bubblewrap-0.8.0-150500.3.3.1<>,ep9|5prIC˻|+R(Cd@f^y'K9_kvʢũ܍cG]#pԀ_k+ z'Q9;8Q-M.xZhb\\7#YCZ+1a\&Oh]feU$IiD͝_oA鸯H8˧K8vG-lWm`%"_%>>Q?Q|d   P6H ^t   T  .t   (!8(9: vFJGJHJIKXK$YK,\KT]K^L/ bM:cMdNheNmfNplNruNvNwPxPyQzQQ,Q0Q6QxCbubblewrap0.8.0150500.3.3.1Core execution tool for unprivileged containersBubblewrap (/usr/bin/bwrap) is a core execution engine for unprivileged containers that works as a setuid binary on kernels without user namespaces.exinomavroSUSE Linux Enterprise 15SUSE LLC LGPL-2.0-or-laterhttps://www.suse.com/Productivity/Securityhttps://github.com/containers/bubblewraplinuxppc64le e"= Rc'AA큤A큤A큤A큤eeeeeb6eeaWΞreeWYe3e4c14d3ca939979a37457de82c17ed2ee0eea4871fc3b9d78e5c55452530f4b16d076c330a6875370f852293b365ee8ddbf7db071d5913364e97066d55b79f53d24b91752cc015a140d69d627d6098e95e9dbbfdc1f08e6e0dc173d4e32f0efd7ce88ff6014f184097f7527d406c14ba163d71bc93e31e95d784ae19c2b103f571dbc8beb5a43236dd4142345ad74c6a536027820747ac9f6eea86925c236108fd08d3d6db04338dd4ac9b710b14b23a21162154359c6ef5cf16810802eed6636ffef204bdc877c55718ba5509e049135426a913c53a34fed3590e197f61904b7993225104d90ddd8024fd838faf300bea5e83d91203eab98e29512acebd69c40c85d3ed19c198e23312b234e53a4fae3b3be093cfdedbcec0b0df870f94518rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootbubblewrap-0.8.0-150500.3.3.1.src.rpmbubblewrapbubblewrap(ppc-64)@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libcap.so.2()(64bit)libselinux.so.1()(64bit)libselinux.so.1(LIBSELINUX_1.0)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)3.0.4-14.6.0-14.0-15.2-14.14.3d!@c@bb!@aHw^@]\Q\h[;@[IZVYdY@Y_wY&@X @XS@XW֘WWandreas.stieger@gmx.dedmueller@suse.comdimstar@opensuse.orgsebix+novell.com@sebix.atbjorn.lie@gmail.comsebix+novell.com@sebix.atbjorn.lie@gmail.comalarrosa@suse.comsebix+novell.com@sebix.atalarrosa@suse.comsebix+novell.com@sebix.atsebix+novell.com@sebix.atsebix+novell.com@sebix.atsebix+novell.com@sebix.atsebix+novell.com@sebix.atsebix+novell.com@sebix.atsebix+novell.com@sebix.atsebix+novell.com@sebix.atwalters@verbum.orgklember@redhat.comignatenko@redhat.comwalters@verbum.org- update to v0.8.0: * Add --disable-userns option to prevent the sandbox from creating its own nested user namespace * Add --assert-userns-disabled option to check that an existing userns was created with --disable-userns * Give a clearer error message if the kernel doesn't have CONFIG_SECCOMP and CONFIG_SECCOMP_FILTER- update to v0.7.0: * --size option controls the size of a subsequent --tmpfs (#509) * Better error messages if a mount operation fails (#472) * Better error message if creating the new user namespace fails with ENOSPC (#487) * When building as a Meson subproject, a RUNPATH can be set on the executable to make it easier to bundle its libcap dependency * Fix test failures when running as uid 0 but with limited capabilities (#510) * Use POSIX command -v in preference to non-standard which (#527) * Fix a copy/paste error in --help (#531)- Update to version 0.6.2: + New features in Meson build: - Auto-detect whether the man page can be generated. - -Dbwrapdir=... changes the installation directory (useful when being used as a subproject). - -Dtests=false disables unit tests. + Bug fixes: - Add --add-seccomp-fd to shell completions - Document --add-seccomp-fd, --json-status-fd