Utils.psm1

Import-Module $PSScriptRoot\ClusUtils.psm1
Import-Module $PSScriptRoot\Logger.psm1
Import-Module $PSScriptRoot\PsHelper.psm1

function Copy-FileToRemote {
    param(
        [parameter(Mandatory=$true)][string] $srcPath,
        [parameter(Mandatory=$true)][string] $srcFile,
        [parameter(Mandatory=$true)][string] $destMachine,
        [parameter(Mandatory=$true)][pscredential] $destMachineCred,
        [parameter(Mandatory=$true)][string] $destDirectory
    )

    $s = New-ReliablePsSession -ComputerName $destMachine -Credential $destMachineCred
    try {
        $fileExist = Invoke-Command -Session $s -ScriptBlock {
            param($destDirectory, $destFile)
            if (-not $(Test-Path $destDirectory)) {
                New-Item $destDirectory -ItemType Directory -Force -ErrorAction Stop | Out-Null
                return $false
            } 
            $dest = Join-Path $destDirectory $destFile 
            Test-Path $dest        
        } -ArgumentList ($destDirectory, $srcFile) -ErrorAction Stop

        if ($fileExist) {
            return
        }
        $src = Join-Path $srcPath $srcFile
        if (Test-IsCsvPath -path $destDirectory) {
            Copy-Item -Path $src -Destination $destDirectory
            return
        }
        $fileSharePath = Join-Path "\\$destMachine" $destDirectory.Replace(":","$")
        if (Test-Path $fileSharePath) {
            Copy-Item -Path $src -Destination $fileSharePath
            return
        }
        Copy-Item -Path $src -Destination $destDirectory -ToSession $s
        
    } finally {
        if ($s -ne $null ) {
            $s | Remove-PSSession
        }
    }
}

function Test-FileExist {

    param(
        [parameter(Mandatory=$true)][string] $path
    )

    if (-not $(Test-Path $path)) {
        throw "File $path not found"
    }
}

function Test-VMSwitchExist {
    param(
        [array] $computerName,
        [pscredential] $credential = [pscredential]::Empty,
        [string] $switchName
    )

    $err = Invoke-Command -ComputerName $computerName -credential $credential -ScriptBlock {
        param($switchName)

        if($(Get-VMSwitch -Name $switchName -ErrorAction SilentlyContinue) -eq $null) {
            return "$(hostName)"
        }
    } -ArgumentList $switchName -ErrorAction Stop

    if ($err -ne $null) {
        throw "Switch $switchName not found on host(s) $err"
    }
}

function Test-InternetConnectivity {

    param (
        [string] $computerName = (hostname),
        [pscredential] $credential = [pscredential]::Empty,
        [string] $srcAddress
    )

    Write-TraceLog "Test-InternetConnectivity: Testing on $computerName from $srcAddress"

    $result = Invoke-ReliableCommand -ComputerName $computerName -Credential $credential -ScriptBlock {
        param($srcAddress)

        $destIP = (Resolve-DnsName bing.com -Type A -ErrorAction SilentlyContinue | Select -First 1).IPAddress

        if ($destIP -eq $null) {
            return $false
        }

        if ([string]::IsNullOrEmpty($srcAddress)) {
            $result = ping $destIP -n 2
        } else {
            $result = ping -S $srcAddress $destIP -n 2
        }

        if (($result | Select-String "unreachable" | Select -First 1) -ne $null) {
            return $false
        }

        return ($result | Select-String "Received = 0") -eq $null
    } -ArgumentList ($srcAddress)

    return $result -eq $true
}

function Resolve-InternetSwitch {
    param (
        [string] $computerName = (hostname),
        [pscredential] $credential = [pscredential]::Empty
    )

    $switches = Invoke-ReliableCommand -ComputerName $computerName -Credential $credential -ScriptBlock {
        $switches = (Get-VMSwitch).Name
        return $switches
    }

    foreach ($s in $switches) {
        Write-TraceLog "Resolve-InternetSwitch: Checking switch $s on computer $computerName"

