AzStackHciArcIntegration/AzStackHci.ArcIntegration.Helpers.psm1

Import-LocalizedData -BindingVariable lanTxt -FileName AzStackHci.ArcIntegration.Strings.psd1

function Test-ExistingArcResources {
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId,
        [string]
        $ArcResourceGroupName,
        [string[]]
        $NodeNames
    )
    try
    {
        $severity = 'CRITICAL'
        #TODO:check if the cmdlet is there, if it is not there, it means it is a different machine, we will fail the test
        $hciRegCmdlet =  Get-Command Get-AzureStackHCI -Type Cmdlet -ErrorAction Ignore
        if($null -eq $hciRegCmdlet)
        {
            # If Get-AzureStackHCI, is not found, fail validation, indicating, validation can only run on HCI OS
            $detail = $lanTxt.ArcValidationNotSupported
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        elseif ($(Get-AzureStackHCI).RegistrationStatus -ne "NotYet")
        {
            # Validation can only be done on un-registred cluster, when run on any other registration state, we will skip the validation
            $detail = $lanTxt.ClusterAlreadyRegistered
            $status = 'SUCCESS'
            Log-Info $detail
        }
        elseif (!$(Get-AzContext))
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        else
        {
            $HCApiVersion = "2022-03-10"
            $sameNodeNames = [System.Collections.ArrayList]::new()
            $msg = "Verifying subscription ID : {0}, Resource Group: {1}, Node Names {2}" -f $SubscriptionId, $ArcResourceGroupName, ($NodeNames -join ',')
            Log-Info  $msg
            forEach ($clusNode in $NodeNames)
            {
                $machineResourceId = "/Subscriptions/" + $SubscriptionId + "/resourceGroups/" + $ArcResourceGroupName + "/providers/Microsoft.HybridCompute/machines/" + $clusNode
                $arcMachineResource = Get-AzResource -ResourceId $machineResourceId -ApiVersion $HCApiVersion -ErrorAction Ignore
                if ($Null -ne $arcMachineResource)
                {
                    $sameNodeNames.Add($clusNode) | Out-Null
                }
            }
            if ($sameNodeNames.Count -gt 0)
            {
                $sameNodeNamesAsList = $sameNodeNames -join ","
                $detail = $lanTxt.ArcMachineAlreadyExistsInResourceGroupError -f $sameNodeNamesAsList, $ArcResourceGroupName
                $status = 'FAILURE'
                Log-Info $detail -Type $severity
            }
            else
            {
                $detail = $lanTxt.ArcMachineNotFound -f $ArcResourceGroupName
                $status = 'SUCCESS'
                Log-Info $detail
            }
        }
        $params = @{
            Name               = 'AzStackHci_ArcIntegration_ResourceGroup_Check'
            Title              = 'Test ARC ResourceGroup'
            DisplayName        = "Test ARC ResourceGroup $ArcResourceGroupName"
            Severity           = $severity
            Description        = 'Checking ARC ResourceGroup clean'
            Tags               = @{}
            Remediation        = 'https://aka.ms/hci-envch'
            TargetResourceID   = "$SubscriptionId/$ArcResourceGroupName/$($NodeNames -join ',')"
            TargetResourceName = $ArcResourceGroupName
            TargetResourceType = 'ResourceGroup'
            Timestamp          = [datetime]::UtcNow
            Status             = $Status
            AdditionalData     = @{
                Source    = $ENV:COMPUTERNAME
                Resource  = 'ARC ResourceGroup'
                Detail    = $detail
                Status    = $status
                TimeStamp = [datetime]::UtcNow
            }
            HealthCheckSource  = $ENV:EnvChkrId
        }
        New-AzStackHciResultObject @params
    }
    catch
    {
        throw ("Error validating ARC Resource Group : {0}" -f $_.Exception)
    }
}

function Test-ArcAgentNotConnectedToDifferentResource
{
    param
    (
        [string]
        $SubscriptionId,
        [string]
        $ArcResourceGroupName,
        [string[]]
        $NodeNames,
        [System.Management.Automation.Runspaces.PSSession[]]
        $PSSession
    )
    try
    {
        $severity = 'CRITICAL'
        #TODO:check if the cmdlet is there, if it is not there, it means it is a different machine, we will fail the test
        $hciRegCmdlet =  Get-Command Get-AzureStackHCI -Type Cmdlet -ErrorAction Ignore
        if($null -eq $hciRegCmdlet)
        {
            # If Get-AzureStackHCI, is not found, fail validation, indicating, validation can only run on HCI OS
            $detail = $lanTxt.ArcValidationNotSupported
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        elseif ($(Get-AzureStackHCI).RegistrationStatus -ne "NotYet")
        {
            # Validation can only be done on un-registred cluster, when run on any other registration state, we will skip the validation
            $detail = $lanTxt.ClusterAlreadyRegistered
            $status = 'SUCCESS'
            Log-Info $detail
        }
        elseif ($null -eq $PSSession)
        {
            $detail = $lanTxt.SessionNotProvided
            $status = 'SUCCESS'
            Log-Info $detail
        }
        else
        {
            $NodesAlreadyArcEnabledDifferentResource = [System.Collections.ArrayList]::new()
            foreach ($nodeSession in $PSSession)
            {
                try
                {
                    Microsoft.PowerShell.Core\Invoke-Command -Session $nodeSession -ErrorAction Stop -ArgumentList $lanTxt.ArcAgentExePath -ScriptBlock {
                        if(Test-Path -Path $args[0])
                        {
                            $arcAgentStatus = Invoke-Expression -Command "& 'C:\Program Files\AzureConnectedMachineAgent\azcmagent.exe' show -j"

                            # Parsing the status received from Arc agent
                            $arcAgentStatusParsed = $arcAgentStatus | ConvertFrom-Json

                            # Throw an error if the node is Arc enabled to a different resource group or subscription id
                            # Agent can be is "Connected" or disconnected state. If the resource name property on the agent is empty, that means, it is cleanly disconnected , and just the exe exists
                            # If the resourceName exists and agent is in "Disconnected" state, indicates agent has temporary connectivity issues to the cloud
                            if(-not ([string]::IsNullOrEmpty($arcAgentStatusParsed.resourceName)) -And (($arcAgentStatusParsed.subscriptionId -ne $Using:SubscriptionId) -or ($arcAgentStatusParsed.resourceGroup -ne $Using:ArcResourceGroupName)))
                            {
                                $differentResourceExceptionMessage = ("{0}: Subscription Id: {1}, Resource Group: {2} are the current parameters to which the arc agent is connected. Expected Subscription : {3} and Expected Resource Group : {4}" -f $Using:nodeSession.ComputerName, $arcAgentStatusParsed.subscriptionId, $arcAgentStatusParsed.resourceGroup, $SubscriptionId, $ArcResourceGroupName)
                                throw $differentResourceExceptionMessage
                            }
                        }
                    }
                }
                catch
                {
                    if(($null -ne $_.Exception.Message) -and $_.Exception.Message.Contains($nodeSession.ComputerName) -and $_.Exception.Message.Contains("Subscription Id") -and $_.Exception.Message.Contains("Resource Group"))
                    {
                        $NodesAlreadyArcEnabledDifferentResource.Add($_.Exception.Message) | Out-Null
                    }
                    else
                    {
                        throw ("Error verifying Arc registration state for node: {0} with exception: {1}" -f $nodeSession.ComputerName, $_.Exception.Message)
                    }
                }
            }

