container-selinux-2:2.180.0-1.module_el8.7.0+1106+45480ee0 >  A b1U]/mx|ƞݵpAG9SzO~ml9>Zw7͈?wƠ]y#$@&j-* ʟ' K`HUoe›,Sɧ">}h>ۅVZ~`{nq鼓90bl ds}~qybMBfVtرNxQ͕<;ߟ*FAj]FE{ZS,=A-EB{N*"9?$Oowdg1<[~P=Tf+[$y׀Ҋ?ZCq"z&X GVk;=,v dNx` go^:f݈+X%+q7:׭tijDv(V*aZ=Б"*098b7d35032dcb2ea8fafc3b0fa96264e69bdfedbef5fb8715bf4e4b31fe6bdde6ca3dbadbd3077cc7cb90857b90e2791744686bgb1U]n J/^펦P8XsL9LNFߦԣ `f9)ɼk݌iCDPpe?%mZ2LBay豿vj ێdj{ai,N?С5۟.1c ޕ~HfѦIe#]5keּ H SM Vԝ\cFd<\KOO'R85J.C`%/<hgyɞP.N&URGզ%MUp mxjwN~`M~bf Uϻk~]ɣl]a DRh*f{[|)aj.Bc.ct_"ljc^ٔL}x(!{`!NfN$LχЩ{;%Fb/\  0 6!Cuf Cݎ;M^9_]v4`>pI^{?^kd< @ h 28?x< d    0  D   \  (dd(89:)=U>U@UBUGUHV<IVXVYVZW([W0\WH]W^X bYd[1e[6f[9l[;t[Tu[v[\+]]]]^4^8Ccontainer-selinux2.180.01.module_el8.7.0+1106+45480ee0SELinux policies for container runtimesSELinux policy modules for use with container runtimes.b0tx86-01.mbox.centos.orgCentOSCentOSGPLv2CentOS Buildsys Unspecifiedhttps://github.com/containers/container-selinuxlinuxnoarch . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if /usr/sbin/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then [ -f /var/lib/rpm-state/file_contexts.pre ] || cp -f /etc/selinux/${SELINUXTYPE}/contexts/files/file_contexts /var/lib/rpm-state/file_contexts.pre fi# Install all modules in a single transaction if [ $1 -eq 1 ]; then /usr/sbin/setsebool -P -N virt_use_nfs=1 virt_sandbox_use_all_caps=1 fi export MODULES=""; for x in container; do MODULES+=/usr/share/selinux/packages/$x.pp.bz2; MODULES+=" "; done; /usr/sbin/semodule -n -s targeted -r container 2> /dev/null /usr/sbin/semodule -n -s targeted -d docker 2> /dev/null /usr/sbin/semodule -n -s targeted -d gear 2> /dev/null . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if [ "${SELINUXTYPE}" = "${_policytype}" ]; then /usr/sbin/semodule -n -s ${_policytype} -X 200 -i $MODULES /usr/sbin/selinuxenabled && /usr/sbin/load_policy || : fi . /etc/selinux/config sed -e "\|container_file_t|h; \${x;s|container_file_t||;{g;t};a\\" -e "container_file_t" -e "}" -i /etc/selinux/${SELINUXTYPE}/contexts/customizable_types > /dev/null 2>&1 matchpathcon -qV /var/lib/containers || restorecon -R /var/lib/containers &> /dev/null || :if [ $1 -eq 0 ]; then . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if [ $1 -eq 0 ]; then if [ "${SELINUXTYPE}" = "${_policytype}" ]; then /usr/sbin/semodule -n -X 200 -s ${_policytype} -r container docker &> /dev/null || : /usr/sbin/selinuxenabled && /usr/sbin/load_policy || : fi fi fi6Rcb0(: BA큤A큤AAA큤A큤A큤b0sb0sb0tb Οb0sb0sb0sb Ο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-selinux-2.180.0-1.module_el8.7.0+1106+45480ee0.src.rpmcontainer-selinuxdocker-engine-selinuxdocker-selinux         /bin/sh/bin/sh/bin/sh/bin/shlibselinux-utilspolicycoreutilspolicycoreutils-python-utilsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)sedselinux-policyselinux-policy-baseselinux-policy-targeted2.5-113.0.4-14.6.0-14.0-15.2-13.14.3-80.el83.14.3-80.el83.14.3-80.el8udica0.2.6-14.14.3b%b@bOb@aar@a@a@a@aaa+@aaa]aQ@aI@aA@a'@a&0a /` @`9@`Ȗ@```q`@`@`N@`@`dd@`Y@`&m`_T_`@_%_%_F@__"_5+@_16_p@_5_X@^n@^Ӝ@^@^^k@]@]B]]@]|@]@]X]W]R@]@\M[[ͻ[[@[[Xf@[L[K7@["X[@[@[[[Z@Z?ZZZ%Z%Z@Z - 2:2.180.0-1Jindrich Novy - 2:2.179.1-1Jindrich Novy - 2:2.178.0-1Jindrich