container-selinux-2:2.107-1.el7_6$>4P"DpՂ4G>?3?3xd$ ( P #*  8  H  X  x  @  H h     8  l  V ( 8 F9 F:F>/@/B/G/H0I04X0<Y0HZ0x[0\0]0^1b1d2e2f2l2t2u2v3w34x3T3tCcontainer-selinux2.1071.el7_6SELinux policies for container runtimesSELinux policy modules for use with container runtimes.]HFx86-01.bsys.centos.orgqCentOSGPLv2CentOS BuildSystem Unspecifiedhttps://github.com/containers/container-selinuxlinuxnoarch# Install all modules in a single transaction if [ $1 -eq 1 ]; then /usr/sbin/setsebool -P -N virt_use_nfs=1 virt_sandbox_use_all_caps=1 fi export MODULES=""; for x in container; do MODULES+=/usr/share/selinux/packages/$x.pp.bz2; MODULES+=" "; done; /usr/sbin/semodule -n -s targeted -r container 2> /dev/null /usr/sbin/semodule -n -s targeted -d docker 2> /dev/null /usr/sbin/semodule -n -s targeted -d gear 2> /dev/null /usr/sbin/semodule -n -X 200 -s targeted -i $MODULES > /dev/null if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy /usr/sbin/restorecon -R /usr/bin/*podman* /usr/bin/*runc* /usr/bin/*crio /usr/bin/docker* /var/run/containerd.sock /var/run/docker.sock /var/run/docker.pid /etc/docker /etc/crio /var/log/docker /var/log/lxc /var/lock/lxc /usr/lib/systemd/system/docker.service /usr/lib/systemd/system/docker-containerd.service /usr/lib/systemd/system/docker-latest.service /usr/lib/systemd/system/docker-latest-containerd.service /etc/docker /usr/libexec/docker* &> /dev/null || : if [ $1 -eq 1 ]; then restorecon -R /var/lib/docker &> /dev/null || : fi fi . /etc/selinux/config sed -e "\|container_file_t|h; \${x;s|container_file_t||;{g;t};a\\" -e "container_file_t" -e "}" -i /etc/selinux/${SELINUXTYPE}/contexts/customizable_types matchpathcon -qV /var/lib/containers || restorecon -R /var/lib/containers &> /dev/null || :if [ $1 -eq 0 ]; then /usr/sbin/semodule -n -r container docker &> /dev/null || : if /usr/sbin/selinuxenabled ; then /usr/sbin/load_policy /usr/sbin/restorecon -R /usr/bin/*podman* /usr/bin/*runc* /usr/bin/*crio /usr/bin/docker* /var/run/containerd.sock /var/run/docker.sock /var/run/docker.pid /etc/docker /etc/crio /var/log/docker /var/log/lxc /var/lock/lxc /usr/lib/systemd/system/docker.service /usr/lib/systemd/system/docker-containerd.service /usr/lib/systemd/system/docker-latest.service /usr/lib/systemd/system/docker-latest-containerd.service /etc/docker /usr/libexec/docker* &> /dev/null || : fi fi #define license tag if not already