            if($NodesAlreadyArcEnabledDifferentResource.Length -gt 0)
            {
                $NodesAlreadyArcEnabledDifferentResource = $NodesAlreadyArcEnabledDifferentResource -join "`n"
                $detail = $lanTxt.ArcAlreadyEnabledInADifferentResourceError -f $NodesAlreadyArcEnabledDifferentResource
                $status = 'FAILURE'
                Log-Info $detail -Type $severity
            }
            else
            {
                $detail = $lanTxt.ArcNotEnabledInADifferentResource
                $status = 'SUCCESS'
                Log-Info $detail
            }
        }
        $params = @{
            Name               = 'AzStackHci_ArcIntegration_ArcMachinesState_Check'
            Title              = 'Test Arc for servers machines state'
            DisplayName        = "Test Arc for servers machines state $($NodeNames -join ',')"
            Severity           = $severity
            Description        = 'Check if Arc for servers machines are already connected to a different subscription id or resource group'
            Tags               = @{}
            Remediation        = 'https://aka.ms/hci-envch'
            TargetResourceID   = "$SubscriptionId/$ArcResourceGroupName/$($NodeNames -join ',')"
            TargetResourceName = $($NodeNames -join ',')
            TargetResourceType = 'Arc for Servers'
            Timestamp          = [datetime]::UtcNow
            Status             = $Status
            AdditionalData     = @{
                Source    = $ENV:COMPUTERNAME
                Resource  = 'Arc for Servers'
                Detail    = $detail
                Status    = $status
                TimeStamp = [datetime]::UtcNow
            }
            HealthCheckSource  = $ENV:EnvChkrId
        }
        New-AzStackHciResultObject @params
    }
    catch
    {
        throw ("Exception while checking Nodes Arc connection state: {0}" -f $_.Exception.Message)
    }
}

function Test-IsRegionValid
{
    [CmdletBinding()]
    param (
        [string]
        $Region
    )
    try
    {
        $severity = 'CRITICAL'
        if(!$(Get-AzContext))
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        elseif ([string]::IsNullOrEmpty($Region))
        {
            $detail = $lanTxt.RegionRequired
            $status = 'SUCCESS'
            Log-Info $detail
        }
        else
        {
            $Region = Normalize-RegionName -Region $Region
            $locations = Retry-Command -ScriptBlock { (Get-AzResourceProvider -ProviderNamespace Microsoft.AzureStackHCI).Where{($_.ResourceTypes.ResourceTypeName -eq 'clusters' -and $_.RegistrationState -eq 'Registered')}.Locations } -RetryIfNullOutput $true
            Log-Info ("RP supported regions : $locations")
            $locations | foreach {
                $regionName = Normalize-RegionName -Region $_
                if ($regionName -eq $Region)
                {
                    # Supported region
                    $detail = $lanTxt.RegionVerified
                    $status = 'SUCCESS'
                    Log-Info $detail
                }
            }

            if($status -ne 'SUCCESS')
            {
                $detail = $lanTxt.RegionNotVerified -f $Region
                $status = 'FAILURE'
                Log-Info $detail -Type $severity
            }

            $params = @{
                Name               = 'AzStackHci_ArcIntegration_Region_Check'
                Title              = 'Verify Azure Region'
                DisplayName        = "Test Arc for servers machines state $($NodeNames -join ',')"
                Severity           = $severity
                Description        = 'Checking Azure Region'
                Tags               = @{}
                Remediation        = 'https://aka.ms/hci-envch'
                TargetResourceID   = $Region
                TargetResourceName = $Region
                TargetResourceType = 'Azure Region'
                Timestamp          = [datetime]::UtcNow
                Status             = $Status
                AdditionalData     = @{
                    Source    = $ENV:COMPUTERNAME
                    Resource  = 'Azure Region'
                    Detail    = $detail
                    Status    = $status
                    TimeStamp = [datetime]::UtcNow
                }
                HealthCheckSource  = $ENV:EnvChkrId
            }
            New-AzStackHciResultObject @params
        }
    }
    catch
    {
        throw ("Exception while validating Region : {0}" -f $_.Exception)
    }
}

function Test-ResourceGroupLimit
{
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId,
        [string]
        $ArcResourceGroupName,
        [string]
        $RegistrationResourceGroupName
    )
    try
    {
        $severity = 'CRITICAL'
        $azureContext = Get-AzContext
        if(!$azureContext)
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        else
        {
            $newRGCount = 0
            $hciRG = Get-AzResourceGroup -Name $RegistrationResourceGroupName -ErrorAction SilentlyContinue
            if([string]::IsNullOrEmpty($hciRG))
            {
                $newRGCount++
            }

            if($ArcResourceGroupName -ne $RegistrationResourceGroupName)
            {
                $arcRG = Get-AzResourceGroup -Name $ArcResourceGroupName -ErrorAction SilentlyContinue
                if([string]::IsNullOrEmpty($arcRG))
                {
                    $newRGCount++
                }
            }

            $totalRGCount = (Get-AzResourceGroup -ErrorAction SilentlyContinue).Count
            if(($totalRGCount + $newRGCount) -gt 980)
            {
                $detail = $lanTxt.ResourceGroupLimitReached -f $SubscriptionId, ($totalRGCount + $newRGCount - 980)
                $status = 'FAILURE'
                Log-Info $detail -Type $severity
            }
            else
            {
                $detail = $lanTxt.ResourceGroupLimitCheckSucceeded -f $SubscriptionId
                $status = 'SUCCESS'
                Log-Info $detail
            }

            $params = @{
                Name               = 'AzStackHci_ArcIntegration_ResourceGroupLimit_Check'
                Title              = 'Verify Resource group limit'
                DisplayName        = 'Verify Resource group limit'
                Severity           = $severity
                Description        = 'Checking Azure Resource group limit'
                Tags               = @{}
                Remediation        = 'https://aka.ms/hci-envch'
                TargetResourceID   = "$SubscriptionId/$ArcResourceGroupName"
                TargetResourceName = $ArcResourceGroupName
                TargetResourceType = 'ResourceGroup'
                Timestamp          = [datetime]::UtcNow
                Status             = $Status
                AdditionalData     = @{
                    Source    = $SubscriptionId
                    Resource  = ($totalRGCount + $newRGCount)
                    Detail    = $detail
                    Status    = $status
                    TimeStamp = [datetime]::UtcNow
                }
                HealthCheckSource  = $ENV:EnvChkrId
            }
            New-AzStackHciResultObject @params
        }
    }
    catch
    {
        throw ("Exception while verifying resource group limit : {0}" -f $_.Exception)
    }
}

function Test-ResourceCountLimit
{
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId,
        [string]
        $RegistrationResourceGroupName
    )
    try
    {
        $severity = 'CRITICAL'
        $azureContext = Get-AzContext
        if(!$azureContext)
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        else
        {
            try
            {
                $resourcesInHCIRg = Get-AzResource -ResourceGroupName $RegistrationResourceGroupName -ResourceType "Microsoft.AzureStackHCI/clusters" -ErrorAction Stop
                if($resourcesInHCIRg.Count -ge 800)
                {
                    $detail = $lanTxt.ResourceLimitReached -f $RegistrationResourceGroupName, $SubscriptionId
                    $status = 'FAILURE'
                    Log-Info $detail -Type $severity
                }
                else
                {
                    $detail = $lanTxt.ResourceLimitCheckSucceeded -f $RegistrationResourceGroupName
                    $status = 'SUCCESS'
                    Log-Info $detail
                }
            }
            catch
            {
                $detail = $lanTxt.MissingPermissions -f "Verify Resource count limit in Registration resource group"
                $status = 'SUCCESS'
                Log-Info $detail
            }

