libsss_certmap-devel-1.16.4-37.el7_8.4>t  DH`p_-x$ƨ|1g W# K0)j_'.,#)'諿&aa8rIDaaէZ M8|])%R3#X^n27-܀ۓT~Qoř8JQ㠳 ÂC_ZuF4= "h!Qq:z- }WTСE.OMy_:BPe54|pk׋SFae "<^R>?ltZr0'7GcL)|am09!YBK i$U#$7QKʜ֭Y`G Nʲ431*۳ uE 8tFYH"0$9.D]ٖeȡә'fm4` ,[f`}pVxlP}pQKPV=qD̞#{Z׹+XQ3ʰZlrRC-647cd9d74a8b761aff2ff821632a7f9868f62b0b1_-w$ƨ8![d>2#H[͸bLT#|ɈU 1M,!dD o+/KJET2h-\$XpK.{1+b&.fn*D3= zI緞fA 3+Lg/46>@XȀjv=pu5W6IZMsBH#S1{ː~CSK|.|79އh&Q)D"r#ZɪUaV;77Jbt!b^:Ԩ/Epl PşA>fF0yvx/.\|-_ڎiFQ+.3T=:k `2WIuJ8ЍXw,06~d^LCږx쾼İZ>$3+l8Ĭu-ijep9B}h.mXs*]别ΐ8'`?'Pd ) I B$B B ,B 4B B PBXBB B`|(F8P39#3:3GBHBIBXY\ B]B^bdefltBuBv w%0Bx&8By'@'LClibsss_certmap-devel1.16.437.el7_8.4SSSD Certficate Mapping LibraryLibrary to map certificates to users based on rules_,>x86-02.bsys.centos.org"CentOSLGPLv3+CentOS BuildSystem Development/Librarieshttps://pagure.io/SSSD/sssd/linuxi686E]. ?VhUVV:VT&lb{3mY\dD UMAA큤A큤_,>^_,>[_,>__,>_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>G_,>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_certmap.so.0.0.0rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootsssd-1.16.4-37.el7_8.4.src.rpmlibsss_certmap-devellibsss_certmap-devel(x86-32)pkgconfig(sss_certmap)@@    /usr/bin/pkg-configlibsss_certmaplibsss_certmap.so.0rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)1.16.4-37.el7_8.43.0.4-14.6.0-14.0-15.2-14.11.3^n@^}^x^r @^^@]]*]@]]]@]@]m]m]p]p]p]p]S\Q\Q\"\"\"\\\r@\r@\r@\\\\\\\\\\\|\+@[@[_[@[@[l,[b@[a[Y[Y[H@[E@[6@[0@[,[,[d@[[Z@Z@ZmZ@Z_@Z_@Z@ZyZhu@Z3@Z2gZ.s@Z*~Z'Z!D@ZZ@Z Z @Z7ZNYZ@Y@YYJ_YJ_YC@YBvYBvY9<@Y9<@Y5GY5GY5GY5GY0Y0Y(Y(Y%uY%uY$$@Y$$@Y"Y;@YR@YR@Y Y @Y @YtYtYtYtYtYXXh@XXX@X@X@XsX@X@X@XۡXۡXXӸX,XCX@XX*X lX lX lW$WW;W;W;W֘W֘W@W^@WiWiWiW/@W/@W/@W/@WWWWQWQWQW@W@W@WhW@W@Wt@WE@WE@W@W@W@W@WW~W-@W-@W-@WW@WWu WgWDB@WDB@WDB@WBW;W;W@VbV͛@VTQ@VCV @V @V @V V@VBVBVBVBVBUUUU@UXU@U@U@UUUUUUUUL@UL@UU@U@U@UnU@U(U@U@UUmUmU@UJ@UU7@U7@U7@U @U@U@TE@TE@TE@Tи@Tr@Tr@Tr@Tr@T}T}T}T}T}T7T7TTC@TTZ@TZ@TT@Tp@Tp@T@T{T*@T*@TTT~@T~@TuTuTto@Tto@Tto@Tto@Tto@Tto@TmTmTmTmTl@Tl@Tl@Tl@TcKTa@T\@TZ@TZ@TR(@TG@TG@TG@TG@TG@TD@T6xTTT SS@S|@Sr @Sr @Sr @Sr @S;S;S2@S2@S,)S!S L@SSS@S@S@S@S@S @S @S @S @S @S @S @S @SSSRb@Rb@Rb@R@R@R@R@RURURUR߲RRRx@Rx@Rx@RΏ@RΏ@RΏ@R=R=RkRRRR@R@R@R@R@Rv@Rv@Rv@Rv@Rv@Rv@Rv@Rv@Rv@RpREs@REs@R7Q@Q@Q@Q@Q@QQLQکQQQo@Q)@Q@QQ@Q@QbQyQV@Q'@QQQnQZ@Q0@QQQ@Q@QQ @QQh@PP@P@P@Pz@Pz@PqnPl(PaPaPS@PH@PDPM>M2@MMzMx@Mj - 1.16.4-37.4Alexey Tikhonov - 1.16.4-37.3Alexey Tikhonov - 1.16.4-37.2Michal Židek - 1.16.4-37.1Michal Židek - 1.16.4-37Michal Židek - 1.16.4-36Michal Židek - 1.16.4-35Michal Židek - 1.16.4-34Michal Židek - 1.16.4-33Michal Židek - 1.16.4-32Michal Židek - 1.16.4-31Michal Židek - 1.16.4-30Michal Židek - 1.16.4-29Michal Židek - 1.16.4-28Michal Židek - 1.16.4-27Michal Židek - 1.16.4-26Michal Židek - 1.16.4-25Michal Židek - 1.16.4-24Michal Židek - 1.16.4-23Michal Židek - 1.16.4-22Michal Židek - 1.16.4-21Michal Židek - 1.16.4-20Jakub Hrozek - 1.16.4-19Jakub Hrozek - 1.16.4-18Jakub Hrozek - 1.16.4-17Michal Židek - 1.16.4-16Jakub Hrozek - 1.16.4-15Michal Židek - 1.16.4-14Michal Židek - 1.16.4-12Michal Židek - 1.16.4-12Michal Židek - 1.16.4-11Michal Židek - 1.16.4-10Michal Židek - 1.16.4-9Michal Židek - 1.16.4-8Michal Židek - 1.16.4-7Michal Židek - 1.16.4-6Michal Židek - 1.16.4-5Michal Židek - 1.16.4-4Michal Židek - 1.16.4-3Michal Židek - 1.16.4-2Michal Židek - 1.16.4-1Jakub Hrozek - 1.16.2-17Michal Židek - 1.16.2-16Michal Židek - 1.16.2-15Michal Židek - 1.16.2-14Jakub Hrozek - 1.16.2-13Fabiano Fidêncio - 1.16.2-12Jakub Hrozek - 1.16.2-11Jakub Hrozek - 1.16.2-10Jakub Hrozek - 1.16.2-9Jakub Hrozek - 1.16.2-8Fabiano Fidêncio - 1.16.2-7Fabiano Fidêncio - 1.16.2-6Fabiano Fidêncio - 1.16.2-5Fabiano Fidêncio - 1.16.2-4Fabiano Fidêncio - 1.16.2-3Fabiano Fidêncio - 1.16.2-2Fabiano Fidêncio - 1.16.2-1Fabiano Fidêncio - 1.16.0-25Fabiano Fidêncio - 1.16.0-24Fabiano Fidêncio - 1.16.0-23Fabiano Fidêncio - 1.16.0-22Jakub Hrozek - 1.16.0-21Fabiano Fidêncio - 1.16.0-20Fabiano Fidêncio - 1.16.0-19Fabiano Fidêncio - 1.16.0-18Fabiano Fidêncio - 1.16.0-17Fabiano Fidêncio - 1.16.0-16Fabiano Fidêncio - 1.16.0-15Fabiano Fidêncio - 1.16.0-14Fabiano Fidêncio - 1.16.0-13Fabiano Fidêncio - 1.16.0-12Fabiano Fidêncio - 1.16.0-11Fabiano Fidêncio - 1.16.0-10Fabiano Fidêncio - 1.16.0-9Fabiano Fidêncio - 1.16.0-8Fabiano Fidêncio - 1.16.0-7Fabiano Fidêncio - 1.16.0-6Fabiano Fidêncio - 1.16.0-5Fabiano Fidêncio - 1.16.0-4Fabiano Fidêncio - 1.16.0-3Fabiano Fidêncio - 1.16.0-2Fabiano Fidêncio - 1.16.0-1Jakub Hrozek - 1.15.2-51Jakub Hrozek - 1.15.2-50Jakub Hrozek - 1.15.2-49Jakub Hrozek - 1.15.2-48Jakub Hrozek - 1.15.2-47Jakub Hrozek - 1.15.2-46Jakub Hrozek - 1.15.2-45Jakub Hrozek - 1.15.2-44Jakub Hrozek - 1.15.2-43Jakub Hrozek - 1.15.2-42Jakub Hrozek - 1.15.2-41Jakub Hrozek - 1.15.2-40Jakub Hrozek - 1.15.2-39Jakub Hrozek - 1.15.2-38Jakub Hrozek - 1.15.2-37Jakub Hrozek - 1.15.2-36Jakub Hrozek - 1.15.2-35Jakub Hrozek - 1.15.2-34Jakub Hrozek - 1.15.2-33Jakub Hrozek - 1.15.2-32Jakub Hrozek - 1.15.2-31Sumit Bose - 1.15.2-30Jakub Hrozek - 1.15.2-29Jakub Hrozek - 1.15.2-28Jakub Hrozek - 1.15.2-25Jakub Hrozek - 1.15.2-24Lukas Slebodnik - 1.15.2-23Jakub Hrozek - 1.15.2-22Jakub Hrozek - 1.15.2-21Jakub Hrozek - 1.15.2-20Jakub Hrozek - 1.15.2-19Jakub Hrozek - 1.15.2-18Jakub Hrozek - 1.15.2-17Jakub Hrozek - 1.15.2-16Jakub Hrozek - 1.15.2-15Jakub Hrozek - 1.15.2-14Jakub Hrozek - 1.15.2-13Jakub Hrozek - 1.15.2-12Jakub Hrozek - 1.15.2-11Jakub Hrozek - 1.15.2-10Jakub Hrozek - 1.15.2-9Jakub Hrozek - 1.15.2-8Jakub Hrozek - 1.15.2-7Jakub Hrozek - 1.15.2-6Jakub Hrozek - 1.15.2-5Jakub Hrozek - 1.15.2-4Jakub Hrozek - 1.15.2-3Jakub Hrozek - 1.15.2-2Jakub Hrozek - 1.15.2-1Fabiano Fidêncio - 1.15.1-2Jakub Hrozek - 1.15.1-1Jakub Hrozek - 1.15.0-2Jakub Hrozek - 1.15.0-1Jakub Hrozek - 1.14.0-46Jakub Hrozek - 1.14.0-45Jakub Hrozek - 1.14.0-44Jakub Hrozek - 1.14.0-43Jakub Hrozek - 1.14.0-42Jakub Hrozek - 1.14.0-41Jakub Hrozek - 1.14.0-40Jakub Hrozek - 1.14.0-39Jakub Hrozek - 1.14.0-38Jakub Hrozek - 1.14.0-37Jakub Hrozek - 1.14.0-36Jakub Hrozek - 1.14.0-35Jakub Hrozek - 1.14.0-34Jakub Hrozek - 1.14.0-33Jakub Hrozek - 1.14.0-32Jakub Hrozek - 1.14.0-31Jakub Hrozek - 1.14.0-30Jakub Hrozek - 1.14.0-29Jakub Hrozek - 1.14.0-28Jakub Hrozek - 1.14.0-27Jakub Hrozek - 1.14.0-26Jakub Hrozek - 1.14.0-25Jakub Hrozek - 1.14.0-24Jakub Hrozek - 1.14.0-23Jakub Hrozek - 1.14.0-22Jakub Hrozek - 1.14.0-21Jakub Hrozek - 1.14.0-20Jakub Hrozek - 1.14.0-19Jakub Hrozek - 1.14.0-18Jakub Hrozek - 1.14.0-17Jakub Hrozek - 1.14.0-16Jakub Hrozek - 1.14.0-15Jakub Hrozek - 1.14.0-14Jakub Hrozek - 1.14.0-13Jakub Hrozek - 1.14.0-12Jakub Hrozek - 1.14.0-11Jakub Hrozek - 1.14.0-10Jakub Hrozek - 1.14.0-9Jakub Hrozek - 1.14.0-8Jakub Hrozek - 1.14.0-7Jakub Hrozek - 1.14.0-6Jakub Hrozek - 1.14.0-5Jakub Hrozek - 1.14.0-4Jakub Hrozek - 1.14.0-3Jakub Hrozek - 1.14.0-2Jakub Hrozek - 1.14.0-1Jakub Hrozek - 1.14.0beta1-2Jakub Hrozek - 1.14.0alpha-1Jakub Hrozek - 1.13.0-50Jakub Hrozek - 1.13.0-49Jakub Hrozek - 1.13.0-48Jakub Hrozek - 1.13.0-47Jakub Hrozek - 1.13.0-46Jakub Hrozek - 1.13.0-45Jakub Hrozek - 1.13.0-44Jakub Hrozek - 1.13.0-43Jakub Hrozek - 1.13.0-42Jakub Hrozek - 1.13.0-41Jakub Hrozek - 1.13.0-40Jakub Hrozek - 1.13.0-39Jakub Hrozek - 1.13.0-38Jakub Hrozek - 1.13.0-37Jakub Hrozek - 1.13.0-36Jakub Hrozek - 1.13.0-35Jakub Hrozek - 1.13.0-34Jakub Hrozek - 1.13.0-33Jakub Hrozek - 1.13.0-32Jakub Hrozek - 1.13.0-31Jakub Hrozek - 1.13.0-30Jakub Hrozek - 1.13.0-29Jakub Hrozek - 1.13.0-28Jakub Hrozek - 1.13.0-27Jakub Hrozek - 1.13.0-26Martin Kosek - 1.13.0-25Jakub Hrozek - 1.13.0-24Jakub Hrozek - 1.13.0-23Jakub Hrozek - 1.13.0-22Jakub Hrozek - 1.13.0-21Jakub Hrozek - 1.13.0-20Jakub Hrozek - 1.13.0-19Jakub Hrozek - 1.13.0-18Jakub Hrozek - 1.13.0-17Jakub Hrozek - 1.13.0-16Jakub Hrozek - 1.13.0-15Jakub Hrozek - 1.13.0-14Lukas Slebodnik - 1.13.0-13Jakub Hrozek - 1.13.0-12Jakub Hrozek - 1.13.0-11Jakub Hrozek - 1.13.0-10Jakub Hrozek - 1.13.0-9Jakub Hrozek - 1.13.0-8Jakub Hrozek - 1.13.0-7Jakub Hrozek - 1.13.0-6Jakub Hrozek - 1.13.0-5Jakub Hrozek - 1.13.0-4Jakub Hrozek - 1.13.0-3Jakub Hrozek - 1.13.0-2Jakub Hrozek - 1.13.0-1Jakub Hrozek - 1.13.0.3alphaJakub Hrozek - 1.13.0.2alphaJakub Hrozek - 1.13.0.1alphaJakub Hrozek - 1.12.2-61Jakub Hrozek - 1.12.2-60Jakub Hrozek - 1.12.2-59Jakub Hrozek - 1.12.2-58.6Jakub Hrozek - 1.12.2-58.5Jakub Hrozek - 1.12.2-58.4Jakub Hrozek - 1.12.2-58.3Jakub Hrozek - 1.12.2-58.2Jakub Hrozek - 1.12.2-58.1Jakub Hrozek - 1.12.2-57Jakub Hrozek - 1.12.2-56Jakub Hrozek - 1.12.2-55Jakub Hrozek - 1.12.2-54Jakub Hrozek - 1.12.2-53Jakub Hrozek - 1.12.2-52Jakub Hrozek - 1.12.2-51Jakub Hrozek - 1.12.2-50Jakub Hrozek - 1.12.2-49Jakub Hrozek - 1.12.2-48Jakub Hrozek - 1.12.2-47Jakub Hrozek - 1.12.2-46Jakub Hrozek - 1.12.2-45Jakub Hrozek - 1.12.2-44Jakub Hrozek - 1.12.2-43Jakub Hrozek - 1.12.2-42Jakub Hrozek - 1.12.2-41Jakub Hrozek - 1.12.2-40Sumit Bose - 1.12.2-39Sumit Bose - 1.12.2-38Sumit Bose - 1.12.2-37Jakub Hrozek - 1.12.2-35Jakub Hrozek - 1.12.2-35Jakub Hrozek - 1.12.2-34Jakub Hrozek - 1.12.2-33Jakub Hrozek - 1.12.2-32Jakub Hrozek - 1.12.2-31Jakub Hrozek - 1.12.2-30Jakub Hrozek - 1.12.2-29Jakub Hrozek - 1.12.2-28Jakub Hrozek - 1.12.2-27Jakub Hrozek - 1.12.2-26Jakub Hrozek - 1.12.2-25Jakub Hrozek - 1.12.2-24Jakub Hrozek - 1.12.2-23Jakub Hrozek - 1.12.2-22Jakub Hrozek - 1.12.2-21Jakub Hrozek - 1.12.2-20Jakub Hrozek - 1.12.2-19Jakub Hrozek - 1.12.2-18Jakub Hrozek - 1.12.2-17Jakub Hrozek - 1.12.2-16Jakub Hrozek - 1.12.2-15Jakub Hrozek - 1.12.2-14Jakub Hrozek - 1.12.2-13Jakub Hrozek - 1.12.2-12Jakub Hrozek - 1.12.2-11Jakub Hrozek - 1.12.2-10Jakub Hrozek - 1.12.2-9Jakub Hrozek - 1.12.2-8Jakub Hrozek - 1.12.2-7Jakub Hrozek - 1.12.2-6Jakub Hrozek - 1.12.2-5Jakub Hrozek - 1.12.2-4Jakub Hrozek - 1.12.2-3Jakub Hrozek - 1.12.2-2Jakub Hrozek - 1.12.2-1Jakub Hrozek - 1.12.1-2Jakub Hrozek - 1.12.1-1Jakub Hrozek - 1.12.1-1Jakub Hrozek - 1.12.0-3Jakub Hrozek - 1.12.0-2Jakub Hrozek - 1.12.0-1Jakub Hrozek - 1.11.2-70Jakub Hrozek - 1.11.2-69Jakub Hrozek - 1.11.2-68Jakub Hrozek - 1.11.2-67Jakub Hrozek - 1.11.2-66Jakub Hrozek - 1.11.2-65Jakub Hrozek - 1.11.2-64Sumit Bose - 1.11.2-63Sumit Bose - 1.11.2-62Jakub Hrozek - 1.11.2-61Jakub Hrozek - 1.11.2-60Jakub Hrozek - 1.11.2-59Jakub Hrozek - 1.11.2-58Jakub Hrozek - 1.11.2-57Jakub Hrozek - 1.11.2-56Jakub Hrozek - 1.11.2-55Jakub Hrozek - 1.11.2-54Jakub Hrozek - 1.11.2-53Jakub Hrozek - 1.11.2-52Jakub Hrozek - 1.11.2-51Jakub Hrozek - 1.11.2-50Jakub Hrozek - 1.11.2-49Jakub Hrozek - 1.11.2-48Jakub Hrozek - 1.11.2-47Jakub Hrozek - 1.11.2-46Jakub Hrozek - 1.11.2-45Jakub Hrozek - 1.11.2-44Jakub Hrozek - 1.11.2-43Jakub Hrozek - 1.11.2-42Jakub Hrozek - 1.11.2-41Jakub Hrozek - 1.11.2-40Jakub Hrozek - 1.11.2-39Jakub Hrozek - 1.11.2-38Jakub Hrozek - 1.11.2-37Jakub Hrozek - 1.11.2-36Jakub Hrozek - 1.11.2-35Jakub Hrozek - 1.11.2-34Daniel Mach - 1.11.2-33Jakub Hrozek - 1.11.2-32Jakub Hrozek - 1.11.2-31Jakub Hrozek - 1.11.2-30Jakub Hrozek - 1.11.2-29Jakub Hrozek - 1.11.2-28Jakub Hrozek - 1.11.2-27Jakub Hrozek - 1.11.2-26Jakub Hrozek - 1.11.2-25Jakub Hrozek - 1.11.2-24Jakub Hrozek - 1.11.2-23Jakub Hrozek - 1.11.2-22Jakub Hrozek - 1.11.2-21Jakub Hrozek - 1.11.2-20Daniel Mach - 1.11.2-19Jakub Hrozek - 1.11.2-18Jakub Hrozek - 1.11.2-17Jakub Hrozek - 1.11.2-16Jakub Hrozek - 1.11.2-15Jakub Hrozek - 1.11.2-14Jakub Hrozek - 1.11.2-13Jakub Hrozek - 1.11.2-12Jakub Hrozek - 1.11.2-11Jakub Hrozek - 1.11.2-10Jakub Hrozek - 1.11.2-9Jakub Hrozek - 1.11.2-8Jakub Hrozek - 1.11.2-7Jakub Hrozek - 1.11.2-6Jakub Hrozek - 1.11.2-5Jakub Hrozek - 1.11.2-4Jakub Hrozek - 1.11.2-3Jakub Hrozek - 1.11.2-2Jakub Hrozek - 1.11.2-1Jakub Hrozek - 1.11.1-2Jakub Hrozek - 1.11.1-1Jakub Hrozek - 1.11.0-1Jakub Hrozek - 1.11.0.1beta2Jakub Hrozek - 1.10.1-5Jakub Hrozek - 1.10.1-4Jakub Hrozek - 1.10.1-3Jakub Hrozek - 1.10.1-2Jakub Hrozek - 1.10.1-1Jakub Hrozek - 1.10.0-18Jakub Hrozek - 1.10.0-17Stephen Gallagher - 1.10.0-16Stephen Gallagher - 1.10.0-15Stephen Gallagher - 1.10.0-14Jakub Hrozek - 1.10.0-13Dan Horák - 1.10.0-12.beta2Jakub Hrozek - 1.10.0-11.beta2Jakub Hrozek - 1.10.0-10.beta2Jakub Hrozek - 1.10.0-9.beta2Jakub Hrozek - 1.10.0-8.beta2Jakub Hrozek - 1.10.0-7.beta1Jakub Hrozek - 1.10.0-6.beta1Jakub Hrozek - 1.10.0-5.beta1Jakub Hrozek - 1.10.0-4.beta1Jakub Hrozek - 1.10.0-3.beta1Jakub Hrozek - 1.10.0-2.alpha1Jakub Hrozek - 1.10.0-1.alpha1Stephen Gallagher - 1.9.4-9Jakub Hrozek - 1.9.4-8Jakub Hrozek - 1.9.4-7Jakub Hrozek - 1.9.4-6Jakub Hrozek - 1.9.4-5Jakub Hrozek - 1.9.4-4Jakub Hrozek - 1.9.4-3Jakub Hrozek - 1.9.4-2Jakub Hrozek - 1.9.4-1Jakub Hrozek - 1.9.3-1Jakub Hrozek - 1.9.2-5Jakub Hrozek - 1.9.2-4Jakub Hrozek - 1.9.2-3Jakub Hrozek - 1.9.2-2Jakub Hrozek - 1.9.2-1Jakub Hrozek - 1.9.1-1Jakub Hrozek - 1.9.0-24Jakub Hrozek - 1.9.0-24Jakub Hrozek - 1.9.0-23Jakub Hrozek - 1.9.0-22.rc1Jakub Hrozek - 1.9.0-21.beta7Jakub Hrozek - 1.9.0-20.beta6Jakub Hrozek - 1.9.0-19.beta6Jakub Hrozek - 1.9.0-18.beta6Jakub Hrozek - 1.9.0-17.beta6Jakub Hrozek - 1.9.0-16.beta6Jakub Hrozek - 1.9.0-14.beta6Jakub Hrozek - 1.9.0-13.beta6Fedora Release Engineering - 1.9.0-13.beta5Jakub Hrozek - 1.9.0-12.beta5Stephen Gallagher - 1.9.0-11.beta4Jakub Hrozek - 1.9.0-10.beta4Jakub Hrozek - 1.9.0-9.beta4Stephen Gallagher - 1.9.0-8.beta3Stephen Gallagher - 1.9.0-7.beta2Stephen Gallagher - 1.9.0-6.beta2Stephen Gallagher - 1.9.0-5.beta2Stephen Gallagher - 1.9.0-4.beta1Stephen Gallagher - 1.9.0-3.beta1Stephen Gallagher - 1.9.0-2.beta1Stephen Gallagher - 1.9.0-1.beta1Stephen Gallagher - 1.8.3-11Stephen Gallagher - 1.8.2-10Stephen Gallagher - 1.8.1-9Stephen Gallagher - 1.8.1-8Stephen Gallagher - 1.8.1-7Stephen Gallagher - 1.8.0-6Stephen Gallagher - 1.8.0-5.beta3Stephen Gallagher - 1.8.0-4.beta3Petr Pisar - 1.8.0-3.beta2Stephen Gallagher - 1.8.0-1.beta2Stephen Gallagher - 1.8.0-1.beta1Stephen Gallagher - 1.7.0-5Stephen Gallagher - 1.7.0-4Stephen Gallagher - 1.7.0-3Fedora Release Engineering - 1.7.0-2Stephen Gallagher - 1.7.0-1Stephen Gallagher - 1.6.4-1Stephen Gallagher - 1.6.3-5Stephen Gallagher - 1.6.3-4Jakub Hrozek - 1.6.3-3Stephen Gallagher - 1.6.3-2Stephen Gallagher - 1.6.3-1Fedora Release Engineering - 1.6.2-5Stephen Gallagher - 1.6.2-4Stephen Gallagher - 1.6.2-3Stephen Gallagher - 1.6.2-2Stephen Gallagher - 1.6.2-1Stephen Gallagher - 1.6.1-1Stephen Gallagher - 1.6.0-2Stephen Gallagher - 1.6.0-1Stephen Gallagher - 1.5.11-2Stephen Gallagher - 1.5.10-1Stephen Gallagher - 1.5.9-1Stephen Gallagher - 1.5.8-1Stephen Gallagher - 1.5.7-3Stephen Gallagher - 1.5.7-2Stephen Gallagher - 1.5.7-1Stephen Gallagher - 1.5.6.1-1Stephen Gallagher - 1.5.6-1Stephen Gallagher - 1.5.5-5Stephen Gallagher - 1.5.5-4Stephen Gallagher - 1.5.5-3Stephen Gallagher - 1.5.5-2Stephen Gallagher - 1.5.5-1Stephen Gallagher - 1.5.4-1Stephen Gallagher - 1.5.3-2Stephen Gallagher - 1.5.3-1Stephen Gallagher - 1.5.2-1Simo Sorce - 1.5.1-9Stephen Gallagher - 1.5.1-8Stephen Gallagher - 1.5.1-7Stephen Gallagher - 1.5.1-6Stephen Gallagher - 1.5.1-5Fedora Release Engineering - 1.5.1-4Stephen Gallagher - 1.5.1-3Stephen Gallagher - 1.5.1-2Stephen Gallagher - 1.5.1-1Stephen Gallagher - 1.5.0-2Stephen Gallagher - 1.5.0-1Stephen Gallagher - 1.4.1-3Stephen Gallagher - 1.4.1-2Stephen Gallagher - 1.4.1-1Stephen Gallagher - 1.4.0-2Stephen Gallagher - 1.4.0-1Stephen Gallagher - 1.3.0-35Stephen Gallagher - 1.3.0-34Stephen Gallagher - 1.3.0-33Stephen Gallagher - 1.3.0-32Stephen Gallagher - 1.3.0-31Stephen Gallagher - 1.3.0-30David Malcolm - 1.2.91-21Stephen Gallagher - 1.2.91-20Stephen Gallagher - 1.2.1-15Stephen Gallagher - 1.2.0-12Stephen Gallagher - 1.1.92-11Stephen Gallagher - 1.1.91-10Simo Sorce - 1.1.1-3Stephen Gallagher - 1.1.1-1Stephen Gallagher - 1.1.0-2Stephen Gallagher - 1.1.0-1.pre20100317git0ea7f19Stephen Gallagehr - 1.0.5-2Stephen Gallagher - 1.0.5-1Stephen Gallagher - 1.0.4-1Stephen Gallagher - 1.0.3-1Stephen Gallagher - 1.0.2-1Stephen Gallagher - 1.0.1-1Stephen Gallagher - 1.0.0-2Stephen Gallagher - 1.0.0-1Stephen Gallagher - 0.99.1-1Stephen Gallagher - 0.99.0-1Stephen Gallagher - 0.7.1-1Stephen Gallagher - 0.7.0-2Stephen Gallagher - 0.7.0-1Stephen Gallagher - 0.6.1-2Stephen Gallagher - 0.6.1-1Stephen Gallagher - 0.6.0-1Sumit Bose - 0.6.0-0Simo Sorce - 0.5.0-0Jakub Hrozek - 0.4.1-4Fedora Release Engineering - 0.4.1-3Simo Sorce - 0.4.1-2Simo Sorce - 