defined&G=YA큤AAA큤A큤]HF]]HF]HF]HF]]HF]HF093be781f9916163b4f01d3f7edd672d735d3d8347b5aa643cfa3c58057c6d5d8491a1d23bc4df52b6735a5d3c52f1148999a8108d02557774495e4cc87beca036f6566a08b292c96be1bd93bf7f15cf714fa799e9570145c2ecf4eaeadef8a1rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootcontainer-selinux-2.107-1.el7_6.src.rpmcontainer-selinuxdocker-engine-selinuxdocker-selinux        /bin/sh/bin/shlibselinux-utilspolicycoreutilspolicycoreutils-pythonrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)sedselinux-policyselinux-policy-baseselinux-policy-targetedrpmlib(PayloadIsXz)2.5-113.0.4-14.6.0-14.0-13.13.1-216.el73.13.1-216.el73.13.1-216.el75.2-14.11.3]@\@\N\w@\4[k@[@[[@[[Xf@[L[K7@["X[@[@[[[Z@Z?ZZZ%Z%Z@Z - 2:2.107-1Lokesh Mandvekar - 2:2.99-1Frantisek Kluknavsky - 2:2.95-2Frantisek Kluknavsky - 2:2.84-2Frantisek Kluknavsky - 2.77-1Dan Walsh - 2.76-1Dan Walsh - 2.74-1Frantisek Kluknavsky - 2:2.73-3Frantisek Kluknavsky - 2:2.73-2Dan Walsh - 2.69-3Dan Walsh - 2.69-2Dan Walsh - 2.68-1Dan Walsh - 2.67-1Dan Walsh - 2.66-1Dan Walsh - 2.64-1Dan Walsh - 2.62-1Dan Walsh - 2.61-1Dan Walsh - 2.60-1Dan Walsh - 2.58-2Dan Walsh - 2.58-1Dan Walsh - 2.57-1Dan Walsh - 2.56-1Dan Walsh - 2.55-1Dan Walsh - 2.52-1Dan Walsh - 2.51-1Dan Walsh - 2.50-1Dan Walsh - 2.49-1Dan Walsh - 2.48-1Dan Walsh - 2.41-1Dan Walsh - 2.40-1Dan Walsh - 2.39-1Dan Walsh - 2.38-1Dan Walsh - 2.37-1Dan Walsh - 2.36-1Dan Walsh - 2.35-1Dan Walsh - 2.34-1Dan Walsh - 2.33-1Dan Walsh - 2.32-1Dan Walsh - 2.31-1Dan Walsh - 2.29-1Dan Walsh - 2.28-1Dan Walsh - 2.27-1Dan Walsh - 2.24-1Dan Walsh - 2.23-1Dan Walsh - 2.22-1Troy Dawson - 2.21-3Fedora Release Engineering - 2:2.21-2Dan Walsh - 2.21-1Dan Walsh - 2.20-2Dan Walsh - 2.20-1Lokesh Mandvekar - 2:2.19-2.1Dan Walsh - 2:2.19-1Lokesh Mandvekar - 2:2.15-1.1Dan Walsh - 2:2.10-2.1Dan Walsh - 2:2.10-1Lokesh Mandvekar - 2:2.9-4Lokesh Mandvekar - 2:2.9-3Lokesh Mandvekar - 2:2.9-2Lokesh Mandvekar - 2:2.8-2Lokesh Mandvekar - 2:2.7-1Lokesh Mandvekar - 2:2.4-2Dan Walsh - 2:2.4-1Dan Walsh - 2:2.3-1Lokesh Mandvekar - 2:2.2-4Jonathan Lebon - 2:2.2-3Lokesh Mandvekar - 2:2.2-2Lokesh Mandvekar - 2:2.2-1Lokesh Mandvekar - 2:2.0-2Lokesh Mandvekar - 2:2.0-1Lokesh Mandvekar - 2:1.12.4-29- bump to v2.107- built commit b13d03b- rebase- rebase- backported fixes from upstream- Allow containers to use fuse file systems by default - Allow containers to sendto dgram socket of container runtimes - Needed to run container runtimes in notify socket unit files.