Novy - 2:2.177.0-1Jindrich Novy - 2:2.176.0-1Jindrich Novy - 2:2.174.0-1Jindrich Novy - 2:2.173.2-1Jindrich Novy - 2:2.173.1-2Jindrich Novy - 2:2.173.1-1Jindrich Novy - 2:2.173.0-2Jindrich Novy - 2:2.173.0-1Jindrich Novy - 2:2.172.1-1Jindrich Novy - 2:2.172.0-1Jindrich Novy - 2:2.171.0-1Jindrich Novy - 2:2.170.0-1Jindrich Novy - 2:2.169.0-1Vit Mojzis - 2:2.168.0-2Jindrich Novy - 2:2.168.0-1Jindrich Novy - 2:2.167.0-1Jindrich Novy - 2:2.165.1-2Jindrich Novy - 2:2.164.2-1Jindrich Novy - 2:2.164.1-1Jindrich Novy - 2:2.163.0-2Jindrich Novy - 2:2.163.0-1Jindrich Novy - 2:2.162.2-1Jindrich Novy - 2:2.162.1-1Jindrich Novy - 2:2.162.0-1Jindrich Novy - 2:2.161.1-2Jindrich Novy - 2:2.161.1-1Jindrich Novy - 2:2.160.2-1Jindrich Novy - 2:2.160.1-1Jindrich Novy - 2:2.160.0-1Jindrich Novy - 2:2.159.0-1Jindrich Novy - 2:2.158.0-1Jindrich Novy - 2:2.156.0-1Jindrich Novy - 2:2.155.0-1Jindrich Novy - 2:2.154.0-1Jindrich Novy - 2:2.153.0-1Jindrich Novy - 2:2.152.0-1Jindrich Novy - 2:2.151.0-1Jindrich Novy - 2:2.150.0-1Jindrich Novy - 2:2.145.0-1Jindrich Novy - 2:2.144.0-1Jindrich Novy - 2:2.143.0-1Jindrich Novy - 2:2.142.0-1Jindrich Novy - 2:2.139.0-1Jindrich Novy - 2:2.138.0-1Jindrich Novy - 2:2.137.0-1Jindrich Novy - 2:2.135.0-1Jindrich Novy - 2:2.134.0-1Jindrich Novy - 2:2.132.0-1Jindrich Novy - 2:2.130.0-1Jindrich Novy - 2:2.124.0-1Jindrich Novy - 2:2.123.0-2Jindrich Novy - 2:2.123.0-1Jindrich Novy - 2:2.122.0-1Jindrich Novy - 2:2.119.0-3.gita233788Jindrich Novy - 2:2.119.0-2Jindrich Novy - 2:2.119.0-1Jindrich Novy - 2:2.116-1Jindrich Novy - 2:2.107-2Lokesh Mandvekar - 2:2.107-1Lokesh Mandvekar - 2:2.89-1.git2521d0dLokesh Mandvekar - 2:2.75-1.git99e2cfdLokesh Mandvekar - 2:2.74-1Frantisek Kluknavsky - 2:2.73-3Frantisek Kluknavsky - 2:2.73-2Dan Walsh - 2.69-3Dan Walsh - 2.69-2Dan Walsh - 2.68-1Dan Walsh - 2.67-1Dan Walsh - 2.66-1Dan Walsh - 2.64-1Dan Walsh - 2.62-1Dan Walsh - 2.61-1Dan Walsh - 2.60-1Dan Walsh - 2.58-2Dan Walsh - 2.58-1Dan Walsh - 2.57-1Dan Walsh - 2.56-1Dan Walsh - 2.55-1Dan Walsh - 2.52-1Dan Walsh - 2.51-1Dan Walsh - 2.50-1Dan Walsh - 2.49-1Dan Walsh - 2.48-1Dan Walsh - 2.41-1Dan Walsh - 2.40-1Dan Walsh - 2.39-1Dan Walsh - 2.38-1Dan Walsh - 2.37-1Dan Walsh - 2.36-1Dan Walsh - 2.35-1Dan Walsh - 2.34-1Dan Walsh - 2.33-1Dan Walsh - 2.32-1Dan Walsh - 2.31-1Dan Walsh - 2.29-1Dan Walsh - 2.28-1Dan Walsh - 2.27-1Dan Walsh - 2.24-1Dan Walsh - 2.23-1Dan Walsh - 2.22-1Troy Dawson - 2.21-3Fedora Release Engineering - 2:2.21-2Dan Walsh - 2.21-1Dan Walsh - 2.20-2Dan Walsh - 2.20-1Lokesh Mandvekar - 2:2.19-2.1Dan Walsh - 2:2.19-1Lokesh Mandvekar - 2:2.15-1.1Dan Walsh - 2:2.10-2.1Dan Walsh - 2:2.10-1Lokesh Mandvekar - 2:2.9-4Lokesh Mandvekar - 2:2.9-3Lokesh Mandvekar - 2:2.9-2Lokesh Mandvekar - 2:2.8-2Lokesh Mandvekar - 2:2.7-1Lokesh Mandvekar - 2:2.4-2Dan Walsh - 2:2.4-1Dan Walsh - 2:2.3-1Lokesh Mandvekar - 2:2.2-4Jonathan Lebon - 2:2.2-3Lokesh Mandvekar - 2:2.2-2Lokesh Mandvekar - 2:2.2-1Lokesh Mandvekar - 2:2.0-2Lokesh Mandvekar - 2:2.0-1Lokesh Mandvekar - 2:1.12.4-29- update to https://github.com/containers/container-selinux/releases/tag/v2.180.0 - Related: #2061390- update to https://github.com/containers/container-selinux/releases/tag/v2.179.1 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.178.