From 2c1991cf6f76e59a9900ffbc50aab3fbb3f32568 Mon Sep 17 00:00:00 2001 From: jackfrued Date: Mon, 6 May 2019 12:30:07 +0800 Subject: [PATCH] =?UTF-8?q?=E6=9B=B4=E6=96=B0=E4=BA=86Django=E9=83=A8?= =?UTF-8?q?=E5=88=86=E7=9A=84=E6=96=87=E6=A1=A3?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- ...25\347\232\204\345\272\224\347\224\250.md" | 431 ++++++++++++++++++ Day41-55/res/captcha.png | Bin 0 -> 6392 bytes 2 files changed, 431 insertions(+) create mode 100644 Day41-55/res/captcha.png diff --git "a/Day41-55/04.\350\241\250\345\215\225\347\232\204\345\272\224\347\224\250.md" "b/Day41-55/04.\350\241\250\345\215\225\347\232\204\345\272\224\347\224\250.md" index c434473..2780739 100644 --- "a/Day41-55/04.\350\241\250\345\215\225\347\232\204\345\272\224\347\224\250.md" +++ "b/Day41-55/04.\350\241\250\345\215\225\347\232\204\345\272\224\347\224\250.md" @@ -5,9 +5,440 @@ 首先添加用户模型。 ```Python +class User(models.Model): + """用户""" + no = models.AutoField(primary_key=True, verbose_name='编号') + username = models.CharField(max_length=20, unique=True, verbose_name='用户名') + password = models.CharField(max_length=32, verbose_name='密码') + regdate = models.DateTimeField(auto_now_add=True, verbose_name='注册时间') + class Meta: + db_table = 'tb_user' + verbose_name_plural = '用户' ``` +通过生成迁移和执行迁移操作,在数据库中创建对应的用户表。 +```Shell +python manage.py makemigrations 应用名 +python manage.py migrate +``` + +定制一个非常简单的注册模板页面。 + +```HTML + + + + + 用户注册 + + + +

用户注册

+
+

{{ hint }}

+
+ {% csrf_token %} +
+ + +
+
+ + +
+
+ + +
+
+ + +
+
+ 返回登录 + + +``` + +注意,在上面的表单中,我们使用了模板指令`{% csrf_token %}`,它的作用是在表单中生成一个随机令牌(token)来防范[跨站请求伪造]()(通常简称为CSRF),这也是Django在提交表单时的硬性要求,除非我们专门设置了免除CSRF令牌。 + +用户在提交注册表单时,我们还需要对用户的输入进行验证,例如我们的网站要求用户名必须由字母、数字、下划线构成且长度在4-20个字符之间,密码的长度为8-20个字符,确认密码必须跟密码保持一致。这些验证操作首先可以通过浏览器中的JavaScript代码来完成,但是即便如此,在服务器端仍然要对用户输入再次进行验证来避免将无效的数据库交给数据库,因为用户可能会禁用浏览器的JavaScript功能,也有可能绕过浏览器的输入检查将注册数据提交给服务器,所以服务器端的用户输入检查仍然是必要的。 + +我们可以利用Django框架封装的表单功能来对用户输入的有效性进行检查,虽然Django封装的表单还能帮助我们定制出页面上的表单元素,但是这显然是一种灵活性很差的设计,这样的功能在实际开发中基本不考虑,所以表单主要的作用就在于数据验证,具体的做法如下所示。 + +```Python +USERNAME_PATTERN = re.compile(r'\w{4,20}') + +class RegisterForm(forms.ModelForm): + repassword = forms.CharField(min_length=8, max_length=20) + + def clean_username(self): + username = self.cleaned_data['username'] + if not USERNAME_PATTERN.fullmatch(username): + raise ValidationError('用户名由字母、数字和下划线构成且长度为4-20个字符') + return username + + def clean_password(self): + password = self.cleaned_data['password'] + if len(password) < 8 or len(password) > 20: + raise ValidationError('无效的密码,密码长度为8-20个字符') + return to_md5_hex(self.cleaned_data['password']) + + def clean_repassword(self): + repassword = to_md5_hex(self.cleaned_data['repassword']) + if repassword != self.cleaned_data['password']: + raise ValidationError('密码和确认密码不一致') + return repassword + + class Meta: + model = User + exclude = ('no', 'regdate') +``` + +上面,我们定义了一个与User模型绑定的表单(继承自ModelForm),我们排除了用户编号(no)和注册日期(regdate)这两个属性,并添加了一个repassword属性用来接收从用户表单传给服务器的确认密码。我们在定义User模型时已经对用户名的最大长度进行了限制,上面我们又对确认密码的最小和最大长度进行了限制,但是这些都不足以完成我们对用户输入的验证。上面以`clean_`打头的方法就是我们自定义的验证规则。很明显,`clean_username`是对用户名的检查,而`clean_password`是对密码的检查。由于数据库二维表中不应该保存密码的原文,所以对密码做了一个简单的MD5摘要处理(实际开发中这样处理还不太够,因为有被实施反向查表法(利用彩虹表反向查询)破解用户密码的风险)。生成MD5摘要的代码如下所示。 + +```Python +def to_md5_hex(message): + return hashlib.md5(message.encode()).hexdigest() +``` + +新增一个视图函数实现用户注册的功能。 + +```Python +def register(request): + page, hint = 'register.html', '' + if request.method == 'POST': + form = RegisterForm(request.POST) + if form.is_valid(): + form.save() + page = 'login.html' + hint = '注册成功,请登录' + else: + hint = '请输入有效的注册信息' + return render(request, page, {'hint': hint}) +``` + +如果用户发起GET请求,将直接跳转到注册的页面;如果用户以POST方式提交注册表单,则创建自定义的注册表单对象并获取用户输入。可以通过表单对象的`is_valid`方法对表单进行验证,如果用户输入没有问题,该方法返回True,否则返回False;由于我们定义的RegisterForm继承自ModelForm,因此也可以直接使用表单对象的`save`方法来保存模型。下面是注册请求的URL配置。 + +```Python +from django.contrib import admin +from django.urls import path + +from vote import views + +urlpatterns = [ + path('', views.show_subjects), + path('captcha/', views.get_captcha), + path('teachers/', views.show_teachers), + path('prise/', views.praise_or_criticize), + path('criticize/', views.praise_or_criticize), + path('login/', views.login, name='login'), + path('register/', views.register, name='register'), + path('admin/', admin.site.urls), +] +``` + +> 说明:上面的代码中我们把待会要用到的登录和验证码的URL也顺便做了映射。`path`函数还可以通过name参数给URL绑定一个逆向解析的名字,也就是说,如果需要可以从后面给的名字逆向得到对应的URL。 + +我们再来定制一个非常简单的登录页。 + +```HTML + + + + + 用户登录 + + + +

用户登录

+
+

{{ hint }}

+
+ + {% csrf_token %} +
+ + +
+
+ + +
+
+ + + +
+
+ + +
+