0.4.1-1Simo Sorce - 0.4.1-0Simo Sorce - 0.3.2-2Jakub Hrozek - 0.3.2-1Simo Sorce - 0.3.1-2Simo Sorce - 0.3.1-1Simo Sorce - 0.3.0-2Simo Sorce - 0.3.0-1Simo Sorce - 0.2.1-1Simo Sorce - 0.2.0-1Jakub Hrozek - 0.1.0-5.20090309git691c9b3Jakub Hrozek - 0.1.0-4Sumit Bose - 0.1.0-3Jakub Hrozek - 0.1.0-2Stephen Gallagher - 0.1.0-1- Resolves: rhbz#1842861 - sssd boots offline if symlink for /etc/resolv.conf is broken/missing [rhel-7.8.z] - Resolves: rhbz#1845009 - [Bug] Reduce logging about flat names [rhel-7.8.z]- Resolves: rhbz#1817380 - Removing an IPA sub-group should NOT remove the members from indirect parent that also belong to other subgroups [rhel-7.8.z]- Resolves: rhbz#1816031 - SSSD is crashing: dbus_watch_handle() is invoked with corrupted 'watch' value [rhel-7.8.z]- Resolves: rhbz#1801208 - id command taking 1+ minute for returning user information [rhel-7.8.z] - Also updates spec file to not replace /pam.d/sssd-shadowutils on update- Resolves: rhbz#1784620 - Force LDAPS over 636 with AD Access Provider - just bumping the version to fix generated dates in man pages- Resolves: rhbz#1784620 - Force LDAPS over 636 with AD Access Provider- Resolves: rhbz#1769755 - sssd failover leads to delayed and failed logins- Resolves: rhbz#1768404 - automount on RHEL7 gives the message 'lookup(sss): setautomntent: No such file or directory'- Resolves: rhbz#1734056 - [sssd] RHEL 7.8 Tier 0 Localization- Resolves: rhbz#1530741 - Trusted domain user logins succeed after using ipa trustdomain-disable- Resolves: rhbz#1746878 - Let IPA client read IPA objects via LDAP and not a extdom plugin when resolving trusted users and groups- Resolves: rhbz#1530741 - Trusted domain user logins succeed after using ipa trustdomain-disable- Resolves: rhbz#1713352 - Implicit files domain gets activated when no sssd.conf present and sssd is started- Resolves: rhbz#1206221 - sssd should not always read entire autofs map from ldap- Resolves: rhbz#1657978 - SSSD is not refreshing cached user data for the ipa sub-domain in a IPA/AD trust- Resolves: rhbz#1541172 - ad_enabled_domains does not disable old subdomain after a restart until a timer removes it- Resolves: rhbz#1738674 - Paging not enabled when fetching external groups, limits the number of external groups to 2000- Resolves: rhbz#1650018 - SSSD doesn't clear cache entries for IDs below min_id- Resolves: rhbz#1724088 - negative cache does not use values from 'filter_users' config option for known domains- Resolves: rhbz#1422618 - sssd does not failover to another IPA server if just the KDC service fails - Just bumping the version to work around "build already exists"- Resolves: rhbz#1714952 - [sssd] RHEL 7.7 Tier 0 Localization - Rebuild japanese gmo file explicitly- Resolves: rhbz#1714952 - [sssd] RHEL 7.7 Tier 0 Localization- Resolves: rhbz#1707959 - sssd does not properly check GSS-SPNEGO- Resolves: rhbz#1710286 - The server error message is not returned if password change fails- Resolves: rhbz#1711832 - The files provider does not handle resetOffline properly- Resolves: rhbz#1707759 - Error accessing files on samba share randomly- Resolves: rhbz#1685581 - Extend cached_auth_timeout to cover subdomains /trusts- Resolves: rhbz#1684979 - The HBAC code requires dereference to be enabled and fails otherwise- Resolves: rhbz#1576524 - RHEL STIG pointing sssd Packaging issue - This was partially fixed by the rebase, but one spec file change was missing.- Resolves: rhbz#1524566 - FIPS mode breaks using pysss.so (sss_obfuscate)- Resolves: rhbz#1350012 - kinit / sssd kerberos fail over - Resolves: rhbz#720688 - [RFE] return multiple server addresses to the Kerberos locator plugin- Resolves: rhbz#1402056 - [RFE] Make 2FA prompting configurable- Resolves: rhbz#1666819 - SSSD can trigger a NSS lookup when parsing the filter_users/groups lists on startup, this can block the startup- Resolves: rhbz#1645461 - Slow ldb search causes blocking during startup which might cause the registration to time out- Resolves: rhbz#1685581 - Extend cached_auth_timeout to cover subdomains / trusts- Resolves: rhbz#1671138 - User is unable to perform sudo as a user on IPA Server, even though `sudo -l` shows permissions to do so- Resolves: rhbz#1657806 - [RFE]: Optionally disable generating auto private groups for subdomains of an AD provider- Resolves: rhbz#1641131 - [RFE] Need an option in SSSD so that it will skip GPOs that have groupPolicyContainers, unreadable by SSSD. - Resolves: rhbz#1660874 - CVE-2018-16838 sssd: improper implementation of GPOs due to too restrictive permissions [rhel-7]- Resolves: rhbz#1631656 - KCM: kinit: Matching credential not found while getting default ccache- Resolves: rhbz#1406678 - sssd service is starting before network service - Resolves: rhbz#1616853 - SSSD always boots in Offline mode- Resolves: rhbz#1658994 - Rebase SSSD to 1.16.x- Resolves: rhbz#1603311 - Enable generating user private groups only for users with uid == gid where gid does not correspond to a real LDAP group- Resolves: rhbz#1602172 - SSSD's LDAP authentication provider does not work if ID provider is authenticated with GSSAPI- Resolves: rhbz#1622109 - SSSD not fetching all sudo rules from AD- Resolves: rhbz#1619706 - sssd only sets the SELinux login context if it differs from the default- Resolves: rhbz#1593756 - sssd needs to require a newer version of libtalloc and libtevent to avoid an issue in GPO processing- Resolves: rhbz#1610667 - sssd_ssh leaks file descriptors when more than one certificate is converted into an SSH key - Resolves: rhbz#1583360 - The IPA selinux provider can return an error if SELinux is completely disabled- Resolves: rhbz#1602781 - Local users failed to login with same password- Resolves: rhbz#1586127 - Spurious check in the sssd nss memcache can cause the memory cache to be skipped- Resolves: rhbz#1522928 - sssd doesn't allow user with expired password- Resolves: rhbz#1607313 - When sssd is running as non-root user, the sudo pipe is created as sssd:sssd but then the private pipe ownership fails- Resolves: rhbz#1600822 - SSSD bails out saving desktop profiles in case an invalid profile is found- Resolves: rhbz#1582975 - The search filter for detecting POSIX attributes in global catalog is too broad and can cause a high load on the servers- Resolves: rhbz#1583725 - SSSD AD uses LDAP filter to detect POSIX attributes stored in AD GC also for regular AD DC queries - Resolves: rhbz#1416528 - sssd in cross realm trust configuration should be able to use AD KDCs from a client site defined in sssd.conf or a snippet - Resolves: rhbz#1592964 - Groups go missing with PAC enabled in sssd- Resolves: rhbz#1590603 - EMBARGOED CVE-2018-10852 sssd: information leak from the sssd-sudo responder [rhel-7] - Resolves: rhbz#1450778 - Full information regarding priority of lookup of principal in keytab not in man page- Resolves: rhbz#1494690 - kdcinfo files are not created for subdomains of a directly joined AD client - Resolves: rhbz#1583343 - Login with sshkeys stored in ipa not working after update to RHEL-7.5 - Resolves: rhbz#1527662 - Handle conflicting e-mail addresses more gracefully - Resolves: rhbz#1509691 - Document how to change the regular expression for SSSD so that group names with an @-sign can be parsed- Related: rhbz#1558498 - Rebase sssd to the latests upstream release of the 1.16 branch- Resolves: rhbz#1558498 - Rebase sssd to the latests upstream release of the 1.16 branch - Resolves: rhbz#1523019 - Reset password with two factor authentication fails - Resolves: rhbz#1534749 - Requesting an AD user's private group and then the user itself returns an emty homedir - Resolves: rhbz#1537272 - SSH public key authentication keeps working after keys are removed from ID view - Resolves: rhbz#1537279 - Certificate is not removed from cache when it's removed from the override - Resolves: rhbz#1562025 - externalUser sudo attribute must be fully-qualified - Resolves: rhbz#1577335 - /usr/libexec/sssd/sssd_autofs SIGABRT crash daily - Resolves: rhbz#1508530 - How should sudo behave without sudoHost attribute? - Resolves: rhbz#1546754 - The man page of sss_ssh_authorizedkeys can be enhanced to better explain how the keys are retrieved and how X.509 certificates can be used - Resolves: rhbz#1572790 - getgrgid/getpwuid fails in setups with multiple domains if the first domain uses mid_id/max_id - Resolves: rhbz#1561562 - sssd not honoring dyndns_server if the DNS update process is terminated with a signal - Resolves: rhbz#1583251 - home dir disappear in sssd cache on the IPA master for AD users - Resolves: rhbz#1514061 - ID override GID from Default Trust View is not properly resolved in case domain resolution order is set - Resolves: rhbz#1571466 - Utilizing domain_resolution_order in sssd.conf breaks SELinux user map - Resolves: rhbz#1571526 - SSSD with ID provider 'ad' should give a warning in case the ldap schema is manually changed to something different than 'ad'.- Resolves: rhbz#1547782 - The SSSD IPA provider allocates information about external groups on a long lived memory context, causing memory growth of the sssd_be process- Related: rhbz#1578291 - Samba can not register sss idmap module because it's using an outdated SMB_IDMAP_INTERFACE_VERSION- Resolves: rhbz#1578291 - Samba can not register sss idmap module because it's using an outdated SMB_IDMAP_INTERFACE_VERSION- Resolves: rhbz#1516266 - Give a more detailed debug and system-log message if krb5_init_context() failed - Resolves: rhbz#1503802 - Smartcard authentication fails if SSSD is offline and 'krb5_store_password_if_offline = True' - Resolves: rhbz#1385665 - Incorrect error code returned from krb5_child (updated) - Resolves: rhbz#1547234 - SSSD's GPO code ignores ad_site option - Resolves: rhbz#1459348 - extend sss-certmap man page regarding priority processing - Resolves: rhbz#1220767 - Group renaming issue when "id_provider = ldap" is set - Resolves: rhbz#1538555 - crash in nss_protocol_fill_netgrent. sssd_nss[19234]: segfault at 80 ip 000055612688c2a0 sp 00007ffddf9b9cd0 error 4 in sssd_nss[55612687e000+39000]- Resolves: rhbz#1565774 - After updating to RHEL 7.5 failing to clear the sssd cache- Resolves: rhbz#1566782 - memory management issue in the sssd_nss_ex interface can cause the ns-slapd process on IPA server to crash- Related: rhbzrhbz#1544943 - sssd goes offline when renewing expired ticket- Resolves: rhbz#1543348 - sssd_be consumes more memory on RHEL 7.4 systems. - Resolves: rhbz#1544943 - sssd goes offline when renewing expired ticket- Resolves: rhbz#1523282 - sssd used wrong search base with wrong AD server- Resolves: rhbz#1538643 - SSSD crashes when retrieving a Desktop Profile with no specific host/hostgroup set - Related: rhbz#1441908 - SELINUX: Use getseuserbyname to get IPA seuser - Related: rhbz#1327705 - [RFE] Automatic creation of user private groups on RHEL clients joined to AD via sssd [RHEL 7]- Resolves: rhbz#1517971 - AD Domain goes offline immediately during subdomain initialization - IPA AD Trust - Related: rhbz#1482555 - sysdb index improvements - missing ghost attribute indexing, unneeded objectclass index etc.. - Related: rhbz#1327705 - [RFE] Automatic creation of user private groups on RHEL clients joined to AD via sssd [RHEL 7] - Resolves: rhbz#1527149 - AD provider - AD BUILTIN groups are cached with gidNumber = 0 - Related: rhbz#1461899 - Loading enterprise principals doesn't work with a primed cache - Related: rhbz#1473571 - ipa-extdom-extop plugin can exhaust DS worker threads- Resolves: rhbz#1525644 - dbus-send unable to find user by CAC cert- Resolves: rhbz#1523010 - IPA user able to authenticate with revoked cert on smart card- Resolves: rhbz#1512027 - NSS by-id requests are not checked against max_id/min_id ranges before triggering the backend- Related: rhbz#1507614 - Improve Smartcard integration if multiple certificates or multiple mapped identities are available - Resolves: rhbz#1523010 - IPA user able to authenticate with revoked cert on smart card - Resolves: rhbz#1520984 - getent output is not showing home directory for IPA AD trusted user - Related: rhbz#1473571 - ipa-extdom-extop plugin can exhaust DS worker threads- Resolves: rhbz#1421194 - SSSD doesn't use AD global catalog for gidnumber lookup, resulting in unacceptable delay for large forests- Resolves: rhbz#1482231 - sssd_nss consumes more memory until restarted or machine swaps - Resolves: rhbz#1512508 - SSSD fails to fetch group information after switching IPA client to a non-default view- Resolves: rhbz#1490120 - SSSD complaining about corrupted mmap cache and logging error in /var/log/messages and /var/log/sssd/sssd_nss.log- Resolves: rhbz#1272214 - [RFE] Create a local per system report about who can access that IDM client (attestation) - Resolves: rhbz#1482555 - sysdb index improvements - missing ghost attribute indexing, unneeded objectclass index etc.. - Resolves: rhbz#888739 - Enumerating large number of users makes sssd_be hog the cpu for a long time. - Resolves: rhbz#1373547 - SSSD performance issue with malloc and brk calls - Resolves: rhbz#1472255 - Improve SSSD performance in the 7.5 release- Related: rhbz#1460724 - SYSLOG_IDENTIFIER is different - Related: rhbz#1432010 - SSSD ships a drop-in configuration snippet in /etc/systemd/system - Related: rhbz#1507614 - Improve Smartcard integration if multiple certificates or multiple mapped identities are available- Resolves: rhbz#1507614 - Improve Smartcard integration if multiple certificates or multiple mapped identities are available - Related: rhbz#1499659 - CVE-2017-12173 sssd: unsanitized input when searching in local cache database [rhel-7.5] - Resolves: rhbz#1408294 - SSSD authentication fails when two IPA accounts share an email address without a clear way to debug the problem - Resolves: rhbz#1502686 - crash - /usr/libexec/sssd/sssd_nss in nss_setnetgrent_timeout- Related: rhbz#1460724 - SYSLOG_IDENTIFIER is different - Related: rhbz#1459609 - When sssd is configured with id_provider proxy and auth_provider ldap, login fails if the LDAP server is not allowing anonymous binds.- Resolves: rhbz#1473571 - ipa-extdom-extop plugin can exhaust DS worker threads- Resolves: rhbz#1484376 - [RFE] Add a configuration option to SSSD to disable the memory cache - Resolves: rhbz#1327705 - Automatic creation of user private groups on RHEL clients joined to AD via sssd [RHEL 7] - Resolves: rhbz#1505277 - Race condition between refreshing the cr_domain list and a request that is using the list can cause a segfault is sssd_nss - Resolves: rhbz#1462343 - document information on why SSSD does not use host-based security filtering when processing AD GPOs - Resolves: rhbz#1498734 - sssd_be stuck in an infinite loop after completing full refresh of sudo rules - Resolves: rhbz#1400614 - [RFE] sssd should remember DNS sites from first search - Resolves: rhbz#1460724 - SYSLOG_IDENTIFIER is different - Resolves: rhbz#1459609 - When sssd is configured with id_provider proxy and auth_provider ldap, login fails if the LDAP server is not allowing anonymous binds.