Migrate.Autorest/custom/Initialize-AzMigrateLocalReplicationInfrastructure.ps1
# ---------------------------------------------------------------------------------- # # Copyright Microsoft Corporation # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # ---------------------------------------------------------------------------------- <# .Synopsis Initializes the infrastructure for the migrate project. .Description The Initialize-AzMigrateLocalReplicationInfrastructure cmdlet initializes the infrastructure for the migrate project in AzLocal scenario. .Link https://learn.microsoft.com/powershell/module/az.migrate/initialize-azmigratelocalreplicationinfrastructure #> function Initialize-AzMigrateLocalReplicationInfrastructure { [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Runtime.PreviewMessageAttribute("This cmdlet is using a preview API version and is subject to breaking change in a future release.")] [OutputType([System.Boolean], ParameterSetName = 'AzLocal')] [CmdletBinding(DefaultParameterSetName = 'AzLocal', PositionalBinding = $false, SupportsShouldProcess, ConfirmImpact = 'Medium')] param( [Parameter(Mandatory)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the Resource Group of the Azure Migrate Project in the current subscription. ${ResourceGroupName}, [Parameter(Mandatory)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the name of the Azure Migrate project to be used for server migration. ${ProjectName}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the Storage Account ARM Id to be used for private endpoint scenario. ${CacheStorageAccountId}, [Parameter()] [System.String] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Runtime.DefaultInfo(Script = '(Get-AzContext).Subscription.Id')] # Azure Subscription ID. ${SubscriptionId}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the source appliance name for the AzLocal scenario. ${SourceApplianceName}, [Parameter(Mandatory)] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Path')] [System.String] # Specifies the target appliance name for the AzLocal scenario. ${TargetApplianceName}, [Parameter()] [Alias('AzureRMContext', 'AzureCredential')] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Azure')] [System.Management.Automation.PSObject] # The credentials, account, tenant, and subscription used for communication with Azure. ${DefaultProfile}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Wait for .NET debugger to attach ${Break}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be appended to the front of the pipeline ${HttpPipelineAppend}, [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Returns true when the command succeeds ${PassThru}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Runtime.SendAsyncStep[]] # SendAsync Pipeline Steps to be prepended to the front of the pipeline ${HttpPipelinePrepend}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Uri] # The URI for the proxy server to use ${Proxy}, [Parameter(DontShow)] [ValidateNotNull()] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Management.Automation.PSCredential] # Credentials for a proxy server to use for the remote call ${ProxyCredential}, [Parameter(DontShow)] [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Category('Runtime')] [System.Management.Automation.SwitchParameter] # Use the default credentials for the proxy ${ProxyUseDefaultCredentials} ) process { Import-Module $PSScriptRoot\Helper\AzLocalCommonSettings.ps1 Import-Module $PSScriptRoot\Helper\CommonHelper.ps1 CheckResourcesModuleDependency CheckStorageModuleDependency Import-Module Az.Resources Import-Module Az.Storage $context = Get-AzContext # Get SubscriptionId if ([string]::IsNullOrEmpty($SubscriptionId)) { Write-Host "No -SubscriptionId provided. Using the one from Get-AzContext." $SubscriptionId = $context.Subscription.Id if ([string]::IsNullOrEmpty($SubscriptionId)) { throw "Please login to Azure to select a subscription." } } Write-Host "*Selected Subscription Id: '$($SubscriptionId)'" # Get resource group $resourceGroup = Get-AzResourceGroup -Name $ResourceGroupName -ErrorVariable notPresent -ErrorAction SilentlyContinue if ($null -eq $resourceGroup) { throw "Resource group '$($ResourceGroupName)' does not exist in the subscription. Please create the resource group and try again." } Write-Host "*Selected Resource Group: '$($ResourceGroupName)'" # Verify user validity $userObject = Get-AzADUser -UserPrincipalName $context.Subscription.ExtendedProperties.Account if (-not $userObject) { $userObject = Get-AzADUser -Mail $context.Subscription.ExtendedProperties.Account } if (-not $userObject) { $mailNickname = "{0}#EXT#" -f $($context.Account.Id -replace '@', '_') $userObject = Get-AzADUser | Where-Object { $_.MailNickname -eq $mailNickname } } if (-not $userObject) { if ($context.Account.Id.StartsWith("MSI@")) { $hostname = $env:COMPUTERNAME $userObject = Get-AzADServicePrincipal -DisplayName $hostname } else { $userObject = Get-AzADServicePrincipal -ApplicationID $context.Account.Id } } if (-not $userObject) { throw 'User Object Id Not Found!' } # Get Migrate Project $migrateProject = InvokeAzMigrateGetCommandWithRetries ` -CommandName "Az.Migrate\Get-AzMigrateProject" ` -Parameters @{"Name" = $ProjectName; "ResourceGroupName" = $ResourceGroupName} ` -ErrorMessage "Migrate project '$($ProjectName)' not found." # Access Discovery Service $discoverySolutionName = "Servers-Discovery-ServerDiscovery" $discoverySolution = InvokeAzMigrateGetCommandWithRetries ` -CommandName "Az.Migrate\Get-AzMigrateSolution" ` -Parameters @{"SubscriptionId" = $SubscriptionId; "ResourceGroupName" = $ResourceGroupName; "MigrateProjectName" = $ProjectName; "Name" = $discoverySolutionName} ` -ErrorMessage "Server Discovery Solution '$discoverySolutionName' not found." # Get Appliances Mapping $appMap = @{} if ($null -ne $discoverySolution.DetailExtendedDetail["applianceNameToSiteIdMapV2"]) { $appMapV2 = $discoverySolution.DetailExtendedDetail["applianceNameToSiteIdMapV2"] | ConvertFrom-Json # Fetch all appliance from V2 map first. Then these can be updated if found again in V3 map. foreach ($item in $appMapV2) { $appMap[$item.ApplianceName.ToLower()] = $item.SiteId } } if ($null -ne $discoverySolution.DetailExtendedDetail["applianceNameToSiteIdMapV3"]) { $appMapV3 = $discoverySolution.DetailExtendedDetail["applianceNameToSiteIdMapV3"] | ConvertFrom-Json foreach ($item in $appMapV3) { $t = $item.psobject.properties $appMap[$t.Name.ToLower()] = $t.Value.SiteId } } if ($null -eq $discoverySolution.DetailExtendedDetail["applianceNameToSiteIdMapV2"] -And $null -eq $discoverySolution.DetailExtendedDetail["applianceNameToSiteIdMapV3"] ) { throw "Server Discovery Solution missing Appliance Details. Invalid Solution." } $hyperVSiteTypeRegex = "(?<=/Microsoft.OffAzure/HyperVSites/).*$" $vmwareSiteTypeRegex = "(?<=/Microsoft.OffAzure/VMwareSites/).