+ 注册新用户 + + +``` + +上面的登录页中,我们要求用户提供验证码,验证码全称是**全自动区分计算机和人类的公开图灵测试**,它是一种用来区分系统的使用者是计算机还是人类的程序。简单的说就是程序出一个只有人类能够回答的问题,由系统使用者来解答,由于计算机理论上无法解答程序提出的问题,所以回答出问题的用户就可以被认为是人类。大多数的网站都使用了不同类型的验证码技术来防范计算机自动注册用户或模拟用户登录(暴力破解用户密码),因为验证码具有一次消费性,而没有通过图灵测试的计算机是不能够注册或登录的。 + +在Python程序中生成验证码并不算特别复杂,但需要三方库pillow的支持(PIL的分支)。我们可以借鉴现有的方法用Python稍作封装即可。下面的代码已经实现了生成验证码图片并得到图片二进制数据的功能。 + +```Python +""" +图片验证码 +""" +import os +import random + +from io import BytesIO + +from PIL import Image +from PIL import ImageFilter +from PIL.ImageDraw import Draw +from PIL.ImageFont import truetype + + +class Bezier(object): + """贝塞尔曲线""" + def __init__(self): + self.tsequence = tuple([t / 20.0 for t in range(21)]) + self.beziers = {} + + def make_bezier(self, n): + """绘制贝塞尔曲线""" + try: + return self.beziers[n] + except KeyError: + combinations = pascal_row(n - 1) + result = [] + for t in self.tsequence: + tpowers = (t ** i for i in range(n)) + upowers = ((1 - t) ** i for i in range(n - 1, -1, -1)) + coefs = [c * a * b for c, a, b in zip(combinations, + tpowers, upowers)] + result.append(coefs) + self.beziers[n] = result + return result + + +class Captcha(object): + """验证码""" + + def __init__(self, width, height, fonts=None, color=None): + self._image = None + self._fonts = fonts if fonts else \ + [os.path.join(os.path.dirname(__file__), 'fonts', font) + for font in ['Action.ttf', 'Silom.ttf', 'Verdana.ttf']] + self._color = color if color else random_color(0, 200, random.randint(220, 255)) + self._width, self._height = width, height + + @classmethod + def instance(cls, width=200, height=75): + if not hasattr(Captcha, "_instance"): + cls._instance = cls(width, height) + return cls._instance + + def background(self): + """绘制背景""" + Draw(self._image).rectangle([(0, 0), self._image.size], + fill=random_color(230, 255)) + + def smooth(self): + """平滑图像""" + return self._image.filter(ImageFilter.SMOOTH) + + def curve(self, width=4, number=6, color=None): + """绘制曲线""" + dx, height = self._image.size + dx /= number + path = [(dx * i, random.randint(0, height)) + for i in range(1, number)] + bcoefs = Bezier().make_bezier(number - 1) + points = [] + for coefs in bcoefs: + points.append(tuple(sum([coef * p for coef, p in zip(coefs, ps)]) + for ps in zip(*path))) + Draw(self._image).line(points, fill=color if color else self._color, width=width) + + def noise(self, number=62, level=2, color=None): + """绘制扰码""" + width, height = self._image.size + dx, dy = width / 10, height / 10 + width, height = width - dx, height - dy + draw = Draw(self._image) + for i in range(number): + x = int(random.uniform(dx, width)) + y = int(random.uniform(dy, height)) + draw.line(((x, y), (x + level, y)), + fill=color if color else self._color, width=level) + + def