Obs/bin/ObsDep/content/Powershell/Roles/Common/AzureStackPXE.psm1

<###################################################
 # #
 # Copyright (c) Microsoft. All rights reserved. #
 # #
 ##################################################>


Import-Module NetSecurity

# Installs the AzureStackPXE service on the local machine
function Install-AzureStackPXE {
    Param(
        [Parameter(Mandatory = $true)]
        $logFile,

        [Parameter(Mandatory = $true)]
        $configurationFile,
        
        [Parameter(Mandatory = $false)]
        $idempotent
    )
    $ErrorActionPreference = "Stop"

    $serviceName = "AzureStackPXE"

    # Get the path to where the Network Boot Server binaries are unpacked
    $binaryPath = Join-Path "$env:SystemDrive\CloudDeployment" "NetworkBootServer"

    # Setup the Network Boot Server service, but don't start it just yet
    $service = Get-Service -Name $serviceName -ErrorAction Ignore

    # Remove the service if it already exists (unless this is an idempotent run)
    if ($service -ne $null -and $idempotent -eq $false) {
        # Stop service before attempting to remove it
        Write-Verbose "$serviceName service already exists, stopping and removing"
        Stop-Service -Name $serviceName -ErrorAction Ignore
        & "sc.exe" "delete" "$serviceName"
    }

    try {
        # Setup the service if this is not an idempotent run, or if the service didn't previously exist
        if ($service -eq $null -or $idempotent -eq $false) {
            Write-Verbose "Installing service $serviceName"
            New-Service -Name $serviceName -BinaryPathName "$binaryPath\NetworkBootServer.exe -log:$logFile -config:$configurationFile" -DisplayName "Azure Stack Network Boot Server" -StartupType Manual

            # Restart the service for first, second and subsequent failures after 5000 milliseconds. Reset after 1 day.
            Write-Verbose "Configuring recovery mechanism for Azure Stack Network Boot Service: '$serviceName'"
            $out = sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400
            if ($LASTEXITCODE -ne 0)
            {
                Write-Error "[LASTEXITCODE: '$LASTEXITCODE']`n[sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400]:`n $($out | Out-String)"
            }
            else
            {
                Write-Verbose "[sc.exe failure $serviceName actions=restart/5000/restart/5000/restart/5000/5000 reset=86400]:`n $($out | Out-String)"
            }

            # Log the recovery settings
            $out = sc.exe qfailure $serviceName
            if ($LASTEXITCODE -ne 0)
            {
                Write-Error "[LASTEXITCODE: '$LASTEXITCODE']`n[sc.exe qfailure $serviceName]:`n $($out | Out-String)"
            }
            else
            {
                Write-Verbose "[sc.exe qfailure $serviceName]:`n $($out | Out-String)"
            }
        }
    }
    catch {
        throw "Could not create $serviceName service ($_)"
    }
}

# Configures firewall rules for the AzureStackPXE service on the local machine
function Set-AzureStackPXEFirewallRules {
    $ErrorActionPreference = "Stop"

    # The firewall service needs to be started for this to work
    $firewallServiceName = "MpsSvc"
    $firewallService = Get-Service -Name $firewallServiceName -ErrorAction Ignore

    # Exit if the firewall service could not be found
    if ($firewallService -eq $null) {
        Write-Verbose "Could not locate the firewall service, exiting"
        return
    }

    # Save initial state of the firewall service, we want to leave it in the same state on exit
    $firewallServiceStatus = $firewallService.Status

    # Start service if not already running
    if ($firewallServiceStatus -ne "Running") {
        Write-Verbose "Firewall service is stopped, starting temporarily so we can apply rules."
        Start-Service -Name $firewallService -ErrorAction Ignore
    }

    # Remove existing firewall rules. These are relatively inexpensive operations, so we can remove and re-add on idempotent runs
    Get-NetFirewallRule -Name "AzureStackPXE_DHCP_Inbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore 
    Get-NetFirewallRule -Name "AzureStackPXE_TFTP_Inbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore 
    Get-NetFirewallRule -Name "AzureStackPXE_DHCP_Outbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore 
    Get-NetFirewallRule -Name "AzureStackPXE_TFTP_Outbound" -ErrorAction Ignore | Remove-NetFirewallRule -ErrorAction Ignore 

