container-selinux-2:2.84-2.el7>  HLk|]E vD)hw CoFǴzv kO<%}H3} ĝN=fT lKن8ƧhQZ.vnFߧ5 C"3Wnpl[Ut-}a9;G|{Ia+֖ p{(_fgl;tC\C6=BY'w dI~ Q3m4qQt]`Ly܏ Pw/9P5ᄑmZvnQ 1UoE(jqrȋk s2"'Bp4$K/jb64`, d^'kp6*Ic*X}|\\] lS"Nw3~˶sK6g!.g] &HHb%TjJ6h\z3_vJ(`}b/뒪`eS>G*ق" 7ICT>@2`?2Pd  $ L  w  $  4  D  d  ,  4 T |    $  X  B ( 8 C9 C:C>.@.B.G/H/0I/PX/XY/dZ/[/\/]/^0+b0d1e1f1l1t1u1v1w2 x2,2LCcontainer-selinux2.842.el7SELinux policies for container runtimesSELinux policy modules for use with container runtimes.\whc1be.rdu2.centos.orgCentOSCentOSGPLv2CBS Unspecifiedhttps://github.com/projectatomic/container-selinuxlinuxnoarch# Install all modules in a single transaction if [ $1 -eq 1 ]; then /usr/sbin/setsebool -P -N virt_use_nfs=1 virt_sandbox_use_all_caps=1 fi export MODULES=""; for x in container; do MODULES+=/usr/share/selinux/packages/$x.pp.bz2; MODULES+=" "; done; /usr/sbin/semodule -n -s targeted -r container 2> /dev/null /usr/sbin/semodule -n -s targeted -d docker 2> /dev/null /usr/sbin/semodule -n -s targeted -d gear 2> /dev/null /usr/sbin/semodule -n -X 200 -s targeted -i $MODULES > /dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy /usr/sbin/restorecon -R /usr/bin/*podman* /usr/bin/*runc* /usr/bin/*crio /usr/bin/docker* /var/run/containerd.sock /var/run/docker.sock /var/run/docker.pid /etc/docker /etc/crio /var/log/docker /var/log/lxc /var/lock/lxc /usr/lib/systemd/system/docker.service /usr/lib/systemd/system/docker-containerd.service /usr/lib/systemd/system/docker-latest.service /usr/lib/systemd/system/docker-latest-containerd.service /etc/docker /usr/libexec/docker* &> /dev/null || : if [ $1 -eq 1 ]; then restorecon -R /var/lib/docker &> /dev/null || : fi fi . /etc/selinux/config sed -e "\|container_file_t|h; \${x;s|container_file_t||;{g;t};a\\" -e "container_file_t" -e "}" -i /etc/selinux/${SELINUXTYPE}/contexts/customizable_types matchpathcon -qV /var/lib/containers || restorecon -R /var/lib/containers &> /dev/null || :if [ $1 -eq 0 ]; then /usr/sbin/semodule -n -r container docker &> /dev/null || : if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy /usr/sbin/restorecon -R /usr/bin/*podman* /usr/bin/*runc* /usr/bin/*crio /usr/bin/docker* /var/run/containerd.sock /var/run/docker.sock /var/run/docker.pid /etc/docker /etc/crio /var/log/docker /var/log/lxc /var/lock/lxc /usr/lib/systemd/system/docker.service /usr/lib/systemd/system/docker-containerd.service /usr/lib/systemd/system/docker-latest.service /usr/lib/systemd/system/docker-latest-containerd.service /etc/docker /usr/libexec/docker* &> /dev/null || : fi fi #define license tag if not already defined&?rW.A큤AAA큤A큤\wh\w\wh\wh\wh\w\wh\wh093be781f9916163b4f01d3f7edd672d735d3d8347b5aa643cfa3c58057c6d5de346270a0533dc2d031deae3601219cbc387943c01284c77321360b779dd45d8808fb125c281360d895ca37e40361255e6b9092e710f2eff23535073bac791b7rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootcontainer-selinux-2.84-2.el7.src.rpmcontainer-selinuxdocker-engine-selinuxdocker-selinux        /bin/sh/bin/shlibselinux-utilspolicycoreutilspolicycoreutils-pythonrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)sedselinux-policyselinux-policy-baseselinux-policy-targetedrpmlib(PayloadIsXz)2.5-113.0.4-14.6.0-14.0-13.13.1-216.el73.13.1-216.el73.13.1-216.el75.2-14.11.3\w@\4[k@[@[[@[[Xf@[L[K7@["X[@[@[[[Z@Z?ZZZ%Z%Z@Z - 2:2.84-2Frantisek Kluknavsky - 2.77-1Dan Walsh - 2.76-1Dan Walsh - 2.74-1Frantisek Kluknavsky - 2:2.73-3Frantisek Kluknavsky - 2:2.73-2Dan Walsh - 2.69-3Dan Walsh - 2.69-2Dan Walsh - 2.68-1Dan Walsh - 2.67-1Dan Walsh - 2.66-1Dan Walsh - 2.64-1Dan Walsh - 2.62-1Dan Walsh - 2.61-1Dan Walsh - 2.60-1Dan Walsh - 2.58-2Dan Walsh - 2.58-1Dan Walsh - 2.57-1Dan Walsh - 2.56-1Dan Walsh - 2.55-1Dan Walsh - 2.52-1Dan Walsh - 2.51-1Dan Walsh - 2.50-1Dan Walsh - 2.49-1Dan Walsh - 2.48-1Dan Walsh - 2.41-1Dan Walsh - 2.40-1Dan Walsh - 2.39-1Dan Walsh - 2.38-1Dan Walsh - 2.37-1Dan Walsh - 2.36-1Dan Walsh - 2.35-1Dan Walsh - 2.34-1Dan Walsh - 2.33-1Dan Walsh - 2.32-1Dan Walsh - 2.31-1Dan Walsh - 2.29-1Dan Walsh - 2.28-1Dan Walsh - 2.27-1Dan Walsh - 2.24-1Dan Walsh - 2.23-1Dan Walsh - 2.22-1Troy Dawson - 2.21-3Fedora Release Engineering - 2:2.21-2Dan Walsh - 2.21-1Dan Walsh - 2.20-2Dan Walsh - 2.20-1Lokesh Mandvekar - 2:2.19-2.1Dan Walsh - 2:2.19-1Lokesh Mandvekar - 2:2.15-1.1Dan Walsh - 2:2.10-2.1Dan Walsh - 2:2.10-1Lokesh Mandvekar - 2:2.9-4Lokesh Mandvekar - 2:2.9-3Lokesh Mandvekar - 2:2.9-2Lokesh