container-selinux-2:2.168.0-2.module_el8.6.0+944+d413f95e >  A aWU]`LJ؍Ӟbadi azdɔ`S<i&m A1*iWeƻf#.AZ'*WNh3XA/7YQ6&oҵRx3ҹ{={z5G t PMqwƗh#15ׂ.p09 eفM2iCc;'g\mI`8]4!)cm>Ä2U z )?ۂK@Xծ2yGZ=VW/zVS Yr["55h/ :L5sfmiT{4#H G@c!jj~$=uf  Z6/٣ԅ6>}Y5b&Dr"_VK q00^ٶ%Z'gd44cd32003ba46b215cf2ee50bbfeabe7fc16a3642a7887d509e8a399d451160d8daf49cb4470caa2e027b6ec0c07682284a7c81{aWU]_aR݀No%:L3SA~ GNY_`|sn2bERXo]gDO Ik3c'A{3Vg8ⷚiPɢQxMQt&|pIUK?U;d< @ h 28?x< d    0  D   \  $``(8p9p:&Op=Ls>L{@LBLGLHLIMLXM`YMlZM[M\N]NT^Oo bPdQeQfQlQtRuR`vRRTTTTUUCcontainer-selinux2.168.02.module_el8.6.0+944+d413f95eSELinux policies for container runtimesSELinux policy modules for use with container runtimes.aUx86-02.mbox.centos.orgmCentOSCentOSGPLv2CentOS Buildsys Unspecifiedhttps://github.com/containers/container-selinuxlinuxnoarch . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if /usr/sbin/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then [ -f /var/lib/rpm-state/file_contexts.pre ] || cp -f /etc/selinux/${SELINUXTYPE}/contexts/files/file_contexts /var/lib/rpm-state/file_contexts.pre fi# Install all modules in a single transaction if [ $1 -eq 1 ]; then /usr/sbin/setsebool -P -N virt_use_nfs=1 virt_sandbox_use_all_caps=1 fi export MODULES=""; for x in container; do MODULES+=/usr/share/selinux/packages/$x.pp.bz2; MODULES+=" "; done; /usr/sbin/semodule -n -s targeted -r container 2> /dev/null /usr/sbin/semodule -n -s targeted -d docker 2> /dev/null /usr/sbin/semodule -n -s targeted -d gear 2> /dev/null . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if [ "${SELINUXTYPE}" = "${_policytype}" ]; then /usr/sbin/semodule -n -s ${_policytype} -X 200 -i $MODULES /usr/sbin/selinuxenabled && /usr/sbin/load_policy || : fi . /etc/selinux/config sed -e "\|container_file_t|h; \${x;s|container_file_t||;{g;t};a\\" -e "container_file_t" -e "}" -i /etc/selinux/${SELINUXTYPE}/contexts/customizable_types > /dev/null 2>&1 matchpathcon -qV /var/lib/containers || restorecon -R /var/lib/containers &> /dev/null || :if [ $1 -eq 0 ]; then . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if [ $1 -eq 0 ]; then if [ "${SELINUXTYPE}" = "${_policytype}" ]; then /usr/sbin/semodule -n -X 200 -s ${_policytype} -r container docker &> /dev/null || : /usr/sbin/selinuxenabled && /usr/sbin/load_policy || : fi fi fi6)Rc#b0(: BA큤A큤AAA큤A큤A큤aUaUaUa?~aUaUaUa?~aUaUaUaUaUaUaUaUaUaUaUaU8c04ac861d425e9947eb5bc06c3125d682dc981f6327e789ebe1c4eba0d856fc0389dab4c8de315b75e65f20f4e606a015aac29056e561d6f7cb6aa588f431a94dce6af8d6b1b649d30bf5666e4513933948397b3df5f008711cc4365d831f280aa258d0efbc8c9a11c1f85e41d0bc7be73b27f162b8d7d69de1b96d504aa544c95d8badacc674ace0d2fed4fbee4d28d2a92799b23fd5cc30cfb444ee8896b71724330eae556d61248fca0b0920b1de3697d8cd42bf56da8d062a4265ed1b9f2aaad24c9578fa9575445ab4c5208b80b1226e49174e20bb2609de935466b9ba9eb7fd75efad4068dc1e00d43c6176477d13f5c759c1986174a340cb07b822119af286e5e19e15cffaaf7b29c745c800ef94c03d90ee90e0e8e18edc2ebf8f01280274d7f1512ce4677f123f310d300672d6872c3e1f3f13144cd5a03e85ba4b0a6fa6a05496c83b67185cb54805263c502181507d1ae899909090caf986d623dd478baf01b7ef0daf441b7cd616c79ea77eb8e9d2725976b9edeec3991e3d5f67de3bb8fb85b4531702c64fa11b1fbf1746cbd844560f2f680b862915f25d69rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootcontainer-selinux-2.168.0-2.module_el8.6.0+944+d413f95e.src.rpmcontainer-selinuxdocker-engine-selinuxdocker-selinux         /bin/sh/bin/sh/bin/sh/bin/shlibselinux-utilspolicycoreutilspolicycoreutils-python-utilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)sedselinux-policyselinux-policy-baseselinux-policy-targeted2.5-113.0.4-14.6.0-14.0-15.2-13.14.3-9.el83.14.3-9.el83.14.3-9.el8udica0.2.6-14.14.3aI@aA@a'@a&0a /` @`9@`Ȗ@```q`@`@`N@`@`dd@`Y@`&m`_T_`@_%_%_F@__"_5+@_16_p@_5_X@^n@^Ӝ@^@^^k@]@]B]]@]|@]@]X]W]R@]@\M[[ͻ[[@[[Xf@[L[K7@["X[@[@[[[Z@Z?ZZZ%Z%Z@Z - 2:2.168.0-2Jindrich Novy - 2:2.168.0-1Jindrich Novy - 2:2.167.0-1Jindrich Novy - 2:2.165.1-2Jindrich Novy - 2:2.164.2-1Jindrich Novy - 2:2.164.1-1Jindrich Novy - 2:2.163.0-2Jindrich Novy - 2:2.163.0-1Jindrich Novy - 2:2.162.2-1Jindrich Novy - 2:2.162.1-1Jindrich Novy - 2:2.162.0-1Jindrich Novy - 2:2.161.1-2Jindrich Novy - 2:2.161.1-1Jindrich Novy - 2:2.160.2-1Jindrich Novy - 2:2.160.1-1Jindrich Novy - 2:2.160.0-1Jindrich Novy - 2:2.159.0-1Jindrich Novy - 2:2.158.0-1Jindrich Novy - 2:2.156.0-1Jindrich Novy - 2:2.155.0-1Jindrich Novy - 2:2.154.0-1Jindrich Novy - 2:2.153.0-1Jindrich Novy - 2:2.152.0-1Jindrich Novy - 2:2.151.0-1Jindrich Novy - 2:2.150.0-1Jindrich Novy - 2:2.145.0-1Jindrich Novy - 2:2.144.0-1Jindrich Novy - 2:2.143.0-1Jindrich Novy - 2:2.142.0-1Jindrich Novy - 2:2.139.0-1Jindrich Novy - 2:2.138.0-1Jindrich Novy - 2:2.137.0-1Jindrich Novy - 2:2.135.0-1Jindrich Novy - 2:2.134.0-1Jindrich Novy - 2:2.132.0-1Jindrich Novy - 2:2.130.0-1Jindrich Novy - 2:2.124.0-1Jindrich Novy - 2:2.123.0-2Jindrich Novy - 2:2.123.0-1Jindrich Novy - 2:2.122.0-1Jindrich Novy - 2:2.119.0-3.gita233788Jindrich Novy - 2:2.119.0-2Jindrich Novy - 2:2.119.0-1Jindrich Novy - 2:2.116-1Jindrich Novy - 2:2.107-2Lokesh Mandvekar - 2:2.107-1Lokesh Mandvekar - 2:2.89-1.git2521d0dLokesh Mandvekar - 2:2.75-1.git99e2cfdLokesh Mandvekar - 2:2.74-1Frantisek Kluknavsky - 2:2.73-3Frantisek Kluknavsky - 2:2.73-2Dan Walsh - 2.69-3Dan Walsh - 2.69-2Dan Walsh - 2.68-1Dan Walsh - 2.67-1Dan Walsh - 2.66-1Dan Walsh - 2.64-1Dan Walsh - 2.62-1Dan Walsh - 2.61-1Dan Walsh - 2.60-1Dan Walsh - 2.58-2Dan Walsh - 2.58-1Dan Walsh - 2.57-1Dan Walsh - 2.56-1Dan Walsh - 2.55-1Dan Walsh - 2.52-1Dan Walsh - 2.51-1Dan Walsh - 2.50-1Dan Walsh - 2.49-1Dan Walsh - 2.48-1Dan Walsh - 2.41-1Dan Walsh - 2.40-1Dan Walsh - 2.39-1Dan Walsh - 2.38-1Dan Walsh - 2.37-1Dan Walsh - 2.36-1Dan Walsh - 2.35-1Dan Walsh - 2.34-1Dan Walsh - 2.33-1Dan Walsh - 2.32-1Dan Walsh - 2.31-1Dan Walsh - 2.29-1Dan Walsh - 2.28-1Dan Walsh - 2.27-1Dan Walsh - 2.24-1Dan Walsh - 2.23-1Dan Walsh - 2.22-1Troy Dawson - 