    # Allow inbound DHCP traffic to ports 67 and 4011 from remote ports 67, 68 and 4011
    New-NetFirewallRule -Direction In -Name "AzureStackPXE_DHCP_Inbound" -DisplayName "Azure Stack Network Boot Server DHCP (Inbound)" -Protocol UDP -LocalPort 67, 4011 -RemotePort 67, 68, 4011 | Out-Null
    
    # Allow inbound TFTP traffic to port 69 from any remote port
    New-NetFirewallRule -Direction In -Name "AzureStackPXE_TFTP_Inbound" -DisplayName "Azure Stack Network Boot Server TFTP (Inbound)" -Protocol UDP -LocalPort 69 | Out-Null
    
    # Allow outbound DHCP traffic only from the AzureStackPXE service (local ports 67 and 4011) to remote ports 67, 68 and 4011
    New-NetFirewallRule -Direction Out -Name "AzureStackPXE_DHCP_Outbound" -DisplayName "Azure Stack Network Boot Server DHCP (Outbound)" -Protocol UDP -LocalPort 67, 4011 -RemotePort 67, 68, 4011 -Service "AzureStackPXE" | Out-Null

    # Allow outbound TFTP traffic only from the AzureStackPXE service (local port 69) to any remote port
    New-NetFirewallRule -Direction Out -Name "AzureStackPXE_TFTP_Outbound" -DisplayName "Azure Stack Network Boot Server TFTP (Outbound)" -Protocol UDP -LocalPort 69 -Service "AzureStackPXE" | Out-Null

    # Restore firewall service to its initial state
    if ($firewallServiceStatus -eq "Stopped") {
        Write-Verbose "Stopping firewall service."
        Stop-Service -Name $firewallService -ErrorAction Ignore
    }
}

# Loads the AzureStackPXEConfiguration object from the specified JSON file
function Get-AzureStackPXEConfiguration {
    Param(
        [Parameter(Mandatory = $true)]
        $configurationFile
    )

    $json = Get-Content -Path $configurationFile
    return CreateAzureStackPXEConfiguration($json)
}

# Creates a new (empty) AzureStackPXEConfiguration object
function New-AzureStackPXEConfiguration {
    $config = CreateAzureStackPXEConfiguration -json $null
    return $config
}

# Loads the specified AzureStackPXE assembly
function Use-AzureStackPXEAssembly {
    Param(
        [Parameter(Mandatory = $true)]
        $Type
    )

    $binaryPath = Join-Path "$env:SystemDrive\CloudDeployment" "NetworkBootServer"
    if(!(Test-Path $binaryPath))
    {
      $binaryPath = Join-Path "$PSScriptRoot\..\..\" "NetworkBootServer"
    }
    $binaryPath = Join-Path $binaryPath "$Type.dll"

    try {
        Write-Verbose "Loading assembly $binaryPath"
        Add-Type -Path $binaryPath | Out-Null
    }
    catch {
        throw "Failed to load assembly $binaryPath ($_)"
    }
}

# Creates a PXE configuration object and deserializes its contents from JSON if specified
function CreateAzureStackPXEConfiguration {
    Param(
        [Parameter(Mandatory = $false)]
        $json
    )

    # Deserialize configuration object from JSON if specified, or create a new instance otherwise
    if ($json -ne $null) {
        $pxeConfig = [Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEServerConfiguration]::Deserialize($json)
        
        # Deserialization should throw an exception on failure, adding a null check for safety
        if ($pxeConfig -eq $null) {
            throw "Failed to deserialize AzureStackPXE configuration"
        }
        
        return $pxeConfig
    }
    else {
        $typeName = "Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEServerConfiguration"
        Write-Verbose "Creating new instance of $typeName"
        $pxeConfig = New-Object -TypeName $typeName
        
        if ($pxeConfig -eq $null) {
            throw "Failed to create instance of $typeName"
        }

        return $pxeConfig
    }
}

# Creates a new instance of Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEClient, for the purpose of adding
# it to a Configuration object. The client is an in-memory instance and is not sent to the REST endpoint of the service
function New-AzureStackPXEClientInstance {
    Param(
        [Parameter(Mandatory = $true)]
        $ClientIdentifier,