Mandvekar - 2:2.8-2Lokesh Mandvekar - 2:2.7-1Lokesh Mandvekar - 2:2.4-2Dan Walsh - 2:2.4-1Dan Walsh - 2:2.3-1Lokesh Mandvekar - 2:2.2-4Jonathan Lebon - 2:2.2-3Lokesh Mandvekar - 2:2.2-2Lokesh Mandvekar - 2:2.2-1Lokesh Mandvekar - 2:2.0-2Lokesh Mandvekar - 2:2.0-1Lokesh Mandvekar - 2:1.12.4-29- rebase- backported fixes from upstream- Allow containers to use fuse file systems by default - Allow containers to sendto dgram socket of container runtimes - Needed to run container runtimes in notify socket unit files.- Allow containers to setexec themselves- tweak macro for fedora - applies to rhel8 as well- moved changelog entries: - Define spc_t as a container_domain, so that container_runtime will transition to spc_t even when setup with nosuid. - Allow container_runtimes to setattr on callers fifo_files - Fix restorecon to not error on missing directory- Make sure we pull in the latest selinux-policy- Add map support to container-selinux for RHEL 7.5 - Dontudit attempts to write to kernel_sysctl_t- Add label for /var/lib/origin - Add customizable_file_t to customizable_types- Add policy for container_logreader_t- Allow dnsmasq to dbus chat with spc_t- Allow containers to create all socket classes- Label overlay directories under /var/lib/containers/ correctly- Allow spc_t to load kernel modules from inside of container- Allow containers to list cgroup directories - Transition for unconfined_service_t to container_runtime_t when executing container_runtime_exec_t.- Run restorecon /usr/bin/podman in postinstall- Add labels to allow podman to be run from a systemd unit file- Set the version of SELinux policy required to the latest to fix build issues.- Allow container_runtime_t to transition to spc_t over unlabeled filesAllow iptables to read container state Dontaudit attempts from containers to write to /proc/self Allow spc_t to change attributes on container_runtime_t fifo files- Add better support for writing custom selinux policy for customer container domains.- Allow shell_exec_t as a container_runtime_t entrypoint- Allow bin_t as a container_runtime_t entrypoint- Add support for MLS running container runtimes - Add missing allow rules for running systemd in a container- Update policy to match master branch - Remove typebounds and replace with nnp_transition and nosuid_transition calls- Add support to nnp_transition for container domains - Eliminates need for typebounds.