        $ips = Invoke-ReliableCommand -ComputerName $computerName -Credential $credential -ScriptBlock {
            param($s)
            $nics = (Get-VMNetworkAdapter -SwitchName $s -ManagementOS).name
            $allProbableOutBoundIPs = @()
            foreach ($n in $nics) {                 
                $adapter = Get-NetAdapter | Where-Object {$_.Name -like "*$n*" -and $_.Status -eq "up"};  
                
                if ($adapter -eq $null) {
                    continue
                }
                
                $ip = (Get-NetIPAddress -InterfaceIndex $adapter.ifIndex -AddressFamily IPv4 -ErrorAction SilentlyContinue | `
                    Where-Object {-not ($_.IPaddress.StartsWith("169"))}).IPAddress | Select -First 1
                    
                if ($ip -ne $null) {
                    $allProbableOutBoundIPs += $ip
                }
            }    
            return $allProbableOutBoundIPs   
        } -ArgumentList($s)
        
        foreach($ip in $ips) {
            $result = Test-InternetConnectivity -srcAddress $ip -computerName $computerName -credential $credential
            if ($result) {
                Write-TraceLog "Resolve-InternetSwitch: Switch $s on computer $computerName selected"
                return $s
            }
        }
    }

    Write-TraceLog "Resolve-SdnSwitch: No suitable internet switch found on computer $computerName"
}

function New-InternetSwitch {
    param (
        [string] $computerName = (hostname),
        [pscredential] $credential = [pscredential]::Empty,
        [string] $name 
    )

    $iswitch = Resolve-InternetSwitch -computerName $computerName -credential $credential

    if ($iswitch -ne $null) {
        return $true
    }

    $ifIndex = Get-InternetAdapterIndex -computerName $computerName -credential $credential

    if ($ifIndex -eq $null) {
        return $false
    }

    $scriptBlock = {
        param($ifIndex, $name)
        $ifdesc = (Get-NetAdapter -InterfaceIndex $ifIndex).InterfaceDescription
        # remove any existing switch with the same name, in case there is a stale one
        remove-vmswitch -name $name -ErrorAction SilentlyContinue
        new-vmswitch -Name $name -InterfaceDescription $ifdesc | out-null
    } 

    Invoke-ReliableCommand -ComputerName $computerName -credential $credential `
        -ScriptBlock $scriptBlock -ArgumentList @($ifIndex, $name)

    return $true

}
function Resolve-SdnSwitch {
    param (
        [string] $computerName = (hostname),
        [pscredential] $credential = [pscredential]::Empty
    )

    $result = Invoke-ReliableCommand -ComputerName $computerName -Credential $credential -ScriptBlock {

        $allSwitches = Get-VMSwitch -ErrorAction SilentlyContinue
        foreach ($s in $allSwitches) {
            foreach($e in $s.Extensions) {
                if ($e.Name -eq "Microsoft Azure VFP Switch Extension" -and $e.Enabled -eq $true) {
                    $sdnSwitch = $s.Name
                }
            }
        }
        
        # if there is VFP enabled switch, use it
        if (-not [String]::IsNullOrEmpty($sdnSwitch)) {
            return $sdnSwitch, "VFP"
        }            

        # if there is a switch on mellanox nic, use it. A common pattern for test setups.
        $sdnSwitch = ($allSwitches | `
            Where-Object { $_.NetAdapterInterfaceDescriptions -ilike "*Mellanox*" }).Name
        
        if (-not [String]::IsNullOrEmpty($sdnSwitch)) {
            return $sdnSwitch, "MellanoxNic"
        }

        # best effort, a common pattern for naming sdn switch in test setups.
        $sdnSwitch = ($allSwitches | `
            Where-Object {$_.Name -ilike "*sdnswitch*"}).Name

        if (-not [String]::IsNullOrEmpty($sdnSwitch)) {
            return $sdnSwitch, "NamePattern"
        }
        
    }   
    
    if ($result -ne $null -and -not [String]::IsNullOrEmpty($result[0])) {
        Write-TraceLog "Resolve-SdnSwitch: Selected $($result[0]) on computer $computerName, Reason $($result[1])"
        return $result[0]
    }

    Write-TraceLog "Resolve-SdnSwitch: No suitable sdn switch found on computer $computerName"
}

function New-SdnSwitch {
    param (
        [string] $computerName = (hostname),
        [pscredential] $credential = [pscredential]::Empty,
        [string] $name 
    )

    $sdnswitch = Resolve-SdnSwitch -computerName $computerName -credential $credential

    if ($sdnswitch -ne $null) {
        return $true
    }

    $scriptBlock = {
        param($name)

        $mellanoxNic = (Get-NetAdapter -InterfaceDescription *Mellanox* | Sort-Object -Property InterfaceDescription | Where-Object {$_.Status -eq "Up"} | Select-Object -Last 2).InterfaceDescription
                
        if ($mellanoxNic -eq $null) {
            return $false
        }

        remove-vmswitch -name $name -ErrorAction SilentlyContinue
        new-vmswitch -Name $name -InterfaceDescription $mellanoxNic | out-null
        return $true
    } 