- Allow containers to setexec themselves- tweak macro for fedora - applies to rhel8 as well- moved changelog entries: - Define spc_t as a container_domain, so that container_runtime will transition to spc_t even when setup with nosuid. - Allow container_runtimes to setattr on callers fifo_files - Fix restorecon to not error on missing directory- Make sure we pull in the latest selinux-policy- Add map support to container-selinux for RHEL 7.5 - Dontudit attempts to write to kernel_sysctl_t- Add label for /var/lib/origin - Add customizable_file_t to customizable_types- Add policy for container_logreader_t- Allow dnsmasq to dbus chat with spc_t- Allow containers to create all socket classes- Label overlay directories under /var/lib/containers/ correctly- Allow spc_t to load kernel modules from inside of container- Allow containers to list cgroup directories - Transition for unconfined_service_t to container_runtime_t when executing container_runtime_exec_t.- Run restorecon /usr/bin/podman in postinstall- Add labels to allow podman to be run from a systemd unit file- Set the version of SELinux policy required to the latest to fix build issues.- Allow container_runtime_t to transition to spc_t over unlabeled filesAllow iptables to read container state Dontaudit attempts from containers to write to /proc/self Allow spc_t to change attributes on container_runtime_t fifo files- Add better support for writing custom selinux policy for customer container domains.- Allow shell_exec_t as a container_runtime_t entrypoint- Allow bin_t as a container_runtime_t entrypoint- Add support for MLS running container runtimes - Add missing allow rules for running systemd in a container- Update policy to match master branch - Remove typebounds and replace with nnp_transition and nosuid_transition calls- Add support to nnp_transition for container domains - Eliminates need for typebounds.- Allow container_runtime_t to use user ttys - Fixes bounds check for container_t- Allow container runtimes to use interited terminals. This helps satisfy the bounds check of container_t versus container_runtime_t.- Allow container runtimes to mmap container_file_t devices - Add labeling for rhel push plugin- Allow containers to use inherited ttys - Allow ostree to handle labels under /var/lib/containers/ostree- Allow containers to relabelto/from all file types to container_file_t- Allow container to map chr_files labeled container_file_t- Dontaudit container processes getattr on kernel file systems- Allow containers to read /etc/resolv.conf and /etc/hosts if volume - mounted into container.