container-selinux-2:2.159.0-1.module_el8.5.0+733+9bb5dffa >  A `^2U]) thZ[ݥ] 7 (6kإv"GAXC_cyA Y)R"ڙ%>̛A9oN?^Z< q/1WtPBB=„OYZ:_ ij =\XW.[knHCsj.)eZG:7%$i:EJgvdmߺ<&Bk# FO`]-S8@QH:s^V$5"( Qe>ۑu+C i)U`s?ok |=lĮ׆wTa okHŽ|C|e@Zkʒ OqaF'UPW%tʼk0[(f.uyq9, :gxUp mTtTb&'G1G(Y"r -^xhOG_bml2._;AQfw{pvy a벚qN C̿ :`Obcb77fe488e6771800c65d061d506a166868455ec136191e446e3f066d9c06d30c24375d9d4842309ad27d2eb9d85091b181156a`^2U]aѧp<^ AaQQdv> F+ƉL7TмWn5Mb+QlcVurCBQ^t1pkYݓs0& wFhm\]̷L<2_r Gk隳I @ELsv?K3 OFT `T Vrռ0hRˡ4V'.#H߉,HPgQv筽JMG{>mNױ[ DꡛGlL\ ٹ~QMO\9fhdV3L~?FQ`GA;qM@H)ǦNHAoGpBFTۤg upN^_GFGld|CY1)teYSЅ_'J&Bu\VU4j;~[mE dq]r&aj%}EƊpFG?G d< @ h 28?x   (  <  d   n   x     D  l   ( 18 8`9 `:`=?>?@?B?G@ H@( I@P X@\Y@hZ@[@\A ]A( ^A bBdD eDfDlDtD0 uDX vDDF~FFFFFCcontainer-selinux2.159.01.module_el8.5.0+733+9bb5dffaSELinux policies for container runtimesSELinux policy modules for use with container runtimes.`^(tx86-01.mbox.centos.orgFCentOSCentOSGPLv2CentOS Buildsys Unspecifiedhttps://github.com/containers/container-selinuxlinuxnoarch . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if /usr/sbin/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then [ -f /var/lib/rpm-state/file_contexts.pre ] || cp -f /etc/selinux/${SELINUXTYPE}/contexts/files/file_contexts /var/lib/rpm-state/file_contexts.pre fi# Install all modules in a single transaction if [ $1 -eq 1 ]; then /usr/sbin/setsebool -P -N virt_use_nfs=1 virt_sandbox_use_all_caps=1 fi export MODULES=""; for x in container; do MODULES+=/usr/share/selinux/packages/$x.pp.bz2; MODULES+=" "; done; /usr/sbin/semodule -n -s targeted -r container 2> /dev/null /usr/sbin/semodule -n -s targeted -d docker 2> /dev/null /usr/sbin/semodule -n -s targeted -d gear 2> /dev/null . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if [ "${SELINUXTYPE}" = "${_policytype}" ]; then /usr/sbin/semodule -n -s ${_policytype} -X 200 -i $MODULES /usr/sbin/selinuxenabled && /usr/sbin/load_policy || : fi . /etc/selinux/config sed -e "\|container_file_t|h; \${x;s|container_file_t||;{g;t};a\\" -e "container_file_t" -e "}" -i /etc/selinux/${SELINUXTYPE}/contexts/customizable_types > /dev/null 2>&1 matchpathcon -qV /var/lib/containers || restorecon -R /var/lib/containers &> /dev/null || :if [ $1 -eq 0 ]; then . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if [ $1 -eq 0 ]; then if [ "${SELINUXTYPE}" = "${_policytype}" ]; then /usr/sbin/semodule -n -X 200 -s ${_policytype} -r container docker &> /dev/null || : /usr/sbin/selinuxenabled && /usr/sbin/load_policy || : fi fi