- Resolves: rhbz#1469791 - Rebase SSSD to version 1.16+ - Resolves: rhbz#1132264 - Allow sssd to retrieve sudo rules of local users whose sudo rules stored in ldap server - Resolves: rhbz#1301740 - sssd can be marked offline if a trusted domain is not reachable - Resolves: rhbz#1399262 - Use TCP for kerberos with AD by default - Resolves: rhbz#1416150 - RFE: Log to syslog when sssd cannot contact servers, goes offline - Resolves: rhbz#1441908 - SELINUX: Use getseuserbyname to get IPA seuser - Resolves: rhbz#1454559 - python-sssdconfig doesn't parse hexadecimal debug _level, resulting in set_option(): /usr/lib/python2.7/site-packages/SSSDConfig/__init__.py killed by TypeError - Resolves: rhbz#1456968 - MAN: document that attribute 'provider' is not allowed in section 'secrets' - Resolves: rhbz#1460689 - KCM/secrets: Storing many secrets in a rapid succession segfaults the secrets responder - Resolves: rhbz#1464049 - Idle nss file descriptors should be closed - Resolves: rhbz#1468610 - sssd_be is utilizing more CPU during sudo rules refresh - Resolves: rhbz#1474711 - Querying the AD domain for external domain's ID can mark the AD domain offline - Resolves: rhbz#1479398 - samba shares with sssd authentication broken on 7.4 - Resolves: rhbz#1479983 - id root triggers an LDAP lookup - Resolves: rhbz#1489895 - Issues with certificate mapping rules - Resolves: rhbz#1490501 - sssd incorrectly checks 'try_inotify' thinking it is the wrong section - Resolves: rhbz#1490913 - MAN: Document that full_name_format must be set if the output of trusted domains user resolution should be shortnames only - Resolves: rhbz#1499659 - CVE-2017-12173 sssd: unsanitized input when searching in local cache database [rhel-7.5] - Resolves: rhbz#1461899 - Loading enterprise principals doesn't work with a primed cache - Resolves: rhbz#1482674 - SUDO doesn't work for IPA users on IPA clients after applying ID Views for them in IPA server - Resolves: rhbz#1486053 - Accessing IdM kerberos ticket fails while id mapping is applied - Resolves: rhbz#1486786 - sssd going in offline mode due to sudo search filter. - Resolves: rhbz#1500087 - SSSD creates bad override search filter due to AD Trust object with parenthesis - Resolves: rhbz#1502713 - SSSD can crash due to ABI changes in libldb >= 1.2.0 (1.1.30) - Resolves: rhbz#1461462 - sssd_client: add mutex protected call to the PAC responder - Resolves: rhbz#1489666 - Combination sssd-ad and postfix recieve incorrect mail with asterisks or spaces - Resolves: rhbz#1525052 - sssd_krb5_localauth_plugin fails to fallback to otheri localname rules- Require the 7.5 libldb version which broke ABI - Related: rhbz#1469791 - Rebase SSSD to version 1.16+- Resolves: rhbz#1457926 - Wrong search base used when SSSD is directly connected to AD child domain- Resolves: rhbz#1450107 - SSSD doesn't handle conflicts between users from trusted domains with the same name when shortname user resolution is enabled- Resolves: rhbz#1459846 - krb5: properly handle 'password expired' information retured by the KDC during PKINIT/Smartcard authentication- Resolves: rhbz#1430415 - ldap_purge_cache_timeout in RHEL7.3 invalidate most of the entries once the cleanup task kicks in- Resolves: rhbz#1455254 - Make domain available as user attribute- Resolves: rhbz#1449731 - IPA client cannot change AD Trusted User password- Resolves: rhbz#1457927 - getent failed to fetch netgroup information after changing default_domain_suffix to ADdomin in /etc/sssd/sssd.conf- Resolves: rhbz#1440132 - fiter_users and filter_groups stop working properly in v 1.15- Resolves: rhbz#1449728 - LDAP to IPA migration doesn't work in master- Resolves: rhbz#1445445 - Smart card login fails if same cert mapped to IdM user and AD user- Resolves: rhbz#1449729 - org.freedesktop.sssd.infopipe.GetUserGroups does not resolve groups into names with AD- Resolves: rhbz#1450094 - Properly support IPA's promptusername config option- Resolves: rhbz#1457644 - Segfault in access_provider = krb5 is set in sssd.conf due to an off-by-one error when constructing the child send buffer - Resolves: rhbz#1456531 - Option name typos are not detected with validator function of sssctl config-check command in domain sections- Resolves: rhbz#1428906 - sssd intermittently failing to resolve groups for an AD user in IPA-AD trust environment.- Resolves: rhbz#1389796 - Smartcard authentication with UPN as logon name might fail - Fix Coverity issues in patches for rhbz#1445445- Resolves: rhbz#1445445 - Smart card login fails if same cert mapped to IdM user and AD user- Resolves: rhbz#1446302 - crash in sssd-kcm due to a race-condition between two concurrent requests- Resolves: rhbz#1389796 - Smartcard authentication with UPN as logon name might fail- Resolves: rhbz#1306707 - Need better debug message when krb5_child returns an unhandled error, leading to a System Error PAM code- Resolves: rhbz#1446535 - Group resolution does not work in subdomain without ad_server option- Resolves: rhbz#1449726 - sss_nss_getlistbycert() does not return results from multiple domains - Resolves: rhbz#1447098 - sssd unable to search dbus for ipa user by certificate - Additional patch for rhbz#1440132- Reapply patch by Lukas Slebodnik to fix upgrade issues with libwbclient - Resolves: rhbz#1439457 - SSSD does not start after upgrade from 7.3 to 7.4 - Resolves: rhbz#1449107 - error: %pre(sssd-common-1.15.2-26.el7.x86_64) scriptlet failed, exit status 3- Resolves: rhbz#1440132 - fiter_users and filter_groups stop working properly in v 1.15 - Also apply an additional patch for rhbz#1441545- Resolves: rhbz#1445445 - Smart card login fails if same cert mapped to IdM user and AD user- Resolves: rhbz#1434992 - Wrong pam return code for user from subdomain with ad_access_filter- Resolves: rhbz#1430494 - expect sss_ssh_authorizedkeys and sss_ssh_knownhostsproxy manuals to be packaged into sssd-common package- Resolves: rhbz#1427749 - SSSD in server mode iterates over all domains for group-by-GID requests, causing unnecessary searches- Resolves: rhbz#1446139 - Infopipe method ListByCertificate does not return the users with overrides- Resolves: rhbz#1441545 - With multiple subdomain sections id command output for user is not displayed for both domains- Resolves: rhbz#1428866 - Using ad_enabled_domains configuration option in sssd.conf causes nameservice lookups to fail.- Remove an unused variable from the sssd-secrets responder - Related: rhbz#1398701 - [sssd-secrets] https proxy talks plain http - Improve two DEBUG messages in the client trust code to aid troubleshooting - Fix standalone application domains - Related: rhbz#1425891 - Support delivering non-POSIX users and groups through the IFP and PAM interfaces- Allow completely server-side unqualified name resolution if the domain order is set, do not require any client-side changes - Related: rhbz#1330196 - [RFE] Short name input format with SSSD for users from all domains when domain autodiscovery is used or when IPA client resolves trusted AD domain users- Resolves: rhbz#1402532 - D-Bus interface of sssd is giving inappropriate group information for trusted AD users- Resolves: rhbz#1431858 - Wrong principal found with ad provider and long host name- Resolves: rhbz#1415167 - pam_acct_mgmt with pam_sss.so fails in unprivileged container unless selinux_provider = none is used- Resolves: rhbz#1438388 - [abrt] [faf] sssd: unknown function(): /usr/libexec/sssd/sssd_pam killed by 6- Resolves: rhbz#1432112 - sssctl config-check does not give any error when default configuration file is not present- Resolves: rhbz#1438374 - [abrt] [faf] sssd: vfprintf(): /usr/libexec/sssd/sssd_be killed by 11- Resolves: rhbz#1427195 - sssd_nss consumes more memory until restarted or machine swaps- Resolves: rhbz#1414023 - Create troubleshooting tool to determine if a failure is in SSSD or not when using layered products like RH-SSO/CFME etc- Resolves: rhbz#1398701 - [sssd-secrets] https proxy talks plain http- Fix off-by-one error in the KCM responder - Related: rhbz#1396012 - [RFE] KCM ccache daemon in SSSD- Resolves: rhbz#1425891 - Support delivering non-POSIX users and groups through the IFP and PAM interfaces- Resolves: rhbz#1434991 - Issue processing ssh keys from certificates in ssh respoder- Resolves: rhbz#1330196 - [RFE] Short name input format with SSSD for users from all domains when domain autodiscovery is used or when IPA client resolves trusted AD domain users - Also backport some buildtime fixes for the KCM responder - Related: rhbz#1396012 - [RFE] KCM ccache daemon in SSSD- Resolves: rhbz#1396012 - [RFE] KCM ccache daemon in SSSD- Resolves: rhbz#1340711 - [RFE] Use one smartcard and certificate for authentication to distinct logon accounts- Update to upstream 1.15.2 - https://docs.pagure.org/SSSD.sssd/users/relnotes/notes_1_15_2.html - Resolves: rhbz#1418728 - IPA - sudo does not handle associated conflict entries - Resolves: rhbz#1386748 - sssd doesn't update PTR records if A/PTR zones are configured as non-secure and secure - Resolves: rhbz#1214491 - [RFE] Make it possible to configure AD subdomain in the SSSD server mode- Drop "NOUPSTREAM: Bundle http-parser" patch Related: rhbz#1393819 - New package: http-parser- Update to upstream 1.15.1 - https://docs.pagure.org/SSSD.sssd/users/relnotes/notes_1_15_1.html - Resolves: rhbz#1327085 - Don't prompt for password if there is already one on the stack - Resolves: rhbz#1378722 - [RFE] Make GETSIDBYNAME and GETORIGBYNAME request aware of UPNs and aliases - Resolves: rhbz#1405075 - [RFE] Add PKINIT support to SSSD Kerberos provider - Resolves: rhbz#1416526 - Need correction in sssd-krb5 man page - Resolves: rhbz#1418752 - pam_sss crashes in do_pam_conversation if no conversation function is provided by the client app - Resolves: rhbz#1419356 - Fails to accept any sudo rules if there are two user entries in an ldap role with the same sudo user - Resolves: rhbz#1421622 - SSSD - Users/Groups are cached as mixed-case resulting in users unable to sign in- Fix several packaging issues, notably the p11_child is no longer setuid and the libwbclient used a wrong version number in the symlink- Update to upstream 1.15.0 - Resolves: rhbz#1393824 - Rebase SSSD to version 1.15 - Resolves: rhbz#1407960 - wbcLookupSid() fails in pdomain is NULL - Resolves: rhbz#1406437 - sssctl netgroup-show Cannot allocate memory - Resolves: rhbz#1400422 - Use-after free in resolver in case the fd is writeable and readable at the same time - Resolves: rhbz#1393085 - bz - ldap group names don't resolve after upgrading sssd to 1.14.0 if ldap_nesting_level is set to 0 - Resolves: rhbz#1392444 - sssd_be keeps crashing - Resolves: rhbz#1392441 - sssd fails to start after upgrading to RHEL 7.3 - Resolves: rhbz#1382602 - autofs map resolution doesn't work offline - Resolves: rhbz#1380436 - sudo: ignore case on case insensitive domains - Resolves: rhbz#1378251 - Typo In SSSD-AD Man Page - Resolves: rhbz#1373427 - Clock skew makes SSSD return System Error - Resolves: rhbz#1306707 - Need better handling of "Server not found in Kerberos database" - Resolves: rhbz#1297462 - Don't include 'enable_only=sssd' in the localauth plugin config- Resolves: rhbz#1382598 - IPA: Uninitialized variable during subdomain check- Resolves: rhbz#1378911 - No supplementary groups are resolved for users in nested OUs when domain stanza differs from AD domain- Resolves: rhbz#1372075 - AD provider: SSSD does not retrieve a domain-local group with the AD provider when following AGGUDLP group structure across domains- Resolves: rhbz#1376831 - sssd-common is missing dependency on sssd-sudo- Resolves: rhbz#1371631 - login using gdm calls for gdm-smartcard when smartcard authentication is not enabled- Resolves: rhbz#1373420 - sss_override fails to export- Resolves: rhbz#1375299 - sss_groupshow fails with error "No such group in local domain. Printing groups only allowed in local domain"- Resolves: rhbz#1375182 - SSSD goes offline when the LDAP server returns sizelimit exceeded- Resolves: rhbz#1372753 - Access denied for user when access_provider = krb5 is set in sssd.conf- Resolves: rhbz#1373444 - unable to create group in sssd cache - Resolves: rhbz#1373577 - unable to add local user in sssd to a group in sssd- Resolves: rhbz#1369118 - Don't enable the default shadowtils domain in RHEL- Fix permissions for the private pipe directory - Resolves: rhbz#1362716 - selinux avc denial for vsftp login as ipa user- Resolves: rhbz#1371977 - resolving IPA nested user groups is broken in 1.14- Resolves: rhbz#1368496 - sssd is not able to authenticate with alias- Resolves: rhbz#1371152 - SSSD qualifies principal twice in IPA-AD trust if the principal attribute doesn't exist on the AD side- Apply forgotten patch - Resolves: rhbz#1368496 - sssd is not able to authenticate with alias - Resolves: rhbz#1366470 - sssd: throw away the timestamp cache if re-initializing the persistent cache - Fix deleting non-existent secret - Related: rhbz#1311056 - Add a Secrets as a Service component- Resolves: rhbz#1362716 - selinux avc denial for vsftp login as ipa user- Resolves: rhbz#1368496 - sssd is not able to authenticate with alias- Resolves: rhbz#1364033 - sssd exits if clock is adjusted backwards after boot- Resolves: rhbz#1362023 - SSSD fails to start when ldap_user_extra_attrs contains mail- Resolves: rhbz#1368324 - libsss_autofs.so is packaged in two packages sssd-common and libsss_autofs- Fix RPM scriptlet plumbing for the sssd-secrets responder - Related: rhbz#1311056 - Add a Secrets as a Service component- Add socket-activation plumbing for the sssd-secrets responder - Related: rhbz#1311056 - Add a Secrets as a Service component- Own the secrets directory - Related: rhbz#1311056 - Add a Secrets as a Service component- Resolves: rhbz#1268874 - Add an option to disable checking for trusted domains in the subdomains provider- Resolves: rhbz#1271280 - sssd stores and returns incorrect information about empty netgroup (ldap-server: 389-ds)- Resolves: rhbz#1290500 - [feat] command to manually list fo_add_server_to_list information- Add several small fixes related to the config API - Related: rhbz#1072458 - [RFE] SSSD configuration file test tool (sssd_check)- Resolves: rhbz#1349900 - gpo search errors out and gpo_cache file is never created- Fix regressions in the simple access provider - Resolves: rhbz#1360806 - sssd does not start if sub-domain user is used with simple access provider - Apply a number of specfile patches to better match the upstream spefile - Related: rhbz#1290381 - Rebase SSSD to 1.14.x in RHEL-7.3- Cherry-pick patches from upstream that fix several regressions - Avoid checking local users in all cases - Resolves: rhbz#1353951 - sssd_pam leaks file descriptors- Resolves: rhbz#1364118 - [abrt] [faf] sssd: unknown function(): /usr/libexec/sssd/sssd_nss killed by 11 - Resolves: rhbz#1361563 - Wrong pam error code returned for password change in offline mode- Resolves: rhbz#1309745 - Support multiple principals for IPA users- Resolves: rhbz#1304992 - Handle overriden name of members in the memberUid attribute- handle unresolvable sites more gracefully - Resolves: rhbz#1346011 - sssd is looking at a server in the GC of a subdomain, not the root domain. - fix compilation warnings in unit tests- fix capaths output - Resolves: rhbz#1344940 - GSSAPI error causes failures for child domain user logins across IPA - AD trust - also fix Coverity issues in the secrets responder and suppress noisy debug messages when setting the timestamp cache- Resolves: rhbz#1356577 - sssctl: Time stamps without time zone information- Resolves: rhbz#1354414 - New or modified ID-View User overrides are not visible unless rm -f /var/lib/sss/db/*cache*- Resolves: rhbz#1211631 - [RFE] Support of UPN for IdM trusted domains- Resolves: rhbz#1350520 - [abrt] sssd-common: ipa_dyndns_update_send(): sssd_be killed by SIGSEGV- Resolves: rhbz#1349882 - sssd does not work under non-root user - Also cherry-pick a few patches from upstream to fix config schema - Related: rhbz#1072458 - [RFE] SSSD configuration file test tool (sssd_check)- Sync a few minor patches from upstream - Fix sssctl manpage - Fix nss-tests unit test on big-endian machines - Fix several issues in the config schema - Related: rhbz#1072458 - [RFE] SSSD configuration file test tool (sssd_check)- Bundle http-parser - Resolves: rhbz#1311056 - Add a Secrets as a Service component- Sync a few minor patches from upstream - Fix a failover issue - Resolves: rhbz#1334749 - sssd fails to mark a connection as bad on searches that time out- Explicitly BuildRequire newer ding-libs - Resolves: rhbz#1072458 - [RFE] SSSD configuration file test tool (sssd_check)- New upstream release 1.14.0 - Resolves: rhbz#1290381 - Rebase SSSD to 1.14.x in RHEL-7.3 - Resolves: rhbz#835492 - [RFE] SSSD admin tool request - force reload - Resolves: rhbz#1072458 - [RFE] SSSD configuration file test tool (sssd_check) - Resolves: rhbz#1278691 - Please fix rfc2307 autofs schema defaults - Resolves: rhbz#1287209 - default_domain_suffix Appended to User Name - Resolves: rhbz#1300663 - Improve sudo protocol to support configurations with