docker-stable-24.0.9_ce-150000.1.33.1<>,9i)~p9|M1׭S1%BNDi˔ PNdՄ\K)G=ݼG٬?꫺F2L5h0`lVZt+ VL`A$Mzq5>%~'zH00M@3"nft#FqTʯĔ^v\\jڰO&>s?G7Z#, ּ95 2P=4%ۀߝVgТʺ^?OyP>Om|?mld ( Q! 7I^dl t8  8  S\ T8W[_`cPc*dl*gc*ggg(g8g#9l|#:,#==>=?=@=B=F=G>HA`IDXEYEZF[F\F$]It^[b].c]d^We^\f^_l^au^tva wexi yl\zlllm mm m&mhCdocker-stable24.0.9_ce150000.1.33.1The Moby-project Linux container runtimeDocker complements LXC with a high-level API which operates at the process level. It runs unix processes with strong guarantees of isolation and repeatability across servers. Docker is a great building block for automating distributed systems: large-scale web deployments, database clusters, continuous deployment systems, private PaaS, service-oriented architectures, etc.i)~h02-armsrv1;xSUSE Linux Enterprise 15SUSE LLC Apache-2.0https://www.suse.com/System/Managementhttp://www.docker.iolinuxaarch64# /etc/sub[ug]id should exist already (it's part of shadow-utils), but older # distros don't have it. Docker just parses it and doesn't need any special # shadow-utils helpers. touch /etc/subuid /etc/subgid ||: # "useradd -r" doesn't add sub[ug]ids so we manually add some. Hopefully there # aren't any conflicts here, because usermod doesn't provide the same "get # unusued range" feature that dockremap does. grep -q '^dockremap:' /etc/subuid || \ usermod -v 100000000-200000000 dockremap &>/dev/null || \ echo "dockremap:100000000:100000001" >>/etc/subuid ||: grep -q '^dockremap:' /etc/subgid || \ usermod -w 100000000-200000000 dockremap &>/dev/null || \ echo "dockremap:100000000:100000001" >>/etc/subgid ||: if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : for service in docker.service docker.socket ; do sysv_service=${service%.*} if [ ! -e /usr/lib/systemd/system/$service ] && [ ! -e /etc/init.d/$sysv_service ]; then mkdir -p /run/systemd/rpm/needs-preset touch /run/systemd/rpm/needs-preset/$service elif [ -e /etc/init.d/$sysv_service ] && [ ! -e /var/lib/systemd/migrated/$sysv_service ]; then /usr/sbin/systemd-sysv-convert --save $sysv_service || : mkdir -p /run/systemd/rpm/needs-sysv-convert touch /run/systemd/rpm/needs-sysv-convert/$service fi done fi #!/bin/bash tail -n 2 $0 | /usr/sbin/sysusers2shadow RET=$? test -f /.buildenv && exit 0 exit $RET ######## data below ######## g docker - - - - u dockremap - 'docker --userns-remap=default' - - if [ -x /usr/bin/systemctl ]; then test -n "$FIRST_ARG" || FIRST_ARG="$1" [ -d /var/lib/systemd/migrated ] || mkdir -p /var/lib/systemd/migrated || : if [ "$YAST_IS_RUNNING" != "instsys" ]; then /usr/bin/systemctl daemon-reload || : fi for service in docker.service docker.socket ; do sysv_service=${service%.*} if [ -e /run/systemd/rpm/needs-preset/$service ]; then /usr/bin/systemctl preset $service || : rm "/run/systemd/rpm/needs-preset/$service" || : elif [ -e /run/systemd/rpm/needs-sysv-convert/$service ]; then /usr/sbin/systemd-sysv-convert --apply $sysv_service || : rm "/run/systemd/rpm/needs-sysv-convert/$service" || : touch /var/lib/systemd/migrated/$sysv_service || : fi done fi PNAME=docker SUBPNAME= SYSC_TEMPLATE=/usr/share/fillup-templates/sysconfig.$PNAME$SUBPNAME # If template not in new /usr/share/fillup-templates, fallback to old TEMPLATE_DIR if [ ! -f $SYSC_TEMPLATE ] ; then TEMPLATE_DIR=/var/adm/fillup-templates SYSC_TEMPLATE=$TEMPLATE_DIR/sysconfig.$PNAME$SUBPNAME fi SD_NAME="" if [ -x /bin/fillup ] ; then if [ -f $SYSC_TEMPLATE ] ; then echo "Updating /etc/sysconfig/$SD_NAME$PNAME ..." mkdir -p /etc/sysconfig/$SD_NAME touch /etc/sysconfig/$SD_NAME$PNAME /bin/fillup -q /etc/sysconfig/$SD_NAME$PNAME $SYSC_TEMPLATE fi else echo "ERROR: fillup not found. This should not happen. Please compare" echo "/etc/sysconfig/$PNAME and $TEMPLATE_DIR/sysconfig.$PNAME and" echo "update by hand." fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ "$FIRST_ARG" -eq 0 -a -x /usr/bin/systemctl ]; then # Package removal, not upgrade /usr/bin/systemctl --no-reload disable docker.service docker.socket || : ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_STOP_ON_REMOVAL" && . /etc/sysconfig/services test "$DISABLE_STOP_ON_REMOVAL" = yes -o \ "$DISABLE_STOP_ON_REMOVAL" = 1 && exit 0 /usr/bin/systemctl stop docker.service docker.socket ) || : fi test -n "$FIRST_ARG" || FIRST_ARG="$1" if [ $1 -eq 0 ]; then # Package removal for service in docker.service docker.socket ; do sysv_service="${service%.*}" rm -f "/var/lib/systemd/migrated/$sysv_service" || : done fi if [ -x /usr/bin/systemctl ]; then /usr/bin/systemctl daemon-reload || : fi if [ "$FIRST_ARG" -ge 1 ]; then # Package upgrade, not uninstall if [ -x /usr/bin/systemctl ]; then ( test "$YAST_IS_RUNNING" = instsys && exit 0 test -f /etc/sysconfig/services -a \ -z "$DISABLE_RESTART_ON_UPDATE" && . /etc/sysconfig/services test "$DISABLE_RESTART_ON_UPDATE" = yes -o \ "$DISABLE_RESTART_ON_UPDATE" = 1 && exit 0 /usr/bin/systemctl try-restart docker.service docker.socket ) || : fi fiG&h@Y D * y%i<!p !:%L3R* <H W [czB    .6~ B 2%%; 'z  5wWER3>:1)E WEj%s UW=b.@<\1L4O'?)  \ 1( =}JG%Z`({A聠A큤AA큤A큤A큤Ai)xi)xi)xi)xi)xi)yi)xi)yi)xi)xi)xi)xi)xi)xi)xi)|ei)i)xi)|ei)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)xi)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.0.9_ce-150000.1.33.1.src.rpmconfig(docker-stable)dockerdocker-libnetworkdocker-stabledocker-stable(aarch-64)group(docker)user(dockremap)   @@@@@@@@@@@@@       (apparmor-parser or container-selinux)/bin/sh/bin/sh/bin/sh/bin/shca-certificates-mozillacatatonitconfig(docker-stable)containerdcoreutilsdiffutilse2fsprogsfillupgrepiproute2iptableslibc.so.6()(64bit)libc.so.6(GLIBC_2.17)(64bit)libdevmapper.so.1.03()(64bit)libdevmapper.so.1.03(Base)(64bit)libdevmapper.so.1.03(DM_1_02_97)(64bit)libdl.so.2()(64bit)libdl.so.2(GLIBC_2.17)(64bit)libpthread.so.0()(64bit)libpthread.so.0(GLIBC_2.17)(64bit)libresolv.so.2()(64bit)libresolv.so.2(GLIBC_2.17)(64bit)libsystemd.so.0()(64bit)libsystemd.so.0(LIBSYSTEMD_209)(64bit)procpsrpmlib(CompressedFileNames)rpmlib(FileDigests)rpmlib(PayloadFilesHavePrefix)rpmlib(PayloadIsXz)rpmlib(RichDependencies)runcshadowshadowsysuser-shadowtarudevxz24.0.9_ce-150000.1.33.11.7.33.51.43.0.4-14.6.0-14.0-15.2-14.12.0-11.1.91.264.9docker4.14.1i&h^hth@hxhAh@5@ggg@gg@gb@gaggY~gY~gG g=@g3C@ggf@@f@fne̫@e;@e&@ed@d@d@dr@dddjdJcdI@cT@c.cV~@c5c5bz@bb>b=bk@bX aZ@a@@a]aHw``x*`?z@`)`#``>`>``_1@_@_S_#_d@_'@^)@^^?@]f@]+]@]҇]]z@]?]b@]@1@]:@]5@]/ ]@]\Q\!\-@\@\@\u*@\^\Z@\Yz\8@\2\@\[[F[s[s[@[}P@[{[{[ug@[a[`O@[^[6@[{@[{@[{@[ @Z@ZJ@Z̧@Za@Zľ@Z2@Z%Z@ZZ|;Zp^@Zo Zk@ZaZaZ7Z7Z&@Z%8ZZ@Z Z@Z@Y+@Y@YdY*@Y˒YY@YYYoIYoIYdY_wY^&@YGY-^Y, @Y;@YR@YY Y#@XXh@XXXX@X@X@XX@XO@XO@XO@XXX6@XXx@Xv@XY@XY@XWXEVX=mX6@X@Ww@W@W@W;WҤ@W@WίWiWiWu@W#W/@W/@W/@W/@WW@W:W:W:W@W@W@W-@W{@W{@Wm WXW>@W=W to fix incorrect permissions for overlayfs lowerdir. In practice the permissions of this directory are immaterial but some security scanners falsely flag this as an issue. bsc#1254206 + 0016-daemon-overlay2-remove-world-writable-permission-fro.patch- Enable SELinux in default daemon.json config (--selinux-enabled). This has no practical impact on non-SELinux systems. bsc#1252290- Remove git-core recommends on SLE. Most SLE systems have installRecommends=yes by default and thus end up installing git with Docker. bsc#1250508 This feature is mostly intended for developers ("docker build git://") so most users already have the dependency installed, and the error when git is missing is fairly straightforward (so they can easily figure out what they need to install). - Include historical changelog data from before the docker-stable fork. The initial changelog entry did technically provide all the necessary information, but our CVE tracking tools do not understand how the package is forked and so it seems that this package does not include fixes for ~12 years of updates. So, include a copy of the original package's changelog up until the fork point. bsc#1250596- Backport . bsc#1247362 + 0015-bsc1247362-release-container-layer-on-export.patch- Update to docker-buildx v0.25.0. Upstream changelog: - Update to Go 1.23 for building now that upstream has switched their 23.0.x LTSS to use Go 1.23.- Do not try to inject SUSEConnect secrets when in Rootless Docker mode, as Docker does not have permission to access the host zypper credentials in this mode (and unprivileged users cannot disable the feature using /etc/docker/suse-secrets-enable.) bsc#1240150 * 0003-SECRETS-SUSE-implement-SUSE-container-secrets.patch - Rebase patches: * 0001-SECRETS-SUSE-always-clear-our-internal-secrets.patch * 0002-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0004-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0005-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0006-SLE12-revert-apparmor-remove-version-conditionals-fr.patch * 0007-CVE-2024-2365x-update-buildkit-to-include-CVE-patche.patch * 0008-bsc1221916-update-to-patched-buildkit-version-to-fix.patch * 0009-bsc1214855-volume-use-AtomicWriteFile-to-save-volume.patch * 0010-CVE-2024-41110-AuthZ-plugin-securty-fixes.patch * 0011-CVE-2024-29018-libnet-Don-t-forward-to-upstream-reso.patch * 0012-CVE-2025-22868-vendor-jws-split-token-into-fixed-num.patch * 0013-CVE-2025-22869-vendor-ssh-limit-the-size-of-the-inte.patch * 0014-TESTS-backport-fixes-for-integration-tests.patch- Always clear SUSEConnect suse_* secrets when starting containers regardless of whether the daemon was built with SUSEConnect support. Not doing this causes containers from SUSEConnect-enabled daemons to fail to start when running with SUSEConnect-disabled (i.e. upstream) daemons. This was a long-standing issue with our secrets support but until recently this would've required migrating from SLE packages to openSUSE packages (which wasn't supported). However, as SLE Micro 6.x and SLES 16 will move away from in-built SUSEConnect support, this is now a practical issue users will run into. bsc#1244035 + 0001-SECRETS-SUSE-always-clear-our-internal-secrets.patch - Rearrange patches: - 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch + 0002-SECRETS-daemon-allow-directory-creation-in-run-secre.patch - 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch + 0003-SECRETS-SUSE-implement-SUSE-container-secrets.patch - 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch + 0004-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch - 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch + 0005-bsc1073877-apparmor-clobber-docker-default-profile-o.patch - 0005-SLE12-revert-apparmor-remove-version-conditionals-fr.patch + 0006-SLE12-revert-apparmor-remove-version-conditionals-fr.patch - 0006-CVE-2024-2365x-update-buildkit-to-include-CVE-patche.patch + 0007-CVE-2024-2365x-update-buildkit-to-include-CVE-patche.patch - 0007-bsc1221916-update-to-patched-buildkit-version-to-fix.patch + 0008-bsc1221916-update-to-patched-buildkit-version-to-fix.patch - 0008-bsc1214855-volume-use-AtomicWriteFile-to-save-volume.patch + 0009-bsc1214855-volume-use-AtomicWriteFile-to-save-volume.patch - 0009-CVE-2024-41110-AuthZ-plugin-securty-fixes.patch + 0010-CVE-2024-41110-AuthZ-plugin-securty-fixes.patch - 0010-CVE-2024-29018-libnet-Don-t-forward-to-upstream-reso.patch + 0011-CVE-2024-29018-libnet-Don-t-forward-to-upstream-reso.patch - 0011-CVE-2025-22868-vendor-jws-split-token-into-fixed-num.patch + 0012-CVE-2025-22868-vendor-jws-split-token-into-fixed-num.patch - 0012-CVE-2025-22869-vendor-ssh-limit-the-size-of-the-inte.patch + 0013-CVE-2025-22869-vendor-ssh-limit-the-size-of-the-inte.patch - 0013-TESTS-backport-fixes-for-integration-tests.patch + 0014-TESTS-backport-fixes-for-integration-tests.patch- Update to docker-buildx v0.22.0. Upstream changelog: * Includes fixes for CVE-2025-0495. bsc#1239765- Disable transparent SUSEConnect support for SLE-16. PED-12534 When this patchset was first added in 2013 (and rewritten over the years), there was no upstream way to easily provide SLE customers with a way to build container images based on SLE using the host subscription. However, with docker-buildx you can now define secrets for builds (this is not entirely transparent, but we can easily document this new requirement for SLE-16). Users should use RUN --mount=type=secret,id=SCCcredentials zypper -n ... in their Dockerfiles, and docker buildx build --secret id=SCCcredentials,src=/etc/zypp/credentials.d/SCCcredentials,type=file . when doing their builds. - Now that the only blocker for docker-buildx support was removed for SLE-16, enable docker-buildx for SLE-16 as well. PED-8905- Don't use the new container-selinux conditional requires on SLE-12, as the RPM version there doesn't support it. Arguably the change itself is a bit suspect but we can fix that later. bsc#1237367- Add backport for golang.org/x/oauth2 CVE-2025-22868 fix. bsc#1239185 + 0011-CVE-2025-22868-vendor-jws-split-token-into-fixed-num.patch - Add backport for golang.org/x/crypto CVE-2025-22869 fix. bsc#1239322 + 0012-CVE-2025-22869-vendor-ssh-limit-the-size-of-the-inte.patch - Refresh patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-SLE12-revert-apparmor-remove-version-conditionals-fr.patch * 0006-CVE-2024-2365x-update-buildkit-to-include-CVE-patche.patch * 0007-bsc1221916-update-to-patched-buildkit-version-to-fix.patch * 0008-bsc1214855-volume-use-AtomicWriteFile-to-save-volume.patch * 0009-CVE-2024-41110-AuthZ-plugin-securty-fixes.patch * 0010-CVE-2024-29018-libnet-Don-t-forward-to-upstream-reso.patch - Move test-related patch to the end of the patch stack: - 0011-TESTS-backport-fixes-for-integration-tests.patch + 0013-TESTS-backport-fixes-for-integration-tests.patch- Make container-selinux requirement conditional on selinux-policy (bsc#1237367)- Add backport for CVE-2024-29018 fix. bsc#1234089 + 0010-CVE-2024-29018-libnet-Don-t-forward-to-upstream-reso.patch - Add backport for CVE-2024-23650 fix and rename patch filename. bsc#1219437 - 0006-CVE-2024-23653-update-buildkit-to-include-CVE-patche.patch + 0006-CVE-2024-2365x-update-buildkit-to-include-CVE-patche.patch - Reorder and rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-SLE12-revert-apparmor-remove-version-conditionals-fr.patch * 0007-bsc1221916-update-to-patched-buildkit-version-to-fix.patch * 0008-bsc1214855-volume-use-AtomicWriteFile-to-save-volume.patch * 0009-CVE-2024-41110-AuthZ-plugin-securty-fixes.patch - 0010-TESTS-backport-fixes-for-integration-tests.patch + 0011-TESTS-backport-fixes-for-integration-tests.patch- Update to docker-buildx 0.19.3. See upstream changelog online at - Update docker-buildx to v0.19.2. See upstream changelog online at . Some notable changelogs from the last update: * * - Update to Go 1.22.- Add a new toggle file /etc/docker/suse-secrets-enable which allows users to disable the SUSEConnect integration with Docker (which creates special mounts in /run/secrets to allow container-suseconnect to authenticate containers with registries on registered hosts). bsc#1231348 bsc#1232999 In order to disable these mounts, just do echo 0 > /etc/docker/suse-secrets-enable and restart Docker. In order to re-enable them, just do echo 1 > /etc/docker/suse-secrets-enable and restart Docker. Docker will output information on startup to tell you whether the SUSE secrets feature is enabled or not. * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch- Disable docker-buildx builds for SLES. It turns out that build containers with docker-buildx don't currently get the SUSE secrets mounts applied, meaning that container-suseconnect doesn't work when building images. bsc#1233819- Add docker-integration-tests-devel subpackage for building and running the upstream Docker integration tests on machines to test that Docker works properly. Users should not install this package. - docker-rpmlintrc updated to include allow-list for all of the integration tests package, since it contains a bunch of stuff that wouldn't normally be allowed. - Rebased patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-SLE12-revert-apparmor-remove-version-conditionals-fr.patch * 0006-CVE-2024-23653-update-buildkit-to-include-CVE-patche.patch * 0007-bsc1221916-update-to-patched-buildkit-version-to-fix.patch * 0008-bsc1214855-volume-use-AtomicWriteFile-to-save-volume.patch * 0009-CVE-2024-41110-AuthZ-plugin-securty-fixes.patch - Added patches: + 0010-TESTS-backport-fixes-for-integration-tests.patch- Remove DOCKER_NETWORK_OPTS from docker.service. This was removed from sysconfig a long time ago, and apparently this causes issues with systemd in some cases. - Update --add-runtime to point to correct binary path.- Further merge docker and docker-stable specfiles to minimise the differences. The main thing is that we now include both halves of the Conflicts/Provides/Obsoletes dance in both specfiles.- Update to docker-buildx v0.17.1 to match standalone docker-buildx package we are replacing. See upstream changelog online at - Import specfile changes for docker-buildx as well as the changes to help reduce specfile differences between docker-stable and docker. bsc#1230331 bsc#1230333- Backport patch for CVE-2024-41110. bsc#1228324 + 0009-CVE-2024-41110-AuthZ-plugin-securty-fixes.patch- Initial docker-stable fork, forked from Docker 24.0.7-ce release (packaged on 2024-02-14). The original changelog is included below for historical reference. - Patches included from snapshot: + 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch + 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch + 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch + 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch + 0005-SLE12-revert-apparmor-remove-version-conditionals-fr.patch - 0006-Vendor-in-latest-buildkit-v0.11-branch-including-CVE.patch + 0006-CVE-2024-23653-update-buildkit-to-include-CVE-patche.patch + cli-0001-docs-include-required-tools-in-source-tree.patch - Update to Docker 24.0.9-ce, which is the latest version of the 24.0.x branch. It seems likely this will be the last upstream version of the 24.0.x branch (it seems Mirantis is going to do LTS for 23.0.x, not 24.0.x). - Fix BuildKit's symlink resolution logic to correctly handle non-lexical symlinks. Backport of and . bsc#1221916 + 0007-bsc1221916-update-to-patched-buildkit-version-to-fix.patch - Write volume options atomically so sudden system crashes won't result in future Docker starts failing due to empty files. Backport of . bsc#1214855 + 0008-bsc1214855-volume-use-AtomicWriteFile-to-save-volume.patch- Vendor latest buildkit v0.11: Add patch 0006-Vendor-in-latest-buildkit-v0.11-branch-including-CVE.patch that vendors in the latest v0.11 buildkit branch including bugfixes for the following: * bsc#1219438: CVE-2024-23653 * bsc#1219268: CVE-2024-23652 * bsc#1219267: CVE-2024-23651 - rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-SLE12-revert-apparmor-remove-version-conditionals-fr.patch - switch from %patchN to %patch -PN syntax - remove unused rpmlint filters and add filters to silence pointless bash & zsh completion warnings- Update to Docker 24.0.7-ce. See upstream changelog online at . bsc#1217513 * Deny containers access to /sys/devices/virtual/powercap by default. - CVE-2020-8694 bsc#1170415 - CVE-2020-8695 bsc#1170446 - CVE-2020-12912 bsc#1178760 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-SLE12-revert-apparmor-remove-version-conditionals-fr.patch * cli-0001-docs-include-required-tools-in-source-tree.patch- Add a patch to fix apparmor on SLE-12, reverting the upstream removal of version-specific templating for the default apparmor profile. bsc#1213500 + 0005-SLE12-revert-apparmor-remove-version-conditionals-fr.patch - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch- Update to Docker 24.0.6-ce. See upstream changelog online at . bsc#1215323 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * cli-0001-docs-include-required-tools-in-source-tree.patch - Switch from disabledrun to manualrun in _service. - Add a docker.socket unit file, but with socket activation effectively disabled to ensure that Docker will always run even if you start the socket individually. Users should probably just ignore this unit file. bsc#1210141- Update to Docker 24.0.5-ce. See upstream changelog online at . bsc#1213229- Update to Docker 24.0.4-ce. See upstream changelog online at . bsc#1213500- Update to Docker 24.0.3-ce. See upstream changelog online at . bsc#1213120 - Rebase patches: * cli-0001-docs-include-required-tools-in-source-tree.patch- Recommend docker-rootless-extras instead of Require(ing) it, given it's an additional functionality and not inherently required for docker to function.