*$" # Validate SourceApplianceName & TargetApplianceName $sourceSiteId = $appMap[$SourceApplianceName.ToLower()] $targetSiteId = $appMap[$TargetApplianceName.ToLower()] if ($sourceSiteId -match $hyperVSiteTypeRegex -and $targetSiteId -match $hyperVSiteTypeRegex) { $instanceType = $AzLocalInstanceTypes.HyperVToAzLocal } elseif ($sourceSiteId -match $vmwareSiteTypeRegex -and $targetSiteId -match $hyperVSiteTypeRegex) { $instanceType = $AzLocalInstanceTypes.VMwareToAzLocal } else { throw "Error encountered in matching the given source appliance name '$SourceApplianceName' and target appliance name '$TargetApplianceName'. Please verify the VM site type to be either for HyperV or VMware for both source and target appliances, and the appliance names are correct." } # Get Data Replication Service, or the AMH solution $amhSolutionName = "Servers-Migration-ServerMigration_DataReplication" $amhSolution = InvokeAzMigrateGetCommandWithRetries ` -CommandName "Az.Migrate\Get-AzMigrateSolution" ` -Parameters @{"SubscriptionId" = $SubscriptionId; "ResourceGroupName" = $ResourceGroupName; "MigrateProjectName" = $ProjectName; "Name" = $amhSolutionName} ` -ErrorMessage "No Data Replication Service Solution '$amhSolutionName' found. Please verify your appliance setup." # Get Source and Target Fabrics $allFabrics = Az.Migrate\Get-AzMigrateLocalReplicationFabric -ResourceGroupName $ResourceGroupName foreach ($fabric in $allFabrics) { if ($fabric.Property.CustomProperty.MigrationSolutionId -ne $amhSolution.Id) { continue } if (($instanceType -eq $AzLocalInstanceTypes.HyperVToAzLocal) -and ($fabric.Property.CustomProperty.InstanceType -ceq $FabricInstanceTypes.HyperVInstance)) { $sourceFabric = $fabric } elseif (($instanceType -eq $AzLocalInstanceTypes.VMwareToAzLocal) -and ($fabric.Property.CustomProperty.InstanceType -ceq $FabricInstanceTypes.VMwareInstance)) { $sourceFabric = $fabric } elseif ($fabric.Property.CustomProperty.InstanceType -ceq $FabricInstanceTypes.AzLocalInstance) { $targetFabric = $fabric } if (($null -ne $sourceFabric) -and ($null -ne $targetFabric)) { break } } if ($null -eq $sourceFabric) { throw "No source Fabric found. Please verify your appliance setup." } Write-Host "*Selected Source Fabric: '$($sourceFabric.Name)'" if ($null -eq $targetFabric) { throw "No target Fabric found. Please verify your appliance setup." } Write-Host "*Selected Target Fabric: '$($targetFabric.Name)'" # Get Source and Target Dras from Fabrics $sourceDras = InvokeAzMigrateGetCommandWithRetries ` -CommandName "Az.Migrate.Internal\Get-AzMigrateFabricAgent" ` -Parameters @{"FabricName" = $sourceFabric.Name; "ResourceGroupName" = $ResourceGroupName} ` -ErrorMessage "No source Fabric Agent (DRA) found. Please verify your appliance setup." $sourceDra = $sourceDras[0] Write-Host "*Selected Source Dra: '$($sourceDra.Name)'" $targetDras = InvokeAzMigrateGetCommandWithRetries ` -CommandName "Az.Migrate.Internal\Get-AzMigrateFabricAgent" ` -Parameters @{"FabricName" = $targetFabric.Name; "ResourceGroupName" = $ResourceGroupName} ` -ErrorMessage "No target Fabric Agent (DRA) found. Please verify your appliance setup." $targetDra = $targetDras[0] Write-Host "*Selected Target Dra: '$($targetDra.Name)'" # Get Replication Vault $replicationVaultName = $amhSolution.DetailExtendedDetail["vaultId"].Split("/")[8] $replicationVault = InvokeAzMigrateGetCommandWithRetries ` -CommandName "Az.Migrate.Internal\Get-AzMigrateVault" ` -Parameters @{"ResourceGroupName" = $ResourceGroupName; "Name" = $replicationVaultName} ` -ErrorMessage "No Replication Vault '$replicationVaultName' found in Resource Group '$ResourceGroupName'." # Put Policy $policyName = $replicationVault.Name + $instanceType + "policy" $policy = Az.Migrate.Internal\Get-AzMigratePolicy ` -ResourceGroupName $ResourceGroupName ` -Name $policyName ` -VaultName $replicationVault.Name ` -SubscriptionId $SubscriptionId ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Default policy is found if ($null -ne $policy) { # Give time for create/update to reach a terminal state. Timeout after 10min if ($policy.Property.ProvisioningState -eq [ProvisioningState]::Creating -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Updating) { Write-Host "Policy '$($policyName)' found in Provisioning State '$($policy.Property.ProvisioningState)'." for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $policy = Az.Migrate.Internal\Get-AzMigratePolicy -InputObject $policy if (-not ( $policy.Property.ProvisioningState -eq [ProvisioningState]::Creating -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Updating)) { break } } # Make sure Policy is no longer in Creating or Updating state if ($policy.Property.ProvisioningState -eq [ProvisioningState]::Creating -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Updating) { throw "Policy '$($policyName)' times out with Provisioning State: '$($policy.Property.ProvisioningState)'. Please re-run this command or contact support if help needed." } } # Check and remove if policy is in a bad terminal state if ($policy.Property.ProvisioningState -eq [ProvisioningState]::Canceled -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Failed) { Write-Host "Policy '$($policyName)' found but in an unusable terminal Provisioning State '$($policy.Property.ProvisioningState)'.`nRemoving policy..." # Remove policy try { Az.Migrate.Internal\Remove-AzMigratePolicy -InputObject $policy | Out-Null } catch { if ($_.Exception.Message -notmatch "Status: OK") { throw $_.Exception.Message } } Start-Sleep -Seconds 30 $policy = Az.Migrate.Internal\Get-AzMigratePolicy ` -InputObject $policy ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Make sure Policy is no longer in Canceled or Failed state if ($null -ne $policy -and ($policy.Property.ProvisioningState -eq [ProvisioningState]::Canceled -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Failed)) { throw "Failed to change the Provisioning State of policy '$($policyName)'by removing. Please re-run this command or contact support if help needed." } } # Give time to remove policy. Timeout after 10min if ($null -eq $policy -and $policy.Property.ProvisioningState -eq [ProvisioningState]::Deleting) { Write-Host "Policy '$($policyName)' found in Provisioning State '$($policy.Property.ProvisioningState)'." for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $policy = Az.Migrate.Internal\Get-AzMigratePolicy ` -InputObject $policy ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $policy -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Deleted) { break } elseif ($policy.Property.ProvisioningState -eq [ProvisioningState]::Deleting) { continue } throw "Policy '$($policyName)' has an unexpected Provisioning State of '$($policy.Property.ProvisioningState)' during removal process. Please re-run this command or contact support if help needed." } # Make sure Policy is no longer in Deleting state if ($null -ne $policy -and $policy.Property.ProvisioningState -eq [ProvisioningState]::Deleting) { throw "Policy '$($policyName)' times out with Provisioning State: '$($policy.Property.ProvisioningState)'. Please re-run this command or contact support if help needed." } } # Indicate policy was removed if ($null -eq $policy -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Deleted) { Write-Host "Policy '$($policyName)' was removed." } } # Refresh local policy object if exists if ($null -ne $policy) { $policy = Az.Migrate.Internal\Get-AzMigratePolicy -InputObject $policy } # Create policy if not found or previously deleted if ($null -eq $policy -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Deleted) { Write-Host "Creating Policy..." $params = @{ InstanceType = $instanceType; RecoveryPointHistoryInMinute = $ReplicationDetails.PolicyDetails.DefaultRecoveryPointHistoryInMinutes; CrashConsistentFrequencyInMinute = $ReplicationDetails.PolicyDetails.DefaultCrashConsistentFrequencyInMinutes; AppConsistentFrequencyInMinute = $ReplicationDetails.PolicyDetails.DefaultAppConsistentFrequencyInMinutes; } # Setup Policy deployment parameters $policyProperties = [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Models.Api20240901.PolicyModelProperties]::new() if ($instanceType -eq $AzLocalInstanceTypes.HyperVToAzLocal) { $policyCustomProperties = [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Models.Api20240901.HyperVToAzStackHcipolicyModelCustomProperties]::new() } elseif ($instanceType -eq $AzLocalInstanceTypes.VMwareToAzLocal) { $policyCustomProperties = [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Models.Api20240901.VMwareToAzStackHcipolicyModelCustomProperties]::new() } else { throw "Instance type '$($instanceType)' is not supported. Currently, for AzLocal scenario, only HyperV and VMware as the source is supported." } $policyCustomProperties.InstanceType = $params.InstanceType $policyCustomProperties.RecoveryPointHistoryInMinute = $params.RecoveryPointHistoryInMinute $policyCustomProperties.CrashConsistentFrequencyInMinute = $params.CrashConsistentFrequencyInMinute $policyCustomProperties.AppConsistentFrequencyInMinute = $params.AppConsistentFrequencyInMinute $policyProperties.CustomProperty = $policyCustomProperties try { Az.Migrate.Internal\New-AzMigratePolicy ` -Name $policyName ` -ResourceGroupName $ResourceGroupName ` -VaultName $replicationVaultName ` -Property $policyProperties ` -SubscriptionId $SubscriptionId ` -NoWait | Out-Null } catch { if ($_.Exception.Message -notmatch "Status: OK") { throw $_.Exception.Message } } # Check Policy creation status every 30s. Timeout after 10min for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $policy = Az.Migrate.Internal\Get-AzMigratePolicy ` -ResourceGroupName $ResourceGroupName ` -Name $policyName ` -VaultName $replicationVault.Name ` -SubscriptionId $SubscriptionId ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $policy) { continue } # Stop if policy reaches a terminal state if ($policy.Property.ProvisioningState -eq [ProvisioningState]::Succeeded -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Deleted -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Canceled -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Failed) { break } } # Make sure Policy is in a terminal state if (-not ( $policy.Property.ProvisioningState -eq [ProvisioningState]::Succeeded -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Deleted -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Canceled -or $policy.Property.ProvisioningState -eq [ProvisioningState]::Failed)) { throw "Policy '$($policyName)' times out with Provisioning State: '$($policy.Property.ProvisioningState)' during creation process. Please re-run this command or contact support if help needed." } } if ($policy.Property.ProvisioningState -ne [ProvisioningState]::Succeeded) { throw "Policy '$($policyName)' has an unexpected Provisioning State of '$($policy.Property.ProvisioningState)'. Please re-run this command or contact support if help needed." } $policy = Az.Migrate.Internal\Get-AzMigratePolicy ` -ResourceGroupName $ResourceGroupName ` -Name $policyName ` -VaultName $replicationVault.Name ` -SubscriptionId $SubscriptionId ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $policy) { throw "Unexpected error occurred during policy creation. Please re-run this command or contact support if help needed." } elseif ($policy.Property.ProvisioningState -ne [ProvisioningState]::Succeeded) { throw "Policy '$($policyName)' has an unexpected Provisioning State of '$($policy.Property.ProvisioningState)'. Please re-run this command or contact support if help needed." } else { Write-Host "*Selected Policy: '$($policyName)'" } # Put Cache Storage Account $amhSolution = Az.Migrate\Get-AzMigrateSolution ` -ResourceGroupName $ResourceGroupName ` -MigrateProjectName $ProjectName ` -Name "Servers-Migration-ServerMigration_DataReplication" ` -SubscriptionId $SubscriptionId ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $amhSolution) { throw "No Data Replication Service Solution found. Please verify your appliance setup." } $amhStoredStorageAccountId = $amhSolution.DetailExtendedDetail["replicationStorageAccountId"] # Record of rsa found in AMH solution if (![string]::IsNullOrEmpty($amhStoredStorageAccountId)) { $amhStoredStorageAccountName = $amhStoredStorageAccountId.Split("/")[8] $amhStoredStorageAccount = Get-AzStorageAccount ` -ResourceGroupName $ResourceGroupName ` -Name $amhStoredStorageAccountName ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Wait for amhStoredStorageAccount to reach a terminal state if ($null -ne $amhStoredStorageAccount -and $null -ne $amhStoredStorageAccount.ProvisioningState -and $amhStoredStorageAccount.ProvisioningState -ne [StorageAccountProvisioningState]::Succeeded) { # Check rsa state every 30s if not Succeeded already. Timeout after 10min for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $amhStoredStorageAccount = Get-AzStorageAccount ` -ResourceGroupName $ResourceGroupName ` -Name $amhStoredStorageAccountName ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Stop if amhStoredStorageAccount is not found or in a terminal state if ($null -eq $amhStoredStorageAccount -or $null -eq $amhStoredStorageAccount.ProvisioningState -or $amhStoredStorageAccount.ProvisioningState -eq [StorageAccountProvisioningState]::Succeeded) { break } } } # amhStoredStorageAccount exists and in Succeeded state if ($null -ne $amhStoredStorageAccount -and $amhStoredStorageAccount.ProvisioningState -eq [StorageAccountProvisioningState]::Succeeded) { # Use amhStoredStorageAccount and ignore user provided Cache Storage Account Id if (![string]::IsNullOrEmpty($CacheStorageAccountId) -and $amhStoredStorageAccount.Id -ne $CacheStorageAccountId) { Write-Host "A Cache Storage Account '$($amhStoredStorageAccountName)' has been linked already. The given -CacheStorageAccountId '$($CacheStorageAccountId)' will be ignored." } $cacheStorageAccount = $amhStoredStorageAccount } elseif ($null -eq $amhStoredStorageAccount -or $null -eq $amhStoredStorageAccount.ProvisioningState) { # amhStoredStorageAccount is found but in a bad state, so log to ask user to remove if ($null -ne $amhStoredStorageAccount -and $null -eq $amhStoredStorageAccount.ProvisioningState) { Write-Host "A previously linked Cache Storage Account with Id '$($amhStoredStorageAccountId)' is found but in a unusable state. Please remove it manually and re-run this command." } # amhStoredStorageAccount is not found or in a bad state but AMH has a record of it, so remove the record if ($amhSolution.DetailExtendedDetail.ContainsKey("replicationStorageAccountId")) { $amhSolution.DetailExtendedDetail.Remove("replicationStorageAccountId") | Out-Null $amhSolution.DetailExtendedDetail.Add("replicationStorageAccountId", $null) | Out-Null Az.Migrate.Internal\Set-AzMigrateSolution ` -MigrateProjectName $ProjectName ` -Name $amhSolution.Name ` -ResourceGroupName $ResourceGroupName ` -DetailExtendedDetail $amhSolution.DetailExtendedDetail.AdditionalProperties | Out-Null } } else { throw "A linked Cache Storage Account with Id '$($amhStoredStorageAccountId)' times out with Provisioning State: '$($amhStoredStorageAccount.ProvisioningState)'. Please re-run this command or contact support if help needed." } $amhSolution = Az.Migrate\Get-AzMigrateSolution ` -ResourceGroupName $ResourceGroupName ` -MigrateProjectName $ProjectName ` -Name "Servers-Migration-ServerMigration_DataReplication" ` -SubscriptionId $SubscriptionId ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Check if AMH record is removed if (($null -eq $amhStoredStorageAccount -or $null -eq $amhStoredStorageAccount.ProvisioningState) -and ![string]::IsNullOrEmpty($amhSolution.DetailExtendedDetail["replicationStorageAccountId"])) { throw "Unexpected error occurred in unlinking Cache Storage Account with Id '$($amhSolution.DetailExtendedDetail["replicationStorageAccountId"])'. Please re-run this command or contact support if help needed." } } # No linked Cache Storage Account found in AMH solution but user provides a Cache Storage Account Id if ($null -eq $cacheStorageAccount -and ![string]::IsNullOrEmpty($CacheStorageAccountId)) { $userProvidedStorageAccountIdSegs = $CacheStorageAccountId.Split("/") if ($userProvidedStorageAccountIdSegs.Count -ne 9) { throw "Invalid Cache Storage Account Id '$($CacheStorageAccountId)' provided. Please provide a valid one." } $userProvidedStorageAccountName = ($userProvidedStorageAccountIdSegs[8]).ToLower() # Check if user provided Cache Storage Account exists $userProvidedStorageAccount = Get-AzStorageAccount ` -ResourceGroupName $ResourceGroupName ` -Name $userProvidedStorageAccountName ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Wait for userProvidedStorageAccount to reach a terminal state if ($null -ne $userProvidedStorageAccount -and $null -ne $userProvidedStorageAccount.ProvisioningState -and $userProvidedStorageAccount.ProvisioningState -ne [StorageAccountProvisioningState]::Succeeded) { # Check rsa state every 30s if not Succeeded already. Timeout after 10min for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $userProvidedStorageAccount = Get-AzStorageAccount ` -ResourceGroupName $ResourceGroupName ` -Name $userProvidedStorageAccountName ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Stop if userProvidedStorageAccount is not found or in a terminal state if ($null -eq $userProvidedStorageAccount -or $null -eq $userProvidedStorageAccount.ProvisioningState -or $userProvidedStorageAccount.ProvisioningState -eq [StorageAccountProvisioningState]::Succeeded) { break } } } if ($null -ne $userProvidedStorageAccount -and $userProvidedStorageAccount.ProvisioningState -eq [StorageAccountProvisioningState]::Succeeded) { $cacheStorageAccount = $userProvidedStorageAccount } elseif ($null -eq $userProvidedStorageAccount) { throw "Cache Storage Account with Id '$($CacheStorageAccountId)' is not found. Please re-run this command without -CacheStorageAccountId to create one automatically or re-create the Cache Storage Account yourself and try again." } elseif ($null -eq $userProvidedStorageAccount.ProvisioningState) { throw "Cache Storage Account with Id '$($CacheStorageAccountId)' is found but in an unusable state. Please re-run this command without -CacheStorageAccountId to create one automatically or re-create the Cache Storage Account yourself and try again." } else { throw "Cache Storage Account with Id '$($CacheStorageAccountId)' is found but times out with Provisioning State: '$($userProvidedStorageAccount.ProvisioningState)'. Please re-run this command or contact support if help needed." } } # No Cache Storage Account found or provided, so create one if ($null -eq $cacheStorageAccount) { $suffix = (GenerateHashForArtifact -Artifact "$($sourceSiteId)/$($SourceApplianceName)").ToString() if ($suffixHash.Length -gt 14) { $suffix = $suffixHash.Substring(0, 14) } $cacheStorageAccountName = "migratersa" + $suffix $cacheStorageAccountId = "/subscriptions/$($SubscriptionId)/resourceGroups/$($ResourceGroupName)/providers/Microsoft.Storage/storageAccounts/$($cacheStorageAccountName)" # Check if default Cache Storage Account already exists, which it shoudln't $cacheStorageAccount = Get-AzStorageAccount ` -ResourceGroupName $ResourceGroupName ` -Name $cacheStorageAccountName ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -ne $cacheStorageAccount) { throw "Unexpected error encountered: Cache Storage Account '$($cacheStorageAccountName)' already exists. Please re-run this command to create a different one or contact support if help needed." } Write-Host "Creating Cache Storage Account with default name '$($cacheStorageAccountName)'..." $params = @{ name = $cacheStorageAccountName; location = $migrateProject.Location; migrateProjectName = $migrateProject.Name; skuName = "Standard_LRS"; tags = @{ "Migrate Project" = $migrateProject.Name }; kind = "StorageV2"; encryption = @{ services = @{blob = @{ enabled = $true }; file = @{ enabled = $true } } }; } # Create Cache Storage Account $cacheStorageAccount = New-AzStorageAccount ` -ResourceGroupName $ResourceGroupName ` -Name $params.name ` -SkuName $params.skuName ` -Location $params.location ` -Kind $params.kind ` -Tags $params.tags ` -AllowBlobPublicAccess $true if ($null -ne $cacheStorageAccount -and $null -ne $cacheStorageAccount.ProvisioningState -and $cacheStorageAccount.ProvisioningState -ne [StorageAccountProvisioningState]::Succeeded) { # Check rsa state every 30s if not Succeeded already. Timeout after 10min for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $cacheStorageAccount = Get-AzStorageAccount ` -ResourceGroupName $ResourceGroupName ` -Name $params.name ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Stop if cacheStorageAccount is not found or in a terminal state if ($null -eq $cacheStorageAccount -or $null -eq $cacheStorageAccount.ProvisioningState -or $cacheStorageAccount.ProvisioningState -eq [StorageAccountProvisioningState]::Succeeded) { break } } } if ($null -eq $cacheStorageAccount -or $null -eq $cacheStorageAccount.ProvisioningState) { throw "Unexpected error occurs during Cache Storgae Account creation process. Please re-run this command or provide -CacheStorageAccountId of the one created own your own." } elseif ($cacheStorageAccount.ProvisioningState -ne [StorageAccountProvisioningState]::Succeeded) { throw "Cache Storage Account with Id '$($cacheStorageAccount.Id)' times out with Provisioning State: '$($cacheStorageAccount.ProvisioningState)' during creation process. Please remove it manually and re-run this command or contact support if help needed." } } # Sanity check if ($null -eq $cacheStorageAccount -or $null -eq $cacheStorageAccount.ProvisioningState -or $cacheStorageAccount.ProvisioningState -ne [StorageAccountProvisioningState]::Succeeded) { throw "Unexpected error occurs during Cache Storgae Account selection process. Please re-run this command or contact support if help needed." } $params = @{ contributorRoleDefId = [System.Guid]::parse($RoleDefinitionIds.ContributorId); storageBlobDataContributorRoleDefId = [System.Guid]::parse($RoleDefinitionIds.StorageBlobDataContributorId); sourceAppAadId = $sourceDra.ResourceAccessIdentityObjectId; targetAppAadId = $targetDra.ResourceAccessIdentityObjectId; } # Grant vault Identity Aad access to Cache Storage Account if (![string]::IsNullOrEmpty($replicationVault.IdentityPrincipalId)) { $params.vaultIdentityAadId = $replicationVault.IdentityPrincipalId # Grant vault Identity Aad access to Cache Storage Account as "Contributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.vaultIdentityAadId ` -RoleDefinitionId $params.contributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $hasAadAppAccess) { New-AzRoleAssignment ` -ObjectId $params.vaultIdentityAadId ` -RoleDefinitionId $params.contributorRoleDefId ` -Scope $cacheStorageAccount.Id | Out-Null } # Grant vault Identity Aad access to Cache Storage Account as "StorageBlobDataContributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.vaultIdentityAadId ` -RoleDefinitionId $params.storageBlobDataContributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $hasAadAppAccess) { New-AzRoleAssignment ` -ObjectId $params.vaultIdentityAadId ` -RoleDefinitionId $params.storageBlobDataContributorRoleDefId ` -Scope $cacheStorageAccount.Id | Out-Null } } # Grant Source Dra AAD App access to Cache Storage Account as "Contributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.sourceAppAadId ` -RoleDefinitionId $params.contributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $hasAadAppAccess) { New-AzRoleAssignment ` -ObjectId $params.sourceAppAadId ` -RoleDefinitionId $params.contributorRoleDefId ` -Scope $cacheStorageAccount.Id | Out-Null } # Grant Source Dra AAD App access to Cache Storage Account as "StorageBlobDataContributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.sourceAppAadId ` -RoleDefinitionId $params.storageBlobDataContributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $hasAadAppAccess) { New-AzRoleAssignment ` -ObjectId $params.sourceAppAadId ` -RoleDefinitionId $params.storageBlobDataContributorRoleDefId ` -Scope $cacheStorageAccount.Id | Out-Null } # Grant Target Dra AAD App access to Cache Storage Account as "Contributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.targetAppAadId ` -RoleDefinitionId $params.contributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $hasAadAppAccess) { New-AzRoleAssignment ` -ObjectId $params.targetAppAadId ` -RoleDefinitionId $params.contributorRoleDefId ` -Scope $cacheStorageAccount.Id | Out-Null } # Grant Target Dra AAD App access to Cache Storage Account as "StorageBlobDataContributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.targetAppAadId ` -RoleDefinitionId $params.storageBlobDataContributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $hasAadAppAccess) { New-AzRoleAssignment ` -ObjectId $params.targetAppAadId ` -RoleDefinitionId $params.storageBlobDataContributorRoleDefId ` -Scope $cacheStorageAccount.Id | Out-Null } # Give time for role assignments to be created. Times out after 2min $rsaPermissionGranted = $false for ($i = 0; $i -lt 3; $i++) { # Check Source Dra AAD App access to Cache Storage Account as "Contributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.sourceAppAadId ` -RoleDefinitionId $params.contributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue $rsaPermissionGranted = $null -ne $hasAadAppAccess # Check Source Dra AAD App access to Cache Storage Account as "StorageBlobDataContributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.sourceAppAadId ` -RoleDefinitionId $params.storageBlobDataContributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue $rsaPermissionGranted = $rsaPermissionGranted -and ($null -ne $hasAadAppAccess) # Check Target Dra AAD App access to Cache Storage Account as "Contributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.targetAppAadId ` -RoleDefinitionId $params.contributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue $rsaPermissionGranted = $rsaPermissionGranted -and ($null -ne $hasAadAppAccess) # Check Target Dra AAD App access to Cache Storage Account as "StorageBlobDataContributor" $hasAadAppAccess = Get-AzRoleAssignment ` -ObjectId $params.targetAppAadId ` -RoleDefinitionId $params.storageBlobDataContributorRoleDefId ` -Scope $cacheStorageAccount.Id ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue $rsaPermissionGranted = $rsaPermissionGranted -and ($null -ne $hasAadAppAccess) if ($rsaPermissionGranted) { break } Start-Sleep -Seconds 30 } if (!$rsaPermissionGranted) { throw "Failed to grant Cache Storage Account permissions. Please re-run this command or contact support if help needed." } $amhSolution = Az.Migrate\Get-AzMigrateSolution ` -ResourceGroupName $ResourceGroupName ` -MigrateProjectName $ProjectName ` -Name "Servers-Migration-ServerMigration_DataReplication" ` -SubscriptionId $SubscriptionId if ($amhSolution.DetailExtendedDetail.ContainsKey("replicationStorageAccountId")) { $amhStoredStorageAccountId = $amhSolution.DetailExtendedDetail["replicationStorageAccountId"] if ([string]::IsNullOrEmpty($amhStoredStorageAccountId)) { # Remove "replicationStorageAccountId" key $amhSolution.DetailExtendedDetail.Remove("replicationStorageAccountId") | Out-Null } elseif ($amhStoredStorageAccountId -ne $cacheStorageAccount.Id) { # Record of rsa mismatch throw "Unexpected error occurred in linking Cache Storage Account with Id '$($cacheStorageAccount.Id)'. Please re-run this command or contact support if help needed." } } # Update AMH record with chosen Cache Storage Account if (!$amhSolution.DetailExtendedDetail.ContainsKey("replicationStorageAccountId")) { $amhSolution.DetailExtendedDetail.Add("replicationStorageAccountId", $cacheStorageAccount.Id) Az.Migrate.Internal\Set-AzMigrateSolution ` -MigrateProjectName $ProjectName ` -Name $amhSolution.Name ` -ResourceGroupName $ResourceGroupName ` -DetailExtendedDetail $amhSolution.DetailExtendedDetail.AdditionalProperties | Out-Null } Write-Host "*Selected Cache Storage Account: '$($cacheStorageAccount.StorageAccountName)' in Resource Group '$($ResourceGroupName)' at Location '$($cacheStorageAccount.Location)' for Migrate Project '$($migrateProject.Name)'" # Put replication extension $replicationExtensionName = ($sourceFabric.Id -split '/')[-1] + "-" + ($targetFabric.Id -split '/')[-1] + "-MigReplicationExtn" $replicationExtension = Az.Migrate.Internal\Get-AzMigrateReplicationExtension ` -ResourceGroupName $ResourceGroupName ` -Name $replicationExtensionName ` -VaultName $replicationVaultName ` -SubscriptionId $SubscriptionId ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Remove replication extension if does not match the selected Cache Storage Account if ($null -ne $replicationExtension -and $replicationExtension.Property.CustomProperty.StorageAccountId -ne $cacheStorageAccount.Id) { Write-Host "Replication Extension '$($replicationExtensionName)' found but linked to a different Cache Storage Account '$($replicationExtension.Property.CustomProperty.StorageAccountId)'." try { Az.Migrate.Internal\Remove-AzMigrateReplicationExtension -InputObject $replicationExtension | Out-Null } catch { if ($_.Exception.Message -notmatch "Status: OK") { throw $_.Exception.Message } } Write-Host "Removing Replication Extension and waiting for 2 minutes..." Start-Sleep -Seconds 120 $replicationExtension = Az.Migrate.Internal\Get-AzMigrateReplicationExtension ` -InputObject $replicationExtension ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $replicationExtension) { Write-Host "Replication Extension '$($replicationExtensionName)' was removed." } } # Replication extension exists if ($null -ne $replicationExtension) { # Give time for create/update to reach a terminal state. Timeout after 10min if ($replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Creating -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Updating) { Write-Host "Replication Extension '$($replicationExtensionName)' found in Provisioning State '$($replicationExtension.Property.ProvisioningState)'." for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $replicationExtension = Az.Migrate.Internal\Get-AzMigrateReplicationExtension ` -InputObject $replicationExtension ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if (-not ( $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Creating -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Updating)) { break } } # Make sure replication extension is no longer in Creating or Updating state if ($replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Creating -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Updating) { throw "Replication Extension '$($replicationExtensionName)' times out with Provisioning State: '$($replicationExtension.Property.ProvisioningState)'. Please re-run this command or contact support if help needed." } } # Check and remove if replication extension is in a bad terminal state if ($replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Canceled -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Failed) { Write-Host "Replication Extension '$($replicationExtensionName)' found but in an unusable terminal Provisioning State '$($replicationExtension.Property.ProvisioningState)'.