        [Parameter(Mandatory = $true)]
        $BootBehavior,

        [Parameter(Mandatory = $true)]
        $SetToDefaultAfterBoot
    )
    
    # Create instance of PXEClient
    $pxeClient = New-Object -TypeName "Microsoft.AzureStack.Solution.Deploy.AzureStackPXE.Common.PXEClient"
    $pxeClient.ClientIdentifier = $ClientIdentifier
    $pxeClient.BootBehavior = $BootBehavior
    $pxeClient.SetToDefaultAfterBoot = $SetToDefaultAfterBoot

    return $pxeClient
}

# Builds a HTTP URI for the specified server and port
function GetRESTEndpoint {
    Param(
        [Parameter(Mandatory = $false)]
        $PxeServer = "localhost",

        [Parameter(Mandatory = $false)]
        $Port = 9000,

        [Parameter(Mandatory = $false)]
        $Api = "pxe"
    )

    return "http://$PxeServer" + ":" + "$Port/$Api"
}

# Uses the AzureStackPXE REST API to get all clients known to the boot server
function Get-AzureStackPXEClients {
    Param(
        [Parameter(Mandatory = $false)]
        $PxeServer = "localhost"
    )
    $ErrorActionPreference = "Stop"

    try {
        $uri = GetRESTEndpoint -PxeServer $PxeServer
        $clients = (Invoke-WebRequest -Uri "$uri/pxeclient" -Method Get -TimeoutSec 60 -UseBasicParsing -UseDefaultCredentials -Verbose -ErrorAction Stop).Content | ConvertFrom-Json
        return $clients
    }
    catch {
        throw "Failed to get PXE clients ($_)"
    }
}


# Uses the AzureStackPXE REST API to set the properties of a PXE client
function Set-AzureStackPXEClient {
    Param(
        [Parameter(Mandatory = $true)]
        $ClientIdentifier,

        [Parameter(Mandatory = $true)]
        $BootBehavior,

        [Parameter(Mandatory = $true)]
        $SetToDefaultAfterBoot,

        [Parameter(Mandatory = $false)]
        $PxeServer = "localhost"
    )
    $ErrorActionPreference = "Stop"

    try {
        $uri = GetRESTEndpoint -PxeServer $PxeServer
        
        $json = @{
            clientIdentifier = $ClientIdentifier
            bootBehavior = $BootBehavior
            setToDefaultAfterBoot = $SetToDefaultAfterBoot
        } | ConvertTo-Json

        Invoke-WebRequest -Uri "$uri/pxeclient" -Method Put -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose
        Write-Verbose "PXE client $ClientIdentifier updated successfully"
    }
    catch {
        throw "Failed to update PXE client $ClientIdentifier ($_)"
    }
}

# Uses the AzureStackPXE REST API to add a PXE client to the known clients list
function New-AzureStackPXEClient {
    Param(
        [Parameter(Mandatory = $true)]
        $ClientIdentifier,

        [Parameter(Mandatory = $true)]
        $BootBehavior,

        [Parameter(Mandatory = $true)]
        $SetToDefaultAfterBoot,

        [Parameter(Mandatory = $false)]
        $PxeServer = "localhost"
    )
    $ErrorActionPreference = "Stop"

    try {
        $uri = GetRESTEndpoint -PxeServer $PxeServer
        
        $json = @{
            clientIdentifier = $ClientIdentifier
            bootBehavior = $BootBehavior
            setToDefaultAfterBoot = $SetToDefaultAfterBoot
        } | ConvertTo-Json

        Invoke-WebRequest -Uri "$uri/pxeclient" -Method Post -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose
        Write-Verbose "PXE client $ClientIdentifier created successfully"
    }
    catch {
        throw "Failed to create PXE client $ClientIdentifier ($_)"
    }
}

