Obs/bin/ObsDep/content/Powershell/Roles/Common/HostReboot/HostReboot.psm1
<###################################################
# # # Copyright (c) Microsoft. All rights reserved. # # # ##################################################> Import-Module -Name "$PSScriptRoot\..\..\PhysicalMachines\UpdatePhysicalMachineHelper.psm1" -DisableNameChecking $LastBootTimeXmlFile = "LastBootTime.xml" $PreBootTimeXmlFile = "PreBootTime.xml" function SaveLastBootTime { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential ) $ErrorActionPreference = 'stop' Trace-Execution "[SaveLastBootTime] Saving last boot time ..." $lastboottime = Invoke-Command { param($LastBootTimeXmlFile) $lastboottime = Get-CimInstance -ClassName win32_operatingsystem -ErrorAction Stop | select lastbootuptime $lastboottime | Export-Clixml -Path "$($env:SystemDrive)\MASLogs\$LastBootTimeXmlFile" $lastboottime } -ComputerName $ComputerName -Credential $Credential -ArgumentList $script:LastBootTimeXmlFile Trace-Execution "[SaveLastBootTime] The last boot '$($lastboottime.lastbootuptime)' time is saved." } function GetLastBootTime { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true, Position=0, ValueFromPipeline=$true, ParameterSetName = 'ComputerName')] [ValidateNotNullOrEmpty()] [string] $ComputerName ) $oldbootTime = Import-Clixml -Path "\\$ComputerName\c$\maslogs\$script:LastBootTimeXmlFile" return $oldbootTime.lastbootuptime } function SavePreBootTime { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory = $true)] [PSCredential] $Credential ) $ErrorActionPreference = 'stop' Trace-Execution "[SavePreBootTime] Saving pre boot time ..." $preBootTime = Invoke-Command { param($PreBootTimeXmlFile) $preBootTime = Get-Date $preBootTime | Export-Clixml -Path "$($env:SystemDrive)\MASLogs\$PreBootTimeXmlFile" $preBootTime } -ComputerName $ComputerName -Credential $Credential -ArgumentList $script:PreBootTimeXmlFile Trace-Execution "[SavePreBootTime] Time before starting reboot sequence is '$preBootTime'." } function Prepare-KSR { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential ) $ErrorActionPreference = 'stop' try { Trace-Execution "[SoftRebootHelper] Adding KSR registry keys to allow soft reboot with an encrypted drive." Invoke-Command { $REG_KEY_PATH = "HKLM:\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE" if(-not (Test-Path -Path $REG_KEY_PATH)) { New-Item -Path $REG_KEY_PATH -Force } New-ItemProperty -Path $REG_KEY_PATH -PropertyType DWORD -Name OsvKsrAllow -Value 1 -Force New-ItemProperty -Path $REG_KEY_PATH -PropertyType DWORD -Name FdvKsrAllow -Value 1 -Force New-ItemProperty -Path $REG_KEY_PATH -PropertyType DWORD -Name RdvKsrAllow -Value 1 -Force } -ComputerName $ComputerName -Credential $Credential -ErrorAction Stop # Prepare for KSR Trace-Execution "[SoftRebootHelper] Preparing for KSR." $outputDetails = Invoke-Command { mountvol.exe x: /s Ksrcmd /Store 'x:\EFI\Microsoft\Boot\bcd' /prepare '{current}' 'InitiateOnly' } -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop Trace-Execution "[SoftRebootHelper] Output of preparing for KSR:`r`n$($outputDetails | out-string)" } catch { throw "[SoftRebootHelper] Failed while attempting reboot of $ComputerName. Error: $_" } } function InspectKsr { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential ) Trace-Execution "[InspectKsr] Inspecting KSR." try { $scriptBlock = { param($LastBootTimeXmlFile, $PreBootTimeXmlFile) function GetEventTimeDiff($stopEvents, $startEvents) { # As long as we have events, we will capture the enclosing timespan. This # can lead to inaccurate timespan results if we have more than one stop # or start event but we can track those as we also log the event counts. # Capturing enclosing timespan can be useful if we want to cover the broader # interruption window. if (($stopEvents.Count -gt 0) -and ($startEvents.Count -gt 0)) { $stopEvent = $stopEvents[0] $startEvent = $startEvents[-1] if ($stopEvent.TimeCreated -le $startEvent.TimeCreated) { return $(New-TimeSpan -Start $stopEvent.TimeCreated -End $startEvent.TimeCreated).TotalSeconds } } # Stop and Start events are unavailable or out of sync return -1 } function FirstEventDate($events) { if ($events.Count -ge 1) { return $events[0].TimeCreated } # No events were found so return default value return Get-Date -Date "1980-01-01 00:00:00" } # Default event values in case we are not able to query some $osStopEvents = @() $osStartEvents = @() $bootTypeEvents = @() $clussvcStopEvents = @() $clussvcStartEvents = @() $bootDurationE2E = -1 $bootDurationHwdOnly = -1 $clussvcDownTime = -1 $lastBootTime = "" $secondLastBootTime = "" $failure = "" # If we fail to get last boot time, we shouldn't block from gathering rest of telemetry. Also this # data point is not critical as boot time can be guessed from os stop/start events that we are capturing below. try { # LastBootTime.xml is captured before ksr is initiated so post ksr it indicates second last boot time $secondLastBootTime = $(Import-Clixml -Path "$($env:SystemDrive)\MASLogs\$LastBootTimeXmlFile")."lastbootuptime" $lastBootTime = $(Get-CimInstance -ClassName win32_operatingsystem -ErrorAction Stop)."lastbootuptime" } catch { } # Identifying e2e boot window and time try { $preBootTime = Import-Clixml -Path "$($env:SystemDrive)\MASLogs\$PreBootTimeXmlFile" $currentTime = Get-Date $bootDurationE2ESpan = New-TimeSpan -Start $preBootTime -End $currentTime $bootDurationE2E = $bootDurationE2ESpan.TotalSeconds $bootWindowXPath = "*[System[TimeCreated[timediff(@SystemTime) <= $($bootDurationE2ESpan.TotalMilliseconds)]]]" } catch { $failure = "Could not find out pre ksr time." } # At minimum we need a boot window to query other things if ($failure -eq "") { $clusterServiceStopMessage1 = "The Cluster Service service entered the stopped state." $clusterServiceStartMessage1 = "The Cluster Service service entered the running state." $clusterServiceStopMessage2 = "The ClusSvc service entered the stopped state." $clusterServiceStartMessage2 = "The ClusSvc service entered the running state." # Query all events at once to avoid having to call Get-WinEvent multiple times try { $events = Get-WinEvent -LogName "System" -FilterXPath $bootWindowXPath ` | where ` {` (($_.ProviderName -eq "Microsoft-Windows-Kernel-General") -and (($_.Id -eq "12") -or ($_.Id -eq "13"))) -or` (($_.ProviderName -eq "Microsoft-Windows-Kernel-Boot") -and ($_.Id -eq "27")) -or` (` ($_.ProviderName -eq "Service Control Manager") -and` ($_.Id -eq "7036") -and ` (($_.Message -eq $clusterServiceStopMessage1) -or ($_.Message -eq $clusterServiceStartMessage1) -or ($_.Message -eq $clusterServiceStopMessage2) -or ($_.Message -eq $clusterServiceStartMessage2))` )` }` | sort -Property TimeCreated } catch { $failure = "Could not query events." } # Once we have events we can look for individual pieces if ($failure -eq "") { foreach ($event in $events) { switch ($event.Id) { "13" { $osStopEvents += $event } "12" { $osStartEvents += $event } "27" { $bootTypeEvents += $event } "7036" { if (($event.Message -eq $clusterServiceStopMessage1) -or ($event.Message -eq $clusterServiceStopMessage2)) { $clussvcStopEvents += $event } else { $clussvcStartEvents += $event } } } } $bootDurationHwdOnly = GetEventTimeDiff $osStopEvents $osStartEvents $clussvcDownTime = GetEventTimeDiff $clussvcStopEvents $clussvcStartEvents } } $bootTypeEventMessage = "" if ($bootTypeEvents.Count -eq 1) { $bootTypeEventMessage = "'$($bootTypeEvents[0].Message)' at '$($bootTypeEvents[0].TimeCreated)'." } $eventData = @{ "SecondLastBootTime" = $secondLastBootTime # Last time the system booted before ksr "LastBootTime" = $lastBootTime # Time at which ksr happened "PreBootTime" = $preBootTime # Time just before ksr was initiated "OSStopEvent" = [datetime](FirstEventDate $osStopEvents) # First OS shutdown event "OSStopEventCount" = $osStopEvents.Count # More than one OS