1. You can now delete configuration versions and state versions to reclaim storage space. +1. State versions may be created and uploaded separately, allowing large state transmissions in terraform v1.6+ to complete without exceeding the API timeout. Previously, create and upload was a single process that could lead to timeouts when dealing with large state files. +1. Prior to Terraform v.1.6.x, the [state version API](/terraform/enterprise/api-docs/state-versions#attributes) returned archivist URLs. The API now returns TFE API URLs, which redirect to archivist URLs. To download state versions, you must follow redirects and include [authentication](/terraform/enterprise/api-docs#authentication) as described in the API overview. + +## Improvements +1. We have improved screen reader usability for the policy sets page. +1. Users that do not have access to a project receive a warning when attempting to view the project's policy set(s). +1. When creating or modifying workspaces, the version control provider section now has seperate sections for public providers and private providers. +1. We have adjusted the way we detect and report drift. These changes are targeted toward reducing noise within drift reports. + +## Bug Fixes +1. Errors parsing state (HandleParseStateJob) were incorrectly marked as successful. This has been fixed and failures will now properly return `Success == false`. +1. Workspace deletion will no longer be potentially blocked by an attached Run Task. +1. OPA policies evaluations now have more robust handling for unexpected response formats. +1. TFE installations with `consolidated_services_enabled` set to enabled now support using a service account when authenticating to GCP object storage. Previously an error would be reported on start - `{"component":"terraform-enterprise","log":"2023-10-06T04:13:52.167Z [ERROR] terraform-enterprise: check failed: name=config duration=\"34.838µs\" err=\"google storage bucket, credentials, and project must be set\""}`. + +## Security +1. Addressed HTTP/2 "Rapid Reset" ([CVE-2023-44487](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44487), [CVE-2023-39325](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39325)) with adoption of new Go releases and associated dependencies. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202312-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202312-1.mdx new file mode 100644 index 000000000..ce5ca3a7d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2023/v202312-1.mdx @@ -0,0 +1,48 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202312-1 (745) release. +--- + +# Terraform Enterprise v202312-1 (745) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:b709ccad0e3d4e4f1a8d33bea4459a70234f50e1784a11cc0cbd4056c055ecb1` + +## Known Issues +1. [Updated April 16, 2024] If you set the maximum run time on the site admin page to be longer than 24 hours, Terraform Enterprise will not trigger runs on this release version. Configure your maximum run time to 24 hours or less. +1. [Updated: February 26, 2024] Customers using `terraform-bundle` and that have defined a working directory may see an error in their runs that reads `Operation failed: failed packing filesystem: illegal slug error: invalid symlink`. You can work around this error using a [custom agent](/terraform/enterprise/v202309-1/flexible-deployments/install/custom-image) image built on `tfc-agent` v1.12. This issue is resolved in v202401-1 of Terraform Enterprise. Contact [support](https://support.hashicorp.com) for help with this issue. +1. [Updated February 26, 2024] In rare cases, no code modules created before upgrading to this release could contain errors that would cause upgrade failures. This issue is fixed in v202401-2. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Highlights +1. You can now designate [variable sets as a priority](/terraform/enterprise/workspaces/variables/managing-variables#priority-variable-sets), marking all variables within the set as a _priority_. Priority variables overwrite any variables with the same key set at more specific scopes in the applied workspaces. + +## Features +1. Terraform Enterprise now supports saving plans and applying them later, with the standard `terraform plan -out ` and `terraform apply ` commands. This feature requires Terraform CLI v1.6.0 or newer. You can also create saved plan runs in the API with the `save-plan` run attribute. +2. The configuration versions API now includes a new `provisional` attribute. Provisional configurations delay becoming the configuration version for their workspace upon creation. Instead, provisional configurations only become current after you apply a run using that configuration. Use this attribute when creating `save-plan` runs via the API. +1. Workload identity tokens now [work natively with the Kubernetes and Helm providers](/terraform/cloud-docs/workspaces/dynamic-provider-credentials/kubernetes-configuration). + +## Improvements +1. We have improved screen reader usability for the variable sets page. +1. You can now configure auto-destroy runs to remove resources managed by a workspace after a period of [workspace inactivity](/terraform/enterprise/workspaces/settings/deletion#destroy-if-a-workspace-is-inactive). +1. When performing a request to the` /account/details` API with an authentication token, you can now follow the `authenticated-resource` relationship to access the underlying token holder. + +## Bug Fixes +1. Policy evaluations (i.e. native OPA support) will now be able to once again run on remote agents after a regression was introduced in v202309-1. +1. When a proxy is configured, it will be properly used during all jobs. Previously, in some situations, the proxy was not properly recognized and could lead to failures when accessing modules. +1. Custom S3 endpoints will now work properly in all configurations. +1. Project and registry module names could previously contain a newline as the final character due to an incorrect validation. +1. `tfe-task-worker` will now properly recycle connections to the host Docker socket. +1. Fixed a bug which cached administrative settings incorrectly: leading to the settings changes not applying until instance restart. +1. Deleting an organization will no longer fail when that organization has a default agent pool +1. Previously specifying multiple configurations for Vault-backed AWS or Vault-backed GCP authentication would return errors related to invalid auth types being specified in certain situations when the auth type specified was actually valid. This has been fixed and these errors should no longer be thrown when a valid auth type is specified. +1. An organization could fail to delete if an API token had been generated for that organization's owners team. Users should now be able to delete these organizations successfully. +1. The workspace count is properly outputted from the `tfe-admin license-info` now. +1. We fixed an issue with a small number of assessments triggering "create" operations that would cause assessments to fail unnecessarily. + +## Security +1. The version of Ruby used has been upgraded to 3.1.4 +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/index.mdx new file mode 100644 index 000000000..e3d94f1fa --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/index.mdx @@ -0,0 +1,135 @@ +--- +page_title: 2024 Releases - Terraform Enterprise +description: The 2024 Terraform Enterprise releases. +--- + +# Terraform Enterprise Releases - 2024 + +Terraform Enterprise releases from 2024 are listed in the table below. + + + + + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively in a Kubernetes environment. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | OpenShift Enabled | Linked
Terraform CLI\** | Sentinel | Tested Kubernetes Versions (EKS, AKS, GKE) | Helm Chart Version | +| ----------------- | --- |------------------------------------------------------------------- | --------------------------------------------------------------------------- | ------------------------------ | ------------------ | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | *yes* | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [1.31](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.30.5](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.4](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.4) | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | *yes* | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [1.31](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.30.5](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.4](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.4) | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | *yes* | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [1.30](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.30](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.3](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.3) | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | *yes* | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.2](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.2) | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | *yes* | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.2](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.2) | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | *yes* | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.2](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.2) | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | *yes* | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-1-may-22-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.0) | +| [v202407-1](/terraform/enterprise/releases/2024/v202407-1) | *yes* | [1.8.5](https://github.com/hashicorp/terraform/releases/tag/v1.8.5) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-1-may-22-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.0) | +| [v202406-1](/terraform/enterprise/releases/2024/v202406-1)* | *yes* | [1.8.3](https://github.com/hashicorp/terraform/releases/tag/v1.8.3) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-15-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.0) | +| [v202405-1](/terraform/enterprise/releases/2024/v202405-1) | *no* | [1.8.2](https://github.com/hashicorp/terraform/releases/tag/v1.8.2) | [0.25.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-25-1-apr-18-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.2.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.2.0) | +| [v202404-2](/terraform/enterprise/releases/2024/v202404-2) | *no* | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.2.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.2.0) | +| [v202404-1](/terraform/enterprise/releases/2024/v202404-1)+ | *no* | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.2.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.2.0) | +| [v202402-2](/terraform/enterprise/releases/2024/v202402-2) | *no* | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202402-1](/terraform/enterprise/releases/2024/v202402-1) | *no* | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202401-2](/terraform/enterprise/releases/2024/v202401-2) | *no* | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202401-1](/terraform/enterprise/releases/2024/v202401-1) | *no* | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202312-1](/terraform/enterprise/releases/2023/v202312-1) | *no* | [1.6.4](https://github.com/hashicorp/terraform/releases/tag/v1.6.4) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [1.24](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.24.9](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.27.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202311-1](/terraform/enterprise/releases/2023/v202311-1) | *no* | [1.6.2](https://github.com/hashicorp/terraform/releases/tag/v1.6.2) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [1.24](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.24.9](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.27.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.0) | +| [v202310-1](/terraform/enterprise/releases/2023/v202310-1) | *no* | [1.6.0](https://github.com/hashicorp/terraform/releases/tag/v1.6.0) | [0.23.0](https://docs.hashicorp.com/sentinel/changelog#0-23-0-sept-5-2023) | [1.24](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.24.9](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.27.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.0.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.0.0) | + + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Docker. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | Linked
Terraform CLI\** | Sentinel | Recommended Docker Compose version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202407-1](/terraform/enterprise/releases/2024/v202407-1) | [1.8.5](https://github.com/hashicorp/terraform/releases/tag/v1.8.5) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202406-1](/terraform/enterprise/releases/2024/v202406-1)* | [1.8.3](https://github.com/hashicorp/terraform/releases/tag/v1.8.3) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-15-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202405-1](/terraform/enterprise/releases/2024/v202405-1) | [1.8.2](https://github.com/hashicorp/terraform/releases/tag/v1.8.2) | [0.25.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-25-1-apr-18-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202404-2](/terraform/enterprise/releases/2024/v202404-2) | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202404-1](/terraform/enterprise/releases/2024/v202404-1)+ | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202402-2](/terraform/enterprise/releases/2024/v202402-2) | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202402-1](/terraform/enterprise/releases/2024/v202402-1) | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202401-2](/terraform/enterprise/releases/2024/v202401-2) | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202401-1](/terraform/enterprise/releases/2024/v202401-1) | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | [V2](https://docs.docker.com/compose/migrate/) | + + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Podman. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | Linked
Terraform CLI\** | Sentinel | Tested Podman version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202407-1](/terraform/enterprise/releases/2024/v202407-1) | [1.8.5](https://github.com/hashicorp/terraform/releases/tag/v1.8.5) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202406-1](/terraform/enterprise/releases/2024/v202406-1)* | [1.8.3](https://github.com/hashicorp/terraform/releases/tag/v1.8.3) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-15-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202405-1](/terraform/enterprise/releases/2024/v202405-1) | [1.8.2](https://github.com/hashicorp/terraform/releases/tag/v1.8.2) | [0.25.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-25-1-apr-18-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202404-2](/terraform/enterprise/releases/2024/v202404-2) | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202404-1](/terraform/enterprise/releases/2024/v202404-1)+ | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Nomad. [Learn more about flexible deployment options](/terraform/enterprise/flexible-deployments/). + +| Version | Linked
Terraform CLI\** | Sentinel | Tested Nomad versions | Min supported version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | --------------------------- | --------------------- | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | 1.5, 1.6, 1.7 | 1.5 | + +
+ + +Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in **March 2025**. HashiCorp will support this release until April 1, 2026. + +To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/deploy) or contact your HashiCorp account representative. + +Below is a list of the most recent Terraform Enterprise releases for the replicated deployment method. [Learn more about Replicated](/terraform/enterprise/deploy/replicated). + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI\** | Sentinel | +| ------------------------------------------------------------ | ---------------- | -------------------------------------------------------------------- | ------------------------------------------------------------------- | -------------------------------------------------------------------------------------- | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | 805 | [2.56.5](https://release-notes.replicated.com/release-notes/2.56.5/) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | 804 | [2.56.5](https://release-notes.replicated.com/release-notes/2.56.5/) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | 798 | [2.56.5](https://release-notes.replicated.com/release-notes/2.56.5/) | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | 791 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | 789 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | 787 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | 781 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | +| [v202407-1](/terraform/enterprise/releases/2024/v202407-1) | 779 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.8.5](https://github.com/hashicorp/terraform/releases/tag/v1.8.5) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | +| [v202406-1](/terraform/enterprise/releases/2024/v202406-1)* | 776 | [2.56.3](https://release-notes.replicated.com/release-notes/2.56.3/) | [1.8.3](https://github.com/hashicorp/terraform/releases/tag/v1.8.3) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-15-2024) | +| [v202405-1](/terraform/enterprise/releases/2024/v202405-1) | 772 | [2.56.3](https://release-notes.replicated.com/release-notes/2.56.3/) | [1.8.2](https://github.com/hashicorp/terraform/releases/tag/v1.8.2) | [0.25.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-25-1-apr-18-2024) | +| [v202404-2](/terraform/enterprise/releases/2024/v202404-2) | 764 | [2.56.3](https://release-notes.replicated.com/release-notes/2.56.3/) | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | +| [v202404-1](/terraform/enterprise/releases/2024/v202404-1)+ | 763 | [2.56.3](https://release-notes.replicated.com/release-notes/2.56.3/) | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | +| [v202402-2](/terraform/enterprise/releases/2024/v202402-2) | 760 | [2.56.2](https://release-notes.replicated.com/release-notes/2.56.2/) | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | +| [v202402-1](/terraform/enterprise/releases/2024/v202402-1) | 759 | [2.56.2](https://release-notes.replicated.com/release-notes/2.56.2/) | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | +| [v202401-2](/terraform/enterprise/releases/2024/v202401-2) | 757 | [2.56.2](https://release-notes.replicated.com/release-notes/2.56.2/) | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | +| [v202401-1](/terraform/enterprise/releases/2024/v202401-1) | 751 | [2.56.2](https://release-notes.replicated.com/release-notes/2.56.2/) | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | + + +
+
+ +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +\** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). + +\+ This release is unavailable. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202401-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202401-1.mdx new file mode 100644 index 000000000..e14815dad --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202401-1.mdx @@ -0,0 +1,73 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202401-1 (751) release. +--- + +# Terraform Enterprise v202401-1 (751) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:a8db9a80790b05744c19e649ba5a89a1c7a48486c956ede4e1b44927153b982a` + +## Known Issues +1. [Updated April 16, 2024] If you set the maximum run time on the site admin page to be longer than 24 hours, Terraform Enterprise will not trigger runs on this release version. Configure your maximum run time to 24 hours or less. +1. [Updated February 26, 2024] In rare cases, no code modules created before upgrading to this release could contain errors that would cause upgrade failures. This issue is fixed in v202401-2. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `consolidated_services_enabled` setting deprecation period has ended and we have removed the setting. All installations now use the single-container architecture introduced in [v202309-1](/terraform/enterprise/releases/2023/v202309-1). For more information on this change, see [consolidated services](/terraform/enterprise/v202401-1/replicated/administration/infrastructure/consolidated-services). +1. Terraform Enterprise now supports new [deployment options](/terraform/enterprise/v202401-1/flexible-deployments/) and we will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. The final Replicated release will be supported until April 1, 2026. + +To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by November 2024. For more information, refer to [the deployments overview](/terraform/enterprise/v202401-1/flexible-deployments) or contact your HashiCorp account representative. + +## Highlights +1. You can now control whether an organization's VCS status checks are aggregated. By default, new organizations aggregate VCS status checks. [Learn more about VCS status checks](/terraform/enterprise/users-teams-organizations/organizations/vcs-status-checks). +1. The private registry is introducing two features: + * A new [branch-based publishing workflow](/terraform/cloud-docs/registry/publish-modules#branch-based-publishing-considerations) alongside the tags-based publishing workflow. + * Terraform Enterprise can now [automatically run tests for modules](/terraform/enterprise/registry/test) published in your private registry using the branch-based flow. + +## Features +1. When you start a run from the Terraform Enterprise user interface and select the **Plan and Apply** run type, clicking **Additional planning options** allows you to select resource addresses to replace. +1. Site administrators can now configure site-wide [data retention policies](/terraform/enterprise/users-teams-organizations/organizations#destruction-and-deletion) in the admin settings page. +1. Data retention policies at the organization and workspace level can now specify ["don't delete" to override parent data retention policies](/terraform/enterprise/users-teams-organizations/organizations#destruction-and-deletion). +1. You can now execute [policy evaluations](/terraform/enterprise/policy-enforcement) on-demand. You can also select the runtime version and workspace to evaluate against, allowing for version compatibility testing as well as workspace integration testing. +1. [Run tasks](/terraform/enterprise/workspaces/settings/run-tasks) can now return richly formatted responses to Terraform. This enables users to use streamlined run task reviews in Terraform Enterprise, and provides meaningful context on run task evaluations without having to leave Terraform. +1. Added a new workspace setting **Auto-apply run triggers**, (API: `auto-apply-run-trigger`), which controls whether a workspace should auto-apply runs caused by changes in other workspaces. +1. Users can now pin policy tool versions (Sentinel and OPA) to execute individual policy sets. + +## Improvements +1. Removed the **VCS Branch field** on a workspace's VCS settings page for workspaces [triggering runs based on git tags](/terraform/enterprise/workspaces/settings/vcs#trigger-runs-when-a-git-tag-is-published) in order to clearly display the trigger for any vcs initiated runs. +1. Support bundles on [Docker, Kubernetes, and Podman (beta)](/terraform/enterprise/v202401-1/flexible-deployments) installations now include process information from the `terraform-enterprise` container. +1. Removed the workspace version setting summary that states versions do not upgrade automatically. When a workspace version is set to a version constraint, the version automatically resolves to the latest version which satisfies the constraint. +1. The Agent Pool edit page loads faster for agent pools available to a large number of workspaces. +1. You can now pause streaming log output to select text. +1. Sentinel Policy checks can now utilize the `resource_drift` attribute for the `tfplan/v2` import. +1. You can now expand or collapse the side navigation via a toggle button. + +## Bug Fixes +1. Runs queued for longer than 10 minutes should not longer become stuck in a pending state. +1. The state viewer component now properly checks and renders an appropriate error message for all response errors, rather than only detecting `400` responses and rendering all other response errors as inline state within the state viewer. +1. Workers running VCS repository ingestion will now drop work when it has passed the completion deadline, and can no longer be completed successfully. This mitigates issues with workers being resource constrained and unable to process all VCS ingestion due to a burst of requests. +1. Account sign up now properly creates the user's session so they are not prompted to complete step-up auth after account creation. +1. Update organization team page to have required data to correctly display 2FA badges for members. +1. Creating multiple VCS-backed workspaces will no longer create duplicate webhooks. +1. Connect Organization button will correctly navigate the user's window session to the provider's authorization page. This prevents the authorization flow being initiated in a new session. +1. The project name breadcrumb on the project settings page now links to the correct place. +1. The name input in the new project form now correctly displays error messages. +1. The Provider overview pages in the registry will now load properly. +1. Plan output will no longer show an error when nested objects contain empty attributes. +1. Fixed error "Resource diff not found" when expanding resources that are drifted but do not have changes. +1. Workspace resources' provider names are now updated after running the `terraform state replace-provider` CLI command. +1. The `tfectl` command `tfectl admin token` returns the appropriate initial admin creation URL. +1. A GitHub-backed workspace run that contains more than 300 changed files will now properly execute. + +## Security +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202401-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202401-2.mdx new file mode 100644 index 000000000..574ad6b1c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202401-2.mdx @@ -0,0 +1,76 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202401-2 (755) release. +--- + +# Terraform Enterprise v202401-2 (757) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:d724fa57019f0b06c10566f1d646f76c7a8b1e7ffe5ef5235a2b3a470fd05fda` + +## Changes Since v202401-1 +1. In rare cases, no code modules created before upgrading to v202401-1 could contain errors that would cause upgrade failures. This issue has been fixed, upgrades will now complete successfully even if no code modules contain errors. +1. Removed an unused Ruby gem that could cause increased memory usage in certain situations. + +## Known Issues +1. [Updated April 16, 2024] If you set the maximum run time on the site admin page to be longer than 24 hours, Terraform Enterprise will not trigger runs on this release version. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `consolidated_services_enabled` setting deprecation period has ended, and we have removed the setting. All installations now use the single-container architecture introduced in [v202309-1](/terraform/enterprise/releases/2023/v202309-1). For more information on this change, refer to [consolidated services](/terraform/enterprise/v202401-2/replicated/administration/infrastructure/consolidated-services). +1. Terraform Enterprise now supports new [deployment options](/terraform/enterprise/v202401-2/flexible-deployments/) and we will be ending support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. We will support the final Replicated release until April 1, 2026. + +To ensure you continue to receive the latest features and fixes, migrate to a new deployment option by November 2024. For more information, check out [flexible deployment options,](/terraform/enterprise/v202401-2/flexible-deployments) or contact your HashiCorp account representative. + +## Highlights +1. You can now control whether an organization's VCS status checks are aggregated. By default, new organizations aggregate VCS status checks. [Learn more about VCS status checks](/terraform/enterprise/users-teams-organizations/organizations/vcs-status-checks). +1. The private registry is introducing two features: + * A new [branch-based publishing workflow](/terraform/cloud-docs/registry/publish-modules#branch-based-publishing-considerations) alongside the tags-based publishing workflow. + * Terraform Enterprise can now [automatically run tests for modules](/terraform/enterprise/registry/test) published in your private registry using the branch-based flow. + +## Features +1. When you start a run from the Terraform Enterprise user interface and select the **Plan and Apply** run type, clicking **Additional planning options** allows you to select resource addresses to replace. +1. Site administrators can now configure site-wide [data retention policies](/terraform/enterprise/users-teams-organizations/organizations#destruction-and-deletion) in the admin settings page. +1. Data retention policies at the organization and workspace level can now specify ["don't delete" to override parent data retention policies](/terraform/enterprise/users-teams-organizations/organizations#destruction-and-deletion). +1. You can now execute [policy evaluations](/terraform/enterprise/policy-enforcement) on-demand. You can also select the runtime version and workspace to evaluate against, allowing for version compatibility testing as well as workspace integration testing. +1. [Run tasks](/terraform/enterprise/workspaces/settings/run-tasks) can now return richly formatted responses to Terraform. This enables users to use streamlined run task reviews in Terraform Enterprise, and provides meaningful context on run task evaluations without having to leave Terraform. +1. Added a new workspace setting **Auto-apply run triggers**, (API: `auto-apply-run-trigger`), which controls whether a workspace should auto-apply runs caused by changes in other workspaces. +1. Users can now pin policy tool versions (Sentinel and OPA) to execute individual policy sets. + +## Improvements +1. Removed the **VCS Branch field** on a workspace's VCS settings page for workspaces [triggering runs based on git tags](/terraform/enterprise/workspaces/settings/vcs#trigger-runs-when-a-git-tag-is-published) in order to clearly display the trigger for any vcs initiated runs. +1. Support bundles on [Docker, Kubernetes, and Podman (beta)](/terraform/enterprise/v202401-2/flexible-deployments) installations now include process information from the `terraform-enterprise` container. +1. Removed the workspace version setting summary that states versions do not upgrade automatically. When a workspace version is set to a version constraint, the version automatically resolves to the latest version which satisfies the constraint. +1. The Agent Pool edit page loads faster for agent pools available to a large number of workspaces. +1. You can now pause streaming log output to select text. +1. Sentinel Policy checks can now utilize the `resource_drift` attribute for the `tfplan/v2` import. +1. You can now expand or collapse the side navigation via a toggle button. + +## Bug Fixes +1. Runs queued for longer than 10 minutes should not longer become stuck in a pending state. +1. The state viewer component now properly checks and renders an appropriate error message for all response errors, rather than only detecting `400` responses and rendering all other response errors as inline state within the state viewer. +1. Workers running VCS repository ingestion will now drop work when it has passed the completion deadline, and can no longer be completed successfully. This mitigates issues with workers being resource constrained and unable to process all VCS ingestion due to a burst of requests. +1. Account sign up now properly creates the user's session so they are not prompted to complete step-up auth after account creation. +1. Update organization team page to have required data to correctly display 2FA badges for members. +1. Creating multiple VCS-backed workspaces will no longer create duplicate webhooks. +1. Connect Organization button will correctly navigate the user's window session to the provider's authorization page. This prevents the authorization flow being initiated in a new session. +1. The project name breadcrumb on the project settings page now links to the correct place. +1. The name input in the new project form now correctly displays error messages. +1. The Provider overview pages in the registry will now load properly. +1. Plan output will no longer show an error when nested objects contain empty attributes. +1. Fixed error "Resource diff not found" when expanding resources that are drifted but do not have changes. +1. Workspace resources' provider names are now updated after running the `terraform state replace-provider` CLI command. +1. The `tfectl` command `tfectl admin token` returns the appropriate initial admin creation URL. +1. A GitHub-backed workspace run that contains more than 300 changed files will now properly execute. + +## Security +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202402-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202402-1.mdx new file mode 100644 index 000000000..3da3f0b8b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202402-1.mdx @@ -0,0 +1,52 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202402-1 (759) release. +--- + +# Terraform Enterprise v202402-1 (759) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:295dbf7b87e6fefde292ba752df1d3b4870eeca17f38d149277d1676a2d2d9ab` + +## Known Issue +1. [Updated April 16, 2024] If you set the maximum run time on the site admin page to be longer than 24 hours, Terraform Enterprise will not trigger runs on this release version. Configure your maximum run time to 24 hours or less. +1. [Updated April 15, 2024] The [backup and restore API](/terraform/enterprise/v202402-1/flexible-deployments/admin/admin-cli/backup-restore#creating-a-backup) may create incomplete backups for Terraform Enterprise installations using the mounted disk operational mode. We recommend backing up your data directories using alternative means until we fix this issue. We plan to resolve this issue in the v202404-1 release. +1. [Updated March 15, 2024] Customers that use special characters in their database password may be unable to start Terraform Enterprise. Updating the password to remove special characters will allow the application to start. The issue is being investigated, and this known issue will be updated with more information once a fix is identified. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. Terraform Enterprise now supports new [deployment options](/terraform/enterprise/v202402-1/flexible-deployments/) and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. The final Replicated release will be supported until April 1, 2026. To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by November 2024. For more information, refer to [flexible deployment options,](/terraform/enterprise/v202402-1/flexible-deployments) or contact your HashiCorp account representative. + +## Features +1. Added a new post-apply stage to the run task workflow. This stage lets you seamlessly incorporate post-provisioning tasks, which automates configuration management, compliance checks, and other post-deployment activities. +1. Terraform Enterprise now reports product usage data insights to HashiCorp (resources under management). For more information, including how to opt out, see [product usage data reporting[(/terraform/enterprise/v202402-1/flexible-deployments/admin/license#enable-product-usage-reporting. + +## Improvements +1. Added a timeout to an internal job, preventing a situation where a job could get stuck and have to be force canceled. If this time out is reached, an `ActiveRecord::QueryCanceled` exception will be raised causing the job to fail and be subject to the job's retry policy (if any). +1. Update Sentinel to 0.24.1, bringing some lower level runtime improvements. +1. The `tfrun` import will now correctly decode `null` values from the provided configuration as `null` values within policy code. +1. Improved performance of the admin users list UI. +1. Improved performance of the list workspace variables API endpoint. +1. Updated and improved the agent pool settings page UI. +1. Warnings starting with the line "Initialization autoloaded the constants" have been addressed and will no longer appear in log output +1. Flexible patch versions of Terraform can now be selected in the workspace settings, allowing you to easily select the latest patch version of a terraform minor release. + +## Bug Fixes +1. We fixed a bug where Terraform attempted to render soft-deleted state versions in the state version viewer, resulting in false errors. The state version viewer now renders an informative error message instead of attempting to render the diff for a soft-deleted state version. +1. We fixed an issue in the web app where the footer was consistently overflowing the page content. +1. We fixed an issue where Terraform was unable to list commits for branch-based registry modules from Azure DevOps. +1. Fixes a bug where changing steps in the Reauthorization of an OAuth Client flow results in the deletion of the connection. +1. Warnings starting with the line "Initialization autoloaded the constants" have been addressed and will no longer appear in log output +1. Module filters will now remain selected and results will show based on an `OR` filter. + +## Security +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202402-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202402-2.mdx new file mode 100644 index 000000000..65b87d7fc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202402-2.mdx @@ -0,0 +1,57 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202402-2 (760) release. +--- + +# Terraform Enterprise v202402-2 (760) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:295dbf7b87e6fefde292ba752df1d3b4870eeca17f38d149277d1676a2d2d9ab` + +## Changes Since v202402-1 +1. Databases passwords now support non-alphanumeric characters. +1. During a postgres failover, Terraform Enterprise now successfully connects to the new primary server. This fixes an issue where DNS caching was preventing the database from completely disconnecting from the old primary during a failover. + +## Known Issue +1. [Updated April 16, 2024] If you set the maximum run time on the site admin page to be longer than 24 hours, Terraform Enterprise will not trigger runs on this release version. Configure your maximum run time to 24 hours or less. +1. [Updated April 15, 2024] The [backup and restore API](/terraform/enterprise/v202402-1/flexible-deployments/admin/admin-cli/backup-restore#creating-a-backup) may create incomplete backups for Terraform Enterprise installations using the mounted disk operational mode. We recommend backing up your data directories using alternative means until we fix this issue. We have planned a resolution for the v202404-1 release. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/flexible-deployments/) or contact your HashiCorp account representative. + +## Features +1. Added a new post-apply stage to the run task workflow. This stage lets you seamlessly incorporate post-provisioning tasks, which automates configuration management, compliance checks, and other post-deployment activities. +1. Terraform Enterprise now reports product usage data insights to HashiCorp (resources under management). For more information, including how to opt out, see [product usage data reporting[(/terraform/enterprise/v202402-1/flexible-deployments/admin/license#enable-product-usage-reporting. + +## Improvements +1. Added a timeout to an internal job, preventing a situation where a job could get stuck and have to be force canceled. If this time out is reached, an `ActiveRecord::QueryCanceled` exception will be raised causing the job to fail and be subject to the job's retry policy (if any). +1. Update Sentinel to 0.24.1, bringing some lower level runtime improvements. +1. The `tfrun` import will now correctly decode `null` values from the provided configuration as `null` values within policy code. +1. Improved performance of the admin users list UI. +1. Improved performance of the list workspace variables API endpoint. +1. Updated and improved the agent pool settings page UI. +1. Warnings starting with the line "Initialization autoloaded the constants" have been addressed and will no longer appear in log output +1. Flexible patch versions of Terraform can now be selected in the workspace settings, allowing you to easily select the latest patch version of a terraform minor release. + +## Bug Fixes +1. We fixed a bug where Terraform attempted to render soft-deleted state versions in the state version viewer, resulting in false errors. The state version viewer now renders an informative error message instead of attempting to render the diff for a soft-deleted state version. +1. We fixed an issue in the web app where the footer was consistently overflowing the page content. +1. We fixed an issue where Terraform was unable to list commits for branch-based registry modules from Azure DevOps. +1. Fixes a bug where changing steps in the Reauthorization of an OAuth Client flow results in the deletion of the connection. +1. Warnings starting with the line "Initialization autoloaded the constants" have been addressed and will no longer appear in log output +1. Module filters will now remain selected and results will show based on an `OR` filter. + +## Security +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202404-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202404-1.mdx new file mode 100644 index 000000000..d79ad19b5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202404-1.mdx @@ -0,0 +1,72 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202404-1 (763) release. +--- + +# Terraform Enterprise v202404-1 (763) + +~> We have pulled the v202404-1 release, making it unavailable to download due to a breaking bug. If you have already installed this release, we recommend upgrading to the v202404-2 patch release or restoring your previously installed version. + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:d4071b212178e1dfc3c18900234e2240cee873802b37107bbe394036488099a8` + +## Known Issues + +1. [Updated May 13, 2024] Replicated-based installs running in Active/Active mode are unable to properly supply a Redis configuration to the application. A fix will be available in v202405-1. +1. [Updated April 30, 2024] Customers that use S3 for backend blob storage should not upgrade to this release. The application will start, but is unable to read or write data from the blob storage. A fix is available in v202404-2. +1. [Updated April 30, 2024] If your encryption password contains certain special characters (backslash, dollar sign, grave accent, double quotation, exclamation or tilde) the application will not start successfully and will log errors decrypting vault. A fix is available in v202404-2. +1. [Updated April 30, 2024] Customers that use Terraform Enterprise with an external vault server are unable to refresh application tokens. This is fixed in v202404-2. +1. [Updated April 30, 2024] The global run tasks feature is unavailable in this version. This is fixed in v202404-2. +1. [Updated April 30, 2024] The private registry is unable to list module versions. A fix is available in v202404-2. +1. [Updated April 30, 2024] The footer shows `dev` instead of the application version. This is corrected in v202404-2. +1. [Updated June 26, 2024] After successfully running a database restore in mounted disk mode, the Terraform Enterprise container, or Replicated application, must be fully stopped and restarted in order for the application to run properly. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations + +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, please plan to migrate to a non-Replicated runtime by **November 2024**. For more information, refer to [Flexible Deployment Options](/terraform/enterprise/v202404-1/flexible-deployments/) or contact your HashiCorp account representative. +1. RedHat Enterprise will end support for RHEL v7 on June 30th, 2024. As such, Terraform Enterprise will no longer be supported on that operating system after that date. + +## Features + +1. Podman is now a supported deployment option. [Requirements](/terraform/enterprise/v202404-1/flexible-deployments/install/podman/requirements), [installation](/terraform/enterprise/v202404-1/flexible-deployments/install/podman/install) and [migration](/terraform/enterprise/v202404-1/replicated/replicated-migration#migrate-to-podman) instructions from Replicated are available. +1. You can now specify which projects can use repositories from a VCS connection. By default, Terraform Enterprise enables every workspace in an organization to access the repositories from every VCS connection. If you want to limit which projects have access to repositories from a given VCS connection, [you can change this setting](https://www.hashicorp.com/blog/terraform-cloud-improves-visibility-and-control-for-projects) to restrict connection to specific projects. +1. You can now associate a [run task](/terraform/cloud-docs/integrations/run-tasks) to all workspaces in the organization. Refer to [this blog post](https://www.hashicorp.com/blog/terraform-cloud-unveils-new-run-task-workflow-enhancements) for more details. +1. You can now create runs with debugging mode enabled from the UI and API, allowing quick access to trace level run logs. +1. You can now provide a [custom pod template](https://github.com/hashicorp/terraform-enterprise-helm/blob/main/values.yaml#L161-L168) for worker pods with [v1.2.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.2.0) of the helm chart. + +## Improvements + +1. Hosted agents now dequeue jobs in priority order. +1. When a user creates a new project or updates a project name whitespace is now removed from both ends of the name. The allows for a better user experience if a user accidentally adds spaces before or after. +1. Breadcrumbs for projects-related pages are now a more accurate representation of the user's location in Terraform Enterprise. +1. Bitbucket Data Center is now a supported VCS integration. +1. Workspace tasks can now be associated to more than one run stage. + +## Bug Fixes + +1. Environment variables in priority variable sets will now overwrite workspace variables with the same key. Previously, priority variable sets did not work for environment-type variables. +1. Workspaces can now be fully deleted even if they contain a state version which was rolled back. Previously, a bug caused issues with deleting workspaces under these conditions, leading to incomplete removal. +1. Searching for a Policy Set no longer is interrupted by unexpected reloads. +1. Workspaces with long names in a Kubernetes-hosted Terraform Enterprise installation can now successfully run plan or apply operations. Previously, a bug caused these operations to fail. +1. You can now use `tfe-backup-restore` to generate blob storage backups. +1. Any `tfectl` command that executes across remote nodes and takes more than 30 seconds to complete no longer fails silently. +1. All Docker container metrics now have an associated `name` label, ensuring proper identification and monitoring. +1. Terraform Enterprise no longer silently fails runs in organizations with a plan or apply timeout value exceeding 24 hours. If you had previously configured this setting to greater than 24 hours, it will be reduced to 24 hours on start. +1. The `tfectl support bundle` command now generates a complete manifest.json file. + +## Security + +1. Each service now runs under a unique user id inside the Terraform Enterprise container. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202404-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202404-2.mdx new file mode 100644 index 000000000..d392d24b1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202404-2.mdx @@ -0,0 +1,80 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202404-2 (764) release. +--- + +# Terraform Enterprise v202404-2 (764) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:3b564b51884573aca0dc59e7042ab6dab1cf9136284e56560805c6fef6567d69` + +## Changes Since v202404-1 +1. Terraform Enterprise properly detects S3 bucket prefixes, allowing it to read and write to the blob storage without issues. +1. External service passwords and vault encryption passwords with special characters no longer prevent Terraform Enterprise's startup. +1. External vault tokens now refresh properly. +1. You can now enable the global run tasks feature. +1. The private registry lists module versions. +1. The application footer shows the correct version of the application, `v202404-2` instead of `dev`. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Known Issues + +1. [Updated May 13, 2024] Replicated-based installs running in Active/Active mode are unable to properly supply a Redis configuration to the application. This is fixed in v202405-1. +1. [Updated May 24, 2024] Private module registry test invocations may fail when downloading the Terraform binary. This is fixed in v202405-1. +1. [Updated May 24, 2024] Terraform may fail to upload state when an older state version has no lineage value. This is fixed in v202405-1. +1. [Updated May 24, 2024] The `terraform output` command may not reflect all existing outputs. This is fixed in v202405-1. +1. [Updated May 24, 2024] The [assessment results API](https://developer.hashicorp.com/terraform/cloud-docs/api-docs/assessment-results) may not return the correct ID for the workspace relation. This is fixed in v202405-1. +1. [Updated May 24, 2024] Private modules uploaded to the Private Registry as tar files may be missing some metadata. This is fixed in v202405-1. +1. [Updated May 24, 2024] The values for the SAML configuration options `AuthnRequestsSigned` and `WantAssertionsSigned` are not being preserved in the SAML metadata. This is fixed in v202405-1. +1. [Updated May 24, 2024] Mounted Disk installations of Terraform Enterprise are failing to generate support bundles. This is fixed in v202405-1. +1. [Updated June 26, 2024] After successfully running a database restore in mounted disk mode, the Terraform Enterprise container, or Replicated application, must be fully stopped and restarted in order for the application to run properly. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. + + + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/v202404-1/flexible-deployments/) or contact your HashiCorp account representative. +1. RedHat Enterprise will end support for RHEL v7 on June 30th, 2024. As such, Terraform Enterprise will no longer be supported on that operating system after that date. + +## Features + +1. Podman is now a supported deployment option. [Requirements](/terraform/enterprise/v202404-1/flexible-deployments/install/podman/requirements), [installation](/terraform/enterprise/v202404-1/flexible-deployments/install/podman/install) and [migration](/terraform/enterprise/v202404-1/replicated/replicated-migration#migrate-to-podman) instructions from Replicated are available. +1. You can now specify which projects can use repositories from a VCS connection. By default, Terraform Enterprise enables every workspace in an organization to access the repositories from every VCS connection. If you want to limit which projects have access to repositories from a given VCS connection, [you can change this setting](https://www.hashicorp.com/blog/terraform-cloud-improves-visibility-and-control-for-projects) to restrict connection to specific projects. +1. You can now associate a [run task](/terraform/cloud-docs/integrations/run-tasks) to all workspaces in the organization. Refer to [this blog post](https://www.hashicorp.com/blog/terraform-cloud-unveils-new-run-task-workflow-enhancements) for more details. +1. You can now create runs with debugging mode enabled from the UI and API, allowing quick access to trace level run logs. +1. You can now provide a [custom pod template](https://github.com/hashicorp/terraform-enterprise-helm/blob/main/values.yaml#L161-L168) for worker pods with [v1.2.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.2.0) of the helm chart. + +## Improvements + +1. Hosted agents now dequeue jobs in priority order. +1. When a user creates a new project or updates a project name whitespace is now removed from both ends of the name. The allows for a better user experience if a user accidentally adds spaces before or after. +1. Breadcrumbs for projects-related pages are now a more accurate representation of the user's location in Terraform Enterprise. +1. Bitbucket Data Center is now a supported VCS integration. +1. Workspace tasks can now be associated to more than one run stage. + +## Bug Fixes + +1. Environment variables in priority variable sets will now overwrite workspace variables with the same key. Previously, priority variable sets did not work for environment-type variables. +1. Workspaces can now be fully deleted even if they contain a state version which was rolled back. Previously, a bug caused issues with deleting workspaces under these conditions, leading to incomplete removal. +1. Searching for a Policy Set no longer is interrupted by unexpected reloads. +1. Workspaces with long names in a Kubernetes-hosted Terraform Enterprise installation can now successfully run plan or apply operations. Previously, a bug caused these operations to fail. +1. You can now use `tfe-backup-restore` to generate blob storage backups. +1. Any `tfectl` command that executes across remote nodes and takes more than 30 seconds to complete no longer fails silently. +1. All Docker container metrics now have an associated `name` label, ensuring proper identification and monitoring. +1. Terraform Enterprise no longer silently fails runs in organizations with a plan or apply timeout value exceeding 24 hours. If you had previously configured this setting to greater than 24 hours, it will be reduced to 24 hours on start. +1. The `tfectl support bundle` command now generates a complete manifest.json file. + +## Security + +1. Each service now runs under a unique user id inside the Terraform Enterprise container. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202405-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202405-1.mdx new file mode 100644 index 000000000..8827a42a6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202405-1.mdx @@ -0,0 +1,70 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202405-1 (772) release. +--- + +# Terraform Enterprise v202405-1 (772) + +Last required release: [v202304-1 (692)](/terraform/enterprise/releases/2023/v202304-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:aea104fc8d022c06fe659aa1bcb9f13639946e6b8cdb622120fca5e61caf1397` + +## Known Issues +1. [Updated June 26, 2024] After successfully running a database restore in mounted disk mode, the Terraform Enterprise container, or Replicated application, must be fully stopped and restarted in order for the application to run properly. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To continue to receiving the latest features and fixes, migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/v202405-1/flexible-deployments/) or contact your HashiCorp account representative. + +1. RedHat Enterprise is ending support for RHEL v7 on June 30th, 2024. Following suit, Terraform Enterprise will no longer support RHEL v7 after June 30th, 2024. Replicated installations of Terraform Enterprise support RHEL 8. The Podman deployment option supports using RHEL 8 or higher. + + +## Highlights + +1. We have removed a common prefix from the keys which Redis uses for application caching. Upon upgrading, Terraform Enterprise starts with a cold cache and the size of Redis's cache data will approximately double until the old entries expire in three days. If you have an unusually large dataset in Redis and want to remove these old entries sooner, connect to Redis DB 15 and remove them manually by running `redis-cli --scan --pattern 'cache:*' | xargs redis-cli del `. +1. You can now browse projects from the dedicated [projects](/terraform/cloud-docs/workspaces/organize-workspaces-with-projects) page for better visibility and manageability. The new project overview page lets you view and search all projects you have access to. This view also provides an overview of the number of teams and workspaces associated with each project. +1. [Updated June 14, 2024] Project names can now be up to 40 characters in length. +1. Replicated installations now support Amazon Linux 2023, and RedHat Enterprise Linux 8.8. +1. The application framework underlying the Terraform Enterprise API has been upgraded from Rails 6.1 to 7.1 + + +## Features + +1. Team-enabled organizations can now delegate team management privileges to non-owners using our three new team permissions. Expanding on the existing "manage membership" permission, teams can now have the ability to "manage teams", "manage organization access", and optionally "include secret teams" at each of these permission levels. [Learn more](/terraform/cloud-docs/users-teams-organizations/permissions#organization-permissions). + + +## Improvements + +1. Docker 25.0.x, 26.0.x, and 26.1.x is now supported for [Docker-based installations](/terraform/enterprise/v202405-1/flexible-deployments/install/docker/requirements) of Terraform Enterprise. +1. The team setting "Manage organization access" permission now includes a link to documentation. +1. We have paginated the workspace list on the workspace settings page where you connect run triggers. +1. The aggregated commit status page, which VCS providers link to on commits and PRs, is now more efficient when viewing runs associated with many workspaces. +1. Update the organizations list page to include pagination and the ability to create and leave organizations. +1. Updating Policy Checks to Sentinel 0.25.1, bringing with it the latest Sentinel improvements. + + +## Bug Fixes + +1. Private module registry test invocations will no longer fail when downloading the Terraform binary. +1. Terraform can now upload state even if an older state version has no lineage value. This resolves a bug that prevented Terraform from uploading state. +1. The `terraform output` command now reflect existing outputs. This resolves a bug that prevented Terraform from processing existing outputs. +1. The [assessment results API](/terraform/cloud-docs/api-docs/assessment-results) now returns the correct ID for the workspace relation. +1. Private modules uploaded as tar files to the Private Registry will now have all relevant metadata. This resolves a bug where tar files of a particular format were missing metadata. +1. The values for the SAML configuration options `AuthnRequestsSigned` and `WantAssertionsSigned` are now being set properly in the initializer. This resolves a bug where their value was not being preserved in the SAML metadata. +1. Support bundles are now available over HTTPS for Mounted Disk installations of Terraform Enterprise. This resolves a bug where the support bundle command would return an error and fail to create a support bundle. +1. Terraform Enterprise now successfully detects custom prefixes in S3 buckets when using a custom CA certificate bundle. + +## Security + +1. We have updated the internal Vault service to v1.16.2. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202406-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202406-1.mdx new file mode 100644 index 000000000..37888daf1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202406-1.mdx @@ -0,0 +1,65 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202406-1 (776) release. +--- + +# Terraform Enterprise v202406-1 (776) + +**This is a required release!** + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:2d6cadbc5b4956fbebe899a0ca3735108aa3fa086d380215c45298dcfc4b9c31` + +## Known Issues +1. [Updated November 21, 2024] Upgrading to v202406-1 appears to stall under the following conditions: + + - Terraform Enterprise is in `disk` mode. + - The data directory has more than 1 TB of data. + - Terraform is deployed to Replicated. + + Terraform Enterprise processes file permissions for the data during the upgrade but does not print ongoing messages to the log indicating that the operations are ongoing. + + Allow up to an hour for the upgrade, even when the following message appears in the log for an extended period of time: + + `Running as builtin tfe user, ensuring ownership of scratch directories...` + +1. [Updated September 6, 2024] This release contains a possible migration error due to orphaned team membership records referring to teams that have been deleted. If this issue affects you, the upgrade will fail. To avoid this, please refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/33051539466643-Terraform-Enterprise-version-upgrade-to-v202406-1-776-fails-with-ForeignKeyViolation) for steps to check if you have orphaned records and how to remove them before proceeding with the migration. +1. [Updated June 26, 2024] After successfully running a database restore in mounted disk mode, the Terraform Enterprise container, or Replicated application, must be fully stopped and restarted in order for the application to run properly. +1. [Updated August 14, 2024] Runs that rely on dynamic provider credentials and workload identity will fail after a certain number of signing key rotations. This problem is fixed in v202407-1, and you can avoid it by upgrading v202407-1 or above. For details on additional workarounds, including manually trimming keys, refer to [our support article](https://support.hashicorp.com/hc/en-us/articles/31715716966419-Issue-with-OIDC-Vault-key-rotation-mechanism-to-incorrectly-identify-the-newest-signing-key). +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To continue receiving the latest features, fixes, and security updates, migrate to a new deployment option by **November 2024**. For more information, refer to [Flexible Deployment Options](/terraform/enterprise/v202406-1/flexible-deployments/) or contact your HashiCorp account representative. +1. RedHat Enterprise is ending support for RHEL v7 on June 30th, 2024. Following suit, Terraform Enterprise will no longer support RHEL v7 after June 30th, 2024. Replicated installations of Terraform Enterprise support RHEL 8. The [Podman](/terraform/enterprise/flexible-deployments/install/podman/requirements) deployment option supports using RHEL 8 or higher. +1. We've removed the organizations list and navigation items from the account settings page, and instead recommend referencing your main organization page for a list of your organizations. + +## Highlights +1. This Terraform Enterprise release (v202406-1) is required, because of an upgrade of the internal PostgreSQL service from v14 to v16. This database upgrade also enables using the backup and restore API endpoints against external PostgreSQL servers running versions 15 or 16. If your upgrade fails, [restore your PostgresQL v14 database](https://support.hashicorp.com/hc/en-us/articles/29408234918035-Terraform-Enterprise-Mounted-Disk-PostgreSQL-Database-Upgrade-from-v14-to-v16). +1. Terraform Enterprise now supports a new [deployment option](/terraform/enterprise/v202406-1/flexible-deployments). Terraform Enterprise can now be deployed to HashiCorp Nomad. The feature is still in beta. To get started, refer to the [Nomad Beta requirements](/terraform/enterprise/v202406-1/flexible-deployments/install/nomad/requirements). +1. Terraform Enterprise now supports a new [deployment option](/terraform/enterprise/v202406-1/flexible-deployments). Terraform Enterprise can now be deployed to Red Hat OpenShift. The feature is still in Beta stage. To get started, read the [Kubernetes and OpenShift requirements](/terraform/enterprise/v202406-1/flexible-deployments/install/kubernetes/requirements) and instructions for [operating Terraform Enterprise on Red Hat OpenShift](/terraform/enterprise/v202406-1/flexible-deployments/install/kubernetes/openshift). + +## Features +1. You can now search for organizations by name on the main organizations page. +1. A new page has been added to allow administrators to view and cancel the current run for each workspace in an organization. For more information, refer to [Organizations](/terraform/enterprise/v202406-1/users-teams-organizations/organizations#runs). + +## Improvements +1. An organization [owner](/terraform/enterprise/v202406-1/users-teams-organizations/permissions#organization-owners) can now [leave an organization](/terraform/enterprise/v202406-1/users-teams-organizations/users#organizations) if that organization has other active owners. +1. The sentinel worker has been updated to [0.26.0](/sentinel/docs/changelog#0-26-0-may-15-2024). + +## Bug Fixes +1. The `tfe.run.limit` metric is now displayed in the JSON representation of metrics. +1. When a workspace is deleted, it will not longer appear in the variable set page. +1. Attaching a VCS provider to a project using the [attach to a project endpoint](/terraform/enterprise/v202406-1/api-docs/oauth-clients#attach-to-a-project) will no longer inadvertently remove existing projects attached to the same provider. +1. When you edit a workspace variable and wait for some time before clicking the Cancel button, the variable now reverts back to its original key and value. +1. Managing a run task with too many workspace associations could time out and display an error, preventing any updates to that run task. The number of workspace associations is now checked before loading, and will only display the workspaces if there are fewer than 50. + +## Security +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202407-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202407-1.mdx new file mode 100644 index 000000000..b9f967dc1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202407-1.mdx @@ -0,0 +1,59 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202407-1 (779) release. +--- + +# Terraform Enterprise v202407-1 (779) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:5d1bab736bc7fe41f7425df0f2ea5942f97091e8422e788a86a540324acb50cd` + + +## Known Issues +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/flexible-deployments/) or contact your HashiCorp account representative. +1. The variables API endpoint, `/vars`, is deprecated and will be removed in a future release. All existing integrations with this API should transition to the [workspace variables API](/terraform/cloud-docs/api-docs/workspace-variables) `/workspaces/:workspace_id/vars`. +1. PostgreSQL v12 will reach end of life on November 12 2024 and will no longer be supported in Terraform Enterprise after that date. Please refer to [PostgreSQL Requirements for Terraform Enterprise](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/postgres-requirements) for a complete list of supported versions. + +## Highlights +1. You can now deploy Terraform Enterprise to OpenShift. We have updated the Helm chart with a new `openshift.enabled` value, which simplifies configuring Terraform Enterprise for OpenShift's security context requirements. For more information, refer to [Operate Terraform Enterprise on Red Hat OpenShift](/terraform/enterprise/flexible-deployments/install/kubernetes/openshift). +1. We are migrating three columns on the user table to be encrypted via Vault: `confirmation_token`, `two_factor_secret_key`, and `two_factor_recovery_secret_key`. As part of this change, a synchronous migration will be performed when updating to this release to populate the encrypted columns based on the existing plaintext columns. For customers using Terraform Enterprise's username/password authentication or the two factor authentication feature, this migration could take a little while to execute. We estimate 4ms per user to update, but the time may vary based on a variety of factors, including your hardware. All other Terraform Enterprise customers should not be impacted. After the synchronous migration has been completed, the plaintext columns will be dropped from the users table. + +## Improvements +1. We have improved the responsiveness of your organization's users page. +1. Ephemeral workspace auto-destroy runs now run within five minutes of the scheduled time. +1. The rounding threshold for run details has been increased to show a more accurate change summary. +1. The structured run output (SRO) now lists and sets planned changes according to individual elements when the collection has not changed. +1. Added the ability to pass two comma-separated Terraform versions as a constraint on workspaces. + + +## Bug Fixes + +1. OPA versions are listed correctly when creating a new OPA policy set. +1. You can now reconnect a VCS provider to an organization once the connection is revoked. +1. Terraform now directs you to the agent pools page and presents a notification when you delete an agent pool that has the **Grant access to specific workspaces** option selected with no workspaces. +1. The VCS 'File Limit Reached' message provides additional context on the VCS provider limit encountered by Terraform. +1. Dynamic credentials no longer issue invalid JWTs after the OIDC key is rotated more than nine times. +1. Terraform now waits to parse the run logs before rendering the change summary after a `plan` or `apply` operation. This prevents change summaries from flickering between no changes and the actual summary for very large changes. +1. Invalid time display will no longer appear before a health assessment has run. +1. Workspaces ending in `-` or `_` are now able to successfully execute `plan` and `apply` operations in a Kubernetes runtime environment. +1. When creating teams using an organization authentication token, the created team's visibility will now default to secret. A bug had prevented such teams from being secret, by default and by update. + +## Security + +1. The version of Ruby used has been upgraded to 3.1.5. +1. Email notifications are now sent when your session or your user token are used to create new API tokens. This provides additional security to your account. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. Updated components included `hashicorp/go-getter` (CVE-2024-6257) and `hashicorp/go-retryablehttp` (CVE-2024-6104). +1. Multiple database columns that contain user data, like two factor authentication private keys and email tokens, are now encrypted. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202408-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202408-1.mdx new file mode 100644 index 000000000..73f5231f1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202408-1.mdx @@ -0,0 +1,56 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202408-1 (781) release. +--- + +# Terraform Enterprise v202408-1 (781) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:c8421018a1f5cdb42fd14c9716e440ed9a1148c5f3216fc1285451eb55f3ac26` + +## Known Issues +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations + +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `terraform-build-worker-plan-timeout` and `terraform-build-worker-apply-timeout` attributes in the admin organization and general settings API have been deprecated and will be removed in a future release of Terraform Enterprise. Use the new `plan-timeout` and `apply-timeout` attributes instead. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/flexible-deployments/) or contact your HashiCorp account representative. +1. The variables API endpoint, `/vars`, is deprecated and will be removed in a future release. All existing integrations with this API should transition to the [workspace variables API](/terraform/cloud-docs/api-docs/workspace-variables) `/workspaces/:workspace_id/vars`. +1. PostgreSQL v12 will reach end of life on November 12 2024 and will no longer be supported in Terraform Enterprise after that date. Please refer to [PostgreSQL Requirements for Terraform Enterprise](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/postgres-requirements) for a complete list of supported versions. + +## Features +1. You can now specify a human-readable name and a URL for workspaces created using the no-code workspace API. +2. You can now specify an execution mode when creating no-code workspaces using the API. The API supports `agent` and `remote` execution modes. +3. Owners and users with the ability to "Manage Teams" are now able to enable and disable management of team tokens for members of that team. +4. You can now deploy Terraform Enterprise to Nomad. For more information, refer to the [requirements documentation](/terraform/enterprise/flexible-deployments/install/nomad/requirements) along with the [installation instructions](/terraform/enterprise/flexible-deployments/install/nomad/install). + +## Improvements +1. The `locked-reason` attribute for workspaces now appears in API response bodies and in the UI. +1. You can now set the agent job ID for Nomad-based deployments. +1. You can now specify default values for dynamic provider credentials configuration variables. This allows you to reduce duplication and define fewer variables when specifying multiple dynamic credentials configurations of the same provider type. +1. We have improved the performance of the UI for applying a variable set to a workspace. As a result, the drop-down loads faster when an organization contains a large number of variable sets. +1. Fluentbit buffer chunk size and buffer max size are now configurable through environment variables (`TFE_FLUENTBIT_BUFFERCHUNKSIZE`, `TFE_FLUENTBIT_BUFFERMAXSIZE` respectively). + +## Bug Fixes + +1. The Run tasks `Last updated` timestamp now shows the correct value. +1. Terraform Enterprise runs in a Kubernetes runtime using the default tfc-agent image will now properly inherit the CA certificate bundle content from the Terraform Enterprise Flexible Deployment Options image. +1. The `tfe-admin node-drain` and `tfectl node drain` commands now block until the node is fully drained. +1. Archivist log levels are now changed back to debug from info. +1. Resolved a bug where Nginx access logs would not be captured in support bundles or forwarded by fluentbit. + +## Security + +1. Update `rexml` to address CVE and handle parse exceptions in SAML XML configurations. +1. [All blob uploads, including configuration versions, states, and other objects, are now encrypted using AES-GCM. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-1.mdx new file mode 100644 index 000000000..d380f8ffd --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-1.mdx @@ -0,0 +1,50 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202409-1 (787) release. +--- + +# Terraform Enterprise v202409-1 (787) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:83f2c31cfda5705f87c03ec8c3833b2deb97c1f1a90fef0ed3fc941480cd99e3` + + +## Known Issues +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations + +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `terraform-build-worker-plan-timeout` and `terraform-build-worker-apply-timeout` attributes in the admin organization and general settings API have been deprecated and will be removed in a future release of Terraform Enterprise. Use the new `plan-timeout` and `apply-timeout` attributes instead. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/flexible-deployments/) or contact your HashiCorp account representative. +1. The variables API endpoint, `/vars`, is deprecated and will be removed in a future release. All existing integrations with this API should transition to the [workspace variables API](/terraform/cloud-docs/api-docs/workspace-variables) `/workspaces/:workspace_id/vars`. +1. PostgreSQL v12 will reach end of life on November 12 2024 and will no longer be supported in Terraform Enterprise after that date. Please refer to [PostgreSQL Requirements for Terraform Enterprise](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/postgres-requirements) for a complete list of supported versions. + + +## Improvements + +1. A run task's associated workspaces are now paginated on the page where you edit run tasks, reducing load times for run tasks associated with many workspaces. +1. Users with VCS workspaces that contain README files may see improved response times during workspace updates. +1. New `tfectl` commands have been added to retrive the application version, `tfectl app version`, and the last completed database migrtion, `tfectl db last-applied-migration`. + + +## Bug Fixes + +1. You can now delete organizations that contain on-demand policy evaluations. +1. Previously single resource instance created with terraform `count` statement or `for-each` in HCP could not be replaced because the state-parser did not parse the index_key. Single resource instances can now be replaced. +1. Workspace Notifications have been updated to work with [workflows in Microsoft Teams](https://devblogs.microsoft.com/microsoft365dev/retirement-of-office-365-connectors-within-microsoft-teams/). + + +## Security + +1. The `ruby-saml` gem has been updated to v1.17.0 to address [CVE-2024-45409](https://github.com/advisories/GHSA-jw9c-mfg7-9rx2). Analysis of Terraform Enterprise specific exposure to this issue is currently in progress and a HashiCorp security bulletin will be published if determined appropriate. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-2.mdx new file mode 100644 index 000000000..23c021f5f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-2.mdx @@ -0,0 +1,53 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202409-2 (789) release. +--- + +# Terraform Enterprise v202409-2 (789) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:0be28e68ff83dcafe379aa955ce9065a3303f0fa4107e8758d9cf852fbaf98e1` + +## Changes Since v202409-1 +1. The `tfectl node drain` now properly finishes the node draining process. + + +## Known Issues +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations + +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `terraform-build-worker-plan-timeout` and `terraform-build-worker-apply-timeout` attributes in the admin organization and general settings API have been deprecated and will be removed in a future release of Terraform Enterprise. Use the new `plan-timeout` and `apply-timeout` attributes instead. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/flexible-deployments/) or contact your HashiCorp account representative. +1. The variables API endpoint, `/vars`, is deprecated and will be removed in a future release. All existing integrations with this API should transition to the [workspace variables API](/terraform/cloud-docs/api-docs/workspace-variables) `/workspaces/:workspace_id/vars`. +1. PostgreSQL v12 will reach end of life on November 12 2024 and will no longer be supported in Terraform Enterprise after that date. Please refer to [PostgreSQL Requirements for Terraform Enterprise](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/postgres-requirements) for a complete list of supported versions. + + +## Improvements + +1. A run task's associated workspaces are now paginated on the page where you edit run tasks, reducing load times for run tasks associated with many workspaces. +1. Users with VCS workspaces that contain README files may see improved response times during workspace updates. +1. New `tfectl` commands have been added to retrive the application version, `tfectl app version`, and the last completed database migrtion, `tfectl db last-applied-migration`. + + +## Bug Fixes + +1. You can now delete organizations that contain on-demand policy evaluations. +1. Previously single resource instance created with terraform `count` statement or `for-each` in HCP could not be replaced because the state-parser did not parse the index_key. Single resource instances can now be replaced. +1. Workspace Notifications have been updated to work with [workflows in Microsoft Teams](https://devblogs.microsoft.com/microsoft365dev/retirement-of-office-365-connectors-within-microsoft-teams/). + + +## Security + +1. The `ruby-saml` gem has been updated to v1.17.0 to address [CVE-2024-45409](https://github.com/advisories/GHSA-jw9c-mfg7-9rx2). Analysis of Terraform Enterprise specific exposure to this issue is currently in progress and a HashiCorp security bulletin will be published if determined appropriate. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-3.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-3.mdx new file mode 100644 index 000000000..513fd9106 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202409-3.mdx @@ -0,0 +1,54 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202409-3 (791) release. +--- + +# Terraform Enterprise v202409-3 (791) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:c1297dfe64e97c32693328ec756b3023690b0b6b347a345da1778fc97c55fd32` + +## Changes Since v202409-2 +1. The `tfectl app config --format docker` compose configuration generation has been enhanced to heighten clarity around generated values and to correct theformatting of some environment variables. + +## Known Issues +1. [Updated September 30, 2024] Some deployments are experiencing memory growth issues on v202401-1 or higher, sometimes resulting in out of memory errors that require a restart to resolve. This issue is currently being investigated. It is strongly recommended that you test in a non-production environment before deploying v202401-1 or higher in production, and monitor memory for unexpected growth. This message will be updated when a fix is available in a published release. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations + +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `terraform-build-worker-plan-timeout` and `terraform-build-worker-apply-timeout` attributes in the admin organization and general settings API have been deprecated and will be removed in a future release of Terraform Enterprise. Use the new `plan-timeout` and `apply-timeout` attributes instead. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/flexible-deployments/) or contact your HashiCorp account representative. +1. The variables API endpoint, `/vars`, is deprecated and will be removed in a future release. All existing integrations with this API should transition to the [workspace variables API](/terraform/cloud-docs/api-docs/workspace-variables) `/workspaces/:workspace_id/vars`. +1. PostgreSQL v12 will reach end of life on November 12 2024 and will no longer be supported in Terraform Enterprise after that date. Please refer to [PostgreSQL Requirements for Terraform Enterprise](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/postgres-requirements) for a complete list of supported versions. + + +## Improvements + +1. A run task's associated workspaces are now paginated on the page where you edit run tasks, reducing load times for run tasks associated with many workspaces. +1. Users with VCS workspaces that contain README files may see improved response times during workspace updates. +1. New `tfectl` commands have been added to retrive the application version, `tfectl app version`, and the last completed database migrtion, `tfectl db last-applied-migration`. +1. The `tfectl app config --format docker` compose configuration generation has been enhanced to heighten clarity around generated values and to correct theformatting of some environment variables. + + + +## Bug Fixes + +1. You can now delete organizations that contain on-demand policy evaluations. +1. Previously single resource instance created with terraform `count` statement or `for-each` in HCP could not be replaced because the state-parser did not parse the index_key. Single resource instances can now be replaced. +1. Workspace Notifications have been updated to work with [workflows in Microsoft Teams](https://devblogs.microsoft.com/microsoft365dev/retirement-of-office-365-connectors-within-microsoft-teams/). + + +## Security + +1. The `ruby-saml` gem has been updated to v1.17.0 to address [CVE-2024-45409](https://github.com/advisories/GHSA-jw9c-mfg7-9rx2). Analysis of Terraform Enterprise specific exposure to this issue is currently in progress and a HashiCorp security bulletin will be published if determined appropriate. +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202410-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202410-1.mdx new file mode 100644 index 000000000..be112c6c2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202410-1.mdx @@ -0,0 +1,61 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202410-1 (798) release. +--- + +# Terraform Enterprise v202410-1 (798) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:b27c789bf92e1ee835a5fba9eba26705d71783df0eb73fbd08275ad761fbcbaa` + +# Terraform Enterprise v202410-1 + +## Deprecations + +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `terraform-build-worker-plan-timeout` and `terraform-build-worker-apply-timeout` attributes in the admin organization and general settings API have been deprecated and will be removed in a future release of Terraform Enterprise. Use the new `plan-timeout` and `apply-timeout` attributes instead. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, refer to [Terraform Enterprise deployment overview](/terraform/enterprise/deploy/) or contact your HashiCorp account representative. +1. The variables API endpoint, `/vars`, is deprecated and will be removed in a future release. All existing integrations with this API should transition to the [workspace variables API](/terraform/cloud-docs/api-docs/workspace-variables) `/workspaces/:workspace_id/vars`. +1. PostgreSQL v12 will reach end of life on November 12 2024 and will no longer be supported in Terraform Enterprise after that date. Refer to the requirements for [connecting a PostgreSQL ddatabase](/terraform/enterprise/deploy/configuration/storage/connect-database/postgres) for a complete list of supported versions. + +## Known Issues +1. [Updated October 28, 2024] A minor issue with Azure Kubernetes Service (AKS) workload identity authentication may prevent Terraform Enterprise from using the service consistently. To work around this issue, you must set `TFE_OBJECT_STORAGE_AZURE_ACCOUNT_KEY` in your `overrides.yaml` file to a non empty string. You must also set the `TFE_OBJECT_STORAGE_AZURE_USE_MSI` setting to ` false`: +```yaml + TFE_OBJECT_STORAGE_AZURE_ACCOUNT_KEY: a25vd25faXNzdWUK # Set to any non empty string. + TFE_OBJECT_STORAGE_AZURE_USE_MSI: false +``` +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Features + +1. Extends Azure's object storage configuration with workload identity fields by providing workload identity credentials authentication for the Azure backend. +1. TFE now supports AKS workload identity authentication and authorization. + +## Improvements +1. You can now use a SHA3 certificate for SAML signing validation. +2. Teams with admin access on the default project no longer need to specify a project ID when creating a new workspace via the API. If a `project` relationship is not specified in the request, the workspace will be created in the default project as long as the caller has appropriate permission. +3. A small but constant memory leak has been discovered in the API serialization layer and fixed, which should reduce the overall memory consumption of Puma processes over time. + +## Bug Fixes + +1. Fixed a bug where some variable sets weren't visible in the `projects/:project_id/varsets` API endpoint for projects that contain no workspaces. +2. Fixed a bug where attempted eager loading of a user's teams negatively affected performance. +3. When using `tfectl app config --format docker` to generate Docker compose configurations, the output has been enhanced to heighten clarity around generated values and formatting has been corrected of some environment variables. +4. Fixed unhandled exceptions when malformed filter parameters are used in /api/v2 endpoints. +5. Workspaces API unlock action will now return a 400 status instead of 503 when the latest state version is still pending, but only for Terraform CLI 1.10+ clients. +6. Users had reported the workspace-variables page returning 404/429 responses and/or rate limiting errors when the workspace is scoped to many projects/variables. This bug has been resolved and the performance of that page has improved. +1. Services no longer fail to read the CA bundle when PostgreSQL settings are configured to either `verify-ca` or `verify-full` +1. Fixes a known issue with the execution of tfectl node drain, where the task worker would not receive a signal from the command, and the node drain would not work. + +## Security + +2. We have resolved a vulnerability in which users were able to copy their session cookie from the browser and continue to use it with the API, even after logging out, when API rate limiting was disabled in their admin settings. Terraform Enterprise always requires the cookie session to be active when making an API request authenticated with a cookie. +2. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202411-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202411-1.mdx new file mode 100644 index 000000000..04d56b128 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202411-1.mdx @@ -0,0 +1,55 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202411-1 (804) release. +--- + +# Terraform Enterprise v202411-1 (804) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:a6bca2bcd65866a519b2bf6380b070a119bfd0176b8793ec301da7d3ba2eca79` + +# Terraform Enterprise v202411-1 + +## Known Issues +1. [Updated December 16, 2024] Starting in v202411-1, some Sentinel executions passed when they should have failed. This issue is now resolved in v202411-2. +2. [Updated November 25, 2024] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `terraform-build-worker-plan-timeout` and `terraform-build-worker-apply-timeout` attributes in the admin organization and general settings API have been deprecated and will be removed in a future release of Terraform Enterprise. Use the new `plan-timeout` and `apply-timeout` attributes instead. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/flexible-deployments/) or contact your HashiCorp account representative. +1. The variables API endpoint, `/vars`, is deprecated and will be removed in a future release. All existing integrations with this API should transition to the [workspace variables API](/terraform/cloud-docs/api-docs/workspace-variables) `/workspaces/:workspace_id/vars`. +1. PostgreSQL v12 will reach end of life on November 12, 2024 and will no longer be supported in Terraform Enterprise after that date. Please refer to [PostgreSQL Requirements for Terraform Enterprise](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/postgres-requirements) for a complete list of supported versions. + + +## Features +1. Support [upload part size and upload concurrency for S3 connections](/terraform/enterprise/deploy/reference/configuration#s3-compatible-storage). This is not supported on the Replicated deployment option. +1. Redis Enterprise is now supported when using two, non-clustered (single-shard) databases. More information can be found on the [Redis data page](/terraform/enterprise/deploy/configuration/storage/connect-redis#redis-enterprise). + + +## Improvements +1. Listing Policy Evaluations and Outcomes should now be faster in the Run details page. +1. Users may enable the **Automatically cancel speculative plans for outdated commits** option in the organization's settings page. +1. The introduction of the `logwatch` utility improves how Terraform Enterprise coalesces log files from individual services. Logs will not be properly captured starting when the container is up and will clearly indicate when the application has successfully started. + + +## Bug Fixes +1. A memory leak has been fixed which will dramatically reduce memory consumption over time, reducing the need for frequent restarts due to out of memory errors. +1. You can now configure Azure storage with workload identity. Previously a non-empty account key was required although not used. +1. A module's address in the Private Registry is now completely case-insensitive. Previously some differences in capitalization could return different lists of available versions. +1. Corrected a rare concurrency error that would sometimes caused Agents and Agent Jobs requests to fail. +1. When a Run terminates before the run logs are written, the UI will now display a message indicating that no run logs are available instead of 'undefined'. +1. Resolves a bug where restarting the `terraform-enterprise` process could result in some template files being incorrectly written, resulting in failures from upstream services. +1. HA Postgres failovers will no longer cause incorrect Vault token behavior in the Atlas process. +1. Terraform Enterprise will no longer crash as a result of failed Redis connectivity. + +## Security +1. Container and binary updates address reported vulnerabilities (CVEs) in underlying base images, packages, and dependencies. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202411-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202411-2.mdx new file mode 100644 index 000000000..1d259cf55 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2024/v202411-2.mdx @@ -0,0 +1,58 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202411-2 (805) release. +--- + +# Terraform Enterprise v202411-2 (805) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:53667758b2bd71e905a4f6b194be1d4c4bffa467ec85b6b5ae945d9fcec030a7` + +# Terraform Enterprise v202411-2 + +## Changes Since v202411-1 +1. An issue has been uncovered with Sentinel execution that began in November 2024 (v202411-1) release causing runs to pass, when they should have failed. This issue is now resolved. + +## Known Issues +1. Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations +1. [Updated January 21, 2025] Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. + The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, + only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product + improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but + bug and security fixes backports will not be available after March. +1. The `terraform-build-worker-plan-timeout` and `terraform-build-worker-apply-timeout` attributes in the admin organization and general settings API have been deprecated and will be removed in a future release of Terraform Enterprise. Use the new `plan-timeout` and `apply-timeout` attributes instead. +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in November 2024. HashiCorp will support this release until April 1, 2026. + + To ensure you continue to receive the latest features and fixes, including security updates, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/flexible-deployments/) or contact your HashiCorp account representative. +1. The variables API endpoint, `/vars`, is deprecated and will be removed in a future release. All existing integrations with this API should transition to the [workspace variables API](/terraform/cloud-docs/api-docs/workspace-variables) `/workspaces/:workspace_id/vars`. +1. PostgreSQL v12 will reach end of life on November 12, 2024 and will no longer be supported in Terraform Enterprise after that date. Please refer to [PostgreSQL Requirements for Terraform Enterprise](/terraform/enterprise/flexible-deployments/install/requirements/data-storage/postgres-requirements) for a complete list of supported versions. + + +## Features +1. Support upload part size and upload concurrency for S3 connections. This is not supported on the Replicated deployment option. +1. Redis Enterprise is now supported when using two, non-clustered (single-shard) databases. More information can be found on the [Redis data page](/terraform/enterprise/deploy/configuration/storage/connect-redis#redis-enterprise). + + +## Improvements + +1. Listing Policy Evaluations and Outcomes should now be faster in the Run details page. +1. Users may enable the **Automatically cancel speculative plans for outdated commits** option in the organization's settings page. +1. The introduction of the `logwatch` utility improves how TFE coalesces log files from individual services. + + +## Bug Fixes + +1. A memory leak has been fixed which will dramatically reduce memory consumption over time, reducing the need for frequent restarts due to out of memory errors. +1. You can now configure Azure storage with workload identity. Previously a non-empty account key was required although not used. +1. A module's address in the Private Registry is now completely case-insensitive. Previously some differences in capitalization could return different lists of available versions. +1. Corrected a rare concurrency error that would sometimes caused Agents and Agent Jobs requests to fail. +1. When a Run terminates before the run logs are written, the UI will now display a message indicating that no run logs are available instead of 'undefined'. +1. Resolves a bug where restarting the `terraform-enterprise` process could result in some template files being incorrectly written, resulting in failures from upstream services. +1. HA Postgres failovers will no longer cause incorrect Vault token behavior in the Atlas process +1. Terraform Enterprise will no longer crash as a result of failed Redis connectivity. + +## Security diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/index.mdx new file mode 100644 index 000000000..ddf40fd1f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/index.mdx @@ -0,0 +1,89 @@ +--- +page_title: 2025 Releases - Terraform Enterprise +description: The 2025 Terraform Enterprise releases. +--- + +# Terraform Enterprise Releases - 2025 + +Terraform Enterprise releases from 2025 are listed in the table below. + + + + + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively in a Kubernetes environment. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | OpenShift Enabled | Linked
Terraform CLI\** | Sentinel | Tested Kubernetes Versions (EKS, AKS, GKE) | Helm Chart Version | +| ----------------- | --- |------------------------------------------------------------------- | --------------------------------------------------------------------------- | ------------------------------ | ------------------ | +| [v202504-1](/terraform/enterprise/releases/2025/v202504-1) | *yes* | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [1.32](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.32](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.6.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.6.1) | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | *yes* | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [1.32](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.6.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.6.0) | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | *yes* | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [1.32](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.5.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.5.0) | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | *yes* | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [1.32](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.5.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.5.0) | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | *yes* | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [1.31](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.31](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.4.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.4.0) | + + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Docker. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | Linked
Terraform CLI\** | Sentinel | Recommended Docker Compose version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- | +| [v202504-1](/terraform/enterprise/releases/2025/v202504-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | + + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Podman. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | Linked
Terraform CLI\** | Sentinel | Tested Podman version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- | +| [v202504-1](/terraform/enterprise/releases/2025/v202504-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Nomad. [Learn more about flexible deployment options](/terraform/enterprise/flexible-deployments/). + +| Version | Linked
Terraform CLI\** | Sentinel | Tested Nomad versions | Min supported version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | --------------------------- | --------------------- | +| [v202504-1](/terraform/enterprise/releases/2025/v202504-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | 1.7 | 1.5 | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | 1.7 | 1.5 | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | 1.7 | 1.5 | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | 1.7 | 1.5 | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | 1.7 | 1.5 | + +
+ + +Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. The final Replicated release of Terraform Enterprise will be in **March 2025**. HashiCorp will support this release until April 1, 2026. + +To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by **November 2024**. For more information, check out [Flexible Deployment Options](/terraform/enterprise/deploy) or contact your HashiCorp account representative. + +Below is a list of the most recent Terraform Enterprise releases for the replicated deployment method. [Learn more about Replicated](/terraform/enterprise/deploy/replicated). + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI\** | Sentinel | +| ------------------------------------------------------------ | ---------------- | -------------------------------------------------------------------- | ------------------------------------------------------------------- | -------------------------------------------------------------------------------------- | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | 811 | [2.56.7](https://release-notes.replicated.com/release-notes/2.56.7/) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | 810 | [2.56.6](https://release-notes.replicated.com/release-notes/2.56.6/) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | 808 | [2.56.6](https://release-notes.replicated.com/release-notes/2.56.6/) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | 806 | [2.56.6](https://release-notes.replicated.com/release-notes/2.56.6/) | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | + + +
+
+ +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +\** The release package contains this version of the Terraform CLI, but you can install older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). + +\+ This release is unavailable. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202501-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202501-1.mdx new file mode 100644 index 000000000..1e2a68bf0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202501-1.mdx @@ -0,0 +1,50 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202501-1 (806) release. +--- + +# Terraform Enterprise v202501-1 (806) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:53a98c93d4f5e6655b439569d7fce717521e4e5655e3cf4ee107d0536fb47f0d` + +## Known Issues +1. Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Deprecations + +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. +The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, +only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product +improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but +bug and security fixes backports will not be available after March. +2. Redis 6.0 has reached end of life. Terraform Enterprise will stop supporting Redis 6.0 in April 2025. Note that this only applies +to Active-Active deployment models; Terraform Enterprise instances with external services on mounted disk deployment modes use an +internal Redis instance that is automatically updated as part of the Terraform Enterprise release process. + +## Features + +1. You can now generate dynamic provider credentials for AWS and GCP using HCP Vault Secrets-backed dynamic provider credentials. + +## Improvements + +1. If Terraform Enterprise's underlying infrastructure fails and runs appear stuck in the queued state, Terraform Enterprise identifies and updates those runs to an errored state. +2. Terraform Enterprise now includes run metadata in the streaming output logs of the `task-worker` service, such as the run ID, workload type, and organization and workspace names. This improves observability when examining logs for a specific run. +3. Terraform Enterprise now returns a specific error when it rejects streaming log uploads because of a lack of space in the cache. This change reduces network and CPU overhead for long-running jobs with large output. +4. You can now use parameters for managed policies. +5. Update Sentinel to 0.29 to stay in line with latest release. + +## Bug Fixes + +1. Resolved a bug where a no-op background migration could be stuck in an infinite loop, causing background migrations not to start. +2. Fixed an issue where certain Azure VM SKU/region combinations would cause cost estimation to hang indefinitely. +3. Fixed an issue with Azure DevOps Services & Server's new token format, causing validation errors when saving new OAuth Clients. +4. Fixes log streaming not automatically refreshing when using the console workspace UI setting. +5. Run tokens now last as long as the configured timeout for the operation they apply to, helping resolve errors where plans appear to succeed but the run fails due to token expiration. For example, if the plan timeout for an organization is 3 hours, the run token used to authenticate the plan will last longer than 3 hours. +6. Fixed the bug where invalid workspaces could cause the backfill migration to run forever. + +## Security + +1. If the IdP certificate is expired, SAML login fails with the following message: "IdP x509 certificate expired". diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202502-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202502-1.mdx new file mode 100644 index 000000000..9a6f69197 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202502-1.mdx @@ -0,0 +1,58 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202502-1 (808) release. +--- + +# Terraform Enterprise v202502-1 (808) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:c0b547bcbc29a561936dc6b088253eeb728329da0f3e4b6db5a374b59710c24f` + +## Known Issues + +1. [Updated February 27, 2025] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. +1. [Updated March 13, 2025] The `ruby-saml` gem prior to versions 1.12.4 and 1.18.0 includes the vulnerabilites described + in [CVE-2025-25291](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25291), + [CVE-2025-25292](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25292), and + [CVE-2025-25293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25293). A HashiCorp security bulletin will be + published with additional details. This issue is fixed in v202502-2. + +## Breaking Changes + +1. Terraform Enterprise no longer supports Postgres 12. + +## Deprecations + +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. +The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, +only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product +improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but +bug and security fixes backports will not be available after March. +2. As part of improving support for HA Postgres installations, the following configuration options are deprecated and will be removed in the May 2025 release: `TFE_DATABASE_RECONNECT_ENABLED`, `TFE_DATABASE_RECONNECT_MAX_RETRIES`, `TFE_DATABASE_RECONNECT_INTERVAL`, and `TFE_DATABASE_RECONNECT_TIMEOUT`. + +## Highlights +1. This release introduces project-owned variable sets. Users with project **Write**, **Maintain**, **Admin**, or custom variable set permissions can create and manage variable sets within a project without requiring organization-level permissions. +1. You can now set auto-destroy settings at a project level, letting you [automatically destroy workspace infrastructure in a project](/terraform/enterprise/projects/manage#automatically-destroy-inactive-workspaces) after a period of inactivity. + +## Features + +1. You can add a secondary hostname in Terraform Enterprise and specify whether to use the `primary` or `secondary` hostname for OIDC integration. +1. Module authors can now [deprecate module versions](/terraform/enterprise/registry/manage-module-versions) in the private registry. Deprecating a module version in your organization’s private registry adds warnings to the module's registry page. +1. You can now select **Enable Debugging mode** when enqueuing a run for quick access to trace level Terraform logging. + +## Improvements + +1. User input is now obfuscated while typing sensitive variables and notification tokens, enhancing security, particularly during screen sharing. +1. Terraform Enterprise will now automatically attempt to unseal the internal Vault server if it unexpectedly enters a sealed state. This change has no impact on Terraform Enterprise running with an external Vault server. +1. No-code workspaces now inform users of a pending user action, such as a policy override, and direct users to the run page for further action. + +## Bug Fixes + +1. Fixes an issue with cost estimation where unexpected AWS RDS instance types could cause the cost estimate to fail. +1. Fixes a permissions bug where teams with organization permission **View all workspaces** could not view workspace outputs. +1. Fixes variable set limitation issue and significantly improves performance for the workspaces-variable page. +1. Improves queries for fetching registry modules and associations to fix performance issue in *List Modules for Organization* API. + +## Security diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202502-2.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202502-2.mdx new file mode 100644 index 000000000..548a665de --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202502-2.mdx @@ -0,0 +1,61 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202502-2 (810) release. +--- + +# Terraform Enterprise v202502-2 (810) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:859f963f700667237a48fad9a1588b2d5fe3c512abe89eff1384fd99c9b4225c` + +## Changes Since v202502-1 + +1. The `ruby-saml` gem has been updated to v1.18.0, which addresses [CVE-2025-25291](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25291), + [CVE-2025-25292](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25292), and + [CVE-2025-25293](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-25293). A HashiCorp security bulletin will be + published with additional details. + +## Known Issues + +1. [Updated February 27, 2025] Terraform Enterprise does not support usernames provided with the `REDIS_USER ` variable to authenticate with an external Redis instance. + +## Breaking Changes + +1. Terraform Enterprise no longer supports Postgres 12. + +## Deprecations + +1. Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler option. +The final Replicated release of Terraform Enterprise will be in March 2025 (extended from November 2024). Effective December 2024, +only pre-existing workflows and capabilities will be tested for continued quality on Replicated releases. New features and product +improvements will not be validated on Replicated releases. HashiCorp Support will support this release until April 1, 2026, but +bug and security fixes backports will not be available after March. +2. As part of improving support for HA Postgres installations, the following configuration options are deprecated and will be removed in the May 2025 release: `TFE_DATABASE_RECONNECT_ENABLED`, `TFE_DATABASE_RECONNECT_MAX_RETRIES`, `TFE_DATABASE_RECONNECT_INTERVAL`, and `TFE_DATABASE_RECONNECT_TIMEOUT`. + +## Highlights +1. This release introduces project-owned variable sets. Users with project **Write**, **Maintain**, **Admin**, or custom variable set permissions can create and manage variable sets within a project without requiring organization-level permissions. +1. You can now set auto-destroy settings at a project level, letting you [automatically destroy workspace infrastructure in a project](/terraform/enterprise/projects/manage#automatically-destroy-inactive-workspaces) after a period of inactivity. + +## Features + +1. You can add a secondary hostname in Terraform Enterprise and specify whether to use the `primary` or `secondary` hostname for OIDC integration. +1. Module authors can now [deprecate module versions](/terraform/enterprise/registry/manage-module-versions) in the private registry. Deprecating a module version in your organization’s private registry adds warnings to the module's registry page. +1. You can now select **Enable Debugging mode** when enqueuing a run for quick access to trace level Terraform logging. + +## Improvements + +1. User input is now obfuscated while typing sensitive variables and notification tokens, enhancing security, particularly during screen sharing. +1. Terraform Enterprise will now automatically attempt to unseal the internal Vault server if it unexpectedly enters a sealed state. This change has no impact on Terraform Enterprise running with an external Vault server. +1. No-code workspaces now inform users of a pending user action, such as a policy override, and direct users to the run page for further action. + +## Bug Fixes + +1. Fixes an issue with cost estimation where unexpected AWS RDS instance types could cause the cost estimate to fail. +1. Fixes a permissions bug where teams with organization permission **View all workspaces** could not view workspace outputs. +1. Fixes variable set limitation issue and significantly improves performance for the workspaces-variable page. +1. Improves queries for fetching registry modules and associations to fix performance issue in *List Modules for Organization* API. + + +## Security diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202503-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202503-1.mdx new file mode 100644 index 000000000..8cdb3d213 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202503-1.mdx @@ -0,0 +1,40 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202503-1 (811) release. +--- + +# Terraform Enterprise v202503-1 (811) + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:65b3dee33d08a3124979ec75b02bffe44c8936014316299fd62875df0965229a` + +## Highlights + +1. You can now configure Terraform Enterprise to use Redis Sentinel. With Redis Sentinel you can achieve high availability and automatic failover. + +## Improvements + +1. Terraform Enterprise's internal tool `tfectl` no longer supports the command `db migration-status`. This command often produced confusing output regarding an internal implementation detail unrelated to proper database migrations. +1. Terraform Enterprise now creates a static number of Nginx worker processes, rather than relying on host CPU count. +1. Terraform Enterprise now displays more details when encountering errors during `tfectl` command execution. +1. The [`/variable-sets` API endpoint](https://developer.hashicorp.com/terraform/cloud-docs/api-docs/variable-sets) returns guidance for expected variable formats instead of a generic error message when the payload for variable definitions is formatted incorrectly. +1. Team API tokens have moved to the API Tokens page in Organization Settings. You can now manage your team and organization tokens in a single place. +1. Update the Policy runtime version selector, adding more options for automatic updating. +1. Update Sentinel to 0.30, bringing with it the latest changes to the Sentinel runtime. +1. Added OPA 1.0.0 and 1.1.0, bringing with it the latest fixes and features. Both 1.0.0 and 1.1.0 introduce breaking changes, please review your policy sets to ensure a suitable version is selected. + +## Bug Fixes + +1. Resolved a bug in which Terraform Enterprise running with limited database user permissions would fail to start. +1. Resolved a bug where incorrectly encoding a secret for the internally-packaged Vault server would cause Terraform Enterprise to fail to start. +1. Fixed a bug in which large support bundles would fail to upload to S3. +1. You can now use the `REDIS_USER` variable to authenticate with your external redis dependency. Previously, you could only use the default `redis` user to authenticate. +1. The UI now supports creating variables with the same name when their categories differ. Previously, variables with the same name but different categories were blocked via the UI, even though this was possible via the API. +1. Fixes a CLI error when terraform attempts to update workspace tags during a plan operation +1. Fix a UI issue when expanding run task result outcomes + +## Security + +1. Resolved a potential ZipSlip vulnerability in the `tfe-backup-restore` service. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202504-1.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202504-1.mdx new file mode 100644 index 000000000..f42fa666c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/2025/v202504-1.mdx @@ -0,0 +1,33 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + Learn about the changes, known issues, deprecations, highlights, features, improvements, bug fixes, and security fixes for the v202504-1 release. +--- + +# Terraform Enterprise v202504-1 + +Last required release: [v202406-1 (776)](/terraform/enterprise/releases/2024/v202406-1) + +Flexible Deployment Options `terraform-enterprise` container digest: amd64/linux `sha256:99244574d5a2094144af82635c8ba83fd67de9762d3537e8db0ad52c118ff455` + +## Highlights + +1. You can now authenticate to the PostgreSQL server using client certificates. +2. You can now use the new `tfectl admin usage-report` cli command to manually generate product usage reports. + +## Features + +1. You can add a secondary hostname in Terraform Enterprise and specify whether to use the `primary` or `secondary` hostname for VCS and Run Task integrations. +1. You can now tag Terraform Enterprise projects, effectively tagging all of their child workspaces. +1. You can now use a key-value tagging scheme for Terraform Enterprise workspaces and projects. +1. You can now use reserved tag keys to standardize the tag keys used across your organization, or to disable the use of workspace-level overrides when administering tags at the project level. + +## Improvements + +1. The search box in the private module registry previously lost focus with each typed character, making it difficult to search for modules. This issue has been fixed, ensuring that the search box retains focus while typing. + +## Bug Fixes + +1. Terraform Enterprise now rotates the Nginx access log kept in the ephemeral filesystem. +1. Fix API error when attempting to unlock workspace after uploading state version larger than 512MB. +1. Support use of custom tool version URLs with runs. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/releases/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/index.mdx new file mode 100644 index 000000000..c2a7bbd70 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/releases/index.mdx @@ -0,0 +1,160 @@ +--- +page_title: Releases - Terraform Enterprise +description: >- + We ship a new Terraform Enterprise release each month. Find a list of recent + releases and associated release notes. +--- + +# Terraform Enterprise Releases + +~> The next release `v202505-1` is scheduled for the week of May 19, 2025. + +We release a new Terraform Enterprise version each month. The tables below list the releases for each Terraform Enterprise deployment method from the current calendar year, as well as the last required release. You can find previous releases in the sidebar. + + + + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively in a Kubernetes environment. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | OpenShift Enabled | Linked
Terraform CLI\** | Sentinel | Tested Kubernetes Versions (EKS, AKS, GKE) | Helm Chart Version | +| ----------------- | --- |------------------------------------------------------------------- | --------------------------------------------------------------------------- | ------------------------------ | ------------------ | +| [v202504-1](/terraform/enterprise/releases/2025/v202504-1) | *yes* | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [1.32](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.32](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.6.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.6.1) | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | *yes* | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [1.32](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.6.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.6.0) | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | *yes* | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [1.32](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.5.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.5.0) | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | *yes* | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [1.32](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.32](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.5.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.5.0) | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | *yes* | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [1.31](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.31](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.4.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.4.0) | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | *yes* | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [1.31](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.30.5](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.4](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.4) | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | *yes* | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [1.31](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.31](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.30.5](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.4](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.4) | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | *yes* | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.30](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.3](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.3) | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | *yes* | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.2](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.2) | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | *yes* | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.2](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.2) | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | *yes* | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.2](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.2) | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | *yes* | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-1-may-22-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.1) | +| [v202407-1](/terraform/enterprise/releases/2024/v202407-1) | *yes* | [1.8.5](https://github.com/hashicorp/terraform/releases/tag/v1.8.5) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-1-may-22-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.0) | +| [v202406-1](/terraform/enterprise/releases/2024/v202406-1)* | *yes* | [1.8.3](https://github.com/hashicorp/terraform/releases/tag/v1.8.3) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-15-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.3.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.3.0) | +| [v202405-1](/terraform/enterprise/releases/2024/v202405-1) | *no* | [1.8.2](https://github.com/hashicorp/terraform/releases/tag/v1.8.2) | [0.25.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-25-1-apr-18-2024) | [1.29](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.29](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.29.1](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.2.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.2.0) | +| [v202404-2](/terraform/enterprise/releases/2024/v202404-2) | *no* | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.2.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.2.0) | +| [v202404-1](/terraform/enterprise/releases/2024/v202404-1)+ | *no* | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.2.0](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.2.0) | +| [v202402-2](/terraform/enterprise/releases/2024/v202402-2) | *no* | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202402-1](/terraform/enterprise/releases/2024/v202402-1) | *no* | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202401-2](/terraform/enterprise/releases/2024/v202401-2) | *no* | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | +| [v202401-1](/terraform/enterprise/releases/2024/v202401-1) | *no* | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | [1.28](https://docs.aws.amazon.com/eks/latest/userguide/kubernetes-versions.html), [1.28](https://learn.microsoft.com/en-us/azure/aks/supported-kubernetes-versions?tabs=azure-cli#aks-kubernetes-release-calendar), [1.28.3](https://cloud.google.com/kubernetes-engine/docs/release-notes) | [1.1.1](https://github.com/hashicorp/terraform-enterprise-helm/releases/tag/v1.1.1) | + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Docker. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | Linked
Terraform CLI\** | Sentinel | Recommended Docker Compose version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- | +| [v202504-1](/terraform/enterprise/releases/2025/v202504-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202407-1](/terraform/enterprise/releases/2024/v202407-1) | [1.8.5](https://github.com/hashicorp/terraform/releases/tag/v1.8.5) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202406-1](/terraform/enterprise/releases/2024/v202406-1)* | [1.8.3](https://github.com/hashicorp/terraform/releases/tag/v1.8.3) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-15-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202405-1](/terraform/enterprise/releases/2024/v202405-1) | [1.8.2](https://github.com/hashicorp/terraform/releases/tag/v1.8.2) | [0.25.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-25-1-apr-18-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202404-2](/terraform/enterprise/releases/2024/v202404-2) | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202404-1](/terraform/enterprise/releases/2024/v202404-1)+ | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202402-2](/terraform/enterprise/releases/2024/v202402-2) | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202402-1](/terraform/enterprise/releases/2024/v202402-1) | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202401-2](/terraform/enterprise/releases/2024/v202401-2) | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | [V2](https://docs.docker.com/compose/migrate/) | +| [v202401-1](/terraform/enterprise/releases/2024/v202401-1) | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | [V2](https://docs.docker.com/compose/migrate/) | + +
+ + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Podman. [Learn more about flexible deployment options](/terraform/enterprise/deploy/). + +| Version | Linked
Terraform CLI\** | Sentinel | Tested Podman version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | ---------------------------------- | +| [v202504-1](/terraform/enterprise/releases/2025/v202504-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [v5](https://github.com/containers/podman/releases/tag/v5.0.0) | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202407-1](/terraform/enterprise/releases/2024/v202407-1) | [1.8.5](https://github.com/hashicorp/terraform/releases/tag/v1.8.5) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202406-1](/terraform/enterprise/releases/2024/v202406-1)* | [1.8.3](https://github.com/hashicorp/terraform/releases/tag/v1.8.3) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-15-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202405-1](/terraform/enterprise/releases/2024/v202405-1) | [1.8.2](https://github.com/hashicorp/terraform/releases/tag/v1.8.2) | [0.25.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-25-1-apr-18-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202404-2](/terraform/enterprise/releases/2024/v202404-2) | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | +| [v202404-1](/terraform/enterprise/releases/2024/v202404-1)+ | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | [v4.3.0](https://podman.io/release/2022/10/22/podman-release-v4.3.0) | + +
+ + + +Below is a list of the most recent Terraform Enterprise Releases that can deploy Terraform Enterprise natively using Nomad. [Learn more about flexible deployment options](/terraform/enterprise/flexible-deployments/). + +| Version | Linked
Terraform CLI\** | Sentinel | Tested Nomad versions | Min supported version | +| ----------------- | ------------------------------------------------------------------- | --------------------------------------------------------------------------- | --------------------------- | --------------------- | +| [v202504-1](/terraform/enterprise/releases/2025/v202504-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | 1.7 | 1.5 | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | 1.7 | 1.5 | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | 1.7 | 1.5 | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | 1.7 | 1.5 | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | 1.7 | 1.5 | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | 1.5, 1.6, 1.7 | 1.5 | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | 1.5, 1.6, 1.7 | 1.5 | + +
+ + + +Terraform Enterprise now supports new deployment options and will end support for the Replicated Native Scheduler +option. The final Replicated release of Terraform Enterprise was published in **March 2025**. HashiCorp will support +this release until April 1, 2026. + +To ensure you continue to receive the latest features and fixes, please plan to migrate to a new deployment option by **November 2024**. For more information, refer to [Terraform Enterprise deployment overview](/terraform/enterprise/deploy) or contact your HashiCorp account representative. + +Below is a list of the most recent Terraform Enterprise releases for the replicated deployment method. [Learn more about Replicated](/terraform/enterprise/deploy/replicated). + +| Version | Release Sequence | Recommended
Replicated CLI | Linked
Terraform CLI\** | Sentinel | +| ------------------------------------------------------------ | ---------------- | -------------------------------------------------------------------- | ------------------------------------------------------------------- | -------------------------------------------------------------------------------------- | +| [v202503-1](/terraform/enterprise/releases/2025/v202503-1) | 811 | [2.56.7](https://release-notes.replicated.com/release-notes/2.56.7/) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.30.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-30-0-february-17-2025) | +| [v202502-2](/terraform/enterprise/releases/2025/v202502-2) | 810 | [2.56.6](https://release-notes.replicated.com/release-notes/2.56.6/) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | +| [v202502-1](/terraform/enterprise/releases/2025/v202502-1) | 808 | [2.56.6](https://release-notes.replicated.com/release-notes/2.56.6/) | [1.10.5](https://github.com/hashicorp/terraform/releases/tag/v1.10.5) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | +| [v202501-1](/terraform/enterprise/releases/2025/v202501-1) | 806 | [2.56.6](https://release-notes.replicated.com/release-notes/2.56.6/) | [1.10.1](https://github.com/hashicorp/terraform/releases/tag/v1.10.1) | [0.29.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-29-0-november-26-2024) | +| [v202411-2](/terraform/enterprise/releases/2024/v202411-2) | 805 | [2.56.5](https://release-notes.replicated.com/release-notes/2.56.5/) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | +| [v202411-1](/terraform/enterprise/releases/2024/v202411-1) | 804 | [2.56.5](https://release-notes.replicated.com/release-notes/2.56.5/) | [1.9.8](https://github.com/hashicorp/terraform/releases/tag/v1.9.8) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | +| [v202410-1](/terraform/enterprise/releases/2024/v202410-1) | 798 | [2.56.5](https://release-notes.replicated.com/release-notes/2.56.5/) | [1.9.6](https://github.com/hashicorp/terraform/releases/tag/v1.9.6) | [0.28.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-28-0-september-26-2024) | +| [v202409-3](/terraform/enterprise/releases/2024/v202409-3) | 791 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | +| [v202409-2](/terraform/enterprise/releases/2024/v202409-2) | 789 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | +| [v202409-1](/terraform/enterprise/releases/2024/v202409-1) | 787 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.9.5](https://github.com/hashicorp/terraform/releases/tag/v1.9.5) | [0.27.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-27-0-august-7-2024) | +| [v202408-1](/terraform/enterprise/releases/2024/v202408-1) | 781 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.9.2](https://github.com/hashicorp/terraform/releases/tag/v1.9.2) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | +| [v202407-1](/terraform/enterprise/releases/2024/v202407-1) | 779 | [2.56.4](https://release-notes.replicated.com/release-notes/2.56.4/) | [1.8.5](https://github.com/hashicorp/terraform/releases/tag/v1.8.5) | [0.26.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-22-2024) | +| [v202406-1](/terraform/enterprise/releases/2024/v202406-1)* | 776 | [2.56.3](https://release-notes.replicated.com/release-notes/2.56.3/) | [1.8.3](https://github.com/hashicorp/terraform/releases/tag/v1.8.3) | [0.26.0](https://developer.hashicorp.com/sentinel/docs/changelog#0-26-0-may-15-2024) | +| [v202405-1](/terraform/enterprise/releases/2024/v202405-1) | 772 | [2.56.3](https://release-notes.replicated.com/release-notes/2.56.3/) | [1.8.2](https://github.com/hashicorp/terraform/releases/tag/v1.8.2) | [0.25.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-25-1-apr-18-2024) | +| [v202404-2](/terraform/enterprise/releases/2024/v202404-2) | 764 | [2.56.3](https://release-notes.replicated.com/release-notes/2.56.3/) | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | +| [v202404-1](/terraform/enterprise/releases/2024/v202404-1)+ | 763 | [2.56.3](https://release-notes.replicated.com/release-notes/2.56.3/) | [1.8.1](https://github.com/hashicorp/terraform/releases/tag/v1.8.1) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | +| [v202402-2](/terraform/enterprise/releases/2024/v202402-2) | 760 | [2.56.2](https://release-notes.replicated.com/release-notes/2.56.2/) | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | +| [v202402-1](/terraform/enterprise/releases/2024/v202402-1) | 759 | [2.56.2](https://release-notes.replicated.com/release-notes/2.56.2/) | [1.7.4](https://github.com/hashicorp/terraform/releases/tag/v1.7.4) | [0.24.2](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-2-jan-31-2024) | +| [v202401-2](/terraform/enterprise/releases/2024/v202401-2) | 757 | [2.56.2](https://release-notes.replicated.com/release-notes/2.56.2/) | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | +| [v202401-1](/terraform/enterprise/releases/2024/v202401-1) | 751 | [2.56.2](https://release-notes.replicated.com/release-notes/2.56.2/) | [1.7.1](https://github.com/hashicorp/terraform/releases/tag/v1.7.1) | [0.23.1](https://developer.hashicorp.com/sentinel/docs/changelog#0-24-1-jan-19-2024) | + +
+
+ +\* Denotes a required release. All online upgrades will automatically install this version, but airgap customers must upgrade to this version before proceeding to later releases. + +\** The release package contains a link to this version of the Terraform CLI. A linked version still requires Terraform Enterprise to download the Terraform CLI on each run. You can link older and newer versions of the Terraform CLI as needed via the Admin [UI](/terraform/enterprise/application-administration/resources#managing-terraform-versions) or [API](/terraform/enterprise/api-docs/admin/terraform-versions). + +\+ This release is unavailable. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/api.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/api.mdx new file mode 100644 index 000000000..eaf923fce --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/api.mdx @@ -0,0 +1,197 @@ +--- +page_title: The API-driven run workflow in Terraform Enterprise +description: >- + Use Terraform Enterprise's API-driven run workflow to enable external tools to + upload Terraform configurations and trigger new runs. +source: terraform-docs-common +--- + +# The API-driven run workflow + +HCP Terraform has three workflows for managing Terraform runs. + +- The [UI/VCS-driven run workflow](/terraform/enterprise/run/ui), which is the primary mode of operation. +- The API-driven run workflow described below, which is more flexible but requires you to create some tooling. +- The [CLI-driven run workflow](/terraform/enterprise/run/cli), which uses Terraform's standard CLI tools to execute runs in HCP Terraform. + +## Summary + +In the API-driven workflow, workspaces are not directly associated with a VCS repo, and runs are not driven by webhooks on your VCS provider. + +Instead, one of your organization's other tools is in charge of deciding when configuration has changed and a run should occur. Usually this is something like a CI system, or something else capable of monitoring changes to your Terraform code and performing actions in response. + +Once your other tooling has decided a run should occur, it must make a series of calls to HCP Terraform's `runs` and `configuration-versions` APIs to upload configuration files and perform a run with them. For the exact series of API calls, see the [pushing a new configuration version](#pushing-a-new-configuration-version) section. + +The most significant difference in this workflow is that HCP Terraform _does not_ fetch configuration files from version control. Instead, your own tooling must upload the configurations as a `.tar.gz` file. This allows you to work with configurations from unsupported version control systems, automatically generate Terraform configurations from some other source of data, or build a variety of other integrations. + +~> **Important:** The script below is provided to illustrate the run process, and is not intended for production use. If you want to drive HCP Terraform runs from the command line, please see the [CLI-driven run workflow](/terraform/enterprise/run/cli). + +## Pushing a New Configuration Version + +Pushing a new configuration to an existing workspace is a multi-step process. This section walks through each step in detail, using an example bash script to illustrate. + +You need queue plans permission to create new configuration versions for the workspace. Refer to the [permissions](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) documentation for more details. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### 1. Define Variables + +To perform an upload, a few user parameters must be set: + +- **path_to_content_directory** is the folder with the terraform configuration. There must be at least one `.tf` file in the root of this path. +- **organization** is the organization name (not ID) for your HCP Terraform organization. +- **workspace** is the workspace name (not ID) in the HCP Terraform organization. +- **$TOKEN** is the API Token used for [authenticating with the HCP Terraform API](/terraform/enterprise/api-docs#authentication). + +This script extracts the `path_to_content_directory`, `organization`, and `workspace` from command line arguments, and expects the `$TOKEN` as an environment variable. + +```bash +#!/bin/bash + +if [ -z "$1" ] || [ -z "$2" ]; then + echo "Usage: $0 /" + exit 0 +fi + +CONTENT_DIRECTORY="$1" +ORG_NAME="$(cut -d'/' -f1 <<<"$2")" +WORKSPACE_NAME="$(cut -d'/' -f2 <<<"$2")" +``` + +### 2. Create the File for Upload + +The [configuration version API](/terraform/enterprise/api-docs/configuration-versions) requires a `tar.gz` file to use the configuration version for a run, so you must package the directory containing the Terraform configuration into a `tar.gz` file. + +~> **Important:** The configuration directory must be the root of the tar file, with no intermediate directories. In other words, when the tar file is extracted the result must be paths like `./main.tf` rather than `./terraform-appserver/main.tf`. + +```bash +UPLOAD_FILE_NAME="./content-$(date +%s).tar.gz" +tar -zcvf "$UPLOAD_FILE_NAME" -C "$CONTENT_DIRECTORY" . +``` + +### 3. Look Up the Workspace ID + +The first step identified the organization name and the workspace name; however, the [configuration version API](/terraform/enterprise/api-docs/configuration-versions) expects the workspace ID. As such, the ID has to be looked up. If the workspace ID is already known, this step can be skipped. This step uses the [`jq` tool](https://stedolan.github.io/jq/) to parse the JSON output and extract the ID value into the `WORKSPACE_ID` variable. + +```bash +WORKSPACE_ID=($(curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/$ORG_NAME/workspaces/$WORKSPACE_NAME \ + | jq -r '.data.id')) +``` + +### 4. Create a New Configuration Version + +Before uploading the configuration files, you must create a `configuration-version` to associate uploaded content with the workspace. This API call performs two tasks: it creates the new configuration version and it extracts the upload URL to be used in the next step. + +```bash +echo '{"data":{"type":"configuration-versions"}}' > ./create_config_version.json + +UPLOAD_URL=($(curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @create_config_version.json \ + https://app.terraform.io/api/v2/workspaces/$WORKSPACE_ID/configuration-versions \ + | jq -r '.data.attributes."upload-url"')) +``` + +### 5. Upload the Configuration Content File + +Next, upload the configuration version `tar.gz` file to the upload URL extracted from the previous step. If a file is not uploaded, the configuration version will not be usable, since it will have no Terraform configuration files. + +HCP Terraform automatically creates a new run with a plan once the new file is uploaded. If the workspace is configured to auto-apply, it will also apply if the plan succeeds; otherwise, an apply can be triggered via the [Run Apply API](/terraform/enterprise/api-docs/run#apply). If the API token used for the upload lacks permission to apply runs for the workspace, the run can't be auto-applied. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +```bash +curl \ + --header "Content-Type: application/octet-stream" \ + --request PUT \ + --data-binary @"$UPLOAD_FILE_NAME" \ + $UPLOAD_URL +``` + +### 6. Delete Temporary Files + +In the previous steps a few files were created; they are no longer needed, so they should be deleted. + +```bash +rm "$UPLOAD_FILE_NAME" +rm ./create_config_version.json +``` + +### Complete Script + +Combine all of the code blocks into a single file, `./terraform-enterprise-push.sh` and give execution permission to create a combined bash script to perform all of the operations. + +```shell +chmod +x ./terraform-enterprise-push.sh +./terraform-enterprise-push.sh ./content my-organization/my-workspace +``` + +**Note**: This script does not have error handling, so for a more robust script consider adding error checking. + +**`./terraform-enterprise-push.sh`:** + +```bash +#!/bin/bash + +# Complete script for API-driven runs. + +# 1. Define Variables + +if [ -z "$1" ] || [ -z "$2" ]; then + echo "Usage: $0 /" + exit 0 +fi + +CONTENT_DIRECTORY="$1" +ORG_NAME="$(cut -d'/' -f1 <<<"$2")" +WORKSPACE_NAME="$(cut -d'/' -f2 <<<"$2")" + +# 2. Create the File for Upload + +UPLOAD_FILE_NAME="./content-$(date +%s).tar.gz" +tar -zcvf "$UPLOAD_FILE_NAME" -C "$CONTENT_DIRECTORY" . + +# 3. Look Up the Workspace ID + +WORKSPACE_ID=($(curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + https://app.terraform.io/api/v2/organizations/$ORG_NAME/workspaces/$WORKSPACE_NAME \ + | jq -r '.data.id')) + +# 4. Create a New Configuration Version + +echo '{"data":{"type":"configuration-versions"}}' > ./create_config_version.json + +UPLOAD_URL=($(curl \ + --header "Authorization: Bearer $TOKEN" \ + --header "Content-Type: application/vnd.api+json" \ + --request POST \ + --data @create_config_version.json \ + https://app.terraform.io/api/v2/workspaces/$WORKSPACE_ID/configuration-versions \ + | jq -r '.data.attributes."upload-url"')) + +# 5. Upload the Configuration Content File + +curl \ + --header "Content-Type: application/octet-stream" \ + --request PUT \ + --data-binary @"$UPLOAD_FILE_NAME" \ + $UPLOAD_URL + +# 6. Delete Temporary Files + +rm "$UPLOAD_FILE_NAME" +rm ./create_config_version.json +``` + +## Advanced Use Cases + +For advanced use cases refer to the [Terraform Enterprise Automation Script](https://github.com/hashicorp/terraform-guides/tree/master/operations/automation-script) repository for automating interactions with HCP Terraform, including the creation of a workspace, uploading code, setting variables, and triggering the `plan` and `apply` operations. + +In addition to uploading configurations and starting runs, you can use HCP Terraform's APIs to create and modify workspaces, edit variable values, and more. See the [API documentation](/terraform/enterprise/api-docs) for more details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/cli.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/cli.mdx new file mode 100644 index 000000000..87c74d475 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/cli.mdx @@ -0,0 +1,299 @@ +--- +page_title: The CLI-driven remote run workflow for Terraform Enterprise +description: >- + Configure the Terraform CLI to trigger remote runs in Terraform Enterprise + from your terminal. +source: terraform-docs-common +--- + +[private]: /terraform/enterprise/registry + +[speculative plan]: /terraform/enterprise/run/remote-operations#speculative-plans + +[tfe-provider]: https://registry.terraform.io/providers/hashicorp/tfe/latest/docs + +# The CLI-driven remote run workflow + +> **Hands-on:** Try the [Log in to HCP Terraform from the CLI](/terraform/tutorials/0-13/cloud-login) tutorial. + +HCP Terraform has three workflows for managing Terraform runs. + +- The [UI/VCS-driven run workflow](/terraform/enterprise/run/ui), which is the primary mode of operation. +- The [API-driven run workflow](/terraform/enterprise/run/api), which is more flexible but requires you to create some tooling. +- The CLI-driven run workflow described below, which uses Terraform's standard CLI tools to execute runs in HCP Terraform. + +## Summary + +The [CLI integration](/terraform/cli/cloud) brings HCP Terraform's collaboration features into the familiar Terraform CLI workflow. It offers the best of both worlds to developers who are already comfortable with using the Terraform CLI, and it can work with existing CI/CD pipelines. + +You can start runs with the standard `terraform plan` and `terraform apply` commands and then watch the progress of the run from your terminal. These runs execute remotely in HCP Terraform, use variables from the appropriate workspace, enforce any applicable [Sentinel or OPA policies](/terraform/enterprise/policy-enforcement), and can access HCP Terraform's [private registry][private] and remote state inputs. + +HCP Terraform offers a few types of CLI-driven runs, to support different stages of your workflow: + +- `terraform plan` starts a [speculative plan][] in an HCP Terraform workspace, using configuration files from a local directory. You can quickly check the results of edits (including compliance with Sentinel policies) without needing to copy sensitive variables to your local machine. + + Speculative plans work with all workspaces, and can co-exist with the [VCS-driven workflow](/terraform/enterprise/run/ui). + +- `terraform apply` starts a standard plan and apply in an HCP Terraform workspace, using configuration files from a local directory. + + Remote `terraform apply` is for workspaces without a linked VCS repository. It replaces the VCS-driven workflow with a more traditional CLI workflow. + +- `terraform plan -out ` and `terraform apply ` perform a two-part [saved plan run](/terraform/enterprise/run/modes-and-options/#saved-plans) in an HCP Terraform workspace, using configuration files from a local directory. The first command performs and saves the plan, and the second command applies it. You can use `terraform show ` to inspect a saved plan. + + Like remote `terraform apply`, remote saved plans are for workspaces without a linked VCS repository. + + Saved plans require at least Terraform CLI v1.6.0. + +To supplement these remote operations, you can also use the optional [Terraform Enterprise Provider][tfe-provider], which interacts with the HCP Terraform-supported resources. This provider is useful for editing variables and workspace settings through the Terraform CLI. + +## Configuration + +To enable the CLI-driven workflow, you must: + +1. Create an account or sign in to [HCP Terraform](https://app.terraform.io/). + +2. Run `terraform login` to authenticate with HCP Terraform. Alternatively, you can manually configure credentials in the CLI config file or through environment variables. Refer to [CLI Configuration](/terraform/cli/config/config-file#environment-variable-credentials) for details. + +3. Add the `cloud` block to your Terraform configuration. You can define its arguments directly in your configuration file or supply them through environment variables, which can be useful for [non-interactive workflows](#non-interactive-workflows). Refer to [Using HCP Terraform](/terraform/cli/cloud) for configuration details. + + The following example shows how to map CLI workspaces to HCP Terraform workspaces with a specific tag. + + terraform { + cloud { + organization = "my-org" + workspaces { + tags = ["networking"] + } + } + } + + -> **Note:** The `cloud` block is available in Terraform v1.1 and later. Previous versions can use the [`remote` backend](/terraform/language/settings/backends/remote) to configure the CLI workflow and migrate state. + +4. Run `terraform init`. + + $ terraform init + + Initializing HCP Terraform... + + Initializing provider plugins... + - Reusing previous version of hashicorp/random from the dependency lock file + - Using previously-installed hashicorp/random v3.0.1 + + HCP Terraform has been successfully initialized! + + You may now begin working with HCP Terraform. Try running "terraform plan" + to see any changes that are required for your infrastructure. + + If you ever set or change modules or Terraform Settings, + run "terraform init" again to reinitialize your working directory. + +### Implicit Workspace Creation + +If you configure the `cloud` block to use a workspace that doesn't yet exist in your organization, HCP Terraform will create a new workspace with that name when you run `terraform init`. The output of `terraform init` will inform you when this happens. + +Automatically created workspaces might not be immediately ready to use, so use HCP Terraform's UI to check a workspace's settings and data before performing any runs. In particular, note that: + +- No Terraform variables or environment variables are created by default, unless your organization has configured one or more [global variable sets](/terraform/enterprise/workspaces/variables#scope). HCP Terraform will use `*.auto.tfvars` files if they are present, but you will usually still need to set some workspace-specific variables. +- The execution mode defaults to "Remote," so that runs occur within HCP Terraform's infrastructure instead of on your workstation. +- New workspaces are not automatically connected to a VCS repository and do not have a working directory specified. +- A new workspace's Terraform version defaults to the most recent release of Terraform at the time the workspace was created. + +### Implicit Project Creation + +If you configure the [`workspaces` block](/terraform/cli/cloud/settings#workspaces) to use a [project](/terraform/cli/cloud/settings#project) that does not yet exist in your organization, HCP Terraform will attempt to create a new project with that name when you run `terraform init` and notify you in the command output. + +If you specify both the `project` argument and [`TF_CLOUD_PROJECT`](/terraform/cli/cloud/settings#tf_cloud_project) environment variable, the `project` argument takes precedence. + +## Variables in CLI-Driven Runs + +Remote runs in HCP Terraform use: + +- Run-specific variables set through the command line or in your local environment. Terraform can use shell environment variables prefixed with `TF_VAR_` as input variables for the run, but you must still set all required environment variables, like provider credentials, inside the workspace. +- Workspace-specific Terraform and environment variables set in the workspace. +- Any variable sets applied globally, on the project containing the workspace, or on the workspace itself. +- Terraform variables from any `*.auto.tfvars` files included in the configuration. + +Refer to [Variables](/terraform/enterprise/workspaces/variables) for more details about variable types, variable scopes, variable precedence, and how to set run-specific variables through the command line. + +## Remote Working Directories + +If you manage your Terraform configurations in self-contained repositories, the remote working directory always has the same content as the local working directory. + +If you use a combined repository and [specify a working directory on workspaces](/terraform/enterprise/workspaces/settings#terraform-working-directory), you can run Terraform from either the real working directory or from the root of the combined configuration directory. In both cases, Terraform will upload the entire combined configuration directory. + +## Excluding Files from Upload + +-> **Version note:** `.terraformignore` support was added in Terraform 0.12.11. + +CLI-driven runs upload an archive of your configuration directory +to HCP Terraform. If the directory contains files you want to exclude from upload, +you can do so by defining a [`.terraformignore` file in your configuration directory](/terraform/cli/cloud/settings). + +## Remote Speculative Plans + +You can run speculative plans in any workspace where you have [permission to queue plans](/terraform/enterprise/users-teams-organizations/permissions). Speculative plans use the configuration code from the local working directory, but will use variable values from the specified workspace. + +To run a [speculative plan][] on your configuration, use the `terraform plan` command. The plan will run in HCP Terraform, and the logs will stream back to the command line along with a URL to view the plan in the HCP Terraform UI. + + $ terraform plan + + Running plan in HCP Terraform. Output will stream here. Pressing Ctrl-C + will stop streaming the logs, but will not stop the plan running remotely. + + Preparing the remote plan... + + To view this run in a browser, visit: + https://app.terraform.io/app/hashicorp-learn/docs-workspace/runs/run-cfh2trDbvMU2Rkf1 + + Waiting for the plan to start... + + [...] + + Plan: 1 to add, 0 to change, 0 to destroy. + + Changes to Outputs: + + pet_name = (known after apply) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Remote Applies + +In workspaces that are not connected to a VCS repository, users with [permission to apply runs](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) can use the CLI to trigger remote applies. Remote applies use the configuration code from the local working directory, but use the variable values from the specified workspace. + +~> **Note:** You cannot run remote applies in workspaces that are linked to a VCS repository, since the repository serves as the workspace’s source of truth. To apply changes in a VCS-linked workspace, merge your changes to the designated branch. + +When you are ready to apply configuration changes, use the `terraform apply` command. HCP Terraform will plan your changes, and the command line will prompt you for approval before applying them. + + $ terraform apply + + Running apply in HCP Terraform. Output will stream here. Pressing Ctrl-C + will cancel the remote apply if it's still pending. If the apply started it + will stop streaming the logs, but will not stop the apply running remotely. + + Preparing the remote apply... + + To view this run in a browser, visit: + https://app.terraform.io/app/hashicorp-learn/docs-workspace/runs/run-Rcc12TkNW1PDa7GH + + Waiting for the plan to start... + + [...] + + Plan: 1 to add, 0 to change, 0 to destroy. + + Changes to Outputs: + + pet_name = (known after apply) + + Do you want to perform these actions in workspace "docs-workspace"? + Terraform will perform the actions described above. + Only 'yes' will be accepted to approve. + + Enter a value: yes + + [...] + + Apply complete! Resources: 1 added, 0 changed, 0 destroyed. + +### Non-Interactive Workflows + +> **Hands On:** Try the [Deploy Infrastructure with HCP Terraform and CircleCI](/terraform/tutorials/automation/circle-ci) tutorial. + +External systems cannot run the traditional apply workflow because Terraform requires console input from the user to approve plans. We recommend using the [API-driven Run Workflow](/terraform/enterprise/run/api) for non-interactive workflows when possible. + +If you prefer to use the CLI in a non-interactive environment, we recommend first running a [speculative plan](/terraform/enterprise/run/remote-operations#speculative-plans) to preview the changes Terraform will make to your infrastructure. Then, use one of the following approaches with the `-auto-approve` flag based on the [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) of your workspace. The [`-auto-approve`](/terraform/cli/commands/apply#auto-approve) flag skips prompting you to approve the plan. + +- **Local Execution:** Save the approved speculative plan and then run `terraform apply -auto-approve` with the saved plan. +- **Remote Execution:** HCP Terraform does not support uploading saved plans for remote execution, so we recommend running `terraform apply -auto-approve` immediately after approving the speculative plan to prevent the plan from becoming stale. + + !> **Warning:** Remote execution with non-interactive workflows requires auto-approved deployments. Minimize the risk of unpredictable infrastructure changes and configuration drift by making sure that no one can change your infrastructure outside of your automated build pipeline. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Remote Saved Plans + +-> **Version note:** Saved plans require at least Terraform CLI v1.6.0. + +In workspaces that support `terraform apply`, you also have the option of performing the plan and apply as separate steps, using the standard variations of the relevant Terraform commands: + +- `terraform plan -out ` performs and saves a plan. +- `terraform apply ` applies a previously saved plan. +- `terraform show ` (and `terraform show -json `) inspect a plan you previously saved. + +Saved plan runs are halfway between [speculative plans](#remote-speculative-plans) and standard [plan and apply runs](#remote-applies). They allow you to: + +- Perform cheap exploratory plans while retaining the option of applying a specific plan you are satisfied with. +- Perform other tasks in your terminal between the plan and apply stages. +- Perform the plan and apply operations on separate machines (as is common in continuous integration workflows). + +Saved plans become _stale_ once the state Terraform planned them against is no longer valid (usually due to someone applying a different run). In HCP Terraform, stale saved plan runs are automatically detected and discarded. When examining a remote saved plan, the `terraform show` command (without the `-json` option) informs you if a plan has been discarded or is otherwise unable to be applied. + +### File Contents and Permissions + +You can only apply remote saved plans in the same remote HCP Terraform workspace that performed the plan. Additionally, you can not apply locally executed saved plans in a remote workspace. + +In order to abide by HCP Terraform's permissions model, remote saved plans do not use the same local file format as locally executed saved plans. Instead, remote saved plans are a thin reference to a remote run, and the Terraform CLI relies on authenticated network requests to inspect and apply remote plans. This helps avoid the accidental exposure of credentials or other sensitive information. + +The `terraform show -json` command requires [workspace admin permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-admins) to inspect a remote saved plan; this is because the [machine-readable JSON plan format](/terraform/internals/json-format) contains unredacted sensitive information (alongside redaction hints for use by systems that consume the format). The human-readable version of `terraform show` only requires the read runs permission, because it uses pre-redacted information. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Policy Enforcement + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Policies are rules that HCP Terraform enforces on Terraform runs. You can use two policy-as-code frameworks to define fine-grained, logic-based policies: Sentinel and Open Policy Agent (OPA). + +If the specified workspace uses policies, HCP Terraform runs those policies against all speculative plans and remote applies in that workspace. Failed policies can pause or prevent an apply, depending on the enforcement level. Refer to [Policy Enforcement](/terraform/enterprise/policy-enforcement) for details. + +For Sentinel, the Terraform CLI prints policy results for CLI-driven runs. CLI support for policy results is not available for OPA. + +The following example shows Sentinel policy output in the terminal. + + $ terraform apply + + [...] + + Plan: 1 to add, 0 to change, 1 to destroy. + + ------------------------------------------------------------------------ + + Organization policy check: + + Sentinel Result: false + + Sentinel evaluated to false because one or more Sentinel policies evaluated + to false. This false was not due to an undefined value or runtime error. + + 1 policies evaluated. + ## Policy 1: my-policy.sentinel (soft-mandatory) + + Result: false + + FALSE - my-policy.sentinel:1:1 - Rule "main" + + Do you want to override the soft failed policy check? + Only 'override' will be accepted to override. + + Enter a value: override + +## Options for Plans and Applies + +[Run Modes and Options](/terraform/enterprise/run/modes-and-options) contains more details about the various options available for plans and applies when you use the CLI-driven workflow. + +## Networking/Connection Issues + +Sometimes during a CLI-driven run, errors relating to network connectivity issues arise. Examples of these kinds of errors include: + +- `Client.Timeout exceeded while awaiting headers` +- `context deadline exceeded` +- `TLS handshake timeout` + +Sometimes there are network problems beyond our control. If you have network errors, verify your network connection is operational. Then, check the following common configuration settings: + +- Determine if any firewall software on your system blocks the `terraform` command and explicitly approve it. +- Verify that you have a valid DNS server IP address. +- Remove any expired TLS certificates for your system. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/install-software.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/install-software.mdx new file mode 100644 index 000000000..31ff8d5b1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/install-software.mdx @@ -0,0 +1,111 @@ +--- +page_title: Install software in the HCP Terrafrom run environment +description: >- + Learn how to install Terraform providers, cloud CLIs, or configuration + management tools and software on Terraform Enterprise workers. +source: terraform-docs-common +--- + +# Install software in the run environment + +Terraform relies on provider plugins to manage resources. In most cases, Terraform can automatically download the required plugins, but there are cases where plugins must be managed explicitly. + +In rare cases, it might also be necessary to install extra software on the Terraform worker, such as a configuration management tool or cloud CLI. + +## Installing Terraform Providers + +The mechanics of provider installation changed in Terraform 0.13, thanks to the introduction of the [Terraform Registry][registry] for providers which allows custom and community providers to be installed via `terraform init`. Prior to Terraform 0.13, Terraform could only automatically install providers distributed by HashiCorp. + +### Terraform 0.13 and later + +#### Providers From the Terraform Registry + +The [Terraform Registry][registry] allows anyone to publish and distribute providers which can be automatically downloaded and installed via `terraform init`. + +Terraform Enterprise instances must be able to access `registry.terraform.io` to use providers from the public registry; otherwise, you can install providers using [the `terraform-bundle` tool][bundle]. + +[registry]: https://registry.terraform.io/browse/providers + +#### In-House Providers + +If you have a custom provider that you'd rather not publish in the public Terraform Registry, you have a few options: + +- Add the provider binary to the VCS repo (or manually-uploaded configuration version). Place the compiled `linux_amd64` version of the plugin at `terraform.d/plugins/////linux_amd64`, relative to the root of the directory. + + The source host and namespace will need to match the source given in the `required_providers` block within the configuration, but can otherwise be arbitrary identifiers. For instance, if your `required_providers` block looks like this: + + terraform { + required_providers { + custom = { + source = "my-host/my-namespace/custom" + version = "1.0.0" + } + } + } + + HCP Terraform will be able to use your compiled provider if you place it at `terraform.d/plugins/my-host/my-namespace/custom/1.0.0/linux_amd64/terraform-provider-custom`. + +- Use a privately-owned provider registry service which implements the [provider registry protocol](/terraform/internals/provider-registry-protocol) to distribute custom providers. Be sure to include the full [source address](/terraform/language/providers/requirements#source-addresses), including the hostname, when referencing providers. + +- **Terraform Enterprise only:** Use [the `terraform-bundle` tool][bundle] to add custom providers. + +-> **Note:** Using a [network mirror](/terraform/internals/provider-network-mirror-protocol) to host custom providers for installation is not currently supported in HCP Terraform, since the network mirror cannot be activated without a [`provider_installation`](/terraform/cli/config/config-file#explicit-installation-method-configuration) block in the CLI configuration file. + +### Terraform 0.12 and earlier + +#### Providers Distributed by HashiCorp + +HCP Terraform can automatically install providers distributed by HashiCorp. Terraform Enterprise instances can do this as well as long as they can access `releases.hashicorp.com`. + +If that isn't feasible due to security requirements, you can manually install providers. Use [the `terraform-bundle` tool][bundle] to build a custom version of Terraform that includes the necessary providers, and configure your workspaces to use that bundled version. + +[bundle]: https://github.com/hashicorp/terraform/tree/master/tools/terraform-bundle#installing-a-bundle-in-on-premises-terraform-enterprise + +#### Custom and Community Providers + +To use community providers or your own custom providers with Terraform versions prior to 0.13, you must install them yourself. + +There are two ways to accomplish this: + +- Add the provider binary to the VCS repo (or manually-uploaded configuration version) for any workspace that uses it. Place the compiled `linux_amd64` version of the plugin at `terraform.d/plugins/linux_amd64/` (as a relative path from the root of the working directory). The plugin name should follow the [naming scheme](/terraform/language/v1.1.x/configuration-0-11/providers#plugin-names-and-versions) and the plugin file must have read and execute permissions. (Third-party plugins are often distributed with an appropriate filename already set in the distribution archive.) + + You can add plugins directly to a configuration repo, or you can add them as Git submodules and symlink the executable files into `terraform.d/plugins/`. Submodules are a good choice when many workspaces use the same custom provider, since they keep your repos smaller. If using submodules, enable the ["Include submodules on clone" setting](/terraform/enterprise/workspaces/settings/vcs#include-submodules-on-clone) on any affected workspace. + +- **Terraform Enterprise only:** Use [the `terraform-bundle` tool][bundle] to add custom providers to a custom Terraform version. This keeps custom providers out of your configuration repos entirely, and is easier to update when many workspaces use the same provider. + +## Installing Additional Tools + +### Avoid Installing Extra Software + +Whenever possible, don't install software on the worker. There are a number of reasons for this: + +- Provisioners are a last resort in Terraform; they greatly increase the risk of creating unknown states with unmanaged and partially-managed infrastructure, and the `local-exec` provisioner is especially hazardous. [The Terraform CLI docs on provisioners](/terraform/language/resources/provisioners/syntax#provisioners-are-a-last-resort) explain the hazards in more detail, with more information about the preferred alternatives. (In summary: use Packer, use cloud-init, try to make your infrastructure more immutable, and always prefer real provider features.) +- We don't guarantee the stability of the operating system on the Terraform build workers. It's currently the latest version of Ubuntu LTS, but we reserve the right to change that at any time. +- The build workers are disposable and are destroyed after each use, which makes managing extra software even more complex than when running Terraform CLI in a persistent environment. Custom software must be installed on every run, which also increases run times. + +### Only Install Standalone Binaries + +HCP Terraform does not allow you to elevate a command's permissions with `sudo` during Terraform runs. This means you cannot install packages using the worker OS's normal package management tools. However, you can install and execute standalone binaries in Terraform's working directory. + +You have two options for getting extra software into the configuration directory: + +- Include it in the configuration repository as a submodule. (Make sure the workspace is configured to clone submodules.) +- Use `local-exec` to download it with `curl`. For example: + + ```hcl + resource "aws_instance" "example" { + ami = "${var.ami}" + instance_type = "t2.micro" + provisioner "local-exec" { + command = < **Note:** Terraform Enterprise instances can be configured to allow `sudo` commands during Terraform runs. However, even when `sudo` is allowed, using the worker OS's package tools during runs is still usually a bad idea. You will have a much better experience if you can move your provisioner actions into a custom provider or an immutable machine image. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/manage.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/manage.mdx new file mode 100644 index 000000000..2594b81da --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/manage.mdx @@ -0,0 +1,78 @@ +--- +page_title: Manage and view runs in Terraform Enterprise +description: >- + Learn how to view and interact with runs in Terraform Enterprise, and how to + unlock and lock workspaces to prevent new runs. +source: terraform-docs-common +--- + +# Manage and view runs + +Each workspace in HCP Terraform includes a list of its current, pending, and historical runs. You can view and interact with these runs in the UI. You can also lock workspaces to temporarily prevent new runs. + +## API + +Refer to the [Runs API](/terraform/enterprise/api-docs/run) and [lock a Workspace endpoint](/terraform/enterprise/api-docs/workspaces#lock-a-workspace). + +## Navigating Runs + +Go to the workspace and click the **Runs** tab to review a list of all current and past Terraform runs. + +Click a run to go to its details page. The details page contains the following information: + +- The current status of the run. +- The code commit associated with the run. +- How the run initiated, when, and which user initiated it (if applicable). +- A timeline of events related to the run. +- The output from both the `terraform plan` and `terraform apply` commands, if applicable. This output defaults to visible if the command is currently running and hidden if the command has finished. + +## Interacting with Runs + +In workspaces where you have [permission to apply runs](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions), you can interact with a run at the bottom of its details page. + +The following options are available, depending on the state of the run: + +| Button | Available when: | +| ------------------- | --------------------------------------------------------------------------------------------------------------- | +| Add Comment | Always. | +| Confirm & Apply | A plan needs confirmation. | +| Override & Continue | A soft-mandatory policy failed. Requires permission to manage policy overrides for the organization. | +| Discard Run | A plan needs confirmation or a soft-mandatory policy failed. | +| Cancel Run | A plan or apply is currently running. | +| Force Cancel Run | A plan or apply canceled, but HCP Terraform was unable to end the run. Requires admin access to the workspace. | +| Retry Run | A plan-only run has finished. You can also change which Terraform version to use when retrying a plan-only run. | + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +If a plan needs confirmation (with [manual apply](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply) enabled) or a soft-mandatory policy failed, the run remains paused until a user with appropriate permissions uses these buttons to continue or discard the run. Refer to [Run States and Stages](/terraform/enterprise/run/states) for more details. + +### Canceling Runs + +If a run is currently planning or applying, users with [permission to apply runs](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) for the workspace can click **Cancel Run** to stop the run before it finishes. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Canceling a run is roughly equivalent to typing `ctrl+c` during a Terraform plan or apply on the CLI. The running Terraform process is sent an INT signal, which instructs Terraform to end its work, update state for any resources that have already been changed, and wrap up in the safest way possible. + +In rare cases, a canceled run can fail to end, continuing to lock the workspace. You can forcefully cancel these runs, which immediately terminates the running Terraform process and unlocks the workspace. + +Force-canceling requires admin access to the workspace because it can have dangerous side-effects, including loss of state and orphaned resources. Additionally, the **Force Cancel Run** button only appears after you click **Cancel Run** and HCP Terraform has time to terminate the run safely. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Locking Workspaces (Preventing Runs) + +You can lock the workspace to temporarily stop runs from proceeding. Locking a workspace requires [permission to lock and unlock the workspace](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions), and requires that the workspace is not currently locked by an in-progress run. + +A lock prevents HCP Terraform from performing any applies in the workspace, and also prevents many kinds of plans. New runs remain in the **Pending** state until the workspace unlocks. + +Locking **does not** affect [plan-only runs](/terraform/enterprise/run/remote-operations#speculative-plans) or the planning stages of [saved plan runs](/terraform/enterprise/run/cli#remote-saved-plans). Terraform allows these types of runs because they can not affect infrastructure resources, do not attempt to lock the workspace themselves, and might provide important information about tasks to perform before removing the lock. Note that you can not _apply_ saved-plan runs while the workspace is locked, and HCP Terraform automatically discards these runs if the workspace's state is changed before they can be applied. Terraform Enterprise does not yet support saved plans. + +HCP Terraform shows the lock status in the workspace's header, next to the **Actions** menu. + +To lock or unlock a workspace, do one of the following: + +- Open the **Actions** menu and select **Lock workspace** or **Unlock workspace**. +- Go to **Settings > Locking**. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/modes-and-options.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/modes-and-options.mdx new file mode 100644 index 000000000..136e6d374 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/modes-and-options.mdx @@ -0,0 +1,123 @@ +--- +page_title: Run modes and options in Terraform Enterprise +description: >- + Learn about the different run modes and options available in Terraform + Enterprise to customize behavior during runs. +source: terraform-docs-common +--- + +# Run modes and options + +HCP Terraform runs support many of the same modes and options available in the Terraform CLI. + +## Plan and Apply (Standard) + +The default run mode of HCP Terraform is to perform a plan and then apply it. If you have enabled auto-apply, a successful plan applies immediately. Otherwise, the run waits for user confirmation before applying. + +- **CLI:** Use `terraform apply` (without providing a saved plan file). +- **API:** Create a run without specifying any options that select a different mode. +- **UI:** From the workspace's overview page, click **+ New run**, and then choose **Plan and apply (standard)** as the run type. +- **VCS:** When a workspace is connected to a VCS repository, HCP Terraform automatically starts a standard plan and apply when you add new commits to the selected branch of that repository. + +## Destroy Mode + +[Destroy mode](/terraform/cli/commands/plan#planning-modes) instructs Terraform to create a plan which destroys all objects, regardless of configuration changes. + +- **CLI:** Use `terraform plan -destroy` or `terraform destroy` +- **API:** Use the `is-destroy` option. +- **UI:** Use a workspace's **Destruction and Deletion** settings page. + +## Plan Only/Speculative Plan + +This option creates a [speculative plan](/terraform/enterprise/run/remote-operations#speculative-plans). The speculative plan shows a set of possible changes and checks them against Sentinel policies, but Terraform can _not_ apply this plan. + +You can create speculative plans with a different Terraform version than the one currently selected for a workspace. This lets you check whether your configuration is compatible with a newer Terraform version without changing the workspace settings. + +Plan-only runs ignore the per-workspace run queue. Plan-only runs can proceed even if another run is in progress, can not become the workspace's current run, and do not block progress on a workspace's other runs. + +- **API:** Set the `plan-only` option to `true` and specify an available terraform version using the `terraform-version` field. +- **UI:** From the workspace's overview page, click **+ New run**, and then choose **Plan only** as the run type. +- **VCS:** When a workspace is connected to a VCS repository, HCP Terraform automatically starts a speculative plan when someone opens a pull request (or merge request) against the selected branch of that repository. The pull/merge request view in your VCS links to the speculative plan, and you can also find it in the workspace's run list. + +## Saved Plans + +-> **Version note:** Using saved plans from the CLI with HCP Terraform requires at least Terraform CLI v1.6.0. + +Saved plan runs are very similar to standard plan and apply runs: they perform a plan and then optionally apply it. There are three main differences: + +1. _No wait for planning._ Saved plan runs ignore the per-workspace run queue during their plan and checks. Like plan-only runs, saved plans can begin planning even if another run is in progress, without blocking progress on other runs. +2. _No auto-apply._ Saved plan runs are never auto-applied, even if you enabled auto-apply for the workspace. Saved plans only apply if you confirm them. +3. _Automatic discard for stale plans._ If another run is applied (or the state is otherwise modified) before a saved plan run is confirmed, HCP Terraform automatically discards that saved plan. HCP Terraform may also automatically discard saved plans if they are not confirmed within a few weeks. + +Saved plans are ideal for interactive CLI workflows, where you can perform many exploratory plans and then choose one to apply, or for custom continuous integration workflows where the default run queue behavior isn't suitable. + +- **CLI:** Use `terraform plan -out ` to perform and save a plan, then use `terraform apply ` to apply the saved plan. Use `terraform show ` to inspect a saved plan before applying it. +- **API:** Use the `save-plan` option when creating a run. If you create a new configuration version for a saved plan run, use the `provisional` option so that it will not become the workspace's current configuration version until you decide to apply the run. + +## Allow Empty Apply + +A no-operation (empty) apply enables HCP Terraform to apply a run from a plan that contains no infrastructure changes. During apply, Terraform can upgrade the state version if required. You can use this option to upgrade the state in your HCP Terraform workspace to a new Terraform version. Only some Terraform versions require this, most notably 0.13. + +To make such upgrades easier, empty apply runs will always auto-apply if their plan contains no changes. + +~> **Warning:** HCP Terraform cannot guarantee that a plan in this mode will produce no changes. We recommend checking the plan for drift before proceeding to the apply stage. + +- **API:** Set the `allow-empty-apply` field to `true`. +- **UI:** From the workspace's overview page, click **+ New run**, and then choose **Allow empty apply** as the run type. + +## Refresh-Only Mode + +> **Hands-on:** Try the [Use Refresh-Only Mode to Sync Terraform State](/terraform/tutorials/state/refresh) tutorial. + +-> **Version note:** Refresh-only support requires a workspace using at least Terraform CLI v0.15.4. + +[Refresh-only mode](/terraform/cli/commands/plan#planning-modes) instructs Terraform to create a plan that updates the Terraform state to match changes made to remote objects outside of Terraform. This is useful if state drift has occurred and you want to reconcile your state file to match the drifted remote objects. Applying a refresh-only run does not result in further changes to remote objects. + +- **CLI:** Use `terraform plan -refresh-only` or `terraform apply -refresh-only`. +- **API:** Use the `refresh-only` option. +- **UI:** From the workspace's overview page, click **+ New run**, and then choose **Refresh state** as the run type. + +## Skipping Automatic State Refresh + +The [`-refresh=false` option](/terraform/cli/commands/plan#refresh-false) is used in normal planning mode to skip the default behavior of refreshing Terraform state before checking for configuration changes. + +- **CLI:** Use `terraform plan -refresh=false` or `terraform apply -refresh=false`. +- **API:** Use the `refresh` option. + +## Replacing Selected Resources + +-> **Version note:** Replace support requires a workspace using at least Terraform CLI v0.15.2. + +The [replace option](/terraform/cli/commands/plan#replace-address) instructs Terraform to replace the object with the given resource address. + +- **CLI:** Use `terraform plan -replace=ADDRESS` or `terraform apply -replace=ADDRESS`. +- **API:** Use the `replace-addrs` option. +- **UI:** Click **+ New run** and select the **Plan and apply (standard)** run type. Then click **Additional planning options** to reveal the **Replace resources** option. Type the address of the resource that you want to replace. You can replace multiple resources. + +## Targeted Plan and Apply + +[Resource Targeting](/terraform/cli/commands/plan#resource-targeting) is intended for exceptional circumstances only and should not be used routinely. + +- **CLI:** Use `terraform plan -target=ADDRESS` or `terraform apply -target=ADDRESS`. +- **API:** Use the `target-addrs` option. + +The usual caveats for targeting in local operations imply some additional limitations on HCP Terraform features for remote plans created with targeting: + +- [Sentinel](/terraform/enterprise/policy-enforcement) policy checks for targeted plans will see only the selected subset of resource instances planned for changes in [the `tfplan` import](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2) and [the `tfplan/v2` import](/terraform/enterprise/policy-enforcement/import-reference/tfplan-v2), which may cause an unintended failure for any policy that requires a planned change to a particular resource instance selected by its address. + +- [Cost Estimation](/terraform/enterprise/cost-estimation) is disabled for any run created with `-target` set, to prevent producing a misleading underestimate of cost due to resource instances being excluded from the plan. + +You can disable or constrain use of targeting in a particular workspace using a Sentinel policy based on [the `tfrun.target_addrs` value](/terraform/enterprise/policy-enforcement/import-reference/tfrun#value-target_addrs). + +## Generating Configuration + +-> **Version note:** Support for `import` blocks and generating configuration requires a workspace using at least Terraform CLI v1.5.0. + +When using [`import` blocks](/terraform/language/import) to import existing resources, Terraform can [automatically generate configuration](/terraform/language/import/generating-configuration) during the plan for any imported resources that don't have an existing `resource` block. This option is enabled by default for runs started from the UI or from a VCS webhook. + +- **CLI:** Use `terraform plan -generate-config-out=generated.tf`. +- **API:** Use the `allow-config-generation` option. + +You can find generated configuration displayed in the plan UI. If you're using the CLI workflow, Terraform will write generated configuration to the file you specify when running `terraform plan`. + +Once Terraform has generated configuration for you, you'll need to review it, incorporate it in your Terraform configuration (including committing it to version control), then run another plan. If you try to directly apply a plan with generated configuration, the run will error. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/remote-operations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/remote-operations.mdx new file mode 100644 index 000000000..8091309a5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/remote-operations.mdx @@ -0,0 +1,148 @@ +--- +page_title: Remote operations in Terraform Enterprise +description: >- + Terraform Enterprise runs Terraform operations remotely through the UI, API, + or CLI. Learn how HCP Terraform manages runs. +source: terraform-docs-common +--- + +# Remote operations + +> **Hands-on:** Try the [Get Started — HCP Terraform](/terraform/tutorials/cloud-get-started?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) tutorials. + +HCP Terraform provides a central interface for running Terraform within a large collaborative organization. If you're accustomed to running Terraform from your workstation, the way HCP Terraform manages runs can be unfamiliar. + +This page describes the basics of how runs work in HCP Terraform. + +## Remote Operations + +HCP Terraform is designed as an execution platform for Terraform, and can perform Terraform runs on its own disposable virtual machines. This provides a consistent and reliable run environment, and enables advanced features like Sentinel policy enforcement, cost estimation, notifications, version control integration, and more. + +Terraform runs managed by HCP Terraform are called _remote operations._ Remote runs can be initiated by webhooks from your VCS provider, by UI controls within HCP Terraform, by API calls, or by Terraform CLI. When using Terraform CLI to perform remote operations, the progress of the run is streamed to the user's terminal, to provide an experience equivalent to local operations. + +### Disabling Remote Operations + +[execution_mode]: /terraform/enterprise/workspaces/settings#execution-mode + +Many of HCP Terraform's features rely on remote execution and are not available when using local operations. This includes features like Sentinel policy enforcement, cost estimation, and notifications. + +You can disable remote operations for any workspace by changing its [Execution Mode][execution_mode] to **Local**. This causes the workspace to act only as a remote backend for Terraform state, with all execution occurring on your own workstations or continuous integration workers. + +### Protecting Private Environments + +[HCP Terraform agents](/terraform/cloud-docs/agents) are a paid feature that allows HCP Terraform to communicate with isolated, private, or on-premises infrastructure. The agent polls HCP Terraform or Terraform Enterprise for any changes to your configuration and executes the changes locally, so you do not need to allow public ingress traffic to your resources. Agents allow you to control infrastructure in private environments without modifying your network perimeter. + +HCP Terraform agents also support running custom programs, called _hooks_, during strategic points of a Terraform run. For example, you may create a hook to dynamically download software required by the Terraform run or send an HTTP request to a system to kick off an external workflow. + +## Runs and Workspaces + +HCP Terraform always performs Terraform runs in the context of a [workspace](/terraform/enterprise/run/remote-operations). The workspace serves the same role that a persistent working directory serves when running Terraform locally: it provides the configuration, state, and variables for the run. + +### Configuration Versions + +Each workspace is associated with a particular Terraform configuration, but that configuration is expected to change over time. Thus, HCP Terraform manages configurations as a series of _configuration versions._ + +Most commonly, a workspace is linked to a VCS repository, and its configuration versions are tied to revisions in the specified VCS branch. In workspaces that aren't linked to a repository, new configuration versions can be uploaded via Terraform CLI or via the API. + +### Ordering and Timing + +Each workspace in HCP Terraform maintains its own queue of runs, and processes those runs in order. + +Whenever a new run is initiated, it's added to the end of the queue. If there's already a run in progress, the new run won't start until the current one has completely finished — HCP Terraform won't even plan the run yet, because the current run might change what a future run would do. Runs that are waiting for other runs to finish are in a _pending_ state, and a workspace might have any number of pending runs. + +There are two exceptions to the run queue, which can proceed at any time and do not block the progress of other runs: + +- Plan-only runs. +- The planning stages of [saved plan runs](/terraform/enterprise/run/modes-and-options/#saved-plans). You can only _apply_ a saved plan if no other run is in progress, and applying that plan blocks the run queue as usual. Terraform Enterprise does not yet support this workflow. + +When you initiate a run, HCP Terraform locks the run to a particular configuration version and set of variable values. If you change variables or commit new code before the run finishes, it will only affect future runs, not runs that are already pending, planning, or awaiting apply. + +### Workspace Locks + +When a workspace is _locked,_ HCP Terraform can create new runs (automatically or manually), but those runs do not begin until you unlock the workspace. + +When a run is in progress, that run locks the workspace, as described above under "Ordering and Timing". + +There are two kinds of run operation that can ignore workspace locking: + +- Plan-only runs. +- The planning stages of [saved plan runs](/terraform/enterprise/run/modes-and-options/#saved-plans). You can only _apply_ a saved plan if the workspace is unlocked, and applying that plan locks the workspace as usual. Terraform Enterprise does not yet support this workflow. + +A user or team can also deliberately lock a workspace, to perform maintenance or for any other reason. For more details, see [Locking Workspaces (Preventing Runs)](/terraform/enterprise/run/manage#locking-workspaces-preventing-runs-). + +## Starting Runs + +HCP Terraform has three main workflows for managing runs, and your chosen workflow determines when and how Terraform runs occur. For detailed information, see: + +- The [UI/VCS-driven run workflow](/terraform/enterprise/run/ui), which is the primary mode of operation. +- The [API-driven run workflow](/terraform/enterprise/run/api), which is more flexible but requires you to create some tooling. +- The [CLI-driven run workflow](/terraform/enterprise/run/cli), which uses Terraform's standard CLI tools to execute runs in HCP Terraform. + +You can use the following methods to initiate HCP Terraform runs: + +- Click the **+ New run** button on the workspace's page +- Implement VCS webhooks +- Run the standard `terraform apply` command when the CLI integration is configured +- Call [the Runs API](/terraform/enterprise/api-docs/run) using any API tool + +## Plans and Applies + +HCP Terraform enforces Terraform's division between _plan_ and _apply_ operations. It always plans first, then uses that plan's output for the apply. + +In the default configuration, HCP Terraform waits for user approval before running an apply, but you can configure workspaces to [automatically apply](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply) successful plans. Some plans can't be auto-applied, like plans queued by [run triggers](/terraform/enterprise/workspaces/settings/run-triggers) or by users without permission to apply runs for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +If a plan contains no changes, HCP Terraform does not attempt to apply it. Instead, the run ends with a status of "Planned and finished". The [allow empty apply](/terraform/enterprise/run/modes-and-options#allow-empty-apply) run mode can override this behavior. + +### Speculative Plans + +In addition to normal runs, HCP Terraform can run _speculative plans_ to test changes to a configuration during editing and code review. Speculative plans are plan-only runs. They show possible changes, and policies affected by those changes, but cannot apply any changes. + +Speculative plans can begin without waiting for other runs to finish because they don't affect real infrastructure. HCP Terraform lists past speculative plan runs alongside a workspace's other runs. + +There are three ways to run speculative plans: + +- In VCS-backed workspaces, pull requests start speculative plans, and the VCS provider's pull request interface includes a link to the plan. See [UI/VCS Runs: Speculative Plans on Pull Requests](/terraform/enterprise/run/ui#speculative-plans-on-pull-requests) for more details. +- With the [CLI integration](/terraform/cli/cloud) configured, running `terraform plan` on the command line starts a speculative plan. The plan output streams to the terminal, and a link to the plan is also included. +- The runs API creates speculative plans whenever the specified configuration version is marked as speculative. See [the `configuration-versions` API](/terraform/enterprise/api-docs/configuration-versions#create-a-configuration-version) for more information. + +#### Retry a speculative plan in the UI + +If a speculative plan fails due to an external factor, you can run it again using the "Retry Run" button on its page: + +Retrying a plan requires permission to queue plans for that workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) Only failed or canceled plans can be retried. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Retrying the run will create a new run with the same configuration version. If it is a VCS-backed workspace, the pull request interface will receive the status of the new run, along with a link to the new run. + +### Saved Plans + +-> **Version note:** Using saved plans from the CLI with HCP Terraform requires at least Terraform CLI v1.6.0. + +HCP Terraform also supports saved plan runs. If you have configured the [CLI integration](/terraform/cli/cloud) you can use `terraform plan -out ` to perform and save a plan, `terraform apply ` to apply a saved plan, and `terraform show ` to inspect a saved plan before applying it. You can also create saved plan runs via the API by using the `save-plan` option. + +Saved plan runs affect the run queue differently from normal runs, and can sometimes be automatically discarded. For more details, refer to [Run Modes and Options: Saved Plans](/terraform/enterprise/run/modes-and-options#saved-plans). + +## Planning Modes and Options + +In addition to the normal run workflows described above, HCP Terraform supports destroy runs, refresh-only runs, and several planning options that can modify the behavior of a run. For more details, see [Run Modes and Options](/terraform/enterprise/run/modes-and-options). + +## Run States + +HCP Terraform shows the progress of each run as it passes through each run state (pending, plan, policy check, apply, and completion). In some states, the run might require confirmation before continuing or ending; see [Managing Runs: Interacting with Runs](/terraform/enterprise/run/manage#interacting-with-runs) for more information. + +In the list of workspaces on HCP Terraform's main page, each workspace shows the state of the run it's currently processing. (Or, if no run is in progress, the state of the most recent completed run.) + +For full details about the stages of a run, see [Run States and Stages][]. + +[Run States and Stages]: /terraform/enterprise/run/states + +## Import + +We recommend using [`import` blocks](/terraform/language/import), introduced in Terraform 1.5, to import resources in HCP Terraform. + +HCP Terraform does not support remote execution for the `terraform import` command. For this command the workspace acts only as a remote backend for Terraform state, with all execution occurring on your own workstations or continuous integration workers. + +Since `terraform import` runs locally, environment variables defined in the workspace are not available. Any environment variables required by the provider you're importing from must be defined within your local execution scope. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/run-environment.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/run-environment.mdx new file mode 100644 index 000000000..03955a60e --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/run-environment.mdx @@ -0,0 +1,125 @@ +--- +page_title: Terraform Enterprise's run environment +description: >- + Learn how Terraform Enterprise's run enviornment manages virtual machines, + network access, concurrency for runs, state access authentication, and + environment variables. +source: terraform-docs-common +--- + +# HCP Terraform's run environment + +HCP Terraform is designed as an execution platform for Terraform, and most of its features are based around its ability to perform Terraform runs in a fleet of disposable worker VMs. This page describes some features of the run environment for Terraform runs managed by HCP Terraform. + +## The Terraform Worker VMs + +HCP Terraform performs Terraform runs in single-use Linux virtual machines, running on an x86_64 architecture. + +The operating system and other software installed on the worker VMs is an internal implementation detail of HCP Terraform. It is not part of a stable public interface, and is subject to change at any time. + +Before Terraform is executed, the worker VM's shell environment is populated with environment variables from the workspace, the selected version of Terraform is installed, and the run's Terraform configuration version is made available. + +Changes made to the worker during a run are not persisted to subsequent runs, since the VM is destroyed after the run is completed. Notably, this requires some additional care when installing additional software with a `local-exec` provisioner; see [Installing Additional Tools](/terraform/enterprise/run/install-software#installing-additional-tools) for more details. + +> **Hands-on:** Try the [Upgrade Terraform Version in HCP Terraform](/terraform/tutorials/cloud/cloud-versions) tutorial. + +## Network Access to VCS and Infrastructure Providers + +In order to perform Terraform runs, HCP Terraform needs network access to all of the resources being managed by Terraform. + +If you are using the SaaS version of HCP Terraform, this means your VCS provider and any private infrastructure providers you manage with Terraform (including VMware vSphere, OpenStack, other private clouds, and more) _must be internet accessible._ + +Terraform Enterprise instances must have network connectivity to any connected VCS providers or managed infrastructure providers. + +## Concurrency and Run Queuing + +HCP Terraform uses multiple concurrent worker VMs, which take jobs from a global queue of runs that are ready for processing. (This includes confirmed applies, and plans that have just become the current run on their workspace.) + +If the global queue has more runs than the workers can handle at once, some of them must wait until a worker becomes available. When the queue is backed up, HCP Terraform gives different priorities to different kinds of runs: + +- Applies that will make changes to infrastructure have the highest priority. +- Normal plans have the next highest priority. +- Speculative plans have the lowest priority. + +HCP Terraform can also delay some runs in order to make performance more consistent across organizations. If an organization requests a large number of runs at once, HCP Terraform queues some of them immediately, and delays the rest until some of the initial batch have finished; this allows every organization to continue performing runs even during periods of especially heavy load. + +## State Access and Authentication + +[CLI config file]: /terraform/cli/config/config-file + +[cloud]: /terraform/cli/cloud + +HCP Terraform stores state for its workspaces. + +When you trigger runs via the [CLI workflow](/terraform/enterprise/run/cli), Terraform reads from and writes to HCP Terraform's stored state. HCP Terraform uses [the `cloud` block][cloud] for runs, overriding any existing [backend](/terraform/language/settings/backends/configuration) in the configuration. + +-> **Note:** The `cloud` block is available in Terraform v1.1 and later. Previous versions can use the [`remote` backend](/terraform/language/settings/backends/remote) to configure the CLI workflow and migrate state. + +### Autogenerated API Token + +Instead of using existing user credentials, HCP Terraform generates a unique per-run API token and provides it to the Terraform worker in the [CLI config file][]. When you run Terraform on the command line against a workspace configured for remote operations, you must have [the `cloud` block][cloud] in your configuration and have a user or team API token with the appropriate permissions specified in your [CLI config file][]. However, the run itself occurs within one of HCP Terraform's worker VMs and uses the per-run token for state access. + +The per-run token can read and write state data for the workspace associated with the run, can download modules from the [private registry](/terraform/enterprise/registry), and may be granted access to read state from other workspaces in the organization. (Refer to [cross-workspace state access](/terraform/enterprise/workspaces/state#accessing-state-from-other-workspaces) for more details.) Per-run tokens cannot make any other calls to the HCP Terraform API and are not considered to be user, team, or organization tokens. They become invalid after the run is completed. + +### User Token + +HCP Terraform uses the user token to access a workspace's state when you: + +- Run Terraform on the command line against a workspace that is _not_ configured for remote operations. The user must have permission to read and write state versions for the workspace. + +- Run Terraform's state manipulation commands against an HCP Terraform workspace. The user must have permission to read and write state versions for the workspace. + +Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-permissions) for more details about workspace permissions. + +### Provider Authentication + +Runs in HCP Terraform typically require some form of credentials to authenticate with infrastructure providers. Credentials can be provided statically through Environment or Terraform [variables](/terraform/enterprise/workspaces/variables), or can be generated on a per-run basis through [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) for certain providers. Below are pros and cons to each approach. + +#### Static Credentials + +##### Pros + +- Simple to setup +- Broad support across providers + +##### Cons + +- Requires regular manual rotation for enhanced security posture +- Large blast radius if a credential is exposed and needs to be revoked + +#### Dynamic Credentials + +##### Pros + +- Eliminates the need for manual rotation of credentials on HCP Terraform +- HCP Terraform metadata - including the run's project, workspace, and run-phase - is encoded into every token to allow for granular permission scoping on the target cloud platform +- Credentials are short-lived, which reduces blast radius of potential credential exposure + +##### Cons + +- More complicated initial setup compared to using static credentials +- Not supported for all providers + +The full list of supported providers and setup instructions can be found in the [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) documentation. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Environment Variables + +HCP Terraform automatically injects the following environment variables for each run: + +| Variable Name | Description | Example | +| ------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------ | ------------------------------- | +| `TFC_RUN_ID` | A unique identifier for this run. | `run-CKuwsxMGgMd4W7Ui` | +| `TFC_WORKSPACE_NAME` | The name of the workspace used in this run. | `prod-load-balancers` | +| `TFC_WORKSPACE_SLUG` | The full slug of the configuration used in this run. This consists of the organization name and workspace name, joined with a slash. | `acme-corp/prod-load-balancers` | +| `TFC_CONFIGURATION_VERSION_GIT_BRANCH` | The name of the branch that the associated Terraform configuration version was ingressed from. | `main` | +| `TFC_CONFIGURATION_VERSION_GIT_COMMIT_SHA` | The full commit hash of the commit that the associated Terraform configuration version was ingressed from. | `abcd1234...` | +| `TFC_CONFIGURATION_VERSION_GIT_TAG` | The name of the tag that the associated Terraform configuration version was ingressed from. | `v0.1.0` | +| `TFC_PROJECT_NAME` | The name of the project used in this run. | `proj-name` | + +They are also available as Terraform input variables by defining a variable with the same name. For example: + +```terraform +variable "TFC_RUN_ID" {} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/states.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/states.mdx new file mode 100644 index 000000000..a8f444e0a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/states.mdx @@ -0,0 +1,218 @@ +--- +page_title: Run states and stages in Terraform Enterprise +description: >- + Learn the run stages of Terraform operations. Understanding run stages and + their states can help you follow a run's progress. +source: terraform-docs-common +--- + +# Run states and stages + +Each plan and apply run passes through several stages of action: pending, plan, cost estimation, policy check, apply, and completion. HCP Terraform shows a run's progress through each stage as a run state. + +In the list of workspaces on HCP Terraform's main page, each workspace shows the state of the run it's currently processing. If no run is in progress, HCP Terraform displays the state of the most recently completed run. + +## The Pending Stage + +_States in this stage:_ + +- **Pending:** HCP Terraform hasn't started action on a run yet. HCP Terraform processes each workspace's runs in the order they were queued, and a run remains pending until every run before it has completed. + +_Leaving this stage:_ + +- If the user discards the run before it starts, the run does not continue (**Discarded** state). +- If the run is first in the queue, it proceeds automatically to the plan stage (**Planning** state). + +## The Fetching Stage + +HCP Terraform may need to fetch the configuration from VCS prior to starting the plan. HCP Terraform automatically archives configuration versions created through VCS when all runs are complete and then re-fetches the files for subsequent runs. + +_States in this stage:_ + +- **Fetching:** If HCP Terraform has not yet fetched the configuration from VCS, the run will go into this state until the configuration is available. + +_Leaving this stage:_ + +- If HCP Terraform encounters an error when fetching the configuration from VCS, the run does not continue (**Plan Errored** state). +- If Terraform successfully fetches the configuration, the run moves to the next stage. + +## The Pre-Plan Stage + +The pre-plan phase only occurs if there are enabled [run tasks](/terraform/enterprise/workspaces/settings/run-tasks) in the workspace that are configured to begin before Terraform creates the plan. HCP Terraform sends information about the run to the configured external system and waits for a `passed` or `failed` response to determine whether the run can continue. The information sent to the external system includes the configuration version of the run. + +All runs can enter this phase, including [speculative plans](/terraform/enterprise/run/remote-operations#speculative-plans). + +_States in this stage:_ + +- **Pre-plan running:** HCP Terraform is waiting for a response from the configured external system(s). + - External systems must respond initially with a `200 OK` acknowledging the request is in progress. After that, they have 10 minutes to return a status of `passed`, `running`, or `failed`. If the timeout expires, HCP Terraform assumes that the run tasks is in the `failed` status. + +_Leaving this stage:_ + +- If any mandatory tasks failed, the run skips to completion (**Plan Errored** state). +- If any advisory tasks failed, the run proceeds to the **Planning** state, with a visible warning regarding the failed task. +- If a single run has a combination of mandatory and advisory tasks, Terraform takes the most restrictive action. For example, the run fails if there are two advisory tasks that succeed and one mandatory task that fails. +- If a user canceled the run, the run ends in the **Canceled** state. + +## The Plan Stage + +A run goes through different steps during the plan stage depending on whether or not HCP Terraform needs to fetch the configuration from VCS. HCP Terraform automatically archives configuration versions created through VCS when all runs are complete and then re-fetches the files for subsequent runs. + +_States in this stage:_ + +- **Planning:** HCP Terraform is currently running `terraform plan`. +- **Needs Confirmation:** `terraform plan` has finished. Runs sometimes pause in this state, depending on the workspace and organization settings. + +_Leaving this stage:_ + +- If the `terraform plan` command failed, the run does not continue (**Plan Errored** state). +- If a user canceled the plan by pressing the "Cancel Run" button, the run does not continue (**Canceled** state). +- If the plan succeeded with no changes and neither cost estimation nor Sentinel policy checks will be done, HCP Terraform considers the run complete (**Planned and Finished** state). +- If the plan succeeded and requires changes: + - If cost estimation is enabled, the run proceeds automatically to the cost estimation stage. + - If cost estimation is disabled and [Sentinel policies](/terraform/enterprise/policy-enforcement/sentinel) are enabled, the run proceeds automatically to the policy check stage. + - If there are no Sentinel policies and the plan can be auto-applied, the run proceeds automatically to the apply stage. Plans can be auto-applied if the auto-apply setting is enabled on the workspace and the plan was queued by a new VCS commit or by a user with permission to apply runs. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + - If there are no Sentinel policies and HCP Terraform cannot auto-apply the plan, the run pauses in the **Needs Confirmation** state until a user with permission to apply runs takes action. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) If an authorized user approves the apply, the run proceeds to the apply stage. If an authorized user rejects the apply, the run does not continue (**Discarded** state). + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Note, if you want to directly integrate third-party tools and services between your plan and apply stages, see [Run Tasks](/terraform/enterprise/workspaces/settings/run-tasks). + +## The Post-Plan Stage + +The post-plan phase only occurs if you configure [run tasks](/terraform/enterprise/workspaces/settings/run-tasks) on a workspace to begin after Terraform successfully completes a plan operation. +All runs can enter this phase, including [speculative plans](/terraform/enterprise/run/remote-operations#speculative-plans). During this phase, HCP Terraform sends information about the run to the configured external system and waits for a `passed` or `failed` response to determine whether the run can continue. + +-> **Note:** The information sent to the configured external system includes the [JSON output](/terraform/internals/json-format) of the Terraform plan. + +_States in this stage:_ + +- **Post-plan running:** HCP Terraform is waiting for a response from the configured external system(s). + - External systems must respond initially with a `200 OK` acknowledging the request is in progress. After that, they have 10 minutes to return a status of `passed`, `running`, or `failed`, or the timeout will expire and the task will be assumed to be in the `failed` status. + +_Leaving this stage:_ + +- If any mandatory tasks failed, the run skips to completion (**Plan Errored** state). +- If any advisory tasks failed, the run proceeds to the **Applying** state, with a visible warning regarding the failed task. +- If a single run has a combination of mandatory and advisory tasks, Terraform takes the most restrictive action. For example, if there are two advisory tasks that succeed and one mandatory task that failed, the run fails. If one mandatory task succeeds and two advisory tasks fail, the run succeeds with a warning. +- If a user canceled the run, the run ends in the **Canceled** state. + +## The OPA Policy Check Stage + +This stage only occurs if you enabled [Open Policy Agent (OPA) policies](/terraform/enterprise/policy-enforcement/opa) and runs after a successful `terraform plan` and before Cost Estimation. In this stage, HCP Terraform checks whether the plan adheres to the policies in the OPA policy sets for the workspace. + +_States in this stage:_ + +- **Policy Check:** HCP Terraform is checking the plan against the OPA policy sets. +- **Policy Override:** The policy check finished, but a mandatory policy failed. The run pauses, and Terraform cannot perform an apply unless a user manually overrides the policy check failure. Refer to [Policy Results](/terraform/enterprise/policy-enforcement/view-results) for details. +- **Policy Checked:** The policy check succeeded, and Terraform can apply the plan. The run may pause in this state if the workspace is not set up to auto-apply runs. + +_Leaving this stage:_ + +If any mandatory policies failed, the run pauses in the **Policy Override** state. The run completes one of the following workflows: + +- The run stops and enters the **Discarded** state when a user with [permission to apply runs](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions#manage-policy-overrides) discards the run. +- The run proceeds to the **Policy Checked** state when a user with [permission to manage policy overrides](/terraform/enterprise/users-teams-organizations/permissions) overrides the failed policy. The **Policy Checked** state means that no mandatory policies failed or that a user performed a manual override. + +Once the run reaches the **Policy Checked** state, the run completes one of the following workflows: + +- The run proceeds to the **Apply** stage if Terraform can automatically apply the plan. An auto-apply requires that the **Auto apply** setting is enabled on the workspace. +- If Terraform cannot automatically apply the plan, the run pauses in the **Policy Checked** state until a user with permission to apply runs takes action. If the user approves the apply, the run proceeds to the **Apply** stage. If the user rejects the apply, the run stops and enters the **Discarded** state. + +## The Cost Estimation Stage + +This stage only occurs if cost estimation is enabled. After a successful `terraform plan`, HCP Terraform uses plan data to estimate costs for each resource found in the plan. + +_States in this stage:_ + +- **Cost Estimating:** HCP Terraform is currently estimating the resources in the plan. +- **Cost Estimated:** The cost estimate completed. + +_Leaving this stage:_ + +- If cost estimation succeeded or errors, the run moves to the next stage. +- If there are no policy checks or applies, the run does not continue (**Planned and Finished** state). + +## The Sentinel Policy Check Stage + +This stage only occurs if [Sentinel policies](/terraform/enterprise/policy-enforcement/sentinel) are enabled. After a successful `terraform plan`, HCP Terraform checks whether the plan obeys policy to determine whether it can be applied. + +_States in this stage:_ + +- **Policy Check:** HCP Terraform is currently checking the plan against the organization's policies. +- **Policy Override:** The policy check finished, but a soft-mandatory policy failed, so an apply cannot proceed without approval from a user with permission to manage policy overrides for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) The run pauses in this state. +- **Policy Checked:** The policy check succeeded, and Sentinel will allow an apply to proceed. The run sometimes pauses in this state, depending on workspace settings. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +_Leaving this stage:_ + +- If any hard-mandatory policies failed, the run does not continue (**Plan Errored** state). +- If any soft-mandatory policies failed, the run pauses in the **Policy Override** state. + - If a user with permission to manage policy overrides, overrides the failed policy, the run proceeds to the **Policy Checked** state. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + - If a user with permission to apply runs discards the run, the run does not continue (**Discarded** state). ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) +- If the run reaches the **Policy Checked** state (no mandatory policies failed, or soft-mandatory policies were overridden): + - If the plan can be auto-applied, the run proceeds automatically to the apply stage. Plans can be auto-applied if the auto-apply setting is enabled on the workspace and the plan was queued by a new VCS commit or by a user with permission to apply runs. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + - If the plan can't be auto-applied, the run pauses in the **Policy Checked** state until a user with permission to apply runs takes action. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) The run proceeds to the apply stage if they approve the apply, or does not continue (**Discarded** state) if they reject the apply. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## The Pre-Apply Stage + +The pre-apply phase only occurs if the workspace has [run tasks](/terraform/enterprise/workspaces/settings/run-tasks) configured to begin before Terraform creates the apply. HCP Terraform sends information about the run to the configured external system and waits for a `passed` or `failed` response to determine whether the run can continue. The information sent to the external system includes the configuration version of the run. + +Only confirmed runs can enter this phase. + +_States in this stage:_ + +- **Pre-apply running:** HCP Terraform is waiting for a response from the configured external system(s). + - External systems must respond initially with a `200 OK` acknowledging the request is in progress. After that, they have 10 minutes to return a status of `passed`, `running`, or `failed`. If the timeout expires, HCP Terraform assumes that the run tasks is in the `failed` status. + +_Leaving this stage:_ + +- If any mandatory tasks failed, the run skips to completion. +- If any advisory tasks failed, the run proceeds to the **Applying** state, with a visible warning regarding the failed task. +- If a single run has a combination of mandatory and advisory tasks, Terraform takes the most restrictive action. For example, the run fails if there are two advisory tasks that succeed and one mandatory task that fails. +- If a user canceled the run, the run ends in the **Canceled** state. + +## The Apply Stage + +_States in this stage:_ + +- **Applying:** HCP Terraform is currently running `terraform apply`. + +_Leaving this stage:_ + +After applying, the run proceeds automatically to completion. + +- If the apply succeeded, the run ends in the **Applied** state. +- If the apply failed, the run ends in the **Apply Errored** state. +- If a user canceled the apply by pressing **Cancel Run**, the run ends in the **Canceled** state. + +## The Post-Apply Stage + +The post-apply phase only occurs if you configure [run tasks](/terraform/enterprise/workspaces/settings/run-tasks) on a workspace to begin after Terraform successfully completes an apply operation. During this phase, HCP Terraform sends information about the run to the configured external system and waits for a `passed` or `failed` response. However, unlike other stages in the run task process, a failed outcome does not halt the run since HCP Terraform has already provisioned the infrastructure. + +_States in this stage:_ + +- **Post-apply running:** HCP Terraform is waiting for a response from the configured external system(s). +- External systems must respond initially with a `200 OK` acknowledging the request is in progress. After that, they have 10 minutes to return a status of `passed`, `running`, or `failed`. If the timeout expires, HCP Terraform assumes that the run tasks is in the `failed` status. + +_Leaving this stage:_ + +- There are only advisory tasks on this stage. +- If any advisory tasks failed, the run proceeds to the **Applied** state, with a visible warning regarding the failed task. +- If a user cancels the run, the run ends in the **Canceled** state. + +## Completion + +A run is complete if it finishes applying, if any part of the run fails, if there is nothing to do, or if a user chooses not to continue. Once a run completes, the next run in the queue can enter the plan stage. + +_States in this stage:_ + +- **Applied:** The run was successfully applied. +- **Planned and Finished:** `terraform plan`'s output already matches the current infrastructure state, so `terraform apply` doesn't need to do anything. +- **Apply Errored:** The `terraform apply` command failed, possibly due to a missing or misconfigured provider or an illegal operation on a provider. +- **Plan Errored:** The `terraform plan` command failed (usually requiring fixes to variables or code), or a hard-mandatory Sentinel policy failed. The run cannot be applied. +- **Discarded:** A user chose not to continue this run. +- **Canceled:** A user interrupted the `terraform plan` or `terraform apply` command with the "Cancel Run" button. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/run/ui.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/run/ui.mdx new file mode 100644 index 000000000..bf1f468aa --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/run/ui.mdx @@ -0,0 +1,138 @@ +--- +page_title: UI and VCS-driven run workflow in Terraform Enterprise +description: >- + Use Terraform Enterprise's UI and VCS-driven run workflow to automatically + queue runs when merging new commits to the VCS repository branch associated + with a workspace. +source: terraform-docs-common +--- + +# UI and VCS-driven run workflow + +HCP Terraform has three workflows for managing Terraform runs. + +- The UI/VCS-driven run workflow described below, which is the primary mode of operation. +- The [API-driven run workflow](/terraform/enterprise/run/api), which is more flexible but requires you to create some tooling. +- The [CLI-driven run workflow](/terraform/enterprise/run/cli), which uses Terraform's standard CLI tools to execute runs in HCP Terraform. + +## Summary + +In the UI and VCS workflow, every workspace is associated with a specific branch of a VCS repo of Terraform configurations. HCP Terraform registers webhooks with your VCS provider when you create a workspace, then automatically queues a Terraform run whenever new commits are merged to that branch of workspace's linked repository. + +HCP Terraform also performs a [speculative plan][] when a pull request is opened against that branch. HCP Terraform posts a link to the plan in the pull request, and re-runs the plan if the pull request is updated. + +[speculative plan]: /terraform/enterprise/run/remote-operations#speculative-plans + +The Terraform code for a normal run always comes from version control, and is always associated with a specific commit. + +## Automatically Starting Runs + +In a workspace linked to a VCS repository, runs start automatically when you merge or commit changes to version control. + +If you use GitHub as your VCS provider and merge a PR changing 300 or more files, HCP Terraform automatically triggers runs for every workspace connected to that repository. The GitHub API has a limit of 300 reported changed files for a PR merge. To address this, HCP Terraform initiates workspace runs proactively, preventing oversight of file changes beyond this limit. + +A workspace is linked to one branch of a VCS repository and ignores changes to other branches. You can specify which files and directories within your repository trigger runs. HCP Terraform can also automatically trigger runs when you create Git tags. Refer to [Automatic Run Triggering](/terraform/enterprise/workspaces/settings/vcs#automatic-run-triggering) for details. + +-> **Note:** A workspace with no runs will not accept new runs via VCS webhook. At least one run must be manually queued to confirm that the workspace is ready for further runs. + +A workspace will not process a webhook if the workspace previously processed a webhook with the same commit SHA and created a run. To trigger a run, create a new commit. If a workspace receives a webhook with a previously processed commit, HCP Terraform will add a new event to the [VCS Events](/terraform/enterprise/vcs#viewing-events) page documenting the received webhook. + +## Manually Starting Runs + +You can manually trigger a run using the UI. Manual runs let you apply configuration changes when you update variable values but the configuration in version control is unchanged. You must manually trigger an initial run in any new VCS-driven workspace. + +To start a run: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace you want to start a run in. +2. Click **+ New run**, opening the **Start a new run** dialog. +3. Select the run mode and provide an optional message. + +Review the [run modes documentation](/terraform/enterprise/run/modes-and-options) for more detail on supported options. + +Run modes that have a plan phase support debugging mode. This is equivalent to setting the `TF_LOG` environment variable to `TRACE` for this run only. To enable debugging, click **Additional planning options** under the run mode and click **Enable debugging mode**. See [Debugging Terraform](/terraform/internals/debugging) for more information. + +To [replace](/terraform/enterprise/run/modes-and-options#replacing-selected-resources) specific resources as part of a standard plan and apply run, expand the **Additional planning options** section and select the resources to replace. + +Manually starting a run requires permission to queue plans for the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +If the workspace has a plan that is still in the [plan stage](/terraform/enterprise/run/states#the-plan-stage) when a new plan is queued, you can either wait for it to complete, or visit the **Current Run** page and click **Run this plan now**. Be aware that this action terminates the current plan and unlocks the workspace, which can lead to anomalies in behavior, but can be useful if the plans are long-running and the current plan does not have all the desired changes. + +## Automatically cancel plan-only runs triggered by outdated commits + +Refer to [Automatically cancel plan-only runs triggered by outdated commits](/terraform/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management) for additional information. + +## Confirming or Discarding Plans + +By default, run plans require confirmation before HCP Terraform will apply them. Users with permission to apply runs for the workspace can navigate to a run that has finished planning and click the "Confirm & Apply" or "Discard Plan" button to finish or cancel a run. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) If necessary, use the "View Plan" button for more details about what the run will change. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +![confirm button](/img/docs/runs-confirm.png) + +Users can also leave comments if there's something unusual involved in a run. + +Note that once the plan stage is completed, until you apply or discard a plan, HCP Terraform can't start another run in that workspace. + +### Auto apply + +If you would rather automatically apply plans that don't have errors, you can [enable auto apply](/terraform/enterprise/workspaces/settings#auto-apply-and-manual-apply) on the workspace's "General Settings" page. Some plans can't be auto-applied, like plans queued by [run triggers](/terraform/enterprise/workspaces/settings/run-triggers) or by users without permission to apply runs. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Speculative Plans on Pull Requests + +To help you review proposed changes, HCP Terraform can automatically run [speculative plans][speculative plan] for pull requests or merge requests. + +### Viewing Pull Request Plans + +You can view speculative plans in a workspace's list of normal runs. Additionally, HCP Terraform adds a link to the run in the pull request itself, along with an indicator of the run's status. + +A single pull request can include links to multiple plans, depending on how many workspaces connect to the destination branch. If you update a pull request, HCP Terraform performs new speculative plans and update the links. + +Although any contributor to the repository can see the status indicators for pull request plans, only members of your HCP Terraform organization with permission to read runs for the affected workspaces can click through and view the complete plan output. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Rules for Triggering Pull Request Plans + +Whenever a pull request is _created or updated,_ HCP Terraform checks whether it should run speculative plans in workspaces connected to that repository, based on the following rules: + +- Only pull requests that originate from within the same repository can trigger speculative plans. + + To avoid executing malicious code or exposing sensitive information, HCP Terraform doesn't run speculative plans for pull requests that originate from forks of a repository. + + -> **Note:** On Terraform Enterprise, administrators can choose to allow speculative plans on pull requests that originate from forks. To learn more about this setting, refer to the [general settings documentation](/terraform/enterprise/admin/application/general#allow-speculative-plans-on-pull-requests-from-forks) + +- Pull requests can only trigger runs in workspaces where automatic speculative plans are allowed. You can [disable automatic speculative plans](/terraform/enterprise/workspaces/settings/vcs#automatic-speculative-plans) in a workspace's VCS settings. + +- A pull request will only trigger speculative plans in workspaces that are connected to that pull request's destination branch. + + The destination branch is the branch that a pull request proposes to make changes to; this is often the repository's main branch, but not always. + +- If a workspace is configured to only treat certain directories in a repository as relevant, pull requests that don't affect those directories won't trigger speculative plans in that workspace. For more information, see [VCS settings: automatic run triggering](/terraform/enterprise/workspaces/settings/vcs#automatic-run-triggering). + + -> **Note:** If HCP Terraform skips a plan because the changes weren't relevant, it will still post a passing commit status to the pull request. + +- HCP Terraform does not update the status checks on a pull request with the status of an associated apply. This means that a commit with a successful plan but an errored apply will still show the passing commit status from the plan. + +### Contents of Pull Request Plans + +Speculative plans for pull requests use the contents of the head branch (the branch that the PR proposes to merge into the destination branch), and they compare against the workspace's current state at the time of the plan. This means that if the destination branch changes significantly after the head branch is created, the speculative plan might not accurately show the results of accepting the PR. To get a more accurate view, you can rebase the head branch onto a more recent commit, or merge the destination branch into the head branch. + +## Testing Terraform Upgrades with Speculative Plans + +You can start a new [speculative plan][speculative plan] in the UI with the workspace's current configuration version and any Terraform version available to the organization. + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace you want to try a new Terraform version in. +2. Click **+ New run**. +3. Select **Plan only** as the run type. +4. Select a version from the **Choose Terraform version** menu. The speculative plan will use this version without changing the workspace's settings. +5. Click **Start run**. + +If the run is successful, you can change the workspace's Terraform version and [upgrade the state](/terraform/enterprise/workspaces/state#upgrading-state). + +## Speculative Plans During Development + +You can also use the CLI to run speculative plans on demand before making a pull request. Refer to the [CLI-driven run workflow](/terraform/enterprise/run/cli#remote-speculative-plans) for more details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/attributes.