# Tests whether the AzureStackPXE service has been installed and all BareMetal nodes setup for PXE boot
function Test-AzureStackPxeDeployed {
    [CmdletBinding()]
    param (
        [Parameter(Mandatory = $true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop

    # Get physical nodes from BaseMetal role
    $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration
    $serviceName = "AzureStackPXE"

    # Cloud Role
    $cloudRole = $Parameters.Roles['Cloud'].PublicConfiguration

    # OEM Model info
    $OEMRole = $Parameters.Roles["OEM"].PublicConfiguration
    $OEMModel = $OEMRole.PublicInfo.UpdatePackageManifest.UpdateInfo.Model

    # Account info
    $securityInfo = $cloudRole.PublicInfo.SecurityInfo
    $bareMetalUser = $securityInfo.HardwareUsers.User | Where-Object -Property Role -EQ 'BareMetalAdmin'
    $bareMetalCredential = $Parameters.GetCredential($bareMetalUser.Credential)

    # Check that the PXE service has been installed and is currently running
    if ((Get-Service $serviceName -ErrorAction SilentlyContinue).Status -eq "Running") {
        # Use AzureStackPXE REST API to get a list of PXE clients
        Write-Verbose "Getting a list of known PXE clients."
        $existingPxeClients = Get-AzureStackPXEClients
        
        foreach ($node in $physicalMachinesRole.Nodes.Node) {
            # Check that the node is setup for PXE boot by MAC address or machine id
            $nodeSetupForPxe = $false

            if([string]::IsNullOrEmpty($node.MacAddress))
            {
                # Determine the machine UUID from the BMC
                $currentClientIdentifier = Get-SmBiosGuid -BmcIP $node.BmcIPAddress -Credential $bareMetalCredential -OEMModel $OEMModel -OOBProtocol $node.OOBProtocol -NodeInstance $node.NodeInstance -NodeName $node.Name
                $currentClientIdentifier=$device.guid.Replace("-","")
            }
            else
            {
                $currentClientIdentifier = $node.MacAddress
            }
            foreach ($existingPxeClient in $existingPxeClients) {
                if ($existingPxeClient.ClientIdentifier -eq $currentClientIdentifier) {
                    Write-Verbose "Node $($node.Name) $currentClientIdentifier has already been setup for PXE boot."
                    $nodeSetupForPxe = $true
                    break
                }
            }

            # At least one node has not been setup for PXE, return 'false'
            if ($nodeSetupForPxe -eq $false) {
                Write-Verbose "Node $($node.Name) $currentClientIdentifier has not been setup for PXE boot."    
                return $false
            }           
        }

        # All nodes have been setup for PXE, return 'true'
        return $true
    }

    # AzureStackPXE service not installed, or not running - return 'false'
    return $false
}

function Update-AzureStackPxeBootImage {
    Param(
        [Parameter(Mandatory = $true)]
        $BootImage,

        [Parameter(Mandatory = $false)]
        [Boolean] $Force = $true
    )
    $ErrorActionPreference = "Stop"

    # Create RemoteInstall folder if it doesn't exist
    $remoteInstallFolderPath = "$env:SystemDrive\RemoteInstall"
    if ((Test-Path $remoteInstallFolderPath) -eq $false) {
        $null = mkdir $remoteInstallFolderPath -Force          
    }
    
    # Create RemoteInstall\x64\Images folder if it doesn't exist
    $remoteInstallImagesFolderPath = "$remoteInstallFolderPath\Boot\x64\Images"
    if ((Test-Path $remoteInstallImagesFolderPath) -eq $false) {
        $null = mkdir $remoteInstallImagesFolderPath -Force  
    }

    # Make a copy of the WIM image to RemoteInstall\Images. Make sure the image is named "boot.wim", as this is
    # how the BCD file references it
    $bootImageLocalPath = "$remoteInstallFolderPath\Boot\x64\Images\boot.wim"
    Write-Verbose "Copying updated PXE server boot image from $BootImage to $bootImageLocalPath"

    if ((Test-Path $bootImageLocalPath) -eq $false -or $Force) {
        Write-Verbose "Copying $BootImage to local file $bootImageLocalPath."
        Copy-Item -Path $BootImage -Destination "$bootImageLocalPath" -Force
    }
    else {
        Write-Verbose "Skip copying boot image $BootImage locally, as it already exists as $bootImageLocalPath."
    }
}