            $params = @{
                Name               = 'AzStackHci_ArcIntegration_ResourceLimit_Check'
                Title              = 'Verify Resource limit'
                DisplayName        = "Verify Resource limit in $RegistrationResourceGroupName"
                Severity           = $severity
                Description        = 'Checking Azure Stack HCI Cluster Resource limit in Registration resource group'
                Tags               = @{}
                Remediation        = 'https://aka.ms/hci-envch'
                TargetResourceID   = "$SubscriptionId/$RegistrationResourceGroupName"
                TargetResourceName = $RegistrationResourceGroupName
                TargetResourceType = 'Cluster'
                Timestamp          = [datetime]::UtcNow
                Status             = $Status
                AdditionalData     = @{
                    Source    = $RegistrationResourceGroupName
                    Resource  = $resourcesInHCIRg.Count
                    Detail    = $detail
                    Status    = $status
                    TimeStamp = [datetime]::UtcNow
                }
                HealthCheckSource  = $ENV:EnvChkrId
            }
            New-AzStackHciResultObject @params
        }
    }
    catch
    {
        throw ("Exception while verifying azure stack hci resource count limit : {0}" -f $_.Exception)
    }
}

function Test-RoleAssignmentCountLimit
{
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId
    )
    try
    {
        $severity = 'CRITICAL'
        $azureContext = Get-AzContext
        if(!$azureContext)
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        else
        {
            try
            {
                $roleAssignments = Get-AzRoleAssignment -Scope "/subscriptions/$SubscriptionId" -ErrorAction Stop
                if($roleAssignments.Count -ge 4000)
                {
                    $detail = $lanTxt.RoleAssignmentLimitReached -f $SubscriptionId
                    $status = 'FAILURE'
                    Log-Info $detail -Type $severity
                }
                else
                {
                    $detail = $lanTxt.RoleAssignmentLimitSuccessfullyVerified -f $SubscriptionId
                    $status = 'SUCCESS'
                    Log-Info $detail
                }
            }
            catch
            {
                $detail = $lanTxt.MissingPermissions -f "Verify Role Assignment count"
                $status = 'SUCCESS'
                Log-Info $detail
            }

            $params = @{
                Name               = 'AzStackHci_ArcIntegration_RoleAssignmentLimit_Check'
                Title              = 'Verify Role Assignment Limit'
                DisplayName        = "Verify Role Assignment Limit in $SubscriptionId"
                Severity           = $severity
                Description        = 'Checking Role Assignment limit in Subscription'
                Tags               = @{}
                Remediation        = 'https://aka.ms/hci-envch'
                TargetResourceID   = $azureContext.Subscription.Id
                TargetResourceName = $azureContext.Subscription.Name
                TargetResourceType = 'Azure Subscription'
                Timestamp          = [datetime]::UtcNow
                Status             = $Status
                AdditionalData     = @{
                    Source    = $azureContext.Subscription.Name
                    Resource  = $roleAssignments.Count
                    Detail    = $detail
                    Status    = $status
                    TimeStamp = [datetime]::UtcNow
                }
                HealthCheckSource  = $ENV:EnvChkrId
            }
            New-AzStackHciResultObject @params
        }
    }
    catch
    {
        throw ("Exception while verifying azure stack hci role assignment count limit : {0}" -f $_.Exception)
    }
}

function Test-ExistingHCIResource {
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId,
        [string]
        $RegistrationResourceGroupName,
        [string]
        $RegistrationResourceName
    )
    try
    {
        $severity = 'CRITICAL'
        #TODO:check if the cmdlet is there, if it is not there, it means it is a different machine, we will fail the test
        $hciRegCmdlet =  Get-Command Get-AzureStackHCI -Type Cmdlet -ErrorAction Ignore
        if($null -eq $hciRegCmdlet)
        {
            # If Get-AzureStackHCI, is not found, fail validation, indicating, validation can only run on HCI OS
            $detail = $lanTxt.ArcValidationNotSupported
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        elseif ($(Get-AzureStackHCI).RegistrationStatus -ne "NotYet")
        {
            # Validation can only be done on un-registred cluster, when run on any other registration state, we will skip the validation
            $detail = $lanTxt.ClusterAlreadyRegistered
            $status = 'SUCCESS'
            Log-Info $detail
        }
        elseif (!$(Get-AzContext))
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        elseif ([string]::IsNullOrEmpty($RegistrationResourceName))
        {
            $detail = $lanTxt.ResourceNameEmpty
            $status = 'SUCCESS'
            Log-Info $detail
        }
        else
        {
            $RPAPIVersion = "2022-12-01"
            Log-Info ($lanTxt.VerifyingIfHCIResourceExistsInHCIRG -f $RegistrationResourceName, $SubscriptionId, $RegistrationResourceGroupName)
            $hciClusterResourceId = "/Subscriptions/" + $SubscriptionId + "/resourceGroups/" + $RegistrationResourceGroupName + "/providers/Microsoft.AzureStackHCI/clusters/" + $RegistrationResourceName
            $hciClusterResource = Get-AzResource -ResourceId $hciClusterResourceId -ApiVersion $RPAPIVersion -ErrorAction Ignore

            if ($null -ne $hciClusterResource)
            {
                $detail = $lanTxt.HCIClusterResourceAlreadyExistsError -f $RegistrationResourceName, $RegistrationResourceGroupName
                $status = 'FAILURE'
                Log-Info $detail -Type $severity
            }
            else
            {
                $detail = $lanTxt.HCIClusterNotFound -f $RegistrationResourceName, $RegistrationResourceGroupName
                $status = 'SUCCESS'
                Log-Info $detail
            }
        }

