AzStackHci.EnvironmentChecker.Utilities.psm1


Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global
Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1

class HealthModel
{
    # Attributes for Azure Monitor schema
    [string]$Name #Name of the individual test/rule/alert that was executed. Unique, not exposed to the customer.
    [string]$Title #User-facing name; one or more sentences indicating the direct issue.
    [string]$Severity #Severity of the result (Critical, Warning, Informational, Hidden) – this answers how important the result is. Critical is the only update-blocking severity.
    [string]$Description #Detailed overview of the issue and what impact the issue has on the stamp.
    [psobject]$Tags #Key-value pairs that allow grouping/filtering individual tests. For example, "Group": "ReadinessChecks", "UpdateType": "ClusterAware"
    [string]$Status #The status of the check running (i.e. Failed, Succeeded, In Progress) – this answers whether the check ran, and passed or failed.
    [string]$Remediation #Set of steps that can be taken to resolve the issue found.
    [string]$TargetResourceID #The unique identifier for the affected resource (such as a node or drive).
    [string]$TargetResourceName #The name of the affected resource.
    [string]$TargetResourceType #The type of resource being referred to (well-known set of nouns in infrastructure, aligning with Monitoring).
    [datetime]$Timestamp #The Time in which the HealthCheck was called.
    [psobject]$AdditionalData #Property bag of key value pairs for additional information.
    [string]$HealthCheckSource #The name of the services called for the HealthCheck (I.E. Test-AzureStack, Test-Cluster).
}

function Test-ModuleUpdate
{
    <#
    .SYNOPSIS
        Checks PSGallery for updated module.
    .DESCRIPTION
        Checks PSGallery for updated module and gives user 10 seconds
        to cancel cmdlet and prints update instructions to screen
    #>

    param()
    try
    {
        Log-Info "Looking for module updates for $($MyInvocation.MyCommand.Module.Name) greater than $($MyInvocation.MyCommand.Module.Version)"
        $ModuleOnline = Find-Module -Name $MyInvocation.MyCommand.Module.Name -Repository PSGallery -AllowPrerelease -ErrorAction SilentlyContinue
        if (([system.version]$ModuleOnline.Version -replace ('-preview', '')) -gt [system.version]$MyInvocation.MyCommand.Module.Version)
        {
            Log-Info ($lTxt.CurrentVersion -f $MyInvocation.MyCommand.Module.Name, $MyInvocation.MyCommand.Module.Version) -ConsoleOut
            Log-Info ($lTxt.UpdateToVersion -f $ModuleOnline.Version, $MyInvocation.MyCommand.Module.Name) -ConsoleOut
            Start-Sleep -Seconds 10
        }
        else
        {
            Log-Info ($lTxt.CurrentVersion -f $MyInvocation.MyCommand.Module.Name, $MyInvocation.MyCommand.Module.Version)
        }
    }
    catch
    {
        Log-Info ($lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message) -Type Error
    }
}

function Test-IsClusterNode
{
    <#
    .SYNOPSIS
        This is a function to test is the local machine is a cluster node.
    #>

    [CmdletBinding()]
    param(
        [Parameter()]
        [System.Management.Automation.Runspaces.PSSession]
        $PsSession
    )

    $clusSvc = Get-Service -Name ClusSvc -ErrorAction SilentlyContinue
    if ($clusSvc.Status -eq 'Running')
    {
        Log-Info -Message "Cluster service is running on $ENV:ComputerName"
        return $true
    }
    else
    {
        Log-Info -Message "Cluster service is not running on $ENV:ComputerName"
        return $false
    }
}

function Get-ClusterNodeName
{
    <#
    .SYNOPSIS
        Get all Cluster Node names.
    #>

    [CmdletBinding()]
    param (

        [Parameter()]
        [string]
        $Cluster,

        [Parameter()]
        [System.Management.Automation.Runspaces.PSSession]
        $PsSession
    )

    $sb = {
        if ([string]::IsNullOrEmpty($Cluster))
        {
            Get-ClusterNode
        }
        else
        {
            Get-ClusterNode -Cluster $Cluster
        }
    }

    if ([string]::IsNullOrEmpty($PsSession))
    {
        Log-Info -Message "Get cluster node locally on $ENV:ComputerName"
        $nodes = Invoke-Command -ScriptBlock $sb
    }
    else
    {
        Log-Info -Message "Get cluster node from PsSession on $($PsSession.ComputerName)"
        $nodes = Invoke-Command -ScriptBlock $sb -Session $PsSession
    }

    foreach ($node in $nodes)
    {
        if ($node.State -ne 'Up')
        {
            Log-Info -Message "$node state is $($node.state)"
        }
    }
    Log-Info -Message ("Return node names: {0}" -f ($nodes.name -join ','))
    return $nodes.Name
}

function Open-PsSession
{
    <#
    .SYNOPSIS
        Create PsSession to intended targets
    .DESCRIPTION
        Creates PsSession to single computer, cluster and related nodes.
    #>