default_domain_suffix - Resolves: rhbz#1312275 - Support authentication indicators from IPA- Resolves: rhbz#1290381 - Rebase SSSD to 1.14.x in RHEL-7.3 - Resolves: rhbz#790113 - [RFE] "include" directive in sssd.conf - Resolves: rhbz#874985 - [RFE] AD provider support for automount lookups - Resolves: rhbz#879333 - [RFE] SSSD admin tool request - status overview - Resolves: rhbz#1140022 - [RFE]Allow sssd to add a new option that would specify which server to update DNS with - Resolves: rhbz#1290380 - RFE: Improve SSSD performance in large environments - Resolves: rhbz#883886 - sssd: incorrect checks on length values during packet decoding - Resolves: rhbz#988207 - sssd does not detail which line in configuration is invalid - Resolves: rhbz#1007969 - sssd_cache does not remove have an option to remove the sssd database - Resolves: rhbz#1103249 - PAC responder needs much time to process large group lists - Resolves: rhbz#1118257 - Users in ipa groups, added to netgroups are not resovable - Resolves: rhbz#1269018 - Too much logging from sssd_be - Resolves: rhbz#1293695 - sssd mixup nested group from AD trusted domains - Resolves: rhbz#1308935 - After removing certificate from user in IPA and even after sss_cache, FindByCertificate still finds the user - Resolves: rhbz#1315766 - SSSD PAM module does not support multiple password prompts (e.g. Password + Token) with sudo - Resolves: rhbz#1316164 - SSSD fails to process GPO from Active Directory - Resolves: rhbz#1322458 - sssd_be[11010]: segfault at 0 ip 00007ff889ff61bb sp 00007ffc7d66a3b0 error 4 in libsss_ipa.so[7ff889fcf000+5d000]- Resolves: rhbz#1290381 - Rebase SSSD to 1.14.x in RHEL-7.3 - The rebase includes fixes for the following bugzillas: - Resolves: rhbz#789477 - [RFE] SUDO: Support the IPA schema - Resolves: rhbz#1059972 - RFE: SSSD: Automatically assign new slices for any AD domain - Resolves: rhbz#1233200 - man sssd.conf should clarify details about subdomain_inherit option. - Resolves: rhbz#1238144 - Need better libhbac debuging added to sssd - Resolves: rhbz#1265366 - sss_override segfaults when accidentally adding --help flag to some commands - Resolves: rhbz#1269512 - sss_override: memory violation - Resolves: rhbz#1278566 - crash in sssd when non-Englsh locale is used and pam_strerror prints non-ASCII characters - Resolves: rhbz#1283686 - groups get deleted from the cache - Resolves: rhbz#1290378 - Smart Cards: Certificate in the ID View - Resolves: rhbz#1292238 - extreme memory usage in libnfsidmap sss.so plug-in when resolving groups with many members - Resolves: rhbz#1292456 - sssd_be AD segfaults on missing A record - Resolves: rhbz#1294670 - Local users with local sudo rules causes LDAP queries - Resolves: rhbz#1296618 - Properly remove OriginalMemberOf attribute in SSSD cache if user has no secondary groups anymore - Resolves: rhbz#1299553 - Cannot retrieve users after upgrade from 1.12 to 1.13 - Resolves: rhbz#1302821 - Cannot start sssd after switching to non-root - Resolves: rhbz#1310877 - [RFE] Support Automatic Renewing of Kerberos Host Keytabs - Resolves: rhbz#1313014 - sssd is not closing sockets properly - Resolves: rhbz#1318996 - SSSD does not fail over to next GC - Resolves: rhbz#1327270 - local overrides: issues with sub-domain users and mixed case names - Resolves: rhbz#1342547 - sssd-libwbclient: wbcSidsToUnixIds should not fail on lookup errors- Build the PAC plugin with krb5-1.14 - Related: rhbz#1336688 - sssd tries to resolve global catalog servers from AD forest sub-domains in AD-IPA trust setup- Resolves: rhbz#1336688 - sssd tries to resolve global catalog servers from AD forest sub-domains in AD-IPA trust setup- Resolves: rhbz#1290853 - [sssd] Trusted (AD) user's info stays in sssd cache for much more than expected.- Resolves: rhbz#1336706 - sssd_nss memory usage keeps growing when trying to retrieve non-existing netgroups- Resolves: rhbz#1296902 - In IPA-AD trust environment access is granted to AD user even if the user is disabled on AD.- Resolves: rhbz#1334159 - IPA provider crashes if a netgroup from a trusted domain is requested- Resolves: rhbz#1308913 - sssd be memory leak in sssd's memberof plugin - More patches from upstream related to the memory leak- Resolves: rhbz#1308913 - sssd be memory leak in sssd's memberof plugin- Resolves: rhbz#1300740 - [RFE] IPA: resolve external group memberships of IPA groups during getgrnam and getgrgid- Resolves: rhbz#1284814 - sssd: [sysdb_add_user] (0x0400): Error: 17- Resolves: rhbz#1270827 - local overrides: don't contact server with overridden name/id- Resolves: rhbz#1267837 - sssd_be crashed in ipa_srv_ad_acct_lookup_step- Resolves: rhbz#1267176 - Memory leak / possible DoS with krb auth.- Resolves: rhbz#1267836 - PAM responder crashed if user was not set- Resolves: rhbz#1266107 - AD: Conditional jump or move depends on uninitialised value- Resolves: rhbz#1250135 - Detect re-established trusts in the IPA subdomain code- Fix a Coverity warning in dyndns code - Resolves: rhbz#1261155 - nsupdate exits on first GSSAPI error instead of processing other commands- Resolves: rhbz#1261155 - nsupdate exits on first GSSAPI error instead of processing other commands- Resolves: rhbz#1263735 - Could not resolve AD user from root domain- Remove -d from sss_override manpage - Related: rhbz#1259512 - sss_override : The local override user is not found- Patches required for better handling of failover with one-way trusts - Related: rhbz#1250135 - Detect re-established trusts in the IPA subdomain code- Resolves: rhbz#1263587 - sss_override --name doesn't work with RFC2307 and ghost users- Resolves: rhbz#1259512 - sss_override : The local override user is not found- Resolves: rhbz#1260027 - sssd_be memory leak with sssd-ad in GPO code- Resolves: rhbz#1256398 - sssd cannot resolve user names containing backslash with ldap provider- Resolves: rhbz#1254189 - sss_override contains an extra parameter --debug but is not listed in the man page or in the arguments help- Resolves: rhbz#1254518 - Fix crash in nss responder- Support import/export for local overrides - Support FQDNs for local overrides - Resolves: rhbz#1254184 - sss_override does not work correctly when 'use_fully_qualified_names = True'- Resolves: rhbz#1244950 - Add index for 'objectSIDString' and maybe to other cache attributes- Resolves: rhbz#1250415 - sssd: p11_child hardening- Related: rhbz#1250135 - Detect re-established trusts in the IPA subdomain code- Resolves: rhbz#1202724 - [RFE] Add a way to lookup users based on CAC identity certificates- Resolves: rhbz#1232950 - [IPA/IdM] sudoOrder not honored as expected- Fix wildcard_limit=0 - Resolves: rhbz#1206571 - [RFE] Expose D-BUS interface- Fix race condition in invalidating the memory cache - Related: rhbz#1206575 - [RFE] The fast memory cache should cache initgroups- Resolves: rhbz#1249015 - KDC proxy not working with SSSD krb5_use_kdcinfo enabled- Bump release number - Related: rhbz#1246489 - sss_obfuscate fails with "ImportError: No module named pysss"- Fix missing dependency of sssd-tools - Resolves: rhbz#1246489 - sss_obfuscate fails with "ImportError: No module named pysss"- More memory cache related fixes - Related: rhbz#1206575 - [RFE] The fast memory cache should cache initgroups- Remove binary blob from SC patches as patch(1) can't handle those - Related: rhbz#854396 - [RFE] Support for smart cards- Resolves: rhbz#1244949 - getgrgid for user's UID on a trust client prevents getpw*- Fix memory cache integration tests - Resolves: rhbz#1206575 - [RFE] The fast memory cache should cache initgroups - Resolves: rhbz#854396 - [RFE] Support for smart cards- Remove OTP from PAM stack correctly - Related: rhbz#1200873 - [RFE] Allow smart multi step prompting when user logs in with password and token code from IPA - Handle sssd-owned keytabs when sssd runs as root - Related: rhbz#1205144 - RFE: Support one-way trusts for IPA- Resolves: rhbz#1183747 - [FEAT] UID and GID mapping on individual clients- Resolves: rhbz#1206565 - [RFE] Add dualstack and multihomed support - Resolves: rhbz#1187146 - If v4 address exists, will not create nonexistant v6 in ipa domain- Resolves: rhbz#1242942 - well-known SID check is broken for NetBIOS prefixes- Resolves: rhbz#1234722 - sssd ad provider fails to start in rhel7.2- Add support for InfoPipe wildcard requests - Resolves: rhbz#1206571 - [RFE] Expose D-BUS interface- Also package the initgr memcache - Related: rhbz#1205554 - Rebase SSSD to 1.13.x- Rebase to 1.13.0 upstream - Related: rhbz#1205554 - Rebase SSSD to 1.13.x - Resolves: rhbz#910187 - [RFE] authenticate against cache in SSSD - Resolves: rhbz#1206575 - [RFE] The fast memory cache should cache initgroups- Don't default to SSSD user - Related: rhbz#1205554 - Rebase SSSD to 1.13.x- Related: rhbz#1205554 - Rebase SSSD to 1.13.x - GPO default should be permissve- Resolves: rhbz#1205554 - Rebase SSSD to 1.13.x - Relax the libldb requirement - Resolves: rhbz#1221992 - sssd_be segfault at 0 ip sp error 6 in libtevent.so.0.9.21 - Resolves: rhbz#1221839 - SSSD group enumeration inconsistent due to binary SIDs - Resolves: rhbz#1219285 - Unable to resolve group memberships for AD users when using sssd-1.12.2-58.el7_1.6.x86_64 client in combination with ipa-server-3.0.0-42.el6.x86_64 with AD Trust - Resolves: rhbz#1217559 - [RFE] Support GPOs from different domain controllers - Resolves: rhbz#1217350 - ignore_group_members doesn't work for subdomains - Resolves: rhbz#1217127 - Override for IPA users with login does not list user all groups - Resolves: rhbz#1216285 - autofs provider fails when default_domain_suffix and use_fully_qualified_names set - Resolves: rhbz#1214719 - Group resolution is inconsistent with group overrides - Resolves: rhbz#1214718 - Overridde with --login fails trusted adusers group membership resolution - Resolves: rhbz#1214716 - idoverridegroup for ipa group with --group-name does not work - Resolves: rhbz#1214337 - Overrides with --login work in second attempt - Resolves: rhbz#1212489 - Disable the cleanup task by default - Resolves: rhbz#1211830 - external users do not resolve with "default_domain_suffix" set in IPA server sssd.conf - Resolves: rhbz#1210854 - Only set the selinux context if the context differs from the local one - Resolves: rhbz#1209483 - When using id_provider=proxy with auth_provider=ldap, it does not work as expected - Resolves: rhbz#1209374 - Man sssd-ad(5) lists Group Policy Management Editor naming for some policies but not for all - Resolves: rhbz#1208507 - sysdb sudo search doesn't escape special characters - Resolves: rhbz#1206571 - [RFE] Expose D-BUS interface - Resolves: rhbz#1206566 - SSSD does not update Dynamic DNS records if the IPA domain differs from machine hostname's domain - Resolves: rhbz#1206189 - [bug] sssd always appends default_domain_suffix when checking for host keys - Resolves: rhbz#1204203 - sssd crashes intermittently - Resolves: rhbz#1203945 - [FJ7.0 Bug]: getgrent returns error because sss is written in nsswitch.conf as default - Resolves: rhbz#1203642 - GPO access control looks for computer object in user's domain only - Resolves: rhbz#1202245 - SSSD's HBAC processing is not permissive enough with broken replication entries - Resolves: rhbz#1201271 - sssd_nss segfaults if initgroups request is by UPN and doesn't find anything - Resolves: rhbz#1200873 - [RFE] Allow smart multi step prompting when user logs in with password and token code from IPA - Resolves: rhbz#1199541 - Read and use the TTL value when resolving a SRV query - Resolves: rhbz#1199533 - [RFE] Implement background refresh for users, groups or other cache objects - Resolves: rhbz#1199445 - Does sssd-ad use the most suitable attribute for group name? - Resolves: rhbz#1198477 - ccname_file_dummy is not unlinked on error - Resolves: rhbz#1187103 - [RFE] User's home directories are not taken from AD when there is an IPA trust with AD - Resolves: rhbz#1185536 - In ipa-ad trust, with 'default_domain_suffix' set to AD domain, IPA user are not able to log unless use_fully_qualified_names is set - Resolves: rhbz#1175760 - [RFE] Have OpenLDAP lock out ssh keys when account naturally expires - Resolves: rhbz#1163806 - [RFE]ad provider dns_discovery_domain option: kerberos discovery is not using this option - Resolves: rhbz#1205160 - Complain loudly if backend doesn't start due to missing or invalid keytab- Resolves: rhbz#1226119 - Properly handle AD's binary objectGUID- Filter out domain-local groups during AD initgroups operation - Related: rhbz#1201840 - SSSD downloads too much information when fetching information about groups- Resolves: rhbz#1201840 - SSSD downloads too much information when fetching information about groups- Initialize variable in the views code in one success and one failure path - Resolves: rhbz#1202170 - sssd_be segfault on IPA(when auth with AD trusted domain) client at src/providers/ipa/ipa_s2n_exop.c:1605- Resolves: rhbz#1202170 - sssd_be segfault on IPA(when auth with AD trusted domain) client at src/providers/ipa/ipa_s2n_exop.c:1605- Handle case where there is no default and no rules - Resolves: rhbz#1192314 - With empty ipaselinuxusermapdefault security context on client is staff_u- Set a pointer in ldap_child to NULL to avoid warnings - Related: rhbz#1198759 - ccname_file_dummy is not unlinked on error- Resolves: rhbz#1199143 - With empty ipaselinuxusermapdefault security context on client is staff_u- Resolves: rhbz#1198759 - ccname_file_dummy is not unlinked on error- Run the restart in sssd-common posttrans - Explicitly require libwbclient - Resolves: rhbz#1187113 - sssd deamon was not running after RHEL 7.1 upgrade- Resolves: rhbz#1187113 - sssd deamon was not running after RHEL 7.1 upgrade- Fix endianess bug in fill_id() - Related: rhbz#1109331 - [RFE] Allow SSSD to be used with smbd shares- Resolves: rhbz#1168904 - gid is overridden by uid in default trust view- Resolves: rhbz#1187192 - IPA initgroups don't work correctly in non-default view- Resolves: rhbz#1184982 - Need to set different umask in selinux_child- Bump the release number - Related: rhbz#1184140 - Users saved throug extop don't have the originalMemberOf attribute- Add a patch dependency - Related: rhbz#1184140 - Users saved throug extop don't have the originalMemberOf attribute- Process ghost members only once - Fix processing of universal groups with members from different domains - Related: rhbz#1168904 - gid is overridden by uid in default trust view- Related: rhbz#1184140 - Users saved throug extop don't have the originalMemberOf attribute- Resolves: rhbz#1185188 - Uncached SIDs cannot be resolved- Handle GID override in MPG domains - Handle views with mixed-case domains - Related: rhbz#1168904 - gid is overridden by uid in default trust view- Open socket to the PAC responder in krb5_child before dropping root - Related: rhbz#1184140 - Users saved throug extop don't have the originalMemberOf attribute- Resolves: rhbz#1184140 - Users saved throug extop don't have the originalMemberOf attribute- Resolves: rhbz#1182183 - pam_sss(sshd:auth): authentication failure with user from AD- Resolves: rhbz#889206 - On clock skew sssd returns system error- Related: rhbz#1168904 - gid is overridden by uid in default trust view- Resolves: rhbz#1177140 - gpo_child fails if "log level" is enabled in smb.conf - Related: rhbz#1168904 - gid is overridden by uid in default trust view- Resolves: rhbz#1175408 - SSSD should not fail authentication when only allow rules are used - Resolves: rhbz#1175705 - sssd-libwbclient conflicts with Samba's and causes crash in wbinfo - in addition to the patch libwbclient.so is filtered out of the Provides list of the package- Resolves: rhbz#1171215 - Crash in function get_object_from_cache - Resolves: rhbz#1171383 - getent fails for posix group with AD users after login - Resolves: rhbz#1171382 - getent of AD universal group fails after group users login - Resolves: rhbz#1170300 - Access is not rejected for disabled domain - Resolves: rhbz#1162486 - Error processing external groups with getgrnam/getgrgid in the server mode - Resolves: rhbz#1168904 - gid is overridden by uid in default trust view- Resolves: rhbz#1169459 - sssd-ad: The man page description to enable GPO HBAC Policies are unclear - Related: rhbz#1113783 - sssd should run under unprivileged user- Rebuild to add several forgotten Patch entries - Resolves: rhbz#1173482 - MAN: Document that only user names are checked for pam_trusted_users - Resolves: rhbz#1167324 - pam_sss domains option: User auth should fail when domains=- Remove Coverity warnings in krb5_child code - Related: rhbz#1113783 - sssd should run under unprivileged user- Resolves: rhbz#1173482 - MAN: Document that only user names are checked for pam_trusted_users - Resolves: rhbz#1167324 - pam_sss domains option: User auth should fail when domains=- Don't error out on chpass with OTPs - Related: rhbz#1109756 - Rebase SSSD to 1.12- Resolves: rhbz#1124320 - [FJ7.0 Bug]: getgrent returns error because sss is written in nsswitch.conf as default.