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.177.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.176.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.174.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.173.2 - Related: #2001445- update minimal selinux_policy dependency - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.173.1 - Related: #2001445- lockdown allow rule was removed - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.173.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.172.1 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.172.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.171.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.170.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.169.0 - Related: #2001445- Start shipping udica templates - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.168.0 - Related: #2001445- update to https://github.com/containers/container-selinux/releases/tag/v2.167.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.165.1 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.164.2 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.164.1 - Related: #1934415- fix the build of 2.163.0 - Resolves: #1957904- update to https://github.com/containers/container-selinux/releases/tag/v2.163.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.162.2 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.162.1 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.162.0 - Related: #1934415- do not use lockdown class yet - it is not available in RHEL - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.161.1 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.160.2 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.160.1 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.160.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.159.0 - Related: #1934415- update to https://github.com/containers/container-selinux/releases/tag/v2.158.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.156.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.155.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.154.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.153.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.152.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.151.0 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.150.0 - Related: #1883490- synchronize with stream-container-tools-rhel8 - Related: #1883490- update to https://github.com/containers/container-selinux/releases/tag/v2.144.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.143.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.142.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.139.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.138.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.137.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.135.0 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.134.0 - Related: #1821193- synchronize containter-tools 8.3.0 with 8.2.1 - Related: #1821193- update to https://github.com/containers/container-selinux/releases/tag/v2.130.0 - don't use macros in changelog - Related: #1821193- update to 2.124.0 - Related: RHELPLAN-25139- implement spec file refactoring by Zdenek Pytela, namely: Change the uninstall command in the %postun section of the specfile to use the %selinux_modules_uninstall macro which uses priority 200. Change the install command in the %post section if the specfile to use the %selinux_modules_install macro. Replace relabel commands with using the %selinux_relabel_pre and %selinux_relabel_post macros. Change formatting so that the lines are vertically aligned in the %postun section. (https://github.com/containers/container-selinux/pull/85) - Related: RHELPLAN-25139- update to 2.123.0 - Related: RHELPLAN-25139- update to 2.122.0 - Related: RHELPLAN-25139- update to master container-selinux - bug 1769469 - Related: RHELPLAN-25139- fix post scriptlet - fail if semodule fails - bug 1729272 - Related: RHELPLAN-25139- update to 2.119.0 - Related: RHELPLAN-25139- update to 2.116 Resolves: #1748519- Use at least selinux policy 3.14.3-9.el8, Resolves: #1728700- Resolves: #1720654 - rebase to v2.107- bump to v2.89- bump to v2.75 - built commit 99e2cfd- Resolves: #1641655 - bump to v2.74 - built commit a62c2db- tweak macro for fedora - applies to rhel8 as well- moved changelog entries: - Define spc_t as a container_domain, so that container_runtime will transition to spc_t even when setup with nosuid. - Allow container_runtimes to setattr on callers fifo_files - Fix restorecon to not error on missing directory- Make sure we pull in the latest selinux-policy- Add map support to container-selinux for RHEL 7.5 - Dontudit attempts to write to kernel_sysctl_t- Add label for /var/lib/origin - Add customizable_file_t to customizable_types- Add policy for container_logreader_t- Allow dnsmasq to dbus chat with spc_t- Allow containers to create all socket classes- Label overlay directories under /var/lib/containers/ correctly- Allow spc_t to load kernel modules from inside of container- Allow containers to list cgroup directories - Transition for unconfined_service_t to container_runtime_t when executing container_runtime_exec_t.- Run restorecon /usr/bin/podman in postinstall- Add labels to allow podman to be run from a systemd unit file- Set the version of SELinux policy required to the latest to fix build issues.- Allow container_runtime_t to transition to spc_t over unlabeled filesAllow iptables to read container state Dontaudit attempts from containers to write to /proc/self Allow spc_t to change attributes on container_runtime_t fifo files- Add better support for writing custom selinux policy for customer container domains.- Allow shell_exec_t as a container_runtime_t entrypoint- Allow bin_t as a container_runtime_t entrypoint- Add support for MLS running container runtimes - Add missing allow rules for running systemd in a container- Update policy to match master branch - Remove typebounds and replace with nnp_transition and nosuid_transition calls- Add support to nnp_transition for container domains - Eliminates need for typebounds.- Allow container_runtime_t to use user ttys - Fixes bounds check for container_t- Allow container runtimes to use interited terminals. This helps satisfy the bounds check of container_t versus container_runtime_t.