úÎ!vílÿ´      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œž Ÿ   ¡ ¢ £ ¤ ¥ ¦ § ¨ © ª « ¬ ­ ® ¯°±²³ None&'+,-1234567;<=>?AFNQSTV Žservant-auth-serverfor servant >=0.11servant-auth-serverfor  servant <0.11  None&'+-1234567;<=>?AFQSTV(ù servant-auth-server>The policies to use when generating and verifying XSRF cookies"servant-auth-server9What name to use for the cookie used for XSRF protection.#servant-auth-serverBWhat path to use for the cookie used for XSRF protection. Default Just "/".$servant-auth-server9What name to use for the header used for XSRF protection.%servant-auth-server0Exclude GET request method from XSRF protection.&servant-auth-server,The policies to use when generating cookies. If *both* ) and * are Nothingk, browsers will treat the cookie as a *session cookie*. These will be deleted when the browser is closed.Note that having the setting Secure? may cause testing failures if you are not testing over HTTPS.(servant-auth-server= means browsers will only send cookies over HTTPS. Default: Secure.)servant-auth-server5How long from now until the cookie expires. Default: Nothing.*servant-auth-server*At what time the cookie expires. Default: Nothing.+servant-auth-serverCThe URL path and sub-paths for which this cookie is used. Default: Just "/".,servant-auth-server<Domain name, if set cookie also allows subdomains. Default: Nothing.-servant-auth-server6 settings. Default:  SameSiteLax..servant-auth-server5What name to use for the cookie used for the session./servant-auth-server;The optional settings to use for XSRF protection. Default: Just def.0servant-auth-server JWTSettings2 are used to generate cookies, and to verify JWTs.2servant-auth-serverKey used to sign JWT.3servant-auth-serverAlgorithm used to sign JWT.4servant-auth-serverKeys used to validate JWT.5servant-auth-serverAn aud predicate. The audG is a string or URI that identifies the intended recipient of the JWT.@servant-auth-serverA  JWTSettings# where the audience always matches.' !"#$%&'()*+,-./0123456789:;<=>?@ABC' !"#$%&'()*+,-./0123456789:;<=>?@ABC Safe&'+-1234567;<=>?AFQSTV+7None&'+-1234567;<=>?AFQSTV0É]servant-auth-server]D is a convenience function to throw errors across an entire sub-API uthrowAll err400 :: Handler a :<|> Handler b :<|> Handler c == throwError err400 :<|> throwError err400 :<|> err400^servant-auth-serverfor servant >=0.11_servant-auth-serverfor  servant <0.11\]\]None&'+-1234567;<=>?AFQSTV;¾cservant-auth-serverAn  AuthCheck@ is the function used to decide the authentication status (the f) of a request. Different  AuthCheck^s may be combined as a Monoid or Alternative; the semantics of this is that the *first* non-j# result from left to right is used.fservant-auth-server(The result of an authentication attempt.iservant-auth-serverAuthentication succeeded.jservant-auth-serverIf an authentication procedure cannot be carried out - if for example it expects a password and username in a header that is not present -  IndefiniteP is returned. This indicates that other authentication methods should be tried.cdefjihgfjihgcdeNone&'+-1234567;<=>?AFQSTVGÑ„servant-auth-serverHow to encode data from a JWT.;The default implementation stores data in the unregistered dat claim, and uses the type's ToJSON instance to encode the data.