- Make sure users creating content in /var/lib with right labels- Allow the container runtime to dbus chat with dnsmasq - add dontaudit rules for container trying to write to /proc- Add support for lxcd - Add support for labeling of tmpfs storage created within a container.- Allow a container to umount a container_file_t filesystem- Allow container runtimes to work with the netfilter sockets - Allow container_file_t to be an entrypoint for VM's - Allow spc_t domains to transition to svirt_t- Make sure container_runtime_t has all access of container_t- Allow container runtimes to create sockets in tmp dirs- Add additonal support for crio labeling.- Fixup spec file conditionals- Rebuilt for https://fedoraproject.org/wiki/Fedora_27_Mass_Rebuild- Allow containers to execmod on container_share_t files.- Relabel runc and crio executables- Allow container processes to getsession- update release tag to isolate from 7.3- Fix mcs transition problem on stdin/stdout/stderr - Add labels for CRI-O - Allow containers to use tunnel sockets- Resolves: #1451289 - rebase to v2.15 - built @origin/RHEL-1.12 commit 583ca40- Make sure we have a late enough version of policycoreutils- Update to the latest container-selinux patch from upstream - Label files under /usr/libexec/lxc as container_runtime_exec_t - Give container_t access to XFRM sockets - Allow spc_t to dbus chat with init system - Allow containers to read cgroup configuration mounted into a container- Resolves: #1425574 - built commit 79a6d70- Resolves: #1420591 - built @origin/RHEL-1.12 commit 8f876c4- built @origin/RHEL-1.12 commit 33cb78b-- built origin/RHEL-1.12 commit 21dd37b- correct version-release in changelog entries- Add typebounds statement for container_t from container_runtime_t - We should only label runc not runc*- Fix labeling on /usr/bin/runc.* - Add sandbox_net_domain access to container.te - Remove containers ability to look at /etc content- use upstream's RHEL-1.12 branch, commit 56c32da for CentOS 7- properly disable docker module in %post- depend on selinux-policy-targeted - relabel docker-latest* files as well- bump to v2.2 - additional labeling for ocid- install policy at level 200 - From: Dan Walsh - Resolves: #1406517 - bump to v2.0 (first upload to Fedora as a