and --share-net in the man page - Add attributes to silence various compiler warnings - Allow compilation of tests with musl on mips architectures - Allow compilation with older glibc - Disable sanitizers for a test helper whose seccomp profile breaks the instrumentation - Disable AddressSanitizer leak detection where it interferes with unit testing- Update to 0.6.1: - Add a release checklist - completions: Make zsh completion non-executable The Autotools build system installed it with 0644 permissions because it's listed as DATA, but the Meson build system installs executable files as executable by default. zsh completions don't need to be executable to work, and this one doesn't have the `#!` marker that should start an executable script. - update to 0.6.0: - meson: Improve compatibility with Meson 0.49 That version doesn't allow more than two arguments for define_variable. - Disable test-specifying-pidns.sh under 'meson dist' while I investigate This test is hanging when run under 'meson dist' for some reason, but not when run under 'meson test', and not locally, only in the Github Workflow-based CI. Disable it for now. - meson: Actually build and run the tests - tests: Fix compiler warnings for unused arguments - meson: Run test scripts from $srcdir - meson: Make G_TEST_SRCDIR, G_TEST_BUILDDIR match Autotools - meson: Run the Python test script with Python, not bash The python build option can be used to swap to a different interpreter, for environments like the Steam Runtime where the python3 executable in the PATH is extremely old but there is a better interpreter available. This is treated as non-optional, because Meson is written in Python, so the situation where there is no Python interpreter at build-time shouldn't arise. - meson: Build the try-syscall helper - meson: Build tests with equivalent of -I$(top_srcdir) -I$(top_builddir) - meson.build: Remove unnecessary check for sh - Add a Meson build system This allows bwrap to be built as a subproject in larger Meson projects. When built as a subproject, we install into the --libexecdir and require a program prefix to be specified: for example, Flatpak would use program_prefix=flatpak- to get /usr/libexec/flatpak-bwrap. Verified to be backwards-compatible as far as Meson 0.49.0 (Debian 9 backports). Loosely based on previous work by Jussi Pakkanen (see #133). Differences between the Autotools and Meson builds: The Meson build requires a version of libcap that has pkg-config metadata (introduced in libcap 2.23, in 2013). The Meson build has no equivalent of --with-priv-mode=setuid. On distributions like Debian <= 10 and RHEL <= 7 that require a setuid bwrap executable, the sysadmin or distribution packaging will need to set the correct permissions on the bwrap executable; Debian already did this via packaging rather than the upstream build system. The Meson build supports being used as a subproject, and there is CI for this. It automatically disables shell completions and man pages, moves the bubblewrap executable to ${libexecdir}, and renames the bubblewrap executable according to a program_prefix option that the caller must specify (for example, Flatpak would use - Dprogram_prefix=flatpak- to get /usr/libexec/flatpak-bwrap). See the tests/use-as-subproject/ directory for an example. - Use HEAD to refer to other projects' default branches in documentation This makes the URL independent of the name they have chosen for their default branches. - workflows: Update for rename of default branch to main - tests: Exercise seccomp filters - Allow loading more than one seccomp program This will allow Flatpak to combine an allow-list (default-deny) of known system calls with a deny-list (default-allow) of system calls that are undesired. Resolves: https://github.com/containers/bubblewrap/issues/453 - Generalize linked lists of LockFile and SetupOp I'm about to add a third linked list, for seccomp programs, which would seem like too much duplication. - Handle argc == 0 better Unfortunately it's possible for argc to be 0, so error out pretty early on in that case. I don't think this is a security issue in this case. - Fix typo - Remove trailing whitespace - Fix spelling - bash: Fix shellcheck warnings - bash: Invoke bash using /usr/bin/env - bubblewrap: Avoid a -Wjump-misses-init false-positive When building with -Wjump-misses-init as part of a larger project, gcc reports that we jump past initialization of cover_proc_dirs. This is technically true, but we only use this variable in the case where it's initialized, so that's harmless. However, we can avoid this altogether by making the array static and constant, which allows it to be moved from initialized data to read-only data. - bind-mount: Be more const-correct When compiled with -Wwrite-strings as part of a larger project, gcc and clang both warn that we're assigning a string constant to a mutable struct member. There's actually no reason why it should be mutable, so make it const. - die_with_error: Save errno sooner We need to save errno immediately, otherwise it could be overwritten by a failing library call somewhere in the implementation of fprintf. - main: Warn when non-repeatable options are repeated A user might reasonably expect that `bwrap --seccomp 3 --seccomp 4 ...` would load seccomp programs from both fds 3 and 4, but in fact it only loads the program from fd 4. Helps: https://github.com/containers/bubblewrap/issues/453 Resolves: https://github.com/containers/bubblewrap/issues/454 - utils: Add warn() - Add SPDX-License-Identifier for files that already specify license This is a step towards REUSE compliance. Third-party files that we do not otherwise edit (git.mk, m4/attributes.m4) are excluded here. - tests: Use preferred spelling for SPDX license identifiers - Remove obsolete .travis.yml We no longer use Travis-CI. - Remove obsolete papr CI We no longer use this.- Update to version 0.5.0: + New features: - --chmod changes permissions - --clearenv unsets every environment variable (except PWD) - --perms sets permissions for one subsequent --bind-data, - -dir, --file, --ro-bind-data or --tmpfs + Other enhancements: - Better diagnostics when a --bind or other bind-mount fails - zsh tab-completion - Better test coverage + Bug fixes: - Use Python 3 for tests and examples - Mount points for non-directories are created with permissions - r--r--r-- instead of -rw-rw-rw- - Don't remount items in /proc read-only if already EROFS, required to run under Docker - Allow mounting an non-directory over an existing non-directory, e.g. --bind "$XDG_RUNTIME_DIR/my-log-socket" /dev/log - Silence kernel messages for our bind-mounts - Make sure pkg-config is checked for, regardless of build options - Improve ability to bind-mount directories on case-insensitive filesystems - Fix -Wshadow warnings - Fix deprecation warnings with newer SELinux - Add new subpackage bubblewrap-zsh-completion- Update to version 0.4.1: * retcode: fix return code with syncfd and no event_fd * Ensure we're always clearing the cap bounding set * tests: Update output patterns for libcap >= 2.29 * Don't rely on geteuid() to know when to switch back from setuid root * Don't support --userns2 in setuid mode * fixes CVE-2020-5291 * fixes bsc#1168291- Update to version 0.4.0: + The biggest feature in this release is the support for joining existing user and pid namespaces. This doesn't work in the setuid mode (at the moment). + Other changes: - Stores namespace info in status json. - In setuid mode pid 1 is now marked dumpable. - Now builds with musl libc.- Use /bin/bash instead of /usr/bin/bash in SLE12- Update to version 0.3.3: - This release is the same as 0.3.2 but the version number in configure.ac was accidentally still set to 0.3.1 - Update to version 0.3.2: - fixes boo#1136958 / CVE-2019-12439 This release fixes a mostly theoretical security issue in unusual/broken setups where `$XDG_RUNTIME_DIR` is unset. There are some other smaller fixes, as well as an addition to the JSON API that allows reading the inner process exit code, separately from the `bwrap` exit code. - Print "Out of memory" on stderr, not stdout - bwrap: add option json-status-fd to show child exit code - bwrap: Report COMMAND exit code in json-status-fd - man page: Describe --chdir, not nonexistent --cwd - Don't create our own temporary mount point for pivot_root - Make lockdata long enough on 32-bit with 64-bit file pointers.- update to version 0.3.1: * New feature in this release is --bind-try (as well as --dev-bind-try and --ro-bind-try) which works like the regular versions if the source exists, but does nothing if it doesn't exist. * The mount type for the root tmpfs was also changed to "tmpfs" instead of being empty, as the later could cause problems with some programs when parsing the mountinfo files in /proc.- update to version 0.3.0: * The biggest feature from this release is that bwrap now supports being invoked recursively (from other container runtimes such as Docker/podman/runc as well as bwrap itself) when user namespaces are enabled, and the outer container manager allows it (Docker's default seccomp policy doesn't). * This is useful for testing scenarios; for example a project uses Kubernetes for its CI, but inside build the project wants to run each unit test in their own pid namespace, without going out and creating a new pod for every single unit test. * Similarly, rpm-ostree compose tree uses bwrap internally for scripts, and we want to support running rpm-ostree inside a container as well. * Another feature is bwrap now supports -- to terminate argument parsing. To detect availablity of this, you could parse bwrap --version.- update to version 0.2.1: * All the demos are included * bugfixes for the demo files * There was an issue with mkdir when running bubblewrap on an NFS filesystem that has been fixed, so flatpak now works on NFS shares. * Some leaks have been fixed, including a file descriptor leak.