Obs/bin/ObsDep/content/Powershell/Roles/Common/HostReboot/HostReboot.psm1

<###################################################
 # #
 # Copyright (c) Microsoft. All rights reserved. #
 # #
 ##################################################>


Import-Module -Name "$PSScriptRoot\..\..\PhysicalMachines\UpdatePhysicalMachineHelper.psm1" -DisableNameChecking

$LastBootTimeXmlFile = "LastBootTime.xml"
$PreBootTimeXmlFile = "PreBootTime.xml"

function SaveLastBootTime
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential]
        $Credential
    )
    
    $ErrorActionPreference = 'stop'

    Trace-Execution "[SaveLastBootTime] Saving last boot time ..."
    $lastboottime = Invoke-Command { 
                                    param($LastBootTimeXmlFile)
                                    $lastboottime = Get-CimInstance -ClassName win32_operatingsystem -ErrorAction Stop | select lastbootuptime 
                                    $lastboottime | Export-Clixml -Path "$($env:SystemDrive)\MASLogs\$LastBootTimeXmlFile"
                                    $lastboottime

                               } -ComputerName $ComputerName -Credential $Credential -ArgumentList $script:LastBootTimeXmlFile

    Trace-Execution "[SaveLastBootTime] The last boot '$($lastboottime.lastbootuptime)' time is saved."
}

function GetLastBootTime
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true, Position=0, ValueFromPipeline=$true, ParameterSetName = 'ComputerName')]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName
    )

    $oldbootTime = Import-Clixml -Path "\\$ComputerName\c$\maslogs\$script:LastBootTimeXmlFile"

    return $oldbootTime.lastbootuptime
}

function SavePreBootTime
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName,

        [Parameter(Mandatory = $true)]
        [PSCredential]
        $Credential
    )

    $ErrorActionPreference = 'stop'

    Trace-Execution "[SavePreBootTime] Saving pre boot time ..."

    $preBootTime = Invoke-Command {
        param($PreBootTimeXmlFile)
        $preBootTime = Get-Date
        $preBootTime | Export-Clixml -Path "$($env:SystemDrive)\MASLogs\$PreBootTimeXmlFile"
        $preBootTime

    } -ComputerName $ComputerName -Credential $Credential -ArgumentList $script:PreBootTimeXmlFile

    Trace-Execution "[SavePreBootTime] Time before starting reboot sequence is '$preBootTime'."
}

function Prepare-KSR
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential]
        $Credential
    )
    
    $ErrorActionPreference = 'stop'

    try
    {
        Trace-Execution "[SoftRebootHelper] Adding KSR registry keys to allow soft reboot with an encrypted drive."

        Invoke-Command {

            $REG_KEY_PATH = "HKLM:\SYSTEM\CurrentControlSet\Policies\Microsoft\FVE"

            if(-not (Test-Path -Path $REG_KEY_PATH))
            {
                New-Item -Path $REG_KEY_PATH -Force
            }

            New-ItemProperty -Path $REG_KEY_PATH -PropertyType DWORD -Name OsvKsrAllow -Value 1 -Force
            New-ItemProperty -Path $REG_KEY_PATH -PropertyType DWORD -Name FdvKsrAllow -Value 1 -Force
            New-ItemProperty -Path $REG_KEY_PATH -PropertyType DWORD -Name RdvKsrAllow -Value 1 -Force   

        } -ComputerName $ComputerName -Credential $Credential -ErrorAction Stop

        # Prepare for KSR
        Trace-Execution "[SoftRebootHelper] Preparing for KSR."
        $outputDetails = Invoke-Command { 
                                            mountvol.exe x: /s
                                            Ksrcmd /Store 'x:\EFI\Microsoft\Boot\bcd' /prepare '{current}' 'InitiateOnly'

                        } -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop
        Trace-Execution "[SoftRebootHelper] Output of preparing for KSR:`r`n$($outputDetails | out-string)"
    }
    catch
    {
        throw "[SoftRebootHelper] Failed while attempting reboot of $ComputerName. Error: $_"
    }
}

function InspectKsr
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential]
        $Credential
    )

    Trace-Execution "[InspectKsr] Inspecting KSR."

    try {
        $scriptBlock = {
            param($LastBootTimeXmlFile, $PreBootTimeXmlFile)

            function GetEventTimeDiff($stopEvents, $startEvents)
            {
                # As long as we have events, we will capture the enclosing timespan. This
                # can lead to inaccurate timespan results if we have more than one stop
                # or start event but we can track those as we also log the event counts.
                # Capturing enclosing timespan can be useful if we want to cover the broader
                # interruption window.
                if (($stopEvents.Count -gt 0) -and ($startEvents.Count -gt 0))
                {
                    $stopEvent = $stopEvents[0]
                    $startEvent = $startEvents[-1]
                    
                    if ($stopEvent.TimeCreated -le $startEvent.TimeCreated)
                    {
                        return $(New-TimeSpan -Start $stopEvent.TimeCreated -End $startEvent.TimeCreated).TotalSeconds
                    }
                }
            
                # Stop and Start events are unavailable or out of sync
                return -1
            }

            function FirstEventDate($events)
            {
                if ($events.Count -ge 1)
                {
                    return $events[0].TimeCreated
                }

