AzStackHci.EnvironmentChecker.Utilities.psm1
Import-Module $PSScriptRoot\AzStackHci.EnvironmentChecker.Reporting.psm1 -Force -DisableNameChecking -Global Import-LocalizedData -BindingVariable lTxt -FileName AzStackHci.EnvironmentChecker.Strings.psd1 class HealthModel { # Attributes for Azure Monitor schema [string]$Name #Name of the individual test/rule/alert that was executed. Unique, not exposed to the customer. [string]$Title #User-facing name; one or more sentences indicating the direct issue. [string]$Severity #Severity of the result (Critical, Warning, Informational, Hidden) – this answers how important the result is. Critical is the only update-blocking severity. [string]$Description #Detailed overview of the issue and what impact the issue has on the stamp. [psobject]$Tags #Key-value pairs that allow grouping/filtering individual tests. For example, "Group": "ReadinessChecks", "UpdateType": "ClusterAware" [string]$Status #The status of the check running (i.e. Failed, Succeeded, In Progress) – this answers whether the check ran, and passed or failed. [string]$Remediation #Set of steps that can be taken to resolve the issue found. [string]$TargetResourceID #The unique identifier for the affected resource (such as a node or drive). [string]$TargetResourceName #The name of the affected resource. [string]$TargetResourceType #The type of resource being referred to (well-known set of nouns in infrastructure, aligning with Monitoring). [datetime]$Timestamp #The Time in which the HealthCheck was called. [psobject]$AdditionalData #Property bag of key value pairs for additional information. [string]$HealthCheckSource #The name of the services called for the HealthCheck (I.E. Test-AzureStack, Test-Cluster). } function Test-ModuleUpdate { <# .SYNOPSIS Checks PSGallery for updated module. .DESCRIPTION Checks PSGallery for updated module and gives user 10 seconds to cancel cmdlet and prints update instructions to screen #> param([switch]$PassThru) try { if (-not $PassThru) { Log-Info "Looking for module updates for $($MyInvocation.MyCommand.Module.Name) greater than $($MyInvocation.MyCommand.Module.Version)" $ModuleOnline = Find-Module -Name $MyInvocation.MyCommand.Module.Name -Repository PSGallery -AllowPrerelease -ErrorAction SilentlyContinue if (([system.version]$ModuleOnline.Version -replace ('-preview', '')) -gt [system.version]$MyInvocation.MyCommand.Module.Version) { Log-Info ($lTxt.CurrentVersion -f $MyInvocation.MyCommand.Module.Name, $MyInvocation.MyCommand.Module.Version) -ConsoleOut Log-Info ($lTxt.UpdateToVersion -f $ModuleOnline.Version, $MyInvocation.MyCommand.Module.Name) -ConsoleOut Start-Sleep -Seconds 10 } else { Log-Info ($lTxt.CurrentVersion -f $MyInvocation.MyCommand.Module.Name, $MyInvocation.MyCommand.Module.Version) } } } catch { Log-Info ($lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message) -Type Error } } function Test-IsClusterNode { <# .SYNOPSIS This is a function to test is the local machine is a cluster node. #> [CmdletBinding()] param( [Parameter()] [System.Management.Automation.Runspaces.PSSession] $PsSession ) $clusSvc = Get-Service -Name ClusSvc -ErrorAction SilentlyContinue if ($clusSvc.Status -eq 'Running') { Log-Info -Message "Cluster service is running on $ENV:ComputerName" return $true } else { Log-Info -Message "Cluster service is not running on $ENV:ComputerName" return $false } } function Get-ClusterNodeName { <# .SYNOPSIS Get all Cluster Node names. #> [CmdletBinding()] param ( [Parameter()] [string] $Cluster, [Parameter()] [System.Management.Automation.Runspaces.PSSession] $PsSession ) $sb = { if ([string]::IsNullOrEmpty($Cluster)) { Get-ClusterNode } else { Get-ClusterNode -Cluster $Cluster } } if ([string]::IsNullOrEmpty($PsSession)) { Log-Info -Message "Get cluster node locally on $ENV:ComputerName" $nodes = Invoke-Command -ScriptBlock $sb } else { Log-Info -Message "Get cluster node from PsSession on $($PsSession.ComputerName)" $nodes = Invoke-Command -ScriptBlock $sb -Session $PsSession } foreach ($node in $nodes) { if ($node.State -ne 'Up') { Log-Info -Message "$node state is $($node.state)" } } Log-Info -Message ("Return node names: {0}" -f ($nodes.name -join ',')) return $nodes.Name } function Open-PsSession { <# .SYNOPSIS Create PsSession to intended targets .DESCRIPTION Creates PsSession to single computer, cluster and related nodes. #> [CmdletBinding()] param ( [Parameter(Mandatory = $false, HelpMessage = "Specify the Computer Name(s) to run validation from. If null the local machine will be used.")] [string[]] $ComputerName, [Parameter(Mandatory = $false, HelpMessage = "Specify the Cluster Name to