    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $false, HelpMessage = "Specify the Computer Name(s) to run validation from. If null the local machine will be used.")]
        [string[]]
        $ComputerName,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the Cluster Name to run validation from. If null the local machine will be used.")]
        [string]
        $Cluster,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the credential used to connect to remote computer.")]
        [pscredential]
        $Credential,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the authentication used to connect to remote computer.")]
        $Authentication
    )

    try
    {

        # Build PsSession Params
        $sessionAuthParams = @{}
        if (-not [string]::IsNullOrEmpty($Authentication))
        {
            if ($Authentication -eq 'CredSSP' -and [string]::IsNullOrEmpty($Credential))
            {
                throw "A credential object must be provided with $Authentication Authentication"
            }
            $sessionAuthParams += @{
                Authentication = $Authentication
            }
        }
        if (-not [string]::IsNullOrEmpty($Credential))
        {
            $sessionAuthParams += @{
                Credential = $Credential
            }
        }

        # Check if local machine is a cluster node and get its cluster nodes
        if (Test-IsClusterNode)
        {
            if ([string]::IsNullOrEmpty($Credential))
            {
                Log-Info -Message "Credential not provided. Other Cluster nodes will not have connectivity validated. Only $ENV:ComputerName"
            }
            else
            {
                Log-Info -Message "Get computer names from local cluster/nodes"
                $ComputerName += @(Get-ClusterNodeName)
            }
        }

        # Create PsSession to cluster and get node names
        if (-not [string]::IsNullOrEmpty($Cluster))
        {
            Log-Info -Message "Create session to cluster $cluster"
            $ClusterPsSession = New-PSSession -ComputerName $Cluster @sessionAuthParams

            Log-Info -Message "Get computer names from remote session to cluster $Cluster"
            $ComputerName = Get-ClusterNodeName -PsSession $ClusterPsSession -Cluster $Cluster

            Log-Info -Message ("ComputerNames found {0} from remote session to cluster $cluster. Removing session." -f ($ComputerName -join ','))
            $ClusterPsSession | Remove-PSSession
        }

        if ([string]::IsNullOrEmpty($ComputerName))
        {
            Log-Info -Message ("Running all tests locally.")
        }
        else
        {
            $ComputerName = $ComputerName | Sort-Object | Get-Unique
            Log-Info -Message ("Create a pssession to each ComputerName {0}." -f ($ComputerName -join ','))
            $PsSession = @()
            $PsSession += foreach ($Computer in $ComputerName)
            {
                $Session = New-PSSession -ComputerName $Computer @sessionAuthParams -ErrorAction Stop
                Log-Info -Message ("Create a pssession created to {0}." -f $Session.ComputerName)
            }
            if ($null -eq $Session)
            {
                throw "User specified ComputerName but no remote sessions could be established to $($Computer -join ',')"
            }
            $Session
        }
        return $PsSession
    }
    catch
    {
        $exceptionMsg = $lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message
        Log-Info $exceptionMsg -Type Error
        throw $exceptionMsg
    }
}

function Open-CimSession
{
    <#
    .SYNOPSIS
        Create PsSession to intended targets
    .DESCRIPTION
        Creates PsSession to single computer, cluster and related nodes.
    #>

    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $false, HelpMessage = "Specify the Computer Name(s) to run validation from. If null the local machine will be used.")]
        [string[]]
        $ComputerName,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the Cluster Name to run validation from. If null the local machine will be used.")]
        [string]
        $Cluster,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the credential used to connect to remote computer.")]
        [pscredential]
        $Credential,

        [Parameter(Mandatory = $false, HelpMessage = "Specify the authentication used to connect to remote computer.")]
        $Authentication
    )

    try
    {

        # Build PsSession Params
        $sessionAuthParams = @{}
        if (-not [string]::IsNullOrEmpty($Authentication))
        {
            if ($Authentication -eq 'CredSSP' -and [string]::IsNullOrEmpty($Credential))
            {
                throw "A credential object must be provided with $Authentication Authentication"
            }
            $sessionAuthParams += @{
                Authentication = $Authentication
            }
        }
        if (-not [string]::IsNullOrEmpty($Credential))
        {
            $sessionAuthParams += @{
                Credential = $Credential
            }
        }