                # No events were found so return default value
                return Get-Date -Date "1980-01-01 00:00:00"
            }

            # Default event values in case we are not able to query some
            $osStopEvents        = @()
            $osStartEvents       = @()
            $bootTypeEvents      = @()
            $clussvcStopEvents   = @()
            $clussvcStartEvents  = @()
            $bootDurationE2E     = -1
            $bootDurationHwdOnly = -1
            $clussvcDownTime     = -1
            $lastBootTime        = ""
            $secondLastBootTime  = ""
            $failure             = ""

            # If we fail to get last boot time, we shouldn't block from gathering rest of telemetry. Also this
            # data point is not critical as boot time can be guessed from os stop/start events that we are capturing below.
            try
            {
                # LastBootTime.xml is captured before ksr is initiated so post ksr it indicates second last boot time
                $secondLastBootTime = $(Import-Clixml -Path "$($env:SystemDrive)\MASLogs\$LastBootTimeXmlFile")."lastbootuptime"
                $lastBootTime = $(Get-CimInstance -ClassName win32_operatingsystem -ErrorAction Stop)."lastbootuptime"
            }
            catch { } 

            # Identifying e2e boot window and time
            try 
            {   
                $preBootTime = Import-Clixml -Path "$($env:SystemDrive)\MASLogs\$PreBootTimeXmlFile"
                $currentTime = Get-Date
                $bootDurationE2ESpan = New-TimeSpan -Start $preBootTime -End $currentTime
                $bootDurationE2E = $bootDurationE2ESpan.TotalSeconds
                $bootWindowXPath = "*[System[TimeCreated[timediff(@SystemTime) <= $($bootDurationE2ESpan.TotalMilliseconds)]]]"
            }
            catch
            {
                $failure = "Could not find out pre ksr time."
            }

            # At minimum we need a boot window to query other things
            if ($failure -eq "")
            {
                $clusterServiceStopMessage1  = "The Cluster Service service entered the stopped state."
                $clusterServiceStartMessage1 = "The Cluster Service service entered the running state."
                $clusterServiceStopMessage2  = "The ClusSvc service entered the stopped state."
                $clusterServiceStartMessage2 = "The ClusSvc service entered the running state."

                # Query all events at once to avoid having to call Get-WinEvent multiple times
                try
                {
                    $events = Get-WinEvent -LogName "System" -FilterXPath $bootWindowXPath `
                    | where `
                      {`
                          (($_.ProviderName -eq "Microsoft-Windows-Kernel-General") -and (($_.Id -eq "12") -or ($_.Id -eq "13"))) -or`
                          (($_.ProviderName -eq "Microsoft-Windows-Kernel-Boot") -and ($_.Id -eq "27")) -or`
                          (`
                            ($_.ProviderName -eq "Service Control Manager") -and`
                            ($_.Id -eq "7036") -and `
                            (($_.Message -eq $clusterServiceStopMessage1) -or ($_.Message -eq $clusterServiceStartMessage1) -or ($_.Message -eq $clusterServiceStopMessage2) -or ($_.Message -eq $clusterServiceStartMessage2))`
                          )`
                      }`
                    | sort -Property TimeCreated
                }
                catch
                {
                    $failure = "Could not query events."
                }

                # Once we have events we can look for individual pieces
                if ($failure -eq "")
                {
                    foreach ($event in $events)
                    {
                        switch ($event.Id)
                        {
                            "13"    { $osStopEvents += $event }
                            "12"    { $osStartEvents += $event }
                            "27"    { $bootTypeEvents += $event }
                            "7036"  {
                                        if (($event.Message -eq $clusterServiceStopMessage1) -or ($event.Message -eq $clusterServiceStopMessage2))
                                        {
                                            $clussvcStopEvents += $event
                                        }
                                        else
                                        {
                                            $clussvcStartEvents += $event
                                        }
                                    }
                        }
                    }

                    $bootDurationHwdOnly = GetEventTimeDiff $osStopEvents $osStartEvents
                    $clussvcDownTime = GetEventTimeDiff $clussvcStopEvents $clussvcStartEvents
                }
            }

            $bootTypeEventMessage = ""

            if ($bootTypeEvents.Count -eq 1)
            {
                $bootTypeEventMessage = "'$($bootTypeEvents[0].Message)' at '$($bootTypeEvents[0].TimeCreated)'."
            }

            $eventData = @{ 
                "SecondLastBootTime"     = $secondLastBootTime                             # Last time the system booted before ksr
                "LastBootTime"           = $lastBootTime                                   # Time at which ksr happened
                "PreBootTime"            = $preBootTime                                    # Time just before ksr was initiated
                "OSStopEvent"            = [datetime](FirstEventDate $osStopEvents)        # First OS shutdown event
                "OSStopEventCount"       = $osStopEvents.Count                             # More than one OS shutdown event indicates crash
                "OSStartEvent"           = [datetime](FirstEventDate $osStartEvents)       # First OS startup event
                "OSStartEventCount"      = $osStartEvents.Count                            # More than one OS startup event indicates crash
                "ClusSvcStopEvent"       = [datetime](FirstEventDate $clussvcStopEvents)   # First Cluster Service stop event
                "ClusSvcStopEventCount"  = $clussvcStopEvents.Count                        # More than one cluster service stop event is an anomaly
                "ClusSvcStartEvent"      = [datetime](FirstEventDate $clussvcStartEvents)  # First Cluster Service start event
                "ClusSvcStartEventCount" = $clussvcStartEvents.Count                       # More than one cluster service start event is an anomaly
                "ClusSvcDownTime"        = $clussvcDownTime                                # Amount of time cluster service was down
                "BootTypeEvent"          = $bootTypeEventMessage                           # Type of boot that happened
                "BootTypeEventCount"     = $bootTypeEvents.Count                           # More than one boot type event is an anomaly
                "BootDurationE2E"        = $bootDurationE2E                                # Total boot duration = prep/shutdown time + time at hardware + boot/winrm ready time
                "BootDurationHwdOnly"    = $bootDurationHwdOnly                            # Time spend at hardware only (ksr clocks 1-15 seconds while full boot 5-20 mins)
                "FailureMessage"         = $failure                                        # Failure that happened when gathering above details
            }

