postgresql96-test-9.6.19-lp152.2.3.1<>, _6R/=„giF.NHm JvA?BGەB!²7BeW~WodJbbR^ÌirǍڠ vU$IF╙"pl[>j?jtd ' E# <[w}   ,  y {,iR|X(8696:6F%G%H,PI2X4<Y4H\4]:^QbR@cRdSeSfSlSuSvZ w]xcdyizjj$j(j.jpCpostgresql96-test9.6.19lp152.2.3.1The test suite for PostgreSQLThis package contains the sources and pre-built binaries of various tests for the PostgreSQL database management system, including regression tests and benchmarks._6Rbuild74w0openSUSE Leap 15.2openSUSEPostgreSQLhttp://bugs.opensuse.orgProductivity/Databases/Servershttps://www.postgresql.org/linuxi586%&-l#XOX O3P;W T@T~TܕTԬT@TY@Reinhard Max Reinhard Max Reinhard Max Marcus Rueckert Lars Vogdt Marcus Rueckert Marcus Rueckert Reinhard Max Martin Liška Marcus Rueckert Reinhard Max Reinhard Max Reinhard Max Reinhard Max Marcus Rueckert max@suse.commax@suse.commrueckert@suse.demax@suse.commrueckert@suse.demrueckert@suse.demax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commrueckert@suse.demrueckert@suse.dedimstar@opensuse.orgmax@suse.comastieger@suse.commrueckert@suse.de13ilya@gmail.commax@suse.commrueckert@suse.defweiss@suse.commrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demrueckert@suse.demax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commax@suse.commrueckert@suse.dedarin@darins.netdarin@darins.netdarin@darins.net- update to 9.6.19: * CVE-2020-14350, bsc#1175194: Make contrib modules' installation scripts more secure. * https://www.postgresql.org/docs/9.6/release-9-6-19.html - Remove postgresql-regress.patch, it does not apply anymore and it does not seem to be needed anymore. - Pack the /usr/lib/postgresql symlink only into the main package.- Let postgresqlXX conflict with postgresql-noarch < 12.0.1 to get a clean and complete cutover to the new packaging schema.- update to 9.6.18 (bsc#1171924). https://www.postgresql.org/about/news/2038/ https://www.postgresql.org/docs/9.6/release-9-6-18.html - Unify the spec file to work across all current PostgreSQL versions to simplify future maintenance. - Move from the "libs" build flavour to a "mini" package that will only be used inside the build service and not get shipped, to avoid confusion with the debuginfo packages (bsc#1148643).- update to 9.6.17 (CVE-2020-1720, bsc#1163985) https://www.postgresql.org/about/news/2011/ https://www.postgresql.org/docs/9.6/release-9-6-17.html- use and package the sha256 checksum for for source- update to 9.6.16: https://www.postgresql.org/about/news/1994/ https://www.postgresql.org/docs/9.6/release-9-6-16.html- add requires to the devel package for the libs that are returned by pg_config --libs- Update to 9.6.15: * https://www.postgresql.org/about/news/1960/ * https://www.postgresql.org/docs/9.6/release-9-6-15.html * CVE-2019-10208, bsc#1145092: TYPE in pg_temp executes arbitrary SQL during SECURITY DEFINER execution.- Use FAT LTO objects in order to provide proper static library.- Update to 9.6.14: https://www.postgresql.org/docs/9.6/release-9-6-14.html- Update to 9.6.13: * https://www.postgresql.org/docs/9.6/release-9-6-13.html * https://www.postgresql.org/about/news/1939/ * CVE-2019-10130, bsc#1134689: Prevent row-level security policies from being bypassed via selectivity estimators.- Make the server-devel package exclusive across versions.- Update to 9.6.12: * https://www.postgresql.org/docs/9.6/release-9-6-12.html * https://www.postgresql.org/about/news/1920/ * By default, panic instead of retrying after fsync() failure, to avoid possible data corruption. * Numerous other bug fixes. - Overhaul README.SUSE- Update to 9.6.11: * Numerous bug fixes, see the release notes: https://www.postgresql.org/docs/9.6/release-9-6-11.html * Remove unneeded library dependencies from PGXS.- add provides for the new server-devel package that will be introduced in postgresql 11- Update to 9.6.10: https://www.postgresql.org/docs/current/static/release-9-6-10.html * CVE-2018-10915, bsc#1104199: Fix failure to reset libpq's state fully between connection attempts. * CVE-2018-10925, bsc#1104202: Fix INSERT ... ON CONFLICT UPDATE through a view that isn't just SELECT * FROM ...- Update to 9.6.9: https://www.postgresql.org/about/news/1851/ https://www.postgresql.org/docs/current/static/release-9-6-9.html A dump/restore is not required for those running 9.6.X. However, if you use the adminpack extension, you should update it as per the first changelog entry below. Also, if the function marking mistakes mentioned in the second and third changelog entries below affect you, you will want to take steps to correct your database catalogs. * CVE-2018-1115, bsc#1091610: Remove public execute privilege from contrib/adminpack's pg_logfile_rotate() function pg_logfile_rotate() is a deprecated wrapper for the core function pg_rotate_logfile(). When that function was changed to rely on SQL privileges for access control rather than a hard-coded superuser check, pg_logfile_rotate() should have been updated as well, but the need for this was missed. Hence, if adminpack is installed, any user could request a logfile rotation, creating a minor security issue. After installing this update, administrators should update adminpack by performing ALTER EXTENSION adminpack UPDATE in each database in which adminpack is installed. * Fix incorrect volatility markings on a few built-in functions * Fix incorrect parallel-safety markings on a few built-in functions.