- Add docker-rootless-extras subpackage (https://docs.docker.com/engine/security/rootless)- Update to Docker 24.0.2-ce. See upstream changelog online at . bsc#1212368 * Includes the upstreamed fix for the mount table pollution issue. bsc#1210797 - Add Recommends for docker-buildx, and add /usr/lib/docker/cli-plugins as being provided by this package. - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * cli-0001-docs-include-required-tools-in-source-tree.patch- Update to Docker 23.0.6-ce. See upstream changelog online at . bsc#1211578 - Rebase patches: * cli-0001-docs-include-required-tools-in-source-tree.patch - Re-unify packaging for SLE-12 and SLE-15. - Add patch to fix build on SLE-12 by switching back to libbtrfs-devel headers (the uapi headers in SLE-12 are too old). + 0003-BUILD-SLE12-revert-graphdriver-btrfs-use-kernel-UAPI.patch - Re-numbered patches: - 0003-bsc1073877-apparmor-clobber-docker-default-profile-o.patch + 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch`- Update to Docker 23.0.5-ce. See upstream changelog online at . - Rebase patches: * cli-0001-docs-include-required-tools-in-source-tree.patch- Update to Docker 23.0.4-ce. See upstream changelog online at . bsc#1208074 - Fixes: * bsc#1214107 - CVE-2023-28840 * bsc#1214108 - CVE-2023-28841 * bsc#1214109 - CVE-2023-28842 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-bsc1073877-apparmor-clobber-docker-default-profile-o.patch - Renumbered patches: - 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch - Remove upstreamed patches: - 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch - 0006-bsc1193930-vendor-update-golang.org-x-crypto.patch - 0007-bsc1200022-fifo.Close-prevent-possible-panic-if-fifo.patch - Backport to allow man pages to be built without internet access in OBS. + cli-0001-docs-include-required-tools-in-source-tree.patch- update to 20.10.23-ce. * see upstream changelog at https://docs.docker.com/engine/release-notes/#201023 - drop kubic flavor as kubic is EOL. this removes: kubelet.env docker-kubic-service.conf 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch- Update to Docker 20.10.21-ce. See upstream changelog online at . bsc#1206065 bsc#1205375 CVE-2022-36109 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch * 0006-bsc1193930-vendor-update-golang.org-x-crypto.patch * 0007-bsc1200022-fifo.Close-prevent-possible-panic-if-fifo.patch - The PRIVATE-REGISTRY patch will now output a warning if it is being used (in preparation for removing the feature). This feature was never meant to be used by users directly (and is only available in the -kubic/CaaSP version of the package anyway) and thus should not affect any users.- Fix wrong After: in docker.service, fixes bsc#1188447- Add apparmor-parser as a Recommends to make sure that most users will end up with it installed even if they are primarily running SELinux.- Fix syntax of boolean dependency- Allow to install container-selinux instead of apparmor-parser.- Change to using systemd-sysusers- Backport to fix a crash-on-start issue with dockerd. bsc#1200022 + 0007-bsc1200022-fifo.Close-prevent-possible-panic-if-fifo.patch- Update to Docker 20.10.17-ce. See upstream changelog online at . bsc#1200145 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch * 0006-bsc1193930-vendor-update-golang.org-x-crypto.patch- Add patch to update golang.org/x/crypto for CVE-2021-43565 and CVE-2022-27191. bsc#1193930 bsc#1197284 * 0006-bsc1193930-vendor-update-golang.org-x-crypto.patch - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch- Update to Docker 20.10.14-ce. See upstream changelog online at . bsc#1197517 CVE-2022-24769- Update to Docker 20.10.12-ce. See upstream changelog online at . - Remove CHANGELOG.md. It hasn't been maintained since 2017, and all of the changelogs are currently only available online.- Update to Docker 20.10.11-ce. See upstream changelog online at . bsc#1192814 bsc#1193273 CVE-2021-41190 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch - Remove upstreamed patches: - 0006-bsc1190670-seccomp-add-support-for-clone3-syscall-in.patch- Update to Docker 20.10.9-ce. See upstream changelog online at . bsc#1191355 CVE-2021-41089 bsc#1191015 CVE-2021-41091 bsc#1191434 CVE-2021-41092 bsc#1191334 CVE-2021-41103 bsc#1191121 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch * 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch * 0006-bsc1190670-seccomp-add-support-for-clone3-syscall-in.patch - Switch to Go 1.16.x compiler, in line with upstream.- Add patch to return ENOSYS for clone3 to avoid breaking glibc again. bsc#1190670 + 0006-bsc1190670-seccomp-add-support-for-clone3-syscall-in.patch- Add shell requires for the *-completion subpackages.- Update to Docker 20.10.6-ce. See upstream changelog online at . bsc#1184768 - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch - Backport upstream fix for btrfs quotas being removed by Docker regularly. bsc#1183855 bsc#1175081 + 0005-bsc1183855-btrfs-Do-not-disable-quota-on-cleanup.patch- Update to Docker 20.10.5-ce. See upstream changelog online at . bsc#1182947 - Update runc dependency to 1.0.0~rc93. - Remove upstreamed patches: - cli-0001-Rename-bin-md2man-to-bin-go-md2man.patch - Rebase patches: * 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch * 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch * 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch - Switch version to use -ce suffix rather than _ce to avoid confusing other tools. boo#1182476[NOTE: This update was only ever released in SLES and Leap.] - It turns out the boo#1178801 libnetwork patch is also broken on Leap, so drop the patch entirely. bsc#1180401 bsc#1182168 - boo1178801-0001-Add-docker-interfaces-to-firewalld-docker-zone.patch- Fix incorrect cast in SUSE secrets patches causing warnings on SLES. * 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch[NOTE: This update was only ever released in SLES and Leap.] - Update Docker to 19.03.15-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. This update includes fixes for bsc#1181732 (CVE-2021-21284) and bsc#1181730 (CVE-2021-21285). - Rebase patches: * bsc1073877-0001-apparmor-clobber-docker-default-profile-on-start.patch - Only apply the boo#1178801 libnetwork patch to handle firewalld on openSUSE. It appears that SLES doesn't like the patch. bsc#1180401- Update to Docker 20.10.3-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. Fixes bsc#1181732 (CVE-2021-21284) and bsc#1181730 (CVE-2021-21285). - Rebase patches on top of 20.10.3-ce. - 0002-SECRETS-daemon-allow-directory-creation-in-run-secre.patch + 0001-SECRETS-daemon-allow-directory-creation-in-run-secre.patch - 0003-SECRETS-SUSE-implement-SUSE-container-secrets.patch + 0002-SECRETS-SUSE-implement-SUSE-container-secrets.patch - 0004-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch + 0003-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch - 0005-bsc1073877-apparmor-clobber-docker-default-profile-o.patch + 0004-bsc1073877-apparmor-clobber-docker-default-profile-o.patch- Drop docker-runc, docker-test and docker-libnetwork packages. We now just use the upstream runc package (it's stable enough and Docker no longer pins git versions). docker-libnetwork is so unstable that it doesn't have any versioning scheme and so it really doesn't make sense to maintain the project as a separate package. bsc#1181641 bsc#1181677 - Remove no-longer-needed patch for packaging now that we've dropped docker-runc and docker-libnetwork. - 0001-PACKAGING-revert-Remove-docker-prefix-for-containerd.patch- Update to Docker 20.10.2-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1181594 - Remove upstreamed patches: - bsc1122469-0001-apparmor-allow-readby-and-tracedby.patch - boo1178801-0001-Add-docker-interfaces-to-firewalld-docker-zone.patch - Add patches to fix build: + cli-0001-Rename-bin-md2man-to-bin-go-md2man.patch - Since upstream has changed their source repo (again) we have to rebase all of our patches. While doing this, I've collapsed all patches into one branch per-release and thus all the patches are now just one series: - packaging-0001-revert-Remove-docker-prefix-for-containerd-and-runc-.patch + 0001-PACKAGING-revert-Remove-docker-prefix-for-containerd.patch - secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch + 0002-SECRETS-daemon-allow-directory-creation-in-run-secre.patch - secrets-0002-SUSE-implement-SUSE-container-secrets.patch + 0003-SECRETS-SUSE-implement-SUSE-container-secrets.patch - private-registry-0001-Add-private-registry-mirror-support.patch + 0004-PRIVATE-REGISTRY-add-private-registry-mirror-support.patch - bsc1073877-0001-apparmor-clobber-docker-default-profile-on-start.patch + 0005-bsc1073877-apparmor-clobber-docker-default-profile-o.patch- Re-apply secrets fix for bsc#1065609 which appears to have been lost after it was fixed. * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Add Conflicts and Provides for kubic flavour of docker-fish-completion.- Update to Docker 19.03.14-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. CVE-2020-15257 bsc#1180243 https://github.com/docker/docker-ce/releases/tag/v19.03.14- Enable fish-completion- Add a patch which makes Docker compatible with firewalld with nftables backend. Backport of https://github.com/moby/libnetwork/pull/2548 (boo#1178801, SLE-16460) * boo1178801-0001-Add-docker-interfaces-to-firewalld-docker-zone.patch- Update to Docker 19.03.13-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1176708- Fixes for %_libexecdir changing to /usr/libexec (bsc#1174075)- Emergency fix: %requires_eq does not work with provide symbols, only effective package names. Convert back to regular Requires.- Update to Docker 19.03.12-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. - Use Go 1.13 instead of Go 1.14 because Go 1.14 can cause all sorts of spurrious errors due to Go returning -EINTR from I/O syscalls much more often (due to Go 1.14's pre-emptive goroutine support). - bsc1172377-0001-unexport-testcase.Cleanup-to-fix-Go-1.14.patch - Add BuildRequires for all -git dependencies so that we catch missing dependencies much more quickly.- Update to Docker 19.03.11-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1172377 CVE-2020-13401 - Backport https://github.com/gotestyourself/gotest.tools/pull/169 so that we can build Docker with Go 1.14 (upstream uses Go 1.13). + bsc1172377-0001-unexport-testcase.Cleanup-to-fix-Go-1.14.patch- BuildRequire pkgconfig(libsystemd) instead of systemd-devel: Allow OBS to shortcut through the -mini flavors.- Add backport of https://github.com/docker/docker/pull/39121. bsc#1122469 + bsc1122469-0001-apparmor-allow-readby-and-tracedby.patch- Support older SLE systems which don't have "usermod -w -v".- Update to Docker 19.03.5-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1158590 bsc#1157330- Update to Docker 19.03.4-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.- Drop containerd.service workaround (we've released enough versions without containerd.service -- there's no need to support package upgrades that old). - Update to Docker 19.03.3-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1153367- Update to Docker 19.03.2-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1150397- Fix zsh-completion (docker -> _docker)- Fix default installation such that --userns-remap=default works properly (this appears to be an upstream regression, where --userns-remap=default doesn't auto-create the group and results in an error on-start). boo#1143349- Update to Docker 19.03.1-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. CVE-2019-14271- Update to Docker 19.03.0-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1142413 - Remove upstreamed patches: - bsc1001161-0001-oci-include-the-domainname-in-kernel.domainname.patch - bsc1001161-0002-cli-add-a-separate-domainname-flag.patch - bsc1047218-0001-man-obey-SOURCE_DATE_EPOCH-when-generating-man-pages.patch - bsc1128746-0001-integration-cli-don-t-build-test-images-if-they-alre.patch - Rebase pacthes: * bsc1073877-0001-apparmor-clobber-docker-default-profile-on-start.patch * packaging-0001-revert-Remove-docker-prefix-for-containerd-and-runc-.patch * private-registry-0001-Add-private-registry-mirror-support.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Move bash-completion to correct location. - Update to Docker 18.09.8-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. * Includes fixes for CVE-2019-13509 bsc#1142160.- Update to Docker 18.09.7-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1139649 - Remove upstreamed patches: - CVE-2018-15664.patch- Use %config(noreplace) for /etc/docker/daemon.json. bsc#1138920- Add patch for CVE-2018-15664. bsc#1096726 + CVE-2018-15664.patch- Update to Docker 18.09.6-ce see upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. - Rebase patches: * bsc1128746-0001-integration-cli-don-t-build-test-images-if-they-alre.patch- Update to Docker 18.09.5-ce see upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1128376 boo#1134068 - Rebase patches: * bsc1001161-0001-oci-include-the-domainname-in-kernel.domainname.patch * bsc1001161-0002-cli-add-a-separate-domainname-flag.patch * bsc1047218-0001-man-obey-SOURCE_DATE_EPOCH-when-generating-man-pages.patch * bsc1128746-0001-integration-cli-don-t-build-test-images-if-they-alre.patch * packaging-0001-revert-Remove-docker-prefix-for-containerd-and-runc-.patch * private-registry-0001-Add-private-registry-mirror-support.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch - Updated patch name: + bsc1073877-0001-apparmor-clobber-docker-default-profile-on-start.patch - bsc1073877-0002-apparmor-clobber-docker-default-profile-on-start.patch- Update to Docker 18.09.3-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md.- docker-test: improvements to test packaging (we don't need to ship around the entire source tree, and we also need to build the born-again integration/ tests which contain a suite-per-directory). We also need a new patch which fixes the handling of *-test images. bsc#1128746 + bsc1128746-0001-integration-cli-don-t-build-test-images-if-they-alre.patch- Move daemon.json file to /etc/docker directory, bsc#1114832- Update shell completion to use Group: System/Shells.- Add daemon.json file with rotation logs cofiguration, bsc#1114832- Update to Docker 18.09.1-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. bsc#1124308 * Includes fix for CVE-2018-10892 bsc#1100331. * Includes fix for CVE-2018-20699 bsc#1121768. - Remove upstreamed patches. - bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch- Disable leap based builds for kubic flavor. bsc#1121412- Update go requirements to >= go1.10.6 to fix * bsc#1118897 CVE-2018-16873 go#29230 cmd/go: remote command execution during "go get -u" * bsc#1118898 CVE-2018-16874 go#29231 cmd/go: directory traversal in "go get" via curly braces in import paths * bsc#1118899 CVE-2018-16875 go#29233 crypto/x509: CPU denial of service- Handle build breakage due to missing 'export GOPATH' (caused by resolution of boo#1119634). I believe Docker is one of the only packages with this problem.- Add backports of https://github.com/docker/docker/pull/37302 and https://github.com/docker/cli/pull/1130, which allow for users to explicitly specify the NIS domainname of a container. bsc#1001161 + bsc1001161-0001-oci-include-the-domainname-in-kernel.domainname.patch + bsc1001161-0002-cli-add-a-separate-domainname-flag.patch- Update docker.service to match upstream and avoid rlimit problems. bsc#1112980 - Upgrade to Docker 18.09.0-ce. See upstream changelog in the packaged /usr/share/doc/packages/docker/CHANGELOG.md. boo#1115464 bsc#1118990 - Add revert of an upstream patch to fix docker-* handling. + packaging-0001-revert-Remove-docker-prefix-for-containerd-and-runc-.patch - Rebase patches: * bsc1047218-0001-man-obey-SOURCE_DATE_EPOCH-when-generating-man-pages.patch * bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch * bsc1073877-0002-apparmor-clobber-docker-default-profile-on-start.patch * private-registry-0001-Add-private-registry-mirror-support.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch - Remove upstreamed patches: - bsc1100727-0001-build-add-buildmode-pie.patch- Reduce the disk footprint by recommending git-core instead of hard requiring it. bsc#1108038- ExcludeArch i586 for entire docker-kubic flavour- ExcludeArch i586 for docker-kubic-kubeadm-criconfig subpackage- Add patch to make package reproducible, which is a backport of https://github.com/docker/cli/pull/1306. boo#1047218 + bsc1047218-0001-man-obey-SOURCE_DATE_EPOCH-when-generating-man-pages.patch- Upgrade to docker-ce v18.06.1-ce. bsc#1102522 bsc#1113313 Upstream changelog: https://github.com/docker/docker-ce/releases/tag/v18.06.1-ce - Remove patches that were merged upstream: - bsc1102522-0001-18.06-disable-containerd-CRI-plugin.patch- Add a backport of https://github.com/docker/engine/pull/29 for the 18.06.0-ce upgrade. This is a potential security issue (the CRI plugin was enabled by default, which listens on a TCP port bound to 0.0.0.0) that will be fixed upstream in the 18.06.1-ce upgrade. bsc#1102522 + bsc1102522-0001-18.06-disable-containerd-CRI-plugin.patch- Kubic: Make crio default, docker as alternative runtime (boo#1104821) - Provide kubernetes CRI config with docker-kubic-kubeadm-criconfig subpackage- Merge -kubic packages back into the main Virtualization:containers packages. This is done using _multibuild to add a "kubic" flavour, which is then used to conditionally compile patches and other kubic-specific features. bsc#1105000 - Rework docker-rpmlintrc with the new _multibuild setup.