2.21-3Fedora Release Engineering - 2:2.21-2Dan Walsh - 2.21-1Dan Walsh - 2.20-2Dan Walsh - 2.20-1Lokesh Mandvekar - 2:2.19-2.1Dan Walsh - 2:2.19-1Lokesh Mandvekar - 2:2.15-1.1Dan Walsh - 2:2.10-2.1Dan Walsh - 2:2.10-1Lokesh Mandvekar - 2:2.9-4Lokesh Mandvekar - 2:2.9-3Lokesh Mandvekar - 2:2.9-2Lokesh Mandvekar - 2:2.8-2Lokesh Mandvekar - 2:2.7-1Lokesh Mandvekar - 2:2.4-2Dan Walsh - 2:2.4-1Dan Walsh - 2:2.3-1Lokesh Mandvekar - 2:2.2-4Jonathan Lebon - 2:2.2-3Lokesh Mandvekar - 2:2.2-2Lokesh Mandvekar - 2:2.2-1Lokesh Mandvekar - 2:2.0-2Lokesh Mandvekar - 2:2.0-1Lokesh Mandvekar - 2:1.12.4-29- Start shipping udica templates - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.168.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.167.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.165.1 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.164.2 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.164.1 - Related: #1934415- fix the build of 2.163.0 - Resolves: #1957904- update to https://github.com/containers/container-selinux/releases/tag/v2.163.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.162.2 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.162.1 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.162.0 - Related: #1934415- do not use lockdown class yet - it is not available in RHEL - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.161.1 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.160.2 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.160.1 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.160.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.159.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.158.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.156.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.155.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.154.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.153.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.152.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.151.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.150.0 - Related: #1883490- synchronize with stream-container-tools-rhel8 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.144.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.143.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.142.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.139.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.138.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.137.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.135.