sssd-ldap-2.5.2-150500.10.22.2<>,xg p9|#;X=%7TjX d!<%HKCP -uOЪ?=nP&}W`uͣ,%>L?<d  ! B  1@]cl   ,  l       l   P!(! !( 8 K9 HK:gKFG Hl I X Y\H ] ^ͥb9cdaeffilkuЀ vwH x yH%z8Csssd-ldap2.5.2150500.10.22.2The LDAP backend plugin for sssdProvides the LDAP back end that the SSSD can utilize to fetch identity data from and authenticate against an LDAP server.g xinomavroxKSUSE Linux Enterprise 15SUSE LLC GPL-3.0-or-laterhttps://www.suse.com/System/Daemonshttps://github.com/SSSD/sssdlinuxppc64le 8PF >A UrAAAAAAAAA큤AAAA큤AAAAAAAA큤AA큤AA큤g ݀g g ݀g lg ݀g lg lg lg ݀g lg ݁g lg lg ݁g lg ݁g mg mg mg mg mg mg mg mg ݁g mg mg ݂g mg wg wg wfa0ced4a568305653e6a7cb20889593f550b5d5243d6b4360e61389d069ba4dd31167bf745d17fca281c518e380823fa30d14c5bc78c909f5b91ec72c2ef4f26b75272b0b1c5afc0d743c6a6ecff1dc6e1366f2e7e50970f74168bf281fccceab2a82519da78823e2ef72f7da65253f954c2fe7894bfab0bfee71cb3c73a3e4f56327ab9a9cb23cb9c4d0583d300d8997e364ff9d0cb0fdd087fc83a6b3507722805dae3655910704b9345f62ee8acb788c98062323b0757a8fd1a3b1958a6c1ecdc571052f1e319692678c7d137d4a6e29d218fc497153bda9d4022a4edd928rootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootrootsssd-2.5.2-150500.10.22.2.src.rpmlibsss_ldap.so()(64bit)libsss_ldap_common.so()(64bit)sssd-ldapsssd-ldap(ppc-64)@@@@@@@@@@@@@@@@@@@@@@@@@@@    libc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libc.so.6(GLIBC_2.28)(64bit)libdhash.so.1()(64bit)libdhash.so.1(DHASH_0.4.3)(64bit)libkrb5.so.3()(64bit)libkrb5.so.3(krb5_3_MIT)(64bit)liblber-2.4.so.2()(64bit)libldap_r-2.4.so.2()(64bit)libldb.so.2()(64bit)libldb.so.2(LDB_0.9.10)(64bit)libsss_cert.so()(64bit)libsss_certmap.so.0()(64bit)libsss_certmap.so.0(SSS_CERTMAP_0.0)(64bit)libsss_child.so()(64bit)libsss_crypt.so()(64bit)libsss_debug.so()(64bit)libsss_idmap.so.0()(64bit)libsss_idmap.so.0(SSS_IDMAP_0.4)(64bit)libsss_idmap.so.0(SSS_IDMAP_0.5)(64bit)libsss_krb5_common.so()(64bit)libsss_ldap_common.so()(64bit)libsss_util.so()(64bit)libtalloc.so.2()(64bit)libtalloc.so.2(TALLOC_2.0.2)(64bit)libtevent.so.0()(64bit)libtevent.so.0(TEVENT_0.9.9)(64bit)rpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)sssd-commonsssd-krb5-common3.0.4-14.6.0-14.0-15.2-12.5.2-150500.10.22.22.5.2-150500.10.22.24.14.3f_f'e@e@eved c@c1@b/.@b@b~ba@aq@a @`!@``x*`m`T@_ts@^}^f/^ P@^[^ @]}@]µ]@]@]@]@\@\\+@\mA@[t[*AZZ@ZH@Z%8Z!D@YYw2X~@X,XX@X7@X@X@XN@XGX`@WWW@W@V&@VqR@VO @V U@U5@UU@U}lT@TTq@T6T`TR(@scabrero@suse.descabrero@suse.comscabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.denopower@suse.comscabrero@suse.dedmulder@suse.comscabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.dedmulder@suse.comdmulder@suse.comscabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.descabrero@suse.deckowalczyk@suse.comckowalczyk@suse.comckowalczyk@suse.comckowalczyk@suse.comhguo@suse.comhguo@suse.comhguo@suse.commichael@stroeder.commichael@stroeder.comhguo@suse.commichael@stroeder.comjengelh@inai.demichael@stroeder.comkukuk@suse.deluizluca@gmail.commichael@stroeder.comdimstar@opensuse.orgjengelh@inai.demichael@stroeder.commichael@stroeder.comjengelh@inai.dehguo@suse.commichael@stroeder.commpluskal@suse.comjengelh@inai.dejengelh@inai.demichael@stroeder.comjengelh@inai.dejengelh@inai.dehguo@suse.comcrrodriguez@opensuse.orgmichael@stroeder.comhguo@suse.comhoward@localhostjengelh@inai.demeissner@suse.comledest@gmail.comjengelh@inai.de- Use the name from the cached entries when updating them to avoid capitalization problems; (bsc#1223050); Add patch 0011-SYSDB-Use-SYSDB_NAME-from-cached-entry-when-updating.patch- Fix possible race evaluating GPO based access policies; (CVE-2023-3758); (bsc#1223100); Add patch 0010-ad-gpo-use-hash-to-store-intermediate-results.patch- Update shadowLastChanged attribute during LDAP password change; (bsc#1218537); Add patch 0009-Update-shadowLastChanged-attribute-during-LDAP-passw.patch- Decrease sudo responder log level when searching non-existent entries; (bsc#1216907); Add patch 0008-SUDO-decrease-log-level-in-case-object-wasn-t-found.patch- Only send cldap-ping to our local domain; (bsc#1217319); (gh#SSSD/sssd#5822); - Do not write kdc info file for GC lookup; (bsc#1217319); (gh#SSSD/sssd#5956); - Add patch 0007-bsc1217319-gh5875-gh5956.patch- ldap password policy: return failure if there are no grace logins left; (bsc#1214434); Add patch 0006-ldap-return-failure-if-there-are-no-grace-logins-lef.patch- Fix sssd entering failed state under heavy load by adding watchdog to monitor sbus_call_DBus_Hello_send(); (bsc#1213283); Add patch 0001-sssd-watchdog.patch- Fix build with MIT 1.20; Add patch 0004-BUILD-Accept-krb5-1.20-for-building-the-PAC-plugin.patch- Fix sdap_access_host No matching host rule found; (bsc#1202559); Add patch 0001-Fix-sdap_access_host-No-matching-host-rule-found.patch- Fix shell command injection in sssctl via the logs-fetch and cache-expire subcommands; (CVE-2021-3621); (bsc#1189492); Add 0002-TOOLS-replace-system-with-execvp-to-avoid-execution-.patch- Add 'ldap_ignore_unreadable_references' parameter to skip unreadable objects referenced by 'member' attributte; (bsc#1190775); (gh#SSSD/sssd#4893); Add patch 0001-ldap-ignore-unreadable-references.patch- Fix 32-bit libraries package. Libraries were moved from sssd to sssd-common to fix bsc#1182058 and baselibs.conf was not updated accordingly; (bsc#1196166);- Remove caches only when performing a package downgrade. The sssd daemon takes care of upgrading the database format when necessary (bsc#1195552)- Update the private ldb modules installation following libldb2 changes from /usr/lib64/ldb/samba to /usr/lib64/ldb2/modules/ldb/samba- Remove libsmbclient-devel BuildRequires in favor of pkgconfig(smbclient)- Update to version 2.5.2; (jsc#SLE-17763); * originalADgidNumber attribute in the SSSD cache is now indexed. * Add new config option fallback_to_nss. - Changes from version 2.5.1 * auto_private_groups option can be set centrally through ID range setting in IPA (see ipa idrange commands family). This feature requires SSSD update on both client and server. This feature also requires freeipa 4.9.4 and newer. * Fix getsidbyname issues with IPA users with a user-private-group. * Default value of ldap_sudo_random_offset changed to 0 (disabled). This makes sure that sudo rules are available as soon as possible after SSSD start in default configuration. - Changes from version 2.5.0 * Added support for automatic renewal of renewable TGTs that are stored in KCM ccache. This can be enabled by setting tgt_renewal = true. See the sssd-kcm man page for more details. This feature requires MIT Kerberos krb5-1.19-0.beta2.3 or higher. * Backround sudo periodic tasks (smart and full refresh) periods are now extended by a random offset to spread the load on the server in environments with many clients. * Completing a sudo full refresh now postpones the smart refresh by ldap_sudo_smart_refresh_interval value. This ensure that the smart refresh is not run too soon after a successful full refresh. * If debug_backtrace_enabled is set to true then on any error all prior debug messages (to some limit) are printed even if debug_level is set to low value. * Besides trusted domains known by the forest root, trusted domains known by the local domain are used as well. * New configuration option offline_timeout_random_offset to control random factor in backend probing interval when SSSD is in offline mode. * ad_gpo_implicit_deny is now respected even if there are no applicable GPOs present. * During the IPA subdomains request a failure in reading a single specific configuration option is not considered fatal and the request will continue. * Unknown IPA id-range types are not considered as an error - Changes from version 2.4.2 * Default value of "user" config option was fixed into accordance with man page, i.e. default is "root". * pam_sss_gss now support authentication indicators to further harden the authentication. - Changes from version 2.4.1 * New PAM module pam_sss_gss for authentication using GSSAPI. * case_sensitive=Preserving can now be set for trusted domains with AD and IPA providers. * krb5_use_subdomain_realm=True can now be used when sub-domain user principal names have upnSuffixes which are not known in the parent domain. SSSD will try to send the Kerberos request directly to a KDC of the sub-domain. * SYSLOG_IDENTIFIER was renamed to SSSD_PRG_NAME in journald output, to avoid issues with PID parsing in rsyslog (BSD-style forwarder) output. * Added pam_gssapi_check_upn to enforce authentication only with principal that can be associated with target user. * Added pam_gssapi_services to list PAM services that can authenticate using GSSAPI. - Changes from version 2.4.0 * Session recording can now exclude specific users or groups when scope is set to all (see