- Resolves: rhbz#1169739 - selinuxusermap rule does not apply to trusted AD users - Enable running unit tests without cmocka - Related: rhbz#1113783 - sssd should run under unprivileged user- krb5_child and ldap_child do not call Kerberos calls as root - Related: rhbz#1113783 - sssd should run under unprivileged user- Resolves: rhbz#1168735 - The Kerberos provider is not properly views-aware- Fix typo in libwbclient-devel alternatives invocation - Related: rhbz#1109331 - [RFE] Allow SSSD to be used with smbd shares- Resolves: rhbz#1166727 - pam_sss domains option: Untrusted users from the same domain are allowed to auth.- Handle migrating clients between views - Related: rhbz#891984 - [RFE] ID Views: Support migration from the sync solution to the trust solution- Use alternatives for libwbclient - Related: rhbz#1109331 - [RFE] Allow SSSD to be used with smbd shares- Resolves: rhbz#1165794 - sssd does not work with custom value of option re_expression- Add an option that describes where to put generated krb5 files to - Related: rhbz#1135043 - [RFE] Implement localauth plugin for MIT krb5 1.12- Handle IPA group names returned from the extop plugin - Related: rhbz#891984 - [RFE] ID Views: Support migration from the sync solution to the trust solution- Resolves: rhbz#1165792 - automount segfaults in sss_nss_check_header- Resolves: rhbz#1163742 - "debug_timestamps = false" and "debug_microseconds = true" do not work after enabling journald with sssd.- Resolves: rhbz#1153593 - Manpage description of case_sensitive=preserving is incomplete- Support views for IPA users - Related: rhbz#891984 - [RFE] ID Views: Support migration from the sync solution to the trust solution- Update man page to clarify TGs should be disabled with a custom search base - Related: rhbz#1161741 - TokenGroups for LDAP provider breaks in corner cases- Use upstreamed patches for the rootless sssd - Related: rhbz#1113783 - sssd should run under unprivileged user- Resolves: rhbz#1153603 - Proxy Provider: Fails to lookup case sensitive users and groups with case_sensitive=preserving- Resolves: rhbz#1161741 - TokenGroups for LDAP provider breaks in corner cases- Resolves: rhbz#1162480 - dereferencing failure against openldap server- Move adding the user from pretrans to pre, copy adding the user to sssd-krb5-common and sssd-ipa as well in order to work around yum ordering issue - Related: rhbz#1113783 - sssd should run under unprivileged user- Resolves: rhbz#1113783 - sssd should run under unprivileged user- Fix two regressions in the new selinux_child process - Related: rhbz#1113783 - sssd should run under unprivileged user - Resolves: rhbz#1132365 - Remove password from the PAM stack if OTP is used- Include the ldap_child and selinux_child patches for rootless sssd - Related: rhbz#1113783 - sssd should run under unprivileged user- Support overriding SSH public keys with views - Support extended attributes via the extop plugin - Related: rhbz#1109756 - Rebase SSSD to 1.12 - Resolves: rhbz#1137010 - disable midpoint refresh for netgroups if ptask refresh is enabled- Resolves: rhbz#1153518 - service lookups returned in lowercase with case_sensitive=preserving - Resolves: rhbz#1158809 - Enumeration shows only a single group multiple times- Include the responder and packaging patches for rootless sssd - Related: rhbz#1113783 - sssd should run under unprivileged user- Amend the sssd-ldap man page with info about lockout setup - Related: rhbz#1109756 - Rebase SSSD to 1.12 - Resolves: rhbz#1137014 - Shell fallback mechanism in SSSD - Resolves: rhbz#790854 - 4 functions with reference leaks within sssd (src/python/pyhbac.c)- Fix regressions caused by views patches when SSSD is connected to a pre-4.0 IPA server - Related: rhbz#1109756 - Rebase SSSD to 1.12- Add the low-level server changes for running as unprivileged user - Package the libsss_semange library needed for SELinux label changes - Related: rhbz#1113783 - sssd should run under unprivileged user - Resolves: rhbz#1113784 - sssd should audit selinux user map changes- Use libsemanage for SELinux label changes - Resolves: rhbz#1113784 - sssd should audit selinux user map changes- Rebase SSSD to 1.12.2 - Related: rhbz#1109756 - Rebase SSSD to 1.12- Sync with upstream - Related: rhbz#1109756 - Rebase SSSD to 1.12- Rebuild against ding-libs with fixed SONAME - Related: rhbz#1109756 - Rebase SSSD to 1.12- Rebase SSSD to 1.12.1 - Related: rhbz#1109756 - Rebase SSSD to 1.12- Require ldb 2.1.17 - Related: rhbz#1133914 - Rebase libldb to version 1.1.17 or newer- Fix fully qualified IFP lookups - Related: rhbz#1109756 - Rebase SSSD to 1.12- Rebase SSSD to 1.12.0 - Related: rhbz#1109756 - Rebase SSSD to 1.12- Squash in upstream review comments about the PAC patch - Related: rhbz#1097286 - Expanding home directory fails when the request comes from the PAC responder- Backport a patch to allow krb5-utils-test to run as root - Related: rhbz#1097286 - Expanding home directory fails when the request comes from the PAC responder- Resolves: rhbz#1097286 - Expanding home directory fails when the request comes from the PAC responder- Fix a DEBUG message, backport two related fixes - Related: rhbz#1090653 - segfault in sssd_be when second domain tree users are queried while joined to child domain- Resolves: rhbz#1090653 - segfault in sssd_be when second domain tree users are queried while joined to child domain- Resolves: rhbz#1082191 - RHEL7 IPA selinuxusermap hbac rule not always matching- Resolves: rhbz#1077328 - other subdomains are unavailable when joined to a subdomain in the ad forest- Resolves: rhbz#1078877 - Valgrind: Invalid read of int while processing netgroup- Resolves: rhbz#1075092 - Password change w/ OTP generates error on success- Resolves: rhbz#1078840 - Error during password change- Resolves: rhbz#1075663 - SSSD should create the SELinux mapping file with format expected by pam_selinux- Related: rhbz#1075621 - Add another Kerberos error code to trigger IPA password migration- Related: rhbz#1073635 - IPA SELinux code looks for the host in the wrong sysdb subdir when a trusted user logs in- Related: rhbz#1066096 - not retrieving homedirs of AD users with posix attributes- Related: rhbz#1072995 - AD group inconsistency when using AD provider in sssd-1.11-40- Resolves: rhbz#1073631 - sssd fails to handle expired passwords when OTP is used- Resolves: rhbz#1072067 - SSSD Does not cache SELinux map from FreeIPA correctly- Resolves: rhbz#1071903 - ipa-server-mode: Use lower-case user name component in home dir path- Resolves: rhbz#1068725 - Evaluate usage of sudo LDAP provider together with the AD provider- Fix idmap documentation - Bump idmap version info - Related: rhbz#1067361 - Check IPA idranges before saving them to the cache- Pull some follow up man page fixes from upstream - Related: rhbz#1060389 - Document that `sssd` cache needs to be cleared manually, if ID mapping configuration changes - Related: rhbz#1064908 - MAN: Remove misleading memberof example from ldap_access_filter example- Resolves: rhbz#1060389 - Document that `sssd` cache needs to be cleared manually, if ID mapping configuration changes- Resolves: rhbz#1064908 - MAN: Remove misleading memberof example from ldap_access_filter example- Resolves: rhbz#1068723 - Setting int option to 0 yields the default value- Resolves: rhbz#1067361 - Check IPA idranges before saving them to the cache- Resolves: rhbz#1067476 - SSSD pam module accepts usernames with leading spaces- Resolves: rhbz#1033069 - Configuring two different provider types might start two parallel enumeration tasks- Resolves: rhbz#1068640 - 'IPA: Don't call tevent_req_post outside _send' should be added to RHEL7- Resolves: rhbz#1063977 - SSSD needs to enable FAST by default- Resolves: rhbz#1064582 - sss_cache does not reset the SYSDB_INITGR_EXPIRE attribute when expiring users- Resolves: rhbz#1033081 - Implement heuristics to detect if POSIX attributes have been replicated to the Global Catalog or not- Resolves: rhbz#872177 - [RFE] subdomain homedir template should be configurable/use flatname by default- Resolves: rhbz#1059753 - Warn with a user-friendly error message when permissions on sssd.conf are incorrect- Resolves: rhbz#1037653 - Enabling ldap_id_mapping doesn't exclude uidNumber in filter- Resolves: rhbz#1059253 - Man page states default_shell option supersedes other shell options but in fact override_shell does. - Use the right domain for AD site resolution - Related: rhbz#743503 - [RFE] sssd should support DNS sites- Resolves: rhbz#1028039 - AD Enumeration reads data from LDAP while regular lookups connect to GC- Resolves: rhbz#877438 - sudoNotBefore/sudoNotAfter not supported by sssd sudoers plugin- Mass rebuild 2014-01-24- Resolves: rhbz#1054639 - sssd_be aborts a request if it doesn't match any configured idmap domain- Resolves: rhbz#1054899 - explicitly suggest krb5_auth_timeout in a loud DEBUG message in case Kerberos authentication times out- Resolves: rhbz#1037653 - Enabling ldap_id_mapping doesn't exclude uidNumber in filter- Resolves: rhbz#1051360 - [FJ7.0 Bug]: [REG] sssd_be crashes when ldap_search_base cannot be parsed. - Fix a typo in the man page - Related: rhbz#1034920 - RHEL7 sssd not setting IPA AD trusted user homedir- Resolves: rhbz#1054639 - sssd_be aborts a request if it doesn't match any configured idmap domain - Fix return value when searching for AD domain flat names - Resolves: rhbz#1048102 - Access denied for users from gc domain when using format DOMAIN\user- Resolves: rhbz#1034920 - RHEL7 sssd not setting IPA AD trusted user homedir- Resolves: rhbz#1048102 - Access denied for users from gc domain when using format DOMAIN\user- Resolves: rhbz#1053106 - sssd ad trusted sub domain do not inherit fallbacks and overrides settings- Resolves: rhbz#1051016 - FAST does not work in SSSD 1.11.2 in Fedora 20- Resolves: rhbz#1033133 - "System Error" when invalid ad_access_filter is used- Resolves: rhbz#1032983 - sssd_be crashes when ad_access_filter uses FOREST keyword. - Fix two memory leaks in the PAC responder (Related: rhbz#991065)- Resolves: rhbz#1048184 - Group lookup does not return member with multiple names after user lookup- Resolves: rhbz#1049533 - Group membership lookup issue- Mass rebuild 2013-12-27- Resolves: rhbz#894068 - sss_cache doesn't support subdomains- Re-initialize subdomains after provider startup - Related: rhbz#1038637 - If SSSD starts offline, subdomains list is never read- The AD provider is able to resolve group memberships for groups with Global and Universal scope - Related: rhbz#1033096 - tokenGroups do not work reliable with Global Catalog- Resolves: rhbz#1033096 - tokenGroups do not work reliable with Global Catalog - Resolves: rhbz#1030483 - Individual group search returned multiple results in GC lookups- Resolves: rhbz#1040969 - sssd_nss grows memory footprint when netgroups are requested- Resolves: rhbz#1023409 - Valgrind sssd "Syscall param socketcall.sendto(msg) points to uninitialised byte(s)"- Resolves: rhbz#1037936 - sssd_be crashes occasionally- Resolves: rhbz#1038637 - If SSSD starts offline, subdomains list is never read- Resolves: rhbz#1029631 - sssd_be crashes on manually adding a cleartext password to ldap_default_authtok- Resolves: rhbz#1036758 - SSSD: Allow for custom attributes in RDN when using id_provider = proxy- Resolves: rhbz#1034050 - Errors in domain log when saving user to sysdb- Resolves: rhbz#1036157 - sssd can't retrieve auto.master when using the "default_domain_suffix" option in- Resolves: rhbz#1028057 - Improve detection of the right domain when processing group with members from several domains- Resolves: rhbz#1033084 - sssd_be segfaults if empty grop is resolved using ad_matching_rule- Resolves: rhbz#1031562 - Incorrect mention of access_filter in sssd-ad manpage- Resolves: rhbz#991549 - sssd fails to retrieve netgroups with multiple CN attributes- Skip netgroups that don't provide well-formed triplets - Related: rhbz#991549 - sssd fails to retrieve netgroups with multiple CN attributes- New upstream release 1.11.2 - Remove upstreamed patches - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.11.2 - Resolves: rhbz#991065- Resolves: rhbz#1019882 - RHEL7 ipa ad trusted user lookups failed with sssd_be crash - Resolves: rhbz#1002597 - ad: unable to resolve membership when user is from different domain than group- New upstream release 1.11.1 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.11.1 - Resolves: rhbz#991065 - Rebase SSSD to 1.11.0- New upstream release 1.11.0 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.11.0 - Resolves: rhbz#991065- New upstream release 1.11 beta 2 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.11.0beta2 - Related: rhbz#991065- Resolves: #906427 - Do not use %{_lib} in specfile for the nss and pam libraries- Resolves: #983587 - sss_debuglevel did not increase verbosity in sssd_pac.log- Resolves: #983580 - Netgroups should ignore the 'use_fully_qualified_names' setting- Apply several important fixes from upstream 1.10 branch - Related: #966757 - SSSD failover doesn't work if the first DNS server in resolv.conf is unavailable- New upstream release 1.10.1 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.10.1- Remove libcmocka dependency- sssd-tools should require sssd-common, not sssd- Move sssd_pac to the sssd-ipa and sssd-ad subpackages - Trim out RHEL5-specific macros since we don't build on RHEL 5 - Trim out macros for Fedora older than F18 - Update libldb requirement to 1.1.16 - Trim RPM changelog down to the last year- Move sssd_pac to the sssd-krb5 subpackage- Fix Obsoletes: to account for dist tag - Convert post and pre scripts to run on the sssd-common subpackage - Remove old conversion from SYSV- New upstream release 1.10 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.10.0- the cmocka toolkit exists only on selected arches- Apply a number of patches from upstream to fix issues found post-beta, in particular: -- segfault with a high DEBUG level -- Fix IPA password migration (upstream #1873) -- Fix fail over when retrying SRV resolution (upstream #1886)- Only BuildRequire libcmocka on Fedora- Fix typo in Requires that prevented an upgrade (#973916) - Use a hardcoded version in Conflicts, not less-than-current- New upstream release 1.10 beta2 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.10.0beta2 - BuildRequire libcmocka-devel in order to run all upstream tests during build - BuildRequire libnl3 instead of libnl1 - No longer BuildRequire initscripts, we no longer use /sbin/service - Remove explicit krb5-libs >= 1.10 requires; this platform doensn't carry any older krb5-libs version- Enable hardened build for RHEL7- Apply a couple of patches from upstream git that resolve crashes when ID mapping object was not initialized properly but needed later- Resolves: rhbz#961357 - Missing dyndns_update entry in sssd.conf during realm join - Resolves: rhbz#961278 - Login failure: Enterprise Principal enabled by default for AD Provider - Resolves: rhbz#961251 - sssd does not create user's krb5 ccache dir/file parent directory when logging in- Explicitly Require libini_config >= 1.0.0.1 to work around a