úÎcŪZ ˛      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œ ž Ÿ   Ą ĸ Ŗ ¤ Ĩ Ļ § ¨ Š Ē Ģ Ŧ ­ Ž ¯ ° ą None&'+,-1234567;<=>?AFKNQSTV āfor servant >=0.11for  servant <0.11 None&'+-1234567;<=>?AFQSTV!I >The policies to use when generating and verifying XSRF cookies"9What name to use for the cookie used for XSRF protection.#BWhat path to use for the cookie used for XSRF protection. Default Just "/".$9What name to use for the header used for XSRF protection.%0Exclude GET request method from XSRF protection.&,The policies to use when generating cookies. If *both* ) and * are Nothingk, browsers will treat the cookie as a *session cookie*. These will be deleted when the browser is closed.Note that having the setting Secure? may cause testing failures if you are not testing over HTTPS.(= means browsers will only send cookies over HTTPS. Default: Secure.)5How long from now until the cookie expires. Default: Nothing.**At what time the cookie expires. Default: Nothing.+BThe URL path and sub-paths for which this cookie is used. Default Just "/".,5 settings. Default:  SameSiteLax.-5What name to use for the cookie used for the session..:The optional settings to use for XSRF protection. Default Just def./ JWTSettings2 are used to generate cookies, and to verify JWTs.1Key used to sign JWT.2Algorithm used to sign JWT.3Keys used to validate JWT.4An aud predicate. The audG is a string or URI that identifies the intended recipient of the JWT.?A  JWTSettings# where the audience always matches.& !"#$%&'()*+,-./0123456789:;<=>?@AB(<=>9:;5678/01234?&'()*+,-.D@ !"#$%CAB !"#$%&'()*+,-./0123456789:;<=> Safe&'+-1234567;<=>?AFQSTV$ None&'+-1234567;<=>?AFQSTV(ĩ\\D is a convenience function to throw errors across an entire sub-API uthrowAll err400 :: Handler a :<|> Handler b :<|> Handler c == throwError err400 :<|> throwError err400 :<|> err400]for servant >=0.11^for  servant <0.11[\[\a`_^][\None&'+-1234567;<=>?AFQSTV2‘bAn  AuthCheck@ is the function used to decide the authentication status (the e) of a request. Different  AuthCheck^s may be combined as a Monoid or Alternative; the semantics of this is that the *first* non-i# result from left to right is used.e(The result of an authentication attempt.hAuthentication succeeded.iIf an authentication procedure cannot be carried out - if for example it expects a password and username in a header that is not present -  IndefiniteP is returned. This indicates that other authentication methods should be tried.bcdeihgfefghionmlkjbcdxwvutsrqpbcdefghiNone&'+-1234567;<=>?AFQSTV=ĖƒHow to encode data from a JWT.;The default implementation stores data in the unregistered dat claim, and uses the type's ToJSON instance to encode the data.…How to decode data from a JWT.KThe default implementation assumes the data is stored in the unregistered dat claim, and uses the FromJSON% instance to decode value from there.‡A JWT  AuthCheckJ. You likely won't need to use this directly unless you are protecting a Raw endpoint.ˆHCreates a JWT containing the specified data. The data is stored in the datT claim. The 'Maybe UTCTime' argument indicates the time at which the token expires.ƒ„…†‡ˆ…††ƒ„„‡ˆƒ„„…††None&'+-1234567;<=>?AFQSTVE=Œ#Makes a cookie to be used for XSRF. Alias for Œ.Ž(Makes a cookie with session information.“ĘFor a JWT-serializable session, returns a function that decorates a provided response object with XSRF and session cookies. This should be used when a user successfully authenticates with credentials.”;Adds headers to a response that clears all session cookies.– Alias for Ž.— Alias for •.‰Š‹ŒŽ‘’“”•–—‰Š‹ŒŽ‘’“”•–—None&'+-1234567;<=>?AFQSTVM`™[Whether the username exists and the password is correct. Note that, rather than passing a Pass5 to the function, we pass a function that checks an  EncryptedPassf. This is to make sure you don't accidentally do something untoward with the password, like store it.›A ˛– that asks the client to authenticate via Basic Authentication, should be invoked by an application whenever appropriate. The argument is the realm.˜™š›œ›š˜™œ˜™ None&'+-1234567;<=>?AFQSTVSAppCtx applies the function res to the arguments in ls1 by taking the values from the Context provided.