exclude_users and exclude_groups options). * Active Directory provider now sends CLDAP pings over UDP protocol to Domain Controllers in parallel to determine site and forest to speed up server discovery. - Changes from version 2.3.1 * Domains can be now explicitly enabled or disabled using enable option in domain section. This can be especially used in configuration snippets. * New configuration options memcache_size_passwd, memcache_size_group, memcache_size_initgroups that can be used to control memory cache size. * Fixed several regressions in GPO processing introduced in sssd-2.3.0 * Fixed regression in PAM responder: failures in cache only lookups are no longer considered fatal. * Fixed regression in proxy provider: pwfield=x is now default value only for sssd-shadowutils target. - Changes from version 2.3.0 * SSSD can now handle hosts and networks nsswitch databases (see resolve_provider option). * By default, authentication request only refresh user's initgroups if it is expired or there is not active user's session (see pam_initgroups_scheme option). * OpenSSL is used as default crypto provider, NSS is deprecated. * The AD provider now defaults to GSS-SPNEGO SASL mechanism (see ldap_sasl_mech option). * The AD provider can now be configured to use only ldaps port (see ad_use_ldaps option). * SSSD now accepts host entries from GPO's security filter. * New debug level (0x10000) added for low level LDB messages only (see sssd.conf man page). - Changes from version 2.2.3 * allow_missing_name now treats empty strings the same as missing names. * "soft_ocsp" and "soft_crl" options have been added to make the checks for revoked certificates more flexible if the system is offline. * Smart card authentication in polkit is now allowed by default. * Handling of FreeIPA users and groups containing ‘@’ sign now works. * Issue when autofs was unable to mount shares was fixed. * SSSD was unable to hande ldap_uri containing URIs with different port numbers, which has been rectified. - Changes from version 2.2.2 * Removing domain from ad_enabled_domain was not reflected in SSSD’s cache. This has been fixed. * Because of a race condition SSSD could crash during shutdown. The race condition was fixed. * Fixed a bug that limited number of external groups fetched by SSSD to 2000. * pam_sss now properly creates gnome keyring during login. * SSSD with KCM could wrongly pick older ccache instead of the latest one after login. This was fixed. - Changes from version 2.2.1 * New options were added which allow sssd-kcm to handle bigger data. * SSSD can now automatically refresh cached user data from subdomains in IPA/AD trust. * Fixed issue with SSSD hanging when connecting to non-responsive server with ldaps://. * SSSD is now restarted by systemd after crashes. * Fixed refression when dyndns_update was set to True and dyndns_refresh_interval was not set or set to 0 then DNS records were not updated at all. * Fixed issue when default_domain_suffix was used with files provider and caused all results from files domain to be fully qualified. * Fixed issue with sudo rules not being visible on OpenLDAP servers * Fixed crash with auth_provider = proxy that prevented logins - Changes from version 2.2.0 * The Kerberos provider can now include more KDC addresses or host names when writing data for the Kerberos locator plugin. * The 2FA prompting can now be configured. * The LDAP authentication provider now allows to use a different method of changing LDAP passwords using a modify operation in addition to the default extended operation. * The "auto_private_groups" configuration option now takes a new value hybrid. * A new option "ad_gpo_ignore_unreadable" was added. * The "cached_auth_timeout" parameter is now inherited by trusted domains. * The "ldap_sasl_mech" option now accepts another mechanism "GSS-SPNEGO" in addition to "GSSAPI". * The sssctl tool has two new commands, "cert-show" and "cert-map". - Changes from version 2.1.0 * Any provider can now match and map certificates to user identities. * pam_sss can now be configured to only perform Smart Card authentication or return an error if this is not possible. * pam_sss can also prompt the user to insert a Smart Card if, during an authentication it is not available. * It is now possible to refresh the KCM configuration without restarting the whole SSSD deamon * A new configuration option ad_gpo_implicit_deny was added. This option (when set to True) can be used to deny access to users even if there is not applicable GPO. * The dynamic DNS update can now batch DNS updates to include all address family updates in a single transaction. - Changes from version 2.0.0 * The Python API for managing users and groups in local domains (id_provider=local) was removed completely. The local provider (id_provider=local) and the command line tools to manage users and groups in the local domains, such as sss_useradd is not built anymore. * The LDAP provider had a special-case branch for evaluating group memberships with the RFC2307bis schema when group nesting was explicitly disabled. This codepath is removed. * The ldap_groups_use_matching_rule_in_chain and ldap_initgroups_use_matching_rule_in_chain options and the code that evaluated them was removed. * The "ldap_sudo_include_regexp" option changed its default value from true to false. Wildcards in the sudoHost LDAP attribute are no longer evaluated. This was costly to evaluate on the LDAP server side and at the same time rarely used. * The KCM responder has a new back end to store credential caches in a local database * The list of PAM services which are allowed to authenticate using a Smart Card is now configurable using a new option pam_p11_allowed_services. - Make cifs-idmap plugin (idmapwb.so) use update-alternatives mechanism to be able to switch between cifs-utils and sssd; (bsc#1182682). - Build sssd's KCM - Drop obsolete patches: + 0001-SUDO-Create-the-socket-with-stricter-permissions.patch + 0002-intg-Do-not-hardcode-nsslibdir.patch + 0003-MONITOR-Do-not-use-two-configuration-databases.patch + 0004-Strip-whitespaces-in-netgroup-triple.patch + 0005-nss-sssd-returns-for-emtpy-home-directories.patch + 0006-Rotate-child-log-files.patch + 0007-nss-add-a-netgroup-counter-to-struct-nss_enum_index.patch + 0008-nss-initialize-nss_enum_index-in-nss_setnetgrent.patch + 0009-NSS-nss_clear_netgroup_hash_table-do-not-free-data.patch + 0010-SUDO-Allow-defaults-sudoRole-without-sudoUser-attrib.patch + 0011-GPO-Add-option-ad_gpo_ignore_unreadable.patch + 0012-nss-use-enumeration-context-as-talloc-parent-for-cac.patch + 0013-Revert-LDAP-IPA-add-local-email-address-to-aliases.patch + 0014-util-Remove-the-unused-function-is_email_from_domain.patch + 0015-MONITOR-Propagate-error-when-resolv.conf-does-not-ex.patch + 0016-MONITOR-Add-a-new-option-to-control-resolv.conf-moni.patch + 0017-MONITOR-Resolve-symlinks-setting-the-inotify-watcher.patch + 0018-SYSDB-Delete-linked-local-user-overrides-when-deleti.patch + 0019-winbind-idmap-plugin-support-inferface-version-6.patch + 0020-winbind-idmap-plugin-fix-detection.patch + 0021-nss-imap-add-sss_nss_getsidbyuid-and-sss_nss_getsidb.patch + 0022-cifs-idmap-plugin-use-new-sss_nss_idmap-calls.patch + 0023-winbind-idmap-plugin-use-new-sss_nss_idmap-calls.patch + 0024-libwbclient-sssd-use-new-sss_nss_idmap-calls.patch + 0025-pysss_nss_idmap-add-python-bindings-for-new-sss_nss_.patch + 0026-winbind-idmap-plugin-update-struct-idmap_domain-to-l.patch + 0027-utils-make-N_ELEMENTS-public.patch + 0028-ad-replace-ARRAY_SIZE-with-N_ELEMENTS.patch + sssd-gpo_host_security_filter-1.16.1.patch + 0001-Resolve-computer-lookup-failure-when-sam-cn.patch + 0031-ad-Add-support-for-passing-add-samba-data-to-adcli.patch + 0032-AD-use-getaddrinfo-with-AI_CANONNAME-to-find-the-FQD.patch + 0033-Fix-build-failure-against-samba-4.12.0rc1.patch + 0034-Use-ndr_pull_steal_switch_value-for-modern-samba-ver.patch + 0035-ad_gpo_ndr.c-refresh-ndr_-methods-from-samba-4.12.patch + 0036-ad_gpo_ndr.c-more-ndr-updates.patch + 0037-UTIL-Fix-compilation-with-curl-7.62.0.patch + 0038-CACHE-Create-timestamp-if-missing.patch + 0039-sss_cache-Do-not-fail-for-missing-domains.patch- Fix sss_cache spurious error messages when invoked from shadow-utils; (bsc#1185017); Add 0039-sss_cache-Do-not-fail-for-missing-domains.patch- Use /run instead of /var/run for daemon PID files; (bsc#1185185);- Create timestamp attribute in cache objects if missing; (bsc#1182637); Add 0038-CACHE-Create-timestamp-if-missing.patch- Move sssctl command from sssd to sssd-tools package; (bsc#1184289);- Fix a dependency loop by moving internal libraries to sssd-common package; (bsc#1182058);- Fix build against samba >= 4.12 + 0033-Fix-build-failure-against-samba-4.12.0rc1.patch + 0034-Use-ndr_pull_steal_switch_value-for-modern-samba-ver.patch + 0035-ad_gpo_ndr.c-refresh-ndr_-methods-from-samba-4.12.patch + 0036-ad_gpo_ndr.c-more-ndr-updates.patch - Fix build with curl >= 7.62.0 + 0037-UTIL-Fix-compilation-with-curl-7.62.0.patch- Fix dynamic DNS updates not using FQDN (bsc#1160587); Add 0032-AD-use-getaddrinfo-with-AI_CANONNAME-to-find-the-FQD.patch- Update samba secrets after changing machine password; (jsc#SLE-11503); Add 0031-ad-Add-support-for-passing-add-samba-data-to-adcli.patch- Install infopipe dbus service (bsc#1106598)- SSSD GPO host entries are ignored if computer cn does not match it's samaccountname, add 0001-Resolve-computer-lookup-failure-when-sam-cn.patch; (jsc#SLE-9298); (bsc#1160688)- SSSD should accept host entries from GPO's security filter, add sssd-gpo_host_security_filter-1.16.1.patch; (jsc#SLE-9298)- Fix building with newer samba versions (bsc#1137876) - Added patches: * 0027-utils-make-N_ELEMENTS-public.patch * 0028-ad-replace-ARRAY_SIZE-with-N_ELEMENTS.patch- Update winbind idmap plugin to support interface version 6 (jsc#SLE-9819) - Added patches: * 0019-winbind-idmap-plugin-support-inferface-version-6.patch * 0020-winbind-idmap-plugin-fix-detection.patch * 0021-nss-imap-add-sss_nss_getsidbyuid-and-sss_nss_getsidb.patch * 0022-cifs-idmap-plugin-use-new-sss_nss_idmap-calls.patch * 0023-winbind-idmap-plugin-use-new-sss_nss_idmap-calls.patch * 0024-libwbclient-sssd-use-new-sss_nss_idmap-calls.patch * 0025-pysss_nss_idmap-add-python-bindings-for-new-sss_nss_.patch * 0026-winbind-idmap-plugin-update-struct-idmap_domain-to-l.patch- Delete linked local user overrides when deleting a user (bsc#1133168) - Added patches: * 0018-SYSDB-Delete-linked-local-user-overrides-when-deleti.patch- Fix domain offline after first boot when resolv.conf is a symlink (bsc#1136139) - Added patches: * 0015-MONITOR-Propagate-error-when-resolv.conf-does-not-ex.patch * 0016-MONITOR-Add-a-new-option-to-control-resolv.conf-moni.patch * 0017-MONITOR-Resolve-symlinks-setting-the-inotify-watcher.patch- Fix login not possible when email address is duplicated in ldap attributes (bsc#1149597) - Added patches: * 0013-Revert-LDAP-IPA-add-local-email-address-to-aliases.patch * 0014-util-Remove-the-unused-function-is_email_from_domain.patch- Fix memory leak in nss netgroup enumeration (bsc#1139247); - Added patches: * 0012-nss-use-enumeration-context-as-talloc-parent-for-cac.patch- Allow defaults sudoRole without sudoUser attribute (bsc#1135247) - Added an option to skip GPOs that have groupPolicyContainers, unreadable by SSSD (bsc#1124194) (CVE-2018-16838) - Added patches: * 0010-SUDO-Allow-defaults-sudoRole-without-sudoUser-attrib.patch * 0011-GPO-Add-option-ad_gpo_ignore_unreadable.patch- Create directory to download and cache GPOs (bsc#1132879) - Add a netgroup counter to struct nss_enum_index (bsc#1132657) - Added patches: * 0007-nss-add-a-netgroup-counter-to-struct-nss_enum_index.patch * 0008-nss-initialize-nss_enum_index-in-nss_setnetgrent.patch * 0009-NSS-nss_clear_netgroup_hash_table-do-not-free-data.patch- Rotate child debug file descriptors on SIGHUP (bsc#1080156) - Added patches: * 0006-Rotate-child-log-files.patch- Fix fallback_homedir returning '/' for empty home directories (CVE-2019-3811) (bsc#1121759) - Install logrotate configuration (bsc#1004220) - Strip whitespaces in netgroup triples (bsc#1087320) - Align systemd service file with upstream * Run interactive and change service type to notify (bsc#1120852) * Replace deprecated '-f' and use '--logger' - Fix sssd not starting in foreground mode (bsc#1125277) - Added patches: * 0003-MONITOR-Do-not-use-two-configuration-databases.patch * 0004-Strip-whitespaces-in-netgroup-triple.patch * 0005-nss-sssd-returns-for-emtpy-home-directories.patch- Added dependency to adcli for sssd-ad (fate#326619, bsc#1109849)- Introduce patches: * Create sockets with right permissions: 0001-SUDO-Create-the-socket-with-stricter-permissions.patch (bsc#1098377, CVE-2018-10852) * Fix for sssd upstream integration tests 0002-intg-Do-not-hardcode-nsslibdir.patch (bsc#1098163)- Update to new minor upstream release 1.16.1 (fate#323340): New Features: * A new option auto_private_groups was added. If this option is enabled, SSSD will automatically create user private groups based on user’s UID number. The GID number is ignored in this case. * The SSSD smart card integration now supports a special type of PAM conversation implemented by GDM which allows the user to select the appropriate smrt card certificate in GDM. * A new API for accessing user and group information was added. This API is similar to the tradiional Name Service Switch API, but allows the consumer to talk to SSSD directly as well as to fine-tune the query with e.g. how cache should be evaluated. * The sssctl command line tool gained a new command access-report, which can generate who can access the client machine. Currently only generating the report on an IPA client based on HBAC rules is supported. * The hostid provider was moved from the IPA specific code to the generic LDAP code. This allows SSH host keys to be access by the generic LDAP provider as well. See the ldap_host_* options in the sssd-ldap manual page for more details. * Setting the memcache_timeout option to 0 disabled creating the memory cache files altogether. This can be useful in cases there is a bug in the memory cache that needs working around.- Updated sssd.spec: The IPA provider depends on AD provider's PAC executable, hence introducing the package dependency. (bsc#1021441, bsc#1062124)- Remove package descriptions for the python 2 packages that are no longer distributed: * python-ipa_hbac * python-sss-murmur * python-sss_nss_idmap * python-sssd-config - Correct python version dependency of tools package. (bsc#1082108)- Correct dependency of sss_obfuscate command line program.- In an ongoing effort to reduce dependency on python version 2, the following python libraries are no longer built. Nevertheless their python3 counterparts remain in place: * python-ipa_hbac * python-sss-murmur * python-sss_nss_idmap * python-sssd-config- Update to new upstream release 1.16.0 Security fixes * This release fixes CVE-2017-12173: Unsanitized input when searching in local cache database. SSSD stores its cached data in an LDAP like local database file using libldb. To lookup cached data LDAP search filters like (objectClass=user)(name=user_name) are used. However, in sysdb_search_user_by_upn_res(), the input was not sanitized and allowed to manipulate the search filter for cache lookups. This would allow a logged in user to discover the password hash of a different user. New Features * SSSD now supports session recording configuration through tlog. This feature enables recording of everything specific users see or type during their sessions on a text terminal. For more information, see the sssd-session-recording(5) manual page. * SSSD can act as a client agent to deliver Fleet Commander policies defined on an IPA server. Fleet Commander provides a configuration management interface that is controlled centrally and that covers desktop, applications and network configuration. * Several new systemtap probes were added into various locations in SSSD code to assist in troubleshooting and analyzing performance related issues. Please see the sssd-systemtap(5) manual page for more information. * A new LDAP provide access control mechanism that allows to restrict access based on PAM's rhost data field was added. For more details, please consult the sssd-ldap(5) manual page, in particular the options ldap_user_authorized_rhost and the rhost value of ldap_access_filter.- Update to new upstream release 1.15.3 (KCM disabled) New Features * In a setup where an IPA domain trusts an Active Directory domain, it is now possible to define the domain resolution order (see http://www.freeipa.org/page/Releases/4.5.0#AD_User_Short_Names). * Design page - Shortnames in trusted domains * SSSD ships with a new service called KCM. This service acts as a storage for Kerberos tickets when "libkrb5" is configured to use "KCM:" in "krb5.conf". * Design page - KCM server for SSSD * NOTE: There are several known issues in the "KCM" responder that will be handled in the next release. * Support for user and group resolution through the D-Bus interface and authentication and/or authorization through the PAM interface even for setups without UIDs or Windows SIDs present on the LDAP directory side. This enhancement allows SSSD to be used together with apache modules to provide identities for applications * Design page - Support for non-POSIX users and groups * SSSD ships a new public library called "libsss_certmap" that allows a flexible and configurable way of mapping a certificate to a user identity. * Design page - Matching and Mapping Certificates * The Kerberos locator plugin can be disabled using an environment variable "SSSD_KRB5_LOCATOR_DISABLE". Please refer to the "sssd_krb5_locator_plugin" manual page for mode details. * The "sssctl" command line tool supports a new command "user-checks" that enables the administrator to check whether a certain user should be allowed or denied access to a certain PAM service. * The "secrets" responder now forwards requests to a proxy Custodia back end over a secure channel.