    $result = Invoke-ReliableCommand -ComputerName $computerName -credential $credential `
        -ScriptBlock $scriptBlock -ArgumentList @($name)

    return $result

}

function Disable-LinkLocalNics {
    param (
        [string] $computerName = (hostname),
        [pscredential] $credential = [pscredential]::Empty
    )

    $scriptBlock = {
        $indexes = (Get-NetIPAddress | Where-Object {$_.IPaddress.StartsWith("169") }).InterfaceIndex

        foreach($index in $indexes) {
            $netAdapter = Get-NetAdapter -InterfaceIndex $index -ErrorAction SilentlyContinue
            
            if ($netAdapter.Name -ilike "*SMB*") {
                continue
            }

            if ($netAdapter -ne $null) {
               $netAdapter | Disable-NetAdapter -ErrorAction SilentlyContinue -Confirm:$false
            }
        }
    }

    Invoke-ReliableCommand -computerName $computerName -credential $credential -scriptblock $scriptBlock
}

function Get-InternetAdapterIndex
{
    param(
        [array]$computerName,
        [pscredential] $credential = [pscredential]::Empty
    )

    $scriptBlock = {
        $retry = 0
        while ($true) {
            try {
                $dnsRes = Resolve-DnsName bing.com -Type A -ErrorAction Stop -DnsOnly | select -First 1
                break
            } catch {
                if ($retry -lt 3) { 
                    $retry++ 
                    Write-Error "Failed to resolve dns, retrying"
                    Start-Sleep 1
                    continue
                }
                Write-Error "Failed to resolve dns halting. Make sure the machine has internet access"
                Write-Error $_ -ErrorAction Stop
            }
        }

        
        $ip = $dnsRes.IpAddress
        $corpInterface = (Test-NetConnection -ErrorAction SilentlyContinue).InterfaceAlias
        
        if ($corpInterface -eq $null) {
            $connect = Test-NetConnection -ComputerName $ip -Port 80
            $corpInterface = $connect.InterfaceAlias
        }

        $adapter = Get-NetAdapter -Name $corpInterface -ErrorAction Stop
        return $adapter.ifIndex
    }

    $index = Invoke-ReliableCommand -computerName $computerName -credential $credential -scriptblock $scriptBlock
    return $index
    
}

function Update-CorpNicDnsServerAddress
{
    param(
        [array]$hosts,
        [pscredential] $credential = [pscredential]::Empty,
        [array] $dnsServers
    )

    if ($dnsServers -eq $null -or $dnsServers.Count -eq 0) {
        return
    }
    
    $updateDns = {
        param(
            $index,
            [array]$dnsServers
        )
        Set-DnsClientServerAddress -ServerAddresses $dnsServers -InterfaceIndex $index -ErrorAction Stop -Verbose
    } 

    $getIfIndex = {
        [array]$ifIndexes = (Get-DnsClientServerAddress | `
            Where-Object  { $_.AddressFamily -eq 2 -and $_.ServerAddresses.Count -gt 0}).InterfaceIndex | `
            Select-Object -Unique
        return $ifIndexes
    }

    $hosts | ForEach-Object {
        Write-TraceLog "Update-CorpNicDnsServerAddress: Host ($_), fetching adapters to update"
        $ifIndexes = Invoke-ReliableCommand -computerName $_ -credential $credential -scriptblock $getIfIndex
        foreach($ifIndex in $ifIndexes) {       
            Write-TraceLog "Update-HostDnsServerAddress: Host ($_) adapter $ifIndex with dns $dnsServers"
            Invoke-ReliableCommand -computerName $_ -credential $credential -scriptblock $updateDns -ArgumentList @($ifIndex, $dnsServers)
        }
    }
}

function Get-NextMacAddress
{
    param(
        [String] $MacAddress
    )

    return ("{0:X12}" -f ([convert]::ToInt64($MacAddress.ToUpper().Replace(":", "").Replace("-", ""), 16) + 1)).Insert(2, "-").Insert(5, "-").Insert(8, "-").Insert(11, "-").Insert(14, "-")
}

function Restart-LanmanWorkstationService {

    Write-TraceLog "Restart-LanmanWorkstationService: Restarting LanmanWorkstation service"
    Get-SmbMapping | Remove-SmbMapping -Force | Out-Null
    Restart-Service LanmanWorkstation -Force | Out-Null