shutdown event indicates crash "OSStartEvent" = [datetime](FirstEventDate $osStartEvents) # First OS startup event "OSStartEventCount" = $osStartEvents.Count # More than one OS startup event indicates crash "ClusSvcStopEvent" = [datetime](FirstEventDate $clussvcStopEvents) # First Cluster Service stop event "ClusSvcStopEventCount" = $clussvcStopEvents.Count # More than one cluster service stop event is an anomaly "ClusSvcStartEvent" = [datetime](FirstEventDate $clussvcStartEvents) # First Cluster Service start event "ClusSvcStartEventCount" = $clussvcStartEvents.Count # More than one cluster service start event is an anomaly "ClusSvcDownTime" = $clussvcDownTime # Amount of time cluster service was down "BootTypeEvent" = $bootTypeEventMessage # Type of boot that happened "BootTypeEventCount" = $bootTypeEvents.Count # More than one boot type event is an anomaly "BootDurationE2E" = $bootDurationE2E # Total boot duration = prep/shutdown time + time at hardware + boot/winrm ready time "BootDurationHwdOnly" = $bootDurationHwdOnly # Time spend at hardware only (ksr clocks 1-15 seconds while full boot 5-20 mins) "FailureMessage" = $failure # Failure that happened when gathering above details } return $eventData } $eventData = [Hashtable]$(Invoke-Command -ScriptBlock $scriptBlock -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop -ArgumentList $script:LastBootTimeXmlFile, $script:PreBootTimeXmlFile) Trace-Execution "[InspectKsr] Sending telemetry." Import-Module -Name "$PSScriptRoot\..\RoleHelpers.psm1" -DisableNameChecking -Verbose:$false Send-TelemetryEvent -ComponentName "BareMetal" -EventName "KernelSoftReboot" -EventVersion 1 -EventData $eventData Trace-Execution "[InspectKsr] Telemtry sent." } catch { Trace-Execution "[InspectKsr] Failed to inspect ksr or send telemetry.'$_'." } } function Complete-KSR { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential ) $ErrorActionPreference = 'stop' try { # Complete KSR Trace-Execution "[SoftRebootHelper] Completing KSR." $outputDetails = Invoke-Command { ksrcmd /boottype ksrcmd /complete } -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop Trace-Execution "[SoftRebootHelper] Output of Completing KSR:`r`n$($outputDetails | out-string)" } catch { throw "[SoftRebootHelper] Failed while attempting reboot of $ComputerName. Error: $_" } } function OobColdRebootClusterNode { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $ComputerName ) $ErrorActionPreference = "Stop" Trace-Execution "Start: OobColdRebootClusterNodes function" Import-Module -Name "$ENV:ProgramFiles\WindowsPowerShell\Modules\Microsoft.AzureStack.Diagnostics.DataCollection\PMCServiceClient\PMCClient.psm1" -DisableNameChecking try { $pmcClient = Create-PMCClientWithServiceResolver $bmcOperation = New-Object -Type Microsoft.AzureStack.Solution.Deploy.PMC.Controllers.Models.PhysicalMachineBMCOperation $bmcOperation.ComputerName = $ComputerName $bmcOperation.OperationID = [guid]::NewGuid() # Power cycle does cold reboot(remove power). The PMC method waits till the power status changes. # It will riase appropriate exception if the power cycle did not complete $result = $pmcclient.PowerCycle($bmcOperation).GetAwaiter().GetResult() return "Power cycle initiated." } catch { throw "Could not invoke PMC Client exception: $($_.Exception.ToString())" } } function Start-Reboot { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential, [Parameter(Mandatory = $true)] [string] $RebootType ) $ErrorActionPreference = 'stop' try { Trace-Execution "[Start-Reboot] Starting '$RebootType' Reboot." if ($RebootType -eq 'Soft') { # Before starting soft reboot, we need to prepare first Prepare-KSR -ComputerName $ComputerName -Credential $Credential # If prepare is fine, then do soft reboot $outputDetails = Invoke-Command { ksrcmd /reboot } -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop } elseif ($RebootType -eq 'Hard') { $outputDetails = Invoke-Command { shutdown /r /f /t 0 } -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop } elseif ($RebootType -eq 'BMC') { $outputDetails = OobColdRebootClusterNode $ComputerName } else { throw "[Start-Reboot] Reboot type '$RebootType' is unsupported!" } Trace-Execution "[Start-Reboot] Output of starting reboot:`r`n$($outputDetails | out-string)" } catch { throw "[Start-Reboot] Failed while attempting reboot of $ComputerName. Error: $_" } } function Complete-Reboot { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true)] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential, [Parameter(Mandatory = $true)] [string] $RebootType ) $ErrorActionPreference = 'stop' try { Trace-Execution "[Complete-Reboot] Completing '$RebootType' Reboot." # Only soft reboot requires a completion sequence if ($RebootType -eq 'Soft') { Complete-KSR -ComputerName $ComputerName -Credential $Credential # As we have completed Ksr, we'll deep inspect it to ensure all is well InspectKsr -ComputerName $ComputerName -Credential $Credential } Trace-Execution "[Complete-Reboot] Finished completing reboot." } catch { throw "[Complete-Reboot] Failed to complete reboot of $ComputerName. Error: $_" } } function WaitForCIM { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory = $true, Position=0, ValueFromPipeline=$true, ParameterSetName = 'ComputerName')] [ValidateNotNullOrEmpty()] [string] $ComputerName, [Parameter(Mandatory=$true)] [PSCredential] $Credential ) $ErrorActionPreference = 'stop' $CimSessionConnectionTimeoutSec = 30 $RetryDelaySec = 30 $MaxWaitTime = 2700 # 2700 seconds = 45 mins $iteration = -1 $startTime = Get-Date while ($(New-Timespan -start $startTime -end $(Get-Date)).TotalSeconds -le $MaxWaitTime) { $iteration = $iteration + 1 Start-Sleep -Seconds $RetryDelaySec # First test CIM session connectivity Trace-Execution "Trying to check if CIM connectivity has been established to host node '$ComputerName', iteration '$iteration'." try { $cimSession = New-CimSession $ComputerName -Credential $Credential -OperationTimeoutSec $CimSessionConnectionTimeoutSec } catch { Trace-Execution "Could not establish cim connection to the host node '$ComputerName' after the reboot, iteration '$iteration'." continue } # Next get boot times so that we can compare them Trace-Execution "Getting old and new boot times from host node '$ComputerName', iteration '$iteration'." try { $newbootTime = ($cimSession.EnumerateInstances("root\cimv2", "Win32_OperatingSystem").CimInstanceProperties | Where-Object {$_.Name -eq "LastBootUpTime"}).Value # Best effort removing cim session as we don't need it anymore for this iteration try { Remove-CimSession $cimSession } catch { Trace-Execution "Failed to remove cim session. Ignoring error as we will create a new cim session in next iteration." } if (!($newbootTime -as [DateTime])) { throw "New boot time '$newbootTime' for host node '$ComputerName' iteration '$iteration' was not found or was invalid." } } catch { Trace-Execution "Could not get new boot time from host node '$ComputerName' after the reboot, iteration '$iteration'. Exception '$_'" continue } try { $oldbootTime = GetLastBootTime -ComputerName $ComputerName if (!($oldbootTime -as [DateTime])) { throw "Old boot time '$newbootTime' for host node '$ComputerName' iteration '$iteration' was not found or was invalid." } } catch { Trace-Execution "Could not get old boot fime from host node '$ComputerName' after the reboot, iteration '$iteration'. Exception '$_'" continue } # Finally comparing boot times to determine if reboot happened if ($newbootTime -gt $oldbootTime) { Trace-Execution "New boot time '$newbootTime' is greater than old boot time '$oldbootTime' so we have a successful reboot host node '$ComputerName', iteration '$iteration'." return } Trace-Execution "New boot time '$newbootTime' is not greater than old boot time '$oldbootTime' so we don't yet have a successful reboot host node '$ComputerName', iteration '$iteration'." } throw "Host node '$ComputerName' did not come back up in '$($MaxWaitTime / 60)' minutes" } function Prepare-Reboot { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'stop' # As this function will be called for initiating a reboot, we should set the host status # to NotStarted regardless of what happened in prior fallback sequence. Basically, a Soft # reboot may have failed but in the Soft->Hard fallback, the hard reboot has not started # and we are ignoring the previous reboot state. $ComputerName = Get-ExecutionContextNodeName -Parameters $Parameters -EnsureSingle Trace-Execution "Resetting host status to 'NotStarted'. ComputerName: '$ComputerName'." Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'NotStarted' } function Reboot-Machine { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory = $true)] [ValidateSet('Soft','Hard','BMC')] [string] $RebootType ) $ErrorActionPreference = 'stop' Trace-Execution "[Reboot-Machine] Reboot type requested is : $RebootType." # Get node name from execution context $ComputerName = Get-ExecutionContextNodeName -Parameters $Parameters -EnsureSingle Trace-Execution "[Reboot-Machine] Physical node to be live OS updated is: $ComputerName." # Get domain credential $domainCredential = Get-DomainCredential -Parameters $Parameters Trace-Execution "[Reboot-Machine] Domain Credential UserName is: $($domainCredential.UserName)." $updateState = Get-HostUpdateState -Parameters $Parameters -HostName $ComputerName if($updateState -eq "Rebooting") { Trace-Execution "Reboot is already in progress. Continue to wait." } else { if ($updateState -eq "RebootPending") { Trace-Execution "Interface is being re-run due to failover or other reason. This is ok." } # Although we transition host status from NotStarted to RebootPending, we aren't making any decisions # on these statuses; they are just for diagnosability purposes. We mainly check for Rebooting. Trace-Execution "Setting host status to 'RebootPending'. ComputerName: '$ComputerName'" Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'RebootPending' SaveLastBootTime -ComputerName $ComputerName -Credential $domainCredential SavePreBootTime -ComputerName $ComputerName -Credential $domainCredential # Setting the update status to Rebooting to minimize failover related race onditions. Setting Rebooting # status before Start-Reboot v/s after involves different tradeoffs. If done after, a failover immediately # after Start-Reboot may end up resulting either in a double reboot or a failed reboot depending on how far # Start-Reboot had progressed before failover happened. If done before, and there is a failure in Start-Reboot, # then depending on how far Start-Reboot had progressed, we will likely end up in a failed reboot due to # WaitForCIM. But failures in Start-Reboot are not common (ksr prepare can fail but that is a failed reboot # anyway). On the flip side, if we do Start-Reboot first and ERCS primary was on this node, we will likely # trigger failover before setting Rebooting status. Due to these reasons, we are preferring setting # Rebooting status before Start-Reboot. Trace-Execution "Setting host status to 'Rebooting'. ComputerName: '$ComputerName'" Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'Rebooting' try { Start-Reboot -ComputerName $ComputerName -Credential $domainCredential -RebootType $RebootType } catch { # Although it is not common for Start-Reboot to fail (esp given that we know node is reachable due to prior # save boot time calls), we'd want to make a last ditch attempt at trying to see if the failure is recoverable # especially for reboot prep failures such as ksrcmd /prepare. Now, we won't know exactly where the failure # happened in Start-Reboot. Most cases though will fall in one of these two buckets: # - Start-Reboot threw in preparatory phase such as ksrcmd /prepare or mountvol. # - Start-Reboot threw after initiating reboot. This is highly unlikely in case