run validation from. If null the local machine will be used.")] [string] $Cluster, [Parameter(Mandatory = $false, HelpMessage = "Specify the credential used to connect to remote computer.")] [pscredential] $Credential, [Parameter(Mandatory = $false, HelpMessage = "Specify the authentication used to connect to remote computer.")] $Authentication ) try { # Build PsSession Params $sessionAuthParams = @{} if (-not [string]::IsNullOrEmpty($Authentication)) { if ($Authentication -eq 'CredSSP' -and [string]::IsNullOrEmpty($Credential)) { throw "A credential object must be provided with $Authentication Authentication" } $sessionAuthParams += @{ Authentication = $Authentication } } if (-not [string]::IsNullOrEmpty($Credential)) { $sessionAuthParams += @{ Credential = $Credential } } # Check if local machine is a cluster node and get its cluster nodes if (Test-IsClusterNode) { if ([string]::IsNullOrEmpty($Credential)) { Log-Info -Message "Credential not provided. Other Cluster nodes will not have connectivity validated. Only $ENV:ComputerName" } else { Log-Info -Message "Get computer names from local cluster/nodes" $ComputerName += @(Get-ClusterNodeName) } } # Create PsSession to cluster and get node names if (-not [string]::IsNullOrEmpty($Cluster)) { Log-Info -Message "Create session to cluster $cluster" $ClusterPsSession = New-PSSession -ComputerName $Cluster @sessionAuthParams Log-Info -Message "Get computer names from remote session to cluster $Cluster" $ComputerName = Get-ClusterNodeName -PsSession $ClusterPsSession -Cluster $Cluster Log-Info -Message ("ComputerNames found {0} from remote session to cluster $cluster. Removing session." -f ($ComputerName -join ',')) $ClusterPsSession | Remove-PSSession } if ([string]::IsNullOrEmpty($ComputerName)) { Log-Info -Message ("Running all tests locally.") } else { $ComputerName = $ComputerName | Sort-Object | Get-Unique Log-Info -Message ("Create a pssession to each ComputerName {0}." -f ($ComputerName -join ',')) $PsSession = @() $PsSession += foreach ($Computer in $ComputerName) { $Session = New-PSSession -ComputerName $Computer @sessionAuthParams -ErrorAction Stop Log-Info -Message ("Create a pssession created to {0}." -f $Session.ComputerName) } if ($null -eq $Session) { throw "User specified ComputerName but no remote sessions could be established to $($Computer -join ',')" } $Session } return $PsSession } catch { $exceptionMsg = $lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message Log-Info $exceptionMsg -Type Error throw $exceptionMsg } } function Open-CimSession { <# .SYNOPSIS Create PsSession to intended targets .DESCRIPTION Creates PsSession to single computer, cluster and related nodes. #> [CmdletBinding()] param ( [Parameter(Mandatory = $false, HelpMessage = "Specify the Computer Name(s) to run validation from. If null the local machine will be used.")] [string[]] $ComputerName, [Parameter(Mandatory = $false, HelpMessage = "Specify the Cluster Name to run validation from. If null the local machine will be used.")] [string] $Cluster, [Parameter(Mandatory = $false, HelpMessage = "Specify the credential used to connect to remote computer.")] [pscredential] $Credential, [Parameter(Mandatory = $false, HelpMessage = "Specify the authentication used to connect to remote computer.")] $Authentication ) try { # Build PsSession Params $sessionAuthParams = @{} if (-not [string]::IsNullOrEmpty($Authentication)) { if ($Authentication -eq 'CredSSP' -and [string]::IsNullOrEmpty($Credential)) { throw "A credential object must be provided with $Authentication Authentication" } $sessionAuthParams += @{ Authentication = $Authentication } } if (-not [string]::IsNullOrEmpty($Credential)) { $sessionAuthParams += @{ Credential = $Credential } } # Check if local machine is a cluster node and get its cluster nodes if (Test-IsClusterNode) { if ([string]::IsNullOrEmpty($Credential)) { Log-Info -Message "Credential not provided. Other Cluster nodes will not have connectivity validated. Only $ENV:ComputerName" } else { Log-Info -Message "Get computer names from local cluster/nodes" $ComputerName += @(Get-ClusterNodeName) } } # Create PsSession to cluster and get node names if (-not [string]::IsNullOrEmpty($Cluster)) { Log-Info -Message "Create session to cluster $cluster" $ClusterPsSession = New-PSSession -ComputerName $Cluster @sessionAuthParams Log-Info -Message "Get computer names from remote session to cluster $Cluster" $ComputerName = Get-ClusterNodeName -PsSession $ClusterPsSession -Cluster $Cluster Log-Info -Message ("ComputerNames found {0} from remote session to cluster $cluster. Removing session." -f ($ComputerName -join ',')) $ClusterPsSession | Remove-PSSession } if ([string]::IsNullOrEmpty($ComputerName)) { Log-Info -Message ("Running all tests locally.") $CimSession = New-CimSession -ComputerName $ENV:COMPUTERNAME } else { $ComputerName = $ComputerName | Sort-Object | Get-Unique Log-Info -Message ("Create a CimSession to each ComputerName {0}." -f ($ComputerName -join ',')) $CimSession = @() $CimSession += foreach ($Computer in $ComputerName) { $Session = New-CimSession -ComputerName $Computer @sessionAuthParams -ErrorAction Stop Log-Info -Message ("Create a CimSession created to {0}." -f $Session.ComputerName) } if ($null -eq $Session) { throw "User specified ComputerName but no remote sessions could be established to $($Computer -join ',')" } $Session } return $CimSession } catch { $exceptionMsg = $lTxt.Exception -f $MyInvocation.MyCommand.Name, $_.exception.message Log-Info $exceptionMsg -Type Error throw $exceptionMsg } } function Test-Elevation { ([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole] 'Administrator') } function Test-Count { [CmdletBinding()] param ( [CimInstance[]] $CimData, [int] $minimum, [string] $ValidatorName, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { $passed = $false $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $instanceId = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique if ($CimData.Count -lt $minimum) { $passed = $false $detail = $lTxt.MinCount -f $ClassName, $CimData.count, $minimum } else { $passed = $true } $result = New-Object HealthModel $Result.Name = 'AzStackHci_{0}_Test_{1}_Count' -f $ValidatorName, $className $Result.Title = 'Test {0} Count' -f $className $Result.Severity = $Severity $Result.Description = 'Checking {0} count' -f $className $Result.Remediation = 'https://aka.ms/hci-connect-chk' $Result.TargetResourceID = $InstanceId $Result.TargetResourceName = $InstanceId $Result.TargetResourceType = $className $Result.Timestamp = [datetime]::UtcNow $Result.HealthCheckSource = 'Environment Checker' $Result.AdditionalData = New-Object -TypeName PSObject -Property @{ Source = "$ClassName Count" Resource = $CimData.count Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } $result.Status = if ($passed) { 'Succeeded' } else { 'Failed' } $result } catch { throw $_ } } function Test-InstanceCountByGroup { <# .SYNOPSIS Test if count matches across groups #> [CmdletBinding()] param ( [CimInstance[]] $CimData, [string[]] $GroupProperty, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { $GroupValues = $cimData | Group-Object -Property $groupProperty | Select-Object -ExpandProperty Name $nodeCount = ($cimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique).count foreach ($GroupValue in $GroupValues) { foreach ($group in $GroupProperty) { $gData = $CimData | Where-Object $Group -eq $GroupValue if ($gData.CimSystemProperties.SystemName.Count -eq 1) { $serverName = $gData.CimSystemProperties.SystemName } else { $serverName = 'AllServers' } $className = $gData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Count_ByGroup' -f $ValidatorName, $className $result.Title = 'Test {0} Properties' -f $className $result.Severity = $Severity $result.Description = 'Checking all servers have same {0} instance count by group' -f $className $result.Remediation = 'https://aka.ms/hci-connect-chk' $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $groupData = $gData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } } $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique # The count of InstanceCounts must equal the number of servers to ensure each server has at least 1 instance # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, but SVR3 could have 5 disks of type A. # There should be only 1 unique InstanceCount from all values to ensure each server has the same instance count # e.g. SVR1 has 6 disks of type A, SVR has 6 disks of type A, SVR3 has 6 disks of type A. $Status = if ($groupData.InstanceCount.Count -ne $nodeCount -or $groupDataCount.Count -gt 1 ) { 'Failed' } else { 'Succeeded' } $result.AdditionalData = New-Object -TypeName PSObject -Property @{ Source = $serverName Resource = $ClassName Detail = if ($status -eq 'Succeeded') { $lTxt.CountByGroup -f $Group } else { $lTxt.CountByGroupFail -f $group, ` (($groupData | ForEach-Object { "{0}: {1}: $Group`: {2}" -f $_.Name, $_.InstanceCount, $GroupValue }) -join ',') } Status = $Status TimeStamp = [datetime]::UtcNow } $result.Status = if ($result.AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } } } catch { throw $_ } } function Test-GroupProperty { <# .SYNOPSIS Test if properties match across groups #> [CmdletBinding()] param ( [CimInstance[]] $CimData, [string[]] $GroupProperty, [string[]] $MatchProperty, [string] $ValidatorName, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { # Group by name and compare properties within each group $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $ServerName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique $groupedData = @($CimData | Group-Object -Property $groupProperty) $returnResult = @() if ($serverName.Count -gt 1) { $serverName = 'AllServers' } $returnResult += foreach ($group in $groupedData) { $instanceId = "Machine: {0}, Class: {1} Group: {2}" -f $ServerName, $className, $group.Name $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Group_Consistency' -f $ValidatorName, $className $result.Title = 'Test {0} Groups' -f $className $result.Severity = $Severity $result.Description = 'Checking {0} Groups for consistent properties' -f $className $result.Remediation = 'https://aka.ms/hci-connect-chk' $result.TargetResourceID = $instanceId $result.TargetResourceName = $instanceId $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $AdditionalData = @() $detail = $null $passed = $false if ($group.Count -gt 1) { foreach ($propertyName in $matchProperty) { if (($group.Group.$propertyName | Sort-Object | Get-Unique).Count -gt 1) { $passed = $false $detail = $lTxt.MismatchProp -f $className, $propertyName, ($group.Group.$propertyName -join ', ') Log-Info -Message $detail -Type Warning } else { $passed = $true } $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = "$($Group.Name) $propertyName" Resource = $instance.$propertyName Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } } } $result.AdditionalData = $AdditionalData $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } $returnResult } catch { throw $_ } } function Test-InstanceCount { <# .SYNOPSIS Test if instance count matches across instances #> [CmdletBinding()] param ( [Parameter()] [CimInstance[]] $CimData, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) if ($CimData.CimSystemProperties.SystemName.Count -eq 1) { $serverName = $CimData.CimSystemProperties.SystemName } else { $serverName = 'AllServers' } $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Count' -f $ValidatorName, $className $result.Title = 'Test {0} Properties' -f $className $result.Severity = $Severity $result.Description = 'Checking all servers have same {0} instance count' -f $className $result.Remediation = 'https://aka.ms/hci-connect-chk' $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $groupData = $cimData | Group-Object { $_.CimSystemProperties.ServerName } | Select-Object *, @{label = 'InstanceCount'; e = { $_.count } } $groupDataCount = $groupData.InstanceCount | Sort-Object | Get-Unique $status = if ($groupDataCount.Count -gt 1) { 'Failed' } else { 'Succeeded' } $result.AdditionalData = New-Object -TypeName PSObject -Property @{ Source = $serverName Resource = $ClassName Detail = if ($status -eq 'Succeeded') { $lTxt.InstanceCount } else { $lTxt.InstanceCountFail -f ` (($groupData | ForEach-Object { "{0}: {1}" -f $_.Name, $_.InstanceCount }) -join ',') } Status = $status TimeStamp = [datetime]::UtcNow } $result.Status = if ($result.AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } function Test-PropertySync { <# .SYNOPSIS Test if properties match across instances #> [CmdletBinding()] param ( [Parameter()] [CimInstance[]] $CimData, [Parameter()] [string[]] $MatchProperty, [string] $ValidatorName, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { $returnResult = @() $className = $CimData.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 $serverName = $CimData.CimSystemProperties.ServerName | Sort-Object | Get-Unique if ($serverName.Count -gt 1) { $serverName = 'AllServers' $returnResult += Test-InstanceCount -CimData $CimData } $returnResult += if ($CimData.Count -gt 1) { $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Consistency' -f $ValidatorName, $className $result.Title = 'Test {0} Properties' -f $className $result.Severity = $Severity $result.Description = 'Checking all {0} for consistent properties' -f $className $result.Remediation = 'https://aka.ms/hci-connect-chk' $result.TargetResourceID = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceName = "{0}.All{1}" -f $ServerName, $className $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $AdditionalData = @() foreach ($propertyName in $matchProperty) { $detail = $null $passed = $false if (($CimData.$propertyName | Get-Unique).Count -gt 1) { $passed = $false $detail = $lTxt.MismatchProp -f $className, $propertyName, ($CimData.