        $params = @{
            Name               = 'AzStackHci_HCI_ResourceGroup_Check'
            Title              = 'Test HCI Resource Group'
            DisplayName        = 'Test HCI Resource Group'
            Severity           = $severity
            Description        = 'Checking HCI Resource Group clean'
            Tags               = @{}
            Remediation        = 'https://aka.ms/hci-envch'
            TargetResourceID   = "$SubscriptionId/$RegistrationResourceGroupName"
            TargetResourceName = $RegistrationResourceGroupName
            TargetResourceType = 'ResourceGroup'
            Timestamp          = [datetime]::UtcNow
            Status             = $Status
            AdditionalData     = @{
                Source    = $SubscriptionId
                Resource  = $RegistrationResourceGroupName
                Detail    = $detail
                Status    = $status
                TimeStamp = [datetime]::UtcNow
            }
            HealthCheckSource  = $ENV:EnvChkrId
        }
        New-AzStackHciResultObject @params
    }
    catch
    {
        throw ("Error validating HCI Resource Group : {0}" -f $_.Exception)
    }
}

function Normalize-RegionName{
    param(
        [string] $Region
        )
        $regionName = $Region -replace '\s',''
        $regionName = $regionName.ToLower()
        return $regionName
}

function Retry-Command {
    param (
        [parameter(Mandatory=$true)]
        [ValidateNotNullOrEmpty()]
        [scriptblock] $ScriptBlock,
        [int]  $Attempts                   = 8,
        [int]  $MinWaitTimeInSeconds       = 5,
        [int]  $MaxWaitTimeInSeconds       = 60,
        [int]  $BaseBackoffTimeInSeconds   = 2,
        [bool] $RetryIfNullOutput          = $true
        )

    $attempt = 0
    $completed = $false
    $result = $null

    if($MaxWaitTimeInSeconds -lt $MinWaitTimeInSeconds)
    {
        throw "MaxWaitTimeInSeconds($MaxWaitTimeInSeconds) is less than MinWaitTimeInSeconds($MinWaitTimeInSeconds)"
    }

    while (-not $completed) {
        try
        {
            $attempt = $attempt + 1
            $result = Invoke-Command -ScriptBlock $ScriptBlock

            if($RetryIfNullOutput)
            {
                if($result -ne $null)
                {
                    $completed = $true
                }
                else
                {
                    throw "Null result received."
                }
            }
            else
            {
                $completed = $true
            }
        }
        catch
        {
            $exception = $_.Exception

            if([int]$exception.ErrorCode -eq [int][system.net.httpstatuscode]::Forbidden)
            {
                throw
            }
            else
            {
                if ($attempt -ge $Attempts)
                {
                    throw
                }
                else
                {
                    $secondsDelay = $MinWaitTimeInSeconds + [int]([Math]::Pow($BaseBackoffTimeInSeconds,($attempt-1)))

                    if($secondsDelay -gt $MaxWaitTimeInSeconds)
                    {
                        $secondsDelay = $MaxWaitTimeInSeconds
                    }

                    Start-Sleep $secondsDelay
                }
            }
        }
    }

    return $result
}

function Test-MandatoryRPRegistration
{
    [CmdletBinding()]
    param (
        [string]
        $SubscriptionId
    )
    try
    {
        $severity = 'CRITICAL'
        $azureContext = Get-AzContext
        if(!$azureContext)
        {
            $detail = $lanTxt.AzureContextRequired
            $status = 'FAILURE'
            Log-Info $detail -Type $severity
        }
        else
        {
            # Check Mandatory Resource Providers registration
            $listOfMandatoryRPsNeeded = @("Microsoft.GuestConfiguration", "Microsoft.HybridCompute", "Microsoft.HybridConnectivity", "Microsoft.ResourceConnector", "Microsoft.Kubernetes", "Microsoft.KubernetesConfiguration", "Microsoft.ExtendedLocation", "Microsoft.HybridContainerService", "Microsoft.AzureStackHCI")
            $registeredProviders = @()
            $unregisteredProviders = @()
            $registeredProviders = Get-AzResourceProvider | Where-Object { $_.RegistrationState -eq "Registered" } | Select ProviderNamespace
            foreach ($providerNameSpace in $listOfMandatoryRPsNeeded)
            {
                $isRPRegistered = $registeredProviders | Where-Object { $_.ProviderNamespace -eq $providerNameSpace } | ForEach-Object { $true } | Select-Object -First 1
                if (-not $isRPRegistered)
                {
                    $unregisteredProviders += $providerNameSpace
                }
            }
            if ($unregisteredProviders.Count -eq 0)
            {
                $detail = $lanTxt.ResourceProvidersAlreadyRegistered -f $SubscriptionId
                $status = 'SUCCESS'
                Log-Info $detail
            }
            else
            {
                $detail = $lanTxt.MandatoryRPRegistrationsNotPresent -f ($unregisteredProviders -join ','), $SubscriptionId
                $status = 'FAILURE'
                Log-Info $detail -Type $severity
            }
            $params = @{
                Name               = 'AzStackHci_ArcIntegration_MandatoryRPRegistration_Check'
                Title              = 'Test RP registrations are present in the subscription'
                DisplayName        = "Test RP registrations are present in the subscription"
                Severity           = $severity
                Description        = 'Check if all Resource Providers are registered in the subscription'
                Tags               = @{}
                Remediation        = 'https://aka.ms/hci-envch'
                TargetResourceID   = $azureContext.Subscription.Id
                TargetResourceName = $azureContext.Subscription.Name
                TargetResourceType = 'Azure Subscription'
                Timestamp          = [datetime]::UtcNow
                Status             = $status
                AdditionalData     = @{
                    Source    = $ENV:COMPUTERNAME
                    Resource  = $azureContext.Subscription.Id
                    Detail    = $detail
                    Status    = $status
                    TimeStamp = [datetime]::UtcNow
                }
                HealthCheckSource  = $ENV:EnvChkrId
            }
            New-AzStackHciResultObject @params
        }
    }
    catch
    {
        throw ("Exception while checking mandatory RP registration: {0}" -f $_.Exception.Message)
    }
}