fi6)OaPA큤A큤AAA큤A큤`^(t`^(t`^(t`Y`^(t`^(t`^(t`Y`^(t`^(t8c04ac861d425e9947eb5bc06c3125d682dc981f6327e789ebe1c4eba0d856fc0389dab4c8de315b75e65f20f4e606a015aac29056e561d6f7cb6aa588f431a9f0e73d775e828844df75733f5965a70ef96b19568d76e1b01307182016d455c23565a13bf2a732473de242af7bd705cb5f5d66cb468eaaedef74d07088350881rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootcontainer-selinux-2.159.0-1.module_el8.5.0+733+9bb5dffa.src.rpmcontainer-selinuxdocker-engine-selinuxdocker-selinux         /bin/sh/bin/sh/bin/sh/bin/shlibselinux-utilspolicycoreutilspolicycoreutils-python-utilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)sedselinux-policyselinux-policy-baseselinux-policy-targeted2.5-113.0.4-14.6.0-14.0-15.2-13.14.3-9.el83.14.3-9.el83.14.3-9.el84.14.3`Y@`&m`_T_`@_%_%_F@__"_5+@_16_p@_5_X@^n@^Ӝ@^@^^k@]@]B]]@]|@]@]X]W]R@]@\M[[ͻ[[@[[Xf@[L[K7@["X[@[@[[[Z@Z?ZZZ%Z%Z@Z - 2:2.159.0-1Jindrich Novy - 2:2.158.0-1Jindrich Novy - 2:2.156.0-1Jindrich Novy - 2:2.155.0-1Jindrich Novy - 2:2.154.0-1Jindrich Novy - 2:2.153.0-1Jindrich Novy - 2:2.152.0-1Jindrich Novy - 2:2.151.0-1Jindrich Novy - 2:2.150.0-1Jindrich Novy - 2:2.145.0-1Jindrich Novy - 2:2.144.0-1Jindrich Novy - 2:2.143.0-1Jindrich Novy - 2:2.142.0-1Jindrich Novy - 2:2.139.0-1Jindrich Novy - 2:2.138.0-1Jindrich Novy - 2:2.137.0-1Jindrich Novy - 2:2.135.0-1Jindrich Novy - 2:2.134.0-1Jindrich Novy - 2:2.132.0-1Jindrich Novy - 2:2.130.0-1Jindrich Novy - 2:2.124.0-1Jindrich Novy - 2:2.123.0-2Jindrich Novy - 2:2.123.0-1Jindrich Novy - 2:2.122.0-1Jindrich Novy - 2:2.119.0-3.gita233788Jindrich Novy - 2:2.119.0-2Jindrich Novy - 2:2.119.0-1Jindrich Novy - 2:2.116-1Jindrich Novy - 2:2.107-2Lokesh Mandvekar - 2:2.107-1Lokesh Mandvekar - 2:2.89-1.git2521d0dLokesh Mandvekar - 2:2.75-1.git99e2cfdLokesh Mandvekar - 2:2.74-1Frantisek Kluknavsky - 2:2.73-3Frantisek Kluknavsky - 2:2.73-2Dan Walsh - 2.69-3Dan Walsh - 2.69-2Dan Walsh - 2.68-1Dan Walsh - 2.67-1Dan Walsh - 2.66-1Dan Walsh - 2.64-1Dan Walsh - 2.62-1Dan Walsh - 2.61-1Dan Walsh - 2.60-1Dan Walsh - 2.58-2Dan Walsh - 2.58-1Dan Walsh - 2.57-1Dan Walsh - 2.56-1Dan Walsh - 2.55-1Dan Walsh - 2.52-1Dan Walsh - 2.51-1Dan Walsh - 2.50-1Dan Walsh - 2.49-1Dan Walsh - 2.48-1Dan Walsh - 2.41-1Dan Walsh - 2.40-1Dan Walsh - 2.39-1Dan Walsh - 2.38-1Dan Walsh - 2.37-1Dan Walsh - 2.36-1Dan Walsh - 2.35-1Dan Walsh - 2.34-1Dan Walsh - 2.33-1Dan Walsh - 2.32-1Dan Walsh - 2.31-1Dan Walsh - 2.29-1Dan Walsh - 2.28-1Dan Walsh - 2.27-1Dan Walsh - 2.24-1Dan Walsh - 2.23-1Dan Walsh - 2.22-1Troy Dawson - 2.21-3Fedora Release Engineering - 2:2.21-2Dan Walsh - 2.21-1Dan Walsh - 2.20-2Dan Walsh - 2.20-1Lokesh Mandvekar - 2:2.19-2.1Dan Walsh - 2:2.19-1Lokesh Mandvekar - 2:2.15-1.1Dan Walsh - 2:2.10-2.1Dan Walsh - 2:2.10-1Lokesh Mandvekar - 2:2.9-4Lokesh Mandvekar - 2:2.9-3Lokesh Mandvekar - 2:2.9-2Lokesh Mandvekar - 2:2.8-2Lokesh Mandvekar - 2:2.7-1Lokesh Mandvekar - 2:2.4-2Dan Walsh - 2:2.4-1Dan Walsh - 2:2.3-1Lokesh Mandvekar - 2:2.2-4Jonathan Lebon - 2:2.2-3Lokesh Mandvekar - 2:2.2-2Lokesh Mandvekar - 2:2.2-1Lokesh Mandvekar - 2:2.0-2Lokesh Mandvekar - 2:2.0-1Lokesh Mandvekar - 2:1.12.4-29- update to https://github.com/containers/container-selinux/releases/tag/v2.159.