- Allow container_runtime_t to use user ttys - Fixes bounds check for container_t- Allow container runtimes to use interited terminals. This helps satisfy the bounds check of container_t versus container_runtime_t.- Allow container runtimes to mmap container_file_t devices - Add labeling for rhel push plugin- Allow containers to use inherited ttys - Allow ostree to handle labels under /var/lib/containers/ostree- Allow containers to relabelto/from all file types to container_file_t- Allow container to map chr_files labeled container_file_t- Dontaudit container processes getattr on kernel file systems- Allow containers to read /etc/resolv.conf and /etc/hosts if volume - mounted into container.- Make sure users creating content in /var/lib with right labels- Allow the container runtime to dbus chat with dnsmasq - add dontaudit rules for container trying to write to /proc- Add support for lxcd - Add support for labeling of tmpfs storage created within a container.- Allow a container to umount a container_file_t filesystem- Allow container runtimes to work with the netfilter sockets - Allow container_file_t to be an entrypoint for VM's - Allow spc_t domains to transition to svirt_t- Make sure container_runtime_t has all access of container_t- Allow container runtimes to create sockets in tmp dirs- Add additonal support for crio labeling.- Fixup spec file conditionals- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Allow containers to execmod on container_share_t files.- Relabel runc and crio executables- Allow container processes to getsession- update release tag to isolate from 7.3- Fix mcs transition problem on stdin/stdout/stderr - Add labels for CRI-O - Allow containers to use tunnel sockets- Resolves: #1451289 - rebase to v2.15 - built @origin/RHEL-1.12 commit 583ca40- Make sure we have a late enough version of policycoreutils- Update to the latest container-selinux patch from upstream - Label files under /usr/libexec/lxc as container_runtime_exec_t - Give