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/attributes.mdx new file mode 100644 index 000000000..3023a3ec4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/attributes.mdx @@ -0,0 +1,81 @@ +--- +page_title: SAML user attributes reference for Terraform Enterprise +description: Terraform Enterprise updates an account with data from SAML user attributes when a new user logs in. Learn how SAML user attributes map to Terraform Enterprise user data. +--- + +# SAML User Attributes Reference + +The following SAML attributes correspond to properties of a Terraform Enterprise user account. When a new or existing user logs in, their account info will be updated with data from these attributes. + +## Username + +If Username is specified, Terraform Enterprise will assign that username to the user instead of using an automatic name [based on their email address](/terraform/enterprise/saml/login). When the username is already taken or is invalid, login will still complete, and the existing or default value will be used instead. + +```xml + + + new-username + + +``` + +## SiteAdmin + +If the SiteAdmin attribute is present, the system will grant or revoke [site admin access](/terraform/enterprise/application-administration/admin-access) for the user. Site admin access can be also be granted or revoked in the [MemberOf attribute](#memberof); however the SiteAdmin attribute is the recommended method of managing access and will override the other value. + +```xml + + + false + + +``` + +## MemberOf + +Team membership is specified in the MemberOf attribute. (If desired, you can [configure a different name](/terraform/enterprise/saml/team-membership) for the team membership attribute.) + +Teams can be specified in separate AttributeValue items: + +```xml + + + devs + reviewers + + +``` + +or in one AttributeValue as a comma-separated list: + +```xml + + + list,of,roles + + +``` + +There is a special-case role `site-admins` that will add a user as a site admin to your Terraform Enterprise instance. + +```xml + + + site-admins + devs + + +``` + +## IsServiceAccount + +If the `IsServiceAccount` (case-sensitive) attribute is present and `true` (case-insensitive), the system will mark the user as a service account. +This will ensure API tokens created for this user will not expire as normal user account tokens expire when reaching the API token session timeout. + +```xml + + + true + + +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/configuration.mdx new file mode 100644 index 000000000..0448608d6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/configuration.mdx @@ -0,0 +1,73 @@ +--- +page_title: Configure Terraform Enterprise as the SAML service provider +description: >- + Learn how to configure Terraform Enterprise as the service provider (SP) when integrating with a SAML identity provider for authentication and authorization. +--- + +# Configure Terraform Enterprise as the SAML service provider + +This topic describes how to configure Terraform Enterprise as the SAML service provider (SP). SAML is an XML-based standard for authentication and authorization. Terraform Enterprise can act as a service provider (SP), also called a relying party, with your internal SAML identity provider (IdP). + +## Overview + +Complete the following steps to configure Terraform Enterprise to authenticating and authorizing users with SAML. + +1. Configure Terraform Enterprise as the service provider (SP). The SP also sometimes referred to as relying party (RP). +1. Configure the SAML identity provider (IdP). For instructions for specific IdPs, refer to [Identity Provider Configuration](/terraform/enterprise/saml/idp-configuration). + +Refer to the [Admin Settings API](/terraform/enterprise/api-docs/admin/settings) documentation for instructions on how to configure SAML using the API. + +## Requirements + +Only Terraform Enterprise users with the site-admin permission can modify SAML settings. For more information about site admins, refer to [Site Administration Permissions](/terraform/enterprise/users-teams-organizations/users#site-admin-permissions). + +Prior to activating SAML, we recommend that you create a [non-SSO admin account for recovery](/terraform/enterprise/saml/troubleshooting#create-a-non-sso-admin-account-for-recovery) to ensure that you are able to log in as an admin in case of error. + +Terraform Enterprise supports the SAML 2.0 standard. + +## Configure Terraform Enterprise as the SP + +1. Open your user icon menu and click **Site Admin** or go directly to `https:///app/admin/saml`. +1. Specify values for the SAML settings and click **Save SAML Settings**. Refer to [SAML Configuration Settings Reference](#saml-configuration-settings-reference) for details. + +## Configure the SAML Identity Provider + +Configure the following values in the SAML Identity Provider (IdP): + +1. **Audience**: `https:///users/saml/metadata` +1. **Recipient**: `https:///users/saml/auth` +1. **ACS (Consumer) URL**: `https:///users/saml/auth` + +The SAML metadata document is available at `https:///users/saml/metadata.xml` + +## SAML Configuration Settings Reference + +You can configure the following settings to configure Terraform Enterprise as the SP when integrating with a SAML identity provider. + +### SAML Settings + +- **Enable SAML single sign-on**: This checkbox must be enabled. + +### Identity Provider Settings + +- **Single Sign-On URL**: The HTTP(S) endpoint on your IdP for single sign-on requests. This value is provided by your IdP configuration. +- **Single Log-Out URL**: The HTTP(s) endpoint on your IdP for single logout requests. This value is provided by your IdP configuration. Single Logout is not yet supported. +- **IdP Certificate**: The PEM encoded X.509 Certificate as provided by the IdP configuration. + +-> **Note:** When reconfiguring the IdP certificate, Terraform Enterprise will retain the old IdP certificate to allow for a rotation period. When you are sure that the new certificate is functioning correctly, you must explicitly remove the old IdP certificate. A button labeled "Revoke old IDP certificate" will appear below the IdP Certificate field if you are in a rotation period. You can also remove the old certificate via an [API endpoint](/terraform/enterprise/api-docs/admin/settings#revoke-previous-saml-idp-certificate). + +### Attributes + +- **Username Attribute Name**: (default: `Username`) The name of the SAML attribute that determines the Terraform Enterprise username for a user logging in via SSO. +- **Site Admin Attribute Name**: (default: `SiteAdmin`) The name of the SAML attribute that determines whether a user has site-admin permissions. The value of this attribute in the SAML assertion must be a boolean. Site admins can manage settings and resources for the entire Terraform Enterprise instance; see [Administering Terraform Enterprise][admin] for details. +- **Team Attribute Name**: (default: `MemberOf`) The name of the SAML attribute that determines [team membership](/terraform/enterprise/saml/team-membership). The value of this attribute in the SAML assertion must be either a string containing a comma-separated list of team names or separate [AttributeValue items](/terraform/enterprise/saml/attributes#memberof). Team membership mapping is case-sensitive. + +### Team Membership Mapping + +- **Site Admin Role**: (default: `site-admins`; make blank to disable) An alternate way of managing site-admin permissions; if a role with this name is present in the value of the Team Attribute Name attribute, the user is an admin. + + We recommend using the "site admin attribute name" setting instead. If you are using the site admin attribute, you can disable "site admin role" by deleting its value. + +### User Session + +- **API Token Session Timeout**: (default: `1209600` seconds, or 14 days) The duration of time (in seconds) for which Terraform Enterprise will accept [a user's API token](/terraform/enterprise/users-teams-organizations/users#api-tokens) before requiring the user to log in again. For more details about this behavior, see [API Token Expiration](/terraform/enterprise/saml/login#api-token-expiration). \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/aad.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/aad.mdx new file mode 100644 index 000000000..c5052c6d6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/aad.mdx @@ -0,0 +1,87 @@ +--- +page_title: >- + Configure Azure Active Directory as the identity provider Terraform Enterprise +description: >- + Learn how to use Azure Active Directory as the identify provider for Terraform Enterprise when setting up single-sign on (SSO) over SAML. +--- + +# Configure an Azure Active Directory Identity Provider + +Follow these steps to configure Azure Active Directory (AAD) as the identity provider (IdP) for Terraform Enterprise. + +-> **Note:** This guide assumes you have an appropriate licensing agreement for Azure Active Directory that supports non-gallery application single sign-on. + +## Configure a New AAD Non-Gallery Application + +1. In the Azure Active Directory portal, navigate to **Enterprise Applications** and select **New application**. + +1. Select **Non-gallery application**. Provide a name for the application and click **Add**. AAD automatically redirects to your new application's settings. + +1. Navigate to **Single sign-on** and select **SAML**. + +1. Click the pencil icon in **Basic SAML Configuration** and configure these settings: + - **Identifier (Entity ID):** `https:///users/saml/metadata`, which is **Metadata (audience) URL** in TFE's SAML settings. + - **Reply URL (Assertion Consumer Service URL):** `https:///users/saml/auth`, which is **ACS consumer (recipient) URL** in Terraform Enterprise's SAML settings. + - **Sign on URL:** `https:///` + +1. In the **User Attributes & Claims** section, click the pencil icon and configure these items: + - **Name Identifier value:** `user.mail` + +1. In the **Manage user claim** section, configure a user claim to map the team a user belongs to: + - **Name:** `MemberOf`. This name is the default for TFE's group [attribute](/terraform/enterprise/saml/attributes). You can change this attribute's name in [TFE's SAML settings](/terraform/enterprise/saml/configuration) if necessary. + - **Source attribute:** (drop-down): `user.assignedroles`. This action creates custom roles in your Azure Active Directory that you use to map users and groups to Terraform Enterprise teams. + +1. In the **SAML Signing Certificate** section, download the signing certificate in `base64` format. + +1. In the **Set up <ABD App Name>** section, copy these URLs to enter in your Terraform Enterprise configuration to link Terraform Enterprise to AAD: + +1. In the **Set up <ABD App Name>** section, copy these URLs. You need them to link Terraform Enterprise to Azure Active Directory. + - **Login URL:** + - **Logout URL:** + +1. Navigate to `https:///app/admin/saml` and configure these settings: + - **Enable SAML single sign-on** (check box): enabled. + - **Single Sign-On URL:** Enter the login url. + - **Single Log-out URL:** Enter the logout url. + - **IDP Certificate:** Enter the contents of the PEM (`base64`) encoded X.509 certificate. + +## Configure Custom Roles for Team Membership Mapping + +1. Create teams in Terraform Enterprise. Refer to [Terraform Enterprise Team Membership](/terraform/enterprise/saml/team-membership) for more information. + +1. Return to the Azure Portal, and navigate to the **App registrations** page. + +1. Go to the **Enterprise applications* page, select your Terraform Enterprise application, and then select **Manifest** in the sidebar. + +1. In the manifest editor, locate the **appRoles** block. This block is where you add additional roles that map users and groups to teams in Terraform. + +1. Leave any automatically generated role GUIDs with their default values. Add new roles after the system roles. The new roles must contain a unique GUID value for the ID value of the new role. You can use a tool such as [GUID Generator](https://www.guidgenerator.com) to create the GUIDs for these new roles. + +1. Click **Save** to add the roles. + + -> **Note:** You can add as many roles as your organization needs, such as the `site-admins` role. Azure AD sends the value of these roles as the claim value in the SAML response. + + Example role configuration that creates a new role named **Dev**: + + ```json + { + "allowedMemberTypes": [ + "User" + ], + "displayName": "Dev", + "id": "d1c2ade8-98f8-45fd-aa4a-6d06b947c66f", + "isEnabled": true, + "description": "Dev Team", + "value": "Dev" + } + ``` + +1. Navigate to **Enterprise applications** and select the app you created for TFE. In the sidebar, under the **Manage** heading, select **Users and Groups**. You can enable access to Terraform Enterprise by adding either users or groups to your application. During the process of adding users or groups, you select a role to assign to the user or group. Select the role that matches the user or groups Terraform Enterprise team. + +1. Navigate to **Enterprise applications** and select the app you created for Terraform Enterprise. + +1. Select **Users and Groups** in the sidebar, under the **Manage** heading. You can enable access to Terraform Enterprise by adding either users or groups to your application. During the process of adding users or groups, you select a role to assign to the user or group. + +1. Select the role that matches the user or groups Terraform Enterprise team. + +Once you add users, the initial configuration is complete, and they can begin logging into Terraform Enterprise with their AAD username and password. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/adfs.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/adfs.mdx new file mode 100644 index 000000000..d09ffdd7f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/adfs.mdx @@ -0,0 +1,110 @@ +--- +page_title: Configure ADFS as the identify provider for Terraform Enterprise +description: >- + Learn how to use Active Directory Federated Services (ADFS) as the identify provider for Terraform Enterprise when setting up single-sign on (SSO) over SAML. +--- + +# Configure an ADFS Identity Provider + +This guide explains how to configure Active Directory Federated Services (ADFS) in order to use it as an Identity Provider (IdP) for Terraform Enterprise's SAML authentication feature. The screenshots below were taken on Windows Server 2016, and the UI may not look the same on previous Windows versions. + +## Requirements + +Install and configure ADFS before completing these instructions. + +## Gather ADFS information + +1. On the ADFS server, start the Server Manager. + ![saml\_0](/img/docs/saml_0.png) +1. Click "Tools" -> "AD FS Management" + .![saml\_1](/img/docs/saml_1.png) +1. Expand the `Service` object and click "Endpoints". + ![saml\_2](/img/docs/saml_2.png) +1. Make a note of the `URL Path` for Type `SAML 2.0/WS-Federation`. (If you are using the default settings, this will be `/adfs/ls/`.) +1. Switch from "Endpoints" to "Certificates" and choose the one under `Token-signing`. + ![saml\_3](/img/docs/saml_3.png) +1. Right click "View Certificate". + ![saml\_5](/img/docs/saml_5.png) +1. In the Certificate dialog, select the Details tab and click "Copy to File". + ![saml\_6](/img/docs/saml_6.png) +1. In the Certificate Export Wizard, click "Next", select "Base-64 encoded X.509 (.CER)" and click "Next" again. + ![saml\_8](/img/docs/saml_8.png) +1. Pick a location to save the file and click "Next". + ![saml\_9](/img/docs/saml_9.png) +1. Review the settings and click "Finish". + ![saml\_10](/img/docs/saml_10.png) + +## Configure Terraform Enterprise + +1. Visit `https:///app/admin/saml`. +1. Set "Single Sign-on URL" to `https:///`, using the path you noted above in step 4. +1. Set "Single Log-out URL" to `https:///?wa=wsignout1.0` (note that this is the same path with an additional URL parameter). +1. Paste the contents of the saved certificate in "IDP Certificate". +1. Scroll to the bottom of the screen and click "Save SAML Settings". + +## Configure ADFS + +### Configure the Relying Party (RP) Trust + +1. On the ADFS server, start the Server Manager. + ![saml\_0](/img/docs/saml_0.png) +1. Click "Tools" -> "AD FS Management". + ![saml\_1](/img/docs/saml_1.png) +1. Right-click "Relying Party Trusts" and then click "Add Relying Party Trust". + ![saml\_11](/img/docs/saml_11.png) +1. In the Add Relying Party Trust Wizard, select "Claims aware" and click "Start". + ![saml\_12](/img/docs/saml_12.png) +1. Next, select "Import data about the relying party published online or on a local network", and in the text box, enter `https:///users/saml/metadata`. + ![saml\_13](/img/docs/saml_13.png) +1. Click "Next", type a display name used to identify the RP trust, and click "Next" again. + ![saml\_14](/img/docs/saml_14.png) +1. In the "Choose Access Control Policy" screen, choose one that matches your security policy, and click "Next". + ![saml\_15](/img/docs/saml_15.png) +1. Review the settings and click "Next". + ![saml\_16](/img/docs/saml_16.png) +1. Finally, make sure "Configure claims issuance policy for this application" is checked and click "Close". This opens the Claim Issuance Policy editor for the RP trust just configured. + ![saml\_17](/img/docs/saml_17.png) + +### Configure Claim Issuance + +#### LDAP Attributes as Claims + +1. Click "Add Rule", and then select "Send LDAP Attributes as Claims" from the `Claim rule template` dropdown. Click "Next". + +1. Set a name used to identify the claim rule. + +1. Set the attribute store to "Active Directory". + - From the `LDAP Attribute` column, select "E-Mail Addresses". + - From the `Outgoing Claim Type`, select "E-Mail Address". + ![saml\_19](/img/docs/saml_19.png) + +1. Click "Finish". + +#### Transform Incoming Claims + +4. Click "Add Rule", and then select "Transform an Incoming Claim" from the `Claim rule template` dropdown. Click "Next". + ![saml\_22](/img/docs/saml_22.png) +4. Set a name used to identify the claim rule. + +- Select "E-mail Address" as the `Incoming Claim Type`. +- Select "Name ID" as the `Outgoing Claim Type`. +- Select "Email" for `Outgoing Name ID Format`. + ![saml\_23](/img/docs/saml_23.png) + +6. Click "Finish". + +#### Send Group Membership as a Claim + +7. Click "Add Rule", and then select "Send Group Membership as a Claim" from the `Claim rule template` dropdown. Click "Next". +7. Click "Browse" and locate the AD User group that contains all Terraform Enterprise admins. + ![saml\_26](/img/docs/saml_26.png) + +- Set `Outgoing claim type` to `MemberOf`. +- Set `Outgoing claim value` to `site-admins`. + ![saml\_27](/img/docs/saml_27.png) + +9. Click "Finish". + +## Test configured SAML login + +At this point SAML is configured. Follow [these instructions to log in](/terraform/enterprise/saml/login) to Terraform Enterprise. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/index.mdx new file mode 100644 index 000000000..f79ac064c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/index.mdx @@ -0,0 +1,84 @@ +--- +page_title: Sample authentication request and response for a SAML identity provider +description: >- + You can enable Terraform Enterprise to authenticate and authorize users over SAML single sign-on. Review a sample SAML request and response to validate your SSO. +--- + +# Sample SAML Authentication Request and Response + +This topic contains an example request from Terraform Enterprise before sign-on and the response from the identity provider after sign-on. Refer to the following topics for instructions on how to configure single sign-on for specific identity providers (IdP): + +- [ADFS](/terraform/enterprise/saml/idp-configuration/adfs) +- [Azure Active Directory](/terraform/enterprise/saml/idp-configuration/aad) +- [Okta](/terraform/enterprise/saml/idp-configuration/okta) +- [OneLogin](/terraform/enterprise/saml/idp-configuration/onelogin) + +## Example AuthnRequest + +```xml + + https://app.terraform.io/users/saml/metadata + + +``` + +## Example SAMLResponse + +```xml + + https://app.terraform.io/saml/metadata/1 + + + + + https://app.onelogin.com/saml/metadata/1 + + + + + + + + + + + 8xMTvqWoOpBMP990fzsoW2HWFVw= + + + 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000== + + + 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000== + + + + + user@example.com + + + + + + https://app.terraform.io/users/saml/metadata + + + + + urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport + + + + + new-username + + + false + + + devs + reviewers + + + + +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/okta.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/okta.mdx new file mode 100644 index 000000000..43f360bda --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/okta.mdx @@ -0,0 +1,145 @@ +--- +page_title: Configure Okta as the identity provider for Terraform Enterprise +description: >- + Learn how to use Okta as the identity provider for Terraform Enterprise when setting up single-sign on (SSO) over SAML. +--- + +# Configure an Okta Identity Provider + +> **Hands-on:** Try the [Enable Single Sign On (SSO) in Terraform Enterprise](/terraform/tutorials/enterprise/enable-sso-saml-tfe-okta) tutorial. + +Follow these steps to configure Okta as the identity provider (IdP) for Terraform Enterprise. + +## Configure a New Okta SAML Application + +1. In Okta's web interface, go to the **Applications** tab and click **Create App Integration**. + +1. Select **SAML 2.0** as the sign on method, and then click **Next**. + +1. In the **General Settings** page, enter `Terraform Enterprise`, optionally add an app logo, then click **Next**. + +1. In the **SAML Settings** section, configure the following settings with the specified values: + + | Okta Field | Terraform Enterprise SAML Field | Value | + | --------------------------------------------------------------------- | ------------------------------- | -------------------------------------------- | + | **Single sign on URL** | ACS Consumer (Recipient) URL | `https:///users/saml/auth` | + | **Use the SSO URL for Recipient URL and Destination URL** (checkbox) | | `enabled` | + | **Audience URI (SP Entity ID)** | Metadata (Audience) URL | `https:///users/saml/metadata` | + | **Name ID format** (drop-down) | | EmailAddress | + | **Application username** | | Email | + + ~> **Note:** The identity provider software uses the SSO URL during authentication. It is different from the [Login URL][login_url] that users visit to sign in to Terraform Enterprise. + + The full name for the **Name ID format** in the SAML specification is `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress`. + + You can also choose `Email Prefix` for the application username. + +1. In the **SAML Settings** section, optionally configure a site admin permissions attribute statement. This statement determines which users can administer the entire Terraform Enterprise instance. Refer to [Administering Terraform Enterprise](/terraform/enterprise/application-administration) for more information about site admin permissions. Under the **Attribute Statements (Optional)** header, configure a statement as follows: + + | Field | Value | Description | + | --------------------------- | ----------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | + | **Name** | `SiteAdmin` | This is the default name for TFE's site admin [attribute][]. You can change the name of this attribute in [TFE's SAML settings](/terraform/enterprise/saml/configuration) if necessary. | + | **Name Format** (drop-down) | Basic | | + | **Value** | | An [Okta expression](https://developer.okta.com/docs/reference/okta-expression-language/) that will evaluate to a boolean: `true` for every user who should have site admin permissions, but `false` for any users who should **not** have site admin permissions. The exact expression depends on the user properties you use to manage admin permissions. | + +1. Configure a group attribute statement to report which teams a user belongs to. Under the **Group Attribute Statements (Optional)** header, configure the statement as follows: + + | Field | Value | Description | + | --------------------------- | ---------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | + | **Name** | `MemberOf` | This is the default name for TFE's group [attribute][]. You can change the name of this attribute in [TFE's SAML settings](/terraform/enterprise/saml/configuration) if necessary. | + | **Name Format** (drop-down) | Basic | | + | **Filter** | | A filter type and filter value that will match all of the relevant groups that each user belongs to. The exact filter expression depends on how your Okta groups are configured, and which subset of groups you want to expose to TFE. Note that Terraform Enterprise ignores group names that do not correspond to existing Terraform Enterprise teams. Refer to [Team Membership Mapping](/terraform/enterprise/saml/team-membership) for more details. | + +1. Click **Preview the SAML Assertion** and make sure it matches your expectations. Click **Next**. + +1. Select **I'm an Okta customer adding an internal app**, and then click **Finish**. + +1. Finish configuring the SAML app in Okta, and then copy the provided endpoint URLs and certificate to your Terraform Enterprise SAML settings at `https:///app/admin/saml` (example below). Terraform Enterprise requires a single sign-on URL, a single log-out URL, and a PEM (base64) encoded X.509 certificate. + +[attribute]: /terraform/enterprise/saml/attributes + +[login_url]: /terraform/enterprise/saml/login + +## Example SAMLResponse + +```xml + + + http://www.okta.com/1 + + + + + + + + + + + + + 000000000000000000000000000= + + + 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000== + + + 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000== + + + + + + + + http://www.okta.com/1 + + + + + + + + + + + + + 000000000000000000000000000= + + + 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000== + + + 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000== + + + + + user@example.com + + + + + + + https://example.com/users/saml/metadata + + + + + urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport + + + + + new_username + + + devs + reviewers + + + + +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/onelogin.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/onelogin.mdx new file mode 100644 index 000000000..d711a17f4 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/idp-configuration/onelogin.mdx @@ -0,0 +1,93 @@ +--- +page_title: Configure OneLogin as the identity provider for Terraform Enterprise +description: >- + Learn how to use OneLogin as the identity provider for Terraform Enterprise when setting up single-sign on (SSO) over SAML. +--- + +# Configure a OneLogin Identity Provider + +Follow these steps to configure OneLogin as the identity provider (IdP) for Terraform Enterprise. + +1. Add a OneLogin app by going to Apps > Add Apps then searching for "SAML Test Connector (IdP)". +1. In the "Info" tab, enter an app name for Terraform Enterprise in the "Display Name" field. + ![image](/img/docs/sso-onelogin-info.png) +1. In the "Configuration" tab, configure the service provider audience and recipient URLs. These are shown in your Terraform Enterprise SAML settings at `https:///app/admin/saml`. + ![image](/img/docs/sso-onelogin-configuration.png) +1. In the "Parameters" tab, map the NameId and MemberOf parameters. + ![image](/img/docs/sso-onelogin-parameters.png) + ![image](/img/docs/sso-onelogin-parameters-memberof.png) +1. In the "SSO" tab, copy the endpoint URLs and certificate, then paste them into your Terraform Enterprise SAML settings at `https:///app/admin/saml` (use the certificate's "View Details" link to copy its PEM-encoded text representation). + ![image](/img/docs/sso-onelogin-sso.png) + ![image](/img/docs/sso-onelogin-sso-certificate.png) +1. In the "Access" tab, enable access for specific roles. + ![image](/img/docs/sso-onelogin-access.png) +1. In the "Users" tab, add users and specify their roles. + ![image](/img/docs/sso-onelogin-users-fields.png) + ![image](/img/docs/sso-onelogin-users.png) + +## Terraform Enterprise SAML SSO settings + +Verify the endpoint URLs, certificate, and attribute mappings are correct in the SAML SSO settings. + +## Additional Resources + +[Create Mappings to Automatically Assign Roles to Users](https://onelogin.service-now.com/kb_view_customer.do?sysparm_article=KB0010625) + + +## Example SAMLResponse + +```xml + + https://example.com/saml/metadata/1 + + + + + https://app.onelogin.com/saml/metadata/1 + + + + + + + + + + + 000000000000000000000000000= + + + 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000== + + + 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000== + + + + + user@example.com + + + + + + https://example.com/users/saml/metadata + + + + + urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport + + + + + new-username + + + devs + reviewers + + + + +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/login.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/login.mdx new file mode 100644 index 000000000..bc4287221 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/login.mdx @@ -0,0 +1,18 @@ +--- +page_title: Log into Terraform Enterprise with SAML +description: >- + Log into Terrafrom Enterprise after configuring SAML. Learn how to visit the login page and how admins can change the user API + token session timeout. +--- + +# Log into Terraform Enterprise with SAML + +Once you configure SAML, Terraform users can visit `https:///session` to login. + +Users can follow the link to complete the SAML login process with the identity provider. If they log in for the first time, Terraform Enterprise creates an account for them. Their username auto-generates from their email address using the text before the `@`. The username only contains alphanumeric characters, `-`, or `_`. All invalid characters convert to `_`. + +## API Token Expiration + +When you initially enable SAML or when a user's SAML-authenticated web session expires, existing user API tokens also temporarily disable until they reauthenticate at `https:///session`. This arrangement is because Terraform Enterprise relies on your identity provider for [team membership mapping](/terraform/enterprise/saml/team-membership) and a user might have been added to or removed from some teams since their session expired. This restriction only affects user tokens, not [team or organization tokens](/terraform/enterprise/users-teams-organizations/api-tokens). + +The API token session timeout is a site-wide setting that is configurable in the admin settings at `https:///app/admin/saml`. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/team-membership.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/team-membership.mdx new file mode 100644 index 000000000..6a4b43de6 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/team-membership.mdx @@ -0,0 +1,44 @@ +--- +page_title: Enable the SAML identity provider to control team membership mapping +description: You can enable the SAML IdP to control team membership mapping. Learn how to automatically add users to teams based on their SAML assertion. +--- + +# Enable the SAML Identity Provider to Map Team Membership + +Terraform Enterprise can automatically add users to teams based on their SAML assertion so you can manage team membership in your directory service. + +## Configure Team Membership Mapping + +Enable the **Use SAML to manage team memberships** option on ths site administation page to allow the SAML identity provider to control team membership. + +When you enable it, you must specify the name of a SAML attribute in the [Team Attribute Name](/terraform/enterprise/saml/configuration#attributes) setting, and make sure the AttributeStatement in the SAMLResponse contains a list of AttributeValue items in the correct format. + +When team membership management is enabled, users logging in via SAML are automatically added to the teams included in their assertion, and automatically removed from any teams that _aren't_ included in their assertion. This overrides any manually set team memberships; whenever the user logs in, their team membership is adjusted to match their SAML assertion. + +Any team names that don't match existing teams are ignored; Terraform Enterprise will not automatically create new teams. + +To disable team membership mapping, uncheck the "Use SAML to manage team memberships" checkbox in the SAML admin page. With mapping disabled, Terraform Enterprise won't automatically manage team membership on login, and you can manually add users to teams via the organization's Teams page. + +## Team Names and SSO Team IDs + +Terraform Enterprise expects the team names in the team membership SAML attribute to exactly match its own team names, or its configured SSO Team IDs. This match is case sensitive. + +SSO Team IDs can be configured via the organization's Teams page. If one is configured, Terraform Enterprise will also attempt to match the chosen SAML attribute against the SSO Team ID (in addition to the team name) when mapping users to teams. This is useful if the chosen team membership SAML attribute is not human readable, and is not used as the team's name in Terraform Enterprise. + +Note that team names are unique across an organization but not necessarily unique across a whole Terraform Enterprise instance. If a user is a member of multiple organizations, their SAML assertion might add them to similarly-named teams in each organization. Keep this in mind when naming your teams. + +## Managing Membership of the Owners Team + +Since [the "owners" team](/terraform/enterprise/users-teams-organizations/teams#the-owners-team) is especially important, Terraform Enterprise defaults to NOT managing its membership via SAML. Unless you specifically enable it, Terraform Enterprise won't automatically add or remove any owners, and you can manually manage membership via the teams page. + +You can enable automatic membership in the owners team (on a per-organization basis) by explicitly specifying an alias (role ID) for it. On your organization settings page, click "Teams" and then click the owners team. If SAML is enabled, there will be a "SAML Role ID" field. Enter a legal team name as an ID and click "Save." The ID can be "owners," but it cannot conflict with any other team name. + +Before enabling membership mapping for owners, double-check that your chosen role ID appears in the SAML assertion for users who should be owners. It's worth some extra effort to avoid accidentally removing people from the owners team. + +## Site Admins + +If the "Site Admin Role" setting (in [the SAML settings](/terraform/enterprise/saml/configuration)) is enabled, the selected special team name (default: `site-admins`) will add a user as a [site admin](/terraform/enterprise/application-administration) for the Terraform Enterprise instance. + +-> **Note:** Instead of treating site admins like a team, we recommend using the "Site Admin Attribute Name" setting, which manages admin access via a dedicated SAML attribute. If enabled, this attribute overrides the special site admin team name. + +Site admins can also always log in to Terraform Enterprise directly. If they are disabled on the identity provider but still enabled in Terraform Enterprise and bypass SSO, they will still be able to log in. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/saml/troubleshooting.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/troubleshooting.mdx new file mode 100644 index 000000000..4edac4f3a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/saml/troubleshooting.mdx @@ -0,0 +1,138 @@ +--- +page_title: Troubleshoot SAML SSO integrations for Terraform Enterprise +description: >- + Terraform Enterprise includes debugging functionality to help you troubleshoot SAML SSO issues. Learn how SAML single sign-on troubleshooting tasks. +--- + +# Troubleshoot SAML SSO Integrations + +This topic describes troubleshooting steps for debugging SAML single sign-on integrations for Terraform Enterprise. + +## Requirements + +You must use Terraform Enterprise v201807-2 or later to use debugging functionality. If you would like assistance with upgrading, [contact support](/terraform/enterprise/deploy/troubleshoot/contact-support). + +## Disable SAML Single Sign-On + +Before starting, disable SAML SSO by going to `https:///app/admin/saml` and unchecking the Enable SAML Single Sign-On checkbox. It's best to start from a clean setup. + +## Create a non-SSO admin account for recovery + +Before troubleshooting, create a non-SSO admin account with an email address not associated with your identity provider (such as SAML). + +This non-SSO admin account allows you to log in circumstances where someone accidentally revokes admin access to other SAML-controlled accounts. If your spare non-SSO admin account uses the same email address as your SAML-controlled account, both accounts are affected if your SAML-controlled account loses admin access. + +### Terraform Enterprise UI + +Open `https:///signup/account` to create the account. Make sure to grant admin access to this user and verify they can log in at `https:///`. + +### Rails console + +You can also use Rails commands to create a non-SSO admin account. +You should only use the following commands when you cannot access a Terraform Enterprise instance through the UI due to a lack of a non-SSO recovery admin account. Refer to [Terraform Enterprise UI](#terraform-enterprise-ui) for additional information. +1. Access the Rails console by running the following command to attach to the Terraform Enterprise container: + + + + + ```shell-session + sudo docker exec -ti ptfe_atlas /usr/bin/init.sh /app/scripts/wait-for-token -- bash -ic 'cd /app && bin/rails c' + ``` + + + + + ```shell-session + sudo docker exec -ti tfe-atlas /usr/bin/init.sh /app/scripts/wait-for-token -- bash -ic 'cd /app && bin/rails c' + ``` + + + + +1. Create a user in the Rails console and assign it to a `u` variable: + + ```ruby + u = User.create!(email: "example@email.com", username: "example", password: "example", is_admin: true) + ``` + +1. Confirm the user. If you skip this step, Terraform Enterprise sends a request confirmation email: + + ```ruby + u.confirm + u.save + ``` + +1. Use the Rails console to add the new user to your organization's owners team: + + ```ruby + Organization.find_by_name("your-org").add_owner!(u) + ``` + +1. Log into the Terraform Enterprise instance as the new user and disable or reconfigure SSO to allow general access to the system. + +## Enable SAML SSO and SAML debugging + +### Enable SAML SSO + +Enable SAML SSO by following the [configuration instructions](/terraform/enterprise/saml/configuration). + +### Enable SAML debugging + +Enable SAML debugging by going to `https:///app/admin/saml`. + +![image](/img/docs/saml-sso-enable.png) + +## Test sign-on + +Try signing on by going to `https:///` and clicking the "Log in via SAML" button. Verify the page says `WARNING: SAML debugging is enabled`. + +If login fails, the SAMLResponse XML document sent from the identity provider is shown. The XML document may contain the user's username, list of roles, and other attributes. Checking the format of the email address and username and whether the desired list of roles is included may assist with debugging. + +![image](/img/docs/saml-response.png) + +If there is a configuration error, that is also shown on the login form. + +![image](/img/docs/saml-error.png) + +Fix the configuration error and try to log in again. + +## Common configuration errors + +Most errors will be from misconfiguration and will be shown in the red box on the Terraform Enterprise login form. If you have configured Terraform Enterprise to use an identity provider then be sure to manage users in the identity provider rather than Terraform Enterprise. Specifically, do not suspend identity provider managed users through Terraform Enterprise. + +**CONFIGURATION ERROR: `https:///metadata` is not a valid audience for this Response - Valid audiences: `https:///users/saml/metadata`**
+The audience URL was not configured correctly in the identity provider.
+**How to resolve:** Open the Terraform Enterprise admin settings for SAML SSO, copy the ACS Consumer URL, then paste it into the identity provider settings. + +**CONFIGURATION ERROR: The response was received at `https:///auth` instead of `https:///users/saml/auth`**
+The recipient URL was not configured correctly in the identity provider.
+**How to resolve:** Open the Terraform Enterprise admin settings for SAML SSO, copy the Metadata URL, then paste it into the identity provider settings. + +**CONFIGURATION ERROR: Invalid Signature on SAML Response**
+Incorrect IdP certificate stored on Terraform Enterprise.
+**How to resolve:** Open the Terraform Enterprise admin settings for SAML SSO, and then paste the correct certificate under IDP certificate. + +**ERROR: Validation failed: Email is invalid, Email is not a valid email address, Username has already been taken**
+NameID is invalid. It must be an email address.
+**How to resolve:** Open the identity provider settings and configure email address as the value for NameID. + +**ERROR: Mail::AddressList can not parse |{onelogin:email}|: Only able to parse up to "{onelogin:email}"**
+The NameID that was received was blank.
+**How to resolve:** Open the identity provider settings and configure email address as the value for NameID. + +**ERROR: nested asn1 error**
+The identity provider certificate is invalid or was not pasted correctly into Terraform Enterprise.
+**How to resolve:** Open the identity provider settings, copy the certificate, then paste it into the "IDP Certificate" field in Terraform Enterprise. + +**ERROR: Issuer of assertion not found or multiple**
+Terraform Enterprise was unable to determine the issuer of the SAML response.
+**How to resolve:** The most common reason for this issue is that an F5 load balancer is not signing responses, resulting in the `` and related elements not being present. Follow the steps under **Configuring SAML SP Connectors** on [Using APM as a SAML IdP](https://support.f5.com/kb/en-us/products/big-ip_apm/manuals/product/apm-authentication-single-sign-on-12-1-0/29.html), particularly step 9c. If you are not using an F5 as part of your SAML setup, see below to contact support. + +## Contacting support + +If you're not able to resolve the error using the steps above, [contact out to support](/terraform/enterprise//deploy/troubleshoot/contact-support). When contacting support, please provide: + +- A screenshot of "SAML Response" and "Processed attributes" shown on the login page after failed login. +- A screenshot of the error on the login page. +- The [SAMLResponse XML document](/terraform/enterprise/saml/idp-configuration#example-samlresponse). +- A [support bundle](/terraform/enterprise//deploy/troubleshoot/contact-support). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/2fa.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/2fa.mdx new file mode 100644 index 000000000..e344aa94d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/2fa.mdx @@ -0,0 +1,47 @@ +--- +page_title: Configure two-factor authentication +description: Use two-factor authentication to secure access to Terraform Enterprise. +source: terraform-docs-common +--- + +# Configure two-factor authentication + +User accounts can be additionally protected with two-factor authentication (2FA), and an organization owner can make this a requirement for all users. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Setting up Two-factor Authentication + +To reach your user security settings page: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise. +2. Click the user icon in the upper right corner of the screen. +3. Choose **Account Settings** from the menu. + +Once on this page you can set-up authentication with either a TOTP-compliant application and/or an SMS-enabled phone number. Choose your preferred authentication method and enter a phone number (optional if using an application), then follow the instructions to finish the configuration. If you are using an application, you must scan a QR code to enable it; for either method, you must enter valid authentication codes to verify a successful set-up. + +After you finish, the two-factor authentication settings will change to show your currently configured authentication method. You can click the "Reveal codes" link to view backup codes, or use the "Disable 2FA" button to disable two-factor authentication. + +## Logging in with Two-factor Authentication + +After two-factor authentication has been successfully set-up you will need to enter the code from your TOTP-compliant application or from an SMS sent to your approved SMS-enabled phone number on login. + +If necessary you can also use a backup code by clicking "Use a recovery code". Please remember that each backup code can only be used to log in once. + +## Requiring Two-factor Authentication for All Users + +If you are an organization owner you can require all users within your organization to use two-factor authentication. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Click **Settings** in your organization to reach your organization'a settings page, then click **Authentication**. + +Click the button "Require two-factor". Please remember that all organization owners must have two-factor authentication on before this can be set. + +## Requiring Two-factor Authentication for Users with HashiCorp Cloud Platform + +When you require two-factor authentication for all users and have users who [sign in with their HashiCorp Cloud Platform account](/terraform/enterprise/users-teams-organizations/users#log-in-with-your-hashicorp-cloud-platform-account), the required configuration for each organization member depends on their linked HashiCorp Cloud identity: + +- **Email**: Follow the instructions in the [HashiCorp Cloud MFA](/hcp/docs/hcp/admin/iam/mfa) docs. +- **GitHub**: Follow the instructions in the [Configuring GitHub two-factor authentication](https://docs.github.com/en/authentication/securing-your-account-with-two-factor-authentication-2fa/configuring-two-factor-authentication) docs. +- **SSO**: HCP Terraform does not currently support HCP SSO accounts. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/api-tokens.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/api-tokens.mdx new file mode 100644 index 000000000..54b269b56 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/api-tokens.mdx @@ -0,0 +1,125 @@ +--- +page_title: Manage API tokens for Terraform Enterprise +description: >- + Use API tokens to authenticate with Terraform Enterprise and perform API + operations. +source: terraform-docs-common +--- + +# API Tokens + +This topic describes the distinct types of API tokens you can use to authenticate with HCP Terraform. + +Note that HCP Terraform only displays API tokens once when you initially create them and are obfuscated thereafter. If the token is lost, it must be regenerated. + +Refer to [Team Token API](/terraform/enterprise/api-docs/team-tokens) and [Organization Token API](/terraform/enterprise/api-docs/organization-tokens) for additional information about using the APIs. + +## User API Tokens + +API tokens may belong directly to a user. User tokens are the most flexible token type because they inherit permissions from the user they are associated with. For more information on user tokens and how to generate them, see the [Users](/terraform/enterprise/users-teams-organizations/users#api-tokens) documentation. + +## Team API Tokens + +API tokens may belong to a specific team. Team API tokens allow access to the workspaces that the team has access to, without being tied to any specific user. + +Navigate to the **Organization settings > API Tokens > Team Token** tab to manage API tokens for a team or create new team tokens. + +Each team can have **one** valid API token at a time. When a token is regenerated, the previous token immediately becomes invalid. + +Owners and users with [manage teams](/terraform/enterprise/users-teams-organizations/permissions#manage-teams) permissions have the ability to enable and disable team token management for a team, which limits the actions that team members can take on a team token. Refer to [Allow Member Token Management](/terraform/enterprise/users-teams-organizations/permissions#allow-member-token-management) for more information. + +Team API tokens are designed for performing API operations on workspaces. They have the same access level to the workspaces the team has access to. For example, if a team has permission to apply runs on a workspace, the team's token can create runs and configuration versions for that workspace via the API. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Note that the individual members of a team can usually perform actions the team itself cannot, since users can belong to multiple teams, can belong to multiple organizations, and can authenticate with Terraform's `atlas` backend for running Terraform locally. + +If an API token is generated for the "owners" team, then that API token will have all of the same permissions that an organization owner would. + +## Organization API Tokens + +API tokens may be generated for a specific organization. Organization API tokens allow access to the organization-level settings and resources, without being tied to any specific team or user. + +To manage the API token for an organization, go to **Organization settings > API Token** and use the controls under the "Organization Tokens" header. + +Each organization can have **one** valid API token at a time. Only [organization owners](/terraform/enterprise/users-teams-organizations/teams#the-owners-team) can generate or revoke an organization's token. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Organization API tokens are designed for creating and configuring workspaces and teams. We don't recommend using them as an all-purpose interface to HCP Terraform; their purpose is to do some initial setup before delegating a workspace to a team. For more routine interactions with workspaces, use [team API tokens](#team-api-tokens). + +Organization API tokens have permissions across the entire organization. They can perform all CRUD operations on most resources, but have some limitations; most importantly, they cannot start runs or create configuration versions. Any API endpoints that can't be used with an organization API token include a note like the following: + +-> **Note:** This endpoint cannot be accessed with [organization tokens](#organization-api-tokens). You must access it with a [user token](/terraform/enterprise/users-teams-organizations/users#api-tokens) or [team token](#team-api-tokens). + + + +## Audit trail tokens + +You can generate an audit trails token to read an organization's [audit trails](/terraform/enterprise/api-docs/audit-trails). Use this token type to authenticate integrations pulling audit trail data, for example, using the [HCP Terraform for Splunk](/terraform/enterprise/integrations/splunk) app. + +To manage an organization's audit trails token, go to **Organization settings > API Token** and use the settings under the "Audit Token" header. + +Each organization can only have a _single_ valid audit trails token. Only [organization owners](/terraform/enterprise/users-teams-organizations/teams#the-owners-team) can generate or revoke an organization's audit trails token. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + + + +## Agent API Tokens + +[Agent pools](/terraform/cloud-docs/agents) have their own set of API tokens which allow agents to communicate with HCP Terraform, scoped to an organization. These tokens are not valid for direct usage in the HCP Terraform API and are only used by agents. + +## Access Levels + +The following chart illustrates the various access levels for the supported API token types. Some permissions are implicit based on the token type, others are dependent on the permissions of the associated user, team, or organization. + +🔵 = Implicit for token type 🔶 = Requires explicit permission + +| | User tokens | Team tokens | Organization tokens | +| ---------------------------------- | :---------: | :---------: | :-----------------: | +| **Users** | | | | +| Manage account settings | 🔵 | | | +| Manage user tokens | 🔵 | | | +| **Workspaces** | | | | +| Read workspace variables | 🔶 | 🔶 | 🔵 | +| Write workspace variables | 🔶 | 🔶 | 🔵 | +| Plan, apply, upload states | 🔶 | 🔶 | | +| Force cancel runs | 🔶 | 🔶 | | +| Create configuration versions | 🔶 | 🔶 | | +| Create or modify workspaces | 🔶 | 🔶 | 🔵 | +| Remote operations | 🔶 | 🔶 | | +| Manage run triggers | 🔶 | 🔶 | 🔵 | +| Manage notification configurations | 🔶 | 🔶 | | +| Manage run tasks | 🔶 | 🔶 | 🔵 | +| **Teams** | | | | +| Create teams | 🔶 | 🔶 | 🔵 | +| Modify team | 🔶 | 🔶 | 🔵 | +| Read team | 🔶 | 🔶 | 🔵 | +| Manage team tokens | 🔶 | 🔶 | 🔵 | +| Manage team workspace access | 🔶 | 🔶 | 🔵 | +| Manage team membership | 🔶 | 🔶 | 🔵 | +| **Organizations** | | | | +| Create organizations | 🔵 | | | +| Modify organizations | 🔶 | | | +| Manage organization tokens | 🔶 | | | +| View audit trails | | | 🔵 | +| Invite users to organization | 🔶 | 🔶 | 🔵 | +| **Sentinel** | | | | +| Manage Sentinel policies | 🔶 | 🔶 | 🔵 | +| Manage policy sets | 🔶 | 🔶 | 🔵 | +| Override policy checks | 🔶 | 🔶 | | +| **Integrations** | | | | +| Manage VCS connections | 🔶 | 🔶 | 🔵 | +| Manage SSH keys | 🔶 | 🔶 | | +| Manage run tasks | 🔶 | 🔶 | 🔵 | +| **Modules** | | | | +| Manage Terraform modules | 🔶 | 🔵 (owners) | | + +## Token Expiration + +You can create user, team, and organization tokens with an expiration date and time. Once the expiration time has passed, the token is longer treated as valid and may not be used to authenticate to any API. Any API requests made with an expired token will fail. + +HashiCorp recommends setting an expiration on all new authentication tokens. Creating tokens with an expiration date helps reduce the risk of accidentally leaking valid tokens or forgetting to delete tokens meant for a delegated use once their intended purpose is complete. + +You can not modify the expiration of a token once you have created it. The HCP Terraform UI displays tokens relative to the current user's timezone, but all tokens are passed and displayed in UTC in ISO 8601 format through the HCP Terraform API. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/index.mdx new file mode 100644 index 000000000..60d193bf5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/index.mdx @@ -0,0 +1,337 @@ +--- +page_title: Organizations overview +description: >- + Organizations are groups of projects and workspaces that let teams + collaborate. Learn how to create and manage Terraform Enterprise + organizations. +source: terraform-docs-common +--- + +[teams]: /terraform/enterprise/users-teams-organizations/teams + +[users]: /terraform/enterprise/users-teams-organizations/users + +[owners]: /terraform/enterprise/users-teams-organizations/teams#the-owners-team + +# Organizations overview + +This topic provides overview information about how to create and manage organizations in HCP Terraform and Terraform Enterprise. An organization contains one or more projects. + +## Requirements + +The **admin** permission preset must be enabled on your profile to create and manage organizations in the HCP Terraform UI. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions) for additional information. + +## API and Terraform Enterprise Provider + +In addition to the HCP Terraform UI, you can use the following methods to manage organizations: + +- [Organizations API](/terraform/enterprise/api-docs/organizations) +- The `tfe` provider [`tfe_organization`](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/organization) resource + +## Select an organization + +HCP Terraform displays your current organization in the sidebar. To select an organization: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise. +2. Click the current organization name to view a list of all the organizations where you are a member. +3. Click an organization to select it. HCP Terraform displays list of workspaces within that organization. + +## Join an organization + +To join an organization, the organization [owners][] or a user with specific [team management](/terraform/enterprise/users-teams-organizations/permissions#team-management-permissions) permissions must invite you, and you must accept the emailed invitation. [Learn more](#users). + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Leave an organization + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and click the Terraform logo in the page header to navigate to the **Organizations** page. +2. Open the **...** ellipses menu next to the organization and select **Leave organization**. + +You do not need permission from the owners to leave an organization, but you cannot leave if you are the last member of the owners team. Either add a new owner and then leave, or [delete the organization](/terraform/enterprise/users-teams-organizations/organizations#general). + +## Create an organization + + + +On Terraform Enterprise, administrators can restrict your ability to create organizations. Refer to [Organization Creation](/terraform/enterprise/admin/application/general#organization-creation) for details. + + + +On HCP Terraform, any user can create a new organization. If you do not belong to any organizations, HCP Terraform prompts you to create one the first time you [sign in](https://app.terraform.io/). To create an organization: + +1. Click the current organization name and select **Create new organization**. The **Create a new organization** page appears. +2. Enter a unique **Organization name** Organization names can include numbers, letters, underscores (`_`), and hyphens (`-`). +3. Provide an **Email address** to receive notifications about the organization. +4. Click **Create organization**. + +HCP Terraform shows the new organization and prompts you to create a new workspace. You can also [invite other users](#users) to join the organization. + + + +## Managed resources + +Your organization’s managed resource count helps you understand the number of infrastructure resources that HCP Terraform manages across all your workspaces. + +HCP Terraform reads all the workspaces’ state files to determine the total number of managed resources. Each [resource](/terraform/language/resources/syntax) instance in the state equals one managed resource. HCP Terraform includes resources in modules and each resource created with the `count` or `for_each` meta-arguments. HCP Terraform does not include [data sources](/terraform/language/data-sources) in the count. Refer to [Managed Resources Count](/terraform/enterprise/workspaces/state#managed-resources-count) in the workspace state documentation for more details. + +You can view your organization's managed resource count on the **Usage** page. + + + +## Create and manage reserved tag keys + + +You can define reserved tag keys that appear as suggested labels when managers want to add tags to their projects and workspaces in the organization. Refer to [Create and manage reserved tag keys](/terraform/enterprise/users-teams-organizations/organizations/manage-reserved-tags) for instructions. + +You can also view single-value tags that may already be attached to projects and workspaces. Refer to [Tags](#tags) in the organization settings reference for additional information. + +## Managing settings + +To view and manage an organization's settings, click **Settings**. + +The contents of the organization settings depends on your permissions within the organization. All users can review the organization's contact email, view the membership of any teams they belong to, and view the organization's authentication policy. [Organization owners][owners] can view and manage the entire list of organization settings. Refer to [Organization Permissions](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions) for details. + +You may be able to manage the following organization settings. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Organization settings + +#### General + +Review the organization name and contact email. Organization owners can choose to change the organization name, contact email, and the default execution mode, or delete the organization. When an organization owner updates the default execution mode, all workspaces configured to [inherit this value](/terraform/enterprise/workspaces/settings#execution-mode) will be affected. + +Organization owners can also choose whether [workspace administrators](/terraform/enterprise/users-teams-organizations/permissions#workspace-admins) can delete workspaces that are managing resources. Deleting a workspace with resources under management introduces risk because Terraform can no longer track or manage the infrastructure. The workspace's users must manually delete any remaining resources or [import](/terraform/cli/commands/import) them into another Terraform workspace. + + + +Organization owners using HCP Terraform Plus edition can choose whether members with [module management permissions](/terraform/enterprise/users-teams-organizations/permissions#manage-private-registry) can [generate module tests](/terraform/enterprise/registry/test#generated-module-tests). + + + +##### Renaming an organization + +!> **Warning:** Deleting or renaming an organization can be very disruptive. We strongly recommend against deleting or renaming organizations with active members. + +To rename an organization that manages infrastructure: + +1. Alert all members of the organization about the name change. +2. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to rename. +3. Cancel in progress and pending runs or wait for them to finish. HCP Terraform cannot change the name of an organization with runs in progress. +4. Lock all workspaces to ensure that no new runs will start before you change the name. +5. Rename the organization. +6. Update all components using the HCP Terraform API to the new organization name. This includes Terraform's `cloud` block CLI integration, the `tfe` Terraform provider, and any external API integrations. +7. Unlock workspaces and resume normal operations. + +#### Plan & Billing + +Review the organization's plan and any invoices for previous plan payments. Organization owners can also upgrade to one of HCP Terraform's paid plans, downgrade to a free plan, or begin a free trial of paid features. + +#### Tags + +Click the **Tags** tab in the **Tags Management** screen to view single-value tags that may have already been created in your system. The table on lists the tags in the system, the number of times a tag appears in a project or workspace, and the date the tag was created. + +The only action you can perform in the UI is deleting single-value tags from the system. You can use the following methods to delete single-value tags: + +1. Select one or more tags and click **Delete tags**. +2. Select the **Name** header to select all tags, then click **Delete tags**. +3. Click the trash icon for a tag and confirm that you want to permanently delete it when prompted. + +#### Teams + + + +@include 'tfc-package-callouts/team-management.mdx' + + + +All users in an organization can access the **Teams** page, which displays a list of [teams][] within the organization. + +Organization owners and users with the [include secret teams permission](/terraform/enterprise/users-teams-organizations/permissions#include-secret-teams) can: + +- view all [secret teams](/terraform/enterprise/users-teams-organizations/teams/manage#team-visibility) +- view each team's membership +- manage team API tokens + +HCP Terraform restricts team creation, team deletion, and management of team API tokens to organization owners and users with the [manage teams](/terraform/enterprise/users-teams-organizations/permissions#manage-teams) permission. Organization owners and users with the [manage membership](/terraform/enterprise/users-teams-organizations/permissions#manage-membership) permission can manage team membership. Remember that users must accept their organization invitations before you can add them to a team. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +#### Users + +Organization owners and users with [manage membership](/terraform/enterprise/users-teams-organizations/permissions#manage-membership) permissions can invite HCP Terraform users into the organization, cancel invitations, and remove existing members. + +The list of users is separated into one tab for active users and one tab for invited users who have not yet accepted their invitations. For active users, the list includes usernames, email addresses, avatar icons, two-factor authentication status, and current team memberships. Use the **Search by username or email** field to filter these lists. + +User invitations are always sent by email; you cannot invite someone using their HCP Terraform username. To invite a user to an organization: + +1. Click **Invite a user**. The **invite a user** box appears. +2. Enter the user's email address and optionally add them to one or more teams. If the user accepts the invitation, HCP Terraform automatically adds them to the specified teams. + +All permissions in HCP Terraform are managed through teams. Users can join an organization without belonging to any teams, but they cannot use HCP Terraform features until they belong to a team. Refer to [permissions](/terraform/enterprise/users-teams-organizations/permissions) for details. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +#### Variable Sets + +View all of the available variable sets and their variables. Users with [**Manage variable set** permissions](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets) can create variable sets and assign them to one or more projects or workspaces. + +Variable sets let you reuse the same variables across multiple workspaces or projects in an organization. For example, you could define a variable set of provider credentials and automatically apply it to several projects or workspaces, rather than manually defining credential variables in each. Changes to variable sets instantly apply to all appropriate workspaces, saving time and reducing errors from manual updates. + +Refer to the [variables overview](/terraform/enterprise/workspaces/variables) documentation for details about variable types, scope, and precedence. Refer to [managing variables](/terraform/enterprise/workspaces/variables/managing-variables) for details about how to create and manage variable sets. + +#### Health + + + +@include 'tfc-package-callouts/health-assessments.mdx' + + + +HCP Terraform can perform automatic health assessments in a workspace to assess whether its real infrastructure matches the requirements defined in its Terraform configuration. Health assessments include the following types of evaluations: + +- Drift detection determines whether your real-world infrastructure matches your Terraform configuration. Drift detection requires Terraform version 0.15.4+. +- Continuous validation determines whether custom conditions in the workspace’s configuration continue to pass after Terraform provisions the infrastructure. Continuous validation requires Terraform version 1.3.0+. + +You can enforce health assessments for all eligible workspaces or let each workspace opt in to health assessments through workspace settings. Refer to [Health](/terraform/enterprise/workspaces/health) in the workspaces documentation for more details. + +#### Runs + +From the Workspaces page, click **Settings** in the sidebar, then **Runs** to view all of the current runs in your organization's workspaces. The **Runs** page displays: + +- The name of the run +- The run's ID +- What triggered the run +- The workspace and project where the run is taking place +- When the latest change in the run occurred +- A button allowing you to cancel that run + +You can apply the following filters to limit the runs HCP Terraform displays: + +- Click **Needs Attention** to display runs that require user input to continue, such as approving a plan or overriding a policy. +- Click **Running** to display runs that are in progress. +- Click **On Hold** to display paused runs. + +For precise filtering, click **More filters** and check the boxes to filter runs by specific [run statuses](/terraform/enterprise/run/states), [run operations](/terraform/enterprise/run/modes-and-options), workspaces, or [agent pools](/terraform/cloud-docs/agents/agent-pools). Click **Apply filters** to list the runs that match your criteria. + +You can dismiss any of your filtering criteria by clicking the **X** next to the filter name above the table displaying your runs. + +For more details about run states, refer to [Run States and Stages](/terraform/enterprise/run/states). + +### Integrations + +#### Cost Estimation + +Enable and disable the [cost estimation](/terraform/enterprise/cost-estimation) feature for all workspaces. + +#### Policies + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Policies let you define and enforce rules for Terraform runs. You can write them using either the [Sentinel](/terraform/enterprise/policy-enforcement/sentinel) or [Open Policy Agent (OPA)](/terraform/enterprise/policy-enforcement/opa) policy-as-code frameworks and then group them into policy sets that you can apply to workspaces in your organization. To create policies and policy sets, you must have [permission to manage policies](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions). + +#### Policy Sets + + + +@include 'tfc-package-callouts/policies.mdx' + + + +Create groups of policies and enforce those policy sets globally or on specific [projects](/terraform/enterprise/projects/manage) and workspaces. You can create policy sets through the Terraform API, by connecting a VCS repository containing policies, or directly in HCP Terraform. To create policies and policy sets, you must have [permission to manage policies](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions). + +Refer to [Managing Policy Sets](/terraform/enterprise/policy-enforcement/manage-policy-sets) for details. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +#### Run Tasks + + + +@include 'tfc-package-callouts/run-tasks.mdx' + + + +Manage the run tasks that you can add to workspaces within the organization. [Run tasks](/terraform/enterprise/workspaces/settings/run-tasks) let you integrate third-party tools and services at specific stages in the HCP Terraform run lifecycle. + +### Security + +#### Agents + + + +@include 'tfc-package-callouts/agents.mdx' + + + +Create and manage [HCP Terraform agent pools](/terraform/cloud-docs/agents). HCP Terraform agents let HCP Terraform communicate with isolated, private, or on-premises infrastructure. This is useful for on-premises infrastructure types such as vSphere, Nutanix, OpenStack, enterprise networking providers, and infrastructure within a protected enclave. + +#### API Tokens + +Organization owners can set up a special [Organization API Token](/terraform/enterprise/users-teams-organizations/api-tokens) that is not associated with a specific user or team. + +#### Authentication + +Organization owners can determine when users must reauthenticate and require [two-factor authentication](/terraform/enterprise/users-teams-organizations/2fa) for all members of the organization. + +#### SSH Keys + +Manage [SSH keys for cloning Git-based modules](/terraform/enterprise/workspaces/settings/ssh-keys) during Terraform runs. This does not include keys to access a connected VCS provider. + +#### SSO + +Organization owners can set up an SSO provider for the organization. + +### Version Control + +#### VCS General + +Configure [Automatically cancel plan-only runs triggered by outdated commits](/terraform/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management) to manage the setting. + +#### VCS Events + +-> **Note:** This feature is in beta. + +Review the event logs for GitLab.com connections. + +#### VCS Providers + +Configure [VCS providers](/terraform/enterprise/vcs) to use in the organization. You must have [permission to manage VCS settings](/terraform/enterprise/users-teams-organizations/permissions). + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Destruction and Deletion + +#### Data Retention Policies + + +Data retention policies are exclusive to Terraform Enterprise, and not available in HCP Terraform.
Learn more about Terraform Enterprise. +
+ +An organization owner can set or override the following data retention policies: + +- **Admin default policy** +- **Do not auto-delete** +- **Auto-delete data** + +Setting the data retention policy to **Admin default policy** disables the other data retention policy settings. + +By default, the **Do not auto-delete** option is enabled for an organization. This option directs Terraform Enterprise to retain data associated with configuration and state versions, but organization owners can define configurable data retention policies that allow Terraform to _soft delete_ the backing data associated with configuration versions and state versions. Soft deleting refers to marking a data object for garbage collection so that Terraform can delete the object after a set number of days. + +Once an object is soft deleted, any attempts to read the object will fail. Until the garbage collection process begins, you can restore soft deleted objects using the APIs described in the [configuration version documentation](/terraform/enterprise/api-docs/configuration-versions) and the [state version documentation](/terraform/enterprise/api-docs/state-versions). Terraform permanently deletes the archivist storage after the garbage collection grace period elapses. + +The organization policy is the default policy applied to all workspaces, but members of individual workspaces can set overriding policies for their workspaces that take precedence over the organization policy. + +## Trial Expired Organizations + +HCP Terraform paid features are available as a free trial. When a free trial has expired, the organization displays a banner reading **TRIAL EXPIRED — Upgrade Required**. + +Organizations with expired trials return to the feature set of a free organization, but they retain any data created as part of paid features. Specifically, HCP Terraform disables the following features: + +- Teams other than `owners` and locks users who do not belong to the `owners` team out of the organization. HCP Terraform preserves team membership and permissions and re-enables them after you upgrade the organization. +- Sentinel policy checks. HCP Terraform preserves existing policies and policy sets and re-enables them after you upgrade the organization. +- Cost estimation. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/manage-reserved-tags.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/manage-reserved-tags.mdx new file mode 100644 index 000000000..60709f95c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/manage-reserved-tags.mdx @@ -0,0 +1,59 @@ +--- +page_title: Create and manage reserved tag keys +description: >- + Reserved tag keys let you organize projects and workspaces and track + consumption. Learn how to create and manage reserved tag keys. +source: terraform-docs-common +--- + +# Create and manage reserved tag keys + +This topic describes how to create and manage reserved tag keys in HCP Terraform. You can use reserved tag keys to help managers consistently label workspaces and projects in your organization. + +## Introduction + +You can define reserved tag keys that appear as suggested labels when managers want to add tags to their projects and workspaces in the organization. Doing so helps you standardize tag keys and prevent duplicates that affect your ability to track resources. + +Refer to the following topics for information about creating and managing tags attached to projects and workspaces: + +- [Create a project](/terraform/enterprise/projects/manage#create-a-project) +- [Create workspace tags](/terraform/enterprise/workspaces/tags) + +## Requirements + +The **admin** permission preset must be enabled on your profile to create and manage reserved tags. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions) for additional information. + +## Define a reserved tag key + +You can define reserved tag keys for your organization so that project and workspace managers can use consistent labels. + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to define a reserved tag for. +2. Choose **Settings** from the sidebar, then **Tags**. +3. Click on the **Reserved Keys** tab. +4. Click **New reserved tag key** and specify a key value when prompted. Keys are unique and can have up to 128 characters. You can use letters, numbers, spaces, and the following special characters: `.`, `=`, `+`, `-`, `@`, `:`, `-`, and `_`. +5. You can enable the **Disable overrides** option to prevent project and workspace managers from overriding the key. Refer to [Disable overrides for project tags](#disable-overrides-for-project-tags) for additional information. +6. Click **Save** to finish adding the key. + +## Delete a reserved key + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to delete a reserved tag. +2. Choose **Settings** from the sidebar, then **Tags**. +3. Click on the **Reserved Keys** tab. +4. Open the ellipses menu and choose **Delete <key-name>**. +5. Click **Yes, delete reserved key** when prompted. + +To re-add a key, you must manually complete the steps described in [Define a reserved tag key](#define-a-reserved-tag-key). + +## Edit a reserved key + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to edit a reserved tag. +2. Choose **Settings** from the sidebar, then **Tags**. +3. Click on the **Reserved Keys** tab. +4. Open the ellipses menu and choose **Edit <key-name>**. +5. Specify your changes and click **Save**. + +## Disable overrides for project tags + +Enable the **Disable overrides** option when creating or editing a reserved tag key to prevent project and workspace managers from overriding the tag keys. + +This option is not retroactive. When a workspace contains keys that were overridden before you enabled the **Disable overrides** option, you must first remove the tags from the workspace. You can then re-apply the keys to the workspace so that HCP Terraform can allow future updates to the workspace tag bindings. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management.mdx new file mode 100644 index 000000000..894563522 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/vcs-speculative-plan-management.mdx @@ -0,0 +1,45 @@ +--- +page_title: Automatically cancel plan-only runs triggered by outdated commits +description: >- + Learn how to configure Terraform Enterprise to automatically cancel Terraform + plan operations triggered by pull requests when new commits are pushed to the + VCS. +source: terraform-docs-common +--- + +# Automatically cancel plan-only runs + +This topic describes how to configure HCP Terraform to automatically cancel plan-only Terraform run triggered by pull requests in the VCS. + +## Introduction + +When connected to a VCS, HCP Terraform can automatically start a Terraform run that performs a `terraform plan` operation when someone creates a pull request (PR) in the repository. Refer to [Connecting to VCS](/terraform/enterprise/vcs) for additional information. + +When team members push new commits to the same branch, HCP Terraform starts new run that performs a `terraform plan` operation. But as team members push new commits, the queue of Terraform runs can cause delays and reduce efficiency. + +You can enable the **Automatically cancel speculative plans for outdated commits** option in the organization's settings screen so that HCP Terraform automatically cancel unfinished plan-only runs in VCS workflows. + +## Configure automatic cancellation + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and select your organization. +2. Choose **Settings** from the sidebar. +3. Under the **Version Control** group of settings, click **General**. +4. Enable the **Automatically cancel speculative plans for outdated commits** option under the **Manage speculative plans** section. +5. Click **Update settings**. + +After enabling the option, HCP Terraform cancels ongoing or pending speculative plans when new commits are received on the same branch. + +## Automated cancellation notifications + +When the **Automatically cancel speculative plans for outdated commits** option is enabled, HCP Terraform notifies you about plan-only runs that are canceled as a result of the setting. Notifications appear in the following screens: + +- **Run details page**. Refer to [Viewing and Managing Runs](/terraform/enterprise/run/manage) for additional information. + +- **VCS status checks**. When the **Non-aggregated status checks** option is enabled in the version control settings, the notification explicitly states when a plan has been canceled automatically. + + When the **Aggregated status checks** option is enabled, HCP Terraform includes canceled plans in the result and identifies them separately from manually canceled plans. + + Refer to [VCS Status Checks](/terraform/enterprise/users-teams-organizations/organizations/vcs-status-checks) for additional information. + + +- **Aggregated status page**. HCP Terraform prints the cancellation message in the aggregated status page in the **Resources to be changed** section. The section may not reflect a complete result if all runs associated with the commit reach completion. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/vcs-status-checks.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/vcs-status-checks.mdx new file mode 100644 index 000000000..4b1983ef1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/organizations/vcs-status-checks.mdx @@ -0,0 +1,49 @@ +--- +page_title: Configure VCS status checks +description: >- + VCS status checks send notifications to your version control provider. Learn + how to configure VCS status checks in Terraform Enterprise. +source: terraform-docs-common +--- + +# Configure VCS status checks + +Status checks are notifications sent to your version control system's VCS provider, providing details about specific commits, including the present status of the HCP Terraform run. Please refer to your VCS provider's documentation regarding status checks (e.g., [GitHub Status Checks](https://docs.github.com/en/pull-requests/collaborating-with-pull-requests/collaborating-on-repositories-with-code-quality-features/about-status-checks)). + +## Permissions + +To modify VCS Status Checks settings, you must have [Manage VCS Settings](/terraform/enterprise/users-teams-organizations/permissions#manage-vcs-settings) permissions. + +## Managing organization VCS status check settings + +Organization owners can choose between _aggregated_ (default) and _non-aggregated_ status checks. This setting determines whether detailed information and links are accessed directly from the VCS provider or HCP Terraform. + +This setting also determines the number of status checks directly sent to the VCS Provider in response to actions such as pull or merge requests. + +To view and manage an organization’s VCS Status Check settings, click **Settings** then **Version Control**. + +### Aggregated status checks + +Aggregated status checks offer a streamlined experience if you have a single repository containing configuration for many workspaces (a.k.a., a monorepo). + +When aggregated status checks are enabled, HCP Terraform sends one VCS status check for all runs triggered by a VCS event. If multiple workspaces rely on a shared repository, HCP Terraform aggregates the status checks for these workspaces into one summary. This summary is unique to the workspace's organization and VCS client connection. + +You can access additional information about an aggregated status check in HCP Terraform by clicking the **Details** link a status check provides. This link directs you to an HCP Terraform page that offers the consolidated status check results across multiple workspaces, highlighting details such as resource changes and issues that require attention. + +![Screenshot: Organization Aggregated status checks](/img/docs/organization-vcs-general-aggregated-status-checks.png) + +### Non-aggregated status checks + +Non-aggregated status checks send your VCS provider a status check for each triggered workspace and related run stage in response to a VCS event. For example, a VCS push triggers checks for each related workspace's run stages, including the plan operation, policy checks, cost estimation, run tasks, and more. + +If you have a manageable amount of workspaces and want to visualize status checks on your VCS Provider rather than in HCP Terraform, use non-aggregated status checks. + +![Screenshot: Organization Non-aggregated status checks](/img/docs/organization-vcs-general-non-aggregated-status-checks.png) + +#### Send passing commit statuses + +-> **Note:** Organization owners can only enable the **Send passing commit statuses** setting if the **Aggregated status checks** setting is disabled. + +Workspaces that use part of a shared repository do not typically run plans for changes that do not affect their files. This includes [speculative plans](/terraform/enterprise/run/remote-operations#speculative-plans) on pull requests. Since **pending** VCS status checks can block pull requests, workspaces automatically send passing commit statuses for any PRs that do not affect their files. + +You can disable this behavior if it creates too many status checks for your VCS provider. You may want to do this if you have a large number of workspaces sharing one VCS repository. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/permissions.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/permissions.mdx new file mode 100644 index 000000000..26e3e065f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/permissions.mdx @@ -0,0 +1,392 @@ +--- +page_title: Permission model in Terraform Enterprise +description: >- + Use the Terraform Enterprise permission model to manage user access to + organizations, projects, and workspaces. +source: terraform-docs-common +--- + +# Permission model + + + +-> **Note:** Team management is available in HCP Terraform **Standard** Edition. [Learn more about HCP Terraform pricing here](https://www.hashicorp.com/products/terraform/pricing). + + + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +> **Hands-on:** Try the [Manage Permissions in HCP Terraform](/terraform/tutorials/cloud/cloud-permissions?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) tutorial. + +HCP Terraform's access model is team-based. In order to perform an action within an HCP Terraform organization, users must belong to a team that has been granted the appropriate permissions. + +The permissions model is split into organization-level, project-level, and workspace-level permissions. Additionally, every organization has a special team named "owners", whose members have maximal permissions within the organization. + +## Organization Owners + +Every organization has a special "owners" team. Members of this team are often referred to as "organization owners". + +Organization owners have every available permission within the organization. This includes all organization-level permissions, and the highest level of workspace permissions on every workspace. + +There are also some actions within an organization that are only available to owners. These are generally actions that affect the permissions and membership of other teams, or are otherwise fundamental to the organization's security and integrity. + +Permissions for the owners team include: + +- Manage workspaces (refer to [Organization Permissions][] below; equivalent to admin permissions on every workspace) +- Manage projects (refer to [Organization Permissions][] below; equivalent to admin permissions on every project and workspace) +- Manage policies (refer to [Organization Permissions][] below) +- Manage policy overrides (refer to [Organization Permissions][] below) +- Manage VCS settings (refer to [Organization Permissions][] below) +- Manage the private registry (refer to [Organization Permissions][] below) +- Manage Membership (refer to [Organization Permissions][] below; invite or remove users from the organization itself, and manage the membership of its teams) +- View all secret teams (refer to [Organization Permissions][] below) +- Manage agents (refer to [Organization Permissions][] below) +- Manage organization permissions (refer to [Organization Permissions][] below) +- Manage all organization settings (owners only) +- Manage organization billing (owners only, not applicable to Terraform Enterprise) +- Delete organization (owners only) + +This list is not necessarily exhaustive. + +[Organization Permissions]: #organization-permissions + +## Workspace Permissions + +[workspace]: /terraform/enterprise/workspaces + +Most of HCP Terraform's permissions system is focused on workspaces. In general, administrators want to delegate access to specific collections of infrastructure; HCP Terraform implements this by granting permissions to teams on a per-workspace basis. + +There are two ways to choose which permissions a given team has on a workspace: fixed permission sets, and custom permissions. Additionally, there is a special "admin" permission set that grants the highest level of permissions on a workspace. + +### Implied Permissions + +Some permissions imply other permissions; for example, the run access plan permission also grants permission to read runs. + +If documentation or UI text states that an action requires a specific permission, it is also available for any permission that implies that permission. + +### General Workspace Permissions + +[General Workspace Permissions]: #general-workspace-permissions + +The following workspace permissions can be granted to teams on a per-workspace basis. They can be granted via either fixed permission sets or custom workspace permissions. + +-> **Note:** Throughout the documentation, we refer to the specific permission an action requires (like "requires permission to apply runs") rather than the fixed permission set that includes that permission (like "requires write access"). + +- **Run access:** + - **Read:** — Allows users to view information about remote Terraform runs, including the run history, the status of runs, the log output of each stage of a run (plan, apply, cost estimation, policy check), and configuration versions associated with a run. + - **Plan:** — _Implies permission to read._ Allows users to queue Terraform plans in a workspace, including both speculative plans and normal plans. Normal plans must be approved by a user with permission to apply runs. This also allows users to comment on runs. + - **Apply:** — _Implies permission to plan._ Allows users to approve and apply Terraform plans, causing changes to real infrastructure. +- **Variable access:** + - **No access:** — No access is granted to the values of Terraform variables and environment variables for the workspace. + - **Read:** — Allows users to view the values of Terraform variables and environment variables for the workspace. Note that variables marked as sensitive are write-only, and can't be viewed by any user. + - **Read and write:** — _Implies permission to read._ Allows users to edit the values of variables in the workspace. +- **State access:** + + - **No access:** — No access is granted to the state file from the workspace. + - **Read outputs only:** — Allows users to access values in the workspace's most recent Terraform state that have been explicitly marked as public outputs. Output values are often used as an interface between separate workspaces that manage loosely coupled collections of infrastructure, so their contents can be relevant to people who have no direct responsibility for the managed infrastructure but still indirectly use some of its functions. This permission is required to access the [State Version Outputs](/terraform/enterprise/api-docs/state-version-outputs) API endpoint. + + -> **Note:** **Read state versions** permission is required to use the `terraform output` command or the `terraform_remote_state` data source against the workspace. + - **Read:** — _Implies permission to read outputs only._ Allows users to read complete state files from the workspace. State files are useful for identifying infrastructure changes over time, but often contain sensitive information. + - **Read and write:** — _Implies permission to read._ Allows users to directly create new state versions in the workspace. Applying a remote Terraform run creates new state versions without this permission, but if the workspace's execution mode is set to "local", this permission is required for performing local runs. This permission is also required to use any of the Terraform CLI's state manipulation and maintenance commands against this workspace, including `terraform import`, `terraform taint`, and the various `terraform state` subcommands. +- **Other controls:** + - **Download Sentinel mocks:** — Allows users to download data from runs in the workspace in a format that can be used for developing Sentinel policies. This run data is very detailed, and often contains unredacted sensitive information. + - **Manage Workspace Run Tasks:** — Allows users to associate or dissociate run tasks with the workspace. HCP Terraform creates Run Tasks at the organization level, where you can manually associate or dissociate them with specific workspaces. + - **Lock/unlock workspace:** — Allows users to manually lock the workspace to temporarily prevent runs. When a workspace's execution mode is set to "local", users must have this permission to perform local CLI runs using the workspace's state. + +### Fixed Permission Sets + +Fixed permission sets are bundles of specific permissions for workspaces, which you can use to delegate access to workspaces easily. + +Each permissions set targets a level of authority and responsibility for a given workspace's infrastructure. A permission set can grant permissions that recipients do not require but offer a balance of simplicity and utility. + +#### Workspace Admins + +Much like the owners team has full control over an organization, each workspace has a special "admin" permissions level that grants full control over the workspace. Members of a team with admin permissions on a workspace are sometimes called "workspace admins" for that workspace. + +Admin permissions include the highest level of general permissions for the workspace. There are also some permissions that are only available to workspace admins, which generally involve changing the workspace's settings or setting access levels for other teams. + +Workspace admins have all [General Workspace Permissions](#general-workspace-permissions), as well as the ability to do the following tasks: + +- Read and write workspace settings. This includes general settings, notification configurations, run triggers, and more. +- Set or remove workspace permissions for visible teams. Workspace admins cannot view or manage teams with the [**Secret**](/terraform/enterprise/users-teams-organizations/teams/manage#team-visibility) visibility option enabled unless they are also organization owners. +- Delete the workspace + - Depending on the [organization's settings](/terraform/enterprise/users-teams-organizations/organizations#general), workspace admins may only be able to delete the workspace if it is not actively managing infrastructure. Refer to [Deleting a Workspace With Resources Under Management](/terraform/enterprise/workspaces/settings#deleting-a-workspace-with-resources-under-management) for details. + +#### Write + +The "write" permission set is for people who do most of the day-to-day work of provisioning and modifying managed infrastructure. Write access grants the following workspace permissions: + +- Run access - Apply +- Variable access - Read and write +- State access - Read and write +- Other access - Lock/unlock workspace +- Other access - Download Sentinel mocks + +See [General Workspace Permissions][] above for details about specific permissions. + +#### Plan + +The "plan" permission set is for people who might propose changes to managed infrastructure, but whose proposed changes should be approved before they are applied. Plan access grants the following workspace permissions: + +- Run access - Plan +- Variable access - Read +- State access - Read + +See [General Workspace Permissions][] above for details about specific permissions. + +#### Read + +The "read" permission set is for people who need to view information about the status and configuration of managed infrastructure in order to do their jobs, but aren't responsible for maintaining that infrastructure. Read access grants the following workspace permissions: + +- Run access - Read +- Variable access - Read +- State access - Read + +See [General Workspace Permissions][] above for details about specific permissions. + +### Custom Workspace Permissions + +Custom permissions let you assign specific, finer-grained permissions to a team than the broader fixed permission sets provide. This enables more task-focused permission sets and tighter control of sensitive information. + +You can use custom permissions to assign any of the permissions listed above under [General Workspace Permissions][], with the exception of admin-only permissions. + +The minimum custom permissions set for a workspace is the permission to read runs; the only way to grant a team lower access is to not add them to the workspace at all. + +Some permissions - such as the runs permission - are tiered: you can assign one permission per category, since higher permissions include all of the capabilities of the lower ones. + +## Project Permissions + +You can assign project-specific permissions to teams. + +### Implied Permissions + +Some permissions imply other permissions. For example, permission to update a project also grants permission to read a project. + +If an action states that it requires a specific permission level, you can perform that action if your permissions _imply_ the stated permission level. + +### General Project Permissions + +[General Project Permissions]: #general-project-permissions + +You can grant the following project permissions to teams on a per-project basis. You can grant these with either fixed permission sets or custom project permissions. + +-> **Note:** Throughout the documentation, we refer to the specific permission an action requires (like "requires permission to apply runs") rather than the fixed permission set that includes that permission (like "requires write access"). + +- **Project access:** + - **Read:** — Allows users to view information about the project including the name. + - **Update:** — _Implies permission to read._ Allows users to update the project name. + - **Delete:** — _Implies permission to update._ Allows users to delete the project. + - **Create Workspaces:** — Allow users to create workspaces in the project. This grants read access to all workspaces in the project. + - **Delete Workspaces:** — Allows users to delete workspaces in the project. + - Depending on the [organization's settings](/terraform/enterprise/users-teams-organizations/organizations#general), workspace admins may only be able to delete the workspace if it is not actively managing infrastructure. Refer to [Deleting a Workspace With Resources Under Management](/terraform/enterprise/workspaces/settings#deleting-a-workspace-with-resources-under-management) for details. + - **Move Workspaces:** — Allows users to move workspaces out of the project. A user _must_ have this permission on both the source _and_ destination project to successfully move a workspace from one project to another. +- **Team management:** + - **None:** — No access to view teams assigned to the project. + - **Read:** — Allows users to see teams assigned to the project for visible teams. + - **Manage:** — _Implies permission to read._ Allows users to set or remove project permissions for visible teams. Project admins can not view or manage [secret teams](/terraform/enterprise/users-teams-organizations/teams/manage#team-visibility) unless they are also organization owners. +- **Variable sets:** + - **None:** — No access to variable sets owned by the project. However, users with Variable access permissions can view variable sets applied to this project and its workspaces. + - **Read:** — Allows users to view variable sets owned by this project. + - **Manage:** — _Implies permission to read._ Allows users to create, update, and delete variable sets owned by the project. + +See [General Workspace Permissions](#general-workspace-permissions)for the complete list of available permissions for a project's workspaces. + +### Fixed Permission Sets + +Fixed permission sets are bundles of specific permissions for projects, which you can use to delegate access to a project's workspaces easily. + +#### Project Admin + +Each project has an "admin" permissions level that grants permissions for both the project and the workspaces that belong to that project. Members with admin permissions on a project are dubbed that project's "project admins". + +Members of teams with "admin" permissions for a project have [General Workspace Permissions](#general-workspace-permissions) for every workspace in the project, and the ability to: + +- Read and update project settings. +- Delete the project. +- Create workspaces in the project. +- Move workspaces into or out of the project. This also requires project admin permissions for the source or destination project. +- Grant or revoke project permissions for visible teams. Project admins **cannot** view or manage access for teams that are are [Secret](/terraform/enterprise/users-teams-organizations/teams/manage#team-visibility), unless those admins are also organization owners. + +#### Maintain + +The "maintain" permission is for people who need to manage existing infrastructure in a single project, while also granting the ability to create new workspaces in that project. Maintain access grants full control of everything in the project, including the following permissions: + +- Admin access for all workspaces in this project. +- Create workspaces in this project. +- Read the project name. +- Lock and unlock all workspaces in this project. +- Read and write variables for all workspaces in this project. +- Access state for all workspaces in this project. +- Approve runs for all workspaces in this project. + +#### Write + +The "write" permission set is for people who do most of the day-to-day work of provisioning and modifying managed infrastructure. Write access grants the following workspace permissions: + +- Read the project name. +- Lock and unlock all workspaces in this project. +- Read and write variables for all workspaces in this project. +- Access state for all workspaces in this project. +- Approve runs for all workspaces in this project. + +#### Read + +The "read" permission set is for people who need to view information about the status and configuration of managed infrastructure for their job function, but are not responsible for maintaining that infrastructure. Read access grants the permissions to: + +- Read the project name. +- Read the workspaces in the project. + +### Custom Project Permissions + +Custom permissions enable you to assign specific and granular permissions to a team. You can use custom permission sets to create task-focused permission sets and control sensitive information. + +You can create a set of custom permissions using any of the permissions listed under [General Project Permissions](#general-project-permissions). + +Some permissions, such as the project access permission, are tiered. You can only assign one permission per category because higher-level permissions include the capabilities of lower levels. + +## Organization Permissions + +Separate from project and workspace permissions, you can grant teams permissions to manage or view certain resources or settings across an organization. To set these permissions for a team, go to your organization's **Settings**. Then click **Teams**, and select the team name from the list. + +The following organization permissions are available: + +### Project permissions + +You must select a level of access for projects. + +#### None + +Members do not have access to projects or workspaces. You can grant permissions to individual projects or workspaces through [Project Permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions) or [Workspace Permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-permissions). + +#### View all projects + +Members can view all projects within the organization. This lets users: + +- View project names in a given organization. + +#### Manage all projects + +Members can create and manage all projects and workspaces within the organization. In addition to the permissions granted by [“Manage all workspaces”](/terraform/enterprise/users-teams-organizations/permissions#manage-all-workspaces), this also lets users: + +- Manage other teams' access to all projects. +- Create, edit, and delete projects (otherwise only available to organization owners). +- Move workspaces between projects. + +### Workspace permissions + +You must select a level of access for workspaces. + +#### None + +Members do not have access to projects or workspaces. You can grant permissions to individual projects or workspaces through [Project Permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions) or [Workspace Permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-permissions). + +#### View all workspaces + +Members can view all workspaces within the organization. This lets users: + +- View information and features relevant to each workspaces (e.g. runs, state versions, variables). + +#### Manage all workspaces + +Members can create and manage all workspaces within the organization. This lets users: + +- Perform any action that requires admin permissions in those workspaces. +- Create new workspaces within the organization's **Default Project**, an action that is otherwise only available to organization owners. +- Create, update, and delete [Variable Sets](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets). + +### Manage Policies + +Allows members to create, edit, read, list and delete the organization's Sentinel policies. + +This permission implicitly gives permission to read runs on all workspaces, which is necessary to set enforcement of [policy sets](/terraform/enterprise/policy-enforcement/manage-policy-sets). + +### Manage Run Tasks + +Allows members to create, edit, and delete run tasks on the organization. + +### Manage Policy Overrides + +Allows members to override soft-mandatory policy checks. + +This permission implicitly gives permission to read runs on all workspaces, which is necessary to override policy checks. + +### Manage VCS Settings + +Allows members to manage the set of [VCS providers](/terraform/enterprise/vcs) and [SSH keys](/terraform/enterprise/vcs#ssh-keys) available within the organization. + +### Manage Agent Pools + +Allows members to create, edit, and delete agent pools within their organization. + +This permission implicitly grants access to read all workspaces, which is necessary for agent pool management. + +### Manage Private Registry + +Allows members to publish and delete providers, modules, or both providers and modules in the organization's [private registry](/terraform/enterprise/registry). These permissions are otherwise only available to organization owners. + +### Team Management Permissions + +HCP Terraform has three levels of team management permissions: manage membership, manage teams, and manage organization access. Each permission level grants users the ability to perform specific actions and each progressively requires prerequisite permissions. + +For example, to grant a user the manage teams permission, that user must already have manage membership permissions. To grant a user the manage organization access permission, a user must have both manage teams and manage membership permissions. + +#### Manage Membership + +Allows members to invite users to the organization, remove users from the organization, and add or remove users from teams within the organization. + +This permission grants the ability to view the list of users within the organization, and to view the organization access of other visible teams. It does not permit the creation of teams, the ability to modify the settings of existing teams, or the ability to view secret teams. + +In order to modify the membership of a team, a user with Manage Membership permissions must have visibility into the team (i.e. the team must be ["Visible"](/terraform/enterprise/users-teams-organizations/teams/manage#team-visibility), or the user must be on the team). +In order to remove a user from the organization, the holder of this permission must have visibility into all of the teams which the user is a member of. + +~> This permission is intended to allow owners of large organizations to delegate membership management to another trusted team, and should be granted to only teams of trusted users. **Assign with caution:** Users with this permission are able to add themselves to any visible team, and inherit the permissions of any visible team. + +#### Manage Teams + +Allows members to create, update, and delete teams, and generate, regenerate, and revoke tokens. + +This permission grants the ability to update a team's names, SSO IDs, and token management permissions, but does not allow access to organization settings. On its own, this permission does not allow users to create, update, delete, or otherwise access secret teams. + +The manage teams permission confers all permissions granted by the manage membership permission. + +This permission allows owners of large organizations to delegate team management to another trusted team. You should only grant it to teams of trusted users. + +~> **Assign with caution**: Users with this permission can update or delete any visible team. Because this permission also confers the manage membership permission, a user with the manage teams permission can add themselves to any visible team. + +#### Manage Organization Access + +Allows members to update a team's organization access settings. + +On its own, this permission does not allow users to create, update, delete, or otherwise access secret teams. This permission confers all of the permissions granted by the manage teams and manage membership permissions. + +This permission allows owners of large organizations to delegate team management to another trusted team. You should only grant it to teams of trusted users. + +~> **Assign with caution:** Members with this permission can update all organization access settings for any team visible to them. + +### Include Secret Teams + +Allows members access to secret teams at the level permitted by that user's team permissions setting. + +This permission acts as a modifier to existing team management permissions. Members with this permission can access secret teams up to the level permitted by other team management permissions. For example, if a user has permission to include secret teams and [manage teams](/terraform/enterprise/users-teams-organizations/permissions#manage-teams), that user can create secret teams. + +### Allow Member Token Management + +Allows owners and members with [manage teams](/terraform/enterprise/users-teams-organizations/permissions#manage-teams) permissions to enable and disable team token management for team members. This permission defaults to `true`. + +When member token management is enabled, members will be able to perform actions on team tokens, including generating and revoking a team token. + +When member token management is disabled, members will be unable to perform actions on team tokens, including generating and revoking a team token. + +## Permissions Outside HCP Terraform's Scope + +This documentation only refers to permissions that are managed by HCP Terraform itself. + +Since HCP Terraform integrates with other systems, the permissions models of those systems can also be relevant to the overall security model of your HCP Terraform organization. For example: + +- When a workspace is connected to a VCS repository, anyone who can merge changes to that repository's main branch can indirectly queue plans in that workspace, regardless of whether they have explicit permission to queue plans or are even a member of your HCP Terraform organization. (And when auto-apply is enabled, merging changes will indirectly apply runs.) +- If you use HCP Terraform's API to create a Slack bot for provisioning infrastructure, anyone able to issue commands to that Slack bot can implicitly act with that bot's permissions, regardless of their own membership and permissions in the HCP Terraform organization. +- When a run task sends a request to an integrator, it provides an access token that provides access depending on the run task stage: + - For post-plan, it provides access to the runs plan json and the run task callback + - All access tokens created for run tasks have a lifetime of 10 minutes + +When integrating HCP Terraform with other systems, you are responsible for understanding the effects on your organization's security. An integrated system is able to delegate any level of access that it has been granted, so carefully consider the conditions and events that will cause it to delegate that access. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/index.mdx new file mode 100644 index 000000000..1be301565 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/index.mdx @@ -0,0 +1,59 @@ +--- +page_title: Teams overview +description: >- + Teams are a group of users within an organization. Learn about managing teams, + team membership, team permissions, and more. +source: terraform-docs-common +--- + +[organizations]: /terraform/enterprise/users-teams-organizations/organizations + +[organization settings]: /terraform/enterprise/users-teams-organizations/organizations#organization-settings + +[users]: /terraform/enterprise/users-teams-organizations/users + +# Teams overview + +Teams are groups of HCP Terraform [users][] within an [organization][organizations]. If a user belongs to at least one team in an organization, they are considered a member of that organization. + + + +@include 'tfc-package-callouts/team-management.mdx' + + + +An organization can [grant workspace permissions to teams](/terraform/enterprise/users-teams-organizations/teams/manage#managing-workspace-access) that allow its members to start Terraform runs, create workspace variables, read and write state, and more. Teams can only have permissions on workspaces within their organization, although individual users can belong to multiple teams in this and other organizations. + +> **Hands-on:** Try the [Manage Permissions in HCP Terraform](/terraform/tutorials/cloud/cloud-permissions?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) tutorial. + +## Accessing teams with the API or TFE provider + +In addition to the HCP Terraform UI, you can use the following methods to manage teams: + +- [Teams API](/terraform/enterprise/api-docs/teams) to list, create, update, and delete teams +- [Team Members API](/terraform/enterprise/api-docs/team-members) to add and delete users from teams +- [Team Tokens API](/terraform/enterprise/api-docs/team-tokens) to generate and delete tokens and list an organization's team tokens +- [Team Access API](/terraform/enterprise/api-docs/team-access) to manage team access to one or more workspaces +- The `tfe` provider resources [`tfe_team`](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/team), [`tfe_team_members`](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/team_members), and `tfe_team_access` + +### API tokens + +Each team can have an API token not associated with a specific user. You can manage a team's API token from the **Organization settings > API Tokens > Team Token** page. You can create, regenerate, and delete team tokens on the API token page. Refer to [Team API Tokens](/terraform/enterprise/users-teams-organizations/api-tokens#team-api-tokens) for details. + +## The owners team + +Every organization has an owners team, and members of the owners team are sometimes called organization owners. An organization's creator is the first member of its owner's team. You can add and remove other members in the same way as you can with other teams. In free organizations, the owner's team is limited to five members. In paid organizations, the size of the owner's team is unlimited. + +You cannot delete or leave the owner's team empty. If only one member in an owner's team exists, you must add another user before removing the current member. + +Refer to [organization owners](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) for more details about owners team permissions. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Manage teams + +You can manage many things about teams, including creating and deleting a team, team membership, and team access to workspaces, projects, and organizations. Refer to [Manage teams](/terraform/enterprise/users-teams-organizations/teams/manage) to learn more. + +## Team notifications + +You can set up team notifications to notify team members on external systems whenever a particular action takes place. Refer to [Notifications](/terraform/enterprise/users-teams-organizations/teams/notifications) to learn more. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/manage.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/manage.mdx new file mode 100644 index 000000000..63e033129 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/manage.mdx @@ -0,0 +1,109 @@ +--- +page_title: Manage teams +description: >- + Learn how to manage team creation, team deletion, team membership, and team + access to workspaces, projects, and organizations. +source: terraform-docs-common +--- + +# Manage teams + +You can grant team management abilities to members of teams with either one of the manage teams or manage organization access permissions. Refer to [Team Permissions](/terraform/enterprise/users-teams-organizations/permissions#team-permissions) for details. + +[Organization owners](/terraform/enterprise/users-teams-organizations/teams#the-owners-team) can also create teams, assign team permissions, or view the full list of teams. Other users can view any teams marked as visible within the organization, plus any secret teams they are members of. Refer to [Team Visibility](#team-visibility) for details. + +To manage teams, perform the following steps: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to manage teams. +2. Choose **Settings** from the sidebar, then **Teams**. The **Team Management** page appears, containing a list of all teams within the organization. +3. Click a team to go to its settings page, which lists the team's settings and current members. Members that have [two-factor authentication](/terraform/enterprise/users-teams-organizations/2fa) enabled have a **2FA** badge. + +You can manage a team on its settings page by adding or removing members, changing its visibility, and controlling access to workspaces, projects, and the organization. + +## Create teams + +To create a new team, perform the following steps: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to create a team. +2. Choose **Settings** from the sidebar, then **Teams**. +3. Click **Create a team**. +4. Enter a unique team **Name** and click **Create Team**. Team names can include numbers, letters, underscores (`_`), and hyphens (`-`). + +The new team's settings page appears, where you can add new members and grant permissions. + +## Delete teams + +~> **Important:** Team deletion is permanent, and you cannot undo it. + +To delete a team, perform the following steps: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to delete a team. +2. Choose **Settings** from the sidebar, then **Teams**. The **Team Management** page appears, containing a list of all teams within the organization. +3. Click the team you want to delete to go to its settings page. +4. Click **Delete [team name]** at the bottom of the page. The **Deleting team "[team name]"** box appears. +5. Click **Yes, delete team** to permanently delete the team and all of its data from HCP Terraform. + +## Manage team membership + +Team structure often resembles your company's organizational structure. + +### Add users + +If the user is not yet in the organization, [invite them to join the organization](/terraform/enterprise/users-teams-organizations/organizations#users) and include a list of teams they should belong to in the invitation. Once the user accepts the invitation, HCP Terraform automatically adds them to those teams. + +To add a user that is already in the organization: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add a user to a team. +2. Choose **Settings** from the sidebar, then **Teams**. +3. Click on a team's name to go to its settings page. +4. Choose a user under **Add a New Team Member**. Use the text field to filter the list by username or email. +5. Click the user to add them to the team. HCP Terraform now displays the user under **Members**. + +### Remove users + +To remove a user from a team: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to remove a user from a team. +2. Choose **Settings** from the sidebar, then **Teams**. +3. Click the team to go to its settings page. +4. Click **...** next to the user's name and choose **Remove from team** from the menu. HCP Terraform removes the user from the list of team members. + +## Team visibility + +The settings under **Visibility** allow you to control who can see a team within the organization. To edit a team's visibility: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to view teams. +2. Choose **Settings** from the sidebar, then **Teams**. +3. Click on a team's name to navigate to its settings page. +4. Enable one of the following settings: + - **Visible:** Every user in the organization can see the team and its membership. Non-members have read-only access. + - **Secret:** The default setting is that only team members and organization owners can view a team and its membership. + +We recommend making the majority of teams visible to simplify workspace administration. Secret teams should only have +[organization-level permissions](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions) since workspace admins cannot manage permissions for teams they cannot view. + +## Manage workspace access + +You can grant teams various permissions on workspaces. Refer to [Workspace Permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-permissions) for details. + +HCP Terraform uses the most permissive permission level from your teams to determine what actions you can take on a particular resource. For example, if you belong to a team that only has permission to read runs for a workspace and another team with admin access to that workspace, HCP Terraform grants you admin access. + +HCP Terraform grants the most permissive permissions regardless of whether an organization, project, team, or workspace set those permissions. For example, if a team has permission to read runs for a given workspace and has permission to manage that workspace through the organization, then members of that team can manage that workspace. Refer to [organization permissions](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions) and [project permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions) for additional information. + +Another example is when a team has permission at the organization-level to read runs for all workspaces and admin access to a specific workspace. HCP Terraform grants the more permissive admin permissions to that workspace. + +To manage team permissions on a workspace: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace where you want to set team permissions. +2. Choose **Settings** from the sidebar, then **Team Access**. +3. Click **Add team and permissions** to select a team and assign a pre-built or custom permission set. + +## Manage project access + +You can grant teams permissions to manage a project and the workspaces that belong to it. Refer to [Project Permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions) for details. + +## Manage organization access + +Organization owners can grant teams permissions to manage policies, projects and workspaces, team and organization membership, VCS settings, private registry providers and modules, and policy overrides across an organization. Refer to [Organization Permissions](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions) for details. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/notifications.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/notifications.mdx new file mode 100644 index 000000000..f13ba68a1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/teams/notifications.mdx @@ -0,0 +1,132 @@ +--- +page_title: Manage team notifications +description: >- + Learn how to set up team notifications to notify team members on external + systems whenever a particular action takes place. +source: terraform-docs-common +--- + +# Manage team notifications + +HCP Terraform can use webhooks to notify external systems about run progress, change requests, and other events. Team notifications allow you to configure relevant alerts that notify teams you specify whenever a certain event occurs. + +@include 'tfc-package-callouts/notifications.mdx' + +You can configure an individual team notification to notify up to twenty teams. To set up notifications for teams using the API, refer to the [Notification API](/terraform/enterprise/api-docs/notification-configurations#team-notification-configuration). + +## Requirements + +To configure team notifications, you need the [**Manage teams**](/terraform/enterprise/users-teams-organizations/permissions#manage-teams) permissions for the team for which you want to configure notifications. + +## View notification configuration settings + +To view your current team notifications, perform the following steps: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to view the team notifications of. +2. Choose **Settings** from the sidebar, then **Teams**. +3. Select the team for which you want to view the notifications from your list of teams. +4. Select **Notifications** in the sidebar navigation. + +HCP Terraform displays a list of any notification configurations you have set up. A notification configuration defines how and when you want to send notifications, and once you enable that configuration, it can send notifications. + +### Update and enable notification configurations + +Each notification configuration includes a brief overview of each configuration’s name, type, the events that can trigger the notification, and the last time the notification was triggered. Clicking on a notification configuration opens a page where you can perform the following actions: + +- Enable your configuration to send notifications by toggling the switch. +- Delete a configuration by clicking **Delete notification**, then **Yes, delete notification configuration**. +- Test your notification’s configuration by clicking **Send test**. +- Click **Edit notification** to edit your notification configuration. + +After creating a notification configuration, you can only edit the following aspects of that configuration: + +1. The configuration’s name. +2. Whether this configuration notifies everyone on a team or specific members. +3. The workspace events that trigger notifications. You can choose from: + - **All events** triggers a notification for every event in your workspace. + - **No events** means that no workspace events trigger a notification. + - **Only certain events** lets you specify which events trigger a notification. + +After making any changes, click **Update notification** to save your changes. + +## Create and configure a notification + +To configure a new notification for a team or a user, perform the following steps: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization you want to create a team notification in. +2. Choose **Settings** from the sidebar, then **Teams**. +3. Select the team you want to view the notifications for from your list of teams. +4. Select **Notifications** in the sidebar navigation. +5. Click **Create a notification**. + +You must complete the following fields for all new notification configurations: + +1. The **Destination** where HCP Terraform should deliver either a generic or a specifically formatted payload. Refer to [Notification payloads](#notification-payloads) for details. +2. The display **Name** for this notification configuration. +3. If you configure an email notification, you can optionally specify which **Email Recipients** will receive this notification. +4. If you choose to configure a webhook, you must also specify: + - A **Webhook URL** for the destination of your webhook payload. Your URL must accept HTTP or HTTPS `POST` requests and be able to use the chosen payload type. + - You can optionally configure a **Token** as an arbitrary secret string that HCP Terraform will use to sign its notification webhooks. Refer to [Notification authenticity](#notification-authenticity) for details. You cannot view the token after you save the notification configuration. +5. If you choose to specify either a **Slack** or **Microsoft Teams** notification, you must also configure your webhook URL for either service. For details, refer to Slack's documentation on [creating an incoming webhook](https://api.slack.com/messaging/webhooks#create_a_webhook) and Microsoft's documentation on [creating a workflow from a channel in teams](https://support.microsoft.com/en-us/office/creating-a-workflow-from-a-channel-in-teams-242eb8f2-f328-45be-b81f-9817b51a5f0e). +6. Specify which [**Workspace events**](#workspace-events) should trigger this notification. +7. After you finish configuring your notification, click **Create a notification**. + +Note that if you are create an email notification, you must have [**Manage membership**](/terraform/enterprise/users-teams-organizations/permissions#manage-membership) permissions on a team to select users from that team as email recipients. + +### Workspace events + +HCP Terraform can send notifications for all workspace events, no workspace events, or specific events. The following events are available for you to specify: + +| Event | Description | +| :-------------- | :-------------------------------------------------------------------------------------------------------------------------- | +| Change Requests | HCP Terraform will notify this team whenever someone creates a change request on a workspace to which this team has access. | + +## Enable and verify a notification + +To configure HCP Terraform to stop sending notifications for a notification configuration, disable the **Enabled** setting on a configuration's detail page . + +HCP Terraform enables notifications for email configurations by default. Before enabling any webhook notifications, HCP Terraform attempts to verify the notification’s configuration by sending a test message. If the test succeeds, HCP Terraform enables the notification. + +To verify a notification configuration, the destination must respond with a `2xx` HTTP code. If verification fails, HCP Terraform does not enable the configuration and displays an error message. + +For successful and unsuccessful verifications, click the **Last Response** box to view more information about the verification results. You can also send additional test messages by clicking **Send a Test**. + +## Notification Payloads + +Notification payloads contain different attributes depending on the integration you specified when configuring that notification. + +### Slack + +Notifications to Slack contain the following information: + +- Information about the change request, including the username and avatar of the person who created the change request. +- The event that triggered the notification and the time that event occurred. + +### Microsoft Teams + +Notifications to Microsoft Teams contain the following information: + +- Information about the change request, including the username and avatar of the person who created the change request. +- The event that triggered the notification and the time that event occurred. + +### Email + +Email notifications contain the following information: + +- Information about the change request, including the username and avatar of the person who created the change request. +- The event that triggered the notification and the time that event occurred. + +### Generic + +A generic notification contains information about the event that triggered it and the time that the event occurred. You can refer to the complete generic notification payload in the [API documentation](/terraform/enterprise/api-docs/notification-configurations#notification-payload). + +You can use some of the values in the payload to retrieve additional information through the API, such as: + +- The [workspace ID](/terraform/enterprise/api-docs/workspaces#list-workspaces) +- The [organization name](/terraform/enterprise/api-docs/organizations#show-an-organization) + +## Notification Authenticity + +Slack notifications use Slack's own protocols to verify HCP Terraform's webhook requests. + +Generic notifications can include a signature to verify the request. For notification configurations that include a secret token, HCP Terraform's webhook requests include an `X-TFE-Notification-Signature` header containing an HMAC signature computed from the token using the SHA-512 digest algorithm. The notification’s receiving service is responsible for validating the signature. For more information and an example of how to validate the signature, refer to the [API documentation](/terraform/enterprise/api-docs/notification-configurations#notification-payload). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/users.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/users.mdx new file mode 100644 index 000000000..aa24a4375 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/users-teams-organizations/users.mdx @@ -0,0 +1,215 @@ +--- +page_title: Create and manage users in Terraform Enterprise +description: Learn how to create and manage users in Terraform Enterprise. +source: terraform-docs-common +--- + +[organizations]: /terraform/enterprise/users-teams-organizations/organizations + +[teams]: /terraform/enterprise/users-teams-organizations/teams + +[invite]: /terraform/enterprise/users-teams-organizations/organizations#users + +[owners]: /terraform/enterprise/users-teams-organizations/teams#the-owners-team + +# Create and manage users + +User accounts belong to individual people. Each user can be part of one or more [teams](/terraform/enterprise/users-teams-organizations/teams), which are granted permissions on workspaces within an organization. A user can be a member of multiple [organizations][]. + +## API + +Use the [Account API](/terraform/enterprise/api-docs/account) to get account details, update account information, and change your password. + + + +## Log in with a HashiCorp Cloud Platform account + +We recommend using a [HashiCorp Cloud Platform (HCP)](https://portal.cloud.hashicorp.com/sign-up) account to log in to HCP Terraform. Your HCP Account grants access to every HashiCorp product and the Terraform Registry. If you use an HCP Account, you manage account settings like multi-factor authentication and password resets from within HCP instead of the HCP Terraform UI. + +To log in with your HCP account, navigate to [HCP Terraform](https://app.terraform.io/) and click **Continue with HCP account**. HCP Terraform may ask if you want to link your account. + +### Linking HCP and HCP Terraform accounts + +The first time you log in with your HCP credentials, HCP Terraform searches for an existing HCP Terraform account with the same email address. If you have an unlinked account, HCP Terraform asks if you want to link it to your HCP account. Otherwise, if no account matches your HCP account's email address, HCP Terraform creates and automatically links a new HCP Terraform account to your HCP account. + +> **Note**: You can only log in with your HCP credentials after linking your HCP and HCP Terraform accounts. We do not recommend linking your account if you use an SSO provider to log in to HCP Terraform because linking your account may conflict with your existing SSO configuration. + +The only way to log in with your old HCP Terraform credentials is to unlink your HCP Terraform and HCP accounts. If HCP Terraform generated an account for you, you cannot unlink that account from your HCP account. You can unlink a pre-existing HCP Terraform account on the [HCP Account Linking page](#hcp-account-linking) in your **Account settings**. + + + +## Creating an account + +To use HCP Terraform or Enterprise, you must create an account through one of the following methods: + +- **Invitation Email:** When a user sends you an invitation to join an existing HCP Terraform organization, the email includes a sign-up link. After you create an account, you can automatically join that organization and can begin using HCP Terraform. +- **Sign-Up Page:** Creating an account requires a username, an email address, and a password. [Sign up on HCP Terraform](https://app.terraform.io/public/signup/account) or if you have a Terraform Enterprise instance, go to `https:///public/signup/account`. + +After you create an account, you do not belong to any organizations. To begin using HCP Terraform, you can either [create an organization](/terraform/enterprise/users-teams-organizations/organizations#creating-organizations) or ask an organization owner to send you an invitation email to join their organization. + + + +We recommend logging into HCP Terraform [with your HCP account](#log-in-with-your-hashicorp-cloud-platform-account) instead of creating a separate HCP Terraform account. + + + +## Joining organizations and teams + +An organization owner or a user with [**Manage Membership**](/terraform/enterprise/users-teams-organizations/permissions#manage-membership) permissions enabled must [invite you to join their organization](/terraform/enterprise/users-teams-organizations/organizations#users) and [add you to one or more teams](/terraform/enterprise/users-teams-organizations/teams/manage#manage-team-membership). + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +HCP Terraform sends user invitations by email. If the invited email address matches an existing HCP Terraform account, the invitee can join the organization with that account. Otherwise, they must create a new account and then join the organization. + +## Site admin permissions + +On Terraform Enterprise instances, some user accounts have a special site admin permission that allows them to administer the entire instance. + +Admin permissions are distinct from normal organization-level permissions, and they apply to a different set of UI controls and API endpoints. Admin users can administer any resource across the instance when using the site admin pages or the [admin API](/terraform/enterprise/api-docs/admin), but they have normal user permissions when using an organization's standard UI controls and API endpoints. These normal user permissions are determined by team membership. + +Refer to [Administering Terraform Enterprise](/terraform/enterprise/admin) for more details. + +## Account settings + +To view your settings page, click your user icon and select **Account settings**. Your **Profile** page appears, showing your username, email address, and avatar. + +### Profile + +Click **Profile** in the sidebar to view and edit the username and email address associated with your HCP Terraform account. + +~> **Important:** HCP Terraform includes your username in URL paths to resources. If external systems make requests to these resources, you must update them before you change your username. + +HCP Terraform uses [Gravatar](http://en.gravatar.com) to display a user icon if you have associated one with your email address. Refer to the [Gravatar documentation](http://en.gravatar.com/support/) for details about changing your user icon. + +### Sessions + +Click **Sessions** in the sidebar to view a list of sessions associated with your HCP Terraform account. You can revoke any sessions you do not recognize. + + + +There are two types of Terraform accounts, standalone HCP Terraform accounts and HCP Terraform accounts linked to HCP accounts. + +### Idle session timeout + +HCP Terraform automatically terminates user sessions if there has been no end-user activity for a certain time period: + +- Standalone HCP Terraform accounts can stay idle and valid for up to 14 days by default +- HCP Terraform accounts linked to an HCP account follow the HCP defaults and can stay idle for 1 hour by default + +After HCP Terraform terminates a session, you can resume it by logging back in through the HCP Terraform portal. This is a security measure to prevent unauthorized access to unmonitored devices. + +-> **Note:** HCP Terraform organization owners can reduce the idle session timeout for an organization in the authentication settings for standalone HCP Terraform accounts, but cannot modify settings for HCP Terraform accounts linked to HCP accounts. + +### Forced re-authentication + +Forced re-authentication (e.g., “remember for”) makes a user re-authenticate, regardless of activity. This is a security measure to force a new identity verification to access sensitive IT and data managed by HCP Terraform. In this case, the user must re-authenticate their credentials and may be asked to verify 2FA/MFA again. + +- By default, standalone HCP Terraform accounts are forced to re-authenticate every 14 days +- By default, HCP Terraform accounts linked to an HCP account follow the HCP defaults and are forced to re-authenticate every 48 hours + +-> **Note:** HCP Terraform organization owners can reduce the idle session timeout for standalone HCP Terraform accounts, but cannot modify settings for HCP Terraform accounts linked to HCP accounts. + +### Impact to user experience + +The default re-authentication defaults force users to re-authenticate at the beginning of each work week (Monday through Friday). Note that several actions immediately terminate active sessions, including: + +- Manually logging out of the HCP or HCP Terraform portals +- Clearing browser session/cookies +- Closing all active browser windows + +Any of these actions requires you to re-authenticate regardless of session timeout settings. + + + +### Organizations + +Click **Organizations** in the sidebar to view a list of the organizations where you are a member. If you are on the [owners team][owners], the organization is marked with an **OWNER** badge. + +To leave an organization, click the ellipses (**...**) next to the organization and select **Leave organization**. You do not need permission from the owners to leave an organization, but you cannot leave if you are the last member of the owners team. Either add a new owner and then leave, or [delete the organization](/terraform/enterprise/users-teams-organizations/organizations#general). + +### Password + +Click **Password** in the sidebar to change your password. + +-> **Note:** Password management is not available if your Terraform Enterprise instance uses [SAML single sign on](/terraform/enterprise/saml/configuration). +-> **Note:** Passwords must be at least 10 characters in length, and you can use any type of character. Password management is not available if your Terraform Enterprise instance uses [SAML single sign on](/terraform/enterprise/saml/configuration). + +### Two-factor authentication + +Click **Two Factor Authentication** in the sidebar to enable two-factor authentication. Two-factor authentication requires a TOTP-compliant application or an SMS-capable phone number. An organization can set policies that require two-factor authentication. + +Refer to [Two-Factor Authentication](/terraform/enterprise/users-teams-organizations/2fa) for details. + + + +### HCP account linking + +Click **HCP Account Linking** in the sidebar to unlink your HCP Terraform from your HCP Account. You cannot unlink an account that HCP Terraform autogenerated during the linking process. Refer to [Linked HCP and HCP Terraform Accounts](#linked-hcp-and-hcp-terraform-accounts) for more details. + +After you unlink, you can begin using your HCP Terraform credentials to log in. You cannot log in with your HCP account again unless you re-link it to your HCP Terraform account. + +### SSO identities + +Click **SSO Identities** in the sidebar to review and [remove SSO identity links](/terraform/enterprise/users-teams-organizations/single-sign-on/linking-user-account#remove-sso-identity-link) associated with your account. + +You have an SSO identity for every SSO-enabled HCP Terraform organization. HCP Terraform links each SSO identity to a single HCP Terraform user account. This link determines which account you can use to access each organization. + + + +### Tokens + +Click **Tokens** in the sidebar to create, manage, and revoke API tokens. HCP Terraform has three kinds of API tokens: user, team, and organization. Users can be members of multiple organizations, so user tokens work with any organization where the associated user is a member. Refer to [API Tokens](/terraform/enterprise/users-teams-organizations/api-tokens) for details. + +API tokens are required for the following tasks: + +- Authenticating with the [HCP Terraform API](/terraform/enterprise/api-docs). API calls require an `Authorization: Bearer ` HTTP header. +- Authenticating with the [HCP Terraform CLI integration](/terraform/cli/cloud/settings) or the [`remote` backend](/terraform/language/settings/backends/remote). These require a token in the CLI configuration file or in the backend configuration. +- Using [private modules](/terraform/enterprise/registry/using) in command-line runs on local machines. This requires [a token in the CLI configuration file](/terraform/enterprise/registry/using#authentication). + +Protect your tokens carefully because they contain the same permissions as your user account. For example, if you belong to a team with permission to read and write variables for a workspace, another user could use your API token to authenticate as your user account and also edit variables in that workspace. Refer to [permissions](/terraform/enterprise/users-teams-organizations/permissions) for more details. + +We recommend protecting your tokens by creating them with an expiration date and time. Refer to [API Token Expiration](/terraform/enterprise/users-teams-organizations/api-tokens#token-expiration) for details. + +#### Creating a token + + To create a new token: + +1. Click **Create an API token**. The **Create API token** box appears. +2. Enter a **Description** that explains what the token is for and click **Create API token**. +3. You can optionally enter the token's expiration date or time, or create a token that never expires. The UI displays a token's expiration date and time in your current time zone. +4. Copy your token from the box and save it in a secure location. HCP Terraform only displays the token once, right after you create it. If you lose it, you must revoke the old token and create a new one. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +#### Revoking a token + +To revoke a token, click the **trash can** next to it. That token will no longer be able to authenticate as your user account. + +~> **Note**: HCP Terraform does not revoke a user API token's access to an organization when you remove the user from an SSO Identity Provider as the user may still be a member of the organization. To remove access to a user's API token, remove the user from the organization in the UI or with the [Terraform Enterprise provider](https://registry.terraform.io/providers/hashicorp/tfe/latest). + +### GitHub app OAuth token + +Click **Tokens** in the sidebar to manage your GitHub App token. This token lets you connect a workspaces to an available GitHub App installation. + +~> **Note:** Only an HCP Terraform user can own a GitHub App token. Team and Organization API tokens are not able to own a GitHub App token. + +A GitHub App token lets you: + +- Connect workspaces, policy sets, and registry modules to a GitHub App installation with the [HCP Terraform API](/terraform/enterprise/api-docs) and UI. +- View available GitHub App installations with the [HCP Terraform API](/terraform/enterprise/api-docs) and UI. + +After generating this token, you can use it to view information about your available installations for the Terraform Cloud GitHub App. + +#### Creating a GitHub app token + +To create a GitHub App token, click **Create a GitHub App token**. The **GitHub App authorization pop-up window** appears requesting authorization of the Terraform Cloud GitHub App. + +~> **Note:** This does not grant HCP Terraform access to repositories. + +#### Revoking a GitHub app token + +To revoke the GitHub App token, click the **ellipses button (...)**. The dropdown menu appears. Click the **Delete Token** option. This triggers a confirmation window to appear, which asks you to confirm that you want to revoke the token. Once confirmed, the token is revoked and you can no longer view GitHub App installations. + +#### Additional resources + +- [GitHub App permissions in HCP Terraform](/terraform/enterprise/vcs/github-app#github-permissions) diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/azure-devops-server.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/azure-devops-server.mdx new file mode 100644 index 000000000..841d8e7ec --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/azure-devops-server.mdx @@ -0,0 +1,92 @@ +--- +page_title: Set up the Azure DevOps Server VCS provider +description: >- + Learn how to use an on-premises installation of Azure DevOps Server 2019 with + workspaces and private registry modules in Terraform Enterprise. +source: terraform-docs-common +--- + +# Set up the Azure DevOps Server VCS provider + +These instructions are for using an on-premises installation of Azure DevOps Server 2019 for HCP Terraform's VCS features. [Azure DevOps Services has separate instructions,](/terraform/enterprise/vcs/azure-devops-services) as do the [other supported VCS providers.](/terraform/enterprise/vcs) + +Configuring a new VCS provider requires permission to manage VCS settings for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Important Notes About Authentication + +HCP Terraform uses personal access tokens to connect to Azure DevOps Server. This access method requires some additional configuration and ongoing maintenance: + +- [IIS Basic Authentication must be disabled](https://docs.microsoft.com/en-us/azure/devops/integrate/get-started/authentication/iis-basic-auth?view=azure-devops) on your Azure DevOps Server instance in order to use personal access tokens. +- Personal access tokens eventually expire, with a maximum allowed lifetime of one year. If HCP Terraform's token expires, it will be unable to connect to Azure DevOps Server until the token is replaced. To avoid a gap in service, do one of the following before the token expires: + - Update the expiration date of the existing token within Azure DevOps Server. + - Create a new token, and edit HCP Terraform's VCS connection to use it. + +## Step 1: On HCP Terraform, Begin Adding a New VCS Provider + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add the VCS provider. + +2. Choose **Settings** from the sidebar, then click **Providers**. + +3. Click **Add VCS Provider**. The **VCS Providers** page appears. + +4. Select **Azure DevOps** and then select **Azure DevOps Server** from the menu. The page moves to the next step. + +5. On the "Set up provider" step there are three textboxes. Enter an optional **Name** for this VCS connection. Enter the instance URL for your Azure DevOps Server in **HTTP URL** and **API URL** textboxes. Click the "Continue" button to continue to the next step. + +Leave the page open in a browser tab. In the next step you will copy values from this page, and in later steps you will continue configuring HCP Terraform. + +## Step 2: On Azure DevOps Server, Create a New Personal Access Token + +1. In a new browser tab, open your Azure DevOps Server instance and log in as whichever account you want HCP Terraform to act as. For most organizations this should be a dedicated service user, but a personal account will also work. + + ~> **Important:** The account you use for connecting HCP Terraform **must have Project Collection Administrator access** to any projects containing repositories of Terraform configurations, since creating webhooks requires these permissions. It is not possible to create custom access roles with lower levels of privilege, as Microsoft does not currently allow delegation of this capability. + +2. Navigate to User settings -> Security -> Personal access tokens. + +3. Click the **New Token** button to generate a new personal access token with "Code (Read)" and "Code (Status)" scopes. (We recommend also granting access to "All accessible organizations.") + +4. Copy the generated token to your clipboard; you'll paste it in the next step. Leave this page open in a browser tab. + +## Step 3: Add the Personal Access Token on HCP Terraform + +1. On the "Configure settings" step there is one textbox. Enter your Azure DevOps Server **Personal Access Token** from Step 2. Click the "Continue" button to continue to the next step. + +## Step 4: Configure VCS Provider Scope on HCP Terraform (Optional) + +This step is optional. You can configure which workspaces can use repositories from this VCS provider. By default the **All Projects** option is selected, meaning this VCS provider is available to be used by all workspaces in the organization. + +To limit the scope of this VCS Provider: + +1. Select the **Selected Projects** option and use the text field that appears to search for and select projects to enable. All current and future workspaces for any selected projects can use repositories from this VCS Provider. + +2. Click the **Update VCS Provider** button to save your selections. + +## Step 5: On Workstation, Create an SSH Key for HCP Terraform + +On a secure workstation, create an SSH keypair that HCP Terraform can use to connect to Azure DevOps Server. The exact command depends on your OS, but is usually something like `ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise"`. This creates a `service_terraform` file with the private key, and a `service_terraform.pub` file with the public key. + +This SSH key **must have an empty passphrase.** HCP Terraform cannot use SSH keys that require a passphrase. + +### Important Notes + +- Do not use your personal SSH key to connect HCP Terraform and Azure DevOps Server; generate a new one or use an existing key reserved for service access. +- In the following steps, you must provide HCP Terraform with the private key. Although HCP Terraform does not display the text of the key to users after it is entered, it retains it and will use it for authenticating to Azure DevOps Server. +- **Protect this private key carefully.** It can read code to the repositories you use to manage your infrastructure. Take note of your organization's policies for protecting important credentials and be sure to follow them. + +## Step 6: On Azure Devops Server, Add SSH Public Key + +1. Navigate to User settings -> Security -> SSH public keys on your Azure DevOps Server instance. + + ![Azure DevOps Server screenshot: the SSH keys page](/img/docs/azure-devops-server-public-keys.png) + +2. Click the **Add** button. Paste the text of the **SSH public key** you created in step 3 (from the `.pub` file) into the text field, then click the **Add key** button to confirm. + +## Step 7: On HCP Terraform, Add SSH Private Key + +1. Go back to your HCP Terraform browser tab and paste the text of the **SSH private key** you created in step 3 into the **Private SSH Key** text field of the "Set up SSH keypair" step. Click the "Add SSH key" button. + +## Finished + +At this point, Azure DevOps Server access for HCP Terraform is fully configured, and you can create Terraform workspaces based on your organization's repositories. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/azure-devops-services.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/azure-devops-services.mdx new file mode 100644 index 000000000..959b1c620 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/azure-devops-services.mdx @@ -0,0 +1,130 @@ +--- +page_title: Set up the Azure DevOps Services VCS provider +description: >- + Learn how to use Azure DevOps Services with workspaces and private registry + modules in Terraform Enterprise. +source: terraform-docs-common +--- + +# Set up the Azure DevOps Services VCS provider + +These instructions are for using `dev.azure.com` for HCP Terraform's VCS features. [Other supported VCS providers](/terraform/enterprise/vcs) have separate instructions. + +This page explains the four main steps required to connect HCP Terraform to your Azure DevOps Services VCS: + +1. Create a new connection in HCP Terraform and get the callback URL. +2. On your VCS, register your HCP Terraform organization as a new application. Provide the callback URL and get the application ID and key. +3. Provide HCP Terraform with the application ID and key. Then, request VCS access. +4. On your VCS, approve the access request from HCP Terraform. + +~> **Important:** HCP Terraform only supports Azure DevOps connections that use the `dev.azure.com` domain. If your Azure DevOps project uses the older `visualstudio.com` domain, you must migrate using the [steps in the Microsoft documentation](https://docs.microsoft.com/en-us/azure/devops/release-notes/2018/sep-10-azure-devops-launch#switch-existing-organizations-to-use-the-new-domain-name-url). + +## Requirements + +Configuring a new VCS provider requires permission to [manage VCS settings](/terraform/enterprise/users-teams-organizations/permissions#manage-vcs-settings) for the organization. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Before you begin, enable `Third-party application access via OAuth` in Azure DevOps Services settings. + +1. Log in to [Azure DevOps Services](https://dev.azure.com/). +2. Click **Organization settings**. +3. Click **Policies** under **Security**. +4. Enable the **Third-party application access via OAuth** setting. + + ![Azure DevOps Services Screenshot: Policies Third-party application access via Oauth](/img/docs/azure-devops-services-oauth-policies.png) + +## Step 1: On HCP Terraform, Begin Adding a New VCS Provider + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add the VCS provider. + +2. Choose **Settings** from the sidebar, then click **Providers**. + +3. Click **Add VCS Provider**. The **VCS Providers** page appears. + +4. Select **Azure DevOps** and then select **Azure DevOps Services** from the menu. The page moves to the next step. + +Leave this page open in a browser tab. You will copy values from this page into Azure DevOps in the next step, and in later steps you will continue configuring HCP Terraform. + +## Step 2: From your Azure DevOps Services Profile, Create a New Application + +1. In a new browser tab, open your [Azure DevOps Services Profile](https://aex.dev.azure.com), and log in to your Azure DevOps Services account if necessary. A page with a list of your organizations appears. + + ~> **Important:** The Azure DevOps Services account you use for connecting HCP Terraform must have Project Collection Administrator access to any projects containing repositories of Terraform configurations, since creating webhooks requires admin permissions. It is not possible to create custom access roles with lower levels of privilege, as Microsoft does not currently allow delegation of this capability. If you're unable to load the link above, you can create a new application for the next step at one of the following links: `https://aex.dev.azure.com/app/register?mkt=en-US` or `https://app.vsaex.visualstudio.com/app/register?mkt=en-US`. + +2. Go into your preferred organization. + +3. Click your user icon and then click the **ellipses (...) ** and select **User settings**. + +4. From the User settings menu, click **Profile**. Your profile page appears. + +5. Click **Authorizations**. The Authorized OAuth Apps page appears. + +6. Click the link to register a new app. A form appears asking for your company and application information. + +7. Fill out the fields and checkboxes with the corresponding values currently displayed in your HCP Terraform browser tab. HCP Terraform lists the values in the order they appear and includes controls for copying values to your clipboard. Here is an example: + + | Field name | Value | + | -------------------------- | ----------------------------------------------------------------------------- | + | Company name | HashiCorp | + | Application Name | HCP Terraform (``) | + | Application website | `https://app.terraform.io` (or the URL of your Terraform Enterprise instance) | + | Authorization callback URL | `https://app.terraform.io/` | + + In the **Authorized scopes** section, select only **Code (read)** and **Code (status)** and then click **Create Application.** + + ![Azure DevOps Services Screenshot: Required permissions when creating a new application in your Azure DevOps Services Profile](/img/docs/azure-devops-services-application-permissions.png) + + ~> **Important:** Do not add any additional scopes beyond **Code (read)** and **Code (status),** as this can prevent HCP Terraform from connecting. Note that these authorized scopes cannot be updated after the application is created; to fix incorrect scopes you must delete and re-create the application. + +8. After creating the application, the next page displays its details. Leave this page open in a browser tab. In the next step, you will copy and paste the unique **App ID** and **Client Secret** from this page. + + If you accidentally close this details page and need to find it later, you can reach it from the **Applications and Services** links in your profile. + +## Step 3: On HCP Terraform, Set up Your Provider + +1. (Optional) Enter a **Name** for this VCS connection. + +2. Enter your Azure DevOps Services application's **App ID** and **Client Secret**. These can be found in the application's details, which should still be open in the browser tab from Step 2. + +3. Click **Connect and continue.** This takes you to a page on Azure DevOps Services, asking whether you want to authorize the app. Click the **Accept** button and you'll be redirected back to HCP Terraform. + + -> **Note:** If you receive a 404 error from Azure DevOps Services, it likely means your callback URL has not been configured correctly. + +## Step 4: On HCP Terraform, Configure Advanced Settings (Optional) + +The settings in this section are optional. The Advanced Settings you can configure are: + +- **Scope of VCS Provider** - You can configure which workspaces can use repositories from this VCS provider. By default the **All Projects** option is selected, meaning this VCS provider is available to be used by all workspaces in the organization. +- **Set up SSH Keypair** - Most organizations will not need to add an SSH key. However, if the organization repositories include Git submodules that can only be accessed via SSH, an SSH key can be added along with the OAuth credentials. You can add or update the SSH key at a later time. + +### If You Don't Need to Configure Advanced Settings: + +1. Click the **Skip and Finish** button. This returns you to HCP Terraform's VCS Provider page, which now includes your new Azure DevOps Services client. + +### If You Need to Limit the Scope of this VCS Provider: + +1. Select the **Selected Projects** option and use the text field that appears to search for and select projects to enable. All current and future workspaces for any selected projects can use repositories from this VCS Provider. + +2. Click the **Update VCS Provider** button to save your selections. + +### If You Do Need an SSH Keypair: + +#### Important Notes + +- SSH will only be used to clone Git submodules. All other Git operations will still use HTTPS. +- Do not use your personal SSH key to connect HCP Terraform and Azure DevOps Services; generate a new one or use an existing key reserved for service access. +- In the following steps, you must provide HCP Terraform with the private key. Although HCP Terraform does not display the text of the key to users after it is entered, it retains it and will use it when authenticating to Azure DevOps Services. +- **Protect this private key carefully.** It can push code to the repositories you use to manage your infrastructure. Take note of your organization's policies for protecting important credentials and be sure to follow them. + +1. On a secure workstation, create an SSH keypair that HCP Terraform can use to connect to Azure DevOps Services.com. The exact command depends on your OS, but is usually something like: + `ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise"` + This creates a `service_terraform` file with the private key, and a `service_terraform.pub` file with the public key. This SSH key **must have an empty passphrase**. HCP Terraform cannot use SSH keys that require a passphrase. + +2. While logged into the Azure DevOps Services account you want HCP Terraform to act as, navigate to the SSH Keys settings page, add a new SSH key and paste the value of the SSH public key you just created. + +3. In HCP Terraform's **Add VCS Provider** page, paste the text of the **SSH private key** you just created, and click the **Add SSH Key** button. + +## Finished + +At this point, Azure DevOps Services access for HCP Terraform is fully configured, and you can create Terraform workspaces based on your organization's repositories. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/bitbucket-cloud.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/bitbucket-cloud.mdx new file mode 100644 index 000000000..41e33f867 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/bitbucket-cloud.mdx @@ -0,0 +1,127 @@ +--- +page_title: Set up the Bitbucket Cloud VCS provider +description: >- + Learn how to use Bitbucket Cloud with workspaces and private registry modules + in Terraform Enterprise. +source: terraform-docs-common +--- + +# Set up the Bitbucket Cloud VCS provider + +This topic describes how to connect Bitbucket Cloud to HCP Terraform. Bitbucket Cloud is the cloud-hosted version of Bitbucket. For self-hosted Bitbucket Data Center instances, refer to [Configuring Bitbucket Data Center Access](/terraform/enterprise/vcs/bitbucket-data-center). Refer to [Connecting VCS Providers to HCP Terraform](/terraform/enterprise/vcs) for other supported VCS providers. + +Configuring a new VCS provider requires permission to manage VCS settings for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Connecting HCP Terraform to your VCS involves four steps: + +| On your VCS | On HCP Terraform | +| -------------------------------------------------------------------------------------------- | ----------------------------------------------------------- | +|   | Create a new connection in HCP Terraform. Get callback URL. | +| Register your HCP Terraform organization as a new app. Provide callback URL. Get ID and key. |   | +|   | Provide HCP Terraform with ID and key. Request VCS access. | +| Approve access request. |   | + +The rest of this page explains the Bitbucket Cloud-specific versions of these steps. + +## Step 1: On HCP Terraform, Begin Adding a New VCS Provider + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add the VCS provider. + +2. Choose **Settings** from the sidebar, then click **Providers**. + +3. Click **Add VCS Provider**. The **VCS Providers** page appears. + +4. Select **Bitbucket** and then select **Bitbucket Cloud** from the menu. The page moves to the next step. + +Leave the page open in a browser tab. In the next step you will copy values from this page, and in later steps you will continue configuring HCP Terraform. + +## Step 2: On Bitbucket Cloud, Create a New OAuth Consumer + +1. In a new browser tab, open [Bitbucket Cloud](https://bitbucket.org) and log in as whichever account you want HCP Terraform to act as. For most organizations this should be a dedicated service user, but a personal account will also work. + + ~> **Important:** The account you use for connecting HCP Terraform **must have admin access** to any shared repositories of Terraform configurations, since creating webhooks requires admin permissions. + +2. Navigate to Bitbucket's "Add OAuth Consumer" page. + + This page is located at `https://bitbucket.org//workspace/settings/oauth-consumers/new`. You can also reach it through Bitbucket's menus: + + - Click your profile picture and choose the workspace you want to access. + - Click "Settings". + - Click "OAuth consumers," which is in the "Apps and Features" section. + - On the OAuth settings page, click the "Add consumer" button. + +3. This page has a form with several text fields and checkboxes. + + Fill out the fields and checkboxes with the corresponding values currently displayed in your HCP Terraform browser tab. HCP Terraform lists the values in the order they appear, and includes controls for copying values to your clipboard. + + Fill out the text fields as follows: + + | Field | Value | + | ------------ | ----------------------------------------------------------------------------- | + | Name | HCP Terraform (``) | + | Description | Any description of your choice. | + | Callback URL | `https://app.terraform.io/` | + | URL | `https://app.terraform.io` (or the URL of your Terraform Enterprise instance) | + + Ensure that the "This is a private consumer" option is checked. Then, activate the following permissions checkboxes: + + | Permission type | Permission level | + | --------------- | ---------------- | + | Account | Write | + | Repositories | Admin | + | Pull requests | Write | + | Webhooks | Read and write | + +4. Click the "Save" button, which returns you to the OAuth settings page. + +5. Find your new OAuth consumer under the "OAuth Consumers" heading, and click its name to reveal its details. + + Leave this page open in a browser tab. In the next step, you will copy and paste the unique **Key** and **Secret.** + +## Step 3: On HCP Terraform, Set up Your Provider + +1. Enter the **Key** and **Secret** from the previous step, as well as an optional **Name** for this VCS connection. + +2. Click "Connect and continue." This takes you to a page on Bitbucket Cloud asking whether you want to authorize the app. + +3. Click the blue "Grant access" button to proceed. + +## Step 4: On HCP Terraform, Configure Advanced Settings (Optional) + +The settings in this section are optional. The Advanced Settings you can configure are: + +- **Scope of VCS Provider** - You can configure which workspaces can use repositories from this VCS provider. By default the **All Projects** option is selected, meaning this VCS provider is available to be used by all workspaces in the organization. +- **Set up SSH Keypair** - Most organizations will not need to add an SSH key. However, if the organization repositories include Git submodules that can only be accessed via SSH, an SSH key can be added along with the OAuth credentials. You can add or update the SSH key at a later time. + +### If You Don't Need to Configure Advanced Settings: + +1. Click the **Skip and Finish** button. This returns you to HCP Terraform's VCS Provider page, which now includes your new Bitbucket Cloud client. + +### If You Need to Limit the Scope of this VCS Provider: + +1. Select the **Selected Projects** option and use the text field that appears to search for and select projects to enable. All current and future workspaces for any selected projects can use repositories from this VCS Provider. + +2. Click the **Update VCS Provider** button to save your selections. + +### If You Do Need an SSH Keypair: + +#### Important Notes + +- SSH will only be used to clone Git submodules. All other Git operations will still use HTTPS. +- Do not use your personal SSH key to connect HCP Terraform and Bitbucket Cloud; generate a new one or use an existing key reserved for service access. +- In the following steps, you must provide HCP Terraform with the private key. Although HCP Terraform does not display the text of the key to users after it is entered, it retains it and will use it when authenticating to Bitbucket Cloud. +- **Protect this private key carefully.** It can push code to the repositories you use to manage your infrastructure. Take note of your organization's policies for protecting important credentials and be sure to follow them. + +1. On a secure workstation, create an SSH keypair that HCP Terraform can use to connect to Bitbucket Cloud. The exact command depends on your OS, but is usually something like: + `ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise"` + This creates a `service_terraform` file with the private key, and a `service_terraform.pub` file with the public key. This SSH key **must have an empty passphrase**. HCP Terraform cannot use SSH keys that require a passphrase. + +2. While logged into the Bitbucket Cloud account you want HCP Terraform to act as, navigate to the SSH Keys settings page, add a new SSH key and paste the value of the SSH public key you just created. + +3. In HCP Terraform's **Add VCS Provider** page, paste the text of the **SSH private key** you just created, and click the **Add SSH Key** button. + +## Finished + +At this point, Bitbucket Cloud access for HCP Terraform is fully configured, and you can create Terraform workspaces based on your organization's shared repositories. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/bitbucket-data-center.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/bitbucket-data-center.mdx new file mode 100644 index 000000000..24d13c988 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/bitbucket-data-center.mdx @@ -0,0 +1,128 @@ +--- +page_title: Set up the Bitbucket Data Center VCS provider +description: >- + Learn how to use Bitbucket Data Center with workspaces and private registry + modules in Terraform Enterprise. +source: terraform-docs-common +--- + +# Set up the Bitbucket Data Center VCS provider + +This topic describes how to connect Bitbucket Data Center to HCP Terraform. For instructions on how to connect Bitbucket Cloud, refer to [Configuring Bitbucket Cloud Access](/terraform/enterprise/vcs/bitbucket-cloud). Refer to [Connecting VCS Providers to HCP Terraform](/terraform/enterprise/vcs) for other supported VCS providers. + +**Bitbucket Server is deprecated**. Atlassian ended support for Bitbucket Server on February 15, 2024, and recommends using either Bitbucket Data Center (v8.0 or newer) or Bitbucket Cloud instead. Refer to the [Atlassian documentation](https://bitbucket.org/blog/cloud-migration-benefits) for additional information. + +HCP Terraform will end support Bitbucket Server on August 15, 2024. Terraform Enterprise will also end support for Bitbucket Server in Terraform Enterprise v202410. [Contact HashiCorp support](https://support.hashicorp.com/hc/en-us) if you have any questions regarding this change. + +## Overview + +The following steps provide an overview of how to connect HCP Terraform and Terraform Enterprise to Bitbucket Data Center: + +1. Add a new VCS provider to HCP Terraform or Enterprise. +2. Create a new application link in Bitbucket. +3. Create an SSH key pair. SSH keys must have an empty passphrase because HCP Terraform cannot use SSH keys that require a passphrase. +4. Add an SSH key to Bitbucket. You must complete this step as a non-administrator user in Bitbucket. +5. Add the private SSH key to Terraform. + +## Requirements + +- You must have permission to manage VCS settings for the organization. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for additional information. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +- You must have OAuth authentication credentials for Bitbucket Data Center. + +- Your instance of Bitbucket Data Center must be internet-accessible on its SSH and HTTP(S) ports. This is because HCP Terraform must be able to contact Bitbucket Data Center over both SSH and HTTP or HTTPS during setup and during normal operation. + +- HCP Terraform must have network connectivity to Bitbucket Data Center instances. Note that [Bitbucket Data Center's default ports](https://confluence.atlassian.com/bitbucketserverkb/which-ports-does-bitbucket-server-listen-on-and-what-are-they-used-for-806029586.html) are `7999` for SSH and `7990` for HTTP. Check your configuration to confirm your BitBucket instance's real ports. + +## Add a new VCS provider to Terraform + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add the VCS provider. + +2. Choose **Settings** from the sidebar, then click **Providers**. + +3. Click **Add VCS Provider**. The **VCS Providers** page appears. + +4. Choose **Bitbucket Data Center** from the **Bitbucket** drop-down menu. + +5. (Optional) Enter a **Name** for this VCS connection. + +6. Specify the URL of your Bitbucket Data Center instance in the **HTTP URL** and **API URL** fields. If the context path is not set for your Bitbucket Data Center instance, the **API URL** is the same as the **HTTP URL**. Refer to the [Atlassian documentation](https://confluence.atlassian.com/bitbucketserver/moving-bitbucket-server-to-a-different-context-path-776640153.html) for additional information. Specify the following values if the context path is set for your Bitbucket Data Center instance: + + - Set the **HTTP URL** field to your Bitbucket Data Center instance URL and add the context path: `https:///`. + - Set the **API URL** field to your Bitbucket Data Center instance URL: `https://`. + + By default, HCP Terraform uses port `80` for HTTP and `443` for HTTPS. If Bitbucket Data Center is configured to use non-standard ports or is behind a reverse proxy, you may need to include the port number in the URL. + +7. You can either generate new consumer and public keys that you can use to create a new application link in Bitbucket Data Center described in [Create an application link](#create-an-application-link) or use keys from an existing application link: + - To generate new keys, click **Continue**. Do not leave this screen until you have copied the key values. + - To use existing keys, enable the **Use Custom Keys** option and enter them into the fields. + +## Create an application link + +1. Log into Bitbucket Data Center as an admin. + +2. Open the **Application Links** administration page using the navigation or by entering `https:///plugins/servlet/applinks/listApplicationLinks` in your browser's address bar. + +3. Click **Application Links** in the sidebar, then click **Create new link**. + +4. Choose **Atlassian product** as the link type. This option also works for external applications and lets you continue to use OAuth 1.0 integrations. + +5. Enter `https://app.terraform.io` or the hostname of your Terraform Enterprise instance when prompted. You can only specify the main URL once. To connect multiple HCP Terraform organizations to the same Bitbucket Data Center instance, enter the organization URL when creating the link instead. The organization URL is the HCP Terraform URL or Terraform Enterprise hostname appended with `/app/`. + +6. When prompted, confirm that you wish to use the URL as entered. If you specified HCP Terraform's main URL, click **Continue**. If you specified an organization URL, enable the **Use this URL** option and then click **Continue**. + +7. In the **Link applications** dialog, configure the following settings: + + - Specify `HCP Terraform ` in the **Application Name** field + - Choose **Generic Application** from the **Application Type** drop-down menu + - Enable the **Create incoming link** option + + Leave all the other fields empty. + +8. Click **Continue**. The **Link applications** screen progresses to the second configuration screen. + +9. In the **Consumer Key** and **Public Key** fields, enter the key values you created in the [Add a new VCS provider to Terraform](#add-a-new-vcs-provider-to-terraform) instructions. + +10. In the **Consumer Name** field, enter `HCP Terraform ()`. + +11. Click **Continue**. Bitbucket prompts you to authorize Terraform to make changes. Before you proceed, verify that you are logged in with the user account that HCP Terraform will use to access Bitbucket and not as a Bitbucket administrator. If Bitbucket returns a 500 error instead of the authorization screen, Terraform may have been unable to reach your Bitbucket Data Center instance. + +12. Click **Allow** and enter the SSH key when prompted. + +## Create an SSH key for Terraform + +On a secure workstation, create an SSH keypair that HCP Terraform or Terraform Enterprise can use to connect to Bitbucket Data Center. The command for generating SSH keys depends on your OS. The following example for Linux creates a `service_terraform` file with the private key and a `service_terraform.pub` file with the public key: + +```shell-session +$ ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise" +``` + +Do not specify a passphrase because Terraform cannot use SSH keys that require a passphrase. + +## Add an SSH key to Bitbucket + +In the following steps, you must provide HCP Terraform with the private SSH key you created in [Create an SSH key for Terraform](#create-an-ssh-key-for-terraform). Although HCP Terraform does not display the text of the key to users after it is entered, it retains the key and uses it for authenticating to Bitbucket Data Center. + +1. If you are logged into Bitbucket Data Center as an administrator, log out before proceeding. +2. Log in with the account that you want to enable HCP Terraform or Terraform Enterprise to log in with. Many organizations use a dedicated service user account for this purpose. The account you use for connecting HCP Terraform must have admin access to any shared repositories of Terraform configurations because since creating webhooks requires admin permissions. Refer to [Requirements](#requirements) for additional information. +3. Open the **SSH keys** page and click the profile icon. +4. Choose **Manage account**. +5. Click **SSH keys** or enter `https:///plugins/servlet/ssh/account/keys` in the address bar to go to the **SSH keys** screen. +6. Click **Add key** and enter the SSH public key you created in [Create an SSH key for Terraform](#create-an-ssh-key-for-terraform) into the text field. Open the `.pub` file to get the key value. +7. Click **Add key** to finish adding the key. + +## Add an SSH private key + +Complete the following steps in HCP Terraform or Terraform Enterprise to request access to Bitbucket and add the SSH private key. + +1. Open the **SSH keys** settings page and click **Add a private SSH key**. A large text field appears. +2. Enter the text of the **SSH private key** you created in [Create an SSH key for Terraform](#create-an-ssh-key-for-terraform) and click **Add SSH Key**. + +## Next steps + +After completing these instructions, you can create Terraform workspaces based on your organization's shared repositories. Refer to the following resources for additional guidance: + +- [Creating Workspaces](/terraform/enterprise/workspaces/create) in HCP Terraform +- [Creating Workspaces](/terraform/enterprise/workspaces/create) in Terraform Enterprise diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/github-enterprise.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/github-enterprise.mdx new file mode 100644 index 000000000..ffdc1dd99 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/github-enterprise.mdx @@ -0,0 +1,140 @@ +--- +page_title: Set up the GitHub Enterprise VCS provider +description: >- + Learn how to use an on-premise installation of GitHub Enterprise with + workspaces and private registry modules in Terraform Enterprise. +source: terraform-docs-common +--- + +# Set up the GitHub Enterprise VCS provider + +These instructions are for using a self-hosted installation of GitHub Enterprise for HCP Terraform's VCS features. [GitHub.com has separate instructions,](/terraform/enterprise/vcs/github-enterprise) as do the [other supported VCS providers.](/terraform/enterprise/vcs) + +Configuring a new VCS provider requires permission to manage VCS settings for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Connecting HCP Terraform to your VCS involves four steps: + +| On your VCS | On HCP Terraform | +| -------------------------------------------------------------------------------------------- | ----------------------------------------------------------- | +|   | Create a new connection in HCP Terraform. Get callback URL. | +| Register your HCP Terraform organization as a new app. Provide callback URL. Get ID and key. |   | +|   | Provide HCP Terraform with ID and key. Request VCS access. | +| Approve access request. |   | + +The rest of this page explains the GitHub Enterprise versions of these steps. + +~> **Important:** HCP Terraform needs to contact your GitHub Enterprise instance during setup and during normal operation. For the SaaS version of HCP Terraform, this means GitHub Enterprise must be internet-accessible; for Terraform Enterprise, you must have network connectivity between your Terraform Enterprise and GitHub Enterprise instances. + +-> **Note:** Alternately, you can skip the OAuth configuration process and authenticate with a personal access token. This requires using HCP Terraform's API. For details, see [the OAuth Clients API page](/terraform/enterprise/api-docs/oauth-clients). + +## Step 1: On HCP Terraform, begin adding a new VCS provider + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add the VCS provider. + +2. Choose **Settings** from the sidebar, then click **Providers**. + +3. Click **Add a VCS provider**. The **Add VCS Provider** page appears. + +4. Select **GitHub** and then select **GitHub Enterprise** from the menu. The page moves to the next step. + +5. In the "Set up provider" step, fill in the **HTTP URL** and **API URL** of your GitHub Enterprise instance, as well as an optional **Name** for this VCS connection. + + | Field | Value | + | -------- | ------------------------------------------- | + | HTTP URL | `https://` | + | API URL | `https:///api/v3` | + +Leave the page open in a browser tab. In the next step you will copy values from this page, and in later steps you will continue configuring HCP Terraform. + +## Step 2: On GitHub, create a new OAuth application + +1. In a new browser tab, open your GitHub Enterprise instance and log in as whichever account you want HCP Terraform to act as. For most organizations this should be a dedicated service user, but a personal account will also work. + + ~> **Important:** The account you use for connecting HCP Terraform **must have admin access** to any shared repositories of Terraform configurations, since creating webhooks requires admin permissions. + +2. Navigate to GitHub's Register a New OAuth Application page. + + This page is located at `https:///settings/applications/new`. You can also reach it through GitHub's menus: + + - Click your profile picture and choose "Settings." + - Click "OAuth Apps" (under the "Developer settings" section). + - Click the "Register a new application" button. + +3. This page has a form with four text fields. + + Fill out the fields with the corresponding values currently displayed in your HCP Terraform browser tab. HCP Terraform lists the values in the order they appear, and includes controls for copying values to your clipboard. + + Fill out the text fields as follows: + + | Field name | Value | + | -------------------------- | ----------------------------------------------------------------------------- | + | Application Name | HCP Terraform (``) | + | Homepage URL | `https://app.terraform.io` (or the URL of your Terraform Enterprise instance) | + | Application Description | Any description of your choice. | + | Authorization callback URL | `https://app.terraform.io/` | + +4. Click the "Register application" button, which creates the application and takes you to its page. + +5. Download this image of the HCP Terraform logo and upload it with the "Upload new logo" button or the drag-and-drop target. This optional step helps you identify HCP Terraform's pull request checks at a glance. + +6. Click the "Generate a new client secret" button. You will need this secret in the next step. + +7. Leave this page open in a browser tab. In the next step, you will copy and paste the unique **Client ID** and **Client Secret.** + +## Step 3: On HCP Terraform, set up your provider + +1. Enter the **Client ID** and **Client Secret** from the previous step. + +2. Click "Connect and continue." This takes you to a page on your GitHub Enterprise instance, asking whether you want to authorize the app. + +3. The authorization page lists any GitHub organizations this account belongs to. If there is a **Request** button next to the organization that owns your Terraform code repositories, click it now. Note that you need to do this even if you are only connecting workspaces to private forks of repositories in those organizations since those forks are subject to the organization's access restrictions. See [About OAuth App access restrictions](https://docs.github.com/en/organizations/managing-oauth-access-to-your-organizations-data/about-oauth-app-access-restrictions). + + If it results in a 500 error, it usually means HCP Terraform was unable to reach your GitHub Enterprise instance. + +4. Click the green "Authorize ``" button at the bottom of the authorization page. GitHub might request your password or multi-factor token to confirm the operation. + +## Step 4: On HCP Terraform, configure advanced settings (optional) + +The settings in this section are optional. The Advanced Settings you can configure are: + +- **Scope of VCS Provider** - You can configure which workspaces can use repositories from this VCS provider. By default the **All Projects** option is selected, meaning this VCS provider is available to be used by all workspaces in the organization. +- **Set up SSH Keypair** - Most organizations will not need to add an SSH key. However, if the organization repositories include Git submodules that can only be accessed via SSH, an SSH key can be added along with the OAuth credentials. You can add or update the SSH key at a later time. + +### If you don't need to configure advanced settings: + +1. Click the **Skip and finish** button. This returns you to HCP Terraform's VCS Providers page, which now includes your new GitHub Enterprise client. + +### If you need to limit the scope of this VCS provider: + +1. Select the **Selected Projects** option and use the text field that appears to search for and select projects to enable. All current and future workspaces for any selected projects can use repositories from this VCS Provider. + +2. Click the **Update VCS Provider** button to save your selections. + +### If you need an SSH keypair: + +#### Important notes + +- SSH will only be used to clone Git submodules. All other Git operations will still use HTTPS. +- Do not use your personal SSH key to connect HCP Terraform and GitHub Enterprise; generate a new one or use an existing key reserved for service access. +- In the following steps, you must provide HCP Terraform with the private key. Although HCP Terraform does not display the text of the key to users after it is entered, it retains it and will use it when authenticating to GitHub Enterprise. +- **Protect this private key carefully.** It can push code to the repositories you use to manage your infrastructure. Take note of your organization's policies for protecting important credentials and be sure to follow them. + +1. On a secure workstation, create an SSH keypair that HCP Terraform can use to connect to Github Enterprise. The exact command depends on your OS, but is usually something like: + `ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise"` + This creates a `service_terraform` file with the private key, and a `service_terraform.pub` file with the public key. This SSH key **must have an empty passphrase**. HCP Terraform cannot use SSH keys that require a passphrase. + +2. While logged into the GitHub Enterprise account you want HCP Terraform to act as, navigate to the SSH Keys settings page, add a new SSH key and paste the value of the SSH public key you just created. + +3. In HCP Terraform's **Add VCS Provider** page, paste the text of the **SSH private key** you just created, and click the **Add SSH Key** button. + +## Step 5: Contact Your GitHub organization admins + +If your organization uses OAuth app access restrictions, you had to click a **Request** button when authorizing HCP Terraform, which sent an automated email to the administrators of your GitHub organization. An administrator must approve the request before HCP Terraform can access your organization's shared repositories. + +If you're a GitHub administrator, check your email now and respond to the request; otherwise, contact whoever is responsible for GitHub accounts in your organization, and wait for confirmation that they've approved your request. + +## Finished + +At this point, GitHub access for HCP Terraform is fully configured, and you can create Terraform workspaces based on your organization's shared GitHub Enterprise repositories. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/github.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/github.mdx new file mode 100644 index 000000000..0ffe1630c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/github.mdx @@ -0,0 +1,145 @@ +--- +page_title: Set up the GitHub.com OAuth VCS provider +description: >- + Learn how to use GitHub.com with workspaces and private registry modules in + Terraform Enterprise with a per-organization OAuth connection. +source: terraform-docs-common +--- + +# Set up the GitHub.com OAuth VCS provider + +These instructions are for using GitHub.com for HCP Terraform's VCS features, using a per-organization OAuth connection with the permissions of one particular GitHub user. [GitHub Enterprise has separate instructions,](/terraform/enterprise/vcs/github-enterprise) as do the [other supported VCS providers.](/terraform/enterprise/vcs) + + + +For new users on HCP Terraform, we recommend using our [configuration-free GitHub App](/terraform/enterprise/vcs/github-app) to access repositories instead. + + + +For Terraform Enterprise site admins, you can create your own [GitHub App](/terraform/enterprise/admin/application/github-app-integration) to access repositories. + +Configuring a new VCS provider requires permission to manage VCS settings for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Connecting HCP Terraform to your VCS involves four steps: + +| On your VCS | On HCP Terraform | +| ---------------------------------------------------------------------------- | ----------------------------------------------------------- | +|   | Create a new connection in HCP Terraform. Get callback URL. | +| Register your HCP Terraform organization as a new app. Provide callback URL. |   | +|   | Provide HCP Terraform with ID and key. Request VCS access. | +| Approve access request. |   | + +The rest of this page explains the GitHub versions of these steps. + +-> **Note:** Alternately, you can skip the OAuth configuration process and authenticate with a personal access token. This requires using HCP Terraform's API. For details, see [the OAuth Clients API page](/terraform/enterprise/api-docs/oauth-clients). + +## Step 1: On HCP Terraform, begin adding a new VCS provider + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add the VCS provider. + +2. Choose **Settings** from the sidebar, then click **Providers**. + +3. Click **Add a VCS provider**. The **Add VCS Provider** page appears. + +4. Select **GitHub** and then select **GitHub.com (Custom)** from the menu. The page moves to the next step. + +Leave the page open in a browser tab. In the next step you will copy values from this page, and in later steps you will continue configuring HCP Terraform. + +## Step 2: On GitHub, create a new OAuth application + +On the HCP Terraform **Add VCS Provider** page, click **register a new OAuth Application**. This opens GitHub.com in a new browser tab with the OAuth application settings pre-filled. + +Alternately, create the OAuth application manually on GitHub.com. + +### Manual steps + +1. In a new browser tab, open [github.com](https://github.com) and log in as whichever account you want HCP Terraform to act as. For most organizations this should be a dedicated service user, but a personal account will also work. + + ~> **Important:** The account you use for connecting HCP Terraform **must have admin access** to any shared repositories of Terraform configurations, since creating webhooks requires admin permissions. + +2. Navigate to GitHub's [Register a New OAuth Application](https://github.com/settings/applications/new) page. + + This page is located at . You can also reach it through GitHub's menus: + + - Click your profile picture and choose "Settings." + - Click "Developer settings," then make sure you're on the "OAuth Apps" page (not "GitHub Apps"). + - Click the "New OAuth App" button. + +3. This page has a form with four text fields. + + Fill out the fields with the corresponding values currently displayed in your HCP Terraform browser tab. HCP Terraform lists the values in the order they appear, and includes controls for copying values to your clipboard. + + Fill out the text fields as follows: + + | Field name | Value | + | -------------------------- | ----------------------------------------------------------------------------- | + | Application Name | HCP Terraform (``) | + | Homepage URL | `https://app.terraform.io` (or the URL of your Terraform Enterprise instance) | + | Application Description | Any description of your choice. | + | Authorization callback URL | `https://app.terraform.io/` | + +### Register the OAuth application + +1. Click the "Register application" button, which creates the application and takes you to its page. + +2. Download this image of the HCP Terraform logo and upload it with the "Upload new logo" button or the drag-and-drop target. This optional step helps you identify HCP Terraform's pull request checks at a glance. + +3. Click the **Generate a new client secret** button. You will need this secret in the next step. + +4. Leave this page open in a browser tab. In the next step, you will copy and paste the unique **Client ID** and **Client Secret.** + +## Step 3: On HCP Terraform, set up your provider + +1. Enter the **Client ID** and **Client Secret** from the previous step, as well as an optional **Name** for this VCS connection. + +2. Click "Connect and continue." This takes you to a page on GitHub.com, asking whether you want to authorize the app. + +3. The authorization page lists any GitHub organizations this account belongs to. If there is a **Request** button next to the organization that owns your Terraform code repositories, click it now. Note that you need to do this even if you are only connecting workspaces to private forks of repositories in those organizations since those forks are subject to the organization's access restrictions. See [About OAuth App access restrictions](https://docs.github.com/en/organizations/managing-oauth-access-to-your-organizations-data/about-oauth-app-access-restrictions). + +4. Click the green "Authorize ``" button at the bottom of the authorization page. GitHub might request your password or multi-factor token to confirm the operation. + +## Step 4: On HCP Terraform, configure advanced settings (optional) + +The settings in this section are optional. The Advanced Settings you can configure are: + +- **Scope of VCS Provider** - You can configure which workspaces can use repositories from this VCS provider. By default the **All Projects** option is selected, meaning this VCS provider is available to be used by all workspaces in the organization. +- **Set up SSH Keypair** - Most organizations will not need to add an SSH key. However, if the organization repositories include Git submodules that can only be accessed via SSH, an SSH key can be added along with the OAuth credentials. You can add or update the SSH key at a later time. + +### If you don't need to configure advanced settings: + +1. Click the **Skip and finish** button. This returns you to HCP Terraform's **VCS Providers** page, which now includes your new GitHub client. + +### If you need to limit the scope of this VCS provider: + +1. Select the **Selected Projects** option and use the text field that appears to search for and select projects to enable. All current and future workspaces for any selected projects can use repositories from this VCS Provider. + +2. Click the **Update VCS Provider** button to save your selections. + +### If you need an SSH keypair: + +#### Important notes + +- SSH will only be used to clone Git submodules. All other Git operations will still use HTTPS. +- Do not use your personal SSH key to connect HCP Terraform and GitHub; generate a new one or use an existing key reserved for service access. +- In the following steps, you must provide HCP Terraform with the private key. Although HCP Terraform does not display the text of the key to users after it is entered, it retains it and will use it when authenticating to GitHub. +- **Protect this private key carefully.** It can push code to the repositories you use to manage your infrastructure. Take note of your organization's policies for protecting important credentials and be sure to follow them. + +1. On a secure workstation, create an SSH keypair that HCP Terraform can use to connect to GitHub.com. The exact command depends on your OS, but is usually something like: + `ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise"` + This creates a `service_terraform` file with the private key, and a `service_terraform.pub` file with the public key. This SSH key **must have an empty passphrase**. HCP Terraform cannot use SSH keys that require a passphrase. + +2. While logged into the GitHub.com account you want HCP Terraform to act as, navigate to the SSH Keys settings page, add a new SSH key and paste the value of the SSH public key you just created. + +3. In HCP Terraform's **Add VCS Provider** page, paste the text of the **SSH private key** you just created, and click the **Add SSH Key** button. + +## Step 5: Contact your GitHub organization admins + +If your organization uses OAuth app access restrictions, you had to click a **Request** button when authorizing HCP Terraform, which sent an automated email to the administrators of your GitHub organization. An administrator must approve the request before HCP Terraform can access your organization's shared repositories. + +If you're a GitHub administrator, check your email now and respond to the request; otherwise, contact whoever is responsible for GitHub accounts in your organization, and wait for confirmation that they've approved your request. + +## Finished + +At this point, GitHub access for HCP Terraform is fully configured, and you can create Terraform workspaces based on your organization's shared GitHub repositories. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/gitlab-com.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/gitlab-com.mdx new file mode 100644 index 000000000..43bee92f7 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/gitlab-com.mdx @@ -0,0 +1,119 @@ +--- +page_title: Set up the GitLab.com VCS provider +description: >- + Learn how to use GitLab.com repositories with workspaces and private registry + modules in Terraform Enterprise. +source: terraform-docs-common +--- + +# Set up the GitLab.com VCS provider + +These instructions are for using GitLab.com for HCP Terraform's VCS features. [GitLab CE and GitLab EE have separate instructions,](/terraform/enterprise/vcs/gitlab-eece) as do the [other supported VCS providers.](/terraform/enterprise/vcs) + +Configuring a new VCS provider requires permission to manage VCS settings for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Connecting HCP Terraform to your VCS involves four steps: + +| On your VCS | On HCP Terraform | +| ---------------------------------------------------------------------------- | ------------------------------------------------------------------------- | +|   | Create a new connection in HCP Terraform. Get redirect URI. | +| Register your HCP Terraform organization as a new app. Provide redirect URI. |   | +|   | Provide HCP Terraform with application ID and secret. Request VCS access. | +| Approve access request. |   | + +The rest of this page explains the GitLab.com versions of these steps. + +-> **Note:** Alternately, you can skip the OAuth configuration process and authenticate with a personal access token. This requires using HCP Terraform's API. For details, see [the OAuth Clients API page](/terraform/enterprise/api-docs/oauth-clients). + +## Step 1: On HCP Terraform, Begin Adding a New VCS Provider + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add the VCS provider. + +2. Choose **Settings** from the sidebar, then click **Providers**. + +3. Click **Add VCS Provider**. The **VCS Providers** page appears. + +4. Select **GitLab** and then select **GitLab.com** from the menu. The page moves to the next step. + +5. Locate the "Redirect URI" and copy it to your clipboard; you'll paste it in the next step. + +Leave the page open in a browser tab. In the next step you will copy values from this page, and in later steps you will continue configuring HCP Terraform. + +## Step 2: On GitLab, Create a New Application + +1. In a new browser tab, open [gitlab.com](https://gitlab.com) and log in as whichever account you want HCP Terraform to act as. For most organizations this should be a dedicated service user, but a personal account will also work. + + ~> **Important:** The account you use for connecting HCP Terraform **must have Maintainer access** to any shared repositories of Terraform configurations, since creating webhooks requires Maintainer permissions. Refer to [the GitLab documentation](https://docs.gitlab.com/ee/user/permissions.html#project-members-permissions) for details. + +2. Navigate to GitLab's [User Settings > Applications](https://gitlab.com/-/profile/applications) page. + + This page is located at . You can also reach it through GitLab's menus: + + - Click your profile picture and choose "Settings." + - Click "Applications." + +3. This page has a list of applications and a form for adding new ones. The form has two text fields and some checkboxes. + + Fill out the fields and checkboxes with the corresponding values currently displayed in your HCP Terraform browser tab. HCP Terraform lists the values in the order they appear, and includes controls for copying values to your clipboard. + + Fill out the form as follows: + + | Field | Value | + | ----------------------- | ---------------------------------------------------------------------------------------------- | + | Name | HCP Terraform (``) | + | Redirect URI | `https://app.terraform.io/`, the redirect URI you copied from HCP Terraform | + | Confidential (checkbox) | ✔️ (enabled) | + | Scopes (all checkboxes) | api | + + +1. Click the "Save application" button, which creates the application and takes you to its page. + +2. Leave this page open in a browser tab. In the next step, you will copy and paste the unique **Application ID** and **Secret.** + +## Step 3: On HCP Terraform, Set up Your Provider + +1. Enter the **Application ID** and **Secret** from the previous step, as well as an option **Name** for this VCS connection. + +2. Click **Connect and continue.** This takes you to a page on GitLab.com, which asks if you want to authorize the app. + +3. Click the green **Authorize** button at the bottom of the authorization page. + +## Step 4: On HCP Terraform, Configure Advanced Settings (Optional) + +The settings in this section are optional. The Advanced Settings you can configure are: + +- **Scope of VCS Provider** - You can configure which workspaces can use repositories from this VCS provider. By default the **All Projects** option is selected, meaning this VCS provider is available to be used by all workspaces in the organization. +- **Set up SSH Keypair** - Most organizations will not need to add an SSH key. However, if the organization repositories include Git submodules that can only be accessed via SSH, an SSH key can be added along with the OAuth credentials. You can add or update the SSH key at a later time. + +### If You Don't Need to Configure Advanced Settings: + +1. Click the **Skip and Finish** button. This returns you to HCP Terraform's VCS Provider page, which now includes your new GitLab client. + +### If You Need to Limit the Scope of this VCS Provider: + +1. Select the **Selected Projects** option and use the text field that appears to search for and select projects to enable. All current and future workspaces for any selected projects can use repositories from this VCS Provider. + +2. Click the **Update VCS Provider** button to save your selections. + +### If You Do Need an SSH Keypair: + +#### Important Notes + +- SSH will only be used to clone Git submodules. All other Git operations will still use HTTPS. +- Do not use your personal SSH key to connect HCP Terraform and GitLab; generate a new one or use an existing key reserved for service access. +- In the following steps, you must provide HCP Terraform with the private key. Although HCP Terraform does not display the text of the key to users after it is entered, it retains it and will use it when authenticating to GitLab. +- **Protect this private key carefully.** It can push code to the repositories you use to manage your infrastructure. Take note of your organization's policies for protecting important credentials and be sure to follow them. + +1. On a secure workstation, create an SSH keypair that HCP Terraform can use to connect to GitLab.com. The exact command depends on your OS, but is usually something like: + `ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise"` + This creates a `service_terraform` file with the private key, and a `service_terraform.pub` file with the public key. This SSH key **must have an empty passphrase**. HCP Terraform cannot use SSH keys that require a passphrase. + +2. While logged into the GitLab.com account you want HCP Terraform to act as, navigate to the SSH Keys settings page, add a new SSH key and paste the value of the SSH public key you just created. + +3. In HCP Terraform's **Add VCS Provider** page, paste the text of the **SSH private key** you just created, and click the **Add SSH Key** button. + +## Finished + +At this point, GitLab.com access for HCP Terraform is fully configured, and you can create Terraform workspaces based on your organization's shared repositories. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/gitlab-eece.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/gitlab-eece.mdx new file mode 100644 index 000000000..a4b484859 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/gitlab-eece.mdx @@ -0,0 +1,133 @@ +--- +page_title: Set up the GitLab EE and CE VCS provider +description: >- + Learn how to use on-premise installation of GitLab Enterprise Edition (EE) or + GitLab Community Edition (CE) with workspaces and private registry module in + Terraform Enterprise. +source: terraform-docs-common +--- + +# Set up the GitLab EE and CE VCS provider + +These instructions are for using an on-premise installation of GitLab Enterprise Edition (EE) or GitLab Community Edition (CE) for HCP Terraform's VCS features. [GitLab.com has separate instructions,](/terraform/enterprise/vcs/gitlab-com) as do the [other supported VCS providers.](/terraform/enterprise/vcs) + +Configuring a new VCS provider requires permission to manage VCS settings for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Connecting HCP Terraform to your VCS involves four steps: + +| On your VCS | On HCP Terraform | +| -------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------- | +|   | Create a new connection in HCP Terraform. Get redirect URI. | +| Register your HCP Terraform organization as a new app. Provide redirect URI. Get ID and key. |   | +|   | Provide HCP Terraform with application ID and secret. Request VCS access. | +| Approve access request. |   | + +The rest of this page explains the on-premise GitLab versions of these steps. + +~> **Important:** HCP Terraform needs to contact your GitLab instance during setup and during normal operation. For the SaaS version of HCP Terraform, this means GitLab must be internet-accessible; for Terraform Enterprise, you must have network connectivity between your Terraform Enterprise and GitLab instances. + +-> **Note:** Alternately, you can skip the OAuth configuration process and authenticate with a personal access token. This requires using HCP Terraform's API. For details, see [the OAuth Clients API page](/terraform/enterprise/api-docs/oauth-clients). + +-> **Version Note:** HCP Terraform supports GitLab versions 9.0 and newer. HashiCorp does not test older versions of GitLab with HCP Terraform, and they might not work as expected. Also note that, although we do not deliberately remove support for versions that have reached end of life (per the [GitLab Support End of Life Policy](https://docs.gitlab.com/ee/policy/maintenance.html#patch-releases)), our ability to resolve customer issues with end of life versions might be limited. + +## Step 1: On HCP Terraform, Begin Adding a New VCS Provider + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the organization where you want to add the VCS provider. + +2. Choose **Settings** from the sidebar, then click **Providers**. + +3. Select **GitLab** and then select **GitLab Enterprise Edition** or **GitLab Community Edition** from the menu. The page moves to the next step. + +4. In the "Set up provider" step, fill in the **HTTP URL** and **API URL** of your GitLab Enterprise Edition or GitLab Community Edition instance, as well as an optional **Name** for this VCS connection. Click "Continue." + + | Field | Value | + | -------- | ------------------------------------------- | + | HTTP URL | `https://` | + | API URL | `https:///api/v4` | + + Note that HCP Terraform uses GitLab's v4 API. + +Leave the page open in a browser tab. In the next step you will copy values from this page, and in later steps you will continue configuring HCP Terraform. + +## Step 2: On GitLab, Create a New Application + +1. In a new browser tab, open your GitLab instance and log in as whichever account you want HCP Terraform to act as. For most organizations this should be a dedicated service user, but a personal account will also work. + + ~> **Important:** The account you use for connecting HCP Terraform **must have admin (master) access** to any shared repositories of Terraform configurations, since creating webhooks requires admin permissions. Do not create the application as an administrative application not owned by a user; HCP Terraform needs user access to repositories to create webhooks and ingress configurations. + + ~> **Important**: In GitLab CE or EE 10.6 and up, you may also need to enable **Allow requests to the local network from hooks and services** on the "Outbound requests" section inside the Admin area under Settings (`/admin/application_settings/network`). Refer to [the GitLab documentation](https://docs.gitlab.com/ee/security/webhooks.html) for details. + +2. Navigate to GitLab's "User Settings > Applications" page. + + This page is located at `https:///profile/applications`. You can also reach it through GitLab's menus: + + - Click your profile picture and choose "Settings." + - Click "Applications." + +3. This page has a list of applications and a form for adding new ones. The form has two text fields and some checkboxes. + + Fill out the fields and checkboxes with the corresponding values currently displayed in your HCP Terraform browser tab. HCP Terraform lists the values in the order they appear, and includes controls for copying values to your clipboard. + + Fill out the form as follows: + + | Field | Value | + | ------------------------------- | ---------------------------------------------- | + | Name | HCP Terraform (``) | + | Redirect URI | `https://app.terraform.io/` | + | Confidential (checkbox) | ✔️ (enabled) | + | Expire access tokens (checkbox) | (no longer required) | + | Scopes (all checkboxes) | api | + + -> **Note:** For previous versions of HCP Terraform and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but HCP Terraform only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and HCP Terraform now refreshes tokens more often. + +4. Click the "Save application" button, which creates the application and takes you to its page. + +5. Leave this page open in a browser tab. In the next step, you will copy and paste the unique **Application ID** and **Secret.** + +## Step 3: On HCP Terraform, Set up Your Provider + +1. On the "Configure settings" step on HCP Terraform, enter the **Application ID** and **Secret** from the previous step. + +2. Click **Connect and continue.** This takes you to a page on GitLab asking whether you want to authorize the app. Alternatively, if you are redirected to a 500 error, it usually means HCP Terraform was unable to reach your GitLab instance. + +3. Click the green **Authorize** button at the bottom of the authorization page. + +## Step 4: On HCP Terraform, Configure Advanced Settings (Optional) + +The settings in this section are optional. The Advanced Settings you can configure are: + +- **Scope of VCS Provider** - You can configure which workspaces can use repositories from this VCS provider. By default the **All Projects** option is selected, meaning this VCS provider is available to be used by all workspaces in the organization. +- **Set up a PEM formatted SSH Keypair** - Most organizations will not need to add an SSH key. However, if the organization repositories include Git submodules that can only be accessed via SSH, an SSH key can be added along with the OAuth credentials. You can add or update the SSH key at a later time. + +### If You Don't Need to Configure Advanced Settings: + +1. Click the **Skip and Finish** button. This returns you to HCP Terraform's VCS Provider page, which now includes your new GitLab client. + +### If You Need to Limit the Scope of this VCS Provider: + +1. Select the **Selected Projects** option and use the text field that appears to search for and select projects to enable. All current and future workspaces for any selected projects can use repositories from this VCS Provider. + +2. Click the **Update VCS Provider** button to save your selections. + +### If You Do Need a PEM formatted SSH Keypair: + +#### Important Notes + +- SSH will only be used to clone Git submodules. All other Git operations will still use HTTPS. +- Do not use your personal SSH key to connect HCP Terraform and GitLab; generate a new one or use an existing key reserved for service access. +- In the following steps, you must provide HCP Terraform with the private key. Although HCP Terraform does not display the text of the key to users after it is entered, it retains it and will use it when authenticating to GitLab. +- **Protect this private key carefully.** It can push code to the repositories you use to manage your infrastructure. Take note of your organization's policies for protecting important credentials and be sure to follow them. + +1. On a secure workstation, create a PEM formatted SSH keypair that HCP Terraform can use to connect to GitLab. The exact command depends on your OS, but is usually something like: + `ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise"` + This creates a `service_terraform` file with the private key, and a `service_terraform.pub` file with the public key. This SSH key **must have an empty passphrase**. HCP Terraform cannot use SSH keys that require a passphrase. + +2. While logged into the GitLab account you want HCP Terraform to act as, navigate to the SSH Keys settings page, add a new SSH key and paste the value of the SSH public key you just created. + +3. In HCP Terraform's **Add VCS Provider** page, paste the text of the **SSH private key** you just created, and click the **Add SSH Key** button. + +## Finished + +At this point, GitLab access for HCP Terraform is fully configured, and you can create Terraform workspaces based on your organization's shared repositories. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/index.mdx new file mode 100644 index 000000000..bf7668e7c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/index.mdx @@ -0,0 +1,140 @@ +--- +page_title: Connect to VCS Providers +description: >- + Version control system (VCS) connections integrate Terraform Enterprise into + your workflow. Learn how to automate Terraform runs when you commit changes to + your code. +source: terraform-docs-common +--- + +# Connect to VCS Providers + +HCP Terraform is more powerful when you integrate it with your version control system (VCS) provider. Although you can use many of HCP Terraform's features without one, a VCS connection provides additional features and improved workflows. In particular: + +- When workspaces are linked to a VCS repository, HCP Terraform can [automatically initiate Terraform runs](/terraform/enterprise/run/ui) when changes are committed to the specified branch. +- HCP Terraform makes code review easier by [automatically predicting](/terraform/enterprise/run/ui#speculative-plans-on-pull-requests) how pull requests will affect infrastructure. +- Publishing new versions of a [private Terraform module](/terraform/enterprise/registry/publish-modules) is as easy as pushing a tag to the module's repository. + +We recommend configuring VCS access when first setting up an organization, and you might need to add additional VCS providers later depending on how your organization grows. + +Configuring a new VCS provider requires permission to manage VCS settings for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Supported VCS Providers + +HCP Terraform supports the following VCS providers: + + + +- [GitHub.com](/terraform/enterprise/vcs/github-app) + + + +- [GitHub App for TFE](/terraform/enterprise/admin/application/github-app-integration) +- [GitHub.com (OAuth)](/terraform/enterprise/vcs/github) +- [GitHub Enterprise](/terraform/enterprise/vcs/github-enterprise) +- [GitLab.com](/terraform/enterprise/vcs/gitlab-com) +- [GitLab EE and CE](/terraform/enterprise/vcs/gitlab-eece) +- [Bitbucket Cloud](/terraform/enterprise/vcs/bitbucket-cloud) +- [Bitbucket Data Center](/terraform/enterprise/vcs/bitbucket-data-center) +- [Azure DevOps Server](/terraform/enterprise/vcs/azure-devops-server) +- [Azure DevOps Services](/terraform/enterprise/vcs/azure-devops-services) + +Use the links above to see details on configuring VCS access for each supported provider. If you use another VCS that is not supported, you can build an integration via [the API-driven run workflow](/terraform/enterprise/run/api). + +## How HCP Terraform Uses VCS Access + +Most workspaces in HCP Terraform are associated with a VCS repository, which provides Terraform configurations for that workspace. To find out which repos are available, access their contents, and create webhooks, HCP Terraform needs access to your VCS provider. + +Although HCP Terraform's API lets you create workspaces and push configurations to them without a VCS connection, the primary workflow expects every workspace to be backed by a repository. + +To use configurations from VCS, HCP Terraform needs to do several things: + +- Access a list of repositories, to let you search for repos when creating new workspaces. +- Register webhooks with your VCS provider, to get notified of new commits to a chosen branch. +- Download the contents of a repository at a specific commit in order to run Terraform with that code. + +~> **Important:** HCP Terraform usually performs VCS actions using a designated VCS user account, but it has no other knowledge about your VCS's authorization controls and does not associate HCP Terraform user accounts with VCS user accounts. This means HCP Terraform's VCS user might have a different level of access to repositories than any given HCP Terraform user. Keep this in mind when selecting a VCS user, as it may affect your security posture in one or both systems. + +### Webhooks + +HCP Terraform uses webhooks to monitor new commits and pull requests. + +- When someone adds new commits to a branch, any HCP Terraform workspaces based on that branch will begin a Terraform run. Usually a user must inspect the plan output and approve an apply, but you can also enable automatic applies on a per-workspace basis. You can prevent automatic runs by locking a workspace. A run will only occur if the workspace has not previously processed a run for the commit SHA. +- When someone submits a pull request/merge request to a branch, any HCP Terraform workspaces based on that branch will perform a [speculative plan](/terraform/enterprise/run/remote-operations#speculative-plans) with the contents of the request and links to the results on the PR's page. This helps you avoid merging PRs that cause plan failures. + +~> **Important:** In Terraform Enterprise, integration with a SaaS VCS provider (GitHub.com, GitLab.com, Bitbucket Cloud, or Azure DevOps Services) requires ingress from the public internet. This lets the inbound web hooks reach Terraform Enterprise. You should also configure appropriate security controls, such as a Web Application Firewall (WAF). + +### SSH Keys + +For most supported VCS providers, HCP Terraform does not need an SSH key. This is because Terraform can do everything it needs with the provider's API and an OAuth token. The exceptions are Azure DevOps Server and Bitbucket Data Center, which require an SSH key for downloading repository contents. Refer to the setup instructions for [Azure DevOps Server](/terraform/enterprise/vcs/azure-devops-server) and [Bitbucket Data Center](/terraform/enterprise/vcs/bitbucket-data-center) for details. + +For other VCS providers, most organizations will not need to add an SSH private key. However, if the organization repositories include Git submodules that can only be accessed via SSH, an SSH key can be added along with the OAuth credentials. + +For VCS providers where adding an SSH private key is optional, SSH will only be used to clone Git submodules. All other Git operations will still use HTTPS. + +If submodules will be cloned via SSH from a private VCS instance, SSH must be running on the standard port 22 on the VCS server. + +To add an SSH key to a VCS connection, finish configuring OAuth in the organization settings, and then use the "add a private SSH key" link on the VCS Provider settings page to add a private key that has access to the submodule repositories. When setting up a workspace, if submodules are required, select "Include submodules on clone". More at [Workspace settings](/terraform/enterprise/workspaces/settings). + +### Multiple VCS Connections + +If your infrastructure code is spread across multiple VCS providers, you can configure multiple VCS connections. You can choose which VCS connection to use whenever you create a new workspace. + +#### Scoping VCS Connections using Projects + +You can configure which projects can use repositories from a VCS connection. By default each VCS connection is enabled for all workspaces in the organization. If you need to limit which projects can use repositories from a given VCS connection, you can change this setting to enable the connection for only workspaces in the selected projects. + +## Configuring VCS Access + +HCP Terraform uses the OAuth protocol to authenticate with VCS providers. + +~> **Important:** Even if you've used OAuth before, read the instructions carefully. Since HCP Terraform's security model treats each _organization_ as a separate OAuth application, we authenticate with OAuth's developer workflow, which is more complex than the standard user workflow. + +The exact steps to authenticate are different for each VCS provider, but they follow this general order: + +| On your VCS | On HCP Terraform | +| ---------------------------------------------------------------------- | ------------------------------------------------------------------------------ | +| Register your HCP Terraform organization as a new app. Get ID and key. |   | +|   | Tell HCP Terraform how to reach VCS, and provide ID and key. Get callback URL. | +| Provide callback URL. |   | +|   | Request VCS access. | +| Approve access request. |   | + +For complete details, click the link for your VCS provider: + +- [GitHub](/terraform/enterprise/vcs/github) +- [GitHub Enterprise](/terraform/enterprise/vcs/github-enterprise) +- [GitLab.com](/terraform/enterprise/vcs/gitlab-com) +- [GitLab EE and CE](/terraform/enterprise/vcs/gitlab-eece) +- [Bitbucket Cloud](/terraform/enterprise/vcs/bitbucket-cloud) +- [Bitbucket Data Center](/terraform/enterprise/vcs/bitbucket-data-center) +- [Azure DevOps Server](/terraform/enterprise/vcs/azure-devops-server) +- [Azure DevOps Services](/terraform/enterprise/vcs/azure-devops-services) + +-> **Note:** Alternatively, you can skip the OAuth configuration process and authenticate with a personal access token. This requires using HCP Terraform's API. For details, see [the OAuth Clients API page](/terraform/enterprise/api-docs/oauth-clients). + + + +### Private VCS + +You can use self-hosted HCP Terraform Agents to connect HCP Terraform to your private VCS provider, such as GitHub Enterprise, GitLab Enterprise, and BitBucket Data Center. For more information, refer to [Connect to Private VCS Providers](/terraform/enterprise/vcs/private). + + + +## Configure a VCS host for Terraform Enterprise + +You can configure Terraform Enterprise to be accessible over a primary and a secondary hostname so that you can federate workloads associated with your VCS. Refer to [Specify integration setttings](/terraform/enterprise/deploy/configuration/network#specify-integration-settings) for additional information. + +You must set up new VCS connections any time you update the VCS host configuration. When the VCS integration uses the secondary hostname, you should continue using it while setting up the new VCS connection. When setup is complete, you can use the primary hostname for all other activities. Refer to [`TFE_VCS_HOSTNAME_CHOICE` ](/terraform/enterprise/deploy/reference/configuration#tfe_vcs_hostname_choice) in the configuration reference for additional information. + +## Viewing events + +VCS events describe changes within your organization for VCS-related actions. The VCS events page only displays events from previously processed commits in the past 30 days. The VCS page indicates previously processed commits with the message, `"Processing skipped for duplicate commit SHA"`. + +Viewing VCS events requires permission to manage VCS settings for the organization. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +To view VCS events for your organization, go to your organization's settings and click **Events**. The **VCS Events** page appears. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/troubleshooting.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/troubleshooting.mdx new file mode 100644 index 000000000..182c9ba0b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/vcs/troubleshooting.mdx @@ -0,0 +1,227 @@ +--- +page_title: Troubleshoot VCS providers in Terraform Enterprise +description: >- + Learn how to address common problems in VCS integrations for Terraform + Enterprise. +source: terraform-docs-common +--- + +# Troubleshoot VCS providers + +This page collects solutions to the most common problems our users encounter with VCS integration in HCP Terraform. + +## Azure DevOps + +### Required status checks not sending + +When configuring [status checks with Azure DevOps](https://learn.microsoft.com/en-us/azure/devops/repos/git/pr-status-policy) the web interface may auto populate Genre and Name fields (beneath "Status to check") with incorrect values that do not reflect what HCP Terraform is sending. +To function correctly as required checks the Genre must be populated with "Terraform Cloud" (or the first segment for a Terraform Enterprise install), and the remainder of the status check goes in the Name field. This requires using the "Enter genre/name separately" checkbox to not use the default configuration. + +In the example below the status check is named `Terraform Cloud/paul-hcp/gianni-test-1` and needs to be configured with Genre `Terraform Cloud` and Name `paul-hcp/gianni-test-1`. + +![Azure DevOps screenshot: configuring required status checks correctly](/img/docs/ado-required-status-check.png) + +With an older version of Azure DevOps Server it may be that the web interface does not allow entering the Genre and Name separately. In which case the status check will need to be created via the [API](https://learn.microsoft.com/en-us/rest/api/azure/devops/policy/configurations/create). + +## Bitbucket Data Center + +The following errors are specific to Bitbucket Data Center integrations. + +### Clicking "Connect organization ``" with Bitbucket Data Center raises an error message in HCP Terraform + +HCP Terraform uses OAuth 1 to authenticate the user to Bitbucket Data Center. The first step in the authentication process is for HCP Terraform to call Bitbucket Data Center to obtain a request token. After the call completes, HCP Terraform redirects you to Bitbucket Data Center with the request token. + +An error occurs when HCP Terraform calls to Bitbucket Data Center to obtain the request token but the request is rejected. Some common reasons for the request to be rejected are: + +- The API endpoint is unreachable; this can happen if the address or port is incorrect or the domain name doesn't resolve. +- The certificate used on Bitbucket Data Center is rejected by the HCP Terraform HTTP client because the SSL verification fails. This is often the case with self-signed certificates or when the Terraform Enterprise instance is not configured to trust the signing chain of the Bitbucket Data Center SSL certificate. + +To fix this issue, do the following: + +- Verify that the instance running Terraform Enterprise can resolve the domain name and can reach Bitbucket Data Center. +- Verify that the HCP Terraform client accepts the HTTPS connection to Bitbucket Data Center. This can be done by performing a `curl` from the Terraform Enterprise instance to Bitbucket Data Center; it should not return any SSL errors. +- Verify that the Consumer Key, Consumer Name, and the Public Key are configured properly in Bitbucket Data Center. +- Verify that the HTTP URL and API URL in HCP Terraform are correct for your Bitbucket Data Center instance. This includes the proper scheme (HTTP vs HTTPS), as well as the port. + +### Creating a workspace from a repository hangs indefinitely, displaying a spinner on the confirm button + +If you were able to connect HCP Terraform to Bitbucket Data Center but cannot create workspaces, it often means HCP Terraform isn't able to automatically add webhook URLs for that repository. + +To fix this issue: + +- Make sure you haven't manually entered any webhook URLs for the affected repository or project. Although the Bitbucket Web Post Hooks Plugin documentation describes how to manually enter a hook URL, HCP Terraform handles this automatically. Manually entered URLs can interfere with HCP Terraform's operation. + + To check the hook URLs for a repository, go to the repository's settings, then go to the "Hooks" page (in the "Workflow" section) and click on the "Post-Receive WebHooks" link. + + Also note that some Bitbucket Data Center versions might allow you to set per-project or server-wide hook URLs in addition to per-repository hooks. These should all be empty; if you set a hook URL that might affect more than one repo when installing the plugin, go back and delete it. +- Make sure you aren't trying to connect too many workspaces to a single repository. Bitbucket Data Center's webhooks plugin can only attach five hooks to a given repo. You might need to create additional repositories if you need to make more than five workspaces from a single configuration repo. + +## Bitbucket Cloud + +### HCP Terraform fails to obtain repositories + +This typically happens when the HCP Terraform application in Bitbucket Cloud wasn't configured to have the full set of permissions. Go to the OAuth section of the Bitbucket settings, find your HCP Terraform OAuth consumer, click the edit link in the "..." menu, and ensure it has the required permissions enabled: + +| Permission type | Permission level | +| --------------- | ---------------- | +| Account | Write | +| Repositories | Admin | +| Pull requests | Write | +| Webhooks | Read and write | + +## GitHub + +### "Host key verification failed" error in `terraform init` when attempting to ingress Terraform modules via Git over SSH + +This is most common when running Terraform 0.10.3 or 0.10.4, which had a bug in handling SSH submodule ingress. Try upgrading affected HCP Terraform workspaces to the latest Terraform version or 0.10.8 (the latest in the 0.10 series). + +### HCP Terraform can't ingress Git submodules, with auth errors during init + +This usually happens when an SSH key isn't associated with the VCS provider's OAuth client. + +- Go to your organization's "VCS Provider" settings page and check your GitHub client. If it still says "You can add a private SSH key to this connection to be used for git clone operations" (instead of "A private SSH key has been added..."), you need to click the "add a private SSH key" link and add a key. +- Check the settings page for affected workspaces and ensure that "Include submodules on clone" is enabled. + +Note that the "SSH Key" section in a workspace's settings is only used for mid-run operations like cloning Terraform modules. It isn't used when cloning the linked repository before a run. + +## General + +The following errors may occur for all VCS providers except Bitbucket Data Center. + +### HCP Terraform returns 500 after authenticating with the VCS provider + +The Callback URL in the OAuth application configuration in the VCS provider probably wasn't updated in the last step of the instructions and still points to the default "/" path (or an example.com link) instead of the full callback url. + +The fix is to update the callback URL in your VCS provider's application settings. You can look up the real callback URL in HCP Terraform's settings. + +### Can't delete a workspace or module, resulting in 500 errors + +This often happens when the VCS connection has been somehow broken: it might have had permissions revoked, been reconfigured, or had the repository removed. Check for these possibilities and contact HashiCorp support for further assistance, including any information you collected in your support ticket. + +### `redirect_uri_mismatch` error on "Connect" + +The domain name for HCP Terraform's SaaS release changed on 02/22 at 9AM from `atlas.hashicorp.com` to `app.terraform.io`. If the OAuth client was originally configured on the old domain, using it for a new VCS connection can result in this error. + +The fix is to update the OAuth Callback URL in your VCS provider to use app.terraform.io instead of atlas.hashicorp.com. + +### Can't trigger workspace runs from VCS webhook + +A workspace with no runs will not accept new runs from a VCS webhook. You must queue at least one run manually. + +A workspace will not process a webhook if the workspace previously processed a webhook with the same commit SHA and created a run. To trigger a run, create a new commit. If a workspace receives a webhook with a previously processed commit, HCP Terraform adds a new event to the [VCS Events](/terraform/enterprise/vcs#viewing-events) page documenting the received webhook. + +### Changing the URL for a VCS provider + +On rare occasions, you might need HCP Terraform to change the URL it uses to reach your VCS provider. This usually only happens if you move your VCS server or the VCS vendor changes their supported API versions. + +HCP Terraform does not allow you to change the API URL for an existing VCS connection, but you can create a new VCS connection and update existing resources to use it. This is most efficient if you script the necessary updates using HCP Terraform's API. In brief: + +1. [Configure a new VCS connection](/terraform/enterprise/vcs) with the updated URL. +2. Obtain the [oauth-token IDs](/terraform/enterprise/api-docs/oauth-tokens) for the old and new OAuth clients. +3. [List all workspaces](/terraform/enterprise/api-docs/workspaces#list-workspaces) (dealing with pagination if necessary), and use a JSON filtering tool like `jq` to make a list of all workspace IDs whose `attributes.vcs-repo.oauth-token-id` matches the old VCS connection. +4. Iterate over the list of workspaces and [PATCH each one](/terraform/enterprise/api-docs/workspaces#update-a-workspace) to use the new `oauth-token-id`. +5. [List all registry modules](/terraform/registry/api-docs#list-modules) and use their `source` property to determine which ones came from the old VCS connection. +6. [Delete each affected module](/terraform/enterprise/api-docs/private-registry/modules#delete-a-module), then [create a new module](/terraform/enterprise/api-docs/private-registry/modules#publish-a-private-module-from-a-vcs) from the new connection's version of the relevant repo. +7. Delete the old VCS connection. + +### Reauthorizing VCS OAuth Providers + +If a VCS OAuth connection breaks, you can reauthorize an existing VCS provider while retaining any VCS connected resources, like workspaces. We recommend only using this feature to fix broken VCS connections. We also recommend reauthorizing using the same VCS account to avoid permission changes to your repositories. + +~> **Important:** Reauthorizing is not available when the [TFE Provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/oauth_client) is managing the OAuth Client. Instead, you can update the [oauth_token](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/oauth_client#oauth_token) argument with a new token from your VCS Provider. + +To reauthorize a VCS connection, complete the following steps: + +1. Go to your organization's settings and click **Providers** under **Version Control**. +2. Click **Reauthorize** in the **OAuth Token ID** column. +3. Confirm the reauthorization. HCP Terraform redirects you to your VCS Provider where you can reauthorize the connection. + +## Certificate Errors on Terraform Enterprise + +When debugging failures of VCS connections due to certificate errors, running additional diagnostics using the OpenSSL command may provide more information about the failure. + +First, attach a bash session to the application container: + + docker exec -it ptfe_atlas sh -c "stty rows 50 && stty cols 150 && bash" + +Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-certificates.crt` in the container: + + openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443 + +For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below: + + bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443 + CONNECTED(00000003) + depth=0 CN = gitlab.local + verify error:num=18:self signed certificate + verify return:1 + depth=0 CN = gitlab.local + verify return:1 + --- + Certificate chain + 0 s:/CN=gitlab.local + i:/CN=gitlab.local + -----BEGIN CERTIFICATE----- + MIIC/DCCAeSgAwIBAgIJAIhG2GWtcj7lMA0GCSqGSIb3DQEBCwUAMCAxHjAcBgNV + BAMMFWdpdGxhYi1sb2NhbC5oYXNoaS5jbzAeFw0xODA2MDQyMjAwMDhaFw0xOTA2 + MDQyMjAwMDhaMCAxHjAcBgNVBAMMFWdpdGxhYi1sb2NhbC5oYXNoaS5jbzCCASIw + DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMMgrpo3zsoy2BP/AoGIgrYwEMnj + PwSOFGNHbclmiVBCW9jvrZrtva8Qh+twU7CSQdkeSP34ZgLrRp1msmLvUuVMgPts + i7isrI5hug/IHLLOGO5xMvxOcrHknvySYJRmvYFriEBPNRPYJGJ9O1ZUVUYeNwW/ + l9eegBDpJrdsjGmFKCOzZEdUA3zu7PfNgf788uIi4UkVXZNa/OFHsZi63OYyfOc2 + Zm0/vRKOn17dewOOesHhw77yYbBH8OFsEiC10JCe5y3MD9yrhV1h9Z4niK8rHPXz + XEh3JfV+BBArodmDbvi4UtT+IGdDueUllXv7kbwqvQ67OFmmek0GZOY7ZvMCAwEA + AaM5MDcwIAYDVR0RBBkwF4IVZ2l0bGFiLWxvY2FsLmhhc2hpLmNvMBMGA1UdJQQM + MAoGCCsGAQUFBwMBMA0GCSqGSIb3DQEBCwUAA4IBAQCfkukNV/9vCA/8qoEbPt1M + mvf2FHyUD69p/Gq/04IhGty3sno4eVcwWEc5EvfNt8vv1FykFQ6zMJuWA0jL9x2s + LbC8yuRDnsAlukSBvyazCZ9pt3qseGOLskaVCeOqG3b+hJqikZihFUD95IvWNFQs + RpvGvnA/AH2Lqqeyk2ITtLYj1AcSB1hBSnG/0fdtao9zs0JQsrS59CD1lbbTPPRN + orbKtVTWF2JlJxl2watfCNTw6nTCPI+51CYd687T3MuRN7LsTgglzP4xazuNjbWB + QGAiQRd6aKj+xAJnqjzXt9wl6a493m8aNkyWrxZGHfIA1W70RtMqIC/554flZ4ia + -----END CERTIFICATE----- + --- + Server certificate + subject=/CN=gitlab.local + issuer=/CN=gitlab.local + --- + No client certificate CA names sent + Peer signing digest: SHA512 + Server Temp Key: ECDH, P-256, 256 bits + --- + SSL handshake has read 1443 bytes and written 433 bytes + --- + New, TLSv1/SSLv3, Cipher is ECDHE-RSA-AES256-GCM-SHA384 + Server public key is 2048 bit + Secure Renegotiation IS supported + Compression: NONE + Expansion: NONE + No ALPN negotiated + SSL-Session: + Protocol : TLSv1.2 + Cipher : ECDHE-RSA-AES256-GCM-SHA384 + Session-ID: AF5286FB7C7725D377B4A5F556DEB6DDC38B302153DDAE90C552ACB5DC4D86B8 + Session-ID-ctx: + Master-Key: DB75AEC12C6E7B62246C653C8CB8FC3B90DE86886D68CB09898A6A6F5D539007F7760BC25EC4563A893D34ABCFAAC28A + Key-Arg : None + PSK identity: None + PSK identity hint: None + SRP username: None + TLS session ticket lifetime hint: 300 (seconds) + TLS session ticket: + 0000 - 03 c1 35 c4 ff 6d 24 a8-6c 70 61 fb 2c dc 2e b8 ..5..m$.lpa.,... + 0010 - de 4c 6d b0 2c 13 8e b6-63 95 18 ee 4d 33 a6 dc .Lm.,...c...M3.. + 0020 - 0d 64 24 f0 8d 3f 9c aa-b8 a4 e2 4f d3 c3 4d 88 .d$..?.....O..M. + 0030 - 58 99 10 73 83 93 70 4a-2c 61 e7 2d 41 74 d3 e9 X..s..pJ,a.