    $notStarted = $true
    $retryCount = 10
    while($notStarted) {
        $retryCount--
        Write-TraceLog "Restart-LanmanWorkstationService: Waiting for LanmanWorkstation service to start"
        Start-Sleep 5
        $notStarted = (get-service LanmanWorkstation).Status -ne "Running"

        if ($retryCount -lt 0) {
            throw "Restart-LanmanWorkstationService: Failed waiting for LanmanWorkstation service to start"
        }
    }
}

function Connect-SMBShare {
    param (
        [Parameter(Mandatory=$true)] [pscredential] $Credential,
        [Parameter(Mandatory=$true)] [string] $RemotePath,
        [Parameter(Mandatory=$false)] [switch] $RestartLanManServer
    )

    Write-TraceLog "Connect-SMBShare: Connecting to $RemotePath, User: $($Credential.UserName)"
    # net use sometimes hung with multiple connections etc, restart the service to fix it

    if ($RestartLanManServer.IsPresent) {
      Restart-LanmanWorkstationService
    }

    $retry = $true
    while($true) {
        try {
            New-SmbMapping -RemotePath $RemotePath -UserName $($Credential.UserName) -Password $($Credential.GetNetworkCredential().Password) -Persistent $true | Out-Null
            break
        } catch {
 
            Write-TraceLog "Connect-SMBShare: Failed to connect to $RemotePath"
            Write-TraceLog "Connect-SMBShare: Error $_"
            if ($_.Exception.Message -like "*Multiple connections to a server*" -and $retry) {
                $retry = $false
                Write-TraceLog "Connect-SMBShare: restarting lanmanworkstation service and retry"
                Restart-LanmanWorkstationService
                continue
            }

            return $false
        }
    }

    if($(Test-Path  $RemotePath)) {
        Write-TraceLog "Connect-SMBShare: Connected to $RemotePath"
    } else {
        Write-TraceLog "Connect-SMBShare: Failed to connect to $RemotePath"
        return $false
    }

    return $true
}

function Get-VMHostName {
    param (
       [Parameter(Mandatory=$true)] [array] $Computers,
       [Parameter(Mandatory=$true)] [pscredential] $Credential,
       [Parameter(Mandatory=$true)] [string] $VMName
       )

   foreach($c in $Computers) {
       $scriptBlock = {
           param($VMName)
           $vm = Get-VM -Name $VMName -ErrorAction SilentlyContinue
           return ($vm -ne $null)
       }

       $result = Invoke-ReliableCommand -ComputerName $c -Credential $Credential -ScriptBlock $scriptBlock -ArgumentList $VMName 

       if ($result) {
           return $c
       }
   }

   return $null
}

function Install-SshKey {
    param(
        [Parameter(Mandatory=$true)] [array] $Computers,
        [Parameter(Mandatory=$true)] [pscredential] $Credential,
        [Parameter(Mandatory=$true)] [string] $SshKey,
        [Parameter(Mandatory=$true)] [string] $KeyPath
    )

    $scriptBlock = {
        param($SshKey, $KeyPath, $KeyUser)
        $startLine = "-----BEGIN OPENSSH PRIVATE KEY-----`n"
        $endLine = "-----END OPENSSH PRIVATE KEY-----`n"
        
        $content = $startLine
        
        $SshKey.Replace(" ", "`n") | ForEach-Object { 
            $content+= $_ 
        }

        $content += "`n"
        $content += $endLine

        Remove-Item $KeyPath -ErrorAction SilentlyContinue
        $Utf8NoBomEncoding = New-Object System.Text.UTF8Encoding $False
        [System.IO.File]::WriteAllLines($KeyPath, $content, $Utf8NoBomEncoding)
        $acl = Get-Acl $KeyPath
        $acl.SetAccessRuleProtection($true,$false)
        $accessRule = New-Object System.Security.AccessControl.FileSystemAccessRule($KeyUser, "FullControl", "Allow")
        $acl.SetAccessRule($accessRule)
        $acl | Set-Acl $KeyPath
    }

    foreach($c in $Computers) {
        Invoke-ReliableCommand -ComputerName $c -Credential $Credential -ScriptBlock $scriptBlock -ArgumentList @($SshKey, $KeyPath, $Credential.UserName) | Out-Null
    }
}

function Enable-DefaultFirewallRules {
    param(
        [Parameter(Mandatory=$true)] [array] $ComputerName,
        [Parameter(Mandatory=$false)] [pscredential] $Credential = [pscredential]::Empty
    )

    foreach($c in $ComputerName) {
        Invoke-ReliableCommand -ComputerName $c -Credential $Credential -ScriptBlock {
            Import-Module NetSecurity
            Set-NetFirewallRule -Name "FPS-*" -enabled True
        }
    }
}

function Remove-NCResources {
    param(
        [Parameter(Mandatory=$true)] [string] $NCUri,
        [Parameter(Mandatory=$false)] [pscredential] $Credential = [pscredential]::Empty
    )