standalone package) - include projectatomic/RHEL-1.12 branch commit for building on centos/rhel- new package (separated from docker)/bin/sh/bin/shcontainer-selinuxdocker-selinux2:2.107-1.el7_62:2.107-1.el7_62:2.107-1.el7_6 2:1.12.5-142:1.12.4-28container-selinux-2.107README.mddevelincludeservicescontainer.ifpackagescontainer.pp.bz2/usr/share/doc//usr/share/doc/container-selinux-2.107//usr/share/selinux//usr/share/selinux/devel//usr/share/selinux/devel/include//usr/share/selinux/devel/include/services//usr/share/selinux/packages/-O2 -g -pipe -Wall -Wp,-D_FORTIFY_SOURCE=2 -fexceptions -fstack-protector-strong --param=ssp-buffer-size=4 -grecord-gcc-switches -m32 -march=x86-64 -mtune=generic -mfpmath=sse -fasynchronous-unwind-tablesdrpmxz2noarch-redhat-linux-gnudirectoryASCII text?7zXZ !#,d+\S]"k%xĉNμ5#+mz q{@gPȃFG=uǝ<%Пv!8)级}J58챤G:ݚwv *T@aOͪ9%-td\#:'Pյ gG*<./ܗs2s0Ak1UoH Ҟ*;󁨠D/ޅU$[l*3yo=qTy8Ru}n}mПYOȡJ6*pd YoM(H \N^G8;-{Y16tޛWb¶ a] 'eJ*6 ȡaWRtl` G>@VHyT8$zQC6Ls'~lhe>Ku*Ì jHW3L6^8=2YZП@.l|Om+=)/}/"I,{w*c|ŤZwvv4D$`^i4)_޺벳#θ0g|f2(N[-uT߉S ||\.I 9LI)[4%yD ~,0qg"6TFv?]&uNjgKyZUJ=lJ>\ "Ķ88xVsc(5Ƌ ~y&iۍ:%hXŴmNa*еQF$ltB Em;C.n΍E$w8l%5yvٟ">?LOB8#֓ӜыxbӅVZܨ[qZt+p|M~40&]birƬka"ڐ^؄;M/uCnVY8+i_ž=ˍ(첢JX-k !Q yeoNxr鴦s wy/n~À 9MT6%1+=A*ucN.XrUkhM )$Ǡ PfřĐzS0%jSo_F4'-SەW1D%?*9),W!墶~/o-v#!iL<0]ﳂj#نߩ$-a:̽Gr+ ۱h2^l{(Xl ޘ aU;UH梹B͂kn"# 16QsK\׉Ƥ+N[9YJ[aYX RC \aS5ԐDZFzپlNAPN ^xFWFsbp\ښZs[vwx#A]w$2Y[Z:Ac/ Ɂ]px'|C/}M㬓CYVW_h|D gΡw@Qx܄k*b~BgW_I"ܙ5i\F.+Q[:nqGP7;k`Ԉ,=EX_GQ/D@6 SLMWzC *5QrJLZkbMih\(?Pk[v՚1w_+)zJ]a.#@RP nMJy>9qI0֫(^P%tAͱZrU+/틐nU9S^JۚvL̜jWκEtpy4&[8?\̭jTܿDfD\ǽ^t٤VB:+z!dF,U9KT_ %[NӞLlԻH[Ҽ-ls\0.f ʆ߀uamfOGY)ٌIК_%no0`NEW3JGH"CC}ok0_AR@0N@bB.@<"M+/ F,4HjtEsnM4Q_*p⥷8"JoR" 2+Cx-͘P5Gh[e$;ybX\P e!KZB Ϗrc@!"3:6&egݓS#:dJ`j{u9W$l)>+ ͷ]#*q~!@u`b-;Q*ۙwsК8 R-Cc$c SmU=EL&H Z3~Ӊֱ"$X$t. Ω&un? R>ӏbQL|(K f;BްCa}H-})F;p~YY݉z jv/% 7Ύ~aZz5tKtxܘը66U>R.-G^qz`܊L;ל9B6:RH4-S]X./Ptѐanz^M aX}|dտLwYB{jroEh4ݪxEФܫ@8yIvI"+_P2UXn*lF 'Ou) ƋL[̲W8?*\%$9tq#~86-5-x>=uJ4鸍>(Ez|B)m,j2 5O`X slI%#A>b28iGLC-q7K] x8w.#i/0čwARV{|RCНPWWLnF\- vEf2AytذR7 G >fHz+/ҡﶫxO뚉AFQ w-(Fɻm0٭nnglQNQ8ad`LRΡA OIPQKT#|Үid8D]A@tN0>dZCϒ8iPMEpIx7Wǁv.k>;r|kAŏ^Q"UmqV 7[W׏І%=G@)Gj.ᤷB,B#Tzҵ+[qP)dU*Tܝ7;8?e/Ŗ?׸NTF(Erl^617zWCEPÿvO&`@$ݘܩ@#"WZfO|/ u ws̈U9es3كBk9`Z>O?r ׁ0TYÝ]@邒C2;+Mdp鰫"Rn^?xG ֗?m#Fpz&CM?0b3㟽I*sj_jsV&tu+% <.1-} ǒ;Y6a1kգ! FN׻]ٻoK QY_+{ u6xUdTQgxR74k"*J ? Se AkF{Zm!ECSVf>&>"X} eZV%2}{6YlssC0&ꟶ89x!ꮌ!ȸBI 9e`D[d,Nf.a~O=vij#O*qB,#?R.g sei_̤=>;J_1Dj^$F/Bfi;.GF2ʳ@b,9l_MԢSgoFYPLFQ"/6>4NJ 3H kƣV] Avam5kgk>Rșds@=|cqNg].1 &ozD}L's2Djz|0?Csz憴{P'Q!p7a9x."