- Enable seccomp support on SLE12, since libseccomp is now a new enough vintage to work with Docker and containerd. fate#325877- Upgrade to docker-ce v18.06.0-ce. bsc#1102522 - Remove systemd-service dependency on containerd, which is now being started by dockerd to align with upstream defaults. - Removed the following patches as they are merged upstream: - bsc1021227-0001-pkg-devmapper-dynamically-load-dm_task_deferred_remo.patch - bsc1055676-0001-daemon-oci-obey-CL_UNPRIVILEGED-for-user-namespaced-.patch - Rebased the following patches: * bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch * bsc1073877-0002-apparmor-clobber-docker-default-profile-on-start.patch * bsc1100727-0001-build-add-buildmode-pie.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Build the client binary with -buildmode=pie to fix issues on POWER. bsc#1100727 + bsc1100727-0001-build-add-buildmode-pie.patch- Update the AppArmor patchset again to fix a separate issue where changed AppArmor profiles don't actually get applied on Docker daemon reboot. bsc#1099277 * bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch + bsc1073877-0002-apparmor-clobber-docker-default-profile-on-start.patch- Update to AppArmor patch so that signal mediation also works for signals between in-container processes. bsc#1073877 * bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch- Make use of %license macro- Remove 'go test' from %check section, as it has only ever caused us problems and hasn't (as far as I remember) ever caught a release-blocking issue. Smoke testing has been far more useful. boo#1095817- Update secrets patch to not log incorrect warnings when attempting to inject non-existent host files. bsc#1065609 * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Review Obsoletes to fix bsc#1080978- Put docker under the podruntime slice. This the recommended deployment to allow fine resource control on Kubernetes. bsc#1086185- Add patch to handle AppArmor changes that make 'docker kill' stop working. bsc#1073877 boo#1089732 + bsc1073877-0001-apparmor-allow-receiving-of-signals-from-docker-kill.patch- Fix manpage generation breaking ppc64le builds due to a missing - buildemode=pie.- Compile and install all manpages. bsc#1085117- Add requirement for catatonit, which provides a docker-init implementation. fate#324652 bsc#1085380- Fix private-registry-0001-Add-private-registry-mirror-support.patch to deal corretly with TLS configs of 3rd party registries. fix bsc#1084533- Update patches to be sourced from https://github.com/suse/docker-ce (which are based on the upstream docker/docker-ce repo). The reason for this change (though it is functionally identical to the old patches) is so that public patch maintenance is much simpler. * bsc1021227-0001-pkg-devmapper-dynamically-load-dm_task_deferred_remo.patch * bsc1055676-0001-daemon-oci-obey-CL_UNPRIVILEGED-for-user-namespaced-.patch * private-registry-0001-Add-private-registry-mirror-support.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Add ${version} to equivalent non-kubic package provides- Add Provides for equivalent non-kubic packages- Disable all tests for docker/client and docker/pkg/discovery. The unit tests of those packages broke reproducibly the builds in IBS.- Disable flaky tests github.com/docker/docker/pkg/discovery/kv.- Add patch to support mirroring of private/non-upstream registries. As soon as the upstream PR (https://github.com/moby/moby/pull/34319) is merged, this patch will be replaced by the backported one from upstream. + private-registry-0001-Add-private-registry-mirror-support.patch fix bsc#1074971- Add Obsoletes: docker-image-migrator, as the tool is no longer needed and we've pretty much removed it from everywhere except the containers module. bsc#1069758- Remove requirement on bridge-utils, which has been replaced by libnetwork in Docker. bsc#1072798- Update to Docker v17.09.1_ce (bsc#1069758). Upstream changelog: https://github.com/docker/docker-ce/releases/tag/v17.09.1-ce - Removed patches (merged upstream): - bsc1045628-0001-devicemapper-remove-container-rootfs-mountPath-after.patch - bsc1066210-0001-vendor-update-to-github.com-vbatts-tar-split-v0.10.2.patch - bsc1066801-0001-oci-add-proc-scsi-to-masked-paths.patch- Update to Docker v17.09.0_ce. Upstream changelog: https://github.com/docker/docker-ce/releases/tag/v17.09.0-ce - Rebased patches: * bsc1021227-0001-pkg-devmapper-dynamically-load-dm_task_deferred_remo.patch * bsc1045628-0001-devicemapper-remove-container-rootfs-mountPath-after.patch * bsc1055676-0001-daemon-oci-obey-CL_UNPRIVILEGED-for-user-namespaced-.patch * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch - Removed patches (merged upstream): - bsc1064781-0001-Allow-to-override-build-date.patch- Add a patch to dynamically probe whether libdevmapper supports dm_task_deferred_remove. This is necessary because we build the containers module on a SLE12 base, but later SLE versions have libdevmapper support. This should not affect openSUSE, as all openSUSE versions have a new enough libdevmapper. Backport of https://github.com/moby/moby/pull/35518. bsc#1021227 bsc#1029320 bsc#1058173 + bsc1021227-0001-pkg-devmapper-dynamically-load-dm_task_deferred_remo.patch- Fix up the ordering of tests in docker.spec. This is to keep things easier to backport into the SLE package.- Include secrets fix to handle "old" containers that have orphaned secret data. It's not clear why Docker caches these secrets, but fix the problem by trashing the references manually. bsc#1057743 * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Replace references to /var/adm/fillup-templates with new %_fillupdir macro (boo#1069468)- Remove migration code for the v1.9.x -> v1.10.x migration. This has been around for a while, and we no longer support migrating from such an old version "nicely". Docker still has migration code that will run on first-boot, we are merely removing all of the "nice" warnings which tell users how to avoid issues during an upgrade that ocurred more than a year ago. - Drop un-needed files: - docker-plugin-message.txt - docker-update-message.txt- Add a backport of https://github.com/moby/moby/pull/35424, which fixes a security issue where a maliciously crafted image could be used to crash a Docker daemon. bsc#1066210 CVE-2017-14992 + bsc1066210-0001-vendor-update-to-github.com-vbatts-tar-split-v0.10.2.patch- Add a backport of https://github.com/moby/moby/pull/35399, which fixes a security issue where a Docker container (with a disabled AppArmor profile) could write to /proc/scsi/... and subsequently DoS the host. bsc#1066801 CVE-2017-16539 + bsc1066801-0001-oci-add-proc-scsi-to-masked-paths.patch- Correctly set `docker version` information, including the version, git commit, and SOURCE_DATE_EPOCH (requires a backport). This should * effectively* make Docker builds reproducible, with minimal cost. boo#1064781 + bsc1064781-0001-Allow-to-override-build-date.patch- Add backport of https://github.com/moby/moby/pull/35205. This used to be fixed in docker-runc, but we're moving it here after upstream discussion. bsc#1055676 + bsc1055676-0001-daemon-oci-obey-CL_UNPRIVILEGED-for-user-namespaced-.patch- Update to Docker v17.07.0_ce. Upstream changelog: https://github.com/docker/docker-ce/releases/tag/v17.06.0-ce https://github.com/docker/docker-ce/releases/tag/v17.07.0-ce - Removed no-longer needed patches. - bsc1037436-0001-client-check-tty-before-creating-exec-job.patch - bsc1037607-0001-apparmor-make-pkg-aaparser-work-on-read-only-root.patch - integration-cli-fix-TestInfoEnsureSucceeds.patch - Added backport of https://github.com/moby/moby/pull/34573. bsc#1045628 + bsc1045628-0001-devicemapper-remove-container-rootfs-mountPath-after.patch - Rewrite secrets patches to correctly handle directories in a way that doesn't cause errors when starting new containers. * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Fix bsc#1059011 The systemd service helper script used a timeout of 60 seconds to start the daemon, which is insufficient in cases where the daemon takes longer to start. Instead, set the service type from 'simple' to 'notify' and remove the now superfluous helper script.- fix bsc#1057743: Add a Requires: fix_bsc_1057743 which is provided by the newer version of docker-libnetwork. This is necessary because of a versioning bug we found in bsc#1057743.- fix /var/adm/update-message/docker file name to be /var/adm/update-message/docker-%{version}-%{release}- devicemapper: add patch to make the dm storage driver remove a container's rootfs mountpoint before attempting to do libdm operations on it. This helps avoid complications when live mounts will leak into containers. Backport of https://github.com/moby/moby/pull/34573. bsc#1045628 + bsc1045628-0001-devicemapper-remove-container-rootfs-mountPath-after.patch- Fix a regression in our SUSE secrets patches, which caused the copied files to not carry the correct {uid,gid} mapping when using user namespaces. This would not cause any bugs (SUSEConnect does the right thing anyway) but it's possible some programs would not treat the files correctly. This is tangentially related to bsc#1055676. * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Use -buildmode=pie for tests and binary build. bsc#1048046 bsc#1051429- enable deferred removal for sle12sp2 and newer (and openSUSE equivalent. fix bsc#1021227- enable libseccomp on sle12sp2 and newer, 42.2 and newer fix bsc#1028638 - docker: conditional filtering not supported on libseccomp for sle12- add SuSEfirewall2.service to the After clause in docker.service in order to fix bsc#1046024- fix path to docker-runc in systemd service file- change dependency to docker-runc- Fix bsc#1029630: docker does not wait for lvm on system startup I added "lvm2-monitor.service" as an "After dependency" of the docker systemd unit.- Fix bsc#1032287: missing docker systemd configuration- Update SUSE secrets patch to correctly handle restarting of containers. + secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch + secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Fix bsc#1037607 which was causing read-only issues on Kubic, this is a backport of https://github.com/moby/moby/pull/33250. + bsc1037607-0001-apparmor-make-pkg-aaparser-work-on-read-only-root.patch- Fix bsc#1038476 warning about non-executable docker * Simply verify we have binary prior using it, might happen if someone had docker installed and then did remove it and install from scratch again- Add a partial fix for boo#1038493. - Fixed bsc#1037436 where execids were being leaked due to bad error handling. This is a backport of https://github.com/docker/cli/pull/52. + bsc1037436-0001-client-check-tty-before-creating-exec-job.patch- Fix golang requirements in the subpackages- Update golang build requirements to use golang(API) symbol: this is needed to solve a conflict between multiple versions of Go being available- Fix secrets-0002-SUSE-implement-SUSE-container-secrets.patch: substitute docker/distribution/digest by opencontainers/digest- Update to version 17.04.0-ce (fix bsc#1034053 ) - Patches removed because have been merged into this version: * pr31549-cmd-docker-fix-TestDaemonCommand.patch * pr31773-daemon-also-ensureDefaultApparmorProfile-in-exec-pat.patch - Patches rebased: * integration-cli-fix-TestInfoEnsureSucceeds.patch - Build man pages for all archs (bsc#953182) - Containers cannot resolve DNS if docker host uses 127.0.0.1 as resolver (bsc#1034063) see /usr/share/doc/packages/docker/CHANGELOG.md- Make sure this is being built with go 1.7- remove the go_arches macro because we are using go1.7 which is available in all archs - remove gcc specific patches * gcc-go-patches.patch * netlink_netns_powerpc.patch * boltdb_bolt_add_brokenUnaligned.patch- Enable Delegate=yes, since systemd will safely ignore lvalues it doesn't understand.- Update SUSE secrets patch to handle boo#1030702. * secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch * secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Fix (bsc#1032644) Change lvm2 from Requires to Recommends Docker usually uses a default storage driver, when it's not configured explicitly. This default driver then depends on the underlying system and gets chosen during installation.- Disable libseccomp for leap 42.1, sle12sp1 and sle12, because docker needs a higher version. Otherwise, we get the error "conditional filtering requires libseccomp version >= 2.2.1 (bsc#1028639 and bsc#1028638)- Add a backport of fix to AppArmor lazy loading docker-exec case. https://github.com/docker/docker/pull/31773 + pr31773-daemon-also-ensureDefaultApparmorProfile-in-exec-pat.patch- Clean up docker-mount-secrets.patch to use the new swarm secrets internals of Docker 1.13.0, which removes the need to implement any secret handling ourselves. This resulted in a split up of the patch. - docker-mount-secrets.patch + secrets-0001-daemon-allow-directory-creation-in-run-secrets.patch + secrets-0002-SUSE-implement-SUSE-container-secrets.patch- Remove old plugins.json to prevent docker-1.13 to fail to start- Fix bsc#1026827: systemd TasksMax default throttles docker- Fix post section by adding shadow as a package requirement Otherwise the groupadd instruction fails- Add patch to fix TestDaemonCommand failure in %check. This is an upstream bug, and has an upstream PR to fix it https://github.com/docker/docker/pull/31549. + pr31549-cmd-docker-fix-TestDaemonCommand.patch- update docker to 1.13.0 see details in https://github.com/docker/docker/releases/tag/v1.13.0 - use the same buildflags for building docker and for building the tests. - enable pkcs11: https://github.com/docker/docker/commit/37fa75b3447007bb8ea311f02610bb383b0db77f- enable architecture s390x for openSUSE- provide the oci runtime so that containers which were using an old runtime option, when started on the new docker version, the runtime is changed to the new one. fix bsc#1020806 bsc#1016992- fix CVE-2016-9962 bsc#1012568 . Fix it by updating to 1.12.6 plus an extra commit to fix liverestore: https://github.com/docker/docker/commit/97cd32a6a9076306baa637a29bba84c3f1f3d218- add "a wait" when starting docker service to fix bsc#1019251- remove netlink_gcc_go.patch after integration of PR https://github.com/golang/go/issues/11707 - new boltdb_bolt_add_brokenUnaligned.patch for ppc64 waiting for https://github.com/boltdb/bolt/pull/635- Remove old flags from dockerd's command-line, to be more inline with upstream (now that docker-runc is provided by the runc package). -H is dropped because upstream dropped it due to concerns with socket activation. - Remove socket activation entirely.- update docker to 1.12.5 (bsc#1016307). This fixes bsc#1015661- fix bash-completion- Add packageand(docker:bash) to bash-completion to match zsh-completion.- fix runc and containerd revisions fix bsc#1009961- update docker to 1.12.3 - fix bsc#1007249 - CVE-2016-8867: Fix ambient capability usage in containers - other fixes: https://github.com/docker/docker/releases/tag/v1.12.3- update docker to 1.12.2 (bsc#1004490). See changelog https://github.com/docker/docker/blob/v1.12.2/CHANGELOG.md - update docker-mount-secrets.patch to 1.12.2 code- docker-mount-secrets.patch: change the internal mountpoint name to not use ":" as that character can be considered a special character by other tools. bsc#999582- fix go_arches definition: use global instead of define, otherwise it fails to build- Add dockerd(8) man page.- add missing patch to changelog- fix integration test case - add integration-cli-fix-TestInfoEnsureSucceeds.patch- update rpmlintrc- make test timeout configurable- Remove noarch from docker-test, which was causing lots of fun issues when trying to run them.- Fix build for ppc64le: use static libgo for dockerd and docker-proxy as in docker build.- Update docker to 1.12.1 (bsc#996015) see changelog in https://github.com/docker/docker/releases/tag/v1.12.1- Add asaurin@suse.com's test.sh test script. - Add integration test binary in docker.spec file. This is work done by asaurin@suse.com.- Package docker-proxy (which was split out of the docker binary in 1.12). boo#995620- fix bsc#995102 - Docker "migrator" prevents installing "docker", if docker 1.9 was installed before but there were no images- Update docker.service file with several changes. * Reapply fix for bsc#983015 (Limit*=infinity). * Specify an "OCI" runtime for our runc package explicitly. bsc#978260- remove disable-pprof-trace.patch: We can remove this patch because we use go 1.6, either gcc6-go or gc-go. This patch was for gcc5-go- add go_arches in project configuration: this way, we can use the same spec file but decide in the project configuration if to use gc-go or gcc-go for some archs.- use gcc6-go instead of gcc5-go (bsc#988408) - build ppc64le with gc-go because this version builds with gc-go 1.6 - remove bnc964673-boltdb-metadata-recovery.patch because it has already been merged- update to v1.12.0 (bsc#995058) see detailed changelog at https://github.com/docker/docker/releases/tag/v1.12.0 - disable test that fail in obs build context - only run unit tests on architectures that provide the go list and go test tools - disable dockerd, parser, integration test, and devicemapper related tests on versions below SLE12 and openSUSE_13.2 - bump test timeout to 10m (for aarch64) - run unit tests during the build - Adapt docker.service file. - adapt install sections for gccgo builds: gccgo build are not built in separate folders for client and daemon. They both reside in dyngccgo. - gcc-go-patch: link against systemd when compiling the daemon. - Add disable-pprof-trace.patch pprof.Trace() is not available in go version <= 1.4 which we use to build SLES packages. This patch comments out the pprof.Trace() section. - update gcc-go-patch and docker-mount-secrets.patch- Fixed binary split, install both required binaries correctly* Explicitly state the version dependencies for runC and containerd, to avoid potential issues with incompatible component versions. These must be updated *each time we do a release*. bsc#993847- Don't exit mid install, add the ability to not restart the docker service during certain updates with long migration phases bsc#980555- remove kernel dependency (bsc#987198)- remove sysconfig.docker.ppc64le patch setting iptables option on ppc64le works now (bsc#988707)- fix bsc#984942: audit.rules in docker-1.9.1-58.1.x86_64.rpm has a syntax error* Update docker.service to include changes from upstream, including the soon-to-be-merged patch https://github.com/docker/docker/pull/24307, which fixes bnc#983015.