container_t access to XFRM sockets - Allow spc_t to dbus chat with init system - Allow containers to read cgroup configuration mounted into a container- Resolves: #1425574 - built commit 79a6d70- Resolves: #1420591 - built @origin/RHEL-1.12 commit 8f876c4- built @origin/RHEL-1.12 commit 33cb78b-- built origin/RHEL-1.12 commit 21dd37b- correct version-release in changelog entries- Add typebounds statement for container_t from container_runtime_t - We should only label runc not runc*- Fix labeling on /usr/bin/runc.* - Add sandbox_net_domain access to container.te - Remove containers ability to look at /etc content- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7- properly disable docker module in %post- depend on selinux-policy-targeted - relabel docker-latest* files as well- bump to v2.2 - additional labeling for ocid- install policy at level 200 - From: Dan Walsh - Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a standalone package) - include projectatomic/RHEL-1.12 branch commit for building on centos/rhel- new package (separated from docker)/bin/sh/bin/shcontainer-selinuxdocker-selinux2:2.84-2.el72:2.84-2.el72:2.84-2.el7 2:1.12.5-142:1.12.4-28container-selinux-2.84README.mddevelincludeservicescontainer.ifpackagescontainer.pp.bz2/usr/share/doc//usr/share/doc/container-selinux-2.84//usr/share/selinux//usr/share/selinux/devel//usr/share/selinux/devel/include//usr/share/selinux/devel/include/services//usr/share/selinux/packages/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m64 -mtune=genericcpioxz2noarch-redhat-linux-gnudirectoryASCII text?7zXZ !#,\b] b2u jӫ`(|hp%0\uj%a8":9/w6d+1#5`q 2 ~n$6IeME uk1Y>dWɽ; )2'+je$~CaY*V z3- ҿf܂ڎnN&Yo/?s !Ie*E&N_^B;ʢ+mz)e1yT~Ƙ?$;@ۢ5UvWˤ8G]K3 wF6bOx.NTSaOQN@:u oEewb+a: ^#u,GۑۀnuoU/)D&@̰CcR5n+(}>I ìnxm 64^(CuWScG歰`Pmt+'b7o3yQ5VvPȚqiM5 r~5+u'Yì;A xe@p_oQ屙PFkGfJ}}=sgMÿ"I[m)ea1QCrbէz/BGT 4y|Uj&dMQc 3$6CnY1;.M o,*h cGlFF0Ϫn I e!=^0I*u.*L6+t-͍z4JaFD9Ë%}웜, 8Q>7il"-Ti{ 甶&#ոD5igd^-28͈+ Ώ.~)2n+0{\8)k~-}Jqȇ67K/tvb?͖57l+CMRndt-hy*ґXy3 L\ӼDג0_ ֲq1,aþOaX\_4:}Vsg6n0 j9=xdhAQs ?Odi"uڣoȒ@]d'P>sіWY cJ1P#&,>sю.F]O>u)U1^_8)W]IпΡ` =;>omygژu"쨧翾-HrW9u'=ƾX=\xhC@k DyG(i89́Mڼd&Igp%nPkr-BNRG7̋ U Drh ;ԾP7J|5݋{޽'+Ī:ٰ}x* etpxfWW#, }oa-p˜Ɯ_qpYb>>3 $Miay S4s7"v.