SONAME bug in ding-libs - Fix SSH integration with fully-qualified domains - Add the ability to dynamically discover the NetBIOS name- New upstream release 1.10 beta1 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.10.0beta1- Add a patch to fix krb5 ccache creation issue with krb5 1.11- New upstream release 1.10 alpha1 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.10.0alpha1- Split internal helper libraries into a shared object - Significantly reduce disk-space usage- Fix the Kerberos password expiration warning (#912223)- Do not write out dots in the domain-realm mapping file (#905650)- Include upstream patch to build with krb5-1.11- Rebuild against new libldb- Fix build with new automake versions- Recreate Kerberos ccache directory if it's missing - Resolves: rhbz#853558 - [sssd[krb5_child[PID]]]: Credential cache directory /run/user/UID/ccdir does not exist- Fix changelog dates to make F19 rpmbuild happy- New upstream release 1.9.4- New upstream release 1.9.3- Resolve groups from AD correctly- Check the validity of naming context- Move the sss_cache tool to the main package- Include the 1.9.2 tarball- New upstream release 1.9.2- New upstream release 1.9.1- require the latest libldb- Use mcpath insted of mcachepath macro to be consistent with upsteam spec file- New upstream release 1.9.0- New upstream release 1.9.0 rc1- New upstream release 1.9.0 beta7 - obsoletes patches #1-#3- Rebuild against libldb 1.12- Rebuild against libldb 1.11- Change the default ccache location to DIR:/run/user/${UID}/krb5cc and patch man page accordingly - Resolves: rhbz#851304- Rebuild against libldb 1.10- Only create the SELinux login file if there are SELinux mappings on the IPA server- Don't discard HBAC rule processing result if SELinux is on Resolves: rhbz#846792 (CVE-2012-3462)- New upstream release 1.9.0 beta 6 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.0beta6 - A new option, override_shell was added. If this option is set, all users managed by SSSD will have their shell set to its value. - Fixes for the support for setting default SELinux user context from FreeIPA. - Fixed a regression introduced in beta 5 that broke LDAP SASL binds - The SSSD supports the concept of a Primary Server and a Back Up Server in failover - A new command-line tool sss_seed is available to help prime the cache with a user record when deploying a new machine - SSSD is now able to discover and save the domain-realm mappings between an IPA server and a trusted Active Directory server. - Packaging changes to fix ldconfig usage in subpackages (#843995) - Rebuild against libldb 1.1.9- Rebuilt for https://fedoraproject.org/wiki/Fedora_18_Mass_Rebuild- New upstream release 1.9.0 beta 5 - Obsoletes the patch for missing DP_OPTION_TERMINATOR in AD provider options - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.0beta5 - Many fixes for the support for setting default SELinux user context from FreeIPA, most notably fixed the specificity evaluation - Fixed an incorrect default in the krb5_canonicalize option of the AD provider which was preventing password change operation - The shadowLastChange attribute value is now correctly updated with the number of days since the Epoch, not seconds- Fix broken ARM build - Add missing DP_OPTION_TERMINATOR in AD provider options- Own several directories create during make install (#839782)- New upstream release 1.9.0 beta 4 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.0beta4 - Add a new AD provider to improve integration with Active Directory 2008 R2 or later servers - SUDO integration was completely rewritten. The new implementation works with multiple domains and uses an improved refresh mechanism to download only the necessary rules - The IPA authentication provider now supports subdomains - Fixed regression for setups that were setting default_tkt_enctypes manually by reverting a previous workaround.- New upstream release 1.9.0 beta 3 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.0beta3 - Add a new PAC responder for dealing with cross-realm Kerberos trusts - Terminate idle connections to the NSS and PAM responders- Switch unicode library from libunistring to Glib - Drop unnecessary explicit Requires on keyutils - Guarantee that versioned Requires include the correct architecture- Fix accidental disabling of the DIR cache support- New upstream release 1.9.0 beta 2 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.0beta2 - Add support for the Kerberos DIR cache for storing multiple TGTs automatically - Major performance enhancement when storing large groups in the cache - Major performance enhancement when performing initgroups() against Active Directory - SSSDConfig data file default locations can now be set during configure for easier packaging- Fix regression in endianness patch- Rebuild SSSD against ding-libs 0.3.0beta1 - Fix endianness bug in service map protocol- Fix several regressions since 1.5.x - Ensure that the RPM creates the /var/lib/sss/mc directory - Add support for Netscape password warning expiration control - Rebuild against libldb 1.1.6- New upstream release 1.9.0 beta 1 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.9.0beta1 - Add native support for autofs to the IPA provider - Support for ID-mapping when connecting to Active Directory - Support for handling very large (> 1500 users) groups in Active Directory - Support for sub-domains (will be used for dealing with trust relationships) - Add a new fast in-memory cache to speed up lookups of cached data on repeated requests- New upstream release 1.8.3 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.8.3 - Numerous manpage and translation updates - LDAP: Handle situations where the RootDSE isn't available anonymously - LDAP: Fix regression for users using non-standard LDAP attributes for user information- New upstream release 1.8.2 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.8.2 - Several fixes to case-insensitive domain functions - Fix for GSSAPI binds when the keytab contains unrelated principals - Fixed several segfaults - Workarounds added for LDAP servers with unreadable RootDSE - SSH knownhostproxy will no longer enter an infinite loop preventing login - The provided SYSV init script now starts SSSD earlier at startup and stops it later during shutdown - Assorted minor fixes for issues discovered by static analysis tools- Don't duplicate libsss_autofs.so in two packages - Set explicit package contents instead of globbing- Fix uninitialized value bug causing crashes throughout the code - Resolves: rhbz#804783 - [abrt] Segfault during LDAP 'services' lookup- New upstream release 1.8.1 - Resolve issue where we could enter an infinite loop trying to connect to an auth server - Fix serious issue with complex (3+ levels) nested groups - Fix netgroup support for case-insensitivity and aliases - Fix serious issue with lookup bundling resulting in requests never completing - IPA provider will now check the value of nsAccountLock during pam_acct_mgmt in addition to pam_authenticate - Fix several regressions in the proxy provider - Resolves: rhbz#743133 - Performance regression with Kerberos authentication against AD - Resolves: rhbz#799031 - --debug option for sss_debuglevel doesn't work- New upstream release 1.8.0 - Support for the service map in NSS - Support for setting default SELinux user context from FreeIPA - Support for retrieving SSH user and host keys from LDAP (Experimental) - Support for caching autofs LDAP requests (Experimental) - Support for caching SUDO rules (Experimental) - Include the IPA AutoFS provider - Fixed several memory-corruption bugs - Fixed a regression in group enumeration since 1.7.0 - Fixed a regression in the proxy provider - Resolves: rhbz#741981 - Separate Cache Timeouts for SSSD - Resolves: rhbz#797968 - sssd_be: The requested tar get is not configured is logged at each login - Resolves: rhbz#754114 - [abrt] sssd-1.6.3-1.fc16: ping_check: Process /usr/sbin/sssd was killed by signal 11 (SIGSEGV) - Resolves: rhbz#743133 - Performance regression with Kerberos authentication against AD - Resolves: rhbz#773706 - SSSD fails during autodetection of search bases for new LDAP features - Resolves: rhbz#786957 - sssd and kerberos should change the default location for create the Credential Cashes to /run/usr/USERNAME/krb5cc- Change default kerberos credential cache location to /run/user/- New upstream release 1.8.0 beta 3 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.8.0beta3 - Fixed a regression in group enumeration since 1.7.0 - Fixed several memory-corruption bugs - Finalized the ABI for the autofs support - Fixed a regression in the proxy provider- Rebuild against PCRE 8.30- New upstream release - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.8.0beta2 - Fix two minor manpage bugs - Include the IPA AutoFS provider- New upstream release - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.8.0beta1 - Support for the service map in NSS - Support for setting default SELinux user context from FreeIPA - Support for retrieving SSH user and host keys from LDAP (Experimental) - Support for caching autofs LDAP requests (Experimental) - Support for caching SUDO rules (Experimental)- Resolves: rhbz#773706 - SSSD fails during autodetection of search bases for new LDAP features - fix netgroups and sudo as well- Fixes a serious memory hierarchy bug causing unpredictable behavior in the LDAP provider.- Resolves: rhbz#773706 - SSSD fails during autodetection of search bases for new LDAP features- Rebuilt for https://fedoraproject.org/wiki/Fedora_17_Mass_Rebuild- New upstream release 1.7.0 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.7.0 - Support for case-insensitive domains - Support for multiple search bases in the LDAP provider - Support for the native FreeIPA netgroup implementation - Reliability improvements to the process monitor - New DEBUG facility with more consistent log levels - New tool to change debug log levels without restarting SSSD - SSSD will now disconnect from LDAP server when idle - FreeIPA HBAC rules can choose to ignore srchost options for significant performance gains - Assorted performance improvements in the LDAP provider- New upstream release 1.6.4 - Rolls up previous patches applied to the 1.6.3 tarball - Fixes a rare issue causing crashes in the failover logic - Fixes an issue where SSSD would return the wrong PAM error code for users that it does not recognize.- Rebuild against libldb 1.1.4- Resolves: rhbz#753639 - sssd_nss crashes when passed invalid UTF-8 for the username in getpwnam() - Resolves: rhbz#758425 - LDAP failover not working if server refuses connections- Rebuild for libldb 1.1.3- Resolves: rhbz#752495 - Crash when apply settings- New upstream release 1.6.3 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.6.3 - Fixes a major cache performance issue introduced in 1.6.2 - Fixes a potential infinite-loop with certain LDAP layouts- Rebuilt for glibc bug#747377- Change selinux policy requirement to Conflicts: with the old version, rather than Requires: the supported version.- Add explicit requirement on selinux-policy version to address new SBUS symlinks.- Remove %files reference to sss_debuglevel copied from wrong upstreeam spec file.- Improved handling of users and groups with multi-valued name attributes (aliases) - Performance enhancements Initgroups on RFC2307bis/FreeIPA HBAC rule processing - Improved process-hang detection and restarting - Enabled the midpoint cache refresh by default (fewer cache misses on commonly-used entries) - Cleaned up the example configuration - New tool to change debug level on the fly- New upstream release 1.6.1 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.6.1 - Fixes a serious issue with LDAP connections when the communication is dropped (e.g. VPN disconnection, waking from sleep) - SSSD is now less strict when dealing with users/groups with multiple names when a definitive primary name cannot be determined - The LDAP provider will no longer attempt to canonicalize by default when using SASL. An option to re-enable this has been provided. - Fixes for non-standard LDAP attribute names (e.g. those used by Active Directory) - Three HBAC regressions have been fixed. - Fix for an infinite loop in the deref code- Build with _hardened_build macro- New upstream release 1.6.0 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.6.0 - Add host access control support for LDAP (similar to pam_host_attr) - Finer-grained control on principals used with Kerberos (such as for FAST or - validation) - Added a new tool sss_cache to allow selective expiring of cached entries - Added support for LDAP DEREF and ASQ controls - Added access control features for Novell Directory Server - FreeIPA dynamic DNS update now checks first to see if an update is needed - Complete rewrite of the HBAC library - New libraries: libipa_hbac and libipa_hbac-python- New upstream release 1.5.11 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.11 - Fix a serious regression that prevented SSSD from working with ldaps:// URIs - IPA Provider: Fix a bug with dynamic DNS that resulted in the wrong IPv6 - address being saved to the AAAA record- New upstream release 1.5.10 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.10 - Fixed a regression introduced in 1.5.9 that could result in blocking calls - to LDAP- New upstream release 1.5.9 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.9 - Support for overriding home directory, shell and primary GID locally - Properly honor TTL values from SRV record lookups - Support non-POSIX groups in nested group chains (for RFC2307bis LDAP - servers) - Properly escape IPv6 addresses in the failover code - Do not crash if inotify fails (e.g. resource exhaustion) - Don't add multiple TGT renewal callbacks (too many log messages)- New upstream release 1.5.8 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.8 - Support for the LDAP paging control - Support for multiple DNS servers for name resolution - Fixes for several group membership bugs - Fixes for rare crash bugs- Resolves: rhbz#706740 - Orphaned links on rc0.d-rc6.d - Make sure to properly convert to systemd if upgrading from newer - updates for Fedora 14- Fix segfault in TGT renewal- Resolves: rhbz#700891 - CVE-2011-1758 sssd: automatic TGT renewal overwrites - cached password with predicatable filename- Re-add manpage translations- New upstream release 1.5.6 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.6 - Fixed a serious memory leak in the memberOf plugin - Fixed a regression with the negative cache that caused it to be essentially - nonfunctional - Fixed an issue where the user's full name would sometimes be removed from - the cache - Fixed an issue with password changes in the kerberos provider not working - with kpasswd- Resolves: rhbz#697057 - kpasswd fails when using sssd and - kadmin server != kdc server - Upgrades from SysV should now maintain enabled/disabled status- Fix %postun- Fix systemd conversion. Upgrades from SysV to systemd weren't properly - enabling the systemd service. - Fix a serious memory leak in the memberOf plugin - Fix an issue where the user's full name would sometimes be removed - from the cache- Install systemd unit file instead of sysv init script- New upstream release 1.5.5 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.5 - Fixes for several crash bugs - LDAP group lookups will no longer abort if there is a zero-length member - attribute - Add automatic fallback to 'cn' if the 'gecos' attribute does not exist- New upstream release 1.5.4 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.4 - Fixes for Active Directory when not all users and groups have POSIX attributes - Fixes for handling users and groups that have name aliases (aliases are ignored) - Fix group memberships after initgroups in the IPA provider- Resolves: rhbz#683267 - sssd 1.5.1-9 breaks AD authentication- New upstream release 1.5.3 - Support for libldb >= 1.0.0- New upstream release 1.5.2 - https://fedorahosted.org/sssd/wiki/Releases/Notes-1.5.2 - Fixes for support of