Obs/bin/ObsDep/content/Powershell/Roles/Common/PhysicalMachineHelpers.psm1
# -------------------------------------------------------------- # Copyright (c) Microsoft Corporation. All Rights Reserved. # Microsoft Corporation (or based on where you live, one of its affiliates) licenses this sample code for your internal testing purposes only. # Microsoft provides the following sample code AS IS without warranty of any kind. The sample code arenot supported under any Microsoft standard support program or services. # Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. # The entire risk arising out of the use or performance of the sample code remains with you. # In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the code be liable for any damages whatsoever # (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) # arising out of the use of or inability to use the sample code, even if Microsoft has been advised of the possibility of such damages. # --------------------------------------------------------------- Import-Module -Name "$PSScriptRoot\..\Common\RoleHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\NetworkHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\StorageHelpers.psm1" Import-Module -Name "$PSScriptRoot\..\..\Common\ClusterHelpers.psm1" <# .Synopsis Function to shut down all provisioning machines from any role context .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter Parameters This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as public information of all other roles. It is passed down by the deployment engine. .Example Stop-DeployingMachines -Parameters $Parameters This will shut down all hosts that are in provisioning state #> function Stop-DeployingMachines { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" # Shut down all machines to avoid IP conflicts $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $bareMetalCredential = Get-BareMetalCredential -Parameters $Parameters if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } # If any machines are not accessible during this call, the caller may fail. It is important to mark all provisioning nodes as failed when this happens foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol if (IsVirtualAzureStack($Parameters)) { $trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value if (($trustedHosts -ne '*') -and ($bmcIP -notin $trustedHosts.Split(','))) { Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $bmcIP -Concatenate -Force } Invoke-Command -ComputerName $bmcIP -Credential $bareMetalCredential -ScriptBlock {Stop-VM -VMName $using:nodeName -TurnOff -Force -ErrorAction Stop } -ErrorAction Stop Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $trustedHosts -Force } else { Trace-Execution "Shut down $nodeName ($bmcIP)." Stop-IpmiDevice -TargetAddress $bmcIP -Credential $bareMetalCredential -NodeInstance $nodeInstance -OOBProtocol $oobProtocol -Verbose -Wait } } } <# .Synopsis Function to start-up all provisioning machines from any role context .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter Parameters This object is based on the customer manifest. It contains the private information of the Key Vault role, as well as public information of all other roles. It is passed down by the deployment engine. .Example Start-DeployingMachines -Parameters $Parameters This will startup all hosts that are in provisioning state #> function Start-DeployingMachines { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $physicalMachinesRole = $Parameters.Roles["BareMetal"].PublicConfiguration $bareMetalCredential = Get-BareMetalCredential -Parameters $Parameters if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $physicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } # If any machines are not accessible during this call, the caller may fail. It is important to mark all provisioning nodes as failed when this happens foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol # TODO: For now this function will not support virtual hosts. # Due to time constraints and TZL requirements to get # SED support and clean up in CI, we will comment this # part of handling Virtual environments. MUST FIX soon. if (IsVirtualAzureStack($Parameters)) { Trace-Warning "Virtual environments are not supported in this version." Trace-Warning "This function is FOR NOW only designed to be called for SED cleanup on physical machines" Trace-Warning "Virtual environments will be handled here with the coming version." <# $trustedHosts = (Get-Item -Path WSMan:\localhost\Client\TrustedHosts).Value if (($trustedHosts -ne '*') -and ($bmcIP -notin $trustedHosts.Split(','))) { Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $bmcIP -Concatenate -Force } Invoke-Command -ComputerName $bmcIP -Credential $bareMetalCredential -ScriptBlock {Stop-VM -VMName $using:nodeName -TurnOff -Force -ErrorAction Stop } -ErrorAction Stop