    Write-TraceLog "Remove-NCResources: Removing NC resources"
    $nics = Get-NetworkControllerNetworkInterface -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException

    foreach($nic in $nics)
    {
        if ($nic.ResourceId -ilike "*gw*backend" -or  $nic.ResourceId -ilike "*gw*frontend") {
            continue
        }
        
        Write-TraceLog "Remove-NCResources: Removing nic $($nic.ResourceId)"
        Remove-NetworkControllerNetworkInterface -ConnectionUri $NCUri -ResourceId $nic.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException
    }


    $vnets = Get-NetworkControllerVirtualNetwork -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException
    foreach($vnet in $vnets)
    {
        Write-TraceLog "Remove-NCResources: Removing vnet $($vnet.ResourceId)"
        Remove-NetworkControllerVirtualNetwork -ConnectionUri $NCUri -ResourceId $vnet.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException
    }

    $lbs = Get-NetworkControllerLoadBalancer -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException
    foreach($lb in $lbs)
    {
        Write-TraceLog "Remove-NCResources: Removing lb $($lb.ResourceId)"
        Remove-NetworkControllerLoadBalancer -ConnectionUri $NCUri -ResourceId $lb.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException
    }

    $vgs = Get-NetworkControllerVirtualGateway -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException

    foreach($vg in $vgs)
    {
        Write-TraceLog "Remove-NCResources: Removing vg $($vg.ResourceId)"
        Remove-NetworkControllerVirtualGateway -ConnectionUri $NCUri -ResourceId $vg.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException
    }

    $firewalls = Get-NetworkControllerAccessControlList -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException

    foreach($rule in $firewalls) {
        Write-TraceLog "Remove-NCResources: Removing firewall $($rule.ResourceId)"
        Remove-NetworkControllerAccessControlList -ConnectionUri $NCUri -ResourceId $rule.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException
    }

    $lnets = Get-NetworkControllerLogicalNetwork -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException

    foreach($lnet in $lnets) {
        if ($lnet.ResourceId -ieq "HNVPA" -or $lnet.ResourceId -ieq "PublicVip" -or $lnet.ResourceId -eq "PrivateVip") {
            continue
        }
        Write-TraceLog "Remove-NCResources: Removing lnet $($lnet.ResourceId)"
        Remove-NetworkControllerLogicalNetwork -ConnectionUri $NCUri -ResourceId $lnet.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException
    }

    $publicIps = Get-NetworkControllerPublicIPAddress -ConnectionUri $NCUri -ErrorAction SilentlyContinue -PassInnerException

    foreach($publicIp in $publicIps) {
        Write-TraceLog "Remove-NCResources: Removing public ip $($publicIp.ResourceId)"
        Remove-NetworkControllerPublicIPAddress -ConnectionUri $NCUri -ResourceId $publicIp.ResourceId -Force -ErrorAction SilentlyContinue -PassInnerException
    }

}

function Enable-HostStorageNetwork {

    <#
    .SYNOPSIS
    Enables RDMA on the host and creates vnics for RDMA traffic
    #>


    param(
        [Parameter(Mandatory=$true)] [Array] $ComputerName,
        [Parameter(Mandatory=$false)] [pscredential] $Credential = [pscredential]::Empty,
        [Parameter(Mandatory=$true)] [string] $switchName
    )

    $scriptBlock ={

        param($switchName)

        $team = Get-VMSwitch -name $switchName | Get-VMSwitchTeam -ErrorAction SilentlyContinue
        
        if ($team -eq $null) {
            return
        }

        $rdmaNics = Get-NetAdapter -ErrorAction SilentlyContinue | `
            Where-Object { $_.ComponentID -eq "vms_mp" } | `
            Get-NetAdapterRdma -ErrorAction SilentlyContinue | Where-Object {$_.Enabled -eq $True }
        
        if ($rdmaNics -ne $null -and $rdmaNics.Count -gt 0) {
            return
        }

        $state = (Get-WindowsFeature -Name "Data-Center-Bridging" ).InstallState

        if ($state -ne "Installed") {
            Install-WindowsFeature -Name "Data-Center-Bridging"
        }
        
        $nicDesc = $team.NetAdapterInterfaceDescription
        $nics = (Get-NetAdapter | Where-Object { $nicDesc -contains $_.InterfaceDescription }).Name
        