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.158.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.156.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.155.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.154.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.153.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.152.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.151.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.150.0 - Related: #1883490- synchronize with stream-container-tools-rhel8 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.144.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.143.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.142.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.139.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.138.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.137.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.135.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.134.0 - Related: #1821193- synchronize containter-tools 8.3.0 with 8.2.1 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.130.0 - don't use macros in changelog - Related: #1821193- update to 2.124.0 - Related: RHELPLAN-25139- implement spec file refactoring by Zdenek Pytela, namely: Change the uninstall command in the %postun section of the specfile to use the %selinux_modules_uninstall macro which uses priority 200. Change the install command in the %post section if the specfile to use the %selinux_modules_install macro. Replace relabel commands with using the %selinux_relabel_pre and %selinux_relabel_post macros. Change formatting so that the lines are vertically aligned in the %postun section. (https://github.com/containers/container-selinux/pull/85) - Related: RHELPLAN-25139- update to 2.123.0 - Related: RHELPLAN-25139- update to 2.122.0 - Related: RHELPLAN-25139- update to master container-selinux - bug 1769469 - Related: RHELPLAN-25139- fix post scriptlet - fail if semodule fails - bug 1729272 - Related: RHELPLAN-25139- update to 2.119.0 - Related: RHELPLAN-25139- update to 2.116 Resolves: #1748519- Use at least selinux policy 3.14.3-9.el8, Resolves: #1728700- Resolves: #1720654 - rebase to v2.107- bump to v2.89- bump to v2.75 - built commit 