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.134.0 - Related: #1821193- synchronize containter-tools 8.3.0 with 8.2.1 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.130.0 - don't use macros in changelog - Related: #1821193- update to 2.124.0 - Related: RHELPLAN-25139- implement spec file refactoring by Zdenek Pytela, namely: Change the uninstall command in the %postun section of the specfile to use the %selinux_modules_uninstall macro which uses priority 200. Change the install command in the %post section if the specfile to use the %selinux_modules_install macro. Replace relabel commands with using the %selinux_relabel_pre and %selinux_relabel_post macros. Change formatting so that the lines are vertically aligned in the %postun section. (https://github.com/containers/container-selinux/pull/85) - Related: RHELPLAN-25139- update to 2.123.0 - Related: RHELPLAN-25139- update to 2.122.0 - Related: RHELPLAN-25139- update to master container-selinux - bug 1769469 - Related: RHELPLAN-25139- fix post scriptlet - fail if semodule fails - bug 1729272 - Related: RHELPLAN-25139- update to 2.119.0 - Related: RHELPLAN-25139- update to 2.116 Resolves: #1748519- Use at least selinux policy 3.14.3-9.el8, Resolves: #1728700- Resolves: #1720654 - rebase to v2.107- bump to v2.89- bump to v2.75 - built commit 99e2cfd- Resolves: #1641655 - bump to v2.74 - built commit a62c2db- tweak macro for fedora - applies to rhel8 as well- moved changelog entries: - Define spc_t as a container_domain, so that container_runtime will transition to spc_t even when setup with nosuid. - Allow container_runtimes to setattr on callers fifo_files - Fix restorecon to not error on missing directory- Make sure we pull in the latest selinux-policy- Add map support to container-selinux for RHEL 7.5 - Dontudit attempts to write to kernel_sysctl_t- Add label for /var/lib/origin - Add customizable_file_t to customizable_types- Add policy for container_logreader_t- Allow dnsmasq to dbus chat with spc_t- Allow containers to create all socket classes- Label overlay directories under /var/lib/containers/ correctly- Allow spc_t to load kernel modules from inside of container- Allow containers to list cgroup directories - Transition for unconfined_service_t to container_runtime_t when executing container_runtime_exec_t.- Run restorecon /usr/bin/podman in postinstall- Add labels to allow podman to be run from a systemd unit file- Set the version of SELinux policy required to the latest to fix build issues.- Allow container_runtime_t to transition to spc_t over unlabeled filesAllow iptables to read container state Dontaudit attempts from containers to write to /proc/self Allow spc_t to change attributes on container_runtime_t fifo files- Add better support for writing custom selinux policy for customer container domains.- Allow shell_exec_t as a container_runtime_t entrypoint- Allow bin_t as a container_runtime_t entrypoint- Add support for MLS running container runtimes - Add missing allow rules for running systemd in a container- Update policy to match master branch - Remove typebounds and replace with nnp_transition and nosuid_transition calls- Add support to nnp_transition for container domains - Eliminates need for typebounds.