úÎm <      !"#$%&'()*+,-./0123456789:; Safe-Infered2thrown when the remote-side closes the connection  return PONG in the request body ! render a < to = "render, field = value #pretty-print an HTTP header *  !" field name  field value #$%&'>?(  !"#$%&'(  !"#$'&%   !"#$%&'>? Safe-Infered4find a line terminated by a '\r\n' ()*+,-./01234@ ()*+,-./01234 (,+*)-./01234 (,+*)-./01234@ Safe-Infered567567567567 Safe-Infered8start TCP listening on a port 9listen on a port and handle Requests :handle Requests from an already listening A 8 port number 9port to listen on request handler :A in listen mode request handler ;89:;89:;89:;B       !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJK acme-http-0.1 Acme.Types Acme.Request Acme.Response Acme.ServeConnectionClosedResponseByteStringResponsersCodersBody PongResponseRequestrqMethodrqURIbs rqHTTPVersion rqHeadersrqSecurerqBodyMethod EXTENSIONCONNECTTRACEDELETEPUTPOSTHEADGETONLYGETOPTIONS HTTPVersionHTTP11HTTP10 ppHTTPVersionppMethod ppRequest ppResponse bytestringfieldppHeadercoloncrnlspace ParseErrorUnknownHTTPVersionMalformedHeaderMalformedRequestLine Unexpected parseRequestparseRequestLine parseMethodparseHTTPVersion parseHeaders parseHeader parseTokentakeLinepong statusLine ok_statuslistenOnserve serveSocket requestLoopbytestring-0.9.2.1Data.ByteString.Internal ByteStringpretty-1.1.1.0Text.PrettyPrint.HughesPJDoc$fExceptionConnectionClosed $fShowRequest$fExceptionParseErrornetwork-2.3.0.11Network.SocketSocket