        $policy = Get-NetQosPolicy -Name "SMB" -ErrorAction SilentlyContinue
        if ($policy -eq $null) {
            New-NetQosPolicy "SMB" -NetDirectPortMatchCondition 445 -PriorityValue8021Action 3
            Enable-NetQosFlowControl -priority 3
        }
        $trafficClass = Get-NetQosTrafficClass "SMB" -ErrorAction SilentlyContinue
        if ($trafficClass -eq $null) {
            New-NetQosTrafficClass "SMB" -priority 3 -bandwidthpercentage 50 -algorithm ETS
        }

        Enable-NetAdapterQos -InterfaceAlias $nics
        Set-NetQosDcbxSetting -InterfaceAlias $_ -Willing $false -Confirm:$false

        $defaultPolicy = Get-NetQosPolicy -Name "DEFAULT" -ErrorAction SilentlyContinue
        if ($defaultPolicy -eq $null) {
            New-NetQosPolicy "DEFAULT" -Default -PriorityValue8021Action 0
            Disable-NetQosFlowControl -priority 0,1,2,4,5,6,7
        }

        Enable-NetAdapterRdma $nics

        $smbNic1 = Get-VMNetworkAdapter -Name "SMB1" -ManagementOS -ErrorAction SilentlyContinue
        if ($smbNic1 -eq $null) {
            Add-VMNetworkAdapter -SwitchName $switchName -Name "SMB1" -managementOS
        }

        $smbNic2 = Get-VMNetworkAdapter -Name "SMB2" -ManagementOS -ErrorAction SilentlyContinue
        if ($smbNic2 -eq $null) {
            Add-VMNetworkAdapter -SwitchName $switchName -Name "SMB2" -managementOS
        }

        Disable-NetAdapterBinding -Name "vEthernet (SMB1)","vEthernet (SMB2)" -DisplayName "Internet Protocol Version 4 (TCP/IPv4)"

        Enable-NetAdapterRDMA -Name "vEthernet (SMB1)","vEthernet (SMB2)"
    }

    foreach($c in $ComputerName) {
        Write-TraceLog "Enable-HostStorageNetwork: Enabling host storage network on $c, switch $switchName" 
        $s = New-ReliablePsSession -ComputerName $c -Credential $Credential
        Invoke-Command -Session $s -ScriptBlock $scriptBlock -ArgumentList @($switchName) | Out-Null
    }
}

function Invoke-PowershellCommandOnVm {
    param(

        [ValidateNotNullOrEmpty()]
        [string] $vmName,

        [ValidateNotNullOrEmpty()]
        [string] $hostName,

        [ValidateNotNullOrEmpty()]
        [string] $cmd,

        [pscredential] $hostCred,
        [pscredential] $vmCred
    )


    Invoke-PowershellCommandOnVmInternal -vmName $vmName `
         -hostName $hostName `
         -hostCred $hostCred `
         -vmCred $vmCred `
         -scriptBlock $scriptBlock `
         -cmd $cmd
}

function Get-HostProcessorCount {
    $logicalCores = ((Get-CimInstance -ClassName Win32_Processor).NumberOfLogicalProcessors | Measure-Object -Sum).Sum
    return $logicalCores
}

function Get-HostMemory {
    return [Math]::Round((Get-WmiObject -Class Win32_ComputerSystem).TotalPhysicalMemory / 1GB)
}

function Disable-IPv6AutoConfig {
    param(
        [Parameter(Mandatory=$true)] [array] $ComputerName,
        [Parameter(Mandatory=$false)] [pscredential] $Credential = [pscredential]::Empty
    )

    foreach($c in $ComputerName) {
        Write-TraceLog "Disable-IPv6AutoConfig: Disabling IPv6 on $c" 
        Invoke-ReliableCommand -ComputerName $c -Credential $Credential -ScriptBlock {
            [array]$interfaces = Get-NetIpInterface | Where-Object { $_.AddressFamily -eq "IPv6" -and $_.RouterDiscovery -eq "Enabled"}
            
            if ($interfaces.Count -eq 0) {
                return
            }

            foreach($iface in $interfaces) {
                
                if ($iface.ifIndex -eq 1) {
                    continue
                }

                Set-NetIpInterface -InterfaceIndex $iface.ifIndex -RouterDiscovery Disabled
            }
        }
    }
}

function Parse-TurnkeyBoolean {
    
    <#
    .SYNOPSIS
     Parses a string to a boolean value
    .Parameter value
    The string to parse
    #>