-At.. + 0040 - 83 8c 4a 7f ae 7b e8 56-5c 51 fc 6f fe e3 a0 ec ..J..{.V\Q.o.... + 0050 - 3c 2b 6b 13 fc a0 e5 15-a8 31 16 19 11 98 56 43 <+k......1....VC + 0060 - 16 86 c4 cd 53 e6 c3 61-e2 6c 1b 99 86 f5 a8 bd ....S..a.l...... + 0070 - 3c 49 c0 0a ce 81 a9 33-9b 95 2c e1 f4 6d 05 1e - + Best practices to structure your configuration and Terraform Enterprise + workspaces +source: terraform-docs-common +--- + +# Workspace Best Practices + +An HCP Terraform workspace manages a single state file and the lifecycle of its resources. It is the smallest collection of HCP Terraform-managed infrastructure. Any operation on a resource can potentially affect other resources managed in the same state file, so it is best to keep the potential blast radius of your operations small. To do so, manage resources in separate workspaces when possible, grouping together only necessary and logically-related resources. For example, even though your application may require both compute resources and a database, these resources can operate independently and should be in their own workspaces. +Scoping your configuration and planning your workspace strategy early in your adoption of HCP Terraform and Terraform Enterprise will simplify your operations and make them safer. + +## Name your Workspace + +We recommend using the following naming convention so you can identify and associate workspaces with specific components of your infrastructure: + +`---` + +- ``: The business unit or team that owns the workspace. +- ``: The name of the application or service that the workspace manages. +- ``: The layer of the infrastructure that the workspace manages (or example, network, compute, filestore). +- ``: The environment that the workspace manages (for example, prod, staging, QA, prod). + +If your application team does not have a `layer`, use `main` or `app` in its place to maintain consistency across the organization. + +## Group by volatility + +Volatility refers to the rate of change of the resources in a workspace. Infrastructure such as databases, VPCs, and subnets change much less frequently than infrastructure such as your web servers. By exposing your long-living infrastructure to unnecessary volatility, you introduce more opportunities for accidental changes. When planning your workspace organization, group resources by volatility. + +![An example of how workspaces can be split among Production, Staging, QA, and Dev. In this example, networking and security are grouped in one workspace, with compute, filestore, and SQL all having their own workspace. This is duplicated in each environment](/img/docs/workspace-net-infra-split.png) + +The above example groups together tightly-coupled resources like networking, security, and identity in a shared workspace. Compute, storage, and databases have separate workspaces, since they change at different frequencies. You may scale compute instances multiple times a day, but your database instances probably change far less frequently. By grouping these parts of your infrastructure into separate workspaces, you decouple unrelated resources and reduce the risk of unexpected changes. + +## Determine stateful vs stateless infrastructure + +Stateful resources are ones that you cannot delete and recreate because they persist data, such as databases and object storage. By managing stateful resources independently of stateless ones, such as separating databases from compute instances, you limit the blast radius of operations that cause the resource recreation and help protect against accidental data loss. + +Consider the workspace structure in the [Volatility section](#group-by-volatility). You could potentially manage filestore and database resources together, as they are both stateful resources. Your compute resources are stateless and should still have a separate workspace. + +## Separate privileges and responsibilities + +A best practice is to split up workspaces based on team responsibilities and required privileges. For example, consider an application that requires separate developer and production environments, each with special networking and application infrastructure. One approach is to create four different workspaces, two for the developer environment and two for production. Only the networking team has access to the networking workspaces. + +In this setup, only the networking team needs permissions to manage the resources in the networking workspaces, and others cannot manage those workspace resources. If a workspace's scope is too large, a user might need more permissions than appropriate in order to perform operations the workspace. + +![An example of how workspaces can be split among Production, Staging, QA, and Dev. In this example, networking and security are grouped in one workspace, with compute, filestore, and SQL all having their own workspace. This is duplicated in each environment](/img/docs/workspace-net-infra-combined.png) + +Splitting your workspaces by team also helps limit the responsibility per workspace and allows teams to maintain distinct areas of ownership. If you need to reference attributes of resources managed in other workspaces, you can share the outputs using the [tfe_outputs](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/data-sources/outputs) data source. By limiting the scope of each workspace and sharing just the required outputs with others, you reduce the risk of leaking potentially sensitive information in a workspace's state. To share outputs from a workspace, you must explicitly enable remote state sharing in the workspace settings. + +## Avoid large Terraform plans and applies + +HCP Terraform and Terraform Enterprise execute workloads using agents. Every time an agent refreshes a workspace's state, it builds a [dependency graph](/terraform/internals/graph) of the resources to determine how to sequence operations in the workspace. As the number of resources your workspace manages grows, these graphs become larger and more complex. As these graphs grow, they require more worker RAM to build them. If your agent's performance degrades or workloads take longer to complete, we suggest exploring ways to split up the workspace to reduce the size of the dependency graph. + +## Determine workspace concurrency vs Terraform parallelism + +Concurrency refers to the number of plan and apply operations HCP Terraform or Terraform Enterprise can run simultaneously. In HCP Terraform, your subscription limits the maximum concurrency. Terraform Enterprise lets you configure the concurrency, but defaults to 10 concurrent runs. As you increase concurrency, the amount of memory your Terraform Enterprise installation requires increases as well. Refer to the [Capacity and performance](/terraform/enterprise/replicated/architecture/system-overview/capacity) documentation for more information. + +Parallelism refers to the number of tasks the Terraform CLI performs simultaneously in a single workload. By default, Terraform performs a maximum of 10 operations in parallel. When running a `terraform apply` command, Terraform refreshes each resource in the state file and compares to the remote object. Every resource refresh, creation, update, or destruction is an individual operation. If your workload creates 11 resources, Terraform starts by creating the first 10 resources in its dependency graph, and will begin creating the 11th once it finishes creating one of the first 10 resources. + +You can [increase the parallelism](/terraform/enterprise/workspaces/variables#parallelism) of Terraform, but this increases a run's CPU usage. We recommend that you instead break down large Terraform configurations into smaller ones with fewer resources when possible. Long-running Terraform workloads are an early sign of a bloated workspace scope. + +## Next steps + +This article introduces some considerations to keep in mind as your organization matures their workspace usage. Being deliberate about how you use these to organize your infrastructure will ensure smoother and safer operations. [HCP Terraform](/terraform/tutorials/cloud-get-started) provides a place to try these concepts hands-on, and you can [get started for free](https://app.terraform.io/public/signup/account). + +To learn more about HCP Terraform and Terraform Enterprise best practices, refer to [Project Best Practices](/terraform/enterprise/projects/best-practices). To learn best practices for writing Terraform configuration, refer to the [Terraform Style Guide](/terraform/language/style). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/browse.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/browse.mdx new file mode 100644 index 000000000..3b7ef87d0 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/browse.mdx @@ -0,0 +1,72 @@ +--- +page_title: Browse workspaces +description: >- + Learn how to use the sorting and filtering interfaces in Terraform Enterprise + to create different views of the resource data that the app manages so that + you can track consumption across your organizations. +source: terraform-docs-common +--- + +# Browse workspaces + +This topic describes how to use browse, sort, and filter workspaces in the UI so that you can track consumption across your organizations. + +## Overview + +HCP Terraform and Terraform Enterprise include several interfaces for browsing, sorting, and filtering resource data so that you can effectively manage workspaces and projects. You can also use interfaces together, such as applying a tag filter and sorting by workspace name, to refine results. + + + +### Explorer view + +The explorer for workspace visibility surfaces a wider range of valuable information from across your workspaces. Refer to [Explorer for workspace visibility](/terraform/enterprise/workspaces/explorer) for additional information. + + + +## Requirements + +You must be a member of a team with the **Read** permissions enabled for Terraform runs to view workspaces associated with the run. Refer to the [permissions reference](/terraform/enterprise/users-teams-organizations/permissions) for additional information. + +If your organization contains many workspaces, you can use the filter tools at the top of the list to find the workspaces you are interested in. + +## Find a workspace + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and select your organization. +2. Click **Workspaces** to view workspaces you have access to. +3. To view projects you have access to, click on either **Projects** in the sidebar menu or the drawer icon in the **Workspaces** bar. +4. If your organization contains several workspaces or projects, you can paginate through the workspace screen or project drawer to find the workspace you are looking for. +5. You can also use the search bar in the **Workspace** drawer to find a project by name + +## Filter workspaces + +You can use the following interfaces to sort and filter workspaces: + +- Click on a run status button to filter workspaces by one of the most common run statuses. You can filter by one of the following statuses: + + - Needs attention + - Errored + - Running + - On hold + - Applied + +- Choose one or more tag keys, values, or key-value pairs from the **Tags** drop-down to filter workspaces by tag. + +- Choose one or more run statuses from the **Status** drop-down to filter workspaces by run status. The **Status** drop-down lists all available run statuses, including the common statuses available in the run status button bar. + +- The tag filter shows a list of tags added to all workspaces, limited to the first 1,000 tags alphabetically. Choosing one or more will show only workspaces tagged with all of the chosen tags. + +- Choose a health assessment label form the **Health** drop-down to filter workspaces according to the latest health assessment results. You can filter according to the following labels: + + - Drifted + - Health error + - Check failed + +## Sort workspaces + +Click on a column header to sort workspaces by trait. Traits appear in either ascending or descending alphabetical order. You can sort according to the following traits: + +- Workspace name +- Run status +- Repository +- Latest change +- Tag diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/configurations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/configurations.mdx new file mode 100644 index 000000000..f56346f09 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/configurations.mdx @@ -0,0 +1,73 @@ +--- +page_title: Manage Terraform configurations +description: >- + Workspaces organize infrastructure and state. Learn how to provide + configuration versions for a workspace and organize multiple environments. +source: terraform-docs-common +--- + +# Manage Terraform configurations + +[remote operations]: /terraform/enterprise/run/remote-operations + +[execution mode]: /terraform/enterprise/workspaces/settings#execution-mode + +[Terraform configuration]: /terraform/language + +Each HCP Terraform workspace is associated with a particular [Terraform configuration][], which is expected to change and evolve over time. + +Since every organization has its own preferred source code control practices, HCP Terraform does not provide integrated version management. Instead, it expects Terraform configurations to be managed in your existing version control system (VCS). + +In order to perform [remote Terraform runs][remote operations] for a given workspace, HCP Terraform needs to periodically receive new versions of its configuration. Usually, this can be handled automatically by connecting a workspace to a VCS repository. + +-> **Note:** If a workspace's [execution mode is set to local][execution mode], it doesn't require configuration versions, since HCP Terraform won't perform runs for that workspace. + +## Providing Configuration Versions + +There are two ways to provide configuration versions for a workspace: + +- **With a connected VCS repository.** HCP Terraform can automatically fetch content from supported VCS providers, and uses webhooks to get notified of code changes. This is the most convenient way to use HCP Terraform. See [The UI- and VCS-driven Run Workflow](/terraform/enterprise/run/ui) for more information. + + A VCS connection can be configured [when a workspace is created](/terraform/enterprise/workspaces/create), or later in its [version control settings](/terraform/enterprise/workspaces/settings/vcs). + + -> **Note:** When a workspace is connected to a VCS repository, directly uploaded configuration versions can only be used for [speculative plans](/terraform/enterprise/run/remote-operations#speculative-plans). This helps ensure your VCS remains the source of truth for all real infrastructure changes. + +- **With direct uploads.** You can use a variety of tools to directly upload configuration content to HCP Terraform: + + - **Terraform CLI:** With the [CLI integration](/terraform/cli/cloud) configured, the `terraform plan` and `terraform apply` commands will perform remote runs by uploading a configuration from a local working directory. See [The CLI-driven Run Workflow](/terraform/enterprise/run/cli) for more information. + - **API:** HCP Terraform's API can accept configurations as `.tar.gz` files, which can be uploaded by a CI system or other workflow tools. See [The API-driven Run Workflow](/terraform/enterprise/run/api) for more information. + + When configuration versions are provided via the CLI or API, HCP Terraform can't automatically react to code changes in the underlying VCS repository. + +## Code Organization and Repository Structure + +### Organizing Separate Configurations + +Most organizations either keep each Terraform configuration in a separate repository, or keep many Terraform configurations as separate directories in a single repository (often called a "monorepo"). + +HCP Terraform works well with either approach, but monorepos require some extra configuration: + +- Each workspace must [specify a Terraform working directory](/terraform/enterprise/workspaces/settings#terraform-working-directory), so HCP Terraform knows which configuration to use. +- If the repository includes any shared Terraform modules, you must add those directories to the [automatic run triggering setting](/terraform/enterprise/workspaces/settings/vcs#automatic-run-triggering) for any workspace that uses those modules. + +-> **Note:** If your organization does not have a strong preference, we recommend using separate repositories for each configuration and using the private module registry to share modules. This allows for faster module development, since you don't have to update every configuration that consumes a module at the same time as the module itself. + +### Organizing Multiple Environments for a Configuration + +There are also a variety of ways to handle multiple environments. The most common approaches are: + +- All environments use the same main branch, and environment differences are handled with Terraform variables. To protect production environments, wait to apply runs until their changes are verified in staging. +- Different environments use different long-lived VCS branches. To protect production environments, merge changes to the production branch after they have been verified in staging. +- Different environments use completely separate configurations, and shared behaviors are handled with shared Terraform modules. To protect production environments, verify new module versions in staging before updating the version used in production. + +HCP Terraform works well with all of these approaches. If you used long-lived branches, be sure to specify which branch to use in each workspace's VCS connection settings. + +## Archiving Configuration Versions + +Once all runs using a particular configuration version are complete, HCP Terraform no longer needs the associated `.tar.gz` file and may discard it to save storage space. This process is handled differently depending on how the configuration version was created. + +- **Created with a connected VCS repository.** HCP Terraform will automatically archive VCS configuration versions once all runs are completed and they are no longer current for any workspace. HCP Terraform will re-fetch the configuration files from VCS as needed for new runs. + +- **Created with direct uploads via the API or CLI.** HCP Terraform does not archive CLI and API configuration versions automatically, because it cannot re-fetch the files for new runs. However, you can use the [Archive a Configuration Version](/terraform/enterprise/api-docs/configuration-versions#archive-a-configuration-version) endpoint to archive them manually. + +For Terraform Enterprise customers upgrading from a previous version, the functionality has a backfill capability that will clean up space for historical runs in batches. In each organization, Terraform Enterprise archives a batch of 100 configurations each time a run completes or a new configuration version is uploaded. This will gradually free up existing object storage space over time. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/create.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/create.mdx new file mode 100644 index 000000000..e52c6468b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/create.mdx @@ -0,0 +1,110 @@ +--- +page_title: Create workspaces in Terraform Enterprise +description: >- + Workspaces organize infrastructure and state into groups. Learn how to create + and configure Terraform Enterprise workspaces through the UI. +source: terraform-docs-common +--- + +# Create workspaces + +This topic describes how to create and manage workspaces in HCP Terraform and Terraform Enterprise UI. A workspace is a group of infrastructure resources managed by Terraform. Refer to [Workspaces overview](/terraform/enterprise/workspaces) for additional information. + +> **Hands-on:** Try the [Get Started - HCP Terraform](/terraform/tutorials/cloud-get-started?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) tutorials. + +## Introduction + +Create new workspaces when you need to manage a new collection of infrastructure resources. You can use the following methods to create workspaces: + +- HCP Terraform UI: Refer to [Create a workspace](#create-a-workspace) for instructions. +- Workspaces API: Send a `POST`call to the `/organizations/:organization_name/workspaces` endpoint to create a workspace. Refer to the [API documentation](/terraform/enterprise/api-docs/workspaces#create-a-workspace) for instructions. +- Terraform Enterprise provider: Install the `tfe` provider and add the `tfe_workspace` resource to your configuration. Refer to the [`tfe` provider documentation](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/workspace) in the Terraform registry for instructions. +- No-code provisioning: Use a no-code module from the registry to create a new workspace and deploy the module's resources. Refer to [Provisioning No-Code Infrastructure](/terraform/enterprise/no-code-provisioning/provisioning) for instructions. + +Each workspace belongs to a project. Refer to [Manage projects](/terraform/enterprise/projects/manage) for additional information. + +## Requirements + +You must be a member of a team with one of the following permissions enabled to create and manage workspaces: + +- **Manage all projects** +- **Manage all workspaces** +- **Admin** permission group for a project. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Workspace naming + +We recommend using consistent and informative names for new workspaces. One common approach is combining the workspace's important attributes in a consistent order. Attributes can be any defining characteristic of a workspace, such as the component, the component’s run environment, and the region where the workspace is provisioning infrastructure. + +This strategy could produce the following example workspace names: + +- networking-prod-us-east +- networking-staging-us-east +- networking-prod-eu-central +- networking-staging-eu-central +- monitoring-prod-us-east +- monitoring-staging-us-east +- monitoring-prod-eu-central +- monitoring-staging-eu-central + +You can add additional attributes to your workspace names as needed. For example, you may add the infrastructure provider, datacenter, or line of business. + +We recommend using 90 characters or less for the name of your workspace. + +## Create a workspace + +[workdir]: /terraform/enterprise/workspaces/settings#terraform-working-directory + +[trigger]: /terraform/enterprise/workspaces/settings/vcs#automatic-run-triggering + +[branch]: /terraform/enterprise/workspaces/settings/vcs#vcs-branch + +[submodules]: /terraform/enterprise/workspaces/settings/vcs#include-submodules-on-clone + +Complete the following steps to use the HCP Terraform or Terraform Enterprise UI to create a workspace: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and choose your organization. +2. Click **New** and choose **Workspace** from the drop-down menu. +3. If you have multiple projects, HCP Terraform may prompt you to choose the project to create the workspace in. Only users on teams with permissions for the entire project or the specific workspace can access the workspace. Refer to [Manage projects](/terraform/enterprise/projects/manage) for additional information. +4. Choose a workflow type. +5. Complete the following steps if you are creating a workspace that follows the VCS workflow: + 1. Choose an existing version control provider from the list or configure a new system. You must enable the workspace project to connect to your provider. Refer to [Connecting VCS + Providers](/terraform/enterprise/vcs) for more details. + 2. If you choose the **GitHub App** provider, choose an organization and repository when prompted. The list only displays the first 100 repositories from your VCS provider. If your repository is missing from the list, enter the repository ID in the text field . + 3. Refer to the following topics for information about configuring workspaces settings in the **Advanced options** screen: + - [Terraform Working Directory][workdir] + - [Automatic Run Triggering][trigger] + - [VCS branch][branch] + - [Include submodules on clone][submodules] +6. Specify a name for the workspace. VCS workflow workspaces default to the name of the repository. The name must be unique within the organization and can include letters, numbers, hyphens, and underscores. Refer to [Workspace naming](#workspace-naming) for additional information. +7. Add an optional description for the workspace. The description appears at the top of the workspace in the HCP Terraform UI. +8. Click **Create workspace** to finish. + +For CLI or API-driven workflow, the system opens the new workspace overview. For version control workspaces, the **Configure Terraform variables** page appears. + +### Configure Terraform variables for VCS workflows + +After you create a new workspace from a version control repository, HCP Terraform scans its configuration files for [Terraform variables](/terraform/enterprise/workspaces/variables#terraform-variables) and displays variables without default values or variables that are undefined in an existing [global or project-scoped variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets). Terraform cannot perform successful runs in the workspace until you set values for these variables. + +Choose one of the following actions: + +- To skip this step, click **Go to workspace overview**. You can [load these variables from files](/terraform/enterprise/workspaces/variables/managing-variables#loading-variables-from-files) or create and set values for them later from within the workspace. HCP Terraform does not automatically scan your configuration again; you can only add variables from within the workspace individually. +- To configure variables, enter a value for each variable on the page. You may want to leave a variable empty if you plan to provide it through another source, like an `auto.tfvars` file. Click **Save variables** to add these variables to the workspace. + +## Next steps + +If you have already configured all Terraform variables, we recommend [manually starting a run](/terraform/enterprise/run/ui#manually-starting-runs) to prepare VCS-driven workspaces. You may also want to do one or more of the following actions: + +- [Upload configuration versions](/terraform/enterprise/workspaces/configurations#providing-configuration-versions): If you chose the API or CLI-Driven workflow, you must upload configuration versions for the workspace. +- [Edit environment variables](/terraform/enterprise/workspaces/variables): Shell environment variables store credentials and customize Terraform's behavior. +- [Edit additional workspace settings](/terraform/enterprise/workspaces/settings): This includes notifications, permissions, and run triggers to start runs automatically. +- [Learn more about running Terraform in your workspace](/terraform/enterprise/run/remote-operations): This includes how Terraform processes runs within the workspace, run modes, run states, and other operations. +- [Create workspace tags](/terraform/enterprise/workspaces/tags): Add tags to your workspaces so that you can organize and track them. +- [Browse workspaces](/terraform/enterprise/workspaces/browse): Use the interfaces available in the UI to browse, sort, and filter workspaces so that you can track resource consumption. + +### VCS Connection + +If you connected a VCS repository to the workspace, HCP Terraform automatically registers a webhook with your VCS provider. A workspace with no runs will not accept new runs from a VCS webhook, so you must [manually start at least one run](/terraform/enterprise/run/ui#manually-starting-runs). + +After you manually start a run, HCP Terraform automatically queues a plan when new commits appear in the selected branch of the linked repository or someone opens a pull request on that branch. Refer to [Webhooks](/terraform/enterprise/vcs#webhooks) for more details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/aws-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/aws-configuration.mdx new file mode 100644 index 000000000..3d84e52e5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/aws-configuration.mdx @@ -0,0 +1,165 @@ +--- +page_title: Use dynamic credentials with the AWS provider in Terraform Enterprise +description: >- + Use OpenID Connect to get short-term credentials for the AWS Terraform + provider in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Use dynamic credentials with the AWS provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.7.0](/terraform/cloud-docs/agents/changelog#1-7-0-03-02-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with AWS to get [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) for the AWS provider in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure AWS](#configure-aws):** Set up a trust configuration between AWS and HCP Terraform. Then, you must create AWS roles and policies for your HCP Terraform workspaces. +2. **[Configure HCP Terraform](#configure-hcp-terraform):** Add environment variables to the HCP Terraform workspaces where you want to use Dynamic Credentials. + +Once you complete the setup, HCP Terraform automatically authenticates to AWS during each run. The AWS provider authentication is valid for the length of the plan or apply. + +## Configure AWS + +You must enable and configure an OIDC identity provider and accompanying role and trust policy on AWS. These instructions use the AWS console, but you can also use Terraform to configure AWS. Refer to our [example Terraform configuration](https://github.com/hashicorp/terraform-dynamic-credentials-setup-examples/tree/main/aws). + +### Create an OIDC Identity Provider + +AWS documentation for setting this up through the AWS console or API can be found here: [Creating OpenID Connect (OIDC) identity providers - AWS Identity and Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html). + +The `provider URL` should be set to the address of HCP Terraform (e.g., **without** a trailing slash), and the `audience` should be set to `aws.workload.identity` or the value of `TFC_AWS_WORKLOAD_IDENTITY_AUDIENCE`, if configured. + +### Configure a Role and Trust Policy + +You must configure a role and corresponding trust policy. Amazon documentation on setting this up can be found here: [Creating a role for web identity or OpenID Connect Federation (console) - AWS Identity and Access Management](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html). +The trust policy will be of the form: + +```json +{ + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Principal": { + "Federated": "OIDC_PROVIDER_ARN" + }, + "Action": "sts:AssumeRoleWithWebIdentity", + "Condition": { + "StringEquals": { + "SITE_ADDRESS:aud": "AUDIENCE_VALUE", + "SITE_ADDRESS:sub": "organization:ORG_NAME:project:PROJECT_NAME:workspace:WORKSPACE_NAME:run_phase:RUN_PHASE" + } + } + } + ] +} +``` + +with the capitalized values replaced with the following: + +- **OIDC_PROVIDER_ARN**: The ARN from the OIDC provider resource created in the previous step +- **SITE_ADDRESS**: The address of HCP Terraform with `https://` stripped, (e.g., `app.terraform.io`) +- **AUDIENCE_VALUE**: This should be set to `aws.workload.identity` unless a non-default audience has been specified in TFC +- **ORG_NAME**: The organization name this policy will apply to, such as `my-org-name` +- **PROJECT_NAME**: The project name that this policy will apply to, such as `my-project-name` +- **WORKSPACE_NAME**: The workspace name this policy will apply to, such as `my-workspace-name` +- **RUN_PHASE**: The run phase this policy will apply to, currently one of `plan` or `apply`. + +-> **Note:** if different permissions are desired for plan and apply, then two separate roles and trust policies must be created for each of these run phases to properly match them to the correct access level. +If the same permissions will be used regardless of run phase, then the condition can be modified like the below to use `StringLike` instead of `StringEquals` for the sub and include a `*` after `run_phase:` to perform a wildcard match: + +```json +{ + "Condition": { + "StringEquals": { + "SITE_ADDRESS:aud": "AUDIENCE_VALUE" + }, + "StringLike": { + "SITE_ADDRESS:sub": "organization:ORG_NAME:project:PROJECT_NAME:workspace:WORKSPACE_NAME:run_phase:*" + } + } +} +``` + +!> **Warning**: you should always check, at minimum, the audience and the name of the organization in order to prevent unauthorized access from other HCP Terraform organizations! + +A permissions policy needs to be added to the role which defines what operations within AWS the role is allowed to perform. As an example, the below policy allows for fetching a list of S3 buckets: + +```json +{ + "Version": "2012-10-17", + "Statement": [ + { + "Effect": "Allow", + "Action": [ + "s3:ListBucket" + ], + "Resource": "*" + } + ] +} +``` + +## Configure HCP Terraform + +You’ll need to set some environment variables in your HCP Terraform workspace in order to configure HCP Terraform to authenticate with AWS using dynamic credentials. You can set these as workspace variables, or if you’d like to share one AWS role across multiple workspaces, you can use a variable set. When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Required Environment Variables + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------- | ------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_AWS_PROVIDER_AUTH`
`TFC_AWS_PROVIDER_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.7.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate to AWS. | +| `TFC_AWS_RUN_ROLE_ARN`
`TFC_AWS_RUN_ROLE_ARN[_TAG]`
`TFC_DEFAULT_AWS_RUN_ROLE_ARN` | The ARN of the role to assume in AWS. | Requires **v1.7.0** or later if self-managing agents. Optional if `TFC_AWS_PLAN_ROLE_ARN` and `TFC_AWS_APPLY_ROLE_ARN` are both provided. These variables are described [below](/terraform/enterprise/workspaces/dynamic-provider-credentials/aws-configuration#optional-environment-variables) | + +### Optional Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------- | +| `TFC_AWS_WORKLOAD_IDENTITY_AUDIENCE`
`TFC_AWS_WORKLOAD_IDENTITY_AUDIENCE[_TAG]`
`TFC_DEFAULT_AWS_WORKLOAD_IDENTITY_AUDIENCE` | Will be used as the `aud` claim for the identity token. Defaults to `aws.workload.identity`. | Requires **v1.7.0** or later if self-managing agents. | +| `TFC_AWS_PLAN_ROLE_ARN`
`TFC_AWS_PLAN_ROLE_ARN[_TAG]`
`TFC_DEFAULT_AWS_PLAN_ROLE_ARN` | The ARN of the role to use for the plan phase of a run. | Requires **v1.7.0** or later if self-managing agents. Will fall back to the value of `TFC_AWS_RUN_ROLE_ARN` if not provided. | +| `TFC_AWS_APPLY_ROLE_ARN`
`TFC_AWS_APPLY_ROLE_ARN[_TAG]`
`TFC_DEFAULT_AWS_APPLY_ROLE_ARN` | The ARN of the role to use for the apply phase of a run. | Requires **v1.7.0** or later if self-managing agents. Will fall back to the value of `TFC_AWS_RUN_ROLE_ARN` if not provided. | + +## Configure the AWS Provider + +Make sure that you’re passing a value for the `region` argument into the provider configuration block or setting the `AWS_REGION` variable in your workspace. + +Make sure that you’re not using any of the other arguments or methods mentioned in the [authentication and configuration](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration) section of the provider documentation as these settings may interfere with dynamic provider credentials. + +### Specifying Multiple Configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct AWS setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_aws_dynamic_credentials" { + description = "Object containing AWS dynamic credentials configuration" + type = object({ + default = object({ + shared_config_file = string + }) + aliases = map(object({ + shared_config_file = string + })) + }) +} +``` + +#### Example Usage + +```hcl +provider "aws" { + shared_config_files = [var.tfc_aws_dynamic_credentials.default.shared_config_file] +} + +provider "aws" { + alias = "ALIAS1" + shared_config_files = [var.tfc_aws_dynamic_credentials.aliases["ALIAS1"].shared_config_file] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/azure-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/azure-configuration.mdx new file mode 100644 index 000000000..502cd60c8 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/azure-configuration.mdx @@ -0,0 +1,177 @@ +--- +page_title: Use dynamic credentials with the Azure provider in Terraform Enterprise +description: >- + Use OpenID Connect to get short-term credentials for the Azure Terraform + providers in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Use dynamic credentials with the Azure provider + +~> **Important:** Ensure you are using version **3.25.0** or later of the **AzureRM provider** and version **2.29.0** or later of the **Microsoft Entra ID provider** (previously Azure Active Directory) as required OIDC functionality was introduced in these provider versions. + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.7.0](/terraform/cloud-docs/agents/changelog#1-7-0-03-02-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with Azure to get [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) for the AzureRM or Microsoft Entra ID providers in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure Azure](#configure-azure):** Set up a trust configuration between Azure and HCP Terraform. Then, you must create Azure roles and policies for your HCP Terraform workspaces. +2. **[Configure HCP Terraform](#configure-hcp-terraform):** Add environment variables to the HCP Terraform workspaces where you want to use Dynamic Credentials. + +Once you complete the setup, HCP Terraform automatically authenticates to Azure during each run. The Azure provider authentication is valid for the length of the plan or apply. + +!> **Warning:** Dynamic credentials with the Azure providers do not work when your Terraform Enterprise instance uses a custom or self-signed certificate. This limitation is due to restrictions in Azure. + +## Configure Azure + +You must enable and configure an application and service principal with accompanying federated credentials and permissions on Azure. These instructions use the Azure portal, but you can also use Terraform to configure Azure. Refer to our [example Terraform configuration](https://github.com/hashicorp/terraform-dynamic-credentials-setup-examples/tree/main/azure). + +### Create an Application and Service Principal + +Follow the steps mentioned in the AzureRM provider docs here: [Creating the Application and Service Principal](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_oidc#creating-the-application-and-service-principal). + +As mentioned in the documentation it will be important to make note of the `client_id` for the application as you will use this later for authentication. + +-> **Note:** you will want to skip the `“Configure Microsoft Entra ID Application to Trust a GitHub Repository”` section as this does not apply here. + +### Grant the Application Access to Manage Resources in Your Azure Subscription + +You must now give the created Application permission to modify resources within your Subscription. + +Follow the steps mentioned in the AzureRM provider docs here: [Granting the Application access to manage resources in your Azure Subscription](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_oidc#granting-the-application-access-to-manage-resources-in-your-azure-subscription). + +### Configure Microsoft Entra ID Application to Trust a Generic Issuer + +Finally, you must create federated identity credentials which validate the contents of the token sent to Azure from HCP Terraform. + +Follow the steps mentioned in the AzureRM provider docs here: [Configure Azure Microsoft Entra ID Application to Trust a Generic Issuer](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/service_principal_oidc#configure-azure-active-directory-application-to-trust-a-generic-issuer). + +The following information should be specified: + +- **Federated credential scenario**: Must be set to `Other issuer`. +- **Issuer**: The address of HCP Terraform (e.g., ). + - **Important**: make sure this value starts with **https://** and does _not_ have a trailing slash. +- **Subject identifier**: The subject identifier from HCP Terraform that this credential will match. This will be in the form `organization:my-org-name:project:my-project-name:workspace:my-workspace-name:run_phase:plan` where the `run_phase` can be one of `plan` or `apply`. +- **Name**: A name for the federated credential, such as `tfc-plan-credential`. Note that this cannot be changed later. + +The following is optional, but may be desired: + +- **Audience**: Enter the audience value that will be set when requesting the identity token. This will be `api://AzureADTokenExchange` by default. This should be set to the value of `TFC_AZURE_WORKLOAD_IDENTITY_AUDIENCE` if this has been configured. + +-> **Note:** because the `Subject identifier` for federated credentials is a direct string match, two federated identity credentials need to be created for each workspace using dynamic credentials: one that matches `run_phase:plan` and one that matches `run_phase:apply`. + +## Configure HCP Terraform + +You’ll need to set some environment variables in your HCP Terraform workspace in order to configure HCP Terraform to authenticate with Azure using dynamic credentials. You can set these as workspace variables. When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Required Environment Variables + +| Variable | Value | Notes | +| ------------------------------------------------------------------------------------------------------ | ---------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_AZURE_PROVIDER_AUTH`
`TFC_AZURE_PROVIDER_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.7.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate to Azure. | +| `TFC_AZURE_RUN_CLIENT_ID`
`TFC_AZURE_RUN_CLIENT_ID[_TAG]`
`TFC_DEFAULT_AZURE_RUN_CLIENT_ID` | The client ID for the Service Principal / Application used when authenticating to Azure. | Requires **v1.7.0** or later if self-managing agents. Optional if `TFC_AZURE_PLAN_CLIENT_ID` and `TFC_AZURE_APPLY_CLIENT_ID` are both provided. These variables are described [below](/terraform/enterprise/workspaces/dynamic-provider-credentials/azure-configuration#optional-environment-variables) | + +### Optional Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_AZURE_WORKLOAD_IDENTITY_AUDIENCE`
`TFC_AZURE_WORKLOAD_IDENTITY_AUDIENCE[_TAG]`
`TFC_DEFAULT_AZURE_WORKLOAD_IDENTITY_AUDIENCE` | Will be used as the `aud` claim for the identity token. Defaults to `api://AzureADTokenExchange`. | Requires **v1.7.0** or later if self-managing agents. | +| `TFC_AZURE_PLAN_CLIENT_ID`
`TFC_AZURE_PLAN_CLIENT_ID[_TAG]`
`TFC_DEFAULT_AZURE_PLAN_CLIENT_ID` | The client ID for the Service Principal / Application to use for the plan phase of a run. | Requires **v1.7.0** or later if self-managing agents. Will fall back to the value of `TFC_AZURE_RUN_CLIENT_ID` if not provided. | +| `TFC_AZURE_APPLY_CLIENT_ID`
`TFC_AZURE_APPLY_CLIENT_ID[_TAG]`
`TFC_DEFAULT_AZURE_APPLY_CLIENT_ID` | The client ID for the Service Principal / Application to use for the apply phase of a run. | Requires **v1.7.0** or later if self-managing agents. Will fall back to the value of `TFC_AZURE_RUN_CLIENT_ID` if not provided. | + +## Configure the AzureRM or Microsoft Entra ID Provider + +Make sure that you’re passing values for the `subscription_id` and `tenant_id` arguments into the provider configuration block or setting the `ARM_SUBSCRIPTION_ID` and `ARM_TENANT_ID` variables in your workspace. + +Make sure that you’re _not_ setting values for `client_id`, `use_oidc`, or `oidc_token` in the provider or setting any of `ARM_CLIENT_ID`, `ARM_USE_OIDC`, `ARM_OIDC_TOKEN`. + +### Specifying Multiple Configurations + +~> **Important:** Ensure you are using version **3.60.0** or later of the **AzureRM provider** and version **2.43.0** or later of the **Microsoft Entra ID provider** as required functionality was introduced in these provider versions. + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct Azure setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_azure_dynamic_credentials" { + description = "Object containing Azure dynamic credentials configuration" + type = object({ + default = object({ + client_id_file_path = string + oidc_token_file_path = string + }) + aliases = map(object({ + client_id_file_path = string + oidc_token_file_path = string + })) + }) +} +``` + +#### Example Usage + +##### AzureRM Provider + +```hcl +provider "azurerm" { + features {} + // use_cli should be set to false to yield more accurate error messages on auth failure. + use_cli = false + // use_oidc must be explicitly set to true when using multiple configurations. + use_oidc = true + client_id_file_path = var.tfc_azure_dynamic_credentials.default.client_id_file_path + oidc_token_file_path = var.tfc_azure_dynamic_credentials.default.oidc_token_file_path + subscription_id = "00000000-0000-0000-0000-000000000000" + tenant_id = "10000000-0000-0000-0000-000000000000" +} + +provider "azurerm" { + features {} + // use_cli should be set to false to yield more accurate error messages on auth failure. + use_cli = false + // use_oidc must be explicitly set to true when using multiple configurations. + use_oidc = true + alias = "ALIAS1" + client_id_file_path = var.tfc_azure_dynamic_credentials.aliases["ALIAS1"].client_id_file_path + oidc_token_file_path = var.tfc_azure_dynamic_credentials.aliases["ALIAS1"].oidc_token_file_path + subscription_id = "00000000-0000-0000-0000-000000000000" + tenant_id = "20000000-0000-0000-0000-000000000000" +} +``` + +##### Microsoft Entra ID Provider (formerly Azure AD) + +```hcl +provider "azuread" { + features {} + // use_cli should be set to false to yield more accurate error messages on auth failure. + use_cli = false + // use_oidc must be explicitly set to true when using multiple configurations. + use_oidc = true + client_id_file_path = var.tfc_azure_dynamic_credentials.default.client_id_file_path + oidc_token_file_path = var.tfc_azure_dynamic_credentials.default.oidc_token_file_path + subscription_id = "00000000-0000-0000-0000-000000000000" + tenant_id = "10000000-0000-0000-0000-000000000000" +} + +provider "azuread" { + features {} + // use_cli should be set to false to yield more accurate error messages on auth failure. + use_cli = false + // use_oidc must be explicitly set to true when using multiple configurations. + use_oidc = true + alias = "ALIAS1" + client_id_file_path = var.tfc_azure_dynamic_credentials.aliases["ALIAS1"].client_id_file_path + oidc_token_file_path = var.tfc_azure_dynamic_credentials.aliases["ALIAS1"].oidc_token_file_path + subscription_id = "00000000-0000-0000-0000-000000000000" + tenant_id = "20000000-0000-0000-0000-000000000000" +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/gcp-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/gcp-configuration.mdx new file mode 100644 index 000000000..400f5e996 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/gcp-configuration.mdx @@ -0,0 +1,174 @@ +--- +page_title: Use dynamic credentials with the GCP provider in Terraform Enterprise +description: >- + Use OpenID Connect to get short-term credentials for the GCP Terraform + provider in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Use dynamic credentials with the GCP provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.7.0](/terraform/cloud-docs/agents/changelog#1-7-0-03-02-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with GCP to get [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) for the GCP provider in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure GCP](#configure-gcp):** Set up a trust configuration between GCP and HCP Terraform. Then, you must create GCP roles and policies for your HCP Terraform workspaces. +2. **[Configure HCP Terraform](#configure-hcp-terraform):** Add environment variables to the HCP Terraform workspaces where you want to use Dynamic Credentials. + +Once you complete the setup, HCP Terraform automatically authenticates to GCP during each run. The GCP provider authentication is valid for the length of the plan or apply. + +!> **Warning:** Dynamic credentials with the GCP provider do not work if your Terraform Enterprise instance uses a custom or self-signed certificate. This limitation is due to restrictions in GCP. + +## Configure GCP + +You must enable and configure a workload identity pool and provider on GCP. These instructions use the GCP console, but you can also use Terraform to configure GCP. Refer to our [example Terraform configuration](https://github.com/hashicorp/terraform-dynamic-credentials-setup-examples/tree/main/gcp). + +### Add a Workload Identity Pool and Provider + +Google documentation for setting this up can be found here: [Configuring workload identity federation with other identity providers](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers). + +Before starting to create the resources, you must enable the APIs mentioned at the start of the [Configure workload Identity federation](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#configure). + +#### Add a Workload Identity Pool + +The following information should be specified: + +- **Name**: Name for the pool, such as `my-tfc-pool`. The name is also used as the pool ID. You can't change the pool ID later. + +The following is optional, but may be desired: + +- **Pool ID**: The ID for the pool. This defaults to the name as mentioned above, but can be set to another value. +- **Description**: Text that describes the purpose of the pool. + +You will also want to ensure that the `Enabled Pool` option is set to be enabled before clicking next. + +#### Add a Workload Identity Provider + +You must add a workload identity provider to the pool. The following information should be specified: + +- **Provider type**: Must be `OpenID Connect (OIDC)`. +- **Provider name**: Name for the identity provider, such as `my-tfc-provider`. The name is also used as the provider ID. You can’t change the provider ID later. +- **Issuer (URL)**: The address of the TFC/E instance, such as + - **Important**: make sure this value starts with **https://** and does _not_ have a trailing slash. +- **Audiences**: This can be left as `Default audience` if you are planning on using the default audience HCP Terraform provides. + - **Important**: you must select the `Allowed audiences` toggle and set this to the value of `TFC_GCP_WORKLOAD_IDENTITY_AUDIENCE`, if configured. +- **Provider attributes mapping**: At the minimum this must include `assertion.sub` for the `google.subject` entry. Other mappings can be added for other claims in the identity token to attributes by adding `attribute.[claim name]` on the Google side and `assertion.[claim name]` on the OIDC side of a new mapping. +- **Attribute Conditions**: Conditions to restrict which identity tokens can authenticate using the workload identity pool, such as `assertion.sub.startsWith("organization:my-org:project:my-project:workspace:my-workspace")` to restrict access to identity tokens from a specific workspace. See this page in Google documentation for more information on the expression language: [Attribute conditions](https://cloud.google.com/iam/docs/workload-identity-federation#conditions). + +!> **Warning**: you should always check, at minimum, the audience and the name of the organization in order to prevent unauthorized access from other HCP Terraform organizations! + +The following is optional, but may be desired: + +- **Provider ID**: The ID for the provider. This defaults to the name as mentioned above, but can be set to another value. + +### Add a Service Account and Permissions + +You must next add a service account and properly configure the permissions. + +#### Create a Service Account + +Google documentation for setting this up can be found here: [Creating a service account for the external workload](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#create_a_service_account_for_the_external_workload). + +The following information should be specified: + +- **Service account name**: Name for the service account, such as `tfc-service-account`. The name is also used as the pool ID. You can't change the pool ID later. + +The following is optional, but may be desired: + +- **Service account ID**: The ID for the service account. This defaults to the name as mentioned above, but can be set to another value. +- **Description**: Text that describes the purpose of the service account. + +#### Grant IAM Permissions + +The next step in the setup wizard will allow for granting IAM permissions for the service account. The role that is given to the service account will vary depending on your specific needs and project setup. This should in general be the most minimal set of permissions needed for the service account to properly function. + +#### Grant External Permissions + +Once the service account has been created and granted IAM permissions, you will need to grant access to the service account for the identity pool created above. Google documentation for setting this up can be found here: [Allow the external workload to impersonate the service account](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#allow_the_external_workload_to_impersonate_the_service_account). + +## Configure HCP Terraform + +You’ll need to set some environment variables in your HCP Terraform workspace in order to configure HCP Terraform to authenticate with GCP using dynamic credentials. You can set these as workspace variables, or if you’d like to share one GCP service account across multiple workspaces, you can use a variable set. When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Required Environment Variables + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_GCP_PROVIDER_AUTH`
`TFC_GCP_PROVIDER_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.7.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to use dynamic credentials to authenticate to GCP. | +| `TFC_GCP_RUN_SERVICE_ACCOUNT_EMAIL`
`TFC_GCP_RUN_SERVICE_ACCOUNT_EMAIL[_TAG]`
`TFC_DEFAULT_GCP_RUN_SERVICE_ACCOUNT_EMAIL` | The service account email HCP Terraform will use when authenticating to GCP. | Requires **v1.7.0** or later if self-managing agents. Optional if `TFC_GCP_PLAN_SERVICE_ACCOUNT_EMAIL` and `TFC_GCP_APPLY_SERVICE_ACCOUNT_EMAIL` are both provided. These variables are described [below](/terraform/enterprise/workspaces/dynamic-provider-credentials/gcp-configuration#optional-environment-variables) | + +You must also include information about the GCP Workload Identity Provider that HCP Terraform will use when authenticating to GCP. You can supply this information in two different ways: + +1. By providing one unified variable containing the canonical name of the workload identity provider. +2. By providing the project number, pool ID, and provider ID as separate variables. + +You should avoid setting both types of variables, but if you do, the unified version will take precedence. + +#### Unified Variable + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_GCP_WORKLOAD_PROVIDER_NAME`
`TFC_GCP_WORKLOAD_PROVIDER_NAME[_TAG]`
`TFC_DEFAULT_GCP_WORKLOAD_PROVIDER_NAME` | The canonical name of the workload identity provider. This must be in the form mentioned for the `name` attribute [here](https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/iam_workload_identity_pool_provider#attributes-reference) | Requires **v1.7.0** or later if self-managing agents. This will take precedence over `TFC_GCP_PROJECT_NUMBER`, `TFC_GCP_WORKLOAD_POOL_ID`, and `TFC_GCP_WORKLOAD_PROVIDER_ID` if set. | + +#### Separate Variables + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------ | +| `TFC_GCP_PROJECT_NUMBER`
`TFC_GCP_PROJECT_NUMBER[_TAG]`
`TFC_DEFAULT_GCP_PROJECT_NUMBER` | The project number where the pool and other resources live. | Requires **v1.7.0** or later if self-managing agents. This is _not_ the project ID and is a separate number. | +| `TFC_GCP_WORKLOAD_POOL_ID`
`TFC_GCP_WORKLOAD_POOL_ID[_TAG]`
`TFC_DEFAULT_GCP_WORKLOAD_POOL_ID` | The workload pool ID. | Requires **v1.7.0** or later if self-managing agents. | +| `TFC_GCP_WORKLOAD_PROVIDER_ID`
`TFC_GCP_WORKLOAD_PROVIDER_ID[_TAG]`
`TFC_DEFAULT_GCP_WORKLOAD_PROVIDER_ID` | The workload identity provider ID. | Requires **v1.7.0** or later if self-managing agents. | + +### Optional Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_GCP_WORKLOAD_IDENTITY_AUDIENCE`
`TFC_GCP_WORKLOAD_IDENTITY_AUDIENCE[_TAG]`
`TFC_DEFAULT_GCP_WORKLOAD_IDENTITY_AUDIENCE` | Will be used as the `aud` claim for the identity token. Defaults to a string of the form mentioned [here](https://cloud.google.com/iam/docs/workload-identity-federation-with-other-providers#oidc_1) in the GCP docs with the leading **https:** stripped. | Requires **v1.7.0** or later if self-managing agents. This is one of the default `aud` formats that GCP accepts. | +| `TFC_GCP_PLAN_SERVICE_ACCOUNT_EMAIL`
`TFC_GCP_PLAN_SERVICE_ACCOUNT_EMAIL[_TAG]`
`TFC_DEFAULT_GCP_PLAN_SERVICE_ACCOUNT_EMAIL` | The service account email to use for the plan phase of a run. | Requires **v1.7.0** or later if self-managing agents. Will fall back to the value of `TFC_GCP_RUN_SERVICE_ACCOUNT_EMAIL` if not provided. | +| `TFC_GCP_APPLY_SERVICE_ACCOUNT_EMAIL`
`TFC_GCP_APPLY_SERVICE_ACCOUNT_EMAIL[_TAG]`
`TFC_DEFAULT_GCP_APPLY_SERVICE_ACCOUNT_EMAIL` | The service account email to use for the apply phase of a run. | Requires **v1.7.0** or later if self-managing agents. Will fall back to the value of `TFC_GCP_RUN_SERVICE_ACCOUNT_EMAIL` if not provided. | + +## Configure the GCP Provider + +Make sure that you’re passing values for the `project` and `region` arguments into the provider configuration block. + +Make sure that you’re not setting values for the `GOOGLE_CREDENTIALS` or `GOOGLE_APPLICATION_CREDENTIALS` environment variables as these will conflict with the dynamic credentials authentication process. + +### Specifying Multiple Configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct GCP setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_gcp_dynamic_credentials" { + description = "Object containing GCP dynamic credentials configuration" + type = object({ + default = object({ + credentials = string + }) + aliases = map(object({ + credentials = string + })) + }) +} +``` + +#### Example Usage + +```hcl +provider "google" { + credentials = var.tfc_gcp_dynamic_credentials.default.credentials +} + +provider "google" { + alias = "ALIAS1" + credentials = var.tfc_gcp_dynamic_credentials.aliases["ALIAS1"].credentials +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-configuration.mdx new file mode 100644 index 000000000..2414f1b7a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-configuration.mdx @@ -0,0 +1,116 @@ +--- +page_title: Dynamic Credentials with the HCP Provider - Workspaces - Terraform Enterprise +description: >- + Use OpenID Connect to get short-term credentials for the HCP provider in your + Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Dynamic Credentials with the HCP Provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.15.1](/terraform/cloud-docs/agents/changelog#1-15-1-05-01-2024) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with HCP to authenticate with the HCP provider using [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) in your HCP Terraform runs. Configuring dynamic credentials for the HCP provider requires the following steps: + +1. **[Configure HCP](#configure-hcp):** Set up a trust configuration between HCP and HCP Terraform. Then, you must create a [service principal in HPC](https://developer.hashicorp.com/hcp/docs/hcp/admin/iam/service-principals) for your HCP Terraform workspaces. +2. **[Configure HCP Terraform](#configure-hcp-terraform):** Add environment variables to the HCP Terraform workspaces where you want to use Dynamic Credentials. + +Once you complete the setup, HCP Terraform automatically authenticates to HCP during each run. + +## Configure HCP + +You must enable and configure a workload identity pool and provider on HCP. These instructions use the HCP CLI, but you can also use Terraform to configure HCP. Refer to our [example Terraform configuration](https://github.com/hashicorp/terraform-dynamic-credentials-setup-examples/tree/main/hcp). + +#### Create a Service Principal + +Create a service principal for HCP Terraform to assume during runs by running the following HCP command. Note the ID of the service principal you create because you will need it in the following steps. For all remaining steps, replace `HCP_PROJECT_ID` with the ID of the project that contains all the resources and workspaces that you want to manage with this service principal. If you wish to manage more than one project with dynamic credentials, it is recommended that you create multiple service principals, one for each project. + +```shell +hcp iam service-principals create hcp-terraform --project=HCP_PROJECT_ID +``` + +Grant your service principal the necessary permissions to manage your infrastructure during runs. + +```shell +hcp projects iam add-binding \ + --project=HCP_PROJECT_ID \ + --member=HCP_PRINCIPAL_ID \ + --role=roles/contributor +``` + +#### Add a Workload Identity Provider + +Next, create a workload identity provider that HCP uses to authenticate the HCP Terraform run. Make sure to replace `HCP_PROJECT_ID`, `ORG_NAME`, `PROJECT_NAME`, and `WORKSPACE_NAME` with their respective values before running the command. + +```shell +hcp iam workload-identity-providers create-oidc hcp-terraform-dynamic-credentials \ + --service-principal=iam/project/HCP_PROJECT_ID/service-principal/hcp-terraform \ + --issuer=https://app.terraform.io \ + --allowed-audience=hcp.workload.identity \ + --conditional-access='jwt_claims.sub matches `^organization:ORG_NAME:project:PROJECT_NAME:workspace:WORKSPACE_NAME:run_phase:.*`' \ + --description="Allow HCP Terraform agents to act as the hcp-terraform service principal" +``` + +## Configure HCP Terraform + +Next, you need to set environment variables in your HCP Terraform workspace to configure HCP Terraform to authenticate with HCP using dynamic credentials. You can set these as workspace variables or use a variable set to share one HCP service principal across multiple workspaces. When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Required Environment Variables + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_HCP_PROVIDER_AUTH`
`TFC_HCP_PROVIDER_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.15.1** or later if you use self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to use dynamic credentials to authenticate to HCP. | +| `TFC_HCP_RUN_PROVIDER_RESOURCE_NAME`
`TFC_HCP_RUN_PROVIDER_RESOURCE_NAME[_TAG]`
`TFC_DEFAULT_HCP_RUN_PROVIDER_RESOURCE_NAME` | The resource name of the workload identity provider that will be used to assume the service principal | Requires **v1.15.1** or later if you use self-managing agents. Optional if you provide `PLAN_PROVIDER_RESOURCE_NAME` and `APPLY_PROVIDER_RESOURCE_NAME`. [Learn more](#optional-environment-variables). | + +### Optional Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_HCP_WORKLOAD_IDENTITY_AUDIENCE`
`TFC_HCP_WORKLOAD_IDENTITY_AUDIENCE[_TAG]`
`TFC_DEFAULT_HCP_WORKLOAD_IDENTITY_AUDIENCE` | HCP Terraform uses this as the `aud` claim for the identity token. Defaults to the provider resource name for the current run phase, which HCP Terraform derives from the values you provide for `RUN_PROVIDER_RESOURCE_NAME`, `PLAN_PROVIDER_RESOURCE_NAME`, and `APPLY_PROVIDER_RESOURCE_NAME`. | Requires **v1.15.1** or later if you use self-managing agents. This is one of the default `aud` formats that HCP accepts. | +| `TFC_HCP_PLAN_PROVIDER_RESOURCE_NAME`
`TFC_HCP_PLAN_PROVIDER_RESOURCE_NAME[_TAG]`
`TFC_DEFAULT_HCP_PLAN_PROVIDER_RESOURCE_NAME` | The resource name of the workload identity provider that will HCP Terraform will use to authenticate the agent during the plan phase of a run. | Requires **v1.15.1** or later if self-managing agents. Will fall back to the value of `RUN_PROVIDER_RESOURCE_NAME` if not provided. | +| `TFC_HCP_APPLY_PROVIDER_RESOURCE_NAME`
`TFC_HCP_APPLY_PROVIDER_RESOURCE_NAME[_TAG]`
`TFC_DEFAULT_HCP_APPLY_PROVIDER_RESOURCE_NAME` | The resource name of the workload identity provider that will HCP Terraform will use to authenticate the agent during the apply phase of a run. | Requires **v1.15.1** or later if self-managing agents. Will fall back to the value of `RUN_PROVIDER_RESOURCE_NAME` if not provided. | + +## Configure the HCP Provider + +Do not set the `HCP_CRED_FILE` environment variable when configuring the HCP provider, or `HCP_CRED_FILE` will conflict with the dynamic credentials authentication process. + +### Specifying Multiple Configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.15.1](/terraform/cloud-docs/agents/changelog#1-15-1-05-01-2024) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct HCP setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, refer to [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +Add the following variable to your Terraform configuration to set up additional dynamic credential configurations with the HCP provider. This variable lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_hcp_dynamic_credentials" { + description = "Object containing HCP dynamic credentials configuration" + type = object({ + default = object({ + credential_file = string + }) + aliases = map(object({ + credential_file = string + })) + }) +} +``` + +#### Example Usage + +```hcl +provider "hcp" { + credential_file = var.tfc_hcp_dynamic_credentials.default.credential_file +} + +provider "hcp" { + alias = "ALIAS1" + credential_file = var.tfc_hcp_dynamic_credentials.aliases["ALIAS1"].credential_file +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/aws-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/aws-configuration.mdx new file mode 100644 index 000000000..984c8ce7a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/aws-configuration.mdx @@ -0,0 +1,102 @@ +--- +page_title: >- + HCP Vault Secrets-Backed Dynamic Credentials with the AWS Provider - + Workspaces - Terraform Enterprise +description: >- + Use OpenID Connect and HCP Vault Secrets to get short-term credentials for the + AWS Terraform provider in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# HCP Vault Secrets-Backed Dynamic Credentials with the AWS Provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.16.0](/terraform/cloud-docs/agents/changelog#1-16-0-10-02-2024) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with HCP to use [HCP Vault Secrets-backed dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed) with the AWS provider in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure HCP Provider Credentials](#configure-hcp-provider-credentials)**: Set up a trust configuration between HCP Vault Secrets and HCP Terraform, create HCP roles and policies for your HCP Terraform workspaces, and add environment variables to those workspaces. +2. **[Configure HCP Vault Secrets](#configure-hcp-vault-secrets-aws-secrets-engine)**: Set up your HCP project's AWS integration and dynamic secret. +3. **[Configure HCP Terraform](#configure-hcp-terraform)**: Add additional environment variables to the HCP Terraform workspaces where you want to use HCP Vault Secrets-backed dynamic credentials. +4. **[Configure Terraform Providers](#configure-terraform-providers)**: Configure your Terraform providers to work with HCP Vault Secrets-backed dynamic credentials. + +Once you complete this setup, HCP Terraform automatically authenticates with AWS via HCP Vault Secrets-generated credentials during the plan and apply phase of each run. The AWS provider's authentication is only valid for the length of the plan or apply phase. + +## Configure HCP Provider Credentials + +You must first set up HCP dynamic provider credentials before you can use HCP Vault Secrets-backed dynamic credentials. This includes creating a service principal, configuring trust between HCP and HCP Terraform, and populating the required environment variables in your HCP Terraform workspace. + +[See the setup instructions for HCP dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/hcp-configuration). + +## Configure HCP Vault Secrets AWS Secrets Engine + +Follow the instructions in the HCP Vault Secrets documentation for [setting up the AWS integration in your HCP project](/hcp/docs/vault-secrets/dynamic-secrets/aws). + +## Configure HCP Terraform + +Next, you need to set certain environment variables in your HCP Terraform workspace to authenticate HCP Terraform with AWS using HCP Vault Secrets-backed dynamic credentials. These variables are in addition to those you previously set while configuring [HCP provider credentials](#configure-hcp-provider-credentials). You can add these as workspace variables or as a [variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets). + +### Required Environment Variables + +| Variable | Value | Notes | +| ------------------------------------------------------------------------------------------------------ | ------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_HVS_BACKED_AWS_AUTH`
`TFC_HVS_BACKED_AWS_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.16.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate with AWS. | +| `TFC_HVS_BACKED_AWS_RUN_SECRET_RESOURCE_NAME` | The name of the HCP Vault Secrets dynamic secret resource to read. | Requires **v1.16.0** or later if self-managing agents. Must be present. | + +### Optional Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_HVS_BACKED_AWS_HCP_CONFIG`
`TFC_HVS_BACKED_AWS_HCP_CONFIG[_TAG]`
`TFC_DEFAULT_HVS_BACKED_AWS_HCP_CONFIG` | The name of the non-default HCP configuration for workspaces using [multiple HCP configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). | Requires **v1.16.0** or later if self-managing agents. Will fall back to using the default HCP Vault Secrets configuration if not provided. | +| `TFC_HVS_BACKED_AWS_PLAN_SECRET_RESOURCE_NAME` | The name of the HCP Vault Secrets dynamic secret resource to read for the plan phase. | Requires **v1.16.0** or later if self-managing agents. Must be present. | +| `TFC_HVS_BACKED_AWS_APPLY_SECRET_RESOURCE_NAME` | The name of the HCP Vault Secrets dynamic secret resource to read for the apply phase. | Requires **v1.16.0** or later if self-managing agents. Must be present. | + +## Configure Terraform Providers + +The final step is to directly configure your AWS and HCP Vault Secrets providers. + +### Configure the AWS Provider + +Ensure you pass a value for the `region` argument in your AWS provider configuration block or set the `AWS_REGION` variable in your workspace. + +Ensure you are not using any of the arguments or methods mentioned in the [authentication and configuration](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration) section of the provider documentation. Otherwise, these settings may interfere with dynamic provider credentials. + +### Specifying Multiple Configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.16.0](/terraform/cloud-docs/agents/changelog#1-16-0-10-02-2024) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct HCP Vault Secrets-backed AWS setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_hvs_backed_aws_dynamic_credentials" { + description = "Object containing HCP Vault Secrets-backed AWS dynamic credentials configuration" + type = object({ + default = object({ + shared_credentials_file = string + }) + aliases = map(object({ + shared_credentials_file = string + })) + }) +} +``` + +#### Example Usage + +```hcl +provider "aws" { + shared_credentials_files = [var.tfc_hvs_backed_aws_dynamic_credentials.default.shared_credentials_file] +} + +provider "aws" { + alias = "ALIAS1" + shared_credentials_files = [var.tfc_hvs_backed_aws_dynamic_credentials.aliases["ALIAS1"].shared_credentials_file] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/gcp-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/gcp-configuration.mdx new file mode 100644 index 000000000..725342406 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/gcp-configuration.mdx @@ -0,0 +1,119 @@ +--- +page_title: >- + HCP Vault Secrets-Backed Dynamic Credentials with the GCP Provider - + Workspaces - Terraform Enterprise +description: >- + Use OpenID Connect and HCP Vault Secrets to get short-term credentials for the + GCP Terraform provider in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# HCP Vault Secrets-Backed Dynamic Credentials with the GCP Provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.16.0](/terraform/cloud-docs/agents/changelog#1-16-0-10-02-2024) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with HCP to use [HCP Vault Secrets-backed dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed) with the GCP provider in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure HCP Provider Credentials](#configure-hcp-provider-credentials)**: Set up a trust configuration between HCP Vault Secrets and HCP Terraform, create HCP Vault Secrets roles and policies for your HCP Terraform workspaces, and add environment variables to those workspaces. +2. **[Configure HCP Vault Secrets](#configure-hcp-vault-secrets-gcp-secrets-engine)**: Set up your HCP project's GCP integration and dynamic secret. +3. **[Configure HCP Terraform](#configure-hcp-terraform)**: Add additional environment variables to the HCP Terraform workspaces where you want to use HCP Vault Secrets-backed dynamic credentials. +4. **[Configure Terraform Providers](#configure-terraform-providers)**: Configure your Terraform providers to work with HCP Vault Secrets-backed dynamic credentials. + +Once you complete this setup, HCP Terraform automatically authenticates with GCP via HCP Vault Secrets-generated credentials during the plan and apply phase of each run. The GCP provider's authentication is only valid for the length of the plan or apply phase. + +## Configure HCP Provider Credentials + +You must first set up HCP dynamic provider credentials before you can use HCP Vault Secrets-backed dynamic credentials. This includes creating a service principal, configuring trust between HCP and HCP Terraform, and populating the required environment variables in your HCP Terraform workspace. + +[See the setup instructions for HCP dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/hcp-configuration). + +## Configure HCP Vault Secrets GCP Secrets Engine + +Follow the instructions in the HCP Vault Secrets documentation for [setting up the GCP integration in your HCP project](/hcp/docs/vault-secrets/dynamic-secrets/gcp). + +## Configure HCP Terraform + +Next, you need to set certain environment variables in your HCP Terraform workspace to authenticate HCP Terraform with GCP using HCP Vault Secrets-backed dynamic credentials. These variables are in addition to those you previously set while configuring [HCP provider credentials](#configure-hcp-provider-credentials). You can add these as workspace variables or as a [variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets). + +### Required Common Environment Variables + +| Variable | Value | Notes | +| ------------------------------------------------------------------------------------------------------ | ------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_HVS_BACKED_GCP_AUTH`
`TFC_HVS_BACKED_GCP_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.16.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate with GCP. | +| `TFC_HVS_BACKED_GCP_RUN_SECRET_RESOURCE_NAME` | The name of the HCP Vault Secrets dynamic secret resource to read. | Requires **v1.16.0** or later if self-managing agents. Must be present. | + +### Optional Common Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_HVS_BACKED_GCP_HCP_CONFIG`
`TFC_HVS_BACKED_GCP_HCP_CONFIG[_TAG]`
`TFC_DEFAULT_HVS_BACKED_GCP_HCP_CONFIG` | The name of the non-default HCP configuration for workspaces using [multiple HCP configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). | Requires **v1.16.0** or later if self-managing agents. Will fall back to using the default HCP Vault Secrets configuration if not provided. | +| `TFC_HVS_BACKED_GCP_PLAN_SECRET_RESOURCE_NAME` | The name of the HCP Vault Secrets dynamic secret resource to read for the plan phase. | Requires **v1.16.0** or later if self-managing agents. Must be present. | +| `TFC_HVS_BACKED_GCP_APPLY_SECRET_RESOURCE_NAME` | The name of the HCP Vault Secrets dynamic secret resource to read for the apply phase. | Requires **v1.16.0** or later if self-managing agents. Must be present. | + +## Configure Terraform Providers + +The final step is to directly configure your GCP and HCP Vault Secrets providers. + +### Configure the GCP Provider + +Ensure you pass values for the `project` and `region` arguments into the provider configuration block. + +Ensure you are not setting values or environment variables for `GOOGLE_CREDENTIALS` or `GOOGLE_APPLICATION_CREDENTIALS`. Otherwise, these values may interfere with dynamic provider credentials. + +### Specifying Multiple Configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.16.0](/terraform/cloud-docs/agents/changelog#1-16-0-10-02-2024) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct HCP Vault Secrets-backed GCP setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_hvs_backed_gcp_dynamic_credentials" { + description = "Object containing HCP Vault Secrets-backed GCP dynamic credentials configuration" + type = object({ + default = object({ + credentials = string + access_token = string + }) + aliases = map(object({ + credentials = string + access_token = string + })) + }) +} +``` + +#### Example Usage + +##### Access Token + +```hcl +provider "google" { + access_token = var.tfc_hvs_backed_gcp_dynamic_credentials.default.access_token +} + +provider "google" { + alias = "ALIAS1" + access_token = var.tfc_hvs_backed_gcp_dynamic_credentials.aliases["ALIAS1"].access_token +} +``` + +##### Credentials + +```hcl +provider "google" { + credentials = var.tfc_hvs_backed_gcp_dynamic_credentials.default.credentials +} + +provider "google" { + alias = "ALIAS1" + credentials = var.tfc_hvs_backed_gcp_dynamic_credentials.aliases["ALIAS1"].credentials +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/index.mdx new file mode 100644 index 000000000..a60b0e4b1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/index.mdx @@ -0,0 +1,38 @@ +--- +page_title: HCP Vault Secrets-backed dynamic credentials overview +description: >- + HCP Vault Secrets-backed dynamic credentials improve security by leveraging + HCP Vault Secrets to generate temporary credentials for Terraform runs. + Configure HCP Vault Secrets-backed dynamic credentials for supported + providers. +source: terraform-docs-common +--- + +# HCP Vault Secrets-Backed Dynamic Credentials + +This topic provides an overview of how to use HCP Vault Secrets to generate temporary credentials for providers so that you can securely use them in HCP Terraform runs. + +## Introduction + +Configuring [dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) with different cloud providers is suitable for most use cases, but you can use HCP Vault Secrets-backed dynamic credentials to centralize and consolidate cloud credential management. + +HCP Vault Secrets-backed dynamic credentials leverage HCP Vault Secrets' [dynamic secrets capability](/hcp/docs/vault-secrets/dynamic-secrets), which allows you to generate short-lived credentials for various providers. This means you can authenticate a HCP instance using workload identity tokens and use dynamic secret capabilities on that instance to generate dynamic credentials for the various providers. + +Refer to the [HCP Vault Secrets announcement](https://www.hashicorp.com/blog/hcp-vault-secrets-is-now-generally-available) to learn about the benefits of using HCP Vault Secrets to manage provider credentials. + +## Workflow + +Using HCP Vault Secrets-backed dynamic credentials in a workspace requires the following steps for each cloud platform: + +1. If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.16.0](/terraform/cloud-docs/agents/changelog#1-16-0-10-02-2024) or newer. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). +2. Set up dynamic provider credentials with the HCP provider: You must first [configure dynamic credentials with the HCP provider](/terraform/enterprise/workspaces/dynamic-provider-credentials/hcp-configuration). +3. Configure the dynamic secrets integration: You must configure the desired Vault secrets integration in your HCP project, such as AWS or GCP. +4. Configure your HCP Terraform workspace: You must add specific environment variables to your workspace to tell HCP Terraform how to authenticate to other cloud providers during runs. Each cloud platform has its own set of environment variables that are necessary to configure dynamic credentials. +5. Complete the instructions for setting up HCP Vault Secrets-backed dynamic for [Amazon Web Services](/terraform/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/aws-configuration) or [Google Cloud Platform](/terraform/enterprise/workspaces/dynamic-provider-credentials/hcp-vault-secrets-backed/gcp-configuration). + +### Access to metadata endpoints + +In order to verify signed JWTs, HCP must have network access to the following static OIDC metadata endpoints within HCP Terraform: + +- `/.well-known/openid-configuration`: Standard OIDC metadata. +- `/.well-known/jwks`: HCP Terraform public keys that cloud platforms use to verify the authenticity of tokens that claim to come from HCP Terraform. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/index.mdx new file mode 100644 index 000000000..11a3902ea --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/index.mdx @@ -0,0 +1,59 @@ +--- +page_title: Dynamic provider credentials in Terraform Enterprise +description: >- + Dynamic provider credentials generate temporary credentials for Terraform + Enterprise runs. Learn how dynamic credentials for Vault, AWS, Azure, + Kubernetes, and GCP can improve your security. +source: terraform-docs-common +--- + +# Dynamic provider credentials + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.7.0](/terraform/cloud-docs/agents/changelog#1-7-0-03-02-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +Using static credentials in your workspaces to authenticate providers presents a security risk, even if you rotate your credentials regularly. Dynamic provider credentials improve your security posture by letting you provision new, temporary credentials for each run. + +You can configure dynamic credentials for each HCP Terraform workspace. This workflow eliminates the need to manually manage and rotate credentials across your organization. It also lets you use the cloud platform’s authentication and authorization tools to scope permissions based on metadata, such as a run’s phase, its workspace, or its organization. + +## How Dynamic Credentials Work + +You configure a trust relationship between your cloud platform and HCP Terraform. As part of that process, you can define rules that let HCP Terraform workspaces and runs access specific resources. Then, the following process occurs for each Terraform plan and apply: + +1. HCP Terraform generates a [workload identity token](/terraform/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens). The token is compliant with OpenID Connect protocol (OIDC) standards and includes information about the organization, workspace, and run stage. +2. When a plan or apply begins, HCP Terraform sends the workload identity token to the cloud platform, along with any other information needed to authenticate. +3. The cloud platform uses HCP Terraform’s public signing key to verify the workload identity token. +4. If verification succeeds, the cloud platform returns a set of fresh temporary credentials for HCP Terraform to use. +5. HCP Terraform sets up these credentials within the run environment for the Terraform provider to use. +6. The Terraform plan or apply proceeds. +7. When the plan or apply completes, the run environment is torn down and the temporary credentials are discarded. + +## Configure Dynamic Credentials + +Using dynamic credentials in a workspace requires the following steps for each cloud platform: + +1. **Set up a Trust Relationship:** You must configure a relationship between HCP Terraform and the other cloud platform. The exact details of this process will be different depending on the cloud platform. +2. **Configure Cloud Platform Access:** You must configure roles and policies for the cloud platform to define the workspace’s access to infrastructure resources. +3. **Configure HCP Terraform Workspace**: You must add specific environment variables to your workspace to tell HCP Terraform how to authenticate to the other cloud platform during plans and applies. Each cloud platform has its own set of environment variables to configure dynamic credentials. + +The process for each step is different for each cloud platform. Refer to the cloud platform configuration instructions for full details. You can configure dynamic credentials for the following platforms: + +- [Vault](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration) +- [Amazon Web Services](/terraform/enterprise/workspaces/dynamic-provider-credentials/aws-configuration) +- [Google Cloud Platform](/terraform/enterprise/workspaces/dynamic-provider-credentials/gcp-configuration) +- [Azure](/terraform/enterprise/workspaces/dynamic-provider-credentials/azure-configuration) +- [Kubernetes](/terraform/enterprise/workspaces/dynamic-provider-credentials/kubernetes-configuration) + +You can also use Vault to generate credentials for AWS, GCP, or Azure by setting up [Vault-backed dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed), which take advantage of Vault's [secrets engines](/vault/docs/secrets) to generate temporary credentials. + +## Terraform Enterprise Specific Requirements + +### External Access to Metadata Endpoints + +In order to verify signed JWTs, cloud platforms must have network access to the following static OIDC metadata endpoints within TFE: + +1. `/.well-known/openid-configuration` - standard OIDC metadata. +2. `/.well-known/jwks` - TFE’s public key(s) that cloud platforms use to verify the authenticity of tokens that claim to come from TFE. + +### External Vault Policy + +If you are using an external Vault instance, you must ensure that your Vault instance has the correct policies setup as detailed in the [External Vault Requirements for Terraform Enterprise](/terraform/enterprise/requirements/data-storage/vault) documentation. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/kubernetes-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/kubernetes-configuration.mdx new file mode 100644 index 000000000..6cd1fbda1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/kubernetes-configuration.mdx @@ -0,0 +1,171 @@ +--- +page_title: >- + Use dynamic credentials with the Kubernetes and Helm providers in Terraform + Enterprise +description: >- + Use OpenID Connect to get short-term credentials for the Kubernetes and Helm + Terraform providers in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Use dynamic credentials with the Kubernetes and Helm providers + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.13.1](/terraform/cloud-docs/agents/changelog#1-13-1-10-25-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with Kubernetes to use [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) for the Kubernetes and Helm providers in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure Kubernetes](#configure-kubernetes):** Set up a trust configuration between Kubernetes and HCP Terraform. Next, create Kubernetes role bindings for your HCP Terraform identities. +2. **[Configure HCP Terraform](#configure-hcp-terraform):** Add environment variables to the HCP Terraform workspaces where you want to use dynamic credentials. +3. **[Configure the Kubernetes or Helm provider](#configure-the-provider)**: Set the required attributes on the provider block. + +Once you complete the setup, HCP Terraform automatically authenticates to Kubernetes during each run. The Kubernetes and Helm providers' authentication is valid for the length of a plan or apply operation. + +## Configure Kubernetes + +You must enable and configure an OIDC identity provider in the Kubernetes API. This workflow changes based on the platform hosting your Kubernetes cluster. HCP Terraform only supports dynamic credentials with Kubernetes in AWS and GCP. + +### Configure an OIDC identity provider + +Refer to the AWS documentation for guidance on [setting up an EKS cluster for OIDC authentication](https://docs.aws.amazon.com/eks/latest/userguide/authenticate-oidc-identity-provider.html). You can also refer to our [example configuration](https://github.com/hashicorp-education/learn-terraform-dynamic-credentials/tree/main/eks/trust). + +Refer to the GCP documentation for guidance on [setting up a GKE cluster for OIDC authentication](https://cloud.google.com/kubernetes-engine/docs/how-to/oidc). You can also refer to our [example configuration](https://github.com/hashicorp-education/learn-terraform-dynamic-credentials/tree/main/gke/trust). + +When inputting an "issuer URL", use the address of HCP Terraform (`https://app.terraform.io` _without_ a trailing slash) or the URL of your Terraform Enterprise instance. The value of "client ID" is your audience in OIDC terminology, and it should match the value of the `TFC_KUBERNETES_WORKLOAD_IDENTITY_AUDIENCE` environment variable in your workspace. + +The OIDC identity resolves authentication to the Kubernetes API, but it first requires authorization to interact with that API. So, you must bind RBAC roles to the OIDC identity in Kubernetes. + +You can use both "User" and "Group" subjects in your role bindings. For OIDC identities coming from TFC, the "User" value is formatted like so: `organization::project::workspace::run_phase:`. + +You can extract the "Group" value from the token claim you configured in your cluster OIDC configuration. For details on the structure of the HCP Terraform token, refer to [Workload Identity](/terraform/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens). + +Below, we show an example of a `RoleBinding` for the HCP Terraform OIDC identity. + +```hcl +resource "kubernetes_cluster_role_binding_v1" "oidc_role" { + metadata { + name = "odic-identity" + } + + role_ref { + api_group = "rbac.authorization.k8s.io" + kind = "ClusterRole" + name = var.rbac_group_cluster_role + } + + // Option A - Bind RBAC roles to groups + // + // Groups are extracted from the token claim designated by 'rbac_group_oidc_claim' + // + subject { + api_group = "rbac.authorization.k8s.io" + kind = "Group" + name = var.tfc_organization_name + } + + // Option B - Bind RBAC roles to user identities + // + // Users are extracted from the 'sub' token claim. + // Plan and apply phases get assigned different users identities. + // For HCP Terraform tokens, the format of the user id is always the one described bellow. + // + subject { + api_group = "rbac.authorization.k8s.io" + kind = "User" + name = "${var.tfc_hostname}#organization:${var.tfc_organization_name}:project:${var.tfc_project_name}:workspace:${var.tfc_workspace_name}:run_phase:plan" + } + + subject { + api_group = "rbac.authorization.k8s.io" + kind = "User" + name = "${var.tfc_hostname}#organization:${var.tfc_organization_name}:project:${var.tfc_project_name}:workspace:${var.tfc_workspace_name}:run_phase:apply" + } +} +``` + +If binding with "User" subjects, be aware that plan and apply phases are assigned different identities, each requiring specific bindings. Meaning you can tailor permissions for each Terraform operation. Planning operations usually require "read-only" permissions, while apply operations also require "write" access. + +!> **Warning**: Always check, at minimum, the audience and the organization's name to prevent unauthorized access from other HCP Terraform organizations. + +## Configure HCP Terraform + +You must set certain environment variables in your HCP Terraform workspace to configure HCP Terraform to authenticate with Kubernetes or Helm using dynamic credentials. You can set these as workspace variables, or if you’d like to share one Kubernetes role across multiple workspaces, you can use a variable set. When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Required Environment Variables + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_KUBERNETES_PROVIDER_AUTH`
`TFC_KUBERNETES_PROVIDER_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.14.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate to Kubernetes. | +| `TFC_KUBERNETES_WORKLOAD_IDENTITY_AUDIENCE`
`TFC_KUBERNETES_WORKLOAD_IDENTITY_AUDIENCE[_TAG]`
`TFC_DEFAULT_KUBERNETES_WORKLOAD_IDENTITY_AUDIENCE` | The audience name in your cluster's OIDC configuration, such as `kubernetes`. | Requires **v1.14.0** or later if self-managing agents. | + +## Configure the provider + +The Kubernetes and Helm providers share the same schema of configuration attributes for the provider block. The example below illustrates using the Kubernetes provider but the same configuration applies to the Helm provider. + +Make sure that you are not using any of the other arguments or methods listed in the [authentication](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs#authentication) section of the provider documentation as these settings may interfere with dynamic provider credentials. The only allowed provider attributes are `host` and `cluster_ca_certificate`. + +### Single provider instance + +HCP Terraform automatically sets the `KUBE_TOKEN` environment variable and includes the workload identity token. + +The provider needs to be configured with the URL of the API endpoint using the `host` attribute (or `KUBE_HOST` environment variable). In most cases, the `cluster_ca_certificate` (or `KUBE_CLUSTER_CA_CERT_DATA` environment variable) is also required. + +#### Example Usage + +```hcl +provider "kubernetes" { + host = var.cluster-endpoint-url + cluster_ca_certificate = base64decode(var.cluster-endpoint-ca) +} +``` + +### Multiple aliases + +You can add additional variables to handle multiple distinct Kubernetes clusters, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_kubernetes_dynamic_credentials" { + description = "Object containing Kubernetes dynamic credentials configuration" + type = object({ + default = object({ + token_path = string + }) + aliases = map(object({ + token_path = string + })) + }) +} +``` + +#### Example Usage + +```hcl +provider "kubernetes" { + alias = "ALIAS1" + host = var.alias1-endpoint-url + cluster_ca_certificate = base64decode(var.alias1-cluster-ca) + token = file(var.tfc_kubernetes_dynamic_credentials.aliases["ALIAS1"].token_path) +} + +provider "kubernetes" { + alias = "ALIAS2" + host = var.alias1-endpoint-url + cluster_ca_certificate = base64decode(var.alias1-cluster-ca) + token = file(var.tfc_kubernetes_dynamic_credentials.aliases["ALIAS2"].token_path) +} +``` + +The `tfc_kubernetes_dynamic_credentials` variable is also available to use for single provider configurations, instead of the `KUBE_TOKEN` environment variable. + +```hcl +provider "kubernetes" { + host = var.cluster-endpoint-url + cluster_ca_certificate = base64decode(var.cluster-endpoint-ca) + token = file(var.tfc_kubernetes_dynamic_credentials.default.token_path) +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/manual-generation.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/manual-generation.mdx new file mode 100644 index 000000000..ab6be885f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/manual-generation.mdx @@ -0,0 +1,42 @@ +--- +page_title: Manually generate workload identity tokens in Terraform Enterprise +description: >- + Learn how to generate workload identity tokens to allow Terraform runs to + safely authenticate with custom workflows and providers that do not natively + support dynamic credentials. +source: terraform-docs-common +--- + +# Manually generate workload identity tokens + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.7.0](/terraform/cloud-docs/agents/changelog#1-7-0-03-02-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +If required for custom auth workflows or to perform auth with providers that are not natively supported by dynamic credentials, you can request that HCP Terraform inject a [workload identity token](/terraform/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens) into the run environment for usage in agent hooks. + +## Configure HCP Terraform + +### Required Environment Variables + +You’ll need to set the following environment variable in your HCP Terraform workspace in order to have HCP Terraform inject a workload identity token into the run environment. You can set this as a workspace variable, or if you’d like to inject tokens with the same audience value across multiple workspaces, you can use a variable set. + +| Variable | Value | Notes | +| -------------------------------- | ------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `TFC_WORKLOAD_IDENTITY_AUDIENCE` | The desired value for the token’s audience. | Requires **v1.7.0** or later if self-managing agents. Must be present and set or HCP Terraform will not inject a workload identity token into the run environment. | + +### Generating Multiple Tokens + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can generate multiple tokens if you want distinct audience values for different consumers of your workload identity tokens. For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +You can generate multiple tokens by specifying additional variables in the following format: `TFC_WORKLOAD_IDENTITY_AUDIENCE_[YOUR_TAG_HERE]`. + +Your tag can only contain letters, numbers, and underscores and can not use reserved keywords. The following keywords are reserved: `TYPE`. + +Each additional audience variable you specify generates an additional workload identity token that HCP Terraform stores in variables with the format: `TFC_WORKLOAD_IDENTITY_TOKEN_[YOUR_TAG_HERE]`. + +## Configure Agent Hooks + +After you've set the `TFC_WORKLOAD_IDENTITY_AUDIENCE` variable, each plan and apply will have a `TFC_WORKLOAD_IDENTITY_TOKEN` variable available in the run environment, which contains a [workload identity token](/terraform/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens). + +You can use this environment variable in custom agent hooks to enable custom auth workflows or to perform auth with providers which are not natively supported by dynamic credentials. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations.mdx new file mode 100644 index 000000000..24a076a11 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations.mdx @@ -0,0 +1,94 @@ +--- +page_title: Specify multiple dynamic credential configurations in Terraform Enterprise +description: >- + Specify multiple dynamic provider credential configurations for the same + workspace to create aliases for different provider configurations. +source: terraform-docs-common +--- + +# Specify multiple dynamic credential configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can create multiple dynamic credential configurations of the same provider in a workspace. + +Each configuration generates a distinct [workload identity token](/terraform/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens), allowing you to create [aliases for different provider configurations](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can specify unique audience values per configuration, and [manually generate multiple tokens](/terraform/enterprise/workspaces/dynamic-provider-credentials/manual-generation). + +Specifying multiple dynamic credential configurations in HCP Terraform builds on the existing method of providing each provider's environment variables to a workspace. The process requires mapping well-known authentication [input variables](/terraform/language/values/variables) to the correct providers. + +## Configure HCP Terraform + +You can specify additional dynamic credentials configurations by defining and appending a “tag” to the end of your existing required environment variables: `[DYNAMIC_CREDENTIALS_VAR_NAME]_[YOUR_TAG]`. + +Your tag can only contain letters, numbers, and underscores and can not use reserved keywords. The following keywords are reserved: `TYPE`. + +### Example + +Using [Vault's dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration) setup as an example, we can create additional configurations by setting new tagged variables that match Vault's [required environment variables](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration#required-environment-variables). So, if you want to add a configuration with the tag `ALIAS1`, you must set environment variables for `TFC_VAULT_PROVIDER_AUTH_ALIAS1`, `TFC_VAULT_ADDR_ALIAS1`, and `TFC_VAULT_RUN_ROLE_ALIAS1`. + +### Default Values for Multiple Configurations + +Each environment variable has a corresponding default variable which you can use to share values across multiple configurations. In this way, you can set values common to multiple configurations a single time, rather than repeating them for each configuration. If you explicitly set the corresponding environment variable in addition to the default variable, the explicit value is given precedence. + +#### Example + +In the [example above](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations#example), if each of your Vault configurations used the same underlying Vault instance, you could define the Vault address a single time using the `TFC_DEFAULT_VAULT_ADDR` variable, and omit `TFC_VAULT_ADDR` and `TFC_VAULT_ADDR_ALIAS1`. If you add a third Vault configuration for a different Vault instance with the tag `ALIAS2`, you could set the variable `TFC_VAULT_ADDR_ALIAS2` to override the Vault address specifically for the `ALIAS2` configuration. + +## Configure Terraform Code + +Each supported provider has input variables you must declare in your Terraform code to use dynamic credentials with that provider. Each dynamic provider's documentation page lists the required variables for that provider. HCP Terraform provides values for these variables during runs, which you can use to authenticate HCP Terraform with providers using dynamic credentials. + +Use the input variable values that HCP Terraform provides to map configuration values to the correct provider blocks. Authentication information for the default provider exists in a variable's top-level `default` object, while each additional configuration exists under a variable's `aliases` map. HCP Terraform generates the keys of the `aliases` map based on the tag you define in your HCP Terraform configuration. + +~> **Important:** If you add additional configurations to a workspace, you need to manually map authentication information for all providers _including_ the default provider. + +### Example + +Continuing from the [example above](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations#example), after setting the required environment variables for your provider, [add the following code to your Terraform configuration](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration#required-terraform-variable). This lets HCP Terraform supply variable values that you can use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_vault_dynamic_credentials" { + description = "Object containing Vault dynamic credentials configuration" + type = object({ + default = object({ + token_filename = string + address = string + namespace = string + ca_cert_file = string + }) + aliases = map(object({ + token_filename = string + address = string + namespace = string + ca_cert_file = string + })) + }) +} +``` + +Use the above object to map authentication information to the correct provider block. For this example, index into the `aliases` map with your alias's tag (`ALIAS1`) and the `default` provider object. + +```hcl +provider "vault" { + // Set this to true as HCP Terraform manages the token lifecycle + skip_child_token = true + address = var.tfc_vault_dynamic_credentials.default.address + namespace = var.tfc_vault_dynamic_credentials.default.namespace + + auth_login_token_file { + filename = var.tfc_vault_dynamic_credentials.default.token_filename + } +} + +provider "vault" { + // Set this to true as HCP Terraform manages the token lifecycle + skip_child_token = true + alias = "ALIAS1" + address = var.tfc_vault_dynamic_credentials.aliases["ALIAS1"].address + namespace = var.tfc_vault_dynamic_credentials.aliases["ALIAS1"].namespace + + auth_login_token_file { + filename = var.tfc_vault_dynamic_credentials.aliases["ALIAS1"].token_filename + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/aws-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/aws-configuration.mdx new file mode 100644 index 000000000..31bcda6cd --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/aws-configuration.mdx @@ -0,0 +1,135 @@ +--- +page_title: >- + Use Vault-backed dynamic credentials with the AWS provider in Terraform + Enterprise +description: >- + Use OpenID Connect and Vault to get short-term credentials for the AWS + Terraform provider in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Use Vault-backed dynamic credentials with the AWS provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.8.0](/terraform/cloud-docs/agents/changelog#1-8-0-04-18-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with Vault to use [Vault-backed dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed) with the AWS provider in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure Vault Dynamic Provider Credentials](#configure-vault-dynamic-provider-credentials)**: Set up a trust configuration between Vault and HCP Terraform, create Vault roles and policies for your HCP Terraform workspaces, and add environment variables to those workspaces. +2. **[Configure the Vault AWS Secrets Engine](#configure-vault-aws-secrets-engine)**: Set up the AWS secrets engine in your Vault instance. +3. **[Configure HCP Terraform](#configure-hcp-terraform)**: Add additional environment variables to the HCP Terraform workspaces where you want to use Vault-Backed Dynamic Credentials. +4. **[Configure Terraform Providers](#configure-terraform-providers)**: Configure your Terraform providers to work with Vault-backed dynamic credentials. + +Once you complete this setup, HCP Terraform automatically authenticates with AWS via Vault-generated credentials during the plan and apply phase of each run. The AWS provider's authentication is only valid for the length of the plan or apply phase. + +## Configure Vault Dynamic Provider Credentials + +You must first set up Vault dynamic provider credentials before you can use Vault-backed dynamic credentials. This includes setting up the JWT auth backend in Vault, configuring trust between HCP Terraform and Vault, and populating the required environment variables in your HCP Terraform workspace. + +[See the setup instructions for Vault dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration). + +# Configure Vault AWS Secrets Engine + +Follow the instructions in the Vault documentation for [setting up the AWS secrets engine in your Vault instance](/vault/docs/secrets/aws). You can also do this configuration through Terraform. Refer to our [example Terraform configuration](https://github.com/hashicorp/terraform-dynamic-credentials-setup-examples/tree/main/vault-backed/aws). + +~> **Important**: carefully consider the limitations and differences between each supported credential type in the AWS secrets engine. These limitations carry over to HCP Terraform’s usage of these credentials for authenticating the AWS provider. + +## Configure HCP Terraform + +Next, you need to set certain environment variables in your HCP Terraform workspace to authenticate HCP Terraform with AWS using Vault-backed dynamic credentials. These variables are in addition to those you previously set while configuring [Vault dynamic provider credentials](#configure-vault-dynamic-provider-credentials). You can add these as workspace variables or as a [variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets). When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Common Environment Variables + +The below variables apply to all AWS auth types. + +#### Required Common Environment Variables + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `TFC_VAULT_BACKED_AWS_AUTH`
`TFC_VAULT_BACKED_AWS_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.8.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate with AWS. | +| `TFC_VAULT_BACKED_AWS_AUTH_TYPE`
`TFC_VAULT_BACKED_AWS_AUTH_TYPE[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_AUTH_TYPE` | Specifies the type of authentication to perform with AWS. Must be one of the following: `iam_user`, `assumed_role`, or `federation_token`. | Requires **v1.8.0** or later if self-managing agents. | +| `TFC_VAULT_BACKED_AWS_RUN_VAULT_ROLE`
`TFC_VAULT_BACKED_AWS_RUN_VAULT_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_RUN_VAULT_ROLE` | The role to use in Vault. | Requires **v1.8.0** or later if self-managing agents. Optional if `TFC_VAULT_BACKED_AWS_PLAN_VAULT_ROLE` and `TFC_VAULT_BACKED_AWS_APPLY_VAULT_ROLE` are both provided. These variables are described [below](#optional-common-environment-variables). | + +#### Optional Common Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `TFC_VAULT_BACKED_AWS_MOUNT_PATH`
`TFC_VAULT_BACKED_AWS_MOUNT_PATH[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_MOUNT_PATH` | The mount path of the AWS secrets engine in Vault. | Requires **v1.8.0** or later if self-managing agents. Defaults to `aws`. | +| `TFC_VAULT_BACKED_AWS_PLAN_VAULT_ROLE`
`TFC_VAULT_BACKED_AWS_PLAN_VAULT_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_PLAN_VAULT_ROLE` | The Vault role to use the plan phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_AWS_RUN_VAULT_ROLE` if not provided. | +| `TFC_VAULT_BACKED_AWS_APPLY_VAULT_ROLE`
`TFC_VAULT_BACKED_AWS_APPLY_VAULT_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_APPLY_VAULT_ROLE` | The Vault role to use for the apply phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_AWS_RUN_VAULT_ROLE` if not provided. | +| `TFC_VAULT_BACKED_AWS_SLEEP_SECONDS`
`TFC_VAULT_BACKED_AWS_SLEEP_SECONDS[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_SLEEP_SECONDS` | The amount of time to wait, in seconds, after obtaining temporary credentials from Vault. e.g., `30` for 30 seconds. Must be 1500 seconds (25 minutes) or less. | Requires **v1.12.0** or later if self-managing agents. Can be used to mitigate eventual consistency issues in AWS when using the `iam_user` auth type. | +| `TFC_VAULT_BACKED_AWS_VAULT_CONFIG`
`TFC_VAULT_BACKED_AWS_VAULT_CONFIG[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_VAULT_CONFIG` | The name of the non-default Vault configuration for workspaces using [multiple Vault configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). | Requires **v1.12.0** or later if self-managing agents. Will fall back to using the default Vault configuration if not provided. | + +### Assumed Role Specific Environment Variables + +These environment variables are only valid if the `TFC_VAULT_BACKED_AWS_AUTH_TYPE` is `assumed_role`. + +#### Required Assumed Role Specific Environment Variables + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_AWS_RUN_ROLE_ARN`
`TFC_VAULT_BACKED_AWS_RUN_ROLE_ARN[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_RUN_ROLE_ARN` | The ARN of the role to assume in AWS. | Requires **v1.8.0** or later if self-managing agents. Optional if `TFC_VAULT_BACKED_AWS_PLAN_ROLE_ARN` and `TFC_VAULT_BACKED_AWS_APPLY_ROLE_ARN` are both provided. These variables are described [below](#optional-assume-role-specific-environment-variables). | + +#### Optional Assumed Role Specific Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_AWS_PLAN_ROLE_ARN`
`TFC_VAULT_BACKED_AWS_PLAN_ROLE_ARN[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_PLAN_ROLE_ARN` | The ARN of the role to use for the plan phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_AWS_RUN_ROLE_ARN` if not provided. | +| `TFC_VAULT_BACKED_AWS_APPLY_ROLE_ARN`
`TFC_VAULT_BACKED_AWS_APPLY_ROLE_ARN[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AWS_APPLY_ROLE_ARN` | The ARN of the role to use for the apply phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_AWS_RUN_ROLE_ARN` if not provided. | + +## Configure Terraform Providers + +The final step is to directly configure your AWS and Vault providers. + +### Configure the AWS Provider + +Ensure you pass a value for the `region` argument in your AWS provider configuration block or set the `AWS_REGION` variable in your workspace. + +Ensure you are not using any of the arguments or methods mentioned in the [authentication and configuration](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#authentication-and-configuration) section of the provider documentation. Otherwise, these settings may interfere with dynamic provider credentials. + +### Configure the Vault Provider + +If you were previously using the Vault provider to authenticate the AWS provider, remove any existing usage of the AWS secrets engine from your Terraform Code. +This includes the [`vault_aws_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/latest/docs/data-sources/aws_access_credentials) data source and any instances of [`vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/latest/docs/data-sources/generic_secret) you previously used to generate AWS credentials. + +### Specifying Multiple Configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct Vault-backed AWS setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_vault_backed_aws_dynamic_credentials" { + description = "Object containing Vault-backed AWS dynamic credentials configuration" + type = object({ + default = object({ + shared_credentials_file = string + }) + aliases = map(object({ + shared_credentials_file = string + })) + }) +} +``` + +#### Example Usage + +```hcl +provider "aws" { + shared_credentials_files = [var.tfc_vault_backed_aws_dynamic_credentials.default.shared_credentials_file] +} + +provider "aws" { + alias = "ALIAS1" + shared_credentials_files = [var.tfc_vault_backed_aws_dynamic_credentials.aliases["ALIAS1"].shared_credentials_file] +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/azure-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/azure-configuration.mdx new file mode 100644 index 000000000..138e30f69 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/azure-configuration.mdx @@ -0,0 +1,152 @@ +--- +page_title: >- + Use Vault-backed dynamic credentials with the Azure provider in Terraform + Enterprise +description: >- + Use OpenID Connect and Vault to get short-term credentials for the Azure + Terraform provider in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Use Vault-backed dynamic credentials with the Azure provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.8.0](/terraform/cloud-docs/agents/changelog#1-8-0-04-18-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with Vault to use [Vault-backed dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed) with the Azure provider in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure Vault Dynamic Provider Credentials](#configure-vault-dynamic-provider-credentials)**: Set up a trust configuration between Vault and HCP Terraform, create Vault roles and policies for your HCP Terraform workspaces, and add environment variables to those workspaces. +2. **[Configure the Vault Azure Secrets Engine](#configure-vault-azure-secrets-engine)**: Set up the Azure secrets engine in your Vault instance. +3. **[Configure HCP Terraform](#configure-hcp-terraform)**: Add additional environment variables to the HCP Terraform workspaces where you want to use Vault-Backed Dynamic Credentials. +4. **[Configure Terraform Providers](#configure-terraform-providers)**: Configure your Terraform providers to work with Vault-backed Dynamic Credentials. + +Once you complete this setup, HCP Terraform automatically authenticates with Azure via Vault-generated credentials during the plan and apply phase of each run. The Azure provider's authentication is only valid for the length of the plan or apply phase. + +## Configure Vault Dynamic Provider Credentials + +You must first set up Vault dynamic provider credentials before you can use Vault-backed dynamic credentials. This includes setting up the JWT auth backend in Vault, configuring trust between HCP Terraform and Vault, and populating the required environment variables in your HCP Terraform workspace. + +[See the setup instructions for Vault dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration). + +# Configure Vault Azure Secrets Engine + +Follow the instructions in the Vault documentation for [setting up the Azure secrets engine in your Vault instance](/vault/docs/secrets/azure). You can also do this configuration through Terraform. Refer to our [example Terraform configuration](https://github.com/hashicorp/terraform-dynamic-credentials-setup-examples/tree/main/vault-backed/azure). + +## Configure HCP Terraform + +Next, you need to set certain environment variables in your HCP Terraform workspace to authenticate HCP Terraform with Azure using Vault-backed dynamic credentials. These variables are in addition to those you previously set while configuring [Vault dynamic provider credentials](#configure-vault-dynamic-provider-credentials). You can add these as workspace variables or as a [variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets). When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Required Environment Variables + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_AZURE_AUTH`
`TFC_VAULT_BACKED_AZURE_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.8.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate with Azure. | +| `TFC_VAULT_BACKED_AZURE_RUN_VAULT_ROLE`
`TFC_VAULT_BACKED_AZURE_RUN_VAULT_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AZURE_RUN_VAULT_ROLE` | The role to use in Vault. | Requires **v1.8.0** or later if self-managing agents. Optional if `TFC_VAULT_BACKED_AZURE_PLAN_VAULT_ROLE` and `TFC_VAULT_BACKED_AZURE_APPLY_VAULT_ROLE` are both provided. These variables are described [below](#optional-environment-variables). | + +### Optional Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_AZURE_MOUNT_PATH`
`TFC_VAULT_BACKED_AZURE_MOUNT_PATH[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AZURE_MOUNT_PATH` | The mount path of the Azure secrets engine in Vault. | Requires **v1.8.0** or later if self-managing agents. Defaults to `azure`. | +| `TFC_VAULT_BACKED_AZURE_PLAN_VAULT_ROLE`
`TFC_VAULT_BACKED_AZURE_PLAN_VAULT_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AZURE_PLAN_VAULT_ROLE` | The Vault role to use the plan phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_AZURE_RUN_VAULT_ROLE` if not provided. | +| `TFC_VAULT_BACKED_AZURE_APPLY_VAULT_ROLE`
`TFC_VAULT_BACKED_AZURE_APPLY_VAULT_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AZURE_APPLY_VAULT_ROLE` | The Vault role to use for the apply phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_AZURE_RUN_VAULT_ROLE` if not provided. | +| `TFC_VAULT_BACKED_AZURE_SLEEP_SECONDS`
`TFC_VAULT_BACKED_AZURE_SLEEP_SECONDS[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AZURE_SLEEP_SECONDS` | The amount of time to wait, in seconds, after obtaining temporary credentials from Vault. e.g., `30` for 30 seconds. Must be 1500 seconds (25 minutes) or less. | Requires **v1.12.0** or later if self-managing agents. Can be used to mitigate eventual consistency issues in Azure. | +| `TFC_VAULT_BACKED_AZURE_VAULT_CONFIG`
`TFC_VAULT_BACKED_AZURE_VAULT_CONFIG[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_AZURE_VAULT_CONFIG` | The name of the non-default Vault configuration for workspaces using [multiple Vault configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). | Requires **v1.12.0** or later if self-managing agents. Will fall back to using the default Vault configuration if not provided. | + +## Configure Terraform Providers + +The final step is to directly configure your Azure and Vault providers. + +### Configure the AzureRM or Microsoft Entra ID + +Ensure you pass a value for the `subscription_id` and `tenant_id` arguments in your provider configuration block or set the `ARM_SUBSCRIPTION_ID` and `ARM_TENANT_ID` variables in your workspace. + +Do not set values for `client_id`, `use_oidc`, or `oidc_token` in your provider configuration block. Additionally, do not set variable values for `ARM_CLIENT_ID`, `ARM_USE_OIDC`, or `ARM_OIDC_TOKEN`. + +### Configure the Vault Provider + +If you were previously using the Vault provider to authenticate the Azure provider, remove any existing usage of the Azure secrets engine from your Terraform Code. +This includes the [`vault_azure_access_credentials`](https://registry.terraform.io/providers/hashicorp/vault/latest/docs/data-sources/azure_access_credentials) data source and any instances of [`vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/latest/docs/data-sources/generic_secret) you previously used to generate Azure credentials. + +### Specifying Multiple Configurations + +~> **Important:** Ensure you are using version **3.60.0** or later of the **AzureRM provider** and version **2.43.0** or later of the **Microsoft Entra ID provider** (previously Azure Active Directory) as required functionality was introduced in these provider versions. + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct Vault-backed Azure setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_vault_backed_azure_dynamic_credentials" { + description = "Object containing Vault-backed Azure dynamic credentials configuration" + type = object({ + default = object({ + client_id_file_path = string + client_secret_file_path = string + }) + aliases = map(object({ + client_id_file_path = string + client_secret_file_path = string + })) + }) +} +``` + +#### Example Usage + +##### AzureRM Provider + +```hcl +provider "azurerm" { + features {} + // use_cli should be set to false to yield more accurate error messages on auth failure. + use_cli = false + client_id_file_path = var.tfc_vault_backed_azure_dynamic_credentials.default.client_id_file_path + client_secret_file_path = var.tfc_vault_backed_azure_dynamic_credentials.default.client_secret_file_path + subscription_id = "00000000-0000-0000-0000-000000000000" + tenant_id = "10000000-0000-0000-0000-000000000000" +} + +provider "azurerm" { + features {} + // use_cli should be set to false to yield more accurate error messages on auth failure. + use_cli = false + alias = "ALIAS1" + client_id_file_path = var.tfc_vault_backed_azure_dynamic_credentials.aliases["ALIAS1"].client_id_file_path + client_secret_file_path = var.tfc_vault_backed_azure_dynamic_credentials.aliases["ALIAS1"].client_secret_file_path + subscription_id = "00000000-0000-0000-0000-000000000000" + tenant_id = "20000000-0000-0000-0000-000000000000" +} +``` + +##### Microsoft Entra ID Provider (previously AzureAD) + +```hcl +provider "azuread" { + features {} + // use_cli should be set to false to yield more accurate error messages on auth failure. + use_cli = false + client_id_file_path = var.tfc_vault_backed_azure_dynamic_credentials.default.client_id_file_path + client_secret_file_path = var.tfc_vault_backed_azure_dynamic_credentials.default.client_secret_file_path + subscription_id = "00000000-0000-0000-0000-000000000000" + tenant_id = "10000000-0000-0000-0000-000000000000" +} + +provider "azuread" { + features {} + // use_cli should be set to false to yield more accurate error messages on auth failure. + use_cli = false + alias = "ALIAS1" + client_id_file_path = var.tfc_vault_backed_azure_dynamic_credentials.aliases["ALIAS1"].client_id_file_path + client_secret_file_path = var.tfc_vault_backed_azure_dynamic_credentials.aliases["ALIAS1"].client_secret_file_path + subscription_id = "00000000-0000-0000-0000-000000000000" + tenant_id = "20000000-0000-0000-0000-000000000000" +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/gcp-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/gcp-configuration.mdx new file mode 100644 index 000000000..752c2887d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/gcp-configuration.mdx @@ -0,0 +1,167 @@ +--- +page_title: >- + Use Vault-backed dynamic credentials with the GCP provider in Terraform + Enterprise +description: >- + Use OpenID Connect and Vault to get short-term credentials for the GCP + Terraform provider in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Use Vault-backed dynamic credentials with the GCP provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.8.0](/terraform/cloud-docs/agents/changelog#1-8-0-04-18-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with Vault to use [Vault-backed dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed) with the GCP provider in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure Vault Dynamic Provider Credentials](#configure-vault-dynamic-provider-credentials)**: Set up a trust configuration between Vault and HCP Terraform, create Vault roles and policies for your HCP Terraform workspaces, and add environment variables to those workspaces. +2. **[Configure the Vault GCP Secrets Engine](#configure-vault-gcp-secrets-engine)**: Set up the GCP secrets engine in your Vault instance. +3. **[Configure HCP Terraform](#configure-hcp-terraform)**: Add additional environment variables to the HCP Terraform workspaces where you want to use Vault-Backed Dynamic Credentials. +4. **[Configure Terraform Providers](#configure-terraform-providers)**: Configure your Terraform providers to work with Vault-backed dynamic credentials. + +Once you complete this setup, HCP Terraform automatically authenticates with GCP via Vault-generated credentials during the plan and apply phase of each run. The GCP provider's authentication is only valid for the length of the plan or apply phase. + +## Configure Vault Dynamic Provider Credentials + +You must first set up Vault dynamic provider credentials before you can use Vault-backed dynamic credentials. This includes setting up the JWT auth backend in Vault, configuring trust between HCP Terraform and Vault, and populating the required environment variables in your HCP Terraform workspace. + +[See the setup instructions for Vault dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration). + +# Configure Vault GCP Secrets Engine + +Follow the instructions in the Vault documentation for [setting up the GCP secrets engine in your Vault instance](/vault/docs/secrets/gcp). You can also do this configuration through Terraform. Refer to our [example Terraform configuration](https://github.com/hashicorp/terraform-dynamic-credentials-setup-examples/tree/main/vault-backed/gcp). + +~> **Important**: carefully consider the limitations and differences between each supported credential type in the GCP secrets engine. These limitations carry over to HCP Terraform’s usage of these credentials for authenticating the GCP provider. + +## Configure HCP Terraform + +Next, you need to set certain environment variables in your HCP Terraform workspace to authenticate HCP Terraform with GCP using Vault-backed dynamic credentials. These variables are in addition to those you previously set while configuring [Vault dynamic provider credentials](#configure-vault-dynamic-provider-credentials). You can add these as workspace variables or as a [variable set](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets). When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Common Environment Variables + +The below variables apply to all GCP auth types. + +#### Required Common Environment Variables + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_GCP_AUTH`
`TFC_VAULT_BACKED_GCP_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.8.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate with GCP. | +| `TFC_VAULT_BACKED_GCP_AUTH_TYPE`
`TFC_VAULT_BACKED_GCP_AUTH_TYPE[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_AUTH_TYPE` | Specifies the type of authentication to perform with GCP. Must be one of the following: `roleset/access_token`, `roleset/service_account_key`, `static_account/access_token`, or `static_account/service_account_key`. | Requires **v1.8.0** or later if self-managing agents. | + +#### Optional Common Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_GCP_MOUNT_PATH`
`TFC_VAULT_BACKED_GCP_MOUNT_PATH[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_MOUNT_PATH` | The mount path of the GCP secrets engine in Vault. | Requires **v1.8.0** or later if self-managing agents. Defaults to `gcp`. | +| `TFC_VAULT_BACKED_GCP_VAULT_CONFIG`
`TFC_VAULT_BACKED_GCP_VAULT_CONFIG[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_VAULT_CONFIG` | The name of the non-default Vault configuration for workspaces using [multiple Vault configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). | Requires **v1.12.0** or later if self-managing agents. Will fall back to using the default Vault configuration if not provided. | + +### Roleset Specific Environment Variables + +These environment variables are only valid if the `TFC_VAULT_BACKED_GCP_AUTH_TYPE` is `roleset/access_token` or `roleset/service_account_key`. + +#### Required Roleset Specific Environment Variables + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_GCP_RUN_VAULT_ROLESET`
`TFC_VAULT_BACKED_GCP_RUN_VAULT_ROLESET[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_RUN_VAULT_ROLESET` | The roleset to use in Vault. | Requires **v1.8.0** or later if self-managing agents. Optional if `TFC_VAULT_BACKED_GCP_PLAN_VAULT_ROLESET` and `TFC_VAULT_BACKED_GCP_APPLY_VAULT_ROLESET` are both provided. These variables are described [below](#optional-roleset-specific-environment-variables). | + +#### Optional Roleset Specific Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_GCP_PLAN_VAULT_ROLESET`
`TFC_VAULT_BACKED_GCP_PLAN_VAULT_ROLESET[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_PLAN_VAULT_ROLESET` | The roleset to use for the plan phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_GCP_RUN_VAULT_ROLESET` if not provided. | +| `TFC_VAULT_BACKED_GCP_APPLY_VAULT_ROLESET`
`TFC_VAULT_BACKED_GCP_APPLY_VAULT_ROLESET[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_APPLY_VAULT_ROLESET` | The roleset to use for the apply phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_GCP_RUN_VAULT_ROLESET` if not provided. | + +### Static Account Specific Environment Variables + +These environment variables are only valid if the `TFC_VAULT_BACKED_GCP_AUTH_TYPE` is `static_account/access_token` or `static_account/service_account_key`. + +#### Required Static Account Specific Environment Variables + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_GCP_RUN_VAULT_STATIC_ACCOUNT`
`TFC_VAULT_BACKED_GCP_RUN_VAULT_STATIC_ACCOUNT[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_RUN_VAULT_STATIC_ACCOUNT` | The static account to use in Vault. | Requires **v1.8.0** or later if self-managing agents. Optional if `TFC_VAULT_BACKED_GCP_PLAN_VAULT_STATIC_ACCOUNT` and `TFC_VAULT_BACKED_GCP_APPLY_VAULT_STATIC_ACCOUNT` are both provided. These variables are described [below](#optional-static-account-specific-environment-variables). | + +#### Optional Static Account Specific Environment Variables + +You may need to set these variables, depending on your use case. + +| Variable | Value | Notes | +| ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_BACKED_GCP_PLAN_VAULT_STATIC_ACCOUNT`
`TFC_VAULT_BACKED_GCP_PLAN_VAULT_STATIC_ACCOUNT[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_PLAN_VAULT_STATIC_ACCOUNT` | The static account to use for the plan phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_GCP_RUN_VAULT_STATIC_ACCOUNT` if not provided. | +| `TFC_VAULT_BACKED_GCP_APPLY_VAULT_STATIC_ACCOUNT`
`TFC_VAULT_BACKED_GCP_APPLY_VAULT_STATIC_ACCOUNT[_TAG]`
`TFC_DEFAULT_VAULT_BACKED_GCP_APPLY_VAULT_STATIC_ACCOUNT` | The static account to use for the apply phase of a run. | Requires **v1.8.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_BACKED_GCP_RUN_VAULT_STATIC_ACCOUNT` if not provided. | + +## Configure Terraform Providers + +The final step is to directly configure your GCP and Vault providers. + +### Configure the GCP Provider + +Ensure you pass values for the `project` and `region` arguments into the provider configuration block. + +Ensure you are not setting values or environment variables for `GOOGLE_CREDENTIALS` or `GOOGLE_APPLICATION_CREDENTIALS`. Otherwise, these values may interfere with dynamic provider credentials. + +### Configure the Vault Provider + +If you were previously using the Vault provider to authenticate the GCP provider, remove any existing usage of the GCP secrets engine from your Terraform Code. +This includes instances of [`vault_generic_secret`](https://registry.terraform.io/providers/hashicorp/vault/latest/docs/data-sources/generic_secret) that you previously used to generate GCP credentials. + +### Specifying Multiple Configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can add additional variables to handle multiple distinct Vault-backed GCP setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_vault_backed_gcp_dynamic_credentials" { + description = "Object containing Vault-backed GCP dynamic credentials configuration" + type = object({ + default = object({ + credentials = string + access_token = string + }) + aliases = map(object({ + credentials = string + access_token = string + })) + }) +} +``` + +#### Example Usage + +##### Access Token + +```hcl +provider "google" { + access_token = var.tfc_vault_backed_gcp_dynamic_credentials.default.access_token +} + +provider "google" { + alias = "ALIAS1" + access_token = var.tfc_vault_backed_gcp_dynamic_credentials.aliases["ALIAS1"].access_token +} +``` + +##### Credentials + +```hcl +provider "google" { + credentials = var.tfc_vault_backed_gcp_dynamic_credentials.default.credentials +} + +provider "google" { + alias = "ALIAS1" + credentials = var.tfc_vault_backed_gcp_dynamic_credentials.aliases["ALIAS1"].credentials +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/index.mdx new file mode 100644 index 000000000..29d2cd339 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-backed/index.mdx @@ -0,0 +1,52 @@ +--- +page_title: Use Vault-backed dynamic credentials in Terraform Enterprise +description: >- + Vault-backed dynamic credentials leverage Vault to generate temporary + credentials for Terraform Enterprise runs. Learn how Vault-backed dynamic + credentials for AWS, Azure, and GCP can improve your security. +source: terraform-docs-common +--- + +# Use Vault-backed dynamic credentials + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.8.0](/terraform/cloud-docs/agents/changelog#1-8-0-04-18-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +For most use cases, separately configuring [dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) with different cloud providers works well. However, Vault-backed dynamic credentials are for those looking for a way to: + +1. Use Vault's secrets engines as a centralized way to manage and consolidate cloud credentials management. +2. Generate short-lived credentials without exposing their Terraform Enterprise instance's OIDC metadata endpoints to the broader public internet. + +The "Vault-backed" in "Vault-backed dynamic credentials" refers to Vault's [secrets engines](/vault/docs/secrets), which allow you to generate short-lived [dynamic secrets](https://www.vaultproject.io/use-cases/dynamic-secrets) for the AWS, GCP, or Azure providers. If you are using Terraform Enterprise and your Vault instance is configured within the same secure network, you can generate secrets while keeping your environment air-gapped. + +Vault-backed dynamic credentials combine the features of dynamic provider credentials and Vault's secrets engines. This means you can authenticate a Vault instance using workload identity tokens and use secrets engines on that instance to generate dynamic credentials for the AWS, GCP, and Azure providers. + +For a comparison of Vault-backed dynamic credentials and dynamic provider credentials, refer to the article [Why use Vault-backed dynamic credentials to secure HCP Terraform infrastructure?](https://www.hashicorp.com/blog/why-use-vault-backed-dynamic-credentials-to-secure-hcp-terraform-infrastructure) on the HashiCorp blog. + +## Configure Vault-Backed Dynamic Credentials + +Using Vault-backed dynamic credentials in a workspace requires the following steps for each cloud platform: + +1. **Set up Dynamic Provider Credentials with the Vault Provider:** You must first [configure dynamic credentials with the Vault provider](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration). +2. **Configure the desired Secrets Engine**: You must configure the desired secrets engine in your Vault instance (i.e., AWS, GCP, or Azure). +3. **Configure HCP Terraform Workspace**: You must add specific environment variables to your workspace to tell HCP Terraform how to authenticate to other cloud providers during runs. Each cloud platform has its own set of environment variables that are necessary to configure dynamic credentials. + +Setting up Vault-backed dynamic credentials differs slightly for each cloud provider. You can configure Vault-backed dynamic credentials on the following platforms: + +- [Amazon Web Services](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed/aws-configuration) +- [Google Cloud Platform](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed/gcp-configuration) +- [Azure](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed/azure-configuration) + +## Terraform Enterprise Specific Requirements + +### Access to Metadata Endpoints + +In order to verify signed JWTs, Vault must have network access to the following static OIDC metadata endpoints within TFE: + +1. `/.well-known/openid-configuration` - standard OIDC metadata. +2. `/.well-known/jwks` - TFE’s public key(s) that cloud platforms use to verify the authenticity of tokens that claim to come from TFE. + +These endpoints **do not** need to be publicly exposed as long as your Vault instance can access them. + +### External Vault Policy + +If you are using an external Vault instance, you must ensure that your Vault instance has the correct policies setup as detailed in the [External Vault Requirements for Terraform Enterprise](/terraform/enterprise/requirements/data-storage/vault) documentation. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-configuration.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-configuration.mdx new file mode 100644 index 000000000..8ed0483c1 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/vault-configuration.mdx @@ -0,0 +1,225 @@ +--- +page_title: Use dynamic credentials with the Vault provider in Terraform Enterprise +description: >- + Use OpenID Connect to get short-term credentials for the Vault Terraform + provider in your Terraform Enterprise runs. +source: terraform-docs-common +--- + +# Use dynamic credentials with the Vault provider + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.7.0](/terraform/cloud-docs/agents/changelog#1-7-0-03-02-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +You can use HCP Terraform’s native OpenID Connect integration with Vault to get [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) for the Vault provider in your HCP Terraform runs. Configuring the integration requires the following steps: + +1. **[Configure Vault](#configure-vault):** Set up a trust configuration between Vault and HCP Terraform. Then, you must create Vault roles and policies for your HCP Terraform workspaces. +2. **[Configure HCP Terraform](#configure-hcp-terraform):** Add environment variables to the HCP Terraform workspaces where you want to use Dynamic Credentials. + +Once you complete the setup, HCP Terraform automatically authenticates to Vault during each run. The Vault provider authentication is valid for the length of the plan or apply. Vault does not revoke authentication until the run is complete. + +If you are using Vault's [secrets engines](/vault/docs/secrets), you must complete the following set up before continuing to configure [Vault-backed dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed). + +## Configure Vault + +You must enable and configure the JWT backend in Vault. These instructions use the Vault CLI commands, but you can also use Terraform to configure Vault. Refer to our [example Terraform configuration](https://github.com/hashicorp/terraform-dynamic-credentials-setup-examples/tree/main/vault). + +### Enable the JWT Auth Backend + +Run the following command to enable the JWT auth backend in Vault: + +```shell +vault auth enable jwt +``` + +### Configure Trust with HCP Terraform + +You must configure Vault to trust HCP Terraform’s identity tokens and verify them using HCP Terraform’s public key. The following command configures the `jwt` auth backend in Vault to trust HCP Terraform as an OIDC identity provider: + +```shell +vault write auth/jwt/config \ + oidc_discovery_url="https://app.terraform.io" \ + bound_issuer="https://app.terraform.io" +``` + +The `oidc_discovery_url` and `bound_issuer` should both be the root address of HCP Terraform, including the scheme and without a trailing slash. + +#### Terraform Enterprise Specific Requirements + +If you are using a custom or self-signed CA certificate you may need to specify the CA certificate or chain of certificates, in PEM format, via the [`oidc_discovery_ca_pem`](/vault/api-docs/auth/jwt#oidc_discovery_ca_pem) argument as shown in the following example command: + +```shell +vault write auth/jwt/config \ + oidc_discovery_url="https://app.terraform.io" \ + bound_issuer="https://app.terraform.io" \ + oidc_discovery_ca_pem=@my-cert.pem +``` + +In the example above, `my-cert.pem` is a PEM formatted file containing the certificate. + +### Create a Vault Policy + +You must create a Vault policy that controls what paths and secrets your HCP Terraform workspace can access in Vault. +Create a file called tfc-policy.hcl with the following content: + +```hcl +# Allow tokens to query themselves +path "auth/token/lookup-self" { + capabilities = ["read"] +} + +# Allow tokens to renew themselves +path "auth/token/renew-self" { + capabilities = ["update"] +} + +# Allow tokens to revoke themselves +path "auth/token/revoke-self" { + capabilities = ["update"] +} + +# Configure the actual secrets the token should have access to +path "secret/*" { + capabilities = ["read"] +} +``` + +Then create the policy in Vault: + +```shell +vault policy write tfc-policy tfc-policy.hcl +``` + +### Create a JWT Auth Role + +Create a Vault role that HCP Terraform can use when authenticating to Vault. + +Vault offers a lot of flexibility in determining how to map roles and permissions in Vault to workspaces in HCP Terraform. You can have one role for each workspace, one role for a group of workspaces, or one role for all workspaces in an organization. You can also configure different roles for the plan and apply phases of a run. + +-> **Note:** If you set your `user_claim` to be per workspace, then Vault ties the entity it creates to that workspace's name. If you rename the workspace tied to your `user_claim`, Vault will create an additional identity object. To avoid this, update the alias name in Vault to your new workspace name before you update it in HCP Terraform. + +The following example creates a role called `tfc-role`. The role is mapped to a single workspace and HCP Terraform can use it for both plan and apply runs. + +Create a file called `vault-jwt-auth-role.json` with the following content: + +```json +{ + "policies": ["tfc-policy"], + "bound_audiences": ["vault.workload.identity"], + "bound_claims_type": "glob", + "bound_claims": { + "sub": +"organization:my-org-name:project:my-project-name:workspace:my-workspace-name:run_phase:*" + }, + "user_claim": "terraform_full_workspace", + "role_type": "jwt", + "token_ttl": "20m" +} +``` + +Then run the following command to create a role named `tfc-role` with this configuration in Vault: + +```shell +vault write auth/jwt/role/tfc-role @vault-jwt-auth-role.json +``` + +To understand all the available options for matching bound claims, refer to the [Terraform workload identity claim specification](/terraform/enterprise/workspaces/dynamic-provider-credentials) and the [Vault documentation on configuring bound claims](/vault/docs/auth/jwt#bound-claims). To understand all the options available when configuring Vault JWT auth roles, refer to the [Vault API documentation](/vault/api-docs/auth/jwt#create-role). + +!> **Warning:** you should always check, at minimum, the audience and the name of the organization in order to prevent unauthorized access from other HCP Terraform organizations! + +#### Token TTLs + +We recommend setting token_ttl to a relatively short value. HCP Terraform can renew the token periodically until the plan or apply is complete, then revoke it to prevent it from being used further. + +## Configure HCP Terraform + +You’ll need to set some environment variables in your HCP Terraform workspace in order to configure HCP Terraform to authenticate with Vault using dynamic credentials. You can set these as workspace variables, or if you’d like to share one Vault role across multiple workspaces, you can use a variable set. When you configure dynamic provider credentials with multiple provider configurations of the same type, use either a default variable or a tagged alias variable name for each provider configuration. Refer to [Specifying Multiple Configurations](#specifying-multiple-configurations) for more details. + +### Required Environment Variables + +| Variable | Value | Notes | +| ------------------------------------------------------------------------------------------------------ | -------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_PROVIDER_AUTH`
`TFC_VAULT_PROVIDER_AUTH[_TAG]`
_(Default variable not supported)_ | `true` | Requires **v1.7.0** or later if self-managing agents. Must be present and set to `true`, or HCP Terraform will not attempt to authenticate to Vault. | +| `TFC_VAULT_ADDR`
`TFC_VAULT_ADDR[_TAG]`
`TFC_DEFAULT_VAULT_ADDR` | The address of the Vault instance to authenticate against. | Requires **v1.7.0** or later if self-managing agents. Will also be used to set `VAULT_ADDR` in the run environment. | +| `TFC_VAULT_RUN_ROLE`
`TFC_VAULT_RUN_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_RUN_ROLE` | The name of the Vault role to authenticate against (`tfc-role`, in our example). | Requires **v1.7.0** or later if self-managing agents. Optional if `TFC_VAULT_PLAN_ROLE` and `TFC_VAULT_APPLY_ROLE` are both provided. These variables are described [below](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-configuration#optional-environment-variables) | + +### Optional Environment Variables + +You may need to set these variables, depending on your Vault configuration and use case. + +| Variable | Value | Notes | +| -------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `TFC_VAULT_NAMESPACE`
`TFC_VAULT_NAMESPACE[_TAG]`
`TFC_DEFAULT_VAULT_NAMESPACE` | The namespace to use when authenticating to Vault. | Requires **v1.7.0** or later if self-managing agents. Will also be used to set `VAULT_NAMESPACE` in the run environment. | +| `TFC_VAULT_AUTH_PATH`
`TFC_VAULT_AUTH_PATH[_TAG]`
`TFC_DEFAULT_VAULT_AUTH_PATH` | The path where the JWT auth backend is mounted in Vault. Defaults to jwt. | Requires **v1.7.0** or later if self-managing agents. | +| `TFC_VAULT_WORKLOAD_IDENTITY_AUDIENCE`
`TFC_VAULT_WORKLOAD_IDENTITY_AUDIENCE[_TAG]`
`TFC_DEFAULT_VAULT_WORKLOAD_IDENTITY_AUDIENCE` | Will be used as the `aud` claim for the identity token. Defaults to `vault.workload.identity`. | Requires **v1.7.0** or later if self-managing agents. Must match the `bound_audiences` configured for the role in Vault. | +| `TFC_VAULT_PLAN_ROLE`
`TFC_VAULT_PLAN_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_PLAN_ROLE` | The Vault role to use for the plan phase of a run. | Requires **v1.7.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_RUN_ROLE` if not provided. | +| `TFC_VAULT_APPLY_ROLE`
`TFC_VAULT_APPLY_ROLE[_TAG]`
`TFC_DEFAULT_VAULT_APPLY_ROLE` | The Vault role to use for the apply phase of a run. | Requires **v1.7.0** or later if self-managing agents. Will fall back to the value of `TFC_VAULT_RUN_ROLE` if not provided. | +| `TFC_VAULT_ENCODED_CACERT`
`TFC_VAULT_ENCODED_CACERT[_TAG]`
`TFC_DEFAULT_VAULT_ENCODED_CACERT` | A PEM-encoded CA certificate that has been Base64 encoded. | Requires **v1.9.0** or later if self-managing agents. This certificate will be used when connecting to Vault. May be required when connecting to Vault instances that use a custom or self-signed certificate. | + +## Vault Provider Configuration + +Once you set up dynamic credentials for a workspace, HCP Terraform automatically authenticates to Vault for each run. Do not pass the `address`, `token`, or `namespace` arguments into the provider configuration block. HCP Terraform sets these values as environment variables in the run environment. + +You can use the Vault provider to read static secrets from Vault and use them with other Terraform resources. You can also access the other resources and data sources available in the [Vault provider documentation](https://registry.terraform.io/providers/hashicorp/vault/latest). You must adjust your [Vault policy](#create-a-vault-policy) to give your HCP Terraform workspace access to all required Vault paths. + +~> **Important:** data sources that use secrets engines to generate dynamic secrets must not be used with Vault dynamic credentials. You can use Vault's dynamic secrets engines for AWS, GCP, and Azure by adding additional configurations. For more details, see [Vault-backed dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials/vault-backed). + +### Specifying Multiple Configurations + +~> **Important:** If you are self-hosting [HCP Terraform agents](/terraform/cloud-docs/agents), ensure your agents use [v1.12.0](/terraform/cloud-docs/agents/changelog#1-12-0-07-26-2023) or above. To use the latest dynamic credentials features, [upgrade your agents to the latest version](/terraform/cloud-docs/agents/changelog). + +~> **Important:** Ensure you are using version **3.18.0** or later of the **Vault provider** as the required [`auth_login_token_file`](https://registry.terraform.io/providers/hashicorp/vault/latest/docs#token-file) block was introduced in this provider version. + +You can add additional variables to handle multiple distinct Vault setups, enabling you to use multiple [provider aliases](/terraform/language/providers/configuration#alias-multiple-provider-configurations) within the same workspace. You can configure each set of credentials independently, or use default values by configuring the variables prefixed with `TFC_DEFAULT_`. + +For more details, see [Specifying Multiple Configurations](/terraform/enterprise/workspaces/dynamic-provider-credentials/specifying-multiple-configurations). + +#### Required Terraform Variable + +To use additional configurations, add the following code to your Terraform configuration. This lets HCP Terraform supply variable values that you can then use to map authentication and configuration details to the correct provider blocks. + +```hcl +variable "tfc_vault_dynamic_credentials" { + description = "Object containing Vault dynamic credentials configuration" + type = object({ + default = object({ + token_filename = string + address = string + namespace = string + ca_cert_file = string + }) + aliases = map(object({ + token_filename = string + address = string + namespace = string + ca_cert_file = string + })) + }) +} +``` + +#### Example Usage + +```hcl +provider "vault" { + // skip_child_token must be explicitly set to true as HCP Terraform manages the token lifecycle + skip_child_token = true + address = var.tfc_vault_dynamic_credentials.default.address + namespace = var.tfc_vault_dynamic_credentials.default.namespace + + auth_login_token_file { + filename = var.tfc_vault_dynamic_credentials.default.token_filename + } +} + +provider "vault" { + // skip_child_token must be explicitly set to true as HCP Terraform manages the token lifecycle + skip_child_token = true + alias = "ALIAS1" + address = var.tfc_vault_dynamic_credentials.aliases["ALIAS1"].address + namespace = var.tfc_vault_dynamic_credentials.aliases["ALIAS1"].namespace + + auth_login_token_file { + filename = var.tfc_vault_dynamic_credentials.aliases["ALIAS1"].token_filename + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens.mdx new file mode 100644 index 000000000..26851ac64 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/dynamic-provider-credentials/workload-identity-tokens.mdx @@ -0,0 +1,99 @@ +--- +page_title: Workload identity in Terraform Enterprise +description: >- + Learn how workload identity uses OpenID Connect (OIDC) to allow Terraform + plans and applies to safely authenticate to external systems. +source: terraform-docs-common +--- + +# Workload identity + +Dynamic Provider Credentials are powered by Terraform Workload Identity, which allows HCP Terraform to present information about a Terraform workload to an external system – like its workspace, organization, or whether it’s a plan or apply – and allows other external systems to verify that the information is accurate. + +You can think of it like an identity card for your Terraform runs: one that comes with a way for another system to easily verify whether the card is genuine. If the other system can confirm that the ID card is legitimate, it can trust the information the card contains and use it to decide whether to let that Terraform workload in the door. + +The “identity card” in this analogy is a workload identity token: a JSON Web Token (JWT) that contains information about a plan or apply, is signed by HCP Terraform’s private key, and expires at the end of the plan or apply timeout. Other systems can use HCP Terraform’s [public key](https://app.terraform.io/.well-known/jwks) to verify that a token that claims to be from HCP Terraform is genuine and has not been tampered with. + +This workflow is built on the [OpenID Connect protocol](https://openid.net/connect/), a trusted standard for verifying identity across different systems. + +## Token Specification + +Workload identity tokens contain useful metadata in their payloads, known as _claims_. This is the equivalent of the name and date of birth on an identity card. Once a cloud platform verifies a token using HCP Terraform’s public key, it can look at the claims in the identity token to either match it to the correct permissions or reject it. + +You don’t need to understand the full token specification and what every claim means in order to use dynamic credentials, but it’s useful for debugging. + +### Token Structure + +The following example shows a decoded HCP Terraform workload identity token: + +#### Header + +```json +{ + "typ": "JWT", + "alg": "RS256", + "kid": "j-fFp9evPJAzV5I2_58HY5UvdCK6Q4LLB1rnPOUfQAk" +} +``` + +#### Payload + +```json +{ + "jti": "1192426d-b525-4fde-9d42-f238be437bbd", + "iss": "https://app.terraform.io", + "aud": "my-example-audience", + "iat": 1650486122, + "nbf": 1650486117, + "exp": 1650486422, + "sub": "organization:my-org:project:Default Project:workspace:my-workspace:run_phase:apply", + "terraform_organization_id": "org-GRNbCjYNpBB6NEH9", + "terraform_organization_name": "my-org", + "terraform_project_id": "prj-vegSA59s1XPwMr2t", + "terraform_project_name": "Default Project", + "terraform_workspace_id": "ws-mbsd5E3Ktt5Rg2Xm", + "terraform_workspace_name": "my-workspace", + "terraform_full_workspace": "organization:my-org:project:Default Project:workspace:my-workspace", + "terraform_run_id": "run-X3n1AUXNGWbfECsJ", + "terraform_run_phase": "apply" +} +``` + +This payload includes a number of standard claims defined in the OIDC spec as well as a number of custom claims for further customization. + +### Standard Claims + +| Claim | Value | +| ------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| `jti` (JWT ID) | A unique identifier for each JWT. | +| `iss` (issuer) | Full URL of HCP Terraform or the Terraform Enterprise instance which signed the JWT. | +| `iat` (issued at) | Unix Timestamp when the JWT was issued. May be required by certain relying parties. | +| `nbf` (not before) | Unix Timestamp when the JWT can start being used. This will be the same as `iat` for tokens issued by HCP Terraform, but may be required by certain relying parties. | +| `aud` (audience) | Intended audience for the JWT. For example, `aws.workload.identity` for AWS. This can be customized. | +| `exp` (expiration) | Unix Timestamp based on the timeout of the run phase that it was issued for. This will follow the `plan` and `apply` timeouts set at the organization and site admin level. | +| `sub` (subject) | Fully qualified path to a workspace, followed by the run phase. For example: `organization:my-organization-name:project:Default Project:workspace:my-workspace-name:run_phase:apply` | + +### Custom Claims + +| Claim | Value | +| ------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------- | +| `terraform_organization_id` (organization ID) | ID of the HCP Terraform organization performing the run. | +| `terraform_organization_name` (organization name) | Human-readable name of the HCP Terraform organization performing the run. Note that organization names can be changed. | +| `terraform_project_id` (project ID) | ID of the HCP Terraform project performing the run. | +| `terraform_project_name` (project name) | Human-readable name of the HCP Terraform project performing the run. Note that project names can be changed. The default project name is `Default Project`. | +| `terraform_workspace_id` (workspace ID) | ID of the HCP Terraform workspace performing the run. | +| `terraform_workspace_name` (workspace name) | Human-readable name of the HCP Terraform workspace performing the run. Note that workspace names can be changed. | +| `terraform_full_workspace` (fully qualified workspace) | Fully qualified path to a workspace. For example: `organization:my-organization-name:project:my-project-name:workspace:my-workspace-name` | +| `terraform_run_id` (run ID) | ID of the run that the token was generated for. This is intended to aid in traceability and logging. | +| `terraform_run_phase` (run phase) | The phase of the run this token was issued for. For example, `plan` or `apply` | + +### Configuring Trust with your Cloud Platform + +When configuring the trust relationship between HCP Terraform and your cloud platform, you’ll set up conditions to validate the contents of the identity token provided by HCP Terraform against your roles and policies. + +At the minimum, you should match against the following claims: + +- `aud` - the audience value of the token. This ensures that, for example, a workload identity token intended for AWS can’t be used to authenticate to Vault. +- `sub` - the subject value, which includes the organization and workspace performing the run. If you don’t match against at least the organization name, any organization or workspace on HCP Terraform will be able to access your cloud resources! + +You can match on as many claims as you want, depending on your cloud platform. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/health.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/health.mdx new file mode 100644 index 000000000..21c209b81 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/health.mdx @@ -0,0 +1,245 @@ +--- +page_title: Health assessments in Terraform Enterprise +description: >- + Learn how Terraform Enterprise can continuously monitor workspaces to assess + whether their real infrastructure matches the requirements defined in your + Terraform configuration. +source: terraform-docs-common +--- + +# Health + +HCP Terraform can perform automatic health assessments in a workspace to assess whether its real infrastructure matches the requirements defined in its Terraform configuration. Health assessments include the following types of evaluations: + +- [Drift detection](#drift-detection) determines whether your real-world infrastructure matches your Terraform configuration. +- [Continuous validation](#continuous-validation) determines whether custom conditions in the workspace’s configuration continue to pass after Terraform provisions the infrastructure. + +When you enable health assessments, HCP Terraform periodically runs health assessments for your workspace. Refer to [Health Assessment Scheduling](#health-assessment-scheduling) for details. + + + +@include 'tfc-package-callouts/health-assessments.mdx' + + + +## Permissions + +Working with health assessments requires the following permissions: + +- To view health status for a workspace, you need read access to that workspace. +- To change organization health settings, you must be an [organization owner](/terraform/enterprise/users-teams-organizations/permissions#organization-owners). +- To change a workspace’s health settings, you must be an [administrator for that workspace](/terraform/enterprise/users-teams-organizations/permissions#workspace-admins). + +- To trigger [on-demand health assessments](/terraform/enterprise/workspaces/health#on-demand-assessments) for a workspace, you must be an [administrator for that workspace](/terraform/enterprise/users-teams-organizations/permissions#workspace-admins). + + +## Workspace requirements + +Workspaces require the following settings to receive health assessments: + +- Terraform version 0.15.4+ for drift detection only +- Terraform version 1.3.0+ for drift detection and continuous validation +- [Remote execution mode](/terraform/enterprise/workspaces/settings#execution-mode) or [Agent execution mode](/terraform/cloud-docs/agents/agent-pools#configure-workspaces-to-use-the-agent) for Terraform runs + +The latest Terraform run in the workspace must have been successful. If the most recent run ended in an errored, canceled, or discarded state, HCP Terraform pauses health assessments until there is a successfully applied run. + +The workspace must also have at least one run in which Terraform successfully applies a configuration. HCP Terraform does not perform health assessments in workspaces with no real-world infrastructure. + +## Enable health assessments + +You can enforce health assessments across all eligible workspaces in an organization within the [organization settings](/terraform/enterprise/users-teams-organizations/organizations#health). Enforcing health assessments at an organization-level overrides workspace-level settings. You can only enable health assessments within a specific workspace when HCP Terraform is not enforcing health assessments at the organization level. + +To enable health assessments within a workspace: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace you want to enable health assessments on. +2. Verify that your workspace satisfies the [requirements](#workspace-requirements). +3. Go to the workspace and click **Settings**, then click **Health**. +4. Select **Enable** under **Health Assessments**. +5. Click **Save settings**. + +## Health assessment scheduling + +When you enable health assessments for a workspace, HCP Terraform runs the first health assessment based on whether there are active Terraform runs for the workspace: + +- **No active runs:** A few minutes after you enable the feature. +- **Active speculative plan:** A few minutes after that plan is complete. +- **Other active runs:** During the next assessment period. + +After the first health assessment, HCP Terraform starts a new health assessment during the next assessment period if there are no active runs in the workspace. Health assessments may take longer to complete when you enable health assessments in many workspaces at once or your workspace contains a complex configuration with many resources. + +A health assessment never interrupts or interferes with runs. If you start a new run during a health assessment, HCP Terraform cancels the current assessment and runs the next assessment during the next assessment period. This behavior may prevent HCP Terraform from performing health assessments in workspaces with frequent runs. + +HCP Terraform pauses health assessments if the latest run ended in an errored state. This behavior occurs for all run types, including plan-only runs and speculative plans. Once the workspace completes a successful run, HCP Terraform restarts health assessments during the next assessment period. + +Terraform Enterprise administrators can modify their installation's [assessment frequency and number of maximum concurrent assessments](/terraform/enterprise/admin/application/general#health-assessments) from the admin settings console. + + + +### On-demand assessments + +-> **Note:** On-demand assessments are only available in the HCP Terraform user interface. + +If you are an administrator for a workspace and it satisfies all [assessment requirements](/terraform/enterprise/workspaces/health#workspace-requirements), you can trigger a new assessment by clicking **Start health assessment** on the workspace's **Health** page. + +After clicking **Start health assessment**, the workspace displays a message in the bottom lefthand corner of the page to indicate if it successfully triggered a new assessment. The time it takes to complete an assessment can vary based on network latency and the number of resources managed by the workspace. + +You cannot trigger another assessment while one is in progress. An on-demand assessment resets the scheduling for automated assessments, so HCP Terraform waits to run the next assessment until the next scheduled period. + + + +### Concurrency + +If you enable health assessments on multiple workspaces, assessments may run concurrently. Health assessments do not affect your concurrency limit. HCP Terraform also monitors and controls health assessment concurrency to avoid issues for large-scale deployments with thousands of workspaces. However, HCP Terraform performs health assessments in batches, so health assessments may take longer to complete when you enable them in a large number of workspaces. + +### Notifications + +HCP Terraform sends [notifications](/terraform/enterprise/workspaces/settings/notifications) about health assessment results according to your workspace’s settings. + +## Workspace health status + +On the organization's **Workspaces** page, HCP Terraform displays a **Health warning** status for workspaces with infrastructure drift or failed continuous validation checks. + +On the right of a workspace’s overview page, HCP Terraform displays a **Health** bar that summarizes the results of the last health assessment. + +- The **Drift** summary shows the total number of resources in the configuration and the number of resources that have drifted. +- The **Checks** summary shows the number of passed, failed, and unknown statuses for objects with continuous validation checks. + + + +### View workspace health in explorer + +The [Explorer page](/terraform/enterprise/workspaces/explorer) presents a condensed overview of the health status of the workspaces within your organization. You can see the following information: + +- Workspaces that are monitoring workspace health +- Status of any configured continuous validation checks +- Count of drifted resources for each workspace + +For additional details on the data available for reporting, refer to the [Explorer](/terraform/enterprise/workspaces/explorer) documentation. + +![Viewing Workspace Health in Explorer](/img/docs/tfc-explorer-health.png) + + + +## Drift detection + +Drift detection helps you identify situations where your actual infrastructure no longer matches the configuration defined in Terraform. This deviation is known as _configuration drift_. Configuration drift occurs when changes are made outside Terraform's regular process, leading to inconsistencies between the remote objects and your configured infrastructure. + +For example, a teammate could create configuration drift by directly updating a storage bucket's settings with conflicting configuration settings using the cloud provider's console. Drift detection could detect these differences and recommend steps to address and rectify the discrepancies. + +Configuration drift differs from state drift. Drift detection does not detect state drift. + +Configuration drift happens when external changes affecting remote objects invalidate your infrastructure configuration. State drift occurs when external changes affecting remote objects _do not_ invalidate your infrastructure configuration. Refer to [Refresh-Only Mode](/terraform/enterprise/run/modes-and-options#refresh-only-mode) to learn more about remediating state drift. + +### View workspace drift + +To view the drift detection results from the latest health assessment, go to the workspace and click **Health > Drift**. If there is configuration drift, HCP Terraform proposes the necessary changes to bring the infrastructure back in sync with its configuration. + +### Resolve drift + +You can use one of the following approaches to correct configuration drift: + +- **Overwrite drift**: If you do not want the drift's changes, queue a new plan and apply the changes to revert your real-world infrastructure to match your Terraform configuration. +- **Update Terraform configuration:** If you want the drift's changes, modify your Terraform configuration to include the changes and push a new configuration version. This prevents Terraform from reverting the drift during the next apply. Refer to the [Manage Resource Drift](/terraform/tutorials/state/resource-drift) tutorial for a detailed example. + +## Continuous validation + +Continuous validation regularly verifies whether your configuration’s custom assertions continue to pass, validating your infrastructure. For example, you can monitor whether your website returns an expected status code, or whether an API gateway certificate is valid. Identifying failed assertions helps you resolve the failure and prevent errors during your next time Terraform operation. + +Continuous validation evaluates preconditions, postconditions, and check blocks as part of an assessment, but we recommend using [check blocks](/terraform/language/checks) for post-apply monitoring. Use check blocks to create custom rules to validate your infrastructure's resources, data sources, and outputs. + +### Preventing false positives + +Health assessments create a speculative plan to access the current state of your infrastructure. Terraform evaluates any check blocks in your configuration as the last step of creating the speculative plan. If your configuration relies on data sources and the values queried by a data source change between the time of your last run and the assessment, the speculative plan will include those changes. HCP Terraform will not modify your infrastructure as part of an assessment, but it can use those updated values to evaluate checks. This may lead to false positive results for alerts since your infrastructure did not yet change. + +To ensure your checks evaluate the current state of your configuration instead of against a possible future change, use nested data sources that query your actual resource configuration, rather than a computed latest value. Refer to the [AMI image scenario](#asserting-up-to-date-amis-for-compute-instances) below for an example. + +### Example use cases + +Review the provider documentation for `check` block examples with [AWS](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/guides/continuous-validation-examples), [Azure](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/guides/tfc-check-blocks), and [GCP](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/google-continuous-validation). + +#### Monitoring the health of a provisioned website + +The following example uses the [HTTP](https://registry.terraform.io/providers/hashicorp/http/latest/docs) Terraform provider and a [scoped data source](/terraform/language/checks#scoped-data-sources) within a [`check` block](/terraform/language/checks) to assert the Terraform website returns a `200` status code, indicating it is healthy. + +```hcl +check "health_check" { + data "http" "terraform_io" { + url = "https://www.terraform.io" + } + + assert { + condition = data.http.terraform_io.status_code == 200 + error_message = "${data.http.terraform_io.url} returned an unhealthy status code" + } +} +``` + +Continuous Validation alerts you if the website returns any status code besides `200` while Terraform evaluates this assertion. You can also find failures in your workspace's [Continuous Validation Results](#view-continuous-validation-results) page. You can configure continuous validation alerts in your workspace's [notification settings](/terraform/enterprise/workspaces/settings/notifications). + +#### Monitoring certificate expiration + +[Vault](https://www.vaultproject.io/) lets you secure, store, and tightly control access to tokens, passwords, certificates, encryption keys, and other sensitive data. The following example uses a `check` block to monitor for the expiration of a Vault certificate. + +```hcl +resource "vault_pki_secret_backend_cert" "app" { + backend = vault_mount.intermediate.path + name = vault_pki_secret_backend_role.test.name + common_name = "app.my.domain" +} + +check "certificate_valid" { + assert { + condition = !vault_pki_secret_backend_cert.app.renew_pending + error_message = "Vault cert is ready to renew." + } +} +``` + +#### Asserting up-to-date AMIs for compute instances + +[HCP Packer](/hcp/docs/packer) stores metadata about your [Packer](https://www.packer.io/) images. The following example check fails when there is a newer AMI version available. + +```hcl +data "hcp_packer_artifact" "hashiapp_image" { + bucket_name = "hashiapp" + channel_name = "latest" + platform = "aws" + region = "us-west-2" +} + +resource "aws_instance" "hashiapp" { + ami = data.hcp_packer_artifact.hashiapp_image.external_identifier + instance_type = var.instance_type + associate_public_ip_address = true + subnet_id = aws_subnet.hashiapp.id + vpc_security_group_ids = [aws_security_group.hashiapp.id] + key_name = aws_key_pair.generated_key.key_name + + tags = { + Name = "hashiapp" + } +} + +check "ami_version_check" { + data "aws_instance" "hashiapp_current" { + instance_tags = { + Name = "hashiapp" + } + } + + assert { + condition = aws_instance.hashiapp.ami == data.hcp_packer_artifact.hashiapp_image.external_identifier + error_message = "Must use the latest available AMI, ${data.hcp_packer_artifact.hashiapp_image.external_identifier}." + } +} +``` + +### View continuous validation results + +To view the continuous validation results from the latest health assessment, go to the workspace and click **Health > Continuous validation**. + +The page shows all of the resources, outputs, and data sources with custom assertions that HCP Terraform evaluated. Next to each object, HCP Terraform reports whether the assertion passed or failed. If one or more assertions fail, HCP Terraform displays the error messages for each assertion. + +The health assessment page displays each assertion by its [named value](/terraform/language/expressions/references). A `check` block's named value combines the prefix `check` with its configuration name. + +If your configuration contains multiple [preconditions and postconditions](/terraform/language/expressions/custom-conditions#preconditions-and-postconditions) within a single resource, output, or data source, HCP Terraform will not show the results of individual conditions unless they fail. If all custom conditions on the object pass, HCP Terraform reports that the entire check passed. The assessment results will display the results of any precondition and postconditions alongside the results of any assertions from `check` blocks, identified by the named values of their parent block. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/index.mdx new file mode 100644 index 000000000..61267c1f5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/index.mdx @@ -0,0 +1,100 @@ +--- +page_title: Terraform Enterprise workspaces +description: >- + A workspace is a group of infrastructure resources managed by Terraform + Enterprise. Learn what workspaces contain, how they perform Terraform runs, + and how to create and organize them. +source: terraform-docs-common +--- + +# Workspaces + +This topic provides an overview of the workspaces resource in HCP Terraform and Terraform Enterprise. A workspace is a group of infrastructure resources managed by Terraform. + +## Introduction + +Working with Terraform involves managing collections of infrastructure resources, and most organizations manage many different collections. + +When run locally, Terraform manages each collection of infrastructure with a persistent working directory, which contains a configuration, state data, and variables. Since Terraform CLI uses content from the directory it runs in, you can organize infrastructure resources into meaningful groups by keeping their configurations in separate directories. + +HCP Terraform manages infrastructure collections with workspaces instead of directories. A workspace contains everything Terraform needs to manage a given collection of infrastructure, and separate workspaces function like completely separate working directories. + +> **Hands-on:** Try the [Create a Workspace](/terraform/tutorials/cloud-get-started/cloud-workspace-create) tutorial. + +## Workspace Contents + +HCP Terraform workspaces and local working directories serve the same purpose, but they store their data differently: + +| Component | Local Terraform | HCP Terraform | +| ----------------------- | ------------------------------------------------------------- | -------------------------------------------------------------------------- | +| Terraform configuration | On disk | In linked version control repository, or periodically uploaded via API/CLI | +| Variable values | As `.tfvars` files, as CLI arguments, or in shell environment | In workspace | +| State | On disk or in remote backend | In workspace | +| Credentials and secrets | In shell environment or entered at prompts | In workspace, stored as sensitive variables | + +In addition to the basic Terraform content, HCP Terraform keeps some additional data for each workspace: + +- **State versions:** Each workspace retains backups of its previous state files. Although only the current state is necessary for managing resources, the state history can be useful for tracking changes over time or recovering from problems. Refer to [Terraform State in HCP Terraform](/terraform/enterprise/workspaces/state) for more details. + +- **Run history:** When HCP Terraform manages a workspace's Terraform runs, it retains a record of all run activity, including summaries, logs, a reference to the changes that caused the run, and user comments. Refer to [Viewing and Managing Runs](/terraform/enterprise/run/manage) for more details. + + + +The top of each workspace shows a resource count, which reflects the number of resources recorded in the workspace’s state file. This includes both managed [resources](/terraform/language/resources/syntax) and [data sources](/terraform/language/data-sources). + + + +## Terraform Runs + +For workspaces with remote operations enabled (the default), HCP Terraform performs Terraform runs on its own disposable virtual machines, using that workspace's configuration, variables, and state. + +Refer to [Terraform Runs and Remote Operations](/terraform/enterprise/run/remote-operations) for more details. + +## HCP Terraform vs. Terraform CLI Workspaces + +Both HCP Terraform and Terraform CLI have features called workspaces, but they function differently. + +- HCP Terraform workspaces are required. They represent all of the collections of infrastructure in an organization. They are also a major component of role-based access in HCP Terraform. You can grant individual users and user groups permissions for one or more workspaces that dictate whether they can manage variables, perform runs, etc. You cannot manage resources in HCP Terraform without creating at least one workspace. + +- Terraform CLI workspaces are associated with a specific working directory and isolate multiple state files in the same working directory, letting you manage multiple groups of resources with a single configuration. The Terraform CLI does not require you to create CLI workspaces. Refer to [Workspaces](/terraform/language/state/workspaces) in the Terraform Language documentation for more details. + +## Planning and Organizing Workspaces + +We recommend that organizations break down large monolithic Terraform configurations into smaller ones, then assign each one to its own workspace and delegate permissions and responsibilities for them. HCP Terraform can manage monolithic configurations just fine, but managing infrastructure as smaller components is the best way to take full advantage of HCP Terraform's governance and delegation features. + +For example, the code that manages your production environment's infrastructure could be split into a networking configuration, the main application's configuration, and a monitoring configuration. After splitting the code, you would create "networking-prod", "app1-prod", "monitoring-prod" workspaces, and assign separate teams to manage them. + +Much like splitting monolithic applications into smaller microservices, this enables teams to make changes in parallel. In addition, it makes it easier to re-use configurations to manage other environments of infrastructure ("app1-dev," etc.). + +In Terraform Enterprise, administrators can use [Admin Settings](/terraform/enterprise/api-docs/admin/settings) to set the maximum number of workspaces for any single organization. You can also set a workspaces limit with the [tfe-terraform-provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/organization#workspace_limit). + +## Organize Workspaces with Projects + +Projects let you organize your workspaces into groups. + + + +-> **Note:** On HCP Terraform **Standard** Edition, you can assign project permissions to scope access to collections of workspaces based on business units and responsibilities. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. + + + +Refer to [Organize Workspaces with Projects](/terraform/enterprise/projects/manage) for more details. + +## Creating Workspaces + +You can create workspaces through the [HCP Terraform UI](/terraform/enterprise/workspaces/create), the [Workspaces API](/terraform/enterprise/api-docs/workspaces), or the [HCP Terraform CLI integration](/terraform/cli/cloud). + +## Workspace Health + + + +@include 'tfc-package-callouts/health-assessments.mdx' + + + +HCP Terraform can perform automatic health assessments in a workspace to assess whether its real infrastructure matches the requirements defined in its Terraform configuration. Health assessments include the following types of evaluations: + +- Drift detection determines whether your real-world infrastructure matches your Terraform configuration. +- Continuous validation determines whether custom conditions in the workspace’s configuration continue to pass after Terraform provisions the infrastructure. + +You can enforce health assessments for all eligible workspaces or let each workspace opt in to health assessments through workspace settings. Refer to [Health](/terraform/enterprise/workspaces/health) in the workspaces documentation for more details. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/json-filtering.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/json-filtering.mdx new file mode 100644 index 000000000..c70eb74e3 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/json-filtering.mdx @@ -0,0 +1,117 @@ +--- +page_title: JSON data filtering in Terraform Enterprise +description: >- + Learn how to filter and create custom datasets on pages that display JSON data + in Terraform Enterprise. +source: terraform-docs-common +--- + +# JSON data filtering + +Certain pages where JSON data is displayed, such as the [state +viewer](/terraform/enterprise/workspaces/state) and [policy check JSON data +viewer](/terraform/enterprise/policy-enforcement/sentinel/json), allow you to filter the results. This +enables you to see just the data you need, and even create entirely new datasets +to see data in the way you want to see it! + +![entering a json filter](/img/docs/json-viewer-intro.png) + +-> **NOTE:** _Filtering_ the data in the JSON viewer is separate from +_searching_ it. To search, press Control-F (or Command-F on MacOS). You can +search and apply a filter at the same time. + +## Entering a Filter + +Filters are entered by putting the filter in the aptly named **filter** box in +the JSON viewer. After entering the filter, pressing **Apply** or the enter key +on your keyboard will apply the filter. The filtered results, if any, are +displayed in result box. Clearing the filter will restore the original JSON +data. + +![entering a json filter](/img/docs/sentinel-json-enter-filter.png) + +## Filter Language + +The JSON filter language is a small subset of the +[jq](https://stedolan.github.io/jq/) JSON filtering language. Selectors, +literals, indexes, slices, iterators, and pipes are supported, as are also array +and object construction. At this time, parentheses, and more complex operations +such as mathematical operators, conditionals, and functions are not supported. + +Below is a quick reference of some of the more basic functions to get you +started. + +### Selectors + +Selectors allow you to pick an index out of a JSON object, and are written as +`.KEY.SUBKEY`. So, as an example, given an object of +`{"foo": {"bar": "baz"}}`, and the filter `.foo.bar`, the result would be +displayed as `"baz"`. + +A single dot (`.`) without anything else always denotes the current value, +unaltered. + +### Indexes + +Indexes can be used to fetch array elements, or select non-alphanumeric object +fields. They are written as `[0]` or `["foo-bar"]`, depending on the purpose. + +Given an object of `{"foo-bar": ["baz", "qux"]}` and the filter of +`.["foo-bar"][0]`, the result would be displayed as `"baz"`. + +### Slices + +Arrays can be sliced to get a subset an array. The syntax is `[LOW:HIGH]`. + +Given an array of `[0, 1, 2, 3, 4]` and the filter of +`.[1:3]`, the result would be displayed as `[1, 2]`. This also illustrates that +the result of the slice operation is always of length HIGH-LOW. + +Slices can also be applied to strings, in which a substring is returned with the +same rules applied, with the first character of the string being index 0. + +### Iterators + +Iterators can iterate over arrays and objects. The syntax is `[]`. + +Iterators iterate over the _values_ of an object only. So given a object of +`{"foo": 1, "bar": 2}`, the filter `.[]` would yield an iteration of `1, 2`. + +Note that iteration results are not necessarily always arrays. Iterators are +handled in a special fashion when dealing with pipes and object creators (see +below). + +### Array Construction + +Wrapping an expression in brackets (`[ ... ]`) creates an array with the +sub-expressions inside the array. The results are always concatenated. + +For example, for an object of `{"foo": [1, 2], "bar": [3, 4]}`, the construction +expressions `[.foo[], .bar[]]` and `[.[][]]`, are the same, producing the +resulting array `[1, 2, 3, 4]`. + +### Object Construction + +Wrapping an expression in curly braces `{KEY: EXPRESSION, ...}` creates an +object. + +Iterators work uniquely with object construction in that an object is +constructed for each _iteration_ that the iterator produces. + +As a basic example, Consider an array `[1, 2, 3]`. While the expression +`{foo: .}` will produce `{"foo": [1, 2, 3]}`, adding an iterator to the +expression so that it reads `{foo: .[]}` will produce 3 individual objects: +`{"foo": 1}`, `{"foo": 2}`, and `{"foo": 3}`. + +### Pipes + +Pipes allow the results of one expression to be fed into another. This can be +used to re-write expressions to help reduce complexity. + +Iterators work with pipes in a fashion similar to object construction, where the +expression on the right-hand side of the pipe is evaluated once for every +iteration. + +As an example, for the object `{"foo": {"a": 1}, "bar": {"a": 2}}`, both the +expression `{z: .[].a}` and `.[] | {z: .a}` produce the same result: `{"z": 1}` +and `{"z": 2}`. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/access.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/access.mdx new file mode 100644 index 000000000..8fd6acdce --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/access.mdx @@ -0,0 +1,54 @@ +--- +page_title: Manage access to workspaces in Terraform Enterprise +description: >- + Learn how to manage access to workspaces by adding teams and configuring their + permissions. +source: terraform-docs-common +--- + +# Manage access to workspaces + + + +-> **Note:** Team management is available in HCP Terraform **Standard** Edition. [Learn more about HCP Terraform pricing here](https://www.hashicorp.com/products/terraform/pricing). + + + +HCP Terraform workspaces can only be accessed by users with the correct permissions. You can manage permissions for a workspace on a per-team basis. + +Teams with [admin access](/terraform/enterprise/users-teams-organizations/permissions) on a workspace can manage permissions for other teams on that workspace. Since newly created workspaces don't have any team permissions configured, the initial setup of a workspace's permissions requires the owners team or a team with permission to manage workspaces. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +-> **API:** See the [Team Access APIs](/terraform/enterprise/api-docs/team-access).
+**Terraform:** See the `tfe` provider's [`tfe_team_access`](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/team_access) resource. + +## Background + +HCP Terraform manages users' permissions to workspaces with teams. + +- [Workspace-level permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-permissions) can be granted to an individual team on a particular workspace. These permissions can be managed on the workspace by anyone with admin access to the workspace. +- In addition, some [organization-level permissions](/terraform/enterprise/users-teams-organizations/permissions#organization-permissions) can be granted to a team which apply to every workspace in the organization. For example, the + [manage all workspaces](/terraform/enterprise/users-teams-organizations/permissions#manage-all-workspaces) and [manage all projects](/terraform/enterprise/users-teams-organizations/permissions#manage-all-projects) permissions grant the workspace-level admin permission to every workspace in the organization. Organization-level permissions can only be managed by organization owners. + +## Managing Workspace Access Permissions + +When a user creates a workspace, the following teams can access that workspace with full admin permissions: + +- [the owners team](/terraform/enterprise/users-teams-organizations/teams#the-owners-team) +- teams with "Manage all workspaces" and/or “Manage all projects” [organization permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions) +- teams with “Project Admin” project permissions + +You cannot override these teams' permissions through the workspace's specific permissions. + +To manage a team's access to a workspace, select "Team Access" from the workspace's "Settings" menu. + +This screen displays all teams granted workspace-level permissions to the workspace. To add a team, select "Add team and permissions". + +HCP Terraform displays the teams you can grant workspace access to. Select a team to continue and configure that team's permissions. + +There are four [fixed permissions sets](/terraform/enterprise/users-teams-organizations/permissions#fixed-permission-sets) available for basic usage: Read, Plan, Write, and Admin. + +To enable finer-grained selection of non-admin permissions, select "Customize permissions for this team". On this screen, you can select specific permissions to grant the team for the workspace. + +For more information on permissions, see [the documentation on Workspace Permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-permissions). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/deletion.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/deletion.mdx new file mode 100644 index 000000000..4daa48e16 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/deletion.mdx @@ -0,0 +1,125 @@ +--- +page_title: Destroy infrastructure resources and delete workspaces in Terraform Enterprise +description: >- + Learn how to clean up resources by destroying a workspace's infrastructure and + deleting a workspace in Terraform Enterprise. +source: terraform-docs-common +--- + +# Destroy infrastructure resources and delete workspaces + +HCP Terraform workspaces have two primary delete actions: + +- [Destroying infrastructure](#destroy-infrastructure) deletes resources managed by the HCP Terraform workspace by triggering a destroy run. +- [Deleting a workspace](#delete-workspaces) deletes the workspace itself without triggering a destroy run. + +In general, you should perform both actions in the above order when destroying a workspace to ensure resource cleanup for all of a workspace's managed infrastructure. + +## Destroy Infrastructure + +Destroy plans delete the infrastructure managed by a workspace. We recommend destroying the infrastructure managed by a workspace _before_ deleting the workspace itself. Otherwise, the unmanaged infrastructure resources will continue to exist but will become unmanaged, and you must go into your infrastructure providers to delete the resources manually. + +Before queuing a destroy plan, enable the **Allow destroy plans** toggle setting on this page. + +### Automatically Destroy + + + +@include 'tfc-package-callouts/ephemeral-workspaces.mdx' + + + +Configuring automatic infrastructure destruction for a workspace requires [admin permissions](/terraform/enterprise/users-teams-organizations/permissions#workspace-admins) for that workspace. + +There are two main ways to automatically destroy a workspace's resources: + +- Schedule a run to destroy all resources in a workspace at a specific date and time. +- Configure HCP Terraform to destroy a workspace's infrastructure after a period of workspace inactivity. + +Workspaces can inherit auto-destroy settings from their project. Refer to [managing projects](/terraform/enterprise/projects/manage#automatically-destroy-inactive-workspaces) for more information. You can configure an individual workspace's auto-destroy settings to override the project's configuration. + +You can reduce your spending on infrastructure by automatically destroying temporary resources like development environments. + +After HCP Terraform performs an auto-destroy run, it unsets the `auto-destroy-at` field on the workspace. If you continue using the workspace, you can schedule another future auto-destroy run to remove any new resources. + +!> **Note:** Automatic destroy plans _do not_ prompt you for apply approval in the HCP Terraform user interface. We recommend only using this setting for development environments. + +You can schedule an auto-destroy run using the HCP Terraform web user interface, or the [workspace API](/terraform/enterprise/api-docs/workspaces). + +You can also schedule [notifications](/terraform/enterprise/workspaces/settings/notifications) to alert you 12 and 24 hours before an auto-destroy run, and to report auto-destroy run results. + +#### Destroy at a specific day and time + +To schedule an auto-destroy run at a specific time in HCP Terraform: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace you want to destroy. +2. Choose **Settings** from the sidebar, then **Destruction and Deletion**. +3. Under **Automatically destroy**, click **Set up auto-destroy**. +4. Enter the desired date and time. HCP Terraform defaults to your local time zone for scheduling and displays how long until the scheduled operation. +5. Click **Confirm auto-destroy**. + +To cancel a scheduled auto-destroy run in HCP Terraform: + +1. Navigate to the workspace's **Settings** > **Destruction and Deletion** page. +2. Under **Automatically destroy**, click **Edit** next to your scheduled run's details. +3. Click **Remove**. + +#### Destroy if a workspace is inactive + +You can configure HCP Terraform to automatically destroy a workspace's infrastructure after a period of inactivity. +A workspace is _inactive_ if the workspace's state has not changed within your designated time period. + +!> **Caution:** As opposed to configuring an auto-destroy run for a specific date and time, this setting _persists_ after queueing auto-destroy runs. + +If you configure a workspace to auto-destroy its infrastructure when inactive, any run that updates Terraform state further delays the scheduled auto-destroy time by the length of your designated timeframe. + +To schedule an auto-destroy run after a period of workspace inactivity: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace you want to destroy. +2. Choose **Settings** from the sidebar, then **Destruction and Deletion**. +3. Under **Automatically destroy**, click **Set up auto-destroy**. +4. Click the **Destroy if inactive** toggle. +5. Select or customize a desired timeframe of inactivity. +6. Click **Confirm auto-destroy**. + +When configured for the first time, the auto-destroy duration setting displays the scheduled date and time that HCP Terraform will perform the auto-destroy run. +Subsequent auto-destroy runs and Terraform runs that update state both update the next scheduled auto-destroy date. + +After HCP Terraform completes a manual or automatic destroy run, it waits until further state updates to schedule a new auto-destroy run. + +To remove your workspace's auto-destroy run: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace you want to disable the auto-destroy run for. +2. Choose **Settings** from the sidebar, then **Destruction and Deletion**. +3. Under **Auto-destroy settings**, click **Edit** to change the auto-destroy settings. +4. Click **Remove**. + +When you move a workspace to a different project, it inherits the auto-destroy settings from the new project. If you configured the workspace to override the previous project's auto-destroy settings, it retains the override configuration in the new project. + +## Delete Workspace + +Terraform does not automatically destroy managed infrastructure when you delete a workspace. + +After you delete the workspace and its state file, Terraform can _no longer track or manage_ that infrastructure. You must manually delete or [import](/terraform/cli/commands/import) any remaining resources into another Terraform workspace. + +By default, [workspace administrators](/terraform/enterprise/users-teams-organizations/permissions#workspace-admins) can only delete unlocked workspaces that are not managing any infrastructure. Organization owners can force delete a workspace to override these protections. Organization owners can also configure the [organization's settings](/terraform/enterprise/users-teams-organizations/organizations#general) to let workspace administrators force delete their own workspaces. + +## Data Retention Policies + + +Data retention policies are exclusive to Terraform Enterprise, and not available in HCP Terraform. Learn more about Terraform Enterprise. + + +Define configurable data retention policies for workspaces to help reduce object storage consumption. You can define a policy that allows Terraform to _soft delete_ the backing data associated with configuration versions and state versions. Soft deleting refers to marking a data object for garbage collection so that Terraform can automatically delete the object after a set number of days. + +Once an object is soft deleted, any attempts to read the object will fail. Until the garbage collection grace period elapses, you can still restore an object using the APIs described in the [configuration version documentation](/terraform/enterprise/api-docs/configuration-versions) and [state version documentation](/terraform/enterprise/api-docs/state-versions). After the garbage collection grace period elapses, Terraform permanently deletes the archivist storage. + +The [organization policy](/terraform/enterprise/users-teams-organizations/organizations#destruction-and-deletion) is the default policy applied to workspaces, but members of individual workspaces can override the policy for their workspaces. + +The workspace policy always overrides the organization policy. A workspace admin can set or override the following data retention policies: + +- **Organization default policy** +- **Do not auto-delete** +- **Auto-delete data** + +Setting the data retention policy to **Organization default policy** disables the other data retention policy settings. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/index.mdx new file mode 100644 index 000000000..e57f67d8f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/index.mdx @@ -0,0 +1,212 @@ +--- +page_title: Workspaces settings in Terraform Enterprise +description: >- + Learn how to configure workspace settings for notifications, permissions, + health, locking, policies, run triggers, SSH keys, team access, version + control, and deletion. +source: terraform-docs-common +--- + +# Workspace settings + +You can change a workspace’s settings after creation. Workspace settings are separated into several pages. + +- [General](#general): Settings that determine how the workspace functions, including its name, description, associated project, Terraform version, and execution mode. +- [Health](/terraform/enterprise/workspaces/health): Settings that let you configure health assessments, including drift detection and continuous validation. +- [Locking](#locking): Locking a workspace temporarily prevents new plans and applies. +- [Notifications](#notifications): Settings that let you configure run notifications. +- [Policies](#policies): Settings that let you toggle between Sentinel policy evaluation experiences. +- [Run Triggers](#run-triggers): Settings that let you configure run triggers. Run triggers allow runs to queue automatically in your workspace when runs in other workspaces are successful. +- [SSH Key](#ssh-key): Set a private SSH key for downloading Terraform modules from Git-based module sources. +- [Team Access](#team-access): Settings that let you manage which teams can view the workspace and use it to provision infrastructure. +- [Version Control](#version-control): Manage the workspace’s VCS integration. +- [Destruction and Deletion](#destruction-and-deletion): Remove a workspace and the infrastructure it manages. + +Changing settings requires admin access to the relevant workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +-> **API:** See the [Update a Workspace endpoint](/terraform/enterprise/api-docs/workspaces#update-a-workspace) (`PATCH /organizations/:organization_name/workspaces/:name`). + +## General + +General settings let you change a workspace's name, description, the project it belongs to, and details about how Terraform runs operate. After changing these settings, click **Save settings** at the bottom of the page. + +### ID + +Every workspace has a unique ID that you cannot change. You may need to reference the workspace's ID when using the [HCP Terraform API](/terraform/enterprise/api-docs). + +Click the icon beside the ID to copy it to your clipboard. + +### Name + +The display name of the workspace. + +!> **Warning:** Some API calls refer to a workspace by its name, so changing the name may break existing integrations. + +### Project + +The [project](/terraform/enterprise/projects) that this workspace belongs to. Changing the workspace's project can change the read and write permissions for the workspace and which users can access it. + +To move a workspace, you must have the "Manage all Projects" organization permission or explicit team admin privileges on both the source and destination projects. Remember that moving a workspace to another project may affect user visibility for that project's workspaces. Refer to [Project Permissions](/terraform/enterprise/users-teams-organizations/permissions#project-permissions) for details on workspace access. + +### Description (Optional) + +Enter a brief description of the workspace's purpose or types of infrastructure. + +### Execution Mode + +Whether to use HCP Terraform as the Terraform execution platform for this workspace. + +By default, HCP Terraform uses an organization's [default execution mode](/terraform/enterprise/users-teams-organizations/organizations#organization-settings) to choose the execution platform for a workspace. Alternatively, you can instead choose a custom execution mode for a workspace. + +Specifying the "Remote" execution mode instructs HCP Terraform to perform Terraform runs on its own disposable virtual machines. This provides a consistent and reliable run environment and enables advanced features like Sentinel policy enforcement, cost estimation, notifications, version control integration, and more. + +To disable remote execution for a workspace, change its execution mode to "Local". This mode lets you perform Terraform runs locally with the [CLI-driven run workflow](/terraform/enterprise/run/cli). The workspace will store state, which Terraform can access with the [CLI integration](/terraform/cli/cloud). HCP Terraform does not evaluate workspace variables or variable sets in local execution mode. + +If you instead need to allow HCP Terraform to communicate with isolated, private, or on-premises infrastructure, consider using [HCP Terraform agents](/terraform/cloud-docs/agents). By deploying a lightweight agent, you can establish a simple connection between your environment and HCP Terraform. + +Changing your workspace's execution mode after a run has already been planned will cause the run to error when it is applied. + +To minimize the number of runs that error when changing your workspace's execution mode, you should: + +1. Disable [auto-apply](/terraform/enterprise/workspaces/settings#auto-apply) if you have it enabled. +2. Complete any runs that are no longer in the [pending stage](/terraform/enterprise/run/states#the-pending-stage). +3. [Lock](/terraform/enterprise/workspaces/settings#locking) your workspace to prevent any new runs. +4. Change the execution mode. +5. Enable [auto-apply](/terraform/enterprise/workspaces/settings#auto-apply), if you had it enabled before changing your execution mode. +6. [Unlock](/terraform/enterprise/workspaces/settings#locking) your workspace. + + + + +### Auto-apply + +Whether or not HCP Terraform should automatically apply a successful Terraform plan. If you choose manual apply, an operator must confirm a successful plan and choose to apply it. + +The main auto-apply setting affects runs created by the HCP Terraform user interface, API, CLI, and version control webhooks. HCP Terraform also has a separate setting for runs created by [run triggers](/terraform/enterprise/workspaces/settings/run-triggers) from another workspace. + +Auto-apply has the following exception: + +- Plans queued by users without permission to apply runs for the workspace must be approved by a user who does have permission. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Terraform Version + +The Terraform version to use for all operations in the workspace. The default value is whichever release was current when HCP Terraform created the workspace. You can also update a workspace's Terraform version to an exact version or a valid [version constraint](/terraform/language/expressions/version-constraints). + +> **Hands-on:** Try the [Upgrade Terraform Version in HCP Terraform](/terraform/tutorials/cloud/cloud-versions) tutorial. + +-> **API:** You can specify a Terraform version when you [create a workspace](/terraform/enterprise/api-docs/workspaces#create-a-workspace) with the API. + +### Terraform Working Directory + +The directory where Terraform will execute, specified as a relative path from the root of the configuration directory. Defaults to the root of the configuration directory. + +HCP Terraform will change to this directory before starting a Terraform run, and will report an error if the directory does not exist. + +Setting a working directory creates a default filter for automatic run triggering, and sometimes causes CLI-driven runs to upload additional configuration content. + +#### Default Run Trigger Filtering + +In VCS-backed workspaces that specify a working directory, HCP Terraform assumes that only changes within that working directory should trigger a run. You can override this behavior with the [Automatic Run Triggering](/terraform/enterprise/workspaces/settings/vcs#automatic-run-triggering) settings. + +#### Parent Directory Uploads + +If a working directory is configured, HCP Terraform always expects the complete shared configuration directory to be available, since the configuration might use local modules from outside its working directory. + +In [runs triggered by VCS commits](/terraform/enterprise/run/ui), this is automatic. In [CLI-driven runs](/terraform/enterprise/run/cli), Terraform's CLI sometimes uploads additional content: + +- When the local working directory _does not match_ the name of the configured working directory, Terraform assumes it is the root of the configuration directory, and uploads only the local working directory. +- When the local working directory _matches_ the name of the configured working directory, Terraform uploads one or more parents of the local working directory, according to the depth of the configured working directory. (For example, a working directory of `production` is only one level deep, so Terraform would upload the immediate parent directory. `consul/production` is two levels deep, so Terraform would upload the parent and grandparent directories.) + +If you use the working directory setting, always run Terraform from a complete copy of the configuration directory. Moving one subdirectory to a new location can result in unexpected content uploads. + +### Remote State Sharing + +Which other workspaces within the organization can access the state of the workspace during [runs managed by HCP Terraform](/terraform/enterprise/run/remote-operations#remote-operations). The [`terraform_remote_state` data source](/terraform/language/state/remote-state-data) relies on state sharing to access workspace outputs. + +- If "Share state globally" is enabled, all other workspaces within the organization can access this workspace's state during runs. +- If global sharing is turned off, you can specify a list of workspaces within the organization that can access this workspace's state; no other workspaces will be allowed. + + The workspace selector is searchable; if you don't initially see a workspace you're looking for, type part of its name. + +By default, new workspaces in HCP Terraform do not allow other workspaces to access their state. We recommend that you follow the principle of least privilege and only enable state access between workspaces that specifically need information from each other. To configure remote state sharing, a user must have read access for the destination workspace. If a user does not have access to the destination workspace due to scoped project or workspace permissions, they will not have complete visibility into the list of other workspace that can access its state. + +-> **Note:** The default access permissions for new workspaces in HCP Terraform changed in April 2021. Workspaces created before this change default to allowing global access within their organization. These workspaces can be changed to more restrictive access at any time. Terraform Enterprise administrators can choose whether new workspaces on their instances default to global access or selective access. + +### User Interface + +Select the user experience for displaying plan and apply details. + +The default experience is _Structured Run Output_, which displays your plan and apply results in a human-readable format. This includes nodes that you can expand to view details about each resource and any configured output. + +The Console UI experience is the traditional Terraform experience, where live text logging is streamed in real time to the UI. This experience most closely emulates the CLI output. + +~> **Note:** Your workspace must be configured to use a Terraform version of 1.0.5 or higher for the Structured Run Output experience to be fully supported. Workspaces running versions from 0.15.2 may see partial functionality. Workspaces running versions below 0.15.2 will default to the "Console UI" experience regardless of the User Interface setting. + +## Locking + +~> **Important:** Unlike other settings, locks can also be managed by users with permission to lock and unlock the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +If you need to prevent Terraform runs for any reason, you can lock a workspace. This prevents all applies (and many kinds of plans) from proceeding, and affects runs created via UI, CLI, API, and automated systems. To enable runs again, a user must unlock the workspace. + +Two kinds of run operations can ignore workspace locking because they cannot affect resources or state and do not attempt to lock the workspace themselves: + +- Plan-only runs. +- The planning stages of [saved plan runs](/terraform/enterprise/run/modes-and-options.mdx#saved-plans). You can only _apply_ a saved plan if the workspace is unlocked, and applying that plan locks the workspace as usual. Terraform Enterprise does not yet support this workflow. + +Locking a workspace also restricts state uploads. In order to upload state, the workspace must be locked by the user who is uploading state. + +Users with permission to lock and unlock a workspace can't unlock a workspace which was locked by another user. Users with admin access to a workspace can force unlock a workspace even if another user has locked it. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Locks are managed with a single "Lock/Unlock/Force unlock ``" button. HCP Terraform asks for confirmation when unlocking. + +You can also manage the workspace's lock from the **Actions** menu. + +## Notifications + +The "Notifications" page allows HCP Terraform to send webhooks to external services whenever specific run events occur in a workspace. + +See [Run Notifications](/terraform/enterprise/workspaces/settings/notifications) for detailed information about configuring notifications. + +## Policies + +HCP Terraform offers two experiences for Sentinel policy evaluations. On the "Policies" page, you can adjust your **Sentinel Experience** settings to your preferred experience. By default, HCP Terraform enables the newest policy evaluation experience. + +To toggle between the two Sentinel policy evaluation experiences, click the **Enable the new Sentinel policy experience** toggle under the **Sentinel Experience** heading. HCP Terraform persists your changes automatically. If HCP Terraform is performing a run on a different page, you must refresh that page to see changes to your policy evaluation experience. + +## Run Triggers + +The "Run Triggers" page configures connections between a workspace and one or more source workspaces. These connections, called "run triggers", allow runs to queue automatically in a workspace on successful apply of runs in any of the source workspaces. + +See [Run Triggers](/terraform/enterprise/workspaces/settings/run-triggers) for detailed information about configuring run triggers. + +## SSH Key + +If a workspace's configuration uses [Git-based module sources](/terraform/language/modules/sources) to reference Terraform modules in private Git repositories, Terraform needs an SSH key to clone those repositories. The "SSH Key" page lets you choose which key it should use. + +See [Using SSH Keys for Cloning Modules](/terraform/enterprise/workspaces/settings/ssh-keys) for detailed information about this page. + +## Team Access + +The "Team Access" page configures which teams can perform which actions on a workspace. + +See [Managing Access to Workspaces](/terraform/enterprise/workspaces/settings/access) for detailed information. + +## Version Control + +The "Version Control" page configures an optional VCS repository that contains the workspace's Terraform configuration. Version control integration is only relevant for workspaces with [remote execution](#execution-mode) enabled. + +See [VCS Connections](/terraform/enterprise/workspaces/settings/vcs) for detailed information about this page. + +## Destruction and Deletion + +The **Destruction and Deletion** page allows [admin users](/terraform/enterprise/users-teams-organizations/permissions) to delete a workspace's managed infrastructure or delete the workspace itself. + +For details, refer to [Destruction and Deletion](/terraform/enterprise/workspaces/settings/deletion) for detailed information about this page. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/notifications.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/notifications.mdx new file mode 100644 index 000000000..2c9b97b15 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/notifications.mdx @@ -0,0 +1,130 @@ +--- +page_title: Workspace notifications in Terraform Enterprise +description: >- + Use webhooks to notify external systems about run progress and other events in + Terraform Enterprise. Learn to create and enable workspace notifications. +source: terraform-docs-common +--- + +# Workspace notifications + +HCP Terraform can use webhooks to notify external systems about run progress and other events. Each workspace has its own notification settings and can notify up to 20 destinations. + +-> **Note:** [Speculative plans](/terraform/enterprise/run/modes-and-options#plan-only-speculative-plan) and workspaces configured with `Local` [execution mode](/terraform/enterprise/workspaces/settings#execution-mode) do not support notifications. + +Configuring notifications requires admin access to the workspace. Refer to [Permissions](/terraform/enterprise/users-teams-organizations/permissions) for details. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +-> **API:** Refer to [Notification Configuration APIs](/terraform/enterprise/api-docs/notification-configurations). + +## Viewing and Managing Notification Settings + +To add, edit, or delete notifications for a workspace, go to the workspace and click **Settings > Notifications**. The **Notifications** page appears, showing existing notification configurations. + +## Creating a Notification Configuration + +A notification configuration specifies a destination URL, a payload type, and the events that should generate a notification. To create a notification configuration: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and select the workspace you want to configure notifications for. + +2. Click **Settings**, then **Notifications**. + +3. Click **Create a Notification**. The **Create a Notification** form appears. + +4. Configure the notifications: + +- **Destination:** HCP Terraform can deliver either a generic payload or a payload formatted specifically for Slack, Microsoft Teams, or Email. Refer to [Notification Payloads](#notification-payloads) for details. + +- **Name:** A display name for this notification configuration. + +- **Webhook URL** This URL is only available for generic, Slack, and Microsoft Teams webhooks. The webhook URL is the destination for the webhook payload. This URL must accept HTTP or HTTPS `POST` requests and should be able to use the chosen payload type. For details, refer to Slack's documentation on [creating an incoming webhook](https://api.slack.com/messaging/webhooks#create_a_webhook) and Microsoft's documentation on [creating a workflow from a channel in teams](https://support.microsoft.com/en-us/office/creating-a-workflow-from-a-channel-in-teams-242eb8f2-f328-45be-b81f-9817b51a5f0e). + +- **Token** (Optional) This notification is only available for generic webhooks. A token is an arbitrary secret string that HCP Terraform will use to sign its notification webhooks. Refer to [Notification Authenticity][inpage-hmac] for details. You cannot view the token after you save the notification configuration. + +- **Email Recipients** This notification is only available for emails. Select users that should receive notifications. + +- **Workspace Events**: HCP Terraform can send notifications for all events or only for specific events. The following events are available: + + - **Drift**: HCP Terraform detected configuration drift. This notification is only available if you enable [health assessments](/terraform/enterprise/workspaces/health) for the workspace. + - **Check Failure:** HCP Terraform detected one or more failed continuous validation checks. This notification is only available if you enable health assessments for the workspace. + - **Health Assessment Fail**: A health assessment failed. This notification is only available if you enable health assessments for the workspace. Health assessments fail when HCP Terraform cannot perform drift detection, continuous validation, or both. The notification does not specify the cause of the failure, but you can use the [Assessment Result](/terraform/enterprise/api-docs/assessment-results) logs to help diagnose the issue. + - **Auto destroy reminder**: Sends reminders 12 and 24 hours before a scheduled auto destroy run. + - **Auto destroy results**: HCP Terraform performed an auto destroy run in the workspace. Reports both successful and errored runs. + + + +@include 'tfc-package-callouts/health-assessments.mdx' + + + +- **Run Events:** HCP Terraform can send notifications for all events or only for specific events. The following events are available: + - **Created**: A run begins and enters the [Pending stage](/terraform/enterprise/run/states#the-pending-stage). + - **Planning**: A run acquires the lock and starts to execute. + - **Needs Attention**: A plan has changes and Terraform requires user input to continue. This event may include approving the plan or a [policy override](/terraform/enterprise/run/states#the-policy-check-stage). + - **Applying**: A run enters the [Apply stage](/terraform/enterprise/run/states#the-apply-stage), where Terraform makes the infrastructure changes described in the plan. + - **Completed**: A run completed successfully. + - **Errored**: A run terminated early due to error or cancellation. + +4. Click **Create a notification**. + +## Enabling and Verifying a Configuration + +To enable or disable a configuration, toggle the **Enabled/Disabled** switch on its detail page. HCP Terraform will attempt to verify the configuration for generic and slack webhooks by sending a test message, and will enable the notification configuration if the test succeeds. + +For a verification to be successful, the destination must respond with a `2xx` HTTP code. If verification fails, HCP Terraform displays the error message and the configuration will remain disabled. + +For both successful and unsuccessful verifications, click the **Last Response** box to view more information about the verification results. You can also send additional test messages with the **Send a Test** link. + +## Notification Payloads + +### Slack + +Notifications to Slack will contain the following information: + +- The run's workspace (as a link) +- The HCP Terraform username and avatar of the person that created the run +- The run ID (as a link) +- The reason the run was queued (usually a commit message or a custom message) +- The time the run was created +- The event that triggered the notification and the time that event occurred + +### Microsoft Teams + +Notifications to Microsoft Teams contain the following information: + +- The run's workspace (as a link) +- The HCP Terraform username and avatar of the person that created the run +- The run ID +- A link to view the run +- The reason the run was queued (usually a commit message or a custom message) +- The time the run was created +- The event that triggered the notification and the time that event occurred + +### Email + +Email notifications will contain the following information: + +- The run's workspace (as a link) +- The run ID (as a link) +- The event that triggered the notification, and if the run needs to be acted upon or not + +### Generic + +A generic notification will contain information about a run and its state at the time the triggering event occurred. The complete generic notification payload is described in the [API documentation][generic-payload]. + +[generic-payload]: /terraform/enterprise/api-docs/notification-configurations#notification-payload + +Some of the values in the payload can be used to retrieve additional information through the API, such as: + +- The [run ID](/terraform/enterprise/api-docs/run#get-run-details) +- The [workspace ID](/terraform/enterprise/api-docs/workspaces#list-workspaces) +- The [organization name](/terraform/enterprise/api-docs/organizations#show-an-organization) + +## Notification Authenticity + +[inpage-hmac]: #notification-authenticity + +Slack notifications use Slack's own protocols for verifying HCP Terraform's webhook requests. + +Generic notifications can include a signature for verifying the request. For notification configurations that include a secret token, HCP Terraform's webhook requests will include an `X-TFE-Notification-Signature` header, which contains an HMAC signature computed from the token using the SHA-512 digest algorithm. The receiving service is responsible for validating the signature. More information, as well as an example of how to validate the signature, can be found in the [API documentation](/terraform/enterprise/api-docs/notification-configurations#notification-authenticity). diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/run-tasks.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/run-tasks.mdx new file mode 100644 index 000000000..5831610aa --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/run-tasks.mdx @@ -0,0 +1,129 @@ +--- +page_title: Terraform Enterprise run tasks +description: >- + Run tasks integrate third-party tools into the run lifecycle. Learn how to + create, delete, and associate run tasks with workspaces. +source: terraform-docs-common +--- + +[entitlement]: /terraform/enterprise/api-docs#feature-entitlements + +# Run tasks + +HCP Terraform run tasks let you directly integrate third-party tools and services at certain stages in the HCP Terraform run lifecycle. Use run tasks to validate Terraform configuration files, analyze execution plans before applying them, scan for security vulnerabilities, or perform other custom actions. + +Run tasks send data about a run to an external service at [specific run stages](#understanding-run-tasks-within-a-run). The external service processes the data, evaluates whether the run passes or fails, and sends a response to HCP Terraform. HCP Terraform then uses this response and the run task enforcement level to determine if a run can proceed. [Explore run tasks in the Terraform registry](https://registry.terraform.io/browse/run-tasks). + + + +@include 'tfc-package-callouts/run-tasks.mdx' + + + +You can manage run tasks through the HCP Terraform UI or the [Run Tasks API](/terraform/enterprise/api-docs/run-tasks/run-tasks). + +> **Hands-on:** Try the [HCP Packer validation run task](/packer/tutorials/hcp/setup-hcp-terraform-run-task) tutorial. + +## Requirements + +**Terraform Version** - You can assign run tasks to workspaces that use a Terraform version of 1.1.9 and later. You can downgrade a workspace with existing runs to use a prior Terraform version without causing an error. However, HCP Terraform no longer triggers the run tasks during plan and apply operations. + +**Permissions** - To create a run task, you must have a user account with the [Manage Run Tasks permission](/terraform/enterprise/users-teams-organizations/permissions#manage-run-tasks). To associate run tasks with a workspace, you need the [Manage Workspace Run Tasks permission](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) on that particular workspace. + +## Creating a Run Task + +Explore the full list of [run tasks in the Terraform Registry](https://registry.terraform.io/browse/run-tasks). + +Run tasks send an API payload to an external service. The API payload contains run-related information, including a callback URL, which the service uses to return a pass or fail status to HCP Terraform. + +For example, the [HCP Packer integration](/terraform/enterprise/integrations/run-tasks#hcp-packer-run-task) checks image artifacts within a Terraform configuration for validity. If the configuration references images marked as unusable (revoked), then the run task fails and provides an error message. + +To create a new run task: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace where you want to create a run task. + +2. Choose **Settings** from the sidebar, then **Run Tasks**. + +3. Click **Create a new run task**. The **Run Tasks** page appears. + +4. Enter the information about the run task to be configured: + + - **Enabled** (optional): Whether the run task will run across all associated workspaces. New tasks are enabled by default. + - **Name** (required): A human-readable name for the run task. This will be displayed in workspace configuration pages and can contain letters, numbers, dashes and underscores. + - **Endpoint URL** (required): The URL for the external service. Run tasks will POST the [run tasks payload](/terraform/enterprise/integrations/run-tasks#integration-details) to this URL. + - **Description** (optional): A human-readable description for the run task. This information can contain letters, numbers, spaces, and special characters. + - **HMAC key** (optional): A secret key that may be required by the external service to verify request authenticity. + +5. Click **Create run task**. The run task is now available within the organization, and you can associate it with one or more workspaces. + +### Global Run Tasks + +When you create a new run task, you can choose to apply it globally to every workspace in an organization. Your organization must have the `global-run-task` [entitlement][] to use global run tasks. + +1. Select the **Global** checkbox + +2. Choose when HCP Terraform should start the run task: + + - **Pre-plan**: Before Terraform creates the plan. + - **Post-plan**: After Terraform creates the plan. + - **Pre-apply**: Before Terraform applies a plan. + - **Post-apply**: After Terraform applies a plan. + +3. Choose an enforcement level: + + - **Advisory**: Run tasks can not block a run from completing. If the task fails, the run proceeds with a warning in the user interface. + - **Mandatory**: Failed run tasks can block a run from completing. If the task fails (including timeouts or unexpected remote errors), the run stops and errors with a warning in the user interface. + +## Associating Run Tasks with a Workspace + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise, and choose **Workspaces** from the sidebar. + +2. Select the workspace that you want to associate with a run task. + +3. Open the **Settings** menu and select **Run Tasks**. + +4. Click the **+** next to the task you want to add to the workspace. + +5. Choose when HCP Terraform should start the run task: + + - **Pre-plan**: Before Terraform creates the plan. + - **Post-plan**: After Terraform creates the plan. + - **Pre-apply**: Before Terraform applies a plan. + - **Post-apply**: After Terraform applies a plan. + +6. Choose an enforcement level: + + - **Advisory**: Run tasks can not block a run from completing. If the task fails, the run will proceed with a warning in the UI. + - **Mandatory**: Run tasks can block a run from completing. If the task fails (including a timeout or unexpected remote error condition), the run will transition to an Errored state with a warning in the UI. + +7. Click **Create**. Your run task is now configured. + +## Understanding Run Tasks Within a Run + +Run tasks perform actions before and after, the [plan](/terraform/enterprise/run/states#the-plan-stage) and [apply](/terraform/enterprise/run/states#the-apply-stage) stages of a [Terraform run](/terraform/enterprise/run/remote-operations). Once all run tasks complete, the run ends based on the most restrictive enforcement level in each associated run task. + +For example, if a mandatory task fails and an advisory task succeeds, the run fails. If an advisory task fails, but a mandatory task succeeds, the run succeeds and proceeds to the apply stage. Regardless of the exit status of a task, HCP Terraform displays the status and any related message data in the UI. + +## Removing a Run Task from a Workspace + +Removing a run task from a workspace does not delete it from the organization. To remove a run task from a specific workspace: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace where you want to remove a run task. + +2. Choose **Settings** from the sidebar, then **Run Tasks**. + +3. Click the ellipses (...) on the associated run task, and then click **Remove**. The run task will no longer be applied to runs within the workspace. + +## Deleting a Run Task + +You must remove a run task from all associated workspaces before you can delete it. To delete a run task: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace associated with a run task you want to delete. + +2. Choose **Settings** from the sidebar, then **Run Tasks**. + +3. Click the ellipses (...) next to the run task you want to delete, and then click **Edit**. + +4. Click **Delete run task**. + +You cannot delete run tasks that are still associated with a workspace. If you attempt this, you will see a warning in the UI containing a list of all workspaces that are associated with the run task. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/run-triggers.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/run-triggers.mdx new file mode 100644 index 000000000..13bda16de --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/run-triggers.mdx @@ -0,0 +1,51 @@ +--- +page_title: Terraform Enterprise run triggers +description: >- + Use run triggers to connect workspaces within your organization. Learn how to + view, create, and manage run triggers. +source: terraform-docs-common +--- + +# Run triggers + +> **Hands-on:** Try the [Connect Workspaces with Run Triggers](/terraform/tutorials/cloud/cloud-run-triggers?utm_source=WEBSITE&utm_medium=WEB_IO&utm_offer=ARTICLE_PAGE&utm_content=DOCS) tutorial. + +HCP Terraform provides a way to connect your workspace to one or more workspaces within your organization, known as "source workspaces". These connections, called run triggers, allow runs to queue automatically in your workspace on successful apply of runs in any of the source workspaces. You can connect each workspace to up to 20 source workspaces. + +Run triggers are designed for workspaces that rely on information or infrastructure produced by other workspaces. If a Terraform configuration uses [data sources](/terraform/language/data-sources) to read values that might be changed by another workspace, run triggers let you explicitly specify that external dependency. + +-> **API:** See the [Run Triggers APIs](/terraform/enterprise/api-docs/run-triggers). + +## Viewing and Managing Run Triggers + +To add or delete a run trigger, navigate to the desired workspace and choose "Run Triggers" from the "Settings" menu: + +This takes you to the run triggers settings page, which shows any existing run triggers. Configuring run triggers requires admin access to the workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) Admins are able to delete any of their workspace’s run triggers from this page. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Creating a Run Trigger + +Creating run triggers requires admin access to the workspace. You must also have permission to read runs for the source workspace you wish to connect to. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +Under the "Source Workspaces" section, select the workspace you would like to connect as your source and click "Add workspace". You now have a run trigger established with your source workspace. Any run from that source workspace which applies successfully will now cause a new run to be queued in your workspace. + +## Run Triggers Auto-Apply Setting + +Runs initiated by a run trigger do not auto-apply unless you enable the **Auto-apply run triggers** setting. This setting operates independently of the primary workspace [auto-apply](/terraform/enterprise/workspaces/settings#auto-apply) setting. + +## Interacting with Run Triggers + +Runs which are queued in your workspace through a run trigger will include extra information in their run details section. This includes links to the source workspace and the successfully applied run that activated the run trigger. + +The source workspace includes a message in the [plan](/terraform/docs/glossary#plan-noun-1-) and [apply](/terraform/docs/glossary#apply-noun-) run details that specifies the workspaces where HCP Terraform automatically starts a run. + +## Using a Remote State Data Source + +A common way to share information between workspaces is the [`terraform_remote_state` data source](/terraform/language/state/remote-state-data), which allows a Terraform configuration to access a source workspace's root-level [outputs](/terraform/language/values/outputs). + +Before other workspaces can read the outputs of a workspace, it must be configured to allow access. For more information about cross-workspace state access in HCP Terraform, see [Terraform State in HCP Terraform](/terraform/enterprise/workspaces/state). + +~> **Important:** We recommend using the [`tfe_outputs` data source](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/data-sources/outputs) in the [HCP Terraform/Enterprise Provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs) to access remote state outputs in HCP Terraform or Terraform Enterprise. The `tfe_outputs` data source is more secure because it does not require full access to workspace state to fetch outputs. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/ssh-keys.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/ssh-keys.mdx new file mode 100644 index 000000000..d2a9fde19 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/ssh-keys.mdx @@ -0,0 +1,63 @@ +--- +page_title: Use SSH Keys to clone modules in Terraform Enterprise +description: >- + Learn how to configure the SSH keys that Terraform uses to pull modules from + private Git repositories. Learn to add, delete, and assign keys to workspaces. +source: terraform-docs-common +--- + +# Use SSH Keys for cloning modules + +Terraform configurations can pull in Terraform modules from [a variety of different sources](/terraform/language/modules/sources), and private Git repositories are a common source for private modules. + +-> **Note:** The [private module registry](/terraform/enterprise/registry) is an easier way to manage private Terraform modules in HCP Terraform, and doesn't require setting SSH keys for workspaces. The rest of this page only applies to configurations that fetch modules directly from a private Git repository. + +To access a private Git repository, Terraform either needs login credentials (for HTTPS access) or an SSH key. HCP Terraform can store private SSH keys centrally, and you can easily use them in any workspace that clones modules from a Git server. + +-> **Note:** SSH keys for cloning Terraform modules from Git repos are only used during Terraform runs. They are managed separately from any [keys used for bringing VCS content into HCP Terraform](/terraform/enterprise/vcs#ssh-keys). + +HCP Terraform manages SSH keys used to clone Terraform modules at the organization level, and allows multiple keys to be added for the organization. You can add or delete keys via the organization's settings. Once a key is uploaded, the text of the key is not displayed to users. + +To assign a key to a workspace, go to its settings and choose a previously added key from the drop-down menu on Integrations under "SSH Key". Each workspace can only use one SSH key. + +-> **API:** See the [SSH Keys API](/terraform/enterprise/api-docs/ssh-keys) and [Assign an SSH Key to a Workspace endpoint](/terraform/enterprise/api-docs/workspaces#assign-an-ssh-key-to-a-workspace).
