h&&U"]      !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~                   Safe-Inferred")*/0189:;<servant-auth-serverfor servant >=0.11 servant-auth-serverfor  servant <0.11   Safe-Inferred")*/189:;< &servant-auth-server>The policies to use when generating and verifying XSRF cookies(servant-auth-server9What name to use for the cookie used for XSRF protection.)servant-auth-serverWhat path to use for the cookie used for XSRF protection. Default Just "/".*servant-auth-server9What name to use for the header used for XSRF protection.+servant-auth-server0Exclude GET request method from XSRF protection.,servant-auth-server,The policies to use when generating cookies. If *both* / and 0 are Nothing, browsers will treat the cookie as a *session cookie*. These will be deleted when the browser is closed.Note that having the setting Secure? may cause testing failures if you are not testing over HTTPS..servant-auth-server= means browsers will only send cookies over HTTPS. Default: Secure./servant-auth-server5How long from now until the cookie expires. Default: Nothing.0servant-auth-server*At what time the cookie expires. Default: Nothing.1servant-auth-serverThe URL path and sub-paths for which this cookie is used. Default: Just "/".2servant-auth-server@ABCDEFGHI'&+*)'(,543210/-.6;:978@ABCDEFGHI  Safe-Inferred")*/189:;<  Safe-Inferred")*/189:;<cservant-auth-serverc is a convenience function to throw errors across an entire sub-API throwAll err400 :: Handler a :<|> Handler b :<|> Handler c == throwError err400 :<|> throwError err400 :<|> err400dservant-auth-serverfor servant >=0.11eservant-auth-serverfor  servant <0.11bcbc Safe-Inferred")*/189:;<%jservant-auth-serverAn  AuthCheck is the function used to decide the authentication status (the m) of a request. Different  AuthChecks may be combined as a Monoid or Alternative; the semantics of this is that the *first* non-q< result from left to right is used and the rest are ignored.mservant-auth-server(The result of an authentication attempt.pservant-auth-serverAuthentication succeeded.qservant-auth-serverIf an authentication procedure cannot be carried out - if for example it expects a password and username in a header that is not present -  Indefinite is returned. This indicates that other authentication methods should be tried.jlkmqponmqponjlk Safe-Inferred")*/189:;<servant-auth-serverA JWT  AuthCheck. You likely won't need to use this directly unless you are protecting a Raw endpoint.servant-auth-serverCreates a JWT containing the specified data. The data is stored in the dat claim. The 'Maybe UTCTime' argument indicates the time at which the token expires. Safe-Inferred")*/189:;<servant-auth-server#Makes a cookie to be used for XSRF.servant-auth-server Alias for .servant-auth-server(Makes a cookie with session information.servant-auth-serverFor a JWT-serializable session, returns a function that decorates a provided response object with XSRF and session cookies. This should be used when a user successfully authenticates with credentials.servant-auth-serverArbitrary cookie expiry time set back in history after unix time 0servant-auth-serverAdds headers to a response that clears all session cookies | using max-age and expires cookie attributes.servant-auth-server Alias for .servant-auth-server Alias for . Safe-Inferred")*/189:;<servant-auth-serverWhether the username exists and the password is correct. Note that, rather than passing a Pass5 to the function, we pass a function that checks an  EncryptedPass. This is to make sure you don't accidentally do something untoward with the password, like store it.servant-auth-serverA type holding the configuration for Basic Authentication. It is defined as a type family with no arguments, so that it can be instantiated to whatever type you need to authenticate your users (use  type instance BasicAuthCfg = ...).Note that the instantiation is application-wide, i.e. there can be only one instance. As a consequence, it should not be instantiated in a library.0Basic Authentication expects an element of type  to be in the Context; that element is then passed automatically to the instance of  together with the authentication data obtained from the client.If you do not need a configuration for Basic Authentication, you can use just BasicAuthCfg = (), and recall to also add () to the Context6. A basic but more interesting example is to take as 0 a list of authorised username/password pairs: deriving instance Eq BasicAuthData type instance BasicAuthCfg = [BasicAuthData] instance FromBasicAuthData User where fromBasicAuthData authData authCfg = if elem authData authCfg then ...servant-auth-serverA  that asks the client to authenticate via Basic Authentication, should be invoked by an application whenever appropriate. The argument is the realm.  