99e2cfd- Resolves: #1641655 - bump to v2.74 - built commit a62c2db- tweak macro for fedora - applies to rhel8 as well- moved changelog entries: - Define spc_t as a container_domain, so that container_runtime will transition to spc_t even when setup with nosuid. - Allow container_runtimes to setattr on callers fifo_files - Fix restorecon to not error on missing directory- Make sure we pull in the latest selinux-policy- Add map support to container-selinux for RHEL 7.5 - Dontudit attempts to write to kernel_sysctl_t- Add label for /var/lib/origin - Add customizable_file_t to customizable_types- Add policy for container_logreader_t- Allow dnsmasq to dbus chat with spc_t- Allow containers to create all socket classes- Label overlay directories under /var/lib/containers/ correctly- Allow spc_t to load kernel modules from inside of container- Allow containers to list cgroup directories - Transition for unconfined_service_t to container_runtime_t when executing container_runtime_exec_t.- Run restorecon /usr/bin/podman in postinstall- Add labels to allow podman to be run from a systemd unit file- Set the version of SELinux policy required to the latest to fix build issues.- Allow container_runtime_t to transition to spc_t over unlabeled filesAllow iptables to read container state Dontaudit attempts from containers to write to /proc/self Allow spc_t to change attributes on container_runtime_t fifo files- Add better support for writing custom selinux policy for customer container domains.- Allow shell_exec_t as a container_runtime_t entrypoint- Allow bin_t as a container_runtime_t entrypoint- Add support for MLS running container runtimes - Add missing allow rules for running systemd in a container- Update policy to match master branch - Remove typebounds and replace with nnp_transition and nosuid_transition calls- Add support to nnp_transition for container domains - Eliminates need for typebounds.- Allow container_runtime_t to use user ttys - Fixes bounds check for container_t- Allow container runtimes to use interited terminals. This helps satisfy the bounds check of container_t versus container_runtime_t.- Allow container runtimes to mmap container_file_t devices - Add labeling for rhel push plugin- Allow containers to use inherited ttys - Allow ostree to handle labels under /var/lib/containers/ostree- Allow containers to relabelto/from all file types to container_file_t- Allow container to map chr_files labeled container_file_t- Dontaudit container processes getattr on kernel file systems- Allow containers to read /etc/resolv.conf and /etc/hosts if volume - mounted into container.