+**Terraform:** See the `tfe` provider's [`tfe_ssh_key`](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/ssh_key) resource. + +## Adding Keys + +To add a key: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and choose the organization you want to add a key to. +2. Choose **Settings** from the sidebar, then **SSH Keys**. This page has a form for adding new keys and a list of existing keys. +3. Obtain a PEM formatted SSH keypair that HCP Terraform can use to download modules during a Terraform run. You might already have an appropriate key. If not, create one on a secure workstation and distribute the public key to your VCS provider(s). Do not use or generate a key that has a passphrase. Git is running non-interactively and cannot prompt for it. + + The exact command to create a PEM formatted SSH keypair depends on your operating system. The following example command creates a `service_terraform` file with the private key and a `service_terraform.pub` file with the public key. + + ```bash + ssh-keygen -t rsa -m PEM -f "/Users//.ssh/service_terraform" -C "service_terraform_enterprise" + ``` +4. Enter a name for the key in the **Name** field. Choose something identifiable. Keys are only listed by name. HCP Terraform retains the text of each private key, but never displays it for any purpose. +5. Paste the text of the private key in the **Private SSH Key** field. +6. Click **Add Private SSH Key**. + +The new key appears in the list of keys on the page. + +If you upload an invalid SSH key, upload the correct key and push a new commit for the new key to take effect. + +## Deleting Keys + +Before deleting a key, you should assign a new key to any workspaces that are using it. Otherwise workspaces using the deleted key can no longer clone modules from private repositories. This inability might cause Terraform runs to fail. + +To delete a key: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and choose the organization you want to delete a key from. +2. Choose **Settings** from the sidebar, then **SSH Keys**. +3. Find the key you want to delete and click **Delete**. + +## Assigning Keys to Workspaces + +To assign a key to a workspace, navigate to that workspace's page and choose "SSH Key" from the "Settings" menu. + +Select a named key from the "SSH Key" dropdown menu, then click the "Update SSH key" button. + +In subsequent runs, HCP Terraform will use the selected SSH key in this workspace when cloning modules from Git. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/vcs.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/vcs.mdx new file mode 100644 index 000000000..a1e34e5a5 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/settings/vcs.mdx @@ -0,0 +1,127 @@ +--- +page_title: Configure workspace VCS connections in Terraform Enterprise +description: >- + Learn how to use the Terraform Enterprise UI to connect a workspace to a + version control system (VCS) repository that contains a Terraform + configuration. +source: terraform-docs-common +--- + +# Configure workspace VCS connections + +You can connect any HCP Terraform [workspace](/terraform/enterprise/workspaces) to a version control system (VCS) repository that contains a Terraform configuration. This page explains the workspace VCS connection settings in the HCP Terraform UI. + +Refer to [Terraform Configurations in HCP Terraform Workspaces](/terraform/enterprise/workspaces/configurations) for details on handling configuration versions and connected repositories. Refer to [Connecting VCS Providers](/terraform/enterprise/vcs) for a list of supported VCS providers and details about configuring VCS access, viewing VCS events, etc. + +## API + +You can use the [Update a Workspace endpoint](/terraform/enterprise/api-docs/workspaces#update-a-workspace) in the Workspaces API to change one or more VCS settings. We also recommend using this endpoint to automate changing VCS connections for many workspaces at once. For example, when you move a VCS server or remove a deprecated API version. + +## Version Control Settings + +To change a workspace's VCS settings: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and find the workspace you want to update. +2. Choose **Settings** from the sidebar, then **Version Control**. +3. Choose the settings you want, then click **Update VCS settings**. + +You can update the following types of VCS settings for the workspace. + +### VCS Connection + +You can take one of the following actions: + +- To add a new VCS connection, click **Connect to version control**. Select **Version control workflow** and follow the steps to [select a VCS provider and repository](/terraform/enterprise/workspaces/create#create-a-workspace). +- To edit an existing VCS connection, click **Change source**. Choose the **Version control workflow** and follow the steps to [select VCS provider and repository](/terraform/enterprise/workspaces/create#create-a-workspace). +- To remove the VCS connection, click **Change source**. Select either the **CLI-driven workflow** or the **API-driven workflow**, and click **Update VCS settings**. The workspace is no longer connected to VCS. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Terraform Working Directory + +Specify the directory where Terraform will execute runs. This defaults to the root directory in your repository, but you may want to specify another directory if you have directories for multiple different Terraform configurations within the same repository. For example, if you had one `staging` directory and one `production` directory. + +A working directory is required when you use [trigger prefixes](#automatic-run-triggering). + +### Apply Method + +Choose a workflow for Terraform runs. + +- **Auto apply:** Terraform will apply changes from successful plans without prompting for approval. A push to the default branch of your repository will trigger a plan and apply cycle. You may want to do this in non-interactive environments, like continuous deployment workflows. + + !> **Warning:** If you choose auto apply, make sure that no one can change your infrastructure outside of your automated build pipeline. This reduces the risk of configuration drift and unexpected changes. + +- **Manual apply:** Terraform will ask for approval before applying changes from a successful plan. A push to the default branch of your repository will trigger a plan, and then Terraform will wait for confirmation. + +### Automatic Run Triggering + +HCP Terraform uses your VCS provider's API to retrieve the changed files in your repository. You can choose one of the following options to specify which changes trigger Terraform runs. + +#### Always trigger runs + +This option instructs Terraform to begin a run when changes are pushed to any file within the repository. This can be useful for repositories that do not have multiple configurations but require a working directory for some other reason. However, we do not recommend this approach for true monorepos, as it queues unnecessary runs and slows down your ability to provision infrastructure. + +#### Only trigger runs when files in specified paths change + +This option instructs Terraform to begin new runs only for changes that affect specified files and directories. This behavior also applies to [speculative plans](/terraform/enterprise/run/remote-operations#speculative-plans) on pull requests. + +You can use trigger patterns and trigger prefixes in the **Add path** field to specify groups of files and directories. + +- **Trigger Patterns:** (Recommended) Use glob patterns to specify the files that should trigger a new run. For example, `/submodule/**/*.tf`, specifies all files with the `.tf` extension that are nested below the `submodule` directory. You can also use more complex patterns like `/**/networking/**/*`, which specifies all files that have a `networking` folder in their file path. (e.g., `/submodule/service-1/networking/private/main.tf`). Refer to [Glob Patterns for Automatic Run Triggering](#glob-patterns-for-automatic-run-triggering) for details. +- **Trigger Prefixes:** HCP Terraform will queue runs for changes in any of the specified trigger directories matching the provided prefixes (including the working directory). For example, if you use a top-level `modules` directory to share Terraform code across multiple configurations, changes to the shared modules are relevant to every workspace that uses that repository. You can add `modules` as a trigger directory for each workspace to track changes to shared code. + +-> **Note:** HCP Terraform triggers runs on all attached workspaces if it does not receive a list of changed files or if that list is too large to process. When this happens, HCP Terraform may show several runs with completed plans that do not result in infrastructure changes. + +#### Trigger runs when a git tag is published + +This option instructs Terraform to begin new runs only for changes that have a specific tag format. + +The tag format can be chosen between the following options: + +- **Semantic Versioning:** It matches tags in the popular [SemVer format](https://semver.org/). For example, `0.4.2`. +- **Version contains a prefix:** It matches tags which have an additional prefix before the [SemVer format](https://semver.org/). For example, `version-0.4.2`. +- **Version contains a suffix:** It matches tags which have an additional suffix after the [SemVer format](https://semver.org/). For example `0.4.2-alpha`. +- **Custom Regular Expression:** You can define your own regex for HCP Terraform to match against tags. + +You must include an additional `\` to escape the regex pattern when you manage your workspace with the [hashicorp/tfe provider](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/workspace#tags_regex) and trigger runs through matching git tags. Refer to [Terraform escape sequences](/terraform/language/expressions/strings#escape-sequences) for more details. + +| Tag Format | Regex Pattern | Regex Pattern (Escaped) | +| ----------------------------- | --------------- | ----------------------- | +| **Semantic Versioning** | `^\d+.\d+.\d+$` | `^\\d+.\\d+.\\d+$` | +| **Version contains a prefix** | `\d+.\d+.\d+$` | `\\d+.\\d+.\\d+$` | +| **Version contains a suffix** | `^\d+.\d+.\d+` | `^\\d+.\\d+.\\d+` | + +HCP Terraform triggers runs for all tags matching this pattern, regardless of the value in the [VCS Branch](#vcs-branch) setting. + +### VCS Branch + +This setting designates which branch of the repository HCP Terraform should use when the workspace is set to [Always Trigger Runs](#always-trigger-runs) or [Only trigger runs when files in specified paths change](#only-trigger-runs-when-files-in-specified-paths-change). If you leave this setting blank, HCP Terraform uses the repository's default branch. If the workspace is set to trigger runs when a [git tag is published](#trigger-runs-when-a-git-tag-is-published), all tags will trigger runs, regardless of the branch specified in this setting. + +### Automatic Speculative Plans + +Whether to perform [speculative plans on pull requests](/terraform/enterprise/run/ui#speculative-plans-on-pull-requests) to the connected repository, to assist in reviewing proposed changes. Automatic speculative plans are enabled by default, but you can disable them for any workspace. + +### Include Submodules on Clone + +Select **Include submodules on clone** to recursively clone all of the repository's Git submodules when HCP Terraform fetches a configuration. + +-> **Note:** The [SSH key for cloning Git submodules](/terraform/enterprise/vcs#ssh-keys) is set in the VCS provider settings for the organization and is not related to the workspace's SSH key for Terraform modules. + +## Glob Patterns for Automatic Run Triggering + +We support `glob` patterns to describe a set of triggers for automatic runs. Refer to [trigger patterns](#only-trigger-runs-when-files-in-specified-paths-change) for details. + +Supported wildcards: + +- `*` Matches zero or more characters. +- `?` Matches one or more characters. +- `**` Matches directories recursively. + +The following examples demonstrate how to use the supported wildcards: + +- `/**/*` matches every file in every directory +- `/module/**/*` matches all files in any directory below the `module` directory +- `/**/networking/*` matches every file that is inside any `networking` directory +- `/**/networking/**/*` matches every file that has `networking` directory on its path +- `/**/*.tf` matches every file in any directory that has the `.tf` extension +- `/submodule/*.???` matches every file inside `submodule` directory which has three characters long extension. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/state.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/state.mdx new file mode 100644 index 000000000..4b070799d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/state.mdx @@ -0,0 +1,257 @@ +--- +page_title: Manage workspace state in Terraform Enterprise +description: >- + Workspaces have their own separate state data. Learn how Terraform Enterprise + uses state and how to access state from across workspaces. +source: terraform-docs-common +--- + +# Manage workspace state + +Each HCP Terraform workspace has its own separate state data, used for runs within that workspace. + +-> **API:** See the [State Versions API](/terraform/enterprise/api-docs/state-versions). + +## State Usage in Terraform Runs + +In [remote runs](/terraform/enterprise/run/remote-operations), HCP Terraform automatically configures Terraform to use the workspace's state; the Terraform configuration does not need an explicit backend configuration. (If a backend configuration is present, it will be overridden.) + +In local runs (available for workspaces whose execution mode setting is set to "local"), you can use a workspace's state by configuring the [CLI integration](/terraform/cli/cloud) and authenticating with a user token that has permission to read and write state versions for the relevant workspace. When using a Terraform configuration that references outputs from another workspace, the authentication token must also have permission to read state outputs for that workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + + + +During an HCP Terraform run, Terraform incrementally creates intermediate state versions and marks them as finalized once it uploads the state content. + +When a workspace is unlocked, HCP Terraform selects the latest state and sets it as the current state version, deletes all other intermediate state versions that were saved as recovery snapshots for the duration of the lock, and discards all pending intermediate state versions that were superseded by newer state versions. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + + + +## State Versions + +In addition to the current state, HCP Terraform retains historical state versions, which can be used to analyze infrastructure changes over time. + +You can view a workspace's state versions from its **States** tab. Each state in the list indicates which run and which VCS commit (if applicable) it was associated with. Click a state in the list for more details, including a diff against the previous state and a link to the raw state file. + + + +## Managed Resources Count + +-> **Note:** A managed resources count for each organization is available in your organization's settings. + +Your organization’s managed resource count helps you understand the number of infrastructure resources that HCP Terraform manages across all your workspaces. + +HCP Terraform reads all the workspaces’ state files to determine the total number of managed resources. Each [resource](/terraform/language/resources/syntax) in the state equals one managed resource. HCP Terraform includes resources in modules and each resource instance created with the `count` or `for_each` meta-arguments. For example, `"aws_instance" "servers" { count = 10 }` creates ten separate managed resources in state. HCP Terraform does not include [data sources](/terraform/language/data-sources) in the count. + +### Examples - Managed Resources + +The following Terraform state excerpt describes a `random` resource. HCP Terraform counts `random` as one managed resource because `“mode”: “managed”`. + +```json +"resources": [ +{ + "mode": "managed", + "type": "random_pet", + "name": "random", + "provider": "provider[\"registry.terraform.io/hashicorp/random\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "id": "puma", + "keepers": null, + "length": 1, + "prefix": null, + "separator": "-" + }, + "sensitive_attributes": [] + } + ] + } +] +``` + +A single resource configuration block can describe multiple resource instances with the [`count`](/terraform/language/meta-arguments/count) or [`for_each`](/terraform/language/meta-arguments/for_each) meta-arguments. Each of these instances counts as a managed resource. + +The following example shows a Terraform state excerpt with 2 instances of a `aws_subnet` resource. HCP Terraform counts each instance of `aws_subnet` as a separate managed resource. + +```json +{ + "module": "module.vpc", + "mode": "managed", + "type": "aws_subnet", + "name": "public", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "index_key": 0, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-east-2:561656980159:subnet/subnet-024b05c4fba9c9733", + "assign_ipv6_address_on_creation": false, + "availability_zone": "us-east-2a", + ##... + "private_dns_hostname_type_on_launch": "ip-name", + "tags": { + "Name": "-public-us-east-2a" + }, + "tags_all": { + "Name": "-public-us-east-2a" + }, + "timeouts": null, + "vpc_id": "vpc-0f693f9721b61333b" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + }, + { + "index_key": 1, + "schema_version": 1, + "attributes": { + "arn": "arn:aws:ec2:us-east-2:561656980159:subnet/subnet-08924f16617e087b2", + "assign_ipv6_address_on_creation": false, + "availability_zone": "us-east-2b", + ##... + "private_dns_hostname_type_on_launch": "ip-name", + "tags": { + "Name": "-public-us-east-2b" + }, + "tags_all": { + "Name": "-public-us-east-2b" + }, + "timeouts": null, + "vpc_id": "vpc-0f693f9721b61333b" + }, + "sensitive_attributes": [], + "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6MTIwMDAwMDAwMDAwMH0sInNjaGVtYV92ZXJzaW9uIjoiMSJ9", + "dependencies": [ + "data.aws_availability_zones.available", + "module.vpc.aws_vpc.this", + "module.vpc.aws_vpc_ipv4_cidr_block_association.this" + ] + } + ] +} +``` + +### Example - Excluded Data Source + +The following Terraform state excerpt describes a `aws_availability_zones` data source. HCP Terraform does not include `aws_availability_zones` in the managed resource count because `”mode”: “data”`. + +```json + "resources": [ + { + "mode": "data", + "type": "aws_availability_zones", + "name": "available", + "provider": "provider[\"registry.terraform.io/hashicorp/aws\"]", + "instances": [ + { + "schema_version": 0, + "attributes": { + "all_availability_zones": null, + "exclude_names": null, + "exclude_zone_ids": null, + "filter": null, + "group_names": [ + "us-east-2" + ], + "id": "us-east-2", + "names": [ + "us-east-2a", + "us-east-2b", + "us-east-2c" + ], + "state": null, + "zone_ids": [ + "use2-az1", + "use2-az2", + "use2-az3" + ] + }, + "sensitive_attributes": [] + } + ] + } + ] +``` + + + +## State Manipulation + +Certain tasks (including importing resources, tainting resources, moving or renaming existing resources to match a changed configuration, and more) may require modifying Terraform state outside the context of a run, depending on which version of Terraform your HCP Terraform workspace is configured to use. + +Newer Terraform features like [`moved` blocks](/terraform/language/modules/develop/refactoring), [`import` blocks](/terraform/language/import), and the [`replace` option](/terraform/enterprise/run/modes-and-options#replacing-selected-resources) allow you to accomplish these tasks using the usual plan and apply workflow. However, if the Terraform version you're using doesn't support these features, you may need to fall back to manual state manipulation. + +Manual state manipulation in HCP Terraform workspaces, with the exception of [rolling back to a previous state version](#rolling-back-to-a-previous-state), requires the use of Terraform CLI, using the same commands as would be used in a local workflow (`terraform import`, `terraform taint`, etc.). To manipulate state, you must configure the [CLI integration](/terraform/cli/cloud) and authenticate with a user token that has permission to read and write state versions for the relevant workspace. ([More about permissions.](/terraform/enterprise/users-teams-organizations/permissions)) + +### Rolling Back to a Previous State + +You can rollback to a previous, known good state version using the HCP Terraform UI. Navigate to the state you want to rollback to and click the **Advanced** toggle button. This option requires that you have access to create new state and that you lock the workspace. It works by duplicating the state that you specify and making it the workspace's current state version. The workspace remains locked. To undo the rollback operation, rollback to the state version that was previously the latest state. + +-> **Note:** You can rollback to any prior state, but you should use caution because replacing state improperly can result in orphaned or duplicated infrastructure resources. This feature is provided as a convenient alternative to manually downloading older state and using state manipulation commands in the CLI to push it to HCP Terraform. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Accessing State from Other Workspaces + +-> **Note:** Provider-specific [data sources](/terraform/language/data-sources) are usually the most resilient way to share information between separate Terraform configurations. `terraform_remote_state` is more flexible, but we recommend using specialized data sources whenever it is convenient to do so. + +Terraform's built-in [`terraform_remote_state` data source](/terraform/language/state/remote-state-data) lets you share arbitrary information between configurations via root module [outputs](/terraform/language/values/outputs). + +HCP Terraform automatically manages API credentials for `terraform_remote_state` access during [runs managed by HCP Terraform](/terraform/enterprise/run/remote-operations#remote-operations). This means you do not usually need to include an API token in a `terraform_remote_state` data source's configuration. + +## Upgrading State + +You can upgrade a workspace's state version to a new Terraform version without making any configuration changes. To upgrade, we recommend the following steps: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the workspace you want to upgrade. +2. Run a [speculative plan](/terraform/enterprise/run/ui#testing-terraform-upgrades-with-speculative-plans) to test whether your configuration is compatible with the new Terraform version. You can run speculative plans with a Terraform version that is different than the one currently selected for the workspace. +3. Select **Settings > General** and select the desired new **Terraform Version**. +4. Click **+ New run** and then select **Allow empty apply** as the run type. An [empty apply](/terraform/enterprise/run/modes-and-options#allow-empty-apply) allows Terraform to apply a plan that produces no infrastructure changes. Terraform upgrades the state file version during the apply process. + +-> **Note:** If the desired Terraform version is incompatible with a workspace's existing state version, the run fails and HCP Terraform prompts you to run an apply with a compatible version first. Refer to the [Terraform upgrade guides](/terraform/language/upgrade-guides) for details about upgrading between versions. + +### Remote State Access Controls + +Remote state access between workspaces is subject to access controls: + +- Only workspaces within the same organization can access each other's state. +- The workspace whose state is being read must be configured to allow that access. State access permissions are configured on a workspace's [general settings page](/terraform/enterprise/workspaces/settings). There are two ways a workspace can allow access: + - Globally, to all workspaces within the same organization. + - Selectively, to a list of specific approved workspaces. + +By default, new workspaces in HCP Terraform do not allow other workspaces to access their state. We recommend that you follow the principle of least privilege and only enable state access between workspaces that specifically need information from each other. + +-> **Note:** The default access permissions for new workspaces in HCP Terraform changed in April 2021. Workspaces created before this change defaulted to allowing global access within their organization. These workspaces can be changed to more restrictive access at any time on their [general settings page](/terraform/enterprise/workspaces/settings). Terraform Enterprise administrators can choose whether new workspaces on their instances default to global access or selective access. + +### Data Source Configuration + +To configure a `tfe_outputs` data source that references an HCP Terraform workspace, specify the organization and workspace in the `config` argument. + +You must still properly configure the `tfe` provider with a valid authentication token and correct permissions to HCP Terraform. + +```hcl +data "tfe_outputs" "vpc" { + config = { + organization = "example_corp" + workspaces = { + name = "vpc-prod" + } + } +} + +resource "aws_instance" "redis_server" { + # Terraform 0.12 and later: use the "outputs." attribute + subnet_id = data.tfe_outputs.vpc.outputs.subnet_id +} +``` + +-> **Note:** Remote state access controls do not apply when using the `tfe_outputs` data source. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/tags.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/tags.mdx new file mode 100644 index 000000000..6617ddc9b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/tags.mdx @@ -0,0 +1,94 @@ +--- +page_title: Create workspace tags +description: >- + Learn how to create tags for your workspaces so that you can organize + workspaces. Tagging workspaces also lets you sort and filter workspaces in the + UI. +source: terraform-docs-common +--- + +# Create workspace tags + +This topic describes how to create and attach tags to your workspaces. + +## Overview + +Tagging workspaces helps organization administrators organize, sort, and filter workspaces so that they can track resource consumption. For example, you could add a `cost-center` tag so that administrators can sort workspaces according to cost center. + +HCP Terraform stores tags as key-value pairs or as key-only tags. Key-only tags enable you to associate a single Terraform configuration file with several workspaces according to tag. Refer to the following topics in the Terraform CLI and configuration language documentation for additional information: + +- [`terraform{}.cloud{}.workspaces` reference](/terraform/language/terraform#terraform-cloud-workspaces) +- [Define connection settings](/terraform/cli/cloud/settings#define-connection-settings) + +### Reserved tags + +You can reserve a set of tag keys for each organization. Reserved tag keys appear as suggestions when people create tags for projects and workspaces so that you can use consistent terms for tags. Refer to [Create and manage reserved tags](/terraform/enterprise/users-teams-organizations/organizations/manage-reserved-tags) for additional information. + +### Single-value tags + +Your system may contain single-value tags created using Terraform v1.10 and older. You can migrate existing single-value tags to the key-value scheme. Refer to [Migrate single-value tags](#migrate-single-value-tags) for instructions. + +## Requirements + +- You must be member of a team with the **Write** permission group enabled for the workspace to create tags for a workspace. +- You must be member of a team with the **Admin** permission group enabled for the workspace to delete tags on a workspace. + +You cannot create tags for a workspace using the CLI. + +## Define tags + +1. Open your workspace. + +2. Click either the count link for the **Tags** label or **Manage Tags** in the **Tags** card on the right-sidebar to open the **Manage workspace tags** drawer. + +3. Click **+Add tag** and perform one of the following actions: + + - Specify a key-value pair: Lets you sort, filter, and search on either key or value. + - Specify a tag key and leave the **Value** field empty: Lets you sort, filter, and search on only the key name. + - Choose a reserved key from the suggested tag key list and specify a value: Ensures that you are using the key name consistently and lets you sort, filter, and search on either key or value. + - Choose a reserved key from the suggested tag key list and leave the **Value** field empty: Ensures that you are using the key name consistently and lets you sort, filter, and search on only the key name. + + Refer to [Tag syntax](#Tag-syntax) for information about supported characters. + +4. Tags inherited from the project appear in the **Inherited Tags** section. You can attach new key-value pairs to their projects to override inherited tags. Refer to [Manage projects](/terraform/enterprise/projects/manage) for additional information about using tags in projects. + + You cannot override reserved tag keys when the **Disable overrides** option is enabled. Refer to [Create and manage reserved tags](/terraform/enterprise/users-teams-organizations/organizations/manage-reserved-tags) for additional information. + + You can also click on tag links in the **Inherited Tags** section to view workspaces that use the same tag. + +5. Click **Save**. + +Tags that you create appear in the tags management screen in the organization settings. Refer to [Organizations](/terraform/enterprise/users-teams-organizations/organizations) for additional information. + +## Update tags + +1. Open your workspace. +2. Click either the count link for the **Tags** label or **Manage Tags** in the **Tags** card on the right-sidebar to open the **Manage workspace tags** drawer. +3. In the **Tags applied to this resource** section, modify a key, value, or both and click **Save**. + +## Migrate single-value tags + +You can use the API to convert existing single-value tags to key-value tags. You must have permissions in the workspace to perform the following task. Refer to [Requirements](#requirements) for additional information. + +Terraform v1.10 and older adds single-value workspace tags defined in the associated Terraform configuration to workspaces selected by the configuration. As result, your workspace may include duplicate tags. Refer to the [Terraform reference documentation](/terraform/language/terraform#terraform-cloud-workspaces) for additional information. + +### Re-create existing workspace tags as resource tags + +1. Send a `GET` request to the [`/organizations/:organization_name/tags`](/terraform/enterprise/api-docs/organization-tags#list-tags) endpoint to request all workspaces for your organization. The response may span several pages. +2. For each workspace, check the `tag-names` attribute for existing tags. +3. Send a `PATCH` request to the [`/workspaces/:workspace_id`](/terraform/enterprise/api-docs/workspaces#update-a-workspace) endpoint and include the `tag-binding` relationship in the request body for each workspace tag. + +### Delete single-value workspace tags + +1. Send a `GET` request to the [`/organizations/:organization_name/tags`](/terraform/enterprise/api-docs/organization-tags#list-tags) endpoint to request all workspaces for your organization. +2. Enumerate the external IDs for all tags. +3. Send a `DELETE` request to the [`/organizations/:organization_name/tags`](/terraform/enterprise/api-docs/organization-tags#delete-tags) endpoint to delete tags. + +## Tag syntax + +The following rules apply to tags: + +- Tags must be one or more characters. +- Tags have a 255 character limit. +- Tags can include letters, numbers, colons, hyphens, and underscores. +- For tags stored as key-value pairs, tag values are optional. diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/variables/index.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/variables/index.mdx new file mode 100644 index 000000000..22c158189 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/variables/index.mdx @@ -0,0 +1,237 @@ +--- +page_title: Workspace variables in Terraform Enterprise +description: >- + Terraform Enterprise workspaces allow you to customize Terraform runs. Learn + how to use Terraform variables and environment variables. +source: terraform-docs-common +--- + +# Workspace variables + +HCP Terraform workspace variables let you customize configurations, modify Terraform's behavior, setup [dynamic provider credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials), and store information like static provider credentials. + +You can set variables specifically for each workspace or you can create variable sets to reuse the same variables across multiple workspaces. For example, you could define a variable set of provider credentials and automatically apply it to all of the workspaces using that provider. You can use the command line to specify variable values for each plan or apply. Otherwise, HCP Terraform applies workspace variables to all runs within that workspace. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +## Types + +You can create both environment variables and Terraform variables in HCP Terraform. + +> **Hands-on:** Try the [Create and Use a Variable Sets](/terraform/tutorials/cloud-get-started/cloud-create-variable-set) and [Create Infrastructure](/terraform/tutorials/cloud-get-started/cloud-workspace-configure) tutorials to set environment and Terraform variables in HCP Terraform. + +### Environment variables + +HCP Terraform performs Terraform runs on disposable Linux worker VMs using a POSIX-compatible shell. Before running Terraform operations, HCP Terraform uses the `export` command to populate the shell with environment variables. + +Environment variables can store provider credentials and other data. Refer to your provider's Terraform Registry documentation for a full list of supported shell environment variables (e.g., authentication variables for [AWS](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#environment-variables), [Google Cloud Platform](https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/getting_started#adding-credentials), and [Azure](https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs#argument-reference)). Environment variables can also [modify Terraform's behavior](/terraform/cli/config/environment-variables). For example, `TF_LOG` enables detailed logs for debugging. + +#### Parallelism + +You can use the `TFE_PARALLELISM` environment variable when your infrastructure providers produce errors on concurrent operations or use non-standard rate limiting. The `TFE_PARALLELISM` variable sets the `-parallelism=` flag for `terraform plan` and `terraform apply` ([more about `parallelism`](/terraform/internals/graph#walking-the-graph)). Valid values are between 1 and 256, inclusive, and the default is `10`. HCP Terraform agents do not support `TFE_PARALLELISM`, but you can specify flags as environment variables directly via [`TF_CLI_ARGS_name`](/terraform/cli/config/environment-variables#tf-cli-args). In these cases, use `TF_CLI_ARGS_plan="-parallelism="` or `TF_CLI_ARGS_apply="-parallelism="` instead. + +!> **Warning:** We recommend reading and understanding [Terraform parallelism](https://support.hashicorp.com/hc/en-us/articles/10348130482451) prior to setting `TFE_PARALLELISM`. You can also contact HashiCorp support for direct advice. + +#### Dynamic credentials + +You can configure [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials) for certain providers using environment variables [at the workspace level](/terraform/enterprise/workspaces/variables/managing-variables#workspace-specific-variables) or using [variable sets](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets). + +Dynamic credentials allows for using temporary per-run credentials and eliminates the need to manually rotate secrets. + +### Terraform variables + +Terraform variables refer to [input variables](/terraform/language/values/variables) that define parameters without hardcoding them into the configuration. For example, you could create variables that let users specify the number and type of Amazon Web Services EC2 instances they want to provision with a Terraform module. + +```hcl +variable "instance_count" { + description = "Number of instances to provision." + type = number + default = 2 +} +``` + +You can then reference this variable in your configuration. + +```hcl +module "ec2_instances" { + source = "./modules/aws-instance" + + instance_count = var.instance_count + ## ... +} +``` + +If a required input variable is missing, Terraform plans in the workspace will fail and print an explanation in the log. + +## Scope + +Each environment and Terraform variable can have one of the following scopes: + +| Scope | Description | Resources | +| ----------------------------- | ---------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | +| Run-Specific | Apply to a specific run within a single workspace. | [Specify Run-Specific Variables](/terraform/enterprise/workspaces/variables/managing-variables#run-specific-variables) | +| Workspace-Specific | Apply to a single workspace. | [Create Workspace-Specific Variables](/terraform/enterprise/workspaces/variables/managing-variables#workspace-specific-variables), [Loading Variables from Files](/terraform/enterprise/workspaces/variables/managing-variables#loading-variables-from-files), [Workspace-Specific Variables API](/terraform/enterprise/api-docs/workspace-variables). | +| Workspace-Scoped Variable Set | Apply to multiple workspaces within the same organization. | [Create Variable Sets](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets) and [Variable Sets API](/terraform/enterprise/api-docs/variable-sets) | +| Project-Scoped Variable Set | Automatically applied to all current and future workspaces within a project. | [Create Variable Sets](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets) and [Variable Sets API](/terraform/enterprise/api-docs/variable-sets) | +| Global Variable Set | Automatically applied to all current and future workspaces within an organization. | [Create Variable Sets](/terraform/enterprise/workspaces/variables/managing-variables#variable-sets) and [Variable Sets API](/terraform/enterprise/api-docs/variable-sets) | + +## Variable set ownership + +Projects and organizations can both own variable sets. The owner of a variable set can determine the precedence of that set. + +Use organization-owned variable sets to share variables across multiple projects. Managing organization-owned variable sets [requires a higher permission level](/terraform/enterprise/workspaces/variables/managing-variables#permissions) because you can apply these sets to any project in your organization. + +Use project-owned variable sets to share variables across multiple workspaces within a single project. Project-owned variable sets only require permissions on the project itself, rather than organization-level permissions. + +Refer to [**Manage variable sets**](/terraform/enterprise/workspaces/variables/managing-variables#permissions) for more details on variable set permissions. + +## Precedence + +> **Hands On:** The [Manage Multiple Variable Sets in HCP Terraform](/terraform/tutorials/cloud/cloud-multiple-variable-sets) tutorial shows how to manage multiple variable sets and demonstrates variable precedence. + +There may be cases when a workspace contains conflicting variables of the same type with the same key. HCP Terraform marks overwritten variables in the UI. + +HCP Terraform prioritizes and overwrites conflicting variables according to the following precedence: + +### 1. Priority global variable sets + +If [prioritized](/terraform/enterprise/workspaces/variables#precedence-with-priority-variable-sets), variables in a global variable set have precedence over all other variables with the same key. + +### 2. Priority project-scoped variable set owned by an organization + +If [prioritized](/terraform/enterprise/workspaces/variables#precedence-with-priority-variable-sets), variables in a priority project-scoped variable set have precedence over variables with the same key set at a more specific scope. Prioritized variables sets owned by organizations take precedence over priority variable sets owned by projects. + +### 3. Priority workspace-scoped variable set owned by an organization + +If [prioritized](/terraform/enterprise/workspaces/variables#precedence-with-priority-variable-sets), variables in an organization-owned variable set scoped to a workspace have precedence over variables with the same key set at a more specific scope. Prioritized variables sets owned by organizations take precedence over sets owned by projects. + +### 4. Priority project-scoped variable set owned by a project + +If [prioritized](/terraform/enterprise/workspaces/variables#precedence-with-priority-variable-sets), variables in a priority project-scoped variable set have precedence over variables with the same key set at a more specific scope. + +### 5. Priority workspace-scoped variable set owned by a project + +If [prioritized](/terraform/enterprise/workspaces/variables#precedence-with-priority-variable-sets), variables in a priority workspace-scoped variable set have precedence over variables with the same key set at a more specific scope. + +### 6. Command line argument variables + +When using a CLI workflow, variables applied to a run with either `-var` or `-var-file` overwrite workspace-specific and variable set variables that have the same key. + +### 7. Local environment variables prefixed with `TF_VAR_` + +When using a CLI workflow, local environment variables prefixed with `TF_VAR_` (e.g., `TF_VAR_replicas`) overwrite workspace-specific, variable set, and `.auto.tfvars` file variables that have the same key. + +### 8. Workspace-specific variables + +Workspace-specific variables always overwrite variables from variable sets that have the same key. Refer to [overwrite variables from variable sets](/terraform/enterprise/workspaces/variables/managing-variables#overwrite-variable-sets) for details. + +### 9. Workspace-scoped variable owned by a project + +Variables in workspace-scoped variable sets are only applied to a subset of workspaces in a project. + +When workspace-scoped variable sets have conflicting variables, HCP Terraform compares the variable set names and uses values from the variable set with lexical precedence. Terraform and HCP Terraform operate on UTF-8 strings, and HCP Terraform sorts variable set names based on the lexical order of Unicode code points. + +For example, if you apply `A_Variable_Set` and `B_Variable_Set` to the same workspace, HCP Terraform will use any conflicting variables from `A_Variable_Set`. This is the case regardless of which variable set has been edited most recently. HCP Terraform only considers the lexical ordering of variable set names when determining precedence. + +Variables sets scoped to workspaces that are owned by projects take precedence over sets with the same scope that are owned by organizations. + +### 10. Project-scoped variable set owned by a project + +Variables in project-scoped variable sets are only applied to the workspaces within the specified projects. + +When project-scoped variable sets have conflicting variables, HCP Terraform compares the variable set names and uses values from the variable set with lexical precedence. Terraform and HCP Terraform operate on UTF-8 strings, and HCP Terraform sorts variable set names based the on lexical order of Unicode code points. + +For example, if you apply `A_Variable_Set` and `B_Variable_Set` to the same project, HCP Terraform uses any conflicting variables from `A_Variable_Set`. This is the case regardless of which variable set has been edited most recently. HCP Terraform only considers the lexical ordering of variable set names when determining precedence. + +Variables sets owned by projects take precedence over those owned by organizations. + +### 11. Workspace-scoped variable set owned by an organization + +Variables in workspace-scoped variable sets are only applied to the specified workspaces in an organization. + +When workspace-scoped variable sets have conflicting variables, HCP Terraform compares the variable set names and uses values from the variable set with lexical precedence. Terraform and HCP Terraform operate on UTF-8 strings, and HCP Terraform sorts variable set names based on the lexical order of Unicode code points. + +For example, if you apply `A_Variable_Set` and `B_Variable_Set` to the same workspace, HCP Terraform will use any conflicting variables from `A_Variable_Set`. This is the case regardless of which variable set has been edited most recently. HCP Terraform only considers the lexical ordering of variable set names when determining precedence. + +### 12. Project-scoped variable set owned by an organization + +Variables in project-scoped variable sets are only applied to the workspaces within the specified projects. + +When project-scoped variable sets have conflicting variables, HCP Terraform compares the variable set names and uses values from the variable set with lexical precedence. Terraform and HCP Terraform operate on UTF-8 strings, and HCP Terraform sorts variable set names based the on lexical order of Unicode code points. + +For example, if you apply `A_Variable_Set` and `B_Variable_Set` to the same project, HCP Terraform uses any conflicting variables from `A_Variable_Set`. This is the case regardless of which variable set has been edited most recently. HCP Terraform only considers the lexical ordering of variable set names when determining precedence. + +### 13. Global variable sets + +Workspace and project-scoped variable sets always take precedence over global variable sets that are applied to all workspaces within an organization. Terraform does not allow global variable sets to contain variables with the same key, so they cannot conflict. + +### 14. `*.auto.tfvars` variable files + +Variables in the HCP Terraform workspace and variables provided through the command line always overwrite variables with the same key from files ending in `.auto.tfvars`. + +### 15. `terraform.tfvars` variable file + +Variables in the `.auto.tfvars` files take precedence over variables in the `terraform.tfvars` file. + + + +Although HCP Terraform uses variables from `terraform.tfvars`, Terraform Enterprise currently ignores this file. + + + +## Precedence with priority variable sets + +You can select to prioritize all values of the variables in a variable set. +When a variable set is priority, the values take precedence over any variables with the same key set at a more specific scope. + +For example, variables in a priority global variable set would take precedence over all variables with the same key. + +If two priority variable sets with the same scope and ownership include the same variable key, HCP Terraform will determine precedence by the alphabetical order of the variable sets' names. + +While a priority variable set can enforce that Terraform variables use designated values, it does not guarantee that the configuration uses the variable. A user can still directly modify the Terraform configuration to remove usage of a variable and replace it with a hard-coded value. For stricter enforcement, we recommend using policy checks or run tasks. + +## Precedence example + +Consider an example workspace that has the following different kinds of variables and variable sets: + +| Source | Priority | Ownership | Scope | +| ------------------------------------------------------------- | -------- | ------------ | --------- | +| Priority **global** variable set | true | organization | global | +| Priority organization-owned **project-scoped** variable set | true | organization | project | +| Priority organization-owned **workspace-scoped** variable set | true | organization | workspace | +| Priority project-owned **project-scoped** variable set | true | project | project | +| Priority project-owned **workspace-scoped** variable set | true | project | workspace | +| Command line argument | N/A | N/A | run | +| Local environment variable | N/A | N/A | workspace | +| **Workspace-specific** variable | N/A | N/A | workspace | +| Project-owned **workspace-scoped** variable set | false | project | workspace | +| Project-owned **project-scoped** variable set | false | project | project | +| Organization-owned **workspace-scoped** variable set | false | organization | workspace | +| Organization-owned **project-scoped** variable set | false | organization | project | +| **Global** variable set | false | organization | global | + +If these variables and variable sets had the following variables applied: + +| Source (priority/ownership/scope) | Region | Var1 | Replicas | +| ------------------------------------------------------------- | ----------- | ---- | -------- | +| Priority **global** variable set | `us-east-1` | | | +| Priority organization-owned **project-scoped** variable set | `us-east-2` | | | +| Priority organization-owned **workspace-scoped** variable set | `us-west-1` | | | +| Priority project-owned **project-scoped** variable set | `eu-east-2` | | | +| Priority project-owned **workspace-scoped** variable set | `eu-west-1` | | | +| Command line argument | `us-west-2` | | `9` | +| Local environment variable | | | `8` | +| **Workspace-specific** variable | | `h` | `1` | +| Project-owned **workspace-scoped** variable set | | `y` | `2` | +| Project-owned **project-scoped** variable set | | | `4` | +| Organization-owned **workspace-scoped** variable set | | `z` | `3` | +| Organization-owned **project-scoped** variable set | | | `5` | +| **Global** variable set | | | `6` | + +When you trigger a run through the command line, these are the final values HCP Terraform assigns to each variable: + +| Variable | Value | +| -------- | ----------- | +| Region | `us-east-1` | +| Var1 | `h` | +| Replicas | `9` | diff --git a/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/variables/managing-variables.mdx b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/variables/managing-variables.mdx new file mode 100644 index 000000000..78dd91d59 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/enterprise/workspaces/variables/managing-variables.mdx @@ -0,0 +1,248 @@ +--- +page_title: Manage variables and variable sets in Terraform Enterprise +description: >- + Use workspace variables and variable sets to customize Terraform Enterprise + runs. +source: terraform-docs-common +--- + +# Manage variables and variable sets + +You can set variables specifically for each workspace or you can create variable sets to reuse the same variables across multiple workspaces. Refer to the [variables overview](/terraform/enterprise/workspaces/variables) documentation for more information about variable types, scope, and precedence. You can also set variable values specifically for each run on the command line. + +You can create and edit workspace-specific variables through: + +- The HCP Terraform UI, as detailed below. +- The Variables API for [workspace-specific variables](/terraform/enterprise/api-docs/workspace-variables) and [variable sets](/terraform/enterprise/api-docs/variable-sets). +- The `tfe` provider's [`tfe_variable`](https://registry.terraform.io/providers/hashicorp/tfe/latest/docs/resources/variable) resource, which can be more convenient for bulk management. + +## Permissions + +You must have [**Read variables** permission](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) to view the variables for a particular workspace and to view the variable sets in your organization. To create or edit workspace-specific variables within a workspace, you must have [**Read and write variables**](/terraform/enterprise/users-teams-organizations/permissions#general-workspace-permissions) for that workspace. + +To create, update, or delete organization-owned variable sets, you must be one of the following: + +- A member of the [owners team](/terraform/enterprise/users-teams-organizations/permissions#organization-owners) +- A member of a team with [**Manage all projects**](/terraform/enterprise/users-teams-organizations/permissions#manage-all-projects) +- A member of a team with [**Manage all workspaces**](/terraform/enterprise/users-teams-organizations/permissions#manage-all-workspaces) + +To create, edit, or apply project-owned variable sets, you must be part of a team with one of the following: + +- **Write** project permissions +- **Maintain** project permissions +- **Admin** project permissions +- [**Manage variable sets**](/terraform/enterprise/users-teams-organizations/permissions#general-project-permissions) project permissions +- [**Manage all projects**](/terraform/enterprise/users-teams-organizations/permissions#manage-all-projects) organization permissions + +## Run-Specific Variables + +Terraform 1.1 and later lets you set [Terraform variable](/terraform/enterprise/workspaces/variables#terraform-variables) values for a particular plan or apply on the command line. These variable values will overwrite workspace-specific and variable set variables with the same key. Refer to the [variable precedence](/terraform/enterprise/workspaces/variables#precedence) documentation for more details. + +You can set run-specific Terraform variable values by: + +- Specifying `-var` and `-var-file` arguments. For example: + + terraform apply -var="key=value" -var-file="testing.tfvars" +- Creating local environment variables prefixed with `TF_VAR_`. For example, if you declare a variable called `replicas` in your configuration, you could create a local environment variable called `TF_VAR_replicas` and set it to a particular value. When you use the [CLI Workflow](/terraform/enterprise/run/cli), Terraform automatically identifies these environment variables and applies their values to the run. + +Refer to the [variables on the command line](/terraform/language/values/variables#variables-on-the-command-line) documentation for more details and examples. + +## Workspace-Specific Variables + +To view and manage a workspace's variables, go to the workspace and click the **Variables** tab. + +The **Variables** page appears, showing all workspace-specific variables and variable sets applied to the workspace. This is where you can add, edit, and delete workspace-specific variables. You can also apply and remove variable sets from the workspace. + +The **Variables** page is not available for workspaces configured with `Local` [execution mode](/terraform/enterprise/workspaces/settings#execution-mode). HCP Terraform does not evaluate workspace variables or variable sets in local execution mode. + +### Add a Variable + +To add a variable: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and select the workspace you want to define a variable for. + +2. Go to the workspace **Variables** page and click **+ Add variable** in the **Workspace Variables** section. + +3. Choose a variable category (Terraform or environment), optionally mark the variable as [sensitive](#sensitive-values), and enter a variable key, value, and optional description. For Terraform variables only, you can check the **HCL** checkbox to enter a value in HashiCorp Configuration Language. + + Refer to [variable values and format](#variable-values-and-format) for variable limits, allowable values, and formatting. + +4. Click **Save variable**. The variable now appears in the list of the workspace's variables and HCP Terraform will apply it to runs. + +### Edit a Variable + +To edit a variable: + +1. Click the ellipses next to the variable you want to edit and select **Edit**. +2. Make any desired changes and click **Save variable**. + +### Delete a Variable + +To delete a variable: + +1. Click the ellipses next to the variable you want to delete and select **Delete**. +2. Click **Yes, delete variable** to confirm your action. + +## Loading Variables from Files + +You can set [Terraform variable](/terraform/enterprise/workspaces/variables#terraform-variables) values by providing any number of [files ending in `.auto.tfvars`](/terraform/language/values/variables#variable-files) to workspaces that use Terraform 0.10.0 or later. When you trigger a run, Terraform automatically loads and uses the variables defined in these files. If any variable from the workspace has the same key as a variable in the file, the workspace variable overwrites variable from the file. + +You can only do this with files ending in `auto.tfvars` or `terraform.tfvars`. You can apply other types of `.tfvars` files [using the command line](#run-specific-variables) for each run. + +~> **Note:** HCP Terraform loads variables from files ending in `auto.tfvars` for each Terraform run, but does not automatically persist those variables to the HCP Terraform workspace or display them in the **Variables** section of the workspace UI. + +## Variable Sets + +> **Hands On:** Try the [Manage Variable Sets in HCP Terraform tutorial](/terraform/tutorials/cloud/cloud-multiple-variable-sets) tutorial. + +Variable sets are reusable collections of variables that you can apply to multiple workspaces. You can create variable sets under an organization or a project. Whether the variable set is owned by an organization or a project determines the permissions required to manage that set. Learn more about [variable set permissions](#permissions). + +HCP Terraform does not evaluate variable sets during Terraform runs for workspaces configured with `Local` [execution mode](/terraform/enterprise/workspaces/settings#execution-mode). + +Organizations or projects can own variable sets. To view variable sets, click **Settings** in your organization or project, then click **Variable sets**. + +The **Variable sets** page lists all of the organization's or project's variable sets. Click on a variable set to open it and review details about its variables and scoping. + +### Create Variable Sets + +To create a variable set: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the **Settings** page for your organization or project. + +2. Click **Variable Sets**. + +3. Click **Create variable set**. + +4. Choose a descriptive **Name** for the variable set. You can use any combination of numbers, letters, and characters. + +5. Write an optional **Description** that tells other users about the purpose of the variable set and what it contains. + +6. Choose a variable set scope: + - Organization-owned + - **Apply globally:** HCP Terraform automatically applies this global variable set to all existing and future workspaces. + - **Apply to specific projects and workspaces:** Use the text fields to search for and select workspaces and projects to apply this variable set to. This affects all current and future workspaces for any selected projects. After creation, users can also [add this variable set to their workspaces](#apply-or-remove-variable-sets-from-inside-a-workspace). + - Project-owned + - **Apply to the entire project:** HCP Terraform automatically applies this variable set to all existing and future workspaces in the project. + - **Apply to specific workspaces in the project:** Use the text fields to search for and select workspaces to apply this variable set to. After creation, users can also [add this variable set to their workspaces](#apply-or-remove-variable-sets-from-inside-a-workspace). + +7. Add one or more variables: Click **+ Add variable**, choose a variable type (Terraform or environment), optionally mark the variable as [sensitive](#sensitive-values), and enter a variable name, value, and optional description. Then, click **Save variable**. + + Refer to [variable values and format](#variable-values-and-format) for variable limits, allowable values, and formatting. + + ~> **Note:** HCP Terraform will error if you try to declare variables with the same key in multiple global variable sets. + +8. Click **Create variable set.** HCP Terraform adds the new variable set to any specified workspaces and displays it on the **Variable Sets** page. + +### Edit Variable Sets + +To edit or remove a variable set: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the **Settings** page for your organization or project. + +2. Click **Variable Sets**. + +3. Select the variable set you want to edit. That specific variable set page appears, where you can change the variable set settings. Refer to [create variable sets](#create-variable-sets) for details. + +### Delete Variable Sets + +Deleting a variable set can be a disruptive action, especially if the variables are required to execute runs. We recommend informing organization, project, and workspace owners before removing a variable set. + +To delete a variable set: + +1. Sign in to [HCP Terraform](https://app.terraform.io/) or Terraform Enterprise and navigate to the **Settings** page for your organization or project. + +2. Click **Variable Sets**. + +3. Select **Delete variable set**. Enter the variable set name and click **Delete variable set** to confirm this action. HCP Terraform deletes the variable set and removes it from all workspaces. Runs within those workspaces will no longer use the variables from the variable set. + +### Apply or Remove Variable Sets From Inside a Workspace + +To apply a variable set to a specific workspace: + +1. Navigate to the workspace and click the **Variables** tab. The **Variables** page appears, showing all workspace-specific variables and variable sets applied to the workspace. + +2. In the **Variable sets** section, click **Apply Variable Set**. Select the variable set you want to apply to your workspace, and click **Apply variable set**. The variable set appears in the workspace's variable sets list and HCP Terraform will now apply the variables to runs. + +To remove a variable set from within a workspace: + +1. Navigate to the workspace and click the **Variables** tab. The **Variables** page appears, showing all workspace-specific variables and variable sets applied to the workspace. +2. Click the ellipses button next to the variable set and select **Remove variable set**. +3. Click **Remove variable set** in the dialog box. HCP Terraform removes the variable set from this workspace, but it remains available to other workspaces in the organization. + +## Overwrite Variable Sets + +You can overwrite variables defined in variable sets within a workspace. For example, you may want to use a different set of provider credentials in a specific workspace. + +To overwrite a variable from a variable set, [create a new workspace-specific variable](#workspace-specific-variables) of the same type with the same key. HCP Terraform marks any variables that you overwrite with a yellow **OVERWRITTEN** flag. When you click the overwritten variable, HCP Terraform highlights the variable it will use during runs. + +Variables within a variable set can also automatically overwrite variables with the same key in other variable sets applied to the same workspace. Though variable sets are created for the organization or project, these overwrites occur within each workspace. Refer to [variable precedence](/terraform/enterprise/workspaces/variables#precedence) for more details. + +## Priority Variable Sets + +The values in priority variable sets overwrite any variables with the same key set at more specific scopes. This includes variables set using command line flags, or through`.*auto.tfvars` and `terraform.tfvars` files. + +It is still possible for a user to directly modify the Terraform configuration and remove usage of a variable and replace it with a hard coded value. For stricter enforcement, we recommend using policy checks or run tasks. +Refer to [variable precedence](/terraform/enterprise/workspaces/variables#precedence-with-priority-variable-sets) for more details. + +## Variable Values and Format + +The limits, allowable values, and required format are the same for both workspace-specific variables and variable sets. + +### Security + +HCP Terraform encrypts all variable values securely using [Vault's transit backend](/vault/docs/secrets/transit) prior to saving them. This ensures that no out-of-band party can read these values without proper authorization. However, HCP Terraform stores variable [descriptions](#variable-description) in plain text, so be careful with the information you save in a variable description. + +We also recommend passing credentials to Terraform as environment variables instead of Terraform variables when possible, since Terraform runs receive the full text of all Terraform variable values, including [sensitive](#sensitive-values) ones. It may print the values in logs and state files if the configuration sends the value to an output or a resource parameter. Sentinel mocks downloaded from runs will also contain the sensitive values of Terraform variables. + +Although HCP Terraform does not store environment variables in state, it can include them in log files if `TF_LOG` is set to `TRACE`. + +#### Dynamic Credentials + +An alternative to passing static credentials for some providers is to use [dynamic credentials](/terraform/enterprise/workspaces/dynamic-provider-credentials). + +Dynamic credentials allows for using temporary per-run credentials and eliminates the need to manually rotate secrets. + +### Character Limits + +The following limits apply to variables: + +| Component | Limit | +| ----------- | -------------- | +| description | 512 characters | +| key | 128 characters | +| value | 256 kilobytes | + +### Multi-Line Text + +You can type or paste multi-line text into variable value text fields. + +### HashiCorp Configuration Language (HCL) + +You can use HCL for Terraform variables, but not for environment variables. The same Terraform version that performs runs in the workspace will interpret the HCL. + +Variable values are strings by default. To enter list or map values, click the variable’s **HCL** checkbox (visible when editing) and enter the value with the same HCL syntax you would use when writing Terraform code. For example: + +```hcl +{ + us-east-1 = "image-1234" + us-west-2 = "image-4567" +} +``` + +### Sensitive Values + +!> **Warning:** There are some cases when even sensitive variables are included in logs and state files. Refer to [security](#security) for more information. + +Terraform often needs cloud provider credentials and other sensitive information that should not be widely available within your organization. To protect these secrets, you can mark any Terraform or environment variable as sensitive data by clicking its **Sensitive** checkbox that is visible during editing. + +Marking a variable as sensitive makes it write-only and prevents all users (including you) from viewing its value in the HCP Terraform UI or reading it through the Variables API endpoint. + +Users with permission to read and write variables can set new values for sensitive variables, but other attributes of a sensitive variable cannot be modified. To update other attributes, delete the variable and create a new variable to replace it. + +[permissions-citation]: #intentionally-unused---keep-for-maintainers + +### Variable Description + +!> **Warning:** Variable descriptions are not encrypted, so do not include any sensitive information. + +Variable descriptions are optional, and help distinguish between similarly named variables. They are only shown on the **Variables** page and are completely independent from any variable descriptions declared in Terraform CLI. diff --git a/content/terraform-enterprise/v000011-1/docs/partials/README.md b/content/terraform-enterprise/v000011-1/docs/partials/README.md new file mode 100644 index 000000000..5835c582d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/README.md @@ -0,0 +1,10 @@ + +# Partials + +Partials allow you to share content across as many different docs pages as you'd like. To see an example of a partial, check out the `replicated-and-fdo` folder. You can write some in MDX, then import into a docs page like so: + +```mdx +@include "replicated-and-fdo/architecture/data-security-partial.mdx" +``` + +With that in place you can made updates directly to a partial and it updates the content everywhere the site uses that partial! Meaning, we don't have to duplicate and maintain information across pages! diff --git a/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspace-with-vcs.mdx b/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspace-with-vcs.mdx new file mode 100644 index 000000000..80f04888b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspace-with-vcs.mdx @@ -0,0 +1,196 @@ +```json +{ + "data": { + "id": "ws-KTuq99JSzgmDSvYj", + "type": "workspaces", + "attributes": { + "actions": { + "is-destroyable": true + }, + "allow-destroy-plan": true, + "apply-duration-average": null, + "assessments-enabled": false, + "auto-apply": false, + "auto-apply-run-trigger": false, + "auto-destroy-at": null, + "auto-destroy-activity-duration": null, + "created-at": "2021-08-16T21:50:58.726Z", + "description": null, + "environment": "default", + "execution-mode": "remote", + "file-triggers-enabled": true, + "global-remote-state": false, + "latest-change-at": "2021-08-16T21:50:58.726Z", + "locked": false, + "locked-reason": "", + "name": "workspace-2", + "oauth-client-name": "github example", + "operations": true, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-queue-run": true, + "can-read-run": true, + "can-read-variable": true, + "can-update-variable": true, + "can-read-state-versions": true, + "can-read-state-outputs": true, + "can-create-state-versions": true, + "can-queue-apply": true, + "can-lock": true, + "can-unlock": true, + "can-force-unlock": true, + "can-read-settings": true, + "can-manage-tags": true, + "can-manage-run-tasks": true, + "can-force-delete": true, + "can-manage-assessments": true, + "can-manage-ephemeral-workspaces": false, + "can-read-assessment-results": true, + "can-queue-destroy": true + }, + "apply-duration-average": 35000, + "plan-duration-average": 53000, + "policy-check-failures": null, + "queue-all-runs": false, + "resource-count": 10, + "run-failures": 3, + "source": "tfe-api", + "source-name": null, + "source-url": null, + "speculative-enabled": true, + "structured-run-output-enabled": true, + "tag-names": [], + "terraform-version": "1.9.4", + "trigger-prefixes": [], + "vcs-repo": { + "branch": "", + "display-identifier": "example/terraform-test-proj", + "identifier": "example/terraform-test-proj", + "ingress-submodules": false, + "oauth-token-id": "ot-hmAyP66qk2AMVdbJ", + "repository-http-url": "https://github.com/example/terraform-test-proj", + "service-provider": "github", + "tags-regex": null, + "webhook-url": "https://app.terraform.io/webhooks/vcs/704ac743-df64-4b8e-b9a3-a4c5fe1bec87" + }, + "vcs-repo-identifier": "example/terraform-test-proj", + "working-directory": "", + "workspace-kpis-runs-count": null, + "setting-overwrites": { + "execution-mode": true, + "agent-pool": true + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/workspaces/workspace-2", + "self-html": "/app/my-organization/workspaces/workspace-2" + }, + "relationships": { + "relationships": { + "agent-pool": { + "data": null + }, + "current-configuration-version": { + "data": null + }, + "current-run": { + "data": { + "id": "run-hjy7ndEkmCtn31ps", + "type": "runs" + }, + "links": { + "related": "/api/v2/runs/run-hjy7ndEkmCtn31ps" + } + }, + "latest-run": { // Deprecated; same as current-run + "data": { + "id": "run-hjy7ndEkmCtn31ps", + "type": "runs" + }, + "links": { + "related": "/api/v2/runs/run-hjy7ndEkmCtn31ps" + } + }, + "current-state-version": { + "data": { + "id": "sv-hjy7ndEkmCtn31ps", + "type": "state-versions" + }, + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/current-state-version" + } + }, + "current-configuration-version": { + "data": { + "id": "cv-hjy7ndEkmCtn31ps", + "type": "configuration-versions" + }, + "links": { + "related": "/api/v2/configuration-versions/cv-hjy7ndEkmCtn31ps" + } + }, + "current-assessment-result": { + "data": null + }, + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-hjy7ndEkmCtn31ps", + "type": "workspace-outputs" + } + ], + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/current-state-version-outputs" + } + }, + "project": { + "data": { + "id": "prj-hjy7ndEkmCtn31ps", + "type": "projects" + } + }, + "readme": { + "data": null + }, + "remote-state-consumers": { + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/relationships/remote-state-consumers" + } + }, + "ssh-key": { + "data": { + "id": "sshkey-hjy7ndEkmCtn31ps", + "type": "ssh-keys" + }, + "links": { + "related": "/api/v2/ssh-keys/sshkey-hjy7ndEkmCtn31ps" + } + }, + "locked-by": { + "data": { + "id": "user-hjy7ndEkmCtn31ps", + "type": "users" + }, + "links": { + "related": "/api/v2/users/user-hjy7ndEkmCtn31ps" + } + }, + "vars": { + "data": [ + { + "id": "var-hjy7ndEkmCtn31ps", + "type": "vars" + } + ] + }, + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspace.mdx b/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspace.mdx new file mode 100644 index 000000000..ec7885457 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspace.mdx @@ -0,0 +1,195 @@ +```json +{ + "data": { + "id": "ws-6jrRyVDv1J8zQMB5", + "type": "workspaces", + "attributes": { + "actions": { + "is-destroyable": true + }, + "allow-destroy-plan": true, + "assessments-enabled": false, + "auto-apply": false, + "auto-apply-run-trigger": false, + "auto-destroy-at": null, + "auto-destroy-status": null, + "auto-destroy-activity-duration": null, + "inherits-project-auto-destroy": null, + "created-at": "2021-08-16T21:22:49.566Z", + "description": null, + "environment": "default", + "execution-mode": "agent", + "file-triggers-enabled": true, + "global-remote-state": false, + "latest-change-at": "2021-08-16T21:22:49.566Z", + "last-assessment-result-at" : "2021-08-17T21:20:12.908Z", + "locked": true, + "locked-reason": null, + "name": "workspace-1", + "oauth-client-name": null, + "operations": true, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-queue-run": true, + "can-read-run": true, + "can-read-variable": true, + "can-update-variable": true, + "can-read-state-versions": true, + "can-read-state-outputs": true, + "can-create-state-versions": true, + "can-queue-apply": true, + "can-lock": true, + "can-unlock": true, + "can-force-unlock": true, + "can-read-settings": true, + "can-manage-tags": true, + "can-manage-run-tasks": true, + "can-force-delete": true, + "can-manage-assessments": true, + "can-manage-ephemeral-workspaces": false, + "can-read-assessment-results": true, + "can-queue-destroy": true + }, + "apply-duration-average": 35000, + "plan-duration-average": 53000, + "policy-check-failures": null, + "queue-all-runs": false, + "resource-count": 10, + "run-failures": 3, + "source": "tfe-api", + "source-name": null, + "source-url": null, + "speculative-enabled": true, + "structured-run-output-enabled": true, + "tag-names": [], + "terraform-version": "1.9.4", + "trigger-prefixes": [], + "updated-at": "2021-08-16T21:22:49.566Z", + "vcs-repo": null, + "vcs-repo-identifier": null, + "working-directory": null, + "workspace-kpis-runs-count": 8, + "setting-overwrites": { + "execution-mode": true, + "agent-pool": true + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/workspaces/workspace-1", + "self-html": "/app/my-organization/workspaces/workspace-1" + }, + "relationships": { + "agent-pool": { + "data": { + "id": "apool-QxGd2tRjympfMvQc", + "type": "agent-pools" + } + }, + "current-configuration-version": { + "data": null + }, + "current-run": { + "data": { + "id": "run-hjy7ndEkmCtn31ps", + "type": "runs" + }, + "links": { + "related": "/api/v2/runs/run-hjy7ndEkmCtn31ps" + } + }, + "latest-run": { // Deprecated; same as current-run + "data": { + "id": "run-hjy7ndEkmCtn31ps", + "type": "runs" + }, + "links": { + "related": "/api/v2/runs/run-hjy7ndEkmCtn31ps" + } + }, + "current-state-version": { + "data": { + "id": "sv-hjy7ndEkmCtn31ps", + "type": "state-versions" + }, + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/current-state-version" + } + }, + "current-configuration-version": { + "data": { + "id": "cv-hjy7ndEkmCtn31ps", + "type": "configuration-versions" + }, + "links": { + "related": "/api/v2/configuration-versions/cv-hjy7ndEkmCtn31ps" + } + }, + "current-assessment-result": { + "data": null + }, + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-hjy7ndEkmCtn31ps", + "type": "workspace-outputs" + }, + { + "id": "wsout-hjy7ndEkmCtn31ps", + "type": "workspace-outputs" + } + ], + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/current-state-version-outputs" + } + }, + "project": { + "data": { + "id": "prj-hjy7ndEkmCtn31ps", + "type": "projects" + } + }, + "readme": { + "data": null + }, + "remote-state-consumers": { + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/relationships/remote-state-consumers" + } + }, + "ssh-key": { + "data": { + "id": "sshkey-hjy7ndEkmCtn31ps", + "type": "ssh-keys" + }, + "links": { + "related": "/api/v2/ssh-keys/sshkey-hjy7ndEkmCtn31ps" + } + }, + "locked-by": { + "data": { + "id": "user-hjy7ndEkmCtn31ps", + "type": "users" + }, + "links": { + "related": "/api/v2/users/user-hjy7ndEkmCtn31ps" + } + }, + "vars": { + "data": [ + { + "id": "var-hjy7ndEkmCtn31ps", + "type": "vars" + } + ] + }, + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspaces-list.mdx b/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspaces-list.mdx new file mode 100644 index 000000000..0d73d52e7 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/api-code-blocks/workspaces-list.mdx @@ -0,0 +1,214 @@ +```json +{ + "data": [ + { + "id": "ws-6jrRyVDv1J8zQMB5", + "type": "workspaces", + "attributes": { + "actions": { + "is-destroyable": true + }, + "allow-destroy-plan": true, + "assessments-enabled": false, + "auto-apply": false, + "auto-apply-run-trigger": false, + "auto-destroy-at": null, + "auto-destroy-status": null, + "auto-destroy-activity-duration": null, + "inherits-project-auto-destroy": null, + "created-at": "2021-08-16T21:22:49.566Z", + "description": null, + "environment": "default", + "execution-mode": "agent", + "file-triggers-enabled": true, + "global-remote-state": false, + "latest-change-at": "2021-08-16T21:22:49.566Z", + "last-assessment-result-at" : "2021-08-17T21:20:12.908Z", + "locked": true, + "locked-reason": null, + "name": "workspace-1", + "oauth-client-name": null, + "operations": true, + "permissions": { + "can-update": true, + "can-destroy": true, + "can-queue-run": true, + "can-read-run": true, + "can-read-variable": true, + "can-update-variable": true, + "can-read-state-versions": true, + "can-read-state-outputs": true, + "can-create-state-versions": true, + "can-queue-apply": true, + "can-lock": true, + "can-unlock": true, + "can-force-unlock": true, + "can-read-settings": true, + "can-manage-tags": true, + "can-manage-run-tasks": true, + "can-force-delete": true, + "can-manage-assessments": true, + "can-manage-ephemeral-workspaces": false, + "can-read-assessment-results": true, + "can-queue-destroy": true + }, + "apply-duration-average": 35000, + "plan-duration-average": 53000, + "policy-check-failures": null, + "queue-all-runs": false, + "resource-count": 10, + "run-failures": 3, + "source": "tfe-api", + "source-name": null, + "source-url": null, + "speculative-enabled": true, + "structured-run-output-enabled": true, + "tag-names": [], + "terraform-version": "1.9.4", + "trigger-prefixes": [], + "updated-at": "2021-08-16T21:22:49.566Z", + "vcs-repo": null, + "vcs-repo-identifier": null, + "working-directory": null, + "workspace-kpis-runs-count": 8, + "setting-overwrites": { + "execution-mode": true, + "agent-pool": true + } + }, + "links": { + "self": "/api/v2/organizations/my-organization/workspaces/workspace-1", + "self-html": "/app/my-organization/workspaces/workspace-1" + }, + "relationships": { + "agent-pool": { + "data": { + "id": "apool-QxGd2tRjympfMvQc", + "type": "agent-pools" + } + }, + "current-configuration-version": { + "data": null + }, + "current-run": { + "data": { + "id": "run-hjy7ndEkmCtn31ps", + "type": "runs" + }, + "links": { + "related": "/api/v2/runs/run-hjy7ndEkmCtn31ps" + } + }, + "latest-run": { // Deprecated; same as current-run + "data": { + "id": "run-hjy7ndEkmCtn31ps", + "type": "runs" + }, + "links": { + "related": "/api/v2/runs/run-hjy7ndEkmCtn31ps" + } + }, + "current-state-version": { + "data": { + "id": "sv-hjy7ndEkmCtn31ps", + "type": "state-versions" + }, + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/current-state-version" + } + }, + "current-configuration-version": { + "data": { + "id": "cv-hjy7ndEkmCtn31ps", + "type": "configuration-versions" + }, + "links": { + "related": "/api/v2/configuration-versions/cv-hjy7ndEkmCtn31ps" + } + }, + "current-assessment-result": { + "data": null + }, + "organization": { + "data": { + "id": "my-organization", + "type": "organizations" + } + }, + "outputs": { + "data": [ + { + "id": "wsout-hjy7ndEkmCtn31ps", + "type": "workspace-outputs" + }, + { + "id": "wsout-hjy7ndEkmCtn31ps", + "type": "workspace-outputs" + } + ], + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/current-state-version-outputs" + } + }, + "project": { + "data": { + "id": "prj-hjy7ndEkmCtn31ps", + "type": "projects" + } + }, + "readme": { + "data": null + }, + "remote-state-consumers": { + "links": { + "related": "/api/v2/workspaces/ws-6jrRyVDv1J8zQMB5/relationships/remote-state-consumers" + } + }, + "ssh-key": { + "data": { + "id": "sshkey-hjy7ndEkmCtn31ps", + "type": "ssh-keys" + }, + "links": { + "related": "/api/v2/ssh-keys/sshkey-hjy7ndEkmCtn31ps" + } + }, + "locked-by": { + "data": { + "id": "user-hjy7ndEkmCtn31ps", + "type": "users" + }, + "links": { + "related": "/api/v2/users/user-hjy7ndEkmCtn31ps" + } + }, + "vars": { + "data": [ + { + "id": "var-hjy7ndEkmCtn31ps", + "type": "vars" + } + ] + }, + } + }, + ], + "links": { + "first": "https://app.terraform.io/api/v2/workspaces?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "last": "https://app.terraform.io/api/v2/workspaces?page%5Bnumber%5D=1&page%5Bsize%5D=20", + "next": null, + "prev": null, + "self": "https://app.terraform.io/api/v2/workspaces?page%5Bnumber%5D=1&page%5Bsize%5D=20" + }, + "meta": { + "pagination": { + "current-page": 1, + "next-page": null, + "page-size": 20, + "prev-page": null, + "total-count": 1, + "total-pages": 1 + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/partials/common-kubernetes-blocks/externalizing-secret-values.mdx b/content/terraform-enterprise/v000011-1/docs/partials/common-kubernetes-blocks/externalizing-secret-values.mdx new file mode 100644 index 000000000..9c1a24ac8 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/common-kubernetes-blocks/externalizing-secret-values.mdx @@ -0,0 +1,17 @@ +### Externalizing secret values + +The Terraform Enterprise deployment configuration requires several secret values, such as keys, passwords, and certificates. You can populate these as part of the Helm `overrides.yaml` created before installation. However, this requires manual handling of secret values and may leave them exposed on the deployment host without further intervention. + +To mitigate this security concern, HashiCorp recommends populating these secret values into a Kubernetes Secret from a centralized secrets management platform using a trusted orchestrator like the [Vault Secrets Operator](https://developer.hashicorp.com/vault/docs/platform/k8s/vso) before installing Terraform Enterprise. + +You can then reference the Kubernetes Secret in the Terraform Enterprise Helm Chart: + +```yaml +env: + secretRefs: + - name: terraform-enterprise-managed-secrets +``` + +Terraform Enterprise also supports the [Vault CSI provider](https://developer.hashicorp.com/vault/docs/platform/k8s/csi). +This allows TFE pods to consume Vault secrets using CSI Secrets Store volumes. +More information can be found in the [Helm Chart documentation](https://github.com/hashicorp/terraform-enterprise-helm/blob/main/docs/configuration.md#vault-csi-provider). diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/active-active-scaling-partial.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/active-active-scaling-partial.mdx new file mode 100644 index 000000000..59493e52f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/active-active-scaling-partial.mdx @@ -0,0 +1,44 @@ +## Scaling Beyond Two Nodes + +Terraform Enterprise supports scaling up to five nodes as part of the Active/Active deployment. When scaling beyond two nodes, you should also carefully evaluate and scale external services, particularly the database server. Regardless of the number of nodes, you must drain and scale down to a single node before upgrading. + +### PostgreSQL Server + +The Terraform Enterprise PostgreSQL server will typically hit the CPU capacity before other resources, so we recommend closely monitoring the CPU in a two-node configuration before scaling up to three or more nodes. You may also need to manually modify the database maximum connection count to allow for the additional load. Defaults vary, so please refer to the documentation for the cloud hosting your installation. + +- [AWS - RDS connection limits](https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Limits.html#RDS_Limits.MaxConnections) +- [AWS - Aurora Scaling](https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/AuroraMySQL.Managing.Performance.html) +- [Azure - Azure Database Limits](https://docs.microsoft.com/en-us/azure/postgresql/concepts-limits) +- [Google Cloud - Cloud SQL Quotes and Limits](https://cloud.google.com/sql/docs/quotas) +- [PostgreSQL 12 - Connection Documentation](https://www.postgresql.org/docs/12/runtime-config-connection.html) + +### Redis Server + +Some workloads may rarely cause spikes in the Redis server CPU or memory. We recommend monitoring the Redis server and scaling it up as necessary. + +- [AWS - Monitoring ElastiCache for Redis with CloudWatch](https://aws.amazon.com/blogs/database/monitoring-best-practices-with-amazon-elasticache-for-redis-using-amazon-cloudwatch/) +- [Azure - Monitor Azure Cache for Redis](https://docs.microsoft.com/en-us/azure/azure-cache-for-redis/cache-how-to-monitor) +- [Google Cloud - Monitoring Redis Instances](https://cloud.google.com/memorystore/docs/redis/monitoring-instances) + +### Network Infrastructure/API Limits + +As you scale Terraform Enterprise beyond two nodes, you may be adding additional stress to your network and dramatically increasing the number of API calls made in your cloud account. Each cloud has its own default limits and processes by which those limits might be increased. Please refer to the documentation for the cloud hosting your installation. + +- [AWS - EC2 instance network limits](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-network-bandwidth.html) +- [AWS - Request Throttling for the EC2 API](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/throttling.html) +- [Azure - Virtual Machine Network Limits](https://docs.microsoft.com/en-us/azure/virtual-network/virtual-machine-network-throughput) +- [Azure - Resource Manager Throttling](https://docs.microsoft.com/en-us/azure/azure-resource-manager/management/request-limits-and-throttling) +- [Google Cloud - Network Quotas and Limits](https://cloud.google.com/vpc/docs/quota) +- [Google Cloud - API rate limits](https://cloud.google.com/compute/docs/api-rate-limits) + +Depending on your infrastructure and Terraform Enterprise configuration, you may need to configure your application gateway or load balancer for sticky sessions. Sticky session refers to the practice of using a load balancer or gateway device with a specific setting enabled that ensures traffic is routed back to the original system that initiated a request. For example, an Active/Active deployment on Azure with SAML authentication requires sticky sessions to ensure the authentication with the SAML server is successful. The terminology for this varies across clouds. Refer to the documentation for your infrastructure. + +- [AWS - Sticky Sessions for your Application Load Balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/sticky-sessions.html) +- [AWS - Configure sticky sessions for your Classic Load Balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-sticky-sessions.html) +- [Azure - Application Gateway Cookie-based affinity](https://docs.microsoft.com/en-us/azure/application-gateway/configuration-http-settings#cookie-based-affinity) +- [Azure - Load Balancer distribution modes: Session Persistence](https://docs.microsoft.com/en-us/azure/load-balancer/distribution-mode-concepts#session-persistence) +- [Google Cloud - Session affinity](https://cloud.google.com/load-balancing/docs/https#session_affinity) + +### HCP Terraform agents - Alternative Solution + +Instead of scaling Terraform Enterprise beyond two to five nodes, you can use [HCP Terraform agents](/terraform/enterprise/admin/agents-on-tfe). HCP Terraform agents can run in other regions, other clouds, and even private clouds. Agents poll Terraform Enterprise for work and then Terraform plans and applies will run on the target system that has the agent executable installed. This has a much smaller impact on the Terraform Enterprise servers than running Terraform locally. diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/license-example-usage-payload.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/license-example-usage-payload.mdx new file mode 100644 index 000000000..908d1967b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/license-example-usage-payload.mdx @@ -0,0 +1,167 @@ +### Product data collection reference + +The following JSON payload describes the product usage data that Terraform Enterprise collects. + +```json +{ + "version":"2", + "mode": "automatic", + "timestamp":"${TIME_OF_EXPORT}", + "signature": "${UUID}", + "checksum": "${UUID}", + "snapshots":[ + { + "snapshot_version":2, + "id":"${SNAPSHOT_ID}", + "timestamp":"${TIME_OF_EXPORT}", + "schema_version":"2.0.1", + "product":"terraform", + "process_id":"${PROCESS_ID}", + "product_version":"${TFE_VERSION}", + "license_id":"${LICENSE_IDENTIFIER}", + "checksum": "${SHA}", + "metrics":{ + "billable_rum_count":{ + "key": "billable_rum_count", + "value": 1, + "mode": "write" + }, + "billable_rum_count_workspace_80th_percentile":{ + "key": "billable_rum_count_workspace_80th_percentile", + "value": 1, + "mode": "write" + }, + "billable_rum_count_workspace_avg":{ + "key": "billable_rum_count_workspace_avg", + "value": 1, + "mode": "write" + }, + "billable_rum_count_workspace_max":{ + "key": "billable_rum_count_workspace_max", + "value": 1, + "mode": "write" + }, + "billable_rum_count_workspace_median":{ + "key": "billable_rum_count_workspace_median", + "value": 1, + "mode": "write" + }, + "billable_rum_count_workspace_min":{ + "key": "billable_rum_count_workspace_min", + "value": 1, + "mode": "write" + }, + "billable_rum_opt_in":{ + "key": "billable_rum_opt_in", + "value": 1, + "mode": "write" + }, + "ado_vcs_present":{ + "key": "ado_vcs_present", + "value": 1, + "mode": "write" + }, + "aws_provider_present":{ + "key": "aws_provider_present", + "value": 1, + "mode": "write" + }, + "azure_provider_present":{ + "key": "azure_provider_present", + "value": 1, + "mode": "write" + }, + "bitbucket_vcs_present":{ + "key": "bitbucket_vcs_present", + "value": 1, + "mode": "write" + }, + "continuous_validation_used_last_90_days":{ + "key": "continuous_validation_used_last_90_days", + "value": 1, + "mode": "write" + }, + "drift_detection_used_last_90_days":{ + "key": "drift_detection_used_last_90_days", + "value": 1, + "mode": "write" + }, + "gcp_provider_present":{ + "key": "gcp_provider_present", + "value": 1, + "mode": "write" + }, + "github_vcs_present":{ + "key": "github_vcs_present", + "value": 1, + "mode": "write" + }, + "gitlab_vcs_present":{ + "key": "gitlab_vcs_present", + "value": 1, + "mode": "write" + }, + "product_usage_reporting_opt_in":{ + "key": "product_usage_reporting_opt_in", + "value": 1, + "mode": "write" + }, + "run_tasks_used_last_90_days":{ + "key": "run_tasks_used_last_90_days", + "value": 1, + "mode": "write" + }, + "run_triggers_used_last_90_days":{ + "key": "run_triggers_used_last_90_days", + "value": 1, + "mode": "write" + }, + "sentinel_used_last_90_days":{ + "key": "sentinel_used_last_90_days", + "value": 1, + "mode": "write" + }, + "servicenow_catalog_billable_rum_count":{ + "key": "servicenow_catalog_billable_rum_count", + "value": 1, + "mode": "write" + }, + "servicenow_catalog_run_count":{ + "key": "servicenow_catalog_run_count", + "value": 1, + "mode": "write" + }, + "servicenow_catalog_workspace_count":{ + "key": "servicenow_catalog_workspace_count", + "value": 1, + "mode": "write" + }, + "teams_count":{ + "key": "teams_count", + "value": 1, + "mode": "write" + }, + "varsets_count":{ + "key": "varsets_count", + "value": 1, + "mode": "write" + }, + "workspacecount":{ + "key": "workspacecount", + "value": 1, + "mode": "write" + }, + "private_modules_count":{ + "key":"private_modules_count", + "value": 1, + "mode":"write" + }, + } + } + ], + "metadata":{ + + } + } +} +``` diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/license-utilization-intro.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/license-utilization-intro.mdx new file mode 100644 index 000000000..68bc1731b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/admin/license-utilization-intro.mdx @@ -0,0 +1,33 @@ +# License and product usage reporting + +This topic describes how to enable Terraform Enterprise to report license and product usage information to HashiCorp. This topic also outlines how HashiCorp uses license and product data it collects when automated data reporting is enabled. It is enabled by default, but automated license and product utilization data reporting can be disabled separately. + +## Data reporting privacy + +The process is GDPR compliant and consists of mostly computed metrics that never contain personal identifiable information (PII) or other sensitive information. Automated reporting shares the data with HashiCorp using a secure, unidirectional HTTPS API and makes an auditable record in the product logs each time it submits a report. + +## Enable automated license utilization reporting + +When automated license usage reporting is enabled, Terraform sends HashiCorp the minimum data required to validate license usage as defined in our contracts. As a result, you do not have to manually collect and report the usage data. + +License usage reports provide the following benefits: + +- Insight into how much more you can deploy under your current contract. +- Protection against over-utilization. +- Predictable consumption for budgeting purposes. + +Additionally, you can review license usage with your existing monitoring solutions, such as Splunk and Datadog. Monitoring license consumption enables you to optimize and manage your deployments. For instructions on how to forward your license usage data to a monitoring solution, refer to the following topics for instructions on forwarding logs: +- [Enable log forwarding on Replicated installations](/terraform/enterprise/deploy/replicated/monitoring/logging) +- [Enable log forwarding on non-Replicated installations](/terraform/enterprise/deploy/manage/monitor#external-log-forwarding). + + +To enable automated reporting, you need to make sure that outbound network traffic is configured correctly and upgrade your enterprise product to a version that supports it. If your installation is air-gapped or network settings are not in place, automated reporting will not work. + +### Allow outbound HTTPS traffic on port 443 + +Make sure that your network allows HTTPS egress on port 443 from `https://reporting.hashicorp.services` by allow-listing the following IP addresses: + +- `100.20.70.12` +- `35.166.5.22` +- `23.95.85.111` +- `44.215.244.1` diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/architecture/data-security-partial.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/architecture/data-security-partial.mdx new file mode 100644 index 000000000..3e54c6d45 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/architecture/data-security-partial.mdx @@ -0,0 +1,49 @@ +# Data Security + +HCP Terraform takes the security of the data it manages +seriously. This table lists which parts of the HCP Terraform and Terraform Enterprise app can contain sensitive data, what storage is used, and what encryption is used. + +### HCP Terraform and Enterprise + +| Object | Storage | Encrypted | +| :----------------------------------- | :----------- | :----------------------- | +| Ingressed VCS Data | Blob Storage | Vault Transit Encryption | +| Terraform Plan Result | Blob Storage | Vault Transit Encryption | +| Terraform State | Blob Storage | Vault Transit Encryption | +| Terraform Logs | Blob Storage | Vault Transit Encryption | +| Terraform/Environment Variables | PostgreSQL | Vault Transit Encryption | +| Organization/Workspace/Team Settings | PostgreSQL | No | +| Account Password | PostgreSQL | bcrypt | +| 2FA Recovery Codes | PostgreSQL | Vault Transit Encryption | +| SSH Keys | PostgreSQL | Vault Transit Encryption | +| User/Team/Organization Tokens | PostgreSQL | HMAC SHA512 | +| OAuth Client ID + Secret | PostgreSQL | Vault Transit Encryption | +| OAuth User Tokens | PostgreSQL | Vault Transit Encryption | + +### Terraform Enterprise Specific + +| Object | Storage | Encrypted | +| :--------------------------- | :--------- | :----------------------- | +| Twilio Account Configuration | PostgreSQL | Vault Transit Encryption | +| SMTP Configuration | PostgreSQL | Vault Transit Encryption | +| SAML Configuration | PostgreSQL | Vault Transit Encryption | +| Vault Unseal Key | PostgreSQL | ChaCha20+Poly1305 | + +## Vault Transit Encryption + +The [Vault Transit Secret Engine](/vault/docs/secrets/transit) +handles encryption for data in-transit and is used when encrypting data from the +application to persistent storage. + +## Blob Storage Encryption + +All objects persisted to blob storage are symmetrically encrypted prior to being +written. Each object is encrypted with a unique encryption key. Objects are +encrypted using 128 bit AES in CTR mode. The key material is processed +through the [Vault transit secret engine](/vault/docs/secrets/transit), +which uses the default transit encryption cipher (AES-GCM with a 256-bit AES key +and a 96-bit nonce), and stored alongside the object. This pattern is called envelope encryption. + +The Vault transit secret engine's +[datakey generation](/vault/api-docs/secret/transit#generate-data-key) creates the encryption key material using bit material from the kernel's cryptographically secure pseudo-random +number generator (CSPRNG) as the `context` value. Blob storage encryption generates a unique key for each object and relies on envelope encryption, so Vault does not rotate the encryption key material for individual objects. The root encryption keys within the envelope encryption scheme are rotated automatically by HCP Terraform every 365 days. These keys are not automatically rotated within TFE. diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/architecture/security-model-partial.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/architecture/security-model-partial.mdx new file mode 100644 index 000000000..d6f8d426d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/architecture/security-model-partial.mdx @@ -0,0 +1,86 @@ +## Personas + +In addition to those listed in [HCP Terraform Security model](/terraform/cloud-docs/architectural-details/security-model), Terraform Enterprise requires the following personas for managing and administering the application. + +### Infrastructure Admin + +Outside of the application, administrators of the Terraform Enterprise deployment are responsible for managing the underlying infrastructure, upgrading the application, and configuring Terraform Enterprise either via the [Replicated admin console](/terraform/enterprise/deploy/replicated/install/interactive/config#system-configuration) or by editing the [application settings file](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer). + +Terraform Enterprise grants extensive permissions to this role, so we recommend limiting the number of users who are infrastructure admins in your organization. + +### Site Admin + +[Site admins](/terraform/enterprise/application-administration/admin-access) are responsible for application-level configuration of Terraform Enterprise. They can manage all users, workspaces, and organizations through the admin interface and have access to all data stored within Terraform Enterprise. Site admins are also responsible for configuring SAML and are the only users that can access Terraform Enterprise with a username and password once SAML is configured. + +Terraform Enterprise grants extensive permissions to this role, so we recommend limiting the number of users who are site admins in your organization. + +## Differences Between Terraform Enterprise and HCP Terraform Security Models + +All of the content on [HCP Terraform security model](/terraform/cloud-docs/architectural-details/security-model) applies to Terraform Enterprise, with the exception of the points listed below. + +### Terraform Enterprise Requires You to Manage and Secure the Underlying Network and Infrastructure + +Infrastructure admins are required to manage all aspects of the underlying infrastructure. This includes initial provisioning, secure configuration, access control, network ACL configuration, and OS-level software updates. Terraform Enterprise cannot ensure the security of your data if the underlying infrastructure is compromised. + +### You are Responsible for Updating Your Terraform Enterprise Deployment + +We release security fixes, application features, and bug fixes for Terraform Enterprise each month. Infrastructure admins are responsible for applying updates. + +### You are Responsible for Availability, Backups, and Disaster Recovery + +Infrastructure admins are responsible for all aspects of reliability and availability. Refer to Terraform Enterprise documentation on [monitoring](/terraform/enterprise/deploy/replicated/monitoring/monitoring), [backups and restores](/terraform/enterprise/deploy/replicated/administration/infrastructure/backup-restore), and [high availability mode (active/active)](/terraform/enterprise/deploy/replicated/administration/infrastructure/admin-cli) for more guidance on this topic. + +### Terraform Enterprise Isolates Terraform Operations via Docker Containers + +Unlike HCP Terraform, Terraform Enterprise performs all Terraform operations in Docker containers on the Terraform Enterprise host. The containers are assigned to an isolated Docker network to prevent them from communicating with Terraform Enterprise backend services. However, Terraform Enterprise does not perform any egress filtering, so Terraform runs can still access available network resources. + +### Terraform Enterprise Relies on Third Party Software for Licensing, Delivery, Installation, and Management + +Terraform Enterprise is built on top of a software platform developed by [Replicated](https://www.replicated.com/). The components necessary for installing Terraform Enterprise are hosted by Replicated, and software developed by Replicated is used for bootstrapping, configuring, and managing every Terraform Enterprise deployment. For more information, see [Security at Replicated](https://www.replicated.com/security/). + +## Recommendations for Securely Operating Terraform Enterprise + +In addition those provided in the [HCP Terraform security model](/terraform/cloud-docs/architectural-details/security-model), we recommend the following for Terraform Enterprise users. + +### Run Terraform Enterprise in an Isolated Network, Limit Ingress Ports, and Restrict Access to Underlying Infrastructure + +To minimize attack surface, we recommend running Terraform Enterprise in an isolated network and limiting ingress ports to only 80 and 443, as documented in [Network Requirements for Terraform Enterprise](/terraform/enterprise/deploy/replicated/requirements/network). + +Additionally, we recommend restricting access to the nodes that are running Terraform Enterprise. Terraform Enterprise can not ensure the security or integrity of your data if the underlying infrastructure is compromised. + +### Enable Optional Security Features + +Once you are ready to use Terraform Enterprise for production workloads, we recommend enabling these optional security features. + +#### Secure secondary hostnames + +You can configure Terraform Enterprise to allow incoming connections at more than one hostname. Refer to [Configure network access](/terraform/enterprise/deploy/configuration/network) for instructions. + +When configuring multiple hostnames, create and distribute TLS certificates for the secondary hostname in addition to the primary hostname. Refer to [TLS settings](/terraform/enterprise/deploy/reference/configuration#tls-settings) in the deployment configuration reference for additional information. + +#### Enable Strict Transport Security Header + +You can configure Terraform Enterprise to set the [Strict Transport Security (HSTS)](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security) header by: + +- Visiting the installer dashboard "Settings" page and enabling “Force TLS” under the “SSL/TLS Configuration” section. +- Setting [force_tls](/terraform/enterprise/deploy/replicated/install/automated/automating-the-installer#force_tls) in the application settings file. + +~> **Note:** Once properly configured, the HSTS header cannot be disabled and will prevent clients from accessing your Terraform Enterprise domain via HTTP or HTTPS using a self-signed cert. We recommend only enabling this setting for production Terraform Enterprise deployments. + +#### Disable Global Remote State Sharing + +Terraform Enterprise allows site admins to enable [global remote state sharing](/terraform/enterprise/application-administration/general#remote-state-sharing), which allows any workspace to access the state versions of any other workspace within the same organization. We recommend disabling this feature and relying on [controlled remote state access](https://www.hashicorp.com/blog/announcing-controlled-remote-state-access-for-terraform-cloud-and-enterprise) if you need to share state between workspaces. + +#### Treat Support Bundles with Care + +Terraform Enterprise uses support bundles to share diagnostic information with HashiCorp support. Please note that support bundles may contain sensitive information from your Terraform Enterprise installation. You should not share them with untrusted parties and should delete them as soon as possible. + +#### Update Terraform Enterprise Often + +We release Terraform Enterprise updates each month. Updates may contain additional security features or fixes for existing security vulnerabilities, so we recommend establishing a process for periodically updating your Terraform Enterprise installation. + +#### Subscribe to Terraform Enterprise Security Bulletins + +We publish updates that address security vulnerabilities in HashiCorp products. You can find them in the Security category of [HashiCorp Discuss](https://discuss.hashicorp.com/c/security/). + +We recommend that Terraform Enterprise infrastructure admins follow the [documented steps](https://discuss.hashicorp.com/t/about-hashicorp-security-updates/15330) to subscribe to email notifications or the RSS feed for Terraform Enterprise security updates. diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/monitoring/logging/supported-destinations-partial.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/monitoring/logging/supported-destinations-partial.mdx new file mode 100644 index 000000000..c1279b192 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/monitoring/logging/supported-destinations-partial.mdx @@ -0,0 +1,178 @@ +### Amazon CloudWatch + +Sending to Amazon CloudWatch is only supported when Terraform Enterprise is +located within AWS due to how Fluent Bit reads AWS credentials. + +This example configuration forwards all logs to Amazon CloudWatch. Refer to the +[`cloudwatch_logs` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/cloudwatch) +for more information. + +```ini +[OUTPUT] + Name cloudwatch_logs + Match * + region us-east-1 + log_group_name example-log-group + log_stream_name example-log-stream + auto_create_group On +``` + +-> **Note:** In Terraform Enterprise installations using AWS external services, +Fluent Bit will have access to the same `AWS_ACCESS_KEY_ID` and +`AWS_SECRET_ACCESS_KEY` environment variables that are used for object storage. + +### Amazon S3 + +Sending to Amazon S3 is only supported when Terraform Enterprise is located +within AWS due to how Fluent Bit reads AWS credentials. + +This example configuration forwards all logs to Amazon S3. Refer to the +[`s3` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/s3) +for more information. + +```ini +[OUTPUT] + Name s3 + Match * + bucket example-bucket + region us-east-1 + total_file_size 250M + s3_key_format /$TAG/%Y/%m/%d/%H/%M/%S/$UUID.gz + s3_key_format_tag_delimiters .- +``` + +-> **Note:** In Terraform Enterprise installations using AWS external services, +Fluent Bit will have access to the same `AWS_ACCESS_KEY_ID` and +`AWS_SECRET_ACCESS_KEY` environment variables that are used for object storage. + +### Azure Blob Storage + +This example configuration forwards all logs to Azure Blob Storage. Refer to the +[`azure_blob` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/azure_blob) +for more information. + +```ini +[OUTPUT] + name azure_blob + match * + account_name example-account-name + shared_key example-access-key + path logs + container_name example-container-name + auto_create_container on + tls on +``` + +### Azure Log Analytics + +This example configuration forwards all logs to Azure Log Analytics. Refer to +the [`azure` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/azure) +for more information. + +```ini +[OUTPUT] + name azure + match * + Customer_ID example-log-analytics-workspace-id + Shared_Key example-access-key +``` + +### Datadog + +This example configuration forwards all logs to Datadog. Refer to the +[`datadog` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/datadog) +for more information. + +```ini +[OUTPUT] + Name datadog + Match * + Host http-intake.logs.datadoghq.com + TLS on + compress gzip + apikey example-api-key + dd_service terraform_enterprise + dd_source docker + dd_tags environment:development,owner:engineering +``` + +### Forward + +This example configuration forwards all logs to a listening Fluent Bit or +Fluentd instance. Refer to the +[`forward` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/forward) +for more information. + +```ini +[OUTPUT] + Name forward + Match * + Host fluent.example.com + Port 24224 +``` + +### Google Cloud Platform Cloud Logging + +Sending to Google Cloud Platform Cloud Logging is only supported when Terraform +Enterprise is located within GCP due to how Fluent Bit reads GCP credentials. + +This example configuration forwards all logs to Google Cloud Platform Cloud +Logging (formerly known as Stackdriver). Refer to the +[`stackdriver` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/stackdriver) +for more information. + +```ini +[OUTPUT] + Name stackdriver + Match * + location us-east1 + namespace terraform_enterprise + node_id example-hostname + resource generic_node +``` + +-> **Note:** In Terraform Enterprise installations using GCP external services, +Fluent Bit will have access to the `GOOGLE_SERVICE_CREDENTIALS` environment +variable that points to a file containing the same GCP Service Account JSON +credentials that are used for object storage. + +### Splunk Enterprise HTTP Event Collector (HEC) + +This example configuration forwards all logs to Splunk Enterprise via the HTTP +Event Collector (HEC) interface. Refer to the +[`splunk` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/splunk) +for more information. + +```ini +[OUTPUT] + Name splunk + Match * + Host example-splunk-hec-endpoint + Port 8088 + Splunk_Token example-splunk-token +``` + +### Syslog + +This example configuration forwards all logs to a Syslog-compatible endpoint. +Refer to the +[`syslog` Fluent Bit output plugin documentation](https://docs.fluentbit.io/manual/pipeline/outputs/syslog) +for more information. + +```ini +[OUTPUT] + Name syslog + Match * + host example-syslog-host + port 514 + mode tcp + syslog_message_key log + syslog_severity_key PRIORITY + syslog_hostname_key _HOSTNAME + syslog_appname_key SYSLOG_IDENTIFIER + syslog_procid_key _PID +``` + + +The `syslog_message_key` should not be changed from `log`. If that value is changed, the application will no longer forward logs. + \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/custom-image.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/custom-image.mdx new file mode 100644 index 000000000..49718a8a9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/custom-image.mdx @@ -0,0 +1,36 @@ +Terraform Enterprise performs Terraform runs in ephemeral containers, using a +built-in [tfc-agent](https://hub.docker.com/r/hashicorp/tfc-agent) container image by default. To add custom tools or logic to your +Terraform run environment, you must build a custom image and configure +Terraform Enterprise to use it. + +### Agent + +Build your custom image using the `Dockerfile` below. Then update the +`custom_agent_image_tag` setting with your image (e.g. +`registry.example.com/example/tfc-agent:custom-tag`). + +![The `custom_agent_image_tag` setting in the user interface.](/img/docs/tfe_console-custom_agent_image_tag.png) + +#### Requirements + +- The base image must be `hashicorp/tfc-agent:1.6.0` or later. + +#### Dockerfile + +```Dockerfile +FROM hashicorp/tfc-agent:latest + +# Switch the to root user in order to perform privileged actions such as +# installing software. +USER root + +# Install sudo. The container runs as a non-root user, but people may rely on +# the ability to apt-get install things. +RUN apt-get -y install sudo + +# Permit tfc-agent to use sudo apt-get commands. +RUN echo 'tfc-agent ALL=NOPASSWD: /usr/bin/apt-get , /usr/bin/apt' >> /etc/sudoers.d/50-tfc-agent + +# Switch back to the tfc-agent user as needed by Terraform agents. +USER tfc-agent +``` diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/minio-partial.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/minio-partial.mdx new file mode 100644 index 000000000..2875fd4c2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/minio-partial.mdx @@ -0,0 +1,93 @@ +# Minio Setup Guide for Terraform Enterprise + +This document provides an overview for setting up [Minio](https://minio.io) for external object storage for HashiCorp Terraform Enterprise. + +## Required Reading + +- Ensure you are familiar with Terraform Enterprise's operation and [installation requirements](/terraform/enterprise/deploy/replicated/install/pre-install-checklist), and especially the [Operational Mode Decision](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#operational-mode-decision). +- Familiarize yourself with [Minio](https://minio.io). + +## Overview + +When configured to use _External Services_, Terraform Enterprise must be connected to a storage service to persist workspace state and other file-based data. Native support exists for Azure Blob Storage, Amazon S3, and services that are API-compatible with Amazon S3. If you are not using Azure or a cloud provider with an S3-compatible service, or you are running Terraform Enterprise in an environment without a storage service, it may be possible to use [Minio](https://minio.io) instead. + +## Installation + +~> **Note:** This is not a production-ready configuration: it's intended to guide you to a working configuration that can later be automated and hardened. + +This guide will walk through installing Minio in a Docker container alongside Terraform Enterprise on the same host, with Terraform Enterprise configured in the _External Services_ [operational mode](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#choose-an-operational-mode). Data will not be persisted outside of an ephemeral Docker volume, Minio will not start on system boot, etc. The guide assumes your instance will have access to the Internet and that you will be performing an online install of Terraform Enterprise. + +### System preparation + +Ensure your Linux instance meets the [requirements](/terraform/enterprise/deploy/replicated/install/pre-install-checklist#configure-linux-instance). You will need [jq](https://stedolan.github.io/jq/) (a command-line JSON processor), and the [AWS CLI](https://aws.amazon.com/cli/). + +You also need a PostgreSQL database that meets the [requirements](/terraform/enterprise/deploy/replicated/requirements/data-storage/postgres-requirements), as this is part of the _External Services_ operational mode. + +### Terraform Enterprise installation + +Begin with an [online installation](/terraform/enterprise/deploy/replicated/install/interactive/installer#run-the-installer-online). Once the installation script has finished and you're presented with the following text, move on to the next section: + +``` +To continue the installation, visit the following URL in your browser: + + https://:8800 +``` + +### Start Minio + +Now you'll start the Minio container, mounting a volume so that you can gain access to the generated config: + +``` +docker run \ + -d \ + --name minio \ + -v /run/minio/config:/root/.minio \ + minio/minio:latest \ + -- \ + server /data +``` + +Ensure that Minio has started by watching for `/var/run/minio/config/config.json` to be written: + +``` +while [ ! -e /var/run/minio/config/config.json ]; do + sleep 3 +done +``` + +You now need to collect several pieces of information about your running Minio instance: + +- IP address of the running container: `docker inspect minio | jq -r .[0].NetworkSettings.IPAddress` +- Access key: `jq -r .credential.accessKey /var/run/minio/config/config.json` +- Secret key: `jq -r .credential.secretKey /var/run/minio/config/config.json` + +### Create a bucket + +Like S3, Minio does not automatically create buckets. Use the AWS CLI to create a bucket named `tfe` that will be used to store data: + +```bash +export AWS_ACCESS_KEY_ID="" +export AWS_SECRET_ACCESS_KEY="" + +aws --region us-east-1 --endpoint-url http://:9000 s3 mb s3://tfe +``` + +### Terraform Enterprise installation + +You may now [continue the installation in the browser](/terraform/enterprise/deploy/replicated/install/interactive/installer#continue-installation-in-browser). When you arrive at the Operational Mode choice in the installer, follow these steps: + +1. Choose the "Production" installation type. +1. Choose the _External Services_ operational mode. +1. Provide the required Database URL for the PostgreSQL configuration. +1. Choose "S3" for object storage. +1. Enter the access key and secret access key using the information retrieved from Minio. +1. Provide the endpoint URL, like: `http://:9000`. +1. Enter the name of the bucket you created above (`tfe` in the example). +1. Enter `us-east-1` for the region; this is arbitrary, but must be a valid AWS region. + **Note:** The "Test Authentication" button does not currently work for non-AWS endpoints. +1. Click "Save". + +## Next Steps + +- Familiarize yourself with the various storage backends provided by Minio. +- Make sure you know how to back up and restore the data written to Minio. diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/operation-modes-partial.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/operation-modes-partial.mdx new file mode 100644 index 000000000..6ae2d51f2 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/operation-modes-partial.mdx @@ -0,0 +1,48 @@ + +## Active/Active Mode + +Active/Active mode has the same requirements as External Services, with the additions of an external Redis server, and a fully automated install method. Specifically, Active/Active operational mode has the following additional requirements: + +- Redis server version `6.x` or `7.x` (recommended) +- Redis Cluster is _not_ supported. + +## Mounted Disk + +If you choose to use the Mounted Disk operational mode, Terraform Enterprise will manage its own PostgreSQL database and object storage using a separate directory on the host, with the intention that the directory is configured to store its data on an external disk, such as EBS, iSCSI, etc. + +We strongly suggest following the guidelines below for mounted disk storage. + +### Supported Mounted Disk Types + +The following are **supported** mounted disk types: + +- AWS EBS +- GCP Zonal Persistent Disk +- Azure Disk Storage +- iSCSI +- SAN +- Physically connected disks as in non-cloud hardware + +These disk types provide the necessary reliability and performance for data storage and retrieval in Terraform Enterprise. + +### Unsupported Mounted Disk Types + +The following are **generally not supported** mounted disk types: + +- NFS +- SMB/CIFS + +Terraform Enterprise's storage device or service must be highly reliable and high-speed in both I/O and connectivity to meet performance requirements. Device types in the supported list will usually meet these requirements, but many standard NAS and other device types will not perform at the level required. Only use a NAS or other device type not in the supported list if you are certain it can accommodate these requirements. +For more information about high-speed and highly available storage please see your storage vendor. + +### Mounted Disk Types Not Listed Here + +If the type of mounted disk you wish to use is not in either of the above lists, please contact your HashiCorp representative for clarification on whether that type is supported. + +### Minimum Disk Size + +Terraform Enterprise's minimum disk size is 40GB. + +Depending on your cloud or storage application, you may need to confirm the disk has been resized to at least 40GB. + +For example, with RedHat-flavor (RHEL, CentOS, Oracle Linux) images in Azure Cloud, the storage disk must be resized above the 30GB default after initial boot with `fdisk`, as documented in the Azure knowledge base article [How to: Resize Linux osDisk partition on Azure](https://blogs.msdn.microsoft.com/linuxonazure/2017/04/03/how-to-resize-linux-osdisk-partition-on-azure/). diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/postgres-partial.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/postgres-partial.mdx new file mode 100644 index 000000000..ca28b21bc --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/postgres-partial.mdx @@ -0,0 +1,46 @@ +To use an external PostgreSQL database with Terraform Enterprise, the following +requirements must be met: + +- A PostgreSQL server such as Amazon RDS for PostgreSQL or a PostgreSQL-compatible server such as Amazon Aurora PostgreSQL must be used. +- The PostgreSQL server version must be one of the following: + - 13.x, 14.4 and up, 15.x or 16.x + - 14.0, 14.1, 14.2, 14.3 are not supported due to a [known defect](https://www.postgresql.org/about/news/postgresql-144-released-2470/) in PostgreSQL. +- A PostgreSQL user must be created with the following permissions on the database: + - The ability to create, modify, and read all tables and indices on all schemas within the database. Usually this is granted if the user is an owner of the database. + - The ability to create extensions. If it is not feasible to have a user with the "CREATE EXTENSION" privilege, then refer to the [Creating Extensions](#creating-extensions) section below for information on creating the necessary extensions. +- The `rails`, `vault`, `registry`, `task_worker`, and `terraform_enterprise` PostgreSQL schemas must be created on the database. These schemas will be automatically created if they do not already exist. + +## Creating Extensions + +If the configured PostgreSQL user does not have permission to create PostgreSQL extensions +(i.e. is not a superuser), then run the following SQL commands to create the proper extensions: + +```sql +CREATE EXTENSION IF NOT EXISTS "hstore" WITH SCHEMA "rails"; +CREATE EXTENSION IF NOT EXISTS "uuid-ossp" WITH SCHEMA "rails"; +CREATE EXTENSION IF NOT EXISTS "citext" WITH SCHEMA "registry"; +``` + +## Connection Parameters + +When providing optional extra keyword parameters for the database connection, +note an additional restriction on the `sslmode` parameter is that only the +`require`, `verify-full`, `verify-ca`, and `disable` values are allowed. For +installations in External Services mode, the default value of `sslmode` is set +to `require`. For installations in Mounted Disk mode, the default value of +`sslmode` is set to `disable`. + +-> **Note:** See the PostgreSQL library documentation for more about [extra parameters related to sslmode](https://www.postgresql.org/docs/12/libpq-ssl.html). Terraform Enterprise provides a certificates file at `/etc/ssl/private/terraform-enterprise/bundle.pem`, which is required by the `verify-full` and `verify-ca` modes. If you are deploying with Replicated, you can add additional certificates with the [CA Custom Bundle](/terraform/enterprise/deploy/replicated/install/interactive/installer#certificate-authority-ca-bundle) setting. + +## PostgreSQL 9.5 to 12 Upgrade + +In Terraform Enterprise v202103-1, the internally-managed PostgreSQL server was upgraded from PostgreSQL 9.5 to PostgreSQL 12. This change only affected +installations in Mounted Disk mode. + +For more details, consult the v202103-1 [release notes](/terraform/enterprise/releases/2021/v202103-1). + +## PostgreSQL 12 to 14 Upgrade + +Terraform Enterprise v202207-1 upgraded the internally-managed PostgresQL server from v12 to v14. This change only affected Mounted disk installations. + +For more details, consult the v202207-1 [release notes](/terraform/enterprise/releases/2022/v202207-1) diff --git a/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/vault-partial.mdx b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/vault-partial.mdx new file mode 100644 index 000000000..aaea366b7 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/replicated-and-fdo/requirements/vault-partial.mdx @@ -0,0 +1,119 @@ + + +1. Enable the AppRole Auth Method. + +```sh +vault auth enable approle +``` + +1. Enable the Transit Secrets Engine. + +```sh +vault secrets enable transit +``` + +1. Create the `tfe-policy.hcl` file with the following content: + +```hcl +# To renew leases. +path "sys/leases/renew" { + capabilities = ["create", "update"] +} +path "sys/renew" { + capabilities = ["create", "update"] +} + +# To renew tokens. +path "auth/token/renew" { + capabilities = ["create", "update"] +} +path "auth/token/renew-self" { + capabilities = ["create", "update"] +} + +# To perform a login. +path "auth/approle/login" { + capabilities = ["create", "update"] +} + +# To upsert transit keys used for key generation. +path "transit/keys/atlas_*" { + capabilities = ["read", "create", "update"] +} +path "transit/keys/archivist_*" { + capabilities = ["read", "create", "update"] +} + +# To allow for signing using transit keys +path "transit/sign/atlas_*" { + capabilities = ["create", "update"] +} + +# Encryption and decryption of data. +path "transit/encrypt/atlas_*" { + capabilities = ["create", "update"] +} +path "transit/decrypt/atlas_*" { + capabilities = ["create", "update"] +} +path "transit/encrypt/archivist_*" { + capabilities = ["create", "update"] +} +path "transit/decrypt/archivist_*" { + capabilities = ["create", "update"] +} + +# For performing key derivation. +path "transit/datakey/plaintext/archivist_*" { + capabilities = ["create", "update"] +} + +# For backup/restore operations. +path "transit/keys/atlas_*/config" { + capabilities = ["read", "create", "update"] +} +path "transit/backup/atlas_*" { + capabilities = ["read"] +} +path "transit/restore/atlas_*" { + capabilities = ["read", "create", "update"] +} +path "transit/keys/archivist_*/config" { + capabilities = ["read", "create", "update"] +} +path "transit/backup/archivist_*" { + capabilities = ["read"] +} +path "transit/restore/archivist_*" { + capabilities = ["read", "create", "update"] +} + +# For health checks to read the mount table. +path "sys/mounts" { + capabilities = ["read"] +} +``` + +1. Create the `tfe` policy using the `tfe-policy.hcl` policy content. + +```sh +vault policy write tfe tfe-policy.hcl +``` + +1. Create an AppRole with a periodic token using the `tfe` policy. + +```sh +vault write auth/approle/role/tfe policies="tfe" token_period=24h +``` + +1. Fetch the RoleID of the AppRole. This maps back to the `extern_vault_role_id` Terraform Enterprise configuration setting. + +```sh +vault read auth/approle/role/tfe/role-id +``` + +1. Fetch the SecretID of the AppRole. This maps back to the `extern_vault_secret_id` Terraform Enterprise configuration setting. + +```sh +vault write -f auth/approle/role/tfe/secret-id +``` diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/agents.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/agents.mdx new file mode 100644 index 000000000..0d5cc6c2d --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/agents.mdx @@ -0,0 +1 @@ +-> **Note:** HCP Terraform **Free** Edition includes one self-hosted agent. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/audit-trails.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/audit-trails.mdx new file mode 100644 index 000000000..337ad20ea --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/audit-trails.mdx @@ -0,0 +1 @@ +-> **Note:** Audit trails are available in HCP Terraform **Plus** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. The Audit Trails API is not available for Terraform Enterprise. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/aws-service-catalog.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/aws-service-catalog.mdx new file mode 100644 index 000000000..1b6cbc45b --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/aws-service-catalog.mdx @@ -0,0 +1 @@ +-> **Note:** The AWS Service Catalog Engine depends on Team management, which is only available in HCP Terraform **Standard** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/ephemeral-workspaces.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/ephemeral-workspaces.mdx new file mode 100644 index 000000000..16535afd9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/ephemeral-workspaces.mdx @@ -0,0 +1 @@ +-> **Note:** Ephemeral workspace (automatic destroy runs) functionality is available in HCP Terraform **Plus** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/health-assessments.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/health-assessments.mdx new file mode 100644 index 000000000..e8d97b539 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/health-assessments.mdx @@ -0,0 +1 @@ +-> **Note:** Health assessments are available in HCP Terraform **Plus** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/manage-module-versions.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/manage-module-versions.mdx new file mode 100644 index 000000000..c357b252a --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/manage-module-versions.mdx @@ -0,0 +1 @@ +-> **Note:** Module deprecation is available in the HCP Terraform **Plus** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/nocode.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/nocode.mdx new file mode 100644 index 000000000..81b9e39ae --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/nocode.mdx @@ -0,0 +1 @@ +-> **Note:** No-code provisioning is available in HCP Terraform **Plus** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/notifications.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/notifications.mdx new file mode 100644 index 000000000..6bafcddc9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/notifications.mdx @@ -0,0 +1 @@ +-> **Note:** Notifications are available in the HCP Terraform **Plus** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/policies.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/policies.mdx new file mode 100644 index 000000000..df3e4f31c --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/policies.mdx @@ -0,0 +1 @@ +-> **Note:** HCP Terraform **Free** Edition includes one policy set of up to five policies. In HCP Terraform **Plus** Edition, you can connect a policy set to a version control repository or create policy set versions via the API. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/project-permissions.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/project-permissions.mdx new file mode 100644 index 000000000..e10007516 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/project-permissions.mdx @@ -0,0 +1 @@ +-> **Note:** Projects are available to all users, but managing project permissions requires the HCP Terraform **Standard** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/run-tasks.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/run-tasks.mdx new file mode 100644 index 000000000..aa5d2ce1f --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/run-tasks.mdx @@ -0,0 +1 @@ +-> **Note:** HCP Terraform **Free** Edition includes one run task integration that you can apply to up to ten workspaces. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/servicenow-catalog.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/servicenow-catalog.mdx new file mode 100644 index 000000000..c569bee76 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/servicenow-catalog.mdx @@ -0,0 +1 @@ +-> **Note:** The ServiceNow Catalog integration is available in HCP Terraform **Plus** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/team-management.mdx b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/team-management.mdx new file mode 100644 index 000000000..df8bcb7f9 --- /dev/null +++ b/content/terraform-enterprise/v000011-1/docs/partials/tfc-package-callouts/team-management.mdx @@ -0,0 +1 @@ +-> **Note:** Team management is available in HCP Terraform **Standard** Edition. Refer to [HCP Terraform pricing](https://www.hashicorp.com/products/terraform/pricing) for details. \ No newline at end of file diff --git a/content/terraform-enterprise/v000011-1/img/.gitkeep b/content/terraform-enterprise/v000011-1/img/.gitkeep new file mode 100644 index 000000000..e69de29bb diff --git a/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-AA-AWS-SingleRegion.png b/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-AA-AWS-SingleRegion.png new file mode 100644 index 0000000000000000000000000000000000000000..0fcc5221249280a4edcc1657d7071cb9104a60fc GIT binary patch literal 80276 zcmeEuWmr{P_wQCDq!AGi2?6CO3L+vM3X%fSNFxFQ(%mSCpdgAOAl+Tkor2QcrAW8* zh7EVD?RozxKk9B-jeO9m*E zKm-a!Z4+IgBm@`mp2$f_piYqg;;Yj>!kM!+(vR&?D4Hnb&nX#4-%oH7-$6$H0sibM z{PPUBVQZUDVMLUS#64A)(Ul2L57pV2lM`nvrZdu~&+@(?Cl5W{{ExvubosbvC2g;r zzn+^|qU%_zUdmg-QQ?_AYL&HH$(}thsB2xrZpDsSRG)ZsGwbt3BHhcWXOxW2uriUH z<^5oAj;ZPW?>(vAOYq`=UO`1_sqR!~K{UKE`&dL$^-iJtO z1ZMK&P5eCfj~_oSih5PCW)v3oEzKcgF|VA$vXl))1H)h5qQ3lpaEjcqy1H7O7sg^T zOwpQvk)|2^5HTD~!cG?V9vRF;n0y!he~)DW?#m}bUU=)DGYCuXV)+>_C>|D8=cO4> z3+oGd&n6JG74hlQQ%4ne>g^+B70ma$DLtd%H@Q5Pe$V~R6*QIum3puvG~B15aE~^E z%Ou&z?daKl^2E|o4M#`E(HhT6Qbv(%*aNEb=NEeAI0yDOXL79cy6+bH!{lg)k@=8^ zs`xUy;JH&{vu}Re)@8qeetD87d;xKQ(%zf+caKQRx$wcrPNs`+6{ZUbCVkJKMNC&pW0@*7Rrve%Er0YEW zP0f6ytOT9cbY|!0mm^JM3o1q~^JDm7pK@;gRR zE62jaS^s&^=}q{CKxLaSc#*|aji;gY$z}^k_kL3L4sU;|2wwz!;g<_7JF+G z0(QTpYsc>L@GK4&7@>br*FJMBZ2a|ko&birfE`LLApglX!kz8yXB}U7%&o1-Dkgq5 zzII$K9=guUt5G`P6gAL68Wk1G4wR=uxTQ|*c+UD*vb?-}w8Al~<^;2jKR(x;ApV8N z;`8x-i|CT|$*whzdH+9IQ6%sTPlh@#kU+D|GK`r;GN`*VMsTO=;N$1*rJmX(~$niU09dj2LKALVmq zt|Y$YJ#0`MX2tY6C+85)kWP|rrIYJK&9ffn>g`@RtT<=jNKOM?USfqYx7g#rE=I^z z*&E##=dizFn39r`5g#u`tz+{-Sy?&T3YbgmA+llby=D<@Z2VFpX(x(E9xcG}Kftt&0gD|1NC zUEcd>hHq=eS9?<(u?^P7hy`()Y6GRV8NSR>*3XJn!)(6G<<( zpI@3f!A#{?3BXGF5m6U=X=|a@1vGb@3Fgf#C{Xg=bM{XA^T$rtZ862GulTBBY<7xV z_)@}a24yw1FhmeBaVJ~eMfURw!svx0S$W6FjesSf%=8b}Bv2?Q#`(^eKF1;5G&0en zM|m~q%-phHZ@kvIVZ(3gR;Y&SdzG)1&5#QJ`OX5&7XTt6VRIUVx)f{%^1w=7s=jly z@mjS1HKSL$`+7BRc6^J9o!wV2*pek8{r#7EZi`ne$4WYu8fnQ(MM^@} zi@_VnVluO{`+;Upb_{`!h-nb^Kid%8=P^1qwlivxx44v*_pWueuNFO!XFk^+iJsi6 zN#i!{)bwTL~OS)*eO{7D;4#%dnJY8VII1MR7r%*mdt0RR{Yzol< zt>-z!?d=Q8t>GFQVpNz;l{wxFx1aBn37zyl!9=W%nYp>Uhau{m8+hdv0m3mx2)~aO zTWIt*W`me?#0U;8HNr$`$g$+m#KpzE{?9-870C9LG@R~$zu@>^yq~gYZE90V8=-mF zrMt*;$nk$<#s059C{tVk1g-N_RuQFpatWB9mX=nX_s3n*OMFZ+Sh2eXms1d0i1m}u z3#dj$MuI1x;^A!fxxP==RJO~zJQZYQWVqa;HP`4+s9`!}BRNd>awpeTiJI38-%N~w6?yU+_sc1i z4Zp}X8$+x;3Uv;9TmC0X-?MBbKxtOe|CxxN?Uhr4K8}JvdX5qq5DuTWSY?BXeiVG4 zjxsG6n7stMp_aq^>G}3!aElNHVn4JCjMAU9+yx?>5l1-id5gl&H!-6iR^-^Xob&6u zPb640L~3bc?|up;_8e<<#=hRJV&a2`6vD7x6zV?L{qV`j$ubexT_2SzJIxlq&%j{y zi@M&~qwCx6TNYPgVLjr;FunYgB&m=k&?@g)Z|YSIA9;eTb;b&3t&Ww-h0b-w<$>Lc z+~c>I_E}n5`VRG%{*x^g{1|og|^V`*3Gx zNAHxpoZMS2Ev+JpAr6=l!quV4MlJ6m_efYpMfF45TXv0)jzNyqBqjX^(qzu5A;t>3 zD>ipns@#@yN?BzZUz2G(ejKR~Cz4Y-=_Y5|8Qnu?U6ru1^4!?eG^+mlH){Rt#lEz| zRZd~yiRF3r+_L*XhtI6AY{g2a)lk-f!9nxmqXTtD5uhO>vc>1#t7N)2>@23mEkXDZ znhXx5d4u2C&}4)nhzm)(?b6!XN|<%qbbFy^&IwFKXfl{8#KVj`IhqgqV!mqgCKE=Q zeha1z#W$I6*ogQZ&CQalqs4OAA<*Y9T)?YR6c_iMS_gk-vA8BA4-Do~Qiw=szs9|% zj@`f(p0-zPbfoAQv(S?PD#V(sqYFlG5hkJ)PZ7Q0Y3)H(u zn<3tJ(wumBcwE)U9|t3|ApfhlUiJ5@f}VLcnElw?++5kxGUp;4-9T?|BDKDUl7_Bh zn8q~aGxMP`+nJ-?vEku`y-JX?j!5p7C2{am2m-KH+GKtyR_5c?$P+6wvrR%1g;=3$ z8P?a44FZ#tmYRCCxU_WnB@svW?;js|T>m^pewNS2eq^N=a_P2UEHvpL6!_NGhwMsr z_6?ppcOt^Xw&uG^k9wC?cVGhyvguPmKH5fj?%W#u`5_tHJt?qHANxzKI^&MF*<|A6 zQ${PD^Yq+Tc`T=DbiI$a;yOI{^&VR=fn%QwGrp-+Bn?av&I-P%mYdZIIvNDVJsxql zht!=gKO9KRM8!qT5iTImR2km-Wu?;jpcM@&0BJk%6O*&!PZZj%L2OYhJNZ0&Y4 zo%O!(9Qd?2>PM_>Y|E|edHruWYo3){i*99tsk>lZ`r#7gr@hHC6~ErFw=Zf)cEhfu z&$flT>k4=-_NH9t;27Na+2}aePRqUUqqB1`^om@f-E20nEBCZ3yv1R6Wuz>QvQk6? zSY0I4ZB;;t5j?w?nAfyb^2zh4If$;CEQ)!ruXjq)|t>Cs47p+q$-v|0n$RIfJk?wK!$#0o+ zaYLch6B)l=@O4Cq3H7X(;rEq+)_z2c&TcFRn&W&s-Em=t4nh+cg?@YQ;1efvw6B>C zSMwq+s_Yczu?JTK9*U33GXkO@iL+@GsA(sKwdJ{vC^nhQ+}x6iYnUhRiBUFm=#qWx zoX9WWnHRM1155VQeG$f){%s9vlqLwwB)XpFGK5fNYWW2?p86}~yMA>B7f>kgGa@}L z2Gpqc0jGo67ATW^^ILFmfV>Sx#7zr=_^(ghM4=`40w=}(R^#B8)w*k7A1Cc>swZc zMFRsKq+W*Q5;YE3(M*&m6uav?(Q^fgCdgKhs|51Z$u=3mx_5u>x5i3fN^ZsSwV-^S z6;vn&?#!^c@lc`+ruP$>oX!=rwtO%o!%083eTPCh{T{rl^o&<_op{3m#$9=XIvG%$mNNzCcSnc2)hA zlH;#nrKwt;jv?Amj8G^b$O-k^{~kR|p8Ud=ZgDX?A41#ZEhWp0G+6J<*=foNc#2L=*n4f0{0d7V{%6H7_}@Ffe`8S$P zw2EcJb?gG0-_ctfTeZBScRSi_Ih+7oI`b z01hd)_tf}!cCp2fY^YWBj(SI&=#+)Npwmh>=&9=6u&}Tc(D7N>*$=N>yLM{Nv4!3l zF|%Hl81zuBRmptGm{s9EZD5R7BSR+WOE_#w-@GAIQ&lCter9oPZSbR_2<@#$Fh?Y2 z`}*~3k=2AiULD)}&Q1m4qm9PQtgNld90(Zcc&+*ebF?8^bH2vS-De&3n!!zac_?p> zFmI*(`@PW6(8RBz+G@Mxf3R;McL$#+>tJ0aO~Gt=Fb5X)2*%H?J$9=_84qNtLDI|P zyC)h?_`!n*TE*sJ3ekKC5UXY6<|^dmkb*Oh^Uu7Yg>Il zY_j=mYnWc?p~B{$V(Tdpu!0~;kQG=f#vC1N6`S>41*)XO1O^5MyetVy@*t)h%07eS zB66$#$RhhQ`qlXD#fukJA3x53xVIKlR8q185xhgcLk>8@>8g9fnTWMVUaoI$o(bga zA05qPk$NZLak8{zzBQ$x@99`)@C+t${rdG@h!E~8%(!88hB~~xS1t6n#_mF%fL%Si z`}0k0RvAukyz26$mZC(|H8p9rok|I5cAE-Y{r{Ds?7qRl)Yewn;*t{C&sPS~`@YX8)JZ;nB1&8SBo?CY?u*$Zew9+aH1& zh*W9x$m=aOAGp31ao1`*9o)|AqM}nvD)gV9Wlzme{g)8zap%g;va_?xK`0yK;w||| zRaNzOv1I2l=FnHK#{z@ixx5z^9!_mn9Rty6#4@_5xY%{#uGf*v1f*pu=40JiWq=#{ zFnd#s;r4VleIt8~NA7UE{40zrN$Kg*QlY?Tt*NjZmX?-tr@Q$1`LEx+ z$y0g=({I0Jx-whY>0+NT4!fxyh;s(_8s2%qsVzgT!fGJXUr`v2S5%@ zcCNjn8~mF|WvZu95f>nyRk$V^pxt{C_;+tyM19B50E-+T3vv9a-7Eszo6xx5Uun3$N+d_&&@`}`d@RwRV~KJ{?wclgR2B0AxDF)BQQ8WPuq}X=|n1Qc-}P?*z?Tv^hZicA0S`R zAxocO?G|Rr_q)wmzxj(Oq_Xt->R26<&Qg?KoyxDzg-Io5y3{MtG-R#e`|by|%YkS=Sr0 zbD3K2?(UTz7Pj-5nb-3yt;&A-zfbs(1~Z$mZJ~EtNO+wsG+;|vn*SOJA>hacPnKr8 zXYNcxf&#rq`Gjy99&*63xZdp;XNhDDqw6fR}N;Lh%A$DvdW5z ziVsyH>ivXxCtZ?~YhESYzj+2s6M5@+x&0LxNV^tQAi0A2Ai2Rj?NSA!=Ag}rn+z`$ z%R)X}8dS&59F?zHMqT}18T}6t{=(UP5M9A>?p~Q1?n(u;UQACsK9)tMGj!&V}4)`tzR|NQC5IbC1Zq zFSs)OnR8cuDlcQ7Md45{@4SsfDk*SGGuy^BKX?EZHy|Z7H8sErSSearC2|DZt_IV+ z=PWB9f+xtpsSpdbs@jxJJ-Z>ywpLabU9b1UzBO;7Ju$xWe>| zSMC%BB4nJFO-Qwauvv3L2<8=W_TujFwGZIi(FBO8l!Nt8+unA_ih}h|vuW`^e0bd* zkM2ChZ5Zzv!JU6!{(0rS*%@N@m2RlV`qUHtd%CVOk*n_w58{Vsxhl*)A*4p3q|cNP zx@)olCrU)ktL8pnS0E`ljufhV&KNj08)hLB_0iO< zb}J?%BI0q|ewGylQzW;~h!xe05dtzbH9*`N78z-VBpFc+f79>DrzUtE#r6n$$l;vK z(&AzdTbxHC79 zr#v;n_1rQBI2YtRi&gVYm$I86)+zfZ2yO)ku)=Ma6EZD+<5-4AL_Fp_Zg46 zihT6%r8B(U#qaRl^#4_*s4{|ZU$~OntLd#JkKZXBN;(+Ro1s|Yu=J5*bz~&7JUsXV zYj9k2uI)#EnNX8X`jns^@ocNRz-;|Z!YhWOu!#YwYxdRX^juwcbFG~gd8vWHUMh#N znA#J*>Gdr_|K-rxnVs^H$X0e5!=1~pc49)LdR6y9K(J!xaQ;h?tGIaG7>?Se^zi_s zf;7D)YrXd4S+8-s2jrp$T`OERX;PA}KK6tF5=DV6U@1|z$xb5goUwlQc^O)5R;@z~VdXel&TLnBWL$AsK55*#-)7aWVT3WOE-6qF z^gbyV)vDO$oXS?ytGB`IRL2>)0TF15CMWf-Tp`J};|o1(-Z9tl69;+I$j);0!hF9c zjF}O6? zoKK@(SU)b-j2!X2*IPTW^Wv`PMEsil?xlVpJq?nat&4BEy})n#JKM`;mBaq>tTFHG za@6vh`?)_T<#DNvm)1@qEY%O5Pj<({yWZ7-2o7IF^1U?qns~yiY?Vc8gL~~}+Pufp z_F7IxUgLT1!?@f6YRYq^!*gSqWJU`M!>|vH`ZO>IcFBQI6i_c0i0zf@VOHGNqwaN0 zoN%=*U)S3F9Qq}>w!$;>^Ta3449*SLoybPtNlv5dV5Ss>&|X+g&U`N9RBP?zTqjw8AQ;p%e@ccz= zZ68gQNB)af@%XW_{*{iQ^<$m>-7(KxjVZkNDf8;nlgjJEi*L zYo+p9Zg18+j_yw!YEq zx>?8v8o2X(S0;l|N3_Ly#D$M7>BqW-uGgF!fvWh$UD0P7+uI6G&_8{Zv@4~a2%SOs zd~9N24?Kg-tBGwA)0t25UCzkMWc#8qwY0J@xE^P5o7(d;dJyOK{kXR^?^m7U^o2F^ zJ|y}3VQ9j21$)L%q#Re3EJgcZ$Lqwf{)^~l?)8I4A}Lmx@EeSbVHjLO*W?bB1ySW$#)l@_>09_pj`;naS^_Xv@a|&HO+zvQ0&Nk!_q?8W_xGGDFrI(@_!ni7| z(W-|(ID}6MeGS)VmewB*q?uM0gCthnkCoF<><+h%%r4qKzvWErd089T8+6%X_K*lL zGwnu0_Z4HK?d8{pqhp%h0#9$}8erKwzk+*j3Q^FfVm6!`Eq{dUZ z>cShpbhhRZrhuWJtFO7h3Y0dFdX$9y!32O-)Ct}(-Tt{&5`i^4KfkICH>$A#r@T|c z6PQWpV$a?B&DCE!mTG&jXhQWNq2Rda z3u*LOm$>6pTbW+J3{S(Z7o$$PZUcT1(dH_Zi-$@+W^fw2V#2u=KVVjVO3#f6Mu#CHwthEtrYbBTNgIs3}5$ zc+np}t@z$s)Tv~ElDdD8T;3PjVrjA1i{o9by~=iYJwQZw%yROsz18PAy}QjvUF6wI zEkiZBIfj;?6vw|Ql%GW`S(%uW)N3dV@W&rEKY7n(-k%<@PMP_V?Ht>?XcD)v^a62& zB`hbq4e&%@9?$bEJ+cBDat41e#9fu4$l+m?k(Zap5$M!Z-3y}QRmjL7CWEq^fSWz) z^D}ev-pchF3rFrMq|Q-PaW=OE>e}FrHY}OcNoCi_U*s|WR0A2E-O7m%Ap(iV!+XaA zx%s8Aipr%S*g2tnqumJqK~N^wGBB^Xpboq09Q7!obN0s8Tu0wRPmk`UOK}HSSOsMj z#CiQoS5eXiu%$OP*DBYSV%^sYpz3<#vk0^Ch9GV7BO);}Rla*<=M<6Bq`XZr6c9R= zuDU!fdiJ5WuP?_6&*uzio;qcSoPCc?1hqIS7MLMuB=M3W_y^D!kiIXhpv?^fc!cdY zu^U5!g7$Mk5WgKxSTPOU!W@)}auB#4&ZW_TSKymmv*VhJo^#c+z$Ymhea5sm2Ka#Z z5Z*5X!ZL%=_L2}hmBN4nqod|gZwy%+1YG~Hg0X5FzPe(_Wy-__rDP2F1YG)~ny(i_RI2;ImCc7Kg37 zPMZ(u*ar{Dzkgaw$bt&IwvvT}p?mpl;Wr9Mojt-n1uL2ClGnzY{!YJqS^P`QVGv>Y zdY>h5uwTX|iTlbQozp0veL^0*e0iiSDg9hZWNCxQoB8qc$4gO(Jj~o``bTzFb=M4O zlU^@Kb?IjJU;d$2ng-hA@I-`tA!SB3T=w2vUJ+7vMi?ZC zdv*TK-dC>CgToN;^-|Kjj}j2?skVE*=|iC#W=IP09w)XN7nS(^o6&vd7K@?DUTIL) zMKx(XY+$JLGy;boJzNk1$}>q{)Z>xmOER71LW=tnOq(4X($9h4F=t{zN**MWE7uE&UY_I_fnbxt?+vbK? z&8a=cX5_HVIms_vqrf03{Ri=eJvjts-hq+Zj)~KY2M6ZKmaI0SIuVUkI-)XD%hCNc z>W||LnTYA}P#g@8yqeW)x8Zq~;uVMkBQ&3K=(y2C=wmp~X)PPRtJYpr?C_vSU6GHF zqqQF~D(u@_G*tXGmIodOrYAe|8f1fDiyL@`Gn4DTZXvLbUoC&~(@IOjUqIM?mIK_x zj_T(@tc%~IMBivRhWvzW8`ZMy&#vPlcJhotJCC(z`A=+M8u((lz#vWEAOqr|SQnSp zw{-)vz@yF+vF8J1%7Od(n*_x81dGy)50u5aFZd+aw6)NM2ZMUdzesckw5s-Z8es{< zsh%StL0mH;jXBBHR&~kQZm_r(TDJanSBZ%#EC;eWF7ldb)*fb0*!E_huh@NOrXB|> z8ihp~oUOa2lFC`>lz7+r*?U&RO6}CWwfEIq6H?~I+^V|HFtaIc1`GtEj3d)K-qxHB zEb_K9LR3&^jS5?Lf|$7OZf~#3w)2VBjSOpnA#f?F!&^EcZ#{&`k+~hVmp`s>v7P#I z9~|86EkX2XSfp@Mv=_v=2Gm%V(Y{vpkBaxsL$k*nF+eW^Dx^$lAg5n@X#a(uS58@fdaH1~nsG<&>+3Ac)9|$#^EBG+8u2LNZhTtmn^swFZ23IRQnnxuCs zq`#D4%XmnExExlB62vOUcOSV8BdpLr9d2rcWqsjQSRmuP^r62rwJVQNBpq~Fw}rdW zhk2Dahe(ZnLRN@jYszkGq{y|{J$8hdYGPfk0+3r(SbD`$)cj&nh0|(=8Hr{};np4_ z{={n~lI{N~SpJe?NVa?kV)#s2M*g;M9MBt?D0n70g{Bn)4%0zXyM1rCSu>_G^k9|> z5{QwpiK%(@IY3|6+gUAXukXpm0?I8ADLdV1Yslw1fG2k_J=1225GwbT6dy95}(8A%n? z%@SNWN7ls;<^Eu#7OUABSno$U2CF@X#Rb3`|3a8hZTuO^%`%oSXApoLus;DbQmguCPB{H+FFMZ2v(PY>;cmYKK}30 zz}jYqM%5>p_I6{ieg_1`?c+-??4}AS@)}mNAE8$aCrnR{F#-+?@4tNc(%;jQ010Wp zEJ3zi8W0kg$*z0=&Rk)0_qP5$!k|CX5~5*Zk_yPlaceq#$c_8dLe_Z*0K|6;8_uMp z;xRNAm6m2zRE!?E0+6@0vy&7}187+QbC52N1G32s3KDZ&Dya{Z3=I>eoS+6Q;ItCa z9Ky(GGZi~;R{s*$YaY|(eOxGVv?0F556|5VasU4Q@~IFO)nOwc$@DD&%h5Y9L4QY3 zc0Sd}?oS(}Da0sydR8YNH^#nuM`}4)_4ww^n|dmV2xDWA|lORAXz-L_qZl1ae^M@L@UYC-waSFT{^KOK1Ej08TWJFzJ zvW_#|f?5{Vt5Va_EJnT>pK1jAIDH9W3RWL*X{$FHh?W)>Zh4!kZuj^1N7O=vv>%{0 zm`rPcoUfF2?M-=$KD{C>BNGTkI#wA7oz(#nmRw_F2HrTjRioyY2JLTlfMNqO>aO=> zfzfMM;*%}Wlca$x4R>66VPRpt7M2~{OGMNh$hi2P48rXG@c7(9PtxTsahNh}LS9f% zkXIbbR6H9D1SPZnSYh|}Ee*(Ria6KIn*)UF)ZVH#?yS2Wz^k(Wqs9GPtJ-ZRz6(rc zJ}DxuXX7(7TZv`fynV|9_+A9QraW~g4RAus05lI{wVbF>1HV6K$RS~G(p^z`${{Y0 zlI@EcJ4|akO8sesh-U?@4P>-4Q&Jv4(fE;(Q4&D79H#4D_^5HkN`^437Izex^=$*9 zDB|#$we=pM642+lzv#Db-%NPgq0ZHiJ9#!0a-hUIgoK3c*CUVbbIObsnSF#(F8cjX zbzR*U+U?)7vt|HfGkGNsC?^2{f$etgF6q#c=Oc+gEp|Y^2~Ca^n(n!a_{I!@C%-yX zs}BrhZf2$=Cr2~@d&WnDxG2+hKvt85%Q6U*tvdD56*e}DKfiy>^~VDj<`uib$nE5b zAW8Of?OfJlmCn|~tKU02)d7Teu(dW($s+O@s@B{#fNt8&`n*Y;0_F3LnQ_>`_^ugP zO1n3wW_}%U$kOsMlz6HB)X>w@yUm7a+_&1=9kY%)(JQk_&>s$sjm@QES5Gf1(|mj3 zCSiq1kJ#+&Y~;z^PGB*ctJgsj*_1rL(u@2neVDeSquX|bMfByVwcl-cYRGiqn++2>WveU0L{l~|3@~$&?U3(4; zyi2%9{9;g@(7_|tkWvky>R+^}^U5&S))YWWh$>>{@jbeVJ%z+cS^Q`o2Hb|u2=0Z= z82{Owm7uaGSJu@2-wP&SdX~X1;;g{01y-j-Ts-U}r}Mk9gih zr87PW78)qLH*OE2hTP3#(oR!r3D8c9<1zc2G16yFxU{@N3qBJbF`MEBy7&x=T2 z>sY`P>_A9s{;Mfaoflv1=1Rnb5?Yi3T4nwgnd z?c4kKzg+nbKCnoAIlMc_Nm%6d-VijPR=HhDtmp1y8PDa_^XJdISQ=%=v0i&>^ZUmh zp$_0dPx;b!%}45dIzTx*C=*|i5|A62$pqDZYQh!Bq{`kt8tU&)PfKH4Sbg>Cl^2z8 ztPpk0WQk?eW8tR@u+@N0P*qV$x~W~V05ujI5o^f+KqxE}?|zuy0)rp@7O4v9JOM*^ z%3IX9_54kpvTmL6;q>ln|NPSpe6$1N=AP42=&-0vLVLT(!W;4ur_yj}sqP@q3o7oz z-BlHJ_0O#9OB5M-Uz5|*)2ECeosg^{D3k_CsaMo`3skbuGZbO5UnxO9Z|ed_r$?`YRoDC&>8T}*8X>!Q+k5g6>-1VsVOTb zg8k%{*!=zY+V5+eoQkk^L-|8chG*RnzH9ydeS^>(O4ToY`r=GFqs{y!z|QOS<-8P@ zym#+~KPkO=Y#zV;+?jD_DBsiWf^~Za2Jl`88$bW!w$C^FxVwZXw@bha;5Vg= zvc0|i_uZh2JhEWdNh~^|AGO?pz7F{qfq|+gsumVm<<$j)@ACkDN<~c#>ZdUpJuu}; z2fc6z#(4FmWgK)u01PTZLwI>QSQPZx4ouN9KwgI(~=?>?iR`=E$}ayl4Yt7#}YR zktVYFi%`JB_FWMWU6xp}eFq-t9qi?N3dttY`3n&6%4H6apw7u#TjveP=i|-@Z9{rV z0fqm|kxmyJ`e>E9E9V@8#0^M>i44ie#h4x2QMbsO<74;Q>VGy;ph^Rbz3beskn=Y% zlrb<$pqQM}rD^#@s!(Ds%&Vp@-nazr(>5M;DAY2=zQj8+W)!*L&s~`+>c$QNcLR41 z9~A14W#cR(BL}LE;r@3}U@|I=2?^eVXovb(!u%y?AYIY-+QHOps~iUO!hEK1y2k;MOo) zm)OUFbM^68mY5h&P3{RNh%(?+Jw#IeXWu|kefsS4TPGpprty}X0g>32S^t@OQv&x(O(gXJbilK4c!-Yi3Ewch z$>@A}#TJ!@&#GW8ik#nWAyK=XJv+nTCwzClDZVMt5|Tg=e%rcjh=+x2QS1(DdMC($ zuLLe@HgqCrPpF<|kjMtiSf~T|JO~OOi(yFTgP16}rl1oXsT?cP=ikp>mId9}988x6 znAWVQm#3Il3KDEye%#%4LcAGuUMiY=(2H`R3NZpHfXCJRcNoW|PcRIr(Iq}L(C?6C zcbsq>y2j5xLUD?!3a0b0jOsR{*M7pmI>afU*B?(fFfoJSQTsO>00dK36c|WyDhSjv z^YS!c7Bw5MIAMIICoLh28qgU5PA<|J*0;o+;yjEoPgNJ|_bYD+2> z#hQW^UxO{We&a?_1%%Wnr4JuIT$X9==r9h#k%F_T5Yj`Z1=0hvwRQDHNFn*|aGk+m zB`xUbfevg?T_&9$$)c0f#t)!nu|y+7BZT5UA2;|1K~dglA_Bw>L{t(UvBh8)-flD? zKT&+NaTcp@^IJ|=F=2mO)y-?WGp_`4>-~i=@&2^W#gOkdQGgx2vK{>d5}?+?mSew)uGx!;Je1d8>x2(|X>d^Ws&U+iz6t`_ynD}lF<-(wkU zpE&O03_Sj39|wE6jxjEL1|FB)Z^R-tnD|6^TgVJUa5hh4??=@`L%=wRBRnD>U`G^4XL28~@SXtdY5q4S`_8D_%RQGaUr36qK;eK&xy-~P@Lk`CDI&~0e{ z#Us{(Xu8;TMpCAi-g!I$!aH-oyPett^5q$~eMUlLfPrsT0BTk~M0hs>TBwfJ3ZZco zak@U#lO=|j>EN8tL;3%m`w9{*&(%7wj#Ak~L4)PUk+ZF>?RO0H!z@7i@6cY&p0J~{ zb5!kAsdZcpv_2o=3O9Qqpisf}s=j3rr_{r$<%9Tm0b`sW850wH|tsnyWzkUJdzmF@l+#Eha);=tOiZEaU}a0O#6_N99P zlicAQ{^`^Hgg3+!7X_WN5lrIIk;jD7m?b#Ip{#)Fl@5*dK6cHkTQC(pj6^!l0I6;c zFzJfbk}-g=vdRF0vlo2yM7!r6$BrD=-Jb`DIv{Vec?XCsGjOXylX<5+RM<6gKlPWs z|GIeyFMy`&*TuEqc_52|cGyr=U0usbb#?U%8zL4%xd37McvT^KK|}Zsjp`&HWtcEU zfE0oF-%akk?TL2CGrwds5e?pF#F$I&Dy1yat;wMX(X4==U`J+bVj{D#i3wg60_yy; zwUu;nn`ZyUijeBAU!bTJGC8qZZQ-1}d1c1g#al;PT~Vd(xvMi~js7GiK7GT(&-6y* z&^K1NAUJ>QeV(6(orOgl!stKRV=cpZ{m!n=Q|w+cy^wBHRZ>cT73w-qI2z`WJ>^y1 zlfX9&AtC<C994vFw@R-E7r@G34~XJHkY|0 zNR4+h0QWd|S`z1=(uDlfFtsPuxW5;nl{k|Tqo43e+cjVOv?9vghA9&A8XG-M;wL@} zNqMIm#6@38NJg9&X^77$j9@R;{QrudHALvs_XuFBJ^+Up3n)le@J;!dw{CNwfsYV6$lZbud?2cMFNzql!;k82RWkVZ~CAUr6ukdGg5 z1+N43faWN7LmWCAtu%WL#dSMjo2i0bw z?gIO<>5zFMAKhE=lDFV>D?VPWkt>%5A!DsBH=NI=PV?{zUaTp~sm13aayiKBdI5QB zlm6EMlKhu3_@Yi$bm&;dSQeB*qr1kFp9gr;cdD#M;$q?$1xq_*Rd*#Qyq~T$Z4uVp z+`lkT4FrLvwojEx6O{VkFg1vE=(&iX$|5%zTH@PAkgHUfPZ;t+KDh?@nKuLR0rj8V zA4w82eb|Vde<);)I)}UNyw)(kxu5X0~9? ze~S_-5H?qM$^Mz}c#B&bW^kp-rtHf%^*IbbKb;-Ek)` z@Poye?YHW_SSzy3lwM^*ocADtpiBI>E;_hc}MmLcfhTx_z1#+at zQKywMify~pF!DK0Hgh^x}4drg{IZXNX#TzPLMm(L#27X3J{zEz{zaoR8nEwOK*07*}0CcQAbF@db z*tFK&`A<>E?yJ%0B}+{8`rh_-dU^R{Y^^H8u#{Hp1o`gBu^>eYpMqOg*Z1#_pyrV@ zx*}OXFiEg=j%nq^;WjV1Fnp3{(ql^=GE?Bl``IjXUzYJq=z_d1`0PG3($G1l=!Sx-SHN}9JTr8K^=Idg zkS20sx8@+)Bv8Uy6VK1sfSWDjId!ZU&DR5n=76uzL+t3}v;-+gsFNt9TMsuZW`RX( z_ugV4D0@3U{Bfw%6Zv=$dVeMa!4WHp97v3ejGXOL{C1ytXG`JU@C@pVglB^=8T5C3 zWR-_T5=f)wSBwxO0y#pF&UT0kAOc`&O;w1=L>vmFAsdqWSFSXR-5Rf1nh6p8%!;%T zgUwavr4u_3&D4=6CP7BlNM*-mBVGi(zyeuhHVM&JO&=iCiZ;1bPn6J62Z255!gw$Z zSHn^&j#vW}P&DhN$hL(i*6`ePGBP~Y@lfit08pA*A0Jixh7%XI`fb24gzng2+=lp) zD5@?zYI14M!_VhJ97z91US ziIOH(@Tzr2Dq%l=R*T&BFe!l#2+_&)i|$GYTR~W^;4$U=Bnl$xMt70u@5P2>oYJPh zTycDwekbpFvlUaJ$my&01XY+tt#e7-qd6!}{-NBAIE9L{y)QcLclR{viLVGs0Ro1r za}3QF;43psBbB1qFBxp!)9)4)5gfxYB)icyIvWzJQ%z`i^}IllMa&@DiUwL+-p97Y>lK4ngV?tkdQsEU1mHq zp+(=eo(Pf=Bn2yqprDZs=hKxoy2CTSslz{x#RjzCqVgqgpsC;)v7)kKMcY5N{N<}S zvlaPlU(RikVXZ!jee`(N2*~5wd7!*q9!V+O)jWC<(gt9Zx>8!OJW6+Hbkw z8HBYkxIffCK@SxhwU9#GOY^4rP{dR1IaGPYv8N%-K=AvYWj^hB468u$NQ|+xngSlp zhlV-i8%m*fprHpo?$c%+Wz!gOur>c0QwE_8xQwB!koe4-TBU<-EEN?NnScA+APTyW z9|IV)FCw09-;H=iFRl!Ohm;E~X3(Eg5MnT&39MxZm3aYN_}~C6|$$jKI?SrCCwk_r-IJ!JD%^HdcQp~rNdWIS-G=P*d>cp zRNi=%T3cB3f$y3ExyQu@B2MB1G=bBl4^<+_tKs7i*SWd57er1AOF|Ihv^siav2ZAG zouAb4IOuSfZTOHFWqR?UsIiolAOkN8q?yV+H;CiCq1)4K`UQTK*B-=WXipz^=-_M| z)n_&Af)Bwk%OG8h@adnIRzuz0@qfRvGjOE);K3`_jG`h{$qNW-7c zk7pL%E$WbdUiaFooa5gdZ<%nOTHWIVTJY|bdtuz5cWiK3q#h`U^eGv}Eh8VEQZfv= zlmEh$d0Q<+=uZIjq_xN4ydwB{L?RQ1>3Ed{u@wY@Kzl;hILPV4h@N_upfSYPt-vcq9JE+~A!-*2hF}$KY_>e+=>FUbL9h@j2!R_BANV_rZ_ETfyjP&&H zRnQkF3tzH&(^~$$wN=^7EaM<9Avd>^IMoCBf(}%&-nPy(x~XrgL5rW>Ur*{$#^n;z0J)%0Gk3%INDR?_^tj?!+H(86X{26 zXPTRIUne=V4K_OmWxmU4(JN!6T}SU9Ly|noszL^0n6MI}X&Asj=ABotAZrJ~FU8IG|zLs2PnhQu-TF^@+Q zm3f{WLz(BW!lmCgb~gQoy*oj;3`B=t8G`HWr+1T6AwR!Jg0Tl;EIN!l zSZ=%KNi9WZR#Tr?U9;Q$Y(8t}7Nzb3pZ5{&am_)bt zG{_?5Xdp%(fdDc!%W+$Zc(Z_*S&5y1^U8NHE6)R`kx&G@w{NUPWP z1F@v6uDi8@*w zN}0xmx>tbbWJI#5AfeTD)aOt7JP2-1yk1g<>tU3HSCi^_JavYii zE%RQ?8@?i+4F}B^M3IGk*j?i8{G+1{GAEW9k?4(40ft&oS62rHQx_^+;QG(mM*=x& zGddrr#66_VJkWN^fx1{-)EUW7nO`ABXi=y_0~2yPDifq|NFp*KuwP{J4|o5(WcE@S|vKSeOdN-^R@kLQlTixrGeLXg=LAT-%txG_f3F+ z4Sj2U5f1%(n`{O^_w0?(39~YVG)f+A`H`5*h+}%}7*h1pijtN1JAC` z{C2VVZzjyumE3nkQc{mZZqKicoh_bK1nHA|jdoum-crxUFCpsg9pCXnSAEFZ6b9}7 z^$=|j$RS&9dcn?B%{iJqIy44g43_2Dd)Xr0UIBQ#CfhvZI{)uAuo+1=LQ20Z1#KFkC{Ia zw?#}>)RC;aKV~kJOhjKvA0foYS7ee$fDC^+p!-6{`0HDyH|&AuZ*grH5~7ok$UxT0 zAj3EXq$p764mIvOj!S3_0~sEQo+oEJ+S^AsRUu42J~oVu{BkK;wC(NfaV?tQuU%IA z+#;D%JsFz)RPVccU@Lz{ymvf*{EL_6#X*KVZ0cinw&Vb#rWu$$)9}5k#w^m!E*?U& zE@%CJ8Fhbd(@>Mo z7zPPkSnKs0?y!l#YlX$+A<4rnDVj$WQMQXAWWHNCrl z=SWkzt%C))4+=N``u*k%?c8tox3REb)=ymZKp2i5GI))@)$HgPas0R@O|soBD=Wt6 z_PyhB0&w6dS{r&<_lw(dhXxdiA=A7B0#+Y-xUVf6{&Va3y2V-s|mj6VI?wy55P0Dk{mS`7vuNd4Sl}g$w1xs0aYz{2rR_22uLo#1c%<(i66sue=9k7HxU8kuMf4%U zCMntXc=`AGR~K0JBZ4he5sGCHE0wmNmw04&Kw4CkK$3a_P|F8kk{EC@Ps~HE7#dDU zJ^n5hrBJ@}!Ex8i0PotQfDdEiT4?L&uz}<;^332!Odk$z%j^lz(l1(WHwrN5+n-5A z(`b>8ZdEk+geM1L8E1j}W)K(L$?b=*xAc<~M2PgpyVl`)s}z&Z9dSZPq(z`70^Dtn zeQ}-fY25qEEhSN>>e$PzdRuh_Bnt0vhnp}MKEEG0Z~Zblm{Zvr{LP*7Dv)Mx+`(h1 z72V!$KpekJC-KVVEDLynmq5U0Al}tQX?WP>q^DKj#u?JFqvGNr)>p>)u$GeFVIm1A;s9jU)5JUIxvJ91F{%9SgP_rw|q0C8a5E7I`23CF3(s_yQN^c#bH z_4WdY#)UGS?^*f@Ou+sn7Z8p}L?|zdYhR#FhNK1nkmqxK_8=U5i$H6P5nqPMGRM02 z9(i3a^A?wtr0TJo)*dLicTIT}TA!waTl&xK)v%C+!XTX zxmFFlfHjb^rs%;=yZ`4R8a4?kJOvlWvHR z(gdvpT{pLUFd>LjbLw;iC=MW&HXMN96fXk62^its#80&PJ51rEGg7#HDF(#^Xc#6S zhURNnRD8YQ#fx=@hfze3ZlY?feSi_x4u=M28?6^eerK8?JNP`*6_9>`*87tdjguCM zNlB0K%L2pKDW0_#diH3K4HY-|F-Vm)1n{hjHBPPgc?dP!&55DFX#gS{0Gu?~(ERbs zBN9b|%Bs6bPO4-w(pZUlK>0TP_%hyo>+3glOd%iDxzq`yFDaiVx?dI}jj+eromf_gIaTd6 zISffbzT#S&qW=qSxWdi`l>Uchvn|(XFv0Jhic^Q%CKw8~iQDrRKv8=V!~j>wCO~XM z1TG{w3un6g4m(bh2d^^v#@%*J8a6fF?!8z0@1&Nxc*+x)8ciC5u!n zz{aNAOPhaCJ-~7OaTcTZO)2F+k4~Z7Oc1&uM6#4WQDA)5G{t-~*9@DH z0cDF%EanZoLc!-ssWy|tg8f2E@A?+2{Z1CLb-B$EJ%3uQnH2QyvWn=WBA zsy75neU3DLp?xkEDxnSV`JocbGDPHnZz#yY|rYI{fQpSOoP5=}59-kS% zMR)S@V6c-xy5VgXy+QLOy=MSh9};|b?UJA5BcpVV8Q<-`i=Cz7S)LTEQ?J1Cz_IY@ z5O2)>Z0E2a=V1V#ygMVg3lbyR2*wGLi}9rC>+kn-9Z<|vf0D&`SYEugmbvF3nb2*q zgLA+;0IxJVJss3_I>S0=r}E7r@&w^rKd&|yy=T^<6(@PWs(%)va<8%D*KGn0W^- z*F39apB*NPJVNF6=L@vLyVd!>rn(gz5P5Zds#(4BHXjz{0C|C5KYz|ss37K-X3x#w zyXiOlK(2xpbJ}Zrj1wtQ__m~*mUhp&0pcyM=my5V%Yw}|va&nZgiC>RjQ3ZhU*(>k z6fXq|eQ_SMFOYFvQOTYV`IzRPNzW3Ko^76xJGwN-@aVD^;oTm?)bL4 zul)0-Y{`OC8jkj!i}!ox3qD+_3kwTFA_)RF=KFbTsuMG5d+Q{p)?X6Wm?2jh9xtxq z1BSyT06#n!Br3txrr@{l6#c8~X=5^wGpl@Y#= z-ZFCc$NQfKGEj{&{*1HB zqQHwzjsMWg2gx+?Gois7UndNfKCG0BRm7-p+sf{G=_s(9mYLs79341Mdb$WXOkG*(F8p2qA1$ds+HYQ^Gc2xmf!4Xk3BxwJ z262kqc3I!x-@VTj835r>zVBfeEp}mLhHa`B?5kBFc^LDR8siwC2SC#^nIo8QUl(9D^^7oV z?!3}tWhT#))&?bob59t6ZgiPX1znSw%vcGzTdXE=I8=$Xmdh-?M@+l8# z?EjFk=$)mNa%0#fWBI)zdH$?Rtek~Q_AWZtiDX}8;BoA7i%|&?LRb28+{nfy8$1d_ zt>oD2#MZQVxmm`ZH>XZjPkf@epbRhb#DUvFiWFC^JU~}&US0Mp*pAkmPvhKE&uusc zTE0qV>K?D%E9RFO7C%++=nl=Zcxd}%wE?9W9#Dvu59^O_t413o<@cUH)M?3)*7UHq zIu}FhdA-d>4MTRX6>w3RrvhPQDiA3 z;xK-+gWG9S&^ah3I6x{iQ73X`EP+p4XwHeLzj#m@3f(vDTa#o~i@CBL1|%n%Bf-Lh zqjaS4=OulAU#t_&KSyJ}9c+R`N7r0T;$~*ipZ#lGt59aoN{X>}@hV6l5$xR=6r;5~ zTk#_t1S3{{8pm-LS%##y^=((o(y2Z&htf1dVmeDqV{P#fHE(Fe-Y|uyB*EsYd0sc! z_Rk+uD`ot{s~#Bak94bErlq5DaA87Z5I;Ko;Pxwx zfBiU+H1b>Xr$}gGYt%+rtgy(L?~|j6AHThg2+Mr)`V7=ufE85WU3Idm0j64Wfsc(w z`8Z6o@>&(gYc97sovU+U`ETVs;)PNMjyMqDk7lT@y3P{W{r8lpK71xM6A^p8&lY2q z=>&GN@=`2)?aC+0RhvV+wApLUFmM8~Q<`xi4pg@TNzmWysNmhUaX#OBCn zocr~EZICDzbT_BP$JUsYUI|5aQ(t%};W*a(D!3d3q@zk0Lc)52#{kX0>%;FoT4X5k z!o!dk1AJ0~$rHYjK}Ab*US!eCDdlB)&In9<(m`s zxD4m?YBb6bOVMVGJG~-e$WIa*&c+_vqBzS2idQIlkH;?ET~u+&kDVj^I5g(xeEAAp zv4!6qY`6Ru_fqt+kVe=n*&&IucCqJELYX0~)F&o&96#W;$tx3_blQUpEFS3h9^72? zAm{*G(=lsC@5oY92&cz3MZb)wHdE@&PBZguEr!dn_cFbke0GHEG=jpVuOHwTCCY9* zieBbi3xv_uDp=pXGj{$ljgs2RUQ*Me$k@3a85P)7&mKF{#%`BU`nX+DuTbzUrR}NI z;K-5MnjB5RF`8ZaP{raB*u(OXHg?J1eWYZ`4@Szr4FCJL=X7`+qq2_zPr6r zWC2GuAbJ*wyFyq=Dg%O&?q&a{AAiWLxojbxeUJuFvId`K;;C z4u4oZw%~$$EG`FrVPK1b6N2&uwa3~8%?mG0XiV1(nP#&^*OeMc|%XF$d#ZANIE0yB7{XH_zX>dg|tI7}$I3}t`$$zKuEp1QSU7}n@4F#@-z=1sSH62kzo z{Ybf!jz4jDYn|<0{{x@Ko|eP4jfoCQM>OQ9Uk!3+dxcUQ6e;GKQAc2%Jy_(xhnr@4 zUpXSZ_43rkGF$DP@*9gbZSJ=m8Y!!;G22%^UIK}^z-5tb>=jTfTlzOCUb67Zw`a}U zvfIq%ju0t}JVSumQs`265Gr+Z&t};8vr0)^94mRF+R`bT zd?Sx~53dr~A_Z!ZpDNN>)*q~WI5e!1pNmY{DY4T2I3=aE@H@*3<7{~oW0Itu?pwas z=4mlD@QCGNdXZDjtg4?Vt=q@14$zzjbNa`7dbb9iF3ddqXwV%a-%7t=#o31!_ZUT6*7Nb1NE z`$*T7E*HN#1Mkweb4jl!23oi~)WRF=0+s)JpS8>n7eOY+gBD%Ccn^ku#$ zE*hVfkg_SMr+k&36}y5?M>y@Av;i z0m~`CcmyoR&SOu9l8JFg+L^qNDD+-)2P!-t^!(sA1ZAL}o65F2;1ZthT?#B7IbsSc z_n>^+B>Tii_*-9>#BWvmVm8ud<>5kfvr9i)Udm>M-wFDi<=pm1C7~4CYpFVa+XA4J z9`a8dt7T#Wmsx|PJQduv$I(+xDB?qzwXaw1r0!wov|#gnw&d-h2F})SJT{W=%K4Dp zy{chW11(FHK?bpa`UisMWPc+}Q0nlvgS+*Y)}AOenbRwB5a)B;=b5o*^ym_gB{8{$ zR+$ICQyd;@t-q)&Y`3&HQPzu}px+D7IP*D=BA2zn%}k+t#>+L%zpe>YMDxP#tK(uU z_x*B*P4H}?oM0P%;!*t+l}`ho^eZO(d>I47G|&3b(vdqxnPW);Ik;=uUy( z>-*3;ovgD+0(X%&!CC5U57xXJe*YeYBr+beO2@Kf@=W@#3s%SH3Z>*P1`2%$I5_MU zqZBLO6bE0aqrkLvUh%Qy8n&|3;w8=R!YYB+?)#qdn@z|4#PNr}eTd_s-BuU{P!Y`^{d4Ngu60!Z#Nl#3b*#m)OLdX5^=1QdroX^rv%liO0r zvD3@%t#5%p=afHSp{nKaRY9v{eLM13Pz~qzLku7E^EU#2 zu8Run{{#8Jt9`z6_|d%@+emEm*-CrZipEms!S$n>8XuagCBk! zs+VRj1p(TH@okG0rjb?s=G!BnMBfRrq#!okDzL3c6N^6K7702>mXWfIvs2Mu3Wf5E-ZJkxL zjv1qNM-px~7l~uWlM--|4tJ%_eOVRNl4EB&JT4(4)K&-BXr|QF7D?o?MKsXD{Bw|(q zQ{`zfS>Bf+X99Mwaeb@@OK8=v)<{=A4X23JiO-qsgRy1=4U)IErGXcUi8Vq`jhfuH z2ZSttKZ@05V)iP=AegalSab&UU(fl|*s~FE(&alI;h1{YU#NC6^1($qu~%V^Q8W~$q;MOK5<*8IK7Kc* z=yFya+&L)JfQw8;enS9GDH1{8g5d|T(04i4;RuJQjWE$|;W?Eh}mf^PZ0dbj+q|3V#?90?s}KBXi( z#At?+E;K*D{dU!ScYNH5`w7 z;{E1q23%VN+Ks_^B33+V-VrIS1tLVyvFCng^$la=;~Kz$YwB?zp3ngPYlr_f=8`6juuy?m}k_?o+oebT-s%<1~%~VpkmWWckaMpDdh* z5>^t>0LS1JaxbrCsnXy_*NDiIly(2k>$71cgVMC^GO$YEXbr;v&e!GOj= z*)yPGMu6TC@O~+{d<-FipS>oN$&esBb^9W*M+{NZ>>#B)x>^hm{9)Ay$~w^d!fLa( zscDe&Dp&q~3c%HxfdDw1s|BPBNOz;m9qiC@cC6Bac*}z%N$`q`=P2CqajdN zJ)k59F!y1XEl6?$cppjzI)H-^_G81!4dTyKZMTZttda$eovBiCQj+_&6ET*|mS#ZZ z^%#82S+a5iIHX8R;LV%Q&_f|@ckYE`aJNQN@u=PzHHHoDvb4{H$D>l|o<^ARBjpf!<}?|^k(N?qx>BOe5=-ath~ zrChugQ)L5^+abgf-oit}rBX=tg(gD7D#XKw^I+@MXnD8#-i*XVRY=qetWLW7=s=UP zXP@z)NDy)A_6ta!2G}nGaXDhkG|Su%Aqjy2`#B-u956?Lp|jm1Du$?|HSI|lpO{$S zd4_-_vytKr(jErew!yPm=4nju%t2va4^+mwv#mm)M2FP%Ghcm|?Epr^Y7Ysd`27_P zu3Zc7h&vw&DhUI7S3v(EvidztBR~g{crl_4!4{Kt=ubn;%!}IE?fs>mb$=xWfa%`; z!5xDu)ELVsARiH_fd|esPmWp#IR%PeI;%h7VKB~Z*8}1P zz&b*VULY%H4tD|bqsz*3v!6=_-CW=TY;gEI$8EMh&hmYCw;^h~14Ja&?kdDX@4bk( z39UMNbK9Q#~MT|?kFPz0L$b&RK~)D zV4r@l{DiuYSj%~>Wx<;L#yw2Kb)bTmU(JiST_O;Yqmy|E*-wHoV)G!Hukr;#9TYTO z6~{JNc@>VPWQK_W$N@TkA$j?OieA@4{ohS7$ZrCT_u>Q({eO7%*R-^PV25$!c-)41 zu0Rc*4OnBaP+;dxLZMWuCk*hJpjti#O=Bd9CJP%3CjiDVwD|D%kKKzTs8T`8udA@D z6k)$dhIm3j);SX91hg|yb32eE05OA?fYf*cyj8F-+2CUQx0wb+14SRHfTQ+i$Vg^n zWWDm<4NI5ZJFLuV>zINd{_f-R(lC-By@<3khY6J z95=8PAWd9Nm|fmDC3cx-b-L$Bio=Ekpdn!Mje(*I>;5|>u&hnro+%4-(gQ)GDDFVdDJ8naRzEJW=Wy5=kZ^!@OKqLN#0|}P( z)U^+mC(AyF9y_)m|3u*2lQGnW2`Dfmn-TRR%0ygz;77^bLZR_3wjlzV9lU%2hiusP=YHLPgAJ207r-~r*fO^ zfNk6|dw@&tTT62@6j$i>i*kn`i4Nz$b}+_LYLaJqG139$hOplz z?Z&V_VVmFwna!B?H?D!Rl+g4EGXDfDX2d20`?I#D87|fagebHHVT+)Wr)fSqr@N4+)Q1^O*xQK|v=qwMj6(@)yF!;d6sv=yLK3PFH< z@D&ERs`(AtYNlkQW^w*4-H8V!P>jVC3@PiSpne_6mgct`@&sl`i|LJPgMPQo5}G4_iU@Za8xUFV|J zhk1%2{$~%hSEWHs;=NwQdLv>wYKO3{K4HIa#2iecRtY|-qJ3Ib z@d~L+k{k>uIXOA+uklHEOZy)iHmV2rgQG6Bgp$kl(_!U5D?UUVsFTnJ4H^LD?8^$x zPfk_`R&56Wey?7?ZXN7YR8&+;(AvgxZ4Kh2Qyu?+LEA2?CJTK{%kj_-0I9b?e7S6N zpi6Sf9s2LkJ;7C-ZHA?2Y8ii_K4J9x5&vA$b?c(iQWHSK4ZhK`_ePy@E@}TD0na}M+6f4S0$;2pv4Q*rp*b-* zIhj;_a^C}1;j3-IPRq}g1DmZAHoDhVGT;^9)jMGJbMX|{%*SDe{=mpw0$+x@o&n?< zR6KOWOXmF1yY=7*!B1HB54k9S$wk^J?qbD7MLBjo(tzHq-zM4uC%muF?@rd7kBl0R zCWV{o!jp7xYJkwl^MVGceOFk&Fa9zs18@(W!C{`a>Y=scSE~x*las4A*lodWLemZ2 zxibqTYpN#!9CigF71XyDYz>gDBP`#6?nt(-(FCD#p`<%ymMa-#9S#id;pB9t*}?w= z&U6Rv0AqtjoXy^NuYfK%HlVgjW{#PIh|fyV5OS^%rlV$<&eIX#NwYHI1`4yj%$6*} z@H$V&L4lQ_^!ONvvDlm5sL=x`k^6HO%Ym@)@X_U+H^9M}?L~AEIfD)*jpTR3TN9`Wdo%iE1GuUSMpmS}g_WjJkw4f^Pb7huM(BHy2 z;>~E$^D5a(6Ff%i20PE6GGGB;aLh4qg=gB<*0zA3v=+c-vu~6PEQ4`C%@%7d&%@c&KdQZRSHQ8cBwOpgjhhmUfWhr_OXVH?z09 zPr(kTA<}IVkI|O{FNcm?Ag)oupseNzLtnDbJW9d+pAP-1KoN7bo|<331S1mI;3U3{ zXPD*57qyQ_f&`-W%93O6cBfvzQ}MEsSRQQ7)%mnL5`apJ#FseTT`{*~InAmGAu6cT z65!02S$%p2@Hp{+pUP@TfCU1=QjZA&8M`7Fx#9MUi(dY1z6m*?%u`Niv&_~5g4 zR#({{84e3~zclTh-k|SU0U^95kSu{dxlz91o;hbhHvn2Up7^y&@yxvH*agX4yaUhZa5M>4ynK2#S-Pld)D z8OAF#Zxafz<4a?cP~24txUk)Q;@s1$IS#`UFX4#Y1TFgxdDxa~pA9-e=5brI=eQI{ z;l?{ab0Kh2l!FdjRG+xAUT12FIgM%@^{Hf)MAZoZ9KZ%;O-s0xpEL&@P9Za=lNyn}eU!C; z)Eyv&{{G|tE5nji3wlLT& z8olhEudEoqF1<1!mLSnpF2LjlT?7Vth`Tm{r43PlZ_w^JPzR~Yo)uW5!K{#$7mq+M z4c56`UkNn&;iBdew7k$G_VO~^9x5c*KK=n3O!nYcHmnmpMdfxHNEf6td1K|Ka0mV> zq<-?ea%`0ekCn^8_jl3JD`38=>Hsvmj#$$1&tAc7`CO#{W&s{Rc@GjtX;eDPhdo0b z?78UAf|ib;`WPMd1*z=NDMLrW@`2ste|y;~(=)l>e7QKu3!&D?;{FNupcUtS(x!hO z?_GJpF2%;Yn9(OhPb+~p&vv3Kioq3`==iDxzpc{_7|`K;4plO-ePqLctj-1nAM3%O zMPRsb%utR9sPn-W(7_dB;(vWENLA4l%QF1DI-ts;2(Mypj)w1?;I@N6E`^RfU;Fbp z1egStXncRbB$jX8cU~I=-l(rC=NPU({UgFQ*g&N_9yBnOE1ZpX4do5fV5;?XP@YqS zw}rcGultXL$}Z0`>f@Gg?5SQDzbyLT=Qz#tmL4`NE5^!fsI~FYF+Pk5pa#knPWLVk zwYq|=O~d$CHn`3JXmKi6Fv%Q;j0N;N3Tdkg`dsJR_rS$PL|FKI=n`Ph82aqvNWU0+ z%7`78vhq~PhA$KQ{8sFuA|dz!wxrrpr?SEs0c9itdhy~8bWPYy%4eBI1B^lB>0c2{ z3m0daYXDdD7rG0}h)p~7*;(vrS`W|2smk|by z15@onoqz!=3|3qlBKBqo`Gvm(v-wu4fjH~63BZ1h8I?j_0aTg|RY01-*BLS-x*)9* zy3z6H#RCwov4;-qowfDC-hTEzl_Ca_$pEgK;K6a3mqTS6id&9STv1 z2j*F(C1MDnOsvZ#YVH>}6@tWtE&ydoc8H7t2tfTSR|egBfNT^8j}+&_i5ew(ZbCxr zG5(lAwS2V@?QB3Xw1 ziI%8$A@9Qh8eofw#8dm68*tqPP6-{eJ>A_)i1cFKct`^^c?9CwxA!>pP|yHL0<@?4 z)<(nDfntsw*!CAtLwfhpYV9mkXkMqA5&Jh*BOS`_dN(>ihdnejeAF>@?=~^FUZB&e7u*70FpY{)L1%%LRdfg!l!(=lTRvk~UBXKyCVfIg zegk`dp;ZDxHxZ}rhQfI=0SVo({6m}Dmmh>qQ!sOg4~X;&CkUAakgR~!xeP&#$74s( ztwBkAP*19Ll>t$lFV(y)q%A6mjeKSS#};Ep04zVynQD_$&vSru=@crgZ4UrcL_7}= zT-Hgy-ij^*KQt8UD?1ckaC^6 z4ypP{NG`VnU=eW()czDey=B(L7D>qf87r}D;ivM|OUwC)x})|- zVvTk?Mg|9Vfr;e@R*s%$-wDH8nyJIYXbpPZS|K=M@H^s*TFNO=9?sGcw0pN@P>}tlfc+w zo9uNr*bOG)QfLnJ;8=7+?cjQJAV*lXlqCK^34DzF;p!-$@4%+kXomE7LY^7f3j?IG zFMW9&8|GgFV*+D}Xes*oe`NlMbPE1}vz0({A4q|I&dF&tmVF3I5^WIJzd3j6xZ$KN zeov(V2>QH^y9a<2k=gk3GH^t?%yyi-m^Tc4RO=3 z#8!$U013nKW6=uBvP+?*^972Ji54Z=CevD7ImfmJ0~>VL^X{~>9hR_gE=X!oCE!zDr= zxMo68B1#a&H$YuQrDv>I8Axe#Ej9WAXr8~{ z>MwF3AUeyUl_mASu)>;Y3PA}rbTcr9gxz%}k#U88(ivP|UUhQyDKnXJfza9H&%h6M75XM*Cv%_Qfz=|qyOQg`ChxSz~XwRAtoJ2 z@W{;p{i7LZbtutf>T(Zq+oo@2fJfN`E4YOA8IWlu2T)SdCgF>6wgph$xFKi0&c(>a z%TmNppI^3o0tePRl=kWFn4YSIdsjfxdtQ#Q>TR}=yVggKsV~*F&R3AcDqDl{1RSPY zkbu$Ru)88Ixnmo_>(oBycZ!taIj<71Dnx>xd&aaR5cP@peS7!1Kh}bSzzHKYXI|Kri*A7CK2KaFWM;~oqZe7bT^Z{!Ap&zV4xV_G zpn3*)S?dl7_kLu1BthQY_;g`*wjPn(mRZ|V@xi_gn$iB%6FY;$;l}b%Ju5Z-%SA8< z?zc~C6wQ`VmH=A*F#0K&{c4uGu&p*edAgeh*?^kB$lGGxt*x$N%G%M1V$#;E(4$>5 zv?>+RH0NkIfVoj4P4$l)F=?O*nCR{5~0`pdC9z3#k1EqjP_~$K1|4!gkRN|IAiug$i$^h zf4h1{Wqr1wh<)e~B<&uBllFidzbAQf0?&M-vGX@;p+fE4=`(alV$Q!xv`87i^HhOah8 zW4=|o3B6QT7SlS~iYi5=*HQ=sO>SC`$FF6u3LsSY+VnD607iqqP}MCgv}ojyhV+&D z|6ouZSNL-w4$>`uInCb71T(}Zg+z(dA%94I4XM4q9uji!ZYyqVy??bV{NzAqo}E#J zyDfa?(c5+GgOPpVdGL+S&D)=+7wZa#5`IQALuwH520uRKePMKM)wKYUB^>n$EhgaH zAU??PTE7o;yU8G#{;bh+NU#Ct2X3AnzIjm7vN3hYZ_`V)$PK$O6pbPFd^A?V% z4V+V=_XXHH1h}+mP{IJN?xnSS7y<*R_~Fz>6Furd4+g@y*X=)oKxO8});!-9DuyGS zwf}Ur2Ibq(lWDT+zr&VWVmGg%ZoN2NE6|umsdxw^hWuloa(6hrsr$*yp|>OT(F8s1 zGs5<#ZfQc!65M4XY>6X-&K@?ySEpls9t}rIV~*c;M##HmfH=kN{BQ3iEI}@dW$|(w2Mrjchd# zNXVar$Z$rYLZrtPq%~38e(fZ*DK4?78ys44*8O5nIVgWb>lDaUwt>;(=zlG00Ia^u zknxOs&Ga-EtA(grShv41q60B*U~<&hYP-5m>Z-&JKN9o-B#^qf^v;f!AL!5D;+wiZx2C`7`;F;FdqO zC(E7x`#K*^QllI^@R&b32M;u*&_aK=`%W{-TUdDmyyVjUXaTt2Qj;6)z-f4+sv#pd zL%upe-i=kj86Djj;|JOVw)FfbhvcH&0Sp_wbKl3`dk1y|?(_GD9zo-W-*23N59c_^ zd%@Pgz1qjt;L}?nWqYt>c#o4iNM$f|#t9A>zwO@zj>U1(t6>{x5DYF&&%HN<1LEAf z6g<7&B<+9$3`d}f6+FQEK;V`T5z>q6K{=fBjxFuQ9zkZ!w=rQDJsLeudwb$~&kbdT@2&0hs2rm!ct=e4m)q{+~xI;+jQK^?+eljG|5PT#ruy5sg*KUD4@xE}3V z>@z&8ini!3JJ6d2Y=JEBkVE9jd1 z`VRk#{ktpJKkoE>AXNP3C4Bw*m>$N24&-+~9-=P~3H|pMFP)ENRu+RfpL@i4aKD_6 z@>*?#6rp;SygJ(;Y^s3oY$>ZNZN$#<2nOw8_a%{jn|*K%z4rJ*~0w^;~b zOIBv96E3~z*8<(#BVD56Vjnv-XnukKh9jT{~;*kFlpRT=k!&{{cM>MZN%kL=On*qE8 z1A3%RCiq;lz(38Rg=YFij*aTwkGxcOmrUoif^^TuZxYoCOF9_+cGyVe33MaTvDAfg zxPpQkq3(V zJ5JYAv5NXYNq&q!E3GC!qu3)2#~0iY{=kLJ!@iJ8HJy#H^v@@CC0EDx54!9x)0bZ) zx%6z^n=4{5J9hL(OFHR5=HRy-rDDQKXnN~{mOYk6+t5JqZS@G@|3uEFe*4B_D!jv^ zy=}Hbc#&LSj$yhm>6mPNV)>CPjl+K!zdo4mZ^__saBrAAS5N_(wB$bR}^*jfr%YB4fD3knq^qJ`Vg^eW?k6Cd#8uc_<%s{o)_i! z>?Y@m9_8HdYsk1z{HcSr4ZfIC{>M~YC1e#6xlAZOCi15!q4M|B!I9eolJf;ONenpb z)TqnAxyE6g!^?VOtJoOxzbnHbJkR=1WV+!sVrDhzrug`My<2X@+|madXW9>K4~T(x z_UL_g(04s;btd@Tx$RqbOq&1X!LujBItgRIr38n8gG3I9e-s8lXZ^$qJaC4TL+bb)kfbrh@vb%KgKlWdKlPP(JRd4x?N`!Nj zW6)78JY$^6Ygg*@bgAL`9fCooohEtkMNOWsdL>VU}C7*VMnH6Nq> zNp#?4V4Td%-)PJBdfPmveoTeMe*!;fnQoG=Q`f^LywiTiLelH%rHi zVx?J^oa?zVG&8&-n-nni7p3yCt$W#tg`f0!qtj7J z_6Dq6d+@tw?}+S8S)txV!+ATjG7qMn$<`bmSy-zmd2P7TET*=B2}l;D5n(!?d(Qfd zP7Vueu!-5X4;{%*KFBhA7Z*=Vvu`mo$iF)u)-&DojI>UEh;~VL4H|z6+k>iuqr1G8 zT(I~4M$nDRSnrj1TeN;ENla0LSe7YgPurT(79i|m5-L@A-@M}Im6jXc>ji>ZQJ0Tv zL@bZ9Qye%#MBD3Rf;;$P2yI%-HDTIoEc~)){6jYFLf08wv*taS(*_<9`!(daf zHk9^G3Cvr>WyNyS{vVc#XEMCtp_eBqsmnjM ziLbbkwr4H_%1>ecTyCrMD_W{JW#VD+0S#!MQh&t-K7RAVyw}ovN|y@?3LjPlow&Hx z3Ht~=OfIyl-0RbwPTon;>u1H^TQ=9%*`L^*5};SVobB4DsIPUv+HBO z7M!QC5>&BqygGGTU$?_pVO6O)vCXEN-Bh|MYus1b0r$Bm`{K05Wj(FVsIm3FBaZKi z#Foj;9i+C(;TKY%vh-m5@$FQ3!qw!M)2dsW!)#08ZFVtvEpYldZC;KA9XNApw1(H9 zSx4r?ah_O5=t^yI*|qhN$#@THox!yAnJ7n-7MrKti$|nv<>IcH zk`g)$X2zHAzq>jaXtFA)>DC?6*W#h7MERb_OKEPMP${})`ax*?$f`q2O#2~`aN_MA zm2`JPy1IO&SaR`OhrD~=ZC)paZ?(e8xDhM%<=lnI3@0{)-qwU^-L~T7fKEq`eS(-_Bio-k~pyLO3 zmt$X>rKjC+znayJm>Wge)t1Fi1rlmrOc9ml9Q6!qh%*ykaEi~W#g1H&?{zYI?7g&@ z?r~>ao3h$Rr>!|>E!kFJi(w@of{!WZIF z9qadhbLq;R+^=taQmqvZ3*f7K4>9cd)1%Tbk!x23!Hov-hE8IF9(W|u7foJdlaSlM z6;8NZ3u$|@x+a!r#Q7Y`zHR;R9j}!Lhfr=$45wm zTQ0Gj_ancHiG4?2{-1+EG$jx*DiSwG<)aUrl?(}N8+v^K|49mO

#S z3F3T~PbKp=CMo-g;coD%uvb1&BW}efWQ)EsCRbFiIL(u0KewL9CpIwg!APOAN$}dL z{4pt5raL29xhQ_067*KApHF7+5!pyBkSX)9RcmmE{WZp3MsUESIw zA(|E$-vHRsZzA`Dt>9=jLeZ&&pC#>@Cv% z(K@MgvU!aP90{5&yCO@oJy|2OMr& zO!>-BE5(bR-l1S**<~*NxT#g&+Xp+v1#A&or}-qq*K_P?4@#C-j)Y4el<`*14B@-{ z#(~i!v!tv##^~b3(phoOyWvy;;wKMBLrM<{t&%w3rQ91*#t)Mh9&t!hG{n?5_Wbr? zmsQL^zPOqp6;co8f}9!dnlc~oS+KZ=qs;r?(^?tC0>Qml!6gVVt|c)G0ziX!@^! zv3_@>QsJ!Q;tRB6l9gAr9??w=-g$CWY3$;sa-B~zCYpjv8&jHZR_}GyjNw|oBW~%0 zZZPt3>jh3u{%{O8kkQ2+Nn*z&gwL4;AprurEcrQ})fq1HCStVYanXlCOgY== zebbC*hUQ6eeTmiSZ{j1TOhVmX^s7s6QkTD9{_JDgOr07Bq5fn)*&yU{Al zvfl7{wd|j4EveC_wBD$xAuRVy$vCZD<}Vc$lHM)yAg8T^H<%2EV+YfC9`hgivdO{y z;&iaQ&`9k*S*F3x`k%)`1TYYMynQ1gd;Hb4W|9wJkiYZm8AtdV*r$#zegByeXAmUwn0Oja(%1yEf8ONiy1@#9yW9lzqmCt=kmySN_+Ahqs*x|SIi{_qPMrj4xB!uUTSHF?=3yR5>KmP0mEEZ9R zNz;Upm!jbpvU3COF7pjoJA1WY4|Dg(ELoQ;EzFlGvEF&pWp8bQg#ad%=wvo`LF&$$VZ-#+%U96FVOxY?OJc7 ztI&gUh7n8*7p7TY!;!TZTNb*sBJVYaeti+Kp2=6dmS=+5|FpT^qSjsM(Q4XBNcY^}{+_x7|>PS{IlYz>IM9}oCn>b^M9=h^x>q;;eT=kfEhf;@eje^yH${Y|w? zBX8ps)?DNAF2eMOs?(u^&Rnbb$q9xWT5$xO9xjPclzb5trA$!FAUR~5dd=SP>yK}N z5dG_vs(t@xo;8PibJn_;rO%iCaB@FfFgAIQ*-t)}U3E-?zM%f|%#b^)9}j9VRDbPc zMcn=5L!$dhzClK$?)Y74)*{n~%cm=cwkF#5)iR?aZ8ADLa?DTXh+NJt^U&PmL7!Af z4fZUUZ0fsXVTiCHBKku>Snir&S>sx)BHeFeuc@?sv#=Nua}}M!#y_09l2TSC`N5S- zkTB1loVH^m~PAz10rA?C~ShdTAJ%z)5jPl+kd^sXj+c9 zUX4W2)ztd6ltb(Ba=|4>aFQ}INPSV-nwG2eu*H2_S-6u;{lBN&h?kBoy@wSBXEZA} zrt}{_WLTK{ z>B#qoEm?6$OymW^HMw>9jL+sZKEJ>AYX#P3M9%5f22$)K$)gDd`|gTktz3fxn4Z$a zc)gL57w&DjO$Z$ZF7$S4@1IrC#5Z|s?GTAcKA?dhzki;9ohIxv8`)m@*0?8*@ zeCiNGXLib^PTwY>xkTi+S^+IXlUCs0q-$UCON33+sqEoQ`}cE_9$Q~I$C{jEO<^H! zV42{UrC^;pg+b9z2k3mExLK#8JN+Y&pmohaB2SoHx-aFXXzgFOlb6lKM(| zozv&HLF;b{VeuoU=M0yZ32_S!y0VWW=+5oc=kJ-a9%;(F^Xmgr(nm1?*sl+iY$6+Q z;ET5U-YlKxSjSu4Ixf5aL4LsIeZj_RDH_k)tM+U2gn}Jbd`2?h>og0KqtJ0^F1`Oo zjlx(Xuo)_M)NJ-^$0pv}p%pAGA&~#8UVijZ za$d{m?Ayf{KArG*=V7dmD1|hisSYVBanVR9b+kW7Z_!Ob7O}axq1i5R@p$X#HDO7g zo=kP8AEj9I5ULcWASS9i-+AZdwK()`Bh3NTdRhrC!X^@XTE3;TTA#a8ZgP|`gmN+%G26zaR!&jxX{ zotXUTNk_tR8dEq0Fbr`t{pk8SW`8xK0Hp_ zZxegFr%uBt!tLCiz$4_?S&*}C{AXZm|MdA4h^;to4F(z2KlnHhm~8E6v*tG7vjmG; zEL-2}S2R50B%2sx+;UTpG5GY>AC6;pQ@o?Chk7ahf&i7WKi}I%yF# zpi)Q&jO|T4iz~`ugw>lP?U6SoPLeUm4b>PK(PQGT4I@SJI%3;Md|Qdu+{xfNP6cHF z8%w&BB6pwEu8{w1H6eBo5R8EZ zYY>8zj9~(fK#|}W=B%wg?15NX{s0SLmN7+x7XP$-6mQDDjN%88?w3 zsV1jBtm2KUY_a$?<&Q+gB-7HGnT~3K=iGDm2lmK+d5>J8c#`~QHh}raadHbeGX@t< zCzGsDSmQI~1_vUtz7=jBA4<}fNVzQeh8qb|2m6Boljrgx+4=os7XMB(+?3XChQxw6d%6OTc3O^*)?gmR#*8 zX7|=teW!wY{7+)*F|Tsk=zz0V!HsQXJ5(({jqFMyx`%a)9-J(&hQ?#VBjOq-UHFV^ z@~un%y7}%Hd#=k5RkzXm)yKZ}e{q@VH}f5iPyXs}S0F6GhCJ^&v$?1MVB}}~sEU^} z{q<7BGxVQ2#4U1UMh7O>Vg0*Hf;I9_c;cO)vxX-*xRL0-JeK3`Dn>zQ*JYDA3J5ZO z=e{T{Y28(Be!EaV9vKyq4(FkV{@%$$DI1eb)xdO)LSQ^)}C!6yQD?N zKRdR~Rphv}^DIaA!M}!wN48dKAgbBhZYoy9Tso<@gX*ue<3z6AJF4_Mz4-jt%e_;R zUpr92SoJG-ssg{=+l~P^@4OJ@6|FJPWmCO)QvFKBz~MKdj?VhW1U2PsUrtZ5%#rgI zD36IMHJPJ`V_nlCH=H@YGGf^&&Xr_VZi$q4@}7E9em|CpW77 zRiiU&twfr1(4~gk(D$8;%}T*qNNX-|;|pI{QG-HJ|T33;fqhYK$owBNP7O zbcNT`Nuz)rfwg0MYBL_AP70_l4g}{P_8qJ7-zT{BLt@RRe`^67L`i{#ewO`1F}9G2 z?+Zr~b|>%r*@67NT|x3!_TG}kPn-6W+@sgYf{T>$smZe$&QHp6C#Fh1cd$kEZ(kws zcqJ0}*fa7;B}rQY9^V@ixVMPEq~BV)_5g6BO%e8b^K^=|??s>BKy05)i5Xb;a4A{_9I7 zoDK25FlJwCbB7bW0FFW{v!$P4y?_Wz7ZG{^?i|1fC*Tb&Yx0g8tUH&2GHN%UpNa#F zhee7+x0&4?9O?jO(*8nV4Cucx2CCwGN5uK6K%>%a4mDTT zJe@?{(_9MmrqNZ;@#7P~AuppPz3!TvS?r~J`mcL4pCS~R3wN&;^s|7b_bruZs5>8T zxhYH|xRR+MP$UVi5!5eppwS)!oIiJgKopGc)qc;r@kNn!fu@ZUG1QvlAzm^2BoF6{ ztpvr&QdHGMl}%;!lHS(59evtKz_Pp-3E}rsAv{`G46Mf&_BLe@&N`tLvHlSD>fKfQ zh|0y(c!j49`Vs=^#NQ=lhtN#1RV|x04>nV8L1Cp=y1|NShC{|6_DZ<-pno0uaypx4 zz5==o^@Uy=Mrdd#L6OHZs&6w=ii|)8mgr&=qXFYe2VSq&({s2=l_skHFFQOoRz;g` zCPw>v!-iB*Via;9`Uu2U_3$zJ2;Dg4C^W?}Z=hX%Xl1IWqb99m3wYdv#v7CS+B@UK=h7-CNQ#gn8J`wjV6Hs!8Ijg6%@D6WJtY%PEYM34l~3^Q~R(fyJl;@~gs0w{3#GTmHa- z()ttt9bQXR0z{Gkwx(6TNGW`L@zO5>hXN3|3E~zHH=TS6YWf~+I#)JiYoRxSG5WWl z-*2RUh<_*%lecQkJr14pz+A-`HtsCod&51a#{*-)_=Gd+@MR5fS+J(PP!lIE8eQLf zL^C_5F=_U;{EPznxDx&uy`@DEOF^2GB7ma&;twL!m7wlt#tQkr=l#BS z)BA&t9>MqlT#kS-)qV?>)ub3Ju~JjlX*{azXm*HayltpEVVs2fAYwbX!)h$M#BPJs z&XUSyDb8}}qRfFQxFMd|&DSJ8tV33+(>0PD!av z(VAFJF%He4l=h35|2aO}Pp`P~;&9{(b;{@IZO2ZyrsJd%Ye3Z+FBCw}tE zBD*Ddk=@G6a?BAD;G8Smg{fF_4w`Qt0c4U;mmS5;jwT~7FA9JlUR^gCE=oDOYB|NL z^Z&h3YJVIV=q%h6@T38Z8QOoK2)M`<6;&R}>*7-Y2|oSzm(N~(c0cA6d7I5faW5x; z4#3U47#fc!VR5ef)RSFI7atkEwFqH`mur_R04V=`TLga7{C>w7c*Ao{aZ-4K*^6?M zm@{JFyU?~mC^m>SbQx31%ke9qg%F#x@18KAE&-P2C0(@y;YE&eB)c*%`T~%*S-0D( zxCe5bwBlejN`r8avbs(I8C4i1%_jC7_Y)(zUifL$1-yxS*}niM^8T&+H*?HFq1+^! z{g(-E!wJl<5b(VJuqe5CaStnOzw5s&lnSaskBRXcjVQDj0gXjgUh?pIb6D$iBA_BcipBw$l{t;_MnBSn7zhq%DUuCGgo*s z7*$)L2|r1cyMc1+`G2F_$Tv{4_`~%%V~)3NKA^!jO)Q_qvjRki$@^a*x<&th=$;s} ziQW0{K2(m}IdUktx$VtDfz8T+WN%Z=M6>Mdz^2ty;F={K9~C9mXR|Kg_vv(AN@5ln zxA`^Lyu^A9i`^6=5ju87K$Y+Sujjdl+fL8*^2BqVN(6WoDlD}R&H@;0-th7?(F*ck zxr>i(i_q>@C|PyPRs^YzK-`;*k&{w;SMaX{>4qqkz5f1p>MosQ9HRcPOD4e*A^d5)6dSip5XXE83z-dFTjG}inh2y# znC&HRUwZV3u;=f6t+q-I(~jw{UROV#iXW3)uz4y_JgBLrOi!aplX|U!CqJe!-y&>Y zs>ULB?Yhug#+h@xX6AHrMnH=nW6d!&lYoEYXQEGGK@=^?1zY0bh72~Z4H}Dyi&WtbnS9K_ zt%&J;^ILFnsb1!pb1wrEu34HCPA$0Y$}=hM0I@j>J?1-y>7Ki5q(!L_#H-jNk+Gc_pZdy!uP(Vi{ET13yO*o|&P&f? zCsP)W3sp=UqYb{5ocYM97@7E%ucZB&X8sB&A@tB!httJt=#tI!#`}x?Qmx)9&X>r^ z@x&(YwF}cvY)(4a~UWv1vH7`c<92T)>eR9zcFrQdU$#MQ3@%9x5&9XF@KASM?Hp>)8H-cxrB%DF>lRV5r15xm_#9(x8AyF79kM(bvqiaW ze3kbA%e%y&aL(+O#TgOFA!;cc*m&h&f`4+E1BX}8q#!%zDsi4ScuZp~x!l*q3><&@ zR7xCgjUTfLrNnNE4qoHC%lQXgszJ7vg*&A3E-^GswO_Ia7TSNhR=bF5Ik3L+{bxsR z?aH^)|LhyPJAVm3zsfhJ%SiLyH4yd6Di&)XD}&Z4`*GOe6Vst$WV)IzXVT1bF=#nU zcn?M$h~UayoVF%sF`$)g^5?CeRIHMr#*UEupVto$iO)&?aVOfss=Mbr3E=b4DI z17!t7$nzrOHrrRp~F-LFGUDR_dPvp@-i@SpOr}x#mnh2Z|l{|496NQKknq> zx~F+?@q^Rc+T2&DD4WTZBHof0{|s5q5o^K41wJ$6PcE4_W90gGtaWg_!+0Z*&ApC? z>I!qLSr>wXyN9+qyFD!}$y~@XcGQ^SwYD(yXqA#~mU*7C*6SkKT6U+fi%QdbJ1gU| zdOw~Ey;{GBn)uS)v3I-Z@HK%&-m({XzFYE$8Q{Cd_6nfqTbJ>3EY6Zhzv20=@LYGk zM@V5wV;_Ic*Wig<=pXK8_ETlQ9+`b-*z7&TsX$fkz@T$`>s|T2y!d^upvHn=O3bW! zSAFhM#YeoCE*oB>Gq}7A$P%&9Xs+VA#I}Uj)xmoCUl&ozE-vy$qidr!Z)h3FU6w*$ zOy!VC;FQ0}KtteXO~J!sBaaSCP{q5-{D;ck%&*zIkpK6VCv&L}&)ibxQ(hMyRc?@Z za^u*@#b7Yqv-Wqg)l?XsPGX}j`Ju<%${9-(bruHhh(5n{MSZ`6JR8;WU{kT0y&|HI z&1+9>!8v9&nkYPn99-S1T|x=NXB&OxUad^AniP1^hL~OVc zaQycDP_g&jR;wv?YQ}a=)Wy}4TO@V2B#HbRnViyYuL*X^|2mgljN0t8;mZCVXR*-7 z8jXvNGT0~yGIJL2bBM-|zI+$+_^6eSs3jLwGcI}ggZS7M+h&bK9x9CNEr&JcyCpu} zq+=CZ_vp5j`nvVa^Qe${E-&w{AKT&_dMJ4z9uYI4{gJ?!+P8%Y6V*A3EJN8gbFu9? z2f-zFa)rjeffv(`f+V4n%86cZ{sI2UVH(99do}J{L?IT6gj3jld2PQ3ZistJHX^U)7H;)0 zZg&ViwDaSFd*f1~-SX!dLJES?{PXwvvg2KZ?f3^x?ybE&+D&7g?p47_PILV?eTcG{ zjF8_BpGPbsdIz_<8yN=(V`=v2m)4*I0_2^;cT z$YRu7+$**2`{*qm+2M6Tm8FZDIVd9%>AS?MjE`+eSF0WWT<18Jsz4QUc8e(4Ej=}+ zz)f2^G3MS(6)(hX4lGWMcDuUF;tU@($EumFSW8>@TF~{Cdlo6>`Y7)Cs`KxtoDDOT z`!*vlI=zb7d`!Z+#`Az zAwP2OA_>bwS=V~wnC#S!Y~jOW3e>^Q+gwUkSo%nZKR+vXI@Wj94PV)_&1^et^(nE3 zksLSrN_F|O)&@Nm_{l+)k;V5};a532WtI zOM!I$m+$^dg%`vwAU1`f58%T%OWPGro)P`+;wpWPm2dE>DHi6wQxjFf`^J83ebh}) zi6jQRP(SN*Yoyvw3`Z18#! zHqXSduO%Ml-!K}ydPI>D!)>m*t4Y1`oPo?Gk~DXazG@$n!)a>1#M@w!-#~taMB@Gm zOkJcI`Nk-21u~!?T6d*^HB5uySqRcu3>pp@oWA;})nQNz^DZPhNIrnImBubgoqpKw zfD(*1l&8)uOo}Dts%XGf7ukHVO&H^xdk^pBBh$kC z>N0;`+%5-hw{Usw;TTudZO@x|sLkpES9x()doaO@>2Ln>f(8o}##>)`4VS%({vJqr z=_Bkb_x!XCKc#HpE%XOc=Ce#He`9bv-xGOdtC-N7xGt1u(hjV%FVuJk8C@wJ+GDQaQsg$ znj935%xXmYcF9l!{Cy>JiUl|os5d5{ZxbN~{%Jy8CV5$K?WXd;!&QKJW`WcwjD>5V z_TvC*=GsZthPbe&OV+3i>lTW$b|K9KFwQH_HpnPKvX9u`5fbs86*Ak9bRjxPphTKm z^#fK+Qm9F~se2{DE?zzN`SCM2Aube_+xBfc)Y(n|I?|UK)+ZZl5sW110f~sqCM|L% z!S^l*mj_FqfGekX_YEQIo35IFBN0{yMsH7NEK6@~4ZarY2l4;p%1G*T8?@HEo9`!- zY%wh%5~>^M8AxUlwj)tDM*c-}=QqyqOCLALjnp1>%`fq7lF;d~G_f-6vCE}9!m-{G zxpni55T5LP%V(Kgr#R8vr_(IyQd6+8qm5-1K_?Vh(kjT**;gG{P77QlEO&qSPbxBv zHqvVv)7BD;z8$UhM_YV)8aj1PSAfuH54u*Vr0IX4pWS(FQ`T>a#epPfO9nRLeNw3& z{rz&|u!}-kyMErkKcbI@Sk4$FoOLkOT_&gDPF?r(z-B38Z(e%B;0d<9^rkPCWaNR+r`&~YX>*x*T==<} z7BHA6CS0IY@f-NbLpy&z!82nRsb?qlMQ=6{ZLY07<0AzDyBcC5N@OZFsJcy}o)y3v zJ$}M)>FDbzAc_y>+(9v*WR8N)&2)>pzg>kOWcvM$_XXHTH#_L|u6LLt4wa3bB}A~~ zcOk2fT&&vk{?V=RO&;%VEq~4`KWGaX$E*sn&ySaB=dHA^K0JJuOJ4}?%;-gDYL9C5H_)Ng?BlO zoS%jza!`brNm<{J#!S(uakt+ObIL+!C?5Zr}QK*1ugeu!Z_(=_c| z_4EMqgWr6q?BYe+utfw1i9KOGe^4|t)j#oVv8NgR-g>p?kOt@1+WiFJhQD7hd#u6D zw+${P_T?K?U)$3$BO)h%NHB}wR{A}=xF6G|5(6Rbe5AV$MuuLly}2H%lweMw6T^`9 z9KW4hz|jIdu5k|c@jgZ$}?udWX8FkbJdYNEoF>nvT zcVqbTTEjbiY^UTGj#CrdqJgwxL?An!Rn{z;}n zV2VuR zR;YO69{<{<#qa#x039TD&r)!8r5UbqOYHpFggM<4Y3w;Qq9`38eV2-wPl_$ zmsxs5qVek^B7f!&eIbI@n$5i^snC%f7N<3vlwSS(~R`1Y)-(K?j~G^CEM-K8_F?JgEK-ArV@n`@+U&fCwO4e z{pr76bsrjC^0&^1(}oGlTvd}Btn$zsBk*TWAa8>S?8mAjWle=y+coH5rT0Xl08k?c zTwQA!dpxu!^1>mEYB{4=7e=f9AhE&L3~I<#Yo5zr9ys;UCFr`&a$`4J&AmmsSbhoH zS@{&wC<7dp9uW;k6v*GIskK2okAs{?>Q3}V`YaZW7`DauAw`^ZS`im!oG=N@u_QBZ zK7y+K+N4gjCeby5jwqQagM*i_yO_i2ccM(o<0&4lF=%cnDp)&&8pmtIysSUi%86G2-&{$X!trwf+sOvjwxf>~M}aZSPyc>dW!t$1&dhKn?{&0CGi|*=Y%%UXqIulhsL`Dg!4X@xB!0K!`T*fD) zM}i*-r?IVUPxz=B1cw)w2HUVHo8XIxQ|`I8z{&sF^4=YI%5zmRF2cp4#iz5Ow68f! z3-Z-|^S2c;Gg8(X*5^A9^{8hO*&+hrhnzP`fBr%%(l35{<1N~Nk$!<|Uj4IU*k~dU z#uJN*)(DPY5O;XRaScjSu6sKnPIVIZUE|He-=puRZpfzEV_3KeRX*Dp56DRLbm~Um z3Iy1iXku7oxo-_gci)bsW%xmg+xtakeYp%N*Q?!#=n4kj%(smWATdRZ!B+_96742L zUzP}cZ22vXU3)W_A4Dw&d$7moVgTCOZKG8qA~@?qT+SWEG9XQ1)$nppu#rnVH2=Rd zQ))EjCBK=ilD1Cz@)NoVguUO6KxAMeV{07tfaakN`=T|$OC!Xqr~I|!Me^{>_u14C z!4{4d^f%fi>hjB!B3z^G^iBT>!h9CT^)tb=_nMpBAt6uL4p7rMZfR-R()(JnZLDMm z-;KX@lmkDYgdM5VENzf|n3yeBm!7F+Hp)S@0-7Wz8k?=JZ)r7zF)^*P$=BiS!W~_q zZIiL$-5|V&pa?I5&9sq?PIPy;w&`^7LrX%c&-xtc*peNEr=dXx0gr%8sE2pknn%#N zO(<_7F+tB>@`gNE9%L&Tu8cP}K1V3$sJ`{@|*4C|Bx%JG=4l7d= zmbhzA+sw2R5k7)&yBxE@)UIi6S7=`feYm@3Ee-A(j%UV0poFzJ-F4I&a&O{crjW&u z{g!sWF}%nG!G#&nGv*ZsuzbZL^m4w`9Y8}6BEF&1Zl{A&SLG^P_H4^ngfUPJxz{oB zEX}-T9jfd4{OdH-oJE{W?E~tH#u50(!_1+giL-zO74!_pUOm4RGO_ei3N`K$&F+$P zmRV-GrI}eJc9Ct+4G(vyKe@{|fTuU8H;ot%)2e5tie|Ftd0WoC@;As>h^Qj_s!cAW zEGOh74nb~6<%(DEw=1+33!kS?pC(?FRl06#@MVtJrojRT5nQ^mnH0XRDRRsf_u6;H z$sf0GqA2BcUGfw+v9R@jDg!7dNKqtHZRt(Jkx%H(?zy}~a$)5@2~=+(RKe*Lg+EhO zjVNzIs*c_31Uac{OUY~5ze7<`8Yx;L0^+qMtY;@F%X=9Nsu#_ns!`h%OYd?cwZ~aG zgIP(F;E_rnGyw~a6^qA0#U`;_L+rh&zdb(zh6nB3{E zw^^t0;r_0Qe~QN?9fOiM%&wbQKur=6k@c14_%OvwWEn5LiQjzvE`%G;ycu5ddf1A} z{x6x3oueGwggxl4;)BN%a~}?;b|Ty3m3paa326=GomBzUZ0-%0`=^E(rKJ&(f7hl1 z&#@zj#Xo#>HrqG*=h+IgKmI7ChsO{}EekW<(5s?)PAvTatBg5sn% z_xIEQs(0D&hOM=pZt|=;0p7t0^JlL+JGbzay!ciNWsa~6SFJqj{GSRb<(sS9zJ7ht z>1mfnKTADv816cPCBT{Kmi3TFET142sh!{3pJ=A2Z`L_8x+F!Nv=<6`#dLu>TsUnH zD&r(&f|v3Q?%NnkxUHtE)$u$ZkzDXP^#qzUvtwzQ@aq58q`~{oT=_4t4swCnd`vL6 z6)q)J8AtK%$3s`|RprK*a30Q~eh?6}*5#^uPlh;A2>M@Q9F%h4jR(UuUaMz37H5C~ z3>wdHE`b$d2uufk-eKm(nES{I91kGiHy8z1N&J^4hQkKs=ftW5+|I{yS^knr`FG~sKQ-0VLiOGcGE%$D@Q(of)_uAX)y5Bh8?G6Fy z${UNONV`uN5_C5BnQ9aHb(YQc<-Pq3sBSc z4Q*nlr2>AAzb2oI;dhPX0JlLWX3|voNFh{0GN$^ozJ5JF(^Bj9oIdUvlT57(FLm(L zI6Cx1B%razMLemL=oSE)o&8hplz`MvcHVOaC3D1{8ThQ#@POVhC>|4_(Ds%;C4}AA z`_3&6#>e*Otu|b9Z+fUKXym%{ngS^vWzmpYttV|9QDp8?UY!vx&r2e-&W|*0pDGXc zGYYPKam`20p{&lv62GDu4o$gr-`Zjnj76ZB;2eux>u*NHdD5RowiHR8FK?~7q#HRN zC(A4{_55<(U$gsRa~nOy!{sVrQF#xt^=*TAk}|y7DE8amD!gWDZ5kr$hD`Q_;cn3% zT4ZE(rLAU-?(_NUxs{F2RKLTBp&dJchZAxJSefGSpbOrqZ>`#3_0{DtL?F%$@20+( zens|*z*ClUTT}Mu=j;Z14KyH&k1>1XKr1BrwXz2M)NX)%_7Pn`m>97DqLtqb9~OXc-!mDEfBz_^4Fbox`zYf5=R zVI6yZ6(m({+!^|TF$9NuYh!XH0UH_^^tedAQZ!smo2U_T{jTz7fvC=NmdEA;;GuN= ziBqc1op4`a>?j+x-q^JCuXxAbrwIMXc8JQzbU4(v8?qdrJY+Hk-oV*mq*`6NJF93a z33esDZ6}T&ch=$OJ*H8;U^cHzDW~Wp={-a0loqIn)&7B<>_J?@a0jXZ0aCkTooCE*o}U8?(ufoyIe>vMp?G*+VL$O%5U^DX6S{L3Zk?k=vgGv}(v&CEI=3Rhrt~ zd87YAC1_`X!~IG*o}o~A*ly@pw*K=j(`<#m2^lt-%iz&;E*W;9(p3djxWz#K<@S76 z6L1#gU4oMV^ql$=;8|OvrIe&5{=LBkQ|cmiu8VVmO|VcS$@v>clG>X~)@<{fb_;iB zHts4&Gy{X%{a0jtjN2zH-Hu(Rtq0vN{Zy_ywm4JN)UW*{1V3E$@}xeesZ7V%yW>^Ljkzpcc={O)WRpW4yet34yHFb=(cJ_2jF?D`dY-$a8wLSG$ zPq%gd^qPtC-b=MB1pr%ZRSNm!k-Co+W} z6XuGoC;liz;dpZFkD#L4LF7C3KGRP4uVQhx@x6HR3sx zceAvUx@#N&^zQ6&>}j>Jn*LP1EGcE?hreFywa4YsE1qG0*PEmcxGtvXq!4@?Vw2T#+2dXhpj!>Oud*=G~N~o8@-eD5P+6e^BY# z+&kqiU+@Q=N%O3TiC$G(Pa7x%g=UGQi|S(?geXG(jRoCtWO)m;ZyJ6=!VZ_(y77R` zU16^dVrM$bV;K-$9+!1wU-!+09$43sa8&jsS~^~Luv1cA-bjmYgKYyD-Ew`|9V>G( za(_Y^%c17Ypphuu{nD>~DT~_R6oF{SkPv!)u#s;4njYuL?tmV7^H%54bFJww4e-m@ z+ZCem@3pK?sK%vxdiqR_VdM{g$zzQq2`R>(ho*_uOxNK6m!{?b3)8o3!pBck4!tt| z!F<^B)@L#OY_MT$xm4brc8s-{*($7Uh(KjcaM9#hVluW%v>@msAt-`?zCx+LV03Yp zy0Is{P`^G=E7+{F)QA5I-PC#5x0fvJAfq0G#uF4ljQe+}IFy5@iU1%EyKjfea$0r& zG{bbNuSn4`Nr8{HY!VxoJ*lc6=C<)Fd;#h~uJ;|XOA1Raaplzd``O$1u9JQ3PrfAD zJn6gMfPQp&#G0%8XxM7|9(+_3L&2ua9EPwvdivj1<2Rq)0iEn`n!b>VTOh0*B`g^) zY6m?C$RphnDe{EEOiSxO4DP^Vipd`shk!f$ATS$L*-V|P5(i5%^3Ra<*q6C1P4MIf z^ZGtHFjp83Eq$=yrz^x6+m(h-q1S8{VyRynpjij;C>Np}bM>b#(N&u7+3*Zp+hIrq z!8Eh{R(kSuka{)*QyADCtKWA9)ZVOqbH@VrxtW|QDX)GKBNCMk&&$b~rD~C}zxE*- z)eTj=`5SUGfiYw|U$}lEM##S8)9GBu!Elo0n0GeBv2kbR2|0kC)z#hRzSXt@9Yhl? z8Y}B<`iD#C-do<$(*{OY9O1De;Dp*p-1&#htxEvJ^?HqygjZ@&gG~3K=k)B#m zf=H)9_h&oQjA}c!ChJ0411rUozU-vEWQfIiu%HRj?4i5dXgrf1%2B+z1@L1MUgJQs zS2gbYuWz(-?=6==S4fOTc)9sfLb%;ds5Jqc+=)Yrr03ezG(6$@J{w$nw0~UrgzSvTc6<59iq{KJER%wEQT3qK;C zttE)xTu$MeV)ch~LdCo14}BaC@{Ei*(%M)2AZfmm)1B#|_@l?RrZZSCMW@|f&_m}@ z!=I@$cM$)wU-ReX70L4Gcc1d0CEdC;DBFAgiOa95c+!Th3%P~|Uo1&7YL5NT2jQb5 zccqW({Kb%oTUZkkx46c8&}4)$TDCv2e}{;gwiN? zuRi01KZrXKSY0gY@9=$oe5AVLPqWhR$60Znrwj4hSOX?AU{N<~#z|(+V(br+WPfPa z2jS7jV`!$gQYqZ^PHgz@{g4B(FuuCf^3(IDG38x7yAuK&Me08uPjdM+zRYTB;4X&M zQ$xGXKPXY~7>#gDa<)tnkI(4k{x8oegi1 zGjpE<@+o4)vt!=$m+|4)@#XiO4UuS2etvNUgg)_7_9DlQI{_ zv+7FH-T%MjE?iuoyqi&zGcEiN>e_3T9Z9ausip)Z7LqU!);~3~+qz{Zh*Ii-gfkJK zIH5+|1Rf0Rf`L*s>e)SQ5-ytC1dqd)S8<|i4U&5rNa`O2AY*Wd-_xh|>(^vx^T#CS zU{5{k-o0r@qn!yuSk~e`N%Wq6dt-x=l9F|JL0xd7pLje(s6mn<1;=gRARt`^{q}81 zbTgtjx@nWfL<34O_y)B=;^2iE|2qZ6<9Y8hv1K3EOF3XOf}18jHb{E7j`r0d*@aLK zJTRmWgK9@!w@v6@IJJbu0ttg~5Im-VRr#0F&~!z$XK*c%xI$*So=|O0ZKwyf#dUXF z9tj3OMPhbT^SF}Q0wndTr=8$87vOc4XkxuO=Qq_4YynLhbg|_8!H?MvOr6M)Y`AK@ z%V>ova}p}i2coM)th7&@hy%>8RB|JqueiJ4CcP(xPRcjPizycgJzJc z_bC(^{qZO#RY1rb~8qEHj*6LK?? zLxh-vDgewhXhh{bh86@vx4YTJZ|AuZE)ApWDF{eSdn%ke!0AvG?tjAh3Oc=&QF~~eELzFqx93pl#F)w8xZm5H)%>I!M4+Bh zY5hzM;x-CA4Vgc|z9S`q2hbKxrrw8eZDQOE*Gx;07MT5}*D_$2V1(v50*DHvZG`g{ zuDN$pI2}^)Oo0s!%*OMKcl=t%Xf#?t5y*sDbmo^4OYBvjAZjFbSm1#7W>?H=aRWx)7!05df_^BP>q4NL+2PdN^lW;H)jSh{J|vV#9~ifx0xmhr3B;t#fTt}> zd$pzYWAw7c_jkSpbLXT6uR94{^t)BuL1-lTD5BF1tApMp>O^$?S}+)ogl=X->EVL0_#8CUlk<%%pGzkmkXJB#dX8oyub}&F`Ive9(xUIfn z*9`)BqZ!)GLk7>pL^TUt)lJ||uqWtoK@UWDPCH|L-NX=tt#eN#e2~NH?eL)Pjr4cE z{A)KzxxJE-f2DH%J#;8>1mi&pkK&~e&_+xR4OJ+$b@aoNB%`w{1kI-K_}#o~vk*JX zf7}#G`4KWI+AU|*bnb2i?G`r8Mp&|l#{l6ef&oX0@jqi;=LqcL({Bc&vZ13NfS7cN zZT|aL|I6;ftR;Iu-HQ{=!D$Cp-@BisrWK3!1)Udj1(nP!KBHyJeD~Xr4V-4_bl1Bb zEHheTNp=@)Oax(rwYi^Jpq}yhPv%TdFgm6SU|k&(?Jn>h$d`*G4)da3N=;#qbLs}7 zj%q&hMX&%T9RXV8o$skC?3g?a!RHDl2g^xuX&4mGc(9hW>1t0JqD)a-_P0LYa}$6F z2BWUAG5-DS<(44W5}8AV@6U0U@Mg~t&9iAMOtg$oN_tSc^mn3hk)rjnqgd{+_6`GE z!vOOzjdAe(;};T+PZ^l?BaeJKM~h|(NE@wHf7pPd4@gO9c$^AzY;Y>ve6q*8aJj+7 zD{~hL{xv#^TKSQCYWrcboF?6yrZS*r7<}#||CG+LV-0pyYLN!();hE*BmjI_Wp+$U zaXbbEa#{PX!}4Zit0GjOw0cr(`<7II=Mft1hjT+tsi`KY)Y;8p#(;p~3}=H9xfj^B zPtoVbgw2YfjjEk3kW5gB`cQb*^{MXznIndVR&5_!A1{VGrb?buzyAwjnNSCMaZh=g zc7Y0(_Im6ZJ@O7H;{wz&t7eHxZm32cN{BzL`dowhEZMvtYzTG<)#jo+0hz?!mH6@* zcJXiTNVimy-N4Cm5F3;kR?9%ekp2=ql}(oK0&15U)S}*xGAxFLLf>~;;8u*@a&6@7 zPIfIm<+te;KmpbP{^*56mw5=2u@(@nwkth=tkmG5r?l1!TLMn!ZZS$Yi|z<$bf9dZuo9Kd553DNHnCpM|xB zI5p{QB=4A|X5PIYSyTtn zSmg#Vh9QX1ypZ$Jf4H96BXT&h`Vyb74Kp49DmE+GfZ>a^nk>*U$@+KT|C5lJse>hj z*&!$>h|awwQcif+*k>LMZvW%^djqJ(4h|WBf_Bu`==TyDJ6isJ`a?vZ@%ZTYc%)kZ z6RFb|7}W$ZW#c6B4-0-ab~^&rs|Cc|aLqd}aM+nmxo5BYpLm55`Q6h~D>^f#iiuG& zr3l(QnBT<5l;ptfuksiFcfve-_6)`(9!-n@gklIBvC;D{e=~eNLlV%p+^(m$N#qgJ zTnHo}h=nXC3?(QU5Yo0R5`yfa#hn7a9L0alrYPgchOtmoard`2EML7B$v`Jlj1Ut6 zDJ8=@aCU(L&)a{#B48wOa4J&&ojXa8bR-U$)?)tKprA^+1xaA^hsV z;d*_W5pLJOIz_X}sBBMZ-IvA5XF)Ru0_PYOKfoiNLkM2n+B@JZwo1oJ8O!=j@U|kf zWu{#)_|KRLO^o2h+zRYMv)sDk8boxmryyV~ zq9FIpOpJ2hhw7#7Y(nA3eTR@^i9lDFfqKs@3i@0o12KPATI`oE5WvNfLZD1*Y490J zmvDS|hHHOWK2!q;W-2CG42y%>@7!&PFJEr%ORax)rq!~4I(t7kWFgS%ZG0v1t<7h_ zil?}G7htwz=1dWPv)+4$x)aHWCVU@CEDocDZu(B6$YW|7a9*sovR{q9!b|z(tJezp zF$H>|bCHNGq=-)QOUiN2rC$b|gn7B=pQ8ldXkK4)poX2@D{=GM=SOIwGNgyVy~ij^ zAzn*3x~<0=h67AfzO$W5&>`%M;v_%>WAQ;v@Xswai`y4tRqS*48j7=y1qOv}5u>Lk zUA5j`Gzn@B2?To`I9wuRLzF3c8dBjy(VG$Rb&f?(!g+@a8i7ytSUnZKIHuj2C5 z#7&HK9Fcz=9dm^|0U$fL*L7G-XZ=;;_)z3bA~YgKv!`4VJ*LJ)7JXPc zfqL;B5o9ASe*Pbs0Shk0R-7Ruf8Gp-zyz@f2O`h~pgISPhByT}d1vpgD@H&rWy@cs zRg>6sz_~uDUJ`IfX_wvL;%AqdtyPDR3OTG0IST|5x0g%nfF$v>%B-cgA> z{G28B8;73{P9#8DrL^tV?b}4ia_vG5h(IdnV}*4z3o4uF{1mcg!_>V!1sfzK>qt&{ zV@m$k?sqly%+Ijy_{wZ3&m=1fV5VVNJ8*K9P+@Wk424pLm!+w`mnubseett{nB`&B zARxG=BF`eS^nes15w`I>&ii^VPwfdP4<)-FRzBffmtyEHxmqs`jvqg(_4I;d7VATJ zAL6GobiNnHMIN-yh7j1xp$@PlYZ_QS*Jgb^z1kwrne<=6>~~k7I(u2vTbLC8w$NmF zH9|BmghfWCV2g`!Gdg|xbhUb@OX!E4b(ivHB*UAAhK6KvKmC2&9j0{~RN2@rM$&?0 zIFyZTS1k83s=9&=?&4y1Y04c{OR|Ce1F>+E2(`%@yRiTw0a1~l@?$oU*A--ciusL* zzlI|+D?)%~bP*zxq&*UURG8|2%s$r2?Zxz4{vS(_CwqO6ssj7;Us%JkF+QGIQ<1S{ z!khjJ!{C)Z=h?o$?)T!oulI`1QBEdt3qE&)``j!H!Yk!$bJf#p&}o=eJs^0S*%wK0 ziLKFen_o{qyEPZRf9B1LLZ9YxPF^E#g#lU3TeI(aN1_D_&Ku-E|5thZn-@v!CSMZU zKEyLgFg`~v*>3&mjT4IrAQrsay%jF5lqhNco`I?HLBu`&)OUyLJS3j*v1!B8CjSQz zL#{C^2N0zdHW6F?!sgo|k=rT&=D1%_wI=GeSD7(UN2 z_T(=8xCun(uaQ{PI2J4v*{w@lwu%mk0Gy(^rsqokmhT^2_gr2Gwu1c|9tpAn0`p}Q zT(hw#Ysb}o*w{i|c^SJDTwVD_%^#rL;ZAgyRA?nj| z!%}iiOEOI;kd^KZVM|D|hT%&ktZ3&(l_k)OrdNR=z^aDq4->RY$?oCYI&?dk&UQ4d8)h^XaiP1|uQyc|_RSKnMi z(!joLd%3-xZ9__eU$Uc3IyUL3Pe_~LUUlNtC8O1(B=7Nxo-UN%GRV>W5co`=(J(P>|-=6SA zl0$ppL)h1v9nR=Rh(idhRfny$m71lyh>cL0z=5^B3|X=hw39;chP7KjD`?O@5D*$G zR>0SAt8a5=+H&&6%~HonH=%lmUF6MG_dWHmyLZ@2z%yJaMdl3kybhWoMAV_)>cc#b zxGQXu)$NF0*7s|q5ZdHdaJ3*Yh|vv4(_)!&QZU)LFOqSNz4b8v4fx)nvFJ}jrUzmO zDQ+d=K14tSJjg;VHb~uL8>eX{k;{$$t(6wkqmd)B&r_;EjE)`uHwJ)Hwkl{1#C`!@ zX0{^x%g*Z$$IbZkghjN~{z?iL7}oKjq`9w&pbm}a{s$AF)&Mutw84c}qKdkk^kh4I zGRB60hE0)z>FDx?L;*q`C_~Nt^LdC6`9ND22zSpy5%Oc2I-q#T^PzwGC`%jEh$On0&&I7@=_EGO_`6$YbM?jzh z#TQx49arn$h9aH4@Bq*sbu& zR2^yeerCYjJ?QRQfZ*Ga+JQb=b3@kd1pSO8+>`=;zE1;r`+%9CJkI{yR&(z0pxx%O z8wf$NizCLez&rtVieop1TjByQ2q8_-2fR*53P6b4rmk2F!NJ{i5EL}%oS$jS=gp1* zg(aUfZ{r}~cEivAWD2}lv-hOBxZ~(n-&0o?p6WiF#hRawslNj%gUrNigrz)*T<^y9 z%?5hVg6E{=y#%-ZH(Wrep=0dvLAguXEPmf}c$h@_^B zz9C3<)@X8TyOUyP2ds%ZiNFF_1(T3@qO*leUe(vO(h?04h6klH?8Fa zaj$o2cIuo%Dg68VB?^S=sr}otslQdl(A+U3zJyAey8>>)j)(>-QUxgqUy`IDjD3W3 zV(2B`R{ttH68E8TJHrHqVO=|#Lz*=zjDWvCFp{AYJL2<-wNcM@aTKYSAPyG9UOrQF zYhtw_J7oSI?&$m(0V&~Q)dl^s9!e0*Hk#&I%jRrsS2OUiDN{2GU~-}@w^ThIjX!!$B+^V$o%xmM77 zYhOe{E#vMIc3H_baGsD3pY@t@p=M>qg?6j%Le(f45F~G@8A%m61%1pDBoRPSd3O!u zA&7HXBNFx1JzC2t2F3%7Vg!R^3^B|nCSB9*3a){&SMO%fqh@Am7Pl+-Oi-&`S2vPY zOdfJ$QnnLCGU=9kf9qaCdm&@t+W@k2|7V)xyFO93YSbR(AteF}w$^K= zwrAdQf5@K@7JwAe5r+|$O0wKNV0R4cyKluY@TekN1WnilQ-W5uW4A8wjek-;lwTze zjBCY{o`DSlDGynO75eFvSoCQwaWA!TyPzxko?Ch=@NzGg4)mIKiE(%#H%3z;5aq}ROWiS5bVYph1%eO3n&zZ&NxLtJBC3~Te*uBK{ySbq2^f4LpV+U2X zbk42Ow5!J0V=n6Zv-j+lBuC9@Q*{1~;p}(Rvj>Vi&PWFlbWYDFM7wtsyBE|-XO)ji zSjkGCu#X?@)hL${Uyl&9kw#>bPBfg5mVzsiIn{lnOkY+-G0jBbT(~B8Z35g8D@5@w zp^AdBRUM>fRD+WSIU*2Ru$4gG<>W})F`|^P+-y>gc6ul^qkDpUP^?jwyDG`CGgI6| zdi;YR>c*Wj$U)0z_FXIa-X$OfZn+}$L-0-Oq3I))L-QZM2go#~Q&zhM`Vew*bqKE; zYT@(C<{sW;q&s)Z0QI1`rGyZPWetgC%ZfEjx;b}gUu((cQ@1zk;em&AL9LU~^E}*B zm>WPPFXDYFS}g~jAl(rctVpg?OHYd4PbP)dIOWl`2n;oZR_>=Wwe=!g=-rfz;T8Q^MrfpjPP5wrA`7dhG2BRavgG+B`4%^Dg0!bC5j+}DHHUe>A zF>QS+SWUk7e4T-b1aePqiQqQsK#2Oa4@6qi1INLi>Sig!yOL&qhXy34eNvxllWad z#uC!!rt$$`$Wuq_WA+a|rU%djzk&n< zO<+5T-IF*W{}AD7g9^RFoJ?ne*1-8j^VkylQ4wb!kzybg2YXhgL^jbHQbU6Vj3unl z(T#TYwT7x?AeL`nqYj+WtJAlBp*=`3ORhN=Wj#bkZsu91U%t17btg%`+VfV`v+h>8 z6gE&%yQCX%Ryaa%{1J#)&|`GT#&sLcsh5;KboCe$F6Q53XAcs->q!u@KB`bb=6N2! zOU0GyNpoo_IIgvXQ;9h^;MLe?hdd?jz2uqOgACk)%QD2~0U&i7?SzaEOZ)d#DZbj%PCEDlyc;+Q8P2K6n;shoHSvknqpWLyiJY)iACjZzK8kIF^mq zdFO;x>j(wF{@3mvtI>Uq8)TlQf7B?0z?Lv@y;)oY94rMu3#(g<{PP|Vv)l}nlI)it zIeS1psNTd$pV3a;48lHwsErulZnOx?qrtLN4~E@9IPf8(T#-s@r^1%K{{moYd4SlN z*VVvLyA>=P_&J?AdfTv-E8@23QJ+(95Yh5JruL+wFFx!}71+fvjEN8llvAhzyK$o@ z16!RUwu!)pC<_epF#!25DlRTvDC-;2K(nC@Z*_syP2e}s^%^K-9|(Isp?*08I6fRm z8Wr&iEE1349WXfBEZ7tDG@w!na`*P-=Tr&(0}{%zpFGu6{%e_PdT)IS&Mb@&gqLx$ z7fGt>g73t_Tk>GXaqZ{agVDP!(fgjFG@K(;CqTpZ6d);qf`!ee?I&rVzE8`VFyorT z2w11f;F<@!3EMd&;xtElQ85Ww`k0|WJKn|~HFdl`U<6`7C|sbix_%^$=XLD;u=Hl$ zo4sve3~k?hg$Xbr%oZnPJ`Gs}I{VxME|bZmQ9PDn-@^3m-p8aW##;BghwiLXW28Nh zIb(rTMRY@vZBzN0ZOc~b=xmR?q3mr=k#rUj|CYs)8JQV%)^uz3qc{0Hs)%`(AitZe z#ynEhhO4R}NUo*6^2T8LAF;jm!s~in`h3`;5*I=|FaC9&uqNXe9x0NmE~!BPqcXK- zvI1T{;E{@H3o%GEM`AxAi$%y#!xj!axE?z-$6}T!%T{xPbTm66>)Roi`h*#wv#U%t z3jW$5Y#-t@SNM76Uh;qu2glX!RTooTJ|yz8x!4cOlwIQATUh8K zzqI8d(?VEZ3M{nFx-Cu@CfEYYI7it%ieDqa-`rdT^Qr)@+cppT0~7?EzgO$AU)&?1 z2eZ!AvJrd1VnWu>R8PbtwCwX7m{(PsCP7`0hKVtXm?Pl|>@>1y+7SC0ccGuV zoV0*csA4U#ZAsg&>Hg*E!V%rec;2ST##@mSGBf%%p$mTVWS$j5Hf1i1v4bI>9fk!3u zk-;Q97;zF5;W09T>XzyXv3%InRJ4TRE8dgylt_@y0zU* z9?!e?DFl06U{Q3vYLa{59zQTVoTy54o1N<|p>ocIe@)fbk~o|Nk9yr*OykN=W{VFC zu=6wVB{Ct7Pj}DoZ*@js)#RLG9(Yh4VhUxTGm}Vn{hFZre0Szy{hU|2;yc|h(5+2 z7PCwJLE2V24{w?M<`xj?l)8=1hEAtsX5>JhzB%J*ppX|hap7W+jgy03f^NDV=3zw8 zIYN_5fm3gcKF?pSEmEb~k%e%S4FwGXZA8N~vH7GcruQ?>FmY1dzVdGCsO@fh+=qSY zBMGd3l40YM#YuhQ*znD0@#2bVszACJ`}&tCrmmHr!^9@+Qq-|6*~s`L+ki!(%G~A5@s_4@DKIQZH)i~t~d*`v^YwastHgZX?whud{Z%vBlh319l_kO$cmTfnBf%QP*jM|a&gW?&PmLV2O2EMI` z<+uCmdXGyjcQ4|zhW}n{3#@=N<2(>EGQ@7-`Pdg#CnUJGFGqtRC4ffPXYx(+f>#4| zf^@CMrTLkBH{8>CJ|p2(nYwa{xd!)N`_8ZTFZ%)UosZ=dO=66TA?4%=d$h zq_q_1yuRdLKxcOu1)J{(B{|ajzuSylvSnt=!&EQK9Sm_%Z>V?K{4{;mz7Kbsc-(&F`aZkl=oyki50VpH*bnF%fN=H!&F@ zos_#`oU%yF;*|bOdj%g{vBzcT(c1;G`Cxc2q`0K42PU1%O%9n1#&ViccNG)EIT+xB zy)GE`5pW3MH0$-)Y2N2!uPQQUPQ|#anSOnMF?vy>M%-?!8yrTJTP~sHZbVI^lFphD zfJzk3t*%y*b_>quAwI|K<4|d4^+2`4Q?>w+d4Y@~N}AtfzJ1oA+7P`e2`uk9bd&q9 z%58#lGX4H3yl-VIPy9BXxAyn9 z#&U{rnV%kh?X)`*Ez@=#RWzTGPD>uweOy$!CDr!rD`}95%TDg)28t^Rj(Ho@xTjtP!AgxR-7q`cewflYdk$zRh3`~GMtQ-DW&Yy%xMro7u+YV~D{~ipR2xHcXaDXwfVOa3VJSDa;~uLPR#eH6#6MQe8bst$D_Ewp z`KV`iL`(U<+xZO!=6B<0P=U_z>MQrLy$o$Vx_A0);CgC>|gv^`M`hIVPIepdTLw&zOc2VBN5&=(tJ+l8sPl4J1&98L} z_4a&G&nBHG-(0-hpU*>vSU?21SE^_8jC`S6A98`x$sYvQ7cC3sCOTP(&Bt2m%Fg$q z-;R|K3Wl(UXQ2A2x)%rlIx>o2cG*7s)$&Y+9kP2MO!=tBMj?-={O*g%k~nQm?&5f- zrD=WQz<{Lic+{{Mot3bT(ct?M9B^}HY%4+*J&pQVH0V%n(@JC$Pb+7#q#RrIo4fCG zt5~dy^|U^Hj*Utg(L@JwY{ zQ0vx#@W^G&aC>yNFkQNf|0djFI_I>Bb`Ldg9r%tCNiEr*i*YFL*b2*<-;TTXmpm%! zW`s1#O@2S6*}9~4dK1EDZ4udz5h2VD4%@d55YGp%>znxSk$Za8ZBcP8uc>)oWPJtb zv3G-;sYPc^4-sw(C~$f8t2~FxR>&92@%Z1A9ZGjFQJ4R->Z+e0~nv^XmS3e7ExUp*u4) ztwJO9P_dtc2Tb^Ah!iE7Nllo2ooIH|;x1V`8V$wvwdkafd-@+OUwKTa zsVX&4!gH~C2dJV|x!9H`&f}hjyeW|NMcC_ysd@%7V@`RL=yoLD(6q`o41Yv&jSya4 zev|xFB;v|o8!I|{5-i)t+7JIezdR#QWr*WkT4yx*c=&R&-Q1HS{lmm%DN0=GhY@T! zuL$T_g~L+dPpa|p0#8iBGg)~w7b%2mB%KYpc_8Fv-#9lr53qEx*^iw7axa-3q2SJ% zw?9v4;Da@*&RY!*4ONeN8NHX~0M84OdcX~=9F#OJGZPj-O3i)DOebM{fY#u?F~Ibz@tvg6Y*O5N;so z0yCEyaD9G%$czc_3FKe0x4aZKldxn zFXQ)^gciZ92Z$3P3OpDvZELbP&CxHy77vgy_@2d9RF@`LMI5J#TS^9t20i8Y#B8u{ z?P=g*Y@Z7F@QkVy(xWrX=r}6k~z^4EU z(y}MLeM}DJ7i>{ebIlcdB%-CL{WhZqkuaA5^N>Kv52-5ws%MqOwq4EI8-bVYu|UK- zb;}l=F)YI{>tLW5%L8n616Q<3c&lseuX{G$1}gkR*x%A2WkP<}T~z>e&nd3~lnzvD ze;_ln<1W~@C~|d9s9eCr!N!onqJN4jDu7F%v~k&G{v@blyP{l#0_yHuCjc#xn{r{8 zFP&I6o$Qy(p4!Vswy3*T=u~#6Ew7Bk@VIwRAe>&eZqHrElw5#rJEcXOhfjGuDP!@g zyraiP#NrB4s9X&5Mr_GG@}}bZn{D@t5Uq!}bUFf>gjbMlYE%FMuKMZ8;Z8#CfsZ3T z!@V>SI@2$_SidzV?0F&KKVqU?aU|oHq|{sJL3>9VH?WAL+og85?c8N<&`F{4L{~+( zrA1uVD!z|%B2qu^9r-sFVOK0I8%*PCoZ3ht4hk+J7tx`KlEcKYZN!$a$QNlndLy;8 zP8fAANuQqw@OFG$_kKVmZAivhqyz*BCa8VQffZG9&D&^WZA9o%RnZ;fW4AhG z6%CPDGY==`p6CuOOcQmX>RO3Rnop=}$qvgYTAn;Q_mRUoV1CF>SHW!1Vc5{+QJ~zC z{g+p+$G%fCD<`b^swiAnWk}t>b-(un@X+rm+9CU7>%I8pSvgwJ7CSeY0frjP5%`59(^@UCt!*F01LeJ=e)~m<1_eR4BzBUJ;sTc2rPA*qvyV&a{m-T zx9W_<6}LFH1Fmdw`dVvP%3}PE!`p3F?~lpBMg()9EP0twU+6r+2WC$6Z4~vxSUaGt zflTU25BY72@Ad~=sr_qpu^|z%U%=_w5*gX%V5u8C1SuC?zy|-gssF6;hE>Z{hQ&2; zfIq2wV!Kp?a{p28t}vAbFcDB4m#q(Sz3qimtwGIYvCt*8`tTS>$#O(%b*H#uMLV1t z-&!}?JA3obmWgC%&CJ6Ij<#ku7m~4WVR1Wz+}LmoPLiu#FK=gO9O$N$@8FqwvTRtQ zwoCY)-RMmHGb(bmXic+a>au*FEg+oSmGG`~Ajn%f8c1o?s ztb&MadT^?O$I->}d;6c4ZEXXL3^l-#zfi=O>crlB$$T~IBLoIcH5qTM&mOf>%haq3 zM=6=7@O1MWn|LqybpPany0B#azB4oI7g`#4RpPZHbHK%|K$F_n%qAL_$-D~nVy=Hr zd7DJ_NYVQOIHuv3hIePO!=Wh0oFZ?atPaKFanAC?iLupGZ~wX?!mL-Y%4hnVH+pjMPt|Fc6tviB&%abP_g*CwO$@p?T_L# zM80Ne`sdz2(Op;WUO<9@>SR$Acl>3(U>CQ8XiYSz-06ed>|e#0qhcc$6ihu}S01Qq z3J+cVUTQ1;sv58nqRfClM`Y#IpjR=j7Mh;Cs9^xz0d9-_Of&!~PQI}CQn-PQ)XlwI zlaZgt(X&#Rz6kglL4c7?eK=a8sNKg35YJTPdLR?x&$RDSQ$3GM{S7-80fulV){piO zQq+)u=SPcmsvBZwduHJ5*YV_6gW;{PlYGu4``A9${0(@PaTx>4Iv|KA_L8le!FzxK zHwnK5v%Q&28owFB-}pBaJ!%Z}Kzt_%l+9b0S}U-OXs6I-+=i=WodAML81emgAk!bP zUU`q3NRIpO$M1RC+`Vwq;gC6^F^qkjdeb?X(j>eML9UBnnTg6#dEZ(L#4C=! z`>*9=KHx$%MWA_(J^OMiyW)dF!nf>}z=sK7^J_^irT?|jm4y$WjRFU-wI>I0l`xi=tr1I+b# z(}f%C*<$ZAMGxpn5rg1+A`L@BHgA@+-_(ci*e#oQV0O~_(HhBQ)0zCx8z0m04E3FM zopAsJ57d|X`SQ#h0B06|I{Clv+yZ4uMD`2wl#6wb9)nOxV9WeB#xKNZQ3V8rY23fL z7LqIZd29hL2H%=B&qtHH2Vhi8i7L;@E7LHmbh}eNoE>xwN zU>Otx@ceUOf3P|%3XTCTpr=rbiiuHWCrvc24FG$3Oo4Lnb!qeiW!~QFrxS)hmO44H zb>d1`4P#7lIvc|PIs;OGXf`-#8xkX~Z4p2cHZO*#_{x03`Yae1!%wR^VR5FMN=v{K zGEXJ`9Y}EvuDQ_cwQ)tT3uSCp1Qe^VbSr{14h-h0LwC;FgB|S}>=hnyvHtAqvH)Mw za;5%&BHA;PqhL$BR!0uDJSqP5wRx~FDew(bOmdcgM0)~XPl3Uo)eZ2YBxB}`RUnWt zSkLJ;4kF`}`FEZfCI7d^q}*Ws!ozrc)|BkXT*es!Wd&6V33)&b=g=gicrR*g{HmdL z*?K4?EEQy!3=(8ap@Kb3njbnRUne`~`a8Lo#|6@_%u8+Te@F#2fVu4V`4AkLYb7yT>lcvOKlA6WLps z`>;Cfip+!52hEutORZ9ifgSK|4!}*|cg6g$bWeYw;^}^`rpJk$#_N3s$SrW3q~*K` zb%bve51l_3biZRR(!Rp#Wu$@S@_+owcS1Q-f1FJYi@8r z{45)zZ{&OA6Sjy)c6zi9SoU5o5&H9i#lKxir~{5Z0xCz&59A)2bxUSzP{V1onrD9I z;9DM%>`1W+CvYd1?;buCxp#W#I`+9ow4(#8TmD*n4w}+^I7S9kcSEba$}n>4gOO4C zwz|(|1&i8aY$sKxhxO8 zLj0k#QniW#zur`163H2cX)(~nGwe(=V~zs`;*${ zFw9X(j8a-u#f6w;d^D$Z9Y=>Fn!oE;j3mg5Jrk*<9g?# zaGe>v$nfk|rU5#=Tfp9^!7>zIAyd`W;f?8-JKs-@N4!Q8KxO~xh(u?A_lwix|EO|B zukfDl*hVo4Hqycs*FDtiGv6IDEH>F^SPrj|Gs&C6$nU=GmZX!r?5l_OLCHM`*99d8 zM<#%v&@NB|L1nolTV)jQYTKiQ64d}@xEQ@IGO04?l{L9l_K$c0D8tNRy_3i_yO0L7 zd4~^Z76*&7eajz}lk#M`^JqbiVfQ=m)Z$%hFuw|KO4$!*f=0L%K4#N1o4~xi^acAQ zLM!>>T~(_Fp{Gpxcb`s6T*j@d1f7c z_n*a>=+t*flZ;*l9Yx*0vs&c&o@*Wy%))?ZxW&;?!16!RWDXDXivGfp8ld~Cuwxtq zH66^cE2`V2I#wAQFg@>TNqiX{@|6HmkO3}55KTr(iXsr1?N}efr5PECtU-so`xv#I zjk*0-yrbM8^Ap#!-^n;MiVG4cTuX0-^r<%X}L}mqCxuc2>LW*-(2X z)qrjbw!*uB#N$klS~eA?S&Le6VsbL@!%=QfY^^!BajC)0x|cku+vjlL z%9W8Xvc144E+<8)k1xT97g*HS^`k>B8xVUAcfqc7ULUB$?ZDXyRD7WDcm#;=FdIh= zh7>#16En#ah@9X>FmyC$63bxJSJ6h*ezKE zT8;y7LJ#LSTw1V01(aq1Sf79v`w28Apb(SysY%yJ%7aC>!0BGnpwCFWHc#UzI?s$G z{Fl_yK<8ju^XChoCYzqFPmQ;KfNA_u3h#3$vgp!aagbn zG(<6}aKBp*!m$8|L@T6TE&XC)_`5$nh0+nOn3?R!SWEu!m0!~LapX&6jsWh@X<3cu{fPM*>r#p)? zPAtoRfYBU0Mg3TR`hovS#v<-048ALz0{9I#r=;4WRgdFid9DP`mq%|yK&;8In%xam zr$Z5ObJ?Vb=t^1{02Qbh_opmGf#Cod+Zpe{AulaWc?uiz;`qorc(CI0RNaj)pc&|H z9hEvygv;j!8y*58_`X+->jd?71E1aE4khaQ7kdDSGX(wRPDfIfgh9A~mk!))=hH!d zeFjx=o5lDXXM+E`#BAuZHr55)a#0&{+lGVo9R#78<7fg{a)AU zUp-;H+@3`p3Ska%!}--S*+z9(BPe$X&F+yC6x zyP9|;nf3!pixxGWh!~5;hcb7i#5<91Ej$_KC7Xi`UZW z#d~+^kA?RBeTFFgC23i#y|xL!XxBY~XJQQ~sJe3+^2bgxyTgw5hs&irxvAdA2e={E zZ>a0`=5zIL-^T9!Eq_}kHtg;(Q<~?xd@v5ed~cqe2Q*~}10`iIm*ayvR@V&vZ)SyQ z1Bwtdq8(KMYS7OjjM3OgEsyifb?Hi!__b?tH8OD(mw=MNXs>xcjm+S z;pV5apVlDg)^*@uUg!h@2^iOINj?Q40>(NNuB z$%qTz%Y*#^am`vP$kzg{wF3t~%Qb0f3l`h%wpzZ#ER!)nk61e`HS3 z&R_=5sQR%K1bv3PHS@)GpHnMkWtJ-*f;ty=Q8T5S*CzXN=X)@Okg*QPr$PyL2G8Rd z8a*G8AF3~?|LcP6Mv0+s->TLem=`h)T9sn_LGlvL(%6F$;4(OU_(8zArsjm#4Ul@s zJwb@7-?$E!JR^CTz3r|(_Pq^bW#!P*j@oZ1uv*f_4QJbBV}xBPxh=uGS0TQDY~s(0jA4W^VYt%Pa-FznYzY z_mB8!9JO-#u<_I$cbA!I`gl3G^PcR-$Uit{0=c%aSpWvzcDi9p*=q_zjWzOK^b~T# z*Ob}q9@~$t9D@8~GmJvI=~kPA8E{QL21ns~iP=Aj2N(`(3gvff$JmX=c1htgh)+*8 zf7mq}p^v&_6Oz==uC5N3sa=J$(8=6tV(7^6Zqw?>=HdDWjQ6dT{vP&lukF@*b_)m7 z8&8fVhcoXb6<7LnFeoK-98Pr9Fv#!EgqyZIFG32$BX^cw-C+`vmrtrdLcVbQMkgF_ z)SS+`n!29K+QW5Tc+1$jG8famOh=o*@lq1yb?|AgL*qo28|BQ8)Tm-+NauMB0^w*| zFnv%->F5S@r6-T2_x3YHFit17Qx(sxE0+gp@UsVF?`S;qVL4kO=3tzi-vU|$k z{3-6)f(-;+LV^tSfKR>tIP?!q_B0T$Gug=&9-czqKc<;zbiROrTF^6TI1()ciJpyc zq3^V?U4s-pTw>daZG@*@InOODI6tVEbrw5;nhHTZK(YjWB*RQz@cOUwJ{D(!6}E*; zpSB&hiEy7tz=QRD3eaEBR@0!Ul^M3A@^K6Sl)oTx#vgjb37aFxmkF-@|8dR8VA&5U zoFLx|!tmcMueyUPfaKW!`(}kX`B)(^*oAy2x34+QtGx)9gtb(4meF_FCK=)NLWK`G z>IUG)KhK{(p9C0<^-fjxp9ZcY^vB1?oz`N~rzpUIk42;PH#RF>mftxq_I?`$Zqr(D zi{T6X@ZqPPU3KyJ;oG+W8Q%;>By3i_IU%jBt&FU!1{+s^%#{J8_|xmuDbp}}0_c;t zh{z9)xhq$$%zMcS3DIUC6W+aj3lxk$$H&M0L7DvFU3=9!(ABM0*gKzGn!6 z<^~JH?Tay66`!vD3gRb(s>Q&;fKF+uU*#r5LP|OXnB-w^tyC*Pn4e2iQ&Y6GLZYJd zS{TC*AY8*svH115)NmIPvDM-7AC6m;knwd}Cwh;MNjg*_AUO~8emqxak#f2L%SRd6 z*~5X_ylJ%B(+tSh*Fj(f)u!U{7skfP-6P$W#gl-983x$uH_|gQq!l}Wy6mwXDU@ub z^G5d8Jli>lk&#i`Nx^Z5kXnX@mKHo`5VmeGZbC##YH&ZUzFtua*x}-cr)Q4|l$!l` zou35Ic6tG&HZb%rIugOt!ur#^aC4IY`7-nJlHumzF@xiO0A5Lj2P^a)#?U`v2Fm~U zetv%7c4ZSCqVc~O+1SD+CMJ5W6GE48Hu|8(L-YT&@{fq|JBCf2_tA^XG3J@5$CrzvO#y?=H{&V991w}kCXb>_vZIZG%y$t z`vIJqD!g&&|86j%nRa3~;bVFfahsuiPMX?z@vyOJQP;T=YIc^;|F#ufjfv=vA~-Ei z5KWLW1ivYK;G*`dC`Z9?YTq{$7d!*S-~(R8>qWYrS)NB|ViS#D zJ!)F;s%f3*$TZg**BzLM4f+1P?JO4gSBSsy3!Ko3DEL`|E4p63;90Sp*O_vbNEJzQ zULBVmvNH|ov*)e(s;*~RR`++mObVCIird)2gK5Vp>i#@0oY1Um8FY{TU9kUE@ZuLd z9m<5^G;(N_Tkw1XIrah{e6zkJBp7V1I<`xHrr$~9KLUQq4=cc^9?JLljl(sE(D6u( z+4bkAq?x<&4n9}#Rc&Be{#Ol18diMVK1qe-SzEpv-%TB+3Xn4n$91T7d)?RP`!F~ zcTV%?0XS>UklznEusy@H6}^6_ZTTVR`OfX9PGKTmm$QGg=z2aKGj+(h0RSsU$_tkRzB9)o0D`evEHS-w(0!77_Mc2}bzv4ofC zj>Q{#C9pCBEqu?R$>vQ#EF|-M#hPd+i=Im|loyYIH>8sFEL?8H?f)ngZU2`+`Iuuj zrTaj@?l13;q1nw4G!kCTcZjm=eMFyU+40ouPa$TAclQxmqxyf*Z+!?r=f|9F-Y zOJy!(Z*=B<%Ihwx$<5&RQ~Mims~EJ&{OIAkXckM1L&hW8#aI|k2~1n7l;W4EdFxWaXV58vmuR8+3k|)IFsDz|87y!xQD57%M9Jtw8|}Ct&FBvQ;*%QBTyk$CK5iDzyy?(GE6?oJ6 z%r+T4DW>5m_3l|8bo+OOojxT9er(lDV?EhbTtlopQmO{NW%P|-)G#>|=bI%g<7&+qej|9Jm<%g1ugy)p$s=x9u7~QpFMG#Lh+((T(ffLxlb*hRTAyL?HBZ%cPWjpUbJQA zmc?Q3j^XzoE{fN2xwLG@X`SG?R!76F%HxkL`DhulrTk2OtVQ^?^0`|7Y@Pl5=zASq z-Ni9?r)sgWbnSgw`@;Sl&zY^h@WZZ%eH%6&#cv>sKMW5VvzXyt`|TOi)3dfaN66&% z=5XEL31-U1^UgC}?5Co9p{bze-fW=l|F?fJE)G3!Z1A_6dso|jTs}Wn`U4d&9|Egv zc&ciWl#5HIFR3}c`XJ4~TPt@nJob7gd1I4v;@Ifv)oCsXZJEvU&pV~pdNgmMoEWAG z@89o+_W8A{CYqk@F9X!pL>mytTS9|AwkpIs}Yij?5D zIouPGed8S5Z9lGWqz%QJ`^R!}-`F?WjCltA<3)a}(7}VIv#-g{42D5YJjt4cKb_7V zss(>&je^eHL|!OmDEy^g{^JT})Qruf5c7|EoK^l0*73nH)XK)*{b1+gP-fz??wXSc zqvmJCNF-Ic_R|s8imJZWCsT>mDF=(MH5n(nZ|N-M3hv6JT)AiGiyWfXPS?5%tc2(5dgIZa2y}{PuTxx<4#}_Vw5;-%SjU%3 zD%ME%NyH|*evIq=#V(&tl~#8P>yQjtb44=ibZ5xftUDeJw|!3pA%h7CE!a`Kd3q3H zkb@mK-Si;NI@zNlA)bbMp7`3!65pXt-#bX0kSj@eRzw}749#!&f4dh_ga%JtGWO!T z2uAd?rd~5?dwxZz>_h07T4ZR11z*9Tr$^i$f=OG5z}h7>|QGU_K6$3nHD9v(F@Uv%8F12@5rst%3v^^7Kj_Z@bfx-gx%VUma zf;||8b+Y?g=lIXh&o0T~F3IhA+eBmWXz^9KcxQz=eZ^lL*F7eY+W7z`naIAFkdztk z(V5_2>bG3TmiH>z^z8K%6;|{JP>1Y}DB-l4wh1|=iE+R`U~qBfgF>nVh0T3elxjtH5)+`9F{<2#Zc*K_wW zMS%{9$1)pZefG90?56|t;Sv^hXJVf~Mpp!4>Nx>bl@DzbxSrpQD%MW2+iB-kIH5w; zU1vb5&{|vjxhD9uWvA{-p6B*HZ%Su1r^nl5H(Ak4J7_CfdKm03MnV}K$^P`zX-B8H zjDB`$A7?iP1S9o&9(LZ9-uos(Q3m6moWS9vvIkRy%9T!wQV^Tw( zofX!;mp4&*)5e=o8vQK#$_Jqx*vw*vWs^P8zf7t$tT#Rd!N>LYKTW=Ptxo^n4AgsIYOc zvpZd3_0YAs@*xSZ@29LSLX*akYMs^(l0QK=70^*UPru~VxRtrb$l~m_aFtY_S1xt=Hxm>c713}X?|bZw5(Z_a7`AeYYj^WZNNxJM?Te1JdFuk=~%0Fzc^V9 zW;BoE7wuAOFp&Q+U^j)K(yzC!OVpX(goW)}%eYuH`}*GPJ}xyGBBZjet2CY2_${63 z)cDQoWWCR%oK{|-LC!o@?seQlc%EIV0oy+8uv6EP0F#ULd66@++jL|0Dhtratjlae%P< zuTamg;ZAoWbnt@EB~5}<#jp``=Hi}`GL*GLW}STf%rUI%o;o@~Of5^e&}6Hj#?Cv* zDrJlW45^>DnbhPzA0OaxON-MF8k;82JZ-Ziv|waQ0$aL`tF~tx3kdZpIlUCG={n)P zG#yVn?raSP)D@m<>G7S82_)Bw{E&M7WvZh>ZGWNYD{Z~hJ*Lie3|IPWUd^(JtVrNYaow5vEA518o!W3sL>qctJU8lka)bNk zafgPd+h2O!ey{HAOKvYA{~H_L*~nX_ zpXs&Ah-Wkw804FYr^9`pLcBoG?X7qA ziuuX?W#LQe-$b>Kj#)I>XIB`jvD=AH*NB*Ss&^8M{^I6A8Kpthz9{?Cp)1|3@8J<8 z_Q_F2thM;BwF(uar70uu!n}UXB!v=3Vlzlt`>5|H^(|)Ksvt$cW*MYL@;1+ZVICQ< znYgX%8>F;vkOB>IkcL6^>%^pnSNXsHK{(=(wxnDrIy!iNQ)>TwGs*c(wQxT(l9B?& zn}!QHMTEk8)i&6Y2HtS5luyh{+5C<4H583grlis?xSXVTP&ucHB=yB;{ki0uM_Mi% z7~}W}mqUjtzePc)V0EJ^ucTz*G%w8Y&>|%HR`eq}6i`*&iGE}UAM=Kv1C3rq z{7!Z*DbV`W!9u!HJm7`5CP4u?_2^YC{Vyz(R}ljmL7WUf)Y+=c{yB^cm0$iOME#;F z*;CP0>1EthTL!WG*&ec>Ppt z#wWqON$m`ILnz+xoQl0r(!}2Tnmw(9Zix>IF@EX-Bcqhm7Q#ns;$?`eOc>=>H0A8; z}eFr39^X~aS)@j~C9cv}>N z6#q>)5PdJ=t@A}JMW1{fNxs$zLe{P&J4X|*6Ov(UFqBMl_!gU51dS!cSkuUvV*QY) zK=WcC;=M6R3E=t@(qkLVAP8;REZsd3=$a2Wh(o_+276ehTtCP9t|XS41xr|fD5+>BYOe8^0E zw3ggblJhdt_UB)23Nm_kc<;IDB)jL9=j1NcX=9l3Qx6OOLmm56mb zt zCaT_w_NCb{!1B~7Y?iQ_C3JWzI&ibCu8FV$;Ae>e9^~P7B4|li0UE2cF1gF_fM+}h z6<>P@{c~@cS)V(6O2WS<&n?8%&#$Xg+o0g5Dtow%{H{%FP{#|w{l*Lbtjyr)NHg3T zD@<0B>z0JS+}`MNzr2ko7T?_Y{ScF2+{pf`nFPjEvJf-}G2#Z?=); zqY;A+mviEC<@ZA;+)WR7y8thlIT#Fs;Ox#|(M(oEXXf!#y5!)8d^xrA;HNTUW}@n` zyw*LUmE3w+Y4wZ0RWI^5PMN9tS*EgG+M0z1>YxIf94=w^>XvJ;i$ctIUnZh>RWQ8B z;3@1U%H}Zg`{nR$!NVL5dfLSTraI4^7^Tw4d#`VPsY=1;~X&>V68_MH)=5sgO8sJ)Og!_edgVlTr zQJ)oZ8V5_Um#+K*u88nI-rB_8;xEz@!J}=;BF0!zTm{&uvgx5ihj^h85hGTOpT_=< zOHqA@v}cN8Jbwfx8m0(=b!abHBSJ2!V{}s zY}hD`*i6~;hjh0A{MZ>0BzEOnNjz1wzMb^E(8D_>x&Vz>5BN)XUec3m!=Nm# zM2)?M2p~ugI<#q%v?r>rCrW<%DVAdSYceD44N@mlf-2IBll?*KUz_2H)U&+MhW_Zp z-+a11@|baI8D7#F0P_=30vQ;r(Gtbo5;3x|nUbqnd`{@Ch~4WIE=(WoS?;5}69zM+ z_#=OZ`kN?t<-cx*D(vfKO8l1f$ztoQ!P|}k@`CQKp}O@gL;doa7|02AMlin_h}L6j z5Xg`$Yd$%i@azyc^fgS;9I7pu%Kom&EI?W7sY>G%lv${byExJhaaj|?<8yUk!v3Xz zw-K9=D?Z=P@k>LsNI4LzAQ(;tWU8|UcS1YvQasW2s};iIe#+zKFni-4+NN8le?DV- zruxajz=(+5ivvX*X9#FI>_gZNQ&XdspS4~es@Zv61Q~?IGycSOY{EW5X5;kh+1EiY zK2GjyzPOgig!OEG2K4CvSey(Ank1=`J3n}db$1;*HzFb;c$XsZNU0xXBiqaB`F1JS z+5Y5P<6}eA*`ETf;-Cpf$J%91Ju8)jiF$F_K3}%Rk z5ru{Mx>0i`@aY*;b;_WJ@$JNT#v( zj6j$nh;z@A^I(7$>!gFcL=WMehS&FLgg^AzMWXt?6Yw_3H4-c1P!{c%IuVFqmtIMD z)fZpE7fr6q5XHF;+5q$DEZjoCTVIbWSXmsUyaG${Q!+&t9%cF?Wu*1%fHQxA0roIQ zn2+*9nhVgeM`jZ7#)74Q4MpkKurgoDQ-~{aTt$MbW*jt)+zE$)yWZysvClmvEr?8~ zJa{{RghisbuM}dVd~y_#<%PliJSo*Rrkpm!{}4^c*%XSTDEGfOFV!`qY*Ax>pMIeL zP4XoG36{~YN~${#^q9x3A*X{;PR+)zj`u1+b@S;PMT|-k^r3O)c=o0d=7x9{B;=&j zLR6E3x_kGJvPY_`{jX6B@l&RhPF*~45_=+*eWvvj_$qLFFCrr$RJ;^*x^j2LV@Hlg z9g)e=6Q;X&d_MwdaXmS*=IS=;k}TJDj31ipS$!WibT!?R*iV3Ef+_6p?iE~Jep0cB z5nV69M0~}nOa3`sWtTo~dtM#qX5`6tOKAnsi}2Bb>zF}^-B|NcAq2NIefo&~t{1#; z>f)m&jjh^O3er(F-gC)yGoSlNxMVKw{bhVkwv&h-7g%So=6-B9R~J8J3=1<2Mgsde zS>oVvko(un^_J&s%feT7Vqxo|-FUF`-53;Lv9t)CKRjlS)ZcV9D8?t1KIWG=NGwo~ zf)VMbD_n&~0+9XZyIRx$Fhy~CBF45p4tw>C+D6Mxoja0^Y<8^(D8lXa0+a4j~u3B0oE=~Bx0JWGu*9rrIC zkMu5PYOpiMdr8KzE1^?AQTpqY%^I!D>PJRPE=Btmq8@WLtuCFV;+cfF9=;|Lytpvr zWbg9hp**gnlm|#d@9n3va3fV3Y5#VId|dk$5p8d)I;v7G)@rDU?okImEWeK#EyN?Q zI1*0m)N(?@wQ$NKlYGsu)2QMVbMf*abQ?GsfP9z^{&gIYo&m?WD^hHo9IIrS4B23@ zp6?dP3&DOjMkS=(;5-6dN?H)KoY)+om$a)>yW|d!E_1Z_@j~!uZ6WFoI2RYL431R?~g)v*SOA8W?uPSgFhu1D{Do*jOF39U1;~L5xHBz{wUZ~DTUUshIml+>7F4$VUyjn(gr`u_=8(AkQhDNZ z0z1Ieni z6u%V;boO86hd{3#?EuW7?*ZBgFRZl&{IUXSzE6Y&_IrqxetUUzG+GXn^@Qh~2tb~J zRj()Zv)~*pM$d@D%C3{>z*9K@!w{b0z@I>oAM%WY&Ij8i-7V2pc}6;cKK)1%`lWAX z)ir>#l>l;6mV?IG63#TPP9%2S5RSm6p7gg6AbHi6GH_RG*S{J{10z$U3$5`371Q6Xn>mm9g0t|0$wZqXOP6Z)t zBZ1=8SH-I}+G_WmMRDE<1VAv3*~t8myioOt3aP4&^ZGuWeIkdPFyMI;kYyuwn{j~j z?ITvr*s3dvYbL!Cp(^N;{Lrw`efluY>jXHTT8E{$M-j=u>svz(=fuCzA{g*|FS zg^*y9Zc{wWoaIo~zO420^K_5)mr5x$a5_;^ax_H2o=W_LsX#Mzh|<_OE1ZK6rh*=F z$_n$}6Ap5GjX zUtqx*0YnH73#iFH5fQM*bonM6)m?i&x%$OKRd%LFv&|vG@9$`z=fDg_5@a6Uw%I)D z*ZR(3URsdNQZ9WyY=zSONH}bC;209&5q-aip;k}RFK;v}Lfu$fcvRl)h9TgF%)=Nc zv+FLLm~8>ye-30s*u|(2GjJ&IRaQiWa8ZrDY#Mu$`}>n0;CStQ0%p{h?2i$>UpxgB z9dx(`D@#{G0+Ai8d&%>Q(6x4*WpP-_HHS&yE=5XSi@`dFywBp%tCDa+*Pi(h>XwRU z0wluM(+LD{==dW`?EzfChUhN|goXS#H^r^Xv74)b0AZjJd2;C0*Hi%A_;a^o*M4OR>+k&r-5M=i7nA9S) z)Kx|tJBw(Sz-~!*;fL+mLqh+%0(84;4}f#TX(GrXT*XeQt}Z2f9QzY)+{f0WqP|!J zxDKZ<+XrtALh6MAu&uHLEUefHfup02zFD_snx60435sTy3R#UK9pB$xl2dW~PYEIa3~A?ixm`0o$2RVm+D-#v5rw*#LUg8;n88=coW<4 z-9>?sX(!{Kam zyzfPp zqvX?2xe6Wg2X^YAKGmP#pKCw<*m3A;Ct*U0`goDe^#<4wq!7pz}D zGREW81B5z9xz3usp(BGU9buz6X4D4lnniXI<=qVY6tQvS(Yr*n>($wZP8VOtj3iaC z`zM5uYL$>-Y-0y_>+l;K>)0K_f z>N$|v+VSdv(gR8UgIhWD49OgsTWO)vI<65MQ@R(Tdy^HY_4!9Q1U<8fK+X>_e~{brb*I zkP)wwJ-B$q`4TzmjKPIBZ5$+K{ zD8?Xfo&(=(3C-*dO+S0teJ+GvCsfSydGzaOuL41}`=RU;AUnb2P#!%=<$Rm1G(vnD zN)7-%ZY;*dvMxe;ub1KCdUs@hogD9;q{%)(M$-UGkTEw?ikZga>a)fGD8(72dy?n5 z1Y-Fk9m?i*fruS`MMx^scvS^)l+1}Rf_Wbjd?W)_KqJ6vD#=H1s4qnVqN3rj^z~8& zGbtr-97^uKe&Gih{}GFsU4+*3spkuTYm|g*@eKT{Gz;AhP~X2&uxW!qhf}e#3h)@? zRoRjsj|31C&)?grfKoX4A=JLC$2MnE5aQy4K7z80Km}^+<0Z?0O+B@wpw@EGByY6c zBS7(T8Gco>FKA*v2|`4j<4OLh5X&h1!wmUDWK5C3T~^iA>*er zM!}aqU>iaNu!KYTK83xh@3B5soE3=N>9b7xEmTD=lWYl2lA&)8I<+#Pv*_(dJ)buMH0BB7J zxpk~(@IKh)TN5OJTrZ2_0v*1aRzcXA+zz|kt&{RXY;!1cW&_L;N=OLzkEz7E|8_ej zJ5fBz3$m9~8@U()_l`Y)%iIDH;|dY6A{2{5skXT_KZX%fE90OWNzdtrI9^6~1C$fH zcCYgLeJvIhQWd5`$YW5<>UEzb->w<-@eiD7H9-A5yu^r5w!4=VFJUhe**7MSeuh}^ zzJG3#L{aR5!AF{>1R!NuX$qP(AXz|=-PD%BADiwuXn~uwv6l>4No!M~M7d$@`{6~O zj?KisdK6dPO@2VcS4P|wW%C>;7Sq_Dz+$pHHv?J*gdiQGC*0$pYf0^VKP$Vl7}}H= z;io!bx1ex#ysm0%SGVi*9TMn@169Gd{p6{1&;^}sR8WStsvxtsivl%GN- z?M@4+H<@VpXi~PTCx2?i%S%cr*fYxehY(YdAvJ99PD&pDD;Z*EILG{|&dfs#MFpR5 zcPPel?rgXdD%mpl=Ze61RLswsVqY$;;?5m3XIckf2x$Pii*SpR#WuG@aZd@~_jP7L zaJxYCE^2x9WdE7#LlUJ2^D7X_XMcn_${f=2{gNcqaI4?BRjpH&&;rx*eG=~U52(iW zn81!51M_)-!cZ1KU;I4vovC@Liu1Z&e-mq(g(S43`X{Q5AGy^ z3?2#fZk^}QKVC6x2W@lvjQ2_Qx6RT)#ORb0u+4f#iU;1&s%>-NnTT=2lEe=tA0qt1HLF`3WHV^UY@WN%2?noD;(!$ujL zB!iWF3;Ki4y(-B9^);9JulnNuGR~>0<=olRE!Zf6ys{q5DDZch%{B8L@Bd50NNrDP zfH#CSo~rNH5yA|tLJa}~5dLL!?Qn8JGVF}IB#L`@{2vZhc8I`(AIb={xs%6T!a8n$ zx-m*VpO}U6bpl%_coOqm8&{vtU6dR}u8$DRpBpiVai&aQ;cne^V`~MCcS0FzfPp`4 ziV+JNGa`_nxcj2+9Mmn3eswiSf>MCiP$l{bs15sOLn!Ev5lBZ666THW1?V2Kb)8~I zJW$6cQkejQmE%~}qs-;qOXOCkKicIQmr<@3p}Y6StGxL7Gs+>fkfN@+9>Vb05y+jv z@7FI*PR2btN-c(LH6^NwNQ3S39h6gZr6tSor)sR5(9pH_^-9eDmK6o^PJ>kyvLssv z^<=^!2c&~if`CPIKa=#DUX=bJJJe-aqhooUKq8cFJpFPB{%u4( z&o?CUbcEi+?k<5)eXkXH^r@n_;C2XUEKWSPsUCFr3QNV--qtd@!wI1^RE>Sl&X9;Y47X4forJj)_V(i2| z%D$!-jYVvP=gxMD|Ka%JCi0A4S58iA^QZIpBS}fRoasF1@H}FKpFa1yWZ5^;jAE(@ z(@+mmXSFepmW`mEmDdXrY&Fk4$!z{7E#!pf_@yf(^1I;Arwj4%)_A;!PW?N<{O zuXdwLn2{wmg@zX}q|=t;2Ri9=QyZoC2v+ZE&&cBwXJfXF?zP7llGDYj^DraDHFaSdilevjmY`c9oUBd1xQCgiJgB;`tM1Q~`A| z_w(60yC`PY$3sSSzKFEG^6a;88|yfzkNqGLr1ic#W-J|goh^K<&f_+wR%e%fel9=W zJg6Z;&EcRv6fT@z*eo%Z>UQX{`U8UAM}kLGS;KmsN>n!#8&^2YNlY0{tycKapyB03!6LdOlo!baCKk&yKf7yE9I>T&d1!JNJce z^t{#i0~l3St6odPV@45p^qQ`3T?P}kNLLOtu*2GrRz9)M`cP*g3TLV6$Ntjj)?*F} zThZ=b4&6PzbiA#T(-U&KAc3j!Q~%)rJZDAAZW!vqiahRJht}qs(}kKEUYcx4FD*-$ z;m{;&evWEPVa4`r7v|^DKiu(cgN%ZjmnvHe#deggMxpGSL_w-5Ta~>BnA3!A7E05D zR|-m(%Rg^=zk43;{rQBDt(jH#m~SvPTF`O5PFlb5AHgTPUO3fevf5d`AuSKzRiAkC zfiR?JG9^K9rz8;ZLk76*9a+`{-TG!y3k|l;2ml!LQB>$&_dL$n+q9wRLzU@!pM9bc zW+r>p4pGM9Jgz?Ip*NhbDxz^nKW?dyql*}&#Qp>F%EzQrmQWr}WSOygos|rA)7nMOcx%8UTgn(hFc-6@%a3m%Y74b?Dsx_T{X4MmhKm zf~=p|@B}vF?1-}>C6Uq_KfqRVxuD9yw9=;Oh#sD33_&2lo>TS3*?rq!;!iDU$qL+J zoR^tM#nq(#O!96H>I8g%D(GK)0Co(4MbYDU+>AjDS@V)7Hy1xmhvPLOR2iTcg^+~t z?3+IjNf;KhKmB~6v1z+|q=C>Z0b(RA-29^`u6TbRS{aa`+eOhh{oH03_M;`= zLc^<%hd;Tem_G{qlpg|C4XTOClZBIe9*>>=@%f+ah9rX-*P-Tjw!3A0Rqt_>SXqsQU5$GXhz{+OAA}?V(EFeJf zBG4|e&HZa2Ez327Cx{iw-T79qH~n2CJnndh?{q6CYc4UcgrHX-mDjpSec2}gu}bipQu@{~vf zY5kH05jldI;ZMhVEk1g__(0eWqPJLY>y&vRA#2*bminGW|u zrnC3oMrgkg1jXHVlS6?O#7tMAwoiKD2_!>*Cx@_Mf?ecJh4`bS``WK{K^NFhnH7%d z7Z$O40+tA={!4yDd@#Vw`dCFY{+F;p=c+}5FE1~#)Q+UNRO|ek51?-i@N-Y+m{!_tUnp982Q4nB9z(N^)Pa0_3P)du4;xva_J{D@#u!4IQ$bK zkw4c%b|_j1dwSKS1<~qfh1uQK+!Y-`u=IW)Bk_zt##2l1k{=mYichdyej}Y+G-d9h zK8*Njc_290za~lk7gN0Ub`q!%it!Z*-(Rd#W&gAhf^`JQZ-O1*xq1Jc6TA^&AwMHE zvb7gc@J)(?)7&RL5`R<%Z?&;UejA^1UVK%`LB!CQ%R`oHHKw1F~?1*xcCLRKuk ziRV0Q0G26+h>C(@n13m=AF}lv<>tYmO_Jup|LU-y!cAM+itWHlB)#>VIjm@_Y-A4VTg^fZyDN%&B;hqFBcW zP81by_tkqzn=ixa>+Z3>S(qNPV|G?NEI`}&~VhElB?#mJu-x$sch-V{Mb$ zA3JX-+sF!BRcvzaifCgtIC=U%X3P`O^zC1&vqI`KR72)zuei5=wlwP|&sy3&YE(MI z_;Xr?Sh%#srEvn%7`~;xZb|Sa(a0FFV3*u|G1K#3>UH5ksG8wE@B3GV`z;Cy3Yeko zQ6NP0@$%Ih{fyx-#A(eDk7JgY;i?9I?YU+QT6WW%;V~XsHzDEfxX1Kx#r4baP{n6I zV)lQvXhE3c;nCv_FE1+mYyY-ck$X8p>W~ePC$BSD_jhUmipk4tAL#ho*2{gNkbY^U ztIDle_+2?NJaRvBM*6rZomt2ZQHiod%zg`cwD1?@9RK5|=^9#1HgN?eS1$Xj`sDR` z-&5HZGH6z|Mr@;uXSEb4@2tLGIWE0a??Mxm0hjaU&M?l-fjY`$7tH;x&G3r4NxvbU zDtliO|FB1~^=RY9lb#2r?QXrmh047IQZQfdFq?aBxZs8|(zCrgJ z&SlPP-v1Eq*gWJTRPRW?LxTG^ql;aBE!O76XxpHfP7TU+6aTizdJ>1XM2YMF5y|o@ z%sRVmH%t8=$Lqc;NcZ&{=eSdX=U-z*NH$Wjz3iwa2m2hn%L7Ue$8I%IA|U2B%qgJW zknFlyn>Ie#&nZ(9*XX|JP6!QB_$%~Vycdj1zPqt%Ji9d6Vq)_55jI@!d$(!p9*E!E zmE=0g&O8FHk-%_(LQs}=EtIJcA2yGe+Bq{4<#VoY|Qy{Cp6X{n!>*9^5MD% zJ(pMY$hNr2Eum5GQsIjU)S=neFr#<5>m?_t6WMtpL+J|M>x}=44;gkzHxa z=WVbQ(Qs*V`Y9hdHE*jY_Tz|~9&^k(=Ce+>ysai?_Z+hIvj5g)=I$5KTH5RLe+$6? zj=>OH3(zaq%u;B+4<~XynO*qJwE(crF{7Mj{s+~xC?mj8|BRvt=Q(8XpY4FWKivWG ztD@O}Fq?R&Y_22yt*^r8-}v`Jy|Dbm7C2DOl;gch^5-|(8I4fxt;7ytHQUx{c;;?% zm}@G1#stuLnApfHP3I8E=E!{A(azdZ$4(XA$`Qi-Fy9I9TN-?e8o<%ZtUBU?n_(Ip zSJfr!W(IlK?)Wkiv6h@X7O+v&+PP~Y2+dYjoqp`IM;_NWr&c>_t#;EQ+0DD7Ry9oN z>T*tcc4+oEDAWFp6w@F?TYC5Lm!hezdwW=J+B?fb$JjV9J4cBA21XnncfiuL!TV9^ z_-jxVgfFo-4I3WT&acX)XMoaRTZBd%r6X1*Xht_(fU7$7oXv9PO&(q1BI@=25>}KB zrF+ri*?Gwu%b>T}I!T(iYQZ$Ue|bjV=t8tzz|df>I=TU@agFDBk9%88+(JY%#w_d9 zbLXYUrEe~*F633`g|CI;8`DznZfciXnQDdD3^q@T%nS9rnvgni-RvCUeN26bm7iI? z@fIJ)U7p$b^K6}@Q{Xs5l6*4bbF${u|G4~yZE!v)aq=*;(D2PeleY|-89cu;W}*Iz zyEbEu?V^nIac`>L-nHeYMp=7I-Q%}a#P>y;_du=Dd}hRb}Ep+M>`^|>ayv}&$r zN#^mEAa2tL`3e{5QctY?&4jg$t$z?P=m152x^JHRA+c}1q~4^$#`1GCR8RUNqBqg1 z%9s6x>e18Hhpd&&y|HL`@Kko`E~7>x_D!=xL90YvDU06RO+NrndEKGuvG;72-{UR` z5ZdHEoVT}PM<^m<<~Q$VXPgYHfMTfR@&FOdK6}E%!P`CbKANb=iXI<{gt8%YZ|lf^5GovuQDrabxXlqL9GQLJuBd2&s}B7BkE z(w!<6op4BTP}J+gP8LV36kSW5TzyE5eRK6bccS{@#&ly@WT|aI z5xBaNk%lx@mRP&W(DR-sPV?{5jYvk;|Va6;Nr_p97KlYY$bGn-Y|Kv3-I^Vt2z%16|GJ@d2aU z;M`HC_E7k`o2nc0T<#wIRpQ?lwNdovHaoAPA0C6V%W!4_4 z+r?mckqqxVzf0;CNz_LFRHw)_fr#ak#$t9aCY$^FxV+G?!|LqFeLKFON*GAz2BQA6 z8)%{1I2U01(UDT4!MQ4shvJ~>1E)3dUo7H`SUe1WcA@U14vwY#OjQuG(@J%4lV`Dy zkj?GA#RXJ$^g#RK&-w%{K8zO&Mzd5RFg{n~SG1$Xj@)nyn*7a#Jg-+65Aex}_6BNaEnh_K zz2q3~Xq5!yz4u=M50RyS_)r_(@EBgAZ7|I-JpS*~<(s`l$@xMgFU-Rj83dUd4H$tcW?^3snjWQ=x zB5D^&D45p2Nr)m;=2725LjUtVw(mXkw-Q!e2aF!b2|9y*H{TgPqk?-dCEr)Y_DOSc zF6;OznGL(sCYw3tghaOVXnpQXTGfK*j#ehV#}nV2H3R~`Wy9WYnPp$X7nFrwXBnG6 z;sxB7L&n%si_bz8^5n>^xpJAX+vATM*upP=eEC|aReeo;y)QK>&9$zL8xb@KF3!!6 zw|+`>R$VrbX>l}ktqeYLMKEiF^zpSx7vuH3VzM18?u42(aVLs6haO>*7{9bE?n_wX z@zbkTU{sUiFVql62U(Mi60IDH;L;||5uYYwW0QCg&0)HCp}TTYTg>EB;Xbw3O;Ex0}B7L_r`8e}C~@ zu^eiFexq6(<^+bZABSU&RhauW(Dqj*xVUE^zt=`vK#Ec&&>s$I@(5*wqV~q-fr=Nf zB4Q#K zD`dk&zL9)78nWY;((U;A`YACxbotf7;eWND4{SmGUoC6~wrKnxbi9H)G3F-LM4`!2 z4tgc@f6&2zF^(q^FaSrk_cRA!NZc!utJ-ytFsuit^+Ucw;o^#cs`nSIjNn2o@ICJ_ z0Wz&={|8s^xkIg-O{MsHLAzk1#4P^|q&$cZ zds%~$-OAD(tz^t~^R8n%ep4BR)X*y}A5-F%@q>)4&wM^zWgKl0Cp0<=rtoS$a6sHi zl0SPyu5TItEflqX=33juuZk9Ik2C}M8 zc;k>Tjf&*qds_d^HM zDxw;#ywib5vg+0wJ!stMmNDLJzN|~~P23sQ=!A9<3Ad828p7Xa&d)A1k)B*(T}a=# z2zbwaN5?kpcNq`}h~n0hYQ3YBv7I9;ZFNBwo&1Mbm)J2JBzMZr1l0x4Ws zKh^kOl%ZGogw@9;ux^^&(U6zkh_*=Yj6`E$lhu1uz!q$6B26VT3HN-qjT3)v_7TZ~ zhP3F8lvh|;_&{Nu>hks|PbReG)NX9^zOryrNGQY{f947GcNLZEq!EQ9ZegqILI|rW zJ1ttw-_MQNoIH9YCq;}cPH?meLg*_*-UCOx$|3>mo~O>~57%F9K}U=?OVJqoK8rY- zX*ZHR^Csr9l5F(bmOdpeeI_D)zxre_#CrWo36}^k624B!yq6V3R%m)fwa>)hCBL)$Z+4L(1$nGoQ!J zvP``Flw|PxoY>!8r4LI7j<48r2r#>PhQz8j0mxG7f3a$Rj)>!LoX7q2j!Ix}50v8n z)=HgL9)>RiBU9-JMdl~O3E{GUU<{CxFNI>b|DofL;1g0P+K|E~0W@bIJQ8VO;{Wa! zOBII(18f(nFa_MZP=uut7)V$t9N+;=cJt`e-{)X#C%}<7(l8-#D&t z7>}@ll$cE)u=svT;C>0fI57XGGH0G9<^2_ILi}=R*9S`BkJGC@S1LRbT^iBpZ+wb4 z)Z?kR7ocXpL!Fr}3e=M8!gWS!Xa|lAVxQ<#GxscD*CpDz+_@XQjZX|$EX!Ns?+j=uXY%)qn zeCidS!v^671Zltr{|SY=q;@u^iABAWM% zAHM@dN(?a7*A2PTL8Jv$S}66Zoz#~oY| zdW`*d-h}wie!l?_gieh_QzDq-sXQZ_fOPwq0%Jpk>2c8dQ@uvG{VD2qaN(&;VXdnekqRSd;eU1zO$NGQ5baAakFw9)`^#>(9fI3j1sWn+ z6|B7MGkxb?_iy3$F(HNjf|*x@?SGa9#S^tZgZy$}tA)0){ytE8@>~JB_BRbD5Gf~# zM?VXUx|ZAq6$6%uh17|s6ZfovTC>a^|A4dE&35)TLf~MLxGwfn>DERA3qGq_#t^JH zCL>(ii3#s2K0~?8&o(^zHc{MFC^SIZlxgoR?-vIkN%-x+dd4;|rMO$@{o}