- Allow container runtimes to mmap container_file_t devices - Add labeling for rhel push plugin- Allow containers to use inherited ttys - Allow ostree to handle labels under /var/lib/containers/ostree- Allow containers to relabelto/from all file types to container_file_t- Allow container to map chr_files labeled container_file_t- Dontaudit container processes getattr on kernel file systems- Allow containers to read /etc/resolv.conf and /etc/hosts if volume - mounted into container.- Make sure users creating content in /var/lib with right labels- Allow the container runtime to dbus chat with dnsmasq - add dontaudit rules for container trying to write to /proc- Add support for lxcd - Add support for labeling of tmpfs storage created within a container.- Allow a container to umount a container_file_t filesystem- Allow container runtimes to work with the netfilter sockets - Allow container_file_t to be an entrypoint for VM's - Allow spc_t domains to transition to svirt_t- Make sure container_runtime_t has all access of container_t- Allow container runtimes to create sockets in tmp dirs- Add additonal support for crio labeling.- Fixup spec file conditionals- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Allow containers to execmod on container_share_t files.- Relabel runc and crio executables- Allow container processes to getsession- update release tag to isolate from 7.3- Fix mcs transition problem on stdin/stdout/stderr - Add labels for CRI-O - Allow containers to use tunnel sockets- Resolves: #1451289 - rebase to v2.15 - built @origin/RHEL-1.12 commit 583ca40- Make sure we have a late enough version of policycoreutils- Update to the latest container-selinux patch from upstream - Label files under /usr/libexec/lxc as container_runtime_exec_t - Give container_t access to XFRM sockets - Allow spc_t to dbus chat with init system - Allow containers to read cgroup configuration mounted into a container- Resolves: #1425574 - built commit 79a6d70- Resolves: #1420591 - built @origin/RHEL-1.12 commit 8f876c4- built @origin/RHEL-1.12 commit 33cb78b-- built origin/RHEL-1.12 commit 21dd37b- correct version-release in changelog entries- Add typebounds statement for container_t from container_runtime_t - We should only label runc not runc*- Fix labeling on /usr/bin/runc.* - Add sandbox_net_domain access to container.te - Remove containers ability to look at /etc content- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7- properly disable docker module in %post- depend on selinux-policy-targeted - relabel docker-latest* files as well- bump to v2.2 - additional labeling for ocid- install policy at level 200 - From: Dan Walsh - Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a standalone package) - include projectatomic/RHEL-1.12 branch commit for building on centos/rhel- new package (separated from docker)/bin/sh/bin/sh/bin/shcontainer-selinuxdocker-selinux 2:2.180.0-1.module_el8.7.0+1106+45480ee02:2.180.0-1.module_el8.7.0+1106+45480ee02:2.180.0-1.module_el8.7.0+1106+45480ee0 2:1.12.5-142:1.12.4-28 