- Introduce mandatory runtime requirement "cyrus-sasl-gssapi" to krb5-common sub-package. Address bsc#1024836.- Update to new upstream release 1.15.2 * It is now possible to configure certain parameters of a trusted domain in a configuration file sub-section. * Several issues related to socket-activating the NSS service, especially if SSSD was configured to use a non-privileged userm were fixed. The NSS service now does not change the ownership of its log files to avoid triggering a name-service lookup while the NSS service is not running yet. Additionally, the NSS service is started before any other service to make sure username resolution works and the other service can resolve the SSSD user correctly. * A new option "cache_first" allows the administrator to change the way multiple domains are searched. When this option is enabled, SSSD will first try to "pin" the requested name or ID to a domain by searching the entries that are already cached and contact the domain that contains the cached entry first. Previously, SSSD would check the cache and the remote server for each domain. This option brings performance benefit for setups that use multiple domains (even auto-discovered trusted domains), especially for ID lookups that would previously iterate over all domains. Please note that this option must be enabled with care as the administrator must ensure that the ID space of domains does not overlap. * The SSSD D-Bus interface gained two new methods: "FindByNameAndCertificate" and "ListByCertificate". These methods will be used primarily by IPA and `mod_lookup_identity to correctly match multple users who use the same certificate for Smart Card login. * A bug where SSSD did not properly sanitize a username with a newline character in it was fixed.- Switch *all* URLs after fedorahosted.org retirement- Updated project URL - Update to new upstream release 1.15.1 * Several issues related to starting the SSSD services on-demand via socket activation were fixed. In particular, it is no longer possible to have a service started both by sssd and socket-activated. Another bug which might have caused the responder to start before SSSD started and cause issues especially on system startup was fixed. * A new 'files' provider was added. This provider mirrors the contents of '/etc/passwd' and '/etc/shadow' into the SSSD database. The purpose of this new provider is to make it possible to use SSSD's interfaces, such as the D-Bus interface for local users and enable leveraging the in-memory fast cache for local users as well, as a replacement for `nscd`. In future, we intend to extend the D-Bus interface to also provide setting and retrieving additional custom attributes for the files users. * SSSD now autogenerates a fallback configuration that enables the files domain if no SSSD configuration exists. This allows distributions to enable the 'sssd' service when the SSSD package is installed. Please note that SSSD must be build with the configuration option '--enable-files-domain' for this functionality to be enabled. * Support for public-key authentication with Kerberos (PKINIT) was added. This support will enable users who authenticate with a Smart Card to obtain a Kerberos ticket during authentication.- Remove obsolete insserv call- Added /etc/sssd/conf.d/ for configuration snippets- Removed 0001-krb5-1.15-build-fix.patch obsoleted by upstream update - Update to new upstream release 1.15.0 * SSSD now allows the responders to be activated by the systemd service manager and exit when idle. This means the services line in sssd.conf is optional and the responders can be started on-demand, simplifying the sssd configuration. Please note that this change is backwards-compatible and the responders listed explicitly in sssd.conf's services line are managed by sssd in the same manner as in previous releases. Please refer to man sssd.conf(5) for more information * The sudo provider is no longer disabled for configurations that do not explicitly include the sudo responder in the services list. In order to disable the sudo-related back end code that executes the periodic LDAP queries, set the sudo_provider to none explicitly * The watchdog signal handler no longer uses signal-unsafe functions. This bug was causing a deadlock in case the watchdog was about to kill a stuck process * A bug that prevented TLS to be set up correctly on systems where libldap links with GnuTLS was fixed * The functionality to alter SSSD configuration through the D-Bus interface provided by the IFP responder was removed. This functionality was not used to the best of our knowledge, had no tests and prevented the InfoPipe responder from running as a non-privileged user. * A bug that prevented statically-linked applications from using libnss_sss was fixed by removing dependency on -lpthreads from the libnss_sss library (please see https://sourceware.org/bugzilla/show_bug.cgi?id=20500 for an example on why linking with -lpthread from an NSS modules is problematic) * Previously, SSSD did not ignore GPOs that were missing the gPCFunctionalityVersion attribute and failed the whole GPO processing. Starting with this version, the GPOs without the gPCFunctionalityVersion are skipped.- BuildRequire pkgconfig(libsystemd) instead of pkgconfig(libsystemd-login): the latter has been deprecated since systemd 209 and finally removed with systemd 230.- Add 0001-krb5-1.15-build-fix.patch to unlock building against future KRB versions.- Update to new upstream release 1.14.2 * Several more regressions caused by cache refactoring to use qualified names internally were fixed, including a regression that prevented the krb5_map_user option from working correctly. * A regression when logging in with a smart card using the GDM login manager was fixed * SSSD now removes the internal timestamp on startup cache when the persistent cache is removed. This enables admins to follow their existing workflow of just removing the persistent cache and start from a fresh slate * Several fixes to the sssd-secrets responder are present in this release * A bug in the autofs responder that prevented automounter maps from being returned when sssd_be was offline was fixed * A similar bug in the NSS responder that prevented netgroups from being returned when sssd_be was offline was fixed * Disabling the netlink integration can now be done with a new option disable_netlink. Previously, the netlink integration could be disabled with a sssd command line switch, which is being deprecated in this release. * The internal watchdog no longer kills sssd processes in case time shifts during sssd runtime * The fail over code is able to cope with concurrent SRV resolution requests better in this release * The proxy provider gained a new option proxy_max_children that allows the administrator to control the maximum number of child helper processes that authenticate users with auth_provider=proxy * The InfoPipe D-Bus responder exports the UUIDs of user and group objects through a uniqueID property- Update to new upstream release 1.14.1 * The IPA provider now supports logins with enterprise principals (also known as additional UPN suffixes). This functionality also enabled Active Directory users from trusted AD domains who use an additional UPN suffix to log in. Please note that this feature requires a recent IPA server. * When a user name is overriden in an IPA domain, resolving a group these users are a member of now returns the overriden user names * Users can be looked up by and log in with their e-mail address as an identifier. In order to do so, an attribute that represents the user's e-mail address is fetched by default. This attribute can by customized by setting the ldap_user_email configuration option. * A new ad_enabled_domains option was added. This option lets the administrator select domains that SSSD should attempt to reach in the AD forest SSSD is joined to. This option is useful for deployments where not all domains are reachable on the network level, yet the administrator needs to access some trusted domains and therefore disabling the subdomains provider completely