        # Check if local machine is a cluster node and get its cluster nodes
        if (Test-IsClusterNode)
        {
            if ([string]::IsNullOrEmpty($Credential))
            {
                Log-Info -Message "Credential not provided. Other Cluster nodes will not have connectivity validated. Only $ENV:ComputerName"
            }
            else
            {
                Log-Info -Message "Get computer names from local cluster/nodes"
                $ComputerName += @(Get-ClusterNodeName)
            }
        }

        # Create PsSession to cluster and get node names
        if (-not [string]::IsNullOrEmpty($Cluster))
        {
            Log-Info -Message "Create session to cluster $cluster"
            $ClusterPsSession = New-PSSession -ComputerName $Cluster @sessionAuthParams

            Log-Info -Message "Get computer names from remote session to cluster $Cluster"
            $ComputerName = Get-ClusterNodeName -PsSession $ClusterPsSession -Cluster $Cluster

            Log-Info -Message ("ComputerNames found {0} from remote session to cluster $cluster. Removing session." -f ($ComputerName -join ','))
            $ClusterPsSession | Remove-PSSession
        }

        if ([string]::IsNullOrEmpty($ComputerName))
        {
            Log-Info -Message ("Running all tests locally.")
            $CimSession = New-CimSession -ComputerName $ENV:COMPUTERNAME
        }
        else
        {
            $ComputerName = $ComputerName | Sort-Object | Get-Unique
            Log-Info -Message ("Create a CimSession to each ComputerName {0}." -f ($ComputerName -join ','))
            $CimSession = @()
            $CimSession += foreach ($Computer in $ComputerName)
            {
                $Session = New-CimSession -ComputerName $Computer @sessionAuthParams -ErrorAction Stop
                Log-Info -Message ("Create a CimSession created to {0}." -f $Session.ComputerName)
            }
            if ($null -eq $Session)
            {
                throw "User specified ComputerName but no remote sessions could be established to $($Computer -join ',')"
            }
            $Session
        }
        return $CimSession
    }
    catch
    {
        $exceptionMsg = $lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message
        Log-Info $exceptionMsg -Type Error
        throw $exceptionMsg
    }
}

function Test-Elevation
{
    ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator')
}

function Test-Count
{
    [CmdletBinding()]
    param (
        [CimInstance[]]
        $CimData,

        [int]
        $minimum,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        $passed = $false
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $instanceId = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique

        if ($CimData.Count -lt $minimum)
        {
            $passed = $false
            $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum
        }
        else
        {
            $passed = $true
        }

        $result = New-Object HealthModel
        $Result.Name = 'AzStackHci_{0}_Test_{1}_Count' -f $ValidatorName, $className
        $Result.Title = 'Test {0} Count' -f $className
        $Result.Severity = $Severity
        $Result.Description = 'Checking {0} count' -f $className
        $Result.Remediation = 'https://aka.ms/fixthis'
        $Result.TargetResourceID = $InstanceId
        $Result.TargetResourceName = $InstanceId
        $Result.TargetResourceType = $className
        $Result.Timestamp = [datetime]::UtcNow
        $Result.HealthCheckSource = 'Environment Checker'
        $Result.AdditionalData = New-Object -TypeName PSObject -Property @{
            Source    = "$ClassName Count"
            Resource  = $CimData.count
            Detail    = $detail
            Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
            TimeStamp = [datetime]::UtcNow
        }
        $result.Status = if ($passed) { 'Succeeded' } else { 'Failed' }
        $result
    }
    catch
    {
        throw $_
    }
}

function Test-GroupProperty
{
    <#
    .SYNOPSIS
        Test if properties match across groups
    #>

    [CmdletBinding()]
    param (
        [CimInstance[]]
        $CimData,

        [string[]]
        $GroupProperty,

        [string[]]
        $MatchProperty,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        # Group by name and compare properties within each group
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $ServerName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
        $groupedData = @($CimData | Group-Object -Property $groupProperty)
        $returnResult = @()
        if ($serverName.Count -gt 1)
        {
            $serverName = 'AllServers'
        }
        $returnResult += foreach ($group in $groupedData)
        {
            $instanceId = "Machine: {0}, Class: {1} Group: {2}" -f $ServerName, $className, $group.Name