# Uses the AzureStackPXE REST API to create a DHCP client reservation
function New-AzureStackDHCPReservation {
    Param(
        [Parameter(Mandatory = $true)]
        $ClientIdentifier,

        [Parameter(Mandatory = $true)]
        $IPAddress,

        [Parameter(Mandatory = $false)]
        $DhcpServer = "localhost"
    )
    $ErrorActionPreference = "Stop"

    try {
        $uri = GetRESTEndpoint -PxeServer $DhcpServer -Api "pxe"
        
        $json = @{
            MAC = $ClientIdentifier
            IP = $IPAddress
        } | ConvertTo-Json

        Invoke-WebRequest -Uri "$uri/dhcpclient" -Method Post -Body $json -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose
        Write-Verbose "DHCP reservation $ClientIdentifier -> $IPAddress created successfully"
    }
    catch {
        throw "Failed to create DHCP reservation for client $ClientIdentifier ($_)"
    }
}

# Uses the AzureStackPXE REST API to remove an existing DHCP client reservation
function Remove-AzureStackDHCPReservation {
    Param(
        [Parameter(Mandatory = $true)]
        $ClientIdentifier,

        [Parameter(Mandatory = $false)]
        $DhcpServer = "localhost"
    )
    $ErrorActionPreference = "Stop"

    try {
        $uri = GetRESTEndpoint -PxeServer $DhcpServer -Api "pxe"
        
        Invoke-WebRequest -Uri "$uri/dhcpclient?id=$ClientIdentifier" -Method Delete -ContentType "application/json" -UseBasicParsing -UseDefaultCredentials -Verbose
        Write-Verbose "DHCP reservation for client $ClientIdentifier removed successfully"
    }
    catch {
        throw "Failed to remove DHCP reservation for client $ClientIdentifier ($_)"
    }
}

# Generates a random password with the specified minimum and maximum length
function Create-RandomPassword {
    param(
        [Parameter(Mandatory=$false)]
        [int] $Minlength = 14,

        [Parameter(Mandatory=$false)]
        [int] $Maxlength = 18
    )

    $ErrorActionPreference = 'Stop'

    $lowerCaseLetters = 'abcdefghkmnprstuvwxyz'
    $upperCaseLetters = 'ABCDEFGHKLMNPRSTUVWXY'
    $numbers = '1234567890'
    $specialCharacters = '!-_#'
    $allCharacters = $lowerCaseLetters + $upperCaseLetters + $numbers + $specialCharacters

    $randomLower = Get-Random -Maximum $lowerCaseLetters.length
    $randomUpper = Get-Random -Maximum $upperCaseLetters.length
    $randomNumber = Get-Random -Maximum $numbers.length
    $randomSpecial = Get-Random -Maximum $specialCharacters.length

    $password = @()

    if($MinLength -lt 7)
    {
        throw "MinLength cannot be less than 7."   
    }
        
    $maxLength = $Maxlength - 3
    $minLength = $MinLength - 4

    $passwordLength = Get-Random -Minimum $Minlength -Maximum $maxlength

    $randomAllArray = 1 ..$passwordLength | ForEach-Object { Get-Random -Maximum $allCharacters.length }

    $password += $allCharacters[$randomAllArray]

    # Guarantee at least one of each type is used.
    $password += $lowerCaseLetters[$randomLower]
    $password += $upperCaseLetters[$randomUpper]
    $password += $numbers[$randomNumber]
    $password += $specialCharacters[$randomSpecial]

    # Sort so that all the guaranteed values are not at the end.
    $sortedPassword = $password | Sort-Object { Get-Random }

    $stringPassword = $sortedPassword -Join ''

    ConvertTo-SecureString -String $stringPassword -AsPlainText -Force
}

# Get SmBios Guid from BMC IP Address.
function Get-SmBiosGuid
{
    [CmdletBinding()]
    Param (
        [Parameter(Mandatory=$true)]
        [string]
        $BmcIP,