Set-Item -Path WSMan:\localhost\Client\TrustedHosts -Value $trustedHosts -Force #> } else { Trace-Execution "Starting physical node: $nodeName ($bmcIP)." Start-IpmiDevice -TargetAddress $bmcIP -Credential $bareMetalCredential -NodeInstance $NodeInstance -OOBProtocol $oobProtocol -Verbose -Wait } } } <# .Synopsis Function to add a DHCP MAC-based reservation for a given machine. .Parameter NetworkName The network name within the infrastructure network where the IP should be reserved. .Parameter NodeName The node name to be associated with the reservation. .Parameter IPv4Address An IPv4 Address from the speficied network scope that the node will have reserved. .Parameter MacAddress The MAC address to associate with the reservation -- this can be in either dash or dashless format, but not comma format. .Parameter RemoteDHCPServerName The remote server that will act as the DHCP server to configure. .Parameter RemoteDHCPServerNameCredentials Credentials used to add the reservation only used on a remote computer when specified. .Example Add-DeployingMachineNetworkReservation -NetworkName 's-cluster-HostNic' -NodeName 'foo' -IPv4Address '10.0.0.1' -MACAddress '7C-FE-90-AF-1A-00' This will add a reservation for node foo with MAC 7C-FE-90-AF-1A-00 using the local credentials on the local DHCP server #> function Add-DeployingMachineNetworkReservation { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $NetworkName, [Parameter(Mandatory=$true)] [String] $NodeName, [Parameter(Mandatory=$true)] [String] $IPv4Address, [Parameter(Mandatory=$true)] [String] $MacAddress, [Parameter(Mandatory=$false)] [String] $RemoteDHCPServerName, [Parameter(Mandatory=$false)] [PSCredential] $RemoteDHCPServerNameCredentials ) $scriptBlock = { $scope = Get-DhcpServerv4Scope | Where-Object { $_.Name -eq $using:NetworkName } $reservation = $scope | Get-DhcpServerv4Reservation | Where-Object { $_.ClientId.Replace(':','').Replace('-','') -eq ($using:MacAddress).Replace(':','').Replace('-','') } foreach ($entry in $reservation) { # Always clear existing reservations that apply to this client ID Remove-DhcpServerv4Reservation -ClientId $entry.ClientId -ScopeId $entry.ScopeId } $scope | Add-DhcpServerv4Reservation -Name $using:NodeName -IPAddress $using:IPv4Address -ClientId $using:MacAddress -Description $using:NodeName } if ($remoteDHCPServerName) { $session = New-PSSession -ComputerName $RemoteDHCPServerName -Credential $RemoteDHCPServerNameCredentials } else { $session = New-PSSession } try { Trace-Execution "Adding DHCP reservation in '$NetworkName' scope: $NodeName - $IPv4Address - $MacAddress." Invoke-Command -Session $session -ScriptBlock $scriptBlock } catch { Trace-Error "Failed with error: $_" throw } finally { Remove-PSSession -Session $session -ErrorAction Ignore } } <# .Synopsis Function to add a DHCP MAC-based reservation for a given machine. .Parameter NetworkName The network name within the infrastructure network where the IP should be reserved. .Parameter NodeName The node name to be associated with the reservation. .Parameter IPv4Address An IPv4 Address from the speficied network scope that the node will have reserved. .Parameter RemoteDHCPServerName The remote server that will act as the DHCP server to configure. .Parameter RemoteDHCPServerNameCredentials Credentials used to add the reservation only used on a remote computer when specified. .Example Remove-MachineNetworkReservation -NetworkName 's-cluster-HostNic' -NodeName 'foo' -IPv4Address '10.0.0.1' -RemoteDHCPServerName 'Machine' -RemoteDHCPServerNameCredentials $cred This will remove a reservation and its leases for node foo with IP address specified #> function Remove-MachineNetworkReservation { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [String] $NetworkName, [Parameter(Mandatory=$true)] [String] $IPv4Address, [Parameter(Mandatory=$true)] [String] $RemoteDHCPServerName, [Parameter(Mandatory=$true)] [PSCredential] $RemoteDHCPServerNameCredentials ) $scriptBlock = { $scope = Get-DhcpServerv4Scope | Where-Object { $_.Name -eq $using:NetworkName } $scope | Get-DhcpServerv4Reservation | Where-Object { $_.IPAddress -eq ($using:IPv4Address) } | Remove-DhcpServerv4Reservation # Remove the DHCP lease for the machine that is being removed as well Get-DhcpServerv4Lease -ScopeId $scope.ScopeId | Where-Object { $_.IPAddress -eq $using:IPv4Address } | Remove-DhcpServerv4Lease } try { $session = New-PSSession -ComputerName $RemoteDHCPServerName -Credential $RemoteDHCPServerNameCredentials Trace-Execution "Adding DHCP reservation in '$NetworkName' scope: $NodeName - $IPv4Address ." Invoke-Command -Session $session -ScriptBlock $scriptBlock } catch { Trace-Error "Failed with error: $_" throw } finally { $session | Remove-PSSession -ErrorAction Ignore } } <# .Synopsis Function to force a machine to boot in to PXE using BMC controls only. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node to start in to PXE. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Start-PXEBoot -NodeName $Name -BmcIPAddress $BmcIPAddress -BMCCredential $cred This will force the machine to boot in to PXE #> function Start-PXEBoot { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath="$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [string] $NodeName, [Parameter(Mandatory=$true)] [string] $BmcIPAddress, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $NodeInstance, [Parameter(Mandatory=$true)] [string] $OOBProtocol ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $logText = "Initiate PXE boot for $NodeName (BMC: $BmcIPAddress). `r`n" $logText += "Shutdown $NodeName (BMC: $BmcIPAddress). `r`n" # Normally the following line should do nothing, because the machine is expected to have been powered off in an earlier step, unless this is a deployment # restart, in which case the machine may be running. $logText += (Stop-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Wait -Verbose 4>&1) $logText += "`n Set PXE boot $NodeName (BMC: $BmcIPAddress). `r`n" # Some machines will set the next boot device correctly only if the machine is currently powered off. $logText += (Set-IpmiDeviceOneTimePxeBoot -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $logText += "`n Start $NodeName (BMC: $BmcIPAddress). `r`n" $logText += (Start-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Wait -Verbose 4>&1) $logText += "`n Set PXE boot $NodeName (BMC: $BmcIPAddress OEMWorkaround). `r`n" # Some machines (Dell R630) will set the next boot device correctly only if the machine is currently powered on and gets power cycled (not reset, but # specifically power cycled) after the request to set one-time PXE boot. $logText += (Set-IpmiDeviceOneTimePxeBoot -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $logText += "`n Restart $NodeName (BMC: $BmcIPAddress OEMWorkaround). `r`n" $logText += (Restart-IpmiDevice -TargetAddress $BmcIPAddress -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose 4>&1) $retObj = @{LogText = $logText} return $retObj } <# .Synopsis Function to force a machine to reboot out of band from any context that can access BMC. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node to restart. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Restart-Node -PhysicalNode $node -BMCCredential $cred This will force the machine to reboot #> function Restart-Node { [CmdletBinding()] param ( [Parameter(Mandatory=$false)] [string] $OOBManagementModulePath="$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [System.Xml.XmlElement] $PhysicalNode, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $NodeInstance, [Parameter(Mandatory=$true)] [string] $OOBProtocol ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" $nodeName = $PhysicalNode.Name $bmcIP = $PhysicalNode.BmcIPAddress Trace-Execution "Initiate IPMI-based restart for $nodeName (BMC: $bmcIP)." Restart-IpmiDevice -TargetAddress $bmcIP -Credential $BMCCredential -NodeInstance $NodeInstance -OOBProtocol $OOBProtocol -Verbose -Wait } <# .Synopsis Function to get product information of a physical node. .Parameter OOBManagementModulePath A relative path to the out-of-band management dll -- during deployment it is available locally but in ECE service it is located in an unpacked package. .Parameter PhysicalNode Information about the node. .Parameter BMCCredential Credentials used to interact with the BMC controller. .Example Restart-Node -PhysicalNode $node -BMCCredential $cred #> function Get-ProductInfo { [CmdletBinding()] param ( [Parameter(Mandatory = $false)] [string] $OOBManagementModulePath = "$PSScriptRoot\..\..\OOBManagement\bin\Microsoft.AzureStack.OOBManagement.dll", [Parameter(Mandatory=$true)] [System.Xml.XmlElement] $PhysicalMachinesRole, [Parameter(Mandatory=$true)] [PSCredential] $BMCCredential, [Parameter(Mandatory=$true)] [string] $OEMModel ) # After deployment, the source of this module changes Import-Module -Name $OOBManagementModulePath Import-Module -Name "$PSScriptRoot\..\..\OOBManagement\bin\Newtonsoft.Json.dll" if ([String]::IsNullOrEmpty($Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name)) { Trace-Execution "Target to all physical nodes since node list not set in execution context" [Array]$provisioningNodes = $PhysicalMachinesRole.Nodes.Node } else { Trace-Execution "Get node list from execution context" # Determine whether the context of the operation is a cluster scale out if ($Parameters.Context.ExecutionContext.Roles.Role.RoleName -ieq "Cluster") { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.PhysicalNodes.PhysicalNode.Name } else { $nodes = $Parameters.Context.ExecutionContext.Roles.Role.Nodes.Node.Name } [Array]$provisioningNodes = $PhysicalMachinesRole.Nodes.Node | Where-Object { $nodes -contains $_.Name } } foreach ($node in $provisioningNodes) { $bmcIP = $node.BmcIPAddress $nodeName = $node.Name $nodeInstance = $node.NodeInstance $oobProtocol = $node.OOBProtocol try { Trace-Execution "Initiate IPMI-based cmd to get Fru log for $nodeName (BMC: $bmcIP)." $fru = Get-IpmiDeviceFruLogs -TargetAddress $bmcIP -Credential $BMCCredential -NodeInstance $nodeInstance -OOBProtocol $oobProtocol if ($fru) { return @{"Model" = $fru.ProductInfo.ProductName "Vendor" = $fru.ProductInfo.ManufacturerName "Serial" = $fru.ProductInfo.SerialNumber } } } catch { Trace-Execution "Fail to Get-IpmiDeviceFruLogs for $nodeName (BMC: $bmcIP): $_" } } return $null } <# .Synopsis Function to wait for ping, CIM, recent OS installation (with a deployment artifact) and WinRM to be available on a machine .Parameter StartTime The start time of the operation, used to check that OS boot time was strictly after the wait period. .Parameter StopTime The stop time for the wait operation after which the operation is considered failed. .Parameter PhysicalNodeArray A list of physical machine nodes to wait. .Parameter RemoteCIMCredential The credential to use to connect to CIM and WinRM. .Parameter DeploymentID A unique identifier meant to signify the deployment that the machine is associated with. .Parameter IgnoreOldOSCheckResult Whether to consider it a failure if the OS discovered on the machine is from before the waiting period began. #> function Wait-RemoteCimInitializedOneNodeBareMetal { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [DateTime] $StartTime, [Parameter(Mandatory=$true)] [DateTime] $StopTime, [Parameter(Mandatory=$true)] [System.Xml.XmlElement[]] $PhysicalNodeArray, [Parameter(Mandatory=$true)] [PSCredential] $RemoteCIMCredential, [Parameter(Mandatory=$true)] [Guid] $DeploymentID, [Parameter(Mandatory=$true)] [bool] $IgnoreOldOSCheckResults ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop $remainingNodes = $PhysicalNodeArray $failedNodeNames = @() do { $nodes = $remainingNodes foreach ($node in $nodes) { $nodeName = $node.Name $nodeIP = $node.IPv4Address # Default to HostNIC if we cant find any IPv4Addresses if (-not $nodeIP) { $hostNICNetworkName = Get-NetworkNameForCluster -ClusterName "s-cluster" -NetworkName "HostNIC" $nodeIP = ($node.NICs.NIC | Where-Object NetworkId -eq $hostNICNetworkName | ForEach-Object IPv4Address)[0].Split('/')[0] } if (Test-IPConnection $nodeIP) { $cimSession = $null $session = $null try { $errorCountBefore = $global:error.Count #try the node name first because in some scenario IP is not trusted $cimSession = New-CimSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $cimSession) { $cimSession = New-CimSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } $os = $null if ($cimSession) { $os = Get-CimInstance win32_operatingsystem -CimSession $cimSession -ErrorAction SilentlyContinue } $errorCountAfter = $global:error.Count $numberOfNewErrors = $errorCountAfter - $errorCountBefore if ($numberOfNewErrors -gt 0) { $global:error.RemoveRange(0, $numberOfNewErrors) } if ($os) { $osLastBootUpTime = $os.LastBootUpTime $osInstallTime = $os.InstallDate #try the node name first because in some scenario IP is not trusted $session = New-PSSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $session) { $session = New-PSSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } } else { Trace-Execution "$nodeName could not query an OS." } } catch { if ($session) { Trace-Execution "Caught exception after session to new OS was created: $_" Remove-PSSession $session -ErrorAction SilentlyContinue $session = $null } $global:error.RemoveAt(0) } if ($session) { $isNewDeployment = Invoke-Command -Session $session -ScriptBlock { Test-Path "$env:SystemDrive\CloudBuilderTemp\$($using:DeploymentID).txt" } if ($isNewDeployment) { Trace-Execution "$nodeName has finished OS deployment. Boot time reported by the node - $($osLastBootUpTime.ToString())." $failedNodeNames = $failedNodeNames | Where-Object Name -ne $nodeName } else { Trace-Warning "$nodeName has booted up to an old OS installed on $($osInstallTime.ToString())." if (-not $IgnoreOldOSCheckResult) { $failedNodeNames += $nodeName } } $remainingNodes = $remainingNodes | Where-Object Name -ne $node.Name } elseif ($cimSession) { Remove-CimSession $cimSession } else { Trace-Execution "$nodeName could not establish CIM session using IP $nodeIP or name." } } else { Trace-Execution "$nodeName did not respond to ping with IP $nodeIP ." } } if (-not $remainingNodes) { break } Start-Sleep -Seconds 15 } until ([DateTime]::Now -gt $StopTime) $remainingNodeNames = @($remainingNodes | ForEach-Object Name) $totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes if ($failedNodeNames -or $remainingNodeNames) { Trace-Error "Bare metal deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $(($failedNodeNames + $remainingNodeNames) -join ',')." } else { Trace-Execution "Bare metal deployment has completed on the target node." } } function