            return $eventData
        }

        $eventData = [Hashtable]$(Invoke-Command -ScriptBlock $scriptBlock -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop -ArgumentList $script:LastBootTimeXmlFile, $script:PreBootTimeXmlFile)

        Trace-Execution "[InspectKsr] Sending telemetry."
        Import-Module -Name "$PSScriptRoot\..\RoleHelpers.psm1" -DisableNameChecking -Verbose:$false
        Send-TelemetryEvent -ComponentName "BareMetal" -EventName "KernelSoftReboot" -EventVersion 1 -EventData $eventData
        Trace-Execution "[InspectKsr] Telemtry sent."
    }
    catch
    {
        Trace-Execution "[InspectKsr] Failed to inspect ksr or send telemetry.'$_'."
    }
}

function Complete-KSR
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential]
        $Credential
    )
    
    $ErrorActionPreference = 'stop'

    try
    {
        # Complete KSR
        Trace-Execution "[SoftRebootHelper] Completing KSR."
        $outputDetails = Invoke-Command { 
                            ksrcmd /boottype
                            ksrcmd /complete                            
                       } -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop
        Trace-Execution "[SoftRebootHelper] Output of Completing KSR:`r`n$($outputDetails | out-string)"
    }
    catch
    {
        throw "[SoftRebootHelper] Failed while attempting reboot of $ComputerName. Error: $_"
    }
}

function OobColdRebootClusterNode
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName
    )

    $ErrorActionPreference = "Stop"

    Trace-Execution "Start: OobColdRebootClusterNodes function"

    Import-Module -Name "$ENV:ProgramFiles\WindowsPowerShell\Modules\Microsoft.AzureStack.Diagnostics.DataCollection\PMCServiceClient\PMCClient.psm1" -DisableNameChecking
    try
    {
        $pmcClient = Create-PMCClientWithServiceResolver
        $bmcOperation = New-Object -Type Microsoft.AzureStack.Solution.Deploy.PMC.Controllers.Models.PhysicalMachineBMCOperation
        $bmcOperation.ComputerName = $ComputerName
        $bmcOperation.OperationID = [guid]::NewGuid()

        # Power cycle does cold reboot(remove power). The PMC method waits till the power status changes.
        # It will riase appropriate exception if the power cycle did not complete
        $result = $pmcclient.PowerCycle($bmcOperation).GetAwaiter().GetResult()

        return "Power cycle initiated."
    }
    catch
    {
        throw "Could not invoke PMC Client exception: $($_.Exception.ToString())"
    }
}

function Start-Reboot
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential]
        $Credential,

        [Parameter(Mandatory = $true)]
        [string]
        $RebootType
    )

    $ErrorActionPreference = 'stop'

    try
    {
        Trace-Execution "[Start-Reboot] Starting '$RebootType' Reboot."

        if ($RebootType -eq 'Soft')
        {
            # Before starting soft reboot, we need to prepare first
            Prepare-KSR -ComputerName $ComputerName -Credential $Credential

            # If prepare is fine, then do soft reboot
            $outputDetails = Invoke-Command { ksrcmd /reboot } -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop
        }
        elseif ($RebootType -eq 'Hard')
        {
            $outputDetails = Invoke-Command { shutdown /r /f /t 0 } -ComputerName $ComputerName -Credential $Credential -Authentication Credssp -ErrorAction stop
        }
        elseif ($RebootType -eq 'BMC')
        {
            $outputDetails = OobColdRebootClusterNode $ComputerName
        }
        else
        {
            throw "[Start-Reboot] Reboot type '$RebootType' is unsupported!"
        }

        Trace-Execution "[Start-Reboot] Output of starting reboot:`r`n$($outputDetails | out-string)"
    }
    catch
    {
        throw "[Start-Reboot] Failed while attempting reboot of $ComputerName. Error: $_"
    }
}

function Complete-Reboot
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true)]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential]
        $Credential,

        [Parameter(Mandatory = $true)]
        [string]
        $RebootType
    )

    $ErrorActionPreference = 'stop'

    try
    {
        Trace-Execution "[Complete-Reboot] Completing '$RebootType' Reboot."