        [Parameter(Mandatory = $true)]
        [PSCredential]
        $Credential,

        [Parameter(Mandatory=$true)]
        [string]
        $OEMModel,

        [Parameter(Mandatory=$false)]
        [string]
        $NodeName,

        [Parameter(Mandatory=$false)]
        [string]
        $NodeInstance,

        [Parameter(Mandatory=$false)]
        [string]
        $OOBProtocol
    )

    $ErrorActionPreference = 'Stop'

    if ($OEMModel -notmatch "Hyper-V")
    {
        $paramHash = @{}

        if ($OOBProtocol)
        {
            $paramHash += @{ OOBProtocol = $OOBProtocol }
        }

        if ($NodeInstance)
        {
            $paramHash += @{ NodeInstance = $NodeInstance }
        }

        Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll" -Force
        Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" -Force

        # Retrieve the machine UUID from the BMC
        $device = Get-IpmiDeviceSystemGuid -TargetAddress $BmcIP -Credential $Credential @paramHash
    }
    else
    {

        ### Temporary fix - only for virutal environments, remove the change after the fix of bug: 2363555
        Trace-Execution "Adding trusted host entry "
        Set-Item WSMan:\localhost\Client\TrustedHosts -Value "*" -Force
        ###

        $device = Invoke-Command -ComputerName $BmcIP -Credential $Credential -ArgumentList $NodeName -ErrorAction Stop -ScriptBlock {
            param($NodeName)
            $hostVm = Get-VM $NodeName

            Trace-Execution "Retrieved the VM $hostVm, getting the VMManagementServiceInstance"

            $vmId = $hostVm.VMId
            $VMManagementServiceInstance = Get-CimInstance  -ClassName "Msvm_VirtualSystemManagementService" -Namespace "root\virtualization\v2"
            Trace-Execution "Retrieved VMManagementServiceInstance, Getting the CimInstance of the VM"
            $vmInstance = Get-CimInstance -ClassName Msvm_ComputerSystem -Namespace "root\virtualization\v2" | where { $_.Name -like $vmId }
            Trace-Execution "Retrieved the VM CimInstance, Getting the VMSettingData"
            $VMSettingData = Get-CimAssociatedInstance -InputObject $vmInstance -ResultClassName "Msvm_VirtualSystemSettingData" -Association "Msvm_SettingsDefineState"

            Trace-Execution "Retrieved the VMSettingData, now aggregating and returning SmBios information"
                  
            [System.Guid]::Parse($VMSettingData.BIOSGUID)

         } 
    }

    if ($device)
    {
        $SMBiosGuid = $device.Guid.Replace("-", "")
        Trace-Execution "Retrieved the SMBios Guid $SMBiosGuid from BMC IP $BmcIP"
    }
    else
    {
        Trace-Error "Failed to retrieve the SMBios Guid from BMC IP $BmcIP"
    }

