#F:      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcd e f g h i j k l m n o p q r s t u v w x y z { | } ~  None79 None79       Safe79  !"#$% !"#$%Safe79 ((None79)cachix+Add a list of binary caches to netrc under filename}. Makes sure there are no duplicate entries (using domain as a key). If file under filename doesn't exist it's created.))None479M9cachixPure version of addIO*,+-./0512346789:;<=>?@ABC-./051234*,+<9>?=ABC678:;@None79\cachix:Add a Binary cache to nix.conf, print nixos config or failKLMNOPQRSTUVWXYZ[\]^OPQRSTUVWX[\]^YZKLMNNone79bcbc Safe79dcachixA secret key for signing nars.cachixASCII (Base64)cachixError message or signing keygcachixBase64cachixError message or signing keycachixASCII (Base64)defghdefgh None79icachixAn  std::stringjcachixAn STL  ::iteratorkcachixAn STL setncachixA Nix PathSet aka std::set Path aka std::set std::string>ocachixA Nix refijklmnoponmlkjip None79X$wcachixTODO: foreignptrzcachixRFollow symlinks to the store and chop off the parts after the top-level store name}cachixAThe narSize field of a ValidPathInfo struct. Source: store-api.hh~cachixFCopy the narHash field of a ValidPathInfo struct. Source: store-api.hhcachix=Deriver field of a ValidPathInfo struct. Source: store-api.hhReturns  when missing.cachixoString constant representing the case when the deriver of a store path does not exist or is not known. Value: unknown-derivercachix@References field of a ValidPathInfo struct. Source: store-api.hh|cachixExact store path, not a subpathcachixValidPathInfo or exceptionqrstuvwxyz{|}~wxyz|}~qrstuv{ None&'79&cachix$Partial function from URI to BaseUrl None79' Safe79(None79( None .79HUV)XNone79*cachix Encode a  in Nix's base32 encodingNone .79SUVX7>cachix+Called when a path is already in the cache.cachixPush an entire closureNote: ) will be called less often in the future.cachix)cachix base url, connection manager, see  , cachixdetails for pushing to cachecachix8how to report results, (some) errors, and do some thingscachix store pathcachixr is determined by the cachix)cachix base url, connection manager, see  , cachixdetails for pushing to cachecachix8how to report results, (some) errors, and do some thingscachix store pathcachixr is determined by the cachixETraverse paths, responsible for bounding parallel processing of paths For example:  4cachixSee cachixInitial store pathscachixEvery r4 per store path of the entire closure of store pathsNone .79UVX:cachixFind a secret key in the  or environment variablecachix Cache namecachixSecret key or exceptionNone79: !"#$%&'()*+,-./0123456789:;<=>?@ABCDCEFGHIJKLM?NOPQRSTUVWXYZ[\]^__`abcdefgghijklmnopqrstu v v w x y z { | } ~                        cachix-0.3.8-inplaceCachix.Client.Config.OrphansCachix.Client.ConfigCachix.Client.ExceptionCachix.Client.HumanSizeCachix.Client.NetRcCachix.Client.NixConfCachix.Client.InstallationModeCachix.Client.NixVersionCachix.Client.SecretsCachix.Client.Store.ContextCachix.Client.StoreCachix.Client.URICachix.Client.OptionsParserCachix.Client.EnvCachix.Client.ServantSystem.Nix.Base32Cachix.Client.PushCachix.Client.Commands Cachix.Client Paths_cachixdefaultCachixBaseUrlServant.Client mkClientEnv$fToDhallToken$fFromDhallToken ConfigPathConfig authToken binaryCachesBinaryCacheConfigname secretKeymkConfig readConfiggetDefaultFilename writeConfig$fShowBinaryCacheConfig$fGenericBinaryCacheConfig$fFromDhallBinaryCacheConfig$fToDhallBinaryCacheConfig $fShowConfig$fGenericConfig$fFromDhallConfig$fToDhallConfigCachixExceptionUnsupportedNixVersion UserEnvNotSet MustBeRootNixOSInstructionsAmbiguousInput NoSigningKeyNoInputNoConfigNetRcParseErrorNarStreamingErrorNarHashMismatchDeprecatedCommandAccessDeniedBinaryCacheBinaryCacheNotFound$fExceptionCachixException$fShowCachixException humanSizeadd NixConfLocGlobalLocalNixConfNixConfG NixConfLine Substituters TrustedUsersTrustedPublicKeys NetRcFileOther readLines writeLinesisTrustedUsersdefaultPublicURIdefaultSigningKeyrenderwritereadupdatesetNetRC getFilenameparserparse$fShowNixConfLine$fEqNixConfLine$fShowNixConfG $fEqNixConfG$fFunctorNixConfG$fShowNixConfLoc$fEqNixConfLoc UseOptionsuseModeuseNixOSFolderInstallationModeInstall WriteNixOSUntrustedRequiresSudoUntrustedNixOSNixEnv isTrustedisRootisNixOS fromStringtoStringgetInstallationModeaddBinaryCache isTrustedUsergetUser$fShowInstallationMode$fEqInstallationMode$fShowUseOptionsassertNixVersionparseNixVersion SigningKeysigningSecretKeyparseSigningKeyLenientexportSigningKey CxxStringIteratorSet ValidPathInfoNixStorePathSetRefcontext ClosureParams flipDirectionincludeOutputsincludeDeriversStore openStore releaseStorefollowLinksToStorePathstoreUri queryPathInfovalidPathInfoNarSizevalidPathInfoNarHashvalidPathInfoDeriverunknownDerivervalidPathInfoReferencesnewEmptyPathSet addToPathSettraversePathSetdefaultClosureParamscomputeFSClosure getBaseUrldefaultCachixURI PushOptionscompressionLevelnumJobs omitDeriver PushArguments PushPathsPushWatchStore CachixCommand AuthTokenCreateGenerateKeypairPushUseVersionBinaryCacheName CachixOptionshost configPathverbosegetOpts$fShowCachixOptions$fShowPushOptions$fShowPushArguments$fShowCachixCommandEnvconfig clientenv cachixoptions storeAsyncmkEnvcustomManagerSettings cachixVersion ClientErrorisErr cachixClientcachixBCClientcachixBCStreamingClientrunAuthenticatedClientencode PushStrategyonAlreadyPresent onAttempton401onErroronDonewithXzipCompressor PushCache pushCacheNamepushCacheSigningKeypushCacheTokendefaultWithXzipCompressor"defaultWithXzipCompressorWithLevelpushSingleStorePath pushClosuremapConcurrentlyBounded authtokencreategenerateKeypairusepushmainparseSigningKeyLenientBSexportSigningKeyBSversion getBinDir getLibDir getDynLibDir getDataDir getLibexecDir getSysconfDirgetDataFileNamebytestring-0.10.10.1Data.ByteString.Internal ByteStringuploadStorePathfindSigningKey