- Update to PostgreSQL 9.6.8 * https://www.postgresql.org/docs/9.6/static/release-9-6-8.html A dump/restore is not required for those running 9.6.X. However, if you run an installation in which not all users are mutually trusting, or if you maintain an application or extension that is intended for use in arbitrary situations, it is strongly recommended that you read the documentation changes described in the first changelog entry in the link above, and take suitable steps to ensure that your installation or code is secure. Also, the changes described in the second changelog entry in the link above may cause functions used in index expressions or materialized views to fail during auto-analyze, or when reloading from a dump. After upgrading, monitor the server logs for such problems, and fix affected functions. * CVE-2018-1058 bsc#1081925 Uncontrolled search path element in pg_dump and other client applications- Update to PostgreSQL 9.6.7 * https://www.postgresql.org/docs/9.6/static/release-9-6-7.html * CVE-2018-1053, bsc#1077983: Ensure that all temporary files made by pg_upgrade are non-world-readable. * bsc#1079757: Rename pg_rewind's copy_file_range function to avoid conflict with new Linux system call of that name. - Don't %config the symlinks to /etc/alternatives to avoid rpmlint warnings.- Update to version 9.6.6: * https://www.postgresql.org/docs/9.6/static/release-9-6-6.html * Security Issues - CVE-2017-15098, bsc#1067844: Memory disclosure in JSON functions - CVE-2017-15099, bsc#1067841: INSERT ... ON CONFLICT DO UPDATE fails to enforce SELECT privileges Prior to this release, the "INSERT ... ON CONFLICT DO UPDATE" would not check to see if the executing user had permission to perform a "SELECT" on the index performing the conflicting check. Additionally, in a table with row-level security enabled, the "INSERT ... ON CONFLICT DO UPDATE" would not check the SELECT policies for that table before performing the update. This fix ensures that "INSERT ... ON CONFLICT DO UPDATE" checks against table permissions and RLS policies before executing.- port /usr/share/postgresql/install-alternatives usage to the new scheme- Simplify the set of local RPM macros. - Use /usr/share/postgresql/install-alternatives in the respective scriptlets. - Fix the logic around restart on upgrade and stop on removal. We bring the binaries, but we don't own the unit file.- Break a build dependency loop in the server packages that led to bootstrap problems.- Adjust dependencies to the new packaging schema. - Build the libs in 10 rather than 9.6.- Update to version 9.6.5: * https://www.postgresql.org/docs/9.6/static/release-9-6-5.html * Show foreign tables in information_schema.table_privileges view. * Clean up handling of a fatal exit (e.g., due to receipt of SIGTERM) that occurs while trying to execute a ROLLBACK of a failed transaction. * Remove assertion that could trigger during a fatal exit. * Correctly identify columns that are of a range type or domain type over a composite type or domain type being searched for. * Prevent crash when passing fixed-length pass-by-reference data types to parallel worker processe. * Fix crash in pg_restore when using parallel mode and using a list file to select a subset of items to restore. * Change ecpg's parser to allow RETURNING clauses without attached C variables. * Change ecpg's parser to recognize backslash continuation of C preprocessor command lines.- Update to version 9.6.4: * https://www.postgresql.org/docs/9.6/static/release-9-6-4.html * CVE-2017-7547, bsc#1051685: Further restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. * CVE-2017-7546, bsc#1051684: Disallow empty passwords in all password-based authentication methods. * CVE-2017-7548, bsc#1053259: lo_put() function ignores ACLs.- fix building on sle11 by using krb5-devel again- use multibuild- Replace krb5-devel BuildRequires with pkgconfig(krb5): allow OBS to deliver krb5-mini when applicable.- Update to version 9.6.3: * https://www.postgresql.org/docs/9.6/static/release-9-6-3.html * CVE-2017-7486, bsc#1037624: Restrict visibility of pg_user_mappings.umoptions, to protect passwords stored as user mapping options. !!! Manual action is needed to fix this in existing databases !!! See upstream release notes for details. * CVE-2017-7485, bsc#1038293: recognize PGREQUIRESSL variable again. * CVE-2017-7484, bsc#1037603: Prevent exposure of statistical information via leaky operators. * Obsoletes postgresql-9.6.2-fix-timezone-tests.patch - Added "Requires: timezone" to Server Package (bsc#973660) - Submit postgresql96 to SLE-12 (bsc#1038474, fate#321481).- fix tests with timezone 2017a postgresql-9.6.2-fix-timezone-tests.patch- upate to 9.6.2 - Build corruption with CREATE INDEX CONCURRENTLY - Fixes for visibility and write-ahead-log stability For the full release notes, see: https://www.postgresql.org/docs/9.6/static/release-9-6-2.html- update to 9.6.1 This release contains a variety of fixes from 9.6.0. For information about new features in the 9.6 major release. For the full release notes, see: https://www.postgresql.org/docs/9.6/static/release-9-6-1.html- Build the libs in 9.6 rather then 9.5.- update to 9.6.0 final For all the details see: https://www.postgresql.org/about/news/1703/ https://wiki.postgresql.org/wiki/NewIn96 https://www.postgresql.org/docs/current/static/release-9-6.html- Update to 9.6beta4: 9.6 Beta 4 includes the security fixes in the 2016-08-11 Security Update, as well as the general bug fixes offered for stable versions. Additionally, it contains fixes for the following beta issues reported since the last beta: * Change minimum max_worker_processes from 1 to 0 * Make array_to_tsvector() sort and de-duplicate the given strings * Fix ts_delete(tsvector, text[]) to cope with duplicate array entries * Fix hard to hit race condition in heapam's tuple locking code * Prevent "snapshot too old" from trying to return pruned TOAST tuples * Make INSERT-from-multiple-VALUES-rows handle targetlist indirection * Do not let PostmasterContext survive into background workers * Add missing casts in information schema * Fix assorted problems in recovery tests * Block interrupts during HandleParallelMessages() * Remove unused arguments from pg_replication_origin_xact_reset function * Correctly handle owned sequences with extensions * Many fixes for tsqueue.c * Eliminate a few more user-visible "cache lookup failed" errors * Teach parser to transform "x IS [NOT] DISTINCT FROM NULL" to a NullTest * Allow functions that return sets of tuples to return simple NULLs * Repair damage done by citext--1.1--1.2.sql * Correctly set up aggregate FILTER expression in partial-aggregation plans This beta also includes many documentation updates and improvements. Due to changes in system catalogs, a pg_upgrade or pg_dump and restore will be required for users migrating databases from earlier betas. Note that some known issues remain unfixed. Before reporting a bug in the beta, please check the Open Items page.