        # Only soft reboot requires a completion sequence
        if ($RebootType -eq 'Soft')
        {
            Complete-KSR -ComputerName $ComputerName -Credential $Credential

            # As we have completed Ksr, we'll deep inspect it to ensure all is well
            InspectKsr -ComputerName $ComputerName -Credential $Credential
        }

        Trace-Execution "[Complete-Reboot] Finished completing reboot."
    }
    catch
    {
        throw "[Complete-Reboot] Failed to complete reboot of $ComputerName. Error: $_"
    }
}

function WaitForCIM
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory = $true, Position=0, ValueFromPipeline=$true, ParameterSetName = 'ComputerName')]
        [ValidateNotNullOrEmpty()]
        [string]
        $ComputerName,

        [Parameter(Mandatory=$true)]
        [PSCredential]
        $Credential
    )

    $ErrorActionPreference = 'stop'

    $CimSessionConnectionTimeoutSec = 30
    $RetryDelaySec = 30
    $MaxWaitTime = 2700 # 2700 seconds = 45 mins

    $iteration = -1
    $startTime = Get-Date
    while ($(New-Timespan -start $startTime -end $(Get-Date)).TotalSeconds -le $MaxWaitTime)
    {
        $iteration = $iteration + 1

        Start-Sleep -Seconds $RetryDelaySec

        # First test CIM session connectivity
        Trace-Execution "Trying to check if CIM connectivity has been established to host node '$ComputerName', iteration '$iteration'."
        try
        {
            $cimSession = New-CimSession $ComputerName -Credential $Credential -OperationTimeoutSec $CimSessionConnectionTimeoutSec
        }
        catch
        {
            Trace-Execution "Could not establish cim connection to the host node '$ComputerName' after the reboot, iteration '$iteration'."
            continue
        }

        # Next get boot times so that we can compare them
        Trace-Execution "Getting old and new boot times from host node '$ComputerName', iteration '$iteration'."
        try
        {
            $newbootTime = ($cimSession.EnumerateInstances("root\cimv2", "Win32_OperatingSystem").CimInstanceProperties | Where-Object {$_.Name -eq "LastBootUpTime"}).Value

            # Best effort removing cim session as we don't need it anymore for this iteration
            try
            {
                Remove-CimSession $cimSession
            }
            catch
            {
                Trace-Execution "Failed to remove cim session. Ignoring error as we will create a new cim session in next iteration."
            }

            if (!($newbootTime -as [DateTime]))
            {
                throw "New boot time '$newbootTime' for host node '$ComputerName' iteration '$iteration' was not found or was invalid."
            }
        }
        catch
        {
            Trace-Execution "Could not get new boot time from host node '$ComputerName' after the reboot, iteration '$iteration'. Exception '$_'"
            continue
        }
        
        try
        {
            $oldbootTime = GetLastBootTime -ComputerName $ComputerName
            if (!($oldbootTime -as [DateTime]))
            {
                throw "Old boot time '$newbootTime' for host node '$ComputerName' iteration '$iteration' was not found or was invalid."
            }
        }
        catch
        {
            Trace-Execution "Could not get old boot fime from host node '$ComputerName' after the reboot, iteration '$iteration'. Exception '$_'"
            continue
        }

        # Finally comparing boot times to determine if reboot happened
        if ($newbootTime -gt $oldbootTime)
        {
            Trace-Execution "New boot time '$newbootTime' is greater than old boot time '$oldbootTime' so we have a successful reboot host node '$ComputerName', iteration '$iteration'."
            return
        }

        Trace-Execution "New boot time '$newbootTime' is not greater than old boot time '$oldbootTime' so we don't yet have a successful reboot host node '$ComputerName', iteration '$iteration'."
    }

    throw "Host node '$ComputerName' did not come back up in '$($MaxWaitTime / 60)' minutes"
}

function Prepare-Reboot
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory=$true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = 'stop'

    # As this function will be called for initiating a reboot, we should set the host status
    # to NotStarted regardless of what happened in prior fallback sequence. Basically, a Soft
    # reboot may have failed but in the Soft->Hard fallback, the hard reboot has not started
    # and we are ignoring the previous reboot state.
    $ComputerName = Get-ExecutionContextNodeName -Parameters $Parameters -EnsureSingle
    Trace-Execution "Resetting host status to 'NotStarted'. ComputerName: '$ComputerName'."
    Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'NotStarted'
}

function Reboot-Machine
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory=$true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters,

        [Parameter(Mandatory = $true)]
        [ValidateSet('Soft','Hard','BMC')]
        [string]
        $RebootType
    )

    $ErrorActionPreference = 'stop'

    Trace-Execution "[Reboot-Machine] Reboot type requested is : $RebootType."

    # Get node name from execution context
    $ComputerName = Get-ExecutionContextNodeName -Parameters $Parameters -EnsureSingle
    Trace-Execution "[Reboot-Machine] Physical node to be live OS updated is: $ComputerName."

    # Get domain credential
    $domainCredential = Get-DomainCredential -Parameters $Parameters
    Trace-Execution "[Reboot-Machine] Domain Credential UserName is: $($domainCredential.UserName)."