- Allow container_runtime_t to use user ttys - Fixes bounds check for container_t- Allow container runtimes to use interited terminals. This helps satisfy the bounds check of container_t versus container_runtime_t.- Allow container runtimes to mmap container_file_t devices - Add labeling for rhel push plugin- Allow containers to use inherited ttys - Allow ostree to handle labels under /var/lib/containers/ostree- Allow containers to relabelto/from all file types to container_file_t- Allow container to map chr_files labeled container_file_t- Dontaudit container processes getattr on kernel file systems- Allow containers to read /etc/resolv.conf and /etc/hosts if volume - mounted into container.- Make sure users creating content in /var/lib with right labels- Allow the container runtime to dbus chat with dnsmasq - add dontaudit rules for container trying to write to /proc- Add support for lxcd - Add support for labeling of tmpfs storage created within a container.- Allow a container to umount a container_file_t filesystem- Allow container runtimes to work with the netfilter sockets - Allow container_file_t to be an entrypoint for VM's - Allow spc_t domains to transition to svirt_t- Make sure container_runtime_t has all access of container_t- Allow container runtimes to create sockets in tmp dirs- Add additonal support for crio labeling.- Fixup spec file conditionals- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Allow containers to execmod on container_share_t files.- Relabel runc and crio executables- Allow container processes to getsession- update release tag to isolate from 7.3- Fix mcs transition problem on stdin/stdout/stderr - Add labels for CRI-O - Allow containers to use tunnel sockets- Resolves: #1451289 - rebase to v2.15 - built @origin/RHEL-1.12 commit 583ca40- Make sure we have a late enough version of policycoreutils- Update to the latest container-selinux patch from upstream - Label files under /usr/libexec/lxc as container_runtime_exec_t - Give container_t access to XFRM sockets - Allow spc_t to dbus chat with init system - Allow containers to read cgroup configuration mounted into a container- Resolves: #1425574 - built commit 79a6d70- Resolves: #1420591 - built @origin/RHEL-1.12 commit 8f876c4- built @origin/RHEL-1.12 commit 33cb78b-- built origin/RHEL-1.12 commit 21dd37b- correct version-release in changelog entries- Add typebounds statement for container_t from container_runtime_t - We should only label runc not runc*- Fix labeling on /usr/bin/runc.* - Add sandbox_net_domain access to container.te - Remove containers ability to look at /etc content- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7- properly disable docker module in %post- depend on selinux-policy-targeted - relabel docker-latest* files as well- bump to v2.2 - additional labeling for ocid- install policy at level 200 - From: Dan Walsh - Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a standalone package) - include projectatomic/RHEL-1.12 branch