- update to 9.6beta3 - This included many more fixes to parallel query: - adding support for TABLESAMPLE - correcting cost data in Gather nodes - check parallel-safety of all appended relations - fix planner issues with initPlans - fix several issues with client_encoding - clean up EXPLAIN output for parallel queries - multiple changes to parallel aggregation internals - Among the other issues addressed were: - add conninfo field to pg_stat_wal_receiver - clear all-frozen visibilitymap status when locking tuples - correctly dump database and tablespace ACLs - avoid invalidating all foreign-join cached plans when user mappings change - fix nested NOT operation cleanup in tsquery - allow IMPORT FOREIGN SCHEMA within pl/pgsql - print a given subplan only once in EXPLAIN - change the GetForeignUpperPaths API - fix several issues in postgres_fdw - added many additional regression tests - many documentation updates and clarifications - multiple translation updates for the docs Due to changes in system catalogs, a pg_upgrade or dump and restore will be required for users migrating databases from earlier betas. This includes a version update to the pg_control tool, making it incompatible with PostgreSQL 9.4 and earlier. This beta also includes patches to many issues shared with earlier versions, which will be updated in an upcoming minor release. Note that some known issues remain unfixed. Before reporting a bug in the beta, please check the Open Items page.- update to 9.6beta2 Our users and contributors reported bugs against 9.6 beta 1, and some of them have been fixed in this release. This includes multiple fixes for failure and performance issues in parallel query. We urge our community to re-test to ensure that these bugs are actually fixed, including: - update most contrib extensions for parallel query - two fixes for pg_trgm (trigram) bugs - rewrite code to estimate join sizes for better performance - correct handling of argument and result datatypes for partial aggregation - fix lazy_scan_heap so that it won't mark pages all-frozen too soon - mark additional functions as parallel-unsafe - check PlaceHolderVars before pushing down a join in postgres_fdw - improve the situation for parallel query versus temp relations - don't generate parallel paths for rels with parallel-restricted outputs - make psql_crosstab plans more stable - finish loose ends for SQL ACCESS METHOD objects, including pg_dump - stop the executor if no more tuples can be sent from worker to leader - several pg_upgrade fixes to support new features - fix regression tests for phrase search - add new snapshot fields to serialize/deserialize functions - measure Bloom index signature-length reloption in bits, not words - many improvements to parallel regression tests - many documentation updates and clarifications - multiple translation updates for the docs Additionally, we've made some user-visible changes to parameters and functions. These may cause dump/restore between beta 1 and beta 2 to generate errors. This includes: - rename max_parallel_degree to max_parallel_workers_per_gather - add integrity-checking functions to pg_visibility - add VACUUM (DISABLE_PAGE_SKIPPING) for emergencies - add pg_truncate_visibility_map function - add min_parallel_relation_size GUC - change default of backend_flush_after GUC to 0 (disabled) Note that some known issues remain unfixed. Before reporting a bug in the beta, please check the Open Items page.- update to 9.6beta1 - Major Features of 9.6 Version 9.6 includes significant changes and exciting enhancements including: - Parallel sequential scans, joins and aggregates - Support for consistent, read-scaling clusters through multiple synchronous standbys and "remote_apply" synchronous commit. - Full text search for phrases - postgres_fdw can now execute sorts, joins, UPDATEs and DELETEs on the remote server - Decreased autovacuum impact on big tables by avoiding "refreezing" old data. - In particular, parallel execution should bring a noticeable increase in performance to supported queries. - Help Test for Bugs As with other major releases, the improvements in PostgreSQL include changes to large amounts of code. We count on you to test the altered version with your workloads and testing tools in order to find bugs and regressions before the release of PostgreSQL 9.6.0. In addition to testing that the new features work as documented, consider testing the following: - Do parallel queries actually improve performance for you? - Can you make parallel queries crash or lose data? - Do our code changes cause PostgreSQL to not function on your platform? - Does improved vacuum freezing safely reduce autovacuum of large tables? - Does phrase search return the results you expect? Version 9.6 Beta 1 also makes changes to the binary backup API. Administrators should test version 9.6 with PostgreSQL backup tools, including pgBackRest, Barman, WAL-E, and other packaged and in-house software. As this is a Beta, minor changes to database behaviors, feature details, and APIs are still