- update to version 0.2.0 - bwrap now automatically detects the new user namespace restrictions in Red Hat Enterprise Linux 7.4: bubblewrap: check for max_user_namespaces == 0. - The most notable features are new arguments --as-pid1, and - -cap-add/--cap-drop. These were added for running systemd (or in general a "full" init system) inside bubblewrap. But the capability options are also useful for unprivileged callers to potentially retain capbilities inside the sandbox (for example CAP_NET_ADMIN), when user namespaces are enabled. Conversely, privileged callers (uid 0) can conversely drop capabilities (without user namespaces). Contributed by Giuseppe Scrivano. - With --dev, add /dev/fd and /dev/core symlinks which should improve compatibility with older software.- add group- fix build macro with rpm < 4.12 (non-Factory currently)- update to version 0.1.8 - New --die-with-parent which is based on the Linux prctl(PR_SET_PDEATHSIG) API. - smaller bugfixes- upgrade to upstream version 0.1.7 - note that this package was *never* affected by CVE-2017-5226 as it was introduced in version 0.1.6 - upstream changelog of version 0.1.7: This release backs out the change in 0.1.6 which unconditionally called setsid() in order to fix a security issue with TIOCSTI, aka CVE-2017-522. That change caused some behavioural issues that are hard to work with in some cases. For instance, it makes shell job control not work for the bwrap command. Instead there is now a new option --new-session which works like 0.1.6. It is recommended that you use this if possible, but if not we recommended that you neutralize this some other way, for instance using SECCOMP, which is what flatpak does: https://github.com/flatpak/flatpak/commit/902fb713990a8f968ea4350c7c2a27ff46f1a6c4 In order to make it easy to create maximally safe sandboxes we have also added a new commandline switch called --unshare-all. It unshares all possible namespaces and is currently equivalent with: - -unshare-user-try --unshare-ipc --unshare-pid --unshare-net - -unshare-uts --unshare-cgroup-try However, the intent is that as new namespaces are added to the kernel they will be added to this list. Additionally, if --share-net is specified the network namespace is not unshared. This release also has some bugfixes: bwrap reaps (unexpected) children that are inherited from the parent, something which can happen if bwrap is part of a shell pipeline. bwrap clears the capability bounding set. The permitted capabilities was already empty, and use of PR_NO_NEW_PRIVS should make it impossible to increase the capabilities, but more layers of protection is better. The seccomp filter is now installed at the very end of bwrap, which means the requirement of the filter is minimal. Any bwrap seccomp filter must at least allow: execve, waitpid and write Alexander Larsson (7): Handle inherited children dying Clear capability bounding set Make the call to setsid() optional, with --new-session demos/bubblewrap-shell.sh: Unshare all namespaces Call setsid() and setexeccon() befor forking the init monitor Install seccomp filter at the very end Bump version to 0.1.7 Colin Walters (6): Release 