ŖIsAuth a ctx v indicates that a/ is an auth type that expects all elements of ctxE to be the in the Context and whose authentication check returns an  AuthCheck v. žŸ ĄĸŖĨ¤Ŗ¤ĨЍ§ĄĸĻŦ ŸžĢĒžĄĸŖ¤Ĩ None&'+-1234567;<=>?AFQSTVT›­ None&'+-1234567;<=>?AFQSTVU§None&'+-1234567;<=>?AFQSTVWŠą%Generate a key suitable for use with  defaultConfig.N  !"#$%&'()*+,-./0123456789:;<=>?@A[\bcdefghiƒ„…†‡ˆŒŽ“”•–—˜™š›ĄąQ efghibcd …††ƒ„„<=>/01234?‡ &'()*+,-. !"#$%@AŽ•Œ–—“”5678Ą ˜™š 9:;›[\ąˆŗ  !"#$%&'()*+,-./01234556789::;<=>?@ABBCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrsttuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ĄĸŖ¤Ĩϧ¨ŠĒĢŦ­ Ž ¯ ° ą ˛ ŗ ´ ĩ ļ ˇ ¸ š ē ģ ŧ Ŋ ž ŋ Ā ÁÂÃÄÅÆ2servant-auth-server-0.4.0.0-CNdGYAhDv8z2QY7Alu2vIlServant.Auth.Server(Servant.Auth.Server.Internal.ConfigTypes)Servant.Auth.Server.Internal.AddSetCookie%Servant.Auth.Server.Internal.ThrowAll"Servant.Auth.Server.Internal.Types Servant.Auth.Server.Internal.JWT#Servant.Auth.Server.Internal.Cookie&Servant.Auth.Server.Internal.BasicAuth"Servant.Auth.Server.Internal.ClassServant.Auth.Server.Internal#Servant.Auth.Server.SetCookieOrphan&Servant.Auth.Server.Internal.FormLogin#cookie-0.4.4-2BABKvZsZg1Ic4EwNAtBD5 Web.Cookie SetCookie1data-default-class-0.1.2.0-65ekPiG1XHJGG1Sy8NeI1LData.Default.ClassdefDefault%servant-0.12.1-IQpBeDNqCOaI4mofnuNxjcServant.API.IsSecure NotSecureSecureIsSecureServant.API.BasicAuthbasicAuthPasswordbasicAuthUsername BasicAuthData+servant-auth-0.3.2.0-6bBAbodG8Z68dPi0PSY6kQ Servant.AuthAuthJWTCookie BasicAuth AddSetCookies addSetCookies SetCookieList SetCookieNil SetCookieConsAddSetCookieApiAddSetCookieApiVerbAddSetCookiesApiNatZS mkHeaders$fAddSetCookiesSTaggedTagged$fAddSetCookiesS(->)(->)$fAddSetCookiesS:<|>:<|>$fAddSetCookiesSmm$fAddSetCookiesZorigorig$fAddSetCookiesS(->)(->)0XsrfCookieSettingsxsrfCookieNamexsrfCookiePathxsrfHeaderNamexsrfExcludeGetCookieSettingscookieIsSecure cookieMaxAge cookieExpires cookiePathcookieSameSitesessionCookieNamecookieXsrfSetting JWTSettings signingKeyjwtAlgvalidationKeysaudienceMatchesSameSiteAnySiteSameSiteStrict SameSiteLaxIsPasswordCorrectPasswordCorrectPasswordIncorrectIsMatchMatches DoesNotMatchdefaultJWTSettingsdefaultCookieSettingsdefaultXsrfCookieSettings"jwtSettingsToJwtValidationSettings$fDefaultXsrfCookieSettings$fDefaultCookieSettings $fEqIsMatch $fShowIsMatch $fReadIsMatch$fGenericIsMatch $fOrdIsMatch$fEqIsPasswordCorrect$fShowIsPasswordCorrect$fReadIsPasswordCorrect$fGenericIsPasswordCorrect$fOrdIsPasswordCorrect $fEqSameSite$fShowSameSite$fReadSameSite$fGenericSameSite $fOrdSameSite$fGenericJWTSettings$fEqXsrfCookieSettings$fShowXsrfCookieSettings$fGenericXsrfCookieSettings$fEqCookieSettings$fShowCookieSettings$fGenericCookieSettingsThrowAllthrowAll$fThrowAllTagged$fThrowAll(->) $fThrowAllm$fThrowAll(->)0$fThrowAll:<|> AuthCheck runAuthCheck AuthResult BadPassword NoSuchUser Authenticated Indefinite$fMonadPlusAuthResult$fAlternativeAuthResult$fMonadAuthResult$fApplicativeAuthResult$fMonoidAuthResult$fSemigroupAuthResult$fMonadPlusAuthCheck$fAlternativeAuthCheck$fMonadTimeAuthCheck$fMonadIOAuthCheck$fMonadReaderRequestAuthCheck$fMonadAuthCheck$fApplicativeAuthCheck$fMonoidAuthCheck$fSemigroupAuthCheck$fEqAuthResult$fShowAuthResult$fReadAuthResult$fGenericAuthResult$fOrdAuthResult$fFunctorAuthResult$fTraversableAuthResult$fFoldableAuthResult$fGenericAuthCheck$fFunctorAuthCheckToJWT encodeJWTFromJWT decodeJWT jwtAuthCheckmakeJWTcookieAuthCheckxsrfCheckRequiredxsrfCookieAuthCheckmakeXsrfCookiemakeCsrfCookiemakeSessionCookienoXsrfTokenCookieapplyCookieSettingsapplyXsrfCookieSettingsapplySessionCookieSettings acceptLogin clearSessionmakeSessionCookieBS makeCookie makeCookieBSFromBasicAuthDatafromBasicAuthData BasicAuthCfgwwwAuthenticatedErrbasicAuthCheckAppCtxappCtxAppUnappAreAuthsrunAuthsIsAuthAuthArgsrunAuth$fAreAuths[]ctxsv$fIsAuthBasicAuthusr$fIsAuthJWTusr$fIsAuthCookieusr$fAppCtxctx[]res$fAppCtxctxs:(->)$fAreAuths:ctxsv$fHasServerTYPE:>ctxs$fToByteStringSetCookie$fToHttpApiDataSetCookie$fFromHttpApiDataSetCookie generateKey*servant-server-0.12-8kdMo61XDxoHBwhkaSepVO"Servant.Server.Internal.ServantErr ServantErr