Wait-ForISOImageBareMetal { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [DateTime] $StartTime, [Parameter(Mandatory=$true)] [DateTime] $StopTime, [Parameter(Mandatory=$true)] [Array] $PhysicalNodeArray, [Parameter(Mandatory=$true)] [PSCredential] $RemoteCIMCredential, [Parameter(Mandatory=$true)] [Guid] $DeploymentID, [Parameter(Mandatory=$true)] [bool] $IgnoreOldOSCheckResults ) $ErrorActionPreference = [System.Management.Automation.ActionPreference]::Stop [Array]$remainingNodes = $PhysicalNodeArray | Sort-Object Name $failedNodeNames = @() $wait = $true while ($wait) { if ([DateTime]::Now -lt $StopTime) { foreach ($node in $remainingNodes) { $nodeName = $node.Name $nodeIP = $node.IPv4Address if (Test-IPConnection $nodeIP) { Trace-Execution "$nodeName is responding to ping" $cimSession = $null $session = $null try { $errorCountBefore = $global:error.Count # Try the node name first because in some scenario IP is not trusted $cimSession = New-CimSession -ComputerName $nodeName -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue if ($null -eq $cimSession) { $cimSession = New-CimSession -ComputerName $nodeIP -Credential $RemoteCIMCredential -ErrorAction SilentlyContinue } $os = $null if ($null -ne $cimSession) { Trace-Execution "$nodeName CIM was session created - getting Win32_OperatingSystem data" $os = Get-CimInstance Win32_OperatingSystem -CimSession $cimSession -ErrorAction SilentlyContinue } $errorCountAfter = $global:error.Count $numberOfNewErrors = $errorCountAfter - $errorCountBefore if ($numberOfNewErrors -gt 0) { $global:error.RemoveRange(0, $numberOfNewErrors) } if ($null -ne $os) { $osLastBootUpTime = $os.LastBootUpTime $osInstallTime = $os.InstallDate Trace-Execution "$nodeName attempting to create PS session as '$($RemoteCIMCredential.UserName)'" # Try the node name first because in some scenario IP is not trusted try { $session = Microsoft.PowerShell.Core\New-PSSession -ComputerName $nodeName -Credential $RemoteCIMCredential if ($null -eq $session) { $session = Microsoft.PowerShell.Core\New-PSSession -ComputerName $nodeIP -Credential $RemoteCIMCredential } } catch { Trace-Execution "$nodeName failed to created PS session with error: $($PSItem.Exception.Message)" } } else { Trace-Execution "$nodeName could not query Win32_OperatingSystem" } } catch { if ($null -ne $session) { Trace-Execution "Caught exception after session to new OS was created: $($PSItem.Exception.Message)" Remove-PSSession $session -ErrorAction SilentlyContinue $session = $null } $global:error.RemoveAt(0) } if ($null -ne $session) { Trace-Execution "$nodeName PS session was created - looking for $DeploymentID.txt file on this node" Trace-Execution "Waiting for 5 min after successful network connection so that setupcomplete can converge on the physical machine." Start-Sleep -Seconds 300 $isNewDeployment = Invoke-Command -Session $session -ScriptBlock { Test-Path -Path "$env:SystemDrive\CloudBuilderTemp\$($using:DeploymentID).txt" } if ($true -eq $isNewDeployment) { Trace-Execution "$nodeName has finished OS deployment. Boot time reported by the node - $($osLastBootUpTime.ToString())" $failedNodeNames = $failedNodeNames | Where-Object Name -ne $nodeName } else { Trace-Warning "$nodeName has booted up to an old OS installed on $($osInstallTime.ToString())" if (-not $IgnoreOldOSCheckResult) { $failedNodeNames += $nodeName } } Trace-Execution "$nodeName has completed bare metal deployment" $remainingNodes = $remainingNodes | Where-Object Name -ne $nodeName } else { Trace-Execution "$nodeName could not establish Powershell session using IP $nodeIP or name" Trace-Execution "$nodeName attempt to map network drive to C`$" try { $fileFound = $false $netShare = New-PSDrive -Name $nodeName -PSProvider FileSystem -Root "\\$nodeName\C`$" -Credential $RemoteCIMCredential if ($null -ne $netShare) { $fileFound = Test-Path -Path "$($nodeName):\CloudBuilderTemp\$($DeploymentID).txt" } } catch { Trace-Execution "$nodeName failed to map network drive with error: $($PSItem.Exception.Message)" } if ($true -eq $fileFound) { Trace-Execution "$nodeName has completed bare metal deployment" $remainingNodes = $remainingNodes | Where-Object Name -ne $nodeName } } if ($null -ne $cimSession) { Remove-CimSession $cimSession } else { Trace-Execution "$nodeName could not establish CIM session using IP $nodeIP or name" } if ($null -ne $netShare) { Remove-PSDrive -Name $nodeName -ErrorAction SilentlyContinue $netShare = $null } } else { Trace-Execution "$nodeName did not respond to ping with IP $nodeIP" } } if ($remainingNodes.Count -eq 0) { Trace-Execution "All nodes have completed bare metal deployment" $wait = $false } else { Trace-Execution "Still waiting for $($remainingNodes.Count) node(s) to complete" Start-Sleep -Seconds 60 } } else { Trace-Execution "Timed out waiting for all nodes to complete bare metal deployment" Trace-Execution "$($remainingNodes.Count) node(s) did not respond in time" $wait = $false } } if ($remainingNodes.Count -eq 0) { $remainingNodeNames = @() } else { $remainingNodeNames = @($remainingNodes | ForEach-Object Name) } $totalBmdWaitTimeMinutes = [int]($StopTime - $StartTime).TotalMinutes if (($failedNodeNames.Count + $remainingNodeNames.Count) -gt 0) { [string]$badNodes = ($failedNodeNames + $remainingNodeNames) -join ',' Trace-Error "Bare metal deployment failed to complete in $totalBmdWaitTimeMinutes minutes - $badNodes." } else { Trace-Execution "Bare metal deployment has completed on the target nodes." } } <# .SYNOPSIS While a host is being restarted and brought back online, this function is used to select a different host on the same cluster to perform remote PowerShell operations on. #> function Get-HostNameForRemoting { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [CloudEngine.Configurations.EceInterfaceParameters] $Parameters, [Parameter(Mandatory=$true)] [string] $HostBeingRebooted ) $ErrorActionPreference = "Stop" $clusterName = Get-NodeRefClusterId -Parameters $Parameters -RoleName "BareMetal" -NodeName $HostBeingRebooted $availableHosts = Get-ActiveClusterNodes -Parameters $Parameters -ClusterName $clusterName $availableHosts = $availableHosts | Where-Object { $_ -ne $HostBeingRebooted } if ($availableHosts.Count -eq 0) { Trace-Error "There are no available hosts on which to perform remote operations." } else { Trace-Execution "Selected host $($availableHosts[0])." return $availableHosts[0] } } <# .SYNOPSIS This function is used to do cluster aware update based on different Cau Plugins. #> function Invoke-CauRunHelper { [CmdletBinding()] param ( [Parameter(Mandatory=$true)] [System.Collections.Hashtable] $cauParams ) $ErrorActionPreference = "Stop" Trace-Execution "Start invoke caurun" Invoke-CauRun @cauParams } Export-ModuleMember -Function Start-PXEBoot Export-ModuleMember -Function Restart-Node Export-ModuleMember -Function Stop-DeployingMachines Export-ModuleMember -Function Start-DeployingMachines Export-ModuleMember -Function Add-DeployingMachineNetworkReservation Export-ModuleMember -Function Remove-MachineNetworkReservation Export-ModuleMember -Function Wait-RemoteCimInitializedOneNodeBareMetal Export-ModuleMember -Function Wait-ForISOImageBareMetal Export-ModuleMember -Function Get-HostNameForRemoting Export-ModuleMember -Function Get-ProductInfo Export-ModuleMember -Function Invoke-CauRunHelper # SIG # Begin signature block # MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBtuYtweW4wXFKw # Slz6sMNlownnwHytqoGhbETtt0TsjKCCDXYwggX0MIID3KADAgECAhMzAAADrzBA # DkyjTQVBAAAAAAOvMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjMxMTE2MTkwOTAwWhcNMjQxMTE0MTkwOTAwWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQDOS8s1ra6f0YGtg0OhEaQa/t3Q+q1MEHhWJhqQVuO5amYXQpy8MDPNoJYk+FWA # hePP5LxwcSge5aen+f5Q6WNPd6EDxGzotvVpNi5ve0H97S3F7C/axDfKxyNh21MG # 0W8Sb0vxi/vorcLHOL9i+t2D6yvvDzLlEefUCbQV/zGCBjXGlYJcUj6RAzXyeNAN # xSpKXAGd7Fh+ocGHPPphcD9LQTOJgG7Y7aYztHqBLJiQQ4eAgZNU4ac6+8LnEGAL # go1ydC5BJEuJQjYKbNTy959HrKSu7LO3Ws0w8jw6pYdC1IMpdTkk2puTgY2PDNzB # tLM4evG7FYer3WX+8t1UMYNTAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQURxxxNPIEPGSO8kqz+bgCAQWGXsEw # RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW # MBQGA1UEBRMNMjMwMDEyKzUwMTgyNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci # tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG # CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu # Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0 # MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAISxFt/zR2frTFPB45Yd # mhZpB2nNJoOoi+qlgcTlnO4QwlYN1w/vYwbDy/oFJolD5r6FMJd0RGcgEM8q9TgQ # 2OC7gQEmhweVJ7yuKJlQBH7P7Pg5RiqgV3cSonJ+OM4kFHbP3gPLiyzssSQdRuPY # 1mIWoGg9i7Y4ZC8ST7WhpSyc0pns2XsUe1XsIjaUcGu7zd7gg97eCUiLRdVklPmp # XobH9CEAWakRUGNICYN2AgjhRTC4j3KJfqMkU04R6Toyh4/Toswm1uoDcGr5laYn # TfcX3u5WnJqJLhuPe8Uj9kGAOcyo0O1mNwDa+LhFEzB6CB32+wfJMumfr6degvLT # e8x55urQLeTjimBQgS49BSUkhFN7ois3cZyNpnrMca5AZaC7pLI72vuqSsSlLalG # OcZmPHZGYJqZ0BacN274OZ80Q8B11iNokns9Od348bMb5Z4fihxaBWebl8kWEi2O # PvQImOAeq3nt7UWJBzJYLAGEpfasaA3ZQgIcEXdD+uwo6ymMzDY6UamFOfYqYWXk # ntxDGu7ngD2ugKUuccYKJJRiiz+LAUcj90BVcSHRLQop9N8zoALr/1sJuwPrVAtx # HNEgSW+AKBqIxYWM4Ev32l6agSUAezLMbq5f3d8x9qzT031jMDT+sUAoCw0M5wVt # CUQcqINPuYjbS1WgJyZIiEkBMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq # hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x # EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv # bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5 # IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG # EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG # A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg # Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC # CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03 # a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr # rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg # OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy # 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9 # sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh # dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k # A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB # w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn # Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90 # lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w # ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o # ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD # VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa # BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny # bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG # AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV # HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG # AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl # AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb # C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l # hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6 # I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0 # wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560 # STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam # ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa # J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah # XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA # 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt # Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr # /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw # EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN # aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp # Z25pbmcgUENBIDIwMTECEzMAAAOvMEAOTKNNBUEAAAAAA68wDQYJYIZIAWUDBAIB # BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO # MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEINOK3qGihyB6FnQ36vktKmpX # isSyJxcmJtXrsXDsre2eMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A # cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB # BQAEggEAeSRceKwQCIm+/mhxbBBsNOsWMjR+iDqPyYkg2CTLXkb6BXB1zxnByNm6 # E6GeAvuTjl8IauwtDmOq8FHFqsakvmJMKtcLHeFOynZuG3ccwS/hPx/72NCk2LRq # u31GWDENoBkiGAQeGHl7cHbQWriiUXJK1UlD+BqYlFmnt7rV8eSg4hB3x4fchsIO # 7vwRUyaahzVffZVr4jM03uZhO1ZRIqx4N7xHiInFQXBToFLjBxa/c6nIeVeiqUPa # x3aqi6F2KZ1GviqZw86JxM09ioEuX3uUYpkS5zWSYWlqYMzOy3mP53zFHTxgU+wH # ZcKUpQqoi+bl42GfAIZO+SUeaNYk4aGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC # F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq # hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl # AwQCAQUABCDSOvMRHZhlMiW2g2U2Docp1C5LzX13RWs2BJ+wROF1JwIGZus5BavE # GBMyMDI0MTAwOTAxMTI1Ni42MjFaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB+R9njXWrpPGxAAEAAAH5MA0G # CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u # MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp # b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0 # MDcyNTE4MzEwOVoXDTI1MTAyMjE4MzEwOVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w # ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjJBMUEt # MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl # MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEAtD1MH3yAHWHNVslC+CBT # j/Mpd55LDPtQrhN7WeqFhReC9xKXSjobW1ZHzHU8V2BOJUiYg7fDJ2AxGVGyovUt # gGZg2+GauFKk3ZjjsLSsqehYIsUQrgX+r/VATaW8/ONWy6lOyGZwZpxfV2EX4qAh # 6mb2hadAuvdbRl1QK1tfBlR3fdeCBQG+ybz9JFZ45LN2ps8Nc1xr41N8Qi3KVJLY # X0ibEbAkksR4bbszCzvY+vdSrjWyKAjR6YgYhaBaDxE2KDJ2sQRFFF/egCxKgogd # F3VIJoCE/Wuy9MuEgypea1Hei7lFGvdLQZH5Jo2QR5uN8hiMc8Z47RRJuIWCOeyI # J1YnRiiibpUZ72+wpv8LTov0yH6C5HR/D8+AT4vqtP57ITXsD9DPOob8tjtsefPc # QJebUNiqyfyTL5j5/J+2d+GPCcXEYoeWZ+nrsZSfrd5DHM4ovCmD3lifgYnzjOry # 4ghQT/cvmdHwFr6yJGphW/HG8GQd+cB4w7wGpOhHVJby44kGVK8MzY9s32Dy1THn # Jg8p7y1sEGz/A1y84Zt6gIsITYaccHhBKp4cOVNrfoRVUx2G/0Tr7Dk3fpCU8u+5 # olqPPwKgZs57jl+lOrRVsX1AYEmAnyCyGrqRAzpGXyk1HvNIBpSNNuTBQk7FBvu+ # Ypi6A7S2V2Tj6lzYWVBvuGECAwEAAaOCAUkwggFFMB0GA1UdDgQWBBSJ7aO6nJXJ # I9eijzS5QkR2RlngADAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf # BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz # L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww # bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m # dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El # MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF # BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEAZiAJgFbkf7jf # hx/mmZlnGZrpae+HGpxWxs8I79vUb8GQou50M1ns7iwG2CcdoXaq7VgpVkNf1uvI # hrGYpKCBXQ+SaJ2O0BvwuJR7UsgTaKN0j/yf3fpHD0ktH+EkEuGXs9DBLyt71iut # Vkwow9iQmSk4oIK8S8ArNGpSOzeuu9TdJjBjsasmuJ+2q5TjmrgEKyPe3TApAio8 # cdw/b1cBAmjtI7tpNYV5PyRI3K1NhuDgfEj5kynGF/uizP1NuHSxF/V1ks/2tCEo # riicM4k1PJTTA0TCjNbkpmBcsAMlxTzBnWsqnBCt9d+Ud9Va3Iw9Bs4ccrkgBjLt # g3vYGYar615ofYtU+dup+LuU0d2wBDEG1nhSWHaO+u2y6Si3AaNINt/pOMKU6l4A # W0uDWUH39OHH3EqFHtTssZXaDOjtyRgbqMGmkf8KI3qIVBZJ2XQpnhEuRbh+Agpm # Rn/a410Dk7VtPg2uC422WLC8H8IVk/FeoiSS4vFodhncFetJ0ZK36wxAa3FiPgBe # bRWyVtZ763qDDzxDb0mB6HL9HEfTbN+4oHCkZa1HKl8B0s8RiFBMf/W7+O7EPZ+w # MH8wdkjZ7SbsddtdRgRARqR8IFPWurQ+sn7ftEifaojzuCEahSAcq86yjwQeTPN9 # YG9b34RTurnkpD+wPGTB1WccMpsLlM0wggdxMIIFWaADAgECAhMzAAAAFcXna54C # m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE # CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z # b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp # Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy # MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH # EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV # BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B # AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51 # yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY # 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9 # cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN # 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua # Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74 # kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2 # K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5 # TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk # i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q # BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri # Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC # BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl # pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y # eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA # YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU # 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny # bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw # MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w # Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp # b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm # ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM # 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW # OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4 # FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw # xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX # fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX # VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC # onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU # 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG # ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl # bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT # TjoyQTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg # U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAqs5WjWO7zVAKmIcdwhqgZvyp6UaggYMw # gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD # VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF # AAIFAOqwFFcwIhgPMjAyNDEwMDgyMDI4MDdaGA8yMDI0MTAwOTIwMjgwN1owdzA9 # BgorBgEEAYRZCgQBMS8wLTAKAgUA6rAUVwIBADAKAgEAAgIb9QIB/zAHAgEAAgIT # QTAKAgUA6rFl1wIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow # CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQAJeaTWdVz6 # TRrmR+ZQDUeMReQrxTtW8flgm3jlZ0wEMZ9rqSJAbKP6mK69Cg/DuCO0iZk78GlB # uIkfxhfKHNvjrW5OuaIj7DpKp4BBwcg0Q0+T6sMdNihCrmtQLEvYxfIXhRBwwFJk # fOD74yy+rxei5AS54DSRjPCBprV1NNmk/bRb1eMnon7znUO1v8a26p3ePgo3tcqG # 58oCGJUBs5GT2SvZQDSSqqmot7xmz73YtOcmF8M79fItT/BxhrAJnUzXAQgt/BZb # 6LkbzhaN4piAgQbw7WohBYOsrrYDgrasEa29ymd0OdqWBM54HnmI+26bDZ4L2HR2 # sW4Behv5Vh3dMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT # Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m # dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB # IDIwMTACEzMAAAH5H2eNdauk8bEAAQAAAfkwDQYJYIZIAWUDBAIBBQCgggFKMBoG # CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgvlrug5Kx # bo4CeKj1KNom4ZrUJBsFnfo5jyvq8pQjLzowgfoGCyqGSIb3DQEJEAIvMYHqMIHn # MIHkMIG9BCA5I4zIHvCN+2T66RUOLCZrUEVdoKlKl8VeCO5SbGLYEDCBmDCBgKR+ # MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT # HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB+R9njXWrpPGxAAEA # AAH5MCIEICg0FSgJqDpgrp0nEOO0m/kEOEJqgKL/FOZ6aw8VZnl1MA0GCSqGSIb3 # DQEBCwUABIICADsiEXa4cWjVcHsdQcimMs6b4J8vt7541NtOKZiWeRNn9dPgku9K # ONFvyDQjWbuUpTwZexjQqQkKOlg15ybb2UF1aB/nF7hDI0uZn8G9th/Md5fGiJS8 # V5wu+9CEY5D+oiUhSV/QBkNhjEJD1gRiqVtG1uG9pJbED9RNx3LjwEECobbsJ0lU # 1kaG3YMAYdpysBBRdM8UYvMQrnBwi3h1QFis4WqbK2WTxQPYta8OurIiLIbY1lZF # DG31Kn0xvKi9IGwy2RnTbl34OKeIRXOus9c129GzyzDJuOpLlN/Cq9+qIinJy2kQ # VbvAvzAZItPCrcBZHtYX35IKrZ9NIALiqu3lOVoQq2rNPjLVPm/1vbjkg+gD8tai # j7dfd0rh6BIgxC05bKZSla2BDKZ+07WedJhu2LQB+zhxqlhO7sgmfDeg0gYEdD30 # IlgenN1Jv+FyjP/F1K5mgdDifWEGsYgilXRLjj2lsa/hmiJ2hJepXIrw3qnNFSfH # 99InUdXwFL3EtOHNmJz7DTw2mDZFyxF2UQnHmqLpknNmxaYasBptHYznSEnGmox4 # SCOlXctr2zIt/wISdbIujBSXktqk63auFRFyKr8hanBTeXZ5x5TBgoudZ+eHLZQi # +XOLTRZ3Siz7JscxWZWRZVRALJcGB+G2MzBDE2die1Ws14UTaniiqLTp # SIG # End signature block |