is not desirable. * The sssctl tool has two new commands active-server and servers that allow the administrator to observe the server that SSSD is bound to and the servers that SSSD autodiscovered * SSSD used to fail to start when an attribute name is present in both the default SSSD attribute map and the custom ldap_user_extra_attrs map * GPO policy procesing no longer fails if the gPCMachineExtensionNames attribute only contains whitespaces * Several commits fix regressions related to switching all user and group names to fully qualified format, such as running initgroups for a user who is only a member of a primary group * Several patches fix regressions caused by splitting the database into two ldb files, such as when user attributes change without increasing the modifyTimestamp attribute value * systemd unit files are now shipped for the sssd-secrets responder, allowing the responder to be socket-activated. To do so, administrators should enable the sssd-secrets.socket and sssd-secrets.service systemd units. * The sssd binary has a new switch --disable-netlink that lets sssd skip messages from the kernel's netlink interface. * A crash when entries with special characters such as '(' were requested was fixed * The ldap_rfc_2307_fallback_to_local_users option was broken in the previous version. This release fixes the functionality.- Update to new upstream release 1.14.0 * The AD provider is now able to look up users from Active Directory domains by certificate. This change enables logins for Active Directory users with the help of a smart card. * The sss_override tool is now able to add certificates as local overrides in the SSSD cache. Please note that the certificate overrides are stored in the local cache, so removing the cache also removes all the certificates! * Invalid certificates are skipped instead of aborting the whole operation when logging in with a smart card using SSH. * This version allows several OCSP-related options such as the OCSP responder to be configured during smart card authentication. * SSSD is now able to determine the name of the user who logs in from the inserted smart card without having to type in the username. Note that this functionality must be enabled with the allow_missing_name pam_sss option. * The sss_cache command line tool is now able to invalidate SUDO rules with its new -r/-R switches. Note that the sudo rules ar not refreshed with the sss_cache tool immediately. * A new command line tool called sssctl was added. This tool allows to observe the status of SSSD. * A new option local_negative_timeout was added. This option allows the admin to specify the time during which lookups for users that are not handled by SSSD but are present on the system (typically in /etc/passwd and /etc/group) and prevents repeated lookups of local users on the remote server during initgroups operation. * An ID-mapping plugin for the winbind deamon was added. With this plugin, it's possible for winbind to use the same ID-mapping scheme as SSSD uses, producing consistent ID values. - Remove 0001-build-detect-endianness-at-configure-time.patch (included upstream)- Enable PAC responder. PAC is an extension element returned by domain controller, to speed up resolution of authorisation data such as group memberships.- Update to new upstream release 1.13.4 * The IPA sudo provider was reimplemented. The new version reads the data from IPA's LDAP tree (as opposed to the compat tree populated by the slapi-nis plugin that was used previously). The benefit is that deployments which don't require the compat tree for other purposes, such as support for non-SSSD clients can disable those autogenerated LDAP trees to conserve resources that slapi-nis otherwise requires. There should be no visible changes to the end user. * SSSD now has the ability to renew the machine credentials (keytabs) when the ad provider is used. Please note that a recent version of the adcli (0.8 or newer) package is required for this feature to work. * The automatic ID mapping feature was improved so that the administrator is no longer required to manually set the range size in case a RID in the AD domain is larger than the default range size * A potential infinite loop in the NFS ID mapping plugin that was resulting in an excessive memory usage was fixed * Clients that are pinned to a particular AD site using the ad_site option no longer communicate with DCs outside that site during service discovery. * The IPA identity provider is now able to resolve external (typically coming from a trusted AD forest) group members during get-group-information requests. Please note that resolving external group memberships for AD users during the initgroup requests used to work even prior to this update. This feature is mostly useful for cases where an IPA client is using the compat tree to resolve AD trust users. * The IPA ID views feature now works correctly even for deployments without a trust relationship. Previously, the subdomains IPA provider failed to read the views data if no master domain record was created on the IPA server during trust establishment. * A race condition in the client libraries between the SSSD closing the socket as idle and the client application using the socket was fixed. This bug manifested with a Broken Pipe error message on the client. * SSSD is now able to resolve users with the same usernames in different OUs of an AD domain * The smartcard authentication now works properly with gnome-screensaver- Enable internal testsuite- Update to new maintenance release 1.13.3 * A bug that prevented user lookups and logins after migration from winsync to IPA-AD trusts was fixed. * A bug that prevented the ignore_group_members option from working correctly in AD provider setups that use a dedicated primary group (as opposed to a user-private group) was fixed. * Offline detection and offline login timeouts were improved for AD users logging in from a domain trusted by an IPA server. * The AD provider supports setting up autofs_provider=ad .- Update to new upstream release 1.13.2 * Initial support for Smart Card authentication was added. * The PAM prompting was enhanced so that when Two-Factor Authentication is used, both factors (password and token) can be entered separately on separate prompts. * This release supports authenticating againt a KDC proxy.- Update to new upstream release 1.13.1 * Initial support for Smart Card authentication was added. The feature can be activated with the new pam_cert_auth option. * The PAM prompting was enhanced so that when Two-Factor Authentication is used, both factors (password and token) can be entered separately on separate prompts. At the same time, only the long-term password is cached, so offline access would still work using the long term password. * A new command line tool sss_override is present in this release. The tools allows to override attributes on the SSSD side. It's helpful in environment where e.g. some hosts need to have a different view of POSIX attributes than others. Please note that the overrides are stored in the cache as well, so removing the cache will also remove the overrides. * Several enhancements to the dynamic DNS update code. Notably, clients that update multiple interfaces work better with this release. * This release supports authenticating againt a KDC proxy * The fail over code was enhanced so that if a trusted domain is not reachable, only that domain will be marked as inactive but the backed would stay in online mode.- Update to new upstream release 1.13 * Support for separate prompts when using two-factor authentication * Added support for one-way trusts between an IPA and Active Directory environment. (Depends on IPA 4.2) * The fast memory cache now also supports the initgroups operation. * The PAM responder is now capable of caching authentication for configurable period, which might reduce server load in cases where accounts authenticate very frequently. Refer to the "cached_auth_timeout" option in sssd.conf(5). * The Active Directory provider has changed the default value of the "ad_gpo_access_control" option from permissive to enforcing. As a consequence, the GPO access control now affects all clients that set access_provider to ad. In order to restore the previous behaviour, set ad_gpo_access_control to permissive or use a different access_provider type. * Group Policy objects defined in a different AD domain that the computer object is defined in are now supported. * Credential caching and Offline authentication are also available when using two-factor authentication * The Python bindings are now built for both Python2 and Python3. * The LDAP bind timeout, StartTLS timeout and password change timeout are now configurable using the ldap_opt_timeout option.