$3˒Ð5HW>+GT%7 l7oτ&y$u=9&kBT[٧Hgh3-}D@PdrA4y/ќ<`~6VswA-SËg$6Ub@R#J>G*Q O'<͒5Td8ǍrTHT+wQ"fE9 W ZvGWBEMpl S@n@Oԁo$f-D2O"jw0}у]$7#ǃdFj`<;strǏ+@J6 Nj#? :̴و|ʬ[.%vZFP>kS)8:!'VEy*4hϻQncmܗi#"X..L mZro@R%wٲ0UDQnq䵇/*iϖw\ |_ qhdO?Cr s;==mMle>dC̷a]^Lx_<ŴOt_\^ ~` E`+֯U>4ҡx@AkЩ9/e$Nӊ.-uBU"$X3l+A\=}S>Ik#ݯlL1a(,GOj,EEjk"ӯ@u~7+-Q̄cBZQR9fӌ)C8T*n&/n_fzq3 hfqZS҇C"||$f)S$jqڇu(sz\;@]`Ǫ.ssv¢"FsLqmQ)SƄYe?#oR!/C483Mlj^'OCy х}'cKl#)ҙN?T\&*hZ7mVMo5;>!+ԝ1_' ֠^jd6=Km/"7'ʉ 1]3l$*41 Js/ډLS@Ms<* Ӕ- ]ZkT*y`sF< j~Kn59-(9^1h]8=P_AcZ;|}0KҮDT1B]f- VIsnE&\ 1-P [%e^ ?b gO(઩¡*V< jf%}vH3'G~j$D?Z!#x#  ԜH=܊hDGk-9[lWǺ=5}uDN" K<6gGD#>Uq7)uSEܵFZla4f3||/a:@[bxI49@'J;E.[q>ڧ=.ʥ24z. I|_:m?1_= r[M¹k@Ll4L޾I^sa M9nU8`> 0BH?)S$=O9'"65#\!]D>4#Ӕl>#`;RΐqiO;_vsmVm ȜRC#[񛈩{G.Vcv~SUb0 #Zޔ\ylQ&p il3UJ|q*aD1ݍn1>;FA'q hB$ߞvʒ-pb.M|i|s"Jw23x0D-4I6[W +.!nwr%֚:Y6̦ўY aGcr:d.Z$p26fpf b>(OUu{ɯi*#bcdӴewkߗزc\sݨU_3eh+e'cjBz^`.voL+7Nk!}ACuLoTm-[j)])*auOR/n8#FgSgy&T'?F(HAHS8"KuDW7M;\5Dѯƃ,!)բuUOfS_7GOXhnMK22Uw^^&M8'#t`->-#mzz*{i*Js'I)c[r&GSVe71K& }%;ײ':5@ߓp /+?mN4!2a^:Uh0/L;]~|jᗆ1NB)n'vb`jnrsH*4z+N8!WXU(9 m=>2x,h-k봬K1OHS@i-̊![EeWl(IoPiW-}pMXg@rEjN-2usr7 eԢh#Ҝ)tI>y'ծxnF0=˳ђwpK-$Hv&U{Z UJA-(WXY+ d3~qy[+>6*R*lHRMzH9|8Ȅ/dtC\+OɾMq$. Y}p,  45s\'ov1?`.)}D`A(r7?'^,D*nO~V܌TLר ƀFb=~UAz$ ,wkWj1iTʹ*[$dΦ'J*KmR jђhcw2S`"וϠ HLۺ.,lŹIRT'0{rUv/1Rߙ_sFz ̊g訍zrp @]xx ZBE^·i! 癮۞"|@"ĹJKʄXyȓ0^ ]o&xpږudz52l!3{oL%i\rpo*)f:[ع2d@sU._tǕz%Xn T'>T}s-B.6NVEIT鋙{|X !ØIRyj7F仑0Cnk|I%ax (˘Ȭ3g|>{;,n4J?3,͒c,#^?D'|r:lӧǂE_|ʷxaqTcūG!`<>;y",uaDx /3]\\@\oîeg"M3;:9"c4l;mC;%aGWx;BE:epG7NLk8 ɳZٿk͎4 PӢ-/BXu`+HK~MtO;mP $Z/)p*h2G¬4DI!1qϐutѶu{ efD\ѲI4󍶟 hwԊIO0KڏTrzi+f-Sʓ*qD"āyi;*h7ܑU%512}>M..) . *ga9xHV8YӔK&4 ?fN&xEI4NxyM3{AE*=3re1mTghH/`Z/0iU-dSMyo'6c\.Z"jZn%IRa/Wlhc) UvAKu]ʃ%GB;CRfHGK%ꟶ#=wζ64D󉦜u+C=5q+ޔaO65r4g2fE*AǙV'Tͼi {<:&%,|vXBݳ `/l7jcZȺȨӌJStD0MFQá:aw {,t4c Π-*S@貍9zi6FC |̳/ĥ`U|9}'QlE 4)3 C? c``/Ubc,Q&ڼyօLn--[=PNΐ$u Ay\)#nPffLJcR q}4 !d0vxߊVtac-^*[// ) ca S6?W4 Uź7F3f'hg %s sK8ʾP|5 uQB3lZ,2 i?HQx@YwYזoyDx֡$n{ldIq(,K%`Rn[';y#bEh YN6YwǁFY g nAHQxЋ!P/ktP{Ug˰Sb4c[}"z04 I2eF-(D8Mp4FcʶA2P#iJoMPʖ0}-!OqjC+ڏ%}ӝ_a_n+F~̣3Q%ԦUBρpC׃d ~Ǵ?!U!| h'h& ~L%:A}k*b2-6 ?gcUH8ׇ>A܎Eˢԧ}4G74īOȽ49õ7m"MMD,צ'g6U?)7m=!4pQT75\Q C/Qv(xit4 K.Hྯe9ؾ:n%`x^ m߹auZqQCf4Tؠ%SmWG &8qY\<`>Le N5P4ҡ׽ ˗)!&w&BgCwv.hEwJbabk^ӨOc՛عA鬁<o@0|+ϰ]]4\![ RCJ >n dHA0h}M7e Q_m>_ 33!7}M*4Q?WJ7CެmWņk9qy }q*{+kZ&©wM#TS':C rķ˧"DaKVV>;f[淈f n:L3VIUd &!