selinuxcontextscontainer-selinuxREADME.mddevelincludeservicescontainer.ifpackagescontainer.pp.bz2templatesbase_container.cilconfig_container.cilhome_container.cillog_container.cilnet_container.ciltmp_container.ciltty_container.cilvirt_container.cilx_container.cil/usr/share/containers//usr/share/containers/selinux//usr/share/doc//usr/share/doc/container-selinux//usr/share/selinux//usr/share/selinux/devel//usr/share/selinux/devel/include//usr/share/selinux/devel/include/services//usr/share/selinux/packages//usr/share/udica//usr/share/udica/templates/-O2 -g -pipe -Wall -Werror=format-security -Wp,-D_FORTIFY_SOURCE=2 -Wp,-D_GLIBCXX_ASSERTIONS -fexceptions -fstack-protector-strong -grecord-gcc-switches -specs=/usr/lib/rpm/redhat/redhat-hardened-cc1 -specs=/usr/lib/rpm/redhat/redhat-annobin-cc1 -m64 -mtune=generic -fasynchronous-unwind-tables -fstack-clash-protection -fcf-protectioncpioxz2noarch-redhat-linux-gnudirectoryASCII textSE Linux policy interface source . /etc/selinux/config _policytype=targeted if [ -z "${_policytype}" ]; then _policytype="targeted" fi if /usr/sbin/selinuxenabled && [ "${SELINUXTYPE}" = "${_policytype}" ]; then if [ -f /var/lib/rpm-state/file_contexts.pre ]; then /usr/sbin/fixfiles -C /var/lib/rpm-state/file_contexts.pre restore &> /dev/null rm -f /var/lib/rpm-state/file_contexts.pre fi fi #define license tag if not already defined/bin/shutf-8b693fa4c1a70eecc2f8f09e0faffabb5aa8ea3277ebe7c70975a91fc68ffb618container-tools:rhel8:8070020220315135406:39077419?p7zXZ !#,_p] b2u jӫ`(y-cqokivlN8a# ꤛzim|mihXTeq@.el)6pΏBlߋzäko-'q܌3::lgߜ5#& Rs!.Y]MpϘ"x5xWT:+s' 57qǷbНuNeKYrr y@.?eEimt6#W[ `H2>EYgg.@obF;4ow.U$n#$+0 HN's(MkæPn&c'޴XcX83dBR8\#EVo%j.Y ͓Úr|fxtSS0눮穈򳋲w``: f4L~6]Ԡoj3Tph~k3S:'rJg`V =%qR׀Qc^ھbE!R6 Yן B,Stp Tv<-ȬeW l{-:Z= f+xU7J'=-3?N(׍v}42I Y##~w6H|Â`{}8rx\kAF_f/:9DlJx7ن K跪-zK$a;Pi10kH2%})AQJ8 Gy(@eG )&wjfS2 6h:l,fMوo\I]J[ +ЀT (4{ۂeҪܽƫa>a4p LG˦9>T=;kg~Wdܮ{ 8$URaXgNtܲ~S31*!p9d[[,ш8?Rm>|ӜYM"`tWz_=s|+m*}[b B4!9!Tn).-\ 5mȻ B!S00 D'MDz?dKT-F`6%q`sڕ;`\8EM\J+E|t|V;CuἈkT?9kgx;T>hnC('H6ȒNtǹw \Ƙ6l`d%&'7~D*׋ֲ%v (bp(Nj+sY/<_PktUKħV}V=y篼27|RҴ׋8+|HFhn3ݹ=:>,(ظ=9Cs p{bDԃd=}A${ [Τ*%Bm^E6h"*@$%F<:"ROn礌lڹQCag+@6XY $>FɫwN}ue Z<25zl4/2z`SǮ<6[q`{j T #gͰmG~^Dx%CN=v\AO xe.ɃӈqPXRKzFT!h-?[ %Hj87Cڢ`K(*ΪuxA ":[r DyJr- .ZѵIv8I2| idi :6CVf994DJ뎭eϕ3 &mbj\X,ن Fu)ע<#8b?#$/;,} 奲7[$))_!OD-lfi}ϓ,zGW\BԿ?:]F<΍)u )潼~) 7r3z;-/'lty_aYHVxqX84ӑ#:r\?!M1)5U 'u&˨ѸV ʓ7{YZ?f!:SШ$(-"dz Pjǃ`%`fp.ԖkWzo_Ͽ{BFۓ/!7PHLub>}KޏHsO,Ⱥ;2‹<+ֿx`0Q4"7Gttf|F>x3p!se\"ND/7lz^CCi- (tQAZu͑P2k$ĽDt0`* V wY#e*K§w]3 }94yTDh[ .\HqOGMq ;!sPib}I1C9Ď"UZFrH!|bao;!h}n2 6 f}}Bʧ`,4#~$hDI}yDؕڀob!y*e6sqv{7gzh5d3v9SB^w1$F=N`T~; E] 5|06jmd1 5l8M 2c8}lKYRƚȍ2oF⢁%f4onfQ'=rԪ(?9[! [nɨV3nrV[gZ..59F e79%rSzI QyrzϬXrwࡧ$MxB}9(& bida9*kT4+4GS`$@JXY^+{S|ˆiax >MH/EN@!f̋l觟VϤwGCAZ$j&Rj9^<6.SؘW0_3#$tvZ5f勱xHвNCGR[Vc$_rl~6x9:VRnZXB#27j c5{#y N{gSfOVȟL2GE42M&Y&kDqw%:>J7h4c-eZ4v ǰ-jpWPÙALJP\ %o^ 퐒w[<[e:YpaV LlO#_Sc^ }+*}mřKDi/8T9,̗pq2̜ Vmۦߤ *lw9% lOUE[Ly |MV] .(LIo*ڇ8{tm+'C/|tPAS]cbsaڵD[wI:M9N݄8mJwh=!9؋)5+7B=ڤV++_VM) 1Gz?6=P_ܒ! 𵞿!\]#+~Bi}jۚSIM5tK;%lL6:rm&GSաoc#U 4tgN(-S5?v텭$߱ro%Z3V>aS*@3 Z37bf)v=Fh5IU|vC(n #+XyiQ΍:S-Vr[A͂~sMa0Z \FDH:LU[8i19-9λ6u})٤]ϒxSSHxAun[ZZ0;W :OC$$Qa@]Tj  xcZ/7NšD m0-@a1۠9k\ȋʿo;TE\}^0&I7~CH?Z|6ɔmL@Yp7hz1اKK%%-,:.c[f 8оaWwUےPjw(3En8q+3XP~]5oF3aXpKox|NʘG@Ck\b?LGA#!5- Y%\]"!Be\;X"º %嬷]5&3@;QƄpn|,?µF v$쑅Ѿrط?_0?! 