- Kill unused libsss_sudo-devel solvable.- Obsolete/provide libsss_sudo in sssd main package. Sudo capability is an integral feature in SSSD and the library is not supposed to be used separately.- sssd.service: add Before= and Wants=nss-user-lookup.target correct fix for bsc#926961- Update to new upstream release 1.12.5 * The background refresh tasks now supports refreshing users and groups as well. See the "refresh_expired_interval" parameter in the sssd.conf manpage. * A new option subdomain_inherit was added. * When an expired account attempts to log in, a configurable error message can be displayed with sufficient pam_verbosity setting. See the "pam_account_expired_message" option. * OpenLDAP ppolicy can be honored even when an alternate login method (such as SSH key) is used. See the "ldap_access_order" option. * A new option :krb5_map_user" was added, allowing the admin to map UNIX usernames to Kerberos principals. * BUG FIXES: * Fixed AD-specific bugs that resulted in the incorrect set of groups being displayed after the initgroups operation. * Fixes related to the IPA ID views feature. Setups using this should update sssd on both IPA servers and clients. * The AD provider now handles binary GUIDs correctly. * A bug that prevented the `ignore_group_members` parameter to be used with the AD provider was fixed. * The failover code now reads and honors TTL value for SRV queries as well. * Race condition between setting the timeout in the back ends and reading it in the front end during initgroup operation was fixed. This bug affected applications that perform the initgroups(3) operation in multiple processes simultaneously. * Setups that only want to use the domain SSSD is connected to, but not the autodiscovered trusted domains by setting `subdomains_provider=none` now work correctly as long as the domain SID is set manually in the config file. * In case only "allow" rules are used, the simple access provider is now able to skip unresolvable groups. * The GPO access control code now handles situations where user and computer objects were in different domains.- Update to new upstream release 1.12.4 (Changelog highlights following) * This is mostly a bug fixing release with only minor enhancements visible to the end user. * Contains many fixes and enhancements related to the ID views functionality of FreeIPA servers. * Several fixes related to retrieving AD group membership in an IPA-AD trust scenario. * Fixes a bug where the GPO access control previously didn't work at all if debugging was enabled in smb.conf. * SSSD can now be pinned to a particular AD site instead of autodiscovering the site. * A regression that caused setting the SELinux context for IPA users to fail, was fixed. * Fixed a potential crash caused by a double-free error when an SSSD service was killed by the monitor process.- A minor rpmspec cleanup to get rid of five rpmlint warnings * Remove mentioning of system-wide dbus configuration file from comments. * Remove traditional init script. * Remove compatibility for producing packages on older OpenSUSE releases.- Update to new upstream release 1.12.3 * SSSD now allows the IPA client to move from one ID view to another after SSSD restart. * It is possible to apply ID views to IPA domains as well. Previous SSSD versions only allowed views to be applied to AD trusted domains. * Overriding SSH public keys is supported in this release. * Move semanage related functions to a separate library.- build with PIE- fix bashism in postun script- Update to new upstream release 1.12.2 (bugfix release, bnc#900159) * Fixed a regression where the IPA provider did not fetch User Private Groups correctly * An important bug in the GPO access control which resulted in a wrong principal being used, was fixed. * Several new options are available for deployments that need to restrict a certain PAM service from connecting to a certain SSSD domain. For more details, see the description of pam_trusted_users and pam_public_domains options in the sssd.conf(5) man page and the domains option in the pam_sss(8) man page. * When SSSD is acting as an IPA client in setup with trusted AD domains, it is able to return group members or full group memberships for users from trusted AD domains. * Support for the "views" feature of IPA. - Remove 0001-build-call-AC_BUILD_AUX_DIR-before-anything-else.patch (merged upstream)xinomavro 1728896487  2.5.2-150500.10.22.22.5.2-150500.10.22.2    sssdlibsss_ldap.solibsss_ldap_common.socaman5csman5deman5esman5sssd-ldap.5.gzfrman5jaman5sssd-ldap.5.gznlman5ptman5ruman5svman5sssd-ldap.5.gzukman5sssd-ldap.5.gzsssdsssd.api.dsssd-ldap.conf/usr/lib64//usr/lib64/sssd//usr/share/man//usr/share/man/ca//usr/share/man/cs//usr/share/man/de//usr/share/man/es//usr/share/man/es/man5//usr/share/man/fr//usr/share/man/ja//usr/share/man/man5//usr/share/man/nl//usr/share/man/pt//usr/share/man/ru//usr/share/man/sv//usr/share/man/sv/man5//usr/share/man/uk//usr/share/man/uk/man5//usr/share//usr/share/sssd//usr/share/sssd/sssd.api.d/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:35968/SUSE_SLE-15-SP5_Update/1d9182d94e8508f8adeb79f463d8512a-sssd.SUSE_SLE-15-SP5_Updatedrpmxz5ppc64le-suse-linuxdirectoryELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=d1f22e29600ee6dc4d98371fbde9a90b0d549ce1, strippedELF 64-bit LSB shared object, 64-bit PowerPC or cisco 7500, version 1 (SYSV), dynamically linked, BuildID[sha1]=6a65cc81ba5aac68d2a569c88195d253b8e10bf0, strippedtroff or preprocessor input, UTF-8 Unicode text, with very long lines (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)ASCII text PRRRRRRRRRPRR RRRR RRRRRRRRRR RR R RRRRRRR/6g1f}Rutf-83b3a0c1dc87c0cb221d4e59d236b39dba5a71a425a3431f1c28fed4adba97c71? 7zXZ !t/ቿ]"k%P}}ݱ YTwe5er~zߟT.uhf6s$lCb4V!6x9)!?Ң 6-#3sS0`ޏnuxK2^[A 35 J\5.oZmۄԚPvOG,`-}z꼝Q"N {',W`-5 @SW* 3JIbWK>)FEzJ3@aֱUDsh`)D!s?AL^XйS T0-L+/.orWvH{]17>z\*"6)`E%L!^3UZhE->yKeTNRp3V#phc&y 5 ʐ\ܶ{:],}WdgbIaLX=^)Hج(5at?{(`>35|i)n#9iH+kt~R6'V3808^w=2(r"}EuC}Eir˸o'T.ζ7A :Juq*s6w%I\;O1x&GV2?@,f#p.ٳ:adYDmi+~Ir+,/p){ Hl7(,\.{fcnAnW6bHojk'V]UְVD;7G[9QY׬# !JEK W =K히f{e b{sTzhwW{[Dz ®Yqr72D CfuGq u*K}9wB_'gi7JZB|5Td#@|ž S<_I9m>"ө4xX){z=* %ByR H_̏ F\(VY%j呏%N)cQc]=`byzw \ ?Jl+tN4LKZ揰J/[#`㹩`kn%Pm,!HvmZA0kÖřH| Y4RFbҝW Ε[#V_{ς){k)#S%SհgqxRa OגpV-4U;_D>[}܂@]I6钱k~ju@'82KT`R(>R~f8]΀_K1]|VR VU4]Ou2Kp0ZiL8[>Ij٥`!|u㎆4@ q5w{tPm:bNNZgk/+ٛ~ 3UJ `:q׼ZS)G(M^}u3;Oj& }d[/揚}t[R_>?(Z2 3~knBq,<ۅX`A4P/\b] SDDL[7fmvŢ%x8 HA0Vpu&Li0fPܖ'ٮd-6-hcĆi\&mog3sR-)$>'M^_*ee>14B:ى>֦bTe3tzg8I `N|2DsvZpΩv2k[nc{z{x Up#.ȧC,E?qw\lS,E9sWp25 -RgϸC|lХ=w`QY`#x3] E|wI1.)ckNQЎި>X[pXa*8Y눽TĜ3"}O?,|No͚aȷ9JL[e/ m/dDJ8;g\ڌb&|Řmb:F7l@ "5͑-;a3)AzGEsܒ9O~"~~ڴsHyc+6Iyo4X}jhFF+?ieorw$oR+G_A! nfz֬-ln>.ʭl^!2,zÎW4䜽XP} k^~)bCϥtkX}34AHVI[[83V l:!AYq>/P ]vj.b  Zӭ!Jk6!-J?/VE M~./_ U!ߧv4W%.IT@g nAcGPf8[|j&hb?(k*_4*%Ak`9ݰ^lHu&S[9AM?TL CeQ;  ZaO+}l9m Ij7Es D"r*N@~Ww8)C?{j8xHt=twT);1Hi'L*'[;bcZ00ݞ:Djk㚉%:͕&)o55P8 ;8pLO 5 /][C}#s]zwb6FhMWRuU z)n6(Z(wdwp] JZJG&hL)laB%^uB !ViQ9s|l?1P F5IH1{{;߯Nǝ( *~ uGyfSo$}([}UD[yTĐ0jѻ>~6.N!J}SOK*ËA; 7nu\Ǎ۩tG1{ ڝ GkӁXae D^VBTBzGg%Ыv ]7n\O}D4`j:qDPqTTƶǢEX7Z4)R+" Kj}]D*Q nLx/Woe.y]A.SJD!+!;[gjJ~B)ij^Uca!,fL}5umYVI R\Q4YCq*uɕjnsEaWLBò|0Ju%BtQBq#,yZr[Qb 8TFF.Rʽi}w|C [_%9]Q(ɔ='yI&W_ ¶k Pf2K[~5 fCIUY/(Ӭ2݀k^Wsr&3da/$, 0Gr"84Z̕jcZ,UDV$09Xiu..nR6D"^ 0*u^.dǬYX E+2pi۔05ARvy6O,b h0PP L&nz@@dsJ͟, q3hd 7SчT-)GZ^ONyUxzp!5p`L6OV:ᄚD-`"26u)@=e[>$>}vjC=IA ږS+YS B(LUy`ܖ/ ˀ\n+6dŤ4w7w4geN3hщmd){H# 檹O(8Z,fOydq2N C4\Y*֎Ikxפ$뵦)mwl=#Ro༦M+<&7##5}>/8;3=EH~r}$}A,{NInזix4[뇜4.m;<4[}~5]ԔbX#Uxpa L:P5uN3wu4K}}d WPj^ϴ!i1$O^f?Q, ^& kMt]O@xrnʨ`N&gU%0N xw>uI9w1,@ޭzF&qH":1$ U]Yi NRh3}5V<4bbpkȭH%ċ?fN|9Sm}/.St-Rpu_׎\έHr65*T pkQ䫺[O" }ܰ%,~Lk+3` ;OIϑwbn9^M4{S.JE,|p1M/4zvn!y dz *؍Yu7xbQYpYp0"tCD{$o!@SNjWS]]l,MI6&5D." yڶFBՀ7"\'a䇷*O5+  ||s]U [ !(p}2gD0h ~ &";?o !mjAX:P ^O (e}E'̆ OV =W6 Ʌb !3Sƽ%v>!if!!4/|g8UV٠ ̖' MRB;3q5:b 6]S ?VYvMd. T叡<1Til~뿶>!Za%ٱRE9o/Jȫx~b I旙w eqlkae|zԪ6i`~G~40&oW XH&%GdȎ'j"ɂ!n3E$JL3۷pnSäfi6zx% xyvd~ɸ~'~"&Ǧj%'Xꬸqi .CSMM.BZtU_G\6!W_WqS^i_΁ʖޕ*Am?+mSjIPU"/K 7p!yrU|Pq <i)X{఑д0OU =ܺZHЗ.gw؟xsDk}B~:hA BWtS(:sW/$h4q{_!C6\_~S;Nɸ;rGWck/]P6=NM:,b A*+:KXNe0Óc核oH=Ő/aRϜ4C?V -:[P[v^ >`da?Ȍ`oJzNl#}c#LiA_7Sf[sVퟃ9IJ+zMi;Øy1%ǭj>93jɕΰr? '%8 Yۧ"]~K'qkeyKx noi!5w7n4^zht_XDh奫9޾Ȁ$,$adخMn E􉐢ٚKOQ(FX?cG'e xĜ^6ؘ$3tҎy(w{ tko♛| /2RHFRZ|{cs<"쁹J}w7[خ*NxC*I0Sr6G:ZPt_%oXKo|K(%VpQCxe?o)}W+5(pCp4ۿ t>O iPI5n--T25@ϊ~%wƼYvDV"jT@9]敽G̹lJyyzxS N6$ j8O٠>Q2USgTb8m#I눾m7̥!_{d@mq+@0[_c.̵kP|O5Kf1㳶AA2ǞFGIf8!z|݇ ➫Tk] H.Ჾ,y9<?a,3DFf)] H5QgK "c"vTrg+>FZCAEIpoBG2gu}EꉻT((+5 [ ?]uqp.'\#Łm F kq:"tE*sIR& G< l{hbZ*_y#ԛ{p$V;+ͺOR(6;[:B"5:heXMDg'Y<t_2߲3gVϔI"6lƠNW'$=} jB#0rp`>bLQʳǻQ/#[n!O<Ik¹w_lrVֹ|!)fLb&Ĕ$涒pz-DG׹ ͖K\ ] vq97+?oN-w7)P NDL[>5 }z٧gn?Eb?4G"A>bV`vl Fŵu^:pMkVKQ֡k,Ix/2M;7Dk0YѨ1 urn>?j&}^.x l;t,ȅEfF@AD8RnB7F'aQjmyj7%k ϥX'XRQ4ΧC}B479&NVQOF"rJZ/Gh'tw:{o1 !