Export-ModuleMember -Function Test-*
# SIG # Begin signature block
# MIIoRgYJKoZIhvcNAQcCoIIoNzCCKDMCAQExDzANBglghkgBZQMEAgEFADB5Bgor
# BgEEAYI3AgEEoGswaTA0BgorBgEEAYI3AgEeMCYCAwEAAAQQH8w7YFlLCE63JNLG
# KX7zUQIBAAIBAAIBAAIBAAIBADAxMA0GCWCGSAFlAwQCAQUABCB4GKFWaSxEm0FZ
# ZV7OOYHwQCwdfkrmb4VOFAod/xxv+qCCDXYwggX0MIID3KADAgECAhMzAAAEBGx0
# Bv9XKydyAAAAAAQEMA0GCSqGSIb3DQEBCwUAMH4xCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNpZ25p
# bmcgUENBIDIwMTEwHhcNMjQwOTEyMjAxMTE0WhcNMjUwOTExMjAxMTE0WjB0MQsw
# CQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9u
# ZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMR4wHAYDVQQDExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
# AQC0KDfaY50MDqsEGdlIzDHBd6CqIMRQWW9Af1LHDDTuFjfDsvna0nEuDSYJmNyz
# NB10jpbg0lhvkT1AzfX2TLITSXwS8D+mBzGCWMM/wTpciWBV/pbjSazbzoKvRrNo
# DV/u9omOM2Eawyo5JJJdNkM2d8qzkQ0bRuRd4HarmGunSouyb9NY7egWN5E5lUc3
# a2AROzAdHdYpObpCOdeAY2P5XqtJkk79aROpzw16wCjdSn8qMzCBzR7rvH2WVkvF
# HLIxZQET1yhPb6lRmpgBQNnzidHV2Ocxjc8wNiIDzgbDkmlx54QPfw7RwQi8p1fy
# 4byhBrTjv568x8NGv3gwb0RbAgMBAAGjggFzMIIBbzAfBgNVHSUEGDAWBgorBgEE
# AYI3TAgBBggrBgEFBQcDAzAdBgNVHQ4EFgQU8huhNbETDU+ZWllL4DNMPCijEU4w
# RQYDVR0RBD4wPKQ6MDgxHjAcBgNVBAsTFU1pY3Jvc29mdCBDb3Jwb3JhdGlvbjEW
# MBQGA1UEBRMNMjMwMDEyKzUwMjkyMzAfBgNVHSMEGDAWgBRIbmTlUAXTgqoXNzci
# tW2oynUClTBUBgNVHR8ETTBLMEmgR6BFhkNodHRwOi8vd3d3Lm1pY3Jvc29mdC5j
# b20vcGtpb3BzL2NybC9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3JsMGEG
# CCsGAQUFBwEBBFUwUzBRBggrBgEFBQcwAoZFaHR0cDovL3d3dy5taWNyb3NvZnQu
# Y29tL3BraW9wcy9jZXJ0cy9NaWNDb2RTaWdQQ0EyMDExXzIwMTEtMDctMDguY3J0
# MAwGA1UdEwEB/wQCMAAwDQYJKoZIhvcNAQELBQADggIBAIjmD9IpQVvfB1QehvpC
# Ge7QeTQkKQ7j3bmDMjwSqFL4ri6ae9IFTdpywn5smmtSIyKYDn3/nHtaEn0X1NBj
# L5oP0BjAy1sqxD+uy35B+V8wv5GrxhMDJP8l2QjLtH/UglSTIhLqyt8bUAqVfyfp
# h4COMRvwwjTvChtCnUXXACuCXYHWalOoc0OU2oGN+mPJIJJxaNQc1sjBsMbGIWv3
# cmgSHkCEmrMv7yaidpePt6V+yPMik+eXw3IfZ5eNOiNgL1rZzgSJfTnvUqiaEQ0X
# dG1HbkDv9fv6CTq6m4Ty3IzLiwGSXYxRIXTxT4TYs5VxHy2uFjFXWVSL0J2ARTYL
# E4Oyl1wXDF1PX4bxg1yDMfKPHcE1Ijic5lx1KdK1SkaEJdto4hd++05J9Bf9TAmi
# u6EK6C9Oe5vRadroJCK26uCUI4zIjL/qG7mswW+qT0CW0gnR9JHkXCWNbo8ccMk1
# sJatmRoSAifbgzaYbUz8+lv+IXy5GFuAmLnNbGjacB3IMGpa+lbFgih57/fIhamq
# 5VhxgaEmn/UjWyr+cPiAFWuTVIpfsOjbEAww75wURNM1Imp9NJKye1O24EspEHmb
# DmqCUcq7NqkOKIG4PVm3hDDED/WQpzJDkvu4FrIbvyTGVU01vKsg4UfcdiZ0fQ+/
# V0hf8yrtq9CkB8iIuk5bBxuPMIIHejCCBWKgAwIBAgIKYQ6Q0gAAAAAAAzANBgkq
# hkiG9w0BAQsFADCBiDELMAkGA1UEBhMCVVMxEzARBgNVBAgTCldhc2hpbmd0b24x
# EDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29mdCBDb3Jwb3JhdGlv
# bjEyMDAGA1UEAxMpTWljcm9zb2Z0IFJvb3QgQ2VydGlmaWNhdGUgQXV0aG9yaXR5
# IDIwMTEwHhcNMTEwNzA4MjA1OTA5WhcNMjYwNzA4MjEwOTA5WjB+MQswCQYDVQQG
# EwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwG
# A1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSgwJgYDVQQDEx9NaWNyb3NvZnQg
# Q29kZSBTaWduaW5nIFBDQSAyMDExMIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIIC
# CgKCAgEAq/D6chAcLq3YbqqCEE00uvK2WCGfQhsqa+laUKq4BjgaBEm6f8MMHt03
# a8YS2AvwOMKZBrDIOdUBFDFC04kNeWSHfpRgJGyvnkmc6Whe0t+bU7IKLMOv2akr
# rnoJr9eWWcpgGgXpZnboMlImEi/nqwhQz7NEt13YxC4Ddato88tt8zpcoRb0Rrrg
# OGSsbmQ1eKagYw8t00CT+OPeBw3VXHmlSSnnDb6gE3e+lD3v++MrWhAfTVYoonpy
# 4BI6t0le2O3tQ5GD2Xuye4Yb2T6xjF3oiU+EGvKhL1nkkDstrjNYxbc+/jLTswM9
# sbKvkjh+0p2ALPVOVpEhNSXDOW5kf1O6nA+tGSOEy/S6A4aN91/w0FK/jJSHvMAh
# dCVfGCi2zCcoOCWYOUo2z3yxkq4cI6epZuxhH2rhKEmdX4jiJV3TIUs+UsS1Vz8k
# A/DRelsv1SPjcF0PUUZ3s/gA4bysAoJf28AVs70b1FVL5zmhD+kjSbwYuER8ReTB
# w3J64HLnJN+/RpnF78IcV9uDjexNSTCnq47f7Fufr/zdsGbiwZeBe+3W7UvnSSmn
# Eyimp31ngOaKYnhfsi+E11ecXL93KCjx7W3DKI8sj0A3T8HhhUSJxAlMxdSlQy90