IV|kW^cv#kYiYdG>7SHwKx35H+A%P)pCpqv{&Gzu@#w(kZ3FjnR z)?SZ=ot37hp8|iFR9(Spnh<*5^|ZL&klLJ`YKm(YfonFTkZq_(6-PbN=(D)0ngs%1t#LLe2~72CPVv1^SN9ZKIxtJZK1HIAvf)oqxRyYYqttIMLD+Y_r05(tLL z(j|MqL{kfMa3M?CV1XdA%dW$-FMLTLIh|KF`=WzDnrZ7GdrzNPZG*O;xIn*?zL=^q z2rn1Z`DG6*___wvU&u9%ak}K|_dSZCiCgY_Y|K?`LZ5DSnrTj6|HP9-?dfmK^jIgE zf>S(rIb*SW;}@JxG7;u@EA2d7X@J&MmBt8Iq-Fvs)^DAXwDSaUiC7PFMY?uT!SmT= zUrPf*)TEYvS(_;h4J5z94c`<(`>R|iIGNo~!BbCziDGxXSnMf^-5u7(=i6gnd5?^i zTi_Ob1+qBwN2}FQnkwIKfv)3=3drDs#f?ML8GN+u=~G{x*}$e44vM; zG#VfHXx1n@tuhhKJ<_?(d=k4z5#GLT`*40EVZmzu1!mlvR{b1N&N?6neYO6p#vL7Y zl@JST^#0z2v2YXv1; z3pm}6wTe`}HpegjHj@q6KfV9Zq4Ktnzf@J3id>brn5zn}&jVrz7R;3i!2Nu=P;opx zJxaVjzPaUJG04P&soB$EXg#}r<$HnPBLUAz*}VCM`(B(;9rS|l(03`U>0TNA{g+dU ze$Tx>Mh!5LS9NmDYSV)n_F?N|%sGK%Rj2obJ<#-Kezw{@^gUjyUW-7;IaWlp3@A_v z5r!XzqO^D{|JnG#(ZSk*Q}0{XURoR_HC#u_k)4mg)!*vwOZ7uLCMEgrTxsrfq0nk9 z?g#=nJz1Pr5FISB<%vtaQr{#>gV8$@Dm$~f>SaJDI3ysP6_cUwBx((3QQK4ffMxNl z@@j@21}#ttwblKkRnSRav)Sz=sTl5;$gg64vCxV}R1_r6WBdsp4PQ8l8r)*bm>$Ks36zGv}Nt5f7zD?k#jGG`DzG6xxiW z80VDJBAK6_&PXG>KW6$SNv*!ZBUyxT_c$AxKE6mghd!i2J|X_WcyFf87$0NSlfjE) z%KN_)Z6Uj(6F25qGeD1|036*M`j~2-y;dP41GYC03Blc+9!wzswjIk`ik8ufD-3yF zP}t5VvLjSg!NLwS1KSq{Ic7eJSFCVijre)wRL0 zkV^%T2A}G~gOhe-LP}hDV*;)!I#p0EusDzl6+`pVA@6whFWqE$u&xWNXOJvXM!5O3 z6%wUS0#mQE?Y%EOvNzdWO@MG^1M)g@mQS3kHtbkbNwC@4>0o>}izU+b%;(CJg9GdK zDB7Uq3Ljw?V$E`iG@`+u8v|@Mm=$VSiF(&D@nmnZXRXC_*()8f>4D2V0L0p%-MHz% z^C+}YlY6tw5&k=SisGsH*Rwn)1h1lInu_Ukq{YrkIpPJlzG{CU6XFBACdC^oSu2*k zezQ0y{mvJq_Jo+9ftWKLviU*+I(?`v>Q)h!7lUfY403W4q@CJCGpp&^Z@73Q!Stg% z?=+D$4L@OLnrlB;EmPvL^0Ops6C5>|nZ>4&N|lN8x{H7o>%`e4t0iAcAaIB^`xgn% zZm0?)9+-&L8G9{`+R3b&s-OFr-IU8##6;O1F)N~48j3~k|AT?7DGk(9V2R zBx|e4_0QZnHQtB4E=S!S_SHNQG+0U=r(89{@Jo@th-(8;Q_$C~vqN-?eaN z^e1-XLa9!z^)sRf9|H>_XVtlKMhcEE$*hnIXYB@NmV)1F?0TGN>!j3jH!V(`qC4mJ zie>?m);C&KlzYDPiPqeSjfc-0Bh4423JMVP*6&d+wk@31{mt;*^r~GRbnfOgDR+Hx zR28zHxN?rMeo@h42==o~H#|z>lX5v9PCFvK+d751E;9Q3b1Fgn_tTF+xq{-<12|B-_;liVSj9O zpqIs48}2+vQPG((m)L4@$LSLu?@ao;vyC&A=+8AYO}Xdkkwr}fZmS(P^rKg5^Pd(G zL7}`nl0BHPsd;Mswq}YiZY8z5JpFQ%B-b|8@Re2|@|SR**BwooSa5d?oS=)j5Wm1v zl&jhDH|;aew1U6a>bXHXlS>05Y{pgmsFHHAgcGG*o7t{5wSaNDj+Zm_xYDbP4AiUg z9wqSzx+amP%SG=eaFKT#FW(#K1s&0lz*T+1Sox2fBRFs9(X|30Jr|ZDUCrg3|6a80 zBW45k8vy6V-^j)ANT~1828T=#w6-V9g*9AVGlhNREWM<5c}c31<;p$x_inHPwvN(T z-zdUZMz8PHAM8QY=2^`(byKQGapcH;Wf^xAT6oJR0ZWCNubfuZ>tdP-h39NwLAt>r zAsUdzaP#_6f@rxSpH3Mv!6T&i#Zf8*3+}}MS>`7pYz|)%Hm@E5TBVlz!#VLIXq6EVhAPyXd#!-xq&jadwxacc9^Plo)+uD{+fU_|k0;&f z5O=g2TOZzkC`K*a+o$DRfjV4Lc_!9ros`j08vx-tCe|)^Shn+mQyW#XdyKMhpi*0pxT^}^O#_lZF zAJk#_<(m4|2sWbjDt^M-;~Ozafmrm+`>%=`i8^6grvUusGBXLP)-HPNdzVG2>JvlS1t^Y^wTkH{`s#L%1K6t>IaZdd9 z6TW$*DI`*>n$vmdSd5Asb5mtp(q3r|x1@%A;^oZY79#6+26LP=&ZRT;jp%=E`+Bs2QRkISl< z?5JDCLz3vKfhJj0nN@qrB~2N(KG%EfaFt`tF4<7KFSNYPrNPXMHSbEHNqUyymtH1a zPQN$&Mzm-H%t1&qHRgu!6J?!cob%FJfRzGrvst@_>Ge7>(AFl{r*g*3{-r=cyU*wo zv-c@g8vb0Y8vCq)2^8qJIhKP@P6^O2ho!F{Q9^elw}#eXvw6o1nk+KB%_% zdno+Y$=P!2A6qAb#cf>&u>FKLt&nugcPr#_B35VWk)xG+EY_JTq4X3Jwh5jJmv2$k zJAX`%GCOEnHscht6Uy__c1%`SD2om?SN6FKjMfKU7;}Ms7;^%gvVCx^ssJ^oK%c!D zgMj(2Q26%s-14FIBSMx1Y_ffa;R(UNr?&ntLNf_f zk+=SxHX&J1r1ig{82nU}QV}J~zi3SBTY$<8xc9HM=q*Oh(+MR(c(qv$KNU+Zfl-wy zb`cn$?0TB>l^aVQs_*hRZuswXSlnm%PyPkn@HoMUVxmUxXzc@F;U|l?p3{`ND_PYo zF!-cuWuJf5d)t6Uizp%vd{xoRhcnoj9ic2pm^Cc^7g#fLE9V0zXmH;1WfS%HKk=iw z5bm7L4orw3w8FMl4et+bA0afX?`k!2?(YA*53)5#_88LUI&oy|QpB2X>$@R4B3{)Y z`d^dU_Y+3%Lox0)2QuS=mE#se@I`feLeJW`E-yM%r{>d+ZQ}To;7^SATt7g<4kg4Q zo5KDjL%nFV!@(CTwM1VyneFI~M)N=uJJj`=Z%n^k^G~#~f*(J_iLMl07dkIn`1vwo zp-~c^&VCaE)!LU;swu{ME*@=;Z!GAcxO4Hny7swN*nnEHgld|NJ!^v;*LEeL229WX6Wh$dyY^JH1(Vts$~94 zmrDnSDW)C~9LU%>WX{^HGxd7y38iZ-J)eDpOwtyjEQ96e>8aU2@wL;%t5>9*IcFm2iE!htg$ADf)llaZp9PQ`fIxDk*vlR^ae{N%-KWDNm^>h?BM0gg}nohaQrFLUYL}OOg2== zXn^3o!DvO#+RWi5?#ojgJV7A7IDp^p#tU&V0!!-m{HoGJ9vT6tM=^xp6#0JC7!I1v z^37LZ_9}q%q6xN-mRC*))OMiCZZ{M+huIRTBIM|0dWS3R0@FwxDfsjOwlkbq5#g(~CgOPh_$+S(CFfgRKknDq55+Pdoy-rY1V|bk~OR(9TG!TE+DG zRm)ddC-TB~>fopR( zU|CyTSaB2B8L`SJN6zXoW^}@_*kxkEk^OkCk$8(F4Nd8NVZNBh{DQcfe}XlFDco)2 zso+9rQKjA%UyjMaT~@5gwEM~(bD4u#{b0(OvmF{LV+I81FJ>N*Icw01)kg%=4k7#gU=z#?bkUNJpHvdfGch$aDMRHF z{))$oA!F{+(gbQ~jCHVRg|fU|^us?`lDE(`|0@1?s!6AD-9X=RZf*2XW% zUfA~d>f8W@anA@jG+N27cNWS^hT^hV9!G_tBVbve#=fozCeP6ueC3eU+G^TAO4?_F zSR-axVXamyx03ft_SM)MKLZQZ5$D5g;_H2Toegc?P4n>E5lK!Lw80ULrDJ9u3Uuon zPBozK`?j1U8+N5VDCRHdP^y;y3;mE7un=9l;4RGmbgg5WzPMx2R?gS=5(?vgKkc2JdJT~02m z({Pdo{e_-Q``cPjd(lyJ>uTt-Ioe6Cr?*%y=o7=zLR}e5Joq zqFVo7yEMM~pOq{A$lHxwWL7&Y8>ZYc0Y07jw(T=DD|D@1W(c1H#qlN{xBxXIDQqZY zC+7NFhVBJH@P@19L5?ZzZ5Iu?xAsJW9{5|}5=dT1cVE03R-=!Bn5vzO?8gW$u8ZE> z{sDzl0Sq?W#N&qE*i2q1>t_a6f92odgjQ8o?ySjds>IoV$5OSya7jbn$f-kqyz9dD zih8EtScnYt7lun|=9n%;jc~r3T2-GNkU=(mi$2{YH7VTOo3R`gG`kK`I0z; zYzTiq#G62cBG5KaGpgI?m|l_+@O5X=CwV8cONaA%;98+qviLxQ==H91Jx55#8?>lsvZGOf+OX+Xty%&RuPIOCE07ps4H`?D&V zJ|rJ9LSd5aZseht;OnUH_E_ttyxT8@iRPL#nAL_C;Lu96?-0Tyk-Mw%Ca|gd$v=}S zD7ry49!bxt7%Rn3sae=+qiKnJd!(@s)zq26lzeqNMo>pQ{!h!zYisjQ?F0sZ(>2Bq zj1iw|O2855yvrvVM zEHweSeleRbPQc|eb|^kp**-}Zgj}JEf<2&8qOhg{=EDJa3hHT(?l`O@$?!#C!l--gnI`;`rO%-oipfY!nFkBNS zJ$~`k81=Dn-AnQ(Q5xS5NeVz&I{dZRtIdsjGw3XHKc~UabEa{O)0i0rol0~uGq1b=9{VsPNne{$SHu@@-hgytzRI}{|G+jverb| z^`EXfW7@v{Wa7y%vRvc8cHa(jEK4$G>irLoiZY6v`py%k_ix4(&~yS?_g*}|zzcn; zsT0^xw=QUm(&&`7Cte097Avod75#`eh@v0g9BW?MI0K$BedQgFUlto*su++DBsnE01pwVgM(il! z@D4ul`{&T2LVBml(wm)^E&-7&&g1{}U{QoaMTgFyUD#m_RK~{T=pUtl@ry5jlJ(xM ztkKTSo$F+7!eOfKS%#lofvibLm}r=aMOshXCLCj^@a5c`)LsK!r7S4zSG1&)bj#X3 zkqMU?Hm{!=FPpcnDpyR=Uql8R^_)gQ`H~evK8h6XKO&T3F*-6Q0sp_@B#o5kWz411 z`zvSF(nq?s7+#YQr)cJ>-n&n8R?TPjSLD>vn&M?y8F9c!fFL4_DVp$Ui+7F_3>@D~171;rDH;)VDd29&9! z`o6V{#X@bfnT+dEbD_UK~n>w83V7KAB4g)BZPMreT1RW55p5QX15^Ut}1yb$4%)Dg)2|7S?8gJ}Zw?uDwDewvaM|LZEj`<0mOmS?%*%dk=pyZyvPT3|=_m zk0({hY=3&YyZo9@Ot?tDza-)nSWS09@>7*$<4jzy|1$K>GtrpHrNi^bU(#6%bAi;{PnnQSC|EE*9!c$an6g&x&lL8;^}3aqX( zSWe-LBdE$7QuvA<#+v-K#|Jtu*tLIE?6A9||4Nwi3BQ~BrR%dfjQqoWH_+*gvJbvq zZzx}Ax)>pE(zambf`3|Zppf3&45b2nLp;R{hcbvkEmPbchdtu87E$y z_v(d&kc_->ACVm88Pn}RsVtb@cZAfiRuZ%}s|uK$N!RQ6RtaLA?UIGr-$7lK{U^42 z)FJxKRTn=260FLxM*C9kIGNB@;I>mS1&>y4do=YVeYEPDU#YN#Di0mG$$DI|;w?8( znG3n)4-N)HaeyY*jLEQNa+9S;$zcw4eM>|rsi@21a`O+{fqgq07&J4vu_u9_|2e6h zx0J?dqLNAaxph8pQA`XyRpC}2ESP`&Pq}OBUm=+j*zKv`$y;T1KW&W8q6_H`JPYUy z`R`%woz9-AR?)LwQQCBoZ58moE%#Ayz(njr#0s$)e{tl0LN-{=vlr-5;-HR%LU|f@ z-4wB9HrU0~4(1&!7P)+K+tZq?zX>y+QnTBt(0_nG?>(!D-n^jfZ!-DwOZCx{1JghA zL?lE_zJ?b#J4x_N6N7n|n0>1@PPpJOl->J)+n`MVTxGE@`=BGVqlESN1A zwA>Y<-YU5MbWe7uf{G2Fsl-XT@<3+)`IAiUh0LUr3I{9rxvvCVwa+Xd4x>lJSR0J{2<5O$0>1A8lO)YQpNuW+f zs3XD*pnnoHPH*L24apem}*Vb1^VE;Z4y>Rlx&*I7XBDr1Je9jz~{9ZV*L1ZL+7`wTM#GunIdh55Pew~Kb!A+ z%&10MJZZCnUjwOC2CpAgg4n@Bd#iEve*maH+CJWc$c(JX!Z?(6G&k2LTYhN7WM zi+@iX|GxdDey{EE?v~27#sCg^8B9Q}0kn5-K%e^{a{Nb`BJ(Xb+d8B{Oa(p|m-_vJ z6{773+v`tSn%@L1@h3MC^dwsGvMHdR3gx1%qmezWGBqSWW~ca`Ns#EJLb)>`D^YVK z@EWnp9$o;7cVCs~6^p-L=%6Eh#_!~-HHIkkY|Z1jf@PPkr{hT*)El~~dp;)>J#?sj zUCO_vQOou@-o4lR)7S3tPnbDt8JIuoPi~k!9H|j_Opmq%T8p z8Hlhx>aWXl)c%HdvG`)9STT|pN1CZjec=7YOm=|(<-+r=w#S^_;|s03e--NujR-Mi zFU$r87wk$2;gD6@Hp@ddB~^Jzjo~F0V%PPfSL=now=P2^*?_XUC4V>?RzGAbL(JbuIqeh=VMu; z;=UpbVJfwByvLpI_o*1s2TFC$FGw>fomX89s(I#+Y)sQQAwMz+G@szc zo&i0kb9*H9GGPur^+j>7srwD~#dHy>M&%0ci_FG;Q%YM;2vaBW(SP^c|PLzq0}@q`rXxnb~0}ovMq0*CJ2)T|ekC z365R;vVHSnbg8$8e}~K4e{&XOm-On?!5d|+!_M;)o=WAmF~J01kDS0e(2`HY1%cb6 z7!l*bf4A`HY0UOh%!gIaHC<+boUBxWio}ayST>FUJq`RJwnQiQ3?ob71*1V`0Lgmsq0X;`ipzNWpVd0yK)|DXWT-u?uA9- zL!2k4!L_?E28ier3T3hf{e^d}Qb}4JOYD1Yb8GeGM)mjI;|B8SL|6{n)riFV9Hgav z`G_Y*Snl44d$|kWY&-PtEx$RxAlKEo;bukW-2KtIY3U6sS?;~puGA*;RtK35MywXu z$QE+=Jpi`EsXzRVlWF<&`p>zV2ktm0rE=FStaewzV5%(~#FB^|Y}j}eB=-)pxpivr zT}eWjE8Cl$^^QTzHO%(tofM{PS?wA@YtsjXJqN=Bu~BU$AG&go_k4vRxNW4=Uwn74 zjM?QBJM|?q*Ys>0oVKW!lc}@_XmH~22*;pRpyYd%z50t;$VAqyn%8F^tT$c=@|iUw zzFT~U-pA~-7t}greKbDXSsC$mqina2$gsPE*}k@LlH=#KOk1Y|KP~PN$yrY@+o-jF zhsVWnZ$B-JhwBw*?%~3NrB;(tyVtt9GGV2pQ8VIVk#fQKig4N1lXJ?!+IPc9?YP?N zfTY*T@Sf(#i7&*9wxXX|x4x1??ZD=9Dk+MjtFmp>w9Jh=(y{#u%zD4lbP8!a8h)<< z^isfXsrPhu8C1#?7GZT&IPO^0)B)k0ixm9mx}iV%N#EU4dazc zGmIx=Mo;Weut2eI3LHR&=seUkv4>Zkj^OM*g zmj~zL7{WdXIkt8%ziWDcGfC~MZRD@^cd$qqY+dic3=1+@&Vld612GYV;ll@YZkeR5 zO?rPEdg||c()R42;fw*AJgs#(&%4kI#=4}TR01q*X;8$L5DQ^8=*tdGu-V^R+1(j; z7}o)nQr$#GGvsGSXW*{NDf}Pr6OKVU56yCJptwLlhjHmw@ny))=){qu+Q|R?O-X?pS2Fgi`5IzZx4=Yz|ZYK_y8l$IzSn>FkSz}lKb$>1r^f%8Dfpw z`?(7jE!g|qE)?j04d>Un5AUiv@bAa-F6w(5P z(^UEtQ1#cUOzTGHiSqzHAY=t#9_TmJUw^>yu{0+`6SF;}&GG8n`p@fz6t6vqQ>&l& zazA6PjNiTY-KD^y%W7TgXnX${OD$%Bok_5;$5 z0|F-(UT)D}v!$vEI1Xcyd;AN4^O|&xFw#PR)WPe)->GlNfTB?H@}5)A5IW@W|Mg7) z`UJxXV~3gwakN6Ng6olR5GQV_54j{P|A|S^|9is+iZlwA zFdqcSoB*IFiKxCSZH;6i`lKNJ2?f$Radyf7+$!Xzt;j>@=^-vMG>AsLtyfS` z0Nr3B5a$6EX*-2H_6O+0hN$EXpzeYW!n`zl^X!_uB|L_z`b)%{e&yxm2Wa!do#A5J zr@nuFWq<^B&J8k@9n#S`lc7ScATM!v{9Afc#06NMz5g7ce=qgV^c;8P z(3k|4DoWMyKMWXN1PUi%^qz65=jqwb_W|e-jiyi z=b0=46w=>=PXiP^{+}iHR)g$FBNO5I|2MX=$1B2)3-mdwF`x?p_+|lm5^RXnnA?Xg z!7#cjW(UFRnS4@GD&YrgZQ5eJGps@8<+HtFdd*kZJ{`ijshPp!^1{0f9TP z5sL@u5XB#_5q(tXX~{q00Iv-?7_?h2)c@&qak|yK_Qdd{oK*Bh>b^mJ0KhG<%gE$} zbT(5{gOUPhoguQ0Ak!I?23irZH&3i&8vhrZotKi5D&m;976ejPbKSCdL(qu=X(Rnj z=LilFJB;ZW!+et5gUx$tn67UeR}mczNcti|4xr$MNX#C;6zi&D{NQn;b<^GVL+X+m z&ogeq;KE&CPLWnO4Y?kqLZL(+)NnstGY7F$%W7}oj5=rufvC(XN3TO=r$*ul z7i7*f{!eA!0Zw)Qzki;dmU>F5Xjp}`iI#avLrN44Dl02wWM&*krL9QHUXRrfA!JJ- zN@Ql_6tcG*Sn*~+HI`kYi4*I^g08BdK7NFX z;$b?t7Ue!27X0JUBJk>fm60$*GcAWio)4!AsX!*uFFJ5Z0)!KM?T6b+WP}KhKWJrH z9Z(K!WQPX@X%{)LAc2=fI_h- zmI?6_If5_SKvbZT!NxJ*2Z9REFYYj($7gID?#6B%nc#hW(bnx1NE3O8-T~bmZF7)g zReBbKK-aYP;7t~b1#(wwv8G+}^70mR5L0YkzMy{kGWZg}x*gKEZ2s(C%fCQ6Z*Vx5 zxeQw*pQzgd??gBz|IBW)T*S@YSk+ZjR0P)hwJL>!UT!> z0f17>`LQ^q3uu52rj_U+fuD#_COMC^d)5_RDnEGa*rK)QBWxovfyX`3dGjhiZSW?H zR1l9fc&qyn3bcL2^31P>&Kb#?&=hDWynXKMS&dnqkeT*lVOv_%_9;hw(dJu|_TD?Y z{sZWq_4bE0R1*w1*uyE8AvINE)%@%iPlrO+z|~ zNPQCqU%zBnbRv8TTrwCO!cjsddmQ}!kVEiGGjiF+u|J%|>%6G@TEopgD_5;bvIc)C zVe;t>#|eiEiQI_4pS)romB;?n+VW%xzi}2N$+$dBfw?^P3gMIjgF%61iO5x7aCD(- zqVOXPWHfP}OKMl|_T8~(&r`y=F$0oMb0xab$A*6J6b@&Gk3Z9f7NFo4FagKl{&(er zP`3{FpT6*y6|op#!mSIc6)@`xB!dOiHS6^FqwKjFpdp26f_TIz*f@IL-&uyug1M|l z!JMZ*xIg3R)2AOY&|dbipAG;nuUL~1tB-QKw{d&zS>mJ@F$KgR> zdPJka!Mz2voP=;@AbaG2BCEdK9Dsa6l}R#x)>w(R4)~Y>e8(Sv(1}{0Q?s)&A*3yR zouXD+DV_J;WfuZ?ljXSfaxD`@aAPre{? zWlT-d`Xtyj^3~8g1}Lz9xZIDvK391k$|AAdAjm!jhA`$dx1f9g&t7f+&;gW$aHe6j z?U8!-hle7hSVefl(^!D=i%vo7#y`zFzK;7y6$vR~5)|f8B$xTS%%kMbX}Nw~^^fa2 zUv73c*V=`l*S+#%P9Nk3;9hYyijo9NYb#Dl< zPXkL!M9a3zn;2sD)QAhS-V`i^Bbh=y$wOE73ir)x2Wgnxn?OsV)J38+sH8vBmwXE9 zBo*nar!pTZ*Jd89{M2v&W8nh9*P6;oUmJRl)RqhXj zE)2UikFxjKWYO;2Nboh#MqlWGk;S-(_0zUDY~ZqcTJiQ_gk_@h=U#VS#OI?o;chh_ z5P*LQ5xjr+IA2l2a(BZqS&E0({57B6+QC7z-y^Zyr@Iwzo#pWt{k3E_Dt;xxO1DTaI3TMI(SAuaiK`$?X@ZuoiWHQ^kQ4NJ>uRzQu)lZ$-4)_@% ztbsvz4eLmlYYnqrvh<+Sg5np%qwE?w3L5B{jtHm+$WP9Xf+TQFb930x7-Bp}iVf&p zUym&U6KdN-WypF6o2{n=Sq4MDf=EoQ(SXS?cDn>0l?ZNAvDrMJ2_u-_f*&>w(;zXH zTYFmu8o-FAdc)=9{Orfn7+fZmJ{Hd=M5Qa{xyNllF4Dm^y}u zWRdCI@CSaw#&o!+!@e*rL=KFh3!8(tgEbldh1(>=tLQcQ{wkRdDFRRlZc?cPAr-z6 z??6(SJWLtF6qE-BXP_riSw`mOM^KTyD-f;Kn9}eSkrmjn%bJ~R?+-PmH;lSMi<0Z= zF*ioxi>FV0M02K@ja)SFPg+yO6LXkB0*XK@=1dKL+}POH)s@5sDR=(j0VG3aWbz_r zL%@^T*Z1)7`^E0C#)L}Swc!MoDmbOUA+1PIi(oqD(#!`Dpw&DjtPU3_5R&)~{aF;l z>}oga4~@n{g-lS!4&f!yR_9Ps&w7kl?vr3lveSSrn#gMSb;Mj@Sz~mgrAl#v92Z*E#4x40jetQT3PK0M+;#-h3hj}g$UHMlx0XVwqZ5-Nk5(WgN=iq5OQJ#{_ zo7jYMuUGQ(LzFM+oj1Z)&n^`xn33C>Ru7eh3p$}nqHJ%WGkf^S*TdU#Xs&%swh=i# z(Pxm_#m?mtaYWKG3Zd0*q*dW|!B~IHU+IKQ^#zUPmh0K^eR_;RD9Lun$UKATC3IEH z5u-Uur(X_LWr33$#1~st-~r9zNYYyQJLAhgXPxudwvjOZ?-j3FR|@+cdHjQ}jg0&2 zQV>(-T)7Nx7Zf{s8AO#p=NtlM0X0mb8X>zKKno#+xgA0@pvJz1b&c^vG-(0`$a=wt zgv$^CG*lu9-D=7MrMrAW^2oPKauvQQl@WQQX+T*`Zt22cL1`;hdC5z?JSbg44uGp? zHo{o&V3|Yi1&qS7Hs3u^jyF-yN(qYsx3t_}Svc^9=xWy0y;#^p76`g|1P37REY(Wz z41_%hGv#4_@2}!pe{|J`Cuv0jZUvzk;i8tA%2ERMGr+Kkk9-9Hyy@@r*>m97P+`r zsR}RkS}AnPBKY*&P7q;)93MM`t;9eb3`h7KJUDgu&f1!ri`MkI-{l5uXm1x-r?9i+ z;Uvwh6JNdzbqE#QZ0}=oEwG-*&_a_<`^J`%eRmy05*U9sg+P|CDKO_PGah zb@(4x4aH{;r*wJU()wQ4nnD#NV^rxO<|9ak-i>SBUB1~$CZd-a%G9TN?D-Y z^6n`d$9hjS1lwnRr;^Ydcx_S^|^@O4`q4 zd(Flc@DjN)$fwu!CB>d1rV9q&7ejYtXkR%NbqvXS#>PN=9~0{MWaD^};2OI27@`b9 zO`ZXM>QhiZRCw9*tE;L3YBHc1AgWyNZb9Cv6gsDty1L39g_+3$1QmMAu$x!?Df&+|MB1WY%_c}_^aq_F&(-i`N6P8@EA&0z84!|2 zc&U4&-$L{nkA-22fHW1lWJK;)XV&g*n}FN@u5w`CNgW*`9*F4ycPG>vt?Cyl6-(sG z^I0%3?-F@a$r$fcuwT=lC+HY%bk?+(m{8VmFHEFWX=gY{0;3nv;eiNuJ90qa!h2W@ zb}rF;ynA;67~mVm8Z+#W`GUiVxti!@fOzvXge1sBdc?=Xh#9YLhQ~r@EFhV!dPW$P zpng)a+k3|q5{+VIs)cZ|%%3Ir{acxjqom9(UVODb`kyF01U83YBu;6U-36UC9xHEdEgaCjlxSu+XD?)L zwQCH`%*{10D5zGDd=N!IIA+2gN|s5%#V3R^AN2;3%7GISnLQCwf`5!vU2`-cCR={g z9&7G2(v}dgp2xj?yAN4AnmR{NwIWec0W;oREsVDgh67d``4XJeDI!akp`O|C$))$6 zMD9~;`>yVq7v%Giup|EUA9f?$p^=e7 zCe>X@)!Cc;@4+sotjOQ`_~G8!q;El_p>TxBYSGpCI0WRehD6j9!}qr~#?IZxc>&>z zpm;p=-On3WAY32_3lFd!-m;?dhUCOz&-pHRmXFhQs#_P2_&Q(>NoUA4C<)ydTpvpQ zvwTYN2tm=16n%x~aVpT9*At6IF7E%cUi<%k=s)9ma>wM72R9YxFZu8O`=R)zF2uzi z>7ZOj>EmANKHn|c$p7udAD6ra)m+#%j31ttgQ}Z_n!Le}yb-TwWK|=P> zZTMV5atHeqfT!ff>j8d1P>afW6xiQTN3R6&{_jsAW8-lx5Im`DJx$G4dznM^5Zxj8 zIlPmUwJCz2S;Tz`i-U&#p(s`{poA3Rg=Cn4Inp?Dro*0#;=ylYh6Vw-{=bHY%ma9x zC=~v>=H>({dxWa~rmtixU7~ebeblM5wDX`!C1H7%a38v-JTi|C z9;WEj%!hjRC3arl82eOd>#bt(9Xmrazjw$vujiWA?{FdQoFDBJ?kL;m_9TFeQWUi65^@uYW*@NbTc22fu4Mj1+`GsVf z@~=7X9Df-7L%VhY-(d4+Edm6}Nc+zU<)Fa+Q(nAhr#nX`LacDkVo;c@Qb`G2Zg&tD z?bK=O(nT^cd#}xn|Mbp2(uwn^P=6$~mD)Y8tY-?mj#f!8+?_~7Ql>#mOiHwH zkIn;-F)=qXiWa85U6GH^Qu>{bhwwWj_Z8BUzgvdPe9o)<77Qe{9(%G*y4e~O-EUcw z_2urd)R|W5HZA%R%3Fe|@(~5IvggO#KRp&o_Mw#+eQHzH{gCWv*MuWKWiS>Kg``j7 z(-J;YMSo6+9`5N){VnLyxpvO1tAE$o^fAB9u{N~5P%uM>f+9U!-fQxq$+o3>f0c-M zAc-3-T4UWw00=c`eNZQ(sGE)m;C4CHvb|@;)j}!|1Bt4j128$&K}{qjZb+9LtY;f7 zotx3NdHmsBxlQ7VgGBk3<_hA0FXkA(eon)fCwk#_0$`y|JfeOHpDGF8!!vuuwcuD+ zm1kGEd)Qd#mpI1p+^(oI**vo|45mY1M2MPXE$TuJ@MeCKTpqACyEw}*yKvq~LZ`=U3%XLS)@5d=VKKY)T{$%S505OY5|68Uo*mjAvxW1aeH>ymn5Sf_M^e{w=?9ZWjA9TY-J%jJYkOkDd}4krh|HjS&ex zuF7e-9)b9PfYH(v|t71QQS%#zPTCeQsZ`qeR z;5Goxsmx=RCaaRNsK1rqfPEnPpG>w(72Hm@0OZ_mUVO!+;i0zRTTxpLd=DPtAcEqauc0Mtzi!p5i8z zv#FNpyQtGy3mX{4-|{Ll@+PbP9@CWSDb>R|ej){65$tLD*KyDF{c79X_TyiI`DDN8 zNB7V~MqHYz+x)B+AB>inyL%C1+K81NWtb@?n;YQ*lf2DEh*-)%$#wp4wjMmKH#h24 zs@|3s61l$g*s)L3U!Ofw?}rC?Su)4*qu;*i(rO8ug7Y@RH|I+iS>3mgy7wJ+E5eTx zc&G;ig;a(<#NkccgCqxcGwAujp|%O%!NI$G@U%P`b+=t1AYhnzh9^<64%X0#40L|Y zdP7i)^E$?mTAlZJ0{hm%^^!2E4S@U)u)tl64W}!E&uNc6@3h^35hj-J;zdk$X4Gj%t&!yfN#L*;# z)n7mN@8^l@(R72_T_FadopFw)Xm z*Dxy7>64n%ZQ|4~sG$=XItD>3YHGIYe6xU>0IGpC$i`O<;hkQZub?`9zM`#A3|k^l zarBvbmuC2+ALn%Jm04A}xDj0cOT_h;{?^Dx*5tR7OVC7hT=S_tS#V_1S1m&%KrUf6 znFMnE+ehp@f#fajsALiPd5h=?G1z9_5~cS(8KGiYOG_?4UqmfsdfUO>qp%_Blo zif9BC?${jfMrGdeoz=3T$ev$hhiGnx555wD7}4YJ087hYjlXc$9%F&F4>*XH?|U@W zypFs?kbZnM`8^w!dM=N-)q%S`%$fWpR)1}3(n8?ALE*m#!932REH35M!)OazKUE1m>SJ~zQwmj zQKai`FAD~sl4w96P!=Wl0#McmrEteHwH(j`gV5}jj!fw9#Djq!t;o1<>YRFfgy=I! z;i3qz$|9M0nP?qXS6?g(+R0U}Jj~oObhYL@Ntc>L2PTe`M&ZYJKZfMRev!dFydl98W#`t~4tNmW%ma&>h zB%znLzIq#tXBN@Efbz=>&DuJ#na-vm3GITK8^n~=#%b%}ppk%1e(`qq^UuT&dJetB z=%yLaIze@lF*D&rA9Gr!B=&;6?fe^3)MBNfKEj%~(jI8qd;F4(jZLjA;yW&~SS}yr zqR+R-LcWDk31N8lC1?OrOM(0}$|WwHk++f?4nYl<+kNm)(%_Shx+Ul~xNjP8+>@vs zp@cn_JEk!Gd0^^+fW8)y6l1YTffIlSlBLd_t1;^@Wb^=z$bAJ*6|&$IwNP1OYClwa zNCg6OBMQlmlX>HX5~3>H3cq~5oi`G3*HmdaNxx=(`H!iW7I13~H4P!$6m*$83)0p>X2 zH^*EEMe-tmd)h z0JVSn7W#^-vF6HNQ!!> z`IResemI@hs%dC=j-5iJu$WKRS?u_t?moN>gYwF^=T+=?l_T1k_zu{@=xW0o&e-hs z#7!J8@Kt7KBVpS(rXr{y9Xvj00PO;^ft1Uwhg`P?9~Sjpa>0$&$WY6m16^IZWAjm* z_7o_E3C@|B?C~`z2!hL~GK;$#V+W=LnVwu!ym~WR2PDL{1y~+q9civb_lm|ssTC&^ z@Td2LJXu9(Kj$jKu`~`9@v>=bCM?Tew&~a7w;UUOc}RQ>=^gJ6gW=0zHdv5q5O6_}1nX{RwOLX4i0(kqFiczn zTMv?p1sj5JNA>J<-dzt4ML}%yO2ZOTk%j6WV4by)!AN!JISn~i*4?wvFZ_ZGPg>Ve zLFZdwEuSo~Kt-7^D@qr{D@7hJ$lQz4?P6<`>ogDT!G_Ng7-FR~K*EvR0>xe^g1-xu zv0K0PK(hJQJUUxm7yB%~r?h<}LP=cXMlv&xvqYO9{cMk=Pg8^2g4p6Xr^A$)BFCy_UVamc82@-JE89Jp;l%epnS-?(&%9U z0Uw@QZO)g0)r3Xiao>$(2*HFy4cB6fG(>tCWIR4kW0Sv#kKYnQWG7KR zo^yTQV}Jifhu5j8KbfAh;7V`novB#PDHfzbB>JmARcQ6<<$E;YsZPckB+#r0ZZfc5$A#g1VMk%-4tzCMfx3`{Lab|V)j%D_u^R}VeLp0@@ z-C33xrbFat0g8A#6cxjkNE)A&*icVs_Fdc55**GU_Nzut0n2F zc5orRQb&y!(@?nJ7%7}9KoekNdfd6|u_z#tCOf=9b#t@Tt(8NKi*6{npq^Z%R(K@c zQ4N(_bd|!>n$gB0RxK)usE!k4nnOqO`Ui}GaHnrWE$@Pb*yF_wC?)6I9zknGvsMkF zpBdl!QQUt4S#F4?<;4&M*IXVgHvu&L^M=;st=)L}wf&CO$5{jsg^h6~JGJw5 z&8=GYqXE9WJk;Ca@YfmSM7GHyP=NBaMct2)33N&-b-6zIW*w>~FJl?ccFc ztb98>Pj_dhkLdJt9zaa~^a+38=znS!t5^}}p28X*FFFh3uj~Btv35^tm`IQFeZJot z7j6(6g2lw$qv!uGW6hC1t;Q~0zTif3zXhf`tV{2KjMQ-PFEs!e?x7Vxkez;w4D3cu zA|331SoFd?sxQZLOEhwX&s4A<%~INw!n@yHGbK_-u^2M2r-0rG3Z8F=<5qh&_JePE6r%lE${d^k@Rzj8@-UQu?HP2 zEx1y7f}R2@L`Lq_8*uuZ7O|5G>}hL-AE<>%7gIr_)`gG=lzCNP3!SxbMFi+GXvgXC zsjQSC$HBy!!~rp}W;3nv#jt3L}=c|UYsLV$6= zA4DF|o{IeyB?{TW^W{{w+mRdyk*1|D(+l1q9dr>M&QVB6&QaAD4H_;8o^0T`^Awov zN>!~?D6C^=)<>li3GR+?x?^-0`*-(Wjps7nREHr!(jr2i>o;phDm zp4hR`cYlac-qcSCF=!*gd;1#IUAn_vjt;U$_k9K%d8X!})sPXc%(X@o3Yje7u1CVX zSkO!wBsz(;M{S8Tc;_wVuRv?&Fe=F&#hjRCUA#^7Z|TlzxMc%x_sgxB67aT6c3r%- zp?Xb_rFjj)5`kPeoU+x;m+F%bR;uco9P>wPCJQen`Ybiop?0z*E*kOO7eTRVG^Zpo zHBu#XGD-8-F`pcY#7ZGRI@AP#$O~|2SPe@vmxEF` zaEXztgS!9(A~|mAa3uspV&Nu5<3pwOCPEen>KV#gTsGPK9>A>^XxJ$TY^tgz6U&}q zu(L#=52uE{Yq$fO0}LP-V;~-Cpgstp#GS0M+LJFpJpstTVfbYt;ul9J{Ry-KQxp|> z?tG;kM+bapCQdChInKW@@dQyJoF_;2xZ?QtKOxkK5*rDwaPOE507&^r&3AB5@u8Vd zrdQXI<2zYS18OT3Dl03cI;vw-E06j64m%m#BHciCbf9n?!m`Rwuj8PX43hCI%M#5O zWKF=CdE1j9ptQ7IaZ&Oib_hH#f*9T7E(tfnTH~T$YNr&1xf2hu(P5KzW^o>b>m8|d zD2RW&!m!zMY3%-rDcG8B;55?*AdrYfZlXR4Y)`ORM7=^jn8(76Ch`OqatncwSuhq@4H6)P!zVwBq`R{IH+g^ zeNI|jn2ULB1oVPVkk%0Z8v=XKmTs`*{;g9+G+m)c%F;s$3sjM)3W5*K{rlf#hi^t% zCk-^pcPO_iKpfDrVD5DSvLMnr+fQntjWW$fOhXj-2%!V4FJKI!WeR;NXTJg#_v~=( zhd_8>+ZsuW?ka+OL?{WgX5nJJcHDU&a7^$Eu#&y{V!=1UUa~%)4&V8Bi}sW(74dqo z-4P-aj-4cGW^ybF;31-oOU}xj1TY(rnuaqhg8S=hXjNuy(apZ1TfP+O=seO4iI`os zv-BMR0nl9ojFb6cwMEYAu15}+d`aPXV>$pD<%`9K4fOT%6Iyq>x9-+BG=v^R-f;j| z)WYORRjS_K-`_+jux+CO#~;bG&OigOPqJvzdDoC;C1HdTpKay~`@RA_OI3Uc0vpqU zUr8vAy{d(RrfX?~GFhzTkOFN0Jk6vP53fgZcVyk9?2XVIXr5a18~>Gms74;Y*sRHh zQ@08^JF`B~V&>IN_}}IvyACyS&tXAEFa7b;1tCN)+0pm2NB(WlFoe3QWzrc#`K+1OB*;8;0(g6fYW5_P~$`mL=(cp-{olN3T=xdLFsc;t-Pbn zxuaPyIs^p%;$R}q&6xZv&Z7VFo_UD!PDeKT+N_W{^1F;1_$&qy9Br*XU*wuF$H%ns zCSuaj(lewhPihw$lM=M#oTe+g#_r{n17_V`Z#U8-ln2q}67ASN6jp!62(?cN_&d%6 zgI`F<)LyjKEXVX03DI~B7U9uQu8z&ldE__>xjvnE zHF)c27@|R3d&)mNqUfkgdGhkISLn2_4Cv7i&eSNO>yp|Mh3-bEH1Wb-?ywYSNBGAg5HE& zOC)|rKE5P=#yO0mQch(?41`5$3x~GYe+xS=NCnu!n$~j;ck=n%yySi~GjKJZ{4`it z%EzhvqWtAt?-bcB;WGZHXIFo7&I`>rH3F1yez{gp^*M3{TdY<8UgsC-(6c4KSQb)oRYHx@JR2d=FB`-YwMJAMR#Z>}UBY)l!+)P3?>q*V+S- z-I4}7D$b{t6}`_S_Yko>K(K##ipe9TaHTY9y_TMHHsh_S-(!9Hw#&>ejqRVXId_h{ zPMD#}&DB()mN<7;;d9fsn7Aog{_e}&rz77jEa0pek8>+TvL&~UmzW0M+qrd{#1HQS zl(yJuayJyn!0{^>p4B&W8GK}xbtry9^Y+bl>BAdq?O%?I-{#PcQS=w=o~t;~9A?&7 zV%%svr%{CSP71$&x|yD@wr1Xfq?byU%71~@1=o>B%kGJ|(yG6Sv`5k3gnkH)QsM^ z>to!Fc_2d*>$_}y*JLYk8dB_&siZJMpmn8TJ5J} z0 zadhTZ|8ouP6`O8T17#@g1`}=MtN4#?qMZ)!NE+@i)G+fsRl0%f$*(7hc2z}Jb|g4c zKZf7do>S31ax#Flcs3j9>b#hGG1}|=vo!qF$n)jfPub$(d}?yusp_9ua)BdikEu(g z7e>UVIDjCZLSZD|3yYWkmYA6HB#z9NeqdEFb*ap`jagO{hYy(P{7W^vXi`$g0-T;r z-3id67>8cIKn$?UQ>|em(_Z(Qp24OUKh@vs(m!^eO|~z?*3F-m^^-f5Y?|{zyd(FI zd#g-RtFLMF;XPvZ2es^t4D5|%4Q-9_KZ=y3)b_2C__O<@)OOkJlCnD_H%m&&N=hDn kl!g!bA8)X-0^6#YNB{r; literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-GCP-SingleRegion.png b/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-GCP-SingleRegion.png new file mode 100644 index 0000000000000000000000000000000000000000..4919af354bd2218e893cd7785e00dccd449db63a GIT binary patch literal 65711 zcmeFZX*gAF_&2;NA|*7DF`1$=ldw?=J5!Q*CLx(KkCmyAF(etH%u}Y!lFT9VEXh1i z+st#W-TnNZ<2{b|)BEZ9@Lu;_vDeybUF*8e@pt~t_3FNYG${!+34$P`SeZKy5QM-L z{X={lJ|S01U4(xKOm4~FLXf=RlY0h)@cShrnFsO+;=+m`Ufu|@10Q)!BZxgWg3Rh8 zh;TH5P+G^9Dv82@6Cj{~W>Ezl?wniJoEQ?-ETM zAv#aUQ0uSA1{E3w;4cYatvYh+X zVf#FwH&V5@cR)8wtZ2BXx3{N4bx5bUbXcW#M0-&&M|W_zIZJ0aqv)%RPTsZO@`TAp zXMIy;zVa~JGCgOm4tf7>dq1?*fYmO%h^>t=-Jl z=cYOb^MpbB&BFf3zaRDKYv}*|M8r7%?=x%i|No=^J6D4JODXJCb^r0>$NBmBAKCLf zO-fF_Lmyl}YY3kcF`*l%VRNwOypJocQn9ki>AsuyVWu->E{@sYTcz$E=9wXjgdkBp(G z~(=#tmmozLmn6LhA3`;&Z@W=>&OVPg0CBn;7^(|t!COT-n|37@> zHS^+ILib(x`W5xNs+91r5D_C8+;wBRA8sRes~!HtVxKZ{ zDmA&P_P$);(#<@?jUK!&vKqCt=Yc(wlSZHGPg5^FtN7M8vh`PrZnt+gmwMOQ#B*K} zkv$nKvKXjzFH`s+{E5qRyV>Q>E4F9D_PsM3y?Vu^UwJ0x@?hpY_?hxdnD<$)Pbg;jP9%9@e$1X-^KS{cHez-Rc{nsSH^Iw1BKmjRPqI<>!VYj& zhpHbwe6WccEU`=RSboW1I#TXjy0_Y#^?#;u#adyG{mYYX4)@)`(a7eBj-NM1GpFKQ zISplc^Ni}(f4?M4FDcQW50)O?9ofv}v~7yT#lhCwoj0yL0c(;IOGSN-l5#Fon*LW- z@kshabCmhUZ1<{5Md@nO)$Y#DBuT&1*f7qjJzI;RuS#o^Kl4i)%uXDCXGtINjdyKsQpF=K8Tanp%j87e;taZgSMDp! zck^|C=5IuKZbzw7GMP^ggH#yeoy8l6u^K}AXV0eLI0q~~OO*D6njQTmJk*q@N| za_y%Oi6b1|x)>cD9lYFp`NI1%_NFrId)EuXll=Cx4|P1YCtQ}l5p9h5F=*2NVK2p(Wsy?Ggw5G;EjPc$R@?X(&2uU z%g#)Sfcws~g~4LQV9`~Xp#*8_%8eZ|&n?OQpQC$0%rlE+OOb6;`7SrWIPpq>5=$Jh zd6E-%xD|ZZ9>3QZZ#vWQX`tLW|8Yxn=z8hs0j_wX<|LP?sj1A`R9o-ZcfYKW4+TOS z6%ena;nml9Vft56>6kCgLuKV8i@~C_%1W_M8=$+E#^@rHak^~ z5>n_6O6cyERqcupzPtrO?0)g5mfhOV8*@EcR^7^qm`|Ido};tFpsX@9sDu#Kq#OlfuCErr~A4dG1ElcF<`$;bbBP zxAurKrSs>{&veEg6bM=jBUjcK?0RPrIqsi-WDw z-}KwNmQR9JV8C1QVtS7)gZ=%{!-^S$$iao4-b$Q6h9f-VrR#X#V3nm^^5Cjkc0nna zcciE$7WE-8PTxk&EsWon(DQ_1mDx~Jg`Z7_bo*7Sf<5537~t2j`EeesiH7TkrKqI&U%6f519L))&ITR- zmibzgBF1<%EfYZ!xGBKlqCXsA`94_%YFAFohJIqbU#-XmCOT+}6xg^ReU zJi-UTXHNKVe$(ep$$^=ME<}%B|LfWvpS3#W+7P}p0Y@eiO+a>XKN;1(nfc&2 z63TpCtEk0kXu@`;#^)sJf0@lz{`}y$eqEsFrqgo5z`(#m9i6OZt}1N-0f87^R_YrjX$2B!~_X^IkdES!YKwr2K?ha}xp4*gYJO3)10+%Ih z{o5K**ZRD(Q7MirtV;`8C zXF%BUbYl?|=MJjq3CM)(QrsibQ>Ui)w%5XvHS!q&X|3rlw}z|HW7d<9eD_h+Ke6QBqR!Vc*(pMh>-PS!rqMWfyXdAYG8x zOBYc2`%Mgy%abQhI)+N@y1TnS_4KIPJ2<4n`d95uaBa9&ZMsrCSIkV*31^jmJz!~K zV$x*^^mLJ^Y?A%;u z>`gn=HOhYwR&jTCM_mmI*6%dk>%Ka;`S|G-l49_0DypjKNlD+QPZT(<7&co~DCD3% zD!4EU9$EipneXvLXD8+vh!;BA+e4Daob5ay`nXpr6fuh$STt+{-!=D=OpLpTXSG#x zCi7&t@KgN5qB|Sq?v$$;+E_1zSJ=JPsD3x`>*Frn|r2tR+VoqslA`>x01_%ikDI z);m~@l6n_5a}jJ$i1|92z7#F6+x8nrnN2jkty|8x-`?5Yp3vsLXh%`3P_oedgj{ry{i$i6~1=k@E?UA?_*SZWc6r?q>c&m|*^pI4yP%Igt#AUGT<;Ff`+pA(1YB^ z`kR;&7koMW>xM9`-!>~!EgGwwHDO!gM21{CMlgBhpQZONK#^U?s3X1h?i3; z6F0RBP6!FI26F~x^PTpwGw049cfs}1T9F~ur&EJ%1AK*$>U&+1+rhc@hO{1tL}kO2 zu=!YxPZ-|q>O?60sy>eN(b>P<=Lx(@v|3^Vu^4eUp$S8f3Aj_4F8Tz{e4-lqv%iqz zh!EX#MO?cO{BSGN;i$d#Vo4Sxibw+&e_u;I4@4l3Kbj~W-!eXn+)uqdMqqF7nAjQ2 zyVrY28Jb9Iu4ai6#3v0Rcn@^ZJ0}fk0+I_L}>>1%jTst`-*zV}B zHwCFbK_bT1)tcZDl%romPyGRQ_H>0C=SM~oM8bi)>uTkT6KKR^dESMK0XGmr&QR=k^f9C*Y)<&ce6QUTc(R6|+b1t&J~aKNsOyX2Pwn__ za}4Q|uk>Z{X_p~D9>r^HFl;<{LShiDHsXWX?xAWCd_#m(pQxeHa>yEt9lAt-{4IVs zr!ZS!0I^G6{bj2f`ZB@2J`-36fiJ&|Roth$>OguMyRv*9kO>z?DUP6iFM<2V6E|b? zMLO6Ywp{l$lymk-4t2b2p}Z!QVn(ZJR2=yXgbjggxPP8SXH5 zY}F{5rq1@8#CKP^@7j8RM0@dh4^Y@mw&aywfeR^uHJ#y$-wwRMseL85-e|79el-sB zs-UQ7_Frm<-VS2ZY{*t1GCj1S6Zg~zKtlsYOZxZ;vyu0j$c6IQwG z!<7ojU({U?_|yD0f9_-iz>QbCb~fgMa;Lyjm;McteJbJ?ETYC0fhD@^vW}k_a@AQh zE;^X#<*mWtc6K&{;9&=9{DEpYhbFNvf`QEnB9PL+2(d`KRy&)hqcPJjiTWoPByYP* z{AUb;yG6hV!q6AEx)vHM4~Y{xyyp1?<`Yp*2&0-i!}d&P4LvHxFuY_`hhl~!a{Us( zMZ&mLsr{Jkq929;gajQ)%__cO4t+*lgCh`I!Dz6|hPF4!*?4 zQ1G*mOp^hb*UwK!oo;tt{ZL*CvipXBRam+ zw_JPF^*`UZwA<2j=XK^t=+k*{OECNkJP$oS2-|Z^+MT>`?LHQZtu=WR9y>H%i*v6|Smga>varEC}e1 zzY$sVCw3JU7KYS|EG;F4ZC2naoHfDasR21jP)SyQzR6s6*u{GyCpKN^wik*x0zXh~D`xg~dqu&B+}L3k#RUlBrCw*-mA zY6$hAZkal=5Tj@JdnU|fqVT$h={%$DezU2)|9 zR6?IFxIXDe03{8^r08jX*s7qe^Thci%GQBGbNi_ej#BHh5T17KZ;s}amI|Xt8F**^ zvMfqnCq_dp&~2WY*s!oOSsM9LdWSo`K@*2#3Wu|m4J7Aj{GSgDXY^1L@yDn9j z>V^&A(`$l-$&sXHicj1@kEQCaTqPQ zKTp((ljsvmOTi|4fKC0U)Uq^<=hdX8{o-6^*@t0|KhsrdPqNJrh~2E(5We+KXnS5$ zRu923itjmL=Vy&O2M4cKjmAIZih*FoTQXBvMC5EX!^p8KJw-h^dO5AF3WbG*W&i@E z=j7bjpo+2S&3wvJ6Q}LX{hwt}xBB(*ZdkJ8h;uzvrF}h}em(ncm4OmF zlP-cb&`tm8Z)+$325XU?nfVYjb?A#vQK9GILG;;co12?77_UDT&EqT6ts+bOi?eTA zEdDCL4X9>|_>{aVytsVcPDu#ASo&EaOXbRNx0J<-P2KUlsd!JZg~4ntjW4xZt{_3P zOG{DwqKT`uug(g9&4uN=_^m@lP3OF$7CZ#s!N?b5*%sc4<(iXqqktO)mI1o@+P^V2 zpONa+0H<2xHi~J(&?h^~rqG4rV{Gwm4aNf~jTq7%4rV-Dn~ z6AaaQm$Kr;L?vV6PnIPUk>0yPc9U`-#Da_Ek_r*wx&K@H`jqYL@^wA7jZuiKkuAOp z%-BcYr`u z$~^-S{!uXp5%LE>M8={qeufrv;8$-A8B<=@O!lL9x$>zoxoRWJDh&ebK|j8Xu%Fi2 z&m}Hpm?^RvbTAx@G2EkezYLDr>rQqBP7~WfV^wZ|Lg=}2P+{PSQphx)UmlD?vnf;4 zD`Uf7ZvWBAi5GQ#0J%(hc6LuPHrxJ+ zY;1036c?+pu&~%z&BZlDRj#vOJ0!_4$pHQ^PxAIJ4u`kk@&y9}=q2$R-B)iqR@cy8 zH@@_&^5PZb^UoJreUjj_pi9RDARWT=e<&|7;wR zLVWz?%{Jku{b(ft9Wy*E|KqGB-1?hD4L4|;gytEi|J|EPC;JPT)~WH!|NSnb=Tu~f z&l%7!Ps)hQ=NSr`p+5sU0lxYNgh2#S_}`ItCylS&eV6%E3cXZIS9kZ@4m(IRA1Enl z%3p@_3;wy4OpEwPQYbP+i0^$DhuT7lp;)oY#%yZ6!{U&ceJFfc?(Hf!r^^OhMMSIE zQm3QY<6td51&uId-hIdq)#oOJO3`TGvn>03o}Dd(MwhT?UdwH8 z`$4myprED>fTAHO^Rc1$ii(f|uVe{T4V)Iskzznrfu>EI%zP06jBwf|Wrv?PA%2)I zMK^$n<-d=sPeZY1=ACS-3y%B(gl*dQ_#@Cv=F}K$#pebo^>Fq{bpPH&m|p2c1H6m? zSn&`6tPkcL>q7@wn4Z@f3w2X>SJxx^75L?QAG-)1u(8fmmn=c!%A8(v`(JR+FTNevpGT3AyfYvFR=zfi@lc?{P?;U;j>zU$}g4 zvI))7XKCF(U``FCUkwyLZ@wxXcb`0hNQ|9eXtMuKdP7}@7DUS0fvU;440iDjL~l>$ zda{%yC10ker)P3P9YLb!ys=Rd0RURn3Mh61HKU9GxFQLZm?D}dzRYhJ`C?Rk1iazP zLehYgzT-1_Hr>vc5pWqBBj#S}ury*}&-3uXgO9M!XT)IsUwKIbzI33{n2?qAQ}9;s zFfCO1&{`AdS{8aw>q{tnJN+5r$nfHI97X-_NJ=IoR^>%Z&aW&2)J_@3PIu z8|3(-5(Urr&Z31zbO`yI6~9dIgPf$n=Ox=wm$_qAIJym!{lW`3&ZU`^N{`oT+6_L0 zjXS*UjODcYZrNWUe!>sdn8WSZtzlfWVoKXYHfdg#h0uLX>k=)`{p|_0(UrNeu`A#*Jf^i|6E?rk1UyrW> zoSI}n1vwY@-6D^cZI5Qc49Dv=qgDL+_KEv>_e3Di%YIsP%wwm+%h++0 z`sa+@t%^tC&fYNng9a7fKdlo16FY_Qo5Lfc%ahjitpo)tL5vxWe2G<0W}>Vvev7G}L1!)E+uYQ&_aOhEKGSR8K20Ru&0qZYGj*tvLH z6~E&7i(eL!TUKaADZ1u}THfpV;~+`jX8PbFLTO*|{y6NE46~Yr58u=am-XK5?hLlS ziBm*!73W1309_`R{bE7jYXj@2<@C(XL#~Oo8J>NAukaRLuP$NH62i)Izy+v>HmkS~ z4UF{`33}EIYN#*$`r6UeE8--Y@SVZ9C`YkeIJNuaYXOhU<_M!Rr;bn9zRSOkAotZF ze1|5 z`^9fT*205M)WAJ>q&h_L;9JXLW?|OPoSru=u2+1LiedUPDy;x&Z~&;`r`^*J+k24y zL(Fa?nqq5j`iF-yn|Y+E^bthgWM(K!bg+ZOb-oBdrfS-f>~YVXu>Hl#w`RXV+U|3` z<34PcDX2nq_G#~25pCUFBM^=$5eL?UAgfavI)Tx=q;B+syq89ig^OSeNLfwcc$n>> zQFBGxBSCGB$hO1jz@w6tsr5PURno1p(>sFW#It%wf;@)RzsZ@3%*YM6?P%W@cQ=#J zt4gfx+Bd3s3>$a~H7y})2~!)#BsJbeZ2v7W+$P#rdal^E?X_}fWD>?;_!j#+A7m{{ zOFff){O5v<{BQ6BQbx`Ax?2B%Sb*Jz(`(s@i^`S*INpmL8!g%2G8fnY0F!InlZgtC z!?b(@aNJ?rP3(i1yKt6$zLH`vgSeQ72GNVpo3k3750h_3IoHs$D_y$JLFnhYB6m@I zZ|EljLkf$U%ebY-}g1(Hf(n?K&n zKNg0==Xdg)Ds)v;R6Z31!y-k0a2e$dJn6*(!0V0b%vpE#LT==2#;IsVuGuc&u;X+9~Gm8u|>LI8%8n_{S zRZmt{wkDUgbK}UR-Up{$iH(qGv%g&7s-=@L<_|SA%J}c~B0BGxb`@ijht_^<2k{-DK5))kp=o7R#}D($WvuprvhvwN1&-k#Mp^N%BO@cd+k$a)Cj0BX@%&~FYImS2)&==^ zkZ14({vpr9{S)zu&kn9!zfNbr|Fp95;#`h)32)M>NvRl88}`#cuV}9SSVFG0>q6lP zzf*|yXD|orwHezY&Ng43w}riHee#5b+OT$~U#BWH^@`#C!(#jKpc|j}2Xu38ByI4y zyYuz56=dDgB9y4KQ9Vfj*zk|pxYA;`a-s3ulmc~4-p;cteQb~4&YBkMiENUMV$6TF zJP5jKpJp>lh2=f)T;57JP0tXgnBGvf46T&-z7q%V- z*_&;=n7>gt&wr8GD?oCQRX!&9<7LibpkCyId2P74L=|=L%>LCu`X})Pi-(aV&)Pg+ zozgsT>R!J8W^M_?fpu9flD!;PwLK0bfbkB`a(7+N?Ep(`NBl7FHzyCLqf=vzaa!VA z+>0T(A$Oj)IjRPQ*2@zgI~UW=Je?%}l@#fZsJM6rLXYbj!(fb+^D!|z?1$e&@Fwmg zMext)za8~7wwv!`bVdN*{YTiTK0{wDI~wTRyuQcBySzP8`gf@ZEW3VDrXMD4ucJ2S z0fZA#!?Oc*!oiV0agQn!g%mcnJ9Qlk26KbYk+}8fY9+Ie+a0>b43B6*ycDW4YlM#v zBX@RQpRq6(iC=Z8cYU$5N2Yl7cQEbk^Yk5=hu?UD7-;CqV{bazOir}9S6!XOO;q#}*$i>>yndsN#*$Lj7hGU-sAdL!Iu z3ntCwL0gRBPP}=2My9vYDp+F80x7Um?F)>+MQ=c1Z){ua7W^1D9> zRc$FOqIK{HhB$FC`5dm@3!F*+Z=1694=P3-dZWjmw;gV23lwWY0LR{_+FFBpUj35{ zR#!R#vB!j+E>}ner#Nk$R$uXbX55)F=_IhZy8fL5X@$awmAVcAqL0QExxsQ)8kQ<# z@m8LZ*mtls?kKW%A6YfNf{R$O%&HK~e^Xy_+O5)~(@7;LUoo6RZ^Rr7HwI_+4(21X zvzo%oaQbaVb;^@W>8fJWr<|vu$RW{zFMVV=)qh=2$&lq8QQ$lpzjP3_BG&{+<NUXf*uwYd zwI=`sPVmAPng^-Hdp>cwf9We&a0ZXV&e?2AE+VCHaUFYClP3zlu=pYnqP6x_XD8tOPnuR1tfiuo=JPgR`?FuWg<&T! z_+Z;L$ev!=&kmbLBqmc?$xB*5S`X zahJ{HO7@Pq+eEz+OOqMZ6wqD!{C=CLUQBZURApnR<6rxN2E`OP7k86MsO}@ z^y!5b@6i$a|H9Z~p2=nFp@ZlI9U+yFC%R1DMl+-k6>yuXl;2dL`ihTXy}tMVvD99t zK8jRp0C`IV5){A~Erv@~&a%qomdX_U>h5O2{-a2tDan<8lrN1T%i_mvaak3vo9R_m zqr^honLuvjd)$%>42>`PouB2yl7Vv7G`FD%xfLOvXZQ#Jnk-huxXkhT;Cda_QP<5< z?d*u&6_*NXagXvLOR3Id3I*Wvun%NqPeS>%8C3uO#LBv;n|gO%gC3c1>18xi;dh*wSRFq$hP z)y&|uBbY7APFFubW%C>Yyu;nW*eThI3!Ds1#6tc5d(H8okJvoz!@iQI@WruzYSzc| zFwY28$3J-DOp#HF^$!JOn5&GGDpZMri;0i~@(C?d1HaXQ#8V2KTnM6IY|n|`5PdCG zUrGXqnl9sAQZQm-z2UHBQX<_43WQ7;y83l> zbxOq;A)(abQ4cLZ-<3^FQka3AqzjwY8F-QJuS1#gfCtb7-q4A#Vl^w>oNI-doGWzY zWB9Rfin5K3O^q$Rh=bfNZXuv=(Nt{f_c4@%LQ!vl#t9f#hnkbgIGh9BP1{;xcgU45 z*weynfFen6w-0OwbUrb{_UXyBj9Bz8z_M5?xtjg;@}w(m&M7D~{fb~${un8{!N-V& ziZ0ZN`3^A7tB-WtH@a<_mo{7qA2o(~FAavV$bQ7JtnW3n;XXy_Qg6KT-@HjeDSZ4@ zJH{e~*ZNwejHUt1ZEIBd~O~oS7?YSfm7Zq__d}wZNUONtCK#Fg2PFuf5MlAO* z13vq}i%LKCI5d zP)!45e32K}hXO@>ntkJI+bHZlP8B3-S?0K;3dkbV>J91FfW~)+He8*tslB~Db=Mwh z=V>J+H^+YT!McoFvaN4{=`->bO59}s3k57qfP97)WRg5tZ!5$KQRIz$dr2f<(i)rU z#azAz__Wd>ndd0rB~&)C#TJ7X3YW&>7hre&5wn8v>*!w5*!RODz}|tRbP@jr$M9sU zkpS`HN9+5Sr$O_8A_2;kwW99oS_Wm6kkz8Hva&+6&d>h$lhV?#8yg!G&7!;W`P8(u z{KlTZcIX}&%AA~>^zU8Sc5|70X9D&2s1QVp-prx@aXgE)QRluY{573c6N5Pu6yrC z_gE)|L6(EI9335t+3W9z{i0zT`jsSoHap*a*C9!**Hr2_2FgK7@e4ria0g(PCm7{l zv>XC=HEQ{*ub87)ydto4Z67QF$mTDFn!gS>je&~tyKasepvnHz!xSVkw=2{^Eogro zV+;NE?H1;6Z>_HC{rmS!zE7`fe7S?F6G$ltFcd}JCi^M))RNqVu>JA+XYgn3z|YJ< z^$2!3lDPu-otlMDRHW)HfQKNZ-U<8%pb8HNaiSbSn0wGRCq&KZ0BHM@UwIhWzLS-e zH9J2a(Kf{wNpo>e8}3kN4rKAvoE*h6hlK~QDR5&rU1~u|Sw-diuTImtz>8>Ar>nm| z4HzB3jgek=6Ly$aul4Y~{cV4DGXn}7Nk&3KLZ)sw*e;Z(*)+9g)|;)9g!AqP0%K2> zR#ff{oVVuprpgV5#CRqK4Gmyo~>|_>b2b9=f88R4J1pmz%+Da3B(WR zJlrtRy?UM%D@&mm>#(uS-JmMqeAERqFs$r>CNSanx|lv^WnCX1;gEhq%X1J1A*DsS{Gz(P;jWEF%xP?&&m>T zAtXHd-23cNN62U8IA~*X)u~VK*7VYWn%&N-tCKnp1Y+Pe3F=<$9O1C4-2R+A);8jO z;w=B;7OHV4C>i}&xcN{|F9+5acuh}0+<4fYMsgm13Mq}{&5VqUagU-=x3!=C5**AU z1l?mtpL>BA1$wqc^Dr%p6Ce_dC`t9w-LVQ&FadH^<|tknSanv1wzsE;nsS@TkK&!# zK!KT5pB*S~L9rb?s=r0uS$bB;LgT@ZkIVGzP_RhCkziG} zLK5yAk=i0pdG<2yPB9(X2{JAzh1~bAfvQdI882jWd9j>x?71XR*OD6;?*YHBj(2PV zSbzHW3>3FKf&^Q#OG`DObQN&LGj&q|lHppqlG_-o+q<+J=BaE-;2eR{jfH6gz8@?oDo3I(ZfrmiHtn2IJ4cw;&F?^85j8;o7Q-r!0HVt z#tQw~64CYIvHdDLeR+6pgPO9P$*-T_=yU&9j*?O|ts6jDruOtB5=kr(WK zZIY+I%Cl<4@d`gNmn3+&u7ySE!AY61wL_T-Tzs@fI)D1`h)Rd)(gIa!ysUi@TKu9Si_lLH$FFP%bCz3|v^RkwmpGylf zFB}^#bEFx&3%SI=+J?6`5pC7}f>jc0q!<{$JN_zKS{V|T$oV4tS$ed2n80_7B!3P%Ac8`QZn&Y4c4;ikn!cqmoB(| zlS0=`%ff|pZ{UJ1NI;RfbklA|IjxSENp0G7F9zSfLUv7GN4t7P(Yg5J*bn+{P2oEGVZ26N{l#%@3a@+v2Ut z9l+|Mfg4O{7UGV;ucl;G;cxkel$k}ZoM8BT?hJJdcZ}1n0I+}qKO^^WE1Q(z+@Bzx&!Z%9gnJ_^)J*C*dwNo{bTq5;eZmb*Cm6LeLNCO==?_6QOc zLoIGa7Fyt=&jAl&zPUII`mD5eEeQ9Hc$fu*!EAqLL#dfo++%3kj9;@Y5tMeWFVBdg z{_nCvg;Fey9XCtN9jGrbcl;{$DY`WEmBh~-`A}2s6d+zEQf_rFD|v!H8MiKQ7RjGjpz1z zAh%x(My=nZC@0jF1zi#Y=kE%ve)Xxk0c=|A&y(TP`)C0aV$WyueLPH=nqRFATE@?F zr0|RKUl(nWS*K1+RN;)04GIe4Db~@|&4yU6VQOs#i2CwWxUa*O!zgDJ$e%_d+55gU zmhD$_%FnFy(`yv%?CeB;FEp%(XUwZfw1yms`$Z#!EKnG}YJN8O81nlOnsg*Lf-Br! zohbeD`s(_@?h*~<*F<_T2;!Pe`_MuZ2t}dek}g_sACrM73n3%`bUI1~5 ze?kgG@epb#&i*L@qlR*s0kwl*C9>yH%?bdd!{8C%I-Q|R(w8S&p`!GP_}*=de)8A| z-^z=3%Y%g|orTY&HLyf`x)0@$faTU0IE(nX5Xi@i4M*R19j$b)TZ__lF&o;r{Y~EV zP2wYOGK=@X=NXzff z{o>5X#?|hP2U+z$Lw=4=o@*SsdHsD$zC| z_6$mKEcR29NW*cDkC4pqQ1Ge;Zz2uiC~X#C)gRH}@y8^x@k#1eVw%kFXzSJtz9Iyv z;J?1i5OR#1ZLkqk!g%owZ&G)+LPTg$0EZoqzn{D9KR-?dusR?9GRYKDkI3pTKy~d? z!z?7ZUVDFROU|Kuf8QjiW4GEI?r+M5{VPd&9Yu8sd2oS*jo6)6vf-FeThNUWQxqA< zC2A1h4D|JRBgswmHyUw%vt$kZVuaOL;+!L{kOLVetdJs&Oa(G@ly{L>*1-*AO8%07 zH^y3&Qv$iPOY9a_Pk0hZ=KLV+yLO%Aq5;_|HRT0FpMgLuX}snbVrx<${K}3uHZYf{ zsNUxo@|TR&@=ef562L3&*q@)W_$yLF-*=qyIP#lzeYM2@hw30|p;|7Kv(;y^@jDjyt z+Qc8xUZ2xD)T}z#$N{4UWm#MOzlEoJMRJe1;Hsa+4ndLn{5>v)+w_RnIgL@J8`UJ< zn1<+1nneUz6B1ZYWF$lU{Sx(Zj~bA5{3(zUMlKb{p4n+vCqj~6#)&rw*3dIwAEkjb zX}7Vr-Ou+XQhkj;yx}-}9AOn?g-CdiSPcynE+!s14JgD5hG?H$BBl9(hU3UN-_Rhf zj9C`yegwHnv3KdLH-?)W68QNms>gcgg#)Dc5x)Jos)Gz>Gl)B(0(+VweKR#DpjmX^^^*KGNYr?Fp8dYJD98~KQZ>Es@(!^p$tjpV3?ZUKGD90J z9rR}y(SC6l!WZ;lKww$5*OzYz)zJGf{cYrYW3^KgOji$OO6b;*iw+`P2tB(rS%7% zgY*)EFK|)W+58w3MsC0{1V=d+Q;R)vqQWgUIG3$W=sK~@zyW%|`g3S6rvmZ4n$5-& zyDtNXU040jzMx>6NAHCQUEecsih@qhzt5eHV4=Vc`IG=RH-K239O5K{kU+CwA^k%e zFz}^*?qRTU&!D{)N+>7)x|%)!lZ_2$ZCscuAq!eW2aBD>Ngq;lzuFEk zN1&w1f*1lO^bExaoSjR$e;^%yHe5EKzbv$xO_2iEr~Z+iXQ}G2a>WsvLAvh}KIj3C z7nb^lC2hO`Y{C`j+$v@Ue$E55*Y^*?Zf<22)i%|M&KDe8M!-vca$Mhi-tTe13Am0e z1w43rm640|^yzzHXrBr63u>W!1O%z#^VoA*7^%=g?>0L-yXv8?$@oz`@@KMel{^Hr z-FKlB2rDCl(hIBJ`3W4tg^Bepp&xqD*;K^nQPmkAbNfe9aiA=9FjkM+|CL{F_>WrV z#xle&p_vZqv5=BtqEK&&V zCbYgR)(*c*j6E?k3uOjSsu3{d$dmuIPbU2)$3+Jwzy=~$o`M5}rm5WXN8^W#sG?r| zM|$-#b!8G#2e%MZxy_5FVE+<&F0n9cS1-7G>i~6P!EEVQ+oft z9{9PcO0S}#A}kpK5|l~Y3=~Hc0#(m0D-)Tt1z3iIo&Dm5y<(gw+M5cCl>z@GxeGb3 zCJR~)r8YI)gU^CX%SV^gAipoy&4C2$Bd&jGlV+FF%Cjc89;kIpJr~(WY)A=}S9F>7 zD&7g%7kfTGb$Mvl^GDqqap(oY4C$wwn(GIo zMJ_Ejiuu|Yd*L_Fiw-jC4A7x46iD0NKS(u(6ep-ke6yr2sPrcgIA?+9+5r${U_CtQ z!KBpzt0j`>y!IGv2Bw%}PC`*>@e9|~L#+E5_NS$lZUr-=Q=}1mDpSfPCk)x}I*?~g z4-fX0+EB`0T1s5gfccb2woQIO9LCv;3zf}CoUy^I~mHFyc_ z--&_2W~nC1GEP<>J$F((I{=koC~O4`M+HKzXJqd~>oMA4jn-Cn)Dth{g*cCbsgF+qw;Z*7QJ!qi1!_5aAPv|e2 zfo5hUAie^98fwC6K-uh2pJWr?#@0H3UE(+Ixn|Lqd#l5mELQz_gN#Sj=#@=q8H%t* z;m7eMEz6Q0SJt4p$i5A;ISoX&7yxM5?Rw>a_WLJ#2-<uhryJX_B4RTZCN_Q+PNsRu{9oCANwBl!-g*=Lo%{U?}5O$tTwWtGRSbS z>{kl%bhc7TOG~TeL?X%(1p;qp#C|T#(fE1&7nA2G*3mU+@InU2#vb-*2_%w~4*){t_KDH@XLmF`7RwAp%CK zPk}?6-aZp!ZUX)Mb!(7!@$}Bk%)D~Gx_thsD%Bid$ux}h08ko@jOb7=W`$4p%#0n( z#2;Y8)`>iqiP#rRU~-lf8>%SzdUkrc9WbS!5iyi%KS65PY)>Z#jyq_AUM+>`HB&l`TIJ^K)LYH87IxFnv4kv#nQLFC3C0o=kMWqvHYb6|7CHD_f>z4#T`3Hf%>Rq>3exiL*4 zaQw`#$k6D@%k5lDs>XvmRv(~=piXBBUMA83EwE;L#ZD`KQb$-&)-|*?0GXL!XHERj zZlNzv(xXZb{s#`W%Y0rvYL?>S=po<37~DKu7(I{=D|phKo{Te}@5^)9o`?eeb0W&w zMtl4zesAp`_>0*4yhvM4)CKL1-Pzq`!9q_4zph>w03f`xbB@rMv33&Mf#zhDL}TCX zi~Wfas^Si8X5G4vMgpzN_=33im9et|vWM+d&zB!Szd zvgy5M_SNM6mbNtG3hsJAt7%0jN*f0w?rlem_LxjA-^7+emx$qMOf!q`vk5X6T;OG@ zQ)g;nib#Wb{^Osow;an~y;DX@q(H=Om>%PM022Yudg8`hFWZp9^rC)RWX8vjw>O9E z6l-Zk#tg8)<3>s6sT1GXB2JUJpblcmW3!C?tpQ*^I|IFykzHTrdUJwrGLUor*%_o= zpU*oY21QHY^QA#O6)qGEuL@zoYUb+SYMHn#8FYpe`?_!erRal0LD}tqab(+!*Fi4N zo~DmFy=b}Z&+jeoIgdVWjZNEKs?tOIKsJXR3!!R)7BtWYxtX_uz9ix$!=40GAW#++ z+ERmJxqv+?RoDR&{m*F>DuOuo-B51p=NO8uJ{miKeqne; z{CfValGxQS;lEC+o%OTza2p8XeH@LW&$xBuAZ*Xg?D(L+jwi zV0I449WOc2llv#1TT{f(g+!u=9On(4UL+Ue6@`?9M7iy<0j-N?PsKr6OUQnxbz)zzgrcSrggrsBVa|yIx}Oe6kE zUNqnwv8#4Abk8w6#Tc)ocBJ(-hA{sT-!h}zz0(GYk-vy<^KQi=J^{W0tAzIF??Jk9MXzPxrJX-seoE+i3~&l926 zY^~lUzI2v9J@jOk3es^GL)fQy%MatQ)Ge8GwQA+yNJHfE+DXzUk6x6LNC@6nWb_`v z^srCo5^>W6Jw{5TUQ(xh%sv_-+okL!Kx3PDQE{At z3#^iEM66LX{nfqYi*c|d=r4Kd^LmrOOL_Tfx*aSD?u%I`E4Bk|AK7rp;#3$(i2K4N z;wRw1`Ti{l?|kD0c)*(76V;7d=esYaW+1MmU}#yehdVik_xi$FXW6G1BO2l5Iy8yj z9+Q=mAtWb)X7=vr5GLHeuh>syAnySgxtDgc>bSp@+5sdZ<-rKag{kVj>Rp0_`!)x5 z$FuA0AX69o=GRG0>xlT*x}CsD>JTE7N{Si*Bbe=%x%CA6HLGWrv>bvQ+`h+8RY*B~fn)PHwbKS(ZE1Oh5@T*B}BGoO9O3CmIrBH!2HROZ z5z@`&n@yYl<9Fgx(F>rR4v^=Xm&E#x)4m#iemiR3(W`Epo4T{)TglBc^~ZbyT{r}~ zlz-Q!$q=5$^-%;x&tLs(q}{N4I-2FzW-2+&IsVW2Ng-{$KIKc+*)*14Z-v>~4%*MA z$#f}~+{!id^u}EL_}oy>XMN;cN99q6GfQP^#6b+yos(CR*Bluau37_NrKLlF?Navn zlC$lfdu5k|bw2UAl6vf(hlukilH$LCv48T?w@z~>)=kWDwepC91cor>&wgd9eofrd zh62X$#U1{HKXwCoC`RDZ(nxCVfsqgDY+XaU~ND2*upfYg-tTKQSr5me{A_Eg9Xg6U{j)@OMXD;dIpM1ib%$CIrV@-*e7bRrRnvAUQ#HOh5<}Pg$ma!!>2s-I46_RZVAFWO$*^gH^BmNvBAJ2I3UxQ&wp915 z=6wTv0N^W@;z0|0rE8Q+u?)ln&sP7UjTag^wGmCE2-AcSh6M|`VR~vRFk}dW^jTer zU9U;x#I>*pUjRyu3*^=i{+QVFgjNG?!A$BWhF1Lm$p|3?>sh*3I>!%1j*I}qS9k2u zmxZA%dKm%42w~2@Dk(->;gMH$T^zA%h@;fW3Sd=O5@4dVZC^pb*vLMV;yb_(ETo4! zdQiHuw?U#aGcshsGYG@$FW@x+C$lMpG*lvK+CaVldT^zpsx=A3o3Yr z+4?VO2B;V*!sGXVE6?OSqt8+Ahv}atHM&bi=_tHhqoooERTH$aGo>TrOEQkFR3fZ4$`9QD$M}vuYYoxC$aB?cbwcZGc)Tl z^0`m+xit9h-8YBBq{vhB#X}T_oZc=RT0#yu$&*ZE=XNMl+BX@H*xEG5TZ!365fket z7@r!+wzzY~9nndQ(ZX*oB0}NetxIUDbv1YELR$V{p>1N7-<#8}vCESnVSSE>#5Dz> zHW3guB+urJw3ywqzL$GHUY!TTQY?OHtz;hY`fHsnU3qyP`+T_c)6MhsBnXMDSls3s z5R$ysty>l8ds}ed2!0Bx`ZM5e4?%~&$MEI1r6kp+0F$$0;Z;%pi>sP!S9*vhrmr?KAJ1}n&S|R63u=KXuI&kI9cUIXzkv7_3;1|TxEME|c z!UYxik`Iv6KKXseiJET3N4@_okMT}u!9sn(_Kdpx^%21lqD&Y~_l+yoIG|}V4djwde zuP2d`?9!XO6vjsJh6VVt*ps37UcpH-ytk)EVo*u^lB7N>KDy;PWgxlrO~_g{8M{kB zRBgIq-~5pJvN`5G2e*Ah>Z>2nxn+;#yD4{!w889vK7g0INz>O8y(lc=T&P9Gn+=>wSMm`QmTUU zF?s@a&#=e8=dzPA?za6z$7L}MvHU6{w!`&>6u4X}EB-SG89evz;Dz<+N-n zo?Fn8cl-JkMV-Ehi9F;qwZ8}0L3;y<*^OkaO&5A)Wo1dX2Khu`icJb29^J-jm8Nr7 zhO6^z!;PzhrMDqIdk8m440VlQdoR@&9Z4Y#)DAZ))%1@+Cpcculb`b@2TX-UbXLJb z3isuTkshaDABF872F4PkHA8BPtxqrm=0HnAaw$OvN^4a|Yd*7xf0)PFvgDO~u-5ya zJ3_rGV#iZNL7jRp->Wu(J^bbI*x=wbM=JAy+&i_2pjdm~*#z$AG&mS7ZZ^`X!Mj0b z3c_r}ZM`!7hmAUd58KOjD2+xx+GYl?uB3pz?_weirBCU&NqIFP%5bT4K9P?z9LB+w zI}@@{*G-+0wLJ0g99@kUa^##^&Q{NtfW$+To%QJzp@Ih@&;593S|H8G=xYj~ouq*B zm9DO*qw@&M@pu*El9H%b;gk=jCI-{}?M9y|)RqcEAIZvt=dYDJY1O?+8BvmuIw^k9 z@rQJ+g(L4aX9MJo4CJd;KwY&eqX^aIwt=Jm;;OWDw|ODR{B%RIGi5E~N=FOsCtFN_ zX7&I(L?|RjL2y-6L7@chn?j@l*^DrLr&vVp}zTx}A8Ao&pl-E;C`$fu4Sye@Hodsiea_HUsqPSH^z81AaeiU?EMJ z_!M^H>vurKQDz`5FPb#+eBz&W_^{oPy{SOgB8)IiW5{PUm>}8qH8){|%Lq(CQr|#S zDA&qsPMkLJ&O~8@;)sy37HpL2*3k)K;tulkbCCF4T!ZKlOvN@Ex1sms^0!>P zq;wMqrck2wKkxtv&ojid4zCMI*5!F%vXH<4`p6m3WGI~ND3ByoTLJA7SFae-1_(R> zQ-e*!q@7z_%)d6D_vOorUfhN^Zq|@kkqL+B$qBnm4IS!1;!4+03m*{~Ee87!I9`S; z!-X8vSnw*^dHf1}d<#Y)kq5HE+xZPHs#EnByp{ilEmSVk%d4j-j~1n9T%t-p6E14-64p4#}e*ILK!^1`M!2zrLmZT^ytX8yT(dh*W^vpqc;T z9g>@YB@j}@auAdtC7?LUa4UJ>ecwnUkPu*4!A{z${;>HY$N2fKq3~6`+Yc}@oVs;{ z;U~vI2&fA}qQGpYUiQ2QZ3y!GL2ucp%^GItl6Ov=bN0*pld9b{*}~DqH51MyoAm1| zZ*C3!jgSzLn_ph*g-T9@rsq$i7mxt-q(tA~z z^>hPY>!F-qvor2Lk%36{8WgH7NNP)Rh@Qdd;QM`8q4eCmioACO)0oX(qr{Y80 zBnQ1e8XieDez=0di-?^+Qy*#B-93luXs{>VBKVsuX_VjNGOpM@o2v@AQSEZ zxoE&~Tnj;9Dao*t1Q2e)=cjXT?w`^_`pF*lTFBK#=$=A0ub`|6^;r2mf&N?C&)kSg zn7z>Y?yEt4U5J71_G)(TneoGtF&4Au`>~iq;)P-N;TibbN+<#$c zm=iTGmlgz+HhRQiA4cLmmZy{v7fM)5J3}UKcd&d}ZyzuLx3o(_eTgT<-`SmVrn+AU zb)zy_9WGQQC&PWc=KBZU4;HJSp^Tt+tN%5 zREn6VwwrzKqyAx(kt2An5F>H6G3YFjFX3qw|Dq#a5I0E=@$x@BA8Hhv*y;UCzu(t7 z_Ss$3yKnjVJX71Frnfx@4~E~lT>OSSMLvj^xaHgvpv+Pw2PFi(5frr!kLShc_71u| zHn31X;DnI15+7Jcxw$6U-PQFOSc!lupvPHJ(MCVe?0VIr27JAXG(Oku4FJBWcu_K5%jR)6*)u#z& zUtA)8s=lHqJ!nLQihmAOpJyQmlyd0>13@oQlOrg=Y%C4AXv_E^CC>VuY(*R3i>l<8 z#m|Aw-fQe1-SWuBwONTdsom-4@J%s_f}QgP@{rm=4eCMqp#EttScM?D&;(!j#6hHS zBuCqUg9wBd^c?%OjA3Dau?X}!vAz5-I|~@x*and59URF6o(G2K`6WKjXxb0J5izK4j> zNVo(k|Lc{qg?u`7U%2G-bY&Wk9Vlw7O=$ciJy4OsbA$sdLz z#Y#jP3YF2HWo!UpK?;em3jjq!=mQ@S@pFr7Yj@v90-hBpk6JoRS_0srg{lTDAZbYT z4YU@jYsKH_ss#Sx1!S{Q*ml1m4 zVOH7iZ8=jLiTgw%>R%9@3CQ!693A zAIM(8Z-Sf(;YH(Xbb8VF+3*PCf0#Kr-+nvZYX*QUa)`0#mHo3in#^i@&&2I$9CU$5Ofz>-<}@^0N#r zf6(m7}4~-kB_}P-?+f3UYQ;)(I`e7h)Ay9Hq z$?N6!+MB21PbZvP(!E)2j$*-}nIY{d@_F^h4@}2g%p2#Zo8;{yAqhgy4-^WKViRr? z28AZSbnnBBozO!!+V+IG{6lVf1!7T#tJe(-+x(@t3D$dK-P?}A`#-aIS&+!3c2$tN zD@oY>SHS>|zCwP7Bh0n%I}61u3%Gl8B-P`KTUzdHq0BJfFVxc3OuhZ3uX^KS^ziYp zt$;pe4FOc>ig81u0H|?1SaF)LGVLNQSoRWQwY_leH4yLBZzK@EWfFECx~KY=H;@J} zXg=YcW3S_LqU2sW|K%|0oySbP@7dKJ(*2OwrT*#|qGO%tHwLnK!pL^Kg>)yCQ(gv^o9L2g9S1 z@uNU@R!I-LAMU48BmDbJBHpl=1fHxHVK? zN+thb5L-Z;^9HLYeMV!^UWmlbJ5eny zedp|rkNXGa-bK`nqCLMz?^~GONvFE|24oQ(#V78rgcFpDT^~@zFK|L{!vaabS&=fk z6hkdU+C`d2s99Mq>-wtI%ME*uno88s%NcL#NcqyyC4uJdH7`-&1hI*coTDwqm=?A8 zx+x|fkqh-J5#*%d8XVD$8|xMhS(xs4QSx3cU4E|k>2183j;3|3ul7N)AfLpl(ZKrk zxoEvJZ)0Ys^fUW5X|1qB8OxVM2~hUY6U}Z(jw2|HqGKw?)A}s$dkzg14aAYGaM4@i ze!Gbu1rzxRZ8#iIDPZs*jus>C)jMv9ABip3>6v+?R&Nk#RCgAn-LU$|8f|^NT5SuT zgjvo{+?$I%cN{b8Ap4LpH`9OA->mbBYuk`s`TRsLWyMcT$%JCMW-}uejmHB%QzdoOx@Ttm`f{VMbwHg|4g{;hQ$W1J{`u zckKANVw`q!I_|I6f)@w7ZmN6IOTinPeCA9ij^!GDlVg?IX)?nFERV>m zzu3mTf++D)3@`h3txHJN*-;uv$jQ(x z(jAjxNzT2NJo>eY>sY)*PFHe=}%T8I_%gRn{s8(^yTE+x4(K_2hU?a zpdebj=gyf?$7&ja`0^65!aB**4zzdOe*UHCq9d*9{b-Kf+PEh;>~L@HdkZ6r*=uV3g?{bH`}Koq#B zSIR{E_?8P-9ApzG?lAg~al%Wev|p&W=&N{i+8Lwx1#W&T*t(UUTR62<#Q4?ltP5t0 zq3;QsYQEn%gK_ix_+8is#lTMPd%m`w@czZOF0bT_BX}nc7J14J41Rx&Tx@LxjO1)& zc&dp*eBYUs`61b0Wv6!6*})?X&EVlc_AR6ar>RQY zqZ7_n^Fw7^+f!Nz=@*rkD3rOcDL;&5MJL{_oIj!50sg>Y#~w$9*Q3^+xVrhV4zIc1 zi+6HA?!H%fNmOeIHfNb|Sd*7NsPP?tc+`{o;Qs31x{`jA3I1<9HI2D`+p`}mb7e_K z9?>ox(x*$i+iFK&e7z2iT>lUv@S4vG?Ym9rue=w*2Ti?>iwtiHy)e%BYWix=u512e zmfGL6)cTxL`l)tsFuTdyc!6xS$>s4ga?3|J1O;p>Zl8*I{b}co2>C>;u#wjFSUTTt_qtkN%MS#A7pBV4@?o65y zdS}xX^dxbNz5txW=MVG83iu=CO(KX@Wm*$mZU+aRy9$^DdNch=<`EyIeWwRXs z^bwWa588Wh-Bg)kJ|BP+Mh(=bQbu2&qhugQGyvWqCRzS5JEb-wDGxO%A)K#UW0a*i zPxC&3S5zeDWC)O$!?U!dLHgVo;IonqM|3L%1v6_ke43qf>3IqigMN}DPT+T&=5#fU zl%q@Rs0b=t_dZ8JfKQbFNwk#ddbVuiX~*R)0{k-++4Alx@I51Ly!1w0YXH_BldNsJ zalbw;ZcAE3RsOwkQe~53T*s;f+Mawq4;mqKw3xhKyz=};>6W7HE*aD%^~TQIayn}# zUM~%3G}UK&*)l3n^~UR>?^_=4#8CL)l%+OGVqr)LwZi+enRE6#M^;E@psXdrV);cH z8(Fs+&Z1gIhOfF*fZHu%Ex&t+X$uwwItoQeyx@GukZpQVnT%3{YoNXKWjCqiDTK1q z5Yle>;JszF_)@qa&fIjlQM3(;TcOUd_;efFv!SkZl=E9js*Hhui^|Fe+Lk_751I7C zFP=~DEpIpC+f^8hhEMOU;K~;Hbyk=j#~9ry?XR&Ptx$BQrqUEOzTlu=VK>bmF!PJqd4 zs(XRf5<@1BZOj2PQdF4cNwr&);+@Gxaaw48n0nm+&X0w3R9(rWbwNLJa#C=feZWcr zWQe*_!~9oQr+6%(Nk@h!(u`RJ@1KeO74UKCm9 z_w`O#rmI{f!*hF7VURL>P0sjg^OJIH@oV5}xk~WD{Ma*zy}PJr+cd9wHR1E!YG>77 zHJ?S@gVa17T7BLpt2bxn(29zj9QPsks&AOP{$vRIXE7>-JpCsPYG~Hy=|>Rx5Lrgc zC6yG&bgs&t$!oH9y37diXXtZ(rcioxJGp}G1)FMt1Vc9jL0mtp-_v_UEsnWrw`8Leg@FmZSw%eAZViN~J z(Sj|D{L12d9)WRhUulM6JYhn~=QAhQlIW)|Wz_b+X9M5Jt$Zr1HGXN^d_8%JXB{Ub z{p_+f+eYb^T*X!@!Lf6wrwgKY>mnQm8Fld84&BI^2#QT49+XMc75IyA!Xv-EK$N-X zxV_;MB{)IHZCNb(@fS^{#GB6JSac~ixmQfd;r&M|{g*EcO#yU=oIiRYPOLn%+d*`J zy>HKBh@2;t!%bb4ZRMa<&+cq(qONsCq}NI~>Ki;nu>)#=)V%WnDU$Fw59h5{8!rdm z?98*;m1^Ik+sHhc(KtBqZV1io`ku}6kh48O_v`q!he7RJ7cX5Rt+Jz@G3i4;^G_YK z@k(8c)W!y{S@ju&^g?gn*2jbM(#fufk~AFXsdx&FNLrR`$gCS+fAmVN=SP(@}+o>*Vw;*`%TF zbQ6aiiZf9sx2I>DyUr&|m>-K3kFP|x=7?$ViKaK=!wiZWne7RWojWF0*1Rk4E*dS5 zA)u%$@IAhtute1pYfJ7*lpr`i@U4mglgOX0rhqBA-kzN{&+E0nu;&-w6imYdh-*9OoXE`r-Qg!+6@7Fg6FQ`HK zu51?lJCo8}{vFVIV1bT{uu%)*=vjBKxXGFaKJKl~aE`X4F`?)OWlLPQRGt*t*EOPM zpus`S^@FX;d5&!x7Om~!SvB)jXPV3*Bed0-Gp()!U|Xk9Tk6Ty+~)MNA=`Jek$3Lb z!xlefgv7hG^((Gcs({-D;m*Hgi?EXv+BeO{?Hcm259t5PWz}8PUgNQM9U^oSb$BTF zpw~9gR%DCJ1kVpWbNq5lq47mg(i;sg4-I`Y zuw|eDo&FoQRnuM7iHZd-_rn%-64KhRlNKZV?a*$Pg`mOi+0LgJqPUo7I>~49NsY`1{~1mw zB^+)=TprIvHLmvPjm9Tf*2kU~oj99jR;9g)l6hZ-_gxIgWOGkibtjdS<6VxLXKlC{fPu;g(t`mxVQ7J3GkJ!9tnz2@Nl^)UgNZ0`KORzF9iA)8%tQh5DA#W=!v} zKx;1hK+JW{AyjHGA5M5fUihWxpyp2x6bal;4J{)3{II>AfCjP2=kI7AIyz_iSk|=X z&A-FhNO4X=g61M0&)H>Z~AsWoMEJAcG`jQ?8v!%c>Hxy^#6oRV7}u zfjr1r@MOrsAW;N=yr3CCjl({q@BWX*NLuv&T2YaY{-0J@pHW~r)6_xidWICX?Vt~J zJvnzFH8b-OWKmt9UZes}4`}5BU8*jFQ4Z3q;Y?&?)|%&0^b=0Pv>>BM0Cg8oqC!X7 zt%k#U$Hpv30!BSLHOLsro{RUafyvp5AeZTY5pqlrIZV8bk7* z;JSdHCBWY_&Dv<_;G+bgs#PI1(A#^3j11T~8VCsx>8{2ZoYMxa=)jOnQGFhZo5r3j z)EzidYSz~IqK6BNkOT$O+z1;x`!nc-1i4snZh28d3Iy-5hDI#X2nWjc+XrsdY*T6+ z5UN9C z$m>~`Q37MIrJWWf$G^xd3)qz~CTR4-wN?OiOI7d}0yZge0|R?lT8#R?w4_`}rGs|v z8K9f~K#z{w;1L8*$-|q=+XsOImn^`pzX+LWq$3!3oS@)>^t}T$zYZj@5#f+Y2lbO! z-iP6KlQriMQpsR3f($ZxV6+3wmI6arWs1LYCHT(|a7byh9~l`z`uHGV3h=Jllyl9E zd>D`JE?S0C4xDG+uQK23hYdQ%-Vh5GnQBqhJLhFm-J%1eefn^98Y)Qg6;E-H%O zj?zYpt^X;!C1r^K1dt;2umC916@fu8Y!Ux7mI;B5Kog1g8o}yDfqjIRDTXX#plJcP z))|Kdnm_V`q^)laZ>Z9>7^*>}_Sxu24D{Ip+ZzzC^x6urkoIHrt-~WDXi;)JS8$Nu zT`EYPmC|BSz2I@YZ*5QsaFqlR*ZzG+NaRa08UmBfiSuU;&^k`GqN{JWz*B^goCBZ< zAnC}07oNIMd+LZ?R>)x`6fixzpv)Q~iS%@$;J9()Iwe>qCY&q*e%*k^A*6mkn0tHF z$<)Fkl4;Cg#6rr8PZPRa#66Bpoodi>!Zx4DC-k%e(`QamQBjN$2D)lODN11y8}&VB zV^`w3YN0h;w+f(|0TE5v+K?F$LL>AQ&{YPp8{cQ3M5_$ttVc%_m(E`w#)3Ke?74yy z1prH=E&OEbEPN1d#!o8b>*3<1e^P}z>q!X(BmJ#zY=cn%2mzMpiOpdFz+WL;CH1=% z*)SxKc9OVmUer)7D|iK%hlUAgSIU2*x(oeF|0#fdq`1gsp#?(la0g76X-j@m;E=2Q z+iVQYx&62J4=tqZ5G{?qe$6EnC>m%Fj`ai!=a=KEmP_GYA)TGkwV%#)uM~QzyPoF z3E*_XQvnr(w9+suRi71cSc%yb+;FKxns7z~Tf zp5L$lA_L&J((NrO=xZ4IX{uCDB*J(B>)Z)|_`_~%({TY&4KyiI>OVj(j?fZFW}(`u z2DBxL;vn0dh3@wQ8-GzZG2P21sergL1DBeV>-DG&x(IM`cFVE!QnB}1ssjY7-UXg@ z$`EulfUz5dp4&dSKCJ$MTEyk{m!KaYEdWKDJjg4gLQ;{&a`^EmB*)ZLu+dTu`naXd zr&h7A89kriE-o(zl#V?{fEL!S;rN7vNDs4c1pNb$F7|8qW-wpwf&CM7I^=!K{6CZ6 zY4fx?Z%p2oMZjJlMCk<$E$DfF6Sy)VeJ0AlrZ#J^_b6R2j8R>2r(k^rtw zEeN-P0#z{1OzB!plH67Gj;G0I9m+AF6_UK5zUfmYJOKSXp%EL2Q4Rpf|9VA{R&?Li zfr)HvT|UM$BCxsSVOrABZcjBIYm&&bv=j!_Gnl-|4o!e#`G)i!12_f5?htkUD@*kw zop5oolxqhzhdZVS%Lot?)^)V(1tKJJ6%KV!A_Oy37R&f*CGtMl`I7mWcsAFL-SLD+`CE6{&1MUWU8Mm7!O{!0|Jl-1OH;92V$9;mFX4g5PP zgZIxs*#r7aGFyBXUf}x#Jy(GUM9F6y2rkpUv9Vi8o#cFN&=QT$L&aaEL7ZOy*xwFV zdeV20wx;$Y7R6xCVOlB$g`Bj{>u{-)ckRm<;A}MmY70u1Wh(`(ftGDB*re)s#`6hp z33;9#XKX2}sVyVvo0djM43uBinel@l;-7ic{u1po(6{Ll4v3BvzsF8g!0`~xxhwxN zrkn{VA#&K**bpg|!7Yrq+%mTOqBq}>>%L!#Wh5w$lUVf?w4IYIq(Xoo-LCA%`weF3 zKnLmvMtC%&vheQ$oj4N#6=rY-*%La$2`zRQ53d;VGPLiFYKzvpm!pyNV(vBcAq9q>H>jbgh%DZlvy(E z{p5xRpe3vK=}u;N3aTgWmJ-`}c?8-=GJ?O(>kh2D-)>`0B5$RF*`s~^x|#7@VX`9K zDiPQu*pQ?cZ}x7p?~K<|){=e7cAn`fMOqm1=mkiTplaBmZ%WFr07Qys_X8;`;y235 zDl0`^jMu#8AARkO^va_Y6Mpyi0|>a~QKf=}eZ{~s5~%=vwK)o!`Y%|i(C!v#jR{jG zf+RQarioKIyYBjDWtgWljqtM|U_k@OEjY$C17bgb_GAU1`mtWcAxrY0CUwvvUVU8% zWeeL+=S+A(OZi{E^j7yMeSQ24&}KZ=x;OtNg(2W%yO|~u=-cNi$Y(JlN4_85^G7V+Rkgr!{)%#aPj zxBo&}n!}lq@CfS*f{lWCG!i533@QZKfyU(TFx;p@uHDF$d-{PHCdN8@OY0w)*P@uz=Ke zoFZ8Lb}$%xHgP5j1S*9Z0M@12zIwcpUJ|mPwQLB^%an z={p{1t6lK^^{mqs#rdeHRZ^uFh4KuSmAtRa?-y$kZ`2yK2m~kC(cG;K2!&+_x?#1v zMBl!9Hxu??urHP(N(F}kGuf`sgxmFF`Ogf=4D$I!ur<1F08K7ezi*8HLD*Wo3F37l z0*tN~(ncB}Ou~}d-|4Z-C+ly9u18GPvUPPsfZBWhbG~*&Kn$9VgH8#g3fVj3Pg8wd zGQV5Lk)v$N$B>4?FHT!*Aie{h>LuWTNDLNWCrGuYMiJdgwy7uc@}F7B)^{unfy}xT z4-D4QrZ`(+asj{b42)~S3E{f?SYXY!UK}N9qOUA|_ zl>Ar-LS=X5&L5g(StiG#dQ?AV)}F;`e#WgU}e4AVIvkcYBnUfSrKA z0?UPDC)zx>)VO!mPvMIj&<>==bO3&c;InvGISC_qZc9Heae`^X?{lf0|C;E1+lssL z1&uu2I*JCkR&s}Kq87kjRJ5Zq0qGFC1-ZCONjPdt8DxV^XT0FJrm>D|3k6*&D4V)t zWJ*D>9g}YSvpMhqGE9!$VOt_4LN^{T3vni(JOT770NRok(S;Qb-tNP|Mxtt0NhKvE z<(ey+EdAEhl$0$C>MRHa1>CBQH?wXF6i&RGw9YOMpm4OR~+1?ZykZj08!}lLPuKkcx>|xz_Lk^kA$sjEtKkWU)vKQIFHqk z+OS!#IRGmz?BPo)O~2U4kXwyVESGNZ%x{)W`WDf72=zUsn6_{<6b$h955Iwi6Gw_m z4TKkDMpIt9_Wo0f$;{zq{jg>B2_<|B+lyGkVEYVYTMVQAvF0Ud0pQ$kE*}HS;EH2u zm$Pu+c+h54h??I`Kw*UMK*UM^nMg4kT)5iBH4eHjH4P1oM|lK;&%WH_jXnIca#uck z0M9chYy|H-);-&~K=6^Fi)da{>Q*#L;S~zOOy7)B=q04e2{P!ner!BJT4*gXd&vs@ zF*-WkZD8<~5XhtuDxe%!rCl$rv~i!(kY?w~Dk43EZFnDWzjl!RFFOPIb(^w|T6)m5 z9r#(I`=41J$LJqee<&ubEAgVf!O0n{)%-3|&hFQgL;0UiFRcvI5;Ca6|EZGVMQ0mW zh{d89RR#aB8#p^3WHhoTpaq7l0}3DWHr^Y<1@P7P0K;K{4>MnaA{Oq9S~@CP#5>vI z1RKvR8)yA{+3?WrSWws8!$)Ji@}=0`CSRw4!!Ak)jufxnchR41BqE33@0b4tSpS=a zc;%mX{lI$;=i!~+*#oLfDobw_aAv^_C4TO|V|4_= zpIo|*LMY;1?cKKZRZdpOZyO|eP85oBiEPDh56NhF>5ysYKyyv#%#3%@Ta_I9ZyTpg zq>XquoQaX_0K(6jA;F?sMgR$3lK$b&$6LamS=OJ55Up$4TZ{P?|A9yVdkt)X`5E>QUO zlc5a6n0Zha2ANhGYC+e_-Um za$%VO3hxU14y9Dm4xfGoNT8zR^Z&op@RGmHaFK6ngG)pH7rKSPTZN8PHqej>pbzzK zYY1A=C`mg5j&*9-f6_+5|T zUBDNzot;#l?R|_otDHCz$qInHqy7zKd{43=4#yZCgK*6vkn}?&0UIRTlk&e8u>C>7 z?fTl&+}CHA>Ql9>0KA&#e;t3L4m4hAaN8&^G#EavfBWtS4Y=BN!3^;Kb_#f%2wM@z zy)tY2!p~4O-~N7_5oGW5Q``S`$AUM8LQ$K-whlMR^yw*bqt| zr&-}--D?0F+o_WRp0|nngf#b3;R_*srJ-|$>HGiBoIuGez!{@q0?eT*&q!3Ho3yMd z(?UcKk>1-rICqiG>VOWH_>1EjM9`yI0q@RB-0y@VEm)&W?5$s=z^N92IKzPt46UuD zgAJgZrk4eJ6ufYK3Nu`kxCE>&;mF|tKs(S1Obh9D33emo(y{{Ho(HE^%D)yRwdzBa ztNu?WC=A@er2bR7ncAu=&g zuYYzu<@|uWz|Y(;Pf@5wtsllgOdz>MdDV*leScN}Q2hHoFL=j}!Mr0i>9~OLCI?-U zx=wia!O8uE;{`L>o(?_21|80f&rHqCYGz!-R-5`2WWtC0o>tvSCpPrIF}z%k+zky1 z@z+G}j-1_L3z?TNw!Q)BsnY*t0Zs&#C#~+z! zmgHCx9`RVn2B?J($!e6%64Fq~Zq4gY@F~qifzEOPr`VdxRR8w>#pcWXbl5MP|E_n- z)z|J&dzWh`x_$TMLxZr~gsJA%aa@skZ|AE!HL|`~JtH*EU1>KjPKZApfo7+RtM^w0 z<4@dUc$(7`bTv|`ayffGZnnid{mZmM7_tyFyhdG5YC=zU&M@;kcZv%SkakQLqRTO$ z-E42I!4Wq@WSIL&ZlLQV7ishbX=3j$Qg5hq-9K3=__fN&wI8RYbjcvBUAesXeCqw%EPML}0p$ml$gPt+8s2XQv#yvw+n{R31 z(kG5%F$Q5Eb6Y@)q*V;i`>sK7em-y3c(DIv)xi%C5D;?$EfLZ>C}IXG5R)qCQ8u|T zvN*#(pBs4#` zT3!h)nP`Lz+_@Nmfrbn@nHI|~M%g`4gOiP%FpxpTDqw$?De4f+p{a|=9|@xAd;|TY zkXnGD$ifgJt7Q820qIc%UC3;1YRyxFV6u8YveE_P^KT=smA-P4A!L0*wx^;=o&Rgu z@wBGk4vDS6zxqnYDt~X*w=T^-x~NitDDkS+-MyK#yVdd|PMo=ZiFDk|+H-CORsh@T zf_2OeGCTik<{|#3rSDyBrykW$%ks_m-pXIZ!&t0sKT3z?Gf=e;WH_1y3gp7=VBJ3(VlMrjjs2U~E01eb9qT{LgESK9nO5cT-~;=}fAqI?Rn_*=wwyap ze)A-ajNVJ-Cp;t@f0JDB7&^^#hpeZ>9rf9sPFKqXq*3Lu_r$jfnp z;2YNXa;Az|$vC~~x8S_h+1U7fg{G8h+OC2u|Jxqfg7fbs1SWvdiL`OJz!F`3{>+_r z%+d)>^+2=uJ17(4{w($_lIurs=$IvvmQ#?p9II8+^iEjNp5lMJ+NdWw3Z3RY(-L?} zk@veIZD*84)}~z*#fEaMvTt_tt3Dbt!7f|nN#Z=_RKWKPqQUX~xxVmwwP8f{#IX3& z{1wwZhHBdVfy*S%AHURUxAnK%ChB~6;ZAawj6cn;o2}7@C00GRN_XiK7Y9efykJQq z2Y>B&+u#J;K^sul(vFSh5tu)EGLrbG6JA0uPvB(~o(!jV;;S)|##PESf-nN(J$$y0 z3|F=G2p%4j+iW-b-znui#QJ&SL~oYRKexwH{Q6zdmdoqa(=-_ST9qjF>kDD2 zT)JxU#}}!ut4+LlHMW>p@R+@Fy?MBQZr~T`-0t*^kJ|(&dO_IBcwvRLUWSj5uvR!W zoVgo`gL-b`Y-0SRQO$nfpvrSSA&Dv+E18MmDX|2*ulmT>hyGXb1{GInvhhz>loL|W z52QurM}-Ci(WVK@)|U3c!L|t$G>x$?G+d3QBD1|Mk0Xcg<`lmDt!Q?c@ zzWMt7fy8c==c|Di>xSzICk8o{RpvPZ+nXC;#^^tEt2SR>-zyhADzDOWRrMoHbZ1Xa z57F+@iV_?U@tvaDYyP2GwTs?%S@^-nEDK7w!5^+S_fBjckKx#`VlA7ea=j|uZyJ~o zanlt_st&czS$EP35-liF)sf4zJJK@$x%zE0zVUD+r_eM%*lb`5Hz-(cB#~0BHT%7& zgF(*S>}*w6Iprib*VT_sY057aZR3^;IwqTqx9^aX3K1QfX=~+XJyUw1%t0=NeU#B} z7-?oZI=GrwC3P6#*gq6xU zk>dJM^|b*pF~P5$C;G~JVj{X-`KJfX%HixM>ewdX6nte{zssK+6Dsn5CGpkRYK6b3i;#_`Qs3=%SN)LNl z?rAWjWz1yLvO3nwo;irbef7;)b5pAvuO2S7f^vz?xOBx3aT6bgkXA;SIX%% zn%Oz#qBOz+e_*=%h_f_~Zjhx|aaRcWr&#KBnS z+qRJM6Cw?{V*|R&Ms(#cc8ZT$S*j`#mok zH18-J8=JlTt$EFv*W7w;h>x>h$wkpg(7qT(9qu@S4@A=&9jE0iL3ntmU%tKe>zVlEqb zI;#YS-(t0_s-FJ_Q~ zyfbN?Bz`$c)#!w(HGqp1<4BY~PTF7F^~3nFh^~A4Z=H(WDuHATzUyYOWZk9PJ!8m^z{h7(e=}3OJ&vh zIW4-|b4f|me-g)6K2$GWeR{1=LKoeRO_@P&SFXX49Ig3;SM6H?V#VPh5rxH)>B2Xz zo{t<~T_1{Wkqe!1k=*GE!#&x<@x!#%ecQvFq77VLcWRuZYnd#ssu}Bc!rVGttK-`_ z%_CZ#wM}E)L`LP|5>A5W4D0(<0@(MqL6AmmUGGLW1PdrGjbQdXRzFrborNYW{*HvY`F3O#}hE00dpF&>Dch)pK98UgY%zppH z^_Q*ocQi}6?-`M-sjR9v)TTMohiyOmRLP|)+&^cYS!nZot}7kF*~|#nc&Z~^N$6gF zJlDE_mDNe&ljI-BgZN%$b-C8kGkgc*N!8z9eb0#1<)%po^UiOu2aV??wA{<$=Hbcw zu-P*bV50Zv<(bu(^G~jqe{bg(B>;AXN$6}Hq~q-rsNXNo4%kebf5Mbnm)_7fBKCE+ zzm00ukT-JUTV{D`s#S3aAq!^k^z!iFqNSrC4^Q&=xNdtapEQ)_Y%$uFkC@Urt>_9( zejNYqcX6LS3sR6x)J`%ncQx1ADfhgcDKruJX%^DAbp@3q(YP*BoN1+DO4&!+GC62v6{S2yx2ZSVhrdkX$NXtf#JWtbD0=;h z{i}PY=?NnwCIumu@o6KfcNXG=6qdW^`N)4;BvdxT7;4w z;uC~|dx|uzvt;-V9G+_jnrYc1WA@AaI+yw4mU_qk>4O)HnH+C>_$deDUT`qU-)Xw@ zSaA%8#ZLCb*>&~nS6}6~h6V8G?yaJqMuhZ@|C3O_(%ZF+d$L%Wa$)tm-JG_W$d~32 z>Z(=$0HZ^?>T7>uZ<G5rw4y>Ty_p@599pgm*I72BxPp&tl~Q|NLg%=-7m=} z{rs-66h-eQvx^e%qE*cco8>|e%x!-Y4@$j(HuOLpGPvLA?d;; zdv6`+V!IkGv-?y6xGYUXcU&Z34Y+P1krrcsA!ORwen7r+q8CVBnAMXA=d+Eh&A{0E zs=S#nd-yob9XZ(ngCL?%5>b-z@s))U`9sWRr;4b~}igS^+(e?(EloG=zpM%G(%=62eL zTw*1k$=XdYzxUcdZ4s1V+FeEa35I8+dEha*tL_Z`1lK1r-9u}Qwz!DPP|qPU)aNNKwA)`rE1g=UR+4v zP=GYKW>xp*w>*wC-Q(Kk`Vi9cleCfT7mDlqt$c?IWf?`f69Th)bYlV>CK4KtM0PRc zBYt*vleHfwA|o~qhC@1+b4MPzUcomW1VRWCl4J4z9k1sEaQgcN5Z!A7G(DkvoAD4Nxp z3``xHn||c;_M_t7e^P28&;B7PNhp5hVDeKhqr0BdWQDE(i~Hs&gUH6tvNPS#;bAqw zvUK&mtPei7&82$BgHI~;gzhkx-i%D#5ZryFC>J+oO8U|YMNbVA0QKnZSZzt#u#HYo zk+xb&xu*Xx(Lq~oW1x$tL)U?;^n03b(K}IM3+EgQ@KLX>O%JUCz@r7|A-zK zb3-<7!3yZlEu4E|$8};0bbzb2sh;$&b}abx=F3gtoyNlrKczDV-e2*F`x=!lg`DLp z1=)E*_ZHk-4OY8~_I_)+WAqq@J&*64O!4Earsm(tdVRD8n_0#@Q#;{rnHf7%R8-rd z(~-F!eL4fYac^00p5{M8p>D!Ju9>g+)W;|*r(H!+x~+pboN3T>Kdt)XGBqfOJP-H| zlitz{)sXcNg#(Am5*H56Dcg1`n`lgsm0Jp=7}JsNiIARxN;7*|w%Z6{_3N_s*gNJ? zkfHhvG!q?%A)~`$&!gh(yz)7MXVP?3PX-E8AMKqq%I#F|_AZVH>2;@cHe&WqOZpuf zexB_QevI{gC#?A?chDzf#DW8sr}K2pv?%fBt9nbP?GmuXpEy>JNL)-v&Jz~MKK(^=;>(df`bArR4fbhdlv zB&oQ635keb%tw|nVrPa`MeDTBIzQycPvk1-3fmvvyLofU_N1V;y16rI-x<1&?2JsD zI($;Es7$P}YjF;V3ZIm9JSn*0j!y50oaH*Re_T$O_-DRY{>ino1J}7FrQ*j6)nWqK zaTCIf^KHL&-c4P8CiDMr_11AwZe9QIC<>w|2ui4g(nupM3?M4t5Q20!ih!gv2zV4h zknT{rr8}fX8c7N14(YDnx_qAZ_r9N(KkjqxGc(uBwXe0;UVH6t)SJ3J4ZH8hBj3D2 zg}THS49%y4;}+rNZO1ObrvW!VOVQ3}Z4Y?}=JA)*q}Do~jWXlMz1F1D>?zgG%k#wy zQ8Gp>5{pvTd`(TZ7))tz>_PAEyALfis4Ea*J_|)m;;muo;l; zfT(dR>lZZ($uoP~xSFDA*CA~5TWQJh{WsM$JHI0alqJ06fc z3sP|VTx8<3WGcUnVG4>pwd&~~lu~8S?76v>{z}&N@K8Nc*brA`yvgK+1k#bCG4~JC4zDc zjtrG2IlM@-Bcm)InD)E4u*|2tzbfD_#KdoWH+&o8g3_8 zWmv3xotOBN)Jt^}j#m#oT<2MjMh=i6TCg>J1~Bs^VSe33UuyFa2lN>E=s|8@$E&?} zSA^b7RY9izjdn2{DXTg7`Mb!2HpRsLWcFyezj(%gd!E)@>8y6I3IAlsElGxs=Z|B=w?%+_r1~kI5}$h^&1!DD>BU_6GqjRrEJuLVZ%QF zyUD|O#w`1_kOrqxUHJsT-{t9i%k2#Y7`grSD2iWm=H$_MKR{J})&3HSX4j5@vnJ!5 zS6isMNH|JQ@|@FBUn*b@LP>xL!uxY?0cQ>KV!X>7k7-DB&|?P!KINk%Fc| zTU6CcD`|R8zo;;yXo;~9pn-*C`BJqtcfMk?aB%QPHk%cD=&oK_E6YABIsZk&@mqal zYaYt5W-k1i?^@ieaaA05F_7G1&*;(hm{B}Aq2`SUTgazlZ{+0?WsyFt53l%?-Or=0 zFnk-OWQ``bbajKKz2v;Hasd0l>!IK3S)b#!kUif5Uah0HZk5MR9qI;OtHHv2Vvwd9 z)o5WMNJjR8IE4y0+HM?f+YBI&aJ-e+%j}6h_MITzcgSB*gbq3PS=CqGfyC zCcOThKHnXp;;&ttdSeRJJwz$8b9Or;n^vdpFF0QPU@*M7Q>aee5Ute=WvxN_Tbi#f z@#MWcPZ?im#>s5E>OYGUF=W%!#;}v5?vZIOw~fWIXS6SO_Yw8amv;8xjg$5cp6(P? zpHvj%svWkAGt#p++IIxMve%g#H=;q+J%p_pN?^{Ae;|Bk5Be{M9OE9cFm|%!Pa@4UOvl=X2qxz*(OTl(O-2VP@aZ!|I4?dE0mi*Lq%@*DU;xGjFl%zH9 zP@mP7S)MEnWd|zDGTsV0F>4_u z(@(d~_!y_(+TPCEo?nZKIkIwjx)X-?p{-^kI2m1O;n1|i7DK}t`>NyH%U2(l{4|$$ z()LW`>plmh5pzNRtq;Z)=gcV;si@rT?IgOW6PV0{ruf-E4i{RMtWgYF9kNrIFK6Cb zUF@<+}v^H=E8|6%SW8zQf~dJB)_(`sc8}km8DLTHCH;gtQ+|%2s@(+o^*}m#Rk32pW_%i%M{s4yF;z<)_1OJ!$C!!2trnjp{C#h zN?>WXbik~$o!jbG<}&P!d@N55bO)@)7?)S6d#TTQ6Hfy@+?#?VyVAx5pYkj%+-uv( z!8RA|HTCT*Xeg!#kA=H9gBKljKTd5$? z_5trS(tap3j1HUDIn@k|FEx~Bn~FIxahhN{{5J_NNN3P> zb}wfLPr3S01qM7DcQwLLAI}M%Y=s!^j;nd>b(@;XRVp7C?eG>*=Q~fRk`2x~Ep=Z! z;*H5`iGLx;A3ki|_G!BFZNGWTLle=+x#ob(f{?Z#DM@Afh=oND>RxCPq~x8AycrmT zKoqRrGf&&DW_RuMW9CcIu}iF7u8Bv~mj2!c90GONTaB#s!TU?U5yO#Xt^N zA+(^eI~eSA-R+HRPIX)VfHJRosZG~x_udEMtsGfZY*n^snGpb9gOdSs#7sJU z3uhe{dct*2G1|hkF}1%nbWg=YW%ebrl)Ptksi^vq&We@yiru&Q<}fbp;>IDinYPKa z<+!f8sAR}~OD3ZlXvRMl+Wi%0=;qY+F{h1Lqh<|3&D{Hcf2F?FvESHPW&1TQ5}+KH z|JYgS(StS8Wjr~$?YD#pT@**PX%^Q#jx-C=mL)d&FU~eID4b_(dA3AbP41zq@NyvP zU}3r!l>P)8ayWJJ=&+h2!Om_@uYzOTJ%g-2EQC6@Sa%eJ8$tN5^1;K0TBkoyiIT{E zHTR7{>78fJ^``gk0?DqkzBpm@L8W3pi4b%dxCdsW_m-zg9PZ8Drp_H~egC{4R_(*= zSGD_81p~v(jqt3B&n!1)`bt)kluk{fEZt&Z?7t7LMXl8N`cx1mn`}Mcm0ach&!j`D z>5Zmpu?UaZzt)a$@ih&T#|5WWr1B)B*`skNwncnu=Kg`uN_KfZeuqv4O%f7F*MGl8 zoI{nRj{dRfQ4h3(gs$z|??Y+r^;a`6V6nq5bA`@-wkaay@c-$U^br+@&@TR`BfoH( zc4d5)%}u3?pGq)~M}6$SL5@nju5DzqJ1;Vp@P|JWI-2434qXv%V+W_6B{`HMy?ttR zVcvuF{twLs&H5r!eCjOHVQBVb0qAPbp9JL^^~5z63|5|;LwN;8iJ(w}0{NP9726b| za?w16G9G2`D6L1srDPJS`Q!8V3ub>*lWmt%`H_^U`YNoHP9uGWi`!ugOTN~syyP1ot5Eu??XjBO?J zp5=G*_1}LwMRxXgb};qy55#bZ>q$0pfq)pPRALq3`07Nb2+1OdMr1LS)xEd;tzBjG zK%kmIxm#WMocqfUJcVCJBPV%GO~Ndld9Li9M~yy(c7khto}Z~uv8G%z7bRw&^=0k= zn`%s@fDCuk3pxYKd#@(i`;xIU39=4zv35_&b$Ntxy-a@?39H=YnsL@H&)3A>5#V_a zh_VSRA2tI5M~>0;bmS=7Uye0qYz){>*gJ|S&*j)*HpV!mK)a|C+H0Ph0>vbWO&L!s zFe9skD5BR$+~1sp)0@Rs+5OQnZs^sD)d`ftdwhMm7%k&x?fVlY_$-DI*IStQK_aLz zeSnyxUt)aQCau~@tL?G-S5Qaw3W^N*P)h963elp!#KdiPZT`2_k2J*<1m*sQhvbG* zh^~CZxe(DSd`?3qYO=x71BK$?Y<-`X|B+^bW5A#z_fBQ1j&kw)KMLB_$pMtso}QKY zNiu^~KMuZH(h)xgWr)Y$crR9uZ9fKW#2=C{f(p;$B9zNFKUdN{&dN-a-Pfv4mh(6X zdRBgL{(LU%Gj(ff$HInuK%0D!)1n@ZZW|tw8snlIy*_+6hq_ssU#P)Wcn{gsAYHZp zx`axbY>P5AGA;TVe@iuYS!q%9M&CE6SnS{;77>$r@tAgawX-0AY0Mm6;+QnyP#{OX# zWp0^iip=`fb9Q=->gjn@9S72jnIM5dTRf|2Z*QzavU;y!U^R`jGgg>%&dq{5iq-kY ziB_Jxyn?{N+u7!a2m8WrQqNygz$<- zOojJtRNWocZUV4x0VA^DWI(PjgPvc;;3WCtRVzpD!Mmt;8~^cFiE~tM2LmMuVJtdP z23P}c4*K2m_E3E^a6y=UQ3V>s}5Ysk+tx zzN{7+pgTIK4-d&RN`y%bqLVvnTZjNfW%lwV;;7ykCmgY}CvJ9I#tHnyYjl1wjmJdN z>FPG!x_qhtq)9*&KT*|jN&!+{K~3`-blcXNK$OsAd%qDu!TDMYK7Vk?EZ_@6k*J42 zZ4ZReCUs03H2>TBmvj{a9pv5ENlKU_p&%l`hDz%DOf zBcD^{3ZgFH!DxHZ9y^Cj43@q7zBO$+7|4Z#Iz}#y{E2x&>kuW-Y&EWN#HNFaI^L$( zRmw)8&XBGH@<&8N=W;&4D#%lBqrr5Tkn50M4&6vTU~|Ydmlz&G-ata@S-%m5tC`mz z6(rSIs+oD7^Ngn*_4AH<4QXm^S3~2B`Q-ebfJ`BDb)|bM?3Zu&HC0{1GoIohs6}?{ zZ{BC{>kT&0He67Y$LtH|Giwv>Xpd<6J!4NQ1gOLtNh8ho1vBo{7qseM0)MP_D z)eE1I@sg;03#tjy(($$F>1iPl@S}TqdVByLFD?5gKYxCNaOvyrP8=8*cp10{DBdif zsRko7Bhb*5JxJvl=fYyK_JD7f?kO;C<31fxgx7#&V+Ia+pPm$Y1aciTx3SFs{*6G) z``{m?cQzcgfD9n0D=gS)W1SQk7qcUwJ1aYi=!!$*tiP`>IW;wvxfTsnt$!NsO2bJl zQyXPKVoVAOx-Jb4b8VpxcTWnVS0e`wvb!p7>Q;byXOlsGY#|>*tvrdZ573l$kl*_C zt2j7k368KV?=Z^6exU=oPR?cXoU+R=Yg6G=Uf@F)2?ps&(?|omq6g`k16#sBfuEOm z(Zb3lCeDX~oLm9?s(}l##oz+Jp`x-9%=Q?iDfs<>kfs4mQa7BCwaBETBw#&+hsu0Q zK6}dtR0J@9d)nObYv$dcVW3Fr*w~nVLX!d4AG=;zrOt7X@rG{Z@a*>`Bfzgw@au<6 zU-%Le_6A{U!gri(sj;R81Y84w=^=EXs4De-9i9z?3$d>coGBEU53(Pbs>JldD8X_v zgdeos^{T{Bqjm&r;efkqKT-FNdG)<92uC9BSx1mYTJ?^?B5n0Hg#*C~`ntvSf7bsnw^3aRK@Ox8=`Nl0a;+#R#9U zII&+-(VIz$BL>6~@UTVRUD06_uKmi&YS8QAm6ZfgKz$a7J}pb`lO3G7jldv}n%PMG zhCFV=6(A%;htIWRFC1YuxTg+PWT4IstuWVG+ma5iJHJAc;PRe?_N2|N9%$za#? zK2@MO5G0g>JA0juH?Ta!B3DRRy8+RC!&eemKFMInJ{Z5MlnFsl*^v*J^_L?h7PqLW zyN1W;i1ERN5nXsDd}8I|;!DVcXc>FGGv~nx?Hqw!0q<7Z^Vi#}?L51U4CHlv>7#;F!3& zYSkY0=OIq-h+^i?AX?)NFVK`uI$495T^%ZX3S3F#hz=xgqq75j9&Y}mb$DGm?q2!r zS2~dX5K^JE%%3-qC||m|j@C?$!t*>S!yfJ|+k@9C!rcK$%iZO;#vALKMn|p+X|vV^ z9r;vWqen%vL4EpYceNM5qi_nv4sy6Rw}*t>kIUlfR##T~`c-vv)L2c>LOWpM$V3&m z3}V*oWmntg!0)VJBnv1G%LpwPg73-Gr#o8-XAhG^3StGU>*YeNfNlot4P+1yQ#gdg zjvOz+XaFB=rLk+q!O_S_67iG+pnont^7bHXkiVz8}1JdkAr9MEQ(7?UIDvt7>J{8JZ}N8ES+&X51_w8fzFai&k@ge z_jbCI7$;P3VQ`zOuABXnBcjhw0BD>7CkB6P+So3x8EmheovsBdwj}jusg8J%!OOq_ zUCyi335I=5Hi%3KD*k8oAhV65Rtte}hDN7^NYSNM<$nG8;}qyCmAnvuu;^HfmOV!d z>JR`dLXQg!9Kp|O2{eXf@D^rdNQBf6b#aX75Say##}c#s4%mQE<7UTv8Pf>6>#$~Ht7>a zfnjt}RVoq28&gfYwRpI=1)`S9uSL{6YK>ZmkLFFg;^Q_omVa?D@BAD@SjZr)ZZ?>! zO%Z5>P;7UX3&SdbZ(~`SEm;JIRHOfkgM?-GoZ}~KnI0<@1rAGt%%>X#g(`P@-sWWF zc8+yuf#Jt)Eh7U1op#l`0!z_Nx6_(a_ly5es));5~#>W z?93wy@E$s5F(IcFEo(y(mUH}I)S#TDvIvaO@6=cSfVl`zd-GsS5qm)h>5fBk ziF-jzuby`Uk@0AJfb?&O`js!u2KoL&l3?@K&ZJ34{A;l{?WV8fN|Q?3eOovtPVPIr zRgS@6%z&kc#PQ#<>1!_hagGmj5n6p}YIFQuBav&Qeob}|-UxpYCi-p#ElkRQRi8(~ zq^|C@&9lu3W1?!Be)6P&*us*>xow15nkXyZM0#)gKAI?7XTiYu3h)A&<4vo%Uw>946dNYsJb;5*2D$g&Jt z6kT$zcZBSI%C(O|a-mq(CmDxHarP&KmCJ-~pRi92^=*J|jB6SeBM z0E};g(QJ|6FEcxtqwb-h3}6N>fzHV8N*K&6Bf4+&h>sMQn5r~)!33}aK6e&)y+GwQ zQfj3N99|@QXXNE|#Xn|BAr&ndevfEsmzEC3tJ{L_C1T@RqH9%*vzR^PI#8RVma?+y z8LF|B1)p%wDNZa5^MsY%K~NP4m2u#y16c)e*UGI}Vu5`6yYN~{U$kLJ3O0;=T<(Lu z2O*9n*KDD&%$;>oqz*@pe1WA6>#T9RM!p^J;Nd|~pbH1eqgHUJ_dOBIQEDZ{=Bp8* z6+g-$aqtjxgWz2?GQO~Ctp2IwpSFU^qmV&{ApuS5hd8jnKEimw=1J0XM9E;+VH3<_ zqBo#Z=0cX@cga;t~ikJ4Lwe?cg$Jy)i4k-k-@K{ zMgycWN`4H>u6_MLRbaXYpQ4?%hpMn;KbDW5f23u!C1F*KHJrCRHs|X1;JTsUHWl^C zii)DQYh&3SpaU^DGOGoi^2k~O+pO8wx*%@BXMA@_%R;FJ+1KqOa}X6OT#1#bL43qu z1v|?{%o~7;4KC9vQ0X+^ONPJ@eETbioxQc{^$<7W`5+=90wfbv5R!qr@9*gewjYdz zqUjHKU;yd04-^29H4h9#7e3w3{aF?SejT08r^u5nFLxTIY(N(MEvT;$+aK7zRUB`& z@d8`l-xkT*umFM)Nk4E~i;ya-Sn*ZcydgH=B`hw2(=vIbu7iZ@AvPnikZuw8oDYQ5 zDlpw)_9M_BVAYyI&Z0<|c1^f%ewD_2atHKLjEeMukE>DRdJrmU{@_+W%%T4+UBTO^ zxU|$9oPCt2LS%GJe{#dTfVp#{NX!=2Qt)u<1ELOm{gC-~QE{HxcX-T@5n*as zHJcMsJxqrroAfmB6=WOrX_oC_qz`9A=&!P(7krMOzTNjJJvhxgFvjgNf*)~lZPeIe zM2E>-#LpF5O3XPcg_gg&p?-x=(~mE0Q1#GU#`k{qs>+vE%7L29QNA?9u&qn?YeJUU z0}X}S;hnFNHk*Q03w5*ASXI`ovv(JPwb`+M05hyL;6BruNFwomRo$A@E_r(&uO;R) z5RjfZ>o$2(iqWeJKSP41Q2U+hLfQnb!}NJil>YY#4lRy-$~FD72@Pe$${O)!28|-; z|BHNW@EoHqle=_ztZi=k);Y2LFDv4YxqhQiq2Gc}@Z4^q64kaTIj_QWx`PZ#?KrFH7QxZNOwH?>qyX{?wPAYd!v1eHlBO>Z8Y{T-%{N}Et13s?x!pJf(`Y;r#Zad|=KBe>KD7Et-s`KxOSfIKzKS}V*t%Sb zU~Gu=XeQZ~sP!9M#)SJs6r5cD>V12ahafxAPHysrL++MWOv>2D`b>ry>9^;fr+F6cW9~{pdj=)Z zeyi{Mvcds5&H3J>4r^RMljsQ{ZNb+(+6Sd(p#i(iu22Pp(gF84t0H=Y4K+5w z#lC+T=T4o7YmLmK>YEIhog1kI;oim_VTM0z9qIrsRt) zC>R7|>vWE{g8kTT)hNG1wmbG0BR`y81dsy>_X8GG>LcOjH-$#Wt%(Ic~Jik?2y5k-= zE}vfNmwu)0wd)goArokNZBE^Oi)$xF|GpZU4AAd*2Ro)1GH+sB39;GtJGNv4Hb?3u z=1+8I(fZl7oZ%FgXhoOPF9eI+m7G4G_##M(?tz6=Wb3PYAxmS)YV{1P2@T&vNj!zk z&|j_wTK}+xHxwxqpR2vRX-G;CS!FuKo0zw$qA+rYWPF)v9Q0GB?JvEdNYLIt$Kx`g z`Jlja&uiPl?n~==+x2)G6$Q~Wab`RaCZltixP;3pR(5dE+|-qCnCUtgynN@5`^o4b zuO+JU>s7H7fKL0@Z9CGC_uz3dc%)L8MYYYCKhia(LKg`#)TW)g5!m(M*vlvo=U8BW z%dlOX9gj#d1n-fKy9!0*K?uG@70DVUN$Yjo)FQzmeiTbfphW<+;Vx~k$QuH0b<}~; z^6x)pJmg|Ns&@zDYgit#{F>_?Lowl6;Icr&$p85gD)yc5gf4;emrlYpyh9d`tp*nY z&vLUz6O2gA04MJ5|1VJ1Pb{^JRG-a1`4i^Su6P!|cMi3$nd?y1y;~jWo;YgQ13GY~ zP`-hER3Y>}s;^zVwz(vl)`KPRllJi10iu!H_!2v-X!N(CB1nhH$V^ z0!`OZdh8sBS7E-1eO=(0cuMCY!ESa{z8hSi)>AFsZpChcPmRs52qdWW=x%YKF5#g| z_uK<0Q3~Y4&igl8sLH%RdPD(#cAFpGiYomzSa%=Z`WnaR74)7=%ks6IzW}ZDMRb@`8fH1oQ}MeA;dxV7qma%QI5%a$GU`lu z?ecma_}S`wK-JMBEz7~XmW*e>j4vwI)1A9UtoogsDYxde>8*Q5w`dyEh zhglznB$(hpu;=?T6;9Z_BJ^vh-QGiUb0s0d#o}atZ2eg~qTm8wO209kn5BsS88)7< zn|0FGGK7CD{&(B5`(SIHmy1jPEVkydXUIa@W>!v)vORBUqx&RwuQ0;VH0fTfRPs$1 zf9T6He=e2wUXUTQl%>L84Y=|ip)RW|zWYzwyw~w$Z-8s`RaezQRsntELKezH_+MWT z#24b}h!@hT*skE?M|xq)zT92-9D+|Nc9_qiJ{~4YP4vM1tUbE#)JZ!$F(R<$^7;TQ z*`T1IQVpfTO_98DbRI*o8^dMigNcWbbW|~peVvQsEZV6pl#KU^$`Sd-_ zBnZM-vj#2hyWJ#m-BvP*z+b<`*aEv7qe%BS2ZNqG`PQ3Izv@;~sk@>=f>d4IBb<+;#wFWQot@x(D$ z5Jwfa|I+yoJW_@{v|)W|jvRGbw{27pI`T%_%(V2}Hr}@Ky6_?MT7aP zYJYyrN$4W>$@id@jdLNmu?$=m>&pZ7+)gxc9AmD>ilmXWQaF@of=jZ(0SQq9uo4(I z#{}xOp64-gkw37HV?Jc2A(z^9Y$U|LgKq!Jl|%I>mxr0$yQ_uLT#(X&Xo)tRT+G;} zQWTT5CUdp1?d97)4@+)ituMPNTN_(T!0R6|=KR%9(8fCDm@J;!W^$ExQoE6SA0>>V ziWt1?SzD^#X*+wj9>rh7HOXo`>TSHpbD$;nSofx-D?`08l=M0u6gUr=eV(i3qBZkq z^Eiz&Wmi647X0vX=Tf3gf-Jg3)3Q-XX4H~u#7Agj$+5gsUqj@){!_HE`@__*o2QQo z@ZRYyJ!qHV?NRw4n}%{s>q&T|G;)9V>nJA2@Q{V(&O+L#?-fqSKA1KR3Uei4PZ`43 z6d0Va>8AOP&s$Ny-AP@t4RqG#^6%TTLT-DXm|!z6AV-}QjD6yG!JvbRG5=J4R6na*6EiKcI1A;Oo(M#P+|?zom)TPopIGhDM-%o=^9dr{znd#eXlLO*?L3Tm8* zNCBF+N0Cjj!jw3#XwXWyr24nSK3s$dvQ10MJ8#32a*~q3T{wD)KUn12W`oLXYW(=} zrm_&9Qc0?@*i|EL3(r{--1-7bT2ha<8J1gDZBNVmi#yIgpoT{$4GV#i zz5QaT=C;xtW!I{?!6xsAvo9+fUs}eAaNp_T{u;=q2SDI~5GBd<#hwF;?wL~YJg+sO9rFIR|I#5)6B{ymTOj)3 zmrgP(QFrDm$Ba@q1hrS={|Kb^j#tT9x{Qj}yu^kqWHDg>g{236Pk`;V(rGr1&+Qf} za_qKvktR0Q)fEXz387rAJba0RAl=`1d|^yz9J9CGs_*miTIny%KDBgzop7w;e#l%$ zN#~;Q04?f1hZQffzvef-G`hHnBmTT)ub3LQ+cNymEB+Jm!WL}1!?i1JHzz!{mHuKE zngoeNpXcGcks%kQ(Pv7EF}7ch469%lkG@Rc^PFh-O6{FO#bZTkamTfDZ*+-b?{Z{?j3LN^j)N~YzdSeUEB{NOHf4@+lHx~)diZf?l0b&6DD)JsV92KY-NzM zEl4EyusQ6ppi;cwi6&ZiDXB|q$i$7GW7SXN@gL^(WH zAdv?0U;31jptu~etN^ttlX?oVvimJbO>8&|Ix%jPh&vINrD0k85|3&sn$Rt*)IMaj ziu91B&J9xHo!+)BnpmmbL{|6ss29FDFRQa}ZW0ltvVT29w~ZPg`PQi;O0{)+)^4TmB}&^ zx$qLD{j+=_OGY^GMmAqX?4I$LrE^V52{K$c7W@bMI&t?e#pdRH@ApUy7FnnAUg+sE z#^0jhetnhmOQ+wShZhW=nXX-eN z_@oUuA4@CR+7@PJow!v#Mqk`l?OR3>Jq)uHxZh9VxMP7!d7bE?xRugzH{t%>X2s6y zGkZ5D$TUk{{{o5A2mgwG`YX;Z#Eqh;$oBD!ITV-EXBu=U<0av2%-bReL^{`0D$dPg#!lxKs+ z&6`Gjp*(r9-ien?J2V}f*wMG~OvEu?A!Tqd%1ZGZPb6RBl|#>gmaSi^%Iw$t1~*Xp zlIWW&TT!2!*RQq2Ka~2tuatsUl1h-whz;os{q32^=`>NVH$c6R1=Rw7)F@xC{8u8a z(#?zPL(}sYJ|`IR=WFS>D&3C~RO{$hizdIXM~uGuz^jbjlD_Mi?ySfmOQIuWt2l^h z#az8+oyS@@~yd?m@ri(wjs4!#+1%u zFLN^$GJ;M^g7+^8A!c;=mB|}@;t>(Emp4(-HLYl<25xLC{Se3-oaei~GszY#lAg|a z&E(|a7xrYWrpp>4i8kb%$v*Z(nu~ul>IZaTDMkJxclO>$uRMCyp6N*+&OC0_;{wxL zI;@H0+vom^Fy1~K4NugamRPHD zU`HJv!UUfLw?OBbf$Ya~o(CB66-P?%LGQPREU+$>JN#J|`a1rzAs@MUB>OmAy3_h2UU(0gIZy$07c)ZEKQK8sIhu_J+F(1!G!s9<5 z##6^_@y6sH$>UHlUJ^&RMW${?$CXVFRkipozfq$3m7%9IWkvtO>NXKuvz+e zXn(DR>QNMDB7u37ER|FmHlnjn?cMjyUa_WRHQ7(}y8aAB<=e`h?X_c!-$;>Ts$YL7UwF-B z&aTSw6HDnHLXZ7N(9Q>tLf)`y$TS}t)eVOBLALKL@id$-IVt9BVo2q=tmWshHYf)C zR?iFoX z3IDIbgfe;Wa?AGqCpNzf3#eAD>tD#f(So$lnx{TH(X@!{{ ziuG^rV}kPXuev-U5NO%%3R&C;(_~jVI^R3Z^H^a#!BZM@78^yC(BkOR#tN$>Y>KDT zB6SE|U2y82xtn=o0yzkbw;PTwh;bf#J>e1&O(bt$$>22E3&j%dkj)emqavH+y%o_- zOOoocR%eS@s25%d!|v#&SNE2>9=?;`E#sQlG$5M)@Xj!0KZBhdgYzbu8c)gHf5?~n zDCJLD-uc*K(=MvKN9&=~Bd+M?J9L(P=)ngUTBt6BP!Ce+ab8V);ZFH|pVu<2Z7q#2 zq2{s}^YQT55wB$;5uM9Jg{4wA_rvh-ipLs^1gYmR*fku5TI?Df%qj7iJ%_QijToPb z2P7@=#0T~hq>}E(a}P9+-9c!?^n(8P8$R4+@8E(&7ruTbl%VkPS)PnnpmV`s+Bqw+ zPU7h?EuZ7Y+i+-V6R*DUQla99tiB$SSiCHLKM)_2twdtDDZvyha*43k!!|nW;i8u! zAI)p8hwGPYhDKo(tdkVCZ1dLQqah0xF=pBuDYr4%qp78FwT;eu9dfZa+f(;_M%*kN9DbB70J5j@YSPwVV$fcz8~#F`n)Ntj&7T=XubhUf(W z_oqj0%D8UI42LW}6swlj>3OZ+YC6bvggj-qcdn|-XhF+6*bcBCc@2AUQgj9@EOad&j?44;ei-%G26c9q&*6!h$s+)ZD(#oUTejU1XrahS|&+4n0W zhtCeH!zp0i_zI5PbX2`LHe?ei0Br%d95GUY=yn*={oY*d%D%q78GG_~kEv(lCnxox z#SNx4?AlBF8|4mR;sw|=WJ^u?(6RfJMuYlEXuyx6x6UpuaFMz-P882=s0yjEfz*TR z>)!|UFI+o$G0O@n#%yeCIv?H<2d!{P<`;S+N6^M?q@Vr$&EC9GP;|l(LlaQlznMh6 zbdTwDG2s;4tQ)TKI|7=?nIQfI09Tw5yfx+Ec>KU>>|tI5zP}9I;sRltZ+>^Jg}HfQ z#5L=s(e&(YdY4h>nbxfL;czSkCz(tc$L|u9HdMb+dD&b`F5?opA*N4WbO1k5FBds^ zgm#0@he?+(*yD(P2*Gmfsp;$;S;mbo+e9(Fxbh&TbD1z#iTaBSYcOf3Ey`2XY})JH z@+F#dFYYly#cv-@n{_4l3$d~cuak5v3FN}R67K|!O_bT^%EaQJSl)?iynzPLoFnMj zR$cp1>c#1Y&9S|B_qm}2fj)7oQ6N4bTnu^GCTW#TCe(ofnz2TW`uX1vLOzUUlv{O;}HsH^woIy(YaWF{DiYgaZENd_`| zDPBY4TNGetlKt@uU1EirVZS^^AW+E5F4v{AnfV%}r%&@<3krzHy3g*dp*3B71yMEx zrSJ`d5;5=%%)X>b0YR&g!F%4a{KR4~<6qqJzH`G5CNX_fk>%&bS=+-haUtAKPYW0) zFtYn<*s%6nW^=DT%J>HTcz`P9H1kq|tC#)o;Wfc3NBl?F+Dk7@2(m zr&uj)__1IaYq57>>k^h5=MAAZS)}I-p+YoBw@L>?6E|&XNpH;ZF|?m{l--B8+KZ;^ zgnztt`=oaWsuk3X;~Ob&2v~9oD#|^JsJo+R+8xgtIO@k#&%Jl%BWm zisBB@OjDMuAEUq2?$0V8{}HZe=j_E!S}spJn{zKwfAu}RIbqA%{uCXiO~2gKCmBdR zcH8~quM2c8EOm|8G>nMK-T4Aev#Rvbi^=D1d=SS~cnI~H%|hDc`N!H((Xks1)0#|o zTH?ny8dj*%rtJ>Z6pis-vEETHlend|L@1^2dEU{x<}wq($qT2dOf-Mz?dBQ(1cRMh zE%BGR1f{2E>RQ^O_~|@am1G*EDI4qvE_v#G&6DVcjYQY7ki+tEDuZ)Xu9X%XOvutZ zL~&c!O{!?=L`2L49${9D$~wos+T!WmBN>4-W%c5)ny7iTrP@TpEhc_pLsKg?eB=e4 zi)-s=3PDSHS2`YC-h*3sBvalz3!r_N3isV=cxd{QLo*;oCy7g2 zMM$vd!Bk9ppChP$>7|17wiBg<-aZ?}WCUFxb%5&PG#-F32_r@CV>^5z7NrxkHs+=y z3XpDQ>ZP8J%5h@KRBFObnxT-#^aIgcBH~KE6mq1sjL+1p5G_LeI@y!QVVPHYNqF3! z*}cbaiAPzRo94*S)v#Dop)Z*mk`CAac(6|QIC>_-Xod3;>>n`7zJy-7qIF@fyMGrW zU*svx;+8NK;UZ+R6Zttx#A$!Snw>w8S=n+|_6yY(==h-~ICSW49TzDJ`%-Oj6=G5D zhwD!L3tZC(($q7is%mY$_vH4T@o8Oq{L6hO5sFfSy#hG~epdG?(2+u+s!Sz%>OogQ zX2W)cLEj|s?x^dd${|n36LCyejSD55Q=#6#f#ouw?FOOwP<8EMNTl7`gb9IrRjJQb z3!rK_51W(6Z6_tEb6$mTJp6tLxwc9UG*EiavHt7OsQA|c6lLe-0IZ(3k;6n1S?c$ znT;#)GO=mFvtN#59x$isZ<$lTgY%TZe>9aCY)l~Yjger@Plk3#={&J$N?aRpU-HL< zTj_~9Fvy;qo4o=L(!GkbT~gW_j|QR9Aaf(xC-B8kj7M$PF8=x6TQ7R2;A(Hq8^%st zF$jilnc|tEf_?PF-utgxalH~#{|1!WF)Hzr;y1j%2q+W&t~pJ-!=sZ15Tee9^E8c8 zyP;ou%*S3BI0Vjgu--N~fVa?G`Ui+T$G+}d@{EW&YqLVmJHSXj$}4<5zmwJ}!Y=Cg zE8_ujwZveIwB!Ze0|S{8T#6PdybD~DhH=j}MTaCd|L199o{3%%+%VA4#)F<1b*3G0 zb7*qcj3aAmBVxBvM~#scxFFc#4b7!#B96C(m#4D7DK6=AlNcf|D+s#FnEBlOHJ!FR z`IgS*&Wtj5qulj3>?5)D3)u&aSg*Szc#c+=ZR#p}H~8hP=!zEAQ$X6qZHsi7mm(L|6_B8j#(|zy84BR~kYzBO}J|Pm$vni2^Jw1HEguBb^6> zoYZ*;xVjr~RH5_1^MSaGWTYA?iJ=5?#VCjkgJ7>9Cg$Wxd6O5;&2uYFvUPGPYUbNtW>W3C7Wd z%C?z9UO_&idqajqN~Q;D`RbU@zw*pDGmzl(iJ@+8aQ}Fn>~Zxq064Fo`y_d<<|7Hb zg2K#2xZFoKe#F2A^ouT4oI%MyRP+t3ye|p5=@aswBNIf`RGtjW185pFNHvRJg&|tn z|DOM4f*|+2nY1H%cxy)FkfA`x;6@9Xtx#>#zpKoyyL@Y0+we9Dy&++=8MUPpIswy6AP=gxtA#PiK%4Ffu}S$tun&9$d4THYGM&SZ>yGZBHf ztj~pFEt;WeO>y@JpDuvm9txG`bN3waf8763LJGcAKdt>flq)7N;x=+A;ri(HOXlSb z{~5`PU0B`7HE4^I{k?s{)g~_Ckd77Iv7eo>u2!m z1yX6hDFt2RNIg;N@J3o6?w3QDYho3E+ks8b)nKB(-`pEM8_CxNZCjIFP3K8}N>ire zvdT*ds18FzL!A!>{s6;5@DhLqh704`_~Ul0Hs)p7)5md9>Vir!e6JlUKF*3Aw(f=e;2k#rE}cs27)g z<1zjH1hpvCtl<;FP5q+lHj7s;_yTVOh2kW`r@HYeZ&(j-01pttf*1ut4$yx4$6m;3 zGZ}(ktW5P$e&mohbL1-WgivGm%Drs>te`{Zj{M(5ZmIP;W@yH8691c)6RgA!-{8PO zxKAS?s_uRo=wmJP`RGvFpJ@RL<&~8$i%Of=9n{1fcpJ2tLoI9`J%;Q!@t?1xqKCtH zI_Swg->}u)0_CO6lby^@+yZ#08y_04Rn=K)y@@SWbUi!+X#AAj)Oed@Af3pOq6G3O z24dH*=TJWbUG5^p3KlP1LR9_TC`<)+!xm7-oWenk3El}Driqu3leXUE;gD>QlRXT| zxjwVOfm-J;9o{(Y#Xni6;0b0O-(QThEH8-Wbw$l=CsChB1^11PuGllZIoEP$|00iz zp8xAWk6)4JJ<(-R-_MSBFK0Ju`Q)AKSHZa-r<$f_3_`ik?$}#$Z?49N6H!9{h^((E z`4>?>@?zb{>Bi0B-@WTNVw0m99|iyHd2r=Ug7eT){vArp zQvS(o9_Lsr5Yfq2sISVvdr$op{CD`kod;fd^2Cj`1^_f;XH3InWpHb(h# zM%*n|FQasmuHv*qXEL2rs6Hc|qz-*qRwneQ{Ir>Nj>GGrD__P@0@dIL%XGE_@{ncU zU6`B#?+`?~m^ceBkM)@qBgjhl3^uX-+;bPrJ?-se8)#pVhuj4a1E|n6!ek_n+lu+n zk88b%!VOfaZ@-LrL(7A3#1PK#u6eic`w6C zWNu|(R>#&nocQ01>42Vr$uhYE5=G|wubrg*>9_7_^k~iPsY*+?Bqt}wJ6TKQeGYf8 zO7fN#DLM1vbKq`2UvCB&{NUudIg`9c=ZFmaC16@7_q7KJuT?2EG&CGe;Gxq2D-7VS z!OlSsp|5Kvu2n13qgzjT?tBI@s;6;uN z2uQMo)9tjwNkWfw@XGiD2EPIESHxcaPql*rxDLv*{izQkSp{fOsbFM5=!oH8X0vkg z161ntf}rfstCOg)=O>3LTZaqH>bqSG%}vI&EgMV@h;?{hNmp59ZuxdzTk;gInLLhG?JR6$Z$l&{EeZ6u<1zsV#Crhe3{dw-i zfPmj~x9t4Z?r|DlF6g0ZS#OFhOzHS52tS3&-qp|KZxtf%KGd{agHK(X6m5anD>If=Cd>nYJ8qRkF)+yO@ZH zD1RhCf4+xU>C$#tEe3>w&%lfkNTtMl5^c`PtH}g>!^q)oX{`mL``F71+EnrC64 z)vBYM^TgtHdXia=-PmUt_z9DR(s80O?FUS%`S|f#a&baozrrntii-3;d5wcEz^wtv&ry7gV|r_Z~CcjJxtucD#-D@WS!y(4`7oU=`*zi*WIM zYixY~?JT#m>3dbhe-N>+K__7XupLg#%S4_EZQ)F1Tb;swqH-nJGT?Wm0RYd$&29O$ zX{|Xzm`6k$q#|FrJn08B5`aBo%QR2|Qg0 zY>l4n9UaZ46n6N1M(NkIS>q0ZQxtg#uPbW1_DWSA9*cN%jpKN}MFNgUVz%=V^V@fG zZ*?_us6~~IS)*Pn`clo?v1hhLtpp|eZrI8&gk)xBB@Hm18JZS?7jeV0?wb`L^Sm>4qOZ#1^#44zHo6bI0|wC<#h=mgOrdNfx~V;bL= z(ap;KQxRcP4d?5Vkv}#Xai)ZjqW%|B7_LI+|4-mQ8^VvbD>Qwwy%=M@^Ett}_TrJt z;DgZZx4rbPqUHH~YqVPLqj^jN#`bFV7TwldbUPaf&G%p;+5O8({~_RZZ|dX3ii(O> z=RQ-Rn7oXE|H+`ailO2OzB82w??1!(fphDIcpy z2-R-86Wf~Ak~o!{pBD;2TB!E4Ys;8&e%H!BJ%29N(7O6~Sn_#ZSNQtD=v)tp)O)xy zz^sb57%2vQ+!BrhaM6_0A4VRa1fm@0*xEAfJ8m}v-P1QXkSjcWpl#kH*`ak)3W(w$ zAQa9gTsi&QE;Eaw2R`S=B1{aaGIB7NOi3U zZOiiu=g#%zfuZNsN5h+@sgYmS4`yWT16W(NSd{X>@i85?g%Ef zpN7~h$@=+#;;XOB4VG-|wP{Ie$yZ${sVc^J2rE#yCgC8S^M3QIF zSV6YNKhp3g68wbQAY@Y2abR=cdqE$k1<7i{p_qQ+*Z*X@<@4X1KqXB5eC^qfJIap_{!d-!9uD>P{c)%IcDgvH zPAVx)7h@#Kttpo#eLGS#QYe>1A#yJbkzBed*U6wvD9Rv2C<>)Im82;-0r1MdZ|+Tkqt$NGKmmo^hFdA;JUd=VlSza`~4?40Q?F;huzE zOu62dSmdTE%*#oX<7PLUo87@lEwZ-B)%xS)1~hh@2wjQ(BsA;pb03YF9j$WqsO-^^ zwHkj=t_h0HND~2%BBpZ1uL$`mejzdCEV%&6FIrS0$B_EAX=O_;s4GIBN=%bQ-U~#z z2VmGd88|3VxQmqwy7v<#7!U)NAS)9Z-{a!Yz41j^z)B5_jtnz68t+(qFo1+lB5YWplqTTRPPNQZz~+%nK>VHFcD5atvc^3 zh~KSGowov605?CXiC6m@Sz2np`-fs{SQ#d~_o>vEBUvDz8A=_cq< zbywyA6J~Jj4aXb(_8*<2TQn9=k`IiEc#vX$+HUi+n!OnmQvIITm%Pw2ih%||x zeW^{8NjW%lkA09li|k~t%8sLi{zFCu!i8XiWi+Sy8JiQ1|-lU{tcd#<4&L zTpgwh2WYm&&?(`+!l6*N!-uz%)Uklc`o!!eS_4?_F4D-!8<2c@glyGq0{)3?f5`s% zP_fJvhzatD_AL{*)-%Y6J7>EeI6xE_STYaS0iI z3cBAzJpismEXr;)x@0rq26X`W(UcA9!7KJznqXwDIb3L7I8t5c-ketMjiV|Ai+NXO z3nv2(hE|P@0Q4cbk$x8Sgx+$)xWVyKnZ_rX1p@De7cX|P?qkjcZdLHFFZ&Dbuz8Qe?_jyvnukkFb6Q{ga+Wd`2}RcoKo{4B|9lfj9PDd+Pq9TR{cj4pfwQ0pF5-IQ(eKW4!dFo6;!U+&+J4mI)iQYxlg@$>(&~%s4Z)3AHK~w&)aeN z&DUsLa;;~+LgNi5p}iUA3L>kS>YE$|p*%c^ZcvqfAHSXYxpyuoX+-+To>?wvT-$h8 z6E*?vX-CcyNZZP1qTeDDn*LUwDKU4xFk903(;r8{x4=Tl2D5S#5(Q79fua(<{k4V@ z=Anki^BZ*;;F?ll-(V=Z;K#IL7!?41b~`zx{|T4{k_sxYvTJ(^k5_Ru?_0I)gb7kh z?t;Lo+b|5Y-{%3YX{6W*p1{l__9r4C)cbm_@SA zg8q9`78F!zZ)D66nF%$iHvz^Gg4f6>Qi;97vbT48edeAlL+wh8EqMdT4N>eUSSGR= ziXCPb1d}k$d2AdwDCJLk4r^z&O#u?V`_|qgbM3ze<)yA%xsp$t3eg&NVqN#=rh?%z z^K6S~5goAY9jPr?*R@kO&KM(kl1wySk*Wg+nxlTrAX4OOs zqF~%X8bXYw*S+6U`FRKfkR7g?-e}4m6qjI?$V>PRKO;M+jl?6HV9b|59tZQ~3q`0?rYE5N6O!o7sSMkZ9kkC_@Xco>ERxUVj5e&ryX zg2WFY%rPs?OT^5J)d)z7yu0dl+(mAwy$}rf&k|gMPw{7RK6gIHgh%WH?3Fq#8+wuQ zw~s6t07aQa6onnO7hZ>@#C95wMa27V^iVPR*%@Q(f>;!ntC`i)1lahM)>noDS)2>yzWpQXn-swsZ0%SioAhx<4}XSfuX$0EJY{fg$32zhb?{&z0#Ty5CG5nu*w|-th^jO zLkpS5e||-u{fI`GRAnqz1dD9p@#_GgLjxi3-0%$tbVXvJbp<{n(FRh@+FkIQfYKUl zY9SAx9T1Fn*mdM{lLn9S11s0RJnh|FE)UBs+`@UsWzZ}2gq!DABU@aU`BTZ2MC)qf z008_^x4bt9i*jaGR)Mt6rPM!`tY>mX8s9(cGki9mWPtsGtehB9$WLiRLN6>Zw@x8a zP|ot8yf)$&0Jj6XXhVV&kf<0y7va^h_tbgF>Zw=k);>9U8~KBIb#-+SdfOn6gnU0l zs_45_R{|NWshI(>`U&Zd^PHw(VU!+U^`g_O5O5#bF4Gl(HkbIgKeuPGSg%Fn{r}8q z)-cWXg-jHsZFt~pcpq$d79=6x-@_d70^_29vNf_M-bS1~jlj6H-lNlXmvwJL)TaeS!e z;#k50quMrE3>6XEnVqQ7N&cfq+ARmdtj=>j4;F!*ue>C@Nlp2 z5cu3!!&~??$?czzKdcJfxL5?U5u&}kwXeEZaM>jE{65bIbh(@P2$J()v^|{ss)c5g z_9RYSr++Jn=|BgN@CfK1Zc#S8a>IK&d%B}z^LXD`=tPYwEx*V1S&82rsc_WmIFoP~ z=naCg3$6p?WcrOiHB2qp=l)M26NPq>QG$NIWg+|Ed)CZ~XC~_wzf4s{@2lwEL zizyUgqSi5@hp*XR%&ID09T^!(fOvg@O?}#Zbi1#zBm0NB?wH z`u45&zVAT0Vx9%@Mv-^~MMdUNmq|;odZH!mih>;L#tuZj5JCY`R1{s<2bR0l%hCRo zQI0n3Am&?}8ZAVm+HE3Ci-k246vL#6^4I}P&NuTQk-1Db6}C$Ez}6_;_&W^{SqF#U zOts*Ai_1N^6*4)_%<7%>&LEqo@A5YzrT9g?d5`DZ(}!J)vvFeE>R*%dw%W0BYisBo zyH?r9FeDFSWttvv+wUF?UtP2tdl`VJDt{;VCaBYtj?)|`SoqP`e_tlK7hjz-=1$;E z3DtePuESartIqVg;ARA2jiMsRi%FHnYsn!KWYNguuk# zll!$^((z(f&!&=i978}`=AWgW{gD9+y6tQ}ZpskW*qpI|kzGZw7j1cC{zNzhU%wc8 zgyM}Xl0c*!ZJ-fG|L*`i| zqlRY4xr74oPplT?aT$_!xS4ZDA8&mL*TVY`6){He^Zz~V4K%o8CWGP{-j?@O4u7sjB`@vuKJI>KU2W` z@o#betFPcsMPv&-D1ET( zkC*oEjK!!xF}ozqHim%tL}onivdt$8$x5n!YL&uCrf$d*{$Rs>@vS-zdAZA^*Sc@v zRGeKjxU}f{>~$r(C8VO>SLPXN6@@l~tVJn3_$0t?t`sA1SA7jdaGy&}t9gFZ-Z8?t zz@1677|iBPQZdprnqQ)Jlp_D>aktvz9dPLBQ&+sb@K3QXEmnnb)r}b{PHd_g7dkV^ zu)^7-iJY`PDX-wqG<496%Q&hu;9#=fNVzcwwn@{T%^kS1%<-G1pK?P~%-4H|&^Plo1!7Z`l&(y@ z{A!&1a~_!Q<+hE(z-E0*@PxJF1>^w3D#+2St75F3PjBhN4ik`S=MP z(Ko|v*5Em=c&}JO!Iv?_!<_){H6M&JLsz0@JE70zYP9;$Wy zwYKNDfFgJoKEFh!q){N9TPyDF8Pd7OXAM>R^u=8$dO4(5pDw!CKk#KVFj9QMHe(wF z@6|Fp7C8<%j2rP{7#>&owSvrK;+=z#2{ABOs$w^E?0Pz?(o|k|jGQ&zRWQoNHHY31 zF2-t)+NxZR%D?@4u&v^TYhX)Z%d??9=Ih$0%<6QsE6==bs9;;KGXK|6h0VKs@2}nc z!f{A*@d!)9Kedff-*u>o87Xc7@Pms`K0PdKt`#IZu=SoOWE>I?dyVZT)u}9{g`6}dYA1z5!@F|U=&j^JZ ze(xQ4)=4?Crw+e-#Qh*8)>4De>?j9T>ppv}c1zjjRZ>DX-KAI5bMFD&Kj)a$c%rJ} z2cynzEGd|vyQV3gvUkxsW5u7;^_P&MRGgdDfcNEDTP;`)2U&--?Y$1+kA%9ay4o65 z{M%rruBNR@*Va%|QdQMfRsAO~#{vRdS Be=q<5 literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/TFE_In_Kubernetes.png b/content/terraform-enterprise/v000011-1/img/docs/TFE_In_Kubernetes.png new file mode 100644 index 0000000000000000000000000000000000000000..87426ed0accd17a1f8737ef531d3cb1261b94bf5 GIT binary patch literal 37307 zcmc$_by!sI`!2c&0hJmNK~lg3Dd|RuK_o<47(fsy>7i3Wq(_vJ4(Sp_YDguNhLMmO zLYiUdj`O0Qvwvrw-~R63_grURd;j6Z<*YSp-gw^Uxu5&KSI9#(IK?@Ja}Wek+*gu+ z1VKbsAc$Cxj0AkLmtCO@{+xAC(szcS^E9Xb2%v-{dhj8E^CS2@sJM%10sM#9;;!ml z2r5OLKYVfqf}$SYm%pp!POyALQG+n|;oX<+)uJW~iK)2x=3%4l`54)A&%X$Bl^+=O zR?@8C@}2~!ek!Ta!>Qfl+8p*(nkw=w*E^fEPuS#qmX;IuYwnFDwakv*JH3K4=ZIg` zkqL7J2gUVVy=vlM=G=Oszog&s<&)9uWBtqe&RzJyZe*8OOT1a6*lfqtUc|{pIKP$O zH3A6wIiY+=NY<8^8r&}Y zf8=%nF@m0QSKM&S_R3hIk?-Ej&vVz+Q<5SjRw|Ldqu|#kR>SI<54Lej2NHd|6<3dw zTX0~;KTcfJ_1|slUVvoA780@am*YLgN$vec6-=yY zQL;((e;?HCj}X}|a1uP`4jGJIR0@o#Y+ibBO@NX;_t_nK0^&3Z+)yb87Je-~rdm>8malTU;qSnbz3>hstEI;N>Kg}~R(j&U(OdZo)hZlosV#85x71HbcO2O2QA4zYshc|Ik`pQEg4m70lreoFGk52cC`D#AP z$zk`&+XC9&{xxoUkM>H|!r(0hvXFC13p$taJFyjqr2W)ML3B`>ru^>Er zHu_m-f{PN--9iaMwHnD!;<{`2v|%aFeUlAnX*Md<&wm+Ft%;wZFNLr^X*F(Zxx- z!$$I^)yg^ZEB~rEbJm>;6;2V6pS#3u?g?(2F?NYBbuh`A@_7eRi-&HA?-t`g)JLn0 zSxN5MyNIbB*Y*V7>=Q$6`3#!@_t5ia6h*SAiOQ#|8E_Y*Lo0c}M&FwQYho#uT6Mh7 zBstre7+1F^f>kosuji48w9=q`Q9Tnn+Ik|hkjYx>X?V{;@H?yD;hJO%$5%K~-x{v5 zCA#-pWcKb>F;$<~bzI3+Xjr*B=5<9@ak1Efi2~glM*Esl@eAl{GSUajpD~}z+t+)C z*k@nwZOrW?O6w#F+jfnq20b41m@|HZ=Wvha(S=EmZza~pn6Qh+ud%J!iyTwHcZ0)r zzo6--*LVEf8twjipV0ITHaCqO=`#9mh@VYIrTa*KJQhB`JzjxDFaMMoz z^Y!kq#`)CaO_#HjF}p=Y`Wwx6=Q>k-?5eHzv==(^jcct?9ZQ%R+bv;=DIUslm`o=vRTh@=@=#!TyeaVL4U}IC=q^M zDWM)F@Z|1TMnS)-@$S94h-=<~^PaS9SBt}X?E*UC7t%STowe>-`hoKl5L&E-Kp+Al zzXe-;e%2|ThVFleX*CesUa35K;A3XU?%otN7e6al^YfOkm*ctdU0k!hLm~K7cA5U* zXI@UG)Jo;x4&rIlcJ}#8P(XsXi}i51?YyR03#`47;k=wGt36Cm+9$bKhe?{hN0QUd zT&1ruco9yFs%$XH2`!E`XHv@1_7{&h2gV{km*nhpEt6c@{vt-$b~w6#xl`q}>-wy~ zcoO~!jz+6{7UswaorkQdmJw-Qk?J8 zyz9jXyjrnuU>~k6&wV77(iI}VRsBeTtZFidvF{s|Oj3Y?;d4GU^oVJ#cF3|>?r?zX>#ex ze8T0E@#(9yM8#BaJLmFFQ_OUaTzU(s;nHKZk7Z!Q+(L*#(I#jMQ}rb7Av+Wxl2 zrZWnD#)K{hExK-*)2cb#{OGe&?Fq3hZTMBOxTJ($;&t zw&F{he&ws&Xh!Je{tmJ$0f@{S_nPyy3xW{FfiZe30|xf05^gIUbT=Z-DQRg?Zn^kb z%2b;W^r%<8F=1MJK8vjG_2H;C5@IR6P4Tv|+6OARY2nR)hc5JouiKXxUKQk|huyox z{rG3eFzhaSwSG(epu1%Jt{3%^evP}MFUyPTUzLd8tvTgxpP@m4ZT88Cf(87@jJh+l z;6_UGgo8mif{rzOycVWRqDH#UMf*n1XDp12i9dydlC#jbz7AVMcHv1SCwRtgBK3<* zrlgyV&uY3nZ}=lA35fk~Gtki?kQ&B*tMjI?h_EQTER?(1$toFZfNBXQMaru$LCEGp zPo|bU35#Lyf@2R`3yPen!AM>yWX7~ZDTxB_QsRZEW3}EZy_tjM&Y8~g0fphI#*g5j z`+=do$V5)~-3Nn3QQ3oRB%h2t7fAcKZR+Ap*d>@Od>NKiTxP0eVDcmqCe$Y>?Jq*+ zi?#D_^D1J;Oi&`I){wKEhpf^DOJom~}454@6Yb@dKlu zu4Cm8<@VSVouYmB{YEp?Oq;=AlGs9iL2S+fCI_`U+yXh}GLCE1k~t19zhL(+G^!PM zD`lX+>Dl%3%Qaq_la%R88GV-#!Vj*9>1hx+GT^(efP=x4G08U+g-Opw<)p0W7^@i9 zZFCX4gswW?*R~DAnv{af&-4-xPB}-=o0bAU*0xfrUTsdhnY0Fzj09M_JnaX^_qpMU zx^3>ZTCyZTfoo(GYa;9|{!DJ8OEfrjy4%p>$Kf0C^%Lxq0pF$s28~m{wbpoS^og9z zGA?i}4bHUkbLX>j+(JaQNPK|Pa^zoj3|pn1%s_@Qsa2^dnf2fKs+1(g^-?MPAh>aH z<|++aSBlHWDeKiz)|TnVH&whj!9I|V1k*2WP4|jkR$+Q_?B3sSaNmX4Q*U`Bz4J;iWon;EL5ygi0b@>ez4}RuQ*Tke z1`-=O7<=x%zCCgzbcRY%OFG4KF%Q{y|Hd`(0IqbRvUIh|3;RJ7ZgY#RN(97<)cq(j zR<>&Mqq)8F>(d8#v|H1l^xp4x3u~=@@yFACHEGw>?lSf#I5CW`QTr84+3OT|`%hS(t8CPqNujCl ze#CEb3Cq5|lE_@=HwtLZ+=oqaY`<9T6$>XINXtTauYE;gRE@tsAzmyuZT?cVUOKsg zcJ7}>)bANoiN~Q$5npQZT;xRxEqi1DG_;Xo#>;~V>>g^YeQ*YNtgJ>9(-Ue_(n;iR z(Jd_kihc#11)6h=nZv!w{^NTA6QNKN_dwKqWdAL82ZjE*-|w)w`@K&Awlk1#8WB{alS&UeOuPUWqI7axbU?sLPFV*kQKe90_*SQ zafsM7ZFxCKP6CwVx}||zbLeWRdHc7jrGA6)^;r2ifbJ~~9Idr1X{9LEPu?)j^WUsx zj#-5f*bEeYcBx%_2#Qn#F$__vCUd0f@w`dqWTXCr>jhmeI%%>Ne+W{!awFB-$?ij| z`^v*88fYcrP1+ik$=FU-sk{uzO{o#Z8E6(Gc(JTi)PWio(^y-^C!)I$fu&p)T2YYj zanX_@6F)`K_zZE29N05o`JJrF=Ak$7mj)@`2j9KQ$t>Y28CM~2eB4Cabz`yIX?J&t zvL~ob2rQO((I)FjA6}~I3$=gr$&unUHbk;1tqWqn4!a_;3_MEIYCwW?IetC4)?rM~x&PjKoiifjw{;q#RXZ zm>@fuLNmw9sB_o9fyEux6Vz(c_@P4`5$mKyXQ>t#wJXAMGQPB5!E&P0UOy<##al-D zxAQs=1FhG8(QdsHCMv6}oS3k!7!zK;W0C6Py12NgEHdss{bqyiw%!|^qQ^q>hm}07 zeOV8v;_E<1Q|196rv1bhiGgB7V!7=|tWKd`6qM$`OznS(j?H9cwCWqrXZN)!CSo-S zTp8OO)^n-Is_(=7fG$+QTl=xoE6^=bgB)&xnBSy9G|z_i%k$X9%%-l%x~>#Z>>320^>zy54OfQ+AiN!uUT zVlaJWn~aoS=fj%t&xx&P3hu!VY4FVH9ClBR_P4~enl|V6zW_8U$@>yc98JciaGNe* z%uyFH z3{l^9r#+UteWQ)L#e?bj%o+a>_!(k~?6q!9U5beyy9m3^ZWzsf z&79h!Bg{oHE}y;?w!_BbPhWCtDR}2S0E=~%Pb7KG6d+4haL$k9x7bPiMM789$-?|1fQw={GDWgkF^ebv-E=E~L6+q_wzFyDaaLqMKa-RsyIoLl9$AFtW$tlv}IZ`*g- zb5t?-vN(MfN=OH(P&1=lJ9t7PpBW~dA)%vnmpvM4Py%S)QaLc(p@YA5Q*{LGW?#oT z#C;wLVh3RtEt2Y}SXU4F1`kQ4z(|9E!XKFG*^c{A4>{r^WEpyQ9ttO=rG^qN5OBOy z)E(sNkNowyn^qd4rv;xX7LhB}pVWELK;c1PeE+9-mG@=!Zy^)1ibDN&1BH90n(aoe zzswg-D>h_u6YTZ3;m;Q8)th}(A5x!VrI(#BIqK@Ctt3H%11LBqdYaiP_fH|YqgV_T zl)wf6O$KNbt+uP?D8>A?mz^;HYg~ZB8&7j^&z@ke9B%B{RosYj* zYx}C|>JENvPx9IRW!3odOdc97G3GjA%Tf32W!uw~cB<$3Pj_lbWuDdv-n~@$xD38!ofj8`#wc%utNXgZI)J^1+KM<2q+@#jMI$ z+*cdRW@Cl+>MBnIUseKh=6sr}{P&@17n?fVXq5nIpd}O5eL7;{VaP*jynx^FpFT&d(!h?pRVaX7`}_Fs0Igap^Z!CC$BezBm|4Esu06|@4n!u91_DouSk-3DdSEl zxP6qF^Ipfpj63`vmvmLaTzK?9T`e)I92DUiplP$PGUx9yJAN6~7l*GAAV9L4feNf8 zc*sG1Q9~-&>OmY2v+Lu)xAPZhC$G&mPsa-n(TCrWiH)#Ul0@-nXSHkPHH^9pBC7Ho z`BJZ`G_BZohAOwV>iS5cHt4%fnUDB*Br0GH9EY+H%T0KHx?Y7HB4vP{Cjl05L~jEN z`1&9%_?$fQGlSKkLSU4;Dl(aqU^dCQ>(5!zhC*=u*pmcZ9Ie^(C9T&6+gUkv9xUAO4F^V6j%ikdlUs-4!$>n?ok^Gy@muE@3K z^Bb2xpYkBKLk@0)^MWMlM94QU2%dZ-m?9$ej8m2u=zpE7)wINjy+QH`PIudg-)Dcb zY--pBqdQRY;Il<)A|xIHjs_b$lRRIrEVUUYPxXApT_UB+elVhL4$&srEq7bw0>l0A z-r${Jm$<>!O6s^I21DYg#Jbg2Op44d!_SBUjvKBK2Av zarc>~?HuWEG(4L;@Q@^3;w}_UMN92ZiBZwbclda>pg({CdL6`n<^Lajo%rLdf3`}B zq!?~!&G4n-TB7LscMck;6DBL(0}fK(c&!(vowq*e@m;}vKuL?9yqNnaakMFtwX$Nn zr_MI8yhSjQ(>!)B!GIViQiB@ zYVj_c(hI#1|JZyK=obMrvi}`<|39m?peU$@q&fb`VpXD&+%-9^4=LrR{G=)wL7M*Q z)jy?n;$M_na3*@9I{_bv=dE83umX(UDQUZqKhwTm#wxk3N9g|y;6cG__u!(l@n-wk zF*X~~Jo*sd1%g1w(gm-BzL}GyNaR{himGw#PBU>?>VH(>4)}jpg~JD`n1pE_1x6Uu zmESn}jrAQDv7N!8*UQ?m0@rHsFEcOnu;>(43R8(<9d^d{bmYx{gJ%8)WC`lA*@ebw zAFhn*i=YqAJ?sXJJ>TVVziPn?P_&sAI z=X=A4wW+f_`u4ulydRc$Pnrdf=#0li{JPb>T3$ABS3gELPDiHXw_d~aF&dpLBKJ=A z4Y8ga;qo^Lpfu2*k}r{}A9wq9pEz_nFT`fG&V;rms{5*@=(M~ZJ;X+;YeptSAGiBq zqh^mk+`B~O?UXYt4&lra0Tn1VA2d+w*rb7A%8$B@)f>FXFH6m zg3le0G1KX4M|K--hb>Ul?=B)$v}b}JUO?IJ*_V`XUV-P}YKbtU1xWI8I|v$1guZ@c zabIpAn6KB-76eF{?sE8wHjJmPda;Q~I%5ik%3OpY3VDw4-5+q>+U>`!MC#~+fE&hY z5QL14WFqSxn;7WxliTEyY>$m6)Zgexa0JjXvjR}I5naBwo1`_`0`i(+?ceX6Yc z+%FYUm!M{*zI1{@7;E3qG=aaB+=Ne-OE0idTNGrLAoBq=v)|Tw@haLCS8Rt)Fgi9) zk^C5@h1D;}NADz`4F7c5wmBflJo$A}DuMHG^xIzt3o568>PN@V`_*VPd`r%6V(pmr4gH8l zu?dSsC4=QmR>^~i8~uP-v-LivLLC)ihfuwdL<>!LitBeySQf7O;=^-#%iD)Tz=nNj z;b-t$J&8|1Yc$8BoQ@)6D)1^N>(g-?(+0;Qj$&yS`K6!kFBvBnuxOkO8I*_i0#4?B zdb<`@GI+W-y#EOHJrw%-#xz`UZAR4#!@VP!8qhRDr}jgaALRgh@j*)=1Fc(6KTb5&OgxNg^vh?eE+5Cq6>BX708Mc=SNk$^Y$m7{}e(CmA z-G{8`0t0oW_XcO)R6g?5lAQViQzI$9(Uj*&0L?QIlF5bIc-P=x4zln`ankD+?Nwal z=&kqeT-z(u)nHpVOLvlj)&pHVeK^bUM66%?21)4R_ZbQ{QV?`G=P!K=J*Q}R{;7$7 zaIx;mOufvz<8_qUcQaY`!VYv=P6B_{Wazx^Xr)=tDj-8l$3VzjA_#oaEQ(5uV~P9L z(y+z=yS=SLi>e>pG^J!dnT)7^lXKFJIQ|nJ@4F$Ik~;hCmRhOrI9T*0T2x~ z`j#f3VvU)Q;|&Y{;C%9XIad58-rJW;7Q9$2$~i467&;pEV3OqGuLlIYwyU(Yr)xQQ zMDVqERZIbBWys;s6RoL?m-h5>J9+M%tPDs>?j?}lov%H;36tchKm0@tarB-E)3_DT zH~q8Pi}bRIbUZ!2bdjjVN0uvWwbWtq;PrAS?XZP|ig5!7Ra(|Ur8qc?$J5iRXRk0n`={MdmT+CR zd|#~Bi{s1}fu(_Pw=etk0k#^c2|Hi*$q z3GIeg12UP_@!_6NJJqvOC1+!{(`xZ&-U0yEKkx$a?xW@9L#$PwcZbq)?c3VZ?;e)|f%lX+^G$VE+~lu6szy<Fx{ld(^0L3gXJ!1bB z=mG}p@w*&e<2uRLAuU^DpoD;)^6J{Yo^*MR_c$5zT3u=J z`ra98dcQ12i#-EEsI%`(f$H;-@*?Bin-MFymQ4*CeGa@Yu4KQm{0KLbGSakLt0}$r zNM26H4o1wL_I#{bh+FTY$q@fdju2d^?d_#7>-)qX`U`aD4E7}XdF4$)cEab@5)ABX zg-BysUf@fQdT)mE7?#?Z95&aB-AIB=ZfnU7%M*uQxXOUqZPm}q_(~lUVL1vnt4)G& z#YQO02RmHYctB5IcwWcqdGzXqjK><`*8-c$TZEerTD{=$xBB0{Fs*V&Jrc9Jn11c$ z{a{;OL>UCd>w(8A33hNe2!{4hV=^C6Q*2ts!~KI>ytTwKdRhAe$=G|PxL(R4e=zW< zkc&t^En_EcE`K#t?v8(v`Xp_ryv4vfsHNvl$_OdcuzLZFQE>c$+lLks@5|?VZ&qKA z@wgTo?RXKU*S6qE8mc)JbVrz@Xe5SL4Kai*3uC~RJt)=bybcNEZ*g(gi)?72;wL$iAD z8o%4DB`90^+m-|n9{~<83*vs*nAsMKrOeN7J>F#~P?q&I(iYj)eR2gm<(PZ#zESpQ zzM^-1H&(RX`ZwMfbl`9BJ3Vq#GcHu+#g!;4?fC@*>4E;rmHfxO_FkmLCHelptrYa7 z?bbY|q-MKQvG&P;Z(T8vF26BA$~0W>vS!b1_xj#*=jReC7wcWe_x4Dp^WL2dsD_?A zV19jy!z<2gj%!3Pw_AC7 zwYb?9aHf27E0P>KBI*>!AD&-7I@%daG^r6hs3>L@JFoMaJ}+H*IOxzaj(M>|r`eKG z=_M(ShhZ?zaR0^VM;>9@@uX8;0ojT(7XJ{jJio2ir6kfE+*gTggAEx<)| zhYBKvLj>{u(#}U)RgO}C21NF+n_J<>YZqdLj8zzgpMQrR*;g-|UwCLq&g#gW((+DC zkW;%SeYVxcEL^9ME8LAt%AaAEs#UhZy}e_S5t*WUZYcxl=P$i}3D{c|rB)_q73{QV8!H2v zIUozR{fIb-49LYKXyI-pc6a%~ zmzAQ{hGFv$MUzgKVESGlMDsA*Cit^hOkHE|#}v>D4R@_xwD>q&FfWL_k?^>$Sez(BL2TKu)6n1 zEj8cWP**$U0w1eB--v>_}!k}O_#wfsrrTU z#?+_$_Ba(y)nA z07*7izft8>%dZCST$F{x-vRp<^t0s^838?zzR-O@GKd6P6`UXgZVTKXP*v;={6?b%zC91s91 z5V*bX%z1w{1n?n=iJlf?9JXHOwCwu?eE$|9G9I7Wx~cbUx+P-ILre1Bi#I1i1pw-9Ah!XK+)Pt1TV=BOIc@6l!qU1tHBh0_~)dO_1sMJ*A#%E_QZ z@2(^nd}$(QSLrk_olY^uU};$>Un=1hr%QvZ% z{A+UN<(duN?>jqKH~S2+87*|ctwHGWA_FVzUfYtyk@yu~ucB7BmUL=A8Z^2>o78;v zgIXpbNGCxOmI8fWq(~UkC}l0~kTL%o=2d@T*j%(RVASha3o27u8;gmcAYgJW3n8Q6 z(k+&phnzkxLH?5VKxx)4fgC{#wsC@P+%B9F{A`?Rytd3)mjVV z#+|hkwsF6;sb-&ab|c3261~z4dtdJqcEZyiss@UWr2vef+-@wvb!GJZsUz#~G!uIm z2_8=GE%p~|+<{$HCcCUs!!z6JR0?q1)Rso+P356rb9OCx(cqc3a{2h+P{rr!w`mA6 zwB${FB~g3kiPIi6+5E^rca+|xO4H4e8*Qh%Cd$bXVQPe&J6GCu z!TPj+0*|~rB(?CzMuZCTC4TvcB4mbS$+h3oWGAn&TAD&Pik@DJr0zN=%M+6?9J6sA z<^}|oRDgsod;cP*hkN>N+iqA3kG4hxz4GO--XWiSM+bKS(+1CAYeiUpG}+zWGX=y^ z?x{m5ecZQO{N%ro_-}*w>v@*J&pOG*aAKaMus}#_QG2d8nX^k+=;H`R7G}uKCm$T* z5?RiurKQLIv}tKddR!)-v$Tus@-_Nq;a2@(W!=L0McOCC{@bVV_nwRqCaJ6!tT`Ur z+S}u|JNbG;H0smxLm(Y1>D76ABuKc~`LdYZQFM;_>aH5jQ8k|tw$I7H&rQ-Aw+Qb* zZM7D4pxVM4XCa(b-?8!{U!rhx)tbdFiV^v7qpSW37VC$t%|j^kvvX1hM5G3vYkFuV zP7>M%7qi7ThBpUqMPmr5vXk_eOt2OiOMzG;^jfmx%_eL=V6XdMB#Y%?K%y_pb0W!W z3>Vz3(GUpePegP(G@43|6Zwa9UqSw7S9n8ibK2+~J~~KI?%(y2cm5_u2GXTGAphzs zCc2Fs`sEfNvA=cJ(iu3B{KdBujn?t>UQ6@_f0*JiFbc> zB;vZw-0(t6*1vpbgpOO~MzW|+(~Rk5iUy)zer6U}0wyJhV0fG#u701j%5*Qdox4t+ z$bs+A??a>)Wc?#om+TYYJ*(XsWt;2X?{~(aPcSu26U+6bpYhN>4Y&d3v;2A;?&n}@ z>i+j@CDf;%!qfe{8ov@{*B{8#R^<8aCwCn)N*qv5&=QjMXqcwiZ?^NUPhg)!s$o+9 z3{sYgfO!69FLa1IgU5TZz_XZN*roi(711!>+S?+BQ^I-`^g$LU5y?KJ6ZZmTU+-rY z6sxLB9ldKB8u~M#WMH`wf7ETI(XARD@#p(J3#WF(f6vgry583Bj{PlK2FecdBVHlcw0y-*%WMyV4N2{m!Bq6ICL0hZ%^cnq0qtm3vdZ-(M<; z;_iXn^0I`#94K_x%i?^?c~$+sg$n{v^QSc+PqM!KsQa@RJ^vO*LH+*@FyIwqwi+x( zER>JfwWH=h7xY%QM%r*0eYz=NuPJFL8ng>^vM_2A+}sA`x3N=eZ?8Q#)p<=Vx5q$e zL4WqBX9%h}wUq+545lkt0s~kM49M1f!(VKK$X=WLo#+(;VoRFQTwK+;e6maaM?`UHruEGvq^pU8^3?(3gvnLGu1?3yt-@SMmYt&t%RPz$*DmNcK! zSd?`JXdfq^$r~x(Y72_Qo^M%3FMY(1N|d4rQ~wI_-{Ape$-kT?qF(>=vxvM0?Is9I zQ$(`U)!{#nPZI-=kDVf0x7;5;Lse$wVk%qW%p$I5V1xSUx`X9$!Nf+W`NIsRP@4sguMg$)Dv82lLg<^Gv% z!f6ns3zB8NpsR2Ha2gm?_fRi^E!|9Vm`H$Pz^oQ(MAd(mYk0L}Kn2 z6NT;7PNlh13(OZ=GO-mG&~#*4{Bs=Xi3qv>r4JN>ie%3Oo?QY^ONnXze_-4sfXWDI zsV({cwyw2aJF^EZcKU!Wd4G$e z{%&vPX}C>CO4t`LI3xxkX5WU<%_xrFC@~Pr-pfh3^O>9R<^S`>lr6>s7W)GYH}Q=m zOkZoUk^YztdG+Bq^8wrto0rqIEMmJ@ig_gQ&zWWh4K!IVS&{~`$Ft2pG2-tEJZa>U zAvdb2;OHBx&bT))YaOi+1Sb{$p zd7#tJ*QS0>GiMubaWcsj%gkq+P`CU3PvrM3fSh24a9W#sGIuf_^MKif<>fyY01Q1v zw&%zisEhZeXGoE+s-8|}Y%=2KmC3vR9BE58LU2*o+jfiqGrqT796cUI|KjhrSFYnq zK2UxJx)#X1;fulo{Eo?P$7lAAj}KNg=ofmOVnv1PgoppBHi3{D{S-r$XEYW zBm3Xb_GyE~;Jq@-hzZwx_Q35Btq2BZvVFn7p8d5?V9JPRjK^4h4OZG%sJ#9Nr@D|JqaT}U z@0B6pQXS>%7IDB+9L=(0pX#MXc?~K8hnN1RRik#?=lQ86L1Z>>raKGne{p zHWn@PzAn$kKli*TwU)VpoWb+nC%4^MLHHc3{9s*Cktw!wJ8nkQVsx+h>tq7T$Vqu8 z2a7hflD<$=WZhJ^fkQ0#;NN3QBz_j>zi@4hvwwi~Lbksd^O>?-ugKr(6rCxP^t+0Q zOirl#yq3O+TNJ9$g&!Jpf=GYlGrP6$mQz-tnSFcAWXywMXAG?A>9h@Xx`S zy>H;Sbh&|16&B7FS#-8l=m1)23+**0F&plQjhJ<#!_zG7`S~Huzm$0SVtch849cWw zgBWcO0o4T-$xn**Ld%Y6NFD!n5x}?=WG?pdg(=!1^*u5w)-G+xxNT4@bn%YGFxEbq zB;`?NT+tsKd=s{ZhR;88!B`B=9@w8CtnXt_j$>=^(ry?Ee#6XjS{NrHk$XR+mPBTQ z)(H+);8OizqKif?H|0gjhKwT)?5w{Or?*@MuRU4#=+;}UN%!j6$2gM99j&NIna5)h zF02RFw{7>v5PMPAszL{r@jOO!w3*ZgT(L)osv@)JzF#{}cjND3f692WJw48Iixusu zV7J+9GEPm=?9M__Z&{;Ik!tAx|0X8Sapx<%rnqq0M|)bF!6o?$;oXIETY2h*T?dQr zQdbtbG`Gj%3K}%F5y+FOjEVv+Ey9dmN&MF{9!AS(`f%0~D;>cP)9Bzqd4=?t@NGA` zyVId4kN|ea6n2A;gkrH{LVlkllRdhuJWk-d^mYw04f5CgA?_u!!9w?$wSF#VIo@jG zSMx>};Y*q6%u_cHva|!Z8M>w5hhDKZk}sJeeyFWYa>Z@C%!RDz_U7^&{60WQChd$I zcos01;*WPTxtutvkdx<1Puj)Xj_nomE<{7Sb+9f`;a>7>^pY6S&_q3Ys2*FgZ7_{r z*~zymDa_o%jveqMr4ktsf2ChFen}+hTro@HU2u89nN`%!y3Q}-Nnv{f zcB}zwotb-SX2P&m`fI04Y9-r|nO0W*pnUV0w0<%WU;B%LMq;*Bf?ew-W8*;x!TBjm zpG^C$luv@QouXT1hm~uB*`<+c3omH{K7{R#mX`Q_aSOkf7bLh6<`gKyP-}ksThQI@ z6NkE;BklzpV(vFT`A*?TJlCTl%Wq`$=o=*D`MhA__8@G6M%=K+=uWY+G5(1Uq-!b3 z>t1Ju!|u+@wude$MU&`lhEQcmwBr#~f++rA%xug1(7K)Pa#aMnv&K$q8HWk;iL8jH z*{aD2(!EW$R3Ch+5#-F|XMk5`-g{U*R`ycViG>1-b#G1D{FUfMBIviP?p1xJSvr&i zKa&5E`XGB5O|_HK$f6#@;_;-_HgqFBz6+O|N1S}%SoXgjErZ(g4PLa1_u_~}(ao>js9_t7O%eb{u>;*du zu4Ft=7ZX339GBisU8;33=m6kwVV$PESwFe>_}z@y_vkGlmN6C;K^{hwj`2pTR0;F) zZFQPoIns`Dc0J?0Uc%Y*!A2y4trk@a-S(XUeP&qlQMWZo5`8!adKpc24HL9bH{kxk z_hT4s`6DRAHUg`?H`ZLoHLW-0M%Q>1~k_W9-@W>&5@A(+mmN`Rbf!+tfUm!B*}D?@ldoN)AkyXWgG< zXq6iL8V{W7ICeEgMvKp(0)oxbj8@now~~0U$)l>Pdx$D7L-fiIrDa_FnaB&`t(_o_DgBv+k*z>$O za1rS^BhR%NWZQeq{E<>C_Ps9S6Zf74IMdOh;6d$;ES=Scpq%`pgN@B?tcRKSPv6b? zjec8o@$FrXK7D7<;TtiJ5Hzd;{2&aIW%*TRHe}9DEKi^Nt;HZ!38gdQynGh^fg{q> zrJeYVrHKfm?10ZAsaQ|#0Y`l_^=vf{yA>NbkEzAo);Hljx^yZgdRp;526!RAlh&yTFI2Te<;R1d8b))Cj`wUQsSq3(!|Fk9;+VFoyhkeGd| ziE>58P|Hwpsy5zO+AMfQ9bK^a?L(Q2J^cAMu$Xu+oSC))XOiPF?{Y=e_M{Y zNl*8AYZSb`dRRuH&nEvMmru~ug|ofMH`r%f8<#lL+S^Wa`4=~)w<2OvTCnyVth-}Dx$@E) zMKaP$4LG9Q0I|4$&d|N&$7=O$7xcj*mzsQ>hx{0}I@3!JXd9pQm@@7(C$1oW-a zlvIY};D+?Of*p@4yiZ%1%z* zNiJ&lAJkmal?t`&h_Q`SZfN1YT#`CQwd*EbPiTQ%ow;QS_(#PL_qx=*v)xMqY{c?CO0^T=9o z$p6rCq8{hxVRlTJK_IQ?@9}Y%bd50-f1~_!;3qQXYbx^b`(xI=&kdg2{HmDo;=!;B z*4X^$-IJC!^H8lhF3~yE1T^_bUxxMYyZ$-ydJH2dQWw%~vFA&)f*Je-W-3^*-821O ziZdBnV^adH`zPMLMB2^MziRwga6Tt5USuv0?lLzE*B^YV|EcQ{vbXl@40RfC&G4nm z6LB)cV2=uP8RkmF^5-o5GTr=ss~%OS0Lmu$r^uVbKun}EYZY$vu$qh+ojNu+LTf$0 za=rBV^skQ@u-)>V)TBBiKn*?dY|@bOyVG5mPew#q*t(?bAX;nPp)kF(Yt7hJ=0q&P z5D|eFd5CPhPccGIU}7@uU=o*bm|)bKd#vHYitr|pSU3KvQnT~fz^hAX`|z_&`v@(j z&8s%=+_M0mmKGlxiUXH^*pZ%vRZmN~d_`*GX5d@hITHJBjonPlfo|P3Hv-R^iV^(42#W^!d*SzCpb{yRJ0CDgXgQHGc9LM;8{jcuF4 z6Fo$!f5Itic!4N3bEJJGU&BzINXRY%9!jc7c#nQ4hKnKW+ba|`{3wS7TkmMhP}$2T zHI>MIoFrr&OjWqMXC*Io#663yjQYBrfBB=K#r zTn_5f<|5yDZ?-2|%?dwG#T{D}t2McOnn=JLkmR@C@?xw%7%JxQtl(mp$U#jh9gX%5_0=-%ct?$*J0GLqk8cWxy3}?E$x73>c&h&shPv;#n+@Pwn9U-kYQn4 z(fD~=?IBL>_)iE>PlwdnnMP>){d2Dfh87zFt1a4VE9v$`>w*awV}X;2SJ6E+_QBw8u~@EZPYPF&Y>cs zX={v(;=(@pRo5G+=N|w%A)2=L2!M+{GO=Dv{E;MmZpS;UIhgK5;e6l4nOqOC%ts3{ zGKRDtnD|jI>Utd_ie+F=O~d6V6}x}>iI3c18N&=-%L^vJ&)hcV2vJ-U7~`Gck#MvP zAIiZNZCfCTLa$J3XMqd7A}W-%*$5x1;4kxTBE|KxMs&k3CmfA0_#C)e z(;As!XIK1dr|s9z(t4sBlAQ*k>l_%{o9s`bKS!#fup`csU3Xe$V zB}b9=wa$h3P}8Q<2iB|&*n0RQ=P&ojtbciE+TbfVZiZkR5J|A9Y;wDRC}HR}y%e$J zWIci1+vT0JjSx_HHFQF!gKhme-8wEb9~?xmprA!MB@tm8?DIxWOIwOww85urYUdqM zcZW>(oZ`&JevF*2vc8Is9 zeZW_L^4c%Y{&=)GXV#A@z?M}O@n4cp+&P9zCW43(l28(3@(V0DXvBvC5izVSR%;p9F)J`VYc%Xz>X-ji%!#m^vy{C>;v*=i2Y$POWF>WO_kCAS8?wh)nvD|{f44a zq$-MZK}BhTfOLXN7eS;-7etzXAiV_}MM^9b=}7NL?*ybNNS9th?+_qBNJ8MO`0Q`L z`<#8=J@$T2`Nnwucn01{?%Y{xuDRy?UDtvhaW3-)YNnDB!Gga^z@P^CpHz(hx;!p1 zF!IIT`Z-9`lkETDd!^bmrGY5w(Se#kOziDCTYg+FD5DaV}6kl@gqTpPwZ;D-=qsZ7VPx?5>$2% zT5>?dK=&}!?k}B%f3Gv{`^C3(5M`x*x25>sxmjswLWI?c!~tnw$;1CULEl~(U>(GO z4!RsjsL3Jo-CS;gw@U#d>vk|^lYNT%!d^nae1t?6KteKs14>|eD2N58h0>US|{k0(}Lr{^;CgLb~iZfT~TOEM+$Vb*AB3wWe2wE|rF3nz>o(B#h zn-VvtZ%*fnthAO_w^hb2S|xxDL7y41uWzNz5E|r19tIfSMLTV5h{X$lQe_g+7DoWB z7(lttD^i5a&_^7Xoc`eDKRLG#!g11@(9KXx~niD@=nS9~rY zwY^AN^x3Z!U$&vojQV$VRV+c&ms5VZUESJT3TI+@;6@U4#&_fDmpjwFQGG03K+F?1z*jN9?(U$@*)(bet5&B?`U z4^J=$L2RL*8eJZj^GI+Pn%3w{Y6G#A9cQ}{yTf|bLhStq`eslfBoDi_ zBJ;fsK>Q^dXx9A7s-7A`4;YZ; z1#6z_x6OC&&vWfnx8W%`A)CO@Bk=Y)y|A3SiX+*~ee4k@wxh9krd_7suSRg!;Z|na zq)L~18MqBwaX{bgM0s1JxP(>jZG2AJ*%frl{s+k>o3+txeR_L52neGPQ0rvY+)SZ~SL zyIEm}KS;R(VHN}*sU1eLdLs!ybmjkkr~m)l$?PLB^AaM_@KQm@ldvnC`gaA^fGGUW z0n2}AD?f7u?j~{wPXpX)W5eoV3Xo7XFMy8fV5FQ7`%XO2SZ;#SsI3mv+s7COvccRT z*%CtVDh=;14QE*w<-bWHRx(pIyJqK!if*FkSiEeF`0*qPC@I}R08Nn{O3Gpr6=(O| z1C*aH01ki|pHF~FV+zn;cD;qa0QP}PP3O&yR;S4o@L-^fKfHuypuy?ukPh}5KLt8U zVyp2#U*^F(F_#eu*FvKTJ`#npYrwML4Fv}v%{F`+E!*A$wG8o+3PySLmFssDDM&1? z5Tz^w%s>psb(i9=Q8KPN%d?dY#3eC8rtv_30cyp4QD1>g9$1_F5P&NnhukB+OTX%@ zRR$LF5U^`!?;k=eWG|7C3cr%u-#get7N2A&x7hR(T8rv;YSqH}r%% z7~az03}I#ktu{(NmQl{5?K1;0D7i1Jqq7spsl@EI`g@LP;G!CEkqqdGzQ%2Ik1V(E z*TEdj##LGa!V|tzNuRHbSINjqk~QEDpKBc zv2<_W`T38jNZM$9X7tV`Du5qJSLvL_H=vH($@1NL07(M*mc?rsqCk`bHC0!&+*mcy z|MeSKT>)1o{`E|v%FGYUn+;aTwcAXfVftW?r?;yJ`%pgqWGulTyDiovhIPULW%zly zEpWZ|K}MNr(s7n(5D-E7Y`WW}IaH{#HF<%jbu9;4yEZPHgIhlt0Rqv5EoJaP+~aMt z$CFg?rvv*zU;<$C;Lm`am*(n-V@}^Z_WtVR{ru%6yI`DdnQ`TFHKJIg3dC}o@21Q1 zFSb}Aw2`1iOMW3@6>6&O?3qTi&GVH9tO!w%Uk(^gv5#z#{$x$fK#{w``?_6`niWz` z2SCoh7o@?&O-=bTT!1l3L@>xPGC*c=4RRfjoGUgb#{|3j@a0;FEgeXf_N?foA;F*i zKpOwKZ)YmagMj@7zZ2lZkgZ?ljBNBfS)1;KDENX$Gv23NEO!kFJwBwvv+Naek?H{3 zgQG+D4vtu`4%6NwDgSyyMe9Cs?%{THCI)~`DcY!;HO~+fJOD zTKzmysLtA0DMX@>1acDEy`Ss)OB1|#^sd#<|5tn8;2l?BB=GWZOQpdSXaOPoeI)GZ zecS|MB8oPa;xbWA1aXT5n(jzfVrx3$*mSiAQO$33Z}?ILV?-pAv))3W<`}n43({nmz;5bU& zZ*gF6xa^tU`q-zf!(B)38gLu;wRG=1o%UT?_J)*80GWQvr1ra4I$B9_E#HmvKfJ&v zIlRmXNquO7?&!*gxZF#=y*X-!6$kGd_vRiYmq^f+T9>vx!skagzltKbX+x>=@v?L6 z<;}d;nt4k~-$Lv=*oStH7IU1i>f+pl%+%L#nQRr_kFT}h)Q23vF>GlZy#`sVEuCYkn`y6iYpUSXwHk)!ky=a zL=FJ$?-m@la`h1iw>B<2IlGP{u;jHp+UAH{dPjwA^?h(y_!_ z%?KZ<-o;$RByi}#Dd_u?@^pnYH)&{!1E;%d;9=YFa|_`JCK9xk9J0XrC$ zl`FczNU}VVuP|UJcuD=N6P<{#|06wd?0(Re5v2U46?ozbtXX{yuiM_~uu_f0*|qQ3mxJGt4cCL=zQc~sr4?JHJ7*4< z?>%ZyhV)H?=`XGD_H~2I0i6`I_EDRlB3FpRn^yO`pnLudsjz1*wOoEwAHsFc2Eq5H z*GB9Ywac@7u)nz1Yv*fl4I&*3HfvCZE5HTEZLGFPBC2&}Kj+1y+y3~S*fW98z--*p zsWnil%BzmH)4m*9WC(d7Oys&B)*7@$|C+aaoyP_VzX(!{%Wa2ny9bH=RFL>ZK<)o? zvKBCB`8K8ANw1MZRn)S^u+iiy`yafzPs`-v5ty_ZNc?fj1Hlsl%K2v(%Et^sV)3-+ z^(h4?8uYH8CEns8;AFr)k=Yrnf`kX^b`$W*OmpWi=SRqD=DVsgQF66c8;E#ClAdIo z%i1q8Gh9uA6PwE=h%~6RD?l^v>rv8AB(G>XqolJ@uitw5c{@s1)WY*KB~FJ^pP(n} zHJI%$L4;3}2R_c>sE(;9A%ATH&>W#C|`C z0zlycFFWSnRU{9+e^F>F|7j}$On%83fyXJh!6AQx2PfN1T?59w@zK3Gryvo;j8Rv! zP^Ln{@O(d$!;GD0HjUvmv-#ikkh52SnN9`;3&RzF?3f}}t2&tBBvvwWdksqAtf3Rd z`g-&b+ovGD-+RB!FqLch5XZ#%_*1|<`^y1hc&W3V+FN$O3*tf4`GIkvLiSGkS@qsB zD1HE3xxgbeB(f3vC;0q87pvO&o(id`Rxb4Yn`XbAYbf}t4A3b#e4O_L$sojs+$yec z8aFz`j}|V++b@>YuwqqT-cw$>Y1ILJPnM8KptY6ezQ$7GBb2%*^^?MDtq?S`1s#&+=YCXn~jR; z@OvF7`aj(4K>)$=9dG3kDc@Nx3Nz~Wu^$^S*+N?_`OrNNB=Ug1n=b3^|{#1FE7U@2~z;Md5@e=%5!>8PrU^$3(VTd2qH zxLPbbM=k21OLmF>wl=+13={(Fz38M&Wu%X>9s$AWn7H-g-e#-mdhgW)7&>AvdVhU) z{!69(P{+AG7LySA6-l}5yK)lEvkRV*J_!;qex!N8*qK2fN88;5s_TIu8dg`mE45Ea zh+I9SkCFSuf7N5o^%;S%5g4<*B--;MI&!_(Jc+2!W>frQg1a6s%Il8;w`Uts+G9ktAyc^jg(x5*8g2paC#*L)9PD$5Wtl#fKkv?PXMS*G z)&5kW#$Ve7DhlBzo1<7aT>nAGU>6i7Rq=_(?B!FR7D~}Umtq-_e%ui)Nqa14j2S|` zvt-z@<2-{d9S!mopV(!R!SYC>PlGs^@uU!L1hw+-KC3qPfjx;|s>E7HVHR-jPLl(_ zT{tnm{yk{|^X%Ut2b#P85547z=3{{ks_Pukj+>WBCFbBWT>dxVBglSshKX4k-kz{J5q` z$NU5!iuQ=E)d8~O*cadC;yIpF^QXWwOj5Ur3UfHI^adG!1psUI5$w#11aSv_pOvq{ zryF*$szJ54YQcR85xMT_o-^m}%%3`wK*@dY6y3$^^C^1u~utA%%$BpXDYN#|G0tF$t0c!e(F#*K1WN z;|mJB|6^YM+;G0R+#mlU;7-t8jD5#*ZnGIhZ{bG?I&$u7K-S0!Z4h+#biQA>FjO3$ zsOdkS!1xbWOs;EoN=PRDnZhDmkbheL|4xMd4UQJ82P3+|*PxcTcu)1B)X~$TP`MpN zPuw&QT{fM0iP(cAX+aW5Ffb+V^O&A?*Q{OAiqX6L)Nx$@9lUtDOx}ODHrmdBNi{Xe zZ!3#+Fm5?9rjn2&LsCu!hDV{|y^YYdgIul25BwZY#!ChVoa_BH8-qO<_2g&CY{f|_ z9_Fub>|+z0e??@0B);(O_foO>-*JQ`6-+KMm*|$XepU-m+D2?$zIRH#8NSE!*U#t( z8a?az-#X9s3g>;{&wm!v5Odhw-5s3Rjn_Xb111>I&WJLbG0(;Z{$h0GnzuJ%B7g1Y z*0QGodMTrK%GJuufIQx_F`d5`KY@C#X$Mp1Y;?8rS$|vxbaf!>t9A}}{t`&fsVBB8 z_U~W8Pau%y*FY zbCYPefddU51&@{6y#x+Y%I*nqU#fd#PG0-LPW&;~XnUx8Gbt~#=w9qeNq~DJ5N1kL z$nH)p7GP@YA=ZuNgq}`BF#Y;<#AZA4e%u8_EXv6z2lt>j@9y3>Tjadl-J^EnF~BVM ziGTo|KT-L6NSxQ5#Y!P?92Bxoj}dn&tdEK4Age+D2m3@$blT;8TP8lsV~|D-z?Afq z(hGQMjg-hX4*W8_?%>7^ZZ9dx?`KOaxJOy^t-O?&`k-0Jf-gDVm1p2P{eC}SBc5qh zM$hVIr8qFHZnx41!`C%B}KaAM{O=qib%=x4aXtti2Vh&^mj+2 zDk6FKe)?hm=*n4Q0&8c4(%uA>-R!YV8_SR)_Xy;E69h|8;n><_tSEIJ2QXzh@)m<3 za7LZGh=|TVdFoyCK5FZY($VQIl=U|Snm&6Vp|E#f6P^lB^X+WHX5S7!xo)c6KCfF# zHX<@Aoy{>ZSw5FPq`kwRZX}wU?J!b&yjJl0cO{$5e&C1it+!V^37*BjdJ!WGnm+WV zl`N=xw6$c%G-5?Iz~zH7bqK`riqIeWurmKePiHVm`U+zTL%zC5>{R_&T`i#D87N>YE{g!Y7OXg zgx@b1=BP%_^ox9{r02x@GOdUa$R@=dYXz@x!O*^M+hi9bx^gva5`Bys;iBwq%VGPp zOK1sXA7Ugz2f7*8z<0gvBTBMG->>mfb`P^#4TY}AirjSF z*{6+rb4sDZ42YlYD4c(T)yMbDJfE~ejWgE|1z|;0NiNEj$~(Sr>$xiWJ68kf7|K=9 z#^Lrq>#3KQ_swS&Pb-AIU@^NUkUh%|J+~-UA5poVoa}bJU)*l|@>&q1N;(oeTyKb% zcgiEj&@vkK=M|aDwe*9uqsOjBL#}zl_pq08J02q4fkBjmDS7y=F?`F=CfV1Bc9N`k zM4Ru0XnSt{lYCbeGif#6l%NqVx0!FiJ;MDu>k(c5PNm9bA3g_BNAx_%JTS^xL)9lIjh07^1~$HX z?t^m*wHEzqpmw*S(9iYz`ohD(2C7sjIOpS^<#v6fb9?ux|&X6 zlmr%hpi>791{Q2e61kp@R+{4nV3i~;A3AUVDf_jRk_jm=o8~p*D%`O<&h_d1-C&sr z05qWIq_^>Sg|CedGSC}R2&_y4UCvKs5DNp1j6No0SA-M~!2+lu;qT#C>o%JW)*~HLEppp)KpETQl@K+MPUrLhE?+K=ROzc; zg2!e~)p_pIUPDo`LXT&A{KBZzG{U@R+j8wn6#%8kooC zS0mhJ=YaDXODR~y(0lju?38l-TI(q;Ys-a>oHaS4AOm)n7Kt=$C>MJa8kFUH_%B6t zMHLy=vE;E?k3Z}sF^UEcXTHEKlMi6w!Mpz9^Il*jr8Qh4uFV*2sT)tM@1Y?3Uxz9C z^3L8p6X3bS~VV;mrNMC+F+Vz$%R{XYP{SFFX0raoF|6(H!6v8{HK!; zXm-;x1t7?dzaxIo#wWg~t&)-a0We1tx@}b_#W0Ce#UKw9Wi*J@0k`fHfv!RB7n6I- zRR``}wdk8$>INq}rF_)|-BlF4C6Qid`_}$E08vdj!KtIM3cHalQ@e34D+zAfNl=;# zkR83n@Mvxy)D~!J?%qnroUbPql*s?QN>VXPT;zpcwYBB6*qh#0w}~ZQ&{_fVd}bA2 z&kZfe*$4l>b!Gk$Ziq{S7`4JV{2OaGFL}g?E_1|YaljPwx_DSUGnP~QZ?HqrId1J( zU_J7aj5S&PX2T)+&T<36bNY+XoiT*FGiuAmOdaktE^--R@Mq`?@_g^`JjQjj2)*o# z>lnVEaC;i3=rgmGJy62S_E8h+Jl;x85t-zzT~W`Ux!%|n(!HllV&8x2xi1#f$VJQ=%E!pey)#(uh%j~UbTAvN z+uEI8bO+*?9Juu~;iGw{X{M!&WsOSy$d;De6aM6mS^&@5NLNxBk&O(6^T6X1G0hgq zV>nAQ&yAE(-d;Dvmny+zPVc>iqiGRAmZp*^Yx8#$=J2U1QD|hIj@3S|yjK14eZ6@( zc`Jj8o16$|192PJ^s(1eZ=QDqzO25;1=_l9S<}wf)5u3J=jEwoZ8PI(EI-JTklYQ| z`r_?|*q2z}vB&Q^TkPbn)}7$t`Mt*rsh3~QVAzU7zYQ>dV#N$LZC*O`#(*J^_vxUv zUgJn}{$-52-*U0<_ooHv1uwt(Q}j_0w@H%+!EoK#`L?_g4_zkMGBPsQ%cRyK8Y86A zo6g`p8?1HTrbkZxX2OU;A+(Zb0kT_>jmB%{C37Mtn!-2b8;p>2`9aS#e7763U#cEX zX{Ctg(U%re(UH|XQFLbmEPFlA z;qCY3vs?IX*ltIcz<#h5OX01IU@j11@ec0-IJ`-gK7QvqN}2~Y3CU(v};s-NasDR z{aGd(y_D6dh7@3nMy0hV+V0!xt3(g7{^K#&11;T%wZr<$k-s_u?9Q_FGsEplra`{Y zzIT+b)r+t4+d2%lMn++LzTspUCRyqv+kATcQK1Buqgj=PS2->x?b2!e0s2hamNIFt zzs6G5TvT+WC3&kh3Pr92--fg^Nfs_8;Dz-tm7+r;k*r zcP=RAO>LMBB%Bh~#yXrTFPAi$%sI;z+3q`e*Uj#|MW2@&VbYs-pPF-aVN%%7dYtnZ zj((Xg!I_K1-Ib>z3{XQkU5$xcypw9oX%F&XTS?^>vAYVZeCHy@U!mBG`QI#e)!Syo z*mWFCpA^gz(y7Pp-#qd~>?iK>6FT_LdR)kEpE=jFR@f7T3GZb~asO6i49Do73E2CA zUR`g%m+8Ld&Pg1?#~+5oMH^o~}}-N3?&R-l^t+6{uWrjuqPD z?P0?^LzS`Q(v&pD--q5>D+Kwu2Fnx`iKefKCJjOXaEAIh-w0Ic+k1ifpuQw1*e-eY zJWaQ)0!C0roH5;n*%bb$cRSFnm8;lcV?3%?L05b?O`Dabl>*XV?Z5Qy>lyM6hK-y8 zF=>wvqORil*WbUoW1nLeF?SuSs>zmh$GmmfUO%_G)qh@oi}C@nF?7&yR`;O0G00zf z(k9Xyf!;CSDikA#5$3a!cW#w%c2+JFIexyjKT*V3ttq*gW8%%CDb+RJo@dWgWeH?C z2YQb><(Um#BCQhXagzw+(yiT#cCv*OHktFM7A|~v zD8814*RuQ2*0jKk5{^G@RP;s64MWMG8uape_=vt?QzGo@&} zIm~alKVp54+ANo)?KZ5+eg*1*L@f6DJx3lukeXBRJi{ z_ApvlBx+1=UZVC%o5E_c2o-*J^i{HuL2$MU^Hkbt4>hU?D}|tQWP|D298<}Wg$J{j z^yd9^h9HgEMmA!vtxlB5ytFDb{Mu*ln)P}m!g}!6dJ6PTBT`(4OCC7hufHaLf1~%% z>ApeEXp!xghjZ`Y9epOg0ZbL*reQfYbN9hxft>lptyiZO%#ujC9IC=(ISSd5j ze^==_OxOCFxNe}jXUX9vlgRYdy9VLwcFN=x0|frNTI8|JBaD}yZOvWsH|^~NybjTG zLqClnzPDCa{I}({cW?QP2NKm`D}$Ugi?&hihY^M<;SAocU+5W8>|_%X)3t(*CUt@m z99HzZlPz9BX%uwu=hEAjZ@ahPKp60awPwdVEx&hBZyxKZ4>mEdDLUMNvtQ2%K3I!& zhx9`UUHTJ_b-rFJnfQhmPq9v%8wAZxY4!d2DNdu zR$(^G8Sc(`GMF~ck(2El1p^EmF(6~x;5N%Q)pm>TpDtGW;yp?_Ir|&H)Ug`A6;?_ z*r2p>PHba1PT5bE_9!oQz{q3M#}IN;BL^5g9$Jr+R^Qk`N;=)fvad^=1vv|f!V&7f zO1wY#^!hG{-0R)Q=VL27J(c_h%TDW-1D&6B1vsl)_}13eTBV@7d$(GW@+op#<9SdW zYM(M>@k$crITX~Pv~^mkW1@F$Z2;-hX{*-*4sU&j6q~&d@lBPl@0r+Ej`F4DBK2$3@}ky?3qPFz-9|{ z`~MNqIcI1xD&!hqrCzH0RN~w6=60U?oaC8vxYp#nm-WI7u3|whTPy_*Dk!Mw$UOIq zBWYQ#Y`<;qkRUU-x~z4dC}xw>DMam|&0=H6Oa)JxrnEAbQwWcd<;wlt>m_)PrH+!u zcI-|v+{v$Kyz%0$Z%+V9&CVVrF2Yf4R)!yo9k_vTeeUygung;Si8sZ2BXu3-HXnK9 zm4n?mUfkcg#G>WTnj$z19X%is-T^J_b0#KxTTywl?50KB*A;nS!myoSxc=q2%shqw zU7uWua9{)qLI0|}h_8Jajb)%ub2&LA)a7Bk9w5spcu_{K_GZiJtSJvLeohXJ1DKK_ zk5=h<@rwZqv8VlebABIfW%qVozB0T&N?@dua ziGw4T18Vdxl(C#+bX#}4`XDp_4JWKuQ_RFky;T%`44bkdR2J{-Lo|qXZPX!s3{SX7 zTjNa6aLmF1ocgLp??s5U)dyV4O&>1AHBwcEV!?crRX;fI=PP zcx(88kVAC$h|#hq-q&wv2KFGJ_a)NTlF9Jdf_(>0OKupC`;6W#VRt@Bl2|ehDG^{u zo7*ojEh(aaavqkIxu#x6r@t?Q#uR_=*wL$gtlN#kCid#TvUZr>I!r9_n?H!g!u9l$ zMf21t|7aKcNYh>mSJ^KV=SLpEvZ+p$AK5n%4@!DvFb$#VoQeqBCWtd7?GWSQ%#%v0fvr1j43Pvy7hu{duVfT*qEH5 z_>7igj{Vz}_vclPdG*}ifd84byuv_xS8V1C7)dFM_*kAudq7;qH8^%+w#!c(cqI`Fj-xOJ; zQd|bKS-^y+-?H9d38clJE2abGFinxf-k>4+__R;`Iy>IAp1zSiZwAsGh9{;^ z+5_I8=jFPZFryNH!_zPUV>v8Tgh`~YF1&-{<;i;Zr0~s)0^ubWtk1SJe}Q#h0%rG# zxqNJK9chW#;5>v37gM}dH2EV1Z$8oZ9oXYnxAY8lU1UkNKAi2zDWK{l|>@3_;3qx zrTOs6N|09H1jTbYi*rJ_$!`W9)Q$z-CTV%kTNTiyk1mA18t{lMBcv_{fpCyU3C?=4X;ZT1_F0v?sz zbRTOo)58}O4_E1vKp@=|3ZQ@djGPPHvM4FBe|(7qK&*Y?5Wu|JF1CQ%cn0Fa@~>Z{42nk(F&?5S;s4dkf6Y26H3Sf{jLpqaUtpb-5X0NKVMTdNv2GGkVQ&VEL65Oounh>rkQVp9@2>xPkpEvjlYjm0w4TDt0Wgfy znWm$|&1io1CNuW&FDn+bgrkdy4agTL?0Aq!JiZ8nrbA-Gg^JR9wdl z=`PZK<1|tT^v{jqGf*@Lb2Wd^$u3DD{gv#0*8up(FZ;5ZEKpF^d$%0Fesbi#R*ytB z;D^^?gdKPtTppK07WkOfQNs-)^PzKTstz{VUusZfvKrtEzGN8cCJc+(Lc%b0?1Ff6 zIEM!`nf$VV{Ibk;qiQp$$HoXJY|?yoT9Yr8kEd(i28v(J(3>}y5W@5q2V6Zg)K-SZc1kH+v5ZEj@=iHWT-F*`Dk>RO|Khx3oV>yF8!p&~MVm z^H66`bAPP0=X{VnB)=6)%SKKDE~!zQ0{%9zffxF}Vn5H!=NC7+GWoShB454X`ZK}% z&k*CpzcIYyTG+oanjr$Fkdj*o&W)=VnrB;r>*(YUQ}NT7#*q@wPJj0sz7}RR43`T6 z_xEEz+cg*~cECAPG&-a`v}%fltm%G<3UYm0XgtQPH*)W$a}w@jKBpXIAUdll>=B~u zaz0OQv2Tt_EjHFh$qA$ONM2pVv|TjcgV*F$UuXKL%A(At^-+w`L*=jck|CiGsOda0 zYpq|)lND5_#mj1M<=-D8Lu>v|!WVHk-XMNEEnkN3>t@EZVl%@C6SkH#TMtZAPs zK}et9U<%V!*4a@#^)%k(QekHv*V7$;V5CWye{+WJwy{XEy#M%Ay>}Vibq~Id2U$}E zEuQ=rFA14c_oei@YtJ5G(G!)=7A3e4OmGglHO`j>hk}r2;AV|$VJ87FaWqh8iN>nE z6KDFMD}A@k$|aLDK7X8&QA3466Q}CvV(XsF|H=9#K%P``)H@yeOG;!z zI}mqe)+S_^B8AKsvf?a=@9Vc{%hP zFK&6Y~0 zKdu|DzHKxOQ^mc@Xz>{k7WFH>KyM)f7R2qyse`Fp+Ae{{C@bk$8^fu!3B7a^r76}c zuaqBDXejq~N>iHs`PH{0&t^;4Q<_dKKXG()?3nnGqgJ-X``s@;@K&=@XMiM?{?t5A zhl+F-r<7|3!r(_a{w+iUtp79YgUWL1kkSPGNL}4iTw#Sl^QR2AeXP$H5Ztb4b?h@|ZIhf;YbLeOnR460?XNqZq7`R+w0PpoOQKOZ zOFI^}c(6G^fRM-CV$_$8M(K9SwqUMp3K8yjlnH$^BIjy~8E6K-dG?gqqIw?x*RZSX z-T92tl?nYNj6XKA2Bnb=MC%^`TVBKubEKbX8LTxq<87Dz>VdLH_i5}t44GS%6)9Hh8lXul-IYW>PE~1 zRgH%A8B?DwlpmR0_q31!LHNEqlMD~nruCEw4Ldxm)skMZpmJ8#mQr#3_1#mMl)8Lv zJuajhL13+jN%+-lpWk=~a;Et@5h?!XeC)rEv)>kIIgdLC$_VUIf>XaAVSj{RMd18< zG$bbmPQV&t;4u8eiPN!*IeD&ZVKHJO1-9LMhP^I*(jd0<%+l1?h)`NX`}Otp1lZ`s zZV;}n4emrv>HHNLH6Wz?+y-|MhjU@?)Vfrul#3R?vnjViMd8;T9W>Q5{>idd$o^IO z=Oj)=Jp+tIQT4GdyEo11M+HIf!x#91<7bUgNm4JfWPA@cj8TipXD}!v%!XjsRaDBW zmFz~xDZc^W&_UQuY(Nmk_=jf_$}b;P*yw=Vv{c7}Oy(#FgElTj`Z_t3TF;XFNQ=#DMYOp+Gg_x0PJX*TY1#3T)Q`aeWERK^m#fFJ#76cPm8+g*)W z(i}k@-_5F$HlyDhMUcjXofj~q2R5vzYfP;HK=Gm{LCJi(*cN3_WDhrHS!&xpk;~2S zkZ_t@!C+eGpnf(fK;9D@#z%-+AVC=x&96H-4?wipTRoqf zkxd%=`-`p^|K^h~k3M2_?iBAO{3?!0h);kj@AOKN+jFro8@18{4(eU7_Id^4NKD*qMC8X3Hr^JrQ`NHkx7OQ%HL*J4t2Fo2Vt?R2t6Qf? z>*Su_{~}hX?(p-dz9%XwWNYGg$gEHFoVcT}_)T~P=X`m#dPR3lM9t2FMlxO`0Q9iJY_2lb$_sxae|1qtAl50$!vMYRXjY^)1-OxrZ60A3Fq6G^YmnG6(tc%Wx0Fk-fDo>Z(i2X!Mu&D)JIF zOFvH`ouJQt9_U;uQrA_31wBc1S?T+F?3)j9WJ;2BNrU~uh;PcM27b8pLwE7Ee9YQ@ z`Fz?mYYevfq$BSD5ogoVs3Ubd@8(0?DZOtZ^06VSs{u6ws~9ByY%Uhrjzq~U36ww?hQ*@F5(_1qUKn`u_h(;Vgu#SCRx z?zF`{$1S&dZS==JJZlXx?|78j-e{zpWCECprh_|ighTE!V{gD3iR`ABHyvh zNiVzhRQyU2e?4|MS&U4jdKSo32I9R_LVsGCbc`p`<2t(s*8`RQwX-JZK}xsr+MycB zb-F5pu5g*Ja2Yzfk@eH*j+;-R?U8UNMMIvIaOg{Y-o4FAgnE#*tgLe0ITzjKxiv$1 zffggD@ouWJq*+Wd?MlmLBvhuO??r(7!!0*u7%D5`HB(D}A9qq)M@QGU=j{?zzi@HS z-0vbcYv=^3?qRdZV%qhkFmVRxs@l%Pn71a_BK`2%-K1mknzb6!HJx8;THg`~Gc!Y; zFuyaHan(zaT{$@FaQK^~sMYdK5oDz_+)AQj@P&5=Nx^LritWe@l`GcQa+zCn^JK3z zIAllD#M~dq;M=_RhDDMVGD@A)_sUauE1<}OmtHL;(xmVgg%n>>KEHnuV^o$-={$tE z>nD9~S9ks_ByfuU&%zBhzyD3eCXng#*XWn#7a@m2pj@P{5v1SKO-?dX_oAB2V)e?8 z>X*x!7;yUDar-B*OIb(uPW?LPw{Y!qmDAK3I45GT7amN<=|S8{fSi5+m_%$A`XZi= zfiqqyw{f|@7Lbsl?Hz62*TR2`%**(AgYnU0&BfJ~dvE$9&E=aC35 zPjZBOdwLsU$Vbc`zUXe@?HJE5m}#+QYbLEBQ^=VJ>%Y3tY99uQb-ES_vd{9oMUpQP zS93qaFfmP7l5WB7*NnkspP9FJ{jOI_EhTB%1(}OLoZ7mg`A2Y?_u~^BNPPSu4~x-$ zhChoJ!J*Lo2+bEC0=e%rgR`Y@7{2Wvm1_;pd373+%S-pV7Tha8F1KK@N8_4HBez=o zeB#lNYobbds8d%Vakk{9*yo@BRd5Hm^PlR7l7oy$nYHgD@x!$6>0B(v;_YpXo zelMS#TI6~258q1+{7i&!)o8A(g_kH#Gd{c`=#Y3zTz5kK;b-gJxE4sZkw_^WcGi?2+_dBquRfqeoiM4*^B0WDTDDlY37@wXEs zDvfNiyJ(?SlQujkJ?i^LkL(jxeIfpTd5MPALs70%C=(R+Crc8g0P zs}hgw3?Ky@pgf9F!Ua4fFIwwM*8i|4!QclWPDuzVdXEnh^j9Ty>t80p|5RuF@ALY9 da~p63)xQC^D$jKWr?)~NYD$`lMRzS;{~w4iXBz+j literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/admin-customization.png b/content/terraform-enterprise/v000011-1/img/docs/admin-customization.png new file mode 100644 index 0000000000000000000000000000000000000000..4fc6214edb06986e4d08463262e3e013fd623856 GIT binary patch literal 302010 zcmeFZbyQU0`aenu0)hwv(nv}TO3KiJBCW*GAX3sbbPR}~g3=8`Nw=i5iZsm74I?=; z!q9m)=bZ2Po!`1^{SL1C-@VthV2^wDyWe`=CqB>T;o}Q61rj1!A}lN{62<588dz9F zP%Nw)p*Qh?J3VnU_P~uF)^c($6y@ZYU${70TH9G*VLksCmq73$W`e3?`!GjT{|R39 zyIH(dyhw6ytQ?(}go@0Wzaq)V?D9YGe52BmFApr%xNAtvY%44Ol`r&0IjA!$t2pci z9rrdaqv>Ij*LL42a=NZX3{{7oc16!7VX$RnU4P9B=@JG&U*@v)B4h4Q&~Jz49`9^F|-wOs0OVU9FFSTAn={3yXC$}ktx>Dfi8 zEPyS;AhU5Yku*=}ppeKREAqi<8;?_c=MNsIngFfJiTpdS`zp9t>dQ`SU09JcAK+1K zs?X*lCCO^YciyqQYrEOte1o3xX9rnYOj+j5LraAsGD_0>eG+JZ}apzQ})u$1AC=ilIt|e zzF99jH{veY4pHH$x<>aW@I}OQg(q4z4|Dn^vn#hQ)GRU=*=frHH(L2v=%Aq&2?m z_uCHxr2pWXcG?j{t_dFZ2yhbZ=yM~YZpPe5x<$47^XOL12V1fCre+pqH@^S!f!C96 zuf%MVWtpUWUE0I?e(Nc-e>;^kQvekke}Qki<=bg?B^)e<1H&XX+isEL_=f>E?_!hW zy{-UU4%qttj0WtQutuLw+xq+7(jA#3`A zHx`Rsj^#OiNx-P=(-)7l@U>-x`;q
zWfwYOVx=lx`RR3|uJUJ0lKRlj2O1oght zb7H2)=6@SAck3}V;=O2VjuX2tp2Iu-?_+a5PE2P+j8C!e5c3cdE<_CvG!CA92a?nILN~Cv zBEI6kck@I%nk^Ayp&|ipLi1~lYkblVbnBpy=#1m3e;>^(gC*KtBv3$EYkDJ6;7|v7tD&J4 zgO!fenLYl>D$B2yJ686o+S2O>#Su1@BND?$Ho-O|HiyH_`GUiK!GgqcXOM z*6(c0Z8wI#Wj~Tg5t*_O@o=BpSg2%r^E25p*)+LF__ob#KmEwy=mPkVdM&EDP18e& zpd}rec8o?^AT#k>ig}_|^0aVUvVf|l>S6M%Kv3UCAD-osrD&h2D}ig~u`#ApEKy9& zRo;~wy{8+=r%R3iO#!n_oYwT`hGk5F0xFhDirefeJv?ApT_<c; z7|`C<-piejdt4Z=`66`6h5=f9-fFvcx@?4LfoY|sujPG7+j52NI4gEIHV^J3Zdc%3 zphcj1Q14qdSw76%F*c?a39I_<6!=C~^WjZP0>|6_^snio@9Zi+5D{XllGxKrbQ=#X z4|lRTivBbC=k}enI|eL_&ywZ4S*Eh?ewqJblO^@cM}b=5u&wvA9*wIcgcWjcivE3A zSg812(fWR?IYe;K&cV)&otdyt)O-d|x3BHW0?^4^4X32ZuElX9+fv?&pStrGtGlM zUlkHH$y9I}6?`-@TwVRSG@r(uoY2Vx8-AmjDrGwmi0shfvDHTJy(l~-QpNkLEY_|Z zB-WoCI#tZqEzb2E^p^C}E51~y^J*G%=)1Fa@LHK6Fovk<^!P6ct_igz{YGCcpI$1B zc86;B7yi<=FWT2ZmofHYdWwwY3}fn-$EqQ=VPnlE)J>)ACOp#ouvbl}lX{$B97S0q zegerUOy-jLEYtPNX8R0X3-vBh8KoX&++Dw!Uo+56g>@!n7(FVrs?Ig6HQvwQtHD!) zhT1yEA`k?G;A0$@g83|vwuk>@*!BQTcvb%@HNOPSgCCKiaxFXvnnGSakW@ph~%lunLFS5=}NN?WWgB)oKL1?w(>3=cyf{%*13kw%Gm(_*e z3z1SXoVe>kzmzmrY=H@~w-IW;(Ig9APyCrZ8y|GecV!*Wsd4l8kG03Jw*Bs; zB7}~*iJ7r&{gzYHPRRLZ&6dea@4}(X%AMSWzGVZoTK)QEH+aLQ|0%FE;tAUo+r}-m zzm0V~%sm{{ebr6)%MRPlt4 z9bwv^_jdlK>q^pbbWZb5l30c|#6;%uVa zlH_lD%y@J@;CXWNEs=Fjr3UAL`FBM{tVYRCdxT%HUN~aQ7(O0RS0_q7AxLEVlkQoF zPK(9G+V8wONEE;%5Wa~0N@4)PA~8Vz)Dvrb6e4xOWgT78r^PEUsP|gxb41G!4%QgX zchRn+qw(3D9Y^g>%czT7VY9-B^hl9i^{CId8RE^NpQ8ybo?c=NHjr|mw+6}ppO(<+ zxt=Q)78U!|54NHP+aD|}>~w1_U8t_A3fRoi9%O3n_}T*GY3~F)jfExQ2?jpeTR=^j zJ?-rrT*01_EdO`{41B)2&CkO8k4K=kk}SHaFPP;VT`ZV|K|-L1EK)?w%*+xl=9XX$ z`Dg!X4*XA&^iHY$)6yO&S-~*oEbMx5Z{gqy^dTi6A}S*Bj|Ts@ul`q;|It+Me>Ht1^yu+_ zHvNyU{?$~1|7r^VF{OX5*FWw83noP*!T;~Ymm)gD^G*ZygWg(RT?@G4Tx||;X#;*e z_~#Y)jPoRhX=OhQ3rhw|QC?Qd6MJKZ0D5<1s$=IpTP)d4_`BIV*-G0PA7)wtZhXzi zel!N&4kBF~+4j3l=F#e*mW!l*7WtBa^xAFXj}&#ryq9eQD20 zlSl&*^t;S;B!AHyD^TSQbAJ+7Z{0Qv9@rHnhz`GV?Y@CA4uWJd1UKDNlRjYuBFvp0 zzr(`0$sBOqUjY$Vfoe=-v$?<(vFB`l_pe4ieIMxCLjtYRqKpGiQbXMMtC7Fe4Un-S zlWyFQaKnL59IrkU{j1J5IDpO@B%|mBm~h}?i?S|se=%Yxn`m(>gi4Ba4El)&} ze*zv@5S~iR@;4*L`wHwdv%lwr*BTzU5;J7#@K>Err~;k4`>=?aO99f_8MG*J{gVPn ztH4vBdG14Wa~Ro5uOBj1{MmJn+0}E;8-TG_O*vZ%;NXE{e$0{mji_VcNCB<y^VXR zt}n*XRQWpmWzbcPhpVIo67zK9D)hs9q`u(R(}SUNgl?r(2gMpRf($ar<)DA8+>&rG^-#48bu88;85s?JM-v#T}`cKxNK1N%M+Q4A4(9 z2)ELuz0V)TEOu=ae4j1YKO`huQR&EAqFaH6qzPK(khnWcR&`9oEtn8OmyZ;BNv?ff zB5m>TNkUb|eB7QSg7YbQp(ZjBr}*OM`xr^9UmxVQjO+-K0I7ibzEZpahATH7FSF2X zNI1{OR`PT-ldtrCjfkhawlQHIBfQ0E$d=*bP9VJhF8fJh7tqaevy;*S36p>S41ANB z;vYN6nY0s7o8ghwC8xC3vvt zNnQ(4N;9RHAF9Fh9A4G|cfAR%uYT*8awSWZ!+7BRiZK)Er}b{OyqX;Rk$$HUxeF=? zQthv=ovl&LA-#!T*=9P_tbw6&5jxXfTf#P2`wO*Wr~N$a2f9C-xJ$aHX6NnQn4f7`?A*r5GhlANWBA61)I>NhFhw>=k z3yg9d(9#0Vh6u4Sj{eo>cxaw0QE{*)gt~9fYJnOyd@0sa`5jv@2KBuhLPGN1`!;+Y z(*sKF5tkojtm^XxZeClxiD~|hQdsM0qfStUx;i`Wh-4J>6p1Sr+5Xl{Fdf5svpV>( zHC?~Jb+OapV>{6S!xj--Epm{d6uN~(J=&zEq2YQOMiuwxkCS?a=BZ5vX0a=VoQa8_ zfRsM+{PggY1i%3r%2o|~#B$5Ph_4myIHQ zmGviU-WVAmjO)_!cma@EH_2OuwXmBgyxIrA!m0;p<=X^Ko zKG_D&NighmQ#kv1l&^sOB(0d|AJ3Ym9R2FhZeS0hyfE(F{4KxCr@RCnUB^kNsFcZk z;MA$N+N_r{I{d%>05cg zpn;|GT}hx|&EuU8VSzS0@v)Mrr46N>>X%6G!Zjan;zG&^DgVW7cHN3Zq z8L~m-yFZEhHe&PCj4Y%tC)_Uhn}!Y7MtDF95oxjOr75=lg6vCV?(R+0%fZ)h0c9YB zDyie`@5G3GKrN=N_YI5$bC~nc?=DgOudFUF_M6%VU!cDSD*HCzZ~Ay-3=!&s=akS* z+kHzt3F_RC;s(T37!VC%tMyOiHbi0X)Hc;!<6sj(F+h0=W^3y%%&O@^8 zpy&Tsr{X;#V4af1FgkP_pCZ)31&oxG)RKE&mU^>5KT5i^&DI(q_Qz{_u`L7DPsqq{E?VW2@xzzKcTr zjGITt(&$By5Qg^1*u;?qBK%6_*ojMq{O8f1TrERBj> z)RL zw(>=qqOZyd8Sn1pX2dN~@GN7fr8g%bKH)u6snzW@$Ga*iHTsY;saGwLyGz7z%YDid z<+{N{cWQ86wfKiw3~_AlfdkbpYc@z6uuC*jL>=>gb)@$W($PH3Xoha+s?B=ae(p`K zp4~PS3h@5(YB12Fh4U-LwH8AjH#vwvbocq2M9fk`g4e7#U47~aU+r+@hYt^}68t1x z7PA563z0fDj~Vm#TcEo;k~2mPQlZCEg}xR+-FcItiJNf3DIhQiLGx}}%^fZCkkh64(xJX38mVfr2(_*@YmC3WRA^@dXNyupnhGxCs?`C<$^zq>lyQ~=$a zeAsr;ldxU>1JM>H+RdIYTr*anRp1$lzO$mDa+i^j+p%##Hk7K5GmN^U3xm8|^3dCV zd!uy`PzqB^%G?ZO<~-}_=4vDI9~E8dU}6#}IP~ob-=t>)jLg}gcMsplrXwl6r1zlK+!@zE z!T?P2X?H@zL)l69W$6zrwb$}V`A8iG zqXRokRNOfrR%v0Yb(Cf~VW**{-Y#nxlPc-eFVMK};~+0@Y#iDg>&Oc4x}V&x#v(Tx+itLX>DIAp7&M9%-4lC(T4`PDzdh;6s}sY zU(c%&ZcB(H7N@J9lhBkX6&)^@3BP&q(|>j!<8yX2aq2E5cyV&NHDs0H-ptp3ES@Vm z{X&~on41gbSK9|_C|y`Zc9a@f!E%Qy>?Yn;IGVh*oAn((bUE;|fjvXC^=;#gf4q*8 z7P-4JT+q0;4Rg0JfE%Yv5!=Oom()fPrFq*O?>5zhSqe}0ncPt8L#ib9PY&5Hb}k86 zAw-a;ucmJb^%rFJeE4uPW+dOiB&Mh^DK;oP6DHJIXW2(v`SZ^}fZ!t_kkTLtKL;Yo zKVnAStH*;4I&=juz9yoI$X51xqUXe=kAA-%aLNEJ6!(bb4cB{=S>k%?p8&$*;Z@&& z3)e2ZD`Mi{CLa{8HuP|My{s%=U3z9?W7nHcyD;F^y?&XsvBQh#AvMhMW~}qVg`$9+ zexBMRue|~MG*qk;{;1RM-XzU zG={UbIKJTE~J zemU^PVDeR!71mgLwjz&Y&LrSRaZCE7S>bGnF9uUzxbK4-lH${&T%DDLu%*R^Un=*n zJ2K|vu1dS?)1y%Dl=|-NJ-tTQ`u$Gg=QLRMr_ZI(GC<;lyv380r|%kSaeFm zuZ%KOaYGY~^=I)FVV8cj1yT(rO0f@^`;z0xOQQ2lWN-;C){gr~8O8{qrFyR4AvZpU zlO`Nv%paTNdN)_RA4(HsZjM=Z9lo=QK7iryLvXWHjVHyRB1+!Vvfs zc`AAqa%EeO;4)}+>CL--AlmZbW9#yR8ILg^?vn6(1Md54{r7WV1H!Fiq9 z+H|GGO3H*%5v_Udb!@E@2#2=acfEu(?f#iIdatB3$=DA%u|G^DyQ?BZXP3>aH-M6ds$%43HFxIF&sI5$$*Kd5VqJe9yWK@?#rTvRx8TM4Eo&40md3XdN3V?Nh&E==36P2PY^PP$n|9+G zK`>e@s3^(t{)V2WP^@5ihFX7t7fR0Q2Qf2ZSBA6~Ce2s*iia9Gmp3hr)H!X|&04gDz4nyj{^ zZ0Hf~pC~n=@tXe_V)=2OV)>Z2D$@jQSYmgA5T~Ae@rTZ_xJFwKZl?C|B?@-7^K9T@ zA-*Hrec|)S;=z>dWX?cYi+`z3oEj`p4J`pHJMr>ciW@x;9Ba9JO$Tv1$#J{zz6ikH zSAAZaii-TosLtK*1(Ie(&*!=-l^$P=M&ZY661jm*5rx{UoBjIL?m%4IWfWp|9VC;D zr$0y8qMwd1{B~MN^vLtzrVA)k7%P4 zF>9rJG#fpo1hgx|WL5)NPwg`V+1P$%KHpm-wdVjIU5ZyBPxjYUMHGn3lZfoPgsd9x zu#&P5g~?4^A;lchnH;LzNw2JIHIvHT>ZN&w>QUAG!-vh#D>i1}shvH^)q8zpieYN? z#fA&|pQ#I&wMPe>nfQnrX==r_-W8*h9EsvU`di8IJhKUlkX|Lc zH1e^h#CVlh@K~%>%r~pH1aPRlu`h}Wr>lL^d}34Nm>|EspW5h!8MjS+9CZ}-j3<_q zak>+alVWi>1@wR5fX24U#N3-r zbvgTwF-Y+~mp`y$@ezuXvx6yn0q?zCc|W1y<4IfloF~B_&`xf9OO;f(VlghEihu622~8i8t@QyC0a2t%uj;{8+#JGvkO>K&B{LUpjX(Cr0> z`bF=}$?DDM_2!OL|7Nqtr*Iv~QrKv*o*Bex#;SH-S83s8=Fpv62p~q*+nX+}%MH|P z_686om4h*hX16-Wk_TQre9~z{BYYD8TEp>ri!QlnIaHGw6rhA0e9` z(SfatwGl#3@XaL|dY_@1-IhXmxPbr%Ar^Ts>%))(fIS>C-+tMC^f;_Tpe;uV&n?9c zpQg#FWeCr%ll(fighk`mTTWM7G>vh^iPzTNY*Vz?}~I51R{oOvX{#ivW5SpNT@oS2x!;X zdTBmz_+29nFvyb8)>ZX9sm7I1w>~ISAw2c2k=hJODQ?TZKDwmk?Q840h~mc`3@a+D zCv$Ui8kLr+F*Jk;*@aLJ>J?}>I}p~%pyyiO+ed01Qmm*bN`H%>Sm~WdAO2}&P|dGY zl&O4fAFPJK*v3D}eUe8vR*+n9={!`P(Ng$+>!QnE8~_%MtoxC*tI^}>e(oP<{8~v+ zDHfFxQ=1LjrF{C$;DXT4h{tNxT^}hfg%|8<8meh?9@@{Bd`PuiwX-XMiC1AR>Hl?-=Ac-@-pGs82cbDNy6HGl}3&T z$&pR}n2D>DX#L(XiD>UW)ENh^57#V$o``tl>m*d@xWY=Fh7EFfPCR}Ytd>_Mg{gN7 zQ)~+jmhTw;o{lgg38U&uFwfBB$+a0DHlY(OjXQoXcc+rR(Sup6UnURVN?4}BvJYF+ z%f&g1J7dc>*ZsoV0e~YBRw8`TtbqLRIc%M(I!u}5W13H?Jk{>^u4cZ%{qGnDGcMjV zkYXymyGm-kb~lEuqv@BA8UR@ZD#PZKB;)x_q+&4n57?FCtF*yxb;!<+aiWyd!*r6gwMS@gZ$sRlUBV=O2b&EK>p*E{CvCGO2HKT--XE;e zjTipR#VixA#FnUd?=D)`trh;F1lQV&zm6|VM~fkwq9$eXAo;^eag$Za1;$e*ML?{t zl04i_Yv{Ek>P`sVOwh;}Du^%iYk(%1B~*^tqejb33B4|kEkEMGX^H$dzT#)~^f#nT z(u1Kt{kyE5W>f-^`R;B{-_xR;S=i;1k6~dR>c~p?= zz9`NGbPh)NFsPbFHOYuk5&J5$C^-Gmx$K+Yk`U?B~QuZfkp}ON<(*w;-mM zFHj9O*GtZ>^gNh|@(Se_S;+L89s!@j7bJ8^Tp6YP4Qm``xP1;bqBQf!t@Lj~!TMtB zK&FdI8ri|vpfy^CVrTL#*8;msr~{}zt9DWRo_Ge7xI|}lRsGML-#7mGiBdH7?@f%)`cXIV zC1J`YZPIx-pUUOpxXpZHoN{-6>;k=2dMnxRjdsy1ny#~ZDD9?qvdm?^x@HL zINA>|!?^#}&dYVHSfai`DYR?D%NGj#rUR1QgLFF-y%&F%q?Mt0XdB>qxHVH@KP5u9vA4M{9^X8cd!FC# zHOiuU2}B2N>Ois-$Zy2LE+(vl5{aoDA{ixRf-{|sfozYK zHwa}uCX+Yo4&dhYZ@5K7jJLimSYepHXDh4QFmI3OOpS*|)$i3&)DJoj0$$|zc!cRt zuAI9fl%c2Ay5DKEIBa8ZGD4za9G|f|Lhx`g{_dDXm7AEok=h09@^n;Fb?}gO>+myO zLabGqwT(v|ZXtqt=XBdK(s~Hepst9i2@w+>E|C4+!E`A+@YrqbZe<+5dg^1oi+DqI zB#<)nJ=r7GsE2xH<#fzY3|UN9pX7mFmT9ZQ<28V!k7~;3EJO}2;T7i#`0Hq`GMzly zqHUMm6PkYZQ51j}A4?P;f)!BEZDUoTcSjve4ffv#SDipVel6m_@89=Q`BqyX^ybBr zSx>X-#=}{BbhN+85E#b5TM~$HJ*E+(7Hz@e+JO2upSiL2uBr$7UE_G7xqp-D`tNpe zRK8yA4hZ=aN+fz5Oq$kQ)>NZmiJV>ZN*`{QJRFWkzJtPJ)J~&ofMuD zLhGOYBh5%9EeNEnRTdhyA(O9`qgXotD_zYc?pqU`c@>Quj~ayai4m*No@NWG#J5SfhQ7Q|>cAfqM>#La_CAo9?JyhHUyPx?}4)GxHKqp|*8 z+GvURo3~x3zVB7{E&u>r`TV3!ReO?TS&WVJ+$LrQ^4gT%m5 zc#&hyRMo|&l^X)${RLxt)PP@BARzSL^L&Ay$ej2COWXP#8aDF+KntXA+uPbwrj=fy z#e!@0SOT^7ZoLuE8@2|ZcP$e=+*H8FhC-`idG!Vt<95Bx8On%};`NLm?K!IRn*A7z9|e%eiF6 z{X)q$Lle0@QWS4^6;Uz$#?z$1sFyLDuaCYIS)^oSw2ZI0P=FTL=UJ~fZj3`je%0EH z_#0@uAk*-CbT1cXz9_f}qSp?jw+?4&zeBJ`g1l!x(NHJzhu~Dai3-`dsPaoSqkTK{ zI~T&!ba7Ib_B}66)Zf<@$UP2*;JbZ13L-$_lkX>jj%R8ejl=-}j2}q6h$op})E~}b zmXd9`C!AJhJT6~%%Q00p31@ijk5H4k7ttGlUGR z7qW#Y?J==>%m^d#@{o)}3xK3x(6_4tUl?T>cJ#kkNfsu^e)Z$wKzIJh?KBcP(k?GF za?MR=YMk(%R7JG;Au-C@;#4AU6`9wFDcr@aZjMY@l0LO+;AlH)LuXmrRlhYG^ z%^AZh8vuX+9D=zmd+vL<*&vgOtP}JH0<3ex+$Agdj=oSp+j(?GwhvZVSkDMar#lNk zSD4&WTCU;flRbCDMk%HEo$y8i`Qlv9B!H)o@>6BWuBGL2);26Z2dYtR6D45!#8zFD zB*Nx{kZy`&FhXWa4kJOk#;aeIAIqbIFn>wprRGWib~CsHz~5d_B>*E}(=9^}cTy97 zwwId{XsrC0+u#NGXJP4Tz_{TMyA4^o@w1Ie3zs%ZH`U-y4wv;3$K>6%+KF=vn$t*6 zAk0y@!Y4zsh`?q<9>_6bZS1WIR(N4d=^#VD;r^L#w3Y2mU`-=TCgxt&Sl9J~@@ySoF2HzUU@^Ee(Sv5;m!$|(iU&iW2 zLcj6=lxsL2Tb@M1M%hNu>F_at>OQ}MbjWFv#%50^s|oDNt8GSpx_j+hIWJ@ufDpME z>wnzKe7~mH?0f%!ajZ<*oI8K{4qUU@H?xKuK#SbE+&qZc`U}o^w7JazP&nK7_~zlN zyFvO86Kq33IZ0F*NQ711=UJXF+@KL@3nLI|7b>wr%4e&nt zc~O-O-D9VZI_$3+Vy-7S3V|Ofrp8s?ktRhIJ+Id(8GfyEI3p^}u+4&bucR8R#@Sgg zBGwbjWtL!gn}me&d_l-VcW7dCOfydnNPRwf^ho6Qs@4`1p}ZPL1Q1s&wif_`-qA4| z5JBeFKv$`fB)kI8j?q+f0j>vD=&=pP73hY3)dPE6XN#U^P1JbM?N+dZ(&QG5TABv*vMvVMZ@V{?0)z%cy>rI9{u8zTH-tTc7 z%#L$Ec7kz=*y%oTXs)YY5kPI_D(AGEAAnnWT5MZbp6+%5Fm=?k&q|>oFX1)b``BLF zP5W8OPIoZN|6K)-ldC(6UhLzzz zo2T0*8!B8AV`-AGnmO}4P5tHVRG*!;r46(&xIW|jco*}u^61_Pkn6H1^)1Y;gG;*ob?U>rqJu_1 zny2e$;8hcSbgn5)y{$q7wv~Zio?Il(^X&Y7*!6j*gVK0bfO? zz2<)rikC8CB-Ib==qUe(coUYc#|)U(P=J*3>q8m5cH%@>7Y9z71%j1mpJ#n(Ro(w# zCK4H+#GWSXo6BC}vGMpd4?h?~w5Z)0NLw-dFaxr2D|>Z!UY|?TKt-joWSFMY>!c|Q z!~24{7sON=*x_moc4TlwBRmagFox|)Wv;?+islqaI@hdZkDx}fUOF|m(x zUVt23F>L@);T^5%LR8!#a z1UQYBJC&?}n{qp#hc)sC4&e9;UjDW=Edvl_{eh+5aEofd495Xk_1FHyIUz>w7Xu2g zxTT&$%Ris)U5^4oMz%v@Y?FV*hVynIabPui(&T?m?mkvw;bT5g@#`4Bq}S_krdkq6 zI-r37yr+ksli{wL32TF6LxQ0PPQsSh`;ZW&Bms*Jf%UD2d5$ZCVjT>>tIu1 zBYMlC`|e#5x3%U1O`R?UrsJ~TNrak<f-oaF_ufvVFH%?b{(0TMTz~nPwB`7e* z-~m}XcDT4sGzP)L4Zta2>4tWkCc)rCbbqGuIplP&{smc+BB;OMK0+yuTM@`) z0N~^=SDofeWn|!8kyNMLAyw3RIuIcB3a`%%r+$q@XXlW|>MY(N0Xn^{+NdoBRwRHX$JjDYo^ z5*?Q65Z1(5b~X-8;ND?Z(I zYj4#+1;K$dy0XhNfEAKG_umnh zf3IrxmjFqK=56HXka1fwe#Ap8YCb zULfv^YS8n=g>N-CcTA&K-BnaR+08aifEu=@0N14q;?x90Uwvs~aF3e!*(QV2b5j76 z>0_iClKt;ln15B!1RCD|O}BE3kT41WfC`KnYUJhR*{pw)+SH35<3E}?_l>AS4sEh3 zgm)Hd7cCy`EPO14lCSKI5S1PR=3x%Qt(p6Q(5)tlr>uBgSp15e*m(WUuc{rsivoC8 zFF=h@F43>HD;Lz{Fa>3qB4aq!yVpjFmija00OAd?R7~krdOBmsB`H^xC&^-b3dqGT zZLR{;z^qQOYbmsU?!@;x!o4-h`vU`+X|h87S4`Ff!?Bz(WOZGUOMQ{sNqEt@TDlZ) zGa@Xka!M^dF;P>%qWcb-uT1s<5RTkr)JG#o?8*VME9+GRg8$>w(@^R%rn?yP=)V|+ zj1tcN+EN_Ih-lJ*ws5%LVyQchots+;dh7=46HQFgdNb4{UFTetj^Pv$fz;Sd%u}wM z9W8vRc-=+_lPl+cj&~D^-xbuIz~B20Y|!(LP@16a6Co78&FuAG41+8qAOvhs)9d&o z^?sJNSdn&-B@v2JT{B|{#V(9h7^sRKF=3j?qXZvrPH_T+fyycUB-eo~JiX@BhgKSv zKPu8?tjZ+{m{T}`dKsTrD%980#s8E%X5|}zmgIsVnjQxtQcvyb1h3~U{8O?6_oxA? z|3&VnH^55lKKh$-FftitCqPRF8Vm?h0%b0mflqb*s%JxfKn})Wcmnu9+PeLl0QdDZ z6LWwJ;w~_5!F1br6lEZS7lx;D?UQ=7xXd4}Hh!R$D7S!o1z~$XTnzp~X0dQ+t_s5BbZKH`IMe@TtAQ!v0NX|LjZ#wcsveF~7kV9z)xTG! zb063z*K-ACGb})4KJk3HrV;(;-SRr&D5ETuB3dQqBC<0P}OowytUV1o&VdcMBWExF8D4^mJqs2^ZyI^wO0QB zv5-gRX~eBr37DJX|CN;fV|#91NsEjM^vS=4_nNyVpmwEACIkfjMw?v830WjiUlowJ z@^@9OKuhyfpy8)V3-iA_4}cP41`ZVVqXEKeZO4CvfSr$lhBQ_^oqwfufQMydfMbCB zI*a0O7bnvB>ii($qy9=w0z(cAxKgyg zW)ARmXpR5dD`_}^h6{EyG=D2||L;GLb9qI`|M^=0|DQUXvDI)QN^Uk`+tEnr%QIy} zs#r{Q%-q_9afZeccZJ6`qZsthtD0n6PtR|$d^*M=#U>r-#|Dx#96{F?+X-3bF?_J? zX#V{hM0X>P%yuf=H|vF@!*XC}+?n_9yO^XmSG=10DHIVi{PDi!1`{liHI5q+`^c;# zNqQk>Et%`IVP;rPzt(|s8<7kmMk9O5ZP)w~xD3>|wTjt*auw0JU${Wk9I0OQu8Ek} zu6&4*=s1CcMOq(2(^lNkktfX`CnhmVDbz&fQdf*ZnxAP^EH?vty5DZ*G3KRvB9-g4 zPVB!2PZoM!z|e^l|S|*hWU1^kI5JAysc46+ph^rb@XfT^OGDKveEe*t*y65v`7%L&PkW z^8yh;95+++N}dEOX@J4{q#G#y_0iIUdOKa+#6}_Sw|7DGTqxu@#InzKX#KI{Uudkr zX;35&E?m^DzzY3^FGSeSk{a^pvH@-QcXY8H*aqQ}4kbCG4Ms*-CZ@nz1$zfCXEb3v9FR zuBfa@9Q>8B`>*Ixp90Aw`&P0P_I)ITt%8XSfYi&7w4!7ba(tWwzfEruUg|Id4Y9qX1U8dq-(5@us^?Q}uJ;La1DXUt>*G279^0Xq zjj_+&+J#D=ldBi|e*{&G^O|luWM*a#R_Q4h=oVCz;MF4~YU3_TBei)hcc8?#ZznAC zO+9Z5jmtKAAD-*ILg;k}ugruP8T(F+@})J`XJ!tA-PRS4cPW>uj(zP#J9Kz2r+hgM zJokr0?I+zM|Gd4iR3?2H+4`PTY377vsS#t-qozsdHi3e5mwwarQFE>w_M7o0$yOS% zseqx3^(s6wOXAlUUnCSc_LoPU`=0N$(jzk=_LE+PDc`Q#IPDwwD*{Eb6HEl1Y6Nx0!m2 zO0=()+_rLhRCpfgRE>i$M~gD>r!I%unr-$+Yc~0-rlkF)JEnEs4HxK`0LY*<_c)_S zdLQM%u^0Ro-CsCl%qhfxsG-mOwqg`cq~6C|tj0pvokSJB6D9)g!^DbiF_4m}BrH>VI>Ym$Ru9Q@4pq3rlL{}3=@n{w zvO(AHc82c9BQ8d@DI2?+tsxRyV%a}>E;#b_3!$-A>6MwL-5(beCUQ{wN3Q(g&ZJ&V z&8G-x(&@}tnjZsb&73=F*6vB(vE(UqVf?FS(*6Nd?@y1q@oBn`b+MOw&Qi5bM^_sh zlwdPr>lw}@oyLqLWwOI9J|~c3KcP>}%^W0Lc&5j1WwOB0*BiZmyJvt^A=@#%A$3OJ zY$Cz_#b9MCvV8%UY4@Fi@VzNasgJx|Vl$tVlrcw2-J0v*Xw6Kp%M?SCU&F+q9DyW< zL2Vj|BdIX5Hr1=Sa@JqDIUVykuLW#`+O(`IH{(P~S+OGUp698ht!RI&_S_-gozK^i zSdiZ9G~?(u92RS9_P6r4oP~Mhj!Dh_pFPz7{o4sW=CK>#mUK*sRuM#d3-(*~c)q7B z+X^{l-kFhSKC(8#vFD+kWi_%eYG6Lzf8V_Y(s*`;;b#}()e@?rVW4COOnkMeDp18y z5?dgPxIs+a^?$MVo?%TlUB9RzDvF4TfS`bifOP2^ss&IGkPe}Vlt>o{y@>^su1F_< zKnOjw(2Ff}2t|4aA%qrbp~IQn&-3iF-}id=E%*6!KJ0H?`k&0q>g%`G%)B~IJ^fJ` z@~EoRZb1)f1@PX}E6WRN=2P{dD|I>OXljAy&%>?yH8&*rk#hJj7Rei5wXXOa?9tv3 zE_w$ic!xevR2*ndLsS{Uc>N$|$aPF@)^`8K=cE5|B~~n)1FM{>zTE*=$C8!$zxA^_rxlV=`&g{cZ;goUZq&kh!*l^Z>FPW1<~Kvbq9^CYe8q+vv`~T1E6C$xPynbU$krPSd@tncy_w*CCq3l!goU z$Qoem1fzJgh3G|To6?SLD}5_8n<>`Ov5tRfS3JXy)0q|RdAQD6!oTP99(50<;orU_ zF~$is(&nAEzUA6B7bTwJvCILkf`}_BwVtIr#uj})!x|+Hj+oo2CQ5Oy;`eSIZ`;dq zE_{Yv)bo@D{=N+VoADoHpAjR+owQSmeQP{d22gAXFZHTL#ar&PNi#ddJTa+$Q46Yt z@9cWAwUb~OJ?C6JNT6EL1l-@Wy=Ld?8ljt1E)XNLmuJZOvAM-shvcJ{C zC3X&_67$xi=(+!h?=td(@N&;1*B!(C%B@~W+vC`h0DjF%*AJ=k7QbS3?IdVItY3&? z_%WcN-YP6%v(kqoSa<82&3hN4!D@xJ)f)l=?K!D4$3x>ECfDxSMHGSWRGDvx+uW2kF zre133!DJa--ADRXeBWX*{=nDRzB()LIh9CO2f7aQ_J{|@H6yOo+ixdmT8yfVd1Ykz zYuD%$PGYA~Z20EZGUKua(8P|h(P;_B(X8t+@IxOPvx;<*y65ste3r9dQvc-6CjSM# zh#U&UYZZ=m$;a}ld97KXhk>;3Rh+Kh%_;2BtmQ$fIEdcP*DcHU-XE|XT5QfifAHJi z>H~I3+@|*@-~4Xa2#Il4%46{cnN&fa@(8n031${)AB(HAD;lqq zs?d4;GdqGXLe4qv2S_^v_Hfi=uA5sMSRX?`_TS+Z2Tw;bfAJ=cFgZOv*f$qUFa+lc zVAjvohaylXJhNRP$8_>^jFK*i4%hlDe5ft*+7PH(qy%ZP_G9!|esG{Nq*R6eLF z_O5i0^&^V8=Nui*LaRhzgJ--d(>XdkIDxo$-rMB1Q< z_PznGEopnW{m13U5DvIl%j}AF$K>nx17sa?!rFJXPR8xmUqqYzqf%5+j$HmJctG5X z;g4AA^at-RI1zm|S|rBy%hJmPa%9#BUoX(n@#YPdtZGeEuLQMNeB+&3DC!oo=_y1n zozyRQTE1KLEN*04u!D)QOgTOdSvayd>gCyzcI;$-b0YL}_ec_pkfD7gLE({Iie^lk zaap^U6`?cDxKtVKx3+9cIB1mHu+XT~Vf#omfsU{h62DUQs#InbsR{WHV#8_nh3rb>*Bt#-4Ejjk7uEJPPHU=y@{ z{&ZX-^n72v#Ft%#59m8YK2`cXK$5R+mChIs`cM!}W|*LVq#6 ziYEE$gLE|-4~5j!mPS;u>?fS;UL#ZQJm%?xH=^R&_b@!DfScc`8AMy+89#yRCx(LJ zHMtVxP+9i#B_))Qs)SoGMY_4QJh{0LeYEd=kAkr@(w*U_23i(z3-tNdk6uijGI)h$W5M&grL zt_8Mg^sh6ED#7yw(rPSwWW`^^MESQrS-W>g7{O9*m9#Et6?htI=Jx_Z71|jO{??ylm(?AKfNw zI{Z+LLq$5mFs0aThkCj+sfI&lKU3-j5s~CLd^s|sJpzWce(QYX~x$d@FsE1o6COb=on_04@IoS&_px2LPM z9Z=YZZdX-5%k?q9%!y4eqXGs;_O?gOcs(kQA((IVrW96<4D85Q4P@u#Jy%NU=Kn5! zc&B9!^EafMy&`G($#AtUN9E??yHn3uRo5N|U3_0MfuWV%)njGa%#|g z$U3>BSvq+EqV`>e&{BKet;g~zM(qYM>#k5I|8^*5zL7mV$!N3|cq5L9ej&W*4)nIL zhC;Ykn|=7D?R4A0@~`$V%aqmZ1DB|FBXo?BW1;Xaf$P^S&_Cy&5+ECmQJ*r7qB#D| zu45$_C;Oo-LEQaSauP>h_vd?fF{Av*9CSr*NL^=pgPX8Q0w$u0==J2ng$wDpk+Pxh z;L^M(_wd7`N_XyF)un{6w+eUG9hCN;5NC7$ZMwC)`lE-9Sh;%EW3H*e?s>6eH-l5_ zn`Kbr&r2h^r>%XkxJ zUJm6bRq+l&NE*8GOu4|xe1F9nhZ;XS)xYk#5`XI6%!ghoxh@~v+>*u>r1LdVm_QGb zMSthU+EN?84{NgnEdtp6r^&{pA5pB0xpF80lhKU{{~0FM7+4@}w4FhjdmGL}vqDL% z_{I*^4(YujTXcE%mL# zAs%zB*l9Q^a|5&ukqnh3JV%`CL>)Q@15Csyb3)}%7UP14&kP$)DJrgac-Zv`2(L^t zs=O2c9lh>r&%IL{^fDeZ>EAwpUDk3Alo^W^mls&*xH~!N+JtahkDlh$>32>Lv%8K~ z@ze%3&w3316C7(e!nUxH$!9`}31L~kcfD+Fboob$sYZ`h)6XxzhB!Y}e36O-@JWJ2 z^J=pP##%YXrs~l&kGA~lPq@%a&tCb?OKWz_#X>op$3|;}ttKz&*V*Th;jYD2r#Yki zny(~h-Pv3pUn7F-??;mR0DYjRxei$jt6GWzNqJK{%aBC}UHI)Pq(U2XWtQ&#!Vbvm zn!03tSFd!3R(U3H{4l_LsNsygZTXA3$gDx!tNI>RY2`^>!-Mlv~oUK^BSk754&s9f-?+*pdCeZU5#c>MrQmj z87^AH?*f;Xg>%^~7JQV|rCzi$MlbBR`&_L<`*mWax97u$@5*!X!TlBwJPuz@^H01H z!ApS<$*AMD8!Cwwtld=t$=BB#$zzIawOpZ>#Xhq6?mk*7FOFH%1tHJY?>#q;>({^O zSPhpuM!tCy@Nilw>en8v%%?C$qnjK`pCS^OXRDjEvZ@=kauUT>RknPW${r0O`}}8T zi@Hz_vfP@bi7YFd%aj9!J_#Ns#w&Onv7)tv8{Pcv_^K4qCC&FWwe4{w7)r;BPp2d{ zQFH>w5zO##h{Wir4Vq_Yq8gIi2Pq%s3^k`+?nOt9R86KsL*r9dJF*j@R;zs+)QD?# zS6AMCK=)gtD@A~B2Z3Nik^98JOLLH7Oh3{bDax$K4^S<$8+vx^{dDW@x+jFoXwEPu z*bQn)2|-LRtS6OTR`au4`Qey!WbS3diJ>ETq;938hA^x$@C1upv+_X~qn=@dxlY3? zV-ow$<;#>kqN`VW+Y-N{PaPWy~-0bX?%d_63x1FgyEIu)#suzS<&dv%G zB}Rw83t$${I?i?2=%7Chu+?zc^yQMgkR(RePxJQW1H3P`I!_j-%ej|7?@@7ktICp+ za%#?%FsK48vxCJrx}E6pO>WQI!_Nf>(Ov^omuzuKG^QN2>`tIfpi4o5# zQQLmK6~>!S)%xVp1+E<|Np{;I^)_MwVCwDo%iX}V+sA0kjwarIw4`%M;0hDB#E5s5 zs8#PbojjF?4Wb3Jf*Rcm%_@C;lD5&!#E*N-cl9l-$!i4MElB_T@ThM@H>Hzziik9u z-ch>tZtKLMG6yxBY4M_-I%ne+Xa}mt*7wW7EY(ESlB6!sYb!KI^9lyivI*ZEM3CeB zi>S|dD;LE)lKZ$^^PY1ve+gZsZrS7tCyI#Il6;H1j46r}`@+ z#a=PGH#>=^2428My|;2(>_rZ`GbW#>sKjXKvgH-T$1^Z6a3YlzTRz`ExtRPjQQ741 zR$1<9ENGTEvD)1-Ug0LHoaZK?oIkHIU-=6{^AD?j!V2VKdil&db+T#Jx2*jPO!F&X zqIJW{x$G(a(XaV0ko&$QWuk0_QQ1A&!2*aH(>(~eR3jco-~CUjFQ7PwCzonHaGxaq zVSj)>`DRllbJ`HXKWcp;_ZyK*wW~?oZvV7D;4b;{=tkB{-G{f@f6>)HkzA_9OKUFu z!yBI|Up)p~i;%vR5q$Va>Mv!vqXq`Hdu0rtKYXzJ7tTjXzMJ+Rcdh{o=#&HoCT={g zVE+f=O}3m=!k`7>F6m3Gz&~8-FDY^t6EV(7@$mNHuUzSzIcR}+z2Glo^tVg(KQJTa zPyNbnmp#IE6?@G;=dS+ik2y8Dl;ZuFpLFN{{SW`^ zfBw&Zh;d%+&^M!-aXs~)U->_O`|p|jx9QH!=GNU=fAIfK{ii{4p{JD<>t-HH>E?Bls@h%+NXhZ7FO zg>$nD7n5HDG4F5zGGYWHJU*28TB`u1>a}d$yKwbM85rmyiD3;njBv^2fUol|FaZJa zPdX1~XM*Yeca8lYrKN-MI3;9fGPj(If|6MS%zh0ua-Z%nD%}VariKb^YnC0%?PGp@ z_{3qT<8OQpEbllx=7!u$xg;RiNkQOp`u}ll|5e&UuU+jJxU{;!ed=81QJ_T3u{X*d z9!7~$62MBUPW4)m*x-vgASb3Y3d zR!;Xc72Fk>;e04NnaK~XrMj)| zhZ?xf4!ADsOn5|fF4Gar&YUb)b~w?Y13H2D;(QbAv68G-ykdypL$Sk-?7MosD-0+o z=k&n9Fs{C|!;wcGd`*9~iY(=tV0LMaMaW_FigKH*g<}bHZs1<;*MK_Wvp>9S4@I8i zNBvdNN5K}i-+`ZCi=!&LdnmzS1YGwzI>G^#8o>p^SyXEHp=e_UxGr8V<)uVHX)OnK zdxEox|H5Hx)hs7qp8YEqDA-nsE*M$!to~3&E|U!m+>TRLyZ2Hql&p`Nl$Ab*q78y< z<|vcyli3jk*kP1KFgz4Htd+s~N@rR|fDdQ@16`ylSVIp*9$xTu-VyLz3Ge}A55#TN zcQ_xg0r;^qnpn;be1I01{Vvz2*`dgD6EMV+255bUBKap8AC%J^ia0gEbPQ0>3OoW! zl>!u&qW3uzZJ6(a)d|fEXad?C1G^Qw^~nCip=cuk)XJ4Ew;PB{N(~sfNH3CfsDXQA zOM^4?yZ~g*5X@fB)vGh(iW1mk{zbqJB^CVj|LW5I=RH3$0PDkunJh&g z@rN*g=y$4V9h{0eM92&UcG&iKqdnlk+9xo(+M}woKs*09)V~&J;lRes4;Jt)Qwo@! z2C~eWa47QJl}qWiAx9lD*TGLHa(=Tr#5zID08B@_v7Fl@u)1G>H8WYW?1!OE$0e}3 zP$68>$0PpCK*MtVA2|j8d4pst{0J~F;VB{-Y-^Do&|!$h_Q{8$4HwV}Nq_tkutzu&utV1x!gwfl3XV(@}#UYmx1_sW%J4rJiiaa`i>jp=Q$jU3t0cO|i%D;aI;>e{C zffkZ#?l>w^Qi*1Q*ch|V%vL3a47IDpw4CZq_p^<$OGbe zR3CX)J`cc8gg<^WbeNdzY6msodd{L7yZG-@AE}JDubAYrA1QPnk zB7ZR)E-i}$%#-*E0Ys%7Km+1+k$r;p3n>3?MKX9zdNGI%46W$a4`eq~-*9i~ko2`0pn3|0hs@+z@5$?n=wruSm5F zHosk=HW8eZ)vHsS&xiaKwCTs8Q4Okp5X&);89cE3B%-qpb7m*~5{g|}5w zxNKJ<`t-|7(IMMnBr+PxL&E|Q<*!-mx|f7m`PRGaBeSzmY*o88qdexjV;6}EIkIw$ zRw{zQ@Wofoz1k9$mo`I*A%6(a{p-oG(Qw7aFA(nt`Foy%*Z%%SZFR7>p{8r>VX;j> zB@ZH{%o`(0=JTsE@=6DJLS^?i7a_e*DU3J@@JU`7Q{l2Q8*p{ZYO4sYbp%yhd8BVn zhV;iI)?bwf>?_E#EKWWh!*`sX?0q$RLja|kOohrdGks%DhU}0P8)<=fiIZK@EV|}e`}vXL@x=X7)10>TKwB3#=J%HD(A8Z zaj+zUaGTyoA7aghsv@h0d5|4HvWi$MDZSFjUU9Lw9bzMXvO?0ORC)Xzd)ULB#WIs6 zp=DK8pS8}4ow@juAf>}j%@d;&iUzJvSA<(+_ltNxoxnt5{4-M}+5 z)EA*i&l*_V9{cUhn;0xT|B^&S$Lh6ESfN(i#F>yzEm(caExDa^>H%ip&P*)3{F91m z74ZRc{pTKCkGS}W_U{(+-8ag`f80~`43n9X(ncJ!{;+mbbyiw?Uwp+N3 zQ4IrY0GXkG!-`5W`V)K?5eB|vq0hw1;hAl6Kjhbt2D8Jjv>?&dE6rA9Hm|lzIxvHK zNVnIz)w&BzzjqbmWD?q?R$JG)lm#)KVLQY+S^lEN>)H)HJMH51OjoS*n5qk|V#LmE`jQ8cN^LCO%|Kc+Zveux`5t%@dZj!D7Uco#Q5m z>vN$Pt;sKjbN($s0Ii;olemu|zTmsH0y+NU5VKQrahCDiHQRGJ^ih^^7SV8=^hWw4 zE=0*>>=QcqQ1+06Hmzt@PD zay|eT>%~`l@&FXzNlG*YLf6ny9_moD&chQf)~iQ&%V_+t`>}`$R>(uL9UNXP*_uhf zFE(#Kd%ux`uC2uGlg%N}1V#SsH1_P*3doLLsMZ0HYcA(NtTSJ6t8m3myxUne87cYS zYnVP`Wpv%XCkZ@?H>P^*s*SFlO&{PrA z4)QYg-J0%RD8?B}<*Fnz8o||rlyW`nTKLOsyY_x+sv&`F3D#^*2FFeOpi@iCNcP>n zh%3V~7^D}1JD;02R|HLbw=7&2(!yop--arNU5Ps$j*m49yXdE5V28O#w6t0LdXnui zkTvh60w!3Z5P$9FqzXwa8O13nxoiP;WalhDNUS@M!Q$=?yH$H(Hw1@+iAL34z&klJ z1lhNJ-V$-aR`nV8S;J-b)-;38ZRVAY#xKMv*?>189_ik9rYVI~h}fPm(12JS=(uw%hu~XScczP;3B`n)+h*ee&1M zia$ozat0vE8A>%j1Ju@2jw}P`KUNcKcX+aQ_c!X)P)VNF*u5Ut+^VHYg2}XWWrnC{j##`F?5pE{V8Ovh_9|3%rZr`&21d=LVmH-`{C_ z0-{O$B^~z$gw8M7DknToec#2E?EO)44WI1SzCGr%F>;ZpLOB)W(?)v+qXe1TC$f%zotYSw$LT7?=~nLZRn znCsSgExNQ-6;e4FdlHZYoZr4P!*<){?rOn%;6nFm=Rx4hG%4R0*etUyR?g>Fd_N1B zO<5Q$6rt#-S}Zm2oQZ=uH84o(>Y2WUx8K31Q_0)>o#`Z7)s%P;vWv0ofWJFlQ(!L4 z?oI{^cD+1$OykY$3iOQtklble_uu2yBY7lwmll^^ebi)mW;3uAt6~FVL;melG4d$| zdH#(n32b&Hof=xtLcZwM`R+BlxhQAm?^3`JE;@r&D8%3uIeuC3(ljL-%Dcem56@J^ zdpm$T_2?g`1x+f0$0~o7R|`(i(@RN!xWpD*Md=+WKKMLsxH-?GAshrugoyiRnc!G$d_{BPi zUpl;X6KWg0+?zOJ(y8=xZ0t_KfdzOQ=cA=yryM*M2ky}x%h3_HZ}ABE0~YMRO~x9D zTkCL;kHmID(nV=7n6Z-9efs}_9y4lLC$VZ1qzb$9BF?jc<00* zUTW?7O-6rIdx@TmG>`ubhUz}{W9M{U83m$j#MOX7c>bY9`^t`>eX z%zCF~MHUw=EYEARP%)it5Pv8s$GRzIE&*;U18sr#Oi!c*Oc>qZ>_JKPhXJ>mxR63OD) z{}~%gIzcNbsm5=g(oqNkb<}MlIpTS?0e&`Fpl)}CVGkR|WEp!cC-t&&wqg`6)81om zy$=Nfx5C@$SUhksh%lM$Sq(o}auzQyJinw%i4bjI&pl!=T7M(*@ka)I^ADmg#=r0- zZhxZ|{6)jNj=eB@{t9i{Odg1g+S!hFx0iT<=Te`!^tUJW75;&?Pj&!pF|vV4Ahv>> z2egIpX|jC&Qq4fmOmU{139tCxW+u6o<6$p?mWHnr#bJP61brSr}uR5LEOGZ=tyVbLYj>-|+2C4?8ViJ;RqCYxB!`^Mm@!vznredpYp zHYpvjOc=fcj18Zx49|H7kpB%xULGZf2Ed5;=1g=0Qi!ksQ!tGx`eWH!7!*7ODgK>^ z0R!nVLnSbc0oj#6%}O(`M^z;TEkS_@ms)vPy5KVU8mlqRXyWZSnx9Jqu3d#%p#165 z{{6FeZm_)gadE!usPD;V&Cdqj)KW1;x293E5D`fwcC^7uv zKGb76D%c2#dl8l$8pWeoUt4`ThvgJ&w7_6MXo5rS9qP*p&%x16e8qD8W!`{GX;5n| zVyg|v>AWEOn^UW<7CsxJUJg3^;tq1H9$Kb$tVaaG78j}*@q~Bt8p`}psi_vm!9k@$ z8|ud;(4m)vuJZ$(qW|7)7Iw$dbG=8mTT4@==hyF2O2`ymG&^EO`^jI?2Dm73>{sHn zNw1z+sOgd+B@-zV3hJ0V9*`7GE>d#V}kez{L8EeclRwutG=aBjcD<#qs4pV)vi zOdqSz{rYwStl*Wni?YfddBsHI#NwKKQ!!w}@FS|dx>?_>w~n4qYNOs^XaJT_$O>IU z;_+>hF`$OmZ(WBQWXV5~xWcPFfdD~^rq<)0zeyth`Y$~Ap=kh;cdY+<{Z z1!v~ntUmhFp}uO;DrwThr&g$td^W3yu&A16k8s?a$)fYTzg~0=5lbAbdQ8;BEP}EP zI)m`7wOX6J_4PuFcCx#_?|W|4oKHK;n`kzt)BeFr@a@!zwd7kWxAxuhjB9r{{pr*` z)w4**MrcZP0xgJ>+5gqOU{hfQ2LWgJTQ5J^Aqn4!K{}e*WV;3vcG>M4K0so!wuF#J z4~A}r@jfkcCr#GqNGkT%Z1w(LGrbley8S#2^@uC(cH6Cy600vSPbHY})W}YL=TyE{ zcBvzmeG~&YrM;dHPj0J!fJDFNVt&HhXY01q_kqpFuz-pF^t?%I*(t6|bxq~%)##p? z^d|Y!CNjLcwlr+}#>~dIb}I{hky5xh)m~>LN~wqwzI0WM?Zyh$?eh4nEoWN1Zt+vd z4o$Evdeo)&Hrsl=-I$L-vrt{H1yxx{-^(Q;N!eDb)z(STw6`HUJ^gbc4=N zm|w#)t5uMQ@VMzwraFMgc{n?~;v_spWM&2=Y%S8l(Gn)6Z|R*jTu39qk)?fNuX4^0 zw%RNoL|(tRl`yu;>EMLWtN7KgHei2CH4#gd@D)XVKg?A zkC}MS*acU;{HK~tiX$a6X9rWyNBipOd^m2876sD1&)73KQbJr8#3q0E#)C_*&&sT% z-&@be72U$Kxs6?u6u4*awdm#^?5s6^du3dfA-aHt_p*i*46|$&wv_{4`@BUzn9Z^= zYo>+@7ObiiHQzuSpydk+ONtBB7mcqcGF|JXkJi85CZ*~7Hg{!;(dc?BCbaE}0 zu44t$pGfP|H5zJa(Ud;aRKbYd?he$cwyt?w+ZW*O0hC zHXmUlCoE=QLtEF7lfSHWlDydIDcAkIXsbq1%@|^S!XgM)6|mKri7|aMNnT59Af5lU zIM-V{N(EPNX%iI%zj$8iiIp`{m5udT|NLct26D?tHa1gt=Iiiq#+jVPC2RUxBHvRU9BwYlr zEX-EdnuP|wzqk>q?-z#$`~{_8KrL-hnxh$5hUvR_o!gX=i|)RJGLeo!@DOMLb7)+wY(#e0_~Kd zZrANB?ZA6nBv65@Oxo)9)AZ4*ynIy;2*{f!7!q_{LXfE~Lz+0L7=gN#fLvZ4pLP*g z_wUB?sW5}gebKphlXuLx=MZlFMZ2PPwu~oY0#|$o)IE49BK>4`-`vBLCl?o3Yate7 zCnyOiK5ljz9@)ERJT@*I{jwpud8@`yFMhwhitXlc*;LPGTIzfb*r{NjdGy{;N#ng$ zhC1=B>Z!2})VxDw+RwgDIauP;qzX&rx*>N&S4GfemQ(QPz~eA(t?MJ+kuJ)nowuaZ z&VBSj6?}3pkzFW|kGCKEIzZ|(@#{_(HgRWjo*XOkSq1llK)u$ZiWVnL)IYm~2q|c9 z@{Ph4B-g%3cW+LGCeQ?17l4~}Y%9~oSzEdlhg@?)yB#c(t_|7m_eJ#$e_HYx@8o;1 zg=I7`pXgrig<_tl!)rP3OK#VeGR#(Q7TI*Ag@-~Rx1%4A*`{HNIeMoiK?%pGa=G`O z_VB^+EcV%oF=I)33UImoQr@r(#7uu%+HIs%{${y%q8#i!x=;KW)3Sj>4Q6tk{WgO( z(X(h>CuQ|Jt!(SJSL_NQ&o`zNkafTd%V34q0Zwbl;Ay*f191wzKW}oN1PVF!SmhrV zIzUdNirt%*)G_v$hOf3s#JEM3N(`7s!Y9BpwY3cjnA3>!qDIzP$oLS4ePr)31PC70 zbdc+TY)~DlaF{emc6oIoZ0*(e_kbF-d@Cj+NS;%n5&%(pUWEo&w*D%pEpTq=Pr|MZ z4|cKoZcgw$FtS_m(oEay0c-JJQ_FMu5jg<01}#mm7snD+iYcz$l{A3y~M z!Iuc(m7j53+nRL_Ure;Vbth*r>(}Z`;Y&wL2pI^7UBQwyau56E*{U4O>dS$6GrF+p zgiQu`C8l^QqHCixsTeMISz@W;;DhbJ@63Qp8!y_A$5<#X{q{>h##vta=oQ_&#PKQw zwY$g`r@|+}svM;_o8KSQz*wgy_B^NrFEGSV7cG*R4XeV+5CYeCma9Cs|zYZKs|S z2)nvcfH!H)4pA5veTC|Q8jST>lj~coNvhlP`ugwS;MuiDUJKQB!Kd>bY5PXpy%^4f zEm{N$MEh2)6cxr{R#Ger1#$Ugp;FJ@kSQDWoCj!RomPOIFPEC^9z5u(j#?=|@ajdt zJC1u+fVHY1-?R*5^Z59P^AP|C4F|nf+j5f9MEu(U6fI&`W!Ex>bNs4TB$a)!6hp3- z5&#(A&cbSn1CFh*saD}EycS^ae^o6(+~i9aIT_QVW593Z+$KhU@I834d<6#pVR34a zBv5N10JK?PtS4)+mSHy0IyQ)I|(^K?yV$U~}NG*U&!y4IqW>cGk5>AU@z(ahSKtI+D#fmhaJ*4iY-G90Ou zzq0vu7$Z%m@3w6+c@g*2m3bTr36)m)cP!gjxH|No5ip@tEAlC5jo|U8n7yblUSb_! z7_YzxYm1MBNprcxF@)ooI=AD-h?^Ry|Jp}3*G%JnMlXV*5xbE~k2d{xA7E*c!0j>g z$I{f}M0nt(7%6xW9FvuO2i zju3rg1j@%>t>g;~EZO+C|Aj`725l;Eu0Pckk+PtmKz4Zw$J@zX*u#ym1JISYnfUn_ zzn$X{Wzj!1?WY9(<>vO^(RO!oB}QvsxRMt^mFUwO*PZ&-;wvoPu~HP6HeC+E6AU|^ zz^r~?qvv_LFXk0Zbs$f5>t618%TQ!3t@P7ya+?4HZZI0ZlYOpnh=^-2Z)hiH0pbR> zdJwhc&8?X@_MFMB)&fQistb8_jm5Lil1y z_bz15bcbJQwf}=0{ur%nG})Uj#9hC^+@sB?|6=rFkHS!QrErJ7ubPLp#Z;|8^{?!; ze!2q{O;sWNL9epK;yF|xi;t6QOHO{tW2ij=%RA}|ZgEhPp4weo$w9+N4Xm{eR%cfP zJV)hqFGhc4i(Z7}o}0abKDQ8}!#X=`Kd(}Bx|m(&Qd~U?Y@tMVA`axg1z2$VeMq|Q zf#))ou^SZm4VPJ;je)Xkb}bz}t-!)Njv*9)zwc3PCJdXNzcKtgEi`^%K1dFK^yHO@ zvyux1oOpg;eXm7~CZGN&G?*tu-ENs&w>+=32VfHe$#m?#b<{~oy4h+Fm1}Cf&i(mp zYZF{+s53Z{?gxqhkI9G)x!?tw53=Rg+ZAZw}LPkw5|zbw%OUoJ4+a|<=-FGC?R;k-8*Sd zgoF)gK}^o~kog$^t82z@gqHFBs?8?R~P-YIb+WI`; zsz`wVh`r`^ixvJNPl&itugmUoy-GJt9A}%*4&Q*}g|GeAdBBJihHNVf)+R*2B?oM70G2 zdIrLnO!vQFfxNo?ZTbz}p-$-W4q$Ndjp!jc$8WR{%|KQ6@xf+;Y;%>;kR1&?`s__x zZvc)FK=P+XMl6Fk5L38$be*xx4L8Ye?x31*_jBrEIX}q_#Pj2?X*1**jY_b0f?3*f zE;8(_%H(LP4%?t>G~S$TF|~5^)>8R_nsy66CC+M@z z<3)~T!@g?Qeryrf=Cd*$doAqx4G2#lXyEnlaZ($}R{g7j^fNXkCEczD>DRhd5s(YB zAw38v4UdK)9H0t6wX*ovmT}Mk)2Wbs>Lk zBgNbKe8XMnHlN?ven|sS`Rn))u~Km4#VTT;TrW%}J7os5G9@wav@Ms%YP3AI<$D;b z_EEb+`5Co&hBK*qyUt2pOI~^mJj_z-THLQHdj{)>9=D7%_0Gybs{@y16nJT^6;hll zuf3+0O`}bpx388SIv9$IQE54Al-oo$bs2pJgJ$5);8R?QPnKn7KoS1p(XW|7!$}PE z{Os_}gK@!Nf`z&w?Wa2RUi}?KAlI#Pd9( zFGhO0DOTI!%Bn6}B5b=J72yTW20d|zePCdjC9lcXm((}7U8@5E<~!`OOglSjx9@JR z`c_RFW&Ct=`Fw9_M^rZz{Lu{bBr~6h3+cOC2iim)-EKtXX$QKrvmj;&%L2;BG$0W(1 z_tZbgbU?3EhQdD&^H(JY-f@>cP|Tzjazb1qMI<{%;gZCal|cvJ)r4H@`OT^D_b+xu<9Bfi%{at|tnW^5;qM z>Duj{n9q%7Fn*E5d4JGJkj-z!s?^-`%59usF>=hVT9t4GfDHca;94IZtj4hVQF}Z~ zDW6utF2sN&9nCB2UN=(AF;T_S!6b2>9+IX3D=81mJkcK~2Xjp=s=LnT*+k!m)T@<& zuHpqR4^Es$sHn$^jEw7gS0})SzA~dgn_~Z@Yi|k_jarIyy zEUvT`-9v$ZCHkm)?qhX}R@ponle_fH!t|wlf^pBpdiouIey$5?1J#pQ07LMxcy%!m zKv$M(q^j_(9FpfWMxr7AMn{~`+WWfH=5g7BJ9Bt+7mYkUE;FnT8a&1n$m;nVvN`@b z=WJdH-{yY;wV;Mk(9UW#9c7?X#m`#s^~7Z@n)@>#L%%^H4LLBXb^am)SKP0>dIrhm z>?9zB!`H~|7~KbZV+WXiUH*%hT#u9+) z;%S>|-AeA^Kc8HRt7mfeh%ft> zsP!58*=%pr&|093SIcm2Q)Ay0HxEoy@su&_7Z+9C6~>kyL4cm~tY zI8mX*&vT$E)}uwJ*%)nMaRR+|$S56X7Pgk$fh^Baue3Om;GoKzU;Yd^LI6#5pubip zTYy;=V0%9C0JeZ8P63!oc|NyTm0{bqaMh26+~LMBXj5CK4w^f%rIyO4;$?jaJI5If zBg9AG-CY|b`z!9_{`$Y~5X&=f?ev?4)9>sGf@YXqAeWHI zjR0W-rhzQk`+Rof3M3|h{C zO7sB`aMSZ=gE@*13dq%u63w!LFpd^8!U{B}W9#0vBb#Lh$B*R?hHNM0%P zGw)L-;I$ebXVkb2$ruDkhY{xf)ej#gyVbfjy2JK^P~1zBgDIV4^)w7>PF?o)8+2~q zy9kw1^Y%5Odbi})=ooj`O>35q7GA%uy0^16;51dZ=VxI5$r52v-_M7MRFjmbA=Mka zwQ%No=tZpD%fyT;due*^Al$kMZ#i1h_>0D?2Q)S;s*2n4K^3QCy>UuaWz6s3zGa!s z=hWFBbTrSMvZ%f$xh>NZ>TpuY>*%Up9;?E)c)`#t5FOnuZ1oJ`b^yo+b4?vfOQK>& z5x*U1oN1#-d3}OLsc>yISgZ4J?Wz-cR-a{*OdLAG9V$?Q;oMEE@>_x(ifyOThx zoDc%Q9xB_xCaFPFpi4P3=t`faylY7(wvoe(F|xkuj-pVV*jL^=>8pY+`){Bk2A4b`YL$mAbTkuijbFy;37b>#iQ? zPmU$`C;wgTVAlRGOm=OSj?ne3XrS}i)=ZC%zPLQ5nF>)Yy*skj!5)qRlEXJ73vypn zn>bW*D6B5XAG?$ZN~x#&463X!<&$p}1=H1FNmkqB5cqtl_gW#U3ot7h)SSXKkPR!x zSUuB!?;bF(@8+N@y`i2>@=8^~I9*@C^YQL}KLQC+x?>MSnF12gXZAAC9UOqX*j4&@P9xyRd|16^V?^>0ssw;^b70b7X znRh*)ZpgUUBS0&;{mXXjV=#a0^&dmk@-Imd>}t(C;R+Tl_s{mH$xjynDX({Ns00Q6 zd6o^!vUA!BQ@$COg>Q#yZVq_PBPIwlLrd+WX_wC7K%6;bL9}+2n?QpS*qHBz5o9U7 z4n?cDe_<0u?sMx1oRRAQ2f}+LbE8OdiHG9DdGnSWJ$>JrOjaiPEy&>HuKI*9dK%mm z58^Gp=Oj>&{KfKdUH+W|Xuo>|Zh32`up&ddL30V}i$xm2L9fY;vP(Q;uS#-SHs0XhAqls^Prs1a11ik$oV_u5H+D zV2g@?sDMa`l%&!afHacA5K1@F!VqFB=+NEW-D!e!3=IP!&A=cz(%-uF{oGHz_jfyg zzrXjN{oC8^HP>~X=Q>v&>sV3Z(0G9bSisQSPQz0J%4^wWQxxM@wqY=_tJ(NC=|ReA zpSA~@Tf@h>xiyZS_;Do8k8k}!ib-^mUEa8ib%Ur`5|h%ABqb^Mtngbe{Ps;EjwlwLTT2L?=Uo8i=62b%SiK`B zch9|Sce8tzqARjT<_4?~8wI zJDLoYjk+0Bj)jU8EgWf-eju2qr}4Nv?Z+7#eCv&SMeV|lL67t(XHLW&k#E?@ENNtk zVX}eDZVD8a3v!?sGaU7@slr=mEm}21z^5%ye{{odv;ee}x8|pUti@~lUux+&Yv=&h zR7cGDAWSec;Yb=85&Uw3FIi1Vh*>J7t~!)@#?Kz93+NcWWzHnyUuo0I;C>c&-^K~B z(=D`TeYPH)s?kYlSw64=siVDw*K~67oF(c}pCc!yvx;dSRe?WO-9@O(>!4}QZg9Zs z;UWRwx*b!|Yv{`vN_OJBzis*0t6@|QSk!l}c@TE}rlkmxW#k{G^W6c~9oJM-Jd61M_lAI2IDLI|c zb09`pT#O?|>w%J(j{2sqQ^H1*T}|VUi3X;!T1I0+{z#_Js@_E$^gE}5Lv&CFVGxb!_@#ue)+SBg| zA&`q5`98n*KWnC1OQKN zw_Wp@ciFo=G>d#|=a@W>i0{i&-zeUDL6Q7?9hYNRUR*x!IXp4!*cK@`YK&tc4uKr~ zl%;1^zge@JDpHsk|E>1-rL5ESQQoyeYU;1v`#Y@khJwOVqcf(QvCi#xt&Iazm&I#Z zmzhHUACO)RM^Fpdf%>SpWxy;phw|Csf1jtO+(9~a<{c|0Lz~5l5od4|kYg4-8d^4L z8Xt#)_VOH|GibIKWv6(CE2sBL3ypk3S<10TDWGm8GAVKau$#dt-=oA? z#CQ^gFU>rO7Z5*{ROAr z=tVOPqqJzlW&X!M-(GvAgc8#}aO!V@t+c-hw$^6>1+~U8?Aj?s9g>+@N_2(vWISpA3<8}(0H=SqTYUg%!uFXDek$Vt=~P>AsMxB9 zDq1ms(o+F_&8jFoo1X7U_*mHXYX=**+dWq}3sIweWuHEp^LQf?Mm5!$gqb@#&Sj)2 zvBo&5zRS0=Qj9MWNZ8(S^JzQ30f2>MaHd6K;MZ(6g;0PcP^;#<|CdXvK;QghKnvm` zT=Sr`SME}L1ch{NEa=FIfAIaa1f7Y&N>F*rma|yZu-qRLV!ZkX1`$cu zwFL-(Gf3I7*7v{vUChkrGy$?J0$GOXf*IkY`vcm2X)a3N>mthh|N#4dFB3$!SoJ* zq$edU>O<*ed=trLP_gVzOYB7;xxAUoewNrLKZ^leYxdX7fLUA(R6J=BpSAQ)&3mlS zrj1q|DglXBk&2InXD}PEJt+v99D%BCtw3v%@mS#zoo{i_+9<>c5Zny!z1_*z&I9YP z!4X#;Zf>u%oArge3|e5bi`pVnqYJmLC3wLuvgIP8W$bMz@)={l@IXgw_v;$t_rVa( z+>1Uf>6=1rH^+;&y3cf@XA)j_A#OD1H*v^+@`Fk?^TFPFPL^`yhzpa)AmO6DWYxji zz1^)<2z!ztUC$-;ROp&LJnv_bnUQMQ=O)Zo4){=+JlZ+~ItZ>-p$L@r8+Uf`adpxX z>*qnF`7dlQ+Idx<_K&^uI?!Wpt@!=#<~e`K8Zu$@n|70bd*T1tCfZ#Ly)=r-aZ$ho z8VgWdyoI3H@joQw|Mq`<)}aBtw7uCJG>cOd{76}+Fi9MGKH|{+J20L0{UnUEyb7@R z_q^EHpg(j>{=F7Sd1xOEWpRi9=s*aOYCaPZ|GirKk5z6Wd_8gDWH*r3#$do3A0p|o z3kaQ*{q#r>@Uk|*-fZ>1C?}0@LF_6l@p(TS`92>@_|hJyd6Gz8R7T-1uZh*gegHla zgefMW(IJbZZ~dPwr9g&}9z9N)0Mx?XEVL)ELSK~}zF!@0&RV zCqqzi{!^p*KhC2BxKp$*u1s(pJ#D@Z={yfN#*jw$htSI%I{!BTh6OwrOXVu|2gCM{ zH+mvOKZ`9dMS$et6GDKoedyP3Qug&ECmdu4c5w{IfaT$AJS_x=NxL4g&`v(DZKnn2 zE-3}y`bW&!e{|=jqv0=C#u<{sbYg_~ueV8|;*b4He=`&4A@^!6wGFn?=M-E{mp84q zNLk~-IfT-XE4A|u=u>h;0I&PT`jB)Xky{}$HFXuy0TpmIVL`$SBq@(bgmxt&!yyS8 z(yHLWn)du@(r$=0d~4x*F+}L@!%opny6})D0tj=Wvf}F~5P<+h1l-oeL`e8n$t2*0 z6WqM`V*^Bh4-o;=Yr{uKcyON&9WV;b+dEJLhmj<5%W8e~N&3|HNF(-3*@Q5}U2xm4 zOByL0H$1q0rB)u{*+NL+bia_slv5At+B$n<9XO~~AHlwfiwfD2#_e|l1k8mmAB(&( z2L#L}gcl(O_~X@;+<{BpI~whN1v=LeZa-<(HXD*QXJ$WqAeW@mG34I91j*F8DtwrP zH$q<^u-#?1x;gg2y-k1zX_Yc%{y?npkKgT(hF1#SrU9NC9|Clv&f7kkCXHvw6%hf# za5*1{fC8-Y6U*@UA4xTk-Mb1-5yzK&M0!UMl0HSxKGKA)3J#$Lzc`2d25fQYRqKD3 z@%yJIb=v$UEbΈS`8z9<0i*LM^Bpd8h2U|(JScSBo4I+f5EG*ASdaxVep3_sx zdJV)*RIpE0_PxV=BpqZf!s~iL#tb@#CDY(Z5yhEggd4U}1AYYM786a9oW~*Zg2j$c0lOO$?6GvDO*>F8{&}788L&NS z*2zusP_{P~!m`j4(wC85g(rJzO~>N!r_O&EeB;tP;$|&q!X5hEIQm9f{{6 zdF5Yo;DzODrZ(`zQv>)ZFN<(e_x!13A~n$b&babie6w%=Q7Kr)?E$rJivPa2f46l$ z;qW-kN@_4XedGo3{_!yhQjt7y_-RP$svaZx#4mqBUVgpm-McGKB@K~X=qFwudQIv;jHlkP)4Mj|aNX(*BtdaT@<%=85u)Vuq~2m=s8En;?loDy z-~t!*z>BVC1(T$Sr)2h#yWe}pnfoo=O*tSwY) zin?E&yqIj>nRq|+7nHeWb9F0PL|>nx4dl=+y!)TuvL!ja-fKF|)NXP}MZ=^UkrU-gTI2 znRQ$Tej_!QsBV&qubys;2?}A?Y8ouDN^zKMS_Yh`J4YHOXtdg`=#uCYl|qwd7Gzx4 zaD^kf%gs3w$Fm!(CCd8ZIxO@dnuI69qK%>!jF?)^=rSakJ?Zr*~&* zDRb$TKb-1ZtA+|+>K@Q71;WtS@1I{D7YkJmWP013p(a!RftK9@o4OWWk9@cv^5OQ$ z=Scl<&=d+Y=Cw~p_RLV%<@f}Yj|d(dcS38LyrjMD>>9=KVIM1nIx0)@YAzIPHUtk zv(3RJUahalxbbYGKf`lTfYb)Esj+0-PkN=Ep(<6J(g6w22hc|7+88HMM`I8#`ImN$ zdx=7fu*Ul0C^sd$CjXk_vDCwV9W+Fy_4wUaJx!uG#UtW0gQIqsJnBRyOC98+&qvANaz=hrk5{92&E<5oOv|ybeA9)~ zt8kENixy&p6;N(1%~Esg2Sag3?ZYJ@!_U!#P>}_b5@tnD1$1w=w#jI%=ejv-2U2y7 zqPnS;d~Zyl2n`#+0&R*xkpfmtel&dZoo!jYGWe8RDz5mrwiByhNgxDtlJ>>CB+Y#L z++_s2)j8i3F9=Wu72PX5lr!Bumh4d?F7wwhD)jv3{%-Fxg;8a;0+`!gaU*_xZmR)vg9DsSg618PEQ*oF^=^AN?0?>c0eb~(T6k=>HeVXYq8p9$ zzW-rt|KLm^4gk|#P(w%U^Q7w9KuhuaHA+syZBGFO;jp{yrsnIhu`CPYI8zM2y;Ci* z)R2u4E|FOQ)Ppsn?l%GVGeu91p&+O>$BdDSg@x&oUlQuQf%b^WtjfmzugN5 zdS;3#FJIdn5MQ>LQ%<=Cb^1uv=BhlPHYJ!`3B#tbaAoDES|Y@z;E=1}{~hKvX*!3U zOBK8SC74#&={l#?Am#?Wn0s-tdFSVrKv6dbv}Ro%HdQfbt|u#M*5{zGbA6UpUK3&i zVH|uAls9CrT)7gx>`Tqf#VGT^Z}rI&GctD=BnFcSgpM z<25Pb6+$^8%$s8?xop0vHE-<@M|WObBc~N+3Sv)XI&6mmaFS{6q8ipuF!IHXhqJESR{r|1Tl9%h@t;xtjq%i&`H)-w=x zn)#tn^<*ir*s4!S+VA|C43l;mKGS!7z``q@jIWxpjNjnR*W5y>YOK_V)~5+K=VYN&iK$B z%D*zz%0BorEmsS*)DprT#-UrT!hg@w6)tuexJ96Y1crjINF8IlpZH=JfV_!g>Nb?> zRjG^&6yt<=LrlpeRKqL6L&iC`I{9Xc^A9XpU z>Z<328_3XI)Mz!7wTFYEy-s?}6$)cY`z>5I!&kwpXoNoJ$(7D&;W%;48m&BimhTx1 zN(;q@I!s$5BZP6FB}}7t3@-a9#b`ZGs6i7$!R=^Hkq?{y)@n2<;!3b?Dx)7KC?q2e z!Ck~5xUPDHM2Fx9;t>4SJKseHZtB}sM+VP>Rb;#{0hI-IpNG?QZoFG9O=&^M=-eHk ziVUdR+Z`%y%HXsjyAUbrIOS&{#wQ=j;Q$P(a)ri?i4Wv|1g#bf!Xd zYD*t^n7o<&#Jqw^WW;kL)l+bZ*j0ljf@2H>)ndOo`>s8 z%9ZGzdOB0lGn85QXQq?!XIA&U-2~wcHzla zOoIl+jGv5$=6m?Fa?rAs0*Rya_wdo{I_4?Z&^L8`4D_p^OXK1^lvh_j-r=2U)?U)0 z>GdOJ9ioT=nx;LioCWq&`Byd-vJNU3?8bR^^KpERJWXMU*%)YtZj@v(5GUJM zV=8O$Cx*mC_68YtMrMu4<@SiuvZ*a)!e3mJ^KKY~K%OW3(?p|PAVwnMYGWXC8SCpc ze9_5Re;d?|C}FVB3RHRhEE(A0v%Su#4kT>^j6!Pb4?MZ(0I*QvZi35^%a0F$74WNw zp;bWkVLU6OO;|v#F}BV%($f5?{nERIKz<9=DxE3kA{-nT-z zV)1_NnJ$cOMSYje9-swnbQxQt#3%i%Mlzolo8vlZl#YmPt?zO+e4q{3f5?~R#hj`P zDS~gP2u3`+^Of_bgTi0ji7G;nw+?{Nv%Y2IREo0_x^<~jZaVQ$QHta1u=#8Eh-D*T zI?6X(UX^@nk~3Lp&QN2Gws$qHLYaEh4bt?+E*bbimSM!D{{61Ut8;8RpJ|ZP0SSiq zEPz$oUKHgS7N!D4nrcuXJmd2ZwKTFveX``ApVCOtFuAmRs3obsgigRpAehe1`=OR> z>F&C(XkUIIpEc1uUhR2|OW)dis=^BaaCHKj`uEb?J3Ap%*U%@SxAZG00mM#Dq3Nh|$l ziy5&caw%kcqd}1GiTvQ|vZ3$#I@6K{M$CK9BxL9L039wgx`J?HC_qHn%S>pIu0*%O zFu}S=pU?O^(>J-`P}LOndzGs+6L?u8B;Y7-ZA!s*eKgd zS$*3fjY!eaK`|Ye!XB_)>`*|XwVEK)BFY)nQ}8)WtEIduTXMQsTOwlD-sn|R2ZLwK zWLVConohNfe5nm?-meHf*X^lUxqjZ9JhJc9LS$1R^NPZrO_^E9fQ0qqRCM1R6pzhd zd1SP>XIF#_+DW96c!^25_es4`^(lpIhhPu>^1rXIQKapcG)=2iyXxIU>s_~)2+c|b zsg1`oPcR$jNl6A><^p|MpW^a6+xLIgR%U4T^;yO6nT&M?GAVKu1vYP`eNTz`;*on@ zTxYiXax&SK68T8}3=W+F#ja#ot5-vHU3WFP49qt#iVb}}NZ}ms&@;HKv^QqDJ@(~r zisiQ}sRn!Ko%bVM`Ld3D*$nOVYuB0@gZ9J<#VopvAt*eHd7N~LoR&vhPE@s*t${YV z#miMGE2RCnlDWFsyK5cVslyb79<$_1+9P6d9-BGm*!2f#a0NTZ3!Rp9`7UY1tD!dh z-n{XzgBCsxJV7>$tA>(S&qN1T+~9q~vv8HL5h-?lcCB`JV`6*5F_rRu%)NNNvu7Ad zxVt|efDXCz{B`3TMC^?p;x8cT(5G#N_5iX&8W~b;$8ux0wYj$EBz{o$6J*qDv1LD89BtPYOm<{W2@^6W_n{zEA&g zXq>1?!9*o@9?h=d{Pm6BUtAUHN*@kv;T|oU56GqZy<9Pqjf>3_Y1VKn{IFV(Ius+) zVSz#CKagcZ)fT!LZ@fG{ErlBDZmW8!bn<=eFI80M!|Bl0izZDs48j{qh9=ds^tDC^ zTLofQeaM8JeO76Bo7fjBeaU#jv@v>dkHjwQ&UAiJ(%$^;?&(zH62@&12u4K&qt<7y zk=YXfiZL`QTc)eMj809$?Xx-Uf)jWo#~^+4#|qp}m|1Ej`l(^X68!d+QxDgWdkPsV zZ0M2QHMpmiZ$UqgSBA9tQgeMbG9gfV_T*|rwIRBsa3gH3YkpwPRQFp$mi!)3Mt&t# zxiR&!&n*1N#H^Uf`PeRIhnt+yn*Z>a3|UUj3`y1Q zxJQdcDQvm~xT#n1{oE4^X_^e9Xuw1;?2j1{KEe2BFZ*i=D4B99a?Bc3yf8bGoX9<6 z=%5+AbsBtM9fy1$B|R1{)U4BC0cV_nGU{5pK=zdj_0>1bY^|O|dRZQ80cOFSlblt}{q(}U|I*_$ZHAXwL zn){k-hKsvfGOf=2H$d8EH!54A#TzrqN{?mcJa>21V5bUz^l)S+AcdXJBL)3GsDU?D z5WCxR($V38ub6JjM+eERLz?a;*?yZCHQ!Ur9W-G%PL?Vw;QmZZyd9VRnKAg@xW4#p zYTcutspZX!dt!psGJS%)#H|d|Nby&mo83oK_Xuc*rr?M^x*A*Q2YUh;d*#-n>sd5V z-gz&okrp7jeNU)jVLdyLOOMPg&)ZeI@=0z)?D+#RM$+T~%CFYTgpyGhVzLX4r7eHm z+`M$2v4ZK!mCt^x9kZX1YTcjG|B|9eV0n1;`U7U4w(I>z)sZ5y%3nG&Cw6ZhDRx%k z6bhD1)uMD1K#8eNL`toIq4Z2U)ul4DS__a%#y>?MF83=SswY?x1v-5>4EtU`}_S`1H zakrYLD@TnzExX~GCLbolRr-OLf${~TXF2OP_s5hT%=_b7_U&JSX^VWd6XUKmpo{zB zN)Q&uW76CD4^*D(M# zTuDBGhh|0;z3$hYxt{NKx5n1EE4eY*W{aRHpYopBZFvIR(@V2`X+hBy6(%80Wq}(F)Y3NFz-`wTLyC~hp0|qa-+$yx@zxt zx`RR-`IOp@-!#}`(7PjS&X&Q;>3xjM&5aF=ENDOMU&N$t=LgT<9S_}MfdU=&R$7)i zS6%c?ua*<6@}as-!C6eiX-+2gP)>g^H%?R7*stejx)&mUPhO?j_EKJOu0(R*;Ok7z z^{|^(^?X0&4Eg);nOh`W9;B4MbdbJ13$97K$kQI=Y)av5P(L^GK9#mvgoX3BdY-i( zdwN$_+y--OM!;eY%`Ell)?cj`aS@i9Y)CjTehyn}#BH%{EpOIOpjp2!v9Vo*nZL!R zlArD&K8A)r+_2p=p2e*QpgYC|417KZGOySadJK5*i5HLw=jqp6i#tJkdA#1^QicY0 zXt7*P`hA2cotXEpkK*HC%Ezxi`tw30FVi8>*8%tQ*@2Q~=jRV*B8o5_G~Gwc^M|PE z6V=9hjw8`4l(L~I&-Q2x&6`AOgunY)P{efA#+IrRS|b{0O3{MZTe3Q}4;tu#sr4;c zxyu%Qo~S}kwZvYz^LjPJo1AbX37gV>nORYN2(b zs2V2RW1@2C7Cp}%w&`1;4c@ddn9WyIr99m2?oLh_j-iKLg6W_zPG^-AO`Qhc|GOJg z=L~rY3H0BYhbN#JR)72wIcV$eo^3wEseZcezEkq)h zV14t+``V8X15Zv)ImgK4P_ygntn#cA2-y42O(yd9_D742>`GepTF%72gqjlxZlF52 zfzb}HTbrQx>!@XotJEMnb?Iu9piLkY@LG!rA-pDXY!C9|j~*Qyt2fVO`NWaS&<4wi z+RW81l72_cO&97c;Yx^JE5|7y<<$(RqqM||iE!X$Q*1flj`WR=c3Q;nNqzc+IOQ96 zxE3x=oj5!gbY5rngcFJa>%ke>6Z#&nB^0%)QlP5(-F>*yg*}YhpSEsqN&(v|FA;ZL zrYl8$(JzUVxZbB6QbjaZgma(^Gt)9R+GTD)Ehxg&feNbjINOp&zF%*T5 z$8OU=b$b94VEXXjetQnd_?68c$P)is+_4$ScS(Uf$B8V7l5T}g*y*EX$_mXu$qMEw zd$3Tm&2r<6-Q-AgMN%~8ElCmuilwce>QwtOWOB+4pw?&p>}lnb2wszx@o&(J$bcX% zjymO{%9JWy7r8D9T3@%C>C20QDjxIK66Wl0O3^nTJ&Ru2>E8emL#@vbFtTfA`@^$Nv)WU5t!qQEOsO^Q&1yXDf=g zI!p`@71?@Ky_RDfFA=m&o3ZEW1`G-Kd14EXU>kxtw7aG!B?Wg*6d#psWhU)ZGKbiwSJ@`qh<4J~O2V5!c+7I0=KnVhcu2 zonn8OW#HaYh(a86Z>6W6os%UytN@BEdO+m1V==6$lmGQ8U$ zjX~+;Ps_9ssNDuZ%{wAgy(a8_0|5T?pw5fuktN0v)C{)7)o({`5-_$>4l&NX=eeh*FN~^ z>j@g(2N)|cs*bL~$kfuAbWZEs2L-p~!nkZg9S;j%R5eBJZ7F|7j=E;L z%BSM&49@44Pt>0$4+^J~-NtdghxbE^vm)>T7$K;z;H&p<7pJso7n!~#V=Te$!icP{ zRlN7^{+OXsn;^i62(7pgp|zPhRjLV4OvpgAafMT*yGRZ9mKvudYN~soH}wA65`M76 z7B_e_PnvSZV`DOG5?EzUNQ7tK~3^s}MvxSF<4dUh8VEP~0|KH8Jx(C8TX;qk#Xaq5Rv+XU<>7R#&%P($nHHL9rE;=VMD zTG>{~C6Vy-9l-lgob(%v=|!Q^qWR1|SiE0>aXiJW8z-HF`F_tt2sx&*8K5rq$b?!w z=q23FspGPXs=8C`Qn5M5-I3wk@hkI{C96`j`Lj^Mq?5snc&C3Z8CQ`>^OVA=9vjej zQ}@>gmuEpAi_)2SZ?0OfX=aC8RII|(#lTXVAz^$Ht37Dt)fx$I`f%p3T{=*sq8LT( zCojzNgHHWX2mkH0ype@%=gEk8+ypcb6SZA3VR**M8dPAlKF{Ft6x_uWxOB_Fa1cI# z^HH)nS*Vev8SoB)FPi(l-@Hix1*jUyZ*kTl7C<^paIkiCZwa(B-7@}G&GDP&M9>vd zI;Hmlu1wvZAHmR;J%?SM0aV}>&a|P#q2ycLV0A>WJ0%^nEkAma#=iah<{MRMmA>k8 znC@3NWA~;NLjsv_mS&FS=Mu}Dsaj#1HFbOzrlJg`+Ou)nc?&dbG8nYKJqkdlGJ?<+ zHCUE7tL&t0@n~eK(_zow69rS_x!C;JW4KZed(I6l-{o{@;g&v$71Z+pxT0b7JDPhM z(U!b6dTR9KBjxr+G!kAOALXqcDBnSEzOl8LR1<-83B7D?g2JK_>aU(&nvzLrn~YAa zt7>7LGKu){_L>7RBa?3AR_6AfUmWeqGmrq_i7(&4DV9?g`0wd^?>HkMBJfu$ptZX- zo=jMvKSS?2U@JYUN{_+VvbqcM0w+sXw7fZ4AvGc1wGAFqY7Z6`zmeS)&SNwIEc*Ow zeGk)cFXvKo%BH>te0gDK@MP?e8+cnS`FdP=H(o*5G`h9XG$!S+l$TJ;TEEgCOzz1h z8<_HTS|{KAPd58+dAVne815mulh$a2(RZSyCrz22q7+MY0rbSIU!A@(VYp%vxYka) z%109<)5w?>VZ6b;Zyvw~)fIp1Kx5R6Jh0FLT~6p1uec7A)6K&GLGU3~rrX1S*&w{Z zgk2Vam#zCl8Ga*{A-0~SE~#?Z$+hT- zj!2f&pM4yp=>WV|KAuIry&>s%Y~A~IHUtMI{r-aNf8a;OrV3}^aF3kT##N+p4*t-vIUn|AL!R939r1a() zjM9Cxx`OPHcbaATN*960VXZq4VsQUGn(>EnUEM-V7WJV|TrdWPZDP>EF-prXZ6CHy7R zaA%WCpJs4A+QhHgPYzy77U^&U@0LxsJl}et@SA9xUK*$?MYtoA2e0mk6^eF0G`!5| z#DywVxTcwXRlCrbC+C&r&0a0)m`y9UgoDD|01dw#ec|&CC^9LO=2}l{jEGjIX3jN; zYr+uRQUtU5jkKqGM99V{Y3Av39;f2)2c{qOQ*@%{sR*_j@l3=-zPv>sR96N9tjYe* zwf?L1pH>7l+<8zT-WNdQ4hoaJE(Fo&Z!5Hz)d(c(Dx@k@TB3?#?$Ksdk%$W)u76@6MhR07jmi1mk?p zbE2~HZjV&ju8u80N==}Tf!B8UCNiP-N=}mtt$<}Pzum}iMD8mjqy-PF5irLwOD^r- ze5ogaI3-97y?$?RcPGVhx^10_LZ!##*~!mb03}?tUmSGLB=fGR0)pMU`oN6Brd^o4 zv=ZC)_$PuPySdJY^7$8%|1YHBt`-Q7(;+qb7YmSGBp$uh@#f7DiZ|V%49Cx1y}bE*oxAq;=WTY#EX*+e z!1=Vnsv;XA@eY+O5TUYzB=Lb85-*;rN6(NKqXe#9)@TOqtv|U|-?2?!RsU z%GXV_x`cM1k+ zCA@T3dDe=|+Czc+R;HNpKGBQ3NAW;%|aM=m?nOizBu9(d+}6s5JRf1oS2Vxv`)G@r+ZzHe(m z60@h~w`5||mxCv2>m;4t84ldN{P_2;TS&GKEb4q$wZ`lGk;FwaPxj`p-OGvw9vXyp z)b(uqh1`%Th#Eb3ot|EjaJf5JjAxk;P8dnaS$67KXY8M8i$p5EV@8SEm!WBSUAg4K{`XL)$CD+EDR_s=AhK z&DtqP&K?^v`|WT)dg5Cq`B(*=l8r_3=i^-rnT}FU;zhr!Tz+qHP}mYf?e*xrx$NCI zz7i{^+M^ii?1ru|%S*73Q*AAZbo|bx#v=iCBKzqWyhS>GijGrVDD=)h&C&mWTiogH z{%8u$Q}n~c(#Qx2Z!e02!l7wQwB>cu+n5FFHF4Hzo0>OVWxW{O)-i^F-kB5 zP?v+gQGHPDZ!A7rX^Rt{9V*L{iB~i0*!KgXTDz&%V78!OPL$^E4$+`N&6``r7FfA}D^hn+Q`goPRmux}P&u6h~<%Vx^gJSPWQ(nx*#C}Cm`t}R$4@*;}iUv*BbL~zA zqaCL{INTSbuIb9GjYu0tTzRCD^Za@+8T>;CKnQ|+=wAm87RbpMaSacwy z4kLa{CsLxAExN3{PoKA_e{v~-cssAeQd8rq$13!V zdRdyBM5Z)}aHvJqBT;)bm#tzIV&iS*a|+JeXCQnQmwE@M7pjaQON4Xb}Oh z)*6<**=!KuhR}(*hkr~{S_E%itxV&6{iYz0lcjs0DdDKj;3^+@6Rag{7d+xUIP=v(LJ-5>0 z4qK;nm;J)hI-V0dR{b+c=2W9duK**M*yWKQ1p%3voNol4Z1M=9*Naa8mgX2G7nMcq zMd!P>3kFt*N*24fIfWd48x&=&vh9oD8)Z3sYTo&_G&l^wx9*6Cy_OGM>HoVldgcpR zc*pcda`BaL!KLQ=iI3tfd*TFP9G-&T7as(L6852QWc1K6s*rY85Bi0Y*A6(}HaVkB zT}o`j)LI)w=fJvT*vYVQ&W_EIBP-ul?W6izR-;ixmi8+RA2(&J1#)`Viga?KMj@v= z(ES+FMb5cz+RUiDVMcnKNn&N0A7({aeeLc0@$NWz>uh%MrW3~Wkb=dCQN-dW-05St zn1`(>4MsB#I(YfEt?{e75;|{(7y-ENA2o=}V^DojxVd$W#R`bRU-1iYWaQk~1?LLd z0XR9_C4P#$(wr;`@6ACqLx%(p5iQT zL#y_sc=L`q^uOKxQduxCTS^$M8{Pc0_SCpFvS-_O!MT2FUB%@G#DoXRSCg?Tl}v(N_Z3mg|9@XTSjMIh%s``To}_=lA)M! z8hcRFxxss*)@%MabN}sltYe*wfO^gHovEdUxDQcmFMZEpEPL}KTsBu_DJJ|DdpGwN zh`9YMPnM5ku%7>%a|OLOz*!RO@%5M!OPI#R_21dC;)y7faLIu^akI)>GOwyyH&&)6 zHl#Hs^CZgT*Q*@mUMtn4bSF`^n4Pbo?{HizGr$BHWNU`oRWQexXH~h524RitEPt?i zzVf3RcZxS7mL_6Wtajw6Eqbf5VTgu(BKA^6^q7kK?Fz!nLOLQZ zk7w??Mk7A|l^1A~VUmRIhqC_u(igg>3iM@12R>I3va(mKPvFYRSLC znJ?{+(P8kOemCP`+Uek_Cz80yF}^s$TiYhFJC`&>h1FB%;;G5~eU;na6A)bD>k3bD zgYceD2w{)&G%k-G|5`7I2nAt{zuVmrLzQ`{nc<(l<$2UjLe#$kb z_^I-+*Dr5kp=_}E&NsQnH|?o+bsWo~M_prnj}b901`!D!p+{e@VCoj$W-KL?f9fFKBK+-_z=Ysk&{ zm-y}k=ro>!Zp+&fFmsI^X^`6ZOP+cN`l*p_s?~t0!N{c2vysg5q4?nM#?W;y15w{t zxz^8Ar7^0RZmOEq!wti3%gtZysHETKL*d_Tyu>t>^17aMRrx6=%W$Wy(!C?`LjU9f zXzit!*k&8Z{vj8;b^Kmw6=6x+ZpYU-=7vq>iNG5M41Abg^iE}5woJW2K(x@xy|F~* zY)$!~OBg%G-=I3N8oz5r0El)Ikb5z_I95I=1D#x8e_euTG$+0Mw}dvu^HA# z%q!7*?lvse4LtWUP)k*qBo^Qx7O;ESfhtPq*0L@ttrx46ws^*-gw1aEbD*G&u#hVu8-cNI+j4rR ztzGST)?2$m+$Czn5^oZhGVzTjHr}zKhdfIC)0;PiF|$17BZHX3t#{tRSM)ZxSA?X8j@5qz++SF^?4 zDVdlnkB?@!!(vc$m|sZ|0NO=sbU+lK)8H4o2cfA^Xip_TroKPNJgE+=u_t0&J z^14l3q!Ck2Nvpd}TLe4Cf~Hr@Ab%%_)i3ncfziNBWpU1S@ll-%Jz2)R5{_+ySMzX{ zu`0Rf_0pk5@0!$^0*~bhd$(j`w+copL5yOD3>Tg!ak>G$*lI(&h}jf1*b>ol%i|7T zc~2~uz0YGMnRgiFg)^u1MYn87ExN7Vw0HH1WgVV2*%I4nkJSrpm2>=H-Je`h^#Du% zeM8@@_~bL8kwkQkUnapvcbw5C8*`@e6z;G)Ci9k+7~R@%0+F3uXF6gld+P=Ol>AW{^ZBZXDs-8Uag>Krp zrgqy@4}W8?TA$aX%~0%9e0clyYU1X?qnfbIzRKO*a)$yWaIGM#+teZF)5hD3qM+fk zo3(UiO+zB@lK5)gMD?PVqjw~akty1FN~2w>Dtn7{VYR;?PtWx0-X0eJj?S?$2d%b~ zZRon&M%lU1@)JLpfL|eM*Z0+=)Ql!pD%%@4u5C{)j(vWgpzIMZo+h4h(ywvJj#VxS)BHYJ&rw zbzgh!jqLKaejk~L)h%P}$D79w&Dorr+i|>3w6DFi-!1Ni15g3i_E+wf_fh!0L{~s- zOEbMlY2@M=+bYhib63^Bde}|HHsI*zYE`XvY-J_XOumQ97Mj%&D@QG6-O1-it;7%0 zistua4n6O!D9o>b_JnqWoc5Xfp0CK)MA9V*QaF~89Rjg+t(H1J4Dw4G!# z_Szm=BuBs{{DR*5YP#^5vqKwTxrOdMs({QO-)M1XDkf9kcFuc%q3phFFm1bI{IRM} zr{P_eWZLfal}~89#$dbJH|jOllzRgpZ1-CopNiCIPF8H*Or4A-ieF;qG{`o(?M>Lv zAKkNsOXv+-AXdsmdD*y`^~>zEV9W?_FZ@(1E6uB+VJjcoKF)(^?0l34~7G z5aW-B;~JY=@j498OAvIwYK5f@k;7~23v)+?#C+XAiDI%1wn1Oet2Bh)uIJOZ%=WAr z>%Gx35uH!b4$Dh#8pX@<(9^xkUxsJ@Kf>NCs>#NC8hsTN6af*XH!CV#dX0z_=}PY^ zz1L6zAtER$B_O?nNH3xHfPfOE_s}C!Lx2cL2qYw&`2POooQv~)>$%8HF0!)LGked> z-m@o~DcJ{$j9$tcnbHxB;fnr=7Zcirwm9&7O5L}vKTvVg^ceeWQujl2eQr?i1QdD9 zI?X>LPKgO0v+l}Np5b5bbeGT}4#Ukj5ld)}b*OU2Qk)gs4;Dz9v~=B?-;-`Et)5j` zz&lM=>|gp6h-%6{Qo!?gaR1M+#E-Ep(Ifa*s?#*x}?esB&h zB~w`Cu7}aul4|Zv_-SB?Kh(5txtlKMpQjQ*ux9Uj07~nV_HIJg6sWxpp$L3rjpI47 zGo)*Pj$tv}Gk~~y9@q%Gx#a?)cAX9K9c!#XqIF6@Br> zFz=rISoFb$$fD!ha-S9#Rv#W9%(AJqY_Nk)>&I$pzW)Z0*a#{9P-W94@!aE6q0Qjp zI*176QhB1vHIK46?aFSko3M-4bd-kJ2tuxy+QkkNA;FjwH#^BJ3! z>MX@JsL_SJUocCb_SHn4xfO0_4^G|nut_FCvjx-vyoz=@>E-tb?&(s6e^!dRlYW~e zF57c#14k*;)8R{}5z4JlM3_E=mseuT*kkcJdZs*8#O?^Lbsf)g{(=?K6r1*(l3Tfm zVLS|91$)k4AIJP8(=Df9OCU~^{Q;-2#?Wc-1SS`n^T)ej^CB?}v_8M|dBGu{4WD7% zdeV)1DzO<>Z6blN4uqv5E5izqAuJ{UI#SmZu{3W%=3FIoW9HH4CA5GESke34mdawQ zq`K3$+DLw6mR_b$YD;yP65M`&?+qM~D}(b0;Ge-D*L*lM6h}uX5f!epI_lBMrDBr6 z2_Q+y+reX@Ld9-s5#}ntq!eC77$<5kmGa9JCa+hXcBr<(k}1mqcf_qWC71$cbKiYe zJvq|7Pa3;*_ccY6?7YDuw?hNhsS5o~ZDROgAl9668NX|u9|o1}BPr+r4Bdj^G~VgA zyfZN$%`$ZM^i(|bAbV}S+4jqa>#thWyFn3N6Tkc>Ck~98cz$NXFSKz;A`DhR(Cn{& zbVcpc)5N=1^oYU#a&>zovu$Db=)SY z>e9nLjYilL#<`Xd&+p~)foq1i(Lrb>-!F|3Xtw~bfKeFHmy{`8NkFJC+tzM&{na4_ zERiswimCdVzWk7DrNp_^feopAL+kDdjVu|TO-WlUJg>%bzP&|PoH30yD`SaN2@oWY z<)LVfJ0Q_@vOe$P*!(1+$t<^jg0>E!dfIv~gQ)AtC%3nHD< z`FPHpgir^Ay2OOjhULz@3=SnB=17@(-3teMc$OK}T2+=X$Y=qCvtW~#vQtAucB%Gx zSQduUUmt>(1%sFRdcwsE2HzgEO~X}#ArhN%L;`-4Z(+#A0NA2LiF!)eGwN2yPrrS& zgXJHl%>72B#;!49Sn$$o6}i+i-TcDOfa8=dkrW4O4BJlFD3~8KNHSO{-ps$sRODWo zk6h+a?#Cmh>Rd0a0{%x6N%+gtBttT)XqRO(cHU!5SKknvb~)_BZ~Prjq-CC1iZbT1 zG6m5*b9I{ddUL5An7rU~ijC>Vq#^=oG>vwHGZYoF9fWRHq%9R6u&Co{j=E zbRMKWXtPzhs3$$${-QAX3ig}LS%`G&-1zw;9{8SK8?|-U;F7q?aaKpRv}7p zowbB&P>KYZexdyttI$DZM(T9pop=iNlCK;ln<`2|p(nhv#p$fG5 z>eS90cmE?)DJf!tU95>9z;w<{TMdeSIdh2i-2OE@TLrH&W6y=^oLqkXIx9gnPKh>rjN*xpStkTRxHPj z0t<5I;nUUCbE;mF7A=<6|4h%=NQ+c1R3oP81;XCV?BX)0WBGmVXN*QeL2+w8tsgO; zh8daFSlm0c5bZ&?8KyTyEh!ohf8MV&g~9HEozJcfXSK*pPb17dY8UrT-l|9|;~pmq ztxuJ+Ip@1k8k>Yv*waMv97f>tuU4XA9H4U-mk=cv?h@#qFfF5!S5+%V=p7TT^G}%h z$~a0*Upk$y?r{S*nkH?CPd(fe@rvAK6)wwLc7GP!N6L3xd1JW|GX85gRm@738w?mgUIW7A!x z_uEYvnuMko`$f^P4EYdyu+#^z6#WJ#`QMV#84dOcMDsX#SnWAAq0H}TjV6<#wkEy@ z=*MPno38c541X@>uNHjEAM)e=28HTFJ*Bxewh;I1G_-+*=pV7hH!}0wu)S4rp7gw#m88B%72 zo3d{c^>H5E*cZc`g$sz!A`FAaC+-9c*HumutfZ$fEEi64D|ZNQ{k!&wUArVr#(>d+ z$glP5`4ZJ^R5;l%fI5-JEmNz!l70SeBga-~FC}m0_1H~=}E zge9%g+TI;o)rU+$_nID7w9^N~BSH4C26Z9Oo;7arA#QmLcO-6BnOGTNbPWYR+Zna5K(vA1+Dm8Z`eTRJa8KD90!E1<|&MU%LZp74JgX^)sGtf(CarR z(~!m`I-&p{i(A5J_8wD@0Lfb}Y{47@f>?k)cxY+V7FKzXtWH~j36^}<(9)AC-)EUQT}12FaBuR=@ldX&^DY$c z$HY|uv!g$6)9sqNS~%Be^HtlyMm>wPws(6;V2F6OFv6Q)SE|B0bUfUZw=M80TxQ=G z!(vuxRqbVsEXHj*l>_q&Ag(33G=bYX;V(*Bg0u)*+|WUWtk44u1h z`^0Fb4ukRIe+x2_XCQ1;l?6@IB`xio!LT?J$`wEYB`c1UJnN1OMRxs{C;zk9{;iJY z%gJA0NuRcqYYn_;^otfS#yV5#KWtj)-va4Wt_i}hqQs$xN zf+GK*>)avvIaCe{ME^<8CrAx$*Wt)%srJEN;(iya>_+2@nba0a;bAQ{a=r@=( zhUi1IXb$LTAHj2QrzFUS`NO0r+uw^=5Amgy*M0jvz!8?+U(2B|5{bJdkm?v574m-WQjBusY?o-}#h(u;REIv{!(vd^p?JqUC8LHR@m~+F?5=G+a;cVBeS5Y&1CCS#&H>vDspWt}ha% z1G+&cluZyc)Xu}SFV1Iw(ScQn8H>+o#$tzAM@_^XOE9u+g8>5BsX9w;sU1BI?RMmy zfYC9vT;&qNHmUP|z$5Go|7ue>nfEvZ?U{6$7RE{xP-wmNc}P7|FB4=i^w`ydUNjvm ztotOzav2#qZf@I&VB$Jzx9qYXWgj8!u3DnR_X4uQEXi3{2Y{myrwt2=Sqdqe*O!&|Vsr52dlo9fDitGM0kL^$F+8rcuLso$LAng~Y@?61wg2C{b~V z9Pu-V5S-`RT{@WFI&34f=(Io?S3ucgLt;O8IGF%h2;4qC9YoBZp4{A34eaFNJVvtWKH)>}NoPeloUiEF@Y|69!(ut12V z9N@WaqrqXDIczD2k1!3+ox;p~Z#Z3I+Xlzj)>vUS`HA(;q*E+yVzROgAx#YLBJGAP zq-U$F1Sr5uvWP{%c!FKms&LbgG#oLBD-I*QGYuF5KBWcpowoNn%x}H)$y|3g|A`eT z#f%d>sbmi_H}ts4#(wh>pFr-Y2(^aq5I9e6&@&;XA(c*N$#BP&M%L1V-GoLkD8F=s z$pdiBEo)(V2@6x*bGSb{ny_~OCwp;JyCBTnmB=G`J`_V#w$~UML}^A~Jjymz!%jh{ z1vEUdru6Yor6Io{(h-Uu(*T&ZpsJ3nJnfGM2|b@HiaC^+#D@^N zx?&C@XijoJIQ(3gA^#RoI>pNrWwe*C4u=LPMIWfPEfZ8L97JgasnBYcctTQG0`HD{ zjg1mWmTJ&YVsL2Tjxbr-yv}4so0t#kwqHqF7zW`NcMh%VwydS7N%Rw%?W0qpMN#A? zsmZ1Ul5KXFC6OrFLt}f}@UpO_E)t9ge^i!l4Xz$k5lh5ngS)0NDa1{BN}f)4*z;BA z8RF%=dUctZhbK!#Z2;?VCBOFw(jw*%DUeH3EESs7!PvG@_0btoRQmt%u}68%ocT(vBN83TcIu9(14m z&R+^Ugo2j=Z{`7OGLYs@#K~cOJ3och7$XIoK#VAJ*N*#fTTucQ9=LSEb1XMc=@Jy} zA72Wbk5r~4Ei2u2^~rzdmk-`pVIZt}%e23bp%_qZmsV{vG8^@DoDzO|LBVEf%+>VoIkVpsJI~w;1 zLjGKWVb3uAbp6_^lvsg7hgqO>_kgYGEl^t(>e6Zx;DJ)^9yTVfdAKsm3$w4es_it7 z8LLhA?hf`Hqq2UpXBeiA+qTS!VL-4T1{*r{c2xKU~3d2Xx1*1Lm`R%nRG05TZbynqfycQ||&IQHcSqDhrQtIIKUEDO1n3;wLl_2csqF zl=~M3(PX{TV@0_IT&w-AKmWuZy69bf7mq=HV)sL!$O$aLXpo-?|oC{AkS~yqK}XxJ}ntB z6C8whb_b-wyNpKUx)SusD&>VP*cXvAS}+9?b)T7RhgDvQFw`Qf`UZ{=pYi!f0;}=n z#4VfECGy;oPktB;LN;*`Mp!i7Vn5i&gD#Lp%faG>8l5L_Yc)Zy4?7x(WIYC-ae;e)5>Q6;^NulE7J6ojT|%V7s5F5p+WjRY0!Ot&)O5T{ zCUgx_5T!JbQi;H;{1!vl#dK{8AkpL*GD{;Bv26O)`dRo&(JPJ%5ANP5EO@PbYeJCk zLHw7%;9zaq6C9j=@5ap=(~$|?65`6JJU zJGZ3LU1S*A5&~LB>TCseTv!hh8F2Flk*qoXJoEv6gm%;4LbU>#`2E);LMUHBob#gn z3`n=Qey8O^jq?i+H>DL+mTJ;(D9ZsCycQmfGAr&k`kh`bhicIoV!*Mcu%USCo4L8}FxiBx`VmLwd(j&ayW2f|6ZX!c(T)G3lt*x?@j$j!pX5 zwYcOi$${ALnYYG=F)sNvz!X#u7%Ve{_TE_@)^~|DQ?nZa-juu{vTURkihhZ67GQTF zV0W{-VG~=8&lp>(Y|rp~-3cCPj2y^kv;1eT_Wsv-%x|{B1~86jvfR&vd9jg>+r^@t zBDv=ijYeyYcAv=B#%3=R^A+NTK7b$Sxd!;o7pP@)?#s9v@kn)(`V0704173(vVzt0 zHiC*gdj00tng@AK)P!&MS~diJ%9K@VF+f?cC7Kp7ERy?}4-I&@5-YXYWDRqEJKem{ zn7-{D!uIV0=RdsytInnOby#9iZC#J|4&*S&a&aI#>Dl4(oen^_iO zW=1~6@%Pr=3VR**KK#v#0)zv2^WmErx8_OAM%`#jHfoOF@CQ#cG#*R|!-~nVaJ(Lh z>AL(9eOTCqyF0#CcW8B&bvZqzCDVypq%feT>g52-``e(bf_?5?E(i#+RxCc*M7OH16aHCPpyvFdQZoy~7l`1v4VG`_RW zqebwS?_AVS!2ZdmDtZj}xtsnI8z`GOHK!7>YPd|U^jX;!rW7xE3BWcDAubaiQWFv0 zzFX&jKS5=$cP$stwNR^brtfw}-NFYBMI8KE8Mv*-Teh->=J@gq2(r&Zr6%{DtCtd9 zaBQBp`WD$l_aojFSqJ-Zn{FOF=|CReP6Em@@+_>S^s7FyYluSuXrzs6qwFca9IYsfP-~d zpl!V>!HzaN1Id#YX#2FK%5sQc@p>Q1K=}h@iZ2`VWk(B)|NPm@zx!-5CciqJd8`0o z-1td7iI>S7D<3tjekoO_Cjj%E>u?j_k+UJZ!^C7uhDuQGl_K@+ESqBi4b?Ds6EWD}*wx&Lq}WwaG$*Vq4kK^gYoodMofeIGcxQgS7_@5^K1 z!pU9kl!dx78N(Tr@@Av8@%}@frhW$sUtIVqb;_-a?j~SOlvY;4Av?=uZ1!v#t908SHF1{dz z>NDcxFwxs*MFo!|3)XAU)HJI zAqsR^rqB6N=GV~;hQY?G&beDrR`JITn9aj#Oqpo|H~woB%eV*3CFrutX;&^D1v#CV zvaGysOVS%y5(;ZEE&^TO`kwxL?DKkuCxuyHBH7u1NB8=J>5`en zcYSjk9Z;6-w7l|^;R%g~GQ-iCOJONzvMa7%8vn3rZ?r9q-l{|7uZ^mX>T+}!!bbB8 zbJ}o|f5sb9mVTYFb=#}DXi}kfXM4ioJv5A>_0~TWJ%nbP>Nw?maA07$G_Vgw<#|oD zMreTk^u)Mf_L39!W?vmoC`?sa>*^#uWE!^aOa)YyW-A&WQ{LdGKNL+BjcPwI`)!;5 z=Y(R>KKr#*%VQvK)r(ufyQX^5V3&K0)TCSP7As~_t*JgaoM&rY28_+ZBl95@K0l4W zd>-=I_#!g5{Ja$vjG~lSQ{FDDe{&nWuih`xe%))KKFvxF_H?v6F)poYan+&p^w(il z_X|Ig>z^l11X@14(V?835!OSFuS6&>T!;8r&fBK6Q^B~>$2ustAci0G4MClswl8~> zm;KO*ygV6rN@2Md)(C7ozWp?>aGHmObW}%uQMEG<-D5XS1Z##VN9+U??dFtJ0_-K{ zCuG_qDBQN4e`wQL3ry})RkxaodP(l?{KN1b>lXTckt1zv@Fo;KZYnmw(m zx36~=K^_5moVVAKq(LDlSHgwEB}JLSXu#n_+>5!pd6`O7mnUHzE*8PE;r;M&SU+^Slqb9 z1DnP;{%X)BHDs*zz9v|Nd$?<&;}|_W+3!J^u2tH4`2tRG=g?r!ToSK=Z~R--6Qb}A&7ZPPQASq|2y9(wne z^8Q0w7{Fc^Oi|GL{s35Ry0Eq1H&VW=`M~GO zMqqQ;SBRBm>ur!SsP7%j`Cg9o%^E!7vA*yL@PnNbu5y5b5)PqY*+ z{TaQlVw1i&!k7CQ*sBo?@VD^EQgxDso7dfK+8r~u3{3)mtuk5;tbjhTzu4eEr@TGh zq(I=2&%4AfrcoU0R8)3KEn4>=3X`wvZayFN7A@0h0!?)Sg9)M;ke-wqL`={sIH5>0 z^;IA~HcHil%Wht`6~lyNk#jhBL3$=0$^<;wapFbDw|WUtNntgN2BX?|fL-m^lWIST zP9p@xoa#7KiVBgUcLLo~TK{RC@u{>`fdh$SbGJlCNaoY#FvN3Jz@KQz8DZ@ayIEPr zMc7XNb*+5h7hwS9k;VZkB^x6P*^`g?tvX?qr@X-gWV(a~O0iGl+=zQVwqFN3r^Uo5 z))EKtWMj;{U`!DV<2@Uca#bk8#xk^LmexxLFqXDmF8zr{JHbV!+INe0>v;XS$$r$E z&o~r3L;r1&1sVRWkyqT#Q5BZdG?MNO&uVMkSwY-57d^%mb4mTvP1+Y)I4r0 z#Ml%w-=F<-_Qxd&!K<$dS)&`i3kOZoF3+WEhlX%(!dLcGmBfxXWLM}H{l7pvrma|z(u;toFww-09M2!9o z&Jkg44#mRczH@#IZhu@RzUUiHI>VkBgsfiv@+6Th_p-K^V2c8)&d!NsA={G$ua55e zfZw=yj(2L$=`8i-^cWc5o*T-hnoY#<*DNWO_AwQ*twiccc=XH9cluqorL4P1UGiKu zDYwgahs@?&z0WTT9Tpz_q!0Uw0b$h$o74HuN?_ zt|0j(?%eHZzhrieLAg!3jF%0R%H$U9fufAuD&k8EwZpyBgBj98B zcxSyFB_hur3Wm$Gda1RaJ-+01>4{dOc*dh_K`MjUgMYFii|=CMv!1psKX|eFdqe1o zXWg-~bMIM=SKrLj90c*0Z(1ILQY8t6tmCw{o{&J7L;M6%l=cY6jo;8*WstFbZxmy2g#VRMApfz z>J~{E1hhoBi`AjV~_dG8EWWD(bM~d5-GT;_j9Add_`O+@0-GBNQsGKo=Bw z-_EC(zg9U>U+|cz{ix{qI)43Fw>h&=A<6&OSJbJCxye< zWC1q}vGq4%dzt$m$i1m#DLm8GBM=&aVmfA zA1Q}DkPdmkqrK_a8;R(B_&jvAE*I!Id{O6Kv_YD&pbg3ok(;A}*xcYlO!devonhv< zE}GaQ&lxZ+$aKB1r>}H-MipyN{|0f_dqczkOy6RPvFZQt=tDFOg>ty|0y>ENYTtFc zN>v@gFFr3#zU@PeGq5+YE)|Mm0+fkr*Lp^iQ3|r)qAC}~M zg)t=32>)L4g1{K;mS~33TXvBpwV$85^;FuWi&6(SEB$WwC--E%7)Zo`%c2bqH=E(n z4a>e1U#Yt+B?5#jq*4E%BY}*xV3V&Sxtta7Bi$` zgDr=paVf!;{_2ctAe)Y5k3c^>cR|j`;UAS8+WP83hM|z`h`h%A$E98UJ-b);>g=L` zJW6yA-TPQj&>)5^@_Qp>fqa4y;`7cZ`e%S*hkE^D(Any+xnb+v->bB!tM0y}IMaWB z;RT0MNvndk%bSB}G!QP5@)uvu--?lkuGGZx)+nDpqxR^^m2>C*e!Q2a;YXZwub*_d z>(;ef{{=Z@h99Yz78rL>m;2_ANc{x!zS@sLHXVa|x4`R)zfW+;!Dr|F@0ucKRzTe0 ztHM8B^maT-eN8&yObRv6Z0cOYr-&T1 zDF*VUp)>c8#|^$38&th_0(vIPu4|d!{9ya#0Wf@~vflT*+(fJQ_iG4=YQJA{HJk4M zHhwNHqo{#vPb(MS`mZb63&i~)c)V56!z9DB8a9~reD!blW-4~2qXM^I&Qz0{4;p+A z{}fQZ0_<;0mj$tEL0TVkp)*wrp+!6?JOh4*DQBLg4s;eS_CX``Z7?hE>wiNX-+@JDwS!TP!(8kXR{yA$hX0sbY zEvu2&;B}2@HRCi_-bN0RJKi7#f*4SH6?Figa2Gp;IFF|U{1&#OMa(Qzi3H={b$Gm_!$sw4$Z@?&^}uCh!?s`OF7a#=q{|~9A2#c-INfLIcwr?m@6h=C-OZB#?t1e9@KP}x?wQsX)^K=$~@Ls6VKF==+Tql+Fc$tP90HY?? zu?nwV2sd0#3R)Zg2~V#2I?EQZG-R1WVlHiqo4mfM9Uyqzcl_Ib4bw25UMRLUOiIb> ztM7P`XF&U-)2}oyElL{Y7_@FtTlE0jb6-Vt#p_vKLIuX3rb_ldOZ3RtM3#R-T!w6J z&^9SXrp|0z|9n$^t%Oq-PQG5aNa47rBq+eP9liA=zP}TY_Z{KKkz38 z#MOJ*qy^pxf3cRBC*B!TDQ4A|ifX}96H?$Q@ToK9bbkr|lXhkrc+`!qe~7>KE2V(* zKUfnf|N39SuZQ2KpkL#$(1n7|BUNvUn0r@xA9;RzCCy$M`kFgA+Cb#&S*a^pffHP% z-%(N-8mc2OgROHa<4CaKhCZ8Su*~E&R|kpb(FTcXk1qFK81FHh$wb$caCNIK zKWX0&{xKU;A237C!-d2#eao9?mnZAuo~efo&A zUajf(5}&VgthpK(%jW?r*G*RpIH$i$E_#@cX!*f4mgVhWe|rf56hm$tW1cHaM5t;t z?vek^4B1`NzxrL$jxaDTXPH9SH;A~Yrnvu5bv;nFoSfipFQ53l;guLc)h|%4fvHYO zIhQo6y~eb^f96)=IwA0nQu63;rNV&YH+7eSdEfu)e0%UMA ze*Qrn%nc6l0QS5k5l;ZR@WX(}v0AO8GHZ7ELAIpHpAh_IW-w>Fd7+sjj<%T9mjf3NqV|oJG7u8_wV(rNLD61p&Fv3`VAVay1bchZqSe8S}Ax{2B7= zS*6n9E*V{+a{Oy~$5J=eh+xkwn8euAfZ5jJEUMZ%@`JBbkVTjiv@`ng){`8)Z*(tB zkgW_#6qabiXegj^=3%SDo2Rr6a;79&e;X^#i~GRx^7HbaSIq{|Z)F+3+%ilP@*1T7 zBD{Pwb1~OGU-ioQYCnv*K|DLhZ-@BeuRM&0AgbW^(sBlzmhS7cD-#_ocng zvr1l$_&xvRZ!wKltKYEQ5#;6D^Hvx>B##_7Zs&Jzi_D;R^UJmAr9JLj4@KaiNDr3l)&5P7L^EfNk4dgul4~99KH7z0-SVqlFjyna(`$jdqah}700{J z2K-ROD8IpsT`W=-R8pH=^9lK!@AzA|pL*248gn>|BKi$dcSs?#p_vWx1U`cRE}^q` zCRnwpzN&v5z1BF5)svO!7esfexo2sTLc@aRSJN*x2A!4zgi9}fZ<{x_cz-*1B_?a=CwgRv z0y~MFeRU%pmfqjbCC%sG8gihSmC76S_K9oClbqT~8HHYEYRHXco!h^e*j$0N?#Ac1 z7jAxkNd+`d50K;tQ3$Mi<@yfk_ zQKioawCH|y*=nf($Zm0nwHw`>caA>e^|bTlZ{4kvArTx`GAYyVhCw3TF}JkR)ju)Q zxcl9r+v)fla6iy9L?VCUrqSIKKEp(X%rVcUGL}Y3&Wn$Q-WzLsl$xc6Pn4HhLg+)2 zFn47ufWygxc6G8Q(QaB>m!orO88p(LC7#iaE4#k<6 z8NPJ%J)cd%n1u!FTAE{im_v5>W%*nYy1>UmJMRcSHNEG1?1f_cn7_DRDPk4Ze#Oh4N5h51SyshJ z?e}NuKkX`taxH9zm%0vEmKbScIC5B4k^t_!*n|$-(t}U$zH@ zxT7S#2cA==zqSl-)h~4Ejm8pkFIs7n$0CM58+8Na?lGpYAkTPER^sihhz3GJHY=^h zVQ665(h3jB=^N8;<=?NAeth5KQ#A?_T(Mf<>S$0ce9O5q_w#wB^~}gSx@+&DyKsD1 zr?c%OY4SQ)8=k-GYY zO?=fjZd`&Ic{24g+qL6IaPdQ*qsCinh;nHBljSP{F|mHld73{?&r8K*txg{qY(23% zmiXsKrr8@lX6HY%a}}oXh-^VA|J=Ten56|iW&iC}_`e;0n%YcT99!hoP=?zO`TUSq zc~PWG&lO1mSHg_|fpR^aO2sh<8}AS927XF3P-wXo*t=Z4vs#;J^sbI~Ag3Fb+?3MC zKl>{DTTqYcf6(Adk5||VKBkhU4*X+KnD8?St+liqz zDRm6Z?(k*!-(I2b*dNqxD;{9ovef*ypI>NyPvDFbFIbsrSN$EG{ny72`TzL%pZ@yz z`_X^cHXN5D|7gek+b+C$RP`SN@7-SmkI*=K=T|-()70jZ`{X&xK{*x%$Dh6pL#0DD z8fg2lJ|FG>gN4^Kg)95-EP($%J8uxNo8W~hcba6GYLRxEoE!?}3E!dR>-}rsb?pMe z8^ju-NKJ#2F8OGi0uW#nLTO~j~bXTX1ew*am>!i{0A`CT9;o!89 zT*^n~V-KxY68|cP!|qQl;_5mr~u0F^BNfX_`2v zPlyW-k8tfKQ5JFH&uA8$NqA|OqNa?y4DBds^TfV`mg@ojI^OD?+^}Hm^`R$#6W>hD zxLkFW4(U?bU5~NBa{FTP9vo`Gd-{fU)ARz(=Chq@cCdeNY6qMYuuBum(g1^+OL!G< z4^G?H>%;-2Y5EnDP(Xwhi}KNxV(_|5`{rKQ))q(17Ku>DVaPHX`jk^Fg(2T0RRt8PlM7 zBzjp-EIcf4uU(k6I9!2gDGWuy7f1f2g$x#T7J3&YV4Qy+-H?tLdPG2f5X%3&rfExB zPZtiPF5Vx=Qeja!4S$#==W_MGOdUrMpK^ilaITCRCE_kRAZ0(^Gmx+;97sD*K%$wb z=pK53l8eS^Mh}W=ww(K?B&A<%4a)}QCv}-Z}BMcmYP#n9ZW zpW2gdMG>bSYoek|0xGe25gV3=pARx9@f=gwrfg=m6ZA%ZJSIiX#hu_bSi^=NQ-^NN z1nzE&n+T5TXV!zUZtbU3`V1Jgc>=yN+5W1d@Wce<7b4}( zg0(93Ut^KSt9w+-q1<=;p=!|4J}uGgS>De5X`=oDwA}ZzLjAGt!MA5cU1rAXADiEh zNPqgE6SSx@Q_DwU(r(KiDk6LvPS*u35(>TkdW4$H82t}y0E2R-xsyJkjTW`&%V^i5 zBE)Dhhn-%J-LMO;-_#A6pubIAHN5={=sVTgRsyaO5g(`Bmezu^1Ey49FHdWe0vJq#VNMDnYbJ7#{|x$}z_umo)fdg>`PlMkK#WE>CY zNV^_g8%P(9zvMDpqK;onHq3sh_|id9!tMb)+y19XxX1iwM$^i1qn5+a;K}skb1!g3 z5NuGRYfqq4R8Wo>_%3K0{iVV#SAPHPHvNlCnh_}NxE46g;VWS*1pPAJM}Gcamg|Y7 z3N*qmk#T(X=JnKWby;kYRsA*SW8JP2P;F`?T6`XtPR_nfQb{>^X{jn!q=XIj|*NJ zZ|#Q5txmH21iqwslb3v&13sBX{>BOU>}=m9-HZ#9h)~Pcus;~6ard#pyp0nob#%oIg$hOyGPen z*Fa4J6NORvWqwTka-L%e%i?6&zn1uP)npvEtlOyBnu*V?B)KOak2U75&ZS;n@#7;s z#Va6Tl*eHDxYC(nj|$b7h%PB-#kTxFZmbWgJ;6$*vatW4VZ%q7vOk!nUs>)oIFHw9 zzbp+tw4(CpC0H19EN2qvY9Juwibq67d9HBZt{3 zH@o87hIdTs*#Z_ zR}ScN6I+#Texmr|E83bX;28N=>Od(3X6IVJl1N9t1^Q~>XB-m?<2 z350N>^z$EPEmvA3&j)Q)S|{<$A$qtHS{v zarlwtv zQx7pXIdb{cVqv3}ygqrxwUVkJ?f}lJ(U*D&A%A^)s?;(R5}L6G`K4B2Q7pzJu&5s2 zqU9c-{N$sgAW8nqw7Y~$4=104))Yo#F!)&Bui?VFlgKt(+qzZ(@JtKNOjo)YK=)H_ z&roR8;wcQCr(nfNYTtY3r8RAn$Jf@w89^Hgirir5g>{!M5FW|_dCf_yKS#^@Ex!+i|uFwVpdG9kkefMuq@z>78JPH>K zeDlbx-9lDl7CkjAsFRAjqw})p2Ipg!g6I7k&b847(M{gNS2Z4g?`M-Oefh}y+lI;T zygtK|J4@#perz_*{qqL3#R_&i{?zvIpGaRdZc!S5n>2yI6?Sc9YT8PAGaA-*L$+N( z0E*X@FBia5mZDpz+y2Yt@5=-eoPTCn8&-f=8s~_(QNaC!wdJJ+2F4lBT0f({ACTn} z>>r_gp&w!ta%1VPHIhv`LV`BZQZljrz&O>NaQR>=riNzMF*=Sz`kiH8Rqax_nkb7CrYm(5OuNes9S`+2*PX=i>Z|=*Q~6H(d9- zcG$r5I5PF94T!UPy!e&P>&k_5<-HoZ#;YZ{TX|tvQ`C`tL41!dn_}G~R86Y5LfYhK zfSRIh+nyATZ9*YnUOr3F?Te+4K-kX3f#jC=^R@g+q+1#l%?rPn{^d7X2~1Vc%f0*K zx9G2bU_+^O4(HqvYQj#T1Pzt@42E3_^shk92}@mx;rKDq^G@%dOx7=QoQ<(2<&)1U zn^n++ILpt+jRTTbARHt4726lLZ!?6?1#FlCiR0g(8aOD6U?vOK*svhb+a%iLilZ#H z^Xa?SaJD(Rpt4xwy9r@&3i+olyM zflu+ait4+AJH2E74|i`FR#%j4i-zD%Ai-fHAy{yCm*DR1?(Xgy+$~secemi~7Th7Y z!(F7iPxn3N-uK?`_iKM)ue~y5tyxv0Mvdy=DiF-yT~6)zdxO(xHQj3KtmX5RoXeGcs6jnuu(>ksxHQzJ*|1uwsIv>RI~BAa;~61e4>EA796W3#$LHfq(y8dL z-l5?EQlAk|3|IDjYt8OGW~J?$ZB2^&Y%z=Vc9sf8gw@McxGRYE8_u3&YXx+RI)GMM zN(QG57a!%eJ(0$Xqi^YrZ4Wupcj=`d#H8|g?t856Lj7HmJG#EAHi?XmFHkQ4N!a(Z zBmrlP&Q}->Xw=Oh?*OSrc*Psrg-&!s#LLOwq45B(tDZhpBN z)kD?aN0~S-f27RH7t8jENj0GnG`)Rx;M9ho+g!Z-2g7W6%k3yyCCX-XMhLgpa;_3?)pb6D z(QJj&krhuj^us?=uYWVJ1O*>}(@%mJpJfxkUslMVzXkq11wRK!6+`&>xI^$3`SpXF z6pLTXOq@|&+Vtfwn(Lu;C+d26@VFLZ)^LtYZ#_(j>UZX<%Xc!(9g(}4HvPdq3`(Y!=`KCDUrZw_ ze11Lpsb#VHtQfJ4cmU(99mE_2j!dAfxAnmjeVcH*vV+|yIP@Ba(MC_;cv1vpZ^08| zNuclhDr`9&a#irsKwEQ~J zqH^=e7O`xUlx`3`ci?hS(Q8E2kY-f%I|Fb`Z>#hv)X+16EZ#&e41s6K&lf0S$prQ~ z8b1DCoR*I1qWD^Tz;b5Cc%k$oAh)*r$Fg1!bp!0ja)a@X-3ji&QSlg+jA)U%B+~0S z7j)1fT11E1ZG1l#A++_Q6}2q{0?q*1DP5B$d)fNRHh>(kG56bcUEL~4=xsLOe2qyu zi@5g15q=GH1hw=q%+1dw>tST zLIV_k!>?w-7MG|a&AdN$%VOiLt!V3gNiDKixlE9A%9EOkmqi=X>M0f%BnBAjW1?4G0w=Iq?!=D)_AUWTGVs^w0Di5%RD!?Hb0-*B;ix|J-o>Kd zJJDltjB&X%!0}v6%&e@emE_q#;do3xF&659 z_8;%mUvh)53NHXyRK0V<4Uq#15VBD|!~PxeJ1{~AF|L2IAAk>EUYK9IwgdrB%lc>? zqV4kuPJ<0=)DkBg*Q6SJNZ@6}Y0RZRxVh9QEsGJ;Y70{xQ}2;wEdEWQAQ1k*tBr&> zGhG-_0MHgGPNsoK2z6AIP7UsyrrKs62P>h4jCd=bvk<2LcA(?}gPX3y?vaczD;9T z?=szl(7`Q8=KbHDAmDs^yf|6K$o_RTFTe2bmSGIjqeP}4<^+*ql~89iJ0;@O28KfE ziPD2D)7!C8hn*qhHyXC=W^c6oMSSrrlu>4@5D|6<1oc07EN}neDa!s-)raT1XXh(` zDXCB;rYV;AWatbQTCoi0`*(ZRm1ar#44uZysThstAlM)J_#Bf@fF?1FNDW*92UEtm z?AK~?KW8ew6g`O<{rgG($5R&Ymexk&ClAVmCUgjjO1b;Td;n@*4g*o8SoXi>^LJx} zerI{V6acLd!tq^x^L3o|%KeXRhVTvW>jY33VdvF^5J1O2GvGVPVDNvgAaKVRf;Xe# z_jS%E1(n~JH>B71?*(-Jz*zL5j6;R~=WYLk^7D6u|3v`$_rH7_qk!LUxxos3@dP+Q z2<50h|K666m>^&*h7b+;Kj-qFhr@qt@BiVF&!RvsA%!5ENv8mKa8ZbC|6a~J0z9~5 z$z7^?|7i{X52O0O44k0+ZB&g~{ITD%P}qt6O9Cj~_MG?E+rk_C>h=F`OZNXf#{ZfP z?Azn{<(D2}GC83GRDdY%-)~SD-tKB-lc@6Fw*UV!xc@$lkfXQXmnX>>OpykR{rXLj z^OxX>LJx4SfUa8S{~rhU-xinGPY^iaV5?QYjl^Iwzz9*H|6b6G@W$xEN+&`8H_Pka zoBaPi;!XCq-ye~DOu2&1VW4jmEBbrefC%8>5D1ds{I9k8Z^QZDUi1I)-T#js*?Xrj z5(!nt!F_Kmm6h#io+z`+VlOv$>`H_Y8}RjC=U4!& zZ^z41++2mau(H>KuUKNSXf)T2U^0KAj+HZnfyT#6Cf+6c5qiY&j*p zRxboP!b0~Egxgqgt)fqz(#dNBm@XIJi z@W=Eu>owN_JVw3a^q8mct-HX^MFvvSu~OKp(fgXK9^|A*0gGGNG^aLl`Q77lN@8kx z_v@srVwDYv07PNTnOgu-|9N}&G+u%mGVYpGD}v-}K3^^el;@1Vtd+>T6+6s4;mvEe z)`yRCuSx=uCvDAQwIni72@`p*t_9(nEU0rAlgVhmr1EJ8FpmX;3`+e5SGHfu@2HbD z5n^7YMfveCT>F47+{lc#aW}_x0al>b^QK5KuILmuinoK0t-Oy2IKY&MzT*S$X`>}@ zqVJukUcD7J)R`*|kX|PIoO!FAxc8`eoGg<^Yj!wLpQaG#FMUIfFK;XPR!!$3&Ueo? z@{DE2R_;gFFHrFzfHa2o&r3d2_KSOCZZJOtCg(}?Eb9wmD*~J62PTT-Jw^V-EV*MKS}_+5Eb!p2ikLzwV!r;EQwkXqTE&_LZGA^hgR&xko%$lIM)@9Oa!Pu#Xb!u|{jz0` zli-HWaIFB7LFaF;5iSIHrDcMjxq$P)W|;^uX3I7E-ghtbpD5!8NiQo5UE;n-Yj0eR zK5X@#(-fHn@^fchZd3952TL<`csg#9&HmJqGY$9H=-X!W9%L4a-?y69((3l_95TEt z5}DsM(s}bBraBTs<@0`~Wz&l42 z%$qIAMMLLKQo8?KfWqDuFSv56{?i0K3p^WWQpDJHad@OKO2A~~My$Rv&g=70kDA4L z?DO;|(IX|S+uL<-w55?i>+$L5TOMAZrZ9{}ZGSXku@%^QX1*a(K3>g}uK`j(XdoZL z`M#^v{;Mi$+{3MDA(CM{*)_N05fkSHY`8xiV8&Ymzsn2=X~~8$=EyJA%%j4sy)H6n z%Su~jAq7*cyS3Q-0qdm;j{rvSOk4J!; z012Oz+Ya783DlP8dWE0SG=`xoKUS$Wo6&IHK8Zg~d%Pu6uNGfcV*LEmcafb(YjywgU)1e&wBk{tRx3XD+(xM{n~hI#j>R-@v+6VtgSbzh&Ic*qt} z1*?0)YuCv04=#7A{NGO?4!7i=%G74;r&Ibc2^8{!Pk11$O*I@uNcrNu*a}_1ZQ<;< zrGo+%yiYDvClzRYA~IjDnFllmnh2+9$Lvb}YyzCMFrNS)FDOi<+vZGg-vcOxGn;OY zw*2A^Bw*X*X^Eemwv<8c9Q=jRfXc%M2%E@NAeo`CFwT8TM5W$FLv-F-$7^k@C;DTE zpEmMiHL4ZC8&?Jo%UC^5otuS$&C<+X^FHk$u z6_gaS+UML9A2a-gaA&mSDSCT_hHwKH%@sD#0~77w8;mVXfo;i0AhvH9A})|44j4m; zX}8^i`b49Zo|~I%0`zH(2m14=uLBJ<^PNtX$XkFWyR4|B%4KRo;7|zJ1NiO{iPV~A zI7*E?+_x+C4(FRfOEt#GhU1xBD_!C)z#;b=3|MxzcQp9!0A-Q;YJ#}dXqvG3to<=> z$Lb(gb*9kx$Yi}NV9X!-X7Yy0T+$hU4e~|Mc#K~9hXJo(03x z7k-~Q>aRP?A6CkR#`pL&z*SzR(Po!(f6^Al1p8Td^?0!^5OC5~pAC{yK57e-C9ZMg*jrKHJn zt?B)Z+|P)9!e}MTaR3555vg5KQu4J*7s{WK&V1IiU@eaO(c_mgJMNPO&BIeWNm3CVmgOqk_5tVKWsGcIufJd&@G^{y4`GkJ@9)E8tqZ18rb%ZS01P4i zkj1QIEz9#1awwxPCK~j#(Bui8BbCYK=;zgZ0Zt-*Q{CNQ6FW6|h_aHGzBif~qHH+S z@#_0CO}(KsN0Wnja%UKWOuW8=9TV4B#0sA<*q}C_cE_Xe6)G=AXWtbx~lIQQw3qE!#cQm_m8uG zz_Y~E-aZNO_^)6^ViU4tsOj=p%-RDWX@YfqA7I<}n@u46&>l+4luV@j34$mkqpPlT zZ#+{@X}m2aVvT9)0Vt6&S)RM5p!p>NmsduJTr9Ufb(a@>JOAwXv}%-AVbr4PEj7)5)#F{gW%Q~gzTLxpENs2cYapG@ z8x6Yh+&tA_so_gVc~L(F;b!GOcye7n?z&AKruASQN*){w*a>zXwVV=u-s)5K^k; z0OURaCnLEVoBfU9(t^lV^%|FPRVMoiv@{cfgiDa27jU(^YjEA7czBxdVmG`3FS0K> zqbU?Ck+N5R6bL53%OR`Ix+!}l>qrQuE!`PddiOtxY9+A!;(CqtV$IcyrfayIS=r^;sLK- zQEfOJM|qU%Pp5x6?j@F(*6~X2>w2wje)m4o){^@b7SL!zx%z!1s`6x%Q(_ zexY5R+g0x5S&*Is{~kQemqMUM5&C46dbMjPU*-Xmi!Y}hn)JRNNM5o3S;Qx)S#~_E z$gLbk9&&pnZBg*{ufiPS%A1@!5gl{VhltRW8F#i&m*#o;gXg)BU3YlqcfitirAc63 zp~0O+D;#v}lP1-a$l2X8fG z_Czh)>^H=+b}|ILm7O8H-aL+J?{(it$V5GqOpep0U2IgV4sm=K9QReggH~&3Bc1L> zwcdc))AJ>Q(43~|g{hb>bJS?N37}#)6cS>jBh=37KSi;Jx9^UYHj%4Gab6A6DDP*y zZ?0| z=C|uPGLJ^V;_rDj%aXmN*5Skjjn{8tERKFa>`ryxR*7XyntHWTIXA4eJO1;tYEp$ ztD@-foupeH!kb8G{WVxUY&w3XVVZxWQlegRqv^)wYNgTjK#UtrRySmtJEaA6vOaI0 z=Rv4yytEw-WxfWo-x_+m1Wg6+zwjq?Xgx??G31ommufiKKf@n*{!+0od)Bq*I@onD zx|l2X5Wp%-`=G8>YG3{n#7Mh0Z4>5rIor?9o(2b0@Z7(94La8M_*0fH%R_67RH$Lc zP+vE2}xcVRoW`Q_bU&*OcRaFiA8gr=1IUtuj2NvS z@4_3Bxj-0+0j36zqucZN%-FW;iISA>{$W6Q2E*crk zpsXrn5#V>!#p<(9Y1!Z{PRKHl#qqs2sF@@Xax{^T_MRG$PkdPD(K{}BVRY@bnI7HE zAl=^xw*C;k(mU+yi%VarP5Rz;+{_0u#7I)zA?NYTyVLCCmSrk{QkSl>fgxpm?3oak{t5C)DVI1J~0YZ_is0)07TDoYNV(sC)Dj z4O3Y$S-b*&I2bsyZ1ZRGKF%rlw!!(EVc;x0WM z%rrb<>u;gUWRir}yn=hHesb)kPG>b=mDP+#_{p34mqx{ z;!5>ha9i2~wD${4h6!oi&jdz;(QmAZIL;txEj?6=WZJ%cM~QK>MSUK$SF7Y5ch<(3r)Ma>ff4egY^S zmhUBF=vsmw0`sJM;8=ATyshUdRKVGO7~Rm*bz3@S5=+dZ=~i@Z2HSYZ>q3L|)T-=< z&zVjgklB_a^F+AVtmjhM!Fgx~h*(&TciNC2nEmL`1FLq8&wQ`8qWnXVOk&W$8=j#-gr2(IQ^(_hWlnuKO`;WCAJ@p)TBf-r+N9%^_8e0t+al-t*uDGA_F2&&O}4{&O+SnZT)-Urc3%}-}{ z0P>e((D@_M&rn_#WFlmyFZc}AJd!Cc<`vnVd(j@EZT7~J*y;0xFUlZI z{CFvAqb_aw{l|&6{{)++`-bARZS47}ZqH^!x^kDUTV~(alVDW`(P(qVaHd~HncMD8 z-Z0^)>^-B!jKpfnx-+iV5fGda(J!<0zUW@gtrkV(SolU_s1E7|G)wtkU(N}yUK#_+ zB_&AQ)oC`PVBJmS`xTLX$>Gn#ItWNBPDgAb4u?i3#0nD6v-Y1qGe1(XZ0Vu3vfcoY zDytF!T|6!j;lnsA*ISwbeV7$WRp|VJBsqG1NH5$In-@r?B}%2U@@@4;=DA(-FE7-G zvm{#s#te$YmKdfN=`H<%x1!IXM45v|8lQ8I0#!KhWnASTP7o#Rr{dSrcHIwzRkrVu zNMm(N1EehMbaay=rS^LV_kcGwHFca9#+R8eCM?@C3Xze9TCHlB({#_VtIM)gbo?UU zz6ijw(;0>Iz={uy^{27meJpGeaLeQ2=X7KX-S-N>GW2bYCNDAylv-s%DPD-)9U!QY zf@7Ja`R#sS*1~AzuR*KeNn9xG7Cx9P;uSvm;1;n>3NB}Ok2VG}n z`B4Sqd$#IFv~L{#qfRDb%gwHl8FfTmepiFo&%enu0>%Ipq|~%00$e56j(2<<1UMG) zd7cO16n9)^D;o04ie$+T=JO$FKNvaezzT!2oC5ScKfq#>@mX~qm~w!Z{Sa3=RZPRL z?C^R{wJp>40!@)f-Sa%`>kE6b8=<i{&qzePdcbkHYxQVacTjfGu)<&^u_$HC0HHu8P=VezIRiq7B;Adw%1 z(1ld&BVW}QLBpM76HHXvs=xkT51oJ|QmP43j5p$M6bIl>{SE6N>H9!+=HTYZ95i`e zxu7q4Cgk??Xc2u9CeQldY>GK6%R%)`HBaASGtOALr$QHhJ+26;$2%!a>%!3Fps=?% znr-GG;@I+>8=&S}!iU>fltS~AI$~g7^EOXKqUB6ysW&)M#(SZL_kJ4Q3!me@uHC|; zH~3!F1V@Ez(Yn2?z3zudb`>n;iP=vuQEgf%nK50!)AMZ~L5MnVYQV)5x!J>?c@db= zbfNSgk$s4ByT}}p)j^d3r#U)5&1XaY!Va%#@pZ^isD!mqYcml4QclWy&j_zSFe)SJ zt+N$hOu5!!V<)hR+V%1}w0fAoAmr4V((KS$$T+7mZ6)qu^JhM-| z+j1I%?8y0r(dbO?_V>&+VtxF{dqNa{o}anC@Yw-sD6X!Ic-3mR3s^E+pb0P^vl74Y z-^2BtRaqtKJZpzlrqvt_N_0|FM~6fI08^1nKly&}1gNTOV{pcF3a7y$T^YObj>Bs4 zT^B9pmecB}SUSHp6qUo=JwqYbR>kDj-nsPk712>!x%I(wUY(|nmU@ncR(E69m=A9v zr8C%)?#kDmF9kr=+c5k=gkY9sS%*+~5<_h&^*L4zt+0z;M2F2H5-9SB9riSm#h$Dz z^C1Vp0wzcK6H zySb*0DA}T;u$LthvVgJbGo}0}O{mmwwly~&C<{kHNU0kB!i&B1Qezoyf;Ph?{B{*Xq61w4BPrp@T zP-FLc^Nnxu;{S#0#6d*^-wZ_=pos>3{yD0IqHAj?N8k@xcad+Gw!t4K`55*5i49%( z?6=w}(9Ju!OM$UGz;w1e=>hROLWq()Y2;@K1RWblyJ&8f!5`6B%B+79kcOrFXIx_Ldptss@<68#99t(L1uMVCKESJJwd!Q*HYY(+qW!rpG(GrVK1u)*%r=S+ zc>1yNgJ2V>llglxTebF3j*hlx_+_y3?lrz&0$ckNt}U*FK6|(`p6iRbQ=og-+){D zFK!Ynh70>zGq<3S%zj|x?$1^3>f0}ldFSgS%gl7dm?x%qL}A%AfjiNzsA=zy@S}7V z$EqLfR*4Aq7ZUJ2;a3L`mz_-PS4Z5O`=26NvA7BAg`e~_t}ndum#*A`M*0&3#S;=~ zx!%>1np6Z9Y?r0YP58OWk2b@8UmuemOU5C!Is$D1+ErdN4d7Ian+EXFYAdqGX9iQ1B3tJ!f}W_< z+kgJFo>-gejtN{4^chUy;6VhPNc@(K!hL}h-xu_jYjOKlgO?XscQ7Fm3pE+Egyo1~ zi3fG9UuC=ho^(^U)U}Jnq>@UtIror;@K!vrI2-UzSDMSzbFShfaTMquaev?_Cj!_} zB2gEWHofxoz}IEou`F)mvSK#&_*RuwKVHZbKSUCZRVL#(K@feWmG|8QY5#)hcU4e~ zl*NM1))&k?GEA_|XxCazzDWm5(4#ALc8qFV?+gr9+GBXxl0#*!*e&!xHs&kGA)#P(;pOYm>i+ zagU>ORa`o|CT8Sgq+K0k64h?1avq}%DdGbV9hHdpB5^zZ?v1&5N(oiUxp(k}qbFfGFGuCZ5wA=Wkb zqh(b3{h8!GoH5VoAMAMY5Q>bvs#X8S>(&9=@rdL#Jg9I%Q$E@h!`hb4RwZ>2cyf|C zXTy(mMAT|?qnPu{wxyNTvu8GuGzydx-d`7%>|WE=B^#lyL*E|zTrfweuK|*>Y=z;7 zuRnFdM~LJiXwjvDU}3H7Dj-4XTyaz;n#KRKx?VtbtY0J1Ljqme%d|aQX4@j{bJsfZ z{G89iUCtLsFID`c1?K1jgZYD=F^SKgdTyWgG=otWGZMtr8364`@-V{Nf6|SfN*cC+k+}wORc*))__O?5(()bRhZ7(Y$~@#t))B1sr1rk zB_}PJ$f234LUaU3rUMw5t;&`WUSySv7}Eg0sfph-GX0Uc0E_@>*9OZR7Tx-g4sL1d zTWuhq2}(OR1XoB9k4UZfb^Y(H zJoWM5AGHY{BXJlyTThUVXjy;3Z3!uLcceLDA9H1AdRXGlfw&t1qy_3IY%$`QELkGO zKDhxV$Q~)X0>@2L`D$L+_sCEHzI>Kf6{4TD^ar%1b^prsZkd+V{6CD1T&q2GW~X2ZdR3yCW%{{K;(gUldD}Bu)Q7$X)`C zUuxZNt%hQWgQHu37VYwZaG&;fk`Sp>v^{t9gF%=O_*`!BNFZ(rJq205Ej{G$^ z({&e1EQvZpTBGCX0{${&FB^J~$8zNOzU_QosLJaMskd=RG)J$TK87695|6C6m_ zc<_55&?VjI8vW#UthA%^;D(`m_VJ}Fp0D$0K~Mi+4R$$9M&p{^S*9h0 zh6!m(he3;)jyx#BI~nHX{`JVVauRYAEaI<+FveJ(F-xki6iK3zP5%AN@iM+tF)mK5 zb(BX!jE>E48jv*=BG_0bK-KZZOB1GDa9OTADO!4`&q7dDWh5F?GiS-xt;ENLGv^t7 zgVQUCi4qG`Xcd-E>y8s(@KaKvsXFAQCqY_k)X5GLAXarH%qCye@Okzme72C0uGAeZ z05a~i0H5}Hy7@zNbSJfT`OMF?P3N~l&}ycvJCmaKs^|e!%oCyuD+C_hK=8%ukkPSi zlo80qjJj0!(_h)J5)AoxL5CP;9)Kxf#DGSe_mg{byGL>ZDG;nb)1e8KeS$(&ZX-?^~jz7BMxpRvE2 zE38AP`VeWJ;*dv!?qdSh4T(@L((ZA-OEi$t5B61)gYuZK74lo;sPGm$=`VIn%Ge(| z8*&hfBT(TZDi%iIlD+``_B+cfODUpkUWQMAa2N+-rflBE-{PhntALv3k1T1jOR+bg z2(vZ7eM|VBk)GMcY{pEl0Foy5`zY==piVW?b>8~05Y1MJw4hTLP(Fo)#$WjD)7z47 ze<|JV>r-5#RI(l;e{WyN1nc31{i#&hpKpwJEx^o=#KBKuJXJT__M@6lN@XbPEtaRV z{z({xrg&l9sh>u4Nkmnn2~$qvwOj*=b+#93?;2Ul&OUodPtCSOd_=YWt4y0MY#bbW7ay&O0B;D!-Hw%5J*$ zx5{;SCDkJ!<#Z{Bw4gHgxV%j+|7fxtSYT{%Q*#ffA^TbQb-9S}$oL)YJNhv%q4sC9 z@^<%&?f2#om$r53;3E2QQ1j0IH#7O$@$`(Q?c5e|Xo>kLQXUW~ z9*n;w&~Z3q{}lk0EBRX9s zjn$864sk^0+k~J`lm#UFTO%+Mpy+Ay;WNr82uevue z-|T>xp|w+1=OJ*?!iMZ5O&0aL=d()BLiJIAnn*ubk6WE}Im?z4Nus#~3^W$*5q;}v zS%Y+i-Jm%~6)Jm`_j^bL3-$(U6Wp=(`~>^$#-_t;qGb*){eOjor7ZrxgTQe+_57>9 zsuKk_N&B4rr%7b1GuHWS=%qKC9pe9I>kAcsWkHt;mc9`)a1kGWaH(E5{f!~-!pv<@ zsX3Jgag4I+fl~&QE2q;Hts;xnv7SDcjnCOeCU}6o=A<^x4yS4sARjGjZgCgIgs~C< zl}};OTIxvcL-U4uI1Zx;X<78>tuD(}`a6ToG$>tUT#zh1x zynXV?;c#X!!hEsXQ1*7sz2d+c;E@zO8fSSbd9K$ON8cmT1o1|iEmY=I3#=HAXI@u< z*d0t}^rN|qf(A|Le}&7!V^Ck&hJ%{ycI2!YtX8qF7mc%ou++r!?#lrC7|$0Ixr+fp zATo~U(}~=LJ_jf$?1xkN;`J{mTGIuRmd|bXyJ@nIHzzgM#wa>@hw~NIM-^fT6teRb z+6};;O!MGAlA(-d(G`VKXt#UJ)S1s)JP(TSbt3sr?@~>ETuB`hq z!=5Q_Lk9Puchg9=9`?K0rmwQ&P~1+6!^WYh9G)^Wp)^jyfEs3W0f)IOv8Nl*R9zis z^dvdw#A8LH#cs`Ei+Szzq$EwZJ&r{c&|=FH%;0KT->c9q>n=#c{$!VGt9F_FdOBC0 zdO!;3{0Tifo$xby+ZQ}+-rXDHc&^l1Y0M$y0j(K4kFOfj*VbJ*QVu$Vp1;?>jC)?2 z&M0f2DtYs0a+@~0R`i+|tONRUsq1Xz-Y<7uwIWT3htmK|xAQ13t2(u6y|m|g8CtZa zX(n>Az{qpB2a-xVW&L_o=NF7-5ZhTN=~ z%}yuo9`A)T>eOh7kjneTZE?VBJA01%2IleP>o*A&GEy#N6LpQGmfGS?{lb=>M^J}W z7(b5gZQlh+^m{KQXQ_@?ptaSG)sK8N`qryK>Eb63cM&n^c6rqCT29o%|L#Q2ECJ@$_riX7pFbi})-@Y-&1QY-S?0+s~`A=&CAAqv=^)9g?Ek@XJ zQ;19@S&GtdU-~Yy($+VehZ^y@pWz--sE&5;8W-Cfs}8byV0S~S1#zF|+wULiH{!qk zsXl-@nO&OC;BIH3@V)_b9Gj18=2kV;(HHxDuYxw`$i2H}sO}JFq^Y%O=SGnKEY^6M z);eS{_LD~7Wy<&8GOh-E$0%9$&nji;;Zt+AR^LR6u4@JK$z}(<0I@gjmyF8p+iD^0 z^YfCufd_7TJMS!;vI8gLr1#f!TFd^_>l48Xk;RxGb1wq_g{UkOh8X_{$r52h36?p! z?hxNH367g_Y47KP<#zMFZd;?~n08N&L?QE%yx@PJuGQ+?b63L z`9)B}qjSYoXrA-l68BBA^ZrZ5n)kygCCD2PU5wmCcAcAsRUO<=9WL~a-nSPu=cen| zd7XRM_&iJ`i-d`ha|$NTGluO3mHu zSeN3Qwo@puwL9H!7a^~WZ``qX36f@2_hQOc^uQY-URFUfSFO&qjrhlU9W~x9*97P8 zoCAVO+^kb2nq^oxqy z=sBmH3Jyi`+kzA$yawMk?ECGLn9)`_Kur!HRM;&6u`&=$`e$&Iw%B=gxd=M>gXYLzThB96v;pIIw4hWme3sy{DuJ=*-IsfAv=l4y zWW?b;zVIFArC&(vC`hY<5bgLT>A|^T&wqYWK;5r<75eTm^>2QZ6x z@LLU^D9v%qlqy^pS(JG0p05waJ%-Hse|SwkJwHF*a+_ZOQiCNcE(r-%^QJLYN2#mT zkovj#94q!dHszEL=6Oy#wScs6mR)yqeFjI1byuk;L^$~h+wA4SX~RlX_z7(|{JKP@ zum;I@(PkpQPCS@dg27N&FyAhJX!)bLvOxm$sj2)1sn74lG#ZeoA}11I%Tk~grA_w& z5~Wsohqr-t+BwwWE}p2#ZTK~8S18JRI1gVKT)||3i`zbjrB+3#PRXx8wAabP^s4!k&>E?B-0t7 z$RJum-WLCXNB=4c)fH>={M77tgkY%`YV!PW9Z#dpeZwDugUydPMTzxUA^#lB)F(*R z0Zm%(%_oh{NFr(E{o>L3AK#$<1$)wRYBo~pRhuqOzS`z1TD zli)i=*$=3k1O)#4seMxvF-7*+T@ifO00er=f0 zG7?S}Cv5hdvOFLOcF0b=oh<#G4-JKJvhz3g7n71MSmktwK-irjM-2?wgViVQLLxj&k@`m@RXT$^P+F&WAFl@=4z=mEVAF{iyj48>iRH`M_E2OrzM<^m7a1sHirU zvaSX#(?B&2=gFZufyBnR+e3nMEwR=N3H}m?X>pxaQnkm4m%Ms`7sbNQ^N+SY`-Rgv zY^Wz-P-;A~iLBqum?nI)n%$Iy0X$&?zLI(#8(_pIp4 zTSQbn9!KwAtDH&yC`mqp2E5%K(gNwPFu&6cO5_m<1fj?VaHbT-7bz6bBa;vf;bzhY z${3)F(FciqAQAZR?bpXsZ*S!}E1*%a!+28<+pX8!k>lB-@mXEr?UFI_(bJe(7u(t1 z1R1+@?QEaRu#TCci90SK^%KSDzAbp(1=<$H%60Eo8wZg#?(UrS?6ig)A_s3T zQMfutTKWSy&=7iWMW}2_`hs29e|Xx@x7GER;K*fM#&6!j6ra+?v&=fmPusOQ^{F3B zRMY3Xlq?osC=Z~sLu)$uAGCi?-5l^aeRTj8eauQcPS5t(kwtQ=pYlvoJDS;Z2gugn z#=9op zh5Fk3&+5#9ffaZ2g>aGYnl<1^oGa8#dM>QR6l(ilhmE<`_jFE7+Nm6r98=6dLtC6E z)}b=Pqog}>A~9z*-pwae{p>~6D~0>2b>3M!WnV?8X22uVIuxWSM%7P0WW+nM&bu|Z zh`SVKPR`H3xiS_T_T)t`kmBZ}3(Zy+$+ho2cpNq4&JXPG5xw9h{@e?`t8p@{n@BNt zRh(hs@Orx8I1`gU(m!_??5sHnwY?3_%knlfT1bu6RUU&2r$m7ENQmHk3bOCia`Ny)|3?Rrj!W z^l{cb%5741s>#Y_VklqwJ~Qd!IbAS%#~=Ab&+SV{LE~Phcsa|gqJfyAqow%#gSLnE zkex*@56-09&!Rv#0oe*NZo_5%!izn*0d@Sn*9(^$@oU#PuboQ|yX&22%VU3Mb2{q$ zpY{vJ(UunH$l)597V7&E-k`*v`8(c98GlfD@MqEj-ReTVWS}`%{UL9D(l|1$EwxaK z`+8>Vb5W`+af@}W^rGl0ji5%L>{&d8?|up}?Zf()?^@kP^G|z5lY~kNhmsCiD-Ms8 z%5PPd3i%~!Csaf7<<6G{d5w|!57pcsPa2%NzOQ@UYTgCrG>a%>tim12R~Dq^DmkwM zpkw$Ey@qd!7!aW$w2Nx6z{K1q;V8xAOpWur9>0g3)x1+R&M<_-Rm9KwI8j6(w-XNS z_uwP7!*$xYCBc_mQd%9B#pJO{yN~3t*6K=KB&!)i2}z~46v?u-@5lN{1FLodYj@tK z8DH7wPym_BAcNgeEP1ZZTp5SUtrpK|LHFiQ&v4qs4OqqyZmo@}^NMXS`LC%$ShO#V zhUBdBtK-h6t*v%ECgd~15tti(Uq5MJXGnK__iFi+d=Ol>l1(CaG+UCyFn=+7(j(7ilS3PP9qIX559Zb0V0feKemIl~RfceGMPB3D5=uy`OdN&m`*OSni<#bj&c?4Q zobx_XrsFAG!{tqSK5f^#@jt+%hH4Zm%Re;m;3^I6sBgp^xy`m!oqZP?{`IAe&eN;k zViIoMC27rT_YNcX{CA{;FNGJ|pw`wW`AO>1xSiQqj4U&ZEfunpWiW;igR#V5FqYpr z*L6S7_rCAr``kar@%!s{9M3;pEKM?Nrg>T=cWZove3(`2!wUSMEwzlX!V4$ zS$5^FpZTuy$2JMZFomsUD-6usYLK{`8Eo-}pbp`6PB7kVS+pk#*S>m$UtUC5p&knH z)4w~Xkr9D4^8qVg>ACxtwph+5Exi!hH_f69IrYo(FwxpOhODuHGdajHp0PKj3!X-> zG9gARa%-eD?o&pPdylLI@%k>VXDp0|9_^x_v)Z7Q?sggLas?p}V_{?2L>go~B8Y_oWpcdHK=GSPH?q==7pkosmuYeZSyw^Q7`gGR52mC4Zn_@GY)g ze0x?PMPtBIY6ZF2G4TKlh<%a0ta~?z5Yj%iauK~z#uVPv=>0wo*rt@IDaWn$S~1(& zui3wZ$Zf96gfiuRN~VP)7V#kk!Wc!z=YI zBFd7zMZv3)LirBW&wd4Lx6uU$7R;H_oW*WQZKR6Dz#~1Q%LQZ7m_K*PuyMJ)-YAm zT~>TGXs!JFbYRdB@_pcPg7WE82e0#2eV0#{MPVu~A1HN?nTXbF9=A%+Q;S?xN(yOz ziQ4}?+xjxu=?XLpR5es@Ww)TTzTUSXbh*5n7-onLy5tugYddk60;Ruav$x9&%8jC} zfr-|XCqeD{gHoAR?dXhX0p(OiiYKgR(8NWD5*g* z5}(EO=zfI4PpkMA@b@W}l@5He(;;$ZLO(4}&*WoqAn;WAxfz6ZD&nQLuIvO1`%?zu z%&kxDkK9;PPcPAWydP8l-TCOpjtt@>&1@E7p3a%V@T$D^g!Cp6Y!682+#)nvV5~iDrRkNCs|9SDih|E1WJXWh^_K%{kRGEJXJA zfVA-Gx*)X`I&`~2ii22`$zQ^PxoQ$TAm?k3vZ_}*EY#2fa&>>5i&C!JSgjp$h&Io% zQP{MGlO5Nww784g6E1mXE6v5jB?KWmh&8g#?OH}5{!mT%Y3j4?Er{p6EFXjDoqlnx ziHaXH`NU7WqQNFE@sBd+SHAAR1J+h9LegJ$pl1-#@s>{{Gj9krLnfl5qRk$O!rzNp zKa9y^>jbSry33X~d^;06*cYZ1-<{Yd7*e~VPc*2l6W{~wSPjU%=cpCRN=WHX z83d_HcZS219Q1Oreyo6goRaQafZZmqyZgS4Np?-OkV!L znQ#HOHp^LCYT?d;@PzOCP3ujH z*{l@o)2Aam(pFW{?K)pB*7V(rZG(jn#3FiGatwQc_(>a=wyyZVDQs#o<2?l_)@%Sm zpMh|sY3r1pl@fe6hK|j9+P;JQ9VOs*J20&cQ|@TrdGm_G;5e(jwJ< zyqIIkBx2v7(+<@I7Hp_CK4c%k)!2I&wI`>~DsD{ccy3sFbD~0;ogTH>CuMU%?VMYG z8LxQ0UdCgg!YOuW6EQWbz9e|szKjf+!|2Rm$&t^wK^-gW zeIA*Bab?Y@j)%Sq-6p|GS$;~EF<^D{gd8ppZEgcB59N$Pc`j%@p24fP-O zODQkhMr&&vRL@?h$E;XKmQTmC7g$7)B{#0oI6A7_L=n`Z`$e|sp-%cM+v*d6*3I-` z`R-4r>8*0IRV(KSD{b^w<1NNmmlviKXj<`KiUY6O zzO$~*cwhrTrpieM?AY{$w5xdVJDz(cy%YMypZBm-uWsWA>%X~H$G(Qbtq zRqb(5GmDuAZ#8PjHI!@mwA>GAdzW(mGWto_z~%Yu)6;y@U5YC>MVIAR+`wdHQ2Y~O z(2RO%y6f#Y>E4IdH;IMCL%i@b&dbOCGWt14+{xc=DIGW+IQxmP5yvWN`OKT098&pE zOB_8~PV%TFN2*M`g?xFabu^P-!MQWtGkJfQnOJO8v?C{Bub+RI^iRF8c#!D|atUhq zM>6%$o>s-7!jHNpxS)6mB}%gQkmu1>3mL!pA^QPxxg>t*#{?HaM4E#TWtbqXd}eB6 zsO`9qzK}r5rPHN8GfS*w#dy}x436#})f~`G9~xU|p)D>w$yY(@K(Yh}bn9TF6W`kJ zuSdv1TIN)dI(?@fvk|<~zWye|TGTw-)N}`91#5?6K9V+n_|yp+*zF0mVpZRAwSKY9 zDJPlY4}Gz%8!t76J$>jzkX(j6(ar4ePHKv$-xQ;Biu!d?y<@(zPuybZE3a)TWV^)a z9VJ=zFh^s4a>EcpUs0bHe3_B*WIDHbDdmA7dKT9W9j$^L@!)HxH`9(h8!u};gQg$I ze&8RxvxsckuJm~Gn$o!N7=HVN<8)vC%A}H%UKh<;XA5#0jAZxj z=jblA63Fga?@(U(Z0ui?OmlyMBT>4Qx8$pLR%xS;^wWM%xs6^)YwXA-?hN~z=1zCn z-I@4B>4uXWsZU#?F+|E8rG?)6TbH7nr}1eNQHigVUh3G>w5R@MY6^$u%*7U(8gYkc zr%UORnOROUy#YUvn2g4+!-d;0m%yD3q;1oChMR!e*zO38-mU9@){yurxn1jZke{=aH|)~H;1zFobx{O)(j z`;HfBCtxESI(Uvo#`L-H6m-$-l#)Y_B>Mbq#zw?WT%v{x;`gxS+r)X|@!-gIbn99l zzw`lObznC_SJHfc*ZB7Mj=rz|lG=9aDGf2(3c?Ab!cN8?NZi&&qFW`jsnSC=wn!fU zPpj^3zPbFEouSll(E<{s!t3WnTS2!BAtB_P_vCxq)P1YYCnviq+85HSOVqM5TH1XT zQ3kUk)aRZmA6gW}yz~_xrAd+za>{CCPx(enng*$AUC$8-NrK1XR>kVeZ;V?Lk?5!MjhiyX6*|BDyI~5* zRD0|+1}3eZ@(3AlfA+g4>5XK*#Q0cC&9AEQSSibiOol=5VN%94A+w#AAhj_a(Ce)u zPb#)wM03!ltGLrVJ`d=e|JCKoP#t({xOwuO0v!yBTr0IF+7^nto5p*c^cqMQU8Sz; zQj}}A0+4piYo3Hz!C>d>id#z&2D zzm=kXH)3JLD_ri2>OP?HE>(AjlAd*!CMPV^zPSWz=~V4PRH?1xUNZa_C8Z)7*ygB| zJC6__hw_kX>?w=(jJGby^T#q8LuO8l`R8wxq;_~0txgP+us8b~4IQh@T!dEEpDSNq z5XvjQ-9l6K+*q8`o%5?IXc(^m0wB%LZ&( z`%PH*qY;Dv{8O9Y`@v!jA8mDDeQ~t6-_aD)*8+ zD`R1F2h>nZ;TKh}Xbnb|Sjm0W8<4q(hQ{a-yTc?o2|JCE4vnBxqwFk-nT9?Vcs+T6 z785O$0RgyvQi6x&&&A*kFAb*#4 zQ54xiX#XeHI?B+_^eLT{huh_S@ZtsApzSHRI-+VF%!fm+cB4LSsKTND?d$YeHc-77 ztBMlKtEeMG-fm(3#erAS6gD=xKYZKxK?@Wzbs6whN1ZE(CHjfixK{%$)-|{IbsFd~ z%2z)d-F}<7+B9NqgGTTKjQte0MNF^yKA|ILWV;USYuMkIomQUTqrL&)tL*t}G^f9v zpQ|3HqzCX} z#GJc6UEdpgh=0G$>FrqGVSgtD4^>4OXa66O#9~M$XuwqR5p=kaN@F>TRNhGoX@?l9 z^+xM%%F%k{nogZ; z)%^GY$0QL6(e5PBRHL;G-@pfdTM8#iP1tlA=d|$ptP4sRJB&VlRCYuwf?s5ggqN-W zcDye4J>9G61uU#SQo*0aKk|QkIUMh^H-#`@s%^KdWqu^4%dJ@?-Fq6#r5li38r(G9 zI5)oSUNO4)#K9#X+}H9c)zrGSy~DBkR20$o;)S`d)3INs^U9yQW1pEWV%KRF3%_`U z4DQbVK7;&=%F2rXH6@-AI`*QGNTR|((W;0`RtUyf9l7^(%Jy(l$FuGZm2AB)S0wcsBPY#0v%?-{&~DUj z8hO6b*x#;bJ7T=IcB5Eac_Gk4jTd9yVh$4B31X-Zq{7i|!kob5gF*YaH_k>m%@Ta} znGV|f5=(M#zQok3?o&2h^!!$*@`Qx>Y+!To*oe*!YMUbTWW5ZwXlE3UmO zUcG3AnuB69L$he?XL}oiz_J3HC8}ZF5u3A(1<$(Kvev4)y!Ef7L%J&kx@4@v!<>1M zj0azot+`m-Hp{fJ>d*V6RY=4~Y-V{O?fm=chw(ZLb%!4r9Hfk5_3fO#QF-ls$BUJG zw^kjK6h?p})Z&xU<76>GZ3(C)^S=$+p0*rCNxxIb_>=EoZu9I^g)j-(g|lzwua&-_ zSD%m9U*RLOBexO3Z)c=8lv*4s<3s~cw|uReC;4JKC}#-U_7r@MUe)Pk2b*Pfae~IY z*LQ=_%kS;Rn;zoB8?VdL51^3Kn4}8p$`dHr{Oc61;MUY3M6|KS_pYrZ4ZkVbe1>4H z{Mjp;+A)-gN2McNUe0Jin zVl2wEi{TL+DpEtWCrH>kAG}lO5R2&u%+$8dK4qJCipsW7a2(PvhQ%*@mfg^J@uVV{OQb5rz}zlq$}f_J_sVT(IvKH4b{Ra_!7;pP`{2xgducusHIl|#RRE$jFhR6cb?v&C8iN~HLf;KZ^_}IpKgjHB)Gip_>dhs!MB)(&WFg+; zrwKFmF@rDN>ALq}jdE6SvvZ-qK%{nO6EStsa$(j6z)=znc0EGU03L3{s(x5$AQ&3o zi}w3L&7`Cqg}NjFRRSEnpj4zcK+FQS+bD$T>XKZ_6dAc5Z48`8=nZuW>Ct+;oO8#* zH3IR;Mo(}mZKdiLrR#D}0Hut4nY)nvrkT#01ptu+l5RJ84at&1+Vhk>K2}PB>j=L#=dV0;myX_ck{A&TafDOK09x=6bI3v!9Zu6vxH3O z`6Zk8BE-`e_vd13l77(Pq5>s>O;ajZDTIXocyo|QdPzZyLhrd9&cR6GlaVGj_9E~Y z41s9rp+;N@IJ)etbt#Q)Z|W-OX?0%04Gr^sNRA6$?$W_+Z%{4C1cc-PVIOjkP9-;; z{NC{0r8-G*+cPl=ATZ9ASg<{u8ocdKf@7#CL4N1tv?- z0lk}p`w?m*d8XnDFsky{^K({yt6ir`s|OoE#(EdfH=>neFU4IyhwPQo>--~+ib4`$ zeh9`NDbnQMZg{ez7ByE&@92djsr;l9tWnUTR(z8X$PyHkgpIgq)(cF!fe82_TW zGknjEl=(p1vT7N81QVeo}TC>R0nGtj3PlMAieavg}&MGiu+B z@i=++q6EZLe?6c4&=2**#Z zq=ll05|zS04TbG)L&w3(I;C7htZJKODF;D#U6%mqMN*dL*%(X}Z`O+FrGXb)RZx9u!kq-zM zyB*N&m^$>(FNxku8O`HkhlR_#RHd}7FOR2lEh~Ikgk#EZYD;U}kbw=8RC3kqppOEn zlB}gge7|C45skcO(mxkKm1n#o9B)2fUuj$bandJhcZ1F>V}z6*b;if}V$vMGAh5@~ zL#fL;X#18%Q%{^rM10^o!ulh(rHJ{GV+IHJ=Uqcn*G~s8N)bKySKiH)Lu7ThYY)!_ z|Frd;=4q+CnU~{TVutz>d>BX1uARnR+vzDQB+Mx<7ukLB4gw#s^{Q+B=NL?5+RFRO zC-$fG#g#sbj>Gew9}7+Ksci?N&}i#NVzVdAi3D~*|0ZeNZLBhJq0436-#!hg(hq3l zV%e)TIjxSn>_R{4pQno(kN;mI~Qw=BXgtW{t687sAcyR zRz|69jWPIAUJITI#KQcim*ywTj}Wl#T`ouP(KCbnHqlqQFJ{v}#Trrt+HF!9DTc(G zqx&;YKKHFiJ*%e(Z5;hZ$qrvA8EBkRQXMwMo_O0PcRsD-n$K1)fs>}fJt72?-PvYH zlY$}&9~0gv&s!B@>Vkf#HTO4KA6^J%dS|q(O817!3*s$h)Zse{q(em5jJcg9J8@8r zuHKoVH=MNnOy7UysV6l1TyzPF0y|aHapm_~+5+Mk^kWG{{>HU6@NGWDszxV4m> z7A#*l%7NrVh|l zN~k>yL*3k&SHY@0cEgX<_vkyyUrbXD3rYnpp5^5}Er-CgrADFPyOrsON6|L%iY&dE z0uO&J;@WU3gH`@E{ZB*%We{I6+*eMH5xRSv{)9A_0e}({Sq58ArqXgpeh?st3e1DN zud1a;+LMjyvc5dHrF&TgLuVxZ^~y&`$0ta~6n|9riY0N;SvmOUQFG#P0dql0X3)Hw ztU$}d4%f;|Odjn9f$?Fj=Iu&l6!#rOK1YV?Dd zHNL0kJ$4;*#s92)Ql`J+!;Eg-sPuV6*}1#Jg<18W1vGrmPQB6b(+%o+0>%FR5Y#DU z#Vx-usUO5O9wNl}%wszCtoMj#F<#}V8YpddJ_$@{(Dy9@F)8iJx3A^7)ZsO%OSz2B zt0i*!K+8`c#EC%52UZELOj-(EQ42J6_|UQfnz$1X$2$|kw+^e!{tP?p)cS6eg^sD+ z4ydGJDkYrn$k^ucT0eRZ^Br(F;nU%+MW2)sF0yNkTK#@5`p;in(6Z9>UIXwSpSl+u z$9Mc`RBSCl^LF(if(<@hTUQ~oU~h_mvQN>mb2r|xNK;x9>_84h8k;0yzs>8O4JZ93 z8}84F$PJ&QD-Yg~h#(`r!(n!yB>NCQuIf!UyN^q9mWZAf?}Y8qX^=o@%kNft=eOq? zx=GG?^ar1u%dap=o(uWu5TQ$hAPs_xpn^|-Y5=C&SsZQQlCHX^1y7K=XI6(B$Z|^c zZlLLu|u1$)qi5lUm)|06xjw%0e zNN7ETD>ZTwqBPb2YQL3pfa+aCEe@iM%J;Antr;bv2NnA5Wh>_!0`;-#4v-j=V|!CJ zjH?hO`dg0nLDi#^m;1c%YOos72C@hGpsLEWYQSgf?BM|0BA?=rcGuh8NKDz7-!O{2 zL01}JQx+w^zW0$uL#k$TKdE{S#bL3Od;JI6$Z0=MaTlQar#rM8d%Hnlz%X~gTm2so zGwxM6U-BznAFGooc^opibGodS%j-FX$g98*^vs#=U(QwjI}@UV+7)7eY~U$hS|1un zZDI2fD}v;HXm5kALXHdKBHC3Tk2x-GTzh;w^kU*=m}Yj?2#SjEB|SgG!Gq!x(g$%p z4}O0}{}XRdpMWe|hIx-*(T=p}noWblThW$pHUl-C!y z#nPm=>x0YzE76r?rQczK@(-_$$$EXc!R`Sq8*bTuq`I3ecKw0F0Q$B+E%(t1DR!nT zZ=Z5WMT0ZRdrQ^c`_Q8NqF1?Z{{{X>sE&_~Rbl+#p08{)#(K#=@JCvO?{xTWWMIlY zLbx89`%h(%E;4k){l`RvA-LyApx0*q+LZBvsekZvoPq_Z`tSug$+QpyHhCX)ANoh) z9kPyDgR8i?r)DJZtGfaY)*Vs)91u&6-Y2 z*|n=~%hj2|!s!VskK_3t2bv zs6Nvh73%D8Yh=Zv**lDcc}B*qv^sRQRKD!zQz*OUbX9I?$Zl31E1psBBi zhb0ee+xRYkw!Rcg{Bhk8!|(&2LW5=wfXsqux2w7MMW;CDXIBdzi?tw|y*pG#!-QA9 z#{1+-OuU0vTl%vaOn75D@F;Pxa91J1j+D7Zd@EEVQ7NNw50%LHSacG^oq7(|`@VXn zl3*_kQsw6Ta@7QT5bHn3rX)D|lrt!MROX)uc6FVoj?dzn>bYH^&TtvF!k$?N$#NC$ zE=h64xs;o{Co@2DW=$m8!{YI3>HO_m6CVOronI=vzBJR$KbK`|e!ZlB+)!V(_tXuD ze=>Th0^jB%(Wu6B>D0~Y{m+q+cY`7HhAiv&VVZF&^JUOK z@-3DdsL~~Y^U&eXSHHB^59ch#RBo%(MYiGRuW>asTp>TiIG6y(5vUY5Z`F5J8a;h} zMy3e|rV4bo@+=khrug^M=Sak72T%R6-&;)Bb9-}LD(4cRKNpe>ZHbqJ2~*@ru69H# z??|pJ)w$B{4+B=hInaRFu8eT9=hs6Z@WEg9aiG9LmUk%Ur@_b=j|K%u1qznqK75A6#VO5I4f zI;@a6CrV%`pOKk+@Uavbwry^M?B)K&XULc>iH4_K;p@x|=>(-)70(H zMg=%a$>6;D&ZV22Vx|_-(9#QMewV7ox5?yTfp+M{yLQi6WQ7>CsRVDMPpHPQQF7$| zfOdD60{t)z{qsjvKzZM_5V1Gh-%jXnuuS)lw-;RtGwbB; zBLV&9RKG4W+y{U+7^qWw(emfq3CcOQtFS%1IV3i!x!#AsIq!Qx-m*33^@}+w&q$By zBMCD+QD-x%eA9vw( zdiOE%?7N-h6QyRg244b7{AIU4vCsAi|7=e=a!xjfEw%gcxQ?XvOv@AJH<>lBmkTrU z>JOFq%KQw2&t@bnke==%gb(Cj)6DigPXvh;F{c4LdO2-+5a8NZLuGXdg1Ke)YzD0F zP#g=X)7gTDSUMI;E3_i)G`7q8aPFhHgA+OMaZTCbq zQ2W)Ei!#V7_4p^biw^osW-Q*48!c;+7O~1e==Xas>9wG8s`KXL(c}?(i<|2Lt zxIP#zwi4|BXUbM7xT4$zZv_*QF8m2S0=OPaecnl?=8Sqh@1$a7*v7eOYh5Q1??>S#AU z{sTNOOrba6&XtqmU}K@LdoJg|*OLcIh9-Lp@t8UOA^w$v0npzXQLChsi|LScu^B=t zRo2|1T^gkkTkTkqJjF|2JmI-1BR<27c{PJ933bz6CvxCMU}`bYKq#bAVft&3qSvQJ zo3W4`yCv*iM+q)aawqh?jU(`fz~|G}sG1h3$SuNVl|#j|U*6lj0p8W_ z8*Y8@tbnLtCjlpEc0_}MCoa;w_)Duzjp%JJi=Olqz%Tm6UPdZT97 zm^L0O!0%FU6;UpE97*e7BUyJs6HK@y0QIx z%FgiCpsu|-r8#Kk0r%%eJMTzyP3f65EG2jXDr!poK!4@mj05S#9yNi5&z(YoW_Y@h zH@pFJM@?GNV*nmBK9s>kJ<&jU(fF~ofAl;^JGuOADVBOnr`qX8U?q)Vnt)~XG0XBD zErWL;NcEXA42BLyk*^?85fwOyu53Fr~2B@$4~m?w$8sgCEF0C zH2E&Q_hYZy{7?l3?yJ#O>pT6U9?ZAeOA6lE(kE9j-ogPSUJEdfxtxr6mEEgrR7ePF_wI(=dhbn_6rB5qBRTzwxd=*1{V zhm`$3Ww;dZyN(@(|2-p^`b6{mUKV9pj?2{_SWR*l+Z1T7bzwlqyFdQfavjO>?&9=D zR`|eEEi}c2N2~6>!>tMo5qoW~or{}po&3fZy}Hne8191#q6bbxkqCrag?6sAR*Rj$ zbo_gGBC0+|3dgPb(FWU4`&?hXR_u09A&yW!Twa&eRQypOyAR6qWDN{`FPG|afX44( zRqKS4Rzi}+E_P77DeuBG_}vNGW{nnk4m=x=OqHcLpubu&B{pju>}F_L0jBl!<~D6* z8!HMvjmD}|mwSWOUlDoFjYzGXS4^F(*fSjLQU1_VdUN4PJjxqZ6E?QIzRAGWx@P=T zv{6wUmK9O+kzSjmrc3Z;sj16KX1~iqH!h;7+h#o#7NiX6>75lUbizv_b5H|;Tw5P9 zbOWU*^WGUYrP(UjOsIi>B(cob`uD_#u=+j@D6UW_IjMKa#5A*68E0aV^Z8GX3JD z{Z8mb7?K0x8s*ICW_dwr{K;q&j%pALWm^$XA~htr&OnDSuf~lF-H^wIYUPGpTM96h zai8>a`(pHzrWA>n@z%c`%%v!N0xCABV?*%iVWp-cqsDIe4b;;+2u~DI4Ih;d6w6|} z{3r-@)c@3gHJd3k7Flu^`(iC5outSPpZ~l{cQErJC!)E-jWEuiKZ1q=? z8_458_SGJm(Nq|G)a_MaL!;&&ZgeK3OQkr~ZjQ<3^Y)ygcy;_rF|KZwCOVB+Va}|l z2DeZN2_9-X+Q}Y}xI2iGHh1W_ib0bV|8vB-c8413W1(*Cz!UG*HkS(mJ(s90_`kw2 z>K!PQkQmLhBb7)3I{E#$-0k|m)?^Pk)7p>W|;W_T+do%E$2&v=c zNgYim?VJ_MmmmY#J&*7K(({}pGWA0mPv?+nB5u0NzYrM?*}Y$TJq z-1+{eQQ4Q=K3O5unl0(xV+Yu;=`4d5PEAW8CWP{lTYw>)7{2ZN3; zlkP`I4*4MRhp{#qm8*kra??Va!boX~-|&Dw19ba&tUHUa(tM7)75ch{$Ji}`#d;#+ z;{!1E!t?6}eUsLa1YPJk^d#$nfO;-`ZQo%<;R8_#PN1&SH#8oVh@0!Yb_BsdH46B> z3v)yoU&;>iohaPX13<{I+P>`L_)vj0p z=_k-J`hF$W$o(P`zgI1>C6?|`!O#Aq_19uogJLfo_c*GVevj?IltllB+|EPi(q#>; z*%-N*1|n=%#ELFk7;{DI2q8<8K4SWGUY(4Quso@_Hi5Pw^p$g$R`fyP2`sEUr*nQb zmKW6Lpv)SldN z=;E?gdh^siWu89+n2F*5Kr6fzdtPd45u6tX!Evol(h!CdzbTg(WWLIm9WnsoSZdC4 z?x9?XJp`VU0WFgFx13WZ+sq7isX3n0AT^UZxJvTyVA5IVhqhvOLpdxI((9Em-2*X1 zka8coxIqd-#6YRaYq57`TIHN4BXL(Yz<}AOq%8OGBsusb&TZ*e6Qu-D9Vp+}u;~)Uun`fHqPXh)AOPLgcU&E>WG%0YQdJZU6-@P9>qpId`q}z-< zGZ~~Yaa`y0!zVDGF6~UhX*xJ_d()#?Ea!RlY>Y>@ppY4Rnp&hPCEm;3t{nntINfE# z{u6QL`(Xl7z8O5p1Mjb~6XQ0X@>);fw7YpepE3kvpFZ+q@70BX7leglQti75&xa9q027XRhAU|@R+q(quff1M$B;^$s89slXbu$y>cX|dW)^Fcb)ne=@Xu;3`O z?5o`2Yy26bDV7-n7&*^L7Z#=76hN=M0+G*hI`exDZ^K^bKW+l!@+6cr-(h3QJ9VZ3y2`3Q>9 z*7Gt8Iz9xz2AKJ5?$V7$X=YtUQ7&erccOY>Ni9)Syt$53xPX6f^%t#U`Sm^kL+=snK7(p6Dp$$v-XK%H+P#5B}o{O?MV%(NeX>mOjam zBrrF$*Zddm=;YNsp?u=M=fbdapB~bmGDdtmw%kCBHGJU|Q?C8s*j#w*H(SS;FTIGZ zIlA0aQBar1V|KT$&%zH$Qg>EbT8nKjzG3N+HZ@uWM^#N%!%5fp>GtlB$UX}yg zDd1Jw=Ju|a{+U?*X&e8Wfd2lS(HZ8R9DvtJzYS>*lRhhdbT6yROYjW2%#Q&uWpI5KJr@Jvm@2@Cw4ly}Xm$a4V&S9Ru>ah@efR(H zzdXzncv^H~^D5x}wX^s40ll5YTpC0-aqIf-PWuNJkYU5w1Ot%ALWq}OJl(^hEeamn z#dC`P)qk9mTfo)L`?r3kO&K*qzCeb3YWiqdx4?`@pQ;vTjBk z0!*yt9!D4uZJKr6C8* zkI+rvakthPg(f8!&kdFpf)>IcBxr6~2rZLwa8d?V*F9DrucQA=h5y2!|NaLfZ|3vf z&muL!4Cf(Rl6$3F`4dpNH<+yC?YcbGCI4{jx&rF=&$_;B!?a6B_A!?&2CQjF(@d4eIolw`r7cOpknp6WL!HFTxv_kZ8RrUmf0%*Bjvv=gz5uIz1fE~b ziv9OZ{`aN-_u2HQf*ZUq&|F!RgF&LJB`ESJ{P^*k^`lWX5|}PRPDE|3m?z0NynJvf zaIVb!M_Dk~F?pu1WR6Xp1KzrAD(IXs4654&EWrhCloUVTai_LKhuHJ_#Y`6zH{i$* z2XNJ()Nt_HD0?9AM`vRV)j#o=TXo5g1bO2H_yDPB_A*(aY`frJaGL*UGUjoEVs!Q` zu<)|}Ncq9<+{yj`ndrZmojlg}QL~v@A;|{W2H?{zB4#r?#W%6cV`TXJ?RQ5f{pTwv z1)%w5AI{A(5F{Uysms&dU#IzuBHr(8Ed&Fv3U~7)R>9@+@*6#=PudYDL~fIS-{;m} zWb3;&8ZP>ZatPRY7+~kcQQHRp(<1-nlrQ}G*H%Y@6@&4_(w2x`(>YMpQuJ`V0o0J6 z9_up^+?xWhkNm=#jT!mCRaXGk#BMQ0c6=oRKs8RaJF+cNP8PwwfQN|JfUcZ{V3I6u zsac$)#V%ma3`^(o++lm6zO~$KR_W^&IGNz|CH}hiJ=+tkN53<9RdsK|?sxa>39!52 zUudCkI1^1G-ZlMDqYv4EV=Mul^bVjuMyq`Py?y9HRj~c(%$_fOD#W{Xk)A7Hwx;iR zZ(C*96=wdk=U`Tn`wVWJ85Ph~a{zZLi#ezB41N(C($35h!vW^> ztU%oZ^Kwej)&WhJ%6Tx9J0Hzoh#~jNWd8sKx^60SrLp|0J3Wb0pu=~8Ss@fNVW^R6 z4!jvFaB$+pq_W+LG-0Egz@M2k;!{uWuHDeiacFfO1fd+59~HnJ#)<^6Y2a+_K*8-{ z^eF+OJ<~wG&4elO^h|dHhti?Mv8^~>(sHnjXic@=x?&9+nM+KV>6O<#@m*6}4kwe^ zjOd}sGX~@%@XIdK#=)RDD-JY{89~?zreIVjj&igmxEUcHx3M}02YqTkf%fYC zhZKg68l)*c{D7G4??N%=6cjLkMw#657c3RB?{E<_-M+Pj>Fz{=b1)rmhwjeN0}OG2 z^)EJH6Z)uxm@$C^@m2l=ut9&~l?V5Ox7V}DfYd>kBBE!a(1qxbcF-etpfy2u>+ErB zP=GEL8>Sh4SYU?m#HQTSR&fNh^Kh&Vq~o}x%0F{|)CCwx-Z7x+T!t*fcjrU{LHJad zDPc2Ti={&%l*eDmx_*0ptS?<_AFpNw;4aaEI(8p1&n2+Lo9`w^hJ3p9eF1AhK}%e> zFHbm7rGPQK`!Fz-7P<6p=_w!#ans$|q>r~^X91BFGl@@s=C2e*`BtZK9zg3BOj_UX zgxEc;zy6EXZ-BxR02dD8`tNgD7TdpoJ*?-EzxO%hiCob71RA&4z+d@LV|y*5@KXaH zNB7F)katHJXt!92=}Ze+YVr*5XY+Z+wdwQ|0_b7YWPv4v9x|$uPiyw3m$48yH z_U!J$aP`-@JNN}C<$KJz!Ux@1K>n3_@&WyBRKZ*%MghKSqa^(`;Oy4-SD1nRn6KeS z@PGl!&7{GYc_e(O{9$<(K;|vL6gF}oqN0ZEOBw)u9vlGB{=PTgyaSA9r?6;|@E#t= z&)+^kX~}L`v91mnD6;)JRLpn9`5su-ClKdpXXdUlK>WZ8{=uc*J6yo`0I`wDyZ>KQ z7+MN86Q-!KwG2`D{du3;=Gr0$JYXg_+p2SNsKT542oXN~L7S^`IxA^5BU-)q+F_+{ z&9dnwz_xI&oRf!uhAN-Bvq2gz>6p%GTV9w?jGRl)_vlH$AbFaAs>C#%;&#sL}>tS>#c(-oO?tR$eUg1590*14*xbg2Xu7<7@bca=`vK`)-!8)hr3Rj#2HT;T z$po}6widAdi)Ha2SRynGm`NqV5l>SUt7t+Z_Nwd;Q5YAK94rS|~Sb zQs{p)ivQcP1gqs?u9j`8faze|WNw=bPs8qYs4O#faB8B}`fP~iG3Jw4pME=k_Me{r zAJ<`|#bm{!5)s-!P&JEzms`|-|2y3GAMgA7`I;+CHL~$mBrps>fKuS@7+&F|-QO+< zUOpMx$VA39{h6k1YN7V=J)tfV;N@~sR=$UJeLEADcieMd29URr z1#=hTuTZsi2Y>>p`I~8KRLR&zfS;c+mwt^amAp&X{ivoe@HAt;GGBJ#DA4m>{>QHWdh`*aU7OU_OQq?4FW#s z?^*d>-_ER?IK7|AC!tIp7iOz-{2!gwfB%CK8CD(5o+k~d5lef#OdU4M4ZL9kQs z8%iZ;aNw-qNhh?)H zlz>Vf7)OmLkV< zAwHyCx@PSQ_p5ba+@Qr?0IRSqV0p?G45pMvlx+e3mjuRAxq=$y6v?|q=_cD5QOeE0 z*oL^Mo_ooZEn^Z2IKEwd7Uwl^`IigqI2Leu(S44oD#m;z6ZH`{y$@!P;0_5Wm-al0 z1au)(0J7%gksHfTrkP0t%#MTGE7)L>R}}q+Ox{SIXfWFqb!*x(H|ONUXEWyJXdmzN z2j148z5@BJ(S3MfS-hlGd8bQnUfd=1jY%+O69@c5ZJmlyV1-+N_Oo9XWgS~DZE1Hi z9Yat$X5(Y>r3ktc1VF3f4byF*?1IjJx!@?^cFH4WdVW{$H-jNenTeKP9|C_|9&r&n z*Q?GF>eayqymXMd)DK3T=}pAE z_Nq-|Uf6%&epN)i+S$tp>PXe5K=3@Vb7ui-(yY(yX+;h+A)2I7+p6+8EVdzV6_FNw@vss@X;N2`U zX~npFILuyQ0mWy92)1#Y$?Mnq)RsI1IRSt}*kDin98%e~8Bf$2!bU;=dlYw+8NAs`4&W`4=c^U)%148iYZ$rH?3w)+ z;SRACg|5dPa5tMC2%sBsLd2F|GJqwuju^Hvz6{ajdFObg`y8SaR3xj1y9R;R#x#Q)xTGF#lITu5|MF-c$Bp=~jPXhD?lqQbkt1=72wIqT2gs(8<>|lb{hbZ5ib7^tjL^!CY>ZtP6=N zagMk`m`0P@Xr$y4dgbJ(?}D}iJYp?u>>g)7L(3NzS$b@0p|!Zy!qQt?yestj(W`Q@ z@KSBsK(={%oJg_y*4rb~4A&kdT8;1zJUKkAkoMskad8i`Bpf*_E5^3)=ZV8)$Y4qQ z!L7J-5i~c3EZ-M-@2r=>9e)ELQ;QNXs(Kv>bqqE-KnmnQ8fnuTW0hxdq%Dr$EZE9f z0AH4s+6GfEc;5l)z^01?Ye0q-`-BUiciUN%xDIMM@#*|4_V`PJnTV&d=z6OjE9SS=$nzBJRA}Jkld(q;!Y3&zG>)*ZHMG6|hx3Kwb!X zL(o3Lx+Q|+nD!H6+WvnX zmuE+6JzeP~yxcxq8zt&QgYS<3e7U&furXq%oRn~;DSZ>$-5lrr^`+c0n&*wKix_N- zg*N_<61=7!&y2MOfRz}2d{*ic<#Ab(z$2z{lD$^S28V{!6mRwX1EdmxFlV&quvN4Liee$TA4H~w zVF&~<{Jii_5Oo-wV)|ohb2mU8hmgkdM&4^0(QVXsGfrQscA5#hY=nHJSPMo z%t`W&33kv>*agnGopKC!q9f8iWhC7%I_y}SeG{$FgO4wtalm0**cfo8+8!YgMta#F zl8;{cS_J)*m%e=4DKu`@ox))oHhiRVJ+c~=Q`JeZ`wvk#jlAD+FLDRvB|Ymhk(T%Q zK$f?Z+46|#pFGcvwC?t|2T+sbKkH#|-EUUY3pVsRh*{yVCQP!Ydl>*IXbr(rnpOh1 zOtql`@G3isGTT+qkGUGdlS1XWK5qe6y&RQhJvyz<6%8#JeBZDSybC>lGskYME|ra= z-vKJs%8;{8No?t(YB&D47o3FhK^rV-im{jydiT=2L4c2=cr>7LXJgCAR zauQ2z7EwX|Cd%%BKr1x7ciTv?_HhUe39Qya2CviQA#5y*<~L(|I0HSOk3Lvq2|wWU&uU4n9d218CbzF>Rh~%B6jEcFiySGN zS1tSUY!L6VmDe54;|76L*|!(;m>2=C%|~;iwbk_CI9I^Y7CfauW%Sg{+yT>3^0Oc= zuafeBBcXfeGQfZ*GX&7H)Sa}_YWKc_r@@rWEfF@x#^M2Fe1yp&pN7lzlJF2W48M4| z|2VynfV0Lq#aZ6nx}BeY*5Y5Kq4(n-?njPRh!yL4E*=OK0&fp{;cE4-4@arexI)!( z6Z0y*`$KbhJD|?g5G8wZ%5Xt%AN;hif|MD@xjRH!mIeZlMHUpRBF9;YlrshN$mV=> zH&>q*Ho^TV(CLSsyc7*JjPD~Lw3B_qw`~fjsSA|INJ9YY7WLy_p;YSf7Ur_N;-=Y0 z1nh)8apZZI=Fo-SA!NP&Cmr4c&Wnz@&a zyb{&YmEfj|6YPO`(8}CmC$h(z0Kf3&vVk3&Qk*#wCrN=q=`_k9l(YpvP z;o*Ja&g7FBsz~M=kr0XGC#?tk&nK?@vwX{S>&_m(fX$$Q)nJK5=F$=++#gi}CCO}o z5@=nEAEnzg)_BPLST^2ZYY=kk4 z^ZfanaxBcOUL-1%p{i2vlCIy7yCqk3K;`6FRBHA0s%mmAb)jkPY4MM0fOR{2^Vy=}$$+=35B zaz6xrNh(I;rae2aA4(Np?`Ls|MRGIV+^X5EnE<{zbCkq;GOCEw?<~wZHVX$(5J9dx zfzM6THmtJ;Uc5t9ohOKOTn}zCSg`8`CR$hWcLUSzEVwzg5oKl#QO^LQTieXo<) z=q(u+taGo0vshMUydzFzZCspo+L}uW_4#6W#J-t+;}C=TG)7V~@{`O`kN1)MzyA-q zmy{HntH^L(>hZhs3!P_3u_VPks`9D8L+3_*xp9;S5}ci}sFU}(8w_nA!MncQYP1`6 zp@J6OiP0mw3Z2mgw!c9SlR}MOg_ePjzq<_CL|tH}Z7q>*?1Vj2q0wJ7I~FNr7B~Q3 z(P|{t%HJUte&HG2#>mxobl$E5CQ(k1l{edZTk&<$GNysoJVkfB{xEx7fjTbm-6ZH$ zRG5qwZfOf}x>B4It3XBkgjAFIeLE&nEX85!GkZc@FVOka3*NjY%<>U@hs)SE%=X?umJq+i57t`)9KcRdBMtyj7ckRZg zUhSIPe_ZW<7{V_}60{N%V3Opkr_gn$rjO+X@K#;2DR_U-hSzaa2dAATj^Ven;`r%z z&f^kK(WeVDkS5Olastj-Df2Du`EHD!*?ugLfXZ;Uk6iWjPnaniJNNZ6Qmo47707XU z>vaunnhOHAj{{lAPNdXZ%*EO(Bl4K9S#)%f2703{0p0yGbY{ z>T!FO=8eX&QP};}Zb?X;NzgddbHv8Is!6>$I%!qeu}-RkaHTAwk{DsFxYBf%B^Pum zsa+3Sk3Qwy6k*+hBRAW2(Q0#Wb|JBGT{}}`clgqML!K;{E2Q_v$)p}qL(S3 z%QVy5)i{AWOas6qr|MR>l_wg9WNnD%g;6t2ADZNK9XO+ZH!D^MTk%a%{nQAkkh-rl zGjwO}vm`SGI(_k~mT{1vW<&I@T{(QEebb|1$Pb6G!f2eP+SmWIC;z!!6UoV)wt=UR zN{k|3EtN7WxXs#xL%JSTl)Qm7pc!r>t;06efb7(gEEw8XvALs1f{wx z3$Rlx8jcHdx8{aeCpvZ}UY`MZ30G^F5ft0Z09cVXHV(CP-GG9`uLGP|GMyaI8&W=O z!Pn^ydoqf3_JsIqr&9|@dW6ZB>_W<-IFLPb(^=)bh5$LCM{~Mpc4(7MzDv4b1@I~v z#5owN4ImtTYi(2Mc-`QT2da~{&wVB}N|nqZg>()ggs@R?1E(Z{_WhLO%8mHYcZUdb z?c`?e9GL&c2-8w0h^{+3ol}r(`2(EG8zlT&1;>f$L%Qy^!|7&$(J|%lrF>`2<)ni( zzLif&?)Brfbc^bExWZLg5hF5g7UurQ1^8kmKyeJS&#NTylVb6w?=Kgx1;2nN~gS(=5`8^ryFkPgiv}u6j^A2dl6lw}CSO6-HQ-N&{ zY~%2BvQ`%-K+E8+XH-gWniw40&WV?YQ~t#R!)I*=JeD%^jh5}W{#YvE%ycUnSNCLW zK+4QDA)OzM`x!rU?f>n-|7k3b_n~)rV4muy`noBZJN?MWP|}2lhn<2wjJ5tg0P>U5 z@i2sq;lK-0kEKG6k~^(mv&g18;#79Qo`@AfEEFCId-aGOPMnj|3~LFnIaTcDkNo`r zA|V~2IypTbAFBd?J8cioonyCgz5$!$BE{eRGvdPF5yPvLwohS8kz!MJ`5%FVA{}Z8 z%kj@4fG!dkbsH~5jpFwYSr;pMfa%7*ApBsLltpBa-B*b5G-Tu@)F-E{IlhY{Cddl! zvpYO$Ld59-qa#H|clod_&_|@_nLB43|MPMD&(*y5^$58W#c<`u5BQ0z$WI8Jw*@NY z?`H7M9EQpe)X#exEQ0bdxl^!=G(8c|{om%Z)A_Ix%AAPs#Nx;XZAes-hFAWCfxBqo zh%s0aQg0)v#Nx${BzEv|35W%Szgj&@%p1w7U@ixa3*3a!UFJk={dtz-DWdG09*o4> zIDVKF4tFUy-1jLINna#pQ96TRhlpOLpkkJ~=L9<>*w(&}g{TKTVSt_;`V~~9WCtrA zOHJ+D+vny*#LS{eU`LB2rjIpHF?YryKhkYoafXNoNk~();L}z;s_9_q2Wh}~qwee{ z$_jk=U}6{3`}dz>?$m-;?zAXWDiifeapcLBG@J}rfh`!GOF%m_Q4bPsfE5@ir1*gq zNRqFvOPM+Q_G%V<-nUO`pX{yc>V)@${6u(y?I-VY_>a#VEuT5(DFeUg$BcaeJBEep z?g2K>xfAxzzAQU&O|W`@b!bjXiRF_rDAx@SXAStF><8P(no}QEN6SinOd;>LAa3hF zK=!Seh;7h5G@2C_vS4zkn*$rFspMPUhd6R0l<=GM3~hwIM)|@@YWk7IaJotx4%s&69O;n z1kSf_Y$F{Tu7u)%qf^HM1kOsnfb@y3nN!+&?`};Y6lA#2h*P&x5G@va;bSH6Ba!l; z+QwQeHJ)L@M!DuHfunFCl_hQ;5Y%A-k5cUbDwz&t%5_IscJt=|u8c!cTHcU3#r?dM zKf+3&GCU2`h+K%A-y*lPR}LhmvfWCeHg;9*=c=P1%wXpMIip43l_nX!nqN2kR(9c- zPph1a$=2V4XSl9+o~w>Nhx!7{X?U-`W4i!eT`d)af)|g|31s-;<^{yT0tVE=a5w*I zeMrE!i0q&HxH_Qjs3VW-*+v=pxT7GI@8T|Q3&UL-55%-v0PDC=UXh(Ay*R4>+9fHd6V6)WbFd{;=pN_qb#gp5(l zQ*Vrew|GXM%a^mmAmanaiE_c)_23Urv@HP^5(AxRv;PD_eoQ_Uhj9HnN`;N5_1=PP zv-a6(V;=uR{IK$YR%p0Pe8l2U9Q0v||VWzsW$m1pPtK+TH2VphvqLAVUqM ze);G*8!dUMaXcxnCz7zO?3ht*Py}7?P>h}~uP^}*W zCMO@+0r`diG{eoEfq9XGnAG7geNzQYj_B>R#@lBM1Qby-ZxN-l91u+2{;BWEfw&fc zJCTI25Es?ven)I|L&w7>38;javFy>$sXa zXq;iuL~EvCuMA=u}e)bI%%sxyZA8#-)O}%TZwG;S^fqFd#8(!Z_1#0wM*Vg zBv6aV6^bSLcKAwrR3|n;B!0J5gVoA7@XDQ9Be+6mrxp~*rGmZMDVeoZAq@UG6Z_0+ z?dE?-84|=a>SqP{8b*6Iz<4qyzCMg42>0K6Ita!w)FV0iBh-9`X&gLe^k7N1k{(k+ zL)_YK5QWIRPVBuWhi3`jeHwCAAq+PRtZi;VG*w0ljXm50*POJ5Nho6qj=t` z>13hi)v2d@-ajLCe-9Al+fSZ#Bjt3OBpd!@i_Pq$)i~<=>nYP)kPL`6E)PTE=tC#w z_DH8?C#M)E2hgc==394A0tk%Y04R$@(74rcroC$u1*Vx-X(I*LAtj7>8f}3{qzU8N z>OY6gQ-Zp{rE76&@`6|8@LN))FvPS3!My1B8>^u0KZTx8{a~hkFL2_cV}IeW9)(02 zKoJ>+R|GI8eIdH>(k&#Y1USN~`tpjbp15WoAG+_ZSElsy=MPR+PP$`cE-a;P>DwSmo) z+GVaT3Z0+U+THRpCf(uLh&e6qD$yxybZf?U+Fg}G!O4qRrA=lR;)M^LS8H1XC!Fvh zcQAR-((9mOV)3w@vzQ_HtKky39wxHmKKB)-6*?sqZ-GfZiG(HE-+lGF_-ou6D`!@& z0B0I;vvQ)CF(LoW4j^m%jl3_nmp~7U_PzhQSr(;pih+5p(UVlX>N%9;FN)tg2qs zh&l6QF;7n5tVDkG_h@RQwK-}d9EGL3&O+MytfB_~$~Iww&o`4oxE8KQ*qS)EygX1^ z^UPgMFRnZ*!VTC3;nK!fhIKCE6jftAJ&K*k^_pQ<9zV_4svoT5R*;@6Ta1B2iXF^4 z5@J8*KCrB7NLrU!>(M>^2mn_Nzg8=XM2usz$oEBX2%gmoA{G5Ty2_H)k=5KsVTsq^;++@cg5e#R_wEitIv>#jdHfLte?Q>&EoIrY06;1HMELA zfbb#h$`aclSNWl;xxAsQTuG+8NyU;Kd1gfA3zr|DGyKizWzoT;SW2?MUj}(@{hagK z1|C2m@Ok@ecPD82wOG+SY|~)2s+@hGrZ*nTN%n?IP3WBMV21{${F@S!Uj?(&_vTtpqnx4Tz+t{ z)nc-53&C3G=N83D8V(I+rH&&dQe`pHZq`t_#yy4Himki0v(@2iIOqe>n{a7RTb!#Y zuVZSv!w9r|E1Ido$HI22KkZxj#N0Wf*AQNx5mNc;v5D86!9jReNS7H@hFMwK#?|Y; zFU`#LC?0lbjVvsz@hELH6Un3Xtvq7xT(L`+)K#%Z9!v37G0~B^z08c2n7H5{aM71s zSH=UVm98$Pag%8UD0O$T9DL~6xO{%k(kY!s7cRq(&28a&?!;~lq``8hE?+n-<$(Ul&0Ar zcw@CZr8lNA7HI--hhv##$o|Sx_gf-)yUC~&LYJ?Otw|tdl_)5o=mrom)bcQ@@%hvlXPCY8pG*6-GvNAJwsU2eWgymBc2$`W+nQUTFH5p^o z)tPj&8{+FoD1=!;CX7);y-7qsJ16$wlrSiqZdTe-IHfgEh~}8AkdHO*-9ljaRcNG> zjxaHejvqlA7nKT!Kg-0#j{uW#*{q!z9AdjGU8@}6jBA=O`wK0e(`d@Lf8L3B+F$`p zlWh&Qh$$ieZ1~emle}yS0RA5Ncid`Qgo;63Mq7_|4V7-U@t`P&iMEKS3T4pX`C8Y3Xlcuw1O#JP0~LAAHPWqmNFaOw>yE$x1NQzNO^gyz$%K0a)H1R{m0Pv|a( zMJTCqc5cyCKYF|Yp@4jH1~U~N&~67$iVo6G!9Jkv`+R*^SG(!zDqg>74s2QnDOBiPG95SQU4HCIc`SMS@;kX4Y#6D@xbWaBW6!nzxK8bZtdG>IEE$S5vrhyPIF( z+P7zLN6bL_X^p#wy3%e;NyXT75W|8b{8?}p(KHoHK zu!qU+j0H2?aZX$TT8eu^0-EmQq26<45aM(7fX@45LPlOojkET%`7HcMEU^82w;YbO zjvghb=tTCTCgyg?mNsPVv6u&Te4UV(%45t#mp)SI#h2|$e0XP%+YFfK%g*Ir5l#k> zBwnAS#07R&uLJAQ;FF`g+Vz@wIl9iYC-X_M`ya%JLmBVi6FIaHl5stp8GH|?jl1mn zsk;GE##-gUPXh5gx5{rF4 z>@BFH`wz3dNj!bO16_33i6SC;J?`({3iF|RG?3EI;TPfsMQWn{N7{;yjt4XP89`~np|zpF9{1=5!L1dW8f91&C(2hD zFEnVLf@z-^1eV6fyrdqptnw<;R!=0<{C3H< z$D@N8;8w$_h-}fcnjaqSxlJ1Rm0iXtIAGN%&iwI$sNvMUS=wcXNe(R`MIdW+kit<_ zis~{{$EP-TY1oR0g|-Sps!I?6ODnJPp;$~qbP#REZD!UG@_TO0Pq6lO19_>>6yA_& z5w0l2;kb-=)S42H+T6ic9qRf>^`k6;^Eh8~Hr<88sT?77(;3bxHZwRX(C(~uD@S#B z<~hWCD4sx0|5P|`geNA(k%08g_hQkLWoGfdrDBtS-_eqX%+V5subnifHpebGz0D?N z)R+!jnMk~!`RE#8{CJq>x-|J)YYo~5#XIB|Ua|z6Th3)%HNjW%YcOV~=J;+lFkx65 zvI}AF80Kbmo!toC|5!tf;Czb)mC}u*Wj}o(11Z(BtxT2Rb=lqBsPAKoF;DLDfec@` zbS?D=7IIxB8z7r=gWxDBWe~`jxN8}1-2HSycm%r=Jh=?Zo2du{bfY7HNtRjnXl+E? z^aj66zz!m8+mu3N*~AUtj)?-rTCYQYu>@O|@#JM2ohI@4E#UpL${Ur;Ci8QTVDYEc zm)u+LcceKsg{{|bHuAL)K6)R2tN0v;78r_;BqC;iELHsY2sUV@*Y>BYdJ?}9@UV+% zNLBO*#L^sx7P=6MA5OBWhz9Ho=sUT!3;`TeqmWEvpvxJPm5$`d4rbJF4)jq`ae%~0 zVT@y(b_8*D3Sug|1HP?;}A-&ph zG`cddLsq>kuqDf#V~5&!dHKf-a9pRobyut=z>5NRP=b zz>(sRlTp=OAgi}&PxD|4a-u|AbjT7FV;x6NdZoLLP);j6$6Z@QlEWe3qb=P(J} zR+e^ezh9=BdYMmWbaq)>2Uf!elEWTT$a}Zf9LWnXQ8M{Rm3Aq^CU-N0oD-TGU*JGL z8yXdnkC3^gw5D&8e0CXra`%bOybagI@^~T1=y>hYZ9R7l| z=?*{#I=+YkC9grv*$gL|)v05!3MYQ<#9dp0PgaK-g=_DN6HJEA+4Yd?6wjWdkui>6 z37cDU4CcpOOZ70LnAIGKF%8yuRiBh1JQ+#UOUSx1r0g%#%1Y&7c$Davv zI#E2+Sq~)24G*4%geWL-*wwy-` zt6-NA#7sm?H_LbZ9mmdZjyw1`(jhMU80&^5S{o983wqrR7m)u>Ns{;kA~x$iWfMX?a|VBG~+OD)qDZ=kgnVS085)SgmA zype=-0SL`9`4oh|{dZFBuQ(cd^dh`6*0iA(D9S{5<)PJ8Pd6f7i6%iz=AGoea|!#< zqb%?vo|7N2L=a$LrXz@%>J6{K=>Cna{JR~T-3JfuzZWKc0Z7@KK$+OJg;x{BivBzM znuu_#BU1d&h_V7nO0WWUs+lWb1v~Jdw=ab_2~msrZyfV#0YXANMIqvlzb}advLt?N zt+`+Y^@tU0{PsW*@gT5>r(k=%4i<&;K#Y4! zfeD;Y2-73Z1pI*~mZr=>$j!uT_!R@1ZeqOMW2rsF1SB12WWfZ+5fktt9g!evC0`>d zlfz;+k*^GgC&e>o^od%JZDdZyV)$I;A4^G|hSxWT&wcr;WOrTz^?d1xvo11I|37Q~ch@s5 z3Cl+?;}t&)cBc<)_fYIRgvkTq^wM$Kt3QUS4{Nazf%~29gx}fku`Ldb!fIua--!+a zEb{6C;BppFqNV^EE_+>2m)@6`` z2XJ(Qs@&I%W2pf%3V;6&=F2z0C@7cBVb8pqrkdtL78?P9(!?^v-4;k1I9FZ-+*LXNC#5w=evC9ZR<)a(#UbF)PiTa*T>!X}q#}R2 zz}m*hfDQ=wx}og1wG$C;0#)f@fNK8~yx7&~MATFz!CH~Kqx!V7@rWul4#}_u;EH=! z+s^WyIY?e)5wOn#5IQw=(^!WVj`~zld+5-hdt^0IY6_r+H|IR2lQ89DlRImDMv?{) z-`kX}VV)w{-gdj4k6K*=A401GsDZc3O((@7nbu)DA0YVG9QS6FeL4GbnWmd?pAKG? zcJUIn9XLsZb)sFs%?zPurXP{9bbzk(Pl^e}fZUL^o0)vNMWq-4;=kw;Pz?G33;yCb`*># z0YpWg`o}1{6@?8vpkPl;!`lYL1(%X=87~Ha67h|-DU-FY&A8Cl+pCg*FmF5s??`7F zPDpaMuI_$4Bxyb;0Dk=!5BX}N)D(dBSVUl9cin1LzX*m*`8Gs~0J>-mA3lU^S>A_~ z%f>)(Tur#lLjQ?jU}>bzem^ljNEeg{Wfx{P-|g-A?(u;z-IohL40mc4ltA*81_=P4 zHxS1&FX(M$pz_Za5yiK>O7@?E|IoiAEBa+T+ALnSxLru^Fd1Bo8f6nat&nh*KB*^z z&5}hbafAHWGpQ+10lbj_Ci@9o6+M)`DNzM-j4rtEQztkVZiq?s{{jSwO!WE7$LcCVVx-_czOJ^JS!x0n!)a7^ng5hQu}|Yek46*ilRV z6I6UGTYP(dCQo?dR^keXxOq2DMq;&eEmEob0F)4K5d=B4;~>V{B7&8FoUtIXIM^E?A{FHXuEh zPmm++4JdAAU-=0mkz1l)$1ZxMyMbSD;E*`6bmHRRAgo%@vfd7&CUI+mOogpoVrSk0 zCQM#US=?FgCIbbIsqqEjklej>xDzNhW-cGu#i*~3_jdtY zsQ)2m?M2NB5EH4+eFo*vH0VRLc8>Ct+&%n?g7)fLl)B;GYPw`<#$(34(Bz5JeWIYp z0HM!9Ptj-3zwczJd?aM}zB&x6#u`XP^YMZhHNI;Qs9U{fvJc!>5iOGi=qxPoJe)?Xn|A5}sF4?}MjY922N1b&KuGPq1qB8(B6DVqqa#V6w6V`eAeh4h0FlKwKHPnJ z@HpqqrSp=x5mZee_v(Ky> zxR!t@W2;~mTQ-cg$0= z;#EqE2LbKo=k#e39N$4bdA&q9J+`qlLZ>G-bxNLFWkiV}7>tN8I5>?o_0%T<<)Xh8 zetmKj^Y~$$Xc-2LgR}MQw7yL#UhZXCRft|r5h^vo-JrLpq6YwBR~@|v>mcK5Q-q~wi+ z`(E$_rbB*Bq!JF-ZukP7<10ik1JeXjk|Q92NC$;lroNJOu6KITSQI zm4%DGDOU-*Lg_B)&aQHP@2v32S(6E`N=|*}jGD=>cSYi(g7OK_T_QIK z%7GO7f_4a?i|7|fTWW{ypIx)j4v#Z2QKxxF(qb&L9O?k^NwwGJ(bCSI_@&9St=XYb z`$9U8ysu}Bo|K^RwZ5ZPHK2a94mk+c_HuXE%j>M7I;)vmhFrm~Pp5?R4t=jqTiW5#Lg!4R zR?ICRNSRbFWo6Sw zBYkjGS}nzfHw2e5JjrakJ?p|oIo4uCMZ)11)`dhB$-0xUTXb--H|0&X)-yCuk0+zdxdrL< z)Dv3KpL?PuOy2D^-7+cBo-Eg07Y4fgc}kJFz8OHnmpaZyq8z8Q)ZYa76xKr}F4Q@R zu6Ew+1`yV8RJyS=qX^TWYf`zTP3I1)CW{cWnH8A**v107n)e6k-vZZoSy6ngCpAWQ zSbA7bT_|Wa^&6wcs6%2V-S%1O#pe=2qP$a6{x?w5EJj_-W>+Kbn@sqqY#xkI$NPa<8$@{6 zeS|CLt}m0Q$StG5tfxUVCYgtGF zn;$b+bH0=5!1jaZxXrq=UyLZ6gcLQ5@y$prZ6?p?kJRS5sn*u?a!VuNt>+eaxKzt# zhaWL-Yi>kGov<^{j6CvQL$B38ghemO5vhFXYro$<2$f4;oJN3RDfdxUF{!i{g=lHc z=1YDq59dQA0JqnCg3hssO62uj(^7d}n#*%&ajwq@Iy4W?s&e{i)&*(s+ks?gyPx4; zt_{dIOEaDrXzW_AJlwjsduacf{T35z&+hLj$v!$?E#Pyn{XJh#EI*pj8Lh@;CkOotV+yrzjH4u#KV@Om0?U3F;2gzm$ zRB8*CPF*(5Y@ExCa&f0s9eZIoWd0`AzvT*3fm7?)+uOLU7u?5H% zl^JXYgTDg+ee%-{G=g4e<@D~p;VeNMRY;~4L(2-EQPh5(9 zD|*F4Pg!&NH$LA-L(2_|8LVejYssAtJ2EWA`xN9mfGqsT1nC)8saBP+z&5%94G@AB2m3O@C96ql+-SV z`Qoxi*hsJO@}xa84)i}>ShPDm

spI!fD+P3szz?QVnGFa7${gOM9h80yj@Prwi| z22bN}trV@m;o&XSpfp}AtT`RX3q2sRwYb__zogf^^~^Lq6Db-6Su=IBHQB)@QbswQ zv}3N|KH=xl;$HsjBq61^(e5;D`QX*l z^(o(6p~p$2Bho63LraV&$QO!u@Sv`MMxwjsYqzhS#8$|9(4eb!J9t3ek97=m9N!^V@~; zvAT9M%VWi5G}Ac;k^1P=WL@=cQ2=JT0md zTl#TGH3>))GJWqPKUs$C&)~$NJE_g&`kF%-8Bl~8V%c0c!P?jjk%)#t-pm?g_41P2 zUqV_6p?X6Unw?ptCQpOrIto$1QG*X2g6uJtbQe)KyEnmv)|WK<{@Yw4krYz>>A~8y z$)gR2v$2~u)Ec&SjX_+#EaAh4=pv&C5Onh*ihmPd2*J2$H0GWzM1Q_-^AHVm>h{?h$#pFtqI6`s5kOFbxVZf% z#0t3i>fp1|$rDS;Z>JW#VvD(STcee{SUqy^LLyaUZ&s+8=lBq6G`hglY5g3j2O3!iB9ygGgY>}dfsw*msJ9VU!GN9{Gwvv@Ra zb2I^3q_l4M>aT+DQbuAT!gi1-Wn17Q-%**cQPa~kMf%uH++9n+!{j4q2UbE!%^bjj+dK&MpYh?D?6QK z0^;IqmIih@e0SB>2}G1)cAkOlU42a+5)0|WhuUE)v5K8)eOX=#s(i&YP7@V-o)6-M z8sD1NN&P8*ih$2iQ_s?e&Vh25Gf}=|*I6>C^|(uiG+$=%dn0w!=xB1K#?u|OZC6_( z2(ywZCM$n11+g>DV3w3J{V7;!ENXT;b=ZtioDa=&VhzGiVJ}IIoLco%y!Af z{qVpbBFeDqi2P)UxHyYe;kaUu~DHs3+{)V| z5bfEZ3~N7si|sns5r6X*{@Zd)LwYKY-)$>!1#Sx<;s0~|m%?F?f{BXHpWyUaD+J9Y zlPBQJm~r>d!@7AbT9W5PD<2rxKq(vF0%SRQYO%s(+bQpS6FgH-`__85o^RaViyz;) zcgt6#b71w_lK0&;-}%Dkn8ELg6n=d}j*X3)3nGCqev%Jq>&O)x7G7TYKQ6m1K;)G- z0u#Ar4{5b-cLhU6PC27HxvEkyra`Qd%6(u5fQz)v03J^BQE0os z!TDU!78EeLI;tDcXXTRo!X1rDfPdMMYA_S`0dOyp6Tjp$^?R@Jt{Yd5ARy+%BXxp4 zlu;oxN^BKiZ|M-~H;%y(KrMf+d3l+q9Q;R~SjXFNCEXZ0E+-#Axj7CQ%d?g;kjkmF z+d^U_4}FkiTF&RFqIu%4aP}%*{d|!}c|jcQ!`i9E>9p>$sy({{@xKC?zNb!DP5GFe z*&-h&zqH1*c5tkhT=9 zZ!*;BXl|Q9UjhN>cH(?Z>CoT8cBtaFgDTSb$($dSVMx{A3?Qer&M)-Q{1g6`99oeI zhNpTG^UG%l;FFdlFb5<6>}Xw{4eB^Wg1bCu z5@pZ@`PVrE8?xY@V-dShwhaFsx-DxdNl9$ z=;!MwMP+x3<%p<*yfoq|S9Q$F$tCaXk%yL*JEtjo8hb8pB2h$E%WWDQ`6CJ_%f!zh z%^g&e;CwKYhk{QI-!Ef#?jc<_{u@0h&?7?jZv#jv&BZ~J)dgziXrwRWA2B7W0f3lz zC~*ovMD>_`R@oHL(;$=#+u;NwSO^@?E8C=2u1hWNYTBr zkFw-8(6eDk7VFeVqxBXPsN&whI9k9lpa3+4-5+xS&~~6Z%1MHhAP15JBgJ$-XjJsq z^oqF?Y0|)JKQpX@M*4gqmBkj&{{+jJ%!DR^I(3n+lBD~HS%QP0FPYjG?-io-SZWcN z^m&7oZ??odNFJyJL->-ppbL|77L5?Dj|7MkVoXoLG7!9;h@S&OTpGT5u`N=R2zU#W z5Z&;kIL|CdxlT@}!O{zVJ4OV31P`8oSY_w^MGxpMzU>DO?!A##zD~qEOC^fJD@RoL z5s_L7s74&A6Hy=_`MV*YB@jiHG+T=eXmR!sEzTZ;=Z*jMLB5^6XZ!Y%tRTGr{!a48^5;if#60*v23Yc6S6c5S7%R&>mSRFAGb~gSLd1}_05tYZY5r{<~ z{VQC10*Tu|l88k#i+LOYiva62lYDb4gqWQtl^9D(km%g{S#9JT-gFt(B2X7?*4MrL`}Xba-Kw5{`ma_H^VmagdOp%ONqYFDY#35glaSC9 z+~3i=OG#PCe5A{BkuY7mk;c5vo7`WWoc!2nrgp>S@t(U`bZEQDhD)*QFk{V%n10dc zwuj5HpB3EJM>gb_6673c(i{9bj2c~=^;k$w$>7Lh1ji-^e+!RY`sNXLNcJ(A%zybW z&ybYk(sYf7Xq4+6(u<)bhwpYqm+biE!ml&`SO3slvX7tOxMXAdE+Eg*lN>?WT&|EO zy(snH{p-61Pv$R?yc=SN4-_M%c49l{X&C)qe^?kD{7$%TNP#$vpzj#+qtSVjL1Ft2 zhyGXpq~gdfO$Sm@@*|H)eK?tz$bY}0Nb|p(9r%=B_#K7d+9sj!eTVgF$ntJqpIRDc z|IrW6(z-3V%qH_r_8#Gd?*xk=E?cYmcGid{9#y+E*1kMv=PQH$z4dl- zq+G9=%4!O91mS&#zS2f@N(;JS=WlKo#4K-h<(urGpQ@&8=c?wIe=BIY%76HyFuFlH z_>)z@=xew{NEYhIn_brmXXOK@qOHtxY%AC(^p6vQ*G#|AFMj%B+&r;m79Yl~bJYm% zeMUCnfQO%q(mQCP&TiyG!2X(!J$FDRlMpf3}Z`7V^8D?vc)y?EJ`Nn72;K z1V6zoQKh%OzvdhNsUKkPxAF>)gt*K+mhTdfR)ugxBs<-Hsn9V3uksraSBUZ=vP0Q$kScm>i zLe zN|&dn3g7uhW}AHd`g;2iH&qkG@oHADdUAT&qyO2y^i9AHYFbbcxlzc*;Mv^ zivPGh&_CqBRs0xqv=)XfRm2|3Z~(h!J9y#B)PvvsOk!TzO~DCSA#2lvhF4A6rd`h^ z$2@5CpEiE&^?pH%L-L{yX}g|t*#1K&WLF=@I}n^x!>vWBs_vi6zjm{Q?ZrOses9%I z+CYj9R%ueW-m~|H(zt(Y=tk(-4#x+%NwOA(W7T%`C6+@Ps;P3UcHD81p$1-!v%9l% ziwB-G#kNF+*VR^itg?Nu=9%;2mfKgj@XA4{_NM8lPzg;%S&Kj{n68lRFhh2bFZZ6_ z=+0LvX!c)TVl!~DcZ)$Jc~vCtWl6{I==lc*mk%?6vpDQZ5euI6KX}1VZrCZ&+*PlF zE|Q$8pgRl}k*+6s*8Tvl9V>DL^RnHLt&6W>!P#EY;*^YBa^TxLm#&cAdw=%spRar^ z^@#MP4#mPs;@u5 zHOqWH)yQhxbZoMqRNQktE@!MjMfI)BdEwE!y(pjWA7$~AxnUe?Y}YS&yoK)7pR@2l zV!m(KJ{z2_7~9Kf>;fo;q|RCg9ii}d(8TI#Ue&o?yB>xkr`z~a)ji|#LepxzJvTp5 z4iq_8&-WL~7fG9hC;J<{C*5);*YlK^uQqV)81*i)#M6m5uIKc4Y?9QAjk765rEp&S zDStd6^1}0@v$JwhoU~>MsQjbp;st|MHq|cP&s(jMo*ane(vvgOw0F22TW&qVX4PjC zapUlmJ^|5$uk&8OT4_|w2EoV%n2A(sUq_fp4 z_(-rFDZ43Y+-Ib9NA&IU3)3Hq%QOmyGlt#y%~~!^v>5P-6iLstu7VG|GWstUXlg(= zZd~sXyv%uq|5`Lw)KzKYz@TB_hoIhm;R7FLtkez;J&M;+v+bVDEmE|<=CGRaqwTeU zTqNiDt(6JE^oG$F-RwAf{{Ysem5@gt-iW&X9L(Jz?>N29nMaM|-zPi;&4e@Sc+)1U z1E08`Tj|Ri@%(|_vD|J~JL{*t-(_)-#SE|g8OxPEoYSYRejcZ>Gi}ku9=pv;4{is@C@2IPQUQ0$NyXOD zIj4~jk98_k=TQ6qSo_MLxVClMo#2q*9taTJ10=WvcXtl~(!r&14Hh7{Ly*Q@f;$8W zp2pp^vBq8BVxRk}-mCj+pL46;U%J<-V)mS$j4{43iyC+MK?Dvykxs0F9{b6=hvyzj zJ+~M)0^;9h4iWuGKWz* zuMTx3BfKpyS6`hv&R91O&l);d^z=4e?NhDoA&g%8{TZp&9J?L#K^WsMPcS#Mrgns`?h$jlk4CHBPY_U*L)T0MCdi@VRtq@D;X6)X}4! z&J|)OV}}RDQF5npJ-)xbNu{W1=ryX72>nzHO}dwG=UuKbm+nZK5l6moB=9~^>&&eq z_mlxHs4!o>+tEtc!mtfVxVhY6;`-eB#@Oq;Z24Xsai-CmSws|<>1WvCl8<-!2c5T` zOV9n>CTP4uF{w5Kuog@)uK@*E1&f<{qSr&-vV+&x!V>Sj&w2}HA{Olj+1envvysu0 z;oVw(jKHE(kTNc6@U94jz+GVxXyV9E&)!P7x7P6HH&2r?=SUMV@C8`l#n&1u6{^l{%~3W z($A?5c>&E5jo8oZJQJM&2^?r<*syKWC>}~S&sdowYy12ym~G}_rgEL1?2y9u0nVeP zg6t33QZ$YqlS|%C^ts#7Hk=Yx!j5dRP4C_4r+=ML0I@0!`;*4473%3Nrl^i3(f+Yk zIdo#b$T1IntkKkp1Y4+6bEI)Q!gcd0e|tDv$seytnhiBD%7r@{X^(FI25qha_YfCj z)K{pE402&)E!L2nnr#+OPSsW-R4$g)Yb0v@dDZ;w*~Oss?Mj~V{`xzP3|~QIu(2); zg#CWbg}!Z3z_ud4*Ack6K=Rlq;~Dh@`AmKD-Sss3^-7L%S*3tS_XqjHi^~CDvx_t& zy=@CS{4J<7g}aJK(#3km1r;xRmR=7d5~M(GWnK$DoGXerd&SE#bs7#UNdNIj8H@RT z76QYxG};yU5=fXbJ1DL*SEs4oA19D>|Ff3j;K~*6B8&6(>3seqb+({ia2HxQe(%0( zeSI@earT4Da^^3QQK27i75_AUw4NFyuq=H+$~iZya8HuGdRz(3HbCdK{OJ1BUk z5J2a_n#^mPOgI)S&~voJW83*ox7wxExa8>I)cT%&vr-SMhcWYlnRpAO!XIjX%L0h2 zf2871an>MY?;};T<^}a#S>sMcE0OD=NlYQ2M8!Y9KJ5>z6#rvkwRe91W}+5}=!A2t z_2^u!=XnSDzd59+PZ{&Ck8a6NSr+%luUeMvz^|CuT@`KDMwS}QnkTSf=3p#}m_wf{ z-DUx?G!BRTpE{B9B9B!Hp?n29?6IqA?&{Z$H-onc%-R@%qS&BXn?((b9Wi+OsGRjT zkDPeQn(w&V9e*5>9DQ%@quOf(h$U=uq+Uc@>sIS&N-=E*_Mt>3FMHkQEaZ2aVXLn_ zJQ}o#t;`@fJVy+1Q4KNtIbJMj%K9y61UN99aw_hkjb7ym=L2PUXrF{o@!@Elp$Dxf z{e+uCD3$mU){^mq8(HGg8x`%^mZAh?)i)RW`}B0R#`RL?`kMt1-|^?K8e;NfV$_Um z&sq+m>X)unj1Sg-Lom`#ESH>{H`Jh3GLOyepIJt8gjY{M(3YSow|=5I@0b34v9w|R zm8SF?Ny|Rdm?_vGOo}n(Fhm6h>KUdYL`VY)FX!sRirMv`oi77XcibGjA_liv3G&{! z+1-y-0@BWQD-P?OA(?0ocG2NFw_UDON9#u3yY-u2ir|S?KS-Oc6<~A|{}t#kQ?CsY z!I7op_-6RmRCDmKF4TZ|gm8L$&h%?0D{6#*sWx<5=-ebb1oSAk#H0R`^nPTTuNfahUYX%pvZy;3e6snNh{H_;| zoHT4qFn%)Nei2PtZLjLg??fsJ+Dv8sa%`6$PBNLyM6JsSiXAA;1(lCK^u<6OVR$XR!#6^-S&|5}WsSuTN|9w#)DHUMonl!w=$Nku(NRhDz$5 zmw~|TCAx;g&2Gq)#lb+1zLKFW?Yc9Kod*31v3(2rpz&grBf~tzYgbTJzL~SrqD=WQ z%Okv_pV(BO+Va%`zwg7Q>%G@xg|>8*`gq32`3A)FWQwr@1j5e55g#BT74qyA%LB|ZE4GTVN@uO%8F z5}13xJ)fz^whrR2@FX$Tq33tm$w|Mbd??qxbl5w=-ajXQt8h7;920Qn)-iVlcNN*W zCbL3x`&1?_7e^N{QFI@oDLkX(RT>l}aufYvf*3f0U21awVAR@9rg|`;lXLXoPXX#q zcuT)x#1XZYju6@7x~OVM)J1BQ7Nywk>Fs*LIkjf#*>L)H7mUu|MPmB#uMTblw&Mp4 zcpa1FpFyTnZo8PnwnyFe;0531MZM(L+Via$mq1b;1Nkjc#SZ8p`{eW}B?8T_VNR*W zG2Ld9p4v+B?d5l0vtFp-$;jiuJPEyjxf9?XKKaf4a z3JBQB02&beK@6uM5h?v6I{mwb`dRU^&hv89q$NFk)dCk*c!Swhm&s4X;Db4m(;ygR zN=adhtj@mCf1aR|q3gb%)w)qgFGPwiAIed8;xniSUd4t?Z{_+=lmY{C#Cph%>>_i#QpMZj51c2GB;r5LQ$sSa}t zdDoA+c|_vRlok;391R*>Hs?IKjtl_~L6S_|*>#;^4eux;athxq!L>poNusKM*)#7Z zi}HLj0}Lu$3DRtdk1lk6-NaIVA+PEc`YWM+=?#YzBNcTaU!G$`MEF>ZW#mE@s-ut_=<^X z?bny*NVraGWPz=Uq&y+#f*x=y_Fx5dpp|FK)e!g`RUCI;?b8n+%|Xqf|)&; zTqMCgC=?Ca7+rAKpKAZN1J(Hvr>~kXye{s6wUaW@Y(J_8ohP zApVFi-fS+UrCzIy1wPL`ZWYQH7JcBI@QOi=g7&6dYTPt|H{BbUfEHm~YeM+QH}zP=OhJG z&jWL7&O@H7dwJnVVFLfuX#@2#cHmz~>7pw~8e`PV+b-$sHMHC5=RvFl#LtRHcK{G|_n zylpkz%gqPRL+*m-wvSqv!Kka~qa)#rrgwox42YG>*QXqMyq}0dq;^L_n;^ayjMLc5 z_CnTqfo=^hNlIn4DyY|Rf29Vh^WCLq!S}etA5aluei$}{G#S}0DTUqYz4MekD043` z=JWbWoF|zIoijmOie&J~ZdlP2j@i=jCzbTr7j_WyD z%qS3ZX_O&dJH2jJv7O6RP2?&pT8XG%st+tj9ke=>-$;26(_|I?Do@#MOV`o=Qejo+ z3z7Jb)AZ)^$@Mb#IHJuq;C6su+Gye~)L)%APX3R;g;HndaA@e(C+rV`vTwA+ceu(Mz zUxL)hyFt*6+KN`eYP!-&uo8z2zvo3M;d2v%1`h7)p(!iKOz%#D*8@jnYRz^g#39@+ z91QZ`+wJ3stHEID@s~A%Jfm(ZQiT)ljFblzLG9+N4?n`0?$$7dWy*pnjs$|S?CmA| zOY+AT)gbnFXp$o&GBs9+Qhsx54e<|OGC<*nMR8JANgz<$hjS0|M=2UYg%Og2n-%No zdDzEO51Mt1=}xSdKigi>kJm5XtGoqiYevp4@*Df0yoG<47$GsX%2L0wp8MR|j`*dy zAGSc6^^pN6Etk_p>vS$ng5<2F?4v z%*Iov7BB95{PIk$g(qY&Mq`RI1f*TA$2vKAw=`<*6Kraida-D}{D4p?RxW+>e{6S! zmKRc5V*iLO*-rw!BG>EYt05A|%v%t2LXLNpLW|=yJNS=Qtwo$;`KxB-(6ooR$9wh? z^jVUG4PBaEZhH4ZZB>K{XHi&-Zk$1T{G%!#Zlq>pAnNE-2T{_ys)h<``RJc|UD3uy z;eC?gG9I|{rW}!8me)zF28HM?D%$A=lt8;Ogq)vB$-^9qFOtN2E2+pJAJ{F`XF}8b zvr4-DLak8^$rHzFIdE1=2e$nnbbd@O;39hqZLKM^TfMV*CTWG2AWz?k)wP2Y86|VE zHzyf?lRF6c*h!JJ?-NYQV^tt=+iQkTR;LkSUq4YR?Mv{S#x4Vw+6t_1@I;L^ZMC9Ilr6k@NwpcyON`NxWM^X))ef|k8P&NK)0$6dDi!_ zAHdbGDn1N<#aVpksT;bdNo-dC&Sp!ngUb(AH!45e&#Gyw1s*pi(yiz0i2O~vJrqq9 z(8BNf-HKow1Wn2__Q?s#(=ip3-E#j{!W@`wYw^wT`re@NZVu_959WLa;0iBXz3r{) zPj!B}ldmRFlNe*`y6nvw*V!x=P1~L!+@OP^-Kfd>5DI;YD;0Y#Yw;q ztDd4pE3eAziI zpCZ#kIrz_{jDf&Ysr0jAx?F%75Y~#h?DNv2VE*ctj}J>^kS?82t5lP6zsf4zm6ts< zR+64+DJi}ZI3!aw{!TG|8876?M8f^9&QwROd39rEE4Sy!(smeV#+;hMW^diEjhUTz zK`^2%!=}q=6HBW2zC_xv){xq$x0%f@hcO>8&9$WFF&93p76&0_O*%7mJ2h6B=dLMk z=9SJh@pVb=j-*g~#t$WX%pwg>k+n9j)Yfm@V-ejpvdsl0pfW;4jEz7X_wLur%;rZU z9Q-v+jXhP%37HNPi2X@CQNPMKR5%Ylp<2x8HafkTtq2?GRaKpRPB7gYfadE@P=hfr zz>FfwBdrj>+~S-{Cg8F#ygGrpxiW(`TEs;n3ZjgOaG-a>a}wKc{{^S|H_yLl7OKj*N0 zWWwqXT+y^3K3`+`2B@JI%jDoQS88$GH))0=76u}RMee~h)>D18ESN6a3;K13Gb8}n z@WRB7>3eR4s&vCJi`cKuP@>3BGCN~=ajymp3y?}QZOa*g&SZG=BH%mf@}E$4FJfujn$_bB!ur)y!rQA_+DGT8aTDya`e=>mg(_*iow&t zA1}W^ky5As-0eDht&+MWHkDNVRj-`;A@Un9QD`Pt+mzU?S15PNS?@`^`Sy{6Nf>&B z%3C&3P{W~8O!#}SvR~aQw5zbUBon;E9JT?pvhuc@H{q}u)^uU8)LWEX`6MkuDC8iK zcFi;&l6F{NOMv2`1$ReiJwygrGjuDGB_UGoi&hGyR6)Jwuk(lf`;T{fhnyb!8#?|_ znPv7hJ^eQ%|HAx;9sV6r+5vC`B;iWYV7XV6fQU~b(aS|4j2FTDPb_WTL$NHhklH-ZGfUscr#V7d8sqSw~OAK?Uu6J z5NRPhdW!W#JlZB6v?5y)L3s$FW9AV@g&O^9qKzy@Cqa&%4H(QT*r@|Cb1M!_m zj}h2NRs$*@@C4rsec1j#BNP2eIAzeWU^I0q3UyZe|2+%-%TX zDZ!;nS%8)xpCWBdz9e(->59^t^?AF&hckgN?A;VDbNq7wT-NPU`|*ge0uViOl)I6K z%N`|VQ1OI;dY!_f^v(i?=~f%ROyy?bvlGrc3~yB0wO)jh6oj7Nt-ls?ucOQ_@v0tv zHnYctowVI^6v#lbTIYMULj+tB4dE+=U0cfOV8WDmlBAe(Z0MClL4S4d6gR{ITcxL+ zaS#7OvPyUc8+qX+-S)dvQuJVfwtb>*ES#f&Kx?@^0h=)ffI^M9uc@U7%^a_JpEcE) z3w&`M=}2tn)oqjIGps7S1HpaG5sN9BmRqEo%HY-%H);Q0ylv{AF!&urLR%AOd+`IS z-6$O8A4`px?~yU1Xt&>a?*O=0dF}5dVRq9c3}bflh2&%6e?y?p01^U=0-TMRX(6b%&;v)}>1h9-Hz#O&UVx+0ENwLXq8N8pB?O6jov&I<*P@5=`(*VA?HDtNX;cZj>R{B`>tUM3{e+HA!=0F|7B*J4Q9;r)x6XI~@rZ{trTp&p0rm$t0ofrCXjXo%=M%FW#DHx-Dk zXXARWav$lY3;OY->+)l%!~zF@_bC9g)F7k@Rm`_d3v;ZWeHVFT*0Km5`!F0lFSMpZ zGyK6I`>w!F;{3R)sFR$o)ww?sUZjSTq#(x7l{4@NP=jJY2XDm7kjAQK}UGUxo4% z5!AE;G2Pdb%=p6UuF)&Qz!zsBAw%EoV^j7s5oSD?P2JJU;^KuiaMs=#T(g?M^! zD>}ci=e-R<=Pe%E#toVF?b@D~8n)BiAuY!g=h->#gtsQHBD?SXmSD`DPxe&%=BS z`t=#(y__H=MuZz8Y->C&T31ofrz)_KfQD#6HJM1)9AUA(#sQTxAp!{d3rSQ}V zp64dRv&1NXZfE5nv56~5OH!NdE#;*<0L6b_ul^F?ru1*&jFW9(f7`tj2xHp$h z0q-2pVkMRT(`*~%Y)JOjWE>tDaeF}#ooLha1vJjbMJJQUl43Y0rV>y$U2z#WQFfXP zHEp+L5E}%_-RZD7Om4eHT}(1whE@-!cmOb*haxV&7i;|B{~iyQH!XTkz!je8LhiYX zA&s@o2ylb^TGYrAQ4=OD5YPN_8jZg5q}1B+&NWa*IkmFz@t0EWmiq(glbh7T9@3m1 zq`}v_v$|JNBARY1IO}I7&6(p3GX#tVDm~%hE`;L{!T z;3wWsd8vW9x;O8j}eK_TxVp%acKumqwSnUs6 zC@F$Ab@6PPV&9}L(W)hnlZ1-U_~EWDw9}mHe=QY>GyBC=>2sF%BAvkE&`g8%bl-Tl zqng{uhWrb>BV;)EXYkJ86xd!bz^K2R!M}bjGO?J2v*~7uAzO?J*5AYmx=8j$8OLvT zG;j9BVBDB>edEjXs8#TI9LYL8fkA|Whf8(U2Y_*~$ayQ#h6CS6p%N?twlpcg^4VpZ zw?Pw_5o7fGdbVAO!Ng+D)SpgYyWnC)*I#_0DE4ZqOn^EV(=hr{gf|xOvI8bW!pj(fX?$uKMkE{0OG^HQvyuCm+iKV0OMbL zz-_!x8E9J3<~PTkJc&>z!s@PI_P!tQL1tx^#&b1{xo*cbYVf)trrZpRRy&NX60P)6 zijhck9`m1^UXS-^e4ZDMR~mbPrt~?M)jJ5cMajvJ8};V&=CDX&g0XA=TxE!uV^JM2 zyM+vIu^eu8p68pb7LW=pgECySc?R9?lGooNsv%+IC5U~;QTxd)uy^OWt~*=HETsf# zWI)2m#hFkyGFRX>Kpqc z@9M&H@_FnUel9H$XqwLJl595Q=8pL`9o=tk$@?}};`mefbHTV_>(#M(&r2itXWeoG z>(xGxe0yR_wXy234kJnS07+7CM;v)bR$hwK^L$e;x2yR6$I~zWA^*p1(QhIGz5U z&6qN<6#z@n$>`Ic>#5^M`eAFNh4ImAmMmB|GLn`bGXe;eLm+-I-s^)`<=-!yWE%DB z;4|XTG`>Ch7Rih&$8E%0knxvd$vE4r@s1qnLs5SYQ=+5nmr{Qr9KY@)Y7TYtyrjsU zx_a5i<|0ZjVTxUy{qSK;FGPllPSUc%K+sOxHiM4UW8Kgl)*9vCROJ4Ie(n#qvy4CI z2yx_)O0yWcDmob-ZZ86@<18jYPcMdJ&VYia@DRu?#UifoB|McHkNp`3@(Tl+AQ%52 z>d${?nN(nL2BJjn^GCIs%f7qF)Pj425xb-l3}C)}E;Q>UF^;xb~nEiN`KufzzX#@?7bF{lm9y3V&9b zA)7|WMuCmg8~A*n5e5($j!g;fzR*TB!5HzRW>QNp5zd>1)=%2C`T(Ri&pyll=Kfb2 z5K0u>>&uediO&)7oRD9c-lS)XW3|$~)DrpmOCW{IX0}REtHO|8b+)SLac^m!+mKJy+#k$G^MX@>-<(y?;TJ3N)tC=KrkIEGGv< zkKbmenYEZ)q5VmVe79#%`k?qDHWk2kDCgvuUi#dE*PYvH7i=0Ja^u;O`77aC{8dM1k0`|y+{ir$v!I=O(F70EyA z=PP*ZOmIY97a|H}ryVKvH6OlqA&?XMYc5k1v$3e9J<}3`&a+%F%x0*pO8d@w^iBPX z*HzMC{AB}^&;YE@3G|lI7BM@4p|_iN?vI`fdhg1d_M@e}Lp^mTujlRPYxfv;i*!cm zbKg6=99F7RzKCGn988kp%iFpfynvmkSAFcD+Jxp!G_e)QnQ#7@V<M$cm{EEFbS$)LT^JX;|@1)q0YwZ3K zq}e%q#_7}PLwj=!OXjh&v{+<{y7A|&ZRNd;L;Y8bSi^8fCFikODn{~!>+w`eSn{G! zt(@te)>1ljk37gt=)Qwya4U%dH&Q414ZIv;!~HPR-O<(4*W=4$WkQ1(OGnZ{D&ctV z;hOMC(tCAy6f@)lti4Gl$U&GwV+76QS=w88c^Ebgr2)S|cd=G^?&84Edw8cDnK-Ij zpd`;Hq8g&knuHQ9c?}Kj6hWUrg2Y$X5wEBZYE`>Hn|`-eYd@8+!D~&}UZSX@m4+DL z0c9D|@0oaSWKcVpmJLMtYivwvhl}6#L9@D~a}{rGEo}u0(sdy2H?qtVC)cMi^P8dT zlk<9!FRJW;f)-;}TTdO6vM9a5x{>9WR1|$frx;@DNo?n9f5e796Kl%Zbd6)aHpKKo z43p)0+xhbJT@UBOkB!V30EDnLWXu3y-_%vVah*Q3)M&pks;P~4e7`qWS-a7<>KXOd zAP_ne?BYXEvlYYjn=|pwJ6^ub9$}!(JXpx8HSqPeAe%z-FPS|hWO~hb#`{F8%}pC+ z=&oy_OE0X7-{_tq+kPILf{*!**o*o$hko{U-G7{ZA~?U#m7krq?_X|mdQBh-(F4eX zjHO2VWD{cu9||T3ZL;qQ?+chou1tnsg9HyT*xp;PFmUuq&rzN}r}K$9?e-zq*r{Pj zqe!j4MHkNy2{QH4U{3a5F(vvZ``CF$|JXGjz=I54b-wq}5ZkS^TpTEqNLiP{8ePY` zUoKh3)@}F6F)H}M?bA`g*PxAxz~TDDkz!Q-S=dkF_!S&z@Dx&3`(A=3QF?)mkMZY;@Q7@JtD``2wxiChjL8mKu1bKdvCx zB;e*`oBENfz-;~^ozr^5t{pg@b9<~BH&1@zuDl$qM|_b zmZ6o;k1IFy_hm%PTH6^H&Y}#&>Y3zJ6NObREBBY`qBseB`f2N9;NnNfb1tZ?jQmaUC>eW+K zr#uq+dOkM|H8_%(JvfR?bzP{{@r;$pLajixvq|wL%xlB%SB`D^OjeNtG=-9kjMpu< zRJ{`iwe&kaTkh7yrz%6Vzg9d@J7h-R1evQmzV?aCw5PC~EKemA6t&mT3Cf4YbL3D; za6p}{r^j%WS<^%on@Vwu%@B30hf-9-$^1VI2oz4TDX<}77c6PKiy>j z$6+qKvB~HyukVAuwPt5caxyV%h{bYUBVnK(QCkg{=fU&qvugHp`Vir;;#(oNtDi0h z-K}rBU6g6v`VzQ;H7EYAF(|ywidveE6b)Zf!8$5x9rwD0f@3LX0`2j##cOan4NwQU z?Pe`Q&6=HU*I_dt2hD>pydDEgxJ5aPc7uQ5M|9TAa2j76p=KuswrS4(xq1AIa1_h^ zS}G!elb9DG2YL_Eg4kd}s}bB-!)AtwBp$rjg|%2QzvHwmk*a-PEfvufI!BAKUh^eJ zEY?VfCpCeA)T`Oani?QgaZ#VxLf+^%xq?0KG9tX(C!-K18Wx(ogZ1p9c0tw!j$T0m z2}GjwbFjQ8*2q2|&h@d-#S^hhjaGiUO~2kYhma$O_5ER!A$Bo;{6?*EslyMMVUdiI zC&b(iXAS0$biz!3>|JFFV-so{>Ak;ks!g+t83izz@7r5R#=g^UoQ8z#f3cQGbnV2K z95d0{c7eZ56uX-ixnIIPM9M|_Wk*6ik2xO@&~EonYo^bsh?iBi&h2}NrW^wGT=CTH z=Ig|p&bBKSLl?>Pf?rTD`?48lrM?*Dn<6Pq$;uDZdx{%4pV|OI-^2E|(8t!6yxl)1 zch$-}`sfpf7q>5Iwk2M(oBlDX2QLF)JHI~~|2nCuTmARf{8HT33%NeqSyNo+;y==6 ztM^<35Kz2D97_y}{GGH!jD88)#a=(d6c+IHGC2usQnVHYsp$^>+5<)mwq1oxsBNmtrbyWnXV1+gaL7<%pjX#8agk>se<4(-@{*%6D)o9e4t?9GPIH1`ic6XD8^Z8PP~ z*}V0ama%skZ`}A z3co@q@q3eTAx{Vv2LGs)o)i%3;xh?_>^R$>A&d+m$u5sNe$s`9)2 z(+U2-l|jD ze{e@Fil$6!G32{=Qc(<^t3gzJ)21btKB7e`7CsJEw5uNswVgWxGELF>jZ&<&KPg~B zhSgO<*0pZ;5OllNys9lL*R4)Ic?P0kf2D<6X$VUU07}h}S^@J3qn~DzUI|qk;$>H?q3^{994*-tNQ>xE8f1 zJWh=^Odc3%u~N0p$+s~?N^iiFkm7>1yczU)ln)bgC{@XN?r8T%pcY|n+d=&eu2XiK z{Vl0^i(oZ2TiZDlg{kzaLXYN~M>O_SW8Dv)gT`B>!Ix96bXUgg-fLt9p~rWRN9*h- zTk{lOU|OgS(Ud)numgd3um>x=&$1m{G5n!0J2gShDcr{o@YLzRxhSHaBxdyuxVIm< z-=N#>{u3zh6e-gFjuhA{DzJ0=o+KReDV6dOa_jPu{FfL+t!0amU?$Ki2X#)u_T>py z-^z2;Ua63hVI~|B=pTsCEdEQ2RBWp(ZBcsC@MD3)$>~X~R_;AMbRbYpzd_n{eQGy9 z0!IPOwRCpRW&V;A3kA>V8)wg3=(5|MAzUGX^YF^&;m8EiMco+)8g#i1V?{+oVXUOX1)$m-Q{STZ#-T5K)jo;mo-pNl z>}e$h1@a=_D?{3vS%_qLwZ&e9Zs0p{dr=i=RQTwko?m_+=QJPiNhk8f9=My*XM-45 zZ-sy5zzvMSRuxkS#aAFJ;^KYy;Kl!``?Wm&juW2bML;mLgk8}a3C#SuAz#*B8wrH> zoxD>s@GZ|yNk!z~E4v#&k0`xR!i8i79yV&;SP?ZA5xO>uM`uo%tl-tT&`e|BVa?SZ z_EM7ws+4v_=l66PE(kPh1M~XcT_Np^ITvWw*`x|Sr&rF;m0Ym|pix52keG{-kqr3txJybugeaGO}2PLG$N`u;moV@JFT}DRw&|l4}vNr1(|~z0Y}H% zm8NqX>?7~f{mH3I1ziu)9{fdoA6hEAlk8f61($BxWMOBPeuYd+CQLc*Z{m2 zhv{X1le2IzRM1^*u=VnDf*b+YRVdG5Ir;ZY@KLl7lT-7d{8S>VM&AW`We{(eh!7ox z*9uswQXpXtDIMrIqepYlckTD`Svfc!W%sz}&!y8Scv@kG@&c(#_(C5Edyaqym z8Y1~zK`p^8W=_56F8$g4ppndEYGv?sQReBg?=X62`K#3&3&d{kyun=cHE8&NAy=!T zOCw97LF(-k7{~5d}?^7MX2?_}?^K z2VB%yZ{j)SD?`+JqL|H;boEh%sqQ3Bn6`m5XnJzcEZkwiND$eg-rF+3(cKidjM<&A zJPVEcz{<`9V_Oyp;aB{wEDFNQJE;FO&RpC9gTJ|xGP2zt8>)%f|5)MDygy>appASFcQ!W7NJ;lzBUr&0xKC#zaC zScmvR`vODTMz*g{@?xIdpYEy4ijFjToRg&RT0lPg+n=_2ZmLs#GF?U>ZP98>gC;xt zLNBpB7`Dc-nf)08APaN6KK@b0Yy`XB_DHbU0YWh`tqxd-f~D_}I<*l35i(s2VBYPy*F&6X1#J|!`bdi4O=uY~2lvnX&eNxU zDo>O+I<5X|-q)Si*l1K;!7tdb-wj>o{{d+h+8fUtF32^w9=7T_={9Fpt7O%T6}Sp} zFFe4=H{V`2I{uI-*5wMD@SPJfyXuc4a=to`7^nqL7IRg(R=@X7C;9x@&m|oSddaYxu9S0u>%HtUFg5{27xzX7wj#avIp^;4bzn}nzSn!zh9mCVBksB_Gq8meHbZpxwNM5) zp(SU|LHVM~ZuB~KSmY~x9lpk*Z^bnr3{RR;^75}nq^1P4hlMddTtyHgw7uaYOkF9AFpsU_R|V~ zIDg89?YNR+Enmi*r}L6H&BtVIY4-)3j{MP!Jk?y_O=LG@SyOw4j+O7sZx{-c)lmWi zHwW^PQf&tqu&u>dP%nFui6H?wh9hXMy-Mk>s0(5-#ajJ^=?ob7GSt}qK5b_Wr3O2A z=x+@8JM&Wm`St5(*|5{zbP$|q(fR~t0=EfxA4D~@KSQ|G$(jcjsT^M}CrLWOWOKTr z*mWI;np}d=g{iVDxJNGoZp8+EyiW)xQyobg)1O$ZnsjM}2z$$sh?GY!yL)}O9rBJM zF_Z}w={^3qCKH%19pXXrv$RB_Zf9(6BIPE0`|bW@31|$m;)PbP8E2_6TpE~3l5q7t zuk;31<8?91Q9|BlO0=+WdGxf6baD+s+g8~ATS?3nC|^EJMsU>QIx_!Uf+q?TJ0jz zV1Of3nRLzaS`}(A=Df4|F*tmW6SM+FO_Hidbl6IF{hT;$e931H)H{8Tw-g0t7yAfv zLE~kDksW_3^{2gJ>6I(~zHl3IUKuF`y(g zxSVc*Z+@zegkm2epup?IvQw*~rUvM0Cq#0A4l3=@$nf@@2U9;=i407KDw$e*i~y|o zlawI#G7*?qU-Y#W`Zrz9e`k)n=>e3LIuq@(`*&E>fVMG35+1#mZOX+irJGl_OT6Ra z8K3doaLWCrZ+fg`7^Z$_|2qpc8Hdf{*`pw`Du;F56oJD`=q|p~+6w>X+EtO`V4!-g zP@Yn{Sh4mX4VG}SrsGx%OWiwnB}iN0py-7AMxQ$?x@4bIpi+H796kH)$O&`&e1QYP z?`sxawVfLZPnJ~ULf15T7SV#mNjx}e{1fDs$fl~4W`Fh0f26QbL#@`5&b>-0KAgN> z87$?kBuXC%pLaD9zS|BdHT2Yq@WYr>t-e?XieGVE2Y%q=lVAPLqkF+-LFr`gf!@!20r3A<^ckN=CS8JBuX1u(kekp?94!sRauWKqcjXcvg)fJtUj z+U*)$No3~uaHwBbM*!?S&(UctC8neh_NIp{Q39RY;{!3D_l-zDL_{&odu@}HC9dXa zSij~bpp5E2DN_E=@A!2C6ZN1^W3XD_gq2$WWt`FY;&3WpbMo(to&W1QBEX|Jt1Bo^ z&owv#@vz0Q)SdQ!`W9T7UEooLU7_xa7{HOF_US#A&51n!Y*z5!bKZyNCQll3YcrO= zKRXr&<{qzB`}F=Ff#RRNX;v(sWQUU@VJ*Oa=4bX~Cu25iWBu-beBx-Hs6ISIW@cJo z+58%wnhqZ7t^eU715a870f5}JobstK@PoyYJ-xI-p8KI$*XJIN#TYFDnP|Da04zB; z8&6<>j^G{zQ!Zk+Uam4bC{DHnfd@RC;eE0>y(|led!B|*k)g>ihH18Dl!mP6yULsB ze%t|9toF0FKd=EBwODHDD7l~$o<2j@sRp`(d%afKv+Hc0rI?)F$idTL!93WkRRYps z>OXom{O|Q`0bFXvG2SOWZBairU{yhaAI@|De?K4Q@z2n>?*z8-OG5narJHk%Q_TR? z)odG3V>hl~Tj8Kz)qYICtUdUvgSs};wR0w`|G{UUCpy_wfTO|&^y@xX^smk~s;=IC zfH&89*(Cml0zM(wxj}7zcZEjsXhJ6ZYzr z*H2r-K=tWFsV?{s;E9Y4XPRBDE*#xEp!Q(4xNBIOf+yo&x$3kBP;pf4a zt3v*!`@%8P`s{x<+X|=KC&KqABAr8$LY`2S>x_` zMUtuBr16;`rvEXrWeCC`co%GHGY*oe_#Lqoh~p$|@2l8YE%hEe+SN5JF+&~`$sXPXRxv9a8RMn}2P?4Z1les`ipZ^-s`-|v|LeowLd&P@HOJW&S5 z`86eR)1i3u=BJ5&+owFubdkaht5O5=_&+M z$n$2xf>F1s0bkSB3;?2B2+wcH@W4iOcFS3F4T{i`3w-szAs5L|1;BQtbO z%&42)P=YZxTMaY2{}yp$WTz47O4rE2?|u?rs@E!o`C72F(a&(M#zGNin)SeZZ_1|1 zVVtl(jWH))J>#s`CV9@k9=RKb9yYJv?#LNNwU%A)Xs?4CJ zhl8xcJL3iC;BTOpS)U!s_6Fje$U(NIul(@@!S+K4R=nBYPKWMFdb)u{0tP(@2bY;2 zV}7_Umv@!tlmYUKID_K$n6V9aU0(jVb?k)GhlRUz}z8j>2rUqE;A@I`-49Y>t&Ol$8&n*YFghDyM;E42GIWsLZ>3Z&;`d+^p+?f{wY*c=v zPL2Keeo zHRY}QHzSnWv;ExaT)7mv)(QjAaQS7I`*aOa-7vXZQm0oCNSKK!RVdZXBF-3Tw`}*+vm$H$qwEBxO5O4CO%Cj z0>hw;z(nqT3!oqVcRq6xPZklVE0qjSaZ5ssk`IHQ$|sH2;#+A84YV3uXapyu9rKj( zt|T)TVZj!BBJHoOcc%5i%|udI^|dUHtc4nH%SkV~5|0j$Y1#JwW!RzM>tHjC$W!G~ zmiim_Z03~r65h!*Apqnw-G@uLc5CcE&hQ1gk5_uA9X(3POehJI!x{GMHX0!YA*G$N ziux`SYi(2ro{ir-0DPO;M&M%PO=!?*fxhM|hd0FM+9na8ArHy6t6hE8e2x@KiS329 z1Owkz&oAJRXHwxAg+Yz^FX|GQHKU>A`h#D$arE3q+7!7OTYGFSSgJ(PW&!^dq7vii zBFh9hf9zjUsL!$_?qR0ESlk4Wq{1WYWN!m8|8_Jf;aFF2T`*FdhSUA^TSxzBPG7Ij zls&j5oxcVb^#d~I>!NP1YcrrixnL2!qzX^tHq9tCsGVb{KqRbRQq$FYZ?{jcump@& z)YvX7Vgwi)za6g#zy5g^W@mO&dhH0#OU(t9jB%Fjt63q{~w-#aKrS;lpWEy2PQuX#60d89UO2ndx zP-^}(v(1VN;vm2QUaZlzJ_Mgb|2ZVBm5>8=@i=zKQ!`#kSj&syL2 zcfa4Y=09D-%r*Pk*FKN)I6uemlPg0s(?`O~ueBTpv-Wm$r{unL6Bj*QtR%(iC^*`> zpz&6>E?{%AfEkP#&%4#Qd9a^T0YV;$Yode9p6E|omoroe@j5E!&ZP^o8`O8nNpCXDC#Q25@D{Z8&x z9d4THcW>3;mOpU=-a&PeLfHQy969xFEy!|ik9lx;9~vpe)W`ju=h4n@l!h(cpudDV zIB$+ld9&>N`wsE)c85Uw#ecg)xH3lTV5P#pBZfSpo#_J1%3gi>IFo6N%pHsIQa$Ng|S-h~$^2z)S zVf7>NJ7gjm@#&pVr|Zj}=ZtG9-=%-RDJ1zd%6+~W+_@*YRRvHrJMd5%jEZ|54LCh` z455b$ksqNQRV;RNjf1elMk_u~x<43bf^}$kYcs z!BM0>#XV#7NawC^GrBR?ElO_wmE2^Mn>4&Q9v4DyvZ+8-L9OJi&n z+TQX{g4>3a__}c40#64l@%gEA@@hwX#5_Ze>DujNJVtlLPL;9G54%#`x+Ssj7~-g3!r(RQcn zD^G!wQz)^=54-y({K6$;HU(Ka0%feZW$XvDCorVI>h;CWxPfs&^b{BR^TSmbV$vUX z;i$Xex%`^KTTPL&FQX|4vNMVM zV#cIQyRv9hh8MT4+%Mn$Ce;S7@&bnJir-_25AdU*Y^~OIYom4+_jglIEqxSd23<3J)UJgkzD=+?l|m=! zo(RnR6(qi|s|_iU^eGsnHj8e71>3qVsuKx|m=@j%cl?Yd9$}PAvZZN2e!R zG-}aMyyVh1k~?5_?_K@KUo5wn!mwkc&`Cofcb?(emd4=&$DdI&j~6<4pg;VDuIXw- znq&qw!K@Re1J?NP+ixF{H0+nfQWfwyX~a-b!?iN@@&4Qy*a^*tww4(6H=GIpEDZjN zOJSM0<@lgD%-vgk7Y{lWz#UjmY*Q2%l?ae4LWJLdcpqLWN1TBZ1^6Y8y(ZuY(sWB9R0)l z5PX_kEKC(fv zg-Qt8<6$VH0#_Eyq0y~CQR^|-+;Z{DEF+V*nbSGG)O24#4QTkIrdnepAT!!WLOSIX z4W}uDgfpfeyAWf@&tgsqjk5gTrv5}i)B6&uKzeKA@L4N?qr?*-bHr0>5)U&+TlT|e zq(QDFvb$#NAE~oXlir}fPVxJZ1jA#<%N=0qtx0*bi_-Vf{UkyMW<q$eL;ud`W=19x3(|hhD)=q_ur;5Kb_cf3144Bs*a<}l`lkZk~5QFuna z-ZypkZo{Zh#B3Omf2Sx$FpjsGpUb1ro!8G-TXczDgGrAGr@J3U>P{%~cFA|K;3ief z)uSzb50OM|HOEKO5WyIl-GE~^436T~(Uf000<%jE=#i_(fiyF>09jm``FH$1-mi8& zye7(ZdK4#1=o;$g7vfTxP>r8*fnBoSkKmA=Va8@>5JkRSlfN8d6|N*Go<#d?j9ct~rrLRc zZ=H-(IUS~ml%Qw1l=Asbg_#8vq?iZK$wh7e)%c<`#84LlKe=eid1yxy@(DW=2zNv$J1{AqNtnqB?Zn<7 z+%!edu(*Hsp<|X3Fl>s7!50*uC-f;Ez{S|@buzc=BA5V%4|_&sP#;hSnB`c7CK z5=q4^S4Z2Q;_TK-d&n-4CHa0>`KXAy*$a0ug-#S-cFQ;y7wkMQ6!QTY8ad_$^yTEAk?;7NhNGXIrW@HP zGmxFGeuP=ppBg)R`Z6r{^i7*b_WwjCI3&?t*4R5pK@9jq=%t6}PN9wl)XnaMG+hva z+3MOc{iW0XGe{kKeo}(&jm?}?|(E>lir)_crKQSe) z6YM^XV-62L5?(s<$yAo-@isJi*f!bCMTw2lSvJ|Ocv-$LKVVs9rjk3^BJDo>F#TO= zl>NK52R!teM6Vlcv`diTX9W1(&(Pw{szz06qKoyLl!272=TQYQgtuL7g^$fBZU zla9*`T7V8d=uTl-`#IOnn09zxY>t@+O*61@PS#&E!dX}5-*0gn%c-6+I>4GTi2O6N zO5#k-Q3;WIu5>%g$qNz$hm>tQ)ZUSLsAT5dL?`DsQd|KuM3G=ubkqJhr@ z70e{mIU&;N!=r!g9fa}$@wuJymAcd|j%Seo(9RY4Df^R97Ejmn_I8AwZBUHdjZ*rD z2nDu)GjstE;c|e`x#2v1{e6>ry=R!SX~;k^R8Ue*#`SJUA(#k$w^N5#R(uuk zZ1=vNMLs9)y%!9TmVc`&NO~{{{j+@SlyGGS&l+$p?v`=WEcer>-3c+8 zzj}lf-%-&JZb$DZ*vxA&r5;k`TCH| zfv7)>gYuo09@O&v9&qpD^BFo!5h_7CT7T$zJ~Pcki>&F@@jyDu8k{~zvQ)RwWFP=+ z19=X|=>*Z@3Pynk$M%0up39^<{e>k*9~>dZN%;9|85vAkF3aH8FJKdc)$O0Oy^ak{ zik$@MT9wHpq;mgq#U3Z^6U%iTnQ*e9-FUf7+cu*b3FrlPx!wfH43clu3y8X`Nx?`> z7&h8!V>omLNw&VuE+Ij1C<()k8LhaZ<1PT$@WFOKd_ zCDFX#pKa|!nUPKjAkC&TL-4&KOlPZOcmHONR|2Tfpht7Pd2x%lsmLi+SJH-hy1<%K zD%a}W<82OrZ8rUZnx;60uLsLl$;k|cIX&F@-j5mI$J8gZ(dwF8T2f}x=yy8ampP&t zk1ErQOWjQ}+4(8dBh+*EoXR}8H=*-0OPo8+(SthtDm#eIc9udM%`S0*!)#!uSwW&t zy6YuDvk+NqjSuJU<27AwAanI5@hVPq!2Z>Kfh`LP&_KhUq}$d5?GwKh&Kn&;=rdJ)sadi?1eZ9%%Ya zjekCqW6`tED?)9lkLHVO83-<5y+p>H!{c|Zus*z^I|>hNqzrXe9Gji(j3`YRjQ4h1acor8}{;+j9O) zGl-sA#M%BGerk1p23>Z=1vA3`bn`Bwksn!QcOUULU?e}5-|#9~3VXB5Fpf2b#$B0; z{@6p0nV5XeBIXw2gLIP~I!uBkW#I>lDx`K~H% zECrRv(B4jr5WZ^Cb#;#9gprxyO>R>lq5C-HE!`?@n&G~9{^F2(v$6492=yp1IilFA zU1@$#lz+d5Q3sWH_jSeIZEeHywmRbrJ2;6Mwl^hcG`ni9<7z`@l zq29p#;;@Ej+NaR(AoC-0tJlN}nD<{jn5D(DR-_W0{WWFunO9m--@AbIb*ZUF|Ri-2PZ%kYi5XvCO$JU`;9!n{MRGWQaq+O_vE*AHEm+jcr;`G+mio=$_1>tF>K> zO?q3EKH;*`W&G&X#;NoyM3Lc@l%Lp+%5itCvjxK!+hW?fldZAEQ9FDC{_<9K@{p$Y z5+ADUp;X@cV^s%zRWOSoYSCoXA4YcUTeoLQftAVoJ)s&gxP3ShlF z_LNf|OauoS?|GXGuz*!2=3n(*CK8fz+*k(9&jb%Pz%wMtY~p%R!EP8RSsiQxrsZl& z>`s4(pt63o;fr^ay*d+R+V}hdtTGOldWu%t!s3=3<04cC!{C4Ww44Vs$6o(+nxSba zq7iY{`P4;g#0ScSq>4W4;^#+A;m>woZG{L>57f!YWPE*ynR@Dn?wtpf-lI#P5D z#Igon?LCwDo9sq?A7c8toMP+OvQsLyQ|fG`b%^8Elx!1o^XrjbH#-r|7#zWdddnoI zJG%j{oOsNCLNZVz1C5_29Y{}ubonAr6$zTiaT5ak8}vDDVMXutH`eoP&u7kxt()e> ziWk>(aV2fIgPyx;qMQ|3bQUR}+W)Q2&rPEtZboP~=3Q|cktPx0D1 z`M0%olsT9fN4B0HKbB`?(LQ#L=9)1LcVekM+N7o(bop9-_N>Z<+_%u40U zf3IH;daXbK)3IOeT|_z>^-bM>Zr9x#O(iJ8b}p%F?4vBp2Z??&Utu|+>KXs4J(9wR ziY#Wn-*RuSN@UA4y(Aj^e&o*3e!9z}3H`Tq-nh%6f*-ct0BrdwPxD6+!nh1>j`dhH ziUpO5rh4e1F8v-dTbm~|?=`gJY0KfIaU1th#$E-Be?8#7eexdD zh_~bl&m?lHzERWzsZ}L8As9MYYIA|ZZ`-Se$&cUSHW&;BT=F_Twc$Y0xvpRMVt`&r)oZk# z>GdJw7U)>=Y)~Kqg}7kNS-MD8xevPu0BoB++sL?ql(2 z*^9(xOENfuM{yF~TS>WM`4z~d*D={%BN9Fm%M|IKaWH+XBi5#;`Q zdvx~Wr;8@TOf8u3W`}P6o`g!2B~Y=lKdE!7X|h%Vsm1Y!o3PQFuSh#kU!WGLh}A&e zPmA-|5w#LB5`wWL5S@SggM$!zU=HC0yTB~#vi>(zoI z$<{S);XBL`v0IbB+`mW%IvF?!4r=bxRLZqGcQvA?oFtWRysuPsw&(X;$#dM8>3K*l zoDo0cCQDGVgmE|Ox%TG}){Qpx?V@QHK9uDU<%ooRUO9)Cu3$w>$fN3s0;SNO^b2pO z1-;b2$H2FdgWsxbMlN!vj}LMc)0IP-`@jEfaU0RG`PA=D!r`sGkf!zBQLfp!fVX@I z)iHw{tgKOevg=W2nLKf3-Z84;yV4ssNF}&z&mk}{Jz)n{UrDVM6{ZqUsR%+Jq%Qxo z9}`S`?iFeGCNR$62^|@lX2$tt-;kIwlTxzvj9Gz(hXMs(;W9UJXa4wA)Eq`cs7F^z zA_u9cQRIE`^~S4vSkrW*>JxHSbvC+jUb>_)hb~j$ZodpxDcsibnZwI|tal0OVhlYv z>qIw?Ba`flckv7^z;8Y}1~>1?9-?f*fiGh*wO-Qdj&Z z?|%B)(f7wNBr81HZ7e$9Cu08QRA;kxX13EC=Fh(Eg(b|nR8u<6Hh{#H8%TN@BOC|3 zsGpuM|BJ3kyK`%Dcd^pszC9rXO3`vb03ZZj7b${SY;}$4Fn&ZZ-KaGbOH6c5B(6ou zJ77&4aE3Pd5rrNWDSWTx;~aGNA-^EX`qCsW{1M-uPz7cs;D>O;H4dym@(}xiCkbV5n|@nQB^7iJt4vmYq(8h`u6HCeX&xgCar}y z97nLqcAgF%?O(t;Grj;t;N?0Mm+#J~aOgKK#c^RKL-WfmXH{864}O;A*=Oa($Y088e(cC$WCSEfU2`)=>?KD4+c zvzt3y?cP+$SQv?RkD(%+*h4&KZph``VU`xg8L}{?{gmg z#`@@MojzDcp{6SGZJ^u#h>`6PAk%7YGWDM9g+dwCi&gce%B_|(t^Zng ztm+&fa%82dC#YvMqaIz&@(+`6?uZtf8PwEX_q_%5qk`rS_nUi96h-=uc%`HV6(@M& z#Ba8yUBoJHY9*;JpT897aNcf)bhadBSL*7gTTa+Mv?6-Yd~w)i_}E(O#FEOm&=<$@ z-Z<1W^u9PVA|QjPMUmgPC5XtsWO9VLTIZp4a?IgL!voQ;eDNG{b!wjDO|~xD-;g8Y z5fB_f-FKId+A1YYs~spg^%v5jbyE#<5tnv%3!C1h-&|kV`UyR!`ksn*@+ZyfF7{4( zTIA1WohZQAsAhKbDoWo1fj>V)^rVw`i;-5tRIQWt06qy4*WP+98fCe)i`Bq)!}RX+ z)3-DX{9TU`a`Xx)s5bSzU~W5r{v0p5`sIe!z7{4m==N4Rhh0tK<1?=Vv#unbPetRN z!54*ReO2>4d8KiEsNRQOb3K>4sI(%g%f+QLWTdVhC#r3fSzA^i9qJ%48g^lsIgLxP zU#k*s-jiH2D4iY!6f>I^IPozau(`!3&YmZjMgx8JmSmtn^7;NrVwmJ0%a2C}se4T*@i@%?Wxe!vgsfe^JvJX#`@m3ZdIp1a_wv*jXxhh15_&)FASvQD8Q?pU!AF*4^F|@A;9&%J?-Dvn9Nt6o9WloPWFyQ4grolC^8>A_W1HEZ^deSh(-kV( zHK_iZ6y8$eZ7O0CCOP|0=3uTXFdC{2&GvyJBvhjx%a!L5N+?5`7v@411;5wUwH zvCK9$euCn-z0PdTHoXkmd-862{Qh1wtLCeG1Z zK9|YyI|O%2_Y>n%+Z!|o(M*2FB~My}KL!G1!|51Cy3_F@fhWN?EcaRGM-AFJWd2pT zjTW@FKeg%ItX>nZ*OB8!+l=M(K9AE?{gVeGuIa$IFv|Eo;GJ{#VU54FYw0%P1@W|| zxTOw`;Jo(!f6UB11l-(|6oA zmcpo<(E`-R0!=o(fkcKnJzHzgOY$s!p~D&AsAt$qIa**mLvNk6Z93MWT0T3fT^`}N z*snYtyv|%~4VfC`g!tDw+aM_%avF~MFMe%ZMMeB|E&mv~c! z302jaES!(pZnz&AHcN=vGH=p$(yM90Cy+Eq{2k4Qj)Jn2Cw5l2f~~33@UEcF2Ok!Y ztUpem`YxN-wFDXxRu4W1>(mi&=+zsIud5YIB=3T^molFAp5lO)v|mx|j8*$g-N|IG zWC0Coq&LtNtz!c{lpNI-mT6}$@N|^zd|JG=N?D1&$+gxNUpyTz2|FL|IZ5{UY{gog z0#ataGrCmR?1rUIRXNs`Oyl_h^{VC1OpDVydl0?FW+0&ZQAC7?J(?!&mt%!Fp;c~d)YQ37nFXF zmvCnF#6TF|6A!g_E;}=z5Av&2A?5kVC4YnC&{Ne963<|?vP%Ge1l3umCG+P8G2I8< zyR4AFCr~tl0uWtNBjw8U_GU}Dqxb^@Gen0_<=dA+3`Gth;~aj=OJ{TVsZeH#-;fjO(7U)6 z^GfNWmfeyYfn12`x`JChr^q}MgN{R7h>Q}_7wvM>ENQ}Km(u#d$=_cx2@HR{dg?(H zz#zr7?s%capF~_&1_I9#bsJCZzbJu`h)7~%m7Hpj&r|n$>W4OSe`_##*;)@Nn|fji zlwhSRRX&nh$cBpDPI1E$<}?yu)*HM%BF@i1_ zA`S5Gg^d`&iKqZ*H9T{=?`->T=`@6Su#qz}(J5U@@H|#&oviH%d{rTyw}=4MtI8}} z-71cUz=MYc)lp$`KqBSyntSeQ=OuY{Zwp$#m@i=+3IqC9q@nem@oBr~q z1(@J?Y~69B^UG5h*4nUBtW(2^5fUCtE##7nyt}NG_XbVCb?;~54Vhu@rudadZOv&` zLo@5&sc%p1Qr9&Woxdt18tpb-wfEs)v1xz*OrWIIEU@HH;210{_Kn{`y5itapsRER@OES`c<&-Vx^jqo|w;I*hRfc z7fsb4DtHctO&utp+ zz`O&4em_PGY5p?l+ESMWg9~LTvk&-+2hPmGw;T(L24vHD)G&)Hz{cgg1aF}11 zU6ZT{^d=gb-LSRGBt}E;G!shYzor=H(oRW!83lt|CiA#t+Q|hb$KMZ9(>d{sKpgz` zGPYJ7OotXJq;gGIA;ToT0zy43J1f-SZHcmFlXkK8#N$x3XB_;b;Y5MH(31+Q@j>|n z3!%G1J%u&6qi9y2?6M_1=jv;|y;_wGm#3Y1<%KP{sBkpIoX*k|6_HKeEuMnT{KkqA zmw=+}3!KiQv0de*GZy4=bR#HM7~V>u>s%Ld=l4}B>T)gOU{5HeJU|bOiBkVTI{-T= zCvf~*->(F5TI1BRsQe>S1E61WcEpLiL*BY-TzVbF4U&NRVG}AhuXzlcMO;zF|Hjyd z^1yNpug$*6I?geRf7bq6Z(Puu((v1<=)J;%E9ArGVz#VtTV9wbsNFF+w9D3>eon1( zF8GQ1kxz<3&w|1K@C!&j&U$4kavf=xT3@y$$>5HrQ9aS}hlDP+a@mmMOehy#EHp~I zJ#*~SE>0@(n(}R~qH(24aOcnj?<)U9)tsBs!u367QA%3cLcMLS))9v*JRtnLx1?rQ zK4=uRvw=4TEI*P;fxv@XD?aXbRQ5DVSYZn)pZp|Petq%&h4tI=y37(@0#X~F(#V12 zo9~61Rn1OblJ7J&V?xwYZVDZdL-P<@TR^gfrSW?E3J&RUiZh=>cV^~lkbG{E)OtnF z9{BeIJK*F9p_Nm^`+e>2-cn0g0YaZhV!pCdbfI~bqB#tx(9-lCZCLg=X=JZJJn~M+wT~AvTh|24PIek(+QM9CEO*rx zZOfRB>MJ>9-E;gE3lrgj?IMpjg%;ebuTxm^rUKz(te^1{HRbH zjUeUp3`#g(DF`p&ug42;3mAO0PLtM*j@7H%D=oY$-WGPp&h*UwLBcvlF87bJG@o_x|r^XG<1asR!hr00jA z2;ce=QF#xBpbQmkj4S7%70rL{_kWxGWz1!8H<@II8S^VVOak`yhy1&YgckHA>Y zmi5t~6yd`E0UgyHxN|ol7y9(BP?P_rt!FQz&lO~~)?wUFG+jA{ppvdX5C3PP>Kme` zM37dcR8i|dC2}weuTD8+SMBiPyUgOK8%QE_NcH%rXvj(_cMd=~n2P?;+6FCDP(}ex zZqxe^C#dCpsypO_B!2L9-eMIflN$fY*ByB4<%YiJV!K^`ZMTy*%dtBV+I(24d^>*+ zdS5P>Fy6`iU7%6Y4dPK9wGl4HRo?2OMFZ0nHtuEgi*BH#ngLURx)<`-ZJT5i(= zAsd)VceIE2Z06?FXzOg2h3((@l(AQ^#ooJp07Z9V_omgo5xux%o6vlbry-x_hQOY1 zdGtU1$$vi3Ov>%#pg>2e>1*&VcW#Gj?%ZP}aNJzUAGx&wzf5|O|IHxCJ}jeSi~jZ- zU^2n?ml(-~t-^~f&2t8~&sH}PN^g3}$;eeemywXpFY0F3Ve;p`ke?YfN82~~*;L4Y zzb@1NH3In`kQfLm*Z-W zF%`dk*Z=CZcv}TiSv&z=egB6AAck&tyH@ypyIF6Ws{hrCHsgOEARIQK1Y)k;w{8`WmF#}!dXV&}#CK(00t}c96+QJ_x0qKQ1fSU}p zM&**m^ItDOU$8xW=nptQLgH3-$+#YkX+(H1rm(2wy!DO{j@z{VB}j=d z+McSA*&;V_D1F;|OfE4x*WeMNnhR)?Y|2P<6-ztX{QruXH(>}0J|!DMBFQCDpH;&b5G(Q`{B@VPpQFVrlPao(9>A?4Kj ze0heVL^B^R)J&ZOL;SDpL5*KFdqS%3Nf$xE1I7yx3BuB!NWM(l)b+79m2j5QZG>-M z@60#pJMYf13plI+4oz*(*!H~l#p~nkY38bV@4AOi-@O4fC_QqbBtG5eTJxF7f=3T~ zRrP^>HN2TW&t|?+7l)YDsPgMT0#`QM>_juT&9Tmu(u7&uP-{HPtDCPVh>02Xy^g-H z=+!w}3wU2vhtt6Hb{a2ih)#ZEJa`EP3;XuJvTI}7WdHd{90&G|3yZfBsm#tZJzv?` z_|w7Np~7qR_x+ldA37H1cJ?kFcF65R(e&wGqW}83huVUtOYlpo;$$c$y%^QmU&AP@ zLNtjU4&7Qvo7Zfe3m?6tsUJDF$xAR>7(qKi{y>?j(%R>E(lm9b*svTlo3$C%9HkLx zQW<8p3%~t}H|$rt$?4MBTI}xleE^#Y6<6Z}fNyG-_5rED93mda4?`KjFSCVk1*{MN z;iDUF^6>#T!$;x$HX<9(PY+oPDn$pyLOIGU<%%^_rzlCN7un>4;K1@NncXU z!QTM*n%vpJYDBct*blW|h8_6a`YG!GJ<=OzGg~`pa_W|Pd;g@~qYYnk**SkLdVb2y zax!=YNN6WP%9584n?=mJw0l-&&R{t^1)TD=jzb0qr{<|eQm<$SPa95}ncD>}!hU>V zv>bmb&hzEnn)MrI2kPfn)kn-{o9p`D;EVpZ73Xr%Jy&t#RfLoM#vnmWVMi29UGpOe z%R{#9-D~R-FqC@|E2N>AuaoatIO@i&{>!_y>iq2x8jH%0z=xdPvV#zG-Q{am@x-`X zMR|AK0Spn_bGCs~r0n~nsS@Ln6YZ6t^|V+(gAEyt0e4K#$1j$>UYC=(1wpF3vAq+P zv!8MXO4Y{aMNm;Nj?R#Cyo49#g!xC^xTRxM$XhG?zq~RtxZC9RcItM!!4s=6E3D9d zsVxjDUuSANTU%jCd5jnt%Z6}BOCR|8Z)Us7OodK^0-noMEeQmr$la3 zUYpd7c|c4z9?TF&|G?0)HCeU_cC>@$do*OEZ$9V0$@G`=IOt;5o$g46z?)O&kPQL@rBK>b#Z>sI zlmNeRi!o|QmWBsE9=;f8MmR%9D@_f*b9J%Xq}!qeF;y=9&>HN&Jwc#VVX;c+12pqs zA*I5MG7#+g+)V2)4VURT@QP$pbQu zX`e|tutf)Q$VnN)>%oI8;61vDox*>~ihqIfg$uVbs`;*58F9^X>HN%|<-w&=7du-D7$^Ciho?nyWj{AaH8`$0AV_d7niWVY4|>CjVINkCtYyO5oaSB&fg| zXM3y-CyK8a1A-%Y^>5?Q1b&&8$?cyDd>F>ltnggTgTR^u~%E4 z3;A_5k^0N$M*OPjw{ctwqXQF*<`PH#*@1&NZe8lp0sl2*;fC&hQaR7fe08pZ+~$#1 zZZySwt#ut9)${Jq66Q!slDCsDpX*0CamHS^n`ru+^k#Q>$AeUt4ScFDqplXs(#glj zf2HhIPh#iQ;Yvam6Mhf@g*muE*N zD}%kqUS2~vL(X#KdxW-dV_s{v9N0j$Kik;teAO$_6N%$>-Fshk`o1ym{m^GMjgCC< ztiim@g{ju6k!xI0^I9cr#tAysR!r2n*b+tAQ3yKbX(tI5)(%HET1`H0+LZtL)J|Rn z?K{iGpyUJTeAf~7*H!Ob#tK@Lt6q2xS#Q5SuXRG!4?{DvbmAiS9fDu3b+tZ#Z6QX$ z%G)jEeI;F>%(}+2$xjm;D85kTC7ZPuMYj)i1?{oQ*oh2o2?&fkPxg7!Uf*C^cvM+ELJxIMOq<4Kl;)>h5R2 zKsyq3B6`Z7!vwacO8RiO4vq%h^)LtPzvb4WY!%7XOBQ3+B;O+aDj_hUCw_hbvWcem zbmB9EX{xTR+O>lMGf5(z+#J0-p+~@Ec~a~{huoe#{y9a zNQAFVh_w_PF-)!{9yNpLG(+TTR~5^4`{>h^2W$+gRGTk%L{eYqn{*6;iSn$yUGV(2 zYm<@w6P!VG6}CAqOXIaNZliO=$0TmL*bl)@rxa?vYFXAT1pTU$(7kqZCPSn(`7A@ zK9O|wqn7V!UiT;!cb{J9zYAwlOf&D6Oju#NwFA7`uv^3t9ExqSq%sG=OQAn>n}WzC zL-{pI&IDgoY0Jiby%56j-|>@_Np^&YXcQe^p~tZNhGF~r+DuTZ!@#KzSGz69bC#QB zBbM-%NrGTRF7}gs@V@t%D8RvByCATaEqd zNB8wqm+Z&t_;d>L=2#8ua?``co1zWJ` z~2;c`Toe1c($jad6_hz4VdRxW zi`XBm$Z0&9_17Iedb<~vfiCX`3czoG|L`_j=6+WULkL?5D#QEg{1<#tLRma_qjIG` zhb+ok-?7I@Ilh|=CB)sP_Wz!)X6F*1jz+cY%rcKe9N0j?izfos&Rz>xW4{KBF&OJ+5{3r{M`ji|%hegaQA+OGS{$ z1(r@U`WZ^DvQX1=+;y=f{g=zU_wD{ZqxTG^_as`xZT3wuxo?V>~*&iX)bV>6l+kC^s%gJtZ{3X+5Y4L-|+@Z zrVrNa7&oIXzZbH#42YX-E2YiMEmK?Fu#bSpM^_sQH=|taGuf=t6J}3|OST_q>jRJ&roAXw&`E>v~$K!w^7i zs697-%40hwrkKNlF~S&v7l(I zK3Jw5-7gE0T(#=SY-p8@#93<|W77b{q^wwt4&o18+Phu9PGGS=)L7+!NysWD1GY~U zgtWRv!8|p8?vT1VQt?z8=LGpyx7~?)>I35F4>pR=dg=vmGN4WaZm!ZVtG7+T*|}c$ z?KPbWlSXk$ERXzQ!%Yuyf$@1EUyfsb-8ZFy4W5;gWoCs7jS@X>!vLqfui7@)f9F8V zW^e6%=LFdV?o&MGdewp$7G5j3KFizFV_&uRsT%j><4m_Y#bY_sPs*IC9q1AStcCc* z*HKePl-~edy9>pW_Iv``u0{QV@r$VBytfD1gm9JdR&JA}=fyGg!TIk+CheQX*;N}| z?aQF1n`_yr@?9px9Lo`M{Ih9#@fx>fj-^QPZn~pLz31vjVcjdck>CcJNe^NA=AGQ_ zrj4t;@S5G_x!v9C<+5ywO&!iH5eh@>@2)bPam?`#8yhkJ4fIE=9)>f!hN(iC`m*TN zso|G~ZY&Qkf4ZG7fH}Z70BM|(p-OXr-~3LpC<*eK+Jzn7;8klF^*_Awkr+6r{_1>F zsqs^fltuLo&Sn#6Qg@GAPa7{pE5~Y=%!e%pyOD6umjEgEX5OxI?@WFo2Hl;rqv;{b z%!JxNi(So5zGQXHjlpc$NnE|#!G-|ViKm~bpEb-ne$<_lRc(pm%F%~O$bKb(T;o|w zt;)-i3Nf^Sl7&y}^@r!-pek@?aW+*>w@hjBU_!i!sp$7J`en3ODAvdI|3mkZpof3D zhD(Z@LOOw5@EGA}E|mb?2qFTkk8fF@v%Wv^UTA%w(%4dIJ)HxV>skmSBzX_x%YEoY zJ}T>}<}WEM&N}PzF4V9*XIEPo(NRe2RD=q0(X}kv$rPYh|m~A;UnV{PI7?{Rm1tLsNmQ7ns z`(H{EssOj{gL^q2@m; ziC(pMA6;z9LrGrU_{^Ng;ZX>-n_fZb`qR1pd^xsgFhP&$022v}8j3E9u(mh2Bn|B8 zUX3kZ<{ycX4V7BsHtb4&nzZtKJcACBYT|3UZC8Idp^GPTi{XtGJE`#P7jnlTu2P;OQOEciD>dD>;dt^*HXnZ4P{hVUH4+u5h4a_)8)5A?dax z=I!#7u$p*1LbtS!mlEUi7|ZwgHfM)JyN=P)iD}&4CGmh% zmuji0j+>L3+dgK=b0`O&dh=SqgPBiOGQC;_Hitd9OfAa;0R0hh+9?yl?frxj-}H09 z0xk**{iSJV{?e#7YhJ)9myY;4seW-R9|=bc8!MsH-O#Vv$XZw6qbfF=UDBZ7v)w)4 zaT~01(O|GT2zT+`JvxU@=C|fp$ZH5T6DdnzxwV_U zpqop9nf}V3bBhYub6nfPI#|^xm>qvze>qrTNZG7|!^^+Rv&)gntY4(V<}mke#rggR z_72bDM&RA@*KcTr@k>+_@2B@wD|piO@7&^Py&l z_Wm!dHB59eo3njp^U1LB3;7K|49@ubmT9*u?AS>TsCcC{0ZZ)!a(&#h`A(F@xy=H3c-T|wKssi&Ytc~am8?}HXDNjmkrE77dUXrP^Dw@rw<*0 z1?-0^%Na;lS&bChiC*hVmOny_jj`uO+pRU9jTLE6@CUVjl{C#k1^O$l7s^w0gaNM& zX$~j?$oJg!j@ZC$$^3Ql`MDc@-tbs?z2g}_CIIMZIz{&s(1(?=@=r3sxdO7MkPWr9VQ~7z z;L>DK!!&~XyymJCW3p7?J)S6?~t zJk3@7rKyJbOWHYqfeg(Ye$nQtQT%Rh^kViqO|On5$iSnmbqIdb@%QTypSK;|hG$NT z;!9`FPHP z(n5{z0A0!u8pS5&2yeukRAfr)0A7yh)f=2gyDTchp~1Ajg0oq!>G*Yt_o?=pL(-F6 z^;1|y-zw5RzyDC(v!cD4$G|$6`_XA@5Pqh@CLxE02HQqp04J5(BLAlfQiGY+kf?4% zg?=&*c~;9mma4xW*pc}Ye;+w<2mLOIJ;sgf0~JENS}oIZny-`3=pLF4Co>j;Z`eTo zpMA?%aoVBOU$NJ;5chu(_t#-nZ(AEMEC@&{h=@ptBA_5G-AGC)DUF~a4bq(g0)mKu z#3GeW=@vwgPU-GOy5Swm=j?rSf6saL+28xedtLk5*8&%7&EJ?~jyd8U_plJIlt#Rr z2*gZ4RQhP!uNqR(6wmxvSi8E`Qy5IfXWhT#I&p`z#nL2m`$B}1P}S&_&Qav^%s)4=$vkIihouEtQb|GGmyDxWltt($30If#!jBN zr1ku!Af;bC4Z|o=ZK_hddHZSJ@|5ZV}?FaBdZyv z6w2`8I~}~3_kM2|gy%@dMks8Oy7ih{0)Nhk}%3k z?GBxKlj6JI&d~l{^-3s{(ET3my&q^j12pLt6SZ_=Z*LL(`1+Yk@>Vt^}?oi z-x>P68Y!$}B@Z%crMhWHUW{b%kI0SIErllTZLEFm2jm}%QAN_06_%$dlJkr#7U)XEXH#1v@2a*DJ*CKzLo z{fbFL@w9wKg?RHYOvGzdif*{?)kifLfutC|1#R7uDMGkfcrFg@nmK1+!S!c-DB|#h0 zczCksr(0Wu`n}tQu6gyXSp*HlE!PS@uD*V_h`J>C%3q;IN~v6qU#6@quIwZFL83-^ zG%MGI;V%eb@@Gk(WnSt(EVIdByM6y9Px5ec4o8qeNS;QNzoN|51NCZ4<1b^8HIdmO zGzJPvCHl+eN6cpPzW)BhgIHT%$0}T`7FhcnD)V$-4cR9N*nGUZz`k^seQLra33^^= zWWREN&yqRxGP)o{pT^;1;q#G!4{7n8^mqglK{_QdV~%rYyW?nDha?tMTFqQ))#E31 zL(k848&pk%Q_KgLtr*Xe%!c|mReW;&F>xB{m?yBWPO3jSt(+iHSJ%iUd%RY)n;>z2 zOVx(P8qxQyGqfTnEY8j5W5$ohtn)KCa#@eh&o{Fp?$=ylB zjotn+JdLZXP;E&X8szkWZLi#5(gAyW;^@l%ojXPTDBfRw^fVa zNc}L;8ed0Nuj~lEG|#;x@z*kZ0{8GBNjU`!%rG%#F6X@T!xZ`QfWXfi5H~$E>`rEP zhQrTPfsS+euHoif`|kaF-hzOd-9)od=)l5$MSl}Rc&<&WI`Uf1b&dxTa&hk8zjsc1 zJXqa|WXtB0%kwRhDV;=|0Dlx(gRFb~J*RZ5oZn@Ccv3>)@jYQ5tzba;BtjY+#=o?3jpY0n%@l!uGc zFM#iBLs3hNLx2p$NMf&eq&)q640OCf6+(9z&}y&vyvl5^65tH_Jntc?CD+%{W9lI# z_LS?v>WxLQ#2=ch*jXJ}yD!c+`QrjAMf;iS7whpn8QbwCQ?E4cz5GJrnOcUY5xM!m zPP{!kYHd+v;pz}j&U*O8BI{*^1tnm)Z`fmK#mWR5u<8)577)$@y{M zK9TIU=r?!2-Ui$9QoZYt{E*gq+gTgZy9=@!d#)k%k$ny(b4sakv7T)fvmzx{gV;RZ zXTHz5V7la?%C;MS?PGUc+#>mM9v66Um+J_-SlZ4lQ7*oElC?|gCu*>KOlrD!G5^Me zwuaagp1U{b>c=bka49%?4P1vedF_^r+sxbeb|a*g)dg&il;WNekgRT}t>! zbU0@-dFr7;InQl-f`+gUK|ktAyQ*xD-edT(KGsu?zJHsR5j}}~X zFtw%@>?x;niR34w>i$WIo}d$J_8o_5-fRyfG21L9!V^@GS@?Moaj zQ%7up!|f%5t`~D{i|#XD?AWp-<;JNGCxAFY+I34~%4 zOY3;H0c0m?D<#fVT};faq`sSC4`$-=%0FO&0LN@{Uk2B+4T;niw7u6)c4JHV+QBzPnB1K_jZbM8$Z?y!^QPLDm(M&gfI_cjC2pHV4=i zDqhSOE>V1@wmoYN@_S8}t;s|kQkxb1mNLi7Wus+dq4SC>Nh{k-ZX$r~ESdB}sMIdX z6w4JxyY^282CesxUC|(Trx+O6GzkRfFfq9L*xL_tE=$9{e8zBSf}QZf!$h<8)$q&n z0b2CV+}7f(t{#J;QA}+Xsb5Rse4@luyKiIdivU5{hd@?~@l9fDr>*Bci(GRga0XhI zmdY!A^k2+xRh*BpX?@Q>w$*<7eRtMpSu$^9``Jw*%Gs}_Q*nZi3v*r+;d=Xx6VJyH zg(U{2#CNNXv~lTJp)5?a7=oAlU|7dJ{@U@@rMm}Z^(%uxM`e}y)pYuS!C8f)x63w7 zdPb-6d=4ES*UT1Yw@Z(1R7-ob2FTA<(sVc)AwryXNhj}|jH#b|yHKdZ=EpQK-JG|Q!5nMJW6>2f#Zs=qJ?R5zdRRHQcl}GNyL)2z73DK zQycLa6P;y)Vv5dP1izrzQ?Z7}TFq~u+Xf5QV{QhsKoj8H%+y&cJ8V^j*4!A*%EvQKtv+7RFd z%wHHvydi{yXEZJi)Fp}qh<=Sp6ukS&tdSA8jW65ag=A?I`}=cIL-l84XUIIjY-UA8 zsn{?girv_sCrATH#~P#vo&uw1YhHH0Hg{1V%>tuDn!y@=dL;9-_VAf`YT8v zi(6}0rYUEHYY6D*{0r^HD#eu|B>WXv1v%t3w^b3+AAvGDQ6sx~@@s&pRac7qHKZpy zAHKxua$v1m!9PD-njc8YDF?plrs33z!Qsxz)2cR$8F2mQ_xHA zXZDy58s6`;M)%l#b)o=tyw1+*5EJ=O;hT*Mg7e|dGfm15JAKLc>?M_OsobCE1?J`=Tk$yH5mgjDvFwBrSpIW?&e82rcQ z=0jg4U!AZ4(2A}!7iou*;j`KHPP%jB##%$oF1z7*o!RYeBZo~MXMI1+8IylBiBy36 zt~XnKRs98 z8e!u*Giml((@lMm=BR_1hC z26>$=bX>H{MpQ57a1midl{{8Ymc)Jf<4CjIb?a&%`&HvYHg6u{2OKfn{J#N3>J{4< zOM;xXNNxh-dkAA$xWIG?@m^VdUR!VW*f8Jb?$VIf{bA)6W%*m@@(O#~V+FLK20ET^ z2y>HxDZeF#qs@RqbkN~aw@bGQ_y}BUIvgXedKEsnr1Y^X4F%y6jxHy;4jHM0A20Q7 zn~g8=o7jntAf7^AxvS(cc^Y(=sPdi1xIjv!;d&&c&S88jSUK%^*GZ4TI}F*xwVdvh zz>rKe*7C4C9S-MwsrtZZy;VcPhU48kPuHZ-v8O|E4^Hpv2Kw_kr0>a;umbV%+&>J<2kh0Bca$E9|x_L!=gfZA|U3fvjuX zDdyOF`FD2M9qq<-C~%`~QT8iENK%~~9`BBg7H^te&2)K3JqD;j)MqdcJ^*zg~HAump3Elnn}&u1qSt z8_G8bCa?_x03wg|{P_J{yK$Jo)2u&reO^gI{_wjq;P$38I?`5cVDql9%`Uncwb5%7 znIy_(vchvL3>D`PIP1x6&99GLDEo%#fzyS=xYEkU-hF!gfI*o~eVS0R<5kN<3n4ZS z-mK_0Eej@3)}xR0Z1VR35w$myab6Qxe8!rknfT}nwH-#M^Ywy-;QHfn1S*FQ!j5_eZ;OXrpoOQ~GFUxJb7;14Q60l+- zq8BLUN$arj8TN1{wyxQ{q@ORikzM-|yXnXEoWrH?)Xm6wl@AKbZHcU@Zt|f_7tLHr z4>%_pOa&oErH?K)VZWgiEtroz!OTSAI`2wK^rO2?wFSjZ@1g;^c}uLxEcT?{MHIDl znN)C*8~P*qagGBCh3E9?=1s0f#S^-4Ly0SuHzsv6K9!IvQO5oKEa2}J9Df87kPq2A zV_c*I*JZ-u{ElO8;*?OW>KwOv=Y>hit3LMqs_tj5i0HPcV&)^PIPht8Y#izb3fYUm zw<8(!iswu2sFdct?IgdIFE8Vu52>~`&0H588@VBFQVmbJt$PTO)@CgGSEx*i-h|6s zU%#sd3k*0_%mrMCJyxbQQ!Cjsy$w~k1?VO<_|#`NSBYV44PeuX4NARTbEl6IYaZH6 z9CbfWUZNX=y4_nVy8AI7MN}}g*JCtzB!2_|lo!D#3!+uXjaGsgkFE*wtRGZ0mo6fy&NCqx~wRO6(`lxZ-vMHYr zvZ3lf!s*eFwG9Rrr(;?Z@U)}?{;u6u2z6Z;nhYK#W@_j+Ul2T^Op%WZ7kP;-6>>ui zO|M$_tn1!TrBm@RV8ImPg*>jf`Q>kGmskkztc{shUB2_EgUe>HKqziccnOffZ>goj ze|CF`aLFkMH~J+nXAl%hl@>ZG_cCtk;DJB*DK1 z>IA|OM^c!9R1gm80a%n&hqi~9ir}ySHvNOl%^qLkt)*?Oqr5ZXm zGvzm^r7yvJ!U#p-W39!K$eO}7cJmRnz6CZjGanYLa~-}wdW4)aQ&GC5HI<36?yvY^ zhOgSyxM~M3(Ex&dU;>L;`2)phHSHqfFt#^o%d#A)Vy3neZ^Op zYqKVy9USWyvzvBgs-A6t(Ki9G& zj~v_u4fWgHZW9Vr&&&r)VtM)njE1!)E@SUL^E=@OWu#rTgV;RK67eYC)(hFbE!{D& zw0-@P)tp&%c2}%R?%0&sNcl5OE6bI=i%$o4TwHh>hE)eF$a%7GoUam@3q0I@NX5tm zgRi8YR8MBGvzpHG@mL>Ry;T1(fE9oGfS^ zLbnv{4kx$4X%>7PO{Garkl9c5Cf;hL43G8khD_u8>y2%D)ZlerMsj@(3e z%9(r*y0&zkCQ`tmpxLl9+?TS%l|D*%|M=d#~RxJvdDU z1|3okS6U>`gF_ms!<1u|1nCY%u>Np$zCpA9y__?4QkhdwM!w0!H|M0`XmEY5GFdi* zMxj*C!Qj(Ue--}ZLiUwz^&spUl>#ePjapyV-l61F(_Hb&QOPE9W4g8n?X%Z*o`x|Z z2EW~dvhb~(T-{C$WTDali-%Sg!2nFs!JSyc`L&Q|P+u&wQ|PN4<>!@-RG{XI-Z>oM zp3S>GZ!(zZ<-k%Gr?_6e=5iA>cy#b-sv*#O!GDjg`& zKRr**GFlRLeH8L*dgt9Vnp}5}pOLT_C8jY76lwa}XE?Q=JZt_geC&AtF%c04_QcLL z8xdxd2{hC?K&U-qX=oFyLi4a_TkQB4F+g_+0CE+GS=(;R?sX(kb){)so4R^gL*!A8 z_{rz;k2=bSSDro;lIZSJYT1kS zCqdNKA@S=wI<}J7mA%(&nG04Zc$`IfY!^(24X+<~k(T1&pN+CK`XBzE*Bo&_wUb4D z(02Lp!RB!O_m5^P5hDj)Oh{@BBnj4f0wzxi&=KVpu9NfF`R=_hw^*(39i){x_Sr!e}k2o8p5t_+R_+o2gDJ;S9Qjg@t}t^!Lf#kS1rj`Cc9Ox+uLc2r>| zR=K+LI_mWDlz#+(=yP^l#Oi*UJ^a;}ARJ-ZD_>j=0B$j{QrK6lJD|?d&oPrzjs*TSgX?xI2_Fo^`$kg0kMTQlDr2PG|mx4ARFlKK* z-_KaCjZpmnu2Wh1YeNQ!ddVF5p3XuEL7N|f&xdWwt=EhX{22Q45XA;RXy*$OW!#vq zkBdcyo0emd(eW2+7Bkg7=^)mlc}<#K&hcTxL$I4!*)!T$FrjI1&afWADB>2T@ zPF5pTaHIJgSk*pRgl9Evzv4MA{Z!7n{$F$fIz#JU_qj{rNL%}Pn-WQ=Hm*04fMn$W zf->7zsBdR)&LpDAj{_*~0BRDlK6QGiIr=EK?w#;H_65P4Ktd3H z_S}WW!!j2RQEdx4-j5n7fS?$2-mMJ0N?6%y+`dZQsuGoa@z|@VK{n=@ccNc_vG5$Q z?0qQqHyWSpOH?~cWtQi%zDr_u`tX`JHvW+?-dBcr#>u-}7lhy~cwr+*Q-jWWV8vmhJZY&b_7wj!u2KXWCa3A%R4@)J5X}r6 z4{1~NdOW9n?_TQ7{nFIFJbg*c19e~X>w~`dgrx7XJBfd^sH&>}VT|*t*QGJRCpJQ< zIIuBp%9mHQvh;pnnQfMbn^4S@x4m@Mx7l_is&bkCqjko(3L{EM7G=zOfHxc2DrNe8 z=u$PipwnQAcWBeVNWyRCZ+Xo}KU1(XYNdR0b9umu?y`$4`l#ykzbIkongT96K0c9E zGSJgx!oMp^#@QmBOAKS|q2m?bk2DW)^dsT8B_-c&XK<6YLPT4~Q?AafSnBIW5^a=e zfJX6ilOhZWKGeFHv)fm_EDlCLef%g|ajg{Zqed4$O%c{cTdBu|>WL$VnPLIjfw z$sFJ&cnIxs9#?)eWC=Eg$}5G?yiR=CE@=lTw>DsJj5tsCrrusaz0~urvF2EzT#SH~ zN}MH4BXG|37#=Z!ry*L7-@H0dK8AUVx4?Ab#fbP-?=U166O+MbmZKfdeJw5j44Vrs zW+_V)XvO$x)#{sKS{g~{BPEVSyw8is8o`ORh9#2S%V`o>AcA3f6mw+!t zlHjb#MflppQM782WEbRB-P)(IE>6^STFPsuADQW-|>^`z?!JhSaa5m zLA6}QjkH;MVPfEKI@VdG*nx#ow{+I0IS5fM8$vdaPqI$o&3*1X+1oi|zNey>@p};8fuJ@HZz=#@^ zPTqv}P}06TTj+D_5W>Z+0*yZR`SIr*_Wh5hG|z=-pBxoS{lWW!N1)amew$j0x7Y^D z0G~J%^A;IW6E7XFbGl*)cf2}jRqULljdS(5H-)bOK_OlI$-VJ1e@j_N$B`7HHjR-i zb4>Yt317Z4RZC$?&xm+Gg?~I@ zSe9D3@c5&1H87<4_D7);=lT`<>TG!corVD(`n^rQchLmN4I=B+(Mk!&9deU8&5|PQ z^!FJ)*yh(5cij!?E(+7qxic>X5M{_{J(}8_Zlks+_2#92FY@5E=``YoXejsRxPE-N zPKj$HyDh2b(P+4sMc$ly$Sh)8*+8V^!83f-GMG1G^&MvMn6?ncmP>033*p2bp{g-| zl*P!@_TbAa1gPVHD~=L~6>#b0qta#6rMDf9MiP?FN1onGDanCR2&`H;*U?%gs!tAv zO7te9Y7aW|T%@Tk+w@-URyW%ef8mlCWHr~Gq5r~ws=jVl===w$+}!eA=^4jNx|b4HUdWEg!C_%vOR}l#!Q_6ojhQG8=XE0==Bsl!!Y=E2c8lwR2hMpq3Ta=gw`nt?3i&zE5VoTU zglz_L-2jsLn}#>&Bfo;AR6I*bgQSNOawd?x<0<#UJ$IGgruj$#ov;7Kl^TEEIJceK zX&duYG;RA0)H@II+UxSZ#7GGQ=e^vVWf%$^Qi6`^4|@o^Z&MiTF^;2gTVw7{wBSXvqVqa& z_(lNxJS8;AInNS@*Dr8cgI}NQx-$-Se2#hLW~}8HDlKU)yUVswaHAsKq}j<4S%=s_Wc-j;b8l2_C&8@Lxi&_h z%4YiOumrenuXuXXsL1PK%n-Y1&gpNr)Xu_7dyMjn#HG>bVAE-M}&i{&ED zY{y4m8!T*~CKKgD)y$7`%PzAF+SbfTvJyRg9Z*QY?ld~J{`T`md-V$}?(6AZXHB5X zPOB}X&2^u5r=rijX7XcmpgqA2;Y=2M#zgJ8vd2pSh785~KcJRrxa2;>zFGra9^var zzWvX0+993wM4Wt+m?11lA}NPDli;iJ&9M)bTBYfz`#}IQ;I zeQDlDtdUOYt4KO`6xeKYf$2d@RJkM+gbjwpIvHb0);HRv7bh33+r*>hAYWfc0_lOo z^DU?70b{J5R?fcodu@qgAD#w?*JHW%`>kth)BzqSU#<$@*U_xB3dz07Z=SG3eW~35 zx1jaEpnf<3?OzDSo%$K2#9|?dWeD*^?P%p<-o`8zg(;8+O;YJfEBNvJk6)J8@QHzrV=R8tie-f75NJJ|FWX~*J*~BA=jrp z?E7>uZH{it;G!@Ovt7pxZavd^m+Vd`wKUy8PaZSJtZnYG7v?I&OwU{b18iA>9^C`h z0t4?{skfr$d1NN1lXN;afBGbQxuLOh?f)d zQ4AWF^C=FSmq@OuE>YBPeCtdqTcuWPSi57E-5=}Xx3p$o^tqxXn$}LTPxjVvE!oSn zxBqtDFA%%lhuHDKD;7Z{#H)_LqmFJqP?l^j@0y(d=@B6{QIp{FnAdzuzU7)j=W|HT zl|WgCWFo%0WY%%g_zu=W5T-4LO49a=@vuWK1GGs-9 z6g;WzHX|30e4^d?uK&wn!VCp$?_*DWmcMtPpbzc`Oczf%hwu7x)cTSbNc;2~bl&?q zmpQ-8)T$PSP9l==MK{r6A*fixJFm>Oknv6owKb z0}=hZfI?SMF|o)w6s1SNBmVZr*Q`7hPWr!Xe?>Otd3Ym-CVF$xEfYeZBnxBY<;K38 zXK8>UE0T@3ij6t^zmVnc0h!qu=>8u)C7?x+kl!2P(ZyM+R@&=)w<&GO9w`@bvB**J%k#rJ*^?djKt1bJrd+`U%_mFdY zaz*~93oHYIv&U$g{d*YH@8Xf9L_sPW3LZwe2yCVml9y(d!Y!8nA3oOSR^$lmXs08G z9ncCaKM)VrbLM`cfBaZ}21qU-HVclQz?EMu^IsPJfB*QKWIaShU~!_X50+{E;bVd2 zK|!WJ&(LMuL@KBS(oZ_i9{%?()n9xr4^l4>31>am#vRzA-<0y#P5t}V9?U@DKtjWH z8JUjt=tr{em=Hd7K_10_^xqqMc$7%{dVhX6|0Oj@UI?!X%<{qi_*|eOd5zAH(IAr> zLe5AtCSaJ)@Q?Rh@)5w0WFAe`jKX;uu0wVdzd9F}BKHp;%c2{p!O3x`XdsO@50KCJ zK-}~A@8$Z}{n~?*X>i155P%fxIMT2RywMw*{XUs^&zeN=Q#9mB&=rvRd7IfI@7{`pXZQZm zBO%}XW*n(9<38TxaATFIA&*6V5MO)rKi+uJTl3R*kZR|FhBQ8CtoX|q|M;Oa&w=)6 zpPM)Nsd&yHs%~PUzc1PR^+x*K`m>^VWiB=K7Ps?W?oIhv%@@<(2yoaxVZ#EWLy)Fv zDs?mFZ@Y*7y1$fB@TZU4yxmUrB>+}Smn0D!uH(8d2K4nNM)!fyN-6b$FvfYZTY#*` zOW$dY=9Gr63R&nxO_9#i`-&Pq1n?^B`Hq@tU@(g8$!8^~O?w zs8aP))^4wcc^FgGUM&$aJ>;>6yo`@5p3(pF4aP^>&-zrM3N?TTs1=(bZX@m*DnRpS z@DXsJ0JRShp&gJNU3q8#>^*uW38q6utWTRRh2}WzuCnUY`ME#+1D54Lc`{t(;`I5b ztqzb_q$qTg&=N^aM6Y5^J>&?)X1AfS<;B-cxTq*yL90jvV+OGQu?pN21r_jNp?gir z84e+rRMcI=Cq1bTyHX!gd0=k9_ln;v1=cJNLK;*}KI7iZh2k(k_1<3{E`<(nMVbrV z36R19iu1R74Eir4IJ{DryX&1?>y_G)6+0HBg2tr&U$2de4tOBn;F7RnLM6r`A7mh4 z{JbOH8so#QS|*Cm}v$ zH!<(M$@D}K6@Ke^lL&=?ImBCxz(&myUW%!rRV@0K(S2Kd`&jrfdL3FxykF`aVU(~K zwzoI$bQD+R$9^hHahi`@h+O!QGe=T(poB0y4$A+mcH5>_>GoTg=D&X5PZX+Bz^P-5|TpwKuXji%}C()C6z zccE|`{P~s_FUcPaHmzh#>-k*u+DzVh>Uh0+?41=oHhjr}gxa{Uk z<6CS1c}(!-F8M-AT&t2(uuZC=xoauM>dB8Z#AnZm%V)>mg zDziB|(wfTvwX8v>l6i}i)9g|f+0~MTjUUSCN+H1f_YIK6AK)0H@th6W3lh2n5()H_ z(#8DmBnU!&5_-m?&HD4{43k?3k|Am9&VzXO0^>fpLExDH;}!vU3m+FTJa1RvnFGQ$ zB^W)xD=Uci0!X8zqc}|IaEKXk9U07_g5DH{Ji=<9p1e{Utdx!BxP8zP$tE#aWJ-@m z%5f=+Sv^CA0Tprk-E$$zLv&2*XQyP$sK034|1Q5jnRu(j})+v!#A$E?j^{?a6JT03XyoWm-u*?qP`%W`S<6&<(mau-|k%Tq#C2z|H`ueSwAegO&DI5oecsZm zGAfd=adQt;b{oXG(17;e9fKYr+A^hbyY9~^DkD9njc=)uCwgrn-lGk9GXrOwEVUe- zKMgf?8z?iR{t1H|XCs;kSI`MD}z3Rgy2Q(gK4?K@~LeMuC zt6INbH0sZ5*SpT7yb!XjeSn|T|yWfw=?k?EsH6OC-t`()rRlwRoi z*m_c8IrRa!=#a_}n00CYncfxlwis?I@Vtn$s$4**U1^H6PPd-Cl+#MD1SYsohTSxZ z2*nKRMb@RVVMloH$O#&c7Pc+EAM$G-vXkRt{Cd&-uPgl5`aSLtQFcU%uPSG#NL4y+ zPs1tfLb7U-If7ChXMfVILCx>k2P6FfxF|OkQsT-QqB+eO9V^^UPc~|Cm`YY^Y$+V) zuRBb==KKI27m_BgB*i~K{XQX#$m|5iwubNjGH zSzW~l<-Vo}o2A~crZD;dmG7EB1H0eZtZm&XwlQKiCIx4tRSOs~jOd;jRi7Ts2`T^? zkJ8%7OoYyT=zFJzks1KPlDn;({*GI)P$)%Zt7kFpD%ba?gTF0v?Yrttoh2MO?XG$N=kXXqE2=;@>ZGp=9iv)HC6FV%Sm% zp8IUu0-9w1X+tPCP|k4BmovToo!jCG*onK$+0RIS)#U!)c5E z#JROVf%_?`Mjp?9v1>V}V#A;B2w37Xdr%RMB5;8s`vs8hNhFu0o(Hf9X zAauq?oNIA!sh{q%9u{6f`43NlkAS^TveLdngo=4H-W^Xyd`YKdU_FdZTM~M&Ohphy zJSoRApADx%;3|;CFiNo_0Y^I$D?Geu`j{f8Q{YC^F3+#(m;ZZ!6 z33C5u2rdwOYS_i4ckgLh&rZY3CY?Z_;)g)7gf$zo^SED>{XXZ(0_) z$VAc47&J-SOvB52P4DRL$FtoZCGq)vS&vY_kJ_#JlFSYA=?aRJ|4%!B;s)mIgu?kA zeC{XNKR@?wM+;|#M76Kw<+?79`|F@$-=`Lh~bX~Ic^$I{74X~mq z`xg#(fBgUfAXJe`X&P3tmfC6g;ez( zq?Jhi!t&dLobh-74|uP!1FY1)zxtO~b>Xne{wOB#fHSC;cVI<9pcuc)^Zy&g80K;T zd`5C3ghSKG(PnSKkq})`Jbz6*{-JrifavKPmtwSI&6P-Kt+2gDtKPT^naC%iaB=I$pTe>Gl zM{qgej%LXNXtR6P<~H$?_yf2Tk9TK8f7z!`3ZP9YMpjI}{O(sxpxlJLeHP20id4t0 zoA5lcnlVSwLOI%%GU&ieDB+L6(q3%ZpId{*42%wRNT)D`7znZpuFkw7q#a)E)3kbB zv0hKA0HIYeg9YvASp+iULZ4kCa`)(UQd4_&q%g$^3siTvy&($RJ&kO!Uw5CPaB3HbT5nlo|Iw?UWZ% znJ^`h*9WBn>Z{B1npMuFnc9`=JIe!95KxCYZZAqfn5Ag3$T|+BlPr&GfiU?aS2iB6 z?eZHCk<_b;)E|H@ZI!#Mq6C95Ln-YBOby^z(I_?xgZTx~{_o0S?4kLe8sMmA*UGJa zj0^9#yPfFMDfXr*HrzekXl6nZR1Q?Rls}I?nQo68v&GskHSS|nD}C`1aK_?qLqlg^ z)WJK@<-7AP+e~_(D7x9-D;%sg)7leE%S0WkU5{J(SGXY<3J2OrcyGlGNOqKRpAH)5 zgh7`_>6BWY-b+yJu|4PG?LLJnXNTSXeOt$!<=dxw4T96)cOnx@b!%Inh2|i&)M~Zp zY$(>8kyABD9;zeJ9?_j5A8jxMDL1tZt-1SiGtT-w4q8Pfk&!wGJ4C|+>BObOLU363 z7c+7Ky{Z(YBN*8?Gdv!xq|BiWSy$O`ANb&rVjzqWIY4n4JvUll7^;-{s1q@!+m~-T zxHcE(77jjsWK-(FYG1l?^H%Ykz2FxIrmZ8%s^ZZ@r`=#OZoOF5F~j4L&b*ArHJ<2| zDIfcbkGCR2-@XkDWi-@*mX%9$M)$_o)?h6CG%#$xgFJ$8cJ+y4w;<%7%yhE&${}jn zbW(xztl?lm+9i6G7XG&Lf9N89JL*9-@wUV%XQ@i$Smj!-!!R9D=+u6m1IK^Tn-jDc zw}ECKq*cO4MFtc@*OYNBR{^8uFbLk)^UL(qP$-BT=?m_3=k(*NWHQM(x zOZ|CC?N~1RTHRQck()7R-s_a_HfxwyK5erMC)njU#JE6VG6)>Zi&may0<_k%cJkz2 zgsxlMD6-YA2Q!dfW1r(mVBU;@joz7QiR{jCgV@zs&i#&<&d`sgoazH)#8WM>Q;HZ* zYsX3+P#lq;W6~MfM0~7radaDMP}>=ffn6EqaB4YRK;s%&S_mTK+fK_Ne6npU=(v@- zHWe(m!~LDtMebW0nH6e|fWf|P9N|Uwv28Ni+_~mx&YU&KQS2_Qc}ul&`CPcRdI+TE z&R+wF?F+9O1CcdW#X?<65-# z$dmE|-bFM{#VvZZPaoEFP7fkZ8>?M5Pfixs)O6ikm=HoG+)j0V1h;3ur->VnuEi6l z5d3k0`>~-M8?YT4+&wm6KQ`bvY&W;udC&K!;{4{_fhO#tD$QGW5h8tWp}UwjMPABf zS)_fZLRiG4rS=2of9dk4X3-4s#ja8HMuiLoSC|K|`tJGmy{t2-M8^dpI=QWkw2(F1znTLhEDYXyTne3jI8ATzO;|nCj=)cvXSXSbgu@ePbDQ)&l@XJteLx3Ein6q_&E@>|D60b2 z6cvHx&LrRGg;FEPe7t3C^0P54^(OW{O)BKHhojB7)4QezzD2w!>WbuD9FVJQR;qUf zQurr8e4j|fWdk-mHg(0Sogc=Dw8feQ!K8JtTVIpX0Yxfz7*7^m+`leW{2bJ_>Y5KC1{HFQ?Jxgyo_w`Y0IdwghnI2Wcp>e$jE56LP5IddF zn(a6SKgAp}NXaig5;AYWgqo%TUJtol=d3Gf`YSzYp+m{MMItE_q}(q)jIkU~qTQ1f z%zCkK$9KhUSnb9LnU#pA>&k&x2E!tI;fJK@$MP)3aNrZy5V5kav7&}QB|Tw? z!f4LfLoUTXktE4(|3ykya_O2Z=g7338eZ(6dkoZ6XrX@6s0#OS^`>dOVnlFXwb1$D z80`0ElB#DtMrDH+s7El`dYk zGD?0JcyKgIJ@mzeiFIStv4Nn({7dsy(ep)VrHUVW`8GY#afTJQ$h*0%(rwF3J$U78 zRIGx0f-9r(tW`2pTABKd+e@KzBrAA~TQty-ixDvJM+D$uPYllW8e7Ze_22j6U;eOA zBC=}sE^?NeK!|b?-9(pF{hSe;JfS(D4wgA1?PURkZlBuKY!51eNnZ)2U@VE49uUVB z(S6Ld4 zhwiP!Fm){48AIIgTexFmzRGLVlX@xQ`*gS%wsh3SKSn&10|8-LtkK+7Qn0{_cAVYHZ{M7jM(=zJIwp@4baQ=^ zln`wqh}Y^fSTLC~*a!aU+9lHY3UCyT2Um!*R@0ABz2bNF&R*ct4HDex*DreYXF7(` z41$^Zm7WdVUxSE$i~Ef(`1OP)wGNtK+q6+g-v{;*46Z-D*^#DvgZ;|$FIGs}tmg2g zi$hmEaf`%mbfndM=_xYKsq76j1j3S4Lyjvck3aVm!6>cwRijQVQS8kH=qd%c6>U(O zX>}M)_Z=M{h4K|@`G-BTFK!9pntcz_R2H_(R5dMMmaah%T+#aM6izIA14tRBEUi=1 z(jFqr&mz9~Uf4C>b?u~Xw5h68mRzxPiAa`1EOs+z`s@@$C8-$qJZ)g-OFypgkXzZ^ z>XwhT{$iTp;Y|bBYnoq&A#?Wq#P5Mr~!dq%SCNN|o;Dydp*p(7{>MM9u zvo^fxlGprpiFG&4^y*&EQuWTD@v7lO6)}l}`A9VSG8vEcx9!dcrX|rBMOjN=4n=J9 zi4>&Y-I}lq!n1~$>ezKs4|`<2!JMsW^OxZ6-(q(c zN<@}FdLrjak-Ciry1j_8GvvO!$9i$TN7``SY-_%=3Zj97f`gBE&I<-mB60DMwvxEf z5vh(YMINdp=h&b7_~5$<$bX`tr-)eFzJ~7}%pV!)zI(+euE7-d(nv~djS8i-sX?yYD{bKlG434aw z7=KTHdLaLvxrYClmnE^Lg~!lklLi&zEfuYv&j}bkwOOla(m6v6!{f31r_LU2$mkDk zroy8PoRp40rrg?Tn6oxQ-CF4(mvxfXp7dQ3OyRBMLXkPxPG@z5a?U`a7|xjB$@+yc zn3QltXM&;eV#LXOq^~IoD%4vGd`@2yJetcTcskOArO6M$dm-Wapj0gg^Q)49k+EpN zKd$2XLfkXHC%k}CwK8G%sxVyt7Mo7=mveRy$d|*t6&e~DA z|4%4@C#2l`;7EXtTY%)v;=)+uzGW+P<8Yo41H{KEGXHiNlw4IG?1WeP@jN*YAaV5F+BxF=*4u(P))_>R}H<8

YHUMK1Xk9V zJmdr~SN(a)g~8rpJWcpBF#0pI`aidxA2+Bo3+GeZD=27_%0JWL`#%poRJTqSy3@Vj zV!}Cij|||j-0-g6{l=dyEJMnQOwxgRlH-+qPks1h3x{aFM`&QWG1Qc}x*ev?b#5_0 z4Xj<`YZqzY(nxu+&b7lC5C)6O_5qlL{8k#i|A)1=fXXWE-iOCRQ4tgc=>`D-De3N3 zK#*3DmhKioN~Jp$=}svD6_jp}kdS<6q#M6|{Jk^pIQ2T~|IK2}0^vO8KKHqIUHjU5 zJ2z29MeC_YFb`}&pi?f>?jrJZ9Bq4%ojoUOn*`<@nyu~knnXAsfM{=+l0X)VXA2t1 z#TCx3Epl_~$+5R^3U+NP>{eduemKj4b<<&4bA?O? zX+3#O*2{S`APV2HN578UHDkO2GI)?;-8`kODw23JdK)0C{gEDmXFYMrd#);jIFMK z+)>cw^3|`=9&BpEfWURPgVl!RrCyEf+cV7(Erj2|cbOsXNdR22w}b|awJoj7O4=ct zW_Ev{WtIctyv({FzPk>L4|E;9RT?Pbwy9?K5Q%nmcGT$0UYqna6DpY!Wsj7s<>fxg z9+%G*G~viSi%dC;c2{p&hxrIw!MiEK=_IFhe)AQTL9Wu8>xBLeXEH#{K&vwIE%0L; zzMBD53F5pfWeaFKjz6J(n|g;MziOEqam_|7U-^7+-k1$}EJ)8X&wSYRHcn-~r`fkM z|E07>->s+{+vYd1()!;ZOec?Aqs;MQnDbZF{}52~fEzIwAC12Pfiq-A69fOXQP+Fr zlYLYzcD&BtlHB*2Tr?cM1$i92a>2}XN0TY%^7@Cg~5nRzQ`&2i z?x_Kp__lK3u`L2s%k0azt($_y3nh!R2$fRZR~Wik2xG?$NU_OyEdb`|eO%BA)W#&_ zcO6J?8PEZof2KS^CiiXD5*Vu+ht(br#9t`o=a1jjq8{GYo_8$SORHhx=6HA0ZR}_* zseUlM|nmcG~5Kd%byw6RBi3 z4Pm8kF({_^&81)A_cA-l?UmX29b`pJ`AH37gFk4X~-ZGW*U9s{$XNztN5PIs-Gn)W|n@+5P922X1I$iQ-obpNK^Ow_;(>Oil zt%P4K->128jT_C(AEwn zIa901^+;GFfznd;ik`ih{Ip!xb`}8r6Ux>YE?4J~Obsihyj@4Z{u6HIODnlG^zvU> zdKqK^2pxZ@x2&8Qk&=?4+);Kq0V^lQf=_2(9~D2yyz2ieOjPgn=xBlOuu(;x9|Er!GDveB&)Q>Zbyys@f1DX4EAZ`=ijzPeNdApJAV$|2 zbH#>`4q9+ki=3K#KS$7pl8w75m*_lCi_O?)Wx`no`4(zT_y}e$$FDCq?_8aRlv5P+ z&SZ=wc~W@lqF?{^&Bj;V-oGxD^b2IN=HA`=k+t!gykhy?2ghVCo;O#P9jKF5kv>-p z=hVBJO)IZ3YTnHQ#pwhX>@X_+c$&yyV7aQ|-W*PuFKL`K%5|W$Kd1%t5fZbT zg!krYeO@$mtW&FGS1t=)f=Dh3eBao~QL9t-ozmt}+RmApc71n%;}TVnZFx%DcLgXp zmGJPFW@Sfc86?nceLh)7vP8jH*yya#JrXLTROQ@g$JGzGagWlAb6#gY#@{hW;xE-RKJc5@XRy^sCkQ^%wtnOyI^q7W9HXhQ&O~8y(lxCv&+i7Z!?2Do++L z5@p9Rl4ZS=$G~A*4BDzh)$Ez*r3#pk%i0!vCa| zZuE{$d13MgLvR?IKWa5N`Hmkj32QuXsDR-_GjM+h(q$)*)Y&84WO~nbtQ%|%xsaGH zPf#cREv+tj2ePDDyuZ)K{WmiQ-|33O@43_FF+Fy?kf2`?)bnobw|#-R!D7hbL@Br* zZmMFJ!~-|ah+S@^Bmf5Ejn0iy-Qb+VFsP(CH7Jz}Or-tRwQ|o9+st90OWsB3(7OOV z6FS~yBUOLnXw_q$pA;TWiTDsas$N;(P=q4mh@h_-Q)SK@wA*GnwPCwJJDkIT9W<{D zCMrEU4HlgqU%YnQhd?+HckwOk0a7@im~)pI!9fa?j6@)^b+mY8E`1g2S33|)1)EXq z9TWGr;=u^w@w^@i6~e$9N4U`M+F(dB{p^+H3KTJdZ)>_Nl@N%i5L_vnvdva%MnY&0n*-$w8oFl^>y_jv3z@n!j}CPWLAWTO#|Ji;35nx24} zf7lzm_z;1+!K!*t;y>o8NxQ)3pxz^RyZ+Zy2f;Upk(-nq`l1IRvshgMq%kp_pTOk3 z777?IT}ikPx>1Z?XWn2R{G=AhySH6hQkRp-)&?L)*x(QJ@&^(xlo~jkH;jP)8x+o@ zqis73Xe1UAFN73NN&lcl1j&KvA)7KdqxRQq64FG(Te7mRJy?@59xgAO+k^~}^iv#$ zZrf7;9Kl5RR3R@kYErI;12>!|{Aq->QE;xK0H11s4v$=bI`SLhdOt1N58}B}7)nXMeMW-_IFkIo$oE$1z9Ozcz_}1c>sBZmvC; zW?Dm9YbTyMdpQ^aYAFaVQ=#%h5$G4n`Lh_dz#3Bo5E~h*$lOv?2KG&C4CZ)C!Z`C( z2ttzkgaAH>$n|W8#J?2en^P21rGaUYc6l=O7*HIT;BX(>Z~QLv4)T3T4c1KF!Qb&a zmcnmp8+LFNAx01tXMPJk=u_2+fRsk8bi&ppplJkypY%Pw;SK~!L(GaKPtSG;9HhW? zNrjX<3xq1$yj3>fSU38TxL<=-%i)00JTQG>16DGPZVqySvKj079*5aP)Q}LtItJTt zQE=+gkB99z0#&`0LjA~K`%Sl!GQwdqxTkKny9o-r5jY6?s}mn!ZZrC}32a>inTSs# zutq6?t!eJ^BT3xoUJ=y%ELW%>D+W%iVzMYY!bq8AXRQ)8OyqTHWv%eCv_}XA>T(+^ z9^b0a3+AsvgA)b-B{vd3@sw`R%= zHIUla9`n#CnNL$G>|H`kD0n!P4(R7?=a1!XWTIwKU&rf4Y))g~Q&NaOyYceYVJ}1R ziG<}gk;P%lIt&)bp~8eBX+KsY@n1YQkd4YGJp94@c-A8-b6~xr=Wn#g0cep{?}}lB zK5qRReOwEnj}Oz{ePOdc(}pxuRr0ri!x#!m8Xt>6r{+!OaK-&Pv`pp9(7B{RPf$QM z(m;_pP%dFHf==)$@(JACS$F8WQl|lL|4vY)uxP&WgUou0BIfW+aVsnNZ*uy3wJb=E ztSm)s6hdxfT$QF91VGk3avU*-_dMnK{ueiVF5BaQ{R>uz9^7RbsyGZz0~JpTHa-p8 z=EM(T`27HVoGw|r^}BcYyM+WlLbNmIT%8X_7(ygLWD@X0GM9x~NhWBVO(@_#e3FGd zI#VM9;l;A|I*r)%H-Yt-g0LnEQttbkeL${8Sl~NAJi|*`Z&vy-;}F9D5?1`A0#4NL z?)%?O31&xDFw1MyNs7m;>y6ZHAmvk)giZx=A~ABYY|Or3b{N2)xw-!m;L7%dFl0J> znp~W$oqTS0W=qb3^+M(O%8@g+>gfCz{RBMkqT5C?s)<52p90}l6LMKcC+);xB%b-< z#QG5d&2k-TQxMmZbqBZ>dML81w12b8M~@J5BvWA0N0+IZpBT?=Ck?4?T7=E7oU7iq zLU#`5`i+*<6>!+qON_`MT+MXhReqtQa1}Cx=LtDGy;Ir~`Ai?bI)QfHa)15;04Nt~ zNU>CpcM;DH*O(^7^Sg<|D0$LT>nN&DJXH%4%pchPg^Vx06&4)rr$CFyrg4f|X+=eI z+9XZ7Pb5!Q|N7|vavUAu3KI43fy;?K&^v!xov+w@q*AfMTEFY;87Qb@7H}SX%2+80 z^SF6vftBDA1rQ6o|1c<q62!h5q#joy?I=y9Fl~}A@h^Te4Uw{`11$Tjm%1!tma>w zuzo!EfhS8?3=7GhoU!@X6~A`vZ_XYkoIO^~ewe2Feex~Lb4vwK9+b|NOlS#z`TE@( zUaDze`Y2-suR|`!Ox{uZhui$1`u_Wj-@hwD>gQCXY)IgWFT8N0juZ9wfBNc)yKpt3 z0%H(Z+uyN1f6&E$DNo-e3rh-dZF;BF;kgCTz^O3!B`EK&_u#*h_}h2&h)KViBKRo82ek9FB1e)&SE^=>baHd)*?=k{Y^yh9bcpenvGfyd9KZskd z!Y5(tB|1s}^tL^Q`<+h{CV;yIW5CtL#}YLDS_A*Zg0K(=`qcySt7ve!;EOPae|o(? zJhx{(QYKPv(-B7TNH84M@T>^^KIhLpF)ZZ4OW5%1^)o8SmYKjJlzPUm{^W+iD?&7E z4Js;KeI*oRv`Sfd{l-+$xM@89_qz`f6SS#!Z2lUBpMd*~$uetN%kb>NsT zc91E+;jtozb;whPHvHiZfBz#X5pq9Iaa`oytjIC-q3i$Af%{>be|!$on+PuXk(U{c zhvYAC;L&e1@&2C0`_KDN23Pw$dWi=g+Gqk-t1-0y=w1AHw;#`fA2D3f#ftmvB>0$` zum_K8f8qT*6Ze~7{YPL0g&{{IJ3EIOhwun-`Nex4-oW|kJugBu=qG0z4rJF-;Ozyo z5&r!i|F~{J(q-@{KOSCQe*``$J#4?8e%jUFGJ=0x>7Rro1cAStl=6`B+!Ul3vvOee zzc|SMxLi;Zk?p6(Q)IAkV&vu3U0*x@&u{5>zfDnq`|S*fiG4Gqj;0n(Yyo&zQd!>d*7RChd38Ii}%FBjt^3_mWJ`IJEvNpB1 zh@fVg4C0I^sNVmzPJ21iqW19h#`4H_F6r*wk`z3?9g9;)+-xBs9d#tAIJeSJ0Et4w(=-mTIw$4;Sly9Se zab@-Z$fzm6rBp-)0|N~z<b&L4Ab9vgd3J1jfODKeX(uPM*M&LCTB^ zFP~-^umlFbQf7}!%q<8OkuaLNF$M~wEpWHMqWrIVgFnkqkq|uf$<8q+6wzE?c9f?5 zp#B=XY>6)cbG4!-p6wet5s7dZufWSK7LIZGM|Ji4gY~_DkKzUs>YQyNri%Eh7NcqU^*o?e$pBEov=&AKBa4J0DI=WbxtDG~K^vPJ)= z6_($3kS021{S-G;4(bVq;Ad$F(h6pN0?!MBJs{3%vh>K)_vq`4dBqmLV6V%&_9&2|U|?=x)azyD*q-Y|%*niM+|NX6JG*V6DnaK@hxfWe7MNY?X*`z%q z=2LgxUS4uQ2+fTUwab2nz7naB zKhy**=t|&M25L*4jODg-$sb3TrAGz8!7Xwp4GA(gRH(6joKa z6mr%UYRtN?r|0SI1KukZbr*9OQIB~1uI0bV(`jM^MirHWeefo&IRDcslKC1OhT~y4 z^6+YvpvW0%?qk%~2KB_TJlk_U4cF^x04&AMiN9$UtESBd;1=P^Xmyor^bH}PgfJ#> z+p(DKNu(T4K&USjTfiQi2F%(%e`N$|VS{G@3!ef76AE<5mHUVW5k_|JWRw2S@1D^2 z-7B#?kr2eY=7*r*$#*!uef1TH=7E}{!IPBzIcgM>4M9;Z%M}txamE}F_qntSb;Sk? z^?Vn{YIT4JHxqbM5lCNomC`CXckc_o0zJdFf52_An|xeXKK>dW;OY-3Gz1Akkr`$lto3tH&W2Em0rI&{9l?b2dd!d9CB_fJGrNu<=M`=@{P|9Z)=E(1SD_QWY}A25oPA zffVL>1~KMXlu>oP564B|%c*w&4tPtY9$R zu~frL$1t9mly(9f)C}}Llek0v+T9s~t{27tT8q{tfC*gVX-5>$GeiM#T3`9erGo-O zij_|qFfe$wBl$OENFes7-ud`k_0mvKa22n10Mkr$Kio@x*S+%pxzlZD%1O+nLCWwMM3hoZP*6zTTkCz0Lw2TAvl>N;|~Dd@2%n= zoiV}lh{3S5^`E#A7l%Z=uL)}pjy>H%0BmTh0C^i1tclOM4~)3 zK%AkSM_%=odKX9p(;nJ? zh39IN#qul|LU!#yybH)_&_yBHxM#W(#>g!@Xx56-L0v}o3j;{l=mU^wpk{|*hC{C+ zs{+#@K`_{4a)O}Q2eHc{GhYH!aI+u=f%=`b+Rwj1!SCWr3ppSt0MmgP0eV?ldD_+7 zAI>0F7%4skw70Q6fk*B```a*b$Y~*bJ4s^qo%=D+Y6acOL_<+A6!8*lV|E~KZh{R+ z(Su|-NwW3R-T(BGeu#ucE8vQ2NiP7s+hWpXo zJddD3l{5~M_QOg{d^SnQZADBd?j?dTc0rO{-(7I%Ge+C~5|V;Hv)_L9V7t2bMV?^- zlp{`xb0R@3;Bp9fsXp;zcqaStX==S1O)bmV@%UZc*^A#kl&Tb`*F-)uv$C( zAzS^oyDzwfB$$XDmIL5VQm`bw1yRw=dQ;E_Xl4*(lO9NnAy6XS49_XM4~mu!e)!(u za1??7n?%N>5m0o4kT*l>nr9Axq}PIwhz%W~o7?W!I?OifuL4IquaLp6dF2ylD}bpW z8YPVR`Uy|sJvTEA2paBnSj~2lL5)QX(lF1qmEH7HIMQqjw8tWqk}LE`Qia216lpUC zQ{P|)RbQ4=nfb^;B<>h^1gnF<=sQo$JD`~kty9)OiN(2#P!*R7 zOfBoB(tfnj_CsPQkt7=UDa-EZjR3?2N*!JR5SO4+3cpbDipHPnk@NCrP%pv4*d8>4 z#4>eG#(ge=_egIueWXPs*i0_>gL1ArQJ75ULILwZx+G`VD)j=1*{7C?Ori)}TfgjhLln z1QR+VAZE};Hb4JZ-7O7>!Q{Ru1)UCL2w#OD;P7}ncOV1|`y;yGOCaTgJ!xd>T5BU! z##n2qQQC->Xaru^8{bxUu**{x9{X{~_`c;r)4Yn07}k}~6NwVmky=U|43#4wrW<$w z2VvQIeQQJV4GDgIHI#Qw0Y&q56noO1{M-TJH9)x>6@yJwGAqVUY2#o^MA@1*JKY11 zK*dw^oGtV;8dC1vXqPAuGz4L!f*ffPSk-N1U>KgThv>1`h)QY%QsY!m63PDVHo-4_ z_PNWPKn@wPjbRM0QxSUCykT5>w_D5$Nc()GjC5@wTm*%S^_rA~pstN2J!x}`vdw1*!dF*pG zpa8e}IU{aj_+_An9@aiC_cr$}7CdM+*F&dQqcn){OS7^8oW zC%y5iqmY8_2f%esGk*K%7<6hqvuz0uwODrKJWhFdxepOEdA_C11z;LWzG zV%VAwmv<3c3)Hc<8-c0`1bf1=T|F7dgOpP*U$sSjdFPdUMRglEX!twBFi192#YCaI zGv7_Ywg$X8bKtwYgbbpqK*`xfptsD9Dmnbx#!NP@2DMl7nV}lCYyBs;iw3r9btaw$ z*{&;+B|s&ZWTV7=xbA~dnw+At0tVttk36CCcdr*xS+GiBt&eEV~WF@+7Pon1%AUbGCrP=mP!nHc!ueW_JIu>7_+ zQmOkP0D7Ha7xz{&vgTjmuGUaLk?`_kT7N6T+xMG4$gVK2Y&{Ue)q1d1cSu3u*)CZ_ zB5?543kVoJ76XWF*96QnO^)7rd7!Y4FA6`%`mO4@_zZ-qftRa=WGM5imR2utz#(ej8r*NYWEx$EN0v}~82*?h5u5&R}mRg+P`2B>VIDw>}4%%oH z0Lf>j6MV70?GIt_V6}@w%#Hhx=QyF`C5&qRvVyy7W&sLUF;|^^Jr}@Wr2p-9JoLmH zdPmG@`SyBkUIYo!DiWW%L<4Cl2*&ue4i)Q(1n9UC3U94qyPF7t8u};mX~&eRYe%35 z04Wd@ICM(2g3|TjsgTtJLb+s!l_5&*XseKPX(LlkrWMJO$Xn0 zJTy42x9t@i2bPn2ZKH(?(z$_{&pFycRm(2ox=zh7A5G-(gyk0rM7fTcSEQC~=9n!u zWx$$7arURSpD43@zNxLQuas>zzXg~*!qz)v+X;Tx) zw;hSv8mNemU;bRyQ36oFk|I!Kw+VrZ^B?i6Y*-9bp*aK)txYvIKn>c(7AFm^NI)Mp z9{EGwv0b3EKZx*x(Blapjb+5-2{6R;V5 z(U#1%`joGu0~}kuA!vVc9e=G@gY7goIHdD|cj%u6Lfje}8oJo255SsYo+elEc^9B7 zP66_cz`-`I@PSDC!R=vi4`ZgMN6-vuH1(F0AoNp%X0&soRSp(i`V&j`z}(B!tSAB) zwSnyv8aEK7#pb|&<5I~~q}tv3Z1J7`Qib%2g?`w&GX+4tEb{o~4$=_hasX8EP~bbp ztU#=j|K@P(^D=W4Hn7=YcQOPG#b?_2v43s7@S|(+M_U%`h;(hv8(BAx|&t4h@lKqJ2o%9~p`S z4P9M!Y&|7>@Uo8zdJ!1~LJM&%_q{oq?N-Y~k-89w>zLiR9hR>n_Gcf7InFV?xn=8b zGr~5olP+*5#aOk-qNK0v6^banhTh%p27J#~rAPTG{7VdsO05uwKD^{nn%4fqPy?C9 z5MLOBogjcf>v-T&9MXY8iA11u*dn>qTYw!ED3w7AAz=E-k=lYB&NxCbNh%nXWSK%> zwB14qoqdG*#@jf?*ieH4iLPr>csCzL?`GK`<#yOZW)Nfm{1Uf?q*kJ1e%)GLERR3# z;$QBupfF+p8jVpe!2sYR2Ed8G0l@SoAViMzyvMkeM)fd5#tzu6;sE~7jM7+2M1B4A z<%Q2LP@Fcox`jU6kt3Ksic0!+kZ#lnQyz;w%j{~SuB$0R_JkatdeeN!qB)#)lp1Lv zRCVB_{tT4A@%tB$SXi%0bngmI9Zd(^bms287fJ-BXVZPOmx|_R>K_R}WJH1R^3_I1 zT#Ud_CVMJl_&Arr0QzC&t=`w54r6xRz0catN3*av3?=>8Vejw4*Gq^_oM_`xfL4;X z|4%1M$qd|bG5&HpiqZpmo{HA_+S3D%5Z$T<;fu3NxX22;0_v7tFI^;3yPzO&s9amA z0pM9G^mt7p&t%jmE}y%!IHXV)X_9=0g1r;zG#0JYW0Dgg4|s)fq-_5=B-&A)?46In zpUAmem|S6AAec_vNi|XWeinRdC?BJk(L5B1QtPM7+ndZyoKO6+=n54U2D`feVnwG; z+e|f*As`2&km7m}gMuEj>7D|Nv;8!OQq_W9)Za%TfZb4=JI=28sFETxZb2hU!D5$8e)>gMKnmlZ590uAc=iil@ z{P?1Dkw)bYJ4jvu?81q_k`iG}uYTg${_jtMks=V|lascfY)Om3ei%ev?-%=X_VBM& zG3g$HV}B!L76x_>7JL#qOBXNoPi-x7dm*?Vn$Sz6{-p5&Ts`=*o$v20-Hyjr`|;MS z*S*4Q%76P{Soh%46X(O*zAvX1K6Fnea3A^MUwsKK(g?m} z-3lV>KxRt>BKs|Y7Md>fFK6Wl9(RXJ=T5UN!{{f$;~_$@%@1zr$Nl@q;yH6`_8HM+ zy*A9XsXqbFIQfor{qnz_Ch`{J*x3a0x0dY4eu%Qe54Yvw8@|t-|2MD9Gg<_mq!sVn z7Bb@|5gWFrgXR~7q(2?iAJ57khf9!ZBUk48Cegrj9IPa4g6D{^I#OT`P*k4~3jW|Mj9sJ&mY9G}KquzaXa=D-yP>K(_q*%(j2EvI%Za zPA1!ro5!Yh5s@c4PMv(?NqaeK8ZY+0UewnJ*kc{3LgMdF#{$PX4o_B#oJXC>wqj)9(ZBoRffd-}Yf{5io<@}LnfT-Do&R3w+u;3+umAG( zD{|>QSPmQI&i83h|LUVwgAh&6F~h5eXnJWln&*kG+CTl*r#kr&qUj&CiXig&hzU`x z!v1#u>YXEhOlpn@D@Q|wp%`rPIds_MCtf%TRj%KT+|-W7VS>RXiSfZFf>5Y*v<%rX zSmNgL7`JemnOh5`acH+(TCmXH*geElnIBoGQCE8WICQVK*XOxF^CvT&l;v!8N{hr{ z{w3_e2$kF;Mf1@&v`i}b7e!qARBR@B^C z1?ea0%^wEWr~LniH4~IYPBC@Rg?;1{=bx#^d1=!Xx;^c8Nh(V<`+5iedU!u`EUSk< z)Q*UoywTKZ7ElxK|K`?DtX4SBn!nGjYP6xkN2{6fNE;(Y|KY4wujrxv-B5{18Kgq%m+e zLP7Vme>YW%MLwhUwtv9c+|TwQPoo%H8t)(0Q8BpfteWgPPN!EseI;=|{P^y=xQPR^ z0y0V)#)1?EvYM?KHN{dDi=shuna`xfD27Nys;5%l_(yW|_KLoA9DGe3`Pys6!Ee}p zL`9b1A_H9*AMAEJU69-R{x&Cd$hrH!zQO0#jmLSCE{}hO!bmRWro>J2Bek!xuDSBh zuXfQ`B=}tqRPDn&2V=L%al?7drQ=lEQq=pTXH3K0KYlFqR}^$7zMkA)nB@CBstSXU zMSbg_LgDZ$m1N}gXh!r)lzvf!j?fMHA3X}J1VjVSxDkJ!j`r}R?$b^#quHywdL7!v z!(TC+O1J1=vszXURDHVv1>yy47M~=woibzdy#3si(mL#_y?jfnU2H>(^rh$UA!Z5l z6p>h%hQaGiQ|J`Di*x0fHf8SCYrV$R*0XO%FI;TrS6|I^EzvCvbp4dCpxQvRD~Byu z|2B^gt+7pmL;v2`vf`}gg9ZA;0dm_3SD)usnQB)?DdghVf@AaFd|9B~(^^@J$c9<- zwCNVC8uq$pJsz+ z{g)OS?%;-Vwi=_$O!NY~n*2Mn*iJ>m*xj#8eFaGpm;Q%v{er$D2<`=D@ZBef0!@Al z0~xu=vY=|}=J`)ol3b~I?3W|grkf>m@tJ%E6DcHaN`;UscNd&X$e6uu;4`@U?ySZB z?O9uicB{kMZ%5h5*GD(G>?+(=1}JTl#~|}oHj{A3ORl$@Z-Yv8Ye=N4win*D9CVHH z{i-@Es>fkI+)HlwKw?-}xyQ%i^f|>COoCwvVtU2K>57w~W)E?>N1kIok&jZM8Kyr> zFb$z1cjorIxm4Bkq?W1qE16rW1W6t4 z&K{oHV^zHHz?6;gOv3A)LL6FK^=rxcWJRK)3N({)jnze zE;U=P3tYkK?V^U*oASDeu~kJ%+^~`0=TA z8Rv-O1O1OP^f>Z$UKbzL@@?UeMXMUan_GgKKyRLWpsi~%uO;~VqV9)9^~Ar@^+(7dav%Q=V?~cHS`VJ z*by7m@%s)JmXa(?e303DBcH(kDxakFgr-DZ0F$sGDXL+#dVa6Mp+EM-7C+FAJ=Pi$ ztDXBMO_q6dKF?H2$KQSa!RySk<&QKhPvnPB1QGL)(I_N-GR^{okQPYl7(F_@B1A48 zODNMwOcE|?XyVwv&4sdh&o^H0ALh)vl6j`qskiW}PAH{R>++}c{B1s)5z=b=nl}}j zeCTdFHY@H;(ahC>ThGMZ5=_haNl)V_Z%-Y}3y3yviiw`@s8FMsE4e3tYU-J3yt4Vm zIo(*KDT1{sPpv@Eok$B;Cq7lEmE+kY|CLM@IB-o-OhKhdJ@<3+_tdOr@;mq2r|CnL z_)f3QG%-LqbIJTp@gvilMO@^<8;JtjbITRFPu6dAy=mk6!Yy2Tq!OZ_lqw75m=C%` zyvP!GqF^+6ll})vV43W>FTWugV{QQA1dXHn=~JiF?!-5s5wx!BZl;?)K;;RfNKXfF zFLA%tZ;KUUNm1|>OOkO+4BB#Afw`tyxHkEB;E419gwxIPeNnDj_Np6%CO0QaZncMUw`_nUdi*IRGAFMNwL zX(=zZ)1EPUtkrF}_g#9mLS7!;{^6criv1oQ5uY;a&eP9(k^xA!L zw^mIqn~Z&@fo-AQpe*M1g?Iml5+h|qPyk%<5EK&j(16r$D9pCzo_s9)WUXb$qF<&C zEnj9t)wD7JGh4-jY{jEM5!|gD#S-Ff4?p|B`73zBs5MO0re+2HsJ%_?2z(~hu#0-s z3zrMG0&&23a<*N<60a|Q>emw09yb1p`fl=7$~3BTX&P;$VoWJ_DMHlF5rU>2QqvUW z)+8mv_Qr!JE9jIIN~ASpr!2t%jJrcD;BZu<;qyHHOVI`IE~;||cRw!*(@Zrvor~fo zBzSB#>0{AI&vd7F>)r8`j+zrbrp$KBIZ_usllDK_t=x1`eJF+{W|QcQu;a zw?fs?cgU91(Y+a6RyS)5AIL}+FMVdi)r`Vr()uJ9!K5ngY`gFxim#2mF?gl=TcPXL zhyE=_Bc~#bsIB9-O=tbALgoA&lxUt?XLvD<^OfDe;Jtgy9Rt72x=ih35MI`)yUGPJ zUSFOa3EeD?%IXlHVTfh7rXAKJq*h4CO%>heFTc4;n5(r;B?GhSwo3>j2=lcMC1T5# zXJ7N2*t3fY{Xo+H`8ICH6SL0_CYfzD*rOyvCFazQM?+7YZr*%&OQBk+x4@z(Qsebp zPHION1)51_&%=VCHd8y{ZFb{vIih`{H@MW@UpwHe zr@L2kKVG+w99UWrg7Sz^|9LJ?hcn?bZTMNJ2nV#~yh%Uapt|+N^-ZoN`gOlnR?E6- z^H}Gg&zoN)1nwH19o-!@-ix%$ztC|w9i~tluHT~CSUi826XvX7!x-%aL4bo}zcA6k znUsV|%qV)LAtzini;pfz0xPoPc&~1po`He8{}`?Nr6RCOx2Ikiz-JT05UL-YOCVd) zklNNhVfP?8rsreD<=a>ZXJ}tsbULGZzFtBUCqVio_Tv$4DrYio!-}HRQc~{>huVjO zX%w15=J)~zew(KqTdk|Eer@fUo|cGUBwo9etiZn}d7Pg8aIVKNwd2u!^)%rJjV$1Y zOZxad+*ycRQr{BV_=uk6=J(>7-{qSR>mA=&p=jTAsJ#_T7(MivKcgNjwA3BT^K$(~ zz%r-h?A3Q9UoKJ=<;6lcKL|scacF-^hM)JR6EIpAUy$Z`&=T4iRTB0ncG{~DJSSNy^P(-Y+f zDmrKD6Gsny=ePolOs12rze?ts35Hfl^iEDu_}j(m#|a0@szfMN&tzfUS#o<#f@w`p zsj9hcV<20wTo7Q)`J3gbCL^H9J6u)nq#CTbdT;&Dmcem<~Q&O@KVun zk&~~@chq!`*nG$etu%aayNjL7XM2%VbS%me(~I+&WN3NW;;l=3SHC23SPfhHHl|#> zxYRnp=A4~~L(tWmo$k{^Pu(5CF`R4Q8~6AMX9 zN1-QAOvHW+x`2g;i}H1Ph}*X*mF4lQ)8A~T3!U5o_x5?kG|9X%Rq3ef=2?}8whlxD zFMEyr`otklJ~bP+x2;<5w=O~Z#W~6RavI_IdYj7^gC#OZCce~QCGJ0^ zd1*8H*kRfO)7@xQbncS6k5BYdztSDd>7|brCbYx+!MEAPxAd%I{s#`G%L)pj&}n19 z0njr}G1AxQ3Blp6{&egQryLJ`k7no;qiyO1QO7oDrn$)<%3bAAmZg@ zPWEQW&`~%Yb6&T-zNz@Z(@QvHFUVpuY5mR&mS)@(#!EH1_!+pyo-8=vHe@yRXRy|Ssq-uc|vD>a!$RwXq?>;i2uMp z#;^IN;n5}9y}S4ExHHO1gVds#O+9ly7f5O69tH$rJ>B$+Bvh9B{vvxeZ=g-m>#jJP_Kh;!#`@p@s}*ftk4h1B7f}Tt z$8F`^qHZbw60DDMLip=sbq#YizBituBABSSxtw*MkO<1gv&abeT4ETqhj(!kwQj1I zRhjG#GwLJ@i;D8F-fTBZ)>;o-{}g9u*K3rsUb?gIdVZ?Z8zto1UcJFexN-?F8%xJe zQHy3+4Fw#-U7rCu!utGFSjdZnEYFI2m=G3s3yirbzE5#k3*V|NQF2)$na5KJ0 zZrM^anC9RiR6x>hsfnyF3cB4Rz*CG z!^C-ppT2T_ws<(f@{hqZN|V>yYF@-UF`rOn3IV|1af^qf^Uu5{5i$i?T0)o`)W zsC&ehJv}D*G;m|Kefm*AfWM^N4#j@BKSiBrzNlLm-DTR_h8<>yq7(UsMy0*<3OUzmnmg%`FLOR-0y6CjzDOd?A!6Xp4&k6 z+8kzkpK$1y7wN`@scL;8S>m4+p8)7@R+UaY!+VK(&tN zDs0r6Njfm-lTACGvLn8Rr59p=uQwHMPeg9D{>f;&QkGcYy>!3%GTAcaEy-yhyOZA(yYD%bUTU7t$UsbqT@=tF$*EFi?$Gl|+rIn>*le zAA+NM+N$tkSGN)he<&VYAEjA8`Gg=uRwrTH|{Z@ba}jUwB0VIa>cYpvwRXd z;MkA57Mw@k5zF14)Ya65P2c(osyS6yyAaQ!B+8WWUc;!t8Q6!YRHV;u+~Uhzl@ z@_ZBdHSduFn&?Pk+Jg-ka~-Wz%ui+{(%T+GQ6-BnFsyFjEiZc3ck%Qf=bH~Bb`KxC z`^q15=(gqLQnTAUJmzHowezA(PW%hK+p(^BY{}EQYP7WYG4hBw@G(?+a z==C>WV$%{{eA1xdc``*mNiwh#{Wfj6n<~TOwp*df)EbnGXH=IW1S44V&qkbeOvXV^ z7MX3$CvPOvD$hP%m?>sS6QO-TLS%Q*SoZd!?jtSTk}}UT*6X;8eVGHk=NI+IrV1V& z`2}4|lH_~(IQ)G=)n?D}xi^DhMD?Vic)VxSdc}q;RfW@~gqGw-->=@l9W@`-PN#+! zXLST+l@Y6c=hH>0R8tL;-f>URliLc93gU6xuawtVkv}O$Bx)hnY!ohdHo@ULSu`Y5m zpUzg!%jiz-?|Oe>Yqf00nmBKYkd-9F#BKG!_`-VE#x%4{>Yhrt_3modX{C(t>TCaZ z_-*d&4O%GgsZ|kH>^A7w2CQzGX*7=TIGnOuv^m_jBha6Te{w&0wUQtSmPezIwNULM zz_7%q!J;8k>63lf<7b%Pmr3TwW^^{0hdY>qkIFeV$rDyJb=4PU?WFqqGJ zIPzLV;;IkjO{>Kls(0S!Je3a|z58S?$Lz_j=dnazN5H&mH~r-mUe*=Ypv>^iI<)Oo!PZS`i~eVzTs^-R_G+=nL{#3z{ zN<;=R#ll<7e-6M%J?|n}$m>L$_K?>gUB2jNCY+wlmY*m7LDDmX=p}Z;%`WN$suYO) zX8lCAl;3ud*>X!9vzd8vEza-tVA>tlOqJ5m(TBJvNUsZNS~ET!)5@b@CL1EIXL0zD zA|fHZ7NwJ8a!2H>oT%&L^Lvh6ogu z&uLX|Bls4Vq`AFR{?23&SBh2XipSJ|6~pBL6p7+fVm^Ce;i0ln=?;Fgd~*hh`7b=V z!W-LgWbAKua7U|`yY0VbGr`Bd(!xkIv{0_TMICUDgu+%h@)6s(X0UYm_~&=do5@Z+ zIgP=~-a^U;MjuQz$I_ii{5U21wKocd6|+RGoMhc}wHyP$3zBXhEL!4-D00X;d5S7R z_|*HvxVaOG`{Y!w`6hCCUb3>F8X|MEYA4g@oqTtFS=>Ik4t}i*VzKx{S&^NrCLEco zIfpmb`8su!-;DaT#V2FymPp#v{&5nANo>iNJsTV{GqSot7fkFX-W{JgK65hpnZ4?5 zZn?pu&nu6O8pNJvl`KflGwXkR7-8;qNX>vN%)*u`vGVS*au-&KQo5`$08JCxUK^XK zG7-V<)gn|zI?FCb^=A^msEm&w2mPy_R~mzGhuPLMbnf^0*@qsAb0`|w*o)$`8{5O0 zM0HLH9OKPlY(_&Y9ojD8ch++nGmY0A-ns1p@U

S65f!z<>G><_%a5F^ z3^dUb%C$$$iT6a#iiSYVdTz^%oVVq{qq8d{X`-7~V#^a)7L1={v)&VPzT+tew}a^0+5dGIcI zn~)qW*7m($mhY@{`v(XaO$E>{5asqf{ycq-B6plKPjQl)gk{J;})xNQdZbj~OINWFTNuS84u!z+&qb_~+mf!FIFn7v>ZiqgafqWvDb}qc!v(d0a z*|9rkZEsG_QRoCHVG4cSDyILBv$qVWa^2R3*HT#sNDGK`iL`Y0q`Rd>kPc~S=`Lvy zkZzD}knZl5oWLZcg-Lw(+apm~ATsK%MF09g zN7CwZwTCdiFx$LL;q+=bLZ+++mLr|ssF$Vf;_vPOH^B5sEF$oyn~cndkc=?tzI;gF zxW#Y${!A^&=ojV~Bs-2Hb8D!ocKlMG{R^Kjmxt@As4S9~ioN09o3*3E#=3ePB9Q;$ z5)i4s=#iirlLdQm6=Ld;07bYU@`Bh!!{_gK*_E%p>eJ$?2*Ny zGmTT~-5X5SSF5NdPW>|(vQCcY-KY-mEepr3Ii@8NMGBQ{$QQA^^!AEbN_wXOoE{UA zwPY}Zj?O2+v+u57^ji%KyD5$7eC`!IS*(SznTsfOU~(vDi-8Z^jd;~8vmTmOF?@%| zH{xAu)n?L)Y|$@tzX@6cTu^!7#OF@!0^YZ|PKUfAYsc8F)5~TN3dUxf zp-gZ0Ymdl$4rZL2FJJsrcHP>Qalh+T5Z=4^4e_a5HTX_8n?vGp{cCf^{q9#R?m-Dv zP3h#tK388<=1yh0t)MtOHyf^fakK*0Iu36$XmVQ6u`^W0mUd1bP%~T73f9()<#85F zFr76@lg)B_7?ET;t~XyfX$vdQt50bH>UPIMt2PevW!3sTN?3}2dVw=}0TSMV`f>f`(uJZfskcUvhBL`Wb(IBD+h0{2VB}7+DLFrM zzsnyHZnhR3u$etkcT!Gr)+-Z$&+)cqeo@l5nT6@p?v=s{IZl~juT!S^xO!)wPxoCL z`zRs7kMB3f;K}vLxbw&lcegN2rDk61vuy#r%9TpTBq2@dq*aW=>r<3 z-_2()*ksAHP`1I^Rl)M4B%g-K{m$lNufjPaqWy2tKq^vMmxkoJ>2LK6{xj8)d3DFn z@s6bZc-F=(?Xg^vS1xQl<3LY6UaD0g^r!pOB}qH%7|`MN9^fi2@YQ_nctF9g&g1Z;6I(t$HCJtu;9> z@qM7-fgO%sJ)`m6zW@~YaxtvsTdst@l*Ek7{1$=?9SzgSTXg1^W!s*(0$e_vb3RpQauo%kgMXM{i{C~c}6ahb$0JX#Sb{&H=^>EkeOz(NGz$J}*W44uaLBwS-LE`vqBbhG7xDo?LVE>)lg_+f`DU6*yKoL({ zk&Mjqu&QDv6d8?5Qfc}E0a%{p!=<7FWlNF?Uem8MmBVCzr}G(Sto|j+A<&ZqCtVB= z84taS#Ii~v1xGiL@lGVuzj}P{xN%|0rT##nfz6SxMGSfc6U)TIx_qpi9hXC^DJktr ztL)u!$}U(pdKHmUO|X9vlcbN={N3m04~k&=jNaas%?4PsxVWO>t(VYWr#h)z?C0*9 z*sbaASHBpZXf1F4`l>bIQHEYAx?96nf-fKlZxLMcMD&Nc4_&6P3={7F zKay`GJ&A`Uv+Wx(9`auxOd4pa{EDf3x&_*qS(9Z{Bc*f`u?{4Cbp?dnUL6H8_8IgV zvMHQ4EeZE?Nz>^(b5Z(m)X5>t-8p?(e4pjj8iRYFEK6zrsV@p=FNliEl_AS_mkeam z^@(HMEC4N#294uRL^k!Sbkk8WH*EM-U!y|TsPd7Sko0Sg!O2guxJwt%SgRJk^M=1_ zjo|1)U&ELk3g1zv{?s71SC;+9U<$jBOyY1#E?81yv!WYP37$TP)MAhDSY zt@>|){uztnlgJ7Tb%*DJo5d9Ip+HPux?tJ`%+i=nOpeWM_5OT74&<6_r zx?q0O+0*>TswjWql^q_o{!4C8aRiPzL*@e-Ab!bN-^Tx}G!uDL84u*0Z}~nRZ~;N} zG8I4{-iXnf28Cf!)8EzO7n9rYJQxu=XUpvdj8F6CMhd7jJ!#4cmz82?#^ZfWhfQ1OI!#xfW!CUfiR76{aJ%$Nf672+iCeB0A$B(p{l1lC^l4g=j@ zVvXfV-It%m^R6>PF$Ow-b=+zQ_`;__&uf1gKdj-W`I6>+BRy!GrrA4DFJY^B{?F-f z=*^9Yawn0(lZx!!AV;gM1d_I`pZ2Q0Ja->BTym{>`fE0=Lbr+(;>&xM*x!VnRzv*P z0;~N-x49LgHWmxGepq$TUI2d}gNeRgr7d87jXg8r*1-wWykyqY41<<Cc?}uH{!m$aNo>@r8C&odt;bJ){#;Z57%_bIm1*@x!jJnUW@jszup)YS?S!r64d&rOI@mG`yFp$*2@+`kCq@?rdv7AjlxlrjS>Gs`mqIlVy(0Z~VTk7T#+YnhbFo z`joVb@kpq%yY{4yyQ!oP#jJ0h+jn42D(6QKZq0|rJtF*Ou%ctRqyM#xxzw~L$+fs%W@~Hm5e9o5&CUYIt!v6eW$iU9KH$U1UBuqn>E+B z({tLkoI5^-O}SLA?^`I|Uuay_Kiiwy;~Ra@YjoEL?a{C84zu}Nj?AYuwT4;pG$f~2 zF;*^#MJ}f4)mgC>pM7?>EGmC#kEps|ON56%UEAuFXYBZReu??_owp%TrK+7Uw>)?f zZ9Qmob*0D^N=#}sWkdY_fH69~_wgAWA)cFp7G(P5!2|fP((Lb?l_$Utj1K|O3m>27 zG(@GSvi3(NzpJ85CRbToA7vG(Y|11}ZK>IoX6xjT@I=o<+&GGx+j#?>yR|*D1Q|ni z;)B{%tuan+wtU;EgL6kT1$h_xF6;%K`>*enH*LOCz11%#zKmtIf6E@oAh@0XW9*GU zQYV!YsroSd*^6?xKa{FGkdM>QA!b(4=n^DP>{_8<>)8wbY(*N=5nv(56Z7n?<`eaM zawEl2JL9$x?uJ=xP*(M%-r90)>#Pdsy9~A8fSo8xV-|)fo892bi=ppROfJrOo|8Vj zpN?~^gFNkpx1^k*8q0q&3cY299o}y!?n2Upt#4(pm_RgM^Nn`~tt<0gl=H!FnY$cn zh)oaciI5e`1gqrbrsF?yyF>`2#-@AT5P{SH+mPAM07ZG6+-nJ0J;OHyPdXa-I43xsk$CSRKy1&bDv|PC*cp#R29_JuF8F)B7eUU-=Mbws%OtO}h|Hd(vv0&@em=uL0yVYKqtmyAp)&D{Kyv4pm>mrZj#gt;&HXww%&7rrXGU1paRDrW-h z7DoMeC>K|u`2<MZ5Zv8I>l?S%?Fpa1@X9x>ijWQId&HoV zZ{|s72t@qcu_c4MOJf&|eVxdb4m#f}o6fl8D^H|w%+OR3VJ~?d732Eev4iK8>cq30 zeStToN%21e&5JG6ojPk|e>p}S;mrt8)Qa_j5Rp8^<8Z52lr+pE(IFq-z$qtR{uX-# zc0lE6lh9=*8-_T9Jar&s&!59l&L!?2lcc~%Z~v&`U^4bnvixe+#3Y?)NBAf(ri3a- zMEVZCA;Dynr<}%n5|OKfgX6 z6P#Ux=CF97DUm?-TkJQ3@H6xW{MRiQ_+XM-3j`rhCkT{KH6xSX$3Q|uv0}#(HB&`$ z>)wy-5xIj4NOhaJ6Yw`Yn}|D;|*(4K4rj)(TMZ_*0NYwQbrl%`9O$jbp?7~zU6X+rusP3Y>Q>k)*`skeaw z;dlOJJ)B#D^?o_^RKxv2<@+VG0?LdF!F=2I0~;OHl|aRG(@-G2=p zLP+3~jl6N~i)(1E4a~Lk*&NX54ghV6S()8baf*70&cKZ={v{a?HKO&3%H*LVxNmz6 zRKtm1d8_1l%m(EE#vsoLo6^cUyFBEtx(^<4IG?u%p>VkZsXUb+2tgbbf0!08llhnx z>9%OfY^(X$Cx+eZe$q=ekx`oM!!S9GtiX}|8t{B+aozsPxvey-xOKj70jYLclLc}m zqqJ%26`B%krqXul!DnKS8`!eur*?#WB8pBink4sT__!Mop71)H zClm8~i+!P$d*ybz^#z=KhFET2aV^CR0VV{&Tw^gQjnUJszi`o)nQi@UAc?!4S}9{W zE48ApQ}MrhzYgcyzbQ#Yr(>P7*rZN>0d3Sk22+V5jcrBn2kF7)31N*e0)}GYV<38m zt9SpP0w~Glfp(rqTMKY1qPC7)XNrfNL=tgNH*Tvy6XikZU->o^HfJX-!`aTpGZH(L zRI$6Me+MO-ap9sX&&GZw{j-0@``J0>8UCid%wc$A61S4A3@C%GskH~onILGV#F00* zf@t^}7$ji4)`#ElLAnU(;(ZalUYna%@%xbcrzW-2< z{tvUVH2ESp$u;O58G>*VFx<_iY8e#28cE}QK@t66fu=hrM1Tnh|v)=EeQitCG0l{ZQ8k-Wq7r!^`d@5O}2MxVfUV#Y6cpTX` zo?Ed}-xr~eV(kwCEF2W`#_E#T^5kT%%1KQ6e^pkwuKl@3j8jUzRB)hiehMV`L!IE- z2F^i}IuMyJ)#PH$pj{;p??5pyn%XQq^hNDelvANy8?k^B#Qln>n0mOo>fPvbUwJFp zPf>whEhy;-^C8fT^@|E{_4&mwHj00IadHm6*f?&Y+VL4p&+pP>2}t2 zm_U!4Kg{=|%(}uKQO^MR{JfUL5?kP?x%k-Q|Gmq(2Dt7mi2MLFJ#?;pR>nCh2IZj9 zvz`B)Q%f>Qm`x=n%U-ltS?QIAubSr|QIf%(g*(BCAdblMDEKI{l|e?zlqGVk2yG-8 zb0`i?)hv_tjj!kZ_Cx9MTM;Lz11lCVTQG|Mby>B=1JOE|wfg2i94Z}7rDAm)>lz-gu0Q>UH)?nR4% zi{vnKRGH@!itE5wyY0*bv%lY$!Q@zf zYTa4JCWfDDlnvEFtKIfpG+LtvMomvUPNv4%znG~%pJ66hdb`x+!FaGMvm2nijIdD_ zXIs9KIW3I$sfyTF!f5<-QgtxjC^z&2F~dGPSke!BPG^46#q1=8n!)RlC4$9#^OmB~ z_1JKsEW7$hYl2T@f2OSLgS3@d?Yk#~KqjAL*QQT9rs1i>RxF*oRCgTn*iu0GJNg8t z&(cY=dXc({#GE{hZk;UwWD3%8>#J_f!ZQa95JSQbdQ+X&Kzz1;he5_mkC=GSvXhCD zsV?8&r~#a9tK`9p_Cw}t8YI*$4ZnSxg(k0p9se6IcV~R*w%5SWTtGEJ+4Q=X?Cd2p z?9rb!0ERtxaC#8WVsDcA+(-Mr>>p*WxUdfWfbR!w9U?HP#alv?yuh=>EXV z{@^Lv=*n!R`>GFV5ovGq>-~NH#*4nSQ+;rWUiEh_wl6Kzk;p5=^p>*g628AAfQxws z{9%C_FuW?rmr`LMj7*n;ySI*pM^ElG?S09yF1;Z5{+wF$LFH?pqV@5DSqRR1+`(_& zf+V?85ZG59w?ylO%QSo%k3#9pe0f!DYVL>M;VmcbByMMsS|gUQYJF);Ue|lSbJ&W6 zY!ZFe9NdEu%uJMBZSd7#zDY|!70|erf7K)-Z=mdijkR0PV6!3=r~}O|S-AW)p9(5l zZr^KI8TR*+mHk#n@IQ&Z1x0ROD7^Trnz3JFSK_IDPf08MBg+9W{7(9iCSrce?#flT#s(Vfup#hev`~2UQtO5YJ}JE-E56w*1J4cG$a>J3Q>kUA6b|ZkA94TZ84=V z5G$C5FF)c6kqh`~E_=m%SSt{G42)NFz<4EQCsxy`U98aD?Yh0M0iw*CR-+1|31{q8 zC?^dMqIWaWn=X5@nQe49<1958QYuJ69Tp_NLyn%#-T-C7i5?^m%ZE9Y0(slWi>CJx zHz5ZLZN``+D^B~}Dqom%&EpmO>tfz^xSj@J7h2*$z8&QCVrEnBpyf(E_le#H2u1fy zq75GkWrxz&bxvx=`l6vo2F{6 z^wBtTTk_KayiB@^-czG3wJ9>l>)P=8d|yG2%c9riIW*c;Xj_U$m}sxjd|(woGrn8qZW?zF2|K;_m!w-~R`-KE zR{#a=gxaYbD5_0|b-uyYGkx#erEktH%8uX81HF>$k6W<{f6qqi0c&5Ay>gLJ|7q9V zU)Y2K)};)`-XDP2G0pFoTfBF^o1V?PS*YBUflV#Yi{dGAL_B9yz zkMnaHDJhHeDQmU%m&-E03OFxPAl*F7mdClFttL2pkdv!8A~~EX+Xev#yXI*iyf`M* zI9MB|;FHQ_L0)Sa5Vimsug@WkWs3o_C0KkEE~#Q!Q!zhj|D$^JzYSae{!>IAQNk@C z2%O2w-Ni+kC{j8Z(1~@EW&DR5rzL{!-)OUNRoJkZ*aeUrh^V>Mus9tLuZXq+!e-rW zhP6d=C8g6xd%)G_c`##FNG#~S+?c8;mCj;kn?BgIc$PpsnTnj2Oj-<5)V9FFe{=Ui1-uX=5?X z!I2H!xSk@(2Iq+*{{JD7g&J$>X*YneCJ2GcN;SF%Va~rnPb>RZQph=MYUU;i$)j61 z7@f2Yd@IPp$MXUj&5IBmk zMB3=K=kz^|WsJqSnciccO&0AAh_OK3=dhiX%sXkz(P{-Zu7&agXZ6Cincou>rawpG z#zUP}q?aNe#bRJTk6TiOG+PQ-Opr1}P05gwqG@rsElxiURN%Vqa^tat1BfZZQ>@)*R(}#_Q^(J@7ja3x%7+ST>u!V3mnq|7l z@&!I=w#gSSFmSl6aKsQR5FFgUU5KMmNS(I5a;@*kH4Yv}shrBy{V!UzbcND^(NzpO zs_)bP9ecBf*FE2P92qTNDIvp42S`&Vtq#SY0hQv2R%5hz?-&8b8q><7;UZ0^iR>u> z!RubFd+i|3a#hjLeS_{^necPImDo-9|22+4?wc%6zKWLq;_Ha;J!M?}XkBkn3=WkP z#-W*4pBS)EZtqs&y6Xde$fS3=(r?$V?YWXzLF}$P|KUNc66bYuFVW~lrc_O|#)ubVG zGvKN@RMmn&K7FYHT=Qr_~#&LFZfpy9yu> z>4Yt7bySW&38wJ(c?j_w^k%-(1-mHM=QGj350etZ@BtsquByPs9WD%IfF)f4N*E zL3$M@Wr*ZL8T1cP9UC?Gi{01TgYjI3W#$p45+JrFSAF39P6<8|Ej``&>`0osK001y zCGcmQSJ7sj4bGJKg?tJ566&YE01RQ1*gO}g7h}L?J~v6%MvIQBTD0sTlMMlGB4kz! zqzOSYc|s}>h%~nbpp1eXCb1)SP}7;cT^or#$P4pj6IA(XtZ1aqYz9FL!*+0_@Lq+? z7itwTsC@cMe#$!u<9Bx;T4gKAupWgntW5`wSMQL$7k(XZFkfV4czxXduq>NG=2-(a zC*9~BzgKFE!mHk4{(|rZMicdpHGW$;p0kPPcRiMFtWuKhMP^iJEzx?21qLSRx>9YY zb2-QXqi%luxhCCSdicL?UO(LeTd(c&y=v8~nbgVe9r!6C?f;bp02>XC2mAQs2omr~ zouv>)PSl+_=L0dbsDlNQ$=~ZnCMJ+fo4Lwhy+#L(0L#+iR{{Cq?G@gTaGB28R z2wVIHmD&=D$Z1-rcFoL{N!Q6J|CL+2pz9+5SXg(8rR?Dhq17gX(%u}m^~>!&2|vgtGQ*#SH*F22=_1mbLfx{} zzCF}!X2oAmqK(M`$+A-`g1n`aWcK);w5z@_kEufMbMIV&VB;5qkebI)WSp*pOG*!W zNPXlp=nXX`QswD9?w4r|ea>3(AFE`^?|qpp&@wA2Z@-gx%&%d2Wkf~$)@G(eS56|X z)XM9s?sH*O%-gA4MVggnrx;2JRGnteYL|3IWdR)OPybS6yb^=<$R*L_Iys6ItN?sX;4x;a~^42aZ0FTxC=XqEARv&P-Y|x)2#gI-CX^ zX)Tw1fF#AYbL+_JIWKC0=&y5B-8CLPD#ZibjA#TASs5^;;=eAFSb zM#BMb^92_xw>K+s3-eS^m{(|CC z@$V3_m#rE~1|@1;YFCXTNPoIsjjj0H()kBR&UkQGs2d(&hv;+QmX*9$Gi>!uZU0yl z<#~S^uF*qa;qG^%f}Xqdmt6~fN#M>b{TFWUX`|@)!$`ckzP!q-ZO=`y^bn!0UtRRK zKZ@OFK(|nAp(lb2EXnTCA#6G{wEXF$5`nXUDnor(+8g0|2UI~ z2mn*t6xY0N-Tf=$UZvVuk>_9eEaIa=%r(Vcf33)EBH?#MyN@wLeFBbj#yE~5Sh+ZC zc?Z5Rjs$GC(;U2#?G{-y8y4xi$md5Pms`Y~ICt7r=Z~*tBwhrLBM-19eYsr);Q@-q z=#@X71K*)@2>Hcz(nB1;;OrzwIh_G6SiC97Qft{(nC+6!Rzf0lx5q+Rc%h6#uWBfs z>nDJs!YP0>p$cX4)T*;y$r}3;zSAG8P|zSn-G>rq)`Z8WLU6j%0+D%~2+w z5rc*uOSy8b3R81%y-TWgJ}jgvhW|vWOF*{Ri5XF@sGK%ohY=WH<=Z)WI3VfV?J5moQdF+Cq6 zW#z2;6|aZr6D?`QF^$r1R2GZ%Mj-ZwmO2$v=mwIZesxGH`!Xtw&2dz$gY19^Xa}WS zU4&i*Dws0D%F@`r+qvFZKQkQiEs4DPQ~KhQ88C%Y%XhIBRT%LR zjN;w>6*aEXo7Q@#nQXPBp=Pt_iras?qP_(~rGNiPo^iDo)9X@eH)6l?%0)OV^w#)& zrhs5q%SDn{0k;^dj|ZezIK~V*)Jpg7gtpbI?9Fthap-PYYhd`AmawND146NvLX7|e zEM^|o){z7LHbeY}JNG17qy>wQ%J?nz#2H9ctMyFba<)X|EaCC8XZQJ=yNTuLbg{D0 z7d`hG_Wih9MBeke@eHbwdQ~GEFTY=8nQRmDh@w$nof3(X%XBzibh1SFl_<|iUO;_2 zPldSbD+q@Sr2D-78_81vx@oc|)gtwib*2~;rA*$Oz!e}7;)nP?v(sJOm+Gy=n!%!* z1;JpOC%5T=inum-Vy6q$P-?5$VIzo<9Tb;viK6Mw>m>VLJfA<5XS`1$ejE~t!=Ias zdCuB7W#IXouLD`dK`r+w92sW8zJoHE(sp60@1{R6J4yrI=c3=g44_a`s>5dN*&xh4 z1_@MxXO6_E=|(XDR)N5`7fD`q4(d+Vo#!(xWY5BgtDs8~4@;H1t`BGWN7!mN`&EwX zZwU!Nm}>8sVHU1=j>AFgN^~dd^hsNBvsp6t8vp`fhmkDZkvxcG05NX92r0|Bjhn|> z*Gcxx-><4|Uka=L>%_kkYOsp>9t$O2+qWsax)R zg|o#9nl~k9-R&OX0k>D|6}6LO>GqF9lBK+~Uoqdt7YspoCK;)Tiq729-D_EXTqR7& zEcOfxPwKBO);@KgJl4XWn6Q=)0JI857KTAGuN#KXM7(*^hw+a|e-I`h4^kOQlcMr{ zjfjIDjD>ssNM?4TEQSf;2|msHRGDowiaQY(Mas`CDibH``{=sUTDTw^SBy_YeSw&_ zYVQz4$tU@g>&Jog{Gz8_7Uz7BU#&oNPwF$%gjoJ;d&u~(!1d$VSWkG;R>+3?{yCu+=`Q;yE#-#?UvURjiKw=lG2t%;Cu8aC z!CQj~T_561!6vqm9M!;AQxo}MN-OF^!Y(+2jxnUDpId14qzD7$rE#s*Rc2HABTK_! z5-sdpL6r0tk0T`3#gLXIgTPk0uniY^seZ)-wmcKHiEuP}im{nnR@z zH%{o0G+3*WCvxw}H&|QbuLSuhz66#V#TK#e?B8SVE-7fqB$H?Px2($%wt6I$uW;aRg*Nx*C^BR}9VpdC z)}~J`ro27b3GC6=8y^XQH|n?XRQMi_D(ZY;s+0XgnFgZ)>? zS@d9D29eB{hN$6Vfx6v_iZS%BnRJK{$txY=Ie}_NldccjZ>OHND9j$)8pq z8eQ8*Ta?@M2&YPylw3EDZyC>^`khIzm9PFRWB6vh<>h21);!MpHBqS3?M@KX|JZO&`5wzm*K>7a9MZWS3s-&4^(N|cvK4O}j!2$`tRv(5v*^V>I zcN%yz+K-=``gs3?Ohv>5QHmA<7KBhBh~$?Efj`!HJmm@aSd#!PPmaZzuSiU@5dYMa z<-bDS!d2z)K&T7&}trE$TQYO;NAGV^7@|mbgIgHb#^3@EFTt5@lFrem1GKH-dPb)%}-Zc z6~_Y&dC)U5S`aH(UuT>JT65`=9R)`0DWjYzg4^|0(M?T7D>82qVbj9Iq3^xSPKk^v z@xa19(VaAx=Gg)ltoh7W3)H`Z&{pTG3& z4C|I6p}^f4lNfY$>QU%s4Q?=B7Mb`y_Is@+nO)Bk83x}MZ){F?-#q$rmPP+Ew)EP)?Cy;_ zZ~GT>*4gqW+h80VfDdT}@z#UOZUDr<#r2}EeSb2P4gfVUb_Q6GF_5=110mz$PEiFG z!|LDRY^67*e{R@9F**_%ZDyA;|0H8Ed_85x6oW2o&6RdRYqIZRqhsFKWhDNj?TPAc zzSMNlC%3)2{KDrs@p!0#dLrvp8jW6d+S{l9)HY{nkZdY;4Pew}ThJOh zZob@wGIsyEEH>PI93c6;|Epk=^T)#D{qW|K=>BHNr}C>`%V`G@EBeAaIzRYBt|xrY z+>}%u-Or-icj5CTwTAZdAT6$_;@IP8bz!)}zDzzvNJ^@K1NJKvE(6lIw-8(kv~qzo zmQ{?%u=H9IFrnJXu8^njk(uUwwe6u)@y5FrcaROf+LW_&_;-?BeVx>~09ZmzgG)O$ zeJpNX<5nHC??rQ-zQ`9c)d_m5TydzuP5Qn6)ef%>`dyfn-RLdNDTsrbtk)t4=KGyB zbI=$*gXwt5Q`#5(0Rg4xdoWQ;w=(b%_#FAP4cimvU$Cdnoa zI2J#Lh#TIqsNefSwwd`#0)|>gOJWJSH`G7Ei0f9I45u z_!Nk_m%}*rWP?5{{}H}{k zl;pC$RUv;vAq)N9;YCcz)D-u4nCy3^N1fln;zdDNVUi*_mq_Pg0dC&aK~OAvA*);(#T6Kvkmu{hE7h*JN8 zCQUI&Xfz@wum!%SjA_N-1ld4cD@?3CO5VGnQ!|gqcMWQnH)lXQA zwn0=NpcJX`yoh#aztG@kgSbpGz~fc3MPnjf&aR2Z2Vn66vzV9pup>kU@}%Lg{jQwq zWW8GiNW&LK5Envb)#!e2L5^qg6qc(h*^a~Ueb*E0^^au1PklpN30Mp? zRnM83_}^z>05M4TaK31Bzed6Akj`I$Khg4&;#+F$rMu%DZ{Go+1RV{+oQ|CO_Q0&}x z-^+i`SL(4KF?zGyP!9fFVjkx0&{~*r)`5OoT)i_U*icOtpR*p?;r^}cx*R6s-M@1i z2>qG?FzpAP(>I0_suX3et6swRQHsy@&FhOs@7@snm^e{)nY+V2@}6H4oZ4aeJz;bF z_#s05!$6k5hi+aNUflWpvCM)%^iH#EAxP42o;z?bR5<)d@KGzzP{U}dT6^rd1~JLb zk+`5Eo5h4x4x#jj^t%mRH{XpH?{*-!`n-m*JR{5#LEBi$@JBJ`kk{Qb9L=KU7B-({9%EbTXvlOkqD2JQPw_VZT4aRsZUO7|C1NT{xKpDSWAiw*XL zYj??r{B0K%i_ge}hEPxSDbwJBX=Z9~Mvw0YXvVc;#-`-k zkMnLu^BsSMH3v&J|7^^#E3PSqw)*W9KP@s#$cHr>B}J9hek$E|h|2i1&zrWUNte9>DU4FbIG>*S2krH z!vw1<$F(8`Yu(jzy}7IETODR!MK5nB@Ke<#v}b0bc@D5j){p8d+V4kKJz@F}$gF&Z zf_D2@bAf(B4{VLSXgBGU<^H$-_vKR}tYE7%<6kB&zF-%X38nJON9jt!u;O3x8L7s${BNgbEicT(!v9E=a;}aUZ3p=I%#@CR7}?K8Q9$SCKt`DZ`^M2=8_`m6n{e zQsgOG4VdMLNG7$#jaIiF*`wmmxXuX1Y5W!8M0Lsa#PPZ2!Afh~nq6|yVEPSB>*5IW zK|?g!t3Z73tny4eV(Y~Q@8u@cd<+tyQDhMQU~Ab&>}B$nQ!`5qmxHm6UQi-hB5TCE zd@_$-sK_s~*fU5oM#Su++IEAjt>J|1S5yk;W5FMo_GKcKVjWqvwreB70i(PyC$&H5 z7Qwq@ZQd;R@Y+3%(xvT2(gY|k6aS6!p`dFyW`N|}3|u{{Etu4;Qv=%4r>;<~n^ae6 z8K5I&B#NZ7`ss{h3abq8KM{xAFSjP`F?N>(%T?2hpVsYtjKhR5yw#~VqFFQu^tH z6%AdyhN0XK4)H z$G}F0K}^mHbQ;ZF#xPht&jDV%DxR8`X`M?#g+>qO;`0!VH=4dqfqgk+m%EK4myVn8 zl=D>@CSytxpa$$iNLJlphhn>@?GsR7g<`m;anHoLSj_^c#FVvy!tJM8l zg7apG=<$_&hJwnb`jrwFIEH;wuC3#!H*UojQ(kLw7wHOPB4Ft;+4-)v)8UM>apvR2 zqrOaUTmR+Ooy>$oo!_5Z^Goo~i7i%s37F62r;x-chdNHr%iLqq;8bvzB^eGKr|7-y zD-wQTIsJ1#LilWY?bn@trp1EhuIGA>mcGU>x_gg-&)(eERt!t;)uhD%+vAC46j8&<@ISDOZ zEm|i!ZoCpD>zu%9$O72_M3XKXPHGABL_~&UuL??S^N=R*{DcD<)wS(!=Z%DTaF>1= z+PPm6ZZY7{ITifUH~;q;M;(bI5~OAhDRjm=ZO->rBa^uBCwI^xpeK+A={_?$h92kXHGc!7?p?<`2Oz4scS)y*ZIgh5Fd z;y3g^vCwZVTYKaZ=h3hV_En*~#Dg|Zpct1+aY$8}5GijNnj&cjx@w_I~PJ*7oD zqx|DW9)(FjH_B18gR9K;S)6f2<1+1WGkra3(NWXTD3`9=i$FDU+m7lqRxhwlC2;;=>E(DggKVq?A*Y3U+zvjw+)T*(;PZ_W&%vsKokT$E$;9<}SyZfMYym2wHTRb_6#lKDJ)Rd<}xh--CNm)#bg~Cqs(+m(54- zse&%UN0@hcCmkinENgdNE593QJki)58R1%L8Nc5xcoU_Dmw=Z$>$+nN?#J?#%R>z(tr6UMaH78R{0F4n25=dEsq znfK@HEZquom_{Vr)~*?Dso$KZF}3vH?0Et$&W9jF)BSV)%|!bIuDkQt9NKP$cG%h# ze27Y|gQ3^p(D**Tji@y0_Hib?S?Ql{ZzDAC|{= zy<4sJxpkr5tfXnAUe#cie0xOQv7gU`Hj=ln!!V>>L0d8n?euz&-S)xN$zd6;T@AhY zz+B{U$43wqF@kna(tIAKAm^E5+|s6k*4{?6%E7gSzPDE}(^_m~t@A0zg3pBsckwGP zY=yaG?%m4%jL#Lt@YwbYlJ(tv+wFc@!$`xr{hiYxyT(w(|Hs&y$3xw={o_|kb&$zo3~|Ac4I7&ah%V_dr)_+74&{t6 z3o1rvNo|XW+rviEGlh5K`w`U`OV{yv&P;gJA=ZYff(?`Eg`T-V_1m5rtdUL+94@-GJ&)4coNG&WY13>3yAUnOi0MAp>-Eyk zv*C-?1jFng(d#aW@>_%NMz2x*OSSY_L3xGQ*g@!%7(-jpPLGQdMfXwo=uMTfHPRM` zWntf~UMT;Smh@^gNfNP^hwRVrL94ert4a-S5OHIr=SYhOcx%aufy%t#{E6M9aqcvy zuFXMAAkrRL?yGwX0=%4z~~oNUDCW7sq2r45Ibx7$_qIT+p(zIw~u$P zqat5WOj+1;f$9bu=7aRLLu~lFr&iVcj_-YdpKQ2nm{#$ujF%s=)`FUGMP<9`;X64y zBU|KFdhEz@4+N-}m!X52+QQ+p=C%-TUTJrvf{0fRMu44sHji#5I9ccM+hK>Tz5A?A@7G1%5-EQG6(b{B(k3!Ld$i0G z^cy{MTr+#7yFK>~Fg(wgmp^jSggTF49#5&G>sg#g<*x#~wx!b;3xq*{!&q zJk^RRhD5(i11Ip2YvlU?r>my+XlagsxTftpuaXmTrJWL_h>w4M>imlKQUiCbe;7~ zvr>X~^m)_DndFxJdA@P9MO$I?_f6j3E#Vp#eZiGQs}30M89P#_SJeIbhYx?1q&Dy5 z_sm}5Bz}l)VbgcVeeJVKChaEvjkhMYF=vjZ1Ef{Ccp^qa2KPD?*$)3C@aVF)06${z z)J*j@M*>#s(jLPJ%n8--jPJ(y=_8M8&tS-(u*8{XV7T)huk6RX z4k$S!(>ISJ(j_e~S9CiEeGs+%%rvY-m}D~NDa1uHeE1`JUs1YkJyMC3cy40^g9^yA z@gB86n1YHLuhUS&7IBHxEjP8X(){D(Q+$u>ombrXn)4PU>D3t`s*1JK<*^UsMwqoG z_jnZzLqrOc9m37o$W8_+CiV|!&3gm-pZ^YF7-W2v@qVq}?ca$^B zpYPA7L5zPSj>uS;t)wNA6|3&VtoDUkPDBu=Ns$i}ee=4`vg%X>OTo7F(+daUmC;*- zQf}f$@+YRPQZN435q7oCcyjJf;s3dFF1N$(ncbl0ZPU}A^57+5`n&XQXRJOKge+hE zDQtAP)AEwX>~n-130CZj=Ooz#``bV!%g}xgTO{CLBo8q`t%3`@nj+fsAUQaCotyUQ zG5I+s1pKB~qZZ#Cn%%emBEOF5JRH?uY{Rd%RrK7rBgTLj_Z4&Ro#f_a+2l!{S-)N);1}`hM|yBy$yF7mJ~s7z??Kz-OHL7TmNkE3-)Q?!{qXRZ zsu*m(^t}+h?yOQxfg|f<4EP@&z}*5@IrF4YBcLLT9sHezp~quVWL5 z1)=N&(>#YJg+YNpax-#ghmk03cqCkNRWaJ5ueNP+D;zHRFvA$W-o=YXhRk0H-hLjt z)zzJ8N2>ny@r}}($I5c`OLz7rAww6Exyg0bFg0$>k=9W$T7Fwz6+dqav;Q&G@MgCB z3FUn;mWG{b%&#PR)v-ra11J+nXC@G;D4$oiy2sn|xXP$3e$aQ?g0x>{Bd)tOlM-pO z-5JhQ!wJfkZur$Fhj7y1(=MvcYsJMeGoPFA7fr)9EJ(IFC~0_~`oG~b9|`SjH8fRZ8y1b*_9W@lIA zgTks^s^uDN`z}R%?W6NG>nJ##Ucs3ul7#2D49{AUYWqFy?-?S=$<`A?cd_KN4rvnt z|G7(a(;2Od(!<4rBH$%)NG+G&{ZM-SAR(#N3r(OVUeKX-w;-`|iVG#_D*j7^SAK8! zCURXfWxQ+Gd)%fY_!waTfc+$Aaaj7N5m*yKDQDmDrSWd@hRz0;5VsH(g;P2&Ws1k0 z{H)q!{1EHir|Wp`$wQkzvATkxP*)&mtQs3OAVGiKwErFYa$jchUB}bO;wUwz@Xk#l zp|rH~vYbyZ$61A%T^-SH7Wc-~mw!jp=NR>2pzTcevoUZd=S6mWR6323G26>z>2ITh0pWHpwB$f_$B2w62lxyJi+?&s|Bsw@AAA&maA@7%3#N zZ|wW`J9g5UsSn`L${erl%tZ5Ig<@pp3EHdefc$d6HQ{4+SG`v3nu`c1C)$R#+w9zk z^d;PaW|@37Biekj7{9=o+=8&SWP<^|W?i}LD7k;IG5qnKHQEBEqk}zeW8>ddShv}{ z!Y_ZyQzag$cqLToN&NifPte_p1zksIsr_dDmf_v${!+<8GX3mNEa~1v@@lKVb$8E~ zj_qalJbRnzawcw_UfbPnJ_Elru~r>ow?qXAoCC5w+5D8r$H*5ke$<|Jvp-EUj0qDB z8VRT#_Y!>3lCI#~0&!V5hg6EMf1ji6eAl}Ex<_Gf<*1U%I_rW7eqVMs@eaKF$9@v& zg-@eHX#*D^a0HI}x}j2S$Gmi};IU`9XNt*S%zr*-&=+=sBKw}Uz1 zW)7jdJ}*LW>53j38u3w^mscr{d;R9C?JnJyw9!q7fclt|g+(w1go7deIzLi5FDJ8- z?3f~k?Fq8Z;5;cuL19bisgT#%Uwgyt(eOBj)yCAK zv>arhl>X~lppsFnAj(v-&lJa9;1emNu#Y=wKjk%M$MlVwrp6Met zU$j*;8^m&c@jwvCDx)E%Rj<%k%?6}R`tbSEczJZ)?32C6kPpV^NB<%CnjACruF*X$5%IekOc zJnGL)Iwp_oo`zm|@4QhCa%^-k^kn_dBs;jU3OW2Ed#!z5>1C<}Tgt-D#=NC4$Cnx* z5F;I+({Y(wA{wj11&Ki1zcuw=n?S;DmE{5&n2AD_s_r?F;nuNKV; zZA&q_i(!c14UIj*#9sV{Mr?ZUm{Wbn7G@94iutsYxKBDZ@QA9KNhXvcYFz1#5sgb*%Kf0KNpk+oz0&dnhUZ8;^g6# zZb{WGy2VBNds{OG|Fu#k9*14>N+LT?>=e|PPMRY)-+Av~bGd?dWBAb)5kY4C`dsOe z%^Cyg8XfM^o$ZUeZro`EFSz$%LOL1Ss2_587=2ve*HWbTc@!?;-11? z2yD>7$G_g{x0m?Or@-}7TH&1zuR2PE!5TVVtL2i{m3K05vN(s@Pg-E;oH9iER2-wq z9E7=&FT&zb$B9$fb+ExxqLqAUg+nVMvhG7)x&tF1hNdIu+#d|T$g3ObzO}7Bnxf<) zB;8_r+bX;>TTU%SW{1m%AOSPv0H0-MFZ^l|5X-0V|1p)9c!V+b%n?!PTG~Oi%Sk(m zesFmDbRA+^#(+Mn*kwYy2gP6d9#qC=khI+fu~7xqRWeg?6x8%3SYL)YA!~MX=kC}t zV0c$BQp&k=;dVRLvwI*0vM@XA%BhVQg^le%n-@QemQ=i?T;_!pQJw0qGd8j_puFid zDvqER{wM`ZeRbfky|Ts+`BPPW$~;O9uCVZMLEN@Pkx3)6p1r_Qe$@J?zTmqQF?3_f z%&jK`PACO>cguu&nS0j*KIUuZKw46|>hphCc-8VI$--ymxBuf0{3MH`lMilz4x(K5M(b&N!E^95bWv52zs zNzMVFUD`#_l-0(aZXfO|L1Uo2gP_37(1$;EvIB2h-zAb`A?ydiRNHn2DPZyY;H}Wk z$t@9BxZxFf^QF&)F;>-#y1-5PWG|jHnO8BW$)Y;pMlXU5H+Jo#>sSHXlKTrAb9hv*j{F^MT7U%)aora+Hrg21Ib@ET zcLNw&W@(VAGOjq9R?{0(_oF}tCgHO#)nBE9F1k7FR)SX;IS&dtG4L$@PPKNBS-1?V zZjMbDX_kWKVC!?QbTFb#bgMpws*tGdCAj<|1=Ga2g}H8H)M4d+QB-JEy5x7ckECZI zo^OzoGHII3cUh?Zg4N~W)$^ozB{Z$|7| zpvL-fN`IEefK!;PAIc$%zu3y60zVP6q3a$z7R`Eo*lh%py8W|eqJJ4nFtrM|*r=N} z%Pa+pvOZ>R7`2J%3`C}<6)-rT8D(I^Z#YuoUJK5jQ>{Hi@v8BVHO*f`7NZ#H z1KOt+qvS7>LX-Noz=EB_EI&i!+@z{NPX0&M>dsM~U8+$!$?)UgB}ewY&(?BY52wQt zWJwLzqe6;|Gv9Zu@!#hyILKpF_NbVD`q>kU;}=z^z0<|3hBa#|B?9EbLc@2HWjJ z4zcIZtcljWt8I;fY6AkiaL4qFYgc!sl{{e`6FqTMbtqC?X=~Z1MIx)M?rcWi%yg!* z?=&^!`7QgvT6r7XPmEVzL*!18fjdtXc5NQ~Xku5t!3eI`136A*+}L0-q49j5(p8;9 z0iNU^u;JnqWa0hj2nEwK#*OiUk7xX2M*^Y>#0C6h)breK=sby-mWdja^Zei-pp$xe z*JEs$p@-rNRG+ATzhuMN6csndQ3~XKB^&Gg_L%S5+kT9{u>n?vj37qr6Q_^^<_3n4 zM%&L>x;rxe_}r2jAp*U<&rfDO<7@U&kW0J`;Kv|%nMNgAIn!sK<{ozkB`oqe<#g&= zuOT1$L&Ha)J73Nmb+q~V#RDzwxC+qhXS-BIh7p^CqEsMYisF@b5C`Rxho6Z4KrD-d z7T5(gWx<-~PPg!`AEc&$B&?Rn(UpHt6E3dImhN4e%bdINDXzUxUMpnsk4VcFn4AN} zZM40x#vatoUZIStI_aNV$_vE2{wN7bAr+c-h+Bp8kv2PA(;MuBM-X(x(o;{Abu z5+VS`?f0lQ`WnvE8pRrFRvy{Rru>9D(V3r~#qw!A9O}`CJ($uDM>&U7D;rE`7kbsv zF;zd>HFJA&zbVQ8$zhg%AagzwKPC1GEz6}Sz1HCOSLa)wt;@HrdKWFObotOg|H|0l zJGg?y3y`>YjT=GfqNb~T;Cc9L6VfDq%R_K@V zOwWONr}o5+I1`7AQh+>+7ZIJ|tNm#qUE6)ehGn~nHdEVYwC=Yj%Bh%zcMF#1XC~;z z9{x4$ainzLjHz%5d$>yx7fvc{_!<;p=d;mN46(fP(r z-@I+Nq~IK@RWo?eg+@}2g`4%Mo5_tXY?DuNd>v;qG)+sJH+EyN4--S0JR$^@cY8a^X;XkhL zr~l4Mr|_hyNgz#C`uB}iwEhf;j#^Ls5Ju0Y`!CIuC%~|h? zYJN`IBEmt1pULkoNofHWq3`ako7R6HEe=wm4Awg4t0vniAVak?Zb#+L zC!j9o9rzRj-)1wGr8+=F{Vj6q9j~g0Uss6Az7oQKzo_JI>xk)dlGJYHcxcK#&grx# zHFEy;r+J}hDB4wxWrj8WF~wX#w^zGW8+v`Q4qhVNWQmIVa;Qt` zlkdrsQ1QONyI^;7QVPGjhe7!Ry_MDVOniFCq)op7N3kogRAO^L-cP}&Y2PQqA+kmp z#_eSFM=t~w=HX7F3Lw-Du(B&R?p>jv#ZCJqLRT#0rgwT(69xzfo60V;1(Ta5_8_w- zHIGDfA2$OV7O!(*U0t4_>ugFbd~@Brh!}991LFC_lrrcXH&=shQ?cepsb2Bo@YwO* z%QUq)Kl9N)C|wRWmI`k*YRS0QqH8-gIp&G8d&?V?8@*`HKO%8~0R%Y%J zrq{LxN`5BFudmur#Y}P;@1i=RF^LQ~Zq;lc%rLxfb4_x*P(@>p8_u_GCcPYBtbrWc z_feQk&?V!~f@>-BPr-KKx8Rr0C+S*GK%4m!gOox$8+`5X5Z*Llowhv2k=jF6ReUwV z)=t-z(!^E%tn7Ha1F7WJzb@oVNi?9gHVQ_QOmIbp=9R~px6I87`SSN4snaYga5H2^ zr^~ikqVNhDMrA-~g1{GMKSeDNkqA!H@X~;3i$>#qn7yNhv+&L|%gmxe@^}f+xlZQc zy!w0{y4=bjG#39De?!A)&Ek{W4gAt0{u%6Xr1((Gvx&`pCK-nPn>st#_RrEaQ0H=G zUZo9HEJ=+Nk>4Gj{W*mI+yj6l8$7>Fjj|;DuD0&kiY+lw8aY+Jy#R5ZKWYL_*C*6h z&MN>p(Z(Wk?2((c@#McC%d$F-`Snn0#;7YWvap_?AstmtZVfa;o9eKw+lq; zybeyXM*T#GLe`dZ%8%H&Sdm{L0&bv+P`G;qUem__CC-qK0Hb0b9 z{&B(W2&Gh)d|uYQxQ8#O)>EVzUu1Vt>A&q#382uXH`iS6I6x6iR` zOU1=sK)2kkf{ey`f|qUh2k|OGiwj=q6a z`|lDC>f-cb_;wnAzGji<4v6ZBMEu^K_hYb@37OOh<7>5Elo3YV%dm9e2hH4afBOay zf`jN^xv%eziE^rTt2&+Vg(^WS@7lUME( zNKg*?Ju}SZWq=aYytnuf`@4_@h&P5XGS^0Zn6=7YqdbzfeV2Hj8U}nDjXJNcVj8X2 zOE9^$)EP>iiCl)}UNvaRLM8J>zv%MvoAs@aW9bqmP3ZR$c0qX!zQrFgZV4aU*sWR~ z$K&w$-rtIX618>neo6i~XmD~L`0Q0~g}$bFX;A*;D+m$Qz_wXaUDL&frK=iW<+ zur+W;pM%5!`7W;@r z*^A{w3Hc|%iG@OW$WoWNzYc4H%81%_@Y03erFqo+;S|(>Og_dYii27CWjJtH=_8)VwcYhH?N*&FjD0zR0pggc%l~XU5B{7FR^> zi-4-gP)9gsHh7{AQ}Vze3PEmV2tIkR_S5(Lkd7c^tllf!gK`9xkDe{SXFbq)6FK#+ zHXAIov`?y?57@UpGB|rAt6mRP4B|uCQf7lCPH<@7jfIWNUf+0(ohH6(fNq5R