`nRemoving Replication Extension..." # Remove replication extension try { Az.Migrate.Internal\Remove-AzMigrateReplicationExtension -InputObject $replicationExtension | Out-Null } catch { if ($_.Exception.Message -notmatch "Status: OK") { throw $_.Exception.Message } } Start-Sleep -Seconds 30 $replicationExtension = Az.Migrate.Internal\Get-AzMigrateReplicationExtension ` -InputObject $replicationExtension ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue # Make sure replication extension is no longer in Canceled or Failed state if ($null -ne $replicationExtension -and ($replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Canceled -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Failed)) { throw "Failed to change the Provisioning State of Replication Extension '$($replicationExtensionName)'by removing. Please re-run this command or contact support if help needed." } } # Give time to remove replication extension. Timeout after 10min if ($null -ne $replicationExtension -and $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Deleting) { Write-Host "Replication Extension '$($replicationExtensionName)' found in Provisioning State '$($replicationExtension.Property.ProvisioningState)'." for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $replicationExtension = Az.Migrate.Internal\Get-AzMigrateReplicationExtension ` -InputObject $replicationExtension ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $replicationExtension -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Deleted) { break } elseif ($replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Deleting) { continue } throw "Replication Extension '$($replicationExtensionName)' has an unexpected Provisioning State of '$($replicationExtension.Property.ProvisioningState)' during removal process. Please re-run this command or contact support if help needed." } # Make sure replication extension is no longer in Deleting state if ($null -ne $replicationExtension -and $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Deleting) { throw "Replication Extension '$($replicationExtensionName)' times out with Provisioning State: '$($replicationExtension.Property.ProvisioningState)'. Please re-run this command or contact support if help needed." } } # Indicate replication extension was removed if ($null -eq $replicationExtension -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Deleted) { Write-Host "Replication Extension '$($replicationExtensionName)' was removed." } } # Refresh local replication extension object if exists if ($null -ne $replicationExtension) { $replicationExtension = Az.Migrate.Internal\Get-AzMigrateReplicationExtension -InputObject $replicationExtension } # Create replication extension if not found or previously deleted if ($null -eq $replicationExtension -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Deleted) { Write-Host "Waiting 2 minutes for permissions to sync before creating Replication Extension..." Start-Sleep -Seconds 120 Write-Host "Creating Replication Extension..." $params = @{ InstanceType = $instanceType; SourceFabricArmId = $sourceFabric.Id; TargetFabricArmId = $targetFabric.Id; StorageAccountId = $cacheStorageAccount.Id; StorageAccountSasSecretName = $null; } # Setup Replication Extension deployment parameters $replicationExtensionProperties = [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Models.Api20240901.ReplicationExtensionModelProperties]::new() if ($instanceType -eq $AzLocalInstanceTypes.HyperVToAzLocal) { $replicationExtensionCustomProperties = [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Models.Api20240901.HyperVToAzStackHcireplicationExtensionModelCustomProperties]::new() $replicationExtensionCustomProperties.HyperVFabricArmId = $params.SourceFabricArmId } elseif ($instanceType -eq $AzLocalInstanceTypes.VMwareToAzLocal) { $replicationExtensionCustomProperties = [Microsoft.Azure.PowerShell.Cmdlets.Migrate.Models.Api20240901.VMwareToAzStackHcireplicationExtensionModelCustomProperties]::new() $replicationExtensionCustomProperties.VMwareFabricArmId = $params.SourceFabricArmId } else { throw "Currently, for AzLocal scenario, only HyperV and VMware as the source is supported." } $replicationExtensionCustomProperties.InstanceType = $params.InstanceType $replicationExtensionCustomProperties.AzStackHCIFabricArmId = $params.TargetFabricArmId $replicationExtensionCustomProperties.StorageAccountId = $params.StorageAccountId $replicationExtensionCustomProperties.StorageAccountSasSecretName = $params.StorageAccountSasSecretName $replicationExtensionProperties.CustomProperty = $replicationExtensionCustomProperties try { Az.Migrate.Internal\New-AzMigrateReplicationExtension ` -Name $replicationExtensionName ` -ResourceGroupName $ResourceGroupName ` -VaultName $replicationVaultName ` -Property $replicationExtensionProperties ` -SubscriptionId $SubscriptionId ` -NoWait | Out-Null } catch { if ($_.Exception.Message -notmatch "Status: OK") { throw $_.Exception.Message } } # Check replication extension creation status every 30s. Timeout after 10min for ($i = 0; $i -lt 20; $i++) { Start-Sleep -Seconds 30 $replicationExtension = Az.Migrate.Internal\Get-AzMigrateReplicationExtension ` -ResourceGroupName $ResourceGroupName ` -Name $replicationExtensionName ` -VaultName $replicationVaultName ` -SubscriptionId $SubscriptionId ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $replicationExtension) { continue } # Stop if replication extension reaches a terminal state if ($replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Succeeded -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Deleted -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Canceled -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Failed) { break } } # Make sure replicationExtension is in a terminal state if (-not ( $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Succeeded -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Deleted -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Canceled -or $replicationExtension.Property.ProvisioningState -eq [ProvisioningState]::Failed)) { throw "Replication Extension '$($replicationExtensionName)' times out with Provisioning State: '$($replicationExtension.Property.ProvisioningState)' during creation process. Please re-run this command or contact support if help needed." } } if ($replicationExtension.Property.ProvisioningState -ne [ProvisioningState]::Succeeded) { throw "Replication Extension '$($replicationExtensionName)' has an unexpected Provisioning State of '$($replicationExtension.Property.ProvisioningState)'. Please re-run this command or contact support if help needed." } $replicationExtension = Az.Migrate.Internal\Get-AzMigrateReplicationExtension ` -ResourceGroupName $ResourceGroupName ` -Name $replicationExtensionName ` -VaultName $replicationVaultName ` -SubscriptionId $SubscriptionId ` -ErrorVariable notPresent ` -ErrorAction SilentlyContinue if ($null -eq $replicationExtension) { throw "Unexpected error occurred during Replication Extension creation. Please re-run this command or contact support if help needed." } elseif ($replicationExtension.Property.ProvisioningState -ne [ProvisioningState]::Succeeded) { throw "Replication Extension '$($replicationExtensionName)' has an unexpected