    return $SMBiosGuid
}


Export-ModuleMember -Function Install-AzureStackPXE
Export-ModuleMember -Function Set-AzureStackPXEFirewallRules
Export-ModuleMember -Function Get-AzureStackPXEConfiguration
Export-ModuleMember -Function New-AzureStackPXEConfiguration
Export-ModuleMember -Function Get-AzureStackPXEClients
Export-ModuleMember -Function New-AzureStackPXEClient
Export-ModuleMember -Function New-AzureStackPXEClientInstance
Export-ModuleMember -Function New-AzureStackDHCPReservation
Export-ModuleMember -Function Remove-AzureStackDHCPReservation
Export-ModuleMember -Function Set-AzureStackPXEClient
Export-ModuleMember -Function Test-AzureStackPxeDeployed
Export-ModuleMember -Function Update-AzureStackPxeBootImage
Export-ModuleMember -Function Use-AzureStackPXEAssembly
Export-ModuleMember -Function Create-RandomPassword
Export-ModuleMember -Function Get-SmBiosGuid
# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCAKs38k65oftXzS
# +mBaIyExe0SSN/VVQNmFZy1V+v3l/KCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEILXIEIKyjK6xUL9Qr6qskm5o
# Mdx9MBUgv5czcCKQ0fELMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAFSaXY9d5OHbGvunsglk0XlEHuTZGB8bj+ly95J7PxE9eHMPE4w8G6uIi
# p1x7zq0TiBrsk3voBoXQJNmTz0duz5QXH+UCu3LyOuYSWjL7WKu08n1KiAi5650x
# h4Av4JaThSliBxBK7Ewly1LHpAivTVB+VguEarGNfM1E5biwDQLB04F85tjkyO8v
# 22SnCJp5vxAbubHqxZBQGW8ZBs87d3qCFGe5/sAqMTOQB/D9lBq5lg5yIyeMKlbu
# NucI0qki0nzoE1878JLS5ulC46dDvYTz21a7PFtkDfLWHCKZ+wMkqDJROTOx7n7e
# 8DvTWzM8reODR2SVfxXUteeriRgOSaGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCBy5aJjeuQaiZSxS41BFlrTus5zMlq2x6OvPRh6NccPGgIGZMvHKPMx
# GBMyMDIzMDgwNzIxMzMzOS4yNjNaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAc9SNr5xS81IygABAAABzzANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MTFaFw0yNDAyMDExOTEyMTFaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046OTIwMC0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQC4Pct+15TYyrUje553lzBQodgmd5Bz7WuH8SdHpAoW
# z+01TrHExBSuaMKnxvVMsyYtas5h6aopUGAS5WKVLZAvUtH62TKmAE0JK+i1hafi
# CSXLZPcRexxeRkOqeZefLBzXp0nudMOXUUab333Ss8LkoK4l3LYxm1Ebsr3b2OTo
# 2ebsAoNJ4kSxmVuPM7C+RDhGtVKR/EmHsQ9GcwGmluu54bqiVFd0oAFBbw4txTU1
# mruIGWP/i+sgiNqvdV/wah/QcrKiGlpWiOr9a5aGrJaPSQD2xgEDdPbrSflYxsRM
# dZCJI8vzvOv6BluPcPPGGVLEaU7OszdYjK5f4Z5Su/lPK1eST5PC4RFsVcOiS4L0
# sI4IFZywIdDJHoKgdqWRp6Q5vEDk8kvZz6HWFnYLOlHuqMEYvQLr6OgooYU9z0A5
# cMLHEIHYV1xiaBzx2ERiRY9MUPWohh+TpZWEUZlUm/q9anXVRN0ujejm6OsUVFDs
# sIMszRNCqEotJGwtHHm5xrCKuJkFr8GfwNelFl+XDoHXrQYL9zY7Np+frsTXQpKR
# NnmI1ashcn5EC+wxUt/EZIskWzewEft0/+/0g3+8YtMkUdaQE5+8e7C8UMiXOHkM
# K25jNNQqLCedlJwFIf9ir9SpMc72NR+1j6Uebiz/ZPV74do3jdVvq7DiPFlTb92U
# KwIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDaeKPtp0eTSVdG+gZc5BDkabTg4MB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBQgm4pnA0xkd/9uKXJMzdMYyxUfUm/ZusU