RFLT#gpFDz>kWH_@Wg{%XJ`gjHF@0+w#vNDrs3^C``8nvpg4?lgk8%-^B>Eq?l;+> zMM{RQwYxorT6?jGPJcS)OlVL%0(D z-JUZGIex@P(yX@0z%P#MjTt)||MK}_sUF2am|ybuJDKTwTyb>=H@lVI9=;iav5R9i z1tKSjkZ_vcM?QoziEm_eCY0D{hKP9FWI6rW~?zmyphZ69U;&pa|rB3&UgtBa%{71gR&C zar3C)qI3UCm?gy(|LwY_%oYC~jQB0Av*FGIadFGz77C|(H9_?F5U1HL^;D}(f`8Ol?RP=aPTR3-Q-wS~; zJT-Z(OW<$D;$J7E@>6it0#7^T{{TGS128J_c?tsm=?MMjQ2z7nVFo%+wPvz?(y!=& zTj2%ozWwdir>MUfuzyX0gKxo?pLpg}%6;ls@b*#>$H4#hOP2t5D~_+4yeXuW@tz+{ z&8gFI3;!7g__w(i_Z)or(Is;cF59UOJ}Nw~4g1eK``ZyXW5c~$;>M?ny~m6G0AD`* z(nvn?FU0)czUP1Zua;O?v}V^4o_j7wKSXn%+~F_{7%A`jT6oOAhUf2o(pu)OM+s*J zcY-`Pr;7lay&~bi`+2VAr0o2E{*2?X zU<}p&)aTBB`?C>?%13WU{F!Xia#xXR>bq5yt2_2z5f3Y@uujcpNW0+Z~(%XKW;yVyv&EUhvQNsN0x6B7SatOxLX&SL*Q(j_ycd4)6cD zykGG~kP2J)p5W)`!kV9*5a!PVly4e$9gGBy>HPN*{`V(w+zkwrMSL+2m)N-kMn9^# z{E~-%_xLGg`yM~ZHws&~DK9WY> z-axV^S{w6qNYg&YLILcpA66+G18Fu}dXqYbXg$@HOhyPZ8}WM&nrJ~EfC^`xvZk0K z2^$g#V5-nAgQ*%@9P3r^31^6 z@1(1;kA4V-Pcv5D3lb68kT}Iu*C_EXpQ&Zn_MTZwbU!nHVM3Y|b-wVHn@zkGGTLtrjc2i=!n}+61dcYu(i9Npi~M23O*!ijio4zRw}wX&n6_$`?9PA4%sIJIS6198Vw;&dADpHiB6gUaTi;Vh10lHuc{M`K+R3C zaRlNbB5W}5bp1eKy! z-R))!HFWDACb$yv-92w^{P{>MV)vUZ3F9c-8&0lfNB;^oIK+#a7|E) z!1gKIWoW< z4{-?}!D>vh8m;UzbkIJy-Wp)7n@fYDcDUd*vw&mNSxg=rUT$8mJ&An4B2cdx8?-Z2 z398+UrX)L3ijv!we;!5Af}a^ZeeB6sPT<1M4x*x4KlO^~!>Ehc)M_)g{s974C^R@t zjXFQ9IigWABT-FKCcSSj{fUC2Y3RcGWmY#w`?fmAkLYfGp5TUM@1N0BpYYeD4=30E z+M~wqiyvPIw?^)-cqC*=q z=|`lSY7tWnk50B2UgT~6WI#y^X4F$lZg(1qecWi`eP}X5?ZvO`_Kwk*mh7(_E7!a) zHZom`uYE9a+Mwb&<>(_R^CM}6%#*{*^_xSfFlg;<+OyTp*B$b$K3p|NKXcl?*y9@c z%$BO-eC6z)lIvm@f@C4j6sxG8Y>(CVF= zzM!lcB3=8QO*ONWR)KbpZ;pNGF~QxbHQA8^KpIvWL$fr;Ywm<=$pJpQw1R&J)^&7X zPyDA|I^r$=7H}nxhG*2hNzHmnFp#g@1aLKuG6qwly$9m48^mV0_=P>;R|-z7=e zS}zDw6U@kEZW!D!nQX}n71VSEMl>XwD~v=Rie^va7_(kDv-omKVSzKKpqGLa5%3%J zC;eIN)Nm$)NhfJv1xew=dADA z@m1=Ab+F9oSMgpQt6SanM+3iSasty2FV(Zsw};rOuAG;W=`ji|7a zHZ0|mxDSP=&zcNPMo_j&FX^|hA@ux>UeFFs9!ZF@8aQA0H^IvBIPRH4?J(a77TK8t zVLbE$IlxU|hLbkYF52?2GpKJ;W(c$Im|_KSJ`*((?9Wd#?WbWl~IQMJ!rCVR+H);0;4^Ys-1*- znJbelmrDMn1GCS1l(Aar7+b>CBt6`)spLX zdLc3DKY@j>Dt~9%b(cRHe3aa%NXtmOBu^0^ZkM#~KXER4gQ1z{DQr`Gy znTPw24U=T5f)#AUFS_T~ZZN7fFQJ#*%jmNj3Wq9bgSDU4`s-yOu2tfm?i2X2B`LPG ze;b`}IX=AAZ}H5v0!Op$gUu!h+T}WeS6Uf92~P;XWAm+B(GW7o)r+VteE1wf9}btl z%zDRvSKhYfyH(7Q3ksMOuM)Ov>bJ7v#Jql^em^5R4blgZ1brK)ba1cQd8;4Yhqmjd z2c>FktgRxJ8}}DXJP+dAgZhEy7)R}Xz~03)!i05#!)Cw;MSR9kQ=g!}xjSHkpVwgK zJE1OybcfHZ>otSbW0F?o#^h+e&v#VsBFB<8^cs-CP* ziC9R53>3?>heLK`qimPz9zpSmMoZmlEjwA!qb9!;Ef zk-rJ9Y7gi_&_U_iA(>~rFMGG12_{4RNi6~%=pTNWc_lVc%4zT>)o^96N8Se3xq3U4 zcnN(6o<9P_##%zxr3Zm6Sh+2sdHZUyPuT6JV~E4vPyv&}vSsc(X=ZkT7S_=2XA(J# zf{X{HiO1N>Bfc~5yV3^S`c7B~=}UdC=D?AXI9rjaPdd9I`O?H1HnQbu4&QJC%_FIP z0DnY#+Y${u^v8a7nFN*x7w*vfnD;sxe5Lly<;A3KW;_aGg z#lbpEw|Hs=lQ}SO_xVz^-f_|6z>}!;D?kdo7ad{1HcYECndy8n_%>*h&DlOEux90k*qWQD>Us+uv zNQ+k$QKnP9JmYPkB%$xUcLvj{>C4|5`Y}Oys2#egD6{#|t|AIw{*71-qE-$gem*6d zAvMUd-aH0p%w2(Rx}2UGye^M_E_8|Dd~IU%cn3lI53BeRd!%7~y< zDPK7nTauzL0#V;dv&~q|zR)R=q;*uCeY$P$h*93cE9-PHd9SlNgZ~axX*C3iD$MpA z7mGNUtmU%TPlno?hela=I!@dWh~dAv`-4lxs0-?1;FgcB1?7-I!vn~J@@Ju_u7OM% zxe*%4Yto$`DgMJMtdW#GazL7;kfE)`r|yF67BVuQ<%*(27EO*ALi_u)zv_NVyNl5q z>QrkIyinlOaA!tLEV!XEvpCa-|72G(%?AaU<4F_LSa~r5Ytb+b-i8+#;X5r)Va|s1 zXZjjJjuuDA3qlWn7Ev|kEhx*>=Sgea!=yu}#$i;%ET9bqAKC_Vh-A-yaRr)@vfa^E z$qjmPsU!DMaY+M+$5Q==JaFq{-%Ee@J5+xC($QRsF5!_d2?*961`PWbLeZ8@0&VK8 zygn*M*5CKIi9R+X~tWzOonm+WYpi_J>>imp_i|RNtAt~<&1Juwt#%0PzlG4vhCx&*hWZauTAYV`NQj-@&ZKEY;ppA64R1#0T}N!l3K z=M^qpF$sNn2mR1}1Z*p)uY(1;p>}CzgirK6d%Lq|mXM*GF&4)0rhBjRuv4ri$1nXW zSl0oNES#us;Ek#A#3$}sZ~m3d|Ia@q1N7|Y@at1t1oDIk@R%A3NaoA9=;AVwYE`ep z+fpLBP0I}gPNDBWA4yR^%S52wB@TdW_(60^*>b$dtVxlv+`cOXQmqtQSSB*D4I0Cp*W<`93at8<7lE(%IJ_?tLs=2NcZ+U*`;V{Q57=-8W zrW;UClc?RQx`LAT)v7c5jw%L-QuA&2Rr#x`tqNJiRrC#qjOs@N5&#! zfu3<-ZRsHaD4(awDY8K~cG_mnTSh&Mrhea6Q$Cl@P+C(eM%^EOomukWIi;{faohhj z^4K#aF;#1wm#5u8SN0+^yWn0yg90g(j_j#`Q^Z zcAh8(TB_NYS9LYG?!_v4z8i%(YMBl6A)iFvjJn}R3cLz2fvBeuv^gmL4Zd#u$8=|^ z7cL@E&T1ictRkG>V|n}(N06US7WjY_Wp=6Zj~~*o9sN5lKnup@99A7%!10*Tx=T+d z!?*9lE5-`iYhB2qM9NFp=itwCW}a@4D>ehCp&5!VQgME+9+8qk-sAH3I7c^8MNQ(F3&6g4W$E?1HtDgVI`TIDn8DIu4CLfYtNs#a5-GBu&?iQqy8zloW z!Hxc|;(BKNyOwjVR%OdV_291^wIO!z*sF`%Tf_y{Vk6?^69EzAEm_wn^UDfI$Nlix zp}gp0ut#a{N9r*4zE(KDWIA=Ud%x=a(0XfWlA!oj7w>`O0O7)AKvhHHbqn>H;!{ z&pXoD^~v-IwT9`l@JjAu>G!S>WunQrGTj%$He|lR(*rXmOq<$(hxog{-F|>!Rsf?{ z<@P_lULTKHNgvYJzid>@JDh6GlLm@Yr}-}`eGTmw@WEHfEC@=xD+d@H=_d2YW6c5e13KjS?&5z zKY*r!fE(^39&CMOdhQLcs-WsuT!0(WkMIxMM|=q|mF!XlMYX)_;PmLMAy`ig?v*$& zJjn>TUiJtNHZB*c>nJ>6J&wEX@%GkbOsbls9d5N7=ow)1XHQGRy0`O%%xc~G?LsGR z2x8|6sLi=#cZkpPp+pR{fJFr=fD@vedz7wDsEGQ?BI?;I%JtBGWdI)x3*^|g2^Mp> zGO$~|i7{mLFaXN*Ng6o!KwmhNSef{4TSQPNi)PHK@{TITO!2UtwV z*1)FVVNWP*U{v~z_@Pt@fXj8s+)N#q{+Z_NF+_f!!}s_qCT|w&OAEj`hsfi1LUG)h z?Q;XrFcUmqcy2(xZ3mM7m@ZC=DEz#l+wuIP4C5WMF__0I+GZ}sP$kOIGLFP+PqiB4 zCAxC({M-yYffSksD>;T3_-5)>ky8BCYkm0aPbngZMgExG=Nx19H(~H=GY|zY2bHRT z*B#H|M!}lf4YJCf4JM@ELJfD&%I<9JslhjX_DB=Z!B^T)5enmKP^it~7$fZ5m)`Wy zZo2=L3EINfOkA_ltH~LScn8;~Y=buZ#Wg(NO_^ET%dFtq^Zw}{ zEvAXCT`mvv6H!$iH(&nYA8lOp*1Tt9e*_x71&8mGVV09GR|?_n2sDOJn)uGNDB zF~(iX;i7iY;tw^K*ZrbrE${xev_LxDgi?4|!v5|79)3AmFBOSkT0QrAx{_INRqV2yDn^W_?AJ>P6dj zu_|X>`aINw+IltR7}3+Ov2S~;y)g0eivYjOJ(7rF&-ztJohuqu5z$`*JuR6_8_rBP z2E^_5kEwK^qAE$<6Mbe)D+d;LyS`V0^*B)CCkS;c%W3lhAgTGw^!xK<&D@CBOZZls zb6%wN`ANPszGTK6q)!u|3F@qU@Yi+9?!!MKi~dnR$oF&URxtFeY591=KELUeHz&H1 zXAWN20iuL|r@j7vq*#~(mry$Qle!DM?&f)J0V4=|t+f16Z_~jCbBo$aZ4o=uulQo& z(>x9dvd|L8lR8&(_*q}TbGYm$5QWi0fP6?RFCVx*c#sS$Exqd(81@0Vfb0 zsw@a2C<~{evhrLl0ggaT?AEcS*OnmufZCWiDGG=}0=HTR){5$|BPbg)$d>r<- zNdWbCij)Y6^QV+(4x^kd4%W%^{$+pAHV5{HSE<<3BXqSvn|hoe^wh;(MysRIASj>U zAvTKGd{aFlgx_PH!;o`Cqxo`Wh_uG$ex7ShvLh8C0CEg z32t_?;)P4Rm`~q4`r)Ge7fA<=A(im!R#=(?aD~ZWrHEeD6B5C*Z%>E#TSMDA3g?dG zqY6T|mLvUXea&W~(ej0OlM!DsLPc>djxx89W5RTh$LCt_OjFJ7P>Bs4)s0R5`$*Lq z>>rOsvrhmbqDh`Rx3upH>4zx@_><}k6oDG|;ZHrnUe>63AGF5WlW1#0?9^b{6$j2W zXaW=9kk(;XE#R2+p%fHb$(_z8ddWEMdgE8w%NPCbd)d8Jq+Z(Pi3PmUP`Qg3|7F*@ zXP;2EScfJ(x5)_KZK6x4;0%U?F8Q+gWey0=ffB&vFQqpF@LVC6a};)_@v*Ia{7*`L zC;*k>VBNgVExZl~Z3$gphbnm96{M(O`9!evNOYiBNx=B~BZ%CYN7sJ}9GNw-BRJC+ zpANCAx@gI!jzk+O2o!wmzY(dtWM7pBEaHMvp>boxF!Tm^QFhW_%d zUtGm&^kV8(N(QjKwaIE;b>*JK4uNXhK>?B4);($>*#ZVFgs)KHK8^BLfm85*0usQl zff7nSv=^#5bzx~b{X$aFV;5j(_&G4!th~Uno{{xMEMjOrpZ8b+H)Ml-lkHT0jsIy$ z1$B`87K8;yoOzR*J<~p098Vo#LdrnePz3rKRR&r$_X}KA9U*}-X|oYin6a6;nlsf0a(yG?fMig!L-0hnA1{})N%^PxCzSl%vQwX(}8SZ`MU+$ML=#&TfpI^os z0zEVJP(=YU+Vz90E_=e; zjfite|9Y$J@dHp!!kuUX!vd+X=jzP%egFL^+RlPljb;7x`Jk$!Ih&t3t~Z^^e_#&G zcq+NA^L<7#pX@9KKK0)%HIt&Xs2IE5c`Tj(6{E;L#Iqr=-zWvzdD=V|7iD8O{s*@SByi*3l8YWH#k ze7SOX*TDz(W|@E{>>4jlY-5-eSkfZ=BpgtO(G)Y%s4w19*|}5QE1T~LPIHqn|E|o^ z&E5IdXzl^`$~_>sc?g0WP0zgU3F*Px=j#`8xN)|j`dDS<#-7CI*bPD`_s7fheZ#;tXKs zJ?QgF^VRe)FYzVb0K<1bC@VL#=R(aUpG3 zQsYHj1?sdQD3nGP-UQ^rHUfBiG25m2AJHqp{mD7WF&6+V30PWkt$7#VXu~?aQwu++h$?H$>p1dU(-n)HJ{I`NO#hJM7Y-eL3_Sr{>Ukb0k%a5gVeNE{J55ba%C!FKkf!V5OMNC#;{=hy zdThEROzoVwt>Or0Q>H9-_IQL5Nl<0}xlJmHEG;?%2PSAmZco&{7;F_h>mA6zZ(}@}x zSPxR0`Z9?ZtbfXK?i>c@2KIF7BK)OsFV`Br2j^NIEoSXO@~XEnzqA1TwhW@$ReQgV zI|}A_+--SvBCi&+0$u1euR{yhm<*b|c6Bpt;fN%*fcQ*ZaP24;G#g&sdOP4-=+MLm zn;eU@Y}_>4(EBLH!~P*F?}PtV>R276VQ1)%Pl{-h{f+W*ei-Hrg^8>P8i>Rb^DW#! zVZX98SpLFk%Bn6wThRse%aUFAy2p}JP(dywE!4C~)+7FM)p#Lm3tm+xKEx-x?c5!` zMo99SKVX+>+&&G^#{aLqFOP?M{T`Q8L8Y?Z7NxQ!sjP*uFH_={ zLMgKAmNq+C2cr}fhEkU7O^jt2`(TXuo_9AcKDzn+`+Mo1X3YC}&Uwx`&pGEg&pGFf z-M~6{^ZlFN@eRgl+pFz@R^YjD9Gx!be;HYtYp)@3;7{Ha-Cnd_Spn_mN7K$Y8r&{8 zF8w-QD=aTgTe{)PF`2R#+dmBsRpRmv*?yKX)>C^C+tlCconv~QdH8G|?sV7@@3Nfk z$knthRuAk}M;RpLUFEp3^;GgBy-4JU@}6yLbZ=GL2f~i+>+@v7#7%4!$uG=f^c`N{ z>I-WJb~&1vuw6H*XEQI1W<9aP+Hhlp-wu0Fa# zd|H=^asJusDU(q)b&|EzXHR4PyiQa*cK+DG$Y16z*0VsI79SA*Jxgh-_VgKwgp`ayGuc$7(nt1(8v>hX`lCsw_GA%)6cs9WYop>GG5-cOuK=3UqTy1c zo{cSe`}U?C(zI4r{foNm_l~s=M$(%LmFfrzm%T7X#$&a>}hImiG3Y!@%}AwLfPKV z>o6u>?M_%4o<8@LzFC%$dx2Tdlg*y4;>*#fJCyM2*_7>PKv;o|2KvJ?Gw)2%k;^p`o*V4shuAt0Vl?LmM zc-?n0NOk(;^q0RZhIu9A# za+SX{;;IAM`4qxwV&Xa1K~f=$9xnAfWxsGfe6*P zV0&zOcm12hqLJT*r>%f4pO$Rhxc6iNIJ1Gd=$?r(PCrxuU8JdD=D=f;VExL!xn!C#9runQ~_xM|3G zK=)v*7dzy-9l8TlxZ^0($-208BWF#>h0bs(sNV!5f)4}N4sAU5tC;5uRZ~A8=yvK! zuKJ6CF@7J6z94^On0t|^Ghkjp`GMisV{3%c+kz1erloN$8ud-rV8pGjdoFVV;gIIi zjXd~2N*Bv>AJj{v(5U=YCU6R)j$qRH$eMG}xF6mOg!>e=LjiWkCM<#p?KcOHMTr}N z;v-;N_!mEU7=TJ!4Lirc7X3>zIz2n;Iv1e(x9+NFB(>QPNp1ERl}Gp<#1%q$)vgd2t78M5a84<#$>5zSH-{!I?FaExODk?k{AQ zuh|)iIEm>91(SHnes#GwBZa9*nM|V#ek)Rf7LU06+f^}+i`C5x7+wJ0;Zyn?kry*W zUbJ?bx;k6}J|V))gYx#TM@i>;>Qf%%K&?i2Buc{ZPb@ z7NXW4?pQ#vM}##;Q2RVz@P?XcLQ>X?_v^|Uvf9hm6*t$d_!*Vv$iO#2{f`h>b(k71 z`!%W_Z;eppRs^3AJTlID zcNk^aX%cUfon9f^q6BSiQbXpc!PGXUGiJIQx+jM!Rc!`7elC=9CuLRp^{jPAk{lQ0 z{aa9pmNjP+5hT{$LNRNHelp3qHf3Y-EXpSB&3ctj&rC(;)fbu;vu=C)j6O9+;Go(J ztZsR5XM!HK$vA-jXB69d1Yo>V5+7a-Zl)TB^Zw3fID1xFLLM#4;Ia1a0^PrTmM`uR zcKITAb`FxJS64q(coJc}uH!TookW{#IINoVXo?;?U*Q-~;@-~< zGL`yrW@0@IephzmZkcZi#YuLlT7Gl!s zvf!o%z+$e>MrJ5}^qr#<*FHdO{A-Kqc~U$56(xzN(*4$GM3sIMf!tYDz79k%ryqb% zk3e^ZAM)#(^{3g4T8wUuV@8fsLSm6Wlh_+bC_(Z}hA4=Npeksc@h*vZCmz9ju#}^_ zwKabt^oPRW_m576ox7m2_%)*TzJ`=Nn7fvJNZ(NAOZ9t@^%c>xoyj^`N89;)BJD%4 z8^q*SzT{Nfhx(f{msfEAtt}CDt@L*r(s#6IqDuT z*J*(j5a%PWnf*kO!ZHlrX}7V+>`~LhQHG3+(H0|R7g;!;o`6Ms?bvba-?^7DYHky( za`nye6JBU=(aIG-j=yYn04}7haL5S@q|Cw2G#X5z!tW{Ev+XX!NI9&fH&Kj$Q!T_cNS*HzIcN2 zG&8ay~`zNnv>tTRs*C+4jE9GgU|Hz?}0@-6HE-W zd{A#-@H*M!7npR_TI(%id%Z?8Vx7nyL`7=Q5uWD}TJWCE56WOJn&QKZzZ3+hj$dM6 zKrtNLt9F#YM}GQP?Ar94kAX?L_Z;{Z1ek^F1nh*FG!ye4M7VT^xP{$YF{{{Lw6col zr(*l^de|LpFNk>doNDO~^C)JMb%e}3uM1`3=L#-O#X=2i-%TleXI~+_D)~jVuIRa5 z&CIG*0v@T<@k;OJCUk=h(CV7?>3?Vyw+%$%?=Kc zT!EfNmT!-r1i_1NmQv)4zo?`_$*ml*;8XR=cW-ED&N^{j95;E{nNFin)JmZ~(KXFU zJ6g_4kFD0&y*K$~oxgxr4s{^NyOB>3orvvv9Qj!H$Y&=LTK94H3_Y*G5XR(VP6m?y zAX9V{aC>$+dA5MhFs=v_7A`X)zdUCalC-%WjBj>PzPcN$F7!Q@Oqx`mcX4J9rso{;+MMxqlijU zpC#XK4pRC^Yh9(%f4}J+F3yj$+*GyqAf>HT~xUAbuZ-=tGFY)6bp?L?Hnh@;zlohO7Qw!*2w~&keqi>0Ha!1 zAXb%|H~OF?QCylhKuVyUj+VemoQv|nRQzQxPFegn5sL zDUK-7hO22`N{PRj1ogSU;}v$JLLYs@xf9XT+V2n;q@79THCnSQ`;5ZI zG=a)-b{^OPf02PbKdw1ADKvOpB&PFfRQ&@}Eub|T{nZ4T^NN)G5ELFIC6yHi}#to&HiS=mQt-mgzcu?5qeyyKG zJ!g*AU*bZ=zET-wrf44RItfKp;l@!r`luZ(`DXp~fx0wv&pOGMuY6J5!DT)5nY(3* zCE4ZJ36@W)<%l_;4*ZW$Ci6|=q}p;!Cckd*G-9c?(0ofuyl=F{Ve+#H?HIk;3p<9ENI;P%e zw^jL<>W99%83~p(!TkJS1;_^r>F@NsK8D3`np-!IBs-7PetXjxlq>5%TGv_ru+(3| zt}j}SSol^s!qwq4C?C7kmF$$-KPgX5id5+D6u298g9vvB$m*QC1x!?YU8);=ulSpf zh3npzB3L-%nG7BDEQz0)avWk`@1az3Ch{fgk^Q`-(nBm?HILVy$kyt#kFNZ&EipE0 z-je?ue@j=}fukrvz8>vka^7HF*3J(K3vOUkD+BD{RjA9W5ylEtxy4CgvPdt&O^x}F zMQ?tPz|@eO^Yuo^E2D9Z_EZf^{3fz>IN3pIxJtv*R1A|y8V$2=vft7lT4j30(RHtT zAd>+1Q>~(1SbDG1&E?T7F}+S_8!v6MW{zo(C=csDi#JsED>5?1wfSwDC{0X>3E@1A zCf=;pR2jS-ZKUX6JQW;S8Z5#a8NDmx;kW*rt~8S?k8)+yii-KED-@)f;e71zk^OeK zVomCQ;RykglHqUlZldb}l(X^oGwRvT<+x-_`MJLekw9DiI%IJvaM0G5`U&FXZ zm75+|f@reG6Am_E$H=&D&XV#!(hKc82%BgEHO{O&PdYw%L6d{nwfTIjPi*MaZj~4A zvO=G!5Q`(2=cr!xPU>@!FT}}wcsP(Z=;U@M*rG;`X?q5qbU#wRBTuu;Qsm=gWAe#c z-pO2170Sx&Hp2Fi(dVlJCL_}~p48=(Rg4zqjYK&Hwzb4Y#l~{4`mwc4BUcPkkEt*z zWanzt%yz2(-Fh_GdKB5qaLvgi^GDT15bI~Ya@>#K>+Y6Mk36exRDbC*vru591be5& z@mIdtXvM;*krWD6?OdWSgR>$RUK?dy$0spl;rxbFCENV@vPUmxCoe9mujjMTHvd*b z#>Xu6w~Av3lE4{tH-V{s|5CdV6Op?SrQW4GgFfqaI*lASuuHAfS7_*ImrDl^HHkGK zIWV(O=Rx0?LT3qB& z-J#sVp@}xE@C;40e-%bBhouCq)02=9daHE9E8D!z^|JJ9xki)7?hmP1OuzAa4u5F= zL#T{b^4$cNeY3dS_~#U_Oz&?r5!LZ`AyYOyUdg+SUzM@cB=fV#dQ-41z2t--Fcc!! zZ2cV^yxa4KFV+dkQBHala*e7`8Xf$PcupUUtnYzqVUSsTX2CrnVF(WC?r2sxQb?qr zte~;ZN_p(i*3MAQW9mm-Utf9^R&QpPV$OTuG@Eu{ikAK`W)*+u)$sZcb}5@56h*}v zsdM|3-{#xG{q-bUC_CnLlvML|$(9s;mM=z^-)&VC=Xja%DQ_dGLB8vjxL;9I9>bZ* z!qLo>k+v5&Di-H{Wb6`;DAutf?Hk#((mjuYqtj?*<~XJIUM`;|>?_n%$s0N+i&m*r zQIi70ILWxlGTg9uizlT?QK*n~IGo{PO_;q2Iz#DzPoD$^U(g*5B}B=AuEVa3MbswC zg!SWI7vqMsOePM~|DrV5Vw1f0&}_|#UWN22YRijF-S*yKTo9iYN3}@g+JnC>f%a-1 z8W$|BA~vbxiz|;^iDGd~R$Q5J%B~<2JN7l8Ho68EqnRyI7aqOWK~MNVRB4U~N!dcP zL0M!-_=gm?t_3MSq(Z84y%8+7;OVyL73d*W*`i@kWIRkKS33$9xq@LFjwhy-u;`py zl}|$xHzf}Gzi+$UQ{R5MY4gVncQdqPIdA>IfMBU@ke6Qn?q%g|JdDxxMnmu}^-ukS z7!{zjXi9#%_uYxS0HAbtWAQjkc)MiFGv$>%fw7a{L}&zJsiI^cZSd_FP5oIp$y-DW}Cp+>5F0x`m|J1C=L178W_{_fJ)m~+R=+Um$t5m?P)-3KhT#Aa{G zCdJFi)Lg!roC#NEe6tJTmS?N;yris4WiPAhHn^JRj6Or>uz6Jh9zLebp$wT2k zJm=Jd;DPI0j0~7|$>-Q?O*qxMI%e$$aW8tnbdt?cxbvyIj(>)usEXDQ{@KA zvg7^3TJB~oLD{yJwgcxS6%U>BFBwR4jB{YVa*kMHl~RDtf3e(C89EP@-lO;6rmR%q zm_cia9cG>wcqF15)%jgFiEkw-Fr5K?9R8BM;i1rh@Nsc0DSe8ltkzV_OKEa8q4b#0 z^BQ_%_`H(S2}E$=ve9*Ik|W^tQS%Z~3f+2L39?*+{QTUp?z>8Dt$0ibRzJ=VMUO#S z%I>mNS@2B3dkZ%Hhn$V~fNuWl&u_2#J&LJf@GUsh-NzLl6bN-@wmb|j#k__?r&aIf zFC2LR7BwNIDEeR+j-;Bt*(8v}93E`UpP{6ZB~%rTYRbmZdOe*5Xdi;SKGBAssP>BC zCI`iWyelO~74MmT`E!NBsvZ(oxW4U09UtkSUi_t@3fb6CAv&NDHPOVhW|ry>9`w4V z-alJuEYwNMLvd1S@b=~iWB#*YUmWoAPpD(1s)ZSMj<7khFXwxqiK8}=CxUIS*gOqEwehQbk=oaP8Etc2$cY)Z*bY#Mm0Gn`=h^)|z@tOT0a4$Ic2TrgZf{;cr z>x=cByuMt+?``k1kZxTyuD>9TNocxaOhA3L4Km>`;pdn2dbc&qF}v|{S^wa{SZ*He zwbtu8k3%MY75!x zN@$AJ*JP)3MHySu(bE(tR1{?-oq_Fut*!v7s8OXg!rg4-ZKKK5U>McDV}MYK%`WJ* zNq926te(Ue;my6SIA zEsRMk6;_p#d}Nsl{P=crAJ(oC6(Gdb$_3x&qfSkv(A|iCek^ujv1@WC7tlbh|AuCa zD8AiV&#kBQfm}!-WmJxe6F-nO&Wk=sEeHhKmb6-#P)~*#G1Xpc^csq6874joz2sv< z%GLqH_Elvh3Ph&KHi)46wr`c{n3}+AE#>0d)U9nLy!F>EOFKGOxe0iUwTZnf`rJ>D z&{M~`=DP)gUVQLPX-bLGm}lRfdgP+IFCo)1vGECuY;uG2ZpFlo3DVi|2OOT;!iGyZ zQ5CxB*)3kw{y{vkk!X0_qZ!V>&WLS8H%D&ljQa90`Z}E+FuX;vQ`lZ%@;Bl9=#AV@ zEBc}dgqN!XNE&g^q(+kYHR7aFO1BXb`87bKlfS9FtDLmoq74>Bkx8dzFf`kdB~;|R zTSvGh`;!UnAKI|)5N6WrUeKg&M2k&~$Hcf-^l>9sYtdS(Kj$1`r{jHssaVhsePYI2 zL2s6M4E=s5hxb^qw+G=Cy<}`CmhM5P$*fS|?$kLT`LYn~bnhd+wbj)mnFzjP z+<2V>&T@wlnXIn8*R+ZIG%vZzrOM6UNKmTp;x-A&;a5?HnkAc7DL72o>$UUWa6+%C zxUFw7ahEDtYvfHEp%v8N#_9C&8fXbcR&uMi2pbt+GT(AjTX0=@+B>p^IfipZ9TSW2Swet83O*{9#Br2UG0y%No>vE=Hj z!{m=z;(X10&aD*%_k1+aCOYRGJv>148d*YxwIkej1|1iOyj4k&{-In<8<+;&k0LH` zl2nbx97{HRswsxp7eBtN9=^-%2Gb{7Ei4xvcU=8?4`Vco?bfIF2!98NbuV{BER3q< zs>1x(BI4LvTmO1Ki3dqeK~4g(xQP*nw|aVJlQXK%zPes4$yAx%)50d(D3L$;xRSb} z&ySVgr4{4#m_$98g+2wLF`72ay!W5+an{BJYPT`5TJipg>f)Kuh!w&t$4bFU;D%! zMXd1o{EeO3PY1Crv_8CfUPhUfN_t;@7y(YTH1-&p>_hr*ikcnqjTz4*m$jG2nj6JQ zk=rkkbLrf?I-GlIOSY>nAGmo0%~p~8kYJ9Ziq?9yv6^&>=TiHy&iQ)rnuKv@szQnD zTI$0fl`pIGGc?Wx=EtBc8AA!CgDyAQh}}kHw^{+`M{We7;*?}LEhP3j@1?hu#TWIZ zF!-_d7GI&8iu^6L)1jH58a_5oX-y8ij=$vaO6AB&3d~n%?xs>baiE71rQ1F+eevV8 zG}d}585E6wn036^D#1(M`Tam{rDrnEdQy&(FCo42z7@BZw$H$AS^kt5)x8{=SFYFZ zlg3~_OIYF$>J6RfBMr(i{m#9&{L+0lDa(?B`nzk}4{Vco*}X_KKeP=(Lr2^L zeYv@f%afxCvC&f%vQrs*gZy$SRNkwJ-l>SQ_hD-e>|9wii*+CRHw>P~GW*N0gz5&3 zU@3}Avd%W=Y(5pekrv;kns3t6MnQPRAoe^+z3ekvNCuf9<-Z@w#RaS6anIHu=a7S7 zdRwjG5H43G&%`xUT1M&!(|o~UmU=blV zM(+38^o)k~Pn$z?!@k1V%Kvv!E0?bLun9gDj_QEM;&Auus&22L(w$biz4g(9PlJwh zeK4z$Ar?Hu>8P=u>;MT&)Uo0=fTSKPBp%kuygA}*(~-<&Y`%ndGAf7nL-aJcZX zU^|A$(!aF$5u~aBLn_nYc8yyw)dq=MkpDsvUnWHzj5~{Y665x~j2&9;cskK@hMh8J zUvX63fH_5@4MY~2GZSRDrrB&{jiCNb(El$_ZLM;(7q#TtX4raLlfR4Kos`x$(UU?( ze5K5Im^OX@If?^rRe!;>n{OFRpK|7?uFuGoQOlVXT!Q)lo%mAmo~nUx=RLv=(d15D zD0Q5&q6?wobTAN9&Vs-+F^^R&Ck{DJHSE>@p&6@Q!2H#{$CVaBdmX4mgHPJ=oPzpU z@K`-9!)-Rfb|RO2ck^8rycd&50gUov_QOR((OFQZ?;ORp%veE`52_kytCMXq@V^Xz zi2oLd`2Q(&Pu&Mq506<;D!XUHNWBYFA0F%g8~VS_PEkIL7;@W)+*^i#pDt3J8$A0d z9iW*^lh>Pt?h*BG!z%Yx9ECuY1w0noq?$1MAX#)6rq+5F`Q!d#T2_C^%@D{9zUKmT zT4mOTTf``BqWWxN?b#(*Rqse$r?&vksC_W;I_V?ZnV9dwV}@vYV$5uuwSW&|TkVWz z&o>=XWiE&NB>9vlA3#`UMHOa9v&7&TN`V+JF?eYQFYVwTx@Ad4FRADy8~nqlF4^EE zCu_;cnmz?AdC}kR=9awZrDGB}OH1eArE~C7pkq2xwiM`CiexQCvVOP*OQFi8P~}oA zdO8%o6pLQEY*@NY`Vn4Tx@=gwE?l}UoWAZ{x@=gwY*@N%Sh{TZ|0$!RKZrgSWTYM) zOCwogj~lzjyAO5|-GdU6m1SrbSL?aQn+&d?wpJX|QW&{V%_Kp@3J zTHi5QEHG6?uG(HD&z){I9hI7sN0b^28A9s)kC80f=kW3QU*tL5Fx{DY>b?}2)iLm% zht2{kV!&L6)Sc>gtW2cV>n#gTvi=iL8A3K1GzNXF_V1ssEBC(u8@@~Y19-Lvr@ z<&-=BKk~yL(+rjVvjP1xcTpCkN!hylC&IhI&p`)*$P1b3vk9G=Qe^h(UjZsi)SWG= zGxHT0Ak#Rx?+j$Xgu*nZy0cEsnZ~#^)eL`g7*gb%Qwl~S_!Me0+-|b?X)-Xdjv&1N z{AZ?`{oxcOH|CD)N=Gp=odmJ8j<4>Xoq|^6hS_e0SDkF*ps`0YM)w#MESwn31sG{{ z-jRj|CB7&qy(tqbOjR5zm%>)-sTRN+eXA#egf~7qFk1$!540jxw0YiBMDIR2#o$#$ zLTNXZ0GZF&sc+Sll(5rI?P;I2JQqp^gB6^D9tF8?D$*dA>y2G6UX>hmHKtE#)-SU*UmYXJ z)vohbwt{#IGB)scmT%b)~O>%S;PCr<~;F}S?Un2;TNX^ zVt}CmbPD&N%1<7hGabea0QU4Iy=Ug!2F-6XQvD3Y7B%j77-#u<&sum`cOPWm9vwct zU}g0D$>OYGS?N^Ek=dz|b6B=8ZCZmtd-yXsAYC~Eky84nXKyVEpeYqF&BkdO9PmMH zhBINhnfz#H0kL8W!F0^WeEJ^4 z(lvnh=hKZLKU>r6=}^A|vn__-?ErIw0?-&?(c6m|SF{n>CoN%&R0sZNvD|#*8#aUH zQ!YpaOgBQwlJ(?D{l#p-S=q$aA+SCfr{a@~B8;^GFe0P*9FnDc5^&Dk(>#0qKV7SS z0hrE_T?T^77~`2CQ~2Zdp4q15r{g4WfZgQd{qS(n7JzrqT5LhXI)4Iv;F{$+o1;w2 z7^MMTP1Qc>`J|gK)ZdlHePKuruBbQ$Ki)TjrJ@fnUzC7u+Yj8nZ(z7>8RNgX>%W#W z&J&2qZ7xv+cy&)%ydh;#ggLJUgt;b`a2wuV2`C4g z581b{&VJv!e39 zX5n2V_x^BpBJ@Ff4)79eQ@$<=9%(ypUL;5s{I*niSZjr0sdW~e){kXsdplMei-tg%eY`_BnYVO4&w#SH1j32 z$`3Z+CQpN{%NSR{23%jYMQc$T-hMAgvnG?(2}JdRvKdM}gP&bfFdxp$3iN{jpmM=c zmSv3BKvvf`qskUF&VDrjeBwhq3;@f4C-P4or!9(szvu@xgV_8JBt&I%1ZN`@-42Y` zIT*RHJ3gQBqX^?o^b-GK!0ZRcZ?efxUlil>h5Efm0(I^O1)Dx(fPV+~>F!NdH@)(I D*dt9h literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/ado-required-status-check.png b/content/terraform-enterprise/v000011-1/img/docs/ado-required-status-check.png new file mode 100644 index 0000000000000000000000000000000000000000..0a584d490c582308038d283ca5f97441ef642244 GIT binary patch literal 232272 zcmZ_02|U!__dkx5K{7*y?CU7Ykg|?_O93FV07brsdr2zOm;cN-gL4?CBqtB-AK2^r+BcZ@xVh^}&<{S&L*=h`45 zI(NZd&*-U4Sv^Ehm?R>&x0=J>0GBq4p4 z4dGz>tH@IaX$~VzZ8k+0cN;cQK_NjQ4jBqIHa4jHqsNl>l~n#ACw!CUuzUK{RT2X6 z_VyO^77=uDw}l8xNJv10ZbEL}6d;rk@bGbdY6%l?_Tc=xl3(>G*?3sH+q*uscX4Jr ztJl)X#q+5&2gg}M|9<}F(*|b$UrWv&|8$GcLCDz?h_Ij#_2qBKm1?9zZf+Bk3r#E;&Ixa(z7hb?YL?lO~rX;TiBVKL5$1`_&p7@KB z@w-1aCAnzPC!aunMK0le3bbK({RGDAYIN@B6Q^|k- zKJts!=!pi8R0TH)hY*hRXy(m}2NRV}smF74O~pw6RqIN(`HmN*E46?~xp29XK!+47 z-CdA=&xlyR3wZM0L>6bn>JKccVzjEkvQBHY>iLIzD<7AmYk8i$&I~;~6!0r#f~x*- z?JLsPGk9R5UqOY?C=9-k5|_KKA*;yj?{A>5WAoL(TK}AW<f`GvTAbP+92H_b-#BRyReC5tJ zr`-s{j4J%4^)kg=q_Lqg>iinZi2!}CxDZz%*(BxZ-HQgmK2_Q8vw?k}t%aCQB8{gcI{#a6JX?OF*vZE}^2O*C* zzNPN?;|PI630IUur`m`52KvTMqvq}vA5BZA zmRFX^a%pToymfJ9DMVrc2levZ89f0kxAvyU<%E6er|ujoc*g2E^N;3ce<>N0(zi*E zU(fw~se+G$AmbeF+0%d${QSVkTX(|OMb+l^Vv~{Samzz$){7bY*wqSVlT{_})E$Fe z6Z0|t18l1dUw?z^i$nRfjL3bFMblksJs}BzrMTtj=%i(;cY~9F>H|mTV^aq^yKwC@0YZ?njT~*m^H~sS_9^t0^-#&9DG#$E6jkYwMhV5r4{CNfX7E~ym|5ww<-2v( zI41+zwgCOe_uzqur$>V_`}@n=k9=3Jyn#PgvzL+G_22d7cl|DFpRs-9YE!zevgK3l zrK&sglviZHfA?Vg5chPJgHc(IREZ54bRy7`lkLGF4}ysN2{Q7?l{PmQe9&jmyV0b*VS1$G}cnXDee3Ow`c0SN@9Y-l=mam!Bj zX_AtZT>V%zT`FKwX{6rcwvxYm$!#U;>mG^Y;;dl!RDxCaY;@t<1U3jr>_-AItwKMN zS=y(!^5?{3%4@GzpRc%-N$@c$E`2dxug7zbxT#E0M;+K^`0$ug-$tpmG8-Bin&|4r ze;pk)dH66Lm-6f`b4)pvi#K$aR(~BfCOWjdw7OazN=7|#BouF2?TXP@$vEI7Onr4g zc|}FL4a~5>$kGGbm(JZ_Af{}w3u;!J8633g)T(^oaHzIIj=6mV*(s*=4J~S{PPn@{ zcQ=mD=Ca{SBmsSC5|tL8NE{p;W3pM~(G}%`<-*KpM-nHZxDBlAz4&+l!J#t3T5&;K4aw7`R&wOM!#~hwKxwzh*tsLDlSw&?#GWaHd zOvs1XQ2opp{(A}00@zxN>6+@AMkNnxKfbMK-(CCWP}H>fVaF3cp`Y~7zTzvU^L-2Q z{@d$cXPHoRitE`K(u^7VHa&^TXlRzGzCP9<*`UxG1SJ0L3Z4VZUMu2x!*ev@=-EGZ zn=;WzSF?d?d)wGSJs)&qn6=H%=Heb?RRb9^tz0j*W|a|lt;O*w#EePNk?VVU++P;^ zKPJ6MB7GCzFI<^i-cT=zt?(SF!dOW`@sZ5r>wLQ?w^Fz|Y++#e=UXhSOHqr5ZgW+w zo~TD1x!J4Abbvh5+JCPYk>KhZ{(hEM&$EzBJ9W2ki}s6IeC&J>vxwVIzeu-n>u2^f zvh|60Xx42XxLJS==W{c)Gduj>Wiba}TiZ9+1bj*v0%kwDD)=0;UY?x$_4p_*Q!8+P zNO~LgeSDB1*gUnm@crZ8WI_x|PA3I!vwxVrrm*y7uwA{NQLt?o6_s(FYdL~cx(gc5 zN~?&b5VODA?(b{X`QI4*B?oJ;oTBm4b8sx zABzNbGcS|aZA`Fze;A$n9PcQtcqV4s$4D_VmVN%4{#XAPt0?ZE3$|fuyM;qTSBE^X zNB13lgGt8G_S}+xlq2vDBk_4X6(%zpp7?P=(JK|UH5~GvXwPIU$4*j+-YSH1XZ$wFEj-$N};vGeWmXO=pKBJ8Rg*0^FWx=;i;;Wy^W9?jhl zvsaNFQ7vy_z;)Gc(f!&qe|I-HMUm}mi_gJsn!dB? zPVQlz5+-|M?RxuFgqFU(z8_cvEB?`U0RA{*^7oWj)^*s0Z&<~=}~f zVxs9o%xgzPr~wPhEIx(szWY{L-Vh}oeqM_X7|bM+l~+`R4U|t5MVae1+95 zR|QSQho{#APvM8HtS3O_t0Yx5HRFv(i;&JZrnX}x@P#Wb`_zGZt>U=ZEy6Oqx}0BB zsTFuIB&=ZvbrKIaf^Bo0o&{Hm5to!z$~}iP#oArp;2a$)N80I2-$ucIwopQ1tXI}u zUCrmxS=ZsRPKN)j3XAg16~r@#Ur(~28jRBvN;|clE7_6qOw?f0kpg2{MJtv07w@L) zYwbOb4|aAt1CKf@U1ns?ypfU}K7#`K&+9CHR;xHuTJzHsv>#8n(#4rNT-~!#zn(;a z-PD;Qo{966^@|!p9a163XrS%rl!-$Qnm34HZTB!YAmnl((EY(h?NhR+BY&yx?rn!s+A z%FJgz{a;rCU+@-bL$u6HQZ!~PRF1n~cErRb)>5!_JY0-f2es3$OO2cEe9jzgDeR{L z5O`R7%l9NAKi&b63=~7F*S5Wze`{O8*kW28j?JKR$V-Z~p3B5N;ykgBI0BSnXm(2c zcswi1%Z(fy9F8;s0aa`<;bVT#^|4^XjQV;xjr!Z2&-o@D&yd=4bDJ&21~Wcw7{(|V%D+@WCpevZd*rApKodC z#&V4&+`-|?m`J^Y&+&1$ULc_xS(-e?t{$nDh%b%3)(;Y`_h6^{z0&fh416@A9Iw^N zTdP~c!H^hE#$8+Ry%M?avKyad4BmY*fVC#5ff@0NiHh%@dB_ZEv7TGz&|yv6*&IZNC1cuQgnZ=AxR||E;c3O%P0(4L>|D75&q^3hQ zO`+1GahdoS(=G~TwCN?d5{X+2AVwkma~bWY=wzSu27Gq4vMGns558>blCEWT05_@0 zXU>n*pH9ZCk?no}d0#botFA62->w5z{monkZ+L!Rz2OaX_=~bm?hlXyw)bJ zD2rGzO_or)sXvUAtMVBywb2>d3gJ?Brr8Zm=Q;@9P_&Re*_+pi!?6%$T^nAUW4Kx@ z&s4^4iV2C#kwyqi`N$^+45^x3+NBc#<#UlrI~x0hd0j_GzXsHgng>eXb1o)l1enkH z8f>t?H;1oPj8QLVN+&*fDo;&D|B0*)bh`10rvoYZkXJ0io4z>3L(nKEOX4)^v>q5+ zYbTt*23+>>9MY0Gb+cBs*4v9Q+q>Tm$e6C=Qg1%8j=!_(j)QBk+%?=X(z z6xu{8%UhL*CVj4_=i0x$r*}W#KUavJE6B^;DUL-7#k*7^x7lExb{&2Y22gr*a@ceV zzgz{NZet~vgJl>qla|B+_!2hUPgj~w9O`54C@oF9bu#OS`{V0oVr}w9&r6dmpPsCr zS~0ej&SR8ZF`5DiyowqJRgF6zd7FXe!`O36yBrHXnBCn;7bN7)plsqWA#9G2HAyqWya-_JfG)=Osd1#%25 zgNuTh3#H8epz!}50Cr1{J!IosV&Lr938OQMjOSanu7^pyuKdqM?T83k;huqitYPtO z64%`YSS4opZ4apC7%7gijSV6I^8FYarGz=XVKM-t1JYZAW5F`(MP(H2AxE+McP=IMs=z`Tk%f=Sh0#WxPGyNlTa^ z{5wNDy8~F%@v3c!43CVdH~jiN7EvCZv|Rs|yd^0-k&`S-#xu6>c|9nrJ^D`}0Rt@A zXLfd)X!R*CwXFDFgQ`j7CK(INqAOZ!hPTt7l-gE93et4szRKzYJ0Rja zFf1H~RV1=WL8vZq0d$ja4+v6YhX&_Yy%}8T| zxKC0U&zgq~5TNXYVy4e*eV}bbBirtsNQe^cw7C+Q0;vm+B^}^RfvegInnjmxcZwh) z9i=sjEH=SaP{-&)?}wMW5Msdl!Fzq`ks_owNPyJR$BImt>mB*`ng9{a4tD_n{*7le zAA-lSo65rkBGsVPTy2a#8_68aJ`|rMplBp?^Ug&Vc_NNxfRsYN4qbuWIbqenje5>a zpX>C5FwJJ7h4Ra79#X*lHYUdugoW%{ERRiRQb`*;CexOqHCZ?>Q{W&LPd`8vxN1oa z?uZAIjD+zv49KY1{HAMSQsRDd?iZx~d>sgR;YO%f{K|HjeIKsjEo2TK$ z6wB4F&T1N!u#Zz@M-4*P+1z9~7WNtEuQ64d*PzST@AyJ>5s=;2B-O99u4@yDm9#ifxwO>_yxplrLiGxdtw{ zb+y&e{tS^*Fcr?qqEhhb3gvBW4M0od$KGkCX7e7Mc|z>+NV)p8%E?s+^TP+1%Oj-_ z(j>9su!Cp)+t4J&WYfmOi)Q*f1cAIDMUwmaa=X3Bp+4eq>h>|Rx zm?QacZRTWcCL5pO&7G_yyBDd_Dp>AP@gVqylj?~6_NhvRIb)a5l?lJ296Cx3V=w(U#PIGH{ zKl(gq?;iq@a<#NbBkXPK;{jSq{0bCVnEd<=2I`yBruA`=Hi)YkE}NWkHP3lfr(zOJ zkJw#-la8=kd7*8d&p|!IT2igtJp5xT814n-=6UH{K_#}3s7B7NA7oLrph_6VheIx- zTwqi8Y7xW?wydyF@}PgT>14-;36(3@QuwOdC73QKeLFQ)Mua%qiSEPnyU{NQa$M)m z{rFKG4T;Tn`z5I-rTg^OWFar{tb~|RMbAn^OQWmD=YGljY^AUhtf2CmwSx65hwKY$Cee3i8BFIdJg=B65XZJc zGNKXkK04sW-wu7RGl?CA_fnSBp3L_{L_z@AL-4rQv(b7_X3N3Pd-M41)5M@MOs@~S zm~Gjs8Bk~}k#ZVacxmYR)p<*m_p^B&*3aZTsX4?#;bqcI>v^>DAuz=$*iy7PYDwBm z%L;>=bsw4^SE09}#4xj*(>w(|aAe{fyW7w`lo|wP5o*!xAq@%O)V2(_^ITtp?Kbs~ zQH@@(0Wh;)MwGmzMqDpx<4%JGzba95@R9BcMh z8KZ!Ytx>S}nqBqm(-4{xL5;MJ4Y2aKb8T|I#Pqr4MZr5d(Wpxs_~s7jMW!^_HI8kc ziFsP1gD-C)8(RmqIF?ex32~Eb`4OjPHQhR&P!wkU8T@4v`{%#TGJ*iTf+Rm9=is5S z>xzwNS5cgFGJboc39NfRZC>i4W{Wq~CC4H#tS5i6>=HSrcO$H86wlvVqj2U?AZRcyt8P8I~D{+oA5H#y~OF@`1Xo{sN zhK^oKFysD-5Db$bM3EuLmTg+>g9@LdO$?^rx;+C5ag4lAdM!}nNcdgGcg!;1;sZ(N z_C)J?dc$et9wE-9w;smziC{iGMhN*&Txq)%51dYw?ixsa%!~6cxEGCi@W-OdZ+0T0;;OdO0IAU*F z<8~re^ZG3B{9#(y^)6%|Mk;Z=qW;K!JjD-cdWxpq4x%q?)(f!$;)pigS`DBW?7b^F5OIM1>-g_WT@ zj9HqxLJG|uWWc2~z5p&jcQ$0+W{Hf~mZ4N@=}d>qzz{|+5uc~Q$YRgu;|Ke_p4GY| zwAPBuKF4_IcmwuJ-AoD6O=Gev5q%i*@F*R0N^SB}nJ0mThSc^aqZX9GvQ)oUddcRW zt-)jo($X1`pHr5W6f`r`ksgiFx~hq^vr-A`avT@>C6vI$+GKrG<7s=(ZF@E~Qx@_k zZmBY`*h(cFuksA}v|Y{~l`czb4eef~c7av$D?IB|?B&h9vEP#nFl?i>q?($Fyl!wA zV<=I=iVKezwrwnE8)Q=8Qn`CnvbTII(g)gd^a4lL5nT$fXwd_HDz@OhY@jLMAFFD0 z5m=Adc1_bflJ{unCk+u+hHl=xt|em8rokeEnBGI$>4?#S5MbFS?XoOy0lwm&=#Wx= z?;#E5#V@+A#FL*4WCv^tN6mH<9ft~7w+m-HD=2<Kc3YFcR+UoT#kyh|?E@MI>#|*qLSfi#oFFgrAgQj={n{Y>BV0JhY2eHHF!c zm(0@H{Q!64af*F`)wXs$^CjJLW_GANkLRvb2cZH9IEN`@%sGWL-$BIjhNa_FsHO%B zttja&tCx}~-CH?#H4K19j5R{mIi|65QlchRRlu{n+3#1hoVT9I;_>ja zw?}Qwy$>pWL^Sd}(_%O4f^hOF%hIA8Z-7()>UE_NK}S_1x12a?w?#2h4hl3!%d<_u z?M;r_eQx8q3ZTHS@cp|rK4v@sp`Fc0kASy{ULfpL^BAf#(d!56H2xvG2BK~AHS~20 z{GPGWO{+9t!a05QkA{cK9lAXoqyV>ABWn^laVpW4R10Rml6Zj0*(a&E{Iksk{I3d0_OpI#-EUeEn?aOOkWPvWPwbuPkB zc5^jMwn=X9b5=jf- zx?iKvD%f&vDnIqohsl`Z?Jx$`Yyh#E_=OBx1dCOMbOc|P=Q`EbrCHyUn~^5vp5#%WpWMr_^#djfy%SUdI}O?% zM1A8r0VJDRs9z_C181lB0KPx3{G{wS2hxxl3+ZHJ?|nn!)~1MttUkN z5dvNVF0kCFM&Qr3nY3S9q>soqzC}&TK{k%tY#Zr(27A0gQQ)uQIWU*#b*9GkAti=J z{f#tv^@0fdwU}P0c|L;h8oTbsjGAUvtnIUL^M=y%NG&BtT2|nWM29 zV{HBHaB1ykwFb!s(|k9Ux}BB-wY41|utByJk2>Nqd+feNeY!!dGp2h17cwo>t+*k*~ay+w}nfwF(3 z`?~eSRWbe+2J}rQjxkWuhSkHG5Lx*R`*DYVwjk@(JvNyR9?#7Z?SwI(H%e9o^b>)fF5h;C5tyR7?^se0^4C# zKCg+SNK3%Wv#dls5cAW6QER(PE??py{vmQQ(0(W=h^ndo8J0mRT66f5(gylu6+JgZ zmBF=2q2*GX?%=9OG_SnZA0cyDnqoWHA!CWmZ?nGFFc#ymVEb2OLZUeiNb}PMt6Hg|O?LSI_$2AH3 z1Rs3(WtNOdPQESGHp{|gWVRX>XDkDzx9XmEC2skZ*{^HdznaEKvz@_Shq`+Qpp?k1 zME|y>kUkZb2ZVq*T9v^q=ZFxOfFU7Wp7L7al+$jX*@5;$VYjR(bvnL;@9iI9Wm#9` zhe6K4V>qSMVWgd+Hb%37AX*aJ8L;IM0$5MT0cks0>Dlx^McZMBr5x$g`Bnp#7dqib zu0DS?1DAe2CqukhTh1C};l#3*mcP<1e zJxu7lde9tx=dEK2d8$QdZYrGEY^-PKVn?vU6kj=-G*q~Y;=yMNO7ia-95uPstg{y( zoBga%nn-KMd$jd3J9%2|Cj;g`uXn`ycK19Afo{i=(|W$3_dd{=QCkQD<7xae{Xes{ zF_>fs^&866eJPnuIgO)(m&IRQ#RN3-O#Ir~3FaqmWHmM4WbVR?Y9aUgKKXRrW>OZ{ z9k}e*w3&{zDc$)pg5KcWerST*LY?{%WvTKYD7uN~Din(~Y}`%!%nJmbiWd!;AtPG* zy-6>Ud^!K23ga_WE8dwnlFpKAgNbr=r*5G1n#lS1;$;=`Bfy=MFXUMiF^8Cgi<$qh zJnQx7rFMg5xu6=V1q^l6%Gffrcyvpd8p5x5C$M;)xjuvxwI zPSd5Qrx@+NyE{hf+bT;VSh-L3Y5!5rThDi$Ge_UW)(B3ue2iPCC=cwEa41Nle9P1I zxoGkuAqfmCqYLLpFnrbjlV~;DdrU9wIi;Iv5!SCiLe`KX8y<~XJ+Q;H)&S81lAP^E zG~ddO5N_^z``MO$=a?S~dQ8}?tMK0~L&dt`x0Qe4e)guj5AR{1I_HoPVcdlMKbN-L zS#eScH1)$d)1%F#CMISL=#}sAp_S~$dP&=JP6kt)A3ibcu~5xPzPYBonC7?PCu?BR zz(UFu5`J>7RayT*6ZT6+j}+=VCK);$ooRDnIjxMP&#`8^tSaOh#-#Lb5c{1T{5?vAR`@R)yHT(&8$LqOX;1jUZ!rSua<i6uq|Ice!BYH$TIz#nXT6)EN3Znt0fyO$`NSgR#;GD0U1 z%mA@Ug(%Un4#i}`&cE*)gf#Rzy+gJ%spuq(XL(2Oq9WSFPL{><@`t*ytr&G->(ET> z3*M5`0?D>RTG&09p=~dG))6I%`81GWxuNQ5pg~ z%x@5)7`YDI1T}W!Y4c|`3OPGr>!2O+oWb>l6s?~}EG@jqU=-wiZC572XbDM?vn}m+ zCMBiqzo1rd1hCFSwJIa=wzo+P1n>XaCk4-D$4ftWxqgXBsXzt4<`O6+nEmPS1;2NU z9sVfNZyMVY-2Ke)?0_mK{)P7nOv_0WJh~t_y=AmOae$#%&_9E9(gHS+t#SXQGJ1PmQam*6v=m=qTE$?zAFB_SxRfbIw$pp|=6 z3MA!Q0;#kPJq%!t6iQX-V{3GQRb9#j%^e4mu|(##>X0pRFHs^RNc}BEYj5@didQ+= zxe%{5s9$vMp;ZQ+VG)Z$xCB4KHezf`x;MW?OC7~gjuc}}Z>cP~r{NiBNky}{Nd#6) zI0wY5@{0u5Cgvre_c2ND(d|Q7I9X(;@m0ycg+iY~ z^x&rFE?bw+#2V(NU(uUU%CC`Ikx@jnM5NNF=oG-^4=y}u=+d`ZKWeHSZ8DP4Qew10 z@2USq-VhSBifmU>e$u;Z8pkAi=L2#4<7?e38|X5BlzVu4Ttq-+sLtsbH22q~qQ!P) zRj^qiDFgCux17Jz823Pfxr`fGCIMmVX79TST>c9w`wtvKZXd|&Nun*2s8zr%Q`0@P zj0O0jXAh%pt5^Jv_v(E_lJhmeSO;|sjZb+sAx6))@J{c^=id=&Lj1uvn%Q9yGfygq zjayAdKSaPYxyRj7NoJ!Zzs_9#hD0>Cf#i_LH{I4npJex{8q*KI!8JT!WU6*YBKVY52AXgG&G!!f0{XElKcpVNY`1g?Q zpN5A)U9?-yUnD}NwVwRW`&qrxfIIzKNVk`-{%9^vT`ok1F8bcHUucdqxixRIvB}Fy zcc>Zsku4_}oW+{>x#2_nA62lC*r>8SY+<@+{|JPhnuKP1 zUS7xZU-Zjg{9gveWuiDXo*4Y6HU$0Y2n`}VhH2|D|G~bHGHG_^sCu!klKGcEy4y@o zetElJeF6ER;MwoG64^`&>{{Lq2?-#XF!)oNY$Wp8JmpMH)QBo}ms<>n zeis^tkO2vn{2(|uxMU=6^N%M46_8`o%2$bH9j6KER^?IMJ zf?8hy{9e?cmX0?8wdt7q?p;SBzwv!v?i=jCiBvn0)U?-7PfrOedUz|H&OP3YzsfoW z?PXEwxJtl(78VMgtplqmwizV^9DfIzvjW*aUE`7K^sV-**XkH341dSwZo@rB)#pql zhUWfXE1f0{p13Xk4sA{DAnh2{hxW0V!PjoX7hb3qR8-u4W{Z0D<_rJB+Tp^c6W_Yk z(jLd1<*z^9x=BBNJUlP}3fo5qo@^~;c|(p}sVb_fCK+AoLFe%V{Gij?M8(MP@Ga99 zFN@M;{3pEDr=5^82k&o-iA@sTb&#~7MZJtQ{7s{Q!NMS32l*xf+z!5niJ77KdsXP*v{-HlH0W1o1d5%90XLK&ETW^$VU_ugbYSyL) zFn9yn!7c`DA^D=a(;<5@rAy|$^KZHtJV;LPN(S>&s%c)mdL^tB*8jRb?pom%2XD*i z2Bvi&N7lBFiBmQMm!pd8NK(da6qz?o7uGI+fPKu$V!yU#h9>~2zFlGx2e!f^lfcl& zUtZt#`sO*RjFw!3%`F;1w;}Z#3Xbtfk9;s!sG;#lO2O*ps{#*h6;!237RPEc%uPoH zgLQt+MMEk*S4P^wH1>51GiA2OhOIuSl7|XGcJYn<)S|z_`ZJ>uJg%I%dS1FUn2u#Y z(wlHlp&DUyXnwMpWMFRYLU^$vtD?MIX`q*d*uVXXA-&b{yHw|AJ30*UK?LaOq)Wh7 zYBK8!4YP?yB*EHEo1gid_BR(5ooJ^+0oZmUQqd3=v^Xs}LPCpnELmxRd)dXoA$n~y zqdC>3(H?v+Ez;Qde8fhYLs5h1NM}5mlC&SCn-h`lWfri%$XgBC(;$&K!cbG+?)h+&upMI23-1xAQqs}9DCOzO zBL9kxv_>VM zMH}!@zMnHuBBJxSoz6VQ6C~J5lK`+mNawdWPE`*GHf#?jqkK0u%WPBbQb*uS&J{^( z5ji*RKb|bN*WG?T?}nW^M-8>8^ICg0{dBoYeONV;`tW=4jW1x?{q8-|peS;M_l*>B$C*ZHL7kL|MNhUybKf6t=_dmTDAq~tBvTqi zIBwOKKiNI9p(D1?CWbUBI+BhF8WBIc$O6rx$%HLjBqE5qkPP~1X_Lgi&8KY zaZ;=m-?Z@ghLi?P@hkGkDs?F)c*|o2kNXz_G~vJ7p%l&80t&&hfZ9lv>e5=OERnYN zbn(3NsaQPP41xuHF1XejT>$%T?EVr=40wVNbvs0SU*K-5)uK3(^z?WxO$(anRR_2j zw8?i3T{XiKw(~#Jo@zDa(Sp$Nq(!n{&~HN3NZ|i#M;y;LP;TH@E-fp&az2lez`iwX zlYqS2e94EA1~^+yfx3MluQ@)D2eb2_ZqKVl+Ani`XIYnW+lbt)S6ZT8nWQyPERcoN zyo)mOndrE*xjDy|1uX~)l`dCg^=pxnHA0)^PrbSPyK7PwDmPBy+lh4Lo+8ak0~dlC z#y997Qd2C#F?38?Pz8Eo&G%G{YwRPSwMeYv9FwIaf`q-CydkT%u(PkP7X!~W)k;5y^$OAgp&eH~^B{ma$3uW;&c!A+IB$ctspwk7d z`Ix!1$*SMI&q6KPa?SE&SXWC~M+-p3H_f&Lni@xBg6pwou+OzkYa`fdRFW;Te`4bs zwD*j^w;y|@M1ftadePXq&1JrQSrqZ)F>%v4$NGkfmbV?$;Gi<_U{_ zuiuktNjgl?-rt&MJr(b$5V>w~Q;xxGn){@ozo=@H1_Ifi4m>>`n0$UmwE#YLiI#ZP zDi+Se2PL-9Pp9^qJ%>{x$scbH-O|vAtZ5>gp{x;H5jD-PzXw>&{A}7IAsIUhvL`rX zC%t=%DR9VG9$Ce>4xPK2rO6LPfrb(2INnar`nj{6601E5D<&PZ#zThxF-;R}J@d}`Sc5@hmk%P^oh9;#Sj1@=k0#761 zElz-vEaaF%^`*+vT&-bE|FoQYj`LAO`=C>(aVEO$l=G-8KFQdXH9z`4kqSAG>mkg! zsjhjk`9}C7bLn+poy^{8RU|zc+{!3&WBE6nwV;u9o;j=<;ADWSdPo%BCgarF6ek2` zwaSPURWI?pwVN07TWHWc475;IVd`2^7>yK%@Aqctjj$Yaw_UhgzZYo}q3d`E8|Zv# zmnvEBBvW?fuBr8!&xHy-6Uwi7TmNyzMluvn@LyBh6uFQiL(&uOKLm82Favy|_7gIn z|L5sgc+t>r525=S^GAQDjwPnx3{6`QWS3>%(Arn%W zLz|8ct6krki1(I3KKlm&^LLOM6V`l@X8Y*F^6*LNlZ<55wz@cMEi2NdU+>RwHBGL9 zHQ{i2(YMw`dYs?_RS;g;NcHscGBPww+Sv&c-#uZ=2J23d%7# ztULyus{~p0fu10SRFrp`0)A3hy0I)g?(2c5A1r9 z1S-Df8;l=(e_JV<=JNhSaYyl2!wWk_zk6Y9B-UI)PNe>UOLm69FH)D%E1lrT$y6!o z@r*<>Dfd#T$i2HOtHu`J8axV$Zbq)Wf7NN;Z)gNaA@>4`hUTVUMv-!9VzRJ-`VFrP z;PoBLlZPKM{W>P)IYR~zrwYbYx`|i$*s%j{&yxC+KX+5C*$JjX<{7qMs?D$Ghv1}t z`4=;Pe6rKD=alHWgr#cTlQlgTP2ks9x3Xv29KMa2`m!Rp`5mPsv(a4F(KA zZT?jP67Dw^)h>MaM=4mFH>-V_ zs@a%5#8K8!>Va>;M=P_j*9B#z(+44GNSc$?K%PfN(gp8Y&dq|>MwTZ+qT0peVS5JPu;<(0CTnSVR%x>tJfFBg( z7PU<9U31j31@5ZCKR#X&&Mzt~ze36AG@T}yPw82^CF`X7-^*ENBSLsT)0pxgaieAB zJK=`{_SXbzM&V$lZ{L%s zH#WtiVB72K+Y%opTINr7=!l=bG+B#%za~BHtO`F+?7p^=_r9dCmP-}|OUOjM|D@aSn_4KIsfDb2!B;b1>j-9X!p|sd$#cKF(0#|^2>4&R7=y`!X-lb*y5ZUamQxs@BqfbL zRc}}%%mSAd{^71kS#e*X@u*#uS!uJNneqR}-djb*wQXy-Ngz-JtHRxi;7)=|aDpZ{ z!7V^=cXx*XfdnULaCdii5AN<(NbY2xea^~yyRF^V`$Dx=P}H1bj5*}%fB(DHz_xng zXSMsXybQK`TP&-3gp6f@l6jmVv+^IM0v=8}*%rI|WlPm33RYZ}CFZ3mxgsXRsg@1R z*&`~Joy#B|7__GK0>zN(pl3}2o)XU=hIEaORg}#RzVNC?unWJ zPY3i#bu+bxoQ9w6OWdQzxJ)}$Z*eEZnY}(qu=YGWJUH%*lDq9@Cmh5`kdy&?u9-+8 zZvEsE^i?701g5GmrutqEi+RJE-?q|Nms6`j#s4~s+*yc#F9^TQ%=O<2Wd%w5ji3b1EUQH#dYP&r<$kfrZmRhbdB}y6!-(h? zmWtEP#_x}J+T41oGOtB2-2JWNat%ZOVKYIe`somfQ@dZ>Z~)scsoC1v!uw)(e`B-I z?BUk<2)wnh)Z}IXV39F99Ssda&x2n>^9u__73__+zrjn&pwsK*js|%Xv~3`j)FdJz z;?)GLrDWWHd|&=&*FhEWPW=@u66{oQJn2nrQu2y^!JjnpS6(OvXW$6pb0Yq2%uvw# zL(HI3A|tUD#=PB%OX*)0M!_Kx>2Q%BZqvK$u$!c9uQm*laKGhgHkd~;YB{S622I#3 z!Z7vJldG%8Pm4hd!leeBiz*x({4#N;z5h5UObpMcd`8JaOa#Hc?{(M9t zM!;%`&uu+|)BJpEsM>B@ZUIQ`Wqs}p%-6D&`R@6)@I3rDG z$^bV|?IvCp`}DOM-?3WPK)GqZdw9aVrrPJFZw!T%x1B4=yNZM0`2*0>>F_WUkMnT0 zvq$2e6E<@*vw|m%->ZPN@p0L%P{V6%Utc6 zeYFpwZ(B)`7`5|k?{deQ6Y@moz!89KDC)gk4a)jK=jxkyj6R@(R{UjsMYE7sR3LXd zuOG8Od^iacrzKzB4&|zVmqA-T50EXfE@SqWWe%-&1U=CyRwe;?YdbWdk%2OR(1hJW zjGwIT|4adUrc0EB>jNzB3-C8XxX63 zv(p_skx!HAY#(gFu;Qin3Lv{CME-;8>#Qlfb^x5OxagBym)7wy(S#cee>p9Yh z-b-TbUrqOC0|uHNpXC0vE&`4S3@`cTtE+RyzX%VySaBk&*JGtRfB2{pWF0Tma;rPR z$GU?Sxw~FSx;$ofPWWq`61p{%xIrOc$K#0tTac?xNd=THD*f+L3bc?-=GQyWSARbm{eka*<*#w6O6UV~imGuKVS#YsfMJQSAWe&( zO5{Aj*b=6&*F5Z(#rBxv0_oDU7#ljm3)H|36wV)$f$qi_qu5vvKG56)HTr_z$+Dnx z7rP{LIYm$@GdcMh0d{PaAu!! z%nLjv9c8_JoT-I97iAURQDVEM~Im((y3ibQ&WAum>m|C)u21g zRd=K~o`_n3w=<3){>2*Jm(;>}!%GH-)pj~z#HJR=9z14*@|52gv<<`B$G>KGk3&08 ztIvfGfEfc2-BcJl2e*+_1$`6jdskm~4 z1#}i7H?MP$ag;Qg9C~mS&Q~)+F^$~ia>{~T?~ncdi0EGXD{pJ~rhBp9yB=cW6UIr)yr#^Sg679n_OtnxoDp%_%R~3Ew znS7QQcq1(yC%KVK4FRbwA&jGX= z;_4do)bav9yye-2FO1M3hOgR>Rn-n9~Qh1xtzzVkIYb)Zr7`+op;fl*jPvYg+zOv7<<>BgvqNryO5N3OPdASWN#U=h8QsRHjn;%Hv#S6%(2VE)c?^kn5by!Q< ziyKP&9Z8c&wU-XiSDAYJ@X$ODL;KJkwyARvy7*5oa_I>U-l?iRY+2V-rOsO|INC4x z&U>2W6@ygWiZ~0M=H^wcBzOwiRrDm}RA*0@KAA-c%647ok~LC~8mks+ns8bsTFn%( zYfN&@9*_BoS)U`99J?*wg@cLow;m*NgUfmdM?5$C<85fAaL<9=izBcx=w|C&tU&Yl zFrgPJdtIr@%u$v|QDd+ZI)-r&x4zOkRYZH68U-@OFt*KX|HEDwFq4#h-%(1Yb zZQ2v!_5I`x%?jclUc6a9Eb7!|LA6=Tb}OI*3NHxGYF zCWk^dPD%(-?#@*;6`4FtUh3>%&qTUTtfEh|x|~{kGsR6T&eyo`%&vKE41PY>zh`13 z{Ld*E%*HVlI_S6xsgEfH#8ed(F?FIhU#n|}54o;>2Z4tHG5mDK-{w|6`A`-dRPI$3 zgWtX@m(34rJV`p7Gp_9;RRU!dLy_!xHb z^D6epHcr<8nsmhlh)W!$VR{!77r=?wAbH6DkrYh`Ae_OF^GcGwb;*OskCyKW3je%D*)F>XU=23 zy2)v9zFq$$rRn~wnbAqID#8eN3j=RnCZcl*%|n@0|l=WBslut z)(9~=gbc|#i^j-FUk=Nw3J&_W>Kw)FMAVE0gKtlupDrK;BZK(uV>gsYr>CoVpZ>X? z^yL5WhZTywxo<;Af^680LvK+(OSjj5E7<2fd}kI#EHGu<(*QeAk`Ji5R`$pK?AuGC zG_jr&J;Jp+g5T37dBYL{!VFn5(W@o;eSFsEFQ>HVA%rsrjK^RmiNQ6=)X z$pxeRgjv|sW%cLxYN_m4LW2{6e;vsH%7%yPQ;u_C8pL962?mb-h`Ru=t+kIad?PI-0vCmz29fqP0bD=VFgarD67&d-MPW;d|tD0dKbenbdy ztZq(zX*cnWuxp>cKqmZRZlM@agzQ+{TgWb-M&;I&nk=^)_cxP$Lj@2negPZK>41~H zQpdZsx>Z$`4zp~n)p};n^>Vjg-7hs3#T!rjr{NV1oMmUb{3Fx_|9qF8{};i0HwLc> z#nnnDVymz1Y0$!~2CI;+&59hj&-TC8gI<-9?^UF~-h#vWyRCg#F?;t0Syj34v1`+N z24oTMiD&b#2956`Q}Rnkv}cU}TDpOLq4zPR-`QLx*&hYm1OI0`_Vlw=hAiEQ&A6TB z*T1w`72g0#TuAKdp!wG!LYE2*=p>MS<_Y}sc_3W*3E-*~jyqE}e|@3P_jiDJf+{={ z_LsDT0$}2jqa*Vfsy+XpW*{o}0>H=LSwi>x{=TllCkcpIkT&tZ7I!3o4*&lb`~SXW zeemgb5D^f%joiBnQf*kp<7H@{FCr_3>O}k>yv8D9F?i`ACMM>?l;G&vxJO&0yvZc- zq8_*3M#(Vtf4k(}rM=MT^0F1+Xf-`Gg)LiLP*Cyf7hOSNa+%%NUA8yfv-bA(v%3?y z>o-qokG=i<+{wqKC2d}pv#hdhlJA0E%~O+;GWoJ!{u)tKzW)h25rNMZ7Z*Ri0la=h z(E!|29T}Mk2c#wFw)U<$? zcHQ#lL6K>vP6s$&8UYLcDM=lmG|9{xDQCE1ADp;LC#uCYYdHJAM{dykg%RVP*}n*@B??3XYz_4iar{(0u{m|qyt z@0^A=1Nw=pA}bI2K%U<~4D>2r-h=LyS~2;wCu|~Z9+|mO7f>3dK1}I6Ohu4w01U$jrH%IO1ww`ts1L9}GkG$qIRxxwLQ>}x;Q6b+%^z9&4Jd{I{j?A(FMyv$ z1YYv3C9)u}x>Mlo{&{qo2d&DFGibb*`9R`!zpwwwM1r!&#FmY((oYhlG3gPOmHg!=)kJG7`bW2$ zlU15VQm^|{JWC-GVMRdI?9Ok9fG&_hp2TSt$t;IKD0>6HH2uHcZ3gW%02k=`Z8ySi zED=Rg^@Px_05a9%YT0x-y%R!(;#W$NiU!V2=~fX0I8T`c71q$uQ1?Kl^DJb8PiQ3{ zPM&~9WclPC=+mk(mHc611|SVqPh!H;xRDfI&Z{UJ z&5F-MU}*7}*V)Idl{UXI64*25ZeK?}@}uv)ta?zv^&xmfLco9IV<0tm0EPuda~Ix9 z6R>$+Fu*q-EceF0DrfBu$3+2c)^De}QAm3Q{rup@^OtlFQ#Kul`a2QX^aomt=u+52 z_JRdEY0Jj^7a26F8D6P&lC&eoM5&2ZLcR)XcT(x2_=K{E&ysIJLMf@xoi{>ya`}4V zwgcq-xn>|?=Cgk38}Fa3#rl)UzvRDMpQ9G^1t*oENBzN+=Y#BLS_yb+HdO^F`aq2Ua)>7qkH<^JL0L?`71Ct< zqW$J;0yP=P5+(6{S;6@|QuVPYC6QY9O!^kk_>0i<}uOQd`H;Ll`wGl1{M#4&IPh zS+x;TNo(lUcNuWc@TGY>0z9QK#@+28{Ie**%zFSQMIBl{0`hVeKG?ye41)60)nHS3D--QPGQ`IOT=_k`ap+fT^aBts5bZn~J)xL9}VZnu)4)ZMFq zH()3QvHTrl&2Nl5B6{h^4pH=Oz}BQ>-3?pkehqgWljNv^Pj5JpEq^t&%`(k|QKy-Y zZKF#kl}8s^_*cAImktzH^{Vaeu5QGGsX09O+2dH0Cze4EM8Wwzm8mp7z0JsFcRYAVp zRsl5@+BxjTJ?H+@uh6sA0X3Fs7U5CByMv0;KEznWR2&u|-?_B=zO+sjdYCL>I4(yl zI(cO2b!Y6$`3wtf^MJX_86DC)cmM~=tHb0-cbKoSHBHf%{HWXZT6G8HVc{}OWFnq#|* z(Mi;cp@opLU=hAjqV+lnc$_4KGD!{dWRY47HjxDxv_xI&p){F|DS3g;*M|o5!r$H_ zRs$|AJiZCmSfXz;V?$n9a6|nWg^5qYS^=vF|HIZFU@};ELRyo&zDZJjm`T0fI}a>Em#f8 zLHIoQh7n8k@X{d7%9F`To;J+ zFVaR)_*y}>oqYO-9>;DvC^hd2ail=XjmMp3>-k&ksqWVo6vN3u6}{7&FNUw@_B%Wr zkKb~fO+Fh7$&=W@nD#5(-hIAg?r)||XNc{vhR=H`jEdLT^T2Hr~jO*L$j zjJ=o|#Si3gNqg?CC5M@$agl9IAYr-W&78ZW4Ab(TCiqGYug1hB z150w&=<~_i$3@-wGBAUy8%6n#E;o5HqvOrNUWM-GPF~keAEPN4`XqW$%QgeP&LEQF z<_Akqy>ebiA-n}|RmM`yukf{FS@BU^6@#VxdlE_eD72HObe%KeJ`l+-rFwmq*D_t! z#Dhk1Z@q^nB&Sa$Mdx(Xhl@>o!$9?!=bSW^@&w)orYDXsT83;SaIWM7#)HKWCsY;- z_e=(%h7)_d-b(9xo|)?SJ-H1XB1f87x>~i2t$&9!<-_W-OONC>tJ`&l#X`mEvX+m? zJcjZ4GUeF4hs5({H8BcIJ%1e{%8>r|(0v27P7NZt(@K<6)&Z*p^9t*O#M%sGd*SJ0 z$vEBzD>NR0`21-Jjlj+aeL?AB_7oQRmTUrGteOkjDk)0;DOfPr7si>BS5ZlIu=J(3+GG$O(__G{ckcqLQCL zC@KYHKTn~ZR%U418jD9oa$>;t-0Z-cp1DI`(4yi#t3`6)hV|BfD9^7Rcp^v%h< zgQqPliRlVb9{k432WPcgI(KrwrITGa-W8bq4Ma%_s-5vb7S@BJ&xGEq^X&wSbW-@@ zEr3JsK^VSRZs2^7t7l{I6@Od&dk~59d>h)dX%FTwJX{I;+SLA~?Hqsg`dm&_uzly- zR689xOq-#*m%-Xz63=)cJ@Nv#hRGXbH*>F$T&Y-RpL5m%8f(FjScm|0O&yxbLOy?S zb6c1K^$2XJc}_i@V7x2UokIPLfw>PJl*(ZCzQq~P_)?x>eh%19aZN1cC(&l>4m+kN zxZR*hafftwyy66T?cL0cc;X!6bKSt}QZ_hf{X;zZBi>DI1I~AU(98A+DZUw81q;9* zDp6inLSbO%;Ln|}2hb_@xWt3kH_<$T_0d@++rz@sJCdZiJE?t1ArbF7G38BATV_M^ zdIlo$M4mwtA;mHnCp*9}+M~e9N48=Uj^zuM>3pl7%%fHmK+2VA+3o`#18Kw4E*Z{C zFkngv@1WoAA}<-ig5Ny?_l;k7w?R3O3M_DK{(+w4GOOOWsT^g93n#Wv&D8+TAK471 z37Z7K@oEWgK%P(_MtUIw)t@C6Vcxcc%dtHy1b)BVYYj6kn4<%QX%=olHi;u;y=wbC z5{c76r+{!M;AR5O&cMYDCiV9?XBtrGtoaCxwVD#jtSDYWco)SY@A0GSr zH69Cv!0Xp0NdgmsRH`zqwam3W-|?*fcJ1#Ec{WD1^WlxgQee>(lRmh$IbNC?oaaBc z@_pM#L1!2K4*Wy2M`ZZZ#cn4Yvw$E~KrYcSBhqPv$xouw`Cx&@3vcpdxaU!biPhlc zV8LQ?b4UqDT9mgD3Kp6 zH-9eul)h(|te-EEY+egqvt6Ub62gWbgotHc>Gr6#h6}X&3jEhU>_5=Wp7H~vofZLX z$h0+g{(Yk*kb8=_gG!Wk4Nsl}2@**ol7%g`gv)oeA^no!k{p3Mh>U@1qn-axuwZ{S z#pvNWp9Q(p#J)OV87ebi(v>!!FqC#ZS7$vWX8R**e>U7=R+u!Xf|fCfzuQ1gD=ycn zG9kgl?u~`@$XH-P&vcBlwcrP|wp8LMz6E=^e};Pw;qy!gh*d(TZb|Q$@PW24a3HV7 z{u!_%P2o4?`na2uOFR-P15b#M-B;`h;`-8AxW9{+U~y zy*&5!$2@-Xt3I&|KGT$dNYfyJNW*=Tg;qJy#tM0L-15HjSf|QEoL?H-|Byi4dT=6+ zFG(VZLo^$CR{uFJMtU;yh7l7b8gh!$-K#0p-f4yN?J4%JvK?9@1tp_(`tXh!%+K1&B5LINMHmpijQ=Nb)8`ziSHw#IGvzOFDUcImDgqGBd6amRe`VGI ze=IqgHX>^L51oG^4D(OqltbjT$UnCWyuIQMpwn&kG5mih3V_fPfz@Ltcj!akhkw1z zl?EW$TN!)te>x2KjvQ0~o|>{NvHdLydFO(yjJ?UGmi7#|P&UeFESonEIClOrL4 zdBbN>5X{3PoD5ua))>o(w~c$^L;u9r(kZ{MqpRz6_+=ZD^qW#yj{CiGGWPLZ^C~t9 zUQ*ZR3ZVnCPKpdI$#cOp68_A~vtgQpC0poYOin}{*Y5DEAV6h1hu0lfrq=(w6OaJ}ke_zfaJ`seR z(_%}2Uv9c>8<1$FEAYc*mIIYCqh@mp5a#DasSWnZ0YaW~_uI321*@EIO#j>ia4Wix z6kuLcv9My7FYFC71X?(wvmW-VT1#&ef!!hQ+8f^>x#i1q2jLje^a_;h1AI*$3 zPj*H9zgq;jFBU;aA}0OCp^Swmj>xC@e_HE5_e@0aqE6V$q}J%y-@Wm4CuCqrVL@@?1^i9Xk74hCFt#g~V3aK*o2kFe>N|DW-( z6V>`rWQUq}Hj*<~OwEhNc$o9dA+?a0J$GpEJsR&Oct-EsIjc5;aE3j1bMo~>h=Irs z?p3GDo`NyQ%cj~Y$O=CG%Gl^LY4idTIqHu#q?$2cN#j*8(bftr!_YUh>hD8koj+q$I&C#zG;UO-my%lHa_A&rl3&XmlFvugFA2gK&0 zUjeeEhQpxtq0n2rPE->QNWW?dWCn(3H?|dr=FXN(2~cZ8)gy}kY8I|OXvut`-oZ@S zZg)Ie`52Uhy6AT9e-}y2OZVtgz?K*utI}lu^mtA836({V^h?a;ah4h{8(J8&TmURO z|0Hov8#BSc=>VnU3M6Y;ck9zD%}$|9smRv{Q$1-2hzk8wXn$q`n_{6V<9swLW5A$o84$|;VvhLQ$KydL&#?@xRFGnoJ!vFz*i=~+?; zOFj2afGBMefbdH&?gp3|3in8P!h#rQ-(AG^F|)E5LrdhX41M-UDGB>&Se zkZSW~S*f?U4@ep0S0Mp5{dC)1%$_zyZly`GGg~9#huZ)rFLM1+s|lnfRyB`(bSCsF zcO{kj(bsReF6Qy&A;(o#y#7BAC5${B-5n@MwZ9hWX)*OnIbPy2j92x3i$4Rv*F6Id z*ULJ6NN2e#-TON+5}h}3igL67I_4`a=OKn0v{!!RzXtftGYj6$jr2pK_!RoqfK(iH zU=nTovMkCWmq0Q>+at9NAb9onC%{fqBh`5=gy*9W1Ha3=={e_N?(H~WHlD<`xRpNt zN&1kN>~S?$^&9L)53AUn^_6@oYnbPcmoH}WQ#0CdwSNTuAe?fj&on!#&qZYbRt-tBy_NS{m=!}_Dcme05xWb z$DPuK(Qlxo6Bj@`m={Jc&xaS086{&gHZZ)0pJGCqQfZuu9+xuY+zo@qIfY*~C@6sm z-1v67rdhc!lgxkM7YAGL2mCxf%a6{WpU>fuZ2T4RYv&krT_!qyRZVpPl=c_eBps;& z4PWFa=LPA8U9<~429o%@LTke4cx1OC3@D|Qa|dBR5QR}X{Jj5-QKSFujHaS0RJJ|q zyG0KP=6fSUjUhyV6Q5rSaUu0Vx|&`Omkuv^``@-3OaB=adE}|%J*xf52b8SAHp9&E zWU~MEEmqD&J*5ST3eN{f61Itc96@=~fI_zCE02#YxNqQ2qEHT=Kc}`SDsqHlK zmzL$2eZBO4WJ2-egWR9$#_C@WwOJxI^q>PVX(tR+MoOF0gYwY^jeGy zpRL4E(VA$G)d?D|pV7hQ5#tI7w}qIcLl9vxno}hiWHqwZ&xv5_$5?ml+`}8nNSvGI z>ALu%o%t-RqSD4+r#JG(ARvrd?m*h=6ofxK9u&q0yA?|YL8BOZ?{ftob_v33b%0U~ z4h4Y-pE*1hENbF`G7K4CsSR%d;IQqJORXZ)7vc_$@&rUh^8+Iu{_k;Nb!dO4qXel@ zINCp%zbKL1KL9gVuh-7#Ij@m5-*HK38W#`o-hXL*WLdq34tiuEwQvPB)>=7i;+oE} zL#ksWcE(dhJomSG&P*QqOf90E?M==>i>?!2=aSNDS8-jw<~|hI@t7Yj{gT;$*ixiL zLu@z9+!my@&%V}&`pu%FqpP-z>Lhb$(et(^Lz&^kdz~V0)~uVZe>RWgMBQaxIGYs{_>Etc=LH1PmLBaaTPS39MC~x^?&moh!9= zF6oDR$}ST>*mRnXG;wrN3@5bQZ}NB(_I7<-Dncs?Ze@%3CR1S;0ki8^SU1U8;i{ZJ+Y}dBs@HM0;>~ulRw%l70p&HOrpQbomT+H% z0?Z4#>0V(NS53EW9PE0toD~w))p&>pV5DjKl?u&;kIg~t{SKZgRMf-F(#wT|?fwj6kL7ucG-`!jTMve^uZ0|u<*0&T#>|XREf>>#v5s4Z16A@et&#w|2t0>rR7hH zS+P;JS<;Q?;03!KajNhsUQ7ble$3(1$zU1h(XbSAds3qaZx=%vbe>kBrjH4eI&59o z;>W0qp*-sIFU+}I;1Pxu9Skd`q*`*B_I{iN#^g%vAvX4XONdvlZbd*~0f^{F? zvtbOffkU*1Wc{1HmxMP3K`bZ_P;?{C-w>N}gMh$?ezrYicU>lVxfI_twsG+()!X{0 zD^V*?bMFGAnEUvE`i{?MHv?hAEaO+R!iXHw9SHI$yRG>KW8IbfHXCrrawPMp4ReI_ zQwNZQCLfXH)usKN68Ss84#HDcBj!-?K(9pvKd|}qh5*5*iR&WLeJ67$1?pOr!>`i$5vfTsptxPqcd=#3b+`62d(4w3`)p0egS=J}m%w z$BD{zjO5Z_e4oC`Y2D=_8?!HQ*!lsAww_l5cb)SeGfH>yh{U_U*o9o1fw=i}rMU!xh<4NLABjg6|9C&y zes3bY#5|M96I7HpnjCqEYoa}vFo5YV7x0Xt*C`3Gq&xAo`|*|&WxcB2sCavjO|ckF zXtee&ycq!ED&;@rT5+lN$bhlRQy^`g9(&*Su{-j~QLf4$lau0Ri?gM!c<|Tq+Skhv zdH2l5BZra#2k*mvf9?KxPfw0VKq#R6TDEk1qYGg>pJ&rMouX(@(4DLE{3)tXg|rJz zi{w!`ozyyn}V5ak!1Z3Zf|Omk$QNg=`+3Fq`NYVaS9;Rii#e1Fr*cNN#s z%8x&z?PifelgE7Wu}1H8lRzsD@mVGJW^psUoy&Mw%b6}*gY1i}YZ70_!eg?87TZVx zae)o!*l>Re>M`)mW+`z9-_GI!(ax|)Gd?Fcc~x5Bwe@Gs#4>7(R}!yo&}dv$IsgS( zZ=QH%z6&iPY_>c&d_qTKa)bsB7CnMf9?z)xWT7$B_tp9AWA%LE&HPU{J$q%6Mn3#HI;#H=DpGwzMJXv8{YERUk+Cf`AqAEQa-_ z>s{b8GIB}h!caG%5#7%xLTi0*W1_|VK4e6*Gu!7UB3RSM+5Zf3f6L?f6!kLmM7XSJ zI<&xkVJgG(hC%eCs>H+MHR=W#b8lfFFEF2EO_~2lmGrp}$iI+8(D!}zy;pNl_8k~6 zB5_fh&EIeRZuyUAyu@*}kjcTCU2$J7X2a@hl)m-MiPEqAj?PGSN3So|q>!y*!=4;j ztMoo)SBMFB1k!qKz?*(e>n`}c``n3bjSN#LIQPv#4!dvL<5SV4Vt-kFAKK(itMS+9 z&H>tnwrhDJR80LET(?w+)_%Mxs|Tq>3o&si?AgmtLye4}8!{n=1?|2Lyr-Rhe0c+o@CfOUXs4KK>tstzI8iPT{ zVP3!_>lCP2cjAMF`LzwonFE%}MEP_a+5O{2ngp>?LfxsmIcAJw7tC%tjU zgxp)}BGd_@tFMq%*q0r~VW6K;0)7Nal{fcW7Y);EY@R+|x3o;V9fCMcCIu?BJm6&J z+G2*>Jlw*Lqa*v0@rb=}@r4YjouOj+<0(tN!P} zbb8%_Oau^I$P~3-6*e1OavL`&!${C0pro#P;<|EzfEtoIVg8!eXkkx(7t#*uLC7*CncuRszf>z^T@!&2m@1;s~E@A zkDF#EJg#Y!DU2pncaMGMY!kxKKbhBf$Rqv z*A-|p2bNkM^&T4G+<@h6$AqZ1w)wQ@u84#MP=*pSp1E;~-K9t0zj5;YCX!QaYxvTh zK$0F^Ge`Q;9{p~h|Xzsb9QD&r+m7cIm{&~N+>)9%WEEuLu_*;4;1lOXI z-~B)5gh>bsiD?B){BTNfaF&UdVO~>mnsguYQUV5&)5+3FMink8$&4ynzR7FZ%atf0 zHs=sP6mAV0OTS%mNJBf3I5Hw_DY{ReMJU~_-Hk;r^s@Boy&xc#QGs@aC8cK zEamkZ!PuWSgkFEp>lAxLQKL%`>eUVEby2b`Wt)}AW|e-!WhR3layubL;4k7QOmSOa z4)Si(areuKe}CHdGl;L{B!F3oA`EYg8bKVJI3}jsAlG`Fr7q?eyz`o?_bWR4O=JCY-%Qd7{&bHg?mB&@sEmc!Y!E2|vImIV!u zBOM>HG@99`SdQKmxR0jX%$!g_t9B$S?0-jchTSc|WFCX&;*Xl!F*+tjav%{t?Nk6# zq0ClPm7#IS>Yq|1ip9zr*ob=U7f}x_(bP;*YE}6`R&jJr6#UKug|<=q%SEEF%~cPegU z0xsq^3ESvu)fc7~D9>+dljN5mkUgt(xvs9xX9iI%Mjw!6&A+)NQtxN%AO7BCzL`lJ zW;Jf%i<`yKPh)7BFfUl>8_d%Y+`Lx-8|Aq^b{TQ|;_jNSO2rC8!c=zYZhcLPn3D1n z1^OqNKAEAqBMNnoI{bni#%t>SHk|(=vnH2ej|pWbW5`Sc2W^Es;!)y(Y=)9@zOJ4D zm0AbhON%oDaBZ$+h8IqvkocaMd{N-FR%0>e!8LQ}akI@0pvZ3Vcf3=^X1q56o(iNH zDZ6f35)I=5mz(qT&BJ&F@`Oh)t3wwKO|Y%&UfS;BUI8taM5wQpsmtj`cnLU zOD&^miuzfF8Y1T375+g?SSDpbNTz-|W+ZC3m;KCFZGgF5NzRW=1ErI$ERX}``x9$5X{XebBZWQ5Xy}mhycTv#x_P9pCWND!u4H^ z+9?)#HwaDeHfY$I_=rdBvZGDhF}O#?q5DgoYkP5GDVexE3ZbyzRTt#8*NY)j!Yc@t zEwDFR1TRe($wx_KLmlMjB=ac?S0|-xPs%F=s6hMeLgkU=qkI*_v{yN*aJ(F`%^=7Y z6HUS>{V`;qO_~64aLU1@O=2;Dx)4>eKcb~CppT>--;oB9)FNwZJBCmW{an#cyPYlC z)DTobxn_Hok1VXdvbCkGM^oIJUEjG}VPwp%y~`8aT=axD9r8`pMSZ^n1dUADzKoM; zx=6~CO01AYofyQzjN4x^>$Y9Ve-Fac#B)CH9SfkF?#*w{~{r61d- zj~$XuT5k9b*_SNk{;j~HA^zaPD+VTBjYVOJU6Icl+eC)#RTqptWVu6v<1zS-!6LWP3O=WE#A;dqIkK6OaSe45mC*@h6d`fmnfz?bxw zA~z9&d4a5U@taxoCeiRhEP`~fhaYuHx1EKN9kE|VXg@a;JuO?fu@^a^~*2&sF)QqdjMce~SZGRBo zrK25_HVlV^D{qWTS^0VT0V0pM@w-2~F?)i%P9n5X?Tb~DTb418wm6GtK-X`cDgvG zy&!JG0`_5*Z!wa7D9Q6T8+(n!841?5H{`!QUi;SsIqwy*ou1jc2Z(=nCV=P6n)WZ8 z>EpD=#&PMX<7{>_T{F4FW0uXDNKlV1#U2t3O}3^&+Iy{!ULv_pRNkek!r~Kj#_=4P zdn5Lz%thLPW8w-A!>8HEpC#uv+Agysh6_J%Q!h)B?}=lW1&tzT08z#<>H^ftND9{_ zSNe%iiM7_Q1sAoZo{25fQOoZ~yOQpmR5Dc0ndFX%=c@h;$=-FlyuO$W+CRULhkZRw zenb^y`BwHlyl&;|C}*~zuCg@FRhb1!3@!A%Q=F;mL)4o2bxBjuoi_3XMLoFDT9kf;MidyE%rPSWv`3J!#!% zI&ftY4wBJLume?+v6 z7!xvz8M%>1I35OPRsca;O}_DYyM|_Vmc43^0YaJM;XC_8-8`j5oWqq|*)J#2m+xd= zDaFLZP2%Bts=D39M4!VmGn&?n#x~cBQ@=BN)2Et(#&0I>@mMP6xfgi>5j^|IWUi3V zQ4*C%AWmx28;vIPGb*06`o~5-T>EMP!`$27vY+g`FC6o>``@{yFbQrNV+_g_bV`!V z-LIhQSS0_1YnXg_D59bCXA-gVt;$!~dcEa&28&rF5e=!8o>>4+h98 zVIifhzJj+lm8WapfiN`IJ{H2o(IOlI%Ay-&5&fcYQ*Sz&2h`u7G4tB#VrRP5*YEtL zpu+9CQEysbxLm#$DM(`p9kHpNZBU^iD7fe)#CZGLK_D1A9HRFKLS*x8C40pKCB{lF zw6p^SyL#`mp+YihZZC75qT)e$^{(b*Wn8OZ^FgTAxM2b0{hG&8Hk{9kbU zHB)9Hdjqj^o9PC~Q2HbIZr_&_i8rqeKs7a^f+RYJ?0~gfhWPp6hd-v~;_g*ik!g=O zQ4pL%uRU%Vt5+T&PJZF!FeliUq9Bfj&L&N2vy_*G4T5U4oDQd|CI&3^E1RzRX=O?q zXEv%52@>HTDqr*WgO3vuK!swsG?4=c>#79`$1s8rT%6D7FDBuFOme!^yL$p~4t z-LG)?W2!C}_rAM>{~zYwv!Tf?|Nd4$igZvB=|q~5A}Sq14@y(e0MZ3SB=p`zx(Er< zL@6R5BE3VXQbRyMklstA2M8sEdS9G5Gru|We*^a;A0(Ka-E!^kUZ1rl`T}rnd*heC z$kB{i-A7%&E)ehK#4gSe?}0}Am^QfM-=#`1clQH%;3#+bIuW@2c=DizDjBaRA%)_- zNH=ohbA^H~6^l6XHuKH+8+V!q!Pxx0L{#y#k(9q z6SN&|UO<3T66blV@D{oZw+!>wWJ;RL`B#a|HV;RfT{tX{TSe!0Wup;DHJ=|!(xV;f z^oMIEiE-WrUNfQwFEGvVk)FI{P8m?FKv7wEau?U_!nW3DL=D9Cj|?wIGD8mWMP3d0 z$LEpRCuQ%tK6qy1YF@-2;95(Atw(r7FvbCTA}1!%Y0h|M&!&Up@q6(< zj8h|7$`;b)M&>rtvnU3Ni&}cDFUPKaEz=7MZGAR_eZYS-w0%HJ{=v@RkjLgS^9p1) zlYU6)sfl5VT=Qik#Dh?!WRrvZBWrLjC4H*0lTDXU#8y5hQ2;m-d_A8bpW0(~so9mC zOkx#EH>|#z1`ARC)-`G?Rea6tza%@8XH{O>cEE7B>a=@5kQq&qe5ZNjXxGZEU0zoC z=hc|p$GTUGst1Jp^F1gpxUOueOSZiJEaZQr8~5l^;d|!>S7q(fJI!sCZfzr!^|z}s zK{g7PyoP{!VEw%hhEHipn8g>^Lq7W9k=*9-2ZNB4!H4g($Qd|gz87eub!zX|uyPx- z9QIcZB|~_b6C1S`J~k=c8-UjMS5>tU#fI_+ac5!L7PN$pe0d^eUbU;0 zO?bfSyA8>bidR{5;lgo2lWgeaOb$N`KBdq9>z{UVSL9QVs6dlhC`BMo?w->&b<4Oh zKcl&?Yqq7|rwIGG`TaloAl%s?hPP9ZmfoXx_GgDK0rk45433pxFM$mVaO zyI1Ice`vt!|j+nCU>TA~R+-B#nsA=^3`1vA_J2`&z zJA>yh<~tTv2`n6MQZ+S2y*0CFv|lmA3POne)GpyJXr-@2&`r$bciu_lMc@^d(#Fdp8@8BA~RZgEN zpfVK}A&1R6{;lL{VSE1xYo68CV^KMy*VL@Lxp&zCmsr>2^mu5(wxP`}`AG&DiC=uq z*E&2$fBb3?8*PDDx9Zn1tB04oEEc2BJ^8rq{r)0F+8wrG5AYBEX*d#5rX;A%9%`>? z87-H%=S)x~xR$<>^>C>&GBp&J-o6>msh@P0|^@aIEvAo@EE37KUuCMePLCL%x%n1 z9=AAGcS!k@RTy=CmOTk+)Q6yr+)Hcv_t_3_o(wsUK-rvjoAg)iQd|tlbj)!K<&nWi zO}de*ayGW0#lE@;g|=+|J4M*QWeWziz3fi4xZOvn_mTi;hT zJeDUpaCVX->V#BBF6$MdV&sQ%Xb^4Zw7M2PX?gQh6*$A?IeDFeldDM(?lH3U}} z3s?JnKo#w;oV3-?Ol}D&YFp8+AlZmE6%b_diq6hNZvgW*u94&F0)I z#&OUAt#1iahmP|PBt84}r{1Bmds_^AG{8Z=@z}_!=8U3M{6ZRt|^^rm+(z5~QV?>tuEN_u3LvlLC z;D)EV{~XUqO8tif)zn+wOhM@9q$i6?N%eo7ODC0@y}yZeP|N>>T*>7c$XM>%E$tu= zNNrR)`{LAJ-TuK#(5L6g4N zW)bq?K;S^5!WShK$KN}Ev{B5Z$771++Z=52ot3ziWA94OQ{7d3c0bz-3|?$Y35>Hv za|>8sy6D2yd!PN;JKh*6>++FbU!!-e(z3L&RSND&LGOwC?8_V)UE1(ie`B{;OtUgX zx5#+SF2qnHcP?5txB1q5XM-3;z+6H6XM|i^jCWCC&4lYh)TR1biAnh*w7w$@YB`%; zAE_zY+fdK`xObjh9lq?rV=PbYdd0h4iS{Rj_pDKy_3JrihY6~%!9{Wd=a$-b=J zjA7eGzuV=RsWtaURg2751oGrdz6)ZXr*>LUMZuERrtdY(H4u0Pr3b1)^CV9ViEnf3 zmDSro)#fTOTV}+^bPnErQ*1Nx1FsGDqXmMj2Us&DFH#xjB$EH|GfB_vV+rD8UEIM_2S^y(t|j7%a)NxT)jn%|B`g^mt4{ zKTf-`2`oyx@qmi*Z3zO_RolD;1a_BBJj*mVcgU{5{WvGO!r|j^v1Gtz01e)1g?0NV z460yVLG1Jht@Gj_G>ErC<|}-*-HO+-%r2AFuB{p7*<75QBIhXk)ERt6l4YM)WuI|E z+|sFjCcm}>~S4p9%{I_U7b6zOxc_*!d)c#ba@`!y}dUn|Ql-{@EEIkmU*bD%m= zb|S=n0~NKJxg6F?6s}2_nGg=+RV0FZ)EbXLv`sZjP=tm)sqd*OYWS1+K?Da+*3Y{G zs*_UDAXBv6iOQx1+fpPm!8$a0ZCZ*ked#YXApixO^nNBtKUnS*-1F>zS*(UQ(zp>O zH%5Xuh-)-3JCKd&*`D9+aN0B_{25`Jp4OGfkce69zk93_TW{JK5Q^|fhu2T5e#}iU6 z@-UNAvB<3&Cl|X`{`Vu{)#5FXa|sEOvgaO&Tju5iWk}Sseq-dF>knki42zeiYa9-| zEgb?KZj3DCMAzK;+;L)PTh`HSU*JAB^Od&YSyQCsu+J@*&iB9iAnuIAW_4WPzS3i3 zR)qtX4CI0#}9Kfan zn?&$c8>qK!?m2CObik0734dO*(Dnc}ftC&#T|S(l_yFWDblkg?0h_OjI@W!ep}N&YgFr~BwpHThlb!Te$APGxgc+@631)Et`=Ep|Lz#D2 z2rH2}Cr!{_+-J8#`bmoZ1C|eaf6@ql^&UF_(Gkjdpt8JnK|p8zw>(@d;#@QyaT)wn z``^O;zxDmTj2g-_(HheN|DzdqqYS>e>-McgZ|JYd`S-hle?GGW1Fvjo>JgcqIK^TA zq4VEiyJ*5d@h+rN7?L_OtUHAQ-r2MD(-zVic(hTSTxeXaGgYP)_s^yYFe)xG9&~aA z)ld2?rP%;n0`uvuz0`Z|9}_syeXzrh3a;6)3cJCJ%9}_1EC1J!b4VeUlZ@dI%ITAR z+MmI7ra8iO-Zt3M$(6dX(Q~=4BWmRU zP+|cAY2+*q)qL^kAAbbQZ7MSI{hU$hV6$5(|ND|S$%AFv+6&@G|I^pA&cLt*0mbI= z|9Qb82^cm=_a)@m|BhQk2+)vLCDB3t{~6HocZxH`lLsC}=Yp31nH>j|?;b2?`20yZ zzLWbywCT6lU$gb!pE)ZC{k)m@GBMJTS;=;7p%Qq) zd!9?1M8V}>0-qXZTvYP(Ls4~h#5T{AmnIxZB;xzyr%wKeuDP>4VK}tm@G-9~0O7kejq1K948oFKhofv>PL1OlK?l)?I4y|YGaaFf zu%rDA@Fxj}@8BI36_s}C(q7nF8pXf{F7h}8ksN2dDT>{Xz@XC*3HUAjob`_?x>v}V zMxWgJ?~e6}eH~^Nk;bm;C<-DdD7@NwAKRSa>o3HTs)q^7P0ZBny^Y;verP0j&=xqy zYMc5PaG)r{A1ok}fsCpoKo?%i4(QB1&W-{7J$b%rKtSi)<6@i;_OPxSUCbqj-FCdM z(1f{bh)o#($6hePP$E`uIVkv}$wftoCF3#X>QX{x_i#+nDE+FkSHw;WkTYKicneh& z^`G+yw*hoveXKl}lk&7#Dj)A9Z=xRPZp=y~ZlX5sPrdbLA_fbkKe_pjZx(zZu-4AL zQ+iVnTa8F^C3J|pW7Tp}gI1f1hDCSh^W}G|Mx>Cw6OIMF6P|Y&94C4mp9ZQ3&D7_; zo1AngA8S0SeKp2W@x`xnt^)VCt7}T(+t5_tH>)}Un&>)tz4hz;Q!0J;ZwCBxH+VsI zapu8F)u-gCDX4zc=4#cXyR1Ct#&lD~qhoi%Y0j2&&WYhaF|nCSTTlfJDj%@9qDlPgpZ^9GFV6$-G*~x+UuQ<^ief8SJTCP!`exj~ zJUswClS?uB_qK4p&Fqk0q;AP&HxGAy7~QtyWsV|R5~lwYbFrV?pi>dP?Uh>LI_SuP z?!UT3+mn81CDL?^cLkV=k$@f8>WT7tf$VD!(dO~H=G9{r;2m&MQl>$MdHCrJxVwK% zByUzAC1a0C^V0uyIY0{>Q5tfqugk_7)&9u`rYHwNZq`}PxY^~2NhS6h1uq9NI;`?O=zI}myd#DkPreMh1-jl5ii0EQgA0zl~c zL^6ww9dN8C_iT>tvrWLwh6AXtq(G|uXx>`~CgtnA`0rh{Sx)`Jh}>p^_--$YmuO4+ zUDT37&)yd}fpzb2Lc^>i&Bm(-Fk{iHa+)y<(pp_F?<+D#l|J0uNi4^YVQ?%KCoi9z z^!mSEi2pd1PRy(}1L8|J!$$vi`)}6beeIU+=E~|jVUxA#RK@-~SHuN2>5(+mqAA)? z@!l(=aQ6)y={=JTnRnDB@U9mU5T_*YI)S{Sk1;G3-8(22OE;U-NEXc(AO5SCnjc4B zz(s}3e?hq4JpF;2l_`?JuTeZ)safl16-X$1xgUu1m^)Y8nn&(g>ACcbS1;E!>|pnC zM;QpO88X_D0Nd$Yp|uhCx~&Y&NJGb?G&hq?g3MyPoi1(>VtpWP`QL*Qf_Pmx(^%j= z0Q<96?O;2@Uik+-)+h+7x0# z30$O?uPm3V3NRmA)5e~lXxiH^Via!lUmXg(2GP6bK0+;P3M-VVN=3c!F&a7fFcj4t zj={J3d6$@n$o+(p$!)(ChP$LAJilr~f#oG;govdXPSO0UM<{sux0^5zWF2K(ouJDh zlJi9b4?@lQ`!Sx-5S8VO(eVb#BWnuva>vH!Mg-oL@n7bz zsyA1byx_Mbof-=H!iNzFYAQ#VGP=rg9Wzri z=lzfPw>#<>zFZM-G)#CkFxykmU={qHD8LZu0Po!nd>D$AW|VqD_Wn25E!UKP(V4BP zpN-LllUJZqWmZqF$6-JMLE}9aRep(QlZ+Byh%$_kD=fMkhf@zY#BL5Ks>op5OuAJ;J z6ZY4lcYaCfe!fY?X2p_a3Q$F~+aNrZA^6|>;&{~^@!QV+-_EjeAtw6)%yVpwY+RF8VivzfUrpHU{`MVwyKQ*e=a*Z>gYhE6rD(hnn zqg=9+|Y3JE01t3+dP zvHb+A5f3YEgBzXia4oFDA8@|z0)jBd z-Ke3{Mno&2TUJXyJ-*(_tS{>R2TnI5LLT=k`jfkTa)UsQq(M-PFl;@S*Ggu-m!f`* z0p~36uspca8c)L}V3kp`It;`Gbhm_2uOUcu_)RT7{OjP$6s)3nL9+d^v2A7G+NrQq z;Ta=}lU;dJ?G4A&FBDeuq4c$F1-S?f`NOtB?A*_~?%~XMbt+=N_e{=;Mo6JlpKCI!sjI&jCSzLqeIj z|59srQs}vsmm%4#Q_d65Gamob^|mtSX?)^cSUqx~9>^MeR?P_*Y`LD(cFa0bnWyP! zL%YF$o#s?6ZZI@!yZj!WE0Oi{hO;TOjsPnxpzm(u3ah%;%;$_)#O~%AdEb z%0Zl(U&7~Gw7Dtt5K5tIo_Jj-n&tL#qqCb9VFK3qTUc^RE^{5ntMIFVrZmTDr_a4B zd%aHig-a90vTQR7UA5tylzW&J;#I5mq zNDiNIj&%bZblIz+?;)@~-f30*jbG43@!j`E#g2t18+)p6wfS(WW#d~gTyL7}U!Y8Ff+Rl8q~Bd%xG1&Guls=qeX$VAgNs7! zl^!Sm>M!Q<30BzbYj5+9D+)Y5$hAnfqn1@AOa1yg2httWvyJAnfxWLiWmh#z(`Mc{ zwg=isf{e@1jYpTTc@DCe-l?=6M@S&yVp^GB#)u8Q=aJe|>BLpUPpo~*xv?3R>uj5= zyOkbdV&K6dYE~bleCHO+V<~KcJ_bnKz~RS78uu?`LZn8Prg;=xxG(V2okxi9CBxon zGhK6!zgonneG=LAMB|CmBvRYa1Y$4|62O~Y-ioPm%QtR|(_@Vu4ClJ-vMaJ!`$^ET zY1fKaiHZ!VnL20T0Y60{<0`n&IrsK8!5kfZHzgup)W}*YVp1iJ)phww(H`5H%=~_O z=b)M)Sae|jaBmt~uOvnBXEj(rf=$x#HZVmGl|s``PfQ?Z+`H8?fqq1cL8G1-;5wZ& zH#Zm9MUQ8r&MG~of0!!y_Zcb+*h(EZ=<3e$qY4Re=Zk2jZ=QwSj7T8y&G+SdS?RQoZSqKBsTu^khTU~$+uQ(S`?bLGOuok z#>Ft7GN+M#LPB-WuLk$S>*$*z1xz79bH^&4si1(=_O+j~E%Uc~Gg19cWh+=B@LZb+ z#NU=G#P|W|UV?QaFs^V&MIII3}!La!C}ZbMEF7P&)-YohE>@dBu)6YA=oH9Q&*rn@iScQdGQxFPUn7h&_jk`}RrVyFGp6cl%ZL{5x1}f6M4(z=tbD4&K()PM>|)+r%;uD*19@B-nV~<_SEe)^_qH$ZB_O4o3@melQTJo zsY$O7r2KSG>aEIY4&P8hwf6eqYI8fvr_{}0w&!7{ufXgp{9M~%#+7`1W`6i~Mn^Rk z)@(Kb$I(W>L-xiPwfeRLB$M=dcc^#bjs^-!I(g zSWOU5=CATb&h-6K;ap9S8|w~Z_fYd`)92mf5CnTh>Utfbp(mf4j-|IPgq$R#^9=^R z>CQ*db8V=z>r7=vl)1x_Rw5IqE(v1GTYm>`cl}}OA5p^A1evP*a<~C(w_1upB3d*xcK35K zssksXQ#@J!w=cqVf51@zlKT#IG044Vb06cSx<9Ih9oR8QimqFT7=hpNny$+^Iz8UU zg^h~z|8ltwKAak#ce`21spQdtxc`wiGFEBY1DQCj#A0`paYoE|h>~}#jvGD@WZ{3vtvAf?ll&fG@h5mv#C}Tcae@qVduuWFugaU{bzs~t-a4!w;3!dt|oG} z>FlVN?dj0Ug4`~0T!{>xjW{^?dA!PvmHor+Y+vB zQ{{prhn@PkxueRc+}U<{zRvJOz+Lk#kp8(?RYY%5;CEA}U~(lWvaMt2E3RIIbDDh9prnlx4@OZ6me%((er#>omev?pgsmM_->C)j*Iqr-!V)v z1w4YU%DN0aK5SYu-Ml3lu%b!N;JbKz?wxBmm$Kiq&(hGLlI~)XKKc1)+BdFB(Ii%S zzGjaNG=4)`RuOu0Af7cLugvny{ zl+V^tGGF8$RzZbof8H&MHAU5=mc6j6ou9`=kfIvyLmC~eY6+RbQ!G*H1_e-NdCfr; zom9Ulzs(ct?@<>&+`aDRV(x^3ps7hB6uG~{UW)<;`iHzo1!H-nZYXtLHPhQj9yav* zi(Iwk7(roIpH^DQCnS*{3V{7e?u^)1Oh%ihf=1GYD*GSSK-JGZCPuD8R4IQYn6I_j zL|oO$&q6Qi2IAvUuk5+b@&O~(8!r+Eqkm{b$svvG3Z({qsJ4zh6z4@)7-gzy6X5ummSev;$0J(?7_*6CsOj0B`PowsSS;oJRBWbM|KR0n)J^(5J*mlq zlpb_z_K)n5Y?_PJs}9N+0Q1dY37@-nhK3U=ue!?g8?oJE9W+}ODgGd*R?`)Gm>XDr zi6393#|0Ss-#xOtbw+DCaqn?#uDttwAsfJ(KG{|K-oW2A)E)=2bdKPqDh~YtPIaw@j*+G({n}2o83nc;vF$X9_+#TUG?k)TIXY>-bk)q1;=ugJ22^sOG zTt8CJnMZZzjhYP^g@}Pop*(yln({i+n{P&mD$6v($I_%*TU*Y2_l}X0WEX>H5!ZP+ z$k#^ALaaedlqw8RGO`~P-(#**szf41z{vxhnx3WeZ~cudRj)I!5J8jfijj6UkpvdB~(he(-#=bDr)h46$BxzX%YZMn9v zh^Wi5UC;}0zI(B!k^CgAqPxB%Ad#a*&G1}sOBYjyj)PC)wb+y4BF)r+^YAD=BRKC3OEj#BGQWHm}>&r9A-w*4*4%yL*h zb`v;BO)e=IU_bSIyw`T~fl=9Dwz{eK13mtA2519P(r4h8zMnYbJ)__Z|5+Z|lVvM$ zaHIIVKny-2(H;Javj~^&SYj;8U> zLT3f}c0o2>EthQeTr|6VY`yYpkJK@HO*pg~lrqVEalY+oH-=hNt}(UB(}nn>65$En z(M|q2;pqVp8FI*3M$3_JM&zgic~OOUE`>BnK@fQrjUiPP2}YFMKK~v1P3Ll{j24Az zFQ%lBrL^VMCFaM6)j>zq55wcG-&8bFZBum2iIY=}fUA;bDpkRc6#0?ls#HAA$4fz{ zwtT*@v38YlB&qpy>C-T|KuT8z8JUjz^DlC)mnx1b9Q>dkrXpc#(IFaX*ROuhe|2N! zz}V?e15Bb;fV~)LqJ31-s8U{#bmO zR5)4DHF)#34J;tjK1?az7KK;dV(?|Y98X7Qw#vwR9Eb4F?yw~lf5?TsJ!5E-6y6I9 zmCsQm8w;CkWwujWo_jv8wC@aknFwNYc%bxT?6-_>i9yQX;|3KyZLwtp64Z%dNb%rC z@xM%Ut;$hLXV(Km%8+KN$yo>~_k;cjg(rkCPzC&v8HS}avD%lLtL;ei3@>V*M)^En zI}dp1Z6gVe;DMT3jB=~MkjUZ?qP4B{$RhVNl)7Lg)3nQYN^JWE4)ZW@>k(q;?p|FQLul%MevP!rVjn6O ze>?VFADpQ2n)y0rptByhv4&+ygQa`F@-wP=Y3_4M%tz_!;eOj-=gW&hrkx)uk&$-Ay4n^M;03gRn+IALN>I3qI)@3?bovTo6{ zjj@hkF1Q#3rZbepY&?bz-9a_05_y`%?msR`1TUgnnJ>DGI=#u93?1Y_--DD%?NNUn z$YU8OO)13my}Hk)9X=aD7A;Ub%wNOXEEXfdZ!Xb#^#y>UG8hf`zOu+MO=HB(E?p+LXuO&Cj?TxDaFacSp<{M?|_5^we32U z9jgX~V|wg6?(0a}3i8RlwGo3i;rE2Qmc+Uv_Iv)Xf6Z*NI zkw=LH6jZkSkYWV=QtEoBT%a}YgJ5mV$Tnd&^>Mzq;f6Xvn&ofvgk4q>%az4iP z!6f3;yoi?`+ptKp%ke^%wlSt@+q>Z$C3UC?nKwPHm$rAGbY^RwF7lrCvY{T_P`*)? zlS{oMb36rFQmPtb(lP2>jB&sq8>^lhRoZ6MquoB-7S!Dymz$-$yZ5v)IK&=n9n>H! z0UHZx&d=w!SnOgh%5?j^(Lc!Axa-Ov5?CnAZ#e#0LOH`M#X8h6UF%05?3Vb-mm+}Z z#W+iL1snYPLW>yO{P@8#)ZA|)vI~6&>&1o=O@#ZQ>W_)G$@)6xdR6P3w`Q6wt$bb% zR+ZTkrcb~-Srd}JBeUR?O}V=MlQR7NE)q3RDb+-)#BhrE|v%%)oGzB?;JDstZ3JLgeyCK>SNUQcSQBDpI?vEW&MZ6)M* zUQ47PwKc54B`KY`^T)KOo-%ztuH=#K3ZtFMi&TfRl0uC!Lm|Q!Vb`bv&{);Z=;ehR zY_sAi{cOPiW&T$vGf zc#AndYK#S{1X;oz0K`o5-&Hm*MyXp=0goJ;NbE12ZVP1Gs-79!SO|D&H-;j7z|VH1 z*{l^gsySpw_tVCH(`G+;i;8|~ntIfpQjl?Rtl6PNjS_i7gnSjbz-i>d*|$e`Xw|NU zW{5N#Q&WzkP>qeJ$A@u~@oXKWH)ZiXQBpj_swtE$z-@ki2fb&sX7s5nY`)A_yK9?! zkgmmTw!c4d_7jr&G{{9;bs5elxyvnJvb<(?*euYpFxe48dy)`U-Y^VHi1Ul3X?rgZ z`=sr;=wx#xlewC2mq)g@!G}C)@fjA{0bhwLPF78fmb19o^Ie?7SPo5dq|&$*Iryns zs)g6d=DBMNr*U?@?(62k2kf3*<|nFe6Z;Hx%m(5p%01SGIYvbTJ*uBMC9(_cE9c8x z7hUuv685I3D+VI;dsDCa*f552?gv-bkMeSG6n?bV7qc<|u$O%3{+D<@8sfg|T{abR zAGDX~MHc7>2bn4^o-uwAeh!W5eai_Xi<|VJ2J=XRcvj$#1O0bN^1Z||D% z-^FsoJg4z!R75{m^t!#@Rw8s+@6w-)zprSeW6m8EW3o0bTr;*k_W%9IQS`*A%2C8G z93@PlGIfd_Xn176Y}j6WMqg0HWioDR!I4qeubZL5G+$cxRN0q;)j4LFZLt;7q8w5Z zALK`wtm7M^@a8oo4=poIeKpa9Sw@oRprh$*v@Pi2CIJqTtRKO3| zDkFUvBR9BOX%hVvOk&H+!yzB1Tqfmd=;85|%{ZHy{n^wr)1$eOuTeF4rF)hkS7eqo z=|}tT^GotG@2Ztqg4yF@q8=}cUvtcqWSwtLgBuHn%Q7uR3&M0bKLr2V3!pu0tT*_e zE8}M&E>8DAx|65C{FD)=Sk6ab5-9t@@_?tvA~}xjjFG zs`-ky@Jp1`a=mC_c!9OfnOSUBRW&(UO4LMCnObUkU2lHe2sFOybG~~zvi+u@v$cSp zs7P8?k8;&r2)^QKJoVv^nIvvqFRcOeU#Qx7?K+4->LFzST;4}y1IJmC%%L*1AD8L) zn&X+_lQxX+>&`rWky^eiL1}Ipwk6!eU0c>W^K2; zB#&)@E;tS~|518ZXF>g0L-=PKKTzZN$Mo2c9APas+3 zC)WcTde`vmw^05x5-@&34vS51jH|}OC=NhPTTl#AZ-fqelU`&odInslzD#6Bsg6_9 zDRY_sD$QxTIhbrR>l9SIS@|iI7`hBZEZa}5Cz4vl-!tdY>tuL2leom7oxg-G#M_i# zwcgKTRv@4Q?HHc8VC|kxFFh`tjtIG*2AD*N{yx+a#RrJ!a~ODOaa%COU-Y2;6_zGb zG#y=x+nd*@7G$<`5f1YBn31bJe#Hn^j7wKI5RdntjL>IU?9xqnWiTFEwQ?I+xoO7- zrleB74`4oZ`%m+l<0b{2Y+chT-5e&oHgfbG`CqiQX5}Ac>Zbqg;rd5`1bQhGT4mr7 zvW{6mbq-}2JJKhZK;!Fv^>>#{jmV2p)cG8&y7@l-Ev-#1Sa3ih@(qdu7$B zW%yCo0gPjN0h=m)SR2=)uXT#=9b}bA3e>CV%S!LB)ca#7z$t0^;N z&c(v}hXSnw>2%WFRrV#_MURMwRAsj(tFC}i8tlrEVmujf62C8}E^~N?W=J(`gVGM% zRk-7n$a)a)u^XYzEgh?+iMGtNBktB;+lz)B#KL33DoKGI3 z$hKe6MHbQ6xKw;nI&t%5Q}SwdUV>%Fo5H8$3!7PzY>g>;Lj+8$e6&kGfxq?DgP+S#Gskdj1J zv;$sJ6l|gT-l7uLMpQ47yQl={L*H`ZKj+tTz;pvx(wh7WOJ7$@! zlivwy`V8vVMlzpjTwAxiVD1ZQJudkDEVD93WqSJRBYFlKx>M`Yc!kwC*CZ#Y5%?1` z4f|1HlR$i;z!At%Zez>3O*4_-V)qFS-8kg4_a$-Y4>b0;K=3G0KYv!^R*)|pJ^hG` z?VC>WgYVJ%U&>iBC4-eK!lELMKVCo&!oUYV-q4od7X_+%o5#ou1E8N*aPl-8VA$`( ztE{UE0SS31QqXpye0`SIGN%o>({-LrHWXF#gGgVV*cr&@+*}IhT+tvbWD=XTKAWkv z^0i0n$!{y4Pru9f#8{votLw4CPa&uusvMU36BL4^zOCif2k>aJtED=379Ii)_TTs=*NWchHe#|ZKYQVM^;s2N?amkznpVuMsSE1&~Wp?Sowh1_R_ zDRwc3t8)9#KPyyu7iXp#)g+}6am>Il*V|I~g_i<Dli5m2op3`r~wvY3RrZ4p#|WYbRX#&j_p zCDe(#sW&cT#}{LJS1IMQtlwdOt9jg9WoO0kEg~;+c|^#sC*~f{bAKwD7ZSCTGCb>UI@aXtMjx#K z=UewUE}z{5^_1|!tq_DblKvz+%J;KLP6+)(n+?RrT4-rlEe%$*_$$LX#Q5vVaMX-UifhYKr@XO9Y0E>8U^Z#h0F_y zM)u}rf0x4LSb|f4i=bMg*Oi4&nm863-Pq^3u4>+=zDAR%uVeB|MBXdA-eE+;XDf~a zTPom{@YA^3gTdW8mx(jm7LvJiDNUg$OUGvJ&Xi=E0lRVUvxe^`?gQUliO$sn^}b5g z&t?k82@mcXiH6)^`bAfP{-Bb%=SIF1NN1_c#ICfgTy&AkNL3K9l;9DLj3M1t@?=Ld zq|9Zj=oH-2Y43ubqRX$E=V$T9Xk6yC+GBkXEsu{x`scWjZO1ho^e(Dh%B6;cVqW=3 z1asjGB*L4sXp^B@>}Zv*>~T#skvCo6Ng3Bx4uI=D@HV18i=mFVIj;ESt=!@$ z3a!OXb2%tPJ~6tcL1&U1ptl(4dsn$QTDl@|k^FU7TDL$eEQj61-IFZGe0^&T(P9_{ zG0Y*8KA?RG9d&Qs#o_Q90?)+h(oVJXYdt0wUS87rgNVX4oMf<3Znx@qoWfa`NhTE){THeN^Y_Gs!zKhuDI;dK?oZjp|ZNe zYKJgKKW!Z(WKqI7o-VUm97FEO;~;irxFcFFbz%+HiN4!QnFd;nWV3WY?W1DYPVrem zHAqHZ;Kunt8Z6tXDzdoO0Rq7p_{|_Eygf!A1#Jm)%A$A%q96jTQXjd1lH{_Cy+*O! z;bt|)r;VmI^;@VyRg4I8#(9O>gLav7Jqp+NW#+&6Rh_&v-kdMMkWphYzXR`E-8`&1(F1aAOvVJ<8(oKHQ(IbyU zoyID48hXTOKXQYlikq_B_0|1x>Nn^uLz&9c4G+kaz-7d}hVAjA(xM!P)=6WIYTL;` zTX6OI)m+K+ng!{V!`eJF;79&d+{x4_m68p(hVPWol}Ph$a9L33wZbx<^1rEyi`=Br z)Jo@->y1xj**;1GWJh0Wn8Uh*#IcYhcDqW@%viPfW&q=;vsF%B@LzEG`Ipz>E$Ih6 z2P=^i0cf*<^enZaME^#YL_*>E!7rDo_B?xdu=DNBSQW3uFDAo%CY`@bds!vfLh9ri zW+UoBO_UAEmkU+L$Aifxlr69xMbh93xJouW&9W74A;;+$@>O@)SI{?4gh~-4+wLbEkH=ktq@a%y#Gh)DgvMh zonZo`{|q=_3jU$aO?6_Cto!Qkn!|q-vhSh+0KsLhtNFh*$mbnja*iyFV&ljEDZIZ) zvcQWB4K(o<|0i|8&3GLST%yx^60<%3x4AWxH#50d(rL8*2WBB>1MrXkAAXH%bXC52 zQ|>%s;^KPei3aI_Zp+s*;~xs-8m;OFG&>|Xq_1sS9uWtTBOA>ue_?G=hk?>Ngn~wCkeB|v_@Shlmkmnjq zhe|?Gtix6SvVe`1#R*29l-YD+268lQr8=+tLvbufGEwCKuAcHVmIfps@B8}{bATq0 zey01PLAxT^MAWXGe+ym>?)N*kNmSqppnV>dqx0{v0WNzk^p$+@-uWq+>=dwOjD15b zBAA=zIX)=~Z@!IAeoj%K_~IeQ(b9S3$Afcbfev|abLVcDH|GD)oQra#n}#*cmROzx z4b%!02-wKw8VpW&8D0xJN2J$`brV((|{$+y=x6ZF^k5$RzB^y$rrQ6L3c^IP;~EwS zB#&UvBL-$<17?FMFhDW^I1f6TENX71qd;7A#nmn)vDD9A+VlGc+pwxspgJ}A-kA5V z-QqueUC+B)dLsx(+D$%BBHi-_qRTKqH1QgYZNkYPwGA*LqUVpcYo4jmBB*btzDCAZ z`FZ!0PABg9r2Usj`!D8>oMh*1|K@mQ{$$YE$zBBYv3Ky(18{MDnTcx`pA8UepmuOB zAOa#p!w>WGMohg-iKCqgFf-tTN6dB94meJ#=DD|(7CU*5TUymp16Nv#r@BQ=v#D5n zt-9VxoeZcN0!QmohDXJRLuplw4*>5QL-Bu0D1m-_Px#sFuy?QzW z3%p>#@jNlSOf(A^RPXL#a0&wKua^Al^`YjJaP#lH5n_h*0iM^S=k z&wFxG*QT*j1@FE=&oeS!@A(}AEmnZBJqrOXsoG!Mov>no)maaYB{-^qo2~Ca_jaRmGVahaBXl4$zLIJ|jmM>=)T)A7$8D9kT z-oyT4SHlsSZKf~hduudc95-6}P8!0?ek9wP)ErwkMakaVYU%8NCY*;9P4JV$cEZUx zFAU^8sblY{jLp`(^&^Fy;xP-MU&o}g66t+46#Ly8w>M1xOdM6hxAXPpo}CfNC^hHC zOJY4h5tw!6REGg!Cz)CESA5?-`_uEc341N~BZ$nT38pnEEXO5s@4V0V zIcK7?-Vl1Lj~D4M=Lrx3;{5!`G0=Dc$ygWyQof&fK!hRI^;#w4R@cK|ufrHxD{)tt zYw3~wtatUNA6OW_r|4b}g-Xf;l;vX|{B}^#$iKWjN%*ecD>7G>uYNJ-&|Je|V=61V zJ9Q*uyk70H-w#ye`zjtRL>}PKgTusTw9dgO4Ub2jB#u z?L%vZ(_9v&7iXnkKcQ{iIuvU73jL}!K6?JWDFQT^tBjZ7(k}Qdh+Fk{{d>QJYK=mm zQTwblgZxBLB@s##E<>*ER~{o@!%r40Npqw7wooA66=tSIMCl(R0(-7gES(L7u~#c0 zesrfVhbt7tpsl#|D+gPxjNmRC6qUILzB>ia-Ye0=-zLWbG|rZ*X03PD7@>~3UvYX{ zh##M#ImRb2h~>%BEwz;v-r z-yCEorOj^o{yl<-Y-)NF&aVyBaGR`O7*9u+Z$dSpIt|r3Ddf@qT06lphIH_9f3}|X z)NS+=+ZkJ9Il=w7VEB-PeBKdn3j7&tzVx926|v)XWe5wgZLsg{=~@lAfj&Nn@*R|dnB%pB*@TrrpNU&8_b&DKa z(fgXcchCFnmG^P&*vSS&z32=Y^uJxEy)}#g`{%c;qq>1@H?}Ee9C%o@kzKy*lq|eO zfN!�j^2O8P#*q!fO`bwhF(9qqlVXT$bx_x#H23 z>b0Z7qrXRh?k%83aEa>vY`g{lZnjYHAb2oOC}U3W>(Hu$>*&3P{~3YSfXoHI3Cqzf zAFm&cFxO6KPNEhSaRMIQNZ1e^;=J0$;GEm*C(~ zYZwf-m{ld|;58v9-yX>VW}R<+eokN#X_G+-^{dSDG#O(?=dFUkW(>Y|_<~LsMrIY% zz(Pbw)X93x12c|&PN>$AB!TAO%IiiB;QVBAnhq>?HHou3ex{bllU-p`NMzg9U0OtQ z{D#J;7}PPoLax*4KRKPrslU1JiA^s(^A^sFW@bgfzjuP>iY-ausoEJs3DzN6d**FI z{>q;OG{#G7a6L15j(j|!x|&NEsz63hj_Q)eBYK?7bv>PzpVd&d_~;!C7Ti%M;UPi@-0ao2p+U>CkrGcQp%70;4b>YmzAeq$c{?7<;Q7@qbL^)Nyhx*sN^2m!Rt)n|P zA)O)yVID!87wXl%8*%q1!krVCu`ID+@;L+Y>ikx^@rk}emW|^fc-oxgm1KP{e@0^M z0N~5ZG!$?+c)IcRq_buqc5}<9XXij49UQf!5h1W8)0~VxAU?$(4aB5mK3&i#ZP~r2 zfW^5^H3!`pw%vFWcz+h*dOk+)`S>A`8Pn%}j#_%9ACTGJA=F7o_ilX@m!9k^r@r1- zJhOXp;X&1AXW)6!u)-A+u+%~1#)K)c;=f@f?H5VzYqo@6<0o*)!$1IdVgzj=rdUv1 z08hYerU)SoQXeBF*Sa|m)-AKmn}Q`54Kw9nFk*6y1b+pW-~|8~BW9FzYUd05YYdy~ z3Hc;4Eh3}%m!T9|D!|K?%BTwz;3_U;DJ}ev;(>hjZGL~5UqbE6PNdlug@4JJ$ zJ$&{EG3p$2sb5nkg%K>W-=L0#zb-Kc?`hkEF#H4F8lHse#e}R6fz-~gP^V+kGE_^pOorQ>>k!MD#2>rK`C-MuS!N()Ld&KW|@0(xL7y(dk=O}>5|DQ-+KToz_Yr!n)o?Q6rt`)gd~ZFP_ZNwl7H zkQ{lQw2`Y8$}%%5b1E4}B}^I@1vd;igB@!}A_UXS$Z$3q$!=SNzHq4aT0|5cB`2&E zrUU3XU0aFep_sJNrNG&%j_Z({;8E6ujihP=T|@yP{~k;!aFd^j97W0Och1S6?cbKI#ZI6_n3NrJiNy6GryLjj2s+G7pAl=>7uPV;ZrH~#Rn zb_!=TJ02&JOthJAqS~l=Rb9;Ri}mY}4`HrPWc8#5WWX#rmkpIZSQX!`+uWLp|LD|R z{7tym&t#$QeD3?22!JN>p`3_(VNvL4u6mA=qt>N1{kb4QZr@?wcfWBzWItjbB($9U zJ(&I!i)5J8;By7c_-+!VR0aC9O1-8m5GmizDs~jSpw{o+EBYQ|`WxdLU^dpQ^wdNY z$nQzgJHot^r^&}|3|uk+r2N8T@3b=OtB9D4-vO&%5i`b+<~3B|N=SG_Ni)5Ln4SFK zl8so^aYi*Qi@Zdzs)qERtc*|#OTj5VEU1&geWn;%jp;L0+V1IPPzLvD;yzUuadKuHc1h0qL;`R#Dd;hLrI&#+#AIqAvPO_{FgXkAwZq&bA*1x(xAo!eZjexPDLNu!tYQoWx6IzS;O#+;%pz42V*g6ajf zeD_5MxwtK@i%s+#bPjyPcG1CbMt=$du3ip)U{q*`2Vko{uRw#XD!g>XqOjvxddlF_ zK=1z8$mlVhlza@gADtA-*Sc;pZoW)S1F)4QlHr1d$jG!@*fiZMe6~uy(z*YY{iT`r zxf!TdCh~Uh?ovEZpiD1*|lqxr|4QXMJxR4Ba5- z3kOpAwwX^Uvp#P-*uny`PdoSHL@=G~j$|~fH2e<#6vGu)A*|%M`a+X%TJEM&Lt%D3 zqSEWAl<*97Uh_6=s_UO%P0Olt^kh|6UgjTgNk`wdOX!|bZR?-K4aeJ0tn)SY&kqZb zz}xv|a-GM_jCn}6T}bjd^(zDY+Mi+Brg1-=s4PBWEs^ZC)cQgKCCdZ<FT3RlzWDPTR^UdxrWxm- z0whjZ`@!WN!%D+S=^O!#L*b8{=t5kc4m&rnkioVi{e_Op$#_RuRCD)-B-P1$Rv*5i z-(qI!V0saq<#{yQ9rh|-%3hWJ3xHnL%HxA5lZDFL1#?z|A5vZ9McRbs!~h3G3ud?`YrL z)767dA@;Zm?P9rE#Z96KOTaOil=W_+690-QzP~(Vy3!lsT=y_{Klf*HG483JJs`gm z{Ke8SjaXG0!uFpmyvXe|2Z}TMSfaQ32J<(2jL%p;O9;^8c@ZbD7wD}`b4mI* z>QZsEsm4eP!@@P5Z8N4nd(ttGB~vpTz@y@X%+x zF(C3p6-GFdL$8i486Dv7d1}5+QClrWqVTyRqr5~k0U^&iLUR8qJ! zO?-@}CW(4XJw`+7LWv^lJgbkKO~y2?;S-1533f8C(yCp+>g<*|>y1^h7pgA{V^EIk z{jsn{zjV87z;rt5ZV^<=V|?ifzn~Y61FkvUMa}Jaf>dH3vV`GOZkCX>G=YOyiF@Ud8XtCreYft7Fzhc|y4#%IuqzF$+2L(3&NFkdmLdNF1A+^NqEc>8HdV0M;{L_)pZlAa7tJGV z#&%U4O;RMk>B1h-h-tc^RQM2&v>sr%YTv}@vU8+qbs;U6n`%7K9fCH@DyJGaZ0O-v zr?dI>kiTsgciaer>3{si&#R%(NdDiTel-`xd8xUS9kH$q#KN-v8$FE6boGOV>C!@+ zMuL9n0rtTMn)wYga__$~iE4I*JYm!7=$zq;)w0irBcsjgw`brS8c24?b-T!M?@Vk- zVM9_c!A@A;D~stI3Qz3#xX?caV~x^1G5u1zxPmKlcZKfsAC!bOj_(0CyBJ|B**3)xneP+^}f&_ED3V~0!|D-W^OTBN6Ji|Y5bKHyoCKP&Ck zwLiB<24UmT?4v6quGY5dGf(&Q>ULLvf3j7$sCD5@{Da+oP-k?`1K>?i(_3EpkMcqu zKs&>h))ayT@u<*1+%gy4RQ_m@1(_%?+-5k1!x73eG@1kMQU2Es2Y+@i8hqxBV5Hqj z1IpL)d@`&|m5g?$2RCx(z~1cPl=GNg_eUq?(|oH`Z=D@KKbrIgw`?>5%ct`ymf<6s0sHGowqk`LA`x)Lx& z9~)lKl@eMA3$6vElj%@9wB_?F0slzKyV`JQ7Izm_LK|A!fZCgFLQKXaJ?gX>B_)LP z2{R*N47-_c{q%I4sITPbFL$_KN=XW zmeGRM8RuwV+aXXIpJ(og&%rJWkC`AKxXWG&ZfC33kL|WX{Mqd`Wlu7*vQs<&G&9`a z+Ln4n)y<6h{z?r%iwXN|(R}Ui-r$aH7U9m9qapl#ZZ*;k*d_|0QrV}@x>!+=GS|3( zDvXL8u)J3UVVOOw)kzN$KrY)2{+*0R z5x)zT8@oZ(FBor_4YZautzm;!B+0Hpm}B#?9>w(ns=GefH@&G9sbETBjL&4W7UWK z&@f-p1Sq^dCOm<-UAi^eTX=gRctLSta=~=*{33F>@l<=Z=!!ME+TI>UT(h52=}cHD z&oLndL61HwWBg!5uVYjY(%(bLaxFu*#^@5nthzf@+CW0MocbcKogb*iuJfHRqO{6< zWU_;{N-jJG9_T8t6(QneSZb5!Yz`{S;T&xFnE#5{r0?U%0mDvK*Y3{A$7aPJtL;|T z2%SweA-aCs$=gkm2Tn|@>e<(C2Quz#Spx}-dB{Ixg&EFPTJ2@_hN!NsMe*zM5s+F% z+PrJ(v?_-2rt~AQ@2`$uS`hS0Vm4888^TF*={rqY7hyd+m;Ine8R--W2pVQInRV0r zed!oe1}B;5f`v`5HE!p<4rkQ_gYWHnXA5&1pXaDUo0MH!hmkfAg7|n}CVw`uU2V0ch500cWOFYP+ z2L8i^E`DMn8B5}K%Az8C$m@V3)qZ*X!zGJJ5d^X`#Eag z2{i%yhG-!`#uxv5&R^p^Ms3`I=-kxuz{o??O?H2JvDoq5%I{9*KsnOgk5 zt=1&ftlpizJON7Z{MMnpgK&? zu;rwdqq%vk)RRkkukb>mNr|uS^`Wd#*|K?;MNiaEPf#8=A2^TbikTu=;Mu=#Fd}Z@ z|MBC;3@SZ2i)y4jR%JQOSLUhT8}2{E&3wgLY86q-)o|G6+=@wdYA8s5z)Ex@@buqb z#$^0FmXIJuFF5#H8j#_QvV@{}P7E-5X14zh_Xm5TZpE?~{`f70e~0R?t?@{j&d&>z zz^#tzzmvctjG9XDfc6j8e<$THyUIc2Lv;02XmiW{f4u`iMuv+`pHYRoV`x@t6uhr4w6@SJu`Z}L`JK#l zP;2A*s{%FHK2q~Bm&K540;OvG`irXh`Epe5zsmdWRw`S}!wXFgr2lV}pT`Sun%#I^ zZF-hmWon*pg-X;}&D9iJz2_hI3-%kMP3OhU5El~)4|}4A{7}6+<50?Yay>JUb8*(; zb?5VPZ%HCYW#jt+@J!)9vnWIlaIAoipXOK9>B8Y+LvXRrDO8pzli?ZD}xtQt*I?Yr@i(zoS@e2|z{@wjOCb z$XGl(g;$x~Il5bJG&yfbiO%4=9DH<{bNRM6SKG8Vzv#c30?QM)FnaB{Ezj@!5eNk(dv z_2|%{HUTb%dF_)EnUtIhNA4Dy)NLFj;XzFa@{bR4FRGDpM%XNE65?`~pI2pZ(Byo99#JiKZu!Y9&D-r7=>i{DnXULyF; zGwUT?_OCsa_yD7OYwVT#BL5w2pV(0CqD{lu^7%0LuJr}5tU3)TO{Op;Opf|5diI5f z-e0_Hih7%tk!{J1fif-r-zrjj9sOwX%r|?j7r>TS}(&{4>_gUhH(A0L*chIxw9vW_g-;|Cy^$oumOWzVyx%TvxbV~crJ-Ly8pgM?q57boSayOJ(O_zT! zLWu^;etDbiBdFGRebC%|u_BIwc|b`J6b&i5l^t_6L}kI$!wdHWKfFh4#0oc1FoG3I zdTlQv-FfDd70O^D&rvAB=sgT`e-2c6A+Ma*lgz4q4vN(;vM3%iEu&e%Ws}gD*HYgc93ah_U58zt@evZow8C z;%Yn{5fi&ZaYz>Th{83hc7AN(tk~rYaXn*EvKRJnuL0GY-TIz%p-s74CiJdBqBLx* zw^O}uFZb^AbJwhQi1dn|10n^iH-MCyyL$%1^ZaM}UOM~pK04R&0)z2BSUcsy5arXX ztBC8{vdCeQVZl{!*U0F5gWn-D;>2~KRqx#J&nR9vWS--ux0%rIaWOmN4%?KOJVHMs z^=&trRk-}ysA!X;)sl*bpwg{Zb;}IBKm-}Y!|uTD?lebyKE{x{_qa;&CC*r$n?df{ z_#G<0K0oP=iqTC3t{+a}&c92?zH=&Z*9V`%MkpTi-ly1X?xn0|qzFM{+}*cU)$`XTiLP1K?-bY1-1~tB=j91!YyJdBHz$Z@ z1T*(mpSY;UYO{urxK^?oLpii7{Jfhn;uLDqzuY*4@O;!6W5*u=uL@Ng5e#9KbUf+! zl##byC2Ugc#@8`5*8scmdLQa_uaf2+9tVdpR1QU{)c&&7%6EoS&rMH8d_^a&I;s4Wj;8H^$Erhar%g%!CV6 zZ>=4Wf|P9YN!r0Fjhpf9c!`%2ZM1KoGb6D~1@qD0X-VI5m!S?xC3~$HM zF-AvXiy4YYNRngnMwReYR--g<_#a<=-_CJ9XuMdsRfvK?Rk-4Z>bqM5mhbzMRovx| z)_4y0)bPHiXvMSJpk9UX`oRs?Jvg&G>761>^v2Hw-jb)K0DNa-TI;Z0oKp#?47db* z-@)l>7v4x6h4hi~r<2WE_x|Oc#xtT7x9*2XrWff4zBtyuJ9>Q~GHG)0+kTy^tBFf} z17&4I^f4019vi+20tg#%vQTG~7%%OtiNd-CMt0ZxDc{qJ7}wgl_mCdtz8b4WS~Q`zRT^yc#@2=ym9O zn`su#>lSc@UromD-ehmgrCxmU`Q7<_)l1m&j*$oIUc$Mp(00xREQXg0O?nh-UdKIx z!UkX#4z&Y!{+lA4&=lTaKhXsLKfE=1&^M-)pv7bwDx9_(v9mnz8TkD4j_~e~@Y;c< z?B7g{8L{m=BKN9|tZ7J8ir9UCaMG=7POHjlb^^uqX;rv1tWtyWTna}H-3(xTo*-Vo zg{3j0w~_V})2MZ|a=!15Cm4hs^5JQtI+SGDi8g-BFlW_-wNmlbRQ^KV~((sdjqm%gRhVKXbl8|G? z0o%p%L*O$SHLswZP2R3G`qR!0)Mj+^HmI)}t1a%AjLvar+fLoMFFu?_De*5*vJ}%= z%NNW29M2_Z9i|C$G`_ z{w#J7T|M)yBc|j;uP$Q5zK`aChvtP~^$?U26NSa>T&$-m^0Y}@P!Pf7~aIgId@9zafup}05 ztD$j{P2`3* zl|zxC#f`-rh05_8anF2pH+BeeSPm*6us$}ag>;^4lJ>^MBX_$}X{vpgVBG_QJjLm7L#BBWjjAK>W2I-Pz+vIj2n@a>HLSGmKUE>Oa4Lit>Xb2jCKDF2T z^&2~G;eS~mO(wK`U7?s<%pEK0E|UFzHU!P;GlL7}fw$lsedt;(_Ipx$Z=LWZ6{-wc zf-jWyl!r3<&%+KW;R29UJ4Qh^*_f1V6hM6G+(qqjDriE|5tf8aBYe11Zhao7l$s2b znb_7YqE4U^%qR>r>EXzPM$_}RuX^oGm0(0VU)({=)&nKJsl(%9y&SUTapqpk4RJOe1n8L*ZJq$bo|! zm4k8ClbL~_HKY>(U^YLJ(#@5aa$)@y^=}7mTS}6(e$iw9_U9!w0M+!wDGyl(q{xUcQ_HZ^Z4+iZ6w9<2q3 zUj7@zm19_XzXR`FUYXfjXiq{UZ+WfLwCAndsve}F8hNJg9E^I&s{;h~d4oS00UA@v zOa$n0<SuZ?}Hl|gWUih`bV8O1!V-AV|M!BWiWQ_8~QMxsY+uumM#h}7WeTNvwYfMF#qPrO$~e57(e} z@RRs!-GtGnZRVsq2E<&pjAl`vJPha-nl_S=2=>#J>@?NpaJ_or)m zvVWj}8VCGHpY<>)E+Q_7fJ7$y(|1l(%TLUH%?3}ME1`;rf5DXO5k|Nd zTy}_1f&W!E^_ScTF3zjX%$2r>BuK|H2@FFc0=i_t%gcs(xNKqsfMt4nERnHidy};t zbD`8OW5kRprkV;1z!br&*CTrx1v|kEzhd6P1+ItDUh(KV&! zx5Q_GavsZTIA5DK1ub_h#AbX&(fz$bvG-b&>DzLNxU!U2jY5gtuC_R!%iCOf5mW|_ zHKXY+3sk1^EfG;rkJz^p=F?N(Mjws7LdMfG> zTu54iW+VU)Fj=ObhhTKg>fu!+b~7=pmtgd4Vkehtra)&RKTLFRW8NZMxf-#?oia$m+X^7~Sk{F;$ctn^!5TQa2mQ={RnG zTORg7q$fTT{EZKrsD1I~_abn&NH+1T74sV&IR?S93|iErTa=ooU%wDT)H<{aF5$r(O-YKjii}!JWc3 zuJE^0h#!ET0a=rDzG*_kZst*#h8~K+G!6TpcZz>>#!T;-qej7iM;nkL)|arkmgg(H z(lv$5DjmS<@N+4N)wi`s900<80NN#V;_@_9y^Pbk4#!ucrd>A? zy$^hpsuJ7Y*{2s==kJIPXa=i=uVQ9gj5WYV>Z+gbh-Ednhg(#;AEFpG=F=?nwa%?h z&fU*0_`DpMg@r!OQi}^wybEI4@^eK!zVfy2P8Kv6N~}BEt-AK==?5Lviba^aq!}rv zOT)D3p0Z>!jXfM*!&#T0O7N>_vCx&n+A4tr(dut)b*w6rvLHGn$|Ln;iGgvxl_W#K zU+4NnX@aSwL(C@J5>w~oIqW;@Xv2va34%Gke4^5OvZ+8&yN(|nF&5RTO%eUhPm8A3 zAKmi916J3gr3rs|9iih#j2&FEh}J>9*O?(h7L@d|p<7=o7=E6IVM{$+=3X&C(xio~ z^$dl3(eJ~xpC-M4PB!@i`69g%TQQ;%Lb*#S`GBmXC)zMKwt|SOhuBslYN^fTT*WU- z6u}la`*>nxkeabtDXeMWooy*T_;Mz|pO;B)k(_ma6#)kZ1Ib5Qh4)hh;oI%AFl=wP zZQmm^Yu6~r>xU&UUOS`ay%0Dz)f7s`p=OYFe@{^vEH*dn1 z$%-3~11}`5D|5XYYGf-xTsx>cly!c0vX8S`b-WUWpemv(Y)sL@dL`&fN~s%GN|#C# zB>w4}7LvY`^-d1FEbGn*fM3c{Rrt5s-~vbwFQN$Wnp%y}@Pjs;ll6@ZhF|f}WlZ{w zv5ou_VwuE9X*jgQNbfP{*+VRp{UKb*Uz8Cemi!|WOvIGk%gYLB)Xpau(PCYSd_b-2 zomSX=bdNCJ;>t)-9G*-2OislRTa6oW;o-zzLdEC{Wh|p!V+Hd{ONUvVK}7M;6q)^0 z7$)bSr;)l2BZ-ss#0@Q6vf=z*V=tS(4yBZ=4YNcv#clc+k5&U*sVVhG$p{divLtPG zcXrOhIgfP|w$vC(!t){+6XDS5{)Q4YBSKB#7~Smj>HxG%9hf0^ClSRG$K z0A7}|6{bP9M=>+fUqt1B*YzkmX9}_*jzhG9XjdsAa514f@*6xAhZuTP?TV$L9+FL` zz0x@>%a&&H@pZd&fJ5Ct`f{1&KdI7PKn;8X)Z;uKVjF5dRP%#FO`$e_V+J&NhSJXL zIzvI|f`6L-gfwqrPkpWvrtC1}i)=XUF4O)XsDU9ZMo4|UY`W74p%Lo9(eXrG^&M&o zQ|fFndFzeY)JXbn?_+z^EIW=-k+6t0;`+s_qQ&ji$~B7=U;x(2XFoc!$8B<~#>$?b zgo3X_ng3{I+qxP}$;xsJ;`j$0sb4+D;rlw&s?)qgpoQ_9Vcb<%IFQxYY50g;4VGoG zN9pcL&{OGl$}c9xpzUd=m+~?^4lKvFr*&P$VN-$3@X|1tZu@~K(7LRuwBo%WQVJkk zm48mqrl zlr+_Kr3!kxo6Ygqdr-HkJuyx{+6$hx4Aw)QGi45}8cw^Zwm<*3Hsg}mmf8j4GLO*a zz)o}@`IztS?=k7FlEn`09HMyj-bMHTj0(_@!t^)Zuwbqj)#kcCESC?*`4IU+z6s|8 zLk({MBR*?zRqQH=S{VQ|GRWJeXXy4tIepJb5%~?7y}4?Bx!bV~Gmx)mL(c+Gev3XU zLE6%1s^f}dO}F|~UVor4TjSJ9k%QCO{Cmjq?-A#b_}y(ra4m^LF-bHY9GYIl08Ok| zCSNhtEteH5Dge!r)@f^H<{U}oZ)vaX2t|}YA3xR!9_VdXPD@t1@@+`5kcsbEq6lCG z5o>vlnDO-xz4`J{M1|D^mSM>L30l?h;q@knm!3@cEcQXh*(vJ2R91bZPyU1@PMqC) zYQ1!~^o9q5G)x=zMD42Rc&qbEZ7pn7Oyu6Kaqq48UMwKBvL+{)R;6w9pBO_tSYn_ zIng`i7OyrUb_(265HvfU0$}}lwZq4g8wyG>(*>(Msw{z&%?eET3ZId^)%u^by%Npb ze;jL=I)X%|^Y?yrlgGgtE{N4Lp0yF9bor!YQBJU&nEmq#tg@!M6A!m2l&aY0fHPVPf-fnnO>nJfg&wzsaOb};g0T(*->Ox;gQCw zl~D3*p5>Je2z=}#qr@ytynOlulm4vHrbAUf*fRUkCyg!~jxirO2<7>>ixEwU^xgX< z;McRm#8(uL@h}&Csy$F4!#(ksO$MJJlxVZx+gt#io;s6(`=yxYW{(dpA>WoH<0+=5 zt%Pfz;{J+nVS)>voFM8hO z&G<`vUv^&85WWtl>}o6O?XRF2S4_&_yhens_mm*W`+Ifw=gDM=+Cv08)dUP*u2V?K zi!u7V!{o;LUb{~H6l#QrY>A`vgPBqFykZGgFi~&S*X^X)Z}R)~acTl~T`5&!m|Q^H zZeK;F=3HU@H=rLA^m&H?JM7SmmTUQm^vt}P@QhyjJinehvHPUw1;(UXIzK7%(t=># zC)6k_P)}`SLR6mQO{hGJC?}H0#!`?YBG$byKe<)cH zF~`1&okzsM$~WRi&iLUR{A6pG092%pcj|AJ>hmSk{S!&8)YWM-a4VFgl`J(&zn*q-U z)c}dfHcjIZekUF7(MCQ$k2qFCB#ctGO$=8*hVyrSuq^Dia3a^4;fV);cDpsP0z#Di zdyICzd)(*EJ}}cQ!Gq9ioUiAfPMTkk5l~$|<~!J`weS)qpNCMO%Q@&9aMc71aVJE* zmjuc6Bzk6#N1Pre-ra}b+zCs7G{%cpqy?7gfk`HXoHnA8YkrcMk&FoP%V>mFkpC5@ zEhIlGmN`YK!#Q>{Z2uyT^soe=o`x8oH1zUcCF(kPYKXTm-rV#6r`vEW<#Q)%KyqC zDaf`|M)Ci0N*NsjO~u#{G~1uon%1+r%k`S|>TlSE)OCW{#ZaJ!NcrHq=C2>=qyPjX zeh=vL0R*Z+4GeIZ{#|cW2ZK#o7kbU^G(EK6E>MRWv8$izv7YcgSnTiX*1UBv`7hTV?!gj z`PjhXYg;RUz1txwy~B{ELl&nGSwNUqWSBLNV3mIqud&|EtoOBzyM4hyr>ywhs`pJq zqntDia%{Nj%Ijk&whSeloV?ll#O78RoVrD4lhFg5oiJR>e1Y)S!)S1<-s=-sw>a|^ zoB5XV{R%qwVOy@gc;A}*O3y8Y)lq6CEXO%4rmJS%S7atXGSz<@veum$L(2jE0P|=_ zywtP*yUbNd1g&@(-d`6{3$E9!ms=qz{=TnV+*LeToYf0Jhu?Vm8;i(B55GtK#^}EuPsm7L{DF20(qOr{mPni%FhZWs{M%Bz1tv#nL zze@PH_H?m`abHPOGArt-rfG(P{vQ9E=)a+p56&2R+;$=MdbOI2XT^j2{QGut4%G0* zUq|APB~e+BijVjaf*CF=>d&H+7`WwwOaz3*3U`=N*zo)CB19=(@b}Qfi_*+G<~HdN zI+cX9DY=ORkiTKhLQIv^nRGwT5ik9at1h}-Lk=5!uq^!+Hb$YyOlW5&;93#Xz!4D} z^X}*mu)AS+n;mjoDXNx9n-pD+tNeYmbig(xl^v=-do0(dp<^N&@jEuBL7lH4+=(JM z@D1>~xwn@hTx+~2x)(oK7;leoCt@P6uC$`xxuG|#xCfp$z~fE77t#CM>n{WMoo=Z~ z#3NI9^rh2CSz?l*vRjGP>$}J+hV$;%Rc`%Gt*)bY_M%#8NxfR>W+SjBXqJ=gEX{n$@prjBEz#qRe11;B!urU) zOGNyxfA^cDzp{|344*CfQ7MP`sKS+@&G^+Q)B1QC!s$MV&L`Z4uy1ZFlMgK*&)odu zrOYx{ANUOOZwsYz19F6nFfKO0o#Cjmi;^KC{@L)OQpPhH zvNmUJS?Vq#7kb&*dNS)BYIFo-3YP(5Y;gHqNoqcD_UBebB;U_*eWhEEy-*t3`SiRZ z|JbBFgX6!JOH4pZLw3^!tCT9=99%#^MbG=kHuD#TlLis0wSq4*f6W(l&Bz%km2KFkgmQ{Wokg-O=2f8%`pg+f71w;b=gv69MjPYKYVBqx) zP8b~j%UWXi^t}Giiwl*1i1xNGl1WKcQ0oJC-4XDKBflQ4D1rQ{C3g-@{b^6k=a1Y^ zxJ^KqY%5~YPys@_^gbc-7viyTdw(ag0ceAmXj!cf`KyLS5$SBxC8X*WvhR94NPUEH zK*#YFKw?`r#}b(HU0~nwu42VMh4HB0Wx@0@!|}M-tyLDU7iFW?i}vy>aSJ`w#ZRM+C@7548hkl2LQ-avI!TN_n|8xp^xnhO`VvpZR|T z#e(Jxdvi(Dc@F9Mqk$E^Mr-XtvjZByiyH!Q|cz~qddc9g60al&dDVT&utRWfGR!r)Uj zLk*XSLVeNkiQ;XqD5u}s=Z=AG#nyQewD8wHZZaxSjw1hXF)a?^Ej|M=H9w0!VNY6b zifxwuDB8OTEf8I?3!0;~mm(1EaVQ=-`uL$gNX@Q(b+{55W2i1VG9Bv1yx1=Or$0!` zV8VfcZq5jws=ivugLmz8w5lo)uD!VLZfSFUd_ik1SR^|1O8MZx7)a^IZ|Yz_aJ%;5 zf8d?cRHDPx_=1_eW{=E0y~@0_1{1Z}Iup+n$!ptqDG7|eJgLB%E&k?dM{PUmR+EJ1 zVT2iwSyDHP5QPAI(tp%*R%hJ zxbJLhYTdfFprBM?OOX;fD$*5@Dj*<YqXX@XQyIth^)ktQIZQX+~V(o3j;0HOEZ zLhmhv5&|TYcg5%Iv)$(pyq~zp1zGpH%UpAfIp!E$JR^NaXbHTX!>;PUAlGo8`&zRO zynpfD_PpFgkNn^BP{!YV%)It%-4kH7EMuG)^ppF=Rc1eWtiMe3RY#Wy)Fxy6rYyOJ zQo@&zrL*b2XD-k`+#FUL3?1VFsiRW`aGaGkyVbU2bdf+xB{8I1HLMwBl2sY|0z;z5 zEeBHj(C)ReA;yV0z7@XpJJ!B?(c@0X{sT_OS22F?x_56Mab$K?1EOX!SAO@$16dkH zui@qeqk-ssjXYwGb4E&WL9)BguETah%BZ-CrE8vlD>xSasw7Y& z*2|W~JA2gXEL=x~?#^l~Rr))Nc(z%6Lm_mcaE`c8=aGu?*M%w6{+XSl<0#iB*l~_X zlk}nDZGddn)@44fZ-%Z=KHB?L0)yE~-c#iqd^{}+Z$2ngNM2Cm2OPxzUb-KeQ%r52 zR@5KJx;&lKSM+{Vxv|!P%Z^PSZQ-7m_dfhp^3s&er|(L6HaiVqN6Em#5Y{IC;1Z`g zdZqtfj(gPebiCi3@ns&bZ%DXDaS1NlcDwL~$SEFEr**w?Wpc)7HBk1W_5e9bDELBs zYezU0_|ZsJ3#0b$FPAbw%JKi{QTshl08RUyPZiSBt`d1~ym6UZ?B)*>SH-$ zbomwDoE3S;E*olZk=Jh=X`qU;bAz1<^Y5y`lVmT4U8PZjs=_yNR=;$%`KPR1Et85< z6`=~2XlMHh+{%RJaGw}83ehd)DdiLgIZfK^`fG7@(c6q6PnU$47S2 z_5p3z&A$L!5WZcd!BKi_<-wcTALdg@V&BX}!tLRH&gGag*!aPRuUCgaKrlc4FA3`w zlb8O5%SR7Z7mEvKuN>5hJM)M%+!J+2**|GA^<^;e*3IV;RiEr!v5YcvGjkYn!Phya zC{Ss$k(Hr`T~8~EPp^t4NGyx^$3KTeRr2|qrciD?6S;AO1X2kI~Aox@2Wj?9ZJXF z%rSzMP54c=d23`;37uV!l>Rs-z%21jedm|IEdD;$pe{$D^L=GWBu3okl7u>A=r*9V zaRV@LW}`C;z}2~=yHsb~gB^to`VrsmMgOS3=JYR8cs3Q)tIkRuyFNr^>f$%;SNES? zv~4g=kdFYR;{9k|4v3Z@pBPqsC8s>tb?v>&;|^KOl|5Vr6?-fmZuYZ@8~^LexL{OX z3osv8V)X*G6RFY@Iq2Gh$(;RJw(`sHSwFPG_GQ(!+a*US7ssQJkyTj zl5IYMpEC5cdHfxAD7&tvhqoL0rO@5HX!BI|CvUzZOfTmGYzW_%d8>pQ zz!_m@v|Kz1>6&#S)pD9tF0()-hxHacY{W4*_U zXMfIqY)tIdSOJ_q23F07M;jvn>Y%n0sWB48`S$J!yq~cLX?=ajrqof1;GR?je(B_( zy(H(U8e3699`7F*=M8USiSAWc{rf2YUOJYDTTS!W+I1Vl1J}hA@t{fp0;3zB?5@WH z5ZJ?FA~H%?qQ)n$i1y6xbiAv;c0V^v9ju!|8hX|{n#rxBnipnE>P#N@yrnn=k5Z$% z#pa?aws17K?yB>j5(se8em~*lpHc-4yCKro&@X1s7)fngZD=Nbt|(HXQSLao7qdQl zI5St-{e@Vy&Jr(oT!_?GXtTewX1ikZe|hOYyG)(w)?6iJf|iQOosi>~chOXezz{q8 zgXcAtUNSZpDe5kZC6q1*4TC(VNQQ<(kET3x2m^h)`zSrC8iEgVX5d+-_Y8O z5FQ+gsP2-oUd?w^tCjKepGg}KVopkw`82(r9o4|wrwj(Wk*P@DCMLc|98Lq8rh+t4 zD8{U7vBi+<$>;9h@-#;-qaBMf1n^NR1JKuY+75v8`OjU;K&7AwZ2SKVx@L&+0%?ak z6|eHM5O}zbXLKo^0vs8~x?w*4r}^#g*)yOzH7)~q-~5?! z0KdeG0?hk1_qlJLe{4`Wl9kJ=bM7MZ5jUc z0hPZ^IKZ)&=0W}Bp#r|`pYKs$lA-?B2LUzGT0nme2cy|z##4U}_V-`#5k8;(*9U6P zIRu#0(c#n*zy1~AD7^aiKgR=%B|n_fZPOUYHtu$e`AZSaCg8K+UQQ!0}_tCDHK-xR*Og}AXbS4%#+|B#7`UqQZw>2ZZBsboNbfc z4X|adv#0FS@BHz_lu(@iYKYi#N3~G_RYA?bC2u)`hQW#+tDL&2x9vUU9SU!YewCiHBX9-0p%?VH*z4v*4j=|li1=~2E3g@x^Ehk55PA39pyxfhx zLbH}f{e>~EcP9T?wb`f|Bj2UywJ5;J0^PfcbQmITv7yk%zZ^8A zQ-dJ+<6g57I6#`tUJ=j&{M~6rTpQ_Q>CJ=8i{dgfQdZ^_;;*Zo0(j+46qc|H@3_xu z4(^PEms-?nh5PD4o>Hw4puL$g(Y;we)BgzUlqlztGBuIz@ZY^r6MFl3_Bmx{0!3(s z(rm;y?gfyWJ=r-Y^qVNu+>qO5e*5z|k%}eVUQVg9yOS^&c{2(&#sfRp#B2pmP-w)^ zW_oFbL{vkuyV0KOsF5SKRkvuzMjXldbcjsXsJquoVdTQEb_nenMT$Mn2riMj+I7_P z{Kg~S-=szg2OSWcGu+X#qdC;OEcADGB+#LFiK_8ScbJLxc`<--iyj0gzhO>NyH_ft|;)Gg4QO&OsahL5vZ>?lL zdd(mzIedTJt`{QBhL!dHv3;NT%J=80-aZDk5~~o$SZNN}P2xkd*nRN4?F-4EK~du{ z059Sm6g3U;rX3OPDtyuL#qU{Gr{2~tr=}3>6WcObeY(ad=$h4G><^hv`R{V9aGS#a z)KY%W^LI_k6k7)KrudPTl`|Kmv?JGO{V!Y+fC6lC7j@g9rptI612a!PkkTGlY4bMt z+5n()ikO7^Z}4{A?!O9V?-VN?>-9Yfo~DWWP!A8wDzytVL|l8VEOb9I(sRsJ8&Aq0BaWi2O&gi`c2_NO>LPm>NPY z+|Xw7ac6S3y3H2E5gL3j(-6QPa;Yk#nWsyfzv0oUQHwWV^E~d-MPPh+yY+%v8sj;QYgJ0* z7O-ET2#V65>vPIv;(%fRj57xqR^t5aX+sqtiXsT`lSTTPBE2-<_QfhSx z2R+42*q74V!FlSP^nUX}lj_lC%4LDEJ3@7#k6{2Q%i(y-{HP5hk^X*`Xci!`xAFeC z(d9rZkFA$n-UZDSX{4y~f*-FssJq>=j-HnOxnzHhT^EH{n%}7pQuF`7Nh{r7@PdgC zb4OMnWD|3uTjCRq&NMD0(TYZDHkfZpK9Hecaeq*pxvENrsack_kwjX}!(+=zw%=no zIbcnS6Fmt-o`qfqt5tLgj=P-Dj8 zTeWxnWeX!IEq3bg%kt6zK`v58Q@6oqQ(Ui${0A5R{ZxOIO>>P_U3E?H^*ihB0RDz| z;@{wZDTWja)X*fpVw?-jh|75ViQ)Bos;v!%b5M@+qgMs|mBOIbaZMZ?HoP?7)p(I& z&(2(!11csXw~v?{<{tar5sWIGy>nGr*-xNR3N3@53ZDP_$GTe2e$U64WC99yhAb#~|T zeT64ilRi9aip#Q2> zn6SMam%-uvkmt%A$HLD18P@oKe16M!QtF)oVa-=0=yiTUZGKp&xF|e?FKt%y*IVn} zu>&j%F1r48$rAfzmvdT+%G>jT515Yq%!<9suz>{OGi>XE+TrZDW=PwK%a{|X+Sb4X znp;{o!x2bgvp*YtpIT+ZKV^-7fZ3Geyi&Ux*NO(Z?zVB0J$i6U^vSrw3p6WkNv<#l zycKOet5&*YCeYQGGt<8;!LXlS{ z;{$InmDfx}Lmnps{8FBlu0jcHtsY>p7NzPHcs5-D)J@v2=FA~D|Fq7`IcI6#uz3G7P_yluR zuhxMlTFDOzU&21wCNezC(Jmzi2EquIk895O2}Ly}`O#dTfppv$BJ5?hmNAJ+)SpRj zG@TSYWI7vkUD04`+I-G?I8vH)?z9eBiMVjuN?krK!PP=9KI2xnJox;SI{KHkbHnTq zpkv?1OZ&YABAB(2iS)?ASJnLM5hF#J6`lv`=^tM5=<^t!lZx#U6~7i>n6SvgA&P$; zz0c?R5M2E@t(%x1e)ySLI^-+gkWghSpVL27|}CwQ=S%P;9aA(tsHe#&AeT#VNK5R^#6qL#v>KBxcgT%l0johKJ$>+fHc zo|or0GJ8}Qr+M`2SsYF#W#901&Oo%5GC7hj@D7)0T#5)aDMfwGQ19O_lYI>a= znS0{)KN#mWrc8ng{))amwfr^bybB)}!$v`_b>*F65>Yo&_Pt${<>MVLkg`GHqDd^H zgw+G+m9ZANPG;#YGPD@io<@ynQ z+#dxGKwkN*e}ORJ4o^Un;)=}snbZsXLBHO;@wRfmbaNqsb^SgcSF5O%nDbNi_Z4-9 z*)30L)C5kKv%tmZ-ubJ&5ZYIF_yDf&zI1YjUp!{X=9zi&1#0o)hOjSn@{vLpPqJ2M zfXuTwLN<6a>x>C;o*Wi=A1?6;*Tr!4!L&j=SqOo-amBT__}~_Guha_XvzjV9j9l03 zSkyZhM;)K$$I1PeX6xi38@3>Cy>>6`40*vuq+N7_b-;vth^6=uyj`zP}FH&R~p z_a$2#HaJIJdKi|2*!piO5A+~Y5>05dj^JOL#XQVK{AL4J(gubeFgZ(ndmo{7>w>Fw ziYM2yFm1Hx!(T`Dom)6_qn{SG@SWa#48P{OW|;$J-UQObnR!jEJJCKouTy2KhdRG9 z3D1d&G~H!dzRg;vo14!A4Q7eKXBDPMWFBzJB<_gzHp z28fTd+c##%R0wHL*d4>090l+MS;prtEBzWutzZ1>^+JvEdJ%J7Pb21fYyxYorb_TV z-ht+H{I4t#NPwrIJiJTTCz|!M7=K89f}VF=UT(0XHTU%F4K1SA0Wz?gAA#QWMGqyY z4L3iGD&;(P@kOBg_F!K$ioau^X(i9+A=1gz2JXX$-O*qmcK`%W<#DR2-pUBiCseq5Fao7m!;_Y-6z z5VWRh-tx1&g#6&@_8IZU6^cCjae22-z}H->xjUmnAqp|GKM>F+cAduBsJHtkCF&=l zKGXs|_5h&qAIRf(TI!SXXu^%h#;kXrnO~?rSexhE<0xChBspo**G!MoOk&{K{C0N? zgDmZ*=XEoe zUnS~Y{sxb9+y(o&M`3Qg!UA=V&VU7``1$f}s5U}qZTvaab70{th0O^|5o=-lB38b( z&62EBx+>~<)kH#DH4J7_LyL#h zgRMQusJjcnvP@ohfuFE!K0_hJf56k{HUjx8EQq~&H}78;xWb_4u4q8wrF$}HMj$?P zZKDhKw6mG+*XP_3jFCs^?T9^$%W+>;lRc$J?8cZkA-g_pl((Yy6Vb~W+D8rOJ+`V0 z4->X(sjGP_9i`$`**i9$meTIkv-b=%Iv$ESa@juj;vlLXz>m9|S_K;Le!G=qwwRWo zc<)p&s}AQ%yvhJ#)G&R^k#QTR8`)O+@fxl>XX{0s$K%2LWQ`aYvdV&E2PyNOUZPSe zIJqH-V^DNt(AtQrw4a!-7bnUwT6|eCVeJ9O$Upd-f$%AQfuM)8%nc^l4*snG{&L0W zb~EwWIkijo6yDSEzn~E{Mux|8uQS?o^!r_q3kuIbT1T}qC5Wd?hNYnvQ%-DLB5!qA z_TA6;rCZvonc`HjVaZ7Covv~j44eN^7aVS%HRztCH~%XVV)G(a6}xG%Z?D1gO>{&S zXq>$!0Z!)Qkl=s@8z04mTNob}xVVlz+#B#i8t%Yn;5Ktzk6&Cj=Wu$QsNp^GPf`DO zl0^(UvQv2C{$7cG*TI)>mETc=`KQ^1QoffdIw{@f&A(h2oY8^jUsyelG@{GwTlmQ{ znvF`;*QisDHH*_ewou;)X6T9PsXeW#7YtXz8DN1H5T<8u*^Kaoh)*hL&1>cble+MZ@$@lM~Q*UlCk(r>vqAW&7K1b zGba;)LUkty+N@m>e7qr_98%cI`&0Ty5j2yKeeiiursa|IC-W_P+_0Wj+lCkN$?L0n z&3^M&%%MNGzOP;dI@lNiLJ#A1(Vsz(CAbD?Y%M=wLbv>@5SgOu%$=B-jXIxKfU{|S ze-jiBa!x>v3}OnArmMmInbH^qq?4FZ3!C=`^NOv0#wbJRYAa}*XB?50R7k6{-NMd; zxHs{kOd{<-?{#F!gkE9H-|A76x2@UWn)kefursS(OmfnYoCfJf3Zt?iJ0VyZWWlhK znM=yP)x9Q@yxv8lIUe0{d)0rA8ZS+_z$xvs52C(@^!yo`em}&G0gxAQ@e9{K`0{V$ zcs2?EpZB63T&Md7&Y*z4Mf`xUkm&WB{{XtbLtP^X0FXC9-|hZUIQjkg3rzr+Hn4mB zKOk_pDgc?!s%rH}{t+pG;k3U8uA1FF_doD5I}E^#n_%JJEdE4O0WkO?a8={fmj4FZ z|4U0Gj{r0}>X=;<^LG&b&*v1NzDPaxe8(@j5DHI?$?fe=v zQ2p*v>V4ZM%SNIy?dU&po(WpZE94EkNgQ*E2*R*l^oZ&VS%mz;*u4(xQPe$ zO&JN``jwt8im#?_nLBs%KQ;k`RIn)TM~d@vvDlX;U?&sVT<6sc1LO@EtC+F>&eZSC zobSkFWEOP9VRT_1I$rn&?@!!&L>>k7mR_ok`@zT~<7h`lCBl8}6;GtHFOd)g!;p4x zX&ok`#|9?dmX_2Y0`KhL2= zkn?0uE_!y_10d3+om9q%J{lR*z{O~(oFIAbaMJV@KQ!)&gs4^KoKk*8_2ls zD0ethFi2dpbHYcKEY#!@0~QhE`l>r=;s@!mdh*gBl}QE<1T_Hk`(mr1&`r2=9Vr93F>JT_bk{-1iAzy%}Opz1nD54`H|y3bS#AjIrhk_Z~>Tc5l! zo<8W}m|#Xkc{I!~BE?KHu%nrsGRJgR@T=}8cNKX|$DPafkBH3}aEULEcN%VT|CR5Q zzb}?NN&Hok8J0IW#d!! zTubB8AsI_)VWw#55CO%5GSgSJXGD^^RrjU>DcU#o6#F=eWXn)2$rW>z^iM{p_B@kv z6BA$^_pvJIaV|FwTdFkbT#e5xaXGw#`;m}5Xy(~4=+R0NOYVc3laHLDiphxK$rP^& z_v!1@*mQaa?4TIusLi7D%e;vaq^bM5?&z-b*u;9pVgd0`d$;tF^Lq1PZ6=Y#mW&-NW9Ogsz+svIQ!aBZ$9&N^|PvmySr`}SYfJGG!wcY9PTbVG<&}@X|@tofnv-I&? zEVu*@SyZe_IHHuaM3UVe;xkpFD~=8pRb41(F1F2#SXctoB_@8#N8>Vb{x}}jsHqyG z?sW!?rX1!dqkJpIyBj)Sc-yE_vL}z7M5UdsZ;wz$X^x1K9axEQn>;V!S&SGfDmvT> zy@87!f5e@t+O7W-U6I^Vb)u5g!tFF(zKRvH&2dSnn#wM5*r_1Sf>g(x%gCD^_J#{F z+xjj5+p9Xqypr^(+V2feYbd37DFFiq49lEslU%hX1p^y8soZ^>N;N4c@-
fMvLRzDB~B+pi6c&ce38gAKCK48VUSGp#ErVwVZnbEA&nSl zt^w362e1PgVqFpD4=X&JJIbiQw}X*w=3e$}r(qAtoA;ss6Qin}acI|}ldU2W_Y{fb zwlf)ZV)hs#*M3T!))SVRqaY3q{YY^ao9 zNr=3Tr1qA;@?c|*06FPU|#H|xLx78lIIQ{O@UW*oQU+h%G zJ0gw`7O{qC(!c~+ESzeZEkqz%;Bm%Wi$LE)n>n3Ux&)2#u6PL!CG3-w2M-GG4k@Ig zO5(H^cBVZ6&MsN@1Hi#fAN^G^NDwv6dbT_TbRgp3Rs)L`-t%jWY&QSV_WsXfJ@WSR zwR6hqaJqG`*S3}O8BuN$_3I9{2=^Dh7~L-WMMs4n%C7i6+#q({8NF0z%j1xNta5sU zm8&XoXE+oWt`_*5jD{W)Dx9l+jBnQ0mXL`eCW>!hprftYEc1Tnqs=I6AXs_4y67;p z#JP>+(RyVSTT#6peX9d0C)m`=S8p~o1{7#11xxZTnk_(Kv$rW-pve*g@|yCWFp)q| zKYiD-Gh{wVsY{j=kyBJS0DndY3i1wWQX#~s9&BJb`ranGRF_M1tx60Y9Bg;FP<;Q$ zd!71;=Np};nq35qhY-G?S);H<6B$&PjnjY zJ~1rGO7&cXC0sSSO3a%nd(13UI^s(i4ZOv8cI|vDQy%X7{TZ= z?5m9n)Qlj-<&EhbTeC|%IsV7 zmjdWFHeQgi((SRbR#?A)1VaX>ba$hLg^@c2;)S2C*7mzGwmGbeIoDJr1@UqucKZ0r z=N()#j=QF7UFtZ}OCw(?yd3}2*ULa!G}Yq>DAq`id0?F|093!*sYqxVc+C>14TN-| zjtK()6|E*k;s6?`5SjEkI=r7TJh6iZ3X3JUMZgm6(r+=hxe=-<#mRkrht;9eXu1zg zD`hPhKp0I1LdH(=P_)yCCw^Ugty2A>t}@=oyBI+_q0r9^mq zppcq-nz8GzDRQ?4BR!=WNNxx)6IR@Cm0;nNHn{TlH2$8=PmwkHh;G{*@()8ZZXW1C z0%kkUk(&YQuxqi(hk4a>7{$1&vbVI+%b6HrD2G!nt>> z%$TL14>&QF{E{%1`@AdC)1V*3AWL=)-#x-xrmqX~6nUK$r@bj<2mG>;4c?uR6A zjA3Udyt20N1|wScKFR9Z*LqqA&IyQj->VHX7e;b84N9e2eX-oU z>IO>bXn&-iadIF@=xfXq6L5B+D6>`8qQQ5eGLaN7OKb{%w8!{eq?kg?QxikSgqHWf z+`w}r4fgPWWnw(LE(wr3lPFE|0hIN`3W&V9^<$Vcozd@@x!of`8IiQQKZeL@1_4gA z81sV$^J1LxT>RHbz>p3@$sBkrkv0pIXp5CN9|I#D0gaa?eFFxU(9EBn53kIoVkrR# zLs58>{90;GB@SpSP6HYbW?dC3Y^Q>6@!hBS>;Hb}@#b4F`-s-(Rg*?H2A%P1nIMnJ z>q_JWXADaoUJ4~IyqAY2J6}4tk4=>EJ_fkM%`&eT1HPJozE z!Yx9cKK%B4XX4H2xpdXa9?V=|c#Kypn*vGCvjsH(@fmj3pdKE6Jsa>I_M;hy^sqd`p!ZeP$D%jFut~ZI4UQh4zzWX$A!=j$P$xI~3*tBf^K> zKwY$DNK5?y2;!?%a*cMjXRz;4VloC5PB1B*TW$5XPOZH;|D|N|(}`=P+1D-N9mzjx z@)&g%gw{(sh84jsEaziC{uRqyad%y4#elG#>zB3ZR*+|=Hk3B?L4)CC=<(fo+Af7Z zmoi_JvXZ0@oJETmCdGwmKY4&4WUs`h{p zMRIf>y;^$FAvD)|(tT102|eXtgH5a93pJ4Nof?R1-`#;4%83%&MzmxcL_4o>b$bvX zEt+h$v2@bbl@}CNKmZX3XGnt$5G3|s7Imryh9;`~>ZEnk|GiGR?`uMImUh`=hjOU7 z<<}0!_I@=;d4mwq+zcZwi0MxnrQyD-=9hMBO;V4M99WM;PqZ%H(?N7=mKe2}*Tmzu zq=u=c=8{+1p5erZx}a{X-CVD{c~DaYhc*UH+aDlbHEfypl_^I4J}NchT~+oBL=)h42ZrGgdU`OUKi*Dw1Pc1Q|>h!pE;{pHvB_ z)mO2X-)XLbBcOJx8{eDEL4L%5dXIywAF~RT&n7Mv$N6+MJM-*zfC`RNFa_E?l3Y8A zWCn?Fi9*!opf;Qu;bSulYcs<%MUB{^j`h`#9lREHb$Wp;5QeI9?mhC!`}y%JHs#G) zK~qT=53~C?&)$LBRo`Ca=b{CwfMF{VtwnfOcKBvCdA$nU&2 zCcHHZart#o!aQb9FOeV^n)RziOhJ4AylNxm!iH{;+`*iaa*QYAnOTR|YK&Ps#O7EG zsCjGX&A33UIgc~?kmz9@=OZ(2Zhr}cgF zEe1xkUYU3*dOC#j%S5d2>d;jyq{JTy&(vWE<>WWn8o(Ky$FB=dkm=Dr9&H=-r}G$h z$H-H_#%bN?c?4!BszN5G1EZ=H#(a+-VIH9&eqJpG5mGXf(kcf&OM|CF9_cGt8tqNR zyB;4bOb=G3fSfCL=cmgp5Yux43|#tq-D(&q>L{4M$K15CC{`df;W0Mm^>i>>2~N;p zrYcnH8(K2Af*h7>kbUTXMW-s~#{0Bkk7U&YjH;vPF7q>&pqs}B+gK0ImOZ)Z&4?2B z29JxO$7}%mOZI{t)x;tA8<77TG)0scsvT{s9=~xA2-O1JGjSh$sHd*9;gA@PzD&j+ zAK`IBC$Uc1#R&I7V<*u_bKa$Sj)32UNyGD^gcYn=Y>T$=4Y%Bf|2jsJ+?2-{{-(*t;>|E>NCjg?y)K8^XkEq7tNQqqt=6)^MG)Rr@~>C@F`q@&Rg;dU4?}W%ak6VN zTSlV1F$N}J!9{~?@=S+>L5omXj2*(MJo=ppv=pI~_on@PC6#HRlX-=ztc}Te1%qXr z$xtWp(hf52{&&Cte3y`I662^C9vUDUvz|Rhp0BxERkgNsx44Js=VkJ`Sc7wt;&tbM z(_@0*!#v!G*>BCc0SzTz;-+g?D{ArVT51M-HO8ZhzNS6J2m9t5qO0VB@jUqTpQCV1?b?p-9VmO9&1Y(?`Pzp*1 z?QIz6yei3OZiDAAFhed7 zH%MYfIsiKEaz?6>x~D}Kxh0dfQ>#KW8Y|46-drHy*ukp?YYC;_a_$hf->zNvA8u#8 z$k_38Bz_EQa!jG=Iz8N^u%SpCyD+6Vi02;*xw-R(cav z=2AT+-k6vED}T$+;+-@# zvY1|YRwb#lkqU~361gWWixxL#vfy-i;lB0eur|^`nS@{IrbJd`R=>&am=afE7Y`Ii65^8S77xrVd+=0#6but!LYwAv z*`r5G!gOU3l~s^K+y3vBU5Z5vb6F2*P?HyiyU!`l-s!wz(NG1RBM14Rb|y6PRz%~v z(SaB(^5iy;S>HZ@yOfG)mau#0LFt9Ji_*|9PnehaG`M;M)yc@~VaHlk6u=LO?l>WXT@;owi7-2=4n#}To}KvlgRvuU-QIfS zr_){mdj6y~3?%5X{WLvU_PKcv9PtbqE6 z*GlH5#7VR-yV2CjA$bl@>qsYi_F3QupS7td+x=O?BYS-3FWbB(A4vSQNx=057Ztua zqT^^Nz=BoYY8DVX*9?+~W%?v9Uld%Q6tS14`b<{z!O+5lFP=M6VdbX*`1J*onb@wZ z=r^_w+W_+)d2~)jMKP+LvvH{oS96-t5oYScYU1kO&}MT@(y4>{xtcg%v0kV`xIm=AOxNM zCCyK3Co|y;0-$3eOSC~yf-mf)hyA>JwcXT*W*ymk0MTW$Ubyt6ZQ&heiq*h009|qc z-46(QilBNCX28%~`Cu7w^pgHo>|6KA{Z$H8IYvG<9ht2Xa*eYfSZDBpHdjxKj%X6V zyN$x$&9JUXTcwEDw_t2l$s!>Hw$kiRz1E3qJzSefCSu*X-O+!mo5(U0Yy_ zr&z7yg&uCNfQ!6x7k8cyS`{03cdI8r6ABB=9sKq%ppvq<7So;N%^$P^9+=AM zXzE^~p5T9V^q7rSBOD3vg#zvY25R+ z2=#ToPBmdu~<_=?m_ zo-d9)v-2uP`4Q`LZ=4E)oL^ba4%0Xtw5<3*7`dzA=+msw2e4kPf+yxKTQUdxSIB$e z4Er1NO>X`ii9a%O3&dBl zCU$qZqxFMAh|4T?^$Ex@vo$uzcWs!kXtiWIXx~Z~Qfw0i2lI*`SvjlTJzUp221i;U(e85(ep%~Ti>gV z3qKg)5M%FoblAM2@YL-QV+rIf#O~{=;vwKwQq}Ex`IUQw(nhFRuC}=?q`RL%d21?) zTCZ4J`y9A1MiXIS0&Voryxt8)gyur1l%1BAR8p2<5nhLeG}%o4rt+!q{)1TW$LA~R*jMp>n-w>pqV>J#Qi&@e7UkB6=O?-K>Nq8aS}z=t@h+;nqkguGnlir?6`&yt&Y~}GAwU1|(bMNi^&dOWkv2RpE5mAyH-eFAk>bMI z6t(?Jtf$0GYGU-6Ic1;FJBz9_?9JSfutmigKDdZ6zzm9y4Fur|)3IasMyWeo93NRd*MdwARYH#&dYD zeJNLb+%!XuQ;+quxKBy*CnJvQ^hShf@L6%M*o&~Emu(!$!!h8k9=hD6*^G!lCrb(0 zu<+Q|dy%SW&DgxUloa8zlCn+cR)Ij`2A@YbBk}qO!`VqdJ1P-Mm%s69Fom)1GeUF) z(?sM`LFkZNo4AJ@qXjihclX51H$LZWbAKu*PzS3tHBAM}wQo>-MG~Ws@9{@XyVK2# z{qwYrUFhMVo9tl%YppL1K8`{Bk9Drqf2<~aa`45_%UxG)v2C~@;dc)FsYzsHRJnSU zO@>r^?cAfT@5k*gmPH)D_?^b`+OXm1)qK}Zg^iGdFmLDS+{7~=ec=UFQU?u+h@o%h#1yCwzPHX=|g{` zoml%;UFTB&+=CA==^2w|2epJTa()+x{3*)Q9T!zwcf+GroBUGhm((wyxMRbcA0|R* zyJdIr2_36K?$@lMOG{MFwdzf5`K+R6J!|iM?Fzaj$^4ey{;Wc>`3crJ!IuFc73^dUd!z~LD<=={?Gi`=z9L5JL3?DLL8e4lzyd!zYI)tc;yNL71N&>-A_7c z{5AyXu+h!n;&1*cxS&>jYewr9)}h~+c7p>NgBfU28Vmnu6M=@*#Ah_!&Jt?<|~JVEVp@EXKF zVo9i+S2byA{n8Qh8C3C&snjmKwD*%Pq@GfDM&3z!7-7cK&BMh&=i6PF{1wMLAceXl z@wLmD{ECYD!uhFSzn$jj7HZ=i0gp7c$<#`Ju7!0SK|!upQ>$|0ZjU&}Ol@h0ftNjk z9%6>t?yUCfZ!MmJbHDdR3Q|A(1Hb6ZxKrnN5r?ZCg z-4_R!Ug*8zUa;1EFuA+;X_c@V)o;3%L?WH~yb+QadQMe@S~=p$!38tOnMP6}nGi&4 zQfqK*rM;<@nsH8alyq+BAx3>=5`APo=h1U5W zQ6CzbZ!yK3u<`SSd4-Irtku3JqDDRV*A4my!SuxgjbAm{vJ5tEsp?#N zYCY8W)=CnnHLH%~7C;R?#wbn0(<^F|al=oO&9p1Fg+Aq9QJo!v(7>pl&hd*vpMSA_ zr@#K4_PF|MEq9Y|St;v7lwJXKg`2-3DBui8P==1%tNm&!JkrDQEZbqnuVlZO zOMZKIw)R2f!q7Bs2Igmn=NCw#T-_EX)va)X8hdn;;K_yB@XigPK$RPz97j4w_gb6l z+4>{Ix-nqTbeLn5F!`OP*Cu0iPG@#Nq&1bQbRVrMsqmutR4gfL6%v3i^e2&e>ewrv zOXa|{Z2hu%_PgWKR(ByG_-^BC&pCa1YHbhhz25gvyo#Gqh?j<4PW1RxPR$bx;!uq2Q;i+agnRBFNjpxEUR3zhv^b zgz7Q$=|hPUFJLo_pFsf*fRRKEh~`o2yV-QYDjI(Ysi4Zggc%GURpf1Qy?ooPOfC)0 z&w%$*@wCP}*#1Cx-R~%g8RsN{Z6%7k{ioIe>%n3VpyACo<%{^k=F!|lY|3D#)Z44w zWBuK)H?v1a5d6}x_*?OR>IjlWKCi0KQK$3F8fUfg-_7lBBeZ&ie8b5`M)#0UWhtqX zyb7P#w4hf`Oh)>(P@|T|Z$V%ZhvJd&?EJ`a`pIimUDmcv*T=5C-S654=L%)=9XWBE zT`$i^f^D?3B?9fFs9mn#XE>F11_#^em^nTv$n<8guVf(7`cjxgms?8HYY*NNcr7fZ!xRx@)w9F# zxmy>_^^vC1{a%D9TfQ6pOG4^B`=GOA`==OVS4=IVf};xCitTFwiF1drBD!s#YMaPQ`M&gY%{-h%PEE->aK_fs(ri^EYLtnR!DvASPO z$oC7~i=M!PJpmS1pu9sI=l)~1_Q!{LFwWYwL8B!QGD9L${x`LLuwM-=I2@D00bYqXXD`*y)5LpM`CbKhT@jw#q);zp4?{ z>1pjdkR}4t_|cv6-!FbH<9p6n&%VXsm8?a!miEKqA_1SZUnfZf9#?dJb7at{rpr#^ z!tq*~&KyPSC*Cf(wG`LR-lAT|H7R2=WE%?TF<4S@&wes!P<|#wof(Pta#87byKlh_ z)NvhLEph%~^md_6Sb8WGDxJtcC>JSI?4wtRO6sun6?4Cx)3_s&YAS_e&;h55{fa^e zzgcs}f~#{aB&Z6TKh1{!vX{@Kwh1mQqtHhyL}008bj^g3(o5_g$FBUy<#MI?M}yS2 zZWyHsa{aW0zjuadCUAOt3PsfEMwf$)Fs?CDPaX!2ORfy(mG4~-H=-5Zp9Bi**$v(m z_ZJslz4u%R_LqsaGQYHW9rTED&izb!sxx~x!NM&kopw4k8uHr$qDJ^nkz6% zo4KAqj2=Kqk6%Xpi=ef`oeC^p9`W94!7>`S@LABrDPgor(X;5;W=Ca~)PzP$si!x# ztw$Ty@vuZXkX-hh(=I(#&$^-vs`g+h>7=N2VV43)K@VMr!lC^@aQ48jTs5((_ zXzp95HbYpQI?+55nC?Tq2=_#6J)9kixJi11m-3O|fSFo_*nhk1Tej?-@-ws*Tf_r- zAhB*0-Wrp`-bRSHpGatUvLV_iIw-(KJ~ zWX$iX^sj9j^v@MoLoPYZ3(Q@f$au+Rg8{AH4uy)Vf&$df#gr)DAXmkW7*r(~*ttAu zXek_R9zdX+^4RtzgfZ?`6veMQQkVJYN9?seu<3k}m_XP<{e|-2I>X78;9?rFDPZ|i zGJz^DO7Cl&7QUzNxQlGyeTI<7rNXt8XW+!P#m39^xGdzV@aJX9*1-coO&c z0~8}&fT!Osc_=KNl@G6tjCW|z<<1wJA9Yz0@}<2~bMZ`wXZxOyhEa0fe{7F$eS!Wp zWN;yg-V@Llr||@EwI`V$`iFhv z&+9n`t(rP6s^=YXPGdW(dd>4b7^T>*cIKUnxuGKNen@U-fQo_4qHaVXp@oYy#q z0%3CFBj-_k$eIQ-h;d%7z7v?#D>tzRt8Qen);G6n+6TO^+)88m$vIw+xm{tlx{xM1 zeyk|aeIt(H3rOV@3x+aFy?x!AmhpA<=8}>_z-DloaVy|&Q;9vktcnfywA4JILgG() z%ulFFzHs@MmDR=E2)ee6dXMF}?C%fI4wEOHmL@Y7Q@r}eAV%IxiQ?*Hx21R!`#u8NkbJI`D-o}Jz7_LECHpz#D0b1UavBd zyyXX~w?xFLw5@(At>^%Tg6II7>E>4qPjs$ab^d;<5`C8~S|YgCv%__#w5iIjU51|J zt60#cMhREgyd%O<mX80aN-#Mr1EWsuSep+L{8FBPuHanu-DC-YWND)FLqgpg&l3q&XTpM7&!~V z0+2+NzZA2j$)s_$ctuw`;H8{3zFaO zb4QDyLuD5R{XV|^LFjx=!_S$nc00#CCXr;O{UAl!qhPiu8*UB>>bkcO-QHP(Taye* zPYb(gJo%{A-5&~Kdpl%|e6P{krz2Rq6UVtTqkwYGo(Sl=D~b*{mav_A?{N|!GBDM^f042H$t$zRoYliSrFd^Prq zb_IM>ZBhL1dkV#%nwCKVtJm8WGcV=BtOwP;_jfs86CkL7sJ8&~7`{!CYlPOqDr&^c}`5NWCqt&%tYGDXD}{irjA^{TP>6RnL8fOG*ZFZPaJeGi0u2+cEJ zbQ~+6$=r<_=_9U9wmzW9ytSFHb9Dikvne=py%I{jH_Tw!Mjse2syRUg+jumWoUEHT-O!Q4 z#z(*M1dAYkj7D}x*yC5JKE-KkjXzZAi;LZ=R$y4r23J-jr)z*B&N`Au7(?a2SWBWF z{-{!J-oYXnE|0nwl{XOwvGre+@}7II6?*!!S1hZq}IQ{p1GzrCu z_HK(^Jotge(I=w*L;HEiY8C6DxT%LR$xCU8sX2K^3~Cd@cYI$xT2D|8?~_X;dD`g4 z{XltlM5cT|dhm0Yha8QudDSkmnX6Ybod5FLCv#)fs-oHeXfU9TBD-5XtZ#I!CsRHW z=*%^;r-*Wrs(m*2%Z)&DIHB{kAg+xaw!(eY?RAYKmu(Sw@*uf$9ADHh$Q>6*nh{LL zMXJd6C;vxrb;oOG;FjOO?Xu)G!V42A;u_gRI{PY)#0Y`KCw?)I^&Me4s9x-H{?$$l zBi@zsBfeE0GPaAa(}TaQqs!}I^Rw&c{ZV?lkx49>ScVJQTOwf-R9g4!4mkVgziTTR z@Jk-WWWar&_8!81C2#coIQ#Zg>R{92CUs^sde5yTH`8KS}sY9?JUc9empm~)(l zl>)pBR-v+9Rb?`YdJ7egVCuv-$r=)^@9W&gu99dUQl-Q_Xt*NHTtZpAIBYEEsZf{} zS-dP+z^f{rQ|OQaXs+bf(VP>vzWkM0m6GMm&sV0_lb=qD%5smp0564k3&zT;GT202 z7eq{QdQL|_GKz9(lRG4xkBxGYSxAFk32+ zYT>1yh+$~}@&w4=k?)vZiZdPEj;kg3SJ#Dre$*fS5(#6WXVnyG*S$?e*)kLt4r*(# z$QtCm+h-gAFw$w}MB5^O6Ys9^U8`zZc58G{i39$;<@8WJ^a1QY(Y`8 zb1BcdNfh+&JKn8khP)s~OREklS>j+PSFH1}ToUN~r2Tvfhe&&lPp7IpCWoLJuz#vl zCjm7b*4nz+PM(bbddEwr*Q#oAtSBG=@1s9iDt0S>=Uk8ZgNZwnuE=S@gT_mgSEbFe~m@S-KY-Ehh{V1)^mknEz3GWxOq`JgAnCvPGL+r`KQX;uouD=&Zd z_WO5qXhq*X>J(KPwM=x#1G*qtZ1D8;X@OU{(;ztnAA?7i zAiPvEf|Z4XaxC>rUD}@SYNbeQTh}@$AR(Q=OPTWMnbXm20m!MI)>|V90q+NL2Yt&# zYP-?Ff@Icd2ddC|MfAsh@E4)nv3p2UQAykPpDIO>+vI82jDDmsuCJmnw;`BQlc&F< zQ;Lt~{vlEpIu!qVwQ#MR)f&T|i(S@swocd(Q&|$0f3?JY>UEgE~B0S#uSbELz* z&zU}tR>;FXB>1oi9k8$##vt|i&*wKJdZS`XUfON$8c%Np! zK{7gk_>G6iV|P^Ej2oe_JH-AY1luPv1y5261?WDr(Ul}&Mc4#j$>s~u%GU^SqFN11 znd$Y>c`s7R4m>j9QOe9?g>i#Re;yIB*AJj_;vt_BwD~n2Z!P-DM=`WX@PHR9k~@KR znmudyKUZ71NO+b&|2`wLacn@W?yUJJ)2|Lwt$@qpWBUREO8AJ_Q15vGYv7fY3Dv@P3K}F@FSs59 z-+ac;KSV}Q4YQpQ=S%_h+rPkevlu$_HheP*_cBu*e^SY6Ls)Fz+toULHZ{d&;0NK| z?xd2TW4?xe|0y3{_1sT1;bfIA6j0KJs$A?zc`V5>H9Q4t7j8=N+VavW*$*DqM~jf- z&4}amR3bTTXZuy{6?GE$ClN1pFVs1aW6QVJq9Z_*C-g>%eSm><@q>iI>2b4AUA;M9 zFj!CDjzY~7oBd7OZ_#-5W6N+9&s9pCG(hSD-z0YtP&-}0l_C&qx1-j_qv?v_kjDNK zSaaNACGgdC8(7x3;<)b^e*B}BCWO^Lqi3C8Yo3$;=kQIXJdA2WxLf7kwdVAV$0=;4 zb&Jj#vyWUHvQN@o!=P6nZ^r~vpqX$@ka6Cb6|2kYE{%WIs$6S%e+><;70@QNz8SKq z24wZi(hq$Ys5IpL3!Z82KE9>_a;=y>)f3@E9Y0&&HKu|ONvX?arJ(j!Jr$E;)maaZ zPby_3CH8l$v{1t^GMuoHE1W~9>DJO)Fd?3WV9xy71eSw&)+W{Z8+IC&?~%2p)*{6B zIQodZq>%q+AWFhIKI{I;SYP+u759UXh8)GSHTS`tC%y}8r8B4zL&WuFAQJRN;;0FU zP(HF>w&S5_2b{!wJbVIpOQkRpN~}znG%Gz?f-00nw*Z0%58XjOom+2cCD8IoL_fss zxo)V9+q^y)S+Zg>^>kgi*1RcMEej45-}y8}w@i2!u<2u)*dEGvH}i9x#K~d3WN_R! zUq5qO|DngPHysc4pEWG^X-&@T_o-A2EHz-Z()YMe%-Z*=dhks^iQe*%N{!4lxuu8U zYHbD2<;u2fnok3>s?aIZPOS318n+i_u>9;q=de?D3aWQY$}}!Ctt5pD6T&~d-Wv{ zXQlxx$sH*f_ph~s1n$_wnP1yk?B>w7KyNFCyoMcHhN=&Hkd@Ov z(AI}XnF+nVYeVj8zMtb<*ePdSGcpJU`lo;Dt&jejgv zsKFNc<9*FzHJ26TgiYtuKfiK38gsW$I#%Sgn5Qk#wcM?J&ER0m@3SbD&_PccOhD!z zd>dFTtIO$=dVfY?uZ5!*Q?-k<*x4o;Op|*!(K_OL z{kor4|LrXKT6Lu_f8D89Yn#0%$!fh9rIJh1*cne0NV0$*RRgC518kp&VYXcJ0+qh? zcr9LZ7QfY5gZ?cRmv^Nu-!x*Zz?xO=4P=i6hynvb`-=JloazT&)^!SK+?#z2aov6m zyIw6z|Bqg~Y&FlwzqM?63>26-19N(D6v#JF!lSWNy5(Kl6i5I2)|x9;$2W_UDj*=p z|43=2$t`xxH(#ZrEZkeJqrp$AHfX)B%tX+SGM>^Z*~I_P#gO%E$Bd_>E0e)DGb;k@ zr`|ZPMe9^xtJpSs8vd{6?f)}tF_G)eL7HzO|1HidAG3^uoUU4SCCIg@e%<*l)wNdD z4rpp~A1QHYoDSf>pba}*C`(ZulM3r(vCPKqX3N$Y|4y0hhyV39O}No};9t&sK7Ll! zs(e9C{g=S6VUdT7cO{SopKNmNBwu5^_zr^D#ikuboTJlLm6n!fjuQ-VGu|u}-*z)= zX&Yj0N&6$i@8P_bvHpLryt?Q@ReFl@oQk~wGa2F|+!0>GWUbt>a%6wsB-dQKR_&8&s5BcKGp1DP7qiA{;56gj%qwunZ5) zY@7*MYxUHT;73tx^c82cp+t^8I3i&O?jc_0FiZU@<(nL`6RB6s(x={o^&4^jUUUET zg8&CY^(FQYM5)TA_u@N10sm2NvR}PHOg`QhDLv&Ys-{Wi3{0)IQlI~_^%4*yLvK;d z=ND#9)y<|wR8C&{j|(S^CqLF9PT&{Z6#wM+^B=R~VHe(^_#X_Cx$i{xc?bnv{^hl)(F2*F{Avvt_Cu*+AO1p8n7B_Fw!nF%okvX z$904G<11w}5YKJ>|2Bwt+#z8kksf>7WCOG$PQOKPbUOU}ln!*dMH<**CL8g;5hB^b z3O1IJ;wQe9#<3O8Lj%xNEcsmb38MWMgj>WP9{V7N39>jQ@cYaB^?%8WJY12m0F9hP za!LH3%Z}Bx$VqF$!bSjb`s+^v$}=)&x*@{_^EKml1}8&n>j8V1txx$uktd|JajyK% zr$hNoGEzeMw{O2pS4uc(alV62$U|yZ;u@Yo<|&6Qi3+*LA3O~< zj@@cMKT}q#Y0i5&L*3_mkKKzh`Yf6B1S-zf*tt>JvibC2FCpGlh}_@)pCP+&WlASq zSYKM-J>2nZm|7)eyXH?KMn72O+IQK9N_CKVv6BSiVu}im{j_1TG^?7N;OgIX;YX>@ zAdZ-8!-y9;9|>Uz=FNXOMafmFS{NBwD{#?do|ik{k(*MygxJjB2Gwbil|@4-S0QC* zS&w~DpVSrqhXnuK$+B;-bVjP2fB3H@hfe|h8C9!X|8>#K zT^HBvN}k}Jyol`&s7dK3kITl~Ce9pVX7WR3$KPRR$&aP$BI-|KIe0m5oc*AP+)40k zNP`ObVRe(@;(RX5Mkt%`-JdFr#k0jR$rmW%bc|7pi~*QbVfAbgcVWv16SWLiEhET_ zNt@~A(T3sEi=^-_GEIB_zysY$d}rp5RXtitw+$uUl;9x_O;-t`mYd?@EOx%mJhJ1U zBqwV^RaMJ zCWu`4WT%|O@=@PZJ@Txdr5V~}WCa<$-*APjaOd08GOSUtY5q%j!6!Bhr|{mZeWx_> z+)2deWTTNSMRUh+Y7ssRl59|!p9pY_fpn5C9BH1DX_rIajyvnTpV6kf#4+XRu~?Hb z!_8lI&i*t^?56~;AoZ`!2r5>$@p<>1`8)aelYM=?lsH!ou{km#WB{tLz;nglt7$&g z0P@glM>k*!=CQI3-C5Q?KZ+Fs9IT}$NlS1#i>9L_OoOujNn<DJ*6p55uK4m{*fb|;3)u{9G} z@}k{_`YikDypyL5i-5%+krmg|h(FrIXl-8EuY}HTz5IUp!GE(4E>~LYTu_mdP-DKT zX}z#|@iD>oAGZEvL1x&WPel!ApOZ3w%wA|LDY9Oj|C}Y68n-E~Y|GbT7^kmY*bH-+ zf0O4;*ZJw}c|-g!GKXP`JxuC+mh@L;s)|mK`i#s_nIIHO35-hiB2Oog7J5RxA7A{Z zm!eGP;zm(fhL6Qt!9mLz*s1a7{3%>dG{LqW@im`igHb!u*_rj`QqEbUQ^O0=piB?j z2ZPUKVQq6!Ot|lj-4K!I{&{CJxlU6_tw-<*!n24BKU*lF!6rG-TQ5B<+b?wl03Q^6 zD{L3G-LtViPQ?*L{$vFZtIm(BP&-~HENa`pxaWdPr$1Z)BL}CUPN|SPXZw)z22-8# z@1fBtVl!0?5|By9==Qr15ij4l$oUYW|GT)+hW~VEWTsrK4&rcxJwvsOAS~@hrE&+b zKa;KfQn~n-QLuv7!w7rCmi@q)VzBscFhP6)HM)22A&K1mIq^J6fLsw9VSnBO4+vcl z|BHCS&{&57%`^(xjCfx!l~MIhC)wtyTp>)`2Q^Q;cDiFnxv6VQ14fCvFOE~xo6?&A zE=b$;5Pq@Mvp$||k4aq)LFZk*0SN|_#N=Q7s{cK+fENRv@JUt1-LCwsKGdx|COP97 zsEi?Q%p*Oe2TV%;ZR952jl1cbx@7B+MN}_aYZkMn%!6=x=)T*RLMsW_b(wc=Qdmlz z2g`G@(akKSO&F8Jr#oWc2NQ>yr;gA&GfOXL;P-q2eu{Pdx;`jbAeybB+w}L{GhAT( z|5{bcSuVVC#&0X`8zaPH5&glOQj2azCfin?AU&i-AlVO;fV2?%6?}g*fRFS@Yz*9` zsN3i7kL^wPA;BVLH=kK=+=Pi`6CAjS2>dF(Bp4LqZ{%0MkS_+YO}{eES-&msP`x~B z53_PBV||yso(lW01I+v{clLeyuhIW{cG0LBLv+P80Wv!rM;R` zP9Gk}G+^o&;ux})DZd)+zTakZ4GtO?qAW^iJ;!6^I3oUF^OhdXGW{1qWJY&xJX9vY z_pVsO!5hh;hA3%_o$=5Nz;8-N^CfPJ1tMb?I(RxHrgWj>MnQg)r*)IP`%O&ipG@0W zGIk|&!vY~_kg<+ytTcSSQqnfA5pv!#$h!675csjYGDp=ARX2Svsw!_o2H}GVKOmSd zh!q~Ky72rd7mckExK6Vjn5rsT@s3STj^D4Zp6pylwP)+~#Xep2t~8 zS@$&Roq722h$q)fvGWuWnEU+e_P2xHBC%a!NMMVM)Y5%16#Hsb`01J_rBe%I@I@2* zzz9_JdGyzTAf_2csB~YJQN*A4qp5F9y*e(ohlRB|B67iNt)=$Ep6m-5nFyZ^Pr8To zTkiDDk(x$gX$SF<5W9KC9l(fClVun}kK8eR<2h?$w;7L7dQv2PvTA;*QRdSk@1>c=1a z%}5VY=S&w(r)Mj@1zyoY8?mNevm%W_PAx(=#5{(71#=I8x-nJxf!OmSdkt-M8YWv!o)&s9=xIAXX5#Y>eWQNDVXX8Xq;~I6( zJGPxq#ckL?MQVjy;yDX+dw4I>9%DKNZFVRgM_K`z6nG63bsAE$*!0OA+Pb;{|?L5@ARc@G3= z)x7jniuo$SBV62~_Vb>9sQR;`#L~Ny(beGYbhkrL7=8*8PVVb4#Pvhi< zL*uBsv$}FUe0gCK?cI>+^5bRrYO!ayRukGlAwS-ffR)&I+`s=Vh&0%Wd3LJRZiKcO zZX1pZ(l7ll%E9_;`U$~}d$)WmmQn`PptT3$EB-p*hhZ1Itm5C%xfk&Vw%O!fC)i8>TDQA%=oK(t1cOfcr!(6K{js%@fmgN?XNpa$$LG zFh4`sVaZsajQI2&%OYxAuYd|l5$U+;WjNjxY%#yinyUC;Jp9hSdh(*>eR~4dgd1K zpI-hpYOx48`LR*fPEOFVU3fl-5=k3q^PhTQrhU41fGveB*CD2Uc?+D?iT6-7NJs}8 zo5+1L`jc0#ebiby9d7@;we9CaWFy_r4?&wBPqHuVt2h4&pM6lvi6l?@pm5RqHGfV$ zXNM~4;OAqNcX?JX^ z!&vW-Bq&GN58cP%brvwGi+TzAhyEWAYc-d#_m?NQE?+n>sX$>BZW_uV82zd``Qs;Gy-={xn`0 zmL&?A4G=`GJk_vGNw+L+{%a3+@J-4cNb?sYHPR*Z8QCAa?{XA}FUZ)Sc08+8RJMHp z)Y?-t%YXC}R#0`n7md9GN>oly*;{_SNA6loDeV5OXc+!IvvH&wmMr&5au@CR#dmQ_ z#%DXQ=?g7Td_2qeUzHE~Kz|OFfjwkndLjNrdTjhQpA4gmEmKjh7~Qgzg5W^EuQ^9Cgbv&yh-!Oi zDQ(F-O5kc+7;DUbv3(1-k%ry1gNK}-9yV%k{vB)Ho3LQiUR*xr4zv8MO`3p&yPTK| zV-=4MjvWD?*fz>zwuU3CR*anwd#P4LWPgh0O9KOIOu|Ow_Pl~tsYo0H$C1wfTQ{;Z zMGuoJ_0PNQRe6ErEt$sE$U_UgS-Ll8FW6Sg*I;?Uumc{et)|6f?l-4@CUyt4!zYVr zUbUIPOXH}=reM_n#21N;p|!15{7P1y7fhf$ZJBi3c;&Hg!8`)G{jFzk;{JH&i<-KC zbWiengb5A0s57Ir(N9t}$eoNC{&LA9^fxq&Tv@QBXdO&=UoeQw0Y^*TWaAC%MR6M& zv)xd-XR_e;C&LnD8S_3nu3XaH4Bo3Bh5klsP0Xe@WUc!0_uWAjycOwM&%i~-gz}pA{O?s~T*;g&H(%`~$`*({V60Lfx$UtHHXz)8T z+>hpDfCZhf=k6V5II>z|C#9ktIy!&~S3Wd?y44 z`ij7JW&YT`MT*KKObtZERV< zZsH9R|6)mOw_FdvOFM48@0+(p;91`Iz~52}ar~wUyAiVf!}W{?(q%im;wEu81!*%^`IZTvnRUb!e2>~mlTtIyMKf3`CNtgSKivOS*5 zqte>vR4A!@w%V!TudllQLLv+0jrYttK2;0&20SGcrl5v;{c8{FF^lkH*~u}Vxhl8i zx{&QG=v@BVUcBdH4)eYbZ74vxOh{S6VR@9nQsOnOaO9A)ei;t_(=jl->ZR=7fz&(R z^5=|vQIU09HOPRpo5zb39In8svgXa7w}!5Ve9Sr^O9pPovpUzf=|1z@C=bxqnVgu6|0MGT%AV)Q zzf-_Z8vPl>e|6PlwdcJ4g@CEA8a7@|qjz)lOOpD!IeP+9J%N``sL&UXkIPH{(iSBX3(yRaUyl#Cm3!sr4qR zT-b*U!D}RI=|vbW5IQzHj_;xUuPm;`QJ5$=NkxW$IcX#@6F_o%4`mU-4F2oYyi#JI zFU(nApCxVV;VC2BvcbRfkh)Rm6c6+i@g`F(Q5^;m={lbLjhmWemSqyF7KGpfizro~&YPQdfjb8V?v1C@&#h7kd55^gwID#>FA znGwn2HT7a{-SUo2+t5cPT2H^s(Q5e4 z=bC#vsi(Gb`wn0?T8LDzkyauK5pSf973#!sQ{6+7Zxevq=BWLwPiJ+@*-5b(ZKf3t z!Ud@846cTTP5df^vKhlJZIXg~?={{IJ=9iRsX|51XPkWp&VAI5k(-q$YLgTs<`*ma zhvERenX9`N%7(Mh^WWwg&4%(5oc1e^j>TYv$lL7>bZ0t&^$m+B2Ni2A$Jg6|RN-fr z_|JZ@de6%_CZBj1hL5j=lk*-`?Bn^5)p59YxkX*Fz1LotoP01wzO$ISrq)oZ0@xd} z@9YP5o8Epc8`hC6OQK;3*~uC))2OKNMV{_4sN-`;$C%A4Vsfw5Lpfb0r7H=jc+cP{i+0_@vylN}`vj2Jk2szeR%^TcF zzvlg+(G?vA*em}$-nHAQwYs82tw$B-OqMN&QQz%A2P(0sM-|RFM+9g^8l~##dt-E5 zE{R8X7+&J!9lGpHcu-XuiBhL@rM-+)Y)Z#K^;9AsTn6fs#W44fCZMK}RvNtypDEQV zsXwHuJG!7N&FWE#N7M$<)cFAZACh#9SjlK*>uGkKF_r2gW*%44HCk4G0b2HG`cnrp z!JS1W{g6%&Hqf-%^_f!c$@_{mJUt%uU@j>oGFfY4ubac%L&>f#>ASx=@0&g;*6_P>fGbKU6kMg1AV^(ra=`8~Kz0p30V3|}Za?>|N9!PXqTk6skt)}!@|1-{Gd{i*+?TCtP`PKRiT`tQaWaEXOEAIL3R#QU zh3SRg&njP#%$vAs>c7u#rDiS_)N{7pcQ(XjdT_n;*#Kdl-+5u{iwa0X^_At4i?$MU zPI2}wzt;Gu1KkALBvkzLW=O?{@Lm3ZY2{;ezP=QpvoNsc%NRhH%lfCLZ@(nSa`hj@ zZ=MqZlOXSZw#kdhX+O%U^w68d$Ao`-c!-bTw)aM-q};$8otbOxkH%`?oc}DY4n>yB zFEMTIS_7g{#Jg?ygpxL6S@pZ&3TOknuams2UWq(RqPk?0<9eNyHfHQQ1&^*2o8!6!2C) zJh{}N{uREd`p`7hLSq-*??zb%s}k~vA=eIdibvINlz6{l{0=5v8w(`w^Sg;NQ`%9w z?D_oyU%F$M6Jf4*HARQh**qKnQxEZiVCwc~z8Q%C=tVR+LG zBK-n5bd1I8kQu-JcBz-@&FVZ0n^pC_l=J{2!h2+ZTlVNs{LK1~lBJg|#Xvnd&6N?_}C6=A@wvnz4_hx_mxze9*N53VSo9948cS}kG>8dRty>Ws;$y=B=G8> z`*?j%m#{~{-JJ8Z1Z^X4W;poGQ9NKi>oUh>UfIMl+saRY-L*DTqg#14}k=_?LYzVR$1BRg0& zoOFxkbnnVGm6`m!_6P~^b~R-$j^-<2ToUuW(k&I3J7oClxPtYS@h!|Zwz z3yWdRj9IIVuvh4*Z*=rQ#Zt*eiX004WgdLq5YSxsfh9jx$=sjjNQeNa$T^A`FGg{< zOXqr|o_?sWsz~~aN(~K8Kan!B#gx8{vT4xGOp4EsMp4R^7E|7b=rxL`HcXXZI%2M5 zZ0*|$U0M%r`YV`61NEgYg+|4#u_EmP(fW=B0?b1`NWrKVw5*tqYYAK%G#-(H${qJK z((jzrdYW7t>j1JxrF7i2LykR|oxFt9Gi%ck>M)$e@z6=BZ?>XMkvUK?S&3g9J zbkeRO{8cOkKdrZ3qui3iBbZ&9>P|4JerTMSuoNlh?ga%--L>_AT83z(cd5mzACn@d z#V`9UE8@C7%B?=Fl5MHEF6}uILGjKRZ7cwbG()gses%IfuEB(ADt?mnzg+o_S#!&0EgPLIZm* zuraNpL&@QDYloH(Y<@gyI}b;H8p4S>%lLwK~2fXmpYfPps6232T>*lM5Q$2j@Qd!uS0L1E>i=; zRz&6)?cwi~BIw=Js8Q}Q*J%IIq-mhGs2}>EI4v%@$_O92eLU=76K}R!>L&WO=Z{pO>Z)SmZAD46A#N>klA3*eXAFCL1Hwa+du~mQ2t9L8 zu>eM-VH)(FHmLCBsLr1dvNvjQ?T5LTV36uW?sMqyg8!=Zy)nZ6F>1g9f$4284bPL}V4Sx-P4aj*<23~cgY!18*#T8)W#tNmr^u4a+ zEh)$ztaM$Fyt3fxx49U9;ulw@&X`MVozN|Dk70H!4e+BkZEh|VuqKF>sxKX?9k3Y` zk|!rR@x0KK?w&^d5f?Ky1x6TBS=o3Ou(u!zB6W$n`Vl!!axT}1+NW`adrsQeO?=6U zHVw1?TyQhe#n=;14^c_99%QoDD#cD3_oupY@NtvS#Renj+xR{9g+ulpBK}k@zwIr9+U0V5?J3NvP*2WaZ%@XSTFKMgGCW2mDa8VKK zJ6>rW zSc$3B{Z>GcAjn1v>kSvA5x{(+h)vn1p<>feOYilMmYE?9p})2=1`{^u^pTh+I)mt2 z)(=$RdVwsSQgUN)F-{Xe8D5tv*Sm2}iFj{iRynhcU6u=8?U23MP&(lS9;i z`C);ZOkeOw~>fQqm8j z7}V>CU0161?wqPA5ujA6E*&2lfkf$Llgt@5{i%HuRXo;7#rW?Zf^9jgAn~B7^9IbI zz1r?`7L69_A4ynpxax68b#!4!`jgwR-%fPO;t3m?aGHGSPepAEye*UOok)L+7D^%g ziJ=ldTRpU7eEHW*S52WF%eo2eM^A3r>Z~Xx7?@X)&nOeF6V`@YYi#_ztm*M2T4?;& zWa&>oKj(MoTuQsfh+7?4MdKJnDC?-rg_Tp?B|DUE#BCNsql5(ycp2F*_)9iB5smS& zy0@cyooy9vF1_}sB>N4sp5%-y3^u=Ou$!Sp$U?w1syuQdlPEDFAb;avIm;3>v;u*m2!Nht%8WOO*bYfyOM zSd-D#2u`HZ=$I_%D#iD4OB96N(;AB@!8=j~80*VvVd!M0I%@`f_xJ2STCC?G+-lHh(iPv7_a z+IMpRZt2m?oAcvN_gMEGv&OzxTWMHz4QFfBjpshTxd{q7iXq;G10j7z=BmfJ?3ycS zYXhXDHb18q%Kmd+<$oZsdE@M*Z0JO$sDbU9+ig#zxzg7YECX#iQcRA^!{*BC2A*!1 zx{z#)xdU#unS7T|vL~Yj{;hkq?r3F>Qg0D`m4x*15VVoSY=p9U5eS*dWsuvjN3s@_}zh~1>pL<@5LQv90 zQ`rtjYCHGvqx@W?Lh5d7nn=v8=RYHXd@E)&8SO#%`5)n8dzD|vY&UHxmUiD(A=2{o zUPq+`ARIR4IC>&G2o>E zgs_10C}!g=n9TGDdVfz@Sv;qCGtF49pz_&qDrzaZ@!3s;ARXVzGr3m4Ej9ew2S6_3 zF+qso3aqcP6#!E9i8Mz%n<5%>PVYb47*hnza+{~tt+ADn8G{B_FPFjjoI`!+Hwo7v z$4Zk#V z9ly8sZuVgPWK)KFTwM6qhP%Dy*tZ$N)-(q$lwR>yn3*Y~lIJ9$s+_KQ_GpfJ8aImW zz-Y^;(k)u8vQXN=wu0*ssrQ8SMI)7>laPEX2HZ;6?{haUfzCX{x8<*>FV#EVg1)~J z9NGq8@}}j}Y)k^hI8zBxm@SC#>2_Tz+Dw*~e}V3tuPZio{P}Ar{APCjlNUQ(jG23k zGvJf<{R*#!NL{;h6;*y|!tl4br42UR&!Rae=tCk4+`}2|$kzNPi>u8QY80i!c9#Bs z*n6*lrq;DvSc((@X-bg}3MgHWUIhUKL{tO>0Yw5xAQb5kq(~8I(mPT`I)vUkCWI!v zw@^c`3GK}6{q40}``rEi#kn}=PG`uQIp6uVXFSgsV{AUf?3+B>vi9SrbFJ6GSJE`0 za~jaYU+bDeYS@n3o4>X#cOe8~M&z}w5y($uRgH7=w@gO2>mNOl5m8joI6b&}|H=FD zp}sR3n#SHDR>k3!3el6?9dF7HSaUU#!LHTtP8cU^GaeB(kHI$wcn|ZL#UChNG(J`n zJI_#cp8eIO=5eY$VRP#;yQm}X(5aG|Y<`Pf0{Z)!!CM~c9AeCPaL)|%y^R0HneSGx z%9q|sx4T7oFM@5}G`Y-PizWUM(346w8^X70?S&>SNcYO>$7f*5Jsr~eW z{QKXOQ(l?c*_4s2`-Uj8moVDFl-hnD`hNH6e4v0LeMqD1rwol9dCGp82GkyK2e$Mm z`ly=ptNNiW=d5q~B$JVm*);t$RiVRE_wq9%(j+Ks=2a*C`u=;BG=AAI{e3My%VxME z-V%-E9riD`$=?{dk{{f~pAF+(5@%qr9DlNtBjcIuXZFqC;C`f@SNsz!xh74uX*)L* z`JIb=_yL}Oros)g2nXbM3eC~i-C?#w55%+5HqHi|X0S8t5 zh9G-ItRC-IGb!z_qO3Ud`i9>7z{23~O2h9b*x@T!8tlPm0k%ptAZSmqIiRczMxGv> zOw#$q{koD=lLN^>R{aWSY)!ipPSd&VeR&!hSc~33(l2e9tF*azwTuYeXFPag!L#XJ z^G+EuKuvH`+*qj2-910bZ8Hz=8%Aw>^V*zO zovm(qxn`cCOTSF#yecq%w&l_^`E$_6d%jIvIOB!ovTTU0cS?`vZYL82EM0QPt37&b z+Qp*@lOO!q{vlJP9fT$~6?*A*$Ki0(bELTY2@&o6;#8C)xNG!Kcaa$bXoc~Q>!r=A zzN&t7{p1!~X525fH~ornVe8UgOTh@bckPv>vzd&B3~?vP;_@Mrol0g|7nb!aGUz<* zngE4b%Tj?f(W9Ci@3n9P_GS$x=tg7T`YQeVIf4_w%jcDE^Ogw)u6MykysptmCM>NR zlT9tmo1jbfoal~UaC6kR^h~ae0@543QIDSK_KTK~Y!!V^Xz;}Uv>@#u z6|>8P?O&XRCKHhQ;%Oq1%T=C}bLR2uM3%jOWSCus(5=ijI{NH2?=b9vVw%RNRw9(J z8bxI^H!UCEc=YAn(|5g$w_C_*t|%=X^ydB|zQvkSE@@HPEJ&xFNhF$^d%Bj}G`-SO z?BNa~HL#lG|L`5@?WsqJnq-RjLEMCCZX}~_VLUv@%+;)lju}AOj%{0LFa40Ai}&BT zHaqmjYbZ^-Wz2;@0|Se4BuwxeM08zJMGjiIpvH};hM2S;Qe>{uSC_XD6^&VXtoV^B zxa4fX=ZKlGA+;Oy@Zqp^jVmg$u?w(JEsW;^8&nV^Vtq&Oth2qQm&%JSaPGz|wHuOQ zUBUBruekYM=q&bH&IvWofY5kz#T!cV4WWtN8s}%RSoLjucn+hyGfYUSC>2hZYqU0< z;bJ@uBMZX{UV`B*VeGGnXC2K6$*hKzF@p`(K%hv)7(PFpZriRm)t#VhZvCijErBl)|ERx-Ua97ew`TUE5f7Et> zyL6yW-yTLjk53*OfZY$3+vJ?#POG)#>YC^49kU{qUud3PEeBijtc`bRGd&UNm2w(t zJc2sH(v-A3g`yFuwWjRh&Ea#4bp<9L$tJGxC{6oCx_|IyG9G*+hY753JzS^DLRHmC zcwNsubH9P20LYwzd~qq9r9K0!R=o}O;(gZFh6n(^q}c7|E2RZ}J!OYatc1Y0FJ z2UP~`ZB~$Z?ACEn(0SfG(6;$RFq;)e#J2g1GA)M1i_FjpGgB1z5gYrlvbr-bs_};x zN~ckre!;ybaFt*piNz>ew=!LB=re`pA*IvMa#*&Wwhim7+Yxe5t?@)q*AFvmtlgYG zlI6GkvWg=8ahwShBhE4s$5px73~K*aOD@CxDTPhgqr~g2jIzZog)4*3L}xbWj?b-> zwr7^@S3?@qc?w;{ZRAhwBNZ0VpLc}du_K+al55d7chQnvP$Q~wdw#)nRG=W*pTfh+ zpSKuldEQl7n9}rS)>*!hH{5$+a^*Gmsr=Wn&2e%QE@QW|=Q$zDLsf4Y#qiTGem;^` z;D>dEt)RLvwCWq*ItL7g@i=%aBU#;qjG@I_=ei6$`~tYNFtMvcEKj;lXMZ#>vZulI z^p<$-)ir6U$2@6JzO=J5T8j|by~BmBfW1tGUurPb^JMx~P?m1$BCnylc~H1C?=0|5 zbT@q?h9BbLk>5UhOwc%am%|Q2_J-7$OJ@^9n!cee}8u z9#pnDX>%`J(ntHPUOmzxX%R>HxW=;G$Of9gX_R&YXW?SW zCbKu@_EQp~LABJKyYQ{|&9gg?p%-wbsh{(LmlcRXL9mM9-mg-swUc{VClej-Z)R<& zoSk$j6lEL&$(zE)5)McS#U!|d=@1p@IQWYeI;N3p8)mj|Af4p7Amit_cYVcsGLY9# z&d|c+>ga$!P{EbYoa>BR*gZ>*J*E<_`|(c7 zSM!PPsV0SloWZ};_o{hH6g_x*QKd&ya{G5y5cDUcea8MEM&V_O$DN-k#bVWsL2aL* zgWYTt?Z&5F>KD#CQqU_Mr#@fAb~EP!)r`QKXZBMF)%HNjLA9>n`Xex3UuWPBm#0qi?|>?V)|fXCva|?a)dKXIr_I%m7Zta z^++|NTu8&7TI$&GlP+$&nd=J~{O3IwTy&DChkbiM_7As?S&r zC;GsUs%@ncW6_UiqeZmd*%eMi_7j{FnTCnoi$*6*UaCeGsmA14WKFH0Vy`;>M$&2c zhujVGd_!3_OshE4Ly6PDy!?+74{zD0a8$zmd95wL2W4{KPIfGAyLq7A zmZv$7-!wnov(o;u9hWBkSVory|yJ>5F$TSL(YVd@3H=PQUi?U3{j_A*r z);uJMgEkVURC==Zj!Lp&vNk0S$|fNfN`sH;=ITU!SRM}0Wa!_!Tl8j|HEitX`IeoM8 zv|=1m8#!dH4HspVLO)4!_Y$hBFc4A*Ql*rThJYGhe5$ZHEE~{HRPwZ$oSg33l-~N< zhc>k?tdz)~pU_I*)@00V$$2viMQ?VSw2s|pa)A!j?1vdEn3I3Y*}M$%G;`@c@H_ct z6{RSIe|Oa*a-3rK{7m>`t;jdo6mjR3m4O`>F);c^?|Jlq_AS&wlC7G&lS~sI_}IF9 z_T%(fs=EDRWSi@5UL4!PqLQj_xt{d-`)bF5aO`7RtFA>T?975kJOc_thl!WJnUC}N zPIbs;lQwxobm-lGuvxYzN%}Qf@ftSr8^ZH3JLzqo+x-$gwxV5L7QOy$H00PH|M!<72>{rhvE&V@o;O^${ul(0-{^tWzW-4_hh3mIC-u!Vd zxL@JA6X6TZTDouY=S?coFc1?y?+^D=Rj2>sUVz5_Gcx}F-@fTO_HY9MaQ+Yg*RT>I zPgcrC49y|?tE2v>3qEoP$5>J-ZF_pAidj9sdGcoO{mXyesyhCnfAf$*Imm|oKtzL0 zbpJ(;CL@n+4%7eE6qoR@W_=-xv_e%M%Km?ABv4WQh75FqQ||HKZwq%51hhcU377T! zrz`*U`XdNCDRD0>S70#ekKPAfg|IMioq!8L{?DH`J;S|#|JVHgxz15E1OpDWpN0~| z{yAgN?!XKqHkGv+%))zaG5F87S+W7FgtLcV%l-fBI)X%V+C28yv@LezV{d1OVH4DA z9AL(d1D?4FQjVYmahul(vTny;gKIHjsnn3E>e2$ks-jv+FYLj6>yd(8v@JIFk9jT^ z3#=~kNnwg!fCU>Iuo8VP4jy}kD+zIE#v^|Db~ZP-;odk<3u=P%+r4iNk9HV)8yJIQ zHx~c&ekK0LBh`g8`_mr)zi}6EqWs`C=R*t!I9IQ7o~FF+Kz$EneZAb5HcM|&zNm7x z7_MNvS)gBD`#1v#pgj#&0nDuV08+6K{41j<93Y#;`8E>g zetr7a3~>&-5~`YHp!8PviWlgiJ>(j#aliH4=~i9w*+$cabq(;Zjlpn$Y1JgecG64? zuXo%38MLX!oAlkJ_M=tJX5}QjyieW`$Ha61o;()1xBiSHk%jVJ@}!$b%qX9+o6NO_ zJ=L1&v&|SDxI0jOgTOJ8r7d6AyV|R)$p7)&nX1jtS4T~}8*n^cCxe65&t!;wX)ISD;Dr|+}v+avCWDs ze)DRKW;BfQwBcwPz7}gzt3K)0_&c|E-^Qd(bu!I%ZE|JuXmZ!>&*go9a|bvI#sK9+ z`Dd$Y3P1a#aU^2hQ)a-e)EqFmV=8>t*^ojiuu8fN9O`SP04DF@{P6klY?F95;B{aC z1~{j`WKaonR2x)>?P zlV6Kts&wQ8+}#l&959k|YoIB=xs%6*kiS(#iP z&JU?0vgOO8uVa-(5tkyhFKUuZi^;39vfc(3AHi>AS%hoDUmj~Ei4PNd)AQ>;i{&?X z?)6OpEz?&8u!+CN`cwserj%NWaNo$k)qDBJ1|bY5tpDNPh?(Ao>RGG^e7+v)3|I|- zy=Ni=zK3$V$Co@H_jy86N1=S1wo$rSv`_X0&e{2%Y2j{|#BjBZa?b^zpd^5Ea&`kO z)vW{VHkJWiuMi?mXm-Y6jAuk(rIb7{;=Ef;{&}zLe$Ty`6ba$#wVWh4Kas^b`#GjEETF0hG5fFZje;BoxE zVX;}_f_EDr&KEOrAj1^vaYSz?mO9uvzuf$`&kUv4s`6p%OOlTZQ**ve>sxrHenckz z0L{Co9w1cZ%TpgUGU!vE4;p(N4&!FnPkXfYK_*)vL2&Q|>KFF!ox3jW6RAofDpHL# z@0R~EfPFMRuV84{$9YJRZ@Q%S2*{Y-h3C~*CzSy9rsM! z(tg^dCkiF#69|NVet14YUk`8&>MXKfZS}OQ|Jo0mXP$n#_@2L2zuyZmht9I(`v7aF z+*c{)4?dfV8&-nzqG|y0G9`jX0rM*nl%dck@%E~m$kQyEWy0zN$buZG3;BvRqutZ6 zpB4!^2p*@^mMvYj*9bI?n<;pJr`b=G1lGw!wClsW-?2-ZA_C|q3OE1KU#v70X7|s@6pR4?KzbBq=lE0x$PC^k} zr@RYbYjwS4`*^f|_~l2S`DxPTz~&}^SNXwRJ_V>ItVnH_Q`(k|6q>;>n3`tGLdrxu zAZz`A{DP4idQ(B#;PS5x#PooqUzwX*p!~b}Doy@%oH_QrB`w!4nQ2)M2HZCat41EH zxp%3cRo*~F-(GD97#j2cL7g;ig`ddI15R^a&y#*3D9D;#Lax@9#L{%K5Q4y&E8a6k zuF~eso^(pgaJ(dSUznM2<(xMBSdb)f|3-mYT%V=RE#J7EW8or0W&cvil^8dG=N5z0 zqj0KuGG$;IXzCo-;=lx1!Az~l>y556eNP;gpe-(vmYRpeCfij(FVg+4{}kQbqn;$X zLnNSZzNWn~P2@SG?8bU;cbOGo4cH16>waewhn_96L7Enuc@D)Q?7CXZ(wa^}ntr%p zK3tijkYKP-|7+{`)@(^7-15XDJ|WlY;z0Wn_Ef);4O$T$zs$8|1-m@!yDUiTC>_3~ za;`#7`@Ela)IW#O^5HO8GE(b?wQ0-O6QG#WSpKLqTo(^5D*}elCHGfOb*hKW9gaW0 zg)d21XW(8wNkphpOP$GR&lz8W@*DT&Qp1ejkDp6J($KMp!nrGvFxn;1;#G71zO!Am z#E6|y zq6Alhm~14Uj2CHg93`KVsWu~;LGmpa*^qGh=P7W^03Q~a-4x4zi5+b!l5Xp%f81@1 zpVD2Gh0!pEP#x zcb?qXV9STER@ehJm0^J=ho7#V`sX7tR0qdQkLfUOFcUf5sd#8lSi`M#0>)YxknE+ejUyJMX_2y8azv zDTXK^J)hs(EGRaM@qS2(r2^QPc-kMY5pH<{2B0rF_(R97TS^TaS`(Y^JPXzroh1YZ znOb$6f*tw0h5DYA6V2E#`{8HEj>OcFDf%-#qB&3j=;&&gSNnwGhM=uQx@Ywd%WiG& zv9&NmKP$)wHpe~6)m2C_xwX=|GRKwTD6g@CXp!((D^v)X)H{0kBm`-RJ-ERo{@=L9l=yF}J>9rn_BA@i1&(O%|{(&t& zwqtv3>79d_e~vo_QlEasy+q3gQcuj{U&01IU99t{Td1a1-ul3O$11gQ6ADI?T5(6G z^H`Fa`OdWc0HqYB?e#ikO!kNlFc!;jey|~|?5yy-tx{tyni>|{hlcgp4pVi33a+|= zr2{`IYpIp?1Xzx&jg>D?e`7PRGc!#$bt7-tdiCtA<2AnINM~1pi^TlQcwV$niu*X9 zn#BqiU2NY@O802O@F)u*W%KLPt-=SYg{7LRZ#;GEB2w-2*vO+hDz)6#hDO;tXgFKb zC@&)70v$yE2z5;@NcBS%wL``Hof)kzi zE!WD22jMGtFSr!Tmo8SL5-bpJgI<+m21yC4s7*-RIb*5BT_fUxxJ%@iKP;zp(|uH5 z^L&*WXh{kpxLTZW+yCkjImsAR^rB>CP*m^8QCs>a2A;tf)YJApz*z6zIOp_$_fIKq)^ZyWIxaI6ztv>reJ4&Wl>aoE5P-O5wxd)NnC&U+LHHQ`ynpK ztozyw+<&ZBd?>eku&p;sPf)LN=B6ScZ5Hd#l93s5m;ng?u#N4)F2#x)9&EBP7yME@ zU?$avr&3un@C^YW!lLJ8ohW-~S%X%mro@0&H*K59oE=X~PnEesY#py3dpMq-k{@zK zUxtk!n0GYQW@R(Q1w8(BuDJTApMuz2FzsTwN#HxBq~Tf@c0Z&)j~*SZ;%9l*1-VYB-| zCckw}eM9N}8i}{)IpZIP*a$*r3ZH+&?hB%zSm8IZ8e$}S;_E`>UqngE) zk!_KrerzCpTK$5GfUr?NZadk`*H|8d`4I-UH$|F-ci#oy#0N2_2-yOB`NKP0C|5ArJ77rx~UOH zlF9f@XE2#vr|f_ukhEY9zQ zyozCO^Ys!dL)Cxx{+8d;oRlAx-;#K<#3<&qgz)+k=4sv`#Cq^u?uhS!|GbQwe`YEG zoW|hO_b%#xaHoH-G{6xBKy7Z__^tZSFEDTcm_ZkbCtcDXF+4C6RQ-T3ejq(w{2!0- zt(k!uXhwCeeC!{y<+kuG9Lh%20gL=+Go3*|Ga~qD9o&CHd$)ZC*a5Ikj5jCrznW3S zHA8*E|0fIpEH7V)0JJ4jNyO%lWfM0`ML20G<-5H&}49gi1S?4+z+5bHZ{@n|Ml}n*3)ZqqTt1vAsM3;HQJOg7(Ms61SYt zpiIN5t>Wo!jj7+~Y;H(Vi@(Nq2_Fveiuw54`L9b6xY0S*fotYnv(=xN3ots+Pw-#3 zWbZZ%94#Z05J0GCkm`MbDcf#59kIb4teLwARk;FE3i)gkrn?Ir<`-uevk~SbahrSA zqeTKhWG@83wRZzqob?lAYfklPnjTn>M4KaGanMGz-*xF9nn~h?7T6y{I81Cq#^VTm zA2L&)DA5}_Z0vOx5SLAnG_)CgaEYGjQXg{>iB+~zR;G_P4(ESxySvl zjVQ9Nj`*g|?BT{}oSunS1e5AktHRngUb+>=C&`{6VeJ$JJx0ZyiNHLOJmHbNp zS)cqV*Z@GekdE!tYByS;F2iwsfFEq3{D&2Wg1JjT?r*pcka1dfRw@n$0{~&?h6EP$ z=YIM%8ut|bM_+F8!2!CnF3xB+HZx56Cx8>(LE$)Kck?$fK~Z3z5m4yg}VT-b+xP1Cw?U@11sPLWY-e=m!{TBfbn z+(pwtd2Ft8K6`bu=SB5EDC?9*Eb?@0^J_KN0)L*{>i0l64x@}4_D{D+t9~&9U{@RD z^3;_wezh##XS?Q|Um2Z(5r92ulT65^U)fG;JI#&8w?lmTAhXBU2l}=FjO_5nr43W; zT1j{f<4$jh=%!q;WF3L=X`l30SqPD;`zE<^CX;|QqzX{BLXoB5fD?%j%^)cr|DBIv zinpiuFWFTE7Df21iO!BDAwsdRc=MRJ1`>|76s8m|H^D0xFwkwYDXq^PsLrd z28>`@!{iJ0KIRdc^%Q6F>}0ffS;{LH$=vuOe9@L;u&l-8XhQy~2|}eccPCKJIeWI` zZQGHw`bGl&%F?V(Nw1L%1AAUMMJw6R~42u}0JP`Gx+=Lg&Tl^XZpech%&6McS&q{NLqb4RBIm}i|w6MFU z;?9JJEmG^OPGS2GbT0l*UZE=pfyjZjr(H0v7NfJ|b$`w2_d%@eDD>5iRL6F}f)eU4NbjW_R z)o?ts2OxBGls0890Eit6fGoMmE;DXUpQx<2gXIvyL2Wq7Yz_~@xaefB5JL3f$+YvN zjg!Hb2iQS5U^+W(UI6B#x;S8BxQ?bzc3-m);W4wHdT(#MlDvKTbML1VJhE3^tRCQ- zS?$?%%s7?Kw;>EM%fK8cdUpsIMbBO|_VUw09hOoM^ zB?n~!H1|d>7jlcF`w~z@sJ<>+)QDaGFq`PHDF_+rnu}C$eFtfd_%k{O#;Tel&1XU} z4hu{`HkC?(fiC_e8WJR#5yNnMaQ1x51(FtOj_46=(Vn9=ZogyyXlk69_PYxG+Zj5O zy`vHT5L4zN|kgHe!gibYbjge5yWu*jh|Im3BzP}t9HkT(Wy z8>Dctmt=VxD@Webv=ifvAF1U@+Xy;RIBB6AaX^C19+6CP3WfReH-hp5Zz=JoVHp|D zmnE9=T$E2T!DlDoak3-r$JaddihQmNgoVh^Z3&ksfeiy85k8RyU~#!m=&)eCC|Tcz zKEjH9S4;u9%Lfv>!wUd$f1T#@EWn|HvBf6cG)m3eq1RL~0egdWJu77lc9m-vf0jJm zPM8eBPL0Wm>s?uu**ar5%S#e}uxdABsx4#HX9#JiF#0&~=s^+Px68j#TMyuDdv`VX z>BD#u(I~6RsA?XPV325S`+c38?;gL-xJ&pwbv|C5`y$AmGltjf1*3{MHAr>jYaQd5 zv#_;LQ-ZhXB&YMDN+K{ed4+ zg20shAGY;rI^=VR@LZwW9r?dtO0#?G-nmaTln~F=v*X+ZB9w0QQ zXkt|o$MqgY%Ha$8`uIs~)E_r&7ru+)ji`DS;PlPTm#4sNpg731H%`Eit3juj} zH>fqmXuCWw2g0E*E!Nr^6P#SggUm!Xi5`0nKt)Pg23cqqYR>!bF`>N|Xw$}6i!ar! zD^shxekoodTX@ZsSOe6W1&tDII`xG}`Lfn%5CF zss7J+>k|$vXipnA5={VgkvT{iz*P}|F(EH{)TuL)IFS%UR5bWbbGLlOA&Uf zpZpdqWPFdowPfRZaHXgn2e?#%7E<$sP@ejLhR+;$0lQsNw6eXFrM^9`;-FInBi>#g_ev z0$uST4St4Z$#KFD(QbC$ zU^C8025v$*yC+MJ*jq{EGWrV2Ve7n9k)X5~QT66e>`g#oXPt&!bb$5fs}Fvf@Di=g zWr)ey0*fdTv^=dtMe=@O9IPOsX}6c)8k#N->L5ic5$xK4CQLt-I9s%vc9l}Oum-tr zGKns5tWHarF5+}Yo#*+}#@&*{g+F~$4f3H(GrMxzc=GMEG4u|!+EjROTQQR5ymhXp zr>WvhrC!pH5)G@`Z}%K>tlrx<`s*BC;zAYw%r|we!qfK?j~MBz3?vhngijRSUJ`ga zm>Y3VS~>R$)63|JP3ku(t$gxoQb#J;a*pbT@AGfChpIzNC^iG ziNZk-1oU?1(knVQ4PJ@XsqhYHvnK>|t13?=kUl79@(qhWkOH+6yhf+6JvF6$m%>>h z8aDQo(FVm36dx0+*!^XNSfLKt>l{n%R<{}KR=#2U$ckf7!7=-6P=hM4c?fw?uVo zPT}25KAW7{TmzQv@}%q16e(fCZ&O;;({4>eA)R3)KTnVFC-)~$4|;Y{bydP;NA%P4 za3untjq7;agyj}&B|#SCur%>OXBBs04tD{Q`_27f>x#{4&xoOqg>1-QEu5u$G@!Q*l0Y#1s>lKmhKgI`0RN@Ria>l9a<{Yl5Y=(iplXg?3pcyr( zwpn|=>fQYrl6{j<3~wv+KAOgvwFmafvtJSY`pbL9Z*>gDY*wAG>#;v+iPqn%j!jcI z0ou6|-L6!+7~jJwRz*});A14`q}{vOPd?3+{Ax+ArZ?5zdGZp^lbGX=7gUWK`bO=DF7i_u5f&z_I4_KMSqc*Kb{iUuf<6q=#(&BR zdAVE3kwTwJ2X}7j2o8Vq!r#17qDZ+^>wEvNchAA;_6P)cjuG zN_Q6zYBI>Hxc+6}cTne~sb9p=j3*jXB*zJn@NSLk6~p=(I1(^J8IptdD>IChn#4YF zEmZ(KL;`+H;W5ul_B@a6OrVgU@_%{&7!}f_nhZ)nT0@O6$G};%n9x{;%8U@^7#nc1 zQF4Lh6M%K5$q4&nl#9F?T~P>_`jqV&L@L0nM;Kyzcr?S}678Z0!OPc{`IVwg|)ezukh)(Od2DEfNMxOIm`$CTxDw&rJxBM4OT$%%3Kwi}CUJGo=4W6EEyL z!=I$zy=#{@ZgkYc zxqoMUDV&edlHuhK4VjXa2hl1e2k<2!`Pe-Mv5#b+3V}@$onYcf+h=c`C-<0r*x^5!^AJnknxMlvP592-V_%t>2u*9I(kMGA!TFNeYV0)80YlinMUM8eSw3!Tc>(13(&|64(_yckWM{;;?(_5m4Q!$5i4Yz*aKAHl){( ztp_DE*VqUTVl-kr(I3nzI-@#}s2mDUBjTC3^Is$D1IVO`nlhHTeYxD!x%?ay(c81Q z>8OC<4%jzZ5Q@Xn99!Cu>TQdjn$F3Uf(V4V$H{L!$6ko9^b2;PZ1b=j+kT| zCFLt`2OnAswI>~LtaBFk0j1Y~mKfTK{j_8pp;~-mY)(P1kSyT$Wrqj+5zDfBG(A|= zx7{P6P)kuM4XFH29p&vCDO`}pbxBRyY1YP2+Xx78Y}Zhj7*V1p1nbacwOQ(3e;$a^ znQ%aSovvL(HI=#FQsk>flFh|l$H*MV*#w?Fr;zQQx;pv&?B8j+dY|PTS+=;}7;8?6u!#DnE#2GDtMP8*d@MAgCh5^ydcGfWrYBY|jI_=M6!#R!X#=sc#g+=XOd(VF=FmD35^x{vc!GwQ)BFq3>_uGXJ z{TIA#gahG=61h_TtH9F_cb%bFGv%*M{9n(|`F~mS@zO>0`i>a9Ap^eZaFi}~^beIoNkS~D?PK;h!G#YfpM;@7RuVNOetBc(`t8A#UK zDi$`>(tkkW=AzprdL-`89j(F0K#5V?d-<=51&SLQ%L)w2bHMsdjo>L*Y4q|`)~_h| zkkxNQvQ#b)NoN$tv)SY&kfgz5<*yH1*^da=vu`JZ82p!GNNmQC;UYImFpRGyuDQ9hxP51s^yPT$Zh zNiJ}uRFiXYQSqzAdh8f+31~O=_K#nrRC-k!JgMXf>~-J#<@9*=-+6)bXrK_$ECGo{ z8p4$kuc9Z@jC5>0-#>DLV%G0x8@zH{jUm0%cXViwibOg=&#{lqhv8c0 zYvsjpS{ozLh1MoQqLoELJgha|QXhXUG&o?80TfK|Jrp9JDpkZx)nI6 zUAwoOgq*V){^?-q*kxv1{?*Fm^HX~|lquV$Y2U;%I z0VdqeN$Gk=u>yvbef4IHz95_O`VVV^*{A>}TV9+_I|A5I49{ET#n)`is80m_o6P2w z70gv-j-#9{e)IB85XG@j+|HEsQj~8gaEIl|1Gu%&5Hy`l$hh8Be+IpZ0K{GO-IgNN z;Fy&(lj{m+J1(9QF2v#D#7?c>XQ6{g1$&}uaJx&Ei3hyzUnw4-lHRY`pYDL^R%du4 zENALyb+;P@s4Bwn020>b36s}6wH z<0zimq_f5N-V`A4iUM>Ub#C@5D=QDj?c^sxY?y{I)MtSxTxl_}YB>n`(}ftl>yAr9 zX*Zprgb>ivO+7ZxR5=f4^FEXE<3MHyb>weklkpa8&TO-~73CfOir?iJ0XjfIuIEEha0e4~1p6!+NJ(X8%==`k^a@#Uarc7GG(m zGDR}%e(fg8Y9%Ts&2t)T{y&hxM<7JIdL9dUZfjm{cTpNQ61%}>V4UjZWo7_#RgyZ4 zK1cY3fMSpv;?d@PjYh0q_F8Ud6-ZP~#S6rU4HE68{C-wy13q#SS$J~iH{!7dD7G!G zhi`+2<#ka5#Lev_`_TL-%N$j5z8qUq4vHSvBHBO56wzZ7{R9|V8J1EX@T7Sm*zYnCd_Q(^Y>1gb+qhLr`^FboV; zo3PUipBwXN88^UmYSbs)+#)i^MBe6fbFt)i*oHH@Ze?o_C^OY*3dB~{I>pY0%UPW* zPksEYrQ4n6G-5D3Vpo0v)QNxHSa#|BH*nlsbO-2sul+g)Cr12yyboXhwU6lhMRse@5HYblQah?&WOAYEc9=(D zJ}q(@L#r)UkbJ)N-J!2c3zd*N%X|C)0qKkJtF=JGmT2mMF^hW{|B&8fhDLjLSK5jhME*6&|#tE)O zgC4UmshpyixTkUjm$(Y!Hx~NJ@p6}E`w#j;C1&)0Q`ruxJ!1n;*xOu2Bbs{mBh#96 zyt~kk#E6~p6otJVfeAe$3(GhZ^CY#!wqrECvnO4&H7#fO zqBB;V$%<1u%cU{JSo&}e-6?lG^}@Chv+OWol{+k>2ZxA8yfO`W<59kYOO+T@+r4G! zP62eICr_#9;NM;`V)bMs>Cd%HM#IVX1RGBl?roVVGNB$NfIsE~t4Y=3j$cDJgzfO- z%$4EvD3W6)dq5j*sFDB8kQ($b(wM~KZI?XUfp`&@;$->3fUY(}ou=Ckc3YE8&R0p! zT5+KFlssk9`gG{m79`RCIRvQ&;?lTG61IXGX@Y)|LMBKi+ByV$$=G(GKs9kJSGa81HR1&nV7T^E z)S=W^LNHNq{dmR$;+3v#EDFe;92=!LeVm7Bt^gvP{J>i^dedgRxs6M_UTp@vwrbuC zQHy{?aMoS5Ju8cBm##Mj1=n?68AUfNL`B$fxa{%-Azydy(H+HbvEbbfm7{*h4%^ts zVB1kuIOjbq*zKC8;QX8(7hn?m z=3f~;uBRt%fcAK-Hgqqlq6e3JF3OWg;@iai|KVJk1N^Sj$Y2VQbF{rZ7vMDUgBZ$D zCchUMJ|rtL7JL*c7dx20k4xZ>+B0=iC&!B9u?<+>4TOOrEApjxyT0C=TrWtoB+z&a zTBJ`@NN8~hzks3k`u)X(s zY;A9t?zXw;c=BsF#tBG%_TH4+wMmHEGgBAYf+p z9F1wCGszldooIf33(-9l;}D1EF>5|c>vDH#Ucxxl3DZn0|154{Rb%}Cs5Ne?R6DI| z-j15ZpEWptHd(sia#w%dV_~;_Fx}Eco?&)5x$9r&sbEbYSC7>~eqP4JnFt9L8yUi3 z2B@Gm`UlpFxv?v$&)Ip9*gqX~JQ3#c-e-;_Xz@s_pegEK) zDzbMyB^U(%zEDkg>fwL`J888NVY*`9xbYhzyT8Ao%sd7fBs8=b-z(U(#Q0 z;g~{kN4#-!r+~%CtE<=SA1=}IwWq+=AA(=gykGvNwZcp`Nb_DLqAXf@hdOLbO6?h( ziz1Tls3LrioOekVl0oRQ5~OLJPx>@N*T{lO?aY!1KPvv+i)q+*@tueqXRaSZeqIkF zyMK?YXB3IA$$<-4Naa21k?+b`IG-oG`_HXZnco`m4lJ=fg^N4Ghk7SM)!%c$M^mwE zGb)@(SdzCv$|QzPuL2Al&O0r<%zjX>gY%1z^wiAnk#WiH9?#_|5vWddv3h$PN~25K z)>p*0C9g;Jgk1>Dh&0OYYcMw*J|ZAGA9FLu^zQbVsu=#r#D-jMLc9&H^1m%e%TL1d z*^ZF*e{%#Yz4#E}t5=oYOJq!xe)6bpCsd(v^vsk`a#eKVWu0X4)Ag?*c*OIw7c-^5 zv}Z+ z(ojJB&v7$T4VM$3|62X5nq2^LL4*D>99o?yUd*pAnFpRKDVsVq741`UK9J3_n&tt`lVY0QQ zi`?gI@T$bZ?aPzRhnn3~;{Lwlav8|0$vb!UNbwJ&QrR6uj++7HzU588IxdgiY{6HO zN**u)9BIK*QuMFszh`Y}`QsX~a}bKk67)ML+WA=y#S3}|dH^V8QzeV5XU)sAT%3OC_q9-PGNbX@sWCD;+l+& z$`v(*c4{7<)%&ZvrlrIVq^}TaC%Fx z*G>x95p`{)G<-NEate4EUFvS%UaRxuVm%~1e=NLTAeYT!tE^aCz94no<(~9utmniH zq4TI`C>hm-A+=dR*3Vk|9Igmg3~JU>^F(odq7Xb(#(1iUd^0hcqF5kf0u_k-i$62l z&*P=wLF(=_$VT2t;_andGat7d?h_?rT>Zg&R;V%l@k&zJp^VMW_T|O)u*GJE*Gb6X zO+6zWFZSgM3f4vhRw%855nY~Zdo~Ddq=kpbvou{Dd(uY9d{)GuKIc*f;Dkgtx2%x>ht_IK}c>K#XJfxC`W)`N|ujipuJscRr!=)|g7^^6E% zC#BoGK~nUVq6R8HWSmNi3k>fJS($v+osV((KQJY z^4)r;onGBf^U!{Nxrxk!unP|EO6U-sqq2C6;E~@AzIWY|n>SeC;WtU@C70b50(+pU z0$TEg|J~CX!h0ghI|ya|?zZdmPtt*uF0qUl*XN4Qp@p!Xj6>Zfx8?B1ksRuX;;$8W11~mOv9JIc^)7mJcZ3~8)T@sp|4- zy<~^1_vConLJ^ILDIOY_8T#1g=-=Vbwk|eN2>QI=y4Y5ikL!PgvH&KY94zl^$(4Xr z<3>xT6Y>|S&L68I%y-w2U01SD&}$#3yra-F9A(E)#OmRN@=anSRjN2wZQWpcO~GJ= zb5p2Jv!&xnl$X`PZtqeN-OhNIP%5A zT&aohJ`<)#`Ako7Fw9a&J_8sem`U2re|zCZzf^AoNq8haCk{c9_y)Zu*{9~s;Q$9^ zvk~f|dj2UkG;Rg+(2s<0GbRXrg%Ki?1S8KT`{`++DU_yh-fa}mX2>jp>S5C1j%!x% zK)qa;hX=khwFzVCyHA!>XBEy8VxdfTB-MK_{Eo%;;1Q+w#z)dI#h7aEPjP4EQy>h8 z3B_wt+1Ysu*GX0TsFuezl zVj5GMln5_HU&z?;}+gbv)w{j`^R0`n#mG`7)T(MU%*;jN0-)NADe5r0C6j8}LOEV_GeeicP?3H7z_& zoSp^AS$RKoseg%k|7tEZ+&IoBOw?{}79laKpK=x9R_T1q?26-tk>qE;!lEDY1Y_C} z-*}WYD284Z=Q&Va!V{>LD@W}w!P6r%`H{dZ)XD!dYpm)c(!bE)<$zLroz0#WR`+Xh z$w4J{aTK|a;C?bsb&pJXHuK#?sGWJq5H(WsgIm{!+Zopq6$~ndu`ad{r;? z-{C<@{(<>R^;G|NC#*!=4R&M0siUG=An(m%k}`7)&R0BM+y0XLLtM*T$w5>kU;i$A zpMIkMK^!>NFi8u93(8s7aNj|njoNOEa`2}CNX_A)K>p02URB1(of=F8`$7xr_;45u zC%?yx1Egsx8TIP33CHG8?0TsAvhXIEFOoA~Y`rBt1XrG?naXB)f^wyj8?heU)U-eX#ap}>p-?$?!23)CHM4>gg zZnq=Y^@D9a@$p!&-Oj&yK?`mbn#*E+n` z|BJ}&m@mSE0E8cL10Y5nh+Yn}ce~YSE@wf4T9%$J+4)?ltXhoAs@1EAs9g-BhGAn* z@UG9zc{Ya!;piT!DQLtngbuX-!VO+y^`F%$g&sz`rd^(un^H+*1N6HkGX9_0;=GXA zdCA7g^xw3NL-_k_|mFpdIe= zljE7e4DFAKb|D0H_>4H7lARI7;XXLLm)E#K=zM1x9-L9ab7&eThHrk7>H-c8BJzkh zgxEDo5E0TuIh{QDd^%hh9#VfFE?l=Nd!5|CpUqc27@f>1@D6ePfgkmOZl3`wu#OHA zonjUEoA^g8tyJ|QO3=bQlbA1XsLhqn{zFs>nj|~j%||gUmt{W~Jv_o$#vcj08Fh^X z_m6-<>wn^ummKsxF$wO1t>f>k!Is-Zf!#a`_@jctP60X6h zxvZYX>Az2s{2V3NvWNP}0=X)JS_PblCvAM9nCv#c3ycXJB8Iqh5}iVy@#>^oB&jN0^uB;UXG_$(RCyH5puG{&8d66`=N4f-KRorbGvV9;uw?{de3Xv>5i@I>ygkC{xOvG$qegPfdEZC+|O>E5D?F` zMm6NeulgX_tje20erew%IWe&`qr^Fj+uaAU$F5#e1@8p@UegmFt^OaBWm#7fMLS5b zK-RVwh7=ItqKpZXhUJ#WX{Xk8*xAF|WLHIXMBrJ~=H0kNYHeW_aS2~EBx1sUdu+o< z{}NKZKJ?$|@WD)Y1^Q_@giMtpS}dnNn*CFCJUO|(a-H?+nz~ul13ro!4A+wy#HqZ|GNAUW6QM5!=)2W3nlH!BwZ(9027YnOb#ex!BXPJCty^Agg_swD%ojtM*NM*&JYkRH z8)y=!HbpLMmV~2gfse}~TgKGdp>otqmArW2(VmnsMp9cn*H;-ADFkkmAtKwSmS+r8 zp%=uyfFF=}6|l?OU)_3?(BF08hY`pcO`U96nmjP_x(#(e94E-0b-NWe)(=n7gj`=w z9tcF8k=d-CB?36H_C7E*IE1yFLo}0YJKd=rtn7#9}I~7z)QjX2}GPq?zH2z|Gr|L9xv%ivG zBgsQ<=v6PBXi-aJZ6m#{7442reLRQaGd46 zPP_#Qlnc+-m<6KruuK+2V~=r`0*e330(i)y zeaf6$$H@^wZXCPp%HU!Y>2hl0KZ=`5pd%7#5)h`vEUD|hfOcH#q2?rJ>*$7Eu9Y4U zGjQEOzh6YAIRHacy5JGIs1?LPfUWG5P?sN0WyueBVv7oYTyk2{sFumEN%y&BD_N)3 zsoUl-^NlpIHd4_5=l!8ae(zX8^PLs0883}`{ldKW{oDOn9Uib7B@R$8n)m}rAOZ%1iMQvPXs6;kw`0(WsyYze%#Cq;$uU|+u zT(ySCD58LJ>w%te&K5|ci~pg*QBJ|DX+RSH?-%<3xa`p%%$$dOTzHBN^{LZ20eQ$L zrCRK3>lGAOHVH0gMkg*f!HccyX#f#Br#j)*$VO%<+VAuN{=v}?Fr;;}>-H*xh< zAl&X7+0y4TcoF^&)F|gxxK>X!KOo$E`%FN|807Vfq|e&WKfI2oq3eqXr6>ukKM~$x z;2ZbD4lw6q2bEbsbm-V=m1sw3I^JxP$>Z!TwFZVqIyn(mGfC%;anW;|3c#`_-f z8+eb)BSG8Q9VMMAo^Kk1$XJ3HX5pX)Ex_sqN%HwMJ*g*kt~kEX@8$ih^C7tNIC9mA zh#9L*T%90NBk5$)9P@y%PUSbdLrKWyYnWd1a&n4!n^m}U2}ASAAPqc6MjWWWcifdIv9ojnv^@$JcedpAr%ZR zeeVzNCy}>$7&kL}vK!z@$iWO?A*^8##vSM#WYYO_6en8e4|LwS2vit>h+Nt_w>(l2l-{@wEatO0lCpCN%GrF83 zTCBcF^cZr2?NTUUCrp{DH*B>>)1u0xMMdyze}uo9p1!-_k1;cj(%6s(@KT z2p(4#S0UCriqp8(r)`KlLOTr1^Qfqprx_`d+yCYFgmTRYxR~ ztYqDt78MhB%2EP2g4hVLDzry(emv2!{&ILjbbmzjc@4|W%nHvpKU|)ar1qMwk~&fxXKa}=?q$Ceq9MK+>w3vn)^x?UzVr$>H)*b z-*)WT^VN%S@i z)+FrInxv&GUG2M#zkKB$c|)VYdzxU#PM700rBnEKLWa;mkH|IB=WU>w>!kZoslha2oLv^qgwtXQJc-_b%_ z8uy!-tXu8pZdi)#{tI6P){h9-+g$KE<-R;dqfc&jG?Hu`-geL3yJSW??WI^gP{H)R z7yBoJjd?nWz<};P6S_TPI`C={hmL*p8)T>^_kOfpjcT-#|~9f4U;hQ6i9$-nZ$@MzG^Y0kcCy@`iI1zSg87A&I#EG+fWSz42Jbj*hB$ z;W@Ogp9J?Q1Kh1zWtT(jW{WkP zX2bDAXXPCq*L7~5&!9y${hZYUid38NwZ&=h=Ld6xNCM8+n^{vW3G3OEE(@ae4kuR` zRXM)+bKd*>;doZpxzxS;C_!_+7y9Wl!UG~4HWjWZer#()9cN4}-91M_{l_yK)!9y! zz->l@O)yfPgPo4!LQ6o+p!WOLfSZ2{Z+ z;CVV8`B=?>w%3_HO>Fg>t&jd zEM%=RdQ}j3t$*B|ahMp~fdh)IcUl^TgA=1V&PKA#*n)}*M5oAgJS*}>EZM`z=wNu!=$Hr4h{_eFSHJSZmG0C`tg#Hxu7!$g3G9G8W&H5jt*c zJv1-ZNf+HmomV<_{^nn7)X(9!fh@)zC2)<^*~q1PqsI3kBEt?M2K7!3Z6~_*u(9*^ zOYCiF84-&AQ^m7{+WIIE9k!k6Q_A6GCgZVw_SWod zRylHc?n|L^#>YZfrZ(ZMoxac?55?h7Ij(P0vjRljpe8tV0YS|YEc`8Q6qqG(u7a>~$E^tS25&wS`6UMfu!15_Pt z1>$(Qo9a?aRhK+tYnvbdys(T!Wh}LvJ1$XB;Oqvt(UZ{)YU1{Ux#_~RWqdGQbe2&$c7Yg-#d4!=2HtSEHvAw=59fj#JiOysaHgmzVSe` zyLD9ZJgv2IvU*s-@PcfbYiq9hqU+%5-t6Ve_)E1*kHAE4(7^)_dkeb zqdiu7fq4Aqv=lxMB!vecDq3HsMF>VMKQL(Z4y_X_&>UM+hW3H%f|dW?QUycZhhOlZ zG)~+?CyIM56**yDHM#8ehjX`SJ-K=yd~6J+s6Plwh4I?a{_hFcjr{R2yya{5FX=c~jc&3;ZZ=*ea@U-*I z&Vdt0@e5O-gtlj(wKOz7_jWPlfv9WNe{fKulg98DP+a-Ry5t5Y>$JM5q;zG~D{mnf zZ&anN9QEZKlzQviP!%jvw1n943gIlvJIkOhn->-E!9g8d`)tG7E^bdBx8q$YpRW5L zBeGr;v7zf_PXVh?7rlzSH<(*#ke{J*fReblHhKG~iq>h|9W)L;6(pn+GB-|21`18UF43KRzd ziNIRzRwo-nyUv$1S)r_o2=wK*<(4CT-(25|Jf&I=bZtlDE_O-9+DRC8uz6w?E(|fQ z3U))RLY7pP>;jdSDpvxQzR%gUx89x0@7BxS|NGzPZxlg~_MfGWylr(dDIOlVuKZ?j zI@cTcOptc`FCSG`SM-rlFpUNwngZLz+NLAcbGcHhpz0UGG;YNA&h|yhkRxY}ZaY2+4U_S-A8l{E+J@({q%&==rqC`jn0x=Ywrr2#pYt z%X>Qc!#^bDb4FBjrkMS4mnzLMQ&0iZ1c%$s6d-S7WbVhQo$(#I#JL}2erIYkY??Y8nB_!KnuyVuQ%qGbD5q2Q8R{PXWe z+vo?pq%9pS{H(qIgB@GczPov_ICD7cYIiccxd>laRdO zSM(C{;YAoB=KmY(v-OHfNXfL^O=cb2%bV;}n$vDYd@|iYEc}~a*N@$f&0$I$m9ULr z{T98K(=3p|M-K}59*$z|_u@?;AmQ%C5;_km0bL2@PifYp^Q~P8OGz5$pmuB1ayH02A zts(Q)j1%@IniLbR-fW}#u36;l5TbHBo(;&P=c9PbZp8x=kbHG8xV7m}Z^yheu%Oo7`WydNK5g6Upucrf z>~IFW{30sQ%xM(+R2}oZ*OJxdG}8!7XfvJ0r~TB0>@AV_jr~4*nK;7LjYm+e=z+kT z?y-?FSFVS)p;do>#o&v^32S;W)z&s^n|df1GLlXEw2uJ!phMCq#~(cOFLj-{(Il8A zbD#W3%fu0xba{sNGb}Z$x#Az2p?JLaXmeh+=-Gt&=a5E}do$r27tRCQr}4ok{ypf| z|BRKva|6Jdg|ct;J~qwv#QW&_GZWfKHhIkr>^`^ta9SCQe4zjassR~t7YBENXr{KO zglnZOKQ+{K!bFpo4hpoql=$>O99pMZLdo)yEqY+*FS%0J?CEcZ8r*H+JrGm=w?9%Z{fP|m6yLZRMHkx`ucZ^?C6(xR$ zLaN@Ms=7$_(R*>2S1ThZK0(lkh+;U0cZyy2tt$bXE0KBujde*VIt+bm`!LM@&Fna* zygCOqc#EEMMGazBCrAs#Do`{(N;9Lgq%%@s(&ONP>i5P$v2HRjK}t|bv@l^rqwh!fT1LK6#-nwS-b40@7fr99g1jP@YN>iDPGraAEIyh)-j_j$sv?p-(h%M3Km1f3*!l*BS z${7i$Rz0oR>EPM%^}WU6a6m2lpA&yO0HsX&2etUX>;N2<62wa+5R}R%bu^z#Kb?ex7)?{&O zM|n+aoia3b-ZfHD0&hA$((smv*;%2a^qM;TBNwTE;z^MyUtGs0tKf&4osTo|LJ5!m zag#=%`WYY5tZ=D{AUrHDwLdLdBr~;U;vF;nt(9m4C0Mjuz)!M=eoGVjZegC*I~&ny z&u)-atqirtGJ&a$-)Z0CFU%0E8WI6r;#uebB8im(Ii!cyxP(WW7I=7&&=IDsMaY<1 zI<@!d=n$QWj^W0B;$5;`&GiEur&Q7llq+!G`MmN>mz8iu2Bf#lGBpD$+bUN+o9P53 zk7^@!h-S+9fr$!VMfA62af3#dwFj@7i)iBtss+nKeK{-p73H;m& z!5M+IZSoHb=D9!_z(|)7eVZ4852lCONhX?7DK?wsD)D*HW18mur^4ESfh`Y;GUY>` zbsjBxew>J?#hv?NG}#%HY<|QyP0_H37BklmixkH>Q_#C@whEKWb zA(81+rXzHKUKQ@vvPu&P{d!m#?QKn!JdJ~i^^PVez;0ja;x86M+NA8PiB1*-^se(S zy*xH1Pp%&{*5*l?b!Gl79L;6wUP4=H1(q0aPTw+IZu;JB%AVRZld=H>+t9l3YN{31 zLrYb!FYMRlX!mpXc2U-1okb_*%_tGZB1)Q@MLQ4g-8nmfJp3Ial&O}6Q!}>5~)&SE`iB-I%(8>p| zzl}FIYfKNk5D{!F3+bXUCr?4ueq{K7GbpzljnmrM-Cd7^>rk1St^Ouki6C*ek{{_j zA>0;eSjf+>wfoE^UHAj0W*_AAWX7Y1ho(vbC~Jt{xWpJ@buIfjQ&Je9x`1_^#aR{kVxAO+1m?zmOZXuD0&Y$+S3&wj zJIE@Pn+it^rnE#Fzt)-#)E|_fz8dEaY44MKHtipT&7aIz5K@)Q6m5%8bKLg`2nV5J%atNf*s=b+ z95au($=Ds4U5IV2kj=u?eU9?=DCZ%fOuL4#1az}dZ`5(&{Cvs&48Q6*<*I;9m=i47 zU7q@9H`ke=62LoN?tF4oJo(YttsMW_hWO2%2LtBfHhU&AzUU1NG$k~|LSBc}pzJdB z&RD`aOx%IM02QKmSw}IZ04BB0{ilyyQPBkRH?Av!pR3;#(cB3*$QdUkW?jDGgFU;A z6+BYUxV{z$1-a%(`# z|AB9de%@u`yPrgd0x8Lv`iR-COd7UfqHOl(gQyZZ;_e%UC8}3sGE1C%E2O|oven=w zL`c~cK|=@j`IQNBE1Q~Tne8uB?=K~&0h`@nSJ*r7Tv>1n(^qi(dt|0dofZ`LPTl>J zKDvrI?)wRdonHtc9}VxwpFbOMW))V;h$3_h+biuQr@`|Ow#bw^;t z?a9u%{4t^Vmks=BW?%b6LR&gDy^j$c9*Ai3@9+!6p_s4AEhMujh7|jN$44J2tGYKv zGmj{PX$k?~JSqD~)G^t!7}^1Zn7}HdRKX+BXDp1H#hg=tsN^dHUluyT*<}$J zdsY~W=P3MS1)SbPp4P)4e)O2;GBR4U{pd&KW{(cj*>rxHl)=lt%loO|D@K#9Po%qu zcQmePrj}CkF+@b6v^VRQ`PG}@HnXD^?sdcluN<~0{l1$rTEt@Mco{K)oytlAHbI#88nzl6<>g zDn|XB#xF{0Od>*I%X4TvcGuoTOPGu1$dmLI-%*$&NNTfT%t~heb>PI-2bO&id_e$7 zAd43Z=84civ7oSW(9klkim-3Fp34nDow?I5^y{daNXXCUF9Q9MtJ1!n3@wy5eS9&3 zOmDYiCN-zR#>UahMspErm*w-uFOB9|{*&2eJQB# zA*p;Tb(AQUYt|zsDE+o+CAnQupS9~wA}L~WO^my>=U>zi+|;G^sRIwJrL``=YeFsgt-n z+dnk0RzAgnI0|okolD8A_1ygine!byn_uf$d9UJBFXOEn8bTP zTAvMNo;ZM$-A@Ba-T$J)x#1LT{NckHeBTP$k3PGY$*!ysjj3eFc!LpXs%<0XUP{P7 z?JR3Z;M4bX&S>3!Dcd-k_c3K$xwdfB35hV@w0T9einV_MI{$zQBHcb&7~_hW{g|EX z$(dgFvq~w{G(H(tmmz^0h^Z=s$~f|-Ie72qJ}n(p&?UGnr3+k{P4McxQhN`j#L6K# zUD~gG>;z+|T*4wg&RP0GhQD1}=6cz(WGe|8+-5J>SHhZ(`uYo|V&Tv!hj^y_dCIAP zYkoU*^NFmno(KX57ytakI+S)ty4+)ZK`MV5K@edPO4k$b4(dE#AT={*vH2q<7Zjh> z6A8hUl_wHiJ7G~GE>*gN;^``7$5_k>L$&r4<{%6zfpMFDcF=IGiNEg^=JuF^TbMl= z#*IHgDh-58Bk!RU)JW^&*sHxsgXD^%ScSxHtW~sC#mdVz#_;U&lgAZOEX~AZc+{fQ z;%wE;#fX5)l_k`usZ&+7O0m`9rrx4|I<+ zfAUUpccgPdO6ZV#N3jjOqxJNU2Nr!ihq`L&wY{o;IvPJR&y;aRubyudcYAw;uc5r{ zUrhakXvV~0KXop@ceu(fCk~Y21^gJ6W~1LWbU~g7Cr_r9=7AcvwIs7Obn3a~fHbN8 zezw9Nds~9=UyZv>3CnuMnDC5B6sfyJj?h1$TsHp)|E*InUdgB{>&pEiuQpc9zp;ld$eL}SScqhHBv9UoVE*4{O2eMg!)w!Z5#dmr~2|#n{ zvlmF~RY(7c!TQuBoWfatmSl-l(O!arCYEY&TM3?ks724<3~8;VKZiD*6&d007B`QD z79{s#K$Y||0v3W1SqgQPB0eU8AZpSq;j3pU-uk`^OKh-BFt=H3al!h(V$-*iC(=Oh zy5fbX<_W2I1r4k7fr*mtIT?oV*Iwpn*C+Y<-ngOX=UvPmVb;i33!XP9fX{D!RaL=} zNR=zLHf6>@yY!i#?!YC;KvrgKjdE0#sUZ92<bKL@Z?+$iP|~=mMoqmI2uze1_sf@( zYT0BlD|u8Xy5$R&_#2io%z{zz6{nc zY{)2+Slv=GC3FE|YL}1t`~h>%^CK(H&F|96MP#m~bJ{mKF}|xSQxW0_{U2AAa3SG} zp5^rcZ&n^OQv+A~3+=p8846QP$`OTY`R1jqY#2eOWC;^Kl7{q#g#7YU-|D@$J63rg z>%iNVfY27*0U%~y&SUZY;=n_PPTAj57*1C53*Tt~*1EnO5zEQ*76?X(IN@2ktw%#66gtJ-fJ;a>8Ob=h4ETNM*9nnnEmMI{nj36->FwVRxBR zzwd3DEO>g=TexNO^QNx8wY2qiJS$l#gbbG4)}xi=prGetPdhNUsSk6|0bh6^WZG?- z6F5IDwwUH_BzZ&#v|Sv*eQ)7IMYqhnSMWySmsod1{@+?yXJ3Q5&Hi>8OP15>GT0?lSO?`i0u-QD?f2lv_ z9RE$5{m$&W-+{1YzQj0{FU^)-ocY|Iaa5Ey*w{fh|K9Sp~*EyB-*TV$@xkXFLW*L|L6b_>&xBTK67$`mEF(07MSU%I!6bAN(fzhL$8WA>BnM&iuR@Qff!5^@5$tm zqJwWX@Tfo-P1&ji{G+jHEuT7-LxaI(Vkb1Pav0Js6dIng+t+47lDEO41X|3d1wT?JcU0p$*SL{1xz~6w{l#`A9T*sXJf)0EXqqD9_%cjm^jSXoaoN2qXe^46DYmC$Y5zMT|kY zSGyyBNQlP5$j_91l}s}r0ae5d%zkA6q4gdY^#4V(TbBqk{Yr-`vr$URNIe@6Xc4*? zLY_XA+DEdq=l>XD#JRZA%T;$`vqu6n9U^F5;oA6dtTckm*J@JH!(m4#o2b2l zhKzK3y&T*6Pd!9B$D+W`?CDzTr} zYxWz-y4&6j*l7sHiknq=s$2}IoQ?wKC5grOkv4B7pI-LmN0jj((0j>2X6Ckna?!e` z^Z91Ey5whU2p`MK(gX|ab7NAHL1xObqY&|haPiHR7*B|t0Y&)Z%VY7qt6k{!H=fVY zzJ^`VnQtrU=~!>92OUo>=V>XAj&&)dh`mtbPwr07A-|IvTw%-#ZJQsA^L%FcaTS|7 zz6iNq+z>`^N4)g6adIRm+GQV(T9+}z#yOAmj4 z!g+>qLZYQ5Sw24XZyQR0p}~VsE1Y)5nvq9n-HY7uf1XSH`>bDGRc;5a-zRN)qfXzR zZCDTh$tdj{ej4vTz^=hg8DgtpIR?I^-gb{`pRFE-e`|=Euxr`f^PVd7H{qD;_`@0O z1;AaSI0sOBNwFlu($G|5B?y@a{wMwNEHt}G26z_;Y$jN~BMCc2`$}sP_#c(_xSAUfhdftTaP$-u2Rkl!s{C%J_mWy%zxvC;=3zM3Qt z{Dp;yC9BgGzp=@2iGGz}>Oq4#Nk-v-j}?i}e24x>S+u`g%i2Nb%Df#JqdIV2+w`f( zVkw3Nhd-usc(-G{jXc~sadLqS!i|Y?ax4fd4S%kH={h7iI_6LI@1OiSq? z;aqePS4H&9X$U37$NX2-^s zmosiKie+sR->fYOTUNTY-+9~tZ&PMh)Xx&&ZQ$_X%->M4+%mgSab%9KA==+@TXu&tukYA^yhsWU~P3e95B2>hgt;LXIyxa3z zrteragDsXp$=lGFXIQcx8Fk!}+fWy0z(77e-(`BWr_kE=Ga7XTxu_0zbwfWHXBuJC zj8nlgM?ESImn|H85$7$yOHYgD!B0gTuns1fLVjH(+ZZ5C%RM2klbOr;sSFN2>I6cP z!b6G)W~2NSyNBMLdf2Q#Jr4o;GLhrFK`!&e^Z;WORF0^x-$l?T_3_>ktl8&?&j7S- zx&gMNjW^*aioHI2k-pxt zFP4e&^i{ZhcfM$Y$u|2kVE~^c%8D_3x!~tE?OSmT_CG?!Iy153a?mB<&B?W($f2bt z&9Thn^UorUNx|c?k(z8YJlh*$qrGPmtTqoOZOoP_pf zJ{fQFHidIblr}EF8{3?|!ZUZ(B?I0{wQpJ@MMRVQc;Hb`1wFQg68`cm|5qjgfb?~+ z_mo<7u-?uV$AZ)&mMf~G(&6n9mpZiYRsiQkK5;#>OJAk1$@f7WoMJ;9Wk4})(p_rA z@}Iz94*+)1k2{T)weVM%wZr0kCApOE2zU^~{uK0YtYr+h%--=G{kHhf|NJ-9J6D9OZy@s-)Z$f1Qa1`m-a3cU-AF^L}iPM5PZZ5d>m`tR)A@c ztjh>7WjMhhr0gFvP&!gWOikeiMN&5nz+SUAUk2YW+jOMZZ8OjYh;U4c zcK=;oB4|QXvXux9XhTHcU-C>62|;mwvVsboCzI%pLiu6gS2%QH+p2ZG=If0>gSD@C zo$BO^nIhf*(e1u6H0Y>SFD^$^G+w|+ZK^t(fOkuKgl)@U`H?~8Yr>V488vai;F(8@rre(%Du*daz5)q6NE!a z9<1U>X(Twx^s5d{+cT3)mi4~x{((`D;oeNQO4#D5s%ZmE4pKnpq|62@%jdcu%{sj7 z=6}pog?g{!0Z#CLGRHwYs&HeORz3mDgX~a#gz7S~Ms8v6P$Nv%k-VwkQ1BUVQ zxbXOvuftsh){QO<8(lRz@fW4)+1O|T374K`N4+l!Oy5p-QDSFtrzp9Reu41+%19*4 zl5sEl@qe-R-v4aA;rno@Dz&Miwh(Ov)n&YajUWX!i%n}k}k#H0r})#rDx^= z!>l9%h$2hjGzfEa$tZE_jM*iXV@7}q^U<7f@FJ?=7N2djk;fKD{6AQ?;ZXp!|u6<~0v7kF!f0|H1wi4O9L1rhwQ3R|<94((Tn_9wYYUQ--3r2JSkgqXbpEV`xJFDRGl zH@5R*!^Qg&kGonP$hg@l3_@!*<5iR$dv>+>gO9T6aPu;fc3ZB+UPdPkj_n6Pv4?|0 z`tkdXV#7A^U*xb*ZcnKSD$d$=d&pokmc=p{0)NV3zc)|OX?;*jLve^6D5|yT3(%4p z)YGljyHGMHlxV#FMOSqG;pKC3uz50dixO*`*et)YDc{#zmuLs{C*joLSBXm!PkUQ1 zB`XNk?=krW*55pC4Rp>WKhg4X;nq#7=xKthQDP;6`A#5>e{6YtFE5HJ!!d|>h$Rfb z9K+Uc%E-vB#u8Crx-L@yn?J*w8E!*)^z?j-$SdSpcfJfiMxyPXce*2M>wF_>4Ce}Q8I~9P56{18-Y;L+`Qvh5m#_sQt`Poi?=>5 zrz=dWT9q`E#I<`gOV*}s_K(O{tNW>grNXj8YvnCZ8+=MO7bDhUlIk0u&uIEKB$jzM zoR62!@7Jl7h-oahb5F_0qWCfmZV--kK%Xj+OQ zT?UFSjm`v4kD9I2#(vkR#*I?@*!Z$ua0ggLDskq`=+6rnLKzZ*Z*29CtjYSTQ`#@s zGV+R_7bWaVoRPf+PdhawCD)_3`n+q<8MlPNNY3_aoZgGFr){zo!!xGn!_dPY(d)<& z`>s07+S+t=eV@fI0sei6H%x5bTl02pdV+RGay^^QqSu%=z7gIP;kxj7kG#d^c}|ju zs|=sT7q*(cW!II7hwuS~?|X|m*v=u8lg@b@=L8NOy|{;XDeLWburjbFUSya-;kOac zY)f{g`E9IU@0T%3A4y+QDk;gEiOUgi9oxc^Hr7#|78)Y#>}IBzk-g zunoi&kn%C|Uhj@EG#VS>NK;2%`QM(^{MP)`ed}`0Dn^EYW7^r_1Jlax(t+;^fmb1vmy*= zaaQu1*rGNVl6rFRGhuD5x>p3G{9|`4ljc!aePiTgw|?5Ihxoh3P(!&yZ7@c#{N(d` zwU7JBwWQc2NoX-RaxJ^J{&;0g2aL$stalz~?OtAsVH(4Erw<1qOB3!r6GG&uZ!KUY za?_6fXu_BrBDR~XB@ugv+WaW>sYl6@OvDq6e%>-%5^wrVgs-o?0Dd#TgC z=1ts?ypa~8TMz;r{KPRIjfN|I7?v2|@2qqx@5)JaHYx7oG*QVxrsaiFc+pXNm1vm5 zhNkuGR~3Es(g*Es3Ga6} zn@i}1)DuXNm&bxvITYkKjs4&<`gXu!Ater&JQ!@>pdD;t;Z%PgGeMn#PUWj|@P$d> z7Y@8NeTuyFadEQtb$#wK3Ey0Ex_FC|=*DU=87EG-lfE?@hc8jmm&amdfjgRCMByht z>q|GP8=MfFD=W$2!q>dVfu6HW!2TdVD|-b;y5(Z=5A4?S}}uXiU` zj0y-Q*K_Ua6K!-C9(aDCa_tZ+fK9{RQM?!sU8+PSc*f@X_%^^iSZ{I~@%VGt4F}F> zyzs8ke12Q-*SyL>mqB1cl1#hIfO<-=h0Ke^eODCjI;oCic2A}GJI@7YVU-yo1>R{6 z%WC}_?*qrA_0Jj_BcZ+{uIrk>px|!C*XKcM#Gz|ig2W+I4)@3IYsQM(TR-nT8&1@i zde^r!oO%O%LZItkkN%Y3b1k21L8LLy< zV2jkj>HEHw8M&){L!py-lDp%Ec6g66r{a#Bre5zQEWfbZKEB)~C1C~=Ie9MqOxQJN zbKf<$X!yy@0OpWI&RH)sBjH$5$7;k$)@{!T_NBN0k|$M+?ApV1V7$-X_0=>bc`np9 z7MR?7Rq*Z`L>pR$-0bG{y(N6e^H~@qe7JasxjB=>vXm#1m>YqR0SiQBH9jAI)#vIf zym+#EbbjRAb>Otvb1MnAuv-ln>f&(U@T+{qO;M+%lh|m&y1LfQ3*;v=841PezQRu0 zRZU6tJNn5#fa@qN@W?oE(-!g=cTel9*}7e#q6_G>x7lvleHfylEtXW zr&Caea_k<&$RTmkSkpJ{;JE(WbJYj;Z7I+5rU-Bx99s{=+X*(s*$Z^8Z5?77CiU^& z$+bcxC|2T=pbBd+<(r*#_c}i(yHP{-!9qW$$|nGD160R7Cj4oh2bJvV+I#Bc8o$~< zTm!1_n#CRDk3+BK0m(Qs>RBCt24C@$H}&FvOkp|EJ;PcGE4Y9A#gZoo=aySr#kCjy zVs?|n&1HuMamto6lYLOvgGcO77CZm>^?&`!PwqD}#{-vVn51p-N#i)qCh_7xBY~A` z0X~>7Ad|*3!vi(?099dXV}s%n-Splko?&vRLFqoEu9m6sU?!@4UjinVoYR2C;^UvAK=?Bf z{l>(#Vi+*qE3)}@hmOfG%cc8QWrOO-Mh+^V|71zpXQ_@*8}+Xt9^ozlDwiqG=Q0Y# z&dH}gZG_yAZ*naa(RJcfJ##JW?F%flzxMYXdB9yFMB-S$wnksVs(VYmi6Yg%Ik;We z)^vkdFTeBOr*cl_w_ONzzE#}R#Ba=$ITL8yZHw%!dz@ff`_K7a@e5S^$iIEI&%2CMlKi^IGMj1}OWAK zmy|z_P7+Ir=i_97BZ3LuPmw%NVsn>nc6Y6)t_c6@ z%|&WvHV=jJ8`n}Q%68nFPNp3Dl$;W} zq-^OSunSb4+E$<9x+h3BOWLSe4`zISMTR_gHS*CI|Ki(JNcHL*FjM=a@qEkYu#PE{ zX4zHf&kG&B2HX}CQ}JIwvoE_3;8RFhRnvnAI+@z?X#>>oXHZi=3Gz>lE7?gX#va1a z8yx0M`s6Kxn}pX<4l^ll7&PzCT?=3zs0Xyx4J8~XHKljj=QQ1GhZ5uN)&}ZH9tJo! z9H=N`i*$Qo!{wf5-fqDiSK&|dTI`vXiV$nj!N}%cF+4dkOB&! zTa+gFF5M5mydq#?fAhwdR!A{xK_{z`Xh+-tWvHgMHTsbIvGNPlp{00^0Hxl#*!z;83^F0F z7&XH{2zPRvg3za)0|%guXG5J-K6*JW@bPg(h^IxSQNZ-H14&%^cuteox}2t2__D1o zRDRuyoGiBt8#HPg&k2|Mpj5K*=DY6#>&(kCbiWT-Q6Ish)=t-W9rDDSlbyFc(P&jt z9rl7xa**lUo;8!Ux(d_@k#cRSG7ky%2MWj!C%io`^GoiCnsbg>whA94k2ceSadf-v zQf~K5auM%`I;@!om3VaOsQ1y>@}sxX8@jjtTGN1lKxvt2bOB9EA6md;PN}aS@9?; zGz@9tY4y1}ky8R`LH{w0fb#wsBDpC5TOhHQbo*V|gFc?;8 zEo`>S5JEX}tym7V5HT^t0!>Z!ONJK|pLzr&KVL)y-|gH^jykOA^LF#Wzel<@0`?i= z_>i*DHfHCImY@bQNA#CtEa(SV4*LlH+1Vk9JSa=%yho8ZPuJ&G>6mR5d8`^)DxGC* zNl&A@72Eu!9kEw_6l@wi&v%(*8lK4Q#o98LCs3`HPfff#qSLp&_{+vnI)v`7fHK-I zu<9X>@1P5`1k~%lEN4u#%*%~(yT$ldd@?}=?5Pw#UtzDT$T>X+IiodUYhKQU)siu0 zhlO!GFH;)Kqa6)bP^)PP&v~^CEy_YC2U#T)m1AWT*;?MkD7w-XXBZo1tJ_%4wZX_w&RA8FL~qz_$(JfLVu%5KA3^`~#CkaLw4()hbA z557;WRW*@d&=@iH6}nGF5p6Ptp|f4qE}dA)v1k*|WEY5>NbGNR_xBS37Y8CV;rAVM zs$PAutO2xRAChQq1$%;tP>OJ|OqwSOdWA6{Z`G^>dqV?SF*S)=uGWy^z7XsvX$GAJ zNjZOHLmIZ4NkU&#lclUvZapnw*k1KZxnvjL%_T?SY9-x__?dV&i0Nt%v3cS7eH(un z@H4^|Jn>LOJ6u&N=IQypF-VJ_?)s;uW1FE$H+AA4q23E(EBR3hEH@!W@t=KQ-79Hg z@2qv>%BaP@KOA3Us2__(E9q?pUFOX zkND^`Xzf)Nr=(%O7By1JtC7lIp_ouBSO&GzYrp&|o_{*7VqZDNkGlU2al~dc7ewiG zG8_I0PtPwgj;f8o4kjUV)Fgr}m1a2HYV|T_N>9T9g!;+sMRilb;Sg z1U?&;5>@l3@kZJtO#AqK8{qdb%SG{e{qPQAkwK3H9n3S}u`P`qx9=-AqI7}^9WA0I zyKqz|Ms_M5Zt>BR-AUThS^YA#PyfBU4XvBkWtKcR;MpdNJL`bGR;c}ky#)qozydZp zm8oOLdmh?|V8bVA5hj*Ot*5q>tt|4zl(=qEfg$wmvaml&sgid|TLUhTyU^sVPxKc_ zFVgw64;VXV#41a2Wv_#^pc1_n@>&_AbG2GHc36_XIC0c#o{y@Pl`M?-zZ95eY8j@!%jx?RD8fzQWX zSQevp`F=P#9;`H8NT|g4^I7HpJ*lhcI0eR4>FL9>4i&}P#RXbJSRnz5fsXckyxi|x zDz4c1-Z%P`bfWs<42#b2J|pA#6voTbu`bWEQLcCI) zEcxRjG8yeh%EemSA)DT;MRXdx;)Wp=pN$axjQEPP&_*zmnvII#>1_A+X}u%HeLBb5f;bHoy|!>D zv`x7Vd|_{1q=_LTG;nlh46Aw?TPSF~4^jIV-xn(4gzv*DP#z85n>cDde6XD9eXb_M zK%Oh?HP!~R8O}J9 z`BFj{P9;@2}?PbNYeoWD**NVHAyc2o+L@YBq>J6*a>uyaqnA ztB;TAsF-sO;g;z7@~AO1A}if(ED|2{J>})-qoT%>E;Z<*F6goxjjiPmOL_SZu|q(* zn5h9RVD>tB^R8?r>|Sfs)xL-0*}1|ZhJG)EIhB;bRs+HIE@E_$IWwkKYF*}?Jh6l) z9s8a98I$YTm!GGZwO&@Ot|D@D5s_ux$iro^rnrWT(Ld)~0O`_hlZ&m)`&rp@Z_$5h>8q@dl7dD2x`g@+fJCjJ{a8 z%2OXVx#PW$m1qaeFF$aMt;@q%q$P0k@1!0@!P`X@wf=znf0a^&77p88&@2KD_Xh08JddTA3M7#(dm4U=tmhKb<;^(7E-wu zQyc|45|wjF8A6gU2BZ!)9yNB$aM=&*7H5B zUloEcH^@T>o<9h?{8xe&h;K&Ld9dX}60IV66;0(AY}^polR`1WLZv%&ik;rPWcn_a zm)sb83i4EoyQ|GZbX|Iu8dK}Bpx5NaR&iUBkhm@9sB@pLyp*+_8sV*4t(#H;#r#!{ zJqo#}Pp6DEUAp{PHlj-;7_K5TG|$_p3tQfddj!CogoR4ljAd3A4TG~FpL=|EfT5M=$O z=N(J;JI;*i&8_Ig+_T0ANpGI+Gqy7sOe_oQG3ulY`03&Q_0xB@g7(&_Ule9_KRg`k zPhyF0IX7O{n6~Z8=~eE{M_4~EauAX1PPql}6;`@&r60-~BJ?rdCtZ6P0HnJ$!9KIK zm5sDKu*&T!bZJTwf7aAwg8BPC@o;bZ%G#8w!V(1kdhM?)L`)9ILd0IVBF${U?C*&F_i=CrU{P>jP)SPu@7IKf zKA=1Px@V{V?7zRNK?s61*oA-{~cc|Fv*EvfF`RqHauwww} z496)~%my*lm;b<=C>mmdf%SqB29Rhe0W7q{IZ&!20N#0NnqWg1?0qn1O~Af_1&XT8 znO;8D`1dK5c+-}=@f@>Cq5`xb7E5M)P6XL9XWUP!oeoO@*oTHaN*X9+Tg@-#5USs9 z<=L-`wtE==7pC%&R__6cef3<>+?V{K>jnLs&fo900d9g7k73t&wF?Q0~qfj)vS5oTlK_T_=IiOc_7?hTS_%m9pJV!D)Q z^Y4qeN*o?dmmLQtjk-tw@MOK!Kv)8HV8H?9 ziv(>2#~x7(B_K64<+vm@<3WJHgMbG0q_$yQ6PZ&$FP?Q1K&WY|8a5E_R{37*z)9MBGt@~^){c`^GQ+LmfF-`WzLkYcg`RS}Jn_U9MY`@XO zdCsHe%VIp|K*gm)HQ+KEWO6#s6p00%*p@=_cJ`em9bQhGq*=vp9ngc)Ie>t8UFRMw zHEG7ZV@rz3`1b<{rq#P4AI%HsG!(NF%o0&fDbI}ZYeGIUPJWJtdcN+`Nr$j`t(PL6 z0m8&a>H7qPl5Prc8+583O55C15g4v}UZbHsds+6V#SxIys30E&G^0kq`bo;G4RQHU}$yQzOW;H4{!KKzCG;j}tslk+mTVA2r@KwExXq z1U3`%0OK}&MJR3wPVwzk2RjB`B7;G_8cpAcbU<2EpC7LU1I5YwZ90G=z1dcSdvP({ z`v4@q+k~S4mf^XY*9Is^HN^x>e>ovwsHm=9PS`^1{saK0|qwX_-S5_{qJ9TCKGj^kJl525iT>fb3)+lV? zvhSjR2@CXmC%WpHDK8E{u%A!7_5T5iLOG5W`NIJaj+#b#yBT%7mKxyl3!o!xtq{9+ z&A8eQn7vvMOXQ_b6X8ysRj!I*#jibheC%zh3(HxV#0x z2wly(@u$jh)-%#ll@^9i!N#yTv-zIxHjaamIe?4t9`YBOuKpwC+4-yz%59;qq6Zp( z*|p47#p_`AP%ZsntQdah`>HQEbpFBEtTnN+@T>j>On1@RKcjJjM2x{NkasUclsM=r zPl)R0;pdhVb6y=%(*q&91n~|cd{XrLG$06!yzjGSIAd$scP$NYpY(Z+R^S)}lM!(Y zoXj&djlu>u@X7|A+pt++?#w&Rhw`IPm4VB#XW7EuHUtqS%mEVQzsG$7IAS>(Cc}ch zivxx;Z3LkaRCH=O!ImHhkaP1m+67vrz#@_nedBk@A0GnRd2o{FQtQ4zP&zSQ!uK`n z0tXPl^9#&0X5FI6^I2BllpMvqeb=guCzLV!7e3fDdi9mDCyHQQ9JxLXh=ka>8S*s& z^9B{41sVX9S9C8k+`R9hApi3WpwxnrPpENp4gp5`@gI^J)~%?j0HF`-BP_q{n9F|l zn0Wmh6{7MSK%lR0dh~gr${akp4TFZXWE;k8%>7hByW>H@sN&kyFV`4U*j=Bt#TT7^ zRcUnJA+&pGL?3-;LNu^!kEQslNYB&t6oVP!$giBj>E3dtWdqK1je^FSMm}||BOdW3 zu*~y+o*jVNl>_EzKgdj#9kLoz@XdhEo#s^~?gOJiz$O9y2DKIe-qroE-Yr*)CcyE}Jmj410~)Cc+PyWpbwe zaMm1W4*A9jR&?R+xb{&PIY)uewjLzmmn_$>@82S#dEM+t@Uz`b_|G;0A&i`1p)zgx zBC(o6D=msZoNjQm28PrHw>NGe9PGG+1qG>oCvRWTV+5HPRF^&E&3EoT*kBwMiq+2w5f3M2{%U40U5i+y(P1$YT6!(yfIWYUAj1XnkNjNDJovt<>UMv^s(y7BDd zvpLvKAvj+|01tg5coQvxJ3H!-ZH(0-!PquDb07hVKw0nR2uM9Q^cIVKb15!*Js;HP zx}zJjPA0TM97gov>Uc*Lp2KM1D6Xzms;*7XZm} zldb6A(t1sp@l9J#yd3R=dh$%eey&h>9ki%50hk*-5x2ZIp$E?|Eo z1LR0hu;W65X_2%%jiF(6edPc(WGgaC4IQ7pmv!*MpTj!C+bw0U*=USsuly4V_bcgop29^&qHunnnx95%rfE`vTZ;DAgOdh}YvIbZG@(L;XXR ze2^$veh z`g}8Qk7YRLXm(>6oK7ST2Y2ls<5l-K)X;Xj?aSYqWHV-J4(e<4uy(V{|4-Uv7}+dO z?>S*o(0Z)RKN#lN0K__Q5{5a-(u+bo(T;Zuil&SBKomO^&`tYzJo6|B_4U#i8CSi z7b^vl-?T$BbUG>(VZ{@_eo`Z>rYC4i%^}v|(FvXm_hugH8BB+{uHs-B@Xrq$fTGfW z61);dvfI3wDlvuc4I-=N!}@`KIju1+8pMG1d z^a^Qw=9yoz8e@|^9oAs-T#nhhbVOgqwE%u1(H)})(GaRI{gb%*XwDhbW@6-)gJKyXr%4voA>-lQXjf{%$B|bx zzSX0GnmIBi$?&4!hW;lugK$XDEXbEE zvn@=L-dc(MNrmsYvE2lmH)}I>aYo&@&ue<<;Nt|&Pw&HHt|S$~rn@CT8;bJlY_yy5 za%?j#p!mlcRiFMC)g}Imo8pz2SxI3?WNapxcY_i-39cbup(Jh?UnWROgvn7O`h+l~ z_M#inM;vj#QFM%mmCGCc^EaDJW%%S|OD?ffZ1KSm9KAbr&_}*~>M}9qQW+nWF79RusgnK=A z$$p3RN&Ct?MbW_tsLY@Q(Tx!0m*w8RFl?3iM`0Nt4)jVCumoE}pp-#O&8)A%tWzdXbdfgBj)?Napj zp`Sok@P*R|{2SFP878}ZJCpNba0qwT`Kuw{(+=N?1Pg5ctuo<(r{}4 z<=Q1qQGA127Onm+r*2{U@!9MAeUzCV9(C*N6H~(<2`aD#mJ-IFfx<{LP{p}g!c2Kp zYk0&5)0mU`C7I&FW)*A2A)N{08_`P-xX`p2B6`KNQnVxm(9T*ljXg>&+n>4tqaLHN^%%#?s&JcPWOYs9#U`C2U+i? zSH0EXkLU4uJZ*S&B0!x|J@tp{%b}LOy`X2vJs?qPi1k3l6Hzc+gXlhtO>x4uMN&eM zLn+fg<~vDxWT1SkjbKsS|6T*uE7h0n%ZSjlX41IA`;KNA8?x*1Km7B=Iqs;u?Cg&c!%^Is2I@h{4|3iZ zZ$Ak-bJ-0dI^W)3v>biZRRUD~9R!WTmy+{LD$xTIdVmTSEAZ|Sp zFI#Ejhg*uLPBICvzX|u3ZNJXxu`4geJ{-(4=F|8t-I43RIN_RHvw03X(-BEgY`I-< z#p8g+%Qr0x`V4zS>EZiKdQr3xOnDq`Tu1D|q19A(mYPpd?6>=$gtrXR*r4$Zi2+yh z9q8l4km(7>UZtW-KUjP<&u#kz<`gxHJ8Tz=o<^xN(A;m9c0+F!cXlo%Sk@LpO?Y;T zI^AOiEE=yR=i5|u{gX8{AIO=C2Kbm&O%^06a+|9{@blBzq>P&&PU(>e5tIL3MVth+Z=N#R~3Y%C)73=EOCvZp*Sg|oNL zV=kGfIH=5gyVd?Q_CJYpKyxeoapcFhF@=gG=6J%!FsJd-{u$5D zm5N(L;!HgJ?e~^moq6CJIL`J9BOlEi=>6J9M)j1hqtEuyMUwxlV~@!SE&+f(!^^;k zz=Fa=${eKPajJjBaF^OyWa`F7;<4KbBmp+qeWvf4i{1C|Zm3YGdVXkCh4Z`;9f@K} zW=+u9|0neSNIOaf0QLO+6n?J86g#Q6QtDIrKTO0GR3w!vAFox4)yCE?pwQ#$9u|0= zj3MJ*pj`h0W-Dz*y~b|%bJstyL-T<$fca7Wav+tPpkxvGVR+X|7u68wR3~56V=sbp zGVc6YYw|C|xEaR1-6U&V^K9^u{eKt&0@e+`37k{a)oFU;e;x7r4MD;i*Jk4WuQ&eR zbcD+Gw9Amj=Ttl=#=xhsqSo+#jY0vT@(M(#vMqkndm3#gC~IOcCHPm}$N%KYBSFoL zb^?voN#|{x=Xah1<*IFjqrS0m#geN z{*!JKN?Q$C{SZpaK$bm2BMa!91rcO3+ZK~dpahBci*ddSk>W+y4`c9klZ!%aPgK}N zCxHTCR(s!*32~<;TkdBi|EVMg<{U2x>QZJE@vn)Qb5!h6xNzg^Q35gI1<0hfd2c#r zm=y}FStei5nF^tIGV z_|(|9SGqY4bj0RoL9F)7^^xO1+B}|EB53=i-HmLS;r8{>FaSk9sdRR)6Qb~Y1~Ps0 z$1COA64D)ij+!31A3|=KE|mb*JliK=uZWcI1l(1!yOQ2B3jW`9}G}HtCZdhcE%(FO!~&y^DucAde;C6Ey&ce2p?ciQFAzBvWeS)*!@bk((K&~7SAbuV8-o|_D zg6M}fd^O%@1f)K)H+hK9&m0y0CZD+#*B5=a06yv~7(3BLDzpNf@lFF$hbO~nW<&)qJg>S3RU)6&#L z$k|$gRDOEtDj;0z#Hw{0>ak`R-~;0LQX5FvGpuqdFX%BxP_>f%1XzH^TW@Qwmv1EV zYw<^1wI|J#-Tf}|8>rsEye2Sm%A*R)TdzB$s0lUW6Ab{XS5(<>UB;mY0_GvqTwhNn zl$6et7*l1Mgh#mfTM_}dF3^UuDHMph66tBAdb=w2G0p7{BqswTZ-`{ zl=$^{yRXhqy4Mt>7iNw}s)DwVOHyqXfCa8t9!(~b3Zb)L0y{WS*Xn&3Nz$0C^oM)p z$ozWTBOx2_!8G8*2b5d3XUTN>j*>P-;>}4}(ZZ8x z&!_Rxye5FbL7Nhj(GQ=@j)P2s6h#{$TGuGg_A76Zz4PD(9c#6oep#4(f=_uI5e@#F zAoDy2Xf}_S4qAjOgbW*uXA0{tW%&Adb(?p;6Bhy|_+8>-n*3du*4HYN>N56LOQ&0i z7ruA+ns6i0%`f(Utzk^g~hU-UcDq&1OqB58TGI}E9qXd=eb zZF$jcyj*l~H{;hSq2)oWrt9P@&*BQ-FQ6Yl_hkA~3ObHPYT|amcU-($Ac>)a-ZEA< z20g?frOtc=U{zP9I8nX;h2nrRNRt9AH6~J`;GelMyo33#kA@b2h6&fU(WHiz%m&`~ zgZ@R}fUa=C2_^OC$HK3ceu-?0)Ghb=qPPaw!DCU_M*l`f`lLJ7Qpn}T3bv+!3}`yd z@gElSmwb=^*b-z)Yo|LiTg|olI`_LvV>OLD8)B_WhOR6W^Z_Lj70!ayUl<4}Tzi37oqjKXijhEZ&pQe9MPR?Dhh^H+boj~dA zY|5+WX;FK)&{OQ07auTC%r62c@RK%rR99>FuIUqbc4mP#O|e!l_-E!14^Q789oFNb zrSE=}H4XRClrE1=cYLf|hm38!a1EI`qb)Y$F|U$8zZoil2#Ktqpy+hwH}33pb_a-j z(RDLG*3Pxlv}s9sJ(Qv`TVbAOf2gBG%Vbp_=r5>VX03AXb5K_gm>5}&3DIosy-BeC&?KV}cLG;OhJZY#ZHJU@=M>@2+S3oIqUrA*Sx-xqel^(9#h5nJA!JCc)_ z%(cg|2c^+eCdY$Gr2Y|6w0@Nvi$8R<5bQT=NR86){Id8?l;}4u(+iJ{`A-1T&~iG* zi&X(vnM2^O2871O?{UQ;*8KV;@xp*tN*mC!^mAlo=ox=eRKlJ|fbogsInWVw(LaN6 zm_s_2c*2&@k1n>nf&~c6b+;G?yJ$~RiHn7Pbl|-Q)wJ}0ZZKsv(7Ca2y{IIhB^SD% zH%I8bVZD=Zf>wbJl3l1DrCB4i@w5>HU&TV=EZ+EYPmbmk>Nc!ClOmUC4TCpsd2iX> zFQI~#NaC^a!TivjP{hYoHKX}&rg&f<%BONcORyhBXt*pI23(T3cc=A%7jl=t1ijwR zH<%CF5RXScmukV7yx)p=$&WY^V zkSvw3FTOiPYpR^_TYCi3^ZiFIXtc+7i}4g8&s)Kk%_KKzZ2aSog}uhQKSZWqY8>I1 z`g#{42&I*kL>{$q+Pj)s5Pwb$&}#wU;%;}W3_uz>)RvLQ@))vt*nj2vE@K$N&>$mh zZe^4Fy*UY4J(lZW#|-Hs-6z~;G0swb4wj0wPLF`7$Uu93TXi8>V?5*}QkO!$t(z#z7>!s@)ci?N6P4lQ~ ze~$H#1R{^UpnITn58PK8>6q7g-t!C@%*H!mx)q(-lG~ULpW~qn`%+%;5AtMR0ueGk z*oYK+T_jlYI>>v(0T;M*K{FjxMu04u?*RdR?yE6D=U6*z>zlW!TvGJ($Ps<(N=+8> za`wv}3K0NJbBLnW$+h89xDX>8(EjF=#qcX0&Jgr(TZQ?~2fdVv4&G~qtZMS|TC!(* zX=(ce7RpWIU=Xr%=SD0bPFl<;=wG>8A8?z6mQoojy`rXN>qPZ}ltYaBE|xW9&eXIF za!ZT-GQ>>Vf>w?>R?#&<1sp?M%{&{!8_@cZoktPX#)Sr7yan;IJWj=qzp;8O_Od1s z3!(|3<>ZEv1wmLG>8|AGk$!n4UxX*&&Tb-teR4(_ve4oa&Plc7FJvSzGH~0$d4i!x z(`{I9^A%3sz28(k*=fW}F8;2U7u`YxSO`JL^;d&IByZHh0!NM`z zSxnT(b|J~QOH2&>cf;WEp}Y^dX~tEu+DX|fmagNUn6Q`eVxt{8>Ep*gF`0*$+Jy_= zu@pH|KQ}$v4wkKtz2*rLT}O64GKNU6o6*?mgtXE2oRbIh%Ktq^o{EqyvHRAe-M zv4*x-%Lf;qGF@7D(|ecmy@3Dsl*ggZ`p7svr`yMUe;xXY%eDk$sCOO36z{2=F5!n8 z?`uax&B=n`Pomh(+j)N~341JG-{A_F>WmeP=CmsvX(naEd=KqxzX ze6LSRm)1!SiPAaDeaDwOgQ3Xxt4Kk#9$lG z?k)7I_01{4R&^4u42y_!z=5OMS!9-FWA=*18wRSNZucBm>6|nF)iqWZUD^ zxO|Nrv}{*ONy{aV!_*MxzL3sDa_R}`E$r`7bwi;1?mY4RI*#okIV5j)gys4v6(y;` z#mwQm7b%GU(D^}bXf;50y`Aa;=>rlO5(+<&kE^^1;>;{AR4#xleHla&6C=;wL_KW# zxrHk$7)olMRxa24(Xt;ixB7#M2QAww$HZ%A40+A+!vz--Nu4D6zblXFNdKKgca+G=+|!YP(wKY``gfU!m%=W}hxlkgF{?C_YRJgE5 zuvGJc-7~u;&nX)!wGnFVL#wh{Y8c_k5&vUY$SG>su5DM5hB-t4)lW3Q-(5bxLGpb} z3p{8O_lR1yQ|Iy~8Qh4WmHkc z$VGwRT$v3U4OEo=38{9zM94=koXbyAS$|4=NN~#wW5^wrd$G58NkSip{Sd#PoFmun zjo$=a?Yh2KVg0zXU15wv7ROGi=zsMjLGB!VcQh^>t$N4g(WlP`!wVw*U*tliG1UG% zg6!}9(gKiz$3)~^CAJr(nY(j?^(CHSgw)IbV@vAPDb`@(6rBUTX(2$&svxOx_5ZN< z-ce1gUHGUXDhNu63X1e9NK@%e0R^N=5i}G55fnldLQ4>&MVd%eI?{XZ5PIlEY6!gu z0s%rNq1?&$edl=2{rleaTX(Iy*64DL!|=|`e&4;{y`TL&j*Xu@?;pOjq1Os$8&|oc zE$n{}!459@de}I-7IJwC9iq$PFi-YaY5p|{bbkjR%iVgx{L+-qk>%-;z9)MC8KTMX zg!-cIIi_hAmOe8Sm<&6_Fqiy*glE6(uB?pQaS)3#uJVTbn@<9zUrRbd@MeAqh^X1f znvOC(Ck*NEk0i-N&HgLk9~TJY5L(1I$Np;;Q3&$>+-^?&s1l&{J0QW+CK+yg`_@0FF!JwqLtYi5Kw*kR#;40|3lT;pN2x zIU9TWQ7f8^mjNSG^e$mH{&a7LoAo#ksD0h?Q?501>_ z=u6vn64N%HmZ^U^)V?A+?{Da`6=SL4cG+t%hG|#$o5cfWt5VHGBe}d;bV`zJS82B` zpoI{o+g)1pc!ro^$X8$Dqz^QWRh`fsjWw-vZ`&5VBYNz$zj2H%$*tQwTYYJ6otPO7 zP1obuh;Lt>US@6-apN=l=Co2 zHFgwe-cCrgl1H2kZAMiJHt?gT)616y(4>%(T4=Jge>5XqMMJW%iPy^T{o@xdyKhv=-jxU(LJ0K+0J7i*Ca`A z%?A~LN-6v!%0c|k(`4zWJN-g0hbIU)t}-KE?*=;^27J-?5AvGg62vX}C_M}b8c}I` zFE+PCvgxDIQ>|Qc_)gG{>5|2=8r@|`k{#Q7q0yVoy5r$NsT2*6i8;2V`QJWLcO{HX zI({(kT?OwJH_YvQXd03|nV0I13*vk1LsR?$k<3wMNXZuk)jg`)!w`M#ejZc}yX2Gj(rr}pBS1#>*H3wwH0!cTXL=)_2R(;CGe zqV4a6XM~6a`${=_32`f>5!2wy^YimAy9RVrjG^fNk z8gy6(^F<_E^0kk;7DeY5Xx_F4*Th{jh>71Z`|}O72a)Ldv#6H}}Z?t1}6EUBa&6 zFhYt>koyJQd6NFN=1z>tSX&FCOo0CTk~lYddwTqrkJbG~>-pv8o6E$=PG% zqke`*UG^!j6*$e%t4kcH??(L3?65Zv~Ob)q-)2eZSLMU?=3iO zGgcVN%@jz>1gI3}vlwxXlZ1~OO~I#{`$o0e1-m+Tn-1PP)D6?vzN)HRD-4y9&cA#*;8 z%%92U%VuWAjK5G}Y~L8zpMdgMBd2Ipx&}2|=6xAx0w2@{gOGeP>d$gE?^q_Cw!P`d z>0;2hB0LZP4>O>}uI3bnhHQ3~hFon3;}$*YEo7FU^&O;H=;O!F$S%BOwD4k-E6Z+I zFV}OM=y-~JjM6uABA2ijE-v?~s?a<$m0CA3XJF5UZ%(Wov}l;OxE0V!m8nRyXP@f( z7ej)NjOcUeZxPm=pv{N7wGWQAjbs;w?A&>3a+$1q%3}EO-LAO}!%RUt)#+bFl|^Lp z`QC}eIShzefRANY;}O}uNa6JUGKY>ST-W#Cl|h&N*Y(33vZwJ^uM$*h*PVi~+odUR zLc1`-dz(@Pw1JgaAHG?naf)L35_V8Yb`7*F17gby0tDNdx3d{+tNZ+V?v=ncC*V_p1VS|Xt!tQI6%z*0N7#j&j%PKOP|YR zw4u5EJhkBSSf44|eqB<7EdvN9&>?U~T1J32x+QAdJT;AReL0HuZ3?4+4StsDbe77! zL($DVprUGk_ftOJ=Ny}|At|}b(!6PHPy&QBLe}N+y_6r6%_#yUEt2cG?l$_yA*>i{ z$|IYk`yq6xx+kHPQ*f9GiACMDBQ8!9{SO6(UAgd9_H1OZU4%rC@Y7hHuqxI|{`Uf} zAzKumyH^P>VG6ZNmB^n1a17T{B_vi;>V&B^=L}GY zQxOc4DPW#>8*buplEGWtQc;qL?>Q~WULCYO(FFza{upgHQkP$K#VkVege~V6pwepa zLj2@jho#%;6p{cviT{1vPd;y(;*>B`9x&mxc>pgAYbo(CFqRE?L>62CRif~n>vT@R z7;-oH3Fy0N7;Ahc&5zZj;;W8&MlYc<>h}|hTbSpEy^R3nf*PF3?URhEjC|t{5j=KJ zw74AX)F0t^qm&&TmtWpAF=A^X2cx^RlR!ILW^#2|Oo0?Bvw*kC(Qv`tmn^O|z}0|P zuigZ>KgB(v&*!|MC~t%P3dVay5mbEE5kGLgQTvpH=U_up92EDWA}AC)@zly(x3jpy znu5tSp8;_m%G7$pgPl6O5bgu}nyi0wRD7!uL`8ZjJl~F7r>EE@1=OA@7kvIiV$p#h1{*-7+K zHV5dm-~g)4+nb82j3y}R%Xo|d)91?;r6vpk%^Hk0cP1nd=rl;^$XN7IT26PYnVg5( z+evS;%1$-Tg$}!qv4hA`1U(Xxw;M7OR;#%7)V#kc{Jmj~g8aZ5N@eM{HS&RZ-{JAp z^Wz7nU8p8k(3o7}I)lJI13UckgaOkF$cKjPv=E!GN(`0^`fUZF`Fm;DiG1V% zv(ztSn}MoNOtw2yaQ%UQykPv9&{kaY&&_KLOWV^FG)_HfGe&5Oe3|ylnOeyZucfOI zGu8J;tZ#)*sX%hgu|tUsqZrFK92EW z;_AnVQHAgn)zvwka1)vKR0QoW{IngiU9>ht>BLs}W$zqo-vyssn`i@P~LTPSW z?$>k`DxJk^N|lFEoXi*_(&0kN{oo)=x^r}3mzq6wgRzV4P`W#GtV>laIG558D`rg_ zXPTeaNS+y^W>@4_#Ig3KxR>=49Ay_!&qSKC#m)E3{R(C6=h#;mJ(6ol1v>Eha%+NE zmewMNx|8PfYOcXoPtvYljYneCso|_p#naCk$RB8@pK9Eivc0eCJnX;DzYb*HXnH>1j-P zd!^PIxcL-lWpaxpVWN18Bo`bF7qC)$cm3AtP8NR7X)rKq70 z^7cpBbUsm+g_=ipe+ps;8?lg+LOy_R3*NgXI_F(0ylD2$=C#0w4k%lXI>T;a6O+;5`H@66~@DhM5|=@lkIyQy#Oj zI`>BIrkqr5F?ncKH#otC-UjOxN?w1l92WN5dcpnp&Qk6E;ngGTEw500(a=7rKB|Sz z&GGw*@p8Lu_(9*PPuXxj-?ACs61U?7g}Q+0Pp7NRZnE#{u7>J`Nxs)svyrqjU5DD% zNpP=xIy+=OTY%54K)I}vbR)iU(r5_2EMfjVYwQKc1!lgU zo6B|6=^fI=JbkmgWn8!qof8)MJG4N`XXmJQlr-Wh{yGTyHUygT$?Gt{YrJ2Mi@6WE zU6hVDVTcbn@eg@meo0mIed(G%r0>E+5BsL=58Us`-xEuBUf+vT#KU4q52uc>w{=ul zsYxQp?}+#`XhdtcX!u45kVep)c&;4^YnXMF)_0w`Z72{P=5<@ry_WCe+qY$`CvSX` z^m^HdGg|hriE1NE?!#jA^Hd&PEQ-hk78Xh;T zAXJ}X*G2zi)ab>hFfNI&E;05NVmQTz9RU|Nzk>V6<39F8N9r)~L!wNMs`Qy_v}%*T zcl79|-8^^&aWgNvQwLrT7uev0%^{0zs(qR2{Zw0K$RzWOUE%N5my*4P7# zP9}n{NhaoD-jH3NVjBEMEOj;9X}#UJ)>SEF@B+Ef!q<)ubvqYuSNNN<9`!1zS;oP2Sp^=oN@?U%nJSg($58 z%@#W44plYvR+|``D|&JGJt9-%Dl*&sL1@9VzKF(eq=`s(4xgr1a48#pOvqYmc1WgJ zG@MW#mV8&EEP)$o(Q%S+(PpBPNEA+O^6^6d=J;I-x=r(2zSU!K5xb~#DE?CNJa0=U zP;E5wX;&F+YnkWxjF8^W8AG5EQOSZ-U-4uY_hPHE#yVrg%lj2feG?DNYORL-9=%+T znsE>aC0$74NRm_|iv&9xV19A*!$CB3?>i4U_P4mn_$N@GG9deFbZpISN)nvG>-xq< z9Z`4XTt?T6!+HfaT=l@iKcp>I*6=XuOYKo5_QHK?E@j@Xua|3{d)4sFB~O}(AP@^9 z>2_rIAUa9H?N3$CihC71{3-+{@Yj{Frb(S6MFK8pZn=J=5MgP=C!FvbDPd0lcC_zc zs%FZU? z`&XgMhC*QN49UDbK89U{h*Wt3Bm9E%1|aZO`#>~gFQ=ti33(g2{$Qi*W%W(UNWL&h zM!qmy2GX;_L~eHeB3b)OPRNj$%^pT18tskP-b;6|Oe#sxLBEZso`<(|MFz7UM`g>Z zq0@~;35;Xa1J&ns2%o+7DtEkP^$R4IRIYgc2tQ|;W1Z`CkajV`;>Ur-rc-JbMOgXf z*DvR}ap{Ti_O2W8_X0`iGOG<+sfKOs6FNr2>e#xRzBi zbp4Q7y(^sDP;(BmOv>B&gOXc~?h&^FEH}O@0I|6rvyu}Oc0V}46dhWc-}M5X5X>jX zfMzMgFFJUCyL&f@EPUn(LY=ss?bNp0FUOlMS!7|f&7a=->S(Xu@bHZu>N0mNFisG@p9^-|)-}1-9rycz)MpyZ7Hcdz7nvh7 zp^G#klzGEe8TMm}^+M(pLQe2%&_v%0XJw0|n$H2US+XD0gf}h+pZvIkD*hop zmqCfT)jyG!P<0dPR@Qw#k*mCTz1XFvh`(h4{iE=++a40nL0Ai;lY2r1e8}=qWt+L!75d5V^bxZkA8qnLk{VK08 zoIR`ZLt<)&N~bjjJyF6Kei3EMg_ldWl6!Z$WMNG1U0fVKK#!*yo?c8`ScE`xPZ@+|~)%7On$v3@e zPawt8E-SS=lrpa4tj}=5bu*`j*CV4`Gz*%7xvvAeJYl@-_X!*Gt*cPBvcRcN&5f#z zkq?nfH?d5$RNdWrtG%Vq1^Q8%o3m^%K|Dnv{$op8{HtB>8NAKdRX224I8GQmZ7Oqg zhh#|OwSdp*>{O>}U}A(1*w5DavySsxv&yH;Hx1mfsBbJ)^&5)IzWQ@_C>)xkbn`S~ zqpQ=77WESMCBpkfI^|5bH0FUb=&rE}mFZ@5R{{b&@?d5=I6vL>@%PQD*pT09glpU} zN5O;N)};pazqNOHhsHt9Jljugmd5pAt~~KnOXJ_x!5yM~x~M}JZISc@RJw69F6rif!xbm^Kckz zkuKSt8$Q$IZTSWcpKa$5Pxj8yP+jmgo(`=3@G8OH_r7?s8?VW|-)auoPIn);$+M6W zkJrUCEQ>O6IH0p1Dc8!s>u(-hnV_E-SSa*jY&;D}#M6Z}0;V%3vIcFQyG5h$yO+gG zo9e{?XiMHj`tV0xwJWo6ovlVM5Y!P5Avuzzz2&lbN~d}!%eZ90O#n%`W?JCAV;(oj zS~Ni1no=3c7(6(AbdL%)WoBsAcvtX0<6t3;zJGp9L!)Sp&rzbqP|OKy*d@b&$wV|x z`s8P3w}B=cdAQS#eAm>nB;)=Xdne6oygqnO28=rHG@-XDIV@J1=83Sh5tNX z#@9y$VLIsicf)L))Q^$MQe1C=2*CI6qtTE|aiHH%d;8BR;Qt!`|BL_mj{e_#8v_?l zN-Vm+a{`%*{~F}~%<>)0_-4vXrQM960h9L`h4?n-zb?4R=`FB=YV&+~`?(26$u)1l zQ2##KR9+(k;11vEa{qNp7SgxuMULIk{E*G*`jD80n=@|9(9LNXOfj17Keqc{3kLq) zVgnffU@Xm3pJYJ?r03Cgh0}5$9lB1J`QO(GF?dJi>K7*RthlX!6yz9c)+zpsf;e@O z8oTszU+ihcZTC>rW`AKY#uI1MKaV!mWC}d(PK&ejZcycr*~@>t_D5vby`z@=xPQS4 z^bMX4(52@6*QEb4ejM$%;L0}xyK0;SZij~$*#5EM#(A!yul9n1Ct3p!q*CDyP~*IR z4^3djl>Rd`DPSh^){s!E)p6-&TgvEVGu&1SRb@W7vH~C!s7`R5M_>WkMy!P{dLhq} zPm_Ka=-;0bwVfPK1So-ARlrI%oX3o?0AGm5nMU0i05V^RK*ZE7a$*6bFLD?L+-g1qFo3z2NhAc9GjQ zwP&XU%oKEH>Lu~j@0dL-a}Xu)nk?NqlhujiO;Wimg#=g}%5w`FY7!jUZ}p0MuA~IG z&qy^Wo)k?1zV5H(d5YAX5+*}!Eu;2;JlHg`ZTs5_>#wtJuOmUo34V`IUpVoo3KyN^ zb$W!|?iSo+i=E|M_lNAhlvwIaSn&l1&a}enU*81=Y`D3we8nddV+|EXK>r5;V~D+XsbN7V@tN)vKxZfO@KZ7~ z*B0%|HFKpc%xIzPR7*hZH#F z^jRg$KP33QDAwme*xxpOH+L6_V?YjGEZT}vVuqE$cH(Ail1|nwF~oimfeI6V>3z>U z&?Mp<>#gl*XnAXb79)uruntdQ@`1?8&Wyz~;7iUH18PCpP;P(RT>U82l6lkB&oj6( zRgt}EzwrXq2b^l1iS*~+4XZi1?txu66!T2C_9e{+VfB#pLSH{gbnd-~SRyttA*5nf zp{GPicK(Z28P{zzFEiM0TUVJ<)(oFZd4%Rh8n|LcjLfsviz`BA9~M*7F50TNbzt=c zJ#y73M{?D$<^k@Jf?=IO{ZZrXH&GoyVW(e|&>}Ph04h3yN$`T0pvg%^4dJq-YTxRuRE(r9vju5=kHsHXybicm{%R@3CI@!PHRr!pO5!QP2)lZ zCd)oumA5%vLLSG+1Y6Y!k>J9WnBJWooSn`vX*BnRc`mYJD=@a!h3+G{6U26$zJS9I z+>Z=JoA}=ZBroBJRxsHHCASkL(h9uQ$Ic1Vm?)v(Z~u7V_dibintCU z!45D-?S^4p-2^^zGXk1GFG*R2R&~Ql%2WdpHCrXU4i(+(dC!86fYo(OW}HjUi%{u> zA%uyKg>BrVXFmHia~vlt-2CVa)D+7b(A!#!H95nNdF0icvP7d>ay6AftLtBa`6F(c z3UY&t)qZ$?Dp=@*7xKGvr^l*j`?)fMLX%(~g7bdIb*EeGs`QU|R~nB1u= z-6QGBR;GR))>d}a*$I~+bunjLhME~b&Cm}`{Sq){c^nDxVc`P9mP{)`gg9nh->8cR zHah$g%2oI_Vfy@s*J*YW25%>RMx{Sm|_+w4ONS1P@D*@?>kEOUc<-=mR zXvw*JVv6PmIkXVwso|DUWcyngS~rX#@(BGn)HJU3R(NO7NjHExHHxPRXbZ_=Q=Hka zsC3p8ZtA?yBh|N~VTF^7BP}wQMnvgT4fZ`HiM7;+`DVdZxhu+p4kPViBl8*S=IR=@ zcV2;#HmIpHrem9T)IOFZsmr^%1|#t!g)S+YZ{ACtFA!*s&rHx7m90SF#@e^FsQ`eQv56qOGjYD=# zSLlS73V{X|4-@OcFG*u{zeMWm+&c`8*7<}@A~KL?1mq@)ri1HxS8GDOO|HJOS^k;2 zdoXv8%t525PhzZC;`kC)b~R>3@pCdt0qH8*tVj}sB-A3;U{=Q?j0yOJYhFoJ3-1lH zP0o1a{tl^US6H@!cx6Wte8-YStNEwxEcD75VN-uWpCs-QV$P_CpA^~lUbz=xyBH3xu*^ZY> zlS=Xx^XxRWBO>nHg`wQrDuH9A{HmSBtL}gcg(Zl<2I1nZ)h8qd)m(aAw4%+UM0D|b zqD`VDCi0!|yTJ^vy~0yHD$98q?w)dW^v3;IUz$oTCi%qSwGE%naMADLv82J=^7ZSq zuYTmOJvDZOh)8G$sPtniXQqL6$b((?C?HMD4x)s*4Cf05LiWGMQxjZyf{fP3#zOh1 z>Nh8>o6USIWWde2Ro`P{Jvsjlu@efqu|Fmd^W7IDzK6(cM#92HS4Zx)0&Qnx!Yuep>W zAbMd~(lxd0*1D4}Cu!lAP?B*AHhEo8-2|#T#Jhi7*;lNvMwHOAVEy&EN}Ov%d04{b zXZR;%5hZF`WdTOwJ5S>#4-KJIWVVO|@zSt!TzK?zZ0mGu=bH=NH5gM`mfa_YlBNR1 zIs}KN7AQ*prOePQv$3nWfA8uCXp3+=CD;V$D)`{xx;g^LCi9y1aCxeo?xtw51uwjWnVma-qk*j~rIoSxZlo_6M;h5nv(S%=-?-sX5Tnjw-|rUE*#Tm)=ko9f z9p@Mpj_GlWGuIr*ehhYdT-I>d$PLw0FJr;L_n zbwiPSWkPo7)k_fxd&*1e!q2r`+;aIoWOlJ0k5~X=0X&(pv9D>)w(nLNjQ2Tda;$-^ z*``lTnO{ig&Dg772d#F!FjhZaWc{xGemI|Uen#9hQ*u|1)dWO_qNmu7dt;j4+tu1U z|LvTaF|(EV)N}1h@~#2fCG}@qWUGapLuu0Jn|}w`u>aVGvv0(}g=u}^X;K=Tvf+`M zE-s!nr#1Evg4>wyAm>BTOg9^@bF(4ts*<-~K;(8=Rz+Ifxq_ZM{pPQ`R9w*CQrDGV zVogZ%+}FDmHS>xgubB0op9ghX)cS&OrKSNHde6k$Yjqy4 zGeFx}`s)@DyW7XPP=k!k7F}3QD0=&9Sm&R3I9>DgDyfWS6*a>7hpT0w5yzLnyT&?f zi3V&g&$e8*e)93T{c4i}6}R$lmYb6mq_7MxHN?1ne@CW!R6YZBG2pQ1;f%_U=!(mZ zSFwocU5_4r&dO|n;HLYmt0F7Ubb;U?Gp_hLn$D=2^CLuGfK_$eyw3xo&4q3cGJ#&+ z1>!-@L@QKBCag^v&Sbx2{lolyQh8lDC9*XCut)`i?&4CNdTDRt$03n;U~v^VzLG94E`DPD*te0r3TT=&E%%%x_er$SQm3R=xq^V1cHR`_pof!$eMxw*H;(W_n;myl52i9S+Yp1NFOZf(lBoRD0 zV-mChU0IHcXuY5h+KgxI?Q-YgoDgGkhFGB{8U=q}0gT=1te+aqy?2;ZU4oPEyY4{9G+; zz3FLO+kl6_V(#0(hpH7b+2+x z&2*iMmEy`Yr9!U4=Blrru)Yg8*4}#utL(L07~!D2;5O+z*#Ccj9h@%D#F?`g{C<(; z&id_zZV^!cD{P&Ff%+W#6CMsFZGmD%-;vr$8D#>XY?Br6X1sssUewmA$=jpM?Wo>` zm)5m=Raq4fo_*fJ`vH)cfO>f;Y0sldAe=Y4_x_+J{PG0p6XhWB4J1Anxk~blku(J< z&qs;Eb$zqrjSI8~U7UVv%H@l1W4H6*G)r8Lvz#_MKW*2^@i8WWah`y9XYu}r-$@m9 zsr-+~T*}m`9nfjksQuS;FSR$WyCbF~3T1J@dL~(8mLx_%w)^Y^_Vbr>#34POyhmNM zHX~8l7~SG7RJb1<(v|aYa=EngV=d>#J=cY=a@tEGab2SVASPCG3sv=p!{%{qmY8z% zo0im>aeqDSzn$OUjtOJ2F>V%^NBDBYfXr{TNLEp zT@xEvc{$hf4e8hqGcxON){F;MzsYh%Kfg^uugV zxAjUpZS89e-3?tj7%cmW@N?9Fh8wIh%hJIAvei_I(E01~&fWZ#b&U-u3G9G=R}l_yt8MsaG9l*7exPQln#aq z?JRU0g-Vok(LRc@)J`Z@Pb?{}csb_cO#ev_p3hgfSw1W}pBON$P$mzp%g@GFZ@*#u z>l+A7k-{Gj#Aw|%5xhaVKw{P4!n}%$Se3eCp^;-Liy7C2Ny8`SfE7MaD}u->D-+x~ z_3=}&LdTaX4_0v|twePzDhxCWA~n1aP@#sGp4mpYQ97_J`Z1C30j2K$y$|skvUR%M z@9Ksljvq{wt;0yqPg_!@xOa?*FXSf{20F*bLhXuZZZ0~xrD5aj+>}zM0&=fmZ)7ao zqM~x}pdWX-`j4fH&ilkCu`=vY*507s+=?|eh||+8qCVrN!NN;HVc8_6*_4Azv665B z&?maw`ki-UhCA;m;9mpaGA!1qWdr>(JtK*Wf9K9!9ms>r2D(nz8d~c_28GnwR@&O) zCxXtMH(^WUN!X;1n29aFgUyx?kycdg;r_E@NFc3A=FYpf;L||bGKk>Hzvc}j{<-9r zvQ6ru+e`j7gBJDVS_#zwD!#ZfNR?cY!mJi~B#+FnW9YAimMyD|lQNnAZJ6QDUT;&B zD*Uy7{;MRQLLHcFLOXSx{oj>>``%>uPQwzBe^pSTNrAJRgX+Tf|8<%R6quaU!wLTP z9sVD=@rswh`|X1Ca_5Ei5J-#vRczB`W*cy&Ed)rtzkGEyu>5cL%PO=)`Xc|;h=#;c zq|2NiT?H{+Oe{y}OwY3q)n(J{0x~j+KoX2FLCnN&Ox0qh>pj9Kn}%usvQ%Kr5aK53 zjuEu0b-}*JR6wk)NAnQLNucrzmfrzR9`#;{s zY#_~e1Iz>3NTfW+8sm5R<<0^}WO{F?ha}HbJ6Vei_O{|9)KtQ-UCpRsD?HI zS^io}W7o34&uMtj@{}i79gq4gpjIb}F z%IQ_LYNblEs{{_qtpCT?eM0Jjofr|do1O$O3JxX$EVINKkj`-P1u;&a)5hSh|NIKC z!>MOOyf&(rCt9fFCda@PHt#T%cAKL#+eBqYso!Z46Ynw;M*D#DRK?rg?-e%ak|$;- zbHeOCr(5>w*?)d5HA#SXBhgkAsAPsu0k@V7h+!B(0BihDl`9q2pD1HAY2yAn9Se{- zK>(uk+6jRCR$`BdK!$G-8qj|8m!l_^h?_yN}#4?XB z+7OUj#R3}0zf(lwL?NqY@V(U$2zH_z3lt`8iS+xmTXLs|3z)l^@jqMaT(>iYpA2Z4 z7iOscd0-(6QeQMtl*U@#)_A`praaEBq1t1L86dack1F&`$4wK70oJi}zXB+%?E?%?P$aik*Ff2i&3f6P(NFI*{|xrdMN-!lfZ=M|Z{vs*LFD<_0p{4O1Dfb$ zO{ag%rEC!WXWOJo+o=hc_3^sVjeevcFH>=dh*!kcC$o+tKaWh_C- zNzsXFQvVqB74oePj~nR&x4dXZJ$|_@QALuu&54H=%i>x=9`W^vrm}S3Ni}d-hRnad ztm_KG-LAA6s0$K2e${{1rq%J9c3XB1_X1|a-j_R=`jKA%aRZzRRSl3N;XjpfT^@>M zTgfceAIkXGV*=0R?lF>UJi_F*7|tZQAlSNHvolGo<;s+`Tc#QvhIj(JTpkB~$oU(E zD?ae9FY9(1q$lv}M}KXWh{Gx}Am1uE+ZH@?B&;aOO>ESx6$nh!Tf(PSPIgFPoWgsj z&(;~ClY?hj!`3E*2^Roj=u!w@`c~mgdQ!G$H39mwZtEz2JV?+#1@5rs#nWXHdO|F0 zwADiUfo%<<)%D+*HhmC1~s1hPUl|+-(quosMxR1a)?0nWcc*tV- z2GKj`zQ|woGI)&&Wjqn|XMFc1`!9?SaSX3rNIpyy7}ZX!j^q+doD*cA`+ZT3!^i34 zL@y7SD9fI5TTbW=7A$S3zUKWW_9F9US7jYLo*IyE*g>~CqF58{lnlIOk>wc+)B+FsTh9)M;tuX-M z-n98j@41M7zM-2`=V`9<=@+cCiZ!Q4-1Ki8CUgJP;s~%g2~d8E{AZW}e9DiF!_wDl zNexh~f2J0&CK%Y00PB3{!;Aj^!e)fCQ$O}vG|2qNJpBL4#eUzo760M_`2XVg|Id%P zXuCsCL`DRQsobQyT?)i1CWncFL#oMmS(t1+EI#^wdxl1Bc512+wZ z{Y0n^e*i-xhtxIQW;!_&(5v_`mqAF@;(@hg3$GJBlYx zP#gs~^KuzLoevAt-0isI?d1V9Ot-tRrtHxh0>DBw&?mjq(-04c&Jfy8J=eZf91}yc zoNOJ|Ud66ZU>!!|@@M*KuO*#!rfIWYiN z9@_8DVLm*6? zS~vli$I6KnP^=GyfK{Pu8y}wZxBV6O2w@oN8e1Kgd4zZjx5*6cZ@}k`P2?KykH}W}e>K7Wz%*k0s=mi=5HGgtbe?Wx%@z;ycl>@e(XTn@Bonc)0_*_@bpCE&Om z*17*vEq(}6Wpanw2Ma@;CKH4tgzgG`duS>?F7>4Jc0$76eo%?gJDYa5F0C$Ix&fdp zH1;4;Q~OD??)5zA{}9GYB^y=@BeD?IS~@q>YXs{Viah5E_SHWP1AceyxK1S`YBA;- z$Lz1~gyVsYg4iF_jZ5Don)R36IPCQ`ZrNS z4gj#>MM}vL@f`m_Ffchf0iI=7iw)#MlqbPT%^YbY9ac*{9?-wFu(#~-*A#g~))UjH zd&NEF8tDk2(lvZ>AMj>10lHZi?S6|j;6endu-tWs`za3<&j2*g*hOSfAQ9>ou(H*) zU2*M6togH^PHUt)kwZ&BOI?7&Iq1f6`BaI8DxLE_qBD_4zsemWO>ki$RrO#%SKKldjUO918s=pA#Y%Q-AKs*E+M&;z46i z4wn@Wr2KmKtL|lbic9o*9>UF^Wbn^CS`QZ*-&*KO)R!cUSjK0mCRtNq+^~Lgo&d&U z-DP`VXPOU06`=|PVn(_>h+g9TU5Qbf2Pz|{xAmh0|0KDnV zWJ$CRNli7+MV|x9T_HaLX2zr~@?@V$TfrXJW$b}1$CekuAYloKkSbUEZOyY?O$@`# zVf#KH5!SHGeFY%`y+|hMaM1cdn73|`h^lfQ4;8vT$FM4jJ|qHF4y4F9ZzE()W#ymv z?jK{k2zCsbh5NzW^RG^c>jxItj=dL*5$8}WC$e~I3dW6diW7G=`!QZeF-8W~nXxXc zT)r|?H5FT0pfc(1uLzp(XRk{J6@9V3V#1!l?y-EW5ZS=Y=S4pIJ`D1eepilADz`>L zCkB-$Vy%$57xe83&y8qBZ0+=3!9D=Tsi}P8#`#MQ0G*YA?dr=ZtWx!nK~PIV-1Ke+ z9hs?o;@B}L=}>W#d5J8-z1P}!XwBZUd=or_e?fIsI~q58t;f~zxIKh{Fn*t=dMO$_ zLEL#N*pFM(shnYvCzX9qB-&FQP@f9>Wt6mh5@IV)01{M#P0giS+&0htPOp)9vl3_B z?Wc>lyjRbZX;p3-gDJc<)l?MupYIX*@;$7{mF7!)g}qfH`GV-2GZYm;dx}NJt6RzU zO!0$Z@G=iDLUG!e$uxo-gJ?84iZb~<{l+=y%#zCCu3T-D(i>1kUAba{i`ui*W8hm& zb8{>5;rOzL-po>%9Lm!*iA~xoSSH&<1QRxD3uoGdR9Jk`CeR0YZS_G?`hst_`DR)_ za!;3%b6wk~A;?;XAp%Nx=L|YY8!_f(5rJc(#lN_25!1wz-TI=eL4q%cYG{Q0nZuBo z73a9?vB?rolfHk<3S&71h>0=WP%d(O`qzdVs+;2X+%*brvaAO{e8)&apNjk zppA&H3yi3zFuo-6bohU8lbB)a67zYsRx)<;r%7Opzh9aF=<&L`z@F+9>o;Amia&|H zdeRJy0gw~tqI2%1FI!W`njsbU_B`14;Z~?eN7NV2kA7>^zKVQQw)F{qkK!VMO)HJ5 zFZW!AG0AsSLXj?)FltDBmj+)qu|chyhuj`fm8M0v=9NGQK!sw)Pi9alxsPLm>;uVH z87>yz+Rl*9kNcpouEmhbx4GtI=JWdid#z>d;d~Hbxn!#K)5(o1ig~p8UCqIkXrEHi zn6Wq|6N1{aEqYBGj_AFR{%tEUfsMCYzB_LyENDy8lE&X)=gcX$M9*)376%KbPn0-YTA*wSh^SePht7YS zz5bK+p-&a}hHulBzhvmvJerHLzT(S4Wmn=u#XCBCucSg_oTqq(mx!?1|A?!#iI^(8 zzL*sE*6g7vP|Q=g?18W{i@)m2CA`_xZJHG#SzbzuQ(C9pp0FfodOIKWvCjGW>EqXU z>D}$zq*zN!zsMp6ZaZ5ViVbm5)voL9EfFVxcPymP#gM^3q-MK8CdXz}&}@Vj?k+eV zRryYAFx2mK>nWRALJ@3g&3Fte+~fdl^bN3r1H9ccm>j16i@om*XZv6H?ogywQAL&1 zinfZ<7PZo%wP~wHYp>E0t3-@Ydq+`wmr}J??7jCU60@ioGgd@Aaqj#4&v{-yZ=W}= zTrOOZ-*`xc!xtpIDst`-Lv7t3`6z4~BfSbCR$(fBCt-)%oL%KtEGq3&-wik!yGf3X zXb>M?2S0fV-!z%5DzZ)8d!bifVHaXS9snD<;`#TqsfA zl|=5ImBaw}LK!|xSjFGF#DB6e3QB1)qSFzdWec~J^%hE%!)&1bBfOKnb#zMp}s`htBJmh4I7%bN`5kAE^a@xG4f zPwKm>*D_YJepkIcWl|W)7(rG~!5OT{VbJpZUK~o+iT0YwobWNlRW7vOR~Vl%K)(c4 zIRn*Wu99DZaiN1dO-@l=TYG|x{k*FsZxClPI$Zh?F;~v);O&H#cXu?goqaxWi{FKl zDZ6rJ+U$6dUA={FhfTY9B`<)bL$cC!wtycf-ABP}wyj3>&N}8OLu5a%mV3uOTILg} zi`^l8@Zhl_hzazxs&u&Rlhq1r>g1nOt-TXt{DT)7_ZUC7-4|Ycp>B$XwnXbLru=mk zDth=vF`r&lPS{TOhB5NJvi*eHNO7dsJ%V!EGta1awz-avj5HY!{KQQZzEgGHU7C`S zS!1be@1=8bx88yv#-c&t248%t$;i0Lxese64Zw1 zu)i8!zY=IYJE&%1Y;5^S>^wgP!dql_+$rN8>3FF*?MGf{Re>bf-as^z<- z7zGsF%VY={P`I629X9UCDb>P3Y1T;}w*GA?Nr2wCtt~>sx}O^n#Pf*1gr3m^%(7d< z%yw$yqF+)R0V@)BgLK*m&RTSuzN$0Lu%Y`w%c#BF9!oKLkU7Lb$G-3AzPwcPW^O}M z6o$=ov=^w&lfsS|{+UamRD$nq9F>~g%gRg9>hPFAkkm_WH4dur2bG5`kI`A+kL&xp zrF;J%GV`lE|D%x_2zpP)9OA|2^OM1Bu?1oLXZYy%%LM^>rd?$Z`ev!6wzOdH(s5zK zS1|^1zuN9c)cWfr4}m;`^?tTY4E!O8Dl&pOk z{PHVvgXE6x7Rggm$#Jpp@iN|Kq~tI`D)un^meXh0Z;?};Ph`0_>Ulz`iR~Z>d!Q)B zgD*@tKYl}-re67vU8?sY#c0>)c8TjFmVWiG?|7Z)sMh(pN>ArWZ*m+mCY8)z6C+0z z${2ZJaVAu z_iv@|_7Ygis4GJ?kg)L|mDM+5+PHQVja})a-zc*%7A!9miUcf=BY$gF6Tg0+d)lzu;8ru0Ylp+$gn=6oyS5(iT!wk zN;F>4IGe^$XH6O}K8Er9%#~3epLoaQZ^SFt)^DOQ#Xyn2^+%#?(U-6>b(fXgaWP8% zL;0VJ&d_3W@>ONbI?xh&4Muq+|JhPg!n^=(f4<*i%Vr2(w05ma9m>1qig7KipG#I;s=vjr zR?JY0JkbxPtP~H>1rdWj@ zmber14QROdIj5A;V%G7`dv{o>nl@})_yDg8*`IN!pxyx5?oaVhZtM}5A2U8QbUDj0 zl$w6&ASQR-wH={Of3`WK;a7I}pfYL@{W0yOyBd_o%SQR+H~|+1)Uz0K(=CK7&OtN- z8qCYwq=4RmVz&TPk4;P>g3}yU1Vd!EF2Wuh}04)A1L%k<7#)vbpXs z{E{W)X&lU|9v!**Ha5@-;8>)5Gp(SGp`(R|a$dRZ$?j)1he8fn1SQ`*tOj5cO@8Y4 zmatw#{CqAa#{_z7LGOgn$__LMR>AJUk!><3^>H&s4F?=www?Ie07hI(cS%fI(rFx2G67psy-!QbzQY`lo$}RTv=e%pz=%xNm#lt zcOh?!4u{3=NZH(yeCgSwCw9`!>qcFhn55dBrFv(l&Q?*#Q(@z@ZQjI+729n4s! z3?vTc-(J%5A6EQg-t-mTu#|M9-{KyzC7u5TvnWA7+y#|nIJy1qMyjbYd?I6Oeu-l= zV2I=wP0@X)z&m%o;dNGIkj{|HOVXOl&M&-ciOWe))I>T0+IQRd2lmy>ueZ-*L3dZ8 zzVnT>`#n!?aHM>L{7hvhnUQPja(#@GzKcw7SmSHi3ldn5x@Q)@W6aoGgf$(Bv1l>A zl0jgoAS?Hf8adSCad|}C_aY9?h#riwQ`)GKm)FLZB+%G2Pr7t3bz;I)?^2#K^rH1l zb&XcVI#(r4p2_elB-cpz-FOzj-oulfM>{A)=`{?3lnnysTU0nUQR?acdh_n@JKn}* z)UQ7keq5~?0UbMTQv)v)N=d0*>LJb!5&nxfczokxkKCcR-d7`I9{xn%(Y&Fe8goy` zBuBrcU$%{gF=K^&FGl$uf6`FdyQwz&V04e2+PCWlyLStR=s6&}GxBiP;=mI=IEYK2 zjZZ_^q)-sTifk<*@fVw<=P!o=nEAj#Z*m`E?|S;z8GlT2vjLK%l=S1R<}JoQ9;bfK z(5FJ69|b2!p!%<>KerY#L1-P!z^3r()iJot#fONbvDx)TiH@4OwN{7?XIp2q$awBq z$JciU@s#5mO8$f!ct27!*_WH>5z!_^oA zhrhJv= zy*5yd->1eAN$)1Sk)KomuC50O6ejJ&jV}xOAiG;|BM-WFw*P?y@63=GXu2QgD_rG& zqb%z_ciza7Rcmw9qiQUM>lbTCKs}PS%h+{XZcC9pAhaK4%qPD~h3xGm##Npgqa`$_ z6h@)bs`pfNr*m&y;VD(!1O&AMOOt#3)>jl( z{+mCVvgVI-3uNg00&sob1szc6(y6ETqRO6hAjAL@#uJzYx+?#{`G2a(3g8kp4jphn4J4{~&0j7o!@atW^A|xB&IP1vDf&A>Ne4J!no>fBNtr z*vhX7ccJbe%BWNQH|z8N-|GMKrz-yY+F1kqG`lhI|9-T&Ap3Vzc#GaxHRqLVhyVMb z8873+c5?(C8r2dJuxF`>ir)F^7iX&;UQ3~WUQzD9N8l~6cP=xojgT7o+RJt&6?&AJ zgyCzf$T*uP(qOvh?*11} zgg_GRQ^k?-sSD~A^1dZWWf2Ik`=yhn)Y4JT{f~vl*bSgskiISJIcC>lgWQ~+Y1k>C z!02qvptfLEdTh^@F;gqa!-nqtKe1VwA0!W}B6nD?b%jO(Pu4I4!_9i4;Zpbrh~3=r zU;H6zbPy>Cl^H#RxYyJZ*PXHGJRu1GtCOxQUnciVIlk<6(HF4436|&!A&9ypwj7FI z%Q-rbrIh#CU&~3eJ(~WaAxZjzA{&=~ ziu2d-3qA(oG4DCe-G)4hy|6h$H}Cm{760d? z9;c7mA~(AXN2u%qsF6d=urR`vJzs3?lp4zP`gAJMYmg~jUczCCXhCmapd-G zSM(8<9nfO|X4qIBv_COs2=}k%E$i(j%>>;LV7~x zsCuwsqp-Fx#bd8~#=ZWA#b6G6(e=XLNRoboyR zDxfc1q!R^tlY;fQk&~NGx9d8-DRp0H6dv(~q#iYwrzH$Q$^kxN1&mOGJDg5o*#i)xnTWs@A3RJe!B>DJ6(xgEHw z`fPP7k`hx}n^NrND!DSYh+#8ybacn^@*%|<)>;l*fd#f{)n@N&ty_`EMLvvz;Ryx0 zzo^mariPG*=>k5+GUh9B?)=oN@*?yd`#Z1jbLF(7ihIemGtxKDi?FDY%oGv}XRstF z9~z^u>Pade!E#tbcz+me$`5%hP#LYd(7@I%+Ehp@0NYGUf&$my8Si6KKNN~Mczyz& z!4$#e%fF?zCMXXjeW#3byC7ot0@j~;yWxfvPW}3L9{3RL59NFQ9ksx%VEp;o*=oV} zO!1S6E%@dMv=eWMDa(A66xWDrgN`0pmP3-Dm3D+xl7lw_XhR1voJ~bH{KlfC86c;J zyIKP4#{-R4cZYPDA?O z9bKiclIsOfw{5FW5+@nx18r+T!X$~3HC+n+g2~$!uOloAr5(vH+hbDp{#li15lv&) z@dmX=NQG3?#Fm$bp1YH^bzHKuTP=<-ih0I8NSNG)SDo!_k#vj-sh{-F4v^l`Wys)O zq!so&f+KyVA*Wyt`4i#=wZt3{1`dDg+?gCOaQR&O=Lb8MXn?_Rn>LEs*ybcdNA3|m zs_8v8ZM<^o#NWb6~)XYn=Nty&f`N|HLwRyoX(2~9g8Wky{=jwt+)9G&yFh$KnHMlgbT zUZ%q`+H!&BL^MYNEYsNQm#vlx{zi7bVhO2vw7eYKBa=2Ie{=DtU>bX?dgsD@`Rj9m zK+mc`HPR9WueVvIa&ZWA#6=Eny)KqJ-JPK58KRiz5fgr$P1qV+9aPpe`Qbr_8F1oL zkQ{Hf79#69zR`Og6<3#q*&6U({Esdp7Ub-KxK!^;VKp3@ERUd)!oDS84b>ux?d zaJYm|flS@6MWct4Y-gRu{juMdF_<`8_o}n`k^=1a$CZ_#f)drCCvw-iZB2JCityYo zYElFn344b}Ugt*!ONB;_4fOqTk=PgG8XkWb4PJ*xG8b~I2L9p|^#4$|EMWJ^j?@h3 zW_9hw!$LII;0CGc?9dlTNDqv=;Rm`=~jN86q)Pe^c|H>NkM`!%#`>CMF`H%(qcP5h2XjL&GOZUW#^=7MXQZh zB`YAnzkugfokCJz!QlnGeWVk!u<&71Y6!nUN>(Vl?gn{13nsLJ|K;ipHNe72Sq?LN z_h4asT*>!{7p#rU`N`l>psRoWjdrmaC(T+?EoQBvcHy^_e;H1ruU;W79E3r4ww<&3 zxzl)2`Pr-UbzhyjKTKF7La5hpuW9sQ{8EDal*~<>uGinkX=~A(KL~%5 z?6wXgFvJ2oc-~~IV19TUn79bu@|Yrah&2fNc;5NY@V}abCI+tJk!z`Ok+8ev0fybY zV~DftSY2G4aoY5;s=M20A=0HCJ&dt=#pQMMCG%0N0!A|_6$m&nLr++AhR^zxdEh=K zy{UBvfDIy?HmuIqBa4luQjMUh?(^L%nCc_x=~>t^D>jVr)hxRH6n&L@`;0fqr6MJB z(bH|ylkxA_bh^uY8jex8F0-4o^u)9 z5x2{i@L*PePa3!!II{0wG>J6LTyY@9Job?+uy?M zz5@-b=9{%2UU2IDUjXRrBEV-uH;ed(H&*byzFnJ7$-f6~Kgvz}xoCM@sv>Po79R!HRTS* z?2Zrs`9~1_W_~4=nuH+cAAMRZIVt@Ja91`{%1xyeH&rk#`E~|V2?pb-iZcV16b5S% zPFC)=lY7v?GJb`k-}*8P`#$EB>2H4Zug<;s-mf8z%@pFsjxq{w@9$$2b_WM-tvdxU z;|L(T=*S!F)Jj}Mzogd#0^PWrM$qo({Sn4xCQ0Ijz=S@8Oj_vS?o-?dSuw5)*M}gTl;2>(*mqG8i+(8;*8qb8gl2k9{ zg|dSfY+j2 zTpnF1m!dBpd@c&K82_o^U|HK8F_gJCF~~C%i0nU12#P~B^V>z;&FW?`^_39|cra&U zVPW*|8*|ei-r^|Tg_$oUF5YpJA#S?%yNRC0y?8QzJjc&^Zb;b|oJ?Xtrh@KE#cft; zN=enM!Kz2VdM}G|hjL5YVUoouv@#~Mw9Y!#=2G(2ir7&U>sfQ}O1Gm}xA+)Ret1We*1!U%@_8%}?C9O%>v`C)(@=L25 zul-~)O3X(U1B-N(6zOL&1D}1`kNo<+;x7vM1^2lJ?yl${;`x2Ej5wtO3n}LS9@_moxY9$R3Xy)~2bJdNA^4#qWDJLKFVdPcYxwMfu^X()kqI%j50| zFa{a5e1nbW^o$JprPK-|xb^u@@@;4JL~}=vl$5HUUe1TX%>vU`W>!vwN(?&l+(8b5 z+Ah37s!B4VpP41Ywrz2l? zBD~%-U1-+I5CaK;l*VJ%x%I6_-Yth0O<7&BEX}{eNKbdKthWRS2#r)oT250*v~H;W z9wYV7bzdc-N%=}ZPHbn?x4S$56^_oI4_D(Nq;@*P$>xQvUlnEC>E24=hLk&w-`kx3 zzKG^#6RSwU_+wy{$2q2+S)7)tJLrGK<&;hKo?scc-Y=R2bC+aV?@h0aJ_-i8nm@N>EM z5Lu>Sgb}PdZbN=L>OnfNF`tpd150M;HNL{NqI^PiSZYQwt0?0K`C{;4>uhDiLBW|x zJHz!s~MvhjWIEmP6z@Xt5F#I7ym!mt1qM>T=m5Parskupr8u0@auF!u7Dx zuRd10?$-R6AorR++%KO39BgIBadKgm9GLa|qw=seP#{>kCGOY51?$FRTbFk>lM#Nk zo;Z5^t<)?Xz}=GBarQ65HbICQ|6J_F=n) zGSfl$jPy>Q9Z(m0Q8?-uxdvCgtPe;yZ!WTKeLNy6Fx8*te%d`gbhvM6w?ogU3k($z z2w>L>V-KC%P*q~Rg^Y!)x2PH*1rFv&EZN}U|6;e|A1Dbeb8=i+ZTmIz`z+_@n=@0R zf?Cet9c^0QuU~tz#Oo;De6;xXg6t|oRv5DqFGzctt6GH^KKJs0*Nd&UxypiXEwmU^ ze+;vzia!v!mrhN8!_SQJwgZPfhv(TR!k_FlOW4W^d=Q<3$CV%5Zm`ByOwP_|G%|G5 ze;~m=&yVnvDHACt2bncM@NUIcgL@+??4+#AnNmplFi)0EVSIW&!(@=*+ z={A>mP|9C4y}!~=@sX)}7mY@fqTl-P+&bDN^$g}e z6Fquw?X7fQN(=$dFGc9w2R$->n_sB%wOb$~kW)%kmFHKPd3I$RJA%Pc_o5_+<FQ z6%$|gCUt|~Bh#kxCbkL;*5AHSLcPgAhB4$=qPuetwbiG?F;l%yobek@8NeORmAmirIT^wKPHpL(@!j`AX_(?GBWthL6Zz^ktG4nrHP$8u zJl-GuolM)LN!r>s+622CA2f8l;d5ff@gLerELzN1tFL?2Ow)Uo9m_Pq4zv3FEC z+BjAItt`kPR^R<++j@SC8~@3=ZgtF#%E+D?Oev8Gme+T3C(9h=jN^&c{)OcYVvyzU zG>mhY)A>O7#e{YBPd1msFu$*Rz;%K%gc|}9CmZVH0Bs~i^fM2&fP4m9nbo37(w48) z6%?`E>Hgpalz&EhwfoNI2mG^%TWZG(3(={bMVBa8l$Wsktsf4Cd-=tP^RbieU2Bgs zA3e(OVV6{FGs!bhb`KMMHcs^sWCWu2xRjDl%t^tg`W7zJt6t@CJv+=IKn1%u)ST5?H22avP^vTUmF~ zW{brU;hV&WbhqV?+<514}EVr&3BdbzEyK$jCdlztb~ zxcketY_M%KL~k`{O`#?~Bir;GKWniFDE-u0NwTf^q#F(j#4C|uj<7SD(=Ib~TJ?wA z!f|&HX(CcOr~c>r0-n%ful^46cI6T#SH}+}hl$~nZwQ6P1sd|*FVv+feB+i_Z#h-q z?@SwZtyMq9-c+iHaY7~BZEiAGY^Eb8wN>8UTKfJddelg#LRLc^E2Z_E&PxL%MKe6% z9ACzF`hmR@sNtwQP@nA^8{;T76v&%2JeT#7O&lgMUsJRZ|MdiWDIa3h{7SmCxL(@5 zg}Z3%mmHtQ8&xj4Bcm~4hZk43l~*a4f1UsDB)RS_9o%$T>F3gmwf4T=po^(r9YNt7>Bl{x@!B0h78qTYlKOwHG?LQ3yWD+VZ1{*haW_ zC;0wuTs8WAK2=2PG`Hq;=@dM7^64m&_%uoADDN1&dS0`c%a?*Oa2!yYkra~5m8?If z(j=Nk#l7_`!EGK`;9>YYCg#mz5c_JYoP`RReo2nq!KbboUJxJUfFZb?6u3>Dh+tTis5ptsCnr9 z{kt`|aCBl&cy@_+5kc0x-F4B|Z4L7en5(wan(Yu;Q{(WjGpxwSJB|7PDEKj3_oo36 z*p^baI=>=u*0oUa7^dh5*-{!a$)M4*Qs6k~{#_u!u&zo;T+$$#A4~gcxYYz8)O-X> zj&PSfZGK3nqBB)2q3?jm#v}JeF;t(X-*iskBG0bU`uO=i_5H;(LR*^av{H-KDGRdA@-HrImzTLp?pVXx8$;NBD)M+p%l-LiA2+1J!t;_Ev{`13`)(gAHM`UtW{=uos1IM@t#aoo#`8mCg+(~`Hu7&Ti`hU8sDO4KWmrN za-fq2j@q%J~32e`SPX%1=f%z_vielK?B8iMyE5IT{^ zg`&Ah$llFp79q{b0^hlZ9%#3HM63JzzU+0ocjU;Tw-<}+|BRQ@tKL^lN3a;-l@xT*b)((At?tRRIqBW;Nz&u*sjRVVIGNd!oZHVt5sNwx&w12@ zB)3poV>)$pwew>-PIlrOW5mvqPM4zXMyoGqz}e}TbV@k!29#ePq?9*qP&BW&dNx!d zkUI);H$2%Pdu5v6Hv1_~bN~abPOEnljixM`gq@Lj1y{t(xkBX3rr@xOC%hvRr+k+U z^%iOkeY-Wik+Y>zqHpc;j>-084c(=9NuKGHLsAfD>14L~dn9C>|KEG~b?=#%^UpaN zE4!n~xljB!AI5Lt7*B<&k{vxNCnlerWo6cA;>9HDRIkumC)HLr+z;Nz`vc7qzb-|v9+*lS zbp#tScol_JO@eSre@9@+PyV_cqTTwhdEvTRB98lhATxyRz}YWmrM!2p>Nj#W>6mT@ zkLXUimLK8kv187XpSGQ+Rfzu{lg2Uh@d+gn(REtdB$1-__tUIzrJcCm14~@*W@j4A z<|vUwJ)PCLYc(EtweL^L?_CdPg6Hkd#%ORg4hx|PiMZI!D5v-Am1;3#-O|YKHtuwo z?68e2+rz~yiAk(3PrTU*^5^3rfACTVW(00z{hVhpzf-mCoRfg)nnnFAY zeC5;opTlcBZ`)vkUH;}oRiqwdUq92M{z#wndlcjsy85sN9BSuY|8tllkI_ayLVv0j z8Cg0^a+BLOvbx4XB>yVK=2~lt1So8cH~i;hb|`b@F(aN7Uu;8jFQtuG%?vTr7b_ZH zD*L`}_t3&a7^_vw#fp>DYy4U48qQZVxQWbX7!rMdz;=o4S-0ZE*=y*7VcQb@m(!>i z_`*Ui^(o%lv!SQ;FJ{-*kl@k7nC9W>bW0|8!_!>fS>JN4G-PsNBUJm){-8DiTYU0h zy@5Uf#|oD>>PFH_V1~29Ck;=hLw6H}Ml!J*rv4*_7+ONeN6umnGDMf34FA@~<*L>1e*S_o&OPAD(xJh>5v5890?2$;C+s+@ z@gzNbvPtz4^=9w)lr~3JSM3snZrfj*jP0`OVEvd+WNi>H4L=|r!+_n+%+}lN(`qQ3 zTOTw<>d1E^C-Ij~Ab5!rHDy8y$L>Ah&qC_&pdC~pz3N={ValuuG&d)GJnuV0GW9+t?35cMpsgH{Vc)L^5{(Fdm;>)_8n_dX(JNfl zEnpGFENXp{9m?s*U&v$O#IAeA^DuPPb_E`sy1hR~f>c|7Bbp~HMS1U^@chdY2q&2m zZi8NLTBiqX9y-al@=5R(v90+M)i1rL{snuOWZ#0~Q=(&+7=vT2jo6|dIBvgNIC6^9 zXXD|$x3n7a->RauWeFpaY6H~_4-8+PqXEllfG0oqo|9MpxL zbR$8p22@DNs-wL*0O~sepq!T!Zm@bK1R@@pBbLeTXHz`O z9wX*C@WdF2{liTz@r^Iq$0)^-rU{aXlUSEcwXIahv$vXXe0*DrU}~~xr1RW2%u2Co z2(`vgYuPwTs7y?gv5UU69)T=)V8ffs48EmCYW!MiCL)}yBu zF9tyw#kYCwS6M_?uGnc`gI)>JPSs*n?aty6{xtXn!dLvh&G(^Cy#T=KQJ;*P;_ZSl zl^T!Ex#u=N#qe#kp)mECNo`rXy9dF8xr2%76^p*_r(7O>dRpx?-2)znN)`^crn{1Y zYiLF0OPBy%(5@Pe#Ns7xdkEZuAG8%k<(Z(+3$j-0x`*(-=7#uUB)hPPV%9 zt#7^B!~p7%i4@?So8zXj;_&8c%r;L$e^g%bR$gVkRL)p=O)@x|$+7H%Z{1g`@%9jP z2DhsP3Q2Te!j64^Pa)u|)(ziO7cX9WR~x(KSKs={n%6C76=I*?*3ZBGIVnA+$$Gn_ zQuO#6{|od({Xcv`*4q*K;h|Zw?0dJxXLka`sI_=X-@j>T1qSu}mZWY0Ld3r@!bO@m zkFXe@2(pPDz-$z6-hK4Pn31P-QdeU0KVLNh6lL9}10dbBtrs*v$GH?nOgW%$xW;!)P0GXsX!QR3&_<}!e51J;8$2{(@dbHzBA+B7j+&VG7!#fLurOM~ zXqe+8PRv;PLN`rED?q_1IN4 zriSLfhj;_in^VV7yr9Qa68l<5;i9Z4TvmkLOQkOiJdByZ133iLKlM^{6$!czM%~|S zg9B*27)I+tI?uaRg+v3{Yn!`-!@4qQ*>|<2Twll;z;Ao;x1sw(+0cL1p3)*H?@V{W^~*%HRj>S~6yb!4Ztn)0)#}(G|0SYb)nBN7)jTuJCpP{iE%B#}1mO-`G^f$cYQxJzt~om5PwT)f`eO-d0rDL^nXjoe zT1X&i+*bk@{qH!jq_j72!>-$sv#}dIDzmsm-&Nm|v6##MXw8_M-1~J@&i-nU#4p;Q z!VP7_HLI&28S)4R&S-C41?Ed+FCjNQ$SjY#I4}LQQqUG*y>ad1RbvLX7i#H@s@Etm>WLwk6<6^&hbNy~^W)S;%-d{^g*P$Q35 zu`wSkn$2)&0qC^gwYsPvs%y2~0JWD@afe!e8Zt@}y=-i~xBvbypkCA_uzC*zr-WHJg9kRnkRbC*)wMw3Fmvlouu@5la~dZsg}x9w8I(g zBRcK#`1Trwd1%pZg>2E(c}~L`OVg|1nkJv^Tsliwh~;`SGjwy~4jlf0p1Ugmf%?e- z{F-C!fgp;CCTk6avv+X{`w2WV?)8l1e$pLjb|ydVD|elE{FzEY;sGw^Ia}J8cbc31 zBnNq6DBHjZRbN-L%K_(JNhGqcIi(IS2IgQsIQG%GX3}BV2759dSYY-fx%DmK&tt0& zm-)|kxFq#JqG2ZjUl6zY)S$<=+?Kv_gPqdSlswt_m(s=HCjcN5*wlrkg@NX1yuU3- zU;#P@KcaD(jxe;5r}fBWu32SW>GCgxwH$?UgV@)OR!c*}&%db{$aKcqk0T)6TPPOg zfqvsE>H)14G0HmeMB-mVcI>4q5&>LRYh&cy)B#s|KL8b(QeLglSCLt=zcb#`Re`g2 zZR%Pw-g|64QBB6wy!j(k@HRQC6SXV@JC@|(ugUOzb&GIkqwh*hdbHoPbhF-0va+nK zZ!#>JV*5K8OhO!CIB<=*lxoK(c>eCU1r3F(#;evj>1q_Z!xS9k6cR11^9r|WD7dfE zCD#{)1vZ(rhcx)qdSBAGyiF3Rxp{tNx<}*aQ-Akmwu1?y6OaAUjn})~zYUjeQLo*z z|3JfAYrT^EWq`_w`W4Rnah{D&7Ski&Ta6}0ZhtH+{0q%&&62E z^6)lS9+zgw70nlUf*`9T_QsBVYnKZDO^5C9U7TI!OBv_KRZ8U~VDOO8k>38@W|w<% zDrUPZLQCg}&~93_uXW7gM1r{VYF_bGeN)hbHj>nX(^8j*3R zDlby3k&K;K=}-zH&Hy^K?<;mfdvx~ja6}BJ_e8&TA%KlM**KgT>@DY!(6{-6CM_tO zC+N8Oh$QprH0Gb&iQd^=oXGhhSwoEv!>reH^R1 zkI&)-JzAYTGo+_ZYIy=1TL6f4*q+Ir8pjiqTdZm@pT`c#E_<3zcj_9U|FAvc;p#=C zj-1hi#=@1yB-nnSH5J_K3*2)pnc-J*`a8G!n=bDC%ls;m#D_wH(8Txx3Zl^a(d;$O z{rFtfrkYgrP(w;Ya&7W%%nrIn@Rh-5;fsfXj}avljV5A8JQ(xImG0yv&GRr|ZBEgM zrU^H(TNKZey66LCi#E;!TKPs0H{u6}pNZ@WPihVgtr)n3ZM_OT#3#mIr(3)|BmJo< zZM!(l?Gd9wcmXaj&aE(5i)3s#{R++>{*&Zkmc+ZtC2-1upSblZLGIS|nu0IVqt z4QHJ@2|SjimFWn8MQQ@u0tto{EjnIK9tYz(bTSWSwWe6f9%Rh1CR;kv|8jN<{$_Ty zR{qW1vD|CQM>Nmx160W`u@6gMrM)eYf7j%O@;5n+oyl&pC)jIJzP>dQZmWD>7ld{) z?hAvcPRJZCKkw``%1P52>Jcqmlz8SiCya(EJ6*dhGOTcyel~+_i zd=W3SN?*x1W_@EL+Pg#u`aED8ZGP&TdpR=M{wwgT`#A?mkD_&aNsoW^Gj~&~(TK^l z@2UbcE62N6uaZ10>fiVniR;a84TwFjn!&_=^-Y<)bQ8^0-ZfJ;@pKBiZpucBt0;+& zI^9$$sOM~@>6h)GvPuId5fHL^Qaq zF`9i?_n$bPbsJnO+z!$-y{B(X%impf8oW}xG)bTW+58sVZ1-HO41RbvV@c)AwD%FL zQluYY>oJE47ECH*o1>nEm0qsv%A+gJ{31Fggo+F!gxH#EcEX9TTvoK8M1`6H^E8?J5zU9fDJMmCHT#?K?V|?c%b-8zz z+Q`(rxJmK_XUlprdVOA^{4UpX3DNkB+(m@S>U`0XhrZCtRv!PObS1iWXQ^v4BIUg0 z3w)^PK=s1fkI~{oPp|qn{h-ySG4x?Q*?sbrW!2aO$kt>uf3uCuytA5_l{@qc#3b0Z zP$8`gC}kWhhQ46=aK(wy&|D1)d^FpuE00e3(box4wwL1wo3YQ8Q@ifC9X3x3dy+ee zFTNCnjYOY+>rTI-S&nWII?3?9B(ygi2X38wo-xk}a8S2gS!e50WuXy-kuKec?ZSiZ zz&1T#x{y&tBs=^tfKjh$z?tPf&c)_=h_t>=TuS$KJ%1UGR2mzGb>z3Cw8T5DSI7sL zL{MGSjHNYnofG8boiAUqL8jvCkHz3L$y*D)MG^=TAHjz^AwpzS?nyP9cM{ALJa61K z|1x{a$&%^G30?L40P``WhjfMmJJ$8d2lV<#C|yg`;Hbdv4{S7~_Ap)uMiX%7SS1zb zP84`0u8pG4wyyWeh(K0xDz)jsC59a?mfdw!7aiCGQrMoedh_HYtHx%&VSkfx6z3(; zG+;>BfA`5IP1}XA`nAx^G5RWvOn**Sy4P(!{grb9^?--(9YSRVYpT^}>%qYtheEsD zJX%luO>~G^36q-JuAG}VVo>6hZ`!^F^o`w{VQ}>EXw1XS7t9W?`gGr+BHor(UD2Ry!tp#%*XP;;0 z2{bk(0gHi+PJ)P%r$#{qi)9|y1&(I&O3NtU$u^e38iSJ5xpOBHoJ1n-I^Szn&k=*I zmMi%%SUH*cR@a2k-n+4`h`#QJ_+s!{iDL4V!4op&7vmK}h;I^n95A*nvgt9E(mC?z z@?IH&V`@EZn)@N(QsmszQc8v^!HYbGW~?;wSEQ54l3LF)r@HRls}U+5(!5mKvM}t* zA$DDxJdVe~o`GO;Z{8IblD1I zq!QE2MX{Y#OL!4?$W%;S)U91?CMj#^E2rxLkg@uBMC1wYqISuF!J(fp2V`zM;xCh^ zg`TLok}Q{!cVLT#>N`w)cjuqlO@P?0d8{gk*4!)_^`reeFzAHg9rW3l#_Hmi-TThd zmT7HPdu8rc=nY>dyMqwV&_h^y!8fMxA!xX2VQWA#+kLARK{%Jw0e_thK1SU3hu}ne zqltGV(VuqOz}mvb;boFqC(<{GMQ*Y!D}1$dR+JEsTCmm3a0oIreP^S$ih5yI*!SpLf|#zf;(}`#5dX>!g~fig-{P z(PYPk+3IzaS2hl?`ARyK){{L*QREYbDQefdCw!&5m!jFJ%IDl)eK#YMv_A0#@!tIv zhlKrnoRdkbZm_!vPhLx?D#t|ClEGfB9D#e{txLKYestd$tSRJWq8c^24} zLq1IDNgx&y+j^>@h1VWK)`|u#Uh0FneEY3$d8Fp!houZx`ImgtbOLx778|ITcfV|Y z8LaT!I`5iVSNgc(@j#S1z)9KQbd?zs)&2Ya!w(5>HNlap(5~BpkkMf05R81NhTNXE%a|set}k+!%FUh$D}LL^%a_A1N=PQIWBP zTR<$uU*kCfJQh>s@p_1aD=o|H!@|Rj3%k{n*;+5cG*J&Ob311Nst?7<29upeuQZ0x zFPx1hDr0-igK9rPD`LcU`t4Gll<-E+eLC*fWNi;&_3cvgy8}vLkIfNdoWjbD{bfF( zCIjCU{xZ||*1SB6$1{%12Roj@I&?>@jOryn+ywa&a(ZFXuRHA^WCt~d^AC(JQaYF%;ORP@DGQi_iywvLnQwS(4?c5g$} zt+PL^5`XK8>$`u^=hSJIL8pB56#PUnlnm9zknVlYdEKM)8!IAf!wU;;h)_c-(Evmu zpPpd35q5D3EbFC*CI>@LP}$0a=jE3@J1$_T&ll|&eE3BswaGyczf^W-vdvIG4+SS3 z7gub=@F9mc3dMRJ-|5qo3JL`JS{rg|BY&})Rg4-gW%6X?h>4^1=T8w)QBh9FC|DW! zwbQ^?Q^>pHSKJrfc&&o$MBpwn6DCiz%kT1wE_r(KF5U88yxZcuan%N0^ypXe(}Hj6 zcbk4qu?a|GomgPmBL25R={+37;g3}aIjO_7P~}x1GL_tt57qvijR%Cn{ejExGli1v z)>(A@wUu?Mp58-w>&2mK>>snWX=hIL=aC=?xwNT9^dXMz`nI^o3*i^b4)W}e#JTf( z-A=d!Bf@3PQ*;Tqh?~P;4>^|GR7ZxaRXzxrllThIO!PaKCA_Xuz2^yJCHy2p@WiE) zoDM=4`Nn84&PjTDv}+B=k7jJ4epoR4IVk`0UMhvJH8D<-2l%OO>O%6%IuI<`nGV~J zcnoE%8oighf9guyE`6K6MpRp1*;4kM>oCc)*^%`kWMG269GM!4=WL)cYVMGjhQXzR zs7dDyYki{h(%(R&jge}O1D7e1lhgz)XT(N?-Bd^Smqeba5HyWz%Q&G(%__Ds1X$?} zMw6HYD(wGIJx$v{@vsPp7_K_l@mMWdHHa&Rru8MLCU66>r82po*^wM8NCLz1@Y0I8 zPH5T$6`;>S{vlzRKlOv7S42^q|r!)_s&L0b;9qk)$0 z9BH?VMN|50VexLxhR*oZHEh=G?#8dBE{)3|M`WIrC0FE3xO13}$A%;}4L)eMCc`qt zL6g!+$dCTaVM3jMmSiQ<1+(DRJL@!Gz0b6&O5sv++~0a~k?fZTtHo-u#N+Gr5X|fw zL5>*Rkd5dGKXX}%12mg>xD@ErdB`l!NM{gk<>J!y&d^9N6*2b2M8j<)S`yQ<_ z_5+_(wv>1^Kx^)!E5B;0wVbV@vaJR?$1T#&;aa&ITXg|HZmSVZ7f5;03mB(7LBzp~ z?SAH`EyqVoO=>-)E<C_G8xC%pYmppiHo^nLG@ zwq3hXplU)tLt_EWb@-s8eYP!3rkG&seoYTiDW)xGN2jW@w@BVQ(P?LNr4f-IGmsfK zoidT|g#<1745Wh=n~5cohKr3vM9m~<7vT#xl+kNggb<}8dH@~c;QeB+3H z2xRP{BHT*VNhTBSmuJYZ4letjCa)(?P1K8e-;zE#A(pue--}>7acEvDlV+ZYklNjF zk9%j33;P1x4(8WD%~6!vjnI=DWZiad8HSq|!VI%?V8)yK*@%?7*)$>mM zZIPSloJt#i1kkQBx5)m&&5LpH7CWl38un|7ey)6FWgH~8`dD&bGFc)~rIOUK@=2+7 zJO17iMW)yw9@z)31ibs>eg)Yhx6o9)hkX z+%Xj2s_1n#I(w`Qd(3L_&o4D9sj(&%?+L}C-}mr+-n{o%B3<*|SeVeg&3oa^6!38d zjp}2Gpmw7V?;~U%wLQ2yLM;MOBmOe^B<+Q)fL_Yp{O!%4da~V|HyN3N!DNk8gu^oR(44FpCbsr(V z2&WjfiSrH}q^x1RpTtjpIDK(@GiAh@v-8cKJ_4}2_BpDAybl={(=OIDBCs662aykS zG6@8MV+8gALTy|ZRvahm`JzHRA6_MSdlX9YTR$X?+*o6dzNp=4+(ZLfhLOtATY7RA1&L{T z%OZ}l+et&|qvvgD3vD5T^*z3dAFq!x=}(m?Art@0fyflEiEx0(4;XOx#_39XRq$wZ zYCD$Sv&`lwn0D^B({8ozRjkxe)y&H34#%C>dRc}*TqD6WP{rh zP3>aUujPnL4$$we3iw;R4Sj_6@x9`je@$_qQe7Nc7@uO_CQlA?V9z$;kh0P;X-%#H}IiDvRha2c)gn6Li%jzwk5 z(FGbvT#uAp!^|*h!IK;!WO@PZ*#Sv%WWQ0FYg-eT6&|~1HLqmp+vjBSV|3Q(@Ah#r z#0v(N-1^b7`u#*;lF-=+W!E|I^t3Pcy`EAZK9SsWX>W2aWREsgF@XTC;Hah;60Uy1 z&B(4mNYP%(=cpyqbjMYS7GEHBzBZIeie_fcpF>+7CFd;B0b_NNiJi`o#JAyX;07GxxB z+%PN(%>`Z<;jnTN1mQ{h!ZD_?W}|Y` zE@Ib)WELYPHG}6TL*a0=g2yr49fom6zfI}O2cTV@jE4o^46S4|Kw@vzE9=+A-+msB z73fGB!d5vrKBqWFf1(6G!>u1o_XMYngmR}87R3Z=pfrycFiPr_W*=V+el@^wczLs5 zb(OZmokDR7=Hbi`dYq43Ogt$eY-cqh3}~07@I0B2yXFg^^H+U#y2Pf07C?@Y#i^pY zp{f_5OaU3?CYl=sx&>28&CPV==_nah#6$n3+^mycK{g9k$MdXyLGYNP44wYhzKWhY<}M?j@$EaWw|g^r zxQdWedZVe%dZoSHhlBd6n*_7Krg`6DADN@Nsys+V)tI23pqLD=K(e}5yKMhKAT15c ztXZ3gk#^ZPd$E?pW!kehjJ>Y4tEs8P$V!iT&~h6`n#G``OJnpUiNW40@r7mV%?Gz`O%-;BAe>L zi#ha+lP0fQo!~6Kzl53)H3O`NAHDz1f+ZsVxTo#KJ5gO7+KmWSt*-7k`mI-e?(H^wu}MgqqGIr{ z#1LY8Hc*T`EFF(!wmf1e`q(I%CC0C|sZ*5}%TYyIFim?bRL@^!(}ET z-mk?~MC}#k5#BIxLgU)+?^iQ|%Q8>;ru)?`jVW~22lyr&bChYwgQfqNg5mb%3U_lm z^T#)4Dkb{r_^Dhw-i8m^Ch~ohgrG(Q9Owm#36ej;^JAH>g`m?2qDw|28 zkSksm z&c`4TdVN%HW^=?N-f!|Y=C64jb%`)?cQ8Z&?%KdW5N~Y-0 zbOHU-Ntz`o4=eW0$K;(R**VS!)+b z*GC9tLcD!2+|M8q9p3g8&dO-FZN?X+YO2uh>{9%C&s}o-Tlx;>y-QqOqhE=Swf)~6 zGPu{lRss2w<6pm756NLYP5F7kAhpPYzNr04vtfH81F3_qfkxNGqE6>lqJHVW6pieq zw>f<6{l`$))IJtv|d#e_KHPVEUcO{CvI*8kj9ICIW1ujI#d>I*wh87h*gSy22ssb_$ z^LC{qT;ca-$ndtpzNM__IJwjNbMOs)f$Kzgg*7%hM6I?k-DO5wQS&g^xXz}2A`xDE z0%h_qLCqV|CM+Jbv#L zr2FGP3Cn-Cz|i~So8~jLz7mu%GucJ zi~R-h<*)B~1pmn5{@0(=ao{#sMixH*Kl@TvaZ`Y<$a~!WuQ&gnm+qSl3^|1_|C3q% zuXiiv#Y-507r#?0`#<|-E{NLz>iKE^KN;tL?Hx~qEbxfO;X8Hl{~4-5ByK~5VBv%R ze;EILkpI8@X%Ok@RXE+>)^Ek?iY@kR<9rKAkhPMMoaSt;1P;>MHK0a-p(x1dfAY_| z&zHZbqkvYpcVfGo+nTyr!}nIRkpGe}?EV4yd7g&rH)TuWJX(!6{@c!{ zaN#r@8LIQxGoA)pc#h+yyek{H!Lba*$LNlIyWoOeSl>b&BrOZt8)iE59?$)-0Bg*(S z;!@D03%Iy$DE9-%!^)*6D&Z_Cxtxr7+!7g>F76QG&;9;OAmo*V5+ZT46-O@$T{6V^ zOlTHvfMGX6L(qtYQ8L}=KM#7Mtoai6k=|=yDz$1+Ar2$cA5*3cJk;?}l^K@UDrPHh zSx<+CxT8xZ%zV%OC@5v>u?`5I+q#C|c+I)gw z3-g|vTNE`;iSyGN<7d=Vm2{np+uEsS9?ssn!U4KO`@C_YF7kK^njgxnp1F-TNs=4S zOCt^<5^B9f8P&XLeY{vs{5hA!OdBjEcXmV6S#jldJK(Tx7>?&T;H%8YSD5pq;}QelZfz$Sd-k>Znxc2&Z^5jxWhHTz)~aj* zlT87!ZC+0m<-KmST&OLvtshQLO@%Fc;t{41DFmT>$Z3aGfUa zue28Hmtdq_R}HY;nH-SrUE`dpuE~AB`Nx>$qDjaqu-^J|OdZ6M{(0VGElOc^t02US z+Q-Y|*DXon=2bB=t|xk@!#F{X1zuouKtB0!;@*c({nzZLLX$WMUIvA)0AG3jRhg|nTd zs~w92i;m^Vc=S0s6fDKrDFgS!AzR2#n;vk+ihhj6aF2eSS5H1Pg~s_DHH+q!Let-5 zuB(1#4;zA_;~bR6>^X>dn>%tnSVC|kC&t}bON-SVIR>is}((tivUx6|h!s zpgFp7l>K(%=c{$UtMwQWZ1@o1q8&h1p{BMU@2$q~l!2Yd4+%0p*qEe?Cni3|^&5bj z{B|$jtConSa~T}BTw%9D6;0$LGW0EOq#`R3(kKJL)2DzY4THtQ^iznl=YWv}SVOnU z|IbaPefP%X&CQndI_2Tzl=G$DDQ^BaJIg0P>rTfL!YRLDE@m?>XCIE6T_2lK!ezd_ zNPcFwPAY$MbigRQfg2_g6VeOUW+MeRLu;yz9j5>W^7SK8y9ynlT)a zY@l-0Oc9uovVROkwS}F1aMGK`|fC34LIZZSjh2BPmsVbK?iO7Z>oxA4GJ? zd5z2UNrrIKa*=vKNiu)qL@rY+#G!6O8_E>ZKvZeUeU;4}pPC6*506*NsubdV$S~5u z<@L~p50&!Tp(rut3BP~N3&nTw&PB75MpU2B@>J~=+?_StiICJCez|8%HWNl4l{*LQESC*iSihRD#cG3g zG~zU<=TGfv3^heY+<$YnQ|1AWxOm%PSEBH{1+e!C|NO?%qw@Dj8?l`<5Ng#W{$@Si zxDYoyVg|Pu7Zu7{`>xq91DRA`FcxNvVOC!(VO5U?=9rF-F4kL{NyC36-%@!`8`d}t zt-uzySR1i#PjV7ha!$Ew-)`DnrKN*kdhp$$Y??SG8Nw*%#Dbxx`(K+Rhw2?h`CR+C z+qpsYn#@fhR(R%PIm=FQ4{wM1cbTQ#?>~D3?k^Wp?dbK<28{%UNlPGMLq|shxBcL| zDt{-1H^Nh`B!g`K(FK=zZ-$TH#7Q2sALq?O{g>I9&Mu7Gi|;aO?CUb3FA-D``7Vm4 zkF$kZv%dz3kldu6pHR}S;K|Z8%eEijkwjQOl{n(8-Bo{IVv4&8Yfm=oY!&9}bB$eK z@HI3=b2;lkYG_ChB1oRyNhk!adwKt04((>PO4(ZFp62NJM8Rg~kbu*mlEdV(v<>E? z$*y68+VO$zO{Sm>R{q)V8QfOLUIwS}QY~Z`{EAe?6EkYE2~6kIJ7^qb@2_&v;D-~a znghR5Tb_R9>{WeT(xWa9EL43y*RQncP!#?9>5gNxPUyu-V9Re$k1QtN`cTu|wX8Zi zV}O5(s*4X*Fa?+2X&5PjRzWfS7#a5o*saut*7bo9tewoF88V& zBM0dg%|2*-x3IF@Vf2%a5R&)9z-s3%?T~T8eH`S6#?4u{tN_%V26=X|-4~GI%oy90-V_!mU(B!cY2#0t zr#Oh%M~^$9@a1=Zz%=c2Ii8R$(|^v+H#Z|%sAe}ds^cGtO_mjgpMkNyBKEG*G$Fr7 z6gw%O``C{r*)(0T$tjsx@^~Ht8O?6mx5AqB-)V3)QLvXM#x!Ut_y0u357jh1z$Xp! zj9UD{HO}UtEw+xFuT?Ss8@?_^^o7&Y>{7D|%%(0R`#yt}_8)Sv@)O%C)=F4iv2~m+X z`^#PG|KpLME&O4bGw#$#)~3PYg}Y~!w5Vx`#eY>T1^S1c4?j-#yE;>Fnd6GyDu0JW z6UF$Ry8F2sP$f=W-`tv@AFF~_IpOd@9QPK79c-ltD+V(F3lh<4Ho$t{wljZ9Z*xqi z>X6CxjnQp|RM3}s>y0Tmt{8!aks;kut)HzUk~uS1(p(@b_LGP$xfXxt?9rN(;M-W! zw=bs)pP5{$Oy?4m#&!#8;AHH?fTgfgkv61afRj8l{yFIPY&U}@PDya&8Mu;-ZJu=CdS2(`K4j=ZGWTE0+U}!5VPx~=JyV+|c{R7fz&UR{_9nOaEwU60* z^W?TJeMS-sB23cznyhuYXrGv1VPOY8B1cVW@ zn!@)@pxO_Y?Je7eqVv-qRzW)8|EmbIO@}w|*0T|~z=ipnKvgsz=UG%5uGplx+Y^R- z@$M)?Vv#n9)971b@*C+yv{Q}B3r!(!8qsg8%mo~qYk09gc2-R3OkI|9@z>*_`E53QsvtFzjQcd_>zY5#M9Q2y<>y;v)6N~=V5;e&%~UZqdcJX_q%anp(Z%R2qRHM@oVmy1B^nf_ zZ$Hu7yCngMG4Jg1aXYc@l=cShdE|8Zn&zl>4Edsm;^|#Ex8uA{nb+1?d{W#`aqE=* zsveX9Q~&FR!Vw>D@pVkAp~2TZ>%C{|)gb6*KLxEj5B#5nk?tRW6e zT<8_2W#$%pr23*{lXZK^>6BxtVWl?-3x(_!RX{c}6B;t6Z!RF=vef+dDUh*oAEVOR z<4(}2ywx`!yO2=PESmIErJ?<1wAR7|>B59Ehbwbq>HCx2KVF;FPIGHnmWO7$)gtl( zoPBw984aDmSonXc10?>mxRQ?wY6bN8h~yWozOi6a%Zlqg_!_4Ct)A~>eBW#_vr)k@ ze}leiRdseNOPHyh7Vvw$a?RHQhsxdGMJb}Q!$ot84zOz1bOPyhtMBiG7hzk!B{CXh zBJ?)3cE)Ws7oWqOh<-=?dbRVfGAOR+y}GRG)TwU#0ka^nwE5+iNgm!sQFi3>=f64YmAm4C3sc$((4d&Mwd9SPMy8ll(4R;PC;|{L|DnHBMvPiG; zP(*HQwxzZOI|k-vJM&q2&epp0kWs@$3Mr8l!?p9yC{yO~f8pI{9{9=*EWd4{Vh?>$2@*(MJgZf>^(tZhj` zOH?v_@^L(rqKC<6B0sf*uxSAflHW4V_*-N*m4~6?F=|2xc%$CdUdA>KW0Bi53Muvn{>{of%D*tI>^hX1v5?GyDd1Ycr+s z#ym15qMI(fkGG|iNsT>buTeVw-FGR+;aA)b(4_upL+gh^H60Ey1r!4g3wgrOz40e+ z1YclMZs80}0A^C-s~7ROAr+OEGOE-xs*sQy!(_0in6GD3t?hD_4fLcLG3MATF<#Kk zHSFdaL{u=xkn8cdW%@^69o$bG-`XsvKeeXolUUd;!k z?HmU!A{D8Bg2&(T9G5SzQa=8>^`3gj@J{LKPhZ)@5>%+Sk_%6dHC|#}cVdr5`T8#& zICD=p?=8*l;DUa6bC6v4@e$L{hi7E@s!2;m|P7(vb?2=x>Hl|xi&JO z5;25p{MKookVVd2LCPxZM?UcJ@Jp1BjZv^ni)AaQlahD0#h9+1xILo_-3l3;* z2mse6ss)=zaMKsee|04kzdKh>47aWeKO(BUU-^wT*DMyVp)3SW=%WCB7yA}5{Y&8wNiQyemOhDQ z&Y~73g!zUC{7@f8*3D$jaP6y#N?OG*BLTw@`X%UQK|W#1x3bQ>Zd*oioBc3mtGUp; z=9VEhYA-Lx+@M7vCyw}r661j}yE)jqXJT|Jc-=3|tODN+D5rfi45^i%9_S3Er1Vi| ze_Hgj2%xq(jFXjGRP^S>S~2=&ElmC4*;w07pmlJa|FmSk-R50aIFm#r*y{&_$X?6&?h4E#&2`E! z?RVQ_gHJa2aYAkvE30%D({80PDZLK!;^SQBN~bz|H|>%Em8!ocHZLk5BMz>8`>&xq zK>>epHBV{w)bl>clJ-oWtiKWVBL1*~a@vLozG$y`brx50* z13ajwN7PT%yo2SVaxaUaI@6u-X0g9Ch6stBeclHVh-wiVmK?TGfj&$iq$Tc8KV$1t zj0&n`zNj}p|DxcBG|&Osn&7FoK$kJ$yj9c7x5J#TIb^$2GV{G_G^NE`buRI`xTaLy z)Eu8%3zmYP6d%ccZ3J(<(K81LxIBn?M$`gm*602sBAeQ$`jt+Ayf z?7%|aw8Hk7%&(@r(5702ng-m~8~$K1JyJ!!>UjDm@S-fB@w|OhFnwcPz?|OuEChO_ z2aDb;Io4*&)#K93 zW(-Sxb*SLEJq+wOu}J8CI`Wy^Q$YdRurhqbmGL1jiF|RFW!p^7T(Yhw9m3^j324>j zzM@*{WjZVTHwz#~_zfyTP+)bdjFV@6HKkm99)r8j(>x#f7@cVSz|Z%Vd>X^;%)9o9!yCM@CLX?Jy&ad0dhJ`?}?s=kj1Lgv*IUw{v&v+7i)uk%W!rnJRi)z7?T+>IS&&!w`M20tre-Hb-@$R(^(=B*eUK}`E&QCeJRMIZ`E^aUj&rXoKJ86_0?UoXp>x@n-FC$%0ZT;bEpL=pLpPG&0V%@DN;o_JGIN_0?3*Tqmy zl``HZ^K$Tcm3q4%0qQ6j7ErUT^&C#4GKP6~5df>We zfss&icytXlV~eb_2(3?FPl(e>?Pd&V3-WoABjk9F&};l{;c||1Yzkl`vKk`t_ zY~&kzqJEFL+2Zo-!Uw&Kc9)uwDKE1 z8cJ#wEcvZJM_T&Wvvu0P_9Sff;`{rsPU}_f5)Hfd9y307GWus<$W>F>NgK9*f`1Z0 zMMt=gjBqW{U8Z5P+ZtL2;|Y`?ud?`4{?1`7*4S>gq}^cyxE}cg0p;yQ+pv=%3@{@3DsuOI2fvnz1=$+!oQ12|h@}~%I03VYCsve|; z!}gp7YI(;DA{A4jPe^<%3C~CTo?KNm*|Mw=<4gFh(qu3oLxh=_BF?l0rZXn2z*ilB zB{ONTb{N zPA%o_o?CC1NA%WJq*Y1K9+JS^k1Y$z*IxlEY{T44YmuVH9(2X}(fHQPR zl5FAK3CB!U$H}Mn%7G2rLlj6iCu5VNRGK# zhlrV}D3T*KJIE9Zc0hjS*(P{9qe5Mo4UDy{#jr88M>t+|BZp*>4>Ztg;O)2oF=*#k z=gKHKqq5pqc=!9Mhiz_0A&=mkXl=Je2KJ;As9})UN`g?qx#GkK)+)i z!EJg$W9lu(PEHyhy#;S=IY)AX#Ziww{=J5T;4_UWWIqbiPsKHeHxhEgYqHui6!3jS zy8yld??|O){8~)TTdOrKIj!ZPUKcQDjqdsxq8$f#b4}yn zkR;LeF{2PeQXd7;$FHT3wNC4?-uJlm>Rp^tg#kI@KDTOYvQLwKfpWshT<*cp8sN-E zV&Zc&UsX3ys{4^|k+jj5R!C4Y77|EfM!zvi8rbIuE*T<9lYTEn~S>+-|ULEGYXy72^~uVc(I_9yTuu!D0;S0{3MBF8@> zKYEM?n_9z6kuXz_+0;XpmVx}UH~?QxdkAJFN>uWJ`lRc1#Q;B(carqX3jjS>_$sWx zTiyE)6C*$@aLw20eDzVQ+0zAXFJfw99AMX+uZ>X(@|6-3Xt(djFSsrc3)8Z1SqeB2k9C^u_P$I?^LE-cZ|>$b`C zlWZn{%keD6ApkUpj^@QMiJ(L7TuvnX9OS`_1xlM+{h{H91V^1*#F&bDFW*VxjPefU zn@x5^<&J2|QLVelC7$vZAef22kPp$?x7S_yDc4wED?pOfL~I&aQ#WGfT{{TUb<+ z`42rcQ%j&JPdqj@%+xwN=j39NwZ`(xRloZRM|q%NJ(?r_gc?}0LcjXew;QZcHJg5E zUMMp+`bm#1RP=(91sflz0db9TjsS^5ob1#veYc_5YSBP(XeJRo#5}O3!CP*WkZ`x; zxSYhvASJT>mXnf@7Dbq|cg(iHm@;ornU2F&pMsum7zkUI3-=|houQc8CqAgI6R+8q zoWm?WL{eWzy=5oznR%F;@@1cAx(gu6mCu>++k%2)X2dK*t`id|liFo{$$J@Ox8ZlP zIg1)K)u*IvTJAPQzak2;6f^3f#MEnkjAA(xGpSm^$8_zECc$cJ9^9Sq8|FZ-KDxdr zk(ePTKv00Y!D-#gC2NJC&kvGa8QPzZdb%>)1_xGcNkmcXPej8xK#UaUekD7BbX1tVJk5HqXpSQdVV+Pui+nhk?x>6P<#z*~y%jHv)iUE(M zElOnu$<&ZA<8pEDYBnATNP;X00#N|3%kYUFt!*dN!s9f%D|52l3Bpjn*^HZWZJ%W& zpW&ejo4E)Lk?Zi`sYVXz85klNyhHO zr1Pwqk8zXTBVM5qfE}h zCe@_x9s6rnZBZSHl1GlKcQ3M;7{6|Z#+zj{(lPE-x2v120=$!(O5+*%2k4F_D5V?J zd6%`!jwZh8POOV<<^%q0L?k%RjO%Q36v=R&1!nlZ9iIkXSZc01SdXz%wzTDMpwgp! z`uiwQv#3~tXcNw}&1Fp)*JZAnGNKGF01Jk>!TYsk54UZ%gh$LB@)}*rotdv>n4dYV zaV$GWw%W7{>*uBQNvp|&WtlmjdQp{1+y311-Bcou0$t;aGenfWec%-e_3m<+$EGm} zEI5b?XF?BkiyYmN#d?8y9I9_}b8O7vtuq|HUiU+jPLvC_Wtk?Zvt+bo6~KTGt_w3l z-vdu_OJ=+trg`JE{5QS)O>?3?j}?@qWz>kpBmDFt8qjUytqlMMN~odihGm9U21TvQ z>q7~R#)DgbEXd|wL85=5Dgz|NrO0hr1 zxfC4NB+^hJw&>7!e_}$y?-SZ46^it(<8;na=9xjJN5AT!){$lmbwJkLHC4T7vNpSY z8fd?OZx%p0%F!CM2pc_ajMW&?;QCM2heI z&hbR8yNPu2OcNp?AMW3-?l)>HEEo;Dlar_i)fldpdH+Q{uHr_*u28(HpqdE;9->Al z(`LwhJYxM#%&C}Sg^5)mBsH5A;5S6)!GV2{t&&;_Ayvi7O|`to#WV8PU&yEi~R^NwoTAQbTp(Ngv>CJP1 zX1mp0M!u0RlMZyDM1FLEJJ@LE@+ zXPN5+lNO-LY6eMzM@aulUjI;jl@f+~$P~^pY-ZY!l_(lYibK}8`u1)D88$|oJ}$}r ztlB|HR7OvlO>oIQ6rr1R-uhjnzDMxznBaq4+mj@7%O9$rKP`N=1jATcVrfkYnRxWj z)OYW26p;jEwkwpyF2f=o+Er^(KmI1@@l$(BZ}DT}NowjWVkCOV~r^yJ2kf)@1=HtI$!Bk%Xcye<6N9x=-qndJW+ji0@ak2Qs z3cF1`m$~z-oWs>fa+B%ts#Gd4x&6^;-U%w$W_OJ-ts>Nc+WWZb-KB(+SYtlVLWkH9 zhWxyN-Vx*P011{$AI$$f;ad!1aeQ2P)FIr$O~>OAKQ7M5oRZt2x;?tyWpcUu0idp- zc7|ctLziAU-qfq3eyc4qx-T2bKVaark%$JQ6(1M9e3vqWl1lTXW5KT-viYFS&K^5L z<@zG!VLtER%qI<(|Wd3*bRDR#FzEV1Lo3$zXM!TC9$e ziB}Ad$V6x8HmVNL>e8GbxA1t@*f~NJsi@u|@7D5g_J}0N;lf?dLNeo9P=tPuIi7aW z5Eo&r#k?=?7N+G>&DW~AoQ+Tu#^pCY`wyLe2~{2QwGNK}nhKb@@)l|G$oZg_01YfgKHVtRli-O)&X1rkB{9F21s?bdpms4r|UaED$! z_p@qm#D$M707g9&LvwB`u?|Bkv?lE8j<%L24d5@kGe=_3=1K34L$3k)&(cw#kk^WbdaXlWM5#DCs1bXYD2RCDg)? zG8Zh$JtX1sc$XiD%U1|wWe^ZjO6_N*3~7tDeo6XLd`y$fNmGfb*V;qzXHgkQ@oSXD zj?8dIFhcTCu_m&wiOiq|>K+6#r#S%M0ERgR2&Zm1Hy#&d_+)3_9pV0XT2WVv_L?}5 zYagMJR08^e*7NJ~q?3UBT!o5_`9ks(L?c($=OPC*nk2*vF|G>r`prX#N1T}3o1=SV zz9s?4rjd-#7<_DXHU}*bt`5DO5yFG`5D04Vw%3!(kna1z%G_+Lp)Hdn_jo5CIV$Sb zn*=Cl^Kv9q7HWTK68Q7eF{b{idJzY->m?dd(9h@`$lO6RWjm`e%qB#Bpyn|S%%TS5 zGWlADVux0!d0mF4LeH(!L5+z4T3E2-=!pAldMcK`X`{{N0w0b8kObAZExwytw;1GJ zpA{29NWVc(uUD_{Ve$W8d*2n+j=_tP4tWYuK_$bC^LnV(kW0mYKG;!$hKNX2iNIM4jVFQ(SPB4taaarWIVHn+?!X_tY9I5 zs+;5T8DS>!rENs!^1Qrl#Lk_t22`Hhld6JH`g2h>EUJ9&aR@$dJdi~v6{N#1a`>Z_z ztlOZGnlLOmF59ZuozfithW%Fr4+4e$v>u9Huvb!&#gn`IDsTO|a-@cnqj^Qo`t!1^ z*PXHXSM01``zy|N8gLE?1f_0ybO<#2x-IsWcMf+|_rc(N$2ZR(Kmh!A&aA4n$I)u> zbm`aFg4IYz3n-q-#9#F;&wO_UD)WV_rvOrZBRW_)Vl1lr;YqDS;~3vkh_K%?#wRbI zul_8E@qc-bsletA{T*V`yTSrK5iOj--RG`50~ycwk&?0F!9On%BDrqea+_A@1o9tZ z8<|+PEt#y=l30Gmq=eI)k$yvP%(RuMAJ(>e1?=&|21WP_ z8}lNV*VcXSX6H6k-kpQ)!HxB`>}(Hjjcdg0I4yP>ke`UchxtchMwFs8BtcJ}+lAm! z9sKRSl9IdisQY0X;U>1KaV^Zsk~-EZ7F5hzS#m|f`kBb7?TVscYOBwie$>)-D*hE8 z5fYw!0Y~%UNEJ!L?vapM9jfaaR>7Zr-jIiz7i|@9<-W3lq5NuBtAhhpKDMfCwSn<2 zCPQ=K&UqYb>O9Y@2k%td`n#%ayRkl%9@RNyz0qNuGjZ}{Z z$NfGnoP8|$^;E>`D6bS#4}QEe`%#OwaTL7I7JycNPy-IUgHbuz?Z+$n|I%Q_#Y2#u zaS65drj4%w+o+Xbc^g9`PCLr|z~laH2eI*R8QQnV6%K||p0(p(NX+IGiyD-OpAJ}#Xp3he22 zg%K0Ma-iBO2!mrRW;Ez&puUJA$9MZgQv&-ft|0S z(M#%l!Y))yl8;(wHoiJ;QRtK}hP!R?byan_LmsAuiGM*)OAKiNxB0}&7sD}xpXBCWN{z9j1(eQdxZ%UIQm4Lr7)}R6d^|V}fgU#WTyobm6^b;#%=JxC-kGdjit9u{ z(Me$~ue^|<9(y3lpTA|Ipd|Kqr~e8FsyeavO+1_fmhw7e8;i3%f_hN6GZ*^9b$)gKJ8o{h)>g^);c@-hu zR=9fav^cnS_j_`wd#Fx`1?&KJ@O+AzuJ(XvdBZRSf|OI7QstKN>aROw_Z1rdD3rKi z@jzv5b<^Cf?K1vc{_Uf=J4|_UF@aMfCOI5?A72d%m6J(TxGhm^g{`nVS>tHwrmqT__%*7e4>go8dfm zrvAx`4v%^Tk9^6l=Ir*#oz8RdFr9!Z$=XmdPoi0VFqbuH(B+rQW-7m)Y5lQmH^-Uv z3Q5U8dr*mS1+v#`w=-rAIwtRu!+w<=hvvFPDsq4ND6um_e%YVPe52Y|Xv9q1H zfS@aiWrEPoT{b%3$*)>z3o+3?-AEk?&?w^-uCHGj-rr{RD4sbY&j$FR52?)MHLr|% z;cjqDmIUOVp^M7=Ti5cCSYwuAlqCtXh^Ij*6cusKBx495?%={+`b3Wh*1W52wJhE- z@I@D0_jQV$Tw=T`zu0Lg7@=sIALqviUPt2$T(=6F-T2Rsc`4^Av}*%+AD1Br=b{YO zd&60`Zx#m)#^H%2j+fl2c1-BWT&>7Z1U2=cF1d+Njmr*&!8Buaf^it z>S`icl*UwY$=TBR*{ze)y}_NWu@{$Z*Cf%U;KuM8o8>aU-Xe>Ef`k`N!{5pfP+b)~ z!IdY+y7EzrWimfMvZFPs3m8vO)#%&JepZG3iADEeVW44y%$Ear4R%kR?ee%f!F>+I z^AQ0h(`z2%)$&O2!L3@SI_FVT@t_m3EaTML(6lJ!q}IO{LaZJvLZY;Qwup{7U5>C> z@1+8I-blL(fOZ}SX(hdilF+TgsK6r`^S1ilj*FKDpo=x2UTlS-5K8ab#6d>S68T#( z_uJ=j1}dRahZ?XavZz9+^G7WQt@Y!s08vL+lIE9F8j)W`(7m|!Bi(WGDcqCMD|Lm8 zffL%K#WghBr}3Kpd*c=|UOC?nm)ah*Eaq(h*BecJiA<18=eUtDg|PiNkdpk6?d%fZxmNyy*XEl z#FCsPOu#db3#(K?6iH~7x93mft4&4)TAo12XN(e<#1lxB zNh-Qxn`#BrGsf}?Kl!YqJQf5V8_H{_^T9?xo^qh_PZN;wEx4P(68z?qY*TTgbqha2 z@n}<<;|O<5G6&|0rB?*V;_t8@f!-5m=UnEFt( z7yC+Pn=1Ke(1aK-m&cOA)MJouG9^7VxN*?zG@;cQcjG<;wN1XeYo%SUdcDEi|7xqBy;RoWy)ZC(dJY3?s|b< z-bi?75ysGOtA1=~3?dkZi#doMYZ35XTP+VzI&q$qzYTGy>(|2yXrx0HH$2j-80`&u z+Ixm+@U2P{g6Y9SCPcF6p23P2CbG^m0*DxRBDe|hJ-6g^W5&?fITJp9RzB-|Rtfsn zQm6+n#ozCfTsJd^AYGI;)YIXkjJM5`Mo|vVvaUsy8`F0JJL9&1Y``Vf$XN){ztQW3GA`8iM+q$b?ujbqYWE^DvpYSp<&Fd5GI2VIwNM+Lf(x>@($$&xi- z8uS))>6>kGA91-6-cx9{}l+!dH9-W#SIp@{1p%W2+E*uFv%g<$=e zcF*CS9!RLq6zk{YtjwI?^c1?A>Zz5#uODaJ4IF2w_I`X(-StFZ6NWWjmqE8?VI8JV zdldxt@`F2v9=SU%P7RjyOCa#mxs#iN2}qtzIoJDoQT``ZsfpgYO{W9&pFTFrxa?`E zP30CqC+E@?i19PNOAbjvr1Vxxz2?H%4ey+awMw7KJ$jXn27AI5d~*cX|RH0EpdrmeVXd2XmH2b$!f>pQYgRBU{rY8$r<*_d7# zse^tWJx-e`K3&Lh9vS~qQ7fKczl&PL?%h0r(}T1o ztA;gYL0e{~byf{O-9M*GA~5|`nNPa}S)JuGH)bcgQerBkR(U%O5kCWj*2m-R9K46! zAw_tz_3j0<+17Y`?r^CmsCT7!&slmeC*3R4Wve=~sQ98?rh%^Ps>_Tx-tZA}6mV`V zgJMU}(<|@yzc^72YQ5&j^|-HvsyLmJ77huJtvh?u;QH!HbezirQ=#IdEt3)F8k}o& zi`1*pM|v^Ms>H+Nyzh)lkG3WTrYZ({harZ=axN|Tt4UFdVgEzvOcwm#LMLDOg5+cM z)|6Clr^FS$*R&5fiU0j#NNGhMVhpw=lw6%%$#G47#?#@^_P_bwFA71euLBz%w8GQN zO6)c_qWu-=3IF(ic`EVQIY>eSrfW;{-=oly9(RC)7+Y>bM4>mOYrJ{lyK)?b+Wv1q5QL|>5&39 zS+8la7Z3XGJMyJIe)%_}yaHKRE5i*y>4z)=F5$qt->+7t;G~M4j((N-+9{Wf?fS*o zfT=GY_TEE^q@IAaX&(A$+yHF@5%aT*wrnqYZg|kDWBzGLBTb+u4lB*cXIcP&2fSCm`1s2>pAPN@07mTR zjE)LhO##;-fK6d~m{c~CF&z z@{9mcKhso}h;#hTp{*Psf3CWY7P8Cd_|JH=)FBg0%4z|aN*cAG3v@GD0hoks+y;;X zA*kbQj8p>HzqiBaG}km`)^oP`wS3jQfjD-rMz1Y&%9~ub1!19?0bTTvY+03Ob5U`JnYNu2B4P=zVnCh zrst)vs5Xi_c5M6}AF9O3YD0!RQP>Lv0z9^rRKA>X0$}j95%D_5q_n)ez&P;JIYJw@ zG|ZKGe|bH*0Y1Z|;GK>VGEbMbDP4V(K>o#jF=k3y#pE_E7JBa3Vf^u6;5MmvSs;Gn zq>eUui2_z|zY{XsOwe%!eDpP-)$&VR@NmxLvA^k9s%xjs=JcbEe%kJ;0oO1pr#@@L z>pAcwuTRj|>A!XC$d9?q7#jFaqN4=Xfa{#-bs(&yia2hlA&<7 zU2`7}lO&@qo=jfppwrrXSSezkRwH5Rlx(7%%lu5;rSCOez0<7`I1!lhpi^@-ax+41 z(<+@u6fuMZVWHnV$I+%l>Y-@$OiaZd5c*WhIFQ_QH0*p?zSq@lw+M_cJi*qr%uwA0 z5Fh(;Op`w~IkvG#y9-T)+|1E<%h~AEIC$b+1QmT^3?)YmIY(0aj`bp?J_+$d!IS@KX9A9U!LuS(H&~*ugU}VRW~P8%)7jzflq|`7PAq8uBbDduEv6u9 z8|Sx~MyEiO-(*=49|NTX02GmV;CO*=q(#5)L;Z8C!}PLl zxcceMksilp5==fUn)Cg|cImCnmrEYn=sgv6!c2>0)# z`x@${k%29hIhieJ{WA1kVwRyusEqS&i7Tw=WL+x|l>+%SZ*oh5Mr6c@SGj+#Bm_WrdhR@)l!DdUt?1YDlh?KyeqFRigujOY}0n*TWYrxyH zHJIseksYJZ>Ns3+2hlMRNn zo?j)L87BUkWLfOr5kiu7^sGCJl)IKvEz;Wd;)~c_iSkH-_i?%3J zb3{`i8&iC^xy-_%;Naj8f`q$K5P8;m>a_`dU-SSwN96MW>)?ujdBgbq%S4yF_AiH$ zoR}98UBYX$=wmZRd2CYGAhY*x&1prVTS%Uz{zS$SyqDC$CB3ve?c9J5uiYjoN8Bt0 zWB70UeblntpfNI01o1+}sVX!ck5&?gByhfPT1jTAatb%Pn;=4+*fFUhk9lXIP2&(& zZ)|KmE1msgvx#{!&6baXT=X~!v@1^+OMKJH)?l{snpON@!otauqChgy2Qi?q5=(ND z;GR5_yxB~q(;HZdr({owsKgK$@`DX=JDz45q)$lr;2&~AqOFwHk*%rbP1-cXU1 z=?8TubanNf9mdLP=n&XXnh!NjUQbmC)JHuFB@30ue_h!M_1lm{ic)iJ?%pLErW!St z{foq^euBb_7)r^~M4%m4H6T+|R>bT_l*E#_HfT59e7Ul34Ve0nmU~Fd-BA5ysdHcr zXb8M*t8E$@i^w`9|N9I*q5Gfl2)WGlI*5i$w9P5kSiS0iSood&R)vC-akkRYV{Rd< zM_Dn>%FP5JcOwOQ4f?`*A&=5v3vu~k+;Xb74qpxK=0OVt+ZSJ#!TKfWg2LEEO+$=W zoFbonH8a6>5fV6)q~+gK7Sj3}`Iy(FlX==Fn$vu8cd}2^eO*j;fZux@-FHtBVXx0= zV;GuI3w4aLsURp8hvp)WZW-sOH$~Tq5MI`JrzH9 z3EO>Gp}KL?4=638U6|+zPklb&FJd5XHpU zA+7aEPCZSlWc6hPjD|)Z^9eOpO=&$#R#PWvAxz^tiJw#<0z~W4$_Q zX%7lMKZVZ2F`c`wEbR?peY12+C{v3A$tv)fMq!!H0t>6Z?NiQHXJs+46E38VFqwV* z3i=ahjZ_)oH4mO*Jj!aRLCk00hZ)G~e_3Fgs_KlDckw7L?P#>|O|;dv%Cfn%ked0g zIw!Q&UfZ`57TVzSB2!~^S0ST$VwXnF_En3eO*Gh6`Y*-NzlN+v=(Lkx8?`vCq&%*^ z79PWLKT(0VTrIWYQMsAzSFLP>xOePc`a7bPFC)R<>2P$>2$n zTOId6HO=o|tdj?>=GBx`9`nUGulXN$xwd6>u^a=4SiN{%X1oeBE)`+fntf_zS?6SU zLIK!$ik|E$H)#9{Z?(LfX)S;tp}_Gx`m@Hg`*siet4%Qv$Y|Y^DL*RxN;N*1d{TKZ zsGOp3YxK!&0*BnXjs>GCxVQmHnPzqS86qXPdT0Aug2SQoefyX% z9mbu5D7sb~uKNBwGqFbEOq_A}_hg}#_tRd@zRM!JM%j8M?qMIncDv>TEt@v@M)A2b zc&W^eiMg86{uLw_wkV*Zxs@>lJ|Q0J!V7&PX#nMpgsJ{Wk)M>H7Nc|Vjc#N8SzHRh z@UTF@01HPD2V%m+^;V%~vl!jk6ZMe{J<{_pMzRY(?d63&x0!?85Xm!d=sOJ{T4~mx zWQz~`sHdQVNlV>Hta$Wbct9ce%hfyTe{4&@X)lbJwe3M44P2S^hQ=vPs$CCEC&7V_ zsb81YyT$;{iK-Ehk8;cItt9sk(Z|td+VqzSLY9-%m5&Lzr#dQLL=eUZc`fht3XWB> zN_y(RUNIf@Hd5J?Bty3af)muC=>2lRtBtB&p|E+n0xb zX}IR$MdlZfCS5iOab^5LlK`agX|Nr4sI(ZhceCUtfmx01M$I$ZpH6Mig*7628K=$o zP?p0%j@+=xSclcQErcaDp%Ix1A zRubz);Z6z)Z{Zd8-8;T;Rq@5sQtxI+OY3#IXT;Y&KF&9h)p!ekC1KiED*`d#6=EIE4wC0|5J)~;R&cF8q{jV48k<M#ra^I%TW1BPWZ^o1R5T*z5lppK#Er~g3hfAIB_nKZ4J3fP#)&7DX zAxjk%mY1XVP?Snr3s7I*M6drsCZZ zPNil%5kJUO+O;)n`A%OPJwX{I-l@PAOrnBIASlKh*l!h4&H^Z%TO9W^s$>QEx_>W{ z(TbM*m*of?B~pWUjmSM73_e<--V4}TqA3C|-19dl{I*%ZtWSt~K@sxd4i|#V0Ho)@ ze-$1!e{)x<8b|u{jGS6gYYA`-ycZXr0tc^g3y?dW2lebkr7($?bKWE0uOSZU4-^ph zxq&K|I@zo``3$l-jqLs|_u2eq=QR|XjoW%(@Lb=$dxt4m#KM<^ka+KSHFNI#2hWrd%T0Y*eT#0~CC%h! zCI<%_*N0>~HDQ(F$zDEJReFQ>aqIz`ecC83Kj8_>Pl~evhV;IKZUgN7&DJHR@gn0^#)7Ev<&vt#1rxzGGh0>ljWL zTYs}QQoCv@tYA{J*DZ21rFqk~xt>Sj@(4LOc%I@K2mc*^N(rh{CWFZTazA_yqf~a2kabm!mZT&RkSfn}CByK?wV?X# z58@Ha6MXE)pGrxHk@|;LLtW^6cKuj_2t=0FwsHDL$=jt)PbL=NSV4{hJ;#aRS^9}0 zo`(bEI6i>3wJoLr-9EaCud{LbET%ouof!I=AYq4XP0U8UvT%A+>2EV91H3iXV?f%T zWL=-hrS(uCnxu`xW zhkY~s+UqNJxEaky3+syGwCR5IhSr=1dYpSb`*q|}%8N)l?B?g6+%&8A11I>bM_-vc zrrUq&xFvgfcS`dq<`r3@tBGZ%hAkuLV3}xclK;k9)!n|dMP2!yA}u)7ZNLH&Cr5Dy zH_u3H-0S-{9K*%eAgU-ra$a;52|K6}e$|Kg&V@|v7gB90@4 zmYbcdl;=4G16qq=F%A6caH^E`d?E>^-AobaLZ-yKl(~8-5jM@!qFSs+0Y<8f;()%; z%(H9QH<)srlJJ1i8f>2UNo!B__%z;7n}PL6&9oSoa7_2NeXaZsak0-G{?#wrzUKa! z8^_Hr#rEw?##t|MNjZm6e^gGTQ&rk6qpY zMq#Wo+wEpa5}RPMI!Ypg)4Nq5ip>qZiS;We_Ou3v?De|sj9wR3(FiR?Z99#+Cf1fE4jW|^1vc`Zr0%l z1_ghuX^LpYzMA(kKQ}U$5YTKU-#Oua8dxv+W{0Xp&+c#AY^xJsGOc3P&=8Gt$l%-h z@gQYBM|{o4r(Lv`0ajJ$@N3?mAwW0bE#F#m`r|1lhTRFu-{5UCFkiF?x^w{xtoNsB_kTgubdG&8q{=3;5T?4)q z4McKr|9zAC&jcG&1dQu!L-9O+JY{%wVd1Y4vKbBEIv?Uwh4j3m8GXC?a4jEu2S5xnZ`@L#j6pToLihC-kC;$2M8ln1LruBvO zY{qY+Wah#mdqEyOgMghdymJ3Tx%y1<>u#+CGXNUNG#ikFKXW7E`Y>B(w^8(^OC%Pm z%8E~Y0QRIR6;{L3VKN**v|ZYWLEdh>U0R=g!G+y0<=WCbRbitNhVME^GWwURK}a=- z_vVTgfN6XIH@&3^06}j@a>q`@dop|YITGVX4Z$CRs(k4`*j^4PHm7nFxh?#= z*0mhL0KIup<9aR}_ifH5R+={?fTppvX53=RJP>~{!)*WII~$N@J2Q|j%lN(j=-S`2 z81UV=anO}tn;PB(&{vBaFRZ{LS|GeU*3u)|G)<)Qfrf9|EKF;D>y1!2TTUsw{;|ji5p;l@9`If@^ql1T=T{> z&3`Y%K$VhXfpIY`?kMnY761Q7{~v3C;?1eLGDzLUm;}vgQtOWYG3zD@i497>tfZAH zL&^QSNw2#pcuzS4K|p?;JAZzTf!F}MJ>xH_2wup@I+Xr%a6PbeCokTd{!#_D)_Z`! z%6e_CIsG|CsR^UiEtj)GucAOoVC&ggist`qeEvtobzs`!pEMop*)466ANLK3xP0oY z`a_Rfgtx`7fU7VEofCp}{L24WI4>M*tqZghB5PlatTXBdDewytCinmJS#r5iDRPK{ z9V)5*SS%@_naqGk92LXELfBOR; zdWf9;<1bVoo7N&ejbGfVo0~ls8%>w>-UeF-fWB1y?8K_OJk{k~fw^2h3s0$6C83hr zAKIP|rP?k9XgX&DW0C;%{`K15Dyf@AX`QnBF1?#UBG2Yt8UH2aZ3^^K>-cwdfbx}#Km)5ZuGoJ!S6J&Quo-GWjg(p@4FLrFIXA`MD+cjwSEzk~Na z&*Qz<@ALctzYom3X3sfi?S0OQz1Lpry(UaWNg5NK7##!xVam!pdjSHW0!V2=QTi|2%MnXo^gP;69U)I_5+|D9AX7R{*yKd_`Lm-0p38be|)M~d6?PS8M)Xy zQF62Kv+;mHTpXMNf}EU!TpW~K9JdW#UJwW=3*kTalZE)NK2bqgNdIc1u-tYoSo!25 z@PXzaqwNd=Vc^}q5kM(v4?!Sg1}il!7cE5vK@)pBHX~DeV>31nJBM2;kg$g!(6lpi zF{1RavjsZ~dWcZ{yh0FY-yUYCqWpP@i;W1CmZA!!guRm)B@f$UHV!ILbV^D}VJA~_ z!57b@{v-#!iBMU(xHt&1v%9;yv$=D#**jUVa|#Fuuyb&+b8)c(SFk#Jf?bR}Si#QJ ze{}M%ex8{*n>blHxLDbPDR28VGPZYh5uu{G9q8YGf83|3$-l>OaCNf%If|(XyP2(- zof+80nVpl3ll^yez|;Pl5bXRXHvqn{dl)$YL>#{*GV`$d&tv_C>h{e4lg!1+{Qp6A zd*%{Mi%V992RE(?bX7-^9d^2n_8KBJ~MJL z6TMX`R!&Y&%&cYjh#IGNq5rJB9Ht?1vi^bgu!ulR-dmKTCQDYTwh z0a9=V#0cELV}4=w-=6v{srG+JIk~wW|4RDHslSs-*xTAWsX7>$n2B=!N%G5~U#`Ao zyr6`=or9B^^UwR^5N7|!vA;KcgI@roZ^j|~#?eO2JwEuJdKezSk!9NLv*>7#>7u)*7aDN^JELRjAkm|o? z0a5fh=xizoBo2~&_C(DCVJH2r4}tnv2<9UMT)}Mj`%j*zJYmVwBJlpg7G7evTT;KR zFN~# zxYuXA!EFQSLTBHVk)MhG*H@Mwj-^UVO3qkl0P25#J-~a9Ab#`TdlN_AdW1j(+FF!U zkNqD5i{AmABH-NrudnH6Gdj$`Ns3 zOcjd%eq;9oy=27i1bBHoAEo&p&j2vZ_x}$}BSsJWodSs$Q>mz_#igd|YH0!bIiRD? zsV;TPe_UMLn3$Lss;VTsar)0^pCE660+E{(Mgk!pnZo~}i#xo?-(mK1joJp=4gDyZ z5|UX;xUKiTmz&8?g0@yVRCC?A5z9w*%?V%j=iOwjF%n%+M|8+fS*8Wel1G6lc% zjUN@n$!|dBP~Z}O?oU#*1(r~A#+gt=?E;mhzO>{~{fClef$wvyi=|u{@RcN3Ga@$7 zB9LUQ6xh}@o?E-jQd1&{&o-DBe*PU3e__X08sI{OXSn}MKkKCd{j7KIS2Ov?L;RIL zp|V*<3TSBm-S&aA9%!aTT}gbtb3@7Un*Dn5%`74|dK!L8qKJ_xyw-Eso;p#LY&Q)j zq(c?+MmJL~Hp_|+2OVBPw?pZ{@wA9klz)HyK(n2x#R;soo0cLR*1o;V{3nRS1=jbQ z!%G|y1vUkSGcylIAqH$P7su9~6Y??djpVyzyyhOmm7fq|)#9~^IY2DaY6qp*!}ek& zdOC#~G-{*q>Z1P~$u%Zm#M`uVjR~c}f2~OI>cP3MMPAc1X(6(Ouvu~hB-1j(ZnbjH5Zzi+ZHgWxERjqFmCn}RXxbN%9d<31 zYT81Y?=V~Z4?&^I7;YBj)?l~XoVGM-c28=`xw=w zKd=}q0?1wtbDZ}DEk66-bqtV~YlQfdCtq~!n|RE6;#M2{)S9nK=DVV)l?7JgR#sN( zM@dIDewu2QAga&J>A3S+pLQMKqZt`Bxb42VM>Lf61c_?A)F3l1Zlua)90BPLsmDU# z=yR9I^)TlQeoJ_9@`I5^y9%RqY{)wedbQ!p*Bh?sEsy+ru6MeRojjmQ{gO&c-8Ps1Vi1$cUBQjVp{Kyzg+K7aAPo!#kAKyZr+bmlBnnT zyn-_A&eqGI6*tgw{dyAxgLiFEnO)1xc|P2%MC~_*pt6iys9r3!rm5#TnwLpnFTn4z z@qMv91bgaq`QS>gg^1hS=X6w)6pMs+=W{1HL{#Wmq_YMJuoN&!Wa&s3_NXaXLBd;O zl|{p#EuP0~^yw}`8Qy!c)e!`&UhC=Z<>lqyPv;%lF&T>V?(qinvbQuAhL>Po%!pn? zndVRV%p1J0w|%$Y>Y9YdYi3Phf+Bd=l(pZto5C68ot-g|6roW=Z+wSiLfq_}JW5Au z*3GlG;fxh!45q0I>F^B-+Pmq$@iGFZ6tXTytT#6|J1P9H3)LYheD-cvyY6Y;dv!(v zjps`dHFKBaMMXPodi9NGbKd0$!MPu0a3=cE)aHSSCa9RUzq5N#p1mm;3a@Fov9q== zgs6kTdrfC^5txP}`OlNyhq-gEr#UM%9ip6ko3(F-C62#@EEDnHlyFPU`dE)9Xz8Vb z_GjukcPVTio|mHd?&-OlPH)d?y;tSjg=er5zuTMNneVKI9}JNv*FdipKZz=*51ZL6 zzSCS^?Nee$9ffJKlC9GH#x_oaKpFlejYo2o@SwZcu!Hs}Dl51ZOWu9)dqxQu@5}t| zt1#bsRjsH+TA!Ed)-#xym~h|AARk-}GOoeAtKeT9WM~5ITW-dN>L1D*N4s9ye+z#b zR@11js+eWTq*9fuIbL0V=9lI-E#0Ay(R;O>mcn1@9Q#EtmGpaEH%yPj-7-OKj+Ewi zhD)_T9Wd`N4Cgq5htX$j%+yuv7wz9i`1($8OD5+1!R2=88QO-*t?6ztAn=M(2)Wtn z>+9EmXQkdgd@il~e0J1)+#sA|P^`I}B}Oqoudzc5mr&asDRwXOf$}(9RONvp%C{M@ zZ-fTP?be(i1>Ll(&hFfFO0OFoK5LFj=jAVYs#qH{4|Dyac)NeBy8bas{B8QndWnpV zjy`dkNaFzuE4Zmi!;v`uMq*F%Xd4t0ds?N>wt`ClENqgDxrE#f19t8p5`wPzRQ;<&PpvloGJ5V&59_ zUYRHg*xSE-{!^Z`_4Arfn0H+*T@IfVD^KNVE9wo$r((c4U6)noZP`#Ku>|X$w7m{W zfnN~rdRc4Bew5Gm`0FYiI2+U&$JlX9WY_-9sVa%)AxK7_><;L}5szM}ue(5m_ zUvb}=ID}p8`=2j{7@7H9A9h~tx4>iM+0ZtM8EomoAKZGI(gEEt@J;L*Oo#>j9JTCf zZ%LW(imIL5jclaKvErMXwf7I`Oy7(mGcW!MJ`D}cW2?E3s&J+4wbJQ&D`spV`y(ku z;;OB&LL;Yk^$JbTWr=pRpq|RjF}f2q6yrhk1hatTw59HDe;W z6i(1b+k~Z2Rv=3Jcp^6#hy4+H$oAmZYjkP``!@JM-#x`6m)b6s&-LWaa+zu{vSIGm z#i*a=rC@U*lm6!Ya_3O2mP$oT>ACh?)Ue=kSzA7i~8{dsuZlG8F_I|@P_6CsM zw?y35%2n!kIQIkVl|Z9nV)s5Mi(b&Mbxl0XDyfk+2DoTlvmiE7A&)mZg4n7Oi+}bG5@W4c%4yHaQ=2^2$oy$%OY}#5c9Z zI;Lx_o1%~T(7UUoi!edmXiz(q&)F=jJ6~`34R5mVx0o5pO$qQglB+&kvb!7kh_u25y04e^eCWR0+lSmA`?y~13b~2$Ial;L%Z$?@ z3Gz03A4w&U)yix^+cBH2s+kYlPI|M8{k)&)w0INNMIzL`s8P~^cM+w_!~hO){Jva* zBmc;J(G2wP!%S{6N@OhVWtEM~0E{(-N6zJzq^y3ppc!1 zZ9A8(&FYoxR;B(g@%~%RZ(HZQ_nQD`^nrdSsk1^|(tG5Kz1fCDW_6dvzP=bwSG(zI zG7iH4<)q?(C=uwy#ql~`i{%fhd2Os3`*|g-R6cw2EjII@v0~kjp4x}kN7Qw$+he?T zQwS+3od;ep2OzDjZ{B6+S2 z?*!QhCD!`AX*=m3?<6xrJS$%lsFm~t)17_m0xjg?2wlJGgb$8N=ql?a?Lv_}_EK5l zEH}conz4>P7xT_jrKOH-qDZas^LBOH7H4udy7b8i3v*G!^I9s# z+~>zeR!+hv zHf*a)PlwJgbsH@umC%bew1tV>%&y&4-cABmN>B4Z!qZJ8-IuVVLNw=!bece$Ii0hW z{C5v=8>6FqQyfpH&Db}VjFAR;>`NOK7sk%gr#M#>hf;Nn{;?`>BHmn{rt;e9uyTS{ z))R}!?B|<(wWwz6T^pcNHtu^fVVteZ;(dVs{B{{@zxfN9kel$~S3IjM&6tC>*BE(9 z>08{73{eHPiz-t1*wf=ZuXbxxGmYBc?6$yR9uzu_wO_A}i)-elinKpdPo8d%eKkuhC2(u2S zK_abORL32BW_ECRi)9?%CIZT!4LA}f< zfiGrPM>VPb&d+qQf)f2;3kkqNe|215N~}@e+40fSOzk-Do+WH@s5to|*W25pp4;b9kbI9Kd zmrp1Fckf8V>jX8@XTRx8^m2pR;CiacCev%H08&z4=)OO6y1{TorF0Iu z4O2b@fpM0xIFethaJ)6dCqy`|ZLUQ9oRSkn~9ymUHlVDY3C zjXrI`_*QnI^aylUrTR@?z+UzNapBGQ^^J#q#MDcTvHGHLb#_ih&VuK-cMN%v*X-AN z6kZ~^3S~{F6*%{S0_?I(THft?RbL$(5+V^iU+f89E9J4wR-pQ}Kx^&_4x1)QTc8*b zF&k;lt+;a_bKFtRRp>^SD&5!X{6TS;qr_Zz9SKFE3Qptgpi{4T6_uHWqnCPOr(U?% zdB@>vj=Vz{UjAFurxut@IX-Z(YZw`o$7b!x=5TqXMywxG&Y}Ojvxn6Dr-E+GW~Cpw=+{xrgG&8 zd+#@q9G|4CW-;XYz%JH5-Pli6GWOT))o*`aj(W)17W0;b56fSOfQ~QkrgOP7H&Oqx zQw)ZKfuM^?-TKw%9$NFO1QzY5_n2`VqFoL<2n`&*pfEBr@?U>>UTXzEM0J_6%KOZ= zxDu<(n=57>AWiOxEKN06l#ev!Pe4m~y=?%$OtC2;5_HK&yWe6Yv03PA&-5CISQMs$ zz_kM+XD`*@*;DW>Hl2&{M~Joi*!t7KchJHx5AhR2=iyM_sWZX+@#-DBkBUt)2!^L7V+KHiHtOkbmp2~Py_qS(eoApLdg@qC=u2eAr&=T9Na zZg->w^M6EQBi=oeaV%mJsy(H>d*O@Ie7Tc~o(j{$CuF$uO z8MkHJnWNjpj!J0OB^}BBF#_?<7Rd_@tEf=&H_DCY;j1_p-LF3PnT>-GBMI?9drG^R zR?1MvB`D%@P7JWXr-=o$`_>dJlX6bHNR$-3S2te1n@#Rt-fKK7nS6mb(?g~;b{r!) zHUDIBYYo4Q!!5cYYM-ObIR~3?MIUxaT+;yB2F)d>p7tW?HZ42e9|2tUC9zYxk+NDZ zTl??F6c{ra_qhqyGla87=pN|2H~#mM{bwUf3U#4s4RA;6u8(@{n@&snf_G=?ocpXf zbP0^UvNh~zc6X~oXRTM4aM!a#$jdoY*Dj234fhRRZfEIt*0q#+~nsw93?hKBRf=KF$ipJ9}>b9<~n;@ z2HC}wg8eRf4ZPgt{f_(j`t!@yGrV67tQ3%I+}*(xgPl_gEUT?#1!0v_?XXY5A*Idr zvavBDh>Q&uxXXG)*Q8_ssKw(pf#-_FDRU{l_8M(^N$?qkaxVJI(N6WVkVaT9a?72_+ORq*vwd%vpA zamD1gRWXn2IIQJ?ZKp9m)`{mJo|8oRntE1;?w#~r?<8pEfz=gni=|3IhF4>r-YUBr zw%X#{#TCSj2=r-SkWq7UolIp*AUfE9m3{K?Jm+<;I|}nd4to^|UIplwb0(Hq+EXv( z3*I|gO}PqBV@(C&B#CYmW6ZDh{3qXE^c%PxuNh(xH`0O!=D)BZ(hc)gExyscw5u;( z$=vNy9M=bp#htL9Y|jS3`prZ~gh6bSXY!=%csJJ`eVOyk>SFV2AU~I3T5h z8Y&?g#m0=SfEWjCeM#3AJm=G?IJ}{@LSK)Yhhe(+bo>bT?z`<>odKe6aKA}|&eQz3 zOlGDjLIKwWq%W~o1T{_hn>Jspkt}_t1-$)lm2jo=KJLM zuJ8xv&#x!sJHc8n1&N67iZc6YMUPe3^$xIp=5_@p?_!%&Gw#GiN`}XfGS1aPg$dG^ zALsM;lo%GMIZR|rj)kJ=E<;5N=p4Sa5)2@Ta(@xiPr}HDXg4M z;yv&>Hi}$EQLc9BJ1%=T-NkATE}3A6+Ib{J4}X34`D7xF#X6WF-I$^&PR8O`g!_nu zkENO^zQzT*LpH*DaTQ4$etNcMMln_4!TNd}J}7XLN=r{L*q}V2{jFx`-I7qA!dpn* zeg^t>?B=KTVI5w!)3&d~SOmyEN8C;JnuI1hu^L`*lgth8`4198e4^F%6%q}3q$4?D ze09t^f1CdShejP)MLji->|{!s%ynhAWSX4t*lhBHicOyiZGMb>$G?Qi{953OKzx^6hb`P=?KG#nvq?FEz^rk^>vi(! zegfBn2XQ`rDWGAfw(bJHeua4?Svgm$d$>n6PV-R@bJGzUX?=a$uIIum!9+JRklDF^ z7g17D5(q%I(myndBoiW7*E>fv7Kp?59aiL1FUOja%!&co$R4ecrL3DJI_?nU8ru+- zq~3hN-XHSGr)8Qw&51yIz!kta$fChuI^TJgT57vMF^lw-n@6Zdp^Bc(U~sVgLJa$)riaa zdmUR&``GN_d-u~%OXswgS`jkF-w~u$lrd%)@8~rq~lmqn?M9RJOgKuX$(AY91n(3NEzY z2!yzSw1i5DYI?|Mxxg}l_XUu?nZ~GC-7h!ml}Sxck8H-qc=C~MLAuMGi5X%_pa=Ne zK6xKVKWv||QFF*%JPdoPkoSyI^fpR)z-2!t9B#t!T?usfMSopRc00P-$Y_%VwsFcn zp%FTr$)I~WkjV=V?R~c~lBXIwLWdcPN9b4Yu>FZ^Iz?(Qv*#Hhs-MQ40P!M~`4$fE z2)y*FY{RY``I&4!4nH?2p2dD;*w)-R30;ZnrSTH|yUm_7_fm1%cE*OZD{t=Z8J%*2 z&wO0A6Wb8_BJmTMYhq87`kkQx&8!n=sQn@kh(YO^srKz1+XauCCGeA;9v1@Jww{w| ziZR;=Q;>rYt}dn!4>q@b?krox>l(D()CA&(TBCudY>b>nJ@_KhVl_v{<&jlt1|_}l zqbi=kftkk_J^Dt3L>}ClTK|c3{IQ%aDS&q2+7{`rp_$z~rHx1EI<7OT^RDB143~=I z`w;8~*wPu`5|2JUo7YSuGqzfA-^dPG@(ra$%|8mu%Pk?5;?YK7Ayq76Z>%9$j&$F1{Sztj9_;VG zpl#{5;bp%tw*saLi8BFd$CVa=HEfr0y=i)9JA?;oB!^Q=RVOZ>( zak>U?XV}2b>ttJzZLyzv$XGDKLZ``jQu*o3MZ*dL(yoY?-OLR9BLBsBcr$4XQ(h&s zB$9G{Q6wUrT0QIJU4QHWWVw%qV{k@Ca2fXM2`jFD$@&7D+1gdhnd(5tqf}O160s!B z`hb9>M|wBgG@+*PtpVi`AU_=g>!FRw#*Y&~6j`jPB1VA8@Z?U|=-tUq+G&9L1?B zIhHsr8Q8ttc6mHIECS*IhZMjmxEnfqVoD8;To?GDo zm1XXBlqS|<(d$6`6YNbXm<> z)Iit46feK)QF8}YA(Munet@X1o)fpiC8yA=4d~&^dh+9}J;vP>8bN=#(t%z-zqK_^ z3Aq}aYU1Xj*@X4=xILfm_0NNhn&jNT2fRj8F*Dr4LIT|L@L~L1A?*G6&m$87A(;|h zpAMo{1TKU`^$NkV`UZjQ@eh^11%a}@p#_h^bc-jZp*t0WCDFuwXS43S zIhl%K5@c&Cv~;s)8$XctMS_!$qL#=BMa)61omdzsAJkHB@bi>2!H7F1GkMAsr5vBI z_Ko5=c#(uioZD9zk~iXjjppv71zQlZMv+z^tHa60kE8GE-fSv%`LZqTmncQwVoDQB z49c+9VLw(i{aTzx(?)lg%M8C=r@eiFZ+xQW#_M5byr$7{C!oWB>*~lomEwwpyC^R% zsj46y5lD9!+!VM_U7X&nA#Z9i8234~fgE6%o=Q{itnHWfvI+amaE-H#jFr9|xmgd} zVXNma)12la57f_W>L3D5_tcjzmgCB0ax3SY%2g_o_K1m@~K@-1gL zTiusWBR;i^zi!CsSyxAAy*Ps$&s{NYv#auXK^%ZhUvcV#hRFi0O^coJr6WH1dm#IP z!2w2=NkS5E$O%JwV-yu^=n*Siw8@3w8%k*j`AET!=5)FEQ|Iy3NKenI8ZaT*cP^HT zkmebe0Y6r|L8F!ZlyW00je@g}PtqffNv}NDE_Y&9QKiqU!ZEX~a_)5Q&A#;y5i6h2 zBby=clvn%5JZAk~{K2k2=2-X#i@}V31s_C9Xb2V=u?~^j2G6coUeeW|LG^`RnIQrK z>lhz>qPh4((}Q-i@^3K$^fc=8?%GL|$A{gwIbnQ|T)lU-98LztQ*F zq)iiW*&f>s##1`Tcma%^HHKRj2JcN|ukj72^OpwlaW*!P@QzIJRInY8q-{DM?%<5b zIP5zCBD+a~H+`$gnabxZ1&%MimA~LI@9V?KB37ddHNBtA#0z?Coz$w4e|_b%IYuwq zo5WG0W>5Z+w@P&_y-r)7{X&ys%B$2Z(nr0?&;gFfWHpWuQp2kZm?(3NVMiG`W5xKY$eHivV>g4k=U9#r z^Tk#YH6r^&%bFq?s$b2k`BN`Fo)6IC$)D`3I9QnOi_cvbOye}TiDv1|7xlWUyK;@d ze{c&;8+FKadN?Qy#&yd_Bno-d>6Q6o%){#WqHNE0iu&hP>5wRNob=&q8;8*!uRPab zu_ScC)9-B73%4*x1>7b*uXv{+cFRDNdd}d*%la#_N*nLRO?juxR6QsBJ^170CV4N? zk){a_@h25yiF;I4%HD9lHa3deB>G=olo`klFN5a&GuJacG$`e?H&**W2S7x3u`#DgkG!^{G|_tM=?<*e zWpxn9Bl1NcUXw<~Q&u5S%c4_AqIc(Lvo5S}S|SvM3@_B;@UKcby#s%;U# zQFQBn;ccMk9u&RmtAqpL*G7T8{rQ#_Ng!&MQ^e6~SY|a$=O)Af2`c4!j-@QP`B5FB z!Kt0pf-QUis`saNgff8Lj9XD`F0%Sr?4dQ)X__ZhFyKjJvvbuU~3a!IL z(jq&|9P!N@ago&1r--BZZRl!=2(5(^b&^BfH>ud(9*5YQeo-=gUEs{2EJeBY%8_RZ zh{dY7Xf?7OGAg8&9R+&PJYf3P(JNgHd6Bj#@|E#ty7Gq~hHKQ@FH+?izh-sLSK0}| zdt3`L$Y)(Qf+A+qeC?;iu^G=W89aXKX_7Cga>p!K@2%GrhC2cSdkFBl9ur{rJlc^(LiS7-@;@8|KW|4&pBDUy3QtsfN+c)!-9I-!g~m{6jcSU4BNH z{~Dv?zt6ENHn8^t)&lI8`1_+IvR9d2b)SywxzC;-F5BVWywwvkz^a`GKr#0e9S-x4 zek>~|bD^w~L6Q9S9w5ZQz+CJIE+;IA;@X2!o%){*u9paby&Sxe^Ld-XMGF8sq3}C5 zdS7DD0t>+w>CwcCneX1){a7U(skP=0yr?DGC(x#H zAInTv1%P5(*)X28Q;a=J3n5RDpf#ZzWaqvMR~Q6;ZcZB{o;WH|9@1O65;LPm8HVtk zPjZV4uLJJic+$G27yVQYEW^QXTyitl&pfTs9Y=C#Fu4|8YhkK=2x}w8>1yS)+3M7? zMtMGO(lB5C~(+R*tMWW*dM4Tya(N{ zU0`}ekwIa<Z{*s$XV9iW}N;iSSEUvt19@I zY2|vNp4;R|fogJs&GA_i!zFar8;FR$W_xM)1ca8Sm@37cF02&%PV~}pU%@8;!(3HoP{&80CSKxgbdI%aZEP*diN%?b6iE=@kkfLQ~-UgzhU;2n-=^n%E{jW%nYUMi?d;o-*F~toKwkBqJscAe{ zd(}S_xIojez?F0whkjKDV~wC3 zWeh^rJ6`G0zs2nHEs&W$X-Eu5CSC&|vd?2)umX!j*?yeB*);JEslr)O9aekMjLCzT zkx~OO=zDB1QtLRW%|{k|%$4^|1P2u^bDry?M^LHKx!rbq>~a!^6NMh{>a()Bnt|G? z#scG>&OuNB_l*RFzOaxfcR-T*J%%!ih&Sw!n{MLcbO@`o)zbj>-LR(V#Jct`F^CZ~ zM0{09Bry*<{@Y5p>k=*`hDrq+Rn7Ke;a$wqPDR5@IIslu78c1>N1MH9x!JXEQW|1P zHj1P%5VYB}lK@9V?UUM2LgvA#p1OlbUK*a>)RzJUM={}iNDpV@WiQ#*l^DZ3KDdX( zqg{XSjwKq0CO})b?#2HTOqI2VYgoPZgPOYYt>sPlqGpv#I}Wbgpl|QV z${cxR-K>Ae32nKq>s|IdWh@b_gg<^%ve$dp4Sc;2M#koCQv6w{Qn!bD-PO|uJQh(= z-B`h3;hn7bsyFa#D!ceL^QC3KzuG1Fp#d}SjTxW97@a~xe>{LF|J8-c62X^erXM`0dufyPY zW&g~M#pIimCa33o5eBj9=RGyL`bkw6+ou;wT;`MjsHh!4?p(hgZ^#9khMVnTd}M*S zuHNt2lqTQa#jI-+oTE{(=F{gyIu|9y>-pT-+?%uLk?g-n|8F)JD!z)AmC~|w!R+we z;G*cMGXUN#)z}q#J=Tg2lDqM9oh$21B%N<4&_!6V@&EBIU3Gn30eGrW&&j&iMm|Vn zGoOD1V>AF8qaFEtiNDU9Kc~_BVdTf9)k+4U>iWn4kc7CvEf%BLoEQO$><1kmyv2Fr zBW{WmoxR4^(^B+kR zT{XtW@ZuFD=r;&QDit#1j~WoH!X5yRpJk0^`LR$Zqo-KuzQ^(&AN}0XfMgVR^9_dHnO%*f$;H(|1>tQDurXG)v;PfQkWbgh;i9<5A6N=OO1$Vq(h>&6az64^TtI04I8* zjI%xU6Hg?!I1y;+-ph`#Uy26)6twtb#1|0BoE&FhoT{Jzslq8oGPMX|y4F_#p2O>` z>2)rnGwPeYLlt9YtLrPOc~XibJp12;i=}lEVR~Lzo0I!xeursC`$1Gl0ob8ff3cW9 ztS5^O4Y=Fb6ZL9flg|N2_?2T!9O{TL!fuZ4@whn8U)IvUEv>-UKqh*ix*?ug{mpMU z@vEVz9N!iOUD#w1|6Paw_SE9>K-E%KPc+kS^^rd?I2ajsf8uk_k~Tx`t!=2$14S9O zWrYJyaW%jr;NJ(R(J7fQey7b$w@@h4_|#Np5^?oMKMN1kWdgFp5W?@-l@+$7-D2Fu zUGK|G)Hz$Yu0Vu;!!H2)ES{C0ZwX)@FLg>mg0w#oE(o9CHMW!G00P31`8f(8NVT^C z_dxi|pMDFw)D9EuIpW-YaA=l=I`L&aaB zb%E|{&M+zbbtn7lto*aRBmoq*oI7YR{tp$ouZhS7`iftJj`vSJ`}IiRIUr+7(KPk& z|HYbkKnRW<#chAtY5(K?Zo}xN|Hs1Liu-H4c>Br8Ni9MCpG-8yIR~(#I7E*vRal;+ z6aFffU)zD9$d!ncRK)4OYSwSsf%WoPMmjn=v&Bu;Y_|%08Y2$)hE|E+*1bF(M;U&v ztDz(a#h_3UYkZpjq4S5gMOxQdkpETk2XqMN{2QHH)BPxUj>Ov zQh?6aW^4Rzf%wHHsqTy2>U>m{+;0jQ{=&~%96;y6`Recg>-`0wevJZj{?Md2=6~rt z_*UotkA=Ts=l`+rSIzsi9rzb5++jm5uc!b})%6XP)owuf#kWWyx1D@4*Dz_;EgK3* z>2Bee=x5-xb-zJ!1YlU=@%JZYGe*=A6_fvMWNK)Dz$n+g+^gITttl;O%Q3)qe{?{fI=KX+=U+=U=b0`AT zbSlVM;9#eU=y;%S$S=SIk!4ni^j5rFf}eMlP1yjvrE8 zAX3F-uSgDme4KzCVUX;{SJW@2{0z<_H&_~%@*;>H?e1F6cJe2w!2QpCH1YP(Nv_6ooTl@^DEDB_re_+Rn zAqc-dE|>$#*n0bBlG^YIvbfa3!qxfj8niJDeoyqT!+QSirQgM>rh#vj6&#y?A)sPF zFhbNY+3@I*Fp%v}q~AumgLRL^z#8=DZvl{ctj24mKr_#EMoBdX3(Fls=rZ|T+T!BkfC4m&(x%H9Ku0;Zsec+)D0bi<%sE#x=VMug zH}|kiG;_abKaOw{g^qrbvG{j|Y5v#?^sm?8%hQg`}&O1ktF{-$_+X+)G zqjeAZu|)VY`ucm_+T+pvnlyLu-ZFtkejDd6??TrC%VZz?q2$1V9uS}b8VQQXrvnH_ zED-s>*Q{kjn>Ic~q$Omw0;p9XXT$+v#{|US+FDm7yx!D%xWb6 z2XKtf*%hesXvY@2_rj~rl#82NqKSKbbrq#ZEIl$JBAd!Q`-#^Y@S_WLp>gEgHI#@h zO1jT+RFl9#K?Q|OeCCevgjrTEDIFvS3){%}y{aAgNg54aYtVId5j>-NY!UH@wME8) znIbbf8pnA8%`Zf1b2=@2GU64snarEL7wxVeLpP$(3ZH+@P7M|gIwy(se4n5Lj-OP2 zZNwoWBI0F&@JgsONx5BbE`(RAY?5gkIx-Q2)o5cmNN`wOAG>Xhl$*<=v!t!4 z=adVtV#W!rm8r6QL7w$QzE77;;*=F>6V7NE#Q(0#9u@uUkt z4DP8ai@cU<@Ad)m&K`Jeu6NL}Z0`Y82{j^yUeKNHIA?k(VPm)Omf(xe4eW@7FC7q! z2xuFDc>4e?j^Bi%M2mbO>m_P$Cv^Q;h8<|4JAjHsLT!42^`$m)S4d^;F;oh-dB6E8 zRBXTT7}YtUtW@st812Otq_ouxv65_E0Ddv(4_Za`2}~mTpjLmi*AOMR#n6j)Cd9I0 z0c~Q>{4Oyi|5Q_#Dahg@qw1$%IWH3!p!vE_qG{?(U-FwOiJYp*chTlNu?Qz&OWDZX0_GJkLsbILBWjQ2Mpi==znKOTvlFCfv2FC2DK z(Bl`Ua$8`@Gb_Y^gE$UZst(cdKGC_^1ZOPmBpUe1GWq4VzkKSIMZ0)eFM~LODeEP= zxUgHE8cOVUxtZsJH15N8mx;z6798ZVKv^>f6cfv<&(gAi7fWzjHAzFF1s}~IQen=O z)~2W}S5Jd0tdU746(07l0l5uV0PU@tv%w1>!4?X4t+jOr-thK!uxOVf=jpx^cJG|D z$W;7@hl-hnRh_n3*<5iVsPwreB%%|!15@(jXymJh`Q2a8v?$leh^y_n!Lc(>J`pZz z4^+K=Q>5QCrK|EjyKnVd>#CGI+Zh0RlF)d37h#;>)6->|SzYACBdpnkH2UR=K~bB* zC%u^%JycBgYb9V#T{)&Z5|&yT*SV|){x?;u-A7m~bJwi4CX9p9azwngNxgxt-uI$J zJ>T%3r9F-LvN+xX<0-T#eMrzCcD;zr%c2W*LGy+QerCA&*oG8sMs8a4?&y30B><=W z35d)$zDM_MX;9r-t@z11%okuxZ(0Xg7Q^u=ZzeB|k504gS6o4Nxf^uF;MdLuIF(dG zj5Ky>?wEYC4c2q?JTc(1rKiW%$O`hV0I-$={jkfBzdSp`0|WyC(MO}m)OgenCAFTC zkGUiP710-8Uy<$|h6r4HU#r4V@lv3h?A+dSH?iF{uD%?`R8H27kP>T12*3h*zk4|l6(_tK=nr1jT92aaw3it>vKqwU}fwy7oj^pC~wBMyLC32S}F zIq`&FJU#KXWNjj*jT1`fIXeStXI+wOZ-RdqU3}&D0cr{rhYErlx#s=hA{IXu?r*wS z(24VW&(NA+r0NF+$aO&Q9ErT}dwiB~;XuBm)=LMpOMXc0P9%`wb0nKMhN7~cLgVTj zJqOBg_VKK5-yq_G3|O@`5k39ZJF~ims4(fQf7OJBmP77poQ)ul68>G4?app%I6gC} zkuF}q975nmzoS5Hz-Yg>)pxpyNg1+ko8&UE_;~n``b+I-t`n$2aAzdRdZ=fGB&)Hu z=T*`$LmdqPhpY=jQR-oOxdhb21z+OxQ<{}@^fwaL5h-CHvQ}9g!>LNEgs@qR<_d5< zq(F4HXghg^OW#wK=K~`(mq&vF^H(+;eNhcsCC=;#e4H|*yLG4E3$$_OTB3xHLYaF} zKDe|6$ON4+SB{RXzaasa4I#a=MdhxWnBLXP>FQ~F?h?na)TGyuyE=z9OfR_H6bUs1B{o%|#cEV9VgauEqh zLit{&DoBX9UB3SyB-FAZLF_z@hR(9-RJ2~rybz<*T9u?B)Dosxn^ z79i9%`pehffBvWm5T?i%1-9jC6uPS~h-&3K+%eI$r03`}{vf zx(RUfO)w@zIdqFZk>--bPV8Ibj>+D>gPLRg%nFgJno;V_LpDx*_oA5qk=RRJodod2 z16wx8_EUvq8a{i99KNBu`Prihpb#)s@iZi1vPxlDQui58T77s}y#}9Zj1HDoswJap z-4E|_l~yWWXQuARbCvdh)o%vvZRxAVGffIlYxuwMj3u-o+b7QEnM!I(GfJsHXUj>g zn5v%^_PC4Xv>i=is~9wB03$vm`*Xv5SB8=>=0c9;hE3u@R-}&NQF2KRP=YsA^kQm@@`LS8C z8jI_UaU2Dc2j&@Iu4uAQetDO)=OuWCaOTO|$PN8n{px!Z9t#Ml4j9wB5;T$JR7|`s zu?ZHrW&;7;yX^|rU~7v4r$I%{nhn;~=*6PyqDO`trW@53k@2`+K>;+>!cl0%5q5Kv zNE_VMZ?OmV1W*|6FyDL1(ppaCq039hGF$fW&Rtxt@zju%L(`_v?yo!aV+TiA&k#DT zw+wk!O7{;Ji!76Pi9G70^?{NP5>po0xKw7DPIH?7kFmE5h-=HbMGJR#ch^FLJAoiU z0tu4fPH=a3hu}_vCAd4mU4py2yTjX@?(_Az@7{j*{RFCtRcoz1b&N6VJerYki_qS? zhVyoc#{81mYJ_uXVdK2MUDdyv)|scrFvl+s$J{FEfA}sv`#{*^IiSL#Z|PH`K1QU0 z+j-H!0+Su2j_Cb)Mn5N~#X#4tmb61?m()*D*sa}RZX5+^_U4>u(!n*69R)>nXf8VcyZvrCkjPGUjw75=s*835*o9BsndF3CN}~xm>fh{4Uupp6%<2heZ0z8*8X*hJ#kYmI>6LvQ9TD)>I>kJ*RaN1g*CkQ2`57w*fXNZq$*B zjWzSSQrO33Wypd~*SDNNF@t}~d>31dHsS_0{Dv>}bUV}--TUb_|5Un>h9p)UEqkvj z{iI=s)VgC=FG~|*t$Y|EEfgoXwS7S^rYjh&V3%jPHJG-8A1W1NaM%&5z@gTqK)jX zX;zV$7I@ga4pNrW+tei!+VlkUM8E%jP@{$ty^I|`f?c~JmDZY7UE(s;{zcFK&S8CV z>9tK>cUS8Ohu2NChXTh1vLPv1vD0yn=S;Ris{h6WaWW?3nU+psXyRA1eyHxKx$Ps7 zvIQ%2a%y3~G28&;5}&npp9tF%R}qIwOl&K>YB2%3FEDWKus_>o&Mv!W^+Tl-FsgCI61lYlr9ge z<7N)M&iu(JD-izW$-3E9uuyYhcHw2^I%)6rgN}%8!xN5*!iHM?tOL?wg(Ue*KF zCv92V;;zXEF_Dkehxs|&hz1u`pi2Qg5y2V;^8Ace`ENYwx@@+udw<~s#Fv~~;fj^b z{`kDQKs5g>qwp7JGT(94J{$j7*7KdtxQUH|)4Z&vvVZ&%qj&_!Hs`!9qw=z{6~to|jXP3yb{y)t zZO>O_mjnVtn`ILPO(WJtO5^j3f5GmOM)`KqHzIS6@=uH*^TX-BweWo+vpHM#VIlU7 zTk7~#pqD8;z?QZH#5oH~VK1I+9@fI+odxN3?*Q4940&UzV>)`!BWXVGHaw& z<7-C|IaiiD$#UNp#5nyYl@~4PeKe_%Qcpvt41{IM;u4i~#3^F(d2H*NgZ*;V?@sNv zRqT4s4oPvF$h3=)`FN}+B=78WR-CSK9jr+&4hoNF+P9Z zm1|sV_)#(eghrmlNnip~@z_v5nUa-qrmfDCSx49Kd0;~59>w7=fjQ4dl2l%uAme`H8BS9q`g|ErWn{@8_ z7;8TI@MAOL*wYB{te=h5+DQ5%CR9O2qm@f)LG+um^>&R196H;!SkHGH+F2y-AJ=GQ zQA!Et!>U`KyiOKso=yO<06OVAB$?i>dTkovJk=f16%$D(A8Mc%dnn81KXZ?&;yiITm-;q72gr zoE7MKkKHt1x8ef<<%Np-5={ux0(C#&(|9iC59=EL7U4p9e`-AWyJr!H4#&F=p8}=W zRSJkTG?B-#LqygbPj-8FG9C8}`B|T$1_hW^tn9Ty<3$zFiiUGY4;&3MC)t^dk6T9( zW4aI9s_?Dsx{wrHHj#@#F;6p4Y;ogsAPHrt&Ofm+8P+u5q|C50*&WMaJ){O0h9X=` zv?m-9bDVqWyL-u6kxa;5h097+xjpCi#IeM1{ zTfYmH3&yeF1+W-6zz?!8u#_`3`cYG*wXMCue1--b#$$A_=Gk;dJkulQ!OKm zYEqP8XbDtGHOl==jHcipI6BpIvA4v_2Lk$`WnS&!qa$h;^H-V|H=X{z0oIC>imeBS z%GR)QExP@EU8cxl^DlvePRH{eNFryh+k-3LSXIgGrc>AHMtBd-!5{d(K36Khuz5Eb znHm4iFInLIy3p!jUvWl$$y;uJ%e#;{jHMbkIHY0d`z~O=c51nvb#a9suru>*rmv*J5K2$rHQcKJ4r<~HzQZdf1cL6MfhcKORJ1v zxrg$u$-96fZfk4fT>06|Eg)TL{!TUvMWFil5r5kuSu2Ns^W3;gz0Vn-Dz2**B_CvcHhXnI6*c&(qu zr`%Ci8}t*332jl^8jnn9H9??t&wUrN**GrgiyOiV=Xh1|kj6|b{&nXzlsQ*si6+iy z`NqzWoRg_HO00soGeOT`$|XJWMZJJ-obV4Nh@VhcS<0b7Q{yg3S3wF8n-emrK0je` z>|sH;11|Ae$*2Yc0>~7<#M_I%B9bp)bA4FuKCSOsgL)@Xtz63!%aA^c%*?xOotswG zfMi;!U2F%F?lkq|d@1_dUOVe3BO3Hu!YUo9A}t_F+s+JTr0*XS@D);dHeDHOYAB+M z?P4U34rjSP(s{PK0D3@s;*WiZTMP#{iu`-jL!jfJ$|kC6@|D+Go>nof!hpOp&7Ya@ z0q%smKSAouT=^Ulyj9I-%>hicW0n#I`n8kBYQZF@ozg+LKz8Kbs(NWCEiR9ZI|>@9 z1Uc_w)k+*@3krX-@WWqP&1&*WzXyt~qcW!N!;+t%?|`JH)S^M`j~d$_tpKcYpDlE! zRTQM&w8d|vRR$NHzD}e%t}>|*?SkADZk>nqzpE+{1CAQUs3ck)%GpVPMus+$SKk9J zzH6G2Z#m~7%=?2OqF-2uX#+R;c~};}rlA3;<6c+jRV` zJLy~9A3YQ3-h{OW=o%{4=#=Jd`@FSbZQ!N8N|1_L!>RY=u%I0k(8-kWsNiBTPoUs7 zo{K4WF?G*Q&*o^*+Q&9D3d6EpQPNcBI=0FjZ?3`8Nx;ec~gHcaM zKMJ`fgTnMjpiv=q@3gZ>xIvBl5Kn%FLptDR7$t8MWVJYua!uAmXp_8Q-N_u@E{azU zsff%i)G77p##t{5k~N1HUHuQK_ieja-0$AWUO{1-*sgihh!sJ?WaHy&ty*LPiCL=* zvX5C=dtG2?-Ts~cANe6KKY3TUT)W6A_4g|}L?1d)oAu`0;*)+FY(%3%f%2H9O-W@1 z$@>OMD(F9|FY~)}Y7?qQZa{{R!Gf6lOd74-T6twXI<6^u(JzmiPJ&n}0NSJ81{3if z*T(y-aV!^ctFFii2Bil54%d&)x8>^t&j9b2gbJpH|FAwh-vdrs# zB&OccVK>tQC#O@-uU==wu?J{KRmd%$C#V@CP<$doBo68wK2jU|0A*8Jax%KIzws_z zS+BSelh%cAA&kLnV6UdngHyT~gBTqz#Fdh@n#vi_W)5Urh*5ZrD<9A$1kjLznAT{{AZ2n#?RK{=R z99xmp62iA8Bgj>m?dGKYU@m*(@foGXuXRh?OK>##_x{xN`}sKZ182TAfQm`*G{H9- zVZ)HOJ2-B&@AT8Z`SERw=>~na)0-GYg(G-^0@oB`)2kq)+5=IY!RgU znS@55bf=m1ZC`JK>Y}!yEOsDKF`y!p<7M>c$KA{CBfHtO@w8CBkhe(vmbTb)x4IQD zLiEwQnDMjNQ~T4j*mkVCkP+locU6T4Vw5Nb+#E)N13$C_)h zUAwe*_E(LGoA7noBfV}5&oVo5(QAJU*=}RBqj{epzd^o2MtapygY^Llx6A7TIHf~M zxaHXc$V;OlFT_7)H%7J67vN@z2snpA2DniKRv!`#rTQ5!&AKZonp$}%8(M7eDV8W1 zIl8K`c(h8n+kgshs&vIyjxQ%E`%&d`L_e}(^neS97%|mqzJN~Rv|1DF_kP)3M(&8c zFE7~d)|QhaeV*D4b*bcY>91zT(?E^GZkA|Q*onc{2EN9jw{XfWS!w|X`NYt>(oEz} zcVZcGg3DZr@9^j9BD}q=QAa&$`WFwIUBzZLu35RoAFFc=A$&j9H+B|WT2BKM)}cp| zmnS<_G37Jp7bgYGmKr;p_WqaWqd1Kkb_<1MxAi6Xe*Y%C2aK>wq&_+oyY5#o$SWR% z82&bCraMOlhvF|p1bPezk;+L=D*62)phYv2Q=|l)7EiEHJvNNh1~l{PzA~LbSru8% zsCMYJmlA)Uz%RIEC%7~MO6~A^JE<&NGuk7ny^uOANoa>nKI_J@6i%VUl0E1 zVlc~qCxrvfzd&5(oI8t?%}6+~lc@41Xup?MS5FMTft7!di1>(LAsce}_3~ZT-Hyl! z#d2NfPhJUY{O*>clYy8IL0R7X;5(7NwD^e{tB}e$E;Z$qUDq2Y-7NktU%POAsDySBJp{93+00`J<=ET zz~EzUi?AJRExV7z^Vj7TZ_`D;`|L##oO(W+d@93QT*4}LU0GV&zFLSAuCmE9aVGTG z@9ZH9SILMovoFA~%5 zjXpmK-pV$*!V%81q(YFBXR*UD{oOHNmjaM}?BDOO4Qs9d=7sxOARb4B-w8zPf^rKO zDi*Do9l=TJ%)EO@(%6C&5Qk8)0Jm~#-%_dhEgMfIgNtWDa3 zq5NiaHpC<;)sar#>T!R)ghT^bbqL6HF`N`wnxZyGJOf*jPd+cjmE&QoC> z0COVPZ>Dq+HWerHI2CJ^8nTTUpZc0Qg|&=?8{IKf_gK9%^^Nvt*D?2csTWp?_~ ze(o(GC48L|<&JA1Ky~p-+v5@IwMY|wYXN& znVyT$w|?+U+u>b%B4A^9v2a6^28fC?be;*4%vKiR!SVt@7zyw!vqtm^g)$Cd>P|Kog#cTTI(-W6n7|r|h#m8yJ;2 zZK>FtrMs(dBYh;tc!0)Av8-DUb9<(;1Iru4cFbmo4|8k5rtLd`Z1fwc_;l>+ z@-n_=#Tz?k03ZXtbxAUUE`y3|_O4uFg&<$>$pScBNDV?J{wCeKz0T17)T0((CT&fn zHO-CQX*F%R64miKan&MQIf$EBh~aN>6Mnr1aob8OkY)f#5Hb^2Mq47-L%O~s=hr%H zy!|X$=Q99Udehw=j^YE6;_Da4eQ9q^)R|9HsZFx5>`^amENtr>Z1kn{7v&UOct{EX zK3U9f5ZRVghmne!wF0Yzj?d3g)wsSi>sEr1Yl3b%x@f^K*sjt|MiA*+DcyNpnH#Mh z9>IegNISoVk)G;=n_NiS$)YWLS4P!$GHw@lx~+#;8c#MNciNioec3qdk;2@Xh;<$VHeQ+@W7adm)OV~_%1dTBZ1;ZC5a9(*Z&vzi zrr>37^sr_Lvbh8D?2dDR?>!Q2JHKDSlZ~;u%G9aEOPkv1`<)`BDaHP~MS)HSS!lQa zd$h@y^dw_kt4mywO}kaM<-FeJN^$S}9p-kYk2OzObKv-|l+s>0>)__xGlEqGBkLZg z#5y$x{?^Urb@we#Jz;pyllo=5{;)bB9ZXc$qbLqD7^~)trVq==ok2zRvo6-u9EPS? z@hqe>x#|Jd_Kf*&?zXiWJZ#*Dd!vDV?5(Bo3m4r63VHMemV+oOCi(IvPE*%1F*dI6 zKCMqwTow}y9nP2Fs>PCJ4FAx8OIJF1(8G^|mt_zm<1tCR!*i@Mlluf_?N9^F=VmP- z-3Gm%8wqA#ltTHzNcG&$g+0tYun@wN8TNYCCG38U#O3?0TKiqUn1kHtLUZSkd>bm9 z!YJl{oFk$er`z^RK*e%M`eW73C-|v`jCp7y5BwfW&91M|%z1Q-(}QXa-|h4>M*o^5 z7t#_?xr@L`t74z-gY=1}a~kf4t0`7U4vy&^3tSUd{i;peGANu+TMXJG(k^Z}Q?_Zb z5%CkBKKulP(rN5_Q!=VQKV|81zJ;$d#GP9$*4xr{>O`Pyj&5{z-$Dv@9d%Ij9IXlv z?Zq_B&dX??Ty+#0oK;Vz@whbodasXtNlRzRMCbC+_6$P6=2UCcLrdf7Zg67y+ZK}K zNx=APFY=nd>r0WkTZ1&uwW=dZ1?VH94jFDw-@ZjG2}hWlK=T2<;t4T-VWUS!t3a&( zmFu)j3bg=oQ`nixzLhuRGH))qvuQ#ri5YSoUw0`U(AV$S-cFb?^(BFZ6ntY!E~{uL{E=XpK`g?eM<<=2aG5OdxBhY zk_GC!17pn7$PLQR5^%s zZf|gKR5z4uXSSzIi+c@sXLw(>Cg6Oe=n2S!cB9`DW-w8uMB2N?oqf&ffPVL7@4hRlq}7;lWXztyp4^?qOf`sNZF3_yK# ztrQbBTR+GX>gQ*cI9>rDkxG5YkTeVHSb2yZEUAP&GmjMZB9=H@VM{SJd;}F<@3|xv z>qfdv7sz5PYr(SG?GL|+%=9+jMiHCEpNo&GA7Tb?=i$FfWp3+otXwx9lvas1XnpNk zb&pQVc(1xsJp-M56=XMIaVo(ZW{zMKd_ljy7zJb);pw2WA+6rcZ3o<;Pt<>)oAnd@ z!)<+mu8d*@7a|kY{HL3gcR{z2XZt1s4!i9$H6P={m!aF3crq4^WUNZG>ZB3YKOi$R zl>dbVtIc<$gj`3Tvb(ta?GMZzdXdFbw99haMj5SBWU5q=J28S+kp`| zaQwM_|D=rfvmadejB=v#DjeIz;A(4=7r2$%`CrP$Y@{>K!1JCJ;{fXhz_k- zo_G5>+yS445$Xc~2_}wG=7wu*2(|cOKSymbFF)Zhld-A%EPn`>Fvo?Nrx+a3_P7K^ ze?B<+1%GL5)dUfbJ0rbJtZlFDQ>C}?E#X6RR49@uEU!%M_tNT%@{ zhgz8jq82PzF~aXUPa^I+5LQyL)oUvO1j=Gv#A2eK?RC|L_~_8PxeZ2Qxp#cR_;N}S z?0d=w{9F}6N^|`}2!1m+!pgre{irb-<+I6!u!ikUM`D?}CP#KJYGa zJ5WHc+c@Qb*U=s^?7j3Oq#rw02ukk9)Dl*nPItudBGm#whJszu2z!M0$08y3HaB68 z;M;n9w)gskJHEEzmJv6>C`7f!^+JAi2piP)IvZ5oW^~3PY4x+7r_qqEO5-;VD4Q@@ z@r{a-A3hkCUZe7lkaogB!bl6wcMSU3snUx;J7mS?P(7}E(B=_+rLqOk?{ z_J5I<9zX-Rn#)p}Ol>}*igOqwSVmvCu(n#=3a@LK?MtMExM;g3vNrBgmUS=6oTEg} zL%wH`aXBimoP0jK+S%pV69(BwaBgs^64&e>mJv_e_NceL!^uxxf5}|-UOQ?WiQpCz z+t_O|U$Af=HgNpiZvF1T8ndnYVWlX7Vxy>cAx8G>R~t?myA4jc?HfHYgNsD;2IJlo z(s{FI7J*^Of(Vn})2c@e+G)Ml8aCGiUY~n=$esiB$9BVR4Xfy-;o%`D$e{z;Hzjn> z4~SE9rKhJ+2`r8u83!^zeP0Cn&Cyh!KGjc&H-EGRnEozPiseIg^9Y-7Gnq0$HbF9* z=^z`1ptA`b_1Q;DDncaN2f_%+#q2)>eSM?;iZ+r7PHyGI%74OG^jN(h$@`O0D6MQR zbJad1auPvtB-VLJ9A1T?L&l>(7~VftPOV`QekE}G1+*2&m^zpxFgu%~h4P3j=!zUs zDEBs!`GlGFQ^9KmYI)L;>%ZKpLls@ncd7O}80VsysgX&)b0J6G9e|~?e~5k#8x5dt z)i2lfHT*8b)ufMr0QEJy?TQq}T(UNb3*D9fJlpbp{C=FSqBG`5I(g5$3 z9RU(`u>+s?s;OEmUHnd@+reeu8c!I{>RbAS56!N+(b^wDEyPt^J6MO{`1roPk7vf% zu0G*yZh|<-O3$KN3j;y{d@<7}4UDK#sC0k6Xvuu=Fi9~SW7gMIjt&m13pF7c)#YQM z2<5SH2sI$Sv*fcj_3GjO!DGY7^y%YMzLjv4Ophx$(zHq}$^r4n@>v~a0q3lN!S-o0 z-kTtOjv+J56T%5{i>t?^kb>~ggJIqkXo4~(3PfQ#*-}a|b2g5TNlan36aqUUc7!^t zY-f?Ty1d`%6*K3e5OzNEl?>BzPZu+2*C^ylH*9 zOnaH@rW+D@dK@Go^SrsgJ)wQRUHCl_ki!SZ*DJcwt004y*u9{Qk+m)rs`~HiBWgf# z>K&;zmZhbbFkU4&Xf4kN1A?tmc8bu5EKB@!M^h^zV_z5u<4h^hi^dTCIqnnKfGZV# zE7n9~;T2na%>bQB=xc}QlVAFA3(2>UG6vrKAhkvFmhV!R44Z3g z>d&_E@`#5_+I@pQ%Wrevt$+tqj`~mU=H?i16NiaKxyu?TbX5ZwK&e^_lbJ!}t8jSx zdMaZvZr?usdry4O(IF#4+FwvZ7b0OtQ_dY z3-%96U-ERYVUOp0PN#}8ks23bZoOR}If2GBe}gsQ^*$1M+a25o6T~?xSk*nIX*Je; z73mysag`Ww*SsTMK4NRu_7QytM6A{WJ3PE^%i7gq=tS58pawEA^nGD)S8b|$vDa+3 z!=P`RQAfg2j3uRK{p}+cn6vjZ-0RHW z@}No^MK?NdTNKiG`U9&y*;{?#^t~+1i&`hA3MaGDSjEHW^yguHHi$3k*}E=`8r#F*f;oGgszksX=d4#TN$RId55R))!!!hVo9Yy&3n!@BWoo${59<9dkfot5@46E&UbI z{K#tO2rb84Dz~-0<|2Et+547TodGgkZ7ZAIUg}$|&afi->Lah>OT$>bToUVH)gj`2 zz+16@{ky;J)CVL;70{#gcVK*vP_4&e|F$wQl*nOuCv!*uA=4G0v(8f4M>&EHvqg+? zG+*}0K_6IaAEBHizyccm>?zYpQdwdkz%R2&e&NFYX@c%=KvAKdZD(Cu|AUQLFbnV#2kac7da zWb1Y`^k4pAk^g6t{5WIWoaWPys%(IXV zEK+;_YCW87{nJW3xqK_JbrA{2rcSKh`Pkxp)ARj7mQ4qOL@?^psy`aJe#`U(Kr8H$ z@gV5d&DaG%Aq|w?7@1*#o9xsxh?zLDtMm&4+bh8pYXIo$o@I9s6 zy)US$*Mf-niH=Q!(8!L(=m3Om%>r=tmtzv7IwJa;eX(tIXZ;vd(p}>0kvsGtUL1F7 zp(lX9(}3A-KyC$yYU_C2(e#LR2EET&Npp4o<7qM?qN!&o<|3CWY-Oh1 zfR30bZR?b}R>}E;^^)UE#v5Dx%}3xMTA%MNqANJz0EPJ_ zELTM9mV99t|9Jrad2)bx{g=Iic|AeVAy0rNMGX)-cQU_7-T~Yp`vOIhaddLpD8a56 zL$InmxEt_*2Sv$8Y&DZAeFJC7(MZ|ej~isfkf$F)0DB+Y28{4?NGPG=eY-e{1IfGO zFaf})oEEk;1V`k`B@P_Hxh<$f=`Jai9-~{ddRndc7WwdPxwvU7JsX zuv8Ver(p23(Fb$Xhz~y*#!9_`8gFtw0cdip`TU>TD6S7F|NhSZT)%S^>Am zf!Ab7?CV_+p+*6s{+mHQ0W1Eyf&hW<@Hc>y^jdBA zC3RQ_II>!fQ)(>9qgcH#8=e9+K5Tir!!JN@+Q~8SqirV&FW`PqNxP2XoOez;(cb#5 z$s#~}C&soZfmO0O0Sf}h{M`m7u-#D9XD(DT5fEMLS4t}Whu!^u9XlY7ZoUcagMx;4 zO=>>`mI^`yb7fxUU1n*|M%#;7^+ttnCzS(M4~>AM>-&q1T{kQ2Esi~f$Bw+HS3is@ z92#l!xHQogC!lJXnvP&&%Qw_Z;=IUEkRF$X)WA1G@^(+;5tw%);ggwF0sr0$!BL?b zN9E=DNsb5E1{Q^oYmm9haPZd(y2+q&#Q()Q-%%;4BKnx+r@#jDz@ORbtD?GDK2`+w za*Hh6RSGhd)~}zgvFU%##Mz~?=xGp)GnzyOX4`lUgu$U=EhaO-A0$GIJ@@er%=}Ygqx0<0a)cl@0fJsb_hjaGLN$R<^B|t)|*`K zNvJoYvVtVPLxZ3u+@sXnu{ix|;VxV$ceo}Vr_Vw_Tau(~Je1Ogaa%xSw_2&s>iA|i z+y4!H`GlfChSR)R`jBqKc82q^-CM1F-mYb8jQ@j~2YmJ42jpummYuH+k{WBM!qZ@1 zUIU0z!4FA%+sRN3e64P$$o}+#c8PgyFVF7jQ#LisNsH@_1)dMrTW^Fi7aU^0sWR}M zt@D%N0XVYStI2$F0HsQ2PRwnNJwsy9(AEx#G@H?L=ctg(zP9AN(oKfysSQL^cmUx( z?)=7*LS_mea%+_m!eWU)#g^l&$yRbnp$Cf>%KkFE5lHy(A(}$*ostqf7Y3vq#H3_< z@u&ah?5pXa&D9~sa-}Pz9C43eXkV7MfOOC!UV-N<8^hF7$?~=vc^jL4O&Rzw6X@?C z(~-QqT7n%+GaTB{f9@kAkzWB=O+{^!WdVIUYl=0?<0X#d;o3MYr{{96m)f4e6TzC}kzQTbsulf0&lyh|MPLa`)`3;u}>y(^>e) z9r`q#pt}FTs!QU33sfV6e0Yc=VSgZELjK?OZOj8b1~U6DB2e?+Uzml^x2)~?{`Ii~ zSOF_;2PHtH1jEeQ_IUp4zyM=~&ugVE=buk=)AA#-=KlY*2MWRM*tGhljffxqI%ZM$ zNgQ85a4Yr)kiR<)e~Qa;^#X>=QN4}wII5XxeY#$VA`xJ%oz(|&ma$3InQXjzV9MAf z5P@+L@2&zt>?cet$`!z21G22YRRG^U4a{&B_a6m{YFUQAx#5t%&R6%Jjbq5kRbmZU zBOuE>zRsWSC3PRVc%7&rX;s-zi(3V77l?tTex~LHbhJhIk^3-ODZeRvA52UpG{u-8 zhA2VXR-%?7VBr9Ae2PI7A24R?c0}NWTH)(d@s!}j5a-kfRhl!>McPU@xW0_H=7D(M3IJ7NwAY;8EOjy42u z#sJ;c1+Pf14XpGR&V92ily|0s_73-jL*F0avT2?%7K6fJa4_;2ZU%|9dCHre> z;@Q6N<^1d6Lmi+!5viP*W%HjU?-CpKi+@%!&YI>$#!Uia0A3Z9WvLHJFGd8cYo^rY z)`f0?smv%D5Wn$sJZysqj89#tOh*Bu<^~MzbUs;r4eb?GaQ>Nj3IiGR=0@I!*GE_s zhw3#8I0Awk8kh;mYd|&yz@G~oRjcCMl&eet0@_i))nOZy^5Ch|ABvF`nFN`n+x9S5 z4Xr-{A(Me@Oa?_(`|Qe(m#SeNq8?A1(<@Ti17mmf%g6TsWF}=|KVKUDDI|-Jzka?BKs>1X zPxdPYs3-a5aYqE4JO-e=WH77l_kYrX9T926F8svpB~RaE=jHx_7SVdxi1+$*OqFpn z2|SpG0DhyEJc|@n+s+4+B76|AUhofWdMxue05Rfbw1s@C{ayFUiJ51`H-gUo#edgG=w8p#l_AgQ(X6#}~9^ zU>1tvTYcb#bZ>OqLCqvRF5~|&=!GFZil7exGRS}Z(_%?bxZ+Jvbj8lpN1dZDO4)N| znq{+N*N1bQ*XUY2%;UEUKt7FJft9BHroxD`h=0LAdq=`x9##amD5QJ1f?GN^^u=@Z z8@1kvpz#pC;qIq8$D{cvA~S^!zv#F~>4>OL9)O>kweIL)xb3P1Uw4?IzrvDdG%ZS! z1G+P*ur{y=H3W^_W`ic00TCtxwSA{N^x4miYF^AJX5nDdw}Y?aCj}>P;xY zXFWHl8LvS}1$j>ZpM_#37kQMhRa8|`-#dDg=$>8nxU&I{2mgSLe774C`CX}m@@!c9 z4^_AS(-s23uhzdNNI`vst8}-gkzarU1RQcbW|@zNz7ptH^`CdA^|Y&i@rx#f*Jw|7 z-PYJJnJ4S=b9{iRrsU|Mj8GF6m2|TmFkD{B)wY?Qt@N33*lybSLG1)VB8+y$QIK(h%#M{8?(>$WuHgepwgG7gCM_z zWD>VRt-e5?`@;bv#DYnS+5lzvNVaD%wfM;(2~=&7skb%{|W^wqiD^0>C%^eV>)9%H)WFz z5rmCELjZJ_{*!FRy+**YpZ@i`LN{n!ElcnTl)iRt#^W1AA05qO1IhHGBI(td>9WPH z3p90OOVe@UWJwpm*@;yi2HhnZZT2ZkljCLqiEf30fl0XLZ_06kdW;)D5z9J!^8~2w zjG8%Pqp^}0PlVSIct8OD;4Ax>X7j;V@}`QyO}oL{)s}WU=%*Svn6qVnn3jsWrY20laA_NN>N57~3 z0$CWC1>StDsepWaFG|2xea{lKFg#MLrXPQDz+e1PIpzdUda_ZH9oH z?ui@9(uxm3$ zeS8?$B|SuJw@`yR`2$`VJ_XLtS!#i|qWbc7khGavek=`WDal>d(#(u<504wNvd(ct zs_{(n@%bw7N!~8X8Xd$wF3qxMg7D+$fn;;8c?M?9-@wT-Q1Sg(Bb$7o!j&?PRYpt` z#dx<>t%^e5 z3sR<#vh+XOX*0m)6{p?)y5>)DtqfYLsNSR^ijVkW^i56QaJ^s|HB2ffK(RDa5mm|- zntknku>g=YQ%Rf;bW!KodSpdjCbxP%@T2@*Yr`M<^NU#D(5}~4bAHhB3v;6yk}@EEf_jZz(BD6F5I2F6bP1PICL;{1aijUu5(JZN7n z`r*};%e(4BK<7}7n1!~Rk^Uc-H^c`Ugn{yxBlVpZ^T}A_S+K;4>_dlZlEfd!e^3cn zoz}bVug?Rg4l~Bla+-HGl<@taK%nqa=kd+aetF)(h=#{G!}X3ePW8abL0C4Huilrw z`MzG9`57#r^%K=MP;Q40&l@O;qQ6H-7YyM?Hs~Qi&*5eLx6t12jS}UyIg#gA=0kMK4Eq&e7@vXW17`?R7`nub2 z{bzL3$&L8rdR9+?rph(N9^hEJOXAPQU=1tj4c1xwLdwVM*>Q=3M7vhkUDy)C5hJD5 zrQCS zGY%!9p^ay>!-2s$puLE4U@b6Hb|oI_&`1AJDu2T@~>0{Pp-~$ zvNK02eA*7xbW}^ksy`$db?_+z4o^r@f2IdbuSMYJ);ws(cD?v#Y0&TQkJmFTAiXIo z*k;S<*ljIbxyb9x4HU;GbsTc^IUQ;R(=rR~wMfE7SD+bJbN zXBtFP)b9PdTv-m_dti9W;gIq9C=X*cVLn}B1cA$k3^`mFp`S~$7 zeK<6|RUjJvH3E3e@VYU|%Ul~IT+$WNzw10-q0xE8%%mM=TG%x@pB&fN_+aM2jVM%- zmdoIRwCnt(VA5@W>lQhEj{siDz+ybeQs*ZMwsz*$`2KWt!DQu%t}2BD@%LwoXA=YQ zMuLR&*}uZUx1cj7exKLTu{+O$EFafp1g?#Mb3l3Ok`2E}Z1S+}+Ym`wqO-zX?F9)Q zC%52WpJ*aLK4!dpCA z-y#iudkVjCjdtio1=`qgOV7al8C38gX49=BTVlAK^2==Tg}%P3KpF?|sUVNZ!oZy9 zd(1J#;vSPgCQkPBn>C+$Ab*V@=nkFZb6bwfJ1O$P%J9;~-ph=2oyF9lzmsxJQQW*) znv?vyenKAt%166qVBV<+rgHGmIx^{j_PEseOg0+~>RpySl)%ikc4r zgpcW1l>hcHRgeEuQ&2+p-K>NdbsS(Q(7t*Y#pRscXj1huv4^A)a&usX(9a2E2>Kk` zF*AqE7V&i~TTFVDJ46-c+CJFb%OW;uPcql;)CJ=o83ui*&oPJ|A)NBBP2vs#DV|~s zUuXfz%3&!Ve`p@QcJ^@BUbvezv=wIUpgWq~rU#6{07VJ6W77eHuBJEWpfId0WF}dh`t>X&h^>eTHd@K^`AOykD~V%UT5(`P z!S-+3Gw>4zg;O>*JP|%*EH(|+VBH~p$q*Zn;2@7;TUTex&Gxwz(ejd2|RaSVZ!Sh1ADWARZ`*G?UB zoak-#McFk3TepJ`rou16TRdh$hK19&wrq7(qnz*;t`jQDA<}H{rvIi(%!MwKk znrmcCGO4C7G%T|JeBAH{bu26PJLO{^y6=rMYO!bzHLW&ipPar>I8%T{ zWRL!6w?aILD(pmR>>ay28@X~w6Gw9VcT4?dZY|98M0vST%H#$F^1cIBr74G}+eG>) zzE$l>ZnCY;@#hTAM%)R*lD5g6z@KcZpoVK8Dqw)SSVUZ?=V54Z%Gr8zt+_3>lS@kd z5VK=R((OLlD2XotH+(ViRwP~E9Wg`x&dgpxAo<)?fJ(P2CbKRZ!oMeyBvO#%H~hR1 zm4D>jDtPFcb}~^f&iDPR6w&gcUlO*5JX+@o_}h&?y*dqOa$XZ>`E)i*4Y$}zG%2`9 z^11aRL9E$?-&xm8tNWhp!?V(uP0`Ga9GI@0X|NT0b1^UV;K5_n+ZMyEn4*w1O1_)* zxb9~xwn`XMfTINnh&^db4eq*svgKqfA0oMBT(tS?-iN1Up{oFq9D#z~wgORVjxpE> zCRV%)gRW(>l)QhQ1J$77)>@nWpC7?a26Cqn_V)iK`ZxIyU)=>4M!;RDv$8u|nU z=+HsASJKzgDrtGRQSHn-|#=aexNwB zIG`zuHFT`I`H~tCz2p1@NpawtS9*?FJdXN>lPAR`dTymB%Q}#@g3o{Il1=QpS25+3cWy3zd(APQ=8;386b1DJ%xUfo z3+Q+>4^X>2SyzknhT_zb2g@p{dNr{ZtTT+~tIF=3qT}9D8P{%f^$7Tqm1HqDX&qiYc;1m{ZgXt9Wzdjx{%)jOsMKQM@7gsq8%m;bsIEhh_Wlun zj8s4GF85>nY>Kbu4x-+$RRRH1lQ(zg7op=#iBRXDj9CJ~PZoq94j8j zMDaVs&6=A9$_|aq6^(1a*3Xgvn^&c{u^b=4L2R+VH!NFPC3_Wcxlv@jO0vYx_KYY7M2_?{gH= z_fA9Y?M4ly|8eTO0MDwc2$Kr(YpY;_!(7h?0U&kC3twqoCVqJY*Kq!A9bxq6Sdy@Z zL;IW73krgV+t$xj^Dzwt=JF78@eirbrN{^x$)b%vTbp}S8LvTdF=Ot zsgpn?Oc{TJGXpwU#t_emhx^~|uwjTf3G3fu(ASl0z>OyS_ePsbfZ9cR70ef15IXjA z8f-nXLKB4Hwg4*k$G5o8eDBaLh7w;(I%=z_6O?p@4dA3S>S5`5m|pV|2wz+ymYv^#R!EB~_2I3R2O;JfjmAJC`mUGY<8ZzCy?|L)&>>$d z;q5m7^4w56f5?lm7*6)ccUxD`53-f@3*w?#!mY-IPT%MN2t$gp1sS^0qp8pLw=SP} z7*kwSgQlrb&?XWHZCeq%gyb7vE+-sVmCPfesf(V<_Tf)tX{C8W@7`Ye1I2zF3K1ja zok>}i4e-gUqV(Q+}=6p#GJ3XwMB zrr~s4;C$f-2oKA-(Np)a0)<5K_>cb0*^c^#O)uVP2|k%Q^~X?`o5+=pVW=zbUluRE z0ayVGN_}j`l%HTH(47HEbhMQyVdByak41ME{cYm`!QC%${WCDRpG*URY-9Hhfc7WA z@cFJJU(2~}-))sYT>zMYl-WB<0)&N1tPAvANn{R0Kpo0ec3nT{+nwBO_6| z&zld%kA;fdz+5Xib8Z=JLB^r4J>C?Bp13D4uq*mrmQxd4u{rwWji|xP6`tJ>o5Xs_ z_5ZEdn<7Cc+9Xi+BN-fCI*F1cEKpVCSg#9@k=8FL&I3my?E`-uf2%W*{osCgI+%k2 zodSyG8ZRpMZ!AjgR(McMkv)H}Up5QOel0|a1^X!DVBJ&qMs7nC3v+%>mmuz;0dG1N z%!9U=vDf_%ue=L036)X|g0udqtzTdU@2?^A1o~lGei_;s1E0AY>}0+L_t#4Qx%(yC zG1uFcxCTjObp7V}-i4kSjfPzWw(g`a1OMm89FO&X%|-*T3kj-mf8+Vyf6OCYto1K8 zsTN*{<3fq>t;lBUT_oR{>dvG7y0=p)SnD;!HFx?J(RAYAblnZ@1vSOQWe-EHONjW& zxUI%4_TQ>PCoISaN@v=v5+d<8;=*miRJ@IQHS_BnIP!!bvJ6Zs%EuE&Q{2hn>*E$6 z4Do#et|RUn%K||VEcrAaSSKwoMNCy1S$}`>e`PIb$hVMm1r9Z1!W+RqZ#@+mbOiJ` zQ&oSb3LstF|N4h~@!;*uU7S?8|F1v(zkD(E3=3GTZxh;X+2H>7_x!)TC@vJASlf@> z|MT1ZpRe1f4KdU!X+8w}_rCf+|IRt#w|1DkKH_gX% z6WQi+A&}$+0LaU2#0aQHDYFMPpVI(5)EtxNX=#Fm*3D73Y_4y&;$O!cN zj!YCWfCJHTaV>z8lJE{VmzJ2qL@oXJhOFilS}s7(O%5E(cyO#oGbYhh)7o9key$-&Y5VE(-&XK+Xk2} z{%uWzBWQx`c0mS2AUHiuy?5|ZjoQFv1~SPq@Oiy~pw8cR_k+0zc=Dg*pT7Se=jz{E zE7%Y2!K^lQvg(hu3ZCooaF~Y{CsA0NpkTQIKA(kM#0{-{RP?wFp9fp{_{FQ)(lx-z z?d7_weNq{ONKKjWzbzak#_3&wZ5zQ>MjQ{{m_^k5V(tZC5hl6Kyn%M~(_55&>_$Ge z!0&7rWMABZtsr|4dF9JnW#CHg0YkD+C8ZP?z@wvM*mQ=<3IJ-=m%jmwWNA6B+J^?4 z=*2Hl-Lt1a%YWtm6Zr8?fO7-k^WC86kpJVQ^Udp(m}%0De)u$$zVfSzgq2V4Z*vh0 zP?QH?B(8#D2<%waSQ?Aj0e_@MEHOyxzD+>_;%pLYpPO~}+SBTa+zqARVuyBAGq)~w+>kfXNi?&FG^gBvL`KDEK$Gf#&GKsP!V1;iYXk8DK{)LzH0m4?Zo1-&kR1BBMe!(j)HqWgzvec|29nTP06Myw0?{A#R_fdllN{68nin>K!p(7d zwEQs;9O(^czd-kvtU&(#)X@$gz!(_vAwQmgg%-eF;+B`Dc?sD?3zj8pokC^^nM@Z=dkq{w?``nfKVKT%VB7TiS{O4a|b<(?D@72;csZU!t3vbcC1{Y|uyO#(eL=sS8cuk~QCR>Ofc z>Fw-BB!#%uP!b_>dp80J_yAV!_;`$ z-nrT|K;qMmFDc{yb3CC?1&RCwk0L=9TzVeqqt$j_8b%InjZ03da`DY5nx{`6zxM$X zs1DrMv`-327Fq$~DUc4q8wLtz1n0Vcd+Xj}^n%Ypq7C(@eej@A7qi3)3I0PPJmEEn z2jE=vIi}Fg9SHxt&~EMq3o{Ci#unM!g@a4Q{cmX}7V|oFqa%L#=e%rQbo%lW5Ed0W zX|o)EpDq1Z`=HSpV`YAt-x{}LmhG|?FHrA741sGK0(!OAO8=k)&wK+gIYog?Nn2#* zva5K#6vutEVyhA^&(*aC7{YcVWaQ3}zlU(u6Tnhce4^3{{c}yiF}wKCQ;Zr+7+{;V z52_oU4E*ekKzHZjoquMB^kTSa6lCk*|0Mfnm8yDj*L$4YULX~mb_WzsVQ~AR2J1yf z#}|j%w~^8go@-o5cc!WdN7HV7Uuqf!=RkP8P{-wa9Z*p|K=2)~E`UTv8){*K-(Hb7 zN~UE}QUrF_8DjcNd9>mW&qakIpi7eaU1PezW0e-6DD^W->MU@9eG}Oga4hgwl=>+Xa4nJ|g~0#1 zT5qS~CIx&bmlwFn2hEJ_Cw6G{0jwNLnA+wK4l5Itafxdf+j6x$YDk4+$?1?bB9t>^ z#*saEcljakH8FLoR9a@~r){GlfXL%FBocB_BNR;nY>zP2NNGf>I5T@i<0&@r+ECI7 zjcjb?@S9FrI_idPAtf~hGT+0xI$paD5iWY~Asnmv#P~@Y-64Q=06geesGcUE0oqv$Z6F-wRR8nqn(gSj;r_2) zoza!U_uI5|sdHcj1j&ta%SHsD3Oz*%wtyfGgIe6(u=P)HyjZG)Ck#?sV#lH%cyW98 zgc60(3^?{~#_W)$lD~jb;}Z6PJiWP2c!t+yhgKNQD#$Eqvu@U8K~ zMECqQqZ1``#oHVpfRH|QxpFtL$>n;8;0&3Xt zEyB{v?M2*6@T^WB>WDQK4s`YD<>&ZR#?=f)3kGS4z3k+?q3!|K-UB(w8qj&5p}9u@ zY0Zg$(3(;TR=~h2+#SA7)_U~^H1JMN(W;-`=S9f*T4_BTb=}z z#{kb*NT#x7z_Y*BR3OvQ6x`q0#suKH3;$&|B83Vrl;n1sE^emQoVNe}*#1pa< z9Vklbz6v%&xwuwva{3o0Z{~q+mY%97W=#&;(XNsOmB4^{Y4_MENs6<~Ys>mv9ksQl zOV(c8YH_3RMLuu6%R9K<3`KN1hD10MAE7nLjjoUk6AMRJb>?nasJzGP{x;D9fb-z! z%s}NjcU{(Ge4rq7PI%!daB(m-r0*a`F%HkPqwB@|OC z-5spbViCqL;x2|VYtN|m(0kJ@pH=-#P%P+OK{X5%LRugrl!m5D5-(G*_Wj>-Q(FWS z=GwoJs{Y|rz97kFa3kfFoFvEN=yutB*-?OF3@1eM!f{ZrnnEOdrP1i!H!$U9UKiet z>*0W1e%ykt6foK#ijf()(@WBP$jr0jAVjduKr~NTM-#*+=#(IqF*|}A(_TOuVRZ^Bk z)m)iXe^YE2+KMDbmgt;c2gGbDx&*l|+fYN~>mms@Mm0htUW!!_r?#%@#QVvOv zbRx1T#z!k2%kNJbuDYh+;GscYi2;yM-DV7ApO+&L;0yB!gv}tPJ59~7uxvFC;Q~|un6s~gd{1Q+Kn=lqE zVFq_@2BMQK)%>@CoWUG5qL2U~x#`+BLA<0`Lj67tZ26sb#45VST>3Clo%S?}pTLFV zf^)C@b(xxT}stDc3$exwK)mnE#O{Xsc(mXsJ6 z>DRfx_BKUmN0C`)ck;u#;*GgH4l3kNQe&~L7p*hKv$uWUxkcG^nIxb~@F$90>8V)T zPL%XOqxO>0_^{8MKOtrij)s)xM)F^`PGvTKUfZJfkw|X#gd<|pNadeE;GqqUGrN9P zyx-(md1|>8UTyzg`lfg&R1$ZUw3d^R?@b(LoQXl`zY*|-Sbd#Zckqok>5f@WH+ne? zi97P;DIFwsR59#KFn8kD|V>f(Iv+L(Ld(l;dX) zP8$dBS-ojxlNDIb_I~A+Aea%}AfJsglT#>$0KNp9F z6Gc81A`Pkxkn;@(1zkp4HJl*+FwEHTuwud|;a$IuB7gJU(|<>7X8$nLu%Q*~e;U`P zltHKg$Nv4OG38mWmO~VO)Xkf|Y?@<@y65}YNgUr<2>8KjFsBH|<@oFK)_bhi>^r_E9uf{#P#|UF>EW)E95{9+H%q8mKOlRhsxh1x8rRixND_0kJzto{kQ~ zE2DivK}i>&4=ePCmM^_|&*n}4k_zVjWaQ`1cpoR>ii zf(fGd5$LCVmbWv(AR$jQT4#N-oAc<=DgcnUqB>mjqW&z+J>DK(^Z*ndB^{0bd$Tko zvkn?A`NJGM>QqFW*8wd)gB(I`FO1&#O6hGjTyi&@g5?WTX#%axUlAO^{K$k&AGm#w zL>O^MOP+US=VVWOjfw{3S}b3NRbi*` z^!nR4uX~LW7IRsBs}eu=w;YdzFb?F-AUP?jS-6EDQrt53Vf?x>I8`q=g_nVQ59hJhHIIM@4ka!aby6G3L9 z_B5I4mMUlRzjqi1LUC$`(DJ-6EYqXVuF+$=5AE>?x`+&mtRM@-@nLHe+7 zT}Nve^72lyH}Ob1g~i)31zzWDmd;)CSsLOg3R0e*pBP>&3Vs&8RSk~_HY&O2%IU;F zV_XwTIyxkCFAv5lFH}fEVmHtc>-s{32kwAk-V!rF{0$#=?)K)udJ9^E5tug!UXNf# z{dWpJ*g$$6V{gZy((*^_KZ;$gmNa4z9-fmG&@ftADfL{oaHG6Rhx23fg%e)g?O7bl zcEL&PKI#jprM=HoB>wHdu~Hh@F-}ANJ>n}Kokf6b*Ln8%XT(t~!M8=D3q~adiha+l z%)br>hswfP%262&J&ep@-#^wC^qFIIda1(rj=FhEkx;cL?QKXg#^IC>IsVqM*hlpt zUZKmnTk@=>&Dy5J>ZLlhlDvtA+rHHH@H-z^}0_?5;y3=ile9G!$G*VN@q5>DVF>-l_g>y(qw= zdGafT4(y0tRB+`NURQRb_y_mTL;fbYaeJs7|DVWb5;;JEX<&E+tE#JK|el zt9ta56#hr*gj7BZP*tziXC43Ov6^r$=!tMy6#2in&iw#yTo>Z`o#*PTCCwYuJ1qDa znMyrt%`bg?vK6a(6WgMHa#i+r#i(ZEO$a&h@Q#`=B)u1N=+4%AYSZ9_R@SnQca7Cs zc@Fd}{4MUzI{edH$lNg=NSg7w1B0-a*twD}hkD+$Pi#2_&dt((`)&h$rPpLul*yYG zj(;dFJi{CC^7IG}CzM5HC{cC`6J;66(iCQIHJ^O8;Kj#p?9?msO=3Y@AZ$>gk6`EN z0~LQkIe%`{{M4dT_WOdl6f`63u=0RJ)8^cTO0VLOYr;mJ|I&j0gXI94cBGn{B>6kV)4FdgcZZdKh9B?@LggzQJUW$m7SeLqWd=^%`l+-dkw=R5%(|qNBO&kybfD-hALaGT^S)jng4X!NDC!Q9SNGNs& z^D^n^$}Ie%UK6L!o`9k1LvNR7Sdt>@;=#5aT2PekgEYav#XKphjrw=@kg*>bOx)5I ze5}Nf9JlK}>_wVVX5?>`caY0@P_gTaz`fuJSrg8F3u;hj?7rB4-$$P5h}xMi2c*tLau=^WE{+L)WG`RI*sJmXbgd$=@kWg`d z&0B1>8I6O*S*gACK*DkdTU*7V2{V>kn3rdnrTU=Tbe!-#A5ffcX=MKEIJvp z=xgUux9Spnlt{PkRO-ykYk$iEMQpdav!fBPIfd^$yK347B?sRHjHqDbPJ!>$4HF|i z$P9Rze4ZR6Bwx=zsgiPK_IrCQuWjxiw|3@b>~Rc|6>Cv`txtMahs(SgiaEWB6~Ynau;!tY;A%R?ua) znDmmz7QV$Gl!eZ07bX!HC<|VCBNpEiTPOyjhx1rCud705Y6hHtc^9g!M+Nm?o95EF z#dZN6ok^5`0Dpi?cx)&4zjYfLXf9{RG^%JI-zr#wvMYZO7wWLE1sN*3&Dbd-_y#hV z01_C^))mQe>^|egQ{P@5L~8k_63}R@`v3X{gj=#r*VYN+rof646(~HI^46mP1Cc>= znheaARv+B!`s6K4C=p>V!Ls<(9;a8^l+srd8{Bvg_}`iwp8te@ZuczK6gDgv8f8;N@hH> z#7&|JW9c%CQhuC7hjmgqXD-jW*9SY0u#*3Ly!M2F6GhrU&iGc}-*C$AUDd1X@QRxF zvLsRv7`~iSu)?^~pzq4o{@RjQfCuza%&BG9K{6t;JIa0*q82ehdr2+0d(G0{xxt*0 zUO1HpV2gADAN})Z?mDkk-XG9)i9YA@y~+-&kdMig&*5ew`N`$s5QT^nLPRrQ#qoSy zPsQpQm@Jl@Mav)6^CVnCJ-3w-+Gza~bLBsaaHG=S<*JO>3`cioJXeW#`Vcj_N=Gsm z%vCZy{f>}JV8unI2j|k8w%<*qE9EpQFVw` zKbDzLt36#pyG~v5=Wk%v*ctd#m@4A9$;MqeAfkwLR{6AE;hsY2H2rnRaQl3;8bO4W z-6lLk=_)Xz?=DSsH$H-K24Ci|8^Tk9VdSDx5Y|ruhmox_`#7#u|5F`9f%k z0z*6sZ|)?H42RxogufmviUm=@`l4Yi50jaC^K&~ z?$ax#&&EuTt!!VV`u}=scDqP-%r4XF|5Us$Fre@5DE*rQToG9%YNSBneC-S-WLDSm zJZ^RPgVS6=OQIJN(&L{(q+e_xW)JbG3O`UcrTkT-SS(!k7p}!EZ}i8sVa;u zpE<9TY<`_P$ERK3w6vcno49t3N~{ih$+?sOX6U9-rLNMD_(Us_xPUkQykKga z@t#41fvwE}Zn5JFmenuKTXj*V7dLcsRP_SEO#RuogeSpyusBG<(+PqSo1ANf&mMrg z7b0NzY-8gK3<5D%jX;VQFI<_$DRy?YBzZ9XaJVV}gf-P1B}*g%bgzX{1L~;v**>n+ z7fS@wD&L1FrruX>g>P2!d=I>Ts`VdC3KM27HVE}zKU_F(hD=SeJ|qNsCKZS&I3aIo zZhb}XAX4yxdg1!V-@Y2OB}Hw(y4cuoaQKk~S^G;VAplobc;9c*$I5ox@!RP+lv#QKwy_{Yq3%{e?PVn|a?UN|y@FsqU++b+8M!MPQ8_#=J?|z<2>C}v#GIynG zk>QCky*cpJPSsm(3pbHVk7})5xAYu$@2@=*T`xky;9R*)8kbW^9^~Ms{IUqs>ID7q zIpwYrqYZ$9+|Gw&tpctVP`AeRJ{nlCr?DHIuN$xvVh8fAa{hZ&UXVjKWSPZBzHj%O z*QGo?_^xz3KYXul(VA!sZ{feyt=KbkLe+@T&>c6EHR z0hekY-UmJ)7iF(PaP{$&MES$kQH$;q^upCUZm7V- zLvFpva@eZT-(03Xy>>`Qly&|N$eH(F@jjq1o?YW9U>9O`I|Hv7>kSDn7?pz3Gde{yN?Hw(adoU#jVzmCJ>dFi06sktowWfM_!Dr2X?%5o~E($=^m z|He&2$O;$EJGGj*cqLUShU4$`U+ehg-lo1E1Lo!6r>XtHLOUu>B1{(sA>HR^1J=g3 z+hb}*G>PWWT73|sgUG<74P_Vo$&+Hd^&n|2^@n~#IyK180x{;}qX0X?N1e(1^gj|x z5au-=wCGVwDAU;e!qL_{Pq0;EZ(h7p4+h$f=ILYj=l}Fb&{R{oSX~TM33Qr7_@c_f z-nTtm`XWEQfJC8qE8)%gob8`#kMjmH>^7X(`r@zStMMD@;`4TW{m*m;zbDv1bkp6fD#8{ zRrTsxpz;CyK-`Xkr^ka7N62LXh|88F`3oLE9k_{xJMdtC#aCU@7q!q7(K%t?rU+-6 zSS&?%nh4)=KLlgs#o=R|JM2&GCyqWW@aMj951$0M2+dj$ULCefD)mYEWUlIx2;QI1 zCFm9kBOv%q1mbgJ@NNqYAYT|Ls2%^7h?P!w=@eLedj z1nDk%QV3@hthm>&&9nID_ss{Bot8~({)PiC8xO{3Cuh#3f=eIZNJAFIe_mJ;o%#eg zF~IV8323edAQqhh$6h^?vj{zpGf2(H*cwA%wxJW7**VtX9z7hfQO0$?iQ^xg-&5(uYD zb)>kdxCcHmgf+^ts;`Wx6oUh^+~>e=EZOeW@XdQ4Pu>n{57y#qe{c?u7bz?|eP)Yq z1&~E{1=pMi6JNh#-4*N+7#qZwCAskGzR{@+9s-jzc1OQDLAJ{k(20y|f5#6+nA|}K z7tq#x>kJHh5Wijz4g6GgSCT0114IJwaH}_lPwOL`A%6*q&L?yWX#KVx@i8NLoGT_1o?a29=c)q+RgU5}9e{;!;BRuZ1QBmJz@hmKh{;j>(J}8Ks>nVuwe)f(3(RD2!8X`a z&X}h#@&L_}+9|dgBu_?M+1jvd-4Pikjm~QiWjRhhfbRmgsbvUoPXQl6_7U8f z#OV(LwK+b-4(l7v&Bk3%lUoxgWP3>#TR!lV&+AR*Tu|sgE&+-Qn0Glr>pK~ys{kG; z_OgbcnJ&HPAecfL|EJ=q=N<^tfQNhVF~O29?5Cb;nUOX&XMI@0XT6#Hp*E~kX_jMn z9mfkEp@v*A0P_2$gV|VRCWFfDvMzaLN(cms4TP~Dz84GgZy&+EHwHxAULJeKBFUr0 zhC#5}oPog(FmK;LV2tYRWPX~numsW)U}P|ow2u^^As3e@3SXQJH&{^=538aH2MWpI z3J_1#NS2cl`4=+V@hG@2_ds)EaJ1CFATkX(FN58XYLk`#5W{*2&W*wCJ~UCyG&iIR zKrH$_-v0tBdT23<1o^z@y}Z*lb1|= z){YebK$ffxHj(Tg$cGyo8Xr9E11;noYZn6bVFh8i{H{+x%Xtj)VoE*zY8Mh95pAl| zqJCziu6e4~>VK(|5>t>GvX~loBPDDy?e5?H?g8K%%%4b@O#~xXr07Ld zZpdigupZ*0*svmZJP&?Ow-11zKFb(PG^2i;TRE@l8hNR>LA+lxa-2ox@OfkeKc%sz zhc7Tbhrf`lF_cVR;kz) zm>-__@q(1KK)LKe8WB}IXZQXyW$sy$v6Q!SG}slfflDc8s2v*p<>Ay@PA@A2*}8OH z4l{-8xAHG|8T3l=^PdqLStX2AR#-jL5|xmXFS@QatY1{JN+wQaC9j@=9V^L{KzU7E z2^gz<^UL%!nu;{j*4aC+hTB1>;cEWTBds&kN>Anm>gw{Gy08cgF()}8+la&8;Pcs( z;%X6*Gp`prjsD>POe_z6iv8k}5$X8t?PFh~!`EXl;Kd`83j!1nR3)3C@wKepD{Eyb z;#7~|T~En8(jte$(YHRR+Ny&C?K8F#HVPDqO8r;l_`8>i&)m@P{i=q0-f8=RQZ6M{KeMdrcG%XwNS$EJ0$w1P!|am%wO6 zAKWN)m$%Dm&-?cfZnxkL5NXI0APmO!JqrST^`(A=YYA~jM9X1pLsG4=_s*Mq0+_u- ztIn+i5kZs~8w+qM(zJl*+OHpT4hyyB$vD|OC@s^ajITc4RUClRgZ9f}8`q&+9rD`> z9bNsMG%YnQ1lo!Hh-j;~%2%rVi-d0#JMszj)<0_1306n$M(W3WMd}{;3CLaA`~>$b zHnwu2Wav-iI)=#F=&ZO2G$PrmYeF3n+?462r7nX+AH8zVuSZQEV7R@;3atVb*$@l* zX^|O72p72PjouGykh^q24}TG*xLYtoNa(@Q9w#Cb@JP7;u}0(9?JDF#!V@l>F1+~+ z%)TEPo^cLj_};}uM#kGFMotM!SA8s6jauxrIojhY92fJw+IH=KgFkco~P~$y|cJOxQHF_bhr$ABc@zI24T^f8Ym6_j=|(;C183N_s8h z2Dk=qI2tfj>6~>HyN%41I*>Q?#Q;X=mB*A-XLd03tyXiY>$e42AV4N9D2je9+ES#P zFy;0!NO@=&_R$Y_2;hKNptyR^O5zWhK{$PG{Q3<`@S%VADcNcN8W}=%Le6L82kG;z z%JZiz0XTU)R6lr+PEs}{qqEXo%RT+R6Yl6yPD-qC+=9qZ!S^9OTyY8O&nb563)lx;4$;%4 z#Kigb6IE`)8kN7+&I8#|+oQ26S>`)foA8ey+#>H)mQaDU#3UYtU4Wmw=B7>Op;8T@ zY~A?VrarSzeOa1Of>b076v?LLq1>II1Q=YX?uk> z4zbiocH4&@_x12QEL5Ud7Z~Hazk$dwNR@g>+(G@S4!Sr88HR5YCTh_fgn~q8Zhp@f zgB6B~wdx;`ag6niH8+1L@TTABAH9q(G>Bs)IVDZ>Tl8sv5cG3uT5GEPcAMmQyX8>5 z(*~Gb0gwn)k{~>?sb7*5y9U;}V-h4xfyo}|TLcy5Hn=Cg7QQ|8AJhxP@$J185=f)Z zy40^z`W|o;PBM#YEqT>Sz4~M^-b_{Vx8SGHyc^h!-ymfXk@-Ln@}8bKxaFnU_hE^p zXvwN=m^32~)vOE|hoX`!iT6t&CB_lY!LiW~%u>SB{jxCatYSj1BUr`@4G$NAlaTdI z6y<&eW?fnr5b{I9NhS_oY~D|zvbRvuCH3v13|BU-J)Ei1=HEl1idzs;;`>cV^0-V5 zWB6SGkSlf)dX0w|3o)5cW{#iJ=0}gGC{t>`(+WY|tc_G68^4FlfRabYA*&VJkSRI; zg$~F?OMUaRWFE7x+QmUaIq-_XgbWS?^jGbDJi7ABuKq@Q^QOhwf;b%6P8B%8pYB8b*6Bapv`m@> zNq9^hTcQScndV+Zi>5^G$?0ACn3$Bs=8%}H0&(9sB+u2ehfP9)MCbr>N@r;7N5&iL zl^ZUuVx$eYPkbLNI7sQX%Aw~GQ0W7w6}U0SCPkMYg1STJyLrbesFCO=g}D6aH)B=M z#5NUvzwC=1ejo=uQ7kW0V0v&SAnt#TL18{1H~b3sjvm_l`Q$^K7@KbFG&A8;cXbIjoNyXt&;nka1(V5l~!Eo}9l(Wqryy_(&4R@U^ zNdD2t|E?vWYDSUnnkW8*^0YS)^_lcfZqpk(6R6s#C(w&T%-GdU>*n0%KQe8y?KKw8 zqsu?FIPLkvjk(FSmZlih-uNBgrGHZf4Iqss+*5urVcYh|Rb@t{!Y70GViWJY$Gqr{ zSaj>y4Vk7L#eY>WS`4#dM=2yv5(g;^jXmnK$}K+*O$tFxd~wAOmVvTrtX#e|v3egH z9{CgH<;Nc8JZIt0grzQZ)aCYsG>UklJPU7|UM|n4Qtswo0EA^asC9+EbUh{*+TshsX}QG4S%L3!9ib+%OisFc9+@T&;g#b{B7 zg9nQx-A~x(aKg?hQM;j%@wrfvpZY|PYl|nWpPqdaJQb}RTh5pA2a3wbglQ?{_lP|1sU)nLmS|=S%KldMmk&ES~l+Flpjb zg(Lf5GJJIPt>+@{sp^s-7LMlU6_>h>L$xF7WKxF7fQn;0i*MMqf|9Sv$ zMlz~(;O04_Eih(XP>^8aUmONz3N2!$jP&(zFd-@lr&m>TXI%(ZC^P>SD}5wH<@Dd! zO<9gd$9Cyr{<@9VAr!4w9Ab;>hO zXsw0y+tA}|)y$5iU}Kk;y*5WloXz~8A2Hz`YJ~8bi~B9(q@67OT^KZzH@;2=3f&mK ztliKJEIG!D!Kxv0+KxPfZ>3!kls1knXoU!3EOiZ7!qzwIV?>FQ( z)ge&*OL3y8LfJ}>QbG3kYUydE(wx>rhRG(ZjZ@NXZvyTpLd^UEsGkOK2Px1Ee70sG z&IZXo^-!q~JVHFqC!Dq65%g~|vOU3SCX4FOG2@*uf?BGa1J3Wy>yyB#wZ6{s`&2gPjVs}7b}1B0cs zViR#;Uy#5(;XA7{bF$?fuZ2qWey(`l&--1X_ys+0hX#^Z(yMdp#IruXG%s%R^|{^l zf%HZEZKM%Pc6z0pcUz{ra9(=Ni@7*Au~U9Ul7u+VJ`Fg^+sBJv)DhW)!?Jp`)G8Y9 z=sq12U6oP_Qo}dNSk}Gj9rmN&_~pr%h^05 zld2Kl zDyWAo-mjS8lm%}`U24^8X&&^gRr=ElyA~iw0L`jM^Cy+)!&*#N&Tly!aX{LRfFdWz+m&W^hNeb+K91_rM_10(O`~^E5T~ zcXDNPdUO0W)=)>X;n|ovws(OUxV-}-DQCt%w&5-G2OJN@>9BBSP@g3u-)_LFF>ofk zl@Wd?7ZF2q5&eu~BNaD}#f6kPcKbyuUQ#9TIc5n{d?HLNn>aPT*3YWsp5-TzO&OJ> zoHq*8iPo6!+;PI@N?g(-4ujiK71s#uT;#*HDaa1<7mj-@%c%YQlf<~FyR4hZ)4Ix& z6g^xW_i9PbV5qQ9EK{cCG*sPA(Q4D16ca2 zFSIpA(Co@d6^?KV@zoZJ_Kw6A*$Q=IWmVAqn62Cb)gT2rmIYPv#7`U76)(koabM?r znbhVP{^grm%Z=bYwq3EeFG>UM-Vy+SFq+MNrJNXU;hX;N#ropbZak>Dy0!BLq&g2f zUEM?W1$)YuALBsq)uidCt{+cABC{efL*}!`ISjxc&{fjV2oX{>jW>c>#jnJyZn%uh zPrqGp!mRbmxuj0BYmdx-R5&Qdz=nLFb&pUcSQvxs&-O)sgN z-}a3yah1Y=zb_raxP>xJVL zRH_GEB}01ySv02`k(S6lh?dW!KB<9{3Pa-Qt}|Rw&6=#Up;#GNX%Yb6DCjtyIWM`U z*0*j6NnW{_0K{P(TF-=$pAX5@53c z7{1hs9$lCDOPE+pp{<7lE8g!4LU$ClrJriX&j<)#6Eoo)G{neDnp0!xVpRv~xz^=d zJ>45Ff@B(F1t!P$tO3u|P6d5^#p!c?Sr0A!VDTbE2Nv8KOuh zy>Z$vf%Q|g>21?3(U#K{CCX19H*DWbibRN2HZk1fC_b{`)e*Z}D}9$h0~H&7*ApS8 zr&5q}2?=IQ?IO)On1$n9B!PR5Hk5Ug*e->R-(7!`ow)OPxtvZ`pY za%!vwDfe}R;CrDKDk7u%H|*}hz4SF0_=4ji&R7~QJ3nO-^R22Vr}eFj5Ua9G~H zR(VJU$6o?R?Q9G5CpHzrGku<`{(ed4KguRR^Z&5-mQhuHYrp@Zq`N~UbEFQ3uJaY$=Z+0yBLi0;{ z01+}ZCr|bKUU}LFZ{jfiOD;PopE#m22IQ=|YGkjl}cjqKZz6UXgjcp;U zR@&qMpXA-^t-OmGPgf+9f~IHagkP7)JGc*cWVqM}D1`krpzUG5=!VdttER83ReVYq zCy?wUA38J&q!HRlqFB+>R1O8X#EFR~|LV!bdRceyJ(;uJ=uXpVnr)VN_Fc5My0y`a z^(A`bIt|htisf^R%$|mP=mymhebti-J9WSA7&QP!AI5z`k@7p&aBL*G%JUVsvO!lC zNySWsrQ8`un4Ns5)ZE5Ao!|)#em9x#mc?F)4x6n5Ioh-p3!NJU#mdoyQvL|pH@UBT z0iQQ1vS|ooDic<3h)No!Prp4Z5)-e9x``SU&7?J;(NpU;0V*(3p+D@N3kCHs+dU_c zwVt-nL;JM0VN?H@P=^%>%vx$2_f?UNuy^G*_tox{huQ=`@3G*iO}p67f@T#X$)eb< z80gQ+D#;a=e^HDqN}k6$@%F=t!Nu%WCVPb{0B%xeIdSxA9thd2W@(s+vc8FN`y~Tsj-?DMx>3 zPfqJ$aPKzoF7I{9iwcE|kM(9VP@eYa7~;(B96Lxlof3qVRK1ddc70Cw`2h0{x3b4_?G8w|t(L zIaTfGRIA)uiqY7Y?&2U7^Fdq-!bVLR!j$pix3u@7fzycKr?(R;OV0XAOi+Ho=w15`^*8APH{q+ac#bo?xc3(Krc_X6vuQ84L)tuRkJ{?jI9{FA8{%SF|gqhd0p zS0XFW4sYU>%K`yCD|2+lrTggT_0Lm=x;A3vuT?OHlOG2YMVJIR9lV3yc2_*tt&(V1 z6t^p8d`gWo6vy|$>v?PN!l8K&Ij6bh6u(hM*_V9R0iz4LaJYF4Q7lZ3vfL6m`w_B- z-0r*y3=!k+RTQT94Hdt4tG?)Q4z!2(Qb@NpCpf{0S*5((2_c+SVVJudB3P@GB_^lXluW{u$wcwHj5lF?7Oi;F23bC|y_z zbua4S211W>rBmqR=7<8?@zTr3G#Q@8ojQ^2=jxIeUPDEeZPr8&XSlxfoxS-&M)v#= zkWL_ED#klf{i!;>$ql3Uwb;4cEjP-jqv>ZqT<^t)JnMhQR6?}RN**o^u9lhSaMZH? z*fJuvpj2RB#mU39CdAdK^`JBhKJ8XSf~pT~>w!wDSqF#)SNg zy~Q}nS1;rzaxCj9onJ8f)g|ro@MYq@s)T zKYLeYT+HAI9Ngf=NxrAH@_Zu)&`FQohC1$*>eq{f*pJ8c)JaO%4Qh{Dx?2e65UJNM=Vg2kXkIX;U_J?cb@Gxavl`*S zQ0nJIgNxy*KhH(f5Gx6iE1S(IPkeiBF=9Ek$yxWcEgnUIPezb;5X8V)Vahn$4O}BH5gMoz8%f3~7Ss=Lc#P$H(Ezf#vQ$3R&;g zshHGLJ=A#weZH>o3|ZhIoKcQI`gRsRKqwh}uyr$@Y{m%<@^L1aS2AaWXPD-8J+nN0 z{PD0%P-dYM89rl-_Ou5&2R?h zfmaIsPmslZNV7SmuT|tON`9(!8qT_qX}9bqYoA5YRcbZ!(s?l&w1xW*x?O^uFNLM+ zHA~tDwK|a=x+BSu^6;R~%(6Nk;-B$~22PtoppKAUES+&&8J=T4TG=CtW7ohHp-s#s zaB#uzEXC$-Z{DAJT-0ot=M-PatL0hRIcgF^z}_HDW!3T3FF9^@vrqUAZcBIpBKxC; z*Q1Z+UXO5@>!%914wFGhs8gzb)+twSyiQQ|GT*{Rb}y;=d{7pc{02Xx*6_Cu*!8~Q zAEFAh+y^(!tMl(;duuAjOp?S4RYm+PIPTsSp{?qH1wk(*{+@-c88pTc)Rhzf5^=1_2pSol(dmtm+C@2lJW~8LW z-DGhME05xQ`+`Gh6wELno851|e(*&&9D>I>_|3}1Th8T|jjXO8k3K_ViY>!)5aaiu zWeoKBPrps3v)$uXO0V!elB49KNud}1jCbS|wwC!!MrEzM6?$l<3)GGirB(flqWXtPfxsJEQ8lzA7Z3;`?txfij zw!zD&xp2;ONAE|G zLv1bA*Rwmyiq2fSo*;k6!&<-HuX?#W{k}n>P=aPqi8~AG!I*nU5P69Prg`k@Uus= zhahc>-4l$amHl#0DR5u&33!s@-Moq0hp=EgxffgVMpmdLUyev5j`};_v&V+l2eJG2 z;}#+vQ4Meqjf}4>kKn1HKXD{BY*daw3&R6nlYI=yn@TRL09pBD%3G_4w^F~^x0)(c zFDK+<>zcR~x~+4PnTYqW-#H>WwG-)c(wsWP2T`R`k+cz!h*U>EATEBAb)=V*-m`}- zE_Pxn#hV@21QI76-yD3_-3A3BethZndZ9FO*0V86PwBI%9Gp^zgq`Y@rKmD#Lo#ki zV~3a-WF}NgEteXT<8MCpbdEZl%q^q8&sC0bptiPilAiuqON@zq*IdQQ~ z)@WxUk0~kz_&LeiDY~)Hjnub|l42F(IfUoK-OU9x@;=|Vhd;!mpmOF({1_9q;Nv}E zvyM(aED^>>r|E(!&k(J0Ve=SDk`E+vvrsy>EwYI$TsT=|grEN65E;K%YmDF1s?33& z$GMUSv|A^B@)fo;xn5FNANm|)byoLfp2mCgQ%x?hLEbjB^yGNA*J15pip&@qVbaRT z^!9k-Y<8-hu6&8G^Bu%M>=_M*#O@r_^Vo8;^Jg0i*+RFWEoxsJ`qH8ewE>#g_gSpT z`@H(h-#n9a_)nI8BNoS%TsG@@DRXY>raXU)6ir!9?^PVS*BO7OnAQj?V=-ShUb~s3 zfc}w0K`JGG3{1!n-s;Ct#aSAm8Lshc>8^drIW^8}A)AfJyXo?s%iSt|isjaqQgU9# zcX{2RcG*`Rp&DOLBInR@6C5p9DdXco??+4Guo7uIgv>8si zY!XIgQeyRfX)h{jEKdJ#B0 zztjsYQA)E!r6jLhF5Q4 zUAWOX4fE^{!God zFz3tu<6|U#v*}vQ{2I9-KT8E2DF*ot6H5CGxR;b--3tzIgoNcGBoQaIOkFjizqSd! z<&(Y2-o_^t@`0<$4Y7f^AisV2yCNl)Lasdcto3D5{FPnifD78nkA7M`k-&9?C-uG1 zO4{7lg+j{?A9`^}o1o9KSn?fH>-dk@8ADVMpVgFtiMVVii%`vHO&%KG^w2xom8~M& z%n;78P?0qQ%b}FOS8^&xIe@GliCW+hb8|Xf?tyMq_IeKIX!raXv3(_XCdN$Ym4;@q zz{6Ve1rl2_{&^n(+T*@1b4&9ce{z#eaGE%R)s}>BFMQqemqKViLu|sNP5ylLB@as* z(tn#h#Lnk+y>a6Rgp_a6IOvYvp@$;1w_MZ?^o;d~oCYHpOnwWAL0YR=0F!4C(b4lS(-Y9M@%o zE?SgNXQ4MzO(Yg5`0!yzDYbsn@FWkJ*j})tk>Y$j#a$-zl;!#Kxw9*XKe1c;VV-ur z(>l$vGj=FaxgpIaS6#>i_9Vg?!C+k==!lK7K@@*og7R=lT(dqeNha2ndW;MM()LC$ zQWuXr#@vXI%Ki@BcVgTP_kGQt?M{wK@}mRxwZ~@X=tR9X;NNJh9Fz68q{3(kT9rp8XeebhCNjlFUoM@~;AwVi z5I8TY-juREv3Qa1xbl|otMyhjMU+qRGZAL)%*i|vE*kzp$GsF=a{-55+K#R*&}m(p z*ny9{!9>NJl_Re==pOIaip|s^OKc>=&NJhCcFCJb?W5Mg*1TD+-M#zXX+6}0-gb=s z@}jb_-0@81A#^ zD#U7ky+F$%#HI(;KkWm|s~VZe`j+^3l{udBMf7$%nKVp3M#}S29mHAvjwagY=yyWy zKok+*O31K`v^@qb5%D?5_4&MJ{m_$#H&46nRlj=Q9WOqCzW6-l#^;*&l$Z9^v2!H7 zFCu6I97)N$o+7qFUnmqG?Jw!{yIn#Hf45mILZ6v3IA;oKiR0TXn2@ArdaS>q#AKa) z9b8hZ@f=&*BTe$@!D~ZD3hXZInSzBFy_0-w?6~n`Ke4~TOzTQ_JX~L|u zo1L{zkBE(13wY%Sg$SNWd4vx6t%bP$Tw8QVoAnckfqw87&X#y3@M?YBE_eK;3lLeOm6Cga)>Pxd6-l=lHTFb_gdFZYz$9R8X4b| zDY|k8sFs3;bs8=E8Lpz)rk9E7a)on`5BksCp5U(!j^umdKH?=`)B9>lMMF5=H#|Ze zv7(D-;3|2=E0}N*#!$Xn0a0I86zsuzny2>J?r@^#Oz~U7@B`AaQ$FbHAM(sIc%OrY zrsBh}RM=SO)@(3qo2a*o=J9NG7Jj7C)s8*Krt)a9c^lVLp%JVNCl zv6{fSanXf!or~_{4FyllGrpP)Ye`EtElus%wKR?bTQ7aS^4;KfxFAL0jFN@u6CSGW!ufM( zA|#VJfrUy|JBhcp>#Jas{r8pDYv!CM(UtBl7=rt#txerIc(22bX7j(#SyCsNVbK$Q z;m0$1m5w%!TNlM|)X)g;b9!VJZv8>(c=Vm*kuDx_saP2yr=9oN^e=biZ-=tPt%?_O zsff%kq6+fWI$}7M=9>B9sxQz!QQ;o=1v0Z4ltL4Si8&fQVtlK$Wy27HGVoT733w+DzwLh795r} z?|ZrRTUhq(w2cC^e!Poij0drN?4uBT9(cyzmw}9_tfYj=j^e2wl)rU18kWrgMAHxdvG!aqIvQT--trzICRr#`abocngD^~!Zu!&e{5}u$ZC_**UDbxMP1)nV ztf44R`suoM3fHOetgJbUNA<3~4yXcWv)_09)KK-lnKrEd#DR7lQvB`;f<W15wtM+!dIIQ6KZb1T>+BWgJBZW3O5i|@fkVB(?*D=!~{zP-BeJqCpVEXAc~WlnssP1krf zIe8JcaPz==o3}?@(=FLX0dr99k~8u;AMtzRDD}_r@TkN+Gpfu>XZV&;i+&c}>tOh= z#zs{m{;asmwYv`^7gO3hF)$P{s{{40L^$AEkmuK}TRKjXS6@BF5KnqaK}c?L8X3w* z>orXTdBj~w0u^nWXz`F*Qw$w^I*{b;^#TzZm*cyRYtM&mP7>F}oTXCfLEX~bX|>|I zoqfjKBSW#=oM__L2u{Q-&LcRhN|l$YtutP6E~q{$qzj zwh8YQe&hIX9L8|IXcjo?)3!0EgSyw^u4L+!tEp*EhFWgi(lV}DwIa+%7=nmDuEu;F znH%S|p{+@YI+NaE$g5JhjUPD_*@JG}S?!~*s!z#aY%Qlg@AYN04bxCebPUu3*oTOp zOA@8O9(~~VlrP|pW$KRGIq@ee0^^DA;lr3_L!q=Va~TOleNnhxe6e~%jb28xa@!W_ z!?qEowD)Ti9#I_-oVM8Gx9VRKscTx6%=$DRH?Ak)FeW_AAESYOef!j=?)98HH0{Ygi(@h?hbUkLV_eZkSlXVp zq`w*TCcV-8rU!P3aL}civhAL%&}D~jwfY7P{jF$q9}nlz`p%<=K4iLkaSzj+ul95U zynYskJ2LpE(RR!Tn{e&#_d1F+)m@A+rRc`XyCf?!6F`VHlv7&!W>BIMnJsW%of*H7 zjTF@Iaquk8viI2;Q>ZR}+9}0%$LDNdkr>%y50fsg2;X7fTnSyPlTNSwB$u#$gm|M# zEjL(65NO}hAL{R`F1R<`#C`J5ua^b5X?JmOX5UrrqYcdLVsb)!@?RZP`5;+8ytF&v>X8#WX6z;Y1?8%b`7AF_ajlQ~&U|5&0=lEO{p1HNSH^TP~Qf+RnsW0(W-g*d`Jvw(AGEHZT>~X5jkOBpRW3`UziU6vn zBTo8O8ud7w>d9W?$lo;Zqy=@?FBQQ>tcb4GthBC_?6 z@Se_wn4LrLQ*WtB(~5!=#uF1{Y`UbqpEEqTzd4-0 z+K~j~hlwKe)F;WBBxgYhO?*4YOwk?_qYsHL&dk(;Tk#COc85=cj`Hps3--bqTEkBK zKn@r0m5Ma#S6fH1+hSK?Dw1E{!=L3+MWH5^-0`6Y@+Elj*(Rzd4#z)<@vM@IZIo}= z8up8FesQ?^MQQDK%7ss0){)J72Ia}B)%lXRO#A&=wP8`xe2>eKXT@vWk#s-Z9xs%0 z(}jw4&67r$9qTJlbu{cT`w_4UXrn6zp$!r0Ca;nxbyaWmkxa6Me1%Gjn1wtzM|htY z^+mKr#tg)~iP8bJ69n{{*1T=@7``Q#mSGlG%rx1h)U5JEr^tg{xP!jJtPK^rOl=~h ze4GZ9?uK10veV2}y8-U##*;bcj}_mYd&oHsba|Uyh-&lYs0J81wfDZOT&(}0%7qcf zw0I$dA)X)&s2;9*--*KcT{Emqnfh{@y3z55GJ?bh=<^7PRZhW9V9439RT;|qY@xce zUdX)e4j}?%-q|>P>j~?xJog_vRKHxl^FEKNWj1gn!FT?e9mQ0o=1i9T$jp4}z>NyG}9HnDrd4y^q0N3+Qu#0}f4lQFnlRu5m~ z)^|v}6O0=#X=0c5wjlUK>4^x%F?&;Dt5jBSP$7?X|DYyu%TtCL=Jd{*Fg}QWpih%v zT%^optD%`;cwy+U9!kHWedgI|7s)2q|B^WzO8We{AnR_~leChnzom0t>B>KM{O#Tq z!CWC>rUPaD{6p&WXs4&36UDHoakCDG8olYI`E`Gup_8!QnmQ*_jzghcaTo_LwboLA z^PsAlvKsB8GiM9I?^lbd+~(ZxCj5P^j2)(x@xxE3#DXrSO(!pG?NvA=G_-v&Ps~}X zkQqnZJWM{VZ=E*c6nV^8QLL_woD@uia-l0+oga+Ojv$EgoNsDB!F>KBPsLK9nBDay z=64OsBklR!2(&kBj;}g~{H`^1q>2sQzIBple2~&}5#h1Z`W$4wrAZw)y$T;@&~uwk zet20p{ZAGE#P(`Pz*G+7ySIGc;}AhEk!4oAwB(eSl$Qhbh&s5VCKyv~Oz)n4VsSqe z${(u>?WYfsM(62__r}rl(i|#RG!s53|ljF&(4R!YHjoS#>4fc&XvN7MRhKplWYNGKlu!|K% zl(Owf?$#ostB#dvI#{@b%rmxG&3Z@nQjVY6t4M6>ZnQb@WssOCw-}$CD5cS>#!c%M zf8wLGkbJ63JEBK_5L$g!b*zcFl0J9A_yAKjFqRtcJ=Sw6rY=+Sr=Pm*UXuv5g5trt zQC3d2z9QX3p9iJHP0_QrL6w{j+jrCp3J$VLek2VSfaC_*8S%Td;xARfH6#ySW*+M) z-K$FKe#FEUZpwXndl5FD? z38tS3?Jd9HvDC9REsj>oB`PQBC}$;*Kn`)gND(IHlA!Rp*+`hBJg(lX)Z;XxTFGlb zb=wm+_rNfnCV`{OEHOQv`^{=?<_57VB(a4iu3NLa&_#M?2~CrbdsOMe0d=RZk5}qT zL?og|rT7-Ts`5YOQdsMJNGd;i5)!;~an{4aII6!NKUZr#%Gh9-4_p}7kLej5c!=x{ z$+4sOA28$eJVL)^*1D^Ro)U~Y><^wtr1>7add4Ei-Qr|@0gjc2@{{gAj4tr;A9;@B z(oPK(#xoVH-Mh8Bqj37hCA=IwzzWMx{QajiS%QTVqAG2#)3=bnr!e}s$jwcRNz0iP z*YpjOc*MxV&v>d>~6l z5GeQ#2Icg9PjFY8<`+0cA#1?T@~?Z;!m$;70HNQt0DvFpf@E6&(n4P4oqGlzVRDNGfvo zWc!yYY-IJ};o_@3Hp=#xdlH>Yn5FUYO@pZtUHRUB-(D#<5l=tSdeyoPo1SxZVbo>jowqJj%lKhS+)S*$}V~I z@|NQPR>7~%8-RR(dpY_g8tVP?b*V`(f+Y5LwUI7L6dGwo1UnS@Js5ZpGjI=2^L|JR zCS5=wB#()Y>ipZV;Vly%s|(6YN^rUdKldT0`P&FjAv0>T*}v7+aRTWdb-1M}e~738 zWp;bf6P<&!(ni_rWu%OUll%xBySlFv^bj|l;05S0ed9*fcwDYw<^n8fta*P|*N(Xw zMN=jVb0J8_<;yPh4M3<@d=p-X_#PSSnK$%Q&v}?vqi)I+0kXOMJuGprs1hx!z&tJ> zb%i&rLZj}nbjWITayH-8wNA`TJd?%)3=)a{lpEb~tX-`ixr*Siqy}`5JGMx&!(>bF zf8?_MV;cN@GW?f6^;rV7?I54QKSrmFVU{x)m=%Y}b`gB|6pGv|e0 zM&`L3|1z%sH52~ZUsMwVFd$aAPydhi_}^~DS{$AWGUVr)hZhlm683L?B=o?A@v^jk zn;U9Cvef{gjz`1CN=DG5|zrWuQDI!ow;jYH& zC(HDLStg}sLf(Heb#9ocH^Rra{)Y>v-hjb5%_`!N{pWD~Yij@3SF%#TaxgYTn6>+# zE~Es5Q-G|M`={sj&-GRN8N}*8EtaQ`z~G1$Ff0FK=l|DI@!v<))*6g9k24aZ z_kXys02vI+pR;3#u-OdXHy{OD9#S(q z07s>1b7%$NYK+yM%K>S}VbjHiS61bz0c9a{KHvQT;4NkOAv&~OTI1Q+&I45gR8xq=VCL{X zz)$G`VH6?v{gxlGiZIo?P>RYA7Rbr|RABz2 z8_8#Cw~yusLqKXP zq#ei{;VaYt%FXDcu3ZxH@$FE~WK6H~eHaKS zH0Et3nmus(b$LWHvMt_V@(BPIk*M4sP0E^KOhFrxRVwys(-90rx`^j%xM?7%`-N6{ z(&&+%58ChyIk!JBFH}0fZQ5nNYxBLnDpV1>M3imMr1k^ndN&+MgCo9??K;bBL1@ zOf@d^?l*&Yi3tQ*Og!b%8+OLg5V(47W0J_YZ}9d45U>t4fKEq#u#UmYS|HWuGx7PU z?OOO8u(t65TvJ(i@wmeC74Wa5Di|G8O%8xXC^=zmCHn1K@mOG+vetla*sezs%{%|e zZvPFJ1p?K*Qhsbfq(G#(2c{%AM?lgRz}~PL1Oqf!u?C#}2Cvfi0GjIe; zED-tm-<@Q}e1^T_U+#^mNfLJ45D9$jYk;Qn;WqE#JB0DY0Ief?1>;0jrtrP!*{sR! zj?P0NmkK=giVk>Pc)3WDz|1JOz0^4xeC8IgUWKHzD;>O)3mDJ`vn2!(5Ss+kN)NF7 z4`-r3MzcyKv|geJ0UbKOo9|SijohC?Lf=+aAG-tk*TvF-A8`it?J(a0Yowa)U*Dok zmM3bB6aqv7U{^BxxK;2q_JQ!>Lfy+QB_LvD9V#$_^_|UrKcMPJnQHR+X8HDs)_bsm zxl$iS``^5Y_dl!7z2_+S2RO9nqIveEL49|qlqA**wuu3y{HqL8BPSI|Z&`+Pl&zufF$I@_eyi z{G5>wXF%Y0_~R#~p(V$ZPtO1)5F8gVYIdtd zpSxcLUn2Jh5Sd1+4xz~~W6$c?6WD&^kei@=Odv%X3~Xis)fBB2EH5!O?XQ{|O>FJp zlLtr9Xbo?jY;zJ{;_jLg=>o;FE;i{|^<)n(TUu>qE|xr!zaBdfS5tR%k7^$-z+@3; zK=Z_p)qOxM-7SRyjMzy(`mP2dQ?C%qvo~#hf+@XC6>2Dx5H{vhAvs++a(P@-YHSTi zW0S{-nA1BR+4klf!|1W(_7##Ygc`5rGPz?vdjJh5OeUGm?uwNF^i0=jJ#bL0>ItK{ z|MkKOYsf?N8)o>=*r4*+g2YI<-zojHQ~Y*YMKHqi4Rl2MQ?a&QE;)Wwj-tTL^~ycv z)7U<+0frQDvXqeE+MXgBXI|Rfyi8n5I0tkz`lRj2e1rV9yQ^Q-Df3kjK73s}Q~$M>j| z$X)Z@(4pnePbfVtX~R1}`*o<`7mD}IEwBh?8`1u;CeWsx4WYf7+i$b~F-XD%hC1ci zFKvk`PuyxCz5qKl`}gS#`5D}MzmnB(a~H-xL_TAYi27-8ka)1s)(z|Q0vyG65ujkIRJ;OMkxF-O@t>`J zpsL=?u@qbc*s{G6;c>Z#j+_}5XGNgA%?#P-9R+QfI1{<$>{IV4hox*qXP7`8KU0v8$i~B2~Eb2k**aF8(=FL zUp)l7>t~z}#6GMJc^LF+_bKIViOslHrr*_b%OPKJ1Om4p=n+Weh>Orh4nDdwA3BNo ziU>@ARFOG$Ci}0Q(lCi?T-z&IP^kJ|pXs|B`N6!L}p?tb=7WGjQNf!$I=1}O- z@Y~A0)BUBiz%WrkVD4NIKgydS)V$3fbPcz$f_PsZqvy}2i8$Z00pF0r1C0>L2OB|&H9ynO%Y$v<2ELo({Cn$H zda_V>*3V7`VLj!5joNTp4;Au72Z%ufqJVa!-2<*c)=A)Wv~l~t?b3ib5%F{#)jvYW z9V9Tw7XXzclf}OS4jFH>f&ax6I0^!E>XCyA_BLQQUaWLD#q7GKX-fJ`dljeUfv=HcMT4S>b);TZ#m zoy{5`gU1WIyO62UHx`glJW!*{^nH$c%#99F3^Os4FnGK zS!umBDFSQA@8;nfS#46`;&!lfAR#*CT3rY20%_^o?#@&GK7eqg1a51b-sx^E5Tt!y zi?Vr8tenP|@eHJqNd>!%CS%NS9w8;E{lR0A$(lp0u{*1bsJTv}xYh%h}ZOD*8f+3F%GWg%&9ysRb7Lmxw z{6elf@ye2%;M*}F>N<5%2Y`~lUCa=yvCjIa+75+Yjx~&Lm@3+4|Mw7nx8xki*M8Zd z@|(q2w8x>_I!61;