- readd dropped declaration for patch200* Removed patches: - cve-2016-3697-numeric-uid.patch (merged upstream in gh@docker/docker#22998). * Update Docker to 1.11.2. (bsc#989566) Changelog from upstream: * Networking * Fix a stale endpoint issue on overlay networks during ungraceful restart (#23015) * Fix an issue where the wrong port could be reported by docker inspect/ps/port (#22997) * Runtime * Fix a potential panic when running docker build (#23032) * Fix interpretation of --user parameter (#22998) * Fix a bug preventing container statistics to be correctly reported (#22955) * Fix an issue preventing container to be restarted after daemon restart (#22947) * Fix issues when running 32 bit binaries on Ubuntu 16.04 (#22922) * Fix a possible deadlock on image deletion and container attach (#22918) * Fix an issue where containers fail to start after a daemon restart if they depend on a containerized cluster store (#22561) * Fix an issue causing docker ps to hang on CentOS when using devicemapper (#22168, #23067) * Fix a bug preventing to docker exec into a container when using devicemapper (#22168, #23067)- Fix udev files ownership- Pass over with spec-cleaner, no factual changes* Make sure we *always* build unstripped Go binaries.* Add a patch to fix database soft corruption issues if the Docker dameon dies in a bad state. There is a PR upstream to vendor Docker to have this fix as well, but it probably won't get in until 1.11.2. bnc#964673 (https://github.com/docker/docker/pull/22765) + bnc964673-boltdb-metadata-recovery.patch* Remove conditional Patch directive for SUSE secrets, since conditionally including patches results in incompatible .src.rpms. The patch is still applied conditionally.* Update to Docker 1.11.1. Changelog from upstream: * Distribution - Fix schema2 manifest media type to be of type `application/vnd.docker.container.image.v1+json` ([#21949](https://github.com/docker/docker/pull/21949)) * Documentation + Add missing API documentation for changes introduced with 1.11.0 ([#22048](https://github.com/docker/docker/pull/22048)) * Builder * Append label passed to `docker build` as arguments as an implicit `LABEL` command at the end of the processed `Dockerfile` ([#22184](https://github.com/docker/docker/pull/22184)) * Networking - Fix a panic that would occur when forwarding DNS query ([#22261](https://github.com/docker/docker/pull/22261)) - Fix an issue where OS threads could end up within an incorrect network namespace when using user defined networks ([#22261](https://github.com/docker/docker/pull/22261)) * Runtime - Fix a bug preventing labels configuration to be reloaded via the config file ([#22299](https://github.com/docker/docker/pull/22299)) - Fix a regression where container mounting `/var/run` would prevent other containers from being removed ([#22256](https://github.com/docker/docker/pull/22256)) - Fix an issue where it would be impossible to update both `memory-swap` and `memory` value together ([#22255](https://github.com/docker/docker/pull/22255)) - Fix a regression from 1.11.0 where the `/auth` endpoint would not initialize `serveraddress` if it is not provided ([#22254](https://github.com/docker/docker/pull/22254)) - Add missing cleanup of container temporary files when cancelling a schedule restart ([#22237](https://github.com/docker/docker/pull/22237)) - Removed scary error message when no restart policy is specified ([#21993](https://github.com/docker/docker/pull/21993)) - Fix a panic that would occur when the plugins were activated via the json spec ([#22191](https://github.com/docker/docker/pull/22191)) - Fix restart backoff logic to correctly reset delay if container ran for at least 10secs ([#22125](https://github.com/docker/docker/pull/22125)) - Remove error message when a container restart get cancelled ([#22123](https://github.com/docker/docker/pull/22123)) - Fix an issue where `docker` would not correcly clean up after `docker exec` ([#22121](https://github.com/docker/docker/pull/22121)) - Fix a panic that could occur when servicing concurrent `docker stats` commands ([#22120](https://github.com/docker/docker/pull/22120))` - Revert deprecation of non-existing host directories auto-creation ([#22065](https://github.com/docker/docker/pull/22065)) - Hide misleading rpc error on daemon shutdown ([#22058](https://github.com/docker/docker/pull/22058))- Fix go version to 1.5 (bsc#977394)- Add patch to fix vulnerability in Docker <= 1.11.0. This patch is upstream, but was merged after the 1.11.0 merge window. CVE-2016-3697. bsc#976777. + cve-2016-3697-numeric-uid.patch The upstream PR is here[1] and was vendored into Docker here[2]. [1]: https://github.com/opencontainers/runc/pull/708 [2]: https://github.com/docker/docker/pull/21665- Supplemnent zsh from zsh-completion * zsh-completion will be automatically installed if zsh and docker are installed- Remove gcc5_socker_workaround.patch: This patch is not needed anymore since gcc5 has been updated in all platforms* Removed patches that have been fixed upstream and in gcc-go: - boltdb_bolt_powerpc.patch - fix-apparmor.patch - fix-btrfs-ioctl-structure.patch - fix-docker-init.patch - libnetwork_drivers_bridge_powerpc.patch - ignore-dockerinit-checksum.patch * Require containerd, as it is the only currently supported Docker execdriver. * Update docker.socket to require containerd.socket and use --containerd in docker.service so that the services are self-contained. * Update to Docker 1.11.0. Changelog from upstream: * Builder - Fix a bug where Docker would not used the correct uid/gid when processing the `WORKDIR` command ([#21033](https://github.com/docker/docker/pull/21033)) - Fix a bug where copy operations with userns would not use the proper uid/gid ([#20782](https://github.com/docker/docker/pull/20782), [#21162](https://github.com/docker/docker/pull/21162)) * Client * Usage of the `:` separator for security option has been deprecated. `=` should be used instead ([#21232](https://github.com/docker/docker/pull/21232)) + The client user agent is now passed to the registry on `pull`, `build`, `push`, `login` and `search` operations ([#21306](https://github.com/docker/docker/pull/21306), [#21373](https://github.com/docker/docker/pull/21373)) * Allow setting the Domainname and Hostname separately through the API ([#20200](https://github.com/docker/docker/pull/20200)) * Docker info will now warn users if it can not detect the kernel version or the operating system ([#21128](https://github.com/docker/docker/pull/21128)) - Fix an issue where `docker stats --no-stream` output could be all 0s ([#20803](https://github.com/docker/docker/pull/20803)) - Fix a bug where some newly started container would not appear in a running `docker stats` command ([#20792](https://github.com/docker/docker/pull/20792)) * Post processing is no longer enabled for linux-cgo terminals ([#20587](https://github.com/docker/docker/pull/20587)) - Values to `--hostname` are now refused if they do not comply with [RFC1123](https://tools.ietf.org/html/rfc1123) ([#20566](https://github.com/docker/docker/pull/20566)) + Docker learned how to use a SOCKS proxy ([#20366](https://github.com/docker/docker/pull/20366), [#18373](https://github.com/docker/docker/pull/18373)) + Docker now supports external credential stores ([#20107](https://github.com/docker/docker/pull/20107)) * `docker ps` now supports displaying the list of volumes mounted inside a container ([#20017](https://github.com/docker/docker/pull/20017)) * `docker info` now also report Docker's root directory location ([#19986](https://github.com/docker/docker/pull/19986)) - Docker now prohibits login in with an empty username (spaces are trimmed) ([#19806](https://github.com/docker/docker/pull/19806)) * Docker events attributes are now sorted by key ([#19761](https://github.com/docker/docker/pull/19761)) * `docker ps` no longer show exported port for stopped containers ([#19483](https://github.com/docker/docker/pull/19483)) - Docker now cleans after itself if a save/export command fails ([#17849](https://github.com/docker/docker/pull/17849)) * Docker load learned how to display a progress bar ([#17329](https://github.com/docker/docker/pull/17329), [#120078](https://github.com/docker/docker/pull/20078)) * Distribution - Fix a panic that occurred when pulling an images with 0 layers ([#21222](https://github.com/docker/docker/pull/21222)) - Fix a panic that could occur on error while pushing to a registry with a misconfigured token service ([#21212](https://github.com/docker/docker/pull/21212)) + All first-level delegation roles are now signed when doing a trusted push ([#21046](https://github.com/docker/docker/pull/21046)) + OAuth support for registries was added ([#20970](https://github.com/docker/docker/pull/20970)) * `docker login` now handles token using the implementation found in [docker/distribution](https://github.com/docker/distribution) ([#20832](https://github.com/docker/docker/pull/20832)) * `docker login` will no longer prompt for an email ([#20565](https://github.com/docker/docker/pull/20565)) * Docker will now fallback to registry V1 if no basic auth credentials are available ([#20241](https://github.com/docker/docker/pull/20241)) * Docker will now try to resume layer download where it left off after a network error/timeout ([#19840](https://github.com/docker/docker/pull/19840)) - Fix generated manifest mediaType when pushing cross-repository ([#19509](https://github.com/docker/docker/pull/19509)) - Fix docker requesting additional push credentials when pulling an image if Content Trust is enabled ([#20382](https://github.com/docker/docker/pull/20382)) * Logging - Fix a race in the journald log driver ([#21311](https://github.com/docker/docker/pull/21311)) * Docker syslog driver now uses the RFC-5424 format when emitting logs ([#20121](https://github.com/docker/docker/pull/20121)) * Docker GELF log driver now allows to specify the compression algorithm and level via the `gelf-compression-type` and `gelf-compression-level` options ([#19831](https://github.com/docker/docker/pull/19831)) * Docker daemon learned to output uncolorized logs via the `--raw-logs` options ([#19794](https://github.com/docker/docker/pull/19794)) + Docker, on Windows platform, now includes an ETW (Event Tracing in Windows) logging driver named `etwlogs` ([#19689](https://github.com/docker/docker/pull/19689)) * Journald log driver learned how to handle tags ([#19564](https://github.com/docker/docker/pull/19564)) + The fluentd log driver learned the following options: `fluentd-address`, `fluentd-buffer-limit`, `fluentd-retry-wait`, `fluentd-max-retries` and `fluentd-async-connect` ([#19439](https://github.com/docker/docker/pull/19439)) + Docker learned to send log to Google Cloud via the new `gcplogs` logging driver. ([#18766](https://github.com/docker/docker/pull/18766)) * Misc + When saving linked images together with `docker save` a subsequent `docker load` will correctly restore their parent/child relationship ([#21385](https://github.com/docker/docker/pull/c)) + Support for building the Docker cli for OpenBSD was added ([#21325](https://github.com/docker/docker/pull/21325)) + Labels can now be applied at network, volume and image creation ([#21270](https://github.com/docker/docker/pull/21270)) * The `dockremap` is now created as a system user ([#21266](https://github.com/docker/docker/pull/21266)) - Fix a few response body leaks ([#21258](https://github.com/docker/docker/pull/21258)) - Docker, when run as a service with systemd, will now properly manage its processes cgroups ([#20633](https://github.com/docker/docker/pull/20633)) * Docker info now reports the value of cgroup KernelMemory or emits a warning if it is not supported ([#20863](https://github.com/docker/docker/pull/20863)) * Docker info now also reports the cgroup driver in use ([#20388](https://github.com/docker/docker/pull/20388)) * Docker completion is now available on PowerShell ([#19894](https://github.com/docker/docker/pull/19894)) * `dockerinit` is no more ([#19490](https://github.com/docker/docker/pull/19490),[#19851](https://github.com/docker/docker/pull/19851)) + Support for building Docker on arm64 was added ([#19013](https://github.com/docker/docker/pull/19013)) + Experimental support for building docker.exe in a native Windows Docker installation ([#18348](https://github.com/docker/docker/pull/18348)) * Networking - Fix panic if a node is forcibly removed from the cluster ([#21671](https://github.com/docker/docker/pull/21671)) - Fix "error creating vxlan interface" when starting a container in a Swarm cluster ([#21671](https://github.com/docker/docker/pull/21671)) * `docker network inspect` will now report all endpoints whether they have an active container or not ([#21160](https://github.com/docker/docker/pull/21160)) + Experimental support for the MacVlan and IPVlan network drivers have been added ([#21122](https://github.com/docker/docker/pull/21122)) * Output of `docker network ls` is now sorted by network name ([#20383](https://github.com/docker/docker/pull/20383)) - Fix a bug where Docker would allow a network to be created with the reserved `default` name ([#19431](https://github.com/docker/docker/pull/19431)) * `docker network inspect` returns whether a network is internal or not ([#19357](https://github.com/docker/docker/pull/19357)) + Control IPv6 via explicit option when creating a network (`docker network create --ipv6`). This shows up as a new `EnableIPv6` field in `docker network inspect` ([#17513](https://github.com/docker/docker/pull/17513)) * Support for AAAA Records (aka IPv6 Service Discovery) in embedded DNS Server ([#21396](https://github.com/docker/docker/pull/21396)) - Fix to not forward docker domain IPv6 queries to external servers ([#21396](https://github.com/docker/docker/pull/21396)) * Multiple A/AAAA records from embedded DNS Server for DNS Round robin ([#21019](https://github.com/docker/docker/pull/21019)) - Fix endpoint count inconsistency after an ungraceful dameon restart ([#21261](https://github.com/docker/docker/pull/21261)) - Move the ownership of exposed ports and port-mapping options from Endpoint to Sandbox ([#21019](https://github.com/docker/docker/pull/21019)) - Fixed a bug which prevents docker reload when host is configured with ipv6.disable=1 ([#21019](https://github.com/docker/docker/pull/21019)) - Added inbuilt nil IPAM driver ([#21019](https://github.com/docker/docker/pull/21019)) - Fixed bug in iptables.Exists() logic [#21019](https://github.com/docker/docker/pull/21019) - Fixed a Veth interface leak when using overlay network ([#21019](https://github.com/docker/docker/pull/21019)) - Fixed a bug which prevents docker reload after a network delete during shutdown ([#20214](https://github.com/docker/docker/pull/20214)) - Make sure iptables chains are recreated on firewalld reload ([#20419](https://github.com/docker/docker/pull/20419)) - Allow to pass global datastore during config reload ([#20419](https://github.com/docker/docker/pull/20419)) - For anonymous containers use the alias name for IP to name mapping, ie:DNS PTR record ([#21019](https://github.com/docker/docker/pull/21019)) - Fix a panic when deleting an entry from /etc/hosts file ([#21019](https://github.com/docker/docker/pull/21019)) - Source the forwarded DNS queries from the container net namespace ([#21019](https://github.com/docker/docker/pull/21019)) - Fix to retain the network internal mode config for bridge networks on daemon reload ([#21780] (https://github.com/docker/docker/pull/21780)) - Fix to retain IPAM driver option configs on daemon reload ([#21914] (https://github.com/docker/docker/pull/21914)) * Plugins - Fix a file descriptor leak that would occur every time plugins were enumerated ([#20686](https://github.com/docker/docker/pull/20686)) - Fix an issue where Authz plugin would corrupt the payload body when faced with a large amount of data ([#20602](https://github.com/docker/docker/pull/20602)) * Runtime - Fix a panic that could occur when cleanup after a container started with invalid parameters ([#21716](https://github.com/docker/docker/pull/21716)) - Fix a race with event timers stopping early ([#21692](https://github.com/docker/docker/pull/21692)) - Fix race conditions in the layer store, potentially corrupting the map and crashing the process ([#21677](https://github.com/docker/docker/pull/21677)) - Un-deprecate auto-creation of host directories for mounts. This feature was marked deprecated in ([#21666](https://github.com/docker/docker/pull/21666)) Docker 1.9, but was decided to be too much of an backward-incompatible change, so it was decided to keep the feature. + It is now possible for containers to share the NET and IPC namespaces when `userns` is enabled ([#21383](https://github.com/docker/docker/pull/21383)) + `docker inspect ` will now expose the rootfs layers ([#21370](https://github.com/docker/docker/pull/21370)) + Docker Windows gained a minimal `top` implementation ([#21354](https://github.com/docker/docker/pull/21354)) * Docker learned to report the faulty exe when a container cannot be started due to its condition ([#21345](https://github.com/docker/docker/pull/21345)) * Docker with device mapper will now refuse to run if `udev sync` is not available ([#21097](https://github.com/docker/docker/pull/21097)) - Fix a bug where Docker would not validate the config file upon configuration reload ([#21089](https://github.com/docker/docker/pull/21089)) - Fix a hang that would happen on attach if initial start was to fail ([#21048](https://github.com/docker/docker/pull/21048)) - Fix an issue where registry service options in the daemon configuration file were not properly taken into account ([#21045](https://github.com/docker/docker/pull/21045)) - Fix a race between the exec and resize operations ([#21022](https://github.com/docker/docker/pull/21022)) - Fix an issue where nanoseconds were not correctly taken in account when filtering Docker events ([#21013](https://github.com/docker/docker/pull/21013)) - Fix the handling of Docker command when passed a 64 bytes id ([#21002](https://github.com/docker/docker/pull/21002)) * Docker will now return a `204` (i.e http.StatusNoContent) code when it successfully deleted a network ([#20977](https://github.com/docker/docker/pull/20977)) - Fix a bug where the daemon would wait indefinitely in case the process it was about to killed had already exited on its own ([#20967](https://github.com/docker/docker/pull/20967) * The devmapper driver learned the `dm.min_free_space` option. If the mapped device free space reaches the passed value, new device creation will be prohibited. ([#20786](https://github.com/docker/docker/pull/20786)) + Docker can now prevent processes in container to gain new privileges via the `--security-opt=no-new-privileges` flag ([#20727](https://github.com/docker/docker/pull/20727)) - Starting a container with the `--device` option will now correctly resolves symlinks ([#20684](https://github.com/docker/docker/pull/20684)) + Docker now relies on [`containerd`](https://github.com/docker/containerd) and [`runc`](https://github.com/opencontainers/runc) to spawn containers. ([#20662](https://github.com/docker/docker/pull/20662)) - Fix docker configuration reloading to only alter value present in the given config file ([#20604](https://github.com/docker/docker/pull/20604)) + Docker now allows setting a container hostname via the `--hostname` flag when `--net=host` ([#20177](https://github.com/docker/docker/pull/20177)) + Docker now allows executing privileged container while running with `--userns-remap` if both `--privileged` and the new `--userns=host` flag are specified ([#20111](https://github.com/docker/docker/pull/20111)) - Fix Docker not cleaning up correctly old containers upon restarting after a crash ([#19679](https://github.com/docker/docker/pull/19679)) * Docker will now error out if it doesn't recognize a configuration key within the config file ([#19517](https://github.com/docker/docker/pull/19517)) - Fix container loading, on daemon startup, when they depends on a plugin running within a container ([#19500](https://github.com/docker/docker/pull/19500)) * `docker update` learned how to change a container restart policy ([#19116](https://github.com/docker/docker/pull/19116)) * `docker inspect` now also returns a new `State` field containing the container state in a human readable way (i.e. one of `created`, `restarting`, `running`, `paused`, `exited` or `dead`)([#18966](https://github.com/docker/docker/pull/18966)) + Docker learned to limit the number of active pids (i.e. processes) within the container via the `pids-limit` flags. NOTE: This requires `CGROUP_PIDS=y` to be in the kernel configuration. ([#18697](https://github.com/docker/docker/pull/18697)) - `docker load` now has a `--quiet` option to suppress the load output ([#20078](https://github.com/docker/docker/pull/20078)) - Fix a bug in neighbor discovery for IPv6 peers ([#20842](https://github.com/docker/docker/pull/20842)) - Fix a panic during cleanup if a container was started with invalid options ([#21802](https://github.com/docker/docker/pull/21802)) - Fix a situation where a container cannot be stopped if the terminal is closed ([#21840](https://github.com/docker/docker/pull/21840)) * Security * Object with the `pcp_pmcd_t` selinux type were given management access to `/var/lib/docker(/.