possible. Your feedback and testing will help determine the final tweaks on the new features, so test soon. The quality of user testing helps determine when we can make a final release. http://www.postgresql.org/about/news/1668/ http://www.postgresql.org/docs/devel/static/release-9-6.html - refreshed patches to apply cleanly again: postgresql-plperl-keep-rpath.patch postgresql-testsuite-int8.sql.patch postgresql-testsuite-keep-results-file.patch postgresql-var-run-socket.patch - regress part is disabled atm as it causes a buildfailure - also remove static libraries in pglibdir. This release introduced a new file there called pgfeutils.a- Security and bugfix release 9.5.2: (bnc# 978456) This release closes security hole CVE-2016-2193, where a query plan might get reused for more than one ROLE in the same session. This could cause the wrong set of Row Level Security (RLS) policies to be used for the query. The update also fixes CVE-2016-3065, a server crash bug triggered by using pageinspect with BRIN index pages. Since an attacker might be able to expose a few bytes of server memory, this crash is being treated as a security issue. - Fix two bugs in indexed ROW() comparisons - Avoid data loss due to renaming files - Prevent an error in rechecking rows in SELECT FOR UPDATE/SHARE - Fix bugs in multiple json_ and jsonb_ functions - Log lock waits for INSERT ON CONFLICT correctly - Ignore recovery_min_apply_delay until reaching a consistent state - Fix issue with pg_subtrans XID wraparound - Fix assorted bugs in Logical Decoding - Fix planner error with nested security barrier views - Prevent memory leak in GIN indexes - Fix two issues with ispell dictionaries - Avoid a crash on old Windows versions - Skip creating an erroneous delete script in pg_upgrade - Correctly translate empty arrays into PL/Perl - Make PL/Python cope with identifier names - changes from 9.5.1 (bnc# 966435 bnc# 966436 bnc# 978323) This release closes security hole CVE-2016-0773, an issue with regular expression (regex) parsing. Prior code allowed users to pass in expressions which included out-of-range Unicode characters, triggering a backend crash. This issue is critical for PostgreSQL systems with untrusted users or which generate regexes based on user input. The update also fixes CVE-2016-0766, a privilege escalation issue for users of PL/Java. Certain custom configuration settings (GUCS) for PL/Java will now be modifiable only by the database superuser. In addition to the above, many other issues were patched in this release based on bugs reported by our users over the last few months. This includes multiple fixes for new features introduced in version 9.5.0, as well as refactoring of pg_dump to eliminate a number of chronic issues with backing up EXTENSIONs. Among them are: - Fix many issues in pg_dump with specific object types - Prevent over-eager pushdown of HAVING clauses for GROUPING SETS - Fix deparsing error with ON CONFLICT ... WHERE clauses - Fix tableoid errors for postgres_fdw - Prevent floating-point exceptions in pgbench - Make \det search Foreign Table names consistently - Fix quoting of domain constraint names in pg_dump - Prevent putting expanded objects into Const nodes - Allow compile of PL/Java on Windows - Fix "unresolved symbol" errors in PL/Python execution - Allow Python2 and Python3 to be used in the same database - Add support for Python 3.5 in PL/Python - Fix issue with subdirectory creation during initdb - Make pg_ctl report status correctly on Windows - Suppress confusing error when using pg_receivexlog with older servers - Multiple documentation corrections and additions - Fix erroneous hash calculations in gin_extract_jsonb_path() - This update also contains tzdata release 2016a, with updates for Cayman Islands, Metlakatla, Trans-Baikal Territory (Zabaykalsky Krai), and Pakistan. - changes from 9.5.0 A most-requested feature by application developers for several years, "UPSERT" is shorthand for "INSERT, ON CONFLICT UPDATE", allowing new and updated rows to be treated the same. UPSERT simplifies web and mobile application development by enabling the database to handle conflicts between concurrent data changes. This feature also removes the last significant barrier to migrating legacy MySQL applications to PostgreSQL. Developed over the last two years by Heroku programmer Peter Geoghegan, PostgreSQL's implementation of UPSERT is significantly more flexible and powerful than those offered by other relational databases. The new ON CONFLICT clause permits ignoring the new data, or updating different columns or relations in ways which will support complex ETL (Extract, Transform, Load) toolchains for bulk data loading. And, like all of PostgreSQL, it is designed to be absolutely concurrency-safe and to integrate with all other PostgreSQL features, including Logical Replication. PostgreSQL continues to expand database security capabilities with its new Row Level Security (RLS) feature. RLS implements true per-row and per-column data access control which integrates with external label-based security stacks such as SE Linux. PostgreSQL is already known as "the most secure by default." RLS cements its position as the best choice for applications with strong data security requirements, such as compliance with PCI, the European Data Protection Directive, and healthcare data protection standards. RLS is the culmination of five years of security features added to PostgreSQL, including extensive work by KaiGai Kohei of NEC, Stephen Frost of Crunchy Data, and Dean Rasheed. Through it, database administrators can set security "policies" which filter which rows particular users are allowed to update or view. Data security implemented this way is resistant to SQL injection exploits and other application-level security