    $updateState = Get-HostUpdateState -Parameters $Parameters -HostName $ComputerName

    if($updateState -eq "Rebooting")
    {
        Trace-Execution "Reboot is already in progress. Continue to wait."
    }
    else
    {
        if ($updateState -eq "RebootPending")
        {
            Trace-Execution "Interface is being re-run due to failover or other reason. This is ok."
        }

        # Although we transition host status from NotStarted to RebootPending, we aren't making any decisions
        # on these statuses; they are just for diagnosability purposes. We mainly check for Rebooting.
        Trace-Execution "Setting host status to 'RebootPending'. ComputerName: '$ComputerName'"
        Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'RebootPending'

        SaveLastBootTime -ComputerName $ComputerName -Credential $domainCredential
        SavePreBootTime -ComputerName $ComputerName -Credential $domainCredential

        # Setting the update status to Rebooting to minimize failover related race onditions. Setting Rebooting
        # status before Start-Reboot v/s after involves different tradeoffs. If done after, a failover immediately
        # after Start-Reboot may end up resulting either in a double reboot or a failed reboot depending on how far
        # Start-Reboot had progressed before failover happened. If done before, and there is a failure in Start-Reboot,
        # then depending on how far Start-Reboot had progressed, we will likely end up in a failed reboot due to
        # WaitForCIM. But failures in Start-Reboot are not common (ksr prepare can fail but that is a failed reboot
        # anyway). On the flip side, if we do Start-Reboot first and ERCS primary was on this node, we will likely
        # trigger failover before setting Rebooting status. Due to these reasons, we are preferring setting
        # Rebooting status before Start-Reboot.
        Trace-Execution "Setting host status to 'Rebooting'. ComputerName: '$ComputerName'"
        Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'Rebooting'

        try
        {
            Start-Reboot -ComputerName $ComputerName -Credential $domainCredential -RebootType $RebootType
        }
        catch
        {
            # Although it is not common for Start-Reboot to fail (esp given that we know node is reachable due to prior
            # save boot time calls), we'd want to make a last ditch attempt at trying to see if the failure is recoverable
            # especially for reboot prep failures such as ksrcmd /prepare. Now, we won't know exactly where the failure
            # happened in Start-Reboot. Most cases though will fall in one of these two buckets:
            # - Start-Reboot threw in preparatory phase such as ksrcmd /prepare or mountvol.
            # - Start-Reboot threw after initiating reboot. This is highly unlikely in case of Soft or Hard coz if ksrcmd
            # or shutdown commands cannot be issued or fail, system won't end up rebooting. Thus the likely possibility
            # here is BMC reboot as it has a n/w dependency on BMC where Power cycle may have been initiated but the
            # confirmation may not have arrived to ERCS.
            # If we were to set status to RebootPending and we hit the second issue in BMC reboot, we may end up triggering
            # two BMC reboots. While first one may be fine, multiple BMC reboots should be avoided to minimize corruption.
            # Thus we will set RebootPending status only for Soft & Hard reboots. If in the rare case Start-Reboot fails for
            # Soft/Hard, it is ok for them to get tried again. For BMC we will err on side of caution and not reset host
            # status. This means we won't retry BMC reboot prep failures and will fail at WaitForCIM. And in the event the
            # Start-Reboot exception was after BMC reboot was initiated, we are good as WaitForCIM will ultimately pass.
            if ($RebootType -ne 'BMC')
            {
                Trace-Execution "Start-Reboot failed so reverting back host status to 'RebootPending'. ComputerName: '$ComputerName'"
                Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'RebootPending'
            }

            # Regardless of the host status, we still need to bubble this exception out to trigger retries
            throw $_
        }
    }

    # Waiting for node to come back up. There is no harm in waiting for this multiple times as each reboot attempt
    # will be preceeded with saving last boot time so once we have set host status to Rebooting, WaitForCIM won't
    # get affected by a failover/re-run.
    WaitForCIM -ComputerName $ComputerName -Credential $domainCredential

    # In case reboot process requires cleanup (such as Ksr), doing that here. ksrcmd /complete and thus
    # Complete-Reboot are idempotent so it is ok if it gets re-run due to a failover after Complete-Reboot
    # but before Set-HostUpdateState.
    Complete-Reboot -ComputerName $ComputerName -Credential $domainCredential -RebootType $RebootType
 
    Set-HostUpdateState -Parameters $Parameters -HostName $ComputerName -HostState 'Completed'

    # If in the remote chance there is a failover here (after setting host state), we will end up doing the entire
    # reboot flow, almost as if calling the interface anew. The only difference is that the main invocation of
    # Reboot-Machine is preceeded by Prepare-Reboot. That one resets the host status to NotStarted while here we
    # are left with Completed. But we set the host status to RebootPending before initiating Start-Reboot so it
    # doesn't really matter if the original state was NotStarted or Completed.
}

function Restart-MachinePostDeploy
{
    [CmdletBinding(SupportsShouldProcess=$true, ConfirmImpact="Medium")]
    param
    (
        [Parameter(Mandatory=$true)]
        [CloudEngine.Configurations.EceInterfaceParameters]
        $Parameters
    )

    $ErrorActionPreference = 'stop'

    Trace-Execution "[Restart-MachinePostDeploy] Reboot node post physical machine deployment"

    # Get node name from execution context
    $computerName = Get-ExecutionContextNodeName -Parameters $Parameters
    Trace-Execution "[Restart-MachinePostDeploy] Physical node to hard reboot: $computerName."