text(self, captcha_text, fonts, font_sizes=None, drawings=None, squeeze_factor=0.75, color=None): + """绘制文本""" + color = color if color else self._color + fonts = tuple([truetype(name, size) + for name in fonts + for size in font_sizes or (65, 70, 75)]) + draw = Draw(self._image) + char_images = [] + for c in captcha_text: + font = random.choice(fonts) + c_width, c_height = draw.textsize(c, font=font) + char_image = Image.new('RGB', (c_width, c_height), (0, 0, 0)) + char_draw = Draw(char_image) + char_draw.text((0, 0), c, font=font, fill=color) + char_image = char_image.crop(char_image.getbbox()) + for drawing in drawings: + d = getattr(self, drawing) + char_image = d(char_image) + char_images.append(char_image) + width, height = self._image.size + offset = int((width - sum(int(i.size[0] * squeeze_factor) + for i in char_images[:-1]) - + char_images[-1].size[0]) / 2) + for char_image in char_images: + c_width, c_height = char_image.size + mask = char_image.convert('L').point(lambda i: i * 1.97) + self._image.paste(char_image, + (offset, int((height - c_height) / 2)), + mask) + offset += int(c_width * squeeze_factor) + + @staticmethod + def warp(image, dx_factor=0.3, dy_factor=0.3): + """图像扭曲""" + width, height = image.size + dx = width * dx_factor + dy = height * dy_factor + x1 = int(random.uniform(-dx, dx)) + y1 = int(random.uniform(-dy, dy)) + x2 = int(random.uniform(-dx, dx)) + y2 = int(random.uniform(-dy, dy)) + warp_image = Image.new( + 'RGB', + (width + abs(x1) + abs(x2), height + abs(y1) + abs(y2))) + warp_image.paste(image, (abs(x1), abs(y1))) + width2, height2 = warp_image.size + return warp_image.transform( + (width, height), + Image.QUAD, + (x1, y1, -x1, height2 - y2, width2 + x2, height2 + y2, width2 - x2, -y1)) + + @staticmethod + def offset(image, dx_factor=0.1, dy_factor=0.2): + """图像偏移""" + width, height = image.size + dx = int(random.random() * width * dx_factor) + dy = int(random.random() * height * dy_factor) + offset_image = Image.new('RGB', (width + dx, height + dy)) + offset_image.paste(image, (dx, dy)) + return offset_image + + @staticmethod + def rotate(image, angle=25): + """图像旋转""" + return image.rotate(random.uniform(-angle, angle), + Image.BILINEAR, expand=1) + + def generate(self, captcha_text='', fmt='PNG'): + """生成验证码(文字和图片)""" + self._image = Image.new('RGB', (self._width, self._height), (255, 255, 255)) + self.background() + self.text(captcha_text, self._fonts, + drawings=['warp', 