}o I;]/sybEJb~Q E~@V֝I 0vX}䇷235lT&)u2^Gj~'ýa.w $F][Z|ӝ2w'n,4K.hc q>'J꓾MƠg:ٺٚd~#b5v_0ԚwtCqI1}ј boG?Def`uPZB P+7ڃ>U$x]vfF)k!b9-g\g.L UΞk;Uk-q^LpDv^Z:ӛ#[P_j3 ^m#sb.Z4SoZ1[yPc6] 黋x2*|;^'iCXY7+..nFNYoa(+*_IԦa';StWux{X;*NM0@OUn}=љH}LU tK}OXm/rG>OgΟh5]*%q<: plepЯm$MT/9IQf|&oY<#:'⟇n4>ӆFyԩ}o 4 + bߖH'ŏ[Ay }mVՋnr8#Kk5d3,5~$Lj*=ki|[1L<u+jp]&8^8Xe5c'1zE;71T'o8߂Sʜ3"%Z ic6g2_}[^9@E&UHlHhH@6Lb? 4 D4݀ҮN6+rJb![>{5୹bi3TJDv%ۘ`YT{( <AdUQQr%b_'+,M幋XԱsHETpIZ@e61[55WXmw%ZǬirUݶ?U Ɯ 8sHu3]U$] L/L.3&,MƝY=&UwAnT{=Rc#C?$b(_2} \ rS'NNt$uݾ+-^e;wQNI\ެɣun8*?NA)Wcc1GK28)& &AЍOc3GRcB#"@]9Vh*73Rzá$=%k: Ysw͞٧hv~9~yPMnR0D_S%'Y > `N\)V"GN7`|Ib3xN҇=D[K=dy,$v3g<v ђJkaZ Ux8.q5v"!dFUYZ `0o7dN>}K;fUp~3@9TpaK Ĵ*OY5NU#I# #R!hww2%4yX\U.o]X_! PP[= q*{ZqvvL֧>7bnJbCĆ8q{66يܥ!tM6li7¸hz4ah:ӭT-~Lܧo8YRJI޹r0~At X{]9>`VBlog-™ *n\Db(L9Z0.pgpʴ;̿3sz@ ǼO]2w$faw5 fQ|kӬUNPڢ2FR2,2&4pYV3n_6tdFf>H{X:JatZUxd0ǖPU%oqI'b@puwO+pfŤti \O|oݝԵ`* O%:=h/WJ*9].%n+:%E`CXqʽ>&|$O8w߅: _Z|}ǭ~,$[%mšXwy=9В\srn/bLz $[m6hD~.Pl54% ZRXi9M71}\VC X6rQ77SFODNc=bJ! ޶C%0o~8ĉ#()$ڦӃȒ TM1~y'@lFu8 <kyB:y&hSG#g1vƸq[G-MZDO գch4hNJ2 :14θiTkMsӒQjw ?<'hFXY~RR5&ZK<{q Ar}1T) (-_RgBh*d,ΖA1OD&P`?J* \ yȫʩy^ 9W9= r/NjM|_g\@u%N%Z +KZ1,\@;7+Z.?ߛ^­DI4)$e :!Z5?y pÒ^ldb{_v-A `8llyE 7Z O<| t@0+ jw,F\Jsh$Ӵv^ێcT~|b=6Y~QAn ASAK)+JoZ:0rqu2&{ V=!!;k0>'tY0Ε\^>\#n_+wZ4׋PցRj90g :[&j-ߏπKc(l opPQS:ETZXsk+RbTSRmCoPCkCv;䳟]\ Сe v^zvW B =6Pfs 58G/i=yp[lw RnV\|64弶)|EnZ/AO ]혆`d-q j³Š"D7wuK&Z\}­*SN)G9X^(? Ŧ, ,N R.UzG{'FلVX˲e Z/m=X z##~|č&m[_*eUݚiƵ VpfX/2kZ+ү@*kv-9WŠƀ/#LS+DBy&܇1/ h0k48ʙ}۽XYr=%k7?$7 "0D;_EkFejV&s)$L±i7QDbgJUNܠzM]?^>%.FBl7q}s 7j^hd,|nAɖŷz0a E)zK>],u٫B0=7qBIyMĵ팼Wo_N_Ƨ16Z 3 $ ƱgT c j h'D4ŖylUM<yEڈ@8 opٞl%vH\oat8+9)YpxÌs݇ze,ҡ'ɸƄ6Nl0Xe4yaz>Nq9-05Cql\Im;%]l3#QnS(> k|::lH{g{"XT]װMf}x``YAp8Kk WP,g#kk6&N1Kf0½4W]W>3u%ӎA+ ikw;Ճ-nɼP> 'W,ƾXxDyF6jt_Qnfj&7\_Aw2Yl@(vJP>ow˶R0љ`(u6N'mǺ!FB+-9 eV 6\]mY7zGq&/I̲/5GCLsOf %-D{iN^夅JF j 3$nytN(d Kp씚͑6 ,(0{?RTht4kͤ( En0M$RҞD. CBv_^, KdAW~4H4()zbde}kL ]N /}\rgUZdpm$ |8PŀY‹)YVV4bj1&'+5#13rze\j~tqA%y31z5\#Ѵb\3 4b|æҞ}6kMUYd+I0dѲV9mb+7I9<<@s|C@`2[a4#U~%eJ'κ咂sAڭ]a)Joa UW>{+KIY&<7Fje˷j4O /Z+YXopxߢyro htm$.w\&D +Ha= !6\ 5H]z,tWh3N#AD/= ^6+|&L೻o>1>2rx>Cʵ2]E.Fki$|4P 0!Mbv}1)9y+,-|hMRa4"]+nK22C5"IjEpc. .WBVO)Q,-?)