Safe-Inferred")*/189:;<servant-auth-serverAppCtx applies the function res to the arguments in ls1 by taking the values from the Context provided.servant-auth-serverIsAuth a ctx v indicates that a/ is an auth type that expects all elements of ctx to be the in the Context and whose authentication check returns an  AuthCheck v.    Safe-Inferred")*/189:;< Safe-Inferred")*/189:;<!<servant-auth-server%Generate a key suitable for use with  defaultConfig.servant-auth-server,Generate a bytestring suitable for use with .servant-auth-server!Restores a key from a bytestring.servant-auth-serverWrites a secret to a file. Can for instance be used from the REPL to persist a key to a file, which can then be included with the application. Restore the key using .servant-auth-serverReads a key from a file.  &'()*+,-./0123456789:;<=>?@ABCDEFGHbcjklmnopqmnopqjkl CDE6789:;F,-./012345&'()*+GH<=>? @ABbc  Safe-Inferred")*/189:;<"Y  !"#$#%#&#'()*+,-./0123456789:;<<=>?@AABCDEFGHIJJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}}~                 2servant-auth-server-0.4.8.0-8L5vtqr1C5zDwDS3Ywk23YServant.Auth.Server(Servant.Auth.Server.Internal.ConfigTypes)Servant.Auth.Server.Internal.AddSetCookie%Servant.Auth.Server.Internal.ThrowAll"Servant.Auth.Server.Internal.Types Servant.Auth.Server.Internal.JWT#Servant.Auth.Server.Internal.Cookie&Servant.Auth.Server.Internal.BasicAuth"Servant.Auth.Server.Internal.ClassServant.Auth.Server.Internal&Servant.Auth.Server.Internal.FormLogin#Servant.Auth.Server.SetCookieOrphan#cookie-0.4.6-5vy9yyVLJTw1SJvSixS3wD Web.Cookie SetCookie1data-default-class-0.1.2.0-CQYBH38PFES4dDyailJWvdData.Default.ClassdefDefault#servant-0.20-GjInsRzihxVJzApzfxsmRTServant.API.IsSecure NotSecureSecureIsSecureServant.API.BasicAuthbasicAuthPasswordbasicAuthUsername BasicAuthData+servant-auth-0.4.1.0-6jG6wxKRfrO4G5M07Rz3SBServant.Auth.JWT decodeJWTFromJWT encodeJWTToJWT Servant.AuthAuthJWTCookie BasicAuth AddSetCookies addSetCookies SetCookieList SetCookieNil SetCookieConsAddSetCookieApiMapAddSetCookieApiVerbAddSetCookieApiVerbAddSetCookiesApiNatZS mkHeaders$fAddSetCookiesSTaggedTagged$fAddSetCookiesSFUNFUN$fAddSetCookiesSapicookiedApi$fAddSetCookiesS:<|>:<|>$fAddSetCookiesSmm$fAddSetCookiesZorig1orig2$fAddSetCookiesSFUNFUN0XsrfCookieSettingsxsrfCookieNamexsrfCookiePathxsrfHeaderNamexsrfExcludeGetCookieSettingscookieIsSecure cookieMaxAge cookieExpires cookiePath cookieDomaincookieSameSitesessionCookieNamecookieXsrfSetting JWTSettings signingKeyjwtAlgvalidationKeysaudienceMatchesSameSiteAnySiteSameSiteStrict SameSiteLaxIsPasswordCorrectPasswordCorrectPasswordIncorrectIsMatchMatches DoesNotMatchdefaultJWTSettingsdefaultCookieSettingsdefaultXsrfCookieSettings"jwtSettingsToJwtValidationSettings$fDefaultXsrfCookieSettings$fDefaultCookieSettings$fEqCookieSettings$fShowCookieSettings$fGenericCookieSettings$fEqXsrfCookieSettings$fShowXsrfCookieSettings$fGenericXsrfCookieSettings$fGenericJWTSettings $fEqSameSite$fShowSameSite$fReadSameSite$fGenericSameSite $fOrdSameSite$fEqIsPasswordCorrect$fShowIsPasswordCorrect$fReadIsPasswordCorrect$fGenericIsPasswordCorrect$fOrdIsPasswordCorrect $fEqIsMatch $fShowIsMatch $fReadIsMatch$fGenericIsMatch $fOrdIsMatchThrowAllthrowAll$fThrowAllTagged $fThrowAllFUN $fThrowAllm$fThrowAllFUN0 $fThrowAllapi$fThrowAll:<|> AuthCheck runAuthCheck AuthResult BadPassword NoSuchUser Authenticated Indefinite$fMonadPlusAuthResult$fAlternativeAuthResult$fMonadAuthResult$fApplicativeAuthResult$fMonoidAuthResult$fSemigroupAuthResult$fMonadPlusAuthCheck$fAlternativeAuthCheck$fMonadTimeAuthCheck$fMonadIOAuthCheck$fMonadReaderRequestAuthCheck$fMonadFailAuthCheck$fMonadAuthCheck$fApplicativeAuthCheck$fMonoidAuthCheck$fSemigroupAuthCheck$fGenericAuthCheck$fFunctorAuthCheck$fEqAuthResult$fShowAuthResult$fReadAuthResult$fGenericAuthResult$fOrdAuthResult$fFunctorAuthResult$fTraversableAuthResult$fFoldableAuthResult jwtAuthCheckmakeJWT verifyJWTcookieAuthCheckxsrfCheckRequiredxsrfCookieAuthCheckmakeXsrfCookiemakeCsrfCookiemakeSessionCookienoXsrfTokenCookieapplyCookieSettingsapplyXsrfCookieSettingsapplySessionCookieSettings acceptLogin expireTime clearSessionmakeSessionCookieBS makeCookie makeCookieBSFromBasicAuthDatafromBasicAuthData BasicAuthCfgwwwAuthenticatedErrbasicAuthCheckAppCtxappCtxAppUnappAreAuthsrunAuthsIsAuthAuthArgsrunAuth$fAreAuths[]ctxsv$fIsAuthBasicAuthusr$fIsAuthJWTusr$fIsAuthCookieusr$fAppCtxctx[]res$fAppCtxctxs:FUN$fAreAuths:ctxsv$fHasServerTYPE:>ctxs generateKeygenerateSecret fromSecretwriteKeyreadKey*servant-server-0.20-Ke8t2mWvR03Cf4fvKIQLiS#Servant.Server.Internal.ServerError ServerError