*)?` ([#21370](https://github.com/docker/docker/pull/21370)) * `restart_syscall`, `copy_file_range`, `mlock2` joined the list of allowed calls in the default seccomp profile ([#21117](https://github.com/docker/docker/pull/21117), [#21262](https://github.com/docker/docker/pull/21262)) * `send`, `recv` and `x32` were added to the list of allowed syscalls and arch in the default seccomp profile ([#19432](https://github.com/docker/docker/pull/19432)) * Docker Content Trust now requests the server to perform snapshot signing ([#21046](https://github.com/docker/docker/pull/21046)) * Support for using YubiKeys for Content Trust signing has been moved out of experimental ([#21591](https://github.com/docker/docker/pull/21591)) * Volumes * Output of `docker volume ls` is now sorted by volume name ([#20389](https://github.com/docker/docker/pull/20389)) * Local volumes can now accepts options similar to the unix `mount` tool ([#20262](https://github.com/docker/docker/pull/20262)) - Fix an issue where one letter directory name could not be used as source for volumes ([#21106](https://github.com/docker/docker/pull/21106)) + `docker run -v` now accepts a new flag `nocopy`. This tell the runtime not to copy the container path content into the volume (which is the default behavior) ([#21223](https://github.com/docker/docker/pull/21223))- docker.spec: apply gcc5 socket patch also for sle12 and leap because gcc5 has been updated there as well. - docker.spec: add a "is_opensuse" check for the mount-secrets patch. This way we can use this same package for opensuse.- use go-lang for aarch64: - drop fix_platform_type_arm.patch (works around a gcc-go bug, so unnecessary)- Add patch from upstream (https://github.com/docker/docker/pull/21723) to fix compilation on Factory and Tumbleweed (which have btrfsprogs >= 4.5). + fix-btrfs-ioctl-structure.patch bnc#974208- Changed systemd unit file and default sysconfig file to include network options, this is needed to get SDN like flannel to work- docker.spec: update warning to mention that /etc/sysconfig/docker is sourced by the migration script.- docker.spec: only Reccomends: the docker-image-migrator package as it is no longer required for our ugly systemctl hacks. - docker.spec: fix up documentation to refer to the script you need to run in the migrator package. - docker.spec: print a warning if you force the DOCKER_FORCE_INSTALL option.- spec: switch to new done file name from docker-image-migrator- update to docker 1.10.3 (bnc#970637) Runtime Fix Docker client exiting with an "Unrecognized input header" error #20706 Fix Docker exiting if Exec is started with both AttachStdin and Detach #20647 Distribution Fix a crash when pushing multiple images sharing the same layers to the same repository in parallel #20831 Fix a panic when pushing images to a registry which uses a misconfigured token service #21030 Plugin system Fix issue preventing volume plugins to start when SELinux is enabled #20834 Prevent Docker from exiting if a volume plugin returns a null response for Get requests #20682 Fix plugin system leaking file descriptors if a plugin has an error #20680 Security Fix linux32 emulation to fail during docker build #20672 It was due to the personality syscall being blocked by the default seccomp profile. Fix Oracle XE 10g failing to start in a container #20981 It was due to the ipc syscall being blocked by the default seccomp profile. Fix user namespaces not working on Linux From Scratch #20685 Fix issue preventing daemon to start if userns is enabled and the subuid or subgid files contain comments #20725 More at https://github.com/docker/docker/releases/tag/v1.10.3- spec: improve file-based migration checks to make sure that it doesn't cause errors if running on a /var/lib/docker without /var/lib/docker/graph.- spec: implement file-based migration checks. The migrator will be updated to match the warning message's instructions. This looks like it works with my testing.- more patches to build on ppc64 architecture update netlink_gcc_go.patch new netlink_netns_powerpc.patch new boltdb_bolt_powerpc.patch new libnetwork_drivers_bridge_powerpc.patch to replace deleted fix-ppc64le.patch- fix bsc#968972 - let docker manage the cgroups of the processes that it launches without systemd- Require docker-image-migrator (bnc#968933)Update to version 1.10.2 (bnc#968933) - Runtime Prevent systemd from deleting containers' cgroups when its configuration is reloaded #20518 Fix SELinux issues by disregarding --read-only when mounting /dev/mqueue #20333 Fix chown permissions used during docker cp when userns is used #20446 Fix configuration loading issue with all booleans defaulting to true #20471 Fix occasional panic with docker logs -f #20522 - Distribution Keep layer reference if deletion failed to avoid a badly inconsistent state #20513 Handle gracefully a corner case when canceling migration #20372 Fix docker import on compressed data #20367 Fix tar-split files corruption during migration that later cause docker push and docker save to fail #20458 - Networking Fix daemon crash if embedded DNS is sent garbage #20510 - Volumes Fix issue with multiple volume references with same name #20381 - Security Fix potential cache corruption and delegation conflict issues #20523 link to changelog: https://github.com/docker/docker/blob/v1.10.2/CHANGELOG.md- fix-apparmor.patch: switch to a backported version of docker/docker#20305, which also fixes several potential issues if the major version of apparmor changes.- Remove 1.10.0 tarball.- Update to docker 1.10.1 It includes some fixes to 1.10.0, see detailed changelog in https://github.com/docker/docker/blob/v1.10.1/CHANGELOG.md- Update docker to 1.10.0 (bnc#965918) Add usernamespace support Add support for custom seccomp profiles Improvements in network and volume management detailed changelog in https://github.com/docker/docker/blob/590d5108bbdaabb05af590f76c9757daceb6d02e/CHANGELOG.md - removed patches, because code has been merged in 1.10.0 release: libcontainer-apparmor-fixes.patch: see: https://github.com/docker/docker/blob/release/v1.10/contrib/apparmor/template.go fix_bnc_958255.patch: see https://github.com/docker/docker/commit/2b4f64e59018c21aacbf311d5c774dd5521b5352 use_fs_cgroups_by_default.patch fix_cgroup.parent_path_sanitisation.patch add_bolt_ppc64.patch add_bolt_arm64.patch add_bolt_s390x.patch - remove gcc-go-build-static-libgo.patch: This has been replace by gcc-go-patches.patch - removed patches, because arm and ppc are not build using the dynbinary target, but the dyngccgo one: docker_remove_journald_to_fix_dynbinary_build_on_arm.patch docker_remove_journald_to_fix_dynbinary_build_on_powerpc.patch docker_remove_journald_to_fix_dynbinary_build_on_arm64.patch - added patches: fix_platform_type_arm.patch: fix build for arm64 and aarch64: set utsname as uint8 for arm64 and aarch64 gcc5_socket_workaround.patch: gcc5-go in Tumbleweed includes this commit https://github.com/golang/gofrontend/commit/a850225433a66a58613c22185c3b09626f5545eb Which "fixes" the data type for RawSockaddr.Data However, docker now expects the "wrong" data type, since docker had a workaround for that issue. Thus, we need to workaround the workaround in tumbleweed netlink_gcc_go.patch: add constants for syscalls TUNSETIFF and TUNSETPERSIST to fix a gcc issue. This is a workaround for bnc#964468: gcc-go can no longer compile Docker. fix-apparmor.patch: fix https://github.com/docker/docker/issues/20269 . It affects SLE12 which has apparmor version 2.8 and not openSUSE which has version 2.9. fix-ppc64le.patch: Build netlink driver using int8 and not uint8 for the data structure - reviewed patches: ignore-dockerinit-checksum.patch: review context in patch fix-docker-init.patch: review patch because build method has been changed in spec file for gcc-go gcc-go-patches.patch: review context in patch - Build requires go >= 1.5: For version 1.9, we could use Go 1.4.3 see GO_VERSION https://github.com/docker/docker/blob/release/v1.9/Dockerfile However, for version 1.10, we need go 1.5.3 see GO_VERSION https://github.com/docker/docker/blob/release/v1.10/Dockerfile - fix bnc#965600 - SLES12 SP1 - Static shared memory limit in container- docker-mount-secrets.patch: fix up this patch to work on Docker 1.10- docker-mount-secrets.patch: properly register /run/secrets as a mountpoint, so that it is unmounted properly when the container is removed and thus container removal works. (bnc#963142) - docker-mount-secrets.patch: in addition, add some extra debugging information to the secrets patch.- fix_json_econnreset_bug.patch: fix JSON bug that causes containers to not start in weird circumstances. https://github.com/docker/docker/issues/14203- fix_bnc_958255.patch: fix Docker creates strange apparmor profile (bnc#958255) - use_fs_cgroups_by_default.patch: Use fs cgroups by default: https://github.com/docker/docker/commit/419fd7449fe1a984f582731fcd4d9455000846b0 - fix_cgroup.parent_path_sanitisation.patch: fix cgroup.Parent path sanitisation: https://github.com/opencontainers/runc/commit/bf899fef451956be4abd63de6d6141d9f9096a02 - Add rules for auditd. This is required to fix bnc#959405 - Remove 7 patches, add 6 and modify 1, after 1.9.1 upgrade * Removed: - docker_missing_ppc64le_netlink_linux_files.patch: the code that this bug refers to has benn removed upstream - docker_rename_jump_amd64_as_jump_linux.patch: the code that this bug refers to has been removed upstream - Remove fix_15279.patch: code has been merged upstream - Remove add_missing_syscall_for_s390x.patch: code has been merged upstream - Remove fix_incompatible_assignment_error_bnc_950931.patch: code has been merged upstream - Remove fix_libsecomp_error_bnc_950931.patch: the code that this bug refers to has been removed upstream - Remove gcc5_socket_workaround.patch: Code has been fixed. Building with this patch is giving the error we were trying to fix, implying that the code has been fixed somewhere else. * Added: - add_bolt_ppc64.patch - add_bolt_arm64.patch - docker_remove_journald_to_fix_dynbinary_build_on_arm.patch - docker_remove_journald_to_fix_dynbinary_build_on_powerpc.patch - docker_remove_journald_to_fix_dynbinary_build_on_arm64.patch - gcc-go-build-static-libgo.patch: enable static linking of libgo in ggc-go In order to do this, we had to work-around an issue from gcc-go: https://gcc.gnu.org/bugzilla/show_bug.cgi?id=69357 * Modify: - Upgrade to 1.9.1(bnc#956434) * Runtime: - Do not prevent daemon from booting if images could not be restored (#17695) - Force IPC mount to unmount on daemon shutdown/init (#17539) - Turn IPC unmount errors into warnings (#17554) - Fix `docker stats` performance regression (#17638) - Clarify cryptic error message upon `docker logs` if `--log-driver=none` (#17767) - Fix seldom panics (#17639, #17634, #17703) - Fix opq whiteouts problems for files with dot prefix (#17819) - devicemapper: try defaulting to xfs instead of ext4 for performance reasons (#17903, #17918) - devicemapper: fix displayed fs in docker info (#17974) - selinux: only relabel if user requested so with the `z` option (#17450, #17834) - Do not make network calls when normalizing names (#18014) * Client: - Fix `docker login` on windows (#17738) - Fix bug with `docker inspect` output when not connected to daemon (#17715) - Fix `docker inspect -f {{.HostConfig.Dns}} somecontainer` (#17680) * Builder: - Fix regression with symlink behavior in ADD/COPY (#17710) * Networking: - Allow passing a network ID as an argument for `--net` (#17558) - Fix connect to host and prevent disconnect from host for `host` network (#17476) - Fix `--fixed-cidr` issue when gateway ip falls in ip-range and ip-range is not the first block in the network (#17853) - Restore deterministic `IPv6` generation from `MAC` address on default `bridge` network (#17890) - Allow port-mapping only for endpoints created on docker run (#17858) - Fixed an endpoint delete issue with a possible stale sbox (#18102) * Distribution: - Correct parent chain in v2 push when v1Compatibility files on the disk are inconsistent (#18047) - Update to version 1.9.0 (bnc#954812): * Runtime: - `docker stats` now returns block IO metrics (#15005) - `docker stats` now details network stats per interface (#15786) - Add `ancestor=` filter to `docker ps --filter` flag to filter containers based on their ancestor images (#14570) - Add `label=` filter to `docker ps --filter` to filter containers based on label (#16530) - Add `--kernel-memory` flag to `docker run` (#14006) - Add `--message` flag to `docker import` allowing to specify an optional message (#15711) - Add `--privileged` flag to `docker exec` (#14113) - Add `--stop-signal` flag to `docker run` allowing to replace the container process stopping signal (#15307) - Add a new `unless-stopped` restart policy (#15348) - Inspecting an image now returns tags (#13185) - Add container size information to `docker inspect` (#15796) - Add `RepoTags` and `RepoDigests` field to `/images/{name:.*}/json` (#17275) - Remove the deprecated `/container/ps` endpoint from the API (#15972) - Send and document correct HTTP codes for `/exec//start` (#16250) - Share shm and mqueue between containers sharing IPC namespace (#15862) - Event stream now shows OOM status when `--oom-kill-disable` is set (#16235) - Ensure special network files (/etc/hosts etc.) are read-only if bind-mounted with `ro` option (#14965) - Improve `rmi` performance (#16890) - Do not update /etc/hosts for the default bridge network, except for links (#17325) - Fix conflict with duplicate container names (#17389) - Fix an issue with incorrect template execution in `docker inspect` (#17284) - DEPRECATE `-c` short flag variant for `--cpu-shares` in docker run (#16271) * Client: - Allow `docker import` to import from local files (#11907) * Builder: - Add a `STOPSIGNAL` Dockerfile instruction allowing to set a different stop-signal for the container process (#15307) - Add an `ARG` Dockerfile instruction and a `--build-arg` flag to `docker build` that allows to add build-time environment variables (#15182) - Improve cache miss performance (#16890) * Storage: - devicemapper: Implement deferred deletion capability (#16381) * Networking: - `docker network` exits experimental and is part of standard release (#16645) - New network top-level concept, with associated subcommands and API (#16645) WARNING: the API is different from the experimental API - Support for multiple isolated/micro-segmented networks (#16645) - Built-in multihost networking using VXLAN based overlay driver (#14071) - Support for third-party network plugins (#13424) - Ability to dynamically connect containers to multiple networks (#16645) - Support for user-defined IP address management via pluggable IPAM drivers (#16910) - Add daemon flags `--cluster-store` and `--cluster-advertise` for built-in nodes discovery (#16229) - Add `--cluster-store-opt` for setting up TLS settings (#16644) - Add `--dns-opt` to the daemon (#16031) - DEPRECATE following container `NetworkSettings` fields in API v1.21: `EndpointID`, `Gateway`, `GlobalIPv6Address`, `GlobalIPv6PrefixLen`, `IPAddress`, `IPPrefixLen`, `IPv6Gateway` and `MacAddress`. Those are now specific to the `bridge` network. Use `NetworkSettings.Networks` to inspect the networking settings of a container per network. * Volumes: - New top-level `volume` subcommand and API (#14242) - Move API volume driver settings to host-specific config (#15798) - Print an error message if volume name is not unique (#16009) - Ensure volumes created from Dockerfiles always use the local volume driver (#15507) - DEPRECATE auto-creating missing host paths for bind mounts (#16349) * Logging: - Add `awslogs` logging driver for Amazon CloudWatch (#15495) - Add generic `tag` log option to allow customizing container/image information passed to driver (e.g. show container names) (#15384) - Implement the `docker logs` endpoint for the journald driver (#13707) - DEPRECATE driver-specific log tags (e.g. `syslog-tag`, etc.) (#15384) * Distribution: - `docker search` now works with partial names (#16509) - Push optimization: avoid buffering to file (#15493) - The daemon will display progress for images that were already being pulled by another client (#15489) - Only permissions required for the current action being performed are requested (#) - Renaming trust keys (and respective environment variables) from `offline` to `root` and `tagging` to `repository` (#16894) - DEPRECATE trust key environment variables `DOCKER_CONTENT_TRUST_OFFLINE_PASSPHRASE` and `DOCKER_CONTENT_TRUST_TAGGING_PASSPHRASE` (#16894) * Security: - Add SELinux profiles to the rpm package (#15832) - Fix various issues with AppArmor profiles provided in the deb package (#14609) - Add AppArmor policy that prevents writing to /proc (#15571) - Change systemd unit file to no longer use the deprecated "-d" option (bnc#954737)- Changed docker-mount-secrets.patch: allow removal of containers even when the entry point failed. bnc#954797- Fixed the format of the fix_libsecomp_error_bnc_950931 patch.