'rotate', 'offset']) + self.curve(), self.noise(), self.smooth() + image_bytes = BytesIO() + self._image.save(image_bytes, format=fmt) + return image_bytes.getvalue() + + +def pascal_row(n=0): + """生成Pascal三角第n行""" + result = [1] + x, numerator = 1, n + for denominator in range(1, n // 2 + 1): + x *= numerator + x /= denominator + result.append(x) + numerator -= 1 + if n & 1 == 0: + result.extend(reversed(result[:-1])) + else: + result.extend(reversed(result)) + return result + + +def random_color(start=0, end=255, opacity=255): + """获得随机颜色""" + red = random.randint(start, end) + green = random.randint(start, end) + blue = random.randint(start, end) + if opacity is None: + return red, green, blue + return red, green, blue, opacity +``` + +下面的视图函数用来生成验证码并通过HttpResponse对象输出到用户浏览器中。 + +```Python +ALL_CHARS = '0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ' + + +def get_captcha_text(length=4): + selected_chars = random.choices(ALL_CHARS, k=length) + return ''.join(selected_chars) + + +def get_captcha(request): + """获得验证码""" + captcha_text = get_captcha_text() + image = Captcha.instance().generate(captcha_text) + return HttpResponse(image, content_type='image/png') +``` + +生成的验证码如下图所示。 + +![](./res/captcha.png) + +为了验证用户提交的登录表单,我们再定义个表单类。 + +```Python +class LoginForm(forms.Form): + username = forms.CharField(min_length=4, max_length=20) + password = forms.CharField(min_length=8, max_length=20) + captcha = forms.CharField(min_length=4, max_length=4) + + def clean_username(self): + username = self.cleaned_data['username'] + if not USERNAME_PATTERN.fullmatch(username): + raise ValidationError('无效的用户名') + return username + + def clean_password(self): + return to_md5_hex(self.cleaned_data['password']) +``` + +跟之前我们定义的注册表单类略有区别,登录表单类直接继承自Form没有跟模型绑定,定义了三个字段分别对应登录表单中的用户名、密码和验证码。接下来是处理用户登录的视图函数。 + +```Python +def login(request): + hint = '' + if request.method == 'POST': + form = LoginForm(request.POST) + if form.is_valid(): + username = form.cleaned_data['username'] + password = form.cleaned_data['password'] + user = User.objects.filter(username=username, password=password).first() + if user: + return redirect('/') + else: + hint = '用户名或密码错误' + else: + hint = '请输入有效的登录信息' + return render(request, 'login.html', {'hint': hint}) +``` +需要指出,上面我们设定用户登录成功时直接返回首页,而且在用户登录时并没有验证用户输入的验证码是否正确,这些我们留到下一个单元再为大家讲解。 \ No newline at end of file diff --git a/Day41-55/res/captcha.png b/Day41-55/res/captcha.png new file mode 100644 index 0000000000000000000000000000000000000000..59b8065e0ca04a9802314177cb27cc9b17e58cf2 GIT binary patch literal 6392 zcmVzd5Otxk7MKa(VoPU%S>QaE zLS5IH5>v{S>yo;9W!dF+K?o=8vtO(0x{l-cgx!uk`Ue(MBi5OosVItEndb_;A~tkY zZ#G)Hn}^|q5(xPX2E(*O0sv^5R;@}dmvf4JE-(ttL1VFHHglM(GO||F%`Rgg?lF?a z{9!4#U%&}G6b??(c@M2qhv{OHRjb;iPptX6KGE{NSjxsS)ecC#9+?Tjuh~ zqL{A%2rRV8x8e$f{S-xMn$}PosRxBZvN$2Jx*>{U@@^g=007AB<(dsG91Tya^Eu;8 zjAY9!R~G7W-Q}h24!hNAotrVx!JIUfqA2O344bQ{l?H&&y+rw=KA+FqHmVE;!}4k@ zbuTYuC642#wQ^N>5xnb}RI)XRQQE{hM{P0Fp*fDvr}BKR+Nfy|LV!VLU$D4HyW2`R z?a^3dc0>1L%3fjr#FAyXRA5ReR$>%`8MnF3*FW~`z|Y=#{Z6$Y`!BdxFRYLxIk^nq zz4h|Zc1p-ft>%+^gg6Xc^jx^SK6d9b!YB%9cpIj~r1x{xlH6*vjCO;~Z8lj*UDt)8 z)Tn9(3$gK$HK)@#xqCDsW~;FTLC7BEE5)iRHH}u>x8e?j{U^0VEdT(JxEeuBM=F}8 zuf0Iuc^IKfDQlv z2q9O*G4;rk)8(`W%wk?{zf5lCGmi?N`u&ejafow)uItJDv{aUTao75#wIL79X0wG? zf@&=(6h%2EcYi58Oq$konx@85RaFow&4y;STAWUL$a22FbCBC9HI)_sprc3t00n#Kj9k$03(aFPCr%t{=FkrD-g#4qX@?=ef5boUFcLiyG z$Zs8O-k&>awVKFQW0%6?F~b}5=C+w)x-?T_O{B3nj!*8UjU*wmwU&m0YhKz#7qg`* zE75+c!c^;`rYTK;0E7Sm6u977NyIvOt5_^$5Arou@vpjvyDC!$$MJjj4y01ObH(B& zKl)=kB4%_TbTjpWmsF4K#B80lXGmL<&1PFpEa_S+o6c#PHqot|5zFz|CqDB6MjX4YwQ{|fE=iI!PchC4 z2%)AlYh3;C@lpS~Y?)1NXV{bo5I`+ZE7#ein9mk^nmPS6hC{Z%&rZ%MWRQlI0%nRl zc#u>o>Jy_F0)qwj#oa3#OVLxD+y5A}mO9zjV5~HAIR|H2#Y@U~8xx1yu=SDiJvC6ch>c z2w$=?Jr{4hb~~`*iLb4U(P1{7-G1w+{Xa&)!VcS1b;6AQ>SqUsQB+kem&yVwN?h&o zM=k;YcvcYDN^C7U(B0E@-Dov9Je0vyFXfrG6WvakJbILo*(aM<5JCVE6|@2XBu36> z3f-FxHk*ww;{bqee`~s!T7Y!8t1rv){^P?cD|;d|0DwvI!8LF9H>YXZ&HuZjR<)U0 zl>NAO>p`U;X>zZMvU*G#&nM36$?LlQ^Z&i6tF4~vHlOLaU%57L&fL58fJ=$(ZE}bK z)H?o1BoXRQBC5%9E|oW$3?ykhc#!tT+^g$xro`;tIaI}FcNhgDVDw7BAM$0Bxu({P zUs&nhCEUDmPZrh0v&&we_e}RVBIb0M!eX&R8P%GDO{qX*c*KUcTIC{4`kM>$xFRK6qv5n|S zniyhGZ$9}5>iQ^zFc=E-w>Oa_hCz{&+#a`?B2)MCY?)2%W$U8W%_;x@hC_i7)w=3% zQ5cT*n6Osb3IH$|r`ouuBpisMFnGiQK&jSPLKfUNBJz7qp#8JcP$o6Vq^8q!&_f``3oQa zz2~MLeJB=76|Pb#Rn?lN$<33RefMks+WzNj|Mn+mirLm`ay!)0bKPJvP}E>{8Vm-l zK0p$L(9%Zeq=6cZhKV9Yp-MR@%4@5Y>!?F32uzg0v*Zj#gE)?}Wp4LovMx4AtD*aO z;y7LtWTXS07iM%IVBY5n-5ys%)eavgV=GIf&A=Q9-D{1(VDPRuF(WMGi_;oWRaK_M z+!82?(KyG6Yt=D{IR(o6T%CN1|bZ#MG+h3A?%(uP6!t00PLD zXBBan_hAZ>Bwaoyn-=cgyl-<_n_6r8&R%pq6bL@CC%gf-Tv6B@7h7JMd^lN__a7f| z=}Jp$0R;NA$$J1HM4<2uK+4;b9jX z$2YEB*sR@`*#?BrXeXQ@YH79CMNn0hFc7#AYc=093TYxWMfWVzvx~f+1F;~4!Kk0l zRmw^J`mbHlt~As43uUI<_In|OzJNF5Dkz+q%jP@&HdA5%0HgcHnRNDGGkv_-d@`#D z61V%zPCrf2l*2)d7f9n7Vc>Q53e{1@JrD$;bjbDFWVjLY_&ukNNRp%{;>yV-jKIR{ z{$M!JujF)Hud+4LZsNKq$KY zo?uufj`O|S-x_6<@o;WO?Bf?!