0.1.6 man: Correct namespace user -> mount demo/shell: Add /var/tmp compat symlink, tweak PS1, add more docs Release 0.1.6 ci: Combine ASAN and UBSAN Add --unshare-all and --share-net - upstream changelog for 0.1.6: This fixes a security issue with TIOCSTI, aka CVE-2017-522. Note bubblewrap is far from the only program that has this issue, and I think the best fix is probably in the kernel to support disabling this ioctl. Programs can also work around this by calling setsid() on their own in an exec handler before doing an exevp("bwrap"). - upstream changelog for 0.1.5: This is a bugfix release, here are the major changes: Running bubblewrap as root now works again Various fixes for the testsuite Use same default compiler warnings as ostree Handle errors resolving symlinks during bind mounts Alexander Larsson (2): bind-mount: Check for errors in realpath() Bump version to 0.1.5 Colin Walters (6): Don't call capset() unless we need to Only --unshare-user automatically if we're not root ci: Modernize a bit, add f25-ubsan README.md: Update with better one liner and more information utils: Add __attribute__((printf)) to die() build: Sync default warning -> error set from ostree Simon McVittie (4): test-run: be a bash script test-run: don't assume we are uid 1000 Adapt tests so they can be run against installed binaries Fix incorrect nesting of backticks when finding a FUSE mount- upgrade to upstream version 0.1.4 - Build also for Leap 42.2- New upstream version- Update to 0.1.2- Trivial fixes in packaging- Initial packagexinomavro 1706623506 0.8.0-150500.3.3.10.8.0-150500.3.3.1 bwrapbash-completioncompletionsbwrapbubblewrapREADME.mddemosbubblewrap-shell.shflatpak-run.shflatpak.bpfuserns-block-fd.pybubblewrapCOPYINGbwrap.1.gz/usr/bin//usr/share//usr/share/bash-completion//usr/share/bash-completion/completions//usr/share/doc/packages//usr/share/doc/packages/bubblewrap//usr/share/doc/packages/bubblewrap/demos//usr/share/licenses//usr/share/licenses/bubblewrap//usr/share/man/man1/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:32293/SUSE_SLE-15-SP5_Update/5a977352307733b07ce400ddc688348e-bubblewrap.SUSE_SLE-15-SP5_Updatedrpmxz5ppc64le-suse-linuxELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, interpreter /lib64/ld64.so.2, BuildID[sha1]=1f8ec26af8d5f00279d3212d6bcf3ddd7bfea495, for GNU/Linux 3.10.0, strippeddirectoryASCII textASCII text, with very long linesBourne-Again shell script, ASCII text executablePython script, ASCII text executabletroff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)RRRRR/ShĶL&Outf-87e8ec5a3f42d898f0ff472b88cea56e06cbf117d2eef4ac54123a0c8f79bb976? 7zXZ !t/W030]"k%{??K15eVx$i 8X^ BC% %Mv[CN7BR8G}tH:+&:' @]IZ}QL]~eMC"l5#c9]y%ds'#3s60nV8FS ݁cS{j9Ǐ eFJ6\xޡQ6z'Z5idjiЦ˄ڼWp`pYKmDҡ.53-: 8gfg L`GO7ɏ dL?a8B}KCXvft+.YA.r{t&mB+RAoP1jr3 k*ih)…#EtBh-cdFK҈FFN/J{'ai׽銇YC}h+&b%J{ˤnS-SR;n1ZYu,~(/sPFH#3tuhVZ0JU'xb즈x_K@.vDf-ޖZdڳi$HAUuMu>ͻ'C9;ozn2R>W ?/R=Kzi^S C CЂu{PVaQ|P3w2! xԬ$(!zVX )4UӹGUSM`H\LJDL/JF) *kde׀մF6S=WK=g>MG]T[[V~9:"Ce@摽ţfYj7x0^3*0HegG&tg Ɗ55~f=W;t2穔bFe¦M# 9pJ{ t[F"R 8=&]i'UldfI'j!ShK}X:u/Ao0{Y^W?ұ0R9Eb '(Os9Nm?B*Tҳ!;/3!)K>>L@.5: /Ĝ%Rؘ{=&oqO/M9^^T0.x,(?ȕSĶ`j&S}0@|ص3)?=|vϋVzOB`leN v1@d"*-< 3Qڿk`TBPik$^, 2GJ^gk]߿Q́$2&o/c!+[{XGϣF\$_ź8#nE* ?tg)6iw=]80~xf$`{B9u-7Tm׼qK:2EFVcgCwKJoE_n?