#G~:      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghi j k l m n o p q r s t u v w x y z { | } ~  None79 Safe79     None79  !" "!Safe79 ++None79,cachix+Add a list of binary caches to netrc under filename}. Makes sure there are no duplicate entries (using domain as a key). If file under filename doesn't exist it's created.,,None479M=cachixPure version of addIO-/.0123495678:;<=>?@ABCDEFG123495678-/.0@=BCAEFG:;<>?DNone79acachix:Add a Binary cache to nix.conf, print nixos config or failOPQRSTUVWXYZ[\]^_`abcTUVWXYZ[\]`abc^_OPQRSSafe79ghgh None79>ii Safe79cjcachixA secret key for signing nars.cachixASCII (Base64)cachixError message or signing keymcachixBase64cachixError message or signing keycachixASCII (Base64)jklmnjklmn None .79HUVopop None79qcachixAn  std::stringrcachixAn STL  ::iteratorscachixAn STL setvcachixA Nix PathSet aka std::set Path aka std::set std::string>wcachixA Nix refqrstuvwxwvutsrqx None79X&cachixTODO: foreignptrcachixRFollow symlinks to the store and chop off the parts after the top-level store namecachixAThe narSize field of a ValidPathInfo struct. Source: store-api.hhcachixFCopy the narHash field of a ValidPathInfo struct. Source: store-api.hhcachix=Deriver field of a ValidPathInfo struct. Source: store-api.hhReturns  when missing.cachixoString constant representing the case when the deriver of a store path does not exist or is not known. Value: unknown-derivercachix@References field of a ValidPathInfo struct. Source: store-api.hhcachixExact store path, not a subpathcachixValidPathInfo or exceptionyz{|}~yz{|}~None&'79(cachix$Partial function from URI to BaseUrlNone79) Safe79*None79* None79+cachix Encode a  in Nix's base32 encodingNone .79SUVX8cachix+Called when a path is already in the cache.cachix8how to report results, (some) errors, and do some thingscachix)cachix base url, connection manager, see , cachixPush an entire closureNote: ) will be called less often in the future.cachix&Find auth token or signing key in the Config or environment variablecachixdetails for pushing to cachecachix store pathcachixr is determined by the cachixdetails for pushing to cachecachixr is determined by the cachixETraverse paths, responsible for bounding parallel processing of paths For example:  4cachixInitial store pathscachixEvery r4 per store path of the entire closure of store pathscachix Cache namecachixSecret key or exceptionNone799<None799None .79UVX: None79: !"#$%&'()*+,-./01123456789:;<=>?@ABCDEFGHIJKLKMNOPQRSTUFVWXYZ[\]^_`abcdefgghijklmnoppqrstuvwxyz{|}~                cachix-0.6.0-inplaceCachix.Client.Config.OrphansCachix.Client.ExceptionCachix.Client.ConfigCachix.Client.HumanSizeCachix.Client.NetRcCachix.Client.NixConfCachix.Client.InstallationModeCachix.Client.NixVersionCachix.Client.RetryCachix.Client.SecretsCachix.Client.ServantCachix.Client.Store.ContextCachix.Client.StoreCachix.Client.URICachix.Client.OptionsParserCachix.Client.EnvSystem.Nix.Base32Cachix.Client.PushCachix.Client.PushQueueCachix.Client.WatchStoreCachix.Client.Commands Cachix.Client Paths_cachixdefaultCachixBaseUrlServant.Client mkClientEnv$fToDhallToken$fFromDhallTokenCachixExceptionUnsupportedNixVersion UserEnvNotSet MustBeRootNixOSInstructionsAmbiguousInput NoSigningKeyNoInputNoConfigNetRcParseErrorNarStreamingErrorNarHashMismatchDeprecatedCommandAccessDeniedBinaryCacheBinaryCacheNotFound$fExceptionCachixException$fShowCachixException ConfigPathConfig binaryCachesBinaryCacheConfigname secretKeymkConfig readConfiggetDefaultFilename writeConfiggetAuthTokenRequiredgetAuthTokenOptionalgetAuthTokenMaybenoAuthTokenError setAuthToken$fShowBinaryCacheConfig$fGenericBinaryCacheConfig$fFromDhallBinaryCacheConfig$fToDhallBinaryCacheConfig $fShowConfig$fGenericConfig$fFromDhallConfig$fToDhallConfig humanSizeadd NixConfLocGlobalLocalCustomNixConfNixConfG NixConfLine Substituters TrustedUsersTrustedPublicKeys NetRcFileOther readLines writeLinesisTrustedUsersdefaultPublicURIdefaultSigningKeyrenderwritereadupdatesetNetRC getFilenameparserparse$fShowNixConfLine$fEqNixConfLine$fShowNixConfG $fEqNixConfG$fFunctorNixConfG$fShowNixConfLoc$fEqNixConfLoc UseOptionsuseModeuseNixOSFolderuseOutputDirectoryInstallationModeInstall WriteNixOSUntrustedRequiresSudoUntrustedNixOSNixEnv isTrustedisRootisNixOS fromStringtoStringgetInstallationModeaddBinaryCache isTrustedUsergetUser$fShowInstallationMode$fEqInstallationMode$fShowUseOptionsassertNixVersionparseNixVersionretryAll SigningKeysigningSecretKeyparseSigningKeyLenientexportSigningKeyisErr cachixClient CxxStringIteratorSet ValidPathInfoNixStorePathSetRefcontext ClosureParams flipDirectionincludeOutputsincludeDeriversStore openStore releaseStorefollowLinksToStorePathstoreUri queryPathInfovalidPathInfoNarSizevalidPathInfoNarHashvalidPathInfoDeriverunknownDerivervalidPathInfoReferencesnewEmptyPathSet addToPathSettraversePathSetdefaultClosureParamscomputeFSClosure getBaseUrldefaultCachixURI PushOptionscompressionLevelnumJobs omitDeriver PushArguments PushPathsPushWatchStore CachixCommand AuthTokenGenerateKeypairPush WatchStore WatchExecUseVersionBinaryCacheName CachixOptionshost configPathverbosegetOpts$fShowCachixOptions$fShowPushOptions$fShowPushArguments$fShowCachixCommandEnvconfig clientenv cachixoptions storeAsyncmkEnvcustomManagerSettings cachixVersionencode PushStrategyonAlreadyPresent onAttempton401onErroronDonewithXzipCompressor PushParamspushParamsNamepushParamsSecretpushParamsStrategypushParamsClientEnvpushParamsStore PushSecret PushTokenPushSigningKeydefaultWithXzipCompressor"defaultWithXzipCompressorWithLevelpushSingleStorePathuploadStorePath pushClosuregetMissingPathsForClosurefindPushSecretmapConcurrentlyBoundedQueue startWorkers$fExceptionStopWorker$fEqStopWorker$fShowStopWorker authtokengenerateKeypairusepush watchStore watchExecmainparseSigningKeyLenientBSexportSigningKeyBSversion getBinDir getLibDir getDynLibDir getDataDir getLibexecDir getSysconfDirgetDataFileNamebytestring-0.10.10.1Data.ByteString.Internal ByteString