commit for building on centos/rhel- new package (separated from docker)/bin/sh/bin/sh/bin/shcontainer-selinuxdocker-selinux 2:2.168.0-2.module_el8.6.0+944+d413f95e2:2.168.0-2.module_el8.6.0+944+d413f95e2:2.168.0-2.module_el8.6.0+944+d413f95e 2:1.12.5-142:1.12.4-28 selinuxcontextscontainer-selinuxREADME.mddevelincludeservicescontainer.ifpackagescontainer.pp.bz2templatesbase_container.cilconfig_container.cilhome_container.cillog_container.cilnet_container.ciltmp_container.ciltty_container.cilvirt_container.cilx_container.cil/usr/share/containers//usr/share/containers/selinux//usr/share/doc//usr/share/doc/container-selinux//usr/share/selinux//usr/share/selinux/devel//usr/share/selinux/devel/include//usr/share/selinux/devel/include/services//usr/share/selinux/packages//usr/share/udica//usr/share/udica/templates/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2noarch-redhat-linux-gnudirectoryASCII textUTF-8 Unicode textSE Linux policy interface source . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if /usr/sbin/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then if [ -f /var/lib/rpm-state/file_contexts.pre ]; then /usr/sbin/fixfiles -C /var/lib/rpm-state/file_contexts.pre restore &> /dev/null rm -f /var/lib/rpm-state/file_contexts.pre fi fi #define license tag if not already defined/bin/shutf-8770773cc97da010b4cd7fb78339c213e8bdd0a0e604ca1fb043b102a8a417725container-tools:rhel8:8060020210930144226:2e213529?p7zXZ !#,r7] b2u jӫ`(y-"]DXqAM+[NGKf#T9&kV˫XžGPH-hH] .$򚽇dAn2(>K1X"krOղ*YuKZ*ɢ,qA7y%ɻ!_RDuz~!I+IϘG&Z\#ģ!S=p+ FZnQ!8Uci6Y*Zcnh|N8H݃T\khb@ XR%`Bžʈ/^eld`6 wN>j5#3*6'~bƴE-SS(N3 ZfLs|ܷ 嗝 dڍ.5<~.963 f|&1 pw4:1'`:AS,rNƹZ8 c$:dCNڝf >뇕%_هDJg_bt˱!~o{i^A5 oa4q8٠ Wj4D+-ܞPSPShE<;[P9pGhiJqqos*@Py(: =0 pLS;3f>$@|H@7ک7"ٛ/P9/HJ0Q]DKR=ӒաL9x3焖ٯ;KvH:RS @HhѨ2oJ1ٛ]yMNao-{&y V.5Ǽū_Z3}/Ry}+}8tTDp7=ob>аmKP"q#]@Oo?"(7ؘ(hK[j \"&Vj ڱ (V *f0\>8U2~[=Lct\!YE[3f3.4ʉ$fJ*$"~u"Vs OmC~^^2AmgFKjpc&9 | Oasʖx 77Կfx}\][ /I'c6 X & zbbڏ_jøilNz׼ϩvDY}9XQ!V♔$e)jJ?qTćRnjDq?^y i0OHJܘF`un2v 7&㉍ڗfx*|]6<3DA Ve:I_ffpc/1h.:\JWcq r@ǸC0f 3[Xxy`{921V_Yމ[JkHf3VQ{IygVِa34f'Jl !Rݧs־Z`;Hil%ɡ[/($qyYZ|\o!EC#0ACScV[TRgl5F…rD2&@M& r14Y\^ĂIJL0\?EjZȽWU6eEsuo5,@̻0[alr~ bpopů(;oLɄC>LYfP&K Ϥo<>zo+[Oe{a nP5 bרct}x/QBa`B,HT7q$]Xil-${[JCkߞ2u3er>{p[l;zʇ4)m<a۽_ԀmY ş^z '2j3MMdېzb~գ蝺ڰpO0H?A0W9ƄX#xIUj:4 r`_ΏTx[Rȉ,N\C#_lP4)Wb}ߢm™M :i9yLEb~Q {dqg#ku}*PK.9HkB+hߏ=UP?9ij4LN K]9;EbY>-S 9 29F?Aad*o \zO+I#Ĩ` S2,ϮcYN$kmw>gѡ7ƈ_1]vpyA7H-x+QMl`Ka@h[q}˨fl탴2QM4qI]"C9iDQd!8,Bi(6Bpʙfeyl7]b룼ŕbkr:ЭZ'!_ ySeWЏw0;u&n|AjȢ D2MΊ+/(bZn/ Gl; 0[84QK#+@<#Ž9A_d"ȧ?p=ʳkg`28x>ƎZ*%,EGG#yd7yn/g//']S8Gݎ^WPPU8[.ĠaKnjM_ lQR9ϯ3Pf¸Di 7yqݪP=.oK/lcg_ h4%~"^'FJ;Ku.XZcv wY+' *IуK6VVL_W-#?:1LfǀcLϭIQ?T$m$\̏nTzCDvJ:eB+z *¦jH ֆ(<V -Nryˆߦb`5#un:1 M_Dz7mXOc$hr$kxIu%AT@8I`x†@Zf.Ӷ N(a2gnh7+Ѽ Dݯh-6"DgZֲ $qI)ۏo5S];u!.;93X^½!κXw`(ԌB@bh_x~PGV &q)VX!v?NAIZř`Rl]{Kz,`i{r* Gǥ-OOϮ.hJ|Rj#sa%)dWpMun$ =Z[vgѵmsH2*=,bYQ1d]76\N5qXMpHeAV, B]4uJ S! @<]t,p]ճK\,@€ KtxCXYl{2ï!jgk5CVˍҀoQHӡ:b'ˋϿ˃ }[ډce⨸DԦ7l~zߢ^':\żV!