# Ba32MEZXQuMGp20pSuX2VW9/tpTMo5bkaJdBVoUyd2DbDsNb1kjr/36ntT0jvL3A
# oWStAFhZBypmpPbx+BPK49ZlejlM4d5epX668tRRGfFip9Til9yKRfXBrXnM/q64
# IinN7zXEQ3FFQhdJMzt8ibXClO7eFA+1HiwZPWysYWPb/ZOFobPEMvXie+GmEbTK
# bhE5tze6RrA9aejjP+v1ouFoD5bMj5Qg+wfZXqe+hfYKpMd8QOnQyez+Nlj1ityn
# OZWfwHVR7dVwV0yLSlPT+yHIO8g+3fWiAwpoO17bDcntSZ7YOBljXrIgad4W4gX+
# 4tp1eBsc6XWIITPBNzxQDZZRxD4rXzOB6XRlEVJdYZQ8gbXOirg/dNvS2GxcR50Q
# dOXDAumdEHaGNHb6y2InJadCPp2iT5QLC4MnzR+YZno1b8mWpCdOdRs9g21QbbrI
# 06iLk9KD61nx7K5ReSucuS5Z9nbkIBaLUxDesFhr1wmd1ynf0HQ51Swryh7YI7TX
# T0jr81mbvvI9xtoqjFvIhNBsICdCfTR91ylJTH8WtUlpDhEgSqWt3gzNLPTSvXAx
# XTpIM583sZdd+/2YGADMeWmt8PuMce6GsIcLCOF2NiYZ10SXHZS5HRrLrChuzedD
# RisWpIu5uTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjkyMDAtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQDq
# 8xzVXwLguauAQj1rrJ4/TyEMm6CBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6HuLeDAiGA8yMDIzMDgwNzE1MjU0
# NFoYDzIwMjMwODA4MTUyNTQ0WjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDoe4t4
# AgEAMAcCAQACAgP+MAcCAQACAhOKMAoCBQDofNz4AgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBACFHyA0qad+tYrSkM3vUAr/QKFVc+TCjKtl/lHBF+ufHHL5f
# s/j90m6f/p0fyePjBR0xvh2yQBFYwtD1kKihkZX8vTEXj5T0lcwKlfH67aSs8aoL
# lnUOO/WLR//2KvgGFeBEX/qObV5aby5HMq9WOj9bWf5zEIOTAxkVYsQAVhNKII/Q
# SJYY1gxjc/iW4KdLe4nNiYSNUmvtpMIKKHiqEQ8/KrkRnXz6riIXxc2Ikix7huzg
# yeHoUGJ4e8vu44WAfVxnqAI/NwN9LPNPv+RVkSTB/+iNAOS0w9jiXp9LIhmVATkB
# ToJvhGsTJDSkoWCbUOk9OCW1/U44ljSw5AkfNxgxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAc9SNr5xS81IygABAAABzzAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCCA9dcAEZXXWvJoX2217Lg87hbTTEv09JmKEj1+FvEokzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EILPpsLqeNS4NuYXE2VJlMuvQeWVA
# 80ZDFhpOPjSzhPa/MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHPUja+cUvNSMoAAQAAAc8wIgQg+HO17iZyeU9VIHsMt0HhhXIPRiFF
# SXIFY82xvyMEnIMwDQYJKoZIhvcNAQELBQAEggIAE9ysvZUfJ1vPDi8ZpBi020jf
# ND5nLyqw3g57x/Z4Xo7d54G5iWS3m/ryOKAZq21+BStF/ruMFvVNvAEf+7WF5Bqb
# QAkRKY8WEX7zPnZUwuFGmom0wrBa55cf0YC9Ety6rUEYCA4mGrr0rmF3yujultze
# Cv3y5/a7pRzdztS1/MTpRfg9uEXGjk3FKOex611LthhOdbz5I5mgjFVbgBTtDwZy
# 3TuwqXvcUwzNmG1uYqXElduvXhbObk+Z7alKmK3W5isON0fi8mUGJqgnGwxVD73l
# xItc42PmmJvlxMF3SQTLsTgE3NcUYhxh7mOcuT2VrvnvHcplBiU9MDCjSUPjSlcw
# q5pyV8QgzY3BYm1uWFyDeUUlLKQcewutqyjKTSArN2BcIbJEqNz0ivuctDdUgbE4
# aODfH4Fu23EKjDQoo34R3NnlH1Ybb+h/aujom8WWtjnlmd+B7JyvARfL7rXK0+gC
# K6Bk2BduhGuJTp2pm7StMWacFuoyKvrDv8ZrpTSRWg5xENmFNbWYCqEBgtHez5TE
# O3bYUQ1u/3/d+FNFaI+9UyCSXYP0lCnhqRHkkci34yIs9TDdv3UuB9kgGL4k7Okh
# It566+SoaFeTanMQdo99g2TKlpRgCGRfQsSXWKvUqkNRzYMVvjvHdr6G9Y+x0dFB
# vX1kC1RUdBTn1q94SJM=
# SIG # End signature block