holes. PostgreSQL 9.5 includes multiple new features for bigger databases, and for integrating with other Big Data systems. These features ensure that PostgreSQL continues to have a strong role in the rapidly growing open source Big Data marketplace. Among them are: BRIN Indexing: This new type of index supports creating tiny, but effective indexes for very large, "naturally ordered" tables. For example, tables containing logging data with billions of rows could be indexed and searched in 5% of the time required by standard BTree indexes. Faster Sorts: PostgreSQL now sorts text and NUMERIC data faster, using an algorithm called "abbreviated keys". This makes some queries which need to sort large amounts of data 2X to 12X faster, and can speed up index creation by 20X. CUBE, ROLLUP and GROUPING SETS: These new standard SQL clauses let users produce reports with multiple levels of summarization in one query instead of requiring several. CUBE will also enable tightly integrating PostgreSQL with more Online Analytic Processing (OLAP) reporting tools such as Tableau. Foreign Data Wrappers (FDWs): These already allow using PostgreSQL as a query engine for other Big Data systems such as Hadoop and Cassandra. Version 9.5 adds IMPORT FOREIGN SCHEMA and JOIN pushdown making query connections to external databases both easier to set up and more efficient. TABLESAMPLE: This SQL clause allows grabbing a quick statistical sample of huge tables, without the need for expensive sorting. "The new BRIN index in PostgreSQL 9.5 is a powerful new feature which enables PostgreSQL to manage and index volumes of data that were impractical or impossible in the past. It allows scalability of data and performance beyond what was considered previously attainable with traditional relational databases and makes PostgreSQL a perfect solution for Big Data analytics," said Boyan Botev, Lead Database Administrator, Premier, Inc. http://www.postgresql.org/about/news/1636/ - For the full release notes, see: http://www.postgresql.org/docs/9.5/static/release-9-5.html http://www.postgresql.org/docs/9.5/static/release-9-5-1.html http://www.postgresql.org/docs/9.5/static/release-9-5-2.html - refreshed patches to match new release postgresql-conf.patch postgresql-plperl-keep-rpath.patch postgresql-regress.patch postgresql-testsuite-keep-results-file.patch postgresql-var-run-socket.patch - drop postgresql-testsuite-seclabel-location.patch: the dummy seclabel test is gone- Security and bugfix release 9.4.7: (bnc# 978456) This release closes security hole CVE-2016-2193, where a query plan might get reused for more than one ROLE in the same session. This could cause the wrong set of Row Level Security (RLS) policies to be used for the query. The update also fixes CVE-2016-3065, a server crash bug triggered by using pageinspect with BRIN index pages. Since an attacker might be able to expose a few bytes of server memory, this crash is being treated as a security issue. - Fix two bugs in indexed ROW() comparisons - Avoid data loss due to renaming files - Prevent an error in rechecking rows in SELECT FOR UPDATE/SHARE - Fix bugs in multiple json_ and jsonb_ functions - Log lock waits for INSERT ON CONFLICT correctly - Ignore recovery_min_apply_delay until reaching a consistent state - Fix issue with pg_subtrans XID wraparound - Fix assorted bugs in Logical Decoding - Fix planner error with nested security barrier views - Prevent memory leak in GIN indexes - Fix two issues with ispell dictionaries - Avoid a crash on old Windows versions - Skip creating an erroneous delete script in pg_upgrade - Correctly translate empty arrays into PL/Perl - Make PL/Python cope with identifier names - For the full release notes, see: http://www.postgresql.org/docs/9.4/static/release-9-4-7.html- Security and bugfix release 9.4.6: * *** IMPORTANT *** Users of version 9.4 will need to reindex any jsonb_path_ops indexes they have created, in order to fix a persistent issue with missing index entries. * Fix infinite loops and buffer-overrun problems in regular expressions (CVE-2016-0773, bsc#966436). * Fix regular-expression compiler to handle loops of constraint arcs (CVE-2007-4772). * Prevent certain PL/Java parameters from being set by non-superusers (CVE-2016-0766, bsc#966435). * Fix many issues in pg_dump with specific object types * Prevent over-eager pushdown of HAVING clauses for GROUPING SETS * Fix deparsing error with ON CONFLICT ... WHERE clauses * Fix tableoid errors for postgres_fdw * Prevent floating-point exceptions in pgbench * Make \det search Foreign Table names consistently * Fix quoting of domain constraint names in pg_dump * Prevent putting expanded objects into Const nodes * Allow compile of PL/Java on Windows * Fix "unresolved symbol" errors in PL/Python execution * Allow Python2 and Python3 to be used in the same database * Add support for Python 3.5 in PL/Python * Fix issue with subdirectory creation during initdb * Make pg_ctl report status correctly on Windows * Suppress confusing error when using pg_receivexlog with older servers * Multiple documentation corrections and additions * Fix erroneous hash calculations in gin_extract_jsonb_path() - For the full release notes, see: http://www.postgresql.org/docs/9.4/static/release-9-4-6.html- PL/Perl still needs to be linked with rpath, so that it can find libperl.so at runtime. bsc#578053, postgresql-plperl-keep-rpath.patch- Security and bugfix release 9.4.5: * CVE-2015-5289, bsc#949670: json or jsonb input values constructed from arbitrary user input can crash the PostgreSQL server and cause a denial of service. * CVE-2015-5288, bsc#949669: The crypt() function included with the optional pgCrypto extension could be exploited to read a few additional bytes of memory. No working exploit for this issue has been developed. - For the full release notse, see: http://www.postgresql.org/docs/current/static/release-9-4-5.html - Move systemd related stuff and user creation to postgresql-init. - Remove some obsolete %suse_version conditionals - Adjust build time dependencies. - Fix some more rpmlint warnings. - Relax dependency on libpq to major version.