\n)M[oxݬf86YhX,) Oɯ5>SMmC:D). \x`X lYrfE?J:s#ne*+{Ώ( *g!sƠin*K%D1I YN-rJ6хS L9j7$%HD ztw8`A>%ws[K9q2IhM!9%eXVs(!f"+LsҧhFp>''\eW<%{'X~??|Uڟ;\ndh%+\xC!{\ 6 澒>P2s >ww*֫kKɭoi ~S-&c=;c3vw ~?iSIFǗX ,|s^R|k.b܃D[ɣ=8$%IB}(obƨhʕu&jy`K_rw~r$ PC1.Ǥ4ܫJFQ5džܺB}I1 r^_P7/\ EgZ[<@Ajd"s7m0\O^ƕmH Q`pC+ҹE+ R: J}g:[yPvUؿhw(­Ab^CȾ،_sZwPj<[I\g+0a=QBIu:D0xs%/A"oujhE"{hz꬇Oe"Z۸tr JrsľvL&q 2-Ԉ_!K31].-I-x>$l"҆#^O/UY`&!)jl#k )v^Lcu:ZqpOyyA 0 g? LM}wk7HF}`BBTb!4ZTx‰x=zFFl."|n7?uJ2n'l+2^ԧ 3U+RעƀeUZ)#UwW-6jf8`4XoY=Fq$Jm؇CO6;dɝyMf38Vo?I7$_މUyr![&u\gR/ː`KW +pa{T 7 u 3#4O3DN|Eo70WHUȇ'lZߊZ%f񱡭C;V}Ns?{]!?\a a#wAht(ȑ>;JT T%#IΤ(d_UL~p|ߩc](&'|b&gܑ R×HkrLYA)~0 k4= 2fz1ڈL#(/E#b+O}&n XA vx3إ*~]4`"ۼZ,:+uI~s0-!P'_Xq)>;䁶e V<ǁxQsB_}|+->-AcUDF({9l~k,5r )S!UpXJ08%pГ6H`I7UES)=V[dH>dfp9R_$]S`IjєX26Q x$j[|q PryEF8xPB|QH#[hZC=Z`ާgx޶8A =kQz!^@PҬߠvj<BhhA `sld*D L?f.Jx';0{2%kf!~${=3ݟmxs(sxzQe\cT^"?8l^y5(%Hgl?QUT/E!_uRkf9 h pCf^C$\@g/>|f9sQX w=yg!}YNJUE 2Ntiuyf )Z%J6h`p!Q8`e=w!PϲmpD{4|$QYa&2pKvX[ӔL>_7',}. _=lJ%^ԛ$..S!H嗘Q>EkZ(G># F#% ētuŌcCY?j,qzU-j3yC AYѳ8ISLa¶C z q(_bWӊ gN;saeA/aT%kc/#%fC +eR*ERkL f",c9h@~UA楘5:гX|ŐeTafmZCPM{ՉC(ZȡKzס.A0퍉jkA#=b1ª`yT>| M%5c6$P𠥵W%v5 >:~D)E1 ?b`ncJ>Ħp8L &Љ 4u/;qBplEfQqd뉪Ifrwm=xH7`n¨PY J_297|jTe/^-b0QA^$1cS#3WN@b o]u5g+?kہ4hB>!?Db;8sci3L죵I2[Ш`t_v4aUAqfg:<|DGBI!؇d֝*L($eћ6ij\~ GT3O1dtu9sK_"b  *PmIRj'\:|h~Ep) e< ~dd>u9b1["ͪa'ݳu?&E2ao! 5`HyѸ25yEi O#T.%А1߁BeP~EZe `NB$YG^]6 kdD s0R'k׶"R,xH…/ 2{暈pbί3_~贲4-NHéCu] ]]:-^ڴ'0uIpN"Hc7Ek(*|a|_nqu! oO˅ *ˏ9/۰M%eZ+N^U㓪ENH4[ 9*z5|p[lnUT3 Leݝf%4b/';4ny1Ϊ( e:T:\tE؅ N#mwS+y_߭q:rt챕Hņ9"i57,e'sTNͧId_'5 qۈF[{d?n2lkHr!oܵ0!`d)&ZɇLvJl0~ Vf{屮jh7Z6I`~!] U{hRDFM`O>EIs npə8L=dr;oTG疼\E>kᅪ'[_ZgapBxV"WzoPGx6n f_'q\l}zecL,09`Al!V>sR|ԚY5A{9Zr5X' e &3!uKԲ=vGLEb^b`yQ6^@C>V5 TzS_Eɭ*q'QIyٳ9Z=3AGH+N*Isb0Bo;f×gdQ%XKg:m uo#S(Mudp$, S=YPFڪߴ(&ҳk23sctOҽxFuMPx5);W ._X;Lõh35f4ubͼA&ÜK tR,:[\9+q)_]ۀV`hhvSf+Ofq0ݐ0 _4TҏI=N[[L<ƅtv1R=# " iU::mO`xB\"YU ߸щGX_W^B\+x GMd>^;8קVH{嵒<|sz |~m6MΌ m뻮ψs M)WnCGkohHCіQSK,Yy[hyXHff=M*>ul?-# W}_g(y䱈E)(}qhz)wc7'1β&8}pw~!.!nߞmpy@@&dKDjOb&׷bSDvg_֣7RСti] Dx5h>.%Få!hnĄ +>\͌iiP| b}@i8|">QdRd|Y6:P-9bIE[r-FC J"|pIZG^tI,v D2֔/2FX1yV^QZ>>8י[xbs}#=t} Q3IF+IX8gW5岅j7t樌wt'9P`[*{!y-Ӕ_},b0p¥YΐnTcQ$z2-/I~D4nU/0d3t[ZSVhMj #/ySeQ/t npF HxLZC ͓Ȋ0uuH_CYZL {u7@[im S3/_1V%H?/mR;L2Pźt.7T {j7a3~=e-˿d˸X~~, b!k3@*zh}VI @i\I%dy@܁a P'i]st2h^}%_θHb:1t^L-u{*W.x~~&_kqƮA"6ȓOЃԅ$Ț˷5!33lgVg#aɡo{܅D@SvIlDb۪p43*Xr)ǔc>'HpGew/sId{S" JQ%yTr Sѷ`KL;?X<-#t B~Pq>jHAOϡ 0QTꖰ"#? Uἶ޴@K,%s: AhCё4Jޅ1!\w.'c4:HʎA-ލ::,Ӝw| g7@ҕ}JAo=}?vi3tKFje+qbS@,iۊ*^ڻqqHɶ }ox!EXz\uGG KAe3CqƳ=,8Y^H^ F֧bW`"밞uiz]O`oJ,`|y)Z~ Kjj]>p6>Gd:1zB|{jk[~_ -C>{juL_^C!rW\%>5D *+w0Qu}P06݊MQء[JEZFkE%we|sX~1%WD0"]al&1_?7,S{̪m v6~-8"NccіщpގćK&8Cel)>WҼR KIA ۖxqP 7XoQ(qV R8FvN`sspT 7DuAdv$O9>с3١RYC^T12{ VQ{wdfTj.,aBe5s4bl?‘ A].-k{х0"D$z39CM #(‰ڞO/lխ1d . MrG`r\c9V/~r{3df!,H~e:FT'mPLtu<%̗j~ᯜqazCj7eL>"<)Ԇ }$ f!64> %` %S8GXρ:D^d+YtViy6Ѕ$ MF#m[~W$xq>ҽl:JIsQ{YԤ}ڔ+m^2^R_HOÌ /lXRPΘiR{pFn:j#21QoA&Pj GO8kt6u/>`ٸ!NusID+\dW (6~ o<ph rv\ndS~xER1P1AwB{\o&ŷUN@EX<;T%0` ;,u RYLY^#0ŶBjm̧u_Tm|Vadz$@i58['tsCU(?