    param(
        [string] $value
    )

    if ($value -eq "true" -or $value -eq "1") {
        return $true
    }

    return $false
}
# SIG # Begin signature block
# MIIoQwYJKoZIhvcNAQcCoIIoNDCCKDACAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAn9hR415xgSFCa
# w5k16rfyX8X+Wgea2ovI0f7rGdtMM6CCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiMwghofAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILhOntrFO0RDIpWWHXy81rrn
# bpkID6eTvHIR7yBMVPfSMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAOPkrNTwg8aHJqfDWiqNwiWMrDak6OIniP+XhZIqG2AIqkTpKmPOoAwa1
# dk0IWLIjHQqmYWfAUoShN2rA/22lRK9KZM/9EYwYJRd+kaP3PZBDzxgMRgfGT4DL
# +gt3kGqN2F4BlE7zGQjYA9lbuqv6aBIDwEAg1l62C9HrP85g6HM5WKY+NuzqXeIo
# TM2hrZm1w6G4jsbVjCQ1ZQCfqA7yIlhQvC/9VzDYMuePeioBNpayB4I2jF7dwIWc
# PJtZ3FSDoxXhgtF4ICas0CbVM15IVl4G496KMcf7N4Y7Wz4hU16crU6iaqjyZNd+
# xi0mEoYKs7xinNRgA1oNqsGvxYZq0aGCF60wghepBgorBgEEAYI3AwMBMYIXmTCC
# F5UGCSqGSIb3DQEHAqCCF4YwgheCAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCAppD9+Wgs7pTCkOp9EGXa8/iyEJKuv6Ojs0Q+kegrwTAIGZ7YytWha
# GBMyMDI1MDMyMDIzNTUyMS44OTFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEfswggcoMIIFEKADAgECAhMzAAAB9oMvJmpUXSLBAAEAAAH2MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzEwNFoXDTI1MTAyMjE4MzEwNFowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjZCMDUt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA0UJeLMR/N9WPBZhuKVFF
# +eWJZ68Wujdj4X6JR05cxO5CepNXo17rVazwWLkm5AjaVh19ZVjDChHzimxsoaXx
# Nu8IDggKwpXvpAAItv4Ux50e9S2uVwfKv57p9JKG+Q7VONShujl1NCMkcgSrPdmd
# /8zcsmhzcNobLomrCAIORZ8IwhYy4siVQlf1NKhlyAzmkWJD0N+60IiogFBzg3yI
# SsvroOx0x1xSi2PiRIQlTXE74MggZDIDKqH/hb9FT2kK/nV/aXjuo9LMrrRmn44o
# YYADe/rO95F+SG3uuuhf+H4IriXr0h9ptA6SwHJPS2VmbNWCjQWq5G4YkrcqbPMa
# x7vNXUwu7T65E8fFPd1IuE9RsG4TMAV7XkXBopmPNfvL0hjxg44kpQn384V46o+z
# dQqy5K9dDlWm/J6vZtp5yA1PyD3w+HbGubS0niEQ1L6wGOrPfzIm0FdOn+xFo48E
# Rl+Fxw/3OvXM5CY1EqnzEznPjzJc7OJwhJVR3VQDHjBcEFTOvS9E0diNu1eocw+Z
# Ckz4Pu/oQv+gqU+bfxL8e7PFktfRDlM6FyOzjP4zuI25gD8tO9zJg6g6fRpaZc43
# 9mAbkl3zCVzTLDgchv6SxQajJtvvoQaZxQf0tRiPcbr2HWfMoqqd9uiQ0hTUEhG4
# 4FBSTeUPZeEenRCWadCW4G8CAwEAAaOCAUkwggFFMB0GA1UdDgQWBBRIwZsJuOcJ
# fScPWcXZuBA4B89K8jAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA13kBirH1cHu1
# WYR1ysj125omGtQ0PaQkEzwGb70xtqSoI+svQihsgdTYxaPfp2IVFdgjaMaBi81w
# B8/nu866FfFKKdhdp3wnMZ91PpP4Ooe7Ncf6qICkgSuwgdIdQvqE0h8VQ5QW5sDV
# 4Q0Jnj4f7KHYx4NiM8C4jTw8SQtsuxWiTH2Hikf3QYB71a7dB9zgHOkW0hgUEeWO
# 9mh2wWqYS/Q48ASjOqYw/ha54oVOff22WaoH+/Hxd9NTEU/4vlvsRIMWT0jsnNI7
# 