}Ԗdp0E_D \xz TZ0<%﨔|WU᪤oAmꕗCT>J14~᠎[KwHP[ڟI1FK.o'8Koѻ혖?ranH4}uA!!yfgNHMd|Q*LwÆD0v%?C\7T@nM*NBt|VR섹򥆱]dl=9_.F]Y9 Tn;1]Oo6:!.z=ByG I8fJFK߆XR|ZD<#Q^D6GN 3MD9$~gYy, fTm Vedq#\ߢK`&L?:3Ҕe`݀#덽k6ӥQȒ?"m]"!px4v>,lWXrJ|ӀŌ ZU { a*lHAW4Q;-%H(_z]tzu:%mLnuPYrm"GA^v(Wun!:XOIXy*穦fW 2TbٙTgxǝ}О*:NcB'JdIYN#\ݚ(Uw!焝,-Ҩ(ޫV_ s}Fˬ o˥U=SфRJa*{һ :'t7@{sqRr,P~1g[hWi DpOVM2jEb oΓ!w\MLLhlүWJ#mz G)~4n^ys^* {ؖim :4:IDpa0z5C\h-)K8fE+"EW#k([14F0O2j_״&F@е4S.naBڔBce>~I0h:8@iZIa9%:PYn7O+gݚ YJf:a{_.#q4B^>U.M>^;@i6Gr+JC_õ 3jQG@A.pgOmHX>"(v Q$%.sőc!hWMh6foI*Ve'Moxa>i)Mht˅D-ouat2BCjadj!qJmG9Mq BX JAk0dUarGbȩV5zU[PS wSa&u6>HF&nL\oZv,$MW)d {G G<%/Y-Lx%RckQ4֨ Ђɹ/&NiUpNpFcY:A/8Kś!m<2"Q$3zpR*C%v5 j<^Pkv }(U}쎵Y|YG3cdl=\ ZBͺ 43z5B)-XCÐNd) 0Z79W&)nm ^^Z%>]ÎnSD۪#qg ^\wV;${e9W't҂k.eH(6*Ho-MF40ءc j03#ne(3g:h*Gmt?5R^lhhPz9^WC/,.'y#J5 v0j 8< cXX n lLgJ3  7r(fju^{5B[u=B_?$ſd-1}l8)KxE6j(vﰮTK1yejzj؇."LBʆ LG޽=IDi."BO'j'K]8PDg=+J"bxk[7o5S8:J|yv߶Y p;)㐗՚_XKY2s4ΗALr=ɓ{4UZ40$q)iL%Wjz8D9^AEG2 JU5. m%v)S0ws*$K 8SH|ئ"zUYCOB4SvbyM3kVPHSe"ux>TTÊwlf׶̓n׵0j(LuaW c@=V#Q1@Q!_ $7}X j]F-2PjUKyqkcmM@) NC۟/#59upQzkncNJ'^<8$bB dkL-?<@,E/ Ck9]4%'=͇mB$nQm:Tު$0>x"ɽ)o313mϋ}xϯ[„f聜?zNbNHNU#!56ޫSNvwretFT{9HBJێEZLS#y/!ۦl',@Y9-*̋m-7\wjx\>猶灴E?r;YK@CKbH½d\VEI ! #l-^ *>;U+ڕNQ/f ɑ\/H4:o+<_{ۻU nTW//0OXn2~p\ݔ_ w<(={vPPhjNa 0nP YxX֟S+ ~Wi<%t(3$|0NNZ#-zf+LHdoZ|uo i2S=#z % XiXHRY3Sdi$ ,Sy꽉_eX,5kQh7sŭUڞ[`Иzh4?)5ID \F ꤛv#'n"?/]@fIBgRE"%cUk$UfKB5bro:UOe#*[K34h> =Bl1_F]}yeZٔtw lvuH2~p&p>0?CuyY,ˀ9uvf-j@RȮ8 GʯiyQfeAZ++Txu]VEv)9IJ a8rPVUG)% Գ8熵P-ۈ6WeAĈ2!gl>N3V_ύSGȆa׍rEt$V_|uҬH`c;S([v̪pg2Ux/ y= } v zic-z=i;h# !eajR=5# 3Ⱥ5dcaw`BkQ{^s)zRZ0ELʥ 9̎$0c{IETU{+f݆UD];~v慈&a 0iDm)B:U6t'#w6a😼 v\hQzx Ian NȾD.'|V$2KӤxۯF7Jul{B՞j(݌Z_Vԓ]T!CPxoS`mv12L r^,% E1Ւ] | 2=*)A տA d+D 0y;yR)3Q7H϶3r\ ]ryna݁Ic1ha.-f3lΔFSL~>2g/uN"~{ ,O-NǶu(?凰YNչlHD.e{$i" DO\̮kԺǻ ;@clөqf'ߎG,_ZA՛Wz¢Mr;QԖ:AV5 L|4iPFI'jF~i>y j0ڧzuVW\B˾lU_am]\ުR}h`v@ Q1BAWW! ]bexPzf$6ZAS `[9plnJ^7<)#.5Mgۄ;jWeFG!EکH6?]>ᓖ}}gBe>R\44[p1Ѭr (#q r-Aj*w+ :`^VȮ1 h~u)ڷ[JGm\Խ$z"@pSr"5P4ȫ`L!Djd+ >y$g5~i۹̌^ɗ@XԉQD4٠{A8^ C"&dr`"k^OjYԥl4׫M 9ǥBaȯ;ܽy-?&Śn7I8^̍9ʰdڵ"nڃE̫![څcKe/ + j%Հwi׹5%YN&CJ=anxrP)u%ߔ.>ZФS'2?0TT"GcC Rn^3weaa./3h˝Lf^{$wPK2s|oUuǑuhDTA^M+?XA]XغNŏʦU1bThVZPޱ(U"܏ah樈$~|A'ߣ6%(YGUs6?z2kHN9؜Wx3f3"A$Z"wYxIVާszDPleu; 8O"a֤c٪!t21U뺥7D|e:50_ me Tr £wW-*KFִz83ZJ׾EЧ|f֠ Ai1 i㭚-i}&:RMɫ7 p(d*yGᦦnLBGY=F AƠ܍ ➵";|6OPG>QP"$-qDorўSqzGH =[& [6]5vmeim[|&v!CW5v\{=q Սo,2 NA(_Zɫw1a SVxC3zP(DkqAc7]>)t۽h+H0^HnIRكB9fu NT6lj=Nx%aAO~SxK,-AiB)Lk@;(ۂ2 Q\ VwGx?5hmӾZ$~ۆyy[E" ؄hw !