&$k$/>&f.w"N#\Q4}lֹ{< x~uY[EHKY R6K%YKmdLyD5\fג>3oA0l0J/~ `Q{o(0gΧq:$w[vkw@M|hp I䋘=>WoRFe@_ީPMm!?q}a;L "8r8V!vTC PDO[}W>ҕ.W ]u Yn[ Y;0# K1D?X OPK-5e~n/qgM({z%xNZ[e "3wFy',+롺QNN m,L:}U s5G];M?"E@'q0Zbc7&İf~K< rnuXTNC!=yGl:q^Е']V(#AY/mS_lUzenHFO)<cͷ_3 9V\ßϖ_H.vW'L sǤDU#SvTc/3T|pXڦoͨ yӃFC+g#EqĀO(4A핲)Owb8> Sy/>YsB{hډeSg)j]"aA<^z`9m>!!6u $}~]=NJ&u{SG{id/%v2zyI"fV&IBse> _ꔍgmTd5?ƸCoy+F5}9m< \d^}rX Q)57˺9NK;4D'1NuĦ`]W1*c Y4~'}1hm|EƂ52WH]m |hzv=c e1 m$v;哫@nPxO䅚C˦}VD ~^AdTk-!4yG9i@T x!o"iڔ$G#F̣J_Fj~PR4)@1}MW5P r984~%Y3`gY?rX4nc?qwd ;vrF3|TT\PExp7Yx,SowjEډcܲ.gPF;h ?w} N޲rTXm-[ ),sߐ #V>_ \tee6nuKX y5Jjvi\"԰~[ B(.5A?]턴aGxMa_<lP`+KFS%:+czaa_Q9.Tfv85y.W y Օc`P_6qקFUWXldѪ<][}BW $U:bGV.[;EfKkޤ"1,E]1xxL'6M%H!g;i¤IK† U]-sXUcm$sReyQQ"CʂFZUJC͝3Cq)Kz~̫KY[]~{}x4SY̫*tL\e*zsT]-MSE]߿ۏjU%^A4 Pn@R!fFxdYR;r%1P',A7p. č c|`TiQŷjj,3HI)ΡV)1*ޏt_,pob z|,I+.=ꥢo GYSO9iIrdaZ=a%So"n*'<٠ kvbU@XȆSpc땓E~]h"0QeeoGS7}^ti|[0ub2|~^n; (9`OHboO e"RZe-&w,45Ƃj Yb؂S)qoCp#47>FO4[ƓR|Q[vqJYhcs6O׹}rFuezκWOV }!WX xv`<LqC.vIY:55)IM (G@ 3L0/Ji_$[XKgDBq /K UVmMJ"Q!3*\JtEʦF?$g# S)B! DF:d/΍b<? z诓@ݔ Y#=5 (jjK? 4p[H<aH֪l_HzK]'_ĜCNd!j׻ C-poɅjb$o6!H,7vP Ykc8:JA gޱjA'oDqr8hS0息hṪms&L@%QrP߳gsKVF5 T];>A S)B |AtG"Tk'x`Ax VSjws zhx)4m 0c[kG#:&!B\4$7~DވލĴN:Ka KQ~:hO,Xݑ-}BB & _&8%OaЄmj5!A oֆOU-[N./Q|n4>)_Mh:v~OG~慌u/r$#d*8Wƚà61>d* (sJ&kglW91^+G$DWO/ߵ[qlK9.OuQO3Mݦq"`D4I tn!Y7NrӻaG$7֒ilq<@[p3V"_d Qё3ܟ{ބ*)(4:G:)?^e0)оdcUbe (JpUK.p4F'饱4[}2 Jo(ڙZlBzivoj\:mMǔ(j  /9 Y=&&QP )}uM+s~ j(*_U;Qe=.VV'}%+9Lx}>mV4eJxDyws2N"DHpR @C z&"g|(XiWZ:SZ]'>c!KZwmkJ5LLLq3GI b΃ARm)7^.?cKv1t-勇RBiGI21l 觫МSmD=moWH&crύr./& ~*x{EV P R 8c>Osƀ\60`1 L$C8WF HK6PqS8A>K"ulrт3N@>]J_JoST~q/Z^Hg!^yw1f=^kal65`zo^ѻT>oO@ JV`W{2r˰Y^k>WT*hCHrR$1^gp^*:a7']urM2iLA8-_?ztjvc˶7/bAG$?ӠٿM5{|;Bin%,l'+ $@3Oj]MX餵dil8oڂ >q2:r+}=5Cl:Czi< dS(;`vG7B#*Ʒ^O%uK ]gl| +UedNU5ZS*xTJ GEP8п!YQ|mTn~|TWЪ>=Ki1zWƷStU^sT}pd/f. Qp} i_>dZ}a腊4{)Tvzaq?ҍF$fZ'l; QTD~ >爻.AϠFߦD+G%AI^dg+L:/" WaG! wbA\|7$0LWBF^aoYForek#evmuڠE&P$ *) Aj*u$;M"@ᡖN_; :0@9yט# n` zJpzBJ(ڳtIQW G"tKl{ EKІ+~THkC"3%).xbOxqIE눑C%2ػfHt-Y4UհKGsfܛ!N߿Bgrʘ'}rKRɧ&ш6%&82W< ~מ mq| qsB/ =̓铹Z{Lao WTPUZČj23ILbhϫ;P?31*HtFrUxXGR XSG^ݲ8IBQD-r p%%P@?D|B:D0Zӗju(A]8tYo:f/=r.'Xs>?"·?ΫA {]'s5ޚMڄw{+ >U.;}wMԅ aRz vj)hH2DzXf‰µ'( EM} ʱg=;ß񐝽Ij$8Z) K'w۪VN8%zE'"p@g16ɲz-\]Qy @^(L F{&U[;B8W94:;=1T>{@TK$>2zHuBp܃Ep%.gϤКyHy=tU-| ١-p703ndqhq ;LZ4nۄ#9#x_,1Z*->~ى`ѬD簛2{՛h#i ȟ}`DƱE2< qOj LN|vޜAsqLC VvD݄b2BZFyI,oȪXPvۍjWpb3}`*5!ᰔ>[?(t aޠ! ߹a{4ͷGC7攱PJڜas#y8(:^{?UC_~Mh&~ae~ӾZC$y̍ɵua/Jp'?NepqMqzHXq2WZX $4QʝuԖ }L552`>Nx`9IV@@)i e&:Lچq>&Ps?ݙ^q9PR&}ۗ1Tt,}X oGLݣbGPE㨦A*왦CcO=Y6@|("0=ۙm+^aŅG9&dUGS|*xmӳ 6{"\2wэ;Aor6x#ڑ9s/Uxy QNծ(/iݐZlz)ПImu Cq >Z4~M|@Qy= ƧdO2V0O7 H~924gawc|@hXDze^l`?T{\/R*c]/ZuY^39q77V}7I]98b "D˙-t@aF'tS1.6ae]"0'a_(Ir5_U9dj*&-/w~hкLK av *XbXX^ۜ2b q'aO]"&?~9\){qUE%7 +EK`Ӂ";BS[sz+"ې6vh*Cb|TI)q;,51&jYz;1pbL邏M :|͡$t$Qݡ;ǖtesWq*×dD wF]ob[ܢ}WY#P>+Rg0~l1g-M 5$o6esߛcCZ/@Tg7 Rd['gẂAPɑev5ߍ4g9~"k{ ז$ߔ$RtӮ?T+WM$`u|@jC2i6E] #b]UdJ|i 9CR,ͅoo`iTsg3dZIȸ#@SLn80r_u7%ziQ9‚'BZE_~z^ 7&M©jq{(c"2nRKaZF`FԼӐ5'i= lE_ @jX⮠< OpV]E"h'DDqf_<+W`5q)wfwڔ#[U^A.6v m>}췓(?rC%hM'8eLN{f"o פZ[!-]0"̧0οFn͕G)qF[\.e" r[_5/WQ5c/*LJFw 9t_@9@Z[<ӯNO_ FUe+A[$]S ,7֙3ʸ}|D]$Ih{NûWg ϟhɘ["3aɀb)'F[ݸuĠZccP'odVČj؆^EwXX.(0L;V}PZ˩%֝,‚8RDž9Lq]_5,uRWfT`04o~po/UPmmgq$7WG*pM."Tn`͠}(&1AK%J6; $>cx. 2ۅܿikB.W|@֍r"|mM,e07=Kx.;<Н'rŅbǯnz(R> KHlIP}{2E$WE1C>Fh^KRJ2NPR0SI3v[:tXAqy"̡ҷ$#Hh1 F5mz󃫑Xg$H{9݇Pc Dz++jb0?T?LJN~=ˎs1J/'u JNE˛fE:ڧtf_{hUE<\+vULW7¯EG5;!/Eu}|'z긾AxDyP5:..uZ#_vń`0HErLJUoM|Ei x!h a d8BWN^Aӕ!ڭo*yzŶP tU=9+</f9HZ&%@}n|Ϧg8[Y(*p-Ktו<2I_&5WJ۸+Nڷ-]@rHfT'кtg%q~,ժ=ek? Ҧ~6!;DS8誔A"~kKo2jM,8S65f1'WX*'r$qIi5M12wUuG;/WAV4W(ɓ|Dwq7B @|#=s[f_W;uj ]=1 ׋gz ~'m3۲8q~YK$Yx<6dU-puvX~Җ-PPN.t8jiN7qweh lZm업\Txtѽla~Y3)S?q4u@76*H)n(Lƕ1[j?SFW Zipetkg]C×V[E#9>u0a"k>Udr9/;'pe+##ؘU5l8gGB% Gq=@ja~y=̭\נiSB0SnDL*=UL0WEA/'-"Ia.1u<^}Oe1?ߙ@Hd2%+:5%Mjh( wN@jWs@|VejW6X,at,rRv[޵|>0XXncu.V*X#|O@?]#b!R}}ND}V uWy9r: uNA+Фe8 Q&ݹfy]?TZ]&N~qt!ɩk 9Ƥb\T>tk.?! -OH]9栺j0V%1[3Jc-TWB2_hKK pDߐYXu_rWY[ RS_g}:Q):eOZ7;N'=.ZR 9MO`cӚRdϺm"}olwhӑ=i!Ҙq>KhK#䈼Ʊ]RVݢ1` `psuto[)gcčm{)Pfxv!| Zy-(4\U uVMz #aຆս {B!Lby[OHw^皛JbvZC<Ŀ=x]D_yu6'[&xa p+$zU^ޞwW8ֿ"Moqa7Au^Gj/.ukϺ-:5{9Ue@rvf_C#ŧHqF0ҷ~Jauy8𤗷 >eozD3{!MkzV:rضh.=Ѕa wAy}>96shn S&ڢfD9 2*^\(33Wl1Apj$9cҲanZ:jSuR%:`x%eRph0Wu0Jf)GjN*]ɵ!-W1̓7u%eB(!dE?~$[uK1D#UGee@q2$M=?R>e":9}r#UNWzVk!.Q<.]4b_U^6? V,1>e[]M%=)zzaHN|E?z'\P{*>?KCs_DwFa+yX0ϗwE8\ "ݖp2mO $9˨L"ݖ2}߿b=qcO> _+s_k3=y;K03-KK|€+1e 'S iaHk) Ǫ9GM vJ ?̅&2<^1z05CCp.T-DcV[9:w47Y*D,7<^w0_SHޚh dž 3t'q3OY t UQP\ Q&BTtMvwbFk@Z6S3O]8k]#w/8ڈ 9#2vƍ$ ^o K`txވh_e Xw~<Y5dkT֩AY "Ml")ޖe0)g II"bw~cTm'\( BEu-]8WG#jɿ,\'/ H@nVݱp-? !90 \Btk]Ի+jH \{N6sq >f ˄߾87! ~>!;Juo նu)-^w"B€1#cqЭWV&H柳Iz㬟njuW|טj!ã$u 6ˎgkP)P (X:P+N#תyN%VRo t<+p~cZ WTLqoLX]YY\,Ou#%5$$[Oᕍ()brufڡ%w]yVs y?SSy )EnӦo!1I;^\s AYY Q;Glk3ۊf /ugjA$2H{|,bLX>uZ^dp͑o#.Bfҋҿ[I]+-ܐ:^CUu"#C-xxbj\P)]1x.ԣ.mDTjs R9N(b Yi"b&Bփm";_|f~ՌQ I382:@RvSgamнwįY X& {lz%$BY=@~ژ˾J5Li/4Rf:{䐽ӢLL8ˆWA:@F&ea|}d[{f(^P7yM 9N螫H"ɨA#!ޤ4"6QUݯBCYj0Q/`B%@6$+ṈBe W4wq˨4U<0=:?ٺx3%/RYSVT q 0D.TY@a.杖^_gdQAp8$~NXޕːWK+bUJO~$T1|r5:r $j C^޾槓7yfS-b{ϰ NCRm 90f$`m.۬ڠ1Өk0}P|jtrk3dWkŅ񾑍QBiA;+%$B%!0VVq(R`3,i&ˋT OiqKSfztBkm[Ks^>1Z~S %bЛςO[Y ͽ%t{a\`1N8⊭^6tRXɘeK}bffj*zGxg4\}TEˈ3B*pAH52gB09pXOVf[D|@;vQn&e>h/>`~{ŀ{ǖ ] (5:ޓ#r ^6Tjݤj;}\ g<_Fc: "}+_ް^MW[ZTxi@"6L4llp'{[|AA0:(.xV8)eCsP$BN&i3k!󘣈42'^]7k`~(-k9G!Up1=e=ֽ"LO9ChM7~Dyj)eOы؀4wS=|u&*TInXr-k,^g҈s7I_%;)sVai+U(3ڙqkkQ߬\0*'ӭDksvNƣw<|Qr"@;ր tSѕ 9mzi[.AU`bJlJo`'mx"[@vQ2L:$3f5Nm]_sbͭ.׽ 4mle'0wLnL#4=``fT'׆)1>2E]s`x-EHN̗;6Iq }=}׽nN15^ SJflV?lU[vk!rAq6)i>Lʚn"/4$ r|Dm*P-52>JgG %p}d9ph՘hd 1M PUw䛃7? 6NI+~ Z;^JeTWiдO B pB30f;xV@t`1B.w埯|jw⬏x6-&gz0 lۺ#tr0<}HPZwB0 nү7J ևk)nrS~g[&W18cp7uN2WCV)5Ȏ~[#ʑĦl0KHgگ-e !{$_ &[燔07)s^q.…z}Z+gP)T5;ג-EQ93?}F6;w}B4d"8kxYr輵wq.u|d-ФvwHZ+vZVSAR@ä{mN"<WB1j=lQK9Brv󄝙zP W" 2>grSƈWCx*N1'6$Wq>?NԌ+wO\ l+oǿC,@12p^:wbPjԗG7P5m;, 'ɉ^xUre3 ٧ ދWBClTDJakK(VmV5u.n|FsInG}KȲ5|h5XvlKFiẸ=h{eAyF6s"uuBvi)(~م2d<숬YGB]v UU%1h5rDȃטr e 5kÔ%K|d.}6^K[hLw}eޑ>d.y^~Fri%e!0csKO7ny^5ƀ[o<- 8@]dm+l5SO ZVZ$j!uq-zr*ѝj{tu&5fKV=h(54UC ǘa1]"|]3R"' `s*#zjUjs4|7L?+(Re", R@KG]:A% ~Eؗ@f=;Ŭo(?qtm҈YoU,$] FM .2sCTࡌ(x'el [o-QY`~`*imfezAK6WGz/79`fu6?W"QeҲ.S " \oym'5[vւ|6w0@Dq kp7bHhzB0c_m泐6HcIc2YX\C@`  q*iXgJ T&.Y=ު |N毭(l4f+!\03:g=ձ"gV 0]GiZz9f% $=K1p2Rdu@B1P'Jޭ\wŋL]ٕF;԰x!y)asZ]AOCmnugƩiCȋK:t]43a/=n9C9̛UHd02Sz~0oa5V=:ʍ)>b4-[)CF7y%?0aT*o0BW#"57UF5"ioMDy|eqJtOrfm 6XRV7B9\Xv:j20J+# )܁ wF k|Xɴ`S K 8Yʄ} :Nm>^\Qi.tі BǮ 3JA=*_OE9NmJbdV>zyQu4N)s|]qH nܽDZRlVo15yԏdh<G}AG1>1s$V(2gŁ+%L,G;2r(z'a _eֽ7py/ac)#nZ_`#eZn//C$}Am<2N aMHOMY1M iavXxm˟vX#EٗHYt;Z"͒>$Lpo_!.F-Ҙ|YCZ?_ld]i=l#f'EF~2BO9>^ !A; v&6ͪFq)V3)E|LkUnFpJ'bG3`0SYib4 "fj eӌ8._{˨y=NVV&_B$l~ԊjӦkpqRFh7TP%=_S ?>2%Esn62ܼR39@1i:,'\̾gF(/;E*#_yVC}{O_ 'm(#]X#P|]3ꠣn"~>偓_S`'UCP7?뙥*l=;ξ.jZG2-`;ucS(jjwpW}pҕwE RbW<K"5NP:qh>4=@'.2Z*I&u1צP(֌WqMRh&7mh  ;ŭVʕSw͢n1q[s ,ǿNi)+/%=J>6N=#LSiܤT˱P܌Өp?] Sq|0l9lY 5 Oa!K,φ$8lXgĴKn˿x$DoQz#l6PMԍ]{W$a=\3ǰ2J !05^rhPRjc%GyQYhtSŐ|ڬXax==k}E2ENwm(֎<w?}w|;vTd l>6IX+"mU0A&5\MAozM2(u5YOAq+ϊTp]x1lF1V{:#nJo=}uDŽl WA韮;pn>є9\3[B 0̛O1\L.-z(bsǾ%ūG0 A>@fh;Rt3~$ xt`:,Sz+Z䗠}03-R[ge -Z@ vsG?hWL'TOn1SxX@q]#8W FNFcxeG\/=>‹mGvDOxKWUķ@^3_M3j%1 OZጺ󆷂Ky$(\R kKiu۵DljȾOrʌ4K;{H|\a[WpZI خ.QjNyfZŮAmh9k庮Q@|QwpӺ_1@5knاw_(*i0k+GLːHX7^ֺ]g)Qs2| cKbomh c(H@M:fѣОW) BUAG'uxORsJW͓;~P2M_C7cmr[Q >ДնOE"JFiy,ه]\#Ö{N2D)4իeȐ-?%@!PP/.hDV_XXz`J.Z&_K2&vg+!o웫<_BZ xLE?n- 0AR3O4ƂIqc9c3 5e}ƚ2|t uQW_kAaaV- Pds|'-gT_ 2i()>5x )GWT ws~ݜK-$^R>|bqVVsjЀTNט Rg#Ʌ%Ǔ&쁬) xqc~Bu ϵX֠ERrH?J!!;>ñ~LѹSS9mHiəHe|LVlwsN/Vm8X]kl(R`U*M9rO&G+q)h^߁Ư_R~U@OZKSp`oN9|3޸Ɂx |w XHXV(j񪆟,7,Fw75 W`uwfI[&MP9 Jj3#3aB`R-QwDe;쥏%=Fc'!s1 - PDa?zZs6y3ݒ BXA/,v^)(g#t 8hvb"$@O/;6J e)p?aʐPXnxXZ/F=0P(L`!*݌"-gs+q,`BawZաҭV>am3:;us |5R=[ziP/ #joEoMߞnd( .fTuKC*sH\fb˂sFX,IUX 6]-w 4 ;f>i(ۊUlQD7~}cq m8Jz2Y4)ɞkv>UL5Z MJd/U2sЁ XF)ݠ3L E )W< !k{?^._v6"ku3כ8xb1H0Enٶ>diL6\@.+jA}V8L8ڕacc7 gϜ}7ѱ" HfOWvݸ<2> {bk8 JB,xBe٧/>_`>`{kQju<9ce/E-('mvF3-R5+*ld՜!c2:y~~7Č=OJCY9\"Uζ[7\ N5j!9R×刣H9(.R Û W}9fnI.ċ7̓IL?4Dd#JoF8k7fC}2IsH*qt,>-w`Q7q;~?~ yu 0Mbh01U5b`UiƇ{a+duf^էcX!@Rw28ub1M^(!ʱ~C 7نr5>:;6]:e-Af񠽠Y1.\33-nO cJ)-?k?r-M~zpU*ϓ!;A. HZp0~ r;SӶdY| WƟ"NoC/cJNRVHKr2c3 nۜzEX4]b?EkFL(B% 6k9CGkU;U)H*+FyP ں{!Q9XK u,-.oz"~dGNfYQnLrŭM/<3<#~Q[\ "[OULeQ̟QG?qv?'0BZ);C4&-QupS'%˝Ӓx(ih.H1GE}2dϒBP Hx/} zUS׉ (UFi}# KwY7RnT<* h:swEz1yNVP-֒ 8jH{9^\&zk4EfA>Wl"xDslx~&~7iͯOgPl !%M ?% X_;DVs8z]Z6??zt>dmYtI$Yt(t\[T(XP@:L#,ZWe 2ZR~@"F-](1 \2eDF9MpNvA v1 TlÒbJ83P? Ȋ"Gi0V7 Zcyi"^k#e3Psv}Ez5^0VF-8붘@pvK-@ڪEW'v#7tFAG{Yz7*iJe)W>! i OZ RH;t%6#m-k 6#`p0mৼqbn]yL#T~NU˖v= .Enܼ=:9}>vL'L ܔ ֑G+٤ݣV1@")jBCVG.d&I|&86- 1"" ((u@+68; v3KvDMW Bz3x !vn8*$1"4fI3@-dobblG( ~r(H0,CTr#,D'/ Sr|ӅVv-oY)%,# 4 '/Bg=뚎K9&T0Ywm砒yք5Q];饆9b[d>pugkt!EuBs^o,6uGu.%u1׬2hKYg6.tk>(uׄ{`w; )2wp7(CYTqyg[sڜ2&MSEC} ⇫wm 9cJs4ͶьpQpĴ Cps|NU5W}_-cWCw;IX嗨LKXgSϐ@/wl˶yA-_㘯TSEܮ]R, XN {]|S..BDx$P F'#bdŊ1?Ou['(:lmY]]=*O*q{9=Ώ7R-[,6E_:>{D.HŲ4!Y?) ɶe4JVɎ*Z&$ "2`L>cD-:"0{n͹ -l2r>ێT0 8\pS၃5Py"sDUb*C@J6Jb¹34R M3^Fk6ФqhasY.;ʞ‚[sK`T 9 IAH6Nr#M T/t~؝i@r(1*؅</B+cX9;d~#Ek Cn<,I'zЌXTdfE/mf}+(Str#T"?0sp{($3PܶLą?