& Hm9_#{ 4FCJ/ E:KjL!{B7BlɯC*u2Bk]4{}ISiz=2yrLM8qHY>䖨ȖCΣ,"ڱ7D6Tb ѿvϷ;A基n1-W-(9T,pΑ#qX0j%1^9 G[',{F)3MKE1}F{HE.۵ĴH B3oy_2ܤZ"CH+\zUrsd]PGixqeDcK.]@N/6/y/pLhhdfq:mSO6/ےdCFAտ n?GY;{J2HH^Tsь+ y( "ᕡ&KL % jlԉe25.LPF8,AGVL.Ș3SA#/SkOh3IGQFQ|"M[,33L<'_IOYuPDi-,LuZѭwcxU_5Y,( S&q:r'^~wwg! R2 >Rrp̶#D:RYA? ym{7yR[tVm`GCN4GM,AD\~+5"DCu,"< v Gs;=ޕNٿ:@dPOh {p*dU޼D0+7Q>! Դ'TQehZ'Q_^ ERe~+2%$' h)z]9Yiya{_WGŖ.Si02_uckge?Hǵ#<#@;8eT?V^sS+[Fv|ݧ8(7wda7A mthO00)D{j>Xw`(ׇbhxUge Oj< 1߻J*OZa:q -۽ۿ1QT 7'R%dN-rʩr@rR;U%֜0;u*~Nf.9Ok ʃME\#nG3f n[KrB hߐ*1G m"Wւ0Eec .9/HV1[ B?,œdgU:Ӳϧ %C[)S#X,B+@o)5G6 ^W)J*"H=>$Buubh{H}> ;@㐻g A<|P[GP *BٱH)޺3 S™Pi }z.,ޫ+@ K~+I Aa;aeOb8F#޿4""\1"h<JCpjs_O[waD&)czfm9׫# p23jVR#>Q )kkk1 i04ġCެ΅1n`Da{k#_A/>s.m&)7=F,Ы xX[ fԘUfkFY }D 4o#:a "m NIR0ʇ ,Whn7h w|*(J>da3 w&wؗ2a'tq)09 W\_W^ui lKD6lҮgKHGtǓ^qG{俞P_HղLaG>5*Cv ;G&{[{q) HҀf6?]ša0JMh-[zLsvOw`lb,iu"w#3) QA@5pf}sptʔZк- huJ꺭BY%"84|y?#y= ) S4}H p2 c%z $MASO빬̱fEH27Kg) Ȝ-Ta*Ƿ!0I!rM{ X]) yz=b`PWEDZy&HAX0sg{Utfqb&98Jx2éCVlk=.lRC8Pt̳ɐ!;ߑ^ElqzJ 05_,/)&37~ *'I8F:13IZ~{CqJGjr(/ F|bɓXa(Kh`5gD'3(樗=;Wƀ~9󇻵^4@m"IjN-xB?>YgnQ_VцIaRKJ'1S}]DDM?J5ޕQ.:ѧigqcԙ{-G$k3h28Lڮnʄ4h֞v5cq#3΃|0hwmQfPlrD<abeƶM9o}1@pwev5E"ۇ ֽ׊Ҧ“J '`~cbdF=Yteоsfd*PJ*W..= 1 {$th/(f`B]ncRg{?0"j7RNӋC@ⶏ-r6'2{R0J{Y#q4ˌ=")`X+/EYz2{vǯN9 YPO ]>|&d",3fl4 &hIS~(Wcp4𨝢Rkꝧ2mGdeu~ӣhՆQKH:މ((xHom*\buRk;!F@9GӶئ~Vpzxx1WKf7Pkoe-\tL79AARvɂ-e f bȫUH~=-wNJzl'Tp9BK #Y+mZ)v,钪DV8ܳbn2?9tLN֘d!WIAQc HF,ΔZ<W d9 4 4c ^ ʤv*a,a U[X<Z3}H0M 3w>4V觺TPՠw2\rP^wO̊`Y0j'&8xBN͵Q^hHs#VBŒ+jm{ڑF ̀A-nF+Z(Bx)(Z~:|3@uحN1Ђa'h}9NKɢǶ~Fpo{",չ퓯ۖm>Lm4A'UW?V>?!9a 2@;Zly6H=F3lʏ,ˡ)8Xǁu M Ž bV語jޘ#ޯ>qq@̺KX}-[X>LFJӧփQ< cؽb#< F ](lr_ay̧Cpڄ%S@j<Yz5t OyᏭT*Uyj"2#uY47 _OJQ9TEO!e# ίECYE XO6Y$BuJo)V !~ty.O2\Ʋ{H"ld|H 'l8Úb,#zNTda#1Umd`9ۧwc_a;nYydh=QJ#} =b%hm\`廁~;(;@ _%77K9_7gM KP:\(Ջ?q@N`(j!Z⹸GC!g$loBaܾd7e?_t7boJy6`m1v^7+iX1ft>,4{!qF =f;A_*qϸؗAU}`n%^e"#@P @!!$V>'3ю xQKC!ݮȔ}FK2X XPߪGSF` uQ# V9: += Oα/ogaXIN 0)A;2đe5=#"1T4@^o .#;IM|#.bG ԃ?ˏWR$TLݳh6Qҿ5Za՞Cnru0()]npl^ԫʞn (rN]e3^ߜd%[._[%(n9[pt?BߺU!̔5]䟯z=Hx$pƯU}iޱH$&J-mN}d)Q^ްjrh5oFݖ5pw<_z<"`+&Ţդ}ERX]~a{JW؈F24VukQAvܻ89m`SSٿf6)l?6HFyn`!g$Q"Mja R$hEPCwVYm,1E^֑/J%ؕPLV.Hv,ۘ7c^#gPrlz0H74FW}5>#i7$Њ *,v(]އMa kxg\)xeHodTV/+6o\oQVVg. ķ)}]4sWSR\#Q[@8q&U쑖#]Qh\ 4VAw4&'gA΂\#^ȭK)Ud&ʎR땋ji`&BQݽy(K4qOPy/i1fy[ĺw nB ,#e[ZSt<:L,Ҿ> I9=Ջz#+ ˷FHE1AU{Gbl:~1o;IcU>+E*eRN #:(sA[ ތ;j\xnb&-  Mh4WR,b9*NLFp̀Bwʍ>aCd}r*Iݫ).ܱ#xƧ1ʍ\Z崔8S7(*w$p{'X[A.t֨}ouWywQc@ ({W=ogؽb`D HuI~cyV]W2>lPAۆc4gἭ֟非m( :,Xㅳ,fn.]bJp~f:?آ`exPǂMP%7Q{aюQw8T`s6ƽi(V;rx ^! L|>u\p$8u# qEH|Ahj&V;m@l<%*L[^0EHwq`j~}:UqS8|H%Wc5m{]%[oSXUշo *ÂS$ڳF-QNc?z:9[6}<đjI&b3gڠYԴ42^TYIvEݥUȌSn\27%hi0;pܫ sɒDd4ԃ\hH'^[UHVf[K|Vaw˂NO027sqh'9!+5_Lq;Iv:X׀ Ӣu*"a5!F$n""|b;R{q|7 -˸+Ȯj9rֿVu =6dW4&4@8̶\L/"jPS1 m%{s[ V c!: xK^hSMraeKV6aW֥X킯/hZ9;!ڱ2)qYJ^, (#={L"̦(;q^L5MT ]_ 5=5ե9OuU'UK.O0E&{o^3y^>0Byڟ"d1;ޝ u ^9 N?H^sɢ8Ql*^N`Գw\K&BcisЌ${-Zllz%#ᩑ16znj~`^ _wGh8z@gꪕ*^[fFPLx )*gbߦdJ eN1t䉯 }8.u}Rt T>ǩHʇhN!CPsֶsT%`!R@f⼵g*?WtW4:m:w N^c??`ɲcymq}w] +7,kZ+ˀ iw]; -@S.6J< )+ۣx6{>;3>:]?Ο`Ѡ [֥_/rZ&[!>~,!>-zu7!Y#_ 2y>صrًYaH?=d#1&!#)Ryc qᰖ3w0.tK9*% >%'f,Y1ej&0/RKl'd]r-au.pkٹ+z. 0ذDzOj8\E;@auZ[厱Gm# nUӃr&ȅJ(8k#l1J{±0],wa\^w9ݾ듽'JnPVp8OH&d)9wlh0G ]@2{PB~o/f Ecg;-sK*+cw$@rPTC:TLM*|CG6}+Ml`٦9ۛ8e§ j]Qà 7 Vs{mE7ҥB0V]As"Y5VQ<ϙts1㈀_<R>y/4Iّ:$kϾyA7Cl<)>96iU1/j$c^UKh'EbzS Jg0sETqt'-PlȪKeʈnS H"wi/o4ݡf wo/QEizFwp:\F^U-+Յ8f;OPED-o.^RWlwFפKNK" E)]?#a5Մ/eR1#{脄 lwdGJt׍Z/"8U~G7l uђuX /Ԁb'[/^>@