- Make sure that plpgsql.h gets installed, because pldebugger needs it.- Move ~postgres/.bash_profile to postgresql-server to avoid a file conflict between the versioned server packages.- Bring PostgreSQL 9.4 to SLE12 (fate#319049).- Switch from ossp-uuid to libuuid from e2fsprogs. - Re-enable running the test suite during build. - Bugfix release 9.4.4: * Fix possible failure to recover from an inconsistent database state. * Fix rare failure to invalidate relation cache init file. * Avoid deadlock between incoming sessions and CREATE/DROP DATABASE. * Improve planner's cost estimates for semi-joins and anti-joins with inner indexscans - Bugfix release 9.4.3: * Avoid failures while fsync'ing data directory during crash restart. * Fix pg_get_functiondef() to show functions' LEAKPROOF property, if set. * Fix pushJsonbValue() to unpack jbvBinary objects. - Security and bugfix release 9.4.2: * CVE-2015-3165, bsc#931972: Avoid possible crash when client disconnects just before the authentication timeout expires. * CVE-2015-3166, bsc#931973: Consistently check for failure of the *printf() family of functions. * CVE-2015-3167, bsc#931974: In contrib/pgcrypto, uniformly report decryption failures as "Wrong key or corrupt data". * Protect against wraparound of multixact member IDs. - For the full release notse, see: http://www.postgresql.org/docs/9.4/static/release-9-4-2.html http://www.postgresql.org/docs/9.4/static/release-9-4-3.html http://www.postgresql.org/docs/9.4/static/release-9-4-4.html- Align spec file with 9.3 package. - Require systemd only where available and only for the main package. - bnc#888564: Move the server socket from /tmp to /var/run to avoid problems with clients that use PrivateTmp. postgresql-var-run-socket.patch- Switch over to 9.4 by building the libs package and disable it on 9.3. - Remove obsolete patches: * postgresql-sle10-timestamptz.patch * postgresql-plperl.patch- majorversion should only be 9.4- Update to 9.4.1 * Fix buffer overruns in to_char() * Fix buffer overrun in replacement *printf() functions * Fix buffer overruns in contrib/pgcrypto * Fix possible loss of frontend/backend protocol synchronization after an error * Fix information leak via constraint-violation error messages * Lock down regression testing's temporary installations on Windows * Cope with the Windows locale named "Norwegian (Bokmål)" * Fix use-of-already-freed-memory problem in EvalPlanQual processing * Avoid possible deadlock while trying to acquire tuple locks in EvalPlanQual processing * Improve performance of EXPLAIN with large range tables * Fix jsonb Unicode escape processing, and in consequence disallow \u0000 * Fix namespace handling in xpath() * Fix assorted oversights in range-operator selectivity estimation * Revert unintended reduction in maximum size of a GIN index item * Fix query-duration memory leak during repeated GIN index rescans * Fix possible crash when using nonzero gin_fuzzy_search_limit * Assorted fixes for logical decoding * Fix incorrect replay of WAL parameter change records that report changes in the wal_log_hints setting * Change "pgstat wait timeout" warning message to be LOG level, and rephrase it to be more understandable * Warn if OS X's setlocale() starts an unwanted extra thread inside the postmaster * Fix libpq's behavior when /etc/passwd isn't readable * Improve consistency of parsing of psql's special variables * Fix pg_dump to handle comments on event triggers without failing * Allow parallel pg_dump to use --serializable-deferrable * Prevent WAL files created by pg_basebackup -x/-X from being archived again when the standby is promoted * Handle unexpected query results, especially NULLs, safely in contrib/tablefunc's connectby() * Numerous cleanups of warnings from Coverity static code analyzer * Allow CFLAGS from configure's environment to override automatically-supplied CFLAGS * Make pg_regress remove any temporary installation it created upon successful exit * Add CST (China Standard Time) to our lists of timezone abbreviations * Update time zone data files to tzdata release 2015a for DST law changes in Chile and Mexico, plus historical changes in Iceland.- removed %pgbasedir from contrib and server package- Update to 9.4.0 Major enhancements in PostgreSQL 9.4 include: * Add jsonb, a more capable and efficient data type for storing JSON data * Add new SQL command ALTER SYSTEM for changing postgresql.conf configuration file entries * Reduce lock strength for some ALTER TABLE commands * Allow materialized views to be refreshed without blocking concurrent reads * Add support for logical decoding of WAL data, to allow database changes to be streamed out in a customizable format * Allow background worker processes to be dynamically registered, started and terminated * See release notes for a full list of changes: http://www.postgresql.org/docs/9.4/static/release-9-4.htmlbuild74 1597395639  