            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Group_Consistency' -f $ValidatorName, $className
            $result.Title = 'Test {0} Groups' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking {0} Groups for consistent properties' -f $className
            $result.Remediation = 'https://aka.ms/fixthis'
            $result.TargetResourceID = $instanceId
            $result.TargetResourceName = $instanceId
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            $detail = $null
            $passed = $false
            if ($group.Count -gt 1)
            {
                foreach ($propertyName in $matchProperty)
                {
                    if (($group.Group.$propertyName | Sort-Object | Get-Unique).Count -gt 1)
                    {
                        $passed = $false
                        $detail = $lTxt.MismatchProp -f $className, $propertyName, ($group.Group.$propertyName -join ', ')
                        Log-Info -Message $detail -Type Warning
                    }
                    else
                    {
                        $passed = $true
                    }
                    $AdditionalData += New-Object -TypeName PSObject -Property @{
                        Source    = "$($Group.Name) $propertyName"
                        Resource  = $instance.$propertyName
                        Detail    = $detail
                        Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                        TimeStamp = [datetime]::UtcNow
                    }
                }
            }
            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        $returnResult
    }
    catch
    {
        throw $_
    }
}

function Test-InstanceCount
{
    <#
    .SYNOPSIS
        Test if instance count matches across instances
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [CimInstance[]]
        $CimData,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )

    $serverName = 'AllServers'

    $result = New-Object HealthModel
    $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Count' -f $ValidatorName, $className
    $result.Title = 'Test {0} Properties' -f $className
    $result.Severity = $Severity
    $result.Description = 'Checking all servers have same {0} instance count' -f $className
    $result.Remediation = 'https://aka.ms/fixthis'
    $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className
    $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className
    $result.TargetResourceType = $className
    $result.Timestamp = [datetime]::UtcNow
    $result.HealthCheckSource = 'Environment Checker'
    $AdditionalData = @()

    $groupData = $cimData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } }
    $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique
    $result.AdditionalData = New-Object -TypeName PSObject -Property @{
        Source    = 'AllServers'
        Resource  = $ClassName
        Detail    = ($groupData | ForEach-Object { "{0}: {1}" -f $_.Name, $_.Count }) -join ','
        Status    = if ($groupDataCount.Count -gt 1) { 'Failed' } else { 'Succeeded' }
        TimeStamp = [datetime]::UtcNow
    }
    $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
    $result
}

function Test-PropertySync
{
    <#
    .SYNOPSIS
        Test if properties match across instances
    #>


    [CmdletBinding()]
    param (
        [Parameter()]
        [CimInstance[]]
        $CimData,

        [Parameter()]
        [string[]]
        $MatchProperty,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )
    try
    {
        $returnResult = @()
        $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
        $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique
        if ($serverName.Count -gt 1)
        {
            $serverName = 'AllServers'
            $returnResult += Test-InstanceCount -CimData $CimData
        }
        $returnResult += if ($CimData.Count -gt 1)
        {
            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Consistency' -f $ValidatorName, $className
            $result.Title = 'Test {0} Properties' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking all {0} for consistent properties' -f $className
            $result.Remediation = 'https://aka.ms/fixthis'
            $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className
            $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            foreach ($propertyName in $matchProperty)
            {
                $detail = $null
                $passed = $false
                if (($CimData.$propertyName | Get-Unique).Count -gt 1)
                {
                    $passed = $false
                    $detail = $lTxt.MismatchProp -f $className, $propertyName, ($CimData.$propertyName -join ',')
                    Log-Info -Message $detail -Type Warning
                }
                else
                {
                    $passed = $true
                }
                $AdditionalData += New-Object -TypeName PSObject -Property @{
                    Source    = "$className`: $propertyName"
                    Resource  = $instance.$propertyName
                    Detail    = $detail
                    Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                    TimeStamp = [datetime]::UtcNow
                }
            }
            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        return $returnResult
    }
    catch
    {
        throw $_
    }
}

function Test-DesiredProperty
{
    <#
    .SYNOPSIS
        Test if properties have required value
    #>

    [cmdletbinding()]
    param (
        [CimInstance[]]
        $cimData,

        [hashtable]
        $desiredPropertyValue,

        [string]
        $InstanceIdStr,

        [string]
        $ValidatorName,

        [validateset('Critical','Warning','Informational','Hidden')]
        [string]
        $Severity
    )

    try
    {
        # Test properties
        $returnResult = @()
        $returnResult += foreach ($instance in $cimData)
        {
            $serverName = $instance.CimSystemProperties.ServerName | Sort-Object | Get-Unique
            $sb = ([scriptblock]::Create($InstanceIdStr))
            $instanceId = Invoke-Command -ScriptBlock $sb
            $className = $instance.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1
            Log-Info -Message ($lTxt.Test -f $className, $instanceId)