-Wkf^e-M"DXJ #/hpAaQ:1N{P?ͨMS7&rX}A Pd7#nY/eu7 ?DD NoD>3!LWm-xO/Xد)D;TaL2fbl̶)j+Bs-e+Lja0e]hU,`O~<@ KY&NZ*7 #pSgb̼ˤĿo'cp y7_b]]3sJJD,_ݯ18*Q$ą'.T__;s z1_'wMcyR6;ց +!q%(3olZ! !G 0,@ȶރϨDxi`LhS1E;]J͡-eSRf1WE,d:R龓 )C)A,y !@g=h˃K'geP )Y(A_Qh{q0ov^?)Î2m5K{H&\.}sOPOȠY.cy߫|VHW>fAnb S\E*? fSHvtV)hr ,PH[Yq^x&.3,TJ!棊Q0>;Tpé6r5V8nCe$ YO5BpNNԆ?gn3 z$poߴa #CjpliyEʬu*";Vojew}\JQyo'"TҎt c`('٩e\5% h#Y*g[ և|=C[Y d60r#I5WİDV}IAv *X(ٽ!PH$+!\聣V}9<*Ʈq/ԋ؊"jM(;4n@O-5bѰ8O#v/}a05-fl]Bn-U U<3Uì`x2,ɢ)Rlz@(/y+ͩpd&Ogg` zUGҿV o1"Am<=HU̜kaJK™Im9yi6yYF4C]{nf<3m^73T<' _B*w7F.Ѓ˲%5Lׅp RLi={ mv a6k:\`(xU :N6Ol~}z7y3|@""V5Z'(RF)A[Vr.tqc&)Z5AǾV/` KףJMuA?vl7m%8TNc9(9 tA2j= [dCw']>v4x?f #\pXGìNST5WADl3|"œH4!0m( w`&}sD-U7%~.AމX%tZ@fYjCu 37؈S{zV/voHk vfDoGJNxۺN\ C/mMhż[QΛLԃ]ChK+G<|U[ؑt,yj{/;28b ܷ |oje B5' WjP{P;+ a^ [tr g ᱬmLw(H;Zh;BԻwp|TT1Q|!"Q!1Ϫ:АvCEBt{?:2lQUKNG)&a%z53.MBp3>g`^,T׌vpSr@CR4]7)Q\C>;dbKk.Cјw濉y~Eƫ(k솪$Q¸A CLr:\Cw[h^13aۯ^t_&?%hefQ'RY'Q`CpΒS%<}5{ ITBjVGu%:9%݇Kjl?-=&\TNk8vE>a`DʶP5io-m/{) ]wz<d 涞7\˜LjߕMjxhcFhE HY1K_e^By:R=[߈,4KN,VuE :#S?vil!<+(}UAQci9#|UI$tp- d?H"uESKēYKb-E3NC0jVߥZ t\@gBc/8/1س!r Dǟ’|38=U—k(zvX?Vt7$t!44I3l] |d^0r^捇H8r4hC~tj:P9ERP9 $C*>;=B C-BheaoC<9@X7& ꖂe،~1 ֨4&$zibL!t%q!1tbL}537z\+}oU4+8k=G_껀\xGxO]~Rr|i:-UK38إ{.n*h#bc |qU+u6[,< 6nOil-#RCO afMRݵ>ݓ>yz4pF+j #7L(E u}hSL 7D{:o$XTarJBEh_,Ȗ390zytހI `6 ߷iw18/G$YivM]# EOê3ap8L1y mR<1ަdRbpR8>ؕ"5 9`)~{^:sP 1GKyP_]l!e>fMLjVv5^qR9!4)e^YAE'U׏IJ8m_Ёoh)Q >ܔKpq{|<*0q7fbITTe]iQmjȆlI/lYW);iS'NpAM0C`sb'"6m'^uSh ) ""8"/$jj7(ыZWXBw Xyʻ79NIZ$ $lb@W7gw~:'͑k ./$rk\>toUģ/FuG_er &Q+UJ1M6wh ֖ Ok E Dgh=s~kġZp[fvA~a(9o^!gߊuU\F_?|iTiNqlC.{SM#\#l bQD&!7֔ DٞysJe\5 OI{:7$*VD[a>xB3:q{=Uʽ@!mB?Dg9B>:-W"}rŗ';@a/{h'/a6XҎ#EO{O2VCzU)zmyAt4ѱV'XǍVHIήiH5;=n'Qh[M8#;qf{>v{^ 9JIE7˳`ƉL64J,EB霉=&-|M`v g[况 ŪVKT+d6bQbMԷ8 k?ۂʂ͒hߎ ~bUQez)+jgP@HuXHxx{'[xO \.Κ("ߊHZ4 6]DC₇%.mpk "K=0v5xpk,4(|*op-GvrS|Z_&ߔp)ͼV;F_ě4&| -ǧ2W7vTkI`~}@*v۔+ӆ-w^d;oQb7ȉJ&C?N["wRjPRɴj?ږq+ 뉾?ŶƦ]uRɖ{ĭr"I-r=6H  6zEٔ$IOTbAg A`NRX sWo[6V5bSu.jU$/kaUT]P~cD%#Z"d$ҕRgU) Vwb+f:BJP @^fwPOiW+[~6^v^q]eʟ$n7kbDP hAhfq`&S;AY-#vt~f\δ/jk?Zl؊n觨0Q2N!@3)ʛ[0Ba2rxkuMfixnr(Egws}?g ۡ_&e$܈P1J;sY!ML1܀@ ..#}\؂Zq0}E}L<RT.@:вAg7h8Tb:~ɇѨren\Fe9p+z ]B]AZN$hgف%sUPc'' kDcFYT 7{/R'oVY'p^}Z{5Րڗ6>GxCS6Vvar9^/n`)zͪG#wjM;۔%VSeŞM." /l?KҝǢ)s:Stͯv;}__{85AOdYy\!듊~D9XzN"qTNjt 7}{H?T7uƞŪ6H~okIؚkcU+UU$5B oc^[J[&*z/mje73Z\pi~9`TYU0HxtA7 6[غX+M{[岕RJ!q [x?H v1_GC78i^N9WrצPk HJ>b?[C4Z[Mۦ&'-;%Tl}4z9o9"=~-ʹ.Aq]Ӊ=6}2=yySi4[L]ê~;)դ+K~EsȊeV!4*@.q QZn9E0Z[z)@ֵJ\q'~›N_)G!0M -2 [‏V$6S:gi~ k(l0RH73a~&ہ,Y5 5[H>*=&U RK)w鐿h@xz\'I (1b$= [qiuRC ܈ x f{|櫑{FWtmTŎ+h3 84)- ha@p. |a8)9ԨF3GI3x*n+իnzZtoiQeU>/4L ՚-`2%v!Mj` q\l;Y?LR۵8uO2w9^rx)YpcQ<\23f+f4Ho)(_uʊ蘃#ߤPǕC g~Z^)TAkJ  E# To8#tXK@)NŨId* % bMyCRwipDrp/^?UsmO6 sl7&QOhH{D%jB6bj?}' '6bD g ܷ#^ťh-8ͨ [hȎʩvR#>-_"D6Vf"<,0hEg-@Ͽg!^̼H.`C=4bcPE m,$D>#=QBՆu?=J'5(q+\Y|{ b/oD׃C*:,RMCʼ:,UX%# wGbu}$D$lF掚ՄXN8 gqVg>0@4յF֫ݘRgiZ8Balҥ䄍 X`E'usźzVC7,zUqPZV/.rz}r pg?̋ʎnW|xl0HĄNDm(*H[z%e@-a6%ushȔz @3Ȋh~ 0`ԝXfuT B:rІ:8p%tE2ĭvXYP‘ .6P TWSXLMw~1sde.#v.%B f*  YZ