of Soft or Hard coz if ksrcmd # or shutdown commands cannot be issued or fail, system won't end up rebooting. Thus the likely possibility # here is BMC reboot as it has a n/w dependency on BMC where Power cycle may have been initiated but the # confirmation may not have arrived to ERCS. # If we were to set status to RebootPending and we hit the second issue in BMC reboot, we may end up triggering # two BMC reboots. While first one may be fine, multiple BMC reboots should be avoided to minimize corruption. # Thus we will set RebootPending status only for Soft & Hard reboots. If in the rare case Start-Reboot fails for # Soft/Hard, it is ok for them to get tried again. For BMC we will err on side of caution and not reset host # status. This means we won't retry BMC reboot prep failures and will fail at WaitForCIM. And in the event the # Start-Reboot exception was after BMC reboot was initiated, we are good as WaitForCIM will ultimately pass. if ($RebootType -ne 'BMC') { Trace-Execution "Start-Reboot failed so reverting back host status to 'RebootPending'. ComputerName: '$ComputerName'" Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'RebootPending' } # Regardless of the host status, we still need to bubble this exception out to trigger retries throw $_ } } # Waiting for node to come back up. There is no harm in waiting for this multiple times as each reboot attempt # will be preceeded with saving last boot time so once we have set host status to Rebooting, WaitForCIM won't # get affected by a failover/re-run. WaitForCIM -ComputerName $ComputerName -Credential $domainCredential # In case reboot process requires cleanup (such as Ksr), doing that here. ksrcmd /complete and thus # Complete-Reboot are idempotent so it is ok if it gets re-run due to a failover after Complete-Reboot # but before Set-HostUpdateState. Complete-Reboot -ComputerName $ComputerName -Credential $domainCredential -RebootType $RebootType Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'Completed' # If in the remote chance there is a failover here (after setting host state), we will end up doing the entire # reboot flow, almost as if calling the interface anew. The only difference is that the main invocation of # Reboot-Machine is preceeded by Prepare-Reboot. That one resets the host status to NotStarted while here we # are left with Completed. But we set the host status to RebootPending before initiating Start-Reboot so it # doesn't really matter if the original state was NotStarted or Completed. } function Restart-MachinePostDeploy { [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) $ErrorActionPreference = 'stop' Trace-Execution "[Restart-MachinePostDeploy] Reboot node post physical machine deployment" # Get node name from execution context $computerName = Get-ExecutionContextNodeName -Parameters $Parameters Trace-Execution "[Restart-MachinePostDeploy] Physical node to hard reboot: $computerName." # Get domain credential $domainCredential = Get-DomainCredential -Parameters $Parameters Trace-Execution "[Restart-MachinePostDeploy] Domain Credential UserName is: $($domainCredential.UserName)." try { Trace-Execution "[Restart-MachinePostDeploy] Restarting node $computerName using domain credential" Restart-Computer -ComputerName $computerName -Credential $domainCredential -Force -Wait -For WinRM -Timeout 1800 -Delay 15 -Protocol WSMan Trace-Execution "[Restart-MachinePostDeploy] Restarting node $computerName using domain credential finished" Trace-Execution "[Restart-MachinePostDeploy] Proceeding after restart of node $computerName" } catch { Trace-Execution "[Restart-MachinePostDeploy] Failed restarting node $computerName threw exception $_" throw "[Restart-MachinePostDeploy] Failed restarting node $computerName. Error: $_" } } Export-ModuleMember -Function Prepare-Reboot Export-ModuleMember -Function Reboot-Machine Export-ModuleMember -Function Restart-MachinePostDeploy # SIG # Begin signature