# lfdu+HggWCwTXWCVmj5PM4TasIgX3p5O9JawvEagbJjS4NaIjAsCAwEAAaOCAe0w
# ggHpMBAGCSsGAQQBgjcVAQQDAgEAMB0GA1UdDgQWBBRIbmTlUAXTgqoXNzcitW2o
# ynUClTAZBgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYD
# VR0TAQH/BAUwAwEB/zAfBgNVHSMEGDAWgBRyLToCMZBDuRQFTuHqp8cx0SOJNDBa
# BgNVHR8EUzBRME+gTaBLhklodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpL2Ny
# bC9wcm9kdWN0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3JsMF4GCCsG
# AQUFBwEBBFIwUDBOBggrBgEFBQcwAoZCaHR0cDovL3d3dy5taWNyb3NvZnQuY29t
# L3BraS9jZXJ0cy9NaWNSb29DZXJBdXQyMDExXzIwMTFfMDNfMjIuY3J0MIGfBgNV
# HSAEgZcwgZQwgZEGCSsGAQQBgjcuAzCBgzA/BggrBgEFBQcCARYzaHR0cDovL3d3
# dy5taWNyb3NvZnQuY29tL3BraW9wcy9kb2NzL3ByaW1hcnljcHMuaHRtMEAGCCsG
# AQUFBwICMDQeMiAdAEwAZQBnAGEAbABfAHAAbwBsAGkAYwB5AF8AcwB0AGEAdABl
# AG0AZQBuAHQALiAdMA0GCSqGSIb3DQEBCwUAA4ICAQBn8oalmOBUeRou09h0ZyKb
# C5YR4WOSmUKWfdJ5DJDBZV8uLD74w3LRbYP+vj/oCso7v0epo/Np22O/IjWll11l
# hJB9i0ZQVdgMknzSGksc8zxCi1LQsP1r4z4HLimb5j0bpdS1HXeUOeLpZMlEPXh6
# I/MTfaaQdION9MsmAkYqwooQu6SpBQyb7Wj6aC6VoCo/KmtYSWMfCWluWpiW5IP0
# wI/zRive/DvQvTXvbiWu5a8n7dDd8w6vmSiXmE0OPQvyCInWH8MyGOLwxS3OW560
# STkKxgrCxq2u5bLZ2xWIUUVYODJxJxp/sfQn+N4sOiBpmLJZiWhub6e3dMNABQam
# ASooPoI/E01mC8CzTfXhj38cbxV9Rad25UAqZaPDXVJihsMdYzaXht/a8/jyFqGa
# J+HNpZfQ7l1jQeNbB5yHPgZ3BtEGsXUfFL5hYbXw3MYbBL7fQccOKO7eZS/sl/ah
# XJbYANahRr1Z85elCUtIEJmAH9AAKcWxm6U/RXceNcbSoqKfenoi+kiVH6v7RyOA
# 9Z74v2u3S5fi63V4GuzqN5l5GEv/1rMjaHXmr/r8i+sLgOppO6/8MO0ETI7f33Vt
# Y5E90Z1WTk+/gFcioXgRMiF670EKsT/7qMykXcGhiJtXcVZOSEXAQsmbdlsKgEhr
# /Xmfwb1tbWrJUnMTDXpQzTGCGiYwghoiAgEBMIGVMH4xCzAJBgNVBAYTAlVTMRMw
# EQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVN
# aWNyb3NvZnQgQ29ycG9yYXRpb24xKDAmBgNVBAMTH01pY3Jvc29mdCBDb2RlIFNp
# Z25pbmcgUENBIDIwMTECEzMAAAQEbHQG/1crJ3IAAAAABAQwDQYJYIZIAWUDBAIB
# BQCgga4wGQYJKoZIhvcNAQkDMQwGCisGAQQBgjcCAQQwHAYKKwYBBAGCNwIBCzEO
# MAwGCisGAQQBgjcCARUwLwYJKoZIhvcNAQkEMSIEIDFlxMfxNPCooP5bJqisu0Xb
# RVV90mTs8G3rqzTv9vIRMEIGCisGAQQBgjcCAQwxNDAyoBSAEgBNAGkAYwByAG8A
# cwBvAGYAdKEagBhodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20wDQYJKoZIhvcNAQEB
# BQAEggEADPw1rhuqxmpDV4TKmc8VIt53YayjEtB8BMJw/+k7Ne8RpIzNkBluQMdz
# 6VPPQDuf21QQ2x4S/hEcCZWe2bTZvB8aRrbzx4zSnj0xwkpraPVVE0Nd6sWeJrtN
# KgRCvguVAgrHkzQAyJRlI9yRbhHQSNl/jPBMiDTckozbQUk7EwqAUcNZrKEMeIGt
# zODm8DwGttSearHBL1XVnSfqFkm4DZdj3Gwf/MQdM4e53IbzxPTfikGYfw5TrrdG
# PIN8rJDs/IbRwC2BVL/XZJV0VcidAyTxi+ULg26VBePnAjPvSu1tWQN9ga3eAw/y
# uZhMi8cn0AV6nHXEPxEJW8r4Ka4NZaGCF7AwghesBgorBgEEAYI3AwMBMYIXnDCC
# F5gGCSqGSIb3DQEHAqCCF4kwgheFAgEDMQ8wDQYJYIZIAWUDBAIBBQAwggFaBgsq
# hkiG9w0BCRABBKCCAUkEggFFMIIBQQIBAQYKKwYBBAGEWQoDATAxMA0GCWCGSAFl
# AwQCAQUABCCmikhS/ZaPiJtzpTmvwy1uql8CUrVQRL6lrY2JL+CZsAIGaC40AQ+l
# GBMyMDI1MDYxMDE1NDgzMS4zOTVaMASAAgH0oIHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaCCEf4wggcoMIIFEKADAgECAhMzAAAB9BdGhcDLPznlAAEAAAH0MA0G
# CSqGSIb3DQEBCwUAMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9u
# MRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRp
# b24xJjAkBgNVBAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMB4XDTI0
# MDcyNTE4MzA1OVoXDTI1MTAyMjE4MzA1OVowgdMxCzAJBgNVBAYTAlVTMRMwEQYD
# VQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNy
# b3NvZnQgQ29ycG9yYXRpb24xLTArBgNVBAsTJE1pY3Jvc29mdCBJcmVsYW5kIE9w
# ZXJhdGlvbnMgTGltaXRlZDEnMCUGA1UECxMeblNoaWVsZCBUU1MgRVNOOjU5MUEt
# MDVFMC1EOTQ3MSUwIwYDVQQDExxNaWNyb3NvZnQgVGltZS1TdGFtcCBTZXJ2aWNl
# MIICIjANBgkqhkiG9w0BAQEFAAOCAg8AMIICCgKCAgEApwhOE6bQgC9qq4jJGX2A
# 1yoObfk0qetQ8kkj+5m37WBxDlsZ5oJnjfzHspqPiOEVzZ2y2ygGgNZ3/xdZQN7f
# 9A1Wp1Adh5qHXZZh3SBX8ABuc69Tb3cJ5KCZcXDsufwmXeCj81EzJEIZquVdV8ST
# lQueB/b1MIYt5RKis3uwzdlfSl0ckHbGzoO91YTKg6IExqKYojGreCopnIKxOvkr