ݒa37>Fwٳ (ny\JiOMھvmCk #S7j^CE-sٶBG]K}<`ޗlwPyFhH##h%X$ʟ wN{9pShֽKgĪ Mo έv^__0l\;u -)^:bu! eYY5]M!34nkSva@(i%h,jp;"Ϩ_{r~992}6J+nF˅/},bAtxk ]Y;밄+%hU+ڡF$ }&i0x/gΗvT%8ETr'+MBxYNt߮Z Ȣ8,]},P+7zxCGҪՍ5Z7~V/<"- {QW SA%Xe >ͳ R\p K1>z5̇`hx7raȄ%kc(? g\M7z~ zjs ->rJYG~gq,i;|-+-B?:O86#է&,x3+ Sxф7wlQ6[BPg"36ӟ"rOd ݕ0כ_QVvy()II#[cv\a:U:;us~\4/g$q7u͟|328};'R k&hROkVQR_1Wtxq\}".Iu;:6t2,{e\W(_ZpDѢޭCPxӊybhv .ڈX#}3.vgi]J14ü͚뛿7Wy)4a\`5⳼tW$r+[^@'Z g`˕0RePz(;27&?7d&ꔀ]ZT8& S^m<ħ9a%KW^twDnd씑Ǜˠ!\C*KFER" ]yr<2f(0$Wt%~,3I <P}\1ցBܢ[E{~G "24R}S7JDo?jiɾ F:kYveU' XV M _=]W nlND Nqr_$hSĨ2-H+GՓ5H܇q.erf`/{Z3CKcZ}o4IJ ¤qm&dvP]D(ad*j6fޭۄqI.>ՇBaBe"&Ea!R qvLle1Lm LySUMJ%F{d.uph-u31.g,6! &Ԍ1OcQK)M0V mh,Y@)f*]|h d }UKb?Z9XvP9ěsT:b߳uLI ~Q6ιw-3Oj]| -"B<&ZDtb\aйE=V+ɔUF>ZqIx},8Ȣn(&Cm&Ө)B0^ܑB|nP2L#4k֋bLq5tɽc6 `S4sz*q Ү>EMBJ#ėnUǪ\e%~SfAlkPYjGVrUm0<ӦG,O*T2g@"wMv/Zg7 gK W.J@;qo,ZG20br2/]'wFE9NzVhq%"q9(Y!:7(aܩ4HZSeK>Q0_poE*#H7sIL9%{HIٴ4~{JC}O46˸p]aܗLQBZ @3gE%ƒh&q!Pz" ml\i & nNKbZ8:m[{6znYʮPSÒ&Kʾv*lv-``sDFWCP]TTwVv7o؀=TJ +&iέ;Dz Y# [#\@bk$S ,}Uz 8`˯׳Ϳj<:Ƕ>=9(ja %Pb:dΖ sw_QOCЙzH=o6YĄ >bW\ߓ$"DxAJE$ssyw9rZ+FT+R9(QE!u?D[%5Sc_ꮩ}=Ҩ'PubqY ⛪,0% ,ҰXMXKTJ@LDX TׂeLr R4_wElIo},1d*ÿ|¹qV~߇!Yj fX(zM \Mgva-$e tMLLNmqV%q7o̐zJX*r6.n"͂(LgCRQoB[Wh,tǁݳ ='ƟM!:<H \Akz,PY{M+vKM=[(\ax_BivbߕGgM$$T,#ә"D#ø~]/ιDwlf2=LV̠3ʏ9cgbNc((o_N1TDDʹFtq6]I)DĚgmqSFEn|@蟂yu\d*Ƴ4Hk.O<#Og̶`NY~K%>pĄ!jӰbE[(nR[K ۮ؏_xjj 7_7r rEC.,8ZKHj7n2 : )j2lb7%Ȃ!؏iq vIm"걂(ºөCW1ƪ{ĉum -|ڲsSM#߬췕fÂk݂@Q<%/L)12+{WUs.=pR54Yu+v!(mLSVViv|ТN^5l|?*(u@I8N hL#:F>vӘKVb /H w+`ƶr. Y}Е3 -R\sW1%:nC [|cqs<s&oqNJdZ\C>$[C,bmC 6aJUز+reEtďݡ-@?.`s1q >񡶩M,\)jrIRră` VH=Էkt"s HAM~̾N בT7{pLUu: [1CML7 Xպ(ؕ=>_oeHL.zi}N\!XYRϺp_:O`EPOTx" @CFQr1 >1'J;7^h+NKx,ɿջBNUB&iayB#џ+9T^l梼k9m ,ep[s{n D3>E7` f!롌ȥy,*u 8ϣL5O}uJa %k EH֎,RX,FĻWzT㭇fȖ!w?yeF:)r\Ü(R>:\J)q_^ނ*&?Pc|5Y=r)z\^n@@gqE,Mld(?pj 'ٿ aF߶,$ - _|f/rF#_rlc~|Іvؘl\ ^^+joxoBNGCOEf8#);hCTN'oSN=N@\}Ooi6}:bJp%+ t~f):xxJ<:\@AaK|*!Il**A:xF{CW>a u+(BY/ ԵKHH>0~!dq"LTh.w-SL b0@9~5MSJnm; =i<nr.2BobV漤`U#]3uvU/t]y?4'`'-"'ǹ{)Sv\[kHht+/5ˀSJOa\t,23u<č9,Y>mV^GTՆ s) guyszU[$KY!v0og_8(Q(;l٥fq o#XWW,i"4b\48v#@!_"֣T6q)k&p)bcG-Thβ_oHegu_ԅ[vo' 7~Eat4m (a)yÃA4~Еva҉_Ge;.e!a*.[ZZhYofUL",gpZR;#Ԗ.=\a.@=T,m6^?Ofu 7O,4{X>$QV.acAhz-?9bf`C*RǮN(S Og[%g3XE2JO3)Vb7dmIDe)_zPV댢 +g!anF=L,CG%BKΤaΦ-[W+V/*)Xy?V|9~HY,8)y n[Myb9&*Fs%&ei$ ʥeܯā|:ikt/77% ˶!XY[ 3?'iGj;b(=>!$؆*g6dP>n H;a7g jnUu$& J8}RƠ)D,6Ӟ?QŪ9̙gZ4&10ߜPjp3#iKUݹi EY(ue=AE9VOayv`O^*v񌲶qd`9dqC/ûkR K&@4ݒk ј-=R<.~ՍVo(j#.ByNoX6L <7LW{4_aƞ󷢍[PDma+錮<͟#Ye$Cl~Rxc -IxjވZ/9Z[xܷFHV`\g`jzKe\6vDO}/>vw  PXP@,܏ 1H-v#X}t0p~$l8+kAdJaӍ񅆥(0ϨW_uXp0h3:9jSbHzF' 'Ⰻچ% 2X7gZcjB-?Dly+nt |Xf}af w$E!얄u&& VBwͩ iJ KEN8"]Jxn:}j3dA3]jt> ZtRZnK1C`lK6 oep_ЪȓAb@a 9dbn 3lL}h,m/4gNOvZXz-gxKT%P(vK$"71$53(ij[estˍ6B匥8tu< YDD 3p6K3uJ%塩f|꼼-u*[ -LP j,&sx+#5&- QdZĸBЬm*BmYw >^J'`)COڊ]̏Kgr*{-x> *%pI.d.`DF@Qe/h<=;%oj\`] ?RW*,e}]pN*q$%Pv \Q _c&X71ZBd}o1RNcɊv";E`~(\'޽A171Ө8S]\KWx~O-=tt?l@OgGKYJ?HgP$:Ue6KxE6v*X!hBr z\Lr"!hg+AXGDzMΰ { WCGNqNGbиn4gjmgLKHw@ԜgΗgl׎>qԝd +sj \REȻMGn5%hgqxBپ7KT'=3 K#~4 Wּ[DM=v(#6]2@3P=S*Qu0{,z"CE ǿOΜs2Kiu#fe5w$,5zlRz'+#b7ט-Trij;$Xӽ$|`FV-r8X>$@.5pr5ĜAiv"ۡ#g r)iѝbWWDCnѣĸ6ƆgG XGcGbywOuY;̑cbgQP:IQd 8k$9 pmy#$ؚfU5-D"lyR6ic:95 +feȹeJyU#4ֆ\9[~B?PZ9gl<9s c Sf$5BXE{4B+A_ng_ 1}:'0dUUj^33:}_EIӃAqr59TGxE64?`x>h-9p=a Ux}D̨ PV c&~h~is{( D_@'p[!?n7k j_z2q5r4@Y# }c϶] NticwOigϧ%ot3FTؠ3صR#ym:k,([v~RɄ%/Z6煩Y{~p9"tU*iN |J!49{7qDN7.4է\E41zV r?:[ޓe)(@"ҶLtP0} @Ic6_/=Y]УAxfli$[(Hᵁp6+ЕQK?R X5y{DkZ-7+H&E,8qm(vҒCJѥ| { 8@/u&!FY+d@IKQ{ t4Uzi,VX\x͡-c %?َ~WT I1, {Ty#dbۤ&s =y0v|&Dh6zFxLu+\8uˌKp(7J||^P;.aߑ(@.StooKDaq|8Hy]<N@sTQ欺r؋ɷ+cjT${Q4uZĔ7Vip^Ĉ&c2gO=n3rf<^=j.k4Rb 8o6cdVA|ujU3Oà 3gy}/yyO['dhV 0ڨ%S1!s@8IWVm.RTw@Qz.5C37d_^ZYfNm4hm(s-czFx%l[?kYM]oa%|_^Q{15W^l!ޥ, |+:d-3 Jj-V[fAgz3JJӆ /U'yQD0 Y!ۖ:WV="tK&o o2H ˄$' ]_6Kr ֬]Y2$`rHŀ/~JD8!=&ZHC Z MdAGenl%7KDo=D]~u9y4I@묣 5k,6sWDv`dd+oZYDǀ ,5]]e_i eTN)֛rHVYc$獬'Z1vϷQ$<^j n40^f D!S%*[+Sz=ZywyaDˌkHIyIޡǑ28D;kgbߓ`R+V":5l)=mVC7 ݹy1Go@[(U?g^1kxI$""JzalƂZ.,/J:9P\0-_ȔL#_;?wJُ8/mxG adSd nL" 1۝o.FM_6CDgB1ʹ]V4|݁6zP1JSWGPdϚ&q.o$_r6Du,K"D2ePYb5)Aũ9Y  *2McZ9pu__W9"tP {g**H H\#vO ʓkjc72E\t hqk1, ?~MNditQRB`r6{0}ͫg&NS^-hchs+񊟛g?1 ^pg{VW^y*ѩd%f_#д%=<@%`&Ȯ=vHjE2vMrzg":,DӮH_iNTT\nV`!gCfvQ_LذK/.kDkmX.]\/Di¸tj C. O5W[#PZ.HFG+B* [<ů|DZ~ۓ* tì /j\,ùpq3ӽbNrDW{ۺ+z:>o٦1ڽ*򆐚j¯Ebh}]ƙjn^: ;We)I?=>:>?A{#XM WzP1|\XhJK6=w#j@1tF$ɷqgſzصttE+0ݚ069@…UٟHBgv[!3a0 uIS4<ťbI;EuSP&!Q;Ҋ_Єca2tiPʚ87'ʊ5 A%n!3l{07b(,޵;Č,70qib(󿓴퀭(A$:ݼdV,_Wp}$NW0sw=)Z0D; *N -uK [m44'E~r,B%Dq|[kU~4yͯ; mZ%$I&Qn9g , "$YCt) aj=ݺcQtA9/ݷɎY]k%a4aBgw :ʸp]c1;loYS7 :% @B[ŰH\`1 mǪ\uPYM3&x$yBe@)_q~,J]2+>b} 6b7zIBMRc7K6O(΍%^'OG\y07d T&he9ќذx+M.~O%{DL撚8s8'$VB(6 {s =ps\y|k0*ʻ;}nOy7~;w^)=#X3[u_‰)ӌhd. 01sPgMc -1w>o^ {H"dZ!a”*s8oeRO{AM=~ =c6Ys2B4eMQi0Po7Md Eί=*Pd ئDE(vB qE6-&Xda!d-bx #/;``XI㓤(oY{ aY});4"JMU02ZQN1w ɀ@F?TR۰Y|"KZ4/㙳L6mSw IDp`1o{y`ZgK*ZZGjH7Tl%>lP 53l0" #_wKU11+]";Eo̟eԛfoDざBb}]5r1[0Πd sݸЮ3үM{MQ;~^˖R F90Br9 <gOW?v,o|ο|\م?Hld` pgy}`D]NhߤX\dߐF:/`=ow00W!N;9ٗEv*z!qNΥ_/3ۼEB*0sgOgDm,_c)b'$,х(ui_݂ۡo[s1$S04gڑ+vGW mwGZͫuAPXb7N;߄xak, #]>ބ1!z jS?:0IwI{K/ }/5G). $4f((X 7j $~} Uf&jA zqW 7 8g)<`R*|Ƨ$ĔpͬqБӭD!d\hX$ 4%/o.N^hU_U 8|L:`G1zەӛ:F go"ڵ xy-&2ݪ}-YxUP#5dC} .ǥ^b^ci^mvSwJnw::R.!WWHj+眳ԛ; LHzRfG#W{m5doW!|//NoFlP̷{xDSWk(:aj, 5X/UNƒr$:m[HյI2E|AOzqSqζg:Y߶}=jyMD$A(_&]7Z'&<ͫfTյ*:ְ~7W 4}NZg;Lqrv.(ݏq)P>sB?ƝhbvE-ס'5NS2Gd9ȄK - TJ73LE9Jm>쁀妏U zpL`\|ٹf 3vFEHUE;X|qs" ‚E<(Oko*5EVW:HCPIV֠zp]R D*ȦW$xY]NQưFdڙsq`­+71ffQ1|Ux$eNMEbL?487iS k)[<E9V>s(*c:nɨ| >eAehHŎ\$2vTG}8 Wٮv^YB'𛣩6N:x"Flb jߤ(b6S9]' bge0!ѱbݯ˺ZnQ3w'뤄.t1?+eZ;ڡL]\gvH$E[q F$!1J!HfinZ7 f@e=áG/˞FjeB4Aq(\ur>%RY)P>#"h*vN^w U99@ FGG+H ++Q0\bS+F:,m|ڃL^CrH5P"Vy/K*>fZ<w .P %#91#Lۅ i:2"hi{Z1IEz*d6G=gc@)"}6Gحi(b7P{uԷy.ܟnkzNa FU[V}nH+9U+˳:p"7Ci0޷zD?d|o@jҐ눑g"̲AocWnJb3ȏ('`:]0zu/>\io~+ x6.13T25EDEcA=dF˦rnF[Å=0G׽]_'z^R?Zߘ2b!hoհsif*Q6ܲf R] GX4JC[j9S'9g* P51h_hAbRkb6꼯ikpzjemU{Fd3Ah9,|ޅ Qؤ|ժ*άz6p[6;ڵS#_ͳfc 1¡).zwAnqǧewNAi ʀWطV[L 8dXO&c<esOwp?6/ڰ",qe̠iy@>1PEo>ULCf6G'o`yf}\?fKd0($ V݇NfÿTkgYr8S >ǖbKBE ,/A{7O'^Y$VCz+>'AMp]ˤ1 se)5j)*ޔvl&ipzd#n9@һD}#ODk灋* ^zUkC%.*OYzR.%%FTp~)M%Myn{}p[vt,^Mlu |`sLtqbxۚł2eR߲ge^VH&P]ڜgf!lyR!LKR@͙:d&9kKvP=`x$ÙYM} X.`F?i[z'U!#I|69M XC'_Qc AޘipY}I]UR'z8‹n" 7ܯ_6'X"1 0_FR9L%DJ'b E)33TɬK d&k7 ܙoO&(z\\{(F@Qx=s{_W//;!hYh7 U$TZHQ,w]R}G$=ߩD#VF8˹) +{Ьхi ߿'hH&tmVܰKL.g^r蛆'=aH8P_pY>8@J#:o3Ǚ2տ1q'wL|4 =( }(5YEDCL g+|a0Bg尢ڊO |,[W,yzLSXѧr@Z530ǷdrU¾ĺڽ+I*=/]XUo=f&(+GFkU6o>dg,I"ظʷ7wo*[9ز=LF)$=lpħfM\/{a  MEYZ䧵ukg|L愗*n^6`c~^ q.vh=6n]H -(euڟwoٞ1 +V(Si _!q[+0#uoλeMj"^3d +.ЍޏrOaqYgW/aҝݞ-"px&3q1LivWӝßة3_TۥPz`-!h N/GS4gFJNӜ!#;jlc:[p*<|֥Yc 1/6Vzxa$^^)[;FS}F'ddI!hFL;ň3 .Ef޼)H۟Z(  p1< }9 {-MBMLYk-P8bƌp'zL>,V#Sי /Wd׸eQ.=S ݿdl4-M^7_lEVC{u>tžI}joUAU&W*iУ&ֱ1|8*pDSqdJj lRFh`NmPӻ僰iT(5^)/Kg7wT 2y5W(& bELtaL޴iGm=)Bics {´魯 :#V+zO:j\A Q?aҼhq1'/,"@PEadA(),Z [A"s-;m14 Ww7/֛-ݑāW0cLENH{A[j\-Dt9il_=T_է.$X,/\EϮ?-e: V<>69fuv,oh&fwrN8b:V4%:dxDy:cWhm7PT3a`^b:*Kf{3( 4ғCMi+X9 h$Rog>s_q2q }Dpt=o&0~d U,XCk8e$,p>/~&uc)Z@b{pO)rs sL@`흽ojfh`c;o;ޓO}i}\}xƒHydŎ(ɖ Hl5F\%\ UM M'doǐvAe̅`aBi1v=y< =PG:h6 UKa%\Qo8)S}JL{fee27n3(t$$9 AXxl̈,)|8̓m_U[2U6pr8saLOg9nc[&6i.BEMǖL'†w)ܑAL $*;C:+#Nӌ܍:4z2) ;H\$;A 1_XmMF\~tN>zRTiN*'6LRaN "DL0W溔#Q9by;2m|\MURRَs?DŽ]X[nsӸ2o*vc=~a(OEّ"rY "Y~ǩ"nUJ10uc)щB4-Ib{alxK_8LwOaP1'3BSU0a~̯7!zwa i2WGBD0Y*bPߧjۑvm2عSu˞Ns5W8$ \dX6guVQ Ai&n=o^E+>sYL$)0m9/!.8pBzeD$Lg@+R i~&):p,YqdR#/Q\5 䕠Wؓذ*H揦.2-މBm;QMwQ51cs_p){~o|jxxlʔ7E][jAk"vU*)'Q 1E;9o\S%6J4kuC)8h(Kv<ݴA)8KM] BZ9V+ j,9.\^ 7~v*pL6>6 XfIצ56kݑA\)[5-KǼHg{3-*ZqVk޺Ιm k,S݌&?4 j Fq#&?md0eBBHvx(%U'R!{sr܉5u蔛UmnXNo;vy_ȕIU|d>`<)[C?OԞ5^+yظT$=dS;ZQy.C_ivB}(`#R|`ڽL[m@4 u4N6_>2`EE=s9yv2x3|r67y_`.1:>jZ0VĥKt1"_X2$ƩPob٘qf{9}~E]5c >:8ʽ3M&*։]fUl{z(ѴgF}  }o6▲nA99h4p h}%!FL(+8B#Zͯf7S"Ul jo@ ޲CێIZ =N|{{3+A@5U%e흓䔊)ϖ}IZ\)b^ݜQɎZJ}q hb{3 &_T:-3+ӊfݮ& ;C &FR`EQqlXcfhaNʄӸ?XT,K="#+DC"cMDoӡʅphK`{l+kIbWlAm`vѷFk Bn/XʧqtoA@?>@ތ,[o(c#y`e1(0?>kVG衆DH1XwᠣӔ쉖},@E9y Z“\&]C^hPmv9 g~A^A=is<W3ڍu .ˋ8S0Bc#FG6c5yD&&^@8DteD ұKy¬{ Jq&.B7-P՚Wyi| wptZyؠY''$-&fk xO'eVC> x뤘L'ފ*}y> (}!-)kWxD 6>dg#ehy[nYXv_L>zEn I7v1N:R+?;߅A8GVuUs9)Wu7݈/C>:>j.r쑞~$6FYlk)k<&;L9Aڙ.iW$",{2K]`XU㝅Qf(픅i2|WnE`3S|wP [~.jf|6^!Sa2q#qWߕl ^H'׊92iT]X)zwoݻPVϴL'"?*W?aBai A$%.ב/WI VMoGwy'eeQE={So/e"w*} T>` $@%Rko/3ݹ!!hJPמ6wΊXQWpoNq.qRw\[4 pi$9 a&B -Cž Zt)E*:x\G xZܠ;>z- UWAe9U!x𫾎\RY>Vp p;JEwEqav]\E@կ(ު<[GGb p\pUt| 5kX5Ve%״l+~/ Ë9Ϝ6YE6aф|.3K^Z8$G ~{#HM0xte]H nӷXtf?$yW1Ξ7*GWnբ*€2/%n^$}sVA"j *MnZ.\T`g+:A3=;oЮ:TC/2&j6FJ6#7o'i:kw['8žsWq˦bTP"SU[ײbKJћA<*8êUXlr5~![\WY=uG19R7|^n(ci Z?>؏;j&O#ܳf#7}gGɇ%pw S٧ bc]3HnAQ0S Fl> ~<&jQ 0Ao]V~PՎGQWocuT7G%XG1RYܣY ӑ'"C G#Npi* [D'(]P<_5x'kȆs3Ia!zT3{&vތv$:~|&W<|xO` qz*7%ՎeŕB~Pˋ@tMI0Z+HE`gAVpMMz2`̑`RaZ/,, ҬTsp0o8`>CL/%߃mOۣ5s1P8щ9?S=$&i{Ǝڿ.^G{zBi8 0w|r.dޝ"I@=MGa18n<;fercW_Uv^1u0_~mȩW1"ۏt=P|O7 #QY8tc9ts2,Z`XC]B>pU=kBhKӨw͌)`u닊=9O?PkϥT{A&F1J=c acLtYLjN:l)VafP2\x $6 T}u$^U0nݮԼe%_)Bп7\c@ev ;'Xm 黐jU wƄ6By@Xp*[Z=A K-x.GX`gNLuXl_4d1ꅛ"} Y8x~&%|C EC.YDXƅ!o&>p看9DO Ow$ٵZZ_dCwxa[sɯ TVBBz[Y;j-*[WtF3F^gޖאo@= ,+u{UL=ׅ NM% m^Κ ٰ1ҀҋQI&MJv˩ Z\;-mD^.iXӃ=$GF)ʾ(@ Eg?unS"_H=%FF 2i N&>ˎ?򠂢(8Ra[L ݇7$̲& әy 5L$0CmxhKXYd@^ Ov3-w[;<$6! fWTѧ7g@d;Gj?3>f v;aySa$ƖukuT!Io(R/5+9J,Cws ]⛍)= H(qI#KTG&im<~y ۤ!܈l('RU gaBMC7 !ǰK[h} z6w\d ]֠zڦR.,V*ߥX/aVeX.קJ/< V}^