$propertyName -join ',') Log-Info -Message $detail -Type Warning } else { $passed = $true } $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = "$className`: $propertyName" Resource = $instance.$propertyName Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } } $result.AdditionalData = $AdditionalData $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } return $returnResult } catch { throw $_ } } function Test-DesiredProperty { <# .SYNOPSIS Test if properties have required value #> [cmdletbinding()] param ( [CimInstance[]] $cimData, [hashtable] $desiredPropertyValue, [string] $InstanceIdStr, [string] $ValidatorName, [validateset('Critical','Warning','Informational','Hidden')] [string] $Severity ) try { # Test properties $returnResult = @() $returnResult += foreach ($instance in $cimData) { $serverName = $instance.CimSystemProperties.ServerName | Sort-Object | Get-Unique $sb = ([scriptblock]::Create($InstanceIdStr)) $instanceId = Invoke-Command -ScriptBlock $sb $className = $instance.CimSystemProperties.ClassName -split '_' | Select-Object -Last 1 Log-Info -Message ($lTxt.Test -f $className, $instanceId) $result = New-Object HealthModel $result.Name = 'AzStackHci_{0}_Test_{1}_Instance_Properties' -f $ValidatorName, $className $result.Title = 'Test {0} Properties' -f $className $result.Severity = $Severity $result.Description = 'Checking {0} for desired properties' -f $className $result.Remediation = 'https://aka.ms/hci-connect-chk' $result.TargetResourceID = $instanceId $result.TargetResourceName = $instanceId $result.TargetResourceType = $className $result.Timestamp = [datetime]::UtcNow $result.HealthCheckSource = 'Environment Checker' $AdditionalData = @() foreach ($propertyName in $desiredPropertyValue.Keys) { $detail = $null $passed = $false $hint = $null $desiredPropertyValueCheck = $null $desiredPropertyValueCheck = if ($desiredPropertyValue.$propertyName -is [hashtable]) { $desiredPropertyValue.$propertyName.Value } else { $desiredPropertyValue.$propertyName } if (($instance.$propertyName | Select-Object -First 1) -notin $desiredPropertyValueCheck) { $passed = $false $hint = if ($desiredPropertyValue.$propertyName.hint) { ' ({0})' -f $desiredPropertyValue.$propertyName.hint } $detail = $lTxt.UnexProp -f $className, $propertyName, $instance.$propertyName, ($desiredPropertyValueCheck -join ','), $hint Log-Info -Message $detail -Type Warning } else { $passed = $true } $AdditionalData += New-Object -TypeName PSObject -Property @{ Source = "$className`: $propertyName" Resource = if ($hint) { "$($instance.$propertyName)$hint" } else { $instance.$propertyName } Detail = $detail Status = if ($passed) { 'Succeeded' } else { 'Failed' } TimeStamp = [datetime]::UtcNow } } $result.AdditionalData = $AdditionalData $result.Status = if ($AdditionalData.Status -contains 'Failed') { 'Failed' } else { 'Succeeded' } $result } return $returnResult } catch { throw $_ } } function Confirm-RemoteConnectionMatch { <# .SYNOPSIS Ensure multiple remote connection methods match all remote systems #> [CmdletBinding()] param ( [Parameter()] [System.Management.Automation.Runspaces.PSSession[]] $PsSession, [CimSession[]] $CimSession ) if ($PsSession -or $CimSession) { Log-Info ($lTxt.RemoteSyncStart -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ',')) if (Compare-Object -ReferenceObject $PsSession -DifferenceObject $CimSession -Property ComputerName) { $errorMsg = $lTxt.RemoteSyncFail -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ',') Log-Info $errorMsg -Type Error throw $errorMsg } else { Log-Info ($lTxt.RemoteSyncPass -f ($PsSession.ComputerName -join ','), ($CimSession.ComputerName -join ',')) } } else { Log-Info $lTxt.RemoteSyncSkip } } function Get-TestCount { param ( [Parameter()] [string] $ModuleName, [Parameter()] [string] $CommandPrefix ) try { $command = Get-Command -Name $CommandPrefix* -Module $ModuleName if ($command) { return $command.Count } else { return 1 } } catch { return 1 } } function Get-DeploymentData { [cmdletbinding()] param ($Path) try { $Json = Get-Content -Path $Path | ConvertFrom-Json $DeploymentData = $json.ScaleUnits[0].DeploymentData if ([string]::IsNullOrEmpty($DeploymentData)) { Log-Info $lTxt.InvalidDeploymentData return $null } return $DeploymentData } catch { throw $_ } } # SIG # Begin signature block # MIInrQYJKoZIhvcNAQcCoIInnjCCJ5oCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCv/YLMbRRxYXxM # zP7o/mYGXZCFDXPII1e6Ip8HRso07qCCDYEwggX/MIID56ADAgECAhMzAAACzI61 # lqa90clOAAAAAALMMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjIwNTEyMjA0NjAxWhcNMjMwNTExMjA0NjAxWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCiTbHs68bADvNud97NzcdP0zh0mRr4VpDv68KobjQFybVAuVgiINf9aG2zQtWK # No6+2X2Ix65KGcBXuZyEi0oBUAAGnIe5O5q/Y0Ij0WwDyMWaVad2Te4r1Eic3HWH # UfiiNjF0ETHKg3qa7DCyUqwsR9q5SaXuHlYCwM+m59Nl3jKnYnKLLfzhl13wImV9 # DF8N76ANkRyK6BYoc9I6hHF2MCTQYWbQ4fXgzKhgzj4zeabWgfu+ZJCiFLkogvc0 # RVb0x3DtyxMbl/3e45Eu+sn/x6EVwbJZVvtQYcmdGF1yAYht+JnNmWwAxL8MgHMz # xEcoY1Q1JtstiY3+u3ulGMvhAgMBAAGjggF+MIIBejAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUiLhHjTKWzIqVIp+sM2rOHH11rfQw # UAYDVR0RBEkwR6RFMEMxKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1 # ZXJ0byBSaWNvMRYwFAYDVQQFEw0yMzAwMTIrNDcwNTI5MB8GA1UdIwQYMBaAFEhu # ZOVQBdOCqhc3NyK1bajKdQKVMFQGA1UdHwRNMEswSaBHoEWGQ2h0dHA6Ly93d3cu # bWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY0NvZFNpZ1BDQTIwMTFfMjAxMS0w # Ny0wOC5jcmwwYQYIKwYBBQUHAQEEVTBTMFEGCCsGAQUFBzAChkVodHRwOi8vd3d3 # Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NlcnRzL01pY0NvZFNpZ1BDQTIwMTFfMjAx # MS0wNy0wOC5jcnQwDAYDVR0TAQH/BAIwADANBgkqhkiG9w0BAQsFAAOCAgEAeA8D # sOAHS53MTIHYu8bbXrO6yQtRD6JfyMWeXaLu3Nc8PDnFc1efYq/F3MGx/aiwNbcs # J2MU7BKNWTP5JQVBA2GNIeR3mScXqnOsv1XqXPvZeISDVWLaBQzceItdIwgo6B13 # vxlkkSYMvB0Dr3Yw7/W9U4Wk5K/RDOnIGvmKqKi3AwyxlV1mpefy729FKaWT7edB # d3I4+hldMY8sdfDPjWRtJzjMjXZs41OUOwtHccPazjjC7KndzvZHx/0VWL8n0NT/ # 404vftnXKifMZkS4p2sB3oK+6kCcsyWsgS/3eYGw1Fe4MOnin1RhgrW1rHPODJTG # AUOmW4wc3Q6KKr2zve7sMDZe9tfylonPwhk971rX8qGw6LkrGFv31IJeJSe/aUbG # dUDPkbrABbVvPElgoj5eP3REqx5jdfkQw7tOdWkhn0jDUh2uQen9Atj3RkJyHuR0 # GUsJVMWFJdkIO/gFwzoOGlHNsmxvpANV86/1qgb1oZXdrURpzJp53MsDaBY/pxOc # J0Cvg6uWs3kQWgKk5aBzvsX95BzdItHTpVMtVPW4q41XEvbFmUP1n6oL5rdNdrTM # j/HXMRk1KCksax1Vxo3qv+13cCsZAaQNaIAvt5LvkshZkDZIP//0Hnq7NnWeYR3z # 4oFiw9N2n3bb9baQWuWPswG0Dq9YT9kb+Cs4qIIwggd6MIIFYqADAgECAgphDpDS # AAAAAAADMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMK # V2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0 # IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0 # ZSBBdXRob3JpdHkgMjAxMTAeFw0xMTA3MDgyMDU5MDlaFw0yNjA3MDgyMTA5MDla # MH4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS # ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMT # H01pY3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTEwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQCr8PpyEBwurdhuqoIQTTS68rZYIZ9CGypr6VpQqrgG # OBoESbp/wwwe3TdrxhLYC/A4wpkGsMg51QEUMULTiQ15ZId+lGAkbK+eSZzpaF7S # 35tTsgosw6/ZqSuuegmv15ZZymAaBelmdugyUiYSL+erCFDPs0S3XdjELgN1q2jz # y23zOlyhFvRGuuA4ZKxuZDV4pqBjDy3TQJP4494HDdVceaVJKecNvqATd76UPe/7 # 4ytaEB9NViiienLgEjq3SV7Y7e1DkYPZe7J7hhvZPrGMXeiJT4Qa8qEvWeSQOy2u # M1jFtz7+MtOzAz2xsq+SOH7SnYAs9U5WkSE1JcM5bmR/U7qcD60ZI4TL9LoDho33 # X/DQUr+MlIe8wCF0JV8YKLbMJyg4JZg5SjbPfLGSrhwjp6lm7GEfauEoSZ1fiOIl # XdMhSz5SxLVXPyQD8NF6Wy/VI+NwXQ9RRnez+ADhvKwCgl/bwBWzvRvUVUvnOaEP # 6SNJvBi4RHxF5MHDcnrgcuck379GmcXvwhxX24ON7E1JMKerjt/sW5+v/N2wZuLB # l4F77dbtS+dJKacTKKanfWeA5opieF+yL4TXV5xcv3coKPHtbcMojyyPQDdPweGF # RInECUzF1KVDL3SV9274eCBYLBNdYJWaPk8zhNqwiBfenk70lrC8RqBsmNLg1oiM # CwIDAQABo4IB7TCCAekwEAYJKwYBBAGCNxUBBAMCAQAwHQYDVR0OBBYEFEhuZOVQ # BdOCqhc3NyK1bajKdQKVMBkGCSsGAQQBgjcUAgQMHgoAUwB1AGIAQwBBMAsGA1Ud # DwQEAwIBhjAPBgNVHRMBAf8EBTADAQH/MB8GA1UdIwQYMBaAFHItOgIxkEO5FAVO # 4eqnxzHRI4k0MFoGA1UdHwRTMFEwT6BNoEuGSWh0dHA6Ly9jcmwubWljcm9zb2Z0 # LmNvbS9wa2kvY3JsL3Byb2R1Y3RzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y # Mi5jcmwwXgYIKwYBBQUHAQEEUjBQME4GCCsGAQUFBzAChkJodHRwOi8vd3d3Lm1p # Y3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dDIwMTFfMjAxMV8wM18y # Mi5jcnQwgZ8GA1UdIASBlzCBlDCBkQYJKwYBBAGCNy4DMIGDMD8GCCsGAQUFBwIB # FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2RvY3MvcHJpbWFyeWNw # cy5odG0wQAYIKwYBBQUHAgIwNB4yIB0ATABlAGcAYQBsAF8AcABvAGwAaQBjAHkA # XwBzAHQAYQB0AGUAbQBlAG4AdAAuIB0wDQYJKoZIhvcNAQELBQADggIBAGfyhqWY # 4FR5Gi7T2HRnIpsLlhHhY5KZQpZ90nkMkMFlXy4sPvjDctFtg/6+P+gKyju/R6mj # 82nbY78iNaWXXWWEkH2LRlBV2AySfNIaSxzzPEKLUtCw/WvjPgcuKZvmPRul1LUd # d5Q54ulkyUQ9eHoj8xN9ppB0g430yyYCRirCihC7pKkFDJvtaPpoLpWgKj8qa1hJ # Yx8JaW5amJbkg/TAj/NGK978O9C9Ne9uJa7lryft0N3zDq+ZKJeYTQ49C/IIidYf # wzIY4vDFLc5bnrRJOQrGCsLGra7lstnbFYhRRVg4MnEnGn+x9Cf43iw6IGmYslmJ # aG5vp7d0w0AFBqYBKig+gj8TTWYLwLNN9eGPfxxvFX1Fp3blQCplo8NdUmKGwx1j # NpeG39rz+PIWoZon4c2ll9DuXWNB41sHnIc+BncG0QaxdR8UvmFhtfDcxhsEvt9B # xw4o7t5lL+yX9qFcltgA1qFGvVnzl6UJS0gQmYAf0AApxbGbpT9Fdx41xtKiop96 # eiL6SJUfq/tHI4D1nvi/a7dLl+LrdXga7Oo3mXkYS//WsyNodeav+vyL6wuA6mk7 # r/ww7QRMjt/fdW1jkT3RnVZOT7+AVyKheBEyIXrvQQqxP/uozKRdwaGIm1dxVk5I # RcBCyZt2WwqASGv9eZ/BvW1taslScxMNelDNMYIZgjCCGX4CAQEwgZUwfjELMAkG # A1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQx # HjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEoMCYGA1UEAxMfTWljcm9z # b2Z0IENvZGUgU2lnbmluZyBQQ0EgMjAxMQITMwAAAsyOtZamvdHJTgAAAAACzDAN # BglghkgBZQMEAgEFAKCBrjAZBgkqhkiG9w0BCQMxDAYKKwYBBAGCNwIBBDAcBgor # BgEEAYI3AgELMQ4wDAYKKwYBBAGCNwIBFTAvBgkqhkiG9w0BCQQxIgQgFCGQIIhL # FegT7B44Cm7/oIVN+rhZa0jQjW7Z/NIQ56AwQgYKKwYBBAGCNwIBDDE0MDKgFIAS # AE0AaQBjAHIAbwBzAG8AZgB0oRqAGGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbTAN # BgkqhkiG9w0BAQEFAASCAQCXLO3wVct5U6du6i/TE7LlbME3g+2fsYC/He1M4f8F # KPTESmh9RhyS1VEARmw3agAVsyxXb2FjUzvCrA+ywvM9WP8/TzyWCYH6AwpvLa7y # krrgbSjJfJ63NVgyqxIEVAgRCtAHqikW8Z2sWw9XjkbgVNQCWBCeaowAhwpfL1za # i3N+EEC5bIB7TplsNtHJ4fKV9AxouDz8m6HjdDfiJCpYno46lsDM6jJlY/w5/nt8 # PgPXBRDhm+YNihle16aFYMm4KjtSaFRi+YE7SjYaOIol7vbRP251DE03AWe4/8QP # 1HJMOnpG3Tyo7b2wEvWJiGXEP8ykz1tcEqx1PWIDUW0VoYIXDDCCFwgGCisGAQQB # gjcDAwExghb4MIIW9AYJKoZIhvcNAQcCoIIW5TCCFuECAQMxDzANBglghkgBZQME # AgEFADCCAVUGCyqGSIb3DQEJEAEEoIIBRASCAUAwggE8AgEBBgorBgEEAYRZCgMB # MDEwDQYJYIZIAWUDBAIBBQAEIEOC0YR6zK1RYLwyckMowt3VmpjepLFPFVVyD775 # z1UXAgZi2yxI2ygYEzIwMjIwODE4MTYyMTU1Ljg0N1owBIACAfSggdSkgdEwgc4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1p # Y3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMg # VFNTIEVTTjpGODdBLUUzNzQtRDdCOTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUt # U3RhbXAgU2VydmljZaCCEV8wggcQMIIE+KADAgECAhMzAAABrqoLXLM0pZUaAAEA # AAGuMA0GCSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNo # aW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29y # cG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEw # MB4XDTIyMDMwMjE4NTEzN1oXDTIzMDUxMTE4NTEzN1owgc4xCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVy # YXRpb25zIFB1ZXJ0byBSaWNvMSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGODdB # LUUzNzQtRDdCOTElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2Vydmlj # ZTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBAJOMGvEhNQwLHactznPp # Y8Jg5qI8Qsgp0mhl2G2ztVPonq4gsOMe5u9p5f17PIM1KXjUaKNl3djncq29Liqm # qnaKORggPHNEk7Q+tal5Iyc+S8k/R31gCGt4qvQVqBLQNivxOukUfapG41LTdLHe # M4uwInk+QrGQH2K4wjNtiUpirF2PdCcbkXyALEpyT2RrwzJmzcmbdCscY0N3RHxr # MeWQ3k7sNt41NBZOT+4pCmkw8UkgKiSJXMzKs38MxUqx/OlS80dLDTHd+Zei1S1/ # qbCtTGzNm0bj6qfklUM3JFAF1JLXwwvqgZRdDQU6224wtGnwalTaOI0R0eX+crcP # pXGB27EIgYU+0lo2aH79SNrsPWEcdBICd0yfhFU2niVJepGzkXetJvbFxW3iN7sc # jLfw/S6UXF7wtEzdONXViI5P2UM779P6EIZ+g81E2MWX8XjLVyvIsvzyckJ4FFi+ # h1yPE+vzckPxzHOsiLaafucsyMjAaAM8Wwa+02BujEOylfLSyk0iv9IvSI9ZkJW/ # gLvQ42U0+U035ZhUhCqbKEWEMIr2ya2rYprUMEKcXf4R97LVPBfsJnbkNUubpUA4 # K1i7ijQ1pkUlt+YQ/34mtEy7eSigVpVznqfrNVerCvHG5IwfeFVhPNbAwK6lBEQ2 # 9nMYjRXj4QLyvmKRmqOJM/w1AgMBAAGjggE2MIIBMjAdBgNVHQ4EFgQU0zBv378o # YIrBqa10/vztZDphUe4wHwYDVR0jBBgwFoAUn6cVXQBeYl2D9OXSZacbUzUZ6XIw # XwYDVR0fBFgwVjBUoFKgUIZOaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9w # cy9jcmwvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3Js # MGwGCCsGAQUFBwEBBGAwXjBcBggrBgEFBQcwAoZQaHR0cDovL3d3dy5taWNyb3Nv # ZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENB # JTIwMjAxMCgxKS5jcnQwDAYDVR0TAQH/BAIwADATBgNVHSUEDDAKBggrBgEFBQcD # CDANBgkqhkiG9w0BAQsFAAOCAgEAXb+R8P1VAEQOPK0zAxADIXP4cJQmartjVFLM # EkLYh39PFtVbt84Rv0Q1GSTYmhP8f/OOvnmC5ejw3Nc1VRi74rWGUITv18Wqr8eB # vASd4eDAxFbA8knOOm/ZySkMDDYdb6738aQ0yvqf7AWchgPntCc/nhNapSJmjzUk # e7EvjB8ei0BnY0xl+AQcSxJG/Vnsm9IwOer8E1miVLYfPn9fIDdaav1bq9i+gnZf # 1hS7apGpxbitCJr1KGD4jIyABkxHheoPOhhtQm1uznE7blKxH8pU7W2A+eqggsNk # M3VB0nrzRZBqm4SmBSNhOPzy3ofOmLcRK/aloOAr6nehi8i5lhmTg1LkOAxChLwH # vluiCY9K+2vIpt48ioK/h+tz5RgVdb+S8xwn728lN8KPkkB2Ra5iicrvtgA55wSU # dh6FFxXxeS+bsgBayn7ZyafTpDM7BQOBYwaodsuVf5XgGryGx84k4R58mPwB3Q09 # CRAGs35NOt6TrPXqcylNu6Zz8xTQDcaJp54pKyOoW5iIDFjpLneXTEjtWCFCgAo4 # zbp9CNITp97KPnc3gZVaMvEpU8Sp7VZwN9ckR2WDKyOjDghIcfuFJTLOdkOuMLGs # WPdnY6idtWc2bUDQa2QbzmNSZyFthEprwQ2GmgaGbGKuYVVqUj/Yt21HD0PBeDI5 # Mal8ScwwggdxMIIFWaADAgECAhMzAAAAFcXna54Cm0mZAAAAAAAVMA0GCSqGSIb3 # DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4G # A1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMTIw # MAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZpY2F0ZSBBdXRob3JpdHkgMjAx # MDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMyMjVaMHwxCzAJBgNVBAYTAlVT # MRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQK # ExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1l # LVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEA # 5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51yMo1V/YBf2xK4OK9uT4XYDP/ # XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY6GB9alKDRLemjkZrBxTzxXb1 # hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9cmmvHaus9ja+NSZk2pg7uhp7 # M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN7928jaTjkY+yOSxRnOlwaQ3K # Ni1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDuaRr3tpK56KTesy+uDRedGbsoy # 1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74kpEeHT39IM9zfUGaRnXNxF80 # 3RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2K26oElHovwUDo9Fzpk03dJQc # NIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5TI4CvEJoLhDqhFFG4tG9ahha # YQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZki1ugpoMhXV8wdJGUlNi5UPkL # iWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9QBXpsxREdcu+N+VLEhReTwDwV # 2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3PmriLq0CAwEAAaOCAd0wggHZMBIG # CSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUCBBYEFCqnUv5kxJq+gpE8RjUp # zxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJlpxtTNRnpcjBcBgNVHSAEVTBT # MFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIBFjNodHRwOi8vd3d3Lm1pY3Jv # c29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9yeS5odG0wEwYDVR0lBAwwCgYI # KwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUAYgBDAEEwCwYDVR0PBAQDAgGG # MA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU1fZWy4/oolxiaNE9lJBb186a # GMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2NybC5taWNyb3NvZnQuY29tL3Br # aS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIwMTAtMDYtMjMuY3JsMFoGCCsG # AQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDovL3d3dy5taWNyb3NvZnQuY29t # L3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcnQwDQYJKoZIhvcN # AQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/ypb+pcFLY+TkdkeLEGk5c9MTO1 # OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulmZzpTTd2YurYeeNg2LpypglYA # A7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM9W0jVOR4U3UkV7ndn/OOPcbz # aN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECWOKz3+SmJw7wXsFSFQrP8DJ6L # GYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4FOmRsqlb30mjdAy87JGA0j3m # Sj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3UwxTSwethQ/gpY3UA8x1RtnWN0 # SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPXfx5bRAGOWhmRaw2fpCjcZxko # JLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVXVAmxaQFEfnyhYWxz/gq77EFm # PWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGConsXHRWJjXD+57XQKBqJC482 # 2rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU5nR0W2rRnj7tfqAxM328y+l7 # vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEGahC0HVUzWLOhcGbyoYIC0jCC # AjsCAQEwgfyhgdSkgdEwgc4xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5n # dG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9y # YXRpb24xKTAnBgNVBAsTIE1pY3Jvc29mdCBPcGVyYXRpb25zIFB1ZXJ0byBSaWNv # MSYwJAYDVQQLEx1UaGFsZXMgVFNTIEVTTjpGODdBLUUzNzQtRDdCOTElMCMGA1UE # AxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAgU2VydmljZaIjCgEBMAcGBSsOAwIaAxUA # vJqwk/xnycgV5Gdy5b4IwE/TWuOggYMwgYCkfjB8MQswCQYDVQQGEwJVUzETMBEG # A1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWlj # cm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFt # cCBQQ0EgMjAxMDANBgkqhkiG9w0BAQUFAAIFAOaomS4wIhgPMjAyMjA4MTgxNDU1 # NDJaGA8yMDIyMDgxOTE0NTU0MlowdzA9BgorBgEEAYRZCgQBMS8wLTAKAgUA5qiZ # LgIBADAKAgEAAgIC1QIB/zAHAgEAAgIQ+DAKAgUA5qnqrgIBADA2BgorBgEEAYRZ # CgQCMSgwJjAMBgorBgEEAYRZCgMCoAowCAIBAAIDB6EgoQowCAIBAAIDAYagMA0G # CSqGSIb3DQEBBQUAA4GBAIthx+rL7B9f5fmSEpV0RgkNsz+4zogVYP2JTK2iVopf # MSLJ6aUPjnoKjNDrPwoOFSf+1Yi5o4WEBSWZptf4CEmYMml1pDPPcEFu3ea+0FKP # iGWdVV7YpVT2MwzRrSyEWkuNVHA+fpnrbNG84wo6Uh47HoI4qrn5TU2ya3T6o+Dz # MYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0 # b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3Jh # dGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTACEzMA # AAGuqgtcszSllRoAAQAAAa4wDQYJYIZIAWUDBAIBBQCgggFKMBoGCSqGSIb3DQEJ # AzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQgOMwiPxrK0PYlMJhdzluA # /1vg5Q5s6C9g63/sm0xVg/8wgfoGCyqGSIb3DQEJEAIvMYHqMIHnMIHkMIG9BCBJ # KB0+uIzDWqHun09mqTU8uOg6tew0yu1uQ0iU/FJvaDCBmDCBgKR+MHwxCzAJBgNV # BAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4w # HAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29m # dCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAABrqoLXLM0pZUaAAEAAAGuMCIEIGa9 # 6aRuriTsR/W3ggJ4U9k9ubRxjL/jPK+OlA1+436CMA0GCSqGSIb3DQEBCwUABIIC # ADWHETLja5GVxPFDoCBJUbG+GcDobsru4dtw0xdS/qPHRR3kTjm56aex2ZYAoqnT # ph1My+U1F92Na4+mI4imGhNwpZkib+p9sgE/U9aRw4XtttqnzrvyzOpF8fAoEot4 # JIYyIJ27eVla8tuA5WXofMiA+GvIa0lCs7Ky4opiNIVfzv1h1WWEPNPOtR3w7kga # CPvGl1uW8ErMFSiBGv5dcrWteHTdtnos7PlJPjh61JZyKJfbhUJiMY+yqzxNUeWB # tlpiHvj3M7At7rJf7d/r1wSZZFJs1mJeZcbbi4F4DoAXbg7P0oj5p0Fs6Sa1w+tr # AG6OsKFS4pswWF6dgMwwjZSSTHz1eo6DM31sEYejnxZvuuNgyrMRFqYWBeaPk2WA # ZiekSTUWuUw0RpL4TqBgoYyVTNi4Q6qjx+H80JocCq+aC/yGrtmNuDfPoCupZz6R # LMm4M/N4wRIJk2IaG8HwPmAXj00W0oalAA67txI9Y8q3wKPLoyq6/Zx+r7wH1lZ2 # aWqQfNxJDWNggHP1hO5GXuF4aJ++mpwLzCyTkiNZDZPF1U2t4cvYs5tsx9xO4KPv # wQykN3DwvgPHBSZgL/gh6uM+9my5tSAcTCJZNQN0q0QpWTdqg+v45hrKheCf5fbd # 2ykfZWBDoKcXwSmVcTyeZd7GiiJhnRn6pv/L+u0Xd1aA # SIG # End signature block |