# 5VZsj2f95Bb1LGEvuhBIm/C7JysvJvBZWNtrspzyXVnuo+kDEyZwpkphsR8Zvdi+
# s/pQiofmdbW1UqzWlqXQVgoYXbaYkEyaSh/heBtwj1tue+LcuOcHAPgbwZvQLksK
# aK46oktregOR4e0icsGiAWR9IL+ny4mlCUNA84F7GEEWOEvibig7wsrTa6ZbzuMs
# yTi2Az4qPV3QRkFgxSbp4R4OEKnin8Jz4XLI1wXhBhIpMGfA3BT850nqamzSiD5L
# 5px+VtfCi0MJTS2LDF1PaVZwlyVZIVjVHK8oh2HYG9T26FjR9/I85i5ExxmhHpxM
# 2Z+UhJeZA6Lz452m/+xrA4xrdYas5cm7FUhy24rPLVH+Fy+ZywHAp9c9oWTrtjfI
# KqLIvYtgJc41Q8WxbZPR7B1uft8BFsvz2dOSLkxPDLcXWy16ANy73v0ipCxAwUEC
# 9hssi0LdB8ThiNf/4A+RZ8sCAwEAAaOCAUkwggFFMB0GA1UdDgQWBBQrdGWhCtEs
# Pid1LJzsTaLTKQbfmzAfBgNVHSMEGDAWgBSfpxVdAF5iXYP05dJlpxtTNRnpcjBf
# BgNVHR8EWDBWMFSgUqBQhk5odHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3Bz
# L2NybC9NaWNyb3NvZnQlMjBUaW1lLVN0YW1wJTIwUENBJTIwMjAxMCgxKS5jcmww
# bAYIKwYBBQUHAQEEYDBeMFwGCCsGAQUFBzAChlBodHRwOi8vd3d3Lm1pY3Jvc29m
# dC5jb20vcGtpb3BzL2NlcnRzL01pY3Jvc29mdCUyMFRpbWUtU3RhbXAlMjBQQ0El
# MjAyMDEwKDEpLmNydDAMBgNVHRMBAf8EAjAAMBYGA1UdJQEB/wQMMAoGCCsGAQUF
# BwMIMA4GA1UdDwEB/wQEAwIHgDANBgkqhkiG9w0BAQsFAAOCAgEA3cHSDxJKUDsg
# acIfRX60ugODShsBqwtEURUbUXeDmYYSa5oFj34RujW3gOeCt/ObDO45vfpnYG5O
# S5YowwsFw19giCI6JV+ccG/qqM08nxASbzwWtqtorzQiJh9upsE4TVZeKYXmbyx7
# WN9tdbVIrCelVj7P6ifMHTSLt6BmyoS2xlC2cfgKPPA13vS3euqUl6zwe7GAhjfj
# NXjKlE4SNWJvdqgrv0GURKjqmamNvhmSJane6TYzpdDCegq8adlGH85I1EWKmfER
# b1lzKy5OMO2e9IkAlvydpUun0C3sNEtp0ehliT0Sraq8jcYVDH4A2C/MbLBIwikj
# wiFGQ4SlFLT2Tgb4GvvpcWVzBxwDo9IRBwpzngbyzbhh95UVOrQL2rbWHrHDSE3d
# gdL2yuaHRgY7HYYLs5Lts30wU9Ouh8N54RUta6GFZFx5A4uITgyJcVdWVaN0qjs0
# eEjwEyNUv0cRLuHWJBejkMe3qRAhvCjnhro7DGRWaIldyfzZqln6FsnLQ3bl+ZvV
# JWTYJuL+IZLI2Si3IrIRfjccn29X2BX/vz2KcYubIjK6XfYvrZQN4XKbnvSqBNAw
# IPY2xJeB4o9PDEFI2rcPaLUyz5IV7JP3JRpgg3xsUqvFHlSG6uMIWjwH0GQIIwrC
# 2zRy+lNZsOKnruyyHMQTP7jy5U92qEEwggdxMIIFWaADAgECAhMzAAAAFcXna54C
# m0mZAAAAAAAVMA0GCSqGSIb3DQEBCwUAMIGIMQswCQYDVQQGEwJVUzETMBEGA1UE
# CBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9z
# b2Z0IENvcnBvcmF0aW9uMTIwMAYDVQQDEylNaWNyb3NvZnQgUm9vdCBDZXJ0aWZp
# Y2F0ZSBBdXRob3JpdHkgMjAxMDAeFw0yMTA5MzAxODIyMjVaFw0zMDA5MzAxODMy
# MjVaMHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQH
# EwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNV
# BAMTHU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwMIICIjANBgkqhkiG9w0B
# AQEFAAOCAg8AMIICCgKCAgEA5OGmTOe0ciELeaLL1yR5vQ7VgtP97pwHB9KpbE51
# yMo1V/YBf2xK4OK9uT4XYDP/XE/HZveVU3Fa4n5KWv64NmeFRiMMtY0Tz3cywBAY
# 6GB9alKDRLemjkZrBxTzxXb1hlDcwUTIcVxRMTegCjhuje3XD9gmU3w5YQJ6xKr9
# cmmvHaus9ja+NSZk2pg7uhp7M62AW36MEBydUv626GIl3GoPz130/o5Tz9bshVZN
# 7928jaTjkY+yOSxRnOlwaQ3KNi1wjjHINSi947SHJMPgyY9+tVSP3PoFVZhtaDua
# Rr3tpK56KTesy+uDRedGbsoy1cCGMFxPLOJiss254o2I5JasAUq7vnGpF1tnYN74
# kpEeHT39IM9zfUGaRnXNxF803RKJ1v2lIH1+/NmeRd+2ci/bfV+AutuqfjbsNkz2
# K26oElHovwUDo9Fzpk03dJQcNIIP8BDyt0cY7afomXw/TNuvXsLz1dhzPUNOwTM5
# TI4CvEJoLhDqhFFG4tG9ahhaYQFzymeiXtcodgLiMxhy16cg8ML6EgrXY28MyTZk
# i1ugpoMhXV8wdJGUlNi5UPkLiWHzNgY1GIRH29wb0f2y1BzFa/ZcUlFdEtsluq9Q
# BXpsxREdcu+N+VLEhReTwDwV2xo3xwgVGD94q0W29R6HXtqPnhZyacaue7e3Pmri
# Lq0CAwEAAaOCAd0wggHZMBIGCSsGAQQBgjcVAQQFAgMBAAEwIwYJKwYBBAGCNxUC
# BBYEFCqnUv5kxJq+gpE8RjUpzxD/LwTuMB0GA1UdDgQWBBSfpxVdAF5iXYP05dJl
# pxtTNRnpcjBcBgNVHSAEVTBTMFEGDCsGAQQBgjdMg30BATBBMD8GCCsGAQUFBwIB
# FjNodHRwOi8vd3d3Lm1pY3Jvc29mdC5jb20vcGtpb3BzL0RvY3MvUmVwb3NpdG9y
# eS5odG0wEwYDVR0lBAwwCgYIKwYBBQUHAwgwGQYJKwYBBAGCNxQCBAweCgBTAHUA
# YgBDAEEwCwYDVR0PBAQDAgGGMA8GA1UdEwEB/wQFMAMBAf8wHwYDVR0jBBgwFoAU
# 1fZWy4/oolxiaNE9lJBb186aGMQwVgYDVR0fBE8wTTBLoEmgR4ZFaHR0cDovL2Ny
# bC5taWNyb3NvZnQuY29tL3BraS9jcmwvcHJvZHVjdHMvTWljUm9vQ2VyQXV0XzIw
# MTAtMDYtMjMuY3JsMFoGCCsGAQUFBwEBBE4wTDBKBggrBgEFBQcwAoY+aHR0cDov