FreeIPA v2 - Fixes for failover if DNS entries change - Improved sss_obfuscate tool with better interactive mode - Fix several crash bugs - Don't attempt to use START_TLS over SSL. Some LDAP servers can't handle this - Delete users from the local cache if initgroups calls return 'no such user' - (previously only worked for getpwnam/getpwuid) - Use new Transifex.net translations - Better support for automatic TGT renewal (now survives restart) - Netgroup fixes- Rebuild sssd against libldb 1.0.2 so the memberof module loads again. - Related: rhbz#677425- Resolves: rhbz#677768 - name service caches names, so id command shows - recently deleted users- Ensure that SSSD builds against libldb-1.0.0 on F15 and later - Remove .la for memberOf- Fix memberOf install path- Add support for libldb 1.0.0- Rebuilt for https://fedoraproject.org/wiki/Fedora_15_Mass_Rebuild- Fix nested group member filter sanitization for RFC2307bis - Put translated tool manpages into the sssd-tools subpackage- Restore Requires: cyrus-sasl-gssapi as it is not auto-detected during - rpmbuild- New upstream release 1.5.1 - Addresses CVE-2010-4341 - DoS in sssd PAM responder can prevent logins - Vast performance improvements when enumerate = true - All PAM actions will now perform a forced initgroups lookup instead of just - a user information lookup - This guarantees that all group information is available to other - providers, such as the simple provider. - For backwards-compatibility, DNS lookups will also fall back to trying the - SSSD domain name as a DNS discovery domain. - Support for more password expiration policies in LDAP - 389 Directory Server - FreeIPA - ActiveDirectory - Support for ldap_tls_{cert,key,cipher_suite} config options -Assorted bugfixes- CVE-2010-4341 - DoS in sssd PAM responder can prevent logins- New upstream release 1.5.0 - Fixed issues with LDAP search filters that needed to be escaped - Add Kerberos FAST support on platforms that support it - Reduced verbosity of PAM_TEXT_INFO messages for cached credentials - Added a Kerberos access provider to honor .k5login - Addressed several thread-safety issues in the sss_client code - Improved support for delayed online Kerberos auth - Significantly reduced time between connecting to the network/VPN and - acquiring a TGT - Added feature for automatic Kerberos ticket renewal - Provides the kerberos ticket for long-lived processes or cron jobs - even when the user logs out - Added several new features to the LDAP access provider - Support for 'shadow' access control - Support for authorizedService access control - Ability to mix-and-match LDAP access control features - Added an option for a separate password-change LDAP server for those - platforms where LDAP referrals are not supported - Added support for manpage translations- Solve a shutdown race-condition that sometimes left processes running - Resolves: rhbz#606887 - SSSD stops on upgrade- Log startup errors to the syslog - Allow cache cleanup to be disabled in sssd.conf- New upstream release 1.4.1 - Add support for netgroups to the proxy provider - Fixes a minor bug with UIDs/GIDs >= 2^31 - Fixes a segfault in the kerberos provider - Fixes a segfault in the NSS responder if a data provider crashes - Correctly use sdap_netgroup_search_base- Fix incorrect tarball URL- New upstream release 1.4.0 - Added support for netgroups to the LDAP provider - Performance improvements made to group processing of RFC2307 LDAP servers - Fixed nested group issues with RFC2307bis LDAP servers without a memberOf plugin - Build-system improvements to support Gentoo - Split out several libraries into the ding-libs tarball - Manpage reviewed and updated- Fix pre and post script requirements- Resolves: rhbz#606887 - sssd stops on upgrade- Resolves: rhbz#626205 - Unable to unlock screen- Resolves: rhbz#637955 - libini_config-devel needs libcollection-devel but - doesn't require it- Resolves: rhbz#632615 - the krb5 locator plugin isn't packaged for multilib- Resolves: CVE-2010-2940 - sssd allows null password entry to authenticate - against LDAP- Rebuilt for https://fedoraproject.org/wiki/Features/Python_2.7/MassRebuild- New upstream version 1.2.91 (1.3.0rc1) - Improved LDAP failover - Synchronous sysdb API (provides performance enhancements) - Better online reconnection detection- New stable upstream version 1.2.1 - Resolves: rhbz#595529 - spec file should eschew %define in favor of - %global - Resolves: rhbz#593644 - Empty list of simple_allow_users causes sssd service - to fail while restart. - Resolves: rhbz#599026 - Makefile typo causes SSSD not to use the kernel - keyring - Resolves: rhbz#599724 - sssd is broken on Rawhide- New stable upstream version 1.2.0 - Support ServiceGroups for FreeIPA v2 HBAC rules - Fix long-standing issue with auth_provider = proxy - Better logging for TLS issues in LDAP- New LDAP access provider allows for filtering user access by LDAP attribute - Reduced default timeout for detecting offline status with LDAP - GSSAPI ticket lifetime made configurable - Better offline->online transition support in Kerberos- Release new upstream version 1.1.91 - Enhancements when using SSSD with FreeIPA v2 - Support for deferred kinit - Support for DNS SRV records for failover- Bump up release number to avoid library sub-packages version issues with previous releases.- New upstream release 1.1.1 - Fixed the IPA provider (which was segfaulting at start) - Fixed a bug in the SSSDConfig API causing some options to revert to - their defaults - This impacted the Authconfig UI - Ensure that SASL binds to LDAP auto-retry when interrupted by a signal- Release SSSD 1.1.0 final - Fix two potential segfaults - Fix memory leak in monitor - Better error message for unusable confdb- Release candidate for SSSD 1.1 - Add simple access provider - Create subpackages for libcollection, libini_config, libdhash and librefarray - Support IPv6 - Support LDAP referrals - Fix cache issues - Better feedback from PAM when offline- Rebuild against new libtevent- Fix licenses in sources and on RPMs- Fix regression on 64-bit platforms- Fixes link error on platforms that do not do implicit linking - Fixes double-free segfault in PAM - Fixes double-free error in async resolver - Fixes support for TCP-based DNS lookups in async resolver - Fixes memory alignment issues on ARM processors - Manpage fixes- Fixes a bug in the failover code that prevented the SSSD from detecting when it went back online - Fixes a bug causing long (sometimes multiple-minute) waits for NSS requests - Several segfault bugfixes- Fix CVE-2010-0014- Patch SSSDConfig API to address - https://bugzilla.redhat.com/show_bug.cgi?id=549482- New upstream stable release 1.0.0- New upstream bugfix release 0.99.1- New upstream release 0.99.0- Fix segfault in sssd_pam when cache_credentials was enabled - Update the sample configuration - Fix upgrade issues caused by data provider service removal- Fix upgrade issues from old (pre-0.5.0) releases of SSSD- New upstream release 0.7.0- Fix missing file permissions for sssd-clients- Add SSSDConfig API - Update polish translation for 0.6.0 - Fix long timeout on ldap operation - Make dp requests more robust- Ensure that the configuration upgrade script always writes the config file with 0600 permissions - Eliminate an infinite loop in group enumerations- New upstream release 0.6.0- New upstream release 0.5.0- Fix for CVE-2009-2410 - Native SSSD users with no password set could log in without a password. (Patch by Stephen Gallagher)- Rebuilt for https://fedoraproject.org/wiki/Fedora_12_Mass_Rebuild- Fix a couple of segfaults that may happen on reload- add missing configure check that broke stopping the daemon - also fix default config to add a missing required option- latest upstream release. - also add a patch that fixes debugging output (potential segfault)- release out of the official 0.3.2 tarball- bugfix release 0.3.2 - includes previous release patches - change permissions of the /etc/sssd/sssd.conf to 0600- Add last minute bug fixes, found in testing the package- Version 0.3.1 - includes previous release patches- Try to fix build adding automake as an explicit BuildRequire - Add also a couple of last minute patches from upstream- Version 0.3.0 - Provides file based configuration and lots of improvements- Version 0.2.1- Version 0.2.0- package git snapshot- fixed items found during review - added initscript- added sss_client- Small cleanup and fixes in the spec file- Initial release (based on version 0.1.0 upstream code)  !"#$%&'()*+,-./0123456789:;<=>?@AB1.16.4-37.el7_8.41.16.4-37.el7_8.41.16.4sss_certmap.hlibsss_certmap.sosss_certmap.pclibsss_certmap-devel-1.16.4htmlbc_s.pngbdwn.pngclosed.pngdir_68267d1309a1af8e8297ef4c3efbcdba.htmldir_c4cd08d867bbc84764b9e15d0e1262ca.htmldir_c85d3e3c5052e9ad9ce18c6863244a25.htmldoxygen.cssdoxygen.pngdynsections.jsfiles.htmlftv2blank.pngftv2cl.pngftv2doc.pngftv2folderclosed.pngftv2folderopen.pngftv2lastnode.pngftv2link.pngftv2mlastnode.pngftv2mnode.pngftv2mo.pngftv2node.pngftv2ns.pngftv2plastnode.pngftv2pnode.pngftv2splitbar.pngftv2vertline.pnggroup__sss__certmap.htmlindex.htmljquery.jsmodules.htmlnav_f.pngnav_g.pngnav_h.pngopen.pngsearchall_61.htmlall_61.jsall_73.htmlall_73.jsclose.pngfunctions_73.htmlfunctions_73.jsgroups_61.htmlgroups_61.jsmag_sel.pngnomatches.htmlsearch.csssearch.jssearch_l.pngsearch_m.pngsearch_r.pngtypedefs_73.htmltypedefs_73.jssss__certmap_8h_source.htmlsync_off.pngsync_on.pngtab_a.pngtab_b.pngtab_h.pngtab_s.pngtabs.css/usr/include//usr/lib//usr/lib/pkgconfig//usr/share/doc//usr/share/doc/libsss_certmap-devel-1.16.4//usr/share/doc/libsss_certmap-devel-1.16.4/html//usr/share/doc/libsss_certmap-devel-1.16.4/html/search/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tablescpioxz2i686-redhat-linux-gnu         C source, ASCII textpkgconfig filedirectoryPNG image data, 8 x 30, 8-bit/color RGBA, non-interlacedPNG image data, 7 x 8, 8-bit/color RGBA, non-interlacedPNG image data, 9 x 9, 8-bit/color RGBA, non-interlacedHTML document, ASCII text, with very long linesassembler source, ASCII textPNG image data, 104 x 31, 8-bit/color RGBA, non-interlacedASCII textPNG image data, 16 x 22, 8-bit/color RGBA, non-interlacedPNG image data, 24 x 22, 8-bit/color RGBA, non-interlacedPNG image data, 6 x 1024, 8-bit/color RGB, non-interlacedASCII text, with very long linesPNG image data, 1 x 56, 8-bit/color RGB, non-interlacedPNG image data, 1 x 6, 8-bit/color RGB, non-interlacedPNG image data, 1 x 12, 8-bit/color RGB, non-interlacedHTML document, ASCII textPNG image data, 11 x 11, 8-bit/color RGBA, non-interlacedPNG image data, 20 x 19, 8-bit/color RGBA, non-interlacedPNG image data, 2 x 19, 8-bit/color RGB, non-interlacedPNG image data, 18 x 19, 8-bit/color RGBA, non-interlacedPNG image data, 24 x 24, 8-bit/color RGBA, non-interlacedPNG image data, 1 x 36, 8-bit/color RGB, non-interlacedRPR?7zXZ !#,㠍] b2u Q{K$xVj džk'|C;yqAOm/=h`;+"T<-N`{Je#f -t&1a0,հ7#e %kVuYa=pGUډS[NKf5`7.!ɪ|m-| >PVz+׹_3a)0k9Xd-MHu /} n\4ltk]yLM,VG:c -jb[Z\VBioNSS?iո0^cҠrj,_X;kQ\t^Ե XK#5S -+cZGdV%~u ({~7#/sej#yf HVr)Ѵ-z' 췺i TrpShFd$M>pڋCP#.)j#ޯۜ p–)ɢ_u9e1eHQAp#ra [:s:ct ; k',yj +v)cRH*ٹ%->ǫ@vmmK0MFpk\6ɒێ ZI|۠f#E:kS*ZxVD?74 M3l-TT98i jd»iGfLdG QLY#g߇ue+6$`#^hnIy!'^guz_d v[3nB|KL.ef׾ӦR4OAҝAj ^!ڶ6g#9S'ON$FZ &,盉.KӐ&kͬ ;@u@Q_Nfdrz?E2cX#MEyۑ*n]G)3>.1 X짷 0Sj&&^/1!G$a~iM20}Ӽ'nv : ]흅Y- G9Q^Z觯ᅬD#Gnx"jN%=Qzg*rXlIPg$['#&Bb`^ 3泦Lѐ Ih׸0"ybr˷ڊ%Md pFeM-H"3[ݎ}M]Цv닇(NSlK_ai]+;~S[0ǯs֓>z4 btmqtӤ8Ocg/:ۿ xFQ7ъz>mǯBPͥ~qG*ldBa Ĉ}1_$J)/n2cPr{~] rY .(Pvn~(]hF7Ƌ⮠7f=H&w,!(B?c C/:#ע$68gl2FE .]KYIG!Jyc5 ]U"!nKW{L=2iZ8-Su?Jgm΅?I(@0&3G"//cTzH.jPv˫]W5ͤ cCSK6EfDazT"D驇G둗\k>.tf1P 砄\vg.LzOQ&Kag|&;K\^ ݘs:x5M;JzCik  gG.Q$a#Ԗ(6X< @cuX$`;K'AY`̸sE䷱PB߇ !JяV3Dx\~u֛>c.sZb~elw-z<:k%!z>,y q%]?UNrA(w><áyÅ Y7Diܕ~QsJ =RѳYeUx0*D-=ɍ7ݫ1D\Q',yz}C#3XZ'm :iT&f=3Ьƪx$Q:P ߪs;r(Kew#t ԓ5kTDG=hXϳ{)⤞w0o&|)d=`漍R[tS(1TPu{L _!/MH T_R6C80xLBL9e>Fb, wl}eL1o-2)Q ai86|]?w' κyn;)+oOmB}3"%}(ڍKn7&Kp=Xt y@ES ]F"㦺x:B>V IkDRuI3c.UPN!s̞%+CN88{A$pw"Dl:jO9fgU0MGm0F,I&[QC4^DҒfrxnZջPWzyWvG**V+Ǜ7u_m| K?ݦ-}L3)tf8kv|vf3$+( E\~(q>>,тe3Cu]g71,ԔPs!5q#&T&7|X4ǒKQ? $S^ C }ĺJ~ Ϳ]+\ m\bH2¾]"Rkq۬L+oU_𨜯̴]{L<|}xl|A~W$LS%R.7˭z'a@o>TMo)*3 rOvg{#n\ʀmbU4sB3֤rW[fG/mu@42IG؉(UhbH"09m!RMb#@J6-#^Fj{Y ,#" S,AAϲ '+S> ed *k&VMH2SRmG]M`%Xq v?$VCX}2?f+:RCj:sS1!HxM XZDusz a:99?+g]p5tPZj`!V_qR0ɴ<ښ2IukVı~~%2'A%WM[3upݿ~Cm4E3wrU ~w6 UZ6xJr ʻ/Z_cO\.tvǻY]ay܁Mnҋ< ~ m(LK7e{D+\LZiA-cdc Rk+# TNb( KFpӃ5X*XFJRv'z]IG\Mv"(Dv쵢`bNX*a nӟ4%?d ˚ %\bOk^up|`+D t MӰ:rں7 8?%7բ%ˈ,uZPeNZW'׼LKU&GXi(DZy N$kkJY]W'tTP z~6tB}FS52Bu*fobQhDԎg*]Zvort7$P7iΉ&cavI.+[=YJI, {~CE}tp$~Ϡ8-XɫEdN24&yް?Z[f ЉBD$-H |;IDZYa7|6b1S[85l>m n -wS;*-) bGk:;[PG:H\p g/E$쐑 )%u&/:2R;ho)iP6vC۠w.4XſvG~[}^uvށ' `{~A@*&ɧ3HV!*f@zhp|JKF\{aBgMlt5 |:#^9 |u3M.óO r N⵨{k'hKr%Ϋ؊ҕ}LZU>3dر*GB^*Aq.'> 6D @E`Z#r42i`=x ٓffzHAVȾqp'&fMWosRcX/4zfj@wf}+2˖E[:RZڤ nmע[x)j4|>ho;W~;;#4cGcB2^j ZWb 9H+ҲFSw09yUjr*yG0%t,n>O4ӕG6\Y o_wtB~CԣXAjn\OՎiö*r,Cbo'A.6P)sZVjiJ0spAӵ9߰u~4`_@Y09]8;pYV hj?*iv>e3 ֻE~x46%4$=T0)%4~ƻ: TۇtwlYA0à 9&}jl VNA[I@>;2s!5bz(!3syyXB qA$dᩲē+9?fvV5ڙ[/Zԇg*5R4lO4Cun8Y)'GN8q1n]ch63viD !v34L|jtMk*Р%x;ddžm3LbYz cc?% Sd=P">@ˉ1=,D$FCzI3W/W)=bGf Qv= 0:&Lʸ2+ӚS̺,c]3DK?`w贼:P.ݣ8R<P :@e:V "43m\>U\$L_SO@?;uZ2&._cԹ.kyrʰ/ƅF0'?|TsuKKSf6/|cLc&^L}x4etTy=D!Q zXIE ߰/.*vdFϮl([ߡͿu5gdOB:oep*). gg;a#bOOYIE&' l1nːq АL ۊms$Co&4}Ǫ0eގ :Kq+@EF _6b)Ͷj8ؖsT/FCS=jXQz3üt(2s,"* ),THH__w o|XO.^7(iE:]*}/~%.cǤڢ<7~yNm ݊$:BSRe~Jrc.K+7,9Its5p4G0MZ~VF  DauMS;tt)DFK*ٳgKc|^yy"o EBKxP^*w_"a L"@ByE5#eMɠP x9Ԕ Jn2Ȼh)6jK8FOpldmm -)2M]kΧe^~bi1w1gwL*`A3%:s-Lx1} 2avAЫ:Xڭf>aDb:M_y3D B8[4j(1w&DZ Uػ͟IjY&7 :d@Da H^p'یD/pHh؉16opE,1#"}bI(2gEY Wj'WzvѢJ]c;ޜ9\B0X@3_otΏL (*^zt4ӄ+ݩOQsK3Kr}!_ MOPcTѠݘS Sa[zi0hhtn>Cq| y`܀3r|ty5X׬N$}kRޫtLIPg|w)O9VIP7CUz@2 Y餪a:Tk=ys-'ǁz>4"D d/DL&)6` oL&B\ 2)eJ TxRm7ls[\|U!\csŠ0~0ns T%t()=*Q@oTlï3+"M5r* kc3[Kmn*;FZK|SN{RMwXW)܅Vz5B` !1+ ŧr7 ̢2Ý߂ V0lb}ģAӎx USߐ_:n`sw.a<&`G F((\(M㈝7XʧZg)b#b&+瀵]*|Z*[5[U@CJ m_,1H}v!u+jrt~$g>N>@ 끉G#rS*3B(|&tR9lg'b%(5@5jVkUoS;ɹ|,-5Lc<0T *iOL#2z@-X,`C<2F):(G?oKnAbE=FBcό,.@᥮k-˗,R'SjX-J LU韤<)ș%w`FYN7mA[ pKy36s>Xm>nX3N&w:U`_=pkcs}9)L'q!Ca(3hzXgDCLO+oPU]? h{sS5fl?5ybJx.Bؠ|<{|@BO\̦@)6y XV;9L$upu(a\:psb/SVCyq?I |bWO ԅtAB063Mg,5 >`v}5q>'杙Y F1º`_Aۯ$QouSE,Zb+zoCNpuR^`0 AF 1Z{\ 6;[5KbK:HtAM#uGV5 MQsxͣAo$0T>{yL/"#@GwJYnjأLf̢~oD|]N']d1wN?ƅ@^A __2Ԧ3N77f8H>h&c qI8Z>h+߾I2`e I{z*eR٥/Ne"psvV z W /$` k8Iw:4xٽtȞdz3mz e,0{P/#6d͈&9'Up@|y${@V7lNӣ?e" _h.@?¯@Z¼'ӈAt&E]\ s(MWYZ[V6Ou`ZjK043xsIv{17NJ-5l%9UkZi:暫'յ9)OF;(OVO4 v| nPT@$ :_rk^.9k HP+uІn޲i݀y &IxKJk/V‘I Q^&--iMy?I'g}\/Ox$K^tTA.c6 7V,$x|W qVq'0XqǓ&M+ '(~`aq? {>wR*Qf-MN$B}iq S13n fz7Pݗ w+G`: `I D5CCQI(U3d2F>CjlL0mW%\}4&i-YN8BiOxlȀSt10z)ZCFY 9TdSW*y~E}bZ"j/Ōk6f챂hzl'XK}~^kUU+NVI}$# >,Au!˶:m˳*2(a.  aT \8_K\\ㅠ9>oHLz-_٥|'"tۥNصZ2f[)4b^BN>c+):Q#^YM0sE@KQMc6̬0gMوM-iBi쌰Qa;Aڛ5z46>.r,)=OgxoHղ;ozK Vhx3# @q=7 aG/IIBorGtjmL76] G˸!Gk1p"=1J [EqvE>%ΔcY>ntH|*40 =&2ĞI*gSZÞ ~9e" Ĉb)-'8jq X n4: ▩  5w ),RO4.jw9%("w"jDm۱t%0,tO pn.Cx!u)J I*⋎9B~b5Anabg/3 $4єjfH:g,5\4Rs\9p]L/TղPV*0@kjT8o뉇X:A]7%"3jJyHF?ZDv*KfOv[ Ƙ+R}¾ڞ(Qx Ҋ*Ƌx IM *̯{ZAh'}.. \˺2-G+MREH\Bvʛlউ ]Fdaˠ "U !1r u+d{w޿9x`2MLY~Vdzj%}ZLPDxc2.o *>M479Cf7ل&szMWe֭SYZKQזqEY#Il 1Psɷ(su>˝ځeGqj(NWD,5Ãl/7(ϐ"HHϿJ0Gj"(K!qp-6&ڳ-6;D1 ȷa7]QuڂV'[D*̉:@;XvϏ+UO]yӓ>~F(DBqc0e%3?u;Rͳ\[EN}q>nZ8?E׏ع`U#9$rIkMeYۢFO( YkP];JhyԵ۳]Ok#ŋ"A6B!56{.οt%CejGnUY&DRԪGM+"me ]ңbZcݲ c,#V hHQ q ujNV;zMN71U!VBSqj`%9K风W FuKIT**(CݴD24,b |(| ُiGADX׀a*y4k .y yk{VVE[*N1YGTbhxNH`!ٺcu97tXByX&cBӉTH}~-:^3XOe/vp^0UDy`2aNQz}eq9|'|Z#!`r* |+^ VYhBKW{2zp IJXz!;>2eps2 (Y|~Mа oɒ+0J$[-{sixޝ[Dx0#!fΗ$Z'qvb:.Rكt[(/Fay}#I%ur"hP5j돟cpOrۡOҼKc"z2#Gx|yp^hh 1ib*:`ճ-# XEtn_\,oя$TyY̗TS2f<>84Qjd'*q_#R<@ە^jS cT l\+MqzKc м\^ue$KX#h- d?-\11QgܹC2@3u._:WXh2 3_c\Er%_Lx2^u`˹gOgF]GZybhiZ,{$yRd4]*b7;-I<)*Xbd^mO*eQ#ո1:/Ah+%ވypԩ5{؀J +gOmot uOBC+dU:[?9Rچm3N) R0< nˤ!$o@+b٥d¦lN%>['k ~_^DIɁC7 Z;R1$#..ee G6Neռu'RD $G8=\@ Hp6\Z28X!I4Wt{5yvXk={Zo|S;}J2r୶Os[$C&IA-ٴ#%? \^P+!iN#`ghj _kzj 9$ "AL}^*!VgнxSZ~9['S^JsBCs[6FС V3Lqۈrދ=j\#  u&yRG*T :DEԐ5[OR撣;yR%9@Xby$^9(G %OQ6rWL=tb9љ^e`pw0Sc3cTj"JNzz9[E@ H?O3W,Rgw nC;uu>n‟sDy.ق+t8&M>s\遙3!5(rc "κIl0t<d/&f lĘii1\n8*lJFRPdo hX / um.2ov):}ѵkK J>?8?agZgs{gk$Tm.jR0 (\zh_\%Yb]f d|X$C/ xktu;Lңok8-1RTo> z-İ_3AA`G[YQ^-fD-ܐGwܹbAOW;ppNjɴjL)aFkb?QK7ӄ'3 {E IqK\P/_2y"Y`.S9+ od^K(7+Rʐs۞6TZSo'J%nXw6ijJUt%ֱCX2bk%v?Ke`krX3_KwgT%xY N]ߜ:4S\?