ÐUߝ˕i (d8ti'o,b " rp2OH^ AS{i'{K &d'C"Al99Џ$l*)hgdEh옙pIc~j,A|y窆Ue9t5EW G`7t f['q,Te ; ?5x9;/`C zGMe&W611:@s骟 `sӞ"KXS:2R`3ɡӘyfpKGMઔj9Vζl0x%Dg&o!_G$Z BI[bxHۚ|yXCߍTߝ)zpXe5u(!!$9y%VjQ]O2L^|O ,-B:}%03vko_ɱxv8i*L+{ ##Kp: ]=X .ne3ci{> z+Za-0`Ml$%TA-Z4 @H7bDnGW] XvA!|`?c$s;vt-Ve ɷ;dꇵul$?o#Ecǧ< s HuףDmol}~7B?azK!pv[- CƱ>/)DtpV7asY ` Mi7iĄAX]m;FDwʄ:n Sc  |Ê7:mQtMZ@e8-.]OHl#:ʠ>UPjA~Sln>f@'aeCɱ@HG$'S`_`u֐52 9݇}l4e!3^RޏQc8ͥ)B"+R{X뢾o>eY}V}MPHTQ>5-@G~B-o{%r.o&5;:oSK'-=C t?^G{\fE%r5,"aq2ޯ02VX ?ӹgr}wst|SA!/ :/C׮懰މUcN.8'k)H}RnTh X;z'u 5rlN8UNGVg%+g tm)3R {Ex:̦%{[O m{ +* ;ҥyLb1Fz =7_Nǒhb&M u=겻0̒Tc0ql\oO%;&\#Y|[IMyB+ {nn@7fDmҌ5H6h뚓o,+Ner0e`b@bva9Y}$Xfe.Wz u+e+`cޗHQKڑw%IqV.nA湴A,l`SH'7sjXD/>Ii͔E`ZOmň[VƝ"xÁ=|h?I;P|ɺ󯀻UZ|97VWt]@Jp=QeQQFyfn x wxm`+K]RJ7-x :CO<`#u,8 b1Eco7Y( ɨ0`vǀAA1E(:bh1XNgz"`+Mpb?=Y5D!nժc2,_eDDϢJ- P [4,GquIzvwi>Z^i7ƬK|oi12 4H;mIꈈtSgKX @UH7uQoa$܌jп0]B?krj)¢0  {ԍp.2*r0~xEa]ׁ$G[ kBnxG:< 1_Le^BbMoA>v5!CL,T/_Wƒ*v25޹u5Vf}uR 5eiX`fޡsHvϐ؝1,K9|ꀛM#߾ΪA^"yE1E N)f5LCZqIȴm!AriLF"bz9C4ϻ&J?n5&r?SNyc ҅~PɖhZ\-^M_lt"AD8ÐP%YbI (.W{1|aib'Q$ڜ`!Ζq j5IL3bCD;\aB5f5C Zo4Q5|VD\x1d؝7aSt8J™H)X%vlo3w_ 6n@cYt5nmR+(|cیʗ, 7;$'Uzrj^HB3cFIh]7^U&U3]+죶GR5ϦUxPSB6yVWG/NDYT\ 7wJfnɸzytzh5T&d Eɥ@g.Y8*JLX) AЗ@v]gׇ+[0m {AzZѦUZ*CehΆʃXXkI7Y(A%9Xez**ZRf{^l;`~MT8Y8!F{%Ba% Qs Î"O1csݟ# vF>XUnenZ W~댺{GEz=L,v+t@ۈm4cG jU*ۙ);2" ibuY wYurT0WOjR-N'/iyEjM^}KJ2"uUO+UΊNq$}!*Hĩ6WPXUvՖp(f6dgy|Ipx*{*օߔf4~hR~ ~3隇_5N GP>\4gB;N86 Aw֙< UW*fa !XuwޗQ/ 6{vCWq1D\ .eOް/R&؀g g_ 8YK'XQgJd%#2H3sTÊ^~3+/o@h*:}ܣ"n:װ3]aBy zϽd3G3S LHqc㎏ΐXŗx'#MU*q2dJ':'@OEyyp`1h 8n`to3\2`ZVog'lcyL9c2[HJ@1T9͠8Q:| S#ȝ{<adwaNͬ'Q!ZCv .\Ҹ ~}L:?Tʶu Ig:s&iÃ"haIhFO+l<()5.ȇD3lxWw0Rh{FyT16$v (c'S"y}cu1@M?aWR}Tjp"ʴMg9q;?ƜGOȘ  CBW邃:.V -QQׅHR'<[B jA}p*ʏԬM?$;Q%ݖʨ\쓛;1r(.ͅ|B1>l{߾`X݇'r\XxydZ YB7E\XϤ}Zf<:MOO6|(O MVO0Vy -WQ uDsHwkyrqœ`>\$Ѐpϫ$ sb{~&J IK6}ߎc<Wy8N敷TL[]ڮ;~LHgrU^BP+wcf+ MX` ARsfx~ EfPNQl=s%hIL+IrAamMh=D:9iU,I#< NC^^/~!<׌ rE+շ㡘:A_2Y.Z]K0V4cCut^OE!ɩdd+g XntXi,fDž[n6agRGꊬ<.WncˑCt3M0h^LӰP4>g~C#[q3gc67eFwsgRo&JŸ =_gw gyT|n8OBWFZ< y%hp-wv8uᳲ&BP]89Ed$3exFZS7 8TU bU8YQE%A'=W)n5`Pqd^ ɥsY)'e{_R90"rfԋ %[CǛbިp~5|tSN|ʍhS-L2NFs洴{W;TfYfʥdodɞ?;9fX 0~0Ҙ Z/ƊmעYdͅaVlg)ĦNu)A=n16Nl^i< KC܉fGwcdb &F"nCGS,f to43Q8SfQwW)eha2{ .Q'ryCEpzi"P*7վB48oBK1]MTsJ&>c^HE77&/J$q-2 "H@U7a7buL*U/MHrjDY|NFxѹa {S"<+뾕Pky4aCثcd.K7$:G MÍ]}H&Tga 8tLV>CփNy|^P޲ٍqJ0O/!{`u΋ڗ&<37յ%y)/E0DW)P9I^ ݆H5; %o,qN?8PU5[UUv\ ^R}.LJASKOxOLۘ6%~6^83 _5-[%S h*5  NӈH(tɷR'ߋtAl:-{gHJ7}VmL?jĻ~S/3q jzScS=Pځ&ﵥ>HO! KEZūH_56[aWuAxvD03]-"Է%C\S=AU LajxdQ-6aA}4KUz/moܼ~#Ts 53~q}eձ$cgi3ik>ЄȀ/ocX-!HF\+m4J!a%~B-Қ."w:[)6P $}[Tg.H]L*/c? Yi4 YZ