- Merged the fix_libsecomp_error_bnc_950931.patch and the fix_x86_build_removing_empty_file_jump_amd_64.patch patches.- Fix build for x86_64. Patch fix_libsecomp_error_bnc_950931.patch had created and empty file jump_amd64.go instead of removing it. This broke the build for x86_64. This commit fixes it by removing that empty file. fix_x86_build_removing_empty_file_jump_amd_64.patch: patch that removes empty file jump_amd64.go- Added patch that fixes a known gcc-go for ppc64xe in the syscall.RawSockAddr type. gcc5_socket_workaround.patch- Add patches for fixing ppc64le build (bnc#950931) fix_libsecomp_error_bnc_950931.patch fix_incompatible_assignment_error_bnc_950931.patch docker_missing_ppc64le_netlink_linux_files.patch - Remove docker_rename_jump_amd64_as_jump_linux.patch because it clashes with the previous patches.- Exclude libgo as a requirement. The auto requires script was adding libgo as a requirement when building with gcc-go which was wrong.- Add patch for missing systemcall for s390x. See https://github.com/docker/docker/commit/eecf6cd48cf7c48f00aa8261cf431c87084161ae add_missing_syscall_for_s390x.patch: contains the patch - Exclude s390x for sle12 because it hangs when running go. It works for sle12sp1 thus we don't want to exclude sle12sp1 but only sle12.- Update docker to 1.8.3 version: * Fix layer IDs lead to local graph poisoning (CVE-2014-8178) (bnc#949660) * Fix manifest validation and parsing logic errors allow pull-by-digest validation bypass (CVE-2014-8179) * Add `--disable-legacy-registry` to prevent a daemon from using a v1 registry- Update docker to 1.8.2 version see detailed changelog in https://github.com/docker/docker/releases/tag/v1.8.2 fix bsc#946653 update do docker 1.8.2 - devicemapper: fix zero-sized field access Fix issue #15279: does not build with Go 1.5 tip Due to golang/go@7904946 the devices field is dropped. This solution works on go1.4 and go1.5 See more in https://github.com/docker/docker/pull/15404 This fix was not included in v1.8.2. See previous link on why. fix_15279.patch: contains the patch for issue#15279- new patch as per upstream issue https://github.com/docker/docker/issues/14056#issuecomment-113680944 docker_rename_jump_amd64_as_jump_linux.patch- ignore-dockerinit-checksum.patch need -p1 in spec- Update to docker 1.8.1(bsc#942369 and bsc#942370): - Fix a bug where pushing multiple tags would result in invalid images - Update to docker 1.8.0: see detailed changelog in https://github.com/docker/docker/releases/tag/v1.8.0 - remove docker-netns-aarch64.patch: This patch was adding vendor/src/github.com/vishvananda/netns/netns_linux_arm64.go which is now included upstream, so we don't need this patch anymore- Remove 0002-Stripped-dockerinit-binary.patch because we do not use it anymore (we got rid of that when updating to 1.7.1)- Exclude archs where docker does not build. Otherwise it gets into and infinite loop when building. We'll fix that later if we want to release for those archs.- Update to 1.7.1 (2015-07-14) (bnc#938156) * Runtime - Fix default user spawning exec process with docker exec - Make --bridge=none not to configure the network bridge - Publish networking stats properly - Fix implicit devicemapper selection with static binaries - Fix socket connections that hung intermittently - Fix bridge interface creation on CentOS/RHEL 6.6 - Fix local dns lookups added to resolv.conf - Fix copy command mounting volumes - Fix read/write privileges in volumes mounted with --volumes-from * Remote API - Fix unmarshalling of Command and Entrypoint - Set limit for minimum client version supported - Validate port specification - Return proper errors when attach/reattach fail * Distribution - Fix pulling private images - Fix fallback between registry V2 and V1- Exclude init scripts other than systemd from the test-package- Exclude intel 32 bits arch. Docker does not built on that. Let's make it explicit.- rediff ignore-dockerinit-checksum.patch, gcc-go-build-static-libgo.patch to make them apply again. - introduce go_arches for architectures that use the go compiler instead of gcc-go - add docker-netns-aarch64.patch: Add support for AArch64 - enable build for aarch64- Build man pages only on platforms where gc compiler is available.- Updated to 1.7.0 (2015-06-16) - bnc#935570 * Runtime - Experimental feature: support for out-of-process volume plugins - The userland proxy can be disabled in favor of hairpin NAT using the daemon’s `--userland-proxy=false` flag - The `exec` command supports the `-u|--user` flag to specify the new process owner - Default gateway for containers can be specified daemon-wide using the `--default-gateway` and `--default-gateway-v6` flags - The CPU CFS (Completely Fair Scheduler) quota can be set in `docker run` using `--cpu-quota` - Container block IO can be controlled in `docker run` using`--blkio-weight` - ZFS support - The `docker logs` command supports a `--since` argument - UTS namespace can be shared with the host with `docker run --uts=host` * Quality - Networking stack was entirely rewritten as part of the libnetwork effort - Engine internals refactoring - Volumes code was entirely rewritten to support the plugins effort - Sending SIGUSR1 to a daemon will dump all goroutines stacks without exiting * Build - Support ${variable:-value} and ${variable:+value} syntax for environment variables - Support resource management flags `--cgroup-parent`, `--cpu-period`, `--cpu-quota`, `--cpuset-cpus`, `--cpuset-mems` - git context changes with branches and directories - The .dockerignore file support exclusion rules * Distribution - Client support for v2 mirroring support for the official registry * Bugfixes - Firewalld is now supported and will automatically be used when available - mounting --device recursively - Patch 0002-Stripped-dockerinit-binary.patch renamed to fix-docker-init.patch and fixed to build with latest version of docker- Add test subpackage and fix line numbers in patches- Fixed ppc64le name inside of spec file- Build docker on PPC and S390x using gcc-go provided by gcc5 * added sysconfig.docker.ppc64le: make docker daemon start on ppc64le despite some iptables issues. To be removed soon * ignore-dockerinit-checksum.patch: applied only when building with gcc-go. Required to workaround a limitation of gcc-go * gcc-go-build-static-libgo.patch: used only when building with gcc-go, link libgo statically into docker itself.- Remove set-SCC_URL-env-variable.patch, the SCC_URL is now read from SUSEConnect by the container service- Automatically set SCC_URL environment variable inside of the containers by parsing the /etc/SUSEConnect.example file * Add set-SCC_URL-env-variable.patch- Place SCC machine credentials inside of /run/secrets/credentials.d * Edit docker-mount-scc-credentials.patch¬- pass the SCC machine credentials to the container * Add docker-mount-scc-credentials.patch- build and install man pages- Update to version 1.6.2 (2015-05-13) [bnc#931301] * Revert change prohibiting mounting into /sysUpdated to version 1.6.1 (2015-05-07) [bnc#930235] * Security - Fix read/write /proc paths (CVE-2015-3630) - Prohibit VOLUME /proc and VOLUME / (CVE-2015-3631) - Fix opening of file-descriptor 1 (CVE-2015-3627) - Fix symlink traversal on container respawn allowing local privilege escalation (CVE-2015-3629) - Prohibit mount of /sys * Runtime - Update Apparmor policy to not allow mounts - Updated libcontainer-apparmor-fixes.patch: adapt patch to reflect changes introduced by docker 1.6.1- Get rid of SocketUser and SocketGroup workarounds for docker.socket- Updated to version 1.6.0 (2015-04-07) [bnc#908033] * Builder: + Building images from an image ID + build containers with resource constraints, ie `docker build --cpu-shares=100 --memory=1024m...` + `commit --change` to apply specified Dockerfile instructions while committing the image + `import --change` to apply specified Dockerfile instructions while importing the image + basic build cancellation * Client: + Windows Support * Runtime: + Container and image Labels + `--cgroup-parent` for specifying a parent cgroup to place container cgroup within + Logging drivers, `json-file`, `syslog`, or `none` + Pulling images by ID + `--ulimit` to set the ulimit on a container + `--default-ulimit` option on the daemon which applies to all created containers (and overwritten by `--ulimit` on run) - Updated '0002-Stripped-dockerinit-binary.patch' to reflect changes inside of the latest version of Docker. - bnc#908033: support of Docker Registry API v2.- enable build for armv7l- Updated docker.spec to fixed building with the latest version of our Go pacakge. - Updated 0002-Stripped-dockerinit-binary.patch to fix check made by the docker daemon against the dockerinit binary.- Updated systemd service and socket units to fix socket activation and to align with best practices recommended by upstram. Moreover socket activation fixes bnc#920645.- Updated to 1.5.0 (2015-02-10): * Builder: - Dockerfile to use for a given `docker build` can be specified with the `-f` flag - Dockerfile and .dockerignore files can be themselves excluded as part of the .dockerignore file, thus preventing modifications to these files invalidating ADD or COPY instructions cache - ADD and COPY instructions accept relative paths - Dockerfile `FROM scratch` instruction is now interpreted as a no-base specifier - Improve performance when exposing a large number of ports * Hack: - Allow client-side only integration tests for Windows - Include docker-py integration tests against Docker daemon as part of our test suites * Packaging: - Support for the new version of the registry HTTP API - Speed up `docker push` for images with a majority of already existing layers - Fixed contacting a private registry through a proxy * Remote API: - A new endpoint will stream live container resource metrics and can be accessed with the `docker stats` command - Containers can be renamed using the new `rename` endpoint and the associated `docker rename` command - Container `inspect` endpoint show the ID of `exec` commands running in this container - Container `inspect` endpoint show the number of times Docker auto-restarted the container - New types of event can be streamed by the `events` endpoint: ‘OOM’ (container died with out of memory), ‘exec_create’, and ‘exec_start' - Fixed returned string fields which hold numeric characters incorrectly omitting surrounding double quotes * Runtime: - Docker daemon has full IPv6 support - The `docker run` command can take the `--pid=host` flag to use the host PID namespace, which makes it possible for example to debug host processes using containerized debugging tools - The `docker run` command can take the `--read-only` flag to make the container’s root filesystem mounted as readonly, which can be used in combination with volumes to force a container’s processes to only write to locations that will be persisted - Container total memory usage can be limited for `docker run` using the `—memory-swap` flag - Major stability improvements for devicemapper storage driver - Better integration with host system: containers will reflect changes to the host's `/etc/resolv.conf` file when restarted - Better integration with host system: per-container iptable rules are moved to the DOCKER chain - Fixed container exiting on out of memory to return an invalid exit code * Other: - The HTTP_PROXY, HTTPS_PROXY, and NO_PROXY environment variables are properly taken into account by the client when connecting to the Docker daemon- Updated to 1.4.1 (2014-12-15): * Runtime: - Fix issue with volumes-from and bind mounts not being honored after create (fixes bnc#913213)- Added e2fsprogs as runtime dependency, this is required when the devicemapper driver is used. (bnc#913211). - Fixed owner & group for docker.socket (thanks to Andrei Dziahel and https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=752555#5)- Updated to 1.4.0 (2014-12-11): * Notable Features since 1.3.0: - Set key=value labels to the daemon (displayed in `docker info`), applied with new `-label` daemon flag - Add support for `ENV` in Dockerfile of the form: `ENV name=value name2=value2...` - New Overlayfs Storage Driver - `docker info` now returns an `ID` and `Name` field - Filter events by event name, container, or image - `docker cp` now supports copying from container volumes - Fixed `docker tag`, so it honors `--force` when overriding a tag for existing image. - Changes introduced by 1.3.3 (2014-12-11): * Security: - Fix path traversal vulnerability in processing of absolute symbolic links (CVE-2014-9356) - (bnc#909709) - Fix decompression of xz image archives, preventing privilege escalation (CVE-2014-9357) - (bnc#909710) - Validate image IDs (CVE-2014-9358) - (bnc#909712) * Runtime: - Fix an issue when image archives are being read slowly * Client: - Fix a regression related to stdin redirection - Fix a regression with `docker cp` when destination is the current directory- Updated to 1.3.2 (2014-11-20) - fixes bnc#907012 (CVE-2014-6407) and bnc#907014 (CVE-2014-6408) * Security: - Fix tar breakout vulnerability - Extractions are now sandboxed chroot - Security options are no longer committed to images * Runtime: - Fix deadlock in `docker ps -f exited=1` - Fix a bug when `--volumes-from` references a container that failed to start * Registry: - `--insecure-registry` now accepts CIDR notation such as 10.1.0.0/16 - Private registries whose IPs fall in the 127.0.0.0/8 range do no need the `--insecure-registry` flag - Skip the experimental registry v2 API when mirroring is enabled - Fixed minor packaging issues.- Updated to version 1.3.1 2014-10-28) * Security: - Prevent fallback to SSL protocols < TLS 1.0 for client, daemon and registry [CVE-2014-5277] - Secure HTTPS connection to registries with certificate verification and without HTTP fallback unless `--insecure-registry` is specified * Runtime: - Fix issue where volumes would not be shared * Client: - Fix issue with `--iptables=false` not automatically setting `--ip-masq=false` - Fix docker run output to non-TTY stdout * Builder: - Fix escaping `$` for environment variables - Fix issue with lowercase `onbuild` Dockerfile instruction - Restrict envrionment variable expansion to `ENV`, `ADD`, `COPY`, `WORKDIR`, `EXPOSE`, `VOLUME` and `USER`- Upgraded to version 1.3.0 (2014-10-14) * docker `exec` allows you to run additional processes inside existing containers * docker `create` gives you the ability to create a container via the cli without executing a process * `--security-opts` options to allow user to customize container labels and apparmor profiles * docker `ps` filters * wildcard support to copy/add * move production urls to get.docker.com from get.docker.io * allocate ip address on the bridge inside a valid cidr * use drone.io for pr and ci testing * ability to setup an official registry mirror * Ability to save multiple images with docker `save`/bin/sh/bin/sh/bin/sh/bin/shdockerdocker-libnetworkh02-armsrv1 1764337278  !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~24.0.9_ce-150000.1.33.124.0.9_ce0.7.0.2.24.0.9_ce24.0.9_ce-150000.1.33.124.0.9_ce-150000.1.33.124.0.9_ce0.7.0.2 rules.ddocker.rulesdockerdaemon.jsonsuse-secrets-enabledockerdocker-proxydockerddockercli-pluginsdocker.servicedocker.socketdocker.conf80-docker.rulesrcdockerdocker-stableREADME.mdREADME_SUSE.mdsysconfig.dockerdocker-stableLICENSEdocker-attach.1.gzdocker-build.1.gzdocker-builder-build.1.gzdocker-builder-prune.1.gzdocker-builder.1.gzdocker-checkpoint-create.1.gzdocker-checkpoint-ls.1.gzdocker-checkpoint-rm.1.gzdocker-checkpoint.1.gzdocker-commit.1.gzdocker-config-create.1.gzdocker-config-inspect.1.gzdocker-config-ls.1.gzdocker-config-rm.1.gzdocker-config.1.gzdocker-container-attach.1.gzdocker-container-commit.1.gzdocker-container-cp.1.gzdocker-container-create.1.gzdocker-container-diff.1.gzdocker-container-exec.1.gzdocker-container-export.1.gzdocker-container-inspect.1.gzdocker-container-kill.1.gzdocker-container-logs.1.gzdocker-container-ls.1.gzdocker-container-pause.1.gzdocker-container-port.1.gzdocker-container-prune.1.gzdocker-container-rename.1.gzdocker-container-restart.1.gzdocker-container-rm.1.gzdocker-container-run.1.gzdocker-container-start.1.gzdocker-container-stats.1.gzdocker-container-stop.1.gzdocker-container-top.1.gzdocker-container-unpause.1.gzdocker-container-update.1.gzdocker-container-wait.1.gzdocker-container.1.gzdocker-context-create.1.gzdocker-context-export.1.gzdocker-context-import.1.gzdocker-context-inspect.1.gzdocker-context-ls.1.gzdocker-context-rm.1.gzdocker-context-show.1.gzdocker-context-update.1.gzdocker-context-use.1.gzdocker-context.1.gzdocker-cp.1.gzdocker-create.1.gzdocker-diff.1.gzdocker-events.1.gzdocker-exec.1.gzdocker-export.1.gzdocker-history.1.gzdocker-image-build.1.gzdocker-image-history.1.gzdocker-image-import.1.gzdocker-image-inspect.1.gzdocker-image-load.1.gzdocker-image-ls.1.gzdocker-image-prune.1.gzdocker-image-pull.1.gzdocker-image-push.1.gzdocker-image-rm.1.gzdocker-image-save.1.gzdocker-image-tag.1.gzdocker-image.1.gzdocker-images.1.gzdocker-import.1.gzdocker-info.1.gzdocker-inspect.1.gzdocker-kill.1.gzdocker-load.1.gzdocker-login.1.gzdocker-logout.1.gzdocker-logs.1.gzdocker-manifest-annotate.1.gzdocker-manifest-create.1.gzdocker-manifest-inspect.1.gzdocker-manifest-push.1.gzdocker-manifest-rm.1.gzdocker-manifest.1.gzdocker-network-connect.1.gzdocker-network-create.1.gzdocker-network-disconnect.1.gzdocker-network-inspect.1.gzdocker-network-ls.1.gzdocker-network-prune.1.gzdocker-network-rm.1.gzdocker-network.1.gzdocker-node-demote.1.gzdocker-node-inspect.1.gzdocker-node-ls.1.gzdocker-node-promote.1.gzdocker-node-ps.1.gzdocker-node-rm.1.gzdocker-node-update.1.gzdocker-node.1.gzdocker-pause.1.gzdocker-plugin-create.1.gzdocker-plugin-disable.1.gzdocker-plugin-enable.1.gzdocker-plugin-inspect.1.gzdocker-plugin-install.1.gzdocker-plugin-ls.1.gzdocker-plugin-push.1.gzdocker-plugin-rm.1.gzdocker-plugin-set.1.gzdocker-plugin-upgrade.1.gzdocker-plugin.1.gzdocker-port.1.gzdocker-ps.1.gzdocker-pull.1.gzdocker-push.1.gzdocker-rename.1.gzdocker-restart.1.gzdocker-rm.1.gzdocker-rmi.1.gzdocker-run.1.gzdocker-save.1.gzdocker-search.1.gzdocker-secret-create.1.gzdocker-secret-inspect.1.gzdocker-secret-ls.1.gzdocker-secret-rm.1.gzdocker-secret.1.gzdocker-service-create.1.gzdocker-service-inspect.1.gzdocker-service-logs.1.gzdocker-service-ls.1.gzdocker-service-ps.1.gzdocker-service-rm.1.gzdocker-service-rollback.1.gzdocker-service-scale.1.gzdocker-service-update.1.gzdocker-service.1.gzdocker-stack-config.1.gzdocker-stack-deploy.1.gzdocker-stack-ls.1.gzdocker-stack-ps.1.gzdocker-stack-rm.1.gzdocker-stack-services.1.gzdocker-stack.1.gzdocker-start.1.gzdocker-stats.1.gzdocker-stop.1.gzdocker-swarm-ca.1.gzdocker-swarm-init.1.gzdocker-swarm-join-token.1.gzdocker-swarm-join.1.gzdocker-swarm-leave.1.gzdocker-swarm-unlock-key.1.gzdocker-swarm-unlock.1.gzdocker-swarm-update.1.gzdocker-swarm.1.gzdocker-system-df.1.gzdocker-system-events.1.gzdocker-system-info.1.gzdocker-system-prune.1.gzdocker-system.1.gzdocker-tag.1.gzdocker-top.1.gzdocker-trust-inspect.1.gzdocker-trust-key-generate.1.gzdocker-trust-key-load.1.gzdocker-trust-key.1.gzdocker-trust-revoke.1.gzdocker-trust-sign.1.gzdocker-trust-signer-add.1.gzdocker-trust-signer-remove.1.gzdocker-trust-signer.1.gzdocker-trust.1.gzdocker-unpause.1.gzdocker-update.1.gzdocker-version.1.gzdocker-volume-create.1.gzdocker-volume-inspect.1.gzdocker-volume-ls.1.gzdocker-volume-prune.1.gzdocker-volume-rm.1.gzdocker-volume-update.1.gzdocker-volume.1.gzdocker-wait.1.gzdocker.1.gzDockerfile.5.gzdockerd.8.gzdocker/etc/audit//etc/audit/rules.d//etc//etc/docker//usr/bin//usr/lib//usr/lib/docker//usr/lib/systemd/system//usr/lib/sysusers.d//usr/lib/udev/rules.d//usr/sbin//usr/share/doc/packages//usr/share/doc/packages/docker-stable//usr/share/fillup-templates//usr/share/licenses//usr/share/licenses/docker-stable//usr/share/man/man1//usr/share/man/man5//usr/share/man/man8//var/lib/-fmessage-length=0 -grecord-gcc-switches -O2 -Wall -D_FORTIFY_SOURCE=2 -fstack-protector-strong -funwind-tables -fasynchronous-unwind-tables -fstack-clash-protection -gobs://build.suse.de/SUSE:Maintenance:41825/SUSE_SLE-15_Update/045e3e735fbf2cb5a55702dae9239750-docker-stable.SUSE_SLE-15_Updatedrpmxz5aarch64-suse-linux     directoryASCII textELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=12a1fa89fd6a2cff7260a53bb60fd5d2b4920c1d, for GNU/Linux 3.7.0, strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, not strippedELF 64-bit LSB shared object, ARM aarch64, version 1 (SYSV), dynamically linked, interpreter /lib/ld-linux-aarch64.so.1, BuildID[sha1]=94142bd254f086cbc21140ce8ce4989d3dacf283, for GNU/Linux 3.7.0, strippedUTF-8 Unicode texttroff or preprocessor input, ASCII text (gzip compressed data, max compression, from Unix)troff or preprocessor input, UTF-8 Unicode text (gzip compressed data, max compression, from Unix)troff or preprocessor input, UTF-8 Unicode text, with very long lines (gzip compressed data, max compression, from Unix)troff or preprocessor input, ASCII text, with very long lines (gzip compressed data, max compression, from Unix)  RRRRRRRRRRRRRRRRRRRRRRRRPPObWn=@apparmor-parserdocker-stable-rootless-extraslvm22.2.89 utf-8df81a968f4778c7c7df592e15232c1d63434f3726ffc8deb64cebacd5baeaf9d?7zXZ !t/V]"k%+f;ӡF5FnıM[F\,(hP/)CnDNX`SOӬW?OA%HtC'5~AJx.5˛\J6[F:>IS*@d,{(~"SEͶr |B#q!yXRA/z,\bZ熭IH@gs/NDžk`0^x'tt[4&AqdBPZÜx!e? D5c)\R$3p)Ɩ &0u fyvD  4Jx?7o`x]ãac*1Ju| o/Zj&">̭OZL D^S_re}n`'5@a ^[^ȥ:$ήf.AJ7i "l(>8G8-Ϧ܆z'x<⦒_7(\*$#ꔅBNhO9 e9w"hD= Ѭ{kwكߐUոxxM,x#bQRwSN`[+?E)DI X,d3Ѭȿ?C#%\G{Wa``}5ؐ$-[,r WR|Jv~ ă]8KYs%)RpK}dRqt, J@ lx'E)tr珷>9V2i%7s,!VFoz\vJ o6A V`ڇ];FZ붒:s(v6Wh߭h+ކxk!*YO ϱe=m9Z*ܾǽ=v}9?AVؙʫ@/K-9mf* 2k'\H.4ަNßAg3 m̬72y"`|o}hI $|_ÑQg- ]mu&d(@71Շ nPz߅dR@!rbiah+LoRs%S`xi7 m z7C=n.9#(,5HאLZ_kw>TW%&&_4_ c=$t$KOug6]'r`bt\0H oK-SbZ+|CSp'U36;4F}[;(LO˒My-'8"gX~о \@=p EF%/p~pu:ތR[A>;}[yPKVӉB8vߔPZ)zCtJtNBKC+m;2=3+@ART$ ;m޾6 wl߃ 1Ԗ{E.>N5.rgg.N @VF{"޶;I_>^mirk&c`WR8}sn-yȕdāLV/vuM =3eĺ5=^=Y]>ϾO| r*ڊ9iLeCҨ^nA5XMMV3FyBGϰ=]!ٱ^Hf*B#-D{-޴0|i}֧#͏fj>-Џv V͓fHh(>%cYS&9Cca&+#.TU$27k ~$Cϛƚɗ$p~B zik3oNC`ϟ7g+a]GŊ3q'@+blK7nC@^ʠQK(xT^Y1)R=%OKeËJaS0c,1O"^Rlbgq"g"Jv9af.=ymɧDd&*uJ/xchp{ǘ`LRcw`Hs䚆$ixзSUІ4} a[ZbUwIUP'[6lLUH6I.ՂJ) 5ZlJZj5qTW-DO,V..}4ΕNU컼PH[=ڱF)}PX4Qn=a>UI˱&Tu@-JkT;6ՓRJ׾R)ך U-4nzO< uiA/#6]gZ$$"a :k~)2IBi?/oK~qϜhoxx)FȐ+F#CMфHK%JǑU^5o.jv9}vGy>W,AZ?#ۣ퐓=UQQT Rc~[ O-n.V|l| t6>C+0W!h'l}/WIHLMzNZՓ:=<*ZL( Z$UdE7\SKI?o km0"JEMx@r޽q _Cqq7\`[lZ55\ۊ^ڇ=P|.y+ƐhV^: .qn@|0۱Mѷ[iMNFozXX9a 2[1y)(Zt;4A/i颂3O*jٚlw>@%tB+/S=ZO'zBcTJU]!V1x.ȋGtL:%8ja (`XrO𛽔C!XL%Ni?9<4>35x!²C$|,g> 0-0rdbAQ}"gb wjC7IXVyA7i|eF&8;ɺ;N+li ɡ&Iɩ\@!ICG#l̓VҩBhcb:ǨԦ=%ЛX ҁMӡ5(>'v|\q+{hcc$]-9(P8(`YЭJB(Lk d.9L/ 3_;TBwri%4V J Ǡ4I|8ߪLN9Yӥل}BgʗbbJ}D*S+ψ񎅀<8O- {ؓZRUj-~1Gd;P:0[ɿOC@jX-ą$%}i G>xˠC.ns:/b__%bFѢ]/R:=2ej,'%!mB;+ 7{<FPéskR#8tM8W#7r4|ҮXaHۮ8e(9M2f._oU DgaH< `b,H pLi;j F\ZìX&V1T[U"u{d6xFm--_еׯs4`1Ƕy&od+!2CWNAU_쉁.2DbXQsb=ʗKFwẘ:ڍ@m3xR`?='zk ZMaBZ]аN7X}^yL("#O#1mrp p@rCV>o jkx"0fMޝQ0#Vi 6/Ŏ?_#ox7a7^FΪDžYԈHPq?Tˋ0 PMl=m5 *2B Lq "Fg1ΉHõ14to̳?NdJsu a${HX[@dViY p~ȴT_[2g0v/5A@F]XW8UWm.5fU\SRVmn]d[E|&C%eFNi֡(d`MIn:EIL0+!`зc"8ؓ,:D@`^Tҧ|j¯]775f=spZqqHK΁xgy[&$6u9oK Mj򽶱b՟lwx' [sQAծbȸB!ԯ)vIJ#k}s B 4p'>r?1'8.Im9V,{8|zȃ<M 3sethk P N[U!y )2a\D Hzke+9CG% j}`՗C*E P-{5# p?"I7j@ `ܝf4?ULB'Mb.T{󳧾ozQ~GJQ/XNre4" 2: {eX ɝ'6ʿAjG8g8]0p%@[S\?0m*&Qsw)wj0wh*KY&"eFFn/6[o [>A{41)֛@ŋjYnp~* HT1p%,d~'dr{4O 'X܁#^mºFS..i$+k5àW>{LwDnbhrqQT x|h >@W,Xd&8PesM,q/HfG~-_zH2I_3ϥl~ v0ݝ+V1%=!jTj(h)٤|m*~Xþn;r>(ECoGl@knܿ4O}΄Xϼ]厴Up͵{Z|7L&Fc,vl4by1tpA0mŏ3\қV?7S֨ 1zI9<ʦs1 婫.l/~UZm-QФeR(VT~X¼N`&z*p}i5N4G8e FHGX8no!TTU2z]-p"/Y0nˏkEy/P(e#0p[ut)^Dqq MX6EHKn{}y&ƮS>}7 -M(3o(O76].V}#U8&jǶoe)  +R1&{+Y8-^sOgE9 6a[p٣+eC݌|rڀ1"Bu ^VtjڽM!DeKv_әkDK2pNcILfDhȗ/\Oix.) ´Ȋ κΑNJ=W(L'#09"nui#2>]`)[16LapTsrSK}^n-Ԯ9{]7-.@sE{A{F"\K5!5+B 9F4G'Nh,![-Yzv!^x3&ӂۺbZ8JgOg2eX'8!t:{Q5JHvm &atL<`I9I%<L s~ɵS#4gW'<4{L8nnqWfr"cD ^pDV@?3+v`,'klXqQe7<!4G+[Ӳgg-llOC;҃|uIzltT# }9;:O N'D; {o_:4"ie[/@fv-Ě4eeqviTh΢L3Շnx;ڃ} s"`zax=rC)dK_wөNYvi<,KmM [4x2Э?pv/DF;C;â^  wUeKu+:s۸]sBQ$ ᄁDL[9f\Lh˸!06H :d*a5S|2vGͪٲ%ޞ>C|VuX<%M(tW 4I'%*F#4+o 7=mȼՎiXU 97FTIZ,J%IDnZ?_ YZoHL}ox. t6P61:>e>W!R h,Yn%tf5\e&EDB-aCclLTWhs0#%ql!{z,W"g)kCL況(Ȅ({r9(oãCGrX8Ďc{v(8a4;^iʌ<ݛw2Bn=Ⱥw],>:v\FQILI Y19H.lXud0llBiv~ڈ ADx)@?E/,(ȞU[j8_P+R2~*uQR+4ET BӝYqٞs'HOwN%1d6(.MICM"'jCpQj$Kz5ÀȬmLix= Y!qB-dIfh6>W^,mUKy-q>^w&JO˔[C_bry2רoU!nUL yF=>z!1m3w7! W]o΃LƐ:Ww7dnY\qoy:%="}\=p1)} ,R@]L]yLIЀT1ÊG]Oqd JVcj>0(fp90ZZ TfAbvԼq<.](³فSvY.\Nc/|'ߞ1W\ ]btSMщ+P_6#9jkb@doxa&͙4Z`wUސM^))&[aH=dd c!xGb_GЗWUؼ?`4lht SH#1&=BDЦ8.GW,h?K O'@Un 8E=R!&dƌ'>s8S/bYz'JhAf'ґaԲ mAlP*K-3{hG,M1+@8n"/0Mo@TO >!!/F\mdU7jbj9[2YXCRM5(O lpbos/QeWU.,LjXd0a#xN/r+ &r/1w_71;Ȗ:7WJF3YԉR"0)DTzr]":,`7}0nf}]"* W;+Ci{d9AuRF|e)8 =4K<-LO_IbwV &(թ0R(2F~~(fW-M gAL|"ᝡ\4clF^y%}/Un[#Rt] Jz$k{C?^GHnC& YYSiyg}4\l$L!(<ձwQWD4gn +eLOVIQb`^ȁP ?zVy׿K=sN6{TQ97H{%N)=ᚌЪ (_Xr4 `*ߌqQE_ɠn ;PY[benPjڑ8QbxgMC"jbɄZG_ĀVC{MGc\WӞӫ߸HLg)x$U!~f9J?kDd#TQM( aũIU^gƣӐD-ʂ=WZCn ? KPZlɊ^p$Gtbwk_!z8ffnOoH%2VMz5ulq9"e/ݶ&eZcZ-jiwghdqTȿl30hle}wv(SytɡMćuW]gް#YcfdU_n㑱/BS f+!j#<[)و$)b/'xmeeo.OJeÚ?5|x@/#!tfa/.xҥ5ٽS-8οs%ebKV6!0m-W5Y &Akn ^xMn-5kr=eF &?,|xv\H$6)vX »P'eL&Pbnv QI &O >I $5k?a(Ha"q"0(1pKy Q&VX5uYk [vGJ g XZ܃67̅O.IB 럡Ԉ?7!!d'~A#GpuC5WiW1g7\2pbt^@\ $ljAVFK[֎A(A\fohäE; e*T?m",$ X>Ff֬Ρ2)M/(4l/H !B%*zaBQV˟cr^߾`##ye~@_DU{D~;߅NSrH2덽O" tOn19Fj⯡2[{n)즉l ˽5GN:@mR'+Qe<2 9%!Ye \3+ (䧕c̼ݪu5,h_GJN#daѰ [=e=(K+?- zЁ̆7s)Nմi47:B2^ /L@D@8ʀ4F;S\qyYa%i_v/A(6je7]%3>*8Ky,˓ cWPe*h4: 9fܧǒYs6=TN6Jp-d +soB|O[K nDKhS,z N=$2=ӎêF-kt1ceUn(rՄ0"fTPflW?LϞoOnޒ 9 bhH#O lӞ_G*c 5,&)TkD&w퐓~O=0[5J]|¸ga41iZh/Ӎ>\.~=e :n#ķ(CHu,Q8?UA֊@w|0 (ք@"10%Sw3-z}`|Eà{u i'Y~ +ފvKu0;D ꜱ?S[R7^D}YfmHDY5!&KEhpC~kR:6eު̀}m8qV"U*L>Xc2 6FU|":tpvfSs-)Nxuٍ2ޙ_ ۦ:mkyybN:BwM;:ιx8&LN<6ql` "q1 kJH$MmX=Z#y{]F'a3!MQ ΅Gf/G(0#s|`UcO\.a)gk2 K1.8eKkڱ.y%χ N1^e/({6bh8=^ؑǣ w䃭lo4l2ݿܱxhHi b'+?)~8ς[@\tI4@$鮓J20C>:iF@W6.l8=8Y.0}h I(#-J&idgv%M`^% ,-Q7-#0f\-4Ӄ9v@ё_^b(#Gr;d,ϓځc#FsäOt}تY%<2/O9;YXR[^"zvݴCvu@su/u}7fg4Mh [`7 V`2,mQQ*a-Sf^&n0qzS kO3j<@3iG2ME:#1]0i!mWc-Ie8O Ֆ5wx&KY|)&7)Ƒ^SRI!i8=`Q̇A]q& d lG06 n2xHLjȒ0D0~MEU݊/]Qv~pB퐿)PC.Qk RzF! q|"sKዷ.8HұO} bV"[.aը]暂U8x{Ef*ێ%mv`z$*RP䧭ƩDI~ߖd7I[Fp?lLxOn گH]~<-)::PnxTҸ*L>ŽEtD1u,/; E\eMSLPBބJs6=\j@z29x>8nUnvQxQ|2YiXYP!pN\0y[ )xn}Gs% MrDD`AືQkSk,Iq| /n~]2#5JaƪA.E{+gO6m,zݾ/%?$CwN2%I(wܲ %eOwop7[RB}+˥)p7\ D\̉{Ozz-5V mUeW)i?,+Iؼ2IlL^uRqta K`@Ά@%4w3R+E'ؘs*UQI+E9{CHO%EkX+fs`S7qAvi fW"BNYGjb3ĭ6(k!QEҐݳ*zUܫ<7켾ǠӲESNIspa6 HvoG3U&OrvPM8KNECpe7RvvXMͫ_D$Xo'wٴ(dSHͅiF݁Wu~+c#AGƿ{ L9.䷕ȓ$5 װ8c""'uEmQ/CПNS ]4@YȔ%BsR3 #@'8w>ARIB.VZ*Eޑ2`2&E|H| d;z!JV*=~k`b4]msǤ.)ˢx@Ͽӎy>RP0Oφ6 |m;;F.g\) {o7xD@>t:(xai즌O~%3DF3dcԢxӃ4],Vf`UU7rji!m0T;}Oi1 $vv]9 ԝeB,?XǷӌشM1܈;N E?2g~j Q2xQ0+mւy"mtEs? }@ECo 냊e[Fᬾ7KBZ{&Lyd@{2}8m8#H8Vɂ4FCoE TvC ^adzCY%ϝ ÿtw6e!ܤjAyL"`0ഥ$JT'%-Wt@Kg7Y O(G]\x-7n@mjk@oaW2p?eݗaUE"ڃiy?%'WLӅft)ԤX2dxs=mN J@&yXD%c>15-WڀȂV+)…3a3/(l Rԃ3WLE1,@5#"ycݶc6`%ngLOA\Ǐ]g=l(As\Nxk)Z`{=9B XŀJ |mg"yR3FNZE嶠[my82gB0u|(g $7X6Fthhɹ69@ٴ{dHdކ||(Z a{`"ɑSܢ.UYQk.u܃yC1oAGfGZ' a ǸFU̔qM{64fX+X6Z\c!FƣյOndxS'6 U;3j?)V'U$=7#|G=Wz3R︡e9n֌'m~EK|Us AjۡR=qVHF(Ns5N z%DES̆X[~o<B@@\bǧ/ 9&Clp,.g)Ӌ,U҇׾h,,DkD T LgB3ETftMrN&ODdf_vxIYAns`STD srF3&0tVTM=lIl:QeO#(w`ȩҜnqίd;'?JFA<U'sM^X#١!25o[SnfuM63|x~hmd`|D4ÉL٦Tl͖6gfx6)M~cU'yt(+Kav0{IE:JD*_e_}V8͖8C/كLd)j(4c:Kq`T|2"lH; LYVUdi@>KfsUk`iKg9RЂX=CMcfPvL?gTgX. .aKoU1Xi&}$IP';R>x=gZ1!\UD.8/ꉨYo# EKK׈xP9z1d$O3hlن<H S )]fҏSÒuGh&Wl*C~5X; _Ӯmz"Nd,֓ڊᆵ_l۴ ҺUp; m5op:~/i(JOf0$ V^=5,Z0"=ʐ>Zc܁!_i<S=:1γhScm0VDkV]A%Tfp:!uSڹ>t{W)wHA?hWrrҔ*zGr`/!Ssr_uArHQ}|U ('%$ ?%nZj|2Bl;U[蕿na}>s8`ޘqsStNGA^ފwb@3J C<{[ jM0=̺yf d_wv 1]%8 L"TN.hIb' <#)'0V'AdeLIFc|KGMm;Vwؑ1}0>?W.e2u2I߀)IB/2d c&bi &.&ovcՒ|X7'(>A zΐ)dΘvkR.I Szw9~#&9DJxr؈4bQfCW ' sQ mMCdm8X0%s(qgݙPc3LT^fGNnSɣXr\M6WW!^~۰+Xht2&d`+g:I#ş4TgH%*C/ q).q 89XVBұe{QЂ1fMpue{%_\L-X}ԭr HLi#~O y *x=K5T%eN&=V,=#gDl<@#NԗP667h7|>ᗽf3}.>W~13+|qֲ ܬxVV20(&5kQ Dg8R f|zҘ &ȻeKw|"].FL 3[TVWzs(T=h_)IE׾#( =~@?5nx-6a~Y v'o7JwGWC\N ]_Qv] !A6;b$jéYGu m`f"']?4( Bf"_;)^7;ߚ9Yk^ǃv>-kSL2>3#HAÑ~+@S %,.&c'GQBgcN^>V揚qᎭ0S E C/lSx)Ԏ4Xu EcfyVnWsF~O03rٽ]v~F२> nu N,K z/.`ckhF_},S_ q%D-깂1tZgB(M3Oz1K~*WbgCk6e%_O. ]m(AF 31]#.2鯊d7vR&ǤKc/n&!},3*ޛK2/^{`^t3QETIin02,^ilk =܎U5`\*ˇ"3Gj}fFqM#rNahB@Tz*z @&/<ʅq:&Ӛ3l:sL;fݧmSG@MɈz E>hjn./)kx[YZ2X#;:?%A_Q%JkgBaY-4xZtHKK/ ~-3\9#YLb}CIlrrĺ vTm`MHfA@~Լ&8EWb:'B ({}mchx!AO*_#Vuq+@ оgσu$*slǽǴU9kźi8>5,Tb xҺg3xYrpf2b5q#\#[&gMIoa Er!40nv!dSbxc*`'j(E4DPqgLI7]3PYdV*`Go|X&߈hCd*m{vg[O̐߰Z"e1T[Qv#܁zf`T*|_Jv@o˃۝lXu7UL 5;}Z~V~i6z%hm@쬙y0kx4 Yחd NeTy#z"nHl25ğb.QĠUgC5# 4Ɛ-LI ՑG*w3s*듩̣Xt6 ]z_'٦4]=z4ۦ,AA&bvgo{F++$6Ps־܎ mFH>NKX^aU5mq8`E'չFՋ -"&9/Jx-N;r~׺Yu-I 3~фgC\Ui(< / K{so"*'f[9BMg)K S3O2픠c`oӪѦYTH]vM:'fQjryFǢeZXvQYqa ޥmiC}k_j2n_÷`fg dK/Ec/7)GC6L+~ΤyEcL,/0U>JƙUqas.`3mGWpNx>XrcuKͷ%DM,l-Q'tlSJu|Yz=nf KK9+o fRVM [@XCjnb.7p+cP6?acS>>qF$\i.5Z(XeQ]`̣mhks߆]Eod8<Y G wQrNnEdZgZQPuN8BUصc# _82i1#Hu[#>]ї~>EY&e=wR@lh`9s;Hsq}*wb$U}YpokGMm8d>!21HO6qȸ~bzx!)t'>a OX߸\~2T\E$H_cfB-kVcr߀(H5ZH.uqDz-/nsV{J@ud'V{fs9uyҊݢAK[nnwhةz}jzkD-a%aH 9Qtmj/$Wa+X^,3I|İ 3F鑶C pRd&;/vQJ-} Jںfʌ(`6~`}+t4qՔiNM;lְ̽ĤG5#Z:qw-!QZlfO4t#PʖXa^AȎ3)/IɊV񿓸|RȽݿ`0l~/Eo ri(,{Q2BQF %; 9*Jt'.խЦcWd8豒TO(tA='8V.Ԟvxb{Y %bim_p94 zpn#llc#+Mzg$S 6!זp dgͶ< i!D[ ׵ 'Z-fpJX&aM>U~&K|8f]KD3k9U|@I@a@ B nDA#].U^wJ`~M׆@S#XOS9oapg?{E^w_c5MT;fX 4n~ovd̋:Pl=Ǩ2s41 W pp|D{E|(f0]eWx7`g>əYl0_zJUȡGP!fKYPwRo,v2<7oBaseޝ!K4nsIIE ._k59S>O 5~s\"ƈGETTYKs^9B҉q-vĠ*bf:fqWCI/PD5MUѷxY>~dS/ ,m9|YɯC1{@!8aRߎuO`W26|ĎC2E)Qp5~ lݬ`#nu|ݐQ0 f S3!~( +[k~d =)̬:h&7|_fYxf>o?!M-He߉3 G|#a|Q,zCweX 4~u-FKtVjk9XX~pd0MT_|- Jb[LhQHmifrJ8#qvZ VO% IRl?c%r"ZvlD1/+(~~\koر-)#$L<=ɵ}Y)/toMxOb fV䍱W[7wr>?|v'jғzfL n}$R;5kN~Wm><޶`8 O]ωn?n+WZOvQiB_CkXWZ,ʇ:2bFl @8;d s1!9#/ JM,A*Jr D3ErRuORzҳTqV$eV׳իhbtkC4IdcH1IXh[1\u{&i%kڧUvÔAxU"ci3xt48t=Hԩ]85{&MwFLvta ā0oEe! m>㨒}r%BHګ 0K D1mN^&B 3E~n.=ue9[s?; ZKݔ\uGP@wHɡ"ǩ5h;SQ:ӄW0~y4?%ׅF:c&\H3,֚#_L>ئ7(_@}PX澃K~Z~ƿaڕy5eI %xROs%?{kLYt}D==J4k0R1;ؗS!}]X7Z 9m^2*C `sd6>_]IYuc(‿%65AH.ԍDƍwby{gXB'1ZOtwcp_LZPF~9`M|IYu"E*},9P'N[>cMA Ugvqvp(3n7ckM܌n䧿|$r&If \8\+#>c Zōcoe!zӐv<΄+Mq0rH(cNYs;ӥE()#G޿e8cjNxtoGN@\3!;ka9؊l0.6G=3gW$~q= .=VIx78gv̏={:="0Xl:PL?š/q~mZ^KXYYOv\el U|o,D'xz]/Uҷ94&^#urߐ۟+6R}RFB:qTc\ݑX`V{i\:ꓩE?o- :ֹfQ;啇 foS[Zy`jB%a`>[)R\L&5!p'o֔ f{nN)p("<RDU ]~MC|:S̀!+u[WX+ $e͛Hm/Kq't>ݛMEan(ވΡ DžQpcwwزoP&itgq.`ib©_D Ջw7Z@∷E8i7a&pse|+SG4]X- m.KQfh^91eԶ {)[ I&>I$^R:Kg=l\;aƈ}KfgupƒX6s)νx%>1P^~*WW,]=a;˩E;D&M^ZJLAto]颤Y%ʬ7IJy[F+TĿ?G3=:Xx'gx~X3ҭO!J4iln1$КdC}(>Rd^ xCaiVoP"h˛`"8;i-󌕲<^$mmN5\&(0[T,c)ubR l_w|]4~sjQcYpX}Z4pOz=8NYHa y8*^_+niMq 0fUl^"FupaE7Kr6P\&ὄ749lIx5me> A\-9AGe6BP,!rsDI߭iCz)j4,L1g!6RzZ6aZ ۛx{]1 H0M}5q}Xnb}RL1LJLRhAv I>JdlkR27Aw3bL3ZMpc'M5 i3o Cky쐝ʸ;^0&bU >thr}aHy%p$v'v@{eB)TdAO뎣}MLxn' b&+MblCL @  90(V>YZh'_3C)zySm]]82@*?Lz#scMž){-_'T {x,V[YL^3Җ25\esxf0MI@Iadfŧe3dk$]‘?)#, TY6-3=od b Ml[($0~W*<%j:rfSccQ9kVA$gÉ3f%sݾ+pV>ߧ=,h2lN6r%Q2o]7(C|ǬMU{@e.6bUn}AsJ{ J|FijIlA~qӓƭw*zraU͊$7Nm)ޔL-3nq?.GyLʴlptai`4?,܂ِ:Asw05Jf_{9VCv+_ &ӝ!gc?=DsyCqM{h^Z;u2̖$/ ӛxLBr@h yNQ%0e,!=Xfs#R8^/ g%s?2ʻoF}& Zb`Ȉ ZnGV1oǨbTIj"kP['w\(˰y~,R$}MN U.mpidQp=ƿd* cjZ=A\- K,oRB`|zb dQ8 DޥLyѢ`\.`~|z^e j@2MBw9A` lIunjrGeٗs§Ah O 6 9ic,3wp}OL {'_Dcа<杲 !$8sl 0|5?aIHf@жYI܎lk'}9 F^Fļ qVN&bUSR BT1 ЇOtlNd DO AT$ @*<گL(* 0d"F[zF1ga1_Y;Þ5xv.Y8]e0QO.yю띧z FcȞ\l'gYFΪ,DAgNŽP=;fon w`;zɢ K#/R ݱ3MRx2T8tuv~`Bg(،A)u"ؠvsLڬϟJdY1|)9n,¸2zmeIEfxW({tDQA~00O6C@{d{0mr4#~Ѳ: ]1Dx<) \+ JexϯT,|-8\f/UV7O$BG0b|q*1FIlJ9 കiWh~k.dOmS "vm~L7\MWP VUi-$?K9y'859SsΌr^lCOl2G95+mbϬ nfMsVުф ]T$S(AўEȌ7NT4ATetybzE6=̞! `)' e|ͥ2ԕvw+Q.~UޓϷAĈ*5xN~Ɩ8[ W6#\h/Uv~WCa)wCИӡσi+lTWIOh ^vyȐV6 {}rA~\. ]D$׾obIwb(6R;jNU*ff{[ ʺslAVތkQ4-*y%گ=w[N "yu_j)}1FO۰L!^;y#׮~Zѡ@tHcA`E&C/-3R?<T{ۧ39g ͭxNuIr:d&;S>0螹<^e*aKbR CPhg522ZH]眆[0s;\MP `dMp͔D/mgה7(3LlʽޏJsC羢NT5c"jJ5`o-< Ca}ˬn\XƆa-P0vAXX57p϶.3e?' ,t+XFD*w®>6ypA>g̦ E(ѳ~7s뿇_7J@Λpci[&9?įꑆDnR!np}RlǴzZ ی= ;Hw˹AzJ\t{f gs L}c^gasɢo`waHgTzl(F'-8!γluuvy2P[:Q}'!1*%˵R?: v^U%Z9BGǢ|[år&1203&lIi|qSgk [(x)*ͨ AdduD%SGӤZ&YL5ĖoӐ/;Pid(?MK2Ek=f#y;u=- N|(Q2ʧ5$eu8,)Ll`}ϯfapM.3KO3)g ӄԶ;+[KDNYD{Cb6 *]pJ9S\)nJ⿝س-3h:͆@+]-SH1"j^]%ќ)r|v2x`M=Շ֏?-jY \gQ=磻|x"@=*u` 9&l\ giB.ȊnӗBˠ+G238Jf}$\fׇM]a \kJXOUn0q`7ZHS=ka<| ځz|;+ks"P̹>_*ƟգsJۈòxp$,+(fHz&uoG`U'p+sU`iQR5qte݄UFԢ5c>򍱔6grum*`KJ d?s7?σqc ,Y^TMO48yTjFݨ?=ckq 7р@0,oJpPӭ> oq\lX)[C*f )iC?)P 4El|n!pȧH-AumYM@6ZhD)ΞuZlOU$4դ8CHR:;<ܩXZ7FO 0pd4GP ).]YNfs׿S**js ]ʠ޼ v՗8Nn+((,My-["ָc Z/~$kuIk'?4ǵ?B?.QD~&jH)];d@KH/יִ"ѰkyuPlҿ̬X%r#H2?0)H:Xrh55QiY|iXrBDAgdك5z/jkӛzv:|Yp$KH3ya5?! ##CO }ЖrV.>gMGiTփTtofR>3FAyz31cF*L{v,gGGܤ^ٟuiiw%fA uc0qd+4ȯk-?imN\RBӑU_338̤\x=zs@/'@{Vtpx[T_1Zni[Hg8^mϯTaKޘE k&T#qiH&$9y]3^O fQG& V4$zcS_@g}qdq }Y(fi}b;SS0 RG>Ƞ=V`l&pH E niBVQv4uWbzHÉζ)BKS'J(#{D;{)Vc|\"җŏ>|]{èȏrA\"MёqB @}8%L!bKn4(Cw&z&Cb]nweVNd>BCe3+N'KW甌@RYߢ< P71:\ƠnyFJԦbGSU#J?Dv#y0 wnu ֽ|b6;6Xv'\Z\]3F ^X.F7~Ϲ si%2|0J+Eaơyъ4ZD8t'BmabּҸY畿s%p[+\WC\?8wq 3k)KC}x9;"19Uct0@ʉo@qyn3Ɔħ C;95ńP/t'p'ޭc UYñM$RW\o)5͙TΫҊPKvw蠰j0=hYKCm^,:=Q!I YEz+աS^ʼn&hD8%<#N~*{H(ə6 p)s^]Ey1T[IoA|le0@5!ٝ4_47̐Ɠ [euNKA[\ {T Pe-aQZׁ9Z4Ρ)fR›`1W(S)۟'ݣ,3?e5jY?U S" 1=.8z<[@J )p՞4TnTЄ 3Rs;o7EB0 U͓](_Fk imCcB0b %EY؞Q`@or%@vגd۰LQI ׺ͨ-AZF2ՁW#{BPZF;| FیPC ެ*P G6T(iqe bҦFA}`E*nS#?-G~@$&(p~=m4Cpm W= NZ,)5P+(WtAo}\{!zn˺ H1B2`ؗXO[EV0uS>([>XJpg<Š' yMk8Eě}C{a *2tU.^T%['mH1Z|g#g &ftQ1IC8/ڤg'%t&b]lX8F6Wgo׊7,s=ht>Qj\m;+s 7UMv<2pApQS(!6C<46?|"=PFr .z7IK ̚9sӟنϙ:*F~pNDy"亓|Xv)cA ɈM"d,]1f99$6Y{NJ;a83cL\&lL-(_ A5?c%ԻUpٻrм ]8̬ѽ ܒY] R?(prɊgK#{3\Z]&g= (F^pcRB ˪YOp|>38_5vjN<܇է"!9" (Tw4cady܄jlzw81A/ј'o sbH{_ ~dmOhTa(yjД?ep' ףd}lHmN rKod|}ϗTx+G]=pITPwJz#BM  Žz+:7C.}_i.zgFll«-Ř5pR8an#|` 5b(g(D&٘(MKԺ}1"3EL&'qᙏY,8r"𱺟@dXfj(J κ}&@S(xs`|e'u?-7L1Iܽ'CqƉɦ]ȇWHi[hIЫK?$?xr6H9 a٦!ï ̯eEN7/MVu\+qZG+o0juxs.l6Pf/YwڑvОP7q ; n時<J0mk^ͤI~NC`c#/㊙W`eCQvEwjIb[,3 9*X]a+nF<^G i$ulWgChǾٺa:ݘ> Ln1>vs͚#ZPɭs:{t#2Nڄa'g3s~cmJb]'z/6uTQN/֡*qolj"&tQF22rf0D5y q QCG&`>. Wi4ԉ[ls̐N6%y XMQҙqUga!> %5G07=-_9:cx1Hfi s^rjެxD%j'_P> K(\vx3s'J>[ַIhӧqj9pB{U[ڣp z)K8þzslEt0"2eӚ(kyGHO۠'"nN>ӾHJkxD%\z);E\%hu1aBuơ/ tߕW$kJ|Ul‚,T;pJȧ<HeuY_>qN=Tlm%w EGlNr ʒJwYSqt ^'*_6歛nfs7h/kX*rdȄhTVxo9;1'Ҷв9hqANqGyz;_mw=U2Z Wm>9O^@"ف+!,}J+rE[sp<ݵ}|8.Rq;ʟArYaYo?h. {ؿ3b}V(}ة3e;b2OeH`o0] \庙 =\ԬX6nf+r4NJZ"t=6&cRD. `<i6#3|w)X?:(Z ߋ4jڿ i3#<{_z`%gKCDj"KuZFaVsNRoTR ႿYT 3dmӴ yqGo'3 ZXtqp ; "c]bu^%B( u2ߎp Y%"8*֮$rEKP|dq'8h(XiJ#Ytɖ X E7,u;=ZK]G爻|puU9#I&TH1 2J ' yڷ3΄i6$~S2џMvG% XFAa6(D) >tY^6g3#[>Q{d:֛}oj0㔲:(f*#'0Fpqp~Ξ2G9n5UcF7vۭάQp:.M_ڝG-=q]'2K.ʡc6#h  6Xq+cx8J|>QZtҼIr.(M|1@_xh[Ѩ(ۄժ;g`r/ ?@B-1w]"m%P6'T%w x@lpSn]U?zs鏬/v:Zݲ(uG`k5{MU@J^ً"Ku1\^ &=k[aW4Im %ܸḽh?J Y(!@mqxU=?I0!7_CЫuI$]ũ1VY Ό(:AUzء6~Oxg&e]ňҡx^Q3 rxY*VŃx( ƚM9Z D7g{àH 􉎯 $ר]Qj,70 Y^1d-Ӫ.@$.N_ZS(xj?LP4\Oh\EIx+$@a kITS$sTkKfweBUw:y clp~ Ao2Dz#.,#'PHzݶj&z6ˢ@XW@"'χuWbOͰRUR6FnR.lt&kEkgACO,?:L140he`a3XoW /tf,U݈05"3KY'ٷBIzv`#IN :wH5:76ڑIa>|ͿAHpjgm:AnVK Om7"=̂up IH3#9ߋ3OqaX6clW\6Þhk=|z^̆G_"Bm/?Н!".S&ORS;ȟGNjG{`5X巁[l}xWȠR(cz#m6)h)yHe( L 2| dtG'/}EŰ)I4s1IǛɅO_2\CbVm?K uM=I0WO_s#57 \5.vciއW%onc3ߟ(l6DR y$T׍窮&'@ןb +;qwU1Xi'Ѧxy2s+^1dT4x̚Yn^/VDV'_6$*JY~QE"" Lw"F0xhM[k7b{lh WqW`E|g#FUx@k-963؎g#$S9YU/ÉM5p_tV>*WjGmGpu箭?tY_S hpKQqv !yHU^RAZDp+cFwPm@NIP`Dȇz]̈&P8~+)kb.G󵭅HuA|lWaټuMA_ʄWL ѡKUᩔ=7|0XgDe]1=vv"}5)FF8>& eWyQ8aק@\8P+8>E*&jm'gg9x xt_;NSe0<\Љ^ԋ=40!pMyT= [aS]lݕV[pWv 2">kK8|MY}YFԡ^>>//<ѐ͛mNiZ-~ͻ_kcV))pCxM(1PMqz?+/>*#2 oΫ}rάk[{7A:X#'׶haEWhfFD]3czy$rlY>N{GvUɠϕ~` яxO윪-?$%"i] )& UP@Q$!oBʣQi/1.RjK10,d Nd.kaZSn ءy)6VI.ś1Dbr W?ަKsvyExB.ӇMY(Zf` s"D1>NJ{P=~gW?Ȑ_MAً֪8U#DEN޷!!%Vo"K`"/|rCDYA>L;)Q.xP1ӝbD}6[韖a e@1C-0R cfq+)%ApJE.W6e7w[:S<P 1EG~g`:tk(z6O՝ DfY(XBqi=7U =EI4hp7D>$(dS¤n,;!)QC[ZQy}?]0u?,y^R@xT3P A> 3F<{$ɛUb=$Ӯ}xXXI.tϘ}C۟6=$9 `Iy Ղ:YuD+YtsǦ3UdM|/sjmf/ (gy3mtɬ\%]E`z잯^Sy} hܲ/N)~*rUM3|5 ICG/W {KI;M2{|`!`2vȨ<1 ?dOB 8Cg<,_TxSY $Ե j1 )VbXDR?%rNÖAeh$ܜ2;-{U;9̼?;/T>1sb+>a3kNxG3V3 biKV}gO"Tۻi oU(!`B@ߊ Dw\+i=sѾ9LzGHƛ()Ck_ՠz7prK+?D%}b`^05@`J+,dnfހymAO^ەzDAkC6:m|oz*-,+,VZ|dU铞2l`f0oy^`]+8GXr\z%SC>l r*b}90 {HP& ?⢍,$ZحjAn.bn x :}D@%pMDyÃA6\7ZG³ֶʾ#!햱|ݕq6[m&͵_~_D9x:ƞSa}ݽ1[J|i:$v[bZ@],]>rbLG{1 nO .WK-Sr7|(xuU4VOʏ&}I3V~ʆ%©ro9nwTGC ^%<DȘބ^qfd ? [䦗9'j@?+wQ* E Qʵ S{wvAGN_d^PDMl})7}D?)az#fy:H=I9I5&b TXBQJ^=@m杧Tl/Ҭ^#5N?M>ԯǛ;ڃc ~gXx~$#P1ڐM,5NKro6pl17ry/|\)1(`)zE4^U!GF{̼c . -M?-c|%peRńm%e ZƁB[f@qr靡*WS@1Z yWn E_ њb[ qrޱ&D=`SlQ TKT2m8gcMg4N=!Zȿ}A#3ZB9r=g!}̲bO5 [ΡP wuYv?hG)Sv9(n|z{?@jq&8> (T_8>Լe9^ܐhPEPsMOUY@;CEJ#)@dV^7)ZjGHKjWOa{F2e#VK Z]tU7X}H\B/Wo♤Q]L!leZ2)>TIFQͽOd0FfkgJr|Wqb!r'zv`o ehE\}q c:YMss#}j+LpE]ݺR?Ӱ˾.<#c@L?Zp㦜7'węX 5+6T{^ANZ*aWH:PiqJu \ofF7Tۚߋ"Kyn 1rFQAxMm&$%,UMIR܋&_6 s.]"r #i6!~ּ=jЀvCF ߹QtOk#.s"?n\GƿU}:.*?yO6%#+"IJ::>ۅ`̯VHedn1p7PzeX_ɯuUu&HYhLin83lTMmadf_7Z8x 6|w;_ĬD-x`nS4Rk"*ۘt# ƫTȵD^Ri !P[EB2F DD o%$Nee)N28 !̳*Tnf퉀s# q{u JQEBLo2a-xI2!wQ5?4-Z{#߭5c$6 2kfWx=i&06M !Vl%]mp#dg; c C'DV[LmAPW0YQ se8ajI/PbJRD. gxiha@0K7 dNUV1#h/'!_'GM t#ϖ5M-/]4i X4<]A,+f3>}-s=K 5??dНSi@t%Xo@A\IaFt#azno:-;V֋JlgAK^ D'Z&Į6wɱٷKH/ fшT<8JulP`A;Mwm:VlӶv6|Y5Ǐ`r1jT4u.L(,bs2@WgeC%by5"٠ \W\?Z 2Q WE%JEߴD7 Ptׅl;/bHM=ѯ,Z0`VB(2jF$JVqt" -Zf1 GjK*%{=sӾ%;0^Gf=C#;:x;ΝhOҰv 9 ؗ jGm|e_`G`oͅw2l*VT?T'?c\đ'_4=E[EVˮ>5,zEX~P-yExmTM%»o9KqeI5JD|%B K#jS%:n=mZzӦ.9&dH٤wR&D uG;03?[a @#/v\c{YF 8`HΖE pO}XeC8䏒ɵRjtU!)ckHvO?d^*sg:&@.|dдYNۇRe6*s}'xvp4WɻISbj뛆35igEjk_kSaW\=/(1+qNt5T|1B(2%Ad S{QeQ<բMSN( N4Gx[}a?ޏ͢dGsUFO R-+1T]Q:OvWw\ŵgk$9$iP V.}]}IG ;!N-kGTlIo1YgY]/(ͫ#XÊk 8\&*gҕhm|yA!7[ǤbL/ tAN1@*]'\L.rt Ud8`H|;|d5\K~Am,0i-&n.$*,T0@xv rI8O?McbXuȵv'*7cB%\v*R P`2"j}/PY4¼l@ zJ$1eI`// //DeZ&p"=IJۥKnY1y]]::L; a {;ɹ1ZB03YGhܪC%qx#NWm֛ftd =G$ jM7 kds.#B4Tڻڇ偌ŲbL-=Da+l Qq*'v1, # I6yЂ?k(yڪIA @;SYEQ.>W]`H.#O3|+uJxFCC"#!QA8 qP\ӯTH'l>Kt(OԔEǐ!+^6Lc*HM٠T!jo$FZY֣~Idf۾ ˪rFˣAvl2Ҡy3Yrv!mQ]=L? N~\eȵ^NpI/A|F vHӮ܏GF(fYM7~F9D_dzQum Ymw_"y::8 ePcT)|4\gRe̋vF &K=]h l-m G#[ڊpx(V ;zt%9 uՆ? ՍOc8X:@w>Y~ڕTx{*NU5%q/SPA~቟pEI: ]7{ @U|Ų= m>}!Ѩse&I-~+p9]rš _(X ,b3 M8)Ћk,c^E!SvC.nDX3c$ߩTuJwݳ _@Nmu9FZ; I_I~^ӵy&#%?󭳆Y1!8Zb%_rfKNܒrSKF{ ,Liz.yL)zm3/Wf2 1TQ]b6ěrx0(*,ADp:y|k 4vi*Bʡ*"7K &9|~HӜKZ=<4`ދ9נ Mʠh1eTNl3fB5\g#_9v؇. }F=feU[*xw;73,Ѡ9bP1V%26>Gv.q O}.^Uy6f8KFi+H7⪾>P ռw(nˌNu3( @o)Z1r Ӯ%h\AAR}rz涳d vN0A(,k=ou5ճ#.Sk&XXͅ~^sD&~B }o6qw]ٵ{t՚60i9kf#&Xp+o>0!N ʁȅ@<:cĩ 3׮jo?.m* +,DYe,~ m} mF '@[7,]Wi*Ok;,ӷg|R߂޽(eRJm2^ !+3@H5ipñ KFG(O.t8&JKuȁ׳(@!RMKmc]c_[rw8gtڪ}ki6daP^3;ͬX{>}PLbl^xNDi$q.J:XjBKiUڏUrʲyqrr.:xa&)塃V6z.ɶA..0dKV(Y+Q"Pg;Ð%\'~sK e &|^.U'2Q{|E-w z 6o;rv>%/;Ą9 H4ǏILK2a= bpl0 tx!