- Make sure users creating content in /var/lib with right labels- Allow the container runtime to dbus chat with dnsmasq - add dontaudit rules for container trying to write to /proc- Add support for lxcd - Add support for labeling of tmpfs storage created within a container.- Allow a container to umount a container_file_t filesystem- Allow container runtimes to work with the netfilter sockets - Allow container_file_t to be an entrypoint for VM's - Allow spc_t domains to transition to svirt_t- Make sure container_runtime_t has all access of container_t- Allow container runtimes to create sockets in tmp dirs- Add additonal support for crio labeling.- Fixup spec file conditionals- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Allow containers to execmod on container_share_t files.- Relabel runc and crio executables- Allow container processes to getsession- update release tag to isolate from 7.3- Fix mcs transition problem on stdin/stdout/stderr - Add labels for CRI-O - Allow containers to use tunnel sockets- Resolves: #1451289 - rebase to v2.15 - built @origin/RHEL-1.12 commit 583ca40- Make sure we have a late enough version of policycoreutils- Update to the latest container-selinux patch from upstream - Label files under /usr/libexec/lxc as container_runtime_exec_t - Give container_t access to XFRM sockets - Allow spc_t to dbus chat with init system - Allow containers to read cgroup configuration mounted into a container- Resolves: #1425574 - built commit 79a6d70- Resolves: #1420591 - built @origin/RHEL-1.12 commit 8f876c4- built @origin/RHEL-1.12 commit 33cb78b-- built origin/RHEL-1.12 commit 21dd37b- correct version-release in changelog entries- Add typebounds statement for container_t from container_runtime_t - We should only label runc not runc*- Fix labeling on /usr/bin/runc.* - Add sandbox_net_domain access to container.te - Remove containers ability to look at /etc content- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7- properly disable docker module in %post- depend on selinux-policy-targeted - relabel docker-latest* files as well- bump to v2.2 - additional labeling for ocid- install policy at level 200 - From: Dan Walsh - Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a standalone package) - include projectatomic/RHEL-1.12 branch commit for building on centos/rhel- new package (separated from docker)/bin/sh/bin/sh/bin/shcontainer-selinuxdocker-selinux 2:2.159.0-1.module_el8.5.0+733+9bb5dffa2:2.159.0-1.module_el8.5.0+733+9bb5dffa2:2.159.0-1.module_el8.5.0+733+9bb5dffa 