Provisioning State of '$($replicationExtension.Property.ProvisioningState)'. Please re-run this command or contact support if help needed." } else { Write-Host "*Selected Replication Extension: '$($replicationExtensionName)'" } if ($PassThru) { return $true } } } # SIG # Begin signature block # MIIoOQYJKoZIhvcNAQcCoIIoKjCCKCYCAQExDzANBglghkgBZQMEAgEFADB5Bgor # BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG # KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCBIQ74O/eYehIbs # xnEwfLblo7Z3oBj2I1CF8o4pVWZtEKCCDYUwggYDMIID66ADAgECAhMzAAAEA73V # lV0POxitAAAAAAQDMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD # VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p # bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTEzWhcNMjUwOTExMjAxMTEzWjB0MQsw # CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u # ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy # b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB # AQCfdGddwIOnbRYUyg03O3iz19XXZPmuhEmW/5uyEN+8mgxl+HJGeLGBR8YButGV # LVK38RxcVcPYyFGQXcKcxgih4w4y4zJi3GvawLYHlsNExQwz+v0jgY/aejBS2EJY # oUhLVE+UzRihV8ooxoftsmKLb2xb7BoFS6UAo3Zz4afnOdqI7FGoi7g4vx/0MIdi # kwTn5N56TdIv3mwfkZCFmrsKpN0zR8HD8WYsvH3xKkG7u/xdqmhPPqMmnI2jOFw/ # /n2aL8W7i1Pasja8PnRXH/QaVH0M1nanL+LI9TsMb/enWfXOW65Gne5cqMN9Uofv # ENtdwwEmJ3bZrcI9u4LZAkujAgMBAAGjggGCMIIBfjAfBgNVHSUEGDAWBgorBgEE # AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU6m4qAkpz4641iK2irF8eWsSBcBkw # VAYDVR0RBE0wS6RJMEcxLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9wZXJh # dGlvbnMgTGltaXRlZDEWMBQGA1UEBRMNMjMwMDEyKzUwMjkyNjAfBgNVHSMEGDAW # gBRIbmTlUAXTgqoXNzcitW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIw # MTEtMDctMDguY3JsMGEGCCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDov # L3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDEx # XzIwMTEtMDctMDguY3J0MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIB # AFFo/6E4LX51IqFuoKvUsi80QytGI5ASQ9zsPpBa0z78hutiJd6w154JkcIx/f7r # EBK4NhD4DIFNfRiVdI7EacEs7OAS6QHF7Nt+eFRNOTtgHb9PExRy4EI/jnMwzQJV # NokTxu2WgHr/fBsWs6G9AcIgvHjWNN3qRSrhsgEdqHc0bRDUf8UILAdEZOMBvKLC # rmf+kJPEvPldgK7hFO/L9kmcVe67BnKejDKO73Sa56AJOhM7CkeATrJFxO9GLXos # oKvrwBvynxAg18W+pagTAkJefzneuWSmniTurPCUE2JnvW7DalvONDOtG01sIVAB # +ahO2wcUPa2Zm9AiDVBWTMz9XUoKMcvngi2oqbsDLhbK+pYrRUgRpNt0y1sxZsXO # raGRF8lM2cWvtEkV5UL+TQM1ppv5unDHkW8JS+QnfPbB8dZVRyRmMQ4aY/tx5x5+ # sX6semJ//FbiclSMxSI+zINu1jYerdUwuCi+P6p7SmQmClhDM+6Q+btE2FtpsU0W # +r6RdYFf/P+nK6j2otl9Nvr3tWLu+WXmz8MGM+18ynJ+lYbSmFWcAj7SYziAfT0s # IwlQRFkyC71tsIZUhBHtxPliGUu362lIO0Lpe0DOrg8lspnEWOkHnCT5JEnWCbzu # iVt8RX1IV07uIveNZuOBWLVCzWJjEGa+HhaEtavjy6i7MIIHejCCBWKgAwIBAgIK # YQ6Q0gAAAAAAAzANBgkqhkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNV # BAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jv # c29mdCBDb3Jwb3JhdGlvbjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlm # aWNhdGUgQXV0aG9yaXR5IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEw # OTA5WjB+MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE # BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYD # VQQDEx9NaWNyb3NvZnQgQ29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG # 9w0BAQEFAAOCAg8AMIICCgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+la # UKq4BjgaBEm6f8MMHt03a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc # 6Whe0t+bU7IKLMOv2akrrnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4D # dato88tt8zpcoRb0RrrgOGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+ # lD3v++MrWhAfTVYoonpy4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nk # kDstrjNYxbc+/jLTswM9sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6 # A4aN91/w0FK/jJSHvMAhdCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmd # X4jiJV3TIUs+UsS1Vz8kA/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL # 5zmhD+kjSbwYuER8ReTBw3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zd # sGbiwZeBe+3W7UvnSSmnEyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3 # T8HhhUSJxAlMxdSlQy90lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS # 4NaIjAsCAwEAAaOCAe0wggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRI # bmTlUAXTgqoXNzcitW2oynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTAL # BgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBD # uRQFTuHqp8cx0SOJNDBaBgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jv # c29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3JsMF4GCCsGAQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3 # dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFf # MDNfMjIuY3J0MIGfBgNVHSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEF # BQcCARYzaHR0cDovL3d3dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1h # cnljcHMuaHRtMEAGCCsGAQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkA # YwB5AF8AcwB0AGEAdABlAG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn # 8oalmOBUeRou09h0ZyKbC5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7 # v0epo/Np22O/IjWll11lhJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0b # pdS1HXeUOeLpZMlEPXh6I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/ # KmtYSWMfCWluWpiW5IP0wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvy # CInWH8MyGOLwxS3OW560STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBp # mLJZiWhub6e3dMNABQamASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJi # hsMdYzaXht/a8/jyFqGaJ+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYb # BL7fQccOKO7eZS/sl/ahXJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbS # oqKfenoi+kiVH6v7RyOA9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sL # gOppO6/8MO0ETI7f33VtY5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtX # cVZOSEXAQsmbdlsKgEhr/Xmfwb1tbWrJUnMTDXpQzTGCGgowghoGAgEBMIGVMH4x # CzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRt # b25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01p # Y3Jvc29mdCBDb2RlIFNpZ25pbmcgUENBIDIwMTECEzMAAAQDvdWVXQ87GK0AAAAA # BAMwDQYJYIZIAWUDBAIBBQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQw # HAYKKwYBBAGCNwIBCzEOMAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIMiz # 8Vz9znJ+vFxCGZ7LXcY0r1eOYvVGn5BK/0hdddfMMEIGCisGAQQBgjcCAQwxNDAy # oBSAEgBNAGkAYwByAG8AcwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5j # b20wDQYJKoZIhvcNAQEBBQAEggEAl1t9mM33WH7jKg05CkyI6Ds55igKGWAuJXX3 # M7CGc7ibLHAqIS+KK6qJzG0eBxWTo+96wvyc6sDzGzEsCk7r5/F9QyK2Q1tep41n # Y7XRV8d3Fmwfyz3ecAn2JMGPf2FgaC26MOzg2YTbkfQlfJd7bHqyR/9Xr0nSjbIN # ULkzuW4jAXUQJ2uSgc3Skkm6cxu581+r+/pZD1PNdeDtWTES7jb7jpHrOYUfZ2xG # qIZ5efNqwE6EBgjXXrN0DCk9Z5gi9h58CeY/zZchfE2cwvnhCq2wsMKKDIGrfDO5 # DjYwZX6Y7Ebs+m5I9BEiMIFCyvgx0kcwaluCesKw6kcxmsUZyKGCF5QwgheQBgor # BgEEAYI3AwMBMYIXgDCCF3wGCSqGSIb3DQEHAqCCF20wghdpAgEDMQ8wDQYJYIZI # AWUDBAIBBQAwggFSBgsqhkiG9w0BCRABBKCCAUEEggE9MIIBOQIBAQYKKwYBBAGE # WQoDATAxMA0GCWCGSAFlAwQCAQUABCDXTKkIbxJu6god8g77YEsrpXWjB83UB/OA # 71zmOkfckgIGaCZgknU+GBMyMDI1MDUyODA3MzI1NC41MDJaMASAAgH0oIHRpIHO # MIHLMQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMH # UmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQL # ExxNaWNyb3NvZnQgQW1lcmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxk # IFRTUyBFU046RjAwMi0wNUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1l # LVN0YW1wIFNlcnZpY2WgghHqMIIHIDCCBQigAwIBAgITMwAAAgU8dWyCRIfN/gAB # AAACBTANBgkqhkiG9w0BAQsFADB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2Fz # aGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENv # cnBvcmF0aW9uMSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAx # MDAeFw0yNTAxMzAxOTQyNDlaFw0yNjA0MjIxOTQyNDlaMIHLMQswCQYDVQQGEwJV # UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE # ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSUwIwYDVQQLExxNaWNyb3NvZnQgQW1l # cmljYSBPcGVyYXRpb25zMScwJQYDVQQLEx5uU2hpZWxkIFRTUyBFU046RjAwMi0w # NUUwLUQ5NDcxJTAjBgNVBAMTHE1pY3Jvc29mdCBUaW1lLVN0YW1wIFNlcnZpY2Uw # ggIiMA0GCSqGSIb3DQEBAQUAA4ICDwAwggIKAoICAQCSkvLfd7gF1r2wGdy85CFY # XHUC8ywEyD4LRLv0WYEXeeZ0u5YuK7p2cXVzQmZPOHTN8TWqG2SPlUb+7PldzFDD # AlR3vU8piOjmhu9rHW43M2dbor9jl9gluhzwUd2SciVGa7f9t67tM3KFKRSMXFtH # KF3KwBB7aVo+b1qy5p9DWlo2N5FGrBqHMEVlNyzreHYoDLL+m8fSsqMu/iYUqxzK # 5F4S7IY5NemAB8B+A3QgwVIi64KJIfeKZUeiWKCTf4odUgP3AQilxh48P6z7AT4I # A0dMEtKhYLFs4W/KNDMsYr7KpQPKVCcC5E8uDHdKewubyzenkTxy4ff1N3g8yho5 # Pi9BfjR0VytrkmpDfep8JPwcb4BNOIXOo1pfdHZ8EvnR7JFZFQiqpMZFlO5CAuTY # H8ujc5PUHlaMAJ8NEa9TFJTOSBrB7PRgeh/6NJ2xu9yxPh/kVN9BGss93MC6Ujpo # xeM4x70bwbwiK8SNHIO8D8cql7VSevUYbjN4NogFFwhBClhodE/zeGPq6y6ixD4z # 65IHY3zwFQbBVX/w+L/VHNn/BMGs2PGHnlRjO/Kk8NIpN4shkFQqA1fM08frrDSN # EY9VKDtpsUpAF51Y1oQ6tJhWM1d3neCXh6b/6N+XeHORCwnY83K+pFMMhg8isXQb # 6KRl65kg8XYBd4JwkbKoVQIDAQABo4IBSTCCAUUwHQYDVR0OBBYEFHR6Wrs27b6+ # yJ3bEZ9o5NdL1bLwMB8GA1UdIwQYMBaAFJ+nFV0AXmJdg/Tl0mWnG1M1GelyMF8G # A1UdHwRYMFYwVKBSoFCGTmh0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMv # Y3JsL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0ElMjAyMDEwKDEpLmNybDBs # BggrBgEFBQcBAQRgMF4wXAYIKwYBBQUHMAKGUGh0dHA6Ly93d3cubWljcm9zb2Z0 # LmNvbS9wa2lvcHMvY2VydHMvTWljcm9zb2Z0JTIwVGltZS1TdGFtcCUyMFBDQSUy # MDIwMTAoMSkuY3J0MAwGA1UdEwEB/wQCMAAwFgYDVR0lAQH/BAwwCgYIKwYBBQUH # AwgwDgYDVR0PAQH/BAQDAgeAMA0GCSqGSIb3DQEBCwUAA4ICAQAOuxk47b1i75V8 # 1Tx6xo10xNIr4zZxYVfkF5TFq2kndPHgzVyLnssw/HKkEZRCgZVpkKEJ6Y4jvG5t # ugMi+Wjt7hUMSipk+RpB5gFQvh1xmAEL2flegzTWEsnj0wrESplI5Z3vgf2eGXAr # /RcqGjSpouHbD2HY9Y3F0Ol6FRDCV/HEGKRHzn2M5rQpFGSjacT4DkqVYmem/ArO # fSvVojnKEIW914UxGtuhJSr9jOo5RqTX7GIqbtvN7zhWld+i3XxdhdNcflQz9Yho # FqQexBenoIRgAPAtwH68xczr9LMC3l9ALEpnsvO0RiKPXF4l22/OfcFffaphnl/T # DwkiJfxOyAMfUF3xI9+3izT1WX2CFs2RaOAq3dcohyJw+xRG0E8wkCHqkV57BbUB # EzLX8L9lGJ1DoxYNpoDX7iQzJ9Qdkypi5fv773E3Ch8A+toxeFp6FifQZyCc8IcI # BlHyak6MbT6YTVQNgQ/h8FF+S5OqP7CECFvIH2Kt2P0GlOu9C0BfashnTjodmtZF # ZsptUvirk/2HOLLjBiMjDwJsQAFAzJuz4ZtTyorrvER10Gl/mbmViHqhvNACfTzP # iLfjDgyvp9s7/bHu/CalKmeiJULGjh/lwAj5319pggsGJqbhJ4FbFc+oU5zffbm/ # rKjVZ8kxND3im10Qp41n2t/qpyP6ETCCB3EwggVZoAMCAQICEzMAAAAVxedrngKb # SZkAAAAAABUwDQYJKoZIhvcNAQELBQAwgYgxCzAJBgNVBAYTAlVTMRMwEQYDVQQI # EwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3Nv # ZnQgQ29ycG9yYXRpb24xMjAwBgNVBAMTKU1pY3Jvc29mdCBSb290IENlcnRpZmlj # YXRlIEF1dGhvcml0eSAyMDEwMB4XDTIxMDkzMDE4MjIyNVoXDTMwMDkzMDE4MzIy # NVowfDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcT # B1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UE # AxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENBIDIwMTAwggIiMA0GCSqGSIb3DQEB # AQUAA4ICDwAwggIKAoICAQDk4aZM57RyIQt5osvXJHm9DtWC0/3unAcH0qlsTnXI # yjVX9gF/bErg4r25PhdgM/9cT8dm95VTcVrifkpa/rg2Z4VGIwy1jRPPdzLAEBjo # YH1qUoNEt6aORmsHFPPFdvWGUNzBRMhxXFExN6AKOG6N7dcP2CZTfDlhAnrEqv1y # aa8dq6z2Nr41JmTamDu6GnszrYBbfowQHJ1S/rboYiXcag/PXfT+jlPP1uyFVk3v # 3byNpOORj7I5LFGc6XBpDco2LXCOMcg1KL3jtIckw+DJj361VI/c+gVVmG1oO5pG # ve2krnopN6zL64NF50ZuyjLVwIYwXE8s4mKyzbnijYjklqwBSru+cakXW2dg3viS # kR4dPf0gz3N9QZpGdc3EXzTdEonW/aUgfX782Z5F37ZyL9t9X4C626p+Nuw2TPYr # bqgSUei/BQOj0XOmTTd0lBw0gg/wEPK3Rxjtp+iZfD9M269ewvPV2HM9Q07BMzlM # jgK8QmguEOqEUUbi0b1qGFphAXPKZ6Je1yh2AuIzGHLXpyDwwvoSCtdjbwzJNmSL # W6CmgyFdXzB0kZSU2LlQ+QuJYfM2BjUYhEfb3BvR/bLUHMVr9lxSUV0S2yW6r1AF # emzFER1y7435UsSFF5PAPBXbGjfHCBUYP3irRbb1Hode2o+eFnJpxq57t7c+auIu # rQIDAQABo4IB3TCCAdkwEgYJKwYBBAGCNxUBBAUCAwEAATAjBgkrBgEEAYI3FQIE # FgQUKqdS/mTEmr6CkTxGNSnPEP8vBO4wHQYDVR0OBBYEFJ+nFV0AXmJdg/Tl0mWn # G1M1GelyMFwGA1UdIARVMFMwUQYMKwYBBAGCN0yDfQEBMEEwPwYIKwYBBQUHAgEW # M2h0dHA6Ly93d3cubWljcm9zb2Z0LmNvbS9wa2lvcHMvRG9jcy9SZXBvc2l0b3J5 # Lmh0bTATBgNVHSUEDDAKBggrBgEFBQcDCDAZBgkrBgEEAYI3FAIEDB4KAFMAdQBi # AEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBTV # 9lbLj+iiXGJo0T2UkFvXzpoYxDBWBgNVHR8ETzBNMEugSaBHhkVodHRwOi8vY3Js # Lm1pY3Jvc29mdC5jb20vcGtpL2NybC9wcm9kdWN0cy9NaWNSb29DZXJBdXRfMjAx # MC0wNi0yMy5jcmwwWgYIKwYBBQUHAQEETjBMMEoGCCsGAQUFBzAChj5odHRwOi8v # d3d3Lm1pY3Jvc29mdC5jb20vcGtpL2NlcnRzL01pY1Jvb0NlckF1dF8yMDEwLTA2 # LTIzLmNydDANBgkqhkiG9w0BAQsFAAOCAgEAnVV9/Cqt4SwfZwExJFvhnnJL/Klv # 6lwUtj5OR2R4sQaTlz0xM7U518JxNj/aZGx80HU5bbsPMeTCj/ts0aGUGCLu6WZn # OlNN3Zi6th542DYunKmCVgADsAW+iehp4LoJ7nvfam++Kctu2D9IdQHZGN5tggz1 # bSNU5HhTdSRXud2f8449xvNo32X2pFaq95W2KFUn0CS9QKC/GbYSEhFdPSfgQJY4 # rPf5KYnDvBewVIVCs/wMnosZiefwC2qBwoEZQhlSdYo2wh3DYXMuLGt7bj8sCXgU # 6ZGyqVvfSaN0DLzskYDSPeZKPmY7T7uG+jIa2Zb0j/aRAfbOxnT99kxybxCrdTDF # NLB62FD+CljdQDzHVG2dY3RILLFORy3BFARxv2T5JL5zbcqOCb2zAVdJVGTZc9d/ # HltEAY5aGZFrDZ+kKNxnGSgkujhLmm77IVRrakURR6nxt67I6IleT53S0Ex2tVdU # CbFpAUR+fKFhbHP+CrvsQWY9af3LwUFJfn6Tvsv4O+S3Fb+0zj6lMVGEvL8CwYKi # excdFYmNcP7ntdAoGokLjzbaukz5m/8K6TT4JDVnK+ANuOaMmdbhIurwJ0I9JZTm # dHRbatGePu1+oDEzfbzL6Xu/OHBE0ZDxyKs6ijoIYn/ZcGNTTY3ugm2lBRDBcQZq # ELQdVTNYs6FwZvKhggNNMIICNQIBATCB+aGB0aSBzjCByzELMAkGA1UEBhMCVVMx # EzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoT # FU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjElMCMGA1UECxMcTWljcm9zb2Z0IEFtZXJp # Y2EgT3BlcmF0aW9uczEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOkYwMDItMDVF # MC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNloiMK # AQEwBwYFKw4DAhoDFQDVsH9p1tJn+krwCMvqOhVvXrbetKCBgzCBgKR+MHwxCzAJ # BgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25k # MR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMTHU1pY3Jv # c29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMA0GCSqGSIb3DQEBCwUAAgUA6+CwHzAi # GA8yMDI1MDUyNzIxNDE1MVoYDzIwMjUwNTI4MjE0MTUxWjB0MDoGCisGAQQBhFkK # BAExLDAqMAoCBQDr4LAfAgEAMAcCAQACAgdpMAcCAQACAhNXMAoCBQDr4gGfAgEA # MDYGCisGAQQBhFkKBAIxKDAmMAwGCisGAQQBhFkKAwKgCjAIAgEAAgMHoSChCjAI # AgEAAgMBhqAwDQYJKoZIhvcNAQELBQADggEBAE/2h/RZUJtbcZLWznSv9FK2mg8w # lN6Fm7YQVT9TZglmibsXI2GdCUk6+a0UVDsi4uDlxkCvDvODzG2ftb6cbDVvyYr8 # TOTyB5WfFPXHxU7YRd856m8SL6HKX+pdlIEJ4cc0+eXLpjnhs6HsQAqlXIM5t0b9 # ssaDAnHB5D8ii6u2pXaBrHx+s9gTgPyBEyBKmMCGVk8Y9samjAv38JeV5Oz1lPd6 # xzRRBkfGMBdAkRCYaJJPx15o8/q7CFXpQ1SpJmn7cS1D6Afv9+hDWMO95xU+j8mf # +Ik/vMye8F/YlF+Fz5FSLAD/zLt2+JIWqMYKkW0gAB99Bv/27iuGc694RscxggQN # MIIECQIBATCBkzB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQ # MA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9u # MSYwJAYDVQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMAITMwAAAgU8 # dWyCRIfN/gABAAACBTANBglghkgBZQMEAgEFAKCCAUowGgYJKoZIhvcNAQkDMQ0G # CyqGSIb3DQEJEAEEMC8GCSqGSIb3DQEJBDEiBCCImjvYl2qLEoRFPnCRE9qOeh/z # +XAJBZRPvJd4Mq+k8jCB+gYLKoZIhvcNAQkQAi8xgeowgecwgeQwgb0EIIANAz3c # eY0umhdWLR2sJpq0OPqtJDTAYRmjHVkwEW9IMIGYMIGApH4wfDELMAkGA1UEBhMC # VVMxEzARBgNVBAgTCldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNV # BAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRp # bWUtU3RhbXAgUENBIDIwMTACEzMAAAIFPHVsgkSHzf4AAQAAAgUwIgQg0LpBo1WN # sQEi7gGT4KUNHqwxPNpHDu6zzZb2kkN4tvQwDQYJKoZIhvcNAQELBQAEggIAaBbp # lnwgFVI2XOPJLlAP3josQU7LxjeIx0MaREQKNCYkI+088BbIqdOa0BlBrpMoJH2v # hATyIw0FaxgjtT19LU9w+4AmzlayGJzltjIKJaCaMNDVusncKZDsOZ1awcHixUoq # s6vbHCdgTXROyo5WmBn6q00RDq2S9SNnxtr9gj0RpzqttfYhcDm74D0ufNmmqyVY # sFcHSFiw13tpgdBhgac6r7wuk4WuhGT+g9peIpSRxfHdhhilawuVLuh/+uMNnACy # lEi0ReoKh7wHWJDY6dIb5+X97gfTRkHyGvZJFXoTYyk60QR6ISN2WoJaiRNF1YuK # Q6UJCZP0Cgw8kSvXG7CenDx2zyDvyJFLKgZI8lVeIwjpEthn91Xg9tGQFX8QD9+3 # 9BRdq/xc/Xsky4xXEs7jBi12Mxlzgb12CLWM1QrGb1ydfdoVV8xTnCkeiEUpTGSk # ORkaVsrW/XFy5sjcIH6SLXsOY4SxlACWFQcPGXHioB1fnXY3anVtVReZB0zJo1V2 # lLCG3N9NvuIPsdk1XcOql6fZGGOiOJIAPheSrjwtCe/AQTtkl8INMirYboJvy4rb # OKaCr/IZDQXcfYcGxjRvXQj6//oUxQVsm2w50ikHjxVAvYiDnviLRM6poKXHs3H2 # rB/QdDEOxZWlUCn/WbLdY0XbhJkb2tvDRk00wP4= # SIG # End signature block |