2c j*Mx1yQZ$V P{Dg/j ;@!-g_톟]bV~ L"ce=ձ]+5Y(L9K/rja=3ه> 'z+(7S ѿ'lF~zQJfǤu*)k[WOdOÚn]2yEaK𙞬ePPS c`F2zM8$eeu>8M:L| nؙN`dK׼G䀇[HS/~iO|y&iy}>ZA)U_½cXD'{m} c R!׌T\r^ն|noװ86Kv)VdK?WikP~YkhS32{󭸭L @}QmuʙLDebg4 "y usI4jCio2To߫ʨM^.]>1pyo˫)*oQ~|g+i F$ 6G;J)P71X*rmfܧS|W|T< Y|KbmJM%wG~!f@mLCUBd Ţ'@^SU hŌ Q$ܓMim 8c9XoɨX t|(~Fv "1)Ŀ7RdE!W]sPo>t֋WDUu$Ad/PNǐ`"S9+d`[ODρPC}n[9\0-4db!}5jy |О V{5/Wyk*eֆXF\3$o|?hmHl|d=6*0Ѷ:DJ%5)0|`}Rw3KVtl0)n|QxZNPKND(2!e-kq`Њc(zkNmvv^hM՘mGMSV2dɼ"SpL]T(+bJwsU).JԚ o5j@mLt3zh^(W3iϱ_,?d@r`D&n5/jNRDIH1?S" @Yh6MPUQ[E+-eM?44<c[u#<쵆EH=y"a|"bx N4B=AÛ cƉrʐ6<~(rДWs" |lx:Oe}n"95<$TL=uaYeJDR`.bb/f4u0E;|PNlXO\GGbR+Yd"*%?fCɛ\SU">]`H;Fl nZ>Lx)rzýJ޾?h1Aal|q" @ tnUTS=V˶iI6c>YK켢exB0W3E 94jI^fq8)8hZ=Y"&΅~5NF2 eG_]"sU|݇P?>Iuw s) '{ÊSJ "N1 .f3:"wu?8&Gi0sK_ bb,e7X60U5s vk!z6$H )|$O'NӄvE|5cg")'WnS~-4NΣV# lx:o4XM2 ^0V2K;5i5KLnk@7eˆߦ 5wAwiաpyyvL ^ƒ kpǾ s=}F 3,ӘieM#3VKnz[ޟP7g]-s?\ݝi o9B*0_1|a|ODGk=2+3AK:mx+U,Bb_M?k)* y)d@%=q`#*@HׄG~1U(Ҙ) @26hr )_ZyADRv,SՂFmȤ7|˔O4 #VYqY8'g#CЂcau'E]y_YGau*SsSc$DEOy?5z W*v6}Ki.v,U_Rr5aW5B*#⊁ƏjɥR'|WE<ۮQc8ʀTOK<q3P:(A 1\OتG(9nuGMsKt au#،MЦ7ݨzJ\j *olTj/7V<;-"b7?ӪemzHQuZz0▄ɉÐ]*kL 4n˭rM*Irp\FYq{`NifkWw4@y!ǹUtns=<,w+y_sm0%JL:ptMLZIN~աvEXԵt,LCy3+ s Z@Ҽo:ox% f0ʞJ7 iaJʈ 6B"{\(p'b g0.7 5'٧*;5R 'z-d7y]sf wUg}UV\Z{=8XJ̵9}֭Nv BdK W쥷sm#P 7"9u atG:/ }=Qə7QJ.uY2WRRzՈ $RLn~?{c2Pf s|}[xF`=xv/eDH:a*@S^B15YWnm1_NӸ*C^u ⃪dË3pz8ƕVM:nWyF5D mҘ$VNpm):Ev^'LhB_QG \@zczqMdfL}9/Y0/ Y;QFťB/;~,,Ul7*.+9eDT;Bl (H/K'zILvǬ0F!@)OC m0YDJm Gآ9q z8>Yo$٦ :BC Sz?~Ճ Rx b+F4\XgEUJx)nYi+^͌l +ZJz7ʬd0'17e$pXDkEK!," '=]S`\.I&3Ah-C,).cy\L.'x-0f=cHL'٨FRN|ھé}~X.CnuZHT3'mYrWW7m'gHi;um_3aQDwwi/yC=ˎH?In?LixQ'QG3.x, |ǻN">)C'Ir}:3QUT3<>n?ȥbs#p̙ ~E8Kg痿pdْp0v<3pqK183f `!LC23Bd,G.]@ov ^6*kEo<[g$f3T--6Lp˦b-֒f"=#j:CFN_@܄ s_FmU-wI:.+*P ^I,f (jaW?p$p X"N"fkUoB:\dIM҉ M)v>tZtq3\U[,TOZʼ/D}c [gr櫋i~YXamRi|(ߚk>fv(b *pg((S{Gǽ&4+ek--z[|6AT;OPDdZ,%R0 DEyH iFt='p_y @dtrd1ɤM MJs'.Dڂ4h*poWk.+r:W ^"Fo4*^in#Q˒!7E,җXUY _JEnݧU'¾>4R0T4Z2ڳ7 5`^+S ˨P3B$ !2 iJ"m_$aLHFLT+ cJ㳾T;GثhgBdsyi;? K)ɚ)dle6AYF%/ `pk4 dڂ?6} §Gq@_/EW^m>ϣ8Ht ADWjNmI(~Yk/ ?Qhs [PK:/ _)^1;Z CS>s#PoMU?Iվu]NS_o\Ow̯8q~Y)DMC>HaRm*˚{^[JǺڑXQ7%8-n+6Ѥ'[J.4,C@{zX|5.8hE5;|󜁂>LݥTWB*8Jozb+浰)}CG9K~l #M)G A1.l'4}2B:>xCNfD=&K?icU u!SZNC4NsKe y@2,a%Ta}Be(T|'{$`nǡ a8E4$$SQa+w4xx%@'y\1u 6cK MMi4{Qtu g&.7B9p|.~#n2Cz^y*Q?B5IPh'"a}ꐸǐEHK;exjd3EQ8^χ+"ȞV:AވuHPaFvy(wq*7VQ\$$JT/ :H+Mi+Z0Lit gkkh0vǯ| G%E&-._N!",-zY[z-Gŧje8ugφ$*%{P)&\`V> &U@%8zawKQW ,"pئT9Z+kp  *(z| !QhַA WScuob:UY؄T&bھtٍؠi=; Ͷ"Ԑ-뾐؍63RMgs~BXGfҺu)CGRmX<4625ܸB7fD~xǻF3UFS;k~Lo 'T/si@TJb'%}0ڤK$ hhCa\VHƯȳ7$w%A'v;"_7Ұ QX"O;α; yXFSVh\i讆THb.toceI_y/T3&>Ө[m9Sh߮d)$f-EҌ$]y8JArXT31scOgI@X^q9' nmgCbWYB*9npCbr| >.'9' e4Z$X+UڥÕ| m-r1}퍫UaJ)AȊ~ _dٕƶ` z&R܃ɻtʙ.~ tV%*Lx?-2, b7lHUgfL1_6~FS {L~[~Vg4jUe & l?'lmܴd/]OMf=15݀J{gNcvlt\.u슫LHn0!(ޔ(2DYh4:?_[;fjv& cٕjYX״o,"exYy&Dg%le[}fɿ=$طץ϶'h P6c2Ncb0㟆͓P%3]`|un#d3HܘSյN8jeM)J7@sz#g TFyy;(VmUyO]̳d1ks4b9ae#籀 "bUk@(&ÑK֠(}sCá35Y.L~fKW5!(L<wB*𐎰.{BeoS A~MNTEo l`jAL/DY³N( G&;o4;So`?~IY漒u jU^39m*c̦_=䬔^l<݉RS5*"Oy Q,Bׁ !/`3#y+oh@ +0mfaR]ܭBkaZiB)nھB)ټ ҍEQ-hF9ro\)rˏ? Gj+B`8&n}zRoZ>Ɏ󇻖S1'[]L.l~C~],VB.Cf^<^a`>!@+q=3goEw(a>iilíFyT. qb $qg(2D%X͕T2z:<)JBtz KZjۡ+8K/!"// "G˙GOv d$OU݃ #=S~&RTpUc1qGnֽ'qՇJ%J ZO.&5K7Cgۓϸ|%ަ˕8D9Gfd!t>v/V|zn@6 `GM͕#eP;m>[{ѭ"M8lhu'[w}!. fL&'_@Dtjy=!I*O {UBӲË\ ~'.?N v2Rm,ks*N2ǿ=3J$o-~@G ۜo**q6 W-B<?"Sh˪79{5QC7k R }kM]ڲlpN JY4T7n\H J껎sZJ?"