            $result = New-Object HealthModel
            $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Properties' -f $ValidatorName, $className
            $result.Title = 'Test {0} Properties' -f $className
            $result.Severity = $Severity
            $result.Description = 'Checking {0} for desired properties' -f $className
            $result.Remediation = 'https://aka.ms/fixthis'
            $result.TargetResourceID = $instanceId
            $result.TargetResourceName = $instanceId
            $result.TargetResourceType = $className
            $result.Timestamp = [datetime]::UtcNow
            $result.HealthCheckSource = 'Environment Checker'
            $AdditionalData = @()

            foreach ($propertyName in $desiredPropertyValue.Keys)
            {
                $detail = $null
                $passed = $false
                $hint = $null
                $desiredPropertyValueCheck = $null
                $desiredPropertyValueCheck = if ($desiredPropertyValue.$propertyName -is [hashtable])
                {
                    $desiredPropertyValue.$propertyName.Value
                }
                else
                {
                    $desiredPropertyValue.$propertyName
                }

                if (($instance.$propertyName | Select-Object -First 1) -notin $desiredPropertyValueCheck)
                {
                    $passed = $false
                    $hint = if ($desiredPropertyValue.$propertyName.hint) { ' ({0})' -f $desiredPropertyValue.$propertyName.hint }
                    $detail = $lTxt.UnexProp -f $className, $propertyName, $instance.$propertyName, ($desiredPropertyValueCheck -join ','), $hint
                    Log-Info -Message $detail -Type Warning
                }
                else
                {
                    $passed = $true
                }
                $AdditionalData += New-Object -TypeName PSObject -Property @{
                    Source    = "$className`: $propertyName"
                    Resource  = if ($hint) { "$($instance.$propertyName)$hint" } else { $instance.$propertyName }
                    Detail    = $detail
                    Status    = if ($passed) { 'Succeeded' } else { 'Failed' }
                    TimeStamp = [datetime]::UtcNow
                }
            }

            $result.AdditionalData = $AdditionalData
            $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' }
            $result
        }
        return $returnResult
    }
    catch
    {
        throw $_
    }
}

function Confirm-RemoteConnectionMatch
{
    <#
    .SYNOPSIS
        Ensure multiple remote connection methods match all remote systems
    #>

    [CmdletBinding()]
    param (
        [Parameter()]
        [System.Management.Automation.Runspaces.PSSession[]]
        $PsSession,

        [CimSession[]]
        $CimSession
    )

    if ($PsSession -or $CimSession)
    {
        Log-Info ($lTxt.RemoteSyncStart -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ','))
        if (Compare-Object -ReferenceObject $PsSession -DifferenceObject $CimSession -Property ComputerName)
        {
            $errorMsg = $lTxt.RemoteSyncFail -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ',')
            Log-Info $errorMsg -Type Error
            throw $errorMsg
        }
        else
        {
            Log-Info ($lTxt.RemoteSyncPass -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ','))
        }
    }
    else
    {
        Log-Info $lTxt.RemoteSyncSkip
    }
}

function Get-TestCount
{
    param (
        [Parameter()]
        [string]
        $ModuleName,