ӆ!|э*!D`J!0BFaSD:H=)^? ;c%l- z=²屛#$i=luώ9 0[Drwt5ø(W uA\E:,b![I2T%zקy3Or7ٝ72 NX0 u`UhLI[HԶKzUhJv=2!ǰ Қ_53\@Do7+4hRŵe3 .SErtõ <$' I遈)U.rsH4Y:.RKjLbm]oq߻33'yD3iAf `ĂsgsK\}́2RΟ qȼ5g*,Jx>;(&#D}c[ۈ.Ѽ%VL<]oD.+rH[Uj=Zyj<`ll3V2ە2q8 V`tqdj&|Q(OIiMW K&V!0 `P|ZKwN_lW52vPժY;̤$៟hXmDώNFD UόMr=\ugg%} 8;Q/uvZM|+e'ǝN1׊F Dm=jHkFlʝ7A c-qsvC_.NH9͏ZyHK䖑QMKAi2/+Ÿ]wKeyvM_ d`N>)PG|TRɲ_RU"; B2Y^W48i~Nk6ACe׵P^yH ^ɗ?:D%Os^$@PR͂֠b}/w!"G{?YR_iX9Y>e`"R6bgc T/\EwoYcP@h2` ٻU&y62m׹^&*f@1e_ed?pa/֋01?ISz? R}RN͕HT?_%;ӫD LݪI2js@]dA[[n4F6nfq, ߪˆ6K! K\…7c\f~pZ s E]Ba}/8َ/:V@~:27f₍.z)JeBPL3.h+g$x}pɅ,A)?zuI3~zY#:` 9* Ԉ7DK/HIjVI)&~TL\R|WɅW/]::9$Pɂ +^}` Io0q 7Åp֞IX°oS981kjȷ4]WQ'rƀ9Q?%jC:`pP#>˷@ *=g"F+]*8jT7o|RtT6Sbί\`x-}jbY|AP&(IGK60;; c_QULV~ǤefiNK 3,mi58mwFOq9ߚ ˀ熸[ev!&tyC@{eeIͺJon)Z\S@=Y{ko}zA&)_ڞ $E ȇ2_DñQHp̍=.uinu^'G!v@4z[B=> :4(-֋$Bh+ZbnO1/ozhl<ѷ52F 91}Q'"s-o6֦'cf٫+ y$*OEnD[/|xg)xH) sDZ$S#k~|IZ/0v;+i$]C?2q1+6KF."uJL3+iXA,jT 1#W* d-@1>F_ykR%3-Ofs˜#3KA 7jj& ܒndV0tǦܣg[#iMco֋7vRĂuə+RW'jރ#dLZ?ā!2 ˳u=М O@zKN~!9 y(׼Ld .fdiG8_yZ̹OT[W( if?μg :=ki6d{񫹉2\?NWK|FmlOqLU(\wemf2<a $;9Ago@_R!,Ĕ fT{>v58Rɫ^J/*T>7K {,lΆ g N&da $kKt6)MTd5JCƭU=mҞc+V$B-.3/dejzTU!]p^>}H܋P\ P۹4EMOOv ެS䐲=E`-n:C17֬ d}#>p$4z" 9ԨrzH-&vCxXVtFQMg;k/;1:̪$@< h֚jEO! P=+"JgK3Jo6EA6gwkP3S#`ڣE cټbܘ3Aǒ!_ρtT*+/j]>[^ղ,ZwEqzv!KoCGY *' tN{.?|UpjKvJ'20KΠa*}J&,f PX$pMu͉!w,^)Uӳ"B= 0tU"VB?_+}lA榵nnre3]\ˬuw r'џdxIPD[ػW=c?*Ko #vO_ӻLv]诇ic+YZP~ttF$>F'oPZӄ)zfL"j))&`+Xl'{2b2\1pNp0Ì/-:}=}U 6$ xd† ,B7zږ^bbPrZx}ߘ/W+ \bOF   9 u9Bip:bFTjG}߇fCCA<*[F)Krh('g^c[uhNʾPؒ&S%:䉏wIX+nj}]e2p "oiLX/ g6Wg729ndRw|D 24>eڥ3L(_ "W ;cϚ]^JEKbIi0ʚ @﫳qGgH}pTQz6\}߬0&5.t/@`vr_rcVqiNg'- *ͩ/Ҁ(#tOaaN;X=M|rJ×6 F#51, H%yoSa4[[pՂunqM gZ);$ܕi< ꘱>[.xW{Juca%vHL8 jӞ?/i͓)%fguE<(Gph(CwJkt,lBy*h>P//U{(~s+?QF n>7,g֔Ђ ELqH̶va_r'5 >d76^d4ӣh+N+w4Y!R["&kW _Dž-Tx.jlX3tnFGg"P,{hÁ=Py(Mvv ׏vUE1# y *bjsqȁn5v\PlllN/ &q:WEhi &H<@@ЏWbw'5j]Ugs.lZwFw  #2oaTEf b2o+SXA?&DEKNӾ'FpȻB;0[~߅|ej{PUEa&$ {|xXEkn 6_2sܕn~=|#~X S!fE;T Ō@;ۚo:7_UW6s߁F!ـFxMQ- V"3 ǝrd_zʙA"("O27Vʪ{3~> XuZM21!;\ד7Jd6y_oؖxI[0Sbx@vJC2M⨾|RWjd7z%pZ8m. mCԡ{2=lQponQ\Pw2 e45Ȼৼl>u^?P y>{=ϝZoQh&iKO܀y-",A_rBmkA]F^E]_^PK8*vZM7$O Ѥ0Þb83} ͩcPlx+ɌiZ|wJ Η7u7~/-Qg}KBr@ʮ=8w|-+kdXo*ծ_Jrz=/d.ܤׯ쬖{ eOrbg,qYK_ry3jƍi 6MZ;IV/q$Σ6ߨ` >レZMbf0h!S. kcght[ ob ~~'V7f rg>߯צrQ)lv!ZoM2A{ f5'^yR!H3!o2SQ7h<8<` bn8?B埓竒4/G$Pi0>q) -zCu-?9\HpNj>E%I_ϑz6v7S>rkc+'fJS|h-Pg ?-3.1EFAiyFβn:ug|F%8nu1\h~ob!牷6.bfEq0 ˈ T ?/j<%x'=;eݝdܡ W8+*AÉrEحSoӁ-t"^1|x|i.[_HH:Ƞ'#jr&; $O/А"g~F-)'9bCU&zF&q6[i"h7y/4`K'ۦ˅YRwp W񦒲8GuxѤ.y9/`b\^zn[R \8BPǢ$gpF_;xdl󛧰TR}$+0ou;h3тzoWkڞoNxWГ: 1Z6ϻQ;6x^`Wˡ> QYU 6mlǞv1-Z i}b Hog8,umn18gWa̓Dr7FLmM G]XI"#Ǖ7oG/#_tJKɵy;v]V[6}D 2^:`fL2]?LJAbqG"=ݐ$ &jT߫U;^:O]5W9KJ}gu`Y9;mLTR-H$?A/v,cPu/l<?I'<>y1XvIbzGc=vڻs5g{M[U_sitԍ82%}uNq =.g'3dwz.}x8fWk'po0"O)Buk0UȾ8S04&z F:ax_x. U=X|,vPZEoy }O27L$s!k,2&{`TG euc$-4J;7PG#ǂ "֠6kHPMjtQ#Vy$2 qL?ZR2Qq5?3f/#aY6=%SLà++77f6du>hbԌ V&mHn9k-j9/w\p!5˚mFndxO@t:K)wck䈍уA8et:n}Bq6>7F-m(dQJB܄+Е QIbB=DOs !!d߬? SLG'0 sDf~x+B"G[hnX.:f` ɞ+J EV!ddz%!]LӐKF;3 ++S"yh~P(2hd4H/bW;כ ØN:pv ֻ9:^r\F?6EhHKk7{Bebv<,T6q] KeӇAHaxr*Ik[|K5.Z#/C:Ōags6Ԯ>}:84!~tG fPיa,UXd(_ݥ}0FʣkjZҲU%ڇ6R"Dmt;\E * IB H TAKI.2ZNQxSŸC+=_A+CjmĖSq,6`r1GM^r%-_ % $H9ml]szH_F!3d#DR# ZS32\4lWvΘ; X̧b|幌ӕ> 6faRy͑憇!rI;A] <{;:,ȞR=.Y  Z(;a J֕g Y9V$4M7c hJܗX؆nj ?&*Փ/Z"p= hi=jNJ.HN98КRaC|=zEπ& M-,: &!TE B" M`0y{LvH_pg;s"LF[V rWi#!q  K!lNd6JY6q)Hfɇ+ZXT0EFHs?@JtC&Q?,MsR7?z]M؀cf QxA >ώ v3UGGz q<aNLeEHj;"q舮\SO;;Rá[H2~5;rt: RI5`)^w$U$V#u˔0~f>ʂ0ۣтC2nA=zqe5Uw%jCTm*,_zұ)i_9uz̷O:< uGRŸnjei!(2-.]X;˘1J#hO$;ѪTS|!,F*׈;oDZk;^Ӎ6vB,{ATG8JmG*ns :^ψ_an=1K%(-D䴰jL])/ n=dՒ631IP\bl]8o(:m$Š4/!^nMUt\,i+GKe ?ugc6Ý ".S6ָFۨR,;I]l\a,b_i?yhl?oh"h ́ Onw$0>d/xԓ, 5 BqT9l gr=BY }a Me,@lGhM޲ضhoCZ@x+`,&_e=nh4M Eh)rNNrTuFG{.=D+__AQ3zrWj@piiCPOOp2ņ`&NyvdS/%p7QEzjޣ ȼfc5fA0_E.KV#=-3Z]͘C<,{Qk>Ġ۫7`_LD2T6T7RRʩ'6Hd5~w -uGI0zA0jw'T+Wo۰G]W`n+q}`mۧ9͢x~64pݲg32 |yaB ts%PbPTA?@aބTDiQM IyI栧uj5lgFP޼ۮc n#ځpX:X'Y:n{ϸR?4Zθ5"*i:9z{AoZ߉;C?B9 )[U30n]%Gk |P܋J=)"6Җ7W^W@d߅ "V5bˣ&">;go^˺'ajot}J1heю vZX._Yg]pܣߗ pudjqF.rP]#CJ~).L9Y8v4s6:!3'&Y\m2kgφFDq~ Qf+QFVZwh%e趼㱼rb}WNf>$CR8,wyNkѝ[NP*$>XRԧl+MN~ʌ\L[fbϖ+DF-ڲWZheq8(܉ *U6bJD\C/;UT0"hKKOo..OQ`suDcɁ>z2(`S;;>O`N\~%B0΢@=DB7& zr,.fx ߓ(vFtn%E 勋Nؔ}_H\toPKB:5g/Ɛmݸbͯ^cs hH9XFQ''g3`3&^j YS5Y h1 $ Z"8/7ҟ5旅>/ iPm9Ip#/4o8υSj}'N&,~Nb&AX'xvsq۲((vd[ԣ>Z**-fru |oѝ;PeOs iOе*",% JZϵ+{"ILO`hgjEFl8 x>.!lAC)l\mBf8XwHԺ ׃ǹ̂{Mʸ-դH UoSwIЫfMHв Rm>tŋTis'ѳH ~>lm}qYc.+=zJx1ԱiFP&l;m_M E#;7T`F+ќYpYHg<`צI%AZOj9ʵ=d?(f\5x9˵{j߿`SBqf&7JOJm"[$B*z1+gPŽL T=0X9~b܃1&چqUOsFȥߵȌryR]ga[v]:i! e5mRR@c_ǥNţf; /^ /X EW֋KX Llݐ,*"pKN΀3¾&(pq}:PBQ2"BpdAQ %Ѹ/;jݽ jno@ds&0EyAi$!! 4.r!vXpw`6$ _T-9g,@mJ v,O[l^H}3s H2MgwK8;$)%2THRkg#$ݷ,V&Zg鞚TGbi *"L7{d9|r:kFonj@O6G q&u2wXYY4"Y_ku3\%Ru ҦTr3;#X%nO,6%k9,q%G55e`Fڷإ4glB&VO.WW1.]h7{q#ۄ09g'Vw{jI&U $2' [p(+ ~F8y]jR-l,GjfPIثG$!=ގ}8)u Pz&g-Oӿ@zgM"_i [t>p$5 >45%2gq`a=8W͋.Lc6/WϮςpNZD)$,| c_Hڡh1&\nt}UM#⨪L]iF+)r,?뒥bؐ[ XMs㙣Ĭw9?-VK\D2.!7ԫj(XaiӍ7 DYS[rsTs(P"ʮEE~^$#:-܍(-x/lچ I'H{&alh|g?q#~qY~P*. N^©>-j$j V A$$G q".(ݴx.-6e\a .;1{v]s j%(+GФrufS'(hI>͊n_M_vN-dCHz uNǼ%=9,rAzTٰvbL%cnR6ԙȦ2[ wsT0ƿ(A"= M܏GU-o3_\kKm{,_-j#R=J H\YLWxˊFF82u#gLg.ͧGRT7z87xf\̹a'"F{& [F 8I4dmE ~/j)&J!cn\ "d[UDǒMIsBE؟M?\Wğ6)b CZCK߲QI ]qE[CX˅_5x@1~T`zNV?z5A@LHb0*` `y'\)\**b$Ԓm@>b mZ7< )ey7vCQM/_:y讓Q܊k!6l#Vxma2&StTgL ,l[dhbDcz+5-ewl`LV A_یݍ2Y*g.Bj[VnH#{'"Ri̦m Zɱi&-W,eK wSÔ-kאƹÏ|V. zJ nsKA>~  p\'ȜZ7Vȡ:/AڬLy+ømK:)]63 +/.e)gVQ{TW ZTO<¸D?锉;kG9s oJHyZT_Ȅ:9xDJo̺.{} 盽6B`~ XS?GC'` (M^i\-@.3 )Ma#z0K5GݘS.H{gK&s[c)1FEykf\|cW'_*i"%CֱRg[;NšF-cD"d|Ƽ]Yvֺx n9$#$|_<ũ@NjKZ֭ᐨ;82#`Yɬ-Qs\;2OK"bRahSנi8'4_QL0T<ɉ6- Wd*79DTh5W8 xY񑤓&M x$,y9 (geٶyhвI]t;`N6MV)UД뛻*]0 |,V>D$Գȗ#~u!.D>%yhHxftz 5`cq?ƵFB‹޴]yX^h1z Ş%Ħs^[y.9& ™eTd ̘@ `)lOV_v"t-g:œ?~v+za ׻i 3mVMdfH)'Wq'p}t4cM}IzTFIOJȍLj~}(g'SvU 4،7vj-Kh^ѱ}m˛IN--,@^Q6A E'Db!7O꽞ƪ {ȪB?>R)=nNLF`ww4;w?s; ƈ !N{/Y%'1l)\QǢ#j"EDs v=PɑL" _I+Aw6[,={$+*rz)Acowb4?) 3EcfڥWI潰> x뮁&"T C TSQ>X$W]Xa"Kㄜ?xnڢ* D8}~k` >i4"\!z+~4 PL-SA.% !JZd;gܑ\5U,'双efFtE)3q㒢 b3Q b61cLM @k2Q`HzFК/޽[0&(H-D얃Ȟk,]w,鿃F,APÕ î?yy* .<^~Y}~i;ߘBOD2" u8Îi˃'~$O;6 {J].B;T;B=ߙ "p)?؆aG?h$6BO84 -K52\KdVe{>"g"+:3L4MB<`C$ )(JؗN *|JWЦc;ک6fNܫ[XEO*?[K@Y(0w n)< (aTlaf?.%[?MZIM^9ŷ6Tʼ,8BumkEC5g  _FRxa>De\ o 졜-B"&.~o֧ʝj]`ԷF ^#ӬӶBnA/)I̓ɰT;u̡[k&v*Y!t$A(??O&Zw4%PBmݘR?]#ua9(G1T^Ve閪]%,Wv2V#1#?(`?L凜5 d*-_xbR>mPǿvaBC1z-_(B7J) Q<0dW٘ x on$\iy˖%x!䐱,R^JO v ;-)Mb2rД?*P3*T~)`R@kz[ \¤{7'ț(|¼9#|L "|!E*b.H1bɢ~8h̴*G.9%<LM2p8ߠNQAis=ñ_P/)_PC.Aek+T׮8,v(/` uC9jj1r'QCi6'o&A8ڐ&-,& Ssvc:GDol0te 2p(d?ofݸ KdnpZu0j(ߗf*Ӊ}trÄMfᆰ(̚3hNGVr.׶/z? /GRJT^ioTHTԡgQY#/,!S9es]b[<ljfmp+z~^0WN|sÆ\nR1!P Uͬ0ƤIVPw.nŦRA'"M~8MK1o> Ƴ<$|?@$aq-u'NyEF6bj.] WOs y)0n7d!M5/RWUZ ']&+/Q#޷7{klP7dq,LH:ͼySwrȃw  mP0JE%}{:)bT-FY s|>9bt/d(xCY#k$[@kQ+ZmK pD<NEcMHQvאp8o6,JcZ?bFqWS1S uWx|Blj8H޷i(H >!Q69n=mZ*>wXRbjZXKMniکI⦞]7i)M.B "'s!J}c{qf'TVX>e1Qm?rI:&]X*TMRt IYB*JO7I "FI[6QbR5x=(z/wȶ Q ۈBB ,sog(uLܢ!]4lBwi*BLnWИ9Zr=z{Q̝BL<mS Hen\,˾THU>yܙ W~[PEwaMR)hܒU=ihVr]rAxJEoO7I{Øv nTB3(KZ0S0]OITa!^`WʌȺ ~mJ{ACȾ# WFO&{79 `? LΞ x>*4iKqF`W6rN_Z֧$JZVXь[㛷@%d ~ܿrcY0QMҏVJp 3Bi?X"3l%W`"3-1bH7. ו  4% cU/VL1'47;l ]&D*øNm*hTObָ9h9_| t?x7quL(BsZʏO2k<խI`f)D"lpQYpC&johoyaFU[%MT 2, qQ$:=4d/ϧza#ξ"Li? K)ߔ!)PW)D0q8GtFNlE E»N)zr܋FᏼA|u:8Os>ӤΔT P?R$FcZr 5Ca#1}6k$S3!.G *ܸ' _M7G4Ј㋩ʹ,^G՗rjiS$To X~f"/ֽqiv@|28M'1(;|2@Zא}v ҆(޾#xI" ⲕ]g֜wu%O"q.AV09AzU=5F)7߬[(5/V[^ABC<Π8-}sWnTp+mJ2f0^}3p]V?Fƶ'w: =- o$B+(@A=$9vyV8`C!a=Gf>?c!{[;/]ӄLįM\qD( b) Ԙ-[GJv":dTM>;V8c,SDL2.Idǝ'yõ5rBJUn)QEBzIڤ_9wXˮ8 db_x=I@$ aAu78 i:oŻC/i7U*nqS/l"E(4s ǖFlH"pC~At/>fz[H%ys>T4[Gu+(?tm 2_O*t;+)y3uϮ쉢%Pw!ap%R>A|qDe-2COy$IO'aHRA*^2F73TS ):W>fFlܑ:V}ajMp35Ut@QĐacIs/1Uu`$2ȡdYbі *9( ~1>/ ֿoZP 6EtGՋ啜zjM(/7ǩMVؽYڿކɪ6 2I:U8b}U9_R=Qj+2&,k_YC3^:x <5'fa/~=+JpqCi@cC>`b =iI .BG]*gYXeh\㺑5l⎖ aw ݕPʔr10z^s=0[Fc'>yoc71Uz^hϧ=X"seJ +йtiMdDl>vM>$m!g!.^?RMP彈<`DdCVkl01Ev.A"!ˁ!T`b֦=|f`~IT=W$~ \4dO/jfg ?bk%x巅)`V)\t = C =ésL1u}/Н(iH;Ⱥ], uXОUвA.9}ӡ$mp g0 ^'$` 5ndaLj4h4ZpY-*WTNSU0jC bB#>RE_]XQPY4@H9ccA6Ie'*JKyw#ƏPJe60%4j΂" D`]7V/gQ|wYS U4TUZVRakHDj4dpQ=tLZiUm9I%zJ_'$$}1/8'dN{^0,,\O?f`+Le}-tzu*ONQ,G* ANn"#$#;iF`wB'uPnU~id:Ci>'w^io&YgHM q4lHP϶X=` =dT ,ℾ55R ssͶ4 0+Zyϒ]&8U|Nl: s]`j@T#M#?=Ifc5xim3u (ZqĪ~fDHQV2-,`xiEfXn>hre~^ZE ]Gha}dc3F_5$evK}$H6֮dv,=N(&Z %v "HhEC#n0{~Ad:Oi:B'·,XtVy|øǿ߇\j }MciИ6j9/Mjp)J p9 ˣ6Ø&H[\Q;k;HHKЅĜd>eͨGBYkF)dڐ5 yb "$u,8F9r?rT\tSn{l&jҌd,MNX 6Hw}mG t#o1T0&KzڼD(WÐ(?1<"[Ty/Z⨼0zGbCĎ=WURqφ)zVU#PkKPՇոQdGo>o->ZİZ}n~;y)ǃ~Z]-Tmx!;{&UKYb`L=ݶmQ#Zm,`v{c[Vll2w\ i +:pΆ:?p[!gt ;yBֲ`?˄J `9?D}9%XOPWp"w8D( x+|9Xo̶M]׿xO_7@ SN]<u 5NDuUPVzi˸DvA;gY)b 1l_ paOb|{]hML| 8Hlrc806إ|e1;:,4rZ9!mY[ι0&WKFh3C4`}E|w(Oib5cۊY]k@IPqM#i+M6b$ ڿyh3! |/ۄ*\ot }.G{s>,l &pǫX4LȦ< /?ծK2MPi{}}y~:"ŗ~xI6ZQ*jh@OV0o4?`צW\ 6Ԗk, ?-EUAmeZ ǹJ#nh]II[depw?̲;W h订ô,H\NnfkՌr4Jz<[$ "XC5lH}NNdz/p۶Ĭ=Y2 xPc+V:Zbv0hkUn:vMR&ov^ƮW/+OTd2)4KGM+ Y0eTog_#~PV>;qU"PRtxX1R,yG,uacUݏqxw Q:p[?q8^{ǟ!(hFǙѮ z4ʇ65b}nXVkr]`1+eL@B_Gn>B I;uŝNs{==ɧpW(_G@^Ә\DV;D>=ɦrq *cB-^5O~ݼ!sąZ_`8%7xwWTm HMsXqi[`;oԲB5`sCIdϽ2痏K?=Q ]ekU,x'Aйِ:)cY|%М'%:_#3ՎDH05Ѥ-7;G[4ҝ!ezY嘗 $՗vP*\b̈59il=i;%ZUݱ)=B׆Z]ӑm^E9LDxŐ+y \ =\e㍵xB`OtSx(ϤR$Yh؇g)N,Ӑk[68A%{d%I2''}3 FN*JdFc@8$ST8Z+Isޞs[Wf5cȸ <ɵA_lc_{T!u3`9#IHF' &BzcAB]e# BwZR#<F[£/JwhoCpGnab8LW` Jэ*u6"y**+sFz 0yLk 'n rQ9C HeLYGD Ķ4Śkٔ:ݖCS mC8R><R8kL WA>]렀UL[p#t*~?Xg/k86ɮw0 G.NY LfF'[.@-O1n>Fc‡Vnؠlw7YY5f,-@j\@E;82{ O.Qyl#lv) B]?|xw3|0dIޖH[_=B)\紸qMxUR4X9Cz*ף\^UGߺeSɻ )uq !~tW*|]' /Jl1q@RF)RnNH9'f n u;6:ͧ)/gp]cFNM]gE/w1Fz/zd; Q)ؙAUG4\5|ǂSdmڂU p9u[KuF$U %s׽VO#$OL_Qqю9))p8fJݰd\q /;֑6cac(K7\_} ZY QnoCvP~N2ي^Y#@Fk_*-r*0~LB(J'^W6PwWز&RYd7ڍ/;H 6!jƌ*Kr)`Lɜ{df( ~$ǘԂ#} \wBH̓L@:<ҥW.et;U, %EUm3JjCY3bs42r-"ʼnSGɉ~cSoXcߝŕܨTGv6kz"#"q Ujσڐ1u$E{N'L*B5 ȉ̉7;cc%D4$\E"Y VVK/%tcơͥ۲ӵRUcMs)lP6, yV&y&AGL Gc캧!?Ɨ*?ZZbKA Iχsyl5W$gґkoS.CӴ9㨺ƜA2 sbeG]qA:_Gn]ȣmI!Si FЪ+g'ae&҇yxa]v>;2;az!"[bO_(.f>vƤY { Cf1)YM-`;60*@m[6 KX_/==[9$?JU,9jq/X$Q'',T#Cg@:1IZU.vSԸ6$X3TJ`,3虦R#铮p/5~3>c49xo1#QU`r薳㭵07nƗO=?6dK bCI[iYjJ?j/Z߲Omh%ACL,F(gqWcړe %|Ct|ԱqK, r:%Jw_ZĨswDYQoVAc 0V \,I S '$2>WDD,j_L/z~'F^QX+Jޮh=zA0MC#*tGT@Q}liסo<:8d,4 oؾC_Ticu,{: G2O< Rjn~1,mo/߇|WAcR4x`mX%#J+~ƺ0oR!tҨ}>mu2xWjt|o\76:6n_F/`7Ь$&bHԓ27s"i`g|E`G@:[`"сSK{EX f99`9RY i(, D ^lc PL+an3 t|f;n$-?g#0ĴZin`j/jTG{GaSBHIcbR2]pzQe zlU3QHrKdnS"7gula&ιj R6 %YO}Bdh3PD91bin U:NDLt^SFֈŕ'v+n7Czy5M;R:Mf2Zp#6*a+ʅjᯅ]_6Jdu77C7YM%OAP t'+3YuDlǢHg=ksZ 5œs-eM >MNO`BqAH]E^n4M)>{q9B<[@KPP=ih"O7(JfJ-飡BB\d{v)2΃.I"@I*sCUgz vK/}e\!>+)aoJ>)?R;($&y ؘeMc=& Wk${|ի( =)` ';c* &B82bq1?PєF\(\3YAn &lCy3LBF:T#Py-`5Ub!5T̊ X-Qۧt/YNҢLB;-+')E B98-^~yIփȃۨ oSM{dYQV8e;8)v'r 0>0Sx1k^FCYreXX ?<ŧњƀ` be9iL: vYXv`1~yRSJC,&uL$F9OHUV0~;X䎨~:%/˕AFb=ga}Dwg]9+z2 ᛣxQ>c0(؉GXL_,܋N#=y ,u(8HVJIWf8ŭ4"9{ޏzCH08tG0W!~o`ڳ.B^RxY4Ԅrͻtw)@vlRŁ 7QnD>joͿT\7F*t_KQ`t~eDxCnfUBxyq`]KXRw+ýmg.goc@7*ǎOCKٔzl>I\/M^ 2.yg]l#WNHuV@gб51BWefJj,Û/s" rTܷg^$~㚓v~gh Eq3'ީe1{J$XA^ڰ:JA3vɐ.cԝi29ˇ']ڇc^Z{E(Mʔ"aG;y IfPjnNPC#L&+g+j`%wz_po}v0z43}<ABKޜd5ۍf_ʪ=P W}c JZj(#IX=ht?뿙Nc JpOѬ֢.:<'&0ׯD:ӗ)A.0,AcTۈt(Tgc샧✻ĉYS~~x9)Qsᱝrs0P"y"}Lfjyֳj@0N rCAb\t-`>wc| B mt,Nڡ66N<BS\uLZ-O>}R-Rh]U=um׊ޒ:'q!ܽQ1k0!y6oӣ >P(hNHbޓ[GiCwאbtv$.סʏLd}fdiyNoY*4Op>l_cVNrwZ2Zx~yYP%[̐Xikő}8B\laS8"@~/:""LFQ-;BZ*-hua@F\`*]V7uj&`{*2n=WNd IG7 &*X,N\xاY'4!xpR\BXFZLXK݊\$4+X5-IV;6brH%ZƳgEW+uY~IYvuDO@ilT"|m=LI 聋QpJ Р U'ҫw, mMbn|Nat#=PS:%>#}^wZ =S[}VvUle賾-h˼^U_QC5!+ﲶCMF&roC mp2@UGq6y?Lu2援 nDngl2mK5ҎTy$B7lÑfwLB`7Uy<(_bA+4ANr[tvPϟ fm #'9JQId1]4M"]7ĞfuF`;&̕^E/96TU,Y8.h )=6 wЎfN>$^IlȈUf:ZN3_Sgel7 ?U5nuGO1U3p+$^;Qt~,&oW?<i 2${K?`&(kSH:iDE Oޢ/m}ScT Ukbw[)% ^N?. |Ce fWͽ;=ط۝'3Ewܡr:`qd"qV" N1=Lbc!%Io XE{3GӔ~}gsNUor+G㟥Rh'M#ӟa}C.d{cꝢ aCn(F)t ac%Oh]OHԑL2T `JQz0:nflkqRa( ~50)D940ߟ#[w4 3'L0t3Smϝ'đ oѼғRÿHHbe8FmdnQ$uX%Aq!ŎŸ@ړ%Z6p;hjsn+hշazVBCM"*jbc~sly:,epȓ< ^Ha`tx _#e7ubV^GjKTu|_XW^QM8킱o`2[/лP*<6D"r|9- ؖ$q3ͥa g7@pdUgɖ3HҔozu`HZ騮>{Cf/>ّ x'm zC,- `[Uvb)D2ݏ)`[:S; ho:l$QWTq) J;!#0ҏB*׽בJ.<h$8g +bɻ̈́$BKzT;pŒ$GoUÔjs#wMv2?cd4ǥ P΂\% nG"mynH?G6' AoTa B"XeHB{ 0W CBL 1*iDv&J!L&fCg B-! xSv廪VSGfH'izߢ -=:b1jJD@G붂-v(yŇRewh" 7LP_(Zk;ByV%x{PrkoV/jjwUJ5LZO/ )(j? 0L(Lcdh+U4pGtߑՎe}63(lAEүohmA’/R_2rs|&rLX> /<⍛O=Gx2Se/9ɀ}T0ԇX( Wz2&,Zr1Ǽ.q#k1^|#;/B}p-g?YmV}hg2 O$ 'H1To'gy-S⯇).2]^..}WuKbOv e=U(|ap[uP㯶1>s)a ~:7|J#0i% ˱9_n濱tl@A\}1ծ+rl*Pۏx46^IGSpzH?њYw|@, nܮs 2a!zDB>Pu} D(uAȾkOaE1#i]ЋOS tӳ u&89vї+}!X}z 5ː1}6 &ILt`E>{ɑV7U9L͞Ka([1#}LTℏw\2MyY ez ~RU* w-2G]/kgG:> #G2 kuB+X<7.4qMu%l[*L-g|۶ϼy,2]yU䅰Lµ!^\܉kUE*Yx'ݔ:rH6CQ|IW)T 2,ݼYa;Mwb$nCs )Ï-_3L8\B|9"N/ -B)>%p^!N Ɵ]yt2K?"m:H!q) )"O@`"]y |- s2B]X\anTg8ILlYIfI 9aMr}p\p,6#^4fr@a J|A|#≐I Fh_p/ YdSGiŋYx#f\@"Z@O*Y4R5S_ב\)*/i'젥ׇ% Ƿk!n-^rvȾ C[5-vs\7@~D_<$9 BHHfRs),,(C{ڥJ <j2PzT"[}= Z K呰u0sf1waʿbjsen,f kL <+nfLR#`MKAMc[djC$mtj @dmV `TIy۩V\6GQ5O堩 HIa*1X)>Q h8ڤ@ۣ87tL6B[f5A)hD X"_?!tS9A=4)Yv[{y 9bX]}/k@YPLwTJHX-rqݡ3@ww%7/-QWb!F\yM@@oi5s`򪃧Oe(%E/t]'4!4W5MW]cuZHD.FE/ @G,dQdQN?e5_Tn&(|(Fc<&u'D "M'[üِG?g?+DS/cEo ˱ilBb m ]_fL# Tx-ᳪ6uV[X2 ;nǚVSonQ٥oۥNJYN[kȤyPדSb0*aڔt Nȕ kx =%BPs!~nX-O٥ihrQu[G|@scq慔4S0R3.JKnT9uy%U}g>Ŀ>Ic}JXB#B/i=Y=ę5b%tU _J- +xf{apAR0_1m$}PCɔni1"NdrLJ~M'w{ٔ;^k_:j8:K+-KQnD.C"v"!fMQJ͏D=y؆n?UE3s K" Ҝyaedif C/SEOʒCe/|,DN 63k=3KBVo4oug7uܛz[/SBcډ4FTs\"\908g0f)TY3kUe&0 b(]+. otu7~`mNdlfZ9iIi@e/2ގPh4(;_7lLR_ΓY~p?wD,R4h4GICiU2PjfS1_c#/M ձdL/'iae]nPE"D'GY2?ʖ+3UςȷhȌR K启; ZyIq~C iJ#,,\IqHDc <>6]͎buw+;[rS.uOP 'Q24|R$B*# >M'dWT[Sū!rCgX'…^0z3Ӻ0W 5pS}W ítp4SMG:%Uf'&W"OΉ6Ƙ&!SP4E^Q>2~$[i#Q+[+y: ;hub=bb̦enkĠ>$-(o㓸ŽgKK`̷hs/wIcoh _R1?oPե_!;Y ^܇g$Xr`A;xagIlxÀ'4-xj6{/V}nZ_\/"6(FWڶ+q{& K@/*s28>ׄQf9CE(l3 I0!`A=r0ĩTK181ЩO)6 TJ)!aĿLPPL\7K6ٚ{3\g$B*w?hxYà4ha.%r p[tپ!7 4;`" t+Q<ͫo$tCmZF@T78:4^0gE;h6TǹBع7x1m$~]Ao#D;{0k2u=w+%(n8=OUs];ޤ;E8bvR*H2ꝲv Ů-<#q`S㸁xwD C8F8^ 鋠lM= $U%GJͳBx7ә M).UwV`Z4FfmSDPyLl%9|FTw%=V;q_ NI Ь:RƷzIRNGSVWc`ĚHEeLEIX|5+zW0S'BBL1FBk| V͸~E}1EQr$ 6f!-j~Ar ?Cm[?}Dɞ OWQpT$5-q)&8Uc+. aCb{UĤ( [sMIVpKa& f#ۀT M-hSt!Dh+5 /^~fꞨHZ&(TZԪW'>s XU0q\eoͪRpKjӰ&T?8Bij]k13}Lg d-Fo1|2yI\Z<r>0dWq&1.ǏRq< Zr p$ݡahn'i!tA S3UuR &(̞\·Q+L2͝hT=Ec ˦wzC Xi@X'kL|!ߤ;^u7NjGO!Š#gk7.q.8=|v4~i:CESSXS.R< 9R1$,R\")I Sfwi]Bo_}#./2&3)\"jX&~3O29 {ڋ'3:qy}o̗-wr-C\=H].Tvms^ߍHPgzOyM)Ÿ"w^_mLN?»X3fWzSqﶷFٰ6A(4h N?v'Lnss|%ѫfys<< R_y9g :,4 k,Bⱊx m+2X6t:҂I)l5CR!#[9v*%#f<>;N}"|`c^ov^+ yO0MtY G;=dL10H:($/rhr`5ZQJ5f~vMb{C"ay!DfSV¢&Z'֖hࡎW#Ud^pޅy^!OB5{Lnǖv]?Ɉi(",5,f+Ԋ zS:x;B̜T I_T`|*{D, ,eV_\ҵ4+ű_`Y_˜2ƣ0#oxskWؾBOpKdѲ+~KɊ{L.4n%T_8Xn-@^ܵ,3]SR{ی:&SA@\>B .roI @R|X=JJgSpVGI+ff҃eY ?hzvev#`!@x'{:P 2/8I!^&w2 U|#΃ f0>\Lzq}p_-0.?$1]Bf6֎aiPy1F "ى)?6leLn%#ӪsdeVp%B9SMvʁj|.f8}xΊޭ-+In(̶2egJ/ء_mh*gB~_vu*)sx^o7z Y(WrO".ɥT\O@/= ÅrpF<>đ@uU#4P]r:2o ZFw@V"B2cn#Al?V&OfT?.ljБet1}4鼁L[I([\|caWZOlg2a `2)iR ߧ[?hL R Okih) ]K@WbARHP+!ߏEh #6i\Si|BsN6p:11="DZ5U%1.7pDrI-s*~F˞^rGaf.P;ўu?,8M($28?m{鄣 ڮrb?, %*I'-Q.:竱~t5 i5OĞuSha*+ViF=CbrY"l6-Fh x8c8o?˹ϳFv[#Xѐ'N=AnhF1V'hU׻4yv ' lx됭@MЊs Qe6HћndKSh2ブ Ɂ`<ݐcYl1B,d7}YZ?kڴ߬3M]Sū][m%pJBb1'cr,bd9ݐOZ0b͢mmF e(DŽ qXUJ`C|8Cbي̬0Uq\{pBzі@$-4ƔNٲ z<UŅ,QE]] ,gZA 0[%[(f:P~T^rUa-'M(1 =w"s E94q(^9X|?(BpW F,񃍒o.A5%p/7Hϖ w={r>T+%7 tS܄iD0fGqgx)EyܷGV|D}|Ԇ7Щ-/sM+|b3pUj+z&])d_99Q|m-ܒJfNYՃM+HI?^AvGEgymIdk )Դ-32ɳ6d[%|exT#.h1Le ~!F3R^Y=#4kّ[_p%z|@'D}!|p,ʱ:]')W5Uv}aQ18#f2 ö{Ɇ7܋q8Cųn %O&*Ǝѷׂbnc4~!26VE:(a]˂s).4\bW>r_{ ԎH-ju¶ y_+7HcSL ţ]XWȓ, ̘`%˺9бRyvIɜuzy>޾ؽa"mMW=K Pr=7R"Ar~11Z}'X~&@t AJ[gThY܎J| 5Ues훗v7hN6梴OD 7/f{Wr/K"gH+4Fr,,Dե^?] ժ}T36c~j*0d mж1 si_2Q҃dbueQ:.ыmF iug5 [{3X闇7zx>gflk- [ 5۾fzV ۑċ![l:IB>ENQ)?mb5Yݩp6 iHr | !^)P< gK=1xB z1 η+na(#U?DPA%BʬP͕r0^{IBͥݘ s61V"*nzÕEkOP}qkrk}Tm8Hզ`a9-TIh(vlBi/J[wV2@ ,a ~`s&̬[3RFYB*)_uǝqϛbpKQ,[ 7BGÏB)/ O4ohW|Oa> $e$WYR %{OmE+P}윽 mfzEeo3 a~*tSvݩJ1-Bu[#=Ha* CA4ڙJEڙߐ? ތ#+zz˲lX3ѨiRl˘ZpH彞Eh/3 םJ xy8 Z8;1MHxLԈ4R7(# ϘlԩV{K5F͝HpU'yw n] wҫ 7y&#Cu1 H|+%#öD?6tT/s[CzzGlqs' 81VF ]o/fWI\<@v A+g@T5Eh̩kJiif4J_a{ɓ} iYR$KJlH>`(MVܫ&q?'<(r.xڭ~Ƭ+ rXpW?iYr=!؂;|#p P ,*ps,[42[,c#9 t3@~d;6E,o w HpE9 hen&ѽ{|R z'vy8uޒs''PF XȋܛeŖVf4jRVZSm p+Y>`;NDn< ˷&„L^LYIe W3: q_97TkFsY7C1yX-⧜Hfqer x @h2K\J -SY @zjo) 5}N:l){Wm ߎӶsDf2_R!bC u6JKM !oNdp9yNqI?+n,{ք__ߖ#P$){ ki?Súh\qC4%{3+ i"48A4(lW0K}܂>&$v6_6js&3ʓ}fBL!L&i|[ES-\Yg_aqgBXRYe;S k[ Sťt 9 JrZG <=Jő{X7hɖJ^B/퇺2bW;T  K}LY%e}=G]%;rxrf:(ϟ DjtFڱG^kt!ڏw$>!H|)_ {aoQn(ߛ etj!_Ϭ W#+"'lYSͯ+LP"iOlY@)@fH`j>& |Ǧ.̺[9cK=@~zҙ}lBoE{.k!r*=#YԷzW$ے*<-27^⋻8|)Λ!Y/X~#;0w/ [mYEcCv࣬ rz76|Pbv5L2<8Xޯ?G #Z6ÅVļ@>U𨨈e7ʅھ1攲ՆtV5.yRoV\^杻Tjږƺ0Ka</RԻl:<;Lu(`UhkXdWY8eTnQEwЂr| u6M$F ]L!kux.,'F׺sM_(1 GlTjZLYҭ515eg; %L$Sq۸"@/7縅yUuBi&n\ ݳ> ZŅЦ /dՓm;vd!$ȡ*wETh^-,)w8 yC^v\Tv9󘑷FSNqCG!gT̽}]d749-Z#W n1_ޥ{dr?HZPKCpHGvH8)L8x !&k/l-oZnu+S*{#Q>5鷢(:f(O+ɠкs`{Һք,f[ضȴ&(Y5e_5Ս̚GhfMɪqP@L[qHF]yt[վoqn{Ձ~Đ !7_ p͓m{ Ww.>s-ꨍ c6dکG߹&#栝yubW*͓3 kIR@1^Էt:Ü6\E;?]3 }DofrzgP ?ƹM[%M}ID^V=vm2KCr5*n?* JotêYF9琋=l8=1 ?MsJ3e4x!3 05.Ι M3:|ոL@K5> dGJrWOUQU!Fw7D6sF̫ƼhϯO8!ֶ`GO3fh#)l[3gSm|2,E,0G2')|XapFZi/9^T廌qʺ{O{i~";cc&Eh}/"Uc,1Yn:mC,usޙ5[a^t hGyLlt|[tJL x8"b ?+.@6K60ܩd7dvE8]|LvV@[Ia3 =MX\#С(6C~B|:vU<{N':KF . 20hT={S=>sU(1bp(GPqڀң9AMV6ݴt9g|cğ7b!jqqjXj{eu'X1nR)) XZx$UčXׇϩ+\KDj.e9V?5iŇ+v/)F(Hy;W^cvУoC&²Qֲ$ U=N*՟9ײ`zX:mDwWEbൎ"Z^mFĸ~]1r}: 9_?U9D9UXHY+dcxAh pJ`S# YZ