^yYp!$Jr@+BoQj4N<1fY9#AkGP-^wUZn?%P&3dbZ za{vGfZDNji0QQ#GmIj)`ilP+rC4s5%>FVj`IRtjE*&T8Y*Mg%YSQhey;ttn;9RcJE z4(=R6$fQ{a;dj3J{q~hM7Xbh^uX)5hC6XjhQilKlQ4}+Kc@sstJcIp!YNa~6M6~lE zmZB(Tv)Lc@?Y?t(_&7-z@Jd!f2z3m0k|ftJt=VZCSL97rG7<|Haz!I)WD6XhtB~eG z&wdL+D4#22c60Tr*3w$1vdUn=m#&07KF{PiSh}v~kBZ$!Rp+gi-a5%2R1^gcicJ6j z2qQj*?(CTWilQ9tq#D&`aK+an!z(wxdH1JVgb}klMh(%8fw>Y(6vfO@Zh38KYjekF zGD>W%QENgBxWY7MzyJWMdYn9i<9H+*j=Y;=(`J&zYWdP1eXV_^TZKG+u*2snN~M88 zY~Z&A0Dus-P>V3)RM2|;g=a>T`P9H~v)Qbc<$-Uxq7;T<19hG#R@?t{6A=IaATW@I z;U~040YZpNiKN5WZ=N4+B|!^00=CIV8G^YIE1xbf2V8NFCGAEG$CfUJ$_38mu=+#3 zjjI<%>7hTGr|bHypKaFIdOKa`L{?!CGeB3!5m@qjPB@6xk5SgaT1_U5cn?1ygt!U% zBi@s0oHXig(ZuCgF|M+nIg_ZuT#`Yphm~cosZX1*W@hmVtLA4L#Ac8|4f zz4en)*L9Jv>Wu*lc2jNHY~v8C8^vOYFc9uO(+VM!%jA`c>Im5Ufx#z-r-iu^%SKsC zfKw$cdyt=BVNusw8_!&#xkcUfp}8QmOp(Ki@pKn{M?bsC2{TGr2>~rIqO9p@bnA z>?j~;FrF9_x$)X92rx8A&AOxXc%IrZ(O>?8JzyT_EoP7M5~En%=4P{b(vvS1O8@}7 z-DWnMCwXY|BNl|v<8w1^_HX{+AKF*G^`pO9j>o#UJ31WVI1aUtz*Ux3q6a&NF0V7S zmkqB3m^_Q&aOdHEagS?8bm!0w)b(qtqaP;gnW-lw?R1*Gy7!8vY4>kE5;9UhLvRuc zuMDWi#FUu2qT&X8pe<-|lhKt^Y=cu(3j!z%yi9_9^3Lp$pR!?1e2E>)%Ec19M|W_>`I3gVEo83&qxqpVY}?!A&pXZLTXJTbc8 zx&i<+wI)Eo6{h`xUL)ku>-+Bt0Za~~rs}Gw87;~rwGQT8+_s%WyYsL#=+xuLWPh1X5BV`itZE@-$BTD=y%p-YTnq6`>;TOFnvuUK7{Iwq4wliqA$*l{u$#GxZ(y?8b8 z;>MT9kmn>#Fho`8y8iIa*5Cc%x5pR`^i3oHfWd4a@Nr`9ZDDqACC#)k5*uKm6>`NI ztLTl^-py2JGu~jq!|}jLg*p8}uTZSis492DQ%<_e5m}?(Lja$g}$Vn>X(9 z87cl;q+j77gmxeA757<9)o}u|dCg9r!x!+L8qfR1k8jDmdhOGf#^csg`2zx~suuFa zzxd6UPi;BVx52)IPg!_9T+AWlnGCo@G}*t0oD1TI?1Ui4s?9 zXxcA1v4&HsTW!?J^}5)Y`UXx9Ufp{IAyg_c#dN8mXfmfl9B7J;8!@wkbcblS&&3qj z&NeWP4fRchk?y={sP8LHxS(F&X6Pf7rb`Nx2x7sZLfEuTc7bJZO zmcrqD>deJkuixnugY1B$2s&U7FNY>6yLBp5Rc-2eI|JwTTX)?-r_(iN0KFTtb8Lqz zuwt=P&a*;6Y*$RV{Heqk`)}`SVhwq+{f~y@_+qxi=PK=bZr$+29b=cDJa^23UPFlW z_Rnrti(NGxAc$P?jZtLk{Yb14Rn$okMe)`T@Aq6J%(&fW@khK<{N;-t%(D{dgly}V zP!z>tj;S!BSdhD;(-;B0ar*MLOJ^P8{bFOC`lLqxwyaib07irqE3nu^XRt9-KR z|J;Ch;8Tb8)5xT=yKg6#t^_h$MTo&~f8}4!)Jgld9oPadF-m{Ei8fj~GTX+<2Rvtu zHOkBzTLI|0zIo$*C3Ad~9wVSLYJc{_SI6t{{f6Dg`*m5pcs228^RbYvE? zj^_)4&1G$9nkV3rg}Nl1STau6^~d+OMW&_&c+c^>IO#a<0;PJTq34W3UqaKWCs?W}%ce$LLk1srC`CK&`kEmjk&GE~t z$B8b2Ae8cqSeB|K8J!yBg23iAIlOjn&^whfAu}h|sTp(g0gmHSWYxK#hoc6Ap|d;m z&u@Oi>@wCkHF=oAFpMqmHAZQ^YmfJAU-rDj2)NPpE1}cEIoMcF#g8AIiucuB{OQNP z{n@Uv1-mYTQ0E@BNHY<7U}~VSUsl1wfKz6_6@=NaZ6``(ZO+i<{&$;@G}6w z>LLBh-q{tw8iM!Bmd*m>!R2z2CUOt$vxiSAZkikhhu`k@J3F=P&IJo%J@v3!EX{`Q zUZGq*=S=PKGhwk5E-(|!yK3?R9}p~vwZKfUAl3pi!T$rBlSxMJ%vE9l0000