2:1.12.5-142:1.12.4-28selinuxcontextscontainer-selinuxREADME.mddevelincludeservicescontainer.ifpackagescontainer.pp.bz2/usr/share/containers//usr/share/containers/selinux//usr/share/doc//usr/share/doc/container-selinux//usr/share/selinux//usr/share/selinux/devel//usr/share/selinux/devel/include//usr/share/selinux/devel/include/services//usr/share/selinux/packages/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m32 -march=x86-64 -mtune=generic -mfpmath=sse -mstackrealign -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2noarch-redhat-linux-gnudirectoryASCII textUTF-8 Unicode textSE Linux policy interface source . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if /usr/sbin/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then if [ -f /var/lib/rpm-state/file_contexts.pre ]; then /usr/sbin/fixfiles -C /var/lib/rpm-state/file_contexts.pre restore &> /dev/null rm -f /var/lib/rpm-state/file_contexts.pre fi fi #define license tag if not already defined/bin/shutf-85cbfbeb5b0abdff58de596e86913fd789cad9e8c2eb52d8323ed527a4cf2ffa6container-tools:rhel8:8050020210326175410:faa19cc5?7zXZ !#,k] b2u jӫ`(y,dW&n\6|[Bu5'weW;/2<_Bz|cG{6ar B.y=aT@wi9|>Ӆ-xV" 5r,$XX*HhCvVގ&Uc&-_OC5," @PK~Uк-7dt„O} \d4jv&7Xz}8 1ur .M4FtBjFXkb멞hpI>;%pqw:ԫvg_N 7R(ϥ =$Ɵȿ,g>nF^7}dAWTa쯆@Xu['4roҒ.._I.䜘% qyIWn:u!Kپ0|]?{ӛ7o4% Avҽ+tJ?BbUo^_ a9LάvjafHPdibZ;cyxLHq2%N8zߞC f=GnU cBV9*]Fʋwt¿ 0SH^kM>hӢԫNxŝ[Eܹ#J`/)b5RL"m P<m֊{J;z@b_UOG9<] 9w1j+~jC'$!fwx5G۩wf-9:+0Z]d.Ot\[i†` Baj38SW! jڎqhA"Nm7{OM@T* sǮƨݡ:f+]Nd&s$f#:eW=G&퀽Oߑ肙fv SI w\U:/LeLY!ƙ_oybgLX lP ;.:/y |c5qdJq:atˀç!mTL:9lf(Jt3FوԞ~։[B¦inQD) F?`.Wv4|g;UO3&Jx3WrK1ɔ`t8l!0dq0zCa^iIӯS)S!o>9@` #RDn44%!i! қ0 +IBu6ǗX|BWh#+0N{K**_YrW=Xb7DŽg?}ѵtBhѦ0:ɘ ͎cIOY(3]Cx&[D T6 Z L_swi ec'SxWUozVt5_.4T Jw!C3F4 |tgFr]n˸bÄNg sRx*Z[x/%4L?mCk̍/êA&sZD4|#)" tgl2W~y|q1?--T6GZ4NAseTFSԾ$52v^|UOgv,2P9`drsNNX<+ڱ A?f)u>thdǴ%rea%OջjeR-GZu1M_ei{sezqTؘI"/l|,fAE6f^J|/]4o@i^3KM½6f_8Yz $Sm9 5xٴ"JHw_)4}tF7{? k=آ]=zC|b6 9-hE3IgdEa۰\F(& m?\^v^qgchujv{GYgz[xjjNER5slD/Nw&8'/R!PuQX˛Bka,Máw_\y=ItM}i Ķ\@`F0>BQE4*Gd)j'ްGܘrJ xZإsDʉ1OjP_յCsC9pJ HTH3szی2u\XbSE<?E1t$jN^ A[@YG| H4>(`zT;کMDBY9T [0'~b:Q>H؛UQ };_eqkۢr>Wcel"ƊjDj=.xr> 9eA$cU;r "iq0| E>ϯS+_yM|qٔ(pn0j( .-茻{UT0<4 gBam(c)>>>X aᔌs_Tn>Tǵ)ǂ',$( w7C,{\tRhtrDŠh َbW(_r7:ƝKd7,bLNƵ|/ZЀwX<O-yx(ok- zMf'֒?F O8JP*=-&s4ힳFqup|2}K3B}ͳSr7bcӔ'q.W6?JOCT9i@!ʕwqgwӼ6x<F=8 笴bx,#ix1Ђ=bYZ6 iVRT 2_6GB5ngAԈ7 v#E-!Q5ҳG\]PPosEWftsFt+鱬ȁ# ʽ2ZΩx_vݭY|#1kEbߕ~2s ͍CD8_GwPp}wKS1b/أ ԉg4떫'y Ԋ$^$)Eqd&İ^y.5Pux>=D sAt, NY=y]^R3iYy^ì7K%[9˕~pR׍8Q{RB8. G9d:RA/`-<toxEw{ "}d ^t}doۨ|;BAtUDEi>y&/Є|o ])}M4NB+Pp̭GzqQ&NV.VWV)( m_z?=>Һw,,Nڵ 6f6)- oìDV^n#]A֐2=5graBR$ ~QC'M2%Е늾m+ /8G3*K 5ZH {zr>z[DGZ0n* e:a>qh.څy1gmxzB ,+WUPN{zy ]ڛ_c2Wg1Wn)t\[Nho/N,S2N 4VO4t<0 lGC%p;?FXL&N׈0'vV^r݃jPa+r eš}F>ϘZp 7V5%+ Vh,D4S$_`s`tNYWSeا  Ͱ?rm/@"s̴:VsD J47!\Dq{EtÅںE]Nm "<@ˑZWOJۄ=`qvLb<|1%"PUTѾIɺ9<}P<`EQπ֌K1`m6l=;>⊢D/ i Gcp-3(ɴE.