1jVArT4Q9Bt6VShWzyqraE6SKUoZrEwBpVsI0LMg2X3hOLblC1vxM3+wMyOh97aF
# Os7sFnuemtI2Mfj8qg16BZTJxXlpPurWrG+OBj4BoTDkC9AxXYB3yEtuwMs7pRWL
# yxIxw/wV9THKUGm+x+VE0POLwkrSMgjulSXkpfELHWWiCVslJbFIIB/4Alv+jQJS
# KAJuo9CErbm2qeDk/zjJYlYaVGMyKuYZ+uSRVKB2qkEPcEzG1dO9zIa1Mp32J+zz
# W3P7suJfjw62s3hDOLk+6lMQOR04x+2o17G3LceLkkxJm41ErdiTjAmdClen9yl6
# HgMpGS4okjFCJX+CpOFX7gBA3PVxQWubisAQbL5HgTFBtQNEzcCdh1GYw/6nzzNN
# t+0GQnnobBddfOAiqkzvItqXjvGyK1QwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDVjCCAj4CAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo2QjA1LTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAFU9eSpdxs0a06JFIuGFHIj/I+36ggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOuG6kkwIhgPMjAyNTAzMjAxOTI2MDFaGA8yMDI1MDMyMTE5MjYwMVowdDA6
# BgorBgEEAYRZCgQBMSwwKjAKAgUA64bqSQIBADAHAgEAAgIcOTAHAgEAAgISlTAK
# AgUA64g7yQIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIB
# AAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQCbuB9Z+oEKThti
# CwXWRUZYwtD+ggodTzGzh06RCqRZtpYLcnZkQg9+REB+pMjyv48zTWEBBHPBuufu
# DiV1QiXMQlR+4C16LbGcBJFLacIeeA0D50atXGuQjHEn3xSlUmDFnV9rB14mC2dE
# 9rCkI49YmZ1v6k7AU1nWp03YGJE0dmMeY8SCJtL6NIMr/cDuBpwAaRpVvpIC5p1n
# 6SI3iVOye1V3Dvdeyin6WHQH9KtyW73+0GrKjKtTETGjDK4+CIwl49zVJmJnjbfS
# Zf9TGwk+jh4sINxcQZrdgS+5bDmuACeiAGF/uuu/ecdf8B4UHvvHhsUsTRu5KzSD
# z0qA1/2LMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAH2gy8malRdIsEAAQAAAfYwDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqG
# SIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgBU0M7/THs+g6
# GV6qRRZT7m1oojdgFhBMgMWXe4O+TKcwgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHk
# MIG9BCArYUzxlF6m5USLS4f8NXL/8aoNEVdsCZRmF+LlQjG2ojCBmDCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9oMvJmpUXSLBAAEAAAH2
# MCIEIKjPMMbIi2cPqtHNnXMknNtAdVh8h2kS+iHHEUOQ5x2uMA0GCSqGSIb3DQEB
# CwUABIICABEW0SFmWsLUSpJJs7ctCacFSrfp2Jc8WQ7VuswNFdj/lLb9qCDHGX4B
# MO64EN6e2E7lG5XoV+lTY4ZbfuT4kNGNu3EL1POtftAATlBjl2DZOIrGrQVaVgX6
# ht5zl1KWssbZ0IDhvY+mrCGEeWlfPfV03ziwucyM2Wy1mfav3aBw0y5VChO4BNYj
# k5T2nAs2N5rrZUOKW86X3BWlV6HcQXWQGe0Oc55I68jbpOpI6T4TwhUR/BMtcYxg
# LYkY/twHtINg0DYCIEAgkOBlcBHndjCb3SrCTqTjeo4q+MHL6mWzVFqSPR4IrI1F
# Evr27HP6AQlJubjXuTp4RwMpHFByLMe1StzPrrxM8NWFFPCLe8n+4hj01AR29cET
# rjr+hFxZdhjsEVV5qTlDyipRa34Lxy0lTb5DgH4qt8clJHY1WT4ynANqo11f2qjR
# IdsOLq9JKcF8gqz6AMWi3blK7gOSJYHmUpoTS2XsIy+1dA1MsHtIfTfzjmjPrpvI
# 7VJO3j9M5I45Rreiw/6/CPvZ3ET1C1UWcdYvk0zDe4keOQxc7kSEBRr4+hUDzEZe
# ThE7aY/k4i+O5GXXHDRX/90oRsDs55L4FGprhgPP9owhZuDAjRR3aFEqJc4E/pH3
# vbIoX/GrA2ltGHCiG9LE2q/A39UOjEXkiLW881evsZ7wQAkCbVis
# SIG # End signature block