        [Parameter()]
        [string]
        $CommandPrefix
    )
    try
    {
        $command = Get-Command -Name $CommandPrefix* -Module $ModuleName
        if ($command)
        {
            return $command.Count
        }
        else
        {
            return 1
        }
    }
    catch
    {
        return 1
    }
}
# SIG # Begin signature block
# MIInuwYJKoZIhvcNAQcCoIInrDCCJ6gCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCDvOb8lffuXUnKq
# 4q+hNN8LA1CUC65TCcjjv1/7qRxR/aCCDYUwggYDMIID66ADAgECAhMzAAACU+OD
# 3pbexW7MAAAAAAJTMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjEwOTAyMTgzMzAwWhcNMjIwOTAxMTgzMzAwWjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDLhxHwq3OhH+4J+SX4qS/VQG8HybccH7tnG+BUqrXubfGuDFYPZ29uCuHfQlO1
# lygLgMpJ4Geh6/6poQ5VkDKfVssn6aA1PCzIh8iOPMQ9Mju3sLF9Sn+Pzuaie4BN
# rp0MuZLDEXgVYx2WNjmzqcxC7dY9SC3znOh5qUy2vnmWygC7b9kj0d3JrGtjc5q5
# 0WfV3WLXAQHkeRROsJFBZfXFGoSvRljFFUAjU/zdhP92P+1JiRRRikVy/sqIhMDY
# +7tVdzlE2fwnKOv9LShgKeyEevgMl0B1Fq7E2YeBZKF6KlhmYi9CE1350cnTUoU4
# YpQSnZo0YAnaenREDLfFGKTdAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUlZpLWIccXoxessA/DRbe26glhEMw
# VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh
# dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzQ2NzU5ODAfBgNVHSMEGDAW
# gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v
# d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw
# MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx
# XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB
# AKVY+yKcJVVxf9W2vNkL5ufjOpqcvVOOOdVyjy1dmsO4O8khWhqrecdVZp09adOZ
# 8kcMtQ0U+oKx484Jg11cc4Ck0FyOBnp+YIFbOxYCqzaqMcaRAgy48n1tbz/EFYiF
# zJmMiGnlgWFCStONPvQOBD2y/Ej3qBRnGy9EZS1EDlRN/8l5Rs3HX2lZhd9WuukR
# bUk83U99TPJyo12cU0Mb3n1HJv/JZpwSyqb3O0o4HExVJSkwN1m42fSVIVtXVVSa
# YZiVpv32GoD/dyAS/gyplfR6FI3RnCOomzlycSqoz0zBCPFiCMhVhQ6qn+J0GhgR
# BJvGKizw+5lTfnBFoqKZJDROz+uGDl9tw6JvnVqAZKGrWv/CsYaegaPePFrAVSxA
# yUwOFTkAqtNC8uAee+rv2V5xLw8FfpKJ5yKiMKnCKrIaFQDr5AZ7f2ejGGDf+8Tz
# OiK1AgBvOW3iTEEa/at8Z4+s1CmnEAkAi0cLjB72CJedU1LAswdOCWM2MDIZVo9j
# 0T74OkJLTjPd3WNEyw0rBXTyhlbYQsYt7ElT2l2TTlF5EmpVixGtj4ChNjWoKr9y
# TAqtadd2Ym5FNB792GzwNwa631BPCgBJmcRpFKXt0VEQq7UXVNYBiBRd+x4yvjqq
# 5aF7XC5nXCgjbCk7IXwmOphNuNDNiRq83Ejjnc7mxrJGMIIHejCCBWKgAwIBAgIK
# YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm
# aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw
# OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD
# VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG
# 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la
# UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc
# 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D
# dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+
# lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk
# kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6
# A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd
# X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL
# 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd
# sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3
# T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS
# 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI
# bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL
# BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD
# uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv
# c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf
# MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF
# BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h
# cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA
# YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn
# 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7
# v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b
# pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/
# KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy
# CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp
# mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi
# hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb
# BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS
# oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL
# gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX
# cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGYwwghmIAgEBMIGVMH4x
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p
# Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAJT44Pelt7FbswAAAAA
# AlMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw
# HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEICVP
# 3VyGXLLwo8n9wpvw6pZuTXJ1mF03XMyF1NSUZqdJMEIGCisGAQQBgjcCAQwxNDAy
# oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20wDQYJKoZIhvcNAQEBBQAEggEAQb6L6dTbD5uhT56+GPq6OXh9cz6Faz8zhbUq
# OlAEYYforg3DlFXFgYPxGxzt7H22BuneBYntyjuYXmWB37VBt+dkKhOYnmot0llW
# f5KuY59no0QV0dBvfFT3eG31wGqxqHHd7dpNIUkTV3tTRLAZdCRbDvU1NPna5eq5
# 2qXSOZf+ciM7RrkHL3z2yJq6ZrjBwpg3cwz+HBL6wAcOeArCaXUk4kMKOB+w1eZ1
# 2mFM6rPKHGQ1E4mbLmY80/wqfklQR35BHfrhxikK9RmirzhhfKBKr5gx/CF3AO8q
# SU8GZFWl1mgpVo+dOffXN5ppLjl2lKq8m20ZA8GCCobbnWG+sqGCFxYwghcSBgor
# BgEEAYI3AwMBMYIXAjCCFv4GCSqGSIb3DQEHAqCCFu8wghbrAgEDMQ8wDQYJYIZI
# AWUDBAIBBQAwggFZBgsqhkiG9w0BCRABBKCCAUgEggFEMIIBQAIBAQYKKwYBBAGE
# WQoDATAxMA0GCWCGSAFlAwQCAQUABCB8kXeBST8PNAmiY8+bEQEl2BfkNVbPtKPk
# rpq2pmN6SAIGYrtRCf+iGBMyMDIyMDcwNDEyMzA1My4wNThaMASAAgH0oIHYpIHV
# MIHSMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH
# UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQL
# EyRNaWNyb3NvZnQgSXJlbGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsT
# HVRoYWxlcyBUU1MgRVNOOkZDNDEtNEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3Nv
# ZnQgVGltZS1TdGFtcCBTZXJ2aWNloIIRZTCCBxQwggT8oAMCAQICEzMAAAGOWdtG
# AKgQlMwAAQAAAY4wDQYJKoZIhvcNAQELBQAwfDELMAkGA1UEBhMCVVMxEzARBgNV
# BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv
# c29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# UENBIDIwMTAwHhcNMjExMDI4MTkyNzQ1WhcNMjMwMTI2MTkyNzQ1WjCB0jELMAkG
# A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx
# HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEtMCsGA1UECxMkTWljcm9z
# b2Z0IElyZWxhbmQgT3BlcmF0aW9ucyBMaW1pdGVkMSYwJAYDVQQLEx1UaGFsZXMg
# VFNTIEVTTjpGQzQxLTRCRDQtRDIyMDElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt
# U3RhbXAgU2VydmljZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAKoj
# AqujjMy2ucK7XH+wX/X9Vl1vZKamzgc4Dyb2hi62Ru7cIMKk0Vn9RZI6SSgThuUD
# yEcu2uiBVQMtFvrQWhV+CJ+A2wX9rRrm8mPfoUVPoUXsDyR+QmDr6T4e+xXxjOt/
# jpcEV6eWBEerQtFkSp95q8lqbeAsAA7hr9Cw9kI54YYLUVYnbIg55/fmi4zLjWqV
# IbLRqgq+yXEGbdGaz1B1v06kycpnlNXqoDaKxG03nelEMi2k1QJoVzUFwwoX2udu
# p1u0UOy+LV1/S3NKILogkpD5buXazQOjTPM/lF0DgB8VXyEF5ovmN0ldoa9nXMW8
# vZ5U82L3+GQ6+VqXMLe7U3USCYm1x7F1jCq5js4pYhg06C8d+Gv3LWRODTi55ayk
# FjfWRvjsec0WqytRIUoWoTNLkDYW+gSY6d/nNHjczBSdqi2ag6dv92JeUPuJPjAx
# y04qT+lQXcXHVX3eJoK1U8d2nzuSjX4DJ4Bhn4UmsBq2kVtvBIayzrKZiMYovdhO
# 7453CdrXI4SwowQK1aT4d3GRuYN2VcuYogGqA2rMKTYJzBQCuVJ9a3ivjBYT4vYj
# J71D8LUwwybeWBA+QwE95gVMaeUB97e0YWcACTS1i7aU3hhe7m/NbEimL9mq3Wsw
# HvVy0tdLVdqDj63J4hic5V1u1T78akDcXvJQgwNtAgMBAAGjggE2MIIBMjAdBgNV
# HQ4EFgQU7EH5M/YE+ODf+RvLzR2snqfmleQwHwYDVR0jBBgwFoAUn6cVXQBeYl2D
# 9OXSZacbUzUZ6XIwXwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3Nv
# ZnQuY29tL3BraW9wcy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy
# MDIwMTAoMSkuY3JsMGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1l
# LVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADATBgNVHSUE
# DDAKBggrBgEFBQcDCDANBgkqhkiG9w0BAQsFAAOCAgEANVCvccyHk5SoUmy59G3p
# EeYGIemwdV0KZbgqggNebJGd+1IpWhScPPhpJQy85TYUj9pjojs1cgqvJJKap31H
# NNWWgXs0MYO+6nr49ojMoN/WCX3ogiIcWDhboMHqWKzzvDJQf6Lnv1YSIg29XjWE
# 5T0pr96WpbILZK29KKNBdLlpl+BEFRikaNFBDbWXrVSMWtCfQ6VHY0Fj3hIfXBDP
# kYBNuucOVgFW/ljcdIloheIk2wpq1mlRDl/dnTagZvW09VO5xsDeQsoKTQIBGmJ6
# 0zMdTeAI8TmwAgzeQ3bxpbvztA3zFlXOqpOoigxQulqV0EpDJa5VyCPzYaftPp6F
# OrXxKRyi7e32JvaH+Yv0KJnAsKP3pIjgo2JLad/d6L6AtTtri7Wy5zFZROa2gSwT
# UmyDWekC8YgONZV51VSyMw4oVC/DFPQjLxuLHW4ZNhV/M767D+T3gSMNX2npzGbs
# 9Fd1FwrVOTpMeX5oqFooi2UgotZY2sV/gRMEIopwovrxOfW02CORW7kfLQ7hi4lb
# vyUqVRV681jD9ip9dbAiwBhI6iWFJjtbUWNvSnex3CI9p4kgdD0Dgo2JZwp8sJw4
# p6ktQl70bIrI1ZUtUaeE5rpLPqRsYjBsxefM3G/oaBSsjjbi92/rYMUwM97BdwVV
# /bpPTORfjhKHsi8hny3pDQIwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAA
# AAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBB
# dXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOC
# Ag8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YB