-j=3v@EAar*uvttu^4OQIG3?HfU-y`!jUoF@U`=9~te!|^} zP{0!1Tn)9cqwGDX%Wb^cDQ2L5Pn-oi=wp3NZyZYyPkv7VaVG2rD1=n%$0Ei2*>>9 z5L4Wv&lbDi3#^9$#p0|OaI$|Exc`$N#F8r-8NLpsqa-8gRQCnyzHVDRSfhENz(u@- zNmrVGZ`>MxLe+yEZUVfByE+eYnz1wyrY0c9`PK%13}TJ}8%5^J^T> zXlg7Zd~y|kqdturx=9j&&+1(VNY0Ds!ZB5Wf!>7vAWRxCX8bR1>R0QG6o6G$B$66P5_g!i2+Rdw9J>2c~QZ3VuHT;AKj|r zIdv>~FD^E|Vtpw>^3z3GER1pN{Y6K6I3|r99IBT5^mg}zR8}rjfVhg}ky0uTlh9zR ziR(8lqVQ=kp|sb1=159hH&x7ji3Aj26HM#_LiHNzagl%6-u{u;!cV5bfGo15L9Q*` z+C9-%8CU8qWmDP!4>LsQh?Lv<1}N+L1F?%(FkKdt7Xh!# zfAqze4KSoT1?}NQ4m|*#;2b5|UL%H8P@l^mJLbFqCnFfU81fzkZ3UiLi8z* z{K3S*q!L>UsF*36L)~=({&*E6^;OFX1yB!9KPCO;R@BtKo97Ke`&4TxBk{x#5a?Qg zh_Ivm9*7NXZCrLy-AP>S#zf@%DG>t)Pg-&0?JW>vKLD(FAR*7dq+1AI0)k}_kyF?- zYMecVp^fWS{H{ShT#!X2b$8f%TF>Uy4%oY3Qqz@BSIh4~;|gfkV(_{B0`6LWiM|8C ziZOmMuPR-|qX}c4Ve{!<09`^DOOo5wwCqreYz~k4PwwwOCUR0ox;bQZbDX34u@g_! zQdX96JJ=9Z*PX-EuQR#*AD4q8s2PRlW*EO7BnLPuxG5pomPse^W?K@P#jh$YKjC$p z5rdu(=XFIflg%8~_gb_IyP=vhpyTA;b0o1gk%cO5w~9 z0Rmq_+o2ZScqK^_ZSjfm3vk`crNXEuu{j!6;p_D3tcXk_*)6lXz%Q>fI{#!e4h1Xy zzxnAw)DK60v~o!l?C}MY%JWBzsMl{OTzfZGO3OV=;u`R>$2UqaI^tj|F=YL5<22DC z$4TusJxkjc!R(|&^!yVXkH^|>u_HN$Hl8q079OPRMi<`#B?MR~@5dH*&U6U`yEi!z zD^w~L;3%V5C!Fi0@g%pYu4Jk%uh}=@exRCw5Nh_(CsqO3quEeXU_iB&d*v&&$eq<0 zRmf107O+d$q`#7D=m=6&z0CwhP!2LlK>wU9FAHn||0b0zffmTu(5MoV=4?58n&i0; z`f2xPD{11cnq9WleGWVpo_GwzGs&;p7U(v-tJcl{c{BF<#n%EuO!8&`-?KX)401JA zNk(<{m23~u#Lc_I&h{1<2BOJ$Uw|ak?t_-qAawYAKt@H{C|oDtA7mS&SG$@KIbt5j zQIr9Ryj81+k|Wt^LnPItbTM83$M z{K|hMO0qU!iOG%WCQXXu(qLFI<}bRyP03G|S&#)Mp2|dwqwc0?WU?xBq2j zs=VOBBDs9@|GCBgb2$Is8pS|2EtA53Jm(z+SVgkX?n=S%Pl*Fp{4unEX`}Wg;eWr| z2*!iTjm8w&4VL`^nvj0?QBvJ&Q{6Dw&*Q@pajN)H7z5jHH|Hl^p zF{!6wI~rbnr&mf=9VAFdL<#GlP=Zy|O#E+M@exS4EamZk7VQ3O$u)Ijfc3{1zhQ2N zy}=J0iLWy@n~p$GOEBL?4wFIvCkEuXvf?E$zXSL1JJ1F>0D(@CS*mi%R2VLe={Ht| zP~hy~xqu)-f9_g2i8U=AbrIAxEnBzq(&z{Hn`gJibM8U9^$w`3h=Vd0thNHu=^j_V zw;OY*+f3U1fJ1%&692v+E*A%CGlt|(pJj;53E`5JZN*dh0dKZ%OhhCP72Y3I7YdVL z^-p_aZ1EdtET}y;J#7Q|c#vMZ2Z{6L3uAGE^R2n2Ln{^|P~fygB;f-p9x&~b^WC}X zey$}D{lN0hE4TaZ%83?yIpFseGq8I6)0TN+*^125A<nQ(2_bE?DggNpuKOM<_36%5N~8F6oxmi*lZ*pV^a zovnoBtG`B5wS!V1s9;vZfQMXCR*my7iXR8ef?TD*jNxf5GEgdwZ?Rq}{0jK+-(XTY zphmOzu)WP&@B9Tm@!1^ z9;BOd-+$s7>r)GY_1u}=fZS9AK-|LAeavXrV8aT81CBg}be!DLR0fjn#8t+Q~D;|@`5I0Ie2PQ?;)GOv-WBPgRb z9&lrC988xQG`p>|A5FI$B0RuI=CT?9U3^h)OvFjlvRPVq9w6ok!KNB1g=zPJ&oFs; zz*&EPOmqYS(HLC%P*@75PB1UO4%pH0x~BFWNau+F?V`bVyeSedpA^mK5lIzj41my{ zE?S&2!ps;gI)mqSusnZg$)RjN!Zq2*HmhxAFLCt##L6(CT{nAj37NflRpezCxu@e; z_q}`9&o262vir$;-5-l4?E9HdX4)=JQ%1247Tbm|oNb0vQ1Bm%_}tXEmQhHoRw5)W zxt-qF+)izC=b18Ij7R5<+>qz~y$#gX4gU1o1<&!rnbpxooL4)1S zS|fhP=Im#eUE<2O7oqjD)y)PODskxbY&6Nh>X0Sa3!sV(n_sY8Ja2pO;@v`_21CtG zammD9)gXJZ=lg9`x2+GKnKAd?Z->vQRMpXFz0^QIX!2tUZDh1Zyt|xEt}VZ?jBEGj zYKB}|cE`K2Z`;iK|2`ErsiV0^QN7C-`&cp3bK6cK`t4w&QtW$!@Z=qbFi^+S-f0=f zd$^fVEP26kPg*(bnpq{#5e!2h;RI@{tX^NLmfmT*zWLh-KEV|L<$gd`C*xA#;$GH%2wB1eb=Oc+K( zV+Tvk^|I?Hp%5~Ec1d!Fn4vt_`$ZSRL^~{ue}a(C;iz<%;}=P~G)pt@(tF^-Oyb+F zw26*PrwW*CPVryYT=|1VZOy29#2&1C)ZjPTj*wLuVWE~pDT?9A#EgmWB=qBb5M{*2 zmT#Ze@BD8Fj7w)~*f4|wk zIF7kn5xJdvYjf>8nd99>fO895vrV5p$|8g~OR@c;1Z&2o3_OsGvT_r5A3?hv6Gt7~ zfmOlq+JW%H8ndWW*KZqxajKq~vk!(&+1wU#<1OUcS2Nu|#Tr-P>Bg^djD7LwiXrfq zK*{H*{zAX`$Xp;%s>zZXk!5YFa7879nf-;w87Ob|R4Y)o&cB8!`7ogh-GWpnr)JyD zj!yfrE0hm8J<-&UJj{JhdqDf5;)o z$74j8S;&*bkw3F1XEG1BP*ae#SjgGP$4F@8*P=jGYI;$rBy00rYPVUVu9r>Oi<;(z z!j*_d)p7@;&p?3cc-HWt@q(X?d(tethHA2sSC7_=)r4Yff>QbP)_gbGMv;D0jd4Kl zZ?1R4qjAhA6?#&#Dw*92wCD27J0|@ zn$(oh=&7S}$|(Y;$T`R}YiVMYKQiKxC!Eg}StZPpBQw?Qe=t2hRzqtHJ#Ss9u$bh~ z*>xG1uCBSKsQXwvoLQ$ADc{N8&N(l}5%NCmY&k3>3Xc7v=Tq73Pp9nnFAqd*1r2zd zeic7ejxXLhDo%YVik1UwhTB904LL)owI$xbr%skeg*Imj-YtqOq^}pxFq#r}Gzyx* ze-w7FldoZGn1rF0^cX8<%_B-1*54_G`Rx?u@0Q%&PG;V97w%5y?6N9|v=hi;bT&{u zCgwZpIvs;Uroiz%Ju*56%4!KyjO1JwQ+FF2{?FS6nI5=vau@diUm&W&zA=9+vO?ui zW7aHPEvToNQm>qjGoQI=2!20f&7>gdUinQB;BA?1*aRrz>aMuoKWH{e_hfpx}DmeNJ>Q@Z{%E*Q{DBo0=(p#=>C zq#LBmqD1LNx%)kwYz47T zZvhB9M8onbZrphVwEoDZcd0ctG2A`i41dESyVRY78}#dAJF4||l)<_HYj5Q!!(4`S zT|%?Fb|e2a7()gUQi8N_lJY>_6n?!&4>Ux5zedOjmTf#CjMtz9x)`&9_SPsRUr$nu zyAAF}OflSI)bTrwm2Rr2&BBsbFaUs$tdHQsC#tjUlBR?#>2*iYOj-T~Masxo)ur!Y zW#L0aR#*9Hz=xH6x~hHVK{fmI144*AS6dNP4%w>1;$P$O71Eg(-?jg0t5<&?`Zf|q zKLD3a`9^}!#Oe2}WWX(c|EApAY_?jhI5E%7!)o|VfV|eqhV#&K@}O&`ri{Z+Ob0;1 zlTl)OEfKncsZ=O=--Wj0fPKO34T25S6) zfMd6%F*Qo&>CXVOK22)AuN!=ZhisVUg;naw8xM5Fhhv~Qk2OAUv%lu_J^S0a)QJ4^ zSnwp;5Qy;m5-PUsDdoHD?XCn!L@`3<;ENH_r9uRaUh|hfb4r8eP`T!lL*KRjE>NqQFm+A<$K=;s#95oVhdm#z6 zho-4J>AZe*PrmxA#BN&~DPKch^U=m9cnReos*)%{q{VTKU-FkZTmwx*{5rjEyKXVN z`c$g9nOMGKVQTrKXJ}EsqpP~_MB0>hcJEU>5wPHNxYUsY+2 zyXVPhbY=E2+#E|Sci_y$uHy)uLvEEJ;l09T;5hel3sG%wH3R!HPa_cSGx24Ac4zu( zYhi_W9?gQ_j{L){9sAHtXL30VWA-s;w>uk`MZ<`427`*LC4sa-qG7`XAxZqVJ|Ah+&GwXs0;D@5Jtow`%J6_xLJO(l=$+3mg3F>A!RDxCKd+_ z=k5U=v(F5yNX$J}ZAi$TkK8m<@f%4XJ9@->cWB6)?4i_WW72mfK>n6d#M6M?@c#a9 z<<$Fc_Jd-8Cd@@hXW`Aef$8NDCN=sf=1s*c$_EQKK3TYqea0eL`=D@6ZD1Z!DO_p6 zoZ3ERdjjMKpUb6Xq?0SDOKM*&08K!J5*nCeKF|B!0mOyH-h;hws2v&^Q z1o$@MQ7MS4u5j`Q2B0m|tG4@9o6}uV?vKZE_vP)xoknA0aqh}WkY2^G{cie%lEo@5 z)TTEHtY)#os10J(W4vY}S&HK1Re0ckR^Cx$kTNMm(n-?&z5Kyf6ip;@N-x;vHcR6* z$b)__Ph~TFVQC!G)carq9#!F?`a4(Y4$aq2Lgv_c74%6>%Lh)C%2J`Sac$A5megK2 z4GWZO+mv+<5wu}`JF^T^{L}V_MK@>kF(|BuGP)w{c|t!wWrjD`)>my-G1^c zizd}W{Kgr0#&Z*DH_5C4OCyz&FG>sh4Yw?qYMQqg?e}H;p>#Bmyfc~h$JZvKq^tiCT{>Y0RGBwVs?u##+Omfdt`Y!`nlKUs+M}DWh!oM13sn{*#m|@Sz z&=3slMlH~GDC&VF;vjVYc1M*UB#O1D)O6?&cCvl~5q~*zoy$%JhrDx_349sa!ACh=w?Se3 z%AxFuEo5J((j^QyItSt9WiRb4#;RDbV#;!mMcjd~q`AbzhrplfPXdG1p7At_@S-$+ zCWL@FYy4d<#Z;Gk9Z|6hnZlQbkj4&!vui`u=;pT0#-jh_g(8;d^P2}=l6oyS#C{Pm0E)=ueueyOLw)1nmW zfJiY+)@zZldEh}Qtuaj-YWV&R+c?jZhPmFm59qIVAfXRlj%(gQX-=D8St#NtP(Vlu z1p(y|e`Pu@y83(c4?Ax5S3idr!^s4ns;D5Zp&q63=_l*=)CaPdUpMTf z4dwfW>MwHBMP!I?b#|GZHS|2VMvE<^;Hl+iaWLB*3>>E%PlvKmm~|4~;jwIB(7Vke z$G0l{6d8TQ%>7b#Xj2vXB?xwMR9ec~x8HZg#f`(ak!iZ(94830*x$Y( zwI};k+z~uwU(qFgLgtYotEdvCJJqv?>>0}Mu>5D~4z$ITJPMp8uVyMb3KI3@A8i>! zevhH@N;_puJDU%K=$>3ydy`4!rygXD+OvW7qIY+1ihb1ckbm_vaz;zr6GCPg)H1F{ z5~ZISqz!P21#yX)1t<(vGWa~z@mV5-Fj^I(Ib|ddmB-fmh~IdWsZw#uX_Hh>RFE8o zzG@sG{1g-ZZI6dS{nfL>Cd&{zqAfn`H}Cbtb8+q(z(|z4+;1^6QW??)?<}RZ7@G+x z;m;EH-XC>_l8wbY!0HTpUSBMgs?)=Igks*n^>^uccH4o@Y3Iv>&`7hs`c{balm3n4QehIR@_z=dS^`M{wzNMIO53QF88XWZ)^r={i`11tsqf96sP(d2^_$5D` zMtmQP^Rim&zzi|AdjGN-vvtO-)~b~>&+`*`z2;nkt;aQ)di{Cd_gBUY2kDuCUxF&PQj<1W(_-rLprJUb!8#?)f2*UPBs?X{Q5VpKI^28k-a}2>-gry*a6c|cC*DN+ zNoj^4Kg&+fO~ytiNiy^d>nM zj%JWoMNdftV!-j+kod7B2dvDoWMz>i*(M^g$jXH0e_zE<_Bp8)x||&fzGwJk*Sk?; zt@eV~`|%zGA`Ov$CZlfUsy!sG%q)7Qn-F#fBDvvRG9!69di#h0e`->9Ea?c-!8bTM=_tyNghAe_557w(V1t+qX zTv_@PVM}qJ{3fy5Jq}k64IEL>O)PSfj>?NS9K5IdBm}098PpVlHW35ge=-xGzHQaK z;y(FV(yz;AbKvJ;6(xUBH3g|y5UwxE2%R$8{3uqxGgi`}v?E)@9G*7!z7G}Ifk0e7 z$W44l@;0!D0&-7|{xqYc?3F%-w1}TikGnHEP>?Xx4sO$)7K~lp(A*Yxh-@Lc{rCa6 zeY+Rng6TZf7li^^P*6m#G{Hol`k~j{L;lPOVN^dn#c$8{PGs=U?OD}ZWET74sPvE< zSu1pMAJpY5fF8nWU9#=N*RPtRiL6Q41J;7B5H(7;-2$@lp4_)qBgy@7ZBs(bT)dUR z30`egA^VKdLK;rmmKS8DEzq$WGnFnaVna|9tIZ-+5hr#ZhKdwh!;gRYV_WSj~zg?n$6?wn@^DGfUgYWKp^J#jx9Q8sCWHb~G&A^K_3#5S) zVn2e>*Fh$o#y%-$f3ad+TuU`%4p!Qu zXBAKzkTnoUHHwF9bTw_Wn@ZJ&gssCE0K1DuS{(X!1>ayP5r9HR%a&U`K4{- zahwN2I(BARgeBP9f-87@mF4XIbh)?YDW48~;-2yB+5ZtwzVrTXEEQ)1@U;HXJJ3m?>jW|as(f%^V z9I5@j{bp+6$L*SjPsEh)OuSF(QA4W^{6q6c--cGGohH5sjqi?jz8S~D4l*r!X`0AQ z)p~rZUaGnPn;AJ*%bj8Hrz*cJiRv}IsyK1ri#u~QdyX)!o~qD$lVZe+8CT0JS6`ve zm>qBxAK78{%)QmQ()T20(oU!t;~=$w`Ss4H>qEO~-1jGJg%o(ipW*!mP6=i~PWN_b z!&tDnnvPVbV@e(~1oxWvN=Yf*KO_3KY+;c(X=U-2rHtD)iSLK~DBSo<$U%FX!KJYb z{mj|a+t^phqUYt|)@@aFc~+d?G`jbKet_RvIxi8*?? zxfpIKPd@lwnBSe>!_X>(r^IgY4a<~X>MHe_))d3c*o%X0P9>$OvOe`IGxMAXYDl#X)=$jKzBmw>9Paalz$ciFKt;xWyJp(U#|q*)3yQ-qE}5+P7}x z`*wdjdGD|u9hp$n#3y5j-8VFk*Ade~_HT~cC%{QCI4r*oB>>BnqOvHch$l`k1QiXJEB zrphl)4C-ONYh?SgO4CC_=IMcuZ%3q^R+ym_{vp0f6Uw|}#(M3<{*7_S!KVqMi%T6E z>gJ2iqOr>D3o7}$DU+E`p@bo*w!Lme;Uw=4L=3XZ+w$zb_!w#E2V}eqq3DI>MWpG- z#2dTc?#Ty|fh;Ab1{C$~*23;Hdq2;#tfe36OMkhies~raf0|V7TqT3|rv;R~ zQ4M=%ERxixtuL2&vG(`YyMrUr1ePjk!|V5bXr|MVeVyms4*dg1H0bqPrs!)=xvFy5 zKJ$d{1)@XiY$^<4yEZg|XxZa~+CO}F0Iv+(jbs-FNtoE&363VV39Z=ssSMm{v`h6& zi6k9iB%E^B*Rua@3YV-ZQIk|cOWga!s^%Kf5E$FP5E15hJ|$Re>}>y|!JJC;zr=J4 z`ZyQvn{_d@kDI9HAR_k6PnQ%+TGPl{!EoSy&Yjo@xx`&4+nt-+p8k zbzfyb9FVHSt&crDzJ+9MlnG&t4vh1(QcG`h?Rq^CHW&Dv|5K#X4qgNaqZNi^E5^Kj zgq@-t(kz_f>R`qgoKCY+lE@=UMU${%C)j6i!aW5vm#@ZEBNFaD>j@5dk^<#Lc5i#Q zxb?^8*k^t+Dcl4lbI~})ej5l>JCsMa)HT2}*MgQeJxf-exhX-m?DwN^MoNgL{)bK; zWr7ikx8J5EEC$HB-y9bCugE%^K)KBO@IUb$+1}l_TvY%2Cev>6g2n_C$C04L)8Jje zUfyBdVWB#mi?Z^R!ppVWOv8Ra-dQV1QYmnt);67Mp3sBV9&OzYcb6QYhb8%22wx`v;QwQyTwCdq-C)Y zAE@6~G>1j3UU$BJ?n~y&eo*Jz)~}mRA8;fi*2nK<7Si*=*lP=BnJ&*bnKi_ngY%*w zUbN`@-yiFIIZoUWCE#Fe0|z6WwZuVrzz=TPwOj*)7bs>qStxvZzjOH#* zl6cD1YtE_S_$j-BaiP*G(9~`>JB0CyJ!iaDcg`GaQ)J4 zs0mh2EhiZTukmz2MpTV-IT~x`u#DVvW&1JRJw8Pi)atdO#(kBe;j?;dBORn}l zqbGdF%Y%cT#n@K+&IsKqZlDi;;MFWSeFx&+B$9mpM8~%Iz3X!!+s+#iku(NS8R9Rj z$NeiTg<|GT^=ruR9gpowUB#Ka^~1&y)VZ&A%;4;O-~(UT=KZ{9$}C>~nd+yBzzi{* zxgIJMVQR>L>krzeqZ9{mFK*2PJ!vmZ^sD9TR)U1WCkGXRcQS*8cBEF!R#{Oh+YxU> z8-y*jMyG}S;u_eAKdXQ~BVx>YPVE&@F_V)I>PhQSWF|j66C$_kw~G7wazBld>k1)O zdF!*!qWV6J2N2LhA42R*B#)B}(p6I<(##EcBK(UEGG+cyLd2uF41gtpKhxtTuj6*| zTgvrCWMd`Dcb3})>^p(-fttBJbsRXlIuL$;c-LTrIKABK7k>GEyVSnyyi`-CcxC`f`0#5& zx+^1$ub;X4>$9?7WuKjL)dg@RT@J21wD*@}T7!}>Ahw3S-!H4=iuq6;7??%&ksrVv z*R;+>cp9AM6MWEIcq^3UL@kl~b}fP6m+?}3CTpSu?`%0D^V^qCy0NA&GkZ$Me4gkd z0lRUwBWV&&OdWwe7n+fwY#qR*Po4k$Zy0IO;#8NqtyfTPWaWc7UDu`}XouEc`+B^u z5!7(owtgdG3{pey9#81ecoH;=YIWt-#d&ZnP_3*WyBW0%v)eieD=O$Dc>J1x*Yd9m zs|KFaJriU#3#%RErTwINx8Px(_vI0K_I^^J_l-6fDlmsu-#?%&^UagF>+CwR-adG_K!-(lD4JILQbPE$|7(>>l1kDLFp5&%&+{Qh8o+OnD; z_d!`$yLYh&EyD)^o%QCQ9yusxP0>I0?Fk!OHuua^5_ zeN`#^u6LzD#PE2Wn#&`~7Q9wcf`mLeN=%9JFzLTM|8tG-s3k2fEZ5+`G=r#1wOZrd z3n_j$g=c%fZ&F5S6=Nio{^G&HyAC1_`DYiykAiP_nMoSt)!Gb=QKcg5Yg`;OVkwg< zS=mlR25O-ikNF_AY1~^PY)ZXz)1^(y%bHAHN28{LcNJxm2(`+(M^4=V6JbO}NnMxnwZx#k7KB^{}C4%Od-MP?|_d32k*luCs>M6IuZWEqlAoa&58y&L4+n*lniOq%1JWi6LUDc+R+zJh@ z+rN^O%%Qq)AV8iTt}V%nLwm8l_FPBQP+1g|RQ;Y^tn@Mo9ykhI)={Ua-Am)0K<{nc zwV#=FZ7q+!q#r)INEZKT{HPPAa>w^L9M6`EcYsMu(4#9HO2swPqrRz@H!%-+e+upU zIabv{uH}1pm?>{5DMlTsGE)o|%C|?=TiheW-14<-^`|?$1nv&`zdA*$=j=Ma*Oaf* zy8f#zmpH&1{3!6c5UC16;fJ%%*bUZX!f(?MRy*3 zh==nka^5j2;5YMvx6&Afdk)DtN0+U$kg`RPDNOo0#Lo>ya-#s)Fv(?KB;au}j_k$F zVMzXKMf$F#bXZz5kvxaTYVe)Oqg#k|XM5E=f)tw#Ac~0?^(ihYkmV!($V!>iW>0D@ z@p!c-!By5|oL;g*E@x)4%+!9hnMLDmt4%_eG&~s(pHo!^->UfS57jdc_F_IkI*b&Q zikJ*Z*4t`~%uiMJIk1vs*Sl(O{C}zCGiQze4QK3kFjmu%=bWYcDAy8X_hN{1#G|-= zlkHcjnORT;Z}F2aWWAYREOyy+y^#yiO@pTUDzZs5wnL}Hna9=3&aEVM)J?#|ukp?HR*BE#92n>u|ZJ5*zyM z=lupjT!it#h|kk*+k_pbI%`K3n+04D@m10 zSWl`yo-Ly`#$|6{Je(uXS)v`_O$;Wo^7{G}kIN`hW`?u|qDj#u+I8<_Lq>)!P1!C$ zKYr4Wl%0$1#Q_7iP@QdcSV`C)pw`k<|oMXi$3h ztKB2oCi|U)q<5<|4}oxNkJY7o_siO|(*DTpE81r8*Mn>fC&9>S7YN7v|DrAu{dhFm zRWH}vqwFuxS2WX)d^Y-wOj|kS=dG*Ys}}E`;__pYSG`O?nyn*kJ6Eb+O2gN|&doJOxH4b+|L z?^ZNrXqAir;7HTS{9e_-Qu?uh_fJ+9Kec(bvz2OOUZ14p)OzLR3#r3R#b}BmGelAH-(9~GRLNGAXFg*jSer8-XjrQt^ZDhwPuv?Ue zH}=f*db_A$&o5x=*zsgUKmUzQxl;IeOWtiXHAk?o_!nfDH_f)|GKAg z=)Iy_Xw)l}t8la6!7g!$GrY~waE_lNAB@cT2^12sMqVZq*U+!Mu<16RF1t@v>|9}9 zapl;O=U_2@xDotX%hB_$^JQMDlR{nNtm3}&E8L9nRKBlDd}@*}$2{4FjWpRxh=Ci!I{XQsL>U=y4< znlaANd4bwK`|2S19IrU;&{HIH)cF_j%WTspuno0Bm`*{hj=lXa>fxdF<42^?Y$401 z`M3}TIQ)lAz1yv|w%=Dgf-OsbZK24mColulVXm3sL63Rfw2$-ML&2mP4F%hA76!t% zhVOb8VOMM#Vs8f80Yno8#!N@)hiRF6gADyK#j@xJ?(St%w4 zQ1Y=KxYp~3o#`(n_-EoSdyyHeea?MTV~r!wkz;qpmB$E-=~iQ5B~E!4v3{IIj4$gCT@E zrlIedbIzYb{x>3yiAK{{20k<|(jxMl$ZphF&I)5FYIeU6Vc?1obKXeALU9 z%V2hLq2&@KlQ8q)x+26#P0j_pAYee>xk5S-J}sV|+h8{sS7P)-4m#p?t~|ElsDqg9 zLT?q$LJ`RgEpSlAE)#G$*XTtipy^jzSef{xMxHznLC^IRH=b)bUob~BUC}vSv~!*# zz;V-zD4~_y4fBKkjcbWZJw%p7HeGPH!pn8{CSyYMkA6Q^X*yJi@J1cz!yA{2wa{rg zy{XPfQkpg0y-(g1wuN-pRm+I01%9<%XIm$yd0P}8bHJy(4DXFbJ+uZN;<`x-t#cTU zL?`em`YuI8OgA6Tv?P+!Kzk4wUb{KuMqcOjEfG5VTYhXX_+deX*{7SKDmLotJ1{Og+zk&a`V2$Qz_IY zXPg4qzU(9npa`V+8r4(3+A$?OOzhitxS}*x^^SX5F!?Wm!u0>ibFR z-C^XId8D56XUz@GSJ&rymDyq_hXH-AW4_@%&5{bn;i;jk>LRAte7|kNVVLTlr>`KH z{hI29%6<;rIC1dR(iPpO@rhEUwh;OtTNN43gl7r~2Yc|{#$83Xz$mqeyK$=pv0N2w zgd~tx6J`eP-#qPL_1PyrgcBkIem^VJP#{evGuc^N(srX zbe-Z@vQ%7*CWN@?8%ub1b&T6KfPMl+DAJOv1iM%i6S9%+FmEA|eex@3ngI*4VOdm> zIZCPUh?ISdU@K+)k}B=))FYSy-s6=hAJb9pkkKiZKMxlpL~mIiO*^J595#;KRui)A zwt8vrTH!*NDAtP;chyX8bSQ=inL{6r8&9u1!>b%6SbsGd@*}QD3Q28IYm2|8SLp&B zv*ilCxcXuVq0d`Cw5{&5%<40l^C5Q~8LY|^DZk=-}+w0)fdA=L=T-_2j#Dln; z=SU286464Q@c(qxmzyhU@i&kRsLO)-`GN1qI&R((&%SXM^6c*3XV{n)!e(8-92Y&> zUH%vnl~r#&9>BJjE8}c;il{Vzs*TNrPSUrS``S{WOG;#iYF3TsEKrxK8THA(Pi@Xu zOECN|PPCD9_1D#%mZ*^meNkg1KTU5ab{w$s{H=djrB@eMup;F-T{w49&|-F%0`jVd z0Ci+D;q%fSl=n|trd!0{fI@tvWMcES7lvTjUt@RXxjPU>&9`Ff6}D+hdz`oDQk&xJ zP~u`8o82#DlBLxA+8_2%L_=ERPbDS#5*-VV^A1d-^M$b^a#*I5a3kIhm$Evds@r?bP5X37&Ta(&T;!%wF)`eSy))?ld! z;D{Ra7olO>ozGs-TWsC{+n9-m4po+~4AMexAEKO4*aq%%u6^DmO&+$#$w=jGGDLqLNa0*dVPHDC1Y8LDBE7RR&6-BO1izLpa}!@7I{t*sr_v5$ zQG-QQ4uds{@Z=^zer`gSemPZlK~goPgWlzMUlju<=9KNRb9rY%9ln|)*1Qb%kY#p> zx%WC+)q9H@a@-vv$Xhlr**wp#y0vt%x#kUFZok8LgNx2uYzwS~5h)l)49MfqX`4J>%P=w_S>bXTK8hJ79=x8{<*N|4Zs)18HKAv{W%a>oTD&+`j-rJ5 zFso*IWh%QV8W~}*dhbd1cwcd7vn99MK9OoBZA=?D8x$&hC$vq!9toKLP1I!`cwzX& z+U@06Gt$V~>UxwrVsQ5?&9?D9Pej7~gfd#(t? zI!Dc$zl3cAW?Ka;h=)3Hf;*~};m))_#Ti^5IyIfjP)fA4!|)^m!t~8h23i)Xy-Udx zk1q`RzKz44S;QA~nD*f?R_t{q%HeBWi*BM4g&zkwGgW;UVVQ3Xwh+CqQ<(`JvCxX> zO|(hx;XC(+zC2Vn+jg^#c7ntHe8*-{ZC*;u&k9w`Tt0%ABo3`i*x9VFPOX<~3nQM- z3Al{!!8gfq-XE=tAzNm(pzsl11B7m&`?T=ei-_0^!{hopuAB)rNY}JhOZ(m{zSWw? zoH4FRwq;y?DvG3|C2d}3(xISB9X~)KR0c z!LOBaOl3=reXUQM&cI@O%av)j%H6+u?2^63{Vq}E-QB&@)0)&m)eha>`KzfQt<Np{sqlp4 z#R~~C9gk}C{PD?NI+MMYE~7c$$Xn|~D<4z%lwaBLl`BJle0Q&kAix}4tJF-j0)iI0 z5I)UOu@c6=SNXSJhF(=y~>mD9cPt9!pTQs4koAbLC^K#1f!M|5>FWfAT^q|@>m@iZ8^K9>Y z)ZFmiB87c&^D4lXRfvGNBxXaje-xkMd6Gl2MaK4797i`e@aM;ThR-!FTQ1UT5UE#M zPr-Kfrf)MXQ0&OtYbKL1KhF(`#Nlffyh8~MDy5fY1yc4if z=806i#9NMu0k0>Np&0U?P2hqP{ZjQ#L9i-j;itbT__JP5vzsT+MPQ||x8*HZ&V9V{ zeiwB~v%VjbVHBmW{o+|Jo!^fF)MYnv;iYSfFjhWNF)g!GdW+p#h$^=K2%mU`pbPi!xr6Do+#l~YX4H8&1ZexxAEp|(`fB_&YXU6c?K5!bjEgGN~t zM3Vg2v&y`wwqarNO)o@Q>&v_Q`4p{h{Ur#Z`NMh1^0j%Y&6xYBOX`F)6<%A<}x zUm;bf-C4A>q!gSI=YKu);X8wHhTj3g9ko?hy` zF}$;%*YcF7W$ND@q|%%|rE#X5Vc?a69ns}ALdqTWxGu?Wx8;n(RO@~|d4gZ}DnfP+ zOx@Hfns)L#O&q z2!3|B$e2ckLG7yIy@xshzuvA&tVcBdE$ukur>W`Ddr|FFMNGesd;j5ke@h}AGY?sd z^Ahq@atnU@=Pz`|Q#r7-nfYG7esSNTqR!utb6hU;4i&Z8@;jor&x%aa{$K}rPTwJ3 z;csTK&(7atCXzvRgtDD&!x6YxkUWX_EFFxr{JY1|YB=uDQ>kvhc}?`T3(NPcgYLDI zg(l7b$tm4g>n%QB-Ek7Bts?%Hk!egDS#;OypI`l0t|A`HED3NXv+dC#p`u#Whvi%D zbmoffMn?LfFIZ^lkg66AFx!hB?%Jh-3dhR{ER`0%v6wona#5B*7rD2v5NvD z1Zp(W(Wg=A{ZXf&1(gF~FDborW{EV_Jmk03782#yRHNiKl`2)Uya#Tf%nOd}m>))o zFxj5RfZizfV$cTL7_ZN4_CE%J zW{AzOIP)v80gT-gz_0B4cngNXTH%p+b^nIa82hL1p66ndQc?^!n*hpuS;1^c_-@&y?zEp_=B@Kwe}AwM z`a%XCM2+lr>)x)^p{f&^b0$-@E!NU0jG>oa5G1_^@qp*2S^Xvc{iR6<$uq)biQ7U1 z-47%+VZNAHu|N`i>0gVgJHEAN?qN{8<0@sXM|JHQ;) zr=n#+#nsMx(7~L0`Ls{L^8N7T{Au$=hSh2lI^ur%MXL16th1=F#d;9WZW)Y~SiuWr}|+C2aj@7kQ3)^_%^E;B1-!_U%So zOiV}#M!DKO`hTr_?A!nQ2VL&LItyR!`SLt@f0dh0GRbdd-0$srSYcj4 zhU6|N=}VE$6@jz@u%z9Y2XFXk$v6t4FURO*a(jE?t|=P*K#RMj1^OAW&G~4Qbx=7> z*aq+oCzCTi9EmVuxgz;1_JuoeTh2PUZORUm%z`uek+FCm`Hlx~gpM`Uvlb_-BhQ`! z^Gk)*PI9AEImv@il~Jq;S*O)U`6uJ9;k{il4Ad?9994q7%p>{fpk}yx!o)WVEzdYh0p4OZCPj; z#8u9-Hi{C*4+3Ui!wj<3<8vZy?=$wH{{S@jk{kX@;(r=k|JG+rgE62xWWQ(O`f0&4OWXc7G#Cv#5i1K7s~OR1=BOR1UEX1~;}9swCZ($cGw{0YIb2 z`;AXZ0daE-9#ab>VYaVfBT{NuW2x$@BZ6hC$+qK1pBXg`Jy(beSmJ#^AN+tVVNP{p z@0&FO(XAqM^Y{%|?(68rsNBs7_@6Jdq(s^q6Vk~mHz&n&5(@|K;0UzM_um^k{R*w52(=ds2)0BuIO-c@+BoD2G7 zZwLp&9iW1s(ZQ$#se4T-pvs~_^iPimOVtpQ6NZ^@)ZBjw8puGW`>z}H@C^-)Gxh)_ zuOc*MCdd-nzajP867sB<6MM*K`MV-mUQdec$1l9iAn5$5MRa0R6`9%U>2&0q_8Ma04VsOSj8<9g-UkIAEUY@$-)jjH;mE|J6>w0r2;zPn zbknt<{3O9NHRO{zjE)@T3!(M0f+^&$`kXc(B$lJ(n)y#+r-RN9ljyn1mW2}Ukwd_;Asw5%cJAdfYBXu1F{Ab`?chAu+d!PXGM5{e=0Us5Ucrm z$8oQADT0F8NYWfHfFpKBANR)drgv1@?_wmQ7{p3gcb{fXWi*4s_e{S+?Uq5MR8B}HM1EPUbH%(Rw43H@uJimRj0NC(qxFCs5Gd2ch zNn$GTw z$ihZaDAdONBqkTLpOH#)NI{+}dT~yyFt4yd;w_=txh0 zk>pJ?>y|=G4-627Z5LyHKYIaB{aw_2u?eTXsi^+P(A~ag6(Fsc3$dwwmWyfu7nnEj z40r1MbZrV!3lS!Q{95q?0NLCE;DoP%YlNVmEF)iq+A47`r^_>Lr{aD=0Z;}Vjok(7 zT4%79A||fCZJJY?9?EjZ8+rmV2K~+^3g=iqkk~` z~=Cbq!dpw@l-ru(1c4Cy_*B+UHN>HY`*IZXfS zFEQX?LxLGq|7{5W&!jm@_lHRDRl(Sq|M81pV9Md&hTM_Q{^#WZUZVsChX1@Rzn0Q} zc|!30dyt1Qul{j$-E6zwAYN{ouqaOYFHg9`N)O>-jQ;nx@xOmN^AsB!;#C6I=lw5F zc&G}d(W^%||FllP%mM>=8**frQfKmCp1_ms4{42hhW~#??Em{i!2HddY7%np{KrW^ z56XUEfEYsW|Hmx;pTE<@LJt}AwqFhV&pq&8U%53343HcN>wkGY*j_5qkj(!(0sij< z_`f^A|8I8y9?w04a(3Fc0U%Gf0@qI>DeLEgYhL2OR4a_`22bd%=SNAzf{L_x6)Q`!D2T29gYrqKKr5_CEs{f70 zl3EL3dxWZ8T$qm^y$3}VDd62uU^8W&m}Xbr^CJ6o{Qq~;{GS)~t`^fVP7v}UvYEeQ zhPz?Ad=ZmX1$+oRV@AZfptR7l#YNge@qc`+FBCGF93kovjrgUY1epK_O`Qh-l+prd zi$o&JQNWyp4d#ip095Wi6Akkkeg7p@f&^&dS8_s1K{VM2!uJy8s;k4k8@3V}DTS^W z*R?eOK}8P&BtGc<5UEkj|B^gNXU1dN6F`n;URCt-^~tlORf4Rp>9%h5Z>4( z_yCWGn;;kjWZVQe1Aw!S$Djl}AK;ksHzYMWevAJ5YD&DI$-|PrgnagW2jLAFEYJDUzf2LI1(xLzfCVLSxeY__=ZrqM6 ze`7Rt{JhTy72}$XR6m*#sCrMr-MHTl*y~BpJm(lgsZ+WXOu8s6w>|FE+g(tL4YCL> z8}`oM6ltc)=aO!Kgn*u6b$0-%M#cvGe^Akz<Gt zppp#G*aT5%a_GB{^E%($5$jgns{7-<)qgCC5_tMN=bXLvT5IpUOW+TR_AGQrkJe8b zUK4(5r)*TGc0rjtkaI4(b)=Ay`+UKCDtVuKt11>%P#ah)^G5Wm2v#`g8oHE@jP{yC z!*}68l>VU?d(#*s*~i+K@ayFyw4&*y^-g-13U~PrKldpY%GmVdN%Qw#-Fu`ZxVK@9 zAM*u93)DE-E`8WuBj_5H`(@|0D^os^P96^_z9!sOn0HlU-gbrd>oMlpuI!`*yle%# zWV*h^sRgiv_K38E$iMSjW%XV*_NYmF5xFGEtK2#!D%$O&BTsU5KwcR&`n>P-3cri` zF>|_(eYSLu!yydlwWcSwKPb;1J_~YH|fY)KBcHhkrnT{>NAMg1_Z$r&%us^<}Y+@-FwQ`4S)&3#>3Ai(Z+{OQUF93Ns{AivVRd57`Y!rrr`$tDh)(iJo;p8h{I9qsQ_tA2a=h~tr zm<&=(9jsjMW^NUwt0|Mxk>E3XzH}Z_`zX_9oO)^8<9IgGPfoHOd(2wLrrCQ{(7*xC zUYm9Ez$i?}LJc6r9WRg+Ag@<@k00oH+(Y)6Dm-5g1V^Nh-?$9S5VO9YeCoQ6dz_xY zzyx1^Kqv?b$25%htJjas%PW;-KE2>0F{K+vDKT{zQdx*4 z=x3K=j=K;htU~F3(vW-HbfsYD!UHz%^ziJeL9B17MnV!Y#4Yv#FRwb_zJonhP-1Y< zUL$&iU$XTv6_jX8C_6%pVWi1^Udqwi^ml;vZ_d9~`yslw+^tPc!R7ZTz`)1%vhJE5 zuNybiqL^Jad}mH3 z%4Ee>hd+@hCmbI@+(6-Y_MzC@Lf(1n`T8{isJ+Qr5Psj@G;l8%@JG#7qDor+?9S*o8%l6XsshAACj|*?dT(0{=;>fa3eL0 zC9D8tL&Ve75m)0)qQB>b|5!i&5cVrZn7#WKDN4rj(EL|_jzX!Ihe>TcP85v*5#1KP z5JD}?i8OK;dW+GZNOYV_x`ywF#{0CQ+GC|=AWcjiT5rc?xJ8Gh@F|!~-4-cO9xYXv zA2Ha!fp`($sv@^Ic>i+nTcrdUds$7;6NH`nlk*n1$J~_ao7^TsmCamk?50_c3C5D% z=EWtR?yI^v=wvnuhcjHrTGa+_2DLsb+E9_yFpJWhnk6=AyG;||YJuV(pa9T5e}K~q(J zZCqf)j)YWl78_AskRmv6$J>+f;?HDL_ZQKe*qU2U(X6~s+;NMcXUfarvqLvl<~ey3 z(LgGuz zf|qKu^kb8=VuG*2EA>KXOE{`G!b>o2XX4NivHg?iQa*@d9bmZ=UjL16A}$QVoK07E zT#~zfoyI*!%HS#5V&1;2Y<0q!QxhW}FX*tDT@2V}RnAWZ3>MmKeF}RRmdYKw9Fef& zxPS2)%-V-4C3dNC?t^lDh8x}JK=+q&4oJE_4TOj zS2=kS08yk)SH`AS#~qq+7aj-MM#imvggdafF;)|5PwgWOMI#2=30|tG_PEJ<1^jFL z#tXEt=*}$#c*O^e0p6esh*Yq@dIJqM*xw4p)Gf-$Ya}>=#+i&eP_rL%h?ReG4jT2o zg~tv~*B=*%RX>&iNw9%{pn<_fGqv&gdOU79NC zbn1Jmr>oH}RcNQ#%O^b$uIn(B5WLvNGwKu|AW2wr9^%A@-}Xc=W)j;{$_$5_HqVEC zcC|Ywd4~67F(o6e>|XR5@z7%+PXpqDSeP&@O~?E1qts;<2X`RsOpr)ZjH4?YzO}FM zo>7;DF$3hF=wC=;K3{Lk?$K+GIQ`4G%;(aN1<@yDoH;dL%5kh{TKUW{Hqn$Ea9M$v zC^Rs?*2F5`pPkgPo1BW^5-#KwNFv5$30wZjFQObA%BhWo!oU9GUirQhV4`@-iJ5sS zARiLsdP^^zQf6N29m%qzz$$3!{NUoQ$k_J$c4g+`2K`@IwT17TIQ7rP>$ZA+F zxT3!gJYv{a`Il^>I_*)6?qz^9EpoF@S8Mc9bIb}u<>JQ7=x4X|ZA`X4XiT{^9M|j6 zc#vq9=H6RPyKY+nCbD;G@DVl$U*yJY_F4k zXG&1aq~$MO9XTWc@2~ZF9B)xRM7ksqM~hIMt>n=b-ZNO-Sg;xt5>3uFQc-*E1ZW!B z@wxm3OZF?-4L3_$ngQ#r3YaayY~v>3!}1ysC*}pR9UwIh*JN~irbcFR(C^jMKeFWu zP&$h*wKRxdE_B$g?oC|b*YuJB@GcEwF%(~|LtM?jDtBU*WamS1wNuh8AHkWZ%frxH zr5Cx=0D+6TO4QrppXsR)MdTOYHg^fvVnO3W>(vFEU-a5a4re}dKIre!294rBz6r#P4K9ZLiLszbMaul^#_GT0Em%4)4>&2yLvKgl?zbY#xk@lYS z+aV$+e}ee6nz9nRIh0+xF}ym=e5=H@)enZTF3NuN;(C=(=GV|GG7MIeijGhf^H@(S zK^eprRP;{fQhP-yS-Is_Lhj(Tl<>??06qb3>k?6NmxWEyYx}Go$dnuM73N;utA<5w z_XsToJYRV3M7_{6aXTFr1M|d16m;;jkgp|WXAs1Nb4xF|uw;z_DN&YxcOnQfyBy6t zy&*O?{wXoqIOh`>5gYS_mO(znAXzK3&4Bu5@krrs=hOkXA4o3oU-Hlq5tP*+0WZjEP*Lks((Gv1UP*lYLIY8 zQLAPMB^ugEznZ`>V5DQx1kE5TwN{$iD*>I?ZxL1a1I@jA=&Wf*k_tHQ1*C{Ib?dOI z*SHYVu-qh~4i&O#hjA@%Odx&jO$3dmD;-xR;bY&bBGBpIe>1jxEVuh~y*k4D6;M z-3cHIR$)7lm3~+9t>EGN#xACY>Bn!Ay+1n+)Ltwyd0l8_Ypd`=w5UzTY_`FG-R@;U zUC>G7M|j3ZipnBcKyw0HtaLu)-)0W=*!4v7PEg0f+!U)u_U#FRnZ}QeEjxUh+f*{# zk>Uqk;1zT<64u>~>C^mmE^5obqAYmLIQ?>p+P}`AAsM9XAo|D7ZHDt5kr8gVH{J(hgGPoo&r}D5 zf#oS`T!QZrP&}PGql3h6YX&!1J+CL9o80OADgCH{8p3-J&=(nolLGWv{CXX zZKr+_$t6rW$mKq;rMeX8IZTK+kA66xN|avsQWp~t*zN*iuw~ru8HScBgU@cLXP6xz z%dMd4j2Wf&uRgTzF4ck_^Lf{mdiwE{{zuXBfoM?tKpRQv@T|r8LYd3 zHQvFEr^msDl;Ax6@Mt;K_mp{b8iB`n@AWvZwPKgWe%yKff37(%zNV!=tY+>&9poiv z%OxsiiB|`3*>W5ioe>urwYg>zKEK*!TY9~0ATn#RE!z6wXH{OY&B+uC?+4Fs26$VN^*a-jB`F~5}5c|)y^li3_M9BYfY0UQa3xS@wmg!w(5qH94-na z9RG|G?Kr)(ksb&|g=de)Rj2+jsc}R&kM{m-%&J0m#oiR@q4cB=hQlhn-d_!O?8S|f z!7oEvs60ZTg<2g=8c|K~>}5xj&P(9pKC%&VdU59^5Vpf4M@vIDgW1iLhR+d^=>dtI z^2vGirtyLkJEiRS`s4i2f}&GCA+N*}R9+(a0j+B1^Bj`iP*cTL=i~1xT|*5+Lls2A z&R?t{JHmF@5|XiZS>g`NT48+hUv|dgc@>_iiB-|R)Uly<=`?flwFAUou6T(`>%O*p z>F%*W88fahT$g#sZf$?1A&c|?rSWKd8no!{<#`#A%pudrcIN`AE=Q7lj#IJOCUuV& z*lJ<{y36JkUUr1Bid?4>P9oa}++9lkRH}WKXoTg(TgE!Fi|eG283PS?d5l+WhH1H^ zFqZ_)d3+lqyRiAZXX|i2M=lLzJsFKpe}C!Zo-1`N|0%&?jCgd2MflzGACJj%Gtj#h zSlWRl^WVY=+S|o5?LTOTy#!=^`NZ)i&VO;54o zz)v3V0yJ{*TXA*dr@EUk=x!A@gAG3};kQSw^@B`&RqN|zg=F}I9tNPhxpp;2{7iUV z0SmM?IsfKABgH?Sm7a@)*Wx(g<@ij5GFKttRr&I|pRDgE6C}La$QfuZ14+@}T#JNP z!gJQ2tZz#N5?;Gpa$|q;fdA(Wz>f@pp3_4nKidO)Tk^nLJ7*E1@{?!uFoH!a=_0rP zY!Q865t%>FT)+SO{lh;dWq_Yw4gD=Lk+W&K2*v=Bq(9#2>3#?FhbN%5w0>3LoX4nh z*jJE27J(mDUMlXgMMbTyx++o@&+l-d#45FaC79=6u(pfi@8bVB$p5&Y4wWi)t;8UQ zszHQW*z!+({Kld032n)8Q9rhH!lu z2z|(GRL>ui9piCJWTK>IF(>xQ;$-J`Fkz@If0a1xZ^^{ehA8or!Fov9$sP6sG6lt5 zAi2}ZN|FOT+ju-jv{@Gt7_$i~{KRCt0ExlmFwHqgfx<|xRl_EEo|r___8Gok@9~(h zGA2OT0O^Sg_RNpEF_)LWUoSja|JaEZN(2Lu>iedM-!?k9)H$ab6R9lG=h2inQT^7oA2(RMd%OV1>gJ zn5qs%9pim)0~*i6m)m84JxxK#~6 zixM^byaY88e%)oaF_dq?ymLR`v9vNtqa8_n%L0QI4&=}`Kfthx`}{WAmcL-r82AY% z$9x%b$7o>b%e^j_X*j5yLSd-_t|_e;(&95GYbJB-j(w?J1zn^T zqr-y7BF>%{ib()=MicU=XfuwOYXvG)`3C&l@VsV6g6$l5g(uOtu7R+Z)|+7~_C2O( zb~TMCGx`{deP{-sIsRF|nAe~jsVXQBr944`M{tg2$e#RsmtA+$?z6Jn@HFbfkb$V0 zx%RxsI&_Bfd>5@jy|peZZkh~Vi89^#?rVjl4Ns8t3WGY1s72DjUAF`*>OmST_ADgh zD!exNfCHznESizW?t=_Jca}GB+1SjHRx51szG|ty;IVV^EV%9DT1L$k=a9p8le5?w z*wFq5_9QI)h8=oO^VYOZn4L?O}psabP#@EApMSw+2y+uvL1{=VGiDu zs0CoBKBbNaTTwjYQ?|pmb+uM*a~JpsXU3z~?o;a9VDTU+;HDm-izY>pmnF!{iN0iM zP(F|A)HPw@wNRbKHA^QYQ40*!A~!#S2EZk7)TTzkviXh=6Nbgk$79RJhWya-p=oWufIUpeA5@ ziO5(b*pwriD&q+2!$X^QZNm=2`5XB?gHM4?g;!YRw-1Q&XGfC~QG(A$g){{@``0TN zyS)!^f2isvRDn#wmU+uN(mhTjvgl&g$a1&PoJ2n;aLub|(II>wZ$%XdoFIbh)!aR7 ztJIz;zEOh~nk&N{Bp&3eL?y)Z%{-SvWve{Le~vp+22QxL&mh%LQF{lKBA%(p+r-Fx5S_)SL% zvh&BgQn@e~DWy}sa9hfYn%yxJi^6dAfIx1SbM<6778vNFVY*$=ZeMbz{FdLJYC5p2 z-;wOqJ%03vmiBm9Aus}Ip(1t!;tf@Q2wDy>LH!`@sDisI-?5Vz`d#9b@iw|LR@~Kh zbWzMXb^AOT+ki@muHk?4iQLF@CGMtZ-oB4-C=?SZv-)%Su#T@Jhbm1TLpU9w zCgq)r8{>ctu4D6I160+!yyZ=3tAU{4;uu0(WV8gz>t$-#Kdd$-T!uukm3?Eq6XR-k z>%7@ellK~{2LYT7c-iSfTYFA@&0P_}OO>lzwqTThOWZw!`~pGn5yl4YWC$b_WGys3 zJ^=)!@G4i4XWb(EHI{=m{y`dvSY1qjL|uO#Kn9rKIfs1AfeveJ(=H$L{zQ8|`dY$P z$yrbQMhsX=jQZZT+L>C?RM_15R@ODtH_ae+@x?w`DcNr>l<00JJH=Yy4i?$)Dx%?) z+%oErpbY50^cT@D(402r}I`C5`bYLp%{5cBe}_<9&Y^{8oyT zH`uH3{hoab#~nBg%|m>q@v|R*^5d=GaeL?Qv(YJmxZY;&AkrVA7P8s9?fiXkh4!}f zW>y&~a|a0}qOzuypGwZvR|2qVwJ`hjgXO_MjLX*CG&MQ=9p4wd*Z4cmh$Afvd$?Us z7b|`p02NqVG6#|GK;toUhL%@#in{6S>ZUQK3l=PtDM8 zmvIM@o+Q6wYRTL z4^;jKi2Waca^c~&E99+;i|m%IQz9Rtc_%g zst#ooVtRm|#U2WKLnzQxJa(FYV?!-Ngg+m+q2#6Lgx{6V?rIihB{rwy!BqY~5BT@d zxxl;qiaRE8XbgBGt`{bfN&rMB)@i{Gy4fl7viFYfnCtnN-40MR6S)dU@-DpP?=dkv zGmU>A+DxDJ#)XA#nZ_!3_W^j-nw1^%t$N}kJSLATl;j5TJ!L^#iCaH#C@Qw3a^N5~ zgl87wxd(ya4JA)`0zDqXIcl;%y=o6KXs%p?A{(zmImqC?GAN$_^IbC3j#TZAiCR_A z;B@zCTf?&I;od{nH$cJ87w``qo_IUx2p2g^a_sR%h^Lnw#{lzXUp$e#ZYZt>{6LMg zhChlB2zxU!ZF38t?j=G-pg7s5#vuOsS8Pr5nl`)q;3lXdEA2P`+8bnTi0|&7<@RUup+|)?+ zD-uqsU*Me>Y+xnyroSq81q1#pWOw&Tt1&2~u@AkpUlLg`YBaB8h&}f~rmbj0_N<)Z z^VFROXyq^MmAGP-%Q80Kf4v$?C)2%K3<;89qu060C0L9ui59cwpeQL z7Z3Po$g$RjQMvVg`j~lQtonW3D27H6$#!~o0pw^=`Zsj>9lx^asq`&~93)K3G-PWK zZ}?7-qyYU7>WT=Xu;hBn7sq{o?QtHI8fe{5BN7Z4{A-ruMRiT#6_#) zrE~|tq$=?SjX{jp9(BjeLfRw z+W+;IvHgbroB*=#(gf&OS5|IXpMI(|TpjD49<8LZEP;hC(36qXetU&cqTiv0JUZ1sP?kS>32)hM0TDT z(rc}ri0Y9$zGN>+i8Nv<6ybpKrj@B6|BoD_mf0BMbJX)#WwD_>q&RPQ$1AP`H? zny7u;3{^F6nrPy2QES;v1cz57YfxS#2y6B4-@oYEWmBTZp3XjV^=v7mct;E{q7|rc z$+(Wqcc!j@=n);rcMKvTx9`H&dh$e=6%<=d2d@NI<163`-h_N>)A-{V0qC|X6|>

PWZvXC_Y~Puvjw}Z1))5y?j23`nU}^UQ+ZFeqhD&(Q_b*Y83DL2 z3-HHJ;+#TEEJ96RPT;&zo+()YEJOEgrTw6@!WUvXs6W2TMfGp z=SyhYB~!zn0APNPD)zRE4dtu+=ABd2F$W_EO$_KZpKVgDZ6vg(CAY86o!Dvv$Djt# zxLoRi2HJReEh^h;f*IEFdiRBHS{0SO1K$G(5)**HmA59VAJdz_b?H15N6NH;O_fXdMeKTM6dl!6woXBP>E!wCM%VJ2=;DwXvl!Nwa!Z&O^=x$m{uDWf z!kczsXrIIa&EIr^$5D);j?e01vwrLNq}qF?B*MXak@ODy&z5uHjD~9#I*!q6~?gU0e*b!XX2vLQSrbN=p?;CF_4r~eM8-@j`yupxCKjjKR7CjuJ;Mb(7Cluoz5cKCW2J68GcBLRhHP^P7k zLo;2L^-%Py%>p)_XU(#o4_4&_EHS5KrV;Nl*ay9=m6-Tt9}cZ3^Jo9}MGHd)$E`nk z4;cSQR3d1>GUW1;|4}Q9R(lomO?_Jd=I;7eI>J1Of1fty-eB$xW>orX1(;`nc@~&w zfq52|)$^E`fr%NIncZIjf_WB}JqxuAYjW^a3%Zj+(qtqx zeD4Loe6#;eZ@OtAN#6<~5fOfCqm02Ayn!5$OrF~Q#V z6<|t5OsR+|75&Gq#*~Vf@PG*qnDF3xaAa~pOnAVA2TXXtga`jw0VX_P!UHBeV8Vm% zE5L*YOnAVA2TXXtga?0DBQop7m_}0+6#jea#h6YK=G$aCNtjL&rjz6!%@CMU5t9pI zazRWk=sOeg|EW~8-)4;g^n0;WIdxp`FVy;vMCSh$@bkyyE&d)|If4c zdG=cF>%2H`&UNh<%LUAN&EJ?K?)cuHdxXAJl6m-m>;W7c+(S88NmV#Fv?MqhaITzia686u zaDw0ih#k`ERfNC`=nk?v&Tw!T_^|)r;Zo8_;NZmId7|k&`GUt}c%$ah^L& zp&-B`h`&P$UOCVVBXpNz>L@2*!Rkm~(G=>&#`r+MMuc{N)q;S8fqu{7dDWPHKlk1J z@L(Zu;NU{Ux5jcX4dT4PllaVY@Y!aXqu=#*;l1_#=Gm0d=5T0XMtL=%M;gKd#;msp z52~I8m}LGCPxU(A`+1;i@t)wN7(DX-`X^wJfzxjD`>W5||MtTF`jzAvQhilp^6`S* z>~00h|Neyk^~RTC0Xc7Jox;cp2>yLl=Nigkgz<&qz|KphwOB`{OvTr!1bb_VApp_4AxLgj#rW9!~YVzY55^|p4wqS-G z?0=l@fBOfD6)=L=4LP4S%k)?YwK_=9v#Xmj^p1!uNZh&E%8iN?I+5k}KHu})ubxUc zkE|H*J^#50W?d)>RLFPcOvBm8^iDsk&PF~v==P-ayIlT$P`|5X z{gy%F4`*GlP;3&uKz9_++qR&6BnNJn}Z5{sgD^xQ81=UG9lDr2eO*P!U z>GoVz33Z|2_rZ6a=%67?p8nwgjxqUCw&>HS+huJ3A_FJZneX#%vm?6CD`DG9d)zj) z`4{mx`3)yG~`!79{+LYv?n(_iuLX-_!XU z1P~i~1js&qqwTpK|4dcrvvQ`0^B{y_%5^Ur@;NRpNGVZ&yY7bakWA9zvtgq}rtf)_ z$n{naL*~s<8+I;e&n5-<;-qG4nHtg4rWJg%G1U zp(CMu(;k#1EvOB%38&*xybuh=d@Pg{G$4F2r{4;B7#NYv4brpXktZcNT#kBRWNNw{p_;nZ`MvhK z8CCgO>8M2b#QF~6wqFy}xSA@qm4DnEw}`hr_H~@jnrgZ-xl|UmOfhaVFVJ?4=>bON z>a^jm1zWl4`r$fJx_3@;;ePK%GQaOl|L&sS^~BK+XQhVmhFIH%y|`FKbvnEr1xJPQ z&H&7YS?j{|6wz3^Kf2Nx`r&RdtTsFDXo=~dFYV7U*nW+xDUUoiW!6B15F5DQjvzcp zb7)0pDf{w#Ti32`JpqHGA-do1_8PZ4d+~l)0(*d4;g}#5oN#xhXo*XPf`G7A)=`OX zAAT9#og}(W>M*QZws$KhKb)*H80AVX$u* zQfVy|efKt;ZExN`DGoUz-WtB5=pm`RRXuI~HNEc65;!t2E<#F`pb>CZBlk z$3}WH(&X=d?qq$j=zl-JznG@cQAC{LGHnt}c&I`^71xm%_C0!?)^X0Ui^8d!8hpMV zQxl<!THA7h0Qzny5d5k-{-B*M1S75x*rIXOwl+istbkj z&crx_eR%k#4NFn#?1fBS@gFP=wJ^S^~RqgsOq|csvMLeAhAr}gXYw*{(zB~sogXjh~9sROA3W2!j z9afU&$(oy-RUb6ta|Bc#spPz=`MHtdeZZutgc&OE(wrceTm3mnnf5oglon}JN*@QV zFo`WjY-+dXZ8WO!$&$V=RMO@;6dAs1qy>c^^8#mQu4aeicRuH=%+Bz-yFK&nSD`5Z z!>KjiMF_lhvcx;iX>j%pNIOEgp-hndskbWKWi5sKP0{<%fgirVBMSt&0*HS! zO}2a{$`$zemS5!BNk@-_$dze(j(3B@qMDJp(vwT&)C$eK zD=eHt)_qsCzXXf__c_X1M!2WA9zHLzuiq{xdiDMxUkLl&dV=0Tl38SE|5l5ApH7lw zIC}b4?xIgl;Ye8!DRp^0m8r>AF8ON1qu9M zKZZv^ibz#+yg2yMkQq^9bMvs2iU7D=rNo5pm-QwZa3PvbUh zb$Hk+RFxpNjFyB<_7;=cbQp6Ty|%qwKQ9!O6DLgG_@G+L$oDMs{>BoTva-jUT6~pr zH)`}lx3ui*gEnZAQ-qbKK1JbD4biH`oaTzB;~p^b7qg3Z33|;T>_0?-GiJC-H1uLx z%}ios?XCJ%B45sICjug`ik=3yjvLkMP`VQZvoL}MDP}%(XyhqSe;>?@< zD8Fx4*&LDeCyCd!!p9N(?1yS8r4jd-$qrE{4!ft1v~BCG|CFl)pgiDZjc)r&#}!T% zq4%bGA}16q)Y(UQcG6XYtpiI&X}uIBhmeJP$IdJBhd2pgp)K(7u6XxUoYBkp2~x?% z@6bbbUw*`8W*z44c@i64FeLn*2n0dLH>X3C8UsS7{i)y(wc{(3XQOqlb5hUdgtO~< z(yU0lF0a-!_u~rg{GzVF70jEBYf;eK&od}s1~y~(Kp*>eR#W*h1qs2=?*Eq6!vg!+aCUjTDVG({U|qg&%67Lnb}_g}>_p#LjfMSu33t(U{zhti(=B0jPLo zVZ~QyZ8-QP&>^m?$GIO?aA*{KzQxZ`IHC1_p?Vlj9Yf!YQ~4MNR$+LpBZ(N=9B)P>l{?_P|O4iP&Ouy?)3S}=^xALl`SMHCW$s`{8 z-3^&!Jf6Q?q-mtr^*SUDT|a7iO?kP3&2rzWS6$Md=8<#!Sjh9BnEn=m37ID_NK$$; z)6;do`cpL6X5r4`^6FOfr)RqLS59NL8Nk<~4)Oz6tf0{1DFZ!(+1lWxOnYLuk9#Zh4|g8mly;X>oo+*g%Q% z=QrR`4@f(HtucK!j6t0f(iN@D%cvD|wNv_eQ1t$WQDHd8h0yk(;dHPfv3VM}7v<|v zhKz0jB$jJQ0*2nB#3Sirw^x2@=m<^~;a?PsF^}uYrG4>Y)iyQAJ=bDzJ9=`RD9Bb+ zq07c2WC)OoL@G^bN19+piZ&>X;+IVj-VJ!sv}EN&SJv3Edc2&JDxHUf`5!nWKvyKO zEKPKBWlujS)DjuEW;Ajiw_%G);zSy-W~=LDML=#TZ%^{w{eNt)x{_{wMYM=uRGO^w zI1H`P@!XjfIxUFeX>wb+mhhG)U+C znSw;dLlYcB%Educ&Z-#Jv1jx1*Zu9{{r*I$mR;lz$@MMLjYAqdoHlW8$rgRRkswS+ zTuOU%ToThR@W8D5raWEF>IWt1&LdL9TqF8%)ZD62l#V=&y`1WJEpZW^x{d&SjBGRn z!k?Lgj0rz2QrXTojGhxi*#)n+a(N2f-iZsr;$Fr!S>jf_M{lZBKApAxa_rddV~j1Q z69$1uqK$=8&FSDXj#dlI08^y~#^!uN%i6wN5|+x1l-HeTsnD`D!vm>x5{eR2eWfyz z_CODUjnYdHPqeE*au`{t#W|s`p*UF12Ql=OQd$OO<#CS%U92|Ri$2e>(vhH6HkXNF zr`hbBwiJqfSyHqQI466_#tpJaPNwnRldnS+AMjR>qk?dM8Keuk zld+-XDbbL#Cn%UC4j_Awk+YDW1(8y?j1=!X@)^xKPUVUx+aSrq>F$wWmS9rJV48V> zIytQm@)c(U-UC|7cXXI7)FthO1dPn=1aWE$ge(lbA5({fFZA<9*dyk9xFK2#diIU+ z$uULb+=N&9Pa~dCsN~-~{@C^br#alTqX}e&CbkyKV9!>RsMeEoTknvqMn@!OtWf?Q z&=qX><~fgOWb5?mO7EgouPIO?!(%_y6^rR`{fMK9G$tOC^qN*Jf8AoD{p6niq@b#H zXm6fob6+_)(aoGH*eAzDAyb=qso?LEbCB2~BByL`mY*tsY)3CaXge>K+u#MxAoW`1 zv}t(!N$LzVL|)B1wU^^l?ijFWJa^)0#jmG6X~=(7P+GHWrwPYhF#aNMH<@hgR0pPw z|H0T`Zlqud!6b8}V<@tj&3JzZ>G=jVP%_?3v?{J^vCZYmUuL^9(b$Sf)94mK4(Syhoz+{iRZ@uA-ka@$k~<8} zA=V}+k!fA}=N}Z1?ZErn5@H!LF8r*3wDv!qY9LaNy%WQF zI;HcbLOYS&)j(ZRJPcK{fV3Jvc}$VtV0|HB1E*^SB%&*fD`NilzZb)OS7I`=k@->$ zW`pXw89Qfq9BtM7ck4!1D$1N(fR1nj(s+x=Y7k0t68mOj#@11|O`8C3VO{2w$zSw1 z^YF)Sb6zV#O?{Z(;OPzidm%>66xA}qLi*-r z?Xh(EO4Aw8rABYXL=O)y>CUq<$2#rLp);2p-m_6uc5}($OMCK_-aZn$7Q1#-!)3r=@C822(BXWz8vnsUF=&vMhD=GToeQ}^dZ^>6G z^u%35302EAnZ~BOG`vXRxEbW?Rp&Pr`6%O_6ZyGesgS^M69q-z;;?nSlnn0#bhG8O z`N@p)s(DMh?dACOOy68Df}{N?f1Qlr5S7H^yCyLu>BFK3^H}CxUYS37(Ex;pXlrvm zrvoEY7IV7p^RA_QkslPe7up1(o=$4#s^;WydGPHNZRe3hcORW<+i$ z9(-)!UoZ1YQ4GFn3x|S$`aIb(BlIKqzDqRWtg2^4P`3t;EYPBbgO0GJHjab)tt9!N*ejhevHo{VSRe3h4cVEcQPJcSIJ+vM@pS7oS4}+|b z=){{80%axptCFb}*o|(OTXjG`I~hg6e%$}5cY8178izg1i@QHz!s%Rr7=N57)%W)~ zor+L2j`{>-F~e)880{VyexbRa35Kr6d-*Pocl-quERmN?@wW3D4Z`#dtH;^ozsE}# z)ytR1IArEHk2a4ir;fYkz2b{Y5|}Ko{C+2zsCFofMqxfCg7gjXTU%>!MdO>bzCivD zwmhrZKk_0w&?5Gm!NReK?{(Y*2Up0L!GRZ0G@a6h zffOMLbeE{iApUt5wS<18!fB9IuX5+Mf~nQiNKOLMqqA#T@1$mez4f3^rE9nZipa&; zF69lkRe^SoIB{d`7?b^RQ>Fdgx1>e&6gmeKA+?O=X!NTz@PUFSG_fBdk zzOH@aSxz(9)5$Mm+BQJgM`A7gRElb|w(0hbTQUATQwnFnX4RNdDf#}mIwC#DyvueD zz8|s^=58dlMcmYFq=YwN_VyT0A9qn23E{%$!9qJ5ZJyd@#9_tim|acPs4GG#bUrCy2Vw_P$8GGW6cBevk4n%;m=X z$x8&Md}udyQ$7e?zHm3T*=Lp6FqThA;XiPmOap7e)PG|Da?Ypd1@$@i!loq9L8cEH zVH4c$MB=$2q&Tm2e2zPkO;}M)2;})v4MFe$N&+WnN_*8)hO=*KDQNAJG@vbXz#M7S z1i+J5bCh?6qVbVCG{ft_cKQsMN$1KWs>k^B-w%I06Va#Qc@K-^zwdp;kT6NIiXq8iMazMcbZImH* zlw=>Qy51>uP9S0I6kd-;Cf1LJY<(-oRO-Ea5YsA@C#99XUz}nbR7>I6M$0-@T$mQthUs#1E2%`?>|~<@=u`OZc&7+sk!)XYyN+x^h-Cq;~_Hn+7+Hc#kL!2jEd2TWv5wD>c+Cu5l3q1XH$BQk)!dD;z z<|1qr<>Du{Ss@PDan6^>O0Co699fmB6Y!1KKHFD}hlBIf=TE4G1H{rQXt1!VXzUoS|_5 zGEH!|rnQy?-;|NpiNRFz!JeLf24sKYqG|DXy!ORJBnbcA@5-kx4LX_Dr>1Y#!g2kZ zwsV{A@9{?lcwW~w9WFGU6m>oJX61ejZ7vn+CI6$2F^OJfZBq@8h|;b@n%TlEFi>M$ zUOgGc4Gr@EVyhf}yvZ7BuIGy`?w9YWDKM);Z$?vgX6?SeVGU6gD!CKq;iA+U^!V3pYwYywW)4H3 zIFbr^qG{l&VIj2pv(l1_XVfR0M6MFly)+JJf|n+NGB}{fbYOl8Dti5O<4(jX6{Vl* znHh@veDL6$x=4%F`fY(&h|N*p{c8(1fRV7s=m+TtW&Gr_4cs#Q{O$My>RJb ze=RwL0X|iA-PW$ARsFNRz+xGX3)?{n?)XoKWG0U3?=t2Zv*mmPhztV;KXr-d!lv2o zKY;3ERYzr#=ATk85(

&NOqE@!3&9orb_jdl8p`At3jZxsTd*2a1?WyK>@_t?LnU zF!6nq8!C#1{0IW&k>5qi7YFmRhHs7u*c2-t_XC3@KO7!}Yi*2%l}*83BQ4w(^w4|x z12KqI=JMqeLER-v<>h>Rd|_vaqlY8$>uFed33CA6vzMvxi9k!S4iR0~3IRs!MtHl6 zB^-DDBbK?WuEOHf?mVCId!S1=by-s{^NMtEN$XrK2U9Kp<(n@GR2>tLSHvt9a!vH9 zM#xO1`jZnru;7<5BN@+W?l2$`?yjgOK+}MWp707$?=YtAWPbWoQGWtaFRljxqTF;o zZ^rS^`*{DbAhkh0inRVy-R0Vt;_-c#PfF2o)uZ5>E z!9$DAIdtC2`VWxJpO&4sKk=~T{u-8~zmfV!E`dZ5VV^FVCxv~;rpqlrmCCa08~Jmi zvavR!=Q8~dFL#3wOT#o!oJxpT%z+45tH9IkiaTM}lIP}OkdN~HPwKe~TmW+=kL%mg z6Fh=TLSzz+n%z&|N8u(7y^dN?{W}tP&&QGSLsnjH0{?7BP*_njS?~wpgO?7l2~4D? zgjS8sz@_8u!c{EcsI681$Z>Oi5=;5jmT+Kuw)T*@v~1LF#$4hL1)KmZcJMLp7mYa% zwQ!A_d$WTd_ZI79Zw8<~zSNi*o{n8`n|%XHcBHNcAahhKj~$=p(M|nRCIbh^iyJaV zPF{M-ayRAw8Sx6PmF(6V*l+Y-WSbcO1V$U|CoHh4x-hUw`!$NNyc~n zFzSDVAOX?Bdq|KlThwZX{W zi}w9ue{orCRV$Rvz|*EETZ8WOUZTfAqiL1+n+Y zm}|WMov8m#)PHxB)qjuP177Vc`S-iOGw-iJjZp-^7O)Ho2q_E(mba@=o9Rd~xj8k>Xr20Z zWT9X~v%uL!)`Xe(8yNlrc#B;o{px<8j)}Bk@{sfuhm9pD*bRI!X#;_gQk5-Wzh290 zlnb1LnCSQQ?q>!-EPyon8)0zNq{ND7z-2G)+ZzzVgwRKN=8SknXnqp=jz<;7V>O%w zlBdrT<<|rDeq)8olxC1}6x*F^h8(&=8c1Sc!S&I zAF{nsJpqghm2*xgy-f-BhozRKmiJ6NK=l|~*DA?AwZ$v)06dS!zA(EdjLZXF0+G+dzkeNy7x=2(>WX?D9H^;09VlcC4*2m2paLA(32wH*F{ zR=B-aEOxdNhC z$z(9PZva-)z&PdA@xML$378jo3czD%^tl8n*m5)+wZaM`?B^-3KP{V7EC)S;u}81V zDmp;`A}i7q4S)frP(&;NbW z6Q3*SbqTs*$nc=a74U3qzihbzJD!%I{OtgD#EUsl!IyOOh&9fS*R)Yj&-Yr9_CM|* zPQC}}32yF+gb+Q?t}@6p*$G5;igHPMb?#LX{-#``%RIa!hPAsg{7y5fJ_IrMV}fDm zdMaLb@<9?86zgSyX6~#0CzCnGdTM7=gN03pK(@%~=N(fRyR+;!3sLn!H*3(^mv{aQ z_+cfg=Y7x)>-l9zV{@N+*J@97G>~@i#7u*cey-ms39;eX3pM%dBVCI}oj`(B-G=q7 zim_%YCrA+#sP+2*7?du<^?3I{g>u28yZ;(rp1p1jd_WsoCCjI8Id{3Ne-k!Wsb{sQ zl^)mIRb@>eKGXFzmjB#v8aKrMVLPd>dw?VrbpurK0=>#eBJqtv9}9aO+3-n(Bz+Hc z6%ZV{XlKzdhN2%WYNfGIlClZAmSWp(hYBit7AS^?&s*h2I2~t8D~eCD((=^ds!>bA z6oaRF-zJbF1y({dDfQ089=`z==oVI^h4GdktF>{p{c5xRci1J<@DeVhe|REVxyJq% z9m$16EiRAM(?^0UVM$JfgO1N76-nUL{26HD)iTz7QW{lXoS=BEuZd!MEw0EY3Q>sK8k8+E^NCrFI zEc9@)G0VWV2~Y+_%$!c`vUmI|UAX0UM&mE5PdY75Fgl+zuR5itPjb6;M*R6|bCu}DrLOwd+WGw=T!YH)@THa8=p z3!_SDD^JI_OgM;M%cm%@UvGso(6qLsnE}J>S*%-cPm&OG>)zlk&mp=iDkI}hQ1BWm zfFx`LRJ4mejwW*7SI`|}`U=%I6+OS6s>>R`M^Ml3wNY2X>O)*p`SoUGyK@8hhklH` z<9c2OU7&&F^rPmA*<6Yp8P zmSHw3CkrXSKMT{{bQ6k;bbrJphik_L)d-!9tEqQCv2SR)0Y#<`;sX1{AC4Zk3{n}m zqP(9y3`498*HcG+wVNc#KXbrm>5~**JEhCkARis~Wz86=0!K&oEfvP5o-3f3o48ijZ)kqr#wk?j|F z@yOoRcnGYtsXq@UjKZ4|Fa{*TZ3?d+*?lv4>;%LuVIU^hwtfTEPV+nJVDeVPNK3kb zB6ufY|AFIQ6>0_kgLmQa(u>d{DY{?^HxlK}H?{K##;R*ahk-DOXf})i(w%!9EP9ju z3z_PqouuFt*nObw%mSG|Ig>~4?_^=CII;JLkP+I&1TiJO$a2*62`!^?@|za9o=oe4 z6mSf;c5m!VDP^h4uT**r^Y+{s*d}M5U-4`D}_C}@<5C5QRxhgD0 z&L6OvE<^DM}PeTf}_(@LG@1w&b% z7CXg~bw82T&^4t#;HEYEy2}|=exIj~@LWAUICg0ijp{h@QOZ?S@)s?;k4rP5lLXG( z0}mcl^oc2@B)!ZEKse516HP7uRCywLqp78F)(n^(=#RTmb_6~cR(B=OR;_+ezxGjH z3Do!Ip0o^+Wx|SGAlT|QqDC3RAu-jAhu<;U)iwYn(`6Ov}SQlokNIO#B3bL7l)TCdj_Ccz@@P;`B}Ror%g4(4hOo zutYch!EH6&?%QAKAqG;q&GgX5n+nmc5U5bU*}xxSbqaansIt~>c&B;^TpyjbR0xYQ zg|{b0fEd;Xbb7+3N1kQqf8*sNU`VuNp?~pila!)uU&TO1NJeqU3XX1)Nf7ClS}sG( zLbAtVLgXDRF5RHaT@*!Rb7AAs4sN0Rb=O{||LYCgx21O-q{dqs&`7CHPf!A8V}3-G z2mvfL4o{ZQszr`T+6N{_E9v8CwCQ0B!?X2x6E`VFx?TrrNxQB39M5qHdVg!7RfBr> zL!~La545)UZN6a~p~OR~FUFp~)BCBE(k@F}lHV8gu_|F%q;h~yZ@XxPo+09t?<~kE zQo0o$De}#ToHHYK@F@+SWwxij_pkPrB!i;0R|LUa8Wp2YO)720Dt_kGss2Ej8#d)I zEQY3nRNf}wvKrb{UYf_&#pf-Zfri_$%GUJm)+IkzAaAAN6Mih@?wH71IIi>g<+tQLMj1XziY$Dyqmm@1G|2-HAz2ebj^M2%ra z7_d(^Q8uEkj6_|OcJ=jZVx|?63eNR)D9vz>)Xn=0rVWcwK2CfkN%N5P;ce+cWtRiB zEM5bW03wuP2aog!%Si5P)LhPV&3;*Y20E1oYcGQ?AGW;}K;AYz?e1^JWb1zs@|DvQ zOW4W>&0127&dBXk;fID-6bAWef`vx3rjo%_Jl!gY)Uh)GX=qVWtEqyt>Dg$OGM3>= zWNItMAEEkGltBt3yDwI+B(>Q$30jj4`>Zg#k=AlP_HN)FQu}pky;G7NjYsZR5etZ9 z#;JViTMIRwQEdiAzuEI&C9hcuT_xxIB#06}XVtxBYL)+T71qWdMl zdSLtzlP7Hf9vnrs!olOhg{^moL+GxdIQAC6y`PU)m7CvQKA@Fi>?tz}#D5XY*);?3 zX}l)yc2PzN_!M`bDdX+a5B#*I_P_XPNy(SI7C}1gQFTlmOHQ+b!B&M6DkzHiA@uS= zA$=>Z4DQ;JK`>j*^t&!PmacKEwO1tc{yn)L0UaBeQXG&ZtSrc#9LuA324un0@yIU9 z?BZ?)yjWx!6(pv88UghN)tR)^xphW`wV>~$+dy)ptOs?{RK=hTNg6lm{_<=&$w9yZ zi%J#v|21_4NG5c)xqil9gX>42oAfmOqyCS4?XH)SiNf&ljB;}{IRZM|-ixMo3H=P> z##wiaSnKj?vA9HGS`83a>pV0A57LfhF(rzD+&6$MPIxKz>jJl~Cp^M{?KV~Xv+6U5 z8Ka8me9F_3h-6R3;qef1w-NUQ6>>g37u70s?vZKBC^S34|dfQe+$jXxrSc%VC)4!)* zb`RvTSL96lCG|ZXiI*BtjUdD}g01{Sqz!~jZ~SX z6j0$RsZ?QBIw+q{5;D5;w-_1GN8_0gkKoW#U2yc z6yIhQ=FKve&(81wc&}E;cPPVoLV<2XpZQa@cFx02B&leyB$3`BR(>R+Lko~32+WdQ zPa@PNDSZB6?_E`KN@!L)d#@Io#JW^qLWT>-kE3kri1k@n=QLB)buSram6r;;yDNC1 z$~BeKvL|Mh>UtGW5N2C#BIMt%?b^PSQT$bI>cNh$3N^r}dIfCfF$ zS1C!GMxk|b`X+ZUa4ESlF8flBNm9}zrAv$wub)K6$NO#1BsX+mK_3xnJ;$uv53|$jDY+w|TC8+JBZLlpRKlCy^s&oMq zu#0i@PUKd77*{w1vgh(B^!7L|Jl5^~b$@Fa~9P=2kUBj)a!FLVG5nX~?zYQsIdt z?k3|#ZIN8Znd{e&rc?~xAEr}tC30Rxx-dzLhs9S3N5@vsTyJYLF|csZl>~`>Rp_ke zX8ib_Mg{M6hurqNJeJDyN5eXAxcCy-xT0eT=n1ww5Uyx-R=b$}`;$Yskx0@#+d<<6 zAhK-nIE@XtMe@)I%c@3SuzYTCx}mp>x^F?HoFkx!N?Ku`Q8NoPt$3Bkqi--5kLY!I z*5}E=^zy;J<*WS5l;@MNF@z|D$9sJ@M082DJiR;uLE7?aU7Z*Y6!!;W((~a9gy=}| z+h`=(?Jr|2>HCWUa3-GiA~vD>SXSr8U~V2fh^ zElq*nwe0FIP9sZ99=UT;OsNxvdrQ@G9g>hk0=@ykf@48&_}%SZQ*Kn$78ZqDgR|nM zigj;XZ%R+k(#wg)0SltkxDTi1J2UZ9SkY@08p<)7CF!#DGaX-BG{Pq$KdV0;9gY1; zC60+1R`Si^fFeB)ss3Y#!OwtH?hZAr0b7*-Qxo9AhCd;3^ED4isXgpN?+sf%eLAHd z%f-^4Xoa^?Xu5Dio>3#+DIry4V5^9?@9 zS<n4a}8-zl^7; zN`5j=4{N}y>T3LsFKQ9t%))n0JSML*I~xCHn!=G_(-iqBYd1LK8oEosArfpF_nhok z8LZ1HE)Q;ZfYVb~@_oo+!`Y->S?b4JUXP!35%Ufm=LBP<28G4xwCM+kQq}m9Dd{NWnD}*6{A9O@ zJyt=npkbl9hFYrU9zeU@x3YuzG|JrkL^{H7;{;&+8sSK7cBTPoNlBl+DJb>VYC=Bi z?#E6}r`kb#X)?5OUpZ>=WsEd-`200U$r6)5>U<;1X7&T`9nuwotx~_L4GOI-4a4uy zB<)N?zdLD>7{vNoZF?&3T$=M(>VTEqP8|rvJN4(?49>bS##JxYXS*O8^7{vMPzCkI zBTOUn3Qb;))mNl?%$m=CVZe*HK#5M}w=n~F30axq?Lj=cPjjtW7wXwp#8a3NeqFiC z=Xu&N_n~0Mf{Gztfsyn4!4V5Ds7FiwHUc7I32|#uYWL7bXdMJ(eD>d#gSr`%8bIhZ zTJ8^WJsBnFVGlJ`{HgNEsUIM)ReC^Mq3&6ps|8+j5&2B_3@4~P8&>x|;PGf{u#ERc z#U#N=##AYv)3d~K4v~WUvGbOJ8+R#IJhx;*2{f(77+p2fF}8B*oP#FAT%=K1R-iH7 z(0L3k>EgjC9oA7b{qG?+H9n*J>xo96%7S^Eq+kh;wHBX9ra(S|-QP6SzQHBYLxku% zN5-3ERH-fsd+X#1yvM0q;|@R-LGpMpe?i(Enyh^iG2?R#2?bKA@Ad1VCoDq-Y>IKu z#U<%;G@z8d6|5S&{TsM1nWWxZkx1w9{Lftg4r>I6k2F}U`FKzuDthPv8zR(G1kJ*-OS9XciYye$DG@|!_ z$$JlwPonrZKha9D+fZ9W^444!T1P$bk+a%A0Dzwq!C%JZx3ywM*tm@5f*#pT*I#vg zy{+JWI1-1+(ZRl=3`f&kc%H)5Adef&>BLw%&<<2dc|rDM$xIPnQ{uk0XjyWi!O$Dc z`vFUM4pd2(Fj>PO%N*TK3ksKEas81oWl;k`6{OM-&gzj$^>UEI{Ciik7#g%AAnjoO zd)L$9`_|MZ7x|IR=gPtrM10Ow4~{d^blJ>ASyR(u;NFR0vWJ%Bz#*FEyoU~cZh4O? zBRBZGosnU=N6uCER*?o%;)A-aB* zyEuK&$3ru+(*#ALfr{^?rI2P-0v$k70|+qU`+}abFbFel8NL>D!b&O7F#iNf(CRce zUG;8s0|)Z}gU#uOMP$ujYBIaj;`^A;dSFQnbc~e z_`OAszN4M5HI|lTyD4E!g9eLRBN{oOrz9O6)eZ#waiy!Jcu$XpP%LJ`e}TkNvn(Ok z6g?A-gU~(sZ$K6@n&G9VPFt4+l);~J(k{xR%Gbntr>>r}_)4(Kwmh5S{m7fi*laOa%-u!qjPuZxcp3ghr>nVegX?Vco$tbO#FR&+ z1v@jMda_QkF?FWZ<69Y6M?f(gZXBjgyxT;RoImMVJEldu(R4y>l)Rgy~gFZqnp6bD~>nM>jAxi2YRi7#s)3=Lr+z`mJ3 z^s5DcGO=?>L8#I^sKxMx77^0MCP_sw=mr&VTK|58-oQKj*{BKN{t=7Q>25Qj(U{7a zl1p3_fV0wgqi5knnM@L4O!yH7k(rN^zKI+Wttb^h`UfHk@Yi?2*5k^Em%}r#X0Nje zEm+Y_$2WMBwW9vxtTZ5bZ%+D%mE#Ug2-=i75dP*ij{v?0ydIKDn6H-SmnWaHV3i3Q zC{$Q@oo;`yE@6r0f0G=PKmAiC#W1@+n}I7=pdql&3$ZTzvCoD#HIGta$JRxm8T+bm zM`snI;=mP+!(&;8qHi1Un_&jY-5*C9l0sN{XvH1Eho!i9us)Xsa>G`a3i|wfmHokE`@4srmxmc7 zhn3RXGhGPpjgD}R2MzG4F9||qohOQ`!a7o3bOoFRmy&|?j=t+BLFu|>02e!GjF3Lw zjHBe=Fwujl%1>zJxx*x&!3H`>nIS+w4)VKa)WI}{^*NIsn%E2J>ykYx2m&Z&-L&y2 zSb=?5_i2BBm*%!R6oK~;*0U9jU6F9fv{8cIXbXCxbf?9Y(pqZ@tW=lFxph@25W8SpN8$j1W=Clln=4x$dh%1bL+S9vZD^Q7}7SXEmp|PDG_zQU@N%;B(UY z&)os;K)t=m(`{Qz%;0Y*o`4kfXCO5{DEE z!`ZwsNtN4f*S`;hq(M7XMDYubDa>vk9SAIS95k%_B<*dZkolOg801Z){7N@qkf~Wn zo$HWj%m!Ea4Ks;RXd4HjN*alJmsoO1MRIR0cW^REGF3R`!#l)HYAN-M#pMD&)Jynf zNlec*)M!fK2Rzq-%9EN3M|)=4C{dy-q>|U+%WI|;*JFVW9)d@SCc-yaTnEwDg_(X{ z?{3RIFr`kD)FR2iB?oQ@3umcQKP~*Ubee*(u}yVlNuZgFf>G=IX~rb}7vNTcnxS)0 z(h2YIXg;1_g0$k~uUrHa^6Uj3d*B=)8hY()vPlHUWJ1+sw;aEG$2vNvLx>)lXK@BQ7ZQ8bpA0_;BkZB0XCZ0?WO6#~RIlOKAftNyXIrF9*7)Kb{(<{N-Uc zI|vUAX*ac+GR_y_EJ)1OZ5Bih)ZZs)>)wF&(xsAQqGI92Tu>!Rd+OxTSnnjYdp>77 z3kX9Bg(VR1!EV|hsi*??X}EupFLi_n(Hr_4OVR7>kL1cknC@Fn`QM#p#?Z>JgDOus znp{n0=@+`c?#MfUe^uRkzry&dy!OvE%8Gp;P_4_*cx+hnmoM?JEnejh2%`P_$3LI{ z)oT3{o!iQTUH7ydaq;y(J?|C+aC!F^-9&#A-v7^65Mv+&T%MeLLt^<~_w_$VwQmHF zyWdSRH8219ZT>lyf5N1K#Q?ce@>*@Q{SPCzx(6elxflNW;eST(H;)~b1Jmg;`smP{ z<=AyO?fBvVD|G(S_;2y3#{)N832@?M~@^cO_^4mpPJ%FD4@rmi`U}65drT)96Vjui> zOa0eMAw2m1)JnNnU%JBjs$kc4Jp)xmp!oqgOWAc&6xu#2(3)y znoD5#rMj@aOz#b-c%kP3hH&iDr*IBEpT$m!i_L6fP}JQ>H1dOhn9?1mO@#ZfeFfs}V^3OLwSoCs6qpq%lNbjWwphATA zzO*r4L>{DRXc?S=GL#;Wm(D>|dBm4}XOj#@WST`nf=(j?#wPs3fcA3>Se10ZIRcr3 zJ+dC8pzHu2G;p7f*VFN*14vsyg+Vie)Wox`*c|4* h(dJzH~DeP*tRt%1t-J15w zzc@!ROCqZyG6*J;cr0f>03WpfAB0~@Ba6cP`9P5}=808}5b_R(j`ACgK7Alo!YB!F z*4(PhL28RlC)-!v@?H=*$NqGFva#@GFoO zXPIGK<`rF|9m$PgHJ!t{{K~<-aJk?c2fIxRrRM#`eWgogwFHpAV`=6hDs=U6G*%z2 zC-XbY1##B>9BAuDM8#sQ3FKnLSL7Xe607hrStERXL6ZTE7{*YN|M&-A7d^SdQ?uU8 z1a7VZU{8L~YUHy|Y-b*22oInJ2qH`+A_zXJRc)V-!M!pNut$$-S_rlDN3c>YWB}Yfy5okM|Lmj*_MK#80cz<0D%^596c`wpsz~vOJi;n!X;4 zNqPbZs7W0UDB&YMTM}_xrHk*2x1Wla1z?Bfg(y&edo_rPE`<6kf=qb%PYgiezN2DRYyy8;Ov7u2=mjfEm^SDKw{!v7dkJ-=& zE$B`9{Filq0J{t@s+&4Q!ukI|VVbMJ@j_C(CRaW$vc7tB%F>sU>uE7PdM&Q~#xnaB#Q-lh@Jx8{Jenhhg)3lYP_t*tD zpmFG=Q1mub^4J*=PK$u4T7v-sfLUfgU@ox#zRy?xsaprM`SN7G9Rp25UG#-n_Xi=g zky*ze*AUC| zlH4^ocemh1t7Bkl$DZuydu`_zSE|$VO#yQN%x64XO!N>kce0(!jxiEnYo~6T{ z-i(E#ZVk`xo+tJrY;r+5$@PD+_m*K>UJBHf^*bc2AXvDx_k?k62 z+}->!tP&}8Tfk3>V7~ms(`qko0(8wPE5^;z#8&Lh{EIbl>=tpyp7Ldto!8(gyS?*sAt5o!^X=fTRpDV6^= z;bfWY3BU1QarwXQo#&0|o;d%Ir!@grSj-cgs2$soQy5hyq)`kgdnq3o5}MI|y1>mJ zP|mz8#suNl_?3gpn_`d~U`jUg@6IzI46s!dKhUPe_e76!3fq~WH;GL-&^v+I4jkov z{bMOz!#20xt>SD9#US zRQ}t$sM%edNVjK3b;4T|L!+a~3BLa(6)^wL|!yt?W_bb^C zn0)|Di$SZ!=;4?SoG-+d&K`Y72q%z~iGWJ&U8Pcp1zJcX`5A7vcaJe!EEUTg^I}B)~LkV0HfNAOr|+4XNOjSl2s}P14#?; z)^KI;3NeI9B?sfOa-}F2ZS29vSPu4BPR`+vh**5%=+#K}q#bM2YHg9A1D>RZ=-WKk zuZ^r#nA~{j$ys^J-S8l1iu$($9)k=XU+q%5+JgExOrMv2U62(M>9 z&m~hMeL6;d=@?$tJRxy%Ji*(s(yXYvkYCowt-|vJ5Gudx) z8+V+O?418y1@IdJ`?18Jos+$r&Io_<*HR;&gE0gvLD^En7U7cfyg>h=MoKch6U<&L z@bQ-ICvHwVRS(^f;_%BxX_ND)PJSS>!y-wm+$LG`Tsi3TwyR5jux!BdOB-`bZFH!v zOet1`4qVh}8wFv=s}a?erSofZhr}Sfzpr*_(y|vT13Xli55rXFdnDzWK7&<4Wq$If z2;-HJ`y|%u4F(X-PeBVF;vwqWyj~@4S zr$4fguyA=c99+A8mY(^vna>aOlqN#uZg=gb=MIPkDvW6R3m}+*jioQ}?SG*{f204y zHT!GLc@8jbx{-!G5GuX3RIkPn%uE&4+Pk6lGUA_HS3}I|)ZBc>g8~hXHtzD+sgp2; z;ty+6Xngc7m3z*HLcgDBxWAN8BYnck9X(hs^_gN~6zZ%fK}V>{obZcwfa995O@^to zGV|_{Er+=}ixRpsYfxa3tWdP*uzwsYB*)f%bAce$0w9w6y*o*9RqA(k@EhhV5~%1k z5qsN~MGESYIC{LUbT`I&?!Y_$-(YHtlM*&|DW-PSKg=%D6SI7qQlZW}k4Uhe^x>_u znDU|Fy2-d}IE(7a7YAPK@(AP?Qil*mh@dpFSRijHtZ6d1WuC&rskmmEc}qDb@ds)2 z$7#aKpYVDNk^Vildn`lQibab2BTO<`#Fvx(B7fpd^mW(}Gh^}x#20efpT$JuElqSZ zqB9=Z%0@7UE1&;^dSxk_y&Tcq^PN!=_xjC-d~~|@zShdG(4Iu1#w8HEW=TX+KZ@3_ zKY+`dU{5&ts$&zS<8(ZKqu*jzz@{W8qhGS^N&9GQR>)hp~m-NRQerK9x@FR zrm|rBDe3I%Qx4MQP!QFdG;gTaPi9^=>|d0vTW!;z(Zw>;SKHB_8+@T+6ULtTLfQFZ zxh4NS<4W(mk#}@-mA%IU8la9z!nq+VaFA!FS+%5hJy`y5eduL!)?$kHDZ#rhQskts zEGttyWVfZwUQ{jlbqG9vxU2K5JE}!I&rpMt!8JE_I4)J0T3o~|X~5&lbJWU|;oBFw z(}7pb+8meknStIziYW`qUp_((yQ?Ej9sg+TkXr_yA(=N)$Vsn@uz)bj$hADX)ev#3;}ucH#J2u;I@bk1ObhjPp%X^ig9|3iIq$Pw8_r?=fh+iF>VIFp1L9icACj5;2eR&?^fv ziFIhQ4`}&o0)O#`(@|2}M*LXhZCQTlfOC-k>dayJ9-7Hik=WHs3gIaoSBV|O&J>?3 zx{Z9%CK&nqY$Jl)?*$P;&UtlRuPK`1$EFPr!_swW250ENc`q4%xtlEc4HA6?+z|?6 z>q5tH{0Kil0y>A=-tQYGWOSB`$ZgYk4_`yzJeb zuyHA|F;L8=XC@5|N=1S%lJF~h3ICYDZI`6jfJBjMWZ=H7kNwIk%1X6Uk#-q}Dl}4P zDg<8@RZL&FtXM)-JmIq`r{nZ?_7|E931f+CYJFcu!MKJbEp!vhQ{yZ|uG)=R{8L=$ zrIgvskj6&2rtPDTNERX=t=;=)hq7#3MNeHi^gE<`3PgUwKBK{x%@i9uo7Z~T%PDQ^ z&(BWWOaw`-oDWCqWAD5OE%rg@Z)*pC&Fyn`97MJrerVzW?&h+%klIWoek}#y`D% zIgxMPKIP?cD9SSTBCJ(=kR*SMRyr4lE7IvJ$@(Y;N2I8rVQ|9l(!UmH&=5+yYAZXym<55w43$VC-Z(?nCO+4dZqN>x@GY)CD`|5S#_E#&Vw@RsIn07L6NH8|>(~5Q z?O-2^# z*(`}JjFtWMq30V$(H5sTSpCvY3rKGOS9HCU6$8N#?HqnbD(l||pAkKYIC~pB%D&*a zjxJEL10OvHmCi?-2v&3YtGNs!L`tiEf?*xf4*eQLBcr8&{!IwhTkD5nafrVo-6`S8 zt2Nk0Kpo?Y`TRWX51~H>2yBcou>3tah^1FGV!xN6cUD}xSUn7`4x79Ddtaj0 zIJe+uvGXCw`^_AK<6VTp2m}h-MNNxO*>_ex-AUx1i^r@(z61i&@Fh@!>sCRu8x@lp z;bSh16{Q_y#z$%kv#^0*N^UFG;v}*uq&khA*Bp^d=q04jM)WY~hkQV#aR!A7VO6=y zjz3*4mSe)ZoB905hx4bz*)4F>p5%qA-Ef5*mW`ZS#x&csT4m;O`mpBfVZwrnKeJ3H)BCtWdVnI>}h*T92tg6WE*AY$8!@??OKy ze83PTrukCeTyYVsTP%oCmz4EUO2ZU3c{V$vij>^IG~~`3v_P z4$?Uh{b}osPG?wha`@|9h=;a86(*d9!0^(SB3J-b_Z#5YJ^uYJxe-g-O`Js4_$%FL z?V%0s_I&GLXapw%`=kAKo}{9ZiG^z&b>7FxOVKJqlU8s5eM}rxZTGB?#_m+V)h6E| zYa@;zkBbX4Q!5k29w3pTz-ORQ$n?N_HeN#Y-IlUyGhf~YVEz$$zNHh9u^BH)D1Roj z)}xeNu^)r~;=_Ylk}9phr^l@iJ2#f_kxSY|x~-tGOtAg+7VB;d!F=-!2awcKveXiR zN8%0&S>(&58(I5k6iyNn*6@Cd^rq%T-KHOyAFh6uUMi&aIoBaYAc5|!n8b39Y@k>s z`eoj`cIg6pA_O0AnOKK-Q#%aV(2H7q2U}H4map5`jkDG06sEsPX%c?COgyT*!=DbT z`F_gx_jXtrjVSZ09Cip8^0)DYEP;+h5zkmx1(-U)C-PdC>*$%ZJ)xN^a(fLtHo)FH z3OrZ6j#)j9MYPI4dlxn*xRS3FY?d=;iF&?IY9@RyDcE~MC*nen%vIxdzkLM~DMi5& zi>trY-OY9$gXJkATH)JnebPhpWULo>aeYH;mr3<$ZJzd_#F#mg`*Q&?j@0q6f>F)n znjR)?th5*UuN95{VIhxgGbZ!pz6(x4fmITW$c_-34>^sIbq0q^3BAa1K&1eu!OTDb z^~L-rv)Yxsr+F-IN;cQv+qVsGh3e94c&438D{V;|eMj4)3og->StWwn15WmDPWhj0 z=!9OCU9nkc_T&A+tW`K%vBc_e{%lC7zgzKD@^l=l4ta$kheT>2g9`2HI_8T*{|TaNw@wz2kikM${LJ)lUF>a-;)VeND!DEpgV(MK6d00BjIf zkTzg$d_NII4YH#ArTZi>Ek(DYb(0FbB547O_HJSv#E8>KB$wj8t z7AzQMDA3>!8SpM4LHCz_Nwb-+Ec{ZE8@GObIQLPS?nxDRx7#1y1~7s9N>RUcdJ$zV zJ?W$g9Phu`aJKU>S$Nhi!>5~l_t&RenhkW6^Ff-rB~<6q^s5?_y6%oL#KBr!t~Wvd z3)D#Wat^Tm+cRnA4)U%v?hkbSLPbMByL%DYd@o5C^>sJ$ZYsJTAo`0NIYb-7()kQ5@>uT~Bx!S=D<-hXFuLbm=6NO`Loc{^{(JR6C%M7fnK!~_ zrp_hcQIV;~<{Yq2`2dTmt)tp|3T8v~HGoApu4l$#{?()WufgG8Pw^-#jNDZv^!_2u z{qN^0_4=oU;<3~>X^F4?u5kbR2fAm0r{Md|FVvO)_vt;RdkFj?ToH}$|5ubI{1yNG zN&mf0|9uLOFT#JnE&n|W{`(aCe?AMES8(P(g4DYU!l)0VV{XBC3FzP@X20T;`Fh-e zA&*#cp=XU#n>%{XR!8x#a>35;nV<|-^en<|hu8dOF?U_r!dmOi@Tc2?+xY)}5fZDL z#V%DQ((BJSMw0Wd0WZcjrr&z6A1XAUAn(3-#i828$(RZC-4BE*fOG3$*C8w7#zZ;aLW`NWk`fJ@-oDWj$!=v z6dI-?&tl&+RO`y$63xfCH0kYV)RL3OOW>zi?FulQf_gvOZ#uUK86-a$25UxXWrx9^ zmeDsD0v=mfmM-*RZ3+7~KKvT!VM;4qaE_$8eP#*^Eszato8Uhv^`>hAOGXpq58}OH zri^5Y>Q&MKpQ~s5kOWH)n8*+%5&F3SGRKD@S&EKUs7|VnsMmUXnh+cW%-mvhbnmW$ zXgbKn9ZN0fFbZ0&k7=9CqZ;z-GqG2 z%O6Toy&Rh832QLLlvdpw0PDf4ZnlIy^@Z)lwkvp$K1i`0F3xqex&6(+FKF~CDi*S4 z4>M@)u6DD1R+Qoo4t>{A4LKL7E>+j-=Sd$<^Gn`~F9r~SGlr>&`ZT>W?Dp|c)EUg+ z%Mp>0(iL3^*}()umScdnfRbTd!Zz9eM^_*qmEAHcvccS8LKu_+`t_@@nCKK8`lm#J z+QJ5+vINu%9qU=cPKYYweGJ3*4Hy-4TYG?FysSkpq4UlBb^6vcaM6B!1sAb(q4H45F537AAh@- z6R+E%z=g|HcMNmrxR(5(@>0^*`O2Exyj+E6C|HTjI*LZGyX>Lg0>nq@cv+s{>pIXeWf29XE5!SCN6wSwKf--CCG#) z|H>Bt4;%_V-4XZ#&5#E7Nn;Y zswQy;C55J$78bdvJIm?_Rrx-}*yuNdI+R&fGZl?*p0x!bLkbp#9mvt zEvDYA9=@X^u}c`Ti_#1mz(ZH7Jzio@t$u}C%3UHpYpi36kAX|m+5;&%`!~Ap*P=Z5 zYZDRqr#xlg4}Y#i_2p}n-8pScae0*^r)7&I>;;vq;#8+#bfTgG(2i8SSPiRHQoPL( zEUzLZ*A!q$`*2{7R?35Sq5P>(xxxNNW1yvd0V>+~E8RvJv{h-2;I%x`pDwQ-=?#=i z+{UjcC^}>`(9&kNISaz_{%SZM)|U{}|BAFxj)Apf`206uFC33>4b9H+E1HT9#UAPS zvjIZ`-IV=i%%xzgs!>QxQ*yFasT4I5sy|MDxumVm#FqL#~^ zD{0?85LIjLH+<)>w?)%QdG&VIdjNf+?@_Du%YL=lkuZCay|o?beE7O%o>E#Gm+m+j8cC{t#h_r0a>EV(U>-wQ%Bt?*q@t1XzT}>a#;7S6=WJFj ze#JLbl`|ch=h9`G>hF!;jS0`sxIlh3v4Mmt!vtLtL(#mA+&%lVfj|^NbF;wW3@qEDCLDX!9vBP$p zP2jiifL`h}pPPDm)~R}+>HPPP5n;)v7TQ*8Lm6TXp5QxKte;e7qk6`1KKHZfCs@4F zrP%^-TpA_u?&?MadWUVodPV^lZWKC+Uk9%b-z^I%o&qtkMs%w=6J+P7@xw8&+sS$X zoMs9*Rt$KHxnNlN1&cK=CtmNbzVbuu>24hQluYJPpC@YMhEWxkhyx#}TQie^c}SEP zOgk|a3VTL&1*6ko&T;kh=+k;IX;`4!2-()7M+r6$LP5Y*Y)++DFwk<>Rf$nG;?k(l zT{`xA760Su&qgCN^^JKjFKNtcw7mu!4~La%o>R}h{lc~9F9?Q+(s$TjL6v|k{2b5{ z0tx%c-q@08@a8RX+-*=Um#P9z0bimXksA4MK0HOe5r$_yxfCb2L2gOotXj-;@#aYq*oo&MVX3VOdE>7^}P@ zGZH%#9mbl+IX9uear?aI-OJH?+P~YDto=k~n@I6P4RSiJbjJYdyYIK+&xQu_KZ+PT zVE0}U;eGe=^CAHWZg%U1m@NYku#Kd#>^uueXm2e|iKE~d)s19-JP_?mapJU=$Lpq( zj8?n}cbFkQHZeL|-xy z`Q9#h7V8&+enV1N`a!tXc6HWojvK4ulg{rCbeRem8sg|}i=&U&~3*VtM0SE z_zs?vJO!2$0{hOE2k!Rw?@HQO@JQ#NpMTm)*yYCzJ1KG+JPK*7f-Sb;SGWuHabJcE zitQ;2C5>OdfQIt(iOX_QqMSb&-j|F!#>r|RAlIw;fYuR7SW$qk;D|{n`nrJSx2gI& z-Q3PX2g^^J@Q_O$F_Oqc%AyCT`JPPA7nm@W!&VfauMr&BtmJtuB^(#zjVTfBThlT3 z{d&=H!Ft%;E@b#9t!ynhKqwI*Vp=@``j%&(?)qZPd%}f{d6&zCQugF4*Bm>>tL<@v zC$NXIk66yC9-3%ZwFg&m=Ac$K?PdJnF-YB<4FJ{VrW`&1&9v7FgXL0;pZ@ zIJvasHBztEPAaV5CL7l}hlYqET{znr*9~rhZnd(;8}3{I^5*4{Nq!0DAWD~MA`MDR zQz*06XSzmiV%-1qPEs`WNiyo~DQ5)kFT4HeVG@Q~h;Idbtt^so&nceCw4E=oyQ{YN z3OHa&mTo(B3~PzzcB;gZjU)^KA!wCK?TNzAIn3jguTjZR;A8c?0}-wi1o;|ImplQo zAxARIhN=8qpk^f!cOZpk5+IUNdxU2v*Q&QN3%N<= zmWLz04vv_PVX|Yy`KH}VZ!}9OGC0W|Ho!Eu(j)Hb|F8f?c>Pnw9dx+#j&fz$>8LE8 z9*<V5kufsJ$L=zhL8BNV54=jls}BZmBL*bt3x2(u{KcA4TD5%W zp&O(6?1sciqTbSD%KYqCB`2el+0A@f9yi|%KZ=TeU!7e|RqJ%B>Z;W&-T?zOv0p1V zO|MkWPlmrye@NU&;`ed*V-1U6B8I@%*xJb}&CfysJ`kITZh*f|d2P?9gUH1$BH23e z?!?8VixGl3QOxfZ?Tr?6c?{Um{WzdEvdYd0sDCG4!5F!cE$(0c?uddvlBZmLW5vF| zQg&KeK!4>$JP$T+Y={8FzpLVnf-vuszf=1#8t->W;XXMIQ5l<4YP0ML-6cPK3r?pO zDW6>ZD0d$`X>+oSNg+pDN1?R$7wvx_nW{eudMIJkP97&~>Jv?|2oZg|Mmmaj@cN^v zjX~8TJ7|r?B$uEZe>L~^y=J0MYLhlOIuygq83VA z4Kp9w4MXio_Xdw_n~2~~JSD=N>(XbV<>^nUHC}b<+<7a&6+kwYdR(=FBI2gv&HIre z$z1tT+FSW#HZzaC1@#P+79hQ{5D%hG!)y-DD_!aBI z&7vkVaQp=Q++paC(mBQ`*>hBX^ziAcU*E1z^k*=MxAm^M{23DC#6SAb6i0PzQFS!2 zM`m_MZcu*PELoqLysjzAk3(5SHZ{ubWfU3qNSbt)J~e;b+H%-K`=M+sHv6f4H~tQn zFQ2rCgQ?^-C@n~EoTBRXhm|JDgK&nHISzTws-_XDq`iS=CaiqklAC!by{E#Ve2 z@9q1bwS;bo;7R$s*WV}S8oi}iLUL~Jq^EV?J-ok9yY>=F(R!yKFjUyIF}5!zlV_zr z$Y)V4m47RYrQA+q>o+-!ZoQ-U5l1mCq}X67N17w=fK8PvO-X|?agR1vz>2wy0t2=w z(d+j6Y#LrBUYEY;h&h-lD093yZmN}+ORw=xxA(RD=Kx4bw+gsN?37nBitD7krkFHg z2#^}q6E!sB5{Jf1uGZzXd9JD&gHs4yOv=Wn1qoLGy@mlthRAS&)az5s`^DwUS_Mif zBkh%_o+ZmiAv`*71J=FUVxe>vZ=9(?;Utwm$9h*S(e(T~hrzaZXy&~c+Pua*Qm4^B zH_k^Bt&b9jP|6C(MrU7PzxYg`lV1FsNnAe=4XZOFZ#=9*a`JejEVVmMiJ3S@~F0| z!>FoK7$ZWx?(U>rHp<8>P*L)vx5X}D%6Lr^=F}~QDPYumOfNt3QMGX9uE1%Ux&dvR zVW;Gpo6_yO`IAPu{~mxyXk8YC@g#$qKhxSSve#qzUh2!|k9<4bJ~gQsqVY%MOW^v2 zb*K2#D=(Ooq@z&RY}sBCiJ0de=#OMmc3zO;HiK1oaU4^u%+si)rho_$8?sv;i za@vcIVKY5d1>OFmx>{CBw8j;>ijE26QDQ<&K8o~_eTx{PldCaYhQ$dsN(@G!7zEv+ z&v3+zt5n7!rb3hPm)%1ft*~;2qlT0w17(I;<+T=F17qqYbCZYJ=3pIKRkHK@X9qHa z@3c0=-@}~SK1m-Qn25Ii!{VrZC;NG!uBGZPGH)2-E1KRkTGk;`<-4icF{t(tc?skA^44K*bi3vgEt}lE!*(G*R`YgjHZL z^=DoAH;y=|NA#mDi=SrPz)2zVVHR0&2Ul|7)RI?mqJvJwyftT_3Gt#BkctxC|oLAclmJ!?2AaF!up4+LD9H4ieptCH9a`H!&* zxfAiI#p*r}W7?P<3YFNG48dtvzrbeSesA-p<^!2()=v*Eehm+bD?l;SHO=E(Bebuu zboPv?EuOwxPDDY>Iw1CMK?HM@=~D}XtMCF~D7kP?KrU5bbd4ks*w^ch_P?Qgmvpkq z7h#Qh7*<&Osc^rYu-Kmvg&3TL4B89g`wx1YMU$8WB;!K@hunmIvSO*F9XWKrC6jRn z^+nwT+l+pc7ZOr<f%$H}nXo7^-M^&q6UX^!h{6ZYj>LjA*e8%P|q#RX#hoyg+4anwP_0 zpGAwtMC#d~uQp#RpdR}r_aMG&^^dD5V3=KfNd((B6kSd%D+ohMQ=4|d4#ynRV|e4D z(EP8#$FZy~N%DJki95?(g{zE+hD=t|5}i8iLNS@1Z-40UwXF8VDy(Ucv=8!Esv`33 zV07Jg9T4=ze@tiOzSFKJRp7LC7R)-z@&lfVfp3VCMy|y6Tsqj)mDGC}+m=&xsYv7H z@I6hZkgji(Uh6qq%9x#bPaErfSib#A%bfNGzBTWj$)Ub}tWVmon6+pV^NVf;CIA&) zfoE}?ct_A#UM1$_uj^T+|Lb160a;9&$CA^a%W`J|wTzIIP)5lz;+kJ|p}RwGj4q=w z8PhvC=BQMtaSQTk{Rt1i>(jZa=uPWD5&L`StdNQ57 zG4Ea9nsyi&GJHW1FoPriW;OW_cB7vcs_4z=HnEOkbCk=}(OM2M8BX{7E|VsMDMgc7 z5`Bkf4kWn4?B}>)EGRd4#K=9sIvef;9w_5pQ?W_}7Ii-U;dGTdf|a$2USveeH-$Z7 zJkn#OAMiyafs~-ix4Y7JO69HC-aa9}`B6?P7Y~XK&9GQ_`aMK^w*zTO`s zhU}+)Xtx=HcPIsZ^Ec$bmAlhfku1Q{)V(<5C^+CpN)R$*FxfM%SpET^g|?Yzt(3IT zS^m7{SlTjnTdO>8@g^)0$7{(n@{^h4`+gP;8!te8?ePX(y*jR=P@8G09i8OR?=6K1 zghIPO7L?bwfW%fmv+TK1uC!J1qbd6l26H=7I>Q($_E=kFQ=mzMvVK>(jdEP;a^SG? zZ|R8PQfq4^rIU~1A7Lh=C8Xv|hc{af+(pEu$>cVHtV*!;^S~zh-NlCZO7}Tzv~kLx zEin+%;`_Z6u?I3VLigJs#vX-R{G8B@wG<{I#1wLOY;+ZDMHJV5fUHNpvGthguPzaG zTd5GljuW5aJ~o1Hk*T^4+``&c!`I@6;DEBBV^G_FD6d0C)4_kvR+@QhsVcZH%_FU| zcRR7Acc)o|O*)7+?{ti*?%kqf;G3cczxwh@-3QJ5?^0WIO)oPwx!&{!!{HaMy`sjR z{thWG8|wQ$toU&A7R`J#-Zf2tsTc7}&ph1;H?=yaAy`nTRh?XYUx1M-m+93y_ujeV z4=EgTANFSuh)7?Zuu8rD^7FtKzVjRQXK{hmY3r ze2>};9Lq?Q?AD_WeNu%&Qu7L1x9uGsvruW#(Bxxlj6&X&+Jynrs#|`_f{XXp%6WKx z{+I&3VvqGQ(v&}e^?G@<(hVe&pt+*g<`s72k!bbUD=-cRx!xby1>yMliyFVq!MzJP z#2q>IOp!RfBx!S+s_n+;{ds|mnoi{$w864@Y`cZk&9^F|TQrN)k^KQJH~gAgh3|S_ z5e^+1CBd>3d0Cz;z#TcMs6lyrxl6cgCbNBJ(uv;3eE1PG6yRPfWhE>Sl<68H-k6ce zEiqu-Y{_)6#q1wf#70+ruJVhegvUz=NrYBzXghXISNUq;bgNHob?7uaGJx~IZMA)R zI6N$#voS8>sOPOy=L2)hFU4Z^rJ9>{PO|O+^c=9w*H4E8FzNZY|_Ep^X@Gnfb&t zT^PSwe~glHB%<;`)x6`LwzK4AXG-+V71G%H&smKu+hE9gA$`0WQG2HIKh7!0JawSN zS<$p>p1<8Npy2l*xV0F%Q~a&zb1Zqd6!90Z=Q1(hIJZanX`<((jkZL;Uu&`d8;qsB zWW;D0#Ph#oze&BNESU8L=y_qX1!hB)4TX=#4Ayg14_*xnKg>0{&`_1CuR@Fi0x0Q< zCQczIG`TmiJ$qD@^~~AZpCY3*J|4PMSuZ*(`GKkYD>Iz2ASGPi}s0_)Riu zROL-bm!j>}ZfCzF{=8UU0Q+(12h_IM+$-tlAFKsh7C1Fo?%&LWi9~PaU4vAiIS)(S zoW;@wiQHi-H;}N22`UO$a3*I1;!hzen8#iF6n@QUq-fu6m^i^ zBdG(9yx8m1Z6uO!DNvWI?+(_{Jg8H@3w@278gB$AAIcF#bZG}37`~{?oP99+l-0~< zsAy#B-ofR^$}@Vd)y)}HwfXri8~zoi@%JiP&}Nv2-MAiJW3PKX`KMA`iYUcmn6ac+ zxKbVGl$@9CQ@^A(t`QnlQlY|m!_1_Ftowm&kKKdmv!-4<$I3u5K~`k6l3DP?vK*c-1&;ykA7khAD4ES zph>lxwk@BDdrJtP<<-bg@XZmugO0$fCfyp~pdFWWIo{rC1hMb`fPeh(kLE8KTH%Ff{UMFB`WL?s&dAU5s$RBlmg|`; zpG@I9cl3;o?BE_Yc7?~}e=T>M06z$!%v|Gpupp7?80$mo+#+Q`qHA@q#bA#4+VQOr@dUUz z>-Rv}be!^5AB04>HxzysJz$1WL-(>VPvV@YqF~+kOU)X?W_)Vy+9mgnOw`T@@-~L{ ztNLbsoV7Dmg<@QK&Bv`jBna(%d|FEToH8f^V3;HHE$Gi!^RZ%f%g64GS8Wd(zp*0k zO6ueq!2ctAk-pUjZ;df$dABZmdl2*E**Z*TxOc&&^gCnwL?9^R+wr4qd1;baEG%7a zM8sT!CiC)*G6`FZnz|;Bl^8iDBk zyCE_SK-m$u`QMxOH%BI%D2Ze-mu8^3*Har6suTR*ys$tyi7ze$a=T)WUS4`xD-*NKOs_u z&$I7Le-CAXn6C9N$Kn6v6+%QM*WMcQK|^bw3}B7j(V@nTitT1lL$fqU}^B>Cmm z9mhkSh!y@4dA7bf>Bw zOvV3nBw8KxvcI4d*{vB-WlsxM$BzlR4x4I#9KqUjsXlic#sQE7a&N=AAqH*oFFOc8 z08b`L0g*Eh{{)xYcg~xSdafsVgL~&_BYStA_3ml&dBxJ*Z;E2-Mb1Dfj-ojb&Q)r#%+bEA6=5#rbRblX=% zCB=dH-;7Ha4$ZAofGw39sj6i`X19^}9Ka>gXiLhKZ=k8jEz}uy3|Mb5MQdE63KFY&~2tB{;Z zLG@ajpQ*J8;1k=64&{Dr=rGX>$)HXHWM|w}1HsboY=0|=K4Bv~qs4mRt?QO94%2$N zR_dz6niT=CArP7B#-!+`A)F{EosYmK)E|r31Q6*-4W1x>8S84^%pd|0xXAY&nez|V zR8ztdzIf16Z|ad8J9G~28>|7ts}6WqJS<-Vh*Y6^ABaNG(%Wv1d&)5v{fU>(u^LBy>@>3pErWoF6gh8<`?Z@ z)l^gG#zcv6j0VU2@9&RCHe)8h3l zjh%>IaP4*W)EE63qW}C*$B_~+07>I{igMoRE7G*)t09@u1hUmWP{gkVw(~#P`$D`WJ{~j}1cX>V?5`WhpWe%Jb&hM+IsjCw(DXE|uq4)`-WuhO#o} zhtH2Eu!G2+OD(V#96VYAB1mJ)O2H`%z$=FP$S$<0A0CSQ8oBV`+)}ZYy)*(1HDZL5 ziwOIMOD&fCt?IluS{`{Ek?jeP6HYW%eT#&t!3WaE#b|u0k5Hu`V0ZxkBNe|*fA*c{ zuB%4~lemb(Ol1g1P-gOnM2o=&(7SHKUPqQi00$L(Z#v$575YHhZ}c&MbS4l!2WM8- z=b_pKZr@*6cs-UP{LguBPcWr9#SV-(dcj=qvymH)j^Th)Vg%}~CS(#x-85Z^W?#5-cFJE9# zJ4HYzZH%vYX$&~%UPz`WQ&VJ!WqNHEBlf{4+}o$y3A*4);QD+C<~y_6S}Ne)E&`)> zmhE)KY2Pdlv!ouqpk4+?s z%^?ZW+qYEdV`qfFiu%^?@!BRq*aw~GBp~1Ml#hD`k-EUKrORmZKI(0We(R%2A`|eF zAtpbqr-QAq@BsfxENN`Ez6oN-(7S7$P?J6uPNRf5S8>jo5ypq$IwNy~u-0gu4-GMal@L%z`sO(*#a;h(EkPYA-?lle9~b!($kBAnF+5 z>$;^dm}72%z`C5m+eP)5ayqw)Nt@`o5jlra`tuf1RGaR$!iZ{f_xoFfjj50B15l23 zQ%WGP0{@AOUBGo>)m2rSrXJL=r7FM5da<~mm$aCWxD5;`1M4a>_9UMEYT7wfr59mK zZy~(~rB2LF7p$P>*;r~MHdJ`-;lY^cmu|B9r%U`V%fP>^;`WE%6BB9TBICJiF@Eb; zGidj&6?>YemT!StXI4_l5`63JK0!g@gBXhx*6UTAmFuGRJpCS=()PagolNU9Dp{g*_?$me1CyDNZ`y{jz=> z+ghzbxx3v=an?EdYf@+Z8D--gy;ZQB-@29S7wUnhB16!j@N2~CC+{VbdtI@IDY7-% zRfzNjIG$40R6VVgChW_O`CA47nwrGHtL_OQQ^B`TV1=Oo-~%U9M{`k?)sypRk4z(GZk@ zugO!sdZ@^Mq}?S#R53%SySc$751<>$rG_8pOCGV_V__<1aM1a7p-$WXPetxu>{}CI3dB9V+gd2?vffES zRHi-0vNt6c1WMmqr$I+CooJ*|A=pI_)(XSTFWYg)SPp zu-E%qiFq2_JFIx(FHp@(V1;Gw78?f?A$TKlVw1_tOYL#4!>vZSZ!Hz>iLz2Au#baN zBwOMHU0-WuP{z?AY)018Fb~{h36iY#bc>1cOm{xxoDF}VoBlz^*AH{K$#n62t>^;D zj^2>OtxfFrt0|(a@@-PiRffJ0X`|Qj$hhJkHYQPL5DoPYz7FyMku*Fs{a22C6PqIT4 zY;(4sEfj~Hn9(}N`+?fTDkUVZo1^@Qo22!$$o{~AXiK^L74dw&lLkfw$9n-a`g1ZQr z)k3IP*IIuYN<-6zj+zy)X+^kCI${)r{RT@ly0uQ-GxGz1h8rY?sVq%OlMhE=fnr^e zlhDY2)>bT^Q2Z1ODGj(YqHt!Qm&5_!E(P^a&FBAzwb_ z)she*2eo(VbXKNr4lDCiXeLDZhQ&C=QCB8Dr4l`Vs)>Q@El(}H z&dHI6P-QGUCttT)>)nOo;;!oaqSH%4C73-RLV=0c4vF#OzDGYIAJPDR*J<$$mD1*h z7^FL`mH3ez67FH}KCMPfU^z!`s~itfp?k<@z_YZdN-3U!Fi!4PZ00cJbHbvk;$k{u zk#d1;yoT%G1OhNr_oIZDLSWXG6J@`jOY-VF+y_SmB*1A?FNGw7+v>F3&}5nU+ln?Dv;chf-rNP8I^du)uyfe+rq zrL7BE^ZcDm4z{r)i9w`G)LDB7J{T%sWkN3}g2Un`?0vK?&jAV07-7h)cELPIDrn=9 zQn)f#g+@T;uO(RTo7IiXqmby=8euLgG?ZV!#H^c#x{I$L_BIpx({~GOFdx=i5rcqM z=&CdY4pG>qBV#Pge#H&371k5Y(uR!+Ddy3Nqd zCtDMhuy(Hp3@k+84ja*STFKkAt$j6>&k}ZbHW?>sACPY8od58|?uSY|&x&c=qN%y_ ziRkTHx#cQ)Onb~2dU}Dz{rJeBs5n(od(f{Uu$3!hQ|ootj~jsbZS$Evn@|PLvV;-X z3pWnNMtMA=Rz}Exssvc&;x{y{1#QH0hP4^l=O>W0>_Oj>IH2C}0PfFqt`1@@N|Z8r zCwJgzsa$$y=QIV8UW>9ZUBk#8!*1E+ut!`h@?COH0;0GhUNUrB-fy~E?ZfJg^ef$& zjS=T7(lIp`&VL3Qy9A7;oo6xc*H2`hw}TF%NF7wTt#~ktg2kaOI&WaFfhwYj(Qnzw z{@B5TUezcOUpjOuuKDBP^nDr`4Ll@-6;YTIi)8<(mLDb)enU3C^H*m&*9^&S5&Fmt zTX#Yt@KeZGid90{$i=`~)GQ10<39aqh}&MD;~SX*nwr}2)elE9y%PQx)EcluR-rvq zW+Z#i{}mc|27DdwB#T*4_2>u*6vAr$u~0;mh&mKGP4CwgGv-}?xjkm4F^POWwN^o7 zi)h#^TQ!w0aP00XXj0vR3izkl^Iw6b(xZM&LUFNZUt@|(iEOeOyd0e`h9rpY3Di_L z!I8pY_5I|isC9mVJonb5Zu0OwYbCSr{%c7~vi2PS{)!O!X-O!ui)4&YUF|x<9x{YI z$EHfOw-1}^+Ik??TQ_B?fVXkiJdmX71la^l%tHS!W#M}oVxM9Aq)k^aoNJ;=uHUp( z)yL<~gjTvOw0V=-tSvgVh+Ru36SL2B%n?v(ECR6x4B zyFnTO>F!Pek?t0e?tIq&I`{pYdz>rI$9KGAJYN_N-0WC;?YZWf^A}Q^a#2rU$lu4? z{;Bw!eGVPhbEXwB&wys%gQr_VJpQd_W;(7$` zLMzHkQf~6bnv9|n+R27fz+z_n1Rn&!cooV^#t53t<;2l=f!f@m)>E0SA1NLIk$o-6 z4*`W!G__NTf2>(l(h-8=0q|^XQL5)bwD2X_FrhwPCnmDSePw2c3)Zj(o zN1{a&Bm;PXhQRv)-ObMp%X+bFZaxfXl*EQrDA`uW3$OBc zP=I@xY1^+N7C?`R!AW1@QkQm<{k4~<8KxJaP9}$P6WqgWKc~&|XFH-YEHgWTAhC@T z5}j0R3trUMx)3=#4GIgooN84g-%mPDq-}s5IaD`av#>Va)yw>DAHyTAIwN4gnr{go zNIzyv@E|ko3mU-AHkV&~)(}M5rk=Nji{ zLu&5)Q)Vwsc!n*S+iI}0!0k0JJzf8w7jvrS2Q~l<^@E_)r2EauTKY*Bx8B^(!`u6x zji3nkiu;J)gbJ6#!6@z3kUnn{qyW*l3XzfoBHIi14^uAQp!ImQ&T?ptOv`Txun&J6!h<$ofC9f-4BjaG%VX^5e^Uq^w&4&i}< zs_PKm&2K&m2%MBKl*woS`7=9g`wyTM;iCwyrWmJ_2{#ee6#{|2MTq61T?5YthQzYwbY zSI>ptrySYrXv#uce_P;BHQ7JP6aV@_ivrGtYQpv(G>8BE@BbP{Wr$6a8`I4H?CktE zPz(G^g9sc%I${G!BLDWlA|2r6bZ%1q=j7x+-dK$=I7ljaDfmw*-+#+1 z*r>r*<3dE8|MtKVU`D3Ynqv8nm-~Mc>i>fY6?a*cAoswv>brv2a47eb_n{~$-SZ2m zKmrN-4w~whvqsHOe2Z0cX;toj|9a;I^kN~wu>T(5*r52-tvd`aFOxf8q3@#kw0g1V zRS@484cjRH^#tJ*U0tz#$-Z+1<>h79v6JOI!rS~=n~veW1Ip5hSud^ine@YB|C%!5 zrq-uH?=0(?Ewi_tTrZ?~d%c@=aT!j({BE#4i2Lg=u*R>0>+v;%(UCWsj&+cSJwAGo ztX`SSvvfwzGR0#Y4#T&S*U}W@qR_gYjH@Z_^%D;b)PMcmjN3r(Jj_$bHfNw+78Z3_ z&mc8C*2Om(5bT_OQ{qK?QIq6tNVxFJy@Bm7|Gp;0`zgl!zJCMP4|t=t4h#@B5-e=~ zVMK*i5uQ`k^oQ8dTc8cN`@Gzo65ZAK%TxdBo8tctOIG2A(2UQ!`dp|)XBY#$NPRWg z;~BU6$5G4X+`k?l$lqpA%X<)*M!G(usdL(S`}NbZEA;o#ao5}Zw}0V!0q%ew_eHwh zv3Ed{RrkF^Qj^B&E7MmEC;Km;e>``fLf;nq`$nR;RJ-G{ZvJ?nmh@ue-KVXm zmpB{=9(R8;H~uT2>@tA}>LGd<_@~72KVpv05D1P`w^zk~|D+%TFa-zQgfGAR>qq-n z@JoP1(2HZGzkfZTRQU}=&@-G?+<#a}fgLm?g6?k={{5JM@yvn;=5$PMY=0m${sTq$ zpP?9Rr$7Xq>zDh-A>c(zZducO0II7%{rATVAYlLn&pS|;dy&XD2+X3uMgoXETyg^m z&g;#Hl~UhkeOAar`e1^*w&uwkNO8TP@A^Uk`bq$Nw*cWVWoFnP z2@(6f2Ef~?aaC53naBbm-}{bEA^Gg@uzgYZkKoGffTjBgpd+9lB7bB@mfV{m!jS?X24!Xma|SJh$;_M6tP_UNYEuF{S=_ zPPMQ2@F!BR(VTnn&Q)5{R4ecY>oftV)k?|_zIJomqr%E1rL%IS&uXy4Eg@?326$z9B z8`cB9BisSYD8_4Z*D&3#MbyV?tp5FybbmXd&}y(mePis$>+L5*9^K-)0Cn-|8@9IN zhyYBDqU^Nyg|IpEgqjGRY_IRa@l2GTMy8sB8AgxVdwuBjh&yg%k`TNiOeiAT0Wb%L zJQuSY03JmdvHtajWkyTr%T`X%TPj86m#(3&0%>*F4Yh*TqrE`Gk+x0M(xG4@0!fRy zyn%>M6MU9O05Lt8`o<0{IOBXUC1sS83YtnVBF`c0idqRG6(iaO{PN9)skPpKPgd~@ zS3+cM4Z#)qY=KB`hBP3U9iQgFAKD^5W2k209twASVIMKe?%eY5Hyf(WwhD%A!VW6$ zRKG{P^Kb)t>wVu?hQD_`#E4(jygZL0w%AfY#$5(gxGU9k(3~w>EMM4j@|oIb)YDYw z)H(F_&E0>49FrEjPEx)O@A>39YUCHhqNLVA>h7BkUUjKM-}}hzabLM-5UOc+Q1q+P zuSB-Q=*m5#rQh?EcRZN47?Av>nhR7{Xs?za`_i3t{%*B&7;VB%dNN;sO~p(##upL@ zpCpk7^Emtz%#E_eM!;rWrumrw>^JKn)`0`BB2h$3% ziuUqhM|<`fU+X$yd+ZZuK%*p&P>U%H%_GG?t@~tZzt<8~P$c%&6$}!j9inN~{eAS| zkC8$uoTvzDZ*2omF<}kHE5R(lr&%nF!RLJ_&?!w|0c0$iF(TJs(}%TJUb7H!=50%$ zkiUjv2lm$6pnTZ|EE7*CE7O4tRDpwn^$BGHGEe(#3M*cuQevI4rrGwsWu5~3aOv-3j^ z;3M*ow{9HJ>~YNA%-jR8Tu;S05NdkwrI0v&2)nC{GRk~rW)(+he81d+kC)A&!9!kY z711XiKoQqS1gU;!>?yYR0cO zVZQzN8DK-;H^`4{xhK+>AGCQ+_CW1AP=BcFjn zeT@JX9SMl`*Z0~`Zb)Tdj*yt!#9}0waiqS(t8Peh^HB{(o7yx?&J}tA;Qw@lW@xvA zKl_8x%T!aA!v(0AC~pI_M#NsWA)g}`+{n}?(&f>U^$iI&)W#dn&42*X=5G)UJ~4cE z_@nR)>$A=xBBv6<0{MC|+Tf2-5>Q$*b%9fM2{|3S+o)U^d^PR42IYGd`^%<@l6PN& zw4NP}{3w|oGTEleI(W}h`x2Y%GLf4^7kxbgk2aYw{=`DV9)D{S$hewDUP zncw&jEzBxI*PP6=$o0G`EqesiNT22OKWXkuS9RZ z`BBlZV@#`h`RFkB!M0q*?6|<@ckKoJZEH!LevTEP2&MySh zSQ`{P4KNlJ;$@}88V*{Ws(SslQky&CoP9YXlg&|(VaX0Fu*&7R((Qsi zjm!<`+?mQNn?Fl}Bvc$ezAPd(W&4_zp#YFrwL_O?!aoQwHg~{BFfYKVeHM`V>XzMp zLAq76n|h703xMHM9FE;JEMf;BLX?gHHNb(bFg>QIWL@^xByu-Xmg{g}RSP%&Ihcf8 z!^HvZw@ZfwcR~1`>{v{Y1P_EQ8KJk|c(#c}pD?*+Iy7_;%!W*};s*5s%AAjobj&}j2h{03F`DD|n7&7hnHq-Q5`MkB`JDI5 zN9*m%ANuC>O~1!-2a+J|kFATKbimpHI%$`NQt zG94hh4%1?^Ujw5JrFk2x){=G*z{Y?B#n7n62U^d^#!D@rzBDO#(3qU$Tfd0m04HsO z5_ewhPqp#28z~LMMMV=-JT3*VXSnv&gPKS_Lrwr0Jh=UnGNZ0{A8QeX30FdS4ni^C zm16(}JOf!o35oM}-RET6HyWw+D22;T=#UjNo>#BGY)nQQjAkY!J0_q{;bA9&QA=EwR=htri9k(S^*=&)(M|jxwaTpV5xC#=L)NFmydDTg= zGlwncq|=y0VP7eIS?)q|mS7O*vYCFE3`umqFb$jg1`6Lmv&w(igNTlj3I1W_Wc?&^ z8sB8_o2PQB$*erhh)!{}zo(G~4hpsyT@~Cdi{y){#Se|yrZngYIFCG&Von~A zR@7t}!tflM4r2?YaTrWem(~#9#jGJSH_pJ|8U$oH^a8z@5+ENi|E=-IDiF~pv=15) zO05nNy|8#c7+V?FmFRHA<;A{N6E1zN^p{MrV%{3x#pEb0X)sJUOEPIFx`N;k(Fbyl zl&kpwqLebadx_W{efl1ls(#b0>TSYPE-%T~r<)&B3($Ep*OXwm)@v-W|Fj!o4U|2A zCv|mp5JJDVyEuF5R3=!hEZMK|paMZy>l%GCVOvx;imER>16^3`_I%;*N(4b~cTu2C zX?u2B)7`QI_pjk#aH}-xu)cSyilAC>shY+%BtTwr>A{dF77xCf?>lYlFaP^)o*c?L}=GF2w;qoyP_Jr3;4xMT8P49#igsUBz z#WuzuMp+TAB>`brQe&WH=3~M9o7|at>vWwOg^^**>cytAv%}Bz!3^Ga%3J3>M{Xw{ zUHQp@PJ$X#62eevzDY(VH$B#`Tg@`e$@57=R*uT*po|iq&eInf} zK}6}Iy!SOm0b&W|tTPq@&1_ikUuG?lDMEAGB8A&+FSo@VKQ`mB2Wq|k4Yn?e`+kXg z_Pp!u+!apvqX~*&();^Xk>)YKgo~kjV>d#!{@Dq3;2Xm4W%DI=E-g}r;%;XYpQ1B0 zEnbV|Ls0;MY^1lu)4YTA4U;OTtVWp8u%vZ+)~kUrEmLauVk0ztybEj-vJ$Z*?0&pe z!0USD^qWvpRKY1ZKMUnn^sE09Pv*Dw`l-3>h|}r-9&pu5PL%pUZ_L*3HDUHECkd^0 zvNOp3#_8Ld)-nK{hJWNZXxON_mik`P`!zb+a1KgTtG$m3bd6YD*Y{ekL>s?_6p(&6 z?0EXh2oCr2c^1gf&Cr{HL<`)UsqxOQ06) znGmQ(HKiT&oqb3F*K(CAv`S?14``dTXOvgz%~&86&6wOtnop#PDq-N9${R`=fpM6m zQqGQf01}@`n6beniOI-94odyM<9(=NJ+>J(^vkpo6n!Sc0ubHv?Sr`#Z=O$#rg)-S zWz-2$>AvnYGc?er3SA}ykf7mdhyVmFTMj>%CT+VwM_Z@8yO{cEwc~dlrV}OmJdDO; z2^Kh416S5(9kIZGBRo*|0mObzz|>^z{Km4OfW1D5N+z=U+#Segkjd1L<+4xd3S+5d z+>!;BAS>nc`o!>@9T?pimv`u_D0%>+Qk$F_V|h}>+ZSANZ~B{@e5HNTm6e6FAzw4;V>rHtC6&PX-?%-3#Sc) zD?E?YZ2pxi=##%5jpq}uJx|y^4b*&6;wW%-tR^yc6m2S4Ojc|*F^2x&eyq-S z7(${~J5@6ybBK52{pa{9a7n9-l7U&D-iC|Dje_)gtlobYq0rxP5GT|*(y7YfOEGvV#Wf$|h9-sN%NNTL$ zxls$faEhO68!dV^Vj z5D8yETzKlroMBwE>bIdQ;6}? z`Hu*-7Ru7fJZI&>YkM%1W29{ps}|B3$dj=x|XMsggq zCbcF?JXOLwwPkuZ0nq-J2qCqOJL~}55N)FOJcAA=y7QhO=i?1d4>LjIJL>ibIu97B z29~hCH<2+|y0YsM%KXf`M$N8$ybSj8sp1h_%`aJJy|;?D4VK_8z6LGMibg%Rkh@6y zx$W>$I^km!XX@uL0rL2cRt9=i!bp++{@ok?ve8!7j~R3JBE7bP)m+g$ECi5}lslim zY9hzM3Ror1UuTe*J(GMx-DtA9d;u^fV>UH`0MKje#U-idg}7ks=vda5#0~0kB}Fte*h#rudh{2iE|nq&rq9NeUM=d4Is0O-Gz~#PdKK2?t8~t>=L>kz)^#(2BD+ZmAVeWN}2(sm_#E@A51)%|Iag7ez zL}!rIh&TRwAM*s}aO!f&Mx51lqAa90oXjHjE>h1+r+O*NhJ`=Hn9#Ti+pp86>79$C z5lCE1p#gxa4h@jzzA>lKCy@d2OnD^{Cri23!S*5?l~cOmo%@v-si8yyLW*^7LZuu< zWqQRL+wEU<3kt?GMnSY~UYsR(v%sGGRssOxXHySTk}VEO%Y~fr7x9Z!HAIXhoSKaJ z<*yi#no2^s-n+EO{LpGr4N2^*$(drukYg>NW}8Wx%WWvwrwol7RZTS^!@+b2*UB>D zBW=KV>8NEt8JloVq0Nw2dbeK)vAb^os!gian!52kQTE+<_8;HL8}}5AUNuHGa19S4 zD?}teW70&wG-Ii0Io-fFRBynS{>ZOj zr&+t9eZ#^FW0{iVi}gmH%I?SbSNWWpA^ct=8?6_UhfG^}0^W_yv){7rHp$HiL$>d2 znC*oDm0&#{c{m4(sBQXZ2R3bQJ;w}OEN@w~xU-_0fnC7JT+}3sYG{0c9LFVdw%w8h zy&mRCdh%6p=^kKfoCz9aeSaSjAl-tCZ%>Hp(^Dh4cb9OI7gYt{=i9qbRlU_CR_sH$ zTmT(r6^~$`^F`d0PQxAS5osUZRq;m1MZLS0y3~27Dq9?dM`+B8l(nXGB$50sLU2Bpe5m?+WUn~XMA={>;+99qAc zO9ey4{>pTlmm|tA72;F48>heN$xix1zE{nEsgJ$RBrh+&~$o((QmXG@#K2 zCZ=qry*PI*k@n;F{w90+lAaki3nB3R88tAp80`yo{z?2Kgka32c z1l`zV5$*&D=)|H?Lw#%Vq|mg|By{fKL|Y9XUXLqtY&g*=-zj8D<>zuE=N(4dZAk!Pe{s+GqH^-HL2nd zKrU~*5n7xcFD|D-)!Gxzjb~d9RXQKxU_In$V-UJlv!q4D@+`qa(p3G0r1*U`u(aid zs8o9Zl`JUF+bQ(?6_^r{rgDY^uM5Q-W=##$@AG-}Bn~RBDi|N@(&G#G%ip-RKpo@y zQWqOX|6)qL+nvYzexCOMl%yw{V#GfiIShjZ1p(t^{6uX{kcelDQBtavVvzJ12CG@YO85HgidkXWcMgmFVq zfEv2!Uob)<8AaV2R5cfhKCEnI@0FS{O@tB4RWvV42Myz3;qt+4{w3NAW>w&VR?`Q4 zp_~f#7_mRMw?yV!&5sM=o1W#D-?U2~rh~FCWh!iNyzp0lpXw2n;eGV{-%mKcS>R$i zlwx@etDzSNnQkJN9%=FDkTi@Nz`#W{8j~$(DahO`nW+*4d2%wl3%{RUjOoz~WJ*E` zqfD#b7o_VqmsoS7mPycL#T{h?Y$F={V;ae4E&T~va_`fB&L==GZshQhnfGScA!&=8&+B|$1Gt)Et9K5tjCKfn%>il7#skU9n+gfQb;luJ{u z;04=a6bS%p8OR528i%jxCIHdwKSSS)q$%hO*Jne7!r^gq>RB?RgVKPKB*v+|*D4Gx z=(2T|TLOaT;u-@mzaFDnnS7dUsBkZ(CXUGR-uVaXRObeVzWZiGks`Ex%wkMNl(IwV zXq1>kBuIoVNud~vnw$GGj`H!Bqu0v)??>M5>Tg%+r`$8w*F4iYpJZ<5cX%!}e!cy} zN;qjZ1<2RX84;1ef?|`{HWpfhzhGj>#B>5mEq|5jQco~ZgAMIFYC6HNAEjq1m2>GP zc~OFupIdNKezz_*xrDVQC-OhSQ%t;Olnd$=g-zYOjcSEYxBoQkaX49O`)MUjmzL;z z6=MG-K?Iq^5g|0kbe40*%iK#=R!qrm8z=Qta(P54$@PdOK)Hg*^m-B~pnO6S9oPYV z5_%5z%iWKk--qI5lH)D>+H(lb3geO`R#Q2da5@&H9PE=sJN+@fpW5SS%cS?iTgdoqC=k zvFr7mC=di32D3_H;MOF=^f5tg^>z$}iRwzxKr3t#NFI^CP!XfK9B=+S(5V(nv7#oU z*eayfnYNCdJSMt!)G~ITJxQse zED(maAgBJuk8%>b>PLw_!*7nC5wDOQ)Z190;s$6^x27?vx0Mf>iCG|3S;*$g!rqLQ zyQ@k)x4xGd-O+ID*}$E+zqJEpoYX^#NWmwGTDy@LZy3=S?^pvn5|Lv|Z)$7yT0P6~ zWdqQ67uQS(H&Lb0WnB8>t)}tX?>%wsUmqjrV$9nCm~iY$70W`lh_008c?~TRTs-WvDXTRC~dmC7W8t z8@m@azGtmitjzhF}d-zrha;m z%CG(>--W`RxsHtuopz$!TP?UUmMdSQK)pgLD9e5C#3k%W*foML%^aj*$k*ra0&}~C9P1mQlh=-5+M9tV$=Kt zRie%|MJ-5Qnp6aZBfqKAilBNI1>g9niSsc+u2}LXs$a35;(P%m2DOgrVZ7}JWtvf4 z6suY~Vf}E#Z{UR&&%V*^pYKv2_}wDu6BzbGMv5OAb(inIKHK#LddVN@917ls=8BkD z!|$c*NgC2>1{(twM~Sy$_1Psij^8+k;4kFGP}PSDazri&h$yEPcKO3qGR6!D+2*fI}_8Hy46>$V!gs($=c677!H-5zCIqt2}MgBKPDb@Be^)( z*m?atBiwyFuXelsWQP-0#)i(QcL8{L0p#`84yWIgeHbZERGg@-dP98C5?3%ZT)@{) z6bThBDGm@D2s%~$&;Cycdeh(LpYo7(>=qpm)!blfSYXDXX!IdhZ_YaX%ufnb7rj{6 z8_p+s{wvU<@GVEkL=OQn_718waJ3Dum!DcZYVIe*vu=O$SXm!oldeqj(_!(l{B{}l z_owQYV`m|wr?Kn)IND|d7E#v&t|B|Q2owkg%fVP;tix9d^a&(=Pc-P(bYO=W|!5xC0Ol9+PVr>VXueX(}?8xntNeUiFG)^UMPmK&=U2FuVzS z#M(g<4rdpQMF@w`U7iIdFfXXFhuMcr%z*;pdptYF3{?d@5tR`(S}1sNy(xGKN~+L8 z9jVZDHlNly2DZK#nCDpjWYt7H-$7$E1@q~?J4UIp1Z1W#V;9m0L$P`*dMMWX6rJ;X zWf>=$y4YpSec*ZcX{8&LXwyo=>Nha9kv1_vm9U$k_xLHbM%MzM5lz9F7zrw#{EnV_<@{0+#cfpt^n>sb0}TD{hhgWtWyGsgfR<|#m{rO zV2GeZtJLVG->TuQkxt`D7GTp#5>MAPKEtbwk$q9aTwAoPAT_!@kGY_;OdRIs z`{C;=JK)il;AVBcrN~ns@}2L?R6!CdHZAmqdaek=+W~x#8;m5*-2$#uP}@mDh4P9; zsfXo*VTG}QYzV(XlHV25wII`4H|I<%Z%b*w-xqv`U`noDZI z@|Z4E)$7~)3ogWKCqAq`_%AV6zl_g)_ICg2f$~Vq%E(?vK4y^j|kG_c6z@n5S85s$I4;jpBiBK|? z(E51vZVJj!+i2!Q7)XW-Z^W#~B0}}y6%3`wiGi(;w9#SlP)`4xi*sj&iUpe0)@HQB zw0LE%fG9baU+}P5*7MD3(BNbe6GRBOWH|OpF+V~_@9^i|A=k@MvoE@%4i;+ZzR7bL zu7T-81vy58hC2F7!czB$u%R?|0&e4cM0kdsxlbvqyw)7<6bNzq+QXSkoyeXdewG z#t7FQPp8&T_bnx2=KNT&Emp_;YK8T6ApagH$P~>=O%9Bx>e4lLDf<$Pi%DNImF@L^oTc`CP2T(ZUNiF4;VQN9aA`M9{^Lqo00a5T zhKu+8I&f!+Knf4A3&aaDoj01&7OStR=!=fEQp-Ld5c*4KzIDJhPL4ri^q#>_YLpU0;;hMSrLB~731|$7)4;p4 zTF)|OBtX>dhv1dg*C!k-?8oC*N5(FzKKSRSbL%y3%JkKT#yZn_m3|EMrTR?0?FSK3 z*u|YuGmOBNcxDcfs#WvfJj&&MkN_eE(se(#xZ=`80{VGRoP-8UA-MoQnqb4n}sX)b1!z9l)a_)s;ZH% zualg)>P==;!W%aFxMIeSFsgDGz&^r)Hi&^$c zUSP;2!48Op=6siwoOo9ier^?<1``{Bjy9(p`n4e~DJA&MiZ-kMhKM7NBz z$Jbol30DunWmrDM8s%PykvSTSJQ#vh@+I`zk7Kan%s>lNp|_e_B1EHMeE(H%lVY&# zGJDyVK|pN2#+)vtO+w>S0nCyTpLDg)%{x0u;UZXRVR_+!WZ`oP!xe>rsUelf+6hJ?Gu2B_jrk}F;HwbF zYyj?%U~8fXBV%9>sdjYa_jIb=aP3x8p$?ON<71@Nsu(mXHYYR%VLbYVq$2Z8=({ix z29#~sUh2ZCV}0Hpt=w`mn<>3b$g0Zrqq(^!@)KC}*@;o4vKA>nb9J>Ekd6jD zDcjATjSSBhG$-*t>$C}8;t3abz|f%D$cO2B0)m-~rutF72$rH2dDP8JG6Ampcs|l z2ESBv=+Y(tITW*Yw%I(dgSyUK16s0%SBm+f;p(U1(5O+GM@tFH(q7s$1>votRo}_;4gBQW5gSAO%IIla}c+ zQtwK*3HiZ~r$v~N9ERcEC%JK0oZ%c~>h} zziOne;FGb(GW99`E%r6rERP7%#eo{?*Nqic9A8%b%at8lhlS6-ZF=?7GwKAgKd(f@ zpmRLFsVfb`FAxjH?jp>c-dDqGw&|mF;D6&G0IzlQa}S>%a*sCNUk3n<8}CW z(2d<0S;djd(e)YO&Q5SLfV7t%j)IcY9i^KT{8TGVf?FNBkFa(3lg86u;->06cGyRe z*KxX%4U*D9cJM!y#Bn@Do_q7|r>V1QPrCbXrU)NbZ3U4JXeOr$=?|{K5P$JLZYPv~ zi&759EJjAv-BkD+Q?n?Itele2hW%yI#V`b)LY3*C zh1u#D?=O*7ErJw%&{3pkS-_Lu0Bae5iC`>sfK>K#*Yrpk5QdncB}0)`29PB}k+P=t zYGD}8^-hC>3)1`LKh5C5hckk;3`uv_ZV(|610rX%npUOaMTyr?hFQp2t`om`MbwpM z$BrCfNaqT;+-uor8hA)s5E-h4uOVaxfb5+i=4T~xZZJ~Ep$aNrobJ{4NoEg*hert! zKlZG&9If8Q=C^v-QYmJL_EBY_WR*TXCW_%HVj-NZef&K9mV=x7#GJbnlgsNq85V`X z{%9#yo_8ZoR#|M>Wk=2$0X4d#fhap~_sIEG82HIprX!^XnCj^O$2qk=70YP)1r_p^ zOcJo(K-b)SMdMHU045+rXA#f5L!k}NCR`V32Ne`y7Jt(k!sj^xo#(2Ji4Tae`eJ)m z3uM{Cmblu=`_;my_@9CfEfL>~y*$mlY%xXT)2qNQ`}Ual>7Kp!;`XR{4bvUvia#$T zzN!aR3b98%6>0q?Ul;2e_%zmi8Av*UitW?!RXh~sZTCVM+N$2jG_|@A_+>jxJl4kL z((UG>)RWVl+G&knUKO18e6rj^l^Ta<9A)%Aoy6m&kjc<_`+_}}Q7{`^^j4zmRXeUW zQrWZ|=LOg(K~5j-4MPH|Z-4%0A1f3FhvDu0jnm&B1NlotMsS?a-3eaP-<;@Qr#DRV z4o$DT_w?ZWi;MloEd(Zm;|M)nk+lEe=0KibDZ?)^HtX5WoAJ-r6_N(WA-8h}(f!p^ z{@)9C%#vjjnOe2$X375ZbqOKI1?y%CCH>vV{c%n`D>N6!;i!*`4`^+kM#HsV2z=_` zxi6g-RLUs+_C{78;TEs&;l13~AL(Qy^pN51wy{RVCYp$LD!$3C^6~xCoA6m9vb%fe zX3-I&hJwS^7_IR6=W#*BmWP(X-~ev1T-kD)U;CazwWn`v@Z84#{YCmXdnDd{h#Vz-=Lh;h&(j=QhDboLRfP04`k;RxE;^|HSNLWH3*?~OM~ zvcV8M^%thKtKnx>YDgeO`pXlcVlzPNCUfiiL?O;5<3+-hpv*cY!6VQoiWIuspU<4; z>aWiglDAw{1b%EK^l3v$UTZ~LJ|1g3Hxc`r6GnF+qq+QCK`UoB?fQ0@d2}Krbcc@Q zp@rhoUxSvY>DcwI6brv8m8ejyyXJp+7t#E>aLg~urjt-+L;lx8wV|mT_6!)6{_a8l z_4whu;KTgvDZoGX(l|9YnV-`|R6fzUDG^*r*Q9|Q`1iZq+3 zkPedx(s%fCE1YT8Y+xVCHq2 z*34HD+Wj^8kEcEJ@s7=X75!WAFGG)>6>@TJQ+fW-(`vR$0293fXZ@nsV3Ts$dguWp zqrNt!H`(>6Z38yu9gv@vPG`3V2qdzAa#DEndHZSbzc2#YKJlJ?)ReG#k#6_g}DkGhNn0WLW1&CL!wDfRJ#USn^6w zUn>=&mMi*H=#4DneI8<$BFFhN z50D&f0l4bGpgM!i8E8bxWpbx{fIKO47=$wjQJMm3vHPG$(d+!>^uk&IdLtc-tETP~ zQjvP`x(Qhc#hM9U6$^Mgz$Jo6PXmRq5zsBFxhUuO^OM?3We=Nfel3QPoMM0or8(0g zsZdBKjIRh2)3(L}9??Vl!{sRewl(KB-P1r6r4GTalN>y8a7OOj&C2tVQ!i;%AeAnu zOt32`YE{w=4Ro6o!@UWeXO$~CdFcS6We()MVb^}qvTU_S!|D!$q(EHq0lcW7ia7$r zZ;ax4v!K+U+AcsUa)Lu75o5?Y0q+AiaEW`#QL7<8B)Fy%{uD*P20{B`U`-3}$y(U= zw`5f7@n{jswotI$fWVWmbxa_j-W9@?!o(f|h-g?IPj0BVxv3&UyC7@@OwqCv(71lQ z1FT=5n=QEwc$3v&drJp^o9cRMsE}%}kTxhEKx#-(_)I$NR0zQ_gGp9QEA>yEtgJo00iRwJel;`GTh0aPp+9_aK}9GlUHo|ny=5PiYQA1YK# z14$IQ5EFP&cJBjr=f=v~v(8tZ(b$$izit|^=2Yv$L4@WP0rNdHy97%~QQ6dZP=L&P z3&t@MkZA9LFq}G2>z-#te7$MvWcBCCzzXNYQ8VwQbNlMC^Df@ijkaVyRDK+#w?!`LJ7HmBRY@g;SlT)d#6{S@}{M%Wet^FWM z+9|$K+o@909tlw|4v*L&V%GYs^DgUBbK(86v86f4xOQUwd`r9>tC~RBHCvot0_r8H z$T7778;?_L?tzl>h_EbSttGS2?EBYjok0JR21rvWd>Q(cO~Opqe&>++rKo3p$pg#iV}kAhJv5R6w9v|yZ>H`tu|OhcD4x^P z>@PM6>cc!5MWeRyj^NYnDU*-*0wm9ibOss$0nwuSL(cLn2t(DB7wGb>N3JWk%a>q{ zsN6KS2ZgBWh}Zy$uN6H(OPI<6u2l%3apO>b_;mK74}ad#TYy#Rk!Bk8H?~9%gYI>z zlsspScJv}=Vcws~4qQ_Y{hdAG1J8ez_WJc$5&xhQAVp(J#fo|e>T$kh_(7fzt%cgs zmPmWUlZ`Kp4s!?smoaG)DR}v1qK`=g2k#VZG3L@%Qd;;*F9*yYly1 z*maOI6?=i$yu>mXxUfUt%42xVRYe3V1zI4B$ag#U%?41IF*r!sbtJP%LBt`VBNd4e zEx4wPJhPJs#q&Ca>0b)iC1kglAc2-}1M3FykbRN_G;=_MSY;<)I;exuX_iy$i@MOu z|62>7s=^j{Rp?*E((1)kf|vV_P0jtdm#NyII=&z7SxoA?_`zqtPX!peiRGWnWGQb# z)Y2gmi>b+WNufZv{SDDMAi2^Zd28Zd4~V(wyfFN53X+I)yg%=Jee7kkWj;oWPR$zc z4izfg)?NeIeHA0mJ*6z7%0-9aUeW{l{H`8y3EHt8-b)Tdk!#_y*loX1GfM#K$>c4Z z$le#IubkGfv=8&Z#M83qwhO=v>NvpCvg-uP2^wa>zLK7+Oc?}vt{pPa^CE#cjm5fo zW1QeE`P~*12%uunClHkY?qOg#s$OT+29g{`D;gb2Z?X-*pbU?_Gd`uLVW%J;W8Xm3 z(jVwF4bZg8$d=UqMUIe!s)j5!Ch+`CkCGCW>FaoXqe=Ann1+R2`hw=gt^*fP5G$kY zZc{X~|0>yc4gUt)xTGD4)k84sDP|@d5B_tqLjd|I(l-lw@3&6NDS}o9`mjAn=(oaF zB*&s(Wwve126EMoZTHD@`vrHD|LDfo2xn6p_==W%EXk8sM2Gz-M=Ek&K}sqV<_G%> zI&4sMY74QEfpXUC@m`@+j}YY=uJ~^Ly_Y}UD=N&%5wG1}z`{fm=!$M&p8C@$wW^DD zDH9q|=&&Qc4Uorn^~WS%AQ7Np;f@vz^Sg&}NMZDsLrvLa5TQ)`R$+N{h-sUW_~!&b z4%+tZUcV=x$+>^6=q#5U*K>*A-f{9fwbrgriK}zVCvBTGh`90{;k3#sO4%9^{f_i_VW`T zbr<)=sD>6m9NkGajGPaR@k_9O(z#rxfP=2R|J)d4Ws!?#*Yh)Nn3d&N z8-P4`k@LzU7)G_DGrCZZjVj(^(N|)^vXEW;s)tll8@ytx<3w{%U)BS;mJ5qyXzuDk zah};ZJ~UMXGTogB=jX-{%&&dPfc`6CDAdvEA`C?uF`Ekd?BdE^{${if2JM1p)#6OA zT!9^H3JqhFAalQTwp(>kfZ(m~kKXryD{Y3>|Jumx^{COzZUj-pWN@)^o~w?DDiBY^ zO&XCSLa9$y7)N^Aee#s{z0uA4KkWe+GC|T!T=&keJ1##PF;8mXI;olL`=a8pok| zRNKYDOl(e2ZwB3?Ovy5GTQFu$!F&ADTnYUEVMQDG?T=Xjz0DZE!~o&g>vgPl>`!d! zyoLo^gZ!@4sQL<0sc$fSH+HnAL|pEU26<9jRHTjWn!J@-5`IDmUbXB-b!VKjH*3dp zmy{XN%s}i#?DnU5d?AG)f|gT67gtc6g9AgauqRF?0RI`ZL54pX41YZO@x65Cl9I&4 zWIL=C^rWzN=vti=v|sr6y09gvlz$|d+^M}G78ZF}_f6NpqfR9GgsnJR(5TC&9Tf_WU&PQ~t+ zwIo6h-t40z{|x&WVqgf+Uk0VV%=SOle?v?k@@J&I>3yT}F{nN|e)iX_MG@RZ>R#5p zTgS@(5c-MH-f}WeLio)Z-iG4f7(JtE?=c+0uk`}NHnN)Vx4tNeP1$yvJ)bL?{ttU^ z8CKQSb^!~5q;!{bH%NT;~VF_^m4gKTeM$5;kTH40BZarw(rueUgv&C@3)y;#HtAq=N zwzid>Wj&5PGZw2~F~`MLY|_u}eUUhlwkJazdrv80U1BxKUO%d3RArB1(xzw%pg0xn^QE%SwRo0h_d|2*o0+JHB4u1f!A1{T;s`-N@G%NAXOVm z!QL`qE6Q*Z@$hmD+db;A-mgxdMKe>c`1p=b&Sx#c--Nh-#=17byKvY%IzSP>^Blcc z%G7op*igGLdw2xrHFV-ID68?6J4uwstES*J`bJ#{DaF<6y}Zfn(3nBWUH-llsf z9j=-!lrS0$o{d$zrRaT>SJc0TNvJgHpCfq>qU3Yp550WF#PArXKZ<^MvK%vVIp@A$ZJ2_eQkIg2{^{1b*x);7J8ZQiEsTj?928;mg6IH2U1#;0o7puidx)^C#^`Vb=heU^&ae z=Vr78jmG06y(G_Zqq;YYq3wTXen?KB-<}jyKLTHGb9LuaLb*nnq^h;*zhgYA~g-PEQ z1=I8yW3nXEikXLyOWA4rO1zwfx=MoA@soe=bY} z=&@%zEI%*G3XdB(hIC+44B+k@J<_6n`~1&$XB0vFFbLaibqv_DceODu=@yFeMqSzV zeE@o(2EBw}O)R@(n$YHtF0Gc;+4Lby?!O(oe}R;{gy^}q;>AyZZ8s&I8L~x(U`aM%fSfY`{ESl558Y1+li`4AZ5x?jO#Oq4idd|)dLNzlfw|r;yh$|zB6~2raA%gS%UqV zOj6APeDE4y0c1glHx581V%_OW_mc00aBUE6Iy%~5*|z0>3v#v~Fe!@F0NsOgp*+38Sy2@1TjbXP;b-%5an ztA$HeaY|INdlbnLO&ly3Ws~!zVW-cy70(v6>RF_j)N@B`eafs4y=~>(e^ZWbB1yjd zlsM${7?|frA66UFmOPuc2xnHQnzQ7f_aKS#18G_8+gbmi);2-}tZ%=-gNxgk&p(Q0 zr^4FM$Q-W4=XoO#fnTt1VWJa79_%gf<6x0kjRim`(ukv{fYZW8z1Cut{1*OVrc+FN z7-%}ko3k93&t*tnw>>{!3%9Fk8m&s~!l0MBasnaK$?{43>%Dpo0>gPTmM6Pl{CPDo zhVYswTy?ealh@kUno2yYuI>o+T6+FTXMW#cB#~dAcErO=LQtLT!|YS7TzTC{pVp_z z(aB#Cxd!>ag1zP-G($NMe|0fi3cxXe96(3Ct!&n({{4SgF9=}h=Lo{pVXXFuEZpZq)UAA9XvsfaEhlgzmm3FOOG(wWBNE;?O;of@x6AzxgYWe%62zslXC(AJ z*5%E|7(&#s=z^O>GG>XBDiCA9wR=l2S+V}*MZrcj8Rf3F|bYtD7)CD z$KYt|B&BNnfpLEi>H>(8q~x3AZyU z+ZJ4Wkw8vaflaPUSOGtHU|qLytU^biFm()AfiN}B=aI+z%#1HSo-MC;NF*6L zuUKkd0~2m?Sj;?p9^{9Sp7D;bYm?(4-9<^w2eF*|7q_Byh2Jm;iZ34IL|9{*hmqQv zV-$Xs%hd4$QvuY9@xBGc`RN&;*jxsn@*D^D8SolPL_rc)mmjj$YWCy7=cTa6BwgnH z<_nTOx8Pg08nxEWWV(~!hz(U^qp*C8!9QGnE+V8!iYOG$0g84^c2m+c&<2v=ejQ}l zYnWG~rN$&$0^=tuPJx8Z-dX9s=3<(a z+4iReqC>8~t?T!;8Ok`lM8qEyO28s851$h<)N3a~GbxUI>^Ugrql16C+O zF~Pukzd`>_%s7-mgT;j6)OmFV3f1Q_FVa1NG7IBoBrD|opH?n_z55aXk$q+m74umy ztBEe?NKrzOM||aZrTT;DL_}iUZIVAkZhI$Kk9?xZL5K*=DbMal*z1OLlr@TIcg!$c zZ?Wbh4WuT9Tvo!!SkZzwSMsk$vVU((qmf!D3}fJ8E~I{Lj%B;qxU+yEDKq+nyGyGb z`+mzh4N5_i5r{e&21+H|G!R_rxt+Dkf?&BV^P&!9rj?aaKCL_gM;tZ>R<%uEx=W*z zC>}{TAP_bVi<^%IrI}bD1_@9eL}nk4aB%j)(Qc~PX z2es0J4`$bO!fh4*R)d}(wd^OH0OPI>kQtB@;@I2r1Qb1Nxok7l&)k671vKq7MJC_2 znknsujTwNpBFQ*VY_7Xl-Qi>>gZS1No_}B3!lM0+7 zEYWitC$2->*JI2o>Hgq5FDC;5!r|4%!p?Wt2`Z~=sactxmc&TbC~5cO=xo1yI!1d7 z;7uk)8rFLd!NeFlpNaf;YS=2QD+^2fe3eriGxmOnC{u^4r8!VXem=3ay=XuYrpE>%ngWL8uh##j5qXya&tz~uA` z+nctRYOKA00!T#Ba`@ZtuSIa8&5cpQr zM-C4=-+>8}8hYrdEd#EUtELMPxYS|~G~~&VU3SOS;(Cbj?lnZ>GeO)_@TGnB&Jkdy zP8dkB<>rDfX(_UhF61N>rvzu|y!hD@E&EVNlaQ~!bY6b}QOG^)cUH=Q3oSw?1pzk% z8hj)YW)7)AGIXkiXQ#vraYbYQtx|W!CwT_TZc;SR{M*<5vjX5Wqbu3}VB+BK&+0EY zI6&?bv~iQ+|L{SHP9O~UEa?6#>2E;ZpZi5ZNc(|0Z26bV{PoZ0tpLTuY1Z2-#lIBR zfBEx4Fz`7YBpaT;zAAq{cj+fxfwJO4_0#oVFZ7o`54bf}57w7;zw_CD{_6kxEAI*d z$;lO?OW^D)9ORp3t$e!D)TIdf{lv_}21TI%3nyaeoanz5 zq_&AXf=)#In!Ug4Lzn!Yzg0=uYsYfLs75Fc@DL)9mDXBpfLGlQ4nV`de!JI0IzI~B zQqKWuU|^pgsxf$Xmih)n5OPz=!FM2MR%k>Qq>R@W-7Aw6Awi241R%oES^tJlxRe&= zc%_9e5nlsKDTT|mT-Wl;b8T&Ay_VtfqDCjj1N_@lU5Xy)D>_QPggubMztFJa3w-aCl;3n*Y*2$;> ziU8AbHN}m46(g`%rkMdO8z5qV+^MD;3TFa&$3LTefCeW&2lPBofnefuTX(9V1XJx+ zs*%4Y(_eK>TmwL($AZJe}syA=f(N7tcoZFJ-peF$t<2JYf47RFeuL9IxouoTJ z32_GbLI95RYmvK+x+!jN}O5&1-kU^R{mHqVsCIE9((o>2TC(*URNHWBqf2G)dN5%tw2JS z)jTs~qGDr(3dyjTzBW7}#)t1-0h>CPH=(a**Jb^_SDF=B3mGuVfC;3)Fkb24x@2&uqUWh}X z#2-Z{i58-X-lq8|A@yPty>lb2Z)OCyo*x2cu)U#$$Z-D^Kst@uLncQ`RbM88r%I0rM!#T{d)v#=^D zH1)Hae^_8JDn1SmLf?M?PMHwpCU%}I6vzdCE_Oef zun-Q3x{7Gwv2Ozl{e9M0A_Yv^g!7TUMd&CygSU#t6I4l-SEaX|oCC^9(m2}Lsp!LW zKB|GKfwM*Wd9@bMfs?23m;u)b7BEEiq)iF7$!C~Ii=rWT1bm&{a#srD#9q2+$t4N^aslJa>Nd#wY>#z9Spa$k-zb1LA}uz=g$b zDD#!NAU@#a_|UHVAc+P_3~Ai5K!q({TB<2WX|Nu9McffyPd9p;+VlRy=P@%*wOWd{ z0U_{qPp?~L{sGpSN1y`o9EAZ3`)1GaW+QFpPK14a46K;7@4&pICwCAWJtMgzI@+p) z$Utg%FB{xYih`sqmVO5jidRDJ>wTm2-3OQ@h3C%Pfx{4oMPj!JdTN0ukMU)wg~59@ zR5}k%1gg**;3N)2IxBC%>l?L|p*FQD|L|hUlJWD(<+h-A%jIe5!(zvM8*#wkSP4lp zipv4O@CyP8g#>9yr;G$+Z7-JSBvvE<4N?yjG@_-srs{A?W0l1zc-w%vo~9t@1{XFe z47`&xFbi&FQ84>IoYry5P?FEz3NA=Ik~XdL5MXnImjL?x(bU||@ogExithRIr}fF1 zlTdt6@dfDiWe;%&j?E;@efZPbQp!crsh444mwE^2a0C94!|nsxq|aKPfrW8uE_q>6+tu_r1Ehgez48} zDJXV8PL~1pQQjS3$o*?7E}#J{N+8@_&K^F4;=Fs>@ow9J9iQQ(+ST8Yh_O36#8z1L zPQH4Ey5Bm!#S;y7?W}&hb#Ow9{T!u*c`YcI8q&RbHwF?86A1ZUm80^#f|4lP#SHa9 zny#>r2$qgHrh6Y^qor5(3QpA~r2i6P%Ao$Wu;1MAoukj6Y|L+y?w-Z;%f*t-la_TD zn;geBE3k_<&=aHy+6H^lp{6NjVHiVh}wPW=?8xxS&V&8i`$l_Z;6&V3P+5YULaPO3dB(t zrPYTLvgavj{paz`-G?s(g{bcW?blLu^RkFMImaX8kYfQ&`6ELE?_-X;!fF`Nq{6vT zD-_OfTb7k+k@ocwhJZWRzd$XN)7%88pOg|>VTFH7B`|p*lv3l?VZ*4{V!*b2{?|Q& z1fI=H_C_JdddqjuS`n554r!IP$(*(=4%bLO+l;qVHz3w`#4^FWVmJ(={&9AIQu8_< z1G=`|^gcWr(De|6b!s$AC2P^&8*U&3z)!MP`u*cg20lIkvvY2`J|rPkgN&^HWhIeD z?q_ihryy=+xZ%DLb@vR9wCp!tkh3f+-Z**t3dk|XEuXa?K`LbYR$)o5Z*z>yM68_K zbMV$G9!nCWMhsQ;BhHFKjjz^>>fPar0+)86ei{u|fv3sF;aHs;q}3i-#O4aak#5^w zN%$bX`S3Un#sCo!?SKr{(8BB}D!baYY9HyBN9|Z&0>m$@IsU8qs+d9NbS zbM-J|Xs6|{9MJxFV(S4?V0c!TQzbQlfU$VADyz#p)P#gR@23c*=cFX*>M1bZ$7UHV zgTW|7XkWdPX&Bw6eo4he!6+abX_jfSDq-BFj1m2?zjq@qD{|wBN63Ebk>p@qq~0fb zORa`M+9>Yo7C_zVZqjq&(}9snX09+z)8vl%U4eBwQp!M9kI9#t-*%wGS7&pz8c#VL zpnotgW}>GCq_xqkP0@~6j%DYn{XPsZS%iRBKR4gi+b4n&l*^+|Bvdo?FgW^xrgglP z5Wmb?NxFbm+L8sPdP}}gR#eEbf1dj>d-XUs;yefmsXZLwS`m!Syg~i)O#As|p$DuDLSkeG;_TcccnncSYEQ{0 zRBU4sOaVL1Tc3`~fi-99c?9%t=|;Z^CE3j9)Wi!dTVV)%*!_gW0Rk zQf~Zu7W72DdSs&7qq*d`x0R!l9%XMv(LwG%r^zo8r4$p)YJyS-gnLx-G9sMGHa~!! zKAbU(lDTPZ-qwZ*RWcP%prY>@OK&2=YLsC9BYKn*5>cx%&x$!YXQR*>g|vx`MMH*( zpc2r&@YY6#O&oywS(>LQ#v=+nDEAC~-#K)$RH^p9!0}rdW-FWr0GdrxNqqMdP?IwX z`)>X~3);g-hOE`lB}3~)lVNY6rTR34Yx(t{o{E(^7`Rx|PJ7$gGDe;^+70!a z`f<9}-+EZ#G+AF`V<5wbK^x#97lfLc%=08deJZ0IR8?e#L4z4}RvaK(Nq46W| z(BG*CMQaC$Ymz^jSd}hz??xszSA6kEqqcE!y{3l&5ec1emJbyJof~gheh4Tn#2bac zp!qhxF~2T*WhIwpVb0|GBqA;&>N6s*RQuq!QG*-hkvc&NFu0HiRYWMAgL2g5?iYZm z(@WmMG|ofS?q>M*l7ejD;r$R>K_l*SuWZB1uQ^?Umb1f&BUm! zze;Yw7jEwEPb`8*Glxm#&Q9Gm4tV6GDjV~sb}u7-2);+lz{4lAecp#n6AqSL@0xBe z=O_@h;4*x!)k~0Wh@UUaHz+X!sqFHYk)7!S$7w_SNrUqY-JB`dCnk@1c;GNrW4|(z zMvWaD0)}Z4YbZQNXsd54B2bf#=Nhx9e|sDXG2yVS)J#KZ1Ei}0AH7q#W#X9Us|^1o zH|wX*qZv>l^s{F35QeM*c2QunkXUdQ%F2?d48!9oQrt(kP{~0s z)d=8r?qa`Ph}5T7j-KY!jH`HOwrD5IRlF?#?THfE$Jlh&qA9eQ;B<30;$G`dc8(^7 z?{qIF74{1)Eb(C3z|}6azA&81mw8XF6YhnI8r)Qp5XhPp_t|zVJE&ZFR#ufTm} zXE$zIZHx#X&~S?qRnM%SO)b(QL!4xH*ElY4Y02{E3I7Qa5EeBs?@iPJTr* zcYC;imV0xvCE8Q-TdYbXk$$Eu?M(rhq@yXiG3hf+tgUZ+!pyeE$AF=W;@ws5k&9Q( zjVPW0`KD^U{LShXPNH8BO)}Tw{twoU<;^*?m?9`2|FUI3~EK*E|49LHc zmL+Je+AiRBd=I)U(P@Q`z?l?nOS?&%AxMgO6Dv@dk%=~58+Ra&)Gj*#Da7D~)u2LV z;Q5-Kkw2~>#cgt|!4B{Hp5e!6t|sV*)4dC2zQ66H{_if0$l_tb{8 zr1>tPu*&Dm(Y<-+Ap`bSG+e79f^fm!tUQN^XQ=@P>0F^iOvh7ORc*(^B>1(`K`YOW zkn!nq2jQD}a0^5wisf|^%VW!;;Oji=FPWP1^9&YLL${=ux~l{mg&L$eszNH*JksS$ zh{E^wQSx0ZvRKrcte-Q44a90q>A(z;evYAe9^pQo$!EpTezVxR=>&4&WbdOrwOCL0%W&ZU_ z=;^>&h`|!|DqV_tQn^_wxgJe-cqg&Cc5=P1`qMOwx%@5i2FnPC*QcIkTB9!6lm}HU zO{fN8GESNa<{Q}Lc6haXgJ%?`T<2&u`^niXp}|hIxLC`MMQ|1(wqlTUx;IE;tUg{i z7<6a)l>?r`%d@_+0&7^nWjyUbCnPx;j#^ABXnUdf)JGE|oh0!|b=Crb7M#;2sj^FNlr=N|g~3IVLPbd^7X$`MZ70 zyul#8$Mx&!C+>fowDjDANMWX6q?HrjjIlMnpMWW9^DtlRBai)k)Rcad_lO6Z#d01| z7GU;-b%~Zj?3EUy*8_f%jQOVI2BA$p(wNqe+<{>F7Tf2=1dQo#A8TSV;OWU*`}A0F*#*XvfWx^Rmx)V6UH6DeZpu|san(A2$Yf9(J`I# z36VLHefL^u*XwQG=0-G!iF&xy$~x|*&gWDC+tqA>j{U0?YhN|YI+cdhexit9xF4He zAl-oh_n1==2-Ki6T~8irM*S{^A;JF%$tofqj~x$9DZ}>}!DT+G{Ep`1qnMa+a{ z&ol5~Uw=)z-rq9V(|Vzan;(Vv)W|-02-PZH3}ZUphCR?H6*E!K2=}`jOVSIc1bj=L zM^TLe`0TE?&C5gO(%vQ!xwZpvDRyL^hjRvp=Diy9jK$f0G>k`&PNF5a6fW$2IXyEy z03wuo!JFPo$s<46fpG8lbBM$ZQTolG1qR*52#RCX^LZKOpB;T1`+58F`Pm*RcIky+<#G@I>5eg@gaii8AwjgDELct-^Ix`XS3iAsZQ zOCV`7Fayz=?J!`F<#wQDQJS2u?0HRU6kagNmBM108baNy#Fs>H@w9nj&z9(896ygH z@R?0s5VtzU5e;@qrBT=1G=EASZZdFMXl*Wu!Jxdict*ZelvuL+M4L65f@`~IB@UKN zOEeQKC*h;{OD>tXyQrnD%x2IK^B!)j#Kt4Cc2R`(LQK=dOI|u-sc%$<6fPEBj~*B4 zl_aCjwyRX%vS|J}%OP#+jy6}O;w?Q2CdfQ4)HndHLnR{wm(m&A{iHjZ8p-R-GQtG@D3xy zn7M``?1USl5eTk$BRj#Q67R#E$)~TFuN><93T3Lv%5`{Ow#>%B^lFKL3)`4h#5+s* zV#-QSj-3?3D8d=io$8AbnC%y}G)G<0g-1)rJ|9Am=(+oW6yUL0St2d8t;*V?%3BT+ zG{?vP3bF1k4AoxQtMF1fdk3GR&GC($R@3`b&0OkHANREr^IQKowe8Xr7Au9oUAmmm zjl@pEdk;tKXz#s?RM{EbVOOWMLngdet^c6`BJX`PqYQm;RTi(iqxa4Y3I;7$VApg# z=5++JZzL|A354^X#c?}UO+Bu@IA&@%L%u(RW)eVPfBa;rztDmW$8ODfqqc6FxFez8 zzAxqJYoafymiyYyxm0kP^Az9<3TmS`a#GT5y+~7zA#2od{xYLSd0_dvbw`*XK z*8aF)a3uwd2o~~J!i5G1g78xP0N24BIu(H;fn|abh2Zy$?EduQ0IIoTFvT}FS1cb; zsSe`t7LCT99P7^j&6nSds$k5Kd`goI?R#zZWiV}4i~wr2caMhmFKm==URVBD)~bJh zbHDM2#|*hpwR6S82!=mAI!K-(ZpbE_03eF#O92h`k=$!g@U#)4W!uua1CWl;)#4#x z>|r`3A^8yR+HUU_U7Xm<6~#?Kt*6}D*h^Y^c8+wjVy8x)JQndlSf)?(MJ!=i3OHoB z*EWL6d>1Gu*|+%>2e35n>^N)jy5x&RA$g4z_kb|VU!dvr1>8uu<`ZQujQU;s>Qnap zm+n+r<%MrI=ZEysb`!MI;xh0^nvo1Ijx@D&e&%AnDPn$L;+vFQ6!fWyo2JM-OD|5c1ueQj>6%BUyr23ZXctIOOI-FTgH2Tbg2(+VR`q32R!bs_| zc_%E5+4xy4M^?(A?a5s)@HI>c%qG1}4QfgxB#H`JB8mk7kgS}P5k9<$?Lc8Jx7t{i zSedm*#JXJsr+J-W@%-6)-A7wk0sJo?tbp*o5!a`hjxUFU2G){zguk3A)DBL>t|xMe z;6}YOw3alyWRlx>pH}u1#h9ml-a+%zhb5k}c}BS5bw2^uAuC>hB;T-%VC06%vqf-&2L*DfY4C^u}7z6j#>#6WKXNDtBV z2)cqUbhavuAB`6N5O55y2FC(tGKE9qn2hk54XVF#DWDN01@P(vOSJn;qeek2G2V>f znN3ac1CV*=`fe+g{gcm29Jdht{2Y*pxe7+(*US~ed;tptIexw;kE^DY(|4~2#tn){ zjfMWRkHj>~w9<(no(!ne15cw|@gq}Bi8K*=+&&wvTo5hh*%NIo0D&D9)_J3Pvbg@c zkGe+v6yWryz_b56Ag`#oMb6unSa9me!$y4qWVGlBF}q?L(R^4SG?_W0R!NC4%b3>= zLYoS^z)lc~hAL_q0S6J4_jmAAD|R@%I$%uqLg0eWhz+b0*rkI&G&nbxkrIxYz@pvB z5m;leTP|-I!w^=qQCppa zV6We;i9s=m28EJjPS)8-yzXXZ^dbk;H2!q8SH*jDrfR?ySu-sC)$VxYud$zUV5UPb zgFV3uAfW-hg|{m6fsG)|H2glx8iO~5xa?Oo0=Daz2-Hn;e-aEf9Z_}@;W&X0W`rq5 zaNEe07Y6jg{5@KnQu5RW<6z~sfr>07h7VGjNFXyrWlPV`r02N4v8i@gKQ2Xt7=h`nkOKKX6- z$COkmK2z3R>5awbgWT!KTovtE?0i`b6wT*BF=qzK#|vNtr5P~p1uyBSaro2uj>*TR z(2A8gLk#BY^eAh$v=CnU=C`(hdv9-77$YzYCx%brggj^7PRu5I4!rJC_XIkvWmU@V z^o>DsW+gf!&f$S=4o~mqVp;p|9nf+RX@8%Vg*zT40^d`&__xwkE=K~G0YhWBhYF+* z3f~Vz!KM^WT0UbKn^>LxoCwV2?wE2?Gld*0W=YC?Xc0wb@KsOY#_ja-BnYd6a?=g#dsmiH) z4qCOe%jD*@0v6p5`(wT6q)tf|jQCzPe8vWqYfD2FtOvYsm5ue$2{|RS^^F0me)k+7 z!4(B8c2~`7;5Se_GZ^GWKaVU5Xnr9HX62^Sx|;L;Yr%~oWQ%1=ukIrP;UfE2p$KT` zedqPspy!te1jXrURZ#@j$1Wup7!sAabIikFHA)*Vu0q%|pK)w07f?OQ(U__p)7BrD zcKc3&M3dX3BnrgpTN5EaD^FOrp(@i@%p4kF*QkuT003nqL?t^pYYDhE?eX9 zL;aXmZ>PGF>)D=4b}X+5!7DAY5GmgLrhWLbW1TcM~$0+WMFFU(YIh zWe6YN{^rBpfrBseOroqBAkdoP#*gd9RID9;s-4VX@{PWbw3Zr7HJEcsc@qDJ7l3Td zT-9&h!fK4`E~cq^p&75nni^1J`W+db3S=!c&N_X6Dnh9n_%2#te40-4@&c}X{>Myl zP(C#n9sbBF}_!()ffuH;2IwTTEw${!g!M5&e;UM$|8erl5gh?Yv zn0paSL6f`fmp;XNoINzfJ0m~Lw*sF{Hi>L9S#r1T$J_&Qg)XVoL&kC`bI0Ibk4dWh z&x#DHVz|w2gu|#!^Lst1y|5{thSR|@j1y$@#4!=!GkflQm;zUsoWyJ!=N?0>e+ljN zFW2WEKV}khF3W}nOX7Tc*^=&wOH?u_1}zL!dx@;BBGox5$c(2+Tcu{E0k{k#^rjkX zKGk8j0!YAb^2u~r-2PoE;+u@fICFhwHep?DmKEhCta|0? z*N`lGlZW;VFIu;C>(?PU_`xExTtpyM_5xW){m<2gUZk+yDpa#o6;NzpipQC8o=M3p z0FhBV1w|Ga+ODO~3?3=~f8wqz4VcZZ|60)LKpQ=BoKJvu5UFOEdN9_5>$j@EA{ zdWxxkw@#1tG3f|rz>xdxp60qH+<;=A0sudE4Exx!CmD3oq3SO~I)mE04ZIA6XPZUE zCeHGz9{R6n4X6UnEkdv`v}oULWwt9;b1px2z%^`N(Sw?sH^&}6TtL?@a-$C%KiV54 z%f-Ew|Clo1Mn!6=8eBUSD={9`TnrFM{oxerhUoT@1M{hDPYO4-l}paqyCWedJWvIA z6uHL_sCM+)f&31XjGP(NnYW&VFagccyj&X9=<7tw@}?OI!d5=_YgOkA$&qec*rDTo zx4Zb0S7}JWVLe9*<_+N86rq1pw2PDX{+If#H2ZC;zC#dB?SHY-`T&ayhycRBsrgLN zbm3M$!NWwLicpg?KETDmmPJsx(3seysgvf}uH_$esh)Anz*)<-57{&W(?fuwPi zotx_boUrDVp%gtGIlyM;sdVA2SIl)-x@(^fDNMoUe0?=R`aGZj?Sps}u(|qe2Nl_@ z`u!=XyhuWg9C_$-Y<(7Y@u_j?t|;`BTs3}wO5Xr~&pt^6lI?Mov1Ad{-ddyqquLMm zU{kR}l3wmPrkm2~!yvH&W+TpXtCB*&xXKZ{hQEpP0H_WbI$`(2Fz!7;6l|^-mkgEW zUIB{!SR)QKKaN8e;h&pHj-9kfMk7|Nj^COxrOVI-^rX_Xt42;^d+C+!2#7IeOVCQ1 zhZwUk18R6XQlYqm0ZJ1v`yS%-+8+n32;e3OBx(_cic>Tal|N!`+0x2{GQ_g&Jc>I( zGhIoKtBr*oj|TL3syTzi@pson9>~Y??1H29K0#`lu?ei{FK)&_ z5!6K*2TW)wL{dO^`ofB8D!C6KvASulOzcb?s5;`fCw%tGOHrNWxw6${#j0{qJg{nriM{qF+&&+GcX3-CX`PygKk|MO1s|6>Pid-o*PG##jU;nh3aJPmhL|rSA(g<&@G@S4YAmF{6CpTR12JI$gG|XgqQPA1 z8_s7{hy0KNnS?`HvU1jZ1>&MR0W0R$0~EhHC)#%ofK}z%r%h41jc8z&;CRs3+3q?g zQePc-3Hdq#u8wW^l@+i-1&Uq}QQ!;IXR(fYkcFshGABwVBH^03M^64 zmmE6xDk`Vj)dql~_U-t>bop9uI5ru7na<~Yq)ge>ugxpVKyM9AX#meT4p3F;*Y^p? zj>pqTPu@Gah9bRCKLKkm$e}WhT+pSuaqcn9FH|9q2XUMr#=ZX01jA&oEsQAW5==ut zRu`Dt{p7BFa68-B$6YTFzIEPQcLm*!1N!vWX2cKUK>KqHn!#hp`l1UF!_y=W?@zx8 ztS<92`pHdtTcPY8T)t6|aktEpm+n`9fi500E4Z1*|AzAtOnj6rzwJ#u509k~PUJ2D zvm3j>9@jMdtMglDhs7c=f2#z&+7VZs`hm4T_wv1_z$izcP9HUKh05 z>H;;?K^ZFG?la#0;h{>;Ju*R{YW<#2Q}~IjvDzbrl4=rlD_uaKBc? z25W2>hHUv8Gz<)Z52N|U&w;$!ur_V%ufGGzc2pJEtl`2UrY0)&%z%Y^_Qm5%?Ri3t zn)tDauLT zR22}rwK)o?3*r5tB&LVp!sjIS%?Bk1C-bFwHgODPUhIR6`!NDX$-mV&8aWb4cZK); za6T~V8h)1~Fw*<1U@lpUVN)e!G58aR?B+|=UrifeGfb)?xz)(>GPXmb&sm&PAnGZ( z{>SojFblK>4aftP-Aqk)W2Cg!?7kwn<7a*c^X4#WC7`_S5x%fugzp65|U7tQ?2NTG!W^nU%Mpf_!olQnyeTUi_H1Y%3 z8&Tu-8j1?$n(;<5Q8;QOs_Xe4w*_3+Zb``d(ELvS>!)#I#|l<-4QYSgCJ@j@w~;a_ z5`uA2^6pKX->iF(y&%UU+tn`}0VqAB1YE}sJeS^lz=UG~_}L{OS63E2%1ame)^_q5 zj4cp^4nGHkBqJK3(Yb~XfcTE+#KzYR6vYJvV(bPIoXl8jT+tVVAxK_eHvb9?WW;cU z+;xTK*g^aE6zs3>fZgYOHPR9SW%-JE@ZG^zYWd74CPQG<-pFf7`z+60st>w=~?dV}4G^&L6XN2g!+dy78+zm|T% z3E2mvT;7GIWlOs_1F^vmAVYGR35?G6$kIFY?JEGo0|1N;&FobXC=FCCCnYK z;Kz`;0kG@n|CIK9^qYzx^v^jc#RW(&Il}=b@DU7godA8j$Q<@;4ZRR>Qc>oq@}B3G zT_@?jR3K;k0?h<7h<+=ly~m-O=iYUx4${y$>*e6a1SO0Qi{13PP)e6`^5+@7CDU{nWl$^Uc4& z?Hu(D;J>8UaKFoVQBs2X9>SseC7>;ux&o~@3-e@e*h4CoG(Ym*pN z(Vxl*6m}JB>T`47IfQcs@TdjZ^hMy}KEu0@9eDN*czkZK%2La;yby6VY1rBO;eSR` z?dMLM@j6M8m$5uhbkc_gWL1Du@{ z*6ZX!M??suxAl(*wqUMw9F-4!rOGF169ON;fma{J0yDbWbI)UTB^6BJyz`BFH)SF$ zwfgB9U_*g5v|is>e81t$W}*J3g8RnoDx=^WCYMo6$rfI4BR|WxaAXmaP){?(!GjIi z_&H%}6Tr!Wbpv= zYkXskP7p>qYuccLe?%*D2Fxjl&b=)kNI4HMRS5wm^`XUsx5{_B*|YOE5& z1x7Ug+Xy_NK!5l^$oIjd0hC*3-nc6i(lD?fxW=2ae{Gz9K$=O zpE3&0CPEZBT!DeY<^o z$QzT;EQG#4&pq6nelK43M~C?iGq^Mi@a5;2%s?D+0v<1YrYA@J>V=Dh zoPmv!;i%EUR0&Nw4AbJMANDd~CLvwG(w&w9#Zgt?U0=0U!Rpp0R4U<5_oH}-lHN`M zykCrkHTao9*=*ggEz#eLFK0aaI-1fkN59wJuUbTr>3600{*B+R^;us!YBfY?P_p2K7h>xXMRo47o9g>wmyMQem$1VCR(Hj zu`v2|AQVPTjAG+NlONX=f`5UkL!QAHB}CN#qS7ac&Hd4Y;jS_X@>q1}Dd$OeM$%;X z!{y_7k4VBNtK-{4w0Ef^_PcL!+fPzsDNf%iSSVEb>~z#fipCklW<2n73At&JSip z9$3?|B%*ySM2?;I?3N=+kZN?01%CSbg>Z5%%%xrj!Gq@0yXes>?y_pSf#hIknO!KG zSZ@(y=N*#C_z{xLH@~SQy&nH8_!&9h1lS5*td%wefpTRDRp;iTXNgqnEte-1pWEhKl>Mdl;SjIEh7hmsaZ&BWLw@oPa+fe^(;z7%whc zKMk#wWlP^`H@z&itENtt&1#wb2q^tlV6gWx9iNiyfG5B^wyk&C=hAU_cLJHkN~>8G+hfnw^p1 zuCU_#%fHq^I`rIjaIXioqz>I0oZKFGIi-Y5E+MZb-a z><+I|$DRby8g#5v@*(=3R}0ZnjHc2LaKFFf!7jUd8p>Jdr8VBNw~s493C^a4-q-_T-4k*l*|ZFFP2C8*Y=uoj}6seNa07p|CB?2fO6@kWny9zFcSro4$)z-?JWcA4p7&ofvsl@gL>(_`F1xrsDlB!;hJ@F2g`Y zrKxZ)Q>gEvM@@L4wjJ@P(W11QA8*D$D0x!6#Cy72)(me#E?DVCMhp0mz-J$6?q_;hgLhG_<~Vcf*#Cwb?8bM2ZKtkx?m?yGwT|4g7lirz=fGb- z=uU`u{6X*?CpGdT(xR!ZQNUN^)8m$E?aePp`*BCTyI;c`5;8cQJ3Sru9W=>NN&zQ! z_831W-F*E)p>)nztiNpNHGxR=#-OC;|7q{5gQ{xRz6AjR>2BC`D&>YvsdOtL0@96u zqzHm2(wml&ln&_-F;JvSN{~(g5l}<~5fr{_opZi--t+j(e1CrbJkA*7>|xekYu)#K zUDvPH@}oN!L03qDPeKyNZ!2=4D^y!yjjLOWj`Uk*WEOv#oqp6h_sNUW%E43`V_(O3 zc+52;71yO}^k}!9TZ>|AS#;l+w#?gGrim&zdhkh&sT|r|^|?*E%RKT{WiKMA9;Oib zth>KUZ%xlPID0ofM?mvdMi5nnzRg8=90~MGo?0S13C{d|dRC+@tz6?6}&Z~-coC+xzu{Ilh-AZS^ zOJf4d%P*kQPJWO2Zd24%@JQz7bq!n>?$m3}U4q%Wm;dbfB3de3yESC-(&hIX)Nstv zC11x!Jj>`L0PPp>S@CkKgc#FUlqMYJ9|0pxEekv4b9D;Ny*dglfKgb zi|riGAb@lyv(>pCj6N+}87vPCqV70#8(R^hDB!|)%}q_7Xl8=6bX1zWEnS|RnKwx_ zLuP!5ZAX!2#3wO@A-Hbl0?r|O^Y!48(vdRV=2*hA{k3)qn0daki zWn}`I@5z({qkF6lp^`3xt7wzMklS(!X(omBPzMf2EUj)&Pr)9Q+xtQs>ALa8N#4}7 z4ugtf(dC56C&tbuf8MY#7!^3G3oV?Pllg!BnIYh$r~b+vgV9M_nLCMB%3wy{^L!Z!E=zS8MP?^o3+X>Sr4 zCevxs#o%=G@|VcEvCviW-n>lDm9%DT-|!@@n0Kpr;7NCr{$`)W#g4YBG_FdD)zm%Z z6m6&M+px1A^q(GIB@OSy4wa8^NEntDjtHLHxr|$XGFbPwn~Z_9fzNt;zS?gtl3Pi&0fb z8;UC$oo*+ge87A|X7lS+p}g9RtiX*5B`n7IgW$lk*x|-MI?)SOM(E{)Ho=_jQoVx6 z$Dh9X@0<*X9#n9$h#auCG@}Yv?u>!i9KnXJ#<}^tmNV!UQ)(lY2T7YSMk>6m)z^hI z50VZ(dxC2=tyl@Cp5q>8+68p^*Iw`Dlf*i26d>QX7xJ1 z;W7G1LbG)3R(Cb01g?p=n{I^pzcR4N6p5cYu)nWLMOBctL7Tq z&76555hkIsdp?*=-hjq^2SD!ALS!0k;pFVEK*Z^oGXbq?xxA9Do}wGZ_Qq6}hQ!Fz zM%%J*X=YxX&U+dHx*cEc*_pq9&rb4|SiTO@n}2=xSbsj8{9V_|Ier>+4W_QWw+FZl;x}h-`=bxAA=+LCr3D=fEfEbBF^X&!c~lVVe7k3-v*oCT~_(q#r$*5#RjrKh?(TBerwRtD`;OlK$u}|qUh%$fOqPh z9xbZD`gvDETcBF2F`4HjqQgmGZnTZW(RRadK}A0Lxun9CWU~^JM+$eAgr8Yxg|p;a zMSbnWH~^!TRocT!Pkl449?|U!iTnxTJ*IeAuUWu0Mesta@MRNBDfGQrf84jf&yg8@ z_LcNrN4A(PfxSYJd_d2Ib5bS)*XqwRCs*-y! zUyQtzj>nR>ziaEgob2Z|swnI)WS>J79bh9SOr4@$cf-iYWb^)T!+|~@3L%UVMvW1M z!K6UKE}S3N2b;ELgW7cpXa z6B*3V?635bjjiF|CnW1Y%ng$xNEj7^Yr?<2<9-+-%;HI$J)10GpvXKh+07P?;fqm{ z_T#K+xT5Xj`d-SS2(=Eb;B8Nm#AT=J2St4oO9$~x#;PL)c)rlEU$J@cHFyP$6L|APf+9LaUUHO?&7M*OFb3CI0hIg4M z^?wh4pwSMJdrooJ8y;#`=Tt6()D4!sK6IDTYRgxj8-CLz=nhkXU^dPF+<*MDKV8KQ zl8>^|pm{0PIK+FgR_hw6Vwi;u(=4<7-3DVcDJBZe{yM=%8qUtJ%byNdqa7zXZy*Us zOz7??@$&5NYIzR8@)$&CizsiN)v!02YaelexFzoMB3?DN+0dU`=e-%x__f`g$fa}y zGgO0@msRUm2$7}q2im(%?c{a+91Y8_xDGVMbk*o<-_Is8`cVl}2C-wVPsWV!Cgq@c zoDkXXd0Ty(%DQ9A4KE*u?}-fl5>*_`4TUMPWFR5SS+$P!mv%iuX=Of{%cCLZ!P+rQ z6})_nUDnq%>-xbDUD?kxUy2x#_LaYgS1IDmwtt8}AE#>#PzSI49o14p#*;sn;4_k@ zR7uI=7-in{-ll4yswUh!y)dti_rkk_N5>>h@u`(>mh8?iw zz=ULDI>z_FgG5cA-&*ItyOaL!s(K_ zTeF0UNK$FKjste&bG@+)AOh)THP;f#(R@r9iO#WC=G9bCZd0~Eu2(I z+^uzomnW@wS4L4f%o3NGQ8jZ38(CYMT98BJ2|eNCvxNgDoDrPonWfYv> zMS;%&=qlFhS-rO#YZpiSD;db+vNkK256Gqr7t&9XKJ@-B{jY@ zxNvYMs^blI2hfBOlFxw-=<50M1C!*_c$^7A#6@U@2g|dZj|&=QO*%Z%xkvCNRJZ1u zHA>z;b)TOKwQ^Pc2BRNw2W46j#wWNhEZV*(gi?EAXn06?&#HazhdMHr3^(NsNE2o! zPoq2l#;|MdQllmMS=deAbxP#qr5dLb3-Ty8`h!G<7AWM%Fv}EYGzIG)qzQSP=#Id% zoM2GDNQcpok!=1eYjQoSKY=J4; zb1s84pJ&gN4H_rNLEsdkasY4nR01NK?DWWV%bM?2-<+!hvTw&+=(iLeF}`KJ?({zH z_RXq^76D$9FUes#bAE)@n)YEm?59t2)1h1+8JH=kFwf|KJVLhDxbnK294SfXnZGg^ zL|;(C=qEyF^ryf;^<+3E{IeaBh-iGDHB;q;QU@TOagxbLpCXuBHS#(;G0A+oSrZT6 z7n_9q3S8NQh7!*`(a~YFRPWK2x}Zh2oM>(4Fk%V~@#cn`_7X&rY4;>ly#0e-jbsVP zEYE*%z>;ls6J+yTSff&4_gmI}D4M4u6+J-Q(EQi=L;nrDj4adG6O>EN`wKcIy*7G} zgkwKZ-Py2vUV65@{w>eFs>O^!1!S_H(B?UZ9e&ng4Ei$YHh`d!Pn%}YRz?4&!#{heLRM%kN3%ADzE1z2%evdw^a#Tim&TC0o?W_io~`7?aid|vN-ggQ((9{X0L?k@Gnq+@+97Ne2aPL zF|ko}wc5he^V@dd7kqIJR*x1O>plT80^1fi*AKscGN{Os?|b<<9C&ow?)1KE*#?NCnmN2 z=M4NWXrrGAZ?*J>OPN>O+G??O`Zwrt4V`BkGQpm<4hDeoQ>iCMa%F(xC%y0qD0wYR zPuCnDp&yNYykgRN2vvRa@4ab+mjgy&JN~3S|MCasT+qg;8o6tqjXNO|8_=sgEYl7X zCu)L_9pXpt8Lyn=@(0^o>MF!nl#b^JC7AJ_qg8r_j+(UPOmSDA^J$&b^vCs$L7nvVJ zay==NWTZypHKOFudgJH74xooN7IJ8ceID1gLED88f!L&O%$T}Vjy=Q+_#3N!gqfzK z8o9VI_0SrT&8!=-JRf>^#`-l8YIkc9OjHjB9UqY^?B@pcrQfA1FieS7fChw1;V_rD zY~)ot!s-pkmad+2S#1zrWR>yZA7_>I6@I*!E^(ro6Nktr z@ty?!39aLlClRCR`SRks8$wH!XA2JpR3~oy=&4R&(JBUpox~;JW{Ah!`Ojy zD0u`b+P%dHcB3tOt-mSFn7D@Ql*kU3M9FMCnV5BaNKmmFYZsd>fSM$G{*VGYTG^H( z=Py2XIEmBPzCs|@r~ z7GDKIDdShn`yNT(71gC?D{aatnt*1f$7*AE2+5Y$ihh5bTLosVg6;n7R?saVXa#)< z@jL-rd;~ms8RgLf(%UoI!w2dwZiW`9#&SNH0(bDqit?JSOLmg-hnw{;rrC>3Y>ndn zI2Ut2A`t$^e=+?C-e;*EhlSq2#qNEDHJT%Ha~&XZ^J6MkwO(| zpOLIF8_}OPO@6%xf}(|`7fH%5S10}FIhDvz+rE#n^BJUVjS+SELy)=WYGpI4@oyl& zZVoj+edgyWHU~{ALq8JfD9h~v;wK|6=xb;Amb7sOt1h(zIgswfIE9VA*cijkEKC@G z935_r-^~z~OE7z_Bb9Cc*d8MOR??VL2Nfefy=wk~SjkS~c+r)EB)H-~KGOet@5mLv zTfL4=rnyfU@eK%#2{GJeKLKL~aKu%cS-?0&T|r-VGk*oxNP(c04q6ei%;R}M zfvCF|1rLFG5x5mFU+^vU+KqJY0bf!-;QG0!Ps4RYk52(tcxaX4@O~fx%i)2?hy7*M zdZ5uBfsx2>cnzr{fNA#>4JoANzLP~hl{Z@ZI){OM>fUq!6XS#3jjJrrpx4PABa{Y& zs$CY71dPaIiU}|G)=(ntgN~X9NIrM}t$txlmsrFR*paHXf{X0wz>5PAhYS2OIlL<1 zn7J|-WaMIQ!ittyJOZ9-ZvO*Y;NaP!D9zUc3DGU^Nwsm$ zd}-;h4%YD-KoRD-Vj8(ZbJcO#rzD)vJaiKbD{2$18y1<};{mD)#yRN$w&e(+b0_(a z*&iH;8CnRXJCYS8Z`xKsLPUDYz5WAyu@JWcA7W;r6lE{O&9$t|dKpOEU2+E3`w1ih zheE76yA43^KMxyCPQ=7{&e=feQinTkIL9-FxgM!;fnJUrjW~{0`}mG(170Eu$hegt zrSud;^09W5)|o`M=4^wTKjp>%m6mXDN2y<)&9jMeE+te!A@}*z!|5uC?+Cco8gK-2g)Xnzo@Vzj%>F)z4+L zX1QhDdZ|6Ch^T>|uUDv|M$s&?OpX-Oek#KDl$&vWAmY&52{S3X(TFJgXx;DjZkL}6 zD0(*u1PZLF)9881Qz-Q=d{ATa4^<(Q2r#?v&Sab1`V7zZ(wuEp2TcSjqB91qmclCX zzZc_w=ITSjxU)9hpRi)ZLU*P^6>Sn4mM*uH`+z$>>IIV#qYrhdZ7CzbOW#$tDUDdJ zi>4>kM;p3=yCtteIDxU+NJ5A%ccnCCiQ>sXcO)T{Y)lfSUmRHS?`LCzEfCUKtwPg= z{_37u3tVKG|(dDK2T_@M(2JsM5I5$eNk;i`hTXxB2oSN;(ww@*!nHiSUi;hd+RRgC0+z=MVGW^4^JA!f?~I8 zt*x=AFJ$9^jRjLQ;kz>utfcUCg{Rc|5OPzcG~!tU8*Mm#*#0b`gNSCih~ws27joWh zrQlivDwzU3f!1 zszm{hfR0U;lRh|R*TMtNJ*w$Zy+7&-PoI34!n$#hrk6{ScQ~BDrJ`0fCN)dYy8EIt zmE*9yr(SQNf$U~Y+t+E8k6v(S>er7tviIvTcwJUmxsq@DS!$}hRC&WN0Db+v<=x+a z96DOiH&PSQ5O(4CLzY+ZB;rJ?cq)WAm6m0Y$jgRg^p=nXLCZ=_a3byvkfhvj|MeaL ziAs4Ew8b*}X^PYyNqmALp}+NBeSe`axd)k**GCFRvX^+8&Dh0f+Vby;b!-Lg!tR+z z#2GX0+=RG_a*z7RFVYuCn9(sr&$%mox=$oTt%PekMH0_POHK?S_3|BGqWRORkvzOY z1ucTO<5;x0)HkZ(2l&WDyFku&bAsRM8H(O4`Ksleo18($RvwX``G`GQ?TukkBt2(*Z@{>2EdIsf7`)87kumIcDQ-LK;*#0IpB%4bRiB$Dr=NAy4 zG##Z+3ei(q|B29;X(+BuX{|!q1?qO}+E|Me=GvM{cOTew8*C0ZeNZH!&893FL9v=& zs$Bt8jc5jStWjHM!+3SZNn>9(z&z;S-J@dK2=wL~YLO^kVj*1?Mc1{VJUw1^Et==F z?s1Ie*USdokxK3goKS{&$!>tbCf=gNkD<^$Fy?5*COJmU#ELVH)rk`;zj1Iqb8g?) zj)XMeWH{1;^Syl)zoJR3m5_?GLX-^3_O%w6(*l6S$6blzBplU|6FQy(!b z5!A5t9Lb?A8Lji{-rqLK3*Xf@^~}dnGIdC|=a=}DHu5oCi0Eln--CSZzWzYKU?c1k+n`1U)x??Q5Q=)*@$$zxk|Xd&a=BgQD~U$_EkrHe&w_O{Shh(Hl;j zliFpkd?G1Vfa=YY5}I!F05ybWqWFlNjPi0#lCbYhF6Gll6aW03y%ku}Al+kdlh_)_ zQH|*%p}IVoKZfqTvF$niK_{};DF+VV2;)aG-{k)YsDr|_4bQ<-N!QfO=2Qk1?{_Xe zgNBTnw`XOS+I2BSd;ZcO1mUN@$>`tswpZ?2$vt9$0k50iww{iQn|Z>TwLx5xfVl zRD)Xa+XJ{cqjQwL^u8(OUxE^KPYMW9RjpcA@zX&nYDGV8dE(cJ?u;p1PdU8RIx#l? z3D912A%WEm)*U0&maj|W-Ml!pn9n_XsG-M`7F|(o*;2;CR5Qu;XphOZMj)rRCykz~ zuY=%kIQUd+GQlP@2}!)6=y%za%2ar-zZacV2^RiI&8w|mQL5;1k!P3qs0P^Zy$3Yc z^yigBXfi(w(di3+o@Vjrj!Hf&Jsrm&W&@S#v+Yji9-a8ki29~pukHvEcUprcny${A zPS1TP;ORE%%{CSfA@ibrQs!h%k00~uqo>ZGKzdk7xP08~c62`VxTt^mxOXZ54`a&I zfLT~u(;jAPvH6W)P63O`JaS@KipoAE_rV9-z{RiS&uh#Yz;kPi882(rKo=&?q$Du0 zoMQ|8deO9#07L1k^lJzJX!hylb^;6tJ)A#}nrV_>lkG;kwCZr{j`=^)OzUg=rR8kU zl=3&r$p@Cxjc$#*6aAkoLsKY4DXW#Le%354%*%jYqHfM0a&PnCn&h%wzs|bL6wS4Y z3jG1UH1HmZt8{wo^X7aSIhHLD>p6^^%S!d$2pR>5e8=XmD~0wPx_X%gueoH-W<}Tf z<&l-o*S**-j`t|`FFVgRh_EmS0k_V+P5m#fhk+UU2-X{HLu@Id+^n41awI=9dSR)i zgwH-1)z>?QB3lFk9*fY4uPT(3`k({2hl-%2+GFY?|5nEN`0nu$gVzLa#9De}J5Q#| zCn{3*)hPt&aw}$ZHSjvaaNRa#%GJH-k523YE-5f&f)(UT`=COkEQsyrE=uhB^2RV6 zpXXf}>)l`5CkaT@g~&+18LF$FdkamA>4P5L76wDj6k75g4Jw72HK*$@F8i-KvTt76 zEcV`;bo8bH)q9u*wWJPC9*Sgz2TgQs7_3PRD^x&cy1Po$+s3`v|j^6K82G)+9! z#atzPayov(wpe#wE=6{`P@brSbfAvWq5%VAfr5MQH1^hQP*M{v-oHJd0T3;TXO(UA zNih@szCKp&)2sA1t$T)w6&>gi-Lcx+cFaQfD+&F-;oAgrJTyfZOLD3Yy#pa=YCqP_Z-4f1#0oH_Up;_*u>L4)L3HK z&%fe^omDD6gN!vuixp!AuS@CwHYtV~;{IHe5gT+@0xWtISCsXMO zVrX|E6Z-C{_7Mwv;Fe;gcA-1%vi77aCg@X+5Gz)}6nz8Y8PmBmb6*o);kOz3ANI(^ zu=|Iyq-^n65%+Vh0;?2``-}-WsAD{7h74{OIW=A1}WoGvumsh*14Ch)T%& zcI8dM`PcsffNI5$o8{O-jZh!juJyYn4jD#%ppD^weGj?pWa1~ zGOLbIks%F?`ljw>tt^!*l${JQ@=o62B#czMfv8QjGnIOscBGyKyx0?!?cw;Yz0?LkpIX4T6m#&p zG?S@PsY*eNDSMIVa2ig^UAvdWX8cXdy z7$==L{SKU9b<<~Dpr9iN`_d_E-%C?<|BOIVo5z|O-24-8@3RE1A5)}4e_Q$z;>0G1 z;>C+uaor~E&QRs*Q6~jSmhaD&Tw=$ybB>`f;#jn6X^_4#Bb~}a8#d$$a;pALu@7C= zuBp^3K=b9F_GzR@Mctl-%dhY?cCV?Xav{HN%v#H2T|^@u>m1j+y`Qb&UHzki}7C=tG- zdfJYqcbX5$W_y(M9YfVQxbDU+gCcka^lDCbp(TKrWyWF3TIp$rNOD!mRx>1RWgy?0 zQPSx$nyZ76{wsCx0!{GNn@OLUR@J(|SJ8A{R`J1(`< zRShsQbo|itTdw_ih*5OgjgG!d>Vduv=0P!I=%G!qFsq9Ph9SeCj5o9@uW?C4;N`L$ zrRTfTPxZ`o!nOXbE@mYe(yqPW|4UY&EY3=-9!~t>-~Ui7d9sGgc_09Qqsdz|& zji>$nfG$|}S#I!$+{-hXF3eN5GreKNE`^j_s&@3mQTVvRrPvbTKdD^YL&~_v$%y~} literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/azure-devops-services-oauth-policies.png b/content/terraform-enterprise/v000011-1/img/docs/azure-devops-services-oauth-policies.png new file mode 100644 index 0000000000000000000000000000000000000000..1b3221636a8fd721143bb092c7c969123133ec8d GIT binary patch literal 130401 zcmeFZXFOYR+&3JfL@6<9)Ci(RDODXIwvgIXYqVyxXpKtMh`q(8C~CD79cq-?dskDb zQmgh#5i|CDj_bbf&pn>!>izb4alP=#(VU!~_x*iGA`SFV7tUWg4+4QMXx>5I z1%bf8CZzM18gk@N)_H z0fDIAP=Kg_SBkTLdqep@-UWl+Q2mc>N{O=_d3C-pfk4V2O{B^_FA7o?ZDvZx?+BCx zu7UqOF4wv(Fc*E9IW`v^-RUrZ6PA98jxOuWCcJ7NMzi=xB$%S%=9TNBlY`=O+#uje6x}$d&-=}@K>Q6^27UiAB3(nrYqfE(?@Za|QKR1=zgnquW@%V13`JeCe zzkTu&2L&(a(va7mhyOb4|NMx<8|oJzhc{G?RsWYW`R^ZjgJJ$j@dguH)sXT(5AvU! z{MimcG+N5Efi!ZZ9@_uuMgDIG`mYQ4&(^|!-GTpFLjT`S+J8O7|7YF&-%84VRiXb& zNdbDxe=VW^A1opECvT3wJaoe~tI}V+_qm{?@!;d=Zun;YFd=-jEBv~#`w9vZ^Pvq> zEUx+e{|X2OOepCysg!YE^cST8fJKtCt@l_@&1 zV&Ja!P0>dDTdBr9!C0u0;_fH2a=Rys`Kc}jenmGX(Z_5>rwlF zGhV$ifBuc;cB*)6`OqcWATPcChuMAdT?@v*e{uJKR8DxlEicYt<-1YyJ9%5{p8&>y zmXaRN3<7&aU#&D{KW0XB#&V}l1e_jk^&-~ZCBje(YhYH~;N0x^Jx|JYHMXX?m)duS ziY@wuGn`)fAO4vvuxSg=S7$eyI?}ij{3afszFb@<>Av{uvUBZX!6FV8cc-N3#QP@k zWmFi)&*-h1C;bH@Z$mbYr$U&1)vYyVSQQnP*>)93H62|iJ`tV8ms5$nqL-?_c05I^ zbSDep**hzbZpT%ux6(_!fqfW>4FfH^{d}YHWPPe-e|z)0R3RO!@ICi{t-pPXTmAY3 zLWy3MTz-IdA7FObbn?q~1f6%RzCQ*mh|FQ?xh?>~5wpK`a(V}(WV&YwzWa@@9e_L!?$?a}6U8K2Nu;6f4Q)tf!y<*pBMJR@NTn^A0tKeLFnv9-yjfP*&Z zNdm9N-`O@MrOcB4-SFhU;>&-5YxpKO^Yg75tE%9PK(5lVW6k_4?H?Jp^;iB>>GR6H zxU>AZ%JPBx@B94&AB>2a$k0vc5T!(sr&=-@P*nJzXH5zgz?(JDimbLR>*+?I)z-%V7F>Eo39QMv~;i4g0?-9@ss+|jxffq%i|puu`|UBbzT<+N(_ z>8F>VCT+3Y_FbYk8=auXPsuo!qH}R*vC%H_m0XYZpBJEt@`zRZ;`-6FgbJcaoYX83 zzauWI8>-N#{mwlxziwP2A&ijpU0y8SAy zTYVkYI~v+Py5v~2`=HV({k7!8jc9qC749=mUc9&(eUsv&;zo-i^5dtHMmfKujV`ly z=)x-~&P?y64k@=x#2&x4;In$&6dkluAN2iEGu#)D>i*;qR^YFH$6r**zJoyO;zHec6V>FkV7NWW zf33%~Q|hJ9RG?P;_K;PMWbNPF`q_H(H!3)>^PXU6SrXTD!cYX%KTQul9eTqKpH?yH ze>m^hah(heIQ|L>+IkbhsHGOcpi8*mB}rdOO4hJezc%adr-P@6i}0F>6xpm-NmIq! z`6tIKV5>&#GAe-OZok1b?KAQ?^@qK=+cOv3IQcc#vDbPFZGX<`5s_y#$D%!P%FrBD z7Cw_T-o`4Thqr0GJ?ffQamZI^A3o2M*EoXhVifd~-}%0!y!EsmjxGcYNpH^KDw9a>EOdvbhb%?&VbTmmTJz$}G81K?Xw*Si5mL zoO{8d9+#}IaD4C54OatpiErA9nV`;iXbucqRNgE1NgPd0XDwcEvpbYOS90pUNNg6W+_8x0D&$2hV8-AN*Ih%K%xiV9_z4tYX?L&Ng0(90wA|$O2c;xc~PRKb} z;;l*9*5I;&9AP?Yia{E^>u?%reN!s%(X&*Kh5+DpV-=(cX{q>|o3jNTN%D>J*e&O#u&!5Xo-JL zZtJ8iw7x50b!1*q(*2T9|8z!^cUT2G0aNE{?BYDP%qg|R;FCAz+0Z}fvsxq4K<-7{ zcf(aW%$hVE+?Sid!C2n5Mn^6WnY-!M&P0iC*0wNaih!$>T&J2zpu709<7Ro>Nsd3c z|0U%+ZzWE6I_5*B*Ol_^R?l>S3SMQoR4g67{Ym$mzz`fo&A&EZ%KT`U`6tps|3?ENq@gH+Og&{h8_65dWyZg2xBm!fo3 zoMPB0@xVe)(Nj9!Y9HB3@en9yeJRs&)+>qRbhUMLQP|e*e{@dYa8Y)I9P`aPbI$g#PY~q_d8fDl!YQ*rJ8x9SInFj7v6-C z471Ds!VF(Q4nkiuA*v(Rk(12nU>kidk7wnFud`m&zq0b*AM@;)i7{ZK5hF-G%jC^f zGS6cWl&Ujj4*nK0j)^B{Fl#L8CyKcnaP0hyf1fm7CSFvk>T-CzJ4x8?Z1_8iukVM3 z?rJei(H%rL?uta(FT@r<{GQBjT9or za}3iZ&xpx-Uc_B3^UU@~J5LB5IZKwtXekn_eQE>Ncj7^KIN3oef6`=5O0F~(OcpUM zTzEUQujezs97!;TDMhZGwNpOso@={pE)&ySsOW2iG8oG)7i(*+ty>ZA=1-HJ>l|E; z3&Pl^T4VNCH;Mx3b8Kh=vTxUO(spwD_lYJ`z@%jrf7*So(Z} zDcXG>t3g@BZ8=XzEIR|eerrCH+VD*21!-e>Vq|uUp-c*kZO3TbhP^qb$RMrTd*2xG z--i7+mmV=*J4q}}sWC7@H+DUEta$y@lwMjSeKLh*<)>wZ`f0i&e&h9BybSW>DyyJKmRQrU5PE_Sv^c8>zJ`P$2)O>-KE?Wxq$c-9rKD3sYKB+Mi1@ z`w6B9aSUBoT6~xE#k6%-OAHw!(+h`P@NqWv#{7&n1Hq)+cUQ*|5#A`}ytt<0m1iS; zAnEWgq^IpzYXJ2x0zh1cpm^xS&JB@}l{z|jX-lbkd7hSmGvQ!sF^SKAZ~BJs-nvA) zKz4;$x$bD`Z1|#x(!S=zeMP6?(yf5g-GCAEc9!-wh21e3j4&1#Zk{3MuBBL&oi#{M z*fl?xB%f* z@&Q1A7zf6{eVq-FY%f8?Wdp{<1Prmrd4V5m8)FwPn=6CHZp9L~ok~?wsMPc2N*4pE z7`ydk=0rN`<7-txk5-x+15Qt5wLos+jRMI@w8XGm&ZBb)OG-!6Oyr}-7HuqixPq#2 zkB7xj6vI+9l27&1B$k*}L%{84IDOH~=8lnJlxc>xS$ z3m)&GWm)C@Tq0f*o|AryuO7O5yM@UiwmnX@c%^=l@vKo+VQ(sA->l^UKQlUOomi9w zJ^qW@uL*7FXs@5&J|Yu{n|Q}e1BfNF&X7a7Ms}M#Q{{fkt$inV>II1Ohc$cJ6N#0t zM9cdg7$%jkR$@JLZVC1s+|TL_e@l7sACZ0k{>s;00$}NamCM6EJte}Wpkj-<1tKC5 zw^S)9&j~WN3ac)Bu9|p#axm0nN5PuN$jrMTfizhX=>fG0 zQPO(cRYJHkBg30yGUe*jF%HUG%`^wqXQ=P`R?sqOMuCi%(X!W6%Jhsd zBBG-uU%i&xSt-_9>a+|^IGfm3s!shEt0#F=!`dNecq-QhXGU3)#T&5HP$~}x#IP)> zwnkr7sPJ^S>sVW|M(A_H&S(vESnJd^7%a`Jk(sX-Olx?tRIKyLWLjiEX=>J+VYOh2 zx*38jF_ZKzuvs&!R8=S%Sz}^}y&NyV;QGb7N{%$b97R@6zA%xT&x@2iPz}Do2;NF; z6yWSMNV*?c^Bz=k#Rn6rc^;-H+ zxM}Jdi=((^Zw@iFxt|$dp??B_pPmhQ*bs;g`sAm`f*7N41(Ou%hg)rhna><9aq;u? zvwTIS9Zld;P^}-rzIKywNDFw9HI%OMY^-01l~Gymyk(hastvy}#jsTpa4a5C-i1Yq z1oGeTS;MRFloi)5ef(I4&Ym4J)bSj5H#xc5q6y2kkFkll==OSJF5Sa#k!u`aA>=FJ zvOl!YvDY|es}iwo80z^aQ}k5*vc&A913xz;qX*m2m3<7jIWYzsZ$#N^IeB`r`{`rr zglP$0dx4EGw%NW$iWJFA%MO^{_l-Uw=bj1;a$v2gQ2vuo#It>5jTWJUi|QN}$;6Gr zwfHM#59LeRyc!eY?YVAk@YpxbntQg=i6Afjdmg{U8{|C?3Uuf!eo7q+(S+21S@C)g z6$v`Id`LDAZCG;HUuCR^ZD;Qt0Fevt#oR#+yR}DdW~B{i3SMvS;IPW%rS2i~BlDLxe04}MLIdQgn$RQKd0^(vcDCud9a&q-k%*HMQ!}GxLC$?Dsg?UY;k{h} zjNT@6Lt}*{TalZ?femG|X*;U*^D^5nbLw#)kx1**7ecGFP(`EgTY@%5^)nChJ$u+$ zS1xi{_d`$jx(3SaOMYz&V~2d^m}vSut|`wwD#D>%|Gtf|`x9)4^%+p#M`!rPFJGIo zG>`TjE0m-zmLbT?2>fly^Nsn-wC`oeAr-m-;BzS}@zwLf`q%QM>eI+@4*oHLQX{Ao zY5L;6E1QZ0>^v12(RtnTU3dVvK_9zRAUSwZPZF-ngK1~RX2UFB4XGb~eppp(ERIEA z_(e;t-|n1i{FCNb*zlE{rnK-F>dm7F#Y)IA1@{zleMo@h-VdcQCdRqwqm7!hR6@s* zp=7bG+i?8nxmcv%SeG6PB`jBwkPErI7%+UtY-#FJE6gp#f!jQ~tc{CS5l-Kp8M#vs zu7v z8_ndh9>0H1E{$myM%vsqRo+m+)irXzZF}ZYR2jOyI?#k%sn70oWcpA^CM+D9&*!$sW97%j9mzBo)U{ z1586-$bSgH82Y})^Is~pa-QJ&=hujwx>(U>=oa&L2pyV3LXbjL=xwCE2d#K3g-sCM zW1YR}T!Zj8CSrYxl+5+*{9K9hE)+UIv`f#<*QysV50G6Ovj~{=IWv74ej4hQIW2FrE<6QNlZm0(8yirrIt-*_T z9;9?j#Y89=H;>wieI~YkbJ{BzQGgHm=`IdvUy~4xYakGD=_DxN2m88M0MX*YW zFUh<>X`XN%4mrrW*&FwC5NsRPri{r79k1w!26I%XH92t9rO5#2XThg7cmwe8w_gEjFjbre&xd9?nSbLL?*CSNFQNsgf||pugRHO1%&0L~f<2tIf~9g`0(|_v z1IemCRc=g~KMMs@qe9QOLwYHoHyjLZ+E7ggyL}rG=w*C3s#a}Xc#Cq;^RkDZAiLl- z!58bQ)zx#qw0~XKmP!iaBx&5aT!aB<<9N5iTsP-Rl5>^7??rNa?`pmo6Rrx`Yv2D3 z{`0Q8%bmI%-A&Zmetw}Z++yr&WaL;#3-n|?;))IHTULsQpT}DlrCEzf$?68gOITOc z>M1FXcgCM8KcWMN)%Ltv@5w-|A#ca&a^gheKuACPEO+AtExu5PB^VkMDJ^KVg|I4G zXR0g+=@pJ6A6cIS?G z$*=1vLX#3MWiWQ`DcxL`1%5$A%7+;L)S-A?yp2<=En~NuMa<1!G16c@6dVLVU<`Yy zY&>^a+<{p@h1o>!REydd7-dYW{~ix^E-^Bz3X^qH7dkwxry$M8L#yn=Guu2Ytq}ta zhB^izd5gp|&rLyX{Q<6vxQ4twwHMT_pM6G}tNQe&Bl^ntS+Po8F3%>0t2 z-yz{T^+NX`Bh!)PAhaUMp~UK&S=iTmZ00q+$7jPM%C%WBRGZqECn(LN<%@&V5M-B2 ze3ZfF;wylp^;(s=bxkAGAB9}Vs^Qqi+@t6+Tz9hN(Qy|6nPhjB34e$rz&}dUz-2IF zNW8X}Oe$9rtG>K+fH0KcCm1l5seA|D z($we~A4rl2t0u@VoYGe7&v3PrQ`*z`_m{@!UB%U7@X}q6x;U2J`uppf2FQU1Zrrs@ z{XgXO|AqAn3fFlv0SAH7v!X~vNU!L2=+?;o!_;=hhe%FpigwCSP9#mEi5B<;32sL# zT!&@W?2cAQRvUPmeP^I+^|6P%OKA&@tkUk_1IN!2Mf{fh3!#C`^E13HkHan+cQZ2L zgeoG|wT9R4o0xt5=r{TZb@T0NO@skoWI~^M#*EzB7OlWJ%%i59)tmzVjcrNS)(lwk zFTR;)xa2Kb=JM_)Q>%UZVdJOVcHjr0;lyfcB$Q>P4949@PZ2>))o!0D|DK8a_3dZb zdWe;ZidDH~W83D{rMx(~E4w1p!lMDZ&RleUISH`435+mbl)5h-RIv-7z=)$}HKKVU19b z$JMr18!%}*zeB~>e;ApQ6m{$T?}9AJb# zUfqyr=@VfwPb+CUJzncSBO}w>6$JYLQTpIhYV;q`w$aGEqlPe{^6r-HbQgEK;zf{8M_C(UK82~l6Bo`XED)uy|cb25pwNYv3usl;F}(>E!c@I>%5l@0?{7*#F*27k>;IN7(ik)8 zpK`OVUR+BJkgDt;q9-$J~9<1)je$10B^W7SJVC}t#rC>L0dY&_J{$Y zIxlm&uM^DGdcE(G>&HNBA6>LBZvT%{|JSX0&V+c!$ge79?Jn7v6dq$&kjjhGGd>}w ztw>>kmP}02SJM10Sx$1gKy|CUw=}U9+vSn{Lw%!ZxLY8C=OwSXmy2QeOd<~a(Cx&Vsqvy4>SorJ9_p2F=uPxba@@^FIm?<}ORN^dK zeB(XD(-bEqTi|hgbQx`&jk6Uk_09e)e#)ZxW5d$6Y@!l?eOFf4o> z^<%(Y@IG5t&VCO@6fQB4j57$zGcNj()-+exbTi-8QmnG;^^S9nzh*^~TFJZxRf)C4%yVVpzx1ps45%1R=HJFX5ek$68MmCT$bo*ESawL~2AlDUa9%f| zt7!nHHv7a26xlU2yQx;NU60UwP?~brt~&PI3H>mxjN5txJ0Yh5=@vvmL2c>A$E(Vz?t4 z_p}X8qc1jII#`UV9L2hZa|ZrZ*vfxOF-<6#et)pub|1F}~NE6=7w0oCrp;_z7N4`aaqWN35y$r(%0;(xPhW)#*4~+2o4Q_(! z3cwA+Dx$LGYBa3Cw()m5C3V}^H<5}+UCt?Ri_6Aq&V(vagVdp$B26+2%ruB4^#N5^ z)jOZWrrU$xM^I5zUf*Hv5QJa+{yf%OyiC9<|9Z!!%whVzb`GS^^~E%pV)R`+yo$db zgKXBlJ)Z2j*X3)^CosTz!b7C!ER^pf(B1~b27A;)# zoNZZbc^^-8XIjTNYOR}M!Y(@cW;aJ>_1b4*G~!BIFcirG9Wv4Tosy*L-M@M91(pro z`M@7qir06&MfRC9;ZtTyz@|5S!8{y2HhpIx&Nfa~7~{k+WCoij&@cEp*PVWVcJc7s zj*8si10=kSyIG1xs136YbEK)1+?U@UX3mE>eDd|5ejf}o(WP^dj{nx?x!E5ujEP}1 zKiw_~xUZmXhN^d<@4Awib_X6m4j`xz&2SjXt2h0hj)z#l@PGkL#qaCBmbk|fnfgH( z%x_tLJov{9kE#}p;<|Z(GnmrmuWVC8H5sB3WO4X4|2aiS{Q#=^6cSLaq1Y-ul-wQt z87GL7?D%3B?oC&s$N7vjkGLi1!k=l4nAEI?Mez?9e-vMm2q+oI*_3yiLF{achk0wb zB1>C#AQ|xJdN*S4#d9t_nBJrNCKf54`Te(xTLR^#nmt*3t>r#3ER8CSUhRc0z4i0> zj5g7AV*btbX$GzieR{>Hf4g?n@}X?!<;)AE%=YJUA^i7PJbVCKiDm%6X#WCiA7;N% z)P^48f+r>{sAxzlhgsTBn^%o0$9;1pYnD;{JoFfL=8N|7_uTKDAYAuiJ#Y z{62#b%bI*u6y4xgx~aLxmQ!g)Is^A(ZW+`AU6HvZ+A+o(!)9}wqV&fue?kj8%VkoJ zIxPRi1ZT^Ekw{&OVYVh`biAeC_V1&kFfPA9&uhe*7%B$G3n-wK%Y7QWL#vKBmiS-B ztpC@h!yW3SSSn@Z`6C;ocdwzw8|6~3)8k#E$wogi*QU%YNZI09{l3QiJC7S-?fiEI zg$6DQJmP;DjzjT=$^#3}eDR>lkUrN1$$-OfY)?sXhDGPDni{ud7WQyn!nT0%}ivjT4ykVlKPIj}x2rI;1vb zf{3keR6;iO9D2=(-E5nEl2QvZ9jWG-SqSio<&&%7yp4rtRzqKN&HV$7G&|n%@R_O) z-SmUV@p`P)Tjy!B(o;qOoLg@VfG?$Z& z456D%P-D~t`qZ<9`$Z*pvBiCow>YvKa6IHZ=&@)#{W8w>9PVDQj56M{J-}(M!;Oh} zdGOnG1k}>V=wA~z1>FtP|B$wAqLfCfEI+$Xe2wZ3h6MlAGu^cC9KT5~0gk(QnK}?N z+nH~v;4@E7Q@bau)JjQ|CVT{iiw5zR*)3+;^=dH%ajTR(n?#ZK3G=rELiu^h9bfz3 z(<-Uo)M9VWQ{3eDW<3uT0h1W|LggSMW%-JiyIXeI7k5n@~o$azghIut2tUn@$xF6l`1x0f0Qyab;o2zTJuXkDwd!Y9?ej(n1n~ zhN`m3@9{)7GB=}ek@=I8w8 z=S`j?12?5{2fnATL7B2<9CyUZ$O@cjBLgKAni3H7Ux#UI*m#kcKv%e);VW{DGGIrJQ@WjJ7M$`16DNJ(ljD$0!21aU1d+t~(#Z?t8~w zXWa0Od_LU!j7o~7spbg4!{4v&d$Gh_3sR6efldKR48GDR_21KK8u*@Z0g*N6Nq^yE ziZZn>#>IV(?2?071=S&KsfOgX?|_d_iBQ)h9=Ufk4NW8io&s%PjTes^>Uly~!OoT$ z5JRIXX3^n`4f_ijg)Jep_Ou}6IS)11;B1BR-z~@`udXLS2IDyIn_)>B@09u92H+&- zU`01(l!jn^Qb@t2D{}Ph$NT$?YiB0xaZDHQ{klyq?$8B*rxN?~FbVhFoznnC+6z55 zi=++|q)HRiQ6Q6Kep7$e@++L+jIIXwK8p6z*QCh$dYJ_rHfH6_|Q0NmT?ZMS2Y%3t;#-@nYJ`jdGNJpk8?uMidXN|~~Q z+8!$Toqi(wvq~>T$-pvI{*IPFZ)}-jDw6n2^ARcF5s+76s$bBs7jgb*Koeo!~XhjsKJR#A7|_E)-75kv(doQpfc zedTb!hFS$|87}~aZVq?RoR}T~V`dhKB1`qOBN(5{bHhD?eeuU$CsWD>V$vnFj69}a zcd)CKjzf|N?sZ=q1tShy)$uXgtBLP(h*zZIq+6aaWZS?PDe#B6tk##g>xKVcUFLs@ zA2~QsH{Rb}QX^<_2QiBUkTWJ9B}!0>BUwY0Rq?E^<*BKP$zA>v%wWiES*g8xa_=YM z3jQmlw%mqAl5_~jABZb>S$k-V`_CUVZJYqtq7ESSP zPzvB0!@b(w)5ZYPqgfi=2CRob@T~4Xb2Q~@9YyFK?yU4%0k+>?F2vuTIwR`mrJM=_ zS_0RSOWFf{z(%-_U!|@2`1cI#!Pp9I(-)!DrEiCY-BU$6Gk^9!bShJ4PuIBYVF6Fv;ZHRt z-3VR}Q#rsJ(%%*@pV@`jOo4SnITB( z{qZ&bR9?H`EPVM)w$G|&7oU$)w$aUz?_=oI=SQ>xKW01JL_%#xgIQ;h8E_gl)?Hn< z91!I;z-Hc?ucq{*-Z)c636B?U%(l~G4*F0~UBH3v@88+QDbOW$WXwe#w4AwGh!96!kwW&X5ALZKP@>)+7+h_c4beTBzn>9;MDTWN2aqGkRJ&2`bGXq3)xSOI>!$dN--8X9MoOA& zVQ2;*Du8IoC>!>gjV+&QJI>{2z4iQp%@Po4@Sk`bzs}9Tc}ffQy*7D9J5K0E@6nOZ zJdv{X{>}{VXBMLT31g_@#mnnM^#acP|MlDe(w+PTK6Z1wV!aFuUFPx^*X~ULZN`qMf@zy@ZmMnwVC};H-^e2sqBkmpTzo52dYZ0 zuDE@I*EH$HUz>;m_ra3`Gu(Tvtt0>;l{_WAPu*_zV#od-$R1kO3&gY<#@JtMGKrCv z@)*zY7=1Fbe>wM7DWcJykUgTp?=Q{?&Auovvv6+|n0Wgy+#X8^(EgBA)A;~tt+d`u zMP9q)7IiaVifCIVQMOy=<=5WY)jw6wlpP< z4*3pv06`0?h8cf}W>HC0B9XJ&q1()0*q9gYf%&YC?dAsUDMU&%gtM8k)n&YP<7+Qn zVn){3nenjPI^?|;0>@erxff_5R7@5;x*m+mQS|%bU|13D3-nkQcEb$ zu)pAIX^kz8=~tql+v6{cD${E?C_TZ(_o7^N|2i$b9zwJEDgJ#EvgrlUL$G9G3~TlO_s~K^1*6jCEpQEGAO9ui?}0Zx8PfCnAn;g_qYmy zyIOsA3zwU+|CO7I40+6kQXX+fQnl76@f;Mr-64!&*x-RA7G>EH!S^|_IL$i$FqQ} zh7G&o$T5CZy$3BN#j+z{Cm70K+rhQjQM;!@9Rff##9A$Ks(@)AXevlqyTKe*#{F`9 zltj9EUSr=bEIV=WsYK&jvf+?IL6(XABuLr?tzotVtpI#x{0eC z;9#)+!DzokM?->$Y*NKh;IiIrdT`GAvU@+Nk|PewC`#X|=+g5WMcs%(@^*Lt@*i#- ztO*BAr7_~L62l&bDndwY?GVCr(NkGDxTg+&|G<*(9yCTt+JPxBx(|_}LAKtbi-q$W{tJutzc{S?8|+M}I_!nXh(UqbP+R4A zK85Gh7gq0U%^emav(btRRE)QgNi8;FgAnI(JujLB2bn>!`9)f{)oxgPk6V;{hqt(2 zAp@fk9+hiV%9ty4)VVR1&sf|cpU<~&n^}VqZhiW3KVGHRX>U0Cjljuz zj?}A@mM4Lw3!#FjBM|{48|&j54GUbthU}8WLM)-Lw;;piwK_c1q173d%U>jr&Ht!W zZU0ROlh)*)DaV%V17@)vR%bppyfn57P>C&4&RyDMcUFEU5F=|3gS9`WRvoyA)*aCH zOD2YW_AR;E$9ODdZy=$@Tc5jziT~0^v+_eL>Pzxlm)=l&j-|cL!+zFnUfQfgCUM3mzgY}p|VUXt_{rXEd5GG;!wJ59o73N0T!#=WHhx1uX=UBdj@6mfW*W$m5-QuMM8KRa z0+s_D$8QO&+e+hS|O{VZvKOEYzvo<83(-0l>}mz zH3pKFc<}?3$!dbPh>}2Sv>x?b^ueCaVQ4$b>79ijQ)%AoDdDH?)Q@{wBnbbBcgBtm4 zS){Z8UKZu)bPY#;W;4QTJH=e@IP|qUQHORLIYk^I3H)>}=*^JRX z5r8KOhysa*t-JRUS@*xOk{j+m1h1bVQ-8@Vao$MPhaHWmi~*I0!=ZT;gmZ%4NVFdh zFeS-spSq(j1Jw^bRHY|GWpGt`a>dk~4=o-tB4fJi%Veh!n zkaMkFVxrqTv(fN;G-n{E%9(2tDo9BJrmrUej_+1=GUSi$Q#VkNN4>jT0jCrmf~0?l zAf((ibVZfgRSD1VqOS?kGScH-%+Z%6^Tv~o@_FwLU)t_xcjxz?(P`Fm^LUcPBu)J` z*`k*e!zb_MIwNnts&0X+bIs*zMt$F2YoEhJMQr4uKaqG#M zouIDdNz(N*M@(b9Gj1a^n8_zse{x$-0XOGLlv(LR?afXF{$veSSmBQoh!Nl`{{*EG z5HxH&@_kw?&5nG^&#;?xoTCFn#o%) zwh06m=IklAo3l2Wxo}7LtE%a4@u7ZOiS52`vRB9JOny9GB}<6)MrZD41pGBAQ#@#c zx5VG`HRf-ZX~J5r7b#a4%DV*}ZBcQjvr3nI2&qgz#l+q+y^Va)OfmH~g0IJr*Nahu zH|Bo1U34n-*!@j;+as@n`bF`}urGhBsYG7qD;<76N;=3bLXaSgzWP znk9C93fXiq3bw2S=LPG0w&fhzw#=!T-Zgb0!Ee_*)5{a1c4sdUka77_vfjij&jkk- zIK?_c-sE~SU#12;IKtgDyBhTnZ{qZp2Z#+I6}GZ$ec|5oKsJ=%D3eW(cO(UEQ_%7x z1fY7Brw}oWlCo~jO~*SQOiC>G(|EJ%ie^nS2HGBUSY|_0NFVN14gFIgxRBDUny+*c z@X2>@)>7~W|KE*>03f~Br)rLJvh5O7JRSLS=N+__CgU$ zG4mfe&(%!NwQ&Ac1f31rVXxvL2{7^!B=!VM`HeGyg!aDtTCQlsj|#O($m93i6m(?~ za^JL-K2)W>mqGr}I&N9jLW{fe@BP%no)?JpnG@3=i{B7!x-CALmnF)&g1L1Ak-sQq z8^zCiT+|-8Iq#17>;MxSA{r^`_cw}W$u@Mi-nZ`}X!#9r?b}3Ie=jC;nmEm?*Qp0Z zJx|Q_^^M=v+5yZjyhEZUiwc|pd(#mkbRg;2{csDs3bjYO8nxS9-DA;`46G*anc!{P z8TYN1+0~k{{8kMIxw_tIe^(I30|N3tcO|1?6lCU!j(a>r;Oi5v6YYKfGUbY`g!^?o zSNFLhT@VLxjGo^!cPjT{vP{MT*_?hLP5)_-X~;FLg&9UF^i%8?>6`)>1bnMg5oST6 z?&}DzMfMDqneiO_xdHSTypWtevLRj)VCfqnK+e7y>hSOh!$KG@`QwF7+|O;eQv&33 zB-(J1OJ2$e?Xr&Ok>OvEY04=|m(5E1-p79YxPI}pNO+K$Ajy-vhaU}kn|oUH@h&joD7o0y}HqD;U}m}ef7c|QQoMKFS7zbhEIjPpK&pNuJSu9~fk zp}w2tj?4my^}}J!-lxY*$sP+OugLS1VFB-9n=f-}FFlMZ%RhCCqR_#rN7c?A7Bw1~ z3~P>*x_K;T-A63F&cPa2C@n?a46Qa!tuRPpNeyeX%xMXh+c!_W$5Zvbq|!TT|J!Y) zK_+LGozr34_|Gg~r!^~L`}Gi4F_qY__8k$>ca9}Bx1x_*B9D+#)j;%#6;bcFgo?4j zuUOw3+V~W^lGzyXBla7GwH~=#@n6Pcz}{vMsl2^1m-2j|+!1V!dq}=Jm8PwRwOMB?}_tRqj_O}4{7yP1YJw zTbiks&!0T_?EdNHuu1v*+f4@!bu0F$`(Ed!z9z9f)Wb;AKu} zSd2Zn`~)(%4w5Rl6wgs(p6c!TFth#i(_?uN)ie?YZpG^W4&2Ck5U$u3zq?`&m>hw5$o-ZX^*#E>~NW$L&>coUL13Z+4Bn@@|$EEn} zFZ6wUkb4Ehfn4#}n7LxvlXak&r_>A*-7FtIdH<%T^ zaEK|!k9>}Ygxpq-=o%~q-)7G{t;~W!j!v3-yQI)5o$d_Na3a}M^dki`Yp$a7bB{|2 z!p8e10_3rLvFPS?!eaj31*V4>Bt<`CCH!K#Ce z_r!|faC<<5R;a)}icWJxXUyeFozcl>@+dw(B~73EUK^^er0zfh-UD!}XGrV>V|}3! zFr>F4$eORZEcW$*s|Qq|n_(Y4{;r53p%!=slI7yt4Uwni%i%>&!#K*zPY1?7z3tx1cD|HCW)*BVZfg|9*V_JwI& z@_0Jn^M@d=qBU3Qt})_2>@)xRqZZuYVrk1$Id06fSoXcs8rr{iU+1it)qpk0a+ukF zyr=(gzE&r3Paq&p0aG%cGgafxS&kMvEC9EW+u~56xhwg^>;JgO|4j5aEktr}n!*`J zO_1~6-#VCbVyDjYb5$uk`#-PGZ6C z-|fI4ILB0Rn}=fyvSovV{Q4=1^3gxHMx(7}JubcwdU>%k^+vlx)$J124JN^7sj{6< zN)%7s|FB&%?CWygCR~)A5 ziAfq;L*}V(-l`?OB@#IR_7?Yr)x>*&2!{5b6Jvnn*7Jai?eyq*gpCHvn>J=^7`?w=-P%Kyyb=HAfxj(;?;6WF zW1VJaSXZmYr2aiO&+BXOzS-3VmKrkG@~f6TXGFEl5=;x)8^oLGX*a+k5-6;eZKR|G zW)wAIu+FK~DO4lLS9^Wy{07HV1J3gBL>&n%te3!dxD+s!;2Avz!R4oXlAHhn?Hf(aj#js-*kRqpIBG|1uKtXTCH+V*&-aT>pv=R6am@)pJ+WkU5d z;qvIM|F8}I>kbwE!%)&3j*WmG0nL%wI&=DK-9y}#3Qk3vkLN9@LZ>Vv`+r;?as4U& z(`83j=b0W*;`IRb>{alNhV0=PqM=pCp zAsQtuUlC|5lU;`I-3z+}T?FsN=(Lox#aMropSm-ImqgQUb*y4D%G27=+}9=yPfT!e z1|957<)@;a8$)}3`|oI*Al9RxO)s42*w#@U3_o$WzkL%3gSEdh@KGd*V&AO+QN)}$ z)*ug9M)?|rhOw2kEKF!wBG+M?A~GlIJvWwTSl4s%ra;WYB8wO#B^)sk%&gbkajH*6 zPVFCE;xlWP{5|I(YXF5d0Wn6$m%a}2hU0^3R3K(es3|EJDRdQ-O_mQ$x|MsbC5zt( z45d>i8cRLF*SP`nsU4-~l#vMEyY%SmEdZi>GsPkjhAL!Dnx8#32T5HUwk}DK!3tT& znPz8VpXW$M1-oVS>C1iBD^L??XOYqw(hTYea=+?MTMXK2m@i2VMgzsOQ?C*2;sgnj z@{QK-XQ}+YWR@O8sbP<;aOnBE^8Mb5m31> zA^n(@D}!qSz8;r)kab$F6{KW%yKWgHBkZ}W^C3RC1AWK$XM5i!TEE^De#y?@7e~H4 z1(8Rc`)9}A?n|NwO}_lv441Hh{8(_bL^%NNO$}LUn6#)m%j`L&Us} zVgGn8(XOLb)JP_Ml6olm-8iV01U@t9`USb)BC;6=cicviIJqe?>25>@q9fc$^lP3H z*NDZd)#rv+rDw0RljVW7;6cAC)HjI|zK0kO-<~CX;|s5seCWrq-aYr^eP+&IPMdz}zKdWb8q`|_{lc>qbsC9HE~?@LRSsq!dnm5Ox%FhJO5T#0l9t{> z{3NO*ygFp24tLk58K$IpuegMCMarwW`+VkkdnW~RhMfjpis&86kKTQJYt-(}@RzY1 zox-G7j=(A^#j`|h7k%k@xD>wzBN>kGijM~`R}3Y*bHV(~B9Ifg6b6z4&J!;dw#Cy? zSeEkD!J1o&q#O3s^w(9_F7w)L1{a7{YBNcZZX27c{RzS^QIOLh<%)|ZJa)cb9R;Yl zybDjs)DaR+=#1R&f@RjW-v%GJs~k(f(hm2R3y~1l*k8Ry;g?<}i(`!-Y<~+U|9AP| zb(3g1;=as)=j!H6|JE7k-D7;nNf_wq$%dC8g7;)Rw|)sUA}=7}c7QPrLy{9CnglEg zjgzc+22@OEn(`sti5z=i@7HrZFP}6oB}6`V!$`uE`hf<)D+)c<9DUdT1gSelDH{OB z$fnm)8J(Aw-a-6y5cEU1+`EC@#I6rg1_F7FbBOhzBB!3jsb{Y&sKD~2N>B=Zw&-r`)WrD}`d{!^L@2eLhJ=sn zF;bR6JVkeH6c|mcIzCh_t(5hc$H{(&k@l&SL5DYy`Aew%+helb6xV@-mE_TP2GfNH z5`takyLWFmIFoG0M9cR2JijEQ^fPY~W$h=Hdn3%tP!zvW5#L(XRACUU)?4*~(}QQj zo?iMNZnm1q@)eE{`9ZVLt6C7(Utg7AJJHX8&!)P$MeRn03v>vWtIa|WfOa8H*{1fO z3Q)ugFCOTr27QPQA|oklS_L?4`I2wD*pFMp%nn$$#t3v$Lw3&uX2@ka*FYF_FfRN# zJ0&sR6u}y&?99t*z(v=}@MF+L<9K%z0F-?|%DrK|Cw&VsvLMvWDB+o=63uyPDU!xQ zdbpZWTjR9^zwHBzO4>Y@(%Ss0+-xi1-Y5Bm?+<#bT3rp~)VbNIs`IHG$RT_01AmdB z1q{mn;pZkEGSd*h>k-Xuduu_Fd#p^EcX3@u zh9D!5*iAjghD>j3W$Pwt?)ai7{TFN>RP1CEc{PdOvqP&d zx*wl1&*pPgB3k_Op_nHhQ#p<$cn!X1sm3`5Q8u1s=X^)DehdmXeVcxFjek@)W}elw z`>KU(LpFZ{@+10dK$hAoy;>e87rGn4-LY~2plgwzK%8-pX9bZ=0OAZvnXBBiGay;Z zd~vJ-^U$th+mYN4xF{vmk|adJze|uz2*@iYox3eBL1}+NEAbu4oHYKlE;r z9f9BdMnj}4p zBCGjMue66z1XfVq^B}Cr=?aB)gIS{?=*plqPl`uC#U|7srPN%{K|p%CnM>}WE`08$EtwU>=y zc2<(b$K0pO6S@37h{=*v5>uCJFRM^;8x&3_{XD{Uj#w9}G1VY4%RmiGvFJ}mW!6Nh zc-W-w>H0DnFrP%`zC;j^KE0fi3GmICy0;!L2K$eHA*0`Rp7XvhwV&o<`Re$UPMXTv zH3NN6e)NFb=+Q@G(x?-UY)bCACb@%RmH{wNQ%w$j$pm)qwNaAXKfe zuZacOI0M?1*3s2U!pa8`-iIVPtbF8$M92maY+xpN+YGq6+dIghN7&;CEs*EAIp~8Q zGPeXujE*R-tcNGSS57I2(U;M}yv_Qq_&P_YS<-MilN;h!?+NXlNThIOe zV2U8zG{`5@`M%Hv0hf8|1JC#cq>@0R3RGb&LzgdPgJdk9RHGKq%NMJyE#r{@~mjV4q`O(C; z1DfyI#2_D!SI57)GZ|tSp{w)^h30pYr4%*`TK(b6p)vAJdjO_C{Q;Ec_ zRvjPh6_ZDiruh`}X7o0Kq@;voZnJv_*^%$U&qJ_V8mR5NUqqe^6_^f#?yCo2sma&^ z`J?Mzp(II9ZbXpnxPi4Kb0007mK$+`t_kD=XOi4CdVDAO@5Ryo6$;kH0tG&YrmA}u zOFGer=%L9@+8E4&=}UDrrhQMh(16z}Wu?&;S&&O-IZf zZ=H~Sg%pt?CUo23>KLFs_sHoiI%T!n^Cq*uB0JD#%XnOr;N{!Rfpu993xo5 zj}8fcD0vm~z`n8vrDCVGhj9;+shoj#rxPJTP!=W5BI#P&c0T?S#LJ&jDNRorBJZJx z-Pp{Cd~HT&^Xi-aQN`N=QH;0xj|XEbNgue(13(hhTYz-T|KM;NjR6X{SHV8$W6-5% zN6Q^aaBWs=QO>H+Js+9<+Zd3)O5n&a`3g6PMRTD4MEi=D9%8YQXJ@BuKLkk<004#6 zRG^3~@nWwA>`HHuW$%Uv^kQzg<05Erhk=p7Np_=?e?D-vpq=nn;q>1H%xl?y??HRn$k6QPw8QNf`aEblS9Nc;MyEQ7R|sPKA66Zj$p9km z_h{R+!~T5BO8q?i!0~lV%!B{yGRUb*sp$i`PWMP z`xSH-nMNir#_j_E|9^B*1>%X|uW*yv$A5;g%9Hj(e?c@)gzEpJmj`S6|NpOHEt$L$ z9M)U2uk_E2F=t%?P_p$-fJx!k0U^@1bdbK@FO)nTPv9L` zf(-Oet3Oo%bgG_v0&^*nUFSO0)!DK^ z+KqU|Sf}R$K4M6|dh%;pP-kDcR5BBL?}ZnjiYi8`|<135Ys`MI*J0c*ZLU4Fa)PLFKxS^_RB zqmpu0^J2ty6OYYTWvX*Nd=@W{Prs`5VQY;1{e^~rr+z1JVy6%L2QgudoW^PqjrB}o z#4!Tz21%6B3XE_~c?ycG>#NDEN1K8Lx#ogyA@7Any$CHXD;4IizKmCNvR)p4Xr=EQ zob1w`rF=F0%UHK&(Z^P4Qs;w9zf{>?*Ef_w&|DZ$c}5L1WuQN_S)Xd)Odc+Eu_^n z?Ogwe5eIT{>%j>^U`5B+`-fi^#W5Bj6f{hL)1*3H%<6uARkRy>O%BpQ!w2+kcmP~Gy!A3`^mEHu;eJ|d$79;s5tI4|9`g7Y?r)1S> zL1yTbxHSkHB4vh34nTOmf!0cT#5z(x0vf?8+PDJ;H8UYQ#dA>{1_9OCr&YHCPaKH< zS-E~Y;;p99ts0LhP*{8e-lEd$y{`X~(kir%Ethti116XoX(VF&g2BpRE% z7t9m{C4zgIFy#;I@VR!0C?+qi-QZ>r00dkPtL;vw<%&)ihq}-n);G<2=lSm#s=0H` zb-3VYohBao+$gUyxTF0eX`dD!>@uh~qA9nU+{^;xx1vD5p=^gx^dOq z*{-GMezQk#lfDV|V~5=Me&Y$}pBu^EIgt6p#nN31RY6yrbU6aaRHeK19{q&nZ~BVX z5%dL~+fOu9DjlY;xv^M`S5{=VrAWDaPEh-c?44+NDc_9Au;-EAqDNv6Qu>a8Q8GAu`Nf5M1s%!Kb__OE zK8KzJa5!4m22o#o3&8=lHeZCkW9HgBT2{o=A+i-v2W=zZre%gPu)pfcP^M+3Lu?>$ z2CdtGXJ~AqHoBBCwl-Pk{rTR9yACSBKV3)KE02#btIT}ld zRMb}u3!E2jv&s3C=O5jCDd0fRDFdvWBxWw*gK%nz)BOJH>4@6OVeg%vpDdqqChrx( zTJU+5K&au|*cMtr#@5(KIX9ALsC3MUxLShJ`U&XOLfQkI2cAy=h|(U7U(J!0SzxA$ z=XPycHt%S20w7D}*K+e{sxr%0Pma5&2z~Fr zp+{`u)@y}JOZ^|s^GwxB#^cGnZ_~Sabso_L9}RrgwE|MJuOMW8biTbpz7;c23A&!j z(AfD~-Yfig_@>N+9~p6UiY+q+>phsI$}q0f#^XUBvL5H_SY<4V;hd-3H}#Pr+fBhl zqS{e(srGhfcNhkcqn)%&0`_d$;~)%fpH_Vh!Ka9^jw49G%I9NRyBb_n`?z+0L~{+T*%ZG7(pU&rkcB?D+*%?hM06C z1n*R!QWLN3Aa=M3tQbcEo!W|isxsI%{?A8R794EoUlf#C*EuHHV=h7Vo3I*tr)M)bXc?lLPasMM zTQNNa#9$Y}sUGH90)SYGJT;Mp6h5zJoSKnFSkw9dvL%%ViP zR+BFx+QJji{kume#vPKqtCNVPTNR@v#@y&-#>L6<8cqqoWq(7|PHuyO$D<1826mvD z2uWjxB@iyBE`{?=(h1<$s*^IJHQEGfayvK3F5t?ojzN-f5+96Fx72yPBG_h-B`U)m zOk$|8G3Y4Hn;a#8jH$YPbnTVt;0=%xG7L)6#c>f%7lXjHWSO0hpG#X;li}@L``5Rf z0H)D_pkhbcrcmdcz>EA4)=y%IlG(Uk1`I@Z5})a2yGQ)J?R7Y zeI6qo!S$3J5`a7u(=K{NpI70+Isj0rGTaawogRemdqc-5GnfpqKc99fimbd?eMThU zf>wSB|9WMhcRGjnv~{)4s03-3oKQv}D}5s3E#d`;I6dWd4QdlMcm$Hvm%0fN3gcJ| z^vPEEuh8A6YbrCssfOWx*ExoRNSP~})&ry%_oq);)41$~O<*VXfy3@62f6)N8n+RZ zI@S*We~Cm4**5wC_K3myja^0nk;~P8(5S%P;5vr%bUcxN^=j}DT*2Wq_dcieuW(5b zH}n%d>;ahY6sS@W>J#R8)SG%VW2LYqVZ+}RDmJ0)ET*^#w&(f7ps$ABtf}kp+Ay=@VPeHM6dF!XvOExd36rva81WhlbBPiycm6MAY`+!1IlDq zbIL{-A&Gaq=|ml!V$de*Zm9W<5ipE@qe<2*Q3N4GsD_LQoyIzh$QC zE3;J0W!P%2mqX@a_+6@?ipy(FVLa3@2e&^Xg>$&#hkE>rtcm-wV3*vEAdGW#dh}!Z zn)SpH@Pn}u-l)bkro@oIwv@#wSYnhFm4CC}%9Gy^B{7AZZ~yqQBBoUm$UOqxn(Lm%9|}(O8#yOS3&nQoxnzq?NfSwWnnUGP=&5T@QY`8CvHp>##<5oB~g4NWqYTn z4kq2!aG4w(B_zLVs*a7x`gv}H83RWk-XI2Fi`zT_sT$ApmE5@q4ccsyPqM<_3oD_| zmX-sV(lzvz?scpi)}bx+ovS;~8e$>&PI@~SIy0eF)5Z}KV+|d=_9#kN9?}FOuO`w; zDH}=8kJd@ed)n)WLuR(_&gSgwt}|q`Q5x%-nAoCwca}%4j$N6>uwS;nUL8YPX5b0( z(A-};q91C<#&ReyAyOo{Yj4}%u3iXSkEc(d-rruDw`>i&U|waw_haH3`Bj%$m+*7%Fn3C<~Pxo=cv3N;#~#_a_dlUdZQlV;s+vLs{6+Xn2!W;((v zjIOB!BJ%3Gb%*mf5aNs`gtWogMf~7V&ouTuqw><)k|cYT9|qZ4^VE?v(b?lDo9ww? z7tSMQh%~S(c|B0e zjb+9mviVIeP7FfuWEmGp`L@6Eo#ee;__avEU1rs7erPq9;H_w(LT8%N#?j3dvkSyE zZfpom)JthN#lv!JJW2@?Lz)GL~aXlE7Y!dPG5>6yeHd z?ua&L?JZ5^hg9!-2|hIUmua#bF;WZu2_46(^Q-Wh(gaIC1=-5qaofke-*F7fN7| zHca_(l3f9t)MOY~yI+YPwp#J4abXu~7O&l;ndH!7=VNd;U>3I@rP$1xSW{%8+E0Tm z)f`4bQ&Iy^*k2OKdCZ1ROP9V4^Jk~T{(@zn++B;S_&zw|1gW+RZadlLPk=e3et~)s z0fg~siJd$jlm3alS_eAxPHzZ-n(w7OIW>lk?<`)uxw$%@sm&0x<7#x-6ZzX_?QDc! z6y&@i?K!7ED_@#u$P}aEIYrh0efTH~iD8-HbOE-Dopcyt!C^ghAHA9C(8wyN z&2w$i`Pqd?xeVqZD&mYqfdDbyasKS2DN<2IHlx!<`aZN79E#^D@+00YPe-8yZ@PiW zj`-&rS?hc!qDubjpyn(&`2DwW{c^rrY z`qeSCozDHbAawGS9xnMVMcI&>!a+7{hh;PcD!+v!#pWFo%OMgbdhcAR~*liY@YDW{>nLsc@+lU7EP2HHoUD?GQ$AEm@d2%;Dy zE4@IH)rvsP!-7-?nh6SheEHM=FU;~6>hkKZg1)_8XdCJ96;W_e@ zhoke=ZLH&o41Q7__*xvHxqY6y)mX^bkZm)X*&6M4W?KrsNrUKuMna#o`CE9fpNC6& zAl_)45p;oLSTplzqG+*ITdGet?{9HIOR0fLAhDo7zv}g3x5W(_ zSYt_|AeOB-j*TV}DVY})zdl<-$+cXoK4f$^X_6T`ca-ANm``cDu9zxAB|#Ig1DG#IheWBt>)rz) z^Gxb|Ex}*v^>&?nsU~Gg^lW7}=@d<}xwN0XAidubjHIbW1$p;%z89v)Q!hn2(ZR0c zmhZu-iE|Dq4|JA3o1)Pj9#brdF6)*ixg*#w)*&>571!juH|+m_wyoMMlOL;cMm zclHGl_E~IgvHkOqBSmmu67O!ts$o^3Dp{B5jgY(yH=1Cj|CI$0z{tx-${4@~BSY`; zF{6cp25`4y;#`xl_t9F74@(?P9hqe*VdN3Y$?oan+@3t=d8_BX35!pindXi^t0Euj zlTX4Ur)Lr9*Nh;QKx&3j+CodZn(%WB z(MHiDsn(+6+($iJs|#F>>~_x{=OyI7Z%Q%d*o_h(_i8%b|6bReZ9c9`V`FfV5O82Z zA6(IT`1%RGh+tbCr%`h3o(O%s$ni|<4-})FMirJ2d0OnL@A4|^MH&5xrpJSFMK$k3 zSKXtVQ!kVzqdJ|=x5=5%51OSt_Nu8g=Mp}5_CVH@D4#LEX&7br zSUXpz@O64b(GiewWZPmXPytdqx0Xm#YOq78wGi73NPYPxr?<@OOsSJ zq834t5S8Eb|222`Ovtk zJXk|VI4>doOqKgySSR>mT+L6-!L27yOMcqwK`vfCgH1{H9~3N_%zSRc(C{qk7vrq9ico2vTJK*jD=FT#6$+DNbvjYiVS!)YZmUt7%0 zI4{`0g}v|C`}v}cZ8GfFee~7E#?JfnSBMJv@iX-WU?0i8l^l!3E1$X9FRLe)y^~c% zU&}*!ev_6|x11wGM?y5^`4pPTX=Mj^Bg#>D$1}CyD366t+6Qpk?0~^wi7d!5bA>U6 zA+CCJ_Djv^XNz9D&x}%BxXTnaUNhB)%zVvJK4^w?u+NVRwM<>agy85OBTEx*(dUp6 z{7blpdt5=?tP^68I`ytL#ZVTT{63?s@XCc+dK?2@)+x<^YwB23t8{w?rSWsOYTBSy z#(~99Un{kOiml^qG;_TD3>gJUJcfai;!;FAr;+uFH~t2Ywih~wM-D1;;OtJDx?I=m z6gWY%M>egIEY%N_`jsZ&WVX7-Ud=SJtMy>RGIT4TmLhNy7p2xCr>^OqJVN!@tl zZni;Jdu~Mtr*_XhWa0|B3jWfLvHH^W5VE=Y&3M8z=#tg=c{NxVSr|7*7V($Fe{Brw} z!ym!B+?TH-F8U6v6yHa4Gb~5D2ir$ufn5KAEfQCU1A6BodbxwHJ)Q#ZqrLeN=of8u zedsQrb_xMX?BR{(uP-JVL3j#~+C(2yV#~%M0M2ytro1qXuw}_;c8BE7B;BzB)9*IJ z^LSdcX3s0+_1^KBmN;Fnx1GZ0GJX>Kq;b)elKGUS0M_?K?*rGuS-b)3bFSWZUr~Zc zog_8jeSGh5vBg`#*BxJz&3{1_BUz@4<%d0z=;6qr`GZ9Nb;$vem{%@u>^?K!Q|Loq zKY@>Xnw)bINXXJgAY|H;a0T>bfrKU?9$S{nw*dnxQ#g!3DvWE7DqqQ(s&5-rXe?2z zBEmI%a=D`LhV~u&)edgMb`PLnB#={C1N}8-AmrCE5fHBYHCj@*>M#K1V_#wBt=PMD zEbIwPlFI<*#~=OLAqIBwv)8?JC{C?CJyRd@%YM<20R|D411;QWIuDMAU8I;kKlBJ- zovR#7{81-NX!d|^822tSYUBB_7ZpfM#B1h#bXgh*tAO-^IXykO>zlw`5ZO__nqbgc z^&UvQmejA0R&BL-&U~B5^S?vsTEmddJ%C886%BHkc?VAki>Ly8c}ys?cU~xQrgCv0$=3~bEyQp6 z$etT%+F%!^Qau`M2&9^;?5au0jzk`Q)HnE zs|yX5I01hV!2&Xnk8QN4OceGpyc38dI9u3(FEH>N1iQDd7K7+d?cVbrBuetcp_PM< zVAYk$N7U5-g%%f^l=C~XP#7z&}EY^Gq1f^P7-AV|VUuNf%GD`%noGz8aRh{~-);1(*zhWXum>Ce4& z_S>|m4A5Cl30Q>Rp)~hlXbC?7D!!U=I8W?%9W`+Fh6rNP~zEKT>Eu2E)|h zZ&<6&oixCdX-irUYGS~^s*^*EfO4G4j`LWNN0EWtq&VVy^bWQtVlbHQ<6u^d zIZzkyBQt1?1w9s~L7;)N$ZHIh;XZ&^oktLl_!-XK$|I~+jsFNhg=a#igmIQ3u<81AQcc$=)r^{^$x@gpxWk%w&TZW2ZlAULeBV7B#PW=LeR z+EBrx=zG`2xT03&yXJk~uJR~_xHC$KPioh7GvRp1jpFYN>f^FGbnI;nxst%d0L}$^ zV|EZpR}y#D563+EigEV{jDp(OF^M2rt|JRqh*;Mxu*z(r-scnzSO~f_tL=gdiLgxDj4Wved*M!0IOhYkg)s@-u&2d1Y}=?YCtG zO|X2vBgEj^K~2i5KYIxINw~a(f`CHT)Zu46te~>YH5Nqy#rQVWUl zL0)d4wMIyUg(wFp38)-o*upE}fJP}BH@zt9z%jW4LgJh!Py5H6-_wM*5QXQ=<+W~m zdmaEF@t_O>^3RSP@(#EJC+;hoc&=*`1^em2t57%e+-;&yxc)J`AAVCGvn=KYt5z^F zn~|wz59o@wW&?eNc?hyz&v{*Wp!A+q^i#eM5_(gI)y!-y)qarHVHD6Zr0DurL{^8w z!}3CHup#IvD*SrolriHL3I?eQIZ+5C9fT@&&B z>)k9lV?jJ}mI|!o6=K|W~N-lk!i12fw*&)~A60F$j zK@WQbJ(TE*vStA47d4X~+#`*EYFJT+ss!uhkuTBc@v_V-n~^8oW0xC6f^TsFRm$sC+KiUty-wfLq>_Z> zcTP#JEQuA-Nct%1^>v11=5DsesbB^O>?DpNqu+tjh~AJnN=gDE%tg~7!roN#I4_wF zB0=)(ZR$RlndZ}-vRymLD;bBr{Bc<=8bcdOv!XIMx#a-Z62frx3rtLYaY!Kj&NQAz z9GDZ8SFTqV#(m*_)EF*Q`Ri+Frd%;sv3|UhyV-IYA;QE%&F5E422o^Q7!A9BZ5It!-p%Hg@1@e(#70BS-}^N2+|qSw z7sCUA>`>eF>nimboXhSA<#28fkkVr&B9>#b%PQC-ex!SVim8KIp_3SNBd%ZH_gd_N ziARKWVSv)-Y|ziQF}qKjRf5Dfc@I79HRa!-;aPUPAMd;XxsHP%LS(||+~%yXx~g=zCfa8#OB7{Di%%5!-8rEyggZ-v36+ADn!K!5<&`j6FdX05cW8`$nevjeVw@%SwPPjvvr{>R zP?7-rMM-Mh4xE2C!MNE|p{cLsW{ZY5xz%L>IEtP*s~st*kyPES;0hTb zpc`j>GhX$5$M=_L#ETDh1tM#>x)P`g7dx~2%iFJ9aTn*la~7}F(jKA?r{E3?rmu$Y zXvofD0?f~MUcniF+?rsrQ#pD1f5S*z^f#J^Xg*Z1()*JqYY41v(-B2cT$vIk1+@j5 zfBr5d9m_-jvil9RACUOliwezCWQrUy8(>fv=zSuEpV})IEdT`_&X~vG&4oVX2&DUS zR>`@`N$c=cI7Qg&YwR~|HSnbMs74hN7)5^ck-aH+cl2L`Q2^?(7CrvVpCL_y`;S~;Wf%^dG6HJSlhim;6)GY~e z`ih0Yi;EBNhIyyTCfg(i8HCU&PRU!-nb#s68z0lFpM1=>?K^7w898%OvYkEeVu}8u zu(%6cR8=gs?X}c<8az_l(G^815MTsKjmD*d0j9fQu9{oW0hxb^3H9kU@8NhJ_PK-tlTx_Y^5>#U^-#p zGEl5n&gGmXP?hC}xe^nnUgjVS>Gp|oelM;({boNnxn6NyxUujrWQj0+(gSQ8-zF*M z846wGX5eR2W7|{Tw8M>0_FS|a$e$k5s^4|;VTbJSJ54u?nIBJB$9Z)=tKb#R9KVaf ze({s^E)a4o3yn87@Y^I&XD}i4zc?<+G(XI+Jw}Ypamu(fJqAQ^DR^0&!myUb%`6#K zzTzDN_zf>1P5MM7LypO(#w43q=|0WS!?tcR5ZnD!`rhQNnulGmsH_RTY1IM-swH|P zo|b(&_$#}2SH7_d2INs&Pt}L%MN17fonCt!fFMXSCXs$F!%Hpw{P;~;gZrq^&aj#@ zR0F70a9}+4^--$yPd-ooUE%Z>^oEtUL~5Sf&$J(_O?dhY;_E&e?E<~LE_a!E^4a1; z;+gEqN(v2e;ITGWmyuaj-H!ZqI;bVt@{UjAIW|ZK2~-~&jiy5uXo=^H8&nDGHXzkh zO;bL=m%VE!nB84Tf<6E_SFN(oB5xLtEwAGwMDsaC{%fou+6`Ul-shw~eNrJ(qWLuM z=xny|>cLTmxphWx*qW)Yv5Ldsv;-vYTR!!q$hWgOlE+NE(@F}(bFOW*A5_G#vllb^ z4o_VuMba4A*wXL{TQ#HZzHvM?Qh1cBE>L2rksN^IDYz~yyCXlSwD&W*?oI z;zvLorTR$^hv(NhGr2KP6fdvqX(nfzJD+j26ezmuhbNe=Hbu8so`{9g>*b$sI+#-cICxw|Myt9$qz7ax^zH z`BW!Dl5CbV{=WAoK+dF3Mt@FXYc2Vnv|J7}O>%KBipu*xKKKSyW!hk# z%z;3EISooxX(98EMj6ORh1Ca2eew9y4>T|Q-Nmjwn^LnArb-*n(P~ITj9;8ooj?@v< zYF}NKhtXGNb035s>6)3nZBM*99zxG$1~Oa1>EqdBl#?B2TXjNV962h{DKU5Czhqp! zg(QA(c^)`Xs;cslS@8kI3a`xSDwhH=_*l2D-DH_c~|y+ z22h5ikh}W?F?U{*jA!a}iM{uKekH^oYTkyPC#ycbPeWn`P=%OXxzS|!YcVS`qRwxA zst*KYjPe`caYN$9jdW}%&!WSFO?K%iY#r+MMXcOe(@E1mp$AZ9pMR(QpbH-?O1lm8 zym^IC?)}Z%zilOn`p;VKG&%^P;j(ED*rRfn0cuoqpMiJx-zMA!ugD2=m5(-vrTM1vNTX!498_X^#tiJH27o}tB*uZ>^oX)SQqNheC%eZKep z@mV7s_l4>OE+5=SaBl90y9Dv^VzeYkX55l3LIYa>eBylw^iMmtOXf;OPk*@IOkSM3 zQFfJf=y|>9OH38Ggg$aic$P(t-!@5q$<18FNXrfo5NKUpD19LiH9rD`&nGamMUZj6 z2od1!RZT)Q2qui_=Gb(l`4a`PBQ}Y5s-RA6S8a=cc4eTD7AW94+zpLqTVH(g++G|= zSE91&eH*EQo$q^~TH09tAm_2+YWZf=Cjil^qn7UyhfJkIH}f79n1m4p@n1pe(R>&Z zqIiCYbMZ&+>JVr1jC`NB0lC&~84q>U$UC0>+*EuslH6BAx-^pbfCtd}9?g8w6j& zQWNEw@Y0eYDQFe;Fx6`#ERsuZtdM4nL%c^H?q}YSw4eih_{~<=q7l2*PBn06*V~)+DyJ(aK?Eu z`Gf7rBTFvh3ZCcoG)r|11gLvTlL75I0K8VD)B|BP;Vp^hUB`Cy4H<)+wL$c^RSF42 zp#nImfz99!^N$BP+6!8ElSf3l`rfC9{V-{qu-q7r#G{#hSfdGtgA{kLocd`ANIfkK za`AqSa8y*9ZD$H<`qj_wX#j(XvqPW!_{>`oHeM|L~t@V7|C3L_Xqd zuv~!9`-x5D!Al|iG2qKw;@tp1dF$wJ7rOV3gvG2c8EA9}p{xz6CEp8knWf;*Vo5L!uRV$IMx63+A z^|r<8ONDEMQnK)IQX|bjUiZ~e$hD6T%cdIz#F0E^u>~9suPl~uy0qaUG-`1t6{6VoJBF1Pb(>fod!#!5PAC7pL{%=F1il=^u8b3t%8lcz86 z4@CF0JcuY@#7%aPqH97+Yp$V<_aA~A`qSf*9)JwbcCTT(03ciht~uXumz;Qes@!<= zMT>!)gipF<1584C)<8#9aN*tuZII)ZOnn&VDEIhLh3CC3Zwd`J4OBb@U!cLw13nmH ztHgd%kt=n7u(oqXvVJ6ZXAl6pHea6fTLTc>RUx@E{n-<)bnmfp4?KX#clDrC5-z_2 zI|r*}CIT&BiBc|$yN}-mqPA|%$g$^hd{-tP~kYD&fye0L(LfXCVD~%GuNy|I@pkMs{t!(8Q6RCVZxP<`Ir;HX_JzB z)wNp#oaz<1T`3L;S8aweBRUW29_GDtc1F7^6asCza&et}XO%Y##=gEVu(Zma9m_r7WsKx`oF;^%k8mmC^x;Ti8l3vOw zBsK?}sOYqxMV5Em^bBN@7$oM806t=0Bb}E{UvSBQc1n8Mgdd?uJ`ZO6?8i{$y}86I zb-1(iqf>c(6x)$=DY$g7X>i@uD>NQuKOygCU7f(o*x1(Gymj}GsJ*0}@M0byF^>Qf zKw5!neP(=;WgXyql3W86l)&%wRYUHuZ#>npm4AhMz3+~OhqrZR6-cf5-ee0-oMdnO zkYID&GML%C;h_htmbTJKW8OQu1b{|G+@g>OGhkk-8SZ6Phk!7gJeSom6zzjKl+#=e zb|KVfhQet=nQZ_v55*k-{XY)Ku(ppJ#?oL>B&ohfC2H})HOo*hiOcB(*`GG!-uUpO z%g(nHCNff`qpM%C(h4~BSQiFgwD}%;&n(f`1wZ6*-_qpY3gz=W^E{bz z%rWl!ck2yfEJe&!GJe?9|=9mlAk4|=VQDD1K2yr^_OyJnAIOU%?HqY@i{z|3$S zg%%?`!kSM#n%jih%_(AM;EmWtjE~>%ue?J393Z-AoV46!CEb0(SubTH>_)EOw0xtm zI;}_@5Jxp+H>WVH6p0w)xrzOgl1un9R1vuHuwr z?IJ!~3gJ@M8h4M5fQx1sa4VkZz)vvvI3y$kzJa6Rg_NjIzVeT$wHvwtcEXI$rc^t4 zbN6}GGN1j&KLL}&L1?(tI+;)v_)ILbKcG1zRnC-n+wBn`yF{Z{LR3^M4J{I$!==pF z2FyTQ7J%RMXVK(u2|PEAs} zt_iGcjVHR@VmLkZs>01m=>6sP6MB6lu#$@rIVLKeDbU7;h>yr8VQFgdo%YJys%ht$ z*@@VcCF@Xp(@V;vY_sz{=-N6!B^&3Bg1`&kJhGQ#qCvqx8@I*ivE%v4N0d2i~{%t2pPBerG4&2*Q)X4P+ zj?9>EZa%!wXIDAR+dVoe<^@Yz^vde~O;n^bg#yS%q7GRIq9zIwg%4x=Ha~iqh*KL~K&L!bYOTwl?=m9kc^i30{*hOo70dPz zUv$^`FYEys?M?vtz`0Dj9l0K%p(TrPT~yle?&}^>q}S_~ww?BGVO6R?_4vMbXP77Ll)vOMonU z^Qx|JD&jC~c3#{bn!4xON?~8Y{tG619o~aD)F?(SyEM#Y53ef|oWz=jhDM~C*4mky{ z2Aj3-jXj0R?`L?4vT#9r;mOyUkG`GduX)<1As0%u6RL754NC(uxRbNf3O;%$ve6b_ z)Yc;ZhEFrI7qZN>Yqb2c!nkpNf!oSGLb_Syx}xuqM>iD0;ql@dyK@?LpXitrZ^X9q z+qpQ&jtIx0;AC!Os%>XAQ6G(_LVTZMZ{3pW@q5QHJiA?WUGax5%)K?-#gb}Lb4q@* z>0!XWDX|wtTkI`E=Rgykjgw?qCfa0K(2a~y+Oi&Xq9?!(WI zp&B9C-G5nN2~CG1_;N2bM1a)nLL=V=oVD8g>$rhx$BA0@AFME^=FatuOzaGNwO{o* z&q3Yoya7Gq`_Gn-gv4jQb7aYwNg;RO-Pj$>%eWj!vFFx8j}eV5(rqSC`r+Xs+Ng-B zCspN^RNFbuWij??p%fb6IFd9|6mE7eK<`-HRq6L~f|#(Py7zHju!jd4w>469uh!~R zf#Rg%UD_x$X=wGi1MB>^vEoo+X%XE4$KkRyRDgG_ER@pI3w!&6;n!Vgpk$f}EQ!D> z3QxzwIi!EHhk#?gGw-wN;iSQXe8HZ*ucHg3NJXO}`;8YZzghBb-IBJU{mIt+1GpDa;hdFc-&Z< zIPf_rVaR@|)KVRvE&8tmJmJNwG9>=@CT)keZJMQ=M5A5jKpi?*#%gq(gTL=hBG_7# zwr>7=E8zKsfc)pCq7o&1ohl0$2rn}$QNpbQ>?)W#*HLU>o^Gm0tJN(z? zDGLQ9N_G6t7Q-t*r1}_kTzwAqguL;w8<6c?8^Z>6%U8L1?kh;EG`BULk789C9e1o_ z2S-tJ`Ay=bXvp}b$F%MIej`xl`!j}=&gdOT>Qq%4b=mY96Tk^&)ZJg?*be^m10zlC8|OuU$465nIhQ9*HHJY`vS0 zW4XI{N_?WJy7re_LAV=uBtC}?f)KREC7XgCNjXI&{1^5OI8l`n2Kej^Iu@5ua*I94 z=Bvuxy3M-HryxD8`!w27nZzWGdcaZN@htzXCk-;#g{_Y8Zj6yQJ2eHcmAEP=+U!rh zQhMnPGq|zI8(y>3;O!Z!!rqYN`Qlf`tuojkp&(nAz){U2NU)IZeOudscl*NyKY7+W3Y{0G`wsvz! za{~9i;_Mt~Vfwi5aN3f1B^|TQVQczLGgyUV10vwR1v- zHlT~NE6Pav_9E)~EtuHJPOZTfX`9E@!!fQqJHOB~#*62^ zya&t;(jev9sSK8IM#sgVFJ~M1e*N1mAzWTQ`0@*Ch_b&LgoB_6$pm1{GC~FOY=_Xk zh*x~S>x|d~F)KCHjWQ~{QBds9Hx=qOYJ7qkTv@5uUtx5-PswT-)kIp23CLMksS&ci&WWYrPii`7MoHXICc? zJI{&Ql%cN;x+<)WXjd%7gsGe~$%sDbcvI*nRS|XRHs86k z)|&EZd_cWP6v3qF(e2Ssk=eApr#le0)DW`wDX_LpGEFv_CiYNd{vAav#mwXW2C%*? z=s>@^g&eCWO1oXMAMSq%iZ>?V_P`C$EBZ16@ybySIzu9HcSV)+KJ@;bkEJ-Nx^Itb zv_D%V`u?0UsO|gbG~u7_xkmK$x84T)hr1KQZ+&-@Kb~x_5vTO@7(RyZ$#wk#Eq8E% z|J#4^)Ow*Mh=|X@6NXcy6mk@Kj8we39pnpc!Q>#xHW=n?4# zLxU&2$W#dD2S)JhU!xJ-5=IfB-@hSABDC&6?WUN!prGTjjy)lq`bz1(gFIo^_uV~2 zZz^)f$avFYRM&ZE6)=uBIi`}F8EIG^-)AgT*(VpG1x=!n5%X@q<4s)1(oVTV=tF~} zp|x*6WN|O<**xZ_cWnc88VWHte=0H|CTXp|d9L&0)tU1K81K0wa2PsZ+QpT+r4QdJ zH#E>q?Pl5q3LB9*QP1BNOT9Va;@OS^&_qn#47W4To_#Tg&pnRZUq`91CpweDhtcgW z=^HX3uZ!3?r|~8LvLQUNWZ^{+D+8TY=TMw#psQ6Bo_?p&fN6dUoPt=8r_wcBYZHpj zqp*A@u?F8^XJh&u=GOUFyQmnM$1jKGKB|Yqm=_0GA6jM|Ui-Jv@2drP{Ck7W-tHB1 zCK@%S%9Fe0+ArVpDCUp-z_| zDnf&#H0(gY@%i%s)vu9ODi)twz{PM^_XjGg18+o*%ng6ZY&9RNygMJ=rZV2SrJ)fu zDelQ$4)b3gZk|_UCXxj_l}7-Qvc2Fkr(z7B-|Cc(=&q*dh($S|RpcU)CweWlj-`Wy z(yJt#8{zGv^P5-Uk^=4)0 zMuzLF?@^z~s8K+G^ijP_+#U0zHkVqRmJ?^*1d=XS8)c&q`HF#0eJOl+8FolFIc1vx zpnvLUNGqaAVg7QLu*hUB{$BazsG>rB;Q`u=e|;fV8$|qjox=(BO9BpcR4=yh5jb}{((L^pT?IDf4xI71e`zYYqo#RNt(OMGjM zV46AR>UU`-VnSe}Wdt z`cCTN@Z&>*dI5S;*tmQY5W1%trQFO(T^9;L*U1e4kMDu)i%vyyS}N^*(8^3(eZLd!=7if=fte|J5#na)ntRTa|Zp&4GD)wcs+n1Z4WQnoW zZO4!JuRQ(+~3FyD;+1`b6VI>%~hSy*33hxBo`;{nu)hFn{t!;B#0Z8oN4ACmqte?W(*++3tw|C0Gs=;+R&nI8@ zB7#RZUeZheIip+_otsT_hVvGB?nSZxJ6BX~SbnY`a?Q|o?8_&LNo8&aW*I6`7o!-jG9b9k4ibC1&dowJ z5gPb_HOUEBdA*uX(qvq!1qV~4To%TvJ{xB{@KuM3cd^p(>TJ2bQm|#vZy*YVuu`DS3iJ0{F>axa+eM`v0NLpJUKg6|}7htPIMvHud z5(=-6tGdrIF;rZU{ne+aH&vt_uRckIlG#~TD5Kihpfi=>_3dvs$BG>I_`v$%;=?ew z`$72U9HE&T?>HEK1bxJZ)fjek6cYuIsT=|sv!PR)GEv)^gXY9rGolX3YpsziHEa`H zWucxe^Yx#uS9De2D}kD-TVCPJ@#FN&{xGw(>`mNftMjh}g%3iU`PN_ix^3nv&Rvn^ zkUF^9fDAZRYF1o4337pKFMxB#!yPc7I#iIEi4d2gQ%Mu{xe<+~U}SNNNTB;{QtEq7 z7|N>HFnl(&F=IOA$~j6_XQ%eB1$L}X(L=i7v`Kx!D~^jvTUy=&EPs8}1G0FE79-T{ zI`B+k%Dp;^4=o)Pxi$5mTYe*IvycKv~y;(L~Z z4~97W2vAv{_m`q?W(%mZQr++6E%wV5?#fd6DWRFY%OZIZUXIX^;>oMY|r zMXzO5xks2Q;#&M)r2A|*ZyWukmihZ1`;VWPw9)Z>qK05UV9V1UC_GuX&frZ7i1!+Y z(UAM2T87+Rc^?((P2lJBBvr?PU*9BEydC|Ir70&Xk;a#mRTSD7`!_R@a(!2GI&780KbQRe{dwl*;1 zwItxP;!gqS=65#aTLS<5d?A0M-+hMzwg1xv*Q6!9M}6f_%%x1%0fR&^l($6%lyci& z8@iVa(^xXD_4f1w(?i$P0#`@7AdK-}X1RZzp8VIZl)}*0AF)C7$x0xwjk@NK5tQcw zRL*n8*2M&Tko`Yhay~0q@ADLSvH#hz^dBA}P7XjPi=nZ3^#353{Y@s)5=pRTk34T@ z|37`OKOc&A(m!;7Z?&0ba{m9k87jsL`WVtK&;NrkKMtVPdSzJo_;JC-;ym7_|51?i zubq_B9rkUmU^wbM=uDi`($$p;{s0EY_knn2BmE!h>Jxa39*>}4XJ+2Ff)|P*k9hv~ zCynP1jW&cCdb{QMS$p6oNsNuH*Z_-Zh@3r;anby=rxHq`#Da{kwc{?`kWB+l#0tdLhxbV^{%=N3ltoty9{zj{Z; z7pFOe7>_qCzi{J(p>W7fJjuR{$5!0#M~L=Fj9#@Iq!--)QfMya>0KDx$$#k(=`QS; zklp<=i^A~c|4Y*H$JZH5;GgG!nI4aR!uYk^6aq;?=_;z|LZ98@aHpij@Wn%$1Li~D z9<|g`vuwc!Ne@#c)flAI3#V_v_l57aez>dsdHD9Xdrizg^Y0%&ce^$6XdwHlWgep^ z5ysc;Kg^f@t?0~&Q7U$Y@IA|y;Q8bE3ZTXK*Pm>se#UpuC550g%|!D}MTx)-{sud3%}XF3j_AFDMT7Ma-36 zc)2iRo-}0X*i~A|FM0ox{r{}8`{(iehLRE!M6&_)i2TpLgM>GR>HTE3uc18yb%tYU z){}h8P$#7)HbW#l^)m@ z-LKrUtYP?{cA0|msaswB z`SE7W^MSW+p0+o#({5i(vSN{PEUwIx9NOYxvHva1vfM_(Vs|rsjWpL^;HTd>^pvTt zQJ$2Y>DI)DyVuQL2}JyZlJ~E#=-*ywG7`x^;)_V)D*wC&&vZ@9LxwU#gv&C|o%P$O z)8;<9`##wrX!!Q0o3blbUOztCNbo0pdL+8xJN8!leu-q0m0B02unv$NUAu3usJ`}< zJSHcGhx3=?`kMqdwRz@&Lf0QCnGF-IOKOB=Ebhj6W+||I`B@dKb7-Coh=`!PU*}ts zAb5Y^Tas|*()M`S!#FUg9KU#rkE7-y{YAPRF3Doj#Z;enH@=V+(MSPAq;2QR(w+E7 z7O4Xx6URIG`o;Px^$tb^&GX?qedY_lZWfx4%&+}|tIJePjFDUm2NQ20h3W9owD^|z0LVF%3mS_R7=-3(#tt^RO3 zQihhk->&&ia~=uBIXuvz5fn89Z0h|lPadj7#G#dxFEBjtg2jRfQ>DhY!_jKQ>p&aD zr&~5vfE#8H#<&BOF4lRs-uJpis$PEze1^+e;X{gt}0Fam^d~x=VLgTu2Dyq5>2GF^j z@ZO9(b(o(A1JxtX$eUDA@P?uDyg?pw!0y}%Zt0XxVA)s?3F-5y)h`|FPZzlIZs#Qu zBKz)^&$sGCB@MG4-?wp5duxf|m=-S3>&@~DO^AOXv!@k)BAO!dSvyoM(aq_w*}CTM zy9b{FY#MT&>#ZSuEJY@tkG(PS+~a^+BD5iV?{y zKR35Eb{RNp-CbAPn|Xoh``-*xvuPe2Rn9^2=E{X z9dQ3(uYd-xd&61vm{Iy+N|2KP`aHB@S1DG~T)Ms{%qTe=yzTn^vtuPrSD_e$ zs*L~xY1)VtPZs+w>*kC?9w3et)0MfO!(hH5(Q0@w3>@PklQju80Xm&qr>nq>R|d}g zt4?%x3k(-~Mx;Bz=mFiahmVZRUj%7S%ddi{O9&WJEjAxS0GYAw`mwTFIDr6|{_(jO z1!T7iq*p8}p6*Bc5YSfRp_GcsTZ*$WSC;cjyMB8;@~Rv0P^eJ+Ckuc<*l0P*4D1^UQ**tkM8D~EPg$eegMNMw0b(jaoTPMr6vNQ3#Em%2j9K`eQ(vu9qBFugEKv$w7Rcu zcihQf3$zwDK;cJJZzE2f#VUS%$Xf>CvyVkf_HVb*AO7Y% z0KWDcZv8oOt`}1B-^y#sEiBK;L+@8ftDjoGq_Vr)sk3G%LbR}6e%roRcxfdnI;*r$ z>Xf;1MT<=aMwwYWJXbhOF9V@p9(B#K{{y22)ll~ao>n~I7iMbYg*&ZJoSqDh`S*QatLyQN4!`jShL7Q8c0;}6!2Ef?*!!7;?RdThRohpr zx%gY%Ob5BluhUIyZfTJos|2mBZ*T|TN&f8eQ??<5e`%Vs zV?+=>i;-k`uks1oDfc^i4fiiiqV2srO}&&H-@liLZld7agKs%!*mw4iGG{NLzSlL?{##?Dl?RmG zoYa4eKX>F|`UeJSF-3V=C*1}8F{76ijkWtc7nYRiUCZ5k-unFRyJySB#t<{n$T37P zEq*~L^%K%X?5$Pb`_DYPG=M2{Tln6vT6^f=4)p*w_I$AO8T6W<&1fs{7MrO$M%91i zSpCZBukSy39Z@Xf5I63q1u+e~Ta6gI`bNwE0*nWC1U<~rS3|`atb=|1Q zZdl6+u`mWVd(7~mUT#^`H^kF)W@i|7GW4mzVGdJsU0+y1yskdOr=uq30hw1&IgXT+ zb@**bY;Ds)hM z%xTK+NDG*>WK5mS@G`VkkXiY(Za2m2BWmSl`@*g*zLMXrxu3*s?ZOyPlD#htx4@jP zj;0m2eEIy&TsLE63(o@gq@Nmlzz{bP27K^~l^3u=`I{i@ zY08Uuo+y~Ux1iJ)lpXHpdY-%FWcnUFT$-q>BM@Va7>ZNHbH6e>1AKqw-W5NB%!|T> zAbSF7O&y(69${c?BdWO>JwS@OZ^{icRZ7pKHe_$a}}k`O$CKeTj%dx zaVy;VWpC;2{+lcQ#MJn=I!6?9C7>rs@Y)@5+%D%SAGZlevE8unw)2eJW!+y;UD-Nuc2Q%mCFNctdNKqX%vE$ z$r(sJ=MOyV#Yqc5o?Vij?@BS`b6f`-kIPT0JrO=R@gIf?7ml8ho4BxV;7E4KA(Wp zYdyO|4;40(){(_nx-a8JMcG%RZI6K?YU472#;K?^bl-x*WGvYjAW&9LPu5O<&%*pC z$@4&W(#r}F{G(`hfkIgtCyVcX8T%{U`T$&H>(L2#@ABP&4FcdoVS1Oyelb;o05I_u z*r9ieYYDKU#1he%dx-d zJ?q(!!F4gy)5y8yY?o}=jO;4g&H--0ofq62r+&>$1=11VyIeXH?(bgYU1}Cjo~T)F zOY{BA;XdjN@J8dIHJy9!=fq7LVTw2WkE0g4!_9-F&&_~>6=z266(TV;LBi@ znnA38(ti*1&WAx#!_*;B>SDC()X8LJhfDmnX<^Pw(l%Nr3rP319g3xP1%PiTb#bL{ z>#yv{_l?v9=Yyxto3v|EYS7cWibCbPyq(1){DUK&KKDkL4nG&g-eedaA}uesH9G43 z_9kW9;da{@S6j1$j$Gd1Uy=WzPMJ+qGB`2$SGa=gONg23Z;oB}GOF-FOZss|NPqx~AYLw#NdVk*YgE}fCa|UwSY&cS69V7V4?*hgR zry?`NnMf2e6{LtmhYGA(W3QYX#r)X0Yn??EVIRCAvYI zAZZDQQRylGt~RV7KjxYwh-QTzn;ilv`Ae*~y1+c8gNO4({c{E#auM6%viGqeEYxYG zoj#b$4#7>MYh9@G4)-rHLXczA}o5(_U&?i{+&LE$1&xS$-F<2w%u2 zhCbrMN8fA$ZlSfd3*X)GrPxd~s^Pe#L&zmGhf^}tCo~cd3H^TNzVt|%s76Yc1jff> zMxb%jncb91%6@d#wdmP4MHf%LK{cmH>6%lZKZnonz&1eAnB6@Sb(7G#Uwhc$`%Gr3 zzzAVnhZ z!mf?mvkm8I<;i*8ZRfXP3}Qu`+B7VZI5ri=OxK_L^}aFyfI;`8IQ7W^0WEEKG-q(t zXRcuhaJ(Zk?w5{U;9d^E%)F7p#d;-(5)2OR^sfuk$h|!jMBIJv&RjxpgvwL03}ntP zfDDfLUAbL}&4w@@qs-!pGaM&lPJo+kCobnxayryz*v1ts9~DHtD|8raEpq(bUCg+) zNzZ>{e;2+hvDA2E+U0_s5Z+3-dG$(7G?=r0^tx=6^zO7RRJT+;^jdhDNatnA;jwg4 z@vJY4v2^Dxk6Sx;I=egU))~a@@lu=1wKsQ*U*0aAkli@>kCQ2AK*>?2!#{h3_#Rjz z$B6q@#m2^+kKJXREU2@r64e!n3(?*7wn_Z`bmYSWLTe8#rPc@MJ;F|Q3fA+HHv~WFuGkUiv`S;e<3Teme@2* zJBod4WyIa<%Hn|zr@uxpygg5s8;bHr>7%gH-wqWWK+d z8qUO?RSx0%4NlLMrDO&$M74%grz=cI41@T1EtPP}Ytaq<8F+3P&CIC$!saQ42bDLn z_G6rlXq@pVgd!ZCa1Bj#5=^I~feXT&!DQ2N`P`wuiW|3#Mt8Z`W4MLTcN9RpVVESm zq+gw$+Xd3oMmY2Nh1!Iac1{kGdU0)y^j3qL>l=~WqDnn65o(VW#~QPE2Bkf=bvn zKSk$HR|Kr9&59hO@7%xZ*kRcvc z0B*(%68}#Xi>;~4M-%CeG;(|X-AT@fLeGp`&+k zBzhdhbfN?=OIVsJ`&Cx1dU=@Fj$n5;5WWoo==vh+!Vrhk2PJOn)8fRD5n_DM_2_zS zi_2*h^Vrt5t7mx0v!)lLt>t#*Nz{o}uOt`OVh-ax{VUNWDDu*%WzS%@x$YCzgQ@Ei zbkfOsnLbVWGrSR>qeJ{=yR6^jSnC3>W@B5U9`;jXLxc|%e~I+uyH=y1L12!Z)sa|c zA@3sVmfI{Vt>=oYiR?p8D|Eq@Y36Vetn`Qq&`V(QOB6lhMN=+fnOSNLy_wYx_zLt~Te%PZ!-x^9$(fRLUGvW- z6sibKwmyB%@sbhduGMe^B!j`O&Xzx6D9voiL9g(M8 zIlptN(cWMVphw0YAWjgSaEi{f=c-w(!BWlgi5yCoRAS_}Vy=w!lHfW+Pmhb}$dL?E z4x_V_54;&Yj$rn#+n1ZHC(ie^@^Sa$T&FeS z*tnQxgVsZ=&#HQ(FV*P6>sYhpJyy@3Pq3qJNv37a6vKY-SFc{9aBX4@IuijgnQoCb z=E!39;W`L1K2MY#l3#BE&0xfsa6+@4ruXaps_OlhSyc^`^*+`v)EVUaN@ZR_gss+6k(pHjo0#td=xiQ;Vwm4*7{ zJP~H1?3}upwLXU889u89)@gwObS~urVeKSNGYTd~XeaURhiyQ-^a!AuT)Dd1A`hiS zo_dNRib7>|YVB5O=FYf8dIi=}QAfBS?sv<~v!;q$N2LbkFhQ;>stCFuH%_1P7dSx+ z>*_oUHY3y^=YNxCiFP}{o({a2_vO6^&60BQm+6v^oL9_}=^f? zE+2c!hr^*b8@2{Qi(mUgVoWW#pIE|e8ABRUWH*Y@Q zf5t_lc6QxtKME8WV`B`AgC_mAZ~PjmeZ4)B6ZYT)m*ln-R`XFS{2(zl(ZaR&=E@X} zUkMT0%VAYg_u_aHxx|kn7VfnYKdgj}tv_!su;7$SpEA97kTo^A-$9{2b~5MgR_`E~ zf1g72^2M;Ku0N-U|D|F8lQ$j&KrF;5p0R%PQ+C7G^qA zLlM_oJiEApxh4^pFW*z?zak>wV9u^~{u|G%q-8J14j5+aA))(GG0$GZ{wRbAw+ek#cWO}vFCKu8=$WLh{Qlf%a_0OFsi}mdCX*pIK0edrAs$lA}Ojj=w+k->X zX3FV`zPY$0p0Lq4lAgo9zF_UJ?|bt+O0JH$?8n3ej#RF@GMed1#tLK4cejK3G}DhB z2hT)_ccElgh%wFwPeHD*%nY@n&{m2D?JN^5BkSG-nZ)VInUhIhYaC*C|JvqE#1t%640|Jh7wkt2<{jJES-GH!jK`(WpmPyySZO6cO)X4k zL-MmD#)SF~-Uz-5$3>16tEj~Iis(g#mF?Y2=30uLi6$^5#Y$rv+pA%lavd5G$_5di zOd>ZZ!=9SV(y37j=t9IJ#Hvk|veoJo{1!e-QEqy=HS-=@2zhQ~UiMM+5ZYkN4(q+4 zX`!6- zvsq3OBMMWGx_0RNlK*)n&R4ntF6=00!2c4FFPhdscW!MMSf(#4Q*@hEzY_H|F?d$; zbhr2XaF|Kd`d6Qb?`@)Td;6Hlj*hWm=}^&#b82ZzWQx&y>YfqS9v6_!x+qGF7WSi^ z$0hXW9d6N31n>JeH_UmMQg#0jiq0k76IapeAk5uI)7roJ9Cvrzr`ckaxN+XAd(nwW zjRMUF- z)|y72K(J(zd;B!F2yCErK_6AAJ)x;yG6)IeQD)@8SfH*KVTfjCBhPw|wfOu#{CZ@? zT0sg@5fxftGe}B@$+@=A6_1ac55kGgmig z7V7o7Y*y9pVC__rlg7?KAIx>GC1vv}_x)fE0Ky#E?awGMHEthLL!*{3b{p@jY_=%K^IC^n{Q z*;XU2bBm!Zsews7dPe6-L+_Dx5Z|IF3FMvTYJ>>yA?r0a=`m^bBPnvTIT23NIqsJ> zl5IVh3X`Ty?``a+Z#3k|JvMxJA@KU8*Ew&DuCq@oHr}>SnN>-9e*XD^Z7DQB`X0(o zF7VbRy>K^F<1xoJ%Hd58qj^jqXs{Po)mB$C(ll$#=^IdS*|7MuzJsp0wVo|} zG~6BX4r}eD58=^OrBjjhPKj&jWWZP-DEWC%AHuE-({}oYh>6y(&rB=&jN4?!AL}6` z0=9po5DUDnXEjkUXGC}wqUQR}{~{B1Mt-#Oi;!c?{mu?^9X3wH$i553@SWO(iKU=D zR>b`-aLjN;m}mGNEKZK6n*x|e)!|33G2z z8Ha8^ZLZk z_13%?>QbBOU4oQ8`Neq_$&E8^!6}lPGWzXTTitA)P>wb*xZr*`f^aST&5$) zbw17wM=|#}h{`CYP7yuQ#ewh${~_=|j_;#))@hx%d5yhLE9BMP%`!7%jifu0W;B6W ze($3pH(zShclb7w8GW!OnYOzWL}c`hf2A76SZ8C-xT0_H)WA>y_GAueX5jq3!o}kN z1yR$A4}&uZa+RoRVQY>0cN>L&(g|fsd`HHu)1H@;Q$dX%!+!-+Ok{*zpY#wb?UD(B z2VdiTBRAd>ywcY6MS!fB&T5N9!9$6L8pZ8YS8968pVMem|Ev^s|4O%~^5s$XZxn#) z*}Y#~mYd&bW#O9{y>TTb!pep=B~&t!Ri>A$6`lt#^AJQk&DeMEm2#`*(;B{u+c}#g z-KI9SzW%;qgKx>xk1Z1ia@7te+}haOrHN_h#2Y1`7c-7M4i!OjLltHF-OaJ$cCU2E z((B_{uGri+zUp(?b(kEJ_te4L?S~1@JDV+D6@6-nSxRNd?mu#4MIGUY2bruv8&N^#U;_>hh z3&Sw(Ethtu@!<}B1GR?tYsS!Z?Fw7i5B)dO7=cycL~;L~HVz*J;74 zliHPA#h&4FEeh_MzgVV5k$1ziRf2=_^YcFnwJ8yCrIfn}j-N23nFA$5e1^b zs7v1YwAzR}8~1XTZEPFNwW0i3JRYX9ceW27ufwdX zpFNRl_j|9|IfK^@m}QJ76KcO5zvXJ|vu<{+qlbA`W=vcz2VI!u>eqiD33gZO!Q~{MyCANyK918Q))2>Q;EL|ue`!dlBJ30 zLEAx;(s4B9?ZHIUn*-ho)Hxwh#STm zzwa5ka7B6tVBLkq?myd2X(AxcRzQzKwfPE0Bg!RX$4N0pzmBDcydiP>TNCQMr^4xx zOHytY75Rkh)~5?O-2#NsHPgUp)b%rx#2|H=)=xIZDHz-Gjy#r zpy6IC^Yeh)P}UX2Ef!*(;c10zIH$Wz2SKj@YF)MS}7FM9@#ZI9Rh{fA$PuIu}Y z!fGbi7KIPcc|_1uh$yZ?w{^%glw&S}zHudY#iPz#X*1gIsA)`*vFAEX9sg|Sw{I84 z?p7AAR&VOedv+gdX!y=?_b@VYB&I0WQ-`nNq!`7bk=e&3^jo$+zTHmL<8MmP10uir z>$!<^yD9f?zSVYS`DwOZYt=!Z{jTT6G1B<1CW%D%e#3yI3B+vJBc($T=z6z) zCcwB=|4h7}h9vKXqoQMy89>JM%W!IC142Z!_;s#m-Lg36*X)$G6@DI)qH3dq{cWSK zqSk$MhUAh&+QTkgd~Ns5676_thRFDI=LEB?I7{;}-z!x+^^$F+kD_0KrQ;T^9| zvW85p73Lr1wJR)@JjA^>%Z+}|?dEO&C(wBo9p8bZ!hyu)i~o??-+lpEyHB$ikIXM* z_Bc_c2;%_mXWx&C$)6flj|A5DM&pgS%%6=af%85jO(|9reL|Ya2j1D44I@+Jvze>O#F4~RX8t$IZS#oLb&}$RC+W7dUl%8 z?4l9A@9ptIvsANF@DxEo0iR;a3$}Tdv_hvVH&y)#Sxx2`>F)ysSTexUv!BE%h~PKhZX2=4KQJ2jHK}8kWH5ex8vhAKX=!-B+%b;#eb6P&CqNm}!M7r-g7#iuXuS%Lf&VIFn1KbmW3*b6 zPhPyE*eRn*EF*o*pzGRf7Q9##>QX_4Z754AR@ysH69VDkK}nn3dR9*jnq)E2aCpQ% zsPz_M_h9A`#QJ7tUfh&Ch@q5j(2;WXPVO!v*+~2;Fv+Nc-76!TVZcxSyr#(LS6&&A zE2~BBq&u~;Rn*Ped?o4j-=7 ztR4J+?7e4HRN2-wTto{&a?U{nlqixjk`yJW2$Derfg*?`$L?PBkWUC1;xL=>_BtH8txKFwINb3;W>f^?w$zFt$#c-(#C{o6VwG+cPjwl%k`wIqg96hg;7VV*1v zEX*R03kHxGMA5@9cIAdf(_UuMi1~#q^{W(;l@H<>3fslPnEA#xs}(rqN@Zu|o}O+e zqE;l$#KLs~jQy!t<#84Wfi_c?;mC1kKo!=hfTuPgMl)+=} zi~}<;;A{OBa6NX_CdF0@?~IiXLj7DDrg=hr0#xX-##^^;B9(8MR@ovh5C?3+n~vXb zVnOdfy{HVICii!p2$74iQY%5!nDN8d5G>_vlhwdcR&8bW48BrhXFa>wy4OvKeZA6{ zWTTi8yzPhK2(kEIstJ=ZjN{qJvE+AJx8GKpP^OGI+|3Ucb0dt&|Zm z@JQi?=*#^#chvCYKdjF*ib;CXa0KWK#Xar0p?5FT=LJBdaOg=)HYt@}&c5C>Ck$XC zJrF+VvQMVRXL?Si1l_@t+w{Zdwf8hTbyc{o@K9k*YJap>AdS1SBY4Zl1XEt{v>pzb zid>-Q8Yz7er?CzoBSh?LYK6M#A+zwJwXq5+H^v|&JY5_{FJKxFLR+^TwKwV1SwJ~M zG_#YJ#IRVq5TG}Z)?$yy*VV37=Bu6bH5cUPHl_#e4w7{A(0znRO9s$2 zII1cUGrN&?fz>+K;K>(u-pkM~ya4;PJ1KblR5601U88i+^-)y?ky3E)@mmrnGEpD^ z*^WEd?XOQv1P^j6*GaEZ1G!o~Q~zVE2Fj@O#)c2g&0!Q=7ioJp1PG+y0T7}_hqW9_ zRil?J;nApBYRqGhV*r?0P?`D)fEYSFgIYW79CXP%fUdqwgQXvobrgT2!4)p{#f??^ z+am%^;!!ZAIJ?F&FY_H#15X#;W=@sS3e}N-9$h-c6QbQi(-LE|Q$7R3em_6)u`dnFTNaq=-)Afr?FA>gUx>E$LB0PgK0m z!UcD}r4ujbWjm-<6T6Hp!m*UQ`uJJBDZUdcL14IIl;?CXhd4%DQTYPycw>Ndx`zTw zBd2^J+n%OUX=m$`wtV%8w+pVWY|?q-A}z$r#E|DiOlyq_MwF~H^7MvX@V6kr%c_9FR^vKwAq5c!69hj@lK; zEj%eQ<6D4M;ttKFW}L(bdk(v3apWr+OdXtuo^7BP8Dcph{eIrGCHqwv<9@p!qz`73vL|DTcFddFQ#M(YFUB9C)HJ6=Cp8$i_xQcF{ zunLT$ZP~XOTPmpK;;zPIz6sO`U3gkpj;4KCTny}n(AC>$Yexw}l5FNNcZ0|zgY*3s zgdE`>P?WxEe20_5ZS3_8Qi9o#fuPp>DH^dyQ`RRg&6wlRna}K9Qs=I?8V~WWd^XwZ ze$FJ;fXJ==qT`S_-E?}ioKqpTG?=1%ZGL>p(D*Ul(F~b+eS|x$9Chc;^P_`P*~$4c zxypUKZYq*Q6+CJ@Nk9@_tM;MTXD|znfK+-U3RL?rn5>nlS81Nt&#J^Op#H# zd2xOaNQw|+OSP38uUDW37jAEeDCm-!by5>^VGwx`K&gr5C2pC(H}POC88e?UvoF&V zC8#0S@2dBqzk92qaiOYR88rzo-eZR?=9X^V!G=5!ma{3@PkF`a34tv_f zcqRAVdGXO~%}-SVg`rNicTYrZB6ASuHhP*=iP!a;WA~<-T8>&PUn);-)T@@NG-65u zodJcnnzVCoX5|lgdy3Pt^BM2m8 z%>R5nbb&X8uM3kjh0gDiVL#jpam6Ho#70zE*Y%-ttjMf#njE}|jmr0&CN0ZLG5Pv! zs!bvj!tleb55OU)F_5Jt~+lWhVL=x7h=iZ30q&bAMVZJU^ z-~6PAP_Pd?XUbG57PJ9>``q}&%U02dL^xhygv0ywh;Ascz-F5=v5OJMm+C1xf zARSosgKSR)jYy-yH>ho}T~ z+#eF`gib_w`mp&4&;{Wa3iTW?=X>qBWeZX!kZljh(20gc+$gjVMF1R>n1EW3fSdob ztSm3DL*k|fb3LZ~wbRLA47PdQ!p3!|W2kVwuREgL6_@`*H|c7}$!%?^`7byXwrI|xlZ|l*JMRwghUHdp(4R zoYFx{y6u1kqWuS@tFsHbbyanaFF3LLh2|2TsTfF_hD;5NcC_!VaIRkGZ2Sfx z@(R$Xv?Q@CaXC*1$+f{usFd!$B>6c+)db52O|yl=tEHMn^BL?z$g$aS@YbXEkL<@^ zc;z6(*^m#qg;!cVC}Q~LU`C2d@P{p&!5N5>tH%_wMv0`;fYD%}-B!rtHQ)kT4 z4dQ%OmkbK|pNw{kM0{9Xc1TAbZV(sUSS3Og%@^WV)z<vokNfdy@BQVcWxaX#;xm=cNB76`g6~yb{;O&I>3AOk$h2obpY+f9 zX9lGtPycJj`vPBA;-aaB55#;)WaXF>s8SQxbCn|RlE50QYZghn+2`yRTDAG$^!9S7 zBjIHeW5(9voJUQz)}&9*j>8=1yYHMK~~<094)a-EMOp1BCB^)q}(9sQZP0 zkm#l;(KYI=UFbCj92ovB=J3aB-z8aDTu8skn||e=zui@`#nFr)sb~85630!7!nU2y z+P_?=e>QW&h(c>}H}N6Pz-Plxp+lLz2Gjwk_ep{1EEC2+4C6J+m-y~gJPFHlnNG-@ zOQSN&j$|pZLfOv=Xr>1!CiY&nYh&V)eJ%@I@CH=BHVPi!qQ3nRYrYaSNo#u`Km5zS z`Ryy@>dY)U;n9%+k^fpA#?MJ=LtYC_-3Mj{V8)eK;M&Q&zjDl1UG1UbGhGk4%0cDe?(&jAg7k;0FYmN^Vs zm>p|c!r0S6xK=pM7+*PZiErqkW3(Niyu|`CikVr~D_7X3ASt9}5+c_?>Oa7a3%kY3 znM>=tF;V4kTf%g3L^#bt%9?lueS_}uVY*I|;mH1{lFfgl#Yt9VFEKTWTJBf z@9*{BE+C*JNpk!9H~p1raL)&XhflT4pYVVE-rs)(3-a}k+xVZZGceJm5)Q7W!C!}g zzy5g|h$Z2F`>?<5(SN;0mVy}s`OEz9CBJ`uAiuwFD@4}u551HBSkQm<^-mBq?BgqU zm+Bv1`iB?bLf&Ehwpf{2*s@fP&kN6z4-ba@=Wkl;e2Mr_#I?BLe2I18ZB&SkG@6njzV>oD26}&lO>CB1#zqQQ9;Vw zhl{%MD8gS~0G$ldNs8|EI8q{#8&@ zRPEj-S`qnVxXy(Eh(gwu!r!LM{{5MWWw1XLVL(!3Om|;UT(JS(3&lXX4=B0E3*xG% ztCuK+(&_?bz&O|V*jPH5RLTXO8)|CBXkSn;duJ&oCWclfssKI3EZ|ugh)d}(jw1wa z3kcp9(=O@te5-=BFS>Zy_48ffS%1~SbC{6a?Di+*$9IU7Q>SudD+o2nZF-oMRK4n??9fS|b0GQ_ZU?v;}ERKqe>oE1IJ<0?j8NkJ16^vXI1HcRkB=StE zp6x!F^bGKM8zxV2g`gOq3wgi~wS@*!i?$jRA=Y5 z`8miu82`BcU<<~fC!dKM*s}X4aT;SJbXNVXiJP})e(S`T{{FpK1a0@Tt=TV~{F7kLs2ELD1cKX3 zl|w}rWxqR;CVc$((e^Ol%^UJS6dyxOHV8kQzOwRPuc=m_lDA9D__8vp;7oKBjLMAL z1S{_qH~N?B$wyN@ilK=jmhAfN%>OM8v?(PqyMzq)2t~=bh0WCn51*Hgsdj3<8a5rd`I6b7XAN-27~tY)spg zRcBoBPb)VGfqnk`&1!x&{?@8>0#(bq>9fmEwSTF-lX~#(N?<|YWLs$OS$la3A^&^7 zX#q%^N+*8@rl6)0C-8RZ^hXPBGx?3!;U zT1dBHYVr}cG%7XR>+S7r(A8&fb8~BME-DOO9(scgp~lK2D&k%~?0s2}-R?`min&S- ztW@27bv@ML|0Ev)C9{lq%taLU7_Z{m1*U$NUy@E=QFe{2KD~fVFl;yiW)EyZ^VuF# ztff?(yPID*!$(?&!ExG5z97+{qJAT|(aD(Pf;7YzC{4FM^S(LT||B&;m$_>sM_H|wyr zH+D9_JZzxU!E71O7%l*D#7GLU=N@8UiZT~y@s>-%k1x;(KaC(b+5;VXU0p?1%5U>P zF0v6shq=a+@hW#c;E0B}3fkPN#{kaD0$Rwmw+dVT&`c?gl%1}V;x6+fLtb4HxheKU1ogD2o4+W-TYEBZOolD6<;v@tZArxCpD zT0=%-420O!9=4D%cDsY1BmAg?nq%?x^UztGO|WIZ0+-#Z=&`fyv=&k0&FLm*FvgDr zX6uvLw^dc~15jLhV7gFrioqc=NJwOjR7X{exoy=3=u^=%J~&5)>GEvw|M)eDp@02?K>YjwQ4{Z+1Ky zrIw&tqcbl8BmGKY^pDX#cirbEECyXqe*}JHu&n9x4^ao}1w5$jm?%_RbQDT+gWI6U zM56zL>3=Xpl4waRd%uzHBl}-rZpyG^Y6>ltmj4D&{(iIX`O6kvg~-;TK(8=f$1qjt zLi?95d9T&Pzo5;(0`^*26gw^<&cHbCdgYOr5%A0^xdo}0G!;$QL>I@mV}-xsO+puM z#|jml@Er1vKn5j`7R`J!60N|ki3!1$6{Fv0*}-c-0hZ1PS`D@>9X32XtUsUa25xXD z92-n@KF42I9|!hCL%<{56u@Be$#t@)9Y@*~+Av_}8nN89^Ic{bVE5K&gVJ_NVg{et zXv!q76iVVMA9ljUE4KjDb+Z=u8?02UR|}3PNT=YxY`tFpatibipR7tx`e2Rr;H(9l zp|`3pgDi6%inm#tSke)8cK(V^`G8H+kuhrUy^gai+14G5K7Pa~36)-eFeM{`y#{7~vfTO5Z;s)c*NI4^?pB2cjTk`j> zG~)lbC-ya944cE4?V!YN0&V}LN3G4o!pP?qum^Nb#FC|+By9w&cc(rl`$E!!hf-g3 z-y&p^9_8Wi$yGxuo*1~nH|g2#qI50d=UAZu?d(0WKnq}Hq*kv6q&I7Qz(z)&4*E6R zMH-d}>i^xfF(d;DNc8FtziAh!-zc%_Z<_<-b~%~;dp1M4b?BMvl1j*F=q+kqw5_`E z!`7Fq&BW9yD}e3Ox#4R~D`IP-eDWP?VJu7Id9)`$KrelEVAf(+=ZDiton$EGc3$D? zz+VZF{QkNBc(DS->~DrZd=tJtFI9fp(#z<8%+U+CI0c$1t6 zb*CyzBr|R%R#KBOSMLK|N8m@W*v8Cc&elv;&BWrhI#SemWkQ*3!~D(~_+c1>_)|_B zCM6tt_rtkp{Pspp-^P3_*YRE^$!(G)-DZfo2Wg875+-6X$#339J}8}n@eS85uGXn6 z)-lT^aU6|Aizg>mn_0?w9R(`OBo>ByxRrs#v6t2bkpbze%g5PCgn_yLsF;`=-T#NG zQR1y^kpM)tRcX==xQmhHl9UDG`nX60Ajt*GoMV9RRi73z(Y|L25wCs5{xe;zU#oJ?8)kfTLiSw zCUi)lRJyt`*ah6o@b=;R)CBf0B_-T+gEr(V3*hhOu*-aM?0l?#q<9Q?ffiu4tNaw$ z>#S9XJbEi+9Tg%!*}i>vQZ4--Ve^;m{rf%#7tZv)R%Q^0R=@_xK)@J<34;lp03Azw zfKPl}oDG;B565>~PsL*PLZ^vq;@IH-?~1JTrO)JY(WCFhS1%>q>eS@Lh4fMJ^nccM z%xtJmXeFcOn9Nd7@sL~(<|U4)6p=Y?hWgH3U?tmS-BEtA-*;Qb8-cG=?sKBwpd`cj zdcCPgAfIvdf3L`Gj4=BG@#fks=r(OUF+xJG$`B>-31G{d@pYTOZ5VKd%-5qBelT5NGWYN-H#)e=gvl z4*^N^Vw< zQbg-I$b7D`l1v_kXLyf1P9Fy56%=kUnbGA#8PO`(Ht*RH_&{sJ3{7%!o8lKW-YL0) zdbF|KeSVRzo8(8P_+OXL?@Q@&Vr@>|`jr|6i8LJO6wpK~5)6tn0j{`D#y5dHbfNdz zc49F|`lvb+Huh``Pg;%>IWbn)5M(@%b(gj!AlO0Hx0$O9Ws-3IjQ=%!GCU6wfdS%* z1zLLu-PA>AHzg~OIXl%Q5MDz>W$6ZTjO^5(K7%%cCC)%z{YjzyLp5ST1a)ct`OsXsEw`tUq0tUQc?U z2$6lsL5_;>mhO>0*uVk~fS4Kw0A3Feq9%P1QD!mMXb+O{rf20F{4DNrvmYpNb(8h%%DUB+(qGcptKzX6q zc1(QXBMPVxj{q)##b>AR$=d-CKCc-e^->gIDGe(UZ>VBlv;0=eTYX?Eu|Mhu*q`DtAmba*BlOt!HoOKrB^c1RSKCm&7ETb+^=uzHMGZ8t8%fkU zh|GXa)@i6YCYl6IrD**1osg0kbmC2*@i-_vBsLq#U_cqgHt{5GKX!sBdO2JXC>>WT zhEVS1c%QasS07o$0tG6;hdQP9CMG0(p;Rc_iq%KaMqXtVjCl!-Vr@Qwb`~bhllTiD zO|`rJoKPs>Eb-CV!!ofl+Z&Lr+}S!Hr~es=Fz|c5Cxs(#pQ+TW%PhZBG9=uQIl=y9baIVnILHhCP4d9 zxC727tTRqbjhF*d_Q{ic{4d_~F&5?9Z6jwoT=v7UV)*US#Hns+Swc2mVV9;NYfT|qm z1|Z1!p~hdZMrdP1UBE1~=u9Ax>gfgoU~7nrmRH<>e}D-n?%!vU*@A+O_nDta?jms6 z$n@ug0`kZDiqso%nDEL@{raAU`;E5YtXrE!>dMyDU~bi8bO}|vtpM7p=YFrI{`P`c z53~OXo{uGzq-e9=0vSbaJyrD?wzw4R@`OXq^7-{r&Z6 z5o3WLf@3I9u>68s{QBbGz7lyG?2AY#%uhchegFP0|8Zyh|C{N@v;6=5W_o3&5%gPl z@U^;btm><4=;b@N5R1d4O?<+ape6t9Z9o9FDna$dJRGBgY@oCA+rs$k3yocLNL&if zd&c<_vkJu~J`y?C=B;Mvdpj->MmBGb?1+qoZI(;wC6XCkf^dDo8%R=0Df$>~Y7pC( zivjD&@_h8}J?;R6>jn}kKm3ouVfr1|sMF6}`$YeB&o62aLs4{C-QFWT^zP5vXx*)k zp6OKz59V)g#S6&R<*-1YSi~}TcBtAp88PCM-aDk9AKgq@9l7>3Y~64$Z1Dk-HjP6s zpAzySaZ^k6kIVWmu9<_dNkO$suAZ+*Q1Kz<=PRZoAuLOdPoCI-6dK)1R#jCEsrWFx zD&uG#c6uDrzqdh^Y11(8LA5s_^wa|H08>fC!(PMx`3%6vs;IKXQz+6UMLno~dy3mD$)b z@tJc|lF~r3$>loCf3C_tK{0SJvRSb{+Ww4xjX@9=6iU#o$l$0(QP@J4f)rKfKg48% zI`xQ*M~%qG=G&*@WYYW(h&>59g#G)CL9%h%_rUwBgzCz)EWJ?;mqzpJ%nWyrZ#nxP za!Ot&oHmUgK8}ZNs^Zv4$VdL+{C47DtWnYJ1558s<}0DC0!Z*bllcp+?T%M*~-<-$aj|hBj%+L z49%Q=xqph%zVUuwK{~%M(PI1gJc>npMbdMMVr3qfC}6-{Hkp!TgdjcdA77vwx-{mD zFD)T_tLOn&aQ3OA_QFV?>}X=4aq8_8G31kNEPo%%n&Lt%%9hf&ed3&Q8s z)zqBzOihVPn8Ot7-}+@>1`32B7C=cp_VzgHwDguhf`WoPLKI|)@qFFkAd@Z=umt^>_wU~~8F1tm6rhU= zZP0{A+wH_QI1ILG_&j#JoBYQ~)`l+DcK;z5Sp!LFn zeWgjn7t{blpe+ppO;usDW&*vkC-2dv&q#@#9k3$gZ!|<;q_ATTqI-j78vvOpQ*Vyn zL^l(!oJ)Oa{{X<+w-cqu_$e3rKE7so5&eb|$cB#$CdpyBcsjtiJ|b2|XNoW0wc z^Rs5*QjbbTpM>;h8z6tE(~p)p27*yQgye^9zg(VW$1NMP+*8WC$+_iewOW~Kq2#Kn zH!ho=+;jD<{<|dVt~I9OM6tFt`BLSNBu&=oBEQ|-Blkyb50Ir?8g*FRl7@HWlc1~P zmmAi^KL_vPBOq<>NU_2f6L@-7=lx?xUNP6#N%RiTWYUuhU_u+yzBm@FW+e_F-A;Q= z^D!~~Hqp2==qjfHQkZS#JS!t10Qc0S4RHiDgV5$XG?AY9ZYa~e0HTH9 z-F*NLl?vAv0{BZ9w&j{5(>s$ln8iPlulLZ-A&FP-w)ahffZR3u&0-a=W zoDlDW1}6R4=ZJSSQB@B9p2w>$yjL5+OvzNrbu`)$ICU&Q{82MCh|I2?w1+7bJ3D;v z+o5Z-5f~`sJ;LBVM?jt1KWTc4WL?#iTQ|Rvnor?rx^ zoFcMP^KJ0ziz{W!lchGla98XtCOF&F6h|e{F36ZV$lVY9%dk%DyCeq=|9-Q$e$}7p z4=1+p0@aYaOjdyt-ByQI@$H>3EsqXDc3i7dnyTetmUt_>J26#$DiEr*h{p@O$cNU# zxFkgN7({+fSeH85i`Oabo~UBnEo7DSW!6|2Qa0-|;FRFs>m8AO)a1zRn^i~s_4 zI;%UkjzqVvVIzfkW?^CJk{}$GA zgvN{&&IS$LzuK06zeH8ec%6uJdKs;KKab(J@{;BHs1^n^2kcPL`u>1c34FX>eVmPM z+Vbj4PMux3(mk=tUVlf}vzfX1c{-n}Ow4lH7B#L0)koHSsGDk=vissWy+W^tII8aa z9|Fe1DZM6yR!Y1t*H>`6SyIJ4PPHJ(-Um9!_FeCHc6K(VvZ{|QE^yp5&A-h@;kb(J;(SF~3Z-?_CHMv)1uugMe{?{au-N)Vr%*zxy!j>mK zeW(&NJJqhb41L<*;3zzl0JGAj#+#}!^4z`0QO$BR;W`t_+u>fCf3&-dL<4*Zka{OF zJV->D%li00F-*^eYnqOwTo-Hnc@RgMNH>;_HzUbAbF7}89=~GB)R%!*`uCrZ$<{u! z*~nf8Mx1&`Df$PA{CnIpK11R_Se0Y3AW8}s0?$=ASG%1^ylfHY5ahHnl$Uz}p2N-H zqlwYXOdW{Usdg^JfUI7el|}-AeAB{A@UWs@y_!bQ*E_a%-I!tu4U9iutwFdT zrmV}qQ!jH!@@g;(9}(skx~{+jCvPhYb5qwHRe#f8>E^iq#Unf_Q9+vz?A1Ky(c>#>;ZtgflBTWkEX1_RIxzk@?ee&E(3kK(MqqO>o=y6 zDdbvsAadDFaGaY6OkKk)^hrZYx)!#-HNR?xmp^7ZW$sp*XM&}nB$W@+JoVc*0a|lt zbzVk5KZSRsWjja!xM)PW4=Bv6C*Ild-CijG%#kh~R*Z&p%Nczglf`zbf@ox8O#8~F z<2l_N=Nj6c0JVx7H{Yp|`AQE}!XuHV>x6rK=>;qOeDlL~6-7`lHc}f^e#S4pa`&yC zXx;J>WL+NoJAhR71l>D036FU2ufi!F%KhNAMaUq|IBIkG#IA0-OSsgtyy#;hE!lae z9@5oX1FPZV0%2--tq5}ax0S}JdW=aauf&)AXDGs`UBT&O%YOEJc^UKsh(ZORQPkq4z+G$tn1EL3cKm&}v|5^M<%ugw5EH71 zHvt<=x4Gx&r&gG}4oo;IADNpwv;xMI-&I~}Yx3x5a}1?$#?>v*&L5c@(?s#713|Lu zB00p?Bwjb5gFq)B_W~X(C2(QL*N{}!sR0%^`i*{o!8Wl6(3q@uH_5RHjF0x$?a<(i z32`00L8WV6$Xg%I(~_Fgufe?vRi*Rqtm9Y$_~6I5B*y@YEh>|+_V!JdhqUFVd;>9{>unxqD`_M)e?f`6D{dS$GNapmrIxinA5YO!~62OgX z%~40ed-ee8E&q1Ljqkhp6$BXzbY7GByx4S60OV;Eizy*CAg9~|07#ixwc*GiVDwaY zX;M{w#AovXILo(9+iq6kJpUt)EwiV9ZiED4tNPQ_n=4>awl_`=6H^+O8o}aJ2r@X} zw!mmHy3tH$R|+SycRgM$!M}jWAWMaggvyaN6BiDbkes3EFX*;>wcFY@fNzU|KS)h3 z5w%n|Qz$?9|8?!ejCn5#)G%$L zg_S2WitLQ4mDnw2FQ{hzg>*~s`BKDg!TLY&WSDOP&Q02SZ~lk(mzuIeJxBVWk_tTh zkfCymw*Qi1{d~Kl0-Q^f~BaIaUCnO0uLI=Wba*{Cq z9cU0V93BYwQy_E&PbH4i6~J25^~qW`c+7^Z-^}6!0DKiI>X3padf`={7&I!$zkF1+ zZ$G`BwzrCusB>KE``GysOOt`mrft{laMU`ds$RF`s8cBKEH>n@DIW(uI!srP63i-yOYmu-gP)sq78IsN^^`;cG^e2B=wbL+bi>W zw$2HQ*_w4Ss!`ky<2yiMGe)qIs-&5d!BW55M?3;5sSMv5lxOCYJJc zj4&+>`wI9n(Rs)10d@J*=IsFMjBo)Tc3jrNh-U%`%twLhlF`)LU`vdIV$8@*z(;*p z$hrmiN2!6QLWsxow&HQe=X(vpIJ>YRa)l4UDq^4-pUIpUVoU7EcfKHK6RvhUF1fbi z4i&B{r{i)7T$mdb zfM0q^9sn0!SY}#su(#|kuZ1u_&5$(0D+$dF+6Z!yVbysYYz^g;0dDCW`6Sx(-Jt;* z2*`^TURD89SU96pT*hAC9d#NcnlgzVx?^x($qP(*^4Mv~V;EY?v_@^rEZxA==~^Q4 zxF=2H<(znNYh&pn9QlL#KzxI1=M-$BylUBKF(~S2!WS*wJas$Rv9$^0Zr+3zvqzG} zP<5k&gp2ulMOU?RbBu-Pb@C=y7>3B`Z7g^!k8NT)b|^1ZS~M;z>6y+ zk~#Pmya8QzJ>6eMcHuQ%pcUri4yuGU_l4&*iY>&=q;N3vvfVTz->5;Ic7@`NFJ2rv z0e8(lNTgyVUzJ$XtaKNghW0mbB!?$lw=Y=t6bAngoI06JuyCQ^ zz|Id@l)V@Za_qtKr{AZWmx4JG?Dsht&t@Bry=y%89aALQFC1XUs;IjVxB}yZvz*-O zJ8EK0ZjEN&(7Z{}sra)oAW*Jm+2UT)O1)Zhf!ps ze8&Z3+|GcqmrTrLRu?tq>vS`v$hMu z)8F~9{C(|Kr%bT2OyX&$tp0Ke7G3fry&%hQ#)X`{XW}DLy{S*N$I6;^nNQpeuf6?- zWZH(--JhM8AvZkHk8~95op(|na0$RnX2hH5$Y*UniV{hpHW}wdqKZaIHgBrBhO@nT zbuKydYCYb%9(Eg@?STceg0pivlp-9C=!T3JLG1zrl)v45!GLi_Sr3^6%3DQ0=+aDgHoN&42wgZObh-Ajd9azXwUW|cYQ|h`4Y3bpQMslWRntVA zhnHtKI$_%v?2D;+uI(MC$Q5uryLHK|do1@9shSL+bvgojly{mk>9EKeN4GAGsK)AG zCIj&(wSakQ$CBIHv8EwxcTWKHfByPcM^C^ajo;+jht^k$K+vg1oC(C_J73j~mc&}= z%=vaSt8Cj4g_iAC*aJ3AWzxs^r6ruv#CyQrDP6`UTK~xne!~!djZ>nsaww|HDeFPe z6T|J%!42!t(!3%|-Dk5G?C$bAujq&jP}30rMax`if}57@XxB5>8S`*UqlXATbMm)> z(gI4LO5{KKQTzcq%3O1Xd1h3x@f0RUK2<(p+hrbf*{n!jw`dH~3m5O@V|Fh7hbGzi zX*lgz#;%P$cvbHEyjt8rs<{%t(*!@fK)n$QVF^e0)ZsP@Hoed0SsEEWewvFMKN;Wh z%OJtR;zLo!2xXb|mhTOf>JCUjzkB!8I`7S`P!zk~E0#L?ek(IN!W5`L4fJTeIv)ay zj4|=XC&1aO*n}NBbkid5;6egzcK$@R{|!?CG;%SP`G8wdNBdy1@nt9 zg!Lkf6YwwajhW_9$CQodOkRt7hwkU|qH1E$L<|o8=b;cCK?b?Vms{NIvaN3NRc1Pe zXz#D!wg3<1N~MRPC&vgkU#NP*E7G7CSGQ=Pyi1bf<8Qj+*iIxSPUo*z7VKa+TI-R` z9VsjxS_aR+TNPqn=vy#0+k;~(JT7Tvn@#0)_}v!^bpW4Q5Hd;I^?bc)*WYm}AW6M~MlZ!uQEzJsE&6h* z^l(4o`b|1E0!@_&GjiMe2kxb}BPO`~7uh=u=JTjfr%oL?SF%g%cd^Vc5Hze8Ak+o9 z7(rdC*UlksEYd|lZeE2jcj26KDHsT~LV|IRTofYKqzWlqSn+(Pgxy+XWXjvpeB!jS zt<%-MvR_5DSQ~3a4 zaT>iF-4!qmO@oZIdKJA1NTxydUT9Z+*c^Q3T5RAxR$qjo05$HkOW?R#4&-?XNm97VhRG<>JB(0*+0Okfc0Ya<$10#IU54e&$zG z-CcH9r+X)!ocymzL&ESi&qArq+BwL$7 z7E({;%L}fN$^%lvcKma}pa|DP<@0f_C$INGU(5b*9=H3=fjfaero!WZ`>e{N&PbS2 zpO1ZtZDj_@$JEoTrb;=TM_f?(&(Rz#D|bW~XMb2J)r1dyZGM77v3bO&e%hV=UX9gM z;nKVqrl4Q3h>G!e1HDqfEXR)IU?7=y*QvJ55ne- z?v0_qE@dxu!YB)|a&@}n>&r*Nc89pCK!b2Z&egm4FjH8k;zJRv zgYScG#cL{Gk?`{2K)bp3Ooq?z8#vt~4m-dt;fC;OZK`pDsFI_a_%mCNRAm;F`m%(J ze7C~;&drRxk^N)CPe0R z=e4P+L#L7zmOh`g?ibq?peX2{jUS0$XkUO4ro#h#6C;%tA{ zBlC5F6~j9qCs`Z)@$Ve&eLvkmPX_TLDm_Lm5yr=Sq{={SCrQyYmJ+w~Y_X9&xMb#qddn$%O= zyZsY2DwLbW;lyG5of90cAD#!^!Zw#Y9fmfAos*)|#DKbW76nMA6Et7rzP2qTDA)`8 zArl9wgBXJ$kTtt_m2Mg{{~l6riAat-`ntoq@-1L$cm%YyYRt{e%Q(q9h6T);MdhkW zuZ93sq!&juQ!m=}MmDG0!X!HIEES8Nj#+pcgW_*V64M2lIG zH!zD>>HV&{vUA*wZ1P@tge7q;f5f+zNllInR@b(>chXq4H)~O_TKxJ*Czi7vD`0!E z;%`_Vvi)otJRsC78S-vD5kI*aJG0^#Ml}G)cm)w`%Ho?cTjspS04yjb@n$e-=%TYl z9SzpRJ*QR0c{8UdO6EBUzFQwte~8B2QQnU?E6nf?W%VaPjOI#wIMC;2D0{1#q=9 z@eGzd2!$H=L66VSU>fiE%C=2t zQaek6e7&=F9bi)>fK+#uz_N28_0~L86?3D6*w4cup)c76xf5B_%P(Aer3yd{yyr0@ z@G3VDFIDMSQRAkJf-N_e2Vgu81rw`kSKD6Wkx-Ez%HV5$)6K1!h2AQ z5Epaji}E#iq=v!3lhX7Uwi8bY$L3puj1!a->XIAagwLCLaHKgx-HmD$*qS@+$}c97 zV_Nra^gaX9 zp+w}Yv{K9mvQ4~Ey|&IhjH`YVi1X6lT<*5q4gb5v(1CYX56h=VWotU3NDG`uX6RIQ z6n|nvRl#s&er|pkC^3#575Seda^|aPKh}zl{^CkUBEBDEk&p-a{x+G>CHjJv-U~beKZ30$ASBFJfH>@Der=QF&NeVUN_QqicCX3FBs5U8xX&# zU*|fHEGqVX{$QZME%dzmVwX{*b+~8I$N(`evliL;&sZZOHwz5quzg@RsOzU5BV1ho zWn5>WGk)x7RdT(Gvu&NL#thXp9$%{`HBUtEtreA`*e%~>omC4bUR~>l zRo>~2Ys(%rUHc}d2bH!GiFWV(Y`3pc?#GK@V8(+cmG_%yz_qsFj&F48kb9KPhA{+m zCNBAAc-AQfdW)&gw7kM1HfbmAc%+XHW0+U`2+th#FOzuy-#~#q zUW0Ol+L)HdaYPI9#BaCxY!RWP8SOV@OU?9Wwh&%9Z-I5rKL zhAqrmoSikI{E4Jh?7)2H#mDyaw)FlNpMx1*-tvcfq&V~MyX~Z@F!$)$m~v9Q%CZ5Q z+QC!_aEzs5ior~)E6?0^dN`O2d=FG1d0xr7e${v!vRvz^pL$PQ_x)#g#>_?9xzMe* zDk>~xY)n^VjLy(h+~CW1&6*K6h=4}bT}Y}G#_^^&NANTl)#SYBbt`mm5lCGDV>b+3&{hgBf!Q~4y`}dBlM)n194#d_UU9d`b($Hm-lqZ|76hgB9KDFkZm#6yuU>kAB+m zvI6LT_5fMQg@Y#%pRhm^%-NLTVe>{)8eh-kK5ok^Y+w(43!F{z;sE$GWw=)jG3cXP zXpPPQ^I`56F;GKH#fK2w! zz=|@9ft*FL`gDGFdZa~G_~9nR_o3f1c*v`M5-}+WG{>~opGm?s0yBUK^hdywj##+? zc`J|?Czr6A=wd#~eW%X)0JKKnNzP!KvElhx;h`I}(@u%6F}J)%%^GG-#;*5pcrTmy z-Z`8hUl*xJ+y^{*=telb*ws(kd6E=2s5^2wx+j4HmfC%N2SwJ}+s5vOWDx2rf^%gY zd61SU9=+y?EQmg^h%zt*oEJQA&Wwbv<|i2 zFyr}pKhnHJ+(6aLc>6F$On&oGw~|q`N!MZ?H|~$MBr$^m(%xa-X_?t z$cP#2FHt>K3ZC@7e6c92-zKI|{rR)U-yduf+E2=z`!Kh}8{G*Y&$nD(A1qf6zJ|!o z6u=HPrZ#m|iFb&+53VnPIp4sZYQFm_1+t0EI?wtvmEZqA_TD@m%D(L%AJZt)X3M@7 zvSvxPY||z?S&9-eA%$!evJBenvdc2AN+elQmJ&muGMTcAB4QHRx3SE8kF)!Ep6`7< z_tkyfzyE%JeE;cHuZB72oX`3B9LIY*z#?*30+o8?eD4!y%n|He%gLOK`TnX}ap^=Y zgJIw0;W{T6jW zZ#t*$u_>I->I!uEmK3IwT&WU+DkuASI$2rh6&JeY!@Gde@xesRg8@yofW?r)aHGf2Nj39V+|Q{Cya}_xKQduwnUu6u;R$py}`> z=GHL2=`|Ch#6zCdB|$_H;%9B;IfGfp0M=Ig^kBWWJ!atqY&AXFOBquE3AStEox;9k zrQ16WK0~`K%vH*l(*j~=K50<MX-I`;FzL z={Yl1oN;d)9#;C2?*$8to>~kry8q`yb=(J_PzK_EVBoy)oqsj(sCuOK-BKEnvQ&Om z=OXnbdb3n6;eY=zC*z1F$zf=_5LQ>;A$0u`<_B%>Y}Ig_5jbd$uGJ2}2yUL?AaCvb z`p}h8BS#m$V+T{8c`MX>Z|J!Evtq_s%Hh_m#M$=UCNN9*=MLr9=|?hJ#)>Py1kOk( z*ZXwIju;)Ojd3N;#!{E>W_xH%0vV*;zFUx}U@y(tGKqfEH>AVV^TV`#(M+AQ-E`-v;Uk2f?HocKMkV7@X_qT)|Gj*5`V_xT} z<=3i}9=8G}SIfU4Y(!E<|RmrIQv-_vY_UY&@ z%iUesGX9D)W)CCh{pFg0_7e{&*ZWylX98Zi-twStVbgy(7`|oK2NPyg_#(N#Idl9C zbx%r=sm4fhRa|3tRPWDFfU7xM4g!v;U8YcPzc}KXwr(IODn-5!R=3AzSYu@M@~+xqDIQ*cobFX4JOfw~X~y4CV^ysW4saUGeBz z@CC6iyYk2tSX=@_$m?fs*QwO+`FHU%cJ#Uv6K?}X&*}r`~jlOS9EbwP>peH#Vr+ zRSx+MUp&-A@|8P8QbFLYp#{UCS0EeWGmr<>OJvBb?z{=nKjl2_&d91o-*Wo@Uf#c! z{G4U3-cCh3k6IP*DJx00pmV$Y75<9Pe1DOsYuy}Imk*- z2Eka!OrwtH{Got80FpIlBs9vamcuj8vbgwIJV*)gcBZ(cPWl9v)hU83|FAgc4gw*O8>BvJFv;{)u`{itnoO_NnVM2G>g=q>5=-* z8?)kcM!)+_AK28)Gdf_}4=dbFT4k!|O+D~6_-Rn-L>lkZ`-?#taiMGF^Y53eg91_*!RNabFmyG~W0D?S zKD`~@d3j>~4j0EH+OAx;V2BvsxxF!-m}9@{e==}#y`(*DfSw*AqcT^AI(=_?dE=ul zgO?#M4bR($j=p|K^A=i;5lv`v-AIHPd={RWOOBqHNF$YSU$W!w(l<}g;sq%e#c#0V zBnbNEaZA2^;p~G9+0ad;5B6hGc07qQ`fP*ziCQ+t@D7Wa``j!hS}qN%kU*M}L|sW` zoQisVq+<9I>6rvU=TXx*;b(7LnbqPm(uJ6AiKPi6QQ}@&OiH)B0TxmTb?G6y+!6(x z7Y)K4MeHf_jjQ~tDKeFm0ht(1-Nje&BxOB7c%v=91qBpU%`k4P_YmvC-fjA$Hh5jc1Rrsk6o%F|Vn*z3;6*Z51mZBRH+oI?$=rs!csk ze<`GCzokmav^8nGali*NY4ohRT5tZS3f(;l59zppB=sOC^(gE*uiriX0<4nQ_W5enzR5F0mH&bC7c31IYi62eoK?y@r5?4c+$YZu8Fgs2B+faG zaw<10H(YwJ(q;VYJpIZd?>LR4fVyQeaA7>}Q%gtO3>&Eq^a4Zuz%&dzQ5YFZQiza# z7})1gnFrlaQ-I^^fN5qWYSWC(Kx$iEql3@h)DVRwqllYZ<9>cBY1gSu7>z!@A|4rb zHo9NkHF1x={h$qo_d6?Vh4bUnwP*7oK>p3FglZTjZeS`e-bw`fu!1*0t%(~Cj z_^ljT(%S;H-;Dp%sNTWTrbR>LcY|=^KPD^x+Y{Uqpta49a=j9=k;iT@kU?SP9LxA?k}G%l)&j) z{waPN_KUCVfFe>((QdYcP#H$T7kVQ`Lei5MtmWg;1dUMQ@eY>$O3%+Lu4Z#;I}a>G z@n6QgHDZ1z`$;nXl4&t}u=V_%g75s_hJE)e3n($N(?v?Yhg_yMT&PaAKC(`$`s=+` z#{4G-YPl^#VUMkAvcjTIuGXR1#&57gX4)LR6uqb7mgD}_9h+p9GcpdqWKav_Xr<O;3WDm?mFYJG*}Or}9pdiXA;d@w3vtO`ONG+msI9aN*tQ@vOAY~MJoiNCj1 zp*upM$F@5a#evT(&5n#Il1tW~jumbp6r5X?%(XNO~}0sXoa zMaT5FpX)vM)~{7Hw!PTHh*I;oprtxMtFD{!zIM{`8D_aZt8aAN(Q~BV>|Yz+U#&<% z7VeobO7vV#_n|$F^Dulv%!SNpHTmI>Lk~@$lZ#okW&UY2xm>pi>!f@&dtEy7j_fw8 zr>t01Os1{%nsMo!L7jT{LUh6hoLBZYlnnESbZrA$3zrw=6!{ku9Kq%fl1H|tpC0gt z_8hC3YmIi)S!eH%M4481ApJiGixgc}ZU-d@I4@_^Ul~a`(WL!$W7a07FprAf-P$nT zS?QjzNTJvV|G3$Fak0{MC>Zy(+~0)8KrFm*O!kvUMU_T(H&E*}lKgPG;<9#7VVCVd zDOXINxx9;Ny!TK`gZuu9e8D{u(FXdWN`xpDtH4}4S-h)Vdg2ZocCh+oaqpX}(0A`+ zPCb1-(y!6fq&-o^^7%u?w|x;0=dZseG(O&QjD=p(<)7jArAzif@P7H_LB`N1mG&2v z@qbmz=GM%kA)8NFYu_`Bi5`?Mr&dd{IRxRCYFf4W*v`s_lM4=?zN@F?!`CU|?9aiI*GeB9B? z0d-OghXQk4LN;m@=mn8Js!sG2wx?XKUURCJvsIkSy`tA;M!DH#kG0F{6jT;Ut3)Mp zcBXrF$5V$vyj|*Um%Nz2nFLA%p5X@!;F+&$cJk_*I<7&w1+8~~Wg~vh6>jDl^A80} z<cOwB+lxbQv3QhmS-Xow_@%V{4-?;Zb!y+plqZ>^8cBJWto$uXXsBe+-7A zJB!gc>#A8yA+}g~H4CRw?~3ljJd-s<7aX&BkwIEt#t!2}x)dbdm~x=j-2sv)J3b30 z{G7P`KMHIrQ*(8U_}JEvLE&N_D2w7O3B05kVgJFfj=E3=OR}rLN}dmDye<(n4TRt8 z=Pzji;p^n5u8g6>EKRL)K{DGEU+IXvfLI}Kdn+l&-E@$g-sp(aby#(Z*!awXUoonZ(fiI-fSGoA*TOS^jP@Mqj7>6 zpyBWJYH8V!kWSi*6_+iIHDO{dEI}EdPE7X8Elijzd|n$(8>_$a;K9_ENYoC@o4h3+ z2_cKBR2ezW(ocph_r=s~bbfZ#+Mmp$Cq}nPs~`W%!}}l5L%}ry7L|fK$(G5cm49D1 zY=T`(@9+_{@S}n~$MBIXmo2+;P}=2mTS|@|F63F~@#x+qIOP4{n@-j(@5hFB7oXO= z^z)NSBDyD)ZwgaAcGH5^&wG^Cq)Lv;Ckpyg`V@`oti*1gfvsBKie2<=t{G9M>~K9a z%87{Uo~0-WW&V*q|JFudE`9%{^D(#E*2&Wfx_aUBG3+I?>gP8Imi68XpS8;k=ju5Z4mX&NZ%1D^t5l&%AmHgkC;Cs7kjJyk4^( zeO+}lUN{?+v?=?qObX)9^jXB#Vt*)`a%=`Zr{rnp@lz?r{Db|y+^iuFjxnKFIoKen z$x5H2AVcvBG=pNK0gy2l+`&m)gRm9JM9$?5nax&A1>gG(V>_F70LsH-bEfyCTUy0} zMdiW0q}LZi^cnPXCj$fKyWL(>mD}B45~ZK=}YDsY_r8D;&ae>%=^6;xnR0je4YW`^{p)pVP+DQN>Y2If>7 zSC22cq6Zd!bQuY0`o)NAj|TsCR>~=9b(ZKkJGjY4$x4VhT(Z%{6;BIt2hl+3A^j?_03i^)Ix#Th*L?NYpR| zeOepTkJ(ZsW^5sVyC}8OVGv}@yG`X=o^Y;7-ZFC_zZ(Dqb0}yoq<{F}!41P_V>JFC z{4@w0tXf}rnG7*f0!EyJI08{edVvArhx_?CfikI@q%f*H3wsgj0H0dSm1i!swg*S1}j8LLp#)K!)Ww%7P0wJ^U_KaL$onj_=Nw(MjhJHiRb&v#{2|EOk3|t3mwa0G z@Hj6RphQ_r`PLwDLhB{WGa1*;RHNew~-_Z?)9`185H^Kar^|g0DWS--D z3P?!&jdk!7WI(KEI=F0jnunI%EsqUrB<`?jBFu#XGUc?WqrB?8)z zxKLcZ8~p{-#Hv0>=qR!+X9=R>mG#gQpn42|h@8;C?|)6MmBC)4ohvAOgQm#B~mul;h@wC?^lRJF&(F4#Ks+|s@jf|z^<03_MQ&j^9(@}UJ}bBytx&5EVz=nC8(gZA#Bm9A9ZC!@zCL`{m`=&ygDH$I^TT=Jjd*0Afh95pz35al_4CI;! z-^?4Thm=y@7S!MkOUMO$w<4vh8hYZlTi<{GN8xkaGegv%Q|WfCkvUhjEia$o2Y zVfxv-aDbGVF$t^F0Yemlf`vt2d02bNU>CY?{`*IA z!qX|}JdbT?kBS%<*HQFz`Ci^%4||&sQ|RIuO&QEY?ds$h5GE$$#V8Q_^24wHhqM=0=S+huTKM7KWFOCd{DfSMCcX5t!KL^Dn0E?s1CV z(}qBCmwV3K%#acM7E*>B*G@FF3~Gm3YeW#aiR@DUR_vm2k1n0NiI|-O@3;fwrg{T-2U7fi1J{yv|B}H4y(j_P%f~?9e zBcY(48H1N!{i=?PKDvz8NuMa!iDVSX9%R=8J+o4{@e8G#5aPGf~8tXFMM{s z-aSNSS4W|(tcpk1zB8|Q$L`f&%lJF7r&J3#lOWD6b!5d(Ug3)Hraioy`Ss> z5T6*a1e+s+c{$VrOnjb1!)wTk-giV z>*#3uZ`Q(}e?@K^!pq)yx9xA&5d2)hbL7RJFATr=Pkwj7Q=~S2;B)BT+?M}YxP`^= zV(X<(>U;l_SIg`HiZAbBzxkg(%zr=lf4aJ`LRolm=S$T%C~E)oKY#VlFvBhBD04R% zHLJh;Wqi@MG|KFYcku!u!HJKt#t#rOrt47NDw z6j?2MYZ|mIl3>WcG6rF`rV#yV1mWE2?c;-s|6Bt8D^vWB|0O5ko|&NvAUxtZLVAHN z%My|$M>qR|s%#9Z6O+#`u9%HO;bpgQtn+dqxbb$C)j#+b+WBAJs`MO-)hY%h&sjeS zK0-B!0CgUN3MlKI?9sOjFqlgUK_Tk0DP_vm1asa$WL{!s>^JJa>;0>l* zu<592-BmDj=3AdQt%8KL`ueHZ9CU2BhK*d+*!Ib{2*Qw67iC4xQJ3;kPs*%h_vK+n zzaOSoDq-0m%Hh%VzB`Q8YG2ejm`3OOM@M@m@BRH}Q(S^mY>g5}(5#=*c#Ogg zhMF#YO|aSy!F-|5XWz++F%d$1#Cl8*Ho!PQKBLX&5xBhh`=av*U zdUD{>BruNw)DCDAI_@5c)-a7p?>^w92s)~LV2rndh{@MI?<5V#<4XMwe?B+nW+cOGaR+UM*5{L5hLEWKQNKyBTG&j6Kd7u9)92Azaaye{1zQ-OWL z*+GQ*j9)v@Zv~3~oDeANGm7{1$(57$x>8tZUf}QN{M{zSBnA*ODB)K+lv9&`Gj{ zSPV=xdN&=5gpN9qMMs(IIUq%X~fE~foL(aVwrapyd9TsIK zw7EPY#3Ubi#>BBhW^-Y?NHe0hxT~;&U$s?PxjTeb3tx*#S{)+k^nFlUZ~Lx%!o#uO z{Zx>>JLM-tg>Q?`OS4~brRqFVqGkPU7g<`xV)X)pLbrgo&J0pLjX#0ZOpG^s!#hl3 zv_O2_Oq0Oa-Dvqc(uxi>@7Ib zfYqIcZistYX*p(2BoXuX*8^OV(iA6@i8PPXcFrl*7Le!S)JquhbrcC-c5mi|;l8hU zS;GQT`9*sPcsZ~&drx9kA*+No4>~c)xI<3$unGjM*_NvzMcR97YxIT4dT>J~Lu6@^ zO+y%6fASol`nKVl@TJnf+e`mv;YYvtFDM9iM`f}P^t8f^{dfExEN7&yhQyUmieaaJ+9a=I5>2)mj@%1 zjB-TxhxsOMQ~lyU?AOHSdLN*OI(HZC@;RgrMHEF%zWKzEKyrtx+=Q~<_YY6#1yZ;? zrozpo#tlecXsSU=?x=Dbo^Ow5n4Bd|gGMe2MF)`_w*gDF6H_n}L@N|L|M4LJnPoLh z$~1<5t4MnRtKN}m;@Rs6F9f`>S}WpMHUp!Yq192u^410s$!rGv)%#J_SbbCv?7VGA zAWNrE$is1}_uuvgVb`S*o^h{yy=x*&^}@V@BMn4N_u0u`J)#NWK*~(M*59(Lt`Fs>5Du0Gf@f;zC)VyN&$89Ft9;!|`;R4j7Bx zT~sGFy)jq^XqTUhQlQP$kF{4j9(Qvt8dJUnL52JQPnuf2_n=2Y^=N>9lp@X`(Ok09y_m+=x@AdaBgL_qIqqwS9tK7}$-YQDlia-%Dgt0o% z9HO-ZB+p@|X0doJj=r_YD|M?Gw!M+Gh`-;Lc(HJgP%aE#S&%R=!xWIDpgB$WqrG95GtX-iG@`e=F z7c1*xMK!`^YNlYcZ`&bO?HyPq*kUey^638Tq!%jRJpevQbs`MDkVY70uomyNPDYW+ z(%sAwa(gv3MlufCK}^iUv~My=9qY(6TjWnDg6IZ@KHQLsG6Wk7m1(FuRUf z^xeCGssZDxUK@v^hqNd<;(I^z$fvdE?hli)(j7nW- zo?&SPOS$+YY}LYf42_M-%NosqcE5h?pA{3)tN>1Kb*f+y)!S1rtx3CbjkoVH2qVid z=oS|9w*+VO_bu@VESsw3IKXV19Y#lx{C{7&;jGyUj$=`n2yB7!)it1FVtp1cDXyLA zDP~@owo?$oaq&8nGr9wit8|Zp2Oi?tajuuOm-ej;rGv&g4yP8z;EdDV=~6Xk=ecI= z^%8RHZ}TRIP;=()&j=37e2H()a6{-DmhW?d5-R~kclAPJBF{3r&<5b3R9<-7V*n~( zr`NZ>9{WhR9|3U(%>nGml3v6lHg!{BOCSJ-N@+_`O$j2dFMxuSgkdzQFM%BxgA*$L z6u_1ipu28QJ>{8!s2+|(22O!^!qOb5TK?21{Odn$vX~1^&?u%KAiQ}18@PlaK;-=Er0Q z%#QSpH1oB9@-_*O+N^n)jdLH8!}6iRY_!-Aud{M45VXE+P&;LUg5atCMn|o`);s<4 z=XCVuDNqHC*c)&YNg%@rexbuE6S9`VIiib@dy*wz{VmZC^hS-^@$XCYrZXKGkZ;94 zveL5DGN+O5K(Dr4Z*})a50HCYA8trxlJe9#dMN_p0QQD2CNGviWqjR$ojlkaebr@P z3a(B0{U{|^*&a=o_q+^?ctUTJD-BWjfIByvue+qBh8u2C80TT$RZ*R zkbOqU@;v+@%TZ%wj(Wo90JLmQ+;rGha-b@ReF`g?vQI7!Qf+R{L!QDlFeE(|^Ky{U zk7pX0$4)4>mej7uK;^k_Ww^TEKMu3SaD7glX&s3OU$_R1%8^~@;djlsb-*<5`wWDg z8?;nquNzKYc%1SgTIc)C5Wb6^y7X!Mo!QRhgKZ=;=JF8>80&x#A#J-e-8l?4i(B@? zvWdjU!Pb~4GMaWl7=b$f_W9&QzEVtr83<+P--yK@MqM>kc+Gvv{dNTmi^@QM^!?P_ z@F~Yv0#`>H&CEv}Ex`R%ocaNJ7)&Q$GYD1^5KF{9$lywssB7ZCK=xT&H++BG5Miu- z^i^KGOV%;sE&_@EN0IVH>>B*mpJPBKcZMt~M#zc!+;*KFbS5~~jLKy-uZx*S;5Pv`EvezNJ% zjjfS+{QB-aun7*Y^>qDxZ!b5A?v!C7?41TTbH?}uaDu+YG|0Y~44xtNDhx!4P;`~M z;)FCG__k_Dp7yF|KDM1`%b1u0U5Oql8@B=-Tq>NieNWz@0vHxc0-jZ8_OBL|x5I_< zmrrGcnK>PnFENv*zuK-T=Q83eD17ll?t%TFL1~ZSQ*NuHFO;y1BEe4|wejK)onS4* zc=V)}eJl{hp&0Nq8Oz}zwZEj}#g!>PD14iIHrCPJUu^4k2+iKOU640r6PR;~)inJgqNcnD($n|(#*62=WqF}i;J=qxi;y<(q}0F#xx~EhMH%;`scv$$8JNf zBag9%5j00=8I6=Vjb%zLd6KI2Q24{S>w4^^MAb_t3y+oS$uXD0sGdP0f>egn<#)?|Azo9vH6o}#&F-i)rNW)rY zh|;(}=@t&ZI;7MbK?g|4T92@V`SN17S&pE=k>le9d()c2{>^qq+9hZHQwC*~cj1Vr z=B9G0pB)$TC!>W!w!xlOe2(0~N5WQM_h{a_-fbVc2R$Eq!mg~8(smuULe|(7&_AED znt7T7-F#LcJj7~G?t4#>ik%5&EnL{Bmn_p%9YoX6H!?8H!#MUAIMAQb!@}FZigbQ= zqMX;$QXWS(jD0Z2>NWWv-Sj}U@0q6H#|LL|W47z%KT38T=U}RO@0R&l$5%O3Lnxx} z@4rE7TM~v)7<7qywr6w8f&0)#sv>eE$fQz+&8paaBmJOo)Xl#??{=gg3gf??JC$YD zobxK8igtJBG&Fn7INRu}u-1)?C$XY%-`0}rMH06DZS-DqG_xNE)$8t zpVI#JXL3mm>^4qc1)J{un`QEU%T-eN4n-!%13x}h{{3$zptl&nO}~!$dFG!BqTj6r zn*=~B<@8Ul9{=4d{%OfL?gUh|G$B{}@9zpc+*>T*I+!0`82HQo{^JvcT^9$_)4}jX#sBC!^pWehUmX1Ri+i(FX#&O= zWuyN=Snof%4rXb%j_{6W7yqszM?L~~B0QQ~u%BN2Ckv!hlo_rg;rZg@Uuy>T7X;7*IREUbg8Km;hw~V=-U3Kg>&&x$5Z|I_M7wTELyf zpHDlA+{&N!`?S3GI5C<3f0y;2|7LCiH?v?j&!_fZ+^EzZTD5DAj;bSQ?E|X@fb0C1R^N*Z`6ekfSn^M zyyjLw`3^mYctj3LlA<@5UQ)GB(7uG$jzCaSQt^w$=lj-I$J~G^LD0*XNM2pnS@z%F ztzEE6q7>JTA>Vs$AeOC42(W2>a69oUIUPpYWyHR;>-%RIh}!`p!kz;1n2)psiRi-U zRtSb_LnJ}~gS?mrBT*hS3|hay%X(MCwxoRr#CYwsI77TupAW}rwt;%^cB+k2q~cpF zYO0PAf@qQ2-rN@BR7DCPDh9Pu4bV*cg_1gM>rMJrz2ITCfJ2ts)rs=kZO>5{7EJn4 z+?8J{7f?`3m6#4P5U>oKy|Fme10IGotRgyEfaNNnUqV8a8DyL4iKDI3aB57Rtto># zVdrFau@PE-wwDnf@Hhl26^c#wAdbKTQ)_EOfk?zu-rFR}=J6qbCgnBXXJNwlOs(S5 zyY+Ofh%hYjvQ?gqONO({^Nn+#>Q;aItjQs^Zn>Q9&THH+(dIbS0LqX! z@dRRNNDqaGwc*LQ_Wp&b0bK-p>#80Aty3G+w!(GPS4b&626{--c&%CeWJd=4)k!3r)EG+|M>Z~` z;q3u+Uu~oe8fnCG)x-Lt&~4-#$#cdB8-P0CsJBmKKW=m8I*Yh+W){KS6R1&rV$iHX z%uSL9%mi--{bU+3?rL}=WKr5$DL6V5!Xy4c6mpHdovc&`dERwYLb!RH(X$OrxP=I4 zkQ*yRg6EH6p7B}gY^OF?;B|#gsmg~p0y+~lmrFtVA_Nun)JU&sGnCCk%Au7#^qaMy zY-3|BQ|ME=5ydaD3h2L;l~V?Pjv8v`4satQ=fakS7)u^ zI|QJRVO-^1Z|^<+CTEW5))eczOMAM%QmSqhPggwNlvcvpEFO?sRq^hIwIIlC5VR3<0EB(#w=#%xxHMe6327WJszGV#^G^xlJJTSKsYFJ;)+u*-NO! zJ^(|GDiZzfmVK#XQ3kLqA9VjmWCcp3x^UWdsQm+^<2G->#=Zb>DJ3*Fv9@D*r zD+o~rW<9^yoBcKQ8LRG^BBa!Y8uoLV>x`!3Io@u4iU90nj+TD#r8`+^A7y8A?Kt#`h7M0RpyIJV_b;y7I)1spKU%%JtAp8!_v>Y2C8W zjGOpB{=LAPTL=y~nSjU3yK1Z0rT#%`$pxZoLU|~yyGb+29V-Y+ELiYr*NaEB%hHW_qxR=(<8E%}C44!3sO5 z=Yv-6z+P6yGav~n_#}iLh?Ta4AXG@N`xTc@X%{hJ28O(Fm|~ueiB$p@tj<2)irtKa zJv;|;N34fj)|-a+MH1;H!#l__l1$-E)mz~aeeh%vRHNojclKPl1W$` zQ+gvX_g@cBYn~8rT+7l`YihM%rQI1a zeuf63UQ2OftEQxlW4u6j(*0Wqy0DdRs_3LC=4-m(g@|pc>27o2&Uk(4bxxVDmS;@L z;cZQg0cZ3qU|7LUH_=tL50bY<)r#LD2a*0=()BqK|1iWsz1HxO7k^^@Y?r`?qf=jA z4)=d2DzVMGh6+~Su){a`Lcy~(VK+PT^0#u-f;)(4Zs@t9QM@SHA&S${QT2~JZ&@bl zZYXzgTwFGnI<4<%>4sUN??DLH>11bD?nQv=xTfZ6y5|I^mKwvxgA6B(9EmvTuoEtn z65vpkuHGRil#{V-i+jkkx-dwbqkhpYikK_Ex;H6@BpYw}C3}{JX_q!JBdo%addpF< zd_JSh3~!9Nh5h#ABCUzKWB80f#hx!Wa+Twg-rzpmL1~p!q=PBGWCA73Z&5;>yr`vz zsLb0{``kH?W75VlJrK8u`felUQti57{RUKD!c$VUPgXxm5N8ZkUGOUSNEGJY_9fTl zD^%p)UL&w}N1n%G%4kJRaiW?_R`Q|&;R4$%3svU#*m16$5lQ4K*o|x37#6zXh$ME4 z&g}mq@PH2E+JKDhe`f)FzyDgdM(2sfQsZdM2*eb`9%il>UbsdB1+f`|j=_yyz&(Z+R6s7SALA%jQ;hImHXL`Cdjhup9tE*7fhW+#`}FeN92Bdw zk90{(+C0X@Muc{vZpE6+y@#F{%6*!ajGUu5E{=0h64%5Jz~-XVl5IPld?-I_zw%?v z%Mp(EO;#8(CeM3|A2TMt|^Y=xulEjvmQXGFV{Y(rd7Qh&W6lDO059s@e>6@|D zSlv6UJ@Qi|bbiKf`r`IDN7XRjce6<(oLFfqRnh>3x$CP)hw{M;B;g*mm6)%+Y2Iw- z@+Y)btsj&Ll`mljML?G9y$5?XNy{5j;f^?MD8_U>^uk@*6y9THJ^1|gecU*VPZ7r^ zRFUM?fPmkJD2J3HawPbAE`$9u5)<|==23?#qG1k%Pcqcct5&k7<|KEakr&;H+412f zpaFj(Qz{NuGltG{j;u=1kjd_wH4`}t)NzSetkgaZSsR%l(ERA*o8lr3IR(?Y*8xM= z^~UVUrtZ=3Ev*VxEXx-!ZEW&|eH)PQZg#T@C8pdpuIVekX%;}mxpu|Sp;Kr;VgFti zI;TD|qhr`;(L}XZ+(mbGM5~_P<(;*v%}jL8txdlk^K=8kprrB(R+zNssilp`EvBAw+lNUHPYADaY#rzdHKxuIvoIVYfgQu56nT*$}k#?DYmD1uFI%C7dk5w3KSJ$G2078yo}M)M}-5yja&QH_EYpq+R##mTXEn~4wYIV(C0(e5Crxkf*0)Mlyi&wv zj_l?5-qC5u_SQ<7?%|jnR|58T8R!smH9)1 z>Ce9MSlxTQ4u@_|>D>nOjV#@;D=sfs1ytpNSS*wyvUB~M1%|2RX(KFB`40WiDRU8# zNfSQes6i9-!JLnA8r`YA3~`<0iwO6O49y`YyVgW(+$K|JkQYi-AzhOE7&iXqf(IyU z?zn~83s`aOvb{#6t!}tyt0LzshNEz75trSe)?e0`6JnbfF0;kTa4;uWKcVVdqS4)c z-S}gTVM;z`bsHJcN7f;N76fqw}?fbLp2% zOH+E+Fvs0CY}|V5)J!kueV00|%&ghTpg8kdZOKiF!?jjycN~?%e$Lka9HLVfT*K?+ zE|!Y+0TRqPGUZK5;af(ydvT*u40?M^*!fMqZ9Vbgk)U2!b5|?I9&n$m-q>$;Xa2~U z#r4gR&wkRfDej4!hA9=US{l>u7o3RI9^!0Xa>bHrsdiGZuEBF0SmkDQhQ zWqb`Nbt3nEhha`PJ(3&FMs?v#*9Om}{xp z`J%F#Ls!Na5n}-kIxmbs#S+rb6G~6}6mmJ9Yw1YFI<5D6CWZ^WB!1@`{%b>3#ya?$ z`Ad%Rmoy4p?%5gQ5)ckEp`>B0+yYwq5mO#fcoI0!(@`exa{V$AC|J*HP!ImA_#EvoMk%a{nqp0 zZEO8N#@b}QR2L=V5k?4e9O3?Kgb8~mtuVRl6Osw<=$NBWXHwIxvj^JCB@S4B=>xKR zfNUfAFlInQn5i2nPcPbEHq(uX$G7#Q4S$?l`iZrj1+7#@zp9M!H(kdj1-t3n0c-%v{p(b*X3d6;eApdiKc4#V2(mJ?d}@VFFkpm z?3vRy%fN)N;HHlR!QMY)w6ggIXEQG%=o}rtXn{C!ryt(+_=f`}*NG|oF^`?s0R-8r zspKH&%#oGv-4F8qkV0V!QOIG>Ny7Mu5~*YH*U()il=32t{X`y25ca{W@`2OgWr#Hh zb3GsqHwXHXT|LB>)^ddwW;jeYj3J3xN*0%LfqN*^#bQ9{8t*;gcxk(n@+eZf(=pXN zHmi)GP2RTzYveE0Ky@LJ+Hpq9ifM2zDPzROf-5Wv<@?Ets_aK1R3c=y1-Bw~&G!7@ zd!~ywxF*R2KyWsCYlV*lxo{FfA&}1LRO0&VCF)6_oin{Z^TL+Xk~T_AD)VWrIbJmx zbNxOuhatj*KEdzJL0qzkM)jjg=!tn?ND{?l_8;H=rd>B>hyTxMn~>lqB5#>^KZaf& z^cKd8v}Sahytw?+Vs-InI}-gv4F)m80~p&fd$8f~HH)Y{qQay}dAn z%;r3(Y{^5eP5bLleu>8Z7=TuLhHm7TvM_{gZDVPGEoNm5Qj?-6(TE$;rJ8fXrAv*t zg`8Upc<9{;?RuLW&F{GpLp_+&w5_>jhL6k1NE*m4oA+DkkTuu*d=hh!=8njahN{GQ z*-C}?`<;u)=9naxQkD4eqjTR7;a#qmRuzg~uc+p(&f_xYJBjJ`#btYRoxbw9PrsGk0I_R?RX$?l*`p=8kQLDte z7n_>Z_4U8@SZz`tt!yTLJMp7OT-*G5__(nJbBS{6AD}h4jUf$e66cy$X9_K5Zx-*J zMvzP-a?ADzhQ8gcv(Vbs#{iU4Tdb9SNH(=FnC&BeD=P>)ay0j(B%4<%TnttX#<#3%R@N|;~CZZrMGY!C|s1P%p@Z-2XX%7%`0g?s5eDIZ+XbR z2!5!8xcGMzOrkL=m7mT(VwvQ`N!SF^Y1C%&6rvSzRNeFydv{jH1b;(UdB(R7)XVK~ z<3++eba;vZv^|`cx?O1hYaJvP26MMJhY~rkHmc@4UMAv2V!EwGGIrN7f*6t~%P*}T zbzQe*h=FjP!lHv`S=@UlQ!n8vxWo;SKA!x=MU@7VjxwKn*t1yhxQrx;H>GE=>!`hT z^G+~ad&Pkba+wWyU48oM&u3q8P8;5C#^n3rH|o4)#pG(7@C>5+2M2zo3Q8t04oq64d+Vxj;8^JGRkfKO&uzui$v;*QX^nlfxT2S5 z)~2wKCL^ECMsnr{!tZZs%>#Au%=4zK!?DOQ*qYYO+qoOjw&=ee{4@`Bo17cLgSxOb z{Ce%^Z>lVF$3K3_9c$Sn9bXk4c?Y3palO94iMSLUCCfFP@~oBk3_$|FJm5xY^6YlG zWTlZi8QB5gt87kN4*F_u9X^}Iga2ClHo+vWhDIRxTctbE-2Z%Qr!q#a0-T1fZ zTKGF8xdSdPL`a_Pa*J+wvbS1Eb`9xgF{f-d69{|OzY+GY&U`UwWO6x2CG3xfwtDo~ zGcc~`+!9qM;z5cVS&S7efq1)PSi-j(vr{kET9v947_1 zzAn$&X6?;81ukiGRr`wOFkfl_x|LQQmd93rQdEmA!#@Ep#!aD?&4aBr>cY*UGmZc} z#bKh>_>Lr!z_P#<=B=}&p&L#|f~=i*m!If%XBVPDi9KQbs%5v9&6oIrxw%HlV_3-_ zS?e#Q`jG~29~F+gK&eva?!;DI#ta!)NO@Kd4C(aV>}DRJ**+nNbEUEkF0@=${~%eS z?Xph1{K?I^`&#!;fCB`uXsZW~y7sG9PPuzG1mDIrOj!xsNt0lUqP+UO|CT%MSN=~y zLy?iog;@!$k;sf^>Mj%MEMF9_COWb*G1soSK5zl5p{1C`p?C^pFJmywCpP0I`88h8 zW&299M-^MBqcN;7k0KQl?77++$?qiX`WTDYVEuEV?BRR_BZYFmlit_4hWoMdJJiDY z-HjXx1n>qGHo=E-p!8qkyL6q`A8sTq3~T75#cPbFCpL?g0z&B^z%&gV-2P%);SJq6;u{5# z<`uhV^0pn4ReuC!?|Ds=E z{o4h7Mq_vM*^M%&>6Nbw%@*h^-Po(eB9W3ct-j3IoO^8_`CPMZpX5$;7G2hTZvHHs zayeCG(0}bGMAr@KV&h^czdhBVC+(05`no!BF`6e^i8803!LhoIZ76MErNNChxlJ;SUOY<@63;~LB`@y8rwxptz0{o0vqr$y)8663nc zee#=fqE>fKH_UFhDSY`{;K;~{T_5VxqvM<9NKi5FbUDLOAc;DZ5T0?DJU=WLB~TxR zDBv1iHH!qV4UjA!OIWN2F5C-JcFw?ZlnPOeh{#-AFO!GsvJr|*fzO8sfk+?Ko zqj2GQ+W8taOBDicFFs#MAZN)Xag$!0Am3DMJHOpD@yZ7KgQGy6XqOP*`0T54 zc<+xO`P*+29R>V4Th@1$pJo4xsTiCiPDFL;(t|8Nce zY~?xVUp1={#ZGOx^ljla)uue<&XKVdi?=M*4vE~;j=CIOJ*gD!VwLWf9T$8ck;XeX zU_DXl)|PEzHTtiIHHtMSM+C4}L|`~>O{+flPLRfP*!jktqNm5icT21%={GOzVVoRN zIrK2JHR8Tz@g8EexZv~>Gu5hahDNsW8dN!8A<{Sd>DAM_-S!V_f1TX_B9uUml-wUI zWUcove#Be|i@m1ML`%%fxC4apWekIMmq=m``#C+x z7$7MqF*Ha?Gqf~AJ01FcM*GbtJ^Dc4&pl=jo*)0*y{@1ifo~utEso^#M5cw6m!k*%a%6|M_MG z%BN$wl3uOoRBllj

Efy{xa-S~vP>2qR}c#DRHnTbVNA7|C%ul|jPURBHAi_4(6* z76Phyq3&wZQ9wxI14o$FeDo4rl)?PajZNHoFtgSd5hy5rcD-yqq`d4i27B7Eo_k9c zmE_03iZPnldcYGs-zfsiI;((oEVHY>sm*NW5os!1rA1Bz-$f*w_-=OW05;4+ZVbco z+MJ8c^_L6jEG)yWh=X#GMH-u=xNJ8AuYcKi70~H(KI-wONupbq4@_eWr;GPayR+c4 zDb>4ZGPZ51dQ>1^5i)U6G`+sy&*iRnbu&J5!Zrxx=5a~4u{|=4N8F=|{egl_NRD#8 z=N*=NTxImg_6@Jx88m(+vbBw1s+!fp(zPT6NoaNij|RoQo#ODp;6sZ)%;t2?YxA7;4qQ4=Q1Z)4bmd5 z*4BD178Pi(%{0L|;%~pi4D4{k%+JVSC_t?YQvbQ( z(_EuhktYz1Mi|kl4AlR=eM!UK$9=XTeT>(_7rZhyC@w>m6G&|G@+%H9AgFX9{2zL0$V)sc+d zu;`U%?$41P+Hee82Sl`Majq;P;U^m2_G6(|hzB{G7}UQlInxXTM6B~i$Xd;gz}*mJ z%-7O)e0POFM_0)U6mvz7kt>V-%3S;4`Y^{p?PRr7iIO$RsBj}t9BqAEk%(>!=cLiY z_XZN+We5Xaip@_1W~ki)U46^=_EO}pBrB-HBm>NVS_a02rz;X1AqC|Fw>A%i1+Du^ z#XuZyy91mCDmPqP>US0!|6GFhH=Af6sS;(1{3TH&C?w3kNb2kH44wlP-6tYH0Z;2m z(kiJGUSRVT(J$5`^f%KTFd@4~eXfMRn%cY|LEzo}HZBg;*M-MRA;Oa{w*oZEEt;w) zj!P{fP}YwOSi9a5K9{;ogRp_lHB}^BIswC5c`iJV4F~zxz~I&N9ncKp>{N^=unM3$ z(g$7HK_~z1lxte@vP3`2el1Bpf4Fa_W?)z%_RnvwdUb;3N7JC!n=w5M@#511!%K!=;_A{

lL+4URn(RJ`Whd; z^@zz;DOuLz(Ww zaFJB#73M}$`B<79wv1KW>QLLy6!Hz1L;|eNTf7OdkDx3ayy7O3Vg|YTV=t6QmIia2%y>d{UzXz05I_oM zzjYwB3fIT+2@8EMb1A8B(Nf`$hdNq8KCvXg)kt@jSSb+V5=;O>89fsJ*m#959I<~V zJM!$V87M-~nRm+3kV??LC%JQb6qpp)X9KrSn)bfq8%M0zAMKxBemszM@%#naYo}>C zSZLNb_vl}R-*|Pyq9;#S__l=tbtKpDK5DzlY@NC8@r8>Q&tJdJGeCexV2?Xyo<=h# zG$b0#y8iH##aRCMt}eL^>RM*$i>YmUdcSRb{O?HXt!{?zv&j{sMG}LvcsoEK7zUDq zN5D}kT<$b2Tj|DqA&rE8wC&=#wSeZ65}HFW=H0wl+RxYsTV4!pjW%f87>q$f3(UZ| zB{dY=MyQi(8;?#3?>yyoJ^9Pk(>1r5ZGzcVnqJR}vU zXNw_=VRp^v--}}l90%og8j#0jID@rMSV^>cu)WxoPO9|U^bLN#_;Q1C%e6;WyZ2FdUGx{n-qNWRt0 zCOHdykDS>pIhNw+Hg^MN9tMWFMZAR@s2#CW+QUs{x^hpSoR#|{Vna~+#c&{^0K z%_w&N&gXk~{V|r&U^_#yq##5fn5fbI^LEz|X8<5Ww1P6lX@hy{3GRIi$+$ecWu_%$ zF612EeyX=Yxy@-X0uyMjgz*AxkuzluJM!{Ha9tBW_lz#QlWZYGE7Xg6fE)!h!k5%R zKf%=&8mA#E3ETmqE=vzp1Zp_=P~{iyvZG3&xhwo!G@zwLp-45OMgb>tZ;n9>g?=T; zt^l%xO%i9>FH9oVeW|14x75*7=yX4XsBe{DoCdRdsT4d{I`=3|x#i_N)<%UuR=%H+7zlnQ z47h;8`qHj+y$)XUh+&iO$4n6{onUsgDTWnV@f3Wr&z%lxt>?oy9xbP304SnL&Ffkr zw-z7_{IY>ZhSv{zAN{44-Th$xPBAEg6UD+4ELn9|z(J{L4Ql6a%Ib#6|H8TuL~}vY z4GH7zukE>;Gkj7$m2;O5&lP?z@~l`-MXS@D0bY4q(sTMj=Lm?0s7JYZ*a$YX=}r!| zOOGy53~q?auopkQs_=8j?kei$$=1NM?Id3a0zRy848D{CC7}#2sD3}?x1R8)>RIp+ z^a8=YCb}{nC88iqg3XQh^$}Qymu>6ZW63U9s!gak`Y>dv-@StdjGO6)GGfM_frQq=tgaRLs#kj^>Onn(>(>jwTL|5ro8^wZT@FpY5D?@ z)tPBo&nN$pRe(qEe~~+>-sOK?e*d>H{=YAb-6u|QljeUrF)j*hfJQD6%M&`m zD5yukov!Iclx8Hi-ISP_l4*{`wJ_zJ90qA`5HW2YQAJYECar0&z?C+s($E(A? z(wIB912b@-7{J^J5U0?MvH=w5om~J7+X{@c<|44cp@adT80ZI1j$c;B@Z`QvHcd_%&HbSNcQ z#T^alfwRTe5y-TcfCSH8O(X9oup);p^rq-0WZYP^co7WPIAH)75(;vW#2r*~3=FbW zt0GJvC|MQ%Gllr~Q(S)X^o6&GKwvEI*i0Vt1Lo}Tpw!QoJHyg;YMoPq#Y`z`Girol}gUpg<{fTx-y!bt{1QI6DYcxwRln+dVZ=|Tp6 zJjeXSpKt!ap?L||%2Q4OkoV|$*Op)c;SCp%2NS|&a&-gaZM*b!!9$o@(!S|M!ho@c z1acdAf$Zig(B`#j_;1DagTzyFy!K~N&qAgCzb(1w00{18U{3Tbi1Nsxwx~V%7|0JKbX?sFo@XRnhpsKt`7;^wID86e z%DN-&jV2JchJl}M7>aza!It-}3D2IifuY>y<9RMgG6oS2t`-N7_Hp4ouT4Du*WUZ% zS3&VNGi*SGWdMxeMP`CW7GBx}Z9Ca|042`^n z7byq?PeJw&fPJ~)8;xGRpI1N&C_!|3?GVQyqc9d$X>}q;eHel zX8bjSJ=TD_X_ED_fi)71hOc$YbqZAW9v7&oO!Wmuo*hi*a3*U0IQjB3X|9mIs^R-L zwJN3G#64^#8E>dyqh5}|1K)6v-r5o9nTy|ZrL=!f)7CuCYNH>3-rfO%0%CyWer$9R z&0bL->aN9_KB%^FNiYB%mq3JB9Erv4)6*c^`n0xFCfPFkg(jhJ${#a)P)P2LN zH_bbNAe-*d-T^QST?JH%R-m8Jvzt`8XiQ{G*}sT-e0)`eWBSp+hn^(SxgYr;0opuk z87VgWIIc8cETA5EFs^(pRK9P$&XDCWvgL)j#~%A!Xl_DlxSwO}=f)%>s3GlxT(J$x zqm*_seF18C7L3LuF0;l)ElL+!JjrsdAJ~2mXo~2r@jYSNJiSVpAKEmHk+>q_bAH-r zr;d@DBIh@{ojCBFKzs&NycN!N%5q&01-2T9ch|+3YdKjgV0RNe_%lcD z*me{kHY}PS4PTq*LF^%?HdW7eY+55NM4<^BoyS-K^>pkYr6*$q>Aw~rYw z9y^0Y(Irp0S_Pf69p{_94*{<`yk!~EPjRVRR;6K;6CkfjE4VMsXPPwolhL9Svg~@$ z1kes}l1@qPk!dm-jBXwNO4b4U<`FcY1hT>9R}7=ZdW&}K;6ETYsp<7`Xa(@LUlUV`DFGq{QS zGzZPMaKrOKZ9Magv0iRH!d(wRbs!Y*(WHz$7c{h&oMJ5sfpWkRw^5nDamOWt&Ka)0m^<{p6$ zj|AAbbNvK}J6bW}I-cdQ?#8awop)U98^%Ac)TK@P9;&&S>O+B420ei+SWu%sy@1R< z>b=`EyvJYWT@8R@>%he zBnMcT+;m41Z(jTCm@C4fhv)h70MyMzE_T8+S0B%(l^%F;y?_{L&NC#PZb|L&>hr6i z$9+G7?PAv|lzcEh8gY$BGCVY>n?`QrY zDFUs?S00HOTsp-~F?wOG*zB;sxKYMsXz0Yb<~IS58Y#4!GbV^R`^x~<{~^E^B2YNW zhwrAI8q-RPSJ_r<1K45L@D76cq7U^m4w$377DS|p{cc!uS|u?bp$0gF)O9wTnyz5! zwHKNkq_zX)M#H5a2Na61ejnaXa-76prvtILlnfl!f3K_`z!yfhVmZRfpISOJVW0wn z`*l;mrZ0K$6PhfadylVgyZk68&!%sTh9?z`v_Z4vEXD)WS^1F8cN%?1HC2_F1fqrx zAyw7;Nk(Jt0N*Hn7UdDw)9LgTQnMJaT8Mx+bpuFu!l0g0%;TGRe!=@km#s+~CS&-z z*7pG9i^U*%@QV6ng&+>n1@0G~fR+*lK3;K;>lln`j8S1x-p#;-p>oy5u1{b%tBL z?fTno`0QMv)Q${i3y&>v#e-qYu8Q#d3(O;Vzo`#s(gbm?pWLxj=KWZY=(i15lK%q0 zV^Kx`(={r%p54C{DG&|}AJ`WN`M{SiISIBw`1o%0+ob?)FRS{mPXuZ&R7z)Aa*2;E z55H)Z!H6c<0UMY_bHvw>2*Mma!f~}@9NM zZ;LzLdnS%c!|g7875H7(YA??w2d_TcVYbMVWO)%4i(^<9c1mv2q&U4SRoGwOgSq7) zv;3LYh<%e`d)q&AyR&qqS?Ys!^c^s0SZsCf*{;$q|4xtRGrJF$oHA|qpU!Wa*4UUF~is8QGBx$gwkx5}(rG45;CY-nGn89uyH&d{``<&2wk} zsZ{nH4}YE}U}K8PYzxb+s=H&q)5*>$qzxY0>$>(8p_9{XFP5>M9DhADJF?zxHOg6| z_bK>v@zRCx_A?f6CKQcC7ulvIu}((c;C*gnGkj4QpqUFv72rtRFFZJQm-tcF|306;V=} zX;Evuvy`w4H5hkaG2V-XEuj)y$(x@!MU!nWU`g#3;OD`BM*rl32`pcTKpZmNnLPju z4SD(=Vb6$1hjJF7bptYCi;)p+E)8THmj=m@9q`?TQ-ra-6ST*lyEIrDK74ng__fM1 z2*L!T#*X@~thbx00ifKRh#m&YJM>P&%Z0d;p3DUJ=UJlS(Ty*O5(a{=&F6}?FbykG z!3x&4L$1v0cW%ANwiA#HdPo#@jV-3n>6#_Uxbg;O`kFuMGLlU$GZ4nqM2g#%!%@?R z9D%6oaWr)K6K)}wKu|RJ$^8hZW(HGIiMJ5xzJW&1>R&WhRiUh=DymwKjIG5sBYb(95 zKLzl?vLJv<6uzAW{%?uD;kYH~$W24f+eBey?{MkQp11#q`S$%&-iX#TbM~TWVUZp; z@`|Cg`&z$n{n=A)`K||`BD50kB zDtt4zljexR@5`HSA+%}^aUq5BWpe{b3g;8cu`!=*87ry1gP%2ahOy7-!$N=PagA)y zYfFsGv`7Y9N8#_uEE*JAD0}n{$6KQP&7}6kx-=`D`HH{g+kx!p;}xT_(t5Xg%f(r- z1|A_+nbeKscKU@^0xz--UWBdMN1a>g5R*7e{h{RgQr#A{5{x(A;aiXO_-F^i^5kA@ z5?Ed@YC4vc7IxLzU)HgEB)eL!>?F8Zzp?6sF2K<}lr-T#)ysI9xNEK4U*aSz(`+SG z5IxS)I+}}C+~y*0LlvZieqt1V_sKha>{#(PISR;u&p5zg;14F>zRRC~rOto&WB%Cv%>~n2R7$HegfkfIPjr2*&p!4P1@2^| zNd?7|Wt*_83JWWVgQT0Cj87(rxr#L?=RsGD0tj7veo;odv>E|51K;S_^;Il(>^n3_ z{uCxg4bE14{Uy9W3fTBR>V=jYL58XQHr5l$E}w-k5k)~m02JFK+$ddHSp=I~UX7R% zcK*ds&31H4QaMYo1cIe3=+%z?b&RAq)y}I$+Tg1dC2lK2!h|}=t9L6m>N=cYc)V~- zIU$zf#5z%}f0M3B;$kI}^#wvIfqe%qiE3bL?gG1IT}gVbDq?=_2M7?kPql1A7zqE) zTH+;Uw|)iTH(lExPLDN;FUr#oyhj=w%YkA7&pQi=&cmOPeFOSwqV{7G<~$BltXKyi z&ryf`;8E%+X?CW8CZN}!n!9qNIH6<+IRSe2@h+p0;Bb`#@Dy`b5 zt+k}pgD+!-SR{FZp6vJo0B`I>Xj550LS|0cMT$O7Lkmc2w0SlHeP(t3$Q6jhI@bG3 zV^K&=$p2aMFtn%@k`+I|SK|GWoN)XA;Kc~2q%QD9uSy2*l38D6Mmh@SnO=8dwO?QN z|50a{@!(qZYGI48a)@{CmGDzLUKK!DlE|U-%&_H0YNmqHdGo_J+_G!zg{;c3=41qZ zAAy$;bLeqz|Ct?mAlJ*`JN?yqY>lzdPXE+MZ7${00MO1f7v$m-m)w$Vh;epM-BLhl zBvWYk$ku?Gjs+VAyLnze6vrLY-z_>awWeG7q;<2$rOid97#E{>3JFc(22);jh8>q58gV66ZLDrA8N{_l3O*%gRZn5{ zSgNs-@L1ecoFmM8h+Xid;p%z8s$OktW7BkFuy~!;?onHnK6n0Pwzm)wTi%-8Z_>j( z0>^q{4v0q>LjcbFX^S&T_-_ee*7JS~H_TC|inM1tISUG^C2s{I@B%u!7CJfk^Q%w4 z-_M;mg7DLGD8 z@fPO~WT`BUMkG(44c`I(*|Z~%X~GJ3TE z=p#zzMT2frAt7V*=s@!7so-}&h{4bBA$U~^{wcTLCzWVK+IL;qr-$$$DcvGH;S-;o ze(0(o3nB}dFc^{UIFEdT=5ODn9+5W0KP_a{a0dRNC-J1ugu;F1Z202QI@@-?MJI4f z(Zo?KDFpu9Vp(kunb`z|<(G;lM`P|;yTyXqF)7%Zlh@q8l2ER%(6E5bx*jpc_X>y| zeWJxOVEEAx#^bJ=xLQ;*)j1DZ=TRduzMi)3*dHm!?>t}F-D1fX{FLGzd(>7F(w@rK6z-%o zt6_m`hrQot6+CI=Bsv@BtA8b&(SKrXE{u)8j@a!^Wig*4rR!j7Akiv!U~A+}$NLar zWHVcQ?mQZuBqdnX8mSvB?DkD%l?N_4@%(ETCw~s4BzE!|sEuIEosh^P7>1-A-Et`9 zk7=UfO*LlkV~`VMIa%8NiPhb9DTa_aIfiB?^_HD(@P~uYnKS$%+Cp5o?TDk^b%O3W zX?+8gS2xHlG-Hh^E*dDk$ha%f^aPan1$3QbV5}|X!HI|i;yx;-uRrefj0yu?tomak zlR+P^Jb#1Gb@beA@pl!;RxBucR`;RX!jF}n*r6P?OYwR?I6m2q7my#BNBpdDoRx}b z_1ZGjc(x`Es!H_F`TdaHCl4(iTLh*PEbRu-4jD#M?$6hTH!mkyr!$P)Bn8+J2`=JF z$cs!^Qj>nm=r!8+^o7MkRr3~5=FkRq@CrHwR1{#yMDT1-Z<5W^|8mNu76; zNtot&i4#x*4g-~aIY*){>${{QPu;pS&T|IY_{g)p>D?=qBhDB!PnDM(sj%E_yp1v< z7C;~0m_**t4lu0Y`g-UMiVmH_t2($X!7^|9Or0=5)>$Odax&RsaN66pj628O;SKNx9XMz zu6{f5*3O6FG!9Civu4Ioc3~IH{Hk-V;l~Exwi25jf-|nEB%LV-fdf|SEj_^%C8IH- zF^izNcw2g(;D@M$0ATg%*nK9{?crurXZNP+euEdw!f5TuPh8|-@;dF}<%IX^G&1te zJ=+0@N*8c{3ht&Rj;}cn?M=3IMAtJ`E^pe>7b|!5zd3oEssHMy+0b(=x&`Oinu{+^ z)^+mQTJQOjpBjheX4PBE6s?X8QegrP$zh+)iV@3AJ5Ij4BqY8rc(UzUZ8zFATaC%b zsK}oPyGX1q{pP}u526v&974h-3}0Ew@ViuRc9W~uhVX01V;B=B?q!qqy+zE|Ua@89>Q!=d7G>cPm#EQK z8GsiQ5WjH2f1Zw4jeH`CbzAHqH+38sSzyz1KU>QOEM&*<)KwCKr;>|X`tI>7#>VcS zc42^)T1v`zFtd+_c=4;^@=9o zIthP^t&#c@Cz8pMIQiz7n`G|o&h&^kdBCAIzb(@;2gGiIl2Z&O>2`dvPQ)B>6Y^iI zEU9459D2Q;v4xwCJSa~Jd*2{i32i-!`4~*lAn|IA_Rkx-OuktN| zf!-EiHU{?>cXM!F*=bOnrgsfGPT}9Fmv2SRdp2F+6p-`lD^WJ85wP5UyqMn0NzW|K z!%}9O3^d9WralW<^L`$F5~jDRz@8Xr!(Z=xA<53Q8EfBKq8M!dR<28~fktS$w`Pi> zIy;+=AS`31KE5wH)l?`n3mcE_bFM95eHmx zwADlOcRya~z2Wv^+YudM9@F-lWvwGM$DT7fs}G5$UQmWbV`#$sBxEl25bOn19o_(^ zGb^@g$nFvOm4}ga7Lqqi^@$`_yqYA zN5*2OG*t?4^&$9uO!yS2c60V7GBOkeqsl#C-TyA0-=iaEPI0eu5D2o3q|88YuI8v-O z&(Bmx#u*=s8#|yk4ji5<*W!*bU=Cf!SMVE7!pY2ExduyK6^<3H={t|ic^R6H7!_FQ z+ja3bGr)pks)RI&JCDW&#s{sY(kxAY8+1Kr+>-6K#FUwo26^`Nx%z2oN|+nK<3>>0aUDk;6JlXl#$#v*oE#61l2 z@lTl6dG;}BPDKqrBE|#nUgmj~zs)%42xhvJSR=wXf!vJh!V-VrG*xBD?5Pjh$>NUm zgv=A-6EbVBHkuzR&o&ws2Q+h~wWbn0x!TQDGhID#^*f`iuxe@p+s?OSm7~cD>(LB! zx8?=re24AM*)mC!FsG(PoNUF9ANkS(>c5%QG-Mg{QUf-Vy&F|CY=;ArN6kG;Aep;z zMqNHLmRyBpEXC7O&E&K7vX#K(qk&r&2t*ox-Zv|}KGfq3crP7@K&bLS*uOj#pAy~u zN>e--hxo4DpeI3?n{5vy00Sx2fHAypR+4d25t#BonOb=bZ9vp=jE0 z)q_x-dfyu=i}rz1U>?*_uXn8c{FYQeVvhR3U=K!4kn4dZ{+)wCzE!8-Si~C%9JMp2 zUXNr`{?(ayHlFSNEa@ixgwMRc+H15kYux^W$W~YWj+0jg9(&>~)`bSd6N%jNhBkJ{ znK;DzEr?!b6Ihe_!((ndLhys-7n zo|0Rx?EKT+2BTI~WF$1c#P{Ov$>*)FTu8l1EaVAT@iSlczq?GG$D4`M;A%I1OQNpV znKBf=D&2=48a!q%x=!~qzq~`sX{9pXr_8>#${M#JMKgSNNxHR$oioo>K=6))$BV>k z@TlAYl0ytyX7CgMO$ycD&9q3&G?bW9hGjTUcDsBiA8QX?^ErFjhW-&lcVkul2$S3n zo5B`xlg3VZ2PHf|q#fU^0#SJbY!ZS{`i3yvU3Qrbr)m|pS}Pdn{tSMENC8X#kqx)i0*qgHihsLzB)oFnNGV^4Yhc^i{Yts=GsH)hxi5*drW zjTbRE@lglX0y+I0`Tbg{`RwVfi!?|dv(}J=+o7mIEo+qCtTm(yxE}(;^JdY`@u$Ta zq_%0D!;9D!QOJBt+xLx6(A~`V)BLCQqrn{P<3*cVYAoUO#Zm##tXC423*ued_v6j$ zKbA785T!6ON~C?qYscVU>5Cxt73q{Vs?;V{+ImOpKPNebtQAf7wM1o>Nf)vYh~2iG zW-Pp2ZG3C>wSWChEbM8KtjENtm+BxjEa)3l3h^gWKB@-+y2ZK%8NWO@fw;?y3ztev zP?LJX^*yYG``}d)g%5mS@svU8P=47qxcGDy*swW6v;5n{KoG zl;ZFOl^6?O8*>nJz)&7pk1^qA5wyh743@Iq;`Qy@RLqn;kfC{fu*4j=981wU8bv6G2e?*}k#CuUCH`FWai?p#+QBEE z!Kd7br7ytdo&>I0HdDneY)y~TcXyZKl&x&kpyW1Ps9l&ZCD$SfhZ)aNvAHunjCw<}ftPXaSvOJK*rDh`V`w_bDEu)SlK)kyd$)Sid6PIY1ybEwy(~uE+FQM}j=s^p z5AM~!H(t77?SV3Z`Y+vzfz7A+wZXizRxKoK=iXJ)MIemGzjb%kw|AY8KRSfKm|%Rt?*c5_nk#Wk!;K zHda{x4IS*558cnyB??fJM+l@)qs;dHyh4sQ zT;mc8e=^J^Fg^tDlqYC=%d`U3h|$3PH>FqJ;JI=A|WDRIa`fLKZ z$)AfvAD4$Q>)b6yR32KhJ`d+&+G7E~i^Bt_p}Ubw>LY9Iy`!}WaLAn*QrksUCqA~P z=Y1CHjyoBh9)ckY`L78cBtJtCQ&C9dY^2=^Z94FuZSPmMx2`N!%OWVNImIEQ!R7^+ zmxkvx)s2*_OdB{foR9A&U8UPzv+ncea9bcMSEe#gIq;9Od8XQpqFdAoKH@9V)F4Lm z>9b59yPfcyp~RXH9X`EAv9PFMezUSzAc{F%+sR}MTUI0)=4{cxVHzX<>{!MWwMROx zpxjn7({n(Mg9Hdc_(THk1?sJx03ypUy*^&GuGPj}tWJd}4V8-PZz*Z5bzUd|+q8Xd z1u7dXsz(X$-QC;A3RvqGc}`Yq+e~EmS1*UU%zmumng^GYlrL^F_C0ar*huRO<0GyFQ7NkZPQM(iJYM!cwuC2Cl8Nhi6C<6GCc=u#j)d1!LHqO0;Pg%v&y zl3xpiqz!+2eLa_rR(xxuY(l)F*H+IoHMbg>u94qeL)l3Y>Zj&L@#NR;W<^={s-)4s zihoG#_y)4rySO@P4qlC6%!aDB(44kg_1&m+45Wbs=MkExAznybydVMDX^AaDd}Htk zb;Ke`?p_j7*L+O-a%Upe-y)&Q zU?PPS;ffY4aauffys++jEu`gpvtF=O$G%OLQ))%W%6g^Gdf>o`y!Gw=3~GHA5O-C%~siOlt@Gd(g4=|2uQ zTa~{41wccn@F&S=nkBx2Xw61hQ=H#gA8VLL4g_%%zzgK!XGph|*0lnr5k{Wkbi}jnud|`8btj5;v;bb2-u7+;_sg0c{tmwbarN< z9Y-M1ImXIi?<@_C_=p%O;i!c0eL?M1eFlbyu{}dYCQV-UB_^X*{^Ecz+SK9W>R2yX z6`*Z)Hlf#_TQYbWv%@l-LfY5FmapX$Ukr-z9jkUx)Fe1o(=-a%ebb5IfvCjtbW0hh zs*~iPt{(3vtw*6x+G1yMhO9I-nfRYCJ29OVD;~#L>i?|ycN>eQ0U|;cFOUr(zF95l zITtD3NvnN)=tPabIW{aYp}NpHVf^451F)r(cx^|g!u1Yd@!zg$5YCm#E~k z1IkBGP7^;@!=to%e)xL#8+&k|VzdY3y;n4!*>;!JUn1|Gzp)4@2kLwm!g$5QwI@ry zE(nMVGt@m#F#aV=xlAmSE!vRSpS1-k-9mWBd>l$TXg8&gfi_m~(=E{}Mwuf|@zkS5 z5S91sW+&8CY~is8HKaVKgvTZ{GvHmTrOH`kN@xP$z%U@{?Ys_fW;rFEuwaLysgEB( ziJPL(8CH35*KH~SS&UVB`1MD+&O4r@SN&Q`4B>2t4-K`D{1~KLDMcVAphTCQoVf#S!?*bI5nV`!q$9-sWi3pU}!m^;MREEHAzd@^1-GU0r2N;;-> zZ%i^*#im~M+2g<*Eoy@l>cH&XLoiK{#vo(x{4rhA{`D+s7%?AiLA)tE$T4`;z76zw znTiybeNMnOid3ZBnSALKN_AxvGpgwndwtWIm~d|vLaHSOKyoKAeU0O-rR>~|FTZNm zy#V1C@KU^B7CAhp%$62-u&#b!G?7qB`@!Yf0Bq#z8l#WR=-X+XOtsa^K@K^dy#Cx0 z(OI*C`z-y8gv!LJ>k#bW1)2Qh((FTvpiCi&6UiG40=zUU9Y@uM5YHpYR%xx-Y-s8B z>|8WxD@v*>na(v7V|~VkvE|t9$Mn zhJ3sNQ%0Ogc;CB!NU|gsm8k0L3Qcb_N>^f((b;-&WAp8 z3L2WWa@juGBh=~==a|5_Q=nz(jrVKdQ##m_ZS)Xk7YyhIQ43}ZCZ(rh>1m&wR85bsS z^jZ4T4c7jW!v0a*d_e#zOqhD2wc{9l+$@qEi(Ti$nw;n2Q`!-{7bae)w(K9-Chm%N zFLsKF(m{?T+5y(PCeyj5~JW<4~hKX>Tm z*%Cl4f2Q`4P7h+b>@d#mRN*5pxx)qvW<)zwjF%vTbnV#M9=SlQE7)A8^L+iRZ{YbEInF?DksY*Yi2sCl>3)GHcUbq=DhRW^$f-0xI0 zlhz4jD4qG=yR-85D_>3)vAi{Lqw*Y0V+y@X{h(I5RGhQ?MoOz^gpc!ahr8ZIU%Hyc z`75ynq^s5@l%suxj}At4Ie47Om5OvZE@?V7Mk8>!a@ggcVg-5S)|C`=QOK2d-a#xB zUKn@kce0=-o(RSmu%c6MI|c8D_EF?V&prNX*vAb(!1AhwGxW2yaoa*&L~Ygg7IOqZ zJ`@MFb|(Pyd2`}j&7)xE#d6H?nl-@#*%|SWd&aSZptdGetRY!BCL5OV&XY?y5JB1Z zjN^tgdGD@|Ye$m9%;;I*>yUo*rM0qDmFj-kVR^a3mfyc8#PUI3sP#BK6&rWzOgk1! z469zGJUbAtEu&Eqzu+zK+@`snF9bUPjse$gVg6Sy*U{V0=F1Ed;!H^Rqun7KL5Ucs zl4vKE^rWn`#1P(OcE3}9PNQ4Qu`eej?_hNU48(a;2TxTbz8L%bIVQ0DWo7bkZ@E{N zF(Oi_^j6Rd`!oqbNTfFICa4aJ{Fd1vr@+0yzN9@)x|^LPY;=dZ{$);5@~xip#Htx_ z8LXkEyb1$DFDohy^qW4PlV?j#Smxk!C8PQ2FA$wP@Zkv19-Pm;IGSVg>?KVCM*Vs=W{Es6>JT4+y3!OotR z?@^Lf1;ZoBj1jrrBOmTmYMM5dTk7oiIbPekQ1Deya5Dd1y&me~$G72*cWQXlRYXWy z#85X~w4dwvm#@72u$QPKJ`H(rFS5%Q@wyGF%CCcXDr!-<)25H&r*q@0>-^F2CC(?= zq_$yKO!;h4?&~jBCo{5xarCE`xM6xIaUAcfSMJ6q@bZj4r|S(zcDH|?5 z)+g>Zd}r+nO)5q2k!3eXoa0U^w1X^gS?>J`AfzNJ6xLf2dR&)(xWJY^Fq%*K=oveZ8r&4A*-`9HFbvKcQlBb=R+T<23utsHZZqYhXgU zi_+WYuTg$>F2A?Y=6n6kiFPG)8mA$!Bm-}=_9%;+JUQ@RR}H9GGFeomm2pY-l;BMAy%A#1rRGQ7VzXQ4p|227D2AN~-OxZ&aOnPT{Q z(B})y^xII|4he(iP25@8MDq4x6)9ou$ev^h9Z;Z$?;_93Ch7zteW6a2`u<6W?i~#>o1I}-f%Pv!54_Z4x z8JzD?P!#kxC4^6*MFLKaUJy4QR%B5gISss4wgDcmwJ*uTCwBQIHym=)cmMQN0HgldGjB{n zx;;Mr?VTOs!K0#s5K*k|_uD4ufB)Kl{kk{Q@ZFVmo$AxS{e=Et(mPWFoZr{|Vbur! z#ZS8{f?0F5C9IPqfAQ!4{*r>u(+S~ayrY1LoBYWK^*>&Fh9fc9+Twe!44@{?A0F|K z-)eq^Y~lxaGYfy=$^XZ%86pP*9#%U2-FSbySpLT|fKN5T5WK$gaC|Kj!4o&z@c z$A-^g_+AM1d(q|9G%JzACU*|Ng=?#UX|}1DkY(S322f>@LBj9mQgxZ#A*d!5 z3XLu@pxR zzrD2oaaR6)@tR&I0WKW*R){{+3d)pcp=rpYp>l2T=T(rKoD6g+fsFfQeVIhse_nQh zaIuS;;H`}&+<6#yI@Fj7x(`=J05HXMB+emu`yh3rw`%%f0>44B-ZPmD-@lEe{O2+9 zkH7vuw)&ko`H$SNnNgtQryqr2>207rz@!f5i1oj{o98^B%pD3$)&i%Cjf+hcKnsWW zDj>AIwWT|%riagiQEgA$Z2<_&2B6YryuE2FS3%c@G(dVgI#Xp)U>2CCAhsSk@Qk{9 zEoUXR0@4}tbkow8CtnVMlcj-&$NOALvnHSfjMlY+>T)Y6%(jC53nMVE*3H)_7yiQa z{b9ZQ?{6=VK>2${1@I97^%k88lVk02HvP^zAl{MvtO8sofXuN8N5I06HWSq@Y^O7% zNEOftKzFM92%1pO#R+knAg{IXzH!>>MLYfSJ!qU=Yrk&T4Z6y>AHdAa^xzi6%csBM zXul5xMs1+_%lJU4*%|2jOHN*h*$wC4qsbdK5c56y*fk3%Ns$;xm1hs;<9-z4JoQ|4 zjr2e7si0fGie|2e>E)AvIJL{ja=o0q2dGMnOD6+?nXZxhrw#DAoH@!bb<%p2Bx)T7 z$UG8z@a9#Bp3j2Ro8A%_;&wmA)-H#eKH;x?d;=m+>jBQ1`ICTbGd-9Oi5DpTw{a#K zQtg4^K`$g)e5d_zMoXnSiN&DJ8wQ3{{BrhPxUb%uP`j1CpP%Rg@xE!OYb}+JjJ~n{b4!I}IpLhgMx>;h#FN}Qc z%Q*#=!|j=yfMC1J^Z-n*x40?~aQTTSF$K>svWys^m}wQ*E|)wuonerQ2r64xl7Ip1P(jh417)#QP*GV@M4%=RP!ttvAcO)HD0>jXzLR-hIz6W| z$I;!|ERH0{ZK*mL493gi&zNdzgC<|Cay{{8@>$35*`Bmz zDLZDq_05x0oo8{=XaGl-_d3s6*%rIQ%cfA04ELCWi{5yW_V!IEGR~_#qaiZZf+|u*yz|dy!hPm1>|pz0?d1%J8<~I$)2K+7$Qp}X*o6XGKM|! zaWeJH?elot(8pgUDI?4VxiPgreff`UniSD9L<>+>Xu0I-OEgxp+Dlio~YA-&khTrH!|a?r+G0Pm=_ z+~~9AG*Qb{1v-~kNp}4D@y}i$?wj2vW~J%`Hyt@zvnYbcaVhOsFWfV$PdB5}^M_fd zgmv!{{Qv8f3PG=wem}CACy-1_^%3)sEuKJ_)ZP9rHKIGzkEneteT;q3F2(Mg9=q3h6mSXB*m zUl#!`Qr9Ujh>Ee#R&TK=f9wB~)rUWwAzz_ovg9_t0l^UFP`A{%v6Lxx_A^=2ZJce7 z$?*JaT)q1KKCdOTlr4$(fGq%SchGYrJV15Vj2l&@&d?=5gxOTb7b!#0%RT8%caR6AL6QZ^)qR_tt zvcAkdZSv~IEqwr=Btcg}f`HX;erqp|ap~6Bo7*&hQs_?7FtW=#gTqL*0m63-ni1D# z1R;eYeCXgQu`MPVqGB(Y%-q^e(DIM8gE7+LAH9NQYemKU|~k9#MXujPU#Hm3<5e8gKn^uMk$^-mf-E6!pxA z-s_Ur8LWt$stMj<^hEGZTjU*Jf=}D~Kp8KBXp-=GtZk}MP4F<`yoiJyPsPw1()nPy zYnn%!YKrvnCeH9U+#l*bObwj!zvnn+y(vJey%z;B?61hOdT_yyaU2m%+g>fWuYh{- z8hvI+O!6o0?l=R`m`%lgR zNr)SEsp(T)Ta}4|l#+DL*gwxJ>Q&qtrWPRNOTMvC#q$bntt~mgW@_>4+j*o9&lO)6 z!dxrYI(+M+C3HoN=#ZfXj&z#h*dhJvm~)#drU4X^03KU2-f8~d5q?4V_1*1eVRz4R zCt>J%f@cBaw5A$6C~MfGdh`UlXyvzZ8A#`NU{SLX|w*r626i{K56r+vVH!4R^9&Hr(1|DT9 zIFbA^V!rHeDfX*$n#FgYhQ?(p^tKWW0kARFieb-9Uxg0my#-d0f`iHEvpHS7JLt0R zjJ^kl#6T)b7*u8^-wL3iz%`pxIV|F7_;pZNHP7R+|G&r)DZkuQ1Oc-W?j zEZi^}G|5{;v6=parE%w&qx1g1zRo0Y5ts}yx0Ga%Ml>S1XNi>#m0i!8)aXEtV<8v? ztDy7#NJDW~=nzG^HDatAF(H&(ssNV1L(K6-K->M3WI@pY))NAKhzPNSP^7MAZi9z% z>uGZ8{XP^i`%Lj>6HOkyYJ>8N@de}@gYJWa1W{;I`y5?v@^91jP*819;nTg9elmk4 z{^sEFegeCj9Iu45&1(QGx+?B_@xdn%;(=WuU^dn|Y>tSnuTlclZdNa!ZSYc7)>$2x-z*MmD1~z7#kvXHb%M66#$Ye zG{)gNVGC>%&{IEeoO#Y$a;mw#3Z!$G@)F{MeV%dvs8*vN{>u)R?y$kejTx{$XP?Tk z!NyZ1P=LKj42Genv*C7h@~$Wq78RMy&!&r~8!vTO2v@7IjDPO9=5vt%zd&GH(%}T2 zeM_HjGK)t{mlxm;X%jDbUS;XA=8{x7(l3Y;FY6EIPOURtdAG+56l=kvY;=Z_! zp`Q$M$24H=kmbsHUZg|-%Yxc|5oBTL`XL^cq}1O^!? zJ)p?e&RW0JElUfIx=g7ZJ~oMK2@@CQ!jch+Cjj>7){r&lTT)O=L&K4&q-E8Z;LE zKBq|1M7GhLN)rQBOppwccZa!ji>k8l*s_HYP`aKSP@HtSt>ux-U>*(_poI;$QL1yp zSTA?Jp_a(}D43G;*<(i18!F`E^cxtF`iwCFw?_}M?h`GQ3#hm$6iJ4Z6P<5ZzbejD zz}@SpWv`G4OOT&E;odu`l}o;sWx5EQd{891qVm%a(RW5qYHSc!6=U!fywb>KmoEjx z6$KdQ{3`*G83HC)1~{akSNhizM$SV2<6Trwd~oIcBeK&O_Kp1*Po{eK^V4hi`HQ9D zqg@od@mBkkU5arb5>1_$)Z?+?xUKYEcmSQ~je^V-d_AEsxh7SRTA z3$uAEhR;pQ>zPa2jEpj%i7ITO)pc#-f)W5S6VY%TN<$1zN{5xe!9QL z8)sYmUR?H%G+(HKIbLz`IkqCBLM;q~uyuxid1&ul=PPI#(-Ro>{d<1b?0ChP#7wbl zpKAqfy8*pfPThbIc5FFlolVtuTyK3)ojo9hok8AYc`cD^BM>k3e04_qLpobt9ZtSB YQsqa|HOX}>f&c&j literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/build-worker.png b/content/terraform-enterprise/v000011-1/img/docs/build-worker.png new file mode 100644 index 0000000000000000000000000000000000000000..36687e2825ecd8bd320205c8231a21a5b7e79744 GIT binary patch literal 205697 zcmeFZXIxWV+BFU+qCo@|P*I8nP!JKMNN<8Sy@o2FBE6T;2}J>wrc~*@Ly!)kL_|S) z?*ve!1`?%12)sM<%qaJ~^UU1;5C1RkZ$79Y9M3s>pS`bZU2CoDyi!wnNCjblkdTm2 z$^Y>{gM{QH4G9Uk%*hkr8=rHETG%E}}h;PXim(qK!H zXdJSO3a^B&1{~Zyx&# zw|bK0@ky36n*Tf|;<-qVNB`%0Bo0HDU0d@4g^4{R^`R z4xv8@j{W@Cjs^2{`mfEC7>(MA|MV#TcFo8BBr+G(PXDE2!K(XufOHUG~t{=<(0b7q~BauXhP@X>`NFxhi@O$4$L==i&lIf8=y`rW3*zRa%o zPn!2jc0(mKAxZAvUYQ*dwz=E!+6K0!^PTaUe8maO+QvSxdrsfKWI$8grab2NFeTgx zEy45WPR3-12~O42x&};MJ8}~wWOR^yZmq_Tbfx$I3}7V*$6Y5KAKrWN@kQQo3$Ggg5{X+O9(~gtTG`b#hFp%R`*7S6izSt&PUd z-i}wrIT++mgt;yDHZ{&w%9Bf*=F7WfKPhX#HR2OWO`^AUj$4{d*j9H%pM_0J*iY3j;+m-?LW2txZ>QwRZXkhu_ooAF*UgXradur|2sSO#?*DS8);7KA;$X|cUOC5sKbK#*U!*WQ z7i-Y%f}Ip%C^4jatC^#8s=Mb?3+>`mL*1!LckUPiMz>9Y(k_9CcP0^H!`^Fc>~c-l zn}eyjD=iFBxUq8czAad>ddYEI{klru#_*05*9^f#%%YdYc_G`EKKtXgF+}`^A4|)}<40;41_eKofFR*3&rTd&)HGk% z-){~ZB*tj#=Ub$gpbo~996p|!fBTT>RszCt!hqvLmPNC-#YumaWMNsumxW~ZBZhAL z#_(NJneQDvFFf!6j0(scm-bvKZSA~Mx1v!|2p*;(mLve}Hr-&sxFr+8B(^f~sKmgo z*3{;Jg2|mlAner1=yQ+Xz0{EQj`$tUBnjm71-|rOK*{u{WmQXt$Dw>}`qsNexamdH z;*Gpk`PV0%dp^&bOHZ8BHH$Y5MOGVIq_=qANJIQYZ-DKY7-tM0OCGeEo`&OBOMMJ{ z37aMZ3d*BTf*AwK^G5vC?n*kCnSV>LMl5;n9ahhs4x}+SbzZ+xGEX$(vLFJAyC)KS z>N<^>E+Zc{x8fVMyD6iy>fkf4!%~Emq$KuPXZUMZAP>qn`WM zK*|ZN55YmyUj|G*F<2L=>rVNWFQj;xA-gB$_`F|CJHHAL9{>2}+_2xs+Hu;`E(6Mf zm#F;HXXpqmz2@hRPB>o`Kw@D&-d`Axd|P|Gad-YQac3)abS8@k(o6mT`z8MDb-8Ey zDe(+4Y0eAXvX?xz(QaYwr1>yP(fuFI@vaW9SYz)}Fnc>}EKr==Se+1D4ovH7?%#%$w0Fm)~4g1fZwdg#6B(_E*{W*TZ=+ru%3HogGJ;Xkos&@1ja-M$| z!reHU1m9cYIYmxu^S5@`j$%p6E;ukwUR881jPK@P~5<8uhjq|~IvGLuI>gP?g zZ}eCx^ujd=5*O~#rAb0oECaUGu;Z06$|Ea-#^N~{L-Q1K>j7bV+Wz^u6{lPN6Lxi7 zO7Xm`0uyG5w)BZDFZLjdy1SOiu;HKVtZ?i=u4hNp{jI@~izcW@qAhV?1ah+$g>^n*t76XcO7~#PgBGICpjL3g z=1A?9VoXZMojRL}&=&Gk5a{~WLb$4Q2Tk!om+dUHA31*h=ms)H$|WJEEJuT$JJpj; zvNA%VgpC0?!+#! zM-BfR(lNdS#ft5IkCH16U)MU|bda1?z{_K%VIziwHnXjjF z!#tXTI}CAzC{=NuLjuk>b5rTv-K*P<18fBzD@FcP8SWr?cirm|)f_#qJZ+hq-03=D zYfj8I<%1fE@gD2*@zfIgy`2gCoD5hQlkVJX(qkvy8M=;rE~@BP2;|K*<*%wnI;Qej zYJ88Z3YXi(f&mCNcx~Tl?*{q6cw>yfQhq?dUtr6xpYm8p4(!pJw#YlaE$U6oK^2w* z=PnR~vO48%^^|9a=;om2t92bri2pGPxmJA-sGj<+di>$cbLtFUUrcdzEOdT-Ue#1_ zgumMDEr^=&AX>{UIF9exOrbqoe6)6lJZvnk1-lg~wpT(O#ANkft+bttTUR{fgd>(7h*4sHtp6NlKq{P;s z=mhB9XN@!YJH)mpqjcf>yNR0#2xn+R9SAws8N#0pL3P5y7tB+A%v{90h(W7^8)d`f zKI8AFza=l+C>*!ys&xVyzG3iiqOUS*5CzOKSveRiYdER6)!PMavGQ)*A3hK4vzUoDC zWT^@-W#vVR^PxDRE9^y9-al9WoWfzSb_3#sM(@p& z*@LB;mumLcI=W2b4C(cKpg9DL@gXk;QD@hORAB7Lh)3b?y8oCN)%^}J68iS?x^#Ks zz3%&&GnVFRW1P^drVEuN5u$5<^uZ*h?g3bnN)X->c3siUga{_OgjP*DDdKsymQ$M( zo+R2zQ8Pro8_>r1sMOK;9Q;wA%eZ{+$%*v*Olp)VZ8tCLJRY2Nq_$AAkn@}NdY?z@*mv3yNYfa-|%L2 zIWO8ZVx5)!FAEFU^#-faN~W#f;j+AxYz?{6`~I4xJSjQIE_Ss0(E_Q2?&(x3^z_P} zV#D5uMb}|9iqQ4Qxr@I^mav<+nt(7VUYBifjTVk2Q)3AaH_sb+%hKz19%{BBBD>%a zyP8$paY#j%P;EVem@n}qSXUUQbuwY;4_hju16zc z+8p_ylTHk6foRV;(X=ZC{W={rF+qCHh~R~S?@&`Dhko$sOOY2v(_jUW;#~Pdm6041 zT5WG>MbkV6g@vN!LNA_$@)axuYS8s!*Os#-4W9#uIgI`O(F>}^1d@kbvB&xeYFh1c z?wKYz!$SqnTnuhem~kmZ)`en`7(^u9v%tW5!69+ij@#u*TJu_O-F`Gt#1+wKySjMO zN;-Ud#V%JnumD!V9j9)mmBGv)jv3fwS*%+``e*T=mIfWlp{fLzdb`>=`b?4l4SzP? zvf@mr|5T$7KA{X?D4)_zcEbykm!PLsb84Lz5HmbR1-w6ItqqP-=%%y0>ZF4 zgsFFJPb_`AAyF})aiD>?Yp9Yz z^!rk$%;ghQn>lV|Uyl&wg&hBKIWKLO&OJ?%>^CHnbcWpSPa0zzIf^`bUy>EL=wR+i z6NuZdwYAfUktgP3UEr?Vy+zF24_)dt;wIVO#iQwO=LpqF%HZ42O z1WW8cDLR)Y6MRNJZg?3!uDoV=_q5@Y$oj#d#>5K7&H0&JkRkC=89n;BkM?hrFAd~g z4$~=-fW9dKIa7VEersBlJ;_0Oki%)XNbf)=Kef%A{;uXh13VobY}yRIO{wB(tA55`iCUmy>E z5%l@~%KPRFmi7vKFqz6eZ|3U$9JenIsC6~Z)*>iSgjM@6xN40&=?T={P)WvGjKGz! zwF1#yc~o(V&(_%Db`t#j()M%D{>5pO@9me;Bi+evQ$nN1UZae}f3qEYu|&WR6a7MU zWaBDxrYVH0QIlB77ye8p43~_nhei1G%d^vo(de+gLZT^6{_pdeMOHuM>VOgyuxorWC%b$HU^SCm8x{)7K9lSD6oAj1x9 zAmlU_)0GXk<+-q48;fTXp)pwD69pemv%+=}!;yBT*;Ce`u3T~K(Dl*UiDU_1_+XUG z&3Dr4mirbkkySP~Up~Va3<{6N1(>>h@FP`Edu7m6Fq`i8vS_xsZUQlf7uy=W&XDqP zI!M1S&N+MsV_DT>HB{dtj{j7~MG1Y!O69zk$xQgNzrP^CjWqhKt?~I3#8X|!ISR?G zW6znM^;%dWKVX8*FvJBrp0(CEpdunG#xrV(Ev%Z$ZHr>ZN4*xWp0|Eomnl4AU;k5X zAY1W*n-gtOj&)iK7E7Rq|(II}t?PHstX4!3V5x)B-w`)|ksmQ;LrLgVK?e~DC zu#2(D?+No(9>HBEr(JfxY4LNpu;k2%HRS}pHUP@$)C23V16YDg!)_k?74r1Je!wZw zVbDvUlDWGq{{Y3m&qpMJ;vneONy!`JDT`AnpiGA4*YC=ASXu8HnI5zXxK9(TN4Hm1hMC>sd3TbE^0QQ17zy6k0JB zeR!KyR`?SkgC4~BqdB| zR-I0-gFDt3tUrfs*q(aTbZndyI$3Cb7W%B}fd+Y6>Io`_@2VW$TgPe!HT@?N^ysGG z8YP$H+o+9ty=Pm(6cfY}ru0j0VO0uwjZLK*G;8EXAmoVr-1v%$oo^wnLEh?xc2K6^ z0E&t`#RempYVkYksfS5bwV!b94JcN``ygY!W`4p5>Y!4c6@@r!xy{65d6N}dg>S>j zw-JmmTTz~1*;9}1xYa1GK-A?fd-Z0ON1aFvK zQt(|DfRfkRnF?CIqc1WpB~cgnHGU1coOJ8(P+-uCM?mwjG=BtIhFUCo+@}UzA5?IX zmE7+}<(lh)4)-PaTp04C{j03@+}>1VnKq|KvIIlb2kKAive{&kld+3jZ>QzP2(0lgm3cdRhc8Zh%fa+ z-$Q1`jtYHAbL9($F6uVJ6|aj&J1N-~Nj(;uU=~xi2R0mhK|!o%R@^R{uI&TLMs zI~j?AiwzP+Fq(xRb1H*e*{ZhoYtF81{73$ zaILypkgt#0;~?gjrq!1`smK#I0Y%Se?VvA)wQmZ2mNc4BvIO^2!*8vghw`}uCGL|j zZ;Ko@ASmqCp65;Cr2Rv(yM5d|8hk;?7{XR*J@!Nd!-$IV zC^;r+K)*OzYSM@8dB>Bv=$ucztUZA%n4ng;Ss4zf|JVf9_3iZ6)t!`aLYc;I)#j~u zx#yYhg&8E}p6jq%O!2~&+EbQzctzyRm#!P=)APpsm@h18hmq$}c813a1v$qqIv!-$mMzRjYZROS!L23&UT&WFQ9`sqWE1)^BOYA=s(uD?yF3joQc+vhz?O^LL;Sv9 zU^b%HF=AGqgBdS$Rw7ko=zlmeVH&H~vbe2LyA3E&UkUx-%3%jKU~i4%tiqj+)4!u>7;s!knOvc8@;^e&4?u3f zlCOCBC7H9MA>|q!Q2nNvlEZlOl%MQ#2SpTkV#%TP>W#UvlYL$&`LLlIdQ?NNj<9_} zD?5W@Y?9<8YOT+>h45(ABsYbYL;m31U`$bAN=Jd)Yfw&Dh zyvyGdC})X0c2Yq<$>~+p;lcb$c~7|6ghggphJuP)yjt}xcDr~pApCn6#_tSYA(LRr_Zw~z3eh)Cz7FCwqGmz*YfGOYQIMYZvOl&1*QEYzxXlj zXT({d2fr6~S~|Hj8eQcQB(XE|yufY^lxtjGJ|L%7ToUuF=+m7g;J3L8-g9|nLyhhZ zhPh6~ZrjD~|BPAJGK1nr8}QgVyJ063xB123$;5|JE@e3= zjLrmZZ*_qOYC3(wn3%C}Pg==tzL#uh`z~+C@<+;Cfsj4xcD2>~bqq4$YXaiQ6PFYY zi}&EwW=Mc+`L#s!J_S16qd#ZvQm_%1U15B?VQLWPMIonW>VnPiMlGpg ziXE%XqITyn>mo$*^+8Fl^0ARxTMcxGkQ03N_>B~ z3Gk6`M66dDg1ppmw073+&SSm=%y+24XoL!l-@N=7 zr2jsedk4FT71v^-h^orpil_wH1uT&PwVef!;k75r5|H6-M#;Fc>aTcwf7|C_RB>+M zxv#{CPRv2dfUr%(El<_ol(B_3(Eb<>FTR!eMJ|&bXV7QSdYjXpGflv{Q6=N7%vGq- z{7h9XLR(Rxg9<+Y4bCTT_?^fHbJ0uEScw(i>Fbamx0iUFHr@bWirT@UytQsd>iWrg%SY?63IjRHAsqW!P4-d6`_n*NSk3xasLvRu zaGqV|Hc(jK1P^CpqJ6n~cZ(oB6@%j?w+h@DCE(sgb?#xdhafQWtP`*UsuE#5DL~AX z6MOL{K~-|0vjo0bsM`V^lK?u*%@5zd1~Z5I*t6$RuzTH^u(T`z1h?&A<_AO_mLXAD z?C?bp^ZR=oG_yon+v98Cg_W!sjE=F7>7>yMtu0XX56sjn{ob1v4P>XE^m;~cc?BJb zhao5Tfs`0#+ltc=5s=|by6Z3_IZ$j+J(^+&L{K@CXzMHAK%K=^G3nItIktG{1rf(o zSwUaKL`mbX6e!&`N8i@;@dsLgK$QmS<9z`c^7B@;Sf{c%;}R`LEVcC;(}r}XRMT3g z1we1;yrzfJJZKGPG?98(u&9G0%kF>2WAe1zVv&rTcb8O3Rcuqs#>iLNx-louEfCQ1 z?Ma|co6kwKTXREyu>}z7{~*@=TZ|NNQzPKh!rhfnRIMr?CMRIQP%(A z=jsTQ#4ioGz&a4rXFQxm;wK-)7H?ZM))LAnQuX~Q{QaA)60Ux%^w=PwVHn_xSpnhK2p_Qh3OuMijz_%W_k`EeSLJd^OeB3?r?$F{p zgU-@6IUioAVcOK-n2H32qS7JrgfOegrQyvJOut$jrbfpqEB7UV@^~uYK@^0ad z7h9Vf1FC|0Sg&-+5GFCtog{C&bN+PNy6HD_t>#cb$Nt=1oDrWy4FtTR^;;7LhRs0! z{ge?8qe|s5k>h(15Rm1<*xSqQ3v`Drpu;~^0lJ69$-s=jbK);NX_nD-ZXYL=a`^li}~x;Y83E#{4DgbsNY9S>HK` z!JYcz{f%B36O)gHBPXcT&of9&eIDpN3)eSKhV9FH+mZPLX;IL%9{TFATLky4y&>p^ zV=!x5MQ=bnKotcUDU^J-gRsqjVKg6{c+{=xEOGq zTP7j(dojVnX6dC#1H73=lzSUX=M!12ITuF*l=AZZ+Q(Wh+h3VziN2-zbb#;cT%2*Z zGWF*Dvx#l-X~Q*P(fjEn(Sp#Ln1UVHb~+H&<%%~Ac=M}CB+^U(jJVw%z<~#e0h?iI z$qdk#`bH&!w15^i0M?al*_K+LHsTiWL8<@H&-e0cd8eufkyCpgm`Lm3_WkWcWR&~# zaWcrvPtBAWA?VJ6GGuMtOAHu@$SxGbuqnNxF&JV?w0XLABI2|55$lM54sj~-&s>N< zn)rCg2d{OjTB!qa(bw0hkg)&xf-&uCBFAi5)g7(R4IFRvc>}}agP!!(EbB$B6%$;d zI4lT`^Jtuhu>>jkX5QL_YJ~V+p2V%aeZc*<=1?>6-4x)m3_x}pS>@?g8plhi+|8y#x8Zz1CT;X}nS2_@EekxE;=Q-*%jD*0_4#T3ci6=J*dc z=J9@h+2(;4o?gB0&w+IA{4)3MY7+(X?fPo_GvYfl8QOEM!X;sxG|QH0nz<_RyhWIA zfP_u8G;(7*6y5|MA2!q1tZVJT!Lw_+dQpMARSRht`|$VfxlPPe822}qk7TL@4M{X_ z;blV!B2JW}=*)Ze02$ z`cEPl_}eW)=QJ!qDbrG-q+LQ;@Q9T^)-OPMFuBsVK3Wl)14u252+I7dvH{T7l=J3_ z8=W;r5QdqK)o9DGHF3U*FCb`|OE-(`cnt3%fxBoY%HX?m9^T8Xd3(}10?#vm&rO93 z!x|lDTe9Ie_}DPwmT<0g%$M9Gr`PJcstQ2VL-bYlD>ION1#6TKSW%qW*$ODs3PRC8#Jy#GnyfpK7m&JlnY?kPqOHU!P| z#t7=CWO)U(3;wp!rPUHGRft(xyWdq6jfJj1IAKI-eLg=1ki{lx!-1RU5-QQLj@e3#nDfw!QVr9ur@J*VI+cDKoMl>9vtuje zV?Gt^*MMNwss50Wu46k(J}Okg$h~;mf3uaGmLy|JVr$y>FfSAh>>cWYgo7mEtyU(l zB8l1`dc|WBz{T>>96xXGi#On#sv@kQtoBzyah#K~e!$DMtH(7b(?CN+oNPC;HC4s< zg^kxwyS=GEIOW7aSS|w16+5(ipOqC>$&5s>c9ksIt|nxZi35k*waCB=Mx&>h#YG); zPg6Z~1coU(u1sp=R`{iREmxd7d0ur`iIb1s`a^2&Yq$vZF3}Fe7NxH%InuJbzHq^| z5~wiqfDjUd<5*nT$hDTm^{_NI_rksdqIyF_8kML;ztMm=hMgvg3q%GNT~257W^ONg z^F@HkMxA7HRy5@F5MhBRxvjyPsRZ9$55NDhOW@Dk3r+7ob1!BzYOL8DDZsinqU*YO zSI&(p>c#|6+`NAf?c@@r$xXi&p!~QFVT-l#PW2wPkYjoU|XT36`#&2 zUab5+aKB~mQ4i6FcXmPpOP-|HiR-`xvCoTi4e~q*oGPjT=z#Ek8;x52|% zQt$L6VJh!5lhc>0eW^ily$*MY^nwd|NKA8E5ykJe==rEZLwrzarj0!{lzalPJROVM zy&wZ*nB;n8Vv{)$HBVibi*MWm4EdwMi6{xaP_hdfanVG}Xy(<|(OL*Z{hGo$5Xd=U zU(S=aPI_XBOH0X9*ZhEo~Yac+w z7b?dwBPGUKmftC;^XBqfnCzCaNGMRy%&zC*VI1No&Rnq=s_<}nm7JgWJO$b%RQ;cCLVknPJCGYSS4-}px! zornGi6fh4~S0^typk0{-motTnwd27SqiZkQ1zVjl$;c`rfWpXUb7;l}RE5S4p82nc zyQ}@1S_Ij$51Xw!U_u%QTNAI63TTEmi3>I?=z-c?5wqxs9O&ewB%9(JUV%iFD>!#3QSdO{NzbNCxOnz{~#nO6-L z?@198f!tL~3&I|oV=E5UVkU(mQbC1N`sB94oLn>WVq^ZydGepnTy7qUFhDmyJz@*BT$r2jk-NYsX3s67fKtjN+8f~_j^8upe8Gqo|Eqsg01 zr7h>QWoMZWegs>L0d={RQN`+NT-6zTvIIRcN9Wv!v{Lwx^j$vJdUTEv^vTA2qW$0e zIY|KF_32oxuI4y}KeX_jgt0Y@=q^4#LB*RX7Y3=y+lbQ~8Had|0vnp>}Aqi z66*=Ot$TpJY)5kTd0(~nO|I3x_^vi-t#~cFKA#f~buSFiD^8C9G}t8F^fJ>Sk@#w5 zbbHk1RJ>BSVhrG_dRlb86r9tc`^12hTBupe zGI}^k+a8Sf;h(}VeAT(%ohVq6LBg~N|HhvD(8~Xjyj6>}0&A-SzyPIQ!TKh-RI3># z`H)3WJ8%gHF$l0J_VY{4P8G85f?6`A<_`;Bg=E!NoSd^E^&^Y*>%nE;ajCvyr?_TS zI;;hNOROAtM&np7ETudH@*` z3K7V5m3g|~i(mfuIM-r$$^P91wlVp#SHJ6160%J?UHI-?W*P~Md@5TpPFl^sr5l=^ z#Bphe)qR*^U=y9VVlbjRxBSh}|+d4u!YEH{ahuf_vKZT4TN77ImqdNBhtzGzt$SKXI2Q$46pkIzhIaL>@Q}PYI zM23x2Dl~^KGGt>00JCQz4ip3@oh~QJ<25zS~EI7o2^8@UMDp_ytv zfb!0l{W^J>TeoV;0giX&?;`@6^W^-r%1XOwY43pHFpKTIvGDmgbAU@j$40dAb8PzybC>g_!LR zmB68VVbuS~2H;`*yS_||yZ&&(9^Kp@&C)UFMbl#P;z&>nnNS_WN(+Mb5g)1~C?D0% z9I?b7`5lS>iSxbhRqgs6c;?usg5Lv-NY8~xJK|~~A!`J;-gxqe4E?85`3qB407uwO z3Pxd-t^i`Ob{af`(5#8nuo}0XsT(tHQ zIdgQnKLDB&?Cy>{|7(@_2b~4c_Q@IYOGl-Oqt`rOe-DymA~4pj`=00U7W6&vb_ULj zL||>usbQl(QtuR#QF6aj5G$_4Ucm<*-Ostg|B`4^>h*z1swyqo<=I=RAPj_Dm)T)(Qv|LZ%j+-W4$7LI+GKY|wiucQ8PHH+iKfbjL^o1^UrzsLAbpO$X} z*(8~oB=Pst{9n&3nRb>~nZ3xAWcsJG{L3Hn%E6Fe;v_bIw$@fj{N07 zr+eDja59ho{Z@X@R$4c4;&(~jd;Hsz{(X8Fq=0HHcOUYd^dIx}Z?5tG$i)BKdHMf$ zvLC;d`*QqGkI{emlsAu?(WZ7w!oONI<1ZwGKhxWu$G55EP=W}6q@F%1O#dka{MKGr zdfARI`ll&hF>^il>$#?JopQk-oeahew|;|(T1uT-($DxwX=#B=rNRqy9VJ>`MD1Swpqqo|19sHLr=b|sS{^hTaoQOCk{_|k@ zn^hED{56!{cm2R9l_BQEgU7(1Y5MtJPuHIp2wwy^ z_`i$#*WCYiQ6CA&V5$6fQU58y{WntoITHRiQvW&kfk;hnnNk$_=j`&~9c!%a$I}<@ zekgkX5z>c`kT@6xjf@?l>z()HaPphyK|l9P%MnC!yntX#GN(o0PRGGzG-5^ zTuV5k^?Y|S#(Sd7etXn}dZ5wA>z+x=>GdzyBPv!}&R5Ov0V21>8+3r4a^}6{AA8oJ zBg?lt$0shf?v5ey9gxx466OG%Bml}Or9|McV0k}gmKYC8{vl%fquFGQBmby$BQ(|^ zcFi`h_N-*uIa2t#PDWh4&GiE#)o$B~y_`O5jICm713)OoATAic=sA*JDxUhEVHAEx zWIAp)Z1m>3ke;{Pyhi|ViLXGvrCTS_%-8F62pU2^5Dh2ljka=?%s{h_SZkc} z#KeR5Ba8xGbZF9N8|_MOWblV%tCW1q=G+My8_=0-7Nsn}1DNxqS}-jco6xn0wF=sf~Kf(Z`lk`TYRbTz5H4t^SGuXAOB=* zoH8qU!7hHIXRHF(@6-U^sX&W3264FN$D&*)Ful3h*L?HMEV$eJt`km(%E_{5=X;$- z?Eav|^M4uy>wkPS16KKY;Bza{R2j9YCCi4dpXYmoDB?jL+=8xoiRqIbY8j@18G}ws zX}=^PQ)UIwK$GzfZ^&5y;- z8?>=dCqPa~%xfzY>8mqkaeh{mW=+U*7 zi0XR$KJ$Op-=I7|p~6k&dPne_zO-a9q6#dkk2zYU;+Fkcd3C;(GddcNn}ChuT;=#k zVN0;xrwY)@d7&(3kO_{eC{}!(NV~MpnYxLNOBheg2GYYn8<`j9w z5@-b;d<2viy1A#ose8|`&XphNUuAm0mED;nS6SB$&U$D6PK_U=nF z@b-tfP9WV7@)nN4G!KEDeuU`6QK$UY>$$o(t{W)yMdTb|dB(Sy6~VugvG_)P7`%S~5{-Hy#^qPsaj zj8T+rVqnPh0gkWGpfDoy#1|11qGkjHo8r8fByVZz`byQp;;IC7@$qVVd)m_(ei6jB zN`2K~--==oj<3Nai2d-3J66e{HI4XQ8FiaY1~%zgN>0#J;`M5`*Lw}T%fss#*TNxa z9eUL&hv{%S&7Zm@BW9K-3fwnk^I(14UC!C*5}Xcg&z_f85LT($UwX%(T1LHU-7hRX zP>B+j+tc)bTDxCb*4>@stf)`U@fi@Vux~FUGg+yfryv>2x<wPF(vG5s|%qx~K7ZEsezFRWfBKhoh?7-+QZyV_M*ERqem_BGlL(zLv?r~ImKiCIPCFqSh zgxm;gxiL$~JfpMtG9`I&hrlW)(v+@x}MY}K$5ww`nvv##k*eL9E z*`r3RYf*_VgkF!_!+WFFncY%^mLY<{$QTf{*vGZ<9$8K4AEY>JtK(K39Xb$j>o2-< zYA8!s!ys&gv8CBqHMVE&N}bw4yI8drJxsaZM+u`gHX^=M9kf+4d4t_Bb1r9p{II9s z^cU`E8==11T<=BEp-Q8X({q{&_3f2dDf#USZVf~AI!MeMvFlpR7L>yUTDP_6|D zso4IY3|FEZir|W`D$;>E;6M|!8L%tf(T4*oL8v%}bOj`f=hVtX5?Jgd9vBsfJ;$nl z>pf?>HXcJ%zfWJef7jE`4fGRV7|x^+1vc_m9H}eyp2Q9lN@i%fXA}8_2dTb0&CGJt z@spOWa$+o#z%>?H6~nsJv;|Y}QL$T<$l&B3f&oR1= zUfol{sF6pkWxl3P)M}fjps|<$tGKlML5b(Pf-H(YAPDl7bw%%Xo1yB1o zw-?m))N3KxV6ThvYK?q`_a8$6Lq*1W--B(>A8tfMb77qZ+9%43ouKFe$*j7R-LPZQQeFp{mK(RJ7YmdH#9g)RBU%dw$x*WAYNaGIn zdAnbDezdXHi zoTDpJqt;a1(kB7Y&hMq{18{B^ko=PG*NL@2)QE=d*YlczX^5}L;lM~lTR}w~Xd*H( z*3p1JBX)4!M5-b=t8#$P{R`cLY}jIgm2xCjcH9`fZL9HF<0i=il(E*Oyev#T!ql!{ zV=8Snmw@X{e_l7fI91%9MSK;-qR|q&7t_s}MWSAay}C!3XEzjK^8O(e#pfL*fg&Vr z3tM-@lIiYSHyGv`!I=AS<-PXTwi6P!1yj*-{KH?db=~aAIs&!R`PaO_I~raYu5Z@q z$kPi>xtqM_)i$*P=BbyrSC9inFyDUrs;n%9&&-EAt+FV}&53~&3VjvR5o(s3+mn@Z zswnx*%SNakXe|1f*S2F<*?tgoSFILy$o+Jra2mB&oVgC&W;OVluq}u(G-gF50=Ivw z1-}!N{Qc=kOfE;XEs4Lu9czNuM{MHZG7|+_71lkDuTR#AK`VgbqNWyPu+{IKC39Cq z>YN09W0DN^P^kgeA|tW0dku)`XL?ZwxHPXwFYnc|1jNh;$lRe-tM5w4C2;%E&QUHg((cGFU%;L3<-6`27wW-#)T&zlnZJ?wi*&o_wG{EvFn zHa7j{_&8XnbG4HSb;@9dDqX47)kQYwi?+g8llk@zD$r3{;d{`yD3x!;SEuEWJCRUN$ zTLCO7w}B1B#EeN7-x5F;6 zEC2P1g8m`!Du)D6Y~0o43SMnoN{THkezQ4}*&b>VE|hcAU9zLSbsWQQ-BAo2Cs{P2 zY4v&ieZ@&SA@7MVSW}al!BwwS_sLzBjd=<;LigzPP`Jg{<6s0K;6bBoItE_DK@!$T zY{JNNvV0y|gz^g0`229X(dT)hj%kj5#;rE#2{r1|t{#jMQVc4f59<^0q(x zs`AS+twSO?1fX)Tt}l_3>*FO!?>iqf*e zC%5OkLkdDJV!b>!*CUM+?0R+$OR^ci)mI$;X~Xl#D?VO5c-%RN(t6>xMg z%y>hy7#nloxC)*E_005J9a1Ss{xK}f6Z=WN_& zuR7gFPm=uhLp5uYIxaDnfo6uv5B<$7iGxx8t58Y0`6xE!*Bma<+mzh(cN4m7!<_nL zFVHa!kHWGVIPAAbOPM+gph+B1TMbhr)6UI&*gSa8!edlHTcNFTj$|Of^!%ewHQ1^? z%2MBrVYki+RwKTXZSZp`llBs+P2T5*R1eVbG@I|UWk83I;i*!DqfU=0oQ`>=w%w?& zGMzt{VB3&WpSPwwCrix^(!qoN_K;NHIYUzwdFuVay)VU!gU$A7u0BX zxI^V``N`0wH8!k0;Y{0L@%aAbtt?mfrlj^lKv$xn+alCds#q!JnIm{1lB_GXo}+c^ zNl_;dnGN!ioV}j)HWv1a=939^?9SL#Pi_Ms9yFLRm~vR~LubYhq3l^A5yOT0{664> zjYE_^aE^|el-hv!b-hoh@WYK{14MbZx)*kdw8C0_X;a>#Dke%;d-?O{Gnfpe~2StuYhGL?+8C!26kU@Mh9 zpbp{PrcelG4?}IMUd(G8LKxn)KSmf#&_#z%C{Wp|(mg|#>@+#X#4@ov9KH}gt;Yd~Or-Bl1LdeBO`QsQfuOx-M-y`Sfq7h?HQ12k6r=x# zvbPS4vR&846+uc$LJ%pHmPU{cK_sO+g`q=0N=jO#RC4Ixor0T_1@qeYsj`&0}ac1)0hJq z<+5=A0m*Dm7D85M5MgP)n;P3N*pN7InK)!H-cs5vxYZz8dT~{->8Fd=xbiXvagm&D zn(0~TOYo~c%cl0bPv1F=a_sHY-6|BKrLxPDzTNnXH#*4Ykma{@Te_U}cIs%TcJ^Ay zTn)=X%+@XohRKGvDzG1V->k(M>qGg+XFa7+kkL*#Sl4F;;pgFdsI}x4H79d*qBi2d zI7f-Jfh7;Mj9;7v&M8e7?zA;%GQoCsrRyhK?-@MNh&{aLp*dKNyHc6tEWZ|g)trIY zM9FSc%5rC248{Z&=YfgfY3@3If_JlBHdq97FC{Xdl@GTGO@ znU{O57_dX+P2AXqAw@qEF_^dbv0y(_&ps}D_&0!o(31A{%(RlufnN1mZw|HBOcwj6 zx!<=HwI)gm!fIoRKM-2dVM zylB0qY0_i#?VRF=z5H9Z=|z-VK)e3MACuQ$EuN}TJ2mRNKdCJ)E0vK*>v8E5?g~<8 z>+*bK488U27QE`enNi^bNy znvP3t?rzlg24~F?fnB2s4G;6EX2ZHRv=bpc291b{6EBmv;+4WdS+MQTsMh|*k*nyv zTRk;2#(wD9Joce_MQ+?0V;j60rC>_I@NoTl4!Fs|gQ>bDH%F`cN=H>5OkY<|&-qMy z)_(8VK7ZBshuZv3&U-x75eLlVRC}jBh^i>OnLjT>iBwLG+bsZ-S1|_GK+Uw?vSYZG z`FT*RpltN{FGI$on22mjW#h>5O6`(bHpgTap6IdX+x$kLl3ZmzGK6)3d(S{7LVo8R zkG;(Y?_EO~moVhACUx)!uY)y?HD~&@5}1eq2T4+fv(!q7I=Ef{|A^WpeHSqSvAaWi zoM_Z0;i2~2hyQ#=y=(`?tpDD2N4I1g#)xd9_a1k6cypRjB49toc6`ZNwPQ`y*t8bA zO|RfFvdejS*}kf>b0KCr&H2*R@J6F8`M_zHH9=-m{Z^5p)x?v5sFfRjzFV^;mE)&! zjZ}uH>%baCV6jsf|GRDG9jrW7(?r{@Z&yicW1_cyc94oZBA^GDDci$i+Tofbf`QFi zxXW5O0rB(V(GE(t`e(ay$NAq;HJTr_+(v1vEL+r=BrkLR^Y~(P6^y`}TZ(<_@spbU z9{%jMajCj6O3RE8y>Z!|cFiA?J1TadZn}Qa1(j#v-zmj4>w_`=KZKAhDu#A;yIg*s(4^S zyVi)~Xa_=BUKj&+Dw@}@k;T%^Mz6MLYGunN|FCUPYrU{p>3q|%RHWd={+;YC*9TS0F!Syhp zOje0Ci;6vy#aKYL!bTV~S}C9TRA>4(me`wy`Hksz5LAjv2sQKk$CU5z#MQBhBKMC+fdTgy(N7L6zd!?i)CWcre z?JG7bN`Zx>Jl&6RCHW73ZeaVqhvOH9>#G5$0M!+Lj$wVNUX&mJG5Fhzf%dCT zt7z3ITFqPT!*;~LAJIMa(;_R`VyRK-a#h_Gn~@GrHVf9G)H)+ zi_b`>j<{O?9FPpl2{LmF$|{u&6?t6#F0zfE98I$5BuNpGD}u`b$lsu$8YqvUB6da$PX z*b=#vl?AWPTBdezp-PHf>U-)iY7xQlih+`j zxfFQ19{ZN?hp`XQ>igM;(^MUN7jN6dvIjARjIv92Tv`p{@SKKuV+;~4+^Cz~dL##( z!bhrK0h2Tzmff1gH!b!~hcTxYSs|mY-hviU5dnHia|f%d9loW9Gd1y=4#X$A>GN2& zk?1%r%Ft?&7^bgXCuobS+3NKtwFZ4dC2p2N1+B^}(fS%Sc9EoG&kobKH3bz(i%$eg z*yE24NvSqmp5{wCX0P--mu;Z2gppLGdrGF*w8Z}MmRZqVi$tK!-X*b|Yhd4K8sqwP zwpF1#;$a=2Jrdzre|q<_Q36Im;-$fot)XyU{Atdmeu8=~>X(mLU0?lQ>(IVZf5N)7 z!yxr$zPRiN=FB=ehtNxSLt0yd+?=KsWZ={8H++da);g#kah^cbG`C#-dYRhCEYCf1 zrM#A@&wDRIkq@iaXYgQSzDI7(=(`Vp{mf4;IU&qBk7LpG52}R-;_H)Rf#R)=gsdCl z_uJFY!3S+vSY@kf$+B9ZZmdGmC+i7DRwel$Hj;#ZU1J7y9j|cMmG5g+(L<#Pfh@$U z=?Hk%)pndF_47_?fg4!)1kOr1*(to~auA7HrkVgdtB~WO`5TC?_;e49*Ppud4?B|_9rxBD*QSoP&!5M0H$xWx)HG*8i1fyT-uU_6p&mIiP zI$lXmalHqM!DjEt-C3v2mRdxiQ`MVP(VwX-WOiLGSEB3H-#4T5T;E3kH%)5UL}rEB zn3N!FY=`CSL;V=cg21xg?FvH)o`R>N=b0fp1y%SMgjph-wVQVNTD9DKRf_!aiW6`3 zuyqHxX{PP7e~m7MG^kDtzhv<&c%<@REdY}sqG3eq^x|4T+3MVp_4bv^9I8YV{<9;U8?svA8!%{&nM~2o@J?S2(uk*9Hqub^5-4DES6(>U0xdt=6`Fce_HzP<}<{l-qN6eD{tgM_QIHH!!Quo{({GV^L6^(xS*b9#wxM zPv7!mAbQv6=EiDxXoe^@le4i)cPV(=nv;dOd?C7Rl3>t6R%+drXGo%cUMv^06e-ri zS(C%^cvkMNukexZd9SXCHoUER;v|ZNbG8X$w~zzp(Rg3@{QI_&PK=;y9gZGFp4QBP z8o_;1@wD-ux=Ot?VzUGCy3!3oMk%Kyvh}3PE9`NxZ!QTdM!CLcQ^yCxKiSb0Zr81; zS~ivx&(*9}_RtsKXQ>i(OK23WhK~gJiWK3|*JAkOd)M|c8py~c6S$ts8C5>I;T1cb ztly2{(69xQW?t(q^TYh5;-!-94ULIKfbZ3k?SJFogmM)?NBT0pq2UEwyi$k~F4-3jPv^GJbwQVOJ zBX?|8o%Xz2V7(r2wao`*KJ+`=; zudqBK3u*PCep5^NV~KOa{CYwjLJdb%ML^kYrKacJK<4jc>s+}Z1AZ}&J|kux1802T zM5`@c4u_T8;a1tpzD(>GcoTcNbDn#gO@EpaS2dvg&U9L^QlAHYCGxGt;IvV-XJF1@ zqR$}YrX``LL|tIN)=ta@R#Lb4R;#G!1{(dhW531}vM zC6go#14{ z$XF)3Ca{R|YSvQ^vRu)4t}WQH!S`#s-ZVug8O@?718Lo z>Le(vtvbHzVXp+qqpy#i@}~PS@X}7*eY*CH3G34rCL^)q{S*&}xoLn=b=05EUKUpG z%;hht?T=n+jscGys)z@ibdK)l>teW(J;X{c(vJ;rp~a9JZ?uOR7Sp0^W2?@5l>m@4^u8Euy?7V#Faxh10O|n`M7=fOkq&VS zt3A|?j}Fn@%A3!iE#`o1fLE$=Pu#Cn(YYGlr*+0&$2+w!_{w zAFJQci>0v18Lms)6{~)RGO2b#{HQe+8@J|b;AI*urKgeK$nQj9I(J)Z77Yp<)#@tn2r#DZWE-P!Z^*^A4t%Y*L~ zHoF(!+{iR*S(k9GC++;_md-@_UL+uM=2dQxyV=4wOrbs@2@{VYm+?Y-Q1ToFA$0;RQKR&X#9_15QXgqyQlh!)^A-g|-78~N zo;R-{ta+*nXV}UcBS4W6RY5j?-muz-9o0cbPy%5L^#(Ado8b%3Sf@cVHdMUGkdnyp zs0kWjL}}UHk4P3AD$y;8mbD^7;@FO>I2aPbEg-%95-gKcuC3blO0Uw|<$asbqE3CX zbG7*1y3}HOsL+ZF^oCJYnhZVhW`kocu0{szALkiCT3%E1_7qdfpeJp;Xr;k%egyeQ z=S#R+c~D`0zTY!BOie-+XXcWn*R-_TNt}(<&3zQ2U(9iOMJk7eW%a|zm9jmBnJw+! zM6k(omi5O)twChC)ai*V%tkRP!O$C^ILC(a77hn88_$?-DRagsdyKLJ3+TXt} z1{QV;-^%$|dz;G;Tjy+Z+XfsH4Bd*&f&34*T{rt|!(PpL8)-(z`Yao$oaH-&aj4|v zB#QuCykj!Tkws`bo?9QD+`M!eaplveR+CQcW^>vPW0~+diqTl4=YLF#_INnFb#d<5 zpGK@tU>W@D(fXUnxP7kXnEnJ9U_5+0%pCQY!Pd6XKy#l|k^E9a%P>!eA<1V7b%PZu zBpL!<$y*hD?0xLOMQIC&=mxdx|7gAHay*b+Xu=jk|LA&8e5++*4Ge!WmjX$%6e&5< z%qxa9@rg?i_etrR9VLFYYC1p8N)J2!<$l|RQlTKH>kS-?&Yw?Eo~=;8s$FZVfN59# zQh2G2kJES39*wZ#uMJ=bC}^=#q1PjUNyXbQM8n65-BVe9aVJ37kH}vk;#Mz@#tfsT zn=TcE@mtdgGsmp`t_nG)1m1QcGc{e(N&DLioWjg1;vy3Mr5M7kxz~n7?1`Lo5tuzB zlYHG(K|Z(}e0@!0B8zHSwr0pBcQ;QTFbw17kdj%)RI5dvx%SYo6841bDGWdKWj(Zo z;Q1BPIDBPyC}M*&ExJ)y%YW`7VIvYQ-)u{xq&$TBzhV(#V)4L8k51k{um>AEfvIUU zrjpQh745QF&u!O(-c4M1*}l-* zl6|dd`U`2GBG!^jCYK)>aizk^$y;RSo0PBaU}kD-tC}1GVTd<>>>EPm`iH*3U|W^F z-#0Lo;hu5NZ3p8ndoprYX7TtiiqB&=Nt<@(-A~s*m<7oq_sGo-aQ;#vVWPZFdVl%x zci6!j0DId4U=O z40YzxmDRUjJ`0b+OeOG$8b*1Vlng&qaG7RQBg;%Szg!UXpH`2B(uQ3)NYZeG@$uL6 z;lb}?@o`r1j1xeczqO3ar25i5rrkbNk+zo9#2sQolLReMr__*$*zK7Om#QQ!s zo5TIS_Qe*Z^YlmBLVk-u4@Q62Qp{Ynrg%1g!1#z7K)jIoJP@tfFNO$l)V~v4rAxu* zsc5iUw-gbf1tzLXt-DgjSA>uO)>kg~>;ISo+5Udy(#3rAE9Owe8fQbR=NvS*jBct;)*<|)heJk*iajjpgnrfzv_*ky9dP*?n(kJ=&pev(z+fZ*szv@=h}BY& zye&o}zsRc-Z!1SJk?hR4mbs%QDQW*RodSAP(p8w#?R`iL%eoF=lyw}g=cdl94Kv-Q zl{zGL0aU5okaH7@L{Co-R`*~5`?D@!rB&(Ry{XrxMWSom-pSNMStdu2zH*n+mT-{o z7%ewAldDsRp&Uy7lwDz!8rVos>@QOdEfcj@MvD)7c0yNBvw!z4DF*)+fp@aPxnEJF z;U|C%*Jg`PAF3|x-pyjHd86XG1I%U0b`J~Db?hiUf1QI`YE z?op!++{Sk8nQ=Qtx(l}m6*`CC5x%3Q^W~Bg2VbxIcAeC6k*%LA%)dMcdF1pOh%0M@ zYHk@u`?ic}SfWJhFU4eT>>!-gl^EMxSKOu)tN}-BK8)C@xh}gZ3gY$Qt|=EXm%cz& z6zm$8Ec8QY8vVlRf^phIt-pxUm2yWmvRdPjku%`I1Xf6;w&OEKOTgGZP&$%76;pwy zZ-4CdMfUgxJ_%F!_OYRD@bM!Xap)h&1jFpxRG(-kl+romgEUl<$-#6~(504b5P6a| zmoBPo1X8qMoMh=K$`8&4lwBBOUJSbQD3<#MoNZllPkT-4*PP_GyjAtqF%-Onx_LN? zGhYG63RiL)?z=hH$~#s8%4X)miuLVT7ayZx$kmnF+reDi$KMfra!b`*3?D(XU1#oDH?}gp~GYnxU7oM_~#v+Yq+U6pB+Qfn5*xT zq&F2m<*U^wW#UP@<-ZriN!0omD6osPuFeYTln?axA!V23)sx*QHXYg(ZNt%b4-1rF z3SJDxZYPBAJ)lH4zv2Z|sevnSH3~lH%o2#YDmQ7rFCnhK+D|Qnqr7Tci|wlYdb^_a z=`xVdBBnIwXPvu5{NHXcLxMklDE)2fs#s<|StSal0;v+WapC+q z%F6=f5K$qV>RrmK3O_q$ zdwL#BdTu}+g!*ux{obV$Kz`4X)EE9PTCkmn+oR`4{K3molcPRSI1SdMo@&`mNu4I=WqpVBOWG=6*qdA zOn65glox-L`O{})`{&S0Bpep!VgGhkogwL`bqK5?=5x#f1x1qSN&~(7CLb(z9apgJM=65 z+nVVWg|`Y{LLW)I_|9Drg3yo0k9CK4I06tkNzA{5}w-iIg1W^ap( zQH2z-llc;J8i{kjKyA+=*?rB*dae`nIgL8~-fllFGPKqV23Vmy48Ct+j;8mti!B(G z0(?(S&Ba{kn?MZ9lg{Tuc&xwUEqBIfADt*1Mx=bi^{3?VSt)1^E%k5=-_A}6FEua~ z!h*2_es|dj$91rA0P@K3$g%g3*tbcjX_*%ZmGZ{I@!I;wf_x? z)@#bB_Hw$Nax~0x zBJ}v;KMf3I=S&_}?hB1(A#<<9={RF*1Xn`b_20E&NKE}W&Fu7Zi1wX^HHk8iPK*kb zVu@eAqKV~pyzqh^ofIqVv719Jh8nqqj&7FwP_CD9?vqb$K8e|-^OKbrT=Dzvb{wD1 zD{air9G@~bHg(`zne>EA63W0WYnzT1NV5B84o}GlaADYDUyzY7ox1(!H8Mt)@H>;z zeqT-^#5Nwn)mQKOF`X!W<3ABPR`5QNc?wOAmziq_g_Wn0#lm!T-Pd-TsTyU{q^$Y^0DzK5G7G;%QprVWf>ah?JbUG?9GQ@>bQxH@0Zus8HC($3%+@-HySXx;L zwxDQ|HNe;d(}Bo!&?rmzJKU7q=d=;A{pj)?7!e;=;oiQjoMLH8zQ(y~hSXJ$+Z>(C z5m=z<5#nTciX#+! zO;b;+c9%taUz9g2dA(R*)S9j`yckykPA(L?-jJ8%E8ze}=mU4lVQym&j=!}QpvT~> zK%exFtAugorhKqoFe8c*5JN5y1Q=)*B>7&SFBsmSFo!feH0#vqG!`+`CYUCI2As!i zm5aogd_ZIn+1*aQE7yA@GE(oh{KBx*>A&WRE02lQ6aV9m?1w6E(>_JCplaQ}J?;tL z)+~!RsSSF(w5@3%V7LtX$G>3wJ@csgO-k5b`>pZ&``W-^PqI_BC#{pqe2s}m!}UIQ zZNry;y^uHz`?X&hqLcKm75eWt5I4d;bN)W%$~W|mx0NpB(a1Rx*q^`Oae0FJ`gVlM zm!o$z&Y4law7%*+_@@`ZHjy!_%RL-po1*ep_TngudpfiXw-JsU{ z0ryq9)c*a{Kd_ksLhZVDCVY0&RbiEu&>zVl$L&QxtTV5`ohau@3S!Lydh8V7b5K8a2AUZQ6#md%u0`W>X40*q9mYBV zG(ua>sh9eU?LbuJc>+?biVuq@|5gEQqmv~Hx@<6JihTc)`X2`!9G_7-PLRQ23%fe$ zi`CB14!Hnm`5?8=*#Zh2C?QUoMIBplD{#K$GQUfsUX`2_9i)2o*>;CfOuY?d(Zg@>yHeJB<=_n?`~e;peZqOWKY^tMh<|J%Z| zM4$9C28Nat?G30=2NSUuh-{+}B0?3H6pi>OyZnIIXI)yLFTMxP7w=te6} zzMHl{le4q+R$3^c{nip3W!1gJR0KR|UG%wB-pc=G4sHTKNZ% z(ptwri{bB>d?nZP-;d3|m(Rb}*FS$i`l5y62L3Pp19+|1e&Ue-EE@ie-~C^or;S4M z!}0rHy$K1H`rZGJSN+eo;$|kyBm94S(f|3U|Mk}}Ci3f&miX^i#{c_MW{Ib9{|oW> z|MNo{)&KUJzYp|-|MPVI&u{sEc?NXm@}KMYXJIiHVwxjd74(f_>AS!?ZE8*Qw0;Xj zputheY}e?zPoj%!rdjlWT&WV3eKrO53XKj%fo*<2;2;b^qG;w*q+0slP#K|D5$&IX za`_xPhu7{3r}UY!lX(AE|KsPVB#wi=)O3sK9JQPL>%p0T?X|*c)QfUX%{T*YfCOr^ zF90F664>+zB=S2L0*YW{_-fYErB@f@+NR;lwe}n!M+9a8XxQ#$C=D6}mB&dauC76Q zb}<1<0g49uDPTnzhjI{=$ot8Le=+~e4?zEdAlhZ10*Ksr8-eD8#baJdCy(SEZbZY_ z4Vk}fS6}(}2+iMN+;3p};SOe~RL>ev?h*u|wSmKsNEe36qZuQXtv(f5uaBw9fc;LX1ACYc{`CsTXA%)2EJq=b~$AmfXA1Yq~3i3=;>k=hF2)Zz6t`-Gupt= z?_*l9i!oKlRy=#izgAw=o&T`{T0h=DJBWiNaV>m?a+!9Evk)qP2!a`~&q+S~0Dx=X z>&i^=;li2dE0kv95=f|MuH(bT(XGFzHtqtTBo^gPKLzX&D^SeSOW-~}gQtwb?Zf2J ztap1LHIeyJkwIL>Y82cFn>_xP;BeJDsTzUPyaf&x4$iISvjEkx_8{DsbpX!AX?!2^ z8NIO{i8Ayv)o}f)6J$y3-_9<7lOzzB((o;?{)h{uval5`0W{Rb zQHj!q)>oqI>CZ$^u6RWi`w$xUc}5UWM7HC^^!h}Xxwb2NBJi~iUH-aB{4w2qwdC@3 zb5EQ64xa`?!`PaG&tYP^u+w`f*Z_EwZ^=$@=3e8qekif4!Qxp2aJgo+V$7yRRSagp zb=-NRrTGYl;UvPwP`@9)hyKSsQNMj*K1$@Q8V)!^uZV9m6Ncr?D(nAiq5b2B506n! zR~AUT0tsx|=K^qwS@ZaQg{ksgMFVJ=T0>}lc0 zD`WJRTA;5ydmf%i$)9`w>fb54N%v z!`me|PMT>n<~+pSi(O!ct(8yx8KUY!!OCC3t;qPRle{CU-1yhS4+s6lL`qB_Fcp{MEr7bFBhZ0Ls#6f%F>N7!A!{K&@}4O)~-t>&jB^ZJVh;Y~uD9wjGeGy|M+2 zl>6iB6e!vu7+8`AsHgw-K;i|J?&Jveu#>7$8u|9#8C(A}>HwzcS4z zV!I$$XNxxkE$F-g*F>*NM+k?{ekcX;meIvXoWJm9wZlimRX8uQ=56SX+XasW&eKYzm#jh!`}|Ks#*Rll zMq^kpZs;=W7#0(ye|a7T06O?l>*-&S}lk-E%3gy-04kbK|&(3Q4~L zJBdd$DYA?ZOjJlPMARrx24!H(IN$dDvKDNQn6+6D5aNE%j?1c-b$8IJ&W@XEmH*gJ zI0L^O`a$X{CzY1ts{Ek_eAz#Z63Ttv#**6*ezXpkn zre95$6$Do;85K0Y;mXB(QnD-r@vrOd|1Fs^9HBC_PRuj}!s=`%EGxJZcvacog?{|X z2e#uB>??(Dm`6jM;avETfHRenMP%5F#$lzLo}K*?>#;cyY;87~-;*-n|7BN%W&!6* z%J)5zDcj-GY`Za}(9G|MjTj}p*$5*jsQNrUkySTc%b4oLeF;EAGWgw?PJ)k1kpYe(fat~G<$$AjrWF_gfA!XeZ2k_4J~{@R~qA z`cly-r3kjPFjLe$o9>Fl4r?i0SS?q0^;|#`5#>-dwoITktqCXJHk)@~)7JLX%XVOT zE9<@G5~jbLdZX#uuOuelD5ZA-ynW|Axt3F$UNv`?HA-!`(c9TfAxt%T%#XyDX}q6o z6E#{W8}-Ui2H<}_%Ow~epLD=Ii1ztfljQTsQOwsdRq=Y*tr#Spq$4ue{MA&n^Y@OG zQ03F~Q&6e$t-~GucGZFcSOQH!VG9f|OddatxEqxYeCh4tCmZ(KaYL}>!9{#X`}*zM zqcyP`k4dFeS#JkER35_)KkQsFUg{W8XR&Ar1{~O>M55b(++>o`Ib%A4;f(M;g#Zp@ z=#BcuJi`Vwz8*Ls2G^U69DTflPu^`jk|o>5-h(*{hKe1t`~J>;jO_Pg*C-g=QAu8$ zQ!y5~h+SyeQv@nv_@0E0tt-f;w!O|E-2sKUFOs=Zc0y|5R4~Wd4Z2kVIHqg zk|8c`z~|R|E}deEnl)^l%sA9ebd!F7jbR6vp4uto&faaRQ zu8hCte!P<-FuKLh_nkNVway94w*k571nsPzYo*bQ(|sTYoPMVJ#deDVH_@A!0M4-q z>_cBr3}LOWU`1*xZ(I^Z-!mUfg4%)D_f=kfqE=HvI4a|(BR(WD^qS5rlZwaW;ck9h z;2UVuZ+~3L)L>d+NP-+D8rp#`m|xPgQ__=^ii-;q2rPf4Jv!Vk=LS2{1Of4PPfzJn z>Fs6yiY5~(-|-PiK!EzhjB4k4U6SQdns#!g6LI+Lwc(Dy+f3( zG?<^vJo_^kQ-R)5C;a}I6n~3B^&5>DYvE{PIZ?iHS}I!+2tP|=K95f_)rhTq<%G)3EBw+rDPzneKJWAy6$6P~2_ zv<<@7Lnw^YvXbJGgkqZ7=7~yPdUzzB$+=)4NCL3Pi{zuu)hFCl_kQ)s8yKtOS(z%+ zmbnv(+N(pJHacbxrXxPZIDl0M!7}a zMAt@t?%4{XV|EUs`9gwa`GmsPSRsG-GS#{i>2~8;1fL9RaRrD=htJ{EBwEnjX)F?K z)$ZwsE$PB#V8nT^{MF4TlQ6h;%*n@w&-Wp=mboZ3{obYUb&kbfZ8J7nXrxpc&VPdl z(!9}%{uq-6Q83^T4W5muD(H7b6_}^864NPI&zR9iG1XacV|Ad5MzJ#ylTaWzZ?pJ6 zMD7tUU_Bwk=d;q@cLCD}S8_s&z(vt3z>2{}%YLCBNM`8q@kPgADYe9pKtdN@3I=Zw zGQSsbaI4)w6HZ~XsNfT|+Z-Q&FKGGcBPRad9`R0eP=>}{{$2}6B*jnsloh7q<=BBE z=0F%bX(oE|L(P?ylb=aRnSqFWnSw#wE+fUMEsNb(vt-{FY!p;9T zK}7nt(nR~fayYXcr+U(EgTk$4&?Lm-W-UgfKe7RGI~}G)O)K2a^$Lp-6;w>*D{d{&O*!>YYX%pOb#lw-?@Q) z4j5yzkKKFa-9C+G_@dmgWwevth7dBA-Wy(3*;VkM-64qok-OcmMqT!T_Zxm7JvfwA zgf!^e=ARg^9;~$8+b(e!$|q(DtG2q{MqC$X3LD!&If#$&j+k3SvS-g)z9-*40XVrC zFSBP({M|bnUw8GG+?d>rIrt1cZUrBaf-O;ba=mLNyQE^|5eB(Kf_>p<*8NzI(j$pD~G?0dWA)HgZYp(pLO(ZyGf!S2@)ulO3%}IYu-K2XG-)J0>L!>AC z$?@$tqKR^fbChrwLY&j(p^@84@L(9Un2)WDK3ZCgD`-#WKMER(WG2*8)6DJqpL#i_i4@TL)c!I_v1X)Y)*hR z1w7EJT~m}YWrY0jME4$j=3Y8AIdhCj=pW!u)MdB@JQRNxh0Mc!=4XlMtNH zJ93m*alLLexjEiPR;|?A0xq!?q>*%%di@U5Z#Od?WniX-oT z(`_=tWBN!lJ(Ez%kZ1gp+XGGv0q2+J=G7JaHS+g&y>1q^Cq+!Hx^coZhzw0FLztuH z6p{}n2X@Pkl4}N71G>Af#^kkmcH4yJjjVHS!%1FJILg)ZJ- z2}a=L&n^0!UZGHUKhgWzO_3(dO#e|vf~SdJtR*?OpRDdn(Gy29BuU#j zzidOtM)M#(;_S7Kdg5_S8_#`d9@0w$d(MS6&T!A)D$!E9tYL!JH)2& z)_FI@>iz~dQet?4F<~I}=Q~KB`^c*nC>@MYo#KvOn>ix1gkiY{{|nQ+(L9~;tGu=> zU7e1=X2fFD!AcC~9;S(gu*aY$x?(hasc@_3$SWvs0B!jX+CLJ0t(5Q=#2?HRKG_e= zmGGU1ilBEgIk^X9L|`uv#^z{_eYkYlEsVxs=+u!8N}okp>%TgrLIj|j? zP@(=!1ra2BxF?D#$JT_S$PlHv?#r0R@P06a6j9h4BqDN5v^q&_x!%x%ZB*%l zSkrpXUqp@kcXEutbaN2y16NI~MDJr( zM@!M;mKZs!=Sqs9uW#r6a3u+4tJ<5}WqXTsVHe?Fv_XoQot6 z-#yR-XOee;Hfnjl^Sz<2mw?G)(QECbH5p_|Og^7Zgz9JPF;mZGQJ#H!NInySX{cyK zjspEf&eMfHX}CRdkRj!B$OAHW&uBNEIZffj=7I?ph+k8Ag`etcVW^ybJhE!66|4G7 z^z%vVj)N>~!FM5?!xM_T5B7N_OlN~ft#G}_73V6|LQ2)0+fR zt=Vl>{h`%z5HtImFnX1WQmu0k*H(e>D^AuQJ=A>GR**2dGDBc!ID$5>l~(w~A9J^x z)$r_8alY~c0)2lT;T~#Vid@`=?j^cOdu+~~c^*76y$bR^Jnq<<Nn?0L|?^R)Tl5;4!#SZcI4B36TnM%|8BZC|!I6DCtn2O*Esg-KHE!x^Hz z@40-VlGu32u~++~x&MtTHz#m#^J=7Gur+5SxaZA+Lud!(>oX;GT&)YaK@Q#YUoHKK z5$>=jmiFCxuQq#E;_1yU^eW=Y&ZeI_gjh^(ZrPg>)`R4t zE0-*f#DzWBa(k!m)-19$siX+b?a5`Rr|YIHMT8*NQVio(atUf}aNb8hh{Fz(vL(s+ zPtac62AvRxdwp=3oVeGA8xcsF-+G1ah@>*XCx&8WP5E#Qoyn$6;_pDUO}g0HUo)I2 zl+nzvU2c&+)}~t4vhxtL719M$Ufd#a2|`&fqMU^jRHj$=7g~lm+sE^lT+=(D3^6(j zZ|@E=ysvi4XD#%Gj#l*^(_HhWbp_^L$#!SUs!YFTHh((uYEwt52P|P?)k|V zO*t*ZQCIbX&oR51USyPF1B$qvo5#VjA@gPOT=4WyX5=cvLeLwn4{N%gMAa2BCH*sM zCf2GS2)=5=Y-_0=*ssk=QT&u}5PALG2R$m6mi$zJ*%v8PHe>@>am)~$-LZ3>*jFot<^WsT}1%m)O?04hES1Yd0qGHOm=mX43R(3 zOAR8NL+^Z~*eT*KH7!rf(CtGi!sBCRD_$SrCd-xnRF0!Fgj*h(3P!0G4+swC17}*0 z4}x@#^?pvKPaJ4J$Df<+vh%N{IZeIRYYGUz>GtNpDIV|UH0KS(ozuX>c@qvde{-AluG()tt>?rgiJm?&}4fUxkt3%HUcH|-_66?_{M|-s0Vo&mR2x{gC1tJO@D2$^E*e3j^Q?#iiN@r64#CCh5VUk_)=@)ofEBQbeMZK z<{taGB}I(#pb2X3Ulcc}oqUS*sLT#=sYi~#4uSXO4b6k^n zEyHIxw{K*vRDT(xDQy;Kv&ftEQyFEB;4;Vz1H5q*QSU+PUzaHM0DQ zFJ)oXE%|c?)0Z1CjeDq9dZf@otI$2kE-Fp^^K^JDv$Jc_En!uha3;nz3Pdbv%#iTuKiZxrsGHXlX~TtoQx;J3 z^-%Qq$%{d^79J^O`FBMbWf~_~8nz=9fQ9aV+qnasoA|9X@r|^k9dciiO3wsxtyO=a z@d3gpo#T`Rcgusom?jnpUL4#H0cmEt-+)dGpTGyIw6424X(23;_WUyL{wILG}-Z7;jE;JMb8w4htFNC zaZ5gQKtwI@22`z>3 zd@%IWB$>Co?tV(m8gp*?-3c%}lG)CP7W<(*j6&dO$d{iKcJ*F1ZI_A=z$=Z$-guY` zEx3n-r6QLZC1}^@PL}55W>9Iz6lhZtygt(Otj7&@r!%Fz7uZ|s@ip)y2T_g$Yg|xgV($id0Y`Fg7tq=lbl;r>TShIFnyma z+n#4r0wIJZd_ZqXs|}GpMWuwMwv+l%ZF8a-J9u4k>P~Nfm0=K^BA2I@&O0Q%Mdhr91RBHc`(iPN9zM)avc^yCc-TM7Pqkj;w)j>>yPQl z6&1Z)*i3}R%Ie~NALsNqCpT*fCCjvzjAlGkpIB#h=RY`!vkKX+y$^q57th!8qvZ{Y zkohis_%*+AN+X|7WV*ZDeEO&a!bpARiu~8%kI>S26y>y4n~qaI+^r}}Vg29ZI#eU) zsPI=dbiRynhup;|wAiO`{IR-^)AO31tWd=yu6(FPgChPpPk|lU^Py7i-RAZHJ5&8` zgA^+CSuC|TK+rOX&Jm?pBu5z;+`HvGD8SeV(BpO%puI`AU&C-SUBq|`ISi3?CElSs zLecGmnF->{D)r9nyiRAJ7i<+XScQsWS7Z$}1~!QcF~^O1l#4UWh+y71vgmM!Unk%c zO&@^#OXkbeoAXqd16CBae7-r8s!jK^Q9?GB3Ue~Nch|aY5S)G}T>I<#F z?_^@pxc$R-6TjZaP~6fX=V;pV*ZJjwj!kRJ*Jah$(e#JYRk|1ZSL}gIqUkb=sq0XC z_s(@PjKg}ZS!5>>DYAN)@qgHR%do1pwSQO;1*8_D2+|@g0-}U82q=P-l(eu2Y3Y_0 zX<2kCCEXz{2*@I(8!3_QX2E|<_uj^S_Bqcv@7MRaEc7niV_pRY2T{kl7ud3}b6qfDGWoZKxU5VL`I5H9_h^jpq;u|Ex4sy_;j z-nZN|2|JFtbvAp*RP<)qU|aDO&!X35OpPDc=%O@wHae%r9XUG9Rfj>%u-sNbQ`vIW zo?J&?8Pzdt4S4Cle)}ozN5#3oVi$g(VF1<9<2^;bf z2gN?$f}*bAyqBY)Wh0(Ene@0pliWLF`8NCe4X-20b7q@|E=XCltZpGwOT)0#H|>gz zswNIwPcjuVo*?`*QDu7@Euf`XU=B?_Jddyh-&8UHx8gnh(38^t_O?WAj!X>I2DhM;btLYabUpXZL1EbpcidSOyHgY0Vc zre1hw+s6(u0s(}hh+Eic;TD)81goEbf=4kpQ}q_9P)(r~zH7jw<_s{_Tpy^MINDTw zoK)#_9j6hiz=XiJ`o^LV$-`lbt{x0!QDeH z2X!O@S8sgXV52rp#?4_8YULO0)+u}6HxJ6t%$qZt+C%djXd&t1x*;*=RM{0!?Wwc^ybpd6S20ci6 z{gr1YMIAdHn3SqcbhYovI#d)TS_4v&aChKrU4m^QOEVWKIdSXl7DmOsqw9j$ z9_AAzhvS`W25+PF?kU*jKf|c@#8( zB)x>C@CwF0^t_F=W2C@DsMkZMr$LOP8OPVVRIsp>G7 zV7~HpC)|O&JgBu^&~@SRnPrD7cJ%9_PjYT*R20nMNz&+x1@h-&29TvY4T zJBJPcJvuFy;q6F;`MI}b&GO_2a9_Rp5%yXQ=;c>ANPuC7SMiIhpWOO#>O2_*|B zS4yzjxVYLx@X3~y?((#I1~F=2XVvC=9$L?*UMGt=tNVzNb`m#pM=Yl4F%NfsjFs!`HBF7@{Z|fa1Z`k%sc&Z zUx?tH@~ww;!fn*do3c-=r)&1MZHp|W{Z{s zwOkSt43MaTQ(MUr(^QDhXqSy#uraqZ$5)_)i9Ke7$%MI` z;KEWh6Og8RTho}RgZ<_kbL-o97o1WwC}PiAaqo+Od&&fsX)mu@k~!MZK; zA|#1?bh-ob)f~Brq?=K14i3yU?o#zJt3od@iJW}jauil+XnOx3bu8AhFNCfGZ-p36 z;=`b5kW9W;`S6PFu-e+bn2QQ_Z+PncA*G~=Ezw`Qn9#p67NDR_#%KF zxRIRg4%v+J5cDf+$CyRXP6{HhQ*si@T0YeT5Bqb^jUcou6zoV1R~1O!e36E!=sz8bTd5S3S8NZbGT`C2!I30PM%gsztgg6y1cPO(naPkihRiE7c=XWzW3SkRQBO&pvQjBq{Ir#xkCdG3q|gmb=l^d zrFrqwuVUTZ#JzA13s%jfNYBgS(izXI`#f=6LRE<}PDRU+uB4w{-@lG~!v!eQ!J+b) zT*aFc>U#lrp0p#x-qnQ*_IDw;G_@)R8n11VkcE+jk#)A|=`xDc-&r*U(Tp!b;{A}` zsA!-4W->ts5j%&kE{+3|&3#rq-X7}(Z1-Bdq;b7;oY@^$nAE*Ud-4>0Nv6VQsCLe- z5~IFKt`7y$6syFoT+Nu{4a;+U@vzlf!EnEK2oX{?!KY2gOEdTAS>#thRr1@i2j!93G1<(lQP zCcsSQAkZE_T?2*(C0>k+G8(D(MO=~D5Bmg0<>@6nsR8Z zMWo;Ay`mRltN7x{9z%T8G%LvR1)^)~vMA256S~mU>!Q&=lZo2V zJ8NX~_MB7U46`M-_j8}de3@TX<4MCMAG!#nF1k90Rz3tKn6z=892ypbtcEjZq~vaV zWvpve`to|G_2%9N_ZmUAPt2LXt;q(RIlhJ^fYke-6;Z1o0m8@z{Sz3ar>Xj|qze-R z7MWfn_w-Ah=FZzez4POj0QoCxjHoXB(Oo9Q8-4=>>!q914kY$fhwFt8HB)OpHv8$B zuUs81HKZ!5D__H6homXw$`vOIB{fCZ!wfga=7vKiVXAycn+1aJuAij%v!*4NAaMF-GJGy_m*~Sy zw`6@^|K61(R85GaOHz?!&71sdtQ+>5{=0|3#`$W`goFE00)9oKPXd;UkXZb_#5ip& z0EoQ|F<5Z!qBdta=60uY*4pk^enRnOcygq_f3io?xlZQ;dJcYZV;)a>bb~!f zVQk`wr<>RD=9t{0mm#;ZdX>h?d=cd;_I<> zJqFRC&HhofrGvJ9{x>o{e7Q)u>o4&x6a>mBdTNe{kJ>WWwQ#P`NIi8sjxLIFn!k+p z@@#gCBK>Y$p)qoQI|F&qcti4iG}VMTw@`af`TW|7Gn)#|WS+RWtLjPZry$p*CbyW1 z=sFFx%uZEowA%bh1HWUqWC_>|WfY6Oa-CV6`MOq=~$oYq9CsZO!yNWa}W2 zO|NLcPg6fV`oQ__&^fT6EwICdTs~H2WmddSoX;NMv+bKPzuv4ptZ12ZIcyu++SRMu zz5&IOsOx|?#Ts{FVUU$X!*b)d-VO7ph3PDbmysJ@3~1ePxF~cPTbXS1*%q)6FQq-! zy~C589{uu;hb&THO;wEtY--nI{7LCU*>g_xo30ZvO2-n*q+(#=o#;idjs|hIN?xrr z<1o)2P>t|}g}3JL!!h1so0KUUzApcy<@I1OTP3HbaAhQBUoT)Bp>RLq{s)p%COxbd zulD7A8T~Y3u1jP0XMcQy$Gt2n>}VK4Z+tB;^8r$;Azh3< zWh0dt@_sb^NT}AR=dA^A0y9>#t8+!~aHBTz0~6?b(FP&53xcIb7)77dR`MB+ylxw} zKTYNNK7AzkR{T@G*>JPTgbaSds>1oO`XJMFv$M%y7`Dv_D1-)|B$AaV0dk=wCm;uv-KoPBO(dD zXbGe>OsrjWbhn?Q@=p)*btvXUF;FBtR;I+RhQnM~+{=vO6#C2esXA5J>2BbA1WvmL zioG)_(JiU#ixZJsV^%jZ=#!g6beWdcP)yLZc=+@^Q!)}yz}JBLRhyZ(Zq zmR6H1d(l3vrBQ{XQ$svHRvP0Ql_7qAaF<{pU91DMma+Pko(%Jd#GYk>ZC^A^L>FOm z`;_-H2qp2*YG%N4g`5P=XDstro*c}_aaRUgp);NHQvFsMpvBp!>_2FX&Zt$OQ` z9bm{C9<7vXmwmkWP#o`*LVFox(mTz88`G?P&EF99_kjS1NNm8wZx;ZJ zp>;rx^1bXLybmfR%!Lj>(xw=&w74ruP3S^q@Bgd^2-2;Cwb1~Gzdi+~=Ch`tOgao) z52z5>B>4qIA0Wa+;Zi*abZ;8WAkMs^hX@e6&14pVis({hKf6L7ZNX4qrlL^hypINy z5c-e*aPN9FVG5wVs{1d#^HSIqQW)xz6a3Gw^Rm7kk}9b;d~@*!$K*da*n!$lQ0(A8 z_~?(Wb5<4vo@bMMr2gZF0DeXv13=Cm;?8;f7taAO5}9DQF2u}eKd$}1AIK$v{Ldo5 z7yR!Z{qdvO*CFA8b+vaG|HT9U|JX>XProQ8|Bvg`GhPP{ZY=shSp}Cvy+B7~7j)8) z2334>1W@hrGX=KY?I(ciVh9}2CQ#r9Voz+E52L`Na^X_v7^27cFcapB1Q@ zE$|uVuC2Rc(96UkHuhQ>lJr$Hti*ReOH!dGThJ<(R8GqvG9D!1MZ*1^E(54C5j7`= zOT)l=EXft1XlbRS_1+UU<=6ih?-HTlxk|ulJ%67(xv}gRltk|@q4|C23t3*Zz*31PYdX~3wl8(ma&ntT*Q=vwIL0!>8Zw3Jq z7gUquL|g%xpIVwV$!Xo3z&Q!egoYmz3W+Jif+^UNExhuBaslOVucOgx$JA>9TI(%( zL-@U9W)C1>&wkVsReQ;M2kdy&lq_byqrbsq{*17DD4n=gem?qm8+n$kW?NwwME3eX z)I$rx9Ks<>CrQot%QQb@3KBMqlCvKiT8-0w1)l0?5bguxFTMp7Al}^Ft2FlgP66rw ziGI^!XTUAEJ!AZ^))YJnT@#%$c{hMWbHewbMQ^V@TCK9n&c@o7PBvFt=B3YOFhbZ$5t-~XHr=B6vIAqX0Qs`ThciE!ab4iAK z90AE+<$Cv~XV|vc#94(;{v0%Ne$Y7T4p;yAOF-(IBn{&Pu+aQgzJk2Ojz@ebMVcz# z=cgu`WnJ?wGoQ`5CLCs#w~|g>_OmYzLd1ZoDPOXN_aD7@-fPo!JnzN#sDu|LsLmY$ z&muR@KC-fcNYVt1Aixy4gPM&HVvQ1Zo;mkBf7*=D0j$%UC;G7r^<^hsI+1DyF@be=ef?2>RBjc)SDv$= zzabxB4L~*T@8rAJOo}j9Q)1_Udapob=uX)6?t2MWTMK1~To>#fDI{it-Bb&~{f4zq4+jg7 zcDbbkNQghP4Do!m9HxBMTevNhwH)V6A-0F|6XUeN+!a6?=vW4xXRd?R&(zSmnB|q@ ztiH0IFORo6@)J7#fXT6ZQk;Y`^$j)hxvc!Db~}v??tajwT_gk~IEE)rcFSq(VqDw+ zGqKnmwWKXJvGqc|EJo9;v|sd43!=I~G$FtUNYJ&bs(C>X&kk(79yc#?a(Jp^ZD(CZeROAbC%HKpZHEjEp#2or)7YQ`p znOF$~%m`O_%etsp;Sr4qfjMRvN)!z_EzD~zp4&OW(cTwbuX=ge?Ce6LT%Nx+8$8VJ zrAvmXf*pIsq)|$c=+Oq45aAGGTL&iSb{KL@&&DJK#U;K1$H`;$*;mBkisvHL&kt0n zgPe(9pY>)y87Ef-Z3t7HWpb`3+Fa9M+)#qMc>}>(Qk_K+d6O&FhOdxq((&7%^dNUI zhlZOKgBX%>m$u;tFy(WwtfA0Ttn3RVs+lvhz+Y-(xaTdjSsYTX*K4I4m6fXC2TH~IVx}c~`r12V?YxE9n;P4mWQ8D+(!ILkw3q_MAWK+G#&VTi9k3tbB z(pu8^_CAjScQ!PiAn)lWpOWq4BhIwUsBf}EslK0a8M_&i@;=uXMT-e#&WeCXCW&T0}Ybh6*+&21hnJOP#xUmi&gw5dF9 ztPq}u3Adf~vJK_0SAbsa_i=n#Nf*+SGz2OA1V_TW)Zv~EoN4Smb6;$Shcm!TvIvvX zA$jJbyBMi=(Tn=_IH1SEz<&)^4O|L*3puK0`vLJ}l|k>VC|a;jFO)yAh_U#jI@4q9GX0s>k!{CSvspZZ)~bDa&8D&1|Y`4nSdr1o5nz zHc7I&4h*3puw-?qKbTODnW-RNrUJ&JVw;3>r0rlrCPBJN8T(Zz5JUb%%Lv6s*!($E zrNV?5PUk$CcVKmkvxfcbOC>u>O9-ogeC6HBAhX5Dhg9bIE7A6CJW~+rOYX(?+6pCI zoJrn$`f{^(Bks|s;)7w|Cco{GB&iCC98VWsLhicCzbcd& z2W(_12l9qVkil!86pu@sJhW|*Zv9-ImOmNF&BP!Dru-an^|u}m^U%VA6dNe!(CjF6 zcCNF`v?r^+__F(_NLgTZAiS>sD%;w`uoth-rvUSOuqK13jK zCFF8TV$y-wU1`S`m-Q`o`538_$J|d*9fzSNmwmB>{D~Z&o!=#v&C4k<>mdi^bc#8T z$5+*qBzYf@DhE>8k6DQ!Fh8j{sB2k^FT6=QuUmor0z0Z2K8QB+>Y4`=^=uQ4$fAAi zRzmRRi+;|{vyI3$0RZcXJ`-U9q@%lGA9!p-4)x4CT!;HthVq}V$vsaV(|K2%V;9&_ zUb~YUEQcj>Bbz=uQrtV0QFDlN*jxPlTk=p$162WYM8l;m=TK)HNyy9I_vI{z8>5#f`H z7HX1v953Cj!Hu}9!A%m7JpDv~fWdMc#nh-}Z;;m>@J~;$ggcfy?jZ;-*?qIlxp5$P z4$e1i!e^R#Oq0M^;xLD1!gg%Vr?f<)tK89bSNE`FcVs{%Q&F&*dC#^DPEK!}EUl)s zS!0^?YLhPexC8HkZ!Ml-j#$itn7b%Rq|m8(>LK@~j=+SFko-EW2N_6`Pe-H8uD$Ts zlVFbSkK%lIF>h8j%$Uq@;Kq=_FiWdRLeb=7varBttsgsCTynG(VRlQkbgbWYl)}~+ z(V_R`8W*`S)&Yw|r%D&M>WmJor`U50!$jJl=x%gw2H{1TK#)#9^3pu=OWNORxHfeP zh;C$;2$so+X6WS%L~l=Ezlg9ha04-c?~2<>OaWmtjf;5bHdu_2g0^`%%ye2L4Rw&3 zZusu^yf~s_-u^iscUZp3=joKPuxz{} z8YLUu9sFv1*%vs5$~I4?$C;1FcUFL%h+l4O8GCHSHI1c63GWX~16b5i8qZr{c-~mc z(NjKV(plm2S`NMU;scJU*@h%Yyx2FuHiuwzDvs=uC=@@ZP6rN8y?TD8;XE$OJjfb! zT6PItf-Uo*UoYb+KlGVKAKlbb4f;-SIYFo86@;Tn#dK%P zW+c*miDQfH^&+W%GCB)RNOvxRQs@>c)V+ znHyZl^-|ABF1m12VuAvQy@<&BR7wwL$Vvf*S=u$EAm6@&ZsGgPCj?8-49MDPw^EwB zR{BVd$2QLv31=S5S|M@c=uDPLbvdFi`Sg%%zMv7!_3R9(MUMLyO*WL@9<8m=YgC*C zi|GxYqL85c>3wC=vrTTdQDZhS276~r+!<+?C%iUakRs&FZgl2d*nXh(zIE9uS8+G) z8Lf-UAEjAnH^5$jK}Xu)$%H9G zg3)W3=xAV+Bppq5)F#yr=@D3h{ojySw8hSZ9n;J4L05@-!}D|m?jJGN{3jtbPD0$b zH_owH#I83U&999zN=~@166OJ-!^G!_6iWm8RVumI%{dgPb5OqJf5EpH&Gr!NTdN!g zM|Pl!N?8KGlng>F+lwW)L}BVC#=T%Jud;DuQix@OljMja%HK6_eo`ty8Lsv2chaB_j_=FX?XOPDb z%D1eUh2Tq~)!jK#u}PCx3{&FM+7U&QHe_KhBei~LL*bG@IT%%6rpn*izxz6x_w$Y6 zp07glcjEkgp6*UqFj=T?kCfk1!T4ryJo`RZYA$XvZ*2Mbj{3Sa#tUw@fI+~qJ&;Xs z?yTbW!7A&v=q->M%jox;1MYj{6OTUE>c;4I0jgbZkEcGnCy?vOwu9i!N;}K3- zcKjOKN%@f;?95l}1^Ma+*jTJia3l@Ow+`z2>@!=Jbv=aGMwYjoSc#I%chEn0Gi?`` zoM$oQbvtW7q8zjLJXKWwsvC%!3{3YlTZWW}$|{S4wVBH4NixWjufM*9mB{OM&MP@I zfuY*?k8nPP-0^fl%!PD!QuTp}=w3w-+z*?jm+|#n1ZnVxg0jSM^Bk>1%h>89P@(PN z>oGT+Rq((IkNtHoeSJ(3k$&5lIfn#&#C z*SUXh``4tEjrTt!{Q9vAr26Qu>uIY_nbK4Q4#f&>Ai4$sL88vhK839m%6){ zbp&kT?yt%Sw+h%PHshqK(kuog-J{o9$|(*$9eZ!+!|7WP1yr3ZcOB>TytuVUX?F*3 z?#Jnq`1S45KtyW*D?p$HOkvy*ROMqSzW@O(=CF(N-0^| zBlPlz?hv=_l!8i%Hl%&0!4lSi)4=apBXFQ=qTq1S;;i;;9+I0aFmOEOzP{wqel1IxUwy@=zDz$LbnqzJ>Pc4FPN9&QpbBf0 z*++j(*3CebcwO9SnS_(ZBcjO=-xJngMYb+@OIXc5?`u2P@peV!>u!vC9K@1S?IV4U zN7YN0j~x0)sRFM*^kMxgSKoaDjFj7Lioffs)e958JhvveNv|=lN#TKKsA2(9IwEQ> ziVNCEI_=<3Dd^C=Pc=~Y_=rBmzYnHKEL`uznM0a82dzi0=#8>#y`Vf=<87H-et$s> z8teVwsWUT&prkOT_Wift+UO3ljI5iU_bA2AXW9c*(-2o=O|0vUg14xsfKIjfW!ni_ zcCe3TZJ?S%1@oTN^cs?6E}OR%TfjyEHzh^ciiXsCP}XaHW4Vx zb3AxO?Oj~Ir956dw+GN&SL`r(zDDbLcE8LGw<-onD?8JJP4AAJr`)})Ynwe3Yw_~wvJQ`kF3V36ZX|VTZfz7 zljk|4|EuS-^FZly9>=ukAF(ZzM+aSB$F?ZfMojk$u&KbC7d`T~w4)z#TFMPyc$#g8 z!S#K|jNETGrdJ2)%ZcSqzBTf%iP+9@2!SbYB3~vFTjlC8f2X|DKG~1UQyX6Vl%2B>NtxwI!IiSbd=zh~xmZAbc-Ww;mYd3-*mAr(A zHO7lSFw_xNdNN;ZmzsbSexE#Ly^yjmgu>~2ka(mEc?tuP{sp`e4mJSc4^1ZETP}b! zcStw$GBN9VIEnY0boZanwn-4Vebh}$jJqMpbn5InPwK$Mx!APq% z&C-H)!7+3F0OkK#&9y6-29;$2g)9av>`Y?hdoUJ)Gii+OQX(t`v*jh+l#T;3F|XEY zUG7XtYDGJ)Ek&mAyE{9s`9vqmAPG(rIO|7mYdxUGZ=tICvc*~kxHg$iMpKB^uJp!| z0$Z~X;a-$qQ(w7IN~U}9{(*_2UUHTm8dX%;YR$zMAqncsiKnYAkC>`zY8A;ovv3Um zndbK>gbG%ALLm{Nzir~b@u7L!m6`E`$GhE02x$kC;UbmaSc*mgNLl#WL+0Cd!0Fbf z4kA%hfz4JU@thcW1ty#R(?-6Y}qU$3w z66nY=7gcs;qSA=cF3wKvY z`Giw;%BRASXW6!wt}3`$fKqD0pdeN3ddiGd2)9z3e8`9Exgb9_ldwnLC9h8}n>co` zJZ!7w=G1$S4Dya{ny^cBrF5b(Z4qsS7%N8^Z;wq`+Fw7wA3*kHY8{hdR|(?DAj;p~ zF6nm<+&$@tzRhtyi;uXVVph}D@zWB+=Ge#)*f}E28?D3>{Jx#1yQ5fnXYTbUsoa*& z-4cCLFUWsva&JS5ctNxget+x8RL95$W*8q1L&N6L-b0yd!u(uH5fP&Ai*G6qy>H(-mmFW0tfNgLWP0J13 zgQ2+(IEmFoqRZ_)L7VrO$A{*z&Y5@#9)3$HAPd;bz!s_oUgJT}XHof1vInJlXJD6{ z=+M^Yfp;Ke)TPB(vCI#ZtvIlQqshUA(%*sNWT&lpdC_hI@as@XY4<$IDO$p zRIcJVt-$?^^wGk%82t-C%6M)R1p4FCE%uZ7N)%`Ba1b-TG9iLHLH02m-GGTU#CzE0 z_wW?T#@TCGeN^d9HzyORdJjZo49NL5O7mTF7rwO${WU~92&oG`VtHp$|EK`|fn{js zK~tuuWz-W5^X~$aEL#;g9jEgBB8oerZ-BIJerN+g&h{O2W*J~aXc@gc%|VCLnN*|4 z^sB{_bww^lpT*~)b_Oc7MIgs@qe2&cOZ~&!)B+IbVxoNm#1pdR$b**D5+0k4Y+VKmc86-_qk|Tz#m*eH;=3EcZSM18Hj3q1?TG?>@%@42eRNc-U~`v%`hqEh zHAy(DFqsJ4;~(M1-V6YO49{9DNT7uBlmiixs6p!z*COK{_4TsiO!*gY6N{J59{94i zVJLEs+bH_JzG%m&2t7;RqtUK;BdO8DM0N>iX46N;UY$X=6H1ke-Prs1`gM8mI=r35dSITE; z=Gt&qloBr2{}sNaRjrnqCS;L4id&5{Z+SKSB;%BEGs=Q?yv{a&YBG-GN5{J=j(rK; zsE&k<3M3(ikHuT81%Qe3o30E^Ahd2UKSaGeY276t{yA$q*PP5lf!(+sHlKuAHjJ32 zk^C_;q(D_j30W;h`X4Vr2khxs)R&4cE1I6|(l&*CoHZj2f??|>=Z;7eG$wIlT_99` zj?dQsr?>84rwM=|l_zL1rrF??xr>40?C+}pcGPDOiwV+V3ceit#9^wpe<>mAvc=*p z?{3{NV0a8(=%~!|Q6R|XEy8A^RuITGd9!J~`$0WLvE8QYw zM^-SyUM+wz2G#da*_{F|KvblAstGB4@>Fpa(=HzfoGnA@im%WSob*FxuLX8l1eray zzxtS%6IQ&{kQ;cMd!>()WeW?Q4>D6UB5t5|Gz_SZBZOEfrj|&i3>%DGnJDqHDT(*! zQv&C8i-j z2%<)R*zh)K7}Nw_cgm5!2SYo2(#cV+l=7kk6vi8{8M73rr$4& z&bPNM#5am9Y+Hn70?*yJ={QJ_yp1$wq`yU}+g=3b3%@!Z>BCo$=A_&BkaYsrQ-Ew( z{-_5@b6t2N!`N%b-w(90|3H=qPh#Jg*n?e8{_BN5U)ILHB=hC6>sG`5t=($Zi!TcT zmCUh-^%^fQE8pl!;43e_I_URdF%4pSg9QDt#Qj%q&$yequauXI8?{`>9V%#uXjQK3 z$SL=#%ef>G_U4M1hALj16j}B-hoHboEo1zU7KJZyC(uAnJQycmc4c1O?a+3OKNhe% zF0R{KojF1X*oE_eN#9E+_-KgTIGFlHHYtmRUFn{kcr>d1ECH@ObD>4fY#pc=H8ATr zN4**Zii)Jj5H=G7Dw;!3og&7F+r2r5sha@CKdBT$X311!wQ%=}N`EmCniS0O;NCu# ziYn81_Cl!^b;0)NmSTp2u{gDM<7qlBIiYVTk|b$IMa!>H~3&Z0O#Fqb6S+NE!Gl@$^JN8! zgOAA-cQ+@L%xI5;#kT8gXTq)s)%*Z(e53McB2K_OaDQlXcqLEt;`e&w4~ia%B*xH4 z675-7^4l{yqPv&SF+vy#EGO=wQ_yn~wx`k4s^vCqV38+^x!liBy+Oh5keY-QU#Z-$4fFAjHfB!FF0+~ z{3RV*iK?UU0*+~tV8=CJMT_V$v%1zksO>JGQZUK-XunZPK>1rCoSo$fQ-HW{gg<~h zIQpT>NWD~>mHb@JwJ0v{0LHnU9W~yvvS@R6{uP3Ry`9G1Uf&B%inx{pM?IHivFCC z9MK;l%9-PS{@6c~blrkzos;l+4>p%698$wgN&pHN?v)ivfRv6P;dbIq;(1&hzWgW> zE6QUa;oIXjd+C3uTmL|$1?mD&AW36PcIuDh?Dt)E@gHW(Yk%`O6Ybpx=-%L}EX7yKC{!aRVQA*;G^T0{|mW!mGWNj)I^ zTXT3U{;7)JpV0Pu%I3$7{qsS+Ds{oW>V5B?AF0s)8o?Iaz2bEj1J?0=qE~1bQ+qY+BIi;!=?9iqrCllN-8y_mDv+Z zYX>e`D*c+B0(;Kp<5_uILh~?c;TLDn&@r(7@j&Mh78Z3hQUAB=|NQ>XuhzF?V8Ghj zyC(j{nSOlo|4#XT&+=dOk^k#N|LV#7HAMe!^!(rG`B#19|Ief6YnQ3LGttkrjC~Ou zhxkSg*O>myv#AEWtb?t26=2&$wsVbz3R>*~lj}F<+Oh$M>FtwBn+H4J#0XT{B3U(4 z(#8OUJKKvuuwq0nL?Ejv;ED=>ldfJBsP!WJ^Yp%~>$Bmq%1{t)3sNnQfxhS?TL3i2 zueu*B`=XxwQnY?X+UWDKl!d^B2Ed$5y&)Xx=Lk=UV`YgC!c zv_PbIQjB0s8}h8`p9v9APQ%Q+_kG<>XAUJa9Z+{iJxdAV%HkR}-2!^oC&xQkRpxbO zS!y!IN8q=XIZbRO4lWmiw3G^Ds=IYya4&(0V>sDR4wL6+E zN$FOBl=Hjz{ijCz3kyDs91wcKrnYHRT7a(r(RE5Yk8QKl0A)Yi^k_9M3=^M!z5Xi? zK=e3AP<*>0J?1PjUVMRPZn^k)9KU+9vw~xIogK2Xn=S{kiFNvtSo!Zr53I&J#0z%}Dl- zE9k6VnB`NbWuc2$dt|+5nm~$%ZXzXo=0ogjJMy3Xz~nx#wa1I4g__^w+e>^g==3Jp z!Us7_NdjIrKt@g=b{R4`6ER?6`|H-@FEUO>Anh}FZJ$5#J>&5PgnJ|xs=O}#XgpO{ zbWr28xaEFa*rGfsGAsSPLp}4@R8tgmKJQ=TurWBFwIEWrc zN5?X-M==Tfix2#GE+j8sobmKvM|%I!|9-swKMvZ>!L^I4P7sOz+b41Ffi@K;fq(B8 z|NKM#h}8|s!L^4q-KAvzeBA%zqJIVR=dV$}(4h{zMf2~1eCQ;_>fqYTc|vIn|Jx_e z62gSpVG=QaUE-G+?zh|U7-j|6wi`_9`DI%E$CG<_K)nttMfzWz>aVt_UnU0Eu3C~^ z!2VyZUM~!WAFj7N{l9yR(B*XOaN3i`n^b=7LK5;|s^ZSG8*_|$R@}jr&oyF{@~rW2 zZKH)MpVD!5YVorqWu|%6T;$?_x_KTXwj_U}_7-8ZExNOyMgAgbmxDy9>2T5Fv2`cq z!KTGtyPoB%r^t=Rgh-7RF5LU{D@m3PHAnT)C-j}2u(wC$M zxt(m4gDRkkB!%tcog6~}lNF4s(`xQO_$KQnuwr`#5YU+u2c7o#h1Y8cP*9<<5^xRU zoVU~`4+kd5@T?XN=99D&0A^DL8%*nakHKn4^3<5zDH@%7%u>vD#5h9w&sjE7 z$+QSe*?AVuc>3UQztcM2j8XxRJagNDJ=uIpmvxU}%St2<&N)gzv|NNdCwHh$H>mo7 zE=)0!R71txZFUVnO7jFy54u!9CC9S&B>>hq=NGN$UjdY}JN*>)V};1C#?+HQTPm&& z(2H~;c8aY&OadnbFkj2!b%I;&f_y-^jN+~ilP?XFJoWl-Z{Hb*N|uVuDfPegBcV* zVi56{uimK{x9iI3w%HL=*LuG!1H2n)684dT8X^mS#YCNU!rgaq%@?qq?x zdNs6m4s)0JBsCHga0U9$?oCc&s7TW#&0UF~#Qx~;L4+;VMswoH-Y0>*9ID&!hq9$8 z0vFva{uG(`WVJSTq*tvLO75f_#ztV_KB161Yl(J#iPul*I_hxaWiS4;GKNvqrLC52*5cxXN?W!+f#u%r;07m zgS?$_0CKlhBWM^iylRp<{2m}u$*Tk=2idYN(?tDb6YIVYFr|Z|=1n!C_MY-Ne2H>D zh|0!b(gch&nJ*7L-RaQB(O0L&uW5mKOUL{I$bZD`Eav>2n{qfjwr>lqi({&EjhqZ; zlW%>%q%?BE5(0>Xj*w#G{kC^#D~T&{7KP$FJu0=8clX+<9)nnMkl8UO2q#j7b6H$) zWjv#528rr1DNo(qDl&ac$vJy^a|c#4pI{rgWd4{LesNA!LDoy5Cxsy2MJv+rI=i9= zsP9!cO&(3C0QVs=y&@@#F@R1wuu=t8bzVhWLq|xiR(%Oe{YrF%ng(jYb+^yj7(6{F8 z@NwSP$fKH<0R2w{8_em5RF_|#TN=9Y%N2aein*_G02owJU0L2z(6#X9WSPP)XV+z7 zYjNuN6|QFh8sxUqAcmj&NMMdHfo6M9q4R4ACq;evqbCO`=A+a7`L3E5?}2hpXkk-!`F=Hb*i8CcI974178fWB&UY(2nojtBC0 z<5Pa>LtArb;maDV-7Veuc7-hW^^`0S4q60ui208I8@01i@eyy@2vEbyvadTDPk<}B zzW$8+8Y)pNP8@R5py5E{I{S3*^hCRuzom_TZp~@1Dt54VAt_K8L5S6J26BsX;JRGH zWRkAKOv~6_+0eCtE?Z`P(ZyPsLO6PXbJG=WCIgCJuGWj#p?5()7*zK4h~ILVIQoe4iek9yp5WfKOYi@aT~S`1O!wa2aELRooL zyRn@`s|?1t4;m*y(L|$W{fk&uyH6s5DrNH!Gb8D)$ycj2!E%w>)yo*6$8F?$vf%e3 zJXtSVcC&SDAO-qouIH1pcwDPNzu3$-5c{Oua_W441MjVn{n%S%5i_%gRBI=N>z<)5BRo;vrcYD?7t14m_uVVZ5oFQD{DZNhB~)W&0VyL$^xx!t$8l}H`uv`^-= zV+nB}tC8KW;ci+^;`1CSl(QCKCCJx0K&mL$p+@V*XSZZew`KeDQ6u>sNO`QDhurSP z9H3S$6dTl}#e(D?u55Kae3ugZghjfUuT_1K>D_C)oD9q-WLIljilY}Qfk20Kx>|b{ z%5Y1-MOlR91_(KP8Nu53avxvj=h|0>v#iK%P}1u&pES5_W5Kqx$1gD2b$GJSAE3Sa zin*8MI%}SL_xQ0AqZa&9?{#?`SHR1`O6_Iumh48IsyY^(k8r?&v~z%dIOScu$?z6?+@844JboyNzWBQp$ORO79UoQS7i43Ege1d%o$-4 zA>!6>*JN;bSJR0~&*dndp9E17ahKhSH)-(#SB&f)os(WWISGv*i z6OG^PrIFKFH%E{jPzI*fGPdfjCJYkLA;gP8<;#wxuED-GNQiUH`EaGT=GepOZd&_7A|b)% zZ~-WRa&J|I*pIF9BbP{Ar*O0x*|GtXwrY!CHgPL{{;@hgD#4)r)uH%A8-#h<0d)7A z$~Py8;S$U7?u*w&5JYKx+UXsi98-f6HQlwPP#;q<;-wKSHUkWdUqP5>k{5*F+X;2* z(yp^!5qy-F|5`F{*d_AoF$C6omT_2Iq=MvM$~=lUk-+qq@8s4RuH%zQGk=cydbd+< z8Ke#D?UfS-6&2GTK*GfUXFHAxCdAUL1ks=TwQLN$C4W|E<4Pxj=D$khiIyF(?u zYArZ+O=c`;IxR9W5Ft4?q0p+vU%&Qnx(s@8Q&vt?FaV#cw<65 zsFKa15tAg>>;(JaQo|FqM3a3_>n>w-?7MsdDE(9AWKp-|vD5m?cuwP^E6(*ev3nv{ zKRTyrsQcAz!*@brSkTRoT)b`yzT2|A%@4hJLXOYGOKe2dZ1(H%KVJ^y?|HC-{-~b?ur+ek`=L)$7&$G zPu)L)o4x3n60Kjb9Vc`k@2$MZMGK#QoC=0e-v~bp-{O%CXIS%qVh8Kgb|J;=5c|~Q zBzXSy4dB4@gaYz3&}-hhzXoLq*=}@VHY~hdxhWd{sXmAI>(1uPZ*5?<@EUn(mw$-Y znRz~sV8Y$Ffi|yA;(28dgkLJuX|c!-QS5VKp}w-_9CV2g#V3@>D`Pf)Q`z`=1?UdO zOWAL_I<08vgqZW2&C2^z3&6_FIo+6FdLH$wutWq9h&Y3_5`6Ype`*EfGMPiUDrK`v zq)Ay3q|9pT?&7qjX?gkwcXZ)d!_~K<@#4pG{S$XBCLk8vdr$u8IhG@hA6+#Ax|~86 z3B}yE$EL!fxM3v%HZy|hxwfDO&5VBG=@mE)jS-Ln)m1@YrMp&*v0gz8Ox8_rkvEA^ex|w)9T>YwO4Q}T zsP)3(67Whf<7x^Fl)bJ4h`<+btr>1npZlrCjne(r1op^m$bNM|xWmE~u~Onjj|lME zYGN8LCnY@9OSWp6vR+wV15{_o6Y5_wSPN-EQ5%a73@1uATL9-Rl<~qT(S4Id=9Avw zQPZGIp2H5KAiFp>3(_+uv=7j=*49FJ)cl?^m!DT^_wnK+9(O-$oVx~e@+@2L@iuTk z00iQ*jiJ)+2NHxT1Z|vp`Gr-LD5K9tyAPiiV%=K+FKb z1xKsA5;3aoY8*jAQ%?4E-yW3l!LL5~f#<*O&?AWOujHw5FHRKR+1(~2nnwsX-QSV8A)o(N#qfHKL+tygURu-({PX8BBZH%k zFh6git1ng#yuQo{4Cbu4cT4;AoiR+T#fKn>5!D!#S8%!J*^lq^;>JGk0d%i8KBw7# z?s3wAWtmTa*B5F`j z50~YAkdFd{$)Xl-J_(S5{tk`njf&$3zyx#OI6u;zwn7smJXh_G(wwzov~`YAS~T+w-NiOln5vDGgwNv zjV~EVmmm8ri0W)SM2onKtL8|ZM$t~nSyq!-;%9zppS2bDl<&4$Y|Vy3J_sEpUE@Y7 zxAz%DAR#2H#e#-`BG9R5o=x3sk6R(Z3nu#v72C<~^Di6y{oFjf*& zyzFG)Km3`PpqYkKB6ob)eJ90=@Od{H>%HKbm+DyQ^DK?;x7r{Zri$UR)Mss<*x#R3 z68Y8V7=)bL)iCjH@Z6Y`eq!4|twWgIlE&k-Ptn&4C&f^g%j<8X)O+E(>+|MDY{pu6 zcXgRh82Zb)z;DN&gyLPfI%&t0MbaH?@MReG&HkDcT5a|?VW|pT^GhCvvySW!hMXjL zF=Tvh_CoFL85e~+GJG=_E9%2jArQ>2&jNMls`CVRc?-w<$B6!CTw~M0qy1`xF!+f~ z_O+;Pmq|5+a9QRfe@Did`r4?aBT*GBgV`SnXq^!L2n2e6caYm{vSUyHjtXM>n7*}G zw6|aGzrBYZ+=p(AehxhRh#K|Pz8|Txf%5WAyE|1rQU2>e{)fE>$T-4 zXRHQ^rXqLzePLw0w+ANDYjXy&IrIFWLQoHeSC1)~T#64XRdepjF?5GzV?2Sg{%FCy zga2{vx4wj#bCWY(^fpR7>2B!M2Rn*(Hqrtc!?Z}1eY{QBZLVf|=y*h$*Gb|rbx>YZ z$lJB-UHzx6m}~wiroS;zyCw!ZvgW?;1JQbHKN`c%E8dZfOY*s7ov=oveGaDvtuI|X zqGeJ^b`U-2GH4xXB~41;wS4+D+jMluk$a9Qd||Ajyy}LVh2xFQsu>l+IE(9|%5MY0 zA)>YF$Lz3(?AGV|hNFgmT>02khR!WwKK(v1mbb6J#T)bk%?=rPcPyaC9eKV_^mCdU z5IK978D(k+$t+c-X}>#CsHzja>xkRxJ5`>SQ+@5AQObbI@>GuoQpv&Q*y>9Yh0~BRWJ5wk3uRSY z>Lp0ca>s7V#h)jV2hF26qRr%|XOjsL*cNswHZWEr9$|X1ex^&gvN$D~Dh-vpDY1nu zj+%9A2%+4TOjkP|z1u=KZx+xrChxrVG$(PT5XseZXF!2!+b!rc4NP7=agN4jmib5a zax56y%ExxCF+UthKrjKC9OPIEV*V!)O`p-zN^&B3m$g9=f{wM7Z+uQfjCF%YG>&=Q z3Y*LpDO@|@*?DJ7o(>52Q0AVu4`!anxeGXEVX(9r#ASO4|H0N2RNLz;EBN^}jncf& z3UP)$c@axb+$Q!}py`LqljtdfqrAtCO)n!R`TYby2iNPeM0o=|FcjhfE_~ah@v7j~ znP|y;RV891-OtSrwpDPe$gS(Z7fU2?wqVPS1HkhBPw(pZM(HzHudvV9^Ymw#HxO{;!u!L40TYERr;%X$0-?3lcEiag>wd0S);Usx(ps&I z_j2=XY6?~U_KCPxKKB+Jx%Iocctv^%V63;jAvU7duXsbA($Eh-!%TX*Uu_uWCkGk` zK2w-fBNd+NvqS7g@&?|)z~Oo|Q{|A9Ujw24!diTtL0lJwkD`G@-lxyJ%zOGe^`M&C zcSiM!Ki1vY65e4chuq<}o)07qqvnKAC(eB~ky*b)JsM$0#i0g7lEqG@@NPAyu`Pu) z%(00xCNThHHrdgwvKPRP~l9 z7_hD+bR+FFAd6W3Gx)<2>b4G+|2wuuW*y_{8RM8b7?AdIBrVb zQ<}GAfBy(@=#6Q`^?76N!o2H*`n_>nYkf!XMiJ2jcFYq3^^!bMl7VCFWQ$a0{Jw z6fO@L92v#bQ`Fw114Bsh+lnuQcjdo09sQHMr}M9aN1yo!H|)%Rb~>V3{U<9^)6qOX zG_xMrqGap0UZD{*{bp@rE)ZoG1Jw)9L8-*8iF@fL(5nR<$iW51#Zqj%lWLrzP9G4{ z62#9O7r9D-&8NEV*e$m0WAoOtHlomp{Nqh|{YXw#i3TJ8RxwGv28W2vKU)N{H*$K` zu5s)cc*W-jhGu^_oTuMEyEETd39H@{=JTqXmZ#nHS;WSu{jp=orexvZy)*>=02=(8 ze7@>gT(ecP&zpYSO=v+@l*Eg1a`v*c-Mb*zgn}zBl>O%_KEqc6XBHC6i^#7+=6z-C{il>eRmfO%U*C2WNV_+Up-$y*zlNdGXhRw9xv^ z%E(OJPo;#9{7&_D>sCwdO15dom(&*%yR*I4n`f`01zVDh94{P7mfoK4C{612ayBHb z^-e>}KMS>0$Lvlff6;w@F4|F^1Zeb8=KhhOUXN7hiOdpFqgYx9Kla@%>Jc%2E;lOA zwlGCa>|%PYtjJ7#AF;iIC&#VZS~A=;OF>AyA?6-u>v}EU)($LuDu1ukA9GMN2z$F_ zOYNoEeP_!q4doI!Pj)KcA;u@QzOKX31Kjtgu|^qlTXvoo841F+7KujoEnHp*wgt1v zF0^T`#{fgCJlAe(bkV{Sb$=Q5gQ2_Sm_AS&znKWcb4P6{mk3s@=mRobpD5$$7s1V7$z#p&P{8NL;S z!Q*xjnrfN1SneKME#J8#6Bp7tLl8Vl8bx%XO_y=CGsdm|u#QM|9;&p<)yvC8CLm zPR)f>$86II_%5UR!3zj=3~ibV4__Y(YVpDJ`-da_K!^(#q_~?-=z(49`Rq!1V7QO= zeUFyVdq1~CHl!8S1xk<)y}1K)%y4X%iHgM2TCC+0O;ZOuhHwxtRbLG_sZmW<^~e>+ zs2a3_Ckvff(0<1!ry1bvmJGH&YvZy3F7u74d_`})6d+4l&r-v6DyEb-EqB?1eb~Oc z4Xe3^K$DJfm3DnQ69@6Pvec2l9A(KF^|I+C_@{u92#*|%mn)X_5C$Od)LYCx9B3Dl z{Hv$X1ED9?52PT}VYI}T`9iY^A1r2`HDPF{JD2BGr%_(>AQwXY@!jAy@ppo3T$L{L zQY_sLOAX!W?Vammpk$JhMhnXrV^0JWFrR?aXLK2<<4_FOE{wz-SM1((*^s|1&0cnO zAt&)fjLEd;C9L&1Xj5e=2x=m+4kr=1YVi^J)U4F)s5uI_c?wERJ@}L5J%^TUWeX{n zWe%Tl9>T#7?Qxt`bV}#m#Imzs?9$`{dqYo5r@n&hOGn={mF?H)ve-%lLsi(rs>}P! z6?{0sO}N&V5TUolp@wt4H%=nks=FCFz;Uok{#?{0@y-W-RRVyEDkoW7EIu)_H5%Z1 z46)zzzos~jbyS5#$QHfH?F_gT;Dsdp9bZ)IM}W8FQrd~ zahH`nEq6xD*|V#?BA-OIW}dKL$FO@%uD+&`}x7b-a%Hw{#Kz=*OQW)`n0fiQNr7a?$MJk_81@Dpt`(=kw{Kip`Bf$IR!eUN1?b6k zJvE{-Ma=)Q1PlqJ6r05}^t;usAmDp=6RfTub|^s_sgbqJwDGv>b8|$M{DITPVszF? zV(reK?c>3@W*)@Q19lP*Yq5pbom_pIUJ&sPjd>H8F5KtMb%XTSwLGC~9K8e~Y19=7 zdN*xOzgE)5fjfl=yX~e&H?0kosxDl8ZW|#Dn|6R9`mUQNabD%tCdXK*e6uo|B*sj|C&wmak+Jv$UgZgRR+ z`@0dkdx>$M>2c%H?i9o@*zh5h&nTe}WCPrv4`FNIcIEA2bRHB-2lgfc87R76cD=G2 zNp+^Djx(zmveldwol_W9T;E$Y0M*lT1*l+Ie@Ficbh&xvhuaB<6Y(=4oxCBn)d}hFQMezJ}qmlYt~3(^>vWoEBK;W$Sho{oAQ4 zxWgWpc7_!3+^Aop@mZ^E(qzVyW<4g-uqXdGCriD5b~3UHTS(KJj8>~OnRych6t#UN z&TGArjBKd-H98- zcaQ9b&W(UEe9MH7?8kQJ>?MNm?l>u<#DVWEclJny8H)e!11g*R~X zCAiWayU9r`fyFtggB$7haDs_(eK(XNI3?X2C~8~Wh7C&Xr#5Q`-kU>l$36z;`D@45 zvTj4v(<>>w-{w|cNv7{LFyUe2jiQm1qwjeyv%}_*O`n>PP;y@`FM=4_u!7H~T7%mc z1S+@cVir7!=RlMboHf6qo-*Y{He5?F^f8Sw|9GVwXFZ(MG7%P>VD)Y*+*or;s%3S$ zIlX0R5YT`iI%T&OgF%$`DkZ{5IN?)Bf3Cx8Vf6H9{;{cm@y(}mlYuYQY`N=JHyw8D zSx&ng+hu-^vMSKK?#9pG+u3GosO^hU&Atx<&{)yi_X5T2bFUV@CeBJlcK8Tcsk|O+ zy!%A@owx0W<05x}$mx)#0jCT8Qs#M=0joF_7u{XCyb9>jTqEl*Z4HaG^_PT>LF;VO z(U-OD^`|^luwv$S7*5_JxMFGLMvYuy)De1YXJsj2D#fn!Xk{~@VYp_Yufc5f!;ux4 zSU6OwE}Iz=N#t>1NC%R-VO%MkUgfq@+Q7YC9ZL9i(x-JvO3%Rico&&EU`TB zHGJU3gM_iO(5&_T6^v;-AX@TE&pKE|8e5lbdkS}{3Sz2yR3%@3jz6g^GOw>7q3O=o z9etViDE1d=Y;?=CYDzl?9?}$vh6OE5tbppuu!W&r37=J>R+4N!8Nnl9FF>{aPAlOE zSC0#iIG{2dNz>8Q$qmcXBFvSz@fzl58mO#yq6U}Flu8~Fdu1U0ZKa|v!-h-Kqlv`wtj&>Z^QURZB1 zxvz!40Z6FMHZ3q##+;VeDah@+NN=|-WuCMddagaNIaLPXE=xfg8BqCcxu-Eb5!N2p zmL-@KuDdC4a0{JCu;q>4PD4z^X*240r@E`$3ND@$DI1f8rf_ddTw&=u$XB!6wf2c@!&gsvW?n@&MOX$$ig7LHRt?P zTx=qo(Qdf8>SyT%n|jKgj8A#OG`HqI8N7)<}_}ulf-tF#%aY~ zHwiEXfEAVWqS2DN(L&f_sw98JLNQc=^X!bvxX;Orb;p)Lr%C3jA8)y6-L_4c@b)_@ z+SN6DQ`hEGJ7XoQJYN-2M*@s}3;-&Xc6tntDHxyGEfsW~x)P^-gKV9!cn5?E(vwq3U6DnoeQ8;wT$aIAMxWtQ`rheGrV(@5S$b4PztFuwS zA^{S8Vpo>%GHw%3!v_Kr!)>Mh!Op^Q7!lv6AErEl`6eQ`#1`S7Mw=N|CvEGskK?R|g6g`_+-{F@>I4tTMqh8HX6 z3Nke#c-}!fQkJrB*ecg{B~U}$uPo;|Lzy@;V%t- z*dk>3Wc}5!MI(t{+jvWL+2jzk_arqL5c5x2uBJ}G5Hq@NDbxX^N;Uj6_tc$O2Byr1 z7I1B!a#mY86TLy7UvD4)nFLvC&0P{LvT2Bc2=@lLu?5%=iZ0IrWNE$wC5HN_ToXrv zz=UlePBTAG!kMYtWqdXQMK5RFIK&PDaEDqVY2si$W^)d64XA5`{xhNX)Ha!FG55mo zaS`bf#oiXV<9RRK{r+CXb8shK=NIK1~~^_(BM0 zr$kmlw5l{~`sH%ma11L5lvK|%S zp3hDW_9=U=Ws}#kPv!pRArX@|jWMb!DhPeYx?sGIPHWP;<5%3C{e&p`Wxe~A5@jn! z(0eZRUbLV>SiZTevQ;U3-|CVzkLP^XpPcE<^0wBINdQvovx>6!axhORUn}Z+o+{rl zQCyMp|)RVZ?KaTXb8^5dm%CTTOC&y&Jl)CmEy>qu-^1CnPj0JM3rMFv;LNKoL zle77kS2wRMz76MjkVs*qtFG%QGGSUo_S`|?${f%{z>G;+!P#?Y=1{OpMLQIF&q~76 zYCNQBQlw$8)+}f@{mX~`la1H3$>HwQ2wvwk7cNtrI2qW`uU?9<&|7Fy>nJ#_oZw^5 zAiRUxpv~a#|KaUl10{cY+_YO8`#=jFrxYzpkxu5hwOn=t0>%k08>k_m?a0`(%|J0V zooraPsfTNreQ@N8BLOc71V+eCegUSZC#_C$9e!p%$X; zg1U7!A(wrE6`mFXs0uwREYVlEq!2uiHWWCj+#Rnw|7ynP{@L<3Umni`%hZ;o8~5nJ zu^{s?fBOXbw)^26E1x%v{mUnbZMZ!4u|A!BYN>FeWq)p~%(QB<PDM(^MJ;)TEM$hyq%Y~&&ACi?wq((4urMR*alzEo4%9U0n|!Y3Eo*8dvG}@ zwVh*tFUmA-R=K7$aqlp&IqkZPQoCwZju*Qyl+6r>4&wrNDADXYaVPH7{jw2Q49@wBS)>uEf9FgCvbdC)Pz+&Wqd zVDoPg?oE9~y+8l3!*FvTp$)Zp?}+pjdNu2;`?D2z#cOm5>*J9Y4{MWOB$Cw&`5t&+ z0*(3jci(uyTWEA6yVkvW;D|tinBf+V1kfk^V+JRps!HFHm{I3 zGPSSn2FFQK1_)QsSJx_P$y%ayu|q0QQ~Ork*wh{=B z3IFnF=79Ju_kk~yaf3YR*OkX#H|qPX>)X%dt?F|l;Lsz55jdJOJQR7GS^svAia*@z z%0n>WQ(xnPbHJO+TL%xIr|>PmDegO?un zodt00b-E&MW60uQ7w=51I`gB>9hwE~!87!40J?hM`L>56UfG58{s(=( z-9=YFaKzY}OrLkcR?bT?!_BHr8=sk@xEdU~Huf5PZkRQjYUadQC$uz2WK4NIXM&YL z5J67>t&-64n2D|x)OQiClXl|1k!rT|7i)r+hu{bPrmN=Z>-p&;y|UyZ{I2s4De7ey zW7G>EUP4sI7+OxwQ7}o)1t|r={OR*_^yk9tQ0IOVDtd&pN}fEoeHY)p;LXY0(;-pV zGr4=;1Jx)qJ*?1`RDJ@`Hn^BzzDIoEq}&(^1zs8~-l2}$6wA9@4wQOJr1QDS!+dc( z@6|Iw!m)R6j~nYj$c1m1E;El?rRvDn_zRU*B|Y41R9iJ4eCKA(RnkM`@Q-PZ>G3&w z`Kq7C^cJq?*CEpj4TyP)%r$BjC|{~Vls^-s;#ps~fBK|IyQdR(Dg@EU@@YXXb-P^-xRfB9_<{^+0dSLV z8~O&{R0{B=eNee85#I__8SGLTy9OF-g!*Qc5^NcjSr=8+eNY7v5nM*HcXLZ15J)pF z!0rT%p#p6;CbhdY5z=#)w~8_F00;Eb?<-$3(x2bV-iN~kG3@&#-EQy>!~Wrzck4Le zI%BWTQG@A4x#Dix@j7NbuiQ5UHhv#8AB?_z;+c?TYRIY;*cl{{4LlxFwed(%8jGdu zE^!HLc+r6KyS*l;C!Bp3-a{q)Ga5jz_1I;H0D|Y*!LJJsasi%4078X)JN0G$k!gUA zLiW*6k@Ub6ahg?l9|bw&wfV#t0WdX>j)iNY_20))D&!qVpf z-a>otvH)syRpNm9G3dM+UMVjvajcrt4pW*JH$Vp*x& z2!;}6GPMW_0G)r_YFF}PzxnxQ0l{tlL{$9)V-#kPN`>T*+MT-*aH? zG_x67-q(K=3NZDeFAK<8r!-$2`|9d=6}3{*Hmm27Mgujh>^3&?jkV)u*S4#Q1p1iU zsm$v`3V|GbsV=~InK!KlAYQ<^Df_D+r7&J1?J66$LwqbpV}{!$Yb<(%zqkP|$&lfS zO(eD;=f?fY%VYLl(=zgIEIGU7lqz%diLrDyixD~Ez+BZ z>wpJ&T2qRQY|nP=^_!9Jzq9CRz6vH5Ty7+(2X`i$W%?)`CV=h)_fBtg>3CgVcW7Se zJ>?*KqQ3``5ky_@aszg^FbhNgWF%woB@TI@A6wL2;mQY}^6af4ArRCD^cyKIL)*V2 z`Pg90HiGO%S#txs*N3_EI+Alh6+M*nA^S&c)JE=J+JNG6h^?Byur(0r4@Fk z9kTM2$rZ&n$D?qAKw@Lm?=IQXM<~H{-XQLiaPvu}XY#2@tV#hAS$`luK^(fBz05@k{YlrB|z+G$2vuC$*z@jgaUe3=n zsuerr$V=*vEjAk*3SxDD))TrQTq7ZY3lpp)OA?N92I8|L-M-wAS7k_xcqmlMmi%yn zCx4(=YTt0S1p`EBI71667gn(9Vk^^?t|t>1&~2XfrU~XbKgVO-Q+W^oHD||oA*|8C zz2b8pI>_*HfA31nRO0k{yEmPzrG?BoV_}0`&}?Fi|ZU=m={|3FfG0BgK`AlAJ$idA6AO z9mQEGf}%>@c*p81>IaabhyvGVLYHuiSK1)}cIv6n4-;Wz9FYGhBL)IcyTnkwX|Y>lYiR4uAp8|k66ycq9;Nc@1O&s!s+D6a()vKX^blo^HjB%zq;{i+-Un6 z!6THVdpq~vo!q?I@(n)b;P9N|Ov>RR}8n|l}L>$5F!idePCD6ZBR@)A@X z&%Id0S{^k>%>8 zfMyPGa3E%lAnFcS24H|c=BCxKEbd&{@lj38*wlK?md>3IFQBvL`*NECA$TNs#BQd7 zfb?{VSV*;NT%c1)M2?Gg3Qff!ol?~xBs%?kt*HYiA0@oQpIjyOW>`7L2MVNUB*OvP zO!O_`o|2Y@vJDLDwdLnGUl-h-eb%4G?6@#og<0-g>;6H-+!{9_^ILQB@(f2E3#hMs(RT8hJw8L{P;z&dYrMu zikjtbR|bLBIU_wWXwx?N1cO1gnglz-HeWxtnl2kjq^8I?9695B!_M$^j`SwKQ{kbU z2n{C@PUKM{B;Y}1rHzb@Q!FC)d-D#_7A4lk8cj3T*LnpuZ!lvGR=NH(h7hCjGWqQcamYU#n^sR4tB5V`9rc!@lNHh4n&Pj7cdJTbDoAFePQk z&0$B{=GwKy7A|pQQlaAFa&pS2%M7`L4^ww#TsBXakbRfneRR18L<%&@v|M9gW4hFS zh?)$ZqoZ@~GfZ2HrqcpsN(;RoIWe}2zx^q&L@ys5SRNzI(n*xA5Z~^Th*w~rii%H7 z+M|X8_Gn9YpO#o0nCI=pNT_)11Y_31S)t4nxX1h{fR}i#+@XwXJly-LS!LWS<`pIs z>3{&22HQ-7G7gIE$}R}vqujkE3U8Px+3mR6=J)X|57mByR?nP%Q_nr|=4O*$?Lr#Q zs^CnAhLR3=QhAD=HZ_en*x00UjSH_w1)l}k0v)HHw5&dve}Bl%e~;SFmIf_w*DB#- zJt2oZopYZSs7`8D>l(NhINKcohu^B|26R{%MGRj!5EGROcl+NhV#SRvS>w+|e#_t10#5vo zwz-!!)lNetjt<^d_#-iytDM-+R(ok%VA5$WG?j1dx;WO4tQ|Xn|5W-&wqmJEeL#1+ z&>>+U{oZ;-sLfViHx(q{?*Tc^-|r{dU`N7`i3u3UEpeUvRDu7G7({dK5XGZCn^5Rl z@ui=XK%etJ3wun*JL2ZAf*!2OfQyc$|NaHfi;YZ`Pb%dWS)1h-o* zT&hm6?O6K{D!r-AC-g|dM}U^=P5$EP9GBMgB{lo=TLDF@ndtl%oa~%Vw9s~x(LE*r zHy(Zm{RqdRE-$P7I$)ugJydG2@cP|+t1aR#+{wxGUhBkQ1WIui(Uq>3E0dqkBNn3Kxt^PW!we9+q$`ixZn{E8}< zPie@xv|{U|km0M2S0Ul=B#Q+=qhX*a$MrM7Vr>9qTT6g$akzCL$8=dBHr@NkOQ?w3 z%*9pl@=^tQ4EO_pe=MTW_#ZYXIJJm#uq_8WC!Bo^bgs|@jiGVx;z3o{nL9O_#3)X0L6#aYCuWDIsrM z?qR($qXz*UhI3XzYQ5;c?C@U|9t1PFlmcL;Mwa)s&V9{{{dwE}YJPzn#2u-B{oh|} z;hT#cdv5If_W^(N^6xJJAnN}Y?=m`b^ZT7?+yCR!U)SL8FUj6()%-v2@UIacjsEss zH~WN7yEQlI6avkfdh3IOe-;evobwJ!RY4?YUu6g&%j=Osn(u%oQcy?!7{Sfwf9R+5 zRG!xY=8H+|54(bMrL({LYlPA9t-!M%(07CISM<8|e<%5unB+u`p!(6q(o+EBA+XY= z(xX$hD)p~#wG~D&Eh&xoEL|N%lY6a~1R@!~l8nEqX_Oj7=UX{yRQp#Cn3gbQgMOER zsQE)f=0ZKt-7aH+0q7t6f7OslFks(FSyRXi0GGAgd^@j~m?ikpn`MVPysZuVlDoY7 zWsUoEs96e)Kw2yp26WloonF)Q=TZ;;S(co%?5b208J2NKapnY&W-SKNtS^@J&VMz? z+r6hP`ZlpdZfY{_bV*6jXl}U~pYmAOkTh?wvK@kx9M3 zXV;n2f9Uw!)Y?1Uc)3|lo}%XvVUXExF(!QAs7N%l4qz!JJT<+H`a^0+FlhmL`{}YM z^XpNcfAcjawN@=DWL~3{s$+q&YGFo;v6P8{;32;b74FH@#tK^!L#ld9i=Ngg;l)^-Q5>DsGdJTV1bq3TWT| zRK*bR`k??dvdm^*U+T8#;nU}sfXjKkIV0h?;3)ia7RH`<{o%`pVFl>6KQ^gdXA+Zk zGfE^^2p4pLn5|eY{`@aC$GX1mr>3%UqFI1LURBWaz2&{u1;O5^H*cZzb$VF42yj!w zv6=oi0L71J=}i2!Y5~@GPhL9_n2nduxHja$*e@P9c2|ElrR06${#P9>=)DO+x4y}l zkw2?-Gg(Ha$2wkF3mU0IfoK1`_GaJk>q9@ClK?gf(_HCq?futN{+Ek=S8ry&kS4wT zI>0|~{x2*1ei5A{xEHbEoC9C&^KWnY#uEa8rwf`Vh5lto|78G2 z%Ymu-d0kKUf4)%|PzsW}Eb{$dN9_N#)x;_T?#`Rdc-wEBg#Y^OrauD*jroX6(&~HYd0?wiSoHYX9);PFrHsE``Rk%};SiAZ z;LTe<`kElIcFG}*8d9^`-gOEXc0o9|MOl*2qHv zhGVVwlKVaCFxF%KCOH_R`pNaOFey$-Mb=-x{Kv&>L6YvO&FQZSq~}V$Q}Dgi+iByK z8Tbz{?2dXt)mOvxSVl8q z2N@|xA^dRK_*#f|b1jz!cH}4%*)DFiEOWu&V%N(sUCW{1^3I};v1k7_!t0Vi5~oz8 zX5rXh7Mf`?YP?*{^MIGpYD(cPU~D7TPrLOQlF*=TR~w!4?6&OfL<&Q*fd4l9M1S;fuOa9B`KY9_!DCJ&P?)o#K2&7!a077GVLt3317e0x2 zQ|a1b`uemA(SyvPRoXeZf$I`fCmT4S>Ji|0)fD|*^~@{X`0jw`l=S(ELWj-Hqrj76 zRE9FuQ!AlNVm9}Rn;m7;p%)GfG<0}yS&x~H?!PeN&>IC^wa(vHGPQb0TtF)M>!!Ew z$W;QKq6Y0^(bvcLRQY4ctygd-9y9_hof5%|z!K=5Q<`TzT{}y7YZoF={7O=Id&fGs z2p5H2!MkdaA`64}15iwo8oL`}qaqWs#-k7*5jtcrbP#8U4d~j8K`t1CVmBJQ)zc9$ zin?X@HG)ovOI%o=!nJ`>+!-;$L!Kt)B$h@jiRo zuWMlBp%FF~&8YCK8@QfVcEwc1hJ3kxl9fYT3PG#poQjb+isAH zomsWUw79ZPra6u=2axfX>~}OBPUnW zEW)e;UB%VnSIE%uH3OeD_$|Lgg`SZ~4~CFrvKv`kc4>)w3AB8&zsrn%V+*%A1p3Jv z;)~YV4Z99|I3q=NfMr)Dm~XHCX?uamZ>AZ^OrIzUU_TphK2FL-{p)0rjVAo`>AU*`m|OX^-=~k@7Ct>V`00*UO~5Zn z4(-~W>kDhwf);$ zjO~o_Ak;KsUnZ5jEN~^J|U~Qf6ifQFcu5^f^UnK-ea8 z$f;W{ID|3jJcWrE9kR}>pHke7`IoT^RtY%a-jO|EW_JBAUsp!7%+L2sBx;|Kg61oz zp3xw;4cC5shalM>bfA$*0IoKwc98AARV>3&5Jk+CE#M|nqbOGWb6c-K1WoQo&X6}f z3*P1srSXcX9|?!Tmq1%!nGH}_P+$!G& zH>@&p!F;)(Z?ePF)iuFR>FW+9m|{jduoqkR3Sn28Z*!ccanD+vRL#VJ2Y9B%?YhYzwVJaTuzd`980WOh?}%$8gbcK0Ux7jPsV z8DcOm-Me*r61)Z4DmH|l;3PTwI)}EfeH&Sfxzb!uT2Xt!5v|}_5{!_n2fxYebgE0M zTdsO`^>p)l@2yk_)}SVvtgERkqniKqZhoJskqE&qvCi!H(ejTS`kzZI)@Z-?(E&%% zBfB`$r4}s=$xM@iX9K)WN_6x2#G^;PAB;(wWcy^V$_14(JJ1zuh#SqUBE7E8mhPozA(@F2a)Aup{5GS;vmEWH>>nZn3wL+Ozk&A*dU>G+JlTCOu0!fH~K>W&KoQ zdI3)Zn$N)1BHkC+CcrCcogWB(@`rW!GBu5aq(0qbU@PsOP_8GW)zoIe7C8AwI74vP zp892wm>ku-95!WAV4&;QmVg+Fnz055A4gfYurO*!)R~kN-Jpg7ep$+Y z*-B3ccA`i~x${?}e0p%;Q){6odl-M@yMjqhvDW!?Io$^r&*XAVq??;B-C@@qIAIuk z(W|;y=d3}92Nsf#jVvOu!u(UKmMfk;TL7ls^cP~)5_Y;&-n*adr&x!8!-Dio>8O&3 zC8^H$gDvvG_76aw^WhI~nSCLm@JAv?lR&#SQxitbC=0_JOSiS>RqnwmTz}X`@j`@i zA(Oq5(fMeC71jsB!E@?*oPUwyuFLl|47e2RmqcJ4`!UBBiX7~+)|To{6e7yPBC&Qn z7pB2LqhrXzh(iJf1lUQ3folJ$61+}#g(USzDkJjCg-kSeY*Z^ z;dtfB^um~HOQ8dCDOF{O!)-X^$2*7^d5_MeTJ3|&6SY@Lce`QZ))p^HgE|%CZ4*G9 zP4K0Jbw~c{^{ZtzAy>t?sPuwz>;hYaH+jCRpx_I(I7Er`w0C)GpYFpl*lfzbA3#_$U?X#5 zX21FA>x|zn>@ReF+s|#{{GhhBQ1>csi0L6wxc3hQePF+|VaIpnx z+0A6F`|ck(yf&L+Fk}PLqCMVRP=&ikUGZ`qy1?XDlQu_ESRFUxuLkfwCMB?K_w)6D z;~;VvKJ$y2EsoB9f}0nYL9%hoC)sJ}eKU`xq~MlchHCP{cpv9t;%=;YV`^Or+fj2C zZfsB|rQ&^~c4(f-zdv&@MzGqqq#Aa9z4vGc;A?u!JQLG{1#Q#9+>pNQHm`Hi#0x## zgpmCKC$m4vKGWdQ%EcWE@$G3z^|K$E-q-%asxJwx>noEwXBJ3XWptK5>bpr_P}-Es z)?FSq7)*bViTv8oZG(NGx5;HjS|J(Zf17A=a1!TC+l3>ZS?*p2l4|;Ww)R~?-h?`18ZMI z`FD+;v~)dAmszPNttxhu?XK7?v7o9N!uf}d|H%Kt-kXOtb#Cp$ty4TrpKQ5`d#1O?|-=>&V5eXW%JubT zMb5j83=pKY+}L61l%q#@2L}q9(&dXELnX~2tASCJ7fz71C(p{;ndu@%QeWl7OpbW4 zy}ybwm5wboV@_o4t!QM&!Xn3y@Dcr{e?{|uBl|J28q$jyS$i`+8j9?~ipT>|eCi9m z1o&Qz0H~9P;sa82_6uwP?jL%GYKPVeD8J~-H0pN z%_f}iH{nGXz=L>sR^q|pp0EofDxeJd$7Wxh^`cRcsp#%NlBho|39PIFUZQ}#7zA4@ z%77x5-Dg5F_z1_>_+e9Hf#@4g133GOV7O!vRzhnlU9-emgp9!6LWzyUi1n^L`6;-4Nc!84DR=VF`kb=i5VaW zlGU#~U|T+zwI(ln530=HN3@8p0g2B-VGDz)ctzdCry)jbuS+&V6v^++fN*43VjT%H zBih*r1NhW3K#;|TAQ+FDXCoH1U2!|XVl;>B$6WM~-X-K>&k*;ZStp^S+5%aYUf#Qh z$KftK+5OIVgCWYY%dPU|_MZ4LZV{PG>F$pu!X=(v%gqRl0u*4_f{O*_`w zmVW(ukn)XJ=mq^)v0nG)K!-Gy0de}z~;@itEVNQ1p>nb;aiy0tWBnv%%wsWWP zVu>*l-II82y_-|iZi^U~AP9Fm3KnDTfT_NnN#L}zB)`P8ok0$C9>TNS)?!Q(Ym&Rq zgZAgweUt;Z?@-79(YFTi78DFVh5zdb|sgF4rH(JHLMq=wg1kBgiY7s6Tnf}L5q zs7YOX=MIJg%Z-A-M-X&$!8jCeLP8zzG9jjC^dQpubiz)+ zTXW;Lq&WrAAeiz*C|v9I2ftEc1ig}MvGuT zMhmLgu`mB7qd5KFoh;jvd_np@o8Ioe;60L+JxacxyUFA-m;s;my=LQpaMfufwS zyZ3Zdt`&xn&wOUNAQ<~NE&!Ch2HC+1@YGZ02M!#sSC&u8B;NNc&5C9yJt%)syPPGg zjy)K#eQ2G3XIq`B*rXG@UEDGfGagQu*~c zsOk(s6-J8c2pHd2)Sldb;7w{vdEt|?U`aFKjn8hq9EbUG$S$MOys!uqEX1It+$$|w z#EA4xGROkEYDZ2?yvSVigRT>%F)fKRa+B^5!y)S)D@jmWfuUpkFy|~=UpAKz^izCb>9;adFoF%T^ z{w2asV-;`1+_D#Rlv$bUM@a$PK^*u=qHzp9rKbClxAO4>-(UE~OafviR~B@>I0Q3C z2B4}EQ}yIo35NXvHOT~^<$Pi!-RHe5P4&!7l;PG^@Bn?;1n{gMX5^l9&>Np>hP;ni z&PgUXI>eZ0B@5?l$cT+T_xg3+%`xfj;X#vQQSTO0Hb7(irAP3cu7>&It;U6>JU^<; z5YdZwLblCTiTov^{_gDA1d3S^*-ScBIl0yZ(N_Qwv`bO}Ij1(z+gUD4Y$DDkkEWwK zMc2Vjz87w&l?J6?>!74!G3&e){eh^(s9q~Z%C*DJ-?;#DbF!>bnb_(q{AOx)xxm9i z;SAH?O8gY!<)|T^QdNu8fOtkOI}*NC1u4VxqwH=QP=7Qq(mL9gLOd8X4j1oQ`r3n8 z2E{K-H|LJ7G2-pAnUUnf0H24t+41@coPM21CdSu~c?Zm2eIjA&;P_}*vNqX&xC(J+wjI_I-;j2 zn6bw(WB}VTi}d8iSi{`@$%P0g!r<5N#-qk{64OqYij0U+=C?lbuRPc|s=yEi%GH{m|}sziBd75bMW&%4Vd~S{dotZ$r$; z+=Onl!0H@R7~GXy)Yh7Sg%#*oi<~PA2MlY6;q0zqGK1x8_*R#?H$nAUpE@|?>xGetBzo5<+Fczkm{>v8P9 z#pF(eiDR{?Ips~f?{qD35S8#WuYRiexd_{`ThFcQ!Caz|!4PYRs!I0q1~z$Ch8EJ z+HDF}R+QB)qGA-^yVIbi(Vm9lPQ_M^>w;%5WN{$Sb2~LXmy^me_H5o^M!ZEiekfOg zKQ?9T+2NF$JaBd-U-%}|-!q1va*$RM0jWwwY&_DNv?VQRTM2P-H1pi2td5Zy;(__S zc^cer!;U!cox{+Iyi0A3^QkZ=d({|p^8TGT#zxHK`I;b5XQsE(K`&3%`Lr!{x;apB zeQ}zaI}^ba#nQ4848YW+T!-m9(d!fsI_*{XVZX*+Be59W{|pi^z4zMnAZ-I7*797T zR{0=D|A*ej;7LvhMOmF6SOerS0I3iNgTE4#7gpytKNcIq16b9`-F4nlLJ%{LDegfX zFau8&04X8$NUzRT9FMiL-iy~#bdTlc58fNq`R-Z!m=Fqz<_d=r47pi`?J^(OzKML{ zWoM%7CA!nzCn$Vt>H;EXpDyo)U0Tj?zWv6)6xQrLs8BK`cK?WR|CB`&-wcR9Oxoa9 zP34)pvW86Xr3Y&w2vc zXV(Sn9U|h30*&jz!UIMX7;;KVO{36D|5Snz$Oh$N7V?^~S6pHoSyd=0w+XGI8#_e1 zDrVkRNLqSQQPu(@aUs}JM{B5v>oA@wNLY?!iybcN4E(g@+G}Rtsq2PMnaEKo{JI89 z+ERiD5@#6Ru+L*(l~bbhL!7K~_m&zkJt2?Ksaso9&9c{A{-2y*l{z)5Vq_LS)JTnX zuCV*%Lj7PWr$rLPuBK!%wGNf?KeWM^pdovaoB49`2Y(W3(cViM1dbdgI7H)FWuX@` z!9A%&E?tH4LoH?rPb$6W?RCG{&Kv89_Zt;49q)(ZL~9j~BD#}|$iegYmHZnPW@7a2 zw7wV~YX`S&Ayvp#ncnVl>hI;99EwIEk>YbbsaA|ABk^>DXxy#KN#wB)wOcF8*KlBi zqri2g{fzrsKxuYx4||MoM3<bVL>VYh z%7TawmYs8fubaAfnFbL)Yv$)$_m{E!N!*C~Xk-~0-_m}#KnHbn3O*=C=e&LIK=R~z`g_p8BvIvgrO$eCJm$n;Ek*R zw4dZ)eGL!o&LF3yE97s?7Fnv-zs4euHrieU^Gz2yeFUH~Re26dB1sKEI%_?*Z%+|a zrtCo(2F!SVQjg)Qd3`1iQ@8yiUif^q{>JwAFr#lwYcZvK>th~xU~I&4%YdRsF{UHX zu4BCk-Xom7Tj4sBVN6h7_JL%EWmO+tLS_`(38PB@#*+>4WLH`R(+;nNTm8bzixEzH zBdhLF(gaV^@m@IU-~(`zT>pL& zx@A}5L>TJnM3}vJ5EuF^VUy5*Ib!ArvAo&`w)lL)FR#MZoog_H>&YKg6m zoO&t8ZgG&axAqGoS(=>lmP<~N7;!6CZm<2_uWJ<1V(i2IY}?XvLF@_XJ<8qp#<9b) z)FGe9bGvWrK;--DV|jVH23XPb4Ybn??kJyPMI00v4Ux634{WA74yWhkAnMwB8mwFl zu#Ce&gihLrID#%HdM`%uwDFS!jAEuvQfbnuG7SgkpZi&YH|A=*g-=*s>G+XxW;*x8 z>@j|AUw)MCgj=#N8k)9Hb_uTJ_5qQM{pZrR_UDy~y(A4OhN!+qo>5lB+j1TNa-&O> zqHS|9=5uOJh467;e$DZjZ@{SPJka-ji_E9|t|~UXH1OdFWxz{3!;8IRSc|kv_J1`D zU6Re-JMEz~9CD9L33aFjCV*UvFly;z|Jc=%T4}ymvcXNi_8f%L?$l5Sa`W#H;Z^N+ zuif{B@yl&>u#tF0+NXp*-%YK`LUP^SkE#r?n>XW&GoU`a=3UoAJ?Y44@cHr2E=_jU zfxRD3=BL$i-=_IP?OS$1tbXDDwi#=swe$dm=v&&LOpTru2Vz=A7=6^d3ZZWEm8}?X zo+D~;e~vZ33ul3SUU+)ub*7+*1Q5egM%rY0Mje59oxtKX4YRhE1 zfA1RmiE^)lTT14OcDl?GO!%>{YqbU}*)90v`UY-Y&jrSgDTY94(kL}69^4sg0<1dh zP8HvkDDU%sJNsc;F3&Yf0V~Jxz91^D1!kz?0+r3yg3;O@wqnR4xjNR0t&KDTq(8U`db02-9cVp34-?b zp8)JNNZErA3IJ75)=mQDQz3OUsq0;J{l%vfITfgPeMK`)lFdff(1Uq6mht8xq_hAi ztY#P-i2ytrV&1DTpYJx1W`~q)uQx644ueaX+urIS-#^w8?=SS|dN3N;TF|8ogP@W~ z6H%pB4AA4s6cp&9K@7dh!)fCZ!#8hxo>Nd;U)YC2^MgRbvfsyyPXMYO{I~0gyztE& zZeq$i;lZW+3gyW@3MlVg`}D2Ug|ZiTr@N_E!J(7-;WTvkM}7XwS8cYC{8=UG8ONHdDe%qq&{c++ODbHQp7D(UT++zhbemsrx!TW_71f(NlQb4 zk~Wu%V9_2(-Db&A1JyIgt|C9`Lp-D9S!y5C24Ge^g=F7j#&4yf?OFM!}}((98~+!|$*-g57eZ)|w!BT=ApBV?bD(#|6h(?AK!5BGyR zHVA^o&dMFY;HYJNR3;c+T>&UkM8y;0pJ%UI@GwR@FI;a7zj~4$45FAnEz*B zVrBxlJB42#9ioxVGVdSKeyE^s2DaVk)j^#Hy-^Co8F4Wp%Q3JUkCVVlHyK3&;CrZX z=3$CX?UZ~iTmjoGnyKyavZOpDf>T>Y5*P;t3pDr8eqxyAKdG#&!dnPeJJ@p0RvPZDC{5IN=%aa@V za)$&vOa3*n36^E%VKmT}wk3_WHm0NBI({(G>WuR2hjeovkF4<1l(rRmJ&8j|OV5ua)0tBgjku+x1qdv2k zE$8!NnXD(Vjq#Hic7ck%gdU`_Ze^Z~aNJ*!+Bik_N+J$}wl9U4hAmtsM{8{NU*tuI z8hg{`V{9}Hqrv!q4$kf}_lQB{E@oDZixKkuNP2&410CovIP0nOjz9y|ImJtT z&oi&@)zK54r1V)G97qJXWdWvT_8kZWlCHES7qG_FT{5u-072Y0E5B0}(f!um3O{(P z)z(P+MyeICrR#HO{BLR??4r1^AfD)mC5>?0@L=eD6m~qd^Il3TxBp-ToAjofU6gU=}6WMgTFb=vOQ>C7@1N|4;`(>DH{B z8rBnMarjrAG`p`thZ0V4&e~}?Vs464*PVofdBcik`{;+{wOX91+_LN6fxakA$h1(I|rqSZA zPTi1%rV+2f7{z=UI$^LR7*-)U?WFQr1OemfSWj_5%EvXhH3NF{*Iuly4-Np5RBDc* zWJW*ISe|=y5qNz{&b?%k(Y)XS)beo%ocg|Uqfsq2p8lGc-M_ogNCAz>?N~X(s~b4$ zgKU8Wqw^|FlP&s9`IYh3(I5;EwXENp@x3MsGd}@&i%x2m9WmMcwWd@OR*ODgoA7OW z%MH6XvDfC7XMNW!JUuoMH-QGv)SnVG!ih;2O*FSp$>=h-ha=FmF<+e)on* zKs(P!46m57m&rI+fFs2!dwj4z@U2gcfJIxwwgZ*Q32I2-(}}>cJ@Vtuv-jrQiD=1r z`{41lK%8|7=tm#zt_`FmRJ9Uoca6ldh~x?zG@g^^D1Ft?N3<>@uu2zZc>0RnU{(Jd zK>g7gj^5Aij>xh9MK^2VZ94ALPLE6vTonhbvkSnsKJMPR%%$=PmLv*UF zkYVo`aw01h4799}0fm83s(s9ihCpvpS<}?n5#&51lxBY>%v*lZZ-l&3^zbs%7)jfZ zm(7L0a?k@r(UDI3LO}>(%(;1(B$T^GdV9`qk2v2O~MyZ{d*&L_v5OP+I zH;Z6Vo;4EPQ!jnZ5SA(q&fD3?CL(g)rWx zzmq{ME3^|nMv%X70~)R-{wVx`JdN5eT6dYgop`4XGRRQ7A@W%~VMclwHb43KVCUys zRe|}&)SVdsV^-FVf`vK~2{O*T#u9H`Aqv*VZdfFy!Pe;^&F9$&9O|&j1irL7?w9M?c=gUA@+X9Le#zs*!PCU5< zlPS@KL*!OYIz@qmCiBQ|-O!MfL5^$W zE_>HdH)aNF9H{;Nx_CLSQG({Q2R-)~omMkdG(+h$*;7oTi>8%FgI%0W>WoYp-#P zH;**Q7_R9Nzg=HD`)%-rx!5b!9U*E4x>iiLayfY(Tg5{>XCv-C(@7)^y z^3RX(n`#W!c2M2AtLop?YzCX3mw$Mpm$L=2zt30_Dr!g!gkgf)V!uUtTpxJoAaa%HVix7O zg0dXNwBtm1Jx-DoQDK57q=M2Q#A#!SE1|llJ|$ab>0l%D0tuYwYqZ9ANF?+kEzz1N zvl{2UK)#I69^f9{Z-W{3mtP!x?%7;_2TVV-4|^SX)N&9SBzu03;CtOftkDtpmyl%k zYET}w|jG!Vw(o@S4h&cf%=URli&fa+FP3)GT9Si z>J?QJaaz|X>N;9+26!hEQhG_1n#-cq@&N*u!GT6@@{voBZH?PR-mk`eUX3Ie+KVq) zK^G2uhtH$kFwr@v4HFc?L>W2P$_L9e0AcAYIfHjdz>C89ZMS%4MceSh0M66yL}^v5n@s-}iCz z8U$QuGOdF5RuRCKYxxPt%$< zv|l)(eRJ{-BtK9#jwb*)`Y+>wCK-h~d5`;&mYdBN<_bIQY*YcUG-J%^q=*QH#4L80 zoYGQgz|^m7d!F7n-v!1Gl7Sgyp{QBT;NIH#r&0nDkr>FQ<~INlm>evswla(1z5fcw zVpvTSC0JO3TSEygl7)WE50ZB!AkZ5;%StF?+?PKN1h#+fNGomF8)_1touTgmodr?( z4P|gHYh!Z(L{)H)Smz%r*@O#n3GGQuY+jk=Z8%?^%B||1Fur}+$aO>ekEi;wSW8A|nPxI;Ft`X-QS?i`<{RuAdPghqXh2+}MkC6%Ji{7DSssBxI z2TJQ(`&Hvjt5@%u;=a{7*>b<=FfnRoh((jnL8}>2V}&uMC1aO>WpLf2!!Le8TbW$>#T#Oru?L|NAN-CvB(+nG2y+qh^K;vVUwn|mg3?B zZ?;Pz*3%q5SMv|uw*T0F2NY*5?bimJH=ckSyu12qza>K7&bdrG>z6guhIV`UbD#(m zVpmGe5HG_CpKRIK1?8Ch2wOVSG^=W4m8v zrtZ==Bn)SNkC!;{#gkx>6Hs46`^;^GLM6F^s!<1dd%kz1x30X;mhKA1nnVMYMxqVE zbDj-JMN(8O>6Z(x9k@k2vYR!X*!2!2DQTmaacj&_i~%adcy*@! z*Asr!sD=GYHX)6bs<&zqhyR~M=OEs z@CWsUP6AXPd;!|K20nR*5#JzjhIiRU1;j!`duY+@BdXJQ8Im$U1)7Nya-po>X|JWO zr2O2s!)GY7J-kEA6rOoPj2AN{&!2TX58;r)KPh(&XP1a1UDhwn?0X6?!$Yai3Y}?t zJ%L&yj2?En8^m;kOmVG=Xrnv$_(?SW5ZrBCMgG~k0^fdM%1mBvY=mj&gN@#1#hz|+ z@Nwa*o?NjEL$wwaw&kbQ0WEHvAssLShUR!yL`-cY0@KM^JJV@ELbT)ybhfa{f{>OQ zX&k43Ph!rE{Q!QuQ7Ziqs-ZU6^>O+wS64j<44W80~$5 z{m+vLss2~%%PnwaiIq#N<3LyFO4a?Du)G@`oI!+6j}p`=wLW`4$6*T9&DrWl=dT21 zt~#T)y3Smo52c*GJP`It#HH^9A}&d2?wj~A;@(`r*wFrBO~SDif>INE&$JwW(MWn_ z^^8c~eqK9tc8ImpOIV6#G25rbt%8fw{$JWXb$Yi{I@&z^ZmIrdN49i;9)>y!Tj~y^ z0Nwb;^H$sQKWEJ(+rASDkSz&h=H7t4re(K=Ljzeq2g zgpT%-B(tS2mKtFR3gJzM+Db1Hp4?+*Y2D80FpKg^UYPAedSeC(HZ!zHIAn9X4%&+39|iwi9_tT)3+?#yW9aDRS` z;~!BM1lWFcx*wfLT*R>*30C^P<<986ZrW+NgQb1CSvPp)Y*!VuZQ6bYs>EEJg`&*( zu~L2&`t}Q7_z21&Dn{RE{%eZMHxz12wmGoQ@re@OpX7sKJ7u?a^A>zw=UzqDh?Rb|!Tk=}UT-nkae`MOTIb5fc zX#L_~uEGs-Sv!wOWzip5SM^_rhiw!hV#*zuak`+MO0AIubQ?1$o$x^8N{}-OLwD?g?2IKP7B+B=OZ1+6PknJft1q>D zDLPG_vzpTvRbf6A2xZ@_4HjYB0czy98&lR(=yW%FcHpMPkfXw_o92mp`QvNPF-47! zNsQIT`fCkjvv+>+08DO3cjDkA57d{_=>AVzx?a~J=YhFjWIXKT*!JGr-Uca5XU z2B2%@J=Py8k%bcxGoi8cjF4kdc=9z6l~rB7H(&~RrI*+0p>H1xGYamB|U53NbgL* zq=pEpGpY*>>!FftL`^E@F+6Rfv6-bHXrlg!-)k6o_!_nTS|0K;zc|2$nPia1@QeT# zOE)uP1jf7ufX*Li^5;Ix<}_qJ)xQ>+${khM(2FKr2>Tl~+Q|M&qSvTftJXA_WNLD5 zpRZ!wzZkvaXA6P8{oqwH_|-p`BkQ_fBmR*5cb3+o&n#?{bvT_~pc zGw%ssa2=&DubBhwwI)jydlRaZC(15=6O6+b(sLS|n{%Yz{+2cz#zPf}IKSvM z)44q>eqyHg5H(EolpeZNlm|09)~AFlxiRDs#!XPaMgFFFT-g0Mi;XB#fa5pBL>z#P z+Ydq%UtO-%>$Z(HgS#kgpph2J!D)1DKk;pp0cDOdRVzw;*OyLdsOK~k4+vDe76Bx) zF2_C~x3#*_6W>2CQf4bI5|L>gx#7@|=PCbhM+W`K3r~}vUUYmRH ze4u9VsZDex{nAg(N1nTL6TS#@(wjU#jZG5P_K&>pU%u(=q6NP6mGQmJIXBMx@CRZ$ zCjDfs<(W!OHVtt}zT$h^y~;ELw3*<4=W$S{pkf~aLU zZ$d1{8>*sYsBh|~tv-wp1xYO_BqGppo6zGk`U>Wh&`MuQQ}tRQic_}%1^Lgf^JE22 zVoa^P7HsD)zmowKpf0eZFgo^`?c^HzXoSg7#2;sB!bYi3(*E3cuSWtt7~9S-IKccY z$ThSGQHS$Sog2s>3JPt?)88?CLd|u^p{p~4$z&^r8}e7EKe41{n&n6ItSQFMTa9ZtHeJ_A(^p$z4=Ka^XB#BJ7M?)JM`rUAAWq*XcF#nb#x4$zk6c$)xdX8K(Fi$ z{*kvcq2R6DuOR^E4m#(#88_#TqN+litlu{g1?oZ*_l4cq0fBL}U+JM1`1Xp@~Iq%VF#P5CVw;@vH!ZB>={EtQv3GtaF z&hszDVQU;tM}U|VeF@54X|UHmSMh!?tj;Xeg5k92fr42K?G5p;6X}HaRZsD;x;P1vx|H0m??pHpG3d{-9%$fMLZ{OD^bU=$ z8EK!f-~WvzrUsPkT+!Ap_qF)aBqrNdu$}q%BJWz3F|w63SNr_bC+r_weTKYo1>=$i zq&AsbyKLk_SI^FqZIN@$Ph=y|X*^Z`s=@IXzvA6e4I+a*;VXGzTQTBX3muaf@B=XWvL9ofc7nz%^uTmap1sn_T@!VI z6nQ87VJ29{VC_LJvZud{uNiBVg-;?ahTv>+pG9q~knv?@OP^?jQO5tk%H_srinf7z z13gvmcu@H8uE4g3;_yd({FTZeLk9l12Dwu5;sjo9xb? zjuQJ1)9s7g>uX}Gx3Z(i6MQu#-8M+^biP+uAl-~o&R3Ib zhide#HSJEVi2qoSxZgzD(7y8x_YNm=@;T?