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~9.6.19-lp152.2.3.19.6.19-lp152.2.3.19.6.19-lp152.2.3.1testregressautoinc.sodataagg.dataarray.dataconstrf.dataconstro.datadept.datadesc.dataemp.datahash.datajsonb.dataonek.dataperson.datareal_city.datarect.datastreets.datastud_emp.datastudent.datatenk.datatsearch.dataexpectedabstime.outadvisory_lock.outaggregates.outalter_generic.outalter_operator.outalter_table.outamutils.outarrays.outasync.outbit.outbitmapops.outboolean.outbox.outbrin.outbtree_index.outcase.outchar.outchar_1.outchar_2.outcircle.outcluster.outcollate.linux.utf8.outcollate.outcombocid.outcomments.outconversion.outcopy2.outcopydml.outcopyselect.outcreate_aggregate.outcreate_am.outcreate_cast.outcreate_function_3.outcreate_index.outcreate_misc.outcreate_operator.outcreate_table.outcreate_table_like.outcreate_type.outcreate_view.outdate.outdbsize.outdelete.outdependency.outdomain.outdrop_if_exists.outdrop_operator.outenum.outequivclass.outerrors.outevent_trigger.outfloat4-exp-three-digits.outfloat4.outfloat8-exp-three-digits-win32.outfloat8-small-is-zero.outfloat8-small-is-zero_1.outfloat8.outforeign_data.outforeign_key.outfunctional_deps.outgeometry.outgeometry_1.outgeometry_2.outgin.outgist.outgroupingsets.outguc.outhash_index.outhorology.ouths_standby_allowed.ouths_standby_check.ouths_standby_disallowed.ouths_standby_functions.outindirect_toast.outinet.outinherit.outinit_privs.outinsert.outinsert_conflict.outint2.outint4.outint8-exp-three-digits.outint8.outinterval.outjoin.outjson.outjson_encoding.outjson_encoding_1.outjsonb.outlimit.outline.outlock.outlseg.outmacaddr.outmatview.outmisc_functions.outmoney.outname.outnamespace.outnumeric.outnumeric_big.outnumerology.outnumerology_1.outobject_address.outoid.outoidjoins.outopr_sanity.outpath.outpg_lsn.outplancache.outplpgsql.outpoint.outpolygon.outpolymorphism.outportals.outportals_p2.outprepare.outprepared_xacts.outprepared_xacts_1.outprivileges.outpsql.outpsql_crosstab.outrandom.outrangefuncs.outrangetypes.outregex.outregproc.outreindex_catalog.outreltime.outreplica_identity.outreturning.outroleattributes.outrolenames.outrowsecurity.outrowtypes.outrules.outsanity_check.outsecurity_label.outselect.outselect_distinct.outselect_distinct_on.outselect_having.outselect_having_1.outselect_having_2.outselect_implicit.outselect_implicit_1.outselect_implicit_2.outselect_into.outselect_parallel.outselect_views.outselect_views_1.outsequence.outsequence_1.outspgist.outstats.outstrings.outsubselect.outtablesample.outtemp.outtext.outtime.outtimestamp.outtimestamptz.outtimetz.outtinterval.outtransactions.outtriggers.outtruncate.outtsdicts.outtsearch.outtstypes.outtxid.outtype_sanity.outtyped_table.outunion.outupdatable_views.outupdate.outuuid.outvacuum.outvarchar.outvarchar_1.outvarchar_2.outwindow.outwith.outwithout_oid.outxml.outxml_1.outxml_2.outxmlmap.outxmlmap_1.outinputconstraints.sourcecopy.sourcecreate_function_1.sourcecreate_function_2.sourcelargeobject.sourcemisc.sourcetablespace.sourceoutputconstraints.sourcecopy.sourcecreate_function_1.sourcecreate_function_2.sourcelargeobject.sourcelargeobject_1.sourcemisc.sourcetablespace.sourceparallel_schedulepg_regressrefint.soregress.soserial_schedulesqlabstime.sqladvisory_lock.sqlaggregates.sqlalter_generic.sqlalter_operator.sqlalter_table.sqlamutils.sqlarrays.sqlasync.sqlbit.sqlbitmapops.sqlboolean.sqlbox.sqlbrin.sqlbtree_index.sqlcase.sqlchar.sqlcircle.sqlcluster.sqlcollate.linux.utf8.sqlcollate.sqlcombocid.sqlcomments.sqlconversion.sqlcopy2.sqlcopydml.sqlcopyselect.sqlcreate_aggregate.sqlcreate_am.sqlcreate_cast.sqlcreate_function_3.sqlcreate_index.sqlcreate_misc.sqlcreate_operator.sqlcreate_table.sqlcreate_table_like.sqlcreate_type.sqlcreate_view.sqldate.sqldbsize.sqldelete.sqldependency.sqldomain.sqldrop_if_exists.sqldrop_operator.sqlenum.sqlequivclass.sqlerrors.sqlevent_trigger.sqlfloat4.sqlfloat8.sqlforeign_data.sqlforeign_key.sqlfunctional_deps.sqlgeometry.sqlgin.sqlgist.sqlgroupingsets.sqlguc.sqlhash_index.sqlhorology.sqlhs_primary_extremes.sqlhs_primary_setup.sqlhs_standby_allowed.sqlhs_standby_check.sqlhs_standby_disallowed.sqlhs_standby_functions.sqlindirect_toast.sqlinet.sqlinherit.sqlinit_privs.sqlinsert.sqlinsert_conflict.sqlint2.sqlint4.sqlint8.sqlinterval.sqljoin.sqljson.sqljson_encoding.sqljsonb.sqllimit.sqlline.sqllock.sqllseg.sqlmacaddr.sqlmatview.sqlmisc_functions.sqlmoney.sqlname.sqlnamespace.sqlnumeric.sqlnumeric_big.sqlnumerology.sqlobject_address.sqloid.sqloidjoins.sqlopr_sanity.sqlpath.sqlpg_lsn.sqlplancache.sqlplpgsql.sqlpoint.sqlpolygon.sqlpolymorphism.sqlportals.sqlportals_p2.sqlprepare.sqlprepared_xacts.sqlprivileges.sqlpsql.sqlpsql_crosstab.sqlrandom.sqlrangefuncs.sqlrangetypes.sqlregex.sqlregproc.sqlreindex_catalog.sqlreltime.sqlreplica_identity.sqlreturning.sqlroleattributes.sqlrolenames.sqlrowsecurity.sqlrowtypes.sqlrules.sqlsanity_check.sqlsecurity_label.sqlselect.sqlselect_distinct.sqlselect_distinct_on.sqlselect_having.sqlselect_implicit.sqlselect_into.sqlselect_parallel.sqlselect_views.sqlsequence.sqlspgist.sqlstats.sqlstrings.sqlsubselect.sqltablesample.sqltemp.sqltext.sqltime.sqltimestamp.sqltimestamptz.sqltimetz.sqltinterval.sqltransactions.sqltriggers.sqltruncate.sqltsdicts.sqltsearch.sqltstypes.sqltxid.sqltype_sanity.sqltyped_table.sqlunion.sqlupdatable_views.sqlupdate.sqluuid.sqlvacuum.sqlvarchar.sqlwindow.sqlwith.sqlwithout_oid.sqlxml.sqlxmlmap.sql/usr/lib/postgresql96//usr/lib/postgresql96/test//usr/lib/postgresql96/test/regress//usr/lib/postgresql96/test/regress/data//usr/lib/postgresql96/test/regress/expected//usr/lib/postgresql96/test/regress/input//usr/lib/postgresql96/test/regress/output//usr/lib/postgresql96/test/regress/sql/-fomit-frame-pointer -fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.opensuse.org/openSUSE:Maintenance:13471/openSUSE_Leap_15.2_Update/d24883fb13e13a9c58da00d4d85390ae-postgresql96.openSUSE_Leap_15.2_Updatedrpmxz5i586-suse-linux directoryELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=730b1cb3dc59fa754d5d1cf1f50383b917822d90, strippedASCII textASCII text, with very long linesUTF-8 Unicode textAlgol 68 source, ASCII textC source, ASCII textexported SGML document, ASCII textELF 32-bit LSB executable, Intel 80386, version 1 (SYSV), dynamically linked, interpreter /lib, BuildID[sha1]=555176be92bb2055f00ebc02282be12f503618e8, for GNU/Linux 3.2.0, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=4383144426f89f63f5c1e35a37ae5ff8fc49f8c2, strippedELF 32-bit LSB shared object, Intel 80386, version 1 (SYSV), dynamically linked, BuildID[sha1]=a51d64361ce2272e6f76c1e0197b0f3be0287275, stripped  RRRRRRRRRRRRRRRRRRRRRRR^&Ftr͆Hac utf-84688afa8453491dfd8a6f2561e320de6f94cefb103034f1a16e47231302ba680? 