-ZfP?P\1BVUsuvE;[fvyƩړD[8 x>|{v (MSF]AD ))N9bok:emO*]RcЋ;X9l(f'Hu~BZ̼[c9;{82J7m2XڄyPG>YP)7l"ϫVāB$"6Nt:'Q /T@K@޳@T]wr/3Ztÿ=p{3 %-E9^ݛU7IGM^a {*&A~E@8q 9G48;>΀`Bbnla|Ty!hm>(ɬ~ݰDf;[;nPW.83yJ\@!!~_پemY&K0[]lPMǃ!`i9yGRقlC͚ vVsxKD= m=2េk$EدfN6m͝4YJ? #?KEVί%K~z2AIJz+qbweBN3h)JJGlQB0TPM*Z Yu쿋gyPs'X|ĒfEyn@0 P,3P4 j9"a'Jy^M~0iŗ/ ۘų46$GB9:2%E(5" &•3di9ohxa%5?c]kW?gF&ù>\x _OαHqY3 Q"$a?-jb{=?  W/`pꯦlvmˆN=eB~BNC^[o s (!j7W28>;EDpWrB4fX!*2lDc@g- TN/򠨶6'?S%FH&H@dIYڨ ꠛMAo)ٛs5d{ x6G2>kmj^JpҘC;LbgϨf Vڪ- B C%nLi_I!mj 4R$#Y`|5[4&yKx}*t_ŎP_͉4^mdmG#bya:k- ۰4xRhJX*[*MЉO5IN@{gr)DiG %c9K$Nσ]KP!턕`!SH~QId o[LvxI}W$Ss~Os0_MpXC g.>fF|Yp`)j掾5bFB0+v@" r&۽*x91K+d$ !$nYf׏agvn)F M f d(d8O "*̛WdTBͤ=ܔ[C/ZB5'( %@{ǴK|uHim 6 w3'3sʡjc%cO)]`Q~s+-ȗ3薎KjZ:k%fPc>9xM~6OrƷ-"B(; r˕&.{#Pk6Fq~Kο'tQۧ($PNh4F6.c)#^(^L;#e>M4l;[NA9+cU-!Y8>#u+dȬ+B~l0qEȆ(#qgzin荒03tW~A2eO_Q ]ØBרֆ:*Ziv fv*< + ޫy0a_7>NMs2=OMՅ<9O*=A^ܲVťWnBWb\+Z#hΓ5 wN)UƟl=>ŭZ#iw_`m5#M뿞S4 UB[6+jYvt E"oRDKӨ:C1Ȗ"=z@@UU?~83KԀtۓ`s$$* hW? `Q~3q5zIm$)Ů4W@n `A{GO% O\`D7.S+@Lpķ! QMvgQ^3'RPf7$ɪHڷ4BvfK#5܌g̨cwwBM(%0@Hvspb \i+'3މBRa+rA˲xp%VnMَݧ5V ehO6lju?t&pLiBIɡjqH*qRxωG8M6؀W37Fyh;cmd>{|z9[,=mvD{*N͂Y[FnxR~{2{G:)KkѮhfJ,35֙?{}A6M Wvt5;H}S`ih%_ kb_)?SrE)b\ߺ/K.^Bp:0hb茏3 ZIIѺB- rR u'0YSdVݰn_X ,2[O[j`[s쵫_*@!߭(5w:jj@y^U멂K"YVG/= %(3 KM)cBĸ^X -А5c ה;A4 y8B T3;$ tTE5<~U`K#|y1n zTh'V#mAW_ hӜU[L9X ~ \ l>aꑻDWn+W*~'82}lB+ S; 燨qRXť 339%S{f3u5$Pk!3$ZTS7zSYOfd[o<* Y]n\B %qdzdua)r14Zg il3LX+(' {IaCץ߿z\ByTx !Zr;~MA=ySơW=QʇcUߨ]-fS<d"HUMJ6pH29uԌڄv/E|~i*A=Cvmh3lsHbM9qv t@Ngk7xY?BZO/`M_]jvl7 )Y[IIvPYG#\Vs ]\sJun n=7Fh8^GNe5cmJ{BcgLF>auW W$oQ?ixtTF.˅mNBE†o;HXgΜ%͚tUTW Վф!H!H\ʁ1qʞƊcPpau]Ƨ_M]3)+=1 A_} tDo;F; \A8cCjxakL(mfl0$Q`ƾUFK-ݢF!iU&yJy{za?pޛ` Mm9F|9уZDƚ)˷?n[tcp2܋N3]E뾔0Ƚgqk Xmx +]_ mtUvr(I $#kLD]A. ţ(-n p =ϵ w'/Q0'2 l vR{qfOb2q {jiaz6+ɦ,bp򞹻9dO,E;1}`AT ;Ԍtu$wb Jﺃ[LT)㴼̓tܨϼWe(mcS vDklpD;J\$tʮ~D 49tUkPuI#Ĭn1Gw@C,V*1TJ(|l]$[!u{6}F>s.,_.17}q+njН;1󩋱Uva;bPc'Re8!wCoЌV̊BKM{.C:>%AO p-Њ/aWܧӺϢlI4f,]߮*߼^e@9^t6|δ.}# 3D[u5_=rPLI<K+'x ML"=@ ۑ?;8كtδxt' I&*PWp~!ݽC+X_Έ ~:I|!'A HikQ6mWشrDJ(63ށ>H LO96HAX""W.]Ny$)莪lF(F1]j#_ yN*&Ȇ9?+/#;w }Buy+7Zi ΆԷ)MT}2+nK4휏QKf:7Ea x3Yr%!,+CǩSԥ"l#Xu*^T&4L0yضa%N@]%T͈;~ueֿ5qgErNC:,̓ٻhePܼĮbq^:$o_6E<-Tfv(*$JrU+ o&I ֒]q67P$y^\.dq!#*oeq8ɐyw`*@SP5}|쨭0yT\š  ڿ\L̸=&R]/) 8ʎ.Wםc3ZB hj'b7yKXO[jIg+}xthtG2b4L ` 7L0oQ/MP:&nºSILtx(fxZD%a2d M$\KPu]G@I6iPqł' 뗩-`rqͿ68< hgɩO>Z>%Tی1)膳 q4֜}&eUHfɩ;`2H .;L&KTԵp~ú}\”]'홿fE6?aﰕV !>J1-`=M,=L$a3ٕ1vmR(۬ 6ȟCO he< )O' dE: ܂mI&䏩9_'`f"U'e(ٱ d_'\]1:cTYʻm4ޟTH]:7bMK*4/Xdaл~-Z};ϐ^ Vpzw 4?nc{^qcϣ**168qTI|ў'ohx*H vz:Bz%*V--n4|=Z;$NE JUG~rUGRIe{;/L'>`9f-Nmx_詥6 sWR8;٨WHx߯q2dLƾ8Oiq{nh @ ǘ@h} =NbIJ<%m[涚,1ڋcLO׍-Է_Us K|pGl>M`@%AE"]yO{Y3# Di@\P.h[?BkҸHNN n m9Q2}߿Q+EqGErƷİk39Jn/m&bB,kXap҉^fiHu ؙ$ǀ$̦vF8,˵,aZJa-yvdbV'2]KG?qYˑƖ  Վqv?HJ V(| 7 !L'@ ]@hʹV@ 1L3z8sD X<` e<55nEp^)G7llG~׽Yj],YV})9 ?