>5kitOvgvxxgXa7hqK~w&v?Hh!G37Z` zSWm&eN0|@xktz^gjrI%#+=w}9kSl2zl)Q|t=_8pXpY7Nu{iSDJ`ZMi!LOJ{BCr*Y(6#~9mK z4=)=hzk%tNnBO$Xl^~ubSE?5M@|bkFa;dA{{Q|l1myw2&`k=;4PS(Pd4~HAwJ@h=h zG-Ur`vBaN>U5rr9g9|j+kH1=UDJ#^STZ#0sU7C6d7^?l8ecjQkS;h&6PgXt(-aHGgmM?iI=r{7&{KcsGD8UD#sMG1-}l9zPxC$=S_t9`rO~S zHOP=l*IQ#|(F7}st#T5Sx8P$^A+B-xHkqyZiN+Aq_dY4E=FzoqLqA3uw6`(r`xQ{%ZE}qKC{q z{MD<4;AMq69b#dmqS6od%zaclvgTWDrG*y7{`>BlTQflj&+d^S-^{!ZSM9WVytYCx z1s*4Yr1hMTYv8Nk!d$(^*w0QZW;h~SJMCf*)t>X2=A-RP-=E*=%gSc{9KoPh&t1Ly z@&zC=%JcGilL-Ev@dr7v*9By%`w3*O3$6BqSn{FamZxgy^nAl_Gr~FZjDk)0tnv>A zho}zS_C9rgchPZfzb<{iw1R{1F8oF3g}jL)qbC*@)%l%@S?;JYEJgNW#k}!*S-C)~ z?<#MjOnZd~?srln4^e;os*s(#{Jp+8u{t+iIb-?RV%+v)BPdOpZWGJCC2WAe4uvN^g^tN z!2CV7Z{6SHGi}G4rCkIp-G{sABe$BvwiyET%an+>AdULvU-^g5j;o4bnnX#6Pg*f? zsLo=euTCcEn06{HQ@c#7_t6c9uPM^7r~4UNul4QVQ_PmyK6`Wz^QWHbYgWu!`$u{i znSSBpV|l>|nbK;5-UtQP;K}S0;zQfDIgXQiE-1IJu6{#BEwa;YV5oY^eP{SPRliKQ zK+Ga;Jtb_%jE9|JeM}+Mh?4+2uawI2s~0+CF{xu$Bqz-RnGe*El$#XoqX|jXm(6*u z%Ei7HbG61s^&5?n9&EJ!BCfWt?a7pIz6MNBAo~nTab$$v z;fNs>o_I^&_|XP z8*OTQZ!?;?(_5 z1o>;{tiDn{KUx_v6_C5;D$WzJ^TrMN#C(d)?&z&7MYl&>!!Pc|>wXZW^LN>J;c5%6 zynb7^1NY8@7A85(&H8(DdK~GyUvUJKl*AvQeI?XNB2`4v1-5F;67hYk$A8A!`%U~^ z_n9k8weMSKDI##iO?w0jv^|g|`WL|=;Ul-=DiPhlu*-(jHbv8LRqr|fnaryPzZUD;CY;`gBkW zCO6Kx7U5#gb^|S93p{-E7HsX>($_@}*@hyTfn~F!HEMp8swuy+LqA zvT!N(o*$}F>U-pyzbR%@rb!bmo{r1G2P*e+$_N&v{8P{ilGGB5=4K$OmR~pSs%$6E3OuIJPVp%=bwl;ijK<3aqGn*yV zr<}8OGZHYq!a5q8T=~3FntSSxZ{O&xez^=M3im~hRy!q>y&=7Rdhs^DCF1vQHG}_- zI4{%tM%&AlB)GtasT5x+N!=$)+W6f6W9j5C@L)2xX*J9CQ1nfw&W^hkq-ZugFQh23{X_FNJI=Bu6Y&(Js~K$sP$LhIe0zUpDPIw>o0# z*2HqVh*LHbt)A)rkZ&R=s{VgKbvO2?<4+O&Lx5)dncEUqbL2_ed>7Ee3543*X#z#p zcSZd~L#zrk{*~$bAD;Pr?fTv!D!S{4Z1rNFKKsLzW<#iY@X{fyVvZ?<^U0uySHMFUx;y@-rv&c4K5pS9Ta;vk z<$IdFSwjyP&D@u!w-sNPvHwc0ZEJpb;{`)~bN-A4rLrm5+VfTvQpXkrrS#^2h z<*nGwTQWOVoG6*qbNa$dO1X4H_m6{DdjG!3K%^fNtJO}-eB}6dFRNAtr$b|rbM=WG zJyCgw_y%jdUeD^Is^~w3y*yoe`-hZOUy&R$SJ!n!G0!^C9gw@CHTCvS2p*#jm^1!G z+ciWft6dScRsIpSWil`IBD_|gv(UsYq@z0^6M5RH=Hq)yJF9>v zvN$|8pR@}H7j2B-HMlZ|){ysQYSJ5VK!Ygpi$;l3exz6_HOg+g^mmhheAh%2Ev~v~ zrcp2ZC^crv%|2D({cU z5MAJRDieocnnnx%sflaWSZ6;=i-V6p{bSXCZrh(>lfL@h0^vuiD^55J#(a#wQO0j{ zBv)$0DL|Z!51V2V$KXr+rMyM1(HF3SPtFMc`DDPTBMx&-xQ}GKNe3Y`VixGF0(W!l-{5Fy>91b`azlnHfSorHR?>GGeOBGLRY7XKrD@J%vASCzhqQ&l zN@eU8G$HSkW50lTEF513Q@-k?wXn;GEzg#?*rhcR}QkV1J zweP=QLU0FGP5W@k_HUccvp*F(5ThSBG!2OOBbEUsdy~tNxQ;{TDcMSz#zQh|gS0=~)xI z7jjq4k@WLoDm5Yw?7X;swZ*0dxpXXfqwH%nxBcK3xyJPy zWsg^!f&2og=%)>UdPnsC0Vhyw^5bE}+MG z;a76abiVB5WfJj|4if;hP%Pp?7Rt{1ujCM{R=Pz>##wtzfhpeV_8i>p%1TWaF?MN% z>;>}eRiN4VR6QFme*2G!N6ISJvZkrnb-rskTPU+o^d_DYkjRZm)sTq)AuLu?Hck&e zgB+(7^xe>S4)r^Nhi&m(p|Q@n4)>@{HKTdpySy%GS-p7>;{1+e!r$_hIU z(eW|_8H6Rii5z&fo6_q@^#5}^z>$JvxFp)&E>OW*Yu={aw%J3jMq>yP|x^Bh&uPxGWm-e+Gwa{c?vKW23doz zotqhw{bO>Yzsz?f#{d{JAaQ0>`385QNdvm@52a|oLf~PX5&*L#H20Wm%3D^t!fp^a z@_3_Sl?Y@X^~~7nlx^E<+o*q(4R*z39Bzd3=Opn}AEaw#fly$k_&Cs{I!04xzr?_q zDFGT2g#Uw=+K1 zfwE^wNL=!@SoeKpwqyB1*&|bgtX!=-LN#|FKR%<`T@we>{Ut##xW5o=@#S-JVIdT9 z_Np{^x$Idga4_+c-ci6V{qaqV7g*rvnhOyI-*Sh*G&Lzy4es2O$F%*m=I7m*XX-me zsqa+lG^2SI1h~^!LeMtgOgRPl$Jfu&`ZAGd(d%4KBCqMpe|7??`Ru4wto6h=pc88l zWB(b(->{u;2QlxsTC||O6S)%e zEDM6g(hqqA2&zs{{;SUIS+;QADQSYgB_;^_8C3Gc=b|MAX{oN(?q*|Hoe^^2jf2ED zr&=>Q{40fE<{UB_%!ig4ny)swow5K7F)M2f8;jM(T)Ub5=D3p$(nJE3!nh5RVj$`_ zsx$D$R$8d0<8aD5g#E1h(Bn3OPUf;*wFeFaw>dzNikgEaLdi=cB*J zlY*}kd{^A*4vx#HwOjAlh&sf!Je=;X-57RgcXzJ985&bs2keHgnvOJw)&Gq;XkMYv znmC*54bhiCCF$s1+LTakSS~2wl7yIuq@;+rd~cd5o#pd=y#IjLFFvri@B6u&bDis4=R9wL#^&Tz zOUDq0jA%o$S(opy%Qx?x0xRD_Q7&n8Uy*TuvTAJE-4Y;Qbx_PZ9r68<#gQ=KmnBX% z2Y`nCPfMG>Mu9gCo<#!~)s5W+}&-zEf=6$c;=-w#iN2%$jm|5M51Kxl2-)rEaGL;lf+%Z;@ z+_=O~?b`c4>hizCvhS}_DP42dl1!^OKfBnu|H{UxR!N}BgXtsNSIm}4P1WAts+*q^ z&xg#fbph~GYo%xS+ubOK*B|;^zN6{9?oPpvPXO!A04)7-6XVfh1DexTir+D~f`8|< zidFKQiGZKvXO!hG_)#1aK6vppH}R*Y#fN(T3JP`7?^=_`hHeg_5k{andeW54cSRV& zC?>v7Bd>4o(ZEmpw;AO1IT``Sg%s~r%vT%_W?l$BxOf{C5%TQ8!4;ur!{-htoi$xE z!Hrzyfs~{eIz?PV5vB-Ok1Ss}&{9Gkf!#Uq@y}%=h&~{S*W2?7A~gmMJ*VEz~*p)`{SL=7y?K;u7V> zKb|-%k8P^CBPur>W}MVrF*8nAddPO@mv4}PuIwDJAyMfQH7h&p4duIumBYyR_5Fq_ z8d=_nYgE>?y;-ZIqT#&c^N*zNZ>FA8&2DE-57-yd_N3=5rJixtT{$W4O9*$_7jmDb z(^x#7&yWloXQqF6w1@9xfNVHJ4wp7xG1*|hKC1&Y+WJAS#`bBCL>iG>LA)~3A&m>0 z&ogBe;U`rQ*h6don&Q{V1|XIVxWouD=~!#E9cehwv1*3KR)?$8I}I7fd!<`% zOC47h1rw+DJ>=r}q5<0LJ)#*&Onh5D>)CAb_=MfnNP`$O z99bb8rusUNIXKyu{Qw4=b--xOK^%89GhKb2H>ku%r$3jP4*0aQW@`}6q7GuD)8>%P ztu|Fxk0tmY*vAI7fHn;4}%CGZXk|bLD@z=5wwFAGB#%a!8!)sLL9wb#> zFAx@KTr}_>iFM1vkB`0Ldml9T(-usX$L6<=U41fr0u*^gPn~8k72hvUnui!vYrc~w ziC54J*|mmMGpnr#X*6cs4nu#qu4-KE58~tTIBJly?(*B|x@y$x&S;ARZG%e0>+6+N z&hM^U{&V;A_jZeHciqaV!0Me7`zcmycJ!TFmt?gr8u+0ToslGuIa-7W$@`^YVNd~M zDpTU=ftm}Y+F#}ctWU`LYrL1yT!#XxwZ_Y|B@IM8UVrvGrFp*(v|fk)w5141qWI8D zSCwI$zYi`D0Y@~yU+WxTqhzJA`oim<7P-;t&Hbz3>UYetCldY5orZ|;&Bu&GzWum; z?fZ7ofVP2sO9|qT%o1)uK~%a;tf6jlR-fe!CQV6VMg)`WvjuYXcp2@0o26Ua2kxoPEH~(- z>PuNGl6p1+%hfaPhRk0WBhsW`Re-)*O_#T4FEI`wN(n7u0~4QrkYv5?{Th`JK|I2b z$+xt@_(?ZE4Syi|ii@aHnBrX?GLyPjw4ZkhcylNjjs_<-8|#%l$<- zw1?zOHJaT2ba@1AXPVYXuWEnuQa70HN@}sudu`uRhh5fQAJ8quX{zBRpcssheU-&RIZ{U2ET7diQ8?W#kU}ol&QQ;$$An!snfHmVSDAb_R6<-g96g z#u7c8DBicDL)*>q{87$>_7))=c2HkgHGEyb(tXz3eKvi$iK@{PsB)FY+;LI) z+o^GSVs0=mG0^;!Q@z6-L6{D!f9AI!2c{{{4T%i!>!ZOwl=pJa+Yi1%M(#|18l(%& zrs-6qysoqYvsy`Dj*Q%q=6hk3Q-L0JDj6@$n2#2e+uCtpEKdCosZK6ku4%BPFXiI5$6|^2&hvg~yt=uHMwc;Qq|FAm z7eQ7RLdieQzT@ZH>1K?$H+VY$V^b#lBEejT{w&7F=);a)M-M(vngd>6n+&Ty(`w<_ z2g)Get>%A&cF+y&I$4J$?r*mfs+%9-O)>9gDoLp&Qk%91U>29uV*$HM7Dq;t@QAgk z>`o{52+3Jnci7z`={3?E*bQ(#O*Plee)mqU@A5NcDGJK4z5u4ehNxzF@J}-_p zI0*@AYeZJ|!oqR^AGoR&u=M%I!qjVD7Qradxg^mvhM^zATXmKc)r4a0oT#s8({9^e z%^OpOm}B#*^5nZG;_f%moiLPh^cuM=c8* z=49=~3@=-T-@zM8l%K8zW_QVNML&W_wP!x4kmRc{#kJ#yb09kQo%NJgTN3LgRe_)zn|pWJqQSc`!;MV^|OU`zFEk+`{H( z!s3lFO@6HPM0_6{3dZomF6BrlaK9X3;L%xqCUniI5S`kcpmr*l{-OHnr6St_ZPIjM z#LM`$XFNJZcS#^8977UTo3*R&8Ok{VF4g^n#6e_` zUwQfVSpDt$f#|yd*oVoOy}FAcLf*3QcY5h@n?zy0>~JM9h&SBhCOif**d;&zLuypB zV618~MP!k{v4Qye=GZ{6ak#SSXQJ<=ZlsNZTvi9GW^g^!94F9uJYwl?2jS@C3}+8y z5YBYY($V^O1BG@MjQ0!5&M{aO>4Zuo@OXEQ6Q-lo@w}Iek2L#Wff`g%7cN7Tj zrW$6sj(5!p@^+0zf=~E&S(DPVq$oFRM45pgid$?p$YEEC9t6QJF-y#$=v3)lGt8TI z;t^e`sI3!y{%$0q7;ii2fi{ITn|Fq*p+>whC@HbtPs@X;&k~c8PA>IjhbCdEyON!DB|!d8$x(?Cjb_ew?tR<{DsC> z3jtX5sL8Qv=Sbs1TjIEeSzaQeWjn7jM5kSi#TwQVzNN$SteOQeX|{wkj$2OT=>)7* z8v&X<=PJ~_kd=o-Wm|SkTj8H}dYV@lMj5!y7Ny0`*|;gpu)0k~C1>B~Safs@zyA@^u&y#?&|ASQ#pC0z88i$KwFSZJ8q0br zsd7|4c`}64c_4xmN$RRZ_z`KYLP@3T1jOC9MsOF~F0cr3r1VsVwM7rJ>Wg62HtvwN z$|~|?S!fHZQ(P7tL78{Jq76uvRvni0j#q_GT|Kz7fy3k*d_NUH14+|O-gPoimPqN+D>kk71Bu2CU+Pq=ZKb4Bo_`v6FhRfiDCG( zfu|1RI@|7+SRF{Mr!oLDD>|te(sswomm~}pn0L4zG`8l4!n^1DZ1Q6mmXBM`Rls&h zaVQDO^=-l}5J+9xe2$Sxx5HHkp?QG>CZZy$rqK-sAbPVX7z+I9zqWgWuZ1if$4ERu zX#1W?qzuhpxtFzc22{u zoB$qxSH5J_Mi4zloQHY^BAa7t&{jyDrdK(58Z&fPyUMyi0w~VU zI*1a~&kbT>*9UDLwuB31bqPr^&m-OAF(!FgOabTG0$hVQ$WlpoS;BNIqc}t ztjQo#HW-c# z{!nzPkG_H|834F>DShwLuVm%(4wF(4jNF)gl#ytYiRNDmPon+2gia~mZE=9{dirLt zUvD*Z9pe(*DOTyzQD7L3!e&q2HLFPDX8{-z%n6@^!{8;b9H&l8KCi3HHC4Uld>Y;y zCg})7m^4HM?R}liq2oLF-lnlVB+?_ei2;*X+zSt$xY5zMmeV=xSjghuwwizk_gVIy z<3_828Kh)+aK2ti8h^5kpqVlOq)T5mV9?)a{-^-wGP^erw3LCY^~22i37&asK@};L zU|E;*6Ny-9_t&p$I0s}ni++#sxN`U&-rWOik`Ilqe6SO}EI9?L! zL)1iqM|q@b2pZWGfqqN2eAZ#vY<>s_g7U|ZwwMjV-!pmUoey!GM+u|8DHJre9TpsH zPoNe1r@Gr67|~+-j(KB{JBfDE2pS$eDmD*B1TH{iib+3CJwnsm-+p%oD;|?tmPJh4 zw^~VM&;tNdiH!DS*Vmm_Qn6ckiBVr^Xi>k+w$Ng*gU;`YXUDP3VWQwNf)LR+!qp^_ zn#%|h_3jo}et475yj}`FOPXu0>AF7s96&LHQak8K<3a?@2Sj&>AL-jFHXoSYfV3Ut z&?Po)4BoqGcp$rGdHNBQgtgZo`r~ZaNZY;7sk|bEpF+L!OfsE!e0GY}?zE~3 zJr|F3C<@l%(5DNdFS!6pz~Di}Y$cE<-!7W%a;=a1tJ;FLw>GadY^dhmuEL+FKpcfN zn6n~WIn%7+;4%lV=EJj9bQs(*6rSpkz$#~quxakqrci+ufIZpPSp5`(;QQrmmA%?2 zvaUh^cnw?ZPf>S@LFf}{8<<6%*5vClAC7j4Fq{hPGA^8(?dS=o={264z}K&5O6ZaB z2v;=JFs;M0QyYz`w33zpRH2O^;ueL*PL$-8(2sMA8R^ABAVgpURaux4+%x<%zig*r ztj#a#{)TZ*A7@)9`@CqNsp)C_amdJJ%#;`2;j-GCgXYd(5G(@+N(pMQaQWAFw$I=$IlkvR~qw5-5V5vcB=_2#6 zZp1@)L>ah`JSrUHQEUsXZj|VGNbwI*x!welp;iugzH+Si;1_S!(DpQ%oAH!W%7e&V z?(kr~9!w|22AC}l;5~z4$20pE+(Grzw^<$gDTY4;nbU6ex0`3`H==OA2*CzewQic& z8v!5oeTuJlbPwrkx2i~y*on=-2D|dYx#ajV(?QapUx>XriIgUBbM!3rYC4ymBS<+X z$cs5DjnEP5mplyi%Bekal-DtBZy;zCzUFsX33AwjmV@zdzQbT;7{~i@OWJ+l~$s0~J6>SU3V4jA)&uSz^?9>!O6FT_ifqDz0uXcBK+8ZfD zMeNwvtd-!F#tV`93~=AC^^OD(*;sDhBwHYdMtdGQ(`*aEe48R{@g^_e!4bBdMfmAS zI8FfD4I3%U(S`${N9v$o&f}=voYa5nF6T!2Q6fRZ(3Gqwz-Cb$CEUoDF@n6#X+{+p zQQaP7jPt@yf;%%<*hUg681`y57(VVzNf#m=urR?x@3!2s1bmth76EDdtymz*qLfCP z3{F0MoGu{Bz#$EciPT0GU5Aw%v&i~@sFTFk0LW1oH9dFPm)Hu>!o6#+sn-WWGK%&5 z%?APfk`n51seP(;zIfvLgsbe3oImzy30~|SEM5_6K-5f$Xi?9c1S4~!ZqY~}0ALU; zWGZlAhCE3zZQ*Ps&Xs`;h@liQ>ll1g8`hBSi9Im@PIh3ekA2#Q z=%!eG(n%4|hwD_41|P8FhWOQRI;JD>LN-g#+TqNra`!vZVx7iXFaG{~{*~{)j<{|{ zbx1&&L5|LpVls^q>mt7ag1$ZJ?y9e3X-U$uwHITY+sSbgW6f7{ALF0~Td?{>Qd$IW z9L~cCOJbZ=ve@P0u`aN&T6_vJ5Se2S1pMt&QMT^WMa9k^6^LK<1hf0y79}MM-Z&)R>E79%Ag%%mGPe3$YlVE3|N9WeG}2p*jrobfH~>VLlL3 zbG!xG3z^~PDbR*U5Zec!sPRmyv~~(x)niJ zOBe$}V>>D|VY+R?u$(TZ{39k}+AwcgPgq`Pb0Ne~ z7)T@clD!RBaLxcgXytwzB(hzGEI}pIv;-_VR*irM&t6;P;)?XixDY@&O$i#>v1rqp zNQs6=Q8&xDx4k&t0vhLT@Ek$CVZaAz$f~b|+TpZ`dH$DtOK{(HTAcTYyJZ`QBk-!g z7O%??d>f)>oyV8Ah1g}T7jIDn85sXjHO$f9?F4~BI#_PxO><#?>4&5lI0O%z z94==#Sa2yP8&-;>SsgIxjMCS+-&sU9CBbi$m>R<2oZ)es#$zo4dxFC!+gMN$B90NJ z!#SEEt!zsLR$!9EX}<$RxUU4faa#c{S#~$NyZ2Pfg|#YEDnIX!#(HmA^bPwR1<6p^ z&o!c?yBvDFx!B`+S(X>twA$VGF$kQFfHOLn!3LZN{RBUI97BT_Q;I-#4nzAuu7NWN?Yj9Xs;!pvS@)anlKm09Y=uR=Po_;0@%dhQ-Kl_42>cZ`#^Op4Ua?6EHVIUL+lU3xN^aiW*E z+i7&@E%``}D0@3`YreD+Ak?v3oBY7C(m7XAHa${aIIS)9Lr=e)%b1jCm({XPlz14k zs=;o&ECRBrc)(T0Wk?>^jJpQuwV@q6kMgJ(Rv^Nm0?BUgov@v#(kEt~Vnz9-3oIt1 zK!xUFnI5tm+HrzJ!prNCuTklzg*>~51l)Ib;FL53`Kf;2t9bPj4o-Y$r~c+sYw-uATRiiQvpNhxzd3j^P%nyd2Lo$6 z*|(n9{Knc!)YUc_8WzswRgXxJTz*z3KwY~I@~la(k=6bla>7JNkp=UO1({>n!7$Hb z!l9I%L|U0Cv!r|&Ic%F()yprmXyIFtvWBPWj`?p1!s}?R86%8BCTM%~@_mN0=n=g^ z`A7KCrVYZ&azJ)uq61IM97Zd>M~UTXO#j9b(@qw9ht>OclDAo?(M^Ig#$WL@>BF)C zW(fEIEEvbzCGf_M1pz9(WD_8_%c2dv7e{=gS;2~ZRZ9IUei%ES2nAi|ngV-bl7@y& z@B-mTOTfn&%^jrp?6LbumW*r46qf0Q?y9amQK7E|3$|~R?j;nP_}eFQR(CSUi&c4or5yM4W zm}?ojmR(at09`-o=y^1gSi@z)0eTn-KBBi>dM|Ed{$AK0OVg*&uUJd{)#DuXgNt0sl<3Yopiw1HpcmdnuxuRLVIDzCSW6pz7@@V zdoco98JGau1=J@neA3Hy8P{#hPmtBtRdh%E6hcZ{an4~X#%5ccbSaQa&~z~HJ;+p| zIt?^KD!5HtK{Gfno6umi$figFsz(K&AVKX2&6U$OnkYbOtWijfp-rn7ph>mqXhGxt zNUW7le`RFMlLuDuAKy=!#-@6=Y#*I-L(XdO$ud|3sY^qcbv|_y>o#5@za!*y=CLdZ zT&vCp5vZ0!jE&{~5D!4hVl?*&&>OAq4D;*)<%Q86ID}|+f^XXnqK9=$URsUjv^hi> z+xJ;cbcKk^+eUDWAw|#J!M+@u^LLTXE!#D0J5QNbq!c z5YO^xP7D~8OB>@RtZn3RVG}n#JVNoiD$ASOTX=Rr-qQjP4$80YEOZA5(6del$jCZj zAa$o9C#o4{Of(r}Or*nJ!R4JK5)*2j34^5r!~i<)EsjpLbuvBWUomDwvLL^S$!>s0 zkPvdZMQHOD%sSQ}pnVc+2DHHvlH`;>lNF)IUSJ4KMb0zbdk1qo?FnhaJ@g>Gl0Suz zfD1tB^U2=PrUgAKvF^AMc#jk{^)@mIUqy~_)e+`J#e^SUvk~tB&wG5@L@YsYuD)BY z9^311xi5OO_Tsr(oQ%qoua$smeT>uBHkuQG%#ByoBD^t%h@jvb;YdpJgJOD!4@~cA z&>C|C$#701f|{LB%0#7gkXy(U2TzY2+L#RlP+cRch;4-wu-Jl(r0qOq$l_BOB@bo5 zA2;{Gk+V8~1K3wdi;ysZ%wt@(Ed)v~9JlPw)xoeF;O)W-vmK!(CeV<>8;VD~FqBe@ z3Pc|7uq`0o!~@Q^r&hdX_k#S`bxye|anc26s?|nuHBE6huibnB&}FIzNszP+tUM@~ zq4Rql>$q-7F<~b}7g`kf{V1}%rFasAI-2e;EV8mSXf*eS=?Y%KtJ^8AtY<+O!mRum zEPFQ{+6!d`5`;Oy#(fC@B1 zY~%wH9ok0Rj(BK0Sl-rUHOS~-kQGYS_lo+)-~qF*)~lovdC~~7XSZRakGHQeIifl@ zc(vpD6IAAldtD54&Iw{0uR3p_P0xU6b>Oq01-}v016E_UkL*@Kxe0i-7~dm!I8XtAAFbHf@RHXt*icqT2J}9sJ4hT`)*gsRCCF^B z5;w~O0MYJf@VT#^-lmDv1=I#Xd|4W2XEUOnuJ4N0^YUpFAYialPK>ow%2-fb19PJVk(;SO@jL=Jg(y4R_{##>Kvu2Wgr ztitHj`f~X*ymiHOepaaNmd<(*0$kQ?EJ4hf0+rsfpj<$QPeGP|T6mKf%S@hj#(T#Q zk3PhN>+Jd{f1FF|PD38WjZc07t#$=~x+ju-l4p%~q}O1y+qjtBIN|!XwH&U_#`(}b zP_{3cx?GTl!QIqc2osIl`f+O_APrIIG#E~Js`H&Jw^yfUCe*iQ@D5Ox4^RbcdG)bqod>ZcJ)*}-KfL)zM^26wyyOZVa;-Eb>T4MjeEc? zX;I&5Nq5XEVkQmxni`6eozx3CHJ(+^3Vb#>MULve@UF6f(gF`;cNThjrPPmIZD2?) z>UhAe54PAxI8}Jq4uT`?AA$$dM6VYLS4~6!VLMO{N!U^SA-)|J3dk*)iBLcW;?Jt;BAAHBYVrx^((lS`3GL8& z@0Rq>gp$dVn#6LWAq~4n+o4r@LOqYiFCtpff7YF^>^;X6e!q}X*A0C05+};_(($hf z?Z*z71F_In{7e&>=h0YSJ}!GyAEvADOA6qZ+bZsFU&MT_tQy*E zQcKXryK#(be4C;HK$Ls(RKeO$C!Aln%();V(X0TfV@A$P*W$|pYl=%(?0cM&9H`?_ zY`ESwO_VFG+Gb)sfsFGTCPfAnS-}P0hol}7K7I3m_X%K%&F9jwJYH%$h>V!mmUOxG z(D~;MqeDoN(2~aGAvrwL^pdFRLvL*&MGg+0uFAIA?zUN=1IT)5^!-G!d1Yw~W5Dscx7a*4 zm^A- zD0oBa$nI>5D(#{L^^`T2j<+>A?oJPCAu(kmFQ?_D?rLST$AtP}xs^1U*mu;Pkn1=Q zM+yC0I{a&!p6Dr$3A_Qh%Zn<|5brGoS_69=GrME=kf~_i=ydQS|eXcCB9XX02gUVIV|T<#x={Bm-4cT;8K`lq8Y; za>YUO&|I6VP`B-P znCg4nA+V>8KS{0*G&-J?ZVCh%SKGa0Hdn_Hae{}B<3Pb>+^c}ndUQLGHGY^GTC4_~ zRId66kKMyt1qEC+1zr!pk=aXh65*uQD9|w30CFHqm!x&xcU3t&dxArC!vbwS<|lIy zl9w?=GkT;;eC|Z$^tSs}OmbD>SR|C1-u6J;77`A(6M%YMp`WfZg|VIQTdjK;Ka;A&#c?de|Wo7 zs6lHCbz4zJ?xVqhE=UqkG_eBr2?!#xv{Zm3AHoNVnGU&U`Xt@gB}3KpP2i}3IG9iz z47B&b)dCmRxN&KjX*FRL^iou|Eyl-!A=bX64ekPf1x- zriBXs;-N5E4dz&_jyn-sp6mej*ZX$VjfjQ5ypiCf=(19(SvwHM*fnd7LXdmpsmS-|7=NpdBb`D~&B`u_sc5c7+oSv(+s*fM~-HV&%v~Syi0D zn=%JN33>1k4W!BE4#*-M-SarqnuL@g{ly$gZ{0;Xr9I-Xq~rtS7i-m*%}W7=zbE}z zZ_Ww;t{t!}#HEh+00-;@Mw><2!&_iqM#t8+E_-75$9rnF{N8ceWsKH`UX=n@02DAe z%L74f#4#>YSGBzpcd|b|+o{$8!xDY}A?}-@ntc9q)^p>Cjk-yB8$L>-X6D;k2-mt7 z7~1(wt&u%LKuZfwd}PYtiuDSc33}3%73!KbdQsWdYu_UrLyw;8FL$I`v25LdBsxQ3 zgJJeD3+rgK=Mm6-DRI&D*JfDwpA`P?t3HPw!&B+kp+Wa_UT97BIuxvm3N<+P7*v*^ z$KVB(W_h8mxd?R!vg+Aay;-Gn?FKk|LS!Wksu}uwNv5g9nc8v^R2v?;&%DR?nsj4$ z`aW~G0kB@GfjZV2Q@uaZm^TF;r<2=q4Nr}$0~WFkK+fkoHmWYNy)(E3913fT0UEge6HdIHwf-1O zN?U%ymJxv@Pa$uQ~C7t3`ox-+kY(omvI`aK)%{FNA;wZe=wGT=#~VzqVyp}ywBLS zM}ckho5vSn+Yr!~4t9Ep5NJz&ee!ndZT++94?l3!Wl$Z)2?!dkL;&^L6r3aiXFTe| zqx}R2pEo!Kv%)XNckIq%+=q)YN~0i560AG=v!0RmdkrKCmHRL&J51R z6{3hAQob^cJ^soh+$ntz9Z40Vpj>RZqht2!)D7Kbx1~kj+N8nrq|y0iMVb;HKTn^O z`j~M*4_9=+_24fq(vRyfs#8Co)_NP0^`Kl*^(rK$ZoRxdMOKM03NdQ6VcQh6o8>)W zMCq&zF7tMepH!AaX8c0D-d!tbQWTHA77$cd0}X-XaO1)T;Y0aqH#E>-JbDU%pf>7V zqdTyi6&4tVla>3U93zz@-DXD(L$JrIQq(&O!H;+E#vB$A$ zZZ+mcq2C?jnpccz>-fqX4w}N?HxNJ(;F6+qU)SrvqMHEJ+cbKjmG$ZqzOD)f|z zvlfe{Td3JuPc(RI-;qc&ihP^`bDZ)Tc8MT(4NqqU`(@6apiI8ax*@-YVr0Js!E@+F zpqj*5%|gRskg^!r^XrbkEdUUDzyw{Wt{`&|JL(SPy-R_ytf~ak)jkJ;$p+TDb_CG6 zs;xLO^&;o{&5N$BSr)G37i%P31!Yl6SBAe6H7n&Gn}|VON%W}bu(<(r%-34DHC2y{ z!HU_)1q1(*@Bmq>e2vUF5ICUm2x#Pp5bu*^?edSMfG-IVx2G>R@w0$7TsJ`dEd-n@2W(TWQpKnb=9u1yxF?DXzTd0_@X8wNwU6?E+`vEf!&!%X4_tt$y&@zm zaxTTQ8@K-^-e0Nb(UYI9re=67EqEhrAMIlI8G%2s1>}J_1gw?yuVY3$JCu$7DskcqUkls z3lxJ6Hm=T_W>7Wx=13jkz(9{FeNj*I7mFMH_EAsDHFE(hDAkhx@IzH@MR;kHq7MEa zM>gt=l&ki%sDFeu$+7^Zz~#L^Dbi0t!vOI9^FZ5|VJns=5|=n?`Tm7D(11Y;)sfRt z4sNM80i^n`T?X#!+@dalmVQuX!vh~LLm3xA&YIdA$X{v$s_1)o zZ{w)bNAWd`(YH9Oe>f{3dUPq1Vwdt-9(5MMnxHIpH3rzQ^JY&3O?#Qt%ad(;mM$`D zAbPe=Iw!oXB3lkC$G`Q`v+h$Zi2H8*Quj!bI%sUwFN(6+;+h)U$?mjhD(0Q=S0Waw ztf(Je9w|wh2aR48ugK#)AWo6qZpVRpDt7jgdPTro1IWs|wfrtWADs7Xi3A;3q&O`} zN?OLYS{41+6wW2@)DKK8ECZO~U6XM}}*0;8c22bt6{5x)q7$hAMYaL~WN?(N)s*a=rfg+NgcY4u| zX!{vKqN94&7wmr-f5q&E(xU(R%hHnOHTw-z{J&9css%0|oOcZTb^Buv`1_`RUikUyBRii|-M&zNXrbh^2(bUT z=+0(TnAU+%di38LUn_4}d! zmkHicbSF2;XkngT9`+B5{@bsgz6DMmnwjeS%kKa7tv|QwNiHx9?-pt1(?x3LKdI=~ z=@eiA>x@CX`Fc?I|8Ii)^#Fi{(TKSl{x3UT1B9>Eloa~^WrD^>A%C@|4jOCe)d0< z{u`wH52gPG+W$l8zeUOa5s$xxngVQHF9aX-HyT#`LqOln%rMr(QvS%qx`xxb#HZ=p z!rXEiky|)ovI0|jXB}olCZ5SJCq6MldBq*SeCwa&;**BW$N!*`xbgO8z=!8EArnXVEQ695wK6CrMt`c@^ki1 zzEZOLPN`j7pe=fKs=TVa+^FQj-G4sSXiuo}^siSktm9X{d!Od-xC4<;_pW(2*eUFR zA0-A!iDs_h&x@!kW&O-Ff8~mkeM#m1Snfw z!Rq7%q^hHSb5SsFtyhIcP2IE4Bs#^()0_^};S91^(i;)~;?Q+?WteWlH}7y#KX7lk zSi<<8ATG(BroQYnr1-@;Z(beQ&0@mzn84QgcR$nYeY!o_U2-G%vljVX+`_vrY!vj@_>BP#xDy$L$!3 z)!R5b``ou-gKh%yBe1OpK3uSxGkCW~S8LdsP>Rj*RKuEKNoh0h%E^ED?-vS>#Qx3t zfZ^N$2Z#Y<>wlFWmXpSGb~v-e@$y+xZsl0Ynka}9EteD@z>D}}ha-Bnvb?>GoPU|I?HH$WH)y|IvE)~0-;)Zg=df#y(A@k4E(&y!^ z`N9JU{vT&`wR-1iF)p^1Wycej{tYfaFHzRRy16u<=iASz%rR^rq z&P2v5@!wS&GqaTsjU|ZN^AD&R9RuFSvG4Dy=c+B2-%j_AfASsmG(ZlemKn;5oNPa; z$I_1VmX{&=XJd)rEacgH|9q^`6Z>VR-u4e2;-Fie&qqyR?mJy?Ei7<)J!LHidBsaB z-7|$=EOzz@z>3!Z)^Ra$(<0oc+pOv^-2Z`}pihmpmA#^M@*(6HsH|<)>vn~B_6N$Z zPOh!N`?oIIqd%YDgsVg7CJgucc8+?-f9yZa&z)F`Uqub!ACu+HV((aw)|Qj>GXY0E z1*B@euGbb(!97ytBD~m4t2aD^GC#c&51UQz&}~rIhABJhlV`@DKh}XDbFhg3nEkG`&iz?HDug-x+d?a+bHFAQ18Ssv zoSGxP*BRF|c))Zd=skic_y%8!3PHEf#@50%u- zgFfC1>mE+)i1`_KR8mKeTAgfBX1<51?2n!z^XGe`=jqK$#cbp$)IgH-DJmep@5j#1 zHO9ZCot$k2{!dzKzU|pttUtYMO%LpiqZXh?ckTL1ii2e>ZmL%uc~*Btt%oo(>?+7y z*Vt=vn9p(2x60R_NQ|{irc$*{A#*>yG2j0Tru0u2iX>-JK{|(B!g?B!$|B zGsbV_Fn3oKG&4@=8j_^E6`*5tm*$I*8_xY}ApyLf*KDm>*W>c0=62jre#&Ugkilx; zjd6O45`_7xutgT!^lKsr)&EBhv!^n(hiVT=sSf1R$J^6Z^`(m_@ur;(oBz2@z}-=r zt&Zz^j=XWqj2r4r8GSwkQQZAMT1dAj&Cb?n^~`j1G%q#upFJTP%^PyI%!xyMd0I>0fM|NfZs63$xCs53bVUx$d8( zqm)7iUR`nnX?OBqAl_K{-^S(rol=j-o0<(h(AUXxxk;n1hkAiAS1Ssj|6J}>N%jV| z1nLM~ekUV+gi~$+?g9yaQCCE{(Begww_sMSuFg`=@brgdV8~~~Lk~zV+Gun&1JK#k zECvZMU#((~mU79#!?K5f`$awWD;T~%5kL7$`W;ec+5sTGFWm3TCy$jw1}USYcEy03 zsh4>MX`>yNjR4yMG#1}JRLer|M?i>5eq>`$Bf8VQw>*EhXNWP=;p18mDj?-Q9L+f( zObPvM(kNx9_XwzkQ+e=ytfijnh^NAhJEQU?3)Bpt7b}Q8GzCU=m)|Mz4B0s^uS-su z0~rGQ{jUK7<;5z&@3Cf8D>Br3O5Ql?s;NZY2f#0qSKVT}uy9Sk)&&XWjgk;r)alcw zyPxHg$|3RRdG|koDqhnH+5LoaB>&;W}TmE?lW4&4Dm`-U-_NSpy)6+V1oFMJf`#ZMQlf?S^2-Y`)DLq2uWT&Q7vu_e_JO{JcUH#K+ThTJ#) zzwh=#e~B9Iq=HVEz)+1eCKiC}kR!QYP5A5WfU5bV>QHa$=$rR0(y(y%+0nFpjHX6D+>h8=zkucWk~6c#%&e$uvGY!Rvz}h*)eVc zi{h4dI`t&%f792dC@S}C|5(XzBv64rNMM#AuSoFCpZioK1}$m%yK3&Oq103T#xXZ; z2$DW317I;#ITkziz-IebV*%dNvAEm_c0kO`2W~@&$uR=ZGBjZfCAE#A_xjn6r?KB ziwGzkktSUPL`vvI2%!ilUFjlC5Rl%aLui81i-^?FLa(6&Ldk#foU@PkoW0+(KfWLK z7k?2Fa?i|~wXSttYt2ZZs}(y3Esc+6=;H6zO_L`DRc|(vc2@eVRN9BAKIs#cm=}n= zF>L7EohjEx;WvqoVTSfNr#P1*qEnCNoW8Ti$5b}#7ATrO`)zH1y_#2)K|A=oKr$m6 z-%2Xdee#m5S=grVu9?%M5$t5cDL0;cqBQ?A4nNV09w2wL(;t#vJ-AnGVF6Y4e%<(x zGx@Qa$n>jgL6^nbK4+)YSQ9iQZ+I^_9c{Hot_^=_GTL}Kd`q=gbm4>SLKGb%Nd-Sm zLVDvY3wHljhKzlzcZ4!^eUo#KnA@cMR|)#?+ni58k1V7e|tDuttnXkMEa^KjA8?qU12NHqhBSi z>4Y~@pI@D*t*kpj@=0T?q?vbf6l1xI>YOaCFj;r&KTB-AQ6Im3VuIZ@f!x$O4IhBT zCh&oy>Z{^2yu{qaoNNiI)(;jZdl}Ka>zADxF6wpL;||!e_skYm|2<|qI*+Mot%|OL zpA0ZeW46@pXH+NrsM7+`05zEJ@gtVrZ;~(as6*Fp+ycuWZl3er#K3@?<=~rQuB(7Y zzdT(m_!U&(hbUr~ZNdaI5bwq;B>V%CWa9YslE8f*y7Lko|u@&9t*TYdE`69h9drir*(4V4X!h2L?G|1LgVzTNTmS(Z^}BheV%+Y6RWJcNEm zTn>oC$;wp(+%uz>_u15`mbbr*UyNiiC1QPTF2jw2t1>;Tk@egrCmHS1#M6S`VT6=z z)3<}jA5cD)Wd9rRFjv&YK;M`QF7Z@K3 zg585y*x40yYGerK<>evYMtVQf%$-Gb^6{}8O%W@4V%gd`C8p11Y>V&y(CTb}9(K^d z_rGcy=)dS0Z-?3}RYJ!qW38mN6Af~iw_Yp8@Oe*@8qA#co+4o3(lvCH|59kfpPGlM zKVF0InVg{F^W^6CMih1tTUQX8%zMSbv4d*j1><`amA8T~T)C-h0(GrMb#N=f2Iim} zUM8-##Jkxl%*Tt0@j^W!8Q*k*F~%>KJ|WFn4)v-RKZbU=4%^i~oIf#o1XZ2f@IiB< zYliDPCf405orY^CzkKjUeMe$eiuh7NBv3TTrZe$&^jr`}j965)3AvyjPur^ZmG%s-q6<8?>M@1IhN;S&aHZ373$4TU>!M`iD@d!CCRt;m`7`$wNZMaZO zRggU}Xk%~XIMy%>yD}W zprRGc1u}xyaAu~+NM-MwG}fA%;aTsl8qC~^-H*h2Xt`#4Na?x`1nlV6FKZ8-R71-> z+k{dyeWr+gOv@8l-5a)(Hw`;`(^pD5##Yu2aZD_;rbOG8|xH9ck<5L_OFPY@i`CTzv zdSQpQB@kxO~ zPtle9vJRHxewJ{bLzwL>-sQ#0QCItyrik6XmcgRq(V|=Go*h~WscL;+Qb#9F_9|JR zmzz4luK7s3XhczcbdZYm^qg2R)-~SwNN2Z{MZ7zDrsP|&ZMomDmTA`M6R)=X`~N^J+&IKP}WO=}Ev80G{bJyi}8Qx6iCEu)pT zGp^aK_O(T`95t~p+3kot>3`QhJPItTZdoBD&YnhB5=2Fw(K^ks91X_D2_LGHP7?QdzWWU~P8VOGSQAl%@}2r~YzrzJ>2(hA%?O9y(4BM|;7Ct2|{W z+;L2nRW6KW&&|ML4yvT?J_qO#+3UPCK1nwdSlTr>~pPP+gf|(*T=gCN27BC$UX(%QBG}_ zr95FwE54l+gZpCineu5+V8zN(^Eq4Hq)+*PH+XcZ_vY;@7{c?=_cC?*zkUd}4H+|1 zl)wFxIHuK=LA$v`ax&KtXL`wkj3V?*s!TD@#`T5YUIc_9tD@9mi(9(+lU3{rrU!(R zn?ZMN4+@rgefG*S;K3&>*ew?1J7wM*7{(<`tDho>{Oqu>lXILOG>kX>>B6K08y+fB zIBav`Ev7H5m|!s|Za9h?IQX^a!#Gfd1WwGlAK}*9G}RV%Tsz28U|t*__~JJABrR;fEUO+H z(xW+<$L)W9mSUD>#tf2UMls(Mr5@Qg9Lzgycp+-NTkd+dEJiau6-UAr+B6>8*(g|zD2L;K@d$A4>3OIS`*K{0A`mRn{MdN4a&%u zKQdlo-w>fe&EN0T#xI$!PclX50>m5jOvHt6aX`}K0#zvqPa#MsY0>rO$lsgB`KE)8 z1wj)M=qiKmHoq*E*w6rTw?{J1oPZl!p#7X@7a>0vW+5l@5Cw|E-KcFw_!i?`ZRwqK ziiyV&XO9)oXrB#qTOU^u!uDsti1(sjj+BxyMfdIk;Y@mP7X-RuVE$a$m}1KYcGnn| zYRq`$1tSGBx~e_aN^(U%iFtY19Gwc{i|WzXu-&$GKhEeB*S84OBzJ%Gx3Afl2T~O1 z!Z1z2!VchYdIEL#NeDxub#SZFQU4(e_co+w#b&Cy7izy-|6`u) z_sFGrea%u9syJBEc1JSdunu_(as%QuHl|>LcGL3)he(8af}~_TUn;486a8T!+;BddzTM`mjt|9P@qz%3-dZ++$Saoq8B zdDmbEt+8cxfJqXb;F2tqob-;|h44qv+px8}?{{S+STHVrj_u@k$N4ee_V=yvF^_#K zX0K6rep}2~HD^4w^ckDSs~m#F!q%Nrxvf4p2FYb0c!uRhao|SLd{z)c80eTpED_`r zYMi=C8CljN#!VZ46T9vXuXWw_Ro6+qnkH@cmcq`hKPbX6Sn91T%NPtK)>5Dzf4vXc zXZco&QDJ9^5*O%&q34^7)}7+pKCi>DhmhPsLrjbx_zZ(=64{I>vK!AcjFhjAKe&VM zsG09J2utB6xVS%3oEEO`8LhgCJ5cnu5zp&R3B`IzfZ5yjBFZQ8!-*^9hZ?^zi?0mC zk3ezHcFDP=qXe!D|K#+B;AK@2qIAP+k*yoM+Ix}@sSLC=8RK%8^jy#ew||hI5z~jh zYqp3t`ngnBR5cT#3X70oxl|PCI29D zU{-44YvroxQc3QG)${LF84YJF<5dIfFZKXv<20XWWq;lTup>wuTal%wCCf-#Zg#`I z4saPX@85&gnBUXkCrXzyG5dLf^!@grsVB*8P#~K2Ht77R>EfUf(WtP$T2+!M9dUQ0 zk91g>rM*ZOY-c~XK}00%Xx2bY8zx@w)=C_e+Y9SS``IpVY`5?I!DHqP=>D8hEX+&w zsXd$tuOyTc~}jYwY={N8A$;j)Lcg?LDP`O!tO^j<0U>UbJ|4k8Sr`WqXNtwYtgi z;f@_)D65|akou!i5je=WFONSFeLR$Uv*neJnTPu6YtyLdFW_sNOK6+Rwon|dU zmu;@c8CoqlSvq8l&le?W6RyLtCp$Q&!Ta%WtdW%Bp2Fx+o1$dg z7H}*2Tx+6cFv6AIgSDvy54C$Ik zmejYFcJdnJ)A!pzJ(fRbhw!u7LwvTA#NQ9~x)JVoBP+)2JNZ_6w$~VE+P-t9GG$-6 zlBXk*W|wfsMn|!C<>Be^QPVU3V-jf0%~}1{Np45jx}obD*iYY{=|}CC3*9h&|B;*0 z5O%z4y*^&ees7JBuWHJFFD2*)apybOyin?mm`?#Ic-TCXN!N%Y<;OI20A_2u!znvQaI#;^Q$H`$-Z!Y%D5Hch{~e|j%7q;zpeD$i(S*-YZq zk3yg?C(87#luw!E;`d(fy*{vZ$Uhj#ZLBT2X~eRi5YB-^tg`o1Fxo1b+6iyk!XaZ z0B`7e60i64&CUk6%8opbmR}1C@TT<2(L9~Da>W9=eb#%j&U1F_{af#LkkU@-)?rcc zB_>qJJ~;|iMHZ+_ixMqVzHVpp4QEQi1?i*B818L-Bp*ua8sKyvJjXP~xcW7@T8xy7;%E=J;Ka7s$_;XegKwGx% zW?AZSKDcYs$xvhTV~+QF^}@iQx^(g{_%SlxL=A_oN8QHkIwzBiu^`|oWBMa~9^1kw zQ#`OZ9(-p>9VRAF`vI+zBwUa%Z8)jmYt?`mD#{9G@eyH$h?I8Ui><>f=V|v`sqIdc zhMU8W8}er9!qeITkh04$ug9JoW}8QdW?3_hQ2W_k%pvHN*jCZx1!5j7yXkdycodEs-`FBm3OX!@Iv4`DQX?hz z^o;82|NE}N2miR77w;Sy0UkL?&^5ZSfIod)DWL{$irc7lY#RZWVj}r*0LxLD#;Pv6 zQ?l#Nr4HYz9`Owoda9##*pXt3;A&T^v3)f%*I3J096j#LsB<%C;%MyL7B4CH!%bs( z`~s3yut%3jP4@2v(8U}Bp8+^|mq#_rxp|k@g9-9X^6U3T9Y^-|0p~7KQrZai$l#QF z$yZus?JIq^W)i1aXyDJqF=0t&$s*V=)#6tDG% zCP2}k8M|5@&6(oyv58dai9G%qNij;sbBI)j?iU1pJfNj6IkdjjTERHcfkOqKk{}JD zPyo)C7d6Sw6aombgXDu%>zz%XkZXk{TEulpT=TMjzThK zz2R_u2e<~|iI*z{eZHqj)BS`=_WtCpInM!tyr{Ut$F2 zXXQ^x#P_obBB{r#Rx5R-Gfixf67S*+oxZp3UE7}TR;G~Hl+k42tz9jhsaf}=YCtH?(;Qu+3rdB^Hy>>8Ph>kkgI+Ld-~VZ&n~m$-C>AZ z-e+;4Lj7e)LiRQI$qJm7o92~)v|>!b>Nz+dJ%9S^zxe!V;AUR_yYb5Upw?(=zi{DE zF0=7>qzXLAaSR;>#`7qLC&{UR{dDD~lK{lpQU=TMb2FL287) zbJc%XI?hB)A5rFDEu?R}d&c^=H3?(!1G~Oq-GV1_(q4Vn2rtuhsqm31P%A+QD?qdgBHpN)jUcMDykP6x zSCC)aeExIYauXgg6F>hf-i-6f!NT49HhBdVN-Kr6_5rmQ{+LW~_w7|bP0lpDrksVe zt$5sj|HnQ!Vj4U7;D%_Qi)+a}A5WU;8lniE1e2_V z6fa)M?Jgl#`(xwcT|5K-7$mpJfzrr#o74Ay{^eB~ztMnopDXJlJmqA-OPYti(4U>n zsHL@M+ue8757%oU;t+Cl-rj3z)HgQ9qumvU=|DP;IDfuQ+^#GKEO~6QfiYjjucy`p zUw*z=vSPId(^x=WGy%gNGmg6~hBdkl8x2o60u!{c(P&X(!mY?4Ybejarnh)-B}kcF zjrs2<2$(A*k6q=B5MQqfGSxAG?y^qCY}n6T+3-+&;$h|^G9^Y*~1aZeyHn_ z-XX^y<1-~A*{KQJ&ns$pj{}Ac<}M4#?pdnBBbmG()V*hD-h3Lf>P<0P=sBB5%ee*P8Q(h1&+Zr@&yyKbFsR{55WfGj&tSg2Cas& z@17eiEF6`O4?0ck z^|UjZ%xQvgN!?mmuhf@XdNyxBY^daup_)ngGNl2>Oup+UA_b!So0>zQ)--T+BE_^w zHzAyL!7p_tXZ-CLc^md;b^y(G!w4r-w7(e6AD4yxa_YQAqvEp}z>ON1PA3n`ct+cv-yqy}~>}*zQR>*}4m3FbRY;f-8Ka%{2VZ&m1pF zB0}Il-D}X3UZgFgVb>Dw^gPcL{F}U#$nyTp_Mrx&9L*ZYh0r#qXfOos3bPNYl zt9AFCVHNIz@<+=qp#c(gN8SJ@epO<~mxv-&dU^8xoB_CeTC}Vxyaez3F;1W&ZzDR` z1~9=x4Di~Qb(Boc;)lI31^|;4O21;7*|<#78hTiMu6k}wetrF)II)lCeqjBR7k};h z{9&~+__Gg8DLY?h_)0BhM&C5=wnZAbPkc$RsP7gYyI2h~W#Xz#k4!=7oqM9mI&wrKv?5y8| zKI}dVmQ8IXVs2t@43c_5VzaRvMCebIKp-XOR{bG4B`-TAlzN~da0m|zsHqszF}UQ4 zmqK426HcsmYsxwG(D0zYVmKA^BYPBMjl`1+$cPZTne5ocP*8VCL6Dw`viD{a*O>r6 z*Pr^F1@IG0pdTT31o&`n%8=@x!3Q`gTD>uW$yW?o3od3yQ62>ftRg&g9!^_7lsT+B6R6j8T) zB{@hJSv1mxxCu|LA{VSyF!|G1sFfNvqO_#MjGWiQWo)mCaXrvM&tX=hNK z&+;{VL2~1vt!|&1UfY$x6+WM>(5Fji%M<;34LsUp9X=hy$fMQARL3}!zvNHK`@rO& zLpOwB4(Tw90pwidU`pgf))xb;HWfD`qz+h)_T>8-?V&ZNgo73w=p8i+z7kT?c%BI< z7=OqPwIyw&J#&qoM#K26<%U@jVc3(7yw_c+($bP3P<%xICr2ks+b&P5pQ(2(ptSQm z4YKA{Hc;?{fPRXwss8dEI5GoUgJxl79Fz%NqZiY+@O9}3I3&4;17F9u?BHJd$eZF1n7=|AGS1+qCmaY4A?)KTOk;*P z5MbSY#a)HFu%Ls)D4!cbR=BFSUJWOcXz^NupIaqS|!_G zQow$f00>cWUg)_}>7f!wmp)}xi(gS?Y7MI(^}sA;58}MZtMsM`cf^G2qjTE;dviC3 z1PgSD0!e%DZo^i1L?@GHxFBq_+?q-TX=HgTnX%o(K`1X=({IX24TmFa!F>mLYgv`}^Y7JwmXS+kXMWhJQ z(?k0&gL%vfkl5o6yTP0PgTioT6LuXh&ZjpJI-LqTIT-((w~dOtIB<=UR{z=Cns$Mk8mF!8zaX7fEC`BPcNSDDPlLSc{DOqP+^)t4(mvsWuP%Fo z*!Q6GR;A&D&@nyRkF#@ugl&F}_@q1<=r|DT>(*oG&O|~*4ws}0MpFk18EPrb-Q~N^-$nRW*1uRnju#}* z$y271>{S*jPiJ%+x|6}8ipwfzMhux>E~dKxn7N>q@@Mve`|7NVei)Mut(!|6I)4~- zRO55X1aWu!m%!1|fV8tXya~vRQS;qN@i@}P1?<%8F{ym@JC8sf6^qM89x>e=c@|v` zESn=HOWSF+q&>?j6?%>WKpv}6FQjeKAG49e3c6VivFa? z?3wvm+V$FUOBjRD0FFEB81tW^GJlT~Ij(fvX1wvgP0xeszkOAm@x0e*>*2pdVtCwq zf&BZ2k{_4I?ZqCXG2(N{^oq=eWd)s?cy-Aq@yl^4_8`@9NfVz<&J;c2t`4MCtU&R8 z!``UPQi6HJL!6S+*nIoyAKz+XDPJ!g);p5P6IBdER&2Jub?lOgPX(d{vHrQn-hGs&xyr?@|in0&kn_bR(eV< z>I5=ET+X_a*z3))R?^OFRM4|^wB4JnUuJn}%(qzbHR~T+7B@=~$1ZZp@C*fzd24nG z%yR#J1OE=;5tZnU{%vd4DnMXlfoOUc03OK#pyyg6V|CSVbn*Zoq2B@{(Ot#E0^aHq za9>x``L(a}C!W(_sQ|mMd?_m_3nYCa&!>Q5NI9!hren| z@HLkTAy0s(=SaQ;j+j_Rz+|AoSoB8{pT0D;MT84WJ&qYJ^lL;{^pVRKZD4{|G8|q z_1~Q)F}5^3S*s5_?EmJN6Mo=ms2?LXGynRjPmfs!Kbfk}H%&+l^X^|h^`B!_d4Y4O z%d2-B|F$dt)ff8pkUW>^W8j4TyJP0K11y8Xb??2%ziApWR$$PJVbKl$>Jk1vdC~8I zWkid4sebr3O(RVR4BDmbp~=5H=7*}L(+`uy{;*ZQ8xN+C2SsX4kCUGLvyt&T5^}V7 zbj^hF3Ob&FZue0-ob^xtexB`b-s4|xkpvN(3v*nBmYp6|+pEUQd4+-;)0cBj|M-8V zs*#a!-6oTtq0Kx6Fj;M{mIRR`RrpOYolZ17f1kI1G5Y7%r_K|GtGJv7L5&Y+`kr`a zmi2x+G+vE| z-~&oLVoLvV+W!2GELvcESvo#RPyX2w{kawX8jcJ*_`uDQ#s5tS|M`diG2sbMa69zL zf!&M06F~p!31h(ra#}xT{L|(8-vc*&0d}pZsyHbDK^jQ4{K$#?yKNnEsgrhYCUC(dTHuQIznD3giUEp-2cD=(=B zmABS_?Uj2Qfy?3602?K5XxW>R%d0WC4VM`mX@cwzPTJsS{+XC%tXM6FrSVs-U2G`kr6JebX0$WSy=+? zyF5<+F_}KtT%<1M3A3MMa6YF(gv0qkhPTO2W3$DmMnHx>{21J_S!?jnhH_!>LMVj%K%9!7O=$wETwFjs5nV5;mVI>0&98rW*8L1r_gMhB@Pkm^n&-9cA&2zW zw}=(h2Zbl+a z+8WQ)zqG+Q0Q~>oqn{KcvpQL04z?{hD^}x5?$6vzO=)LL&HF%^DKEcX%y-+8AX$pB z#}YtjxC8%7v81O3TaQdxjh^Ckunfb)vpl;2H0m!=n)xPxx&P{f?V3{L=h3tKG8CeJ z$TU*>lHMZll1`5N%6pr_&&dm%*(onyl!Q0gRZhf-dl|F(UQ_7uy)}V)gnxy`Gzf8) z&QOEvI*xXYNF6k{A{4XU79)LV(sKU{JF|gLK8|ntvE0qo4o&E2%=wD^OS}dp5l?Og z95X*&cu^}Rl!6;)*IcCj@sI#>J~#YE?x<+oFc#NgP`8>M%&Y`7MYWdDBnJGlQL3QU zZbEjc@lOAypFrUvMW@zfsk#&NY@E}d_?^Rz()_+6P`T;@+1GkF?$@xLIA2vhHdbADjK zIU<)O=Kd-mY(;Q&fJwOMNg?+^|9pKia2aYj+Q|&PC-fm*TkCA*gc_eN_Ug*FR8@DV z3w_LA?hD6~Wa}HwoTNo`&nR4x)jKXoOqKoW=a3&AkU3(YN1u6HsH^>TkTg!;06GB3 z))JiCt4`A+X%zT4^|z$vjO<^9B{5oROKjyav_J|i2lY!?+B*8|1)$Dn2@vl*aR#lM zzMDzkK|7&|L_n%WLb1!q*yLWtQzSv0CUoWv=RiGr(x9s^=RC3e<>^=Xz<+#6bZBMU zi!lTqIz-=zjJGt>I@VOL1nf^baJ8yK3w0`4Zd|-`cZ+G(BCgQUHoWhJE5S@PD6za) zR1XT8mc#D+B8b-aCS&SJ6w2OgaieOr07Y6iEZLi~m9BMm!9nX}SwcyN?VT{$sS{8# zpv_+Li7`*5_?hK5al}E7$gPOhbbX)FFo7lWUHo57YoG~FPV1*D9^6sjn@dcKG4QdW zRhm*aXu6(z0f}=ES8lR5x>GYOm_l6DO09em`QD?Lj(5XqQ&o3Wk;q8hf#cN2A3{)MzRLG1qu5L-ao(< zMi?$6<9QCqN%ovgDUYm6^=5;vS{yYJP`GFlv3049)ou2^Embs-H%56E2RP>G$M)Md z-`q1c230R1iMi!N4j&}F+zf&|4QIRo|Iau25*3peU%oqM#p&uNc;7&d=>f$(ua+*Y z=FjhBy&))vH?Z>ha!>w`yh5F~V`QtbYP}g3bcR-(d^9S)X*DEzd)?^FOda{82}`Q4 zjNdRSD{ijW9&e#gTsGTbm?9BET?y*8q+RF@PW?)2kpGQfnRbo9!dKAfPLdF;A$r?> zw6{)@<4QLf!wt?=*YNveCK1Z;HTjc*r=O_x`se%Zrqze;y?IG+H*=ix`|SORank_u z^Vv?L-yj{#_l)PDM9Yl@m6K2Eq({AvV&TM9$N}Y%*PGjr^Z9QK%K3h9jv7rO!Z(dR z9^ZdEksleqAblK)Q!b`2?YwRN#acAhz1-!2ZvSZa{jl=w>nb{gpU-GA$>6N%IgQlW zN*asUil|a!ZCX#~9}GQ7Lk}BvccA+^8mWtA195$AsDc%3F}n=Zrq@zSxK;Jqr-=xu zht(S-XrOzP#d-U%ppwbHk3~9kMoz>99_jli4(QH}$%ypZ5152+*srH<3tEj64XIz} z0eh0(80UT=lk`HT-S3WyZn>rm5!*;ecZAAUOK3KIVq*RKv1zt-kIjg3nG!%8uiy-IB9eS z1A5OP0%ziC0~LvU{tA;+7cuf*rI3!{sdL-_EPsmfRcl!3?I-hRDb1 zWL;QjPP^$}8g=P$uH{;K@rcjiT4+<(k$%tTXdL>%tU+K&xH?DF+RS^8)#8>5 z7Va`VRJV`v^-mH^pg2MC?8XUi0p!dbW82-_IZJ(KjdvcH^$?i{HO;B)^ zctLb7s(GIk-69$WYUB`^xwoL0gUMKgR)hT|_oD$07-;8yzW-7)y6nz42SWJ>LW^!oQ*c?+I`PS0@ z`Z*{pvtR6$XK1OKU696lQWbf)=dl?;<>4_qrZPITqe3zHBt&-Fh-WdiO~frBT(jD) zmaG`_*6<3c4TOT&tg-Z(+AE}EF=39oB9r6&f}>bDE9DTNy#4%iUme;9f1M7WGWbT6ru-Z+%w0UD6_1OW zudV@zX~3ATAnVMDfqeCR#h*)=+fytizKSc-LvgJ-gUlEWGEo-{lG-@78lBC7H@#;(6lN4 z5cJl;o`08&cQW+1VRJPMMb1lHM5J@%oQ%S2(jfH zu~|H#Mm8s`I*yrL?6-?#)FC#mCI}`a zIy8IuR-tr1{aCv`*?n|`Yh3L1@WrGoP^|rsCBE{QD*(K~DKPzvCqwhp+TkR+p(=1=5ht~MP>SXb8Q6u!r;nu z1=A2}ylZ3$b3tnK&-yJNpF_MJ_c#+b$9Zts|LLojV=6BXCg;pbl$0AnD0s{$50sda zzDiSMr*1Dn=)E+hZ_tn&b-3bsV%__t;t@ic2=R`-enpn#*Ip#M>{#PIdln$H2Wmdq z|19>A?7}SGel)g;1?wHZep9xRfg>>2k+5m4eH&aECPi2bX0O)nCMMU`4U`sekr-e z>)`xdv+_8vv`CsZf-0@O-0NZD)ry|h>@-6xHkUZpcL&$YNyiTBsnY7hP>N7KtlLMH z04j^S{&-I&)wCiHdghOLM;XXsYu_4=<^XG_sx0BDJgyj{Y8M&c%pmU`vqRk()s8?S z0=8_WE&MiawAGnOG>R{2_0e9VZ}M3+XHh27&&?LZ|FmzTPB)RSb7ysi3b>YV>7iW`rCe-ad)hqNbp zI)Zi=VbT{@*SWq>kzK;|jCJS_@t^y8_q@@}#V(CT??pM5n{j0dZ~a&cqDP7a%z3RC zybajNS}0Me`ri&zp2dl?V>Pp;i7j+QvF)r^sC0>1?j5N5oPes|oFvEB)X^hIvY&UN zWn&zdNv5xI)g+X}a#LtD*AlAbp!emC--M?i}9o+t83 z%ryN)`5Q{2&)zr_ea=Wuhni&>l7u`ZBctDZc9wwbEWJc;pnk)TOJx3fO>8VNpX~4d z>e|1_`1F3QoQL$$G)3qo23Ffq@~{+-y9D{*)Pl$vowWq+#LtXf^c3mcZw|@UX(|oh zFrT2zEA5!ANdwu>pBeq>?R6$*pG)i^LB}o2Z^Byq&6nQ@s#MR`(WOgXm7<5wb%>G? zJg=?l9ca+rN?*6FoN$weR)c!1N5BDskY@y-qH7_ zR4?zZhkt4$F;n12oFh7rdk1qG^5D1cdzLX zGOu208SCStpHqlzRMbx~Ml)V~#QV^_+?}UMJ!x>w)@)`#r2)VM+RCTw_%W*O%wD!a z8@DEi^@YEo-PTBVFMfSi-CY!N-A>J$^V=XwNh5zQiqtiFuXG%Kp#{IguFOriIq~(0 zUR~`_$*^0tcEaRJQs)Rh%SF-sWYyk>E^{9XT)wS!~XM_BntXFzZ+UTckFa_nuQ0W|I zK&bp>AI6-+gn6d29yu^QlNO*Db_RjM19X-(ZO(@aoYwYbdI{-w&YcT1GIV!-)_48Y zrzz)Iym5VwIJ8r>a!UC-nKyDM*L*#q4y-(8FWq?Zoyj5*}_I zjWhhOgXY@kjvFe6w#iT#8U;_@UHSSjztxv@W-eO2&|Kk2e@`;TYxN;hfK|cdNUtPO zEeIIRtm|AUaviH}f>+2sBE1AsL8UY~K{8j0le|x>ko2BG+cdKhTl3e~=|^hIrbB|W zo)RKfK@39X(?MwuQiZJ49GS61-4|ys#@sizkf7XBI7q3K=YsW!t>jl3F=1GY#!^6bzi`)QK*RC(-164mg6lxcfuv#^5FUr z|9&VdRW%aHhi^R_Gmz`S@2Ori$yU~Q2LY$ZSh)WRZ?FxA!E`C%79uU z;X{&f&E4U|o1Hf=9OzKfM?LcOcwLN*o&?(g`jWo4@k)qkKPYDAAA+!Xwwu}-aIyN1uB58|%!_mF!y!5kx= z-dNVCDv_kzl_dPCFU2N3o)>Xkky_4IZFZ(iG=u!RZg|t{d_%WGJ3ds6*N8>@C8Qu^ z!?b%(F2GneE5y9g-dt07QTmIG2`X0Q$=5`;8<-M6`8^5H)!Ds=LKzC*Ok=w5b)T^x zayUZyrYk-EL~qYyY|wZ#xx(*)AMt1hu19JKfolDj z)uqGeS=|;cMRQy@QfB2mQnE9uusa&et!T^BVFzDx6OA}FMn9o#c1T8>|4L+}m!8xbVLr6vbWMhg31Pw;T51A($BAwM%SNGuSN{1* z8iZ|5ST2{RS+H0WqD&Ot#<)6HpaWw$o-8vnfwnd^5g`|{?Fj<~!QN#EN7v@-#9gjy zodI4FiYcvKH6{Et-)7rPsX{*7G>f}oapnehDX_+_9a46dkcHAxj+s&WGvx?Dwaeyh zw>rj*R~SQx<1U1kD%N!piDz2(sq_M_@%_y81ai!`TxLx;s#rhvYUpzx_ayJ*uM{v(pVCzyUV4?l7;=_o$)da3Z4}c*@oW~?I!MW$8C20b5NP0Oudi^o|ez_F4|4zvV36kWPh5o|l8S zy!$KyoF;6oca6v5Ng``5dY)4zBlxI>T(hlSogYr_y1srV_2pWm>vjXM82jdpVLn&T z-+pK~2-gXENPm3i(EOY`X0U}L*{4%)D4XVcIJ;(4{NZ}?D@~+T{%FpAMC_phQY1{i zdaZJTx4i_hV%&KzKjNOWfKK;~_Ok@#Q8(pstM2CbJbkqQLQvLFV3t06lHf=rSRw}B_xWPpygE}qwd_s>qK+1 zo;H>8qm!$>n%;Ask1vQ@eKX}yX4ie#d|duq@#%)QxQS4*JC>dO3nABI;;Qc_ z$$B+CI$C?C5wNqBQpXchSxqACct8CTpaWPd(z58(4l4dUs&mh34eyQ5<~1GoibI+dI#I!KWX~(pEE+Yqx@|q*=S^`nusv zeuT)(>!)8>br?cXAGTNLyrb+MXG5!;>e@bz?+x0=&)$8#V%&j${40mA+{Du$w*AIk z-fnnoHA_#19Z#*-El}L3hSPF-yzgkAf{a=p&Xh@;TR*?Zcd&Y*);||OToA+cDxNz7 zb%G(i%tfEa_g0vGhYn4zYOJ5eKFc zp44N{D1*nNLfr4Clz3x6S~s?O=MH+)#CdW1Iv;$kgBkIPG9`nYhtyN!%jm-q6VBlR zRGpCz^-0Z2VbUZJ*ePnSPUG)~LQCPOJ9abR(1ph$@YyRHIXAvP-6dRRgIb5(f2t#h zAg(~l{M0iKpLqbw&}Fx!l1YNq@3oH-8q`kM)M}BMGO6+7KmRJCvv5=KtQ$BhLt(^o zvB>Kn?u+sd+zAR#J9$QFN3(Z_P2l^pM)cG!Hk4!Pj6*goyy~-hF=IYsYZ5*IVjG`$ z=AiNomB~B0Ee;=~&~NV!QO-Fmj7mTpU{iaY}C zX<_G;FT7FexYnn)R-V6#Gnn40p|bQZqpU{1kX9o^dVxea?1B&@xol3JR=q^8y{}G?3TCh70y$1H zk_3S($o=VH7JGDV!}@}2c9HLUiE*3S!Ru85j+S28-gzMcp5H0Yj;^4~wW+@?fNEd? zyYha8z!GEn1AbEIMm?GrBTs+-jsZh1lUtG9V>qI6N6cwS2f&fC?@4OM%%y50MjnAKHb|u`Ss)hp2B|~3 zz^BIZoo^_R@*_}63yDbL1H_W4jVQ0Jek0k-j(J?mt!2-L#6r-vQ(9Sbyrfudd;5C6 zVleLbsXMcHmI5ZAJ?u+;KifCZcwBCJdHCRM{r_X{EyJq%+WlV%DN#VBq(xxSrR1Wd z8>G9WL_oS*0qG8Dq>=6hDOr?&(hW;WIu^|t>v{Ix&u^dezs{TU_PpWp@)8!#Imejy zxbN@x^VKKCUjR+gcQpq`R}k@;khXMU55fM3W#rKP!feekv!BL3sMIjCLGfZ7q2Y_U zGWq#&)3y*23o-0|Pm=NCbCs6x@-PhjS9Dd3-Rwu#rQWJgqe2sqgj`Ne{PeQ6jwB#E z#!dsnsz&^X=jA+K{aRYc*w(jeG2eLC1(&I2zUns^a0IZH49BacZ@APYpFLML%G?Vk zKHcOf(e8 zOKQ>u?$xU+gw!IJ=w&z6Z6z0Mcbl$8THH8_!&qstI@zm+)QD5hh2^QIB_8BIUe4Vh0z__?KSQCs9Sk zwOaB%9ZjqGK^kMXM59D*&z%9_ zrvUK7HnzY#Ocp>9iqlqfqwIv4Up;+cE&_RPT0D2uW>>KRyairJ({x2fbgwKsEJA6G zGimF`LoCy*%M$mTU(x29g9uF3zGJZo!(%3kkKiY-S)cu#sk5q16!SR!SoK!d>o7DO zIYh2Y;h8%o@hyAW1zAJV6P}aTvzr(>-KONYfT29^E6U{n4pA}Aey+|n)`lftuieC5 znBm{GVYKd9sfqgWsOONx(g@7P1~B(@B;o#y=zB*!Y6<|tO9!`?|W3p}6Ug65$**XH>{V-$XD-?Pb?_M=7iY3RZNfD~SrJb5BN3*2t zB}VnaB6B>N(U15!8{DkDS)7CYYDHkFuXx+H@l%(kzMChx^UUT++rs5wWF?11m_06> z-l&;Oyz7VkwB*v`#gh)N#Hzp1r_UI&(sa=`qmSkwc^WMQzIEC~qU=S*DGwiB|5{0SxSVH3!%GI5VKSDDusmj1`wq{l+Cbv;X9__D{YV4l`NAE^B=Gu)%)pBh^Iz-C*bKgr$2SLXzquPmK!5@S0jlx%IN-Wf0K;+B z|GD8nm@U)0je?wx%>r{14*8I_8T&y9r6&Y970r67(8O^uY9e0rBVF}AS943{D=h$0 zF%GI)J=~X-3OmxmN3o{CFVPAi-$;5!EuSF)zFT!uhNVIx3Jg7|C?*)nw_91ajGWYz zHB>8|uehC5u@VvqSXeudmgs>MnP)n=DVD|!r;~b9y8(is&NXi#SJBT~NF(O&I<%GWfMzL)$_8UmpVXkLQ*txg1Oz-q;3 z0NB}E0D=HHBFx7^%(71LhjQHlb(cVn`fH9_nu_ViXz+(MOFEODNa++3OH9!5-7MU1 z=oZXHzT)JgZy6iujuUZdD$ri5@&}`aoacV)`5Am;Kzbca2J3f)vCVelN4zrSKl;!u z^U3>dy`M)g`4mZv3Z5!8g~xjA7Pvgj^%J6u5{pmRw;|@se``i5&yOZQdip(9Z7gHOQrb= zd#j-hsOug8m$Y_1S~mlX?s_>eH;pHHANMBN`1_E@B{Sr~1<_H)b7hq{wZbB0{=rb2 z3z-y?#^YN=M~4jYXgz-nZpgX6+eR0n14$jOin+!Fw9+L9}j|LsqoWZCzv zb;^#>3*j-Xd_X<~u-IOE$dUij_uBnNv+MqbRlu!!H|N?GkJy$5Clep!$;6lP3+g{B zmzQ+@Tn{D3128GI^^TIdY;Oe!60BJ^B26R3-e45zXtv3bD8PNXnQ$+wexnANUUTww z8?iz7v~ki=$T9R@n~FMIl7*RMns>In`5J|q)p8RcyeDosCnXso3Y&M7Q>TzQ**)mz;+&}D-D4{ zOUj{pTk0FfF~H7N?iuR;+~0JabgS59fE{TQ1aQ5+=Ktde&})RHLOCDSy+p5`?(*DT zTC=NszuVU8VA_@jRg^ZPJS9VfBL@kVcnjE$1P`@{W`B6UN;>lSt_{>jIF=FB9McbS zqJJQYGjOZl*LrD*AUIJw{i#3Rihpx`YDa#UTru>C;J#0k$O4~rz8(T@jYCR`-=F_g0#7E9AI>^@&zOM5;VMJ?2;25ol3_o+&ceP?$y9Rk^H zrLKcb5+B^+N3cm<2mTWq<~emn(G+*$}8e8Y4ue7^Z~-y2^ilS7Bs&uagAK1SbNS|7lNtLhl~dbjFt%vG3nOew@Tgh20qe0bK6fr zA4t$AN)S@#89;h>?36hSKG?CbZ12-j>)yu3ya&$G_W!tY`9h;zKalGJZhMJNMMAKO#g?*Kx{{Zw6M*nPpazAnD_wXxy z4&PGU0SqM;C&jE6_IRb=8M2ByAgM4^1OT&CSa*E=+u^++e>G4&3R%EUSkW*?>&8k@ zq=CjGXT;nqUzJtZsPvDAzn1+QY`?9L@cWwbFyE)=fM!oC(R@}?lfAekc}0Xh=)&W+ z-4`ZBY2lk0VkEr(%jlMTX;J3M-f%rUcN8T##uZNLr*YV23+f0}i&YYb4H7$tp?&y< z$Frm3d1Z!;3opmT;mqNiljB8;l@KpV9(aZT**E}99J2JwIFTQF!H=PoW!D?GM^4`d zD~_FJvB%>O_D6_#yV-}AJn(jxy^8JDIi8X%Ve)-E9*1vXPwYG{kB=>GoeKBKhPX&ZI@fSQYkqg z4!Ug%9v!mz{?_$n@KX)BSi^3+vw7{jAh)Vq^coGFsG9h$>yq<_xe;m=DWBwpa-y8y zG?c84N6u+;?$SScvXxBQG!&5!+$_U?1{pZSCvQ$u)9>Wzj=>ddbpDd{37 zWj0&qagd9vCRHS#05{|tH_A4Y$~?RDAyc0r zdCQ-&SxKKO!ZT(~d4@PvTmYi^2XyQ=O#}1^{O$JM8&-H6Y@2mTT2))Mk=ylnTBqfQ zjynwtzF&_{AVp+SgIMEs(w$SN28{=J$Z`k?F|%l5gSE}=|I ztySlXr`>)kpfB&%!0hh)WdHL!5isFv-W@!Q>`^J9>iY2kKR7suiR>oNd^$66pb{>_ zl(0S2m-UTn(!6|vr({leUgD25n7?VvZ?$NYNvOcxRP0*0mrN~HR-Q!xY)=ywxDx9y zWi{IWwdW^bakS9CFbaD)e`L1TK#Ud+W%<{5j;=FeEyi^hm3u8^EE@Ot@3BmDf3ZCE zU2q-qRMV1Dhub$Cg22a;|FpyUqti1WUCoy5Uzq+`&B!ds9U5Q(*OHO;YNgxIru}{i@)7!7+y3cj?st)O3?^ ze4#ptMvJ=gt$sm zbW%#oo8MIx+P7XI8<0(T9_Pov+ZsV1fJDShTe>0rzov$lS)A$ynf7AObOCg_s& zxqM@f6@fbDBYvm*GMGQfU$|mu5O{zNLwF)4pkL@Wa1^2D&8ZNOoFM)+l>1&pPaJ`X zOl_GT00M#kGRAVivG~ro;nm)9blPZvjEM{Xmy{^#m- zu0LOn{xOi4RUq|0-|*l674Q_S17gmAwY%^P77O3Z9X&P;$ms|>`; zx9aZwKej<>Wg{JZggeUgn1l|M+j2xf&$dqE3uxkl{Dp8S#_f3e@}05IibDHoCl9`YafdmEopSUZ=3Rv#}0MHtcv?Qk?6jC0QUJCa} zH-A2HAJkin`_5qlrW#q}0CQ-Vg=AdUE(f;l3VVW@pI)=L^Bxkzv)`z1s_p_TPfu^% z!2V-u@qq!a=F1>&$HlNxD>!?LiyMRAP$`_HT4olsm?ywwB?-hzb>J$_NBpoNsAP%M z^d;5%*XCfQoZVnVv)lbUFIn3iq1gv!AkRCM}FBw@ekIZABx*qhE^%oR_gP5818McL8yM7WuJ7R0XUt61vT z9xU!gbW+1iE$#nBf(bZ7A}54seg5}SGZXdCXVIy4E@5Kk0o=2Hd(OzvS~2*g(D#6f z+!+9co^lf*`;?rXgTEf00X)8?DucGGTgs=hC#FPq9Q`#+b`bt)-yrx_p(m-GRu)4u z)E9K>*y`mOH$WipK>*UaLo|ZKMVX%Y>6Faxfx)FSGKa8j(qIFF{vr}tAzzqxUjW$W z>~cZ(CIJb&zKnPlY2%uG8?QKye6b9!2~Pxf7M-|Y9;WqF|0>{cZ=ppEf`n7F$tWY& zivTqs#$d*r{BLRqZst9CX=M$QCEMGCF#iAdIMldTM#a|dxRD7#>fr7LzYFJ;wesBEgeT__4FB?C$hEulLk49LeJ;@=X)iB zDFF1w%0e$e4UjYm$n-sNLl0PMRgiui*Mu)7nuEq3{~<)vK%|Hjoepo)L6xcduC38g7Ha!?a#?H<}`&f_Sb3O(%k)T$w> z!|ZwJ$xm@f@}rYFoUh5wm2zkip-bufPGQTk6JT*>Akp=K_rrcN<==uwSU=A#QA1M} zG84*fUZ47=Tw{LCuqVW3@e1&y`pZoJKppb`j${Zne6Z~BSe0wbQ8>W8Na7B9;Nk>E zv~pmTID3MPZUTu>-UF^L-RWValw#$~H*D@i_i5l@rR~WgiTySGIBqaB*z+SNu!r2I zh4mmOLd_dR@p*;%Qa>;)#Ex$hHFb++sCK`Dwfpmx+3NTD`$N8xn%X9x5*i+?lfoNQ zJ5wDWS|*f&=(W8(pY0@?ePf+JG0@D$#6ih(8`l@mS?+Ps%K=^(j_ot^oQ$8oF|IIt zTeRIr@Q@CR$F|}cUgG?3T}Y1NJe3wz_OY}0`Wk``(&{D-7eNcU0z#Hhai2&#yNEr3 z)8f`G_v8=hDlC>&yr@ItHH9AVSBL4E{`p7IFNpiG$FFa~2t7)#f%xa9Y9~~? z#J1SBul^zdSqVn7)fVO~N9D=(;><(8q-VKTdj!v2RVIt0n^vSsIle4>)t3~oUXvkn zxd9?c_SwHyX2q7ZrC6m>J>#4355@ar?<>Vt6v#_wA1uyT-{no!M>b27iQN()&Vvuj zY>3>RQ|zjos4gpBiF@_&#@S>0!R>i2#50h&kq>-pWr5&VZ=(9mpClt`FKI9JJ?SIc z7mD5+*4+5z9=r%hR->AsQ%;9sB3$R!a*%-ajwkEe(NltTrdN+d&6oZ^_{Pp0A&s6R9fcCKkH4>jfu>FMf(~ zyWnkGu#aY)k$$J_*+>7Lb0_8( zR4tR5_ia3>vpmsxVzLgW(7PhdQ*3^~CQl>l)79AR*yLdg@4NtGc$@E?=LLnP#E>7T zx)bO?`Ij*4`Q#sNWeyE2j%6f)v4FyLI)`fj@^%D(;RHTe?8OGecU-k}Fk>`3A^=mn zsPQfKU*MaDbo@TL1}{AxIGtZwBQ+~YYt3O49^3uHT0ioxHr%)D>VuS~gwgkH&*z@&gS-S`uR3@3#jf z)zJwsSQmK=?&qja1H;=px$J{l(s>Q?0d?RJCQn}@&DJJZ zk4^exk7_|hQ?LX=>b3w&0BfU}_Apz~D#_9%bE%P9s7VYJ2ZtoSq3J!K)=TOj<2m1< zXa5e4+2P@ZkM~nkTJH+!ku&}>HB&TtlhE&b^kS7iF{<|W z`+kla`(TP#*NEh6M_tm&OMHy8R%qpieAflTA@2bXtT+ zgxIEy23YoZYh55~p@GA@7^mfLA0plMy(3Lj!f0y+sjUzO`H8%BjbNO4Ur7kG0eRHcsjr$g$0Ax>Sopjt5T*BpXu^|n=8mhsvPt3A)S+H%(z7xBn-yTB_ zedM}xGF)dF$MB>%M8ErIr&UkyA}X?$Ov=uYfi5Z6=+C6H>HWSa=KQk=EO?57vD)o^ z4~`+1kW+J0 zVsSw*%0Wp@dA=6y^s#FLSwkuf7|gq`ErBLerD`1KlT;L1^mg2{nqS--Scun6qx@S# zmRa${v95rl?PRjdf|2VUb>Q@gI!t(cL5@WIA)O1M;8S|YvdW)?PhurV5lx*JoU8NR zCK3^=<9k$z5&I~?uj%lf6kQL4rPMP>4J2EfZ%$yo6K?IYTQy<~;lB|1#lChZR(XG>jp?`E=VYif_ zu$tmg|3qeYAQmgm|CuW(8EtkRsTh3d@_FV*EkjNyTqgy;qjmS|jU7Wm5Qj>qN@#s6 z%Q~kyQ9$*ig$U* z^^uoZ4abM9SQfwNE^R;9(1G+_uXlZD1X7E55*JDfmz&Zey4;l6ZR=^Iww&g0;KnLC zP1bFznDeR?0{Ptxz?xQj>~YoWvnu69#{61B;Ao#<7nBb61{arxgH#bnL(kN#$!cGi z7&7@ch=y&67+2D)-bv!)5*7(m$|#<1!cdJK9|pYa)XI69Oz+sol_1=}Cn7+EZ=PnECy?2rm1ZJ*T&_u#AHC)y4XVAB(L z+y`w->Q(CS3p%GDvOWOKHU$dQ$Uoj{47&yD|7`211>Qp=#%6>VF3@~jmL;T z!B!(Ui-dI?e0=>m^(Ra3XDWrg)B3Og`A-bfMpJ&{V!|PRh zaA0J?5W`;6>bTT^1D!sn=*W=VQOw2>++LO)ZE_uNV;zNiw)7*^u0JYZhGL21Wz&*kmSs(@y=qWs~&OQBMTOQ)&P_$QK{R9k@qsIBryE> z7()`SuT%q;JC6}|pU%fHX!8;^I2}KcUUYK7hH)9(qt2o%Q^vk9_vjF%YM?bL3l2Lr zwm}%oTwlQGH50Jt9xXjcfF{VpP)_3bQrbN=^a2kbM)Ddz@OrEoiD&sj>j(RL3^Dt)fLs(V zax+$?vJg4$ZERc5MCT*hB2PBAuR@|I12EQ$H)jbH+fU@EV1ziwgKRAh`{T2KRk}oLQj;#SALS@RCL-ylGb}>OXfp+N#3L~s?9`k0qoXB3H#T=4v%Q@+hf0tyiOzg z9^szyeBJU}908&>+w68C?<`v^AdqP=PH$7Mu# za1~(Id0CoDYZ7&IyW@PJOV|l(9DjSQsEu?Y&jNT-+R;v9gzawi^5^Qy4Llo{l-oMp zL#hRC9-0wc%CFP;(0ueBc__FAl0UJx>R4QlZpeP^S3b|Z1?DmEQq!VNc{5{c`VW3% z0TT+wZx~t$L=~yAd-gctea=Z&Y(RFmvx@9vFwn=jW*&nTu)=S zkhF#aSy(?Gib?$fQW~J`tF|_fPwK`h~sAkZt1JM3d(<*^?p+G9N3?)|98I zMT$QBscQ(*Kthx-NQl+|q=Jl;VolOF1NZX@V2?kFjRRLNZ-V#OB!|kg(yR~mEa;#5 zLB5W*CA8CP8B-5EUxJ^a5dn*_yh?-$L*ienK3<8#tNdiiY@)LTzO@4~eN@KGp}nP{ zl9Jfq-^qc|E7g-KcGJ2W$|c<*O*#;X8H#Bh)#W!ktn{LyqN+_ADoq-Ga+vY@$G*0w z;5B@z$&qgl?}%^GgX>45>yt^&e)4$Tn^$R^dZ&+OUnVePg*}9+34bMXn|;@=hjo!o zCQKNW?^o9Tkgg&znWVrNOPh`A#ET;n7dziWzd^A2of1|sW^zXry4Rvbyj?v`&IsO{ z+zhJlTWq z#S1K8@B8ZK0HS3k?<-O!Tb@t!g#?h{{A{hDz(eTXax6Z~$-hWOo4c_C2PWHso$TO~x}!b0QjOXZ@;;nQtUTZabvzrF7aP*GzB zyxyf`&Z_$AT!E>4I5IIqkEn6wMpU^_19L+kOPrriU7ls?scBG@Tm`q^9Yftpn!gvT zb>J+hZ3q>v`lc|EY@TzrF;t9u<76d-75p zT?pu^njYhsjbm0=CwKMYj2P$Va#OBr3jGW>PkU7S@i~4j%b_t3B@Yo*^Fv3G-0wj+ zwOI8K=B4a{6)Hwu?*0wuA81WVf5ZAYnpf#6ihjr*M;UXkw;^P9c}f$TqIN&JU3na5^fXhVJ&Ij{9fIcyKHZ|U?*>FY}c#yAkxDc zuBCIK&BpYAgdL;6*-OquEq{Ae|Nd?ESC2K|AA zuzILu>F*O=rZc(DQt#*aDA=53M%`n4^op>sL1chDOvJG5O(GU~$yK;qY{}`w*4Xne z*1g%C&is3H={9*Uv0fMiAG$6*?1i`7D14ARF@AF$ImTAehlKzAf zui%>^CfY9T*b;J6Uk7cs+kB72n?Eb9kzw0hX;{}LWWCF&5KI)d*x6G)!ogF4Z`%t& zcW6CLqW3TYNEY%0y6wQVuGUy8-4Z^!(V6eBYEJ&O>m+iU)p_&cEK%;X(Jg-tP9C*b zdp@GD4DruasN|fV?St#d~ zxTMI{mv+2#4~@@G*~Bd;T`%{4mC0F~yZz?cIx$29$ptn$@e575Bz{y+UsHu@jdSr( zM9clE_HLBQCG^u^{#*O%9gAL)mcm!ZV9XNeNBDebNR?{Sv%!3!N9r2q`2jD|1+BxJ zqU5l3Gwb9RH0$dIEBHkAw0gI^m6+=UJnTIRgU#o*U7xjK^zh5%cY;Agx)yY-&EuKz zn`C?Sf&|w1vsQw#V{qSi%a}w1PThY}Erb_}v7x(2w z*WydeKk*&j|HY>qHdt^qHh@qq+@R{9S@m26?p(6Z$H@t2nVpvP1PHY9x{{@fE&HyM z>3Hc5wFNiNcR%)Xt9=v)CyGs)N30@?_8bn2qbJlJIiwaAr6BMtAeVlvgzqct{6 zJZ+uWKkv`^F6~^p7^pBRixN~+uFS6AeSWb=aH6j6GRpj{;c9*mVN`L4XQM^5!JOTB zfK4LG;objB=*_?PG2~`u{86+D^+V6ll!$~R?!<&#c5VKfSz8N-n-gxlMhrqxmC0(R z1=ru=b7Fg#tTV+QBkhi@DOx}|wod2|eVMxv;)=&N;R7Mtpdl@Dw>~Ar3m8l)O`9w= zXw@Q~JE8G#(A(lyPbbd0s-n_J#H@-uxwh4!j~b*#!qe?y21Nj=D(5 z2#LE^Ev8Dm$Jy~t<~}On4wM>B!`fY&n-P-kAgqSL)b_mU;h%Ubl*aByf<510CM-rx zqTQtCiK?;YEg>~+&!lb@gVX&0uFI_&WF<25!exVn@*=43jm%jQkOiQs z8>&?)nA26PtxS)X#8!WZj>2hah80)ux(b%rbzC|qG_xu@c)*g+lvLA=+=TMW7{hm5 zuK3%NIjs?C0bJ7iGU^FQ_x)?H>^Aef=cTbjQw3b!EivVMT}|IDoRVjNTQ?7Zoi2~i z*JT6uO0C(?VaaB?VKj(lCN)hOTC%k*kb|V!ft1g@k8x`spIH->4civ zG^4?b@53rMwJkGTbUW~J@4LO{7K+l>%kVCg#y43X8>Ly|HAi_}70K0*(qF07{W4lC zdg^A+Y)<2fF9{JR5bt{}LbJfT*Ku7ZzhxhVe5gDOeg;vsZREk>2m_6S4=p!rX-iuO zBavGw&3d0g#_Y}y55Utj-#^u+_MfLI+xEWe>~lujSaL!({7H@H`8_Upx8rb6(u&f~ z@mUZ!s^fl}l!id38Ho{wCt#uO>~MYD&E4 zh$X)}0u;J)C-S0D6B%<+jf$tvy{$lV^5+;&U^Bb*b;#bO2mVmd9M-q&-|m+jEt?uz zzA)KbmLLTeLS>gZ+jrW@ZiUAj$jH4Kqy!X9Lx1ZgCaEXvgAT6;br)!z@ynNv{pgtT zi9VfsIALZ~|K77B+Dno}I-e*JF;5IKJ}$2H*Sz&X1j>;J>OJ=jkHXJ#{UAw<#VCD> zs8U$SxTmFOEn^Kiv85F43_MX1B^{rP*wvMH)6Fb_WB4eP)X!}>>oRG!#T89JFRS#^ z*>^`c>l1zbG*0`*_k5SihtkzRpKvX-x3S~!Ds~%B``WuJa$HsMF==A3Wi}-=&m+|BHE$}qCd43z;br#6HVwvjUI3kHO zsklm^EESuV-#%+|Z!Z|^d$q7Pzd{MSX=kZ0Rgr6Ho%X%-(-KA;8z$?cRkQ&lmrcV#WuCZsV1woi_^iHAHJsd>vJ8qFdX7RgdGhcWo3zM5 zsC(}>=^G~o!Wi>U@7`%AS+Y;?J*v%Ii^hooy&m@PNqh9ilpqG(7KiU6uq{ zEz#rDS+jf_@_>o{NI?*YSdXr#P#&YJ_X^m2tCCve?gE`+itwpNO~i-&mt)U_42?R& z&>zKE?JB@=0?bgM{gCAZzYFf?!m8UFeAi3#uDQw^FkEhc~m) zrh_(ts^{&BdLuPuNGBp;<@i?p#FF}!uXD3+3w&IzxWpXu5c#}7G;aw9V>SB{7Z}0@ zmFq_pM@0gO&e;~-mVAzh&Yc;R*;%Y}H-c+M1ZXZS~(h8DA9I+$vbuaV&w&R(KhRR6Otv!Iwy-_bd?v^Kwi|W3oB&;k%Gt z9ttM#j>1y!c;V!JHYTL{pKZnX%>#)~iiEE(Z(%0^{AFge`3v%WwV%1jhi{g}W`UY2 z&gW*wh-z%-UfG8h#j!}}&KS-Gh%BcBxBf(oD)}VG(11?NfF0{=6V+Cg(x}b1u;LOr z8;7RDvs5;juYaNId1Tk72lvdCK>2uP0)p;s6@52zLbz^=M3JF3M>spA+!nQe3TX*C zxk6!;&VoVY`^hF9gYIB9V~)&)tyWXw&p$Ozz2YsC>u37y<0p}gW-ian8)lv#7*2_{ zX}bax8g|2fay)qhpvXyZJ6naZl1 z#X$tO|4JCKX85Kdx^2;N+)J$DPFZIE0RgqP)}-t4mqlciaiHe|lp6Mgyr{J23pD`0 zS66`N`S#@<70;#*r{DdjBt9r;SW-*#tW5u@X*o(zp+!ZdRt54~GFxaRCjpPjwlNcP zxtvulq9=Xx;Ds8TtoC1RmQG&buq4;le=7-%gkdB_hA3_EkQgBaC-Ik;{AJ&C05gvH zxB%{~@oe};1`TT*)1tT9L8zzuY_;|9mY+$S(eluzPt~>j;-x5cL4STmZN1DkST<=0VH)w7EEPy@9D{rB+&+;k!Ao|doS%oFbz zbR&L-y(sg~@3n$z=jB_~p0WHH+u5+fmV+ztCdw?>*~eTF;02e!o-SM$;Hm2HP*QUm z{uR!&&chPUHh-~S#Y(SxnveG<{P^lH6}B#;-b08+lM*7PF4bSX_2DHVC~RPwa=%oG zimA~2Uy7gTC-0ymj5r1w#dTnWTd(^oX;)u&E8$GwP5pa^Sq&|N-(Pxs^0N|AtxMNy z<2vfPgdYv#+*!#VRA(#hhf)gS>_> zNv%+6cwBS4YSbH{%K7ZGRt4^J)vafYZM=Oi1M}-=-<6(EpK=7!gdI<;@#K)THNW9gTM6ACFX(`WqNgXyc1Ur5Bm{+v+tD0hkXf?cj1O_hG=i* zqpuXeSynXs?%Y7MLK=ilI_M77ueB}iY;)Op0v@5P3ivR(E@&S22;bM!g$6L+Pr}$e zxzdlgBaVdMF&t+gsK6^b2DL`{#~VGX|LKk(U)gg0Zq~=X>WhiDK%}x>7GHcK$Lzc1 zDWX_=wieJ2#>*+n1$6gWMXh%S#2IwQ$9&lEpdS4%7o?D>fYwBHYv{~9Uaz)bu}ME` zTl0Hq@G5EDb9mw(Sv+zSK~gENyYS22Q31!Cce>+*sXI{3jv_uiFIX@+;F7u~i42BSQoCVrXxH9?SPr-VfSL^4!En^~spX?S;rj(e+RG^%Woa*UH_Uj=pADMxgNZ_apxL5qZs14%d*u}E z{b!)^e&4rKp}69`B0zl}?&Z=N77VWdM=_=9Jx|ibG>QuBoQ-E^K{lxpF}R3dN?wm3 zb9_^eHlB-#<062Hz}x7YwGRP7*w&9WQFL@SvNa0xjb5|^6=sGb71K;(hvUP7jwM+A z+|GWy(!TBd95US5d*WJZB}H|s&keKUGmX0?5Q^InMrw(tSP*XZU-Wy3{d_SsXeoT0 zdVK{!#cqstP;zQNG#GY!|AnpN`skXMZb^u|0cjAr*oU+;G*ui6W^AEfeqci?xhU?0 z_tzWjbdwDGuT1!K?-;gRsB|ily<`{8E*<_=+(6bqah7o>lIXBUaorKLkF_VA-hJ&C zzm#!Zzkck{Ptl+2v3+Vtyp#MeO`rH$Y6d`vkKSJ_yk<9wZPdKz;OodaS6b%ft00k8 z>lp1FyY|y=riucG^$%F!ctzen*7l!DSS9<7Ka7Dg@c4rRaOtxeM1{c37oHs*1Y?Gb z$z_I2UMJ?evc3!7QPJTrhb4G(;pr9qjqK@8vSao#U8r8kJ_`!NgBkwrMl)YoAxPY_ z&i&5JWHJz>CDCK^+`X}<`voe~Bfe$-R>x07zQEB(uY2O)UG$Me{SsKg;*inT9=#B} zl)=Thfo^N2ZP;S6@a&ZX(B`fu5<#tclJ1e*j!X37;{D3~Z75*h8f~VS&)pUnKh8+AoYLOId8!s!bq?U5 zMJAN@ZHCf_Jyf5R$^{>tJNNS0hFOF8vr_nu;VaS9qV@fk{{C?6N4c-#%G3ERd1kG? zUPpU?3mC7N79@v$&oT4yb&Adj~)0N<1m(yorOt+D9jj<8AEwb~<98 zlSEM~-iCd?^7hOuJm%bmBV-E^JidM^14LaCCkZN(dZ<^uI}TXr+`~*iqmQGPzcfla zMG+cFivGmD!&`=m0QTImXa)qkBcwn%E7Rw^n`)$EuyLsn<$aYtd$*GB&RLwjLxwMj zV_W3poopC<|HO$Myy#o69I|Nc3htDt@!G#4-4558{cYh_>p*eT{Y~f1tROzOSKHKZ zoC8C-EH^4+_T{HyIoR2&8GfEoH* zwnohV>R$e<=2Kx1g`XltC_0qJm5<6^dmN}uIo&H8a(6fKHhwaSaBfZUSZLMeX~P(I_>%>?d>-=3XAFu} ze){`JX}NG|BW{@lQYxi+aPPQ@2>a=B^yFJ;UX%p2n7V22OI<7{!{Zq4W~oRI&UI*k zBeU%;)$w+)zM6G%W7Yd+s$wGnp`=KYW_^K?Yx>}C%D(BA`c%D7r#?7%UZxt7QhK&Y zdjGCIG42eq)Fm%qT!?mt8Wivug49}Qc^1I;(TfC2T8_vvJ>$m&Xo+8@3MTlzfD71Clq;N1FOa!)satsW&uAQO7 z74KTp;NcrG8kt+pi`a_!syfjWe`%)%z*+S7rLXLi;$Tu#;h;0uNb@{*F+Mx}ABT*` zzlep3PpVl_4UmJv@f}p&_T;b)2tv%aBXPm3=}%+-vEcJRg&XKsV>|m#&MGFn$U4LU zI;wVZKjv5T&8n_t$DF~AOTm`M?*YfHBWsV6KC=swg2DVb<}|9ozE+aH6Xz7lEa!CF zm;86G(>-WWR}rhoc0gUx66dx4wR5mrAQ{C@8kETFv$@YrDQX z)pm`&l}sJZbG?W3!SC@(?QWIdX!b$;a3{=7b#W&=w%i>$#yuk3yx6UijV7*e&EH+# zp&wBb+#^Q})Xv`tBK+>)hO)*+Up(8U@;wqF5sn7<+HxGvK8qf@6Tas33v^utI%qua z?B8>b23;K43WUK=6!f;cysNB+W)%3N#!D|htmx=>Tz?WWP_w^R{Eu1~jiB)lf@~;m zf7ZU;G|AeGGa!keH9l6eOa0&}v#$W-6V}&3W0*dF6R2quF@ z7tZd{mW8hfB8ccmYdDG4S%BR1Nsg^SlY0zV8K@(@!-C4b;aR3u+pPUr4V$y`KEUldF!7q&s> z@sr6NY!@TA}Q``I_wI#5?y5%m|1omDLp}9eN1LBxj^y147L#A9CxKjif5! zgsl2OVw@^?=bPNi`9<8N^@AHpTRc8l^?c*)M=Lbn#Ju?w+=*wx# z8TR6L_vY3|UrBHf6DoN}yEyq-9bM(6frrezF}X@;&t(3=|Ha;0hDEvdeWQRNh(QZV z3P`6&w^AY@-6c|s?(SuPgotzulF||a(kLY(AdHlx)PR)aFu=fjUasX@ct7iT_q{*t z5BoUQH)0sBIrAUCP@O#I;eR~fPEp>fWti{+lEqcnxpj~0 zde`&q=tH`euD9O8O>|Ib%%#W+YY^lb@672x$AvzUpC@{O{oW92@shK-{vUiDJ ztgEZ^j}{c)0Nw?LuN>rcvYp}e+E#Wool)opFV(qtq=-!VIvPoTh&ONfC?7iCFQ0DM4zqwrF&2t1JsIu zxi|1*N^%6YNxpZWAR=nR2L}>S!|s_Gh++Nx$j?9qe>qz+sM#-H8dQ$U#P0*LAtmwaad!n=v;Tab z3vx4ieL<-x&8Bh{p>A& zCC$PQgMd#)z+_Bw=u}Sag z3`wAdWT~ql4Eo(a=7UTN%I$q8xZeC6p`TAJdHz!`e=rMPBo06Zd$~S`{V3FS7PbQ0 zn`b0S=6`jT4%qnst3?15bx*~we^>N={VF*bs{4MNvo1VU_x)f0ZmBo~8#i#_roeym z-Yogx#bn!c2EY9`uRh=a3&BjZSLHuu<)6L{jR32rtzE(?(eR&s{U1LIZ6>6W`J|^N zaH?DK>mZ!^yyo}8i~0Ct)ADrx*Vp|0i>z`mdOHb-kN;l`b?a(iZ||?~97>0)3*6nK zS^&t7TYROYsuD6ae{5_lkBxV5?R$)OBhxrw|7?|%0X3~vKz&(Ltg(FFbxC~n86fQe z^A(V{uL8%XD@s=ufzg%&u=eVMC~r}l5O91fUR^3>5}bMHeHo!I^7)W|#@-|0#%mCN zr4m@ry?iQYqW$aWn%{uN>q>0>;m;KemT{{HnLa2WRzhT3UW$akv&2zVXCAm7u)GFp z=GIVU-3wGRZIX=L?o4m3*(jXndM&f!mpkaoh)>J~oZNgD&|tSoKEn!Q*UEnYiBf@h z`DCPR4p3WQuIm0k@32cA3)|`%NtP9stlC%U|2WD7aZXUu6R8i=^ZwjbfB(K04~i-t z063uyR0OiB>UUBJb|0vKhw5Sw`KtDKL`T3zr4JbKWv+s5(}&~lkEI_FN$z|arRd}S z>je4p{XXS{sB`-L?k;$0fp<1wCB);?xXA47Ak=LD50QSOBcpo32($;cdLEcgeg}E8 zs^Q~^$~h1G7NFN-twpxU_Al6k}K^7zwqE+9Akjd9Dj0g;nJl6wN1b1rAy5tlVZD{wW=U~!@$87harPe{Hze~3Y?D(7Qdeouu}=BrTncT2 zmYcqryWZcM&|C#q7nndffD!Dgl^ij4x2hJ4*#U$pD`2LhxCi`6L|GPYPa&J23k|s1 z=}SF$YX&HaV*sL@iUIO7S1TNb9tX{9B%mM{yePs6U|l0!?hy)@NYYAZ8eF&O0rQL1(G+$ zY14*EONE7naj>Z`Je9^QtD`sPjiF8aTLWstD$ST|6#*DuX|C(91M9buVit$mtI}ZJ zefzOQ$Pu7hlDSzQp|mX6aWkMO#GXGi#yu)fc#0?GtM0@c$B}l^13y?+U6SnzJ!s(C9Ye1{Kvn!x(P?^)} zNPdAB?GA0gBcwfu+NEN7vw+eLA zp2jA;7eSc#Lz5u2Twev} z3%I05;B5UE?lg$z@3W_e#0@06ujlhexo6A;0IF+ll^9*YjZFI_M>)nNE8y+<@r

3q7w ze?SR6rr-&DoRZ`e0B&Zt|45tr0f?RHK&M+tD|a@9m^rh1iWRN=TLHQkNeIBgs=>w@ zYY9f~SqB%>27*KZ^$7+VL?Fq2HO_;znhAN2A$+Q&&27t-vkZRI)X#7`l}TtuEo0~B zA6C|&L=BsyyT1~nLkB3zU1YFk<-g%1Zq6nz zQx9a&S?{Wb+VjGP$Fe&s!__aWZTsY${FWzBvkz6$Jh!jCSA{&f-JRGjF_Sdhsel_t zZM&>&O)mQ)fj?1}Ft;iQ8Mud+pKUAoK6Ek1C+tXUD6!GtHgQ-YMux1nd$~^VF24g7 zlh~3|1L9-o=?iB~m)IF^W@lM<$qm*$K0fSEqM{TAWjuxh-^G~GQmGK?O{d4%*IrUF z%Q!JjC3)0u8vnyPGZ>7Gk##Beh2e^zXOTHkm{F^LDz^GHtevswf@9}`iK|r0Kuv## zbV5z})1_1J>tjST(DX8Y?SqBrG$NotLgRWmc1d6VZmi-JaP@2oQF8mixG1dS{c05(hwN{aN6KQS zrhK%raoAz!UQuBXRYQFE5dw!9giT(0|06Y-X$r&1d%rcubM4N!r!sp(BG$mILn+i= z{f8|PX1KRQ*kZc3tE5tH|M^@sEmkramFG=TqLsO&WQ>Fl0x-fe;8vZk2ypXhhd`8` zD{Jivu}Sw#%j|iF+?0fkZ+v`YBATem{sAi+h$#?!!N)?nA47;a}u1Gwn%g{BFl6%yX`2Xy+Th>lSuseFzDDd}ZanfR!sYetC7lWmbSu+Pc3Tr>2eD_Eg>W=#_D6oAP?^ z>0aSg%+L)RZ?N#W?SX`~i<7sA4n6+(ccg~A*q)YPBeYB3k?P!PeYHu+1%*G!8l0In1%bw7X^$`-_V70@AL8zo246*k=qQE+ewg z?pUlt<=8Uowe|GrSjy`HjvKpR*D!Xad)AVd=$@i@&#a3`?@JUu4z$o@*sl@LM$6dx z{^3x=6_x$ND&`RUiIwFIT2#+H6xx~7E)ayW9M7~qwh_pEkao^Wv=C;vW?I?%0!6cX zKD2~Jd%AbkD_OpzVrAt6W?6Lh`*w_bKUQ&=zrmwz-MK+jZ~}?2y*%nwi7FpPj*#j+P%X~TcPeLzQKogGO=`1~*2bdgM z{HjSIdby{>jUSB+vMQHauT5t1%3B1ko+tRCxt6O@hq{j`jC!s)<`{YLC$qnB|ESY< z8N&V^_Nm$R^N%UkW2?CA`oNUp(7lGeZ&s^tQ5(4B{lW4$1y=?c^`1Yf5{Mut`9>*q z&+3b4_w66zRru-0jBe&|gmjw@B37>eWuI#n^*pFU@P<)$ zUZA@4`1(+IY4p``w>mCudCU3E-x*|Mc&s7>ZjriN`o(Sf5cMXj^a;`jRCei_W!wi# z>Y`+&rnGwQt9FiP{80R;Sz10S5ef2DB5#J$b(2x1s~M}%WH`I%0#c+qfVCFK7Mc#l z3mQ-JPqi~;!RJHXTB7bu)>OM}K|x>&o7G%4D)~-}0lO{w<6nA7k=^f>3zrEcl}ls3 z&&7-?HX2L+(&cgI+sG^ivB!4Y7;^y$EDCp6CJ}qCXquW3?OvbSb1v=Ot_fQlt;EFT z8sRej()4-Kh^FSL16j7{_Oa>E|6HpE+sq@MS&dBnpnd+E6&j5mI2&G7VvG+`k`^j)r zC-nCFh4{2C!|K_10qtgWq;lPlSG}Nj9)(2+^@}>182hbLBy{0%%XKPJztG2oX-}Di zmoKwU4MM8V)tvE1s%noHR~E(JYLmRm@_iOUXMb->J)>l+#E$J+W-|mYHzB~IUuPKy z!W!*(+~nH!_h%3Q?om_aErQ(k!jIq9C*6?kUmRh7a8>qv+`?)581_*71*%PbZdcDu zL+)pYikju|x0oB$5_ULxzTqSsOkh_QqPp3Y14myRHRN!bA5!g6aybuu9BqA8T^jM` zu7?_K5`D3JBw`$DHIK(#OijPt9(V0=(@gZ4dmLsIUX^JkjgSmLH&PFQM`}QK+7*uG z`J-m*2beSot_(qO1F+P^?2uy~Y7*Y|kjr9pb*#_bW{O+v-=6Ivb$icPIcLVrX;nl0(?`juJYLk9%xge;EBy=-@gX(70x~Q}FX#A23==$R&D;-~;H#VRi z9nvMM*y69nDQNbyV^Sw(A8!tZ?#@HAZmrtd3Vy=X)NDPvLL}URJeoX`y@&mFfKjMO zMLPFSNE>f%5V*@)&Zht_ujtb<>|bz|oDd=I71_xCt|oNRl)-mlm5et(VT;n)Gf&Zz@u)HCI` z;{@yPq7^Y@yLTvS_I0#kAU3THQ&2EwL`WMc?TQp-&s!(dUd{lYuWc#ORJy3|U|xS{y(B0JgYn($4WlJ$OE?4g)O(rU;IUm9 zcBNZy5U9V6#=M=f-std*S^N~%9nW@L#WD0)v@W3Tj4)v;FX$1v-}_;bb=-6&y}F(~)X>`0~Dj}Wpg|4b%oI+GQn+y;SDbZ(2= zG^ltkg?H=C-b(vHePl(rG;yDx-cl;Kw#z^`&y97Ik~ID1Y%rBmWyLlOV%Gk}^P8kY zfjFe}#W|a#34g(0K$?emXNum;V^)I8S*Cc;XnjOW+~g#u^Hu|uUB8crcTZ0b7`roT zJF-c?gImJag)((XGc&R#1*$0O#ox_@;VO{JP75^trPV~)kHy%j_t6ZUy%X!i zNA5^_UUmZ~oeH%eEgtUv=r3MzUigV&Y4*gD%Kp)SG3D0jv>O2~(4pU$AjwsvmC~g5 z*Qv5h@eq@@UqUkbN(5(_=Th@n;b(J$(JaBWjC}_={)Yn3*tmBRrk*=~=Df!%$7ovC z-$SPraDD>_*%48lK~m0tN33g#oB6zi@;9^FUDvDRpyV7j%d~ONGri@RqsHiQ05Rk zom}MHn)@@NKl<+wUV>TF>Gvo^@;2aIOz9iMxl7#$ev}L{A>5Mxml+1^?C&5zXnaR} zwfx)Day54Hazf&s^I$^tn%4it*|gRh#=m}fZK%Cgik-ZXkf{BK%-m1sCrsQxry0&` z!8)+8Zc~UjOToo2cu@QHJrT;AWb2Y=d-Iy$tH%R2F3$^T?;0tflQwa@f0i|gl#wy! zgmrMd&_!ARIp){TX}Qh5Eu~shEM;$}iC(JtO2p1UL?F4Ccm(CezMcuyn~srEZ`zN- zhrd(^@^E9Ep(8(c>iMYbXJWz6M%G1F3w8jfJp%KY8u?O~!;Tg_UWMUBFJ;@D=ZY`G zjfC5qQov|ocv|`Xy{e-aC;^2tXN{X^fH<`&K~JR^7t?~#if`Ax`>j3%IguwEg$aKt z!>s`Wo#l>IaXu5B-VY^xm_LquEhAozk=2a1#sO!)@?PmE`Bx=V!N3zgdYcq6vP2VbULe{(&_3qhTqRDt_{Wd6ui^R>|c| zZ)Yzky4pKvmg)FetJio(eEoBiIdWL|^6DP;<98Ea4pWHTM6^%KO>NJaam`QZuSdwE zJpT}bREvs<%}_@#7j&w-|NI~vtU;7hy5~eN_Dc%d%Satxf0e2$N^rZ2Hr}*Y>w&%v z|2DxoICY<9fzD@tl&CjM90r;4yoet*#z$zwG%>|J;BJA>8#B`1_SM!0V*O7rbZ-8( z01@RJ)JD~lt<5hb3g~A}o2Z4SWi)0GW-!(!FnhehqC4*yLO(|*2{fka&p99(u^T9+ z*>>yziq^m9nlt6|z&67-Y15<>eA_)TEBYBq4C_xBcNQ?tg`;d8e;YM1fcD;s^~mZ> zGEB2C%FmkSB~08wGk#8XmWO6REt;#ZR98P`qvKl@M{^~PRLGZT$3iWLqI_S{w5M=w z>-`B`5oH)#{gy@T_UKQ`{b@0Fc&9~TMi*(4FbRCb?&K|3}?2T@|^E$|A2ycGG^HZKAHUAL7grTE-_2(yVd&7t-BAW5m zfchl8Y;=dk&vBZS)wkCfbZFPU8tL7+1$D;b?Y-{$bjy(crIZa)oP)Sn!`5pZL3Gk) zc7SFra;t)Mgr#S%hpy*XkB3lLq3^)AOjc3HG)x1BgutEGao!tIXkTwm!R3JcjDkvl zbK7*UHsAF;+3Wt>DrN8cC}wW4B-TvE!9?2QJO-^H4pQi%0pC()q*9iUQ+mNfu&dG~+tx!WYKOn{<`s?ABmZyqSQ!-SFJThF?oIy6Qp2?J8@-@i<2j(^+|V*W1+ zsSk9U8tc8$jnQ$e=r(0}pLKg&ckS~#VsASYrp_0PT+6Pc;s2Mx4+E+az3a=zV%=MW z36k%KFyMWr&B!%C-{xVS5aB7z-kUwe4yfOvB_hDHM6A=wi}7KdJEUg53Z#b#n;W2` zaXei#lXP;qa*+_u`J-^@4&Lon8%}dXw()f}ZBOglK}dZ2Nr^%7HXo&^#VHFTPFMr( z!gz0?N%9|Z4Ga%e2>x}4)|on^sG>|&Uv_}85=pa86wRiW3~5b5BONcN^va$}x}0Q2 zzsAaC5w2c;B=N{8ZB6A1qWE|EFo~)gm%3MKs+PfaTjUzx$ zAPBB-ky8E{AQu;jH{=Vk_<`BVvu&`ke#uswF2evcYv@APvN%1{@(0^}6Nj&%8D6C6 z`fM)~w#5h2O-);7Hy)eZf)nei4zv0P2AK|zNX!yZ?{^S50OYKr?J7GcVe75a^M~>p zD0&l_L1pCDX(q)QDOBh4|iU3aG=&%x^v?}sL`d%8#Pom=fIOqvrix-LJQHPk;w zqfI}w(rZ4BgEbJ_!E7xH zc~VARzwUo|6tO*4GsRc-2!A@`Qr)e`4#1amQhWjk5lnHbW842juidt*v!hChA$KHH zKf=4-sMR+9wV?+)b|k*~{_2Q+GsUng%Dg9OnRmlC<9z??9?NEXf=_4Dg`@eu9j(9k z2NV|mSQ>ePa?t&*^v@tZM64&!?lK$p=sSw+>-8(RPbYn^SAe2n%Ym9loY>*DYtYeA zbh#&0+DvgjFuwFw=MR5x>Lv|;I`>7@`tznX%>HN# z=~20dH!ysm&hng<(f?llbGlv(r(QH{4x6 z5w9u9zE%k7TC+YfPL(k^5Q(Ofp8w%T%>6;VOqY}GX4y33A7SjLGkgZ^1g$XngQ?fi zPO)9RO`}*nR&O!h_3wDhrmcI@)>M3X_C1?C@bVG*%OT3=a`*9y4C@V?gbd|;!*#o# z-`Gu|c2brdrA44NZjWUsC=snRVx4xj8tqhy&@75`c0EONyGI+mq(G>7{I()dHTwg8 zeTa>@lFatPxQ-vNDC6xP4&owur;4~u-_!i+Lpg8Y_}%0K@s(u4_rVmM=Uyfq*3PHT zYRoJtmH2-juGb&jXmnxci&0<6K^|Je*Djk0M_ zAyiO2zVH%_#m7>eKM~n)mi}ox{xV94Qk&>nxam^Hnf5BTn8AKfp`)6mz2jS2Vvf|R z__dGl@?|zY`(BngvPG(r#I_s|3CrMHCU%r0L=6o-UrWO(8B1>=8G55Fa_lBwvZqtb zDNjq&%^1w*7N2V569z_K8AI)vZ&D(KBp^)gdF4<3*J;FQ=6~nFrtW4g3{i%60pJhoA!p&seL5Aun>Cco((;1P0PqXjQj!#_G%oE z!Pm3Yaf_TX%1uemz_?2Kb9KkF^S=tj{_iFrF4=QYl9Q^r!xQG*{(~sGfu1kVvO?uB zpIc?RTSKOu;btZCYPq;;7u<%vziFY!SfWuLoeyqQf{pQZGI0Mem`7~CEESOt!>D|- zQiq5DTAVTIc$M-bTyynFd7V|$R=MLbkyaSBbh&NKA+I^Z04=g45NUp&VUPk_FOY>Z)M@XPhJa0hjP$ynm#^b zUyg{vzs`1^dOn^L4OCw@w_XVKRbR`B zQ=0r4?f6-bRgRg^;E_Sg*nXb`3o&zY#9wLKy9D9$Eiefs=FVDwltsk-pVvTTO;!*% z;I!&8EzM1)JlD0Cc7zrZ{p5$NeSIwcU4ysR`(#r)A1OQ(xq)`F=o*huxb4gi=s#YSdv^azhc=9-^rpRT_Jz(nbsgJVlNmb8|21g6 zU-`Vd4f+DF(!r)B_>elZxOf21_Csqv|>s?5VphNWB|u_$yFllQmV$PC3}^MYPi>9KqHQ(paL10NLmen`L3 zt5rK5wMs0k5ET*B{cozkJwmJ3aKT;_^+!l%1@O=!b_S=7yfMn~J+UkFDYL1{iPY~D z+>uqmoHOXJun7&E8{GUvmf5rDVn$!uPt3I_+w$ zm$w`p;Ww7Euh_S}wJOEV=sEW#qLY`&H=|vBNpj3b|-ybbi9QV`xxmzJb=|d$rtOr#E9nqY?^K>&Mpt3)zZfD#|I}QniQKS zUCvIwBeI<{R||3MHEURJN+)RKuILrEft|B6O8l<9|AOMBU>_wL6lZ^%iH_J}(%YbKKYK&#)iw_|1+xTDoK%g?6>v#Kw?RCHb9kpNY3iH| zVZ~^-GbcARPPvz%$h!^qyfc5>l2e^2_N!MPx_UXF@)1cz`DBt|;eFiq!ybn50$W)_ z*e)lRsls&%eii-4UOWn3QU~tx-kHCdOrB7JZ4q}0y`{JvE7l_#_6>7?w3rtu%d!O-gJE=Q{KYrJ8AXhnlnQA zWzUrA`rZ*&yIk1VMcI3Q7V|MyX`@wtV=ybT`VZOIhS^3r^|5t@Yg+Z0v4Tqqmbiju zrB4Cn&V>nu-p}H24y9c+BU3!YNK*=}efoY&;G-Mo4KI!axX_ezVFRH*(g(#_`=>h9 z6qA)7>@fNm;XqltdktsjR9ykPvrv@K?z9s#9w$v%J$Z^>yCTcuLtl8IMf6AqUst}e ztJIjsnGuWfyw9t{QAuwcT`|6dspD^2vTfxoRj28s3>8AJwwP-i``i9X5$2`{BmEp9 z!W7Q8n5a!5U&2?(cT|%zGJP_pEtuj}?hMdI=SbgYz&7!bS%t^Gnf~@PQ$7v_c7>w* znX|9>a+ecUn^RnW3av#shh-3Y9TUv8>e?483!EYdTde6`ZS#3nyqW9BHR^keAGfJo8lF9q#MSzFLm; zJBCWw`d`4$l)LS-wY1TudriR^3uBX{_Gtz=z2C`9mLUbVbC9~&Wg;jPwjh8 z^j1GDq9^=Mg{o*c9?Lm@C;;8%>Xuf#tS6Y3bItc1jHz0>NHj}Qh|Uo&yxr4XA-j1C z&8nGVo9?v9g*vbHDx){vdK{_NVQnF6SfoU;QrKncpgQsU&q*yS#sl0?Skcwi1n*G1 zO18_2TRv^nNZI0QV_(w35G1gWbSOmEA#DmXevUSDxE+h5O#)rfY;O;)>&! z6Dp>SgN=G`+#fk`J3Uk0$MhuBx~lkT=&luCw7oWJOYRrhCYwNJ)@S@HdCpGl|3)bgfp!H|FYf+4oW%p}A(;@s6W8;8|Dc|x{LX)q-Uz#{;jn22=il5vxc>orcS?-5y97i> z<@HL8BC{?(jXC~kW6I5%OZbNtacgsjCqK1{xkw4^EpY0|3t=(*D=L+}j8`?uqJysF zp)8tI(q2Nr1(Njdr4X-44K~I)*3-VZB1h)@IIxZrmLLC9EG&b^>{Y&Nu@Q~8GXL`c zwuR!o#NuH7cIY!5>57$vH*+wDm9?o05DRSpvuL zj2m9MHsqMu2eY`fdaV*#WtrHrX6MviTh)n#4>wt8($tlET5YMIG`Kw#|+| zEhdt+>j@gkkJT6M3Zal0dE&>PloNL)&?*mtgvmdx|%$PVoOxb-RRdCt3z(hBUmFdl8Li=Y*_o?z=CveHSW z3dVfPhtz5?tQ#`@HA;wVzwjTG+~jO#G|?b>dh(;BVM?Z2oHaF4Aq8wh3_7RUWn-wC^}XzOaouPAqJovf%F%kH-x zZL;X{EiF|=+a2SJcUjh`*1Pg%@4LkGernOzJ7*cW4`#nVonEhhx`pz}?u@r`0q>b!`fT8OjOd4wwb?s7s{Ue_iKkoZFpc91?COWpMkJdivn(>E z?<*0nY(ZDzb>cFe<;wh-yJRG1QC9tC8=BNV@0^}#&#SrA{-&^J#9y<^$8b`$FuaVc zmiSZf;c>rLms36AX0<|fy%g1<7kfld9hDuw=YlgE>pnY`t~zUB+-}{` z%9?EN9__CzYOR0Ot~j$dJC+F+$>!`cSGuBbMRnJ9AH||V0ZkuTMD>nVoKvht z%ALFuJJKcsEKHuV7+u4$wSmZJt@?shU65Ab6Lh(I>q!7#P|LX5VCc$ zb#&{D&?m2BU3S$K$G!S%D|*Wbnu<-$aE$Ctr+lqXTeknYCV4AGFtqXpUw_6*({7@j z{F+AAGhxSa24!ImyPM@XD_l3-@^;T)@6@)5$hh2Slx!%ht@Wu> z0b4VK>4&)Xk%&wAK1+^2qKuR~Dwln%V>=6Hhl6*8VH*ak3peB~MP-#HV4$H$EnBI4+O9yAGLDs!C!6m>#@u?>hSzE7V1X+fr_FpMgcMFkTK)6L0zHz5FLnW)W<&wVl(rB96n`5M0OEs3oZKY%_vFDggqXyQVsusuJ*2;}) zrI*gSr@j7|e>oxsODEaoh7<-|6FJN9DjSYy3F~w;#J%CXQaE92w&T>0NUgi!24+@t zz=_t4i6f3%hK>kp-VZ*X)njPR8afHYKoY$Lfv_&>WbD(zVfRl~b`=&4HTPoJMx2+L z|M@s>hh%|IQ||Ce$NkqYQP?|93ULPXv<6&#{yyRB_aEA_YgzSbi>WgIO;_7zD~o2l z)sJ(uiEisY5ek<-sSsV(-i<`rX7kD(ri&VkFw}?6nk%8AM@1EY9^PK*#-D0Uk5=?P zaT1F6Ugt}L9Wn=!+D<2e*?S_pmK_=6y4lF{S#7r2wtYs1uT5C5G7pA$_jB2 z#~4rJp1PJ?Hn$Ft_PLxX^v{T9;dCkS@BPuQrjfADm7;^hYd0c^s|H^%Lo>qVXK{R~ z?Yd>ck#NwEp`6%}v#x$j;TKl`K zs1))@Vd@REPZ8ziji_#PM78`+f9Tt>n0+d7TQL~h1a&*XlZ)(2;wmK)hVp&83TgSy znocbrZPVk4CKjwvNLjjm3Ui6Qk823q9;Rmy)L(^e_=J99v5o*RcN;uhojU?V5Pyh< za(r7^YxSO(2ak-$e2i|(5O|~?Q-~?5J(Dw4h*H3hbRW*Mx5|$@P2$>aj>~cPW`H9ie`p9ZXz4 zu05fA3X-6Al3t^?IlD@YB0P>{JhH>A?=$$`#VcdN1xWzy!Xt$c{h&g?B8hb<(LRO}iPfns6cdxiFsQMkv3`_L(VE$ zG6hEGVBZ~MNfPxg3)R7t2@M-8#-jj&>0c9^9KW2|B`*De`kdj?;Pif^zoA}*aA9NV zOojV-LzLN=l+Ip@*_XeyEZv$9sS_FxW5}T;oPFcJUXoeew8bj1a0PDUkzSXRY6a%f zXsu0zINh5@zNud+@-7-DFu05`g1J(u$;+BCq6C&_5FQny=v#O$_c6tr6wuQaQ`HwX z+%0uez(~Kiyy>G=RwYC3hmo07DE|1H%G0cpvZu9_2!(U*0chbD&MOosg)V(8_LPY* z`*F*j-+^v5R)8&3UMiC?K^W6f$}7=>U$sJU9{=`4szu}X&dN?sHMmycXi}d*hXS;^`#mEpv`GY zmYGjUj_&D^b!GT)!ow)N|m94dN*8J>u_Vl^lz3x{>`*Qq*u4mvi0EP zQAZw;SsPlvo>`ey!OO11|LCkf6>N83DVis77&6vpidPq=zV!O`GLt+!S?PXWA$mBf zz&=$zWO|XHLV~V`U&QFiI(&K6Cx&LwlD*r9^qk={Mp{_+;2 z+g4o~_>pKUNC}zL_BySz_~+4$%Vjfx0p8lTPriw*$r-X+_jz1b1LXeQOj~)TctFQY zY5#fceiPQW^xYz9P*E8wwo|*=3o10tt!bBPD~OkAwlUu3=9f~BDujdwVJm%$UQ<<$ zKd&u_P)LBkwF(dM-7u3{oFuEQzUkSJW4D1YF}@y?_Hq+JW2WgA`a){dQf?k%x(v18 zU#Q(hr#TWE8KfM{=^u!L;R2Ug)!uBx>sHZTG~#9rrNG^>EV6x1#8HxWv{BCkNRe1{ z6%@u3litl4njM)Fl1m9XpUdQJBnUYh09p%-9C`WBb%kIqIzKLv-&xNw7Zw$IaL1jAILgdZVT^zP^2$HC8zmk^&w6MpTRRNgg4 zrzA99%u`}#Rz|$Kj&5q1TkmkaKRPYscdah9N3PDIX%#2ZH2UxND5_uvCOZTRu1Qz6 z@Z1}@fOu9)Gz*6Y9&tPIUN<^rbibM2kSKCYBS|zT@P`)fFL zWU8i>XTQ3Sj#I7~fmmB0cDFBkL*>;azqV-ekCsoN?hj0pxcvrE&bKaz(GVSY#bAr& z(19qwKrCDsCiEHP6r-p+{DGcU{{opH$DVhOSu~XFKA7ncWv=3R<;}i>{%aZ+~SqjbM3!h*m&dvJuqhe)MGsvOk*Aty@zF zZSWVJRQ3xZ-2BK9Xlp<{&d!|z-h%#yMZ`nu6CO`QI)PrI*$ri_y3j%b>9`{o(M;73 zi`Ho9z3FL%ko5ybJM~+5O(m0IP2|3eNw*GM1cus9IWqTge0@lugx^Fq^2!x(@0!%& z$jg?$xPiI3W6hnIswC%|)&V7y(5Q3q8avr_Ka>Jvs(1tl2X6zcLX7*{sItS>3r7!J zK`>(-lz`(v!<%1Qh!9)lSNU>7gMb)kfB;2P2XB8srT8W+VK)duefxv+bnCv3I;e~b zcUU$LMC*1?Fh>uHL|ns16&c(@qI37r83hwjg4m18GnR*-IeXX(6vIzQR7*a7gP^9j z2ehPr43#Q_0XI-?^+e3FVeCivale-A!#y;fR4BSvs9D zIX2Pch}3YOwM>>w>Qg`L>b3H;`mgM`kxDq~-ho_J%E8hnHa<@yzH^u283Yx=c z5M>vOe)63n5j?A#nkf@46IXw}p#E@ROR?0jsT>uY(fQPSPV$lpGC{^=$tuCW2>LMi zFF8@WIrjKdKHr256hixaFzJLD8o@{J2`8U0Ijo`eAl-F;L6E_C4k!Fa2$BQ_0U=B% z9C?(np0udwA9EIh1_eZe@j^Mc`~94-_bhaNFz$Skvm5MiM^p>C9v zHnoc9Vro>o=_7jglRMJ8k8dCy)|$sL#+X?j_E0@)`Yz00pk$;q=hgvh#|6de11rdxc5hhQ^lTaCC-XB&A%cp z#D8S#4;ZFW^xjBsb zBMD^lQ>N-m0ZzZ8rUU06YL+^IkTGyw9@-zpu^K1vSfI zg~`_8We?bL7{S^w?p$$RGZ_Cr( zCC{B%`!m6Fg?PWi@jR0fqKadP1=_?m?gSzS%E-7f@+B_pvi;CtVju;E06(=L^cNp! ze9R6Q&zag-#MqdHVwa#`6vwe5+BezS1rp$t?U5+x3O|dS?&NPKY{O)W+lKbp7^Xtc z*ycD}=!KjjU5w)RVp#W;k)irhSv3c&(|6G7kiJ?AxJkcyK{s63Er^*lOtGg?4a9AE^%2axW+2QZsS4<+e$2lRdcwE59nhs1CLKa}edZ6cvZg?wF{g1n-O89kw7`&!Qt$K% zqM0Rt5XafUBHe)2+*{>i|A~Wkhr?r68ZoazwLijZRnP%T9a|tzN`hy#!T4#puf`?B z&BP;fR1DVUBEDC1uI`RvfaTXI$$6U_(H$h5{Y#W2n?cBm!ZXKEWW<2m;C8AYBfzyk zwErvJ+KT#MbKLBKS)=>hN}oCDwjdkip`%EyUKV}^aak^w$jQ(z3CFZ;?5NXVkg{*+ zzUMM3W}Gs!fgdqt&*k1jtLtzUZxcdGc)gZir68ewC9)f{LHy~wkrwCFjhKqE*cwmP zf<)Vm3lc;K`j^}QaC`nG-k)jo!mfR||zA4CW`POpSMI`*7g!HlO6%5I~LqfXQGGSh9I>Z*Zca%!NA ze!Xc{3IX~?WiE3ZK#c7LU>K6+v@=^M7roYj|Ljnh(M_I%vigcY83{AW%%Xx!aP^qe-&D0o{tR5+T@RNeN%$qIWm;xyaSUBI4vexc z?^i?)py(LP-TrcBR!BGB95V$jCD@*wQFUWK9^oRrj?SK^Sp+wdfEzj~hq8JO>9Se< zCh+hu>`9%i@)$tPtxXJZB9A+f)!7Yh3sxIo&-^`6R<`Ch@{HVn>0niQsa-Tr-D*zV zuHjWlpSXH#;Qqk#Yq6i^~^S{>S%-s8Cy!Ztj}x%mlY>dDgYOFaid z2QncYA1A0jGjkU-7Irzlemz%1M=j$F{56L;W8gr=4va%+U#3wiMXfx26`^d(ls2Kc z1<}xHVA*h0wE9-gtHR3pGXK-J&=yTET|rjGm2LHEW!6^UZRfC&9e^NXp@|&|cPiSb zE^_sXMyYm@_M-l1MYN?l$A`NaJA6G1`UHt)D?un5VRA)!&aSq1#OA>%b?8TTJ*9iA zd|WJa*oa|W(NyrWNDwheKr}ZBaHaZMa1^@VeS^N_K|u%zY^8(m^itAoCJIoXmmD`$ zI<>2S*?wP?PMKIgd{L5pcYTW473f#Fl3z8k3tYo8H`Y9R^tsPONdk9(sIv*R`HifO zVxo#}_yU;vh{^5L_2Ab6zb`}heHG%=f|zOiKujJO0eOUh`)R8J1b_zNS2Q~1VB;LS zT%U`;HNrgwptPym8KgrzQQDk9hf@yDD+y+ipsql?aFJQB$1xQ4U7!!}Kh43voZpn~ z!$0CF^2NmMY#aP3-SP7AFuL^s_2eoQTnVvhv4AixCHnA*v28%3WS6`4Lu=gV$%BDd zV^oS6H(0QNf1cy12`00}#2mSLnO{XlBHaB!!gnmL(jO#<) zf1o>=wT){rFae9(`r9#S)V)ludzbvr^(9b}Y4ozGjJQKLgu9X?3g|y!DSJado?B(w zu=;e}O|)Vf2Y~fe(eRZWxJhUX_orkOy!534wDyyUt_yP zy#FdYQx|?!YKp~+bH4jd59Ztfb6hQ_PjF5?kOkv!qE%L{61QVMldb)$Y{xA?XK#gF zM!{F`46VlD$RN|Mu7_3%*EVYYaG@9dFJEXrqMGpZ{+Nbls~*3Z2I5QuD7GWMok#3L zr0QF<$(ct*A>#<0VabE%V^0K79sX9M9jmO)#Xz zQm|(l?vI5I5)bh5n zy7uE1%aR{AGp`c(NxtY$ZdP5Hdkm?udo?fP|7~)E>8&Yydk(F$aQXKWs;T4O<`1Km zSPC}dR=&+UBDC!_OeERINO}gpsbVqCclX`#$vB}pPjHCuu{0hh_7QY44+^_vAN|PW z-s3?Vd~E%|>E$xOUVmYxYD+y@k*8WofM<0c~1*vp*^zp%~9Mg^Lx|e{Xzz#zz zE`9L4GT~{|6&MQ4!ki+rZls67W^o|u)cPPZoxtbsv z&fZ$aR4u4S<9Xs${;E#Yzqnu5g3VZJj6E*~%(17wM#mvyv|;TJIGHFxL>!1UsuYz^ zs29{v+gz=ITU~;zzwAaERjKSra@89*-8;=cy*Dnfu>gZ~m`9S&KT&93zP7>{hbji? zQL7D^ipA<$r`o;}CR};bwYFmoeZvYL+Z$Zd1V)@JB@A$|Xda^t{${ZkL!<~gC@i)K zl~NXnj=SHzH2T?BA@n>Mh^$;qw`PNJutHxZDK=oj6vAG|u&#Mry>itK-KHwR^hd)* z$%;*Dq02lGuFDP*_t&q!CigwNEu{MnnVg9*?e`>6Z#RFvHZF&$PSqAT-V+2LC=Jvn zUrD@^QQnoNt9>a$ZKJ ztpq#Mp{Xn``Q1DhtjOs%xz98n?IT+7o-h&;xY5^#n3xTsGu5J1oX@SSy*aQYT*G?O zQ@D~fWl&|`K*P2v`;ES-Qw>s_K*l-hJY{L}kXQNpiLp;&vA59i)|bZ~YtKU*n)`To z>Vx&q32~ChWN4n`p;q@8?`0d>)X#5%M@C5CZd(YMEYG$Pb2HlyA)h%q+ft0;sgvdN z-@<%GCesDm^yk0PTEnpy-)8%Pc#{__cpkN#JpS>$>J(Jd0W8+eJ{X-NNVkDo?_T$j zF0r-jxg@&)Oi3M(Fjsa&fhqO~tFJ%*eKj6pB@1SwpPSC#^?|>?Gu}Jp zH)k{}$&MFgCJPd7`+kRwKOX2KB2%quke^=H_nUvg3)Pil z8&>gyj8nXXTv=9Ft^}4{r{v3wK(6T$z(G;q73{* znKsMkMbKe>rm-B);BtR`G2mTf0T4B{DfYs*LZJ(oK>Usug+@h!q<_#^C z5lcuJgL_W&isy-V-VB3OGOdlI#I|vYP-gNImRil!@^J<>{sQGQIN(kS@d1qr10Hf+QcCwUT;ywK~geTtP$ak`ZHg~hai9T|-7+U-{{I5&*7=tH06$77Ah~c*No^Bf$~jJNd4^6B{EEY|KfQusO<`PLDC>YVE7-tiOwFH%2t9Xy^uh_+`9hS z%X|Q%*?L8HgxHVwa8?vd!Avb9&E`(5FyB6|$X`Z~5n(<^>w-@Dh8>(hmIn`rg!mMK zB}@>#fi6RaO}e$03hN#WL7~&lKxF!hev+#j_G+EB7sX=JUJ4U}H)&n)>S^gK_;ke+ zN+v(I+F4$$Qh#=aYm;WB5ZXmmc>lXXLPiZ>Q+irwrwIgzVE;gI&Lg@c#r_>p)Tie_ z&K(i6;j_2x2AnQ%b(WXq%xJ-|k0UZ2paEtEWY$aTdb*4hKqDh|vXRIxC&pls2%SfK zOA+FckEVAcD?57i$c*cC^?Yre9v^>jM0!JgCL%){Dl;u_>y4V2Al+LB)X&+R)rCrcZ%{{NMnK^6kL``PpnqFKw?fp#Bb1$u1-m!Wv7 zKd$O|A#<@9H>Y1+C)tE`6Ou(?=m{)T*Pn)*q=Z= zQ6)fe{%!#WmR?)nfI6`@yShtd8R6Zuc4Kq(g`* zCdspT^VL0W)=t$iSkIU z_XAsUL3c0F?O4iH3z#KL)$n?>I)8Pc*yW1#0=MS5>7%jcg#AWu+uOu&6RuYAlfN0C zj2GK9uN;PY-V_wcHPm~hNq!-X15Lx2jK_ULR*L*$VtfbZWR9N{@MKv*J83C$aBD{} zH(&B49TvF0zj$85|Hto9c2iINJz|ACdrwT}udV~l#k&JRPopd+Qf{9#=qI4Q4QmLA zBKr7)GWrPzG!`tVcf_-f1@#lv2F0HXLBVkCgTtcwiu=X>p4ScjM$=M#1*^f*Ko&_} zN^s-V7yH|l`ICwFN+R0^aph)@F?tH7aKR63_y|1Jz97S3Km}qTl8psWbYtbIVqzJ? zI#tlGMS^FL-(Mf>1BC5T}$DWxzG2x@0e^~3$MW?&g`MJT);OoQ|<)&pFT$V1-bXA7cmL7w*{ zr{()%mLl8c)xW`WVo*%rHX^lw_Lt}=`ipWwo-k)n{k!n8*Zhbd1-sxm!Ov62$LIeS zLZrY^{>P2x0L`n9<*N>p5js6D#`Q00H&dqN=eBTNpSk~1{Fea?@;wSE`Y(! zh1%miJoPt!L&#x+*M$EZgB@j9_bK?Fn>Wy&HLjj`RagTmi}(*%6#F(WynV!vsDT)* z#B$#1^_zuO%)@ipwZuY*Y9dU?iVZ8j^N2^l;lSg~T~Ayvz7dcPG`B=|*-gOVySSWc(j_hePxG8s0F4U| z#UJrUj@_neiEuR+>$~6u+Xqe}x>I8At!)?|9<{YxsGdF_@(z&|FG$D79xp?fL)DW< zawFfq&G2FIk$tdOeXT^T;_e6`z7u_lH1s0N#x1eO+4ARx$xpc zVa4EezabT{MQl4js`!WmqWI&%W=23H_IJs{cc@!>%luFO5RF$M+|fe}3!)n@u$D+I zLOEioeN}N^zajsu&ne+Duj+X~3ZUUh$bQ&3{YbXY96I#D>Rd)xGqs)T7OlK4I)<LU_-5O93fxPA@*JYqtpZlU1_o00R~o?94US%5eF*)o5CuEsLGYS;|O@f%Q5 zv!7T_Y-zy@Am8NN*5!J#LIO9r-x$P;Y`v}z*dr~~Ek+&@oBIM)%zqnk5|-$$Gyz1w zZjK-ZmcPykAwB>ClOLJi2 z(-;1ofV=3iSWSDG{Zn2q`9QGCBltOjfc%Sm@Nj5Lk{-;LS-R@M0a;GsYMu{Q&IR)$ zFJ;c1LW0xNBH9;2@6KisjewW? zx!^5;#BQDc^D#t3w!B1vU<5!ik=eC;*8vwIpyiKTB!H*b79vkaN>~Jhfa{vIfW{xp zw1azxCdVHEjILS_1m{8mp?7d11o$0TQW`naIpj>S5Sm++3?dXP$XmLQFAL#81kYZO zt6NTq&TYjL*`fb_*mQx2SRG)qp9xy5yh0{cN2 zTpZv&!R!d3>M;T^pMs@zwY|C?nJB$B^d2k`M8#+-wYp06PWN_?5_fFWf7zqm0(TpJ zo{lOcz*wv0zW6nc_?q5lRLVh6PVQLT4qVSSn?& z!c5pqWRnBv$?I(+7Q7oB4a6#f;tk9KP2)%apHQ*Wg^>{fg9>FUdc%n!=% zkTV}Vh#+YdLgSo|i3URAAI0;1T%VlS9}W>KXvKIcm!5ktPAR^8n6{gJ#@#)Qt!Ix6 z8NNFQDn3GjB-5$bx||^wHQX){06qPgJ~?nd#jfZ7kGl7cYch!%MkBIidDA~mQW(q#eZiAq~hh=NE52_^K9gpxo=?mVHt z@4ese`}gi2Srg`&XXec5=gc|ZrZQ^3;b;7r?pLuo1$e#bl5S=mf&v$T< z$n3LNWN;;yQv5Q>Zl`E1mH$z;?0c3(p-va*?HAUR#5St zPZYXG-HtK31{u>ES(D{lz4A?*{SZy4xAX*CC(;{qX`N>PMW4X){u zzfvdjpMvm(_J;_U#|dmz`n%Pq@*hBCws<~rpt3cz`L*(ClFG>re_d$SjelV*#Eiw? zz%=iRmvs28-Uq5aU_oKi?6?J7m;+iV@EJanbh}!i?`;+5|4j1k-GkMpuwF$>wNbfp z8QyJ&b+Qlj3%+Aog67Db=&`zFoQK)i7(j6HGn{_%?y0OzlNRpgImA@6dy#m z??P8>79#s*F^F-<%0N`l8yo<1Vo`~$z@hus61x9E8A6PsjK?@2w3>sM$~M5jAl3k$ z1-t;f;lv+gFZ8C$z!h)$L)r=b3QFtf!Jf_?Iy9D44wR*!Veu8{2Qd|1GQbi-f?xhN zS-DY+2ei>dA$Ic-*xDuBg&wXuxME8ZqQDu7A%NC(AP4c>SQQA`EN*ud!ZHwiy(GTk z3CP6`ew|;$-1Y?7_8TCE*#19|-f<)Nb)G!|d;ma_8B4wb0n44o*O!2m139+mLZ)*J z1Rx!L4M4Ua;HF^Sgf1_id;=PgOjOH33 zb{1&^t9l=7;$KS$)#i?7j&(tA`~(-kJc5?WJ4n1j7s(Jh9}gS?a&172aqjFF7rgKb zvsnj{Syv!6=>ISdImA>s3=QlWOTGc58(7u?a8NKF7*-sE{Wk36DhO}Q*x69Rn=Lg;k*w1(G?% zec=z#dw{#mqP2IZbgCl&91ZGUh$JD=z{8L=pYeW~z|K#T|A^yU@Aj4rgbewAlR0(Jnl7Kq4x?(~4@PN!r z*#`VaAE* zWFf7Ssd62h9fWdoJ82-3KF&Wl_z7N&S;7FM9Z1DdvW1?)gKGRB-*_1wYAm?%dD8&Y z;w?921NLL#T!hp}nDgu7koX+5c*n8^YXRl6n6qCwJG7QeQK;WL)IFyYl5L6CJJ=2` zQBJ*WzMbj?9aQvGHp{63%V>ovt3fEafG&6`a9I}e5LSSm4y}D8?l<2Y(~ctNNv11N zt9U319@jqkOE~jafg@X=?Pyh{(d0_*{nm#l9&|bh*I|8bZnQ19CZq>qRVz^mKqaTo zuJr52wFTw^|7<;CGQ3~!o%`qHtSLP6Yn}-|unCrE2S5(Frx<+z5MmDVkd1q5$xOQ| zgIk$t*?J%UD_65Av{OrkOVxBH`rawNr`KANVYc?g^V`B4kTD!KGe6I~y0L-D%q((} zE@TY^aB=Nfo8DPXF*~EJX=9+Gd50giI{~gU-B|0uDTQ`4&1%}C*!y}%d@OfrBC;de zZ>lCopy`E&VlgY2>*P^`XOnUe)74zBJAUxuA)-3*Z<>C+rB!?w9jvQ!39ELK62D>JMog7VRrVuBmZbY`tcG~!B zf7_05oek$!u{ACcSpBX!B){>n)$GFFx*1`Dcriu_+Z){sNB3f_XFk4()EPt6Nc)XG zX9yjgEyVfRPnKI(febZ!X`nGLiI#d43uHZ{)4ei^oRnrBl4>wqydTDcdqiCND66>B z*L|{W$g^gYRT=0rQzege!bBA~#+%&}6Ja=G+2NEfWLt+ZoN#@zO-0%Ij;}Itf;pTb z&b`?+;x{smjV)#NnJO`xb>DTeK1DEEp=$bfEyiB2lo&uZ1VCvVsklZBX886r|55fY zy|{xpw+MIJ#c~w66E!)uGr`~bMCukZ@hRy%X3(fKKYuMG$W|iG<3XC%e$M_u;*2k`bG>p5D8}#X zYy>fu<(w9D=*U^e)?bTN^)C5Cy1`U&hwY=G#O8SS0>1)$3WnRmZkEKp+o0PDS(+bhkR%9IIWn`sK^`ggz1rH zSv7=q@n}9ZewJd(zM98W*#m3Y%8^_HRfSz-&l|w~4{2)hNp^Ezw<;*YQORZDZ+J?1 zGw%;+Pjz_SpvG!yQ!P$b6*@YQ*NiXMe)utUa2q=X6)$Oal>cE-OtKqvO%rvW5+6#hJjgIZ1Xo z-#GZ9vE&C2yrgv|o9uFMe#3T*#wYd3NM1JLq8U^VqQ+Eu!#a+e6XO$pyi#f6`FW)% z*|OBM`=Fv}BM0mGUHG?F6%K(#38}79%hzG8&LJTtiQhB5n9j8rDuH;2>WpO(WBi!? zwwhT3zCR0w-ErKE)$CyFs!N2i7|+@;cJ-5nE~M5Pni;##nbY?dP7G@Eu%yEQj*pUM zn~UEEIyra17JbE|9$Vn)(Gchy1+hKGP*8*hiReNZrl00aHG`TyS+;;VO&3pbrgCE9 zIRnkju33_8S?LJx?~WT&wv49XLX=HQ zzq8UOiejVop<=pirxqgA?077wvLp8=eCp?EIH;9p3X%|J%=q$P2}G6$4!9hSt>IUK|cd$_2R;Ojw2mX4nK zs*HaHhwt6a<(9Y0-%!Jn3C$Fp$s}(qWwq&~Osyf))okoyJF07mv*W(tkAb=<3gpIP zlEBZhz*U;h@+^J%UkI8Q;!yPrBBH*e>d@^2-LeIuR-Af>(ECCHLWn+n-nm8x`!(`ZD8iO7n0DTjJq)gZz}5h& zU!+tqzDF%cP@WN7?@^%CVw@*OvWSO$|G45vnbT_dmqQVeT>6uoz)bAj$+{er$tj@x zDY0EZ*8Vb3jG+XW^^s;0Za*SBxAS9lW}TgZhh+7;k835D_%iQ}AgJ;HZ~X@uwQG#x z3NN)w{*=9*Eus1M|9}}!$(+{*=eZRa0e+Y_q<8`fF9$OC)E0>xo74z zc^*jSJe{0*X*9o#C(ts$)x9nMH_HG3J-3Fdv0wz8(T~6SC79GfjZ$1wb`_6mzl&zftTT#&{`^ zRd)yca*$T&nrbE^2I0!GWq+T|=@!OE&o=L%Zdmufk8%uER(|`+s^clhcE%I+u^!u2 zwL44m&&z&b%JR-_{_C8_P5^)htYgKl{@3{~{s4|-(au{sqZJ6aG~v<$qBJ;=?Zj|m z^n@d8;o_`s<*s|Qooi#&mliaCa4Hwr!Nv#dXZjyPp=b&T@jn-bzsP6k*a|X&){MIy zHaS^JtK0$1<(0ZjH)v*fk26f-4Bv+;^BUw1d0PGgacH4`=k6aZKby%819-QE1>+;H z#Kr&p?jVN(m1Jfc5^?twd%-=S}tlwAob-B$qcy3 zR;iCS+cp|e3ZxWIARlP{#?o-FHnJ+asabTD9u z+-x2ZfVpcU$cMDN={>{1z#d^2`X^+naaq0HgmTwphvEv7r?oR19i|)l@qFP%ai>W3 z-4#p%WQ*WQj$dM~Eq2SFOPNKhM1{Z_?K@B`X~ui5)HI4$Cv) z@b8Rh63c(qeSyvXdw8EIw|r6|TON}Ist(isIMBHEnz!#GXq|)z#DN9<8lqT`ql5Yn zus1yS?y9T1%fE`=Y|gxJPh{ZV?6mrQidNHO@|+liz}*jL)37fy#s(a|ywZIOYU`pK zE?}_r9)ds4P94fj9-6{AnQ}6-N2;B2)^ZZD`626%bm6)WEm`cqw%Url`#xxkj$hNy z{J-Cov|SmKKT?Hnx~^D-H_H=CL(?aviscEBm`sQ3hFWmKM22%*zOM=4jl2|9zEh|7 z_LW|xyDX2I{9{F71*J@%4p0YwNJ%+nR1sj}a(4TXU)QbzZw!B%`?uUGeYl5P#^ynd zt+nrp{gSMsuO{geG>z}a8H7!Rd+Z7wvYmK>Va-s8&K4D7#RW;<+@#tH)4qk7=MEmi zl6^C-0jraq4{pXTb9j8hllL2g3iH-YKmR)V&Ev|sDpM!lz2G@<=9y*=e>W3r?=*@Mhw z1nh}K5Wj*o{2O|3->4C0aNNr=a+QGCt0@^Kvn2hpl21%2=g)X zWYa}yO0w1|r1;*5;s<{{dQlt>Dq_eByawjs_5NJP>qeh0tyN~Ni}A9Gyke$dX+}8y ze&|nAvDP1zr4<8mRk47j&bmV1$E*%SB%_Jls(y;k?`owJH| zclVz4ssr6*oIw2*WQw${a;xWX96ImP@q_|l7B$>NCMm08>f6Y(GDEGvYUAUy9GWXj zp@$K0#rZxc)G`Eu%!1h1KB*NP*_?f}x2kNQ)k(p2HplU#zR;0Xd#uw!svFe&P&3t^ zrm^4l{E`s?G;Gq?tcJ z=t=YHV=b^jlK(3hK&>xu0pBI(C?uX>BEV+}dXYI(JM4zFsH=&mpXXR6oV>?(;0K~e zm)j5j%VK|#Wp4kQ^`|Q{Ut~I#-9?{A2XD!`WqB(0Q%rlsmoFNV@6I||tEQBi1&7t2 z(O3QW-*DyDl=XWwer2AqT&GaKN!DEQ+-3#Z)?58gH=hm8FR7s(CJn1lOQ`Co8@0Wq zXq`{OvFcOmsB2yXuMP?b*nn2P0=l5lD(D4$1~heE_zDAkwafA5j??=&Abk>a?pBzY z4MMudqfW!lfy}VuwYRXNg!iF{+VMRc z=mBAW&>A-g;mToe-MTeo;||qdwUZ;Qkq<$4Y%HU%=6qvS0}aOwWT zp%EHO}Gyj16M$o(sv{>X|NkvVk)XXcw5{>4yR%Kc@JLjR9Y~Cl}Is1vcJk7zYua1 zTmfrxsHQ4%zN>ML_MBhX8E9CGW}AOQy%Km4B-tB0wYQ@)NYeYVxs{b<`lGL9=i1&$ zVrAAPR)rX=vZ`Y)(&TUBM|a@Dm2g>Aej_Z0;KoSeOY~nxKHot#n^Aa{`lvX<7t@*g zv_UOA1Ti_YwA8cgsL6LE>o7#xtR%z#l4p!o%ZV`w4?m5^`~C{|VmD}+v|lkjH1Hv9 zb6BM}nE9*l6-C4ii;I^h*!C4h-Vw+W4&7ncj(3Kz`IEs{W^e|4*yc4T^;;AA>Q66A zkvB(1nEtp7>OHP|lUj-$BqP&5o)widX@6nsi?)t;AtSYJ`#feA4YKU6BQftyOW>l} zsU4w&)DVPI2X+3u=P*Wt;T_hZCXbUB)vmO*4kzFY#cZoysD((oH<>9Fu#h1?#a4#vAtmrL8u-n-c(_f6D& zu$Fn`Rv872jXRsp4sJX&_#q43dnsKg zY6BK$;BMgf0;Et2x=nUKi;M$wQuX^q|wV%hjxa1X=d)G6iFhIt6G>*Eqo=kaStaQ!4X`xMp8MSVJDgNf#e?RziHL(PG@DK?pN6}?LBGtQ^`o{atTx!B~>NlNed$x-DJ^zqU7Ag~XWQxt|LU|w7xbw%K zOB3S}?A%G>%`5RPe1`aLBugbM=sEtkUu^KqiNnDunrKC*cq?~5A3~}DzMFBrF%p>+ zPyEf);1X`tbtgAIN45`1PqGJ&0JW{8;7-?l?oU8Y4zpCy34MY1?Csh1PIOH#XkLNEi3p-84IY%QWa2%&>r7>-}_7Z^(Q@0aB?Eub^BqNuO0 zZOJ&n-P4C~K~CnB==E$817&xinZ9!u!!W6v0>r zmiJwWbNC2*`CC=qf>-)8K`oTISz%;kU^ht%+Hg)VxDm9-2B3!)_Qm@VcDNZf-v1US z#4&8ockbK?ld$`(gQ|@+UzZAUv&H7o5fWl}Ruvvxg0mk09X7xB^wlMupW`fZbE|M+ zo3RO;{?iBxi&fVin|BVk&_BS@mw{zW;V7B>34{j;-h_OE^@#8wMEEq-Y>A*m z{e8s!`=ss_Z3>7UlfKaHsmByuz5{jsgv<=STb3fX$i5Bb{q>1urE};75f?tJ3cl)n zyXei|F7FMf$Bay8#`mlMa{Xu6;b6qg7-|2Ot@oyn)=#&^Y{tZPEfa+H6N7kF{+*)l z5kHgDx|TB{e+?IAWA5swg1<)kRlbgO-%*~UH=b&sLQ4)_b#tre8NtB|V^MD7_7=-! z6n{dk6z9k{*lxZ&&1rD%D=@_E?gTPs^;3~wnSbgddClw>`F*LNE+a_yxS?wR>F^ue zSillOA65nU19Mm43qHocX*&h!IIZI$JcMijb8y`_*zPq)6eh=4z6_RkV}g{+XBaMH z7KktFc2TcN4w`;Eum4^UeVV^I&_b1V(ukPjT&vemyu z)V3*Og$hfcu}=Ss&3a3n0J9t6YN-d`|)A5nR5?s?|RdxqF>lVVmwx z??69*gLxKItsGji!KyR-oBUcf`@Mq@V1c&*4Gs+F2V((%7Ztk}xPRZ4dk+$B^W*JL z;Z*~dX>F%rx2#~%DE>_WEn9qVi26O4pNe;Ev{g5^V+%aIw>;hUi``V;*PtUbwTw0K zC#*T0ptI)nI|A3qYGfH{0_ei>4)VG0S(n#48&^S%2In>>=y`J5b)BwLh^|4Xo)fn7 z#>CA3z`;SL$_PLOiJvIKO2}z!0g(F%HnxQD{0Y+hJ9nKK6U8j78`?8UXw^*{fNPu3 zeNuimq*j3EW+s5!-+m!FOFUAT?}y}RuL09xQH;nU%=~Xi`bTd9FvIZU%}*_ZJ-~VY z?c48_C)}=x_dc=s2jWGD&F0E*f^_d2TIwP3Z-8uA)rt4V7vLFOavAu<6(~f_HFkb?EIXp2!VG22FGBV0?MVk1eW0z zKfo=#>hhHYRthAjp4fTpOuzlr@nt7-(-?Nkl7G{KX;Gi(?Tc6iPKO^FJ8*NwSU=d{ zCH_IZZG&{+`d+rDwa4N%ob!xCIzZK=i+DKbIC-BnHvg z#3GFWtlJ5o^Df}?%I)3PKOKOZKMDY#06_qnur=_Xi-aby>WtvuQX7^di_BAzYZ}|p zCzeQ#f9Ik9-1bi{0huRob?-kN_@`ggZ&BNUtSgaCK0XH*=^jWIS-#-oGPr)gy5?Au zu*}ngyT^ib=Egwl<_kV?KWxQ-LvMr^fgz|{2@PHl@xsRqbttuQD%c~DO4ghF=FoXw zW#PZYwJN-u3TOpn_ygC6ZP|1By|>a6-D{uZq`vBca; zBxDR7D4;SEF4CmXjb@mfS4$?7FTp~xPA&}+xo@GaaL27{?A=*XrgiZeY7J=Aw2!%X zssVz(MwwzUlIwN8$(!gM(FQ_&VeiMEGV8OMtCu!+jEt;;r1?C@-^m}0kO~Fr$hrCsiBQU%?BFJOF$;-D?h+VfMD>DMy_wtl2%ck;C4C<)Ph_@SB>W&ro@cky5S^tqF(0+}ibi-?G)_%B(X`;gr9&6!nv-)t8;V zT%(7bjwhElmx{HAqri3c3Xqv&Rsy=kVq6v()4jm2GlirF`aWQL5e*+3o z>T>N|roVIrOGWSD%mHXlzZ1?7LcArDEF=*OH`;#$qITXVF`Tv|r$3O}THc{TnsqnmMh>ElIRxG5h&iM*pv_Q;B{Mib8 z)z%AJ1-6n76c0z05ijmQVWajlZ^4 z%(Sv5e4&s!ORUh>hC;LNqR5FO^Ml0Z_4Ir?tvJu>B^zACUj7tvJL;R|VZH}X58fI4us z^@h0;dy+1`{VPz!rok=A9^( zf9Ik;k+7u;RY#Mr(In7j$(i!DHre7o4r_bTt!NR+ww7D{-bt(&P3uBg(B$!E8^>|d zJ_N5ng>S{49250bB{F?zX_~^~`C28|lVedQfec&1sE#T;o!!2%IAn^$iT_-#bIhK6 zC;Jsu+G@Xtl)B2R(?T4tJ0CM&nKdw)N0c|-FzXjxMmt@oFko@BXJ<-5aq#Du>p)#nZ3TXZni3A-BA36AHClq1(tZl!NVL$^}C4$Aj}d9JWHF`uV4S<3BsjlsyH59 zXr?t~LYr=0e}2mEA8J|!<>T;!reP8?%F(ay+RWhW1n61UJ^|g1(Z0i z-`#uNm8=9>M)4bHaLCbv#G`lYH4qRC+bCh3C`9<749z2CaWK6r!n zFI1@aGx=ld?Hw}=k%dJhoTO16?YO;-y$kjIu>5hPcf5CBRJNU-j;Ml+$%))oH`uH% zAH_p#r(5zJ0xp!tntg`iXTf@($c7)-|2iSOQkXp-SF7L<4r_H-*IMIGwOd$UQTf-d>?wxi2%JJ`?AhKol3b8_F{YSmWd;_wECON?k$6R6r5m|Vh{NY0=@1{tm-8}L2 zN1c}TzBYz^kKnRMzACSxulUxa-yq?=B`3EiVy|Y!7a7FrNmft9#Blv+Ka3FD(bk?` zO??2&n3>nfYo^ZAuf5NFO*FXI!&tkMm)0e3<8_fpIMgDdW1f&;#)FM?zCHGaPt@AeRiVcmBE2h1yD^NOdwXv|pUJ z5y#{^|EOOzY=1;z4dTsMIbE-lL$gLPPU&Oyxhq&rTnHjSj~I`zD163HBNlsp*tZun zr>%|`)CEpJ-~e3J|A)N84%k8h%bhwRSm4anVL4;XysM{Y7VZC?j62&U%;^>Ja_lnn@%_l*HqA2;J2+C1fKVf?rT z`@1IRa*Z8!`j!)LKo7LXNH3RGz*?5TN@Kfjj@%%*+yF~mJaZAOg(Mb(q8z`@E*$C{ z***+BB}-}|85!D5ntX^zdyEhe?=&+47Rz$2M1Yojj7IUqduK4qrG(Ru_BdofaSPxR zT6AIQIhP^Dx=BxVc#0zkce0rofq01%_(){Df@z%Z!~`G;tfG?L^2puyN${jVXe ztU=ois{S@eehX)IaDPs`9`N|gL6T?5mE#X-`LgwCn!Yv%I=s1feQi$pyIPzy+r_0X zX$AM2=JI zM{;$9;=)z{ivOr(ie2fh5Vzgzvro?CWE^Pyn@U|0k~=xy_w&VRdS>43@aleIf@~)p zafI%iMU_yOj1p#jQ1GmO%TWWY?fl+>eY)xld*J4Zy{!5#6}~9Kj{)VoeEHXbi?CZ| zzH1j*F~DA+&o6!z)a83Rw)8a!p)IKEYa(nwdHOiGkBH0{7O6u1psasjQdKa-Y> z)5G5@pYXJ?4L3Roeu|mM#)cXY@Ds@X)8R{%`u^q1myoAp;Ci2MW+=9Mrof=cPbWsz zX}gstja;#1DkCP9qUqZAy>5c$&YHf`2r?V}DzvBCR9>O*eje9`&*o>$m=BVxXQw)e zZmpDf-`m4@H7wk2tGIZibtKWV7oV?X`O#59NJ`_f1V%{m=!bEMD(V^ICUy70%h~Qj zzqb&DUA#A4y!neNvW#~dZNer}un(%>th6VHVvmt%GxpcAuUceMwq2D;N!Ue2^r?r@ zg8NM~tt41l4o?tJ&G-zt4aA5D*eDMW6Ntb;k zOr|ZdKb#{%GIhHAmD`WQc0a{`cnQS#W5L~`=jyu4Lte58WhOuM_i+-RKF_K?oAvf~ zDrPiDfknE68R^y`y~oR%uo8#r?J9`f>=N4cdOtepwWQ-E{*Wy?h3M;sXepvN&3U># zsI}@k%kJKyo~^R^r`+sC40Eh2smxPGaHCk@#N~%?CP3uK|I*VS-M_yv!vkLk%4Tnu z$4Y@fjy)Zg`;sCt;aa}Sk~QJJD`oHyz3C;wvkBxUU1A1r(HdY}c%22}W|IRSJ`~hE zTrd9ew*0*534AGKu_wmPVqa9jM_E%WIIEC;3uk5Zu>&+g-i5SRj&?IY@tmoFPt}X9 z{<)j)Gz(*VXg6Z>0h{yECe?vXPj+DGRcCx@>3!a(D)5`bJg6O|`&A?KF8Mqzu-3xr z7de%G9B(;J_*XHb|7<74_jm>M4C_OdU|?@q8J#KC^+C&f?{Ua!4)_O;3Ciu2stq@p zE{C&N=Mw&RcZ>R1lC*RMV`;&AVikhCvn2rYXI)Zh2yH#4c~Tk`D)i8)>Yk*e^JVV;FuQ^;d99$yr(ouzZA*AHEdia57Q z?l>|;)IJMekiJjSz?Fp8O8jLYomlw?Gl#N7_2111A@au!yoF!7S(nF(V0#)z7~!E_Pj8Dq zla)DD{)m0KXJG72sy3GVBPsRia}aI5vF;?RCr~W|GEA! z9UDA#^#I9e%C#psL>X~`@YSsd*i}5z5$&buFH+h&?>QtR94X0eDDmdzEauOr{ zc8@uI`oTWUBsc*m#W-=b5Qsa5-^M=nowR8U?Vzkn$)X}=XaUK~F8 z;GCi#yWmK?fzZQl4h1OdjH4EM2Dd6DJCR+ z7DH_X#Z<*3`>;Lh?=o=n*uI|LN7kdidCKeQ!`OXw*#mnB_F;(bABiFgR zXBBI){OTCVl(4LCB#HbipI9%c-bQoJRy4h}YK918`{#0$N_BG%DpcEd@>hrIg#nw1 z<|PN}fxIhak6wqL4ycJyGwqN&ZusE!ZoUd|EzeRN5-uljMNb((=9qR+IWtr^|4Xfx z<&A)cr~AdgypnGaj+rbXbu($* zif`Jx$^uQ>bO^Zr!m%DS^+<&85@c4>P(!~nDuA#v)emae<9)aZ%4R8I|673F1d3NY z36iy^`(L!tHVQ+C8rIE{UFv4zeMbwET2JMEh3BAKwSJx0|1~T0<_jzw=MJ(CuV<-Q z2irWagEi$b<3b#!ZyUm$Sk>qu4+Q%9$a%~__{ zxB-%Y&$`PDC-#e_ovSN0cbYoLjet=4|yc zt1eh1yeiQvUaRc{Gq~WA&;b{GfwP65kO>C_sy2Q{a%FD2pL`F&rU(I^8Z{W_G z-21!1h4d?z!sHYlpExX`#(7b8k^gyawOmC4y~kzmZTJ;=#IJqQS+^&C-m*F0&~aSU zonDm{ia5l&;?P}=-z}8)O}IF1hD}yEkFWSJ)O~1~_R@ccouVe zcUFWvANSL`QU2gn(*t$H_mtb6_=}+D*1D*RAeEyjTw3wAWd}k&KI^vZU=cH%&m?{8 z_PmR(S{~AFR~s%C?MJxnulP`;jjcW=rxQw-*2&(!x3f&1lhG=$H@K{<>r&MSUMI zVW}qwW3gR3aR^a?)Sf`$q@0t++BV(+y?Mi|@ZHQccmz` zB*G3muBLb$5Um=NPQJBzRI4PZj7}Had{G{Hp|0o?VEU1V*s8SB1;b+QMWWty`{E8~ z-`$N{<(|x~o#H=t?2XdilZFx=Et5q#ekV7CJbgYIW73%zp=+G{7&&EdWzQEV)5j_v zVO!Mxo*Ax$^qqcT3Q}5pt~S)Y&++T^T@xWZvt7;=-=SOO zR3C3J@Kk%5imkC7`^bqI>#SsDGaC+9eZi+kpdg=9FNRlz6*0wD?U9l;b~iJTHmeSN zdNSy%nspepzWb%ARBv{Y68(iTX-aILZ6vij+(gWHgeCSm<<`U{OsfVhKADt=K5B}& zkwvG3U%hyulz!`V5Ox`kk00jrtlD)lPEd;#uOcd2XQKk}IrE!oQo2WYZ)#Z)T`#|` zIsv`9S1Y|Idk>$XmGsZOwyd1!9KWQ37kozL?~iWSPt-b@QnV4zXtdBdfVQwVKH^;x zJazbuCHho$hF5sm*|K{1u}7qSmZ;z8fj+mMTX+juE_M z%wEgt&>ax@H?I<(E9xd~nL63})!8<$i}7KLR+-ItEl-VZvxXjD!G;Qakb%NK6?PTZ zz0oN#BH3~eV4p&YSQqLb8T`aFUm(`4<;J#_P%-M z8MIgY?ridIZPX>9!=e`kYuA|M@$EICmG6trJ?o}*s{QqKQ7iJKOL4*Mht@EL1)UP+ zFJ>F*49DSBvy>2~7Ji$>(mcu9N_h7St-=CiNwVl4nXz(TTaMQATxCN{>$rJE`NZ3J z;%NGn#T~DfeIn*tbad|fyvSI)6r))!^R$1-Pyx{_ouw!L4}Y3ndu++z*T2`ax@I>A z=C>O-SzuzaoKJU-3xCHmSC2n~JQMmLMxa|CjL?NcNoAkP!I;Bw|3CVpTMdgrsj;mA z4(-|Fi*SVe6(gP#gAL?Ap93mBI<)=3IETMU3IejR^Gy+PH!5{cZG z%Rr|mo(RS2a;(xHZNlEvqzUxPLMHjEZL~lo5$s?v!VTCLi>II`9)y@EhZg}ebovaW zQ^=iSzg}OC_aO^ggMBR?-;ck@NNwH>{yLk0M&TbUitXp4CC4+N8J3O_Om2jPW`HN) zfblQz&((5x%dj$sth`3$He20exanVSZ?0km$4?ogthX}Xx*iE1_3X)$Rg_j!I^U=) zsdGt-3$CVEOg0@7SF&30R`cA7{kNIs25i+U|qDni%C` z$o=iq-#F~8itftm1JkX<2{V_eQQ2>Ojd-6tCObTEALUUD!mwm^#Mw5wO4?U{xufHC zaaXbfjZ#aDEdtTym9D`MouMZPTXuPS1#$Y<>b&sI$?{+^J0#mPVsvUfywH8_eI#^u zYXt&B{!`aR|L-{MXW(RGt!BrB%>tK&w7Wpg1N=leUb*eADXqbhXs!vYQDFpo>|dr4 zrcH~}Hra~3jJ{p<`7;~eDzq7q@6P?P%zGq)?Kfr)0H^G*r>(RE&oQu+#Pr&;D_M~y zFEkMC!495Ux2Q`d7#R7CKi+B1S~``Ex^+Ux*`>Mk)(D|wl4P%CeXT)GiVgh5v6ly2k;~=53#*1 zLt1u|CK_!!U#(cglZ^~zLo3vWS87$Np7b2ok=?I)8+ozq{*FG=jWqQ19qVlP6PJh7f=$fhfE?~bs0x!k=v z%+JD^4s|xi>R0ak{TN6Eb)CtVRvhi{yJpP@CDJU<8`gv%XkhA?p~BB`o)D6@DU ziL(X!;leFU9}0vLX%vu!7O><(d%qEJ=yaH*!tH{tM_0=pZ3OA$U-Y|4PQ=;M6%-Fi zt41^#kM+LER>!ct9J-O}u#>~h#h%Wzh%9skoV>_eKJ|}lVvd|rk>=Yhi}_I z9oaH(P6FR$ z&r;*0t1-8!kd~Q4vYhYQ97#+VSU>J!%=#=433>;goaj}?dJhH?4-b4$ z#s;m1@-SfjV=6zH_2V1ycHQHu74RK8b3emeafo`YhM5d*BXH#3)Mn5~vpJvbKx27> z3UI%`!m%aSK9vEIGF%6feQ;APDIKezKs(IeJrG~Si{G4p{K!;4s^!*eH`MEc5Z#Y< zf|}+KX9T%@pf)V%S!U+g^x-vRcNrzT@?;lsriV0lU>`kPHZJPBMK|dHeCCA9P!%FC z)4Q`+$E52-`+Z?opK!Ww2gj(9bb!;dnwMq)6GS}0A-Hrrx|I2w=;clT)L3h0@ z4$116t~pYZ)yaNB4(0yocorTQjc+Z&wll&!OHJ9U<}J|#L>Ee$M#&U*mQ-ZBX#+}L zn8!_t!~U(zjv$lUgV5OF~W;^Zi>BfwH2sS7@=A0s^3!+s7RYjA1#TAcI=D60|1!vYcP4M{9i z%_|d>k(juXWnKa0j-Fjyzb<<%c1!^KVLt~wN^yqsCls;TYHauG_?00n8v)?7Jsqv4 zthn`R2YkP;7gyr#Kp&K9-_1$i!xs$T#ZKP`A)aH!Yg>25Jz?}e=GW}W=z;UL+gXL* zWtPF?ungxxLHkh003jZ&Im0agDbvi{rj5wo~f-1 zC;z|pH;)lMTm7Rs1im>k0IA7#4G{K#h|B&^kkkwtSLWm%f`Nj_^9KWRsei(LJ(}9I zFfV^X*dqvZ7F)2HPUqN#pimVIL=LhCc~p*S-+=&Cw|-EW^*yj_VCsW194oalJp#1F zQd+XT=zAyXj(IA9t=0Xqh`QsNusm8RAIwLL2V{T1D}XmU61-|r5FE*`8z{r!BN(l>|u`RrN{Tjap@O0Ba`^3#S?MXA5JeDqB0TLiW zzeOqwXKMOQyJcg!oM(*Rmd*#XJ3x~VLT01(aA`1Jp6JA)q)j_Ql^S2AlHLxwOCG)R zPqS5#+gD}nIT()vLG!0zs>9a-+|DR+YPfEEPxk7`_U@BrU*A@JpoFD_C@B0o(GTkQ z`I>wO7j)Hvj*EJvW-233yb(P0*2a^w{ZVP3L5!*~VN~!aYXtK6?+79vO8q_TSq_5< z8=gIJ?6S1))M$HNmK~6KihaY)IhZcMUhVbS-Z22dLC(DBj=I5Tf>H{5+rTZ-^Vv6I znMOi;MHQNQ>KC*PWEGB|Br#y$5e>{50pw{Cl=(a!x!wqi8_?cDe!-;<&g) zx6bae_KgQ|n~zloS{grmzWKb2&c;@~WF@x@)x(hI{X@8kQH29A%4cHWl@X`kr-Fv& zy|^f1SXrR3FrT50XvrLz`o{|-Tm<)Cd>bE!AO=3X3sP`j^-eP4)Cfz((Woa#ySLOu zCi9omJ1cQ)o!w(bQN7bCsYzp<#5Bnq`nDG~4#pxOP2sBeT6w8y|N;L=5iEIC!?0%4z=ZPbg}7sgYs+z~_X8{??gFJsyjEE=5tv&viR;axZM)j87UG>D_B zR9-&0`}G2FZ-EPI5yy6uk84~`DQUSLyAj__tKK0^34E0_G$^eiEM=UArEfX!KJ(`V zGSo&KOK+4yII!F)X(59)o&C@eS2iE&Q`O`BudFqRhdkNkyfu^oXOZ_@k^7+s?d7>914#dB0h4I#ywDu8@&kS;;X#wc z%Ofl!HT%ExTfTcW*&ONCxzWDw?Pg2*-si{$^DiJbC66$ACHXxG%$pzOw$9ocA&SD*sdf&-~25FKv?t zaaT~&`>1<1f8HIRJm^jde4d2Q7|k}BDPm{`)`cXxwSNtlk0dC;qfIabI^%L_*tk{U zcymKd()mdC^VPcfWYQ74FhINMhcDbb#DD|jk&x$D0sRXG#YO>R0hcElAwddxuwfdK zki3B;0_6S%63u~3%HxR+pw_`?C?(W1$ZQAPmN~C2i1^q6-k0{!b7(IDKtMfLkd7B@ntC3HbW_#uqj~E3KoPk1xZytJxz>CIIQ8{ivIJz~ z#u%^IDmWHB=FTpTHhYe!dS?)0VuhFXYyQX{Z*DAd;uSofD;*sCtL@J|iF| zZaHZM#VfaCJ_7goIOn$kr|_lxD3;BnZNZyceROEdyq+IgC2}9^H|iS!(s}fCIOUG* zMeY?7$rs`*M7IKuq)RbK{}R;ctpa%lU%P8Z+lx)DxNWYa1J>|-sjXPR-V28dW!7x8 zq~&xl!*4(rI&o3h_}-N1I2f!l6hZYS`EnjX3bHPAArOr(PsN#u=EgI{zzxI)&w>uw ze{^jAyTBS^qiI)uZvwSm1`4S}E~nZ|Owp503HchJ{~$KC>Oy{S)dAbcc*WA+z$<$? z(GAaR4wM>n@A~ra^Gq~S`hgH!r)1dmiC6e-@mfJAY7Z)tgjI-OTO69brrZpZLhqDSIoE^lAv<# zL6lp83Be+bU07*Xf!Y?{NkHR|wxywiY|+m3sCi%+0$1j~r*3OLfRL!<8uBDKL2HyO(vLr6T&T!_MG@bEX}WOD0C)y zDs}L&RU!H>WD6yE)b#)ootd45G&T&OJgKVHGvpMmf{{u37g$Oh*r#za@{Hn%OFQ>= z%E=tFP7D&cD5O^=^TnbY>7CP$cJ0@y2JuQSy7AF8?HDs3Ytg7ncT!th<*h+e^Ox@= zZ_;Ods|P1pDbrTncRnyR4djjuJSEU6G50~eCz$_e75-G*q%|Zssz6k~IynG|3aJJn{Ss)C z$Nq}Uvk`Zq=eYI8Xk{G%VtcLeU&$aWw9EeO+Rsdq^F~nM_3Zc; zFthcLTNI4cNOu6T1nBJ0m*`t(*!JhZ-B$2#*za>ZSpxGH62r=g_|GjT1>^(Ne<7uU zG#Z&7x5y;B{7%eF63B1)?YtR0^J6cW#7`!jMoj-i`t_;cz4vr{2N|$gO(otrhbp(( zJ%&EMw^710N4J&ZEkQfAW>4ZwJ2#1$Qz_^+JJHBR!DpJP2wS!ska@cJfWBB?J)Sdu z9?t!L_T%{Xx;M%4yVIMNm*xBXnfdeCdHG)#+W!F$*ZuQw_9x)t_rEvG*OmYKRCxdD zv!B3AK7Qmu?Cdd2+k5%j{(kj~9H;Ik&gpd37LNI7y!M0f^&gvGZLYt1=Jqv9d&`GE zvy12K&jY&>Nc0$f{ZqXSM_z+!@L3PQvo+aA9!{?n9m`$+hGyR zy)*XT+pynvwpgv2V4akF?WD?M^OvppH#3YOD~Us>4QjUAgO|l0W?snxnITvYvk=&s z_y7IafAY8gnN)`Uv+1BU(1n2|30W%G_9QosN z;Qq<x}c+c zp;Y!4e}D_jLl>8=-MBpaV!GBtci%#aGP9&qh|EJ~LNd?9GORKs88RzFBttUKWQanU=Xr`U zlUU|qpV#X7KYRa4Nfe2vYM6JwOThI1#7&HdR}x@^M0jPD+-hKO(M{k3T<293pIk>~tEwPNM$02UXUkTa8Cxk{Gvjc%eeE2LJ6pVn~i4jdZu*zc>#H_yG6m z-v=iNADkn6u*ZGt27*Y_Uknkh-RYQId8kW;Amf+T&{>&XoZ(^Gf!8qssL-dpQoQ8S zUjmzX%?DlL6`#{(4dP%y9$!H3mb8~7I!)qxK9513?J|Po3ZhF4jR>#vH{ee9I@s{) zGZkN@b*Skmizqy+$zBABfzOgjow(^ap z$Yoj2YPeMCt)NXWYodE{j{7eTx1Ry5g|-v7D_832)oBDd)0RLc3^3?CDWX;C{Jc+) z&lL|@hckN|?2PqIi*J;rPh%KE7@v+G(si5t5SHS#o#vHa-bgHr2a!T7PNREzPM(a` zb9a)71H>Wqt#zkH)!)d{rih4$nMe)2jv&F&bkhXadnd@w=a%;q3vWF{zeqR?HhFRy z&#fkX^RF*XyDj83sH&<)*a}yVqoH3^-Y;oimj@@Yb*mqQLFYqtwZ3Qd&0oI)U%qtQ zUNg%KB!v;^&~Yw&$6%yb6cRp-?fw?rUh7iu*D21-lx6Z*dwrHm&(bMRwTb89=GB@GR)cZ-Zz;UT;T1(dw?&?DCRU9AgRWaWB`)hl>r22YD!+VRI zN_DQ!e{Oe&W=r~$&F=3kYZw{5cNb5D?=fZu#tD=#fUp{5CogEgGUI*(CEc>K%VTt# zxj155N2--?9FSf1n{I2*Gu~@|Yi?noyUJsSS!Ox`n+;EYuUYU|Q+Mi>&+Ut@VlWzv zVEKZuyv{gbhqZcoo0*KXgwCkz+TDYLA75XVngf~Z0Vxnh2WP)}HLo089+G+)g#DdF zS)N9lL09U7F8u?%zP9eGxFi?Qvlj%1Q93x=mDU4;Og4mMrl(7r#ydr^$i-YpY%_K0 zfFbOk6Tdlxuu1r~XQowF>I#lHhX45SgAXi7OT4It!|&#f6q#^zujXI}`fR**v@-)^ zi*5@=!NFk&nwkA~DqLaC|K@JesOvOC(0O6yKpHOf2M>bSIXHU8#&X_Eg_!qc>!Rm_ zr}0{$(JC^JtlAk_HgAm+R;OVAO`}5fjp|&<`qA0t<-Y$VrXW+>;WxJ^_j>gABH7v5 ze{xoP9eD2j@xR%9bGPp1%-F%+7=EFk&AjKMn!3%sdodLt9(Nv{qXEO~>$Mf_)p4Uu z>^%tN6L`AYOp^bZ=gM_M(qQvlE=Cnrj zcI5s-+rC`j+3TIlZq;N3u+GPBF?lZ*YqiEoY{*=rfw4eEIdG95~dYQXrD zgFoa4?-bcmDweB6GhHpRE7!HqgLVVC#)G_SRcgXf(f&K_Qm2?UuiXZ(^x|T54)srs z=9s&8?`}_f?VEx<^O)Bj%Xcf_{n={-YwDClmGAt#VD(ne`r=U9&T{owM1>MHHTCRE zj_md(uIf)#L&chvuIT6l;~$JicZU7?^_FrCg_MB;Q`D4xwtP7tCT6udxo5%0mRfoMtrV_NL?S<{9UTA4+^IH!Kb@jUbosuyck%zEG zjw;#7J8%a|WcO-?_*62qCa%>C?FwzA6VxeIr2{v!6heKGSSSPA=vj~}Z_N;H@} zHh%qX(jLy;C^i#&k5vRE-LkitT0cE?W5R3h{OcJf5Kb;!U6+fR(yn=vL<|D_&);% z5*(%5d&Tsy)zm6f{p;3ur$GgsxO@T*q{pQ_?XZp>C<8s=Tg9JFaS_SGAS%?Fx^OSfxHd_ajq1nz4y<1&k~JbH ziV|GU3sdVfWLP(MoL3@bIUPAKBxvOJ#4k4WHMCFxh;rDl60UCua)Q(oZ?bStMPsz{EAC^+*Pfni`lvZA@74~X_@!IYtzE3{~6^_cc z%pIAi8ADYa2|i1fGx~IrR7P1-GnS5?-U;*wjTc0m<{|{FhtpvJYHDhbwxj3=c&E7IhnOaE+(Xvmyyqaob4w2$Ga0A0Nj2 zAW>Y`G|{7&d3M;Ltp`HLpm(gwU{>y99PS0tnOy5@Z@(Zjm}lhw=FOY6*f#fjcklKJ zq|Nleb{zjVRSj_d0hFvCv$7t*Biqp-+S7`Q1(qzp3>Y!e^E|rKy({h=FYckWv#}h_ z*Y4do_YPKifl-SMG?%Rezf|`32M4}Yboog`FvHx;3^$8y_Q#K%KfeVUxveh@6tF(l zOBfs+jLDtutKKi-Da@>_#C$yQx`!}}p9Jfbt*EM+;^%j~B~Dmnad8pCVP$RYx3K$b z1&Mod)jJi{^wgVQ=?D3p7y4uH#YIKm#MHI5Gr`PhSAGXkvm>~GnuXyCIPX@T{iT_i z7bK5^8AMsk4A^=aUtdQ3+4{P(larHK{VUoxd}d)R58k9?XLDj!n{R}rcX7~B#_39W{}B@lTZ1*HLwwX( z^H~_p2U2cGW}t4O682;8vulC)_RM7?2JhuhkpX61sTpAQ!7ZU8!E9FNM;f(6U%`k* zBIE>bT&$+Ap9A}DI4obnAw)j(6GlS!F}V+hCHc@P#8&ih;&753{Nep{@#tLX?kWKq7{A8X-`pS$ zdDr7)Q-!meCX|R`dhNtfCqriV zgOO=}dJHjma#Vcwz0ygfhIVb2hsjXkDBVW{G4`urb>h=Igq)+pc;&17F(fBdL6GKK z<2U%|04+(evE6yT?fB#v?Rq=KG30_^OsTLq-3PG5ti!GEJRf{AsAZ&!2caRabZ>ok zkpyCL?rx5}=fr64>q+g##e{xZ!=6o!B`JDFjNo*s9&s@}2ix>FP*1!=hjyJx%liz1 zRB%M-iSuzDLUI`$woBO-?68xNYzo?1%&0U5$sowW$58B!koba~wowOh|1^RWOjXG9 z?CcHG!PNi0Z$C`LL9O*?vN6~HxZ2}>8yL{e{Gl>Y&>ci#DOT-3iR(ieg`cZ1=YpM< z5qDodxDvq^mX-rW)(#Hd6v(*cY;SzG*^%2xp%xpyMzxF;0=xa-K%4nXJ51C(W_s)4 z3mM&6zRKj~MbRN}1H_OqKl!Wd`8UWwpy>O>7q0q@UiZxnf}OeAW$UL1j<1`!T;9n- zcdnQ?&We7$ln1e!6af7Kvn=&_UQ5vDvUf?x?2vIqZo`9TFWwfTNi~9dI(!Zh_TXgF z_QlAPNyX_nqwgZke4BIw8A$;u*scCc3wGv;KfCS0DuXvwkSFts6G{yEWf&5En36S; z8hsb3uz!R*!&yT4W1d(u)F5R$>Y0QDc4Mh$we4n(ZiVwN57N1@))th%=D$@n&AU3{WevMGn0VkQIS2;+81tXnW z&??eY?6CQC6@PEQ@j|i`s6Sk}VQtfaJ5SlD@<&MH|DIXzw|Y<5YoysYZQ-(MUFkyM zYr>64+1b|HpBM)t!xJz^!AijOPEj*HFotpcVdbrVx2PBJGJPL9+VbyJBSxi;(GCCa z#i?9&R-Wq%7ia#B{^Iestbqr_SR%K7AD?M5bq;gtmux4T4#HjNZo)?Ek5PA&1n>YZ z+kAK9tF*ot9~8rcEB3onc5PPQzrp@5NM9!z_FOGNB9PE{o!=a0zW-~o$nQqA)-e12 z@a1>@29T!1RjSLmr((k|DC^J=OQ8vc=O+9)~xL=}hq{3xBTtPfw zXBdJCRb}Nf`2LRfQV`-KTz)gb%rXl7Q7W@{y*Mewou>3B< zU@&NqzzjZ0;BoAid6Auk0)CSpR1jWZQa`_*e_4VFD>P|3E7LjC@g7B~WJ9Dlubjfp zbPzTLhyA2qt*2dL{a|zVv+L^GR-2bzPft%+3I@AAlh?pVZ(sS^unnezf6ufhot2eU zZv;2@s3>4QynIRGF>zAAz4L=?&@>9DeQvm3GJJ-5y%41G*$GBPQ&ZDsth%b|42S;K zO8{JHU39^VmoF9%O|5Pv>(O|6j(&D6CdGoHLlCV#FTK+{PuP+gk7DbQk0%(PN<5Re z@V;*uVyco6XKmGXO0r<)jDiAqIz9q2-}sAtXz(%v|Gpw|1IM4-i*J`CHybH;veO@f zaFa&w>6bZO^Vm`hmJqUl>|!x1Un%RyKm~`2t-6dtFsZGr^02vI*W6qoIhrJ^BblF_ z?YJBw_GlMt%azoqCqj-{Q|!d!*VblM8khw4EA4;XM=>g+`d3N{3L$!KvsbM8bH5OU zoFP4}UGO+)Zf?$U$eT6R61(wmw7?&AkZ{d!x{J3Y-W;0|F7VvjF6_%Q>tcCN)A}Ql z!)ZRNkaJ``%)70Bu-zB* z>tHr<|LR0JqwCb^cp5!s86cS>@xn4@VWWiHrW;0ys@~vOXx# zRZL7@;prn|8Ld)V!{H4!F0MX!q^Pkb8v9Hx*VosVHg$J*rza=hj*pKwx3&&;t%8Ud zjvYl)_BO_H&}{kfK4V2ws*6I$IQ6g08p7jh=q4(ZWt3%QWxIz3Nl8h0nsPJ?SeD#s z4HblJVP(N|%0(tkQ9j{fH#f(7 zhJ{6Dg6FmwnvbV0R=fXZjXf&vT8$S$AxpS=?^D$b!)Ho$Im*;aCJvCl9XtFi!mT4B zI+~T?Q4iowYxvg~+|Miv{9F&Hi;9CoL2s6J+M73YDjP|(E-gQ(FE4zTBKnVIz~O(l zyk(VfTdv%AHKAQHY%kkw)qR`ROa1Tf1P-7Yg(=!DjS(#~%&#$?fr6vf| z#}!#u;?+mo=CjJ@vnyUT=((?adu3BmW$@+jdRm%PXN}Jf5U`FI9;5EjQR}0! zG&;7oYMol%@HcH@_qOqNO<=*fXuaCvMFl6yA&Gs@;?U{~uyBRWm1Q*if(wUvMSJ6( z;IOTCg4^6x@CN1(yK0p?nl;-)q%PCPH|-h>-{h|FdF_9hkjDQ;ZR5Ehfj4UCNw}QwF(|Tkb9^C2e9luElTX~eOD{* zkuM0acd5$~Z(#iIKPzXx5+0{m3eaKIR*MbY!G1@GXGDi>_TRtuBOV(g#LI4Ky1H2> znB2Lo+mfEnyKPSRQ*w&hjEZ6Y)EqH;z_OQR;~@)}P1$I?aHP54B=K=?;Ro1!;_#~7 zUtF?uZkHf|!WnZ`Z9bCe)V8TKLA`cvGbCfL${c^{8cB^-eg63I{@&i6%raDCsKKJk6 zKQr2kiG6EbE)%v^bA)^baG#eIa@p98l>GfT(#hlo3c^Cyc~nbzgbG2EG@U*ZDKy8) zeOxx|Ew81#H?5rQ@9-ht(d!YN|Bn(%*a!Tj?5brfI828|kZ_HkO;TiA*7U!QMez-| zF5F15}LMv_Sl_OdLTi_rNTywam>MdUA?ZYuW#dI z2bhoKfbiucQ!rPy@v46IJU&oaDpk|_x6?RxX%jXYNl;RW;)OR3Dd*Swols|dT=qY2 z;}`&>?z$2E8NYDx8a!$%!ji3TxXghT4MOBz2j;S9HxIx!bgm94W^;M21gg`(lP;Jl zlVI~7q%TC-!m>7G1tKz&lD^FSgcs3yD$cjjGS;}(il04-GJ67!nhc*zHHR98sC}oZ ze1^{EC+V+8L;xr@Qdg`k{hNN)Q^_(y@H0#(wv=j3DRTP318}zunsWUw>cGxido5XZ z_PUm_lN~I=p3|^De9`0Q;?qRPg%qD&^0(J@{S~QB1AAB+$MAbGPq&Tn@FftuVzo?l zG_wZWB)=RzMq!PJz{oTG@Rz9O=cjpK)Ur4MRb!(_Qj}&4X~^FQpBw|t{eCJ_v4|X80P|; zF>%y)LuO0}e@iLQgq2&@%d7hI8l=Ftz)KdCOBd$>z67z#?1;-)&#!2GYjkP2ld+8J z#v)XK=%P!dY;1B?HUJ~}g&$l>poqE(z7#cW08C^C!kO7O{&2-U($e#Rs$`AaQB23n zmopDRmi?k0h#Lj=(i{Rn4KAFp94VH_itsmb{9$Bxe=;gH=+%6hdi~*Rp$>W?!pjTl zsj&fOnE&3K?0Y-uvnk6k89Yqr$LQr-m8(h;6=cWl_w`mS0=v1trTv)b9Toujyg(V{ zi&;Ag_sz~Mk&L5$*cf+qk{f&K_Q^v zHD$b3OeVb3Ay;6+{-6bEI&u=F8`ACPUG9Ejgax6mP7nSgYVN$gSd);DLM81FaWB* zK3;Dhq3?V@zc>*18+&uvFdy>8&|(Pp2>=aklZp4Q6%Fk5ik)7?;P_LsYHyn_gM4tu zX#B8QKJRuI1j@ZE=7n%)(&Viy*Gwoe$j$9oV7o`&j)*tnJ>k}}@MRIP_>K4I;YiDh z(+PNO1Ttm{-nbI-mQVA>GgOEuQBjiC6u%uHxV~o5;AuKM>fWNgmpbw?z6Lfc#uqI% zr7$xY-nnqD^9a|VgYxe?OKz>7wd*K1VYN4m&#xQv*2f)(?Q4z55piD(_8gM`5!X0+ z`C?^W!{;sECtNVk^ReASTj}$ae4sHByj$iR=Wo(>Uaodj&q>HVp|`+~S6?V>LpLX* z__U?ytH67Z68rvo?bI3*A)H{uD!Dy7@1afu`zjHpYU~6Diu3q2-w>VJixUtyk+0V_ zOqX~sBK4rW(%*aVz|MJS`)kgQV@up4HL{JEd<8qQ{e_ z(MImc<()F^rQ^B5`j^^t-_7iuOJ_VszP1$eVMy6SiHFE0K?r-lPutFEygf3A{klCd z^kv`r*mizJL2vzU+#9WeVX7k7YgcV&#Dim~#&r30s2;!Je$tmGUZ}+= z%kHxheic{``@7^a^HkAdbgrcQoSg~%rdWBE#z z&;@D&=CypQjUK!0z#qb5VtrjB@q)s?xqfBW#4l-_J`JD;`_KU`cDXT=KkP%dLvIyyQ5)BNQKAUsYk zF7y3)MzoazGwa>}Jq5{0(l=UH?uscV8|12zkgolt)ffIVTonDP{rT!1 zabLlfxAorKNWY;$?D`*9d?gNM|JMZk=#9bOI%`X`qRyYdVr`Nl5-bbdJ5ht@aaZ6& z{8GiTmhLOI>V14p7U%QKN_?;OHq;_NaUMVZy@#APGBR?zx1@@Cqb#cKR@c}vebdjD zAj+ZUj6~JsZJB_+8&#b&f(x&CPr9RO*uG*=o1{ad?{23)WEFkzO;9PS$bi0aJZQ;!uHZza-a%cif+$23@||DvJ7slW{7M6-rZH2S0fjZc@{; z^eE7!T5!>3BvyBPNDX=9AF3ARif3(-B6U5HC3iUSCGTO{Q~kwOZ+q_A7HR0Yew({= z2Q63cdU~yM9LAkWVOXcAN4UEnSS#2!8M;QJ>-ZY7%1@kr7C}rm^#BzuDnFO~Yh$Nt zi6^v4WUo6zWiZ!Ja(J5EAIoQ6D%BwW=3u|t^}w-~I3}m^j`?=FpmkgPN~HMS_rEtN zg;~Sp$8SvQ#1F zxD3n_i%ZTrH&Fc^?8jxgS=k#1;?0O9q%<>8i-f+$3waIh!dyyy{a@`rW}$P03KW`~B~; zB+KX#C&e(wgCNtp7_Y@Emz@@`bmoj=K2&=aONOmQ_XPhIqcUm45gz zzh+vr$^ZNG6(2BJThSG?5Cq_^YmPuM^sh)_YOs^%xibsP>hG2vyNy&D+#F@B_B~Y! zns~rctxKS8^2jl3O5DDhn+V?bMMbZHL?&=z2HQ#8>@e5Jlh!^uxm@BiuX$lnXXaIbhHHC z`{luO7{S%@c9YVfs5tHeNRngMhuD$$`I!tuuoyuBVJAdKXz1+2eu3q1N=@YdhM(r( zP*bmEgYe4Wy4Gcw3{iz6NAR@l$v}Sdr;o$=cV5c=y8c(YlK2g8v9zqImNuCvlM$TA zO~9@AE`a6d-2BYwVY-#utZ(C8GwtP-^in$u>H&pQ?52dEFV|PrJTSkUx+3yf+pinD zZ(OZ^8=`S;EMbmT#@HtN%)^N`UI{W#zWm26Qbgi-sj%)JG&s0gm-bI@k-1lSI(@ho zl&cW_<7xvP1e(DfS}b6q!>a6E*Xxr0Qg6PZTk2YFrB4VM0jChkiwcba$A5%IGl!Mw zS(}SjS{UIGi~TGMNliQmLR9g&HM+;R#jxy@`(uTx9knMvRsRwNdubqi5^yAnL*VTi zU$o742u7QXRY?8N9e3CvVKIRyGH)T&w?7qi-;JcAd_ufR`iosZMG~*h^NRk_T#21{ zqZm1Ir?YIT+X#keCNO9$=jUZxW=Af^(h%l)y@~zP@O4;%3?W4s`gne+<3aSIg*G$=oSK_(0Wr5*Y#_?=@Y+4R(@!!UK-1NOwqyN(N`0pvr zFzZpmhGuQSaV%@C`Z>si^=U*XjXO+#>=-s@01g);8dKy}Zks1&)Rm>I9Z9UNc74?< zIyB4+^O$<>VRISOfns8Viy`&3XNc#DbK*K9&$P9Qp8jh-%ap^Fy2R13AOvGtdKsE3 z&5ODa$%JyCuBnDcT~FszBn{2{=J!zfjaV1#isF+y!$Xl8WE;G+P}|D=fF@9^`+w}w zgBcf!tiy!Gh(ZK&fzk6L92i{x&nz|>;e`Mff0S|xmoX<5No+z{JDN#NsY0~fb2m2< zs>IspjK=MYOYtI=elTKmXQy&xLob6AaFDN&>GuJ5=1*RHf1)hXr$peCr>fb}}} z)hx-E;fIAkZ)w?Qm|$d28PUITp(d>!MI1~ejh(=UK)(A(M!WCbzK5~|4R%nLyaefI@Vbs*1|{@8PT#bKMz#-73wpsxvZV{K*)?n4u=g zJjd@1?5rRLQT1?E1$8?+yH0yX5l86?=f#&=%Zg~x)dP?ir5&r?&6SUtnSlc~ueG$a z9D(unKCKO{O0P@0xReOkjGo`XL#RP_6<0pVB@H7AmG6hY5ai@-X-?ADhS9|c_fl^3GQPJIFH(pOj z0a0GbQYx_<>{KMQzh1gO z5c90oZ;IvuU`VajM0{^e#Rwzmiy0XifxyB$FXZ@g$>LB+W?r5W_;kCCE#T%PugiR< z0B)aG{aX?w+1VJoc#fEev3*O1IiT1$)}tDX7aW z`*SZYd5YRkNy}{(0hPmuNd2>(2!P8diWqi9md|bNiBTDpJ@o?Ch)Hw4EHSzm))2fV_;xNU67QyXA>uVf}Bxq`%TMRLHf#aKVG4kjE^5*ZdnRK zVeNg0_{)kM;4l2#7ku>fMamBUZrS|OQZFR+QJpBQGH(Vj7m4GjlukbCU*52o?fjrr zDO!6-rj(|s)NV4_ZJfEQuP+Va*^W&YBO{~k(5z!8&pw%MjYnA#sNh-+M*MBh$bFjB zIQ2a|Xp|2QwR|DJX$_)kbKo3@r95~mU@v$_wPft2v_X zE1aY{&3(PS_ek4TcJ|%~+9a$jgBEqUZQNn!4xXca&0$bKAi&I=%?8lgk8AY z{V^v;0~oTX2u)VzFJ}E+AF`39+gu1@#Arb+;KsU!gM&kDf+UcY%+1V{fVcy&D4k2~ z<5{_y-y1uWQ3XIInK0d1EEx+XNvS>aK#>6q>Bq9Nfz1sNq8p8qh!9 z=UG6_m7$x-3!8K2TlqnuS^N~FEr>X}uCDq_z$uYh!*9aVaYkZig{iLVPFytVl*mc= zvrn=dVvO-e>B`rlpH#&+N^lMvv4!*ATgv?7wIVJ$L2-R|Ou_SSc)DoJ6%yq`q9+xc z_X*i66>{tq>H$-(=1bkjVs}C-Z+B7)GlTp~5+6xyyeL1rK1VF;JhYPA_~+4|qZPB~ z#NA6*Hh?R3rgi=dtq>^DedRTZ4=9_b=}wd>lqb#bF#*HbNqz$aZkTfE?!>4l2!2rc zWsTD52T$MDnUHQUqgtx3KNeb25Mnx3cQsT{zZLCn@baU zMh$2=NvRt9YVooko^_Lya-ObUc& z_PaXZa*jihS8Q?_C9LyEzNjrZX9JBFFj&`{{!L&c3vfEt)mdHg|GkFCn}Nku3K#O{ zDn>W=nqaBi>yqE{zoMr>C#=S*Mu@mjElS8?y~aEKbhSm$h$TwgaYj+~1;5?TJIB1g zlqTH~TlxKx_7hOz-wIgq?lUlwMP?h;`O$j$`@g+=TU8|WYBmRjnx`! zfb9Kh6a$7>tHL=8X2$2S?Z_bRE@b}X$Ma(+ANgrAh&sz**B1gRmcXW7*D7qBDO&*n zfgMGQs1W-qeeoY#4k<6_1~@usLl1^wk&jCUdWpVG^`3M0UF=l+r<7+2mtNnJnd1JC z3x(JZg*Iob`oIbCL(S{GlxnHJJh*0HiqTLT$Q&t&+t}Gta%kcc5U6J$TLYJpSy7>l zjwP2925f~)s1GYUF2DY>FKc4`=1YUcpMA3@PhQMff%sFqc%dA~p%NPn7Z;c2#Xw%g?wMEbc>TDbI0p>C!|PA@PIi_Cl2D>r`z-rJ-~sBy8StxIYtwi zjO(ceu-r)iOAJ#~c|*f8umWe;xw$e4i@SLF(;HD2>)}0W&NM!5zU#cr((8;9NotHC zQb1g_>%%~BV>OU}7Y&6D_BO)(FyJNtnEH_5`a8BX{DD4HP6i9jRJu*EwgYHrLe}@v zMXc_pujK1g`FQiA;o$t=h3n6_gpeBh;WqOm<#~g5RYTxcAA=!)(dVnZ4VPOEzHn>%0hoL~o&4 z*H2EGQ5Uq74K_S{6XPsm4T|iS{EJcE%7p#* z+c{re1_l;^p+loPyF}Ubf$WTo@89D@V27HbuHX1Ag0}fMO$G_R*%yc0C!Upp$VXX| zd*Ex(z_quQTREQi%&-)+!fT#?A8FkHg_#Ev(w%S8qtJg_r4av_3oji%;k{?b? zvYR-BY~4_e|0+yt4J7%Y$=X9moOi(6$;s!3kp)&w-EXe+@}SZ~kx=H-N36mu77?%zq%8njVBM1k@`UMMXo6;jl^JH(kzn>Un*KYeYBtDqN7ejQj z2yWM2c1F^O0V)-4`xp9PaNab*#zV;ZWH;O`42904Hye-DGBW=vtQSOTVlUB`IA>v> z;Eo{nLE|SLUtG9#szLy&&Ax`Vlf56^0`39P^gev$xFPu|lwv0Ovag1}qBZ$6DUw@Y zTPfw?t9p8!O6V{nf}`x{KL((p+YU;WJ@zsbgaH!uz)^8&zudH%f1Dm1mSXz?V-BI; z4;2m9nE{mx|Dka$-6dzb16)Mm+X=&u4jyybkL57|G&clwf-G7{lM9-uyS_1Y6n|9wZe&V+TGZjgh+YUD_w;^fxyl1KF5PXL8 z>wmU5BY2E??XTUq0N+pPv@A1b6~; z`TDNm)94C#Qz9A149zg(U%clQ7mLbY&_*)(F8-OQ3q$$eivtD!+A3p`!BKZgX!{Gu zPuROX;RU0LLJWF2eRIhdBz-Uf(QIt9b90^0n`Gp)f_vple-qN-j?A1Yb3(~l&Tgvl zv`i;3r+PG82C4%ef{rwxaWq6>WQ=0zGT|&>GK^tM{FG_e3q5w6WjfU~biYND2UG2T zumFq$ZCUI21{=ct&5x9xKuWKwN)RABkD^oHLi_xgJkx;?)<7=Hac8X|Kh|-&gqGht zqUSDpCP=9?^b2%X$NKlU5@9WUxCm^Jn&47Br?Y-`1BgEONjRVp-yB`qUK6jig*-yf zCxCx4rNKpTASYLjp@)G8o$f1u-W8+MRbWHlVx27Sts=r+tD*TP5)N$`jWFPa89OQA zK96trCJ(U(M_7 zTv+&iMEno>5_h`>pM#-TpE}3nh`yG%I3dyxeW1c$Pn<_zE50aYEIw zmJ53kVb8zdLd)s6+kYUcneUKd>H%(J7AMI#8+20Dkp88uBJ{{2=k5cw4@iv{Wx$)G zY}Sflh*G<|x{R*%b#$C|DFY@E0F|eb0By`Pls-t~p| z{B*=Ah|-}$1#lj4qAv!1Ljr24pS&0_%mhv`z^%m~VBJC}=KdPv>jvQe^6)Ibm3DP4 z%d=!x#ys9SOX3SrG*pG=Pp=yXyhF_bZsa_46`)lhW;1A`1@hC~X5MEK5@Vb7Acc@q zZ0}SbU`L#Xtcd%{{!ta%iP$coVMYjM{bBQ@Y&2&NkV$|GT3A>zQ8t|r&J28B5yOX9 zNPRdC))Wp>04zvvm~MHS*5@sLWZL%Jv z0<1e5x)7iRr0eOm&+bl6MN3sXOELM&{dsl$8VX`7cba!t?3=EaNGlKT#XZ@2I`rhk zQSq_{?(A#-c02byF!R(@Ri(p#a`sN*0!4wGic0v(22Ir;--~@^k6Y-_^$g~l1g<>1 zK+%pi$FZEcfHL}^7|1oppD_dMyV?+8hu_S)>rywjmE_tl%b+~fc$d*wdxaP|K0(3x zB!9-vrI8Aw1Pd!GG+l`=*l-rfwsQzfz>w8MqcS2P0)#O%(u4;>74GAQ4_8uMT7W`n zvFkBl5`7n=p`nrX)}{)wUqA`gpbse%$f#UZo5>wU#%MBhOSV)nh`I7$f5&aYm!^AQ zAftg1D~CdN*kj*T0dj#X_W_W3{?ld3ZuX9~1qG_0C3+s%m3@-r7-ku?xQPe0mvN;+ z9p-KAB`oFMeD!|j5->Gm`cUu%vh}MQxwN0hF8li1VSxBnZ{3*800aAgCk#B4Hykid6LrsU=E zEX8M|bWP0m%=>yT!7+CS)fdXj%E{2@)BR9fjMlLjg$O}Z0rZNHOs3{gpJ}+cpBKfc zONZYChUQvPjzW_Ad2=BbV`J-f&rZ_y!Loy+3jEji z4PAhA8;x>_-E!Ehj=f=eud*Rqx8i41*YxTvh#8;`%K|Hg6U1*$9GK$WF*+wj$qf}= zZrY;W%{KYZotCgb-FENR+sm2^ErUH6*?sp-c@gBR-@*I zis&f(4{dFiV)9T09xWQH6?7DZ-xUYzoadtvd& z)bL#NgFi{A^A6>BP025tq0lTA0g9{%MC$|)3h0r4V|!*2WU4;?tIz`M2g)r5#s#0t z(s0D+5bQ+7*j{$kN|23oSe^&SeIQ8@2&Q@SfkO*_-?>U0+Sd<^={qC*vUD@FRKk5q z50kAa*06u!Bunz&#+>B#J&%w?=;TNT3d7O6wMv}<)_ED%QL$|gS^v5Y3 z$n)_ylmqD&rP`juxF3h6H?+B-2yly(dEzmKYa{lkp$-;Zdhy1HmG>IT*ay2uQ{X=3 z)A{-q>ITs!`&2bQfClzDnD&(JH)VroU2>NY@}9SGXfJ3uzR8WAU*iWL^N-jyFreHS zW*O)P45-j~ny!?8QD&vr1Ns5b278oP4XVla=qnLaSyHGh*Vfj~gBz*JNa+Wq+H z)3qfm^N|0R=h9*R!a7(14=;dkYm+segJ-6QU`Hx~+CHljU8Ufh?qRqSP;f$s? zJ2%-J90G%*(l8{j{n+e-?Wjs~Y@3 zY{DbKri{#;C?X#k+h#F97<>FX{zN3#;ZSY&hEH`d=7=<@QzUupdkKAbHW6We zsd`ff*}7Zee!-(#O=2HD&msy}hIO8J%y0dK`B@uq*aE6D`Q#Oe(le2r_X)Q-PdCD^ zvxLNTu-Vf`epH||!$Rloq(fZhOOK(K4X_dJwDoK<2X*^o5tUG`xT zN<7uL+%cy0sr-rBKi8RSd5(oPk2@RLoi zo_$B%cbteZ^d*0-7zDBtqKl--tW(iKX8G(ul#1Qv_a zR#GSrf@-_Yp$#p--(Qd!-8(Y@lG_{k_H9}Jri-$G~I{__!& zZQ2j7UyIP0Y&Db#VivgiY4NJoD|JUH^l$lMoUMrZi*&5(JcH}^C6Z+Eq7svKNYL!= z`0)9ly=S-YVImpluKt-+EqqRbU3hU%Zi)J@IOmkriRQ2ctm+H+Ew8RJrN-&`+oR4k zr@B=-($oHW8+_X*!sg#O@~w(wwx6oA_^@->Ooawf5EEV3Z?=?Gmy1>$1~lC&zIj>l zcOFJyk5R6-*RWl)79X`96{xxX(?elo@Lf_~l(1l8+sJ1tiH{KEJa#&LCOP4`w%zA8 zwwPR2ntZE9<83!O#eg!au~I86?)LBBe*D!5sSQ@s&Lvjlp;>{P<2p~r#@SRnGd2DPSzD?>DJzuO+Z587o+oOoV; zeRkvoGpUa_K;p&lpwJ`0Jb{*~B=DZrPD5~LDgoH{bTSb zCrBh#ChwdjvRnYFNAL~R8K=!ZhL>lA=RXzjS@v^h2EGyk@PN&1yzc-iOb=1a(E>V0 zARS#_8p(u)?B^Co$<#FX1qJE79LSCiU&&wmzA;qghQ;EcJuMRg7^tnG6viyhGY0H^ z{+O~EQlq=%^ltc5(k3_0i@QGzLw{-p{fQiP8d_pBT@6zOOdNXn0s5#h25`1xKBqc+ zZ)YR3s;cUpCtmhL_V(sv$Q2prfqz7FXq*?ihw8@)?H00t+X2y87yR-7ApdII_=u6I zK$1iz=RzO&Qs5B?>3oe6siEs8E~~5JCpRR&_AQzgp$Lhe zJ0Thg?cwCzq`9KCjP&dglu}8Stk6p1oX)zScpRF#sP8it1fzp7-MV;t^!(IQ-^IP3y3pOR2}sF#Ir*YaQ`nBs9pq`!XB^PEN_cMjm{?3$7j7 zg_8)5)?PCadFp%b>GWF8PfH^?cS)(1>2p!EZ4AZXzBNUxgE=?ZOc@FQ)EtGkfy^(|ZiEOeGlD+qCkTOC-#wjB!4%zdF zP>Ag9;Mm9Bj&;92zQ6mv?)#7XdtKk_dwpFvAD_?r^B%9)^Z9s2z(!kXa5F#aKX=f& z$cp}?-VFFXVX_O*<6Ln()7{@szq%dAW2!LNs+EbBln0E25B%W8-Aa&C@g^rah-~;f zLv5JG#zKr#Dibgn$#BTG`aNM&I&mJKv;l7(5!_}e-QC@p~sTYos9?^>{ZYTrA*K=ZP2$e>v-#=s}CreppT)B<5Tco8jrO$S%9Woa_wWV zDY=WtTF`k*p1=v426ye-lP7A?k~50EkqetgP=haXNi~t}b_x4;J6-%mRI{e0=5_PS z)1~0HO?sL5?%lg|Q)bUOZsZhb-_rrdfHbsE|Los9z3b~zS9&zyXcKY#WumPYo&hvC zBds{Z;fr)n7Cd01zFy0`|8Mp$32Go;jj_6jmdazJx=pALl^cmvgw|@pQxJ&{RK3Fa z{$)LbDggP>BW2Ld3pRyg)L|6~ImyEm22)}Rh{^84`2*SNgZ}CZJdyhEo?zL{%*Y7Z zsapO;V1GT>sHM*jhZw}G%N=Ih_oHrFM-5I`_4P7f^h`gU2S-p2t(;ES1P6~kg_CRn za+(0c?`_?pUweZ{wP$+@-2=K3)th**H9NtUdeYPvYKp%>#G@wc9^iud{RTRj40n~` ztXH*Bh>?$gssZ8!mT!k`DdNe^L|8Fk$4-Lt$*d@DJ2Wq`f!SAV)KhGu*I2}3Exjww zBExC+^}Wn2;H@MF=p#q46>zhfn{#`tfvjl;)E0sPE>I?X0VEitixjfX$`F85m!L&D z&^~_@Ri0laAvFr3TSYaw5Hplq9ULIneqRl{a8QLrX)W~5_ee%JLlrrRKfZ(r|7cstjg!k5rbhFpg!Sz; zLA%r;^~?sSK4raSkh3kgULQj3G6orm)5&27r0?OAZ@&{|!einuq6V8d=TYS!uNq#c zk0PBBSepBHxp`AyV9y(MSr=$>FYUv{Y=!I6zIO=N)VC4JJD^2%ct*jUzLX?(jK>{ ziz9xjT1{9?hteUuF+ruts;nGrFIsxIES87UKFnq!#Q{O>aWV05IFOmHEkOe~@=Pzq z1{}OE_=Yh{N-Xdo4Qc?3Vc=UqC&p>s2d)*r1RWh^lII{qy7ZIk|BNND!(TiIjZb4! zEfEZ56$dzgz2~OYK+$cBZ8t*r@#~$H$T$OC!$NO(T8F1@3@F=_hyTso~BA&{(|t%wp>e! ze~pNmA|oHJ9+~Qp5*}Rbkk{(pC-8L7bLyo7)Caj93u|kB173C8x7^0{)1P#0nUyux_TTOz-ho}M0& zyZP?*_=XU7y;tLKio`0|)Dek2ScG24HRAxrc)6`@4lXWchnMy!yHg&UhrPbMd$VV$ zQ5j$l(d|680>5^Q%JL+&Y3cT49N0UbSHQ#ISE((kfv#}ql|=_u%4Rg|X(F6%JWAU9 zaM)<(iX5NJkMpYP{hH$eWU!=#A5kxO;O{}OlOF4cE8`+YeyvXq&^Z7VLW=h%B@qIV zM9_8nB8RtEfTSlxH|S@im&-2-G@8p=u%tObp`Q@IVDomz3&!bw>%q39{9-qM?`&5V z3|#B=Z9~T?ig;>&?N=jIO3<)H!(O)Z zZwWL~kpni;FYiY@8EXcleqN2Ttqf@!3-ZN-u{LHBvkt{9bN;vcGL|V&89-b7V{xGq zR(w^Dy~j4Rw9n49FFXCc!&%N>GFTDf z!VXQ6p!?k#ox0F*MGo5~*XR5_?S7E{Kf63Hp)*F*?GXeTMmALtXg^Opz-M#x5XeB~ z-E-IO5Ry4U|A)Sb4^bd}y*!uqp@Tjlr4Qw&=WtJa zD#}(#E>m~|HDV*3Fy-jZ;S5Lk>c{bRe_z*(L$fz%YwUTL_X$+4D16;7PNlVv&M1sj zd-)g(RPcHqBze>Z6Il_=9qsX)gr~9yc<{{|&gD1et%>3Y3UMmE0aSa=Z4c;XKq-Q> z0g@8Sr<2~Vd15y`HR%}qLJrBBi4~R63EiaCRmjSQy#Fd;$BvNbJGDKCpzWyNUWvwj zhuU}6`;be&&BTu(WGSf@M6-gaSW#$fLW*B-YVivq&m&R%M@kz2)2yU9!xZ>*Lx`I& z_nL#J`{B7~an&~|@H|0r^vp}YsgwBuLw-1jw6x9JNtq0G$kCi^*0;hCZ zh?=f02Nq}R9DXKn2&0xB_u(YmMRGQgDdHF%Hm2PHem3>W(UQkk60oPtbxBf&>vdqV z>3ZI{k~axKo;o3oOrScSq6=~h#dS03auEOU1a##chw z?E=)xg*#3k8Ejf`_8)2@t4;)UHI!!s#vK%!t$aI4?Px&Z;m)g$VMJWkD7G?q&mtty z3Kx!E7JgZA$YOQQ+A{^OmR&;@-HLL ztXxxBWVDebe|iJTWa-o-CKgbfr5E>bf{x>-TX|(K?9R-xr@YH06P9KPbvt|LG=Ho; z2Zb_IM%17Y6g;`ZfY#SL`|Jv7C$*gjavKCo=%|O{K*+%G>y*oX29RT4P(b#owmFFz zYBb(-xZ?TBbNSBeQ#TZ6;-^-1*r2F_nnPf07B_l8>I0i)6X(1SSIQId^O~G+`J~9s z-D@p!Z_T5vZ_w`?Xz2iswt!d*|Z4k#MEUZZRJnQ{ezzN(#h_63ik!5qf114f?j7K%g zq2ZkkgGtLdGMJH^EDegYA7vL1iYvTgw{7tsqoOhn{VUjIv)XqaJX;uY|a2yb6|4-a-#T=JHnPY9QGvDbx^?^6oT3WvK}WU0tS~w9wu8AsNsTc)ZAGG z+3&iqPG(e83<4?h_thGvFMduywENizwF`bwR%E?5IRzYrAovpiOp=388{rtQNe5mP zfWv{_>}6tpi^xN0@E|_=fAB5vG4s87($R)KrAVy=9KhhRLJZM)qORl5B;%fS+RO}aXl>4~ENK#ltJ>52YP-Jo3( zj?*XL=~WAmUy-%*>LuMAiH0S>N=XQi!8&#cH}+o^#TG1z99kx0u3-n#}p` zMsFZOV^&*wa}3pc_XqK989C}H|18V+sbYgbWBa56G@eabWGH$7uc|T`?t7s)=I96o z6oExAi7+*9d;Y5@d3wEuNjo$kH=hxF-u;Z;Ps)=G8lrq_$y>N7Cl|K+Lo3d8lVF>}b!~}650vIn35`cCYjRd4Hz)_Jb)lW6 zZjYZF$dgQG-0|#mxs{H?I%yl=7+M}|y>^SqC)3GKI-^)C>iv8%U+PYZr01m5@T){Q z(G9Y7v)1^cxjm9zwTe|n=W`2^=~kcR!=x| zo%Sdc{=&H9DCy&U1Nja0i9Uze=9L@KbWMo={^6^{Tv?yKxaiWCs1mT>--?od@aSw} zncjTX!tjSGY*EAPUtY1LXP6^*CFuP0h4=Ipp|ofd*|gXLyaa12D(%Xk0CYvarSq8& zs44eeMkDGG)za^NOvO62_})Jsx);76RA-w{S;LLtKDpfnwY7o*WSyNB=%tf>j;A+h zFPxpO`Ot*-I&_o&Fw9-~&E@Glcw9e+#H2OUIf}9AC~bt77g>+sx~>SF5esg|omxDG zn{}3*0%qCoCXTA3uRk)B4r5%!%`k=)EaE>}B&3^ACavE^0?NqkioCq2!TIjtR9Wf4 z8OSJlu|4ZL#cjOTbBS5HUPNB^Ci2;{?dg829>aI^+rp^*y{* zr1$&jYdvrgisk1-tuIyY!FJ_>xXH&*ta$E}bz)GAR30DFc^JDraKVa}A#7 ze6OvNUj+5@mW1EiH_z`JwYk@;CePDb{Sm%D-Rt#)<2$?EjCN>_l-V}-gd2U zdHfCWwx?m@L@N@j$?TY6CvoK5zl+<0bkFz4oZSlT1%iP*y1G-wV{CbiH-FC-F z_f(p8+nzbnOT$3#>a;Mxuu23LvyqtKXvsTS+|ag zz`y$K4IWIMb+G~Wt#6DULlCqE{`#iE*d+nKJyh}Kxx2&mNB-(bZ0fsW+_7#C=nc-Q z`?jXRp39>=xLP*iW)p3`;Ga3BTs9*#M09nU zLx~o?@s&uE?@hv{hzn0jp=fj5@5f2^$WYZ8aF5}Ast|obc^+Kbxr>SnV2I1a!Uufy zw=;jH5pHfB52z0{&pV`c(JWb~P-bJ#1hFfX*uTU&OPdg7$*s!v^oISFvNmE9At`#m zsa06zpsM7X`oVIV*~17M-yhPpK75Ky%9GONOxvcIoU(MeeWUA-j;Ht=M?8u}jT>wY z{&78*%f`_kiTUr%S=?!O7&z14N-HaV-lqJuzP(CpPRR`q9yI1w#y_o3piRoz9=IxU z@j{}8u+N%87*ly47g~pg>79U5RUS5+14tuQE$;$8=wRJKZv6FOtbKTpcFO6~&J{ZG zs1xEK_YXej{KC~%4rgeo1OM-VPV?et+p~l(M946Z*-3b8(4JsJ=R%d5 z?Fp_E-Nj{K5XScn1aExyol=RrJ*_@ThLr;e-5xn5zcJVfn>8udsdonMVr=VwW=6@` z^Xt0+qfzDI{us~kr-UTy8u47m$th1Lz~-LHs^SX6ejd_$P3k&CzqKEDaDd%kC>C)N ztIVC?!eq6dql=mu%&UtajxQ&+Hw>AYXJ2iHDdWXYK6Hk7Olr-7{n)rQ?0}3oVRo)x z8M-hFESa|TKK|D>l`KWNjsh&@qLRfEYI``!Sgoh7;;v5)wz`@b)RrHAJ%W1b8yHGf zIGH^+x#YQ`iOrOW*-UQR6HGMS_1;lySnHOpV_9TAyMx1yC)ry{{_9qFXz4 z@-T_s$y@~8Y;0+o^2D{hhE3R8Rt2Bb&14*3ytHQy?NR7JJDxoU2j9W6TQ1`{x?QwX>*SK8ohXXbQf{hLO2`G z_9`M}vfE~Tb1gI7e1_1ZwEGOjX;O-Wy? zf2VW(2Y#5*Z|#nE84Q(zW{QUF$}d!W&>s#I!;d8H0&lc?{k<|ht&0+-rimUB_T9~u~ZONd*ITjJg_VQU!-b$FS@NxP9qd1^FJ zMY^=i1S@Vad2EiK-=PEPy0P)=n=^}~8#GkP)?3ZnjU3EbnKmR5#C8-ob5C;h!ur!FXS$Iy~t#Y1D;X4V7-6PJ3 zRwn{Uph(&4w`yXv-Q&XU{$Mr#6LIY(2k$1Qzu(Y!viB;IG;tCg=a{1f3rH1G5qypj!umea zE7LDF?EqDgk$rXNtC2P19!vpWq#H=dSzn~3iUziBo5kTOfr0buhct$8tfP6`yIfE^ zB{{9pY1*y&f=^V)o-8p~K#66hWz=|MsN`9r@hkkv%lvC|>?jvu_JPz(E~e}Iu_E1B z8OGu|xa=B2c)hyYIdYBZ__n-|=w!Ad9ySl7ZwAVeaW*I)AKMs=)z&akbaPw#_0PZc zvAEY{JV9e(X>k8$9hadLQB|015?^i_?SQ(|szG-SR@F^Y@%XF)?acHWns**Exz_IE$4?u{y! zc{z9QO`O}O7b;?DqbFB!_s>4&FQ zX*N!?qCiDM+LQb6Rm~q$G~AgwX9;Vomff6lf5~>#4S4SCdjS)|*kMAk@X~Bo)m75k zp8|Z8jQ6jd^0Fx_5Ski_YyJ2t;IyB%i!hG#%_Q(n68k>uQ%@dvWyyAFkYdo{srQp* zp9|jF&HmI;ZxkBK=Ffj7da%j+G9an;;igUEjx{XI=$k=~~m!WG;w#VmwQGUGv z+jj~H3>$%|S-Fa73oU%)6|BOUPIV7VRiyJ&&oLcwIaqCopu)Xlqn&$ij#q?}%C$nh z?unNSv+T5-E#!W6b1q*;m?ztMFqb}cC6vBXkh%Zp`UPQH4#VSQ62+VsuOH;@YIgI1 zp8ZXu%{&A94pTE&rm7+wj(I3u2zx+P*BJfNI^I*$)Kx3DxlxLN4C$4kxN~A7_wENg zxOTN*@wd5gQq9tboZm(|T6%nT<)c5FfamhB#hVmAyUDcBR6;RY|IfYa92|*es6YATXVt=!?I5)KL}#2hpyY%nC{sc&qgG zF5h<9jXFNL>Ml+kF1$vZj7-aa(kh#fS~g{-uOeN>5@`CSHgU-$VARxQfgo@Bvex9@ z*Dw2XrxY70XwO1<;EBsVl_phd6rU+?Aa(`_ueM8YL zRxu!rZMCbeyU-rQNt_#O%`y}e+P_;uz5*F!GCppPJt^JfwU_~6vaz(HO0f{1-BdX5 z6$~LW_Yq1^`e>h_y6#Z@_G(m=J983MwJ^L3tR~&ojqep?Uf>!e00gDx;n*5GkSI}{ z`moh{hG)NW(+=&kzQDe>8=}nX9(RE$Ov|?@i3hU-YWvNi7BqUND^L z0(uG|$k0r}R;gFE;hpp1XPaX?t-;C%JBCg&xAQmcu;#VJtTSPloX0vRV+BU8m(EQp z!QnO(=rnv&gA((-=!wZe4GcHC*K%ZU;B_! z$ zraCL%v!aK{I>J+~ROO1%N>PW4(qGc40PUe1fj+ zH*a3Ng5lcRh-|=jA+Vlde$*upGD!8$W_f>hw6RfQ28?iY>(c6b1aa998-S@4vV7L< zfT+~}-i@0aqY;!+L?Oq^rn@(T5o@&(${o&z?$~_5%!oDSV*IOJ`r`Y(q z(J~BXhcF-WR{7X)hE5{{0q7STj9HuI%K2kGf@ctT_IqM~f0BE53`+Kjj`G$jEdcq+ zK<3k(wOX#Q!ub$3R4=oZ9EztXMWQ(53I?NHWfWway1ywH*7lvf^b|l`q$~!zuZ{xU z$x*;WpI&6iea+IC&*HTsxHw#PNd%upoI>er@4?xn@znbQQ{_VjA0}@>OXUBPtmt>7v!}=G z5H|nbZt99B;62>knL{O?N)CE3-nb0NP*w2UNbD|2gKH$c;NyU|0<^-Tq4ar8{=tLz z^CT#{&mgfynBCCT?f^NqtoObo2&gP~AC*(zxD|iQ|A;E6G6261>3p(?eWI%_FBMvl z+J}s!Z_tC7?=O6aD4nQyQ2=ypi0Uc9Sc5?iY!cv~ z&V-I;BSAdUmQ9pXI=csmF2JK#Av`R?#Kpzonc^U~@TzR+3sATLBIPl7|B#;nNm5ox ziQDfzh|kc7=-M0I2r07u+JyBXMubGs`sJHl8FusQy_3c=q*t0$A3B} zWdrl3a5r?DmrCuf8bk7mG$(_BO}gor#t5V*2^eTW01a%|I=5WG5U74N1&hVGaaI6n zgmZ7sOp>>809xXqp;Q1r&aOuQRZl1Cg>@DU;NIRIPA+`ZbQ4YH}O3!vVq zcZ8M~KNAj+KAj$^{`C*RI>R~xM-;vz@n0LEW~tuDO363O!l3V^QSR^DhD-q^@CX6Um*2dd)ws{idF88gV1dj06XV$5x#O8xIqm5x z$?X<+1WHjP<>~3E*h`~R56$(G`P`pI%J9k1o4D9z(+eL`WQ$|!vXOJqQymHe*I@|z zYNEI&Vy(pEg8GF33Jl)%;3onE$N|@mda60D`Z_fhAqwCUyxA6By8D zWVq<$fh82I(+XD3vpIqcfE)uda1^u|&T_6oqMTd=Wc4_Kk|m?KxaWihe0B~Zp&vqQ z9bqP!v~ZH?O~Mf+KGFdJU%hg#ehKI?;n&{TANu$23ou+R zREEP1UmttVRnK>)hO+c0NJbN#un=jf14t}{I&e)MrUI}C={GwpH+lj?0Pi>ggC4@~ zU_9N02}wqJAsV}zno~uzpqECWbm=9$+-k}WpnJv76lR47EvGqj-na>k8VpmwE)FGr zHOqyZJA|AOaeNm4;Qjd-7K$7TfaSuL&6$!LmZbzex`3u1NI0WQLusJ zD@Zm#n8>{SG^$nuS5_KWp-Z|JadK0JyqE!SB~0sO_pRf<0;=gQn5OtPbb%$ch)>Dk$Tr^6wdufD{e2IYv1ENYBgnLWn(#l zy5OaIR+GpIcK}|w53B$mdI6)I{LQ`3V(vcxHSh&~-7lv6r^3K?P(aDt zJOc(bzQ`6@q*0p!Eug|O>+E`kEIQBuUvU$I`Hs8)3P|IskV}Uv(9qPBsT8<0%W8oK z4bG!>sn%#1#0ZB85NHY)Hss9uX+R{n5OzPPpArExz=JA;7X_pv&<4Dkc{}Vq-tS1BI|xYZojdW$eabe_ZgyGXegG$+ra z4Je>l0wLsz42&WK8!^Z|oiR-y@CImr!Q@46t`Wki0xCU>P<((eEKKznh2_Qz6vsmh z!+{}G6LWkBQ80tuIWr}Nb+Qx$bh2;kBA)peF@R$lVT2&yG7x#eGI%MO!4cl2Gojb| zdqzzm%Y;!4Nu~msj^RU3EK~$tN8j%v{$*}w>_zMN-(?~y%4dDEp-7p54C!uGKLZBdWDf?^kRs1Ze?}Qs z80u(Z3=&*=4;@C>69`@qaz5YdJcq>rTBY1&I2(9bAy-xt{=CD;SyPx78pSx?{li4uw*p#dvpgcc1S-?oQCjXU#A0 z_q)50$h+0!GG#!jSO?`j47x+QQoj(me-Qe}lS<_p=L*~+5sAggPPaFnN;6;>C-9h=g50xk8`?^j%!? zD$>;{Th{Sz4UB%JaC``a&kS<^o_=Ewvj*T3SiYYs#?!$bMgwSFoMqE2NDdmHf&AO_ z-C$Q$29P>FpWUqz{US0?Q1OPWpyAEhDu)Y)c!|&Ao-T@llkkC-U@b$!*p@leQV!`m zX`*Z9AdHoXp3D8|NcIav8SVf7z{rk>uRQ3`asAk=I_RCKU18XuVe8hxrBb6{;ESdo(hVKNB;^VJ%t zsTy93L-7G-X917LASBcQ;Lgb&N%eB0TsP}@^$k40Q$j>P%9GBAL#Ul4OqTM7TB@on z=3hb}CM~i>H0H*aBTt!XnCKo()G%z^+3E>b_i&8awv;nTl@MAwiJQ!aNWjSJkC5z1 zxK^+jqyhrw0RVyOwb$-PvIPQ&{^F2lZAiKtgu-;g3WVQxKqBV=4|d;~gX;ZUQU%0G z#SHubZv%oRMApUa!Wmegn%tVVAci;ti6Dko^GTJLyL$5VwyL*QcVzY(=_Dp$!IV7M zZta5G*6Op7ufwccy%4Xb1!(yzt)8eBxkACfSnGJWzX)O)rsO*{?-9TevLTaU09t|p z?6qKX%j0nwcEOUVxoj(wG~upCC{Iz_gY=^SVtqPGjp4p8v)L*8^ z{`e+&V?hXH-T@6T{g8U~tY0VyNi1ovwkv{-*M<4g-vTYlzC<;k{#b&st&dSV<+Vp< zu6-OG3g&8Lz~lEDf4~+T_VJofGj-^^K!gn?+pfm-!M7I&V@@h3#aopwvA$kry=m;$ zT*>#(v=jyztS%A9=^YRX4(u(!Qv6|swK3xcCucXH-H@5I`<@n3%m}TYk>Rxd)0>Cn|##1m$489OVaD?B6av`KPIm8hnnL9S(aEm>_gg95M7qn3aEF9}w<=`Ln z2IY7C<06Dt1Rq^M1mhUGBYKMwtW>@&<3Q4#V1-pAWW_9vi{(fMoc!edvV? zwvSt~v*Q5+<(1;w0KEh=2&_a1=ct)W4XzPkW`)R8&_vloUYPw9-@7?e8YWxVgK*z6 zxRDRK#2C(&QB$>u%;E>=GP5;7bxf>>DkUM7Q%3vU0f8j zvHkr0QhV%xOT8zj*rb>a-QW`Os%;uQr*zUf6{nesii(0MxP{ylsbk3vS(dvQY|D=m78k>wT#xc*h>gc`S?9_jz9p4rE5E}V@^P+V)LC> z*iQnS`$c?qOJK)#wuo`8(lDvv_^D!1mI0xlPs-g?44EOu-9Eun08wNwW~-feYlRQK zB+N5kUO(9nyYWKDDWwDex=L>d@nj`7b`hElaL8!^IAV_yL^KdV(#)c9;9lfRnN8Wu zb@_HcFkoPM)vYo-TNz-aC&hG*j*jj7cuniI@{uKv%8QQ*1WVeLG^ym}aaW`4yO+Ds z3VvrW@v$EPAQLXVkfykSf4p;hm?vY7pvd+Xcu<@H7I+G0x^%As`-sZG9>SxHkjNJc z)n6%ma8P<_?hnhj71>zzEre7%&`8hkZ?6%Lv`K(58A{5lGrXmKnKT~q#B;CQRG%7+ zK^(Zbr=YqA{|GlwUv2qiPZ|#nvRw9?no}d%Krg4CRWuuQBWVG$RBy}xM=t`42Nr2w zSKaS-17T+Xy{TN{O;aT<3M4_aHX&b4p0rWDr?1T>cNBq%}b5KceR4>@51K#On z-p;QZ^~)sjVYy^>sGE8_qcKoiV4PL;94kRBKtn_5=sAqH-7VyT5H-rk<<}J5cmT*e zWt!FS9Cbr2K&3#4A}ZIpcN4e(VZ<&bAu2zh`XE1$OMCZKVef(84*W0G{WtN4a4U!R zW!?01uGI<1mLlm{3-bn4Shw#c#2L=nR#(Co$&z2Th;MMi7at78G0&M*4!U_ha^C=aT$awkNwE=xF5eApaALdjd5lt za`yoeR={S_rr$HaK-=hoAmexJ)4*mXHT&*6C#ZJbFr57Q`1fqmxJfw_42|q92d)nb z9Fbx{I@YCWM)&bh_K{mKANVzJ9d&^ms+2dBtS_`}!Jt|eDzv7tWk4OKw2r;AQtvIa zzh4XAp3->II`00&F+V3buw7^$sSnVgWTgiJB7;_!ZPyzKt1roCK<6 z)XL9B=E4_?kRAlX^xN;0yt6)(l#DPS=z{vM^}UuVaE3VB|G;JxSGuaNuQc4c$Ar=Z zk1jGK;Gh2ql-59U(_30vN?H+gGI!Xc&wTPw@%vE*Dr?lY|5Arn!Vb2={tI7#4DpF3nC=xUD33w?G1K-^Wioh6e;+9es89)DE}@Kzh=F@HB;{|I(a5KMs#K0rp0a zS<9*)a2SP@4Wk6*$MH9omu+Sh^ri4v|NA_1(6`E?&5&>OvA+*Q$yI3 z_G5jq0MoQ~Rv8Cn-rRnW4GR)0buT-OYn? z>q%;>Oo-h^g3ys_EItp}MrzWXl7Iaw5lK!iE9-|?bs0ERB3x3id;laU(vcf=ncV_p zSgOcY3^|FUBYM-ZUInl?A%89$p|$mCS@Qs%fdsPEW3k}S($Qy4`2wD-L%C_K0F-75 zV1k!dwYBAf8+e&Lz#g8vmTr|->GEc-Q7s>YU}n9Cn)e4acneU~T{Y6BtcS@}H86QW zc$O_}fFcf~t;k6apFrhAQ#3D<)J042+=UcXeI*o4F*6$NL3`qfe#F;fN3JmLZQYY^ z??$g*)8kC}!20K^vWM-57t4>6=(e2xFz0j`?td5j+hc0D@Hjq-S(qo+R^Y%)P69Wx zHavL5EXs2&gaZ;R9<2(&bv{Jq!4cF@<(0jk2coH*J5xu_)XPO|IHyJ^rN$PS{NnmE zmvXDaA#gK<_1H@8d>{LY0$J$s^`#KdK*H!yMgE4|`)Za_AQ&rfk;R54H1ECHheU%< z-E=c!84|J^O4DNJ9JK$D3eHd~EEb7;d8l&An<_-IUwzZvkO!^)^;W-t# za(IqdZm{KwlXh!)HKrny7iL5eB?LoDjD3?$IY|LcHYCqZ<9&#m^*y}NsB>s51F zN2_T|g{F4b)^{le=o^urTQI0Gg@|M1ElnC{89(W{+ci9=^(^9059c1kaYD)gegcU~ zqQMp^f3Zw+WJV#qB@~LHl){6Gk=g>1crf)MC zAY?&!vm+cB*5umtTXiJ8EOX(`Om?7dMPxZDsS&D8=3I;$9515|7b=u6wMRE1`jofe zk@QFn{PWpgtf@;FxpAJ7#aa;61UJpYIIPk`5WJi3VbUSj&bj_9looEsw8u`1Rvt)k zF`xgPy3D+D)~-y?SJ}XtYC0xlYRqG#&Ooikv_%kNvElNi{2P1T)F7!_>vhqr;$>Am z1?3ZVB*%Y66BcFu6PvXfh#NI11r)dhx>tG%;edq3j${J(?KbrstAV^L-JvsV;Sdbv zvD;}O# zg6i?1mcDw*#i^}Mp=7z+fv<>l1K#~V*uK;zw4w38H{E68?%|2DL#9lPX$I`f)=!Y%nsaW(A2YsqYP$^-M z^7L40<>K1-Y^abytCa0qy*uS*QeP?ZdULZRXR*1Kl4{@W&*jm5fji2LIeFk(X8RQV zSEwP2dDp;PU1)VxaHqgX3o9bQIK8LJUz3G3(73sHx~Ig^(uy?oll* znn`d1S(c*fDw{#@hs zaoA4+*IUZ}_tYDyoQ1bEeWG|nf%VxwL1M50zquX2ZR$I&VA7C+yCH zFoWF|JNb5a95RcExn@Nh7PUFQ?mjioTdTBerPwA)V%DZ7Tz8T~*F(^^yP5R_6e-ob zi0w7c#JA(BUK5BQRXJlSp8dC+RAh(^z9s<=b2=-US`8n}(iOZq+szSB_fd=f#3#`4 zM3jiTjg>xciG4aXWxIh0H?u5WYeD2ynM->2(`}Kd@i80U)Vg-GPtLCk3!6x4n52!Q zw&#K+Dv{rkCatc%g&czY^luO3CY;JCLY`+;HNmuVl6vZu+6Q{=pCP%O>yi zdPZ9wtB2*7OjyJ4IY*gs%)h7kqIS-N-QzG>3bTscBR*!lk$tW^s~*QEpLr~c)`q~y z!dDP?aGQis9DC4!+HJMxLni@v>h{7OB}MYv48z2`_?Bjy;31}QwW18~s^GjQw(8?f zjk|3&Q8!6h%3feNaCK^Rdpj=gZu9zTfVq$LTpqddQ?H*#(aXJD!xF0=7+HEXpXZYM zD_BVXd&d*zq5SJ0ST=_s$ova?N>wPHJlb9F4V%Tv6lm>2=p~licj|wfMY08VLa*;D z!3eZGst6H%f);x{KHs#%4qAU#M_;)*7&GJ#4`-+YkR(dLc9JTqx(W+f)S&)4B>@90Vfr^%{ zaIVntVF96<-Fi?zei<{s5JyTJd->&CDF3GG8NvNAADl1MrOi{MTNhp z_X9qE*{KG$!}9XUke|=}Jvf z35~F)c$?$;rAK#I=eFnf>gT&_7e#wtnwv3E2Zp_ZS)!ieoZ~Am+`MhW{sFeqH!N&c zWNsg~7@R};`^(SEI!{l?`Q83QrCoK?|3YpEm-3~CD}{_b_A9?;vdlZu_7V~eI@ZSJ zeav^p+dCe%^JVNjbR6tddNlX?W2azso|=_$Q%Obp>uIzcjo8R+!@q4AFJ&F7`-TOGEgwBKQpKlX!g6m}q;!c{9 zz1|8~&n7W_SM!zCi-|OyIGpH1*Zse5heh<=-fng=hs`uGpA;Te@~IexD5KhDCe+du z!Iz1ub8oLc@-E-EG!##2mAsVqim6ErBU8A|A-g7cz|B)hN!u~rEBc`DLEfmwb)TJj zZ&_T5%i5z^2IYi-mR)0l#VLbkm!2xeyZ`33I@68q?fO{;wTd+R{F|!VwCi=vJ%)u` zzw2^kX*P_Fe^vGlS<4`_c+2711jE;h;<1Aw&u#Y-m2&c3Y)XC^;)=J8iY4WVaR(RL zCNYQC64b%%y+8WaXFf}|z2#=`qr|pxx6z*W(YWA@O}f<5!dBZJSjBC2`P<>B#p2Q3 z$7p|6e2A_~chO}3G~dO@4aSQ-)k`{s0&KqjLL1VKpfk%>$%!sI)p;dFn@TT?&CJW2 z{``@rq@YNLTpWOw--0tAKQ%r+-=>{xlQZ8-{V2|M!dyhX&n=moz>-fz_Gm<+dnZK zRKiwdd9Zk}Z;O~(Gqakkv$OA6d%M@P4ej3|tu7rm&o%hzUDVJaJ>p>xo&I3`7YwHc6gbb}n zx;pDbtyElz&q9GNN5nvKNp%`+`Gj2iuV1f`ej{|}2mn9%$htRayZ`|U#fELDizry_$G7(@mb2?4%T#b7C8-Q zJGo?Aqr}z9=ceNx<3`(?P3&Jf|J??Xsii!k-La`yu8%k>*_LnbJs;G5v?=>YI4WKysvr-I`u3{I2-H z+YO(8MqXIjS|;u7j%J(d6U63cD7DUW&24;SUQ?Vd-HR++?0=GN;9(=W3V(CrexFIb z)HSp*<)x6Bz8ORdx)(nyc-y5*GEyP6mH?f5?B>2)vYwRh&|Z%XQa9!b(` z*LNiD>~!I9Tz|Gl8veZLKzprQ_1n#tJv5s^{zVs~|6wI~GvCwo%x>Z&x#q2y%q_(8 z@M$f_r0b4Kr1qZtcW;Cg6@_HSKBi@p^h&rGy+7?qQ}$w%-FrW@w4>^7ag}>(J<;!z z2Zs!|f2(UEV-IDtdX~Gv{=*?a#+XAo34#}$qptS3Q>fIMQGk74mx|k(n$eA97_alU_nkDQFjb|qYWKZoOv6_ee6sKUjPlnO-IHS(M{TWy9>+D0V+J#~PEkTy*l`ST>!;&kWs)fG{@S zJGZVcx!WA1NVvJ%7%5ATP~(cGIHPsH4+?3fHg0}avszm1=wWm4(98LB`^5AJSJwJ^ z+V!=?^3Z0thv^gZZGTb*6ru$+EN}1#Ta#?xBSk0dMG_-*@z-?90|}HUbt>cqBPn*# z&2uquXdKib*&DEJZNJJDNgV$(7m6Pj z8>%D^VA9*@e6>^OG4cOg6PdcGUC=)ywdK`tIldcTi@Q8u%nE#-c+^Flo3yK^HV+~{ z>Gk99Q>gOyAgJW?`is814ZfX{`*_LcKGm7Nc0XeMD{lGh6$3$1?ZAcSsSdKiGmjE6U@gtJ*OGHcL@!1|9U@bluVSWcoY7(Iz1Q5$^7E9SV*a3 zyR4utH?mrv7xRg$`Jf2uO+bi8jo91#oefVhy|#a6C6>CApvGXi-WM23D14Q+z8!d# z*d58%S(>6L>Y3b8rQeDfS~=y#>8UkYX5h74=YiW9PWvC*Fwi=Fm*;p5P+{zdpOJi6 zM3Dlmma?UqQ|rtJ%gk`WedRAhhXp>TTk1qH5e=ticFGBBe;a%<(hNc@%xu*OqSCYC zPA>h;KlN;GKl*4pqBd*E0c+3_Akg6^e@ZkYQlA z=gnfm%s9=K6Q+64^f+J&;07Td>^xvyJVS@wdT{q=tL^@z?JOkQ$nTVo;<<zj$;t0b@|onv3#uv`^B5gM6WYkLUF;Ongg z33RpMJNJ3B z$KGg5Z~W}mcU#QOKV!`qF+-&PUEhtyMVww*!d@Dqu;!i1A)y*G)ce+obb{Dqu0dhn zCto6M-kUreD)V)HIy_sxh;`?ml2h5f~-ATOXhdsQFcXa069`)}= zU44QRUZuYngv$|Z&1z>J?oMaMdflAr6IYv$l~^*5XZ#n4$^5e|)E5s|TDDIlI0FOF zjKZg4!+IwmG-C=`?TJ(k>V{XHG4aH{j=jitb!Pi<_hBwgeVAD=`|^u{kE1H7tg-w+ zimq?mdq(f6=kff1DPhxfXMXW)Yl3Cp4pl=t=i^~M!7r&(WQE92NS^H=$X<75d33%% zPbmFcX&-vZX&(Pg4(XZO6+U6TAks6g!i6$y2C*S$=;rEGI3L%&1}#| z+5{q#%HA23L@wW1bUA-N^S zmfq_1#lY1-KMT8UAC>5_UgAT{=QS@jRNiyh^BofF+5cZ`y>(Pn?e_1x1uF z5b0LwuxX?v29TCc=@8Ku5l{gEi9sc#LApa>q#LA5grU3R?&J4&*Sde)S+C32IcH8h zv7i0yy+5Ci>k*C@+q6H7C&Vh-aJ9b9`8kdoERvul7x76@-3RYVGIQzQO3&XKe=gV8 z)uFkh>gdk^{qciOpL#d7p7&)~4V3cD7|*91RnLUT9$F3ssz(bL1|4T!@$9QVD`8)0E<4NlF+1Vf`=B0V76f+a+*=Wgvi^3PX z@3vzV$)j!O(`EO6|5?LYG4t+h8XUWzo>wTTcu@Ka0`F(WS=T1Mv)Igj>w6XY?66s| z*JCB-edbWkjW&h_J=Iv(zebX(MA(J_f)Nk;yH1Fo;P38E+)fI~3a^^krZ#$sC0BDh z2@4zYxn(KIhsRj4^Up>X606oXzM($uMo&iS=GJTyI+6Ew`or+!x-?}=UGEZh*6)LD zY>GU$^K;69+u%Y+LtB^c4jRG-Qe)dJz0x%;Q@;6K?jG>M|A^Df3~r?-C7O@VmeOYo)P1a$m@aZqfhZjt;9?R(q?en<4Ue?wVO=e46cz@+UfmgS)6x9gKB=bKggg0BQ zLER;M%a$+UHg;c+^?@hkG1uGeacn?^ z7gG*>xInThBk_g_95k2&tn%=tgrCXoUn_lHeyyBZ zIo+sg;AGpN@W({KcW0cwa#d5Wwx-8Mj9FJJBimG?Y+vH$;0|4?YN*uBShI&?FRONb zY~)MWmi!sEzu_p5vJ#glS(L3gc9^qTQ2gx4(bCr|BS*JWyGCC{>fl!5(hM!eEflt; zyft|lqt$IT)jQTphvpaPt?+|a3zeb==x+7XRf_5BHMZY%Q&Pc>h-)#s+dVQk>~!$l zcd5bw&mx1rkTrjgEe5WCgX$J9O2B$F)`8+)Aq;WXxd_LAW^tGGltFm=m z2I+B*8SLC1$;CVRsRY)$V>-ooQQTE#>SlU+no zjQz)Z$M;>Dqm+{?v!1cm`Yq@hdyGc+%rJ@2k?B`?{iW_VsN#%pdGHuFnJ97165gnK zwf*rTQ?$t;BAjA# zhMCF=|6(pvkQCi@+8uW1RrJlv&QOm^rB<9GLsldnFd*antjeX&pBBeOQEB4)kE(H- zN6jzxDvvv(H_CTUY3!|2x3?b@6Pa%$Gry%htd;+8v{U46YE|rfkZYfQGnf@M8g|+J z%#zWPeqw@>=YBeKXQ)Ekh8>JrORP-w5S!&7d~384}P(g8OvRc+sv4CWxk2?>w3+xapBy?yT8Y{|Ri}&{hlfsn>@04F1J~=jNL`6COm!qXw;y z2=Z{`FyZ3OHlDS+cU>xdI%v92VVM>7TRqeLC-V2Qd__}^`>PMS-Y3p<-@g4!lTqI! zuPW~_6Z*wNvh1SBs)E%p?_=*`iGAvqhw^PIj2Amx!-x?;} ziK0?yE!mASZyPlI6g!cBa692*ezRoZe|CG+Q;fmwhX=iPV+=gazyHBvccl*tjz{{Y zTd3@P%oa~*zXj&B;xGA|QpXcfdp}5hVq7(i(tSsLCbjxgCIb>01~ke% z&LiV&R>g5&!qn7q@>f0n-@UdFpSXA5%R-fP?=j(&(Yxjp!p+VhPU)MUGtAEUUVik6 z+~MktRLL{ux*Iz!B^#SJ+UKqrNM-rD|IIwS-8W{lA21+jtC5gi^ZUpIs9h=$7yJ`juTh24MW*a7a* zAWmX)&hl_jD{K~Q%Unx|V1B%hRd>aA6y@`cVYq=9u^(<|dnU1Q@PtuVbC~q1mHgzy z)MM1eblz<8IPA0u`81|t%KLkv=QU6BF;FXOx&BblsaCJIof9l!WnHP=R1PByJnc^ zyT`nRSY-FQ^t+3_m&L>_qm~=wGd2Sff(mfYK3(e2UH;k4L)J>z8kp}&crZfxM)zwo zxfd&LwDTHoTvwQZWR_G#*5iJCQF(Mb-^G57hPTs4eo$BK>nF)K+8wXW_sN1o1>z5L#M8E6H0*{z{-CuM+A{F5tdH z=%{o5*zs3qOhC}l+S2-nMfTf@6+KY1LbdhSPTp{B&SN2w4ClxH#CLJ&?WZZOH}#62 zGk-W{()CF^=xDzqi7^SaaV}g`=~ZUWQraW4W-xdAbi_)vp*#8vxD&(+x%Xo%kMmm! zB-^MxSQj=uRW}(!Egz2cSSNrzuWaZTexhbtl9e%-0ObAj-F;E1#WLN)(u2pX)3$YS z=gMgkuk)|GPszSnpWPhZRv4e(bJpyI1d`}HYlp3-!Fi0FOE=y0$E zF|J;3L7PBR@Z2!2X~grE3UWA?GA<;i@yJB>ZUmKQlfh% zLyD={qe9AO_HEU+*ynZyhQ)Sl&)Y(PzX_<4h( zgGBQ?zH60&mgXHB75r&ZUMmWHj9F)iiDqnf=iH42Y-$8t+MGxiFfkId!S$(qOidf* zV+X!pwiYpIOzsYP=x^zZ-Cqkb44hoiQZ?TZ#w*)V=fmw2|NOgsn$=LoM#v&TNSvdY z#DA(SE4w`@rCd#ViD6#e9I|Fd6%7YJ$(NI|7J3@0 z{?B`Le#VvU|1~f3N_&3-L-(OFHr_SU+BEmTn(w3fQRi%FwdZ_1-uL;&J-y=NR`%Zh z6Df?h&tu6mQRkF+hPVfOS2VUTV92%jrA4ze-@!wXqZ*x1!C7rBuQ=){!R68b*MzHy z5@C}-cj9C@JPG(7TM=2DGvCUSqFkNZ+5FEPBHYBYrE7*S&&>wmKR=vnSB)3uj#v4M zi=)?S%Qx&|_x_-XPO$L~)Ep7P=e3kT7a-LdB{L#RF~R-^G#9D^z% z-6&G1t8_Kh7B67)kO8T8cy>cNSgqJOrU>o5F*L_(IsuOm^yZXT_99u{HL7tzr6su5 z)s@}WOMlBogb+V+RNkG9!m5}d6=EC*tE87kY|kUtSN3mUAK(dXMGvJ>k1Qd<6owu0vr4I=1~apiv(o~y`BXBjJzSItfLXs9u7 z{VsaAiEEqrK{xKCQR{a!*S7beg*75+u1rLbMACO#iY}K;5UDvgEDr5m9unV+n!08? zrDtd`RAhSie0y#Bv$P_aaPx=ZK0Y=NAB|+(f$q8Tf+_KiIx&&QxZ0J)!P{v#3}b(@ z-T7*7k1ufLPZz|}+^mO>2EGUO>UgelRpwkvI!7m5tpt@*rBGXil%UR{3r0IREZfB= zDx3Xia5tsul^^+%X#3aalCPc-4T85C5}$l=tIf3>O57FhLgV_8w!|`ajE$=0yiT~p zdt_+JCnAzo?6dokCC$=Etq<35PD|ST6-X9IcC+N&InMqifKyYl2f=gMt{3Zc-_n}~ zZ0h3AhG99KG*tGgZ6{q>5TxRt!eZELMXucOcAyyvQJNA~GHY?jAe?2yxqC7*ECe^@ z&Rc@TuLcnWhWlz+$EbxJ|29^$$%ks))=wJP{?g{_W4EAml<^D6VW%D z+`o`x;6(1u4R{IuucRv?d+fqcw}`yU2i0fOgZL;ZFa8q37Byfq&7uDos+A+6XNMru zHT~~b#7Pvt(N^?v(zKULxvjcyJdJtGkl=)@P=mGbyH>Gxr8Z-lgd?7AtQ>9onpkxD zq93o9aQ*QMIo?)_g=>V5{w8ndMm3QmE0XZLe;??$RgtRuga`E$%a*(mot)Dfcj!3_ z6EIx)2J^D?oT+cYTzFmtA<46JH)@6ye5qqGRdSQlGj+|T+n2(z6yePzhGrG7CqS(c z@%zB%VsG-S6rsia+%5_-CH%kWU1Ri?46a}evHvK$>=52WhJM>^?X6}cAV-{IDJ$ruufPC3vl~4%H6`k{lE?z!A#Qv%H-@F|~g8=03$^4m+ z2RDU;LW?>df13q8&5H&K^%Ou!pwA6j z2u2N7k()a|UQ^3|02o!=R-R_5W2sN;%lT8|45P|?#4rh@KhOr<10)t^b8CzBP@I8k zzH-?+hp`ToBmlJ}6%Y&S%e`?i1g&Ae$iNVhltdj2#NjA^$|5!2Kq$zK(WA_QUF!dR z*crn+KYyM9BIx)ZkLPNv0JM4W!i7hBPuOU?Hv0{v77u>>_%Vma=gk`xHUcCfX5$K1 zVH_fmPZ$L}y{A>|uCQyX_ zPW1lg_Omi$o$8@nqW~x%2e9((MGvDV1s3m7I05Zm62^`Spr9x*{NPv-h*$w#p=>|e zphrhOP~E0r6~48#m9(xs{k;k5;I7(27TMzX=nw^DGH$T={9uBXahdN+qBao>dhiw1 zC0pu3n>3p~*rXMOV8^;oGTT^x`MB!B&5>n2V>Soj+$ zlbbY*OUs!Lmge zy}IgvYBYmBXz%!V;@0w*K@V4S$fetZ$4rcjy#Nrr$;X!nNSRrH!^nHe{|Z-@w2WE= z79vf)3+Sx!+3Uv2ecG!zNA>!qq@=Cy_%L*-cR6lva~>7ukN~cCc-O6|_@A^ZlS!Vw z9Vzt=YoClq?nHWcYghYJg0=mMhN=N94nQoC%3|nu6VehGr#ks&ApnB*p6`Ksra>2= z?C~>J+M-bTUzDRY-=EVDNUV)vr*?cxjGzZd8H8s){0K8WskHuy&d$gGjxaFvSmjivEG^llCTPl5+(y(^FfY4NH}G5=ITs5a zsG}d1F(!hTGm2OPi2UgO==NV{aVwikvcL}74<+~uL$qLbP}Xdi(6A3ZK3YC@&13?r z0rj;365501&+P_r*V`_mvU%u`0G@qdEV2SQuC3RlKpm?O{e@Dl?rVktWcs@N$KS;< zEIxwNhGv>2C~bDq{9V2apwI`3*=5cE9yHUVzR?TPl1{Q}6P-Z(X>+U($3aUvyY%lx z*{)x|{)44?@ew0{)ig7;KLb2VRxRK8Y2NPw92C~#j;Qqv8qL(SK?JrcInp+C;^M!-f4z^XJr z>&?IT@)7LZ?_*m#JLUaoRKuoAy@NIk7n~jJvVRYr4MgN%Qn}(YpX4_raCZz1WuQY{ zx5&B^q)!&9t@5;6Y@_6PN?8^iU`b`SoV%M4&Rn%)MxEj~Sr~JH=f-GP1T2g4K!n>U zvXFP@Lr-BD7r+AxkG(;fqM%rJdWfoTj90g)AL80%l51_gXIxW-z<+a7%9w##OM@^Ogz&?KaE@KnBgCf^_`^evbDvIiB-B?kg)R4-TDvnx~BkesSyO&4J^hB70?1Zt08Ufgj9h zV0>QhA=1fnmlAi$Z3H zD*%ZteSHD`m4ss@DGbVYAoTZRWn~4Z$KAU>-fk9}oii<``uUU}05~WNwrsg-AC;Y8 zZRL6U;Omw(?&nYe2xEK&AkAzZj!9l8>X(OgUd55l3B&~5Z=bV8O?!1#B1FmJO628809@pehu2f-O8ber z%$bk}UtKT6;YD+8hHj1c9v^N|`S*$5L6=D8^*&v@>x+ICBPpoCICbgPqYsrXo@}&^ zUNUZopH$u@En+@XQf{>-f*r-Y9(0xX@$OrY_Cu0=3fdO;)LCfv=l@3TnU-_%@Pgk1CiHxHa zCVr^oE{sYGdwV|1zBkDrO95s|b}y!|O)(vuAk=8(g|V~aiK2uy31(1*267YBQriH6 z9c%+&31odiQ0CJuHdzVZ|M^fnl^b0Jo0KF0WfQM1EiC@Y+7vi@{b&)D5C%`m($KKx z$RHg!0+jYuBD3{XpZ_M{=!KOC)*zeeV^Ff{9U8JamIQYPKndM-AA9Ei6LPW1b?t^8 zjg=@j2h%PaHovr_45%jbn}*QTNy71{3fU$`#li0YR5ojgfO$Yx`v&rVi0wHgd$=A5T69gAq+JT z#Jy>GrVF%%O@{A36fI_R0(CK%JxSonoua0OPEY}{OjtqX%B_@y8Tx>VJ_`l)=j13~ zyLPP%81M@~%`u5uwYRs|vV9DYwt*CMZ6(IqfH3w>fN8n8y`2F9(VUu@9iaUB&N&;L z8!({HKoZ9TCO{!fh5fv)o{#OM)J#2)R}}onnK$xX!q+c~*0U84DxUCNAwV|ZVK~nQ zeXFe0hgG8+RBt|v;s!>w`YuZM)y)GufQUnhLg+cHk#I>OA|iCVQTad_)zmD_9614!t1htR24|K< z0&pjlFq%>N6+ql~edO$)p+d%eVgIC46(CE(_sv9Un4=VAdo2asRN*0JDx9JUZ9KCx zH@Utuj*%O_dGD5>*JRH9JFX-)v=@hI!?E?LyQAY>_daj`wg%sY z7W~DJzseq%ay~5E_Nlt_S)~n^m#thp>?q&WUS3`v%oAmR@st)>@$v7^lg_VIsH}u3s_0j+z4ZEz;Prr;&-m?%l-7DcIz$3J_#L;>uiL;8 ze|vS5pQc^@@2!<*6#OGic?S1k)5!3PS^2wX-WjC2-xP7Lo0wd5TcXMJCD8zRs0>fJ47^% z+oxg$VSxb${u9WbA0a;I10v`uD()|HTSa{I;ZovA_-?7hfnM>Q4yNgcu|)M#-Y2Rd zF5^dDhon?k*r|(-5>4OLB|^>ubV53Cf=I@_qpgN^lp^`zB_c%i%$EA;R8qovhA^3v z<2<7Q$@llq^As+=S+t5<$Z*3@JRFLovY{wxPHMlWNBs^sof2y6DeTWLr*$Rj3ue45 zN_#1K{!NhslMT6W@HXv1(%>RMSB8yGJ)2xD8M?nJPV!$(OUYjlM?HlYvbMl1T&ey1 zsDSw$^Qd6pSD;yk5R!i?Uk!oW>uoI~i{fE*RWS`!{a_if>9AWw@Fm>=bj5vsOBn$K z-YkZBFry%D&UiMX<^KNP&?3T?yT^p#@D3MvI1sZsm#eo6)bP>2i&#H4@>&eVbUr}8 zBuvvzq(}Hp1%ESZFeJBU>W|wffoLIleG5}b`a2m)BIZOdx9aO(CCH~Xtt$JQm#-HL zi4+hU-WvVN$M`R-vKk^rB$^n63Bnn6H9+4^p~#JyUUT5%_@+#sK_CooEEWdl-xrjZE1ff zE&5Wzo)IDto(BiDKigf_$!UhhehO%ut*+ud)ZwjJb{ngs0HW|4Hz+aoLhY=dZwS>E|4QFuH6J*6I|3KVjQK5J1BbU>FYE^ICkeNyi_i z1zfp3mO{nEn2Nt{c`cZGzlm^s(Zuf*%R(z@`zc9I zM{>e$yDHr=VhU|5X~`0^#5nL?-`*h|ryM3&e%cXm5921$q2(S+hcQN4>TjOF)DgD+ zFJ>b-xtsgixzIk@qWo#tli9I#Q3SDTc4lnf+)GfFQd!`~XTW?d*%V0~#%0n*cDN=` z|6e%Bo(lZRuV=fSAb!Q2po!w=2*YYhA#Rck;fuO-NCJVm%UT=sD_5aUW{N4o#^#6+ z`3t2i4M%g5m$&n5D`IqYG!l=&uk@{#JP1l zO(2M`Kyn!0G~j3RJEUsn$vi2wvMEl`T}AxxO`Teu%!G)-1F1kg_(9UJ!p|@!iF9qQ zzpgZh^nH-%v1k~J*|JHCou+4GbjgG@eHeT_wB83Obo%;O58DcS$l2}{4iO`9MW9~A zDB^hU?%lhvt#m9G{#6_1vvCcgh>7=Lw>1HQM`zGim<6JjL68t1x=)~T7078&qOK7h z5=VQ`wJ*~@QRC3E;GdosjD?5OEmx zI;w&t1YF3_ej?-@7L^zW=8^p4p+8R~TF&2*j2;NT{4Xe0u1`tJet|L_Brh^Fv$}v! zV-ZWYKkTtuI1woTL72Y9s|fMxWMYP%{{w)W1M|dic6J{8g|bPZ)sBviT}L9`=f;_% zFdk_j1%6hmSz0PmADA`LGj<;>oWpoYlm}_uYN`vm%spldds5|cw^*V7c(%v;{?r1a zuVXoxbX$`|2cM{|aX}i4rSSg8XBiKcQ6|p7CcpwQ9o@%8$B~Yfp+B zOyB(-@ZIs5-)zIxPsx%>ldCLFB-xbd6Qr!vTnZT9hL?7_@sdi}GXlxJd}&;1xbPM{ z^=!tt%ZAz#BQEJXq6ABlPRg?DQ=KPrk8gC7bm5ymh6YXFH(eRL+`N%C%35fi@?BVD zJ((8g`u%7_BQT1ak*1mASP)+}XXehCh7~ycy>h#biJH%{#`0`8Np-SEf&$Ycb56Tk zm^6x(iB$hkI+B+ujJRfnd9d{#nqxz><_HCoJQdwt;@S7uYnaJA^(F%m97VpTf)!4+ zIOb1St@$&Yj>5zF*IO%`Br1(^BTOlU&r3-r>-CEALv>f^4E!C3)d|0=^dp%zE|q%5jfB?5cp(y`Ymn4A(SQ?qB6y0r)*{e9Af zrU@0m?$Enm&%0Gf#I{}Yu~tY$(zaqu&OwqU2fNF}iN!^&{hk&*?|sfsuR}TVudotx zMjYo`y_c$&Ks%2Mi zsG0R$iVVrc$zXn`5BIE>>sLEQwMJxF(yI_PDqJ#*Oczh-?N0kX?O4gPxjJ&kfLNWR zJ9}(H?H8$y76vp#W1I;xL=Z!xytx_@4kd92kq za?&jb7x{18sj$zcwuoWUur%RVCpT)NuwaFwR~^(90{<0-a>s~hxAx(qwK139_me1M zF5UCU@>aZOFl{~1#h+Kj71Myt>y|-dvLcG-OhSzJp12qZl6JiP@kq)8^0!~)|`r#{Ew%XUoDJx z*LWpH9v6w{_xUFEJ!8XPQDm+iDHEE_;K<2o`boX{&7I48p(bq!3SxGcio=%R z0E>Bs^Erj3-J7HbU*dACcqsw2`+U9(UoQ~r)#5yp+o44;`cO(^PoT_!N{ji87u5>gq^>AwcoCKG!+PdR4q?kfscEGr&E8b%thQ5f zU!&REcaO5@?1DIM@G4q9H(q=phZUuc{*@&Y8&y=x?c&}XQpHj1^l`re>H3Owtgi5R zXSYu~m>^Ca2(E2y(>Zl_%hNWDx*W%Tw>Izm^1H}JT}*nVMK5Mod_!ZYNU>~PXEwtR zekw2(ZJR&}?lkHB)wPx+M{C7-vmw4j61g8q{xSVk*SS-Fu9bUBxPD>U&_EnbyEbEe znyRN??~-|nH!RA;FwZaI?3D5&ufIPDGsSF9x+Qq*!^eyT+b=ne*<3*iY;=YkYB^~e zYJU4u2* zO1vq2Ao=@{@4vP~h7SV)J=XDIjngEK6TP*O%p_RW9{(ziZKp?O2J85YaV@Zi@i=N1 z)U}R4#2h0(GN*j^G`bw0H9X*!rL;mVMU`+Mu(C1b6fPf+&lr|5AXeL5)p;bP5z|yi zL-%GX1H^OvBO3|crrCXTEP5i6@;z#P$e__6pzRI@>tjty+t4$wTN;_qcp&80HmwJS zH2&dQ|IM=K{$%VR!S2*u+ueB$%R|~Whq6kJtV8c}TQ%O4Unr!al0T5Xk8~v^IwrR`X1WX$zEkQ{#Uwr$1L6Rbyr(>8V-R6$Q+-Ulg0G zKd3kb<8QymVmPI*^BKLHiMlToFV5^8xjq9ElGu&(Fv7R(p||0c1)0Vj_tV^^V*i=$ zi5p6)k=*scgw+JCcWOmeQQAfkNqcOl9f>i+W+V09!7Vi$=i+$7ok&}$cCT>q=-L8; z_%YG~rG&7mbg${$5`Ct`vz^Mj`(7zu7>Dov4kz{xxgF_gXw@VwS|}c*z8H_c`x#Dsrp_vG~+?6bZ$XyF3f4j?z=p-($6TZ&#&7wlHLxm1%#{)~sQ{T(sD6 zkRNtTh^lJx-q4UfLJd%A>`XG|h|BY{7u{BkLL^w9Hg zI5KSBb+dL+pv2oJJf`OsYh-d<^nh`qTuEeeMA@f}tm|qs{!ONXmw&!oi&lB{6NcyY zsQQRCgpE2pyD=pK_fkMb%LHl#`b#DLyOm6tHZ5zSI)Ko&|B(qlX)5@c65sS^tMKuduJYnU~2LNgN$y_k&4|#Q0a3Y%D@$B3vNytt3zq5_H~ii+$5KU3YDcxk_E`9t6rUyElg3RrX*WVFl5U1>shWEplOKD9o5bcF2?b8-cNBFA;<>iUyU~3Z47^&DN7B@0 z8G+L3x?kJRvKZ|YuO{2B!tg5cZT!FO@grRs>GYaNUr)ck&?jSA^h}BR#cj|KYm&;5CYJCvI@S~7>s1N14Y!67m!64 zoC=hx-*6=ZrrM}8e!lJ#7vU$c5Mtcok(C>~dcF$0%N_PZmqBDoJ3kC zlV#GPn&$55D^?$&{Y%QLzh9}YNz>``ch&p1+8ctXO98^Xlnl-F@;0@G7yY^`grnD< z#>9Wi*UH|9w#_QwsDf<8eENkXFM!A1pi$)N_7FBBH$IVe{mlc|Xu&%WKa&bQmUkymKt=}C= z!You^n2~{98^5XIy?^KOt`513*lqIr2iZJ(8Z)c{Ts0i8`>RD-)v@<{(k`i39*D23 zIE~2p!xID@cyVt#jrb{$dA?CuD0ZrES(0(}+4(D^JEFQ2lx1##7{&lGGhX;_n$~(7TWht2Xw} z$z^+9pK_N<1!h;(EB6EpuAfR0?3IX@v!+fwO?mM{CsQ(*EzI>I(s#Vs&5ah+cH{0G zP!JY%=6s~`b?T(<#!W(b&)S>|CVyUUaZvB2n`~%&Gtqm#e%CXSZqcR++#t3aY6kBD zBRFZvWj|0ciO;&OO58Y2c41$K?|m<3_lTN}4)ZnnzGrEGYddv6LG;^xbIVRlvXOUN zW=;-vOH6HOsK>E1Fh+vP-q^Jb!sckI$P&$_mp{(|mhTZ;66MKQX+cQ-{D2+kqX3z3 zdRP$cJb;4qrhvetE5BE;WV-W%2M?g2fkn1Ciud`!j`;Iwncq{7(Xj4lrRU=9FPmof zCN3zHn?v*)F0ykDDoDQO5LOsN02%U!i%)l`4%K(L465{idlG7Gh_5d2->b?GfXFhM z_qKv63`kams}Ca`6ahHL$W98I3A*DAA4kf z4%yP-Za4KRyMLDAN_ks)WCIzFO6UL7W*)d}=>1kp*UcW*u_%RXDQwO^ykXuE(KvD} z2ry{#XHSl1BENi_aR>#rDV`nb%yB7@gf zU#O)!MNTmwDpZtR2f^rE*fBb1WNwgvZ;q-oR*h4PO2ws`xcjq#492i!AZ=}o~!@yGdB+Ri`e(usJ-f8_52hz>I zLICq8eAi|1eD@0`wVh-pjB1`ySmWonC-XhyL?6tpvOFh=!}IVcwPPGJY!O4F%Yh2e zztM@bhY{@F*fbZx=?lqE;SQR4=pD`$L_5B9#zhP>TYtQYJmou;IDFyHWdpDeO^rz| zRth=TZro-!|2u$}VFholFr^AIomjQwV}>!G8-%6mDnUl|)NCoZTH9sQ^|;d9r3c!%P!C&IBX080njN#c?J zfV<&Prs1gCs4bPh%6=M5IWwK(qJea%%Pph`f1-FZ|ZW%NI52&p-WiA-qGpr zsR?BV@>2V*20lh2!WshzUfkYLOP+DP6g78{LLy;Xe7o(+f~-oYeu@HveMGvRZGY5C z>W0FCiCeFME=BAfR#vU(o?d$=pqw9lD3k)Wa<%k_RM|NZFGq%@oMJzen;$rcHxT z1ai=3W%N?(4ihg!&MVQB{@?g{G;%nl~dNtrXqpA2bj=Sx?exfA!bZrrf$2u zAp4cUsx_LaBf|Jqc>TQ5$$2zvns|2Q^HH2*VIaQtZU2jGxjVn7t|bpX$zZ6}5^0+v zj`ZNq=mD4na{Sca%y;eCFSWMsKPbV&H%xb|I8(7k!ZSl0q6Ex=h@WiJp-4R^79ZVf ze9LUhWTJkkRL)%?%`4yTz!~UR;bZ4;&0?iXbMb`4Ut_Z{f{Km5PV--IZ<*0!$$$RN zQ1N>EOgY8e=F2xH!C;hA)J>n~E2{ExVZ1QtDJAVMJL=@GD3?OQg!KxTzO-U7-ugU6 zvN|$f^!T5;q|=`xOjqafCb;Sn7~EYB6C4?J1+H1hK40bktcRY`^rJ_*E+ZD%O+JWx zm3xEwgrp#|fdH>wqiZc+RwjCe<5Z+!O>?owZry{Fq@z$nTUBcB}?v=c@Yo&B$Nmclh z|JpGkoL%On!4EpM!TxqKPlj<^4Nf%bkI(NrJ1`EA#0Uin<^zU`=)OLm`@g4Trm2h+ zPI{|08}ldsYvPL9o|@YBE7VQFxwtE~OJ>u!C-(yj?sCvHL*@xd^s1n>P`}eLl|1tU zBG?RnG%rjxWa)p{HIgf$2*R79ZSw9CFDaRAM0{eZ!09dFme!hw9CrU14KC^jMo3)Z z?F05TWQC@hL-iCBg-+nYr0}^0#ZNu!)N*xxA^uFH0gUe z3a`v{*7Tl^fZ!)b7J|U5cH3XtkDuzT+o{tV>a2AMXC1{>-VdMBQ(!~i5s8RBdFAzx zsr~*zWN2>c&*9P9rp0w#Q`jz^M-Q_Rhu57dZl2r%5Tx zcVgf=WS&h8i#0fo029rcy3GIelF_qwMslSJ?4)q8>17Qr$uWsj>naVfhe6Xgx?QQ@ zOMaUYL8JzUTOtzce?F0nX|mui{Wmfz+U5NN|Lr28VUiN65i)0ReYpK1LV@lyZv-P; zz)z%tK`C0(wYw>R{iOsCKl@5v(=~TN;VUN~rG~r<#l9e;nSc5;h7VE<_fv=^HDg$O zPh2n6b30H`M(=-CL$1T{nS>%YUCQaLl9r$F>`{M?`B<CG0N|)QPYb2R54i zpsiyfie|`+)+=)4>?IB<0-NL)wIWkppkQkd-u%ksr34AT%f~Q{Tfu3j8yq~*1(48K zxzQl}E0PYwiDA3ecCt(#VOg)c#CDp@?Mob795EEg@hV!oL;wD5j0DMAQkx zp#Em40#;sWve6fe9BYO;Lb#aq!RdE9pQ+Fmyn>0F4$r0vLOo;nL^j&h{x>$KhDW1B z^Z8x^y*J()%%KuBHOvPWU+xrQE-$QdNsV2+kD#-=hCA}KpZXm}PDZ0J>Ya(LY`wYY z&@sqTLPH91++6wAmMg84Av3NNvblf71WVhNrb8}D_g|(|cn+;czq!S$c zH=s%G1Rr!@Af|;&CG%cWn%+AB?m=CqfE_^ z{utqT!;e-Cp>+t^*=>to5Vp_KmuoJNW{MTpzGm{>Z1(R^L15u@Bgoq z53TA(BxQaD+~*tI`05HWyua0n{4(Rb<903Kdjy2cA=c1PJ~jplGIs@l06IGbxy$vin|1;O@A z-{}a?Ec-M8$u75+S(#gJZ*k~N62BNn=RDGKza{`uS2YdR|9XRu`U>?L1hFln7ynJj zrK{sI{2+eVSbVlP{%>(eB7A>^q+qDWNs?tFD2N>;BXB$@TP3;y_by_SKD(! zq11)!-&DAX91uSzIPDpnrZX4#W(8iCJUp-DXy>z_$8M|kK)W}P1ngyq&1;-9v8O_Q zQP)xpp9X8Xf|b6^x9E%bHBCCNESmu}8gDgyH?x%UgK++;4g@j5nO}+a%Oy3fC8kC= z?us+GmtFyQ!yo31(U1VoHrxW53*|K1DMm@A?ytNtXTEza z2Iap=Fm655}Dc4?-cm5H(+)Kp}@aM!7yxb1!*;{s@4}uUWJJjYYXN}LAI6# zE$gp&+jQ;@`f@|KR%~zh>``jG{=H8%FuG__axuh2qitmZeit8$GMRp@V~ra`*7$`8xmw z5#3TU@)dLB$WGnAQJB|V`uUugGd#;3lws1ZpoxBik~!>LCEI%S;a29CW{1UNA6<=` zo5Y8U2G)#D)|{>s{xFo;P80)d!_Ts*(yYb2IL@KG=|j@*d+Om+flEF@jCz#%0eupf3Sdn&?k6BKzJK z(McyQiMEYj*04;w30JnAHLvyj+ECfEg3s5gKeqtN8*r47tJ}Uu6Ho_=_1G-HcnW>m zw$aCqI6gRbHdrl=NWKa}JxJ-~EtD+x)ACV&$pfWx=lSX*$HpopMAOEO+jQLz6|WS# zFbbdV-x@t>ehJq3%hYJ82J#`rEY$0-Ahr_)7$34ZNt!^zYSPAh(^Sq#MEYmlC%v>63pBvob&>)VF4+l_upL8F(@=E8EsKf(xImdD(9CD68XJH8 zI>Y74KLu6HKpG_^vK7j>W3q-q-d9#-Z?|L&DiTNkxR8s zzPVE0KftTR<};yGW7ak*6j{G_@Z-#W_4+9C9)91J}!G7 zxQ7q{nAPKD&Aipa5VknSd2?X^L~=%PZV;5%Y_;=ILxqJF$7dv#-IW_~%m>MWL*;hf z_dWguKCU-b3l>i$x!or!5u_9sI#6t;U-@0Kb?nbA3by_l^FQi(V9W(an`x%7@F67`>^J3iGrnagfET@rHNikQs%lhsE0sy%(XKmm_dQS88Sd~MzPHg_cY#5iD%!NqFYfcbF{S_3hn`2k?J!Lj`W|=v7E;j72>uCAs6OkCb z%I}!i9Lrxj`{-luk9FpkzLo{b4wT)(&C=*@*3a=9BYpF*st%y!w<<+5 ztlJAZ6dKO|U;Y)C!WX_8YrIix>-sa$8OJ0AZSCuV+XY}s(*`Wc8ope%HHcGZ2b`7eJVkDOh`Ej zVAXCdJz2lkPkAP#)y#yAN#(HEd}QO_iHVLjGzSA{h}MB3*(iU;>jbF`BHS8wWPR{+ zK1`d!W3ijxWFzD|t|>0onBpbWwaHunBAKPAL40WQS(^+t4lGYipjq`c16w!C_L;x9 zACFKQgyP@Nj6N1;3XhOjXzW$c&6=4ElbRhKd;n(#l7W*9UBHyWGdU#A`;8itaJ;Sj zKR`YEX+Cq|b$slln;C7DYtefQfQejtY6gbGe&j}W7PkebE9XiKgXazWd9K?+ZP{I~ zvpIZRVWTdc_isU%|3BUvV(va`Vo8JFj>A>S&8Lp{Lvzz#aJ>UEu3_`G3Uj!5CyFv% z3k(drZadahX!aytlQ+X@dKjK74ZYAe1f$)Y%yFS(*_K0`&p~iy_v=v0lZXL|c3|db z<3{a{;oCNf4B#eOv1uM5^OD@FTJJggx6KU>pzK_$3tx;Lh zcmF8iF94yM3UkG9sZDDpaeB5b?SVPg{YOkRonM>lKOMLD1LnvB1M0)oN+Lb>IVF zRcLwmj9>fz;8*|uzmnrP@ANF#*;m-P!G3ML7N~Gxm{m0VjDsf(!VM3+~_R12z=30_$B0 z^t>SSgFpZQ#xeT&cO;R}&FB`nX=a=Ns4#T>lgn)26ZythY7J)u{p-@l3X~cOT%flr z&HB&v6lM+Ngj^t4EIRbx>SQ^A=UF5AUkdD$R-hZo^bs&Vh`o}~MGaryY7Y+&T7Z68 z4+x;bJ7^&`pYWkrf;LwQ+7|V62I?$l9|NC0sPAP%CHY`j7~lh!N@r3IZ9vu%t$Bmm zbrY`O&F6qK(-dY%*op?M6bh^R;M{t%A5`ltA&(#%7KEFUJ@$rg9)0j$;LI+$YC{hg z5TGi=IxqCBGeL0I@>5j3Jw9*4~4B=mj#HxV-Q*E zGDh_;5BIl+roUxp_rX>aMRx+K2zuWFk`aI_O+%q({r#x`aBbVsv-_P}Yda(1xiwqk zPXq4K_kMSbd&m9f?!gepX74xFyVkRwm~%drEx542z-?_-rTjH+ zK{NKiNRq9Kx<#D8Dba^b{qW9!!&{rrlsFuGFqHvT;TbCWbtbi#XY&szxP# z1@$6cFmTJoI@FYveVR1Jd0{ zgv`QZjoo&?3erNdu~B@aFU7FD8XUIaB_B{kffgO!AxE7=$J=O`X+oBJ#)S!p?n+sm zx7QE`Ry=qTIG)_ED&I+ngAP%IZ-IZFYTlNWYRis?ifSC@q(!A6_)R%*_U$CR|tHTt!1y5l1KI%Fp!HxMTft0G9(E~I^F@u$KQrk$INo}Ezv-yTp~Eb6Jq z4X&TopFkU8DSe5#U%w7ZOY<2I)<=gJ`WzM&ZSGT;zjWb3U22*!X8G`2Hc6XL;ZuGG zwmldah=~Y1ytTd6^=BKJuzi`Iou~s{^U~7PB^rA+IQCI_>+T+_88lyUfY8CfTw=Yy zcJ0~&o4ml?t~KvNzp!{PK+zGz$2CX9r2YWQdeUytX=$$GHJW15NurV(S2O&Y+2j_- zd`I+Mzio~0zw;>>X<14!&Tv>g*4Nk;qEFK8IcarW-U zkZl?jhph{l+%{QUqed_DGzCdglH53KpHqLN=diVoeVZ+of}4Muo>%>A2sD+Eum8+j za>WpV^wyE$>x%Ioczl{InOzJseF?^pdqe_koDuD~O?RG0Mn*>6eX-eyQ}d_~2T0#a z8)POQy<>cI!O%ozkBRyh#E)COP7J5nM#Y}{PE|PgnR}A5wgJfR$J2+vW17BQ7JH=? z4R~tmIYs6loY-5ltt^o2YJ#l9MUs7-)h;h--CLHt#Oih8u&iu&gZC!hR}>6A)y_)Z z2s?Sr?J%@nRf6_F#f%vEo;Ak+*y9R!2c3yB)X?fOQBIixUz6hQJXjl>dNfF+>$7B1 zk=CSm9ZU$7&8Y3vwG|g|B{lV>$;%?Jb%}Mj)aYG`L7VQ=J}i{%M%%a#BGxdwvSy6_ z98$FkTo41z&Q5a}`(|v`Qe7>iPvUpN=3y8WAF6)=uDq^g(N?e*&toCFb&0thudWqs z)~1=K9S`|n>j1ofxLM%6w162f&{Ay%suTLmEG!}p^(P+|6N?8DoiwAxK4NWcU9bHC zon?b8d(X!amUHp<@88J=YiBxS$7?*eEtyQiX3GS#de!CYP5v^WI3d+K(w0_z*90hl zH-+IJbn`iy{;0$ro&atce(K^ihGzRB(7rk1-o1OnBQ+_M`33N~1JhZ&gkNCwQJeQ! z{$XrlIYQI|Sj!Xa8Z#{Ql`65+1kv@IEH%UOozBr8$<_y+w3LSzj4qlpjuca>vD?7r z;9*bBPgE*U0}txPp|vHZ5i}DD+t;^hWi*U`R(5;)itvi-@KC+c_;kcU>SA#&2=z6K zvX*DV!EqzBHE_l-epRrBkY_zPSD#qh5&~Sr$hibaQuxX(W-u}`qJgkzmnjbfd@U?; z#_pNFn^MQ#dSLt7{VUFAezze8i*WydcEBzSUM8)98v?a7<`E^@^rH(w(b4;5&>Iq5 zd%SBTg@nG#Z^f21o`r+M!)j;%`;O6DWMZFXTL@ZpQl4n#*rP8i5g`C4owRzJ6ZcAS zBMS;)X6Ux-72t}c8U>VbwDId#XO48Nk(fp|rI99K!e#))G`dcz#+$X25a7S`hZu!d zvD&vju1UNJZYMEAmtPM|2rP{Y5Pu{@*l2hHM7SOo?Kbl8z+7y;0(Np`YSu+zJ0aui z*WVm}L2eE-2ue!qriLx@FhnJ!_PO>WiMD5sV5=sI*HMp(naFla_8-(U0lWZvUAel9 zm6zi>PJ|U;l`B)KKrkQ0toEF*QO*|Oy#QH@cS&EmeC3ir8ga-b z(IgWn(jToIFH48l6pp)@rWbeEcc2&3YnL8gG>g2YZT9E06U6PKps)11ZlVzLPtjFL z+d+RHP*0khwM0ZkD>A;Hg)jp;wc29cr)qm>7yJ89?39dk7X!~SHS%~?aoJ(NPg=E( z(L&`mi?E%r$Nli;aeMM}M7beM!uk~ES518tL@u5L2M4R)(-|~lodfv<^zFKWyKAh? z*(o*Y4~a?&X5YI-CETuF<%QZ^8QIO42sDg#jv2S-LlU2{QmBz9;G@c zcapO_LQZZ-Uv+LMqd?7(@+yf*24(?4}{l#*N$5E9Do1gC~VhcUsIUNCeMZJeI)4X)4c~(4VlR=$9J-`+b8IeMf<{67Nn=Zu|vek zVV%4v><2d$V>Q{R?|W@Q8&+SD2wyPBmpobFSApq*d*h@)p2Vrrx%~xVr5jdOD&)J6 zWG6NQN+-nC$4-RyWzE8tgaTiys?5Ff;UHFdEiA*^z|T)KNl9q_Ey6O6v*o$ThP%qu zrcZdK_@k#8Y2$w5^5r84Hst1-Dr>8%4vknqrDJ3Qk}rd3t&Y~V!7}mi!{{Ofo`v6K zZ^2ElreEb-o}S@w3|Q6T&qP{#96HRdxN{U1lL(d6JP|R$*_tUdS)Z4gnVMuAqhhrS z-pYv9L0ZXhB@gO@JXuPJ5r{?y9A=Ks>r+%X+n*EOGWvUJdcf+S`+0 zM^c}qV+lMWd-D+=rgbiRAAd@{`xucU{AyFr-D{W+D$dcc<`4%O7g7};?9)!U^>#MK z{Z~w?+$A(Gu692SJ%%+ReVe9;#@HIhmY){$AJ!hfc^)F`*$HZ(&MI+(cU=seD zYWSp(drMhgU%z?xY3jj@&Si*-ox{RvTVA^@PDHdU>7hYy^$$_A<|yP+S!J9KcLffH zw8H(R8VE$OJUj*MF0m2I+4fC_UPV_4EHSD~_#t^ZE1p>7&Ki;^7Ez4WTLZ7$sYHvW zDK3)4n7yipRLLjp-5YNjeC+<3O+$TaH*6Rp(I)FXv_)5ZYFmRQ%=hjw zB5e~3SC~3kCS2K_>gx16bRq1zIniV^vUh9l!kWX>k693yN`FhlI~H}}y+CDtv0QKE zfvI{y1(5CF%pAu22$Qmh<`4oHV+V&uw=(e56{cB`oLQo$G7nrlv_?!p)nuIbywm9e z^-dyQn90Lo=|Y+SG~yUrAliY*u{TvW%XTsTb*>g^*^ILhL8-%jhS#qj7->EdtNk{H z*B&xYP?C}1k9u1cA$N)R%#fpk=@T?Fdv;Si)bi98OgT~FpFcZL#3+k7PmSiplw zJxnL;FiDKiS>_7|iTKR_acMAXdwY9BD>~}yqlwTB43txEh!NSFx74x0Nfi$7c(N4~ z%V;=rV(kvcf2%sc2Q#|M({?1Vy4}&!7{uJv?~l{Kiq7|22^a zWH?1xccGQZeU&}Vs6o$pzIeGtH*~$nDm%OrK~lU7m3u<*$xnR!cKAhJoh<(?El1uO z{pO|!K8%B zx@u8v5J@0Clda40BH?24G0elAVEWP#7@ipvFEufcC zO8RYFTljdv;_7z}msNao51$X5Afn~X7wWR6-tH`a%6c;!SQ7?e`ZEn5!v_}z@_YlP zLV+Ey?QF~-x}S4D*8DYt4|UP&`lElhUs4Q|>8Bh<9ewV*@8C>qM$1`T)+3_N&u~*s znoUFcyXo#tGP@f3*enJ5lf6Ul51A-uT|(adx5@U<4_)ubw;@k3>96C4wZp>^YCi<_ zgNKa8e2Si1{p%%@6LQ{@VMfJmNqW>gR~JRUL&61IIDi^`wO_{vI0oY7M1Q0MIPuLX zE20TTAYbvfDR{ZoNv}~Z61|Bsb&FC7tl_y)2wEF3l%Zw_fR4)jyTO~!{s&Vb{Nk~y z<-$ZwQPAt!kyTjNq)jF4t3-iUqJZ-DlmpiLF>sMzyDG}0>4kMA`crV^K7GJ)UQGv` z7FsoByh3$U|H;QrEKcvj+?}9vPDf`U21ELHH3LlUQ6^1w+>`61Os1l`y04aRN+DbG75dCO)w6cj z;;ga7aBe_35EZQAy=Cgd+sKtY5+D=(k-Eh3duVwf^NX5d(w^~hi^+QWNnOZ-1?YkG zpo`supWCigbkjRGNwVwE{|p=u{>;&{ek(@)YtzXP;n|PV)qM4eofvSd^CM(|duZx8 z_H2dNjywPb-F;8Ii>7+aieA@Eyv!b~OG_w8wpysl^XY$iJZ;6&!l&2_Hn%G}?7G@B zhcNeuasw>WgW@iynXjJkZ?zWcEfxZa&Ku9phk?T`P>{EL7|P?8E}wj~5+Di6l1%o& zXs=|yldKcKx0uXiq&yH&_?$w#q)CX(DPxz5A-X!nmB``ec!gm89I2kv{u=;QrcTCMu&VY^wMbv02ovANjQt;#;iz-BiKA+21i!PJ6_YI~dw#sM?clO=RVszyaL#&My+3ruAm7S9-?=gk8gt&h?p?tt zYnXj~E^v!VC_uzkp+RW{qwKzzZ<202NscKsomJx&M-CQC0Z3U%p+w(i%ZqQTJhrUJ<#{kr>SL%DxB$SpMO z2-^|SE(&E|-~faeWt1)xV8*ZI-xmq8>GI`)sOjpKKe+By;V7W z_Yd8c@54U&10*zgU-{v~pHkN7sJx0c*HvJ?7gOx!8I)eX>uRe`TB1gMU?bn6_}#b5 z*eSo-&f3N?1=>H-__VhPYd(U${ST2&FFTEx*?odH&g9U{bi$Ye-PAF~epeOMHmX{r zBw^fQA6D=g4%>B3IEzK}HD_{KN9g0}%hGqpRlB6((_A8jX|kDHXIh;{bVMqyIKYUt z7F{Rx^)B?vW0g|RB;8Lg{A&CqQN)g2?b#Xncej)75?!Z$*NBOyTugacd#jSY zLpHCr9Pa-kVX}Q(4uvMaodNIkiI+?+=Gj-%wF>HbZtR5R`(5|$g6Q)9`Io5tXtt6 zrkBw4?L=pa>Cu2Bcbdclp_uVOYj_v;jZWa%zB$W{gC)`X4e^&3lprvOXp)YgSMMKt zlc&HSG&_1h#7Cgsl>6{#X8OLU0RD>a+i{1Tz)0gBQqP$Y$Vt}amyh!Mewv5$S;gZ^ z27%U%g^B8Tl>GDuaAn}*Uf`DE&DybND;AdH~9m zQVLS;qLI3D`zL`-Ev`JTD|ULbKG#;?hw+wn0qqTXujAEghvEWk|D>Ome)Je}^pygy zt5ymKlm`y08fNRB#Y4DFcj0hok75Ju+7Oc5!YltYeN^y2y2kSV^{pcmNNiH7v2ux= zClsmwdQfE3ng0ic6vSGJ@Em2;e(&~jkRnq?<_Rg~8k8Q|4*EQXj2OL+Ke~rBVez1@ zf|eXGe!=gk?@I!BZJ|(;0eNbM&f}a*hQ=&wVcBhqbiy> zc&5Ba^ko9x!OO#!ZvVgq*mYM(U1`T33`Yj&0nUqH7PVjB>t!|3%2T`S8cz7Een+{-r#1pEh3knc!ezt_$0G5^Vh zNA}=1z98T-6n=?>9Mn^}=-RIkMoh()vEq(u$2;T$NF|nB%*~76L!-{*FS|C0yGAx0Gjhtrrl!*ECXWA)yXwTrEer~Th zcn)HB(Dk!L$|RxqIzDb>WYp{=iX8IA$`g_2&M@oRJTCZpv)P&mj^ZLi?b>bj_}cpX zE|s4lVnDcBE1uI?S)3@cJ1dQZmrm?h^(U?%ObtnGk^zlHh3L+mJ17>^ek*z~(#M&` z66+o@lT$val?-j@%9-sH6i?4tTTgiV!a8LVwAZu0k**_Yyf_+7Y@qMo)Dcwtu)iij zBai4=Bf+OK{U(M+vv2n7M?DHZs42BMbUh^L7LJ!PhPyYOlV)o`+s%b+-q$%QRLC9^ z)nS5bK!v+<=DjphAQ0t4K8)gSbax-o-$WYy$ry_lvh+3e*1)^M=g=GqNqUF;l&D3! zbYc$DcA>iM7yxXrjbEQ$gE}WPOn~|rnZT6^6`nu0| zp-%G|0;s{kUw}TKhASHnrqu(}p|*%?o)dAzQ5)YY4Gz8kHHZ8vg`gtaD4~zQ zE^4gbp#-*r9RoB@LZBn7-=XcFO&l_aRZ}atC@2?5+Vp=(bvg)i3@J1byv(XUCuh2R zhbp9ggsN9Uv$AyY=f7YOq}ia0$hG1EFfS>kCgt4{E;DafcT-fav=P1Xw4YTkPEQdb zSk$GUE?EQUte;^4pH}J_h)h1MM|GmfQ_pMU(M)JAWXEA8O6D9{SXtA2|6;nEirO1N zwjgLnz2p3Ejq2h2Lv>KM1@ge=+8I9U=kT1kWSG@mRa&A^DF5LEdoVn{-Z{ZyIePh& zA!)zQm}mY>XjK)E1(53}>k8-&QYyESY)8qRgWLGjqr+22UCN(`{Q7R67mo!AA!(Op z#lRE7i6@b_yY6{lmzcR4Dokt+oqtfO9|+_Ii-tw0K#vdv%C`?*QEy^$b90});ZJ6T+%pgk33!yOa&9gk z^UnSZ&7E#Gp&C>s$eR`;Z!-9PB|FeeA=|7dsx)uSD>^VDAK!3KWtL9rl!ZyrUZrD< zEaWpqpIHh!ukr)`>X5XwX(fwh+Ksx@4tqPh{fWgwHCm!o*K1|liF&2k{!=LLpxPy) zkF2AFdJv#PM6(?_2Bt~n}#x-rUp}|h6e}V zHbgv*{ z)goKMc2KRpt7p!vI_^UJu=ew6V{`L*Qdl6`wiqBi=KVmdpigDhcu%P{lPg_Rwj-q8 zS~J}=M7Of4sw%33^PrtHRA(E6lgsto7i_Z^5(Rl!))P@th=f8=RT68bt@i=5fRdzJ zR@!w^OD|ls=h&2Nu_S+3wNbx3ijoQu-yKE;QO*Z_StPD5Ig?t_(!rV`fn*lUB+Ur1 zA;&W|h+;{I()s-D-!f%@N~-N0x?>X^A~-8QKN{-P@`%&Y@RQj+(2-ADo~|f$zvo+R ztm=vmNn*$`RSnn10U&gEMB?VJG=#g%{^RKhE>)YCGo0I7Z+idwVM#N~%R_ynN=4LI zU1rC3_y)~fk+EIaQHqUp#9f=Fr>V014vK0#8&@@&yo#!LM7h>h?QiZHiQTKK*mvlm zSo@ckL3*SRL}XgA-0AQEO<4^c%OY=KSt0|yG>2rh@z87u@9RceMVa<{>vnN`Za<35 zAlHhm^%d8uGusMOB7#UcaB+UtxW&2aFP@pnSa2}0D@7&jZMe0A!^IYwg|f4P z-!-&9fuUB#4g>_y>N#m3NwJjdG*M?XOwdQopE>3G$jAkh=T$N{4>w3)&zrF=Eeh2{*BF*&mwCo}w{=UME9Gw5upU4V zCP~ui&rXnPK7@Qp=Y{E=2i4#BWh_>h(b`1K(2Le}NV~>|cBPP!xL0I5`&~RDg4M4@ z^oe?OwPGNN|FM5f5AQUIyrz)VV$J3<`aacGp7!PS;jP^lZCN3jO_Z>KDm+tl{V;d% zXWPhL)JvM%zsoc@MWYt}rvPpc3k(IuLQ?MK=sBO6PU?`5pw@qAIb8xhXyB z=^+Cd(H8FrV6i^ta^3*SNmlur1Ob=A`5+ztI%pe;pT>bQ|pB1h5{IMyYlpF(8zx1k<>>+EbC*|<*3{( zyfQaW(4+P{;4>Mn2CQORs+CplnuE;aGjrdwm8p{fuU$@}Z_CYCFXR9|Vi_Q@h)v|F zoz(bm48;Dfj)sN?u0&;FS=l6Xc5ogEgwwR6p^&uxz#S4nPDSV8?rwu-)*RS@u!i~p z^(G${iRVO>TIZtpwg*jprFK3#gCUJ}v0pX6{Qv~el~*PD5kI=80No0wiSnLuL*iKE zm((3H!ZMz*#i<5b0^Hi!P=-jTG|F-c6Sq7DAYmP#p>G5CwK;As6^Bo=!```cQrh4K z?kuOX-T6lVhwFgCC3&q5$O~H0Q84t zeP5b_Dk^iRq*pH{#l@8*-?cNjaYHD)c+*-&YspIor^@Q>X46fgcRz2mGVrs=*1nTt zO0K4S%Uc89(}O?8`K=?(fL0k$%#r&1sU-v9kCY-y!tNcFK>h}=CV>(?rrN%1dNdJO z?eEVvh%#3q!uxdc(NSFVnWC9|X=wyOyBo$ll1c5#BYPEd*?Z(=7{<@vB~v)hWT@qtXHftb=NnlLGr8=P$HWNU^w+d{`8;atB1;C%1kD=KcO5&(dxo#Xj& z`SvYT&)QG0>&d2yATZ;#cMq$ay&v9Gco~U^lB0Q-oKlgRUc8Xx7EW&Bh~BDw@}7iN ztwhhIIqvhn35{e1hESE?0kN3o*Avog_Spx*Pm#h|Xm3dw8zYW9vvR@d>vbuZ7ACt! z)w0WXZsAJ-50j73Y41D=k*@B$H-4J4&?FZxetUGUeJV!f0B1u%_%SMS9hXIaO%vT? zhG(@b;M;6m_2$Svy!*9xEh*o6IuE5|eE&qG{;G669FkM@ zKb65r2IJ{M`X%o6lWz)*R2f9l%&@mUIRBpznYI7m*eq`Aj?Zfe zVAq$aDPUv7#XMt~-{b=^77Qw1k+%R#M3d_EE898#U^o|&vop{ktrZ`UZe`(mLx47d z$G&-ds%^`r7YUi8);R+(!+VF1R)K*pqwb8$5Ru*8il=IRz;0~;y#SD7vz#qv`R?1S zI3+XZYUkicjHLX-n@HY3CBgFkU)ry^tg?^NXAnaUpMIn2@cPZemlNZ(MTQZpV z=Sl2UaTVzRyc+j&aZSOf6fOQh#6am)@?QPnYO;f@`$pfssZpdR3)vUX$<2S=&}O`Y z{soUMKv1~HVG}%kJ6z@N$x{MfTo8{D&ZJfL@4I8L`=T%T!f5&;LP0>gdL4SgUOn(D zJ~ZV*Kf;n_*EWurih)y2LvR_seCfQtL;iwqP9fXpu>9g~egAJ4^(0XN#m$?VC-HYp zW}aQ8sd(Ucde=_ZT^a|s3Vz-GQe1scpQt6NlhRl5OlW`cv*I;OPn!0H*sk&CEVQchpB^9`!N1jFJ^DsdcoVw`eakykmX*w$4nNkzRjb~H+7 z4PT7x(ZA)$XBfmBL^>^B%*7+=r>!AOXNPr z3~XK2HZW4Vc~^4l*EPcK^aCi}bnaD~P$rk;N43q^ipy@nU8geNZ7K8D{z7Ei$tz!iGxMPWPr2e>eij?7Cs@qKtlP-@&-~{_{i0fJ zg8-lH%9Z?);ebwN0k2;}KevWUSQlHRfO@J~wL`d}>cr|fsuj(Czg z15DemB~nSERAqIFa}cQCA~eGGIztd z9%V_UG%RP&tBs`6B~KVW`F_6Tqun#r+$^VrKb!L=SurmETh?$)RhJwve<)|$w_ueB z`Sng5%b|Z3Q7P~~Am|HH(0E39&!W%un6H%kQ>G}K*Q{~hEbpl03t989&E&5Pv{`P< z5heUdzfpgzrffT{fcY4zub5(-H}ysRG-zf5J+pD8THjcB)JiUYxbeoyQ@~4k%X_+2 z$rotNxlnGA;uyN+e~QLbc+)H?i`sd`*J+B@X z6T@etxXP}T$1ms(8@KP9)8k7%>d~Hj(LwZscgpO)Cuts7xuLI=clhx<`%K1#VtF1I zcib>*^hzo7pt=o5ebtUM?z>RGt=Da}%Dl?&i?Y#UvQ&(Jplzm6GO;sl>X)MYI}zt- zYpooX;O>dN<5n_c$nyo}w{!+;Dd(kI9>v7AU;YQJa22ichej$dIm6~zk&QQ>wu}t+ zJsMcr@Nnl$&FW`IBk%`Ko0Au946fK*lhn7mhF=UqfhbxGYbP_L&yK~7dl*4Pmyy|PAZ*9I(GT?{{YI@bEp6S literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-AA-VMware-SingleRegion.png b/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-AA-VMware-SingleRegion.png new file mode 100644 index 0000000000000000000000000000000000000000..fc15b94135a829f2e754afe0c9175ff4ebd00a3e GIT binary patch literal 39422 zcmdpec{r5o8?Y@>Nrxj&b}E%{S`ZpbDkM}wWi8Vp##l0zF@`pkn9+igrIRSiGHC|G zP?niebU0#+C4_@P$c!;?8>(*I`mkF1spV!Jt2@6wm2mJrc<%6f#Tap|_nTMS-m2b^z1e|g z*Vz$WXY@`i{p&g-AG%_hZ^PzpJC$2zoRWdEZVa`-slMQJRn(*>HJ?-1sa{?ElQCf) zHu~4gH~haQU%k29ZttaKcW?9mH$Q$SGWG@cD;W1i&luw8^YHU$XVhoj$}l53dU7?c0{T*{m(>{vS1mF42!v zYaaq@UfUD*V>#>tshHu6aQ(^jbTo~(!{!d4+tN#Iw>ZfPfFfNSPhjKu6uf)%&u8kM zl`|QW9v-2e4HLqv`P~WCi(}PZ9%VsiUoa$5V6z%EebQvvKvI2p%y78AR~aJpGZ)v( z)l-X^>wBuDTng~ez(z1={0XXJ{Cd?hSLYuVMGy9mqw)NHH~g%dB06R!U9opcwYNmT zZ?7COgmBIY7Qyy1%tMDh^<%5KSVaRouThcG6E$`oZ2`y{!m{<@zb(Rz_a}G@`ZpxY zbOO@FBGw@-mIN~ixCQ>4_YfGIHL^%Mz$nC9{4;#2kcr^^tDV3!!QzMIM^K`|^= z4|$s8J>QbL(EvAMpPDK=xBk~(7QFiweqp@!>c!c{#%gZWq^hZqpd{`!cGmpMtTTV`a?=AZhw;<} z@6@q>ClLcZUJW~!ixwxM>bz-!agX$$mzoi>Q_pN=H z%1f{2rPotp#whx-KNS0Ti{Ovsnb$$ZL`8x!mywo1RTnP#)o-0x3mkg#5qm$GS6|9;zNZOAgV>D@mP|%3anRMbMvSX@pA($$^Q{T3c}@mS z4)r+2z;7;F*lAqGu&*@Go3;Ka`4fO781NL+iswS z7fdy9BfrH-Z3L3c5=v$0BA6yb-R;JPmK1X||}Y3u6}~ zjjOYM#>qzeOzHJb>m_*e-+IG5{H(~-aeQ*B&=UV$TYcpFe9X|rmUJ2 zt!TG`?95O++bOzV-hKll+T%Z?ynz(%^qS3gTY0J+Sa$X{dvd;T@=V}wBbWP42NX16 z@xCU?DJ0^$!`eML_eMM&D))W1U1m&Gq&L5_eWUu)99>bJ-$6Ic0=$Qf-(CwO!4NWr zz$C(QVr2wbOTTk9H`!I%Lc5|2n?hh2;T6DWu2@ottiXE0CKdc%F{A(94r~hjR}N_n z?+bQ^jOogM|6`PeTj>%PY%QlhJ=$|JBdqWJjd~QNn|zR?W5N5dBnb%$u{$b|#vAf) zxy<=+UnjMIGSrh$lN8CN_AV@0!uwJ(Wn+F^>wW0@=JTMu#r2;8Ln2V?zla$__p=1w z@wcn!E;B$uMrC|6E1Lb=epX(Ep?9{yB$(`P`E7n-2QZ7jSu2x7ArnoqV(kFiE<1|7 zW=Mi`r*D~o&}qO6vk`8W#GxsNW;lq172TYvZlWr-`8_by{= zkD%hl)^&2>L$}^$hYXs;W{_{yeI=gijtMS|nhJ4yK8CZKaeZiCXu;?ExA5~`Z-KS* zPfM&SlD_5&`J*7SVqAr#WyV1ock4q0yUPBc!B@mjDK0se6Xxq*tF_m$@`;{?gR}IF z$r1hMKdlW~D&n1&n%-;+=p2W!U^vRV@0+e_^%G;HYf$?>5GF+-`F&Y& z@T5`8IU_7dzI1>i(GQ7;-Lq?$#m%*`sBAL}s!g`B_z&##Yn75as;SMcq+aJgsH624 zT7I+6C#v#EQl!T~VKy^*MqSj4UNYquY-1#oPn~wmE`0p+JKY6K(sh)M_>eg%*txY{ z_xJ%wsv5+{6)D#R?Uq+sM|fV-{g*?}ymQp;RjC`ONirjYwY?qC=Ti$<1cjGRwRxUzmPp--S?;nVW2dwXDyJFn6rSB!~8o0@+ zA&#HgCE2ni$f)72dZ+jSvTvP|Myh3}(jJ)rSrKNEw6BPVn4j;b((I~>NVAQ1MT4Ys z6L+=Nax#hI{^)hl_Qz0nAL*BJV*|WHeY4%gE`zBhRn|!UCS~z%xs%GiLviD(8m#ue zl*D_){Cz)F7I$lta59OzYV?YY8a~Oh5a8h_CGjr!;k)i%NI2A8@bHCEgC#eGf$3HD zjdk}y-4&hGBaWLJHi%HZbt?IOeFVidzYNfRUmnn4DT%Yd7I)(UeD8_|T9J22k`lqc zRqYK*;>-r6j*TAanT~cB?)q8$M(S2?h!}M4*m$b81ez8XCeDhLX=+en7&X-FyHsm< zP}vvSufJHYOw!MH9a7o%n{t_`@{7b>MAY3l^p~6d5Om;(inH$WwQuoV@KQ_T0CA&Z z!lm8W2xXt8uI7a%I=YrPbff3e-Cfit*8{jWcIA%!_V`Wbr{+a=GfgFna;l0p znqT0>&o!>{J9~FmXcj!FAv)Bnh7*50s&-tn`p4SpAIvg&f~pz0Y;k@pan}X%ed0Jk z{}Zl|Hb0v1B}rA*w(8yD*cGWvb6k|BU8p`V|D~t&YiMPU7bN+m#vL7*#D&SF#mS_t zaClw1)3tOhvYBI-9IxSi5Bx+O=4jRc=W;c`Zd8pK4@KS5&`&sDY!8q-@T07OZRs!v zkq7uGwLz+bcsXS=BPC}d8MnF^90xY3u=%e|M1-5X#3I!nBbKK`S#qA97GHj#10LwD zJU9p*h%G<32p*^kAGAbZC(4IYZjRLkt7`MVyov=TU4q$S`fbN>M~QEOypH3}rVO+2 zDbm?H`He%V7W?+Ss9HQZKhx&sT~&uv-92F1$o*^M-I!UdEQ`~vW+y& z`bzTW_<|6ZRV_1(f4wXFjG|4__^w)}HW40$g+}T{qccea%ILyl^9gthAyxfUgH|1D z%)8?5lGP2W zWd~-CTKxLm{a}8N!G_FU0|!RdT2gq@*j`uwP}kVeVTRu*YnU!R;BUb|JIedRT4JjE z!ImRv%PXoshurtJaEN7#09^A)iLQ_^tS2%xJ87)RA}g(8%t^Q3rC?V40OzTlkp0h5 z$r(i(rPzcUr1xAJ=# zWY_O)D8=nugQ5hsN@juUyBU-ws?Q@Vy%F~(DrU7GYX{N|5x1*)JdC2_`u6}$zuDVd z2RW(Q0h9T)c%hNI=4j?z+7gZ@wg;80Iw^n4W0vM}QSIg9=tB|RtS%|iz8z9<%IBUz0cNv!TlY}3OXb8o z*@~0@+Hmmll{Q^O%JA31sOn!d_+OCAOZAgIY3riWXOI8`fs4ji_UW+Pq+C{4Y1?xH zWS&lRO8vNB=X!a{+x?**jl5@!EBj>7T_xU91a>WqL)h_G>+|+_yxQTDmWezym@r5E z$+?0XnGgMzl6pFf)xytRD#HG8E^=Wc#DQYMIcVISna`@u7ko(L)s6cNkgizdE=*0u zuqx+1twE}*nUZ8dTn&C?st^FdW68LP3=jYSQ*}9x{jTtW?0O;T?EE#bL0{B1FI$wa z2RYf<2wNWz%!0M3SO6SsJMQguM5=e{kYt4q#+8`V_Z%-GP6;-7egsC3ZmE>?vUOWe ztTMhNoM^?VNnV*`$>>>IDl~c;*cyg;SDy-iD3r~`FL4e2sQ4@x^j>^!<^XP>>Yacj z))PoWHL^IwB;p@I#E%uGTv&9nS_knnVmG?<-mz{3tIf&k@hX? zuppCgq2Si$&mv4S2*ws;U5XGS11nB)+yP+a{TPGphXWLnb4E0=7a=QKQCfPw4&ar4 zkh9?_;M3lpEh)da9}*^eOm}#7{|OCH4 z^<5P|*g_;C_Cow}3FEMt^?H=9bC-v{f4HBmCrzSQa=ah`=Xk#V4qaNxK-%eZf_#}H z*WuMA`<7TDVl%YTP}7Wj_wN=tz+S*US*DGKdrMmK!e7o#<$La&I|N{t`ITwY0ErXW z6uNJHUdN1&PhxAke>%=cfiqRg8q~D`+?#A%;W_mi0YZ;!gG48cpDjEGj(~1)opNAj zstBMCl<3NNsR@xzc)=r9?JA8gzXL#p-0(|ri1W)E%OB!sz&J3$C0G{R=KM?>i6*?5E?w?H|trM8Ra zq0AlAOY`1KSm{aJuLUC`Mhk?cDGP{l;kRG{74r{a0_Y6N^|~F?G#^iwGk?agOX$$S z==I}O+Wc)u`%Q9%`~w(EQ`Z9dLh&~xve-+{$8{aBZ$goD+!k=1RELB$=cNeMA4xYN zMmNvgmNzz_TwGV;Km^&Y!&lkbK(9|+tiRu}I9jxL*#uP))c3w0QaG>0YXJ9tkZ3w1 zU}h~aO~C z`ymbY(ZU*kOOp#OCC~fhv*zmR8&l=~F0>93sjL(*-&{1HdWg^_=3DDfUaRKKu`cd z@0uP-X33^3w9M^LZ&^QoTY*N~&x4I9C^?`(HG@RJPrzt0P~6v~nL;Lh*X(X>PMQhzqVK>6$`j5d*zpb+n#A}%j81opxa%yPa&aFpQNC6j7dOw@+^5=* zM9&{=k2zc5l72y7Kv0eRnd{@Z7#W}BK1oLDuf(h7o`qBQiK zuc+AWjm(m6EvpFDYt6ygp@IR?vC_*K+SvOo34MQMJfqr!+)fT~kqltXekDCWt4SR{ zf@vH4*ft&;dNe@(Wkr(_qbV!4T-Jwj2y^uZ`NwD7tbNQQ!EKwON}z-4LpZ;An6}x!L^erf^kPuMEzJFLoes)IARv+=q|HyAO!{) zhR<@$!NHG;nbI1=x?e}wS}wy4h3VJHTaolEiV4-$t)^!SslY1`r5j1acAn2D1-P^@|~QQrp~rW?3yzbGM-O#utypCTu?~=YbX&Y7^b3Y#QHK(`*?ZrGZd`kCMV04S6%zdTgh9=O7;`XY z%z@*X7kXy6=u6pn=6D2;o69O*3+3P-8@WeP>Ic1iUTExFv^rs$UO%+%F(hWoN2dU4mZV#aAM zxeXP3YL)}od$fCagMp=dP{K=oW$QSvYuLPfU-SN%Pa&f{i-QLE$jPF)Q<;y^-Bq2= z*1+bBu4dW**Yx~6uVCv}hsu_7s^po}orITBZ|elUe_2u1H}k@zUgaM_6H;AeSEmjZ z?R%t{1?+$o!?b@}$y`Dqj>T@;yZ?YEHA?M52B8#wJiQCLEroOhF zXvB3F6y%rqAP|5oB@s7rvTvWIyO+M#Vx=yU9`+E#^b6C^{{)F5Jd;y#n?*Fg5Uo}K z>8YPsCy2H+9%tpF?|*a|kL8k`0#&pjna_lL%=6pYREZ$kJ(YsGEkV9*ru0kmOChX= zt&Ai+WtVo(w4ktD8cZ1@d!T1RR|j~B&;sz++Q zjA<>;V{K#|68noMuifY@QpnFwcA*$I1)iYDLV}Oc0kY(`jj_J0F01uBYx}wLA2OTk`F%xM`Z12QDs+glr+ru$*sjPL@}j#m|7kfipjcZp299I-z9`qOY;9 z4}>(*jUEnnB)Lrg)Y=`4xp#7&>X0}3yp4N%+1P|7v5olm##|pii{{&|&j|xJ33o3i z8ZO6UyAxhLt%(vRkv)J(1(&LeZJhfRo$NP`x?Q~UPzB3gBa?imE?O|4-h0^zy#zPPbjP-}10aB8s7a9s2gs$Wq(+6_SpPGIO<8}ZS^Towhq|3KqwrIO z%R3UON_rMz5q6ucGBw8D)$=RU;i6LH&p&Of3T%C^+2FSOd*HB63JU8w zWk`TDhoZ3Q&b@;Lbz>UTk;*pScill3yj%S2$;Dc0g`s|_>sKDlp<^SQk;7OLxadzb zRCRi4nkf`?@a$iP2V;mdmN6u@YOvT!Yg429eQDt)TNm|v<>WdFqnJweq zE>2PGHOvvIB*9(Hk{wmeGk`3RX=HqTMeM#XxX;_K(E3=+qndzp!Y}Q;7mBXLJSyGc z70B2BDf1=g z;ZTK+dWvoyPhJ*M*!Sn!8lTy?I8_83z{JqTfcY9PzD zo#AMavu>nK6{4#(dG80YWEYn4w4TbAk7GTq;pMr6WN-bYP-otGR#&cIz}WL*wmzA0 zQq%%9`+}u)B2e*zf%~ikT`&&$uZ(`*;bF@9E9lVt>Oy;WcPLH-p_6pGRDb7DZ-(Q; zy!nKx&Ju@( zDk_^adnw?e2i#{aqi0Jg^)Tnlq?_HQU*Ib;uvi5hLVWMFu?v$?3M;UJ@Bntxq1GJz z>}~}TJ;?hA#4lJt;dn>7l)idgpD44uzU6OXw@xYL5a-l{1*jNI5Eo7WeOEwoSB;~H zh+MuSeBrU;G-X$9CqWgNmM4%_ZHeQ=Jgt%jKr?`{Abh?3H!n##p6XT(qp zNg+4jarnj<$B9k`NmVd+Wn=PY2h~pB<#YeDWUt~S!pe^DN(ii$u583sC~pNw4Y*SS zliDuyI!6i0zWirX!Ws|+0O*>5RPOZwRu#HMvYvsW1-#3Pr-;4FyCkZ0TCWUm&PM#Y zJnSIZX${OgJUgctRNaMVI>>eMS7swis{B`m)jFvMmuK%R1{Xx(?9XdhI4zJK2D;^! z(lG&w9S|Mt-ZTK$1IrHps!J7QkA*6A1$`Sz?LcDxt!fpNl7X(+e%A^sr#}wb3RwU$ zb};f#RtV5T_}_p20E7QG<15PnasO+dmH+;~8vj3ned14Wx3_o%m2Xn^q_A{hmd0)* zUHn~0BC!kNOdown@Wd{OGd1A9u7bZL-*17a_PY#oV(nZCOii)NV7L+*mVP0FRQ>^t zZh2uuL}k0fB$j>!M*m(OHA{!8`?R@w11}?KrVBc>`nPWzp_=g8SBZXUd6`k8S}$0i zs6Dg#+;mW6fvUtcooOyJUn#V=h9uBYu=EvoA=VuTAQ4n|F0={iy#3(QkkUdy`)!(<`2_gEsHu;WH2Lv4` zxm$OH!e^|UgcyJ_LQJ2gCnnC)>{ET1 zrIQ3ax>yg;g0az~mUP+#>QRaOjbtI{lcl1+sgy479AT8+lxW-&@f%4U_wzVc=5DPJ z${?AR3#}$$qYqwdiL7Tq^7n01u0s}-#fn3B2nkgj*LkH9N@M+yTn22@3x|03!{-jM z7DRiN5BITtJ90^kS@Op?EjI9raAD!Q&MSLCTS|4g$DbH)5#xZhkk}h4`QR7EyuJ6& zeY=)`ovdn4JKh8uVFqJVZy1VOwhprB__Q<2%S51MAX8`sT(mOj?L`PB2YDti*8u2FZLrPb!y~(%K8Yws;O2jBNlm0D zRy3+x#0W@@!|m$rZeBK(PM*ymgi#lEYKy_&vMM% z&%8xUbIx;g*toK{JhZnFsnr8F+m-;XPY-=Q8)W%Xq?x;1ekX|44DwU9T+frf0&*UE zgAr3EL&Zf0u-Q>a79e*MiOsFL^YR}B{nC#Fp>;C67# z{Tv7CAPaD*+9`#O@pND$jh&t~8B#a%_LGerPIa<~u!IFxx!7zKu!*e)Fbc?-w(ph~ z)_={X6Mu@Rb|f}ZtT4P1@vgx&v-zx)C4B3~)OsMlVf)D-brP^$1!SNv~TIvZ&E}ogEvoo;}?>reQ`8oqsaTwPSh9 z31-wahOPzx?*#O%rbiPZj5$b_h)M2EC#q^VZIDU(>WSyo(N&6g^n}JdDZw;(@OMWi z^H0H|03(per9dPTI@5HXXznh7gaoD8$2G+EVYF`=z5 zdMOx$)zi3+I95n?h%$2c;soQJ`we!qvQ6vB1s`IT=jJ8NKl})@U))Nd4nrX&CVqoR zxt59AaGIiH7LO_4(Iv?onH1-kMA#$UP<^M~E7R;|-!68{WWXU0y2 znN~(*{iKP0Golz~JlyOV*hX(ehqjH*nR1(t0g^&wsUcRahjjC10^1Wd3?SZv0}=RX zF(BH#y#XLZ2lnOdMI>4bQusb?7Wo&*G$3IemlEnYh^u0uD6}omaiGTF z#|$dgwUiN2hLH7%MTi05OZojbT>I;tT^+nCZ`oI_Zk!sRr^*|YouHjLw@7m_*zFwC zmG5?VX9D4o*U_Q6+wzU6dPPyy5j*oMy3dd74m0p+y#h3G&>+CseDQ6$)67^Bt9UeI z1T#b_cv7eq-wqPEuqoDbKe1|aEB8mP-Ku~weR+f9nP1YYe~nz^4vM2c<-3`$`!ZyJ z_j0tfs9qHK8owPK{9I6|WA0d4hwVn$SsW{cwr-jvRM=7WRC~I}Q;J3(Zl&K{5etwM zXkj$PMY20e8iSO+ISl^Zq^T&P;R(`tkYDT&KZMyI zYenAcfgFz2rNq`Pxy6~_vts>{`dzTOGu%Xl$%=;)SE{5bR7=d!@>H`x`|f-}Au(gg zM~eT$CdTQJ5~kVl@f_mx4q}*RWii zHU_-$-nX=GjBPN%zfG9p4$3NzM2)IRwOe6YW7yM}!3_rZw3lZ7M|y?M!kQyO%mDT1 z=L=e9uBii}B~S8E8dEWGqxpMK58SurH`%saIB#m>OIwO`V>G$76vPDGYJNKUO2;LO zWy&a=-}Iedz}i2xi)Ms!Ob}X$b*?3v?wtlCRqy_o|Qm02yLnAXK98V9L!eVFoggw_eAH6e?I$aVpY1i7ln>*y7V z&-^MfQC_pZz``Q^`W&!K(a3g0pFze){n*o)4mqRI9VV{gT?Lsrit2B=SQ)Na_Bp_n z&Xo;bj_huHJIp;D4Rk%@6+iAQ;FVJ!Kipm7nsP^VT<)XwjO+Z#R-nX6(9pa{1bLe*U-?Zdk_C?oj!?x0h6u%CRs(wKKy~-{D zks7d$h7rigwUFJdwIR1b`v6~H51Mko&Yc#;R7+0ovZbZQlJ%g984;n2oD5aqGcRU= zw8>*>U`Js0ft zwZM$=RnQKPLC-ok)g5ca`9i(}?zo?o0Usbhpi$_a1@na8yMwd_KGBAZgJJ-1LJGJR zg6E=uM&M=!1r?iilHxJ0pgxr|qQQbmrirzL0j;%OVZM+X@cv+D_?j-H7XsSIFOAV7 z0U8BhqA_4HTv?Xfe+~qY!PyS5?6DrHT@<2KP%_FJ0tP(OIo-9SOn7`dVW` zM`*XDs>|@7jCEqam%W_q!A^Si7{{ULjn6~DI~-mD1bupCXd^2l z+X^%+Z==#3*1aHYp)o=ewc~y+P9Fb2fVuUH7GJ=dDVDf5p-jBeyBx1@qKQ=rueFFW z!qKC$%uK=RWnmKTkO=Pz@YdMQm4Oa{5q|52lwJ7r&pJ!;p1Z;w!+|4|w1a2fB(Qf` z@Q#C}R|8Io3CD!10mU?xH+LI@6M*1sL|St`#UgI%AP!(=O1{zJ*bYg`#OrKL4c2{i zcq)+4VtOoJl4NWWXekGa3D7xbq>hg@W~RLtC(cY)G1ib?hWqhqlCfv~P4-Yx)jv!4 zmK=TVd7+Ad-`x4I@Lo&KR=SMs0ike{HL#phm*?l>HY3p?U9p>m(HyeC21)4qi3>f9 zNiWhw79Hk5FIAjI+#&-&NUEeh|1t(vlsl zH9|W5{SzmYb0R_wNtoRm1DzPa;Dp^^uTMq{NwuQ@EIsR)p@*0cK&@LimzGQH-bJF% zeXAG;XR)-gN!#GFz=q%~X=b+u_NZ*Jr;0JLTZS|&xkq@GH79_ULhM#0(SK;L+Q7nY zO|0X-e=S_i?AF3EWJ^5(kllKuVX?i!g#;z$mSRmTo?#B!1Vbi3+kI!Fii(OyrH8}iX@2P;;11hFLq=$i5a1>dFaDgC?0MkDWkb{W<7euR;uYob`i)kG zCy}xvq7=eFt`lJ1r8&L+qjn5!@Pd@qnNlmkuVtcwv49?ny^PmJ4 zIv}cNvGQ8au$pF+W*-D(6F;3eo=n4MyOfND=Po0Oh z2|=dP53Bg|_&F5W-zYkP4=Wm`Vj3P)gsnH@m^}%m+k*UKDMP_)60_j<)-plFp`s4A(ooH(O_oo6)R*S7pTwHwrAO#KsvO6NsVpMPgZ?6Oeu^qtTsiu z85$uc`>i6}=${LTo{JlEE+_oC0|a0D2&Pol0H`t?SUeC6?9=w3J zB2AjuW5+rTNdsfQEoHWzw$4AoI&dz3gV+1~k&2tQ*yifD!XvxbplH`#F)^iKLH_7= zYiGj1^X7qES)|jdpcT~t3Mspq>AME@EFeTNLAr_lbHd6W7n9hY2c)4l$;{R6hU2;{ zITOi) zV6||%&{qF1zlE2?6$ph?S;f>oz%kDT1@c1}McI#hQ?NUpp|)q}|IzNthIJ+E`uBf< zmCf8<{2%7PA)+wM{NGInOCbln`~wA{|6(jaiq$UpUt|^TfjG|)#+g7KK$-~r2Fs|T zOi-Cxj6>F!tYH=;FZ`&LH9K_&WXphWT;T?-{*@A=(1!d{9h@oLqFIRvN>tl67=F4Y zYu+)oVDWWeXe2Mos|&+IB_%(;-Nv3KzawqvQ zpXd$(R!G-Lrz{ZauJ{Do;=kJ4qqgn&&i@)bP$u;C09?+|WWx&YIc!#$8% zP)?DYi)EJucdcYoKm_h$ckJ;mBvs>oQ3;d*fqRAVhG~`7u;#gmChK2LfN^sR1GBOV zaP3DJl3S03fWva{?)yiS2)`cnEniYG20n0w5Z0V+HG6aUP5%XK4ejt$BydTuo|Lik z8|!eDqw|@OLysB*tt-7N$3eZ%yN5gVHgSpYa=wCY??7jPmUuTF8GehiO0TLp|AYFr z#^&lLxs>Ppr=v3tGf>M&WVr)PpEo-(P9w{YCJNQL2DY>_fbb* z9-Yv5vPv&0eHt}_b9IQW%rEk6v;QNH;#Q?stv))zk6=9`n4jU1f1>@`s?Yy}1y>MO zF_2`o5#-SaKHhFDtT?(qwy1*EjGG93c*z#+^rZ@V<#eWKX}%~G*Nv`T;0&@HGfcy# zCdF)_m*4bh-bbS|`X^_&rwvDpR-OCU{JOH+A@Df<7ZgXQVQL{BRAST+cfFEKq+F0-&>v zYie;&)>-g81wzaz*z!ovZbrCI!KcFnO0wp;alTSE4cOLvOgBH7<#i{>9-lwS&fhNlxfoW)=Ep^J59E$;$UF}@eK#DfAn8NIl1j}; z#0x0>Dix;U8@xZK_f{Q#hHF5m%4f-2Y#XFIw95MU^`E+Q0HY#5qLlD(YTt$aj@x6O z2`@`saxQO)z7x9=a1loR4L5@v)l(0UTG?s8v%Z&(FW{hbknOlklc<3)j~h?(A1>rS z{QHW7R+j4B(!xxprRk)G}K%?>+Nil3v(J$w;cI7%-z1 z@=EU2s8%b0Jh7$8>w~Eb{h~Lcy^hgO_QkYhj=3;0kE|Gq51M9Yf6tPjOWZnjI$^0f z?=pTAB(PaVEk#QOJu}!M&!uPI#{S;WHcWDe1?H6(J=k@&mYJ`vH86G${mTdZ zse*Yun=bVcqg?ebN07r@`!@M4>5F<`yMK&GPi=dF3~7whQ`l+m5&s<3X!CmEJ2>+O4aOR_+XLm1H{5>+%uI zF)cGu^QFGLHOw%l$DavBL?`n3JE{|dpQM6p+P&}jczc&U&sTiV zeQQkmLw3YB_u;((pq5bNNi#NGz+ZKY^pME+W!bjgZyq&oR%sjwwby+x$kh7CN^>nJ z2=tu~b>BHymS3Sxzr{AvWx8acTSwTBiJmct)^?rlhWu8G2HDHJ`|BDBp7Cr!z}~4{ zt;4CbiK*TS{tgS;bXC_N>#?KMX)gMu%0EV9a>U=L6u}&64#uZmJY`!(kYYx-mtQpW zR@iBgm0xY(RPAbL(!uI!m=4(D!bM3JZ7p3tRrXtFCi~~GAU-Q(cE5-+T9@+UyY834 zjd>LV)cwj1>AjrqS^kmA@+9ygO+Mb)&;H0_tzGx%(qC}0#hMdK?5-~dZVS{6TuEbI zPoB$=3LFWp6XA~4DFnhV-dWM!q1}(HMhh*19u}1i>E7{EwrdM}Fx>7)*%j!#{>PP= zfw?r3FD>M&xewVonGxqAcRK#U4AW(XRj)b?UPR&3E+-s`mT8%KH2FO6&Ap6g`%yfG z4vw9>hkkM))@{{~xg|)2J`g@!@pRB-26xqcl3}Lrcl^iygfE7H>lF*?ju}@$xn|ES z6gy-M=Pwiu%4>}U`X+(wtsdTXn~wMK*Hm?M#Ypbp{-0m0ubBo`9N-uYe+Z;zXjd2J zD*T<>yrp`vLT8^VLUVUgTLu4Fms5s?lSc316SJ&`Kdq77nd~cFb>LWGOwG$D5UadF ze2X2teBMXLdv>j*O9toF=)7CTj@N6PQDppsEVPO-?~y@E0q6P51#9q1XCdpJ95<53 zy1wt`^zd)5<||SxqFt))Mz!5PS74qeP|~FoOMDFtp!4&3yIw{0Ya_X`D^W+L35mMc zDHGh15O%i@lQd!#K1%<*)%!l~=)9Lv_^XxJ&Wd$(NVL8EJ>+Ot0-0h7`y^$^8$%b} z;l#bb(e6o-a`%=8W8AeX2XMmn?zwTVC~*KpGQu#8+Nzin7a+d8cqO6}m)~X*2yT`u z5s~E9fwEmbE0-3Iq2ZpGpjpGv70(VW`#tX7K*O@@XY=+K9}tezC_yPdP#L|$MmY^g zF(p%gqfZakz}}}z!C?#pnvd8Pkf&LWt~4Z>HOQeKv7`Q@AX4#m2hSZunADzBgbs2U zu28^Kf;Ek{g8k9#@4{eZIbut*{1EK>Z7qCV^tx}J*z1uj4< z&$yL5DNg!O3;b5u!Rzk)n~gW3jYeZiXu@bJ?Q;@SVuAHt9> zv-v}?HWXx$rK(Qv=lwz&7T1B8I%CN>#_=_a0gxDi&Rcbo9@V^=T1X(1` zUJ-~X7alV(7oZ{)Rs(!i0PZ}oCSxdP!26FmPqkU-BM?GZBSud>4axroB>2iNB7=K03p9M_=XK#i% zKNQDSfnL254uWK=YS9HK5iG^DhCUJlnK@k{q~Q7oA24+pN~!Jx{$OAgOmj{Ev1$@( zg3pQ6V1fKDz%Ns^lv@rHH+qFNgaE^TGnMKKy+kAf^39<74k7m|1Rv<@gITv}6-h|& zJ}vOo0$6~)Gm_9h?&WkV<~di*G?}ILCQMc@#lYmh0C`EouSI0+} z&UE+^9wmP+@Lm`lEHk)i=(}iMJkG5V@cq(F@QZ>=LOPHhR}I#gze8bS+W10kX7nuzX3|mDH^ZcSfDfuc zcC@6(3#I_s5{rQtZ8U5%H5sbdn)f(Nh zHnOap-3Jhd!RpLLL___JJ!%gT&RqBy(hy($8l$s z%Vdz(W={oI`Tqm{t*0_9Ns^3*IBX<4<*ylCu_nh|t`VA~uQ^WfoN|RG%W{?$1Rwcz9Z`n$4PYCXohe@^lzl_%OR}o0A7Iclt;cwIA*$mh!1VsR zpBsb=H!kDj6f$(vU#J#woL9v%!$g_JnHreo?%9Y_m&7TjFUpa+6)&vrr3mSR>Hy7r z-=f5X?r6dl_>Af)VVYwS9h2bPE} zLNXX?gZ5JhCCL}`TmCgblgJm=jPLSQuGD0Sz;FRidg+qWDwfE4=7o8pn)nK7m_9%U zm9yW$JL`S9iL#6jIA)|>D@3MPhIIiAf5IRL&ggu7^;D+oU&Jp)X|Mp(Abs1UE<{RK zh}2coH-K@?rb5V#C8`1rYp{;~@--IP=ABUx5MCddcEJ9WAraKyMnsvmSUpIL$?qV- zXujw>154Eh*&0i-=w%2Y=wTnr(&%XITi{ppfUJR@O4K)Ko?JlfKBRKQO@FY1HQ7hG zNd{TF+XHS;MEOQ#K;LPITYkm@pN|NFPO^tUSAyL7RTTL2M9o{s#=94zz;`6dQXuaS zgMS8s&o5ufJbRyG!5RWIB+Qz-}ipip7)SGtV6^7pDC|4T-%3CR})3Gc|sbqQ~CG! z03V|ueLzd;%+Jw%7Dh<3#dUWfHfW$eeH;F$TjY_%e=kx7AM`tflz1<+@+bhmp$6*l zT-64B8>2ydCq!BCx9}G>pk7hXLkd35kqs&J)ywb)HoC!|M47J*X@gG?SPs-$I_A9; z#ZBJ@dr$> zwk^NSY~bqykG%t97%@=a1s@mzP~PtH?@WJgM9|4!tRT_mNQr zPzsrjW2jGRWC-q0KmP=3!4?(a|7oM{3BJuY)c?c+zj%)_jBXr;h&?cSC9E8L`pbJa z^o6i3y{kbUsmKfSC=L3)#Z-)Sg~!qIkNZj+>six{NwXm+!lOb1<2v6T;8TCfZ6%{h zPkMIkBTuGIk&OtqQR-&lxbllxxRhLA`N9*&^0H#0c(K?)Bt8Y#9;8~h~ZG4NkP(kbZLU^}Jr69?Q{_RxK zJ2D}IU)EJCYjN~1KyGT6+BA3#!b>0(G5!6+pfNQqbhybgM0I4c5p)-`x1=WE>j3aP zhb=v5+th>)34Gio@ZFD{>lQ+i-c6}Nn`Zk4ffrKO`nf{A6X9iC(}jTq1tj4@0qA|+zSOeW?y--b?s3`{X8;3KirZrMSO@MSpxXH4>1eo) z58vBt*Sc-Iov;UE@>w0Y`1P^l>S>$pW^RcC4u{|JUn+w>m1Key0T~DAy?pSwEQFgp zxb|=*1BxWK*tL`iPeAmlhk;h@7 ziz*Aj2Ut8RKUplzSWqe^_KtO>Yzwq*V-eIXX!}5S?Rkn`k3rQ!`EVwcJr3#uskpnO zh+gnUl}Eu5bsd}|PO+JKht3C$=hr}8N|{L&Bfm+oz1R6b%_e3R|?5Pb`^iN}{XS5(F6JRCt@I0aCac#+@O zum)4!@1RQ_0p0;!;| z0OWozN6VAMM@LYia{{TvkR|S4M8pM{{bJC9*Vot;dYfFF#9nn~J-HSJ-YqWILxERS zX>65ho~-oL($qC;klcE$AIucY7-WgSEeP^bLX0{2I-61k3(5<~w_hc&jVRAQXR-w! zZkxo^t}`hW{}=|nPl#8)sAxAhnU(b#d558<3-Eo<=+P-|wY~S3ByH>!GWFsnJJ#WR z$3%)Wsr~ea!t}DFXkAb{o(^SXb);!i1O08=Xp=Y%Z0i3g>r23)?Ed~ScA-K-wiXp3 zWeH)BM5MB2FQaUOFr$oRL?p$CC`)9`&NRlB?I}@0$TEgh$TBlTOm^?NN6+u~f8T%C z^;|vO_uOasp6`A>=X<_l8PR7k777uG?T%A#x+b6N6(aqdX@A@lI5ao24(e=8 z77wE2eolV8)BmmrQmtT>Ae7ClC~0!F!bQ`7k5(jnZ$^N$>iWB(7kn}cK9TDMMnH$oFvUo`X=jfNQn-hsHSLF~K&tMNM6D3@VyP_R#5N5b=$b`|K#4n&^ zn4xzg9-N9hreF;Kx;#c+Trqz-j&cMA34Pia{}RGi{6ebk(rt%@J7be_+Lzddaau|U zezu_(E60p%IY>yy1*I{KE80DkXT#{KU|K?w9TZugTejDH^w9majpOr0U>`g$UP#A2 zNwUDZPWfWc50~HaU-7tr)Lhg zzgQ=N7?tXXrJV&qaA%GT2hc0=`$+l_ZuW_?&%e5Xc}F)mz@fG*ngI^capB67T=x{m zg@xz0UQ~kcwhvDK98Qagf0An&E9?_iYEjzt%E~NQ|weGFXptN@*q&(T$v{Ta*n(NR(+I#Z6g?g>Wr^~ zpZ;@4rR~7G)nZxVUDVtBj&~OmIYI?Yey12HD%qhlJFIO_nC`CD3{&|S90$<(3weX) zlsAhA!NDtmnf;?%fZ@E!=cO=_?GiACaC(RLABdT8eczFCY+e+cFYdas_2lOQe$ujd zdWKjUL|R((FG}0sc!0t+%&x(PL&`irbsKevpb$MGjydV_jj;2%ELx6ZFUC-VEvw7w zI@tO8Wc^wEOSXO%kC^K0I{XX(@XL;F>q?i&A;V(g#WG#Ch>_nH{Y&NALbqyL+dAi8 z+sr`rof^Z?z?9^2z7$NJ3ran#gvL$c8lIso+|CZ>IbWM`XlyOP`xdB1G%fQeC9mV% zRJt}O95AJ`i%{Dgb&pyLtxml#qRng&2!?F|*kypLS%ntUg{FYedIC@^w2z?=a0qv% z$VkYv@TJ11!6TT)lrHbF7fGxswO7osKy zaDGhzaUGyw!SA-8!KgFvbeS?WC*AIj>hi;cpLS~H8ylo;1GdS-{p zT)qNOpPhSlER5#k!$y>S@rCN4zl|zJ!NJ}{qNhcRdV_q6X4u}JpoZ(%t;&ZEsLZEi zhdOVu(|{NC8K_;OUYTOjUFLVeD9vzGpB4!Te^K81(+(UNJv=Evu_PO$reCfGK=l{Y z{Phz~quv-TV4z-~qwj}+4T``NnIw#=LE@4-Gk64FKm@Y>S1NN?rPg_zR#?C)-N9-7wDc+m+OK!% zV)@GcZQ4g+^Y9&)1N{Q{96ztju>c~p9Kui;MEH-}!B8!!5Hb|#v3VvEq(OTL9hoZt z(5H0=Vde@UON~;&Ng#;34H*v5Zvc*fJQxW!d|(5FBt5Llr~q`@fNlXnsezAj2s2j< z8h|0@T^J2O&OD=9^8)`IC`1|yyv~6@X`?4HL!csyaDiE-W8+7E$##j~AgL&^8(%=M ze0LY>*RZ(cw9O9S8}sNMpk^Pwp+SeoJBp^;7td%)KIZ+<4!$l09pO3GE!6MwGE`@^- zi*zfnK;QnQ*-pSSw zp=~040qnW?ktL!Xf^{B|XO&7Dd)c9hG%y2eL0rC|2d5&L0Bg)Mtj?IN>s(?~|(*K4cJCEM7G8`Yg5*8)cf|Et>#KL92! zIrnl4_Ibg_Q*t{$O`)20yN34X?TUmw+ig@V6$v~roR%g6)7s_@G-}Q=Zlj5o;n^qd z+CP=3`R#Q13$yR*t9++b6ie=24BvnAT`vnEa_`A>ZcZs#Db9m}N7Xw-Sa~LPUxveX z8^6Qu=aW93bXd^uf*#vjmwt&Yt*W^?zr5~x{=x6nMO#lbF@NUfMjOyhO^yv^Ramb$ zQ%M{vUR~AU(_;@8j29k-aMh^m`=chg zNG74I_;4>Nv9~98y*()<2D%w9Ji&r+*$>|1GAI*<;F$z3erBa+<9_V8wfDfgdmC5c zOodQ%S>sj7_Uifsn`-Jx9QeR#pzmW17)sRQC2Rp4= zIpL}}ad||v{WVrFqj2h(_{VUY%b1OYHbp+2jbE+Tqs7tKxHCT<{Ah?(sB^mw!YrZ3 z8UZ0E1s+hA%`d6vE&c9YTc!vfP50HSRKU<)<;2+rPic-_3kKjCr}W$JMcC|phAOV# z2DLuQ75qW5F$IN&rQTLh;h6aX3km8ySVV_Gx{7eBvXouV1ys1^RJ#8|x16m3PdM5Z zxA`;8XP>hdy!h4PkraD8RQXgG6f@}l0pZa{?u4hkkTvg2Mg53$3xBp1WOf<~F^$$>AKK*ksT;WXlkg z*^{kt@@-)=ND>E36;Ab)*8KS)9vY)E!e^{8L!(>kQ`h_mZgarSN8TH3vHwVDSgkd> zockwi9AyuySl%){d~T@5y2g34$Rk9l?3I~f7}<|ssRWkj(todhNN)cQ>z}Q7%cq#!0FH(Wn+1P=ZLH;&naxD{ZDZL6u^~I&Fw(16d@Z8a9!EQ0 z8d6c#d!Pp?RX^-gCy_Rl8P>>THEOc_d?|ly&AlMQs$_h&xO{Gz^%wLq~9)l?BJvp>Wn`$oHe{nY0OkC+n%qcS%#rUu_1Z zr0PePYf9=kal8mKc9MEO7)J{1h*9F30BW6yGR5=Z1#qQAC&#%`6%ks3p~SUx)WEg8 z1TO>e<@T`ySc~Q{k;TDH$Y`X$6O2{#xaG&t2T1E zxw2~$Pmk8wxGt2g(o^|C`IVf!LB}=#v$+d}q>NpzoN^xPQLzg>y;Qkp<*Q#uDF?O^ zPJ#!CxQ(r~R-FgARw9aLpqdZBF;r|q-`XS#Blwwz;pixwRzFY;^*YCR?;dq<1**ou zYnb3(d3*eQFXu9J*F%5%=Ydi?VSeou=LB}C{e2Yl!m-4GLX@Z2&{AmMKwy%OJbd6T z&856)D`;U=GL+d=f3^5vQJVzDtMaRA*5=mwyl{`t=rN}5@Am$?%0}H@A0)Zt1-fBa zyf13@GnsQ?L=FK9{xEDB^3EKqM%`jv0q!D6yQ|(VCNHlp7r-vT1lO7(^0cGW4 zUw3QQ?|oo-)pW84^jLS$aw42V;+XdMizbk_6{I|o1Svg?L4S;Z+1W}VU%9%{WqCWw zkWT1|sm@qWA6Izc)q88tK2Fd4UQDU8{-*9<>PiLslMA0eP~pCk zbmdnLmk&6W@>MtUO2as)_s8+H2ibpp3nVy)*AM=@G}qz&*>hYCc~l$Hf^5%ZJx1Cr zgwADJSH)MF9NG5Lb4@&6ZGYSp1^tvaId$XagP8a_k*loNQZ<4cT$AzH7Ec;~UJ7O< z@DuCe;?1XAfrUV;;!HEBlN(uz2)Uwy>0G9v`*!`R0~5-YEPGBC^JL1T9=}mK+{Q9> z>exW!`EcULJQe2J+5I}})Yq|_>wn7i9(x>3dCE+%xNj&KLhzp>@{`ne1tB-{F{@)H9TyugpTrC+wMYrD&qUsrJr=kH>Z~lZ<&qGz?rGJRs)9EwOE%YG)_# zYj>gSnGj%PKxyqdwj53c8Qt6mE2~#L4OYJF$}KdG@yL+XAgT10ay>CtyyCD_$C+}l zK=zNd@TlsUc^K(9e~`ll)O%O0hwUGwi$XoTUxq->#V;Lh)m^VBP;ijaMA>*y)IdRy z7V1c6QBgK2q|drYO6)UaKF&#NMtR4>>3&m9atOQC(@r1XdV6Yw881(>kXWb+uU9NR zN;95ir}GKB4Ab zW}`b^Cw@Pd(F1tUGPEsrnn?3_~$f|!IJ31I4#S^UQ(E6{$E?8uwLP>v+o;oe9l$P zXd2tz`ePtbC8Ij`wE-iv7Pgp}xr^_YLoa`R$!UqSF~aIx(6H1q8ce_L?%pquTOSJw zWKG4&+YtrH7Kc|sURln=H#49YoXVC%mXyvMf1sU1IHY2-mmp^>Z`TwWlJLahCh#gQ z-Ts|YKV}lrc|5|adi+Pa>&C>O>i65E3uuK#fxU?6Q>&2w7*2hp>+aUx`0XCg!)0a5 z)uA_ce;>QD_)=Q)y{=DDi|$mdPlngijzreJvckB!f#a8n8Y9NS9xe~}dfW{sG}})y zTWVij9T@QX2@2?)o%XLAaKi{Y-nl*ydb&-eU>E-Bc1e`7m7?8trbba|%#g>pH*KV9 zvrtOY5E3Flps0@r)%EEIbbd+q86=(0GF-9@b?A4yc`f8u3rEg@@sW-E&Oj@VsOBnK zuFasJib8QhsqMf+FP-Ht=Ecq>BlD_6&%v@AcP9g_X`a_!i}VK%Vp0!0FCP1Z>MXqH z^*nosy^fvil0p|4u}d)|3&S>!OKYlq2HS|0$qO+2Apn{2L`-p$^fSiG+UCJM7xNAx zxyAqnMRH9Ml5&Z7s_@EX5+f&`*J04${lmp8;_KzmKJ<^A?ACkcPo1eA4^PUu=6)bN zN1a-C#Xd|i&4078*b)2ZYuNVYdnDoc%Kk$qc)zRZn+7k5^>7CB5=-A@ zF6KsGII@S}6Ec;NotBdqIqj4evjW#?eb;8MtLfVANIwglM!FlQW1c~k?!KLwCa5LT z0GyPEG4A@X3O}!Y@v9D^(e~w{*>0Kjx$;XO65wc%hV*HN^4%+|pBzl5ObVq<(O>UQ z36ZB+<~_V8(o#Qh<_h(oO$GL=T)FDcHEbi<&L^H6wU|~3_LMKnuc+)-mD;z${bX6) zp=tK;nL$4mRG?P!zJpoi#-`6YIOct_q@F_)Usqko)b0R$+dLQ3>PJGpoSQ ztE}W^hmO7#$7XjK4BFD~*)rcwJdQf&JED5jy6}kYS08Ugr%!NuD7XzLb`X`wj)>+Z zg`RA7CdnA16L_W`BB~b@8Lk}^gEUL9;y0O1SNmPgRj;2ftq*u`U@u<(z)}=FO#v4I zeDta!MOxYm55n>70&Z!fG39yTLsJoDySjErY$Ck(F0BDMR+B|Ub6?b7>%5E`6-Efn z5Fb=EU)!xP17@MUsf%=tNa|J-8A~F zhLeefE%gc>$WG7qQB)jzgVIJm4?-^930D;GNFhHa9(h&SyXJe;jm?kM-k7sV3far` zYBONl#J2JU4fQKC;nuX8chr$o-7S)|GPe>YuBY_n=uFDtu_`IYx*#Px{4k z`?FY|PhGGM5|s+ zmoDGZOCiSUmm}YNBp_)Kbw*aqn@KpWsVp_(Siq`xa?0jnhhnv@qnQlhjmAAygAbOg zITw>gOw6tk9s}>qb6Le;WK#1~mFIl#w2V*_7cJGCoiv9yZ$OyxDEH>Q?WLm!isR`r z262zt7{`H_;v$8T12P1dQKNxZ`AVAKDAXZ;m9><3J5|Xe&B-r{MR;)z$ke4F)l;{cQVPSw3QMmr~PeECK8P?2|U!6{yxR_JNb$KuHx z@}DzK6_pyrdFzXkRdE^oi0Cgkc7`^Fb7-3Gqnx@;xY%aMjL*IYuF^54tqDD+=aARz z%KIm6Ju_?r9livK0JP7{N_+PWv8DHPG2IFfeKT41JyY#;{p96$BV+#6d17|=y$S7` zLI#3L)p7Abwl^j>MvQPs)3$SM=i82*w-N30S+eV`bWc;Y-~d1ta`uOZ-o+DN_a`1y zu_}xr+VNe+&8y~KW5-WU)$OCKFzv_(jKtM^H8UnYWbqaGe6@=1l|6I$Tu+fX108TW zUO>`3imD(W+3Ede;XR9e|GtLDqaX|d(VkVxbK}{WO(?D|97hQF3%L%iB~i-lkp`9P zNt_PoA1)uk7GQ=~(`aooSwly5aYQBWTvi!MmiJv}EzvvPHE-+Zi@%bA(>jJIus@1< z*tY2)ZO4SC=C-Q#&|YQ_xE6KHNbukb4lL#WO4G(6j~}`>rJ7%`pE6jk=v-aGPJB9- z=ybv*+3%pc9s3_p#K69MnU{-X{`aAbpSOgp&vmN z)YZ(@*ohHfqzHXt*LbfuNXp@`y>Y%9;4Br;* zl^01+skRIfGNJhV(W+*vPvh%l#WEBVi0=G6Vn@coDDB6Ec;o(F4r_n%{ z7pa;v7h!3a;KvI+w#uzRau}>mM)8VquUH=0eUWnVxS|uPv_B?5#9TDVyPa^U%Fp_1 zjj3MW7^vNAa{G0@;M08iF9101bklp4Kua}vA5N{2(o6#RD&WV1`a?-awWGL6rk2dg zg}*@5HLZ30wupP$FuL#Ed!j%Vmik@V4h=FN`%V_4DJWvt_7=>qh4j&%Va4b6*Uh&{>)SLfX`*)Et5et6;WIc?ZyEmSx> z`Rb`IP%~?IGQhFJ!;^;~#A~e%x5QrlEiGT5kQHL`*o&27rQp|*EN>8zN-1w@9HN7| zT8XWbtY z%LnD<4Ze+``8aV}+K3K|&9}&NeHJ%-IQvvf@7Jm1Rw5aRGiX>$bT@HH%WTv5K8l9Q zN5SR0z_vX!LL##VY>9=jX~e>5B3+sg7w^I!WWH{i85iGpEj2p(^S-B{ARlLaRGqux z>Avi3O1dmcf2+VADO`cNgnV9>zghmV!AiDQeJb5N088z?;@1uW-saw<(9`GJ3?Cm_ zYcf4cxT$0}cK6oFZ~JWO$rTntP12?p#3jvP$Q>tzI_>OU5*P0sQ16}fdYY)P7yKXc zi!G%r);79#K}n_E@#c>lPbf3D=RWa6?3y)-0Nj?*{+}uu*-%zNX zc=F@*TKd7RkX{3eIy3SL$nsnpd50tuOPRJt>jVF6U2-uAHetiJd7nR2K~MY48O1ib z_UNnd{uC7U%Qj8R6k$>7Ro$1v^UG3gLmI^Ij4W>Z953nNNmR@`7E)ierSJyfu{TI} zzBTxYOnZeIlTm@A&)^)eJp-i%B8@x>HCb49gT+r48s#McnMRp=1dofB9hGn}?eQy} z0+}oksy#@)p@Ws3_g&^mD%Q{;CXiDbW>Q%Z@t#3zFT2Wv^jINQqMyTM*k(`#rOBmE zrEdoFr_ttsBsTe=4uSYSMD?ooLr1OEiA1)@;>gTzy&qs0Uea!pOeAIe!tbLWhuG`-r1Z>EW~u7Xo(yGYf&Tp;`-W2`H?OCKx}kiEXZ_T-tJaC4e{x?G^SnGhp&l?7jFh` zAaGPC6{RV(54cS42dD&_)L|bG>_w0o_lzrj${sRSoZ;C9hv~Q(suZpYe7cAuh4Wt9 z`F?jpvdQ3-<)7Xwo@sXq=Lf1;qGZ0#{J!TewGKZXZ`+n%cz(?yKiF&1HL&V+mqu|- zj971gNq|?tBP?TfMglvl*ztX0 z1k2NQwf)|!O)}>4-XZ5R4un(hY@Ww@UO~1H50YI_Ar`KCFY;FUg&>XBng6xKB6>ub zgGLL?1Z^rde5@g_$b8-xKd`=c9Tnw$!}jS( z@&W}x#(1v>G#&4>$%7TVQrLSM+NA+WAQ++mD3zn_z#)8Sl44N3oT|ZmX%8Udc$All z(cY6j!-T@+TNVlDXhYEoFm6OQ56QB}&D2B?p3+in0`qH>xV<}XYmh$Jb#SuXaDc-q39%KZsi&N@#uom&33-h@f_0F7QLDU zFVv$wS2Mm3r1`ggJUZQVtWINA#VAj*YQ#nr-PZO@8uK77zHnGjT=Mz9u49IK>G*-} zi=RRTisoPao(9$O>(0#NCUVzk|9s}M4@#;20F@@?*xfdwJoyF>{2PU)F~>9Wx4-wn zdIfXrOjWG?X0uB(46h_5*2KJ{X4&zlqp5`&+V9<50)rok;Pojh`=9KLS)zE{gqv+_~&GWTZNL18)-a&wIJBs)$Wb;syglCf1-FJzcj30 zez2{nD49ZWn)B0;(NIlO^I^x!N!c}(s)zQWI^-$Q9gh4cUUod?@n2upP-PlP!n-d2 zuc7d zejyvh9<_~Imc$Vob&`^k|A=6ddRU(;)Q`RcKgyK7;&0R^fb|mBVNO)h#VwsFE4lu- zJY=0-`XX@Cp(>psiA-4sm{;SJD-rPu9jl$@!K+de3I#2fW-h$szvI91IJADiCbzS) zWKpc}@xL?tz4?ASZqCou)atN7g?{GJnS%LgwY)K_G?#0C$mNTQ4gzZ@s!Jq?{nq&E zqO9bnLaoEp9b((+3OW87%UvXo%yi?ne`-4_AAjffmz!{TIQC6VT~D=9f99QbzQRk< z`Bq(q=`nXWT*$2WURQBxJO=y(uG$DgRG%)2Wo#&PV%xABi1D4L4AB)AMx=zR;ySa0 z$DLCI{?{uY55v3eT;W5n@P$Fk~XqE@bSf<7?Lq^q3}^YI7Fk{#zT}b;7BBGiONZ%IH=1baJ@f z+g@t3ZmO@Fq;%ciD*Mfq7&_c_-}fygVQH*0)8 zG2nNnni^k#x*i?c7pnQ0>S=uBnQ#2_&|=Y{j^u{PWIOK5zJsOySE@?FgZhaMBGl>g zv=$D@6Aqaa&#R+rOAWgatcj-N>Unb_(x~lSQ|0H%8faH?*sLXihqB+gi-}33*65tB z#g#cad1TimRHwU!+FWP!DsBtOVk91cU!JL{sj!(!u{9L;;(1U^JT#Q7Q?;O3FY}=~ zYRG3bzJ5$Wd2lsx9rI+~iWXh()fY&9eT%=}01K^imoVOi2^rzVOdXHcX_OUyB=6^j zlV2GaYh=BwfT-^n4d^p1E~og|74WPQ%^>Gx)>9NWvhAtUk*!^*MWn$?_-~FiEZk0!`#l5n&3{}9B{-4&a2UMe711DK7oN6lxp;{Dq^owzXWo7H@}U{_ z6Z9}K-wCHRyNc58`@1{&_TWdEZQDMv!7i>Ii)AI>4%9W6ul+Th$x~_(=FBpZh5*U?@X90rf&Q{S9Gq$xMo zT&C$0gFg_9!^jhQEF=znBELC%qC!B*WOf}k%XP!zNxuJg*h8KRLe?BbS~IH=F)au45wS|y zc8MEJqn_EBvg2#9AzwFo8m?7Mdg*M4RpXU+uhaU)HBEy-ZL0N?5K6!hMshKH?GGF| zfNL{?MH{T|!gt6Rt>I|-n54XyUv!DgnFnpWwTUhC5p~i_Jz`q@%)LroRA251;gh3A zHX2{on)tQ6hYbWuNVnu|-JZJ6ek^6v)@^#rx9K&lxCJ5B{^D&>uffP~uckbOnS-t~dG}#LCrl+|ZmoTkC|JMzMIRoqHp2%_l`RNILwbWa<(y$KEBm13e5_~b;if^rx%YK;Ee7Ti$ zDx10eaYc9kGZ~Af!qgQT>+5ezSE(u2UoY2S4?g>h*AQ0lTC2Fs;i;X=U9q7o_~*ER zNKLZAn@!ncmYr@R^X{Flghu@ItNL>Kx#n_3M`DQlxDTc*=>5IZO_47$L%&-KFQlO2 zGc!Z8U8W^;bk>}zE(NX@y{fUBd7sMOuccdfkBVOmvW=gZGc=zyA@ROgPu28ko+!Am zy8d!`ed_J9ZlHQKmnpT=jiGs70P-ZPt&eRxzTrSboBz}O_(IAgq8>k4^i}xm`jM57 zV9}B5_}(x$R8u2$!@7U>+j1KDi*F7e9`*PYnfTQ|C(;#1GrYdJHxvbC(4G9D;riz> z?FW`2+xfI^p%~@%vJTHb#j(mNzZZ0Sbi(G8ylihdp!WP>FF(OsB)jG?8ECrhFz_h9 zaLL*HMIFZch6`debQ<&2QrM_eq%&GF)W#&}ixR`_0^Ye%1X0TPSIL9Q?HAaAMZ$8J zytx(cKND8c3$BSDi-`03jpUDHx=+{DQ0eu@?B2|}DYJ6>L;~bQEwrS4yYI`}p@8}i zwkanQ4P-m84vW>314OICUq0sd7nYRPIhK2-%%MXAQur;-~ z877()e0>D%A>?4Gmpxsdx42zw&LLnFq%X|C}78#s4nwK@N70*VGSPqs^}vFwL| zVjBwyy74WLYx+w(>9lk7z=BflZ!XY#PXEWQ$~sP%1WaP5txJ~%^6M^0(*Fwj&Cf0s zkT)F6;i~zbVb!(t2Mwjt{?i(W-d=DsI&*JFgAJemegNF(zY)oQ$?$im*Y(kH;*$S) z+!E-AR}}}BQ%Y&dw#Vf?l6?Q4c{C;xRVwx3RCb#BZ{y#0fITqMuAm1kasKiDB?A{6 zJ$5QIAQF0gV%G%GL`&eW3_|I{J^AS%lK?geEcdtUU)ewXH*COCM`Zs7LCtM& zXo>eXMlhB`TmTWa_~EF5Hjx;u^h@dUztg(44PbBkz&XZi!C+IE!Ifqzs|hjjyFz#Q z{f&v-?MC0VrGw3SJ`x4!l(d$3UB0(ICxba)co>$7f}`K#MuiCB)D3oBXolcLdt3va z6DNKg!5`AYjIUH@*W1PT;Gz&d`jnKWUpwF3#Y4Eq0P}hsj*d%|U@*XY2=lrN3i7E# zGCDUP$ZIn3>4NSYgpb8(1t~L7u@!Hm(u|-;fp-TL%SczC?Qsp5Ki(SJ&{sD9SPd`` zy0;>zFLgC7+Hd|i1i@?bkgfuf$H9^ug^^y~Q{CzQuC6NBkAPNO3F;lT!$AKX3iOWg zFUD{D?^7$`I}a*?r7+;UJ{asVI0*UkBPDnG@aEFVW{mgxM^5O;b@wzSW`^LwbkSm; z8Eu^iX`hn=4PKJKw>`Yc0Qa&Zrjp~Ktq{`7yhkS&_CNsOUZSgvb`&ernz-dh&cF16 zW^Tp@c8mYcz-Ahk5mW?uI`OHe{)GxdI>ZQ$zR&~44>g6Q9x&gDHU2ZTz6h!kTr(+Y z&tIwy=f}l^M3ns25zE64?T*a&sR*j<-|-?TANk<)UR(nUqMMZ@o%hHYS{-Q2vMdO2 z8K%BpI8|ErFKSuy%Q0w-h5*eR{0{V8K`5mFWW`kjEEO)LX$iJi7^H6RQhKKJ5V ztY{k(i5={ALJxM7h#aEezYl6zpmyU$JO6Egk@~_of6gEOyTC{dZN3%=oFsk#(JkJ& zLu{nyjr+TqL6o%%-^M~y&mlo$kDBBm)t;|}-KSQ8pEEddKTaGe2!6(jpE4G?{x8p% z3NRGTesDmQF!cc3h6H_`tcaLO2UEWVPO+YQ9qzTmI{uGtfI7gsnx5@*+{4fvXbW#K zAhA`$4Y7gE4H<~Ng8X7+;{9Na*Xs4-HSLZ3s|Y1P(Y!2m&rxLqw*n4BLbY@g2$ zwh6G4tQ2YasWAZUk(NJNn?Eiw?1v1IUYh*XawkMc@*T%Q%T@)01FiDued z-s%lg3StyL4URcKOYPH3e*UXg#*Gj8e?&Nhyl%xDFYq?0{QzbA^v_Pf1z z#j1|0fW_c{l9F)<5ojvb!+%W&p7@O%-FIqLSWw&rVE<)3WQJ+seVT@)rx$jT1_SVXH?<50i{%LoI(VSmq=$gAPqf48VK6PL4U+Rt8 zmmxRHCV%M$pOlddC|^(YCs6%@x|{YK>uU^Ix0U|`D$7@ix{wv70{sHU%pX1wYms2s z8;nK!rQ>S#CUgAt!Brw`1aw=<8MZD4*UPZcu!R-7L8|SEhYU0W-1#7~(g$=FK7Y_C0!7|8!qo=Qg$>IGxEsGMsu{ zT2topC2`^&JF;pj0&e`vE)p=p6c(8UUSVg| zzXe@rjyqy{m~}_-Ws?fS8T7!Sy0E;6HeQlkp`L11hJ+Vvlv6tCs6{;2AQSotuHgyT zFJ(a#unkMMsD6XU#Denj)lvo>t?JV2o3jtHZ!IRM{)X!Yl893=+mX8byc&(k9xtra!RvaHUk8LWS3(X$>kmx zHN+|k@CxdOx6?7)Vgg{G+-%ZnxfT{UwM240%Z|%=BDbg8~~M!|zC>^8snr zvoJvEU*K|__P7Iha~80czJN0Cno)Ol)>Ac$*B8w5BYTNCW5L-8hFiMbpp*(=kC*$K zgScxzVwma*$2iFTJNsS^FnjLy7ort*x^!D9O$p$^5%jT0EW{?9ENJxW%CBxLPfdQ`o z0y>MNDKP(^sEeSFW3)G=_RKR zPTf-nlFQ8z-&~2;8g+s1W>J6tMMRRO+cGEQn|(h*u$1a12$!$6RL4PJJ$okq5Nl;NKyd zMV7|lnoHsp{*hp?U{-ZtR+H=lOlS+RY66Jz4mP|#3+?lDv1u?bK@E#&_Q6^vbP29u zUwao1!6kf0raZohHop+T4|Z{pBJQD!Ald`Qh};ri9)dXo6DkKsv*W}My0!6n_?k1p8@0G=~ns&HHRG)z!$Isarw+%!;FgD zjeT^331V`IT?GFK>VCM`5EvS(J!~jJmu`Fk8W}qw90}wD3yH@c7OE7W<{VC3%!?ro zSkG^wkVax~z;0(qPxR;k5@x9Fyl3+K7Id@Sk!uhBRy;72?pOx>I4jsI4ndHw(=8@3PcD))Gx`8- z6V%=RVcM*U1yY4Q<@;EEYjZwKF-~V|<=!5sEXmfqpcKY$NPG5Gj;e?oC5~-*@Ts+9 z%x=(k3@hf*QJB{ZbS^K9oqOoIK7EhjfrT-e)Il(OPHDv2@L(fR>Dw{1V*3k0Les{i z;&!wI+p($lORc(_IO_hn$SZIRM34XRZeg0=qq#P;TiOIX9?o2OD1hCjwQM{^H> zz4Hh@5qLCTiDKug?dihpD5&qQS&gru?l*Zm&+7XQ?LPZV5D?`0TeQ=!pZB1#@p25l ztZ078M4!NdqjIp}?|N#&SHPfNiP=P-nFIW;hxX{9jyTuLWBsoiKr0{3(^J`kQeb$% zbAppUZ^QzApLzvZc0)E&EtdW=Ve?EHJU#X#=>1Ex#{JuCmzgvlStO{yN?1R42@s## zgN`3~NY1>4IL44;xRB+~sXSJ&BrlcNEZX>odd^i2?jqombiqnNCWpBn($y*;mKaut zt3kGa^A(>!i9a*-m6WFN=NB-dIfpl7ZFXPQ(y@`$*sJEsGvvwcsFcMU02>3;!p@w@ z3Noqb+Eej5f{Hq%(fu-f`r`8#W)ASm9jjqqqm6Kmi#_$Q;btUnB=<1oJUU+=)|YZh zC_)hQ-U~;KBv1}#4|$#+=FAc=YmCI+j@-@i;x*Qt33I+Vjv4O)quDr%F>!Q(!P;En z&vr566@gVG-t&TMhJIsjuVsdFGUJ<1J8P*pm*=v8cD}kzXK5Yrm3&wu0_T)&7GfT} z%S2D*QsvvRA-f++mKgCH9l*D-G7KzWxa9y}aZlFzJr#o{1Od5(7P|E52eE8`cOvzG z!NG6=DSUem*$fdu&tHFe$Tx!xFg6_MC@@C=o&x7~2ydep`eQdsk$E_!gbC9bsd?Ul zAuf@ZZ7z%ZF9o^Yh;tA)&568(FWW6VIIKwbw!cN}5@ zml$iYx&1XJK+q^>m@$H2j0{uD$vjZYLZ41P=oZbyP@K|{H}20Ce%DZMe!)W+ycFC! zz;;+c6ijV5w@{IJG{uM+qX3K!K|kW(84kMc8k9S|FeM7tR2*Vh4{5B1a7`C`g}PsR_y&5M4=(YRy=J8z$Qf38%TSG+%suDIZZT1}Iok4vdOq^yVwu1nBZEul%JiJ? F{SP`S+c^LL literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-AWS-SingleRegion.png b/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-AWS-SingleRegion.png new file mode 100644 index 0000000000000000000000000000000000000000..ac8db9a5de0fdbbd55c406ec610ff0ad43b2302b GIT binary patch literal 66534 zcmeFZcRZEF_;iM>8WhEhG?{ln5C`3nS*pa=mx6I1kn<9IK zW3T&loxb1i z9zhNsAwL9X{x;AA!9NE~WN*tNNLC=_w!uO8&0(mhdK*D-XA#8H3qdyFl;`W`_Ttiy}$O2UOhkCYUyBYWuoqDvEk;mi?h#rt*$!uSdO|30k4i+6DHus!zn zjl*O64xc#0c|mxhA4Wv5*Jah5`(_96&hN&a?d_>3d&v@lWW>0=?x|KVj?v!Sr%g-y zEnYRV$1K;ObH`=fu{e#dPmk9!Lt`qJSIr`S$85(kH_g!@W#?L!YfWsH)=R}Bv5yXL zvoar}e*5s)Lvrzkg}_~cG#^d4x%|ah0$|i)?+@wv}0_(V7a&U-U zE9ym;4u{M(?dre3#K;Y3NPl_0`2SD+e{&}kzmUk*|TK4eN6_-~!JA38(pRI%2~oQI*2NLSu#>$BK%J9sYc$o9oS1@S$Pvs(wY^$af6x z=OEqhb$W6`4Tmd|_h;n9nps(i7KQf`v6_A2ID%Buqht9p$6Oz=wuIYDP&x2S zq?PApn_z^?|6UbBe~mn_&d_f(Q;umL;+ac_-sC&WDrN8FG*iB}Rld^O?5;62HTAQx zvGer_Ug8jb;e&3D@2qPR+`fVCgeO<&N|$!g_ENpW&Pw-8N7B8bk=MNTQ}JPDGhJyP zG5EaQ-Gx29{yYnzVo*PbjRH#8%CF`$!3ykdYEgUJ6S*FH?iPJH*uykz9Wxo_=@$KY zQ|LHzdHqD7{ev)l_rf9fEsJbF7J_aw?1TV2x;XM5=>}D;pA~Y=Ixk?`0^NyRJA=bJ z5yLa4rlt>y9n;GGzT{UVMB=8;XZx{+>JFnD$yW(`OIzKx14gI~%?v?H3=9%wrxr`YkE=rU$03)!X6sQOsta>TEGo`{T>6{tqJaWXy z*w|aQY0P%&2TxST#`46<$$JjCNgq40*ab$er3#QIl-Uf3xy z>*(4*_6+I0jb>wpVohadD_{XzlA=-!LfT_!_7P0GnhITS(4X)~ zF2lMvou91Al7vi}h(%AewLk5y=9io9Zg0R;FDSbN!bp!$Dk2Im$@SMO89I7;5=G3r zh()t6XrvP1smbEuo%G(CHy?wCcwtON(z@=BH-6&5ZY~CTq%)Uoj__vheS&E@j#amC@bW4JN-p_Y7EPVKq*HLGKJ-#>{a9NZ zHn^j$EmqEl8cV1RU`be+={BG4NHS(9RFPy0Y(p6x2Fm0>N%%{#Jwc_r->N*#B+5;r zKi^8z&8^hd*4BP5w|jbFcYeXX{kG_N35ovMM<8s~r_lX7|MOKTj_h{0*j?%E-!zSU z@|7*cAk$vgP=;ik1NtOqWOVaHxyHiYQ?XpRb>qg3pWnX=6hDD^ANh8m5mq0qHrd$@ zTM8t&|Kbo;8z>PGyYXAMqoi~VYyDdbY(|NHt7v9=vJ8zGvWHcFmmUD?9Ag4+w|-|5 z=^`J9S$#j`wx&Dw=g$)$+J#G(I)ganI(mDPzI-|B_V?T2&3UKt6pxKCkJg_dybi-| zYo?pTDPx9Hpy>EeaZ?mjo;%V8_h)$Q%;0u6CV;18cG{(Pg3I=H7I^vj`Ts1T+RZQ! z^97Zy&4s;PtJ1%fln)AR<9mHtc^U>`wXTBxlwdk5Gu&5rF?-v~%+l^9QtQ9=W0t;i z8N6Uin&_HAXS%yHyr)Yb4lcNBTITo9R>3|@ilW=E>U$5rQnERnvN^O?mf*5HZVEK~ zC}41{V+K|?h}#$o>x4O)wtt!W`@71RT{%i@r4+1m78fcJd5*-%ySfgY>K86tXhQ`a zX#2iPMMFR?) zATw^haDoWT`oT>L=I4gm4Vl;0(*jY$JM&H#czN5G#_G3nBY>uu9b)@U6_swMvgK3R zG$|_Kn{4|L&mNNC_2ZTsMI9zvI5FFQt85Bc)Qye5q?at+v=}P6FX1>Vu=N)P-y|7< zo-U7_ZV%I670-6&J4em?a!jY^=Sk;2xH+R!ATiWa^Wic#<||LNbZ{%qz)cN3S3o74 zGWw_sw*)yWN7Rq~`4NnAoG%^MNM2*MNi%bQ9#>!;efM9WO%Dxe(P<7dT~pF~%hIE4 z#_jTzu(?l-rzPT%T!s$6)L$Z1_6KJcK@~xl{An2LQa`lA3=an+3SUEFuukkC*w z;$-Vh6%%2IE;7%O)Wod^4?bSPt%Zx*$seX>4f?~rs;H`<-~+B2H&)2Fp{3&4elRr? z3@yT=!uJq8%LeR5~pGR zc1i9>noCtm{;<0?LHJ1v$0e;y8I$J7PSh~iO*Bodbn9!%%08o@pzweA7!>J8F`Gv% zt2%sP!=p8R47}3P`h*;CKIZyzl?XW|&1{X47*KPth2*H%$WVM$T8Mn2TVO3a(G(HP zeLGU}{%83B0(St5s4^(oE6>^VU0hu5t~C5;ZWawqNlksnjShuhoozLd-nwsO{INeg zRufo-{5oo5o?3yO{XbfYOW@L}zH7&=>44hAtqnTmns@Vwh>Eh%i!mHOj+zo#44#@*j8>Q* z9q>-ia#;Cx4P#$tPtRoci|{{^H z!@F(N>#tI}UZa|0mU4A&ab#g;ejdpSS~SPBy+P_R@Kg}V3>j$54+`OkPez9u8ynrf zHB7Z9oLM;<|MSO>yCx62X8Bl>&cDiOrbN&6k|0dA*OSajQUlBeE1k`9km~eCYgXjd9zLYo> zA63*$WRxtu&a>$MQob{1ReObOA+?i%o<~^?)B?CP39>H^VF}5}$+s|~8g9)nd6AZE zRK_%J+<3{%%5}f*h5szaj~(dKl3z2%f1jc z`gy$EqI`FA1_y5Li&b%t-R&TZds}D@0+aED;d+$^Y1?`ed8?azjJ z;K#s!#arLyMda77mv!wLMcnh1^}jxT1*Q*W*a!)yCUP81BFFl7Wx;@WN_2DuxwD?f zjsrM2%JSoP}j7)mZj8n24zPOU-tB* z@taCYqZq`~okKt&`O)+7<8}Qs$Rw4+OY!yRWT4fql9k4o1nzGkhanKpj@GCJ&jUA- zo<(9#*7fg4GRdYt|B2hO zZTBHb4f#7V5sV&Q7`hhcgGjW~0jaFdcPWvIgvkwhI4kuekql`OJs{Qkd65EMLvHw{JW5Gj(MAj=$9- z_n98zg_yABgeSga;FTX;q2M<{DHNoWG*s^+&jUe^-)L2&n#DshYYJ3LMxoy)YUU>oyI* zJDLwa*Qai_Bn3z#NNke!y?8czGk$is0oYFDrJ3s)v-wlN89bS;J;4;E+N!@9_aVLs zW!^$wR}tho&%l~mLRY-<-fFXNp1tx!sQ_;Fvc zDbxi7bzAdlU(n#hQkGhe;e>T{lM%{!2uCDYIaj}kaF#hgyOI~ik?Q8`155M*Lio}2 zJMh%RvLI$Q>)yjh312}JKseMLkKQR6%ae0ympseO*gF3;B}EC1QN5{Hh!EUx@BD$g zO#bF^@fH3#M)FghCdb8H_gHiCNcbRRa)FDhsx2mP3WGllf)~i`cjA4+LI=IEynFmU`Y>E~H6Gd-<(?_O|G zQPD_V+UlxfHckD>%Z9qoI3aTcM^E!;pmaL8BS9HyT3Of7L<0pSWxzz9)o?mbq;qWd z-0o&~`6_;UzIb8!C4=4_Alu?V>iukClO|Tw9q8@ttzEu-`}Tuevk>m7CW(a(@Sk?_ za^1EZA*1obN*nxxqVbRBIsal}uYoSi+Q8@Y_r4qmSsDLib>*jBx31HNO?MC)2&T_G z?iYNCIq=VQ7i->JnaOqE*>r!&p{uKlTl&Excj#tkXJ>MHx(3+Hu5{fQhIOyDp`r9T zHvFyJ++5j=+?<@rUX!TKt~6~lc04aCD*EJu0-MWqNX0BuW~83G`%I<7K;`QTw&!O^ z8*pqC<}AGH1{TC(ut3J@J)JRY42JHjRJ?_1DV5uH#{qQk3^+LClHfmq98 zl?aaErAwD^vsraHkbMEa>=~M8DUYt}7n%f@`$4&TDR)v?nI4VwcBcE^7woWbH2(k@ zAK?-A)QV3Y)k4Hq7ye8B3UM+YrN#&eO>pFjxs#HUZ`OzLui-J)zM9cHTWc(`Dp>5R zGO+Mlm!$ElPc3>fWoNoGG%YOB9A|sz)V!_xalf7&_K%dg_vKb=r>1@ygPyajcHYyw zKrXQUIZs++qvvv9Zy-%0>{g(WGtyh1(4F~TzBQ=_j|g`3!Gj0(vprewyN9z3eHIsH z(u?^X3*@+N*n%*c!v#7Yo6^-j^V;(A#Q>`Vmp(zl$f!OP4Sfl5VS2dpk9)XQj+ImU!J!xlL5sS&dQyD+4FYgac(hRoJ^SG$<)&GdRW&s=#yv|j zv$kjZ4{vvgJ50ahM#Fy2{Ego}?BMeF7Utv#|G5l#%nSVdqTb#IhvLm^UZ1EH#B9xG zf0T6jdh_PZ2B}Ug{gv4mg?|#$^rw_pJ-Vbs61Y@+e9q-X?9!5LxwtLrBd)&D1Ag!; zNE;a$@m-#~^-=i8`|gC?+|GquIxhK1$nkYfccz@dns=vn%F$rny|e4rUz{8?Op5%+ znH8*KV`H05PG$7AzUo%=!gzcyxOd4g!24e=K>m*+=Al^wKJ4yKyu@F=d}(H8M$xAM z6a+6%U0XY4b#*mUt_;7VkU!AlG+h?89)6-YA z$G?2Ce9g$bfo6nJT?X2Pn{VRchYhSgSyY@#%Pllu0gb&B5)$&#&EnhhgSD61XjsLf z3+*Nj-A-o>0Oj`tqNKiD^DxJSp)}ACcWP>CJ_?%>V5b5$@Ficfvjg0Yp1RtxkPCKm zhM>gPdYIky;nSHBKYk5x?7t{SFbn(KiL-F2cZ4k86a`6Z0j!(aA)7V7N!Fcl;MVWGl+X`ps;;57UsvYJoFWf`yfN}p8L$Dzpsp>rwAf1 z{!s@>S$38TtyjNQ&H}k#^cdke|38NG48DJUOEF*7;NKr-h?0~*eM!l|fkd{}BA08M;AQdxF{ZM7xkKPL355Pppm zqx`$Vyjm@k8|(AWo@NSVf2C4d{jb(Ud@t&_AIs0=(c4G$A3JGH5m*;YOsyiI5eRy; zh}s;%Pj>z@lC*lUmjmx$d^S)0&(0G0?)Unf@wTBO{=1(TVU_pj73%Dx$71V5W}Sa; z+&>#Vdy(n>Yj9G?{r_FvZ2pw>c-3Ug8P#wckr4A4;w;wx{{Go8doLJD9nt?u+aAkv zdjPqwio2GDV<#i7I$Zc;4l0upmtIuVH+veUR;}JpRY00#>eI2GA$R%l5Ms5XJ5t^7 zv)30YCmu~e7*FSq(jM*|^?EL2A;t_q7>@Zz6!_F|9hjaXnh5fyKE>Sm^~8x2q^mve zLWGW?MG>U#mGLiy-BQMOF>C56aC-QTF>f6 zU*X3IIguEz8}OVw1irbwTX`x3Kr zJ25rX8m>+F3BODE`n7F#1b+BrsXAV3hL`-(it)B>3>Ux07gj$T3s<;rWf%nB|8czZ z84T_5lKE#1EguYZPGf3N?tc%E<|;pC_*4uv_G%;|p__*?xR-!tn{Grfa=z7vxWQljZ{$k>0- zJ&tXItdjb@dxnmJ@4zw&8rITE!7DO1Sx%mbLo?tqV6Tmyv!#ebv5v2N+xEoqux6mH)Clt`Z6E1xgebtvlXV^4c=V|D(eE*oAGvPDLHg;- zNLRK`3zQ<@sEDc?#o~-B=Qv<)pM^Uj)JMPB5#r=>P3*^msUtSx6g)PnY`DS~ zmsXn!?Ul>C-!L;e?lkjVAoh1Ha!urH1sH$Uykl4WJ7zEZ`Scm~s{OJ~dyB~mmaEm~l)8t@MH?MBQ6zEg4K9>0W+F2L}4bos?Lz)2mU zlS7i_TR%84J5_=H(G#yjJ`*RSq!Qxu-&I>Y9~)`&v!7Yxnf^9>yZaB53z#$Kw2dvN zT$8P->Zt2L9X-dWg^>iCi{)7gooF@hk;Vuu>fNH_?|bfw4I(R21bWga_xhNs8k z^Ft>;nb&hQ{h(Kg4;!1_)xRx*+jxpg){`#J53K+NLBxK&e4JFNl~S^A$sS*DVyVir z+~{t80vmxXm(x&o4=pRq)6q<2J%jBl&VGqLr1hZa-N2AI@c|o$*Pmd`tWMd|OfRkSN&~nZkqji}p0{g#<^%^LyBZ zzhRe3D3#DA5^1DWTfJm$3NJ}K13lo&K+>Fd;aR)s9v5I;J%aG)PlE?IC9LY3xdxt7 zP=dmO0JIE6L@7=)wK>!Uo@H^G+6=^xh~1)iuf=>mWCr4%v)mcDvK4izi?~rWqG3$N4oS0{ zITi=%sYg$Hks%zpl6&7}v8pyx(FMaU=31>XI~hKZC)9J|c~`n_NqUZ;%MBQG{{8{yr|`G$LghCU-# zoC2$9^uY!%6re5)`S}k9a*ZCI)i=T^O%V+8tL~)_}om$`T_*GSRFd@_D7bt6!%b(v2 z@5pDzMRMwhZ(ynt`jnl#sPwLVkTmq=3twpKlNes3bTQTuza=`Pnfz4KdvO5eoITw7 zBewzPAuAT~jr(qqj77HJ1a{`L5El*m8qlJXqdhsvTw0q;3zhWT#&`ISt&W-p~{{Blzc!Nm7A*5c71? z)aSvpBS%ozE!OA`bGPmH zGQM0t>dF@poDq@X9{$%({ujsxE|`>Im6_g*OB#H)lXu1GN#pQ>M*mc#^#n+>d+96K z)`s=wl*M0#iFu_Sno4T*VEc$Sgr(cg#GBCA{RIz0%Q9a(K_zOwz35e9g3nQ=W6M|H z;{H~TbYv|X=(DJb$tYP}YWLUdLg}qfak@>d z3hqc7M;ScPjbJl+ygJnLNzf1!8laAj7H|Iu=E;59dwJ9*@sQEQnZplCoU^)8@6+FN zakCgG5PZ~Ay}79E0gS z8K%9)EN&a;O~Y>KD9D<^UuAXdenOOllQIOsrF`9CLjt86!yX^#7guhpbep%|TOr`a zCpMNu>uQYVqsxe@uRADt-T@J!9Ue{bv6<~?J%#m-%#^y--Y;L6p<$OAu-bvb;&j6Y zq1w@*=iWYSxN{>jZ`0YKb}{R)bA4W#ZH8a3q(FacVPO+g=4l_d`{^b$o*kE=j^rzM z2#I^6^09C9ij|6($L@|`dGrL>+ZSYCw7j2f*hWpg<315aeY3LnvO*lEd}>tBija`d zPFJ9Vwo>TDspT?VKF#v3g@xVGEO(E7<{WjThsp`c9vlbn$0u0ERz=8!P~VH+;aP^#3e_4r2a>98%<$e@)3z}^S?nCjfzh<^V?gi zeCkc0^*rdzBfDTxX@MwmqiKIt|4!WV<6+dQa)aWX^Xu17WaGyN-%E0-fIE4;G~kEO zQpf!KW$z~zyN!30<&`7pBiI#M==(W^8!}r=f)OJ`mL> z@28i{W$<$>cXqF%VzgNm?6FMgwoB|kr0daqAVe=T#n5MP zbJ?$s8wa~coB6zcnHUuEiPc&?%ZtV08wcOnw&@z!v(`~xYbW)@vqCK#@P@yLNg?(p0 zP3>0&>8mMi^|lV+kf7?FE?=U|)w%~UTkE<l0D50&ccu|G5xqzd zcCdWbn*gb7PoRpYnn4Yxj$U>sk@()!V&2y@J@Uyr*n}+)kxqUh_~hRg9Y)>a(OnPN z!!7sw%y6$9{XK1!5x4tw2@la3f#*x6&moweq8I7{ls-X8W-~K5imt{&*JEJv89l$l zLN2otRq+(w=!f`yh#Ulug=GILhE_W4b=dKwca2k9xQ{;>$S+@3-(!;l4>TT}V1m2F z@`eKS&FMn7lC``=M76&uLL%30LK(tr2>Ouo{wNyJ^9&dl$9M&!o>5q@P&?P8 zF%&5m*7T#>>oqIYDG`C$ubrPhK@3!(mtSbIW%@axWo7M_z!nj(+YUH!C!|_pA6<^pdSSS)IPD+aK6K_NN&$YMWxV|@~i)E6EL_M zvLwzqkGk!=!%P{&7)M1kbZc*4LH*J_(E&e*Gl)e|;8{Wxp~1ySr7I&05;t%HJBgiCtK-fKp{8 zz?kJc;qlGc@h$1kAl2L}2c)D+w_X$s6EF`f5+v;R!kn08o7=RN3bsyyANPaezONA} zeyGm8_Tn@D<;(5F#@sP^nkdxKw%Yrf4sH#1E-O%by10JV?C9X;Pp4WQBdz-$Ju8^Q z;n7)HcR_zm&&~=LpF>m`QC}c4)xSY_aC7HX?Vlf14ih;Ll+1uLaBQd^jgwGyRyRDr zm1J^x++)|}W%~Nkxoj0mgc9=WA3`r_e+lMM`AA{}RKaKswQ1kno^M+LPoix{e<%sl zuTtlx4>r;QSET2pzmjLevO4hm;^1CNQfN^P)N5qKNQtnXYg0yrn`;44os`m;IB+gf zfgjPhOAVr5x2ZQ-%n~lv<@5e1OP7|<TQ7o>xH^8-{ii&oBK&#oR-&q%FLoH zdeBOEhM(ol)Y18|s3CO$*uP{gW6v9rYeric6D`?yGPH#FEr z)rNaLp2tOM8S7)Ckah=ni}-SkOT-+@nXe9elXrsz0!aa`MRgn+AyIednOfae`mT3X zLVrhW_DV_VGbtevO$dxXxGBPGcStDcr~F((jpXj3L#nYb%OdMCrHN*Tq{Uz2*ft2% zbl>&26F=N}%LR&f1r%}Sg}}PcIXNwM6vs%(uc;4-g(hE(aWjbG7XZB|5di)|GF+(0 z!Hy||XJQD|K^cG3ltX6<$NvpScFdt?bkVtikC$}8^Ru&LWPu4E5zT=e0j!^? zBi+R@045kSzzMPNGxN1KGB^R(Wdx9ypMdMeq>M3|RnvegA4vfhB#wRnH1Eu-{`CCuJPl05Ai9Fp}$urV3S$qtm|PxV>(J0#gZb0I8GD zZGsY&J)r1Cu3Y&!=a^DZpaqB-HE?lCZ2c@^)^X0r*xRx;CpXu$?#-#%Q9z0&MMrbYO3A-rO#)y`Vv{c5 z#D<(lsYVw8x2LY5aWZEh5`(uNsXh|GD0uo$o?CM}z{;LCZ4K|Pin;;TuNJR%_pSk} zlZJ-I_fg;DtIlh5Qzgpp1!Q4@{?n2Oxz);aCm{~7TObz#Bt-QUN2q&3MHM@ZnYAe% z1SDrLz-e}Hb;82JC<;hKMC3u{L)q_tV~dNm!2@=0*0ud{M)tR-l?$0m6h9wd*Yksv zr`?ZG(ftu73+=eQ@@+5P<`i^Xtaa}1iZ4C}V@277uKms|lr zcg?}U0ZLKrP`r2%x`S}+dGOTW;GlaQ z*UAA_fYWsX{BqNc%?*DPo^Dtit>cRHNlv~1^tcANywWm-XR<1QwnGbWrT8`GiHt8_ zYMmFzn$_Li-M?ELUVTm>nX$DxcMsribXU@J3cn6d0A%t#3VZZCen(f=!iyWcijP+; zP}IY@B$M~;fbI`)Ih$uWm<-^*A*+Ixt%Y*_B$EP_yLaEVnj6gz6v|e;E;*|l{^S6w zk&zJ!Vq2Z-?`&y_h9#bobQXA=!KlBnvEg2S3mAdFeEVxwKwjRJa@sNALizQ3z%WGb z-f|C*j#8&eQ*(16vaq%`)z4wKtYX5r(K55>kh5X6bxK}d7dZ~}g$PuiKl|JU^w@x9 zex%Dd6SfUZV2RMe6H3e??$ zgBD(F1R}InbXk$BL(fUAKa=56D%;{gce~|+K}#;LbNu|>0J!t-hSe}Qh@<#0v=q5G zKUi!i6$)iYF6;B>&XG@F8fCc&YNTGQ2{wFnOLBg=e0Uv&Tl)V^Oix!nb?Ovdw?i=r zkIlum45fa?y+{cs%R4JsB!-F_^eGoiZ}=XmohU4*bd4S7>foYyhfn z0UnxAo5t9XEi{O@Z#x^3cR*+x5XlaC`P$1vLs$92lpt=$ugwP})%n+tsRH?1@o}P{ z-`#^L@H`hoU1DLp3Fu`MD&3c7pIDZi9IE5%l$OtBh0{1 zFAjrW^^(+wsn^=Pq{u1(g)r6a_uYxS9~QrJ?P|syJKmR9rG_(K>A@s>{^@BaPz$5O z^k;987l$t}xDFS(xyn&nk+(+C8f~vH%D2#q9pw$`pQDyY`io-Vx~PuEbDKiL0nFx8 zT;veOZX5uN;*tQWvr#SyJ{8C+-bP*ul5*gOEIp@{`WbhlidXpR!y zos$StzF2wi3AAKT;rIluFJtP4WFV*B!$7hfqM-gphXF5ibed^oZg7<4xU-M+DQWis za&b^_P%uA>b$@mvmGfteoR7bUzJ2Qrx-hD6#dXMB$Xk5`H8t(cVktnzZq+k-sW?A% zDDparD+TNcF5>vrptIfSDV(5532IL6 z`4`zG9G~9#PKQm@&OU5rZhlW)J!H{&>CcZHsXP!C>~4%2_p^NEK>3{DJKY@}iN(bd zvoo+`vKXA}hO+ApRJj>TeM(>*c~2ov`H|V8_v?*_hzK_+t0CI7)YJy6d9Gm;S>3~c z7FMl&AzR_)>JE^Qj}lJlf`wW6KFX%1NzghL<22+_XZ0rXj8f=1Sf~}A^5jKwan|qs zFO0#?$zqJbFk}Es0lQnO5EmJF22^q>TRVVfcYgks@K+-6l@e9U?T_bO^fr&NqHZl^mjBOMT0w!0fbSTc`ujF_#uw=q?f*KM0V}$JIZAfHgB9=i?Ku zjbe5{GS%(uvSFWz19r_!7;8`{Cby&_LPNg*WZ)nb-4PM-?1f>O0yYUy;k6difcFK> z^(+xj4(@|FiUO_RtX%o|x5+#kv>b|QB4-A?)HZHDEWP80Z*Jo~S9uO({4AuGod_QsWWUZvhn~dkr z$pYA=^`H+?be?gH<)+I7GevHsQ|x#}CeJae3^uHR&qGjkTPyxYj+S04rGZL!J9wUQ zWqI~fs?hl*gA%Lq6G-6gkHXl`3W3Vs<1&V#e@L*mqIf&3~^ zdkQ6C0Xf^!+f~wv1SoDM0Ei>IiO%ytPl-#mMuuJ*Xjq}QoDXB?=jWq2c)D<`ug2U0 z$rj4Mtt2b}$Sjl_?P+1YYX79#$S|#VOSRiao76+7Xb^*&rM;jti|<{kj$Dh{ z<@~cR+~f!04C+{u<2@gb`rV~jaDn<{IDN(V`q4EiOdKM1D(GZ^^1_lE4T1Mc0wx2RJ+BQd@be3po(Oj29DPtak6 zW24)tgGvCpJvSStsGI!uItu7J)gf__zq3q zlLjiUxqj_Kdgual5e*GBwa1QhzwQuMWpl{!s>flvaP%;gy3rni8-d2??+Ff~>^U#Y z`RA}qIKur}4wsSRS>FWlWQmo#P2lIn0^xMhtB0p|$=x{UR>e;0M;cabz^)^NjEp(! z=l(-EAqX%1bKg0=n-~P;0&E%`!Afy#n zxcIj95?b*`GRy7^W5bUJ3FOp61MSmVQ(52kH|P>Pg$}wq*<8Cbg1@CK#^(Auvrayo z)?e&5BV0o&On=i<6^Fk>tsr`^dPQQc(58#ta&pQCKR=n0f$zO;wNwau(i}jF331@% zg0`uc9f5nR2SL}_&ku-098KR->T^q3`3+?F(~0(*K0PN40&8AU-t6n^L%p0&x{}e& zCHtDe%UhX{-s}DMysm>oE;Ls{|78mgczoa#b3F^ZO}DD06~`vX?nZpOxB%K461&x@ zxw+~DVbG+z-jEgi?7CJw9KsDo?mS?jVJyLvl$7B9xi0YQMT{F5v;AI3am;1`=myi- z(V<8Py?DRUhbFJ1wUrZ#mLX2^={!ME9|*D?$SLQY_~nZ{`Zhp2K9#C^T+( zAHyVMoS2o>3TUz;b!*ySDzTTP(5rxC|BX*yp|hH_1f6Rw@CQdU2t$vNEXN z-oXJ4ZU`vY$B(b*yEE&#fh(@L`S~;8!J?5E{1XxpVXDheb_)n`X9xqX}KuOqZPj@!OW&EX9j0nux>$7&cBlMdRgw9zaG>oBtmu{X#AvXfeC%qhP$L z9+*Jbf;wMgFWAYVstp-6rT+sRhbPRo@!jdVoMA4|gzk?9FxLn4011pXY!5%_1Py&s5Hg%7$NnSnrMMZy)!f$tVQ_o@MY z8sK3Co$Ao3w2ChUd^04Q2yrKPH4dzFEv^#Z#z8;bOrXd1X9(>(p_jR+=qlQ8JU2JD z3DKT$YH(Os0*hsVEE=mmecAzyOa2a#u1i=He`y?b^1W{)#_e4y;{A^+Q!hzKX#1VK zMChQOU2po$h1Jft6xr3if1fGG9RgrLs;g^hB@zh7(8mEh8O)ugU#>?WR#Nh>ACyP? z)X{hqJQp*7h86*w89>f_SQOyByR+3Ob*Xe@%W|Y8JAsD8BM4Gv+!UTf>L?h(&0M;q zU#6qleEsLpgwoBMYO1QoI#XZ6< z1ApvABu4P`KWP5}=(&s4w_;r=5eH{fBy=&NpN9a=&W3uC;2b8FmJUvK-qX`d9~c-2 znt`_QMCe+ul%*N=m;*ALtY(K4G3fqgk!~Hs0h@Y>?j}n9l7}Vp68V7{C|H)<8tvnf zz+kEOIr7|M9dwI=lf(@aK|M@Rh!AJ2 z^bhZLIYW!Ei$VADsgEJS!JnZQ`e5VS=wNz>9e%As0z4?_7Rhnn`ENtVgO26>H@KKE zu9G*8OM78X%Kn4PuI5|+zQ*-#ako7G)d#E66%C-8{J=c)fCtQ>&}cMO1o=di-mnBT zA6FYu3_9CiyReSlz#q~<#OJiAc9Xg2I6nZ%*oUVVt~U-H35lQNF@6&V=w{JD`(Qzy z7D!k47rP!TS}5CkYA2d5bKvIUw{Xl!nP}8*Ax$=oBHim4YEePE)RUJU#Np=)>k4Kx zqrn*;^w`@mSm-)I9P zA7XgJDvtKmO+v2gqmaoP$PckPl1(}**)Oo*)`;u|DvbYH9z4t73n0|u¨cuRnm0 z{uRnPFpbAQ1&^(3v7r7bdi?KG9M%4<7rJir(37DMNH_$->PCMT+p!Cp1Rhy81osyS zPXWFp`5H#XOCgj^wF6hXszZ2WVqY*mXXD6P_y6E?lMRWL(=~eYxa%H}J(wE`^e87A zvtJFezSZ><1NDT>ROtZqg(CY#duraYKw%0*Yq9Tu-TTG-7HtV19ED6Q?dp28CXFhS zN0fDJ*|u)`-$SW>MHI?%n1ehqPJy|g+Od)>Ji_+0yt~GplQ))KVq*4HvpbxiJvDt^ zi|Lua1MTWIO|h`Rtg13Mg9n3*?aJzh&u{l1_?%8gfEOs=cz+yI8OiOdIqEHcY@G#} zg8{3a-X&1GThI)$(cI^ z_B)(tae}W5=r{6RyLMNFlbJX#sQJ?eqoE*I&*aR$k9au1j2mw9EQ^gKOXZ0N4DH%< zOskPqi3f75W^MD@3+5eo0|#AV!mk?(Y|C->J^QO!0*sL#@-LXPV$;cjZgt%A6eq_Y z^VGv6ymAdxfkJ69Kx}O0YykVEr7b6jC z3ilfhe6S@C{?A%M7S;6mnXk55@SYFn&s0TTkBJ$(SQ3SV`|ID0cveJ_`Q#$} zSmTmFMD=914E~oJSx|DpuK51px?mqrZr|7w#KjhnUx6FPQhkaj5UCp&BRPKq5SIUx$VueCj7JA=x=Yu>?1@Ox@)UPS-D!*S(Gk5KWs-_D_Jf(qj2*jMx(Un zL9UK+&Bhz52}+Ib?()0LOs${qhPvwD!RdV-a#!WdN$Fb^eygv`-vMaaw-&o(oxWou z6*L{YbF}5jq^#jp@q#N`qploqYmGPVLLs?EYG7tU)Dtf){R`y^Nv^XpCD%7u;~#PP z)Y?CaTUxmq5_qZ!vPha(RaMJkWz1M0?k5|$-!Zgrk@;8>Psq@++EtB;o0V>>sxgb# z46jP5PHjfqtfN4qH)96bV=HROth`b;e2Gc#j^K~Qlm~>CrK=bwIVnpiC`(WwV+MgISU3UeCe0Jh!o#}XbMm13_}mcr7(>yJ`0uL=UWN!Nd&Jt;6CJOOF3a8Y z!n~4^tGhb8tA{qqkJPQ<9(K!9lt+3SubG!Zb%a9-q{!-k&?~tfLo(b-wMv{_+rYrZ z{C*2ZIzv9EWHGnR9PS@b5Q&NT27Yd+ah-e+q(j}^%b-KJk?-|XrS5WZaWQzgaZOFi z*?x@o3iojYotin1g+2;(==A8V$;6PcfEW4f(hW0D6v331KcosBAH6l#4?xb~Z3q44 z>`-Yx46f)2pGDAh-xxzXdmH#(pFiEHo|cw|8x0U`;5&`Pl|aS~lyVq5&o8kzH27nS zDesud?H6bI5^xd>Jj&q$&m#@0ywMtgF#{7PD+Z^g+MKb6>O6+SGT~6zNiHqbg}kL2 zocg&l(ygrvT|4I6pUgRaNy4Wvg1B#gxO@W|-{5vm9q5f`_t?$?Q)G`e6+$9!_H=ye zb>h+3{JRv;11k5VUAi^A9D1@936Q5x#0H=Jp!?XXwWEU@d*R%v(3})(&-aWNuS1uSYo%)=BvGMG&f<-^z4XLgMK&z|PUHi@+#~A8;4w zRFfj}DL0dQk$raqwVLIUsaX(&mr>06VT)bTov0d||A!CT^M?>)rpu3ghey>C6VM{w zqmC#_gdwmDz8w)Rfmo9#=(R`SbdVskg2=Uq&NAMF&8^AF%(^31>GW@&jUGl0*tV?< zV(Z9|$#1!*9496-53kl9Jc)!i9_e-gK0`Q!(-$*^AR%y!K?6~wax5F_FPw#Muvw@1 z=t6UGg_$93#A~~QNK(z4Za0ZgCTP&mS^iw-WIXfhB<;!2*B-M;&J75HAN(2u`o!ua zzurYG!HfXbAqb^He!%t($`33NYy%vc#0>|AM>$e z0e3{;1iLXJb50|f9j!Hbirf*cm&;R8LyM$MgZ&6GfNA9rsArA` z9ZZWg8~!wPLpY2cVaI2jDE%~nogLv2B)H6|fsWtFby+sXww1Un|FJD>;G-r~Oy#dT zZZ3+`8PE{CYlV<#X+mpDTsj#o4S?c8NoS3!bPd2(tL0A5(8Fjl z9(TiBU)veL*Ppmq*=+$nd?r>eCY=nargWf4t*|i&jF8rHAkOhMUOH*3FuQ zzBiQkk@F|^I7R}Fr0;wGd$EqayHRvF6}~(0N%uInqGZNehx%eZ^m?LSk-|Y!RU>?g z>;35y=_{F6&OTA5l^PI^e5RHUUzmWlmz$(7RDkT9dGg^&)qAKzD3lIEb{al_p+o@B zyLV;@ZNE%PddvNvenY66Q{Qib@&MZ7MiO1wI;pw)8z=AF}Y0(1h00tJc3f zN$rAg`)a?H7>ETF+{&^nt)Q_3I)52gHm=;0JX>jRt2?$O%Jp)W^~SO&x7(&DLqK{u zAGC1U5zr#dT9K={c?$ZOEwnlb?Tn_?%?bshzGKUR@Jcl2367mXKAjmmL^EjfR-B47 z&$9`!wvFZV{!iB3Ovq}LS7Z2oA-Yu#&hP=}LoLNHeA@l&+J!=B61hA{IY6%>N!Pjh z=m=iVeZvUb2Hz8V_x3HFVX}ZN|LusuY^mT@D|6iY-5>?SMre z>`5iJ1fc^met}REVq&q3xVwF*1Mx~pJ8)wg* zYi4rniwX=3{A_^~P2gmlgoYfq@JRO9m+2r9L^-?cz#UD zN`z#hA4=CxBU~XuZ)T?y7Z-mGwg81W;?ShDQla0OW$WL$d_Qw=aVf*YRhz?s1o(#1 zIt|x=lL`-GygiNr@ILh??yFgm2{}2uoLkEK@d;#MdKx*oxtq_=24+JIO3aEYo$e;C zY~z;|pomi676Vh<-T2_PTe5bZ5)g=Y#OR(xO3w4f!m$TTdmhG;j zJ?pTrut0=SKi07)WXvyI$_R!>pl@CYjNFHdR|nT4B4LNN)omynK~g*0vR??2{$@aG zgz^!O`^tRMYp&9+wBV+S=ahbW$}j>tfy2vmt0O4rI6CjUi!!*-PU&ne&Qig$fpP;1 zQ_T^Km-9#-(b!2<*FZLL@5w+8k~7fu#HYT*lW z#puqX5AWa0%!IeJwcX#B1?Rp^5Kv1H)fBKNH*%mfjI?o6HQR{04bt3zbCq%}7rH()6xAT*m zXTt`IZp;Xn>O)&Qwp@MHbE0@>wYRzqYUhsu%t7xs(p_ku1j=o3>C<8m zJ7iUO%sY}pN++%fE5B%?&3A%kPQlA=|8ng$4=AHS(WlzJ;S(HM0Zef+AQD*O!zZlr zhrHj2o^f-%r{gjitBUVF#CysvQE{36S21~liiWc|rJC{tHz0aoJ|Mz$D4)fv^#UY& zWq=JF4u?{0&(mez8L75)Z%R14k+95%z68V6x( zVazxTZIYU+b1g+j_m&%6s9;($Hx3)E7SP~&8WBIvh^5^MFRM9UWAWiJ?saqpbJB|( z8#(L43=MP!7F;FEfiV$WuLxYKaB);Zg2OawiWlRjk*(8Lp&h_qcfGmg=MX`Y5Kq=v zXg|FS=nQ(=d`qY&B0f4yXv_Q|QegjGojP^vEfj(2rQ?X77io7vUdrU)Rp*hnaxgy% z_10+37B!M?E`KufyD)zx^m}iSY#=H}G+3X{+ZK%-$q5L!Qip72Udu;HS~XTm0HQn%X;45+)I*aF z(f4lMI%*?M7)E+U|^zzufZBB6pwtqc6L6mF((^)p)DS%Mu8@EU=N1d@cv>mts zcd1%FeYFQhvGX{Y^F)+S_Py^1jO1_MxbgbmDL0C6#yf#XF%Z&&WGU}J!pmd3#)F4h ze0}hl5R8(tx_f6Xw9(!;7cypJcm;nf`;RRT$Xj^0IOW#E| zh70p2+9RUyDQ%D?_`|?g04Wy4wsseNym|i5)rq1=P)PD-)PvPgqTg`Q zKSK}dm?|{(u!Df+Y#($PU+c*#XIbEIx|l1TI2$CaZr zRsd!_nZ@vyk>ArARz+#|jDxrI_2(V6Z3ccC7=_2nEk<(S`qIzpLnAiVJoX$>*B8Qo z+HskG4_yQ--s<7C0T2DaTRJ+AL^MF-D^GMlTW5<-6Biqp?baG-1$HdzcMPwxG_7tQ8k9an%^IB1qkpxBaEx^k&(S`rcD z`HFj2!cFQN_0r2naVzxs_wU~~?anl=9+vOCWHoVs)n0Q*>rfSmsB06K&Osul4Z^4i zC?`nLeuw}Ov-KR1AwXIa)Su$VU+Zt*`(elcdS`|{_TPn+Uc&x$lF689JY}CuvOQ_FA?=(!HHP znB%XnXAl7f{>jD?C~c#0f*7~qV)&kkoiWili6@cYAXRM+8#$n1RD_wQ7RUlJ>*^To z0gjf-TrS%&5&teoCZ;>ONt;DGQXc^kJbci3-QPqqCQzaebdd_R{#FNQ@PCv9&i@s+ zijsrjJP>xOw1O&NqE6(LTI1yp0G9X)RBtOaP5n}R9XNoR-sGMQZ{<*dMSGz5tlrx* zKELYfrtSTsU}T^)ykVoCMn1kCa7|X^uaDufLfyCnem;Wrqq@whc%k~uDHwL)2&nZ3H_d6PZ#GTV${C;J77j3SwgYMGHIuyptmTtMf+y^+6Rr!s-Y(uevnc{g_M~rFCE*^K04u!D4kLVG zT6}j{{L9?;ASgHh&|@;nhxyf1&szw*(7$;D;bzu1%;sOuW1A zHn^@rvI>7@-p4G`5}X317y8O8Zk>~gl9G~5w&;;GU|OKmFkCeOLL21t+hO6T3=)Tq zgPDZ3ZYi+ZBd7yZIShUByo7VDD-$h?7i7yeo)RO4Jpo6;Qgg2mVduF}WOK3p%b*E; zo{|-L?p4G6&BgK1A=Qr|y|CFgF4j3c06Gu5ps4W{hjuy>>L24lwhkmD&=v~z?r=6f zEFBGJDRWepwY0ngEHFUJK@ZR^nVi3+{0*Qr4C80oc;i8sX>WmLFA7dvMjoZpRkdq) z%s}zygtPQ~#K`s7rP+}5n(Ka-{NEbwS5t)i%Pm_qh$ZWnIwPGgg0zAC!go6Jwy&x? z5!CF$!opKU)Xo7pdH8CrI8&+Ma*I{ouM}=9_4mhRgFj3qY7$zVO4i_5acY#LE^LS)JCC1wC^enJ0` z4=@}vO{VBX?FZl`;KSi0xaZg&uDHAz&Z35jp(-1L=L3FD3MeQ3Y>M1u{bWyDg2z0w z7D~t+B)dpzhKT=i=^MT|7I#5@&hF+X3ha;ZcXL5F@0Y)x7MSr&=fGI{3>;2IRJ)R4 z4Tqy1&(10TaEv+^W1KI_^+p-)$T`35CMy ze1|l|s?*<@()h*6hfykwt-C-jqPYh|X!M+ho_`+aDw^R|XaN+5I@G;RG!B4Z3Fy^c zE$Wi@y!DZcbQQXlbqH#1E43HWWJ z^Mr--vHW{e*J+tv1L8M@M^rUb_lPEvOnU{Eb!0tMluzC95|w`?L%6bkmBxbKgkH+i z_HGGhy2}QpiS(YKp5?0R|MFu>fD5JsdYh~dU8Zv?k@kgw9H?UHR&_>GJi}yU-yCPC zU}j0!tuY#<_^!57V)F`gC2_x}0jhqr=mmBpxvbL`WKYr!br#Mtc(wrw{P2SP9FG~x zo!vPp(Px?fm6rdsy}kWHHzcia>U`E~C~ebZfgZ4~$IgnO{`@Q%7xn^VjdAZkyt4^m z?+ZWsZ$*p+4ELmciZtm1nWv~OsE(Y9jQ2AVZ=&!D*${qO3 z|MP3oS8Af=zna+~a`|~2#3@W2ng?0i)B)c@eZ*UaG0KYpiF>f-XvX@d*YaTkl~CY& z77;4$QQG}oibX}d93VqC%YB#=IMeB<`$GXjLF;wE0q|oc4jGfw41)&%2Vu|r{y@qS9CTI*Xi}KmY%PA<{oB!dFni?O%H?F zFV3figjl2715SP1#`KpLuU@bF!3|W|z!&Lc@>e3aH-gQ!ruTS@P6Wne1p1d)IGhvX zoyz4v=(F^MTwM>IB69DW3d5&!W_v&g1*fnUvSp*SJUOo~xp)Px~qRZA0ez*Vk z24o3cDIJ*tRyQMF^v15`-CWS3#tg(R9NLT3n=HB|;0OwfD3J)_8s{JpOj`DySi&r; zawQBZJZf~EkGm)gsegOFX2HsDHn&NmK$E3HcIqR!>+f=Z7A@hR?w>V)U3>7{+)bp` z;Q25BvEMOGpManH!`q>71C&%?&NRt|U@GhlW8408N{IaX=|Fz-m`q{-yi@E!G^bQ1 zOyt~r6=E#eAMT2U0IV)9`qV)bkX^nZvEh(sLPQP{UGJXe15G5k;kx~Y54FUY1nbl} zkVAjwes%bF#r|I>xqX7p+M2!uLx#c2QB&j)y%gTPjkVKAegD?jLBT+^jauFt={K|T zQt1|6uMEN~2QDvEd$cAfPS+!A1&Oj4D(iC|giF_11T_1{8z+`K;ztVx`HD0#H5yS@ zgT&I99^BCCIK#4hOSFHp;(cZ!d(fD7GJ_yep$^~8g z#g~|dbJRmSfZbcbZUM|=g$xllE_mUeGfqC1%kG2nfj#WllRBjCMd#uyKTQI4jR$w6b3mUP@}zq}E9pVCv8E%&2bs;F z>omRo77aZ0Vq?$se@L>^uxuRmy%<~c_yb@0=$huqyP~hDtye_O$Xhc`9n^&SfTtJ3 zZaYiDvfTXHt7YG04(LbER$Bk?50c6T0TCw6Ta+PJ9?Em;0+}SK=Jf`Cue;~D3 zJ@CC~=FR;YgoJO$D0i4m0xrJ8QKf2reR^U37W`G#>qD&jFZ)vBrCj_p?~g1W?5qu4 zxvgs|bYCR$>QWuOiU47LVem%UqBa?}S*xwl%)}zW7Gr$q@@}}UTL!7`*$-{4-V6Ad zEw@1ztg`wIz!$N5!4XkJ(PyTlycQ->TRzq@YO!^$U)Qx;5K%yLVo5u0B3IuF@7DZ% ziDx@WJa9|Jug_k%%{ftQrj+!kellgv>WzK?51oWjV{}rmvdw<%{m~(xUo*d7pH`sz z(8wQA_tD*NVZOd^$UPwIb=?PD9ZQjh(3NB1DR|w$Hur7Mw)Vp=5Rhw6h}?qF9E#V% zx@aJ}r`sws3J3SUZMn*`8R;JXnlmE4Omy4vapx>~LD!oLmg;l$Tnqt?EISf(^lP#? zuZga`dG?}wokOq% zj@55xzOvkUewfC7^~kb(;8yhPgUCau)B0yk+VQ)-q(}YL=f+bh8P=UDnXIhBVO8*T zVIkOa@-PLBR|q;6vXO~mO&T|wd}DqGE0aykwKPY%UxPSv9u#+MJ~SNEnt3O_r&iQ+4_|M`9gOWSP;vqc?i6g+l_BUKz5 zVCL3@5J#vq6c^pKDB3;SxIb@?l1LI1Q)iwPlH37GCaZ($J~0R_iqY^Kq>7tvk&f!= z>ybQDx%&GoLJ?*RC&lwbxnY^>yvZirR!-zM^`NuxU*aW-MKVn!tf>$;mle651SHwT zJvMQ_`_Y+wv-tIsXs*fb>ZT)QvqzQz&m%K==?_JibpaRZ4+ooq7Vb=!2-XQG(bjhx z8Qz&aVA}rp)D>?X8|@#4T2a0Q^Lvv`)McM3saU4a_3EG9M`YTZUl@SZu33yxp6Y_^(WoeE~AX| zVf{Tg|Iw}Hbn1J+KK8=QG~`EK<? z@~hABOJ|;Kx2yKRE8~IfowT!B4@q?Bbuuph=I*C!IENn`R3876up5p`umG9dryOSf z-@EZviCZ%d?e`ila}Iot-`YM|P_6u~TA8w_bgN0&OY%@fOs)JrSjx4Mza5dhwe9RW zA#(u+Cmp@m429{GgXy1GjTONe!KK~E?KAewiyLWMCCrKi_o!Sk)-Y>Hg|sE5AGef7GkbTsT;Bz~J*GY%M)Z96Jzx20c-=h=V(;6^(&J0q0}A_7+sn(Jl~F{;0JwfZ*QiZfa!MkNBY18pB=wPFtI8NBYDvP%8bik znR6whwo9v>jO_Q<^!55y8-uL7~fT?ADJ?Zc^&@A6DBkpipJI9IyYju;_?Z zP^EZSlFiQm%gpM)7b*y@eID@Ca_E! z2j9ZE0g}g$;*+}P?ZVgEv5YSQVAb(!I(@6jcCl>ln*AR4uaNQrE-}J741?f@LRnkJ z!-8nteJlkNglA5FK&5&x3dM?@ql!##eO;=~kHUeqvr4dV!ej0X{rQQ9?kg|#T=%cU zjn2}!x~zm*U5!{G6$`X$j%lppwejzcC%%$-eaGO#<8px7V)r_kntS+9Y*;y&L@_Kr{*q6_ z86T36uFx;bf3saZc$RVAk#a>Irfcv~5tD$l@>9CQyDL=f{hfI)KNGRug+1YPExlM& z=V!SC5m_Al9~hQOiN|LaMulUhzbHfok3ZEOr!F&Eog^~2>Lr?fk-n;9q`+D!@)2Gu zwXxp+p?`#7U1>c0qwCCECl&K6%l|&3PQogyl;28We{7JENzunHYBF8uQ$RJ3zCVBd zOAf2Scf!Lr%&hv%R}&QODnZtw5MFQ9Ok142nu~1J=kYGC`KAng!Vv$+h2!CuIKF&x zE10f7*N&gh^inzqKua~xn&^%^eR6uOV?SIwxdu+@XS{Hz7;k8$GIL*9(5oZCqAr6d zOzBH*ok=0v>*K2>=M>Pp>v62PJe-4fJgDAZc5}(KZ@o?!rvSe_xuctlFs>3JRW!-j zo%2_AcNT6?CqV=dZRBs;6t(PK2^4dmG|b^|BTb=eT*N%NV25(XPD4&Vf7(GlP-Iq= z_EO$vecA9s@$t3%rCTLhj@txHGVIxIB>9h#meuHvyNr!2 zh|NzCw$`PZwTvQ5G6cs?7eO(=VW-)t z&$&?2BA%f_Ow41Q>5LZX8?;Hh`IgV%4Jqti0-w%h1Gv#ZV=`68_}I~;X`Lh?JVXY0 z@Z7*%`%=`_YCPc1{n&f8PfNE2K<$|7_51veuz6p2b6X`jY_jufNmNIg3AGwYWro4A zn@zyGfv^8U^@p?gjW0>USPZE!oQ`!IFbTW-j!IZP82w+ZUQzo@3yHM=@ZRO~)kEEr8-i$S>lvcpTCzWw#Y!cWP3kDZdzOv< z+3Q8XzzX+xgF_d1tQbc7_{zZN@tIP7NNeHtqpjmKj3*xtfljVJKbd)dI*DGMc-giE zD{J|AA!YuFcl;g~&e;vpo>-Qd+9AOfpiIVkj+i8}dBBC>?k+Xf)z~Wvr!}d+~KdxDfVBg?*uCO7j1!kS012B@X-&5N|j^xf*h(A(IL0^BJ zg3y1UksvQHrVRKQb+)NvFmNP_RpQGJzySXHh48mQ(nk*ccMy}I9JKuJ*MGav|ILp+ zg7CxywdJ!DMPEFe)HZ!Meu2?f%t1KX3wrC?Mk0Toy3a^K6u$nW?T-Eb@OVTdit+?K zUA~C!#4wK7Z9^vDlAcAF zX|Lql9svTM_nOUDK7Xs;3P){doe;>fLPJg~Kye%L*8T~8!@ZX4fN+ls5Zjawgu5|K2ZQU%M;Vc7!D}7 z)kb-}Oh<1y=`UF(MMq0FiY)mKaHD!FAZnntm<+{eS$r5F9lDmVpgj&%{o7FWTmWjMyz#;~;=hw_kH7LWWGR0dJ83F^?-Qq1Ih3mO6ibuoi-shrf&#vr~ zf6}{>`yDrl=-xf5c)@^DWIq5Ti(wlB2F1YLKR)7KkE~$G^*asw$%cNPb(n^Sy;3`g zZ(uM5e1-S+w}XGJPbnS)7~#a87+_KV0-O>40W#vJ6+V9ah!lU2LlICw^r~hzQ|G6@ zyykqB;0CXNUf3ZSGM*KjOQ8IIaxVfP`oLL;10u+ezkpUGgJBrZx(1en5jPaUUPeV4 z0ed9N+%|%m^E6b>f<}bw$CwDx0aSbhb3CYVCjv7F01pe4cZ+ z-8!!pZW6|)yP-0`TWx%yUjYZy1`^+&fi6?fZ;7lRJM~;s06CjuH6X@50a6D|$cYeW zWy5`ZJUkQd_!O@00Qi^AwlA|{FoD{eWbaAjo;2)~V^b_1A~TgR-Fu@`I~S_RK-@>K z4{9jxHCX_~i*8uO6M8L8LG3|`Cb;f&UT+G1YxTKBB{(<80U@^o+=?oKGNPj^1@hFC zdt*W31mRE#&f`p|ab4-(xb9C*J1^(Xy6w+x_Gb~dWHbWuH;8FG*e3&G2uNiDNJ!@u z03pKLa}(;xvQ2hicn3yH9Ep6)p1a_-b_Dk)m?jMftYw{u#NnYFCU9lOWvF95;2%8= zwwYBZC*u<0135wW9k|b^e8vPw-M|WmZYsxZsMWq}Yb8fg8OZzy#+qU%-=#Z(zumtQ?ZjjQgl4n0MD?s#x&jf&P!tE@K?rU^ZM166 z&oZFUwZ2~qlm%4*ng%unNL?lxPr-_u#V7^wn|4jMbh>tL^-t$}?CpLgh`%KcwJt6b z`a1@23%vGIxBjK@f!wEV1BnSVQRKFdoezW=aDD0|tvGag^o4mKQ?l=F=7Pq}=LkVP zg8mqAwVwH(0vAj;+?H^2b3dg&0uXPCo;z0K%|&StP8C6|1TI~jTkNN4B`r7g&~(#3 zX^kpbDMIAovMgxjt2LE^Xh<~poRuh#L+U4Kfy%y^c)Cx;BFuWJ|JrYhVJFvCZ#6wV z%jGXSWqWIT^h={Fv3{)}JyO4Q6&ikwjtPkE#-TKJ&waw>0nN7WRR6C}sW zg?U7v()rb|H8}T+BVy%W?J)%zf;7J|stnxZN0W#vJ<4BNzj7eLHESwG}Qxe$wIbl5J(T z0O0~o)7w3!5FE5XM(v97mps4W#|1opK+NHXvna=wAJu$WkvQ6n9 z!LZ}AvoUc^v0UZofD{?nKgDeI-+e1*K5OSCa5!;+#hl~iKXTr=oNbi31 zWu8U=@DV_>5-tlCiWd~BHRsD^Zvapj74t!Dgnp^h3-%=+L*`~wR8(kqB1Bu9mv`@t zKQ4Ix;X^FYiH9|^KvW0dj3@oRf(ioY_o&qbuxNmo56n8h^ciIP0&4OZ{VF8|#8fA_ zan+8XC$>e=UcJz;MfVy$g0@r8ajg()d|4||SVJyoFh|OYZaDV}JgE#|TL|}GZ&5=l2uzm*pr+B=9s%o>hv3Jl1;(|_5yJ3F>gSm}*H6vZTn77Nhr=|{^250$ zV-4X9c?&ZT53abxdmV5sF0(@u5xz$bc07)AI>VOgC4Se|!0(gKB`?2!?oHWDTYLNS zz7E*uR0cKkGxlT{$^DT1=vW4T+!bLf^>`(}&0yTXT=!7ze0Wup@V6+(d-7Hr;D=$b zy!z16l5bAzH-3gHvAFE9gPq;PWPBumZ0k-8-f~Dy`p@>=fU^0ZqQ414{Fg6M0G}c6 zewPP&R2<3?ZGg|Xb?455Y#SjVA>Sg!=jIywrY0sXk7dH84|U55z=rUL1q_Tym=rx( zCdy4CKS~W7VX39zo>@@B>4Hj3=b2ZdBAWy^Hl2+UTE#rj+Xw!*yG0m)b`t=#BR~r4 zBMP!WY?-e?)RJMV^1NVWD@Vy|dn(GYd=Dy#)%rlIXnXAA0%HBb?&m8kVt|ZeXf!c4 z-dN!Q=eaq176L^$`^z@-8rQX#D#g0dCH-k7WdyWU1y&%E;emB*jNj&QvRjdfkGi^g zG|*(wMgXR|3qUVmLuOb!*E@|wRpy;wy|UY0w;9$!eFkPlZ`ziob@DBHFpRYrj4XYU zrNuW!Xc3bSKJG4#gN^ieopBcqRsX8B2K^_1sXmrzl9@OD7H1^zAy2m%qT)6=G=L9w zIx8ED8_*kJXcGe)P6ob5Dxf9l&3^kI>%zSL1d6$xS?W%@thZ1T)y0XRUyBe-8t4bhJ7 z;V2vwJa=;)blYC2L1WuSL|J?%`|y-g9S8uKZTE~Z$&Sx*&pj>xeXl_chclP=VKJ|) zEy7A0w1XoeEbCP#kl|ojr!`nJAW@>OF4OF*QvK(}j?M?%jyl7%x@$egG{=hubh87+>^Y zofJv=2!?UDadjb#BeY@HXQ;`W0lDIr4^yvU88^Vd?3G!%+eM=(BPI_P%MFipA4p%M z0HhyaY&P8*B6Upj!+yqKbMaK(wz$fbd0$d^q;*~C)?5)<31C-xe9wJ==i}has*JL)N z9w=||n$W}aq|S@hOxLPE^y9~K!FBECu9ez*K8bbs@kUBI39lY^9t%dRqSIHes>9y? zaHCud_a?Y=QtMRrR-e3V;E7ye>={fzBl2)>(NAPOjkc5Yyk_r_k&sQd zQ@i?0EiOXuQUkvrY)W-)z8|w02sqZDteG=Gv+;%X>NG*3N+_FBi`RpQj){ZHp{N|gZAN8bG8j}@9DR-&DvWW1em1n2OM>K z1Uz%@va2C7GvqIIknA7&`adN zEyyM0|0m~*%=0076ov0}+Sr1@cXJA&qmZjZKf*uw&ZUhR1eNO0QoI09X9>6q`Ab$Z z@FDzUe(4Dfm=M6DfsCjvR?h5Fq(@6igb{<5kZ0xLDZsToFKVDACXxV58WGgGyNEES z=ZUoBo`7|Lci^dbcm{*)FZSLE{9S`^mPLokZ^6|JXuX7?ghrmMPwue^+@-$)pU{}{ zL~=(!X0UD(VOvOuit-e|I5hpN`epu*V5_KQXa36H?EglMb%9t97UJnih8Z~S6UPj6 zQ7du#L@+F#ZJh`+hi>=W#||1eF-NRQMJXovM&xZc{>tGxItG+?DIOlE5HIo$Ywop3PBf|O-y1B{hU03(JW>$gT%9& zP4}7lmGyL^i7aqBSNIKTbvMzF5mP%iAs-7oe-3iT{#5L z0^l}JarEcWdFh~#b`2N@a29w#cg)%gL~m{c5->T<4 zFh~x>E2Md&!$}tf+EUknLXN#TSh8PKS63Hui|nALQSPl2DVFj#8@C~9$PcG(I1#tT zVFu@6?_phRN{zzQ9gQS1p`OMhFBvf}FW)lQTFA&$^2rvnl z_UfhjVG`C4(3jRRr4B<4^&^?&aFFs!Dl5>Y^St$4U_a(>w5o}RO2wsYDlCQ`dc|ML z2x5Sj6a$gOc^I{WCwM@gNCKCA44fIzuO)_|`XlpLI7}fh5%#qwvlS|GE`M*rSbxsvTe{hpp@W}`A8 zugRYNqpq$MJWY}Sj%)^b4@5{tlq1x@W;vGGHJg8X+%Bvq#7C&Xo*y>}+=(`zOdiW_ z_)9g~m4Td5DzN2vN6ZP#*M}O?<^`8^#gOl<{#kW3wJ(rwH(Q=)MyY>2m&w!YKMvep zE$3ziv_Fva)ZouhM@^>|DZyy{7maF$t^(Z{j-fzjxl*eO+_f4O51oOXImfLX=KT?5 z1DU{2gWsJSl5P(){@1Drwi@MbKM(4|OpnO~dggE$kQ=7Kz_krne7F_2jI_kW16p7g z_d^q5`>93#crNrH%TEV=$nIa>#rIm|fdjG(Y?HMRSE6js9kl|o`c^vrNHN^KCKt)= zfhO|Qr09`UvKHXcf0-)?1PP!#>VZ8Vmw|fK>{=gC1EnIQ=NF@rb&ERI*C4wSjd-#k z0fjtGQT7DB{UMM#usy~vS#wOY8ur=KP&Ub3*i6+e!YLry;NhxETG{f-qATx%xb#zj zM~3KH=vx?PrxW7o+E!MFLr*ITr< zo|q`Sw>OUi*?i)cFLe%(Qv}J<9FuH5@YPdE+l*^HWiu&s*M=);h4ZTgQh@4ZGm9ud#&cRdB%96TkYX>oOj6 z;@Uws%jnYGOkA2#u+S@0M8S>`-`i*;4B*!*S>|%WAuo!bkY-uj-2x|O@|a&Rpg=_H zJ#J@|%VWVf)a}VWtl!C(QsQFMDH6~6YJa9A$U{KEVFCvG)XER_Tm>YK8o87a3WW1; zV8IfqzJXk8JhGof8Aag!wLy9qPw8S=x-sVa4ukwS-zB^2LSXrd6w5{bl#@VIk9OZ( ziZpR+yU?z#Ec(Ib$O!yjPUFBYIkP5*-Hq}19qrt=yik;TnD!0cf6Lg}o;<5a@ZuS8 z+7pG8G6Xi~XcuT*=*rv7(gsR#9LrE(40`Rkx@S~LF$msQBp`Sf_?^6Z#$q?fO=PM5 zs?d0tZ6>K091%Aw=t@5W_a^pN6bS7`fl&8dL{~!4Y-7f6zk?x@X9hFqR85e%`5L*mJ^nEI21GM%rOm#c zo=-W|5wtwZw1wE7&fq0OR#D#901COsT8DNiInikX+s}JA7htol1IO`-e+GfphPOzmeZ8+pr zIY^$s!@Riolo^}og$9<0D@TYFbe3^&v?~@a)?NVao#R6o)zIJ{`LEQ>(rqg!I7}h@ zqoNh$y?DTVl9z|aDM<-54EQWYegQ?oZs<8(+Y=iv6=n}SE$3B|4q>u&)E#b1VfE;RF}wYdLN!iV4h5u=56!qq?Sai8J-3DL*~5Q;3+-}B5vE#NO^KSuaN(Z{%90O7XtHJ3 zg); zHbxl~Ax_Gr#x!KHowEr14GAL?x9vEn*lOtGbND^#k>J|x+p&;joq}q|!q^i*7`P>P zpxA%yyx#yj`-k>t@|s(LDICU^I0Ez>MeXjyaq{;O$OQrD_?+WEBH&W(!tSEs;3$os zV`l+^Xq2NH?6@cP+lU4{!yzJU-O2Z$c{pLNzx4^}y(Dbql!4|r&R$$=4RjLKP>6!` zZYHx;f~(%=k!k(AcPDrB7VQI$$u9RSSaI$Kgdj0Sl~y+sg` zkH%Vx*QX+aIeKM&b`!q=h3zp$id!%x)7)2*Hqo1ga{GNovNwJ4YH&Oqz2nOG2x`!>uW2 zMxYL*8HdTm$HUFccDFassD%>B%E&uqm!(s`BE|Kky$>pcZWoNZb1Qzvcic632%-df zc+r3@2-Jxn@7EMOJjB5~PE5lOOP>_2EIE3TNtg+Cz^yXg&RZ)U7lmEiG_Mdx=lnsi ztOnutALb*~FdLVnS$5=6wGo9H5SoCQiK^#``R+CNy!#KE^~@ffBk8L z*w!P9fzp2AL(#H+EnXC~E=)e9J@zp76H80QhD*`*^qrEBLZj$f7{s@1*ELH>Bi#b^ z457)GcijFx*OeaaL{Z~WHlqW~H%d04HtOnUeSTG7-znd6A9r$08xF!R4hm^vP1=tS z1%LM72p-8CNU&|Wj}}b`^B0C+=_J5R+uHsZvFXxwzF=O;og-8&!0>U|M)nmAKX^HU zd2dDhpEK8unA0!Y{9#~s!>abv@{o}4m;8(S@&Z9-2^{jS_H=79!Dz^!%Zcgi;$JDj z$?NPsJQ=2169zxJW&%8ts-KY1#=SJ|Bsu{H@bZUV3UJ;!A*t9=4C2hBAjU??5fcLM}`azLmV3?8<0#Vjs7wTCWD~*68pMs{t899KaPcuZNNc_ zM%xY!UhoO{JvOi~3yCaisvSB^wW4JjyZ2HFib~{Cz`4aeYzPy)jyn=pM?|9zt#%u& z$h)@>&S0$Xkcd=ra&nA?4t@nJKLGU+`&`uh5d*gP-AD(!hfY**v}=R7|HqFq8jh0K z<0x?wR)lcU45$I&X^D`DtC%&oEqiKyZiQ1J#>xr5TW9-v`S~08_GrcG;cv?pm>2MB zBu1JOz(P(he~sjYaF8CE3b)WL_&`4#o>&zg)}^jhanE2+ff!P*e#-2n{l&Bq1M%mSq(wfU3)?U zdjXtJ>{|3N;KWo!Hr24F0NX1+@3sZ)+m_uUmgq}g7DCrukAW~4$YavLc=`xM>nQdD zSV`EmjFsL?+SBl&9x#cyX+nYI$^1B!RD*B;`?#2v&XHUQ;z-c6bW%w;lBb`WmU8T{Izby0%#Z4oqlTfKO`l4JM;Xy zeDJhZ@Z=cYWtn<*bIg%1gtPMc(wJ{k*-o8It1;_$7?PRZq91QYiuK$5oEX~i$m_AA z=qMb|Jx6bE7dr`JRY8!nQhCEFTM^>o^;%U_f(JR4zzz+LTe^|r!k|CFJVbo&><_tu zzb|dSzP6LdLC;8ZSBVif2r0kJ?HaGq>E18Ag&od9L;W;V+--=g8Q@Lb51fy_D^jt) ziVjbNss8nAVvGOBJ4VpMTP`1a|1_Q4^A}ufl=K2*-PtctCJ ze70xS1P#%T(fX^6^?!fiS-Q{jD@r|LZ{JU=azgtC$tu{eTr@u}*wuPE{aigu7XTjE zo@e3V260jh*v5~4ek8wGq>OZO;GAvm;PA3N#@{@QDLu*eMvWc*zAL#s(=uWTs(G`2x+u^7f{PG1Ht0Ot{ z2Z@oAE^N)AcX)M=yYZ!G>Qp8@b~JZ%U~DVh@wplN%JbutK1~Cbj+}PN9n~4grsL)n z=a$9^dyYxcDbqbkXH0kdrozN+>zG3Adad|;wCJAlLS`j99pQQ6ZafV*UmF{0<(5W& z=1}d1ZKrOTXg*C_9S-mv+B0H^{cBSg(Hg(W@iLWXz4;~#{g{N8_tbs3(Kx} zO&d{8-wamCzQM(8QMhmY5onPTBEj7Nxe~RW{w9|rM>TPEBICBAy~i&Bn~+IvHXnCl z>~baiaYV8C|Vn{`QY8_TYmP%FZI;y#rJ9-vY;-5cF?H2CD z`{5ggXmcYZsXG}*qy{J@5}?n$Qr{ms7|xQnJyN!ts6E$(`&nAf!8_r+x}jV6n;|Wf zlY;0IxA6gJNS}A!>SSPDXv#r17gACE_3<2+x!C@=Iw|U9WlZKJlcNMiPQ!FLD=@%H z*JZ)fN{q2Jz;5NBORCOxp;-XE!K%dQP^`x4MCV%eN6yN-(bH+|xA$@z>`p2rem&dT zS<0it?!CsZdtFIb_|O#G$9_wh;kJ6ezWDl@!e(Ev-tFLT*Ydgdi*oUoMF(8s!DoN@ zHFDtY&%<8dFBTob+)-&@Uqf6uhkBFI;xmI%hZ&L2b!pqLC%I{ixKg`Qd^}vAPI7O) zr(fr}$r!^Bbd!5ktnv6VYY$RyF5HI=UIE6LfaTV&2g3n&1pst!Dc$iu`s&A2SG#ec zSMh0*$k|ykp5ZFPLc^c9+g^RsAWwsZAT(}^lUE(*8Is7CHMlS;7wl+*9YAS~m>~;k zQw_2I@nTVQ)ril6^`5kL&eY_glD^{j&azmsmSb_NOk~;chGr)OLat17ciW_QX3k(U z!EW=p7X6V61Azf{&u72$x}v+@eHNk9sSu)Gt0V5-NPGV=;S@H9()#OjqhpSb-CyHj zIGe9f79H4(bG@%SM)5wcWXDpE-Od3f$9U;-BF=bw1HVQ6@Vn9M18PRkrzVXR7#d>ZdOaz(l^rL##~qD#tiKy+ONgu-Yr1K{m~1pnHo24K?HZsr zx;V2`v>eajIF%DrBA8~pK`IT41&Dk|++XMlc7@6Jn(M@erNe0>(V7V?Kg<%h%y;|D zeno0uQYbX(zOysaapw##>6_NJ>TjFl9*ptcFP~-Z*1xLhDKWp%;!Eq}-1*sldTq*e zZ{v8h-NoesqiVCNBs@7b zFT~P6%U)Gtj9Y38p{<2vF=S=>U2}8Q;%1&%=M29ej_vEE{7W_ z4HF8wTYF*(YXq^|CiV0Yt5!ed^5PUvepwiPwI!kF+J^bD2sicW&8o_!Ug&h2J+U(t zC)>XoIgegy6zA3<+lgr`eLp)agi-736rq-`#p*OGJ-}V(|dG?}*<5%ZdVZmVO$Q}V1zjtKQ zRSD9M!P|4Y&b95b&6~9lji~73MA%uhA4%5Pb*LTfi9WNEaX!J7Ga}T=yge()(b(^3qTaYuI?`76&SJp3m^r+gSx7$YL!d@3)nq;DeuEVT$KvsJtJI*;E z!l_W&LVMs>e%eWnLrY`IT6yki%&zz1ck|6mA_KBUdQ7HD=Uq)h*RoK2)2<-uBK;5LT_|oIRdslI{j; z?qkj;rN1*A!tJ(I+Hb9OZj84pjE|PVoFZE;uk7X4i*|Qfl0~x|Z!PI3X8-Lh`YXkO z&}7#ji(gI+YyzChEi;d2v3j&k+4tc06$-q^Bo6%%EX&T%&odBu;-^ywKA#@wZz@^d zoH3(Hn<~{kE&k?oEN9m4kJ?#6RpQUjXWy+@*-iQITeVru4}96n&())%C7blNQfj&6 z_^8FAtebIap&OEJ$mj;laS$XYSl8h$t6^h#?P6GTM1y#m63pERmQ>B@=QIVf*Wvx9 zT;L2Y-D}NThL~AQopNlnWmeqcrmJ5dI|FBllU-y@ep>Tgg*DOal+MQ0gVM4cw_Wyj zv$VCBdUj*!0_IjEMeKz?`d6Z9zvi(SG>2Z)nkY#_Oxx{Y7v`eUso5_3|H0OKfK&PZ z|KkT0kx__jQE1RIBC{epgxxy%ZbKkG=d_BkG`FP~_ewp8vD6?FA*3-pa9Vn?BCAcUhxHgUO(0nA9 zhVP_SKJSi~90|iTub|C`Q1RX{UliwG{75yYyX+kJB8%h+PR3*8;CA`)N3_Sv7 z^nAr%vvOXyYJI#zZ+A!HId*0C%!)r6&KJFn^|1W|>1oa!u+I!^~8KumKl z(K?KmnpJP??fuYl&Jsd##gEt{yI|#pYmh@Eaj(}{*!pR}=>$w9(^iqqK%&Sqm-AV> z3t8xSXajUTaCi3ba8{7bGjwoH>)r_`uo(3Sp*PY}!E;Idr8=~08+WS|!_YJmQeTg? z>4oF$frjAz=m=k$*k^ufkOd}exiO>UK?pJ?42__1!% zuFbz&AOeK-hB$@csYA=_>{}ay7E(4_Q@ma?eoSjL3|b{VBew}~w&lO~Oc`eNa>Uyb zJS1Iytye4#mwkbqxW9RDxtzF}6`o2fnAzb)i|$f5z%jV~u?WYSKOSgfjKcod5i>Zi zT&4w>?Z{+xE(O#GSw8C+p@S#@Bdnm&mX#QL_J}kT`a@9?4kw3W`=~ z2yzEWKOM{_9wK7U9Et6X_%}+L{6y#-8vfHXIXuvwmvT&V!9*FgnQT4JuKZ^{= z#RND-bGLTp%g5&fusHq(*npRID&5Pr*}ZnjZJ~;=GMKWn7mv$Xo&z5xZQpaw;A)nv z`kc47GcgSRh4SVI_#5-&hf>Y`+VMz25b92Ig^By0kz{=pa9cuc>CawABNU#C(< z3WqVjJr^e)P&yVHQTfh30h|ia;lYe}c5+OMt%k;M)w=zn#=h{rzv&0e&Pv>;iOD}; zw-9$>IZ?PW({`Yuyc{XQ0jT*KYxAfd_#x~4>Krk)sqScR&d9@3%M8)*WcxoRIc}c~ zUH5P;tcuqVrxhl7_z2E*q~zT4wxXK2_tOFXkExTBKP878@aGYK9kHV0d8$oY6gpBy zZnI4(s`xjoeba5UpDz*pa`6d$vn`j;{gxtfdOKARxqaZ2t!ym;yW9hdHp_IJ%WHMb z?7CXt!YOHmy$6w;$JsbNOIL_C4jl0oi6d!;@F~6FnFqTeWM_NBQ-i0`ucoUy>^TK9-qeV7YYi&bIB(rloTs#s*qjm0XC^gl{E# zrku)jp{&7!d)TcIGu~rOFJaN;JQIpcl`$zC!PWmDspM}y679kdIxUoj@nBh-m{ac! zJ(sIa$=BqxS9-}dKQhx@iM^HQv-OjC+4)n}(sE0%6P!|iD80h5nvcT;n9IP6`XKT+ z2wBx@(>hkFYaELMhFd{l;7PkrtEI1v4!R2uSBf@ozYgc{bkiT0355s6812SLmx$-t zA*bxjeTJC`k-W8xh=Q;AEZFCw`kA!B3R#=wN{jzAgZCH-(7Y`YC4%GMe<($~X z|6uTMIPZbT#MCIs--IM;r0Q3JZukx2`q zw@J~Eov%zulRMGwA-VLzgG2~${S2$QTEG?dB+DzxZ@wLtF~Tp_OUzYo!46@7^|&L)hS9D zX$K+a!@cNPVqs3HQ(HmKK)?MJw0Rr(>27n$C~#qwV|)2H4Fk(LgH>`}To$$IDW!DL zzo1peu}xAJV3<0P0FteVWr<|Ct~9m7S($~lt%=3$jQHD=T|f2>IbX}7T&yhcvXWKh zw}mQ;6m~Z`I};BqJY;uO*xwdy7FU_F19A8pNa>(FOTHBE-gXC94_vC`-a94ReIL+u~!65I*;3;O}V;C~0s1UnQj|oMXCtq2LEXZTRL8=l;Vx{%}_K zT#2x=aIVn7J_b3!kh=l9eA-FHB2i>;*U_QqM}yg^4_*UyL-xce=I8Ih;HY&4Jz0mVPzue|*;84!}!Up^O|y0MA$B6+a0VKrJ9Xb5ta z=^U=@dhj^s8SptLDm1>4Cq*R*fm462;CIJ){W%#^i2v57n70o)6>sX&U3fXdS$WzA z?FaddPH>raM)+Lc7Xb{H5~*T{Z}yoXsboD-tood#LB+_;OxEiDsuSzl#%B_HC+;x* z9^!l;4Z+Ux@&U0q{#gn%Ae~9RSbb1VTt+4b@&k;LiJH|Am!+vH>qP>*aJa2LFdzz59_h(VL@mIE$2}IsHcXW-yO5wAv^H%Ro zqRMr9ltO}{!OUVm4-Q)ue@=)vM`TlVfNfR;GYQ6YC^p~aTX4M-!KYdsEBQq$Cw6n5 zjLNbyOr&J+OIDj%9NO=Rz%Fl#VwUq{c=>)r2xm5AU50%|3aza=95Ziit%zK{MdY`Y zN&r{C7@~g3?sXjaxS2)!kob9-EZ0u(b~J~FKT{kx68#Z^6*Y{%9_pW zoLjvdSZ`_t~x5So@Pm=4rpU=*FLu{>p14z4_4cLkpAQqSTyc+#5 zA4!Wqe6RSrMno3&()_C*_*pHcH{Z(`h_ElhBd=a+(#7?ZhGRSS)}%w$4!khCB>VM@ zR=16*Gb~mLT^99vx+g`?X5DWN6V+T+3?VK`r^3-c6ic!D=AZiF@h_X79h(tz*$*Ubuk>8LEGT{*e3zFr?IIyc+HUJmXC61gr_d1WJEu!J|^z3@*}!!tS2?x7Aj z2ciWwzOC`P5u1HONc@q9jrl4CC@iS+Ad=^i_jr{?xKIp8?ID$JxG!V=K9M36vOR9} zq@)ln&eqk(VtM(Srihcb|i$$KZe1cHy7#=V-BLf`nLx0~BH-~G^PTj~rHbkl$c`7_ffk}W|3Mltub8iU?s z7`m#S!yOjJ^Ul(OTi{IH)ScKls8Lq}M3a7vXkM5+h1x^M5d$Ew{#&;}a0U_1vt8Iz0RbtIrOn zaS!C+p7B_QW0_Q$MX$_j;tc~MdrQV4_n@p~Oo@SkDgX1KcVl7B@SDOP6omq$#y60; zMNXdD=j);euxyc#L-s|1w8MM#+Uu2b_guw=We%oXNAB;^yw@Q|MQhkVP9D;7d#H7X zHHqOtCgO;Fvde%K-GcJYyU&;0|ERUw;;(%th_i3Xc{ zx}w5!Kce3Dz~PtOR0s#q@cz@83?Y`ZLk#hT;t)1q^F%bl)|rmvv`yanl;z$%v`1IL zX`>YD$ak~Z+QGp@k>z^1<^-N5vKuqIfJFWghdUP?%}`C2Fx0|NoYD~I148Ups^DHo z)=}F++o`1DX6}$-cxsngRyeP1W7z}9%C}ji-9(}4paO-;mq$he_Lnx2eS%<8eE!YJ zs;Dt3q1|P^C^e&Pyo>w_swoS$7-UK3mv(V8ept?&XId|xf<^DtA^lk_uIunwY&8 zj>W2>**fPf^oM7K|3$@)2xR3#CSNK1n&9z-@=m6aPO_zY)vkpB)&EBKvyctGR!zhx zRUZ;?xTpt6sbuGCje4hU^?}E?@||+EI-15yz15)HuK1|m86|&J_BvETkbQyd{MKmU z%HA4P$jKtdf^g6N2Asq%b&%9sImGeEKckt5Y*^k%yny^WPs{F0dTyj5CYP@{$pSh5 zW*bwwbXq9~Xb-%?5jO(Dte>SLkee<=LvtX~P6C?LrsWK%t4LvrLiO5ASSk_$Ku(5k zpxW5RTLI2X#c+TYp^|xo;YFdnwSoJb#J%sm#>DroZKt=OSjzyrLxvy947!5elIu5x zkhHu7S>p3|g9Xn$A5(fLd7UV_|DQSm(j70~?s%k~%CW!JR^*7JV(u|1C?)h_YaBl# z*?;M(v8r_Crq|T6>ZhL5?#Ydukoj0jK#JUQE(HQJib`soAL8m2!asPI3|VWqi`mcJ z-=FnKj};`#f3GU5u6b>x3~DDvqmE#o(`mJ>8Ly9BLzN;ZTDoZPEmozR`cJL%Zk+H0 zcSv*mG)XkF<(=V!>9rORssI)Qb%z-#xssY$wMRtm+|w=4LD_t;AHM=boT&*|CrBQf zm-C`z{GqCYqAQh_EYq@R$z9qYBE_d-U`2Q#T#$Qhaam7vktpR!VmDIQw%iFz(P()i zDwdcD_V8oR)%=2669sb@4_yP1&9iPQ=lkKq2VO)T*#k>s#WLQcXNycRtF{6Un1?*WHLvQ_yDPXq4n!4rcUI|Wmx5XXrFE? zuIxCYr%HhbWkeoD=psD>&X*aI@u;qVjFKgqkoWP$VtLEpVY^O_M>)@Q+pXO_!LG-o z{Iy`}ci@!J_EA})?GX}PK3{E?7UlxTP-iEyEEcI$jcmN}tf}E3oL{+A@ctUU&l%fd4IP zqELyK{wcTk}!?{Jl;hMg+O&xWRS)d;Qn15Vo3`t}}(%PHku{l_=A+=kGji zNw?n4tGYlz?}{NQs+I&k<|}pXm=6Ed{5q#Is7H^wJKm)$12+5FzkhHv0!pKbor7hL z@9y!cM3Hf&Bcled^8pq8+yBeNCzGJUG?3c^X+)E&JCvw#piz+#ast|6)PgLsaR2=r z3UwA3QU2cP-y;3r{~^EfE%x)4ik}`K`L|$R`YNp#DfQR#fwVy=?|VaX6NZ0BZp$2Y zYdACGk=jcz`o1SCT$h(NTtOgZenWKz+Tzz+C6*^Q3bSa~#F79ZZ3WU@0GHJO5(ZV# zGrrsirXRQw@@hDN0^$3QE(_r%Cv}Z0 zZq5?HUoX42VSpAQ7cxD3^KIu(9Y^XV6W`vh9V`J#W+xF!8^E%jzP|uXuucHiS>-+v z^byhgOiMdAQKOnDWe8BH;bLyWhJ1KBuyX?*Qus0#f@MaeO`!(u;S+U_7ecyAPC z5l3;QM<<<;8D;+V#sFzz2Q+3+Z|}vhdmsjC2!75Ef-0Z4h>+GbG`yU(OW1+wLUe?7 zV*sU%kySq%wjx!F@V*0GMGrir3Ni-4canRZ%>lygu{8z=0&5WHoSUCV9(#Ei!D<^H z?(_~jPeQXP(xl9^&g+9KEYt!#8-Sr=XV2Hu?MR_i%*>%woe5Y>3|0Y(b;uWJL(6o6 z`&3NPNr`YL090dqY=Ghe)NT;eJq*HMf)z2lB>&7hUQRK?5$bPhMcsO^c!ZkxO+Zlj_Zaj|S5)wd9@)=OtpWu$#qz@}Wbs!gT z=gqs@0EW7c=sCeXB8uM#;W`3qhi+q4QC1Y)Z3NXO;2AN6n@pkAB6<9Sk0s1yM9qD&s(n(s$^R5g|lVao!J zc?4h*e#2%^%xmg;Vh8l+PkQYF>WT#xi#(vLK1gCjE;^E21q^(+ee#s2Zad2@H@g8J z;_`?wATT-+c^1I@x?OZYdfC;bw$1a7PoAXxKTrE11IqU*Vl(D1=@m8Y;wllrjPTC- zkHAi01tJgP&{|RKIIV{8Y77TfreLK8Fbrg<@Qc>JCqO4GvRm@cm5tk;&>;`lwQhJ= zM9>J{3tg7o6Ikh7XqE1BqCZ)Hs4s*US@(mGJn9>m(56fv<_@Ig6ft}$?93&W74bn3 z;Ns!Hgpg2Kmw>bf=pVI!e#_y8OqiGQQ9r86o1WqH1<;!L6cimm*`06I--YB^);Y za-92*+=|XLYuwu3VJ~CcfK>((8@&k6d=`dR9T2mXiK+<1*JvbHd5H6yVD;7`#EK!0 zqNlHqm@3tHaYQf5T{4%1OD_ai9EuLr5%hVLf-J}y-FW;x@=b5-SbgAppBZ*hSSh2j z(tvZf509{7b+x0{*EOD}5^~2T~G@p)qCEF!b_ZdULweBwC!bNKl~-0RQ`Yh1E52ApcqU z|DpgrZjl1ytnR^gHfbn=2^&hGR+s^!2bWAFvY5aBes|FzmmORH{BNn}KZ?n&y#DXg z(*LDx2J+U9UTC?34WO2^2Ip;^Od^>K!~eMx%6Vi#m)={Gqqv4u-gN$VRezlu^%wpJ z-!~copjEy9-AVs@8;D!d)Vw^_mS&ATP7kMXsP$Y%`!dOWq~|P5Ug0>>6$Y8B*8l(W z{0>KbDTpU9E$ySmL(+PA09p9&?mX76EHHh3S{ML{e#Q~kg&yY1gg`FZykGU zy9hst>@cC)5m1KFOcQ+c2v&*-B@NGGcZ!`Go|t@x0hJsCenkW259sjpsDP{00^E+1|y*(`Nc7ygX>^I(IIe!zZdc_NnEm?R627aXNKU@l&0Cs zCpSe%8kk_(;4QxDe{pqy465a?;}FaF-|=Jnb`$1$ujoIJIs|U`;%$8v%+PxK^uJhC z%G1SaYTX0yX9nerkNA$j6x}(-4*0uJDzBp`dqBd}vLKK|-!aAh>?PIn#vk!;|)JX!^W=&gecby z0WZs63!AkVDBBbfDDkWVs+JOlJ&9LV@;l?^pd`Xs0w+6SApsh135@&C*@R$H^UT|M zvU>LkQyP+Q4*msmhdzM*8~9^Z)2)AfJw5zM;2N|Avv`CbwE{TlCf116v(~2ArJGaH zX2403W?12pw(pfCT)J0nU*;0Mu~e~)=w5{Jvit0#t18=x#=$;>#pGI@^keSzQACm@4$Nx{HUoArU#(XuocZ6_y z%ipUq<suLSuf$G%f=Fq$!k}<;K(dCc6O@bqDR!#Dh9Y4+F-H zO_D3veDc=Un(e+OeRd&RhPV6BbNvFsUbjek`|Q~LhE%+_N-odXSG@%BynC97KXS=r zLSgo|>ZXD}?DwhlVIzN6NH(jigbxHykzGPD;GOtSH5{PboWAF|FjmAv!SJOfCu$N2 zC*1#BTnXEwzNdm^Zt8w^4n^wgg!8H`alU~?Nz2T%G*3i_@TUBAq8K_dO9cg(Xd)3eSW^))b{BJ;}@eKn>O zTHM#IhU$>-qqi6Fk~wB=qJN)$(m)|xf?G){-dK0Qudd83&*96HNg*Z9CPNBAYXS}3 z(MnEOI2SvDU81N`FxC<^eo{{~Z}^>(mbk1T#-TChV9|}UQXDMv6gY5J zuo%rPU1?*-2+RFp!Lx&eNnGlv9EDDsk^=s+TNYldcU5qzn16F)ZOxgu_Tt<$&)%tT zW#$tNt(AeOB#^p5RXdtGVRJV8JF5BLZjzwn^Sf9_Lu*a#VSPdah=VN^I}0BFsLUr{HJ!K_>~=vE z0GUr6e#f}#OT?N=4}=YJvNNFaqk^rR>2?cOhv$`QjshGTP8792m}<5f`K@~gA>mh7 zo3z{11b9wDBW(n?EZr_nIF9=b3EkZ{3$n7MXOigze9Z?+$ePmYsw=Bszek+Ye4C2f! z^20y9urjNZy2GG%^i@!T(5|VIyN0}V@*mfqf zMVWL5NEu#X-c=;8e{3rb)iH_dxk9V2!t%(6z_AnXQ;|g zunONHZdZybxue(ihmz)J%BZ_O33Bh$-KwGRs3VXsnE$Y{Rc8Nt06W-uY3KZ%{K>YB zP`(8b0K`Ye0_@VWbO)`+ApWJfgUl(8gsWV|VBWA?p?rXr#P<>1=EFC!cgOI)X2+Uy zXp)0bFGtBmf;zYHRg~vr%G1fq)T5Rrf&^R7l!o9-?_Zf3mKCTI_c4gI#dlBWNJ?C* zEIG-TwX7??5Ok_*`uaupm=W6KKu2;}1X(T~MOJ_1y@sf}HH8nVR#3!?;zYse*nuA|bkEx$dPeeNB#Gl>jCKMQlI*ayDP1K0n{A2_?dPv(24??q?~M==WH ze=~KUv6ipQtGU`P07Y@$Uvliy^bNl!R{8WUZ#5`9JeDk=u`E0lf)o19h9IitXAKAm zK$GLm6~(371rqn0d%k`tvq4dWf8snyzJga}7=ZJVYa#e}R85*wnM)rJCDyQv4yIXx zsdvD?(_DhjpmeyxKw^)vk#<|-_`T$<0WJf<#M^?sG(L!z`1T4%1*KKmRRKK`MFI8* zes*%y*!XRYl6=kxC->d-&7-J*vkS5sTgT|VDc3w-A?r?8Gj0UygjV*F!;%YignmRBW9s2dLQW+LsB^*1!MbUTTqAa)lO#Hy7z>PiDQG*cc$Ps znPud3OS7vF_=D7N5;q~a5a(o;Enece7+QVi4KkEX;km)9+Ungza#Y&ch2WDl((UgH zBwv=-iR)m8I9&RG3E2Av8@#^MP&1^b=$hN=rJ<4&zpr+V`PdZoSHT22c4OY$F&xWRMD z{)A`vuG*`$-2j?sjHYoRa1|vR-L5%bwLWje*x>$f;R}hMdHu~Vh-&MJ^*ep^*Na3flZ+}dN| z>_4wBZ=hmIy>ncvyp#9{OY9=uk30_TXs1tD;}OdYkkq%cEQonbhjl;IxA(F8<$!f2 z32N_K6G!CF2I}zGYrGPzWUSS17e0yT&y)Fu&&Ev~1(bf-=P*%5i*);LjaA-eX6~oI zje9GPQZoIqZM{3$93#$%`$c(gv$6#J>1b0!8f}P3kEPaS83D1VFld5#lS2Piv)_rP zp979q;dfNdJUiA4MFURpvX%W?2XnKv?iR`u6&yxG}my9u@8- zd#{^tT3!{2V1`s4{`^Kfnhc#cI!R4##rs5&UQDH_|#S8O;7eBsQ-01gf^{vp1(iWU_zVutTZQ7NpO82NU z4YJoAOMh;z^=|Ia3B_S4kjeB-eI(>do?lo};PBv1F_q{7ut-gBqzJa(x_{jV62iNas zTTf%EmtSykFkUP^U*k=CrMVFku3TKlo-Q@*U)53?RR0CiWWIfN_6cnAdl0Ej%>{Dl z&)NL93;i$9I&7>iMLhq-r)kQsw4+kGdD1~r`hMa3-T$?0QOpy2W(N7#x3}4zCm67X zC**iX5m3A_rMB=O$@W6_Ro z3Qpe(nRb$wuaiB8PocQ8m1g}Fwk5G{!CiqJV#SOdwKu7>KyL|c(fg~M4z0oZJ3?I_ z^XfLiG*B)|nRb4#s92Dzm6K&+&?VYz-rd5=FrUg4OX75bWVcaZz4_Os%DCGt6qkx; zkTQN1wSeF4R`Zv9?|75>Pl`(v0sAz_aVA2sTGTOwX=hvk-=2rI%adc?y7GWI3fudi zHM=CHzoaGeg#yDB9CD$ZNiMODflxNKbvEkClD5;&4yM*Hle=SEf`;YYPRE1t`70IZ zXzDnQe4i9eM>=+Ar+EA*y!`HxpBD$^>gB2gNn>3?^<~wnHin8Jxn=F_fNr)bvLC=cEVsS5I>T*fQjztR|_j(8n7PF^b$l6KH}kY%#>i4@4(43sRN zhGft$$SW5^JLEDcO~pBBhVo0Ty)<00@I_Cdq4$}O?i_hVk`(hx$-}nYVWQOjth!G) z!&@t^`}}eoeUBhaVv+JJC60(-=Yn^4&o3>EN*H5iO5>yiRefUa{}ty2@w{<$yP zm`+nPJECsGlS$O=BW6Qt3(`s(I~W*&vvLV5c8S*rr(2!-!1;WZe88`twYavni-FHtpKIKvSxIch~c^$L=T)3yC$pyz+gS zrOrmHjWu9);taW`n|(yH+B-D+OlCLT6Mfa1kuu${sbWgZ0^|AUHokQew^eM&TD^KAnf`Lj?9XeY=WelC?Zzz49Q|_0Ppzn)!xPkT z(c8A9`$MVj#&Aj2eu^#5fX~_vRMHj05gpr+dX6sq&1|AT%|K(r&sEFUi{Sq%dpjqe z^O1;8mo_&q-|EbwImT)5voNR7biO22#Hr5ET=`*r6{YN}35GB>yS4FR15VE`?o#)Avv*lI73I_5+?-o0-d8)AXe z+hf~4)qvZ#mL_J8Tm5MG=7E0FwNd*xmtA2=%cc8~mc$r{PTsbjyHoxh*J>N;$ga5L zq_S4VUDkQJD>`XCh~L@CV1{l0#~#)1f*mt@XJjjwTXc@1(v>P|HW~;iZn|G8Q~yZE zb{li|>;kvg@s~(Uhgp1q#B}0`lD3p-gS^RhxBmRr+p2GoHf+b&<0ja36e=U@0skb<}dEZRjX{X5=GRa&rA~^iwu4mZ%HTms}|SZ0{h_v5gZ?rJh4wtoq6$fr)cI1IY}sc z-Q1mlzULwu>Q{RSTqW%5SI3M3Jo`5jLS91?yfTu+cv>F$xm3O17>h;+U|?pC<7kR$ z=WmmaB%O`2jz8MU=o2s`P*_Z+I(5nt&dDpD1jfM=3wJtSyqT zY{x_tAmWZ53CPDQ&=cMxPia1_R?psSNm#LSPcr}olVr4}jFzvQlD~XdW9(o_*)aIetugN-E(!Dl>3wfu! zhAQ1`vC7&VHG0fJywDJUCZ^|GzFzbCKGn;%#JwPEUe+0`W}^?ZGau&D&CIG~F7%44 z<~pB6->NRl?aA%2s^9d0m)8c`swi^{R?E!`hQ$UmlKm&FAf9JvNb8W4MXOWhPCRu~ z5ZA3LEA2d8%BRGBqF204*1Bui)(B&S@f)s26Cz+gfBqYkir(6pN%>1X0=2hjK|Ir7 z#^9}Eh!W;Q{HB`IeZoSSmjFwAo2QLIzxR2{MFkuC<-XFDK22r+40?5?&5B99 zT^2V~9PC-9Th{z;jjD->n6*;&@cM!-pkito#;8vPiX7|zm4rLXXy_TDz}kkq>_>b?-$e8LeV~G4xcoWkdzzY)13`0(eIS8JPP|)2 zOvP1>xvZ1uU8)-+DH5|8+fYSG!9f&|z&&%24&tlhh-~;Brf7Oe)#^`Q`^RH`rds%) z#kPv|k$N?=^Itd@M~#kh8H*U!l&Rk>@$SRslP9mix*9{eyA%4ZG3WTH@n*;di?XCLE@;N>hI(3`~o^riVDCmuvRx z@X(!R5_ip2XL#oD@D?$94=2>`$_d}t>j|thC(J7bGyF!#v9{b0B8^gscWf`;E~tq3 zFh6DHI3y!wuxN1i5+0!}iwny=4+3@rr#$lY_IkOrDh(hOQa>^?d=B?@0wrPBmq@ePpZLkW z(EPkM-AQBd4j%;8%e8-0FPM-M#II{Cx9^lmFKLhUgqfEEW(@oXjE_eB>P5rJI*uqZ zmME(d#Xfd@eeuqJ!)%!ceS;()ug@Pt47o2?zbAT1>bGDNHtk0-(?thU+66O*1XlWs z5q*9Cw7A$8e$lBtFX((Cxs=x?diVEVbCzT`n6W^}Xx=Ad+|KuV9l1a98w&W z@GLV^4jGqh*!#JNKdQc~4Sqr`X)W}svQZVnx$;5GIXPnY-QdETDMwS6FNQ%GnJza} za2LO`KV8yZ8Z`>Y9F<~>_fps>_K&5&?3j$l?C`s)jQ7Pjm+{1_{|&=^SK6P?oyNC1 z_U%p?F|rSSqDxPh*8k_9e=aQ>+L!6}6)k5L3(euLT>>XAzFFqSdUeG3VDL|;)hR!k z$tU#~UK{qOT|}xS?I-;!2`?)C)+%&_Dwaf9hp*d%Q|uLN-e=Y|!yIe*C77E1pNPEI z5R2z0QpYQF2}dtgI_8ZV9c7q9cy4A-$(ikNnBJyNC)!?&4SB6v>@N^*ik%-nMHgd} zF}u%ab?=%X6-uJ7oBOKaYvkuqqsA)A+LIy%vFNPE^@C@84v^K*NSF8`;$@|1!4f1y z5Z4gtHoHxoRcx21l-Ky)1La?zZdGu3qwhXhD3z&tg3|0v%o6WF>&ppv7c!q(Xq1wL zBY6iBsdHk2U?eF|}B0?37 ztKx~z`t?AtoBB?`Yxd&=OI%JuwPo>dmia$b-vd58=eL{Pv2+~5^^mOx*l3*0k6=ozrJiVPA1jU)Vd7E4AOHGl_pO96j+2it zf3fH?&S;`km+?IEd!Pw^-Cf*ji{oS^%om=-+VulB#IM4t6ibX3uF08XdYonpze$W( z+;}%2sK0y^*K6@QGa=De)!HYq--t6b&!OvRlC6PVdA~Q?*5)x^ML~lX)_FoSXs5AT zBy_5R20qq#wERbSFmg}U?%Ohz+U+IZ(j`Szly(a^XX!`}Snh5lVi8L5{BOyzcd6vI+_33X#rx zb^=t}BVIeww#OX1e@R#3Qtq!s*ImQ%DOgELB?uOh(!AeUzs#e`wb+J>(_iu!!!9~e zdF0f~#vU^{3l-hOal2H9_ zaWM@mbvnf0D|YA3Ygl2at#74^{4$pV z|411W;bN^zI2F0GXdsY+3DswS9n*tLNFLCs)wVBJ!)N7qPZ%AojTAGinCSkM|IWkO z9qq>$o6q;1{et=FVq3MfXIAR=PbEw=<0J&^Z7Sda8&ej21?;PJ@MVkk-{!sVSl1;a zMY9aO*lWz$Owmds96OfG;M1UCoX?#zfS+pCvd;)*bfX#Nd@xsCvX9iUPX9PS0&?4cX zBN^>sf+}B_972TZk{<|HvMqdEWj=^oRZ>!Yup#SsBr*I>h zpcf_Zg%acUDEYQary}2M*>nQX_D3MtC7|8w3jC_*^k)I&+a3XY?o9i$0y5%-T2GYgg@O9Aa8L_{Mz6+lt3g3_mERALK3 zmkDTBwphhYTws_>%>ah+rj`~3ej~sb5U#w%WwC>$Aj3ZTZvMD@1>y;yT0(@hx&f!< zJpXIEKvg_+NQ`DI_KK?z;Al(nhTOWMBsKzsM;B#(TwAkVc@b!V!1u^S>H*+3r( z#E@#;ZQC9C3w0c^j4aIWfZ-J6H4w2RqHCJV!QR5HmmMdm9XOp*>#u`u2i)A3yVFf* zuznZ>RR^3<*9>2-`Bkb1*wd~%a;Dk*SYPG=0Z6F=(`$EQ-}}){xTPA|?F}>0-y{pV zCT`tPTSY1J;I8SBdy#$|tOLGvKpgaiJMwse2!WJSAWrS+{jchw&rhNJgVl7Lz@vr5 zPT}U)mq;y(ZSkUrwYo0w-c&u*nkHNY$FnfexkkPG$n7Y~`y)Mr5ZqJYQrR?zBEtDO zs~Kn7MZrwiv@Mq`syF;Xjj^VAY|T70(JSI%qkgSx`=^t=fb)6;CxOH_sXdDn=IzAP zY%|uFD4@UOD%)-PBZy5u#ANrcs|W|2fpv&grPIoqR8NK+>yNm%I)P)+C6h*?(#EcIo~ z2rhNQE)N<&`1J$&llS(St$SZx_Qr1%4KDZ8p-Nx0QW|`%q72Fq8_uY+bc}o-S5lQA z2BlD6Y6G#8=qfsYcW$RKXUgQ3tV6OTDTmeyxUC0**$h8c<8wOi zXFs-jc@mpHZEKAgyzoYR-=;9wj5$N0>W?H%Ov82`N;Zj}j3ETWNXN0H)gL1+BD)|O zGWJHf_yZKIPwC(Oz(tzK8}Stzyid54`1&lKYDS)q^a}Xyp`1%v0av{${RV1sWU;do zZ+So_-2cn>$hX|8_ZLN~IvK{)O<$E=aa1vt5NDGqf?Q^|UE-f8G`?#y313`pjV{T7 zG-mVLb2IyyJgls9j$v;{_*e8k)KfG2zO}9tvCq54v*5@bLeCc1xH&QRJ$wSksSx=x zKZCqio_O!Tnc0sm*vunRy?SHA+^VW6B=$6_)&*SEz0yr1`*V}_rWjLO=~on(6Zu|` zCX*DldCTZhulOL4kI@=_FE`iAGx=Va6>?McW2U!U%rP?bzpjQ3(ki76ZNP_$0hHU^tOGMFr8xZ$7L|3llSaG_I^rFTRrp$gBJ>sXqoNbE`iz$Q^>>=2bfLP~I4711O-vHCdld$K9l7 zFeI|q7$@oO;Ov~6k3;{6m2yt^jGY5yi_EQ`AYurj9-Y8Gry6xiKSqkaZ>5au4SdEW zdN+tlev_fLr>Cqgd*o%9RN35j$gUyxI*EU0Qv3THq2Bt%#k`D*6qrj4PNO_WSshAm zd~`5oVj#>T&zSsugZ5B^!oAL#eD7|bR#LuB3Z)r?+QY@rL26aXs{FD6HFy`-3402f zI%~5BehFf6Or|^w0;JE??RS-4IdF}4-o5Z00T9W=m3EWAy+EG_YS`c(3us1yK^&w# z$i;33Q^pEri}b+5j56(rbucxC^8IvK?SMliA!AvGcnYmzQqOYP>}j5vo^ zBIp70at3DedJAp{g=~BVVX>Q>SJ>*y|DXCJ+$>iggH3cU1UK+ClwHqXt2)lDWFi1T zU;g~7?fDKAFvM8{-_tV|QysCo!HN^&@ycowcU08Q0D*vTh$aufhY1NK1vqbEghjo&^1><-UG zAWbw^1w2l;r{FD(r+n~+h1FUz+I!(ZK%f$J%H94ri#0kU$N3|Cm8r-vspj(3nLzFU zgQR5dOYr9V<$uk^*Jnp46#6_bS?5y29bYnW%zxyFHl>>L`}PIagRk;d66d8@Y+g$- zH@hkJt~LAbh|iasf3X-g9*r=AzvAoW_)&U6?yXodSetv(b*umo{uwNe%wp}6Tu+?C zNBLAUb8LWtyVI)qQu3fleF>=J&$^pKejkFn?0+$mT4>Ieh}z%`NPF%s{RwyD&UfFf*#SGIUTPg$J&pa0?Zx<8WhM{A<-WxhG|zd!(J}-{-HrM9L9~%xylT zEn}q_20<0rShK+8i_825Vj;8p4J_bvl^vAIm+1C#UI79TD z_~7I6J1Chu@D_Q0$t!*x(kNfe2a(#DE`9gdMW=X$LlV-nWqUr{mr&erj-VQ7O%%QL zF&;zMm@Egu1%*$;!-aRz>^bSNkacYT@mvKGFxP*t9LTVdQWcFdXxzk z9g#)Rd1-x%OU0@jnt$`1ZevYoS7tr@{EOXo?%l8H?rj^O$R(@|*!u+@3?Pu@b$5LBm@IN0ZcnXgq=!Ds?e}N4>b( zWh3D$pKTi?9rs7os`7mL_H;Hmwu_@h>6nmE<;I&~kBYR^mB%B`)ry^qvU5_jt@IMR zmSZ_Pu|6etw1X{GIV5{nWgi%e{)2p%l>5N%o!RA@9K6xKtsE!nACSofa>_3XL1c8B zT*qFO_0iLj_}*lE%vip+;M0S*Fc{w-DtYgvtzLN`u_)1gX6rygoUq~aW5T2SxBb3b zmg8)qEP0L zjssAPKL@L$>0-h z{L1nD5hm|XhwigdJdT_9hLnpErJf}Se%RP9diQnM6B9pM54%1TVUdOIfYz$T;lz^V z{;A8DgWpGc=Unq{rIPE8WW8Oq%}gn*@~>J)oA)rcSc++7sDH?a;EPMp(Q+_Xx6DC> zI)O~2aySt8w*r&v8>F`%_3IvcmE-TB#9yN%x1Acxdb6r+3Z~dg?yrUD&+P9aTO&&3 z;GZ0c;qD!@kH&Px@>4=C&hP!5Jf#O0uX25yfR%ie=bM#5OGA-Y>e4*!a6b&$K(59I z5AzTg%NjwgqCR&PIOojGpZ~Nrd!%QmJi&bsChcH|6fkQMn;@tV^3PXH9IMU;*}7Ks&Cl?$^WZu3*oa{lQ)VWcXZ znqbsL_G$US-G2fs1K)OUrLf#cb%=f<948+VU#iylQme4|TS3jHQufGcTQ3sF73&1#N&MjJU(+YPQjE-2Zos*zC*!LnAuj1n8 zuMn4b!v-*GUrz*`2xm#p`2%DTlM z+K_S^LN3EhV}9@XPP_m8KhN*~Jpc3Lq3`XS@AH|2qI`}*Ei)S zL7P`Hc?(env(r)uBWPIINDJ(Ads8iWcKQPP<*rek@v2gvhpCG{r0kpKZzKlf@0xgU{Z|`T>NOP8Wqc`g{i(R8sQf68bFTXvI zvTwi#{UH6L!{?XHfvIUEkXoN4MuKc!uNnyHeY{Y$L!6jqZ1ggC7-0*6lq2wsBFxOd za^qg409`D=NMqh7dp9dBTt*z-Y5eiCT*y8@^sSD@aI%??i2wW~UEcg#)oYnx8Vqhy z&2{XG4h^UH#A<8t8gr#iEwQH_1+{3|Rb}?0s{J_a!KqipSNW%-Db| z2jT?^EW7IomXbU#w-{+mJ_)N~b-#INPn;G@;p5}x9+2(l6zx)>H~1e+nXEv2>-$D2 zOM1t$i6`k54C+I!K!t_AOrmT_`I6x6iO=*;FyexgfrOBd+#)Kio!mv+@Z}LBXbE`M zVL$3Zod_biz7z$0bi*@XaMQcweT#{Ey)zL2MWcC79q*+7Ofz$=HmUj7-0;}Cr|Wio&SD4D&~QULO#yGw9q7(o%rpe46jel~d^rQtkMIT=_m z*;tg-9Hvq1YS^aiwELo!0W?*&2%cXr}@GI4`AxRdtO8 z_&Hd+sYo}QjAEn5D^NV;9Y3B1VwXOX{0pp6TKHGP;wlcAHi!0nz7vnhq) z22rMbg1ymN$;}j-r|T}e9AkT1w{w%1*wd3PFY7&DgOk*<@Q6e7_piA}@zNIwvZR1_ zE)Ln-!H6Q<-lG<68^}YJc^v>Ct@vX{RG8XD^OZe?6Pk|oXTV?Kw-|6nKdj1PCs4oK z37UImWOgI_q{IFLDU-gr_cWe-Y$HWU-Z2VzFUEbgMO$|Y2H$5anf2=c1g-?+h}5f* z6kB>@0ZmHn-K=a|e)uOwg!SbLr5t~+;dRuLr&?@E`=K%ES^H~KA<{Kuiwn5^zUR)J zQ#}=uAqV&6-9A??-f}Z$Xx*5B>y-CYzb! zyqt%(%G`HJ{|cN#R3$jvdCcvImyFqZ(ct+e?QE@cTyQrH@la`S1qL%aPZSK9(le$> zx07}f7@m-E8;4~)2V+0BU{kFQR7*$_64~C*dbjO` zq|B(jN)taQGuMu%wTAXM&fWL>qhws!2)Uc3lW#JSAKM-Q_DjZ-Z;0mbF$OlIyk=gF zQu*}VUUP7Jkt#z!LM5mCpk;Kf)Y;vQdavK_Qtpqe#C??9cUoS#Lx$QUusrQceB{a_ zmlym=Lp(@Ka0S*2>`OkSY;UGz_NtQlu_#B0k%~AKOJ$vfZwW95G=6u+2=dLfL?W*=vSgB# zAFiPpU|h1hheVfH@o^9tzw4C~uJ2~=+PMTC$EGu|Lg*lWHOC!cOmWHaYlFbd#BeSz z=WW>;V9b$kj{N3#O&Dh`%t!a{nS;3gqTjiYlJp_rgdG#hR+ z1NY<;w-#@h0N-uB)^A}%NcKk00FHzt4>=r8HQnA%Cwk+ObUPWY4&8P;;+9jBqwTKE z7(E0I*JUO4HK{|o50ZFP{*{p7pF<~%yX)j3$qFhH7 z#0@h+IJrOpB!vo2{hH%|T|njMy_-qpWW!zzByZ+%05pFd=4w_{DxluR`k2g7XLthX zO>v=lKl1VSOCtC#K=SYN%j980=rEOYnVJPrnC@?i^#JJqXL&Th>0^+>+(W~r6Ejd( z%uln3Ie_PV{(K&yNz#8EBYV)y-ac)fnE_B}07xf#0FrP2OQ8U8hLSuf)GA=E(exQH zMo>Bm(A0Hwc4k7P=qQA>B9uHpY)ARyKqrQBL&8IVu1PHysy(y}wex}$`-yw$44d%j!!(N1W3F5J%sfMF*<`zuWd+qZ8o2ZFZO zLo@n>flx7@9v9GBuqjspJ8T$X0LbmtNST=pY{hemh9ITSN5;p^$mIJHTm*wp3iboE zxLu6*NUQA603`>X89}GDzYK^14LdNJ{{?~*OrJ&=;0rx~Klc&vIeCz{0P&sxC6U4< zogPg9RhK+|e1s01+nFd*80BGrz+9lVt6Y^-A0;(NQ&e;T7`}^abG(u%$P9AJk+8wgvT$^iL*Uoo1`O95+s33) zfwt&4q}6C#^o~4qz%VwJm- z=r`b?K)IR-{lQijRmOkSAF%NAxBht6Q&?Xr3#8nrsBGP0266zU(7sCQdI_2+pUGPiu}3#QusM z4fe?N`ce7t{Q4h-S1sJL=sq|lRKBNADlJA$%K2a09v*|Xg5dSTUMAOFL)rnAep=KS zTFz`_n^5n`d^*}h!t?-~TQ3VCB2lfvhh8KTB#JzoXrs%85AH9{N9M;$zs4YkDb$1g zi6v}$UcUQHjU2J=XM%0Rj?LP(t+a&4(LkYtGSoX? z7g~k=q9~sVxV!xZtzu@DPID`ofbZ(z@x33#F*5>HUeTpZW7&@PUMJsEF*L^_S%B_igG)ur^XG?Z6~zr0K=}E%^j@ z*QduyKI9gR6xL_T)D@&FX7|6$bYxjX2Np4~LE68uw{Cg6d!frA2#|iopgG_Nk6!B; zwAJ<4F)~qpZ4iBi>J7WXzRP5+|GdE1-dh@X{;5I)@yFk2Yj{`(q?_G|I$HGWND+iD zl}^mM+G0m>M}`|4q(R_RCct38Ck_Z(97%M)cg`(uOW(vs`)K8caPEfGP|X^z7Ky7< z*fpm^^1h)(a@{}lHb}pG2ywt}%2y{C#aPGe-+6oOVYhV@x8CEjy=7ibv^0ZsUS%?6 zOn0qTz?l!2uvLp@lBz-%kHj6D3uD>Ylje{3(lR3JPK;suYTzL>mbTUo#qQH}Yk8I} ztrT2H`emvpb^-uJP_CV|$rei$H-VR0R;hnT*X(5A3gT_6MM;ay@4C5`7Gu5&{s(VV z9apzuV}rOGKXfa*_x@=`H;A=F4}f>1F7t~rSnZr~wTTvS`)!1hiN_{%e1(#$oPMoG z(!@QAp?0mpx03U)uiGkIamN`~6xJ#y4Uep1TYh-Nudb7htgio1g>D0Os9X2qY*&%p zq*!LYPi)e|o;+T5Gg2m8*jxP}g?Jrr@`i%+GMkb4gRA`Im*FMmv5&fcTb%bA#!n61 z>bWGYO}89_=y@!rBx#+!;Uu=^zJ5pM7Md@aF|Rtd-B*X4Q%6}D@TYqp%NncJL;dHm zP%DGYhi5XjiB@dGj^RQTXJd)FpXwp_*Q5Zeu+tB{w?8YoPrSH}BEJTLg*Xy7 z`d=w*#>C*Nov~?tA?=`eNa_jB4Yl#uyBij6oulOhVmF?)j$bA%=DzKcy;WUm#@6U4 zwGCBYyYhYYvvZ0T3GSj^RQ`bnduZQ%D-|U#YS}$tFt$byO$0%;u8yPS>bdWvrM)_a z+|?`>Z)Xjzwhq+$+TXjfp1+hOR*2JOCX2Ui zvduQVQY=T?4j3G6GN%bqs+EH5_fJr#6q=YV|EAp#-?cTuP@vN~ouq!ptsQ2BI0YX) zOCP5*K4gNU7a4xx)K%5hwyVOw-Dc`)1l3&x4Gm>gRf4K2Q)Tu4zQNto$;H|4|GuHw SySNy&OkeN#p@#=fhx`W}SdSS1 literal 0 HcmV?d00001 diff --git a/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-Azure-SingleRegion.png b/content/terraform-enterprise/v000011-1/img/docs/RA-TFE-SA-Azure-SingleRegion.png new file mode 100644 index 0000000000000000000000000000000000000000..2a78d156580b9015daa5f51d5c2eab9e1106a84c GIT binary patch literal 76041 zcmeFZc|4Wx_cwZLB$X*48H%XPQD&PGc7)6`C4@51(^ixUsV%ceWS)mi84JlgXPz?4 zEHlr#cc0&RJ?HuJ{BzD9XMcz6d*8!#uWMavz1Ldrb-hwnls$Fg+zA9hPGRMwRS@I| z4ndBR5FdjhTkKi0@Xrx5sk>4Lk`qL_d;chWXEv5oxr-ofYzX4*iy+%@$a@+=9C;CB z)(AmF!V!eVCc5OF82oVTfxN6Va)AElV_8x#93ioh)3!$t+9>pYL|8|k_i*sI1NQFi z;}b;3sZU%!&?krAy%DUml$uN5{21gUgAeO~CJKMhZ${>g@t}(_VX}BNa zi-EN>bF)fGN{Wc6?s7+xQqNpgMJD{KDhR)D(Js*;NP>ct)YIPE+0kFWiskvkFt42) zg-5{0+lOMG@CPD9`~TpOcLM1#A5$74xJB%b8>R41r7*E4{FCk%iVo}wu^0N~6{@}p zbXD+7Z%6cj-d8Sc!bRCPs+kak*Zc^ai*(m{w;+g7HL)k2MJmnsR>ilgjFd@fxH~^M52Zx#o6R;x@b?wl zCrNCM92Q@yJlvOO7SwwiY@3`g`j+Hj47z*K7@UFO-mIp&y836P{UyKc55rp@UiL6~ zZQd8(-yGj=b}o-^iV~d5sbf?%G5OqE^XBFpT>F-jFwJbD$1w0r=ONdmzW)C8Q9q{C zq9P%Sb6GuU)?TYo=V)nLeaIw|xpcowk5s|5h%c;=BSeUIO75hbA54v!(@8JZ8ClHs zyVDFJ38jnWqNYn!3zmjEk%@Ps5(S4nRQ*mfTq~Wn?RC@#(a$mO!W>b|pT8lt^*b1! z(BkzsZ(LFL-o3c%mfdprA=fE}Jbwu`(JU&EpalAkM%nH^mX_<7miya2b|;#3 z2Hu9&xo>F5AilI`cWbqY+wEp__8V9t+XStx^F47eirGERWmvA)BC(UMqoY$B{TH6E z$xGY$nwlfuZsJa!e++L@ItR#50+nGUA1tPn!BXeB@gPihL61RNo>@z6^g@@WVHa*& z=>SVjO^r_6%F0S3w+KAx=ffye7Dn7j1*}&%I69QPR;c#cnD*Xvr)$THE)?B@6|7-k z5K~f8vbH^!H5XQ~`?)(qHwm{tg@aS_8o5_|kNQXz>v8A#!^=H>2KwrKax#B}{r3j$ zV8d}Pqj2_bzjaT1ki@xV9Yw`A`@1a%dSv2jZ|&^uo498aD9{;{CcLlgRZh;%p)z;J zwds4;1qIV8DhzMmzOD1+am3ZDR~xw*VYq$du)5yHMfc6J>uG3&W|sZc(Rcq-U`li8 z(xW|C8I)3+@c-x0OJT0tm&fa_^YVVIuD+RJP^NSJ`gK#9Q?P8GppNHuFj@!f8G2IZ&~2Ao@O{xOK;uzjSQ0xACfYRsHpDn{@=n&Sj_%% zP?JG4)_$x6j6ywOA|7+lo}8`ND?CX2^y%W>k{>2|&BLmE%T#>%J5^r=u7ctS=#0=& z)G}vh;C2de9UNI-KglwAsyRA3sz&xO?N%{Of9bdCz-{py+-6sb5pZti$;LB5XdliCIbnMX;_PJe$z_1`)FR*QH2 z=H__NB`m7OUTg78m!6b^iHk$E)BpgScfti&=*)+OY&pXvnVGQ`*4CQt?(TOcpU74j z@tO~gz$yIyp4M0HS$aoaUX}8(x`sw%nG1{ndka35#^NxN_%lyA{2+s{_fp?f`zjX8vQJ%l?6$Sey z5uTfaLmpIL#CFWr&E37Lzuyw@!X-gLP13WRyrs0Tq;C~Ht1@bxzX{iL@~tXkgoKg_ z*yCvE*s_b7o*rjdLr8lIb{!_h+Y^=jh>ZrOQ@6}xSxa0m$88G~V4D|}@o8D&x2{@K zaLe@Iyv?g2jsipf^k?-rOuk^!$OmXE%BsKaRW(Leo#N-7UG$L)$chlj1d zI`!x~r+oY<2~)k@gWJN;jou(NJz+49v(sWoJ(!9Am4yMRLZ|18z$N( z8p68T+Ad&qD!j^4)6zf?4%=(ydw&Zn)LmVR(d(Z*J2dVIFQYH*|H)=_v}Fo&;5zQP zx3{;w)q=}}p-iv$81~RqY~IeJf$28VBN%b!q=NkjKI0e5n}rp787SZY7t+<)`Tdj& z8w(GQ57X1qRyGiMP+5;V+FOfGT3$iEWe#f3#^AF2tKi5x1oaef-*ph*}1vE zjc5r^H4g`drT(*!*Bt{bIY@85tR-nn9m?7{EiE^~ybjFn`l7*a_?ZqXB;F z96kN|?rKX~W~Soj&!63Fanq z^oL4CRh0#F&paWd1?Cq;&yEfbkHCRYbYyDf+;nwyrD*ve=BfgIDqy?uN&lA`E`svJ z@AOz^l_kP^Md{xLA&uJ|&Dc~0)sYkBh^2IJaF~WE*e2Bn zI(+OxV~WcJ(=(D^*@s3cl@AH#4IclW3pvaspYHDn9)ryvRRU?|huMtXByimc^g8nA z*;OK1G@z)d=-QN2@I5_g43psfkbs(PDI~)EO5n2koBuZtW2BHTiN(yG2i2lNB}hwi zUwT`)2drr?;WjskFR28HfZnD^qSsN%2)z^OTkYq+Xv^#7 z{o80jdHIXXG@Rf56b-wK+UF?^()Ef}V0HycX({GaoZN@=^Y_f)u<-QX=f17!Ob9Qd=y{H3RUc<29E$Z4!-xQC1k5UPa!drQF&KMoMGD41QJ&|~|9 z55F#nl8^nS0KcPM`vQ}{Mub$Bvr%;y>2Z(4t7ccUI*Ql*T{h9%yoJsY=!iWpckAZ0 zi@O(=z*m6uw}_uTuz$RHYXpA2DIzM`#0@Awj{n(5C1LK}3vfRqo(`W7I>O); zK=WK*8K{Z~AEEOPzQx?{i;1B0c=*!}MhVfqdHS3R`!SZ~&|z$Y#nw_?%KewBVGx@G zhR|EiH2HAmeSm=mJ7?6TZ%j!?Srl~{(VviNVc|27Ecs%1y5Tv-iR{k20bvjb{?hKb z-e#iLgStf8+`Dv7Y;2V4f|vwR5K~EnMhp-(*3UnHJ4D%)4pQKFbn@l+O&fVjwZ?N5 zHmTBT8jmx1e2m>+OUh3K!C`aUH>|+>{foXHJIuveW){on7Ft~|)iTbN-lXCgaNU{+ zyMzVPp#!;=-Wmw>Zvc$nyMuRF@6xoKY>Y6afrTt2>F!?2tylDMW5_*d$xO_+VAkBy zGMII*ifQ+$X-mu#r+WaM?(S_I>-bJH^rIm3rJaVfiQaU)7Uny)xX!vEF%-G3q)VFk$6?kcPEjfq1Oh6SHW zHLdF#a=M$wU1)X{K5}O{z8t#aUdZ$BYl6~GIGN4h-?x;9pE+4gP%R;R|M5_x{H;ngZ%vb*4H|e=01lRybe!HPL?}$>J$Kjp0BQ}0aKzP zB5O_7UaELPS+UaWlo9wp+@pa#e5B7H)=YR1zIy=vWXd1MMZwyc^yFsdBz}A5k zg>Uy%Rf7}WajS0(<8abN{4ha)XJ>YX56W3na&qpW*tF3VEM_aQvrLO62pxqx25vK# z#Me7j;g!14R95oJ9hQv1@}0rOS?m2t>#<{ZHQuKqm#qr3jCke#Eda@5CkpakeJ&_a zr{OUO*rv(F9e9l|zc@wz-~|^v2}$J@S0-vwDZQGbDf8Tz-7mK_wK1}z6TT74CjPhDx6^c~NSOFe)7oPz7^O;qtA>iHn* ztOz>HckAQm=>0z+pGH?$#lP4Llh~i*@J(}yzs9lv0<$R_4 zB`vGG&*iK0;!t>pfS@3K(6?`&+bk?C3rrf$VvU2$e@j!0l4bmJK|d7G$)$)nFJvRR z2um|zvZJ;2BV=f>1hF10WA^(={-+mtw^0{KuzXF|$%UGCRK-$5Oo%*CRkZw@s)>sv0Z*R|1 zV#xpl26cEToaMeyY}TmT>bF~Wu*tMegIlJ-TJHs?_va>!@ehph%U%D^q^EO0l7LKX z$vfd)<~_)zZ6-{j%gJ-meb~R~mS%eP zkyt}UPCtAK;ca=i@P-JXHB7C$LBxCAytJRjh+PkG34*+mpV;EBqMWz7c$h!QV*d&W zuE^#^NVYiooWIxGR$Z$vYQ5_vQf~jo#GU_6@v${}QS~LaKuI}Yg$KP>hH(;G9v7r4 zQUAu=TU*jRB623h$aF3?;RU9?L~iNL z**sgf;_Mil1^-iIyPYDB}?+xx^(S^Y&4)@m(RBIRb2HyiNXIxV>%LOl6d8 z)SExYfN*Cw6<6oW50A+^>^yTN_CT+$WPEhWx85#ly{gLS?MRh$Ct(_X(eyYp<5L~! zBD1b=;eJUr-5NyS#oNC1(#cohHVsVGhutqyL(GIAQ)7`WdiBXWYG3xT?hQ;gYS%uM ztNL#rMchZf(<13Up;uF+$2W>JCwV)3%CRRY z#Iuwqa79aB7}>L^*m*Oa4 zx!E~`I#}~ULQU#+FPwQf=__JeeGR>~a@vx<)Q{caxV!{M*G$o9iyBXN@vm5s(w?}% z1~T-Faod|5=SqBp!!GIWlb`kY`Nr{n-8EFElDWUciE~x_sY|0Q^w})+6F7G-09ad| zyH?!>c1# z%F4>N3voMwTOLpXB1OEPpcWN?wkZuftO3kP>ts{ZrCyfo>R)3oFs22+f2^HleZ_s? zzF1~<1k=^kWl96m&`nNF#rMozM?(ND4M_6VLj%M41M-hD?s8x)E;d+puG z9N-Ro0$P@tn3yo7fp}cEX!Hd=0f|GZJ3C*$)F}lLJ`hp#06w{-%~JV8tv=b^IrT(n z^G2^eFKzT%Zc8}dxA`$t9LV|KvuRnOtm_*avSOGJOU-Z&)6H)`6_{qvp})fFuTzZf zbqvLaV&npPIhfFc-t{AHH_8%qh5=Vkuhgs%OigsqoX*b66F4o`6j_GDP>X`JP3`#D z*n>R(!-#jhjc1e)|J-XUL-SfxGOI3VyaKlxxA|b{8A^=1W^$|k{RCktJv^J~oWYec zO2#27F-y?-k%xL4iQQ_mJ(OIy=r=s*7!YPEn?2DRd9&;nclqMU6^D7F%Lxk%@f{cW z<%aKG@e8336d|bZ!;6`I88!JB=8S2p3&%`-jqlPtT~i#Hw-e*I)y_Bay&LrOZa#zjZMA;pa(C?BCHk`*m* z0`PtvITktJspM829(FvDUkLWs9ClkfOS`xb+RQdkfosm`v;=R2ioMpKnhJ zRtQ_UqOO0u?3K&dD|Us93M1ajVGSl0bk{<_BoN<8e6fwrm-m|Gqer}qf`Wo|(WX6_ z`nBVZbKSSU{{3T((*-|d%5#kK!Brm#rM0qNs>pMEpZNm_WoQJk7Z4CY^I-S{fF`rL z!`m9)=K%6`7TZs;V$(FUG_0(wzRwK~4sORDtm0(KtT`cH*al^+@$!ABNJ;N9SeOWa z-+VIkwRiri|5#@?Mx#Q5eK+FbKR^59Bmf{CfL#F2J3BiQo<4p0(t8Thq=Jmrzp^h( zilLx=z`kXsS#(ihn%^3fHeA2vCKS4;mYpx}LS-w!t?6p?IYhe`Y>kN>v(!I;8esx{ zwsst3(fX`=AMGZ zRXaWvi!-1Xw0bXa?U?c--syhp3h_yICYKSSc#~!_+~zIRiS5f2n0j{-53x|EiEQ4$2(#AY0NFaCu@P$9^YIRohx?q0U$%PafJ*FN*m1>MT<2H9P#J@T3z>M6Lb zFkA|NzC0RZJ-t|wZwb2l3Z{p%cVvR!tn`;b6&hV;on2kG#d`o9Lb14$m>!6_3-t2;}G#{}&MxJAXSRI1MWX&)O8h&u&Wk0gtCdp+Ek?=_8(y)tz0L zXqf%;M;(iO#iu_lPDSlzc=zsIm9UU*Op5Lc2TnmQ9OpAMZ41uobAGKQ1{C-JCGk^D$&&YAb>MvlrMozwp?y+qPa9~Dq!?4dWDdlf}-=q$wEk`SP#B_@T zZ%Hkf3vLcead`GT+M+s~;bo-$7)2T3sV-CRHAS5%zU%1t6d1Xl@oMMqN1WH$PoTZoXsh(z^y|h@g)NT;by0}@%RD2E6e2WJhnVEv z1T6eDS=Ye$l1+Z>y#m)5or;d?kLt=Q&R`2^kZxcap;8<`ixY^Vq&%~c1t;~s(8O4j z2IjAnIBHe@N)bQA1hg2RxQmQEOmgA4zE6){>>Vg#t;1p@%J>i$2~xdEu=%d3!hy3uK238+D2wJIM~p ze3F32q;s^{U*}Gi1&9?I@{OJ&tm)3RYr9x#?!=5M!9DV9JisZCWTTz);GyDqN%Az^ z|7|T)md;i`ce685@ic9R+6ThSx7 zA_)fRtJoxiPAV-e`P6Q|ke)pCpP{y+LF%?rvF8=jWRtj1h?HJm|CBt#8(()->KNOb zC3cb`$--mo>BreQQHey~Un@=-d%b07eE;L* z=v0PNnM)FNYp3@0uQ?XQ>CZwjY~$59i`vu*s5qWFeL7PAJ4qNlOs_<2i;D*oq)Xk@-{V&wYusve*?lpp-*0~vt|j#x^4!penoFd<0^)tt!O@W}XyZ@6 z8JcK3`z|Uf?UH=xqlJNDV0?^|Gk!L#{T}Tr(9Abf^3`Va5Fu~p&3EeL$?2uhZ!0@{ zrZh*f)s8ri{N0FWDOOs+o;Wt^)>oYF5MHvHk5)g2ECGM%4+IH@2hLg_{I$M>MN>Sz zHAIM3Wozr(zYBwDPoEN@l~l;U2!l(WpP`_q12abm+ z4OEF?%qC`LX$c9eW5Su((TDlFPbYGyP$2X6^uVc;iY5`En3RV#OWxduoCGXmIVQr& zr;*Oi5n6v@qUGfhJN10IR4rbc}|aKO59^8ql0*<#rJ_9h2ijvMZ#x zXI0GfL~PIhpttu{xA8p0ZsXAqtLAa9X>-Nw=V^A;P&5JS?P>D?FQQm%S}0QIhtc>Z zL(7DgeUQr3B7;{!B{@KCqW|H`qr%3?0!I<|@sguXw>SBvRJU^T;$H^3q3hO&Mz7*~ zZ9#5{ppf?#2)2q{Bn!AjT|Hh<6ZzzM_!Kr5bt0|yh%#QSqe!ySyr?;ct-B#97x>i9c61VV-uD>b9_W&RSxU^_3l(q9t7DI}Ionz!qi<_83tT&ggFS%DJunJFfg88qa-a?F2A?1w z#ytbsMtnksZeeY-=JYzCm)m7#`G=36o=!=MX`k&%3;cM=gArw-ka;Z~hEV=?8PCJ< z+CYj$x&~lXQAKippI?%_h(ua2DC3}>NzQm!_tTp znm-gB-cpoC1gOy*$8u3|u{KZH8b0A2uNkCIRAb{pEWz9EA4$F&8Tq zQZG7XZjRsWVIZoIUl&bsNkIqDY@ z6~%!q8Gj?X1|*r(+*}ojSe`4fg{DoBFYC6pwrZyqd-G%=7o^nb4&+ZGhs8VJA?rg= zeepRx1FJZsTSaU}yd_p6TC_fWR$^mrv^ysI0;6$4DP1j8L2F+j%Nm|3q-kZ931L$b z@Jdr)>^xtWo>`UtxiK+0nVOxgjN5R=g?-6=+?Ri4!BRkVy++MUz%2X2f5TcK}{mYGx+4#n%rh#HTtr15eJM zKd1Q!rh-p*j#E4Ld-x>K54&%XiJvKy*ZcvMSVsFu7a!SvlDNY+)3dqA_XB*8Z;TD2 z@7++nsLeHPItO|=4dgt*XQ8d$Es)Jcxjh;gIw9}LFAo_tfPBs|GQQak0LX3*s_VAa zCfhYQm?6vPDm}bADOk4~(0VQ4tfjYwXm0iGiowutR~${R`(oro2oRgu5oki|8P=Zi zsAdD;Pt!DTt(iXY7jP2_k4S=w`9qh8VtEY9)01M{?zGGK$2WxW)SX{7gZ!|F-S3wu z9TyZ<{9t$0*h>b@Vj9y46Wu?S?!CnR{C~=_l5E0gt~?f#rJkmd0`i8{(ODZv@3=g6 zJ3gcdh*epDTrIZOW@>ldoEN5~CMINs^;A?S*R@9vOUSbn`Wyh4A_Fq2kf7!@-DJT+ z7Q4b$GqV+GTMiH$;h*J|b_4usH`!umi1WOSRpkeAk=Qsnfs_k7Pv zU9;g;(J=ABi9&aMRE?<|cm5R4?QINeg55`}2{0l(=b4h1|Bm*I*3TlU%b z7OIO1oZnokA0m&cmM0jV+{u>YSmezc(Qs904^E#bwBV}o8he@KSu9>a<#nT)i|htqv^fBP0{uI}#CFJCnJ3$4Qv_zp+IkwKtUqCs$gEpF^?1=xw?r!jRZ zIy$NBF)kMu=Crl7x4R3=ug7f!n1C$;PNM9c*${+S5vuMKN9c{?(R{V{qgP-0BIeg3 zUKp7^?hNv@E#y%ki6hkA6i)WslM}3FQaCqQ25zTyXowqo^~x2#(#r@!KO%Bm@ptkP zdxRk)2aX~`??xy!Vs!n>K!=yJSaOn>|(T6YyRy(}! zee=&5(G^W%6(jx>1t>~y9+rP_991Sn(vEx|Slp)Q-wzMz98_K*#yw`Eayt26`fL8_ z9F-8!C>a}Tm#BnOI(l0Ai#g_B3@9H0J}CWy`F_G6`u8>Jo?F@c)v>gRE1&IWpDg}r zLm%R-(GD^Nf4oi}+klh7eiIl>Jdup+-IHJ!&{#LF>6{Eg6{S`AQVkG>y5*CbmsjAvvG5XQjjb2Acs9>JIE*~zB)HOEtDzsj@{T80NH~j5R?7RZ zuq3pqw=h@g^yl^FPSE~z5X#_Cm5~e9>0In=`vWC*p%-=IZK>*MlrdgFf+7Gc<_TgP z`6cxX3p99?^W(v7HIUrZgi=go|>+XnvTwpq z%qH_Eh!6$+Z>slIMRBdleYyqZocLI=XzPKxrv7IzBmY>VN4Rhbl5#|djR?n44F0#1 z?$rA!AWm64ehefaARHa-Df}zh5PLH8HBXB6-HV{a-UYtTV*C1Z00Fejk7>!s%KDvV zl1T6F)<7w1CnZlIHz-aXo3JZZaL1KQl1z;SfHO~Mgu=Ff=e9$h|9v{N-(>Wg-z6;Y zj8OqIbES72J4Y9!0e{1~em!^k7Z^eOiw_sj@84_JDI29XgX5xe$8CSwp@%A^ZN+_o z-d;)h%N$*K*&>;`Mw+lvPdGh8f9JiC8D(^~n(5bBQAI@ZlZYpig%IyUv`+?6xWBXG zPl^0unj?qC51((IZiVYfA_Lo0>tv2sc-#{uRKKV zX-0PN5yW2G93$2?!u~KFnGWP1?#PNd(CrJYy0cD#LdMZZCfEbI3>?6twCyly@? zD*1He?e;Fs`kX56E&_?^^MpQ}fQCCnHEKSwZ`+8Jm2mzE?9xcaYo?eGLnT{ZL4*y^|wSiwVPpeEmA%`)VyUjM{xBR)ys{P~wI z`#nkfI(P@wbsV-Km(WU)neTBHO!UruA-YkeW7xm-qKBi2yjQi&apD?FELa9j#pxQd zeX+4(-OO#Aqhs$PEw0dE?}kOBvU8ReG050B;-{Br?~cct3$&zzu;?TeoKAQpUi@0B z$>~4@D(*yJiht6&;w@*g)UmkudUk=Dln4s7;ER}k9b&J748BI+RN}Qwx)UeA|M~Z$ z5Yvu<5cMco`x}O}#=B1DoevRC)Jn@wab zObA^w-pkKomEZEmgxE7FgI=CG{!FBU|07L{!;Ey25?Gy7OU%+vd){J0j1honCI zp?k}^XE3Nrf~$2QY8|mL{5jWnVh&0szX*!tZLX;ACOlj0Qq|IBQW2ll;AJ-8dc&ZE za(P3UIho_u)8v`IALhE5xVcnas|vQW=&8umYG)5Q6-_X$^`>S;=_G+&i>Cnmv{^$T zR|dT@QTj)O^sa792oAXzS9dT9?fAT`VDA_+%QqBomfjug#hkG(5odCm$xJf?n>ThU zZv3cZ)`xvXo$6RZjU;5H1xy^{jzhxXQ8LaapJ>>RsM@>+V9`2%5m8+MB6`obBEQf; zQs#aKMa$h-4Ux|yX8CP{WuF?z!__uf0*^>u>acYDywkBXwPF+n_BZucp3%TY-HG}k z@R5AO_Iv9+L0j9p)@9cx=YVjkQ19-Fn=HqD-5_$h&3rfsRZ>!2!0q7jo4AjiXX}#M z^5-cJZ*}O%HGO0{RQ(c39{)+QH$V7iyS+e3X?wM&`ATaHzy7)NZw3cB60Eu%s3#To z)u!2xW0LF#vt-4>Fd1TTD5_@u0D!2nn$crPN?lDYT>qqyoQRH`*OcgR8wz`T6ZQ4i z&H6mYlvrXc=R8GC5r;4K6@PEkSyLCfE+5=8-+wTuEKIroeQtqzr6%nTE4J+LlkNJd z>$XXynPX)6<=fU5WBjRi<=Urc_NRR3W>78?I8=7E!W^ArcYlY?q~y1UTac0sEv9b- z_27vSBQ9SIUFB8%xOA1%(CNr|wU>N#ON;1j%W&M#)6k+-w`HG-*1?8Y&HenxU1!}p zyQhLgpWL$wwJ@Cw{JQu(HZASoTTzFTo-p0A^Vbnse5j^Z)BM$=?avkrBn8qOsPpa! z8*vTHGC;-kehs-q!-ovfuzlmko|{Cbb6CGaF z1LzpZ9pEllFHhU(+ZP^fq2<^t-q;>~q|+Uc-xEjO!vQwwtj>NVpU@Um$|D8s0~hqR zgWMLTHRBEZdyaC(Xewb6UVjR?`h%;7#!}wFEKrlZbbEa)f;;1KRNQv&RxQ#3qH~-4 zvB;*^3~N3$LNHuE1XP)?ZKbaInt0=nwTa{23X~_jA4JHJe)RXeyIp0ux|TMMyNLa1 zSL#sE6OYlBkQG!rd#agfsLqmTZF$1j zxO^Dnaogux89u>h$}73{3$Bf+^Pu!6Y38Y@mQun{&Tq@Lw~-#i9;*7~BddF9^S%e@ z3@^MW46K1R?P#lVtKg)&`*8_C*RKygaT`Df-at)*Ec=;Vxm*vlz{U&hiV80oyo8S- z(z*TR?m!QV8G0IYrqibH=cAgDI;%N4Wa-M^QMv2YFgzn+DiZJNQuoh3)IRX_e_C1Y z2q5P`kwb{RyeVLPbp8zCfOUW{O99C7R}(Z&h+sv8I>4G}4VDdLJ`S1W33SO6z@-di z)(cd_MhSCaI$m-_QEGGCW**`;#cS4+=k^xb zac?oLG`Pr5^xzjH7QUW!u|B`*2>12Yw`F)q=v?v6P;1glbI&@sJJ7?UFZ{06gWJIB z_0BmoA8iA10pN$9^%dLdOS}1i+sa7EAXa^7%E)=mtV$?N=}s+_OuL_>OLu3 zlo1;iZA~;}IH0<2=*BlIegr)y1r67D)dj4NdpDjv;mwF!wWnyQ==s~?mh~t0de-zY zF0KPlh9^4*o$af-N1xrgx5|v>93ch=4SCFCfUpMU9}?-=a~s$I5ka3(d_N7P3@JV0 z9TIr`n6eo9khBpu(iDi1;YE!v5|N|t{o@Q_MwQtP+`{FM-)kf6!98&1%i3^sP`0V2 zLmw;pMl@GH)2zcgCXj{=cg^owI(~a*ZEoAUXra@6GS43%#oHU8M#5g6N09IfU=RA* zd6K`ZkbXGi}loICM(6FckxGiIRm=$w9`H(~Th z`m=xGIr{hiv_imN|3`cHh~$6?YhKPibYu&mQ}Xs2^uCzVRH>ki?_$kAe_ksU0t0>P zUq9f881$jF0;?_gn;+R6lpaiJ>g=E!@O@O2B@6}YPM9^|^jCczh8{V<&>_<1K7<8d<>wgvm$ovP5 zm7#mr%#1@+blc$@2@$!^Re06XkNpr@{$H;)qO4&R@n9ksN;VqYz%}7L{=a1*;4IZ& z1WW38AwsF-Mo1!deV(o{f9n)j%*osKn6Ezec%Gqpt4j8eHh*pU_d;2#G$YfmW|;69p>Tlw3S; zoY4PWY1erATI0S4y#B*~?H|nR5YIqV(_52$JK_)R?ysE2?83q!w+8U-2%C2(2%<7q zrEUG^)avIyd5J2F=%sNJK|Z~IXbhn45iRbn;r@629V-yz(Nq*g*2dqzvk_)7uiT)s z_&LPN>IMc@VjF0e@4XHn+vwx=)=>gAbY;Pl(dy6Sr0F2Ei~_~)m3Ai6!Db!)jD6&n zFE^l(=p5=S_uK(KPaMRobs6J3ixn8^G&;n{ z7#L%ralB~v;M)uM-oRN%67nN|F+!yKqWRyHy! z%5l2&0;~k-_m|F~4GqAlf=8?M7~;z8?CdUvCgtUI5T{hfwlp_)x3(&)X}@6*H9dlf z>%I%mLYsDhcfuOml7w$7)7dI@S zM+`4h;^MjNZ>XlO9&+NuiTnpOC!pI)zczn4bZhuvZ$CqL%+1!h5O7A z5MD@FSXz0x0e%hT+oTLZ&um~FG$6iq6K7|a1!@e13GuR9nG8n)x>>`CBZmUUVO}W- z7N4@ayW7-P5Z%F`{|}?!`5E9{SX*ZSCv9yt_F%x}04Pf=iF5Pw0*RiZ&uId>1wkN# z2|v#bJ!9ASMX8kB)db~;OIWaoZw0QMzUSi2e-CVD?YN76;Y}Yk&{${*9^V3PnCB>| zA@8L9Naa&(7+9`{jD&eQeAj7dO4wbj;7qB z`DhzxY6O;TZ0EHXg|wh}cORukFWIC)11hlce%9CX=?r>6pL;N)gD~{&yPQvpVMQD2 zZZHOwACBmm>q2wjKz9cndmoD7?E=(t32R-p9@=}G2x0a9mkwCmp!eZ*c5wK9((%D_ zmbgp>ya3ECs&;i~3iDE^zU{G{)bXz{T@zrwKZ91i zT+qm=PQK-Lx+YrbA{5+e(~~5bjT}@-v+``9ZrFu74=@MUZ`@E!u>y-oNRKezx|_eQ zv>7fD|Lqm<=%L$?c2utD#fuldlNDBjCE;(RKtawnzBS5`pEQNCSVcN&e#$1n>X>&V z`qrL-wcDCeIAmc}0}!E~upJE@_q%QkEU!LDowC;aiF9n>Dolo5B=7>pwI_|YmwglI zvkF?F>(T-2IJ-brTj9H`)YNuhzO%%(u)}|Y>ZquX4cawu@eR|fXlR%=Vgv=92PRJ9 zxIB8nopfjFr$MtoT2_{lr>7?vme;QGJHY<71mpR$x%thxkz(lYgwlypGH|dZO$jaL zFgQfldulEG15u?)Nd3V403M9N)OLDmBuH&TGzXn^}Ir&TOdv((Ag~O zVbD8Benh`Qd03M8BFCcJIR@Y+)!J6TH6xY2D2haPwBaQpbaEfliO?dQ11YmY{0#6+ za>VFVI-L36mMkZ#e2SC7XTMcIyO|_kEN^*$#Zxgb7z%e@Ix$F;URbCJH2{3V*w`4~ zA}`uj-qT~YEAH0UmgNWFgxx_fOSxAz3L2va7B(x)VLjJ!scz1VcVW}*zPq((InHnF zbPW$P6>@Ti$rFk*csxFNqb}{64G?K5VyU>>OyGT*(d@b8i(c3>0$fEG5Yk{x6?LHf zx4?s3+47)haTjAmEy~-Txj?rTkZb|;=Z-IC!Il*iQn#Q45aT)-Q50JYg#^BaHQ2)< zxwu$((h^;Jz*A(RevJ0vLaTT2@&>ea*Cglq{S+9Ql4luhXu<8<#~Xll7CfkV9X_$< zRt7yy^3uGHlZ|v}4?Nys*mHxfWoOUp1KKusVV#Q0NBB9uq()?L~*a(&2XHO z8tghDEz|)fNs^h|z7N(UbWj)#xc&tc#B{LCQ~>qOEsye-+g9f0Z9HDfq##d))UWXP zHWL6>tq+#o4Y~@! zu{qOmJwg4BclF#l^iSVH$s6sT<&C|XOC09{LfPR=v?`6x=D0rn*vx>j@T+VP zqq??sZ#dU$bdw@1i&PU(ag%{!`SXuc!_=xdY$0F)ZiC8TYkUcUfta{Oi^Z-8No8Vw1Ih!H<5<|*UyHA38zwE0)1XtvCA;5FldKp zANq-C7fFxOfDD4Q~wJV|D`etv}(tJz5UH)7YGS= zE%rf{z?24P;0_Zgzb!!i+HAPolVbezbKp&08>+A!mjNqIH~3wQF$mV3n!bJpu!a>< z8{=V5pn*r~4zryp35`?{W)nX{bO5*a*1$r3iQ;1Bo0nT*4EK!3(Kg*Jn0iz>0kwj+ zmoc&j=utnuESygPmIY?jHpmMMM%UFh^@ zMSJLLcg738)5$;j`Vn;N#~-J(^z_C@x2Y^WSilJm?+p%L|G8RC$|HT3it$UJV_j~& zg_Tveagcao9izL#!4lcQ$I#HT~EhX{tVyc6|g~67UoopnE{`{6rl0m@&&_1+1EK-E+73HIpiKeI&CM@+ z0QO`-U;?{4(E5l6on71lGbAf6Xj~g$8}=Et&6w-SQo{Z^vJ>$$$0B{hF8UB*uPbj` zh3l0$4~m5@)M){kB(Tn`Ir`PPWFe2}*!K4Jm$o*nHD9USFAkum+x=F(^~w;gKSfV(yEzli$oc&ytu?As`%Qc04Gib9fE**pyq5z5RcdnB9e zN>9rsE2APKvbT&BLXo|)va%_A^&a1z-}}Cw&-2fdoBO`M*L9uOc^>C+9Os;~JuY{d z_o1KPb)}@F_*xlY1FFc&%U>gHSJ>PImA8L)Z#3AILY1%K@7ce<#3FZ-_ z(=Kh~K-Zj-A#XGJKIcogV}U*t*L_{~XWqisuV2xHyap>a;@{WT-LNtjzU!pEe0lh_ z+gwpvWl9+~$rv&kHMAgcb6rzcKl|$T){)Pj4E9%ZL8yg_*)Q}7$Cnxb-5#5!+n%qq zJ^UTPGn)w2wrT{NoP^DY;QW(t9r+}L2vpTyi^3#SsOdU)+te2X83Zo-$&Sp&^b)9e zpF|?{>|)?H6)@Vph5gmN8154%ZaG%E;4k`Wf4l=G`Ii+nTp1_TQ@cMYy*P6Pzr%0E zCIy3(pt@ldgt{2_#m=O|mgu^V&&-@H^6;HjLH^`ZochoeT2F&ErT5z92k7Wbr@C?p zBd5igK0?dJ(c-c#xiZt-R#=ft`Ui@AVRDZ8v1*MAi>L7pHiarCEVmsmNgN` zA!=YN-N)j83Ct!Tt-TKmdZv?B7oEky20IhV-6FxG%j_2l%|?jGckskonwyc|CGO); zOe!t)_H&c|lTTd5dY7+Bp_3Nh@zHY~nnom>T z&G6K%MX{AaE4JH@FqEW;)Ho(+^pr>WObH7bHl2yCAznb>kqJL28IMF6im4yZA;0D7 zaE9Yfu`Cn5l_N^P!&AafWR6zk?^Dc({_y0;p6&!Y5i_xi=GIZ<`k?8On(haiDs18C zsQ=-;=ke6Hh{^X?DsC_(k~BbY@d_DWXG|{No@eKsE+sa}+tC|UL(|PN`4Fd?8=pMj zTGR!$XyFfzG$~vEu~e@&d~>s(FJ|uYQzfCtPNCl<{N&&LbKEJvKWY1`c2Z^DHl*>pp20}`7~UfK z6~cl4>dbPdWM}H~)8hve_(2o8xYB=rU}L-M@5|ZnuPQJHDlfpxRjqAz2_L9FAxwrx zkql##!^ah04;cF7lY}Youf$2MAs!GpN7HAa^;+tV-PI=ygY@}6^HZ0HpkCs$7Lec{ zOM<@oGqZ1#cd$h{i?G@ig|`zHZ-1MVy+RADYp>#Gs{{)#fv|L zx99^<^V%6A#}OQnlbTGMP9r$r9gM#y9+C5>KHlic7C+U9%v4eW{L()2DN25@|CObw zoVw~bUc)g+Mm9D)v{4uw_SGD32VOt^(m+n|l|&wYRpFHjFZ9&!wb*r)_L$WTQet@x zPvG-V2oDT3Z?6kTmPr>Yjt%)WaUy_Gv7P7hxa!o!Y&SkpSmnIldzRtf1o5(S~+$Fk*(ahDumDV6=~o-nQ^1PdbS zf}>R)dW$&)2%w9L3vRy?u?;4Ud-qnO#Dy>iICxcHbo4tByOE^$c<+TRhQfsRN5Bo} z?yY78VVM9=9CTRZY(ZW`VQp?|`WdETc>-;j;{Y*m-ydJjERfn9lxkyz6PM5|dLqH3~pBbv*s7Smsx^kcTQNkbr0$c&_ z4mq%Th0>{L`Fb-UK)DhG@3B<8?(@`0{$+05c!I^-7|w%qOIQaWvLL*nNQls3Cmly8 zk?Ck4Kh^5m+A+D`BVScLJW4w+%8Am=!-vLN;$_f zhB(;yr;{}CxeLkoJSeEhb(2wOg6GSW=(V#_iOY+EuY+CRZ*uZy-_>PF^2Vz1ku8UF zW%3sXinkdaM_zxX>cgRoZch#N>r3F*z90oFPY{mSn(9BpCBWQAR^GMjM;`HD zmMY^2O^cWNtoy};TisNX_hwE697LplF+keYvAa*(kTLIWx$bg3d3|-bl$Woy{?^H7 zV)u@yTBp|T{10D|4zh_NkMhN%y<#n}tAn-AK$y8(SpSaOBeGG%2um*t{(dI6*nw-7 z-ClyTI$L42LzN*+Q||S9w&dSnIKkwZmET-eq^Ji2MT3D#x4dxKC^aO`Q$CKJfn7ZvVbupsNp^ooP0Kbog7>2q`-5xN0NV0Jpbm$t#B_mY2K9> z>!AhKEUJxD8n0TFggrDLwsx#&5R|>7QNn@m_V)t*AB9vb&WFv5z#X0dXI)@(ldvLK z{6PvWx1r8}w^8{8N6Cn-UvezkPsyn$D+i)1$pQLASRN2265DJ+wvX#w1MtZ3K?y&f zF8kw=eSqV*V(QKPj*@B%^Yck?SqRF3F9FfCArx(3)2<}V5OFq>EC!ad} zo&v6hi~~e&{r1OZ+h3Cdg-Y-%OZ-*j=A-~eTSt+TV%UzP|zguhNVOHgp?7f$QO&6QkCkXt+htgAtuar+%a zufN_Hxu9nsn_fGm`<~!5w=A#m{`tkb{pmdhVub-_gnRWUp+bMk*czcz53%Q#wE#`mnp|2l_a6kn0ERquPvAoQ0AP)R-r zn!q>V6jHnK>AL$i^X8V$md@=m(4#oaSj|<=!tk3)R$n+O2Fdycq*;~+=qQYFpJ^NdUFp%$<$KNEeYqy$>7}c0^X2RNlSe`fS^*58d>58l{;>P? zxhVKYj=$(zPlyjJri5kd)ZRf*C6qi@o5O$if~nj!zAfVrzP3^ZyA-7rzxGVX|Ce?W4JXw1 z40t292i4WxdWc*GgLo|PQtLlVDP{c@W*hD!g0X?@0Q=8O+sAH9nh?pfToaOL-{MuD z#Q1o_TB9Mu1F{Nl{jUR=t8)7D?;)$lVm)D{^T*#MVh42cd(3;Ha1`-8G;yzJ1Bs>t$K+r z!f%G8f7|WSy)QUE?3$u9ubGm_*7RdZ+_#D;_f%{`kcLzI)q0k4^3e>Bz^-m_eO@;c zvQZ$ZL60doNZA>G{(0S@Mhd^@zFQv!SGkO^DfwdM(t(Kkx0y3IN{hX+307A*mx_D& zkk`%*JwAqzy5X#;^_!kdDFG+{cXv@E4UT#iDkV*8odtDZ2kQ}*y#IAi^(mqn!0h1-sXiTV?m`4PH?2?VS`PjpCvg*hZxVoP+ckG+(cW#{^R$ z)J}ak!ya|tV1K`Y8!MR!UX*b7In_nQ1hUcWI!Ve!VM#gkGbAGBPpg=s)i zNEy^Hk~)9>{C|+Hw^TX%ocuN~Lw&vb*KVzydkgy%Ei}kMkd>uaWc%wnOH)M#BD@1r z3e2@6Dp>VtCuetT<7oDB@3Rw`vzGj#UWy3pl( z9Rsa|s^gjBJEX;`%vwn|$ygY=8I;mbFsQ+0)xX-nF_VmRv%rOP{IQ;7fTiAAS37)Q z--M_4K*_MzGb|*;v>`?URBo<4f2p^YXYXk2t3JU_*jnb@?xz2p3xJGmypZU%64uY1 zl`=%WFzIWh=XLR$x1`F!2#@5@E(%f}Cnsc;4AU0yl8U$xTX%Zf&|>~mn_HV>FR;>)jP?xrBdAMj}k z(AY9@PThH*rneqx&gzypaKW-YAb!`OGd?S#1O5`T?pprr9xJjP6USjM?7QdDFqZf2^dg65{NQapT#y(miSR6Dij1TN4@omL7Wmns*+%obR zjaDqk>zKa(%O+%4>=t&VBQDtiOxjDZRx{ONR(ve>wbik3`>cn0Z}yAjo$k z^0$UVv{vqo@b|3f85&b}LgS4LGLc{pA;7u`GpJw?9tLWi!fhpohRH?ydrqw>&#%V{_+XdSuIcuh%P zgiNN$IyEZ~XE_NimyaJmCWH<`X`~KEbs*qh(`eNS%=1(we!xBTy* zrXkRDkSO8-Jrd^MMJppOe6LcIf_x2Hmr+_libj+_5Bg@#7H|8vw^tXZfp8%QqlR>n z7z)4+mVsOl;8wIg)wwu0swatN|U98MJ@!Pw|1&!_BY!|};vBhzJ|MqQK z5^FA;-}ps7_*-1Hnn_O(dM17NW!khAD#5YbzIB-(58cf=Pe>%g*cGl(RisqkxBO`}hydpqZIS?E8o<*>p_d zVq^KcS2xBd$Dejs`J)jK(Moa1;ExHbqK3Mn##ZiPw?baC-?m&zR##%@(em=V*3s-S z_u9;XV(nHLnZmA~QZG7z!NZmJYoKMb@F+vs`|M>K7;ERin@Ma{M`NW$G-;_M-jsvFcIkN9=MRakHuKX!07QBeqdxt#r zHC?{=>}dBQaRw19f_Y<&svx=2hB{mvV9Uh>+xzu3?&k4Dx+YYsIY*uUshs9l^mq`Y z6|a}~$>Z(^JgzSjr&%_Cg%$f$tGh|UHC<0W%uNPTQ!X73h5BoXh9cXmuGys4@_l$I zevfRJit2~oM!<_HwSTPq?BD2ZsK3^8l8c-P-I_&S^n*3nZLgzo8 zAD?06i(#eNnUa%pE&KB2jzrBpC?^i0oUq=eSTTsvC|v2WW@Ke&3bd+eJdT&^SWDX~ zO{tZ*tEYV){XMokH`rC|q^D9_>3HVMI2FU8zP)zCG`o}d6la5{9BahfBdLGc(nhxD zFeO`8aSabEc$92?@DIF*EUfjf@{DTR51cFRyguaozpJ&pvB@DwP+fJ0xy+7v-VpNO z;@mWLhoyOR>HC(8vr`bM^%O663foYUTx;zr|J*yu$@TKn(#)yCVd^hUvf3}7fS3g^ z+g~^#CpR|&PR#up;0X3>7(b*t@H}x}q{y4QJD0gzMncFshyF!`Qq`McE8n-5Q2 zlvEcE`L;$z3Wn4|n8d^XIzp4fy|(e7`n}HU0k)LVnaaGIXgj)mfZasX0abcb5C)=Gyjq-N$+~2V2{^G=t*PHjivH zG;glY zxyMct!(1pfj|>-3Z1)iO&jGspXqy_{&zOb~bK~B`;*p5EovY~fb-dBGlE%IF-9rF^t5h4*ityJY{mm!N zm@I{!sxfRW`bcQDxI0O`K+%NfqeBf zT3ck;D1JeSeVpR4Ve5vV)H3F6 zW{ZQ-x1R#^+qT9lS?NanuCZ#IVpLHpzw>^k_PJ8N|5BgSO>q`Pai4?Dgl#^N4euAB zuI4)Yn{Nb|QWTR?%<~DWiy7|g{T#|72Zl}w^S#mB`8V9En5c*8_7!vkI$Z?m)I zza}bX_K=m+A;rp&NQvFkR&Ywm{rHhhP3n2xsQGS~*uzH0*LiyWkx7u6cuM*Xl620= zEzkG&Ze!<+t5o9S+@)Y2Ffu^CYv+hr7TfyHojXlUe>PjypWl3yWN@I#-#}dd4$e%F z4~2nC=etrp^_7rOn-6+%9_{Q-eKCQa?ej6$D*KPgHA#EgQUxb)-Cb244d*PL5(|_( zfA3`%MYD_qS7F*ti>jQ-@O)4IaC_mGbrgavr*h4AF_G5%CcYYvnC|;1oBiQB-Z}m3yGb%&HLm%n@7sBTGt7lt zlV5Loam({z8ctpg?Kr2o4@%QJM_6fOYZ?D!%Xr!!=0wX6Iq#L_61adtWqPo|kL>=w zTE7~b;&`Jsfe`xwr-*-hUjG1qT z`fidX*S_7Wxs`WU{kc#0Xn&ZI>`C^#`^R9{PVMYd#1I=c8W!;+%%Zs*1g9wiCnJ*c z6W}Bkn+6?sQebAJ`DuHYbIXIOcRe~mC!Qvxi|e$LkOyGFH?5PR9b zv};#M3scVI8kb0G7+gMcr>OAca)WmMk*`IrYx1@`1SJpt>;KW z{4EDkPc<)=C0helkiZNG7x+H-9!B>|7rm{75R(%VLJT_@cK!SGm+iH)i5krnRg{sT z!);B!B8tR??D9@qlr|twq9|XYfbi9bj|LK zgVY{rk=K(71rs^eOS8!RYkx_YTb9I!vUpa^P>>YR^$NHUL8}mcEO>lreVA-vCk+SF zrgzlO$uOyh8)ZZZlAW@ZBv2vPARcEDb62KGc2ADWf;mV#Mn+dk{aa)$V$0+G6aTr$ z@~n7`>iU_e1C6Z~UzVuuj~`-c*)L_VZg|vVCpl4EcC=hj`YymFEEmR0CB?_Gw2~&< zyzkF~-O2qc&GvV#HU2DFn9y30<&?d-q$H$sZKgltscm+Pn6PCHzZV3%XxYcXDZ>oa zIFj_(*|j?-4z5Ts?0lQzDtk|9`m=*((=5lk3)%PoG4c%RqrA`N6zW6EwB3Kc#^U$0 z-wvh4N>q}T?dw0>csOfVvzb8Bxuh*-UpfKpP5$LyzwO6ry*gW8%xyFDA`qH#`czuo z>uUAaUDqxS&LCTzj){psQ=_MQ=KQk~7Ur4RvC7@W^9v=3_I9lb?zw3IsIw&~R{JhV zHbICsY*d)@R$OnTIg9u<8(cqE7r?Dm9NSP7`!M zZ|ijG2rS)GJ=A|TS4tdxf|9lA;-GkpZ~!iU{C45jEZgDQ?PVsdZ?FG9QsDQ!CmZ1e z?D_90y=lQsB6Ron_YWO7%HY0l@$`;MesXuBtlB&4>&&MLUq@a=`$POIcgCNKv?Rl~S6-YM z!zc_@kSfJl8bU^JsU$>2opNw=L^Dg)FxDPKL@#k z%Xntim?d}Z%$6`dx_F*pcekuDHz()gWif<|vNBJV?#fr$Q%D237`B@fip`|h{ zX*BVQfzRPY16Im#Vn*W08Y>PekXW^H$6a!BJlOyABU*30t|4suC>W0R+rOrmSZiQo zwN$*mL5TSTZL?@y^tAh4N)iE7-@hm>LWC5r&bdzT&@uK7tzYpN@s&sa(rxpz@1~}V zPklA#FUGpCY(L%fsHo_@#Pl%p6TnDKf}CESIj*Ui>c=0oKF2L$~xF}^*WtXQQd=&qAp`kSJzb; z-s~gwJ7b05bXn!U?+6NNMi$0U_TioKg@Zzp%rrZ>_iQ6vU05AgTDsN(L+iQJE;jlE z-W@XJ#`qtR<^(Pdu}eWMtx`#CX_8xx{q6ehCk5D`cUoR?KgcgXyqRH zUs?p|O#g1m+=*+6i!oE7>^k!+tsa$912!;%2={q;AD>vw+J{YP#!D~#biP>^hfYaX zQMze|aZdqRc`{~c@@c-U&dcoX5OL(OD_Z_n@?h{0&P$Y1sS_PZ2Q+q7zx_hLb1UZJ z31P6J)oieuB&Ae+r4xMyE7~v8j9+&zGWtLG@N)gUhpHk`aAv1K^Yo8Z*tO8LvA%od z8Nj*}R%*ialF1I=#n(RUYjyPnyV#P9VDz|`5Hm(er;7FDJ(2ZyRISa zsF-K-!UgWm-+oaYtUGa_*SfT;D31Z* zdl5SAq1J`AzklUee{h4xCdTz-pd==&SRMHV7^_dj*R8)jf&8FuhLzZfV1e%QxMQNO zUeQcXPlq=ATwko6-S43V`fT2F3TUE#B98yy{0=gXQ+hz^%+rg^Rc1EAJXa17chmMO zt{`MtY_6{u^GFgbb$- z>qqA#QZXvhCUgWe+@N^Sl4V+LQnTQ;2Uh5(lNPC~G|ye<-|yoxSQfwabgH62q{3@jr0GW|?5HpK} z*CU?mTO959*qLqO0M|0M@PK%bi(A{Uu@*#z6qMsIp?0^V z_wikVIvqsV5kXeL&;acSA-f{lvvy$HqCeLLR;urg+{V}g^2;6&OBYWQ{Xa1Fez}yamh`Qaguki{R+2nur}+^ak#WK| z5NvV>0$db)`9CXqe)l9lSo_lohVN+2XYYXs6I8>e;m32B44(7DOAdTN3FAGZOKS_T zQ+``m*y&t9IA;ogm>>=)_g)y0>J82kD2D)PNgIrpUXzsz#Q12e|&pB?9X?-vVZ-{T?+xTcJA zuCH8WE}5;^q5PW=Eq&?(J3+U0g8zo|>^`kCV5eYk7Z~G*-x=Ne?b}{-$`FDP;{*Ev z!|@_I`}pU}v;4EmlW*om|KA8fQW zQL7Ql4Y7vycfGC+k1`DLI_68sja-}N zVOh0`9p3?yZNxJee%?3J4vtUy#@bQ}?6L_;g@gUj=e-7T$%vo8r^A_%xVy6=Tw8+B;>F8i~&=4*8W$|ISHENrBj(XlVLi}3huABHuZY5)J8DDA0-C( z;F1CPV5qI&%<~sw0^i<(9SLJ_<1gW_&;ufHK3HdMcY0w8HaqNTz};s3y+F8{HOWfv zWoa2g{)Llg(Vq4k#VCOI+OWHwSw=wP(!sYU_z7{xK43)LF<)si zE||^XV`VVcc2VG=o<@FdF4!rA6FT9(i0>pgMxqXo@w<+`1u>qan$S+DGudCPCBd~LnLQLF3&2eyM- z)e1GA&$M0;j(y_AXY`f3q-8+zzJ@*`LHY%yIcd(ASnvu{eD|u~0~BW(FjkU*B(!In zg6TnYO%@39g9K~(>8s27!yrQ|!&LY}T|6-&t|SpN<%kfn;zoED;>CDYnk@b%U+ATA zc+YB8d$-U1r00J{FP>So5J)HZMZ|qIN7)av1Bq>d-59H~Y)3G=(+ppQYQ;UgpNz8v zTJX;rj#!~84t)IRU+aOIMa9Jnw&Xfo96x?kvsSxpMiz<4og8W4M|>=baZq- zu{3R1W#3F^oR!v&4o+y}P#IK~bgO-am|~s?I@rY+c-E#~`s?}Q_O;d3qgzkW9F)+v z<6Q5Apwv6`$omQ90_OoGXMG#&bHb_+e#-*7{;h8^LEr}yf!G{-(M1A1xB502x=#za z>F!rBlGf@PvpNDRh`vFRCHpk6Oy`IT#b@Q=xm*xz?JqsNx-S~agp32Ikoc5~rd?E2enhV-1gKf%cQd5FNlB4U zRElkb27}<5gT+itHyNxSBpA@Boe3H)_UXm<^pdmVDF1v(oKjMHAmjzbqkCd-(*Frf zi!c?AwN{$fT5aZreqIizfx?_-k%@ncr(0E^sF$CjSsV>I^$O zp^SmUAIL?%43u|IB1V7fLk zJnY*oYL<>aV0R4&g){E0qQ>}#V7+cYO zm|Ks(Y9EGVwu2GvtDTV!ISZa9SdnVz>V@*^vFtyIrIbg4Kp4B@9oeQM&#cmz2feNm zx(tP~a>c@3U_=JuiI6JSK?s6~1G4jKqrV3`m*|(s&)D7xO0j8#e2S2^^Iaqi0W@Uc z*9acBPn#&w6@`Q%4ircOh0t%|XP(SLliHrt2uj)fWOl>lAdl7NSo4~oW5nPxTsFRH zm=MZ6BFvv@b(XbPCBCdoYDB2Bv(q3{LP%24^nFa`Ru>wAVvfrv!dm`0?jMGCu6UlB zV74hAJ9Z4<=jm}`t|$TtTFC+l?!Rg{eCY*}|q*l$ec9D0_qmg{^bLg%RlJCea*(WuHxP z4+`~fcm%&6lf`~?pSIh#w%^0PJt<&TpSYH=yvpycL(FB6x9u)?^>HzO4gOIxe~K~& z!(PvQp>^-z0t`vnUl~QortHt}eg|_|(05}AeGMdA&yvjGF>3T>$xm#WFX74cORu`i z9#t_T^^uW(YmJReY)<|JW!cobm)Y_)Snosh{yt+T#(}c+hlVaI<1E+-;H3BIP8qFA-l+2`1`(3;Yi zpF;RdNa(Qy&$O!tn!x~5!?o$FeJO4x=}aWFgc?#$Lil@E6)u=E#pPPGGu9n|3P|V= z0zE-!2|fjfWj?Ct0y0uY!4n!9@%>NyjtvRzOEwT|Qx?rXg2yU>$GRsWB?YDh8ufn% zF5tctBrGcB?qOK>QH@#{O?O^|XA6uqNV3EXZd^AG7)lGVB(1&MYseNDUO-n$w@Brnx&ypS!gbDVqQ6j3id9l}9anD*h+MG1O4UBAp zaLEg3Bq+jg{JgAEOSLOMPBYs$LWh!+0kS#i+h_d(;!J`N@FV7`KMQB8)s0i_@xAI` zFeBi;&~YPub_S;ycNdXx=#*6eHA1IfVnk<=L}DWfI)$4zZ+@pg6~PFbg4B=0w*QSy zhm8mb=p@=9+d|7jq`m9H^4i)j6r)AoWMv5e(UR$LCz#S`-}$-p5i=+J_R(T0@86T(2?gp6hSs=Y2VmusNzhs_4I3{$2&CPLmzHc!AK*gyJ z?%$$zBR+FZKOKJ!G*oMsUUgS^apo&SG0Y-}5h+1OWBeEHLefM~D3H%VUFnQ|eG2k2 zxyWxWs1ESo-iC*gVmUsqmi%%RKlZW7A(3NnVhx3LC4!b*6O`YtwN$)AxzwWJm@+|- zm#gZ@DC-_+2pkE&TqW>t#bZ3s^VoMkPXBjjA3Q=(-EreE*-6GFK9{*4Mcip$&dzTl zufxf%-zJ8XWphFA&vgXesvM*sLGjpjP^Z*8ZzB5pab7Zos$3NOKgV-*p8pk3XK#t% z`TV`pP^=BC3b0#oj)MsN3(>fpLj_Vmv$b)4zF zy{-fG-|Fh>W3wtPC7cMzv(;>DGT9Ht_CRV&3`8z@Rc5f=Q|af-++sSByI+uabnc9q zp%`L-KReM*F{pp!E~3vHVSREdyiyDTGlf6j6qqdNfoI3##UIaj%^|)-Hif{1v!)7Y zFh20vFIdB#GT*re&jy(Up$YbK2b4R;65v) zGkX^&QN$5)VVSLQyS5x+@#i?YY-(xgvrU&4`Ay*CGJjSnD{)<1o&0)beXRUF1V6GG z!6#6NcAM|!I&x*HsfQbM8uf!Xn?wHJ^9S?<842&07A z+W?X=X78(tgF`O+7<8q4I@ttTS;|eGUr#uikkS(Rz&x)YT~~%fJiyn?x!Xb0s7PW z`B-gTU6#{RxafQZ;C-G1R|cY@Y*Q7ea^m9URVOYKMvj&f7V~G0$`R(uP{ZL|5^nxT z{w7cd5?T*k+=`2Y*;V*qv5i{8#H^#G&{oMZZoh&2>}b`^IcISqznU%>^s^~ed8qYA zRs}@~HoOnL6fr>XrzB=bW22Z*9)A^j64wO02tE^2m#`NIbmNR=$4eqg^PGd0)bPth zx}mcz8}hg?SFaMSrKTRnO5 z{j(;R*4|PSbg}La0P7qZ;&KpZl5ABkx!}-%%gmKeA1j>y0Var{KDB zh{rlU(0UkX%IT^KyjoCe3}^tuOgi3vTO`V3{&MSr_wU7rhlVbk{DWK9=jvN5EH;DC zxp>gk2>8L2NA>Den0+Ta9^U1yn{*P9612HMxHDic__0b!4rD&QwcSDPH-enAIFYR@ z?|xevZ^QrpwMJ9-_)cvYVWn^n0;p%In(S-zYP%$iQ=}-33 zpGM^#rl0S`3K{x63ZezOGOt9ktY!hpoX* znZwQCj=RPanYhUC@Qh0**#9u`dW4++)$$}cnG5S-29u%fWp#Pc*mL<({eHf_X18ut zSZUib|9;m<`{aWC+Tv}TtVHi^oh@}afs>VGBZ{$-(T+ve*lCqd(i0(@I8%Kr)DHB2XD+*ATp=<`2%f~t<6Rl*v;Ce2x0%OpQ(EaflCs}#YuWt zClCV$qJACeeJj$FcbtO*ARw&)IAYw6l7LR>Q_S!cw+)iDagjZMJ+um`!aWKy1Anx2>=ww_Yrsw;F#&z7DAo8 zS%^;>yY_vQwjyv@nTE)qk<#^-!i0M9k)7EHg(u20?C)p?u~@j!!!Q;V3t`f9^IhhqcU%ZlKrfyICO(G`G-MfPJs8#mICtdt6b zvjZQL#_mG>tBS#-P}HO?E;?dyef|9>$~N-+JgQ1LG>G+&#&B#YBebHc3p|=<&=5ssLF#n@@ALcO# z&A8ClQpcpq*R!2vV`JOi%q`dnf-;g9V;!ejtxFbpQxDI*@?OY0srI-CiT}fMM=;Cy z67{2x2-6qO2{Y>1t>@j!3_qn)6yMmWyygK929&LYI50UH2}0xid=5~VsgxQd1Rbh^ zJe@6^a&YR;xDy)_)AsXc65h#vw4Qlw5jg{4D(1MyerdYLTVEu4d5YZY0N|@~awEpo z?|8()97+k4yfwrfxJHqdyC^Hfh!YluFJI-LE6_^oX~d2p+4mL(gd=iIXKq+L`*e%H zgbBRiid_wI)6O^)sG<+VF^ zAh1VQRj!}`BCa%i+}_?^@7Zdte$B{(xh4yN@gciQYJRXD@>dr9T!m+j#*xbXFhf@N z`9S7%(48u8@#8;iyJXyiqm5=TlE{0&YG(XNCxHrE_U%>_&jdFaDmGILsL0efnc}E*`jcmQuH<9m$R;*9R4d36VirFB zKqWGndmZbPd-u07j4`~;#Nmn1iVYJsThO^0xImr-lb8hJ;$dmr?<+GU|3Y4H;PZzE zR3;l&_wC$D*w;YupMD}@S_nB)Qk;U-b+G`NSno>ys<;?sTl9!j~?XI~)v-(!1cdm2O zZC;PBFFVhL*-vny1%kOQP1BF;J(X%Kc4+=s6Tkc7gT8g!QiX#5v336QoOGABRifFj zpXQOE-?vPb;4!B**Hz1dVx`eP}yh&Ye`ss5fZf-YF))A)$dbMN#?yS4FxZ9Sgh-|&n1!Mt0hEp0o;Zz;#Jd}XDnvR0jiEh6 z!gw_?kO?WgXT>1H0L9B|ICFO^Zax1@XUrt#r~tD2xh`dzHb$BtA&7wI=4=ooiBuOr z+t<}Ymo55go_)nw;p@$V3a8>aRj%;N3*cv5*|2j#7Wl#?wY!(|oab)6!!HiZ^tnVWL>aqSz8|XANDmwv z8}msIG;G^2Ui-Fdsn~kpK5pe^7P}wqrGd$?GW572%`!Q&aA4bkrTU0kVu?MPHE>Upp}F1+Wy4;XzjYd$yB;b76n}NW&Ffv+E=s(aquM`9`AYdRr+wix3hDq z#!U-@NI^!TrXS2>VL=P$8;ul-XbVQJT_=3>6XQGDKWm+eO%w>ST3RFTZP6=gc#C0& zFD&LS^D!uFKPi~Y-)tJ?ToWf0G*kAiQK;s2?eNUuyM5X34u)JQ=@ge-@o@W~%w%9- zz-960Bw9pAzCFHh)U3Uu#zE*Rsz-^6d4R@U1vUn??#SoWQZ-)TBJ%a~8;4Tm4NO%M zV7YV&)lO}p`y87+g61`pe@aq>cbGMb{yUu)Cy0U(q z?sua6(e9D9TiNKPEuMRyt#iu-dy8;_nPk*+ojMH! zTVz18?THO1UG2)DUi*y#JpZ88k@S!*>QCIy4X&3GC;C{xwuk4o4=A0amoFB!PkV({ z6fWlg0%yTj286*gwJJfl+W`8o$9OpW&LyYm?~RBh#Q&lY{aVPP^d5g&j+nv2^S9L6 zD8?+0H>rua_G2mp21j(15E>@;iq9d+aG4#y`gK9#EbGQkM|9wu-~|yvQY@F+OZ_kh z4O8##rYk1Sn=7Ngv&!IpX^I+qQBkt%c?EgFI1XZ(5^D4}C0#zb+Y(Qoyhob7*BN%!Oe5w9?z3Y2y| zV*SUPezvVj(oZ-WyxVAQZx5s0)F^|T=Nldmdie1J0|Oyl$ggqZofZ*^5O9%=JXjby zy<7-$tM~J4q;QbDyc&OP+4GNR8f6f8nMWvAt_a~U1cHCvQdIEzfExgp5HM{nQIP)#tG`qo1X4Bt>4PA+)< zxJ314;!^2NO0O@38gBIYzPh@)Y-;T+#HvIrl$pJ~&;adN)0dV$*b=26D&g7&IJZbw z6Z>a%6%>u((>Ex*R0L5yWLWvWNlmrv4HLKn2Ou=cE@xyRO1i!c6Z-v7 z8lXr?y zt`dG@wY8ID=1m;0G~N2}kW+d{{l~neIL#7v@}GS}qbkxU1sLLT;qAP-PYsnt=bGwx z%c88;U{aW4P)&n#JPt`1Kv0E>nZZQ2uf{M8V95-&`ezt7MIyqat?%06R5M^6Rhd7Z zsLl^qYhVbI{IWZQC~(S@G?CJ}*Jc^!#p{sZ<0J5fCfv@4?+uM?TwI(eWM;KfI|?b+ zfq>@N3|4t7$2TctsKU$#I^Z?EUy|9|FT?N?4^ynT{@7sd4ZzAFiy5& z3Q!Mm=Mo7#vfPVt%BW^6;FqD9KBmt@qlI;Lv~R-VP5se+cH8*v97OB#$&J+Msb=PF zKVJeA#qr=7&T1i%mNX$S1wIjw)jtmqBIPP4QfEs&W=r@=66tBNm9A);4bk$RiWJ9z zY{J2#dsc}`dCI3-6J0S#%98*>v45XlT5}-mn(*A(7AD%K0xu(W5sqxwhTC?KLWKH; zh78;E28Mp!R!ZyJ`KI{K*|L=@sNCGAEcD=PbzOHcxFPa)XWNaLB~-tcn!en68`Q>YOlHTrO z093D|3h$kpm}wq4j5Qqt#BRKE-1hd;xmB~Y>Qb04WN(%xBvk3rxw*J#p{yvvM6-=o zUn5n*-&=*|_8=A~_*}yPpe7`eB~vKBLiSokn14=K9CFuMlh5x#zmH@6_SaU{HcnBC zBa494h^qpkJ|cx)V4+GOf?ny&lZ7t9lKNXefscZ21w^&UBSBzH z`1<5+>~4?{^>)MPFG~F#x0=-O+G(-ADWYS5x}TsOcx<$LO3bYBzw-Q*`|gh0;Gsy= zZ|ZPi$MYC5@_hJ{Rc4cP>iNX1tD?vEkGnqj$4A|dRWa)7(@|1th*~l;GgB5~Z0*~e z>Pxt>@-8v)5<({7K*8dHXTk;~*dp*EPG=Ou{##sd%RJg>_$PsU)G_LquKl;5dGKEiqpxh|y*H@gWE< z8kdDWP7*j|6EJoB9yOqk913vY3tQK_E0c-G@jEbD4UUhvnt-JSXn<|A{h!P08wi_I z%CA5GgZr7?Id>`=CfT*y%WweR|K!4?G*BXC;_cyEIhnFV(6SmNmTpuG3f$(^G%*>C znsB*zbT8i20vi!98`4DLWP|ZWm>S^ol)zLPmKdcW4lkT}xAariZy}kWc(dLwnNzTv z!*xV9=J@y4RwF7YoJf>NEjXW(DPR8wNi1%_M3JcCfFBXIBe2IdqBcW#00No@e!&;5 zI^cMi5c4 zQ~;V!L5D~HQ@GFoP}Z5d)?g~)>jS#ZM+To$f^NcVcKqbC-L1%Z@MEI>=4SMLo1cI7 zrl{_z)6oCV5Hz`$l)y_|-6K$aiwPH?x`>acEE_yPoi9FHP65n(3C*HmT0Y|V=nXWA#KJ-==4o2H>H_c3M~bi@zd-{O&u;cNre zQmGI+QHO_6!g95UTgz?QF1A^3qgAidqS3G@OaJhm@ZYs3#x$DigMd?WtTWL(Ql(F& z0RV%nScOF!JIi)U>T;br)q{VCS&F4a-N3zpyMP3ijGKxe+Syt0_Grnxx+)7hJmpK5 zE>+Np%dc;HgXYAD{qw5AE?C`OhJ(@Nm>1_M&$gFd1)~1+!cpMgHeJaF8cka^9X(K7 z7ugK{i|h3b5|TLzV$%bG(m`VRrHEt!hzZ7qNC|Ttr?fCcU34&irs>P0Z`mdd=ESv@ zlJa7K;yX-O@CS}@ZP4wSSjui?DD$;9ezD4b`t%!I;AmI;WnJJX0@mACanCZ3sAYRf z-Cf&8t3Ve520FYF3oWXE zJ+D^u-OK_g6S5`FZa;EyoE^f$#3&@lL30(-W>=SPHh=M;#oRJftv;Un0%b1{&;j@> zlS}?E++U+DK-j_a03YVATDN>#Q`0TIS0`64>&!LhNkXU;vg8M#n_0@^2De)3H~b#$ zVubvzhiY%D-v$QmCDJdSm^#A zs=fpq%07B~Y}rC(D-_BuYh}%nN|7ylmLWvQzJxF;T9gQ7-x887vS*L%DPxI|v9HP4 z*BRe=djJ3H`##t8UhjLo^UO2P^IOjEocrA8KHm55<1#6Nm$!m-5tK&7w8e^T=osVE zr93h~W$X|0j{@&BlU?!$mb zBOJnLZ;<^b4i^y<5%m`|R)6LK9Lh|gVB0?(WUo2`c6Y0Qz7$x5d%@rg0zb1C@I`w| z3;7|~J4(MrNhN>vCxjBW#~hRqbPC{soR|Bwl;ns;Cag`spD!pWx#*sI(PD!L_y5^S z-+B2??KZ40b8x$(L8V|ImT<@29bDkcU|8wG)F46n=KQ&`5|C`>H#~9T#7}S>`7}VZ zx9#{V7`H`;VK#f<>S%lPnU$g#Kp!GrzPtq&=LW|e`lnQJ$2{1Z;IC@>M!&Y)! zsb%Vm$_aJ>e~{1<`nAU5V)nWgI<>%r$jk=4PY4<61U6zTXx zFm>6m*N5Yt>f8_Gb`Cmr1K?nY#^o1fKYa$c!%<=*dH%}4uAW3UB?W{sn;#-ftb#6# zKVH6vV>hy%Q|FxhyQ6mfhdz^6&^X6-0;eKp3B!> zaTTX+ZM&cLuQn|Kpau}(U*lIwyw6y^ParsEoOu)tt{IMma|R+D0FTVUX{Tc#8%#B_YXDFL2p>RBeYFpfDkQnv7;emdF+wz5 zzIhzty&DOsLRsP+u2q0GtJNY-G5`eNx%WZCWk~#mMu}lJJ3Bg#k?aKo1kNich-lDO zFz-(>o$*1CuT=^{c1+-6o0<0no1+let(G!O=#L7j&#D2krjJV<-+SAK^W ztOVyYvXZ^mX0#vBY3;KHz=FyIHyJ0`17f}(YEOmxgmEuYtivJ4Cp=E!wfd;K>K9^8 zBg?W&G|pXm!)k*xt%rL$4*F_T1T9V#mX{Cw#cvVmgS`yl)hlWoW28y0#O14j(FFu+nFOYbHLX^ zRA3=wiu>^v5M+4?$Fu@~#(Ya-ffEhrbPgaYgLMjt8-bx}yr3S#KTc$tAwX~jxGVy# z!xxW`nsuR|$H}O}7LG9H!tDD14drh-5-lYF>jM)~5AiqH|AK$G&B>QqFx^Gdu>RmU z8V)`ve-!J@8_P;U==u;57n^DUe4l#%I+9P{Ff)eO-}e)elZE^W1W}F<^UJ!90L>x{ z657X_(uT_GZ-0Ff>XN1$q%iHvce;UW1Oz-KY4FW6_AvFEr*i=+-MoHG^gV1SVQ#$w zw=P8mg+Ffcvx%v8LzNzxL3o6egG7D@0Oqz7<2+RE$SY@j2Tp4pFxAy?w0&!BUCPyhb2R!r;9qtYFLHoicFM>; zLbEt~|Bfg4=X1~t1Gy3juwf2>&wTMt_$)vbeBGf}U`A-`fyoLI_%CdVO`H1iz#ksk zD=aD+Y;Fz(FbZ}oHuz_B1RUv*0u&rEh7y%>T}YzdtH5)RA(>K`o3FzvBQ8qB*?zA$hw~ zNftys0XE-!YU8|Xn0@08HF%B8E5PXzEY(Q7GxMgB6M(uj^zL&U*@epS7GPBrnnMvgb;;f zQD41s0>TOUp(X}XuO!x80!tszB-mfIhu*THZY?tZ20|~aDoy|8?mK%~-kSl4ccGvMF+IQEf`|~JUBrJvl3ca?_zp!w z{{%%USeT)4U62p|<~A5JI1ukVKI{j34VjF=7TTv@H_do}$m8Vds#B?;>+I~@QJ(qp z0|Xy`9M7ycvmhl?wY5s)q=fQwaratqf~`No%&swoA!*6QY(4XWopEhX^Q zUoew7AyOUGDCNdBZq*&`-Rh{Nl}ie;1Jif;=YJL3LhJ)w&ttI$UI=70jpm}&K~-}{KB%@7RLiYVrd?Yp!|py;j;vA)_~oS z2Sso7yZuFcK_%)p1t7sR?zs{MLNu)K^!kvf^QA%Rr$TN00o0Bq2o*G)=C^WN zdo^oP3~nI2_~^W>>>@xo|C6QyDF0us+vOgBjN?+^eQG=)f9txJ6&j<@Q>(9R3yzK0`N=eDaig*Pt6CJLCeE2a!MymJHxi;3;>Va`~Ua7DvDr5Of@*_cOt7p95$U z;qZaya_mtim}P!{)Z{sr6nM<+y|akT% z*AbFoV`F1z@T)k-J-F@J`KxL2I%HWO_Z70(KQJ(CvJ$O)OV*)~iK9v<6X7BL-?VbG z)#?t&3=aZ~<@{8?J@WyQ4T1b}5i<)7Wv}?hdsOC##diK1`gJ^Z{~ng{tu9ft=#^=5z8X7Ao%{yQvPxVu=K6TFs%9 z4XVdLc?Uf_1k(h&D8lw4>+H)K(8mA|Y;P0EwbXum%X$ye3;dxH^P3XIPnQ9$`Fu1_N*l5_U}rM%SdDjzg-&~ z2{;T=lm!9qPq6k#^oSo!%ogabadZ3iiFb1EJ~&gBdl0NyPTrfT*3I4o?BFh7|H!G2 zJPX*60<$tr#F0L(ai>2<1BB^2dc2elp++F3M0louN=JepeNr?5CIn8gnLlY-aqc=Z zTYF1k=V!rg@FnCt_7q`EA&+fSBJIeyz|xQ;oOq;V=3U)9qb;5BItqLiA(gA1$0y^BB;e2`prJ zcKgrmnkvQ4_hBoNkAqWGb_?D8ib7)ih-C5f%gleT9-KKf&O}fl%$RccrFvaUd&8LO zytcwcCUmEUntTm3nbN1+C!&;g=>UUsR{?xWZ*AvCH}%G!pC(?Jk)B`iXEl!&J!nwc zen6$kNv}*HbZdZCJ6BvekybDOz7kR)xk@d>BdC03tx@Uz`jFrp{nl8OTAh17xgO1a z3WYty_Y>|>B9_W&MeoxN^xaha4!oFCMNwJLwv?@J16BU9N0ext{+~7dd!K3N?)y;{ z-DybL#vQ5wMK%Ht;{d&ZNT#)BRtl=Cc@N4-S|C}@a$KOOcVicU7v44gvIx9&aK^Iwu*H+z6O zdw7{vl>|8>@voPTxO0{d8AS%#QHMELK|@Ax>=O9MJ#jPkH49g(u~ zBxce59J)SaYvsNU=S>Ar5R@m_Gc`E-S*@K)H9(=89&kiqAYUgpT7#WTVr#%{b3SD! zC>*MJQNP@jVP$=~i94NATT4sMl6;I7LOh)~l-~gCN-RGr^~m!p$>L-oWF0BuD0d2= zq|eVgo~cOcltJt^KnM$vLF@&O8&D>*C=$75BeK!YpXbv6w1l?)+z!sLE@EB0h$|0) zp}Vnrcl)NhhOqt`)s?F5{=Ii13C6~UeNA=J2wa8fst_FY6Ity(S`!vm=S z{A?h{H2|-Z;u@fy6`VgIH_iAT==KI`u%iddE6Y^0uGPPbg7H4<&%Y184>*Wdn|@ez zs^Q|6NgnU&wf$cmOh}N_qSxVJ7l3{$)}fptH{Q0T%wDZjl;-VU8$|eC?DRhc+6Yp) zs`$#to-2Fi^#{#hnaU9OPSyA{Kf7%JOb`QPx&By z5j(RpO3S_p|BQX~ftG@?N3y5u1J?qwkaOUeOf^ikoY&4hgLf&`(NCUBn_}i;PR$Ig zXcxWU=SZVSf7d2M&X~1cEGsZy6HQRYFL^vNi8R=8g61L(NZ)TJsp-(lBZ7?rfpgdI z>rZ%VR}CzlH>kgQVf;Op5Gz+6UEZ(Ok6{)O-9Y`2;LbtC!j@<_vZHYO{PcT;G~9E1 zs-5we^kBOwud@&Kd3rAX-HfxMKtDN4v_>m+jFZM_>J-to-!@W7K;yIc=AY~>=+4mc zn=xbpG7_GKZEhP{+utPdWi0Qs1yW6Wj26{SEzdBEVV^!p>Z=ILZ+Y+gPEO8P9xqVD zomaQh?WSN^ZtEg3=n9ezBQ#qUKk3VT>B%Un2!!e)Y2TV_wPfV(!^H0aN_!8GBGc+jJ>60WTq*+w@OfBYn;lVBC; z=t5QVl0bd+=A5iABUeI#!bpW_PlC@xt23WU`0upry1#x(WIJ~j@B$!+fl$o>00x;K z{Jj1#_hb<*%eGTNOa@>y=*Ql=sc9*_7TSDX$f;YXJ$9v@)dnL#I$1fbMEQ5-?O?)l zOyU1fQlDmQaf^0n>9$x~~TOf3!*v;i3v37vJ5Z+aI;Vq?DO zD`XssI??)ZXzOGTsIbq?-TjGMVtHj?Uyc)^w>#{z@y<`q*dsqtJ45|i6?7Fboiq2N9cQ}ubw0+df+1I;dGmc!%64L~ zO^Wu?T2Q`;&czX5Y0GCW)x}I>VqAH0#@$AHfq$3ZY@L#=yXKWl9wjEe!C3i>labIO z=Q!5fXc@keTs2H46>F%VKI`i93Ub5H}CipsEPr!CkQm_*0ykuMVb@Bh!(_9NthoEvSR?(g6vwyBKj zdPQip){(Hj_sC)|J(lsTt77ik@CVV0a0>(Zjf$D<&cAHc=mrLWf+~7!mMd7?lRfLu z6`5{h7eZCqPGt0rg!f-_RezUu03>y%Kr#2F( zJ@80gbtQ%Xa)=T)nR8RA-RxetSJr$kLtGH&MlKut!YqH7tYX~sO}*Jff?k|~i!9QD z$5n0n@jK65^YcaJg9U>91DpJ7I@ae>SQ3mKl!xs&DkLtpO9oVeD$SpAiG=%y-B(RF zs4)cU==Wg64~hX4p&LGhbx)RdR>>AB+iVKzNESyC6ePH;U-(2%K6#vNB2FE{E=GCxl-xh9FgQK zAtP}(NOl9)Z?V`jyIB)VKK+LIW|4}nDma0jXk~m60BuSKq*jlQ>y=eSBNmEuFJ7yt z9%Wh6{v|5Nm~|u|w%SIy6}|ICXtPewtY%$d#? zIL7K0S9-z0(edWB`LcTI^r)KkfEm-UoiVxT)F6MVpeHuBhuNW`)?#0pG&VPov6