ӓT-+OYp4ӴB E;@{3^J3r|qR-,A3ƍ.Оw aV?,v[,Z$IR48栳3N bӫMµ皥P|"R[h{mx K}-Ct %%@o2{O~Hsm)n9;)yu10h0 R% Ո>%n'Eũ2Ii6Hd)r:vA74̋/8Sޘ=mkbaMO{P Fyn4D#ַ|CJ)knS{ MWՉV8^)ԛz=~MN;M*خ;3VDw=j1)h{/eCڅc}tEY)w?gPKL Zeȋ4p@x$d&гif5:mZN)tG+j˳*1ӹ]9w!=敽mtLQc[*8RKsZXb& <""w:)iXFê RL=P|pewal ` =w-gI+X\[P*8҆ס(y5U?jm!_ zౣ R\nׄxC#;csyfƀ8`W fSU9YRxulZn3tJALܿkT@%QgH~ȗY/Xcja$Æ.}u0=;]zI؟9 " |+#븞!B V]zd5\rQb9VT:a96cd>N,}ȗCXޟΝ𒣋0PmdTT!hfL! $鈳b$kbGv56{i9nX΍!KWϹY Cu<~=ﳂy0yURu,V#uV^i.c+${"%&_= g\ gK8vT,AGZԮn|Ch⦎cbl coCgYN&QMs7ѻ<˘cTU6y|o|bZbk IO!ׯlݤ'B=(Hdq#‚ ?VunG90Jc0w#EU UG u5ʽd~R+^ e9U[/]J_򰭽m+\ѻZr6'3 s< Oz||e%o*j5QL+Cp8H)dd S-@)XA#5();hMI<fЪKsV;t+^lPaGqvg? x1ccñk>GD(oUIF%#m=Yu?Űa_=OD<5 Lo)+Sk1֠& Љ3/zZcPn\:ѶZC+pg 1 ܨTu|gW"+zgB$uٚSq4 1FQxgs gUᙎ^STk逷7JA3hEh*$[&X,/pU헝Tec&mF-*usz`,[DĭQ~cnwni˵Ĕ/t*\,jlxhIE߾I:ޅ&q# IM{+=E)?&O2HJ3АBݞ4goח O 2\=u~}~2_ ;秧ȗBC:;'ˊk%KiJ>ڗI {2B*WU^ V/& <;iڒ1!EV$mQNpSz` NWT9.űk?Df[Y .ڄ?#J'yJqk2/wĊ<+X!9-6ZXҾ;܌՞Uō\ܡR~EoI62go놧 7H/:5 ܲƅ@AQgG{ъaYO9OL幁d( ŵTMKFy6:&y.M_ HFl AUͧ,Pti64__ EuZ\򳻘J7=9Rѐy&)*i˲Xw/̨pNR?P#La.W땣 n"FfTA\6TIn 4#zX49s7-|z/ױb%6ggXF?ɫNj> 9T+[k/iB.謂o,ϗMGt%y;l%fQ+clX P_@:$WlgKT9V'/~|?cB}I~ջTk-GwEz̢J+’=+:lT߮W,cY=NZద9Ɠ߼]ϙO}Sˌy5`U:g볽 ZIcq:3$m؏71}FռR7Ε!PJh :)x^}|(b59%AHlUGDD<Q^4H}0*W,0'~GCԪ2/{s '=-j_2"0z$͠/CXC=t]R'ޠr*ySv2r¶N;_]0-E`=Pd`2> 4?ސTUj0V~ ۩Nl'*uI@^9vC` z{ъ1bA zyKR,T9K'37vrP?DJtU#2s[~,K\HE~GO A{r@qa+B?UU˞mK@gv 51Ma_gQ@Ԋw3hv q C;۬P#id;1g3Yu);6`gdԍ]^93_Dһr&qڂ'r'5?8mw<N0l,ch0eh=+?i])-BDŹ85r}'GtUZ@NnQb۝wg60o D"v -f_ yD+W_ ,zgmbCӾj{ZXDH jsc@cxj}"7KCjm|:VG`?|oɝy1?Qqf48VƷs':59v &6-\G?rލ,y(+j /!.2rʩX c }ukQ&to<qfF+KLLSaD/M.!ZQL F>s]?{Mg=ܶ=CY?;#,/]?\/b)R0An U#Mx.AB&O*83ߙՠf6O@'TC.'BR3=;myD3&>\F,J֠TK5:/[wW>}I:Ĩ4o.l]E@ܾ 2W}1]ݵFlrMefc,3TaNv21zHz`._HwE8M:;o"c=,o U@"naM61n}`W[gv D?}`h| i֥p+m砅HRgmU4(ôyf3ea̦SIyh&e+R ~]=&j&7\w q.H C벮V8hh3J0PΠz`m77I {(pplW{OE/^~!Y0"\ wmA((\u@RD`-属kX$ 6Hx}:$*$R]XIR/\c4c\EW { ppYۆiYExRXK%nϷ\X51UL([ W"8dffAu6 Aq# T~L :MQap|@ %|$!TMSH~Rwn:PqR0䅞o㱹h[E-ߪ!FO:b3 #cޒcox.v.ɫn9bpceV+@R"tMR<"{&k tSវE ,Nς@QxOJ'|ˎ/?`$87t%[vP6LlTl4q 5cx{73Qt#s p1V[6{\ =́xw_apF9 Nm]0j*5ϝF1=Q6Geftۘ*6WIUBFяuo<兯՝"+*GWA~7AZUi7 P?X