\fi5`R>D7(K`~xLy\eSQ8T{~b1=;8_:GRQK襲+fjF9o2q*AQS k*(Ug9Ao6LzOZB0ݷER@LrJ IFTk*bo\FDz/R̾į6Nl!  pP.qwg1Hz]F.hsLtIƻQ~uaҶ&-̷ !ym  X%lbb>>Q 6eCpI%?1?u+ڗrCzNhwWzQh].4'hү8A '0t|vm.BG(3, QJ_?OGfXQ` RYV X\29T=SWN48YI>I5]7w4Z@sq8gNEa 8Xe>xWtHtW](D[<uPr"1I Q6cf-9e@d1,f+5vr'4xvgVA*"F+Q)g+(e\sœO܀ .'sgtuG-òv;kYkYME$k/nLxBJ)/:fDr,f }T׏POQ+ԄX'8V/.c[[3 -4e_W+68SHAd~W-/Sɏ-x)d_}cj]S'0_)#5idGN Q;.6mI$~Uh/7lX=>aZq۾|JV3sK{{pf^/T?v"~cUzǴ!~'RjpX{Wg0q򂍱k/ 7cy\_ `Y ׿LX֘-|b;$͸\Ţb㥩z3|6|$"p\ݮjRN&! TB?nV>ڻ g' idm;r@,5|KgW`U(Ř-M=R\PRiD]jRq͜!e˷ѹԸ4WI;AިyS+3]ȇW^}SɴO1'oQ݂b8!jg%M*ǂ gA v <%=(U/e qs3;*[&r8KB j#U3WʪUeP:qo(ዩCk&dZuW7yj֨`f7Y]2˲@6ƪL P x&qM%БҊIrӒ"KlX/0q<_-1A v*ۺTRn_wvnIЫ/ϻ|O4,*0WRxxYD/7, G _o&!JB,)M6ٜp!4D7DyGkfx:NO>i@ǼyT_uҢ CK( KN#;O Bl1hTe$T5$ n(=ys*$>3KO%5@;(C4(e$ |z&|h/5 \2.な9Y01D/_hbFq˄spWc 4| GȺ. |%3Ӻ2DLi!*: )e,\4Agbo9*UGEZ: 'sD]c3vVZkϊP+ėקּR1Qrp\b4snm m@@TƺzY1T{W]Ȋ@H9̡4]*@@ӴIlC*Hݔ;̄8(]ͳf ugPBA(;%*v7+IXQ ݫW "h)(`>c v(}no$"g ɯ&R'^&$$v nSh%Z G}S,ؿ1zzAl ȱҼ'VB}XzU? Zː!@[}zqZ3\%1?Xg1\ՄBo??x5h0A2HsVOҤmed5J,k1T ~FCLFrAĞnDe ۻarmiW7GCE呄[ nH/cV`d͢'Fq9>mJL^]nÙPcL"'BZϚ8D.y~^8wli=ol*Օ=fud^HSN+r|ĊQJr%P@?Vj~pH :_ |؛r$o*бLҬu AğV:=9*F(> Gnr왟$1c RD2A ab %7&[ yWwnie7=dAoTy$f+ML>w_45+|,YJVM0 9G"( 3KI E ~K+W@m؀*+ 955m+nJ e#Pm̦E,HAgcƒGJnFNydxHy$/C}`Z!j Mbi;2ƠGahAMeP Px"XAaqDVcpu )$vǥpt4h#87js5I > ,0¸w[DY!0VUWkx\e4!A7KBDoQ}ꥆ$ەy9\U3О2Fn|%FwADXPK%e-}7)!&3 Z>Xo1&)5_#EtmL'm y=P/nGXQV{w (X4A>fTIHOE/F,y;o%rqzyZd/>CR*nNOt!v?t$r:2؛h@B)IP `~rG ZșyC@W?mܧٗNϬDP@ 1Rbߝyb7;.4Jו9@R"wԟ9PE|m >X|]5Ǘw_^ D uѡكEc!-Z:2J΢\bkfF7Ϫ^U3Y-k9k_~G{Y>w\ f! ERb]mmȂ`psu#F:|:®:y,1nt6|C'O.i|WMǹ?nLܻUuIAA!:TM01 ^4]Ham#,,M+^S)0A%-VU +v]wV%KxNn Q¿x`NJ'Vx^J=og{ʊiΣ1&z,Rr~SDsOUG3U (xV ?-.8fXm*([`_dm3(# (63)k6NDZ UpsT7?ȏsh6G./]5?mbϩ.fl#(՗I($ip[ s_$6f+E߉Tx|C*XQ_ M}hD=Rf{з[m\"AeDD?t ,ʐM_ Md".f~FCΧ0KQ+ƤZs]&dW7̓&y!DESBdspEsEajIt֧B*{XP206XvZKkA"tUSXN:" <aByP{=74|," WDTм5|`C棖ٷv$Xm*.:_2Έx(MM:1 &rx$P66!pY\Fҋ°l,#W斆v'~r[^ }CT>+LK/*7a9~%J_ȯ!xok.!Q|_s=@DX'J#P()ۙ"JF{d׬[N4m$0A%k\3Au{=XxJ?XM&L.=%U;>/?Oq?-I-NlO1_6iPsB"sz:F:R 13"@bmK4^c+cٴ %[Nw#wyf@D&J}AR):I%Eĺ]ZA9bw N_j|/kqN};^z>9eWl;A4Zu@Ͼӵo/X78CϮF բ`XW~ML6*9-JDz%|)G^2y6wo8rٲ *B^|FR &/~z:(.:KL`>{qEJHСдUuѯX- 9xMϡF;SMV%3vj8l-mwc9cF}izU9嘨^Dhn^bE[+Eg6 Hq@ZwぷBùlA5ITy]551/)^5Єd-ͤ@R`ï?{Y>M]<ƷA#[MUQiyo!? sBot}!LPğ:͢},ÄlD#m݁-opîb&{dKF&ܫ::-=6K fH1rYU8X ~J;| %*Ij[>-5;VQ(O?{K3Si Z?o:'BL 6lXYV#ᤩ7@vm- jH21#?],I7,w\1: Jg'dK}9)OGp 3Y_ E4eZXCFf:85"8">aav&9>fD:nEcv,}n ^ĩ/:7i6}k GQKhQzK ^ ƞz&O8,ü A"nQ!/ +C@y1 @kU+>XU[>+RVݚ~L@Q{bK@z/ܜvy%ꜚ'aD_,<:ΠWvz 4P1Opb74˸ (IBJt-KLO勒7#RyOO؏ZܽxG kMY9;`'3нKuc$n}M'/RՑk?"Yx\D? ]c% (E^OVA^s RZ4~m{\$ҟߖgb^dOnLU纓[R`MrMTv:\I=]4ؑ3\9#X{F^X֤W,{pf}Aw I)IUaCu @(B`ml"ֵ>wD❮;85մ|lG Il|A==j^ YZ