`7P|m 7Uh Eҏm0O.OQU}U'v51Dv7 "ψ!xi:gf=qCԉc/kHzK*fnf NzzmlD[$qf"50iAx~o#!VV|9͘}$ϊg, ØMiY֔K7@)akAa8 \4{4:,i)bJ:׺k,M:Om^ϒ':F~v,VZ>oU ڥ{Aw juY qg%.0RPg@lL-YiH/*^&vJ8ܠC ꦅVos٬R|)ՠGp"'| XTD^vn`oSfJ)EJ61e_֏ux (O}?<Օ/7d%t 4eGŻ:.'fg0_]m]x';rfw(V5"?_Wͅwɸԅ'&=]5Cb$|SÍ3hmzc<>{8}d]\d\V!f7Y6ڛ\mech7#M'Ξh1 僑|Se .PuLf Ϩ6~̔r'P +(PInE6:hMl"Ա h-PZ'mVo6pk JQ5RRfAq (ѱ=+u@/W`i}T죅pŧ`OGFS,!/šQFyE<th(7U1'F:/"G{3RgGss$I,Gjo<6ImKEH)Sϟb\aV ͋1Ô#1Pd'CXS.\fܲz:d\ElgLv'!VǏ #.*/TʎBwՃn-4)TN.2ro!,JRr˟oi~`߬ZW}”b{,H6g'SYF*F-(;L@RÀo!cI5D}Pl̛q8?jI G"<)`8 KGk?`p\*{i(fǃ2hX 9Rԭz\1G"hOeq6лVIт/Qm^ bi+c&ǺE8?hnr ZQtPdZ1Fuw>N{mI}Ifr'e/H{ h?OM>ݔyaz%rSan ȭy0Ncd4nTg?ߢev::L)vL-c$p˞x_˿NU)Vy Zxi|j[2XRcƆyZf* 2IZJBXׁck$%儂7xM{P•Fʤ 4F%Ny3k}b/& z~ke#}뗦@H54)d f滟{;-i)rm)L@7(68тs~%yM?7\0^ _Pؐa?tJwO6'7AMfmb@iK pd/5!ΨUO [#fm,?:L"9BjcŹ5 Q¡7usZxKJp̢|Yߋoy? Ϻ `f͍QaDY8^ul1awo1L[e ՟+7xE'y =4 wB6ش7}cʗ-[(V[^M$ 㲂ޗT+;:vAèF`3veym'Bȡ=T5Ga)I<'e.\` h m-|B>'D_gdN_p QIWԪCr{ @<1ӹ.Mxk2 slJlxrSAU1mJMV_,qMbyH_F 6rs1/*W~SfKq\픿fAv tiP$݀%:4q&Iq{^:{h*LS=1Pzҍ/1R6^q\?LՂMO4>D's)s~~`lhqio9HΧr2!6PNCǕ>qBnqwy|~wxo8ϧRF m ]KEhC Va'$qFwZBqۄ-EJnv*+mNe^$+bQMSB%ף0g,RNJW!*KAwS[aSQ}dxx* pmCx2([JJ8\ ?ɮ${]0\q .LW%;k0gy~1lM*A,œUԠfOEC/GzS"le}e`5(|B"xWmbTgz!|ц &~N9Btv{2{TzE%ʹeP&]W ghcP(B V}Rܹ@5J.c͠YgKO`H~'Vr,HPs1R+)>hu!M})f4k$PTPKH Qp:ަunH%g7`Hq"PUb]"%EF^mZ-=6&NƉ4!IA$sIMɫ*BUt &Gʔl @qz$=,t[⦸}"r)&tdR'4ZiyL?-3v,1~5ėC^.cLV H+$aXXd|+?=8 Hм< 8]h?,%\BF|ǧǓղ |e$6P;yJTB-MJؗ5; :fB@rs,B."3CsJuFw(+[/;Ti9PS v-fTKy |{e4(SpYpZ>7hS"mj,d ns=\D%-bfZhܐ/27BƐ0wvMUL&Qeϑ[}ǎJWOcl`XIr'@﫦-^9*?`K~*&A! ݛnŽhW,sdz.j?t 1|!n%dTP{ynL^FrL+]nv&# $@KZn*EuW)vii^ ;K"2V#M-Kҵ3{$4T{[ od`V5d `3z ;69PG%T*:A?33YP쭥N]w˶y}..F5`*sn5˃x8T/i.pgXn[FWpZ{flY5niS^G$KէrbZ/  RHB_{N%Ĭ+)3y 6ӫ-{VsRݟzZcj4z Q4TKz|F׉fq:xخU|aj12S w`33VJK.VaE_\2O{\/wK^e6nB:OtNLT-~oEbgůθA S)ޘlQ iDĥ[a)6;K3&ޥIj|uCw& 6ͮ PUBNС ͒fJVmC\UY,GJ(kAIHa"9 D)tԕ/FJܿf1{QϦæ#ab$VyJ|$I847q h FICzq ; J wYD#iULPkZ&` u`k2R`YjtdTM/a*?0k::)J۵2_Dƒs(cF:`T`wm1yZEMuxb%e42ڣko7 zHױ?pw;BI\M{j8m.ԏJyhM[ug(]K%f:6A05b jHپ4=FE:dC{\o[$bu fr nQ}5荐ıBhɿi\G\ns+N? vi4(Q :C Muqq($dОg%s|lT.BPC!+ 7E>B|Dj`Ȉ.&8{^_gMܕWwye!Dyr\Н@aZf'аU윰1:|lfY2jr|a#LXORSŭ"g 4P䇑 B(}"w*?ju@.Ho[/3$-gCzCDMV8ksd=~H{X!Wr0Jy0%Sm1_z°Լ-nJh{<ȭg1&䠼 We9~ 7 oo?oCD;f;l#oEy=i@P9tk<I s˺^0,UJAe6XoZԠZHH&@ #(S$88k"Ǫ`{r\Dy(tV⩣6?Jf>IWn֘6= fD9uU,i`F]r}4dF'k#TT! )g-HI -z"f0K6ux>:nqSQ_N^_l%2qQey^4Sxi}fڕc?FrX;5 4?.X=KNq=)S/2.S=,B: 9C zr ;xK3 cV~ӏYnv#wyP7H\yO8| We=n-SDFQ?5ѡ YhNpId;<z)9 oێcꓕ @|2ͨZe]%IPl<1x.#TKP_\D=@%i/o1Gl;2kԛrOХjb5* _]LK,| @,7?twV1cLZn=ǘUkgwCí"!K_0"@'UlLogK9 JTq.%uب~eF7Ql"KN~CH .bM rs\Cd-efPJV8rK[0~Q@+LD`KE'7llj"o6BXֺU{fL刜v-g?Gw3HԴ INc)rN}r6ϗTԞvBq}gIwz$T6 .6=QׅoFCB1+8R'h0 {P@yQ:OeنyHna!aBg$^=D@Z;` IΖfh.sbZ凭nu}/0_~lhVc َI:6d^j1?CM\Qǁİ̱( ]g8"S|E5jl-ZQy"#a|WnԤe#%' fE!"B$Ƒ|KLq]JcYW>:4T`uỷd&72Ej-MyV4MT22iq5[5];Z:C kfd-hKB<-Lub yvڇ='71e8DHZI'b1/9卬C`n}+Vj@T")Ҙ^M ԫ댚C' zCC%$]hIP?m1XԾވjtr"BDx7+Rs\(<4]vu#ٸk5DջWsXNOt >;^w80{<{i{aͣcd HΧ'#TDKTKI9%(&rCp|5V F9XJօ ܬYPu$!5 m@UhP~bnl靍7UMw ^(?'fC~F? ^Uzc+SݟA;uH d]}yˆ֍.5Sk tu?XD}aߍmۛ8= q"$\s(@S4j7~qh}%WIh'TIh5rkDߊU}On=2;9Wk%>ڣ-} ZVoPǥO /(q:#oD Eo6!n6o=|O]ؑgklz P/ Ml׺}af4OIYi*a􉨿jbvcB&q?k٢b^d$<1Z({ Ϩ#p;/`F$AiO>7b?~.98,(@ln.z(pka:Ո:_4 ZF|B6uC8Huh8cwEؾp^,.hq_\"g֞ TI,GQSv3Cʧ=8KNn|K$+kFHJSDO/!~b`zS:X-ы3},>$ܕ~s6->70,ѵBr4YMIYTmbn:RU_fÄUbxW쉌iJ4ʦ ؛kЅRL:›E(^PPwZtՎy Hw #=S]nt4{SsXT1s#["ymU'̴lTZJ^GmoX`M۳ 5 p̏>ҫŠgY0!1J!_\\ ꎭC<=NE ˾t+J~YaۧcsFRpCvxˈ[-,mQpϧRaR<Tns qȑ9U"1}7 :hoʜP't賒]JQn2jIace%m#n&~3"z'hoXZGx f0!0$)+jڱ-ϔ3WW9Mw-aV pAGm1:`xC"p mɭ4^ @PcP J9qL2D6Qu `y@H.j^+9=n E ہشt ?y-<'*1ݶR>&ikَƧD'947ADwZ_ݒ_;2KF́bH4!4[ GΠL3&}]N}3]`yM!dT7<1i 砕W[mYz\FWRq"9{̊*_Ǖ5#GzgryN*V>1I`Rsnk{{9Bu[&:>f H_Vͦ0cxu#A+N>Ud Ig~1՚o՟5"m,z?s~yl9HzX}iFɹ_٩Ob<;X7m|ޭVDJ?޹*KƓV<13$JKG\4aY:ͣ ;*Hxl'CR]OߕCfW}.g4-bZ%B^FF~A\u!a+~j Ż V_`+]me8mDmPHŜV-3Z (3Bq>(qtĞLvx1W#$hNsz7WkLZRʿ%E| jP4ѕYPʷ!UwR6w[`ʚe﻾-"yQE$B=s#)zz`0:"Soj߹s]=z۽.9QAlUOJj#K |g^m`ԉevj=FS]ERpm:á5 :~8oc$ k`d~Jts\(*&siE"5O`$8 ].b@+*fz6#r g\wٻ&p yM[ _&@xlr3igf䧨a? 16MWC[)+iXTM(gU8日UQ)Z"@E0s}T:>PzE>L 0obqs6|,MXp5Mz'$~,RڅEl s^2(!,+Nhb6sQq I+{eo帠C _A$~`e{U\,/fb 0Z A""8c1:$k=f=Ij56>P߃J߀#tx}؇>]{1K{N::$3oA`$Yc:mQ\1ta2@ރK}aL9Xzp $f_v 4QΜcCHe:ag} X| M#z~ )fLwGzl2Iao)_+ٱ6@gl~=# } VD6mUO )*a(jU[q(o yP5J ~t4oxt/ˡ|jG2Dͺ FF+W2mͮqBݟKnYA_e&Md$C PHxGOWUl8eAܝ;v 6:] 5bݞKޚ=ȡNq}vܿ9A]^[鮎ˣ.|]HqQx?w#=hϿz ma>>APV%3I-ux2@6!7?ф4Bߵ{*}ת mTaTYl)~7 Z))$M@H6S}~U[5`;]dcOϛE!uHqrǒ )n([g+ G\+С{BlBr9W}zxu̿>oZ, V50Us@نS,G+* e7 %3%;x6w7 SچLVQ1> /uoh'= T t"7nw~lk}zS*hƖז0.Y2Qg[iAkx;SO8;^>Š ux/2X|h~^vT@Iyv}wlݶ>Lӿ|5c๬3#)*N`3nF:qhCy3!anOW5;-wL[ )̀okܼNd2=I2G-R QxC뼲~?g>BiC"-H2NbW:'8ӯ?;p{B22UcZ877.;W[w0,hgI~[Km\ 8@5%x >3MS$w)&1 Go zv0o^ -.$فDGzsĊ*Y̺`CoZ4ޣ` 9Hr6WW6 du I,,Ye,R~ضKogJ%rTf׳7 ״?QmaO4= D=bWѿ*R{0$ `s|P `EDjBJ\.DJavQr?rNN:Z" [5fUřɱ)ٴʴ ?²4aS!q-5[c5xݮ]7tzV!9媆}ȹ>0!3uufޕ1+GǮ֟WkUP';` QZ=I5_-7 `~b#U8EU}f4:'9rct8q%U'AC8? q `/B ko@# FzҚbJdk4n/m,'amV%v D5K铘Bs5 "XwuHJ`a"pM&~=6}%z|ckmELp̵p/L6jX&}ORRI1h2Oe'F9@l|-CH" Ap˘Йy6b!c?Ϫ݇; 9TF:z`O|7'Ir+v%$ 0XiƵrFYׇՐl d  (z}hFu˰dMX-?-9Zl23=?P"1ZOB_lN$pԔ V&_&9O=VͻF)x>%mX=uL5&dj{!D ۋϯ>͟x ;4⓼dG?gkeC _YOQT=T0īLmH4[U$pXk񤟊;<"ћ˲I ^J~RXO!3w9א[݇NWjr{@֒J8֞aϕ2g?}nϨtl;+_9VD?A8CH[K\; z9eشf ArKa:e;)OخC֙0\VL2Gxq_!7!t,)%"|h!`裬(V&'MR /H8OW/㌮ ̇7m*%ptL }w`@lrwWǪ :їNL)7b?]t_*ǂh4>Vp`}YD'1<U܂lTa/_VI~B'򻳸QN+4ۧWe~Ͷce7 }حv(` 4=jv1xX:sjR; D@p-a2CKTcƷ",V#tŻlD(l" nĎ$?D:WGx0}M6MQ1-CU_/uuS!=!\SI ,N9ؒ~:O t)JJ_Os)od0.=#.Z rX[<3J$)t!lr AŽWtI#F>Cdbp4ix{XrihwFaB>wN% ʥ@~Jb!mՎg8 -CytoD_! Zџb8 ;;j܎6PTIlZʤq҅uHdbDnSgF})b!f?TΒ + ULBsp;g\2g"?єK3G#cHs)k #e%t:B !mE#HHW᭱ejq MY5,iA҃t/+2jaQ|'+rV?%NW(BudD}&Bȉ2¡e'-P!>Ѐ{^Uff"/ʘ{]ևH\wV0c,owTD2(,w'+ZDaNr *Cj]z#u b>1&=( l*7l,;9';;mШ c,vdr%dSζҌ Z΀!u%V#T>d@jt"A^Ϙi1,r +;(=>Z/ )tg vJ4TO}f0*%{EZD*, [LA,|Cːxr6OY5j.93?cNإC/|(y0βf5OOA݀0[:]<`ԇAެT4:0Ҁ{{T^M@-^7FYH >%/^uFɉZWyYp1-VDWE "W,@Qa K!D XKUYx g?cRz_`И\fr6V XjEIt騰a c"77$sxÍO=٢~U%yJuq R#^wC۞8P1}hM]6f8 a&^$ط;DJ_m_>$&_)4sV@<n5vA8b]C;[&`5 Q[ #FOֹ_&/e3!Ia;?SίIH.^-pT8%!u8~[ -ޫ δ04S>3\j pJI2^}˫+s꩕&ܗ35꩎RU2aʴrq<6+j 9@Skock\*QmҌB'tVza"|6E]zdw"8/\ է7|hrFA&c$u0X1䰠tBUH3;C(E3kH5."G7(ERsRjb ka۪! ռ%ɵi2`C`E *1 ̕h*,a)oI"U[Al Z4 MkC4^}:j5Ezm(r`΂h,8 /"+@u1V: ]0+RP(RF'(/LQ3o5M, Ha/Qht'_o/E/"Ń)&?"Hjgmvk\ n%R-nD7=5Lᴽ9#h;MP;XǴ$gB*QI}ه2-'"4wY+og˙J<?f` nPJmEQhF+ )Kzx\(E8ab1մvTV6y ۷n )  Oޝ;bRUQ'6r%r6uW溘MCܼe (3[MOHht@koi뮥jl\{M_[t33;nHF?B@0f՜{mYO/@ш|P 3 w nr)k6rӼ F/ک;2Pět,֊ӚӢC FEAj:e2ϱlJQ6_YwoLu &Sei龂,OBK.<ݮO,3 _%\}`;Kj)@N TJRJRMb%~zpd,KCAB@vGGVϰ驿r02NN/S "=q]/tC's`b(4ŲdX6Y1k?x n@j)Ł8kjʅ(!&Z WC'NCo rspgm.iUZפpzʬeKHd$SBrhS35хC&OƵm!e"4 ܓTlSw08y݁DaG5.|;/]^ʗ>M7' ܫnv9(q7OYrɸcG,rr'~!X=d,,g{}uBIApTt2I.˗5r xN9V(K5h)` L7vd3=#E7_5:Bv7~ BkUb0xMd|V6R4HǼ63xwabuM/NXp Ro^.E7 )u$kHDJN :C= ͛s qi*l'hb : L[cġM!uH[RZCخ>xk)Bœ)&XBSQ KW%֧{"n4\ӿHQZ`ތj^ t"SeMq2jGcOQcًI$X(( lTgN=֠{Gh$#3>f Njh:>F)##ΈH/dAtA!K!d-ҡk 7~2.[/=!o@4㐑-(܍zt #q6=?\d[ok?>1tdds~Q̧HfiW4n <89aGa,LOUnjGYOfWV 7?-Bu-ZPxbjzеE䋐3`2V$ v3n$=qFx#E{z $޹U_7hmDM5SXϕjjax? LSS.64w 2WDzi3Xk;hׯ0r}΋5n?$-x? ΀!"b?KU , >{i VkwtDd|u9h4n\BV"LfΤ/TŨ'(6 |[χP9C2$u*qZ0U<27d=ns4Canw顢~/@aqG[FC",l(@ $raQtר)Icn&_\#6-v2+$:}i>ޱ aJo]zH+ X HguOUe -e27`Xp0M5%@OqزEUl=?B7;LœzBk6uI?a5JHǽ{t^4d6"q<ñ3O h= OeO bI~0!@>*䅐WD$pb`QqJ3K"NU{{mxׯZ'2H讞b|D Z-zÙFfdHs[`gG%75y%ēIZzny{+xn}_|(9@- P W  mӸF)S7Wၢbe3IK sA㰕R[^ΩŐ]cm`c ^iH^ *$qN?t$aM;PoM0}loz@;f eL^ZZ9Hy8Q~ D\%J_+Ik$7!lg uHJP0'1J$1vL.RqރlSJ2ݑ(m,8X,Z6B~hhR1P D)mDj7V}/9וܫgvVSUe%B;^I(g7D=Uyo]JkwEa8l`T\m|;yk-aH#e SzMG~ bSsv,ǃQj=2 KY6pwIч:Ia_fzi:Yuni UPsbwH ?@E`O8[r1XnO`\#iqAz|ˁZ&@ -qI1=+*F;{WF.ߴ ++PwS Peǚsf3iad s~5|^;.c$؄.qp;"6on3l2Ӱ2~Zݑ.}^"YpsXD1-I'?nR,)]/+ThtF3͟Et>núK#ј̒6,qKĥOĴl[XJݢC9 iA$ 5AO0\؋EJ1l ֞H_Ԅ]> Xu[?$I/zQѭbHǑa}tq))ȗp78^"p\0H9kl=O:0A P%B];c ǎ j (gcaUjV4>B®)M զ0]Bo|qvk*oy#UbcBMA(i*ewbx>Ӎ%CM"Ή)OeZ:*8m?MavOpm_"eX=ݣe6@OX‚Ў j9nL=ňi*SD/_F@FmCԓxB?ߨMbdRUe)n8R1uJn 5+=.;0<QnqsD{W>l9A!y5C2% &vIt?&Hin"IH_灐d:rJg * QcB<6rBר z [9 lp'`9dK( Bbn٪lC%Loמ$8#K _oL']4&vA_P{\E$ dTrA}O 1 xܱbx(CY(y!cU[M*Ͷ u1\o-?%86w/bQD~$Ģ<3C6ޜa17̣B Z1PxwaOK4 na&в-u[ o6Ff>5CB̤ӗ$ݩ쑩;e!EG2"K84AxBϹ>jڢk~G{$xjͭ)fWC&pOH0ȤD[/Մu!"95`ʏ$xٝ-MLC^9:ɓ.mVHSwV?WB(a֢S5Sq_ WEӣI.j˼ s쏥eNݘ!SD`~\̂$ia=ɉ4eeݰu:e UYƗwy@(ä+ 6|Gѫ]07T_uh5"8 "w))B쭰)C.QG&Rv"]ݫjq|aH(D' &UHG3B55uߒ2`x %[A_ ݩ|JQpAP5 ֭ie1|Q]& eXZ]EjYAoM]N-v!& ơz ϽlfBmm==h/RN5d#q($/ 1'K@֞.*(eRkMwZ TZWpJ!V x.}ٶLPή¢8gc#AqmP@0Qg1OReh>4HVs2- b ,YaTMR鴭8B{wbоԄf&|: _:hep[9!gx卙$%Ey_ѵi侅X+A7Y5ЉD-̒r>?o7$ȅXȰ S 4ڍZh Z< 4mF&,@:WC& ]==pV|~Lͳߵ9$9'*s(\30(ܹ#&%5P s0Nys;foDe829s߰_<0 ;ܪQŮ!~C3@,,9j/:zޝ)0g[iեmDh"8#݂Yxy's?S  OعO/kolsȟ}nƯTz&h,ƃj$$/6 ^yjv2`cՠ>߰@||(i6^VRƩ\ PߜҳDb8D4#N/! Ѓ-B_D0!=O=Rwt|Qb(ۄ8]9DuK9ۺjrΌ3T$•ʁ5MȔiT ZKimIa#D܈iUTnp#Э vizӔXvEdJM}AEG#ePQGH8' gxP[}})GgŝeoCNjDn3ņ:qj7@Hh=kPf a@G:_נ`-#A)m[oY0$$@RzWoHKP6Hyz \yt3#AU]3pYÓA~эL3gY=^-Aٵy:OYt0vZUv0x)&Pue Nznf^(B!vrgx nQ10T?57@dkFkq88&E3;[ȐCJR$4#WR`f~/y^^Wjȶ4*NK0}guHujo7hĔL^"ŷv_-=HU1ا;wؔ/ݑWLK-1z!ٳw]_e͘q5`jÇ,rV02#`Qwq({uplbihe"7Ak 79;P 21PE䏙[h$Ǟ\%kF[d#4NOzËO[T<_;pWF퇽ʋMCH|u(G*L)T/DcW% cjcD0ˎ4GܰɈ;2?q7/mRU `J:y ZFyȀ/zOLțmtƱ%;.lgIQV k-VΗ"ΰήGA 3lbumf#HPT{P5Y}f[="ײČNtZJ t>% 4/`.0h7E t5,kssZjYZuH3h;Dmnr0ReN\EY8gjcq*XZ/v}ɹP4tO({"*K6;I hAnQ83T$,N*,yxZK< V6]qxFcЩD;1҃ _D/ѹp]Bp5SC_xRŴFXfRM n fM.'nY֝F;PtQac.ZqxszSu h޺vukQ6ɱ_G~u܊tay^z{ ϿLWWzN-J(/鷩vE 0b@<4Pd) Y sp+9?6߯Ѓx#ϝw˜ ~_2xB!+D4&xp`t8So-G n'_kdO7-f EIJesUL?@"#~4FsM5{B6ؒ:CL\٤A tܻ, R9ɝlG}VczI) XC ޒV3bSQyMD`#R յ2hNy ÓUIu4MwHH.>di̝e^XUs:@̲Xg//ߖbG((AĞ#SI?WNB;ut%eQ6gU v)gxaWըsU4y:D9䙗N_Au.|H3*`͎ ߗX07:*Z SgR˾Ҷ^}&ӳu<5(ƈF¿(HVLq_֝s" FM76zg&'C}چUo#Nk=tPvkbߕ8$r!I!o4;0;s@ɸ}CـZ3) T"fϧҏ[t oK;YcwEU[DRyC!5/& gRո<"<mfA&p!ΧIJ3MMausz41~(l5Ms%1kߨe Pd$BF%goDմAV% 3˅YkXb|(Ky'Z>7]K YP J? -әvdbs cqucy@H( x߈8"Qwv\Я;e^qj0qw8}-t%:)ci}v/U2hX=TDT>ӎx FbM/*Z(L4> E8^sF}ڙ0a`. Ϫ뿊C64+\ - ;HzW4GI[RѻICo+#jc/( ,`q' VhTnr ,ꧼD?^+-!:lQ.Vj uX25|ZVHfnN q{)~ @Qsa%i'y7[(4 ᘦ`ͳYW{Ӯ.@,_}O2Jo0@(Jg􆗠n=1qSYqq c.n [%)!1 y%}4((YhfkI&f%:M&0K܄wX[}C{D@stY} JVs6qs-pX, _bn8lPv{}*mgO+z 0YA:ʔ e5?G4Īxnh^y*y)^FUF~ ;m8;g"s]S/)-gߵ6jVSf~Fp1Z~U}"/0G>GS{dFR##C|gҜKM3'H:9YITp\9bMB'vq[viTܷW XڑZ )0gx#P|q/уš03[SIdxU6ԺiE|rĥP*mxo1j M-5=bsvpD`18lP<9q&n&#GdV1Ws>+Xy011/Š}BO͙॔^u0)?ZGbHnAK׋R(s!k,V W/T1jNҺޙ; wy;,1 _-UVHR=NEv -G5U0>v7筫a E'^/#Ms9`0% B7ې++c|6wzΙG:Ux#|>FL-p$8O4fcި;=GʟB1i{դ rRCea\m4~MB8v [$0^^"=z-GgY+-=X ƶR/R:'|ݹ3<^: -<[2[*Mj1Q_w$ e8c|x' {>bˮDKpQP 9<@pQJ2jGT:tHnx+ϝoK *bqN62f訌\eIqkxpf1A/>o8z"a@FPOo@@A "@{!^IBd<0,Ȑ`3Ѿ e w1n!%E8'(a4OaE*'(fm72F=fJT;^*H!? B5^:N-/KiATP srwخ9F#nw\ GmQ'%ꦝEg|AI _%xlЈD|w^bǓjI ύVLRvop?RDp_7WouO(p (Y4)1^^rklљQIuegGTuB܂;Т~ 3˹-b0SFФ'1d%7,eP8uIiDS&1KџDG{.&^`u>֐i[ p{uX>Et4>CBorgċO6} ,gM֨]#qHaQrl- V߉pQMvp38doXZp h#KRӑoC/>MA`n{|1p )*e0r0Wc0NK8ѕ_AS6OhXT`k8Yhuʼ&M"g7ݿ!b; uq:٣3᜞@pʵSs6X])YݜGg& _]z!XO{5Wdam1V&i!"-[D&Ǐ8=y3=&~@r"M]m┼mBd09LY˼fRxӪ(ehOh&43US]/~:aڒ^+('@SS&?L\hQMWq.Z7Z22WGO2r&^(UIE[>a\:4p #-2Ags5N1똺u{HZ#S8 6t+m% !)xT/uXQ E1-9WVps}Bفqpks @,ɚP>k1&%{V)+̗%4Y`&~uܒH:Dv02XX{]z7('X]{'w*>6'tOQAd8h\j+ ]q2$ U=Ƕ7t-pG,#&0>¯ )5=lIʼMs~_1oy\L.4'!j0oʎo9ͬf|}GYU*~r0)lD=W-&ZgWzz:)vw-p~) D]-Obw:M|Ғ!ekZ>9uԊCjλ9uNVf퍹ho"*EoNpγqg'W_ /"z+6YlgCdsM5=ڪdM$^Jak&E| DiN:}fP#e/|j-0t4c 9!pJ%VYs1fUy#JJc$BE*3Ltb)"C8o`f׮|L%ɳAWqVTfF=Ɣgj0o^-Jfeđ^Iy' 3Y%c y^ÅW*Go,̽*u)?7*fui@7%=gRsB\.Pmxn*5>`q^1˻m؁V^yyˮz-[ˤοpR[FG3ˡˣkȂ~iHʺdBZ<ס|P~C|Q XNr#,#b{Bhb e՞9SB|$mo}5RM_<|cW NC81 *#@q=#]~/3TE q c? +X*.xu6ݛcYLα+A"$1ST 4$ zje98fHTaB  R_;z2%5W1#EP?;=l/lER$S.%罰&m+-.RLw_En?ol-k.=@)|@v Y_&Nun"9rC6a 7C(VCGشݨJlDk!uW߿Lϋ^){_~'zL^'ǽ5 8LIfS&61El ?-5}G mũm✩] q)`UtwJw(Uf:b =S+[q J"+MN16Vj;MwhYzwD*AcfM΢gs '^;πm9tQFb$@ ہ;5+⯐)cG R6ᛐWN{ 0;:!ޟ3VM/P雸~SA$dZ&sۧ\-lX:)=2MW&jT^ ˖ʰtܓ5ăټka|yk~,yaٶ&~+l=ҥf(qS>n2K 2)]>'t0- c:{mԷM+D1ѫA?kGaCMZネ#G@G'M/SfV=k]}TهnW%(܋0u.ߟH5cā &?\4EIwV ;z=FΪ<>J :Z,Wk0Ia?(}{'3$r:K '5`ŠxKj\[xřu7WcŻS$J8^`;`:\ƅR.1B xg عض'j v8YWJM QOu8nBȓkzjc!D0Nm~!/ڱ|:qc^XMQ{V%_3\j)xst(ig Q9;ok)d5/9 g X0RY٭ҢI2K#d6O% QfAmCcl=V} ~vL5|'\fҞݺoۗ9A0h5׿yûuA9MŠR~mg=Aƥ*Qxմй,nSZjI!@0%PmݠP=*!NM,Q;&쩈%yThdf(KLx7#h7I מf=~ÃxaZpzkbpq~vm P-Kw'[>v&D ^XUk~Zy$W8eGSnZo*T0lRrlyTQW夛*>%ᒍO7=-l  FwL'|1~$ڇAIK>V)b&PLJAp>K&!'E^vAA]^ TOP ޷bYq!neyT-LT\ϓG33!r˰Ej*˦j֟U0Bx| Ԥ*YSr9^b): ]c͠F 9fl2ӾcOcrL')U$w5¤C \Ujjő^< 6piU~Rmh]Lx̨X~?"Q,2z !0FLAGSmP\FYiTM4Gv4,Ou5X}qЧh h>9  d8U亳#zdr| ]V >ݜpo}ozN=Vn5ɂC,lk+(>2E;׸Ô-CquJkȳW¹$%XQ ᷕf׳.6𮌂cr((0_P[bjzGviwsPΣ4$E_Zʪ_'.፽9ូ2t%/@փIN2VQ1 0b e^ufK0"g߱ bl8 WS/Ɇo-1uQ֒^.PKf|Z:?:VL"ʽY͂loB.}ku#7Nn)Ei2͎~> q'f>Rw32ΥٛNE / @iLjd{yY^sj5~̂CH_1y,b<&ttu 92lRlxN1֍-m%MEZ ֛e(s= !E`l G0gy= t$/ϝyS+$sMLLO}3!U}ءE<2B*"v*V@BZON%~ts)@{,uXz8EJ4"cT߬DylgQ~Y%RcN)oaSzgm\!N(:bBG Ϻ VAc^vAC9l(:_-sq+7%.C]zS<&S M,|ǵQ5M0ƃ$[fB5$eFm̹S(M2&/ݕ|ɬ+͊fb%QRrr(+-ٌαB[w̮G}M둋7P"ufzd| >jLZ_w qJjPdWW`V߷e`,Ŧ۩QB6Ԍ q*%8V̛^55ȁ ^.=59EadG6X#2;n zUM9JQlAdM9[Q"mf@h fO(p*"mˏLd#qH"@e#T]Y: ȃę2x9=cg@wN-&ꕲy5ffe(O>\Hu{o4kU%#5ᗘY#qv]!_)K1}[XEઆ&',ȴa`N۾DXrv4 0iZyRRy1%U]B> z=}@22rOO(Ie7ׯGh&ne͟7YK|ࣿ@'7$v'4dJ1`ͅũqFϓX'H5[HENܺZ. 9}=: E4 }xY9k ̫fgd/_#'{[`Tǻ5[g:b}}EQXG-9)lB%@tG҂9#Fȣ)JrxR4 d2MEf珪 +_IP^ND|v_ٓ֎:ߋ~2Y=÷Tݎyƪ :OYFZ:TmvD(S= ]#%7jG',ߘ85 1Е?=^*B@,=;(0^UPke\ G^:og-fIdR\OH;{3d"%Hf@QMt^Z5EZ`Q-'] U_Fn(6)7"5:3{pvW#H{ӞڶM Ӵ[ e]~AVvn:@?#Gn:D\b➽9i_W =B*-e#6؁6lGZL}ofӳR'@KaN~rP^bλrGKOؗB0'@"LmԗBE pQyjGvx_i6o$-yWv#Fvv#7P[.O>tz<#JxiBab'e'V_&6;{DiqAp Rš|4?V&yKͭO؞WȻR V=P^ꄹdT+yB0(pMGaI*dkFSIⷱ:Pd,0s]\Sli.VujG5%?τDi6xTX+m5{NjDk[vĚ;Qǃbs1O~q{C8想\ cNڼz >ԑSLC0+=[>grRkdilSl-a 䒳]׳7%̠Ilw?(L[;U.v; aּ[q_Yh9ԥb>O.!'@Da]'MXʤ\K7w .%1%&a`N,Hi][Ӭ1],yHxa8  1lGWY.urQvp,]0[urIieͧbxMy+w.lpɱ:\y Q&|XUVϰa-*c#c# ^Z;B|8S'14%q<{7c Ibgӆ.8qT;֤>;@@UƵG0B~kɞV=B~73╞%y:L F:V pd~[R~S{NF8۶v%g4vɟP `YHxuxlp\m ~mYINJFD-Gmu7n}l=E)0 D2{?V9q P{ԞǴWtƐA-t>mj۵}MTb 3 2%!<ػrޘ{QlР.9n6uNm dE*BGyE Auavv#h6+DVaWB A@D:Υ-F/Y\ p3ix)9H2CkG,oMKļ2`ǂD{;S+;j=iZ'vvxj=?'5 ;/wsN0A@wxH# %q,ow9 J%R?{ѮpCHN'AHhS9\3LJ&i Kn@u ڟ{f"W!۴RcrPDBH{dV?T5>P c$xG†Qͽ32vx^[ξcKlfY6|uHlTGaV8䇜87C\ (R[ՂdET{>_$҆ !ţUa `5kJKM'4r>+Wk9ʉhl +y1IR^8;b.$w6i`.ٙS|2+M>dDŽV6JҦY1טo}z,kEE[zg:Ufx?% T i0y7C= ۍK͓9a0|&+ǴA3iƺq'qDϓ}#Aw:yT\:x?W`IOMT֩`C̋5뻂6KF;;e|hIMX-u {6nNUyʲ: ' S'.Fj\ɖ n5LdHAuӳwӊdTFy),\pǚu3"h(J@ v76ڣzo15Ts!𡏡?R{mVccK@ >[T] 8͂i)4㿑|mIĨ{^<PR~́m$_H-CgnIesyAŻ99ƍ%eJxN*-D= +~|(EXaቇ\\SolȠjC i*eVE&_WCV{Eeӊ_v'뻲4_+e; W$LUJ%쏭 {z1@P{, 2u>'E<uGSj85{?(óKATt/pC o[ko?RMt%W;'fRZ&տ4qnW5U܏4AR]JI0M491ڭ܁|ǘMR90TLă~ApzQ.aM(Q\kA6L5PH)$k ߢ _U_YGƾ}oem(-P~L2ё/5״ϴb*bz (o "X'q1/P֥6k$/삠. 2/4BÃMw ΅3K;T[@Qi`E͊xs2ɏt-7@6a-7Qi*I Nl¹r[~|ӗ/?C_lTW;nii#`D'T&\g3ҫՎ  &t> N Lij-ܤ0%7WU|Ҧgֺnu.Shx0m 0΀sJ Ò y .[2>|Ri`Kv"ؓ|xC4`|u6]B3mf)S0ѬRiyCͥ(ύJ re .$(R> R6m#V2XG~َ,'ׄ Q P@ ?jmpJ?e.>Pa8|G@-92t7lg .#ș"?xbҸy7$F:FR%ԕ! eɾŁyҦG,v+Hu`*k:}1w=jxOP;7/RVG3sf,I/_?Y>AE-2Gc1/2D#j5Ogx_35^"S׌j^֩+;@.g*ku$"lY) /ĖȞTd((سpMNGM0<{NLGJajrO*u.QCV[\PţYrY R쫊7(. J7~*]!&4bH30C0$<]j賐Ѻy?# sGGťкEl~3IuJ|:]9._#^r ه{ 8J$׊"8,4VC.}2$;TL.7M]ìOA.ꢘ XrF6@0VOZwh/J/%#}.ˤ7Kk@޶3~^ʖ^jq̻~5T]m28aKxat6JN7!m; y-NHZI ;&N!ļnhڶtn@o +ֹ8p,fɹ<[#x`{ԩȻnMg *^TEtXd4hY=BߣG21Pm%$UbmԿyZ[I 6OZP'r\k)Z̄MXvpm\׫DIHJ% щ V^oo' )|1l KA9a m3!E8fH|"Ko0(C0fu!EXp'ɾh~3,P ^tt/g CIA6UV G1ekτbi(ɗ/,8VqTVg8^^]X5X`n☋e`Z% QTy:\Q5mڛQnNLBĥJv>9d^OWʝH_h{ctFM'w,--~Cn抄Z: 9zP(תGUZ`f䳒i;2%$6(י|q(JP\""& 8rrN܌A{ɶS5bf\i6BU]7~idiMn 2}f7 ?*0 hx͚ Y"%.y-(RK.ܯxxߓ_(s'bLB~svbz* 9HRM-K1H(l*x^klx_vfWt}c-2 ^hG>8uzm)ϠS{mupZ#"ai<uCO)NBAE -?8jJʴ+@RD~Q_ry+TW*% d WrAG0< +uu}5tɚAXDΔѠt nRF[[T>Dr]fݓOKjJ^\ ѤrWNS| ag13nS DVCD[ /PٶOsǁgeXE4OcH iztAAeȱ>56Ln9 K&pzq>LW=vM4%8}l6DiM^6'?Wa]5`(fn30|;,$g޳ Pc Or|9P "aP(QZz7gB,FL }uZ!WKN\VFl/L-%DUhJL7~q>aaE͈ +!mu N=8_Oo8֍R=uo]-39DO@WˑD5- v޾MW፥c@ѶLr ojNY㟃}+9GidHx|JDL ݽL Si0RvbCfLQZ:_D e{!2ڇM6K:&9Qd,#̆|N`j_qʕ7.$(هӡȷ,(|QcrqS:#mlCIPe֨i{.;SnsZT3{vY ZP&îӴC.F却{ IdQcAvǽh.2褵j Բ@ lވXSIoP}Z, ‰c~O A*F;ѴaQǯ]vPJf`<8X\4Klp4E 7Lo97 ~x0AFn(q;ȷYyY6xFyɅŀDa4?9=aW{Ď._h3Z˒:"(9qx[ (V|¼1 e- |KVS3;׏^.RT[#Q5 pbxҩ]N6 K ͈ uq٬H W׌hPS a_gp~8ʊ'c%=̠T']-™"Zc3؀JlO kks<\ V&{1mZOEUU+PANFw%bCf - .og`>:ǔ\=Vҟ'OzԸXzhdُ&Dk+[04ln[h'⺬bLuH\2ђ{בoK#INX%.ӹ&+ jNFend6AhwPr~& [OߞufGjFVO.w*,E|P |?2a 6 |J_VvY_gz ]޻Hɔ p~FߙFʽ*ڼ-b)p6,N<Dk&i9_s^_^Jl 2v|=6~7U~EG|ZwU$H`^6* e/}{ԉ!CsQc"i lT#[F̳ctq}?5'ɺ7x\zDe[D^u!<sV|SbC!GN̬BP2/xed<(?pP}V6e:۵*斒-!]s0Dؑd氻 P]ᐴ}ɯNYp#{oˊڗn yԘ{c4]^*ksTI9hQW/ό*Ԣ3p˼(Lm(p͝,JezƈgPZZ?cO{,8d`gW%[%=7 [C{J9#YAǻq5_ϲ6Dypަr ae:.B퉯Є#PށWaVQ7s|h63ja{u%t.<֨~&Ç[_mn!5xSkExxJۻZW^{4: =nC15guӝfQ)><}PO]0c> q KԸ|nl3ݎm :1rZΦMfA\Ś9X$ +{B+&&LL* j}wI+"2mEJ۫Ɗm!&漷d]&%RٴEY7KjD04dDlҁݦ(+_ |]xVԜG.[qK.m0(5SZ~ V#YyۮƟ^ 0U!!4h(䍐F8'93OjR xFfQe.Vu3řdq N"E iVbej$ |q#g'BK`~VRK% ʹi2i,l}T={ZVo4g/g<ƤT  kwò&Tvzrbxq9=n꽇#ڄəҾ ]`Jl IetlgT\ޔG@?f'Ψ+g/ B$]ZCL*̓a"Q?1W/Um_5qES=l}DžFnm%6?Mt6%QIMȡHV kKl@`&*1:DpEfԔ=bUW U}P3~!"XFX{vpe!}(rpUƖ`y{jAg!eJ%*O׽44Ks )-PX:ld69So%f*ipض:meMHTM+NE1#d=Je/~x1[_/;-SFW:)b" nIoGǴ m?RտqD6KbhJ,/H41DAܮzE' N, "k py@i[*] SS;"IT5SF{F u%ggI>d+k^^yR2 Oq)jK լwy lA?ڒ^m} J*K`)2kՠ`L;-!\rjCbS?~C@ v/ |7|cSq~a63%>5@ %ISG}iȏ֟^DV2sMaҴM@?kS0#P 18|G!髃̀d\BE^#V@u__} KS {ƞ r{9!ld_ KBFm8( lPKb͆qYnm2) 4PZ $ Qj 5Mқ0.P(DEf*Ӯ Q֡ 55q́R::wfvV.5h30]>X&f^+b’&C!UɩW6K ĞR,ܱm?76 1Q ʀ aW: F ,9嫘^j Q_uL~LӵYd~dON;4g, E%/pa*䘨1/Xx] \#d!e77,7 )>զp_-SG T4? W5#hąc8yC PE+?0jɦ$5)"4ϋkݣIS]9ΑPYM?~Mqi2G<-? Yå| ~٦Jֹ})cYɝ6QJzHy eDŏi\0جDgUѽ |Qݲ=]^Oqy[5Kk_~У@ca_-v˭O09Hejxqq>mȅR$l8n8c& .ӫf5gd;۬ꋲ&{>(.8(s~דiįSՒZBBȧUx4> *=c$4|n }?H҇s!vGW<'|21 rvWD»!B}sXo|{xk:௾k'i +.jשL`DzsEmS|E H(=^}lv?M|<,f-b%iE&[4ꉹDTADzsRe#4 qü{Ǔ ڡ'A܇+ҍYϺLw!+S&q>lTdaNEb&IYUYOR59 N~Mѻ䄞=hޓ#΀bV hC#'|;y;ܭrfh0)H/>yKvT4yr(Y&.zҺI`7ixƐLr"Tb~ 3ʾjĬ׬wqp$bwO`JcNC/Oߟf7<## ڝL1ʤ߳F)UMKo=8i7p)-ԜӞ&y˔Lj`a)wjF'(cEZk]ZIՑs9h-( -)QCYeL*ϴxjckuaaZƙk ZC 2,4əz툴_\\ʗԥq929X5&әNh QHBJ?Q-l}NI#*%B} 2V5:-:dkW%2uђum<^=rU=RmI;Lڦq%#d!)| G;1^=K=x=B%b-)͠&Njf"{eR!,0wf~nf :;?uRЙ;SY'v!I/s3k3ӝUN1Z' E+@aD]i-lS2rhn~^-Gx%}f3%\=υKL~ϺW$njjf #yUnX0O;4(0REv"W#bP| ,&m!2D{Y;'FGӭ&?vaw4ٷYb [ {P(FĞYm 2!w kOo2L 6&󳖴bE;tb1_tN @TvB[LuqI @&ΔL͠ʛU}W($9x րok XW ch ÷4\+jL8깟Q Vݮp^45Y5OrSӦ6BOdrsmnOLzf{pǠ*eZ,o5ǽ ӝD:T oB RJ\wq=r?g:Mt@ PRpIS=*988bWT52{BS p3፴"=oܷѧ/uO2 Y-'3Dϩ Kޡ X</rGeg#o#,%}a49ӗYJi|q-C'|1>U]z~oa9,+ڮa}w4[4YÚ\B!JJd;+|2c^}!Ӗ̳NKIx!ÇrSsnUXlHH?</,j*Q UWjCܳp X($ToĚˋ/4haX+1/o >Ȋ|TZO;3Tq3)̔)aF"}z4N,UY".Sg\xF$4(R$ *[^F;"tw)m̶yzi([%ʢB^B_gsSŃ.1f5HvseNni"is KZQqUɝgԛT̏FL? oQ7Se+'G`t'5כF(Y[ h@ _09%nn:c 5v¹7O)QS`9v9m۝Nmߤ~ zwЪ\Q-x~Ǯ%K"& >YN+Ոt'b70aJȝSLz4/EZsW'6 .g|iGyIS2@F Y㚌̳Ӫ\I^Z_3%@RX؆ 'i2fu Ahh"m7?'a<hrȥ׹[ G$6B[ tzf iȘZDes9*u)5D UBvN{$Ujc31oy)59VpY NRc~;fA~c,1#) h)o@᛿4tD+i2byE;u6yԶorfJH (|[dU?!I&Ąwv>t8Ku0}Ww7M,3Z_*_Fڙ$vxt:mRk`7?,=U@p=߰q.In}ET)]j4gV}-;xـ#6ZK})Z?FVW.>֒jT 8haҰrӰ33/``EFi5TOQXsRf[.%N*䂦Fq<<Ơ&GV͊Ԭ %n6WSm^uhY?Ng%w8o<)*4h|1&|"|;Σ{ܨjc޽9'ٱKvʨ못l+F晉[ IپH] 7%Ld1w 1H^^5{ =q}_n^Yv 0F(cɤa4>*Q"';FC~Q [6T.A/uݤ6\n"WR=6QV[Lp"qH/E}z ) LLuz*S J"/Ǐf$Acvxڮ!=ƽq)AV0;L5q]遭ĕpN`DBh! 8uP GADgS= I8|w@T}3сf Bw,5\%cM*]&fjӬɔD tqF5\۫9g1P%JX 2KfŽm>@v .U,C\x#J&z5dul4F(PdUBjۥwkVszW (\T0˪8T6aҥv(( ߏq$(0WvKh W _pKj9L~^m.̓"x//? .wƵX9ɹ0q[4 S`S[<c6GT5?U#hք <<|N_8{[Xaš#hn>Ҩ~Uf'4XK:Lɢ iM*iY߮mִ]Գ@De"<gК!>ogԲE^E"W:ǿ3%G^d~;Tybeԥ g^{Xdg<Qn\X?7*hI!wrarD`&Ƹ{"J \*{+Ƞ]B=WLؽ;ϨHMxbo ?DG¢ƚUen·8^(V8|iµSI})p9J&dOVp?1C+MB>0FES|0f-BCCyTnA1_Ri[*PI]J_?%N{>ЪfT{{>΁sKo`KC62gz_Qm-#1Gs;e=wB'諥B1ZïfV*4Zb.Ȟ/{1ط\؄/ZWحhullf=>Po 09*:c-vr?d?bHHLx*ɛ-._Y2;N:T 2S1a0 4"kOXh {:I2ue,0zp+Lh*VV]zyȇnzv)ȭw~Ɏ|?`I &ȄPȟGmFΰc6Ans6~Nmge@V hgՁ<}\P蚁/uεLsβ,Fi ꜸzH",<(HXGNRٌ )kќ,a2N8^'MX '!.lɑ: {Qɺ%=2V"U } 5x=jވig22YHҨ q (8N0jVPږhAgIk]>G #6^HZYy?%Ȃg ~r#ւWbrZU3UڋjROD!:su~~~GD+J)Hp吽ӞXC̴mgb#8la(aӈSb'egBk :ξ #4S`O+*t1uU9Td=͒& GGsf`<0)UpH4{]6J-.i-iirjT7]_B[c3e_vpt]f/yV)¿ cɗshG+ %~J:p4:W+ZKR,X"oBQ|ش.rQNKMO+&phyf3C{GyI+J^%Bڲp0 #ob+7VSֈ*[_^ɥs DV\S TQ*,‡z 5dN)w#.x{6^H>֧z$bXit&TgQ*e--.r|if7x҂ o."sN:g @sP$L)G,wFv-}=H S v虤C z|zt,mCeh1oA$vӘ#GzyK^T59fl۹'-M;8"J>;CzZ~(4,,6' Euoc(Ec*/l#}N3r þQx$X_ø|T(*RCϗj,{K}X㪴D'BMEC(SiQg]viGk3iTX*vs 2,SVMvK*7`b#G [NvqG#HS}ys/A(Qbе">xw]( Is:}wLjqܠoL^2g8Ϫ߱ٞCW+xJ2*W`cwvSL^z,wǽSPZRy~yUv%^2Zs5R!~RL/ˡj w\Eg(,tE -w>1[bCNL^ <_ nxpIA\S7fʾ oG}^xں>MgxjMrú*Y1ԨĽgdt5ӨC3`#z0F^iIܕ.wyFsm؃7Fh!"Z7&A6އFv7ka|kC .o-OVORA^LGҏGS AħWb+\O ?0.>Eh0")eE}L7~GB7﬋=PU *ŭTτw0aؔ|$3yK)x.,0G gǹmp*j,ikI٧ rr˕[>%Œvl`ҮurP $+^t6o i|Ř~@SBi={2WoNң; V1?rtE⬨&+U^`XAb+ RXjȶM̩k(M{}GQ"~[/L!C)?9 <6{oO߯̔B1ڌgA5.Fs*9Z2y3D_lÕt`e*h2;Do(kP9>feك s{uM"\Ol@:٠!$o{$'Q4Rw YZ