# L3d3dy5taWNyb3NvZnQuY29tL3BraS9jZXJ0cy9NaWNSb29DZXJBdXRfMjAxMC0w
# Ni0yMy5jcnQwDQYJKoZIhvcNAQELBQADggIBAJ1VffwqreEsH2cBMSRb4Z5yS/yp
# b+pcFLY+TkdkeLEGk5c9MTO1OdfCcTY/2mRsfNB1OW27DzHkwo/7bNGhlBgi7ulm
# ZzpTTd2YurYeeNg2LpypglYAA7AFvonoaeC6Ce5732pvvinLbtg/SHUB2RjebYIM
# 9W0jVOR4U3UkV7ndn/OOPcbzaN9l9qRWqveVtihVJ9AkvUCgvxm2EhIRXT0n4ECW
# OKz3+SmJw7wXsFSFQrP8DJ6LGYnn8AtqgcKBGUIZUnWKNsIdw2FzLixre24/LAl4
# FOmRsqlb30mjdAy87JGA0j3mSj5mO0+7hvoyGtmW9I/2kQH2zsZ0/fZMcm8Qq3Uw
# xTSwethQ/gpY3UA8x1RtnWN0SCyxTkctwRQEcb9k+SS+c23Kjgm9swFXSVRk2XPX
# fx5bRAGOWhmRaw2fpCjcZxkoJLo4S5pu+yFUa2pFEUep8beuyOiJXk+d0tBMdrVX
# VAmxaQFEfnyhYWxz/gq77EFmPWn9y8FBSX5+k77L+DvktxW/tM4+pTFRhLy/AsGC
# onsXHRWJjXD+57XQKBqJC4822rpM+Zv/Cuk0+CQ1ZyvgDbjmjJnW4SLq8CdCPSWU
# 5nR0W2rRnj7tfqAxM328y+l7vzhwRNGQ8cirOoo6CGJ/2XBjU02N7oJtpQUQwXEG
# ahC0HVUzWLOhcGbyoYIDWTCCAkECAQEwggEBoYHZpIHWMIHTMQswCQYDVQQGEwJV
# UzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UEBxMHUmVkbW9uZDEeMBwGA1UE
# ChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMS0wKwYDVQQLEyRNaWNyb3NvZnQgSXJl
# bGFuZCBPcGVyYXRpb25zIExpbWl0ZWQxJzAlBgNVBAsTHm5TaGllbGQgVFNTIEVT
# Tjo1OTFBLTA1RTAtRDk0NzElMCMGA1UEAxMcTWljcm9zb2Z0IFRpbWUtU3RhbXAg
# U2VydmljZaIjCgEBMAcGBSsOAwIaAxUAv+LZ/Vg0s17Xek4iG9R9c/7+AI6ggYMw
# gYCkfjB8MQswCQYDVQQGEwJVUzETMBEGA1UECBMKV2FzaGluZ3RvbjEQMA4GA1UE
# BxMHUmVkbW9uZDEeMBwGA1UEChMVTWljcm9zb2Z0IENvcnBvcmF0aW9uMSYwJAYD
# VQQDEx1NaWNyb3NvZnQgVGltZS1TdGFtcCBQQ0EgMjAxMDANBgkqhkiG9w0BAQsF
# AAIFAOvyZeMwIhgPMjAyNTA2MTAwODA1NTVaGA8yMDI1MDYxMTA4MDU1NVowdzA9
# BgorBgEEAYRZCgQBMS8wLTAKAgUA6/Jl4wIBADAKAgEAAgIc/QIB/zAHAgEAAgIT
# AzAKAgUA6/O3YwIBADA2BgorBgEEAYRZCgQCMSgwJjAMBgorBgEEAYRZCgMCoAow
# CAIBAAIDB6EgoQowCAIBAAIDAYagMA0GCSqGSIb3DQEBCwUAA4IBAQC1TBPKZTLA
# PAmOwic+Wd+MLBYhhGTOp18usL46wtrAXvuOAegdm42GJBQKL8SoRGDuvuXqs0GJ
# j1RW9tnR7XjCVwYo7tJulJrg1hK54BF1+qZNLcxUkCbavA/DlRDhRWi/NafbCuUj
# EjAR9kaxGgqoHF3AV1/rs3wZE6Sw1K0YLlxz0LMvWPrHGymjSCAutxKYhfnAsFJ0
# UziMasWJw0rKO3XoRFaQCvyOh/4E2UG9VHMJQxvyGuTkDAO/JawWeUv4sB2Pd0CJ
# vPDwysD3Jo/d9flx1opPsrxg6WAZw8SGaIMwXkjj60LnQ7C6Myuh2H97CK9ChI2Z
# 8HAxjiiIXKHwMYIEDTCCBAkCAQEwgZMwfDELMAkGA1UEBhMCVVMxEzARBgNVBAgT
# Cldhc2hpbmd0b24xEDAOBgNVBAcTB1JlZG1vbmQxHjAcBgNVBAoTFU1pY3Jvc29m
# dCBDb3Jwb3JhdGlvbjEmMCQGA1UEAxMdTWljcm9zb2Z0IFRpbWUtU3RhbXAgUENB
# IDIwMTACEzMAAAH0F0aFwMs/OeUAAQAAAfQwDQYJYIZIAWUDBAIBBQCgggFKMBoG
# CSqGSIb3DQEJAzENBgsqhkiG9w0BCRABBDAvBgkqhkiG9w0BCQQxIgQg9NzP+TAN
# WBwf8bLHFEBzsK+TnizIdfEje/BqMDk4xCowgfoGCyqGSIb3DQEJEAIvMYHqMIHn
# MIHkMIG9BCA/WMJ8biaT6njvkknB8Q7hSQIi8ys6vIBvZg60RBjWazCBmDCBgKR+
# MHwxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpXYXNoaW5ndG9uMRAwDgYDVQQHEwdS
# ZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xJjAkBgNVBAMT
# HU1pY3Jvc29mdCBUaW1lLVN0YW1wIFBDQSAyMDEwAhMzAAAB9BdGhcDLPznlAAEA
# AAH0MCIEIJ7KHRPAak1IG99/GdQsnVQ6Zoa6DkJNHoqgsNpUpjXRMA0GCSqGSIb3
# DQEBCwUABIICAARJen2nfsABFLjHuTUTcdIJJ05jqi9oRC1j93kg7IsNnNrqcn+4
# fjwvJdLCHpqqYlzhMlY4e5FFzrXnY8Lw7xivsQBWsMQQb+B4P98UG4vfzTKwLXEI
# LR/2a+/7Wia/gVvnROnoZFsoYHFsw5JLxk48vf2mbrDdJGXmlSE6dpI+UYqAcEet
# Ijz6VzUfQ8H4EK0BfCTG522laUJlbRHPbPS2031dpxR4ydLbElAQnRpQXBOQAxoY
# wK9pxePlf8BdHuA2mOym+uoD4t99e7PzAilMy3jy0Q3yN3TnTicIaBHVe0ZBdgpn
# EZH/9TXPySu1gsOAefHUZicDUmcD+Qh1yMsVCGiBmRh1JKqV95hGQbcWkK0f7fmu
# jGI4K3bZ6jG+AzGaz3vCB0LaxpiwXZbDQYEG9sLwAwVJjFGBVodsmhkkxVgy5TZn
# PjhNvYSSanC7ecVk7muYjamwkwqzLPQXNnPW76BXfv8ZQkaq3kDhoFRg6gyKZmSd
# QJ0kU/zHMbtrmQi3kENYsbFWQ86ft/WfKEodqgiI4anKrNk2zH3UK5qNVHYtra7y
# wp1m06DFotdQzPhb1ALQoVt6SWbqxgPSZEmVxVMXwUxLD0qXqNgOiFW5WaY1lDuB
# QYef/yAJylI+1yXRQZ+2KvXtjSeCbvrmkN8lkkKsWxxspdaQ39ct6oaF
# SIG # End signature block