\zmCR]Te5c*9o.$u5 Q3-jyhWdO]ft ~^!䫛}2 m Q^o$0x'hk8mXHݝ_) qC4ń疞EGhH#6O+I}nˆY3%.E3pTcEfpJn H;`L Z9kQNMA@kXz"t:=p.i1Mg14:a=!:{>ý2tJ[=}Y*މa?ZctrTNᰔLl~ש%k W ESRԯ8򅥞6-f擦?璉46sNM"VaLg!"C"ՊQ| k"$O*)Dʜ6W~D2NfkwrJna(W"Ma]'s'j/g-02wvzdl?9l/óxQ0o#TwO6F֞?DkO4Sd/fx(w=[`Xk撶FW荙 'QsgKߖ%̮hd&J&`ї1 rq+`nsT@2]2V:6)jY{]Q]`N7_Q⊙-r9[L7eѦh~X^Ec\#j4Z-,08{5)gҌ lq8f5>&4E_`Hq}x^t]m~7}Mu(MǙ@v5-r*aDoӮ|VRbIc̥+}[b4)ڒ+-14O(7"@.=omkX^ouN\8q07zrCb^MJr}3gW0Ȥw?~:ι;}9 Zƪy%sC4) K,pD%Dil{֓*$/ZK{g+* 0vk~ҦE)Ɉֺi=XmYFoX22TW`GʄE,3ld:-Eߐ+*BGV\&#zT"d(jtR8Bv6=Vgij`)6a[!|YGN0aץx˘Oﶱoʐ6 0B-:IڙF|0U2b a7}eŗ?F5Ix? g8_{\d&6l*]y?KXqclCs+vNb>ֲgD+QNl'Mh4D-G^N}BJq)iM%[:&#O@O9 ¢y/:?R)r\U&Bk&ljհE"nVզIZeqh޽A6QC*xvj:ђj%7C$?gZ9)of@=WR^by%Sy(b #-3w4hyi­$ր9brprw6zg%Ҿ*Y*]MR&þ]8a_ecl75yXjI3x3'4^ǥ_]Y%1?1JF~<6R~Bq+A 2@7~OA7 ݚBn;# V<,op)DZGo&m_=?.]'PV^qo̲辷'n,4:;zn(Z0mke*ޣɾbD[`"5+Bސ \ WMYE;$([Jb~ba]aш-({$$AX47B꯿Z҂CkQ~ZDߟu)]ޣg ' 3Q ̸tM[jO3A$0XKOaڣ@z]1y0;ѧ4ϵM2A"\m,;P>t !WX.e> -s@0Z0i/% ˓BC՗xǶ#Â;b”Z%vaB4kvf7".I~2 ƥ\(Y ᤹Hnu6 o[8 9K`D͐Ѐ,#,4~*fU$W ڰ5ڇ"Xc_X>c kj^ɺ(UESIڧP)1Rv`z(fVMZwF{IA߲2@@Sg6&:{0#~@ 0v k-괭L V29<xjYMK*lHM\QGTP'XD؍Yb,?h(^C+^b*V&Ƞ7Y?gi[!< J梾Q Ȱx%gzeJm'_a_3v3ozQӂ?R/lŠU:S'_zGN{-[=f9xKL9Z1N5lZN& a7Vh$e4Y ȣuw_G@53&)[v#KbN4 ,o (%B&wqbD)K]m? Vk-χ+Cq, fC?]'@wgCv?zJhJzyoGֲ4b1<1RvY(b#(ߊ< V1p偵QH>4I3QdpWSkȧMW~[Y&h|ֱnya@Z+7 Z`;@M )㪌}^!@MA++DsfnRe67|-M4Ͳ`GL2Xo.oRehV'6kbo |Iͭ]GXnti9{Q B*`KHklS\p$/E*IGg"NMPv#S uZ!ޥÛ o*]°I4"`huT`ӟ#Z., (y|vRh݀HG5f4E}яR?3,P8\絪=.\k-d2 ]K\Gw:TMd&R,f&b 3nE!fC#$3oˀTƃ jBjjc=Zd w]wdŷ1#~4p NeŬvY5ѶZөӨjW1\¹讍ᆸOg<0,g\m˲$ѳHČ8]m`-`^~,Y#z5 J6Q-y&:aa5q|]Y=;/F1E^Zn'3Y~Sݼ鎞6N ,._HzFl K&7=$f/&X-uIȎ%T;\ |gKh;w~C8odj$4-EW$GN4q߶,[Mj@^ smˠw$t- X@SVQVDf^Ro% VwA2,PSh&$8%'f6+ݾ}ap#!Z/5=3,+!ʍּPzct6X  |K Y0 \)R vɶj?N1ӬbŦC*.~5Y2T8 9̘K{)drfz/d'@{p9ҁbc-Hh{a?'dQ 3CwSv8YeQ?t]3Ie F7lqUM; w[?9ǡ,dK [z?1f?F=J3wO+;PnVtnqS&rkO3ҡbuXe? >Cί`MIJyJFl[)f?9>v]q۠Z#b!h0-iR6&HMPK=`~tE9@ j' @&mɝ59w#G\ț^#4,)KFA΃4얅('X)0":c &MaF Q(lsqb.~ S Dx5Z fFkPtua'ÅHw*bL ~E\`1tgЄx63( zB?# 9%Aօ \wiX̎&2V<¾h$fKt[o/DWG`%Rs*zXfbq"sl@M ^%2IE(*s|\c 0M(:p nuji}n\=@'!{yHt9qa̒zDRnh҈Ncf)Sђ;0jK#>)ݦUqR쬛0(h¡aHTA#gRFK: KM5~\(Ce^BPs3Wy^( dN@ֶ%+k:2WZ [-[tHD)Ry6C$X:]L[U> |nx-7EZH63_+w&9Ltc58XHm2HG'O `u "6ajyh4?daq CoV.rA=H1ΗyʣƲ~/-a7&+YP;^e% oCb@UŶMoCCZR&MhL#$;&? :/:1\2^gYEE;H r6#2 #^$AZOE[v|*f?p)rTdM#Z%QY퐊\*}%v~m;B>`wR믴DJW+|'?PE? к+B̳&#bŊ+6H &pŁj@E, :KA] hU4ftL7#.,:IoL>kw;I .29 mDmmUo 42RLc?qt;W@lСdҥBѵ,n+x+{b1+Mqc͙n"hCaΌV`{L+aZ5eD櫄un|d5k_Z gO7 _1oX$E-"3}(8KS`+ׯiu $W̪ۖj< *hXaگu~vo+%aWI/RL,excaĔ .u VĤ3aNMbb[uU5?ufṶJNex[1 {gw'+'۩p ]ȇ1<]oSЦw<MS/R9dpH/܇RN%B-^V[!OpVL TuL~; $dg{^?W5f*Kdp:PrDSpM{k_Օ FbHkW&(!j`Xr|=琢WpP尔~/OhM+-gs$T(Loi.yy%K~M/)<`0σG6~Picf%2M|ٛ?x+Gُi'$Y/qn^ 133Ϣm]+C('-rv yG`uVTׁ{R5?iF9SA9%'_GosM~rDwZ7oeWiF1~3>.چ/4\ +?rzȠ!E4L yV(S5G1;@ߧoq@*'!eGbFSSIOr~THVT?u9J |cktV2YY4E)׻3jSrj@qD9'Gq@.>m;GgJQ,E9o[&v $xSvtlA}+znbrG` Dĝ 2Es3*EiCKY"nI!( TMl¹k]vNbgl}G, ,-M9k> X6F=!D66 <5& C_7QfP-cV5γ:(N Pk3붌[\ow<8!W'Z1{7V@tcH!Bg"U^_5ۣu-p~**nߝ,%˅p^lb֮r}sZ 5M?hۨ}x*W/Mn84GS?9L ]xMF)P]$ w5Z% iፌ֕|`Ea$}:bUZ(>@) ka1n:Юu!9'8AZbG_lۗRwRgq!# v2)H6ζ/PC,yV =&zu0 @iIY'9!q15,QSN?dջ]U~e}Y6%域U̻};;NjȈ27;uCw>]w@ [ݲ bL[Eϩc94ޘǩTc!x*,lto6NȚ&Lm>˖ĭ(U.y 5<3b򿜗cU6L/)ZJl2,9f]EB'o_a7$>`Υvc`rů766!㧚j\t/:ZLOQ3l)t3oI"qzp(wU?-6][E X8Z$ U4ZBiG b):G[- ]$ c?/v_6ͩI"֮ E8]C (EH YZ