†servant-auth-serverHow to decode data from a JWT.KThe default implementation assumes the data is stored in the unregistered dat claim, and uses the FromJSON% instance to decode value from there.ˆservant-auth-serverA JWT  AuthCheckJ. You likely won't need to use this directly unless you are protecting a Raw endpoint.‰servant-auth-serverHCreates a JWT containing the specified data. The data is stored in the datT claim. The 'Maybe UTCTime' argument indicates the time at which the token expires.„…†‡ˆ‰†‡„…ˆ‰None&'+-1234567;<=>?AFQSTVQ@servant-auth-server#Makes a cookie to be used for XSRF.Žservant-auth-server Alias for .servant-auth-server(Makes a cookie with session information.”servant-auth-serverÊFor a JWT-serializable session, returns a function that decorates a provided response object with XSRF and session cookies. This should be used when a user successfully authenticates with credentials.•servant-auth-server;Adds headers to a response that clears all session cookies.—servant-auth-server Alias for .˜servant-auth-server Alias for –.Š‹ŒŽ‘’“”•–—˜Š‹ŒŽ‘’“”•–—˜None&'+-1234567;<=>?AFQSTVYýšservant-auth-server[Whether the username exists and the password is correct. Note that, rather than passing a Pass5 to the function, we pass a function that checks an  EncryptedPassf. This is to make sure you don't accidentally do something untoward with the password, like store it.œservant-auth-serverA ´– that asks the client to authenticate via Basic Authentication, should be invoked by an application whenever appropriate. The argument is the realm.™š›œœ›™š None&'+-1234567;<=>?AFQSTV`.žservant-auth-serverAppCtx applies the function res to the arguments in ls1 by taking the values from the Context provided.¤servant-auth-serverIsAuth a ctx v indicates that a/ is an auth type that expects all elements of ctxE to be the in the Context and whose authentication check returns an  AuthCheck v. žŸ ¡¢£¤¦¥ ¤¦¥¢£¡ žŸ None&'+-1234567;<=>?AFQSTVaŒNone&'+-1234567;<=>?AFQSTVi]¯servant-auth-server%Generate a key suitable for use with  defaultConfig.°servant-auth-server,Generate a bytestring suitable for use with ±.±servant-auth-server!Restores a key from a bytestring.²servant-auth-server§Writes a secret to a file. Can for instance be used from the REPL to persist a key to a file, which can then be included with the application. Restore the key using ³.³servant-auth-serverReads a key from a file.S  !"#$%&'()*+,-./0123456789:;<=>?@AB\]cdefghij„…†‡ˆ‰Ž”•–—˜™š›œ¢¯°±²³S fghijcde †‡„…=>?012345@ˆ &'()*+,-./ !"#$%AB–Ž—˜”•6789¢ ™š› :;<œ\]¯°±²³‰ Safe&'+-1234567;<=>?AFQSTVlûµ  !"#$%&'()*+,-./01234556789::;<=>?@ABCCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuuvwxyz{|}~€‚ƒ„…†‡ˆ‰Š‹ŒŽ‘’“”•–—˜™š›œžŸ ¡¢£¤¥¦§¨©ª«¬­® ¯ ° ± ² ³ ´ µ ¶ · ¸ ¹ º » ¼ ½ ¾ ¿ÀÁÂÃÄÅÆÇÈ2servant-auth-server-0.4.0.2-7jUKu5Y9ABzHD3KAc34kEuServant.Auth.Server(Servant.Auth.Server.Internal.ConfigTypes)Servant.Auth.Server.Internal.AddSetCookie%Servant.Auth.Server.Internal.ThrowAll"Servant.Auth.Server.Internal.Types Servant.Auth.Server.Internal.JWT#Servant.Auth.Server.Internal.Cookie&Servant.Auth.Server.Internal.BasicAuth"Servant.Auth.Server.Internal.ClassServant.Auth.Server.Internal&Servant.Auth.Server.Internal.FormLogin#Servant.Auth.Server.SetCookieOrphan#cookie-0.4.4-J7voMT3UqhIHsi2WXOCT1n Web.Cookie SetCookie1data-default-class-0.1.2.0-2kYzERBLX3wJoPfj7mwVvWData.Default.ClassdefDefault%servant-0.14.1-3072kfhxJq5BHSzCgVSyLsServant.API.IsSecure NotSecureSecureIsSecureServant.API.BasicAuthbasicAuthPasswordbasicAuthUsername BasicAuthData+servant-auth-0.3.2.0-Ck50umTTCfnBuc9SXVZTVH Servant.AuthAuthJWTCookie BasicAuth AddSetCookies addSetCookies SetCookieList SetCookieNil SetCookieConsAddSetCookieApiAddSetCookieApiVerbAddSetCookiesApiNatZS mkHeaders$fAddSetCookiesSTaggedTagged$fAddSetCookiesS(->)(->)$fAddSetCookiesS:<|>:<|>$fAddSetCookiesSmm$fAddSetCookiesZorigorig$fAddSetCookiesS(->)(->)0XsrfCookieSettingsxsrfCookieNamexsrfCookiePathxsrfHeaderNamexsrfExcludeGetCookieSettingscookieIsSecure cookieMaxAge cookieExpires cookiePath cookieDomaincookieSameSitesessionCookieNamecookieXsrfSetting JWTSettings signingKeyjwtAlgvalidationKeysaudienceMatchesSameSiteAnySiteSameSiteStrict SameSiteLaxIsPasswordCorrectPasswordCorrectPasswordIncorrectIsMatchMatches DoesNotMatchdefaultJWTSettingsdefaultCookieSettingsdefaultXsrfCookieSettings"jwtSettingsToJwtValidationSettings$fDefaultXsrfCookieSettings$fDefaultCookieSettings $fEqIsMatch $fShowIsMatch $fReadIsMatch$fGenericIsMatch $fOrdIsMatch$fEqIsPasswordCorrect$fShowIsPasswordCorrect$fReadIsPasswordCorrect$fGenericIsPasswordCorrect$fOrdIsPasswordCorrect $fEqSameSite$fShowSameSite$fReadSameSite$fGenericSameSite $fOrdSameSite$fGenericJWTSettings$fEqXsrfCookieSettings$fShowXsrfCookieSettings$fGenericXsrfCookieSettings$fEqCookieSettings$fShowCookieSettings$fGenericCookieSettingsThrowAllthrowAll$fThrowAllTagged$fThrowAll(->) $fThrowAllm$fThrowAll(->)0$fThrowAll:<|> AuthCheck runAuthCheck AuthResult BadPassword NoSuchUser Authenticated Indefinite$fMonadPlusAuthResult$fAlternativeAuthResult$fMonadAuthResult$fApplicativeAuthResult$fMonoidAuthResult$fSemigroupAuthResult$fMonadPlusAuthCheck$fAlternativeAuthCheck$fMonadTimeAuthCheck$fMonadIOAuthCheck$fMonadReaderRequestAuthCheck$fMonadAuthCheck$fApplicativeAuthCheck$fMonoidAuthCheck$fSemigroupAuthCheck$fEqAuthResult$fShowAuthResult$fReadAuthResult$fGenericAuthResult$fOrdAuthResult$fFunctorAuthResult$fTraversableAuthResult$fFoldableAuthResult$fGenericAuthCheck$fFunctorAuthCheckToJWT encodeJWTFromJWT decodeJWT jwtAuthCheckmakeJWTcookieAuthCheckxsrfCheckRequiredxsrfCookieAuthCheckmakeXsrfCookiemakeCsrfCookiemakeSessionCookienoXsrfTokenCookieapplyCookieSettingsapplyXsrfCookieSettingsapplySessionCookieSettings acceptLogin clearSessionmakeSessionCookieBS makeCookie makeCookieBSFromBasicAuthDatafromBasicAuthData BasicAuthCfgwwwAuthenticatedErrbasicAuthCheckAppCtxappCtxAppUnappAreAuthsrunAuthsIsAuthAuthArgsrunAuth$fAreAuths[]ctxsv$fIsAuthBasicAuthusr$fIsAuthJWTusr$fIsAuthCookieusr$fAppCtxctx[]res$fAppCtxctxs:(->)$fAreAuths:ctxsv$fHasServerTYPE:>ctxs generateKeygenerateSecret fromSecretwriteKeyreadKey,servant-server-0.14.1-GgU9h1dDCEoHHMXREAZjkD"Servant.Server.Internal.ServantErr ServantErr