    # Get domain credential
    $domainCredential = Get-DomainCredential -Parameters $Parameters
    Trace-Execution "[Restart-MachinePostDeploy] Domain Credential UserName is: $($domainCredential.UserName)."

    try 
    {
        Trace-Execution "[Restart-MachinePostDeploy] Restarting node $computerName using domain credential"
        Restart-Computer -ComputerName $computerName -Credential $domainCredential -Force -Wait -For WinRM -Timeout 1800 -Delay 15 -Protocol WSMan
        Trace-Execution "[Restart-MachinePostDeploy] Restarting node $computerName using domain credential finished"
        Trace-Execution "[Restart-MachinePostDeploy] Proceeding after restart of node $computerName"
    }
    catch
    {
        Trace-Execution "[Restart-MachinePostDeploy] Failed restarting node $computerName threw exception $_"
        throw "[Restart-MachinePostDeploy] Failed restarting node $computerName. Error: $_"
    }
}

Export-ModuleMember -Function Prepare-Reboot
Export-ModuleMember -Function Reboot-Machine
Export-ModuleMember -Function Restart-MachinePostDeploy

# SIG # Begin signature block
# MIIoKgYJKoZIhvcNAQcCoIIoGzCCKBcCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCCZy/mqMomD5h7O
# PrJ4Nf+FWp4Zvif9LFMXBjGxCn2M7aCCDXYwggX0MIID3KADAgECAhMzAAADTrU8
# esGEb+srAAAAAANOMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjMwMzE2MTg0MzI5WhcNMjQwMzE0MTg0MzI5WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQDdCKiNI6IBFWuvJUmf6WdOJqZmIwYs5G7AJD5UbcL6tsC+EBPDbr36pFGo1bsU
# p53nRyFYnncoMg8FK0d8jLlw0lgexDDr7gicf2zOBFWqfv/nSLwzJFNP5W03DF/1
# 1oZ12rSFqGlm+O46cRjTDFBpMRCZZGddZlRBjivby0eI1VgTD1TvAdfBYQe82fhm
# WQkYR/lWmAK+vW/1+bO7jHaxXTNCxLIBW07F8PBjUcwFxxyfbe2mHB4h1L4U0Ofa
# +HX/aREQ7SqYZz59sXM2ySOfvYyIjnqSO80NGBaz5DvzIG88J0+BNhOu2jl6Dfcq
# jYQs1H/PMSQIK6E7lXDXSpXzAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQUnMc7Zn/ukKBsBiWkwdNfsN5pdwAw
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMDUxNjAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAD21v9pHoLdBSNlFAjmk
# mx4XxOZAPsVxxXbDyQv1+kGDe9XpgBnT1lXnx7JDpFMKBwAyIwdInmvhK9pGBa31
# TyeL3p7R2s0L8SABPPRJHAEk4NHpBXxHjm4TKjezAbSqqbgsy10Y7KApy+9UrKa2
# kGmsuASsk95PVm5vem7OmTs42vm0BJUU+JPQLg8Y/sdj3TtSfLYYZAaJwTAIgi7d
# hzn5hatLo7Dhz+4T+MrFd+6LUa2U3zr97QwzDthx+RP9/RZnur4inzSQsG5DCVIM
# pA1l2NWEA3KAca0tI2l6hQNYsaKL1kefdfHCrPxEry8onJjyGGv9YKoLv6AOO7Oh
# JEmbQlz/xksYG2N/JSOJ+QqYpGTEuYFYVWain7He6jgb41JbpOGKDdE/b+V2q/gX
# UgFe2gdwTpCDsvh8SMRoq1/BNXcr7iTAU38Vgr83iVtPYmFhZOVM0ULp/kKTVoir
# IpP2KCxT4OekOctt8grYnhJ16QMjmMv5o53hjNFXOxigkQWYzUO+6w50g0FAeFa8
# 5ugCCB6lXEk21FFB1FdIHpjSQf+LP/W2OV/HfhC3uTPgKbRtXo83TZYEudooyZ/A
# Vu08sibZ3MkGOJORLERNwKm2G7oqdOv4Qj8Z0JrGgMzj46NFKAxkLSpE5oHQYP1H
# tPx1lPfD7iNSbJsP6LiUHXH1MIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAANOtTx6wYRv6ysAAAAAA04wDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIKqlClqRzw/X4iH/tEozSww3
# +V4sNL65uq8jHl73LRePMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEAbgp7dXbU7p5l5pjZfCxv4Y2qAc2znpkMs1Yzm9uMqozr01KlQD8LYS9P
# nJCTwgj+b0URwVjIqWmK1Ig1tY/ZnilYUGwEf51mVCFWSlVUKsX68rgjyL+TouAX
# pLUfQfCCNxiawBj7rPLLOHqDgbD2CbwjHvsEf8B8Y3eYez/8T1yOzprajP53MJns
# htZpSnQAekVREF8e5a20Ew+DhdWWWlbtVKDLdHlry9EBVLaku3ghfx+6i5NO1qLi
# dhg3Wxt5vzkkktEpuH+CZPzSFR3tb8KvpFCeKhImKbgt8nx/sljENvm8W3FTCIx3
# CYD8mkRdFXP/EbA1SyA8go3o1FcHCKGCF5QwgheQBgorBgEEAYI3AwMBMYIXgDCC
# F3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFSBgsq
# hkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCTGjrc4z1LSAfY98700CA2ka/Q9WDPSlz73Ji98AfqNwIGZMvn7DYE
# GBMyMDIzMDgwNzIxMzM0MC41ODRaMASAAgH0oIHRpIHOMIHLMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l
# cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0w
# NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Wg
# ghHqMIIHIDCCBQigAwIBAgITMwAAAdTk6QMvwKxprAABAAAB1DANBgkqhkiG9w0B
# AQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDAeFw0yMzA1MjUxOTEy
# MjdaFw0yNDAyMDExOTEyMjdaMIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz
# aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv
# cnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25z
# MScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046MzcwMy0wNUUwLUQ5NDcxJTAjBgNV
# BAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2UwggIiMA0GCSqGSIb3DQEB
# AQUAA4ICDwAwggIKAoICAQCYU94tmwIkl353SWej1ybWcSAbu8FLwTEtOvw3uXMp
# a1DnDXDwbtkLc+oT8BNti8t+38TwktfgoAM9N/BOHyT4CpXB1Hwn1YYovuYujoQV
# 9kmyU6D6QttTIKN7fZTjoNtIhI5CBkwS+MkwCwdaNyySvjwPvZuxH8RNcOOB8ABD
# hJH+vw/jev+G20HE0Gwad323x4uA4tLkE0e9yaD7x/s1F3lt7Ni47pJMGMLqZQCK
# 7UCUeWauWF9wZINQ459tSPIe/xK6ttLyYHzd3DeRRLxQP/7c7oPJPDFgpbGB2HRJ
# aE0puRRDoiDP7JJxYr+TBExhI2ulZWbgL4CfWawwb1LsJmFWJHbqGr6o0irW7IqD
# kf2qEbMRT1WUM15F5oBc5Lg18lb3sUW7kRPvKwmfaRBkrmil0H/tv3HYyE6A490Z
# FEcPk6dzYAKfCe3vKpRVE4dPoDKVnCLUTLkq1f/pnuD/ZGHJ2cbuIer9umQYu/Fz
# 1DBreC8CRs3zJm48HIS3rbeLUYu/C93jVIJOlrKAv/qmYRymjDmpfzZvfvGBGUbO
# px+4ofwqBTLuhAfO7FZz338NtsjDzq3siR0cP74p9UuNX1Tpz4KZLM8GlzZLje3a
# HfD3mulrPIMipnVqBkkY12a2slsbIlje3uq8BSrj725/wHCt4HyXW4WgTGPizyEx
# TQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFDzajMdwtAZ6EoB5Hedcsru0DHZJMB8G
# A1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8GA1UdHwRYMFYwVKBSoFCG
# Tmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY3JsL01pY3Jvc29mdCUy
# MFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBsBggrBgEFBQcBAQRgMF4w
# XAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvY2Vy
# dHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUyMDIwMTAoMSkuY3J0MAwG
# A1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUHAwgwDgYDVR0PAQH/BAQD
# AgeAMA0GCSqGSIb3DQEBCwUAA4ICAQC0xUPP+ytwktdRhYlZ9Bk4/bLzLOzq+wcC
# 7VAaRQHGRS+IPyU/8OLiVoXcoyKKKiRQ7K9c90OdM+qL4PizKnStLDBsWT+ds1ha
# yNkTwnhVcZeA1EGKlNZvdlTsCUxJ5C7yoZQmA+2lpk04PGjcFhH1gGRphz+tcDNK
# /CtKJ+PrEuNj7sgmBop/JFQcYymiP/vr+dudrKQeStcTV9W13cm2FD5F/XWO37Ti
# +G4Tg1BkU25RA+t8RCWy/IHug3rrYzqUcdVRq7UgRl40YIkTNnuco6ny7vEBmWFj
# cr7Skvo/QWueO8NAvP2ZKf3QMfidmH1xvxx9h9wVU6rvEQ/PUJi3popYsrQKuogp
# hdPqHZ5j9OoQ+EjACUfgJlHnn8GVbPW3xGplCkXbyEHheQNd/a3X/2zpSwEROOcy
# 1YaeQquflGilAf0y40AFKqW2Q1yTb19cRXBpRzbZVO+RXUB4A6UL1E1Xjtzr/b9q
# z9U4UNV8wy8Yv/07bp3hAFfxB4mn0c+PO+YFv2YsVvYATVI2lwL9QDSEt8F0RW6L
# ekxPfvbkmVSRwP6pf5AUfkqooKa6pfqTCndpGT71HyiltelaMhRUsNVkaKzAJrUo
# ESSj7sTP1ZGiS9JgI+p3AO5fnMht3mLHMg68GszSH4Wy3vUDJpjUTYLtaTWkQtz6
# UqZPN7WXhjCCB3EwggVZoAMCAQICEzMAAAAVxedrngKbSZkAAAAAABUwDQYJKoZI
# hvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAw
# DgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24x
# MjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmljYXRlIEF1dGhvcml0eSAy
# MDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIyNVowfDELMAkGA1UEBhMC
# VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV
# BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp
# bWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoIC
# AQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXIyjVX9gF/bErg4r25Phdg
# M/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjoYH1qUoNEt6aORmsHFPPF
# dvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1yaa8dq6z2Nr41JmTamDu6
# GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v3byNpOORj7I5LFGc6XBp
# Dco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pGve2krnopN6zL64NF50Zu
# yjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viSkR4dPf0gz3N9QZpGdc3E
# XzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYrbqgSUei/BQOj0XOmTTd0
# lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlMjgK8QmguEOqEUUbi0b1q
# GFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSLW6CmgyFdXzB0kZSU2LlQ
# +QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AFemzFER1y7435UsSFF5PA
# PBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIurQIDAQABo4IB3TCCAdkw
# EgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIEFgQUKqdS/mTEmr6CkTxG
# NSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMFwGA1UdIARV
# MFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEWM2h0dHA6Ly93d3cubWlj