block # MIIoLQYJKoZIhvcNAQcCoIIoHjCCKBoCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCZy/mqMomD5h7O # PrJ4Nf+FWp4Zvif9LFMXBjGxCn2M7aCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGg0wghoJAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKqlClqRzw/X4iH/tEozSww3 # +V4sNL65uq8jHl73LRePMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAAvzSMz1HK/oagy7CzQe8bUCuiDCTcCxqmNl2XfdFA5IOyzAb9n1JFxW/ # lguwVD4pgvaDrDRoxbYEMaeRwYSn89y5mQycs2c7KTQvynwqlGLQfaLDcL/lZ5Ju # zOjamE7LGhLYuqs74MA55JZGyJlfcctPnfCxXrtsYQY2pPSHVIQ2fVNr7TiiGN4Y # kTsNllCbUPFTclSGSZolTpbAfdcmS6MXrnkCe/k6X/WzK6lYg4ZnCi8d3YRj7+Yo # Ad5cJyby/FCynoCcNvAdS+Ok4YOZo++JZ/Z587l+7KBBDe8INakEqcccsssVvYiV # lN1sDmBuvK0cJ4n1A2jZTGVaO8O5OqGCF5cwgheTBgorBgEEAYI3AwMBMYIXgzCC # F38GCSqGSIb3DQEHAqCCF3AwghdsAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq # hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCBkC5Tyv0s2bAbBam7fppsYlmrGJoKfgaqyPffC6beaOQIGZuLVAiHv # GBMyMDI0MTAwOTAxMTQzOC43NzVaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0w # M0UwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg # ghHtMIIHIDCCBQigAwIBAgITMwAAAekPcTB+XfESNgABAAAB6TANBgkqhkiG9w0B # AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzEyMDYxODQ1 # MjZaFw0yNTAzMDUxODQ1MjZaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z # MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046QTkzNS0wM0UwLUQ5NDcxJTAjBgNV # BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCsmowxQRVgp4TSc3nTa6yrAPJnV6A7aZYnTw/yx90u # 1DSH89nvfQNzb+5fmBK8ppH76TmJzjHUcImd845A/pvZY5O8PCBu7Gq+x5Xe6plQ # t4xwVUUcQITxklOZ1Rm9fJ5nh8gnxOxaezFMM41sDI7LMpKwIKQMwXDctYKvCyQy # 6kO2sVLB62kF892ZwcYpiIVx3LT1LPdMt1IeS35KY5MxylRdTS7E1Jocl30NgcBi # JfqnMce05eEipIsTO4DIn//TtP1Rx57VXfvCO8NSCh9dxsyvng0lUVY+urq/G8QR # FoOl/7oOI0Rf8Qg+3hyYayHsI9wtvDHGnT30Nr41xzTpw2I6ZWaIhPwMu5DvdkEG # zV7vYT3tb9tTviY3psul1T5D938/AfNLqanVCJtP4yz0VJBSGV+h66ZcaUJOxpbS # IjImaOLF18NOjmf1nwDatsBouXWXFK7E5S0VLRyoTqDCxHG4mW3mpNQopM/U1WJn # jssWQluK8eb+MDKlk9E/hOBYKs2KfeQ4HG7dOcK+wMOamGfwvkIe7dkylzm8BeAU # QC8LxrAQykhSHy+FaQ93DAlfQYowYDtzGXqE6wOATeKFI30u9YlxDTzAuLDK073c # ndMV4qaD3euXA6xUNCozg7rihiHUaM43Amb9EGuRl022+yPwclmykssk30a4Rp3v # 9QIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFJF+M4nFCHYjuIj0Wuv+jcjtB+xOMB8G # A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG # Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy # MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w # XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy # dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG # A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD # AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQBWsSp+rmsxFLe61AE90Ken2XPgQHJDiS4S # bLhvzfVjDPDmOdRE75uQohYhFMdGwHKbVmLK0lHV1Apz/HciZooyeoAvkHQaHmLh # wBGkoyAAVxcaaUnHNIUS9LveL00PwmcSDLgN0V/Fyk20QpHDEukwKR8kfaBEX83A # yvQzlf/boDNoWKEgpdAsL8SzCzXFLnDozzCJGq0RzwQgeEBr8E4K2wQ2WXI/ZJxZ # S/+d3FdwG4ErBFzzUiSbV2m3xsMP3cqCRFDtJ1C3/JnjXMChnm9bLDD1waJ7TPp5 # wYdv0Ol9+aN0t1BmOzCj8DmqKuUwzgCK9Tjtw5KUjaO6QjegHzndX/tZrY792dfR # AXr5dGrKkpssIHq6rrWO4PlL3OS+4ciL/l8pm+oNJXWGXYJL5H6LNnKyXJVEw/1F # bO4+Gz+U4fFFxs2S8UwvrBbYccVQ9O+Flj7xTAeITJsHptAvREqCc+/YxzhIKkA8 # 8Q8QhJKUDtazatJH7ZOdi0LCKwgqQO4H81KZGDSLktFvNRhh8ZBAenn1pW+5UBGY # z2GpgcxVXKT1CuUYdlHR9D6NrVhGqdhGTg7Og/d/8oMlPG3YjuqFxidiIsoAw2+M # hI1zXrIi56t6JkJ75J69F+lkh9myJJpNkx41sSB1XK2jJWgq7VlBuP1BuXjZ3qgy # m9r1wv0MtTCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI # hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw # DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x # MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy # MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC # AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg # M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF # dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6 # GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp # Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu # yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E # XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0 # lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q # GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ # +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA # PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw # EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG # NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV # MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj # cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK # BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC # AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX # zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v # cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI # KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG # 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x # M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC # VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449 # xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM # nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS # PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d # Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn # GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs # QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL # jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL # 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNQ # MIICOAIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp # bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw # b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn # MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkE5MzUtMDNFMC1EOTQ3MSUwIwYDVQQD # ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQCr # aYf1xDk2rMnU/VJo2GGK1nxo8aCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w # IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6rBAvDAiGA8yMDI0MTAwODIzMzcz # MloYDzIwMjQxMDA5MjMzNzMyWjB3MD0GCisGAQQBhFkKBAExLzAtMAoCBQDqsEC8 # AgEAMAoCAQACAhoHAgH/MAcCAQACAhOiMAoCBQDqsZI8AgEAMDYGCisGAQQBhFkK # BAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJ # KoZIhvcNAQELBQADggEBAFmZTwG8W4cldbNaC0OpSd++A2Dacvd3o1AjnaOtufLz # RsWzXNq6Tr0kK/cfX++gJ2LnlMQUccGysbPurQnLq+P4pB6OHCctYtG8CSJuZ/8/ # wkDTT/w0h9Zb9JSHdMczGvKMHbBx3p7Aircg8D6h/E0qC44ETsTzUnofEYaGKzwz # w1D+JyrPP+vvTUKuw4UVdu9o7gM6LEtSH/pnlhH8hmOsilcCEeq2Sh8+y+be3jSf # bNbnXcwtv9tdoR47jVZdsddqFIvodRrFotPT0Fzc7tZEjscQ7hyC7mhP4ArhzxbY # 4mX1DsgRJCuCoKZWjU54xrQPgXVKBoPm30jMaCAnP04xggQNMIIECQIBATCBkzB8 # MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVk # bW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1N # aWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAekPcTB+XfESNgABAAAB # 6TANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEE # MC8GCSqGSIb3DQEJBDEiBCAAkxwNFEqKD/476Bp9GGRCYvwtvfn2ThtDBHD3VKfJ # YzCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIKSQkniXaTcmj1TKQWF+x2U4 # riVorGD8TwmgVbN9qsQlMIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAHpD3Ewfl3xEjYAAQAAAekwIgQgj1t91b2+ULvo3s+481udjbTs # frXTa58hGc1xxVUxFQAwDQYJKoZIhvcNAQELBQAEggIAlMbVoNFPLdngNjvSS9Hp # ZNBvjVXF0zsrN3C3oXWc1GEfSdQBPvefI0Ug4GazVh/GjWt/n3Z3RtmZ3fFnDCKm # Y4g0l03AzR/DrrACOFeBXePvAsVhSm36cSHwyzcOJkRYfjmf2vfsljjtH4QvjpF3 # JFvrGYsY9llPgESLH0acbNCzH44d6Ngv0M6Se25HloL3MuAa94WpnirjCt/IuHJ8 # GCUZ1uXZs9gGxJPfcTs9oI8yGG87klsr0rzrPFLIkZQL9GZ21JWLng5Hp/E2uu+A # XuY0BK3JYCI8gME1YLm3kv6bqYfm+ekRWhZx3A4sMC4X1NTk9uco++eoPzzd/2yz # 64n6Ro9VmzwbFXHLrlz8XV1NdxpGQRwAipW8tNuLSU1a/eCTESmabwC5cC5Mw+Dd # N5wTHRNW3tohZYqohIKkK3BzBGCl8rW+f5TmZL5reZgHZOfgD32gZHDB5glBEMjj # 0HkeAVaULqH8rSs5gqRODukAHplinDOHKhSF5rsT2xApzlOPuSCXYnT8FS3pnD3W # Wz0+EmX5XE5ce86Dnq83yklO5SAizFZX3ag9+ZiQl7swvDTW/61GWFe3RXnnFpsr # 0OK39qpYiuqwd670caPGtxCXHgmbq+HoV6NwXCRyMkumqELgBBPdkYgKZjdIi+eN # JXJnFDOM5341Ag3ZLsFURU4= # SIG # End signature block |