# f2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKD
# RLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus
# 9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTj
# kY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56
# KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39
# IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHo
# vwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJo
# LhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMh
# XV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREd
# cu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEA
# AaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqn
# Uv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnp
# cjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRw
# Oi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0w
# EwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEw
# CwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/o
# olxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNy
# b3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYt
# MjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5t
# aWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5j
# cnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+
# TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2Y
# urYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4
# U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJ
# w7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb
# 30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ
# /gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGO
# WhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFE
# fnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJ
# jXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rR
# nj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUz
# WLOhcGbyoYIC1DCCAj0CAQEwggEAoYHYpIHVMIHSMQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJlbGFuZCBP
# cGVyYXRpb25zIExpbWl0ZWQxJjAkBgNVBAsTHVRoYWxlcyBUU1MgRVNOOkZDNDEt
# NEJENC1EMjIwMSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# oiMKAQEwBwYFKw4DAhoDFQA9YivqT04R6oKWucbD5omK7llbjKCBgzCBgKR+MHwx
# CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt
# b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1p
# Y3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBBQUAAgUA5m0P
# nzAiGA8yMDIyMDcwNDE1MDUwM1oYDzIwMjIwNzA1MTUwNTAzWjB0MDoGCisGAQQB
# hFkKBAExLDAqMAoCBQDmbQ+fAgEAMAcCAQACAiSPMAcCAQACAhILMAoCBQDmbmEf
# AgEAMDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSCh
# CjAIAgEAAgMBhqAwDQYJKoZIhvcNAQEFBQADgYEAZ/y2+njM+4uqvjL5q9srUfGz
# jVofL9yaCTHeysuexdqTMPxv3WgOBkJ9Hgrc2MPbmbuy/ImzQ8T4O/nm5EJgZWm/
# IU8w5NhprcaDeYdrq4h5/MTP0O5d9gZbjNLR1XSLIHLuJBHKDMXMszxv5Zq7LnAO
# UGSb7ebSh0YZIEQeAhsxggQNMIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEG
# A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj
# cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt
# cCBQQ0EgMjAxMAITMwAAAY5Z20YAqBCUzAABAAABjjANBglghkgBZQMEAgEFAKCC
# AUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCY
# DY+YuZR9DvxG4pKCCH6FzmRC4CDVZ31Mpx5Pv3te3DCB+gYLKoZIhvcNAQkQAi8x
# geowgecwgeQwgb0EIL0FjyE74oGlLlefn/5VrNwV2cCf5dZn/snpbuZ15sQlMIGY
# MIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNV
# BAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQG
# A1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMAAAGOWdtGAKgQ
# lMwAAQAAAY4wIgQg7kNyeotUj+kf7/s6vFEsQ3eKPITr/uAdkmxls0s5eP8wDQYJ
# KoZIhvcNAQELBQAEggIAUydKDPUgOG86+q9ul6JLQ++3Y4kX+06eD3kFkLYQjbPK
# z2TupaQjtzRD9hypzuz54adnD+F45E/ff9cYd9EgkzmwhmmvOSju3C5J1ZOsFAVa
# uAujO8/vJhq4zJSMGTIedIm8Pac3yc0oEDQsM4VOzyfVm8HrxXke2AQwP+u14Zvt
# vQsNexlu1JhAKvkK94lwgP9VRVFysduGf+biL1VH82O1DeeGvFEuPE29jY/fTIcf
# +E6O00+cu2FPaRVcF1C3jvK/HZqzsmwnvjABDfuZ0GOJ5lb047uunUGvvI4dovLX
# S//Sa5JvCFuW/4FgL4bDChIn14yDAKfxN6F0CReodlqPSCMddFED9TSMVha+3bmA
# n8OKpXgkTwgxLedxFCCCsdajCNXvM3JClGULEJHuWbqH4cHOKeGe+foPUfk0gTVc
# xW54TLZgqIWMK7+JTq9j/ucEnqk4qiFGcktoibPpJJ5fJirljHV0xBpVF8yUwPhD
# pHEA+/SvHpdE6lJl6n2du84epcHjhFzHUsiIx7l+oj+dc+RA60dUDx/tH694xQX1
# iF1kneH60HWQkKZcKTMwXInLV/EjWCXJa6T7R6nCV6i+vG+wo7zBryH0X+YlYNLU
# 1uYvgVxswJxO6udkszNdJ4CNlPMCIMdjkqO2GZDN865NbquUX0j03m0Ta+IcNxA=
# SIG # End signature block