# cm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5Lmh0bTATBgNVHSUEDDAK
# BggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMC
# AYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV9lbLj+iiXGJo0T2UkFvX
# zpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20v
# cGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAxMC0wNi0yMy5jcmwwWgYI
# KwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2LTIzLmNydDANBgkqhkiG
# 9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv6lwUtj5OR2R4sQaTlz0x
# M7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZnOlNN3Zi6th542DYunKmC
# VgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1bSNU5HhTdSRXud2f8449
# xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4rPf5KYnDvBewVIVCs/wM
# nosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU6ZGyqVvfSaN0DLzskYDS
# PeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDFNLB62FD+CljdQDzHVG2d
# Y3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/HltEAY5aGZFrDZ+kKNxn
# GSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdUCbFpAUR+fKFhbHP+Crvs
# QWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKiexcdFYmNcP7ntdAoGokL
# jzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTmdHRbatGePu1+oDEzfbzL
# 6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZqELQdVTNYs6FwZvKhggNN
# MIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hp
# bmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jw
# b3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJpY2EgT3BlcmF0aW9uczEn
# MCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjM3MDMtMDVFMC1EOTQ3MSUwIwYDVQQD
# ExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMKAQEwBwYFKw4DAhoDFQAt
# M12Wjo2xxA5sduzB/3HdzZmiSKCBgzCBgKR+MHwxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1w
# IFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6HusWTAiGA8yMDIzMDgwNzE3NDYw
# MVoYDzIwMjMwODA4MTc0NjAxWjB0MDoGCisGAQQBhFkKBAExLDAqMAoCBQDoe6xZ
# AgEAMAcCAQACAjdHMAcCAQACAhKlMAoCBQDofP3ZAgEAMDYGCisGAQQBhFkKBAIx
# KDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAIAgEAAgMBhqAwDQYJKoZI
# hvcNAQELBQADggEBAHITE8uGuO9UrbNbg6/0phE8qAnlqPLB+BAuaQKkGq7N/FLI
# b261b0KeMJTiQtuqSXKoO4oZaIl94fCGwk1dq3BvwVurvjjSFFkK1yEqHbHVqljg
# tuxV+w/MjvX3BcuRBc5Oq+29u4nQLtrXyLobx0tFjr2NxPLFncG4T2m+qBtzPKP5
# fEv+irZVz+Cu43fac2uo88pL4VcYEe1yjqTKwInWdb017DxjYagpHoSpqK2+J/ty
# 0ZCHKYnbLjL5fKX4VAII4jH3/DcwA9TyVP0JGAZCEQZf3gZcbajmREj89jlHNsOp
# 5gv6qVIZkl5o1mY20MIiuR7KajENxrGo93c8pxoxggQNMIIECQIBATCBkzB8MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNy
# b3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAdTk6QMvwKxprAABAAAB1DAN
# BglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0GCyqGSIb3DQEJEAEEMC8G
# CSqGSIb3DQEJBDEiBCC3C3IA57zELZWySf8wnolerpPUKxy5+wUU0DJ9FQtnyzCB
# +gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIMzqh/rYFKXOlzvWS5xCtPi9aU+f
# BUkxIriXp2WTPWI3MIGYMIGApH4wfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldh
# c2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBD
# b3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIw
# MTACEzMAAAHU5OkDL8CsaawAAQAAAdQwIgQg7EOEZOoomDBv8SkbDLdBbzGn9fTn
# Z8ys1vZyNyrK+3IwDQYJKoZIhvcNAQELBQAEggIAflERGgnD9kHd0C41o0BOtyJJ
# zCEZUbEf7EfYuQg30XRkZPN0lPfrSo+oq4sS0Z3yU4WoZMP2NGVu8gHc/BKvcxKV
# x5M0XL9LBbgz+zW37IDtSzU3cCt6lZBgQeZklv9tNRsDvWWfuHzBxtzGfZ97zVej
# 5iyZ3Xk8/Hd7lICQg6KPgSCD4ofXHnVqIpKID3dSKLWy2zgqnLavizYcI27bY+w8
# 3I11oxhH5W6uV7MHa5NrQS6bGqs27PuhqhxX7wa4KQ+MFAeq8oLc0lXUOBMhB4S8
# TDLHEMisTGgyNPiT5oJ3mdD6RY3dOJWddxfpETENc+6ZzQodP3MoCFbmg64UPWTh
# JSqHhlFVJ3Hlfv2rQCtOeHC3kjWskDRFEIid9kXObx5jowPeAejS+SQ8+eeUexha
# r5YMC0bPGqgxI02w8RkCRPAupLz6qbYPVpAAPQTkdo43ry8bUt+RkgSUFthr706U
# oxNldteVTpkAKC4fTw18YzMq7pMGt/SL1fXP2LOgUzdZNkuq6ev8mRjCQNz7zIBx
# ApbY/4Sh0Dc2xtgNgps/PjCcihSvHe1zWsb7V3Bb4zEY/hRppbIbzPTCG8UiXPL/
# LqEqMDbUGJWAl87fbl2zslJs6e3EIkVrOot1VyKU+IBt0XQ2R4R+eqY3gPUGw7m/
# 9XQcp9nAX7i5QW3vTXc=
# SIG # End signature block