7zXZ !t/IR]"k%0#J:fշBb./?h޻6d`5Y} (!}I?q) c==Few}pC[#yqp!c]! 3S⭠ `gy>eܓcyxiR.tLdn-$&sz}I"Q +i/y(t}&bovD z&O ~38lſ^] :UqٳTI.+nj.Gm>R4HInFM{STnTmwfCVoZ_!Ca|]ף+f Ƅ[#{w &j=f _QvE?jYF5g&E||e##2!fJj6f/wp`*82>1Thte6J_ mU# PACv䖼vЅ7;,oeyJ:*Fs[,#1yBIr1t|՝ASÄLB׳LJ&a~z=R%V*T.F:rUkUv~zl/ [?&I @Cx߼N] 0#)/Σ=ҽn# ,AAJ->YNy@Vt1ة'ǃ 6)<}=7ev4fWWa:.+;2XFD\vܧT"z+@"GE)qY6;#=CUX(U~!#wjPn|WVe Y )sZ;(߯PvFߧK^E1ۉ !8rFb:צG2LkϢ|K{Avq]q)V%"`u-ϙޫ6&sXELx=e$W or̩ݳD/\%.z]UcuCѣ8y[0E:?viFQ@|L b6.OS'L8eeIИeY2(b$CmOz}j* %d8@È905eP1ZՆv~M+E.vҹ\nl/(|b%Mwc9WeERh|E S9pq1X׌*Jz8mWC!yK5xDI?Wf C#U>CJ??f?O2lC*yh`~IzUETRa;IE:FTռŻ$+# )Ye/borBC3a[CS@ۚ:<4R\#ۍޔ 8ýkk%h?5qجҜKOsip#jv\+n? M>mȧm@)fOH%Fo5xh%#̾}j-6FI&֡'R͉Аհ$fm+~ ,C3+pBcL)kC1t\mx @tL۵̯fήt~sLXbXxz31Cw|(3jvӲrʒw*T Dcz5o{WcR$S-' ڄAaG )WJ_LJ\Kƙ6?̱`<~{ ]G$TSӯq8F+f X]]qEsiWx_ʼna4^?K3|h-o\Bbeb-ʜ_&ĺuɁᵝO4U>DeB3&!erG T[gDAj?:rS ا\W }5qJ|pA{GJscdm )P.2d<v^Om/S܇3`U\iG1r{c:H i*6)OG,o:-|on*yzOBe[& ヤ}B_\;AZ K+l>"cII"kT1O]cy3tP/VV+Tmm\]1~C͞/+ q^IqUUj9ϳA-q²tJ7KЪT! @RᾄpE͈/r_Xc|ѣ2s :Ņf}SO}*`:zJe7Vq]Js84^MQN)sah@3yʄ\/l9 K.]c;zPX7.^#0cLP a`T. `.D9JX ŢAf#UiWY+QBr 3$\]6nCGVhBh90EP:x:xZgTb 9?Z.D Pٶ<槣m7K1ku)R[lG/)G\?t nA%~W!d-@%cnA"Bm Bj|q|k&ː_$<#ߊ t(3 P]2%TKQS>0/6ByR˿ofXB;Gyf-l+|JYz2~ۢN;+t/z_BpE%g\5n[5=376DsKY a[eM^Da)e/~t"^tfpz=[HX[CUB 3Aʽ<“` E="ޣeR\n&`VdM+HԳG+&#0MO ?.Yb7Zl) AQ Pe~+v0x8A|3YshŠЌ2F$ omdf$+W\N7f"XOD@vB5[-nhn1զca}?K׺Gi@bKE+߄Xr{UmvdrP9G ,D~@1љj#Up/ L}!ڜyMqru;}#@NsNNV""ZkPKiC#Ts>2jp0zhuֲxf0Ket euqg[RW4%mz[\pOv [ԤSdmJ46<jE@#VSF[W (GSCqtS)u]X2*7KAry ~џl؃wɣ6Vɧ5tIêE;O ; 1sD7<'H-:јEXJqls0E9ﮚ~F 0kvrd?rwM=s=ױP8I2j2+K gѥAFFe%:t*aLӶoUt{b*#2'X9A-<y8]ıÚ$L-Tκ|?T,0VR=^d!@=߲W anN <7=EM)CΓ=.#5r)@ .%WYҮ|5-rNQ: "6<ӧtߘZ'7sp­\ct_0zCxQʁJJ<XH\y핲K1WF{7l6`5`mzBYЏ`ݡnMv`N%NǮGS2!*4ߤ5ˀ󾘾9$63$أ{`2rג*SPKh*[,wv*x& uE&R<]~NlW0|ZlTgmOh0{rPF[f [ mq,8R/٢=a5 0J3& B2԰Uu0q. 4oBpF \U'̆y~in^X{#4J$^~suOլ6Sz?Ysudcyo2֥iH"{WA+Lg/lsU\L/d+<|nѐ$AD ܦߙ2؏$Y G7j%C]YR=$7AE  gW?3׉"}Hz!oov9n`ߏ%@̴[O%Km[*aؼ˙ZL x|Bvq+Hn8*u×fNZiO.YjhD+[izGOɀ1AtWd~ToӯJߖE_.n%V#V*J,lbi]h0^L8j䌚TƼo#)%W  {\|lfO;a~P=R?z>6%x][d BE̅Q*q!%NxRziWΞ],/LόKIc?Q[ ̿j1iIVrQ+U?S;MCZڜx3pA$l*'`}> 嘌\osH=A,wx ?NfZ,YEnN)21O6]3Ϭ|+3QUI]EK}q#:B?_O:{lWANnC<5TPW~пV'{ 9<[gye z;$wQ)!@b-ۉ> _g!S >x_DW{˙-1(KiŁ}HhY[* _O5Q+FbYϽ<5q+oznQ:ԱF/a'X'#HĈc̍ؔ ԯcZY/Pȑx2\F.1l\yCvSm 3_`"ߕO,D*pX$H4Ѫ/_X.xW8 wAW.gY+ uTaix&@rT@fV(@b;Uvx(ixHcH9* }I{y􀶃,#_g#@l#3 QBH=$*VtSI+@  CeyPƊTG)ϴ!yHIUCʒ*lmtlj}@zʫ KeZD*dO]+pbV)QF@*.Ȳ HRLd*Pi(ϨDHōxH j-Pv6ꀫ=z}?>A+~.d+aMB/(y?*`^=;ZVɦB@v0%{CCH)֡ĤL D򱬲Y/Fy<k֑HƱSM~v˯,~Gg~ Pv B)!JU9f+Ie HԐh1#4y4Yt8fX7yyhKב^$>̪d_9ªoVCD⧞YM˱a>|~^8w*#uS]aJHN#E!QQ pOsdS>YtGi%Dd&@kKc~;-i=Y#GF!TIUcq*ъvAeÐXH^\TUK] s&ٮ9#@u]Ita'.}LI߈}Z@MfOo"v92. q@}2ndt`8 kjFO^ JRg>͝*-O=q, Gɶh!4⿳aeb-Ek2>(?NkŚ]E_ow6xjݿ#k*Y(ޫPSU>u"ڒJ*n]s<98IFЂ-] "d4ɼf>{[^Qvד0!];\/qL¶W5SL y$?8./FiU} +]5O"V|P3ܒ%q_Q%˧B.S >Jc{<7$?7O/^"I41'5͏|m* Ǣ jw;" =FmǙƲ.~ ܵpAi`wRI9Qm$3Nu7/*5ol;srFlU~s1ȇk_ø|ў1vҐ|l.j OH^޻Ƒʫ!vֹ{ lەQ6".k?LǬߤ*d4")P޾'ai+N2_[7M٤MRaS+6AW rXUNJj`#~]em9qa߃ ?glCtn~*zEh e *G{37^nu櫰ώ#A5;BwVJd5買f"YJ6\xp2˨U鹘=iY }+~"329y@ַ/෠ЪwszQDsB-%R?|2YD')h4I T,s_& 8_K:LmGi 60ii%=7ؖo_`~4k?@W.3sߞߤbIyv f.pCR׫a?\7{GA@bUojjs(%1l9eH5c/̓w;Nrd@5$3dv;criEۜrw1LX54¾'p O67o_2=X'.i?D dY0h =o_}B-aL_G8hVI0uޑ[o0WV:&W?Nd3u!'g >Vm@vy Qh]6כYaզ8~yтKݮzT#[W&Tdwmim ?LtFX+K_t$|=^ ޴cmbX&2kM3b3Sv vWya)ilB r2-5Nv)svGqb00k 0&TPu̳MrH ) GMb[VmݿFF6?62w-=^a|OVLt#mq y352^[_Qlʙd.^x?@֭aDj4Lӄa~ z~,Ux+Bǚc(Z>7rfվ8 1qtW@G$YU6SZ_ݾb@{θ0_ RQNKdHHE>+j )]!}{"!U05B,` Q\^!=jRl ưb-c Hߨt8/o3-" 8(qH(N%LqJy?qVCbHD5̷[?Y I5oK0o눙0o06 i*ӻyEN@ ibRG t:P_Y099bz"WxqLuʹj>۠Tys;Oq?l1b%s7%t52Y4/|sҦ^-$u v<_a{'~b8./03T_Ř|./S*COB)g~R! B8f5ژ8 5֕'%HH׼I]agY%d9wf ׂ ;ό¹|_qWIxLO"tZ~擔uky'(+= 1)O0Q`*x"bZ &:ONXz.:ұ@ܠ/~V=JC~" 64M*H+ ZPostd" 10+3Lxov5]eY.,J A ..Eo&\-U{qc}RT,cy}{ ̏l%Iɘz$17t _Apl٥LgY G[Kk0<^c깼=gxh"p? # Nmj>o:{=C( aڝv,'CYv|T-A_A p[hQ0{5D͵p!'Z\{H2ciIM|<н%A0o-b!o/!/ᛥw>мz Tw=v.^F% jQlmb0h3]x:n (r(W p{{z-q`t ikU<]CP=7YtxC(9*ȑ!e;܎n uD=w`"\'NljlAGr# wh+J?15eֆ:",U^=5~c"¦YGiq#ijaIƓ_)W~DLA<^гm%1 ^>tD%F\R}7ra ޑ!o[V#Cڨz`Oh0]pQ]jIRAELmƄZ}lN"GU*)pb[~ċNZ*эr1}nScמQ#rZ&:/ZR2yNԯ?㑔8Sfw8ʸgTo~_$NW#^DbݪBsM@l=4zQ'f=Ftm Dbe>Gf:MVB" ڪ{Ak20˂M %g8dV rQC1ȋXesrhH`?sC4p[J\g O)_/5N٤ caHJtiMs3\Gqhh6%Ni{;{t*-𻭞lk~m:s^1H =eͣښ{'٬8EU$ Up{&ްs6[Hů_ DhO[ ă,xh}+4[X«dH;^@Wѥ;cBY) ]? @ߓP${:-PW 8 4ׄ.4$@*a۰jsFbD ~EڄBaL#b8zĔ_Gv)JA;#tU"f{<=&D F>Dt$sbU(O:M'TUcJɬe7~?V׍ٖ.StZ!1i4xd7(Id/yzUKl_?Jstu&呶b+BL0XamnI'QaTij3 %nD4Wag 04B׾چPA kE3Nsb2j H ´znI͠ "qn JrYSb-ȫ8Npy("O>1'H yܡ8HYޮ aKюdW[Kb: MbHYWiL:wEܞ gh*/0||2ʰb *8  /m] O{*&ep ~Y2Gq[lu]MsMX/C%\^+f~ IA 2]S=ۮP9#WΐCZ}D r>/ #dN@Қ0U$^e(x|W#QMl8;JYf(AJ ܉Ѩo`!!Ҭܷ*xUjSrx+*0ZQ^\բ¬9VcnzuV])̒dd'dytH<@#\qw~pm"P:bKفӭ(V׸TCudГ4-ﲏQ2hNBcb` ShaI^ƭWi9Xxj0{![OMX?s /Ƀ #8=5;]{M:*E5XjcBͤɁ8j/2QzWԐ *7冒AeHy.םH Y$=UóVBFqUm#u7E j} R^?2Hs1ٱx{nHaƂ-ݎUy02N8:I<Tp%p֐!R+)Fd*bUBV7?'Գϟ-b TBrR:J<NDr۪ TL#Pѱ)+9r:о: R F+ݿ[=Z9wgxL\8gg?mvBb7' 9#^H=߶ԋl ǼgsZ5b>ңޗk/EXh/?MwYV^m%o>G^>d}J*`*Q ?@~>/;|=U֞ 7Qy9UϮM zS@~ϰ!Bd4Mth6_3̏[->qQO.9[}>,*m^?68{LQ+ 9(s J<{Se1AV-x !׈+1;=#"A:a{mehѐpQv ~!i@Y* bùthtyRb…| e l/ nH}C$h_!">7"S 3 ئ(M ,G> .+)ͳ}(`( #nD pwkRRHvPSj?9WO}` ȄW$\;^oם' ' S-Wuc c{b^w=S?n`/Ζ~꿾CTV.:㥷g&Dsa_o52I(Ğu=^΋-OwuQL[jGOv…]"dm+M( _y&7x¦&kkUdí{itU N b5sJ?&wJό0PzXw}օ\3/Z\O>:ΞEyOAHzGEeuqMQg|bt*зK WFPf)6~~66M,@O(kȏ.vSD바8͍px!laJ'IZds.b~o<0mI$la,bx=~LJYu)8#vžFrE=f k+WX-ldYtM0auCTDhf޴N4W 鱸3"C<"H70gWtnBKë׶<=80b"UU=llP"Q 0 y-]s)F.fSJ1{aȎB,OF9B9R"[[-$iAeʡdY5%B)E (U7Z㲓龾l(Z?4ʩ翴7;h{8wذ.ޣkקz?O}h'(0X/+Xp[Ph T+Ĝs-pTƂg >F=eTqw,yۀ TvJ88H> 5fMmBipb*>%YIz*ƌ0@`=ufI)*!.;`^\zdrր)8J#+M6\`k)'v|QBN ՘yU~*+۵Q o\a=c)+\iR k@UUls%l~GŐD1@tE P!c;h=?IkfESwʙ)輥2-(/!>:ybX=leYt$7.f%+d=>~9HD*A^8 l4:UsҊ #. @'Fl cMh؂|5oXzTr*/!4nݦt>c/;b"zZ9Ȗhd䎔c1ÆK9-T! #"=\ B-Jvƚ1Ts"N5סN͎;MxOīahP浱hU3I usDgj mbo1y